http-signature-normalization/http-signature-normalization-actix/src/digest/middleware.rs

259 lines
7.1 KiB
Rust
Raw Normal View History

2019-09-21 16:26:11 +00:00
//! Types for setting up Digest middleware verification
2020-03-20 02:36:10 +00:00
use super::{DigestPart, DigestVerify};
2019-09-13 01:12:35 +00:00
use actix_web::{
2021-06-24 16:56:36 +00:00
dev::{MessageBody, Payload, Service, ServiceRequest, ServiceResponse, Transform},
2019-09-13 01:12:35 +00:00
error::PayloadError,
http::{header::HeaderValue, StatusCode},
2021-06-24 16:56:36 +00:00
web, FromRequest, HttpMessage, HttpRequest, HttpResponse, ResponseError,
2019-09-13 01:12:35 +00:00
};
2021-09-18 00:34:16 +00:00
use futures_util::{
future::LocalBoxFuture,
stream::{Stream, StreamExt},
};
use std::{
2021-09-18 00:34:16 +00:00
future::{ready, Ready},
pin::Pin,
rc::Rc,
task::{Context, Poll},
2019-09-13 01:12:35 +00:00
};
use tracing::{debug, Instrument, Span};
2021-09-18 00:34:16 +00:00
use tracing_error::SpanTrace;
2019-09-13 01:12:35 +00:00
#[derive(Copy, Clone, Debug)]
2019-09-21 16:26:11 +00:00
/// A type implementing FromRequest that can be used in route handler to guard for verified
/// digests
///
/// This is only required when the [`VerifyDigest`] middleware is set to optional
pub struct DigestVerified;
2019-09-21 16:26:11 +00:00
2020-07-06 15:16:41 +00:00
#[derive(Clone, Debug)]
2019-09-21 16:26:11 +00:00
/// The VerifyDigest middleware
///
/// ```rust,ignore
/// let middleware = VerifyDigest::new(MyVerify::new())
/// .optional();
///
/// HttpServer::new(move || {
/// App::new()
/// .wrap(middleware.clone())
/// .route("/protected", web::post().to(|_: DigestVerified| "Verified Digest Header"))
/// .route("/unprotected", web::post().to(|| "No verification required"))
/// })
/// ```
2019-09-13 01:12:35 +00:00
pub struct VerifyDigest<T>(bool, T);
2019-09-21 16:26:11 +00:00
#[doc(hidden)]
pub struct VerifyMiddleware<T, S>(Rc<S>, bool, T);
2019-09-21 16:26:11 +00:00
#[derive(Debug, thiserror::Error)]
#[error("Error verifying digest")]
2019-09-21 16:26:11 +00:00
#[doc(hidden)]
2021-09-18 00:34:16 +00:00
pub struct VerifyError {
context: SpanTrace,
kind: VerifyErrorKind,
}
impl VerifyError {
fn new(span: &Span, kind: VerifyErrorKind) -> Self {
span.in_scope(|| VerifyError {
context: SpanTrace::capture(),
kind,
})
}
}
#[derive(Debug, thiserror::Error)]
enum VerifyErrorKind {
#[error("Missing request extension")]
Extension,
#[error("Digest header missing")]
MissingDigest,
#[error("Digest header is empty")]
Empty,
#[error("Failed to verify digest")]
Verify,
}
2019-09-13 01:12:35 +00:00
impl<T> VerifyDigest<T>
where
T: DigestVerify + Clone,
{
2019-09-21 16:26:11 +00:00
/// Produce a new VerifyDigest with a user-provided [`Digestverify`] type
2019-09-13 01:12:35 +00:00
pub fn new(verify_digest: T) -> Self {
VerifyDigest(true, verify_digest)
}
2019-09-21 16:26:11 +00:00
/// Mark verifying the Digest as optional
///
/// If a digest is present in the request, it will be verified, but it is not required to be
/// present
2019-09-13 01:12:35 +00:00
pub fn optional(self) -> Self {
VerifyDigest(false, self.1)
}
}
impl FromRequest for DigestVerified {
type Error = VerifyError;
type Future = Ready<Result<Self, Self::Error>>;
fn from_request(req: &HttpRequest, _: &mut Payload) -> Self::Future {
2021-09-18 00:34:16 +00:00
let res = req
.extensions()
.get::<Self>()
.copied()
.ok_or_else(|| VerifyError::new(&Span::current(), VerifyErrorKind::Extension));
2020-03-20 02:36:10 +00:00
if res.is_err() {
debug!("Failed to fetch DigestVerified from request");
}
ready(res)
}
}
2021-02-04 01:02:19 +00:00
impl<T, S, B> Transform<S, ServiceRequest> for VerifyDigest<T>
2019-09-13 01:12:35 +00:00
where
T: DigestVerify + Clone + Send + 'static,
2021-02-04 01:02:19 +00:00
S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = actix_web::Error> + 'static,
2019-09-13 01:12:35 +00:00
S::Error: 'static,
2020-03-25 16:00:37 +00:00
B: MessageBody + 'static,
2019-09-13 01:12:35 +00:00
{
2020-03-25 16:00:37 +00:00
type Response = ServiceResponse<B>;
2019-09-13 01:12:35 +00:00
type Error = actix_web::Error;
