2021-08-25 04:29:26 +09:00
|
|
|
<?php
|
|
|
|
|
2021-12-24 10:58:41 +09:00
|
|
|
declare(strict_types = 1);
|
2021-10-10 17:26:18 +09:00
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
// {{{ License
|
|
|
|
// This file is part of GNU social - https://www.gnu.org/software/social
|
|
|
|
//
|
|
|
|
// GNU social is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// GNU social is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with GNU social. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// }}}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ActivityPub implementation for GNU social
|
|
|
|
*
|
|
|
|
* @package GNUsocial
|
|
|
|
* @category ActivityPub
|
2021-12-24 10:58:41 +09:00
|
|
|
*
|
2021-12-04 13:07:08 +09:00
|
|
|
* @author Diogo Peralta Cordeiro <@diogo.site>
|
|
|
|
* @copyright 2018-2019, 2021 Free Software Foundation, Inc http://www.fsf.org
|
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
|
|
*/
|
|
|
|
|
2021-08-25 04:29:26 +09:00
|
|
|
namespace Plugin\ActivityPub;
|
|
|
|
|
2022-02-11 20:39:25 +09:00
|
|
|
use ActivityPhp\Type;
|
2022-03-05 23:23:08 +09:00
|
|
|
use ActivityPhp\Type\AbstractObject;
|
2021-12-09 07:24:52 +09:00
|
|
|
use App\Core\DB\DB;
|
2021-08-25 04:29:26 +09:00
|
|
|
use App\Core\Event;
|
2021-11-30 08:58:42 +09:00
|
|
|
use App\Core\HTTPClient;
|
2022-03-05 23:23:08 +09:00
|
|
|
use function App\Core\I18n\_m;
|
2021-11-01 21:16:46 +09:00
|
|
|
use App\Core\Log;
|
2021-08-25 04:29:26 +09:00
|
|
|
use App\Core\Modules\Plugin;
|
2022-03-05 23:23:08 +09:00
|
|
|
use App\Core\Queue\Queue;
|
2021-08-25 04:29:26 +09:00
|
|
|
use App\Core\Router\RouteLoader;
|
2021-10-05 01:00:58 +09:00
|
|
|
use App\Core\Router\Router;
|
2021-11-30 08:58:42 +09:00
|
|
|
use App\Entity\Activity;
|
2021-10-18 21:22:02 +09:00
|
|
|
use App\Entity\Actor;
|
2021-12-09 07:24:52 +09:00
|
|
|
use App\Entity\Note;
|
2021-11-01 21:16:46 +09:00
|
|
|
use App\Util\Common;
|
2022-01-03 05:37:15 +09:00
|
|
|
use App\Util\Exception\BugFoundException;
|
2022-01-12 05:28:15 +09:00
|
|
|
use Component\Collection\Util\Controller\OrderedCollection;
|
2021-12-02 13:25:58 +09:00
|
|
|
use Component\FreeNetwork\Entity\FreeNetworkActorProtocol;
|
|
|
|
use Component\FreeNetwork\Util\Discovery;
|
2021-08-25 04:29:26 +09:00
|
|
|
use Exception;
|
2021-12-24 10:58:41 +09:00
|
|
|
use InvalidArgumentException;
|
2021-08-25 04:29:26 +09:00
|
|
|
use Plugin\ActivityPub\Controller\Inbox;
|
2022-01-12 05:28:15 +09:00
|
|
|
use Plugin\ActivityPub\Controller\Outbox;
|
2021-12-09 07:24:52 +09:00
|
|
|
use Plugin\ActivityPub\Entity\ActivitypubActivity;
|
2021-10-27 12:14:01 +09:00
|
|
|
use Plugin\ActivityPub\Entity\ActivitypubActor;
|
2021-12-09 07:24:52 +09:00
|
|
|
use Plugin\ActivityPub\Entity\ActivitypubObject;
|
2022-02-25 10:05:28 +09:00
|
|
|
use Plugin\ActivityPub\Util\Explorer;
|
2021-12-01 01:47:31 +09:00
|
|
|
use Plugin\ActivityPub\Util\HTTPSignature;
|
2021-12-04 13:07:08 +09:00
|
|
|
use Plugin\ActivityPub\Util\Model;
|
2022-01-12 05:28:15 +09:00
|
|
|
use Plugin\ActivityPub\Util\OrderedCollectionController;
|
2022-02-24 02:39:11 +09:00
|
|
|
use Plugin\ActivityPub\Util\Response\ActivityResponse;
|
2021-10-05 01:00:58 +09:00
|
|
|
use Plugin\ActivityPub\Util\Response\ActorResponse;
|
|
|
|
use Plugin\ActivityPub\Util\Response\NoteResponse;
|
2021-12-04 13:07:08 +09:00
|
|
|
use Plugin\ActivityPub\Util\TypeResponse;
|
|
|
|
use Plugin\ActivityPub\Util\Validator\contentLangModelValidator;
|
|
|
|
use Plugin\ActivityPub\Util\Validator\manuallyApprovesFollowersModelValidator;
|
2022-02-24 02:39:11 +09:00
|
|
|
use Symfony\Component\HttpFoundation\JsonResponse;
|
2021-12-04 13:07:08 +09:00
|
|
|
use Symfony\Contracts\HttpClient\Exception\ClientExceptionInterface;
|
|
|
|
use Symfony\Contracts\HttpClient\Exception\RedirectionExceptionInterface;
|
|
|
|
use Symfony\Contracts\HttpClient\Exception\ServerExceptionInterface;
|
|
|
