\n (https?:\/\/[\w\-\.]+[\w]+)\n (:[\d]+)?\n ([\w\-\.#\/@]+)\n )",\n (algorithm="(?P[\w\s-]+)",)?\n (headers="\(request-target\) (?P[\w\s-]+)",)?\n signature="(?P[\w+\/]+={0,2})"\n /x"; /** * Allowed keys when splitting signature * * @var array */ private $allowedKeys = [ 'keyId', 'algorithm', // optional "headers", // optional "signature", ]; /** @var \ActivityPhp\Server */ protected $server; /** * Inject a server instance */ public function __construct(Server $server) { $this->server = $server; } /** * Verify an incoming message based upon its HTTP signature * * @param \Symfony\Component\HttpFoundation\Request $request * @return bool True if signature has been verified. Otherwise false */ public function verify(Request $request): bool { // Read the Signature header, $signature = $request->headers->get('signature'); if (!$signature) { $this->server->logger()->info( 'Signature header not found', [$request->headers->all()] ); return false; } // Split it into its parts (keyId, headers and signature) $parts = $this->splitSignature($signature); if (!count($parts)) { return false; } extract($parts); $this->server->logger()->debug('Signature', [$signature]); // Build a server-oriented actor // Fetch the public key linked from keyId $actor = $this->server->actor($keyId); $publicKeyPem = $actor->getPublicKeyPem(); $this->server->logger()->debug('publicKeyPem', [$publicKeyPem]); // Create a comparison string from the plaintext headers we got // in the same order as was given in the signature header, $data = $this->getPlainText( explode(' ', trim($headers)), $request ); // Verify that string using the public key and the original // signature. $rsa = new RSA(); $rsa->setHash("sha256"); $rsa->setSignatureMode(RSA::SIGNATURE_PSS); $rsa->loadKey($publicKeyPem); return $rsa->verify($data, base64_decode($signature, true)); } /** * Split HTTP signature into its parts (keyId, headers and signature) */ public function splitSignature(string $signature): array { if (!preg_match(self::SIGNATURE_PATTERN, $signature, $matches)) { $this->server->logger()->info( 'Signature pattern failed', [$signature] ); return []; } // Headers are optional if (!isset($matches['headers']) || $matches['headers'] == '') { $matches['headers'] = 'date'; } return array_filter($matches, function($key) { return !is_int($key) && in_array($key, $this->allowedKeys); }, ARRAY_FILTER_USE_KEY ); } /** * Get plain text that has been originally signed * * @param array $headers HTTP header keys * @param \Symfony\Component\HttpFoundation\Request $request */ private function getPlainText(array $headers, Request $request): string { $strings = []; $strings[] = sprintf( '(request-target) %s %s%s', strtolower($request->getMethod()), $request->getPathInfo(), $request->getQueryString() ? '?' . $request->getQueryString() : '' ); foreach ($headers as $key) { if ($request->headers->has($key)) { $strings[] = "$key: " . $request->headers->get($key); } } return implode("\n", $strings); } } __halt_compiler();----SIGNATURE:----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----ATTACHMENT:----Mzk1ODg1NTczMDYxNTgzNCAyNTE4Mzc1MDI2MDkzNjYxIDY2OTEzMjY1NzU0MjgwNTU=