2023-03-12 18:00:57 +03:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-08-25 16:34:33 +03:00
|
|
|
|
2021-05-17 20:06:58 +03:00
|
|
|
package transport
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto"
|
2022-05-15 12:16:43 +03:00
|
|
|
"errors"
|
2022-01-16 20:52:55 +03:00
|
|
|
"io"
|
2022-05-15 12:16:43 +03:00
|
|
|
"net/http"
|
2021-05-17 20:06:58 +03:00
|
|
|
"net/url"
|
|
|
|
"sync"
|
2022-05-15 12:16:43 +03:00
|
|
|
"time"
|
2021-05-17 20:06:58 +03:00
|
|
|
|
2023-04-28 18:45:21 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
2021-06-27 17:52:18 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-05-26 14:38:41 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/httpclient"
|
2024-01-31 17:15:28 +03:00
|
|
|
"github.com/superseriousbusiness/httpsig"
|
2021-05-17 20:06:58 +03:00
|
|
|
)
|
|
|
|
|
2022-11-24 00:40:07 +03:00
|
|
|
// Transport implements the pub.Transport interface with some additional functionality for fetching remote media.
|
2022-03-15 17:01:19 +03:00
|
|
|
//
|
|
|
|
// Since the transport has the concept of 'shortcuts' for fetching data locally rather than remotely, it is
|
|
|
|
// not *always* the case that calling a Transport function does an http call, but it usually will for remote
|
|
|
|
// hosts or resources for which a shortcut isn't provided by the transport controller (also in this package).
|
2022-11-24 00:40:07 +03:00
|
|
|
//
|
|
|
|
// For any of the transport functions, if a Fastfail context is passed in as the first parameter, the function
|
|
|
|
// will return after the first transport failure, instead of retrying + backing off.
|
2021-05-17 20:06:58 +03:00
|
|
|
type Transport interface {
|
2022-11-24 00:40:07 +03:00
|
|
|
/*
|
|
|
|
POST functions
|
|
|
|
*/
|
|
|
|
|
2023-11-27 17:02:52 +03:00
|
|
|
// POST will perform given the http request using
|
|
|
|
// transport client, retrying on certain preset errors.
|
|
|
|
POST(*http.Request, []byte) (*http.Response, error)
|
|
|
|
|
2022-11-24 00:40:07 +03:00
|
|
|
// Deliver sends an ActivityStreams object.
|
2024-04-11 12:45:35 +03:00
|
|
|
Deliver(ctx context.Context, obj map[string]interface{}, to *url.URL) error
|
2023-03-06 12:38:43 +03:00
|
|
|
|
2022-11-24 00:40:07 +03:00
|
|
|
// BatchDeliver sends an ActivityStreams object to multiple recipients.
|
2024-04-11 12:45:35 +03:00
|
|
|
BatchDeliver(ctx context.Context, obj map[string]interface{}, recipients []*url.URL) error
|
2022-11-24 00:40:07 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
GET functions
|
|
|
|
*/
|
|
|
|
|
2023-11-27 17:02:52 +03:00
|
|
|
// GET will perform the given http request using
|
|
|
|
// transport client, retrying on certain preset errors.
|
|
|
|
GET(*http.Request) (*http.Response, error)
|
|
|
|
|
2022-11-24 00:40:07 +03:00
|
|
|
// Dereference fetches the ActivityStreams object located at this IRI with a GET request.
|
2024-02-23 18:24:40 +03:00
|
|
|
Dereference(ctx context.Context, iri *url.URL) (*http.Response, error)
|
2023-03-06 12:38:43 +03:00
|
|
|
|
2024-07-12 12:39:47 +03:00
|
|
|
// DereferenceMedia fetches the given media attachment IRI, returning the reader limited to given max.
|
|
|
|
DereferenceMedia(ctx context.Context, iri *url.URL, maxsz int64) (io.ReadCloser, error)
|
2023-03-06 12:38:43 +03:00
|
|
|
|
2021-06-27 17:52:18 +03:00
|
|
|
// DereferenceInstance dereferences remote instance information, first by checking /api/v1/instance, and then by checking /.well-known/nodeinfo.