|
use Symfony\Contracts\HttpClient\Exception\TransportExceptionInterface;
|
2021-11-30 08:58:42 +09:00
|
|
|
use Symfony\Contracts\HttpClient\ResponseInterface;
|
2021-10-18 21:22:02 +09:00
|
|
|
use XML_XRD;
|
|
|
|
use XML_XRD_Element_Link;
|
2021-08-25 04:29:26 +09:00
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
/**
|
|
|
|
* Adds ActivityPub support to GNU social when enabled
|
|
|
|
*
|
|
|
|
* @copyright 2018-2019, 2021 Free Software Foundation, Inc http://www.fsf.org
|
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
|
|
*/
|
2021-08-25 04:29:26 +09:00
|
|
|
class ActivityPub extends Plugin
|
|
|
|
{
|
2021-10-27 12:14:01 +09:00
|
|
|
// ActivityStreams 2.0 Accept Headers
|
2021-10-18 21:22:02 +09:00
|
|
|
public static array $accept_headers = [
|
|
|
|
'application/ld+json; profile="https://www.w3.org/ns/activitystreams"',
|
|
|
|
'application/activity+json',
|
|
|
|
'application/json',
|
|
|
|
'application/ld+json',
|
|
|
|
];
|
|
|
|
|
2021-10-27 12:14:01 +09:00
|
|
|
// So that this isn't hardcoded everywhere
|
2021-11-28 00:06:46 +09:00
|
|
|
public const PUBLIC_TO = [
|
|
|
|
'https://www.w3.org/ns/activitystreams#Public',
|
2021-10-27 12:14:01 +09:00
|
|
|
'Public',
|
|
|
|
'as:Public',
|
|
|
|
];
|
|
|
|
public const HTTP_CLIENT_HEADERS = [
|
2021-12-24 10:58:41 +09:00
|
|
|
'Accept' => 'application/ld+json; profile="https://www.w3.org/ns/activitystreams"',
|
2021-10-27 12:14:01 +09:00
|
|
|
'User-Agent' => 'GNUsocialBot ' . GNUSOCIAL_VERSION . ' - ' . GNUSOCIAL_PROJECT_URL,
|
|
|
|
];
|
|
|
|
|
2021-08-25 04:29:26 +09:00
|
|
|
public function version(): string
|
|
|
|
{
|
|
|
|
return '3.0.0';
|
|
|
|
}
|
|
|
|
|
2022-02-24 02:39:11 +09:00
|
|
|
public static array $activity_streams_two_context = [
|
|
|
|
'https://www.w3.org/ns/activitystreams',
|
|
|
|
'https://w3id.org/security/v1',
|
|
|
|
['gs' => 'https://www.gnu.org/software/social/ns#'],
|
|
|
|
['litepub' => 'http://litepub.social/ns#'],
|
|
|
|
['chatMessage' => 'litepub:chatMessage'],
|
|
|
|
[
|
|
|
|
'inConversation' => [
|
|
|
|
'@id' => 'gs:inConversation',
|
|
|
|
'@type' => '@id',
|
|
|
|
],
|
|
|
|
],
|
|
|
|
];
|
|
|
|
|
|
|
|
public function onInitializePlugin(): bool
|
|
|
|
{
|
|
|
|
Event::handle('ActivityStreamsTwoContext', [&self::$activity_streams_two_context]);
|
|
|
|
self::$activity_streams_two_context = array_unique(self::$activity_streams_two_context, \SORT_REGULAR);
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
|
2022-03-05 23:23:08 +09:00
|
|
|
public function onQueueActivitypubInbox(ActivitypubActor $ap_actor, Actor $actor, string|AbstractObject $type): bool
|
|
|
|
{
|
|
|
|
// TODO: Check if Actor has authority over payload
|
|
|
|
|
|
|
|
// Store Activity
|
|
|
|
$ap_act = Model\Activity::fromJson($type, ['source' => 'ActivityPub']);
|
|
|
|
FreeNetworkActorProtocol::protocolSucceeded(
|
|
|
|
'activitypub',
|
|
|
|
$ap_actor->getActorId(),
|
|
|
|
Discovery::normalize($actor->getNickname() . '@' . parse_url($ap_actor->getInboxUri(), \PHP_URL_HOST)),
|
|
|
|
);
|
|
|
|
$already_known_ids = [];
|
|
|
|
if (!empty($ap_act->_object_mention_ids)) {
|
|
|
|
$already_known_ids = $ap_act->_object_mention_ids;
|
|
|
|
}
|
|
|
|
|
|
|
|
DB::flush();
|
|
|
|
if (Event::handle('ActivityPubNewNotification', [$actor, $ap_act->getActivity(), $already_known_ids, _m('{nickname} attentioned you.', ['{nickname}' => $actor->getNickname()])]) === Event::next) {
|
|
|
|
Event::handle('NewNotification', [$actor, $ap_act->getActivity(), $already_known_ids, _m('{nickname} attentioned you.', ['{nickname}' => $actor->getNickname()])]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return Event::stop;
|
|
|
|
}
|
|
|
|
|
2021-08-25 04:29:26 +09:00
|
|
|
/**
|
|
|
|
* This code executes when GNU social creates the page routing, and we hook
|
2021-10-05 01:00:58 +09:00
|
|
|
* on this event to add our Inbox and Outbox handler for ActivityPub.
