PeerTube/server/middlewares/secure.js

52 lines
1.3 KiB
JavaScript
Raw Normal View History

'use strict'
2016-03-16 22:29:27 +01:00
const logger = require('../helpers/logger')
const mongoose = require('mongoose')
2016-07-01 16:22:36 +02:00
const peertubeCrypto = require('../helpers/peertube-crypto')
const Pod = mongoose.model('Pod')
2016-03-16 22:29:27 +01:00
const secureMiddleware = {
decryptBody: decryptBody
}
function decryptBody (req, res, next) {
2016-03-16 22:29:27 +01:00
const url = req.body.signature.url
Pod.loadByUrl(url, function (err, pod) {
if (err) {
logger.error('Cannot get signed url in decryptBody.', { error: err })
return res.sendStatus(500)
}
if (pod === null) {
logger.error('Unknown pod %s.', url)
return res.sendStatus(403)
}
logger.debug('Decrypting body from %s.', url)
const signatureOk = peertubeCrypto.checkSignature(pod.publicKey, url, req.body.signature.signature)
if (signatureOk === true) {
peertubeCrypto.decrypt(req.body.key, req.body.data, function (err, decrypted) {
if (err) {
logger.error('Cannot decrypt data.', { error: err })
return res.sendStatus(500)
}
req.body.data = JSON.parse(decrypted)
delete req.body.key
next()
})
} else {
logger.error('Signature is not okay in decryptBody for %s.', req.body.signature.url)
return res.sendStatus(403)
}
})
}
// ---------------------------------------------------------------------------
module.exports = secureMiddleware