gancio-upstream/server/federation/helpers.js

550 lines
19 KiB
JavaScript
Raw Normal View History

2020-02-05 00:48:55 +01:00
const axios = require('axios')
2019-07-31 02:01:21 +02:00
const crypto = require('crypto')
2021-09-27 10:42:17 +02:00
const config = require('../config')
const httpSignature = require('@peertube/http-signature')
2024-01-19 00:42:54 +01:00
const { APUser, Instance, Event } = require('../api/models/models')
const dayjs = require('dayjs')
const { Task, TaskManager } = require('../taskManager')
2019-09-11 12:00:13 +02:00
const url = require('url')
2019-09-25 14:38:16 +02:00
const settingsController = require('../api/controller/settings')
2021-03-05 14:17:10 +01:00
const log = require('../log')
2024-01-19 00:42:54 +01:00
const helpers = require('../helpers')
2019-07-30 18:32:26 +02:00
2023-12-28 01:04:16 +01:00
// process.env['NODE_TLS_REJECT_UNAUTHORIZED'] = 0;
2019-07-30 18:32:26 +02:00
const Helpers = {
2024-01-19 00:42:54 +01:00
'@context': [
'https://www.w3.org/ns/activitystreams',
'https://w3id.org/security/v1',
{
toot: 'http://joinmastodon.org/ns#',
// A property-value pair, e.g. representing a feature of a product or place.
// https://docs.joinmastodon.org/spec/activitypub/#PropertyValue
schema: 'http://schema.org#',
ProperyValue: 'schema:PropertyValue',
value: 'schema:value',
// https://docs.joinmastodon.org/spec/activitypub/#discoverable
// This flag may be used as an indicator of the users preferences toward being included
// in external discovery services, such as search engines or other indexing tools
// in gancio is always true
"discoverable": "toot:discoverable",
// https://docs.joinmastodon.org/spec/activitypub/#Hashtag
"Hashtag": "https://www.w3.org/ns/activitystreams#Hashtag",
// supported but always false
manuallyApprovesFollowers: 'as:manuallyApprovesFollowers',
// focal point - https://docs.joinmastodon.org/spec/activitypub/#focalPoint
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
}
}
],
// ignore unimplemented ping url from fediverse
2019-10-28 17:33:20 +01:00
spamFilter (req, res, next) {
const urlToIgnore = [
'/api/v1/instance',
'/api/meta',
2019-09-18 12:55:33 +02:00
'/api/statusnet/version.json',
'/api/gnusocial/version.json',
'/api/statusnet/config.json',
2020-01-30 15:33:12 +01:00
'/status.php',
'/siteinfo.json',
'/friendika/json',
'/friendica/json',
2019-10-28 17:33:20 +01:00
'/poco'
]
2021-03-05 14:17:10 +01:00
if (urlToIgnore.includes(req.path)) {
log.debug(`Ignore noisy fediverse ${req.path}`)
return res.status(404).send('Not Found')
}
next()
},
async signAndSend (message, inbox, method='post') {
2024-02-28 15:10:33 +01:00
log.debug('[FEDI] Sign and %s %s %s', method, message, inbox)
2019-10-30 15:01:15 +01:00
const inboxUrl = new url.URL(inbox)
const privkey = settingsController.secretSettings.privateKey
2019-07-30 18:32:26 +02:00
const signer = crypto.createSign('sha256')
2019-07-31 01:43:08 +02:00
const d = new Date()
let header
let digest
if (method === 'post') {
digest = crypto.createHash('sha256')
.update(message)
.digest('base64')
const stringToSign = `(request-target): post ${inboxUrl.pathname}\nhost: ${inboxUrl.hostname}\ndate: ${d.toUTCString()}\ndigest: SHA-256=${digest}`
signer.update(stringToSign)
signer.end()
const signature = signer.sign(privkey)
const signature_b64 = signature.toString('base64')
