mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-03 22:22:25 -06:00 
			
		
		
		
	mess about with some structure to help w/ deref
This commit is contained in:
		
					parent
					
						
							
								4268cd59d8
							
						
					
				
			
			
				commit
				
					
						1f70d64a7e
					
				
			
		
					 13 changed files with 594 additions and 404 deletions
				
			
		| 
						 | 
					@ -35,9 +35,6 @@ import (
 | 
				
			||||||
	"github.com/go-fed/httpsig"
 | 
						"github.com/go-fed/httpsig"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/transport"
 | 
					 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | 
					 | 
				
			||||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
					 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*
 | 
					/*
 | 
				
			||||||
| 
						 | 
					@ -100,11 +97,14 @@ func getPublicKeyFromResponse(c context.Context, b []byte, keyID *url.URL) (voca
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// AuthenticateFederatedRequest authenticates any kind of incoming federated request from a remote server. This includes things like
 | 
					// AuthenticateFederatedRequest authenticates any kind of incoming federated request from a remote server. This includes things like
 | 
				
			||||||
// GET requests for dereferencing our users or statuses etc, and POST requests for delivering new Activities. The function returns
 | 
					// GET requests for dereferencing our users or statuses etc, and POST requests for delivering new Activities. The function returns
 | 
				
			||||||
// the URL of the owner of the public key used in the http signature.
 | 
					// the URL of the owner of the public key used in the requesting http signature.
 | 
				
			||||||
//
 | 
					//
 | 
				
			||||||
// Authenticate in this case is defined as just making sure that the http request is actually signed by whoever claims
 | 
					// Authenticate in this case is defined as making sure that the http request is actually signed by whoever claims
 | 
				
			||||||
// to have signed it, by fetching the public key from the signature and checking it against the remote public key. This function
 | 
					// to have signed it, by fetching the public key from the signature and checking it against the remote public key.
 | 
				
			||||||
// *does not* check whether the request is authorized, only whether it's authentic.
 | 
					//
 | 
				
			||||||
 | 
					// To avoid making unnecessary http calls towards blocked domains, this function *does* bail early if an instance-level domain block exists
 | 
				
			||||||
 | 
					// for the request from the incoming domain. However, it does not check whether individual blocks exist between the requesting user or domain
 | 
				
			||||||
 | 
					// and the requested user: this should be done elsewhere.
 | 
				
			||||||
//
 | 
					//
 | 
				
			||||||
// The provided username will be used to generate a transport for making remote requests/derefencing the public key ID of the request signature.
 | 
					// The provided username will be used to generate a transport for making remote requests/derefencing the public key ID of the request signature.
 | 
				
			||||||
// Ideally you should pass in the username of the user *being requested*, so that the remote server can decide how to handle the request based on who's making it.
 | 
					// Ideally you should pass in the username of the user *being requested*, so that the remote server can decide how to handle the request based on who's making it.
 | 
				
			||||||
| 
						 | 
					@ -115,7 +115,12 @@ func getPublicKeyFromResponse(c context.Context, b []byte, keyID *url.URL) (voca
 | 
				
			||||||
//
 | 
					//
 | 
				
			||||||
// Also note that this function *does not* dereference the remote account that the signature key is associated with.
 | 
					// Also note that this function *does not* dereference the remote account that the signature key is associated with.
 | 
				
			||||||
// Other functions should use the returned URL to dereference the remote account, if required.
 | 
					// Other functions should use the returned URL to dereference the remote account, if required.
 | 
				
			||||||
func (f *federator) AuthenticateFederatedRequest(username string, r *http.Request) (*url.URL, error) {
 | 
					func (f *federator) AuthenticateFederatedRequest(requestedUsername string, r *http.Request) (*url.URL, error) {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						var publicKey interface{}
 | 
				
			||||||
 | 
						var pkOwnerURI *url.URL
 | 
				
			||||||
 | 
						var err error
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// set this extra field for signature validation
 | 
						// set this extra field for signature validation
 | 
				
			||||||
	r.Header.Set("host", f.config.Host)
 | 
						r.Header.Set("host", f.config.Host)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -131,8 +136,15 @@ func (f *federator) AuthenticateFederatedRequest(username string, r *http.Reques
 | 
				
			||||||
		return nil, fmt.Errorf("could not parse key id into a url: %s", err)
 | 
							return nil, fmt.Errorf("could not parse key id into a url: %s", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	var publicKey interface{}
 | 
						// if the domain is blocked we want to make as few calls towards it as possible, so already bail here if that's the case!
 | 
				
			||||||
	var pkOwnerURI *url.URL
 | 
						blockedDomain, err := f.blockedDomain(requestingPublicKeyID.Host)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("could not tell if domain %s was blocked or not: %s", requestingPublicKeyID.Host, err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if blockedDomain {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("host %s was domain blocked, aborting auth", requestingPublicKeyID.Host)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	requestingRemoteAccount := >smodel.Account{}
 | 
						requestingRemoteAccount := >smodel.Account{}
 | 
				
			||||||
	requestingLocalAccount := >smodel.Account{}
 | 
						requestingLocalAccount := >smodel.Account{}
 | 
				
			||||||
	requestingHost := requestingPublicKeyID.Host
 | 
						requestingHost := requestingPublicKeyID.Host
 | 
				
			||||||
| 
						 | 
					@ -159,7 +171,7 @@ func (f *federator) AuthenticateFederatedRequest(username string, r *http.Reques
 | 
				
			||||||
		// REMOTE ACCOUNT REQUEST WITHOUT KEY CACHED LOCALLY
 | 
							// REMOTE ACCOUNT REQUEST WITHOUT KEY CACHED LOCALLY
 | 
				
			||||||
		// the request is remote and we don't have the public key yet,
 | 
							// the request is remote and we don't have the public key yet,
 | 
				
			||||||
		// so we need to authenticate the request properly by dereferencing the remote key
 | 
							// so we need to authenticate the request properly by dereferencing the remote key
 | 
				
