forked from mirrors/gotosocial
[bugfix] Normalize status content (don't parse status content as IRI) (#1665)
* start fannying about * finish up Normalize * tidy up * pin to tag * move errors about just a little bit
This commit is contained in:
parent
4f322f527f
commit
c54510bc74
16 changed files with 665 additions and 293 deletions
2
go.mod
2
go.mod
|
@ -42,7 +42,7 @@ require (
|
||||||
github.com/spf13/cobra v1.6.1
|
github.com/spf13/cobra v1.6.1
|
||||||
github.com/spf13/viper v1.15.0
|
github.com/spf13/viper v1.15.0
|
||||||
github.com/stretchr/testify v1.8.2
|
github.com/stretchr/testify v1.8.2
|
||||||
github.com/superseriousbusiness/activity v1.2.1-gts
|
github.com/superseriousbusiness/activity v1.2.2-gts
|
||||||
github.com/superseriousbusiness/exif-terminator v0.5.0
|
github.com/superseriousbusiness/exif-terminator v0.5.0
|
||||||
github.com/superseriousbusiness/oauth2/v4 v4.3.2-SSB.0.20230227143000-f4900831d6c8
|
github.com/superseriousbusiness/oauth2/v4 v4.3.2-SSB.0.20230227143000-f4900831d6c8
|
||||||
github.com/tdewolff/minify/v2 v2.12.5
|
github.com/tdewolff/minify/v2 v2.12.5
|
||||||
|
|
4
go.sum
4
go.sum
|
@ -543,8 +543,8 @@ github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o
|
||||||
github.com/subosito/gotenv v1.4.2 h1:X1TuBLAMDFbaTAChgCBLu3DU3UPyELpnF2jjJ2cz/S8=
|
github.com/subosito/gotenv v1.4.2 h1:X1TuBLAMDFbaTAChgCBLu3DU3UPyELpnF2jjJ2cz/S8=
|
||||||
github.com/subosito/gotenv v1.4.2/go.mod h1:ayKnFf/c6rvx/2iiLrJUk1e6plDbT3edrFNGqEflhK0=
|
github.com/subosito/gotenv v1.4.2/go.mod h1:ayKnFf/c6rvx/2iiLrJUk1e6plDbT3edrFNGqEflhK0=
|
||||||
github.com/sunfish-shogi/bufseekio v0.0.0-20210207115823-a4185644b365/go.mod h1:dEzdXgvImkQ3WLI+0KQpmEx8T/C/ma9KeS3AfmU899I=
|
github.com/sunfish-shogi/bufseekio v0.0.0-20210207115823-a4185644b365/go.mod h1:dEzdXgvImkQ3WLI+0KQpmEx8T/C/ma9KeS3AfmU899I=
|
||||||
github.com/superseriousbusiness/activity v1.2.1-gts h1:wh7v0zYa1mJmqB35PSfvgl4cs51Dh5PyfKvcZLSxMQU=
|
github.com/superseriousbusiness/activity v1.2.2-gts h1:7duR8MCbYIKyM4UkeSkze2S/2+ve1XHs8kVfaFg58UI=
|
||||||
github.com/superseriousbusiness/activity v1.2.1-gts/go.mod h1:AZw0Xb4Oju8rmaJCZ21gc5CPg47MmNgyac+Hx5jo8VM=
|
github.com/superseriousbusiness/activity v1.2.2-gts/go.mod h1:AZw0Xb4Oju8rmaJCZ21gc5CPg47MmNgyac+Hx5jo8VM=
|
||||||
github.com/superseriousbusiness/exif-terminator v0.5.0 h1:57SO/geyaOl2v/lJSQLVcQbdghpyFuK8ZTtaHL81fUQ=
|
github.com/superseriousbusiness/exif-terminator v0.5.0 h1:57SO/geyaOl2v/lJSQLVcQbdghpyFuK8ZTtaHL81fUQ=
|
||||||
github.com/superseriousbusiness/exif-terminator v0.5.0/go.mod h1:d5IkskXco/3XRXzOrI73uGYn+wahJEqPlQSSqn6jxSw=
|
github.com/superseriousbusiness/exif-terminator v0.5.0/go.mod h1:d5IkskXco/3XRXzOrI73uGYn+wahJEqPlQSSqn6jxSw=
|
||||||
github.com/superseriousbusiness/go-jpeg-image-structure/v2 v2.0.0-20220321154430-d89a106fdabe h1:ksl2oCx/Qo8sNDc3Grb8WGKBM9nkvhCm25uvlT86azE=
|
github.com/superseriousbusiness/go-jpeg-image-structure/v2 v2.0.0-20220321154430-d89a106fdabe h1:ksl2oCx/Qo8sNDc3Grb8WGKBM9nkvhCm25uvlT86azE=
|
||||||
|
|
|
@ -15,4 +15,21 @@
|
||||||
// You should have received a copy of the GNU Affero General Public License
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
package federation
|
package ap
|
||||||
|
|
||||||
|
import "fmt"
|
||||||
|
|
||||||
|
// ErrWrongType indicates that we tried to resolve a type into
|
||||||
|
// an interface that it's not compatible with, eg a Person into
|
||||||
|
// a Statusable.
|
||||||
|
type ErrWrongType struct {
|
||||||
|
wrapped error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (err *ErrWrongType) Error() string {
|
||||||
|
return fmt.Sprintf("wrong received type: %v", err.wrapped)
|
||||||
|
}
|
||||||
|
|
||||||
|
func newErrWrongType(err error) error {
|
||||||
|
return &ErrWrongType{wrapped: err}
|
||||||
|
}
|
|
@ -60,6 +60,7 @@ type Statusable interface {
|
||||||
WithSensitive
|
WithSensitive
|
||||||
WithConversation
|
WithConversation
|
||||||
WithContent
|
WithContent
|
||||||
|
WithSetContent
|
||||||
WithAttachment
|
WithAttachment
|
||||||
WithTag
|
WithTag
|
||||||
WithReplies
|
WithReplies
|
||||||
|
@ -281,6 +282,11 @@ type WithContent interface {
|
||||||
GetActivityStreamsContent() vocab.ActivityStreamsContentProperty
|
GetActivityStreamsContent() vocab.ActivityStreamsContentProperty
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WithSetContent represents an activity that can have content set on it.
|
||||||
|
type WithSetContent interface {
|
||||||
|
SetActivityStreamsContent(vocab.ActivityStreamsContentProperty)
|
||||||
|
}
|
||||||
|
|
||||||
// WithPublished represents an activity with ActivityStreamsPublishedProperty
|
// WithPublished represents an activity with ActivityStreamsPublishedProperty
|
||||||
type WithPublished interface {
|
type WithPublished interface {
|
||||||
GetActivityStreamsPublished() vocab.ActivityStreamsPublishedProperty
|
GetActivityStreamsPublished() vocab.ActivityStreamsPublishedProperty
|
||||||
|
|
116
internal/ap/normalize.go
Normal file
116
internal/ap/normalize.go
Normal file
|
@ -0,0 +1,116 @@
|
||||||
|
// GoToSocial
|
||||||
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
||||||
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
//
|
||||||
|
// This program is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Affero General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This program is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Affero General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package ap
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/superseriousbusiness/activity/pub"
|
||||||
|
"github.com/superseriousbusiness/activity/streams"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NormalizeActivityObject normalizes the 'object'.'content' field of the given Activity.
|
||||||
|
//
|
||||||
|
// The rawActivity map should the freshly deserialized json representation of the Activity.
|
||||||
|
//
|
||||||
|
// This function is a noop if the type passed in is anything except a Create with a Statusable as its Object.
|
||||||
|
func NormalizeActivityObject(activity pub.Activity, rawActivity map[string]interface{}) {
|
||||||
|
if activity.GetTypeName() != ActivityCreate {
|
||||||
|
// Only interested in Create right now.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
withObject, ok := activity.(WithObject)
|
||||||
|
if !ok {
|
||||||
|
// Create was not a WithObject.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
createObject := withObject.GetActivityStreamsObject()
|
||||||
|
if createObject == nil {
|
||||||
|
// No object set.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if createObject.Len() != 1 {
|
||||||
|
// Not interested in Object arrays.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// We now know length is 1 so get the first
|
||||||
|
// item from the iter. We need this to be
|
||||||
|
// a Statusable if we're to continue.
|
||||||
|
i := createObject.At(0)
|
||||||
|
if i == nil {
|
||||||
|
// This is awkward.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
t := i.GetType()
|
||||||
|
if t == nil {
|
||||||
|
// This is also awkward.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
statusable, ok := t.(Statusable)
|
||||||
|
if !ok {
|
||||||
|
// Object is not Statusable;
|
||||||
|
// we're not interested.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
object, ok := rawActivity["object"]
|
||||||
|
if !ok {
|
||||||
|
// No object in raw map.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
rawStatusable, ok := object.(map[string]interface{})
|
||||||
|
if !ok {
|
||||||
|
// Object wasn't a json object.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Pass in the statusable and its raw JSON representation.
|
||||||
|
NormalizeStatusableContent(statusable, rawStatusable)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NormalizeStatusableContent replaces the Content of the given statusable
|
||||||
|
// with the raw 'content' value from the given json object map.
|
||||||
|
//
|
||||||
|
// noop if there was no content in the json object map or the content was
|
||||||
|
// not a plain string.
|
||||||
|
func NormalizeStatusableContent(statusable Statusable, rawStatusable map[string]interface{}) {
|
||||||
|
content, ok := rawStatusable["content"]
|
||||||
|
if !ok {
|
||||||
|
// No content in rawStatusable.
|
||||||
|
// TODO: In future we might also
|
||||||
|
// look for "contentMap" property.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
rawContent, ok := content.(string)
|
||||||
|
if !ok {
|
||||||
|
// Not interested in content arrays.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set normalized content property from the raw string; this
|
||||||
|
// will replace any existing content property on the statusable.
