]> git.immae.eu Git - github/Chocobozzz/PeerTube.git/blame - server/tests/api/activitypub/security.ts
Introduce sql command
[github/Chocobozzz/PeerTube.git] / server / tests / api / activitypub / security.ts
CommitLineData
a1587156 1/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
df66d815
C
2
3import 'mocha'
df66d815 4import * as chai from 'chai'
8dc8a34e 5import { buildDigest } from '@server/helpers/peertube-crypto'
2d53be02 6import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
095e2258 7import {
3d470a53 8 buildAbsoluteFixturePath,
095e2258 9 cleanupTests,
095e2258 10 flushAndRunMultipleServers,
e7053b1d
C
11 killallServers,
12 reRunServer,
095e2258 13 ServerInfo,
095e2258
C
14 wait
15} from '../../../../shared/extra-utils'
16import { makeFollowRequest, makePOSTAPRequest } from '../../../../shared/extra-utils/requests/activitypub'
17import { activityPubContextify, buildSignedActivity } from '../../../helpers/activitypub'
18import { HTTP_SIGNATURE } from '../../../initializers/constants'
19import { buildGlobalHeaders } from '../../../lib/job-queue/handlers/utils/activitypub-http-utils'
df66d815
C
20
21const expect = chai.expect
22
48f07b4a 23function setKeysOfServer (onServer: ServerInfo, ofServer: ServerInfo, publicKey: string, privateKey: string) {
e7053b1d
C
24 const url = 'http://localhost:' + ofServer.port + '/accounts/peertube'
25
26 return Promise.all([
9293139f
C
27 onServer.sqlCommand.setActorField(url, 'publicKey', publicKey),
28 onServer.sqlCommand.setActorField(url, 'privateKey', privateKey)
e7053b1d
C
29 ])
30}
31
32function setUpdatedAtOfServer (onServer: ServerInfo, ofServer: ServerInfo, updatedAt: string) {
33 const url = 'http://localhost:' + ofServer.port + '/accounts/peertube'
34
df66d815 35 return Promise.all([
9293139f
C
36 onServer.sqlCommand.setActorField(url, 'createdAt', updatedAt),
37 onServer.sqlCommand.setActorField(url, 'updatedAt', updatedAt)
df66d815
C
38 ])
39}
40
e7053b1d 41function getAnnounceWithoutContext (server: ServerInfo) {
3d470a53 42 const json = require(buildAbsoluteFixturePath('./ap-json/peertube/announce-without-context.json'))
48f07b4a
C
43 const result: typeof json = {}
44
45 for (const key of Object.keys(json)) {
46 if (Array.isArray(json[key])) {
e7053b1d 47 result[key] = json[key].map(v => v.replace(':9002', `:${server.port}`))
48f07b4a 48 } else {
e7053b1d 49 result[key] = json[key].replace(':9002', `:${server.port}`)
48f07b4a
C
50 }
51 }
52
53 return result
df66d815
C
54}
55
56describe('Test ActivityPub security', function () {
57 let servers: ServerInfo[]
58 let url: string
59
3d470a53
C
60 const keys = require(buildAbsoluteFixturePath('./ap-json/peertube/keys.json'))
61 const invalidKeys = require(buildAbsoluteFixturePath('./ap-json/peertube/invalid-keys.json'))
48f07b4a 62 const baseHttpSignature = () => ({
df66d815
C
63 algorithm: HTTP_SIGNATURE.ALGORITHM,
64 authorizationHeaderName: HTTP_SIGNATURE.HEADER_NAME,
48f07b4a 65 keyId: 'acct:peertube@localhost:' + servers[1].port,
df66d815
C
66 key: keys.privateKey,
67 headers: HTTP_SIGNATURE.HEADERS_TO_SIGN
48f07b4a 68 })
df66d815
C
69
70 // ---------------------------------------------------------------
71
72 before(async function () {
73 this.timeout(60000)
74
75 servers = await flushAndRunMultipleServers(3)
76
77 url = servers[0].url + '/inbox'
78
e7053b1d
C
79 await setKeysOfServer(servers[0], servers[1], keys.publicKey, null)
80 await setKeysOfServer(servers[1], servers[1], keys.publicKey, keys.privateKey)
df66d815 81
48f07b4a
C
82 const to = { url: 'http://localhost:' + servers[0].port + '/accounts/peertube' }
83 const by = { url: 'http://localhost:' + servers[1].port + '/accounts/peertube', privateKey: keys.privateKey }
df66d815
C
84 await makeFollowRequest(to, by)
85 })
86
87 describe('When checking HTTP signature', function () {
88
89 it('Should fail with an invalid digest', async function () {
48f07b4a 90 const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
df66d815
C
91 const headers = {
92 Digest: buildDigest({ hello: 'coucou' })
