mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 22:22:25 -05:00 
			
		
		
		
	mess about with some structure to help w/ deref
This commit is contained in:
		
					parent
					
						
							
								18c39ad23d
							
						
					
				
			
			
				commit
				
					
						f2041f9be3
					
				
			
		
					 13 changed files with 594 additions and 402 deletions
				
			
		|  | @ -35,9 +35,6 @@ import ( | ||||||
| 	"github.com/go-fed/httpsig" | 	"github.com/go-fed/httpsig" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/db" | 	"github.com/superseriousbusiness/gotosocial/internal/db" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/transport" |  | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/typeutils" |  | ||||||
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" |  | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| /* | /* | ||||||
|  | @ -100,11 +97,14 @@ func getPublicKeyFromResponse(c context.Context, b []byte, keyID *url.URL) (voca | ||||||
| 
 | 
 | ||||||
| // AuthenticateFederatedRequest authenticates any kind of incoming federated request from a remote server. This includes things like | // AuthenticateFederatedRequest authenticates any kind of incoming federated request from a remote server. This includes things like | ||||||
| // GET requests for dereferencing our users or statuses etc, and POST requests for delivering new Activities. The function returns | // GET requests for dereferencing our users or statuses etc, and POST requests for delivering new Activities. The function returns | ||||||
| // the URL of the owner of the public key used in the http signature. | // the URL of the owner of the public key used in the requesting http signature. | ||||||
| // | // | ||||||
| // Authenticate in this case is defined as just making sure that the http request is actually signed by whoever claims | // Authenticate in this case is defined as making sure that the http request is actually signed by whoever claims | ||||||
| // to have signed it, by fetching the public key from the signature and checking it against the remote public key. This function | // to have signed it, by fetching the public key from the signature and checking it against the remote public key. | ||||||
| // *does not* check whether the request is authorized, only whether it's authentic. | // | ||||||
|  | // To avoid making unnecessary http calls towards blocked domains, this function *does* bail early if an instance-level domain block exists | ||||||
|  | // for the request from the incoming domain. However, it does not check whether individual blocks exist between the requesting user or domain | ||||||
|  | // and the requested user: this should be done elsewhere. | ||||||
| // | // | ||||||
| // The provided username will be used to generate a transport for making remote requests/derefencing the public key ID of the request signature. | // The provided username will be used to generate a transport for making remote requests/derefencing the public key ID of the request signature. | ||||||
| // Ideally you should pass in the username of the user *being requested*, so that the remote server can decide how to handle the request based on who's making it. | // Ideally you should pass in the username of the user *being requested*, so that the remote server can decide how to handle the request based on who's making it. | ||||||
|  | @ -115,7 +115,12 @@ func getPublicKeyFromResponse(c context.Context, b []byte, keyID *url.URL) (voca | ||||||
| // | // | ||||||
| // Also note that this function *does not* dereference the remote account that the signature key is associated with. | // Also note that this function *does not* dereference the remote account that the signature key is associated with. | ||||||
| // Other functions should use the returned URL to dereference the remote account, if required. | // Other functions should use the returned URL to dereference the remote account, if required. | ||||||
| func (f *federator) AuthenticateFederatedRequest(username string, r *http.Request) (*url.URL, error) { | func (f *federator) AuthenticateFederatedRequest(requestedUsername string, r *http.Request) (*url.URL, error) { | ||||||
|  | 
 | ||||||
|  | 	var publicKey interface{} | ||||||
|  | 	var pkOwnerURI *url.URL | ||||||
|  | 	var err error | ||||||
|  | 
 | ||||||
| 	// set this extra field for signature validation | 	// set this extra field for signature validation | ||||||
| 	r.Header.Set("host", f.config.Host) | 	r.Header.Set("host", f.config.Host) | ||||||
| 
 | 
 | ||||||
|  | @ -131,8 +136,15 @@ func (f *federator) AuthenticateFederatedRequest(username string, r *http.Reques | ||||||
| 		return nil, fmt.Errorf("could not parse key id into a url: %s", err) | 		return nil, fmt.Errorf("could not parse key id into a url: %s", err) | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	var publicKey interface{} | 	// if the domain is blocked we want to make as few calls towards it as possible, so already bail here if that's the case! | ||||||
| 	var pkOwnerURI *url.URL | 	blockedDomain, err := f.blockedDomain(requestingPublicKeyID.Host) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("could not tell if domain %s was blocked or not: %s", requestingPublicKeyID.Host, err) | ||||||
|  | 	} | ||||||
|  | 	if blockedDomain { | ||||||
|  | 		return nil, fmt.Errorf("host %s was domain blocked, aborting auth", requestingPublicKeyID.Host) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
| 	requestingRemoteAccount := >smodel.Account{} | 	requestingRemoteAccount := >smodel.Account{} | ||||||
| 	requestingLocalAccount := >smodel.Account{} | 	requestingLocalAccount := >smodel.Account{} | ||||||
| 	requestingHost := requestingPublicKeyID.Host | 	requestingHost := requestingPublicKeyID.Host | ||||||
|  | @ -159,7 +171,7 @@ func (f *federator) AuthenticateFederatedRequest(username string, r *http.Reques | ||||||
| 		// REMOTE ACCOUNT REQUEST WITHOUT KEY CACHED LOCALLY | 		// REMOTE ACCOUNT REQUEST WITHOUT KEY CACHED LOCALLY | ||||||
| 		// the request is remote and we don't have the public key yet, | 		// the request is remote and we don't have the public key yet, | ||||||
| 		// so we need to authenticate the request properly by dereferencing the remote key | 		// so we need to authenticate the request properly by dereferencing the remote key | ||||||
| 		transport, err := f.GetTransportForUser(username) | 		transport, err := f.GetTransportForUser(requestedUsername) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return nil, fmt.Errorf("transport err: %s", err) | 			return nil, fmt.Errorf("transport err: %s", err) | ||||||
| 		} | 		} | ||||||
|  | @ -214,161 +226,19 @@ func (f *federator) AuthenticateFederatedRequest(username string, r *http.Reques | ||||||
| 	return pkOwnerURI, nil | 	return pkOwnerURI, nil | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func (f *federator) DereferenceRemoteAccount(username string, remoteAccountID *url.URL) (typeutils.Accountable, error) { | func (f *federator) blockedDomain(host string) (bool, error) { | ||||||
| 
 | 	b := >smodel.DomainBlock{} | ||||||
| 	transport, err := f.GetTransportForUser(username) | 	err := f.db.GetWhere([]db.Where{{Key: "domain", Value: host, CaseInsensitive: true}}, b) | ||||||
| 	if err != nil { | 	if err == nil { | ||||||
| 		return nil, fmt.Errorf("transport err: %s", err) | 		// block exists | ||||||
|  | 		return true, nil | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	b, err := transport.Dereference(context.Background(), remoteAccountID) | 	if _, ok := err.(db.ErrNoEntries); ok { | ||||||
| 	if err != nil { | 		// there are no entries so there's no block | ||||||
| 		return nil, fmt.Errorf("error deferencing %s: %s", remoteAccountID.String(), err) | 		return false, nil | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	m := make(map[string]interface{}) | 	// there's an actual error | ||||||
| 	if err := json.Unmarshal(b, &m); err != nil { | 	return false, err | ||||||
| 		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	t, err := streams.ToType(context.Background(), m) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	switch t.GetTypeName() { |  | ||||||
