172 lines
4.1 KiB
TypeScript
172 lines
4.1 KiB
TypeScript
|
import crypto = require('crypto')
|
||
|
import bcrypt = require('bcrypt')
|
||
|
import fs = require('fs')
|
||
|
import openssl = require('openssl-wrapper')
|
||
|
import { join } from 'path'
|
||
|
|
||
|
import {
|
||
|
SIGNATURE_ALGORITHM,
|
||
|
SIGNATURE_ENCODING,
|
||
|
PRIVATE_CERT_NAME,
|
||
|
CONFIG,
|
||
|
BCRYPT_SALT_SIZE,
|
||
|
PUBLIC_CERT_NAME
|
||
|
} from '../initializers'
|
||
|
import { logger } from './logger'
|
||
|
|
||
|
function checkSignature (publicKey, data, hexSignature) {
|
||
|
const verify = crypto.createVerify(SIGNATURE_ALGORITHM)
|
||
|
|
||
|
let dataString
|
||
|
if (typeof data === 'string') {
|
||
|
dataString = data
|
||
|
} else {
|
||
|
try {
|
||
|
dataString = JSON.stringify(data)
|
||
|
} catch (err) {
|
||
|
logger.error('Cannot check signature.', { error: err })
|
||
|
return false
|
||
|
}
|
||
|
}
|
||
|
|
||
|
verify.update(dataString, 'utf8')
|
||
|
|
||
|
const isValid = verify.verify(publicKey, hexSignature, SIGNATURE_ENCODING)
|
||
|
return isValid
|
||
|
}
|
||
|
|
||
|
function sign (data) {
|
||
|
const sign = crypto.createSign(SIGNATURE_ALGORITHM)
|
||
|
|
||
|
let dataString
|
||
|
if (typeof data === 'string') {
|
||
|
dataString = data
|
||
|
} else {
|
||
|
try {
|
||
|
dataString = JSON.stringify(data)
|
||
|
} catch (err) {
|
||
|
logger.error('Cannot sign data.', { error: err })
|
||
|
return ''
|
||
|
}
|
||
|
}
|
||
|
|
||
|
sign.update(dataString, 'utf8')
|
||
|
|
||
|
// TODO: make async
|
||
|
const certPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
|
||
|
const myKey = fs.readFileSync(certPath)
|
||
|
const signature = sign.sign(myKey.toString(), SIGNATURE_ENCODING)
|
||
|
|
||
|
return signature
|
||
|
}
|
||
|
|
||
|
function comparePassword (plainPassword, hashPassword, callback) {
|
||
|
bcrypt.compare(plainPassword, hashPassword, function (err, isPasswordMatch) {
|
||
|
if (err) return callback(err)
|
||
|
|
||
|
return callback(null, isPasswordMatch)
|
||
|
})
|
||
|
}
|
||
|
|
||
|
function createCertsIfNotExist (callback) {
|
||
|
certsExist(function (err, exist) {
|
||
|
if (err) return callback(err)
|
||
|
|
||
|
if (exist === true) {
|
||
|
return callback(null)
|
||
|
}
|
||
|
|
||
|
createCerts(function (err) {
|
||
|
return callback(err)
|
||
|
})
|
||
|
})
|
||
|
}
|
||
|
|
||
|
function cryptPassword (password, callback) {
|
||
|
bcrypt.genSalt(BCRYPT_SALT_SIZE, function (err, salt) {
|
||
|
if (err) return callback(err)
|
||
|
|
||
|
bcrypt.hash(password, salt, function (err, hash) {
|
||
|
return callback(err, hash)
|
||
|
})
|
||
|
})
|
||
|
}
|
||
|
|
||
|
function getMyPrivateCert (callback) {
|
||
|
const certPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
|
||
|
fs.readFile(certPath, 'utf8', callback)
|
||
|
}
|
||
|
|
||
|
function getMyPublicCert (callback) {
|
||
|
const certPath = join(CONFIG.STORAGE.CERT_DIR, PUBLIC_CERT_NAME)
|
||
|
fs.readFile(certPath, 'utf8', callback)
|
||
|
}
|
||
|
|
||
|
// ---------------------------------------------------------------------------
|
||
|
|
||
|
export {
|
||
|
checkSignature,
|
||
|
comparePassword,
|
||
|
createCertsIfNotExist,
|
||
|
cryptPassword,
|
||
|
getMyPrivateCert,
|
||
|
getMyPublicCert,
|
||
|
sign
|
||
|
}
|
||
|
|
||
|
// ---------------------------------------------------------------------------
|
||
|
|
||
|
function certsExist (callback) {
|
||
|
const certPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
|
||
|
fs.access(certPath, function (err) {
|
||
|
// If there is an error the certificates do not exist
|
||
|
const exists = !err
|
||
|
return callback(null, exists)
|
||
|
})
|
||
|
}
|
||
|
|
||
|
function createCerts (callback) {
|
||
|
certsExist(function (err, exist) {
|
||
|
if (err) return callback(err)
|
||
|
|
||
|
if (exist === true) {
|
||
|
const string = 'Certs already exist.'
|
||
|
logger.warning(string)
|
||
|
return callback(new Error(string))
|
||
|
}
|
||
|
|
||
|
logger.info('Generating a RSA key...')
|
||
|
|
||
|
const privateCertPath = join(CONFIG.STORAGE.CERT_DIR, PRIVATE_CERT_NAME)
|
||
|
const genRsaOptions = {
|
||
|
'out': privateCertPath,
|
||
|
'2048': false
|
||
|
}
|
||
|
openssl.exec('genrsa', genRsaOptions, function (err) {
|
||
|
if (err) {
|
||
|
logger.error('Cannot create private key on this pod.')
|
||
|
return callback(err)
|
||
|
}
|
||
|
|
||
|
logger.info('RSA key generated.')
|
||
|
logger.info('Managing public key...')
|
||
|
|
||
|
const publicCertPath = join(CONFIG.STORAGE.CERT_DIR, 'peertube.pub')
|
||
|
const rsaOptions = {
|
||
|
'in': privateCertPath,
|
||
|
'pubout': true,
|
||
|
'out': publicCertPath
|
||
|
}
|
||
|
openssl.exec('rsa', rsaOptions, function (err) {
|
||
|
if (err) {
|
||
|
logger.error('Cannot create public key on this pod.')
|
||
|
return callback(err)
|
||
|
}
|
||
|
|
||
|
logger.info('Public key managed.')
|
||
|
return callback(null)
|
||
|
})
|
||
|
})
|
||
|
})
|
||
|
}
|