Skip to content
Snippets Groups Projects
Forked from funkwhale / funkwhale
4856 commits behind the upstream repository.
signing.py 2.86 KiB
import datetime
import logging
import pytz

from django import forms
from django.utils import timezone
from django.utils.http import parse_http_date

import requests
import requests_http_signature

from . import exceptions, utils

logger = logging.getLogger(__name__)

#  the request Date should be between now - 30s and now + 30s
DATE_HEADER_VALID_FOR = 30


def verify_date(raw_date):
    if not raw_date:
        raise forms.ValidationError("Missing date header")

    try:
        ts = parse_http_date(raw_date)
    except ValueError as e:
        raise forms.ValidationError(str(e))
    dt = datetime.datetime.utcfromtimestamp(ts)
    dt = dt.replace(tzinfo=pytz.utc)
    delta = datetime.timedelta(seconds=DATE_HEADER_VALID_FOR)
    now = timezone.now()
    if dt < now - delta or dt > now + delta:
        raise forms.ValidationError(
            "Request Date is too far in the future or in the past"
        )

    return dt


def verify(request, public_key):
    verify_date(request.headers.get("Date"))

    return requests_http_signature.HTTPSignatureAuth.verify(
        request, key_resolver=lambda **kwargs: public_key, use_auth_header=False
    )


def verify_django(django_request, public_key):
    """
    Given a django WSGI request, create an underlying requests.PreparedRequest
    instance we can verify
    """
    headers = utils.clean_wsgi_headers(django_request.META)
    for h, v in list(headers.items()):
        # we include lower-cased version of the headers for compatibility
        # with requests_http_signature
        headers[h.lower()] = v
    try:
        signature = headers["Signature"]
    except KeyError:
        raise exceptions.MissingSignature
    url = "http://noop{}".format(django_request.path)
    query = django_request.META["QUERY_STRING"]
    if query:
        url += "?{}".format(query)
    signature_headers = signature.split('headers="')[1].split('",')[0]
    expected = signature_headers.split(" ")
    logger.debug("Signature expected headers: %s", expected)
    for header in expected:
        if header == "(request-target)":
            # this one represent the request body, so not an actual HTTP header
            continue
        try:
            headers[header]
        except KeyError:
            logger.debug("Missing header: %s", header)
    request = requests.Request(
        method=django_request.method, url=url, data=django_request.body, headers=headers
    )
    for h in request.headers.keys():
        v = request.headers[h]
        if v:
            request.headers[h] = str(v)
    request.prepare()
    return verify(request, public_key)


def get_auth(private_key, private_key_id):
    return requests_http_signature.HTTPSignatureAuth(
        use_auth_header=False,
        headers=["(request-target)", "user-agent", "host", "date"],
        algorithm="rsa-sha256",
        key=private_key.encode("utf-8"),
        key_id=private_key_id,
    )