| 	case string(gtsmodel.ActivityStreamsPerson): |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsPerson) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as activitystreams person") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case string(gtsmodel.ActivityStreamsApplication): |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsApplication) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as activitystreams application") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case string(gtsmodel.ActivityStreamsService): |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsService) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as activitystreams service") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName()) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (f *federator) DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) { |  | ||||||
| 	transport, err := f.GetTransportForUser(username) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("transport err: %s", err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	b, err := transport.Dereference(context.Background(), remoteStatusID) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error deferencing %s: %s", remoteStatusID.String(), err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	m := make(map[string]interface{}) |  | ||||||
| 	if err := json.Unmarshal(b, &m); err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	t, err := streams.ToType(context.Background(), m) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	// Article, Document, Image, Video, Note, Page, Event, Place, Mention, Profile |  | ||||||
| 	switch t.GetTypeName() { |  | ||||||
| 	case gtsmodel.ActivityStreamsArticle: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsArticle) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsArticle") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsDocument: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsDocument) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsDocument") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsImage: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsImage) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsImage") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsVideo: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsVideo) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsVideo") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsNote: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsNote) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsNote") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsPage: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsPage) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsPage") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsEvent: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsEvent) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsEvent") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsPlace: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsPlace) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsPlace") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	case gtsmodel.ActivityStreamsProfile: |  | ||||||
| 		p, ok := t.(vocab.ActivityStreamsProfile) |  | ||||||
| 		if !ok { |  | ||||||
| 			return nil, errors.New("error resolving type as ActivityStreamsProfile") |  | ||||||
| 		} |  | ||||||
| 		return p, nil |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName()) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (f *federator) DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*apimodel.Instance, error) { |  | ||||||
| 	transport, err := f.GetTransportForUser(username) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("transport err: %s", err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	return transport.DereferenceInstance(context.Background(), remoteInstanceURI) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (f *federator) GetTransportForUser(username string) (transport.Transport, error) { |  | ||||||
| 	// We need an account to use to create a transport for dereferecing the signature. |  | ||||||
| 	// If a username has been given, we can fetch the account with that username and use it. |  | ||||||
| 	// Otherwise, we can take the instance account and use those credentials to make the request. |  | ||||||
| 	ourAccount := >smodel.Account{} |  | ||||||
| 	var u string |  | ||||||
| 	if username == "" { |  | ||||||
| 		u = f.config.Host |  | ||||||
| 	} else { |  | ||||||
| 		u = username |  | ||||||
| 	} |  | ||||||
| 	if err := f.db.GetLocalAccountByUsername(u, ourAccount); err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error getting account %s from db: %s", username, err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	transport, err := f.transportController.NewTransport(ourAccount.PublicKeyURI, ourAccount.PrivateKey) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error creating transport for user %s: %s", username, err) |  | ||||||
| 	} |  | ||||||
| 	return transport, nil |  | ||||||
| } | } | ||||||
|  | @ -20,15 +20,10 @@ package federation | ||||||
| 
 | 
 | ||||||
| import ( | import ( | ||||||
| 	"context" | 	"context" | ||||||
| 	"fmt" |  | ||||||
| 	"net/http" | 	"net/http" | ||||||
| 	"net/url" |  | ||||||
| 
 | 
 | ||||||
| 	"github.com/go-fed/activity/pub" |  | ||||||
| 	"github.com/go-fed/activity/streams" | 	"github.com/go-fed/activity/streams" | ||||||
| 	"github.com/go-fed/activity/streams/vocab" | 	"github.com/go-fed/activity/streams/vocab" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" |  | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/util" |  | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| /* | /* | ||||||
|  | @ -101,53 +96,3 @@ func (f *federator) GetOutbox(ctx context.Context, r *http.Request) (vocab.Activ | ||||||
| 	// the CLIENT API, not through the federation API, so we just do nothing here. | 	// the CLIENT API, not through the federation API, so we just do nothing here. | ||||||
| 	return streams.NewActivityStreamsOrderedCollectionPage(), nil | 	return streams.NewActivityStreamsOrderedCollectionPage(), nil | ||||||
| } | } | ||||||
| 
 |  | ||||||
| // NewTransport returns a new Transport on behalf of a specific actor. |  | ||||||
| // |  | ||||||
| // The actorBoxIRI will be either the inbox or outbox of an actor who is |  | ||||||
| // attempting to do the dereferencing or delivery. Any authentication |  | ||||||
| // scheme applied on the request must be based on this actor. The |  | ||||||
| // request must contain some sort of credential of the user, such as a |  | ||||||
| // HTTP Signature. |  | ||||||
| // |  | ||||||
| // The gofedAgent passed in should be used by the Transport |  | ||||||
| // implementation in the User-Agent, as well as the application-specific |  | ||||||
| // user agent string. The gofedAgent will indicate this library's use as |  | ||||||
| // well as the library's version number. |  | ||||||
| // |  | ||||||
| // Any server-wide rate-limiting that needs to occur should happen in a |  | ||||||
| // Transport implementation. This factory function allows this to be |  | ||||||
| // created, so peer servers are not DOS'd. |  | ||||||
| // |  | ||||||
| // Any retry logic should also be handled by the Transport |  | ||||||
| // implementation. |  | ||||||
| // |  | ||||||
| // Note that the library will not maintain a long-lived pointer to the |  | ||||||
| // returned Transport so that any private credentials are able to be |  | ||||||
| // garbage collected. |  | ||||||
| func (f *federator) NewTransport(ctx context.Context, actorBoxIRI *url.URL, gofedAgent string) (pub.Transport, error) { |  | ||||||
| 
 |  | ||||||
| 	var username string |  | ||||||
| 	var err error |  | ||||||
| 
 |  | ||||||
| 	if util.IsInboxPath(actorBoxIRI) { |  | ||||||
| 		username, err = util.ParseInboxPath(actorBoxIRI) |  | ||||||
| 		if err != nil { |  | ||||||
| 			return nil, fmt.Errorf("couldn't parse path %s as an inbox: %s", actorBoxIRI.String(), err) |  | ||||||
| 		} |  | ||||||
| 	} else if util.IsOutboxPath(actorBoxIRI) { |  | ||||||
| 		username, err = util.ParseOutboxPath(actorBoxIRI) |  | ||||||
| 		if err != nil { |  | ||||||
| 			return nil, fmt.Errorf("couldn't parse path %s as an outbox: %s", actorBoxIRI.String(), err) |  | ||||||
| 		} |  | ||||||
| 	} else { |  | ||||||
| 		return nil, fmt.Errorf("id %s was neither an inbox path nor an outbox path", actorBoxIRI.String()) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	account := >smodel.Account{} |  | ||||||
| 	if err := f.db.GetLocalAccountByUsername(username, account); err != nil { |  | ||||||
| 		return nil, fmt.Errorf("error getting account with username %s from the db: %s", username, err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	return f.transportController.NewTransport(account.PublicKeyURI, account.PrivateKey) |  | ||||||
| } |  | ||||||
|  |  | ||||||
							
