#!/usr/bin/env python3 """Ld+json signature.""" import base64 import hashlib from datetime import datetime import pyld # type: ignore from Crypto.Hash import SHA256 from Crypto.Signature import PKCS1_v1_5 from Crypto.PublicKey import RSA from loguru import logger from pyld import jsonld # type: ignore from app import activitypub as ap from app.database import AsyncSession from app.actor import get_public_key requests_loader = pyld.documentloader.requests.requests_document_loader() # type: ignore def _loader(url, options): if options is None: options = {} # See https://github.com/digitalbazaar/pyld/issues/133 options["headers"]["Accept"] = "application/ld+json" if url == "https://w3id.org/identity/v1": url = ( "https://raw.githubusercontent.com/web-payments/web-payments.org" "/master/contexts/identity-v1.jsonld" ) return requests_loader(url, options) pyld.jsonld.set_document_loader(_loader) def _options_hash(doc: ap.RawObject) -> str: doc = dict(doc["signature"]) for k in ["type", "id", "signatureValue"]: if k in doc: del doc[k] doc["@context"] = "https://w3id.org/security/v1" normalized = jsonld.normalize( doc, {"algorithm": "URDNA2015", "format": "application/nquads"} ) doc_hash = hashlib.new("sha256") doc_hash.update(normalized.encode("utf-8")) # type: ignore return doc_hash.hexdigest() def _doc_hash(doc: ap.RawObject) -> str: doc = dict(doc) if "signature" in doc: del doc["signature"] normalized = jsonld.normalize( doc, {"algorithm": "URDNA2015", "format": "application/nquads"} ) doc_hash = hashlib.new("sha256") doc_hash.update(normalized.encode("utf-8")) # type: ignore return doc_hash.hexdigest() async def verify_signature( db_session: AsyncSession, doc: ap.RawObject, ) -> bool: """Verify doc ld signature.""" if "signature" not in doc: logger.warning("The object does contain a signature") return False key_id = doc["signature"]["creator"] key = await get_public_key(db_session, key_id) to_be_signed = _options_hash(doc) + _doc_hash(doc) signature = doc["signature"]["signatureValue"] pubkey = RSA.importKey(key) signer = PKCS1_v1_5.new(pubkey) digest = SHA256.new() digest.update(to_be_signed.encode("utf-8")) return signer.verify(digest, base64.b64decode(signature)) # pylint: disable=not-callable def generate_signature(doc: ap.RawObject, key) -> None: """Generate doc ld signature.""" options = { "type": "RsaSignature2017", "creator": doc["actor"] + "#main-key", "created": datetime.utcnow().replace(microsecond=0).isoformat() + "Z", } doc["signature"] = options to_be_signed = _options_hash(doc) + _doc_hash(doc) signer = PKCS1_v1_5.new(key) digest = SHA256.new() digest.update(to_be_signed.encode("utf-8")) sig = base64.b64encode(signer.sign(digest)) # type: ignore options["signatureValue"] = sig.decode("utf-8")