/* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */ import { wait } from '@peertube/peertube-core-utils' import { HttpStatusCode } from '@peertube/peertube-models' import { buildAbsoluteFixturePath } from '@peertube/peertube-node-utils' import { PeerTubeServer, cleanupTests, createMultipleServers, killallServers } from '@peertube/peertube-server-commands' import { activityPubContextify, buildGlobalHTTPHeaders, signAndContextify } from '@peertube/peertube-server/core/helpers/activity-pub-utils.js' import { buildDigest } from '@peertube/peertube-server/core/helpers/peertube-crypto.js' import { signJsonLDObject } from '@peertube/peertube-server/core/helpers/peertube-jsonld.js' import { ACTIVITY_PUB, HTTP_SIGNATURE } from '@peertube/peertube-server/core/initializers/constants.js' import { makePOSTAPRequest } from '@tests/shared/requests.js' import { SQLCommand } from '@tests/shared/sql-command.js' import { expect } from 'chai' import { readJsonSync } from 'fs-extra/esm' function signJsonLDObjectWithoutAssertion (options: Parameters[0]) { return signJsonLDObject({ ...options, disableWorkerThreadAssertion: true }) } function fakeFilter () { return (data: any) => Promise.resolve(data) } function setKeysOfServer (onServer: SQLCommand, ofServerUrl: string, publicKey: string, privateKey: string) { const url = ofServerUrl + '/accounts/peertube' return Promise.all([ onServer.setActorField(url, 'publicKey', publicKey), onServer.setActorField(url, 'privateKey', privateKey) ]) } function setUpdatedAtOfServer (onServer: SQLCommand, ofServerUrl: string, updatedAt: string) { const url = ofServerUrl + '/accounts/peertube' return Promise.all([ onServer.setActorField(url, 'createdAt', updatedAt), onServer.setActorField(url, 'updatedAt', updatedAt) ]) } function getAnnounceWithoutContext (server: PeerTubeServer) { const json = readJsonSync(buildAbsoluteFixturePath('./ap-json/peertube/announce-without-context.json')) const result: typeof json = {} for (const key of Object.keys(json)) { if (Array.isArray(json[key])) { result[key] = json[key].map(v => v.replace(':9002', `:${server.port}`)) } else { result[key] = json[key].replace(':9002', `:${server.port}`) } } return result } async function makeFollowRequest (to: { url: string }, by: { url: string, privateKey }) { const follow = { type: 'Follow', id: by.url + '/' + new Date().getTime(), actor: by.url, object: to.url } const body = await activityPubContextify(follow, 'Follow', fakeFilter()) const httpSignature = { algorithm: HTTP_SIGNATURE.ALGORITHM, authorizationHeaderName: HTTP_SIGNATURE.HEADER_NAME, keyId: by.url, key: by.privateKey, headers: HTTP_SIGNATURE.HEADERS_TO_SIGN_WITH_PAYLOAD } const headers = { 'digest': buildDigest(body), 'content-type': 'application/activity+json', 'accept': ACTIVITY_PUB.ACCEPT_HEADER } return makePOSTAPRequest(to.url + '/inbox', body, httpSignature, headers) } describe('Test ActivityPub security', function () { let servers: PeerTubeServer[] let sqlCommands: SQLCommand[] = [] let url: string const keys = readJsonSync(buildAbsoluteFixturePath('./ap-json/peertube/keys.json')) const invalidKeys = readJsonSync(buildAbsoluteFixturePath('./ap-json/peertube/invalid-keys.json')) const baseHttpSignature = () => ({ algorithm: HTTP_SIGNATURE.ALGORITHM, authorizationHeaderName: HTTP_SIGNATURE.HEADER_NAME, keyId: 'acct:peertube@' + servers[1].host, key: keys.privateKey, headers: HTTP_SIGNATURE.HEADERS_TO_SIGN_WITH_PAYLOAD }) // --------------------------------------------------------------- before(async function () { this.timeout(60000) servers = await createMultipleServers(3) sqlCommands = servers.map(s => new SQLCommand(s)) url = servers[0].url + '/inbox' await setKeysOfServer(sqlCommands[0], servers[1].url, keys.publicKey, null) await setKeysOfServer(sqlCommands[1], servers[1].url, keys.publicKey, keys.privateKey) const to = { url: servers[0].url + '/accounts/peertube' } const by = { url: servers[1].url + '/accounts/peertube', privateKey: keys.privateKey } await makeFollowRequest(to, by) }) describe('When checking HTTP signature', function () { it('Should fail with an invalid digest', async function () { const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = { Digest: buildDigest({ hello: 'coucou' }) } try { await makePOSTAPRequest(url, body, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) it('Should fail with an invalid date', async function () { const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = buildGlobalHTTPHeaders(body, buildDigest) headers['date'] = 'Wed, 21 Oct 2015 07:28:00 GMT' try { await makePOSTAPRequest(url, body, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) it('Should fail with bad keys', async function () { await setKeysOfServer(sqlCommands[0], servers[1].url, invalidKeys.publicKey, invalidKeys.privateKey) await setKeysOfServer(sqlCommands[1], servers[1].url, invalidKeys.publicKey, invalidKeys.privateKey) const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = buildGlobalHTTPHeaders(body, buildDigest) try { await makePOSTAPRequest(url, body, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) it('Should reject requests without appropriate signed headers', async function () { await setKeysOfServer(sqlCommands[0], servers[1].url, keys.publicKey, keys.privateKey) await setKeysOfServer(sqlCommands[1], servers[1].url, keys.publicKey, keys.privateKey) const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = buildGlobalHTTPHeaders(body, buildDigest) const signatureOptions = baseHttpSignature() const badHeadersMatrix = [ [ '(request-target)', 'date', 'digest' ], [ 'host', 'date', 'digest' ], [ '(request-target)', 'host', 