|
2021-08-25 04:29:26 +09:00
|
|
|
*
|
2021-10-10 17:26:18 +09:00
|
|
|
* @param RouteLoader $r the router that was initialized
|
2021-08-25 04:29:26 +09:00
|
|
|
*/
|
|
|
|
public function onAddRoute(RouteLoader $r): bool
|
|
|
|
{
|
2021-09-17 01:04:05 +09:00
|
|
|
$r->connect(
|
2021-10-20 07:46:01 +09:00
|
|
|
'activitypub_inbox',
|
|
|
|
'/inbox.json',
|
2022-02-20 14:03:05 +09:00
|
|
|
Inbox::class,
|
2021-12-12 15:40:13 +09:00
|
|
|
options: ['format' => self::$accept_headers[0]],
|
2021-09-17 01:04:05 +09:00
|
|
|
);
|
|
|
|
$r->connect(
|
2021-10-20 07:46:01 +09:00
|
|
|
'activitypub_actor_inbox',
|
|
|
|
'/actor/{gsactor_id<\d+>}/inbox.json',
|
2021-09-17 01:04:05 +09:00
|
|
|
[Inbox::class, 'handle'],
|
2021-12-12 15:40:13 +09:00
|
|
|
options: ['format' => self::$accept_headers[0]],
|
2021-09-17 01:04:05 +09:00
|
|
|
);
|
2021-08-25 04:29:26 +09:00
|
|
|
$r->connect(
|
2021-10-20 07:46:01 +09:00
|
|
|
'activitypub_actor_outbox',
|
|
|
|
'/actor/{gsactor_id<\d+>}/outbox.json',
|
2022-01-12 05:28:15 +09:00
|
|
|
[Outbox::class, 'viewOutboxByActorId'],
|
2021-10-27 12:14:01 +09:00
|
|
|
options: ['accept' => self::$accept_headers, 'format' => self::$accept_headers[0]],
|
2021-08-25 04:29:26 +09:00
|
|
|
);
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
/**
|
|
|
|
* Fill Actor->getUrl() calls with correct URL coming from ActivityPub
|
|
|
|
*/
|
2021-12-12 15:40:13 +09:00
|
|
|
public function onStartGetActorUri(Actor $actor, int $type, ?string &$url): bool
|
2021-11-28 00:06:46 +09:00
|
|
|
{
|
|
|
|
if (
|
|
|
|
// Is remote?
|
|
|
|
!$actor->getIsLocal()
|
|
|
|
// Is in ActivityPub?
|
2022-02-19 02:48:06 +09:00
|
|
|
&& !\is_null($ap_actor = DB::findOneBy(ActivitypubActor::class, ['actor_id' => $actor->getId()], return_null: true))
|
2021-11-28 00:06:46 +09:00
|
|
|
// We can only provide a full URL (anything else wouldn't make sense)
|
|
|
|
&& $type === Router::ABSOLUTE_URL
|
|
|
|
) {
|
2021-11-30 08:58:42 +09:00
|
|
|
$url = $ap_actor->getUri();
|
2021-11-28 00:06:46 +09:00
|
|
|
return Event::stop;
|
|
|
|
}
|
|
|
|
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
|
2021-12-29 00:02:03 +09:00
|
|
|
/**
|
|
|
|
* Fill Actor->canAdmin() for Actors that came from ActivityPub
|
|
|
|
*/
|
|
|
|
public function onFreeNetworkActorCanAdmin(Actor $actor, Actor $other, bool &$canAdmin): bool
|
|
|
|
{
|
|
|
|
// Are both in AP?
