1
0
Fork 0
mirror of https://codeberg.org/forgejo/forgejo.git synced 2024-12-12 11:38:00 -05:00
forgejo/routers/api/v1/activitypub/repository.go

339 lines
10 KiB
Go
Raw Normal View History

// Copyright 2023 The forgejo Authors. All rights reserved.
2023-10-20 09:16:04 -04:00
// SPDX-License-Identifier: MIT
package activitypub
import (
"fmt"
2023-11-29 09:34:02 -05:00
"io"
2023-10-20 09:16:04 -04:00
"net/http"
2023-12-05 08:49:27 -05:00
"net/url"
"strings"
2023-12-07 07:54:07 -05:00
"time"
2023-10-20 09:16:04 -04:00
"code.gitea.io/gitea/models/activitypub"
2023-12-01 11:06:39 -05:00
"code.gitea.io/gitea/models/db"
2023-12-07 07:17:51 -05:00
repo_model "code.gitea.io/gitea/models/repo"
user_model "code.gitea.io/gitea/models/user"
2023-11-28 07:03:45 -05:00
api "code.gitea.io/gitea/modules/activitypub"
2023-10-20 09:16:04 -04:00
"code.gitea.io/gitea/modules/context"
2023-11-06 12:29:48 -05:00
"code.gitea.io/gitea/modules/forgefed"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
2023-12-05 04:37:51 -05:00
"code.gitea.io/gitea/modules/util"
2023-11-10 08:26:13 -05:00
"code.gitea.io/gitea/modules/web"
2023-12-05 04:37:51 -05:00
"github.com/google/uuid"
ap "github.com/go-ap/activitypub"
2023-12-05 05:38:36 -05:00
pwd_gen "github.com/sethvargo/go-password/password"
2023-10-20 09:16:04 -04:00
)
2023-12-05 08:49:27 -05:00
var actionsUser = user_model.NewActionsUser()
func generateUUIDMail(person ap.Actor) (string, error) {
// UUID@remote.host
id := uuid.New().String()
//url, err := url.Parse(person.URL.GetID().String())
//host := url.Host
return strings.Join([]string{id, "example.com"}, "@"), nil
}
func generateRemoteUserName(person ap.Actor) (string, error) {
u, err := url.Parse(person.URL.GetID().String())
if err != nil {
return "", err
}
host := strings.Split(u.Host, ":")[0] // no port in username
if name := person.PreferredUsername.String(); name != "" {
return strings.Join([]string{name, host}, "_"), nil
}
if name := person.Name.String(); name != "" {
return strings.Join([]string{name, host}, "_"), nil
}
return "", fmt.Errorf("empty name, preferredUsername field")
}
func generateRandomPassword() (string, error) {
// Generate a password that is 64 characters long with 10 digits, 10 symbols,
// allowing upper and lower case letters, disallowing repeat characters.
res, err := pwd_gen.Generate(32, 10, 10, false, false)
if err != nil {
return "", err
}
return res, err
}
func searchUsersByPerson(actorId string) ([]*user_model.User, error) {
2023-12-05 08:49:27 -05:00
actionsUser.IsAdmin = true
options := &user_model.SearchUserOptions{
LoginName: actorId,
2023-12-05 08:49:27 -05:00
Actor: actionsUser,
Type: user_model.UserTypeRemoteUser,
OrderBy: db.SearchOrderByAlphabetically,
ListOptions: db.ListOptions{PageSize: 1},
IsActive: util.OptionalBoolFalse,
IncludeReserved: true,
}
users, _, err := user_model.SearchUsers(db.DefaultContext, options)
if err != nil {
return []*user_model.User{}, fmt.Errorf("search failed: %v", err)
}
log.Info("local found users: %v", len(users))
return users, nil
}
2023-12-08 05:54:07 -05:00
func getBody(remoteStargazer, starReceiver string, ctx *context.APIContext) ([]byte, error) { // ToDo: We could split this: move body reading to unmarshall
2023-12-06 09:13:53 -05:00
2023-12-06 12:32:26 -05:00
// TODO: The star receiver signs the http get request will maybe not work.
// The remote repo has probably diferent keys as the local one.
// > The local user signs the request with their private key, the public key is publicly available to anyone. I do not see an issue here.
2023-12-06 12:32:26 -05:00
// Why should we use a signed request here at all?
// > To provide an extra layer of security against in flight tampering: https://github.com/go-fed/httpsig/blob/55836744818e/httpsig.go#L116
2023-12-08 05:54:07 -05:00
client, err := api.NewClient(ctx, actionsUser, starReceiver) // ToDo: Do we get a publicKeyId of owner or repo?
