mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2025-08-29 21:53:53 +00:00
Add ActivityPub Person follow from distant (#8720)
This PR is part of #4767. It 1. adds the ability to follow a local person from a distant federation server (see tests/integration/api_activitypub_person_inbox_follow_test.go) 2. streamlines the router code (refactor the person conversion & handling of inbox requests in service direction, unifies service call signature & error handling) 3. introduces queues for decoupling outgoing communication (delivery retry to cope network issues or distant service downtimes) and 4. adds minor fixes to integration tests (test timeout & invalid inbox activities) Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/8720 Reviewed-by: Earl Warren <earl-warren@noreply.codeberg.org> Co-authored-by: Michael Jerger <michael.jerger@meissa-gmbh.de> Co-committed-by: Michael Jerger <michael.jerger@meissa-gmbh.de>
This commit is contained in:
parent
64193310ee
commit
7566ebfba7
13 changed files with 422 additions and 66 deletions
|
@ -59,16 +59,12 @@ forgejo.org/models/user
|
||||||
IsErrExternalLoginUserAlreadyExist
|
IsErrExternalLoginUserAlreadyExist
|
||||||
IsErrExternalLoginUserNotExist
|
IsErrExternalLoginUserNotExist
|
||||||
NewFederatedUser
|
NewFederatedUser
|
||||||
NewFederatedUserFollower
|
|
||||||
IsErrUserSettingIsNotExist
|
IsErrUserSettingIsNotExist
|
||||||
GetUserAllSettings
|
GetUserAllSettings
|
||||||
DeleteUserSetting
|
DeleteUserSetting
|
||||||
GetFederatedUser
|
GetFederatedUser
|
||||||
GetFederatedUserByUserID
|
GetFederatedUserByUserID
|
||||||
GetFollowersForUser
|
GetFollowersForUser
|
||||||
AddFollower
|
|
||||||
RemoveFollower
|
|
||||||
IsFollowingAp
|
|
||||||
|
|
||||||
forgejo.org/modules/activitypub
|
forgejo.org/modules/activitypub
|
||||||
NewContext
|
NewContext
|
||||||
|
@ -99,11 +95,7 @@ forgejo.org/modules/eventsource
|
||||||
Event.String
|
Event.String
|
||||||
|
|
||||||
forgejo.org/modules/forgefed
|
forgejo.org/modules/forgefed
|
||||||
NewForgeFollowFromAp
|
|
||||||
NewForgeFollow
|
NewForgeFollow
|
||||||
ForgeFollow.MarshalJSON
|
|
||||||
ForgeFollow.UnmarshalJSON
|
|
||||||
ForgeFollow.Validate
|
|
||||||
NewForgeUndoLike
|
NewForgeUndoLike
|
||||||
ForgeUndoLike.UnmarshalJSON
|
ForgeUndoLike.UnmarshalJSON
|
||||||
ForgeUndoLike.Validate
|
ForgeUndoLike.Validate
|
||||||
|
@ -228,7 +220,6 @@ forgejo.org/modules/util/filebuffer
|
||||||
|
|
||||||
forgejo.org/modules/validation
|
forgejo.org/modules/validation
|
||||||
IsErrNotValid
|
IsErrNotValid
|
||||||
ValidateIDExists
|
|
||||||
|
|
||||||
forgejo.org/modules/web
|
forgejo.org/modules/web
|
||||||
RouteMock
|
RouteMock
|
||||||
|
@ -245,11 +236,8 @@ forgejo.org/routers/web/org
|
||||||
forgejo.org/services/context
|
forgejo.org/services/context
|
||||||
GetPrivateContext
|
GetPrivateContext
|
||||||
|
|
||||||
forgejo.org/services/federation
|
forgejo.org/services/convert
|
||||||
NewErrInternalf
|
ToActivityPubPersonFeedItem
|
||||||
ErrInternal.Error
|
|
||||||
Init
|
|
||||||
NewServiceResultWithBytes
|
|
||||||
|
|
||||||
forgejo.org/services/repository
|
forgejo.org/services/repository
|
||||||
IsErrForkAlreadyExist
|
IsErrForkAlreadyExist
|
||||||
|
|
|
@ -4,14 +4,14 @@
|
||||||
package activitypub
|
package activitypub
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"forgejo.org/modules/activitypub"
