2022-02-23 23:07:51 +00:00
|
|
|
use actix_web::HttpRequest;
|
2021-04-09 00:22:17 +00:00
|
|
|
use regex::Regex;
|
2022-04-13 22:30:41 +00:00
|
|
|
use serde::de::DeserializeOwned;
|
2021-04-09 00:22:17 +00:00
|
|
|
use serde_json::Value;
|
2021-10-09 22:58:21 +00:00
|
|
|
use tokio_postgres::GenericClient;
|
2021-04-09 00:22:17 +00:00
|
|
|
use uuid::Uuid;
|
|
|
|
|
2021-12-28 18:34:13 +00:00
|
|
|
use crate::config::Config;
|
2021-12-24 15:13:25 +00:00
|
|
|
use crate::errors::{ConversionError, DatabaseError, HttpError, ValidationError};
|
2022-02-23 23:07:51 +00:00
|
|
|
use crate::http_signatures::verify::verify_http_signature;
|
2021-10-09 23:59:45 +00:00
|
|
|
use crate::models::posts::queries::{
|
|
|
|
create_post,
|
|
|
|
get_post_by_object_id,
|
2021-11-12 14:51:03 +00:00
|
|
|
delete_post,
|
2021-10-09 23:59:45 +00:00
|
|
|
};
|
2022-05-02 17:31:31 +00:00
|
|
|
use crate::models::posts::types::PostCreateData;
|
2021-04-09 00:22:17 +00:00
|
|
|
use crate::models::profiles::queries::{
|
|
|
|
get_profile_by_actor_id,
|
|
|
|
get_profile_by_acct,
|
|
|
|
};
|
2021-12-15 01:00:42 +00:00
|
|
|
use crate::models::reactions::queries::{
|
|
|
|
create_reaction,
|
|
|
|
get_reaction_by_activity_id,
|
|
|
|
delete_reaction,
|
|
|
|
};
|
2021-09-20 21:06:48 +00:00
|
|
|
use crate::models::relationships::queries::{
|
|
|
|
follow_request_accepted,
|
|
|
|
follow_request_rejected,
|
2021-09-20 21:45:33 +00:00
|
|
|
follow,
|
2022-01-03 23:19:52 +00:00
|
|
|
get_follow_request_by_id,
|
2021-09-20 21:45:33 +00:00
|
|
|
unfollow,
|
2021-09-20 21:06:48 +00:00
|
|
|
};
|
2022-01-02 23:50:37 +00:00
|
|
|
use crate::models::users::queries::get_user_by_name;
|
2022-04-13 22:30:41 +00:00
|
|
|
use super::activity::{
|
|
|
|
Activity,
|
|
|
|
Object,
|
|
|
|
create_activity_accept_follow,
|
|
|
|
};
|
2021-04-09 00:22:17 +00:00
|
|
|
use super::deliverer::deliver_activity;
|
2021-12-28 18:34:13 +00:00
|
|
|
use super::fetcher::helpers::{
|
2021-12-28 18:34:13 +00:00
|
|
|
get_or_import_profile_by_actor_id,
|
2022-05-02 17:31:31 +00:00
|
|
|
import_post,
|
2021-12-28 18:34:13 +00:00
|
|
|
};
|
2022-06-01 17:01:22 +00:00
|
|
|
use super::handlers::update_note::handle_update_note;
|
|
|
|
use super::handlers::update_person::handle_update_person;
|
2021-04-09 00:22:17 +00:00
|
|
|
use super::vocabulary::*;
|
|
|
|
|
2022-05-02 00:24:44 +00:00
|
|
|
pub fn parse_actor_id(
|
2021-09-20 21:45:33 +00:00
|
|
|
instance_url: &str,
|
|
|
|
actor_id: &str,
|
|
|
|
) -> Result<String, ValidationError> {
|
|
|
|
let url_regexp_str = format!(
|
|
|
|
"^{}/users/(?P<username>[0-9a-z_]+)$",
|
2022-04-13 22:30:41 +00:00
|
|
|
instance_url.replace('.', r"\."),
|
2021-09-20 21:45:33 +00:00
|
|
|
);
|
|
|
|
let url_regexp = Regex::new(&url_regexp_str)
|
|
|
|
.map_err(|_| ValidationError("error"))?;
|
2021-11-13 17:37:31 +00:00
|
|
|
let url_caps = url_regexp.captures(actor_id)
|
2021-04-09 00:22:17 +00:00
|
|
|
.ok_or(ValidationError("invalid actor ID"))?;
|
|
|
|
let username = url_caps.name("username")
|
|
|
|
.ok_or(ValidationError("invalid actor ID"))?
|
|
|
|
.as_str()
|
|
|
|
.to_owned();
|
|
|
|
Ok(username)
|
|
|
|
}
|
|
|
|
|
2022-05-02 00:24:44 +00:00
|
|
|
pub fn parse_object_id(
|
2021-09-20 21:45:33 +00:00
|
|
|
instance_url: &str,
|
|
|
|
object_id: &str,
|
|
|
|
) -> Result<Uuid, ValidationError> {
|
|
|
|
let url_regexp_str = format!(
|
|
|
|
"^{}/objects/(?P<uuid>[0-9a-f-]+)$",
|
2022-04-13 22:30:41 +00:00
|
|
|
instance_url.replace('.', r"\."),
|
2021-09-20 21:45:33 +00:00
|
|
|
);
|
|
|
|
let url_regexp = Regex::new(&url_regexp_str)
|
|
|
|
.map_err(|_| ValidationError("error"))?;
|
2021-11-13 17:37:31 +00:00
|
|
|
let url_caps = url_regexp.captures(object_id)
|
2021-04-09 00:22:17 +00:00
|
|
|
.ok_or(ValidationError("invalid object ID"))?;
|
2021-11-29 20:45:36 +00:00
|
|
|
let internal_object_id: Uuid = url_caps.name("uuid")
|
2021-04-09 00:22:17 +00:00
|
|
|
.ok_or(ValidationError("invalid object ID"))?
|
|
|
|
.as_str().parse()
|
|
|
|
.map_err(|_| ValidationError("invalid object ID"))?;
|
2021-11-29 20:45:36 +00:00
|
|
|
Ok(internal_object_id)
|
2021-04-09 00:22:17 +00:00
|
|
|
}
|
|
|
|
|
2022-04-13 22:30:41 +00:00
|
|
|
/// Transforms arbitrary property value into array of strings
|
2022-05-02 00:24:44 +00:00
|
|
|
pub fn parse_array(value: &Value) -> Result<Vec<String>, ConversionError> {
|
2021-11-18 23:24:13 +00:00
|
|
|
let result = match value {
|
|
|
|
Value::String(string) => vec![string.to_string()],
|
|
|
|
Value::Array(array) => {
|
2021-12-24 15:13:25 +00:00
|
|
|
let mut results = vec![];
|
|
|
|
for value in array {
|
|
|
|
match value {
|
|
|
|
Value::String(string) => results.push(string.to_string()),
|
|
|
|
Value::Object(object) => {
|
|
|
|
if let Some(string) = object["id"].as_str() {
|
|
|
|
results.push(string.to_string());
|
|
|
|
} else {
|
|
|
|
// id property is missing
|
|
|
|
return Err(ConversionError);
|
|
|
|
};
|
|
|
|
},
|
|
|
|
// Unexpected array item type
|
|
|
|
_ => return Err(ConversionError),
|
|
|
|
};
|
|
|
|
};
|
|
|
|
results
|
2021-11-18 23:24:13 +00:00
|
|
|
},
|
2021-12-24 15:13:25 +00:00
|
|
|
// Unexpected value type
|
|
|
|
_ => return Err(ConversionError),
|
2021-11-18 23:24:13 +00:00
|
|
|
};
|
|
|
|
Ok(result)
|
|
|
|
}
|
|
|
|
|
2022-04-13 22:30:41 +00:00
|
|
|
/// Transforms arbitrary property value into array of structs
|
2022-05-02 00:24:44 +00:00
|
|
|
pub fn parse_property_value<T: DeserializeOwned>(value: &Value) -> Result<Vec<T>, ConversionError> {
|
2022-04-13 22:30:41 +00:00
|
|
|
let objects = match value {
|
|
|
|
Value::Array(array) => array.to_vec(),
|
|
|
|
Value::Object(_) => vec![value.clone()],
|
|
|
|
// Unexpected value type
|
|
|
|
_ => return Err(ConversionError),
|
|
|
|
};
|
|
|
|
let mut items = vec![];
|
|
|
|
for object in objects {
|
|
|
|
let item: T = serde_json::from_value(object)
|
|
|
|
.map_err(|_| ConversionError)?;
|
|
|
|
items.push(item);
|
|
|
|
};
|
|
|
|
Ok(items)
|
|
|
|
}
|
|
|
|
|
2021-11-29 20:45:36 +00:00
|
|
|
/// Parses object json value and returns its ID as string
|
2022-05-30 19:51:32 +00:00
|
|
|
fn get_object_id(object: &Value) -> Result<String, ValidationError> {
|
2021-11-29 20:45:36 +00:00
|
|
|
let object_id = match object.as_str() {
|
|
|
|
Some(object_id) => object_id.to_owned(),
|
|
|
|
None => {
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = object["id"].as_str()
|
|
|
|
.ok_or(ValidationError("missing object ID"))?
|
|
|
|
.to_string();
|
|
|
|
object_id
|
2021-11-29 20:45:36 +00:00
|
|
|
},
|
|
|
|
};
|
|
|
|
Ok(object_id)
|
|
|
|
}
|
|
|
|
|
2022-01-03 19:33:29 +00:00
|
|
|
fn require_actor_signature(actor_id: &str, signer_id: &str)
|
|
|
|
-> Result<(), HttpError>
|
|
|
|
{
|
|
|
|
if actor_id != signer_id {
|
2022-05-02 20:56:13 +00:00
|
|
|
// Forwarded activity
|
2022-01-04 14:42:03 +00:00
|
|
|
log::warn!(
|
|
|
|
"request signer {} does not match actor {}",
|
|
|
|
signer_id,
|
|
|
|
actor_id,
|
|
|
|
);
|
2022-01-03 19:33:29 +00:00
|
|
|
return Err(HttpError::AuthError("actor and request signer do not match"));
|
|
|
|
};
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-04-09 00:22:17 +00:00
|
|
|
pub async fn receive_activity(
|
|
|
|
config: &Config,
|
2022-02-23 23:07:51 +00:00
|
|
|
db_client: &mut impl GenericClient,
|
|
|
|
request: &HttpRequest,
|
2021-12-21 00:14:12 +00:00
|
|
|
activity_raw: &Value,
|
2021-04-09 00:22:17 +00:00
|
|
|
) -> Result<(), HttpError> {
|
2021-12-21 00:14:12 +00:00
|
|
|
let activity: Activity = serde_json::from_value(activity_raw.clone())
|
2021-04-09 00:22:17 +00:00
|
|
|
.map_err(|_| ValidationError("invalid activity"))?;
|
2022-05-02 11:29:03 +00:00
|
|
|
let activity_type = activity.activity_type.clone();
|
|
|
|
let activity_actor = activity.actor.clone();
|
2021-12-17 23:47:46 +00:00
|
|
|
let maybe_object_type = activity.object.get("type")
|
2021-04-09 00:22:17 +00:00
|
|
|
.and_then(|val| val.as_str())
|
2021-12-17 23:47:46 +00:00
|
|
|
.unwrap_or("Unknown");
|
2022-05-30 17:35:43 +00:00
|
|
|
|
2022-05-30 19:51:32 +00:00
|
|
|
let is_self_delete = if activity_type == DELETE {
|
|
|
|
let object_id = get_object_id(&activity.object)?;
|
|
|
|
activity.actor == object_id
|
|
|
|
} else { false };
|
|
|
|
// Don't fetch signer if this is Delete(Person) activity
|
|
|
|
let signer = match verify_http_signature(config, db_client, request, is_self_delete).await {
|
2022-05-30 17:35:43 +00:00
|
|
|
Ok(signer) => signer,
|
|
|
|
Err(error) => {
|
2022-05-30 19:51:32 +00:00
|
|
|
if is_self_delete {
|
2022-05-30 17:35:43 +00:00
|
|
|
// Ignore Delete(Person) activities without HTTP signatures
|
|
|
|
return Ok(());
|
|
|
|
};
|
|
|
|
log::warn!("invalid signature: {}", error);
|
|
|
|
return Err(HttpError::AuthError("invalid signature"));
|
|
|
|
},
|
|
|
|
};
|
|
|
|
let signer_id = signer.actor_id(&config.instance_url());
|
|
|
|
log::debug!("activity signed by {}", signer_id);
|
|
|
|
if config.blocked_instances.iter().any(|instance| signer.acct.contains(instance)) {
|
|
|
|
return Err(HttpError::ValidationError("instance is blocked".into()));
|
|
|
|
};
|
|
|
|
|
2022-05-30 21:48:41 +00:00
|
|
|
let maybe_object_type = match (activity_type.as_str(), maybe_object_type) {
|
2021-04-09 00:22:17 +00:00
|
|
|
(ACCEPT, FOLLOW) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2022-01-03 23:19:52 +00:00
|
|
|
let actor_profile = get_profile_by_actor_id(db_client, &activity.actor).await?;
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = get_object_id(&activity.object)?;
|
2021-11-29 20:45:36 +00:00
|
|
|
let follow_request_id = parse_object_id(&config.instance_url(), &object_id)?;
|
2022-01-03 23:19:52 +00:00
|
|
|
let follow_request = get_follow_request_by_id(db_client, &follow_request_id).await?;
|
|
|
|
if follow_request.target_id != actor_profile.id {
|
|
|
|
return Err(HttpError::ValidationError("actor is not a target".into()));
|
|
|
|
};
|
2021-09-20 21:06:48 +00:00
|
|
|
follow_request_accepted(db_client, &follow_request_id).await?;
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(FOLLOW)
|
2021-09-20 21:06:48 +00:00
|
|
|
},
|
|
|
|
(REJECT, FOLLOW) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2022-01-03 23:19:52 +00:00
|
|
|
let actor_profile = get_profile_by_actor_id(db_client, &activity.actor).await?;
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = get_object_id(&activity.object)?;
|
2021-11-29 20:45:36 +00:00
|
|
|
let follow_request_id = parse_object_id(&config.instance_url(), &object_id)?;
|
2022-01-03 23:19:52 +00:00
|
|
|
let follow_request = get_follow_request_by_id(db_client, &follow_request_id).await?;
|
|
|
|
if follow_request.target_id != actor_profile.id {
|
|
|
|
return Err(HttpError::ValidationError("actor is not a target".into()));
|
|
|
|
};
|
2021-09-20 21:06:48 +00:00
|
|
|
follow_request_rejected(db_client, &follow_request_id).await?;
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(FOLLOW)
|
2021-04-09 00:22:17 +00:00
|
|
|
},
|
2022-04-29 13:15:16 +00:00
|
|
|
(CREATE, NOTE | QUESTION | PAGE) => {
|
2021-04-09 00:22:17 +00:00
|
|
|
let object: Object = serde_json::from_value(activity.object)
|
|
|
|
.map_err(|_| ValidationError("invalid object"))?;
|
2022-01-03 19:33:29 +00:00
|
|
|
let object_id = object.id.clone();
|
|
|
|
let object_received = if activity.actor == signer_id {
|
|
|
|
Some(object)
|
|
|
|
} else {
|
2022-01-03 23:38:11 +00:00
|
|
|
// Fetch forwarded note, don't trust the sender
|
2022-01-03 19:33:29 +00:00
|
|
|
None
|
|
|
|
};
|
2022-04-13 19:16:34 +00:00
|
|
|
import_post(config, db_client, object_id, object_received).await?;
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(NOTE)
|
2021-04-09 00:22:17 +00:00
|
|
|
},
|
2021-11-25 21:28:06 +00:00
|
|
|
(ANNOUNCE, _) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2021-12-11 21:21:52 +00:00
|
|
|
let repost_object_id = activity.id;
|
|
|
|
match get_post_by_object_id(db_client, &repost_object_id).await {
|
|
|
|
Ok(_) => return Ok(()), // Ignore if repost already exists
|
|
|
|
Err(DatabaseError::NotFound(_)) => (),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
2021-12-28 18:34:13 +00:00
|
|
|
let author = get_or_import_profile_by_actor_id(
|
2021-11-25 21:28:06 +00:00
|
|
|
db_client,
|
|
|
|
&config.instance(),
|
|
|
|
&config.media_dir(),
|
2021-12-28 18:34:13 +00:00
|
|
|
&activity.actor,
|
2021-11-25 21:28:06 +00:00
|
|
|
).await?;
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = get_object_id(&activity.object)?;
|
2021-11-25 21:28:06 +00:00
|
|
|
let post_id = match parse_object_id(&config.instance_url(), &object_id) {
|
|
|
|
Ok(post_id) => post_id,
|
|
|
|
Err(_) => {
|
2021-12-06 15:28:41 +00:00
|
|
|
// Try to get remote post
|
2022-04-13 19:16:34 +00:00
|
|
|
let post = import_post(config, db_client, object_id, None).await?;
|
2021-11-25 21:28:06 +00:00
|
|
|
post.id
|
|
|
|
},
|
|
|
|
};
|
|
|
|
let repost_data = PostCreateData {
|
|
|
|
repost_of_id: Some(post_id),
|
2021-12-11 21:21:52 +00:00
|
|
|
object_id: Some(repost_object_id),
|
2021-11-25 21:28:06 +00:00
|
|
|
..Default::default()
|
|
|
|
};
|
|
|
|
create_post(db_client, &author.id, repost_data).await?;
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(NOTE)
|
2021-11-25 21:28:06 +00:00
|
|
|
},
|
2021-11-19 00:05:39 +00:00
|
|
|
(DELETE, _) => {
|
2022-05-02 20:56:13 +00:00
|
|
|
if signer_id != activity.actor {
|
|
|
|
// Ignore forwarded Delete() activities
|
|
|
|
return Ok(());
|
|
|
|
};
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = get_object_id(&activity.object)?;
|
2021-12-28 01:28:28 +00:00
|
|
|
if object_id == activity.actor {
|
|
|
|
log::info!("received deletion request for {}", object_id);
|
|
|
|
// Ignore Delete(Person)
|
|
|
|
return Ok(());
|
|
|
|
};
|
2021-12-30 14:45:14 +00:00
|
|
|
let post = match get_post_by_object_id(db_client, &object_id).await {
|
|
|
|
Ok(post) => post,
|
|
|
|
// Ignore Delete(Note) if post is not found
|
|
|
|
Err(DatabaseError::NotFound(_)) => return Ok(()),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
2022-01-03 23:38:11 +00:00
|
|
|
let actor_profile = get_profile_by_actor_id(db_client, &activity.actor).await?;
|
|
|
|
if post.author.id != actor_profile.id {
|
|
|
|
return Err(HttpError::ValidationError("actor is not an author".into()));
|
|
|
|
};
|
2021-11-12 14:51:03 +00:00
|
|
|
let deletion_queue = delete_post(db_client, &post.id).await?;
|
|
|
|
let config = config.clone();
|
|
|
|
actix_rt::spawn(async move {
|
|
|
|
deletion_queue.process(&config).await;
|
|
|
|
});
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(NOTE)
|
2021-11-12 14:51:03 +00:00
|
|
|
},
|
2022-04-29 13:15:16 +00:00
|
|
|
(EMOJI_REACT | LIKE, _) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2021-12-28 18:34:13 +00:00
|
|
|
let author = get_or_import_profile_by_actor_id(
|
2021-10-29 19:21:26 +00:00
|
|
|
db_client,
|
2021-11-15 19:25:43 +00:00
|
|
|
&config.instance(),
|
2021-10-29 19:21:26 +00:00
|
|
|
&config.media_dir(),
|
2021-12-28 18:34:13 +00:00
|
|
|
&activity.actor,
|
2021-10-29 19:21:26 +00:00
|
|
|
).await?;
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = get_object_id(&activity.object)?;
|
2021-11-14 22:57:18 +00:00
|
|
|
let post_id = match parse_object_id(&config.instance_url(), &object_id) {
|
|
|
|
Ok(post_id) => post_id,
|
|
|
|
Err(_) => {
|
|
|
|
let post = match get_post_by_object_id(db_client, &object_id).await {
|
|
|
|
Ok(post) => post,
|
|
|
|
// Ignore like if post is not found locally
|
|
|
|
Err(DatabaseError::NotFound(_)) => return Ok(()),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
|
|
|
post.id
|
|
|
|
},
|
|
|
|
};
|
2021-12-25 21:44:08 +00:00
|
|
|
match create_reaction(
|
2021-12-14 22:59:15 +00:00
|
|
|
db_client,
|
|
|
|
&author.id,
|
|
|
|
&post_id,
|
|
|
|
Some(&activity.id),
|
2021-12-25 21:44:08 +00:00
|
|
|
).await {
|
|
|
|
Ok(_) => (),
|
|
|
|
// Ignore activity if reaction is already saved
|
|
|
|
Err(DatabaseError::AlreadyExists(_)) => return Ok(()),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(NOTE)
|
2021-10-29 19:21:26 +00:00
|
|
|
},
|
2021-04-09 00:22:17 +00:00
|
|
|
(FOLLOW, _) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2021-12-28 18:34:13 +00:00
|
|
|
let source_profile = get_or_import_profile_by_actor_id(
|
2021-10-09 22:58:21 +00:00
|
|
|
db_client,
|
2021-11-15 19:25:43 +00:00
|
|
|
&config.instance(),
|
2021-10-09 22:58:21 +00:00
|
|
|
&config.media_dir(),
|
2021-12-28 18:34:13 +00:00
|
|
|
&activity.actor,
|
2021-10-09 22:58:21 +00:00
|
|
|
).await?;
|
2021-12-31 15:29:44 +00:00
|
|
|
let source_actor = source_profile.actor_json
|
2021-10-31 20:46:29 +00:00
|
|
|
.ok_or(HttpError::InternalError)?;
|
2022-05-30 19:51:32 +00:00
|
|
|
let target_actor_id = get_object_id(&activity.object)?;
|
2021-09-20 21:45:33 +00:00
|
|
|
let target_username = parse_actor_id(&config.instance_url(), &target_actor_id)?;
|
2022-01-02 23:50:37 +00:00
|
|
|
let target_user = get_user_by_name(db_client, &target_username).await?;
|
|
|
|
match follow(db_client, &source_profile.id, &target_user.profile.id).await {
|
|
|
|
Ok(_) => (),
|
|
|
|
// Proceed even if relationship already exists
|
|
|
|
Err(DatabaseError::AlreadyExists(_)) => (),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Send activity
|
2021-10-09 12:53:53 +00:00
|
|
|
let new_activity = create_activity_accept_follow(
|
|
|
|
&config.instance_url(),
|
2022-01-02 23:50:37 +00:00
|
|
|
&target_user.profile,
|
2021-10-09 12:53:53 +00:00
|
|
|
&activity.id,
|
2021-11-18 21:28:50 +00:00
|
|
|
&source_actor.id,
|
2021-10-09 12:53:53 +00:00
|
|
|
);
|
2021-04-09 00:22:17 +00:00
|
|
|
let recipients = vec![source_actor];
|
2021-11-13 17:37:31 +00:00
|
|
|
deliver_activity(config, &target_user, new_activity, recipients);
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(PERSON)
|
2021-04-09 00:22:17 +00:00
|
|
|
},
|
|
|
|
(UNDO, FOLLOW) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2021-04-09 00:22:17 +00:00
|
|
|
let object: Object = serde_json::from_value(activity.object)
|
|
|
|
.map_err(|_| ValidationError("invalid object"))?;
|
|
|
|
let source_profile = get_profile_by_actor_id(db_client, &activity.actor).await?;
|
|
|
|
let target_actor_id = object.object
|
|
|
|
.ok_or(ValidationError("invalid object"))?;
|
2021-09-20 21:45:33 +00:00
|
|
|
let target_username = parse_actor_id(&config.instance_url(), &target_actor_id)?;
|
2021-04-09 00:22:17 +00:00
|
|
|
let target_profile = get_profile_by_acct(db_client, &target_username).await?;
|
2022-05-22 16:31:58 +00:00
|
|
|
match unfollow(db_client, &source_profile.id, &target_profile.id).await {
|
|
|
|
Ok(_) => (),
|
|
|
|
// Ignore Undo if relationship doesn't exist
|
|
|
|
Err(DatabaseError::NotFound(_)) => return Ok(()),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(FOLLOW)
|
2021-04-09 00:22:17 +00:00
|
|
|
},
|
2021-12-15 01:00:42 +00:00
|
|
|
(UNDO, _) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2022-01-03 23:38:11 +00:00
|
|
|
let actor_profile = get_profile_by_actor_id(db_client, &activity.actor).await?;
|
2022-05-30 19:51:32 +00:00
|
|
|
let object_id = get_object_id(&activity.object)?;
|
2021-12-16 17:32:49 +00:00
|
|
|
match get_reaction_by_activity_id(db_client, &object_id).await {
|
|
|
|
Ok(reaction) => {
|
|
|
|
// Undo(Like)
|
2022-01-03 23:38:11 +00:00
|
|
|
if reaction.author_id != actor_profile.id {
|
|
|
|
return Err(HttpError::ValidationError("actor is not an author".into()));
|
|
|
|
};
|
2021-12-26 14:10:11 +00:00
|
|
|
delete_reaction(
|
2021-12-16 17:32:49 +00:00
|
|
|
db_client,
|
|
|
|
&reaction.author_id,
|
|
|
|
&reaction.post_id,
|
2021-12-26 14:10:11 +00:00
|
|
|
).await?;
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(LIKE)
|
2021-12-16 17:32:49 +00:00
|
|
|
},
|
|
|
|
Err(DatabaseError::NotFound(_)) => {
|
|
|
|
// Undo(Announce)
|
2021-12-26 14:10:11 +00:00
|
|
|
let post = match get_post_by_object_id(db_client, &object_id).await {
|
|
|
|
Ok(post) => post,
|
|
|
|
// Ignore undo if neither reaction nor repost is found
|
|
|
|
Err(DatabaseError::NotFound(_)) => return Ok(()),
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
|
|
|
};
|
2022-01-03 23:38:11 +00:00
|
|
|
if post.author.id != actor_profile.id {
|
|
|
|
return Err(HttpError::ValidationError("actor is not an author".into()));
|
|
|
|
};
|
2021-12-16 17:32:49 +00:00
|
|
|
match post.repost_of_id {
|
2021-12-26 14:10:11 +00:00
|
|
|
// Ignore returned data because reposts don't have attached files
|
2021-12-16 17:32:49 +00:00
|
|
|
Some(_) => delete_post(db_client, &post.id).await?,
|
2021-12-26 14:10:11 +00:00
|
|
|
// Can't undo regular post
|
|
|
|
None => return Err(HttpError::ValidationError("object is not a repost".into())),
|
2021-12-16 17:32:49 +00:00
|
|
|
};
|
2022-05-30 21:48:41 +00:00
|
|
|
Some(ANNOUNCE)
|
2021-12-16 17:32:49 +00:00
|
|
|
},
|
|
|
|
Err(other_error) => return Err(other_error.into()),
|
2021-12-17 23:47:46 +00:00
|
|
|
}
|
2021-12-15 01:00:42 +00:00
|
|
|
},
|
2022-05-11 12:50:36 +00:00
|
|
|
(UPDATE, NOTE) => {
|
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
|
|
|
let object: Object = serde_json::from_value(activity.object)
|
|
|
|
.map_err(|_| ValidationError("invalid object"))?;
|
2022-05-30 21:48:41 +00:00
|
|
|
handle_update_note(db_client, &config.instance_url(), object).await?
|
2022-05-11 12:50:36 +00:00
|
|
|
},
|
2021-04-09 00:22:17 +00:00
|
|
|
(UPDATE, PERSON) => {
|
2022-02-23 23:07:51 +00:00
|
|
|
require_actor_signature(&activity.actor, &signer_id)?;
|
2022-05-02 11:29:03 +00:00
|
|
|
handle_update_person(
|
|
|
|
db_client,
|
|
|
|
&config.media_dir(),
|
|
|
|
activity,
|
2022-05-30 21:48:41 +00:00
|
|
|
).await?
|
2021-04-09 00:22:17 +00:00
|
|
|
},
|
|
|
|
_ => {
|
2022-05-27 22:46:07 +00:00
|
|
|
log::warn!("activity type is not supported: {}", activity_raw);
|
|
|
|
return Ok(());
|
2021-04-09 00:22:17 +00:00
|
|
|
},
|
|
|
|
};
|
2022-05-30 21:48:41 +00:00
|
|
|
if let Some(object_type) = maybe_object_type {
|
|
|
|
log::info!(
|
|
|
|
"processed {}({}) from {}",
|
|
|
|
activity_type,
|
|
|
|
object_type,
|
|
|
|
activity_actor,
|
|
|
|
);
|
|
|
|
};
|
2021-04-09 00:22:17 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2021-11-18 23:24:13 +00:00
|
|
|
use serde_json::json;
|
2021-12-01 23:26:59 +00:00
|
|
|
use crate::utils::id::new_uuid;
|
2021-04-09 00:22:17 +00:00
|
|
|
use super::*;
|
|
|
|
|
2021-09-20 21:45:33 +00:00
|
|
|
const INSTANCE_URL: &str = "https://example.org";
|
|
|
|
|
2021-04-09 00:22:17 +00:00
|
|
|
#[test]
|
|
|
|
fn test_parse_actor_id() {
|
2021-09-20 21:45:33 +00:00
|
|
|
let username = parse_actor_id(INSTANCE_URL, "https://example.org/users/test").unwrap();
|
2021-04-09 00:22:17 +00:00
|
|
|
assert_eq!(username, "test".to_string());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_actor_id_wrong_path() {
|
2021-09-20 21:45:33 +00:00
|
|
|
let error = parse_actor_id(INSTANCE_URL, "https://example.org/user/test").unwrap_err();
|
2021-04-09 00:22:17 +00:00
|
|
|
assert_eq!(error.to_string(), "invalid actor ID");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_actor_id_invalid_username() {
|
2021-09-20 21:45:33 +00:00
|
|
|
let error = parse_actor_id(INSTANCE_URL, "https://example.org/users/tes-t").unwrap_err();
|
|
|
|
assert_eq!(error.to_string(), "invalid actor ID");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_actor_id_invalid_instance_url() {
|
|
|
|
let error = parse_actor_id(INSTANCE_URL, "https://example.gov/users/test").unwrap_err();
|
2021-04-09 00:22:17 +00:00
|
|
|
assert_eq!(error.to_string(), "invalid actor ID");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_object_id() {
|
2021-12-01 23:26:59 +00:00
|
|
|
let expected_uuid = new_uuid();
|
2021-04-09 00:22:17 +00:00
|
|
|
let object_id = format!(
|
|
|
|
"https://example.org/objects/{}",
|
|
|
|
expected_uuid,
|
|
|
|
);
|
2021-11-29 20:45:36 +00:00
|
|
|
let internal_object_id = parse_object_id(INSTANCE_URL, &object_id).unwrap();
|
|
|
|
assert_eq!(internal_object_id, expected_uuid);
|
2021-04-09 00:22:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_object_id_invalid_uuid() {
|
2021-09-20 21:45:33 +00:00
|
|
|
let object_id = "https://example.org/objects/1234";
|
|
|
|
let error = parse_object_id(INSTANCE_URL, object_id).unwrap_err();
|
2021-04-09 00:22:17 +00:00
|
|
|
assert_eq!(error.to_string(), "invalid object ID");
|
|
|
|
}
|
2021-11-18 23:24:13 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_array_with_string() {
|
|
|
|
let value = json!("test");
|
|
|
|
assert_eq!(
|
|
|
|
parse_array(&value).unwrap(),
|
|
|
|
vec!["test".to_string()],
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_parse_array_with_array() {
|
|
|
|
let value = json!(["test1", "test2"]);
|
|
|
|
assert_eq!(
|
|
|
|
parse_array(&value).unwrap(),
|
|
|
|
vec!["test1".to_string(), "test2".to_string()],
|
|
|
|
);
|
|
|
|
}
|
2021-11-29 20:45:36 +00:00
|
|
|
|
2021-12-24 15:13:25 +00:00
|
|
|
#[test]
|
|
|
|
fn test_parse_array_with_array_of_objects() {
|
|
|
|
let value = json!([{"id": "test1"}, {"id": "test2"}]);
|
|
|
|
assert_eq!(
|
|
|
|
parse_array(&value).unwrap(),
|
|
|
|
vec!["test1".to_string(), "test2".to_string()],
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-11-29 20:45:36 +00:00
|
|
|
#[test]
|
|
|
|
fn test_get_object_id_from_string() {
|
|
|
|
let value = json!("test_id");
|
2022-05-30 19:51:32 +00:00
|
|
|
assert_eq!(get_object_id(&value).unwrap(), "test_id");
|
2021-11-29 20:45:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_get_object_id_from_object() {
|
|
|
|
let value = json!({"id": "test_id", "type": "Note"});
|
2022-05-30 19:51:32 +00:00
|
|
|
assert_eq!(get_object_id(&value).unwrap(), "test_id");
|
2021-11-29 20:45:36 +00:00
|
|
|
}
|
2021-04-09 00:22:17 +00:00
|
|
|
}
|