PeerTube/server/helpers/peertube-crypto.js

145 lines
3.5 KiB
JavaScript
Raw Normal View History

'use strict'
const crypto = require('crypto')
2016-08-25 17:57:37 +02:00
const bcrypt = require('bcrypt')
2016-03-16 22:29:27 +01:00
const fs = require('fs')
const openssl = require('openssl-wrapper')
2016-08-19 21:34:51 +02:00
const constants = require('../initializers/constants')
2016-03-16 22:29:27 +01:00
const logger = require('./logger')
2016-03-16 22:29:27 +01:00
const peertubeCrypto = {
checkSignature,
comparePassword,
createCertsIfNotExist,
cryptPassword,
sign
}
function checkSignature (publicKey, data, hexSignature) {
const verify = crypto.createVerify(constants.SIGNATURE_ALGORITHM)
let dataString
if (typeof data === 'string') {
dataString = data
} else {
try {
dataString = JSON.stringify(data)
} catch (err) {
logger.error('Cannot check signature.', { error: err })
return false
}
}
verify.update(dataString, 'utf8')
const isValid = verify.verify(publicKey, hexSignature, constants.SIGNATURE_ENCODING)
return isValid
}
function sign (data) {
const sign = crypto.createSign(constants.SIGNATURE_ALGORITHM)
let dataString
if (typeof data === 'string') {
dataString = data
} else {
try {
dataString = JSON.stringify(data)
} catch (err) {
logger.error('Cannot sign data.', { error: err })
return ''
}
}
sign.update(dataString, 'utf8')
// TODO: make async
const myKey = fs.readFileSync(constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem')
const signature = sign.sign(myKey, constants.SIGNATURE_ENCODING)
return signature
}
2016-08-25 17:57:37 +02:00
function comparePassword (plainPassword, hashPassword, callback) {
bcrypt.compare(plainPassword, hashPassword, function (err, isPasswordMatch) {
if (err) return callback(err)
return callback(null, isPasswordMatch)
})
}
function createCertsIfNotExist (callback) {
certsExist(function (exist) {
if (exist === true) {
return callback(null)
}
createCerts(function (err) {
return callback(err)
2016-02-05 18:03:20 +01:00
})
})
}
2016-02-05 18:03:20 +01:00
2016-08-25 17:57:37 +02:00
function cryptPassword (password, callback) {
bcrypt.genSalt(constants.BCRYPT_SALT_SIZE, function (err, salt) {
if (err) return callback(err)
bcrypt.hash(password, salt, function (err, hash) {
return callback(err, hash)
})
})
}
// ---------------------------------------------------------------------------
2016-02-05 18:03:20 +01:00
module.exports = peertubeCrypto
2016-02-05 18:03:20 +01:00
// ---------------------------------------------------------------------------
2016-02-05 18:03:20 +01:00
function certsExist (callback) {
2016-08-19 21:34:51 +02:00
fs.exists(constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem', function (exists) {
return callback(exists)
})
}
function createCerts (callback) {
certsExist(function (exist) {
if (exist === true) {
2016-03-16 22:29:27 +01:00
const string = 'Certs already exist.'
logger.warning(string)
return callback(new Error(string))
}
logger.info('Generating a RSA key...')
2016-08-19 21:34:51 +02:00
let options = {
'out': constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem',
'2048': false
}
openssl.exec('genrsa', options, function (err) {
if (err) {
logger.error('Cannot create private key on this pod.')
return callback(err)
2016-02-05 18:03:20 +01:00
}
logger.info('RSA key generated.')
2016-02-05 18:03:20 +01:00
2016-08-19 21:34:51 +02:00
options = {
'in': constants.CONFIG.STORAGE.CERT_DIR + 'peertube.key.pem',
'pubout': true,
'out': constants.CONFIG.STORAGE.CERT_DIR + 'peertube.pub'
}
logger.info('Manage public key...')
2016-08-19 21:34:51 +02:00
openssl.exec('rsa', options, function (err) {
2016-02-05 18:03:20 +01:00
if (err) {
logger.error('Cannot create public key on this pod.')
2016-02-05 18:03:20 +01:00
return callback(err)
}
logger.info('Public key managed.')
return callback(null)
})
2016-02-05 18:03:20 +01:00
})
})
}