2019-04-07 20:37:04 +02:00
|
|
|
import logging
|
2019-06-13 02:20:30 +02:00
|
|
|
import time
|
|
|
|
import hashlib
|
|
|
|
import binascii
|
2019-05-24 18:12:27 +02:00
|
|
|
|
2019-06-13 02:20:30 +02:00
|
|
|
import ecdsa
|
2019-12-31 20:52:57 +01:00
|
|
|
from lbry import utils
|
|
|
|
from lbry.crypto.hash import sha256
|
2019-06-21 02:55:47 +02:00
|
|
|
from lbry.wallet.transaction import Output
|
2019-04-07 20:37:04 +02:00
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2019-06-13 02:20:30 +02:00
|
|
|
def get_encoded_signature(signature):
|
|
|
|
signature = signature.encode() if type(signature) is str else signature
|
|
|
|
r = int(signature[:int(len(signature) / 2)], 16)
|
|
|
|
s = int(signature[int(len(signature) / 2):], 16)
|
|
|
|
return ecdsa.util.sigencode_der(r, s, len(signature) * 4)
|
|
|
|
|
|
|
|
|
2019-07-25 03:18:21 +02:00
|
|
|
def cid2hash(claim_id: str) -> bytes:
|
|
|
|
return binascii.unhexlify(claim_id.encode())[::-1]
|
|
|
|
|
|
|
|
|
|
|
|
def is_comment_signed_by_channel(comment: dict, channel: Output, abandon=False):
|
2019-07-02 17:58:24 +02:00
|
|
|
if type(channel) is Output:
|
|
|
|
try:
|
2019-07-25 03:18:21 +02:00
|
|
|
signing_field = comment['comment_id'] if abandon else comment['comment']
|
2019-07-02 17:58:24 +02:00
|
|
|
pieces = [
|
|
|
|
comment['signing_ts'].encode(),
|
2019-07-25 03:18:21 +02:00
|
|
|
cid2hash(comment['channel_id']),
|
|
|
|
signing_field.encode()
|
2019-07-02 17:58:24 +02:00
|
|
|
]
|
|
|
|
return Output.is_signature_valid(
|
|
|
|
get_encoded_signature(comment['signature']),
|
|
|
|
sha256(b''.join(pieces)),
|
|
|
|
channel.claim.channel.public_key_bytes
|
|
|
|
)
|
|
|
|
except KeyError:
|
|
|
|
pass
|
2019-06-13 02:20:30 +02:00
|
|
|
return False
|
|
|
|
|
|
|
|
|
2019-07-25 03:18:21 +02:00
|
|
|
def sign_comment(comment: dict, channel: Output, abandon=False):
|
|
|
|
timestamp = str(int(time.time()))
|
|
|
|
signing_field = comment['comment_id'] if abandon else comment['comment']
|
|
|
|
pieces = [timestamp.encode(), channel.claim_hash, signing_field.encode()]
|
2019-06-13 02:20:30 +02:00
|
|
|
digest = sha256(b''.join(pieces))
|
|
|
|
signature = channel.private_key.sign_digest_deterministic(digest, hashfunc=hashlib.sha256)
|
2019-07-19 06:29:21 +02:00
|
|
|
comment.update({
|
|
|
|
'signature': binascii.hexlify(signature).decode(),
|
2019-07-25 03:18:21 +02:00
|
|
|
'signing_ts': timestamp
|
2019-07-19 06:29:21 +02:00
|
|
|
})
|
2019-04-07 20:37:04 +02:00
|
|
|
|
|
|
|
|
2019-07-19 06:29:21 +02:00
|
|
|
async def jsonrpc_post(url: str, method: str, params: dict = None, **kwargs) -> any:
|
2019-07-24 21:51:14 +02:00
|
|
|
params = params or {}
|
2019-07-19 06:29:21 +02:00
|
|
|
params.update(kwargs)
|
2019-05-24 18:12:27 +02:00
|
|
|
json_body = {'jsonrpc': '2.0', 'id': None, 'method': method, 'params': params}
|
2019-08-26 18:06:18 +02:00
|
|
|
async with utils.aiohttp_request('POST', url, json=json_body) as response:
|
2019-05-24 18:12:27 +02:00
|
|
|
try:
|
|
|
|
result = await response.json()
|
|
|
|
return result['result'] if 'result' in result else result
|
2019-07-03 00:38:43 +02:00
|
|
|
except Exception as cte:
|
2019-07-19 06:29:21 +02:00
|
|
|
log.exception('Unable to decode response from server: %s', cte)
|
2019-05-24 18:12:27 +02:00
|
|
|
return await response.text()
|