|
"forgejo.org/modules/activitypub"
|
||||||
"forgejo.org/modules/log"
|
"forgejo.org/modules/log"
|
||||||
"forgejo.org/modules/setting"
|
"forgejo.org/modules/web"
|
||||||
"forgejo.org/services/context"
|
"forgejo.org/services/context"
|
||||||
|
"forgejo.org/services/convert"
|
||||||
|
"forgejo.org/services/federation"
|
||||||
|
|
||||||
ap "github.com/go-ap/activitypub"
|
ap "github.com/go-ap/activitypub"
|
||||||
"github.com/go-ap/jsonld"
|
"github.com/go-ap/jsonld"
|
||||||
|
@ -34,45 +34,12 @@ func Person(ctx *context.APIContext) {
|
||||||
// "200":
|
// "200":
|
||||||
// "$ref": "#/responses/ActivityPub"
|
// "$ref": "#/responses/ActivityPub"
|
||||||
|
|
||||||
// TODO: the setting.AppURL during the test doesn't follow the definition: "It always has a '/' suffix"
|
person, err := convert.ToActivityPubPerson(ctx, ctx.ContextUser)
|
||||||
link := fmt.Sprintf("%s/api/v1/activitypub/user-id/%d", strings.TrimSuffix(setting.AppURL, "/"), ctx.ContextUser.ID)
|
|
||||||
person := ap.PersonNew(ap.IRI(link))
|
|
||||||
|
|
||||||
person.Name = ap.NaturalLanguageValuesNew()
|
|
||||||
err := person.Name.Set("en", ap.Content(ctx.ContextUser.FullName))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ctx.ServerError("Set Name", err)
|
ctx.ServerError("convert.ToActivityPubPerson", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
person.PreferredUsername = ap.NaturalLanguageValuesNew()
|
|
||||||
err = person.PreferredUsername.Set("en", ap.Content(ctx.ContextUser.Name))
|
|
||||||
if err != nil {
|
|
||||||
ctx.ServerError("Set PreferredUsername", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
person.URL = ap.IRI(ctx.ContextUser.HTMLURL())
|
|
||||||
|
|
||||||
person.Icon = ap.Image{
|
|
||||||
Type: ap.ImageType,
|
|
||||||
MediaType: "image/png",
|
|
||||||
URL: ap.IRI(ctx.ContextUser.AvatarLink(ctx)),
|
|
||||||
}
|
|
||||||
|
|
||||||
person.Inbox = ap.IRI(link + "/inbox")
|
|
||||||
person.Outbox = ap.IRI(link + "/outbox")
|
|
||||||
|
|
||||||
person.PublicKey.ID = ap.IRI(link + "#main-key")
|
|
||||||
person.PublicKey.Owner = ap.IRI(link)
|
|
||||||
|
|
||||||
publicKeyPem, err := activitypub.GetPublicKey(ctx, ctx.ContextUser)
|
|
||||||
if err != nil {
|
|
||||||
ctx.ServerError("GetPublicKey", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
person.PublicKey.PublicKeyPem = publicKeyPem
|
|
||||||
|
|
||||||
binary, err := jsonld.WithContext(jsonld.IRI(ap.ActivityBaseURI), jsonld.IRI(ap.SecurityContextURI)).Marshal(person)
|
binary, err := jsonld.WithContext(jsonld.IRI(ap.ActivityBaseURI), jsonld.IRI(ap.SecurityContextURI)).Marshal(person)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ctx.ServerError("MarshalJSON", err)
|
ctx.ServerError("MarshalJSON", err)
|
||||||
|
@ -99,8 +66,15 @@ func PersonInbox(ctx *context.APIContext) {
|
||||||
// type: integer
|
// type: integer
|
||||||
// required: true
|
// required: true
|
||||||
// responses:
|
// responses:
|
||||||
// "204":
|
// "202":
|
||||||
// "$ref": "#/responses/empty"
|
// "$ref": "#/responses/empty"
|
||||||
|
|
||||||
ctx.Status(http.StatusNoContent)
|
form := web.GetForm(ctx)
|
||||||
|
activity := form.(*ap.Activity)
|
||||||
|
result, err := federation.ProcessPersonInbox(ctx, ctx.ContextUser, activity)
|
||||||
|
if err != nil {
|
||||||
|
