1 use crate::apub::ActorType;
2 use activitystreams::ext::Extension;
3 use actix_web::HttpRequest;
5 use http::request::Builder;
6 use http_signature_normalization::Config;
12 sign::{Signer, Verifier},
14 use serde::{Deserialize, Serialize};
15 use std::collections::BTreeMap;
18 static ref HTTP_SIG_CONFIG: Config = Config::new();
22 pub private_key: String,
23 pub public_key: String,
26 /// Generate the asymmetric keypair for ActivityPub HTTP signatures.
27 pub fn generate_actor_keypair() -> Result<Keypair, Error> {
28 let rsa = Rsa::generate(2048)?;
29 let pkey = PKey::from_rsa(rsa)?;
30 let public_key = pkey.public_key_to_pem()?;
31 let private_key = pkey.private_key_to_pem_pkcs8()?;
33 private_key: String::from_utf8(private_key)?,
34 public_key: String::from_utf8(public_key)?,
38 /// Signs request headers with the given keypair.
39 pub fn sign(request: &Builder, actor: &dyn ActorType) -> Result<String, Error> {
40 let signing_key_id = format!("{}#main-key", actor.actor_id());
46 .map(|h| -> Result<(String, String), Error> {
47 Ok((h.0.as_str().to_owned(), h.1.to_str()?.to_owned()))
49 .collect::<Result<BTreeMap<String, String>, Error>>()?;
51 let signature_header_value = HTTP_SIG_CONFIG
53 request.method_ref().unwrap().as_str(),
62 .sign(signing_key_id, |signing_string| {
63 let private_key = PKey::private_key_from_pem(actor.private_key().as_bytes())?;
64 let mut signer = Signer::new(MessageDigest::sha256(), &private_key).unwrap();
65 signer.update(signing_string.as_bytes()).unwrap();
66 Ok(base64::encode(signer.sign_to_vec()?)) as Result<_, Error>
70 Ok(signature_header_value)
73 pub fn verify(request: &HttpRequest, actor: &dyn ActorType) -> Result<(), Error> {
77 .map(|h| -> Result<(String, String), Error> {
78 Ok((h.0.as_str().to_owned(), h.1.to_str()?.to_owned()))
80 .collect::<Result<BTreeMap<String, String>, Error>>()?;
82 let verified = HTTP_SIG_CONFIG
84 request.method().as_str(),
85 request.uri().path_and_query().unwrap().as_str(),
88 .verify(|signature, signing_string| -> Result<bool, Error> {
90 "Verifying with key {}, message {}",
94 let public_key = PKey::public_key_from_pem(actor.public_key().as_bytes())?;
95 let mut verifier = Verifier::new(MessageDigest::sha256(), &public_key).unwrap();
96 verifier.update(&signing_string.as_bytes()).unwrap();
97 Ok(verifier.verify(&base64::decode(signature)?)?)
101 debug!("verified signature for {}", &request.uri());
105 "Invalid signature on request: {}",
111 // The following is taken from here:
112 // https://docs.rs/activitystreams/0.5.0-alpha.17/activitystreams/ext/index.html
114 #[derive(Clone, Debug, Default, Deserialize, Serialize)]
115 #[serde(rename_all = "camelCase")]
116 pub struct PublicKey {
119 pub public_key_pem: String,
122 #[derive(Clone, Debug, Default, Deserialize, Serialize)]
123 #[serde(rename_all = "camelCase")]
124 pub struct PublicKeyExtension {
125 pub public_key: PublicKey,
129 pub fn to_ext(&self) -> PublicKeyExtension {
131 public_key: self.to_owned(),
136 impl<T> Extension<T> for PublicKeyExtension where T: activitystreams::Actor {}