|
||||||
|
contentProp := streams.NewActivityStreamsContentProperty()
|
||||||
|
contentProp.AppendXMLSchemaString(rawContent)
|
||||||
|
statusable.SetActivityStreamsContent(contentProp)
|
||||||
|
}
|
110
internal/ap/normalize_test.go
Normal file
110
internal/ap/normalize_test.go
Normal file
|
@ -0,0 +1,110 @@
|
||||||
|
// GoToSocial
|
||||||
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
||||||
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
//
|
||||||
|
// This program is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Affero General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This program is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Affero General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package ap_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"github.com/superseriousbusiness/activity/streams"
|
||||||
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/testrig"
|
||||||
|
)
|
||||||
|
|
||||||
|
type NormalizeTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *NormalizeTestSuite) GetStatusable() (vocab.ActivityStreamsNote, map[string]interface{}) {
|
||||||
|
rawJson := `{
|
||||||
|
"@context": [
|
||||||
|
"https://www.w3.org/ns/activitystreams",
|
||||||
|
"https://example.org/schemas/litepub-0.1.jsonld",
|
||||||
|
{
|
||||||
|
"@language": "und"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"actor": "https://example.org/users/someone",
|
||||||
|
"attachment": [],
|
||||||
|
"attributedTo": "https://example.org/users/someone",
|
||||||
|
"cc": [
|
||||||
|
"https://example.org/users/someone/followers"
|
||||||
|
],
|
||||||
|
"content": "UPDATE: As of this morning there are now more than 7 million Mastodon users, most from the <a class=\"hashtag\" data-tag=\"twittermigration\" href=\"https://example.org/tag/twittermigration\" rel=\"tag ugc\">#TwitterMigration</a>.<br><br>In fact, 100,000 new accounts have been created since last night.<br><br>Since last night's spike 8,000-12,000 new accounts are being created every hour.<br><br>Yesterday, I estimated that Mastodon would have 8 million users by the end of the week. That might happen a lot sooner if this trend continues.",
|
||||||
|
"context": "https://example.org/contexts/01GX0MSHPER1E0FT022Q209EJZ",
|
||||||
|
"conversation": "https://example.org/contexts/01GX0MSHPER1E0FT022Q209EJZ",
|
||||||
|
"id": "https://example.org/objects/01GX0MT2PA58JNSMK11MCS65YD",
|
||||||
|
"published": "2022-11-18T17:43:58.489995Z",
|
||||||
|
"replies": {
|
||||||
|
"items": [
|
||||||
|
"https://example.org/objects/01GX0MV12MGEG3WF9SWB5K3KRJ"
|
||||||
|
],
|
||||||
|
"type": "Collection"
|
||||||
|
},
|
||||||
|
"repliesCount": 0,
|
||||||
|
"sensitive": null,
|
||||||
|
"source": "UPDATE: As of this morning there are now more than 7 million Mastodon users, most from the #TwitterMigration.\r\n\r\nIn fact, 100,000 new accounts have been created since last night.\r\n\r\nSince last night's spike 8,000-12,000 new accounts are being created every hour.\r\n\r\nYesterday, I estimated that Mastodon would have 8 million users by the end of the week. That might happen a lot sooner if this trend continues.",
|
||||||
|
"summary": "",
|
||||||
|
"tag": [
|
||||||
|
{
|
||||||
|
"href": "https://example.org/tags/twittermigration",
|
||||||
|
"name": "#twittermigration",
|
||||||
|
"type": "Hashtag"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"to": [
|
||||||
|
"https://www.w3.org/ns/activitystreams#Public"
|
||||||
|
],
|
||||||
|
"type": "Note"
|
||||||
|
}`
|
||||||
|
|
||||||
|
var rawNote map[string]interface{}
|
||||||
|
err := json.Unmarshal([]byte(rawJson), &rawNote)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
t, err := streams.ToType(context.Background(), rawNote)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return t.(vocab.ActivityStreamsNote), rawNote
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *NormalizeTestSuite) TestNormalizeActivityObject() {
|
||||||
|
note, rawNote := suite.GetStatusable()
|
||||||
|
suite.Equal(`update: As of this morning there are now more than 7 million Mastodon users, most from the <a class="hashtag" data-tag="twittermigration" href="https://example.org/tag/twittermigration" rel="tag ugc">#TwitterMigration%3C/a%3E.%3Cbr%3E%3Cbr%3EIn%20fact,%20100,000%20new%20accounts%20have%20been%20created%20since%20last%20night.%3Cbr%3E%3Cbr%3ESince%20last%20night&%2339;s%20spike%208,000-12,000%20new%20accounts%20are%20being%20created%20every%20hour.%3Cbr%3E%3Cbr%3EYesterday,%20I%20estimated%20that%20Mastodon%20would%20have%208%20million%20users%20by%20the%20end%20of%20the%20week.%20That%20might%20happen%20a%20lot%20sooner%20if%20this%20trend%20continues.`, ap.ExtractContent(note))
|
||||||
|
|
||||||
|
create := testrig.WrapAPNoteInCreate(
|
||||||
|
testrig.URLMustParse("https://example.org/create_something"),
|
||||||
|
testrig.URLMustParse("https://example.org/users/someone"),
|
||||||
|
testrig.TimeMustParse("2022-11-18T17:43:58.489995Z"),
|
||||||
|
note,
|
||||||
|
)
|
||||||
|
|
||||||
|
ap.NormalizeActivityObject(create, map[string]interface{}{"object": rawNote})
|
||||||
|
suite.Equal(`UPDATE: As of this morning there are now more than 7 million Mastodon users, most from the <a class="hashtag" data-tag="twittermigration" href="https://example.org/tag/twittermigration" rel="tag ugc">#TwitterMigration</a>.<br><br>In fact, 100,000 new accounts have been created since last night.<br><br>Since last night's spike 8,000-12,000 new accounts are being created every hour.<br><br>Yesterday, I estimated that Mastodon would have 8 million users by the end of the week. That might happen a lot sooner if this trend continues.`, ap.ExtractContent(note))
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestNormalizeTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(NormalizeTestSuite))
|
||||||
|
}
|
118
internal/ap/resolve.go
Normal file
118
internal/ap/resolve.go
Normal file
|
@ -0,0 +1,118 @@
|
||||||
|
// GoToSocial
|
||||||
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
||||||
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
//
|
||||||
|
// This program is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Affero General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This program is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Affero General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package ap
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/superseriousbusiness/activity/streams"
|
||||||
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ResolveStatusable tries to resolve the given bytes into an ActivityPub Statusable representation.
|
||||||
|
// It will then perform normalization on the Statusable by calling NormalizeStatusable, so that
|
||||||
|
// callers don't need to bother doing extra steps.
|
||||||
|
//
|
||||||
|
// Works for: Article, Document, Image, Video, Note, Page, Event, Place, Profile
|
||||||
|
func ResolveStatusable(ctx context.Context, b []byte) (Statusable, error) {
|
||||||
|
rawStatusable := make(map[string]interface{})
|
||||||
|
if err := json.Unmarshal(b, &rawStatusable); err != nil {
|
||||||
|
return nil, fmt.Errorf("ResolveStatusable: error unmarshalling bytes into json: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
t, err := streams.ToType(ctx, rawStatusable)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("ResolveStatusable: error resolving json into ap vocab type: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
statusable Statusable
|
||||||
|
ok bool
|
||||||
|
)
|
||||||
|
|
||||||
|
switch t.GetTypeName() {
|
||||||
|
case ObjectArticle:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsArticle)
|
||||||
|
case ObjectDocument:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsDocument)
|
||||||
|
case ObjectImage:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsImage)
|
||||||
|
case ObjectVideo:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsVideo)
|
||||||
|
case ObjectNote:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsNote)
|
||||||
|
case ObjectPage:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsPage)
|
||||||
|
case ObjectEvent:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsEvent)
|
||||||
|
case ObjectPlace:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsPlace)
|
||||||
|
case ObjectProfile:
|
||||||
|
statusable, ok = t.(vocab.ActivityStreamsProfile)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !ok {
|
||||||
|
err = fmt.Errorf("ResolveStatusable: could not resolve %T to Statusable", t)
|
||||||
|
return nil, newErrWrongType(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
NormalizeStatusableContent(statusable, rawStatusable)
|
||||||
|
return statusable, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResolveStatusable tries to resolve the given bytes into an ActivityPub Accountable representation.
|
||||||
|
//
|
||||||
|
// Works for: Application, Group, Organization, Person, Service
|
||||||
|
func ResolveAccountable(ctx context.Context, b []byte) (Accountable, error) {
|
||||||
|
rawAccountable := make(map[string]interface{})
|
||||||
|
if err := json.Unmarshal(b, &rawAccountable); err != nil {
|
||||||
|
return nil, fmt.Errorf("ResolveAccountable: error unmarshalling bytes into json: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
t, err := streams.ToType(ctx, rawAccountable)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("ResolveAccountable: error resolving json into ap vocab type: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
accountable Accountable
|
||||||
|
ok bool
|
||||||
|
)
|
||||||
|
|
||||||
|
switch t.GetTypeName() {
|
||||||
|
case ActorApplication:
|
||||||
|
accountable, ok = t.(vocab.ActivityStreamsApplication)
|
||||||
|
case ActorGroup:
|
||||||
|
accountable, ok = t.(vocab.ActivityStreamsGroup)
|
||||||
|
case ActorOrganization:
|
||||||
|
accountable, ok = t.(vocab.ActivityStreamsOrganization)
|
||||||
|
case ActorPerson:
|
||||||
|
accountable, ok = t.(vocab.ActivityStreamsPerson)
|
||||||
|
case ActorService:
|
||||||
|
accountable, ok = t.(vocab.ActivityStreamsService)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !ok {
|
||||||
|
err = fmt.Errorf("ResolveAccountable: could not resolve %T to Accountable", t)
|
||||||
|
return nil, newErrWrongType(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return accountable, nil
|
||||||
|
}
|
|
@ -357,39 +357,13 @@ func (d *deref) enrichAccount(ctx context.Context, requestUser string, uri *url.