ctx.Error(federation.HTTPStatus(err), "PersonInbox", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
responseServiceResult(ctx, result)
|
||||||
}
|
}
|
||||||
|
|
|
@ -38,6 +38,7 @@ import (
|
||||||
"forgejo.org/services/auth/source/oauth2"
|
"forgejo.org/services/auth/source/oauth2"
|
||||||
"forgejo.org/services/automerge"
|
"forgejo.org/services/automerge"
|
||||||
"forgejo.org/services/cron"
|
"forgejo.org/services/cron"
|
||||||
|
federation_service "forgejo.org/services/federation"
|
||||||
feed_service "forgejo.org/services/feed"
|
feed_service "forgejo.org/services/feed"
|
||||||
indexer_service "forgejo.org/services/indexer"
|
indexer_service "forgejo.org/services/indexer"
|
||||||
"forgejo.org/services/mailer"
|
"forgejo.org/services/mailer"
|
||||||
|
@ -122,6 +123,7 @@ func InitWebInstalled(ctx context.Context) {
|
||||||
mailer.NewContext(ctx)
|
mailer.NewContext(ctx)
|
||||||
mustInit(cache.Init)
|
mustInit(cache.Init)
|
||||||
mustInit(feed_service.Init)
|
mustInit(feed_service.Init)
|
||||||
|
mustInit(federation_service.Init)
|
||||||
mustInit(uinotification.Init)
|
mustInit(uinotification.Init)
|
||||||
mustInitCtx(ctx, archiver.Init)
|
mustInitCtx(ctx, archiver.Init)
|
||||||
|
|
||||||
|
|
62
services/convert/activitypub_person.go
Normal file
62
services/convert/activitypub_person.go
Normal file
|
@ -0,0 +1,62 @@
|
||||||
|
// Copyright 2024 The Forgejo Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package convert
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"forgejo.org/models/activities"
|
||||||
|
user_model "forgejo.org/models/user"
|
||||||
|
"forgejo.org/modules/activitypub"
|
||||||
|
|
||||||
|
ap "github.com/go-ap/activitypub"
|
||||||
|
)
|
||||||
|
|
||||||
|
func ToActivityPubPersonFeedItem(item *activities.FederatedUserActivity) ap.Note {
|
||||||
|
return ap.Note{
|
||||||
|
AttributedTo: ap.IRI(item.ActorURI),
|
||||||
|
Content: ap.NaturalLanguageValues{{Value: ap.Content(item.NoteContent), Ref: ap.NilLangRef}},
|
||||||
|
ID: ap.IRI(item.NoteURL),
|
||||||
|
URL: ap.IRI(item.OriginalNote),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func ToActivityPubPerson(ctx context.Context, user *user_model.User) (*ap.Person, error) {
|
||||||
|
link := user.APActorID()
|
||||||
|
person := ap.PersonNew(ap.IRI(link))
|
||||||
|
|
||||||
|
person.Name = ap.NaturalLanguageValuesNew()
|
||||||
|
err := person.Name.Set("en", ap.Content(user.FullName))
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
person.PreferredUsername = ap.NaturalLanguageValuesNew()
|
||||||
|
err = person.PreferredUsername.Set("en", ap.Content(user.Name))
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
person.URL = ap.IRI(user.HTMLURL())
|
||||||
|
|
||||||
|
person.Icon = ap.Image{
|
||||||
|
Type: ap.ImageType,
|
||||||
|
MediaType: "image/png",
|
||||||
|
URL: ap.IRI(user.AvatarLink(ctx)),
|
||||||
|
}
|
||||||
|
|
||||||
|
person.Inbox = ap.IRI(link + "/inbox")
|
||||||
|
person.Outbox = ap.IRI(link + "/outbox")
|
||||||
|
|
||||||
|
person.PublicKey.ID = ap.IRI(link + "#main-key")
|
||||||
|
person.PublicKey.Owner = ap.IRI(link)
|
||||||
|
|
||||||
|
publicKeyPem, err := activitypub.GetPublicKey(ctx, user)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
person.PublicKey.PublicKeyPem = publicKeyPem
|
||||||
|
|
||||||
|
return person, nil
|
||||||
|
}
|
76
