mirror of https://github.com/Chocobozzz/PeerTube
				
				
				
			
		
			
				
	
	
		
			300 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			TypeScript
		
	
	
			
		
		
	
	
			300 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			TypeScript
		
	
	
| /* eslint-disable @typescript-eslint/no-unused-expressions,@typescript-eslint/require-await */
 | |
| 
 | |
| import 'mocha'
 | |
| import * as chai from 'chai'
 | |
| import { buildDigest } from '@server/helpers/peertube-crypto'
 | |
| import { HttpStatusCode } from '../../../../shared/core-utils/miscs/http-error-codes'
 | |
| import {
 | |
|   cleanupTests,
 | |
|   closeAllSequelize,
 | |
|   flushAndRunMultipleServers,
 | |
|   killallServers,
 | |
|   reRunServer,
 | |
|   ServerInfo,
 | |
|   setActorField,
 | |
|   wait
 | |
| } from '../../../../shared/extra-utils'
 | |
| import { makeFollowRequest, makePOSTAPRequest } from '../../../../shared/extra-utils/requests/activitypub'
 | |
| import { activityPubContextify, buildSignedActivity } from '../../../helpers/activitypub'
 | |
| import { HTTP_SIGNATURE } from '../../../initializers/constants'
 | |
| import { buildGlobalHeaders } from '../../../lib/job-queue/handlers/utils/activitypub-http-utils'
 | |
| 
 | |
| const expect = chai.expect
 | |
| 
 | |
| function setKeysOfServer (onServer: ServerInfo, ofServer: ServerInfo, publicKey: string, privateKey: string) {
 | |
|   const url = 'http://localhost:' + ofServer.port + '/accounts/peertube'
 | |
| 
 | |
|   return Promise.all([
 | |
|     setActorField(onServer.internalServerNumber, url, 'publicKey', publicKey),
 | |
|     setActorField(onServer.internalServerNumber, url, 'privateKey', privateKey)
 | |
|   ])
 | |
| }
 | |
| 
 | |
| function setUpdatedAtOfServer (onServer: ServerInfo, ofServer: ServerInfo, updatedAt: string) {
 | |
|   const url = 'http://localhost:' + ofServer.port + '/accounts/peertube'
 | |
| 
 | |
|   return Promise.all([
 | |
|     setActorField(onServer.internalServerNumber, url, 'createdAt', updatedAt),
 | |
|     setActorField(onServer.internalServerNumber, url, 'updatedAt', updatedAt)
 | |
|   ])
 | |
| }
 | |
| 
 | |
| function getAnnounceWithoutContext (server: ServerInfo) {
 | |
|   const json = require('./json/peertube/announce-without-context.json')
 | |
|   const result: typeof json = {}
 | |
| 
 | |
|   for (const key of Object.keys(json)) {
 | |
|     if (Array.isArray(json[key])) {
 | |
|       result[key] = json[key].map(v => v.replace(':9002', `:${server.port}`))
 | |
|     } else {
 | |
|       result[key] = json[key].replace(':9002', `:${server.port}`)
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return result
 | |
| }
 | |
| 
 | |
| describe('Test ActivityPub security', function () {
 | |
|   let servers: ServerInfo[]
 | |
|   let url: string
 | |
| 
 | |
|   const keys = require('./json/peertube/keys.json')
 | |
|   const invalidKeys = require('./json/peertube/invalid-keys.json')
 | |
|   const baseHttpSignature = () => ({
 | |
|     algorithm: HTTP_SIGNATURE.ALGORITHM,
 | |
|     authorizationHeaderName: HTTP_SIGNATURE.HEADER_NAME,
 | |
|     keyId: 'acct:peertube@localhost:' + servers[1].port,
 | |
|     key: keys.privateKey,
 | |
|     headers: HTTP_SIGNATURE.HEADERS_TO_SIGN
 | |
|   })
 | |
| 
 | |
|   // ---------------------------------------------------------------
 | |
| 
 | |
|   before(async function () {
 | |
|     this.timeout(60000)
 | |
| 
 | |
|     servers = await flushAndRunMultipleServers(3)
 | |
| 
 | |
|     url = servers[0].url + '/inbox'
 | |
| 
 | |
|     await setKeysOfServer(servers[0], servers[1], keys.publicKey, null)
 | |
|     await setKeysOfServer(servers[1], servers[1], keys.publicKey, keys.privateKey)
 | |
| 
 | |
|     const to = { url: 'http://localhost:' + servers[0].port + '/accounts/peertube' }
 | |
|     const by = { url: 'http://localhost:' + servers[1].port + '/accounts/peertube', privateKey: keys.privateKey }
 | |
|     await makeFollowRequest(to, by)
 | |
|   })
 | |
| 
 | |