			||||||
		transport, err := f.GetTransportForUser(username)
 | 
							transport, err := f.GetTransportForUser(requestedUsername)
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			return nil, fmt.Errorf("transport err: %s", err)
 | 
								return nil, fmt.Errorf("transport err: %s", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
| 
						 | 
					@ -214,163 +226,19 @@ func (f *federator) AuthenticateFederatedRequest(username string, r *http.Reques
 | 
				
			||||||
	return pkOwnerURI, nil
 | 
						return pkOwnerURI, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (f *federator) DereferenceRemoteAccount(username string, remoteAccountID *url.URL) (typeutils.Accountable, error) {
 | 
					func (f *federator) blockedDomain(host string) (bool, error) {
 | 
				
			||||||
	f.startHandshake(username, remoteAccountID)
 | 
						b := >smodel.DomainBlock{}
 | 
				
			||||||
	defer f.stopHandshake(username, remoteAccountID)
 | 
						err := f.db.GetWhere([]db.Where{{Key: "domain", Value: host, CaseInsensitive: true}}, b)
 | 
				
			||||||
 | 
						if err == nil {
 | 
				
			||||||
	transport, err := f.GetTransportForUser(username)
 | 
							// block exists
 | 
				
			||||||
	if err != nil {
 | 
							return true, nil
 | 
				
			||||||
		return nil, fmt.Errorf("transport err: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	b, err := transport.Dereference(context.Background(), remoteAccountID)
 | 
						if _, ok := err.(db.ErrNoEntries); ok {
 | 
				
			||||||
	if err != nil {
 | 
							// there are no entries so there's no block
 | 
				
			||||||
		return nil, fmt.Errorf("error deferencing %s: %s", remoteAccountID.String(), err)
 | 
							return false, nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	m := make(map[string]interface{})
 | 
						// there's an actual error
 | 
				
			||||||
	if err := json.Unmarshal(b, &m); err != nil {
 | 
						return false, err
 | 
				
			||||||
		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	t, err := streams.ToType(context.Background(), m)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	switch t.GetTypeName() {
 | 
					 | 
				
			||||||
	case string(gtsmodel.ActivityStreamsPerson):
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsPerson)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as activitystreams person")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case string(gtsmodel.ActivityStreamsApplication):
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsApplication)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as activitystreams application")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case string(gtsmodel.ActivityStreamsService):
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsService)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as activitystreams service")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName())
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (f *federator) DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) {
 | 
					 | 
				
			||||||
	transport, err := f.GetTransportForUser(username)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("transport err: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	b, err := transport.Dereference(context.Background(), remoteStatusID)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error deferencing %s: %s", remoteStatusID.String(), err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	m := make(map[string]interface{})
 | 
					 | 
				
			||||||
	if err := json.Unmarshal(b, &m); err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	t, err := streams.ToType(context.Background(), m)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Article, Document, Image, Video, Note, Page, Event, Place, Mention, Profile
 | 
					 | 
				
			||||||
	switch t.GetTypeName() {
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsArticle:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsArticle)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsArticle")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsDocument:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsDocument)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsDocument")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsImage:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsImage)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsImage")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsVideo:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsVideo)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsVideo")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsNote:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsNote)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsNote")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsPage:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsPage)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsPage")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsEvent:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsEvent)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsEvent")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsPlace:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsPlace)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsPlace")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	case gtsmodel.ActivityStreamsProfile:
 | 
					 | 
				
			||||||
		p, ok := t.(vocab.ActivityStreamsProfile)
 | 
					 | 
				
			||||||
		if !ok {
 | 
					 | 
				
			||||||
			return nil, errors.New("error resolving type as ActivityStreamsProfile")
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		return p, nil
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName())
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (f *federator) DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*apimodel.Instance, error) {
 | 
					 | 
				
			||||||
	transport, err := f.GetTransportForUser(username)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("transport err: %s", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return transport.DereferenceInstance(context.Background(), remoteInstanceURI)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (f *federator) GetTransportForUser(username string) (transport.Transport, error) {
 | 
					 | 
				
			||||||
	// We need an account to use to create a transport for dereferecing the signature.
 | 
					 | 
				
			||||||
	// If a username has been given, we can fetch the account with that username and use it.
 | 
					 | 
				
			||||||
	// Otherwise, we can take the instance account and use those credentials to make the request.
 | 
					 | 
				
			||||||
	ourAccount := >smodel.Account{}
 | 
					 | 
				
			||||||
	var u string
 | 
					 | 
				
			||||||
	if username == "" {
 | 
					 | 
				
			||||||
		u = f.config.Host
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		u = username
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	if err := f.db.GetLocalAccountByUsername(u, ourAccount); err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error getting account %s from db: %s", username, err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	transport, err := f.transportController.NewTransport(ourAccount.PublicKeyURI, ourAccount.PrivateKey)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error creating transport for user %s: %s", username, err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	return transport, nil
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -20,15 +20,10 @@ package federation
 | 
				
			||||||
 | 
					
 | 
				
			||||||
import (
 | 
					import (
 | 
				
			||||||
	"context"
 | 
						"context"
 | 
				
			||||||
	"fmt"
 | 
					 | 
				
			||||||
	"net/http"
 | 
						"net/http"
 | 
				
			||||||
	"net/url"
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"github.com/go-fed/activity/pub"
 | 
					 | 
				
			||||||
	"github.com/go-fed/activity/streams"
 | 
						"github.com/go-fed/activity/streams"
 | 
				
			||||||
	"github.com/go-fed/activity/streams/vocab"
 | 
						"github.com/go-fed/activity/streams/vocab"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
					 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/util"
 | 
					 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*
 | 
					/*
 | 
				
			||||||
| 
						 | 
					@ -101,53 +96,3 @@ func (f *federator) GetOutbox(ctx context.Context, r *http.Request) (vocab.Activ
 | 
				
			||||||
	// the CLIENT API, not through the federation API, so we just do nothing here.
 | 
						// the CLIENT API, not through the federation API, so we just do nothing here.
 | 
				
			||||||
	return streams.NewActivityStreamsOrderedCollectionPage(), nil
 | 
						return streams.NewActivityStreamsOrderedCollectionPage(), nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					 | 
				