services/federation/delivery_queue.go
Normal file
76
services/federation/delivery_queue.go
Normal file
|
@ -0,0 +1,76 @@
|
||||||
|
// Copyright 2024 The Forgejo Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package federation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
"forgejo.org/models/user"
|
||||||
|
"forgejo.org/modules/activitypub"
|
||||||
|
"forgejo.org/modules/graceful"
|
||||||
|
"forgejo.org/modules/log"
|
||||||
|
"forgejo.org/modules/process"
|
||||||
|
"forgejo.org/modules/queue"
|
||||||
|
)
|
||||||
|
|
||||||
|
type deliveryQueueItem struct {
|
||||||
|
Doer *user.User
|
||||||
|
InboxURL string
|
||||||
|
Payload []byte
|
||||||
|
DeliveryCount int
|
||||||
|
}
|
||||||
|
|
||||||
|
var deliveryQueue *queue.WorkerPoolQueue[deliveryQueueItem]
|
||||||
|
|
||||||
|
func initDeliveryQueue() error {
|
||||||
|
deliveryQueue = queue.CreateUniqueQueue(graceful.GetManager().ShutdownContext(), "activitypub_inbox_delivery", deliveryQueueHandler)
|
||||||
|
if deliveryQueue == nil {
|
||||||
|
return fmt.Errorf("unable to create activitypub_inbox_delivery queue")
|
||||||
|
}
|
||||||
|
go graceful.GetManager().RunWithCancel(deliveryQueue)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func deliveryQueueHandler(items ...deliveryQueueItem) (unhandled []deliveryQueueItem) {
|
||||||
|
for _, item := range items {
|
||||||
|
item.DeliveryCount++
|
||||||
|
err := deliverToInbox(item)
|
||||||
|
if err != nil && item.DeliveryCount < 10 {
|
||||||
|
unhandled = append(unhandled, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return unhandled
|
||||||
|
}
|
||||||
|
|
||||||
|
func deliverToInbox(item deliveryQueueItem) error {
|
||||||
|
ctx, _, finished := process.GetManager().AddContext(graceful.GetManager().HammerContext(),
|
||||||
|
fmt.Sprintf("Delivering an Activity via user[%d] (%s), to %s", item.Doer.ID, item.Doer.Name, item.InboxURL))
|
||||||
|
defer finished()
|
||||||
|
|
||||||
|
clientFactory, err := activitypub.GetClientFactory(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
apclient, err := clientFactory.WithKeys(ctx, item.Doer, item.Doer.APActorID()+"#main-key")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Debug("Delivering %s to %s", item.Payload, item.InboxURL)
|
||||||
|
res, err := apclient.Post(item.Payload, item.InboxURL)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if res.StatusCode >= 400 {
|
||||||
|
defer res.Body.Close()
|
||||||
|
body, _ := io.ReadAll(io.LimitReader(res.Body, 16*1024))
|
||||||
|
|
||||||
|
log.Warn("Delivering to %s failed: %d %s, %v times", item.InboxURL, res.StatusCode, string(body), item.DeliveryCount)
|
||||||
|
return fmt.Errorf("delivery failed")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -23,7 +23,10 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func Init() error {
|
func Init() error {
|
||||||
return nil
|
if !setting.Federation.Enabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return initDeliveryQueue()
|
||||||
}
|
}
|
||||||
|
|
||||||
func FindOrCreateFederationHost(ctx context.Context, actorURI string) (*forgefed.FederationHost, error) {
|
func FindOrCreateFederationHost(ctx context.Context, actorURI string) (*forgefed.FederationHost, error) {
|
||||||
|
|
73
services/federation/person_inbox_follow.go
Normal file
73
services/federation/person_inbox_follow.go
Normal file
