2023-10-27 13:13:51 -05:00
|
|
|
// Copyright 2023 The forgejo Authors. All rights reserved.
|
2023-10-20 08:16:04 -05:00
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
|
|
|
|
package activitypub
|
|
|
|
|
|
|
|
import (
|
2023-10-27 13:13:51 -05:00
|
|
|
"fmt"
|
2023-11-29 09:34:02 -05:00
|
|
|
"io"
|
2023-10-20 08:16:04 -05:00
|
|
|
"net/http"
|
2023-12-05 08:49:27 -05:00
|
|
|
"net/url"
|
2023-10-27 13:13:51 -05:00
|
|
|
"strings"
|
2023-10-20 08:16:04 -05:00
|
|
|
|
2023-11-16 08:50:01 -05:00
|
|
|
"code.gitea.io/gitea/models/activitypub"
|
2023-12-01 11:06:39 -05:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2023-12-07 07:17:51 -05:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2023-11-28 07:03:45 -05:00
|
|
|
api "code.gitea.io/gitea/modules/activitypub"
|
2023-10-20 08:16:04 -05:00
|
|
|
"code.gitea.io/gitea/modules/context"
|
2023-11-06 12:29:48 -05:00
|
|
|
"code.gitea.io/gitea/modules/forgefed"
|
2023-10-27 13:13:51 -05:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2023-12-05 04:37:51 -05:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2023-11-10 08:26:13 -05:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2023-12-05 04:37:51 -05:00
|
|
|
"github.com/google/uuid"
|
2023-10-27 13:13:51 -05:00
|
|
|
|
|
|
|
ap "github.com/go-ap/activitypub"
|
2023-12-05 05:38:36 -05:00
|
|
|
pwd_gen "github.com/sethvargo/go-password/password"
|
2023-10-20 08:16:04 -05:00
|
|
|
)
|
|
|
|
|
2023-12-05 08:49:27 -05:00
|
|
|
var actionsUser = user_model.NewActionsUser()
|
|
|
|
|
|
|
|
func generateUUIDMail(person ap.Actor) (string, error) {
|
|
|
|
// UUID@remote.host
|
|
|
|
id := uuid.New().String()
|
|
|
|
|
|
|
|
//url, err := url.Parse(person.URL.GetID().String())
|
|
|
|
|
|
|
|
//host := url.Host
|
|
|
|
|
|
|
|
return strings.Join([]string{id, "example.com"}, "@"), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateRemoteUserName(person ap.Actor) (string, error) {
|
|
|
|
u, err := url.Parse(person.URL.GetID().String())
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
host := strings.Split(u.Host, ":")[0] // no port in username
|
|
|
|
|
|
|
|
if name := person.PreferredUsername.String(); name != "" {
|
|
|
|
return strings.Join([]string{name, host}, "_"), nil
|
|
|
|
}
|
|
|
|
if name := person.Name.String(); name != "" {
|
|
|
|
return strings.Join([]string{name, host}, "_"), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", fmt.Errorf("empty name, preferredUsername field")
|
|
|
|
}
|
|
|
|
|
|
|
|
func generateRandomPassword() (string, error) {
|
|
|
|
// Generate a password that is 64 characters long with 10 digits, 10 symbols,
|
|
|
|
// allowing upper and lower case letters, disallowing repeat characters.
|
|
|
|
res, err := pwd_gen.Generate(32, 10, 10, false, false)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2023-12-06 03:07:09 -05:00
|
|
|
func searchUsersByPerson(actorId string) ([]*user_model.User, error) {
|
2023-12-05 08:49:27 -05:00
|
|
|
|
|
|
|
actionsUser.IsAdmin = true
|
|
|
|
|
|
|
|
options := &user_model.SearchUserOptions{
|
2023-12-06 03:07:09 -05:00
|
|
|
LoginName: actorId,
|
2023-12-05 08:49:27 -05:00
|
|
|
Actor: actionsUser,
|
|
|
|
Type: user_model.UserTypeRemoteUser,
|
|
|
|
OrderBy: db.SearchOrderByAlphabetically,
|
|
|
|
ListOptions: db.ListOptions{PageSize: 1},
|
|
|
|
IsActive: util.OptionalBoolFalse,
|
|
|
|
IncludeReserved: true,
|
|
|
|
}
|
|
|
|
users, _, err := user_model.SearchUsers(db.DefaultContext, options)
|
|
|
|
if err != nil {
|
|
|
|
return []*user_model.User{}, fmt.Errorf("search failed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Info("local found users: %v", len(users))
|
|
|
|
|
|
|
|
return users, nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-12-07 04:44:35 -05:00
|
|
|
func getBody(remoteStargazer, starReceiver string, ctx *context.APIContext) ([]byte, error) {
|
2023-12-06 09:13:53 -05:00
|
|
|
|
2023-12-06 12:32:26 -05:00
|
|
|
// TODO: The star receiver signs the http get request will maybe not work.