			||||||
// NewTransport returns a new Transport on behalf of a specific actor.
 | 
					 | 
				
			||||||
//
 | 
					 | 
				
			||||||
// The actorBoxIRI will be either the inbox or outbox of an actor who is
 | 
					 | 
				
			||||||
// attempting to do the dereferencing or delivery. Any authentication
 | 
					 | 
				
			||||||
// scheme applied on the request must be based on this actor. The
 | 
					 | 
				
			||||||
// request must contain some sort of credential of the user, such as a
 | 
					 | 
				
			||||||
// HTTP Signature.
 | 
					 | 
				
			||||||
//
 | 
					 | 
				
			||||||
// The gofedAgent passed in should be used by the Transport
 | 
					 | 
				
			||||||
// implementation in the User-Agent, as well as the application-specific
 | 
					 | 
				
			||||||
// user agent string. The gofedAgent will indicate this library's use as
 | 
					 | 
				
			||||||
// well as the library's version number.
 | 
					 | 
				
			||||||
//
 | 
					 | 
				
			||||||
// Any server-wide rate-limiting that needs to occur should happen in a
 | 
					 | 
				
			||||||
// Transport implementation. This factory function allows this to be
 | 
					 | 
				
			||||||
// created, so peer servers are not DOS'd.
 | 
					 | 
				
			||||||
//
 | 
					 | 
				
			||||||
// Any retry logic should also be handled by the Transport
 | 
					 | 
				
			||||||
// implementation.
 | 
					 | 
				
			||||||
//
 | 
					 | 
				
			||||||
// Note that the library will not maintain a long-lived pointer to the
 | 
					 | 
				
			||||||
// returned Transport so that any private credentials are able to be
 | 
					 | 
				
			||||||
// garbage collected.
 | 
					 | 
				
			||||||
func (f *federator) NewTransport(ctx context.Context, actorBoxIRI *url.URL, gofedAgent string) (pub.Transport, error) {
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	var username string
 | 
					 | 
				
			||||||
	var err error
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if util.IsInboxPath(actorBoxIRI) {
 | 
					 | 
				
			||||||
		username, err = util.ParseInboxPath(actorBoxIRI)
 | 
					 | 
				
			||||||
		if err != nil {
 | 
					 | 
				
			||||||
			return nil, fmt.Errorf("couldn't parse path %s as an inbox: %s", actorBoxIRI.String(), err)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	} else if util.IsOutboxPath(actorBoxIRI) {
 | 
					 | 
				
			||||||
		username, err = util.ParseOutboxPath(actorBoxIRI)
 | 
					 | 
				
			||||||
		if err != nil {
 | 
					 | 
				
			||||||
			return nil, fmt.Errorf("couldn't parse path %s as an outbox: %s", actorBoxIRI.String(), err)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("id %s was neither an inbox path nor an outbox path", actorBoxIRI.String())
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	account := >smodel.Account{}
 | 
					 | 
				
			||||||
	if err := f.db.GetLocalAccountByUsername(username, account); err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("error getting account with username %s from the db: %s", username, err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return f.transportController.NewTransport(account.PublicKeyURI, account.PrivateKey)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
							
								
								
									
										151
									
								
								internal/federation/dereference.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										151
									
								
								internal/federation/dereference.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,151 @@
 | 
				
			||||||
 | 
					package federation
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"encoding/json"
 | 
				
			||||||
 | 
						"errors"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						"github.com/go-fed/activity/streams"
 | 
				
			||||||
 | 
						"github.com/go-fed/activity/streams/vocab"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (f *federator) DereferenceRemoteAccount(username string, remoteAccountID *url.URL) (typeutils.Accountable, error) {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						transport, err := f.GetTransportForUser(username)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("transport err: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						b, err := transport.Dereference(context.Background(), remoteAccountID)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error deferencing %s: %s", remoteAccountID.String(), err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						m := make(map[string]interface{})
 | 
				
			||||||
 | 
						if err := json.Unmarshal(b, &m); err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						t, err := streams.ToType(context.Background(), m)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						switch t.GetTypeName() {
 | 
				
			||||||
 | 
						case string(gtsmodel.ActivityStreamsPerson):
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsPerson)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as activitystreams person")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case string(gtsmodel.ActivityStreamsApplication):
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsApplication)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as activitystreams application")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case string(gtsmodel.ActivityStreamsService):
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsService)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as activitystreams service")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return nil, fmt.Errorf("type name %s not supported", t.GetTypeName())
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (f *federator) DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) {
 | 
				
			||||||
 | 
						transport, err := f.GetTransportForUser(username)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("transport err: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						b, err := transport.Dereference(context.Background(), remoteStatusID)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error deferencing %s: %s", remoteStatusID.String(), err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						m := make(map[string]interface{})
 | 
				
			||||||
 | 
						if err := json.Unmarshal(b, &m); err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						t, err := streams.ToType(context.Background(), m)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Article, Document, Image, Video, Note, Page, Event, Place, Mention, Profile
 | 
				
			||||||
 | 
						switch t.GetTypeName() {
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsArticle:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsArticle)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsArticle")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsDocument:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsDocument)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsDocument")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsImage:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsImage)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsImage")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsVideo:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsVideo)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsVideo")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsNote:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsNote)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsNote")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsPage:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsPage)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsPage")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsEvent:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsEvent)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsEvent")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsPlace:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsPlace)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsPlace")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						case gtsmodel.ActivityStreamsProfile:
 | 
				
			||||||
 | 
							p, ok := t.(vocab.ActivityStreamsProfile)
 | 
				
			||||||
 | 
							if !ok {
 | 
				
			||||||
 | 
								return nil, errors.New("error resolving type as ActivityStreamsProfile")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return p, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return nil, fmt.Errorf("type name %s not supported", t.GetTypeName())
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (f *federator) DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*gtsmodel.Instance, error) {
 | 
				
			||||||
 | 
						transport, err := f.GetTransportForUser(username)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("transport err: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return transport.DereferenceInstance(context.Background(), remoteInstanceURI)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -132,9 +132,20 @@ func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWr
 | 
				
			||||||
			// there's been an actual error
 | 
								// there's been an actual error
 | 
				
