2020-06-10 18:09:40 +00:00
|
|
|
import re
|
|
|
|
import logging
|
2020-06-10 20:50:16 +00:00
|
|
|
import hashlib
|
2020-06-10 22:00:16 +00:00
|
|
|
import hmac
|
2020-07-09 19:32:57 +00:00
|
|
|
from datetime import datetime, timezone
|
2020-06-10 18:09:40 +00:00
|
|
|
from owrx.config import Config
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
keyRegex = re.compile("^([a-zA-Z]+)-([0-9a-f]{32})-([0-9a-f]{64})$")
|
|
|
|
keyChallengeRegex = re.compile("^([a-zA-Z]+)-([0-9a-f]{32})-([0-9a-f]{32})$")
|
|
|
|
headerRegex = re.compile("^ReceiverId (.*)$")
|
|
|
|
|
|
|
|
|
|
|
|
class KeyException(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class Key(object):
|
|
|
|
def __init__(self, keyString):
|
|
|
|
matches = keyRegex.match(keyString)
|
|
|
|
if not matches:
|
|
|
|
raise KeyException("invalid key format")
|
|
|
|
self.source = matches.group(1)
|
|
|
|
self.id = matches.group(2)
|
|
|
|
self.secret = matches.group(3)
|
|
|
|
|
|
|
|
|
|
|
|
class KeyChallenge(object):
|
|
|
|
def __init__(self, challengeString):
|
|
|
|
matches = keyChallengeRegex.match(challengeString)
|
|
|
|
if not matches:
|
|
|
|
raise KeyException("invalid key challenge format")
|
|
|
|
self.source = matches.group(1)
|
|
|
|
self.id = matches.group(2)
|
|
|
|
self.challenge = matches.group(3)
|
|
|
|
|
|
|
|
|
|
|
|
class KeyResponse(object):
|
2020-07-09 19:32:57 +00:00
|
|
|
def __init__(self, source, id, time, signature):
|
2020-07-04 19:47:56 +00:00
|
|
|
self.source = source
|
|
|
|
self.id = id
|
|
|
|
self.time = time
|
|
|
|
self.signature = signature
|
|
|
|
|
2020-06-10 18:09:40 +00:00
|
|
|
def __str__(self):
|
2020-07-09 19:32:57 +00:00
|
|
|
return "{source}-{id}-{time}-{signature}".format(
|
2020-07-04 19:47:56 +00:00
|
|
|
source=self.source,
|
|
|
|
id=self.id,
|
2020-07-09 19:32:57 +00:00
|
|
|
time=self.time,
|
2020-07-04 19:47:56 +00:00
|
|
|
signature=self.signature,
|
|
|
|
)
|
2020-06-10 18:09:40 +00:00
|
|
|
|
|
|
|
|
|
|
|
class ReceiverId(object):
|
|
|
|
@staticmethod
|
|
|
|
def getResponseHeader(requestHeader):
|
|
|
|
matches = headerRegex.match(requestHeader)
|
|
|
|
if not matches:
|
|
|
|
raise KeyException("invalid authorization header")
|
2020-07-09 19:32:57 +00:00
|
|
|
challenges = [KeyChallenge(i) for i in matches.group(1).split(",")]
|
|
|
|
|
|
|
|
def signChallenge(challenge):
|
|
|
|
key = ReceiverId.findKey(challenge)
|
|
|
|
if key is None:
|
|
|
|
return
|
|
|
|
return ReceiverId.signChallenge(challenge, key)
|
|
|
|
|
|
|
|
responses = [signChallenge(c) for c in challenges]
|
|
|
|
return ",".join(str(r) for r in responses if r is not None)
|
2020-06-10 18:09:40 +00:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def findKey(challenge):
|
|
|
|
def parseKey(keyString):
|
|
|
|
try:
|
|
|
|
return Key(keyString)
|
2020-06-10 22:00:16 +00:00
|
|
|
except KeyException as e:
|
2020-06-10 18:09:40 +00:00
|
|
|
logger.error(e)
|
2020-06-10 22:00:16 +00:00
|
|
|
keys = [parseKey(keyString) for keyString in Config.get()['receiver_keys']]
|
|
|
|
keys = [key for key in keys if key is not None]
|
2020-06-10 18:09:40 +00:00
|
|
|
matching_keys = [key for key in keys if key.source == challenge.source and key.id == challenge.id]
|
|
|
|
if matching_keys:
|
|
|
|
return matching_keys[0]
|
|
|
|
return None
|
2020-06-10 20:50:16 +00:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def signChallenge(challenge, key):
|
2020-07-09 19:32:57 +00:00
|
|
|
now = datetime.utcnow().replace(microsecond=0, tzinfo=timezone.utc)
|
|
|
|
now_bytes = int(now.timestamp()).to_bytes(4, byteorder="big")
|
2020-06-11 18:55:05 +00:00
|
|
|
m = hmac.new(bytes.fromhex(key.secret), digestmod=hashlib.sha256)
|
|
|
|
m.update(bytes.fromhex(challenge.challenge))
|
2020-07-09 19:32:57 +00:00
|
|
|
m.update(now_bytes)
|
|
|
|
return KeyResponse(challenge.source, challenge.id, now_bytes.hex(), m.hexdigest())
|