type Transform = VerifyMiddleware<T, S>;
type InitError = ();
type Future = Ready<Result<Self::Transform, Self::InitError>>;
2019-09-13 01:12:35 +00:00
fn new_transform(&self, service: S) -> Self::Future {
ready(Ok(VerifyMiddleware(
Rc::new(service),
self.0,
self.1.clone(),
)))
2019-09-13 01:12:35 +00:00
}
}
2021-02-04 01:02:19 +00:00
impl<T, S, B> Service<ServiceRequest> for VerifyMiddleware<T, S>
2019-09-13 01:12:35 +00:00
where
T: DigestVerify + Clone + Send + 'static,
2021-02-04 01:02:19 +00:00
S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = actix_web::Error> + 'static,
2019-09-13 01:12:35 +00:00
S::Error: 'static,
2020-03-25 16:00:37 +00:00
B: MessageBody + 'static,
2019-09-13 01:12:35 +00:00
{
2020-03-25 16:00:37 +00:00
type Response = ServiceResponse<B>;
2019-09-13 01:12:35 +00:00
type Error = actix_web::Error;
2021-09-18 00:34:16 +00:00
type Future = LocalBoxFuture<'static, Result<Self::Response, Self::Error>>;
2019-09-13 01:12:35 +00:00
2021-02-10 21:45:51 +00:00
fn poll_ready(&self, cx: &mut Context) -> Poll<Result<(), Self::Error>> {
2020-03-25 16:00:37 +00:00
self.0.poll_ready(cx)
2019-09-13 01:12:35 +00:00
}
2021-02-10 21:45:51 +00:00
fn call(&self, mut req: ServiceRequest) -> Self::Future {
2021-09-18 00:34:16 +00:00
let span = tracing::info_span!(
"Verify digest",
digest.required = tracing::field::display(&self.1),
);
let verifier = self.2.clone();
let svc = Rc::clone(&self.0);
let required = self.1;
Box::pin(async move {
if let Some(digest) = req.headers().get("Digest") {
let vec = match parse_digest(digest) {
Some(vec) => vec,
None => {
return Err(VerifyError::new(&span, VerifyErrorKind::Empty).into());
}
};
let payload = req.take_payload();
let payload = verify_payload(vec, verifier, payload)
.instrument(span)
.await?;
req.set_payload(payload);
req.extensions_mut().insert(DigestVerified);
svc.call(req).await
} else if required {
Err(VerifyError::new(&span, VerifyErrorKind::MissingDigest).into())
} else {
svc.call(req).await
}
})
2019-09-13 01:12:35 +00:00
}
}
#[tracing::instrument(name = "Verify Payload", skip(verify_digest, payload))]
2020-03-25 16:00:37 +00:00
async fn verify_payload<T>(
vec: Vec<DigestPart>,
mut verify_digest: T,
mut payload: Payload,
) -> Result<Payload, actix_web::Error>
2020-03-25 16:00:37 +00:00
where
T: DigestVerify + Clone + Send + 'static,
2020-03-25 16:00:37 +00:00
{
let mut payload_vec = vec![];
2020-03-25 16:00:37 +00:00
while let Some(res) = payload.next().await {
let bytes = res?;
let bytes2 = bytes.clone();
verify_digest = web::block(move || {
2021-09-18 00:34:16 +00:00
verify_digest.update(bytes2.as_ref());
Ok(verify_digest) as Result<T, VerifyError>
})
2021-02-10 21:45:51 +00:00
.await??;
2020-03-25 16:00:37 +00:00
payload_vec.push(Ok(bytes));
2020-03-25 16:00:37 +00:00
}
let verified =
2021-02-10 21:45:51 +00:00
web::block(move || Ok(verify_digest.verify(&vec)) as Result<_, VerifyError>).await??;
2020-03-25 16:00:37 +00:00
if verified {
let stream: Pin<Box<dyn Stream<Item = Result<web::Bytes, PayloadError>>>> =
Box::pin(futures_util::stream::iter(payload_vec));
Ok(Payload::Stream(stream))
2020-03-25 16:00:37 +00:00
} else {
2021-09-18 00:34:16 +00:00
Err(VerifyError::new(&Span::current(), VerifyErrorKind::Verify).into())
2020-03-25 16:00:37 +00:00
}
}
2019-09-13 01:12:35 +00:00
fn parse_digest(h: &HeaderValue) -> Option<Vec<DigestPart>> {
2020-04-26 01:41:21 +00:00
let h = h.to_str().ok()?.split(';').next()?;
2019-09-13 01:12:35 +00:00
let v: Vec<_> = h
2020-04-26 01:41:21 +00:00
.split(',')
2019-09-13 01:12:35 +00:00
.filter_map(|p| {
2020-04-26 01:41:21 +00:00
let mut iter = p.splitn(2, '=');
2019-09-13 01:12:35 +00:00
iter.next()
.and_then(|alg| iter.next().map(|value| (alg, value)))
})
.map(|(alg, value)| DigestPart {
algorithm: alg.to_owned(),
digest: value.to_owned(),
})
.collect();
if v.is_empty() {
None
} else {
Some(v)
}
}
impl ResponseError for VerifyError {
fn status_code(&self) -> StatusCode {
StatusCode::BAD_REQUEST
2019-09-13 01:12:35 +00:00
}
2021-06-24 16:56:36 +00:00
fn error_response(&self) -> HttpResponse {
HttpResponse::new(self.status_code())
2019-09-13 01:12:35 +00:00
}
}