			||||||
			return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err)
 | 
								return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		// we don't have an entry for this instance yet so create it
 | 
					
 | 
				
			||||||
		var err error
 | 
							// we don't have an entry for this instance yet so dereference it
 | 
				
			||||||
		i, err := f.DereferenceRemoteInstance()
 | 
							i, err = f.DereferenceRemoteInstance(username, &url.URL{
 | 
				
			||||||
 | 
								Scheme: publicKeyOwnerURI.Scheme,
 | 
				
			||||||
 | 
								Host: publicKeyOwnerURI.Host,
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								return nil, false, fmt.Errorf("could not dereference new remote instance %s during AuthenticatePostInbox: %s", publicKeyOwnerURI.Host, err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// and put it in the db
 | 
				
			||||||
 | 
							if err := f.db.Put(i); err != nil {
 | 
				
			||||||
 | 
								return nil, false, fmt.Errorf("error inserting newly dereferenced instance %s: %s", publicKeyOwnerURI.Host, err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	requestingAccount := >smodel.Account{}
 | 
						requestingAccount := >smodel.Account{}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -25,10 +25,10 @@ import (
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"github.com/go-fed/activity/pub"
 | 
						"github.com/go-fed/activity/pub"
 | 
				
			||||||
	"github.com/sirupsen/logrus"
 | 
						"github.com/sirupsen/logrus"
 | 
				
			||||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
					 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/config"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/config"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/federation/federatingdb"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/federation/federatingdb"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/transport"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/transport"
 | 
				
			||||||
	"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
| 
						 | 
					@ -51,8 +51,9 @@ type Federator interface {
 | 
				
			||||||
	// DereferenceRemoteStatus can be used to get the representation of a remote status, based on its ID (which is a URI).
 | 
						// DereferenceRemoteStatus can be used to get the representation of a remote status, based on its ID (which is a URI).
 | 
				
			||||||
	// The given username will be used to create a transport for making outgoing requests. See the implementation for more detailed comments.
 | 
						// The given username will be used to create a transport for making outgoing requests. See the implementation for more detailed comments.
 | 
				
			||||||
	DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error)
 | 
						DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error)
 | 
				
			||||||
	// DereferenceRemoteInstance
 | 
						// DereferenceRemoteInstance takes the URL of a remote instance, and a username (optional) to spin up a transport with. It then
 | 
				
			||||||
	DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*apimodel.Instance, error)
 | 
						// does its damnedest to get some kind of information back about the instance, trying /api/v1/instance, then /.well-known/nodeinfo
 | 
				
			||||||
 | 
						DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*gtsmodel.Instance, error)
 | 
				
			||||||
	// GetTransportForUser returns a new transport initialized with the key credentials belonging to the given username.
 | 
						// GetTransportForUser returns a new transport initialized with the key credentials belonging to the given username.
 | 
				
			||||||
	// This can be used for making signed http requests.
 | 
						// This can be used for making signed http requests.
 | 
				
			||||||
	//
 | 
						//
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
							
								
								
									
										84
									
								
								internal/federation/transport.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										84
									
								
								internal/federation/transport.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,84 @@
 | 
				
			||||||
 | 
					package federation
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						"github.com/go-fed/activity/pub"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/transport"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/util"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// NewTransport returns a new Transport on behalf of a specific actor.
 | 
				
			||||||
 | 
					//
 | 
				
			||||||
 | 
					// The actorBoxIRI will be either the inbox or outbox of an actor who is
 | 
				
			||||||
 | 
					// attempting to do the dereferencing or delivery. Any authentication
 | 
				
			||||||
 | 
					// scheme applied on the request must be based on this actor. The
 | 
				
			||||||
 | 
					// request must contain some sort of credential of the user, such as a
 | 
				
			||||||
 | 
					// HTTP Signature.
 | 
				
			||||||
 | 
					//
 | 
				
			||||||
 | 
					// The gofedAgent passed in should be used by the Transport
 | 
				
			||||||
 | 
					// implementation in the User-Agent, as well as the application-specific
 | 
				
			||||||
 | 
					// user agent string. The gofedAgent will indicate this library's use as
 | 
				
			||||||
 | 
					// well as the library's version number.
 | 
				
			||||||
 | 
					//
 | 
				
			||||||
 | 
					// Any server-wide rate-limiting that needs to occur should happen in a
 | 
				
			||||||
 | 
					// Transport implementation. This factory function allows this to be
 | 
				
			||||||
 | 
					// created, so peer servers are not DOS'd.
 | 
				
			||||||
 | 
					//
 | 
				
			||||||
 | 
					// Any retry logic should also be handled by the Transport
 | 
				
			||||||
 | 
					// implementation.
 | 
				
			||||||
 | 
					//
 | 
				
			||||||
 | 
					// Note that the library will not maintain a long-lived pointer to the
 | 
				
			||||||
 | 
					// returned Transport so that any private credentials are able to be
 | 
				
			||||||
 | 
					// garbage collected.
 | 
				
			||||||
 | 
					func (f *federator) NewTransport(ctx context.Context, actorBoxIRI *url.URL, gofedAgent string) (pub.Transport, error) {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						var username string
 | 
				
			||||||
 | 
						var err error
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if util.IsInboxPath(actorBoxIRI) {
 | 
				
			||||||
 | 
							username, err = util.ParseInboxPath(actorBoxIRI)
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								return nil, fmt.Errorf("couldn't parse path %s as an inbox: %s", actorBoxIRI.String(), err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else if util.IsOutboxPath(actorBoxIRI) {
 | 
				
			||||||
 | 
							username, err = util.ParseOutboxPath(actorBoxIRI)
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								return nil, fmt.Errorf("couldn't parse path %s as an outbox: %s", actorBoxIRI.String(), err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("id %s was neither an inbox path nor an outbox path", actorBoxIRI.String())
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						account := >smodel.Account{}
 | 
				
			||||||
 | 
						if err := f.db.GetLocalAccountByUsername(username, account); err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error getting account with username %s from the db: %s", username, err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return f.transportController.NewTransport(account.PublicKeyURI, account.PrivateKey)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (f *federator) GetTransportForUser(username string) (transport.Transport, error) {
 | 
				