|
||||||
|
|
||||||
// dereferenceAccountable calls remoteAccountID with a GET request, and tries to parse whatever
|
// dereferenceAccountable calls remoteAccountID with a GET request, and tries to parse whatever
|
||||||
// it finds as something that an account model can be constructed out of.
|
// it finds as something that an account model can be constructed out of.
|
||||||
//
|
|
||||||
// Will work for Person, Application, or Service models.
|
|
||||||
func (d *deref) dereferenceAccountable(ctx context.Context, transport transport.Transport, remoteAccountID *url.URL) (ap.Accountable, error) {
|
func (d *deref) dereferenceAccountable(ctx context.Context, transport transport.Transport, remoteAccountID *url.URL) (ap.Accountable, error) {
|
||||||
b, err := transport.Dereference(ctx, remoteAccountID)
|
b, err := transport.Dereference(ctx, remoteAccountID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("DereferenceAccountable: error deferencing %s: %w", remoteAccountID.String(), err)
|
return nil, fmt.Errorf("dereferenceAccountable: error deferencing %s: %w", remoteAccountID.String(), err)
|
||||||
}
|
}
|
||||||
|
|
||||||
m := make(map[string]interface{})
|
return ap.ResolveAccountable(ctx, b)
|
||||||
if err := json.Unmarshal(b, &m); err != nil {
|
|
||||||
return nil, fmt.Errorf("DereferenceAccountable: error unmarshalling bytes into json: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
t, err := streams.ToType(ctx, m)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("DereferenceAccountable: error resolving json into ap vocab type: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
//nolint:forcetypeassert
|
|
||||||
switch t.GetTypeName() {
|
|
||||||
case ap.ActorApplication:
|
|
||||||
return t.(vocab.ActivityStreamsApplication), nil
|
|
||||||
case ap.ActorGroup:
|
|
||||||
return t.(vocab.ActivityStreamsGroup), nil
|
|
||||||
case ap.ActorOrganization:
|
|
||||||
return t.(vocab.ActivityStreamsOrganization), nil
|
|
||||||
case ap.ActorPerson:
|
|
||||||
return t.(vocab.ActivityStreamsPerson), nil
|
|
||||||
case ap.ActorService:
|
|
||||||
return t.(vocab.ActivityStreamsService), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil, newErrWrongType(fmt.Errorf("DereferenceAccountable: type name %s not supported as Accountable", t.GetTypeName()))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *deref) fetchRemoteAccountAvatar(ctx context.Context, tsport transport.Transport, avatarURL string, accountID string) (string, error) {
|
func (d *deref) fetchRemoteAccountAvatar(ctx context.Context, tsport transport.Transport, avatarURL string, accountID string) (string, error) {
|
||||||
|
|
|
@ -66,20 +66,6 @@ func newErrTransportError(err error) error {
|
||||||
return &ErrTransportError{wrapped: err}
|
return &ErrTransportError{wrapped: err}
|
||||||
}
|
}
|
||||||
|
|
||||||
// ErrWrongType indicates that an unexpected type was returned from a remote call;
|
|
||||||
// for example, we were served a Person when we were looking for a statusable.
|
|
||||||
type ErrWrongType struct {
|
|
||||||
wrapped error
|
|
||||||
}
|
|
||||||
|
|
||||||
func (err *ErrWrongType) Error() string {
|
|
||||||
return fmt.Sprintf("wrong received type: %v", err.wrapped)
|
|
||||||
}
|
|
||||||
|
|
||||||
func newErrWrongType(err error) error {
|
|
||||||
return &ErrWrongType{wrapped: err}
|
|
||||||
}
|
|
||||||
|
|
||||||
// ErrOther denotes some other kind of weird error, perhaps from a malformed json
|
// ErrOther denotes some other kind of weird error, perhaps from a malformed json
|
||||||
// or some other weird crapola.
|
// or some other weird crapola.
|
||||||
type ErrOther struct {
|
type ErrOther struct {
|
||||||
|
|
|
@ -19,14 +19,11 @@ package dereferencing
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/superseriousbusiness/activity/streams"
|
|
||||||
"github.com/superseriousbusiness/activity/streams/vocab"
|
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/config"
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/db"
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
|
@ -161,78 +158,10 @@ func (d *deref) dereferenceStatusable(ctx context.Context, tsport transport.Tran
|
||||||
|
|
||||||
b, err := tsport.Dereference(ctx, remoteStatusID)
|
b, err := tsport.Dereference(ctx, remoteStatusID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("DereferenceStatusable: error deferencing %s: %s", remoteStatusID.String(), err)
|
return nil, fmt.Errorf("dereferenceStatusable: error deferencing %s: %w", remoteStatusID.String(), err)
|
||||||
}
|
}
|
||||||
|
|
||||||
m := make(map[string]interface{})
|
return ap.ResolveStatusable(ctx, b)
|
||||||
if err := json.Unmarshal(b, &m); err != nil {
|
|
||||||
return nil, fmt.Errorf("DereferenceStatusable: error unmarshalling bytes into json: %s", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
t, err := streams.ToType(ctx, m)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("DereferenceStatusable: error resolving json into ap vocab type: %s", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Article, Document, Image, Video, Note, Page, Event, Place, Mention, Profile
|
|
||||||
switch t.GetTypeName() {
|
|
||||||
case ap.ObjectArticle:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsArticle)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsArticle")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectDocument:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsDocument)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsDocument")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectImage:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsImage)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsImage")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectVideo:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsVideo)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsVideo")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectNote:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsNote)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsNote")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectPage:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsPage)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsPage")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectEvent:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsEvent)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsEvent")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectPlace:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsPlace)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsPlace")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
case ap.ObjectProfile:
|
|
||||||
p, ok := t.(vocab.ActivityStreamsProfile)
|
|
||||||
if !ok {
|
|
||||||
return nil, errors.New("DereferenceStatusable: error resolving type as ActivityStreamsProfile")
|
|
||||||
}
|
|
||||||
return p, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil, newErrWrongType(fmt.Errorf("DereferenceStatusable: type name %s not supported as Statusable", t.GetTypeName()))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// populateStatusFields fetches all the information we temporarily pinned to an incoming
|
// populateStatusFields fetches all the information we temporarily pinned to an incoming
|
||||||
|
|
|
@ -19,133 +19,218 @@ package federation
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"codeberg.org/gruf/go-kv"
|
||||||
"github.com/superseriousbusiness/activity/pub"
|
"github.com/superseriousbusiness/activity/pub"
|
||||||
|
"github.com/superseriousbusiness/activity/streams"
|
||||||
"github.com/superseriousbusiness/activity/streams/vocab"
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/log"
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
// federatingActor implements the go-fed federating protocol interface
|
// Potential incoming Content-Type header values; be
|
||||||
type federatingActor struct {
|
// lenient with whitespace and quotation mark placement.
|
||||||
actor pub.FederatingActor
|
var activityStreamsMediaTypes = []string{
|
||||||
|
"application/activity+json",
|
||||||
|
"application/ld+json;profile=https://www.w3.org/ns/activitystreams",
|
||||||
|
"application/ld+json;profile=\"https://www.w3.org/ns/activitystreams\"",
|
||||||
|
"application/ld+json ;profile=https://www.w3.org/ns/activitystreams",
|
||||||
|
"application/ld+json ;profile=\"https://www.w3.org/ns/activitystreams\"",
|
||||||
|
"application/ld+json ; profile=https://www.w3.org/ns/activitystreams",
|
||||||
|
"application/ld+json ; profile=\"https://www.w3.org/ns/activitystreams\"",
|
||||||
|
"application/ld+json; profile=https://www.w3.org/ns/activitystreams",
|
||||||
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\"",
|
||||||
}
|
}
|
||||||
|
|
||||||
// newFederatingProtocol returns the gotosocial implementation of the GTSFederatingProtocol interface
|
// federatingActor wraps the pub.FederatingActor interface
|
||||||
|
// with some custom GoToSocial-specific logic.
|
||||||
|
type federatingActor struct {
|
||||||
|
sideEffectActor pub.DelegateActor
|
||||||
|
wrapped pub.FederatingActor
|
||||||
|
}
|
||||||
|
|
||||||
|
// newFederatingProtocol returns a new federatingActor, which
|
||||||
|
// implements the pub.FederatingActor interface.
|
||||||
func newFederatingActor(c pub.CommonBehavior, s2s pub.FederatingProtocol, db pub.Database, clock pub.Clock) pub.FederatingActor {
|
func newFederatingActor(c pub.CommonBehavior, s2s pub.FederatingProtocol, db pub.Database, clock pub.Clock) pub.FederatingActor {
|
||||||
actor := pub.NewFederatingActor(c, s2s, db, clock)
|
sideEffectActor := pub.NewSideEffectActor(c, s2s, nil, db, clock)
|
||||||
|
customActor := pub.NewCustomActor(sideEffectActor, false, true, clock)
|
||||||
|
|
||||||
return &federatingActor{
|
return &federatingActor{
|
||||||
actor: actor,
|
sideEffectActor: sideEffectActor,
|
||||||
|
wrapped: customActor,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Send a federated activity.
|
|
||||||
//
|
|
||||||
// The provided url must be the outbox of the sender. All processing of
|
|
||||||
// the activity occurs similarly to the C2S flow:
|
|
||||||
// - If t is not an Activity, it is wrapped in a Create activity.