93 }
94
b5c36108
C
95 try {
96 await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
97 expect(true, 'Did not throw').to.be.false
98 } catch (err) {
99 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
100 }
df66d815
C
101 })
102
103 it('Should fail with an invalid date', async function () {
48f07b4a 104 const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
df66d815
C
105 const headers = buildGlobalHeaders(body)
106 headers['date'] = 'Wed, 21 Oct 2015 07:28:00 GMT'
107
b5c36108
C
108 try {
109 await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
110 expect(true, 'Did not throw').to.be.false
111 } catch (err) {
112 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
113 }
df66d815
C
114 })
115
116 it('Should fail with bad keys', async function () {
48f07b4a
C
117 await setKeysOfServer(servers[0], servers[1], invalidKeys.publicKey, invalidKeys.privateKey)
118 await setKeysOfServer(servers[1], servers[1], invalidKeys.publicKey, invalidKeys.privateKey)
df66d815 119
48f07b4a 120 const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
df66d815
C
121 const headers = buildGlobalHeaders(body)
122
b5c36108
C
123 try {
124 await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
125 expect(true, 'Did not throw').to.be.false
126 } catch (err) {
127 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
128 }
df66d815
C
129 })
130
797d05bd 131 it('Should reject requests without appropriate signed headers', async function () {
48f07b4a
C
132 await setKeysOfServer(servers[0], servers[1], keys.publicKey, keys.privateKey)
133 await setKeysOfServer(servers[1], servers[1], keys.publicKey, keys.privateKey)
df66d815 134
48f07b4a 135 const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
df66d815 136 const headers = buildGlobalHeaders(body)
797d05bd
C
137
138 const signatureOptions = baseHttpSignature()
139 const badHeadersMatrix = [
140 [ '(request-target)', 'date', 'digest' ],
141 [ 'host', 'date', 'digest' ],
142 [ '(request-target)', 'host', 'digest' ]
143 ]
144
145 for (const badHeaders of badHeadersMatrix) {
146 signatureOptions.headers = badHeaders
147
b5c36108
C
148 try {
149 await makePOSTAPRequest(url, body, signatureOptions, headers)
150 expect(true, 'Did not throw').to.be.false
151 } catch (err) {
152 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
153 }
797d05bd
C
154 }
155 })
156
157 it('Should succeed with a valid HTTP signature', async function () {
158 const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
159 const headers = buildGlobalHeaders(body)
df66d815 160
db4b15f2 161 const { statusCode } = await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
db4b15f2 162 expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204)
df66d815 163 })
095e2258
C
164
165 it('Should refresh the actor keys', async function () {
166 this.timeout(20000)
167
095e2258
C
168 // Update keys of server 2 to invalid keys
169 // Server 1 should refresh the actor and fail
170 await setKeysOfServer(servers[1], servers[1], invalidKeys.publicKey, invalidKeys.privateKey)
e7053b1d
C
171 await setUpdatedAtOfServer(servers[0], servers[1], '2015-07-17 22:00:00+00')
172
173 // Invalid peertube actor cache
9293139f 174 await killallServers([ servers[1] ])
e7053b1d 175 await reRunServer(servers[1])
095e2258
C
176
177 const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
178 const headers = buildGlobalHeaders(body)
179
b5c36108
C
180 try {
181 await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
182 expect(true, 'Did not throw').to.be.false
183 } catch (err) {
e7053b1d 184 console.error(err)
b5c36108
C
185 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
186 }
095e2258 187 })
df66d815
C
188 })
189
190 describe('When checking Linked Data Signature', function () {
095e2258
C
191 before(async function () {
192 this.timeout(10000)
193
194 await setKeysOfServer(servers[0], servers[1], keys.publicKey, keys.privateKey)
195 await setKeysOfServer(servers[1], servers[1], keys.publicKey, keys.privateKey)