			||||||
 | 
						// We need an account to use to create a transport for dereferecing something.
 | 
				
			||||||
 | 
						// If a username has been given, we can fetch the account with that username and use it.
 | 
				
			||||||
 | 
						// Otherwise, we can take the instance account and use those credentials to make the request.
 | 
				
			||||||
 | 
						ourAccount := >smodel.Account{}
 | 
				
			||||||
 | 
						var u string
 | 
				
			||||||
 | 
						if username == "" {
 | 
				
			||||||
 | 
							u = f.config.Host
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							u = username
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if err := f.db.GetLocalAccountByUsername(u, ourAccount); err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error getting account %s from db: %s", username, err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						transport, err := f.transportController.NewTransport(ourAccount.PublicKeyURI, ourAccount.PrivateKey)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("error creating transport for user %s: %s", username, err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return transport, nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -28,6 +28,8 @@ type Instance struct {
 | 
				
			||||||
	Terms string
 | 
						Terms string
 | 
				
			||||||
	// Contact email address for this instance
 | 
						// Contact email address for this instance
 | 
				
			||||||
	ContactEmail string
 | 
						ContactEmail string
 | 
				
			||||||
 | 
						// Username of the contact account for this instance
 | 
				
			||||||
 | 
						ContactAccountUsername string
 | 
				
			||||||
	// Contact account ID in the database for this instance
 | 
						// Contact account ID in the database for this instance
 | 
				
			||||||
	ContactAccountID string `pg:"type:CHAR(26)"`
 | 
						ContactAccountID string `pg:"type:CHAR(26)"`
 | 
				
			||||||
	// Reputation score of this instance
 | 
						// Reputation score of this instance
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
							
								
								
									
										16
									
								
								internal/transport/deliver.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								internal/transport/deliver.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,16 @@
 | 
				
			||||||
 | 
					package transport
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (t *transport) BatchDeliver(c context.Context, b []byte, recipients []*url.URL) error {
 | 
				
			||||||
 | 
						return t.sigTransport.BatchDeliver(c, b, recipients)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (t *transport) Deliver(c context.Context, b []byte, to *url.URL) error {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "Deliver")
 | 
				
			||||||
 | 
						l.Debugf("performing POST to %s", to.String())
 | 
				
			||||||
 | 
						return t.sigTransport.Deliver(c, b, to)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										12
									
								
								internal/transport/dereference.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								internal/transport/dereference.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,12 @@
 | 
				
			||||||
 | 
					package transport
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (t *transport) Dereference(c context.Context, iri *url.URL) ([]byte, error) {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "Dereference")
 | 
				
			||||||
 | 
						l.Debugf("performing GET to %s", iri.String())
 | 
				
			||||||
 | 
						return t.sigTransport.Dereference(c, iri)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										185
									
								
								internal/transport/derefinstance.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										185
									
								
								internal/transport/derefinstance.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,185 @@
 | 
				
			||||||
 | 
					package transport
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"encoding/json"
 | 
				
			||||||
 | 
						"errors"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
 | 
						"io/ioutil"
 | 
				
			||||||
 | 
						"net/http"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
						"strings"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
				
			||||||
 | 
						"github.com/superseriousbusiness/gotosocial/internal/id"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (t *transport) DereferenceInstance(c context.Context, iri *url.URL) (*gtsmodel.Instance, error) {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "DereferenceInstance")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						var i *gtsmodel.Instance
 | 
				
			||||||
 | 
						var err error
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// First try to dereference using /api/v1/instance.
 | 
				
			||||||
 | 
						// This will provide the most complete picture of an instance, and avoid unnecessary api calls.
 | 
				
			||||||
 | 
						//
 | 
				
			||||||
 | 
						// This will only work with Mastodon-api compatible instances: Mastodon, some Pleroma instances, GoToSocial.
 | 
				
			||||||
 | 
						l.Debugf("trying to dereference instance %s by /api/v1/instance", iri.Host)
 | 
				
			||||||
 | 
						i, err = dereferenceByAPIV1Instance(t, c, iri)
 | 
				
			||||||
 | 
						if err == nil {
 | 
				
			||||||
 | 
							l.Debugf("successfully dereferenced instance using /api/v1/instance")
 | 
				
			||||||
 | 
							return i, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						l.Debugf("couldn't dereference instance using /api/v1/instance: %s", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// If that doesn't work, try to dereference using /.well-known/nodeinfo.
 | 
				
			||||||
 | 
						// This will involve two API calls and return less info overall, but should be more widely compatible.
 | 
				
			||||||
 | 
						l.Debugf("trying to dereference instance %s by /.well-known/nodeinfo", iri.Host)
 | 
				
			||||||
 | 
						i, err = dereferenceByNodeInfo(t, c, iri)
 | 
				
			||||||
 | 
						if err == nil {
 | 
				
			||||||
 | 
							l.Debugf("successfully dereferenced instance using /.well-known/nodeinfo")
 | 
				
			||||||
 | 
							return i, nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						l.Debugf("couldn't dereference instance using /.well-known/nodeinfo: %s", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return nil, fmt.Errorf("couldn't dereference instance %s using either /api/v1/instance or /.well-known/nodeinfo", iri.Host)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func dereferenceByAPIV1Instance(t *transport, c context.Context, iri *url.URL) (*gtsmodel.Instance, error) {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "dereferenceByAPIV1Instance")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						cleanIRI := &url.URL{
 | 
				
			||||||
 | 
							Scheme: iri.Scheme,
 | 
				
			||||||
 | 
							Host:   iri.Host,
 | 
				
			||||||
 | 
							Path:   "api/v1/instance",
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						l.Debugf("performing GET to %s", cleanIRI.String())
 | 
				
			||||||
 | 
						req, err := http.NewRequest("GET", cleanIRI.String(), nil)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						req = req.WithContext(c)
 | 
				