|
|
|
|
// The remote repo has probably diferent keys as the local one.
|
2023-12-07 04:44:35 -05:00
|
|
|
// > The local user signs the request with their private key, the public key is publicly available to anyone. I do not see an issue here.
|
2023-12-06 12:32:26 -05:00
|
|
|
// Why should we use a signed request here at all?
|
2023-12-07 04:44:35 -05:00
|
|
|
// > To provide an extra layer of security against in flight tampering: https://github.com/go-fed/httpsig/blob/55836744818e/httpsig.go#L116
|
|
|
|
|
2023-12-06 12:32:26 -05:00
|
|
|
client, err := api.NewClient(ctx, actionsUser, starReceiver)
|
2023-12-06 09:13:53 -05:00
|
|
|
if err != nil {
|
2023-12-07 04:44:35 -05:00
|
|
|
return []byte{0}, err
|
2023-12-06 09:13:53 -05:00
|
|
|
}
|
|
|
|
// get_person_by_rest
|
2023-12-07 04:44:35 -05:00
|
|
|
response, err := client.Get([]byte{0}, remoteStargazer)
|
2023-12-06 09:13:53 -05:00
|
|
|
if err != nil {
|
2023-12-07 04:44:35 -05:00
|
|
|
return []byte{0}, err
|
2023-12-06 09:13:53 -05:00
|
|
|
}
|
|
|
|
defer response.Body.Close()
|
|
|
|
body, err := io.ReadAll(response.Body)
|
|
|
|
if err != nil {
|
2023-12-07 04:44:35 -05:00
|
|
|
return []byte{0}, err
|
2023-12-06 09:13:53 -05:00
|
|
|
}
|
|
|
|
|
2023-12-07 04:44:35 -05:00
|
|
|
log.Info("remoteStargazer: %v", remoteStargazer)
|
|
|
|
log.Info("http client. %v", client)
|
|
|
|
log.Info("response: %v\n error: ", response, err)
|
|
|
|
|
|
|
|
return body, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func unmarshallPersonJSON(body []byte) (ap.Person, error) {
|
|
|
|
|
2023-12-06 09:13:53 -05:00
|
|
|
// parse response
|
|
|
|
person := ap.Person{}
|
2023-12-07 04:44:35 -05:00
|
|
|
err := person.UnmarshalJSON(body)
|
2023-12-06 09:13:53 -05:00
|
|
|
if err != nil {
|
|
|
|
return ap.Person{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Info("Person is: %v", person)
|
|
|
|
log.Info("Person Name is: %v", person.PreferredUsername)
|
|
|
|
log.Info("Person URL is: %v", person.URL)
|
|
|
|
|
|
|
|
return person, nil
|
|
|
|
|
|
|
|
}
|
2023-12-06 07:36:26 -05:00
|
|
|
|
2023-12-07 07:18:33 -05:00
|
|
|
func createFederatedUserFromPerson(person ap.Person, remoteStargazer string) (*user_model.User, error) {
|
2023-12-06 09:56:26 -05:00
|
|
|
email, err := generateUUIDMail(person)
|
|
|
|
if err != nil {
|
2023-12-07 07:18:33 -05:00
|
|
|
return &user_model.User{}, err
|
2023-12-06 09:56:26 -05:00
|
|
|
}
|
|
|
|
username, err := generateRemoteUserName(person)
|
|
|
|
if err != nil {
|
2023-12-07 07:18:33 -05:00
|
|
|
return &user_model.User{}, err
|
2023-12-06 09:56:26 -05:00
|
|
|
}
|
|
|
|
password, err := generateRandomPassword()
|
|
|
|
if err != nil {
|
2023-12-07 07:18:33 -05:00
|
|
|
return &user_model.User{}, err
|
2023-12-06 09:56:26 -05:00
|
|
|
}
|
|
|
|
user := &user_model.User{
|
|
|
|
LowerName: strings.ToLower(username),
|
|
|
|
Name: username,
|
|
|
|
Email: email,
|
|
|
|
EmailNotificationsPreference: "disabled",
|
|
|
|
Passwd: password,
|
|
|
|
MustChangePassword: false,
|
|
|
|
LoginName: remoteStargazer,
|
|
|
|
Type: user_model.UserTypeRemoteUser,
|
|
|
|
IsAdmin: false,
|
|
|
|
}
|
2023-12-07 07:18:33 -05:00
|
|
|
return user, nil
|
|
|
|
}
|
2023-12-06 09:56:26 -05:00
|
|
|
|