|
|
||||||
// - A new ID is generated for the activity.
|
|
||||||
// - The activity is added to the specified outbox.
|
|
||||||
// - The activity is prepared and delivered to recipients.
|
|
||||||
//
|
|
||||||
// Note that this function will only behave as expected if the
|
|
||||||
// implementation has been constructed to support federation. This
|
|
||||||
// method will guaranteed work for non-custom Actors. For custom actors,
|
|
||||||
// care should be used to not call this method if only C2S is supported.
|
|
||||||
func (f *federatingActor) Send(c context.Context, outbox *url.URL, t vocab.Type) (pub.Activity, error) {
|
func (f *federatingActor) Send(c context.Context, outbox *url.URL, t vocab.Type) (pub.Activity, error) {
|
||||||
log.Infof(c, "send activity %s via outbox %s", t.GetTypeName(), outbox)
|
log.Infof(c, "send activity %s via outbox %s", t.GetTypeName(), outbox)
|
||||||
return f.actor.Send(c, outbox, t)
|
return f.wrapped.Send(c, outbox, t)
|
||||||
}
|
}
|
||||||
|
|
||||||
// PostInbox returns true if the request was handled as an ActivityPub
|
|
||||||
// POST to an actor's inbox. If false, the request was not an
|
|
||||||
// ActivityPub request and may still be handled by the caller in
|
|
||||||
// another way, such as serving a web page.
|
|
||||||
//
|
|
||||||
// If the error is nil, then the ResponseWriter's headers and response
|
|
||||||
// has already been written. If a non-nil error is returned, then no
|
|
||||||
// response has been written.
|
|
||||||
//
|
|
||||||
// If the Actor was constructed with the Federated Protocol enabled,
|
|
||||||
// side effects will occur.
|
|
||||||
//
|
|
||||||
// If the Federated Protocol is not enabled, writes the
|
|
||||||
// http.StatusMethodNotAllowed status code in the response. No side
|
|
||||||
// effects occur.
|
|
||||||
func (f *federatingActor) PostInbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
func (f *federatingActor) PostInbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
||||||
return f.actor.PostInbox(c, w, r)
|
return f.PostInboxScheme(c, w, r, "https")
|
||||||
}
|
}
|
||||||
|
|
||||||
// PostInboxScheme is similar to PostInbox, except clients are able to
|
// PostInboxScheme is a reimplementation of the default baseActor
|
||||||
// specify which protocol scheme to handle the incoming request and the
|
// implementation of PostInboxScheme in pub/base_actor.go.
|
||||||
// data stored within the application (HTTP, HTTPS, etc).
|
//
|
||||||
func (f *federatingActor) PostInboxScheme(c context.Context, w http.ResponseWriter, r *http.Request, scheme string) (bool, error) {
|
// Key differences from that implementation:
|
||||||
return f.actor.PostInboxScheme(c, w, r, scheme)
|
// - More explicit debug logging when a request is not processed.
|
||||||
|
// - Normalize content of activity object.
|
||||||
|
// - Return code 202 instead of 200 on successful POST, to reflect
|
||||||
|
// that we process most side effects asynchronously.
|
||||||
|
func (f *federatingActor) PostInboxScheme(ctx context.Context, w http.ResponseWriter, r *http.Request, scheme string) (bool, error) {
|
||||||
|
l := log.
|
||||||
|
WithContext(ctx).
|
||||||
|
WithFields([]kv.Field{
|
||||||
|
{"userAgent", r.UserAgent()},
|
||||||
|
{"path", r.URL.Path},
|
||||||
|
}...)
|
||||||
|
|
||||||
|
// Do nothing if this is not an ActivityPub POST request.
|
||||||
|
if !func() bool {
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
l.Debugf("inbox request was %s rather than required POST", r.Method)
|
||||||
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetInbox returns true if the request was handled as an ActivityPub
|
contentType := r.Header.Get("Content-Type")
|
||||||
// GET to an actor's inbox. If false, the request was not an ActivityPub
|
for _, mediaType := range activityStreamsMediaTypes {
|
||||||
// request and may still be handled by the caller in another way, such
|
if strings.Contains(contentType, mediaType) {
|
||||||
// as serving a web page.
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
l.Debugf("inbox POST request content-type %s was not recognized", contentType)
|
||||||
|
return false
|
||||||
|
}() {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check the peer request is authentic.
|
||||||
|
ctx, authenticated, err := f.sideEffectActor.AuthenticatePostInbox(ctx, w, r)
|
||||||
|
if err != nil {
|
||||||
|
return true, err
|
||||||
|
} else if !authenticated {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Begin processing the request, but note that we have
|
||||||
|
// not yet applied authorization (ex: blocks).
|
||||||
//
|
//
|
||||||
// If the error is nil, then the ResponseWriter's headers and response
|
// Obtain the activity and reject unknown activities.
|
||||||
// has already been written. If a non-nil error is returned, then no
|
b, err := io.ReadAll(r.Body)
|
||||||
// response has been written.
|
if err != nil {
|
||||||
|
err = fmt.Errorf("PostInboxScheme: error reading request body: %w", err)
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
|
||||||
|
var rawActivity map[string]interface{}
|
||||||
|
if err := json.Unmarshal(b, &rawActivity); err != nil {
|
||||||
|
err = fmt.Errorf("PostInboxScheme: error unmarshalling request body: %w", err)
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
|
||||||
|
t, err := streams.ToType(ctx, rawActivity)
|
||||||
|
if err != nil {
|
||||||
|
if !streams.IsUnmatchedErr(err) {
|
||||||
|
// Real error.
|
||||||
|
err = fmt.Errorf("PostInboxScheme: error matching json to type: %w", err)
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
// Respond with bad request; we just couldn't
|
||||||
|
// match the type to one that we know about.
|
||||||
|
l.Debug("json could not be resolved to ActivityStreams value")
|
||||||
|
w.WriteHeader(http.StatusBadRequest)
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
activity, ok := t.(pub.Activity)
|
||||||
|
if !ok {
|
||||||
|
err = fmt.Errorf("ActivityStreams value with type %T is not a pub.Activity", t)
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if activity.GetJSONLDId() == nil {
|
||||||
|
l.Debugf("incoming Activity %s did not have required id property set", activity.GetTypeName())
|
||||||
|
w.WriteHeader(http.StatusBadRequest)
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If activity Object is a Statusable, we'll want to replace the
|
||||||
|
// parsed `content` value with the value from the raw JSON instead.
|
||||||
|
// See https://github.com/superseriousbusiness/gotosocial/issues/1661
|
||||||
|
ap.NormalizeActivityObject(activity, rawActivity)
|
||||||
|
|
||||||
|
// Allow server implementations to set context data with a hook.
|
||||||
|
ctx, err = f.sideEffectActor.PostInboxRequestBodyHook(ctx, r, activity)
|
||||||
|
if err != nil {
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check authorization of the activity.
|
||||||
|
authorized, err := f.sideEffectActor.AuthorizePostInbox(ctx, w, activity)
|
||||||
|
if err != nil {
|
||||||
|
return true, err
|
||||||
|
} else if !authorized {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Copy existing URL + add request host and scheme.
|
||||||
|
inboxID := func() *url.URL {
|
||||||
|
id := &url.URL{}
|
||||||
|
*id = *r.URL
|
||||||
|
id.Host = r.Host
|
||||||
|
id.Scheme = scheme
|
||||||
|
return id
|
||||||
|
}()
|
||||||
|
|
||||||
|
// Post the activity to the actor's inbox and trigger side effects for
|
||||||
|
// that particular Activity type. It is up to the delegate to resolve
|
||||||
|
// the given map.
|
||||||
|
if err := f.sideEffectActor.PostInbox(ctx, inboxID, activity); err != nil {
|
||||||
|
// Special case: We know it is a bad request if the object or
|
||||||
|
// target properties needed to be populated, but weren't.
|
||||||
//
|
//
|
||||||
// If the request is an ActivityPub request, the Actor will defer to the
|
// Send the rejection to the peer.
|
||||||
// application to determine the correct authorization of the request and
|
if err == pub.ErrObjectRequired || err == pub.ErrTargetRequired {
|
||||||
// the resulting OrderedCollection to respond with. The Actor handles
|
l.Debugf("malformed incoming Activity: %s", err)
|
||||||
// serializing this OrderedCollection and responding with the correct
|
w.WriteHeader(http.StatusBadRequest)
|
||||||
// headers and http.StatusOK.
|
return true, nil
|
||||||
|
}
|
||||||
|
err = fmt.Errorf("PostInboxScheme: error calling sideEffectActor.PostInbox: %w", err)
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Our side effects are complete, now delegate determining whether to do inbox forwarding, as well as the action to do it.
|
||||||
|
if err := f.sideEffectActor.InboxForwarding(ctx, inboxID, activity); err != nil {
|
||||||
|
err = fmt.Errorf("PostInboxScheme: error calling sideEffectActor.InboxForwarding: %w", err)
|
||||||
|
return true, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Request is now undergoing processing.
|
||||||
|
// Respond with an Accepted status.
|
||||||
|
w.WriteHeader(http.StatusAccepted)
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
func (f *federatingActor) GetInbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
func (f *federatingActor) GetInbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
||||||
return f.actor.GetInbox(c, w, r)
|
return f.wrapped.GetInbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// PostOutbox returns true if the request was handled as an ActivityPub
|
|
||||||
// POST to an actor's outbox. If false, the request was not an
|
|
||||||
// ActivityPub request and may still be handled by the caller in another
|
|
||||||
// way, such as serving a web page.
|
|
||||||
//
|
|
||||||
// If the error is nil, then the ResponseWriter's headers and response
|
|
||||||
// has already been written. If a non-nil error is returned, then no
|
|
||||||
// response has been written.