			||||||
 | 
						req.Header.Add("Accept", "application/json")
 | 
				
			||||||
 | 
						req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
				
			||||||
 | 
						req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
				
			||||||
 | 
						req.Header.Set("Host", cleanIRI.Host)
 | 
				
			||||||
 | 
						t.getSignerMu.Lock()
 | 
				
			||||||
 | 
						err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
				
			||||||
 | 
						t.getSignerMu.Unlock()
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						resp, err := t.client.Do(req)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						defer resp.Body.Close()
 | 
				
			||||||
 | 
						if resp.StatusCode != http.StatusOK {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("GET request to %s failed (%d): %s", cleanIRI.String(), resp.StatusCode, resp.Status)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						b, err := ioutil.ReadAll(resp.Body)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if len(b) == 0 {
 | 
				
			||||||
 | 
							return nil, errors.New("response bytes was len 0")
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// try to parse the returned bytes directly into an Instance model
 | 
				
			||||||
 | 
						apiResp := &apimodel.Instance{}
 | 
				
			||||||
 | 
						if err := json.Unmarshal(b, apiResp); err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						var contactUsername string
 | 
				
			||||||
 | 
						if apiResp.ContactAccount != nil {
 | 
				
			||||||
 | 
							contactUsername = apiResp.ContactAccount.Username
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ulid, err := id.NewRandomULID()
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						i := >smodel.Instance{
 | 
				
			||||||
 | 
							ID:                     ulid,
 | 
				
			||||||
 | 
							Domain:                 iri.Host,
 | 
				
			||||||
 | 
							Title:                  apiResp.Title,
 | 
				
			||||||
 | 
							URI:                    fmt.Sprintf("%s://%s", iri.Scheme, iri.Host),
 | 
				
			||||||
 | 
							ShortDescription:       apiResp.ShortDescription,
 | 
				
			||||||
 | 
							Description:            apiResp.Description,
 | 
				
			||||||
 | 
							ContactEmail:           apiResp.Email,
 | 
				
			||||||
 | 
							ContactAccountUsername: contactUsername,
 | 
				
			||||||
 | 
							Version:                apiResp.Version,
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return i, nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func dereferenceByNodeInfo(t *transport, c context.Context, iri *url.URL) (*gtsmodel.Instance, error) {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "dereferenceByNodeInfo")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						cleanIRI := &url.URL{
 | 
				
			||||||
 | 
							Scheme: iri.Scheme,
 | 
				
			||||||
 | 
							Host:   iri.Host,
 | 
				
			||||||
 | 
							Path:   ".well-known/nodeinfo",
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						l.Debugf("performing GET to %s", cleanIRI.String())
 | 
				
			||||||
 | 
						req, err := http.NewRequest("GET", cleanIRI.String(), nil)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						req = req.WithContext(c)
 | 
				
			||||||
 | 
						req.Header.Add("Accept", "application/json")
 | 
				
			||||||
 | 
						req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
				
			||||||
 | 
						req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
				
			||||||
 | 
						req.Header.Set("Host", cleanIRI.Host)
 | 
				
			||||||
 | 
						t.getSignerMu.Lock()
 | 
				
			||||||
 | 
						err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
				
			||||||
 | 
						t.getSignerMu.Unlock()
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						resp, err := t.client.Do(req)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						defer resp.Body.Close()
 | 
				
			||||||
 | 
						if resp.StatusCode != http.StatusOK {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("GET request to %s failed (%d): %s", cleanIRI.String(), resp.StatusCode, resp.Status)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						b, err := ioutil.ReadAll(resp.Body)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if len(b) == 0 {
 | 
				
			||||||
 | 
							return nil, errors.New("dereferenceByNodeInfo: response bytes was len 0")
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						wellKnownResp := &apimodel.WellKnownResponse{}
 | 
				
			||||||
 | 
						if err := json.Unmarshal(b, wellKnownResp); err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("dereferenceByNodeInfo: could not unmarshal server response as WellKnownResponse: %s", err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// look through the links for the first one that matches the nodeinfo schema, this is what we need
 | 
				
			||||||
 | 
						var nodeinfoHref *url.URL
 | 
				
			||||||
 | 
						for _, l := range wellKnownResp.Links {
 | 
				
			||||||
 | 
							if l.Href == "" || !strings.HasPrefix(l.Rel, "http://nodeinfo.diaspora.software/ns/schema") {
 | 
				
			||||||
 | 
								continue
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							nodeinfoHref, err = url.Parse(l.Href)
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								return nil, fmt.Errorf("dereferenceByNodeInfo: couldn't parse url %s: %s", l.Href, err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if nodeinfoHref == nil {
 | 
				
			||||||
 | 
							return nil, errors.New("could not find nodeinfo rel in well known response")
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					aaaaaaaaaaaaaaaaa // do the second query
 | 
				
			||||||
 | 
						return nil, errors.New("not yet implemented")
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										42
									
								
								internal/transport/derefmedia.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								internal/transport/derefmedia.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,42 @@
 | 
				
			||||||
 | 
					package transport
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
 | 
						"io/ioutil"
 | 
				
			||||||
 | 
						"net/http"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (t *transport) DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error) {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "DereferenceMedia")
 | 
				
			||||||
 | 
						l.Debugf("performing GET to %s", iri.String())
 | 
				
			||||||
 | 
						req, err := http.NewRequest("GET", iri.String(), nil)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						req = req.WithContext(c)
 | 
				
			||||||
 | 
						if expectedContentType == "" {
 | 
				
			||||||
 | 
							req.Header.Add("Accept", "*/*")
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							req.Header.Add("Accept", expectedContentType)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
				
			||||||
 | 
						req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
				
			||||||
 | 
						req.Header.Set("Host", iri.Host)
 | 
				
			||||||
 | 
						t.getSignerMu.Lock()
 | 
				
			||||||
 | 
						err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
				
			||||||
 | 
						t.getSignerMu.Unlock()
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						resp, err := t.client.Do(req)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						defer resp.Body.Close()
 | 
				
			||||||
 | 
						if resp.StatusCode != http.StatusOK {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return ioutil.ReadAll(resp.Body)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										48
									
								
								internal/transport/finger.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										48
									
								
								internal/transport/finger.go
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,48 @@
 | 
				
