forgejo/routers/api/v1/activitypub/repository.go

272 lines
7.8 KiB
Go
Raw Normal View History

// Copyright 2023 The forgejo Authors. All rights reserved.
2023-10-20 13:16:04 +00:00
// SPDX-License-Identifier: MIT
package activitypub
import (
"fmt"
2023-11-29 14:34:02 +00:00
"io"
2023-10-20 13:16:04 +00:00
"net/http"
"strings"
2023-10-20 13:16:04 +00:00
"code.gitea.io/gitea/models/activitypub"
2023-12-01 16:06:39 +00:00
"code.gitea.io/gitea/models/db"
2023-11-28 12:03:45 +00:00
api "code.gitea.io/gitea/modules/activitypub"
2023-10-20 13:16:04 +00:00
"code.gitea.io/gitea/modules/context"
2023-11-06 17:29:48 +00:00
"code.gitea.io/gitea/modules/forgefed"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
2023-12-05 09:37:51 +00:00
"code.gitea.io/gitea/modules/util"
2023-11-10 13:26:13 +00:00
"code.gitea.io/gitea/modules/web"
2023-12-05 09:37:51 +00:00
"github.com/google/uuid"
2023-12-01 14:07:13 +00:00
user_model "code.gitea.io/gitea/models/user"
ap "github.com/go-ap/activitypub"
2023-12-05 10:38:36 +00:00
pwd_gen "github.com/sethvargo/go-password/password"
//f3 "lab.forgefriends.org/friendlyforgeformat/gof3"
2023-10-20 13:16:04 +00:00
)
// Repository function returns the Repository actor for a repo
func Repository(ctx *context.APIContext) {
// swagger:operation GET /activitypub/repository-id/{repository-id} activitypub activitypubRepository
// ---
// summary: Returns the Repository actor for a repo
// produces:
// - application/json
// parameters:
// - name: repository-id
// in: path
// description: repository ID of the repo
// type: integer
// required: true
// responses:
// "200":
// "$ref": "#/responses/ActivityPub"
2023-11-15 11:10:31 +00:00
link := fmt.Sprintf("%s/api/v1/activitypub/repository-id/%d", strings.TrimSuffix(setting.AppURL, "/"), ctx.Repo.Repository.ID)
2023-11-06 17:29:48 +00:00
repo := forgefed.RepositoryNew(ap.IRI(link))
2023-11-06 17:29:48 +00:00
repo.Name = ap.NaturalLanguageValuesNew()
err := repo.Name.Set("en", ap.Content(ctx.Repo.Repository.Name))
if err != nil {
2023-11-06 17:29:48 +00:00
ctx.ServerError("Set Name", err)
return
}
2023-11-06 17:29:48 +00:00
response(ctx, repo)
2023-10-20 13:16:04 +00:00
}
// PersonInbox function handles the incoming data for a repository inbox
func RepositoryInbox(ctx *context.APIContext) {
// swagger:operation POST /activitypub/repository-id/{repository-id}/inbox activitypub activitypubRepository
// ---
// summary: Send to the inbox
// produces:
// - application/json
// parameters:
// - name: repository-id
// in: path
// description: repository ID of the repo
// type: integer
// required: true
2023-11-08 07:56:22 +00:00
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/Star"
2023-10-20 13:16:04 +00:00
// responses:
// "204":
// "$ref": "#/responses/empty"
2023-11-06 07:49:58 +00:00
log.Info("RepositoryInbox: repo %v, %v", ctx.Repo.Repository.OwnerName, ctx.Repo.Repository.Name)
2023-12-01 16:06:39 +00:00
activity := web.GetForm(ctx).(*forgefed.Star)
2023-11-10 13:26:13 +00:00
2023-12-01 16:06:39 +00:00
log.Info("RepositoryInbox: Activity.Source %v", activity.Source)
log.Info("RepositoryInbox: Activity.Actor %v", activity.Actor)
2023-11-03 16:45:53 +00:00
2023-11-15 13:27:47 +00:00
// assume actor is: "actor": "https://codeberg.org/api/v1/activitypub/user-id/12345" - NB: This might be actually the ID? Maybe check vocabulary.
2023-12-05 08:26:03 +00:00
// "https://Codeberg.org/api/v1/activitypub/user-id/12345"
// "https:443//codeberg.org/api/v1/activitypub/user-id/12345"
// "https://codeberg.org/api/v1/activitypub/../activitypub/user-id/12345"
2023-11-15 08:23:03 +00:00
// parse actor
2023-12-01 16:06:39 +00:00
actor, err := activitypub.ParseActorIDFromStarActivity(activity)
// Is the actor IRI well formed?
if err != nil {
panic(err)
}
// Is the ActorData Struct valid?
2023-11-24 10:40:12 +00:00
actor.PanicIfInvalid()
2023-11-15 11:29:17 +00:00
log.Info("RepositoryInbox: Actor parsed. %v", actor)
2023-11-28 12:03:45 +00:00
/*
Make http client, this should make a get request on given url
We then need to parse the answer and put it into a person-struct
fill the person struct using some kind of unmarshall function given in
activitypub package/actor.go
*/
// make http client
2023-12-01 16:06:39 +00:00
// TODO: this should also work without autorizing the api call // doer might be empty
host := activity.To.GetID().String()
2023-12-05 09:37:51 +00:00
client, err := api.NewClient(ctx, ctx.Doer, host) // ToDo: This is hacky, we need a hostname from somewhere
2023-11-28 12:03:45 +00:00
if err != nil {
panic(err)
}
2023-11-15 08:23:03 +00:00
// get_person_by_rest
2023-12-01 16:06:39 +00:00
bytes := []byte{0} // no body needed for getting user actor
target := activity.Actor.GetID().String() // target is the person actor that originally performed the star activity
2023-11-29 14:45:04 +00:00
response, err := client.Get(bytes, target)
2023-11-29 14:34:02 +00:00
if err != nil {
panic(err)
}
defer response.Body.Close()
body, err := io.ReadAll(response.Body)
if err != nil {
panic(err)
}
2023-11-29 14:45:04 +00:00
// parse response
person := ap.Person{}
err = person.UnmarshalJSON(body)
2023-11-29 14:34:02 +00:00
if err != nil {
panic(err)
}
2023-11-28 12:03:45 +00:00
2023-11-28 14:17:34 +00:00
log.Info("target: %v", target)
2023-11-28 12:03:45 +00:00
log.Info("http client. %v", client)
2023-11-28 14:17:34 +00:00
log.Info("response: %v\n error: ", response, err)
2023-11-29 14:34:02 +00:00
log.Info("Person is: %v", person)
2023-11-30 15:10:26 +00:00
log.Info("Person Name is: %v", person.PreferredUsername)
log.Info("Person URL is: %v", person.URL)
2023-11-17 16:20:36 +00:00
2023-12-01 14:07:13 +00:00
// Check if user already exists
2023-12-01 16:06:39 +00:00
// TODO: If we where able to search for federated id there would be no need to get the remote person.
2023-12-05 09:37:51 +00:00
// Search for login_name
2023-12-01 16:06:39 +00:00
options := &user_model.SearchUserOptions{
2023-12-05 09:37:51 +00:00
Keyword: target,
2023-12-01 16:06:39 +00:00
Actor: ctx.Doer,
Type: user_model.UserTypeRemoteUser,
OrderBy: db.SearchOrderByAlphabetically,
ListOptions: db.ListOptions{
Page: 0,
PageSize: 1,
ListAll: true,
},
2023-12-01 10:56:12 +00:00
}
2023-12-01 16:06:39 +00:00
users, usersCount, err := user_model.SearchUsers(db.DefaultContext, options)
2023-12-05 09:37:51 +00:00
if err != nil {
fmt.Errorf("Search failed: %v", err)
}
2023-12-01 16:06:39 +00:00
log.Info("local found users: %v", usersCount)
if usersCount == 0 {
// create user
/*
ToDo: Make user
Fill in user There is a usertype remote in models/user/user.go
In Location maybe the federated user ID
isActive to false
isAdmin to false
maybe static email as userid@hostname.tld
- maybe test if we can do user without e-mail
- then test if two users can have the same adress
- otherwise uuid@hostname.tld
fill in names correctly
etc
We need a remote server with federation enabled to test this
The "if not already present" part might be easy:
Check the user database for given user id.