2023-12-07 07:18:33 -05:00
|
|
|
func saveFederatedUserRecord(ctx *context.APIContext, user *user_model.User) error {
|
2023-12-06 09:56:26 -05:00
|
|
|
overwriteDefault := &user_model.CreateUserOverwriteOptions{
|
|
|
|
IsActive: util.OptionalBoolFalse,
|
|
|
|
IsRestricted: util.OptionalBoolFalse,
|
|
|
|
}
|
|
|
|
if err := user_model.CreateUser(ctx, user, overwriteDefault); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Info("User created!")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-10-20 08:16:04 -05:00
|
|
|
// Repository function returns the Repository actor for a repo
|
|
|
|
func Repository(ctx *context.APIContext) {
|
|
|
|
// swagger:operation GET /activitypub/repository-id/{repository-id} activitypub activitypubRepository
|
|
|
|
// ---
|
|
|
|
// summary: Returns the Repository actor for a repo
|
|
|
|
// produces:
|
|
|
|
// - application/json
|
|
|
|
// parameters:
|
|
|
|
// - name: repository-id
|
|
|
|
// in: path
|
|
|
|
// description: repository ID of the repo
|
|
|
|
// type: integer
|
|
|
|
// required: true
|
|
|
|
// responses:
|
|
|
|
// "200":
|
|
|
|
// "$ref": "#/responses/ActivityPub"
|
|
|
|
|
2023-11-15 06:10:31 -05:00
|
|
|
link := fmt.Sprintf("%s/api/v1/activitypub/repository-id/%d", strings.TrimSuffix(setting.AppURL, "/"), ctx.Repo.Repository.ID)
|
2023-11-06 12:29:48 -05:00
|
|
|
repo := forgefed.RepositoryNew(ap.IRI(link))
|
2023-10-27 13:13:51 -05:00
|
|
|
|
2023-11-06 12:29:48 -05:00
|
|
|
repo.Name = ap.NaturalLanguageValuesNew()
|
|
|
|
err := repo.Name.Set("en", ap.Content(ctx.Repo.Repository.Name))
|
2023-10-27 13:13:51 -05:00
|
|
|
if err != nil {
|
2023-11-06 12:29:48 -05:00
|
|
|
ctx.ServerError("Set Name", err)
|
2023-10-27 13:13:51 -05:00
|
|
|
return
|
|
|
|
}
|
2023-11-06 12:29:48 -05:00
|
|
|
|
|
|
|
response(ctx, repo)
|
2023-10-20 08:16:04 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// PersonInbox function handles the incoming data for a repository inbox
|
|
|
|
func RepositoryInbox(ctx *context.APIContext) {
|
|
|
|
// swagger:operation POST /activitypub/repository-id/{repository-id}/inbox activitypub activitypubRepository
|
|
|
|
// ---
|
|
|
|
// summary: Send to the inbox
|
|
|
|
// produces:
|
|
|
|
// - application/json
|
|
|
|
// parameters:
|
|
|
|
// - name: repository-id
|
|
|
|
// in: path
|
|
|
|
// description: repository ID of the repo
|
|
|
|
// type: integer
|
|
|
|
// required: true
|
2023-11-08 02:56:22 -05:00
|
|
|
// - name: body
|
|
|
|
// in: body
|
|
|
|
// schema:
|
|
|
|
// "$ref": "#/definitions/Star"
|
2023-10-20 08:16:04 -05:00
|
|
|
// responses:
|
|
|
|
// "204":
|
|
|
|
// "$ref": "#/responses/empty"
|
|
|
|
|
2023-11-06 02:49:58 -05:00
|
|
|
log.Info("RepositoryInbox: repo %v, %v", ctx.Repo.Repository.OwnerName, ctx.Repo.Repository.Name)
|
2023-12-01 11:06:39 -05:00
|
|
|
activity := web.GetForm(ctx).(*forgefed.Star)
|
|
|
|
log.Info("RepositoryInbox: Activity.Source %v", activity.Source)
|
|
|
|
log.Info("RepositoryInbox: Activity.Actor %v", activity.Actor)
|
2023-11-03 11:45:53 -05:00
|
|
|
|
2023-11-15 08:27:47 -05:00
|
|
|
// assume actor is: "actor": "https://codeberg.org/api/v1/activitypub/user-id/12345" - NB: This might be actually the ID? Maybe check vocabulary.
