2024-03-26 19:27:35 +01:00
|
|
|
use std::collections::BTreeMap;
|
|
|
|
|
2024-03-25 05:07:58 +01:00
|
|
|
use base64::Engine;
|
2024-03-26 19:27:35 +01:00
|
|
|
use http_signature_normalization::Config;
|
|
|
|
use openssl::{hash::MessageDigest, pkey::{PKey, Private}, sign::Signer};
|
2024-03-26 03:41:17 +01:00
|
|
|
use reqwest::header::{CONTENT_TYPE, USER_AGENT};
|
2024-03-26 19:27:35 +01:00
|
|
|
use sea_orm::{ColumnTrait, Condition, DatabaseConnection, EntityTrait, Order, QueryFilter, QueryOrder};
|
2024-03-25 05:07:58 +01:00
|
|
|
use tokio::task::JoinHandle;
|
|
|
|
|
2024-03-26 19:27:35 +01:00
|
|
|
use crate::{activitypub::{activity::ap_activity, object::ap_object, user::outbox::UpubError}, activitystream::{object::activity::ActivityMut, Node}, model, server::Context, VERSION};
|
2024-03-25 05:07:58 +01:00
|
|
|
|
|
|
|
pub struct Dispatcher;
|
|
|
|
|
|
|
|
impl Dispatcher {
|
2024-03-26 03:11:59 +01:00
|
|
|
pub fn spawn(db: DatabaseConnection, domain: String, poll_interval: u64) -> JoinHandle<()> {
|
2024-03-25 05:07:58 +01:00
|
|
|
tokio::spawn(async move {
|
2024-03-26 03:11:59 +01:00
|
|
|
if let Err(e) = worker(db, domain, poll_interval).await {
|
|
|
|
tracing::error!("delivery worker exited with error: {e}");
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 03:11:59 +01:00
|
|
|
async fn worker(db: DatabaseConnection, domain: String, poll_interval: u64) -> Result<(), UpubError> {
|
|
|
|
loop {
|
|
|
|
let Some(delivery) = model::delivery::Entity::find()
|
|
|
|
.filter(Condition::all().add(model::delivery::Column::NotBefore.lte(chrono::Utc::now())))
|
|
|
|
.order_by(model::delivery::Column::NotBefore, Order::Asc)
|
|
|
|
.one(&db)
|
|
|
|
.await?
|
2024-03-26 23:53:44 +01:00
|
|
|
else {
|
|
|
|
tokio::time::sleep(std::time::Duration::from_secs(poll_interval)).await;
|
|
|
|
continue
|
|
|
|
};
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 03:11:59 +01:00
|
|
|
let del_row = model::delivery::ActiveModel {
|
|
|
|
id: sea_orm::ActiveValue::Set(delivery.id),
|
|
|
|
..Default::default()
|
|
|
|
};
|
|
|
|
let del = model::delivery::Entity::delete(del_row)
|
|
|
|
.exec(&db)
|
|
|
|
.await?;
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 03:11:59 +01:00
|
|
|
if del.rows_affected == 0 {
|
|
|
|
// another worker claimed this delivery
|
|
|
|
continue; // go back to the top
|
|
|
|
}
|
|
|
|
if delivery.expired() {
|
|
|
|
// try polling for another one
|
|
|
|
continue; // go back to top
|
|
|
|
}
|
2024-03-26 01:14:43 +01:00
|
|
|
|
2024-03-26 03:11:59 +01:00
|
|
|
tracing::info!("delivering {} to {}", delivery.activity, delivery.target);
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 19:27:35 +01:00
|
|
|
let payload = match model::activity::Entity::find_by_id(&delivery.activity)
|
2024-03-26 03:11:59 +01:00
|
|
|
.find_also_related(model::object::Entity)
|
|
|
|
.one(&db)
|
|
|
|
.await? // TODO probably should not fail here and at least re-insert the delivery
|
|
|
|
{
|
|
|
|
Some((activity, Some(object))) => ap_activity(activity).set_object(Node::object(ap_object(object))),
|
|
|
|
Some((activity, None)) => ap_activity(activity),
|
|
|
|
None => {
|
|
|
|
tracing::warn!("skipping dispatch for deleted object {}", delivery.activity);
|
|
|
|
continue;
|
|
|
|
},
|
|
|
|
};
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 03:21:00 +01:00
|
|
|
let Some(model::user::Model{ private_key: Some(key), .. }) = model::user::Entity::find_by_id(&delivery.actor)
|
|
|
|
.one(&db).await?