|
@ -0,0 +1,73 @@
|
||||||
|
// Copyright 2024 The Forgejo Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package federation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"forgejo.org/models/user"
|
||||||
|
"forgejo.org/modules/forgefed"
|
||||||
|
"forgejo.org/modules/log"
|
||||||
|
|
||||||
|
ap "github.com/go-ap/activitypub"
|
||||||
|
"github.com/go-ap/jsonld"
|
||||||
|
)
|
||||||
|
|
||||||
|
func processPersonFollow(ctx context.Context, ctxUser *user.User, activity *ap.Activity) (ServiceResult, error) {
|
||||||
|
follow, err := forgefed.NewForgeFollowFromAp(*activity)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Invalid follow activity: %s", err)
|
||||||
|
return ServiceResult{}, NewErrNotAcceptablef("Invalid follow activity: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
actorURI := follow.Actor.GetLink().String()
|
||||||
|
_, federatedUser, federationHost, err := FindOrCreateFederatedUser(ctx, actorURI)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Error finding or creating federated user (%s): %v", actorURI, err)
|
||||||
|
return ServiceResult{}, NewErrNotAcceptablef("Federated user not found: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
following, err := user.IsFollowingAp(ctx, ctxUser, federatedUser)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("forgefed.IsFollowing: %v", err)
|
||||||
|
return ServiceResult{}, NewErrNotAcceptablef("forgefed.IsFollowing: %v", err)
|
||||||
|
}
|
||||||
|
if following {
|
||||||
|
// If the user is already following, we're good, nothing to do.
|
||||||
|
log.Trace("Local user[%d] is already following federated user[%d]", ctxUser.ID, federatedUser.ID)
|
||||||
|
return NewServiceResultStatusOnly(http.StatusNoContent), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
follower, err := user.AddFollower(ctx, ctxUser, federatedUser)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Unable to add follower: %v", err)
|
||||||
|
return ServiceResult{}, NewErrNotAcceptablef("Unable to add follower: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
accept := ap.AcceptNew(ap.IRI(fmt.Sprintf(
|
||||||
|
"%s#accepts/follow/%d", ctxUser.APActorID(), follower.ID,
|
||||||
|
)), follow)
|
||||||
|
accept.Actor = ap.IRI(ctxUser.APActorID())
|
||||||
|
payload, err := jsonld.WithContext(jsonld.IRI(ap.ActivityBaseURI)).Marshal(accept)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Unable to Marshal JSON: %v", err)
|
||||||
|
return ServiceResult{}, NewErrInternalf("MarshalJSON: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
hostURL := federationHost.AsURL()
|
||||||
|
if err := deliveryQueue.Push(deliveryQueueItem{
|
||||||
|
InboxURL: hostURL.JoinPath(federatedUser.InboxPath).String(),
|
||||||
|
Doer: ctxUser,
|
||||||
|
Payload: payload,
|
||||||
|
}); err != nil {
|
||||||
|
log.Error("Unable to push to pending queue: %v", err)
|
||||||
|
return ServiceResult{}, NewErrInternalf("Unable to push to pending queue: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Respond back with an accept
|
||||||
|
result := NewServiceResultWithBytes(http.StatusAccepted, []byte(`{"status":"Accepted"}`))
|
||||||
|
return result, nil
|
||||||
|
}
|
47
services/federation/person_inbox_undo.go
Normal file
47
services/federation/person_inbox_undo.go
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
