COSCUP-ap-demo/demo/httpsig.py

165 lines
4.6 KiB
Python
Raw Normal View History

2023-06-09 04:52:07 +02:00
#!/usr/bin/env python3
"""
Verify and build HTTP signatures
"""
import base64
2023-07-27 09:16:34 +02:00
import httpx
import hashlib
from datetime import datetime
from app import logger
from demo.config import ID
2023-06-09 04:52:07 +02:00
2023-06-09 05:07:02 +02:00
from dataclasses import dataclass
2023-06-09 04:52:07 +02:00
from Crypto.Hash import SHA256
from Crypto.Signature import PKCS1_v1_5
from Crypto.PublicKey import RSA
2023-06-19 08:34:03 +02:00
from werkzeug.datastructures import Headers
2023-07-27 09:16:34 +02:00
from httpx import Headers as Httpx_headers
2023-06-09 05:07:02 +02:00
@dataclass
class SignedData:
2023-06-09 05:09:28 +02:00
"""
Signature data
"""
2023-06-09 05:07:02 +02:00
method: str
path: str
signed_list: list
body_digest: str | None
2023-07-27 09:16:34 +02:00
headers: Headers | Httpx_headers
2023-06-09 04:52:07 +02:00
class HttpSignature:
"""
calculation and verification of HTTP signatures
"""
@classmethod
def calculation_digest(
cls,
body: bytes,
algorithm: str ="sha-256"
2023-06-09 04:52:07 +02:00
) -> str:
"""
Calculates the digest header value for a given HTTP body
"""
if "sha-256" == algorithm:
body_digest = SHA256.new()
body_digest.update(body)
return "SHA-256=" + \
base64.b64encode(body_digest.digest()
).decode("utf-8")
raise ValueError(f"No support algorithm {algorithm}")
@classmethod
def verify_signature(
cls,
signature_string: str,
signature: bytes,
2023-06-09 04:52:07 +02:00
pubkey,
) -> bool:
"""
Verify signatur that returns bool
"""
pubkey = RSA.importKey(pubkey)
signer = PKCS1_v1_5.new(pubkey)
digest = SHA256.new()
digest.update(signature_string.encode("utf-8"))
return signer.verify(digest, signature) # pylint: disable=E1102
2023-06-09 04:52:07 +02:00
@classmethod
def parse_signature(
cls,
signature: str
2023-06-09 04:52:07 +02:00
) -> dict:
"""
Parse signature string in headers
"""
detail = {}
for item in signature.split(','):
name, value = item.split('=', 1)
value = value.strip('"')
detail[name.lower()] = value
signature_details = {
"headers": detail["headers"].split(),
"signature": base64.b64decode(detail["signature"]),
"algorithm": detail["algorithm"],
"keyid": detail["keyid"],
}
return signature_details
@classmethod
def build_signature_string(
cls,
2023-06-09 05:07:02 +02:00
signed_data: SignedData,
2023-06-09 04:52:07 +02:00
) -> str:
"""
Build signature string
"""
signed_string = []
2023-06-09 05:07:02 +02:00
for signed_str in signed_data.signed_list:
if signed_str == "(request-target)":
2023-06-09 04:52:07 +02:00
signed_string.append("(request-target): "
2023-06-09 05:07:02 +02:00
+ signed_data.method.lower() + ' ' + signed_data.path)
elif signed_str == "digest" and signed_data.body_digest:
signed_string.append("digest: " + signed_data.body_digest)
2023-06-09 04:52:07 +02:00
else:
2023-06-09 05:07:02 +02:00
signed_string.append(signed_str + ": "
+ signed_data.headers[signed_str])
2023-06-09 04:52:07 +02:00
return "\n".join(signed_string)
2023-07-27 09:16:34 +02:00
class HTTPXSigAuth(httpx.Auth):
def __init__(self, key) -> None:
self.key = key
def auth_flow(
self, r: httpx.Request
):
bodydigest = None
if r.content:
bh = hashlib.new("sha256")
bh.update(r.content)
bodydigest = "SHA-256=" + base64.b64encode(bh.digest()).decode("utf-8")
date = datetime.utcnow().strftime("%a, %d %b %Y %H:%M:%S GMT")
r.headers["Date"] = date
sigheaders = {}
if bodydigest:
r.headers["digest"] = bodydigest
sigheaders = "(request-target) user-agent host date digest content-type"
else:
sigheaders = "(request-target) user-agent host date accept"
logger.warning(r.headers)
sigdate = SignedData(
method = r.method,
path = r.url.path,
signed_list = sigheaders.split(),
body_digest = bodydigest,
headers = r.headers,
)
to_be_signed = HttpSignature.build_signature_string(
sigdate
)
if not self.key:
raise ValueError("Should never happen")
signer = PKCS1_v1_5.new(self.key)
digest = SHA256.new()
digest.update(to_be_signed.encode("utf-8"))
sig = base64.b64encode(signer.sign(digest))
logger.debug(f"{sig=}")
key_id = f"{ID}#main-key"
sig_value = f'keyId="{key_id}",algorithm="rsa-sha256",headers="{sigheaders}",signature="{sig.decode()}"' # noqa: E501
logger.debug(f"signed request {sig_value=}")
r.headers["signature"] = sig_value
yield r