|   describe('When checking HTTP signature', function () {
 | |
| 
 | |
|     it('Should fail with an invalid digest', async function () {
 | |
|       const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
 | |
|       const headers = {
 | |
|         Digest: buildDigest({ hello: 'coucou' })
 | |
|       }
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
| 
 | |
|     it('Should fail with an invalid date', async function () {
 | |
|       const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
 | |
|       const headers = buildGlobalHeaders(body)
 | |
|       headers['date'] = 'Wed, 21 Oct 2015 07:28:00 GMT'
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
| 
 | |
|     it('Should fail with bad keys', async function () {
 | |
|       await setKeysOfServer(servers[0], servers[1], invalidKeys.publicKey, invalidKeys.privateKey)
 | |
|       await setKeysOfServer(servers[1], servers[1], invalidKeys.publicKey, invalidKeys.privateKey)
 | |
| 
 | |
|       const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
 | |
|       const headers = buildGlobalHeaders(body)
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
| 
 | |
|     it('Should reject requests without appropriate signed headers', async function () {
 | |
|       await setKeysOfServer(servers[0], servers[1], keys.publicKey, keys.privateKey)
 | |
|       await setKeysOfServer(servers[1], servers[1], keys.publicKey, keys.privateKey)
 | |
| 
 | |
|       const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
 | |
|       const headers = buildGlobalHeaders(body)
 | |
| 
 | |
|       const signatureOptions = baseHttpSignature()
 | |
|       const badHeadersMatrix = [
 | |
|         [ '(request-target)', 'date', 'digest' ],
 | |
|         [ 'host', 'date', 'digest' ],
 | |
|         [ '(request-target)', 'host', 'digest' ]
 | |
|       ]
 | |
| 
 | |
|       for (const badHeaders of badHeadersMatrix) {
 | |
|         signatureOptions.headers = badHeaders
 | |
| 
 | |
|         try {
 | |
|           await makePOSTAPRequest(url, body, signatureOptions, headers)
 | |
|           expect(true, 'Did not throw').to.be.false
 | |
|         } catch (err) {
 | |
|           expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|         }
 | |
|       }
 | |
|     })
 | |
| 
 | |
|     it('Should succeed with a valid HTTP signature', async function () {
 | |
|       const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
 | |
|       const headers = buildGlobalHeaders(body)
 | |
| 
 | |
|       const { statusCode } = await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
 | |
|       expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204)
 | |
|     })
 | |
| 
 | |
|     it('Should refresh the actor keys', async function () {
 | |
|       this.timeout(20000)
 | |
| 
 | |
|       // Update keys of server 2 to invalid keys
 | |
|       // Server 1 should refresh the actor and fail
 | |
|       await setKeysOfServer(servers[1], servers[1], invalidKeys.publicKey, invalidKeys.privateKey)
 | |
|       await setUpdatedAtOfServer(servers[0], servers[1], '2015-07-17 22:00:00+00')
 | |
| 
 | |
|       // Invalid peertube actor cache
 | |
|       killallServers([ servers[1] ])
 | |
|       await reRunServer(servers[1])
 | |
| 
 | |
|       const body = activityPubContextify(getAnnounceWithoutContext(servers[1]))
 | |
|       const headers = buildGlobalHeaders(body)
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, body, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         console.error(err)
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
|   })
 | |
| 
 | |
|   describe('When checking Linked Data Signature', function () {
 | |
|     before(async function () {
 | |
|       this.timeout(10000)
 | |
| 
 | |
|       await setKeysOfServer(servers[0], servers[1], keys.publicKey, keys.privateKey)
 | |
|       await setKeysOfServer(servers[1], servers[1], keys.publicKey, keys.privateKey)
 | |
|       await setKeysOfServer(servers[2], servers[2], keys.publicKey, keys.privateKey)