This could happen with something like: user_model.SearchUsers() as seen in routers/api/v1/user.go
SearchUsers is defined in models/user/search.go
And depending on implementation check if the person already exists in federated user db.
*/
2023-12-05 09:37:51 +00:00
email, err := generateUUIDMail(person)
2023-12-05 10:38:36 +00:00
if err != nil {
fmt.Errorf("Generate user failed: %v", err)
}
username, err := getUserName(person)
if err != nil {
fmt.Errorf("Generate user failed: %v", err)
}
password, err := generateRandomPassword()
if err != nil {
fmt.Errorf("Generate password failed: %v", err)
}
2023-12-05 09:37:51 +00:00
user := &user_model.User{
2023-12-05 10:38:36 +00:00
LowerName: strings.ToLower(username),
2023-12-05 09:37:51 +00:00
Name: username,
Email: email,
EmailNotificationsPreference: "disabled",
2023-12-05 10:38:36 +00:00
Passwd: password,
2023-12-05 09:37:51 +00:00
MustChangePassword: false,
LoginName: target,
2023-12-05 10:38:36 +00:00
Type: user_model.UserTypeRemoteUser,
2023-12-05 09:37:51 +00:00
IsAdmin: false,
}
overwriteDefault := &user_model.CreateUserOverwriteOptions{
IsActive: util.OptionalBoolFalse,
IsRestricted: util.OptionalBoolFalse,
}
if err := user_model.CreateUser(ctx, user, overwriteDefault); err != nil {
panic(fmt.Errorf("CreateUser: %w", err))
}
2023-12-05 10:46:11 +00:00
log.Info("User created!")
2023-12-01 16:06:39 +00:00
} else {
// use first user
user := users[0]
log.Info("%v", user)
2023-12-01 10:56:12 +00:00
}
2023-12-05 09:37:51 +00:00
2023-12-01 16:06:39 +00:00
// TODO: handle case of count > 1
// execute star action
2023-11-30 15:10:26 +00:00
2023-11-15 08:23:03 +00:00
// wait 15 sec.
2023-11-10 13:10:23 +00:00
2023-10-20 13:16:04 +00:00
ctx.Status(http.StatusNoContent)
2023-11-10 13:26:13 +00:00
2023-10-20 13:16:04 +00:00
}
2023-12-05 09:37:51 +00:00
func generateUUIDMail(person ap.Actor) (string, error) {
// UUID@remote.host
id := uuid.New().String()
//url, err := url.Parse(person.URL.GetID().String())
2023-12-05 09:37:51 +00:00
//host := url.Host
2023-12-05 09:37:51 +00:00
return strings.Join([]string{id, "example.com"}, "@"), nil
2023-12-05 09:37:51 +00:00
}
2023-12-05 10:38:36 +00:00
func getUserName(person ap.Actor) (string, error) {
if name := person.PreferredUsername.String(); name != "" {
return name, nil
}
if name := person.Name.String(); name != "" {
return name, nil
}
return "", fmt.Errorf("Empty name, preferredUsername field")
}
func generateRandomPassword() (string, error) {
// Generate a password that is 64 characters long with 10 digits, 10 symbols,
// allowing upper and lower case letters, disallowing repeat characters.
res, err := pwd_gen.Generate(32, 10, 10, false, false)
if err != nil {
return "", err
}
return res, err
}