header = `keyId="${config.baseurl}/federation/u/${settingsController.settings.instance_name}#main-key",algorithm="rsa-sha256",headers="(request-target) host date digest",signature="${signature_b64}"`
} else {
const stringToSign = `(request-target): get ${inboxUrl.pathname}\nhost: ${inboxUrl.hostname}\ndate: ${d.toUTCString()}`
signer.update(stringToSign)
signer.end()
const signature = signer.sign(privkey)
const signature_b64 = signature.toString('base64')
header = `keyId="${config.baseurl}/federation/u/${settingsController.settings.instance_name}#main-key",algorithm="rsa-sha256",headers="(request-target) host date",signature="${signature_b64}"`
}
2020-01-27 00:47:03 +01:00
try {
2020-02-05 00:48:55 +01:00
const ret = await axios(inbox, {
2020-01-27 00:47:03 +01:00
headers: {
Host: inboxUrl.hostname,
Date: d.toUTCString(),
Signature: header,
...(method === 'post' && ({ Digest: `SHA-256=${digest}` })),
'Content-Type': 'application/activity+json',
Accept: 'application/activity+json'
2020-01-27 00:47:03 +01:00
},
method,
...( method === 'post' && ({ data: message}))
2020-01-27 00:47:03 +01:00
})
log.debug(`[FEDI] signed ${ret.status} => %s`, ret.data)
return ret.data
2020-01-27 00:47:03 +01:00
} catch (e) {
log.error("[FEDI] Error in sign and send [%s]: %s", inbox, e?.response?.data?.error ?? e?.response?.statusMessage ?? '' + ' ' + String(e))
2020-01-27 00:47:03 +01:00
}
2019-07-31 01:43:08 +02:00
},
2019-09-11 12:00:13 +02:00
async sendEvent (event, type = 'Create') {
2019-09-25 14:38:16 +02:00
if (!settingsController.settings.enable_federation) {
2021-04-28 12:44:26 +02:00
log.info('event not send, federation disabled')
return
}
2019-12-06 00:49:44 +01:00
const followers = await APUser.findAll({ where: { follower: true } })
2024-01-08 22:56:14 +01:00
log.debug("[FEDI] Sending to %d followers: [%s]", followers.length, followers.map(f => f.ap_id).join(', '))
2019-10-30 15:01:15 +01:00
const recipients = {}
followers.forEach(follower => {
const sharedInbox = follower?.object?.endpoints?.sharedInbox ?? follower?.object?.inbox
2019-10-28 17:33:20 +01:00
if (!recipients[sharedInbox]) { recipients[sharedInbox] = [] }
2019-09-18 12:55:33 +02:00
recipients[sharedInbox].push(follower.ap_id)
})
2019-10-28 17:33:20 +01:00
for (const sharedInbox in recipients) {
2021-03-05 14:17:10 +01:00
log.debug(`Notify ${sharedInbox} with event ${event.title} cc => ${recipients[sharedInbox].length}`)
2019-09-11 13:12:05 +02:00
const body = {
id: `${config.baseurl}/federation/m/${event.id}#${type}-${event.updatedAt.getTime()}`,
type,
2020-11-06 11:05:05 +01:00
to: ['https://www.w3.org/ns/activitystreams#Public'],
cc: [...recipients[sharedInbox], `${config.baseurl}/federation/u/${settingsController.settings.instance_name}/followers`],
actor: `${config.baseurl}/federation/u/${settingsController.settings.instance_name}`,
object: event.toAP(settingsController.settings, recipients[sharedInbox], type)
2019-09-11 13:12:05 +02:00
}
2019-09-26 22:46:04 +02:00
body['@context'] = [
'https://www.w3.org/ns/activitystreams',
'https://w3id.org/security/v1',
2020-11-06 11:05:05 +01:00
{
2024-01-14 22:26:09 +01:00
toot: 'http://joinmastodon.org/ns#',
// A property-value pair, e.g. representing a feature of a product or place. We use this to publish this very same instance
// https://docs.joinmastodon.org/spec/activitypub/#PropertyValue
schema: 'http://schema.org#',