2023-12-06 09:13:53 -05:00
if err != nil {
return []byte{0}, err
2023-12-06 09:13:53 -05:00
}
// get_person_by_rest
response, err := client.Get([]byte{0}, remoteStargazer)
2023-12-06 09:13:53 -05:00
if err != nil {
return []byte{0}, err
2023-12-06 09:13:53 -05:00
}
defer response.Body.Close()
body, err := io.ReadAll(response.Body)
if err != nil {
return []byte{0}, err
2023-12-06 09:13:53 -05:00
}
log.Info("remoteStargazer: %v", remoteStargazer)
log.Info("http client. %v", client)
log.Info("response: %v\n error: ", response, err)
return body, nil
}
func unmarshallPersonJSON(body []byte) (ap.Person, error) {
2023-12-06 09:13:53 -05:00
// parse response
person := ap.Person{}
err := person.UnmarshalJSON(body)
2023-12-06 09:13:53 -05:00
if err != nil {
return ap.Person{}, err
}
log.Info("Person is: %v", person)
log.Info("Person Name is: %v", person.PreferredUsername)
log.Info("Person URL is: %v", person.URL)
return person, nil
}
func createFederatedUserFromPerson(person ap.Person, remoteStargazer string) (*user_model.User, error) {
2023-12-06 09:56:26 -05:00
email, err := generateUUIDMail(person)
if err != nil {
return &user_model.User{}, err
2023-12-06 09:56:26 -05:00
}
username, err := generateRemoteUserName(person)
if err != nil {
return &user_model.User{}, err
2023-12-06 09:56:26 -05:00
}
password, err := generateRandomPassword()
if err != nil {
return &user_model.User{}, err
2023-12-06 09:56:26 -05:00
}
user := &user_model.User{
LowerName: strings.ToLower(username),
Name: username,
Email: email,
EmailNotificationsPreference: "disabled",
Passwd: password,
MustChangePassword: false,
LoginName: remoteStargazer,
Type: user_model.UserTypeRemoteUser,
IsAdmin: false,
}
return user, nil
}
2023-12-06 09:56:26 -05:00
func saveFederatedUserRecord(ctx *context.APIContext, user *user_model.User) error {
2023-12-06 09:56:26 -05:00
overwriteDefault := &user_model.CreateUserOverwriteOptions{
IsActive: util.OptionalBoolFalse,
IsRestricted: util.OptionalBoolFalse,
}
if err := user_model.CreateUser(ctx, user, overwriteDefault); err != nil {
return err
}
log.Info("User created!")
return nil
}
2023-10-20 09:16:04 -04:00
// Repository function returns the Repository actor for a repo
func Repository(ctx *context.APIContext) {
// swagger:operation GET /activitypub/repository-id/{repository-id} activitypub activitypubRepository
// ---
// summary: Returns the Repository actor for a repo
// produces:
// - application/json
// parameters:
// - name: repository-id
// in: path
// description: repository ID of the repo
// type: integer
// required: true
// responses:
// "200":
// "$ref": "#/responses/ActivityPub"
2023-11-15 06:10:31 -05:00
link := fmt.Sprintf("%s/api/v1/activitypub/repository-id/%d", strings.TrimSuffix(setting.AppURL, "/"), ctx.Repo.Repository.ID)
2023-11-06 12:29:48 -05:00
repo := forgefed.RepositoryNew(ap.IRI(link))
2023-11-06 12:29:48 -05:00
repo.Name = ap.NaturalLanguageValuesNew()
err := repo.Name.Set("en", ap.Content(ctx.Repo.Repository.Name))
if err != nil {
2023-11-06 12:29:48 -05:00
ctx.ServerError("Set Name", err)
return
}
2023-11-06 12:29:48 -05:00
response(ctx, repo)
2023-10-20 09:16:04 -04:00
}
// PersonInbox function handles the incoming data for a repository inbox
func RepositoryInbox(ctx *context.APIContext) {
// swagger:operation POST /activitypub/repository-id/{repository-id}/inbox activitypub activitypubRepository
// ---
// summary: Send to the inbox
// produces:
// - application/json
// parameters:
// - name: repository-id
// in: path
// description: repository ID of the repo
// type: integer
// required: true
2023-11-08 02:56:22 -05:00
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/Star"
2023-10-20 09:16:04 -04:00
// responses:
// "204":
// "$ref": "#/responses/empty"
var user *user_model.User
2023-12-08 12:09:22 -05:00
repository := ctx.Repo.Repository
log.Info("RepositoryInbox: repo: %v, owned by: %v", repository.Name, repository.OwnerName)
2023-12-01 11:06:39 -05:00
activity := web.GetForm(ctx).(*forgefed.Star)
2023-12-08 12:09:22 -05:00
log.Info("RepositoryInbox: Activity.Source: %v, Activity.Actor %v, Activity.Actor.Id %v", activity.Source, activity.Actor, activity.Actor.GetID().String())
2023-11-03 12:45:53 -04:00
2023-11-15 08:27:47 -05:00
// assume actor is: "actor": "https://codeberg.org/api/v1/activitypub/user-id/12345" - NB: This might be actually the ID? Maybe check vocabulary.