								
								
									
										151
									
								
								internal/federation/dereference.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										151
									
								
								internal/federation/dereference.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,151 @@ | ||||||
|  | package federation | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"encoding/json" | ||||||
|  | 	"errors" | ||||||
|  | 	"fmt" | ||||||
|  | 	"net/url" | ||||||
|  | 
 | ||||||
|  | 	"github.com/go-fed/activity/streams" | ||||||
|  | 	"github.com/go-fed/activity/streams/vocab" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/typeutils" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func (f *federator) DereferenceRemoteAccount(username string, remoteAccountID *url.URL) (typeutils.Accountable, error) { | ||||||
|  | 
 | ||||||
|  | 	transport, err := f.GetTransportForUser(username) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("transport err: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	b, err := transport.Dereference(context.Background(), remoteAccountID) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error deferencing %s: %s", remoteAccountID.String(), err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	m := make(map[string]interface{}) | ||||||
|  | 	if err := json.Unmarshal(b, &m); err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	t, err := streams.ToType(context.Background(), m) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	switch t.GetTypeName() { | ||||||
|  | 	case string(gtsmodel.ActivityStreamsPerson): | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsPerson) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as activitystreams person") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case string(gtsmodel.ActivityStreamsApplication): | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsApplication) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as activitystreams application") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case string(gtsmodel.ActivityStreamsService): | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsService) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as activitystreams service") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName()) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func (f *federator) DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) { | ||||||
|  | 	transport, err := f.GetTransportForUser(username) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("transport err: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	b, err := transport.Dereference(context.Background(), remoteStatusID) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error deferencing %s: %s", remoteStatusID.String(), err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	m := make(map[string]interface{}) | ||||||
|  | 	if err := json.Unmarshal(b, &m); err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	t, err := streams.ToType(context.Background(), m) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// Article, Document, Image, Video, Note, Page, Event, Place, Mention, Profile | ||||||
|  | 	switch t.GetTypeName() { | ||||||
|  | 	case gtsmodel.ActivityStreamsArticle: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsArticle) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsArticle") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsDocument: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsDocument) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsDocument") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsImage: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsImage) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsImage") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsVideo: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsVideo) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsVideo") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsNote: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsNote) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsNote") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsPage: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsPage) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsPage") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsEvent: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsEvent) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsEvent") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsPlace: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsPlace) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsPlace") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	case gtsmodel.ActivityStreamsProfile: | ||||||
|  | 		p, ok := t.(vocab.ActivityStreamsProfile) | ||||||
|  | 		if !ok { | ||||||
|  | 			return nil, errors.New("error resolving type as ActivityStreamsProfile") | ||||||
|  | 		} | ||||||
|  | 		return p, nil | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName()) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func (f *federator) DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*gtsmodel.Instance, error) { | ||||||
|  | 	transport, err := f.GetTransportForUser(username) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("transport err: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	return transport.DereferenceInstance(context.Background(), remoteInstanceURI) | ||||||
|  | } | ||||||
|  | @ -132,9 +132,20 @@ func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWr | ||||||
| 			// there's been an actual error | 			// there's been an actual error | ||||||
| 			return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err) | 			return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err) | ||||||
| 		} | 		} | ||||||
| 		// we don't have an entry for this instance yet so create it | 
 | ||||||
| 		var err error | 		// we don't have an entry for this instance yet so dereference it | ||||||
| 		i, err := f.DereferenceRemoteInstance() | 		i, err = f.DereferenceRemoteInstance(username, &url.URL{ | ||||||
|  | 			Scheme: publicKeyOwnerURI.Scheme, | ||||||
|  | 			Host: publicKeyOwnerURI.Host, | ||||||
|  | 		}) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, false, fmt.Errorf("could not dereference new remote instance %s during AuthenticatePostInbox: %s", publicKeyOwnerURI.Host, err) | ||||||
|  | 		} | ||||||
|  | 
 | ||||||
|  | 		// and put it in the db | ||||||
|  | 		if err := f.db.Put(i); err != nil { | ||||||
|  | 			return nil, false, fmt.Errorf("error inserting newly dereferenced instance %s: %s", publicKeyOwnerURI.Host, err) | ||||||
|  | 		} | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	requestingAccount := >smodel.Account{} | 	requestingAccount := >smodel.Account{} | ||||||
|  |  | ||||||
|  | @ -24,10 +24,10 @@ import ( | ||||||
| 
 | 
 | ||||||
| 	"github.com/go-fed/activity/pub" | 	"github.com/go-fed/activity/pub" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" |  | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/config" | 	"github.com/superseriousbusiness/gotosocial/internal/config" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/db" | 	"github.com/superseriousbusiness/gotosocial/internal/db" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/federation/federatingdb" | 	"github.com/superseriousbusiness/gotosocial/internal/federation/federatingdb" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/transport" | 	"github.com/superseriousbusiness/gotosocial/internal/transport" | ||||||
| 	"github.com/superseriousbusiness/gotosocial/internal/typeutils" | 	"github.com/superseriousbusiness/gotosocial/internal/typeutils" | ||||||
| ) | ) | ||||||
|  | @ -50,8 +50,9 @@ type Federator interface { | ||||||
| 	// DereferenceRemoteStatus can be used to get the representation of a remote status, based on its ID (which is a URI). | 	// DereferenceRemoteStatus can be used to get the representation of a remote status, based on its ID (which is a URI). | ||||||
| 	// The given username will be used to create a transport for making outgoing requests. See the implementation for more detailed comments. | 	// The given username will be used to create a transport for making outgoing requests. See the implementation for more detailed comments. | ||||||
| 	DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) | 	DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) | ||||||
| 	// DereferenceRemoteInstance | 	// DereferenceRemoteInstance takes the URL of a remote instance, and a username (optional) to spin up a transport with. It then | ||||||
| 	DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*apimodel.Instance, error) | 	// does its damnedest to get some kind of information back about the instance, trying /api/v1/instance, then /.well-known/nodeinfo | ||||||
|  | 	DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*gtsmodel.Instance, error) | ||||||
| 	// GetTransportForUser returns a new transport initialized with the key credentials belonging to the given username. | 	// GetTransportForUser returns a new transport initialized with the key credentials belonging to the given username. | ||||||
| 	// This can be used for making signed http requests. | 	// This can be used for making signed http requests. | ||||||
| 	// | 	// | ||||||
|  |  | ||||||
							