// Copyright 2024 The Forgejo Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package federation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
"forgejo.org/models/user"
|
||||||
|
"forgejo.org/modules/log"
|
||||||
|
|
||||||
|
ap "github.com/go-ap/activitypub"
|
||||||
|
)
|
||||||
|
|
||||||
|
func processPersonInboxUndo(ctx context.Context, ctxUser *user.User, activity *ap.Activity) (ServiceResult, error) {
|
||||||
|
if activity.Object.GetType() != ap.FollowType {
|
||||||
|
log.Error("Invalid object type for Undo activity: %v", activity.Object.GetType())
|
||||||
|
return ServiceResult{}, NewErrNotAcceptablef("Invalid object type for Undo activity: %v", activity.Object.GetType())
|
||||||
|
}
|
||||||
|
|
||||||
|
actorURI := activity.Actor.GetLink().String()
|
||||||
|
_, federatedUser, _, err := findFederatedUser(ctx, actorURI)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("User not found: %v", err)
|
||||||
|
return ServiceResult{}, NewErrInternalf("User not found: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if federatedUser != nil {
|
||||||
|
following, err := user.IsFollowingAp(ctx, ctxUser, federatedUser)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("forgefed.IsFollowing: %v", err)
|
||||||
|
return ServiceResult{}, NewErrInternalf("forgefed.IsFollowing: %v", err)
|
||||||
|
}
|
||||||
|
if !following {
|
||||||
|
// The local user is not following the federated one, nothing to do.
|
||||||
|
log.Trace("Local user[%d] is not following federated user[%d]", ctxUser.ID, federatedUser.ID)
|
||||||
|
return NewServiceResultStatusOnly(http.StatusNoContent), nil
|
||||||
|
}
|
||||||
|
if err := user.RemoveFollower(ctx, ctxUser, federatedUser); err != nil {
|
||||||
|
log.Error("Unable to remove follower", err)
|
||||||
|
return ServiceResult{}, NewErrInternalf("Unable to remove follower: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return NewServiceResultStatusOnly(http.StatusNoContent), nil
|
||||||
|
}
|
25
services/federation/person_service.go
Normal file
25
services/federation/person_service.go
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
// Copyright 2024 The Forgejo Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package federation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"forgejo.org/models/user"
|
||||||
|
"forgejo.org/modules/log"
|
||||||
|
|
||||||
|
ap "github.com/go-ap/activitypub"
|
||||||
|
)
|
||||||
|
|
||||||
|
func ProcessPersonInbox(ctx context.Context, user *user.User, activity *ap.Activity) (ServiceResult, error) {
|
||||||
|
switch activity.Type {
|
||||||
|
case ap.FollowType:
|
||||||
|
return processPersonFollow(ctx, user, activity)
|
||||||
|
case ap.UndoType:
|
||||||
|
return processPersonInboxUndo(ctx, user, activity)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Error("Unsupported PersonInbox activity: %v", activity.Type)
|
||||||
|
return ServiceResult{}, NewErrNotAcceptablef("unsupported activity: %v", activity.Type)
|
||||||
|
}
|
2
templates/swagger/v1_json.tmpl
generated
2
templates/swagger/v1_json.tmpl
generated
|
@ -162,7 +162,7 @@
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"responses": {
|
"responses": {
|
||||||
"204": {
|
"202": {
|
||||||
"$ref": "#/responses/empty"
|
"$ref": "#/responses/empty"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,14 +6,15 @@ package integration