|
|
||||||
//
|
|
||||||
// If the Actor was constructed with the Social Protocol enabled, side
|
|
||||||
// effects will occur.
|
|
||||||
//
|
|
||||||
// If the Social Protocol is not enabled, writes the
|
|
||||||
// http.StatusMethodNotAllowed status code in the response. No side
|
|
||||||
// effects occur.
|
|
||||||
//
|
|
||||||
// If the Social and Federated Protocol are both enabled, it will handle
|
|
||||||
// the side effects of receiving an ActivityStream Activity, and then
|
|
||||||
// federate the Activity to peers.
|
|
||||||
func (f *federatingActor) PostOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
func (f *federatingActor) PostOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
||||||
return f.actor.PostOutbox(c, w, r)
|
return f.wrapped.PostOutbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// PostOutboxScheme is similar to PostOutbox, except clients are able to
|
|
||||||
// specify which protocol scheme to handle the incoming request and the
|
|
||||||
// data stored within the application (HTTP, HTTPS, etc).
|
|
||||||
func (f *federatingActor) PostOutboxScheme(c context.Context, w http.ResponseWriter, r *http.Request, scheme string) (bool, error) {
|
func (f *federatingActor) PostOutboxScheme(c context.Context, w http.ResponseWriter, r *http.Request, scheme string) (bool, error) {
|
||||||
return f.actor.PostOutboxScheme(c, w, r, scheme)
|
return f.wrapped.PostOutboxScheme(c, w, r, scheme)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetOutbox returns true if the request was handled as an ActivityPub
|
|
||||||
// GET to an actor's outbox. If false, the request was not an
|
|
||||||
// ActivityPub request.
|
|
||||||
//
|
|
||||||
// If the error is nil, then the ResponseWriter's headers and response
|
|
||||||
// has already been written. If a non-nil error is returned, then no
|
|
||||||
// response has been written.
|
|
||||||
//
|
|
||||||
// If the request is an ActivityPub request, the Actor will defer to the
|
|
||||||
// application to determine the correct authorization of the request and
|
|
||||||
// the resulting OrderedCollection to respond with. The Actor handles
|
|
||||||
// serializing this OrderedCollection and responding with the correct
|
|
||||||
// headers and http.StatusOK.
|
|
||||||
func (f *federatingActor) GetOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
func (f *federatingActor) GetOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (bool, error) {
|
||||||
return f.actor.GetOutbox(c, w, r)
|
return f.wrapped.GetOutbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,7 +24,6 @@ import (
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
|
||||||
"codeberg.org/gruf/go-kv"
|
|
||||||
"github.com/superseriousbusiness/activity/pub"
|
"github.com/superseriousbusiness/activity/pub"
|
||||||
"github.com/superseriousbusiness/activity/streams"
|
"github.com/superseriousbusiness/activity/streams"
|
||||||
"github.com/superseriousbusiness/activity/streams/vocab"
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
||||||
|
@ -138,74 +137,80 @@ func (f *federator) PostInboxRequestBodyHook(ctx context.Context, r *http.Reques
|
||||||
// authenticated must be true and error nil. The request will continue
|
// authenticated must be true and error nil. The request will continue
|
||||||
// to be processed.
|
// to be processed.
|
||||||
func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWriter, r *http.Request) (context.Context, bool, error) {
|
func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWriter, r *http.Request) (context.Context, bool, error) {
|
||||||
l := log.WithContext(ctx).
|
log.Tracef(ctx, "received request to authenticate inbox %s", r.URL.String())
|
||||||
WithFields(kv.Fields{
|
|
||||||
{"useragent", r.UserAgent()},
|
|
||||||
{"url", r.URL.String()},
|
|
||||||
}...)
|
|
||||||
l.Trace("received request to authenticate")
|
|
||||||
|
|
||||||
if !uris.IsInboxPath(r.URL) {
|
|
||||||
return nil, false, fmt.Errorf("path %s was not an inbox path", r.URL.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
|
// Ensure this is an inbox path, and fetch the inbox owner
|
||||||
|
// account by parsing username from `/users/{username}/inbox`.
|
||||||
username, err := uris.ParseInboxPath(r.URL)
|
username, err := uris.ParseInboxPath(r.URL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, fmt.Errorf("could not parse path %s: %s", r.URL.String(), err)
|
err = fmt.Errorf("AuthenticatePostInbox: could not parse %s as inbox path: %w", r.URL.String(), err)
|
||||||
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if username == "" {
|
if username == "" {
|
||||||
return nil, false, errors.New("username was empty")
|
err = errors.New("AuthenticatePostInbox: inbox username was empty")
|
||||||
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
receivingAccount, err := f.db.GetAccountByUsernameDomain(ctx, username, "")
|
receivingAccount, err := f.db.GetAccountByUsernameDomain(ctx, username, "")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, fmt.Errorf("could not fetch receiving account with username %s: %s", username, err)
|
err = fmt.Errorf("AuthenticatePostInbox: could not fetch receiving account %s: %w", username, err)
|
||||||
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Check who's delivering by inspecting the http signature.
|
||||||
publicKeyOwnerURI, errWithCode := f.AuthenticateFederatedRequest(ctx, receivingAccount.Username)
|
publicKeyOwnerURI, errWithCode := f.AuthenticateFederatedRequest(ctx, receivingAccount.Username)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
switch errWithCode.Code() {
|
switch errWithCode.Code() {
|
||||||
case http.StatusUnauthorized, http.StatusForbidden, http.StatusBadRequest:
|
case http.StatusUnauthorized, http.StatusForbidden, http.StatusBadRequest:
|
||||||
// if 400, 401, or 403, obey the interface by writing the header and bailing
|
// If codes 400, 401, or 403, obey the go-fed
|
||||||
|
// interface by writing the header and bailing.
|
||||||
w.WriteHeader(errWithCode.Code())
|
w.WriteHeader(errWithCode.Code())
|
||||||
return ctx, false, nil
|
return ctx, false, nil
|
||||||
case http.StatusGone:
|
case http.StatusGone:
|
||||||
// if the requesting account has gone (http 410) then likely
|
// If the requesting account's key has gone
|
||||||
// inbox post was a delete, we can just write 202 and leave,
|
// (410) then likely inbox post was a delete.
|
||||||
// since we didn't know about the account anyway, so we can't
|
//
|
||||||
// do any further processing
|
// We can just write 202 and leave: we didn't
|
||||||
|
// know about the account anyway, so we can't
|
||||||
|
// do any further processing.
|
||||||
w.WriteHeader(http.StatusAccepted)
|
w.WriteHeader(http.StatusAccepted)
|
||||||
return ctx, false, nil
|
return ctx, false, nil
|
||||||
default:
|
default:
|
||||||
// if not, there's been a proper error
|
// Proper error.
|
||||||
return ctx, false, err
|
return ctx, false, err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// authentication has passed, so add an instance entry for this instance if it hasn't been done already
|
// Authentication has passed, check if we need to create a
|
||||||
i := >smodel.Instance{}
|
// new instance entry for the Host of the requesting account.
|
||||||
if err := f.db.GetWhere(ctx, []db.Where{{Key: "domain", Value: publicKeyOwnerURI.Host}}, i); err != nil {
|
if _, err := f.db.GetInstance(ctx, publicKeyOwnerURI.Host); err != nil {
|
||||||
if err != db.ErrNoEntries {
|
if !errors.Is(err, db.ErrNoEntries) {
|
||||||
// there's been an actual error
|
// There's been an actual error.
|
||||||
return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err)
|
err = fmt.Errorf("AuthenticatePostInbox: error getting instance %s: %w", publicKeyOwnerURI.Host, err)
|
||||||
|
return ctx, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// we don't have an entry for this instance yet so dereference it
|
// We don't yet have an entry for
|
||||||
i, err = f.GetRemoteInstance(transport.WithFastfail(ctx), username, &url.URL{
|
// the instance, go dereference it.
|
||||||
|
instance, err := f.GetRemoteInstance(transport.WithFastfail(ctx), username, &url.URL{
|
||||||
Scheme: publicKeyOwnerURI.Scheme,
|
Scheme: publicKeyOwnerURI.Scheme,
|
||||||
Host: publicKeyOwnerURI.Host,
|
Host: publicKeyOwnerURI.Host,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, fmt.Errorf("could not dereference new remote instance %s during AuthenticatePostInbox: %s", publicKeyOwnerURI.Host, err)
|
err = fmt.Errorf("AuthenticatePostInbox: error dereferencing instance %s: %w", publicKeyOwnerURI.Host, err)
|
||||||
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// and put it in the db
|
if err := f.db.Put(ctx, instance); err != nil {
|
||||||
if err := f.db.Put(ctx, i); err != nil {
|
err = fmt.Errorf("AuthenticatePostInbox: error inserting instance entry for %s: %w", publicKeyOwnerURI.Host, err)
|
||||||
return nil, false, fmt.Errorf("error inserting newly dereferenced instance %s: %s", publicKeyOwnerURI.Host, err)
|
return nil, false, err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// We know the public key owner URI now, so we can
|
||||||
|
// dereference the remote account (or just get it
|
||||||
|
// from the db if we already have it).
|
||||||
requestingAccount, err := f.GetAccountByURI(
|
requestingAccount, err := f.GetAccountByURI(
|
||||||
transport.WithFastfail(ctx), username, publicKeyOwnerURI, false,
|
transport.WithFastfail(ctx), username, publicKeyOwnerURI, false,
|
||||||
)
|
)
|
||||||
|
@ -220,9 +225,12 @@ func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWr
|
||||||
w.WriteHeader(http.StatusAccepted)
|
w.WriteHeader(http.StatusAccepted)
|
||||||
return ctx, false, nil
|
return ctx, false, nil
|
||||||
}
|
}
|
||||||
return nil, false, fmt.Errorf("couldn't get requesting account %s: %s", publicKeyOwnerURI, err)
|
err = fmt.Errorf("AuthenticatePostInbox: couldn't get requesting account %s: %w", publicKeyOwnerURI, err)
|
||||||
|
return nil, false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// We have everything we need now, set the requesting
|
||||||
|
// and receiving accounts on the context for later use.