 | |
| 
 | |
|       const to = { url: 'http://localhost:' + servers[0].port + '/accounts/peertube' }
 | |
|       const by = { url: 'http://localhost:' + servers[2].port + '/accounts/peertube', privateKey: keys.privateKey }
 | |
|       await makeFollowRequest(to, by)
 | |
|     })
 | |
| 
 | |
|     it('Should fail with bad keys', async function () {
 | |
|       this.timeout(10000)
 | |
| 
 | |
|       await setKeysOfServer(servers[0], servers[2], invalidKeys.publicKey, invalidKeys.privateKey)
 | |
|       await setKeysOfServer(servers[2], servers[2], invalidKeys.publicKey, invalidKeys.privateKey)
 | |
| 
 | |
|       const body = getAnnounceWithoutContext(servers[1])
 | |
|       body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
 | |
| 
 | |
|       const signer: any = { privateKey: invalidKeys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
 | |
|       const signedBody = await buildSignedActivity(signer, body)
 | |
| 
 | |
|       const headers = buildGlobalHeaders(signedBody)
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
| 
 | |
|     it('Should fail with an altered body', async function () {
 | |
|       this.timeout(10000)
 | |
| 
 | |
|       await setKeysOfServer(servers[0], servers[2], keys.publicKey, keys.privateKey)
 | |
|       await setKeysOfServer(servers[0], servers[2], keys.publicKey, keys.privateKey)
 | |
| 
 | |
|       const body = getAnnounceWithoutContext(servers[1])
 | |
|       body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
 | |
| 
 | |
|       const signer: any = { privateKey: keys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
 | |
|       const signedBody = await buildSignedActivity(signer, body)
 | |
| 
 | |
|       signedBody.actor = 'http://localhost:' + servers[2].port + '/account/peertube'
 | |
| 
 | |
|       const headers = buildGlobalHeaders(signedBody)
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
| 
 | |
|     it('Should succeed with a valid signature', async function () {
 | |
|       this.timeout(10000)
 | |
| 
 | |
|       const body = getAnnounceWithoutContext(servers[1])
 | |
|       body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
 | |
| 
 | |
|       const signer: any = { privateKey: keys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
 | |
|       const signedBody = await buildSignedActivity(signer, body)
 | |
| 
 | |
|       const headers = buildGlobalHeaders(signedBody)
 | |
| 
 | |
|       const { statusCode } = await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
 | |
|       expect(statusCode).to.equal(HttpStatusCode.NO_CONTENT_204)
 | |
|     })
 | |
| 
 | |
|     it('Should refresh the actor keys', async function () {
 | |
|       this.timeout(20000)
 | |
| 
 | |
|       // Wait refresh invalidation
 | |
|       await wait(10000)
 | |
| 
 | |
|       // Update keys of server 3 to invalid keys
 | |
|       // Server 1 should refresh the actor and fail
 | |
|       await setKeysOfServer(servers[2], servers[2], invalidKeys.publicKey, invalidKeys.privateKey)
 | |
| 
 | |
|       const body = getAnnounceWithoutContext(servers[1])
 | |
|       body.actor = 'http://localhost:' + servers[2].port + '/accounts/peertube'
 | |
| 
 | |
|       const signer: any = { privateKey: keys.privateKey, url: 'http://localhost:' + servers[2].port + '/accounts/peertube' }
 | |
|       const signedBody = await buildSignedActivity(signer, body)
 | |
| 
 | |
|       const headers = buildGlobalHeaders(signedBody)
 | |
| 
 | |
|       try {
 | |
|         await makePOSTAPRequest(url, signedBody, baseHttpSignature(), headers)
 | |
|         expect(true, 'Did not throw').to.be.false
 | |
|       } catch (err) {
 | |
|         expect(err.statusCode).to.equal(HttpStatusCode.FORBIDDEN_403)
 | |
|       }
 | |
|     })
 | |
|   })
 | |
| 
 | |
|   after(async function () {
 | |
|     this.timeout(10000)
 | |
| 
 | |
|     await cleanupTests(servers)
 | |
| 
 | |
|     await closeAllSequelize(servers)
 | |
|   })
 | |
| })
 |