2019-03-07 16:07:21 +02:00
|
|
|
import * as Bull from 'bull';
|
2019-02-01 12:59:12 +02:00
|
|
|
import * as httpSignature from 'http-signature';
|
2019-03-07 16:07:21 +02:00
|
|
|
import parseAcct from '../../misc/acct/parse';
|
2019-04-07 15:50:36 +03:00
|
|
|
import { IRemoteUser } from '../../models/entities/user';
|
2019-03-07 16:07:21 +02:00
|
|
|
import perform from '../../remote/activitypub/perform';
|
|
|
|
import { resolvePerson, updatePerson } from '../../remote/activitypub/models/person';
|
2018-08-30 14:53:41 +03:00
|
|
|
import { URL } from 'url';
|
2019-03-07 16:07:21 +02:00
|
|
|
import { publishApLogStream } from '../../services/stream';
|
|
|
|
import Logger from '../../services/logger';
|
|
|
|
import { registerOrFetchInstanceDoc } from '../../services/register-or-fetch-instance-doc';
|
2019-04-07 15:50:36 +03:00
|
|
|
import { Instances, Users, UserPublickeys } from '../../models';
|
|
|
|
import { instanceChart } from '../../services/chart';
|
|
|
|
import { UserPublickey } from '../../models/entities/user-publickey';
|
|
|
|
import fetchMeta from '../../misc/fetch-meta';
|
2019-04-09 18:59:41 +03:00
|
|
|
import { toPuny } from '../../misc/convert-host';
|
2019-04-10 21:09:12 +03:00
|
|
|
import { validActor } from '../../remote/activitypub/type';
|
2019-04-12 19:43:22 +03:00
|
|
|
import { ensure } from '../../prelude/ensure';
|
2018-04-04 17:12:35 +03:00
|
|
|
|
2019-02-03 11:16:57 +02:00
|
|
|
const logger = new Logger('inbox');
|
2018-04-06 16:40:06 +03:00
|
|
|
|
2018-04-04 17:12:35 +03:00
|
|
|
// ユーザーのinboxにアクティビティが届いた時の処理
|
2019-03-07 22:22:14 +02:00
|
|
|
export default async (job: Bull.Job): Promise<void> => {
|
2018-04-04 17:12:35 +03:00
|
|
|
const signature = job.data.signature;
|
|
|
|
const activity = job.data.activity;
|
|
|
|
|
2018-04-06 16:40:06 +03:00
|
|
|
//#region Log
|
|
|
|
const info = Object.assign({}, activity);
|
|
|
|
delete info['@context'];
|
|
|
|
delete info['signature'];
|
2019-02-05 07:04:40 +02:00
|
|
|
logger.debug(JSON.stringify(info, null, 2));
|
2018-04-06 16:40:06 +03:00
|
|
|
//#endregion
|
|
|
|
|
2018-04-04 17:12:35 +03:00
|
|
|
const keyIdLower = signature.keyId.toLowerCase();
|
2018-06-18 08:28:43 +03:00
|
|
|
let user: IRemoteUser;
|
2019-04-07 15:50:36 +03:00
|
|
|
let key: UserPublickey;
|
2018-04-04 17:12:35 +03:00
|
|
|
|
|
|
|
if (keyIdLower.startsWith('acct:')) {
|
2019-04-09 18:59:41 +03:00
|
|
|
const acct = parseAcct(keyIdLower.slice('acct:'.length));
|
2019-04-12 19:43:22 +03:00
|
|
|
const host = acct.host ? toPuny(acct.host) : null;
|
2019-04-09 18:59:41 +03:00
|
|
|
const username = toPuny(acct.username);
|
|
|
|
|
2018-04-04 17:12:35 +03:00
|
|
|
if (host === null) {
|
2019-02-03 11:16:57 +02:00
|
|
|
logger.warn(`request was made by local user: @${username}`);
|
2018-04-06 08:35:17 +03:00
|
|
|
return;
|
2018-04-04 17:12:35 +03:00
|
|
|
}
|
|
|
|
|
2018-08-30 14:53:41 +03:00
|
|
|
// アクティビティ内のホストの検証
|
|
|
|
try {
|
|
|
|
ValidateActivity(activity, host);
|
|
|
|
} catch (e) {
|
2019-02-03 11:16:57 +02:00
|
|
|
logger.warn(e.message);
|
2018-08-30 14:53:41 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-07 21:26:43 +02:00
|
|
|
// ブロックしてたら中断
|
|
|
|
// TODO: いちいちデータベースにアクセスするのはコスト高そうなのでどっかにキャッシュしておく
|
2019-04-07 15:50:36 +03:00
|
|
|
const meta = await fetchMeta();
|
2019-04-09 18:59:41 +03:00
|
|
|
if (meta.blockedHosts.includes(host)) {
|
2019-03-09 03:10:24 +02:00
|
|
|
logger.info(`Blocked request: ${host}`);
|
2019-02-07 21:26:43 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-09 18:59:41 +03:00
|
|
|
user = await Users.findOne({
|
|
|
|
usernameLower: username.toLowerCase(),
|
|
|
|
host: host
|
|
|
|
}) as IRemoteUser;
|
2019-04-07 15:50:36 +03:00
|
|
|
|
2019-04-12 19:43:22 +03:00
|
|
|
key = await UserPublickeys.findOne(user.id).then(ensure);
|
2018-04-04 17:12:35 +03:00
|
|
|
} else {
|
2018-08-30 14:53:41 +03:00
|
|
|
// アクティビティ内のホストの検証
|
2019-04-09 18:59:41 +03:00
|
|
|
const host = toPuny(new URL(signature.keyId).hostname);
|
2018-08-30 14:53:41 +03:00
|
|
|
try {
|
|
|
|
ValidateActivity(activity, host);
|
|
|
|
} catch (e) {
|
2019-02-03 11:16:57 +02:00
|
|
|
logger.warn(e.message);
|
2018-08-30 14:53:41 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-07 21:26:43 +02:00
|
|
|
// ブロックしてたら中断
|
|
|
|
// TODO: いちいちデータベースにアクセスするのはコスト高そうなのでどっかにキャッシュしておく
|
2019-04-07 15:50:36 +03:00
|
|
|
const meta = await fetchMeta();
|
2019-04-09 18:59:41 +03:00
|
|
|
if (meta.blockedHosts.includes(host)) {
|
2019-04-07 15:50:36 +03:00
|
|
|
logger.info(`Blocked request: ${host}`);
|
2019-02-07 21:26:43 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-07 15:50:36 +03:00
|
|
|
key = await UserPublickeys.findOne({
|
|
|
|
keyId: signature.keyId
|
2019-04-12 19:43:22 +03:00
|
|
|
}).then(ensure);
|
2019-04-07 15:50:36 +03:00
|
|
|
|
|
|
|
user = await Users.findOne(key.userId) as IRemoteUser;
|
2018-09-01 11:53:38 +03:00
|
|
|
}
|
2018-04-04 17:12:35 +03:00
|
|
|
|
2019-03-07 14:19:32 +02:00
|
|
|
// Update Person activityの場合は、ここで署名検証/更新処理まで実施して終了
|
2018-09-01 11:53:38 +03:00
|
|
|
if (activity.type === 'Update') {
|
2019-04-10 21:09:12 +03:00
|
|
|
if (activity.object && validActor.includes(activity.object.type)) {
|
2018-09-01 11:53:38 +03:00
|
|
|
if (user == null) {
|
2019-02-03 11:16:57 +02:00
|
|
|
logger.warn('Update activity received, but user not registed.');
|
2019-04-07 15:50:36 +03:00
|
|
|
} else if (!httpSignature.verifySignature(signature, key.keyPem)) {
|
2019-02-03 11:16:57 +02:00
|
|
|
logger.warn('Update activity received, but signature verification failed.');
|
2018-09-01 11:53:38 +03:00
|
|
|
} else {
|
|
|
|
updatePerson(activity.actor, null, activity.object);
|
|
|
|
}
|
2019-03-07 14:19:32 +02:00
|
|
|
return;
|
2018-04-04 17:12:35 +03:00
|
|
|
}
|
2018-09-01 11:53:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// アクティビティを送信してきたユーザーがまだMisskeyサーバーに登録されていなかったら登録する
|
2019-04-07 15:50:36 +03:00
|
|
|
if (user == null) {
|
2018-09-01 11:53:38 +03:00
|
|
|
user = await resolvePerson(activity.actor) as IRemoteUser;
|
2018-04-04 17:12:35 +03:00
|
|
|
}
|
|
|
|
|
2019-04-07 15:50:36 +03:00
|
|
|
if (user == null) {
|
2019-03-07 22:22:14 +02:00
|
|
|
throw new Error('failed to resolve user');
|
2018-04-04 17:12:35 +03:00
|
|
|
}
|
|
|
|
|
2019-04-07 15:50:36 +03:00
|
|
|
if (!httpSignature.verifySignature(signature, key.keyPem)) {
|
2019-02-03 11:16:57 +02:00
|
|
|
logger.error('signature verification failed');
|
2018-04-04 17:12:35 +03:00
|
|
|
return;
|
|
|
|
}
|
2018-11-16 10:04:28 +02:00
|
|
|
|
2018-11-05 12:40:09 +02:00
|
|
|
//#region Log
|
|
|
|
publishApLogStream({
|
|
|
|
direction: 'in',
|
|
|
|
activity: activity.type,
|
|
|
|
host: user.host,
|
|
|
|
actor: user.username
|
|
|
|
});
|
|
|
|
//#endregion
|
2018-04-04 17:12:35 +03:00
|
|
|
|
2019-02-07 09:05:29 +02:00
|
|
|
// Update stats
|
|
|
|
registerOrFetchInstanceDoc(user.host).then(i => {
|
2019-04-07 15:50:36 +03:00
|
|
|
Instances.update(i.id, {
|
|
|
|
latestRequestReceivedAt: new Date(),
|
|
|
|
lastCommunicatedAt: new Date(),
|
|
|
|
isNotResponding: false
|
2019-02-07 09:05:29 +02:00
|
|
|
});
|
2019-02-08 09:58:57 +02:00
|
|
|
|
|
|
|
instanceChart.requestReceived(i.host);
|
2019-02-07 09:05:29 +02:00
|
|
|
});
|
|
|
|
|
2018-04-04 17:12:35 +03:00
|
|
|
// アクティビティを処理
|
2019-03-07 22:22:14 +02:00
|
|
|
await perform(user, activity);
|
2018-04-04 17:12:35 +03:00
|
|
|
};
|
2018-08-30 14:53:41 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Validate host in activity
|
|
|
|
* @param activity Activity
|
|
|
|
* @param host Expect host
|
|
|
|
*/
|
|
|
|
function ValidateActivity(activity: any, host: string) {
|
|
|
|
// id (if exists)
|
|
|
|
if (typeof activity.id === 'string') {
|
2019-04-09 18:59:41 +03:00
|
|
|
const uriHost = toPuny(new URL(activity.id).hostname);
|
2018-08-31 10:46:24 +03:00
|
|
|
if (host !== uriHost) {
|
|
|
|
const diag = activity.signature ? '. Has LD-Signature. Forwarded?' : '';
|
|
|
|
throw new Error(`activity.id(${activity.id}) has different host(${host})${diag}`);
|
|
|
|
}
|
2018-08-30 14:53:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// actor (if exists)
|
|
|
|
if (typeof activity.actor === 'string') {
|
2019-04-09 18:59:41 +03:00
|
|
|
const uriHost = toPuny(new URL(activity.actor).hostname);
|
2018-08-30 14:53:41 +03:00
|
|
|
if (host !== uriHost) throw new Error('activity.actor has different host');
|
|
|
|
}
|
|
|
|
|
|
|
|
// For Create activity
|
|
|
|
if (activity.type === 'Create' && activity.object) {
|
|
|
|
// object.id (if exists)
|
|
|
|
if (typeof activity.object.id === 'string') {
|
2019-04-09 18:59:41 +03:00
|
|
|
const uriHost = toPuny(new URL(activity.object.id).hostname);
|
2018-08-30 14:53:41 +03:00
|
|
|
if (host !== uriHost) throw new Error('activity.object.id has different host');
|
|
|
|
}
|
|
|
|
|
|
|
|
// object.attributedTo (if exists)
|
|
|
|
if (typeof activity.object.attributedTo === 'string') {
|
2019-04-09 18:59:41 +03:00
|
|
|
const uriHost = toPuny(new URL(activity.object.attributedTo).hostname);
|
2018-08-30 14:53:41 +03:00
|
|
|
if (host !== uriHost) throw new Error('activity.object.attributedTo has different host');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|