|
||||||
import (
|
import (
|
||||||
"net/url"
|
"net/url"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
"forgejo.org/models/db"
|
|
||||||
"forgejo.org/models/unittest"
|
"forgejo.org/models/unittest"
|
||||||
user_model "forgejo.org/models/user"
|
user_model "forgejo.org/models/user"
|
||||||
"forgejo.org/modules/activitypub"
|
"forgejo.org/modules/activitypub"
|
||||||
"forgejo.org/modules/setting"
|
"forgejo.org/modules/setting"
|
||||||
"forgejo.org/modules/test"
|
"forgejo.org/modules/test"
|
||||||
"forgejo.org/routers"
|
"forgejo.org/routers"
|
||||||
|
"forgejo.org/services/contexttest"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
@ -25,15 +26,15 @@ func TestActivityPubClientBodySize(t *testing.T) {
|
||||||
|
|
||||||
onGiteaRun(t, func(t *testing.T, u *url.URL) {
|
onGiteaRun(t, func(t *testing.T, u *url.URL) {
|
||||||
user1 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
user1 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
||||||
|
|
||||||
clientFactory, err := activitypub.GetClientFactory(db.DefaultContext)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
apClient, err := clientFactory.WithKeys(db.DefaultContext, user1, user1.KeyID())
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
url := u.JoinPath("/api/v1/nodeinfo").String()
|
url := u.JoinPath("/api/v1/nodeinfo").String()
|
||||||
|
|
||||||
|
ctx, _ := contexttest.MockAPIContext(t, url)
|
||||||
|
clientFactory, err := activitypub.NewClientFactoryWithTimeout(60 * time.Second)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
apClient, err := clientFactory.WithKeys(ctx, user1, user1.KeyID())
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
// Request with normal MaxSize
|
// Request with normal MaxSize
|
||||||
t.Run("NormalMaxSize", func(t *testing.T) {
|
t.Run("NormalMaxSize", func(t *testing.T) {
|
||||||
resp, err := apClient.GetBody(url)
|
resp, err := apClient.GetBody(url)
|
||||||
|
|
105
tests/integration/api_activitypub_person_inbox_follow_test.go
Normal file
105
tests/integration/api_activitypub_person_inbox_follow_test.go
Normal file
|
@ -0,0 +1,105 @@
|
||||||
|
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package integration
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"forgejo.org/models/unittest"
|
||||||
|
user_model "forgejo.org/models/user"
|
||||||
|
"forgejo.org/modules/activitypub"
|
||||||
|
"forgejo.org/modules/setting"
|
||||||
|
"forgejo.org/modules/test"
|
||||||
|
"forgejo.org/routers"
|
||||||
|
"forgejo.org/services/contexttest"
|
||||||
|
"forgejo.org/services/federation"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Flow of this test is documented at: https://codeberg.org/forgejo-contrib/federation/src/branch/main/doc/user-activity-following.md
|
||||||
|
func TestActivityPubPersonInboxFollow(t *testing.T) {
|
||||||
|
defer test.MockVariableValue(&setting.Federation.Enabled, true)()
|
||||||
|
defer test.MockVariableValue(&setting.Federation.SignatureEnforced, false)()
|
||||||
|
defer test.MockVariableValue(&testWebRoutes, routers.NormalRoutes())()
|
||||||
|
|
||||||
|
federation.Init()
|
||||||
|
|
||||||
|
mock := test.NewFederationServerMock()
|
||||||
|
federatedSrv := mock.DistantServer(t)
|
||||||
|
defer federatedSrv.Close()
|
||||||
|
|
||||||
|
onGiteaRun(t, func(t *testing.T, localUrl *url.URL) {