2023-12-05 03:26:03 -05:00
// "https://Codeberg.org/api/v1/activitypub/user-id/12345"
// "https://codeberg.org:443/api/v1/activitypub/user-id/12345"
2023-12-05 03:26:03 -05:00
// "https://codeberg.org/api/v1/activitypub/../activitypub/user-id/12345"
// "https://user:password@codeberg.org/api/v1/activitypub/user-id/12345"
// "https://codeberg.org/api/v1/activitypub//user-id/12345"
// parse senderActorId
// senderActorId holds the data to construct the sender of the star
2023-12-08 12:09:22 -05:00
validatedActorId, err := activitypub.ValidateAndParseIRI(activity.Actor.GetID().String())
if err != nil {
2023-12-08 12:09:22 -05:00
ctx.ServerError("Set Name", err)
return
}
2023-12-08 12:09:22 -05:00
actorId := activitypub.ParseActorID(validatedActorId, string(activity.Source))
2023-12-08 12:33:26 -05:00
// Is the ActorId Struct valid?
2023-12-08 12:09:22 -05:00
actorId.PanicIfInvalid()
log.Info("RepositoryInbox: Actor parsed. %v", actorId)
2023-12-08 12:09:22 -05:00
remoteStargazer := actorId.GetNormalizedUri() // used as LoginName in newly created user
log.Info("remotStargazer: %v", remoteStargazer)
2023-11-15 06:29:17 -05:00
2023-12-01 09:07:13 -05:00
// Check if user already exists
2023-12-06 12:32:26 -05:00
// TODO: If the usesrs-id points to our current host, we've to use an alterantive search ...
2023-12-07 07:53:37 -05:00
// > We might need to discuss this further with the community, because when we execute this bit of code here, the federated api has been called.
// > Thus the searching for non-federated users could facilitate spoofing of already existing user-ids for some (malicious) purposes.
users, err := searchUsersByPerson(remoteStargazer)
2023-12-05 04:37:51 -05:00
if err != nil {
panic(fmt.Errorf("searching for user failed: %v", err))
2023-12-05 04:37:51 -05:00
}
switch len(users) {
case 0:
{
2023-12-08 09:44:00 -05:00
body, err := getBody(remoteStargazer, "does not exist yet", ctx) // ToDo: We would need to insert the repo or its owners key here
if err != nil {
panic(fmt.Errorf("http get failed: %v", err))
}
person, err := unmarshallPersonJSON(body)
if err != nil {
panic(fmt.Errorf("getting user failed: %v", err))
}
user, err = createFederatedUserFromPerson(person, remoteStargazer)
if err != nil {
panic(fmt.Errorf("create federated user: %w", err))
}
err = saveFederatedUserRecord(ctx, user)
if err != nil {
panic(fmt.Errorf("save user: %w", err))
}
}
case 1:
{
user = users[0]
2023-12-08 09:44:00 -05:00
log.Info("Found user full name was: %v", user.FullName)
log.Info("Found user name was: %v", user.Name)
log.Info("Found user name was: %v", user.LoginName)
log.Info("%v", user)
2023-12-06 09:37:58 -05:00
}
default:
{
panic(fmt.Errorf("found more than one matches for federated users"))
2023-12-05 04:37:51 -05:00
}
}
2023-12-06 09:56:26 -05:00
2023-12-07 07:24:01 -05:00
remoteUser, err := user_model.GetUserByEmail(ctx, user.Email)
if err != nil {
ctx.Error(http.StatusInternalServerError, "StarRepo", err)
return
2023-12-01 05:56:12 -05:00
}
2023-12-05 04:37:51 -05:00
2023-12-07 07:24:01 -05:00
// check if already starred by this user
2023-12-08 12:09:22 -05:00
alreadyStared := repo_model.IsStaring(ctx, remoteUser.ID, repository.ID)
2023-12-07 07:24:01 -05:00
switch alreadyStared {
case true: // execute unstar action
{
2023-12-08 12:09:22 -05:00
err = repo_model.StarRepo(ctx, remoteUser.ID, repository.ID, false)
2023-12-07 07:24:01 -05:00
if err != nil {
ctx.Error(http.StatusInternalServerError, "StarRepo", err)
return
}
}
case false: // execute star action
{
2023-12-08 12:09:22 -05:00
err = repo_model.StarRepo(ctx, remoteUser.ID, repository.ID, true)
2023-12-07 07:24:01 -05:00
if err != nil {
ctx.Error(http.StatusInternalServerError, "StarRepo", err)
return
}
}
}
2023-11-30 10:10:26 -05:00
2023-12-07 07:54:07 -05:00
// wait 5 sec.
time.Sleep(5 * time.Second)
2023-11-10 08:10:23 -05:00
2023-10-20 09:16:04 -04:00
ctx.Status(http.StatusNoContent)
}