2023-01-01 19:38:14 +00:00
|
|
|
use std::collections::BTreeMap;
|
2022-07-24 21:19:17 +00:00
|
|
|
use std::time::Duration;
|
|
|
|
|
2021-11-17 21:35:17 +00:00
|
|
|
use actix_web::http::Method;
|
2022-10-19 18:39:47 +00:00
|
|
|
use reqwest::{Client, Proxy};
|
2021-10-30 22:35:18 +00:00
|
|
|
use rsa::RsaPrivateKey;
|
2022-07-13 23:40:33 +00:00
|
|
|
use serde::Serialize;
|
2022-12-04 22:31:02 +00:00
|
|
|
use serde_json::Value;
|
2022-07-24 21:19:17 +00:00
|
|
|
use tokio::time::sleep;
|
2021-10-30 22:35:18 +00:00
|
|
|
|
2022-07-14 10:18:03 +00:00
|
|
|
use crate::config::Instance;
|
2022-10-23 16:04:02 +00:00
|
|
|
use crate::http_signatures::create::{
|
|
|
|
create_http_signature,
|
|
|
|
HttpSignatureError,
|
|
|
|
};
|
2022-10-20 23:18:45 +00:00
|
|
|
use crate::json_signatures::create::{
|
2022-11-01 00:02:25 +00:00
|
|
|
is_object_signed,
|
2022-10-20 23:18:45 +00:00
|
|
|
sign_object,
|
|
|
|
JsonSignatureError,
|
|
|
|
};
|
2021-04-09 00:22:17 +00:00
|
|
|
use crate::models::users::types::User;
|
2022-11-13 18:43:57 +00:00
|
|
|
use crate::utils::crypto_rsa::deserialize_private_key;
|
2022-07-23 21:37:21 +00:00
|
|
|
use super::actors::types::Actor;
|
2022-10-01 16:56:57 +00:00
|
|
|
use super::constants::{AP_MEDIA_TYPE, ACTOR_KEY_SUFFIX};
|
2022-07-15 17:31:02 +00:00
|
|
|
use super::identifiers::local_actor_id;
|
2021-04-09 00:22:17 +00:00
|
|
|
|
|
|
|
#[derive(thiserror::Error, Debug)]
|
|
|
|
pub enum DelivererError {
|
|
|
|
#[error("key error")]
|
|
|
|
KeyDeserializationError(#[from] rsa::pkcs8::Error),
|
|
|
|
|
|
|
|
#[error(transparent)]
|
2022-10-23 16:04:02 +00:00
|
|
|
HttpSignatureError(#[from] HttpSignatureError),
|
2021-04-09 00:22:17 +00:00
|
|
|
|
2022-10-20 23:18:45 +00:00
|
|
|
#[error(transparent)]
|
|
|
|
JsonSignatureError(#[from] JsonSignatureError),
|
|
|
|
|
2021-04-09 00:22:17 +00:00
|
|
|
#[error("activity serialization error")]
|
|
|
|
SerializationError(#[from] serde_json::Error),
|
|
|
|
|
|
|
|
#[error(transparent)]
|
|
|
|
RequestError(#[from] reqwest::Error),
|
|
|
|
|
|
|
|
#[error("http error {0:?}")]
|
|
|
|
HttpError(reqwest::StatusCode),
|
|
|
|
}
|
|
|
|
|
2022-10-19 18:39:47 +00:00
|
|
|
fn build_client(instance: &Instance) -> reqwest::Result<Client> {
|
|
|
|
let mut client_builder = Client::builder();
|
|
|
|
if let Some(ref proxy_url) = instance.proxy_url {
|
|
|
|
let proxy = Proxy::all(proxy_url)?;
|
|
|
|
client_builder = client_builder.proxy(proxy);
|
|
|
|
};
|
|
|
|
client_builder.build()
|
|
|
|
}
|
|
|
|
|
2021-04-09 00:22:17 +00:00
|
|
|
async fn send_activity(
|
2021-11-18 14:56:52 +00:00
|
|
|
instance: &Instance,
|
2021-10-30 22:35:18 +00:00
|
|
|
actor_key: &RsaPrivateKey,
|
|
|
|
actor_key_id: &str,
|
|
|
|
activity_json: &str,
|
2021-04-09 00:22:17 +00:00
|
|
|
inbox_url: &str,
|
|
|
|
) -> Result<(), DelivererError> {
|
|
|
|
let headers = create_http_signature(
|
2021-11-17 21:35:17 +00:00
|
|
|
Method::POST,
|
2021-10-30 22:35:18 +00:00
|
|
|
inbox_url,
|
|
|
|
activity_json,
|
2021-04-09 00:22:17 +00:00
|
|
|
actor_key,
|
|
|
|
actor_key_id,
|
|
|
|
)?;
|
|
|
|
|
2022-10-19 18:39:47 +00:00
|
|
|
let client = build_client(instance)?;
|
2021-11-17 21:35:17 +00:00
|
|
|
let request = client.post(inbox_url)
|
|
|
|
.header("Host", headers.host)
|
|
|
|
.header("Date", headers.date)
|
|
|
|
.header("Digest", headers.digest.unwrap())
|
|
|
|
.header("Signature", headers.signature)
|
2022-10-01 16:56:57 +00:00
|
|
|
.header(reqwest::header::CONTENT_TYPE, AP_MEDIA_TYPE)
|
2022-02-08 19:51:40 +00:00
|
|
|
.header(reqwest::header::USER_AGENT, instance.agent())
|
2021-11-17 21:35:17 +00:00
|
|
|
.body(activity_json.to_owned());
|
|
|
|
|
2021-11-18 14:56:52 +00:00
|
|
|
if instance.is_private {
|
2021-12-31 15:29:44 +00:00
|
|
|
log::info!(
|
2021-11-18 14:56:52 +00:00
|
|
|
"private mode: not sending activity to {}",
|
|
|
|
inbox_url,
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
let response = request.send().await?;
|
|
|
|
let response_status = response.status();
|
2022-09-04 11:57:31 +00:00
|
|
|
let response_text: String = response.text().await?
|
|
|
|
.chars().take(30).collect();
|
2021-11-18 14:56:52 +00:00
|
|
|
log::info!(
|
2021-12-24 00:44:01 +00:00
|
|
|
"response from {}: {}",
|
|
|
|
inbox_url,
|
2021-11-18 14:56:52 +00:00
|
|
|
response_text,
|
|
|
|
);
|
|
|
|
if response_status.is_client_error() || response_status.is_server_error() {
|
|
|
|
return Err(DelivererError::HttpError(response_status));
|
|
|
|
};
|
2021-04-09 00:22:17 +00:00
|
|
|
};
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2022-08-03 14:57:46 +00:00
|
|
|
// 30 secs, 5 mins, 50 mins, 8 hours
|
|
|
|
fn backoff(retry_count: u32) -> Duration {
|
|
|
|
debug_assert!(retry_count > 0);
|
|
|
|
Duration::from_secs(3 * 10_u64.pow(retry_count))
|
|
|
|
}
|
|
|
|
|
2021-10-30 22:35:18 +00:00
|
|
|
async fn deliver_activity_worker(
|
2021-11-18 14:56:52 +00:00
|
|
|
instance: Instance,
|
2021-10-30 22:35:18 +00:00
|
|
|
sender: User,
|
2022-12-04 22:31:02 +00:00
|
|
|
activity: Value,
|
2022-12-13 20:34:51 +00:00
|
|
|
inboxes: Vec<String>,
|
2021-10-30 22:35:18 +00:00
|
|
|
) -> Result<(), DelivererError> {
|
|
|
|
let actor_key = deserialize_private_key(&sender.private_key)?;
|
|
|
|
let actor_key_id = format!(
|
2022-05-02 23:29:04 +00:00
|
|
|
"{}{}",
|
2022-07-15 17:31:02 +00:00
|
|
|
local_actor_id(
|
2021-11-18 14:56:52 +00:00
|
|
|
&instance.url(),
|
2021-10-30 22:35:18 +00:00
|
|
|
&sender.profile.username,
|
|
|
|
),
|
2022-05-02 23:29:04 +00:00
|
|
|
ACTOR_KEY_SUFFIX,
|
2021-10-30 22:35:18 +00:00
|
|
|
);
|
2022-12-04 22:31:02 +00:00
|
|
|
let activity_signed = if is_object_signed(&activity) {
|
2022-11-01 00:02:25 +00:00
|
|
|
log::warn!("activity is already signed");
|
2022-12-04 22:31:02 +00:00
|
|
|
activity
|
2022-11-01 00:02:25 +00:00
|
|
|
} else {
|
2022-12-04 22:31:02 +00:00
|
|
|
sign_object(&activity, &actor_key, &actor_key_id)?
|
2022-11-01 00:02:25 +00:00
|
|
|
};
|
|
|
|
|
2022-10-20 23:18:45 +00:00
|
|
|
let activity_json = serde_json::to_string(&activity_signed)?;
|
2022-12-13 20:34:51 +00:00
|
|
|
if inboxes.is_empty() {
|
2022-06-01 00:53:35 +00:00
|
|
|
return Ok(());
|
|
|
|
};
|
2021-12-21 00:14:12 +00:00
|
|
|
log::info!("sending activity to {} inboxes: {}", inboxes.len(), activity_json);
|
2022-12-13 20:34:51 +00:00
|
|
|
|
|
|
|
let mut queue: BTreeMap<String, bool> = BTreeMap::new();
|
|
|
|
for inbox in inboxes {
|
|
|
|
// is_delivered: false
|
|
|
|
queue.insert(inbox, false);
|
|
|
|
};
|
2022-07-24 21:19:17 +00:00
|
|
|
let mut retry_count = 0;
|
|
|
|
let max_retries = 2;
|
2022-10-17 23:29:04 +00:00
|
|
|
|
2022-12-13 20:34:51 +00:00
|
|
|
while queue.values().any(|is_delivered| !is_delivered) &&
|
|
|
|
retry_count <= max_retries
|
|
|
|
{
|
2022-07-24 21:19:17 +00:00
|
|
|
if retry_count > 0 {
|
2022-08-03 14:57:46 +00:00
|
|
|
// Wait before next attempt
|
|
|
|
sleep(backoff(retry_count)).await;
|
2022-07-24 21:19:17 +00:00
|
|
|
};
|
2022-12-13 20:34:51 +00:00
|
|
|
for (inbox_url, is_delivered) in queue.iter_mut() {
|
|
|
|
if *is_delivered {
|
|
|
|
continue;
|
|
|
|
};
|
2022-07-24 21:19:17 +00:00
|
|
|
if let Err(error) = send_activity(
|
|
|
|
&instance,
|
|
|
|
&actor_key,
|
|
|
|
&actor_key_id,
|
|
|
|
&activity_json,
|
2022-10-17 23:29:04 +00:00
|
|
|
inbox_url,
|
2022-07-24 21:19:17 +00:00
|
|
|
).await {
|
|
|
|
log::error!(
|
|
|
|
"failed to deliver activity to {} (attempt #{}): {}",
|
|
|
|
inbox_url,
|
|
|
|
retry_count + 1,
|
|
|
|
error,
|
|
|
|
);
|
2022-10-17 23:29:04 +00:00
|
|
|
} else {
|
2022-12-13 20:34:51 +00:00
|
|
|
*is_delivered = true;
|
2022-07-24 21:19:17 +00:00
|
|
|
};
|
2021-12-21 00:14:12 +00:00
|
|
|
};
|
2022-07-24 21:19:17 +00:00
|
|
|
retry_count += 1;
|
2021-04-09 00:22:17 +00:00
|
|
|
};
|
2021-10-30 22:35:18 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2022-12-04 22:31:02 +00:00
|
|
|
pub struct OutgoingActivity {
|
2022-12-13 20:34:51 +00:00
|
|
|
instance: Instance,
|
|
|
|
sender: User,
|
2022-12-04 22:31:02 +00:00
|
|
|
pub activity: Value,
|
2022-12-13 20:34:51 +00:00
|
|
|
inboxes: Vec<String>,
|
2022-06-01 00:53:35 +00:00
|
|
|
}
|
|
|
|
|
2022-12-04 22:31:02 +00:00
|
|
|
impl OutgoingActivity {
|
|
|
|
pub fn new(
|
|
|
|
instance: &Instance,
|
|
|
|
sender: &User,
|
|
|
|
activity: impl Serialize,
|
|
|
|
recipients: Vec<Actor>,
|
|
|
|
) -> Self {
|
2022-12-19 16:40:56 +00:00
|
|
|
let mut inboxes: Vec<String> = recipients.into_iter()
|
2022-12-13 20:34:51 +00:00
|
|
|
.map(|actor| actor.inbox).collect();
|
2022-12-19 16:40:56 +00:00
|
|
|
inboxes.sort();
|
|
|
|
inboxes.dedup();
|
2022-12-04 22:31:02 +00:00
|
|
|
Self {
|
|
|
|
instance: instance.clone(),
|
|
|
|
sender: sender.clone(),
|
|
|
|
activity: serde_json::to_value(activity)
|
|
|
|
.expect("activity should be serializable"),
|
2022-12-13 20:34:51 +00:00
|
|
|
inboxes,
|
2022-12-04 22:31:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-01 00:53:35 +00:00
|
|
|
pub async fn deliver(self) -> Result<(), DelivererError> {
|
|
|
|
deliver_activity_worker(
|
|
|
|
self.instance,
|
|
|
|
self.sender,
|
|
|
|
self.activity,
|
2022-12-13 20:34:51 +00:00
|
|
|
self.inboxes,
|
2022-06-01 00:53:35 +00:00
|
|
|
).await
|
|
|
|
}
|
|
|
|
|
2022-10-21 21:32:01 +00:00
|
|
|
pub async fn deliver_or_log(self) -> () {
|
|
|
|
self.deliver().await.unwrap_or_else(|err| {
|
|
|
|
log::error!("{}", err);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2022-06-01 00:53:35 +00:00
|
|
|
pub fn spawn_deliver(self) -> () {
|
2022-07-17 00:00:35 +00:00
|
|
|
tokio::spawn(async move {
|
2022-10-21 21:32:01 +00:00
|
|
|
self.deliver_or_log().await;
|
2022-06-01 00:53:35 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
2022-08-03 14:57:46 +00:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_backoff() {
|
|
|
|
assert_eq!(backoff(1).as_secs(), 30);
|
|
|
|
assert_eq!(backoff(2).as_secs(), 300);
|
|
|
|
}
|
|
|
|
}
|