ProperyValue: 'schema:PropertyValue',
value: 'schema:value',
// https://docs.joinmastodon.org/spec/activitypub/#discoverable
"discoverable": "toot:discoverable",
// https://docs.joinmastodon.org/spec/activitypub/#Hashtag
"Hashtag": "https://www.w3.org/ns/activitystreams#Hashtag",
manuallyApprovesFollowers: 'as:manuallyApprovesFollowers',
// focal point - https://docs.joinmastodon.org/spec/activitypub/#focalPoint
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
}
2020-11-06 11:05:05 +01:00
}]
const task = new Task({
name: 'AP',
method: Helpers.signAndSend,
args: [JSON.stringify(body), sharedInbox]
})
TaskManager.add(task)
2019-09-11 12:00:13 +02:00
}
2019-08-02 13:43:28 +02:00
},
2024-01-19 00:42:54 +01:00
async parsePlace (APEvent) {
const eventController = require('../api/controller/event')
let place
if (APEvent?.location) {
place = {
place_name: APEvent.location?.name,
place_address: APEvent.location?.address?.streetAddress ?? APEvent.location?.address?.addressLocality ?? APEvent.location?.address?.addressCountry ?? APEvent.location?.address ?? '',
place_latitude: APEvent.location?.latitude,
place_longitude: APEvent.location?.longitude
}
}
// could have online locations too
let online_locations = []
if (APEvent?.attachment?.length) {
online_locations = APEvent.attachment.filter(a => a?.type === 'Link' && a?.href).map(a => a.href)
}
if (!place) {
if (online_locations) {
place = { place_name: 'online' }
} else {
throw new Error ('No location nor online location')
}
}
place = await eventController._findOrCreatePlace(place)
2024-01-23 08:52:28 +01:00
if (!place) {
throw new Error('Place not found nor created')
}
2024-01-19 00:42:54 +01:00
return [place, online_locations]
},
2024-01-23 08:52:28 +01:00
/**
* Event object.type
* Create / Announce
*/
async parseAPEvent (message, actor=message?.actor) {
2024-01-19 00:42:54 +01:00
const tagController = require('../api/controller/tag')
// has to have an object and a type property..
if (!message?.object || !message?.type) {
log.warn('[FEDI] message without `object` or `type` property: %s', message)
throw new Error ('Wrong AP message: no object or type property')
}
// supporting Announce of a Create
if (message.type === 'Announce' && message.object?.type === 'Create' && message.object?.object) {
message.object = message.object.object
message.type = 'Create'
}
// we only support Create / Event
if (message.type === 'Create' && message.object.type === 'Event') {
const APEvent = message.object
// validate coming events
2024-01-23 08:52:28 +01:00
const required_fields = ['name', 'startTime', 'id']
2024-01-19 00:42:54 +01:00
let missing_field = required_fields.find(required_field => !APEvent[required_field])
if (missing_field) {
log.warn(`[FEDI] ${missing_field} required`)
throw new Error(`${missing_field} required`)
}
// check if this event is new
const ap_id = APEvent.id
const exists = await Event.findOne({ where: { ap_id }})
if (exists) {
log.warn('[FEDI] Avoid creating a duplicated event %s', ap_id)
return exists
}
const [ place, online_locations ] = await Helpers.parsePlace(APEvent)
let media = []
const image_url = APEvent?.attachment?.find(a => a?.mediaType.includes('image') && a.url)?.url
if (image_url) {
const file = await helpers.getImageFromURL(image_url)
log.debug('[FEDI] Download attachment for event %s', image_url)
media = [{
url: file.filename,
height: file.height,
width: file.width,
name: APEvent.attachment[0]?.name || APEvent.name.trim() || '',
size: file.size || 0,
focalpoint: APEvent.attachment[0]?.focalPoint
}]
}
// create it
const event = await Event.create({
title: APEvent?.name?.trim() ?? '',
start_datetime: dayjs(APEvent.startTime).unix(),
end_datetime: APEvent?.endTime ? dayjs(APEvent.endTime).unix() : null,
description: helpers.sanitizeHTML(APEvent?.content ?? APEvent?.summary ?? ''),
online_locations,
media,
is_visible: true,
ap_id,
ap_object: APEvent,
apUserApId: message?.actor,
2024-01-19 00:42:54 +01:00
}).catch(e => {
console.error(e)
console.error(e?.message)
console.error(e?.errors)
return false
})
await event.setPlace(place)
// create/assign tags
let tags = []
if (APEvent.tag) {
2024-01-23 08:52:28 +01:00
tags = await tagController._findOrCreate(APEvent.tag.map(t => t?.name?.substr(1)))
2024-01-19 00:42:54 +01:00
await event.setTags(tags)
}
}
},
async followActor (actor) {
2024-02-28 15:10:33 +01:00
log.debug(`[FEDI] Following actor ${actor.ap_id}`)
const body = {
'@context': 'https://www.w3.org/ns/activitystreams',
id: `${config.baseurl}/federation/m/${actor.ap_id}#follow`,
type: 'Follow',
actor: `${config.baseurl}/federation/u/${settingsController.settings.instance_name}`,
object: actor.ap_id
}
2024-01-23 08:52:28 +01:00
await Helpers.signAndSend(JSON.stringify(body), actor.object.endpoints?.sharedInbox ?? actor.object.inbox)
await actor.update({ following: 1 })
2024-01-19 00:42:54 +01:00
// let's try to get remote outbox
const events = await Helpers.getOutbox(actor, 10)
2024-01-23 08:52:28 +01:00
if (!events) {
log.debug('[FEDI] No outbox events for %s', actor.ap_id)
return
}
for(const event of events) {
await Helpers.parseAPEvent(event, actor.ap_id).catch(e => {
2024-01-23 08:52:28 +01:00
console.error(e.message)
console.error(e.error)
console.error(e)
})
}
2024-01-19 00:42:54 +01:00
},
async getOutbox(actor, limit) {
log.debug('[FEDI] Get %s outbox', actor?.ap_id)
if (!actor?.object?.outbox) return
try {
let collection = await Helpers.signAndSend('', actor?.object?.outbox, 'get')
// embedded collection
if (typeof collection?.first !== 'string') {
return collection.first?.orderedItems ?? []
} else if (/^https?:\/\//.test(collection?.first)) {
collection = await Helpers.signAndSend('', collection.first, 'get')
if (Array.isArray(collection?.orderedItems)) {
return collection?.orderedItems ?? []
}
}
} catch (e) {
log.warn('[FEDI] getOutbox %s failed: %s', actor.ap_id, e )
return []
}
},
async unfollowActor (actor) {
2024-01-23 08:52:28 +01:00
log.debug(`[FEDI] Unfollowing actor ${actor.ap_id}`)
2023-12-29 18:34:18 +01:00
const object = {
id: `${config.baseurl}/federation/m/${actor.ap_id}#follow`,
type: 'Follow',
object: actor.ap_id
}
const body = {
'@context': 'https://www.w3.org/ns/activitystreams',
2023-12-29 18:34:18 +01:00
id: `${config.baseurl}/federation/m/${actor.ap_id}#unfollow`,
type: 'Undo',
actor: `${config.baseurl}/federation/u/${settingsController.settings.instance_name}`,
2023-12-29 18:34:18 +01:00
object
}
await Helpers.signAndSend(JSON.stringify(body), actor.object.endpoints?.sharedInbox || actor.object.inbox)
return actor.update({ following: 0 })
},
2023-12-26 13:04:20 +01:00
// get Actor from URL using GET HTTP Signature
async getActor (URL, instance, force = false, fail_on_not_cached = false) {
2024-02-28 15:10:33 +01:00
log.debug(`[FEDI] getActor for ${URL}`)
2019-09-12 14:59:51 +02:00
let fedi_user
2019-10-30 15:01:15 +01:00
2019-08-09 01:58:11 +02:00
// try with cache first
2019-10-30 15:01:15 +01:00
if (!force) {
fedi_user = await APUser.findByPk(URL, { include: Instance })
2019-10-30 15:01:15 +01:00
if (fedi_user) {
return fedi_user
} else if (fail_on_not_cached) {
return false
2019-10-30 15:01:15 +01:00
}
}
2019-09-12 14:59:51 +02:00
2023-12-26 13:04:20 +01:00
fedi_user = await Helpers.signAndSend('', URL, 'get')
2019-10-30 15:01:15 +01:00
2019-09-12 14:59:51 +02:00
if (fedi_user) {
log.info('[FEDI] Create/Update a new AP User "%s" and associate it to instance "%s"', URL, instance.domain)
try {
([ fedi_user ] = await APUser.upsert({ ap_id: URL, object: fedi_user, instanceDomain: instance.domain, blocked: false }))
} catch (e) {
log.debug('[FEDI] Error in update/create ')
}
2019-09-12 14:59:51 +02:00
}
return fedi_user
2019-08-02 13:43:28 +02:00
},
async getNodeInfo (instance_url) {
2024-01-23 08:52:28 +01:00
let nodeInfo = await axios.get(`${instance_url}/.well-known/nodeinfo`, { headers: { Accept: 'application/json' } })
.then(res => res.data)
.catch(e => {
log.debug('[FEDI] Node %s does not support nodeInfo', instance_url)
})
2023-12-22 20:58:38 +01:00
if (nodeInfo?.links) {
const supportedVersion = nodeInfo.links.find(l => l.rel === 'http://nodeinfo.diaspora.software/ns/schema/2.1' || 'http://nodeinfo.diaspora.software/ns/schema/2.0')
if (!supportedVersion) {
return false
}
const applicationActor = nodeInfo.links.find(l => l.rel === 'https://www.w3.org/ns/activitystreams#Application')
nodeInfo = await axios.get(supportedVersion.href).then(res => res.data)
log.debug('[FEDI] getNodeInfo "%s", applicationActor: %s, nodeInfo: %s', instance_url, applicationActor?.href, nodeInfo)
return { applicationActor: applicationActor?.href, nodeInfo }
}
throw new Error(nodeInfo)
},
async getInstance (actor_url, force = false, fail_on_not_cached = false) {
2023-12-26 13:04:20 +01:00
log.debug(`[FEDI] getInstance for ${actor_url}`)
2019-10-30 15:01:15 +01:00
actor_url = new url.URL(actor_url)
const domain = actor_url.host
const instance_url = `${actor_url.protocol}//${actor_url.host}`
let instance
if (!force) {
instance = await Instance.findByPk(domain)
if (instance) {
log.debug('[FEDI] Use cached instance: %s', instance.name)
return instance
} else if (fail_on_not_cached) {
return false
}
2019-10-30 15:01:15 +01:00
}
try {
2024-01-23 08:52:28 +01:00
const { applicationActor, nodeInfo } = await Helpers.getNodeInfo(instance_url).catch(e => ({ }))
const [ instance ] = await Instance.upsert({
2024-01-08 22:56:14 +01:00
name: nodeInfo?.metadata?.nodeName ?? domain,
2023-12-26 13:04:20 +01:00
domain,
2024-01-23 08:52:28 +01:00
data: nodeInfo ?? {},
2023-12-26 13:04:20 +01:00
blocked: false,
applicationActor
})
log.debug('[FEDI] Create a new instance from %s: %s %s', instance_url, instance.name, nodeInfo)
2023-12-26 13:04:20 +01:00
return instance
} catch(e) {
log.error('[FEDI] Wrong nodeInfo returned for "%s": %s', instance_url, e?.response?.data ?? String(e))
return false
}
2019-10-30 15:01:15 +01:00
},
2023-12-26 13:04:20 +01:00
/**
* HTTP Signature middleware
* https://www.w3.org/wiki/SocialCG/ActivityPub/Authentication_Authorization#Signing_requests_using_HTTP_Signatures
* Each POST to /inbox coming from fediverse has to be verified.
* Signature checking needs Actor's public key
*/
2019-09-11 19:12:24 +02:00
async verifySignature (req, res, next) {
2023-12-26 13:04:20 +01:00
const actor_url = req?.body?.actor
const isDelete = req?.body?.type === 'Delete'
2023-12-26 13:04:20 +01:00
// do we have an actor?
if (!actor_url) {
log.warn(`[FEDI] Verify Signature: No actor url or empty body`)
return res.status(401).send('Actor not found')
}
// Get instance's nodeinfo
// getting this from db if it is not the first time we interact with it
const instance = await Helpers.getInstance(actor_url, false, isDelete)
2021-03-05 14:17:10 +01:00
if (!instance) {
2023-12-26 13:04:20 +01:00
log.warn(`[FEDI] Verify Signature: Instance not found ${actor_url}`)
if (isDelete) {
return res.sendStatus(201)
}
2021-03-05 14:17:10 +01:00
return res.status(401).send('Instance not found')
}
2023-12-26 13:04:20 +01:00
// Is this instance blocked?
2019-10-30 15:01:15 +01:00
if (instance.blocked) {
2023-12-26 13:04:20 +01:00
log.warn(`[FEDI] Instance ${instance.domain} blocked`)
2019-10-30 15:01:15 +01:00
return res.status(401).send('Instance blocked')
}
2023-12-26 13:04:20 +01:00
// get actor
let ap_actor = await Helpers.getActor(actor_url, instance, false, isDelete)
2023-12-26 13:04:20 +01:00
if (!ap_actor) {
log.info(`[FEDI] Actor ${actor_url} not found`)
if (isDelete) {
return res.sendStatus(201)
}
2021-03-05 14:17:10 +01:00
return res.status(401).send('Actor not found')
}
2023-12-26 13:04:20 +01:00
if (ap_actor.blocked) {
log.info(`[FEDI] Actor ${ap_actor.ap_id} blocked`)
return res.status(401).send('Actor blocked')
}
if (!ap_actor?.object?.publicKey?.publicKeyPem) {
log.info(`[FEDI] Actor %s has no publicKey at %s`, ap_actor.ap_id, actor_url)
return res.status(401).send('No public key')
}
2019-10-30 15:01:15 +01:00
2023-12-26 13:04:20 +01:00
res.locals.fedi_user = ap_actor
2021-04-26 11:25:35 +02:00
// TODO: check Digest // cannot do this with json bodyparser
// const digest = crypto.createHash('sha256')
// .update(req.body)
// .digest('base64')
// if (`SHA-256=${digest}` !== req.headers.signature) {
// log.warn(`Signature mismatch ${req.headers.signature} - ${digest}`)
2021-04-26 11:25:35 +02:00
// return res.status(401).send('Signature mismatch')
// }
2019-09-11 19:12:24 +02:00
// another little hack :/
// https://github.com/joyent/node-http-signature/issues/87
req.url = '/federation' + req.url
2019-08-02 17:29:55 +02:00
const parsed = httpSignature.parseRequest(req)
2023-12-26 13:04:20 +01:00
if (httpSignature.verifySignature(parsed, ap_actor.object.publicKey.publicKeyPem)) { return next() }
2019-10-30 15:01:15 +01:00
2019-08-02 17:29:55 +02:00
// signature not valid, try without cache
2023-12-26 13:04:20 +01:00
ap_actor = await Helpers.getActor(actor_url, instance, true)
if (!ap_actor) {
log.info(`[FEDI] Actor ${actor_url} not found`)
2021-03-05 14:17:10 +01:00
return res.status(401).send('Actor not found')
}
2023-12-26 13:04:20 +01:00
if (!ap_actor?.object?.publicKey?.publicKeyPem) {
log.info(`[FEDI] Actor %s has no publicKey at %s`, ap_actor.ap_id, actor_url)
return res.status(401).send('No public key')
}
if (httpSignature.verifySignature(parsed, ap_actor.object.publicKey.publicKeyPem)) {
log.debug(`[FEDI] Valid signature from ${actor_url} `)
2021-06-25 11:43:50 +02:00
return next()
}
2019-10-30 15:01:15 +01:00
2019-08-02 17:29:55 +02:00
// still not valid
2023-12-26 13:04:20 +01:00
log.info(`[FEDI] Invalid signature from Actor ${actor_url}`)
res.send('Request signature could not be verified', 401)
2019-07-30 18:32:26 +02:00
}
}
2019-07-30 18:57:45 +02:00
module.exports = Helpers