2023-03-12 15:00:57 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-08-25 14:34:33 +01:00
|
|
|
|
2021-05-17 18:06:58 +01:00
|
|
|
package transport
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto"
|
2022-05-15 10:16:43 +01:00
|
|
|
"errors"
|
2022-01-16 17:52:55 +00:00
|
|
|
"io"
|
2022-05-15 10:16:43 +01:00
|
|
|
"net/http"
|
2021-05-17 18:06:58 +01:00
|
|
|
"net/url"
|
|
|
|
"sync"
|
2022-05-15 10:16:43 +01:00
|
|
|
"time"
|
2021-05-17 18:06:58 +01:00
|
|
|
|
2023-04-28 16:45:21 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
2021-06-27 15:52:18 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-05-26 12:38:41 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/httpclient"
|
2024-07-30 12:58:31 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/transport/delivery"
|
2024-01-31 14:15:28 +00:00
|
|
|
"github.com/superseriousbusiness/httpsig"
|
2021-05-17 18:06:58 +01:00
|
|
|
)
|
|
|
|
|
2022-11-23 21:40:07 +00:00
|
|
|
// Transport implements the pub.Transport interface with some additional functionality for fetching remote media.
|
2022-03-15 14:01:19 +00:00
|
|
|
//
|
|
|
|
// Since the transport has the concept of 'shortcuts' for fetching data locally rather than remotely, it is
|
|
|
|
// not *always* the case that calling a Transport function does an http call, but it usually will for remote
|
|
|
|
// hosts or resources for which a shortcut isn't provided by the transport controller (also in this package).
|
2022-11-23 21:40:07 +00:00
|
|
|
//
|
|
|
|
// For any of the transport functions, if a Fastfail context is passed in as the first parameter, the function
|
|
|
|
// will return after the first transport failure, instead of retrying + backing off.
|
2021-05-17 18:06:58 +01:00
|
|
|
type Transport interface {
|
2022-11-23 21:40:07 +00:00
|
|
|
/*
|
|
|
|
POST functions
|
|
|
|
*/
|
|
|
|
|
2023-11-27 14:02:52 +00:00
|
|
|
// POST will perform given the http request using
|
|
|
|
// transport client, retrying on certain preset errors.
|
|
|
|
POST(*http.Request, []byte) (*http.Response, error)
|
|
|
|
|
2024-07-30 12:58:31 +01:00
|
|
|
// SignDelivery adds HTTP request signing client "middleware"
|
|
|
|
// to the request context within given delivery.Delivery{}.
|
|
|
|
SignDelivery(*delivery.Delivery) error
|
|
|
|
|
2022-11-23 21:40:07 +00:00
|
|
|
// Deliver sends an ActivityStreams object.
|
2024-04-11 10:45:35 +01:00
|
|
|
Deliver(ctx context.Context, obj map[string]interface{}, to *url.URL) error
|
2023-03-06 09:38:43 +00:00
|
|
|
|
2022-11-23 21:40:07 +00:00
|
|
|
// BatchDeliver sends an ActivityStreams object to multiple recipients.
|
2024-04-11 10:45:35 +01:00
|
|
|
BatchDeliver(ctx context.Context, obj map[string]interface{}, recipients []*url.URL) error
|
2022-11-23 21:40:07 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
GET functions
|
|
|
|
*/
|
|
|
|
|
2023-11-27 14:02:52 +00:00
|
|
|
// GET will perform the given http request using
|
|
|
|
// transport client, retrying on certain preset errors.
|
|
|
|
GET(*http.Request) (*http.Response, error)
|
|
|
|
|
2022-11-23 21:40:07 +00:00
|
|
|
// Dereference fetches the ActivityStreams object located at this IRI with a GET request.
|
2024-02-23 15:24:40 +00:00
|
|
|
Dereference(ctx context.Context, iri *url.URL) (*http.Response, error)
|
2023-03-06 09:38:43 +00:00
|
|
|
|
2024-07-12 10:39:47 +01:00
|
|
|
// DereferenceMedia fetches the given media attachment IRI, returning the reader limited to given max.