|
2021-08-25 16:34:33 +03:00
|
|
|
DereferenceInstance(ctx context.Context, iri *url.URL) (*gtsmodel.Instance, error)
|
2023-03-06 12:38:43 +03:00
|
|
|
|
2021-05-29 20:36:54 +03:00
|
|
|
// Finger performs a webfinger request with the given username and domain, and returns the bytes from the response body.
|
2022-11-24 00:40:07 +03:00
|
|
|
Finger(ctx context.Context, targetUsername string, targetDomain string) ([]byte, error)
|
2021-05-17 20:06:58 +03:00
|
|
|
}
|
|
|
|
|
2024-04-11 12:45:35 +03:00
|
|
|
// transport implements
|
|
|
|
// the Transport interface.
|
2021-05-17 20:06:58 +03:00
|
|
|
type transport struct {
|
2022-05-15 12:16:43 +03:00
|
|
|
controller *controller
|
|
|
|
pubKeyID string
|
|
|
|
privkey crypto.PrivateKey
|
|
|
|
|
|
|
|
signerExp time.Time
|
2024-02-19 13:18:17 +03:00
|
|
|
getSigner httpsig.SignerWithOptions
|
|
|
|
postSigner httpsig.SignerWithOptions
|
2022-05-15 12:16:43 +03:00
|
|
|
signerMu sync.Mutex
|
|
|
|
}
|
|
|
|
|
2023-02-10 23:16:01 +03:00
|
|
|
func (t *transport) GET(r *http.Request) (*http.Response, error) {
|
2022-05-15 12:16:43 +03:00
|
|
|
if r.Method != http.MethodGet {
|
|
|
|
return nil, errors.New("must be GET request")
|
|
|
|
}
|
2024-04-02 14:12:26 +03:00
|
|
|
|
|
|
|
// Prepare HTTP GET signing func with opts.
|
|
|
|
sign := t.signGET(httpsig.SignatureOption{
|
|
|
|
ExcludeQueryStringFromPathPseudoHeader: false,
|
|
|
|
})
|
|
|
|
|
|
|
|
ctx := r.Context() // update with signing details.
|
2023-06-13 17:47:56 +03:00
|
|
|
ctx = gtscontext.SetOutgoingPublicKeyID(ctx, t.pubKeyID)
|
2024-04-02 14:12:26 +03:00
|
|
|
ctx = gtscontext.SetHTTPClientSignFunc(ctx, sign)
|
2023-04-28 18:45:21 +03:00
|
|
|
r = r.WithContext(ctx) // replace request ctx.
|
2024-04-02 14:12:26 +03:00
|
|
|
|
|
|
|
// Set our predefined controller user-agent.
|
2023-04-28 18:45:21 +03:00
|
|
|
r.Header.Set("User-Agent", t.controller.userAgent)
|
2024-02-19 13:18:17 +03:00
|
|
|
|
2024-04-02 14:12:26 +03:00
|
|
|
// Pass to underlying HTTP client.
|
|
|
|
resp, err := t.controller.client.Do(r)
|
2024-02-19 13:18:17 +03:00
|
|
|
if err != nil || resp.StatusCode != http.StatusUnauthorized {
|
|
|
|
return resp, err
|
|
|
|
}
|
|
|
|
|
2024-04-02 14:12:26 +03:00
|
|
|
// Ignore this response.
|
2024-02-19 13:18:17 +03:00
|
|
|
_ = resp.Body.Close()
|
2024-04-02 14:12:26 +03:00
|
|
|
|
|
|
|
// Try again without the path included in
|
|
|
|
// the HTTP signature for better compatibility.
|
|
|
|
sign = t.signGET(httpsig.SignatureOption{
|
|
|
|
ExcludeQueryStringFromPathPseudoHeader: true,
|
|
|
|
})
|
|
|
|
|
|
|
|
ctx = r.Context() // update with signing details.
|
|
|
|
ctx = gtscontext.SetHTTPClientSignFunc(ctx, sign)
|
|
|
|
r = r.WithContext(ctx) // replace request ctx.
|
|
|
|
|
|
|
|
// Pass to underlying HTTP client.
|
|
|
|
return t.controller.client.Do(r)
|
2022-05-15 12:16:43 +03:00
|
|
|
}
|
|
|
|
|
2023-02-10 23:16:01 +03:00
|
|
|
func (t *transport) POST(r *http.Request, body []byte) (*http.Response, error) {
|
2022-05-15 12:16:43 +03:00
|
|
|
if r.Method != http.MethodPost {
|
|
|
|
return nil, errors.New("must be POST request")
|
|
|
|
}
|
2024-04-02 14:12:26 +03:00
|
|
|
|
|
|
|
// Prepare POST signer.
|
|
|
|
sign := t.signPOST(body)
|
|
|
|
|
|
|
|
ctx := r.Context() // update with signing details.
|
2023-06-13 17:47:56 +03:00
|
|
|
ctx = gtscontext.SetOutgoingPublicKeyID(ctx, t.pubKeyID)
|
2024-04-02 14:12:26 +03:00
|
|
|
ctx = gtscontext.SetHTTPClientSignFunc(ctx, sign)
|
2023-04-28 18:45:21 +03:00
|
|
|
r = r.WithContext(ctx) // replace request ctx.
|
2024-04-02 14:12:26 +03:00
|
|
|
|
|
|
|
// Set our predefined controller user-agent.
|
2022-11-26 23:19:42 +03:00
|
|
|
r.Header.Set("User-Agent", t.controller.userAgent)
|
2024-04-02 14:12:26 +03:00
|
|
|
|
|
|
|
// Pass to underlying HTTP client.
|
|
|
|
return t.controller.client.Do(r)
|
2022-05-15 12:16:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// signGET will safely sign an HTTP GET request.
|
2024-02-19 13:18:17 +03:00
|
|
|
func (t *transport) signGET(opts httpsig.SignatureOption) httpclient.SignFunc {
|
2023-04-28 18:45:21 +03:00
|
|
|
return func(r *http.Request) (err error) {
|
|
|
|
t.safesign(func() {
|
2024-02-19 13:18:17 +03:00
|
|
|
err = t.getSigner.SignRequestWithOptions(t.privkey, t.pubKeyID, r, nil, opts)
|
2023-04-28 18:45:21 +03:00
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
2022-05-15 12:16:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// signPOST will safely sign an HTTP POST request for given body.
|
2023-04-28 18:45:21 +03:00
|
|
|
func (t *transport) signPOST(body []byte) httpclient.SignFunc {
|
|
|
|
return func(r *http.Request) (err error) {
|
|
|
|
t.safesign(func() {
|
|
|
|
err = t.postSigner.SignRequest(t.privkey, t.pubKeyID, r, body)
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
2022-05-15 12:16:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// safesign will perform sign function within mutex protection,
|
|
|
|
// and ensured that httpsig.Signers are up-to-date.
|
|
|
|
func (t *transport) safesign(sign func()) {
|
|
|
|
// Perform within mu safety
|
|
|
|
t.signerMu.Lock()
|
|
|
|
defer t.signerMu.Unlock()
|
|
|
|
|
|
|
|
if now := time.Now(); now.After(t.signerExp) {
|
|
|
|
const expiry = 120
|
|
|
|
|
|
|
|
// Signers have expired and require renewal
|
|
|
|
t.getSigner, _ = NewGETSigner(expiry)
|
|
|
|
t.postSigner, _ = NewPOSTSigner(expiry)
|
|
|
|
t.signerExp = now.Add(time.Second * expiry)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Perform signing
|
|
|
|
sign()
|
2022-03-15 17:01:19 +03:00
|
|
|
}
|