|
|
|
|
if (
|
2022-02-19 02:48:06 +09:00
|
|
|
!\is_null($ap_actor = DB::findOneBy(ActivitypubActor::class, ['actor_id' => $actor->getId()], return_null: true))
|
|
|
|
&& !\is_null($ap_other = DB::findOneBy(ActivitypubActor::class, ['actor_id' => $other->getId()], return_null: true))
|
2021-12-29 00:02:03 +09:00
|
|
|
) {
|
|
|
|
// Are they both in the same server?
|
2022-02-25 10:05:28 +09:00
|
|
|
$canAdmin = parse_url($ap_actor->getUri(), \PHP_URL_HOST) === parse_url($ap_other->getUri(), \PHP_URL_HOST);
|
2021-12-29 00:02:03 +09:00
|
|
|
return Event::stop;
|
|
|
|
}
|
|
|
|
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
/**
|
|
|
|
* Overload core endpoints to make resources available in ActivityStreams 2.0
|
|
|
|
*
|
|
|
|
* @throws Exception
|
|
|
|
*/
|
|
|
|
public function onControllerResponseInFormat(string $route, array $accept_header, array $vars, ?TypeResponse &$response = null): bool
|
|
|
|
{
|
2021-12-24 10:58:41 +09:00
|
|
|
if (\count(array_intersect(self::$accept_headers, $accept_header)) === 0) {
|
2021-12-04 13:07:08 +09:00
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
switch ($route) {
|
2022-02-17 03:45:30 +09:00
|
|
|
case 'actor_view_id':
|
2022-02-11 01:02:51 +09:00
|
|
|
case 'person_actor_view_id':
|
|
|
|
case 'person_actor_view_nickname':
|
|
|
|
case 'group_actor_view_id':
|
|
|
|
case 'group_actor_view_nickname':
|
|
|
|
case 'bot_actor_view_id':
|
|
|
|
case 'bot_actor_view_nickname':
|
2021-12-04 13:07:08 +09:00
|
|
|
$response = ActorResponse::handle($vars['actor']);
|
2022-01-12 05:28:15 +09:00
|
|
|
break;
|
2022-02-11 09:22:22 +09:00
|
|
|
case 'activity_view':
|
|
|
|
$response = ActivityResponse::handle($vars['activity']);
|
|
|
|
break;
|
2021-12-04 13:07:08 +09:00
|
|
|
case 'note_view':
|
|
|
|
$response = NoteResponse::handle($vars['note']);
|
2022-01-12 05:28:15 +09:00
|
|
|
break;
|
|
|
|
case 'activitypub_actor_outbox':
|
|
|
|
$response = new TypeResponse($vars['type']);
|
|
|
|
break;
|
2021-12-04 13:07:08 +09:00
|
|
|
default:
|
2022-01-12 05:28:15 +09:00
|
|
|
if (Event::handle('ActivityPubActivityStreamsTwoResponse', [$route, $vars, &$response]) !== Event::stop) {
|
|
|
|
if (is_subclass_of($vars['controller'][0], OrderedCollection::class)) {
|
|
|
|
$response = new TypeResponse(OrderedCollectionController::fromControllerVars($vars)['type']);
|
2022-02-11 09:22:22 +09:00
|
|
|
} else {
|
|
|
|
$response = new JsonResponse(['error' => 'Unknown Object cannot be represented.']);
|
2022-01-12 05:28:15 +09:00
|
|
|
}
|
2021-12-04 13:07:08 +09:00
|
|
|
}
|
|
|
|
}
|
2022-01-12 05:28:15 +09:00
|
|
|
return Event::stop;
|
2021-12-04 13:07:08 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Add ActivityStreams 2 Extensions
|
|
|
|
*/
|
|
|
|
public function onActivityPubValidateActivityStreamsTwoData(string $type_name, array &$validators): bool
|
|
|
|
{
|
|
|
|
switch ($type_name) {
|
|
|
|
case 'Person':
|
|
|
|
$validators['manuallyApprovesFollowers'] = manuallyApprovesFollowersModelValidator::class;
|
|
|
|
break;
|
|
|
|
case 'Note':
|
|
|
|
$validators['contentLang'] = contentLangModelValidator::class;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
|
|
|
|
// FreeNetworkComponent Events
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Let FreeNetwork Component know we exist and which class to use to call the freeNetworkDistribute method
|
|
|
|
*/
|
2021-12-02 05:53:32 +09:00
|
|
|
public function onAddFreeNetworkProtocol(array &$protocols): bool
|
|
|
|
{
|
2021-11-30 08:58:42 +09:00
|
|
|
$protocols[] = '\Plugin\ActivityPub\ActivityPub';
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
|
2022-02-21 13:53:12 +09:00
|
|
|
/**
|
|
|
|
* The FreeNetwork component will call this function to pull ActivityPub objects by URI