|
2024-03-26 03:11:59 +01:00
|
|
|
else {
|
|
|
|
tracing::error!("can not dispatch activity for user without private key: {}", delivery.actor);
|
|
|
|
continue;
|
|
|
|
};
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 03:21:00 +01:00
|
|
|
let Ok(key) = PKey::private_key_from_pem(key.as_bytes())
|
2024-03-26 03:11:59 +01:00
|
|
|
else {
|
|
|
|
tracing::error!("failed parsing private key for user {}", delivery.actor);
|
|
|
|
continue;
|
|
|
|
};
|
2024-03-25 05:07:58 +01:00
|
|
|
|
2024-03-26 19:27:35 +01:00
|
|
|
if let Err(e) = deliver(&key, &delivery.target, &delivery.actor, payload, &domain).await {
|
2024-03-26 03:11:59 +01:00
|
|
|
tracing::warn!("failed delivery of {} to {} : {e}", delivery.activity, delivery.target);
|
|
|
|
let new_delivery = model::delivery::ActiveModel {
|
|
|
|
id: sea_orm::ActiveValue::NotSet,
|
|
|
|
not_before: sea_orm::ActiveValue::Set(delivery.next_delivery()),
|
|
|
|
actor: sea_orm::ActiveValue::Set(delivery.actor),
|
|
|
|
target: sea_orm::ActiveValue::Set(delivery.target),
|
|
|
|
activity: sea_orm::ActiveValue::Set(delivery.activity),
|
|
|
|
created: sea_orm::ActiveValue::Set(delivery.created),
|
|
|
|
attempt: sea_orm::ActiveValue::Set(delivery.attempt + 1),
|
|
|
|
};
|
|
|
|
model::delivery::Entity::insert(new_delivery).exec(&db).await?;
|
|
|
|
}
|
2024-03-25 05:07:58 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-03-26 19:27:35 +01:00
|
|
|
async fn deliver(key: &PKey<Private>, to: &str, from: &str, payload: serde_json::Value, domain: &str) -> Result<(), UpubError> {
|
|
|
|
let payload = serde_json::to_string(&payload).unwrap();
|
2024-03-26 21:48:39 +01:00
|
|
|
let digest = format!("sha-256={}", base64::prelude::BASE64_URL_SAFE.encode(openssl::sha::sha256(payload.as_bytes())));
|
2024-03-26 20:17:41 +01:00
|
|
|
let host = Context::server(to);
|
2024-03-27 02:06:51 +01:00
|
|
|
let date = chrono::Utc::now().format("%d %b %Y %H:%M:%S GMT").to_string(); // lmao @ "GMT"
|
2024-03-26 21:30:41 +01:00
|
|
|
let path = to.replace("https://", "").replace("http://", "").replace(&host, "");
|
2024-03-26 19:27:35 +01:00
|
|
|
|
2024-03-26 23:42:22 +01:00
|
|
|
tracing::info!("payload:\n{payload}\n{digest}");
|
2024-03-26 19:27:35 +01:00
|
|
|
|
2024-03-26 21:30:41 +01:00
|
|
|
// let headers : BTreeMap<String, String> = [
|
|
|
|
// ("Host".to_string(), host.clone()),
|
|
|
|
// ("Date".to_string(), date.clone()),
|
|
|
|
// ("Digest".to_string(), digest.clone()),
|
|
|
|
// ].into();
|
2024-03-26 19:27:35 +01:00
|
|
|
|
2024-03-26 21:24:10 +01:00
|
|
|
// let signature_header = Config::new()
|
|
|
|
// .dont_use_created_field()
|
|
|
|
// .require_header("host")
|
|
|
|
// .require_header("date")
|
|
|
|
// .require_header("digest")
|
|
|
|
// .begin_sign("POST", &path, headers)
|
|
|
|
// .unwrap()
|
|
|
|
// .sign(format!("{from}#main-key"), |to_sign| {
|
|
|
|
// tracing::info!("signing '{to_sign}'");
|
|
|
|
// let mut signer = Signer::new(MessageDigest::sha256(), key)?;
|
|
|
|
// signer.update(to_sign.as_bytes())?;
|
|
|
|
// let signature = base64::prelude::BASE64_URL_SAFE.encode(signer.sign_to_vec()?);
|
|
|
|
// Ok(signature) as Result<_, UpubError>
|
|
|
|
// })
|
|
|
|
// .unwrap()
|
|
|
|
// .signature_header();
|
|
|
|
|
|
|
|
let signature_header = {
|
2024-03-26 21:30:41 +01:00
|
|
|
let to_sign = format!("(request-target): post {path}\nhost: {host}\ndate: {date}\ndigest: {digest}");
|
|
|
|
tracing::info!("signing:\n{to_sign}");
|
2024-03-26 21:24:10 +01:00
|
|
|
let mut signer = Signer::new(MessageDigest::sha256(), key)?;
|
|
|
|
signer.update(to_sign.as_bytes())?;
|
2024-03-26 21:30:41 +01:00
|
|
|
let signature = base64::prelude::BASE64_URL_SAFE.encode(signer.sign_to_vec()?);
|
2024-03-26 23:42:22 +01:00
|
|
|
format!("keyId=\"{from}#main-key\",algorithm=\"rsa-sha256\",headers=\"(request-target) host date digest\",signature=\"{signature}\"")
|
2024-03-26 21:24:10 +01:00
|
|
|
};
|
2024-03-26 19:27:35 +01:00
|
|
|
|
2024-03-26 21:30:41 +01:00
|
|
|
tracing::info!("signature header:\n{signature_header}");
|
2024-03-26 21:02:07 +01:00
|
|
|
|
2024-03-26 03:05:43 +01:00
|
|
|
let res = reqwest::Client::new()
|
2024-03-26 19:27:35 +01:00
|
|
|
.post(to)
|
2024-03-26 20:17:41 +01:00
|
|
|
.header("Host", host)
|
2024-03-26 02:50:58 +01:00
|
|
|
.header("Date", date)
|
2024-03-26 05:25:35 +01:00
|
|
|
.header("Digest", digest)
|
2024-03-26 02:50:58 +01:00
|
|
|
.header("Signature", signature_header)
|
2024-03-26 21:02:07 +01:00
|
|
|
.header(CONTENT_TYPE, "application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\"")
|
2024-03-26 02:50:58 +01:00
|
|
|
.header(USER_AGENT, format!("upub+{VERSION} ({domain})")) // TODO put instance admin email
|
2024-03-26 19:27:35 +01:00
|
|
|
.body(payload)
|
2024-03-26 02:50:58 +01:00
|
|
|
.send()
|
2024-03-26 03:05:43 +01:00
|
|
|
.await?;
|
2024-03-27 00:24:14 +01:00
|
|
|
|
|
|
|
let status = res.status();
|
|
|
|
let txt = res.text().await?;
|
|
|
|
tracing::info!("delivery answer: {txt}");
|
|
|
|
if status.is_client_error() || status.is_server_error() {
|
|
|
|
Err(UpubError::Status(axum::http::StatusCode::from_u16(status.as_u16()).unwrap()))
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
2024-03-26 02:50:58 +01:00
|
|
|
}
|
|
|
|
|