'use strict'
-const bcrypt = require('bcrypt')
const crypto = require('crypto')
+const bcrypt = require('bcrypt')
const fs = require('fs')
const openssl = require('openssl-wrapper')
-const ursa = require('ursa')
+const pathUtils = require('path')
const constants = require('../initializers/constants')
const logger = require('./logger')
comparePassword,
createCertsIfNotExist,
cryptPassword,
+ getMyPrivateCert,
+ getMyPublicCert,
sign
}
-function checkSignature (publicKey, rawData, hexSignature) {
- const crt = ursa.createPublicKey(publicKey)
- const isValid = crt.hashAndVerify('sha256', new Buffer(rawData).toString('hex'), hexSignature, 'hex')
+function checkSignature (publicKey, data, hexSignature) {
+ const verify = crypto.createVerify(constants.SIGNATURE_ALGORITHM)
+
+ let dataString
+ if (typeof data === 'string') {
+ dataString = data
+ } else {
+ try {
+ dataString = JSON.stringify(data)
+ } catch (err) {
+ logger.error('Cannot check signature.', { error: err })
+ return false
+ }
+ }
+
+ verify.update(dataString, 'utf8')
+
+ const isValid = verify.verify(publicKey, hexSignature, constants.SIGNATURE_ENCODING)
return isValid
}
+function sign (data) {
+ const sign = crypto.createSign(constants.SIGNATURE_ALGORITHM)
+
+ let dataString
+ if (typeof data === 'string') {
+ dataString = data
+ } else {
+ try {
+ dataString = JSON.stringify(data)
+ } catch (err) {
+ logger.error('Cannot sign data.', { error: err })
+ return ''
+ }
+ }
+
+ sign.update(dataString, 'utf8')
+
+ // TODO: make async
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ const myKey = fs.readFileSync(certPath)
+ const signature = sign.sign(myKey, constants.SIGNATURE_ENCODING)
+
+ return signature
+}
+
function comparePassword (plainPassword, hashPassword, callback) {
bcrypt.compare(plainPassword, hashPassword, function (err, isPasswordMatch) {
if (err) return callback(err)
})
}
-function sign (data) {
- const myKey = ursa.createPrivateKey(fs.readFileSync(constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem'))
- const signature = myKey.hashAndSign('sha256', data, 'utf8', 'hex')
+function getMyPrivateCert (callback) {
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ fs.readFile(certPath, 'utf8', callback)
+}
- return signature
+function getMyPublicCert (callback) {
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PUBLIC_CERT_NAME)
+ fs.readFile(certPath, 'utf8', callback)
}
// ---------------------------------------------------------------------------
// ---------------------------------------------------------------------------
function certsExist (callback) {
- fs.exists(constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem', function (exists) {
+ const certPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ fs.exists(certPath, function (exists) {
return callback(exists)
})
}
logger.info('Generating a RSA key...')
- let options = {
- 'out': constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem',
+ const privateCertPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, constants.PRIVATE_CERT_NAME)
+ const genRsaOptions = {
+ 'out': privateCertPath,
'2048': false
}
- openssl.exec('genrsa', options, function (err) {
+ openssl.exec('genrsa', genRsaOptions, function (err) {
if (err) {
logger.error('Cannot create private key on this pod.')
return callback(err)
}
+
logger.info('RSA key generated.')
+ logger.info('Managing public key...')
- options = {
- 'in': constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem',
+ const publicCertPath = pathUtils.join(constants.CONFIG.STORAGE.CERT_DIR, 'peertube.pub')
+ const rsaOptions = {
+ 'in': privateCertPath,
'pubout': true,
- 'out': constants.CONFIG.STORAGE.CERT_DIR + 'peertube.pub'
+ 'out': publicCertPath
}
- logger.info('Manage public key...')
- openssl.exec('rsa', options, function (err) {
+ openssl.exec('rsa', rsaOptions, function (err) {
if (err) {
logger.error('Cannot create public key on this pod.')
return callback(err)