forgejo/routers/api/v1/activitypub/repository.go

246 lines
7.1 KiB
Go
Raw Normal View History

// Copyright 2023 The forgejo Authors. All rights reserved.
2023-10-20 15:16:04 +02:00
// SPDX-License-Identifier: MIT
package activitypub
import (
"fmt"
2023-11-29 15:34:02 +01:00
"io"
2023-10-20 15:16:04 +02:00
"net/http"
"strings"
2023-12-07 13:54:07 +01:00
"time"
2023-10-20 15:16:04 +02:00
2023-12-01 17:06:39 +01:00
"code.gitea.io/gitea/models/db"
2023-12-09 14:27:29 +01:00
"code.gitea.io/gitea/models/forgefed"
2023-12-07 13:17:51 +01:00
repo_model "code.gitea.io/gitea/models/repo"
user_model "code.gitea.io/gitea/models/user"
2023-11-28 13:03:45 +01:00
api "code.gitea.io/gitea/modules/activitypub"
2023-10-20 15:16:04 +02:00
"code.gitea.io/gitea/modules/context"
"code.gitea.io/gitea/modules/log"
"code.gitea.io/gitea/modules/setting"
2023-12-05 10:37:51 +01:00
"code.gitea.io/gitea/modules/util"
2023-11-10 14:26:13 +01:00
"code.gitea.io/gitea/modules/web"
2023-12-05 10:37:51 +01:00
"github.com/google/uuid"
ap "github.com/go-ap/activitypub"
2023-12-05 11:38:36 +01:00
pwd_gen "github.com/sethvargo/go-password/password"
2023-10-20 15:16:04 +02:00
)
2023-12-12 11:04:03 +01:00
// TODO: Move this to model.user.search ? or to model.user.externalLoginUser ?
func SearchUsersByLoginName(loginName string) ([]*user_model.User, error) {
2023-12-13 16:49:23 +01:00
var actionsUser = user_model.NewActionsUser()
2023-12-05 14:49:27 +01:00
actionsUser.IsAdmin = true
options := &user_model.SearchUserOptions{
2023-12-12 11:04:03 +01:00
LoginName: loginName,
2023-12-05 14:49:27 +01:00
Actor: actionsUser,
Type: user_model.UserTypeRemoteUser,
OrderBy: db.SearchOrderByAlphabetically,
ListOptions: db.ListOptions{PageSize: 1},
IsActive: util.OptionalBoolFalse,
IncludeReserved: true,
}
users, _, err := user_model.SearchUsers(db.DefaultContext, options)
if err != nil {
return []*user_model.User{}, fmt.Errorf("search failed: %v", err)
}
log.Info("local found users: %v", len(users))
return users, nil
}
2023-10-20 15:16:04 +02:00
// Repository function returns the Repository actor for a repo
func Repository(ctx *context.APIContext) {
// swagger:operation GET /activitypub/repository-id/{repository-id} activitypub activitypubRepository
// ---
// summary: Returns the Repository actor for a repo
// produces:
// - application/json
// parameters:
// - name: repository-id
// in: path
// description: repository ID of the repo
// type: integer
// required: true
// responses:
// "200":
// "$ref": "#/responses/ActivityPub"
2023-11-15 12:10:31 +01:00
link := fmt.Sprintf("%s/api/v1/activitypub/repository-id/%d", strings.TrimSuffix(setting.AppURL, "/"), ctx.Repo.Repository.ID)
2023-11-06 18:29:48 +01:00
repo := forgefed.RepositoryNew(ap.IRI(link))
2023-11-06 18:29:48 +01:00
repo.Name = ap.NaturalLanguageValuesNew()
err := repo.Name.Set("en", ap.Content(ctx.Repo.Repository.Name))
if err != nil {
2023-11-06 18:29:48 +01:00
ctx.ServerError("Set Name", err)
return
}
2023-11-06 18:29:48 +01:00
response(ctx, repo)
2023-10-20 15:16:04 +02:00
}
// PersonInbox function handles the incoming data for a repository inbox
func RepositoryInbox(ctx *context.APIContext) {
// swagger:operation POST /activitypub/repository-id/{repository-id}/inbox activitypub activitypubRepository
// ---
// summary: Send to the inbox
// produces:
// - application/json
// parameters:
// - name: repository-id
// in: path
// description: repository ID of the repo
// type: integer
// required: true
2023-11-08 08:56:22 +01:00
// - name: body
// in: body
// schema:
// "$ref": "#/definitions/Star"
2023-10-20 15:16:04 +02:00
// responses:
// "204":
// "$ref": "#/responses/empty"
var user *user_model.User
2023-12-08 18:09:22 +01:00
repository := ctx.Repo.Repository
log.Info("RepositoryInbox: repo: %v, owned by: %v", repository.Name, repository.OwnerName)
2023-12-01 17:06:39 +01:00
activity := web.GetForm(ctx).(*forgefed.Star)
2023-12-08 18:09:22 +01:00
log.Info("RepositoryInbox: Activity.Source: %v, Activity.Actor %v, Activity.Actor.Id %v", activity.Source, activity.Actor, activity.Actor.GetID().String())
2023-11-03 17:45:53 +01:00
2023-12-09 19:11:38 +01:00
// parse actorId (person)
2023-12-09 14:53:40 +01:00
actorId, err := forgefed.NewPersonId(activity.Actor.GetID().String(), string(activity.Source))
if err != nil {
2023-12-08 19:52:09 +01:00