			||||||
 | 
					package transport
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"context"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
 | 
						"io/ioutil"
 | 
				
			||||||
 | 
						"net/http"
 | 
				
			||||||
 | 
						"net/url"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (t *transport) Finger(c context.Context, targetUsername string, targetDomain string) ([]byte, error) {
 | 
				
			||||||
 | 
						l := t.log.WithField("func", "Finger")
 | 
				
			||||||
 | 
						urlString := fmt.Sprintf("https://%s/.well-known/webfinger?resource=acct:%s@%s", targetDomain, targetUsername, targetDomain)
 | 
				
			||||||
 | 
						l.Debugf("performing GET to %s", urlString)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						iri, err := url.Parse(urlString)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("Finger: error parsing url %s: %s", urlString, err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						l.Debugf("performing GET to %s", iri.String())
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						req, err := http.NewRequest("GET", iri.String(), nil)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						req = req.WithContext(c)
 | 
				
			||||||
 | 
						req.Header.Add("Accept", "application/json")
 | 
				
			||||||
 | 
						req.Header.Add("Accept", "application/jrd+json")
 | 
				
			||||||
 | 
						req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
				
			||||||
 | 
						req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
				
			||||||
 | 
						req.Header.Set("Host", iri.Host)
 | 
				
			||||||
 | 
						t.getSignerMu.Lock()
 | 
				
			||||||
 | 
						err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
				
			||||||
 | 
						t.getSignerMu.Unlock()
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						resp, err := t.client.Do(req)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						defer resp.Body.Close()
 | 
				
			||||||
 | 
						if resp.StatusCode != http.StatusOK {
 | 
				
			||||||
 | 
							return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return ioutil.ReadAll(resp.Body)
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -3,18 +3,13 @@ package transport
 | 
				
			||||||
import (
 | 
					import (
 | 
				
			||||||
	"context"
 | 
						"context"
 | 
				
			||||||
	"crypto"
 | 
						"crypto"
 | 
				
			||||||
	"encoding/json"
 | 
					 | 
				
			||||||
	"errors"
 | 
					 | 
				
			||||||
	"fmt"
 | 
					 | 
				
			||||||
	"io/ioutil"
 | 
					 | 
				
			||||||
	"net/http"
 | 
					 | 
				
			||||||
	"net/url"
 | 
						"net/url"
 | 
				
			||||||
	"sync"
 | 
						"sync"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"github.com/go-fed/activity/pub"
 | 
						"github.com/go-fed/activity/pub"
 | 
				
			||||||
	"github.com/go-fed/httpsig"
 | 
						"github.com/go-fed/httpsig"
 | 
				
			||||||
	"github.com/sirupsen/logrus"
 | 
						"github.com/sirupsen/logrus"
 | 
				
			||||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
						"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Transport wraps the pub.Transport interface with some additional
 | 
					// Transport wraps the pub.Transport interface with some additional
 | 
				
			||||||
| 
						 | 
					@ -24,7 +19,7 @@ type Transport interface {
 | 
				
			||||||
	// DereferenceMedia fetches the bytes of the given media attachment IRI, with the expectedContentType.
 | 
						// DereferenceMedia fetches the bytes of the given media attachment IRI, with the expectedContentType.
 | 
				
			||||||
	DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error)
 | 
						DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error)
 | 
				
			||||||
	// DereferenceInstance dereferences remote instance information, first by checking /api/v1/instance, and then by checking /.well-known/nodeinfo.
 | 
						// DereferenceInstance dereferences remote instance information, first by checking /api/v1/instance, and then by checking /.well-known/nodeinfo.
 | 
				
			||||||
	DereferenceInstance(c context.Context, iri *url.URL) (*apimodel.Instance, error)
 | 
						DereferenceInstance(c context.Context, iri *url.URL) (*gtsmodel.Instance, error)
 | 
				
			||||||
	// Finger performs a webfinger request with the given username and domain, and returns the bytes from the response body.
 | 
						// Finger performs a webfinger request with the given username and domain, and returns the bytes from the response body.
 | 
				
			||||||
	Finger(c context.Context, targetUsername string, targetDomains string) ([]byte, error)
 | 
						Finger(c context.Context, targetUsername string, targetDomains string) ([]byte, error)
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -42,173 +37,3 @@ type transport struct {
 | 
				
			||||||
	getSignerMu  *sync.Mutex
 | 
						getSignerMu  *sync.Mutex
 | 
				
			||||||
	log          *logrus.Logger
 | 
						log          *logrus.Logger
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					 | 
				
			||||||
func (t *transport) BatchDeliver(c context.Context, b []byte, recipients []*url.URL) error {
 | 
					 | 
				
			||||||
	return t.sigTransport.BatchDeliver(c, b, recipients)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (t *transport) Deliver(c context.Context, b []byte, to *url.URL) error {
 | 
					 | 
				
			||||||
	l := t.log.WithField("func", "Deliver")
 | 
					 | 
				
			||||||
	l.Debugf("performing POST to %s", to.String())
 | 
					 | 
				
			||||||
	return t.sigTransport.Deliver(c, b, to)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (t *transport) Dereference(c context.Context, iri *url.URL) ([]byte, error) {
 | 
					 | 
				
			||||||
	l := t.log.WithField("func", "Dereference")
 | 
					 | 
				
			||||||
	l.Debugf("performing GET to %s", iri.String())
 | 
					 | 
				
			||||||
	return t.sigTransport.Dereference(c, iri)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (t *transport) DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error) {
 | 
					 | 
				
			||||||
	l := t.log.WithField("func", "DereferenceMedia")
 | 
					 | 
				
			||||||
	l.Debugf("performing GET to %s", iri.String())
 | 
					 | 
				
			||||||
	req, err := http.NewRequest("GET", iri.String(), nil)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	req = req.WithContext(c)
 | 
					 | 
				
			||||||
	if expectedContentType == "" {
 | 
					 | 
				
			||||||
		req.Header.Add("Accept", "*/*")
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		req.Header.Add("Accept", expectedContentType)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
					 | 
				
