2019-03-07 15:07:21 +01:00
|
|
|
import * as Bull from 'bull';
|
2019-02-01 11:59:12 +01:00
|
|
|
import * as httpSignature from 'http-signature';
|
2019-04-07 14:50:36 +02:00
|
|
|
import { IRemoteUser } from '../../models/entities/user';
|
2019-03-07 15:07:21 +01:00
|
|
|
import perform from '../../remote/activitypub/perform';
|
|
|
|
import { resolvePerson, updatePerson } from '../../remote/activitypub/models/person';
|
2018-08-30 13:53:41 +02:00
|
|
|
import { URL } from 'url';
|
2019-03-07 15:07:21 +01:00
|
|
|
import { publishApLogStream } from '../../services/stream';
|
|
|
|
import Logger from '../../services/logger';
|
|
|
|
import { registerOrFetchInstanceDoc } from '../../services/register-or-fetch-instance-doc';
|
2019-04-07 14:50:36 +02:00
|
|
|
import { Instances, Users, UserPublickeys } from '../../models';
|
|
|
|
import { instanceChart } from '../../services/chart';
|
|
|
|
import { UserPublickey } from '../../models/entities/user-publickey';
|
2019-04-24 01:11:19 +02:00
|
|
|
import { fetchMeta } from '../../misc/fetch-meta';
|
2019-04-17 17:56:10 +02:00
|
|
|
import { toPuny } from '../../misc/convert-host';
|
2019-04-10 20:09:12 +02:00
|
|
|
import { validActor } from '../../remote/activitypub/type';
|
2019-04-12 18:43:22 +02:00
|
|
|
import { ensure } from '../../prelude/ensure';
|
2018-04-04 16:12:35 +02:00
|
|
|
|
2019-02-03 10:16:57 +01:00
|
|
|
const logger = new Logger('inbox');
|
2018-04-06 15:40:06 +02:00
|
|
|
|
2018-04-04 16:12:35 +02:00
|
|
|
// ユーザーのinboxにアクティビティが届いた時の処理
|
2019-03-07 21:22:14 +01:00
|
|
|
export default async (job: Bull.Job): Promise<void> => {
|
2018-04-04 16:12:35 +02:00
|
|
|
const signature = job.data.signature;
|
|
|
|
const activity = job.data.activity;
|
|
|
|
|
2018-04-06 15:40:06 +02:00
|
|
|
//#region Log
|
|
|
|
const info = Object.assign({}, activity);
|
|
|
|
delete info['@context'];
|
|
|
|
delete info['signature'];
|
2019-02-05 06:04:40 +01:00
|
|
|
logger.debug(JSON.stringify(info, null, 2));
|
2018-04-06 15:40:06 +02:00
|
|
|
//#endregion
|
|
|
|
|
2018-04-04 16:12:35 +02:00
|
|
|
const keyIdLower = signature.keyId.toLowerCase();
|
2018-06-18 07:28:43 +02:00
|
|
|
let user: IRemoteUser;
|
2019-04-07 14:50:36 +02:00
|
|
|
let key: UserPublickey;
|
2018-04-04 16:12:35 +02:00
|
|
|
|
|
|
|
if (keyIdLower.startsWith('acct:')) {
|
2019-04-17 17:53:00 +02:00
|
|
|
logger.warn(`Old keyId is no longer supported. ${keyIdLower}`);
|
|
|
|
return;
|
2019-04-17 17:57:06 +02:00
|
|
|
}
|
2018-08-30 13:53:41 +02:00
|
|
|
|
2019-04-17 17:57:06 +02:00
|
|
|
// アクティビティ内のホストの検証
|
|
|
|
const host = toPuny(new URL(signature.keyId).hostname);
|
|
|
|
try {
|
|
|
|
ValidateActivity(activity, host);
|
|
|
|
} catch (e) {
|
|
|
|
logger.warn(e.message);
|
|
|
|
return;
|
|
|
|
}
|
2019-02-07 20:26:43 +01:00
|
|
|
|
2019-04-17 17:57:06 +02:00
|
|
|
// ブロックしてたら中断
|
|
|
|
const meta = await fetchMeta();
|
|
|
|
if (meta.blockedHosts.includes(host)) {
|
|
|
|
logger.info(`Blocked request: ${host}`);
|
|
|
|
return;
|
|
|
|
}
|
2019-04-17 17:53:00 +02:00
|
|
|
|
2019-04-17 17:57:06 +02:00
|
|
|
const _key = await UserPublickeys.findOne({
|
|
|
|
keyId: signature.keyId
|
|
|
|
});
|
2019-04-07 14:50:36 +02:00
|
|
|
|
2019-04-17 17:57:06 +02:00
|
|
|
if (_key) {
|
|
|
|
// 登録済みユーザー
|
|
|
|
user = await Users.findOne(_key.userId) as IRemoteUser;
|
|
|
|
key = _key;
|
|
|
|
} else {
|
|
|
|
// 未登録ユーザーの場合はリモート解決
|
|
|
|
user = await resolvePerson(activity.actor) as IRemoteUser;
|
|
|
|
if (user == null) {
|
|
|
|
throw new Error('failed to resolve user');
|
2019-04-17 17:53:00 +02:00
|
|
|
}
|
2019-04-17 17:57:06 +02:00
|
|
|
|
|
|
|
key = await UserPublickeys.findOne(user.id).then(ensure);
|
2018-09-01 10:53:38 +02:00