|
|
|
|
*
|
|
|
|
* @param string $uri Query
|
2022-02-24 02:39:11 +09:00
|
|
|
*
|
2022-02-21 13:53:12 +09:00
|
|
|
* @return bool true if imported, false otherwise
|
|
|
|
*/
|
|
|
|
public static function freeNetworkGrabRemote(string $uri): bool
|
|
|
|
{
|
|
|
|
if (Common::isValidHttpUrl($uri)) {
|
|
|
|
try {
|
|
|
|
$object = self::getObjectByUri($uri);
|
|
|
|
if (!\is_null($object)) {
|
|
|
|
if ($object instanceof Type\AbstractObject) {
|
2022-02-24 02:39:11 +09:00
|
|
|
if (\in_array($object->get('type'), array_keys(Model\Actor::$_as2_actor_type_to_gs_actor_type))) {
|
|
|
|
DB::wrapInTransaction(fn () => Model\Actor::fromJson($object));
|
2022-02-21 13:53:12 +09:00
|
|
|
} else {
|
2022-02-24 02:39:11 +09:00
|
|
|
DB::wrapInTransaction(fn () => Model\Activity::fromJson($object));
|
2022-02-21 13:53:12 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2022-02-24 02:39:11 +09:00
|
|
|
} catch (Exception|Throwable) {
|
2022-02-21 13:53:12 +09:00
|
|
|
// May be invalid input, we can safely ignore in this case
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2022-03-05 23:23:08 +09:00
|
|
|
public function onQueueActivitypubPostman(
|
|
|
|
Actor $sender,
|
|
|
|
Activity $activity,
|
|
|
|
string $inbox,
|
|
|
|
array $to_actors,
|
|
|
|
array &$retry_args,
|
|
|
|
): bool
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
$data = Model::toJson($activity);
|
|
|
|
if ($sender->isGroup()) {
|
|
|
|
// When the sender is a group, we have to wrap it in an Announce activity
|
|
|
|
$data = Type::create('Announce', ['object' => $data])->toJson();
|
|
|
|
}
|
|
|
|
$res = self::postman($sender, $data, $inbox);
|
|
|
|
|
|
|
|
// accumulate errors for later use, if needed
|
|
|
|
$status_code = $res->getStatusCode();
|
|
|
|
if (!($status_code === 200 || $status_code === 202 || $status_code === 409)) {
|
|
|
|
$res_body = json_decode($res->getContent(), true);
|
|
|
|
$retry_args['reason'] ??= [];
|
|
|
|
$retry_args['reason'][] = $res_body['error'] ?? 'An unknown error occurred.';
|
|
|
|
return Event::next;
|
|
|
|
} else {
|
|
|
|
foreach ($to_actors as $actor) {
|
|
|
|
if ($actor->isPerson()) {
|
|
|
|
FreeNetworkActorProtocol::protocolSucceeded(
|
|
|
|
'activitypub',
|
|
|
|
$actor,
|
|
|
|
Discovery::normalize($actor->getNickname() . '@' . parse_url($inbox, \PHP_URL_HOST)),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return Event::stop;
|
|
|
|
} catch (Exception $e) {
|
|
|
|
Log::error('ActivityPub @ freeNetworkDistribute: ' . $e->getMessage(), [$e]);
|
|
|
|
$retry_args['reason'] ??= [];
|
|
|
|
$retry_args['reason'][] = "Got an exception: {$e->getMessage()}";
|
|
|
|
$retry_args['exception'] ??= [];
|
|
|
|
$retry_args['exception'][] = $e;
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
/**
|
|
|
|
* The FreeNetwork component will call this function to distribute this instance's activities
|
|
|
|
*
|
|
|
|
* @throws ClientExceptionInterface
|
|
|
|
* @throws RedirectionExceptionInterface
|
|
|
|
* @throws ServerExceptionInterface
|
|
|
|
* @throws TransportExceptionInterface
|
|
|
|
*/
|
2022-03-05 23:23:08 +09:00
|
|
|
public static function freeNetworkDistribute(Actor $sender, Activity $activity, array $targets, ?string $reason = null): void
|
2021-11-28 00:06:46 +09:00
|
|
|
{
|
2021-11-30 08:58:42 +09:00
|
|
|
$to_addr = [];
|
2021-12-02 13:25:58 +09:00
|
|
|
foreach ($targets as $actor) {
|
|
|
|
if (FreeNetworkActorProtocol::canIActor('activitypub', $actor->getId())) {
|
2022-03-05 23:23:08 +09:00
|
|
|
// Sometimes FreeNetwork can allow us to actor even though we don't have an internal representation of
|
|
|
|
// the actor, that could for example mean that OStatus handled this actor while we were deactivated