|
||||||
withRequesting := context.WithValue(ctx, ap.ContextRequestingAccount, requestingAccount)
|
withRequesting := context.WithValue(ctx, ap.ContextRequestingAccount, requestingAccount)
|
||||||
withReceiving := context.WithValue(withRequesting, ap.ContextReceivingAccount, receivingAccount)
|
withReceiving := context.WithValue(withRequesting, ap.ContextReceivingAccount, receivingAccount)
|
||||||
return withReceiving, true, nil
|
return withReceiving, true, nil
|
||||||
|
@ -351,14 +359,15 @@ func (f *federator) Blocked(ctx context.Context, actorIRIs []*url.URL) (bool, er
|
||||||
// type and extension. The unhandled ones are passed to DefaultCallback.
|
// type and extension. The unhandled ones are passed to DefaultCallback.
|
||||||
func (f *federator) FederatingCallbacks(ctx context.Context) (wrapped pub.FederatingWrappedCallbacks, other []interface{}, err error) {
|
func (f *federator) FederatingCallbacks(ctx context.Context) (wrapped pub.FederatingWrappedCallbacks, other []interface{}, err error) {
|
||||||
wrapped = pub.FederatingWrappedCallbacks{
|
wrapped = pub.FederatingWrappedCallbacks{
|
||||||
// OnFollow determines what action to take for this particular callback
|
// OnFollow determines what action to take for this
|
||||||
// if a Follow Activity is handled.
|
// particular callback if a Follow Activity is handled.
|
||||||
//
|
//
|
||||||
// For our implementation, we always want to do nothing because we have internal logic for handling follows.
|
// For our implementation, we always want to do nothing
|
||||||
|
// because we have internal logic for handling follows.
|
||||||
OnFollow: pub.OnFollowDoNothing,
|
OnFollow: pub.OnFollowDoNothing,
|
||||||
}
|
}
|
||||||
|
|
||||||
// override some default behaviors and trigger our own side effects
|
// Override some default behaviors to trigger our own side effects.
|
||||||
other = []interface{}{
|
other = []interface{}{
|
||||||
func(ctx context.Context, undo vocab.ActivityStreamsUndo) error {
|
func(ctx context.Context, undo vocab.ActivityStreamsUndo) error {
|
||||||
return f.FederatingDB().Undo(ctx, undo)
|
return f.FederatingDB().Undo(ctx, undo)
|
||||||
|
@ -385,11 +394,7 @@ func (f *federator) FederatingCallbacks(ctx context.Context) (wrapped pub.Federa
|
||||||
// type and extension, so the unhandled ones are passed to
|
// type and extension, so the unhandled ones are passed to
|
||||||
// DefaultCallback.
|
// DefaultCallback.
|
||||||
func (f *federator) DefaultCallback(ctx context.Context, activity pub.Activity) error {
|
func (f *federator) DefaultCallback(ctx context.Context, activity pub.Activity) error {
|
||||||
l := log.WithContext(ctx).
|
log.Debugf(ctx, "received unhandle-able activity type (%s) so ignoring it", activity.GetTypeName())
|
||||||
WithFields(kv.Fields{
|
|
||||||
{"aptype", activity.GetTypeName()},
|
|
||||||
}...)
|
|
||||||
l.Debug("received unhandle-able activity type so ignoring it")
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -25,6 +25,7 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"codeberg.org/gruf/go-kv"
|
"codeberg.org/gruf/go-kv"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/config"
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/db"
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
|
@ -131,9 +132,10 @@ func (p *Processor) SearchGet(ctx context.Context, authed *oauth.Auth, search *a
|
||||||
// check if it's a status...
|
// check if it's a status...
|
||||||
foundStatus, err := p.searchStatusByURI(ctx, authed, uri)
|
foundStatus, err := p.searchStatusByURI(ctx, authed, uri)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// Check for semi-expected error types.
|
||||||
var (
|
var (
|
||||||
errNotRetrievable *dereferencing.ErrNotRetrievable
|
errNotRetrievable *dereferencing.ErrNotRetrievable
|
||||||
errWrongType *dereferencing.ErrWrongType
|
errWrongType *ap.ErrWrongType
|
||||||
)
|
)
|
||||||
if !errors.As(err, &errNotRetrievable) && !errors.As(err, &errWrongType) {
|
if !errors.As(err, &errNotRetrievable) && !errors.As(err, &errWrongType) {
|
||||||
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error looking up status: %w", err))
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error looking up status: %w", err))
|
||||||
|
@ -148,9 +150,10 @@ func (p *Processor) SearchGet(ctx context.Context, authed *oauth.Auth, search *a
|
||||||
if !foundOne {
|
if !foundOne {
|
||||||
foundAccount, err := p.searchAccountByURI(ctx, authed, uri, search.Resolve)
|
foundAccount, err := p.searchAccountByURI(ctx, authed, uri, search.Resolve)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// Check for semi-expected error types.
|
||||||
var (
|
var (
|
||||||
errNotRetrievable *dereferencing.ErrNotRetrievable
|
errNotRetrievable *dereferencing.ErrNotRetrievable
|
||||||
errWrongType *dereferencing.ErrWrongType
|
errWrongType *ap.ErrWrongType
|
||||||
)
|
)
|
||||||
if !errors.As(err, &errNotRetrievable) && !errors.As(err, &errWrongType) {
|
if !errors.As(err, &errNotRetrievable) && !errors.As(err, &errWrongType) {
|
||||||
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error looking up account: %w", err))
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error looking up account: %w", err))
|
||||||
|
|
17
vendor/github.com/superseriousbusiness/activity/pub/base_actor.go
generated
vendored
17
vendor/github.com/superseriousbusiness/activity/pub/base_actor.go
generated
vendored
|
@ -67,7 +67,8 @@ func NewSocialActor(c CommonBehavior,
|
||||||
db Database,
|
db Database,
|
||||||
clock Clock) Actor {
|
clock Clock) Actor {
|
||||||
return &baseActor{
|
return &baseActor{
|
||||||
delegate: &sideEffectActor{
|
// Use SideEffectActor without s2s.
|
||||||
|
delegate: &SideEffectActor{
|
||||||
common: c,
|
common: c,
|
||||||
c2s: c2s,
|
c2s: c2s,
|
||||||
db: db,
|
db: db,
|
||||||
|
@ -96,7 +97,8 @@ func NewFederatingActor(c CommonBehavior,
|
||||||
clock Clock) FederatingActor {
|
clock Clock) FederatingActor {
|
||||||
return &baseActorFederating{
|
return &baseActorFederating{
|
||||||
baseActor{
|
baseActor{
|
||||||
delegate: &sideEffectActor{
|
// Use SideEffectActor without c2s.
|
||||||
|
delegate: &SideEffectActor{
|
||||||
common: c,
|
common: c,
|
||||||
s2s: s2s,
|
s2s: s2s,
|
||||||
db: db,
|
db: db,
|
||||||
|
@ -124,13 +126,7 @@ func NewActor(c CommonBehavior,
|
||||||
clock Clock) FederatingActor {
|
clock Clock) FederatingActor {
|
||||||
return &baseActorFederating{
|
return &baseActorFederating{
|
||||||
baseActor{
|
baseActor{
|
||||||
delegate: &sideEffectActor{
|
delegate: NewSideEffectActor(c, s2s, c2s, db, clock),
|
||||||
common: c,
|
|
||||||
c2s: c2s,
|
|
||||||
s2s: s2s,
|
|
||||||
db: db,
|
|
||||||
clock: clock,
|
|
||||||
},
|
|
||||||
enableSocialProtocol: true,
|
enableSocialProtocol: true,
|
||||||
enableFederatedProtocol: true,
|
enableFederatedProtocol: true,
|
||||||
clock: clock,
|
clock: clock,
|
||||||
|
@ -147,6 +143,9 @@ func NewActor(c CommonBehavior,
|
||||||
//
|
//
|
||||||
// It is possible to create a DelegateActor that is not ActivityPub compliant.
|
// It is possible to create a DelegateActor that is not ActivityPub compliant.
|
||||||
// Use with due care.
|
// Use with due care.
|
||||||
|
//
|
||||||
|
// If you find yourself passing a SideEffectActor in as the DelegateActor,
|
||||||
|
// consider using NewActor, NewFederatingActor, or NewSocialActor instead.
|
||||||
func NewCustomActor(delegate DelegateActor,
|
func NewCustomActor(delegate DelegateActor,
|
||||||
enableSocialProtocol, enableFederatedProtocol bool,
|
enableSocialProtocol, enableFederatedProtocol bool,
|
||||||
clock Clock) FederatingActor {
|
clock Clock) FederatingActor {
|
||||||
|
|
76
vendor/github.com/superseriousbusiness/activity/pub/side_effect_actor.go
generated
vendored
76
vendor/github.com/superseriousbusiness/activity/pub/side_effect_actor.go
generated
vendored
|
@ -12,16 +12,16 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
// sideEffectActor must satisfy the DelegateActor interface.
|
// sideEffectActor must satisfy the DelegateActor interface.
|
||||||
var _ DelegateActor = &sideEffectActor{}
|
var _ DelegateActor = &SideEffectActor{}
|
||||||
|
|
||||||
// sideEffectActor is a DelegateActor that handles the ActivityPub
|
// SideEffectActor is a DelegateActor that handles the ActivityPub
|
||||||
// implementation side effects, but requires a more opinionated application to
|
// implementation side effects, but requires a more opinionated application to
|
||||||
// be written.