								
								
									
										84
									
								
								internal/federation/transport.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										84
									
								
								internal/federation/transport.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,84 @@ | ||||||
|  | package federation | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"fmt" | ||||||
|  | 	"net/url" | ||||||
|  | 
 | ||||||
|  | 	"github.com/go-fed/activity/pub" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/transport" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/util" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | // NewTransport returns a new Transport on behalf of a specific actor. | ||||||
|  | // | ||||||
|  | // The actorBoxIRI will be either the inbox or outbox of an actor who is | ||||||
|  | // attempting to do the dereferencing or delivery. Any authentication | ||||||
|  | // scheme applied on the request must be based on this actor. The | ||||||
|  | // request must contain some sort of credential of the user, such as a | ||||||
|  | // HTTP Signature. | ||||||
|  | // | ||||||
|  | // The gofedAgent passed in should be used by the Transport | ||||||
|  | // implementation in the User-Agent, as well as the application-specific | ||||||
|  | // user agent string. The gofedAgent will indicate this library's use as | ||||||
|  | // well as the library's version number. | ||||||
|  | // | ||||||
|  | // Any server-wide rate-limiting that needs to occur should happen in a | ||||||
|  | // Transport implementation. This factory function allows this to be | ||||||
|  | // created, so peer servers are not DOS'd. | ||||||
|  | // | ||||||
|  | // Any retry logic should also be handled by the Transport | ||||||
|  | // implementation. | ||||||
|  | // | ||||||
|  | // Note that the library will not maintain a long-lived pointer to the | ||||||
|  | // returned Transport so that any private credentials are able to be | ||||||
|  | // garbage collected. | ||||||
|  | func (f *federator) NewTransport(ctx context.Context, actorBoxIRI *url.URL, gofedAgent string) (pub.Transport, error) { | ||||||
|  | 
 | ||||||
|  | 	var username string | ||||||
|  | 	var err error | ||||||
|  | 
 | ||||||
|  | 	if util.IsInboxPath(actorBoxIRI) { | ||||||
|  | 		username, err = util.ParseInboxPath(actorBoxIRI) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, fmt.Errorf("couldn't parse path %s as an inbox: %s", actorBoxIRI.String(), err) | ||||||
|  | 		} | ||||||
|  | 	} else if util.IsOutboxPath(actorBoxIRI) { | ||||||
|  | 		username, err = util.ParseOutboxPath(actorBoxIRI) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, fmt.Errorf("couldn't parse path %s as an outbox: %s", actorBoxIRI.String(), err) | ||||||
|  | 		} | ||||||
|  | 	} else { | ||||||
|  | 		return nil, fmt.Errorf("id %s was neither an inbox path nor an outbox path", actorBoxIRI.String()) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	account := >smodel.Account{} | ||||||
|  | 	if err := f.db.GetLocalAccountByUsername(username, account); err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error getting account with username %s from the db: %s", username, err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	return f.transportController.NewTransport(account.PublicKeyURI, account.PrivateKey) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func (f *federator) GetTransportForUser(username string) (transport.Transport, error) { | ||||||
|  | 	// We need an account to use to create a transport for dereferecing something. | ||||||
|  | 	// If a username has been given, we can fetch the account with that username and use it. | ||||||
|  | 	// Otherwise, we can take the instance account and use those credentials to make the request. | ||||||
|  | 	ourAccount := >smodel.Account{} | ||||||
|  | 	var u string | ||||||
|  | 	if username == "" { | ||||||
|  | 		u = f.config.Host | ||||||
|  | 	} else { | ||||||
|  | 		u = username | ||||||
|  | 	} | ||||||
|  | 	if err := f.db.GetLocalAccountByUsername(u, ourAccount); err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error getting account %s from db: %s", username, err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	transport, err := f.transportController.NewTransport(ourAccount.PublicKeyURI, ourAccount.PrivateKey) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("error creating transport for user %s: %s", username, err) | ||||||
|  | 	} | ||||||
|  | 	return transport, nil | ||||||
|  | } | ||||||
|  | @ -28,6 +28,8 @@ type Instance struct { | ||||||
| 	Terms string | 	Terms string | ||||||
| 	// Contact email address for this instance | 	// Contact email address for this instance | ||||||
| 	ContactEmail string | 	ContactEmail string | ||||||
|  | 	// Username of the contact account for this instance | ||||||
|  | 	ContactAccountUsername string | ||||||
| 	// Contact account ID in the database for this instance | 	// Contact account ID in the database for this instance | ||||||
| 	ContactAccountID string `pg:"type:CHAR(26)"` | 	ContactAccountID string `pg:"type:CHAR(26)"` | ||||||
| 	// Reputation score of this instance | 	// Reputation score of this instance | ||||||
|  |  | ||||||
							