|
|
|
|
DereferenceMedia(ctx context.Context, iri *url.URL, maxsz int64) (io.ReadCloser, error)
|
2023-03-06 09:38:43 +00:00
|
|
|
|
2021-06-27 15:52:18 +01:00
|
|
|
// DereferenceInstance dereferences remote instance information, first by checking /api/v1/instance, and then by checking /.well-known/nodeinfo.
|
2021-08-25 14:34:33 +01:00
|
|
|
DereferenceInstance(ctx context.Context, iri *url.URL) (*gtsmodel.Instance, error)
|
2023-03-06 09:38:43 +00:00
|
|
|
|
2021-05-29 18:36:54 +01:00
|
|
|
// Finger performs a webfinger request with the given username and domain, and returns the bytes from the response body.
|
2022-11-23 21:40:07 +00:00
|
|
|
Finger(ctx context.Context, targetUsername string, targetDomain string) ([]byte, error)
|
2021-05-17 18:06:58 +01:00
|
|
|
}
|
|
|
|
|
2024-04-11 10:45:35 +01:00
|
|
|
// transport implements
|
|
|
|
// the Transport interface.
|
2021-05-17 18:06:58 +01:00
|
|
|
type transport struct {
|
2022-05-15 10:16:43 +01:00
|
|
|
controller *controller
|
|
|
|
pubKeyID string
|
|
|
|
privkey crypto.PrivateKey
|
|
|
|
|
|
|
|
signerExp time.Time
|
2024-02-19 10:18:17 +00:00
|
|
|
getSigner httpsig.SignerWithOptions
|
|
|
|
postSigner httpsig.SignerWithOptions
|
2022-05-15 10:16:43 +01:00
|
|
|
signerMu sync.Mutex
|
|
|
|
}
|
|
|
|
|
2023-02-10 20:16:01 +00:00
|
|
|
func (t *transport) GET(r *http.Request) (*http.Response, error) {
|
2022-05-15 10:16:43 +01:00
|
|
|
if r.Method != http.MethodGet {
|
|
|
|
return nil, errors.New("must be GET request")
|
|
|
|
}
|
2024-04-02 12:12:26 +01:00
|
|
|
|
|
|
|
// Prepare HTTP GET signing func with opts.
|
|
|
|
sign := t.signGET(httpsig.SignatureOption{
|
|
|
|
ExcludeQueryStringFromPathPseudoHeader: false,
|
|
|
|
})
|
|
|
|
|
|
|
|
ctx := r.Context() // update with signing details.
|
2023-06-13 15:47:56 +01:00
|
|
|
ctx = gtscontext.SetOutgoingPublicKeyID(ctx, t.pubKeyID)
|
2024-04-02 12:12:26 +01:00
|
|
|
ctx = gtscontext.SetHTTPClientSignFunc(ctx, sign)
|
2023-04-28 16:45:21 +01:00
|
|
|
r = r.WithContext(ctx) // replace request ctx.
|
2024-04-02 12:12:26 +01:00
|
|
|
|
|
|
|
// Set our predefined controller user-agent.
|
2023-04-28 16:45:21 +01:00
|
|
|
r.Header.Set("User-Agent", t.controller.userAgent)
|
2024-02-19 10:18:17 +00:00
|
|
|
|
2024-04-02 12:12:26 +01:00
|
|
|
// Pass to underlying HTTP client.
|
|
|
|
resp, err := t.controller.client.Do(r)
|
2024-02-19 10:18:17 +00:00
|
|
|
if err != nil || resp.StatusCode != http.StatusUnauthorized {
|
|
|
|
return resp, err
|
|
|
|
}
|
|
|
|
|
2024-04-02 12:12:26 +01:00
|
|
|
// Ignore this response.
|
2024-02-19 10:18:17 +00:00
|
|
|
_ = resp.Body.Close()
|
2024-04-02 12:12:26 +01:00
|
|
|
|
|
|
|
// Try again without the path included in
|
|
|
|
// the HTTP signature for better compatibility.
