mirror of https://github.com/mastodon/mastodon
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			78 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Ruby
		
	
			
		
		
	
	
			78 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Ruby
		
	
# frozen_string_literal: true
 | 
						|
 | 
						|
class Fasp::Request
 | 
						|
  def initialize(provider)
 | 
						|
    @provider = provider
 | 
						|
  end
 | 
						|
 | 
						|
  def get(path)
 | 
						|
    perform_request(:get, path)
 | 
						|
  end
 | 
						|
 | 
						|
  def post(path, body: nil)
 | 
						|
    perform_request(:post, path, body:)
 | 
						|
  end
 | 
						|
 | 
						|
  def delete(path, body: nil)
 | 
						|
    perform_request(:delete, path, body:)
 | 
						|
  end
 | 
						|
 | 
						|
  private
 | 
						|
 | 
						|
  def perform_request(verb, path, body: nil)
 | 
						|
    url = @provider.url(path)
 | 
						|
    body = body.present? ? body.to_json : ''
 | 
						|
    headers = request_headers(verb, url, body)
 | 
						|
    response = HTTP.headers(headers).send(verb, url, body:)
 | 
						|
    validate!(response)
 | 
						|
 | 
						|
    response.parse if response.body.present?
 | 
						|
  end
 | 
						|
 | 
						|
  def request_headers(verb, url, body = '')
 | 
						|
    result = {
 | 
						|
      'accept' => 'application/json',
 | 
						|
      'content-type' => 'application/json',
 | 
						|
      'content-digest' => content_digest(body),
 | 
						|
    }
 | 
						|
    result.merge(signature_headers(verb, url, result))
 | 
						|
  end
 | 
						|
 | 
						|
  def content_digest(body)
 | 
						|
    "sha-256=:#{OpenSSL::Digest.base64digest('sha256', body || '')}:"
 | 
						|
  end
 | 
						|
 | 
						|
  def signature_headers(verb, url, headers)
 | 
						|
    linzer_request = Linzer.new_request(verb, url, {}, headers)
 | 
						|
    message = Linzer::Message.new(linzer_request)
 | 
						|
    key = Linzer.new_ed25519_key(@provider.server_private_key_pem, @provider.remote_identifier)
 | 
						|
    signature = Linzer.sign(key, message, %w(@method @target-uri content-digest))
 | 
						|
    Linzer::Signer.send(:populate_parameters, key, {})
 | 
						|
 | 
						|
    signature.to_h
 | 
						|
  end
 | 
						|
 | 
						|
  def validate!(response)
 | 
						|
    content_digest_header = response.headers['content-digest']
 | 
						|
    raise Mastodon::SignatureVerificationError, 'content-digest missing' if content_digest_header.blank?
 | 
						|
    raise Mastodon::SignatureVerificationError, 'content-digest does not match' if content_digest_header != content_digest(response.body)
 | 
						|
 | 
						|
    signature_input = response.headers['signature-input']&.encode('UTF-8')
 | 
						|
    raise Mastodon::SignatureVerificationError, 'signature-input is missing' if signature_input.blank?
 | 
						|
 | 
						|
    linzer_response = Linzer.new_response(
 | 
						|
      response.body,
 | 
						|
      response.status,
 | 
						|
      {
 | 
						|
        'content-digest' => content_digest_header,
 | 
						|
        'signature-input' => signature_input,
 | 
						|
        'signature' => response.headers['signature'],
 | 
						|
      }
 | 
						|
    )
 | 
						|
    message = Linzer::Message.new(linzer_response)
 | 
						|
    key = Linzer.new_ed25519_public_key(@provider.provider_public_key_pem)
 | 
						|
    signature = Linzer::Signature.build(message.headers)
 | 
						|
    Linzer.verify(key, message, signature)
 | 
						|
  end
 | 
						|
end
 |