2019-03-07 14:07:21 +00:00
|
|
|
import * as Bull from 'bull';
|
2019-02-01 10:59:12 +00:00
|
|
|
import * as httpSignature from 'http-signature';
|
2019-04-07 12:50:36 +00:00
|
|
|
import { IRemoteUser } from '../../models/entities/user';
|
2019-03-07 14:07:21 +00:00
|
|
|
import perform from '../../remote/activitypub/perform';
|
|
|
|
import { resolvePerson, updatePerson } from '../../remote/activitypub/models/person';
|
2018-08-30 11:53:41 +00:00
|
|
|
import { URL } from 'url';
|
2019-03-07 14:07:21 +00:00
|
|
|
import { publishApLogStream } from '../../services/stream';
|
|
|
|
import Logger from '../../services/logger';
|
|
|
|
import { registerOrFetchInstanceDoc } from '../../services/register-or-fetch-instance-doc';
|
2019-04-07 12:50:36 +00:00
|
|
|
import { Instances, Users, UserPublickeys } from '../../models';
|
|
|
|
import { instanceChart } from '../../services/chart';
|
|
|
|
import { UserPublickey } from '../../models/entities/user-publickey';
|
|
|
|
import fetchMeta from '../../misc/fetch-meta';
|
2019-04-17 15:56:10 +00:00
|
|
|
import { toPuny } from '../../misc/convert-host';
|
2019-04-10 18:09:12 +00:00
|
|
|
import { validActor } from '../../remote/activitypub/type';
|
2019-04-12 16:43:22 +00:00
|
|
|
import { ensure } from '../../prelude/ensure';
|
2018-04-04 14:12:35 +00:00
|
|
|
|
2019-02-03 09:16:57 +00:00
|
|
|
const logger = new Logger('inbox');
|
2018-04-06 13:40:06 +00:00
|
|
|
|
2018-04-04 14:12:35 +00:00
|
|
|
// ユーザーのinboxにアクティビティが届いた時の処理
|
2019-03-07 20:22:14 +00:00
|
|
|
export default async (job: Bull.Job): Promise<void> => {
|
2018-04-04 14:12:35 +00:00
|
|
|
const signature = job.data.signature;
|
|
|
|
const activity = job.data.activity;
|
|
|
|
|
2018-04-06 13:40:06 +00:00
|
|
|
//#region Log
|
|
|
|
const info = Object.assign({}, activity);
|
|
|
|
delete info['@context'];
|
|
|
|
delete info['signature'];
|
2019-02-05 05:04:40 +00:00
|
|
|
logger.debug(JSON.stringify(info, null, 2));
|
2018-04-06 13:40:06 +00:00
|
|
|
//#endregion
|
|
|
|
|
2018-04-04 14:12:35 +00:00
|
|
|
const keyIdLower = signature.keyId.toLowerCase();
|
2018-06-18 05:28:43 +00:00
|
|
|
let user: IRemoteUser;
|
2019-04-07 12:50:36 +00:00
|
|
|
let key: UserPublickey;
|
2018-04-04 14:12:35 +00:00
|
|
|
|
|
|
|
if (keyIdLower.startsWith('acct:')) {
|
2019-04-17 15:53:00 +00:00
|
|
|
logger.warn(`Old keyId is no longer supported. ${keyIdLower}`);
|
|
|
|
return;
|
2018-04-04 14:12:35 +00:00
|
|
|
} else {
|
2018-08-30 11:53:41 +00:00
|
|
|
// アクティビティ内のホストの検証
|
2019-04-09 15:59:41 +00:00
|
|
|
const host = toPuny(new URL(signature.keyId).hostname);
|
2018-08-30 11:53:41 +00:00
|
|
|
try {
|
|
|
|
ValidateActivity(activity, host);
|
|
|
|
} catch (e) {
|
2019-02-03 09:16:57 +00:00
|
|
|
logger.warn(e.message);
|
2018-08-30 11:53:41 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-07 19:26:43 +00:00
|
|
|
// ブロックしてたら中断
|
|
|
|
// TODO: いちいちデータベースにアクセスするのはコスト高そうなのでどっかにキャッシュしておく
|
2019-04-07 12:50:36 +00:00
|
|
|
const meta = await fetchMeta();
|
2019-04-09 15:59:41 +00:00
|
|
|
if (meta.blockedHosts.includes(host)) {
|
2019-04-07 12:50:36 +00:00
|
|
|
logger.info(`Blocked request: ${host}`);
|
2019-02-07 19:26:43 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-17 15:53:00 +00:00
|
|
|
const _key = await UserPublickeys.findOne({
|
2019-04-07 12:50:36 +00:00
|
|
|
keyId: signature.keyId
|
2019-04-17 15:53:00 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
if (_key) {
|
|
|
|
// 登録済みユーザー
|
|
|
|
user = await Users.findOne(_key.userId) as IRemoteUser;
|
|
|
|
key = _key;
|
|
|
|
} else {
|
|
|
|
// 未登録ユーザーの場合はリモート解決
|
|
|
|
user = await resolvePerson(activity.actor) as IRemoteUser;
|
|
|
|
if (user == null) {
|
|
|
|
throw new Error('failed to resolve user');
|
|
|
|
}
|
2019-04-07 12:50:36 +00:00
|
|
|
|
2019-04-17 15:53:00 +00:00
|
|
|
key = await UserPublickeys.findOne(user.id).then(ensure);
|
|
|
|
}
|
2018-09-01 08:53:38 +00:00
|
|
|
}
|
2018-04-04 14:12:35 +00:00
|
|
|
|
2019-03-07 12:19:32 +00:00
|
|
|
// Update Person activityの場合は、ここで署名検証/更新処理まで実施して終了
|
2018-09-01 08:53:38 +00:00
|
|
|
if (activity.type === 'Update') {
|
2019-04-10 18:09:12 +00:00
|
|
|
if (activity.object && validActor.includes(activity.object.type)) {
|
2019-04-17 15:53:00 +00:00
|
|
|
if (!httpSignature.verifySignature(signature, key.keyPem)) {
|
2019-02-03 09:16:57 +00:00
|
|
|
logger.warn('Update activity received, but signature verification failed.');
|
2018-09-01 08:53:38 +00:00
|
|
|
} else {
|
|
|
|
updatePerson(activity.actor, null, activity.object);
|
|
|
|
}
|
2019-03-07 12:19:32 +00:00
|
|
|
return;
|
2018-04-04 14:12:35 +00:00
|
|
|
}
|
2018-09-01 08:53:38 +00:00
|
|
|
}
|
|
|
|
|
2019-04-07 12:50:36 +00:00
|
|
|
if (!httpSignature.verifySignature(signature, key.keyPem)) {
|
2019-02-03 09:16:57 +00:00
|
|
|
logger.error('signature verification failed');
|
2018-04-04 14:12:35 +00:00
|
|
|
return;
|
|
|
|
}
|
2018-11-16 08:04:28 +00:00
|
|
|
|
2018-11-05 10:40:09 +00:00
|
|
|
//#region Log
|
|
|
|
publishApLogStream({
|
|
|
|
direction: 'in',
|
|
|
|
activity: activity.type,
|
|
|
|
host: user.host,
|
|
|
|
actor: user.username
|
|
|
|
});
|
|
|
|
//#endregion
|
2018-04-04 14:12:35 +00:00
|
|
|
|
2019-02-07 07:05:29 +00:00
|
|
|
// Update stats
|
|
|
|
registerOrFetchInstanceDoc(user.host).then(i => {
|
2019-04-07 12:50:36 +00:00
|
|
|
Instances.update(i.id, {
|
|
|
|
latestRequestReceivedAt: new Date(),
|
|
|
|
lastCommunicatedAt: new Date(),
|
|
|
|
isNotResponding: false
|
2019-02-07 07:05:29 +00:00
|
|
|
});
|
2019-02-08 07:58:57 +00:00
|
|
|
|
|
|
|
instanceChart.requestReceived(i.host);
|
2019-02-07 07:05:29 +00:00
|
|
|
});
|
|
|
|
|
2018-04-04 14:12:35 +00:00
|
|
|
// アクティビティを処理
|
2019-03-07 20:22:14 +00:00
|
|
|
await perform(user, activity);
|
2018-04-04 14:12:35 +00:00
|
|
|
};
|
2018-08-30 11:53:41 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Validate host in activity
|
|
|
|
* @param activity Activity
|
|
|
|
* @param host Expect host
|
|
|
|
*/
|
|
|
|
function ValidateActivity(activity: any, host: string) {
|
|
|
|
// id (if exists)
|
|
|
|
if (typeof activity.id === 'string') {
|
2019-04-09 15:59:41 +00:00
|
|
|
const uriHost = toPuny(new URL(activity.id).hostname);
|
2018-08-31 07:46:24 +00:00
|
|
|
if (host !== uriHost) {
|
|
|
|
const diag = activity.signature ? '. Has LD-Signature. Forwarded?' : '';
|
|
|
|
throw new Error(`activity.id(${activity.id}) has different host(${host})${diag}`);
|
|
|
|
}
|
2018-08-30 11:53:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// actor (if exists)
|
|
|
|
if (typeof activity.actor === 'string') {
|
2019-04-09 15:59:41 +00:00
|
|
|
const uriHost = toPuny(new URL(activity.actor).hostname);
|
2018-08-30 11:53:41 +00:00
|
|
|
if (host !== uriHost) throw new Error('activity.actor has different host');
|
|
|
|
}
|
|
|
|
|
|
|
|
// For Create activity
|
|
|
|
if (activity.type === 'Create' && activity.object) {
|
|
|
|
// object.id (if exists)
|
|
|
|
if (typeof activity.object.id === 'string') {
|
2019-04-09 15:59:41 +00:00
|
|
|
const uriHost = toPuny(new URL(activity.object.id).hostname);
|
2018-08-30 11:53:41 +00:00
|
|
|
if (host !== uriHost) throw new Error('activity.object.id has different host');
|
|
|
|
}
|
|
|
|
|
|
|
|
// object.attributedTo (if exists)
|
|
|
|
if (typeof activity.object.attributedTo === 'string') {
|
2019-04-09 15:59:41 +00:00
|
|
|
const uriHost = toPuny(new URL(activity.object.attributedTo).hostname);
|
2018-08-30 11:53:41 +00:00
|
|
|
if (host !== uriHost) throw new Error('activity.object.attributedTo has different host');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|