93 lines
2.7 KiB
Python
93 lines
2.7 KiB
Python
import datetime
|
||
import logging
|
||
import pytz
|
||
|
||
from django import forms
|
||
from django.utils import timezone
|
||
from django.utils.http import parse_http_date
|
||
|
||
import requests
|
||
import requests_http_signature
|
||
|
||
from . import exceptions, utils
|
||
|
||
logger = logging.getLogger(__name__)
|
||
|
||
# the request Date should be between now - 30s and now + 30s
|
||
DATE_HEADER_VALID_FOR = 30
|
||
|
||
|
||
def verify_date(raw_date):
|
||
if not raw_date:
|
||
raise forms.ValidationError("Missing date header")
|
||
|
||
try:
|
||
ts = parse_http_date(raw_date)
|
||
except ValueError as e:
|
||
raise forms.ValidationError(str(e))
|
||
dt = datetime.datetime.utcfromtimestamp(ts)
|
||
dt = dt.replace(tzinfo=pytz.utc)
|
||
delta = datetime.timedelta(seconds=DATE_HEADER_VALID_FOR)
|
||
now = timezone.now()
|
||
if dt < now - delta or dt > now + delta:
|
||
raise forms.ValidationError(
|
||
"Request Date is too far in the future or in the past"
|
||
)
|
||
|
||
return dt
|
||
|
||
|
||
def verify(request, public_key):
|
||
verify_date(request.headers.get("Date"))
|
||
|
||
return requests_http_signature.HTTPSignatureAuth.verify(
|
||
request, key_resolver=lambda **kwargs: public_key, use_auth_header=False
|
||
)
|
||
|
||
|
||
def verify_django(django_request, public_key):
|
||
"""
|
||
Given a django WSGI request, create an underlying requests.PreparedRequest
|
||
instance we can verify
|
||
"""
|
||
headers = utils.clean_wsgi_headers(django_request.META)
|
||
for h, v in list(headers.items()):
|
||
# we include lower-cased version of the headers for compatibility
|
||
# with requests_http_signature
|
||
headers[h.lower()] = v
|
||
try:
|
||
signature = headers["Signature"]
|
||
except KeyError:
|
||
raise exceptions.MissingSignature
|
||
url = "http://noop{}".format(django_request.path)
|
||
query = django_request.META["QUERY_STRING"]
|
||
if query:
|
||
url += "?{}".format(query)
|
||
signature_headers = signature.split('headers="')[1].split('",')[0]
|
||
expected = signature_headers.split(" ")
|
||
logger.debug("Signature expected headers: %s", expected)
|
||
for header in expected:
|
||
try:
|
||
headers[header]
|
||
except KeyError:
|
||
logger.debug("Missing header: %s", header)
|
||
request = requests.Request(
|
||
method=django_request.method, url=url, data=django_request.body, headers=headers
|
||
)
|
||
for h in request.headers.keys():
|
||
v = request.headers[h]
|
||
if v:
|
||
request.headers[h] = str(v)
|
||
request.prepare()
|
||
return verify(request, public_key)
|
||
|
||
|
||
def get_auth(private_key, private_key_id):
|
||
return requests_http_signature.HTTPSignatureAuth(
|
||
use_auth_header=False,
|
||
headers=["(request-target)", "user-agent", "host", "date", "content-type"],
|
||
algorithm="rsa-sha256",
|
||
key=private_key.encode("utf-8"),
|
||
key_id=private_key_id,
|
||
)
|