lemmy/server/src/apub/mod.rs

375 lines
8.6 KiB
Rust
Raw Normal View History

2020-04-09 13:04:31 -06:00
pub mod activities;
pub mod comment;
pub mod community;
pub mod community_inbox;
2020-05-05 08:30:13 -06:00
pub mod extensions;
pub mod fetcher;
pub mod post;
2020-05-05 20:06:24 -06:00
pub mod private_message;
pub mod shared_inbox;
pub mod user;
pub mod user_inbox;
2020-04-24 08:04:36 -06:00
2020-05-16 08:04:08 -06:00
use crate::{
apub::extensions::{
group_extensions::GroupExtension,
page_extension::PageExtension,
signatures::{PublicKey, PublicKeyExtension},
},
convert_datetime,
db::user::User_,
request::{retry, RecvError},
routes::webfinger::WebFingerResponse,
DbPool,
LemmyError,
MentionData,
2020-05-16 08:04:08 -06:00
Settings,
};
2020-04-24 08:04:36 -06:00
use activitystreams::{
2020-05-16 08:04:08 -06:00
actor::{properties::ApActorProperties, Group, Person},
2020-06-03 09:10:16 -06:00
object::Page,
2020-04-24 08:04:36 -06:00
};
2020-05-18 10:15:26 -06:00
use activitystreams_ext::{Ext1, Ext2, Ext3};
2020-06-03 09:54:15 -06:00
use activitystreams_new::{activity::Follow, object::Tombstone, prelude::*};
use actix_web::{body::Body, client::Client, HttpResponse};
2020-05-16 08:04:08 -06:00
use chrono::NaiveDateTime;
2020-04-24 13:55:54 -06:00
use log::debug;
2020-05-16 08:04:08 -06:00
use serde::Serialize;
2020-04-24 13:55:54 -06:00
use url::Url;
2020-04-24 08:04:36 -06:00
2020-05-18 10:15:26 -06:00
type GroupExt = Ext3<Group, GroupExtension, ApActorProperties, PublicKeyExtension>;
type PersonExt = Ext2<Person, ApActorProperties, PublicKeyExtension>;
type PageExt = Ext1<Page, PageExtension>;
pub static APUB_JSON_CONTENT_TYPE: &str = "application/activity+json";
pub enum EndpointType {
Community,
User,
Post,
Comment,
2020-05-05 20:06:24 -06:00
PrivateMessage,
}
2020-04-17 09:33:55 -06:00
/// Convert the data to json and turn it into an HTTP Response with the correct ActivityPub
/// headers.
fn create_apub_response<T>(data: &T) -> HttpResponse<Body>
2020-03-18 19:16:17 -06:00
where
2020-04-17 09:33:55 -06:00
T: Serialize,
2020-03-18 19:16:17 -06:00
{
2020-03-16 11:30:25 -06:00
HttpResponse::Ok()
.content_type(APUB_JSON_CONTENT_TYPE)
2020-04-17 09:33:55 -06:00
.json(data)
}
2020-04-29 13:10:50 -06:00
fn create_apub_tombstone_response<T>(data: &T) -> HttpResponse<Body>
where
T: Serialize,
{
HttpResponse::Gone()
.content_type(APUB_JSON_CONTENT_TYPE)
.json(data)
}
2020-05-14 05:23:56 -06:00
/// Generates the ActivityPub ID for a given object type and ID.
pub fn make_apub_endpoint(endpoint_type: EndpointType, name: &str) -> Url {
let point = match endpoint_type {
2020-04-07 09:34:44 -06:00
EndpointType::Community => "c",
EndpointType::User => "u",
EndpointType::Post => "post",
EndpointType::Comment => "comment",
2020-05-05 20:06:24 -06:00
EndpointType::PrivateMessage => "private_message",
};
Url::parse(&format!(
"{}://{}/{}/{}",
2020-02-29 10:38:47 -07:00
get_apub_protocol_string(),
Settings::get().hostname,
point,
name
))
.unwrap()
}
2020-02-29 10:38:47 -07:00
pub fn get_apub_protocol_string() -> &'static str {
2020-03-18 15:09:00 -06:00
if Settings::get().federation.tls_enabled {
"https"
} else {
"http"
}
2020-02-29 10:38:47 -07:00
}
// Checks if the ID has a valid format, correct scheme, and is in the allowed instance list.