|
|
|
|
sign = t.signGET(httpsig.SignatureOption{
|
|
|
|
ExcludeQueryStringFromPathPseudoHeader: true,
|
|
|
|
})
|
|
|
|
|
|
|
|
ctx = r.Context() // update with signing details.
|
|
|
|
ctx = gtscontext.SetHTTPClientSignFunc(ctx, sign)
|
|
|
|
r = r.WithContext(ctx) // replace request ctx.
|
|
|
|
|
|
|
|
// Pass to underlying HTTP client.
|
|
|
|
return t.controller.client.Do(r)
|
2022-05-15 10:16:43 +01:00
|
|
|
}
|
|
|
|
|
2023-02-10 20:16:01 +00:00
|
|
|
func (t *transport) POST(r *http.Request, body []byte) (*http.Response, error) {
|
2022-05-15 10:16:43 +01:00
|
|
|
if r.Method != http.MethodPost {
|
|
|
|
return nil, errors.New("must be POST request")
|
|
|
|
}
|
2024-04-02 12:12:26 +01:00
|
|
|
|
|
|
|
// Prepare POST signer.
|
|
|
|
sign := t.signPOST(body)
|
|
|
|
|
|
|
|
ctx := r.Context() // update with signing details.
|
2023-06-13 15:47:56 +01:00
|
|
|
ctx = gtscontext.SetOutgoingPublicKeyID(ctx, t.pubKeyID)
|
2024-04-02 12:12:26 +01:00
|
|
|
ctx = gtscontext.SetHTTPClientSignFunc(ctx, sign)
|
2023-04-28 16:45:21 +01:00
|
|
|
r = r.WithContext(ctx) // replace request ctx.
|
2024-04-02 12:12:26 +01:00
|
|
|
|
|
|
|
// Set our predefined controller user-agent.
|
2022-11-26 20:19:42 +00:00
|
|
|
r.Header.Set("User-Agent", t.controller.userAgent)
|
2024-04-02 12:12:26 +01:00
|
|
|
|
|
|
|
// Pass to underlying HTTP client.
|
|
|
|
return t.controller.client.Do(r)
|
2022-05-15 10:16:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// signGET will safely sign an HTTP GET request.
|
2024-02-19 10:18:17 +00:00
|
|
|
func (t *transport) signGET(opts httpsig.SignatureOption) httpclient.SignFunc {
|
2023-04-28 16:45:21 +01:00
|
|
|
return func(r *http.Request) (err error) {
|
|
|
|
t.safesign(func() {
|
2024-02-19 10:18:17 +00:00
|
|
|
err = t.getSigner.SignRequestWithOptions(t.privkey, t.pubKeyID, r, nil, opts)
|
2023-04-28 16:45:21 +01:00
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
2022-05-15 10:16:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// signPOST will safely sign an HTTP POST request for given body.
|
2023-04-28 16:45:21 +01:00
|
|
|
func (t *transport) signPOST(body []byte) httpclient.SignFunc {
|
|
|
|
return func(r *http.Request) (err error) {
|
|
|
|
t.safesign(func() {
|
|
|
|
err = t.postSigner.SignRequest(t.privkey, t.pubKeyID, r, body)
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
2022-05-15 10:16:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// safesign will perform sign function within mutex protection,
|
|
|
|
// and ensured that httpsig.Signers are up-to-date.
|
|
|
|
func (t *transport) safesign(sign func()) {
|
|
|
|
// Perform within mu safety
|
|
|
|
t.signerMu.Lock()
|
|
|
|
defer t.signerMu.Unlock()
|
|
|
|
|
|
|
|
if now := time.Now(); now.After(t.signerExp) {
|
|
|
|
const expiry = 120
|
|
|
|
|
|
|
|
// Signers have expired and require renewal
|
|
|
|
t.getSigner, _ = NewGETSigner(expiry)
|
|
|
|
t.postSigner, _ = NewPOSTSigner(expiry)
|
|
|
|
t.signerExp = now.Add(time.Second * expiry)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Perform signing
|
|
|
|
sign()
|
2022-03-15 14:01:19 +00:00
|
|
|
}
|