								
								
									
										16
									
								
								internal/transport/deliver.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								internal/transport/deliver.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,16 @@ | ||||||
|  | package transport | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"net/url" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func (t *transport) BatchDeliver(c context.Context, b []byte, recipients []*url.URL) error { | ||||||
|  | 	return t.sigTransport.BatchDeliver(c, b, recipients) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func (t *transport) Deliver(c context.Context, b []byte, to *url.URL) error { | ||||||
|  | 	l := t.log.WithField("func", "Deliver") | ||||||
|  | 	l.Debugf("performing POST to %s", to.String()) | ||||||
|  | 	return t.sigTransport.Deliver(c, b, to) | ||||||
|  | } | ||||||
							
								
								
									
										12
									
								
								internal/transport/dereference.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								internal/transport/dereference.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,12 @@ | ||||||
|  | package transport | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"net/url" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func (t *transport) Dereference(c context.Context, iri *url.URL) ([]byte, error) { | ||||||
|  | 	l := t.log.WithField("func", "Dereference") | ||||||
|  | 	l.Debugf("performing GET to %s", iri.String()) | ||||||
|  | 	return t.sigTransport.Dereference(c, iri) | ||||||
|  | } | ||||||
							
								
								
									
										185
									
								
								internal/transport/derefinstance.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										185
									