|
|
|
|
// On next interaction this should be resolved, for now continue
|
2022-02-19 02:48:06 +09:00
|
|
|
if (\is_null($ap_target = DB::findOneBy(ActivitypubActor::class, ['actor_id' => $actor->getId()], return_null: true))) {
|
2021-12-02 13:25:58 +09:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$to_addr[$ap_target->getInboxSharedUri() ?? $ap_target->getInboxUri()][] = $actor;
|
|
|
|
} else {
|
2022-03-05 23:23:08 +09:00
|
|
|
continue;
|
2021-11-30 08:58:42 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-05 23:23:08 +09:00
|
|
|
foreach ($to_addr as $inbox => $to_actors) {
|
|
|
|
Queue::enqueue(
|
|
|
|
payload: [$sender, $activity, $inbox, $to_actors],
|
|
|
|
queue: 'activitypub_postman',
|
|
|
|
priority: false,
|
|
|
|
);
|
2021-11-30 08:58:42 +09:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2021-12-04 13:07:08 +09:00
|
|
|
* Internal tool to sign and send activities out
|
|
|
|
*
|
|
|
|
* @throws Exception
|
2021-11-30 08:58:42 +09:00
|
|
|
*/
|
2021-12-04 13:07:08 +09:00
|
|
|
private static function postman(Actor $sender, string $json_activity, string $inbox, string $method = 'post'): ResponseInterface
|
2021-11-30 08:58:42 +09:00
|
|
|
{
|
2021-12-04 13:07:08 +09:00
|
|
|
Log::debug('ActivityPub Postman: Delivering ' . $json_activity . ' to ' . $inbox);
|
2021-11-30 08:58:42 +09:00
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
$headers = HTTPSignature::sign($sender, $inbox, $json_activity);
|
2021-12-01 01:47:31 +09:00
|
|
|
Log::debug('ActivityPub Postman: Delivery headers were: ' . print_r($headers, true));
|
2021-11-30 08:58:42 +09:00
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
$response = HTTPClient::$method($inbox, ['headers' => $headers, 'body' => $json_activity]);
|
2021-12-02 05:53:32 +09:00
|
|
|
Log::debug('ActivityPub Postman: Delivery result with status code ' . $response->getStatusCode() . ': ' . $response->getContent());
|
2021-11-30 08:58:42 +09:00
|
|
|
return $response;
|
2021-11-28 00:06:46 +09:00
|
|
|
}
|
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
// WebFinger Events
|
2021-11-01 21:16:46 +09:00
|
|
|
|
2021-10-18 21:22:02 +09:00
|
|
|
/**
|
2021-12-04 13:07:08 +09:00
|
|
|
* Add activity+json mimetype to WebFinger
|
2021-10-18 21:22:02 +09:00
|
|
|
*/
|
2021-10-27 12:14:01 +09:00
|
|
|
public function onEndWebFingerProfileLinks(XML_XRD $xrd, Actor $object): bool
|
2021-10-05 01:00:58 +09:00
|
|
|
{
|
2021-10-18 21:22:02 +09:00
|
|
|
if ($object->isPerson()) {
|
|
|
|
$link = new XML_XRD_Element_Link(
|
2021-10-27 12:14:01 +09:00
|
|
|
rel: 'self',
|
|
|
|
href: $object->getUri(Router::ABSOLUTE_URL),//Router::url('actor_view_id', ['id' => $object->getId()], Router::ABSOLUTE_URL),
|
|
|
|
type: 'application/activity+json',
|
2021-10-18 21:22:02 +09:00
|
|
|
);
|
|
|
|
$xrd->links[] = clone $link;
|
2021-10-05 01:00:58 +09:00
|
|
|
}
|
2021-10-27 12:14:01 +09:00
|
|
|
return Event::next;
|
2021-10-18 21:22:02 +09:00
|
|
|
}
|
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
/**
|
|
|
|
* When FreeNetwork component asks us to help with identifying Actors from XRDs
|
|
|
|
*/
|
2021-12-02 13:25:58 +09:00
|
|
|
public function onFreeNetworkFoundXrd(XML_XRD $xrd, ?Actor &$actor = null): bool
|
2021-11-01 21:16:46 +09:00
|
|
|
{
|
2021-12-02 13:25:58 +09:00
|
|
|
$addr = null;
|
|
|
|
foreach ($xrd->aliases as $alias) {
|
|
|
|
if (Discovery::isAcct($alias)) {
|
|
|
|
$addr = Discovery::normalize($alias);
|
|
|
|
}
|
|
|
|
}
|
2021-12-24 10:58:41 +09:00
|
|
|
if (\is_null($addr)) {
|
2021-12-02 13:25:58 +09:00
|
|
|
return Event::next;
|
|
|
|
} else {
|
|
|
|
if (!FreeNetworkActorProtocol::canIAddr('activitypub', $addr)) {
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
}
|
2021-12-02 12:34:31 +09:00
|
|
|
try {
|
2021-12-02 13:25:58 +09:00
|
|
|
$ap_actor = ActivitypubActor::fromXrd($addr, $xrd);
|
2021-12-24 10:58:41 +09:00
|
|
|
$actor = Actor::getById($ap_actor->getActorId());
|
2021-12-02 13:25:58 +09:00
|
|
|
FreeNetworkActorProtocol::protocolSucceeded('activitypub', $actor, $addr);
|
2021-12-02 12:34:31 +09:00
|
|
|
return Event::stop;
|
|
|
|
} catch (Exception $e) {
|
2021-12-04 13:07:08 +09:00
|
|
|
Log::error('ActivityPub Actor from URL Mention check failed: ' . $e->getMessage());
|
2021-12-02 12:34:31 +09:00
|
|
|
return Event::next;
|
2021-11-01 21:16:46 +09:00
|
|
|
}
|
2021-10-05 01:00:58 +09:00
|
|
|
}
|
2021-11-01 21:16:46 +09:00
|
|
|
|
2021-12-04 13:07:08 +09:00
|
|
|
// Discovery Events
|
2021-11-01 21:16:46 +09:00
|
|
|
|
|
|
|
/**
|
2021-12-04 13:07:08 +09:00
|
|
|
* When FreeNetwork component asks us to help with identifying Actors from URIs
|
2021-11-01 21:16:46 +09:00
|
|
|
*/
|
2021-12-04 13:07:08 +09:00
|
|
|
public function onFreeNetworkFindMentions(string $target, ?Actor &$actor = null): bool
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
if (FreeNetworkActorProtocol::canIAddr('activitypub', $addr = Discovery::normalize($target))) {
|
2022-02-24 02:39:11 +09:00
|
|
|
$ap_actor = DB::wrapInTransaction(fn () => ActivitypubActor::getByAddr($addr));
|
2021-12-24 10:58:41 +09:00
|
|
|
$actor = Actor::getById($ap_actor->getActorId());
|
2021-12-04 13:07:08 +09:00
|
|
|
FreeNetworkActorProtocol::protocolSucceeded('activitypub', $actor->getId(), $addr);
|
|
|
|
return Event::stop;
|
|
|
|
} else {
|
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
} catch (Exception $e) {
|
2022-02-20 22:59:06 +09:00
|
|
|
Log::error('ActivityPub WebFinger Mention check failed.', [$e]);
|
2021-12-04 13:07:08 +09:00
|
|
|
return Event::next;
|
|
|
|
}
|
|
|
|
}
|
2021-11-01 21:16:46 +09:00
|
|
|
|
2021-12-12 15:40:13 +09:00
|
|
|
/**
|
|
|
|
* @return string got from URI
|
|
|
|
*/
|
|
|
|
public static function getUriByObject(mixed $object): string
|
|
|
|
{
|
2022-01-03 05:37:15 +09:00
|
|
|
switch ($object::class) {
|
|
|
|
case Note::class:
|
|
|
|
if ($object->getIsLocal()) {
|
|
|
|
return $object->getUrl();
|
|
|
|
} else {
|
|
|
|
// Try known remote objects
|
2022-02-19 02:48:06 +09:00
|
|
|
$known_object = DB::findOneBy(ActivitypubObject::class, ['object_type' => 'note', 'object_id' => $object->getId()], return_null: true);
|
2022-01-03 05:37:15 +09:00
|
|
|
if ($known_object instanceof ActivitypubObject) {
|
|
|
|
return $known_object->getObjectUri();
|
|
|
|
} else {
|
|
|
|
throw new BugFoundException('ActivityPub cannot generate an URI for a stored note.', [$object, $known_object]);
|
|
|
|
}
|
2021-12-12 15:40:13 +09:00
|
|
|
}
|
2022-01-03 05:37:15 +09:00
|
|
|
break;
|
|
|
|
case Actor::class:
|
|
|
|
return $object->getUri();
|
|
|
|
break;
|
|
|
|
case Activity::class:
|
|
|
|
// Try known remote activities
|
2022-02-19 02:48:06 +09:00
|
|
|
$known_activity = DB::findOneBy(ActivitypubActivity::class, ['activity_id' => $object->getId()], return_null: true);
|
|
|
|
if (!\is_null($known_activity)) {
|
2022-01-03 05:37:15 +09:00
|
|
|
return $known_activity->getActivityUri();
|
|
|
|
} else {
|
|
|
|
return Router::url('activity_view', ['id' => $object->getId()], Router::ABSOLUTE_URL);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
throw new InvalidArgumentException('ActivityPub::getUriByObject found a limitation with: ' . var_export($object, true));
|
2021-12-24 10:58:41 +09:00
|
|
|
}
|
2021-12-12 15:40:13 +09:00
|
|
|
}
|
|
|
|
|
2021-12-09 07:24:52 +09:00
|
|
|
/**
|
|
|
|
* Get a Note from ActivityPub URI, if it doesn't exist, attempt to fetch it
|
|
|
|
* This should only be necessary internally.
