summaryrefslogtreecommitdiff
path: root/internal/api/security
diff options
context:
space:
mode:
Diffstat (limited to 'internal/api/security')
-rw-r--r--internal/api/security/security.go6
-rw-r--r--internal/api/security/signaturecheck.go69
2 files changed, 74 insertions, 1 deletions
diff --git a/internal/api/security/security.go b/internal/api/security/security.go
index 7298bc7cb..d8f6b0fe3 100644
--- a/internal/api/security/security.go
+++ b/internal/api/security/security.go
@@ -24,6 +24,7 @@ import (
"github.com/sirupsen/logrus"
"github.com/superseriousbusiness/gotosocial/internal/api"
"github.com/superseriousbusiness/gotosocial/internal/config"
+ "github.com/superseriousbusiness/gotosocial/internal/db"
"github.com/superseriousbusiness/gotosocial/internal/router"
)
@@ -33,18 +34,21 @@ const robotsPath = "/robots.txt"
type Module struct {
config *config.Config
log *logrus.Logger
+ db db.DB
}
// New returns a new security module
-func New(config *config.Config, log *logrus.Logger) api.ClientModule {
+func New(config *config.Config, db db.DB, log *logrus.Logger) api.ClientModule {
return &Module{
config: config,
log: log,
+ db: db,
}
}
// Route attaches security middleware to the given router
func (m *Module) Route(s router.Router) error {
+ s.AttachMiddleware(m.SignatureCheck)
s.AttachMiddleware(m.FlocBlock)
s.AttachMiddleware(m.ExtraHeaders)
s.AttachMiddleware(m.UserAgentBlock)
diff --git a/internal/api/security/signaturecheck.go b/internal/api/security/signaturecheck.go
new file mode 100644
index 000000000..b852c92ab
--- /dev/null
+++ b/internal/api/security/signaturecheck.go
@@ -0,0 +1,69 @@
+package security
+
+import (
+ "net/http"
+ "net/url"
+
+ "github.com/gin-gonic/gin"
+ "github.com/go-fed/httpsig"
+ "github.com/superseriousbusiness/gotosocial/internal/db"
+ "github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
+ "github.com/superseriousbusiness/gotosocial/internal/util"
+)
+
+// SignatureCheck checks whether an incoming http request has been signed. If so, it will check if the domain
+// that signed the request is permitted to access the server. If it is permitted, the handler will set the key
+// verifier in the gin context for use down the line.
+func (m *Module) SignatureCheck(c *gin.Context) {
+ l := m.log.WithField("func", "DomainBlockChecker")
+
+ // set this extra field for signature validation
+ c.Request.Header.Set("host", m.config.Host)
+
+ // create the verifier from the request
+ // if the request is signed, it will have a signature header
+ verifier, err := httpsig.NewVerifier(c.Request)
+ if err == nil {
+ // the request was signed!
+
+ // The key ID should be given in the signature so that we know where to fetch it from the remote server.
+ // This will be something like https://example.org/users/whatever_requesting_user#main-key
+ requestingPublicKeyID, err := url.Parse(verifier.KeyId())
+ if err == nil && requestingPublicKeyID != nil {
+ // we managed to parse the url!
+
+ // if the domain is blocked we want to bail as early as possible
+ blockedDomain, err := m.blockedDomain(requestingPublicKeyID.Host)
+ if err != nil {
+ l.Errorf("could not tell if domain %s was blocked or not: %s", requestingPublicKeyID.Host, err)
+ c.AbortWithStatus(http.StatusInternalServerError)
+ return
+ }
+ if blockedDomain {
+ l.Infof("domain %s is blocked", requestingPublicKeyID.Host)
+ c.AbortWithStatus(http.StatusForbidden)
+ return
+ }
+
+ // set the verifier on the context here to save some work further down the line
+ c.Set(string(util.APRequestingPublicKeyVerifier), verifier)
+ }
+ }
+}
+
+func (m *Module) blockedDomain(host string) (bool, error) {
+ b := &gtsmodel.DomainBlock{}
+ err := m.db.GetWhere([]db.Where{{Key: "domain", Value: host, CaseInsensitive: true}}, b)
+ if err == nil {
+ // block exists
+ return true, nil
+ }
+
+ if _, ok := err.(db.ErrNoEntries); ok {
+ // there are no entries so there's no block
+ return false, nil
+ }
+
+ // there's an actual error
+ return false, err
+}