2023-07-27 07:31:52 +02:00
|
|
|
/*
|
|
|
|
* SPDX-FileCopyrightText: syuilo and other misskey contributors
|
|
|
|
* SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
|
2022-09-17 20:27:08 +02:00
|
|
|
import { URL } from 'node:url';
|
2023-08-05 03:33:00 +02:00
|
|
|
import { Injectable } from '@nestjs/common';
|
2022-09-17 20:27:08 +02:00
|
|
|
import httpSignature from '@peertube/http-signature';
|
2023-05-29 04:54:49 +02:00
|
|
|
import * as Bull from 'bullmq';
|
2022-09-17 20:27:08 +02:00
|
|
|
import type Logger from '@/logger.js';
|
|
|
|
import { MetaService } from '@/core/MetaService.js';
|
|
|
|
import { FederatedInstanceService } from '@/core/FederatedInstanceService.js';
|
|
|
|
import { FetchInstanceMetadataService } from '@/core/FetchInstanceMetadataService.js';
|
|
|
|
import InstanceChart from '@/core/chart/charts/instance.js';
|
|
|
|
import ApRequestChart from '@/core/chart/charts/ap-request.js';
|
|
|
|
import FederationChart from '@/core/chart/charts/federation.js';
|
2022-12-04 02:16:03 +01:00
|
|
|
import { getApId } from '@/core/activitypub/type.js';
|
2023-09-20 04:33:36 +02:00
|
|
|
import type { MiRemoteUser } from '@/models/User.js';
|
|
|
|
import type { MiUserPublickey } from '@/models/UserPublickey.js';
|
2022-12-04 02:16:03 +01:00
|
|
|
import { ApDbResolverService } from '@/core/activitypub/ApDbResolverService.js';
|
2022-09-17 20:27:08 +02:00
|
|
|
import { StatusError } from '@/misc/status-error.js';
|
|
|
|
import { UtilityService } from '@/core/UtilityService.js';
|
2022-12-04 02:16:03 +01:00
|
|
|
import { ApPersonService } from '@/core/activitypub/models/ApPersonService.js';
|
|
|
|
import { LdSignatureService } from '@/core/activitypub/LdSignatureService.js';
|
|
|
|
import { ApInboxService } from '@/core/activitypub/ApInboxService.js';
|
2022-12-04 07:03:09 +01:00
|
|
|
import { bindThis } from '@/decorators.js';
|
2022-09-17 20:27:08 +02:00
|
|
|
import { QueueLoggerService } from '../QueueLoggerService.js';
|
2023-02-16 15:09:41 +01:00
|
|
|
import type { InboxJobData } from '../types.js';
|
2022-09-17 20:27:08 +02:00
|
|
|
|
|
|
|
@Injectable()
|
|
|
|
export class InboxProcessorService {
|
2022-09-18 20:11:50 +02:00
|
|
|
private logger: Logger;
|
2022-09-17 20:27:08 +02:00
|
|
|
|
|
|
|
constructor(
|
|
|
|
private utilityService: UtilityService,
|
|
|
|
private metaService: MetaService,
|
|
|
|
private apInboxService: ApInboxService,
|
|
|
|
private federatedInstanceService: FederatedInstanceService,
|
|
|
|
private fetchInstanceMetadataService: FetchInstanceMetadataService,
|
|
|
|
private ldSignatureService: LdSignatureService,
|
|
|
|
private apPersonService: ApPersonService,
|
|
|
|
private apDbResolverService: ApDbResolverService,
|
|
|
|
private instanceChart: InstanceChart,
|
|
|
|
private apRequestChart: ApRequestChart,
|
|
|
|
private federationChart: FederationChart,
|
|
|
|
private queueLoggerService: QueueLoggerService,
|
|
|
|
) {
|
2022-09-18 20:11:50 +02:00
|
|
|
this.logger = this.queueLoggerService.logger.createSubLogger('inbox');
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
2022-12-04 07:03:09 +01:00
|
|
|
@bindThis
|
2022-09-17 20:27:08 +02:00
|
|
|
public async process(job: Bull.Job<InboxJobData>): Promise<string> {
|
|
|
|
const signature = job.data.signature; // HTTP-signature
|
|
|
|
const activity = job.data.activity;
|
|
|
|
|
|
|
|
//#region Log
|
2023-03-11 00:51:37 +01:00
|
|
|
const info = Object.assign({}, activity);
|
2022-09-17 20:27:08 +02:00
|
|
|
delete info['@context'];
|
2022-09-18 20:11:50 +02:00
|
|
|
this.logger.debug(JSON.stringify(info, null, 2));
|
2022-09-17 20:27:08 +02:00
|
|
|
//#endregion
|
|
|
|
|
|
|
|
const host = this.utilityService.toPuny(new URL(signature.keyId).hostname);
|
|
|
|
|
|
|
|
// ブロックしてたら中断
|
|
|
|
const meta = await this.metaService.fetch();
|
2023-01-13 10:21:07 +01:00
|
|
|
if (this.utilityService.isBlockedHost(meta.blockedHosts, host)) {
|
2022-09-17 20:27:08 +02:00
|
|
|
return `Blocked request: ${host}`;
|
|
|
|
}
|
|
|
|
|
|
|
|
const keyIdLower = signature.keyId.toLowerCase();
|
|
|
|
if (keyIdLower.startsWith('acct:')) {
|
|
|
|
return `Old keyId is no longer supported. ${keyIdLower}`;
|
|
|
|
}
|
|
|
|
|
|
|
|
// HTTP-Signature keyIdを元にDBから取得
|
|
|
|
let authUser: {
|
2023-08-16 10:51:28 +02:00
|
|
|
user: MiRemoteUser;
|
|
|
|
key: MiUserPublickey | null;
|
enhance: account migration (#10592)
* copy block and mute then create follow and unfollow jobs
* copy block and mute and update lists when detecting an account has moved
* no need to care promise orders
* refactor updating actor and target
* automatically accept if a locked account had accepted an old account
* fix exception format
* prevent the old account from calling some endpoints
* do not unfollow when moving
* adjust following and follower counts
* check movedToUri when receiving a follow request
* skip if no need to adjust
* Revert "disable account migration"
This reverts commit 2321214c98591bcfe1385c1ab5bf0ff7b471ae1d.
* fix translation specifier
* fix checking alsoKnownAs and uri
* fix updating account
* fix refollowing locked account
* decrease followersCount if followed by the old account
* adjust following and followers counts when unfollowing
* fix copying mutings
* prohibit moved account from moving again
* fix move service
* allow app creation after moving
* fix lint
* remove unnecessary field
* fix cache update
* add e2e test
* add e2e test of accepting the new account automatically
* force follow if any error happens
* remove unnecessary joins
* use Array.map instead of for const of
* ユーザーリストの移行は追加のみを行う
* nanka iroiro
* fix misskey-js?
* :v:
* 移行を行ったアカウントからのフォローリクエストの自動許可を調整
* newUriを外に出す
* newUriを外に出す2
* clean up
* fix newUri
* prevent moving if the destination account has already moved
* set alsoKnownAs via /i/update
* fix database initialization
* add return type
* prohibit updating alsoKnownAs after moving
* skip to add to alsoKnownAs if toUrl is known
* skip adding to the list if it already has
* use Acct.parse instead
* rename error code
* :art:
* 制限を5から10に緩和
* movedTo(Uri), alsoKnownAsはユーザーidを返すように
* test api res
* fix
* 元アカウントはミュートし続ける
* :art:
* unfollow
* fix
* getUserUriをUserEntityServiceに
* ?
* job!
* :art:
* instance => server
* accountMovedShort, forbiddenBecauseYouAreMigrated
* accountMovedShort
* fix test
* import, pin禁止
* 実績を凍結する
* clean up
* :v:
* change message
* ブロック, フォロー, ミュート, リストのインポートファイルの制限を32MiBに
* Revert "ブロック, フォロー, ミュート, リストのインポートファイルの制限を32MiBに"
This reverts commit 3bd7be35d8aa455cb01ae58f8172a71a50485db1.
* validateAlsoKnownAs
* 移行後2時間以内はインポート可能なファイルサイズを拡大
* clean up
* どうせactorをupdatePersonで更新するならupdatePersonしか移行処理を発行しないことにする
* handle error?
* リモートからの移行処理の条件を是正
* log, port
* fix
* fix
* enhance(dev): non-production環境でhttpサーバー間でもユーザー、ノートの連合が可能なように
* refactor (use checkHttps)
* MISSKEY_WEBFINGER_USE_HTTP
* Environment Variable readme
* NEVER USE IN PRODUCTION
* fix punyHost
* fix indent
* fix
* experimental
---------
Co-authored-by: tamaina <tamaina@hotmail.co.jp>
Co-authored-by: syuilo <Syuilotan@yahoo.co.jp>
2023-04-29 17:09:29 +02:00
|
|
|
} | null = await this.apDbResolverService.getAuthUserFromKeyId(signature.keyId);
|
2022-09-17 20:27:08 +02:00
|
|
|
|
|
|
|
// keyIdでわからなければ、activity.actorを元にDBから取得 || activity.actorを元にリモートから取得
|
|
|
|
if (authUser == null) {
|
|
|
|
try {
|
|
|
|
authUser = await this.apDbResolverService.getAuthUserFromApId(getApId(activity.actor));
|
|
|
|
} catch (err) {
|
2023-05-29 04:54:49 +02:00
|
|
|
// 対象が4xxならスキップ
|
2022-09-17 20:27:08 +02:00
|
|
|
if (err instanceof StatusError) {
|
|
|
|
if (err.isClientError) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError(`skip: Ignored deleted actors on both ends ${activity.actor} - ${err.statusCode}`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
2023-10-18 02:54:18 +02:00
|
|
|
throw new Error(`Error in actor ${activity.actor} - ${err.statusCode}`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// それでもわからなければ終了
|
|
|
|
if (authUser == null) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError('skip: failed to resolve user');
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// publicKey がなくても終了
|
|
|
|
if (authUser.key == null) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError('skip: failed to resolve user publicKey');
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// HTTP-Signatureの検証
|
2023-10-20 12:50:56 +02:00
|
|
|
let httpSignatureValidated = httpSignature.verifySignature(signature, authUser.key.keyPem);
|
2022-09-17 20:27:08 +02:00
|
|
|
|
|
|
|
// また、signatureのsignerは、activity.actorと一致する必要がある
|
|
|
|
if (!httpSignatureValidated || authUser.user.uri !== activity.actor) {
|
2023-10-20 12:50:56 +02:00
|
|
|
let renewKeyFailed = false;
|
|
|
|
|
|
|
|
if (!httpSignatureValidated) {
|
|
|
|
authUser.key = await this.apDbResolverService.refetchPublicKeyForApId(authUser.user);
|
|
|
|
|
|
|
|
if (authUser.key != null) {
|
|
|
|
httpSignatureValidated = httpSignature.verifySignature(signature, authUser.key.keyPem);
|
|
|
|
} else {
|
|
|
|
renewKeyFailed = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-29 04:54:49 +02:00
|
|
|
// 一致しなくても、でもLD-Signatureがありそうならそっちも見る
|
2023-10-20 12:50:56 +02:00
|
|
|
if (activity.signature && renewKeyFailed) {
|
2022-09-17 20:27:08 +02:00
|
|
|
if (activity.signature.type !== 'RsaSignature2017') {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError(`skip: unsupported LD-signature type ${activity.signature.type}`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// activity.signature.creator: https://example.oom/users/user#main-key
|
|
|
|
// みたいになっててUserを引っ張れば公開キーも入ることを期待する
|
|
|
|
if (activity.signature.creator) {
|
|
|
|
const candicate = activity.signature.creator.replace(/#.*/, '');
|
|
|
|
await this.apPersonService.resolvePerson(candicate).catch(() => null);
|
|
|
|
}
|
|
|
|
|
|
|
|
// keyIdからLD-Signatureのユーザーを取得
|
|
|
|
authUser = await this.apDbResolverService.getAuthUserFromKeyId(activity.signature.creator);
|
|
|
|
if (authUser == null) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError('skip: LD-Signatureのユーザーが取得できませんでした');
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (authUser.key == null) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError('skip: LD-SignatureのユーザーはpublicKeyを持っていませんでした');
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// LD-Signature検証
|
|
|
|
const ldSignature = this.ldSignatureService.use();
|
|
|
|
const verified = await ldSignature.verifyRsaSignature2017(activity, authUser.key.keyPem).catch(() => false);
|
|
|
|
if (!verified) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError('skip: LD-Signatureの検証に失敗しました');
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// もう一度actorチェック
|
|
|
|
if (authUser.user.uri !== activity.actor) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError(`skip: LD-Signature user(${authUser.user.uri}) !== activity.actor(${activity.actor})`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// ブロックしてたら中断
|
|
|
|
const ldHost = this.utilityService.extractDbHost(authUser.user.uri);
|
2023-01-13 10:21:07 +01:00
|
|
|
if (this.utilityService.isBlockedHost(meta.blockedHosts, ldHost)) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError(`Blocked request: ${ldHost}`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
} else {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError(`skip: http-signature verification failed and no LD-Signature. keyId=${signature.keyId}`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// activity.idがあればホストが署名者のホストであることを確認する
|
|
|
|
if (typeof activity.id === 'string') {
|
|
|
|
const signerHost = this.utilityService.extractDbHost(authUser.user.uri!);
|
|
|
|
const activityIdHost = this.utilityService.extractDbHost(activity.id);
|
|
|
|
if (signerHost !== activityIdHost) {
|
2023-05-29 04:54:49 +02:00
|
|
|
throw new Bull.UnrecoverableError(`skip: signerHost(${signerHost}) !== activity.id host(${activityIdHost}`);
|
2022-09-17 20:27:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats
|
2023-01-03 01:32:36 +01:00
|
|
|
this.federatedInstanceService.fetch(authUser.user.host).then(i => {
|
2023-04-22 12:59:08 +02:00
|
|
|
this.federatedInstanceService.update(i.id, {
|
2022-09-17 20:27:08 +02:00
|
|
|
latestRequestReceivedAt: new Date(),
|
|
|
|
isNotResponding: false,
|
|
|
|
});
|
|
|
|
|
|
|
|
this.fetchInstanceMetadataService.fetchInstanceMetadata(i);
|
|
|
|
|
|
|
|
this.apRequestChart.inbox();
|
|
|
|
this.federationChart.inbox(i.host);
|
2023-03-24 11:08:08 +01:00
|
|
|
|
|
|
|
if (meta.enableChartsForFederatedInstances) {
|
|
|
|
this.instanceChart.requestReceived(i.host);
|
|
|
|
}
|
2022-09-17 20:27:08 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
// アクティビティを処理
|
|
|
|
await this.apInboxService.performActivity(authUser.user, activity);
|
|
|
|
return 'ok';
|
|
|
|
}
|
|
|
|
}
|