ctx.ServerError("Validate actorId", err)
2023-12-08 18:09:22 +01:00
return
}
log.Info("RepositoryInbox: actorId validated: %v", actorId)
2023-12-09 19:11:38 +01:00
// parse objectId (repository)
objectId, err := forgefed.NewRepositoryId(activity.Object.GetID().String(), string(activity.Source))
if err != nil {
2023-12-12 11:04:03 +01:00
ctx.ServerError("Validate objectId", err)
return
}
if objectId.Id != fmt.Sprint(repository.ID) {
ctx.ServerError("Validate objectId", err)
2023-12-09 19:11:38 +01:00
return
}
log.Info("RepositoryInbox: objectId validated: %v", objectId)
2023-12-12 11:04:03 +01:00
adctorAsWebfinger := actorId.AsWebfinger() // used as LoginName in newly created user
log.Info("remotStargazer: %v", adctorAsWebfinger)
2023-11-15 12:29:17 +01:00
2023-12-01 15:07:13 +01:00
// Check if user already exists
2023-12-12 11:04:03 +01:00
users, err := SearchUsersByLoginName(adctorAsWebfinger)
2023-12-05 10:37:51 +01:00
if err != nil {
ctx.ServerError(fmt.Sprintf("Searching for user failed: %v"), err)
return
2023-12-05 10:37:51 +01:00
}
switch len(users) {
case 0:
{
2023-12-13 16:44:11 +01:00
user, err := createUserFromAP(ctx, actorId)
if err != nil {
2023-12-13 16:44:11 +01:00
ctx.ServerError(fmt.Sprintf("Searching for user failed: %v"), err)
return
}
2023-12-13 16:49:23 +01:00
log.Info("created user from ap: %v", user)
}
case 1:
{
user = users[0]
2023-12-13 16:49:23 +01:00
log.Info("found user: %v", user)
2023-12-06 15:37:58 +01:00
}
default:
{
2023-12-13 16:49:23 +01:00
ctx.Error(http.StatusInternalServerError, "StarRepo", fmt.Errorf("found more than one matches for federated users"))
return
2023-12-05 10:37:51 +01:00
}
}
2023-12-06 15:56:26 +01:00
2023-12-09 19:11:38 +01:00
// TODO: why should we search user for a second time from db?
2023-12-07 13:24:01 +01:00
remoteUser, err := user_model.GetUserByEmail(ctx, user.Email)
if err != nil {
ctx.Error(http.StatusInternalServerError, "StarRepo", err)
return
2023-12-01 11:56:12 +01:00
}
2023-12-05 10:37:51 +01:00
2023-12-07 13:24:01 +01:00
// check if already starred by this user
2023-12-08 18:09:22 +01:00
alreadyStared := repo_model.IsStaring(ctx, remoteUser.ID, repository.ID)
2023-12-07 13:24:01 +01:00
switch alreadyStared {
case true: // execute unstar action
{
2023-12-08 18:09:22 +01:00
err = repo_model.StarRepo(ctx, remoteUser.ID, repository.ID, false)
2023-12-07 13:24:01 +01:00
if err != nil {
ctx.Error(http.StatusInternalServerError, "StarRepo", err)
return
}
}
case false: // execute star action
{
2023-12-08 18:09:22 +01:00
err = repo_model.StarRepo(ctx, remoteUser.ID, repository.ID, true)
2023-12-07 13:24:01 +01:00
if err != nil {
ctx.Error(http.StatusInternalServerError, "StarRepo", err)
return
}
}
}
2023-11-30 16:10:26 +01:00
2023-12-07 13:54:07 +01:00
// wait 5 sec.
time.Sleep(5 * time.Second)
2023-11-10 14:10:23 +01:00
2023-10-20 15:16:04 +02:00
ctx.Status(http.StatusNoContent)
}
2023-12-13 16:44:11 +01:00
func createUserFromAP(ctx *context.APIContext, actorId forgefed.PersonId) (*user_model.User, error) {
// ToDo: Do we get a publicKeyId from server, repo or owner or repo?
2023-12-13 16:49:23 +01:00
var actionsUser = user_model.NewActionsUser()
2023-12-13 16:44:11 +01:00
client, err := api.NewClient(ctx, actionsUser, "no ide where to get key material.")
if err != nil {
return &user_model.User{}, err
}
response, err := client.Get(actorId.AsUri())
if err != nil {
return &user_model.User{}, err
}
defer response.Body.Close()
body, err := io.ReadAll(response.Body)
if err != nil {
return &user_model.User{}, err
}
person := ap.Person{}
err = person.UnmarshalJSON(body)
if err != nil {
return &user_model.User{}, err
}
email := fmt.Sprintf("%v@%v", uuid.New().String(), actorId.Host)
loginName := actorId.AsWebfinger()
password, err := pwd_gen.Generate(32, 10, 10, false, true)
if err != nil {
return &user_model.User{}, err
}
user := &user_model.User{
LowerName: strings.ToLower(person.Name.String()),
Name: person.Name.String(),
Email: email,
EmailNotificationsPreference: "disabled",
Passwd: password,
MustChangePassword: false,
LoginName: loginName,
Type: user_model.UserTypeRemoteUser,
IsAdmin: false,
}
overwrite := &user_model.CreateUserOverwriteOptions{
IsActive: util.OptionalBoolFalse,
IsRestricted: util.OptionalBoolFalse,
}
if err := user_model.CreateUser(ctx, user, overwrite); err != nil {
return &user_model.User{}, err
}
return user, nil
}