|
||||||
|
defer test.MockVariableValue(&setting.AppURL, localUrl.String())()
|
||||||
|
|
||||||
|
distantURL := federatedSrv.URL
|
||||||
|
distantUser15URL := fmt.Sprintf("%s/api/v1/activitypub/user-id/15", distantURL)
|
||||||
|
|
||||||
|
localUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
||||||
|
localUser2URL := localUrl.JoinPath("/api/v1/activitypub/user-id/2").String()
|
||||||
|
localUser2Inbox := localUrl.JoinPath("/api/v1/activitypub/user-id/2/inbox").String()
|
||||||
|
|
||||||
|
ctx, _ := contexttest.MockAPIContext(t, localUser2Inbox)
|
||||||
|
|
||||||
|
// distant follows local
|
||||||
|
followActivity := []byte(fmt.Sprintf(
|
||||||
|
`{"type":"Follow",`+
|
||||||
|
`"actor":"%s",`+
|
||||||
|
`"object":"%s"}`,
|
||||||
|
distantUser15URL,
|
||||||
|
localUser2URL,
|
||||||
|
))
|
||||||
|
cf, err := activitypub.NewClientFactoryWithTimeout(60 * time.Second)
|
||||||
|
require.NoError(t, err)
|
||||||
|
c, err := cf.WithKeysDirect(ctx, mock.ApActor.PrivKey,
|
||||||
|
mock.ApActor.KeyID(federatedSrv.URL))
|
||||||
|
require.NoError(t, err)
|
||||||
|
resp, err := c.Post(followActivity, localUser2Inbox)
|
||||||
|
require.NoError(t, err)
|
||||||
|
assert.Equal(t, http.StatusAccepted, resp.StatusCode)
|
||||||
|
|
||||||
|
// local follow exists
|
||||||
|
distantFederatedUser := unittest.AssertExistsAndLoadBean(t, &user_model.FederatedUser{ExternalID: "15"})
|
||||||
|
unittest.AssertExistsAndLoadBean(t,
|
||||||
|
&user_model.FederatedUserFollower{
|
||||||
|
FollowedUserID: localUser.ID,
|
||||||
|
FollowingUserID: distantFederatedUser.UserID,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
// distant is informed about accepting follow
|
||||||
|
assert.Contains(t, mock.LastPost, "\"type\":\"Accept\"")
|
||||||
|
|
||||||
|
// distant undoes follow
|
||||||
|
undoFollowActivity := []byte(fmt.Sprintf(
|
||||||
|
`{"type":"Undo",`+
|
||||||
|
`"actor":"%s",`+
|
||||||
|
`"object":{"type":"Follow",`+
|
||||||
|
`"actor":"%s",`+
|
||||||
|
`"object":"%s"}}`,
|
||||||
|
distantUser15URL,
|
||||||
|
distantUser15URL,
|
||||||
|
localUser2URL,
|
||||||
|
))
|
||||||
|
c, err = cf.WithKeysDirect(ctx, mock.ApActor.PrivKey,
|
||||||
|
mock.ApActor.KeyID(federatedSrv.URL))
|
||||||
|
require.NoError(t, err)
|
||||||
|
resp, err = c.Post(undoFollowActivity, localUser2Inbox)
|
||||||
|
require.NoError(t, err)
|
||||||
|
assert.Equal(t, http.StatusNoContent, resp.StatusCode)
|
||||||
|
|
||||||
|
// local follow removed
|
||||||
|
unittest.AssertNotExistsBean(t,
|
||||||
|
&user_model.FederatedUserFollower{
|
||||||
|
FollowedUserID: localUser.ID,
|
||||||
|
FollowingUserID: distantFederatedUser.UserID,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
})
|
||||||
|
}
|
|
@ -105,9 +105,9 @@ func TestActivityPubPersonInbox(t *testing.T) {
|
||||||
c, err := cf.WithKeys(ctx, user1, user1url)
|
c, err := cf.WithKeys(ctx, user1, user1url)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
// Signed request "succeeds"
|
// invalid request is rejected
|
||||||
resp, err := c.Post([]byte{}, user2inboxurl)
|
resp, err := c.Post([]byte{}, user2inboxurl)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
assert.Equal(t, http.StatusNoContent, resp.StatusCode)
|
assert.Equal(t, http.StatusNotAcceptable, resp.StatusCode)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue