Improve api for send_activity()

This commit is contained in:
Felix Ableitner 2022-06-03 14:00:16 +02:00
parent d7e401eeed
commit 68e4cce4ec
7 changed files with 118 additions and 95 deletions

16
Cargo.lock generated
View file

@ -20,6 +20,7 @@ dependencies = [
"http", "http",
"http-signature-normalization-actix", "http-signature-normalization-actix",
"http-signature-normalization-reqwest", "http-signature-normalization-reqwest",
"itertools",
"once_cell", "once_cell",
"openssl", "openssl",
"rand", "rand",
@ -520,6 +521,12 @@ version = "1.0.4"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "8c97b9233581d84b8e1e689cdd3a47b6f69770084fc246e86a7f78b0d9c1d4a5" checksum = "8c97b9233581d84b8e1e689cdd3a47b6f69770084fc246e86a7f78b0d9c1d4a5"
[[package]]
name = "either"
version = "1.6.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "e78d4f1cc4ae33bbfc157ed5d5a5ef3bc29227303d595861deb238fcec4e9457"
[[package]] [[package]]
name = "encoding_rs" name = "encoding_rs"
version = "0.8.31" version = "0.8.31"
@ -899,6 +906,15 @@ version = "2.5.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "879d54834c8c76457ef4293a689b2a8c59b076067ad77b15efafbb05f92a592b" checksum = "879d54834c8c76457ef4293a689b2a8c59b076067ad77b15efafbb05f92a592b"
[[package]]
name = "itertools"
version = "0.10.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "a9a9d19fa1e79b6215ff29b9d6880b706147f16e9b1dbb1e4e5947b5b02bc5e3"
dependencies = [
"either",
]
[[package]] [[package]]
name = "itoa" name = "itoa"
version = "1.0.2" version = "1.0.2"

View file

@ -31,6 +31,7 @@ http-signature-normalization-reqwest = { version = "0.5.0", default-features = f
background-jobs = "0.12.0" background-jobs = "0.12.0"
thiserror = "1.0.31" thiserror = "1.0.31"
derive_builder = "0.11.2" derive_builder = "0.11.2"
itertools = "0.10.3"
[dev-dependencies] [dev-dependencies]
activitystreams-kinds = "0.2.1" activitystreams-kinds = "0.2.1"

View file

@ -73,12 +73,7 @@ impl ActivityHandler for Follow {
let id = generate_object_id(data.local_instance().hostname())?; let id = generate_object_id(data.local_instance().hostname())?;
let accept = Accept::new(local_user.ap_id.clone(), self, id.clone()); let accept = Accept::new(local_user.ap_id.clone(), self, id.clone());
local_user local_user
.send( .send(accept, &[follower], data.local_instance())
id,
accept,
vec![follower.inbox.clone()],
data.local_instance(),
)
.await?; .await?;
Ok(()) Ok(())
} }

View file

@ -7,19 +7,17 @@ use crate::{
}; };
use activitypub_federation::{ use activitypub_federation::{
core::{ core::{
activity_queue::SendActivity, activity_queue::send_activity,
inbox::ActorPublicKey,
object_id::ObjectId, object_id::ObjectId,
signatures::{Keypair, PublicKey}, signatures::{Keypair, PublicKey},
}, },
deser::context::WithContext, deser::context::WithContext,
traits::ApubObject, traits::{ActivityHandler, Actor, ApubObject},
LocalInstance, LocalInstance,
}; };
use activitypub_federation_derive::activity_handler; use activitypub_federation_derive::activity_handler;
use activitystreams_kinds::actor::PersonType; use activitystreams_kinds::actor::PersonType;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use tracing::log::debug;
use url::Url; use url::Url;
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
@ -86,48 +84,45 @@ impl MyUser {
pub async fn follow(&self, other: &MyUser, instance: &InstanceHandle) -> Result<(), Error> { pub async fn follow(&self, other: &MyUser, instance: &InstanceHandle) -> Result<(), Error> {
let id = generate_object_id(instance.local_instance().hostname())?; let id = generate_object_id(instance.local_instance().hostname())?;
let follow = Follow::new(self.ap_id.clone(), other.ap_id.clone(), id.clone()); let follow = Follow::new(self.ap_id.clone(), other.ap_id.clone(), id.clone());
self.send( self.send(follow, &[other.clone()], instance.local_instance())
id, .await?;
follow,
vec![other.inbox.clone()],
instance.local_instance(),
)
.await?;
Ok(()) Ok(())
} }
pub async fn post(&self, post: MyPost, instance: &InstanceHandle) -> Result<(), Error> { pub async fn post(&self, post: MyPost, instance: &InstanceHandle) -> Result<(), Error> {
let id = generate_object_id(instance.local_instance().hostname())?; let id = generate_object_id(instance.local_instance().hostname())?;
let create = CreateNote::new(post.into_apub(instance).await?, id.clone()); let create = CreateNote::new(post.into_apub(instance).await?, id.clone());
let mut inboxes = vec![]; let mut recipients = vec![];
for f in self.followers.clone() { for f in self.followers.clone() {
let user: MyUser = ObjectId::new(f) let user: MyUser = ObjectId::new(f)
.dereference(instance, instance.local_instance(), &mut 0) .dereference(instance, instance.local_instance(), &mut 0)
.await?; .await?;
inboxes.push(user.inbox); recipients.push(user);
} }
self.send(id, &create, inboxes, instance.local_instance()) self.send(create, &recipients, instance.local_instance())
.await?; .await?;
Ok(()) Ok(())
} }
pub(crate) async fn send<Activity: Serialize>( pub(crate) async fn send<Activity, ActorT>(
&self, &self,
activity_id: Url,
activity: Activity, activity: Activity,
inboxes: Vec<Url>, recipients: &[ActorT],
local_instance: &LocalInstance, local_instance: &LocalInstance,
) -> Result<(), Error> { ) -> Result<(), <Activity as ActivityHandler>::Error>
let serialized = serde_json::to_string_pretty(&WithContext::new_default(activity))?; where
debug!("Sending activity: {}", &serialized); Activity: ActivityHandler + Serialize,
SendActivity { ActorT: Actor,
activity_id, <Activity as ActivityHandler>::Error: From<anyhow::Error> + From<serde_json::Error>,
actor_public_key: self.public_key(), {
actor_private_key: self.private_key.clone().expect("has private key"), let activity = WithContext::new_default(activity);
inboxes, send_activity(
activity: serialized, activity,
} self.public_key(),
.send(local_instance) self.private_key.clone().expect("has private key"),
recipients,
local_instance,
)
.await?; .await?;
Ok(()) Ok(())
} }
@ -186,8 +181,12 @@ impl ApubObject for MyUser {
} }
} }
impl ActorPublicKey for MyUser { impl Actor for MyUser {
fn public_key(&self) -> &str { fn public_key(&self) -> &str {
&self.public_key &self.public_key
} }
fn inbox(&self) -> Url {
self.inbox.clone()
}
} }

View file

@ -1,5 +1,6 @@
use crate::{ use crate::{
core::signatures::{sign_request, PublicKey}, core::signatures::{sign_request, PublicKey},
traits::{ActivityHandler, Actor},
utils::verify_url_valid, utils::verify_url_valid,
Error, Error,
InstanceSettings, InstanceSettings,
@ -16,70 +17,78 @@ use background_jobs::{
WorkerConfig, WorkerConfig,
}; };
use http::{header::HeaderName, HeaderMap, HeaderValue}; use http::{header::HeaderName, HeaderMap, HeaderValue};
use itertools::Itertools;
use reqwest_middleware::ClientWithMiddleware; use reqwest_middleware::ClientWithMiddleware;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use std::{fmt::Debug, future::Future, pin::Pin, time::Duration}; use std::{fmt::Debug, future::Future, pin::Pin, time::Duration};
use tracing::{info, warn}; use tracing::{info, warn};
use url::Url; use url::Url;
/// Necessary data for sending out an activity /// Send out the given activity to all inboxes, automatically generating the HTTP signatures. By
#[derive(Debug)] /// default, sending is done on a background thread, and automatically retried on failure with
pub struct SendActivity { /// exponential backoff.
/// Id of the sent activity, used for logging ///
pub activity_id: Url, /// - `activity`: The activity to be sent, gets converted to json
/// Public key and actor id of the sender /// - `public_key`: The sending actor's public key. In fact, we only need the key id for signing
pub actor_public_key: PublicKey, /// - `private_key`: The sending actor's private key for signing HTTP signature
/// Signing key of sender for HTTP signatures /// - `recipients`: List of actors who should receive the activity. This gets deduplicated, and
pub actor_private_key: String, /// local/invalid inbox urls removed
/// List of Activitypub inboxes that the activity gets delivered to pub async fn send_activity<Activity, ActorT: Actor>(
pub inboxes: Vec<Url>, activity: Activity,
/// Activity json public_key: PublicKey,
pub activity: String, private_key: String,
} recipients: &[ActorT],
instance: &LocalInstance,
) -> Result<(), <Activity as ActivityHandler>::Error>
where
Activity: ActivityHandler + Serialize,
ActorT: Actor,
<Activity as ActivityHandler>::Error: From<anyhow::Error> + From<serde_json::Error>,
{
let activity_id = activity.id();
let activity_serialized = serde_json::to_string_pretty(&activity)?;
let inboxes: Vec<Url> = recipients
.iter()
.map(|r| r.inbox())
.unique()
.filter(|i| !instance.is_local_url(i))
.filter(|i| verify_url_valid(i, &instance.settings).is_ok())
.collect();
impl SendActivity { let activity_queue = &instance.activity_queue;
/// Send out the given activity to all inboxes, automatically generating the HTTP signatures. By for inbox in inboxes {
/// default, sending is done on a background thread, and automatically retried on failure with if verify_url_valid(&inbox, &instance.settings).is_err() {
/// exponential backoff. continue;
/// }
/// For debugging or testing, you might want to set [[InstanceSettings.testing_send_sync]]. let message = SendActivityTask {
pub async fn send(self, instance: &LocalInstance) -> Result<(), Error> { activity_id: activity_id.clone(),
let activity_queue = &instance.activity_queue; inbox,
for inbox in self.inboxes { activity: activity_serialized.clone(),
if verify_url_valid(&inbox, &instance.settings).is_err() { public_key: public_key.clone(),
continue; private_key: private_key.clone(),
};
if instance.settings.debug {
let res = do_send(message, &instance.client, instance.settings.request_timeout).await;
// Don't fail on error, as we intentionally do some invalid actions in tests, to verify that
// they are rejected on the receiving side. These errors shouldn't bubble up to make the API
// call fail. This matches the behaviour in production.
if let Err(e) = res {
warn!("{}", e);
} }
let message = SendActivityTask { } else {
activity_id: self.activity_id.clone(), activity_queue.queue::<SendActivityTask>(message).await?;
inbox, let stats = activity_queue.get_stats().await?;
activity: self.activity.clone(), info!(
public_key: self.actor_public_key.clone(),
private_key: self.actor_private_key.clone(),
};
if instance.settings.debug {
let res =
do_send(message, &instance.client, instance.settings.request_timeout).await;
// Don't fail on error, as we intentionally do some invalid actions in tests, to verify that
// they are rejected on the receiving side. These errors shouldn't bubble up to make the API
// call fail. This matches the behaviour in production.
if let Err(e) = res {
warn!("{}", e);
}
} else {
activity_queue.queue::<SendActivityTask>(message).await?;
let stats = activity_queue.get_stats().await?;
info!(
"Activity queue stats: pending: {}, running: {}, dead (this hour): {}, complete (this hour): {}", "Activity queue stats: pending: {}, running: {}, dead (this hour): {}, complete (this hour): {}",
stats.pending, stats.pending,
stats.running, stats.running,
stats.dead.this_hour(), stats.dead.this_hour(),
stats.complete.this_hour() stats.complete.this_hour()
); );
}
} }
Ok(())
} }
Ok(())
} }
#[derive(Clone, Debug, Deserialize, Serialize)] #[derive(Clone, Debug, Deserialize, Serialize)]

View file

@ -1,7 +1,7 @@
use crate::{ use crate::{
core::{object_id::ObjectId, signatures::verify_signature}, core::{object_id::ObjectId, signatures::verify_signature},
data::Data, data::Data,
traits::{ActivityHandler, ApubObject}, traits::{ActivityHandler, Actor, ApubObject},
utils::{verify_domains_match, verify_url_valid}, utils::{verify_domains_match, verify_url_valid},
Error, Error,
LocalInstance, LocalInstance,
@ -10,13 +10,8 @@ use actix_web::{HttpRequest, HttpResponse};
use serde::de::DeserializeOwned; use serde::de::DeserializeOwned;
use tracing::log::debug; use tracing::log::debug;
pub trait ActorPublicKey {
/// Returns the actor's public key for verification of HTTP signatures
fn public_key(&self) -> &str;
}
/// Receive an activity and perform some basic checks, including HTTP signature verification. /// Receive an activity and perform some basic checks, including HTTP signature verification.
pub async fn receive_activity<Activity, Actor, Datatype>( pub async fn receive_activity<Activity, ActorT, Datatype>(
request: HttpRequest, request: HttpRequest,
activity: Activity, activity: Activity,
local_instance: &LocalInstance, local_instance: &LocalInstance,
@ -24,11 +19,11 @@ pub async fn receive_activity<Activity, Actor, Datatype>(
) -> Result<HttpResponse, <Activity as ActivityHandler>::Error> ) -> Result<HttpResponse, <Activity as ActivityHandler>::Error>
where where
Activity: ActivityHandler<DataType = Datatype> + DeserializeOwned + Send + 'static, Activity: ActivityHandler<DataType = Datatype> + DeserializeOwned + Send + 'static,
Actor: ApubObject<DataType = Datatype> + ActorPublicKey + Send + 'static, ActorT: ApubObject<DataType = Datatype> + Actor + Send + 'static,
for<'de2> <Actor as ApubObject>::ApubType: serde::Deserialize<'de2>, for<'de2> <ActorT as ApubObject>::ApubType: serde::Deserialize<'de2>,
<Activity as ActivityHandler>::Error: <Activity as ActivityHandler>::Error:
From<anyhow::Error> + From<Error> + From<<Actor as ApubObject>::Error>, From<anyhow::Error> + From<Error> + From<<ActorT as ApubObject>::Error>,
<Actor as ApubObject>::Error: From<Error> + From<anyhow::Error>, <ActorT as ApubObject>::Error: From<Error> + From<anyhow::Error>,
{ {
verify_domains_match(activity.id(), activity.actor())?; verify_domains_match(activity.id(), activity.actor())?;
verify_url_valid(activity.id(), &local_instance.settings)?; verify_url_valid(activity.id(), &local_instance.settings)?;
@ -37,7 +32,7 @@ where
} }
let request_counter = &mut 0; let request_counter = &mut 0;
let actor = ObjectId::<Actor>::new(activity.actor().clone()) let actor = ObjectId::<ActorT>::new(activity.actor().clone())
.dereference(data, local_instance, request_counter) .dereference(data, local_instance, request_counter)
.await?; .await?;
verify_signature(&request, actor.public_key())?; verify_signature(&request, actor.public_key())?;

View file

@ -89,3 +89,11 @@ pub trait ApubObject {
where where
Self: Sized; Self: Sized;
} }
pub trait Actor: ApubObject {
/// Returns the actor's public key for verification of HTTP signatures
fn public_key(&self) -> &str;
/// The inbox or shared inbox where activities for this user should be sent to
fn inbox(&self) -> Url;
}