|
2023-12-05 03:26:03 -05:00
|
|
|
// "https://Codeberg.org/api/v1/activitypub/user-id/12345"
|
2023-12-06 03:07:09 -05:00
|
|
|
// "https://codeberg.org:443/api/v1/activitypub/user-id/12345"
|
2023-12-05 03:26:03 -05:00
|
|
|
// "https://codeberg.org/api/v1/activitypub/../activitypub/user-id/12345"
|
2023-12-06 03:07:09 -05:00
|
|
|
// "https://user:password@codeberg.org/api/v1/activitypub/user-id/12345"
|
|
|
|
// "https://codeberg.org/api/v1/activitypub//user-id/12345"
|
2023-12-06 07:36:26 -05:00
|
|
|
|
|
|
|
// parse senderActorId
|
|
|
|
// senderActorId holds the data to construct the sender of the star
|
|
|
|
log.Info("activity.Actor.GetID().String(): %v", activity.Actor.GetID().String())
|
2023-12-07 05:45:24 -05:00
|
|
|
validatedURL, err := activitypub.ValidateAndParseIRI(activity.Actor.GetID().String())
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
senderActorId := activitypub.ParseActorID(validatedURL, string(activity.Source))
|
2023-12-06 07:36:26 -05:00
|
|
|
|
|
|
|
// Is the ActorID Struct valid?
|
|
|
|
senderActorId.PanicIfInvalid()
|
|
|
|
log.Info("RepositoryInbox: Actor parsed. %v", senderActorId)
|
|
|
|
|
2023-12-06 09:37:14 -05:00
|
|
|
remoteStargazer := senderActorId.GetNormalizedUri() // used as LoginName in newly created user
|
2023-12-06 07:36:26 -05:00
|
|
|
log.Info("remotStargazer: %v", remoteStargazer)
|
2023-11-15 06:29:17 -05:00
|
|
|
|
2023-12-01 09:07:13 -05:00
|
|
|
// Check if user already exists
|
2023-12-06 12:32:26 -05:00
|
|
|
// TODO: If the usesrs-id points to our current host, we've to use an alterantive search ...
|
2023-12-06 07:36:26 -05:00
|
|
|
users, err := searchUsersByPerson(remoteStargazer)
|
2023-12-05 04:37:51 -05:00
|
|
|
if err != nil {
|
2023-12-05 08:54:03 -05:00
|
|
|
panic(fmt.Errorf("searching for user failed: %v", err))
|
2023-12-05 04:37:51 -05:00
|
|
|
}
|
2023-12-06 03:07:09 -05:00
|
|
|
|
2023-12-06 07:36:26 -05:00
|
|
|
if len(users) == 0 {
|
2023-12-06 09:50:38 -05:00
|
|
|
// ToDo: We need a remote server with federation enabled to properly test this
|
2023-12-06 03:07:09 -05:00
|
|
|
|
2023-12-07 04:51:03 -05:00
|
|
|
body, err := getBody(remoteStargazer, ctx.Repo.Owner.HTMLURL(), ctx)
|
2023-12-07 04:44:35 -05:00
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Errorf("http get failed: %v", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
person, err := unmarshallPersonJSON(body)
|
2023-12-06 09:37:58 -05:00
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Errorf("getting user failed: %v", err))
|
|
|
|
}
|
2023-12-01 11:06:39 -05:00
|
|
|
|
2023-12-06 09:50:38 -05:00
|
|
|
// create user
|
2023-12-06 09:56:26 -05:00
|
|
|
err = createFederatedUserFromPerson(ctx, person, remoteStargazer)
|
2023-12-05 05:38:36 -05:00
|
|
|
if err != nil {
|
2023-12-05 08:54:03 -05:00
|
|
|
panic(fmt.Errorf("createUser: %w", err))
|
2023-12-05 04:37:51 -05:00
|
|
|
}
|
2023-12-06 09:56:26 -05:00
|
|
|
|
2023-12-01 11:06:39 -05:00
|
|
|
} else {
|
|
|
|
// use first user
|
|
|
|
user := users[0]
|
|
|
|
log.Info("%v", user)
|
2023-12-01 05:56:12 -05:00
|
|
|
}
|
2023-12-05 04:37:51 -05:00
|
|
|
|
2023-12-01 11:06:39 -05:00
|
|
|
// TODO: handle case of count > 1
|
|
|
|
// execute star action
|
2023-11-30 10:10:26 -05:00
|
|
|
|
2023-11-15 03:23:03 -05:00
|
|
|
// wait 15 sec.
|
2023-11-10 08:10:23 -05:00
|
|
|
|
2023-10-20 08:16:04 -05:00
|
|
|
ctx.Status(http.StatusNoContent)
|
|
|
|
}
|