|
|
|
|
*
|
|
|
|
* @throws ClientExceptionInterface
|
|
|
|
* @throws RedirectionExceptionInterface
|
|
|
|
* @throws ServerExceptionInterface
|
|
|
|
* @throws TransportExceptionInterface
|
2021-12-24 10:58:41 +09:00
|
|
|
*
|
2022-02-24 02:39:11 +09:00
|
|
|
* @return null|Actor|mixed|Note got from URI
|
2021-12-09 07:24:52 +09:00
|
|
|
*/
|
|
|
|
public static function getObjectByUri(string $resource, bool $try_online = true)
|
|
|
|
{
|
2022-01-03 05:37:15 +09:00
|
|
|
// Try known object
|
2022-02-19 02:48:06 +09:00
|
|
|
$known_object = DB::findOneBy(ActivitypubObject::class, ['object_uri' => $resource], return_null: true);
|
|
|
|
if (!\is_null($known_object)) {
|
2021-12-09 07:24:52 +09:00
|
|
|
return $known_object->getObject();
|
|
|
|
}
|
|
|
|
|
2022-01-03 05:37:15 +09:00
|
|
|
// Try known activity
|
2022-02-19 02:48:06 +09:00
|
|
|
$known_activity = DB::findOneBy(ActivitypubActivity::class, ['activity_uri' => $resource], return_null: true);
|
|
|
|
if (!\is_null($known_activity)) {
|
2021-12-09 07:24:52 +09:00
|
|
|
return $known_activity->getActivity();
|
|
|
|
}
|
|
|
|
|
2022-01-03 05:37:15 +09:00
|
|
|
// Try local Note
|
2021-12-09 07:24:52 +09:00
|
|
|
if (Common::isValidHttpUrl($resource)) {
|
|
|
|
$resource_parts = parse_url($resource);
|
|
|
|
// TODO: Use URLMatcher
|
2022-02-11 09:17:20 +09:00
|
|
|
if ($resource_parts['host'] === Common::config('site', 'server')) {
|
2022-01-03 05:37:15 +09:00
|
|
|
$local_note = DB::findOneBy('note', ['url' => $resource], return_null: true);
|
2022-02-24 02:39:11 +09:00
|
|
|
if (!\is_null($local_note)) {
|
2021-12-09 07:24:52 +09:00
|
|
|
return $local_note;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-03 05:37:15 +09:00
|
|
|
// Try Actor
|
|
|
|
try {
|
2022-02-25 10:05:28 +09:00
|
|
|
return Explorer::getOneFromUri($resource, try_online: false);
|
|
|
|
} catch (\Exception) {
|
2022-01-03 05:37:15 +09:00
|
|
|
// Ignore, this is brute forcing, it's okay not to find
|
|
|
|
}
|
|
|
|
|
2021-12-09 07:24:52 +09:00
|
|
|
// Try remote
|
|
|
|
if (!$try_online) {
|
2022-02-24 02:39:11 +09:00
|
|
|
return;
|
2021-12-09 07:24:52 +09:00
|
|
|
}
|
|
|
|
|
2021-12-24 10:58:41 +09:00
|
|
|
$response = HTTPClient::get($resource, ['headers' => self::HTTP_CLIENT_HEADERS]);
|
2021-12-09 07:24:52 +09:00
|
|
|
// If it was deleted
|
|
|
|
if ($response->getStatusCode() == 410) {
|
|
|
|
//$obj = Type::create('Tombstone', ['id' => $resource]);
|
2022-02-24 02:39:11 +09:00
|
|
|
return;
|
2021-12-09 07:24:52 +09:00
|
|
|
} elseif (!HTTPClient::statusCodeIsOkay($response)) { // If it is unavailable
|
|
|
|
throw new Exception('Non Ok Status Code for given Object id.');
|
|
|
|
} else {
|
|
|
|
return Model::jsonToType($response->getContent());
|
|
|
|
}
|
|
|
|
}
|
2021-09-07 07:47:28 +09:00
|
|
|
}
|