|
// be written.
|
||||||
//
|
//
|
||||||
// Note that when using the sideEffectActor with an application that good-faith
|
// Note that when using the SideEffectActor with an application that good-faith
|
||||||
// implements its required interfaces, the ActivityPub specification is
|
// implements its required interfaces, the ActivityPub specification is
|
||||||
// guaranteed to be correctly followed.
|
// guaranteed to be correctly followed.
|
||||||
type sideEffectActor struct {
|
type SideEffectActor struct {
|
||||||
common CommonBehavior
|
common CommonBehavior
|
||||||
s2s FederatingProtocol
|
s2s FederatingProtocol
|
||||||
c2s SocialProtocol
|
c2s SocialProtocol
|
||||||
|
@ -29,49 +29,73 @@ type sideEffectActor struct {
|
||||||
clock Clock
|
clock Clock
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewSideEffectActor returns a new SideEffectActor, which satisfies the
|
||||||
|
// DelegateActor interface. Most of the time you will not need to call this
|
||||||
|
// function, and should instead rely on the NewSocialActor, NewFederatingActor,
|
||||||
|
// and NewActor functions, all of which use a SideEffectActor under the hood.
|
||||||
|
// Nevertheless, this function is exposed in case application developers need
|
||||||
|
// a SideEffectActor for some other reason (tests, monkey patches, etc).
|
||||||
|
//
|
||||||
|
// If you are using the returned SideEffectActor for federation, ensure that s2s
|
||||||
|
// is not nil. Likewise, if you are using it for the social protocol, ensure
|
||||||
|
// that c2s is not nil.
|
||||||
|
func NewSideEffectActor(c CommonBehavior,
|
||||||
|
s2s FederatingProtocol,
|
||||||
|
c2s SocialProtocol,
|
||||||
|
db Database,
|
||||||
|
clock Clock) *SideEffectActor {
|
||||||
|
return &SideEffectActor{
|
||||||
|
common: c,
|
||||||
|
s2s: s2s,
|
||||||
|
c2s: c2s,
|
||||||
|
db: db,
|
||||||
|
clock: clock,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// PostInboxRequestBodyHook defers to the delegate.
|
// PostInboxRequestBodyHook defers to the delegate.
|
||||||
func (a *sideEffectActor) PostInboxRequestBodyHook(c context.Context, r *http.Request, activity Activity) (context.Context, error) {
|
func (a *SideEffectActor) PostInboxRequestBodyHook(c context.Context, r *http.Request, activity Activity) (context.Context, error) {
|
||||||
return a.s2s.PostInboxRequestBodyHook(c, r, activity)
|
return a.s2s.PostInboxRequestBodyHook(c, r, activity)
|
||||||
}
|
}
|
||||||
|
|
||||||
// PostOutboxRequestBodyHook defers to the delegate.
|
// PostOutboxRequestBodyHook defers to the delegate.
|
||||||
func (a *sideEffectActor) PostOutboxRequestBodyHook(c context.Context, r *http.Request, data vocab.Type) (context.Context, error) {
|
func (a *SideEffectActor) PostOutboxRequestBodyHook(c context.Context, r *http.Request, data vocab.Type) (context.Context, error) {
|
||||||
return a.c2s.PostOutboxRequestBodyHook(c, r, data)
|
return a.c2s.PostOutboxRequestBodyHook(c, r, data)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthenticatePostInbox defers to the delegate to authenticate the request.
|
// AuthenticatePostInbox defers to the delegate to authenticate the request.
|
||||||
func (a *sideEffectActor) AuthenticatePostInbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
func (a *SideEffectActor) AuthenticatePostInbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
||||||
return a.s2s.AuthenticatePostInbox(c, w, r)
|
return a.s2s.AuthenticatePostInbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthenticateGetInbox defers to the delegate to authenticate the request.
|
// AuthenticateGetInbox defers to the delegate to authenticate the request.
|
||||||
func (a *sideEffectActor) AuthenticateGetInbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
func (a *SideEffectActor) AuthenticateGetInbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
||||||
return a.common.AuthenticateGetInbox(c, w, r)
|
return a.common.AuthenticateGetInbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthenticatePostOutbox defers to the delegate to authenticate the request.
|
// AuthenticatePostOutbox defers to the delegate to authenticate the request.
|
||||||
func (a *sideEffectActor) AuthenticatePostOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
func (a *SideEffectActor) AuthenticatePostOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
||||||
return a.c2s.AuthenticatePostOutbox(c, w, r)
|
return a.c2s.AuthenticatePostOutbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthenticateGetOutbox defers to the delegate to authenticate the request.
|
// AuthenticateGetOutbox defers to the delegate to authenticate the request.
|
||||||
func (a *sideEffectActor) AuthenticateGetOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
func (a *SideEffectActor) AuthenticateGetOutbox(c context.Context, w http.ResponseWriter, r *http.Request) (out context.Context, authenticated bool, err error) {
|
||||||
return a.common.AuthenticateGetOutbox(c, w, r)
|
return a.common.AuthenticateGetOutbox(c, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetOutbox delegates to the SocialProtocol.
|
// GetOutbox delegates to the SocialProtocol.
|
||||||
func (a *sideEffectActor) GetOutbox(c context.Context, r *http.Request) (vocab.ActivityStreamsOrderedCollectionPage, error) {
|
func (a *SideEffectActor) GetOutbox(c context.Context, r *http.Request) (vocab.ActivityStreamsOrderedCollectionPage, error) {
|
||||||
return a.common.GetOutbox(c, r)
|
return a.common.GetOutbox(c, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetInbox delegates to the FederatingProtocol.
|
// GetInbox delegates to the FederatingProtocol.
|
||||||
func (a *sideEffectActor) GetInbox(c context.Context, r *http.Request) (vocab.ActivityStreamsOrderedCollectionPage, error) {
|
func (a *SideEffectActor) GetInbox(c context.Context, r *http.Request) (vocab.ActivityStreamsOrderedCollectionPage, error) {
|
||||||
return a.s2s.GetInbox(c, r)
|
return a.s2s.GetInbox(c, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthorizePostInbox defers to the federating protocol whether the peer request
|
// AuthorizePostInbox defers to the federating protocol whether the peer request
|
||||||
// is authorized based on the actors' ids.
|
// is authorized based on the actors' ids.
|
||||||
func (a *sideEffectActor) AuthorizePostInbox(c context.Context, w http.ResponseWriter, activity Activity) (authorized bool, err error) {
|
func (a *SideEffectActor) AuthorizePostInbox(c context.Context, w http.ResponseWriter, activity Activity) (authorized bool, err error) {
|
||||||
authorized = false
|
authorized = false
|
||||||
actor := activity.GetActivityStreamsActor()
|
actor := activity.GetActivityStreamsActor()
|
||||||
if actor == nil {
|
if actor == nil {
|
||||||
|
@ -105,7 +129,7 @@ func (a *sideEffectActor) AuthorizePostInbox(c context.Context, w http.ResponseW
|
||||||
// PostInbox handles the side effects of determining whether to block the peer's
|
// PostInbox handles the side effects of determining whether to block the peer's
|
||||||
// request, adding the activity to the actor's inbox, and triggering side
|
// request, adding the activity to the actor's inbox, and triggering side
|
||||||
// effects based on the activity's type.
|
// effects based on the activity's type.
|
||||||
func (a *sideEffectActor) PostInbox(c context.Context, inboxIRI *url.URL, activity Activity) error {
|
func (a *SideEffectActor) PostInbox(c context.Context, inboxIRI *url.URL, activity Activity) error {
|
||||||
isNew, err := a.addToInboxIfNew(c, inboxIRI, activity)
|
isNew, err := a.addToInboxIfNew(c, inboxIRI, activity)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -142,7 +166,7 @@ func (a *sideEffectActor) PostInbox(c context.Context, inboxIRI *url.URL, activi
|
||||||
// outbound requests as a side effect.
|
// outbound requests as a side effect.
|
||||||
//
|
//
|
||||||
// InboxForwarding sets the federated data in the database.
|
// InboxForwarding sets the federated data in the database.
|
||||||
func (a *sideEffectActor) InboxForwarding(c context.Context, inboxIRI *url.URL, activity Activity) error {
|
func (a *SideEffectActor) InboxForwarding(c context.Context, inboxIRI *url.URL, activity Activity) error {
|
||||||
// 1. Must be first time we have seen this Activity.
|
// 1. Must be first time we have seen this Activity.
|
||||||
//
|
//
|
||||||
// Obtain the id of the activity
|
// Obtain the id of the activity
|
||||||
|
@ -322,7 +346,7 @@ func (a *sideEffectActor) InboxForwarding(c context.Context, inboxIRI *url.URL,
|
||||||
//
|
//
|
||||||
// This implementation assumes all types are meant to be delivered except for
|
// This implementation assumes all types are meant to be delivered except for
|
||||||
// the ActivityStreams Block type.
|
// the ActivityStreams Block type.
|
||||||
func (a *sideEffectActor) PostOutbox(c context.Context, activity Activity, outboxIRI *url.URL, rawJSON map[string]interface{}) (deliverable bool, err error) {
|
func (a *SideEffectActor) PostOutbox(c context.Context, activity Activity, outboxIRI *url.URL, rawJSON map[string]interface{}) (deliverable bool, err error) {
|
||||||
// TODO: Determine this if c2s is nil
|
// TODO: Determine this if c2s is nil
|
||||||
deliverable = true
|
deliverable = true
|
||||||
if a.c2s != nil {
|
if a.c2s != nil {
|
||||||
|
@ -363,7 +387,7 @@ func (a *sideEffectActor) PostOutbox(c context.Context, activity Activity, outbo
|
||||||
|
|
||||||
// AddNewIDs creates new 'id' entries on an activity and its objects if it is a
|
// AddNewIDs creates new 'id' entries on an activity and its objects if it is a
|
||||||
// Create activity.
