1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.Salmon do
6 @behaviour Pleroma.Web.Federator.Publisher
8 @httpoison Application.get_env(:pleroma, :httpoison)
12 alias Pleroma.Activity
13 alias Pleroma.Instances
15 alias Pleroma.Web.ActivityPub.Visibility
16 alias Pleroma.Web.Federator.Publisher
17 alias Pleroma.Web.OStatus
18 alias Pleroma.Web.OStatus.ActivityRepresenter
24 doc = XML.parse_document(salmon)
26 {:xmlObj, :string, data} = :xmerl_xpath.string('string(//me:data[1])', doc)
27 {:xmlObj, :string, sig} = :xmerl_xpath.string('string(//me:sig[1])', doc)
28 {:xmlObj, :string, alg} = :xmerl_xpath.string('string(//me:alg[1])', doc)
29 {:xmlObj, :string, encoding} = :xmerl_xpath.string('string(//me:encoding[1])', doc)
30 {:xmlObj, :string, type} = :xmerl_xpath.string('string(//me:data[1]/@type)', doc)
32 {:ok, data} = Base.url_decode64(to_string(data), ignore: :whitespace)
33 {:ok, sig} = Base.url_decode64(to_string(sig), ignore: :whitespace)
35 encoding = to_string(encoding)
36 type = to_string(type)
38 [data, type, encoding, alg, sig]
41 def fetch_magic_key(salmon) do
42 with [data, _, _, _, _] <- decode(salmon),
43 doc <- XML.parse_document(data),
44 uri when not is_nil(uri) <- XML.string_from_xpath("/entry/author[1]/uri", doc),
45 {:ok, public_key} <- User.get_public_key_for_ap_id(uri),
46 magic_key <- encode_key(public_key) do
51 def decode_and_validate(magickey, salmon) do
52 [data, type, encoding, alg, sig] = decode(salmon)
55 [data, type, encoding, alg]
56 |> Enum.map(&Base.url_encode64/1)
59 key = decode_key(magickey)
61 verify = :public_key.verify(signed_text, :sha256, sig, key)
70 def decode_key("RSA." <> magickey) do
71 make_integer = fn bin ->
72 list = :erlang.binary_to_list(bin)
73 Enum.reduce(list, 0, fn el, acc -> acc <<< 8 ||| el end)
79 |> Enum.map(fn n -> Base.url_decode64!(n, padding: false) end)
80 |> Enum.map(make_integer)
82 {:RSAPublicKey, modulus, exponent}
85 def encode_key({:RSAPublicKey, modulus, exponent}) do
86 modulus_enc = :binary.encode_unsigned(modulus) |> Base.url_encode64()
87 exponent_enc = :binary.encode_unsigned(exponent) |> Base.url_encode64()
89 "RSA.#{modulus_enc}.#{exponent_enc}"
92 # Native generation of RSA keys is only available since OTP 20+ and in default build conditions
93 # We try at compile time to generate natively an RSA key otherwise we fallback on the old way.
95 _ = :public_key.generate_key({:rsa, 2048, 65_537})
97 def generate_rsa_pem do
98 key = :public_key.generate_key({:rsa, 2048, 65_537})
99 entry = :public_key.pem_entry_encode(:RSAPrivateKey, key)
100 pem = :public_key.pem_encode([entry]) |> String.trim_trailing()
105 def generate_rsa_pem do
106 port = Port.open({:spawn, "openssl genrsa"}, [:binary])
110 {^port, {:data, pem}} -> {:ok, pem}
115 if Regex.match?(~r/RSA PRIVATE KEY/, pem) do
123 def keys_from_pem(pem) do
124 [private_key_code] = :public_key.pem_decode(pem)
125 private_key = :public_key.pem_entry_decode(private_key_code)
126 {:RSAPrivateKey, _, modulus, exponent, _, _, _, _, _, _, _} = private_key
127 public_key = {:RSAPublicKey, modulus, exponent}
128 {:ok, private_key, public_key}
131 def encode(private_key, doc) do
132 type = "application/atom+xml"
133 encoding = "base64url"
137 [doc, type, encoding, alg]
138 |> Enum.map(&Base.url_encode64/1)
143 |> :public_key.sign(:sha256, private_key)
145 |> Base.url_encode64()
149 |> Base.url_encode64()
151 # Don't need proper xml building, these strings are safe to leave unescaped
153 <?xml version="1.0" encoding="UTF-8"?>
154 <me:env xmlns:me="http://salmon-protocol.org/ns/magic-env">
155 <me:data type="application/atom+xml">#{doc_base64}</me:data>
156 <me:encoding>#{encoding}</me:encoding>
157 <me:alg>#{alg}</me:alg>
158 <me:sig>#{signature}</me:sig>
165 def remote_users(%{data: %{"to" => to} = data}) do
166 to = to ++ (data["cc"] || [])
169 |> Enum.map(fn id -> User.get_cached_by_ap_id(id) end)
170 |> Enum.filter(fn user -> user && !user.local end)
173 @doc "Pushes an activity to remote account."
174 def publish_one(%{recipient: %{info: %{salmon: salmon}}} = params),
175 do: publish_one(Map.put(params, :recipient, salmon))
177 def publish_one(%{recipient: url, feed: feed} = params) when is_binary(url) do
178 with {:ok, %{status: code}} when code in 200..299 <-
182 [{"Content-Type", "application/magic-envelope+xml"}]
184 if !Map.has_key?(params, :unreachable_since) || params[:unreachable_since],
185 do: Instances.set_reachable(url)
187 Logger.debug(fn -> "Pushed to #{url}, code #{code}" end)
191 unless params[:unreachable_since], do: Instances.set_reachable(url)
192 Logger.debug(fn -> "Pushing Salmon to #{url} failed, #{inspect(e)}" end)
193 {:error, "Unreachable instance"}
197 def publish_one(_), do: :noop
199 @supported_activities [
208 def is_representable?(%Activity{data: %{"type" => type}} = activity)
209 when type in @supported_activities,
210 do: Visibility.is_public?(activity)
212 def is_representable?(_), do: false
215 Publishes an activity to remote accounts
217 @spec publish(User.t(), Pleroma.Activity.t()) :: none
218 def publish(user, activity)
220 def publish(%{info: %{keys: keys}} = user, %{data: %{"type" => type}} = activity)
221 when type in @supported_activities do
222 feed = ActivityRepresenter.to_simple_form(activity, user, true)
226 ActivityRepresenter.wrap_with_entry(feed)
227 |> :xmerl.export_simple(:xmerl_xml)
230 {:ok, private, _} = keys_from_pem(keys)
231 {:ok, feed} = encode(private, feed)
233 remote_users = remote_users(activity)
235 salmon_urls = Enum.map(remote_users, & &1.info.salmon)
236 reachable_urls_metadata = Instances.filter_reachable(salmon_urls)
237 reachable_urls = Map.keys(reachable_urls_metadata)
240 |> Enum.filter(&(&1.info.salmon in reachable_urls))
241 |> Enum.each(fn remote_user ->
242 Logger.debug(fn -> "Sending Salmon to #{remote_user.ap_id}" end)
244 Publisher.enqueue_one(__MODULE__, %{
245 recipient: remote_user,
247 unreachable_since: reachable_urls_metadata[remote_user.info.salmon]
253 def publish(%{id: id}, _), do: Logger.debug(fn -> "Keys missing for user #{id}" end)
255 def gather_webfinger_links(%User{} = user) do
256 {:ok, _private, public} = keys_from_pem(user.info.keys)
257 magic_key = encode_key(public)
260 %{"rel" => "salmon", "href" => OStatus.salmon_path(user)},
262 "rel" => "magic-public-key",
263 "href" => "data:application/magic-public-key,#{magic_key}"
268 def gather_nodeinfo_protocol_names, do: []