aboutsummaryrefslogtreecommitdiffhomepage
path: root/server/helpers/peertube-crypto.ts
diff options
context:
space:
mode:
authorChocobozzz <florian.bigard@gmail.com>2017-05-15 22:22:03 +0200
committerChocobozzz <florian.bigard@gmail.com>2017-05-20 09:57:40 +0200
commit65fcc3119c334b75dd13bcfdebf186afdc580a8f (patch)
tree4f2158c61a9b7c3f47cfa233d01413b946ee53c0 /server/helpers/peertube-crypto.ts
parentd5f345ed4cfac4e1fa84dcb4fce1cda4d32f9c73 (diff)
downloadPeerTube-65fcc3119c334b75dd13bcfdebf186afdc580a8f.tar.gz
PeerTube-65fcc3119c334b75dd13bcfdebf186afdc580a8f.tar.zst
PeerTube-65fcc3119c334b75dd13bcfdebf186afdc580a8f.zip
First typescript iteration
Diffstat (limited to 'server/helpers/peertube-crypto.ts')
-rw-r--r--server/helpers/peertube-crypto.ts171
1 files changed, 171 insertions, 0 deletions
diff --git a/server/helpers/peertube-crypto.ts b/server/helpers/peertube-crypto.ts
new file mode 100644
index 000000000..a4e9672e6
--- /dev/null
+++ b/server/helpers/peertube-crypto.ts
@@ -0,0 +1,171 @@
1import crypto = require('crypto')
2import bcrypt = require('bcrypt')
3import fs = require('fs')
4import openssl = require('openssl-wrapper')
5import { join } from 'path'
6
7import {
8 SIGNATURE_ALGORITHM,
9 SIGNATURE_ENCODING,
10 PRIVATE_CERT_NAME,
11 CONFIG,
12 BCRYPT_SALT_SIZE,
13 PUBLIC_CERT_NAME
14} from '../initializers'
15import { logger } from './logger'
16
17function checkSignature (publicKey, data, hexSignature) {
18 const verify = crypto.createVerify(SIGNATURE_ALGORITHM)
19
20 let dataString
21 if (typeof data === 'string') {
22 dataString = data
23 } else {
24 try {
25 dataString = JSON.stringify(data)
26 } catch (err) {
27 logger.error('Cannot check signature.', { error: err })
28 return false
29 }
30 }
31
32 verify.update(dataString, 'utf8')
33
34 const isValid = verify.verify(publicKey, hexSignature, SIGNATURE_ENCODING)
35 return isValid
36}
37
38function sign (data) {
39 const sign = crypto.createSign(SIGNATURE_ALGORITHM)
40
41 let dataString
42 if (typeof data === 'string') {
43 dataString = data
44 } else {
45 try {
46 dataString = JSON.stringify(data)
47 } catch (err) {
48 logger.error('Cannot sign data.', { error: err })
49 return ''
50 }
51 }
52
53 sign.update(dataString, 'utf8')
54
55 // TODO: make async
56 const certPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
57 const myKey = fs.readFileSync(certPath)
58 const signature = sign.sign(myKey.toString(), SIGNATURE_ENCODING)
59
60 return signature
61}
62
63function comparePassword (plainPassword, hashPassword, callback) {
64 bcrypt.compare(plainPassword, hashPassword, function (err, isPasswordMatch) {
65 if (err) return callback(err)
66
67 return callback(null, isPasswordMatch)
68 })
69}
70
71function createCertsIfNotExist (callback) {
72 certsExist(function (err, exist) {
73 if (err) return callback(err)
74
75 if (exist === true) {
76 return callback(null)
77 }
78
79 createCerts(function (err) {
80 return callback(err)
81 })
82 })
83}
84
85function cryptPassword (password, callback) {
86 bcrypt.genSalt(BCRYPT_SALT_SIZE, function (err, salt) {
87 if (err) return callback(err)
88
89 bcrypt.hash(password, salt, function (err, hash) {
90 return callback(err, hash)
91 })
92 })
93}
94
95function getMyPrivateCert (callback) {
96 const certPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
97 fs.readFile(certPath, 'utf8', callback)
98}
99
100function getMyPublicCert (callback) {
101 const certPath = join(CONFIG.STORAGE.CERT_DIR, PUBLIC_CERT_NAME)
102 fs.readFile(certPath, 'utf8', callback)
103}
104
105// ---------------------------------------------------------------------------
106
107export {
108 checkSignature,
109 comparePassword,
110 createCertsIfNotExist,
111 cryptPassword,
112 getMyPrivateCert,
113 getMyPublicCert,
114 sign
115}
116
117// ---------------------------------------------------------------------------
118
119function certsExist (callback) {
120 const certPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
121 fs.access(certPath, function (err) {
122 // If there is an error the certificates do not exist
123 const exists = !err
124 return callback(null, exists)
125 })
126}
127
128function createCerts (callback) {
129 certsExist(function (err, exist) {
130 if (err) return callback(err)
131
132 if (exist === true) {
133 const string = 'Certs already exist.'
134 logger.warning(string)
135 return callback(new Error(string))
136 }
137
138 logger.info('Generating a RSA key...')
139
140 const privateCertPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
141 const genRsaOptions = {
142 'out': privateCertPath,
143 '2048': false
144 }
145 openssl.exec('genrsa', genRsaOptions, function (err) {
146 if (err) {
147 logger.error('Cannot create private key on this pod.')
148 return callback(err)
149 }
150
151 logger.info('RSA key generated.')
152 logger.info('Managing public key...')
153
154 const publicCertPath = join(CONFIG.STORAGE.CERT_DIR, 'peertube.pub')
155 const rsaOptions = {
156 'in': privateCertPath,
157 'pubout': true,
158 'out': publicCertPath
159 }
160 openssl.exec('rsa', rsaOptions, function (err) {
161 if (err) {
162 logger.error('Cannot create public key on this pod.')
163 return callback(err)
164 }
165
166 logger.info('Public key managed.')
167 return callback(null)
168 })
169 })
170 })
171}