X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=server%2Fmiddlewares%2Factivitypub.ts;h=ce94a2129f84f56c275d3cfaf3e1c965b816a295;hb=095e2258043fcff8a79ab082d11edfbd8f13a8e2;hp=45899818e57d243615255adad470868b0eba5075;hpb=bdd428a6d9138d751f8cde82867022a93f1a76cc;p=github%2FChocobozzz%2FPeerTube.git diff --git a/server/middlewares/activitypub.ts b/server/middlewares/activitypub.ts index 45899818e..ce94a2129 100644 --- a/server/middlewares/activitypub.ts +++ b/server/middlewares/activitypub.ts @@ -3,10 +3,11 @@ import { ActivityDelete, ActivityPubSignature } from '../../shared' import { logger } from '../helpers/logger' import { isHTTPSignatureVerified, isJsonLDSignatureVerified, parseHTTPSignature } from '../helpers/peertube-crypto' import { ACCEPT_HEADERS, ACTIVITY_PUB, HTTP_SIGNATURE } from '../initializers/constants' -import { getOrCreateActorAndServerAndModel } from '../lib/activitypub' +import { getOrCreateActorAndServerAndModel } from '../lib/activitypub/actor' import { loadActorUrlOrGetFromWebfinger } from '../helpers/webfinger' import { isActorDeleteActivityValid } from '@server/helpers/custom-validators/activitypub/actor' import { getAPId } from '@server/helpers/activitypub' +import { HttpStatusCode } from '../../shared/core-utils/miscs/http-error-codes' async function checkSignature (req: Request, res: Response, next: NextFunction) { try { @@ -28,11 +29,11 @@ async function checkSignature (req: Request, res: Response, next: NextFunction) const activity: ActivityDelete = req.body if (isActorDeleteActivityValid(activity) && activity.object === activity.actor) { logger.debug('Handling signature error on actor delete activity', { err }) - return res.sendStatus(204) + return res.sendStatus(HttpStatusCode.NO_CONTENT_204) } logger.warn('Error in ActivityPub signature checker.', { err }) - return res.sendStatus(403) + return res.sendStatus(HttpStatusCode.FORBIDDEN_403) } } @@ -63,11 +64,20 @@ async function checkHttpSignature (req: Request, res: Response) { const sig = req.headers[HTTP_SIGNATURE.HEADER_NAME] as string if (sig && sig.startsWith('Signature ') === true) req.headers[HTTP_SIGNATURE.HEADER_NAME] = sig.replace(/^Signature /, '') - const parsed = parseHTTPSignature(req, HTTP_SIGNATURE.CLOCK_SKEW_SECONDS) + let parsed: any + + try { + parsed = parseHTTPSignature(req, HTTP_SIGNATURE.CLOCK_SKEW_SECONDS) + } catch (err) { + logger.warn('Invalid signature because of exception in signature parser', { reqBody: req.body, err }) + + res.status(HttpStatusCode.FORBIDDEN_403).json({ error: err.message }) + return false + } const keyId = parsed.keyId if (!keyId) { - res.sendStatus(403) + res.sendStatus(HttpStatusCode.FORBIDDEN_403) return false } @@ -84,7 +94,7 @@ async function checkHttpSignature (req: Request, res: Response) { if (verified !== true) { logger.warn('Signature from %s is invalid', actorUrl, { parsed }) - res.sendStatus(403) + res.sendStatus(HttpStatusCode.FORBIDDEN_403) return false } @@ -97,7 +107,7 @@ async function checkJsonLDSignature (req: Request, res: Response) { const signatureObject: ActivityPubSignature = req.body.signature if (!signatureObject || !signatureObject.creator) { - res.sendStatus(403) + res.sendStatus(HttpStatusCode.FORBIDDEN_403) return false } @@ -111,7 +121,7 @@ async function checkJsonLDSignature (req: Request, res: Response) { if (verified !== true) { logger.warn('Signature not verified.', req.body) - res.sendStatus(403) + res.sendStatus(HttpStatusCode.FORBIDDEN_403) return false }