'digest' ] ] for (const badHeaders of badHeadersMatrix) { signatureOptions.headers = badHeaders try { await makePOSTAPRequest(url, body, signatureOptions, headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } } }) it('Should succeed with a valid HTTP signature draft 11 (without date but with (created))', async function () { const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = buildGlobalHTTPHeaders(body, buildDigest) const signatureOptions = baseHttpSignature() signatureOptions.headers = [ '(request-target)', '(created)', 'host', 'digest' ] const { statusCode } = await makePOSTAPRequest(url, body, signatureOptions, headers) expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204) }) it('Should succeed with a valid HTTP signature', async function () { const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = buildGlobalHTTPHeaders(body, buildDigest) const { statusCode } = await makePOSTAPRequest(url, body, baseHttpSignature(), headers) expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204) }) it('Should refresh the actor keys', async function () { this.timeout(20000) // Update keys of server 2 to invalid keys // Server 1 should refresh the actor and fail await setKeysOfServer(sqlCommands[1], servers[1].url, invalidKeys.publicKey, invalidKeys.privateKey) await setUpdatedAtOfServer(sqlCommands[0], servers[1].url, '2015-07-17 22:00:00+00') // Invalid peertube actor cache await killallServers([ servers[1] ]) await servers[1].run() const body = await activityPubContextify(getAnnounceWithoutContext(servers[1]), 'Announce', fakeFilter()) const headers = buildGlobalHTTPHeaders(body, buildDigest) try { await makePOSTAPRequest(url, body, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { console.error(err) expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) }) describe('When checking Linked Data Signature', function () { before(async function () { await setKeysOfServer(sqlCommands[0], servers[1].url, keys.publicKey, keys.privateKey) await setKeysOfServer(sqlCommands[1], servers[1].url, keys.publicKey, keys.privateKey) await setKeysOfServer(sqlCommands[2], servers[2].url, keys.publicKey, keys.privateKey) const to = { url: servers[0].url + '/accounts/peertube' } const by = { url: servers[2].url + '/accounts/peertube', privateKey: keys.privateKey } await makeFollowRequest(to, by) }) it('Should fail with bad keys', async function () { await setKeysOfServer(sqlCommands[0], servers[2].url, invalidKeys.publicKey, invalidKeys.privateKey) await setKeysOfServer(sqlCommands[2], servers[2].url, invalidKeys.publicKey, invalidKeys.privateKey) const body = getAnnounceWithoutContext(servers[1]) body.actor = servers[2].url + '/accounts/peertube' const signer: any = { privateKey: invalidKeys.privateKey, url: servers[2].url + '/accounts/peertube' } const signedBody = await signAndContextify({ byActor: signer, data: body, contextType: 'Announce', contextFilter: fakeFilter(), signerFunction: signJsonLDObjectWithoutAssertion }) const headers = buildGlobalHTTPHeaders(signedBody, buildDigest) try { await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) it('Should fail with an altered body', async function () { await setKeysOfServer(sqlCommands[0], servers[2].url, keys.publicKey, keys.privateKey) await setKeysOfServer(sqlCommands[0], servers[2].url, keys.publicKey, keys.privateKey) const body = getAnnounceWithoutContext(servers[1]) body.actor = servers[2].url + '/accounts/peertube' const signer: any = { privateKey: keys.privateKey, url: servers[2].url + '/accounts/peertube' } const signedBody: any = await signAndContextify({ byActor: signer, data: body, contextType: 'Announce', contextFilter: fakeFilter(), signerFunction: signJsonLDObjectWithoutAssertion }) signedBody.actor = servers[2].url + '/account/peertube' const headers = buildGlobalHTTPHeaders(signedBody, buildDigest) try { await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) it('Should succeed with a valid signature', async function () { const body = getAnnounceWithoutContext(servers[1]) body.actor = servers[2].url + '/accounts/peertube' const signer: any = { privateKey: keys.privateKey, url: servers[2].url + '/accounts/peertube' } const signedBody = await signAndContextify({ byActor: signer, data: body, contextType: 'Announce', contextFilter: fakeFilter(), signerFunction: signJsonLDObjectWithoutAssertion }) const headers = buildGlobalHTTPHeaders(signedBody, buildDigest) const { statusCode } = await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers) expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204) }) it('Should refresh the actor keys', async function () { this.timeout(20000) // Wait refresh invalidation await wait(10000) // Update keys of server 3 to invalid keys // Server 1 should refresh the actor and fail await setKeysOfServer(sqlCommands[2], servers[2].url, invalidKeys.publicKey, invalidKeys.privateKey) const body = getAnnounceWithoutContext(servers[1]) body.actor = servers[2].url + '/accounts/peertube' const signer: any = { privateKey: keys.privateKey, url: servers[2].url + '/accounts/peertube' } const signedBody = await signAndContextify({ byActor: signer, data: body, contextType: 'Announce', contextFilter: fakeFilter(), signerFunction: signJsonLDObjectWithoutAssertion }) const headers = buildGlobalHTTPHeaders(signedBody, buildDigest) try { await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers) expect(true, 'Did not throw').to.be.false } catch (err) { expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403) } }) }) after(async function () { for (const sql of sqlCommands) { await sql.cleanup() } await cleanupTests(servers) }) })