|
// Create activity.
|
||||||
func (a *sideEffectActor) AddNewIDs(c context.Context, activity Activity) error {
|
func (a *SideEffectActor) AddNewIDs(c context.Context, activity Activity) error {
|
||||||
id, err := a.db.NewID(c, activity)
|
id, err := a.db.NewID(c, activity)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -399,7 +423,7 @@ func (a *sideEffectActor) AddNewIDs(c context.Context, activity Activity) error
|
||||||
// another server.
|
// another server.
|
||||||
//
|
//
|
||||||
// Must be called if at least the federated protocol is supported.
|
// Must be called if at least the federated protocol is supported.
|
||||||
func (a *sideEffectActor) Deliver(c context.Context, outboxIRI *url.URL, activity Activity) error {
|
func (a *SideEffectActor) Deliver(c context.Context, outboxIRI *url.URL, activity Activity) error {
|
||||||
recipients, err := a.prepare(c, outboxIRI, activity)
|
recipients, err := a.prepare(c, outboxIRI, activity)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -408,7 +432,7 @@ func (a *sideEffectActor) Deliver(c context.Context, outboxIRI *url.URL, activit
|
||||||
}
|
}
|
||||||
|
|
||||||
// WrapInCreate wraps an object with a Create activity.
|
// WrapInCreate wraps an object with a Create activity.
|
||||||
func (a *sideEffectActor) WrapInCreate(c context.Context, obj vocab.Type, outboxIRI *url.URL) (create vocab.ActivityStreamsCreate, err error) {
|
func (a *SideEffectActor) WrapInCreate(c context.Context, obj vocab.Type, outboxIRI *url.URL) (create vocab.ActivityStreamsCreate, err error) {
|
||||||
var unlock func()
|
var unlock func()
|
||||||
unlock, err = a.db.Lock(c, outboxIRI)
|
unlock, err = a.db.Lock(c, outboxIRI)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -426,7 +450,7 @@ func (a *sideEffectActor) WrapInCreate(c context.Context, obj vocab.Type, outbox
|
||||||
|
|
||||||
// deliverToRecipients will take a prepared Activity and send it to specific
|
// deliverToRecipients will take a prepared Activity and send it to specific
|
||||||
// recipients on behalf of an actor.
|
// recipients on behalf of an actor.
|
||||||
func (a *sideEffectActor) deliverToRecipients(c context.Context, boxIRI *url.URL, activity Activity, recipients []*url.URL) error {
|
func (a *SideEffectActor) deliverToRecipients(c context.Context, boxIRI *url.URL, activity Activity, recipients []*url.URL) error {
|
||||||
m, err := streams.Serialize(activity)
|
m, err := streams.Serialize(activity)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -444,7 +468,7 @@ func (a *sideEffectActor) deliverToRecipients(c context.Context, boxIRI *url.URL
|
||||||
|
|
||||||
// addToOutbox adds the activity to the outbox and creates the activity in the
|
// addToOutbox adds the activity to the outbox and creates the activity in the
|
||||||
// internal database as its own entry.
|
// internal database as its own entry.
|
||||||
func (a *sideEffectActor) addToOutbox(c context.Context, outboxIRI *url.URL, activity Activity) error {
|
func (a *SideEffectActor) addToOutbox(c context.Context, outboxIRI *url.URL, activity Activity) error {
|
||||||
// Set the activity in the database first.
|
// Set the activity in the database first.
|
||||||
id := activity.GetJSONLDId()
|
id := activity.GetJSONLDId()
|
||||||
unlock, err := a.db.Lock(c, id.Get())
|
unlock, err := a.db.Lock(c, id.Get())
|
||||||
|
@ -488,7 +512,7 @@ func (a *sideEffectActor) addToOutbox(c context.Context, outboxIRI *url.URL, act
|
||||||
// It does not add the activity to this database's know federated data.
|
// It does not add the activity to this database's know federated data.
|
||||||
//
|
//
|
||||||
// Returns true when the activity is novel.
|
// Returns true when the activity is novel.
|
||||||
func (a *sideEffectActor) addToInboxIfNew(c context.Context, inboxIRI *url.URL, activity Activity) (isNew bool, err error) {
|
func (a *SideEffectActor) addToInboxIfNew(c context.Context, inboxIRI *url.URL, activity Activity) (isNew bool, err error) {
|
||||||
// Acquire a lock to read the inbox. Defer release.
|
// Acquire a lock to read the inbox. Defer release.
|
||||||
var unlock func()
|
var unlock func()
|
||||||
unlock, err = a.db.Lock(c, inboxIRI)
|
unlock, err = a.db.Lock(c, inboxIRI)
|
||||||
|
@ -528,7 +552,7 @@ func (a *sideEffectActor) addToInboxIfNew(c context.Context, inboxIRI *url.URL,
|
||||||
//
|
//
|
||||||
// Recursion may be limited by providing a 'maxDepth' greater than zero. A
|
// Recursion may be limited by providing a 'maxDepth' greater than zero. A
|
||||||
// value of zero or a negative number will result in infinite recursion.
|
// value of zero or a negative number will result in infinite recursion.
|
||||||
func (a *sideEffectActor) hasInboxForwardingValues(c context.Context, inboxIRI *url.URL, val vocab.Type, maxDepth, currDepth int) (bool, error) {
|
func (a *SideEffectActor) hasInboxForwardingValues(c context.Context, inboxIRI *url.URL, val vocab.Type, maxDepth, currDepth int) (bool, error) {
|
||||||
// Stop recurring if we are exceeding the maximum depth and the maximum
|
// Stop recurring if we are exceeding the maximum depth and the maximum
|
||||||
// is a positive number.
|
// is a positive number.
|
||||||
if maxDepth > 0 && currDepth >= maxDepth {
|
if maxDepth > 0 && currDepth >= maxDepth {
|
||||||
|
@ -615,7 +639,7 @@ func (a *sideEffectActor) hasInboxForwardingValues(c context.Context, inboxIRI *
|
||||||
// hidden recipients ("bto" and "bcc") stripped from it.
|
// hidden recipients ("bto" and "bcc") stripped from it.
|
||||||
//
|
//
|
||||||
// Only call if both the social and federated protocol are supported.
|
// Only call if both the social and federated protocol are supported.
|
||||||
func (a *sideEffectActor) prepare(c context.Context, outboxIRI *url.URL, activity Activity) (r []*url.URL, err error) {
|
func (a *SideEffectActor) prepare(c context.Context, outboxIRI *url.URL, activity Activity) (r []*url.URL, err error) {
|
||||||
// Get inboxes of recipients
|
// Get inboxes of recipients
|
||||||
if to := activity.GetActivityStreamsTo(); to != nil {
|
if to := activity.GetActivityStreamsTo(); to != nil {
|
||||||
for iter := to.Begin(); iter != to.End(); iter = iter.Next() {
|
for iter := to.Begin(); iter != to.End(); iter = iter.Next() {
|
||||||
|
@ -774,7 +798,7 @@ func (a *sideEffectActor) prepare(c context.Context, outboxIRI *url.URL, activit
|
||||||
// dereference the collection, WITH the user's credentials.
|
// dereference the collection, WITH the user's credentials.
|
||||||
//
|
//
|
||||||
// Note that this also applies to CollectionPage and OrderedCollectionPage.
|
// Note that this also applies to CollectionPage and OrderedCollectionPage.
|
||||||
func (a *sideEffectActor) resolveActors(c context.Context, t Transport, r []*url.URL, depth, maxDepth int) (actors []vocab.Type, err error) {
|
func (a *SideEffectActor) resolveActors(c context.Context, t Transport, r []*url.URL, depth, maxDepth int) (actors []vocab.Type, err error) {
|
||||||
if maxDepth > 0 && depth >= maxDepth {
|
if maxDepth > 0 && depth >= maxDepth {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -806,7 +830,7 @@ func (a *sideEffectActor) resolveActors(c context.Context, t Transport, r []*url
|
||||||
//
|
//
|
||||||
// The returned actor could be nil, if it wasn't an actor (ex: a Collection or
|
// The returned actor could be nil, if it wasn't an actor (ex: a Collection or
|
||||||
// OrderedCollection).
|
// OrderedCollection).
|
||||||
func (a *sideEffectActor) dereferenceForResolvingInboxes(c context.Context, t Transport, actorIRI *url.URL) (actor vocab.Type, moreActorIRIs []*url.URL, err error) {
|
func (a *SideEffectActor) dereferenceForResolvingInboxes(c context.Context, t Transport, actorIRI *url.URL) (actor vocab.Type, moreActorIRIs []*url.URL, err error) {
|
||||||
var resp []byte
|
var resp []byte
|
||||||
resp, err = t.Dereference(c, actorIRI)
|
resp, err = t.Dereference(c, actorIRI)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
|
@ -445,7 +445,7 @@ github.com/stretchr/testify/suite
|
||||||
# github.com/subosito/gotenv v1.4.2
|
# github.com/subosito/gotenv v1.4.2
|
||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
github.com/subosito/gotenv
|
github.com/subosito/gotenv
|
||||||
# github.com/superseriousbusiness/activity v1.2.1-gts
|
# github.com/superseriousbusiness/activity v1.2.2-gts
|
||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
github.com/superseriousbusiness/activity/pub
|
github.com/superseriousbusiness/activity/pub
|
||||||
github.com/superseriousbusiness/activity/streams
|
github.com/superseriousbusiness/activity/streams
|
||||||
|
|
Loading…
Reference in a new issue