|
|
|
}
|
2018-04-04 16:12:35 +02:00
|
|
|
|
2019-03-07 13:19:32 +01:00
|
|
|
// Update Person activityの場合は、ここで署名検証/更新処理まで実施して終了
|
2018-09-01 10:53:38 +02:00
|
|
|
if (activity.type === 'Update') {
|
2019-04-10 20:09:12 +02:00
|
|
|
if (activity.object && validActor.includes(activity.object.type)) {
|
2019-04-17 17:53:00 +02:00
|
|
|
if (!httpSignature.verifySignature(signature, key.keyPem)) {
|
2019-02-03 10:16:57 +01:00
|
|
|
logger.warn('Update activity received, but signature verification failed.');
|
2018-09-01 10:53:38 +02:00
|
|
|
} else {
|
|
|
|
updatePerson(activity.actor, null, activity.object);
|
|
|
|
}
|
2019-03-07 13:19:32 +01:00
|
|
|
return;
|
2018-04-04 16:12:35 +02:00
|
|
|
}
|
2018-09-01 10:53:38 +02:00
|
|
|
}
|
|
|
|
|
2019-04-07 14:50:36 +02:00
|
|
|
if (!httpSignature.verifySignature(signature, key.keyPem)) {
|
2019-02-03 10:16:57 +01:00
|
|
|
logger.error('signature verification failed');
|
2018-04-04 16:12:35 +02:00
|
|
|
return;
|
|
|
|
}
|
2018-11-16 09:04:28 +01:00
|
|
|
|
2018-11-05 11:40:09 +01:00
|
|
|
//#region Log
|
|
|
|
publishApLogStream({
|
|
|
|
direction: 'in',
|
|
|
|
activity: activity.type,
|
|
|
|
host: user.host,
|
|
|
|
actor: user.username
|
|
|
|
});
|
|
|
|
//#endregion
|
2018-04-04 16:12:35 +02:00
|
|
|
|
2019-02-07 08:05:29 +01:00
|
|
|
// Update stats
|
|
|
|
registerOrFetchInstanceDoc(user.host).then(i => {
|
2019-04-07 14:50:36 +02:00
|
|
|
Instances.update(i.id, {
|
|
|
|
latestRequestReceivedAt: new Date(),
|
|
|
|
lastCommunicatedAt: new Date(),
|
|
|
|
isNotResponding: false
|
2019-02-07 08:05:29 +01:00
|
|
|
});
|
2019-02-08 08:58:57 +01:00
|
|
|
|
|
|
|
instanceChart.requestReceived(i.host);
|
2019-02-07 08:05:29 +01:00
|
|
|
});
|
|
|
|
|
2018-04-04 16:12:35 +02:00
|
|
|
// アクティビティを処理
|
2019-03-07 21:22:14 +01:00
|
|
|
await perform(user, activity);
|
2018-04-04 16:12:35 +02:00
|
|
|
};
|
2018-08-30 13:53:41 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Validate host in activity
|
|
|
|
* @param activity Activity
|
|
|
|
* @param host Expect host
|
|
|
|
*/
|
|
|
|
function ValidateActivity(activity: any, host: string) {
|
|
|
|
// id (if exists)
|
|
|
|
if (typeof activity.id === 'string') {
|
2019-04-09 17:59:41 +02:00
|
|
|
const uriHost = toPuny(new URL(activity.id).hostname);
|
2018-08-31 09:46:24 +02:00
|
|
|
if (host !== uriHost) {
|
|
|
|
const diag = activity.signature ? '. Has LD-Signature. Forwarded?' : '';
|
|
|
|
throw new Error(`activity.id(${activity.id}) has different host(${host})${diag}`);
|
|
|
|
}
|
2018-08-30 13:53:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// actor (if exists)
|
|
|
|
if (typeof activity.actor === 'string') {
|
2019-04-09 17:59:41 +02:00
|
|
|
const uriHost = toPuny(new URL(activity.actor).hostname);
|
2018-08-30 13:53:41 +02:00
|
|
|
if (host !== uriHost) throw new Error('activity.actor has different host');
|
|
|
|
}
|
|
|
|
|
|
|
|
// For Create activity
|
|
|
|
if (activity.type === 'Create' && activity.object) {
|
|
|
|
// object.id (if exists)
|
|
|
|
if (typeof activity.object.id === 'string') {
|
2019-04-09 17:59:41 +02:00
|
|
|
const uriHost = toPuny(new URL(activity.object.id).hostname);
|
2018-08-30 13:53:41 +02:00
|
|
|
if (host !== uriHost) throw new Error('activity.object.id has different host');
|
|
|
|
}
|
|
|
|
|
|
|
|
// object.attributedTo (if exists)
|
|
|
|
if (typeof activity.object.attributedTo === 'string') {
|
2019-04-09 17:59:41 +02:00
|
|
|
const uriHost = toPuny(new URL(activity.object.attributedTo).hostname);
|
2018-08-30 13:53:41 +02:00
|
|
|
if (host !== uriHost) throw new Error('activity.object.attributedTo has different host');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|