								
								internal/transport/derefinstance.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,185 @@ | ||||||
|  | package transport | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"encoding/json" | ||||||
|  | 	"errors" | ||||||
|  | 	"fmt" | ||||||
|  | 	"io/ioutil" | ||||||
|  | 	"net/http" | ||||||
|  | 	"net/url" | ||||||
|  | 	"strings" | ||||||
|  | 
 | ||||||
|  | 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||||
|  | 	"github.com/superseriousbusiness/gotosocial/internal/id" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func (t *transport) DereferenceInstance(c context.Context, iri *url.URL) (*gtsmodel.Instance, error) { | ||||||
|  | 	l := t.log.WithField("func", "DereferenceInstance") | ||||||
|  | 
 | ||||||
|  | 	var i *gtsmodel.Instance | ||||||
|  | 	var err error | ||||||
|  | 
 | ||||||
|  | 	// First try to dereference using /api/v1/instance. | ||||||
|  | 	// This will provide the most complete picture of an instance, and avoid unnecessary api calls. | ||||||
|  | 	// | ||||||
|  | 	// This will only work with Mastodon-api compatible instances: Mastodon, some Pleroma instances, GoToSocial. | ||||||
|  | 	l.Debugf("trying to dereference instance %s by /api/v1/instance", iri.Host) | ||||||
|  | 	i, err = dereferenceByAPIV1Instance(t, c, iri) | ||||||
|  | 	if err == nil { | ||||||
|  | 		l.Debugf("successfully dereferenced instance using /api/v1/instance") | ||||||
|  | 		return i, nil | ||||||
|  | 	} | ||||||
|  | 	l.Debugf("couldn't dereference instance using /api/v1/instance: %s", err) | ||||||
|  | 
 | ||||||
|  | 	// If that doesn't work, try to dereference using /.well-known/nodeinfo. | ||||||
|  | 	// This will involve two API calls and return less info overall, but should be more widely compatible. | ||||||
|  | 	l.Debugf("trying to dereference instance %s by /.well-known/nodeinfo", iri.Host) | ||||||
|  | 	i, err = dereferenceByNodeInfo(t, c, iri) | ||||||
|  | 	if err == nil { | ||||||
|  | 		l.Debugf("successfully dereferenced instance using /.well-known/nodeinfo") | ||||||
|  | 		return i, nil | ||||||
|  | 	} | ||||||
|  | 	l.Debugf("couldn't dereference instance using /.well-known/nodeinfo: %s", err) | ||||||
|  | 
 | ||||||
|  | 	return nil, fmt.Errorf("couldn't dereference instance %s using either /api/v1/instance or /.well-known/nodeinfo", iri.Host) | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func dereferenceByAPIV1Instance(t *transport, c context.Context, iri *url.URL) (*gtsmodel.Instance, error) { | ||||||
|  | 	l := t.log.WithField("func", "dereferenceByAPIV1Instance") | ||||||
|  | 
 | ||||||
|  | 	cleanIRI := &url.URL{ | ||||||
|  | 		Scheme: iri.Scheme, | ||||||
|  | 		Host:   iri.Host, | ||||||
|  | 		Path:   "api/v1/instance", | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	l.Debugf("performing GET to %s", cleanIRI.String()) | ||||||
|  | 	req, err := http.NewRequest("GET", cleanIRI.String(), nil) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	req = req.WithContext(c) | ||||||
|  | 	req.Header.Add("Accept", "application/json") | ||||||
|  | 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") | ||||||
|  | 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) | ||||||
|  | 	req.Header.Set("Host", cleanIRI.Host) | ||||||
|  | 	t.getSignerMu.Lock() | ||||||
|  | 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) | ||||||
|  | 	t.getSignerMu.Unlock() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	resp, err := t.client.Do(req) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	defer resp.Body.Close() | ||||||
|  | 	if resp.StatusCode != http.StatusOK { | ||||||
|  | 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", cleanIRI.String(), resp.StatusCode, resp.Status) | ||||||
|  | 	} | ||||||
|  | 	b, err := ioutil.ReadAll(resp.Body) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	if len(b) == 0 { | ||||||
|  | 		return nil, errors.New("response bytes was len 0") | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// try to parse the returned bytes directly into an Instance model | ||||||
|  | 	apiResp := &apimodel.Instance{} | ||||||
|  | 	if err := json.Unmarshal(b, apiResp); err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	var contactUsername string | ||||||
|  | 	if apiResp.ContactAccount != nil { | ||||||
|  | 		contactUsername = apiResp.ContactAccount.Username | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	ulid, err := id.NewRandomULID() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	i := >smodel.Instance{ | ||||||
|  | 		ID:                     ulid, | ||||||
|  | 		Domain:                 iri.Host, | ||||||
|  | 		Title:                  apiResp.Title, | ||||||
|  | 		URI:                    fmt.Sprintf("%s://%s", iri.Scheme, iri.Host), | ||||||
|  | 		ShortDescription:       apiResp.ShortDescription, | ||||||
|  | 		Description:            apiResp.Description, | ||||||
|  | 		ContactEmail:           apiResp.Email, | ||||||
|  | 		ContactAccountUsername: contactUsername, | ||||||
|  | 		Version:                apiResp.Version, | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	return i, nil | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func dereferenceByNodeInfo(t *transport, c context.Context, iri *url.URL) (*gtsmodel.Instance, error) { | ||||||
|  | 	l := t.log.WithField("func", "dereferenceByNodeInfo") | ||||||
|  | 
 | ||||||
|  | 	cleanIRI := &url.URL{ | ||||||
|  | 		Scheme: iri.Scheme, | ||||||
|  | 		Host:   iri.Host, | ||||||
|  | 		Path:   ".well-known/nodeinfo", | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	l.Debugf("performing GET to %s", cleanIRI.String()) | ||||||
|  | 	req, err := http.NewRequest("GET", cleanIRI.String(), nil) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	req = req.WithContext(c) | ||||||
|  | 	req.Header.Add("Accept", "application/json") | ||||||
|  | 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") | ||||||
|  | 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) | ||||||
|  | 	req.Header.Set("Host", cleanIRI.Host) | ||||||
|  | 	t.getSignerMu.Lock() | ||||||
|  | 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) | ||||||
|  | 	t.getSignerMu.Unlock() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	resp, err := t.client.Do(req) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	defer resp.Body.Close() | ||||||
|  | 	if resp.StatusCode != http.StatusOK { | ||||||
|  | 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", cleanIRI.String(), resp.StatusCode, resp.Status) | ||||||
|  | 	} | ||||||
|  | 	b, err := ioutil.ReadAll(resp.Body) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	if len(b) == 0 { | ||||||
|  | 		return nil, errors.New("dereferenceByNodeInfo: response bytes was len 0") | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	wellKnownResp := &apimodel.WellKnownResponse{} | ||||||
|  | 	if err := json.Unmarshal(b, wellKnownResp); err != nil { | ||||||
|  | 		return nil, fmt.Errorf("dereferenceByNodeInfo: could not unmarshal server response as WellKnownResponse: %s", err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// look through the links for the first one that matches the nodeinfo schema, this is what we need | ||||||
|  | 	var nodeinfoHref *url.URL | ||||||
|  | 	for _, l := range wellKnownResp.Links { | ||||||
|  | 		if l.Href == "" || !strings.HasPrefix(l.Rel, "http://nodeinfo.diaspora.software/ns/schema") { | ||||||
|  | 			continue | ||||||
|  | 		} | ||||||
|  | 		nodeinfoHref, err = url.Parse(l.Href) | ||||||
|  | 		if err != nil { | ||||||
|  | 			return nil, fmt.Errorf("dereferenceByNodeInfo: couldn't parse url %s: %s", l.Href, err) | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | 	if nodeinfoHref == nil { | ||||||
|  | 		return nil, errors.New("could not find nodeinfo rel in well known response") | ||||||
|  | 	} | ||||||
|  | aaaaaaaaaaaaaaaaa // do the second query | ||||||
|  | 	return nil, errors.New("not yet implemented") | ||||||
|  | } | ||||||
							
								
								
									
										42
									
								
								internal/transport/derefmedia.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								internal/transport/derefmedia.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,42 @@ | ||||||
|  | package transport | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"fmt" | ||||||
|  | 	"io/ioutil" | ||||||
|  | 	"net/http" | ||||||
|  | 	"net/url" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func (t *transport) DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error) { | ||||||
|  | 	l := t.log.WithField("func", "DereferenceMedia") | ||||||
|  | 	l.Debugf("performing GET to %s", iri.String()) | ||||||
|  | 	req, err := http.NewRequest("GET", iri.String(), nil) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	req = req.WithContext(c) | ||||||
|  | 	if expectedContentType == "" { | ||||||
|  | 		req.Header.Add("Accept", "*/*") | ||||||
|  | 	} else { | ||||||
|  | 		req.Header.Add("Accept", expectedContentType) | ||||||
|  | 	} | ||||||
|  | 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") | ||||||
|  | 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) | ||||||
|  | 	req.Header.Set("Host", iri.Host) | ||||||
|  | 	t.getSignerMu.Lock() | ||||||
|  | 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) | ||||||
|  | 	t.getSignerMu.Unlock() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	resp, err := t.client.Do(req) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	defer resp.Body.Close() | ||||||
|  | 	if resp.StatusCode != http.StatusOK { | ||||||
|  | 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status) | ||||||
|  | 	} | ||||||
|  | 	return ioutil.ReadAll(resp.Body) | ||||||
|  | } | ||||||
							
								
								
