'use strict'
-const config = require('config')
const crypto = require('crypto')
+const bcrypt = require('bcrypt')
const fs = require('fs')
const openssl = require('openssl-wrapper')
-const path = require('path')
-const ursa = require('ursa')
+const pathUtils = require('path')
+const constants = require('../initializers/constants')
const logger = require('./logger')
-const certDir = path.join(__dirname, '..', '..', config.get('storage.certs'))
-const algorithm = 'aes-256-ctr'
-
const peertubeCrypto = {
- checkSignature: checkSignature,
- createCertsIfNotExist: createCertsIfNotExist,
- decrypt: decrypt,
- encrypt: encrypt,
- getCertDir: getCertDir,
- sign: sign
+ checkSignature,
+ comparePassword,
+ createCertsIfNotExist,
+ cryptPassword,
+ getMyPrivateCert,
+ getMyPublicCert,
+ sign
}
-function checkSignature (publicKey, rawData, hexSignature) {
- const crt = ursa.createPublicKey(publicKey)
- const isValid = crt.hashAndVerify('sha256', new Buffer(rawData).toString('hex'), hexSignature, 'hex')
+function checkSignature (publicKey, data, hexSignature) {
+ const verify = crypto.createVerify(constants.SIGNATURE_ALGORITHM)
+
+ let dataString
+ if (typeof data === 'string') {
+ dataString = data
+ } else {
+ try {
+ dataString = JSON.stringify(data)
+ } catch (err) {
+ logger.error('Cannot check signature.', { error: err })
+ return false
+ }
+ }
+
+ verify.update(dataString, 'utf8')
+
+ const isValid = verify.verify(publicKey, hexSignature, constants.SIGNATURE_ENCODING)
return isValid
}
-function createCertsIfNotExist (callback) {
- certsExist(function (exist) {
- if (exist === true) {
- return callback(null)
+function sign (data) {
+ const sign = crypto.createSign(constants.SIGNATURE_ALGORITHM)
+
+ let dataString
+ if (typeof data === 'string') {
+ dataString = data
+ } else {
+ try {
+ dataString = JSON.stringify(data)
+ } catch (err) {
+ logger.error('Cannot sign data.', { error: err })
+ return ''
}
+ }
- createCerts(function (err) {
- return callback(err)
- })
- })
+ sign.update(dataString, 'utf8')
+
+ // TODO: make async
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ const myKey = fs.readFileSync(certPath)
+ const signature = sign.sign(myKey, constants.SIGNATURE_ENCODING)
+
+ return signature
}
-function decrypt (key, data, callback) {
- fs.readFile(getCertDir() + 'peertube.key.pem', function (err, file) {
+function comparePassword (plainPassword, hashPassword, callback) {
+ bcrypt.compare(plainPassword, hashPassword, function (err, isPasswordMatch) {
if (err) return callback(err)
- const myPrivateKey = ursa.createPrivateKey(file)
- const decryptedKey = myPrivateKey.decrypt(key, 'hex', 'utf8')
- const decryptedData = symetricDecrypt(data, decryptedKey)
-
- return callback(null, decryptedData)
+ return callback(null, isPasswordMatch)
})
}
-function encrypt (publicKey, data, callback) {
- const crt = ursa.createPublicKey(publicKey)
-
- symetricEncrypt(data, function (err, dataEncrypted) {
+function createCertsIfNotExist (callback) {
+ certsExist(function (err, exist) {
if (err) return callback(err)
- const key = crt.encrypt(dataEncrypted.password, 'utf8', 'hex')
- const encrypted = {
- data: dataEncrypted.crypted,
- key: key
+ if (exist === true) {
+ return callback(null)
}
- callback(null, encrypted)
+ createCerts(function (err) {
+ return callback(err)
+ })
})
}
-function getCertDir () {
- return certDir
+function cryptPassword (password, callback) {
+ bcrypt.genSalt(constants.BCRYPT_SALT_SIZE, function (err, salt) {
+ if (err) return callback(err)
+
+ bcrypt.hash(password, salt, function (err, hash) {
+ return callback(err, hash)
+ })
+ })
}
-function sign (data) {
- const myKey = ursa.createPrivateKey(fs.readFileSync(certDir + 'peertube.key.pem'))
- const signature = myKey.hashAndSign('sha256', data, 'utf8', 'hex')
+function getMyPrivateCert (callback) {
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ fs.readFile(certPath, 'utf8', callback)
+}
- return signature
+function getMyPublicCert (callback) {
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PUBLIC_CERT_NAME)
+ fs.readFile(certPath, 'utf8', callback)
}
// ---------------------------------------------------------------------------
// ---------------------------------------------------------------------------
function certsExist (callback) {
- fs.exists(certDir + 'peertube.key.pem', function (exists) {
- return callback(exists)
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ fs.access(certPath, function (err) {
+ // If there is an error the certificates do not exist
+ const exists = !err
+ return callback(null, exists)
})
}
function createCerts (callback) {
- certsExist(function (exist) {
+ certsExist(function (err, exist) {
+ if (err) return callback(err)
+
if (exist === true) {
const string = 'Certs already exist.'
logger.warning(string)
}
logger.info('Generating a RSA key...')
- openssl.exec('genrsa', { 'out': certDir + 'peertube.key.pem', '2048': false }, function (err) {
+
+ const privateCertPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ const genRsaOptions = {
+ 'out': privateCertPath,
+ '2048': false
+ }
+ openssl.exec('genrsa', genRsaOptions, function (err) {
if (err) {
logger.error('Cannot create private key on this pod.')
return callback(err)
}
+
logger.info('RSA key generated.')
+ logger.info('Managing public key...')
- logger.info('Manage public key...')
- openssl.exec('rsa', { 'in': certDir + 'peertube.key.pem', 'pubout': true, 'out': certDir + 'peertube.pub' }, function (err) {
+ const publicCertPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, 'peertube.pub')
+ const rsaOptions = {
+ 'in': privateCertPath,
+ 'pubout': true,
+ 'out': publicCertPath
+ }
+ openssl.exec('rsa', rsaOptions, function (err) {
if (err) {
logger.error('Cannot create public key on this pod.')
return callback(err)
})
})
}
-
-function generatePassword (callback) {
- crypto.randomBytes(32, function (err, buf) {
- if (err) return callback(err)
-
- callback(null, buf.toString('utf8'))
- })
-}
-
-function symetricDecrypt (text, password) {
- const decipher = crypto.createDecipher(algorithm, password)
- let dec = decipher.update(text, 'hex', 'utf8')
- dec += decipher.final('utf8')
- return dec
-}
-
-function symetricEncrypt (text, callback) {
- generatePassword(function (err, password) {
- if (err) return callback(err)
-
- const cipher = crypto.createCipher(algorithm, password)
- let crypted = cipher.update(text, 'utf8', 'hex')
- crypted += cipher.final('hex')
- callback(null, { crypted: crypted, password: password })
- })
-}