浏览代码

Add ap helpers

Daniel Supernault 6 年之前
父节点
当前提交
7a0375e07a
共有 1 个文件被更改,包括 411 次插入0 次删除
  1. 411 0
      app/Util/ActivityPub/Helpers.php

+ 411 - 0
app/Util/ActivityPub/Helpers.php

@@ -0,0 +1,411 @@
+<?php
+
+namespace App\Util\ActivityPub;
+
+use Cache, Purify, Storage, Request, Validator;
+use App\{
+    Activity,
+    Follower,
+    Like,
+    Notification,
+    Profile,
+    Status
+};
+use Zttp\Zttp;
+use Carbon\Carbon;
+use GuzzleHttp\Client;
+use Illuminate\Http\File;
+use Illuminate\Validation\Rule;
+use App\Jobs\AvatarPipeline\CreateAvatar;
+use App\Jobs\RemoteFollowPipeline\RemoteFollowImportRecent;
+use App\Jobs\ImageOptimizePipeline\{ImageOptimize,ImageThumbnail};
+use App\Jobs\StatusPipeline\NewStatusPipeline;
+use HttpSignatures\{GuzzleHttpSignatures, KeyStore, Context, Verifier};
+use Symfony\Bridge\PsrHttpMessage\Factory\DiactorosFactory;
+
+class Helpers {
+
+	public static function validateObject($data)
+	{
+		// todo: undo
+		$verbs = ['Create', 'Announce', 'Like', 'Follow', 'Delete', 'Accept', 'Reject'];
+
+		$valid = Validator::make($data, [
+			'type' => [
+				'required',
+				Rule::in($verbs)
+			],
+			'id' => 'required|string',
+			'actor' => 'required|string',
+			'object' => 'required',
+			'object.type' => 'required_if:type,Create',
+			'object.attachment' => 'required_if:type,Create',
+			'object.attributedTo' => 'required_if:type,Create',
+			'published' => 'required_if:type,Create|date'
+		])->passes();
+
+		return $valid;
+	}
+
+	public static function verifyAttachments($data)
+	{
+		if(!isset($data['object']) || empty($data['object'])) {
+			$data = ['object'=>$data];
+		}
+
+		$activity = $data['object'];
+
+        $mediaTypes = ['Document', 'Image', 'Video'];
+        $mimeTypes = ['image/jpeg', 'image/png', 'video/mp4'];
+
+        if(!isset($activity['attachment']) || empty($activity['attachment'])) {
+            return false;
+        }
+
+        $attachment = $activity['attachment'];
+        $valid = Validator::make($attachment, [
+            '*.type' => [
+            	'required',
+            	'string',
+            	Rule::in($mediaTypes)
+            ],
+            '*.url' => 'required|max:255',
+            '*.mediaType'  => [
+            	'required',
+            	'string',
+            	Rule::in($mimeTypes)
+            ],
+            '*.name' => 'nullable|string|max:255'
+        ])->passes();
+
+        return $valid;
+	}
+
+	public static function normalizeAudience($data, $localOnly = true)
+	{
+		if(!isset($data['to'])) {
+			return;
+		}
+		
+		$audience = [];
+		$audience['to'] = [];
+		$audience['cc'] = [];
+		$scope = 'private';
+
+		if(is_array($data['to']) && !empty($data['to'])) {
+			foreach ($data['to'] as $to) {
+				if($to == 'https://www.w3.org/ns/activitystreams#Public') {
+					$scope = 'public';
+					continue;
+				}
+				$url = $localOnly ? self::validateLocalUrl($to) : self::validateUrl($to);
+				if($url != false) {
+					array_push($audience['to'], $url);
+				}
+			}
+		}
+
+		if(is_array($data['cc']) && !empty($data['cc'])) {
+			foreach ($data['cc'] as $cc) {
+				if($cc == 'https://www.w3.org/ns/activitystreams#Public') {
+					$scope = 'unlisted';
+					continue;
+				}
+				$url = $localOnly ? self::validateLocalUrl($cc) : self::validateUrl($cc);
+				if($url != false) {
+					array_push($audience['cc'], $url);
+				}
+			}
+		}
+		$audience['scope'] = $scope;
+		return $audience;
+	}
+
+	public static function userInAudience($profile, $data)
+	{
+		$audience = self::normalizeAudience($data);
+		$url = $profile->permalink();
+		return in_array($url, $audience);
+	}
+
+	public static function validateUrl($url)
+	{
+		$localhosts = [
+	      '127.0.0.1', 'localhost', '::1'
+	    ];
+
+	    $valid = filter_var($url, FILTER_VALIDATE_URL, FILTER_FLAG_SCHEME_REQUIRED|FILTER_FLAG_HOST_REQUIRED);
+
+	    if(in_array(parse_url($valid, PHP_URL_HOST), $localhosts)) {
+	    	return false;
+	    }
+
+	    return $valid;
+	}
+
+	public static function validateLocalUrl($url)
+	{
+		$url = self::validateUrl($url);
+		if($url) {
+			$domain = config('pixelfed.domain.app');
+			$host = parse_url($url, PHP_URL_HOST);
+			$url = $domain === $host ? $url : false;
+			return $url;
+		}
+		return false;
+	}
+
+	public static function zttpUserAgent()
+	{
+		return [
+          'Accept'     => 'application/ld+json; profile="https://www.w3.org/ns/activitystreams"',
+          'User-Agent' => 'PixelFedBot - https://pixelfed.org',
+        ];
+	}
+
+	public static function fetchFromUrl($url)
+	{
+        $res = Zttp::withHeaders(self::zttpUserAgent())->get($url);
+        $res = json_decode($res->body(), true, 8);
+        if(json_last_error() == JSON_ERROR_NONE) {
+        	return $res;
+        } else {
+        	return false;
+        }
+	}
+
+	public static function fetchProfileFromUrl($url)
+	{
+		return self::fetchFromUrl($url);
+	}
+
+	public static function statusFirstOrFetch($url, $replyTo = true)
+	{
+		$url = self::validateUrl($url);
+		if($url == false) {
+			return;
+		}
+
+		$host = parse_url($url, PHP_URL_HOST);
+		$local = config('pixelfed.domain.app') == $host ? true : false;
+
+		if($local) {
+			$id = (int) last(explode('/', $url));
+			return Status::findOrFail($id);
+		} else {
+			$cached = Status::whereUrl($url)->first();
+			if($cached) {
+				return $cached;
+			}
+			$res = self::fetchFromUrl($url);
+			if(!$res || empty($res)) {
+				return;
+			}
+
+			if(isset($res['object'])) {
+				$activity = $res;
+			} else {
+				$activity = ['object' => $res];
+			}
+
+			$profile = self::profileFirstOrNew($activity['object']['attributedTo']);
+			if(isset($activity['object']['inReplyTo']) && !empty($activity['object']['inReplyTo']) && $replyTo == true) {
+				$reply_to = self::statusFirstOrFetch($activity['object']['inReplyTo'], false);
+				$reply_to = $reply_to->id;
+			} else {
+				$reply_to = null;
+			}
+
+			$status = new Status;
+			$status->profile_id = $profile->id;
+			$status->url = $url;
+			$status->caption = strip_tags($res['content']);
+			$status->rendered = Purify::clean($res['content']);
+			$status->created_at = Carbon::parse($res['published']);
+			$status->in_reply_to_id = $reply_to;
+			$status->local = false;
+			$status->save();
+
+			self::importNoteAttachment($res, $status);
+
+			return $status;
+		}
+	}
+
+	public static function importNoteAttachment($data, Status $status)
+	{
+		if(self::verifyAttachments($data) == false) {
+			return;
+		}
+		$attachments = isset($data['object']) ? $data['object']['attachment'] : $data['attachment'];
+		$user = $status->profile;
+		$monthHash = hash('sha1', date('Y').date('m'));
+		$userHash = hash('sha1', $user->id.(string) $user->created_at);
+        $storagePath = "public/m/{$monthHash}/{$userHash}";
+        $allowed = explode(',', config('pixelfed.media_types'));
+		foreach($attachments as $media) {
+			$type = $media['mediaType'];
+			$url = $media['url'];
+			$valid = self::validateUrl($url);
+			if(in_array($type, $allowed) == false || $valid == false) {
+				continue;
+			}
+            $info = pathinfo($url);
+
+            // pleroma attachment fix
+            $url = str_replace(' ', '%20', $url);
+
+            $img = file_get_contents($url, false, stream_context_create(['ssl' => ["verify_peer"=>false,"verify_peer_name"=>false]]));
+            $file = '/tmp/'.str_random(16).$info['basename'];
+            file_put_contents($file, $img);
+            $fdata = new File($file);
+            $path = Storage::putFile($storagePath, $fdata, 'public');
+            $media = new Media();
+            $media->status_id = $status->id;
+            $media->profile_id = $status->profile_id;
+            $media->user_id = null;
+            $media->media_path = $path;
+            $media->size = $fdata->getSize();
+            $media->mime = $fdata->getMimeType();
+            $media->save();
+
+            ImageThumbnail::dispatch($media);
+            ImageOptimize::dispatch($media);
+            unlink($file);
+		}
+		return;
+	}
+
+	public static function profileFirstOrNew($url, $runJobs = false)
+	{
+ 		$res = self::fetchProfileFromUrl($url);
+ 		$domain = parse_url($res['url'], PHP_URL_HOST);
+        $username = $res['preferredUsername'];
+        $remoteUsername = "@{$username}@{$domain}";
+
+		$profile = Profile::whereRemoteUrl($res['url'])->first();
+		if(!$profile) {
+	        $profile = new Profile;
+	        $profile->domain = $domain;
+	        $profile->username = $remoteUsername;
+	        $profile->name = strip_tags($res['name']);
+	        $profile->bio = Purify::clean($res['summary']);
+	        $profile->sharedInbox = isset($res['endpoints']) && isset($res['endpoints']['sharedInbox']) ? $res['endpoints']['sharedInbox'] : null;
+	        $profile->inbox_url = $res['inbox'];
+	        $profile->outbox_url = $res['outbox'];
+	        $profile->remote_url = $res['url'];
+	        $profile->public_key = $res['publicKey']['publicKeyPem'];
+	        $profile->key_id = $res['publicKey']['id'];
+	        $profile->save();
+	        if($runJobs == true) {
+				RemoteFollowImportRecent::dispatch($res, $profile);
+				CreateAvatar::dispatch($profile);
+	        }
+		}
+		return $profile;
+	}
+
+    public static function sendSignedObject($senderProfile, $url, $body)
+    {
+        $profile = $senderProfile;
+        $keyId = $profile->keyId();
+        $privateKey = openssl_pkey_get_private($profile->private_key);
+
+
+        $date = date('D, d M Y h:i:s').' GMT';
+        $host = parse_url($url, PHP_URL_HOST);
+        $headers = [
+        	'(request-target)' => 'post '.parse_url($url, PHP_URL_PATH),
+            'Date'         => $date,
+            'Host'		   => $host,
+            'Content-Type' => 'application/activity+json',
+        ];
+        if($body) {
+        	$payload = is_string($body) ? $body : json_encode($body);
+        	$digest = base64_encode(hash('sha256', $payload, true));
+        	$headers['Digest'] = 'SHA-256=' . $digest;
+        }
+        $stringToSign = self::_headersToSigningString($headers);
+        $signedHeaders = implode(' ', array_map('strtolower', array_keys($headers)));
+		openssl_sign($stringToSign, $signature, $privateKey, OPENSSL_ALGO_SHA256);
+    	openssl_free_key($privateKey);
+	    $signature = base64_encode($signature);
+    	$signatureHeader = 'keyId="'.$keyId.'",headers="'.$signedHeaders.'",algorithm="rsa-sha256",signature="'.$signature.'"';
+    	unset($headers['(request-target)']);
+    	$headers['Signature'] = $signatureHeader;
+    	Zttp::withHeaders($headers)->post($url, $body);
+        return;
+    }
+
+    private static function _headersToSigningString($headers) {
+    	return implode("\n", array_map(function($k, $v){
+    		return strtolower($k).': '.$v;
+    	}, array_keys($headers), $headers));
+    }
+
+    public static function validateSignature($request, $payload = null)
+    {
+        $date = Carbon::parse($request['date']);
+        $min = Carbon::now()->subHours(13);
+        $max = Carbon::now()->addHours(13);
+
+        if($date->gt($min) == false || $date->lt($max) == false) {
+        	return false;
+        }
+        $json = json_encode($payload);
+        $digest = base64_encode(hash('sha256', $json, true));
+	    $parts = explode(',', $request['signature']);
+	    $signatureData = [];
+	    foreach($parts as $part) {
+	      if(preg_match('/(.+)="(.+)"/', $part, $match)) {
+	        $signatureData[$match[1]] = $match[2];
+	      }
+	    }
+
+        $actor = $payload['actor'];
+        $profile = self::profileFirstOrNew($actor, true);
+        if(!$profile) {
+        	return false;
+        }
+        $publicKey = $profile->public_key;
+	    $path = $request['path'];
+	    $host = $request['host'];
+        $signingString = "(request-target): post {$path}".PHP_EOL.
+        "host: {$host}".PHP_EOL.
+        "date: {$request['date']}".PHP_EOL.
+        "digest: {$request['digest']}".PHP_EOL.
+        "content-type: {$request['contentType']}";
+		$verified = openssl_verify($signingString, base64_decode($signatureData['signature']), $publicKey, OPENSSL_ALGO_SHA256);
+		return (bool) $verified;
+    }
+
+    public static function fetchPublicKey()
+    {
+        $profile = $this->profile;
+        $is_url = $this->is_url;
+        $valid = $this->validateUrl();
+        if (!$valid) {
+            throw new \Exception('Invalid URL provided');
+        }
+        if ($is_url && isset($profile->public_key) && $profile->public_key) {
+            return $profile->public_key;
+        }
+
+        try {
+            $url = $this->profile;
+            $res = Zttp::timeout(30)->withHeaders([
+              'Accept'     => 'application/ld+json; profile="https://www.w3.org/ns/activitystreams"',
+              'User-Agent' => 'PixelFedBot v0.1 - https://pixelfed.org',
+            ])->get($url);
+            $actor = json_decode($res->getBody(), true);
+        } catch (Exception $e) {
+            throw new Exception('Unable to fetch public key');
+        }
+        if($actor['publicKey']['owner'] != $profile) {
+            throw new Exception('Invalid key match');
+        }
+        $this->public_key = $actor['publicKey']['publicKeyPem'];
+        $this->key_id = $actor['publicKey']['id'];
+        return $this;
+    }
+}