48f07b4a 196 await setKeysOfServer(servers[2], servers[2], keys.publicKey, keys.privateKey)
df66d815 197
48f07b4a
C
198 const to = { url: 'http://localhost:' + servers[0].port + '/accounts/peertube' }
199 const by = { url: 'http://localhost:' + servers[2].port + '/accounts/peertube', privateKey: keys.privateKey }
df66d815
C
200 await makeFollowRequest(to, by)
201 })
202
203 it('Should fail with bad keys', async function () {
204 this.timeout(10000)
205
48f07b4a
C
206 await setKeysOfServer(servers[0], servers[2], invalidKeys.publicKey, invalidKeys.privateKey)
207 await setKeysOfServer(servers[2], servers[2], invalidKeys.publicKey, invalidKeys.privateKey)
df66d815 208
48f07b4a
C
209 const body = getAnnounceWithoutContext(servers[1])
210 body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
df66d815 211
48f07b4a 212 const signer: any = { privateKey: invalidKeys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
df66d815
C
213 const signedBody = await buildSignedActivity(signer, body)
214
215 const headers = buildGlobalHeaders(signedBody)
216
b5c36108
C
217 try {
218 await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
219 expect(true, 'Did not throw').to.be.false
220 } catch (err) {
221 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
222 }
df66d815
C
223 })
224
225 it('Should fail with an altered body', async function () {
226 this.timeout(10000)
227
48f07b4a
C
228 await setKeysOfServer(servers[0], servers[2], keys.publicKey, keys.privateKey)
229 await setKeysOfServer(servers[0], servers[2], keys.publicKey, keys.privateKey)
df66d815 230
48f07b4a
C
231 const body = getAnnounceWithoutContext(servers[1])
232 body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
df66d815 233
48f07b4a 234 const signer: any = { privateKey: keys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
df66d815
C
235 const signedBody = await buildSignedActivity(signer, body)
236
48f07b4a 237 signedBody.actor = 'http://localhost:' + servers[2].port + '/account/peertube'
df66d815
C
238
239 const headers = buildGlobalHeaders(signedBody)
240
b5c36108
C
241 try {
242 await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
243 expect(true, 'Did not throw').to.be.false
244 } catch (err) {
245 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
246 }
df66d815
C
247 })
248
249 it('Should succeed with a valid signature', async function () {
250 this.timeout(10000)
251
48f07b4a
C
252 const body = getAnnounceWithoutContext(servers[1])
253 body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
df66d815 254
48f07b4a 255 const signer: any = { privateKey: keys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
df66d815
C
256 const signedBody = await buildSignedActivity(signer, body)
257
258 const headers = buildGlobalHeaders(signedBody)
259
db4b15f2 260 const { statusCode } = await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
db4b15f2 261 expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204)
df66d815 262 })
095e2258
C
263
264 it('Should refresh the actor keys', async function () {
265 this.timeout(20000)
266
267 // Wait refresh invalidation
268 await wait(10000)
269
270 // Update keys of server 3 to invalid keys
271 // Server 1 should refresh the actor and fail
272 await setKeysOfServer(servers[2], servers[2], invalidKeys.publicKey, invalidKeys.privateKey)
273
274 const body = getAnnounceWithoutContext(servers[1])
275 body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
276
277 const signer: any = { privateKey: keys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
278 const signedBody = await buildSignedActivity(signer, body)
279
280 const headers = buildGlobalHeaders(signedBody)
281
b5c36108
C
282 try {
283 await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
284 expect(true, 'Did not throw').to.be.false
285 } catch (err) {
286 expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
287 }
095e2258 288 })
df66d815
C
289 })
290
291 after(async function () {
48f07b4a
C
292 this.timeout(10000)
293
294 await cleanupTests(servers)
df66d815
C
295 })
296})