									
										48
									
								
								internal/transport/finger.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										48
									
								
								internal/transport/finger.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,48 @@ | ||||||
|  | package transport | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"fmt" | ||||||
|  | 	"io/ioutil" | ||||||
|  | 	"net/http" | ||||||
|  | 	"net/url" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func (t *transport) Finger(c context.Context, targetUsername string, targetDomain string) ([]byte, error) { | ||||||
|  | 	l := t.log.WithField("func", "Finger") | ||||||
|  | 	urlString := fmt.Sprintf("https://%s/.well-known/webfinger?resource=acct:%s@%s", targetDomain, targetUsername, targetDomain) | ||||||
|  | 	l.Debugf("performing GET to %s", urlString) | ||||||
|  | 
 | ||||||
|  | 	iri, err := url.Parse(urlString) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, fmt.Errorf("Finger: error parsing url %s: %s", urlString, err) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	l.Debugf("performing GET to %s", iri.String()) | ||||||
|  | 
 | ||||||
|  | 	req, err := http.NewRequest("GET", iri.String(), nil) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	req = req.WithContext(c) | ||||||
|  | 	req.Header.Add("Accept", "application/json") | ||||||
|  | 	req.Header.Add("Accept", "application/jrd+json") | ||||||
|  | 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") | ||||||
|  | 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) | ||||||
|  | 	req.Header.Set("Host", iri.Host) | ||||||
|  | 	t.getSignerMu.Lock() | ||||||
|  | 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) | ||||||
|  | 	t.getSignerMu.Unlock() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	resp, err := t.client.Do(req) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return nil, err | ||||||
|  | 	} | ||||||
|  | 	defer resp.Body.Close() | ||||||
|  | 	if resp.StatusCode != http.StatusOK { | ||||||
|  | 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status) | ||||||
|  | 	} | ||||||
|  | 	return ioutil.ReadAll(resp.Body) | ||||||
|  | } | ||||||
|  | @ -3,18 +3,13 @@ package transport | ||||||
| import ( | import ( | ||||||
| 	"context" | 	"context" | ||||||
| 	"crypto" | 	"crypto" | ||||||
| 	"encoding/json" |  | ||||||
| 	"errors" |  | ||||||
| 	"fmt" |  | ||||||
| 	"io/ioutil" |  | ||||||
| 	"net/http" |  | ||||||
| 	"net/url" | 	"net/url" | ||||||
| 	"sync" | 	"sync" | ||||||
| 
 | 
 | ||||||
| 	"github.com/go-fed/activity/pub" | 	"github.com/go-fed/activity/pub" | ||||||
| 	"github.com/go-fed/httpsig" | 	"github.com/go-fed/httpsig" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||||
| ) | ) | ||||||
| 
 | 
 | ||||||
| // Transport wraps the pub.Transport interface with some additional | // Transport wraps the pub.Transport interface with some additional | ||||||
|  | @ -24,7 +19,7 @@ type Transport interface { | ||||||
| 	// DereferenceMedia fetches the bytes of the given media attachment IRI, with the expectedContentType. | 	// DereferenceMedia fetches the bytes of the given media attachment IRI, with the expectedContentType. | ||||||
| 	DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error) | 	DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error) | ||||||
| 	// DereferenceInstance dereferences remote instance information, first by checking /api/v1/instance, and then by checking /.well-known/nodeinfo. | 	// DereferenceInstance dereferences remote instance information, first by checking /api/v1/instance, and then by checking /.well-known/nodeinfo. | ||||||
| 	DereferenceInstance(c context.Context, iri *url.URL) (*apimodel.Instance, error) | 	DereferenceInstance(c context.Context, iri *url.URL) (*gtsmodel.Instance, error) | ||||||
| 	// Finger performs a webfinger request with the given username and domain, and returns the bytes from the response body. | 	// Finger performs a webfinger request with the given username and domain, and returns the bytes from the response body. | ||||||
| 	Finger(c context.Context, targetUsername string, targetDomains string) ([]byte, error) | 	Finger(c context.Context, targetUsername string, targetDomains string) ([]byte, error) | ||||||
| } | } | ||||||
|  | @ -42,173 +37,3 @@ type transport struct { | ||||||
| 	getSignerMu  *sync.Mutex | 	getSignerMu  *sync.Mutex | ||||||
| 	log          *logrus.Logger | 	log          *logrus.Logger | ||||||
| } | } | ||||||
| 
 |  | ||||||
| func (t *transport) BatchDeliver(c context.Context, b []byte, recipients []*url.URL) error { |  | ||||||
| 	return t.sigTransport.BatchDeliver(c, b, recipients) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (t *transport) Deliver(c context.Context, b []byte, to *url.URL) error { |  | ||||||
| 	l := t.log.WithField("func", "Deliver") |  | ||||||
| 	l.Debugf("performing POST to %s", to.String()) |  | ||||||
| 	return t.sigTransport.Deliver(c, b, to) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (t *transport) Dereference(c context.Context, iri *url.URL) ([]byte, error) { |  | ||||||
| 	l := t.log.WithField("func", "Dereference") |  | ||||||
| 	l.Debugf("performing GET to %s", iri.String()) |  | ||||||
| 	return t.sigTransport.Dereference(c, iri) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (t *transport) DereferenceMedia(c context.Context, iri *url.URL, expectedContentType string) ([]byte, error) { |  | ||||||
| 	l := t.log.WithField("func", "DereferenceMedia") |  | ||||||
| 	l.Debugf("performing GET to %s", iri.String()) |  | ||||||
| 	req, err := http.NewRequest("GET", iri.String(), nil) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	req = req.WithContext(c) |  | ||||||
| 	if expectedContentType == "" { |  | ||||||
| 		req.Header.Add("Accept", "*/*") |  | ||||||
| 	} else { |  | ||||||
| 		req.Header.Add("Accept", expectedContentType) |  | ||||||
| 	} |  | ||||||
| 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") |  | ||||||
| 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) |  | ||||||
| 	req.Header.Set("Host", iri.Host) |  | ||||||
| 	t.getSignerMu.Lock() |  | ||||||
