const fetch = require('node-fetch') // const request = require('request') const crypto = require('crypto') const config = require('config') const httpSignature = require('http-signature') const debug = require('debug')('federation:helpers') const { user: User, fed_users: FedUsers } = require('../api/models') const url = require('url') const actorCache = [] const Helpers = { async signAndSend (message, user, to) { // get the URI of the actor object and append 'inbox' to it const toInbox = to + '/inbox' const toOrigin = url.parse(to) const toPath = toOrigin.path + '/inbox' // get the private key const privkey = user.rsa.privateKey const signer = crypto.createSign('sha256') const d = new Date() const stringToSign = `(request-target): post ${toPath}\nhost: ${toOrigin.hostname}\ndate: ${d.toUTCString()}` signer.update(stringToSign) signer.end() const signature = signer.sign(privkey) const signature_b64 = signature.toString('base64') const header = `keyId="${config.baseurl}/federation/u/${user.username}",headers="(request-target) host date",signature="${signature_b64}"` const ret = await fetch(toInbox, { headers: { 'Host': toOrigin.hostname, 'Date': d.toUTCString(), 'Signature': header, 'Content-Type': 'application/activity+json; charset=utf-8', 'Accept': 'application/activity+json, application/json; chartset=utf-8' }, method: 'POST', body: JSON.stringify(message) }) debug('sign %s => %s', ret.status, await ret.text()) }, async sendEvent (event, user) { // event is sent by user that published it and by the admin instance // collect followers from admin and user const instanceAdmin = await User.findOne({ where: { email: config.admin, include: FedUsers } }) if (!instanceAdmin || !instanceAdmin.username) { debug('Instance admin not found (there is no user with email => %s)', config.admin) return } console.error(instanceAdmin) return for (const follower of instanceAdmin.followers) { debug('Notify %s with event %s (from admin user %s)', follower, event.title, instanceAdmin.username) const body = { id: `${config.baseurl}/federation/m/${event.id}#create`, type: 'Create', to: ['https://www.w3.org/ns/activitystreams#Public'], cc: [`${config.baseurl}/federation/u/${instanceAdmin.username}/followers`, follower], actor: `${config.baseurl}/federation/u/${instanceAdmin.username}`, object: event.toAP(instanceAdmin.username, [`${config.baseurl}/federation/u/${instanceAdmin.username}/followers`, follower]) } body['@context'] = 'https://www.w3.org/ns/activitystreams' Helpers.signAndSend(body, instanceAdmin, follower) } // in case the event is published by the Admin itself do not republish if (instanceAdmin.id === user.id) { debug('Event published by instance Admin') return } if (!user.settings.enable_federation || !user.username) { debug('Federation disabled for user %d (%s)', user.id, user.username) return } for (const follower of user.followers) { debug('Notify %s with event %s (from user %s)', follower, event.title, user.username) const body = { id: `${config.baseurl}/federation/m/${event.id}#create`, type: 'Create', to: ['https://www.w3.org/ns/activitystreams#Public'], cc: [`${config.baseurl}/federation/u/${user.username}/followers`, follower], published: event.createdAt, actor: `${config.baseurl}/federation/u/${user.username}`, object: event.toAP(user.username, [`${config.baseurl}/federation/u/${user.username}/followers`, follower]) } body['@context'] = 'https://www.w3.org/ns/activitystreams' Helpers.signAndSend(body, user, follower) } }, // DO NOT USE THIS! (why is this needed btw?) // async getFederatedUser (address) { // address = address.trim() // const [ username, host ] = address.split('@') // const url = `https://${host}/.well-known/webfinger?resource=acct:${username}@${host}` // return Helpers.getActor(url) // }, // TODO: cache async getActor (url, force = false) { let fedi_user // try with cache first if (!force) fedi_user = await FedUsers.findByPk(url) if (fedi_user) return fedi_user.object fedi_user = await fetch(url, { headers: { 'Accept': 'application/jrd+json, application/json' } }) .then(res => { if (!res.ok) { debug('[ERR] Actor %s => %s', url, res.statusText) return false } return res.json() }) if (fedi_user) { await FedUsers.create({ap_id: url, object: fedi_user}) } return fedi_user }, // ref: https://blog.joinmastodon.org/2018/07/how-to-make-friends-and-verify-requests/ async verifySignature (req, res, next) { let user = await Helpers.getActor(req.body.actor) if (!user) { return res.status(401).send('Actor not found') } // little hack -> https://github.com/joyent/node-http-signature/pull/83 req.headers.authorization = 'Signature ' + req.headers.signature req.fedi_user = user // another little hack :/ // https://github.com/joyent/node-http-signature/issues/87 req.url = '/federation' + req.url const parsed = httpSignature.parseRequest(req) if (httpSignature.verifySignature(parsed, user.publicKey.publicKeyPem)) { return next() } // signature not valid, try without cache user = await Helpers.getActor(req.body.actor, true) if (!user) { return res.status(401).send('Actor not found') } if (httpSignature.verifySignature(parsed, user.publicKey.publicKeyPem)) { return next() } // still not valid debug('Invalid signature from user %s', req.body.actor) res.send('Request signature could not be verified', 401) } } module.exports = Helpers