fn is_apub_id_valid(apub_id: &Url) -> bool {
debug!("Checking {}", apub_id);
if apub_id.scheme() != get_apub_protocol_string() {
debug!("invalid scheme: {:?}", apub_id.scheme());
2020-04-17 11:34:18 -06:00
return false;
}
let allowed_instances: Vec<String> = Settings::get()
2020-04-17 11:34:18 -06:00
.federation
.allowed_instances
2020-04-17 11:34:18 -06:00
.split(',')
.map(|d| d.to_string())
.collect();
match apub_id.domain() {
Some(d) => {
let contains = allowed_instances.contains(&d.to_owned());
if !contains {
debug!("{} not in {:?}", d, allowed_instances);
}
contains
}
None => {
debug!("missing domain");
false
}
2020-04-17 11:34:18 -06:00
}
}
2020-04-24 13:55:54 -06:00
#[async_trait::async_trait(?Send)]
pub trait ToApub {
type Response;
async fn to_apub(&self, pool: &DbPool) -> Result<Self::Response, LemmyError>;
fn to_tombstone(&self) -> Result<Tombstone, LemmyError>;
2020-04-28 11:46:25 -06:00
}
2020-05-03 08:22:25 -06:00
/// Updated is actually the deletion time
fn create_tombstone(
deleted: bool,
object_id: &str,
updated: Option<NaiveDateTime>,
2020-04-29 13:10:50 -06:00
former_type: String,
) -> Result<Tombstone, LemmyError> {
if deleted {
if let Some(updated) = updated {
2020-06-03 09:10:16 -06:00
let mut tombstone = Tombstone::new();
tombstone.set_id(object_id.parse()?);
2020-06-03 09:54:15 -06:00
tombstone.set_former_type(former_type);
2020-06-03 09:10:16 -06:00
tombstone.set_deleted(convert_datetime(updated).into());
Ok(tombstone)
} else {
Err(format_err!("Cant convert to tombstone because updated time was None.").into())
2020-04-28 11:46:25 -06:00
}
} else {
Err(format_err!("Cant convert object to tombstone if it wasnt deleted").into())
2020-04-28 11:46:25 -06:00
}
}
#[async_trait::async_trait(?Send)]
pub trait FromApub {
type ApubType;
async fn from_apub(
apub: &Self::ApubType,
client: &Client,
pool: &DbPool,
) -> Result<Self, LemmyError>
2020-04-24 13:55:54 -06:00
where
Self: Sized;
}
#[async_trait::async_trait(?Send)]
pub trait ApubObjectType {
async fn send_create(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_update(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_delete(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_undo_delete(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_remove(
&self,
mod_: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_undo_remove(
&self,
mod_: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
}
#[async_trait::async_trait(?Send)]
2020-04-27 20:46:09 -06:00
pub trait ApubLikeableType {
async fn send_like(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_dislike(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_undo_like(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
2020-04-27 20:46:09 -06:00
}
pub fn get_shared_inbox(actor_id: &str) -> String {
let url = Url::parse(actor_id).unwrap();
format!(
"{}://{}{}/inbox",
&url.scheme(),
&url.host_str().unwrap(),
if let Some(port) = url.port() {
format!(":{}", port)
} else {
"".to_string()
},
)
}
#[async_trait::async_trait(?Send)]
2020-04-24 13:55:54 -06:00
pub trait ActorType {
fn actor_id(&self) -> String;
fn public_key(&self) -> String;
fn private_key(&self) -> String;
// These two have default impls, since currently a community can't follow anything,
// and a user can't be followed (yet)
#[allow(unused_variables)]
async fn send_follow(
&self,
follow_actor_id: &str,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_unfollow(
&self,
follow_actor_id: &str,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
#[allow(unused_variables)]
async fn send_accept_follow(
&self,
follow: &Follow,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_delete(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_undo_delete(
&self,
creator: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_remove(
&self,
mod_: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
async fn send_undo_remove(
&self,
mod_: &User_,
client: &Client,
pool: &DbPool,
) -> Result<(), LemmyError>;
2020-05-03 08:00:59 -06:00
/// For a given community, returns the inboxes of all followers.
async fn get_follower_inboxes(&self, pool: &DbPool) -> Result<Vec<String>, LemmyError>;
// TODO move these to the db rows
2020-04-24 13:55:54 -06:00
fn get_inbox_url(&self) -> String {
format!("{}/inbox", &self.actor_id())
}
fn get_shared_inbox_url(&self) -> String {
get_shared_inbox(&self.actor_id())
}
2020-04-24 13:55:54 -06:00
fn get_outbox_url(&self) -> String {
format!("{}/outbox", &self.actor_id())
}
fn get_followers_url(&self) -> String {
format!("{}/followers", &self.actor_id())
}
2020-04-24 13:55:54 -06:00
fn get_following_url(&self) -> String {
format!("{}/following", &self.actor_id())
}
2020-04-24 13:55:54 -06:00
fn get_liked_url(&self) -> String {
format!("{}/liked", &self.actor_id())
}
fn get_public_key_ext(&self) -> PublicKeyExtension {
PublicKey {
id: format!("{}#main-key", self.actor_id()),
owner: self.actor_id(),
public_key_pem: self.public_key(),
}
.to_ext()
}
2020-04-24 13:55:54 -06:00
}
pub async fn fetch_webfinger_url(
mention: &MentionData,
client: &Client,
) -> Result<String, LemmyError> {
let fetch_url = format!(
"{}://{}/.well-known/webfinger?resource=acct:{}@{}",
get_apub_protocol_string(),
mention.domain,
mention.name,
mention.domain
);
debug!("Fetching webfinger url: {}", &fetch_url);
let mut response = retry(|| client.get(&fetch_url).send()).await?;
let res: WebFingerResponse = response
.json()
.await
.map_err(|e| RecvError(e.to_string()))?;
let link = res
.links
.iter()
.find(|l| l.type_.eq(&Some("application/activity+json".to_string())))
.ok_or_else(|| format_err!("No application/activity+json link found."))?;
link
.href
.to_owned()
.ok_or_else(|| format_err!("No href found.").into())
}