| 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) |  | ||||||
| 	t.getSignerMu.Unlock() |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	resp, err := t.client.Do(req) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	defer resp.Body.Close() |  | ||||||
| 	if resp.StatusCode != http.StatusOK { |  | ||||||
| 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status) |  | ||||||
| 	} |  | ||||||
| 	return ioutil.ReadAll(resp.Body) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (t *transport) Finger(c context.Context, targetUsername string, targetDomain string) ([]byte, error) { |  | ||||||
| 	l := t.log.WithField("func", "Finger") |  | ||||||
| 	urlString := fmt.Sprintf("https://%s/.well-known/webfinger?resource=acct:%s@%s", targetDomain, targetUsername, targetDomain) |  | ||||||
| 	l.Debugf("performing GET to %s", urlString) |  | ||||||
| 
 |  | ||||||
| 	iri, err := url.Parse(urlString) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, fmt.Errorf("Finger: error parsing url %s: %s", urlString, err) |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	l.Debugf("performing GET to %s", iri.String()) |  | ||||||
| 
 |  | ||||||
| 	req, err := http.NewRequest("GET", iri.String(), nil) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	req = req.WithContext(c) |  | ||||||
| 	req.Header.Add("Accept", "application/json") |  | ||||||
| 	req.Header.Add("Accept", "application/jrd+json") |  | ||||||
| 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") |  | ||||||
| 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) |  | ||||||
| 	req.Header.Set("Host", iri.Host) |  | ||||||
| 	t.getSignerMu.Lock() |  | ||||||
| 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) |  | ||||||
| 	t.getSignerMu.Unlock() |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	resp, err := t.client.Do(req) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	defer resp.Body.Close() |  | ||||||
| 	if resp.StatusCode != http.StatusOK { |  | ||||||
| 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", iri.String(), resp.StatusCode, resp.Status) |  | ||||||
| 	} |  | ||||||
| 	return ioutil.ReadAll(resp.Body) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func (t *transport) DereferenceInstance(c context.Context, iri *url.URL) (*apimodel.Instance, error) { |  | ||||||
| 	l := t.log.WithField("func", "DereferenceInstance") |  | ||||||
| 
 |  | ||||||
| 	var i *apimodel.Instance |  | ||||||
| 	var err error |  | ||||||
| 
 |  | ||||||
| 	// First try to dereference using /api/v1/instance. |  | ||||||
| 	// This will provide the most complete picture of an instance, and avoid unnecessary api calls. |  | ||||||
| 	// |  | ||||||
| 	// This will only work with Mastodon-api compatible instances: Mastodon, some Pleroma instances, GoToSocial. |  | ||||||
| 	l.Debugf("trying to dereference instance %s by /api/v1/instance", iri.Host) |  | ||||||
| 	i, err = dereferenceByAPIV1Instance(t, c, iri) |  | ||||||
| 	if err == nil { |  | ||||||
| 		l.Debugf("successfully dereferenced instance using /api/v1/instance") |  | ||||||
| 		return i, nil |  | ||||||
| 	} |  | ||||||
| 	l.Debugf("couldn't dereference instance using /api/v1/instance: %s", err) |  | ||||||
| 
 |  | ||||||
| 	// If that doesn't work, try to dereference using /.well-known/nodeinfo. |  | ||||||
| 	// This will involve two API calls and return less info overall, but should be more widely compatible. |  | ||||||
| 	l.Debugf("trying to dereference instance %s by /.well-known/nodeinfo", iri.Host) |  | ||||||
| 	i, err = dereferenceByNodeInfo(t, c, iri) |  | ||||||
| 	if err == nil { |  | ||||||
| 		l.Debugf("successfully dereferenced instance using /.well-known/nodeinfo") |  | ||||||
| 		return i, nil |  | ||||||
| 	} |  | ||||||
| 	l.Debugf("couldn't dereference instance using /.well-known/nodeinfo: %s", err) |  | ||||||
| 
 |  | ||||||
| 	return nil, fmt.Errorf("couldn't dereference instance %s using either /api/v1/instance or /.well-known/nodeinfo", iri.Host) |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func dereferenceByAPIV1Instance(t *transport, c context.Context, iri *url.URL) (*apimodel.Instance, error) { |  | ||||||
| 	l := t.log.WithField("func", "dereferenceByAPIV1Instance") |  | ||||||
| 
 |  | ||||||
| 	cleanIRI := &url.URL{ |  | ||||||
| 		Scheme: iri.Scheme, |  | ||||||
| 		Host:   iri.Host, |  | ||||||
| 		Path:   "api/v1/instance", |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	l.Debugf("performing GET to %s", cleanIRI.String()) |  | ||||||
| 	req, err := http.NewRequest("GET", cleanIRI.String(), nil) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	req = req.WithContext(c) |  | ||||||
| 	req.Header.Add("Accept", "application/json") |  | ||||||
| 	req.Header.Add("Date", t.clock.Now().UTC().Format("Mon, 02 Jan 2006 15:04:05")+" GMT") |  | ||||||
| 	req.Header.Add("User-Agent", fmt.Sprintf("%s %s", t.appAgent, t.gofedAgent)) |  | ||||||
| 	req.Header.Set("Host", cleanIRI.Host) |  | ||||||
| 	t.getSignerMu.Lock() |  | ||||||
| 	err = t.getSigner.SignRequest(t.privkey, t.pubKeyID, req, nil) |  | ||||||
| 	t.getSignerMu.Unlock() |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	resp, err := t.client.Do(req) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 	defer resp.Body.Close() |  | ||||||
| 	if resp.StatusCode != http.StatusOK { |  | ||||||
| 		return nil, fmt.Errorf("GET request to %s failed (%d): %s", cleanIRI.String(), resp.StatusCode, resp.Status) |  | ||||||
| 	} |  | ||||||
| 	b, err := ioutil.ReadAll(resp.Body) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	// try to parse the returned bytes directly into an Instance model |  | ||||||
| 	i := &apimodel.Instance{} |  | ||||||
| 	if err := json.Unmarshal(b, i); err != nil { |  | ||||||
| 		return nil, err |  | ||||||
| 	} |  | ||||||
| 
 |  | ||||||
| 	return i, nil |  | ||||||
| } |  | ||||||
| 
 |  | ||||||
| func dereferenceByNodeInfo(t *transport, c context.Context, iri *url.URL) (*apimodel.Instance, error) { |  | ||||||
| 	return nil, errors.New("not yet implemented") |  | ||||||
| } |  | ||||||
|  |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue