mirror of
https://framagit.org/les/gancio.git
synced 2025-02-01 09:02:01 +01:00
196 lines
6.7 KiB
JavaScript
196 lines
6.7 KiB
JavaScript
const axios = require('axios')
|
|
// const request = require('request')
|
|
const crypto = require('crypto')
|
|
const config = require('config')
|
|
const httpSignature = require('http-signature')
|
|
const debug = require('debug')('federation:helpers')
|
|
const APUser = require('../api/models/ap_user')
|
|
const Instance = require('../api/models/instance')
|
|
const url = require('url')
|
|
const settingsController = require('../api/controller/settings')
|
|
|
|
const Helpers = {
|
|
|
|
// ignore unimplemented ping url from fediverse
|
|
spamFilter (req, res, next) {
|
|
const urlToIgnore = [
|
|
'/api/v1/instance',
|
|
'/api/meta',
|
|
'/api/statusnet/version.json',
|
|
'/api/gnusocial/version.json',
|
|
'/api/statusnet/config.json',
|
|
'/status.php',
|
|
'/siteinfo.json',
|
|
'/friendika/json',
|
|
'/friendica/json',
|
|
'/poco'
|
|
]
|
|
if (urlToIgnore.includes(req.path)) { return res.status(404).send('Not Found') }
|
|
next()
|
|
},
|
|
|
|
async signAndSend (message, inbox) {
|
|
// get the URI of the actor object and append 'inbox' to it
|
|
const inboxUrl = new url.URL(inbox)
|
|
const privkey = settingsController.secretSettings.privateKey
|
|
const signer = crypto.createSign('sha256')
|
|
const d = new Date()
|
|
const stringToSign = `(request-target): post ${inboxUrl.pathname}\nhost: ${inboxUrl.hostname}\ndate: ${d.toUTCString()}`
|
|
signer.update(stringToSign)
|
|
signer.end()
|
|
const signature = signer.sign(privkey)
|
|
const signature_b64 = signature.toString('base64')
|
|
const header = `keyId="${config.baseurl}/federation/u/${settingsController.settings.instance_name}",headers="(request-target) host date",signature="${signature_b64}"`
|
|
try {
|
|
const ret = await axios(inbox, {
|
|
headers: {
|
|
Host: inboxUrl.hostname,
|
|
Date: d.toUTCString(),
|
|
Signature: header,
|
|
'Content-Type': 'application/activity+json; charset=utf-8',
|
|
Accept: 'application/activity+json, application/json; chartset=utf-8'
|
|
},
|
|
method: 'post',
|
|
data: JSON.stringify(message)
|
|
})
|
|
debug('sign %s => %s', ret.status, ret.data)
|
|
} catch (e) {
|
|
debug('ERROR ', e.toString())
|
|
}
|
|
},
|
|
|
|
async sendEvent (event, type = 'Create') {
|
|
if (!settingsController.settings.enable_federation) {
|
|
debug('event not send, federation disabled')
|
|
return
|
|
}
|
|
|
|
const followers = await APUser.findAll({ where: { follower: true } })
|
|
const recipients = {}
|
|
followers.forEach(follower => {
|
|
const sharedInbox = follower.object.endpoints.sharedInbox
|
|
if (!recipients[sharedInbox]) { recipients[sharedInbox] = [] }
|
|
recipients[sharedInbox].push(follower.ap_id)
|
|
})
|
|
|
|
for (const sharedInbox in recipients) {
|
|
debug('Notify %s with event %s cc => %d', sharedInbox, event.title, recipients[sharedInbox].length)
|
|
const body = {
|
|
id: `${config.baseurl}/federation/m/${event.id}#create`,
|
|
type,
|
|
to: recipients[sharedInbox],
|
|
cc: ['https://www.w3.org/ns/activitystreams#Public', `${config.baseurl}/federation/u/${settingsController.settings.instance_name}/followers`],
|
|
actor: `${config.baseurl}/federation/u/${settingsController.settings.instance_name}`,
|
|
object: event.toAP(settingsController.settings.instance_name,
|
|
settingsController.settings.instance_locale,
|
|
recipients[sharedInbox])
|
|
}
|
|
body['@context'] = [
|
|
'https://www.w3.org/ns/activitystreams',
|
|
'https://w3id.org/security/v1',
|
|
{ Hashtag: 'as:Hashtag' }]
|
|
Helpers.signAndSend(body, sharedInbox)
|
|
}
|
|
},
|
|
|
|
async getActor (URL, instance, force = false) {
|
|
let fedi_user
|
|
|
|
// try with cache first
|
|
if (!force) {
|
|
fedi_user = await APUser.findByPk(URL, { include: Instance })
|
|
if (fedi_user) {
|
|
if (!fedi_user.instances) {
|
|
fedi_user.setInstance(instance)
|
|
}
|
|
return fedi_user
|
|
}
|
|
}
|
|
|
|
fedi_user = await axios.get(URL, { headers: { Accept: 'application/jrd+json, application/json' } })
|
|
.then(res => {
|
|
if (res.status !== 200) {
|
|
debug('[ERR] Actor %s => %s', URL, res.statusText)
|
|
return false
|
|
}
|
|
return res.data
|
|
})
|
|
.catch(e => {
|
|
debug(`[ERR] ${URL}: ${e}`)
|
|
return false
|
|
})
|
|
|
|
if (fedi_user) {
|
|
debug(`Create a new AP User => ${URL}`)
|
|
fedi_user = await APUser.create({ ap_id: URL, object: fedi_user })
|
|
}
|
|
return fedi_user
|
|
},
|
|
|
|
async getInstance (actor_url, force = false) {
|
|
actor_url = new url.URL(actor_url)
|
|
const domain = actor_url.host
|
|
const instance_url = `${actor_url.protocol}//${actor_url.host}`
|
|
debug('getInstance %s', domain)
|
|
let instance
|
|
if (!force) {
|
|
instance = await Instance.findByPk(domain)
|
|
if (instance) { return instance }
|
|
}
|
|
|
|
// TODO: is this a standard? don't think so
|
|
instance = await axios.get(`${instance_url}/api/v1/instance`, { headers: { Accept: 'application/json' } })
|
|
.then(res => res.data)
|
|
.then(instance => {
|
|
const data = {
|
|
stats: instance.stats,
|
|
thumbnail: instance.thumbnail
|
|
}
|
|
return Instance.create({ name: instance.title, domain, data, blocked: false })
|
|
})
|
|
.catch(e => {
|
|
debug(e)
|
|
return false
|
|
})
|
|
return instance
|
|
},
|
|
|
|
// ref: https://blog.joinmastodon.org/2018/07/how-to-make-friends-and-verify-requests/
|
|
async verifySignature (req, res, next) {
|
|
const instance = await Helpers.getInstance(req.body.actor)
|
|
if (!instance) { return res.status(401).send('Instance not found') }
|
|
if (instance.blocked) {
|
|
debug('Instance %s blocked', instance.domain)
|
|
return res.status(401).send('Instance blocked')
|
|
}
|
|
|
|
let user = await Helpers.getActor(req.body.actor, instance)
|
|
if (!user) { return res.status(401).send('Actor not found') }
|
|
if (user.blocked) {
|
|
debug('User %s blocked', user.ap_id)
|
|
return res.status(401).send('User blocked')
|
|
}
|
|
|
|
// little hack -> https://github.com/joyent/node-http-signature/pull/83
|
|
// req.headers.authorization = 'Signature ' + req.headers.signature
|
|
|
|
req.fedi_user = user
|
|
|
|
// another little hack :/
|
|
// https://github.com/joyent/node-http-signature/issues/87
|
|
req.url = '/federation' + req.url
|
|
const parsed = httpSignature.parseRequest(req)
|
|
if (httpSignature.verifySignature(parsed, user.object.publicKey.publicKeyPem)) { return next() }
|
|
|
|
// signature not valid, try without cache
|
|
user = await Helpers.getActor(req.body.actor, instance, true)
|
|
if (!user) { return res.status(401).send('Actor not found') }
|
|
if (httpSignature.verifySignature(parsed, user.object.publicKey.publicKeyPem)) { return next() }
|
|
|
|
// still not valid
|
|
debug('Invalid signature from user %s', req.body.actor)
|
|
res.send('Request signature could not be verified', 401)
|
|
}
|
|
}
|
|
|
|
module.exports = Helpers
|