			||||||
	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
					 | 
				
			||||||
	req.Header.Set("Host", iri.Host)
 | 
					 | 
				
			||||||
	t.getSignerMu.Lock()
 | 
					 | 
				
			||||||
	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
					 | 
				
			||||||
	t.getSignerMu.Unlock()
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	resp, err := t.client.Do(req)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	defer resp.Body.Close()
 | 
					 | 
				
			||||||
	if resp.StatusCode != http.StatusOK {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	return ioutil.ReadAll(resp.Body)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (t *transport) Finger(c context.Context, targetUsername string, targetDomain string) ([]byte, error) {
 | 
					 | 
				
			||||||
	l := t.log.WithField("func", "Finger")
 | 
					 | 
				
			||||||
	urlString := fmt.Sprintf("https://%s/.well-known/webfinger?resource=acct:%s@%s", targetDomain, targetUsername, targetDomain)
 | 
					 | 
				
			||||||
	l.Debugf("performing GET to %s", urlString)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	iri, err := url.Parse(urlString)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("Finger: error parsing url %s: %s", urlString, err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	l.Debugf("performing GET to %s", iri.String())
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	req, err := http.NewRequest("GET", iri.String(), nil)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	req = req.WithContext(c)
 | 
					 | 
				
			||||||
	req.Header.Add("Accept", "application/json")
 | 
					 | 
				
			||||||
	req.Header.Add("Accept", "application/jrd+json")
 | 
					 | 
				
			||||||
	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
					 | 
				
			||||||
	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
					 | 
				
			||||||
	req.Header.Set("Host", iri.Host)
 | 
					 | 
				
			||||||
	t.getSignerMu.Lock()
 | 
					 | 
				
			||||||
	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
					 | 
				
			||||||
	t.getSignerMu.Unlock()
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	resp, err := t.client.Do(req)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	defer resp.Body.Close()
 | 
					 | 
				
			||||||
	if resp.StatusCode != http.StatusOK {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	return ioutil.ReadAll(resp.Body)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (t *transport) DereferenceInstance(c context.Context, iri *url.URL) (*apimodel.Instance, error) {
 | 
					 | 
				
			||||||
	l := t.log.WithField("func", "DereferenceInstance")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	var i *apimodel.Instance
 | 
					 | 
				
			||||||
	var err error
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// First try to dereference using /api/v1/instance.
 | 
					 | 
				
			||||||
	// This will provide the most complete picture of an instance, and avoid unnecessary api calls.
 | 
					 | 
				
			||||||
	//
 | 
					 | 
				
			||||||
	// This will only work with Mastodon-api compatible instances: Mastodon, some Pleroma instances, GoToSocial.
 | 
					 | 
				
			||||||
	l.Debugf("trying to dereference instance %s by /api/v1/instance", iri.Host)
 | 
					 | 
				
			||||||
	i, err = dereferenceByAPIV1Instance(t, c, iri)
 | 
					 | 
				
			||||||
	if err == nil {
 | 
					 | 
				
			||||||
		l.Debugf("successfully dereferenced instance using /api/v1/instance")
 | 
					 | 
				
			||||||
		return i, nil
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	l.Debugf("couldn't dereference instance using /api/v1/instance: %s", err)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If that doesn't work, try to dereference using /.well-known/nodeinfo.
 | 
					 | 
				
			||||||
	// This will involve two API calls and return less info overall, but should be more widely compatible.
 | 
					 | 
				
			||||||
	l.Debugf("trying to dereference instance %s by /.well-known/nodeinfo", iri.Host)
 | 
					 | 
				
			||||||
	i, err = dereferenceByNodeInfo(t, c, iri)
 | 
					 | 
				
			||||||
	if err == nil {
 | 
					 | 
				
			||||||
		l.Debugf("successfully dereferenced instance using /.well-known/nodeinfo")
 | 
					 | 
				
			||||||
		return i, nil
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	l.Debugf("couldn't dereference instance using /.well-known/nodeinfo: %s", err)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return nil, fmt.Errorf("couldn't dereference instance %s using either /api/v1/instance or /.well-known/nodeinfo", iri.Host)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func dereferenceByAPIV1Instance(t *transport, c context.Context, iri *url.URL) (*apimodel.Instance, error) {
 | 
					 | 
				
			||||||
	l := t.log.WithField("func", "dereferenceByAPIV1Instance")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	cleanIRI := &url.URL{
 | 
					 | 
				
			||||||
		Scheme: iri.Scheme,
 | 
					 | 
				
			||||||
		Host:   iri.Host,
 | 
					 | 
				
			||||||
		Path:   "api/v1/instance",
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	l.Debugf("performing GET to %s", cleanIRI.String())
 | 
					 | 
				
			||||||
	req, err := http.NewRequest("GET", cleanIRI.String(), nil)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	req = req.WithContext(c)
 | 
					 | 
				
			||||||
	req.Header.Add("Accept", "application/json")
 | 
					 | 
				
			||||||
	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT")
 | 
					 | 
				
			||||||
	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent))
 | 
					 | 
				
			||||||
	req.Header.Set("Host", cleanIRI.Host)
 | 
					 | 
				
			||||||
	t.getSignerMu.Lock()
 | 
					 | 
				
			||||||
	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil)
 | 
					 | 
				
			||||||
	t.getSignerMu.Unlock()
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	resp, err := t.client.Do(req)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	defer resp.Body.Close()
 | 
					 | 
				
			||||||
	if resp.StatusCode != http.StatusOK {
 | 
					 | 
				
			||||||
		return nil, fmt.Errorf("GET request to %s failed (%d): %s", cleanIRI.String(), resp.StatusCode, resp.Status)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	b, err := ioutil.ReadAll(resp.Body)
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// try to parse the returned bytes directly into an Instance model
 | 
					 | 
				
			||||||
	i := &apimodel.Instance{}
 | 
					 | 
				
			||||||
	if err := json.Unmarshal(b, i); err != nil {
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return i, nil
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func dereferenceByNodeInfo(t *transport, c context.Context, iri *url.URL) (*apimodel.Instance, error) {
 | 
					 | 
				
			||||||
	return nil, errors.New("not yet implemented")
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue