2019-05-12 05:09:05 +02:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-02 06:08:45 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2019-05-12 05:09:05 +02:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
defmodule Pleroma.Web.ActivityPub.Publisher do
|
|
|
|
alias Pleroma.Activity
|
2019-05-12 06:00:55 +02:00
|
|
|
alias Pleroma.Config
|
2019-09-13 10:36:49 +02:00
|
|
|
alias Pleroma.Delivery
|
2019-05-25 06:24:21 +02:00
|
|
|
alias Pleroma.HTTP
|
2019-05-12 05:09:05 +02:00
|
|
|
alias Pleroma.Instances
|
2019-09-13 10:36:49 +02:00
|
|
|
alias Pleroma.Object
|
2019-12-13 12:27:10 +01:00
|
|
|
alias Pleroma.Repo
|
2019-05-12 05:09:05 +02:00
|
|
|
alias Pleroma.User
|
2019-05-12 06:00:55 +02:00
|
|
|
alias Pleroma.Web.ActivityPub.Relay
|
2019-05-12 05:09:05 +02:00
|
|
|
alias Pleroma.Web.ActivityPub.Transmogrifier
|
2020-09-18 13:58:22 +02:00
|
|
|
alias Pleroma.Web.FedSockets
|
2019-05-12 05:09:05 +02:00
|
|
|
|
2019-07-29 04:43:19 +02:00
|
|
|
require Pleroma.Constants
|
|
|
|
|
2019-05-12 05:09:05 +02:00
|
|
|
import Pleroma.Web.ActivityPub.Visibility
|
|
|
|
|
|
|
|
@behaviour Pleroma.Web.Federator.Publisher
|
|
|
|
|
|
|
|
require Logger
|
|
|
|
|
|
|
|
@moduledoc """
|
|
|
|
ActivityPub outgoing federation module.
|
|
|
|
"""
|
|
|
|
|
|
|
|
@doc """
|
|
|
|
Determine if an activity can be represented by running it through Transmogrifier.
|
|
|
|
"""
|
|
|
|
def is_representable?(%Activity{} = activity) do
|
2019-05-12 07:01:00 +02:00
|
|
|
with {:ok, _data} <- Transmogrifier.prepare_outgoing(activity.data) do
|
2019-05-12 05:09:05 +02:00
|
|
|
true
|
|
|
|
else
|
2019-05-12 07:01:00 +02:00
|
|
|
_e ->
|
|
|
|
false
|
2019-05-12 05:09:05 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
@doc """
|
|
|
|
Publish a single message to a peer. Takes a struct with the following
|
|
|
|
parameters set:
|
|
|
|
|
|
|
|
* `inbox`: the inbox to publish to
|
|
|
|
* `json`: the JSON message body representing the ActivityPub message
|
|
|
|
* `actor`: the actor which is signing the message
|
|
|
|
* `id`: the ActivityStreams URI of the message
|
|
|
|
"""
|
|
|
|
def publish_one(%{inbox: inbox, json: json, actor: %User{} = actor, id: id} = params) do
|
2019-12-10 09:08:57 +01:00
|
|
|
Logger.debug("Federating #{id} to #{inbox}")
|
2020-07-14 20:44:08 +02:00
|
|
|
|
2020-09-18 13:58:22 +02:00
|
|
|
case FedSockets.get_or_create_fed_socket(inbox) do
|
|
|
|
{:ok, fedsocket} ->
|
|
|
|
Logger.debug("publishing via fedsockets - #{inspect(inbox)}")
|
|
|
|
FedSockets.publish(fedsocket, json)
|
2019-05-12 05:09:05 +02:00
|
|
|
|
2020-09-18 13:58:22 +02:00
|
|
|
_ ->
|
|
|
|
Logger.debug("publishing via http - #{inspect(inbox)}")
|
|
|
|
http_publish(inbox, actor, json, params)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def publish_one(%{actor_id: actor_id} = params) do
|
|
|
|
actor = User.get_cached_by_id(actor_id)
|
|
|
|
|
|
|
|
params
|
|
|
|
|> Map.delete(:actor_id)
|
|
|
|
|> Map.put(:actor, actor)
|
|
|
|
|> publish_one()
|
|
|
|
end
|
|
|
|
|
|
|
|
defp http_publish(inbox, actor, json, params) do
|
|
|
|
uri = %{path: path} = URI.parse(inbox)
|
2019-05-12 05:09:05 +02:00
|
|
|
digest = "SHA-256=" <> (:crypto.hash(:sha256, json) |> Base.encode64())
|
|
|
|
|
2019-08-22 21:39:06 +02:00
|
|
|
date = Pleroma.Signature.signed_date()
|
2019-05-12 05:09:05 +02:00
|
|
|
|
|
|
|
signature =
|
2019-05-14 22:03:13 +02:00
|
|
|
Pleroma.Signature.sign(actor, %{
|
2020-09-18 13:58:22 +02:00
|
|
|
"(request-target)": "post #{path}",
|
2020-07-14 20:44:08 +02:00
|
|
|
host: signature_host(uri),
|
2019-05-12 05:09:05 +02:00
|
|
|
"content-length": byte_size(json),
|
|
|
|
digest: digest,
|
|
|
|
date: date
|
|
|
|
})
|
|
|
|
|
|
|
|
with {:ok, %{status: code}} when code in 200..299 <-
|
|
|
|
result =
|
2019-05-25 06:24:21 +02:00
|
|
|
HTTP.post(
|
2019-05-12 05:09:05 +02:00
|
|
|
inbox,
|
|
|
|
json,
|
|
|
|
[
|
|
|
|
{"Content-Type", "application/activity+json"},
|
|
|
|
{"Date", date},
|
|
|
|
{"signature", signature},
|
|
|
|
{"digest", digest}
|
|
|
|
]
|
|
|
|
) do
|
2020-07-14 20:44:08 +02:00
|
|
|
if not Map.has_key?(params, :unreachable_since) || params[:unreachable_since] do
|
|
|
|
Instances.set_reachable(inbox)
|
|
|
|
end
|
2019-05-12 05:09:05 +02:00
|
|
|
|
|
|
|
result
|
|
|
|
else
|
|
|
|
{_post_result, response} ->
|
|
|
|
unless params[:unreachable_since], do: Instances.set_unreachable(inbox)
|
|
|
|
{:error, response}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-07-14 20:44:08 +02:00
|
|
|
defp signature_host(%URI{port: port, scheme: scheme, host: host}) do
|
|
|
|
if port == URI.default_port(scheme) do
|
|
|
|
host
|
|
|
|
else
|
|
|
|
"#{host}:#{port}"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-12 05:09:05 +02:00
|
|
|
defp should_federate?(inbox, public) do
|
|
|
|
if public do
|
|
|
|
true
|
|
|
|
else
|
2019-07-22 16:33:58 +02:00
|
|
|
%{host: host} = URI.parse(inbox)
|
|
|
|
|
|
|
|
quarantined_instances =
|
|
|
|
Config.get([:instance, :quarantined_instances], [])
|
|
|
|
|> Pleroma.Web.ActivityPub.MRF.subdomains_regex()
|
|
|
|
|
|
|
|
!Pleroma.Web.ActivityPub.MRF.subdomain_match?(quarantined_instances, host)
|
2019-05-12 05:09:05 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-23 21:15:48 +02:00
|
|
|
@spec recipients(User.t(), Activity.t()) :: list(User.t()) | []
|
2019-05-14 14:00:07 +02:00
|
|
|
defp recipients(actor, activity) do
|
2019-09-24 09:16:52 +02:00
|
|
|
followers =
|
2019-05-12 05:09:05 +02:00
|
|
|
if actor.follower_address in activity.recipients do
|
2019-07-23 21:15:48 +02:00
|
|
|
User.get_external_followers(actor)
|
2019-05-12 05:09:05 +02:00
|
|
|
else
|
2019-09-24 09:16:52 +02:00
|
|
|
[]
|
2019-05-12 05:09:05 +02:00
|
|
|
end
|
|
|
|
|
2019-09-13 10:36:49 +02:00
|
|
|
fetchers =
|
|
|
|
with %Activity{data: %{"type" => "Delete"}} <- activity,
|
|
|
|
%Object{id: object_id} <- Object.normalize(activity),
|
|
|
|
fetchers <- User.get_delivered_users_by_object_id(object_id),
|
|
|
|
_ <- Delivery.delete_all_by_object_id(object_id) do
|
|
|
|
fetchers
|
|
|
|
else
|
|
|
|
_ ->
|
|
|
|
[]
|
|
|
|
end
|
|
|
|
|
2019-10-18 01:05:45 +02:00
|
|
|
Pleroma.Web.Federator.Publisher.remote_users(actor, activity) ++ followers ++ fetchers
|
2019-05-14 14:00:07 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
defp get_cc_ap_ids(ap_id, recipients) do
|
|
|
|
host = Map.get(URI.parse(ap_id), :host)
|
|
|
|
|
|
|
|
recipients
|
|
|
|
|> Enum.filter(fn %User{ap_id: ap_id} -> Map.get(URI.parse(ap_id), :host) == host end)
|
|
|
|
|> Enum.map(& &1.ap_id)
|
|
|
|
end
|
|
|
|
|
2020-04-01 07:47:07 +02:00
|
|
|
defp maybe_use_sharedinbox(%User{shared_inbox: nil, inbox: inbox}), do: inbox
|
|
|
|
defp maybe_use_sharedinbox(%User{shared_inbox: shared_inbox}), do: shared_inbox
|
2019-07-22 04:18:45 +02:00
|
|
|
|
|
|
|
@doc """
|
|
|
|
Determine a user inbox to use based on heuristics. These heuristics
|
|
|
|
are based on an approximation of the ``sharedInbox`` rules in the
|
|
|
|
[ActivityPub specification][ap-sharedinbox].
|
|
|
|
|
|
|
|
Please do not edit this function (or its children) without reading
|
|
|
|
the spec, as editing the code is likely to introduce some breakage
|
|
|
|
without some familiarity.
|
|
|
|
|
|
|
|
[ap-sharedinbox]: https://www.w3.org/TR/activitypub/#shared-inbox-delivery
|
|
|
|
"""
|
|
|
|
def determine_inbox(
|
|
|
|
%Activity{data: activity_data},
|
2020-04-01 07:47:07 +02:00
|
|
|
%User{inbox: inbox} = user
|
2019-07-22 04:18:45 +02:00
|
|
|
) do
|
|
|
|
to = activity_data["to"] || []
|
|
|
|
cc = activity_data["cc"] || []
|
|
|
|
type = activity_data["type"]
|
|
|
|
|
|
|
|
cond do
|
|
|
|
type == "Delete" ->
|
|
|
|
maybe_use_sharedinbox(user)
|
|
|
|
|
2019-07-29 04:43:19 +02:00
|
|
|
Pleroma.Constants.as_public() in to || Pleroma.Constants.as_public() in cc ->
|
2019-07-22 04:18:45 +02:00
|
|
|
maybe_use_sharedinbox(user)
|
|
|
|
|
|
|
|
length(to) + length(cc) > 1 ->
|
|
|
|
maybe_use_sharedinbox(user)
|
|
|
|
|
|
|
|
true ->
|
2020-04-01 07:47:07 +02:00
|
|
|
inbox
|
2019-07-22 04:18:45 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-14 14:00:07 +02:00
|
|
|
@doc """
|
|
|
|
Publishes an activity with BCC to all relevant peers.
|
|
|
|
"""
|
|
|
|
|
2019-08-01 16:28:00 +02:00
|
|
|
def publish(%User{} = actor, %{data: %{"bcc" => bcc}} = activity)
|
|
|
|
when is_list(bcc) and bcc != [] do
|
2019-05-14 14:00:07 +02:00
|
|
|
public = is_public?(activity)
|
|
|
|
{:ok, data} = Transmogrifier.prepare_outgoing(activity.data)
|
|
|
|
|
|
|
|
recipients = recipients(actor, activity)
|
|
|
|
|
2019-12-13 12:27:10 +01:00
|
|
|
inboxes =
|
|
|
|
recipients
|
|
|
|
|> Enum.filter(&User.ap_enabled?/1)
|
2020-04-01 07:47:07 +02:00
|
|
|
|> Enum.map(fn actor -> actor.inbox end)
|
2019-12-13 12:27:10 +01:00
|
|
|
|> Enum.filter(fn inbox -> should_federate?(inbox, public) end)
|
|
|
|
|> Instances.filter_reachable()
|
|
|
|
|
|
|
|
Repo.checkout(fn ->
|
|
|
|
Enum.each(inboxes, fn {inbox, unreachable_since} ->
|
2020-04-01 07:47:07 +02:00
|
|
|
%User{ap_id: ap_id} = Enum.find(recipients, fn actor -> actor.inbox == inbox end)
|
2019-12-13 12:27:10 +01:00
|
|
|
|
|
|
|
# Get all the recipients on the same host and add them to cc. Otherwise, a remote
|
|
|
|
# instance would only accept a first message for the first recipient and ignore the rest.
|
|
|
|
cc = get_cc_ap_ids(ap_id, recipients)
|
|
|
|
|
|
|
|
json =
|
|
|
|
data
|
|
|
|
|> Map.put("cc", cc)
|
|
|
|
|> Jason.encode!()
|
|
|
|
|
|
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(__MODULE__, %{
|
|
|
|
inbox: inbox,
|
|
|
|
json: json,
|
|
|
|
actor_id: actor.id,
|
|
|
|
id: activity.data["id"],
|
|
|
|
unreachable_since: unreachable_since
|
|
|
|
})
|
|
|
|
end)
|
2019-05-14 14:00:07 +02:00
|
|
|
end)
|
|
|
|
end
|
|
|
|
|
2020-10-22 22:33:52 +02:00
|
|
|
# Publishes an activity to all relevant peers.
|
2019-05-14 14:00:07 +02:00
|
|
|
def publish(%User{} = actor, %Activity{} = activity) do
|
2019-05-12 05:09:05 +02:00
|
|
|
public = is_public?(activity)
|
|
|
|
|
2019-05-12 06:00:55 +02:00
|
|
|
if public && Config.get([:instance, :allow_relay]) do
|
2019-12-11 11:46:07 +01:00
|
|
|
Logger.debug(fn -> "Relaying #{activity.data["id"]} out" end)
|
2019-05-12 06:00:55 +02:00
|
|
|
Relay.publish(activity)
|
|
|
|
end
|
|
|
|
|
2019-05-12 05:09:05 +02:00
|
|
|
{:ok, data} = Transmogrifier.prepare_outgoing(activity.data)
|
|
|
|
json = Jason.encode!(data)
|
|
|
|
|
2019-05-14 14:00:07 +02:00
|
|
|
recipients(actor, activity)
|
2019-05-12 05:09:05 +02:00
|
|
|
|> Enum.filter(fn user -> User.ap_enabled?(user) end)
|
2019-07-22 04:18:45 +02:00
|
|
|
|> Enum.map(fn %User{} = user ->
|
|
|
|
determine_inbox(activity, user)
|
2019-05-12 05:09:05 +02:00
|
|
|
end)
|
|
|
|
|> Enum.uniq()
|
|
|
|
|> Enum.filter(fn inbox -> should_federate?(inbox, public) end)
|
|
|
|
|> Instances.filter_reachable()
|
|
|
|
|> Enum.each(fn {inbox, unreachable_since} ->
|
|
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(
|
|
|
|
__MODULE__,
|
|
|
|
%{
|
|
|
|
inbox: inbox,
|
|
|
|
json: json,
|
2019-08-01 16:28:00 +02:00
|
|
|
actor_id: actor.id,
|
2019-05-12 05:09:05 +02:00
|
|
|
id: activity.data["id"],
|
|
|
|
unreachable_since: unreachable_since
|
|
|
|
}
|
|
|
|
)
|
|
|
|
end)
|
|
|
|
end
|
2019-05-12 21:05:03 +02:00
|
|
|
|
|
|
|
def gather_webfinger_links(%User{} = user) do
|
|
|
|
[
|
|
|
|
%{"rel" => "self", "type" => "application/activity+json", "href" => user.ap_id},
|
|
|
|
%{
|
|
|
|
"rel" => "self",
|
|
|
|
"type" => "application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\"",
|
|
|
|
"href" => user.ap_id
|
2019-12-20 14:33:44 +01:00
|
|
|
},
|
|
|
|
%{
|
|
|
|
"rel" => "http://ostatus.org/schema/1.0/subscribe",
|
|
|
|
"template" => "#{Pleroma.Web.base_url()}/ostatus_subscribe?acct={uri}"
|
2019-05-12 21:05:03 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
end
|
2019-05-12 21:15:29 +02:00
|
|
|
|
|
|
|
def gather_nodeinfo_protocol_names, do: ["activitypub"]
|
2019-05-12 05:09:05 +02:00
|
|
|
end
|