enigma-bbs/core/activitypub/actor.js

266 lines
8.2 KiB
JavaScript
Raw Normal View History

/* jslint node: true */
'use strict';
// ENiGMA½
const { Errors } = require('../enig_error.js');
const UserProps = require('../user_property');
2023-01-08 20:42:52 +00:00
const {
2023-01-25 01:16:14 +00:00
ActivityStreamsContext,
2023-01-08 20:42:52 +00:00
webFingerProfileUrl,
makeUserUrl,
selfUrl,
isValidLink,
2023-01-22 20:51:32 +00:00
makeSharedInboxUrl,
userNameFromSubject,
2023-01-25 01:16:14 +00:00
} = require('./util');
const Log = require('../logger').log;
const { queryWebFinger } = require('../webfinger');
const EnigAssert = require('../enigma_assert');
const ActivityPubSettings = require('./settings');
2023-01-21 08:19:19 +00:00
const ActivityPubObject = require('./object');
const apDb = require('../database').dbs.activitypub;
// deps
const _ = require('lodash');
const mimeTypes = require('mime-types');
2023-01-21 05:15:59 +00:00
const { getJson } = require('../http_util.js');
const { getISOTimestampString } = require('../database.js');
const moment = require('moment');
const ActorCacheTTL = moment.duration(1, 'day');
// https://www.w3.org/TR/activitypub/#actor-objects
2023-01-21 08:19:19 +00:00
module.exports = class Actor extends ActivityPubObject {
constructor(obj) {
2023-01-21 08:19:19 +00:00
super(obj);
}
isValid() {
2023-01-21 08:19:19 +00:00
if (!super.isValid()) {
return false;
}
2023-01-22 01:51:54 +00:00
if (!Actor.WellKnownActorTypes.includes(this.type)) {
return false;
}
2023-01-22 01:51:54 +00:00
const linksValid = Actor.WellKnownLinkTypes.every(l => {
// must be valid if present & non-empty
2023-01-21 08:19:19 +00:00
if (this[l] && !isValidLink(this[l])) {
return false;
}
return true;
});
2023-01-21 08:19:19 +00:00
if (!linksValid) {
return false;
}
return true;
}
2023-01-22 01:51:54 +00:00
static get WellKnownActorTypes() {
return ['Person', 'Group', 'Organization', 'Service', 'Application'];
}
static get WellKnownLinkTypes() {
return ['inbox', 'outbox', 'following', 'followers'];
}
2023-01-08 20:42:52 +00:00
static fromLocalUser(user, webServer, cb) {
const userSelfUrl = selfUrl(webServer, user);
const userSettings = ActivityPubSettings.fromUser(user);
const addImage = (o, t) => {
const url = userSettings[t];
if (url) {
const mt = mimeTypes.contentType(url);
if (mt) {
o[t] = {
mediaType: mt,
type: 'Image',
url,
};
}
}
};
2023-01-08 20:42:52 +00:00
const obj = {
'@context': [
ActivityStreamsContext,
2023-01-08 20:42:52 +00:00
'https://w3id.org/security/v1', // :TODO: add support
],
id: userSelfUrl,
type: 'Person',
preferredUsername: user.username,
2023-01-22 20:51:32 +00:00
name: userSettings.showRealName
? user.getSanitizedName('real')
: user.username,
2023-01-08 20:42:52 +00:00
endpoints: {
2023-01-22 20:51:32 +00:00
sharedInbox: makeSharedInboxUrl(webServer),
2023-01-08 20:42:52 +00:00
},
inbox: makeUserUrl(webServer, user, '/ap/users/') + '/inbox',
outbox: makeUserUrl(webServer, user, '/ap/users/') + '/outbox',
followers: makeUserUrl(webServer, user, '/ap/users/') + '/followers',
following: makeUserUrl(webServer, user, '/ap/users/') + '/following',
summary: user.getProperty(UserProps.AutoSignature) || '',
url: webFingerProfileUrl(webServer, user),
manuallyApprovesFollowers: userSettings.manuallyApprovesFollowers,
discoverable: userSettings.discoverable,
2023-01-08 20:42:52 +00:00
// :TODO: we can start to define BBS related stuff with the community perhaps
// attachment: [
// {
// name: 'SomeNetwork Address',
// type: 'PropertyValue',
// value: 'Mateo@21:1/121',
// },
// ],
};
addImage(obj, 'icon');
addImage(obj, 'image');
const publicKeyPem = user.getProperty(UserProps.PublicActivityPubSigningKey);
2023-01-08 20:42:52 +00:00
if (!_.isEmpty(publicKeyPem)) {
obj.publicKey = {
id: userSelfUrl + '#main-key',
owner: userSelfUrl,
publicKeyPem,
};
EnigAssert(
!_.isEmpty(user.getProperty(UserProps.PrivateActivityPubSigningKey)),
'User has public key but no private key!'
);
2023-01-08 20:42:52 +00:00
} else {
Log.warn(
{ username: user.username },
`No public key (${UserProps.PublicActivityPubSigningKey}) for user "${user.username}"`
2023-01-08 20:42:52 +00:00
);
}
return cb(null, new Actor(obj));
}
2023-01-08 20:26:52 +00:00
static fromId(id, cb) {
Actor._fromCache(id, (err, actor, subject) => {
if (!err) {
// cache hit
return cb(null, actor, subject);
}
// cache miss: attempt to fetch & populate
Actor._fromWebFinger(id, (err, actor, subject) => {
if (subject) {
subject = `@${userNameFromSubject(subject)}`; // e.g. @Username@host.com
} else {
subject = actor.id; // best we can do for now
}
// deliver result to caller
cb(err, actor, subject);
// cache our entry
if (actor) {
apDb.run(
`REPLACE INTO actor_cache (actor_id, actor_json, subject, timestamp)
VALUES (?, ?, ?, ?);`,
[id, JSON.stringify(actor), subject, getISOTimestampString()],
err => {
if (err) {
// :TODO: log me
}
}
);
}
});
});
}
static _fromRemoteQuery(id, cb) {
const headers = {
Accept: 'application/activity+json',
};
getJson(id, { headers }, (err, actor) => {
2023-01-21 05:15:59 +00:00
if (err) {
return cb(err);
}
2023-01-21 05:15:59 +00:00
actor = new Actor(actor);
2023-01-21 05:15:59 +00:00
if (!actor.isValid()) {
return cb(Errors.Invalid('Invalid Actor'));
}
2023-01-21 05:15:59 +00:00
return cb(null, actor);
});
}
static _fromCache(id, cb) {
apDb.get(
`SELECT actor_json, subject, timestamp
FROM actor_cache
WHERE actor_id = ? OR subject = ?
LIMIT 1;`,
[id, id],
(err, row) => {
if (err) {
return cb(err);
}
if (!row) {
return cb(Errors.DoesNotExist());
}
const timestamp = moment(row.timestamp);
if (moment().isAfter(timestamp.add(ActorCacheTTL))) {
return cb(Errors.Expired('The cache entry is expired'));
}
const obj = ActivityPubObject.fromJsonString(row.actor_json);
if (!obj || !obj.isValid()) {
return cb(Errors.Invalid('Failed to create ActivityPub object'));
}
const actor = new Actor(obj);
if (!actor.isValid()) {
return cb(Errors.Invalid('Failed to create Actor object'));
}
const subject = row.subject || actor.id;
return cb(null, actor, subject);
}
);
}
static _fromWebFinger(actorQuery, cb) {
queryWebFinger(actorQuery, (err, res) => {
if (err) {
return cb(err);
}
// we need a link with 'application/activity+json'
const links = res.links;
if (!Array.isArray(links)) {
return cb(Errors.DoesNotExist('No "links" object in WebFinger response'));
}
const activityLink = links.find(l => {
return l.type === 'application/activity+json' && l.href?.length > 0;
});
if (!activityLink) {
return cb(
Errors.DoesNotExist('No Activity link found in WebFinger response')
);
}
// we can now query the href value for an Actor
return Actor._fromRemoteQuery(activityLink.href, (err, actor) => {
return cb(err, actor, res.subject);
});
});
}
};