2022-12-21 22:51:17 +00:00
|
|
|
use crate::{
|
|
|
|
data::LastOnline,
|
|
|
|
error::{Error, ErrorKind},
|
2023-07-27 15:19:20 +00:00
|
|
|
spawner::Spawner,
|
2022-12-21 22:51:17 +00:00
|
|
|
};
|
2022-01-17 22:54:45 +00:00
|
|
|
use activitystreams::iri_string::types::IriString;
|
2022-11-18 04:39:26 +00:00
|
|
|
use actix_web::http::header::Date;
|
2023-01-23 14:38:55 +00:00
|
|
|
use base64::{engine::general_purpose::STANDARD, Engine};
|
2021-11-23 22:19:59 +00:00
|
|
|
use dashmap::DashMap;
|
2023-08-17 22:09:35 +00:00
|
|
|
use http_signature_normalization_reqwest::{digest::ring::Sha256, prelude::*};
|
|
|
|
use reqwest_middleware::ClientWithMiddleware;
|
2023-08-04 23:34:42 +00:00
|
|
|
use ring::{
|
|
|
|
rand::SystemRandom,
|
|
|
|
signature::{RsaKeyPair, RSA_PKCS1_SHA256},
|
2023-01-23 14:56:18 +00:00
|
|
|
};
|
2023-08-04 23:34:42 +00:00
|
|
|
use rsa::{pkcs1::EncodeRsaPrivateKey, RsaPrivateKey};
|
2020-05-23 23:56:27 +00:00
|
|
|
use std::{
|
2023-07-27 15:19:20 +00:00
|
|
|
sync::Arc,
|
|
|
|
time::{Duration, SystemTime},
|
2020-05-23 23:56:27 +00:00
|
|
|
};
|
2020-03-18 04:35:20 +00:00
|
|
|
|
2022-01-17 23:57:06 +00:00
|
|
|
const ONE_SECOND: u64 = 1;
|
|
|
|
const ONE_MINUTE: u64 = 60 * ONE_SECOND;
|
|
|
|
const ONE_HOUR: u64 = 60 * ONE_MINUTE;
|
|
|
|
const ONE_DAY: u64 = 24 * ONE_HOUR;
|
|
|
|
|
2023-09-09 01:11:24 +00:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub(crate) enum BreakerStrategy {
|
|
|
|
// Requires a successful response
|
|
|
|
Require2XX,
|
|
|
|
// Allows HTTP 2xx-401
|
|
|
|
Allow401AndBelow,
|
|
|
|
// Allows HTTP 2xx-404
|
|
|
|
Allow404AndBelow,
|
|
|
|
}
|
|
|
|
|
2020-12-23 18:06:15 +00:00
|
|
|
#[derive(Clone)]
|
2021-02-10 04:17:20 +00:00
|
|
|
pub(crate) struct Breakers {
|
2021-11-23 22:19:59 +00:00
|
|
|
inner: Arc<DashMap<String, Breaker>>,
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
|
2021-09-18 17:55:39 +00:00
|
|
|
impl std::fmt::Debug for Breakers {
|
|
|
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
|
|
f.debug_struct("Breakers").finish()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-23 18:06:15 +00:00
|
|
|
impl Breakers {
|
2023-07-28 22:46:23 +00:00
|
|
|
pub(crate) fn should_try(&self, url: &IriString) -> bool {
|
2022-01-17 22:54:45 +00:00
|
|
|
if let Some(authority) = url.authority_str() {
|
|
|
|
if let Some(breaker) = self.inner.get(authority) {
|
2021-11-23 22:19:59 +00:00
|
|
|
breaker.should_try()
|
2020-12-29 17:27:14 +00:00
|
|
|
} else {
|
|
|
|
true
|
|
|
|
}
|
2020-12-23 18:06:15 +00:00
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-17 22:54:45 +00:00
|
|
|
fn fail(&self, url: &IriString) {
|
|
|
|
if let Some(authority) = url.authority_str() {
|
2021-02-10 05:45:13 +00:00
|
|
|
let should_write = {
|
2022-01-17 22:54:45 +00:00
|
|
|
if let Some(mut breaker) = self.inner.get_mut(authority) {
|
2021-11-23 22:19:59 +00:00
|
|
|
breaker.fail();
|
2022-11-16 17:23:36 +00:00
|
|
|
if !breaker.should_try() {
|
2023-01-29 19:21:36 +00:00
|
|
|
tracing::warn!("Failed breaker for {authority}");
|
2022-11-16 17:23:36 +00:00
|
|
|
}
|
2021-02-10 05:45:13 +00:00
|
|
|
false
|
|
|
|
} else {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if should_write {
|
2022-01-17 22:54:45 +00:00
|
|
|
let mut breaker = self.inner.entry(authority.to_owned()).or_default();
|
2021-11-23 22:19:59 +00:00
|
|
|
breaker.fail();
|
2020-12-29 17:27:14 +00:00
|
|
|
}
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-17 22:54:45 +00:00
|
|
|
fn succeed(&self, url: &IriString) {
|
|
|
|
if let Some(authority) = url.authority_str() {
|
2021-02-10 05:45:13 +00:00
|
|
|
let should_write = {
|
2022-01-17 22:54:45 +00:00
|
|
|
if let Some(mut breaker) = self.inner.get_mut(authority) {
|
2021-11-23 22:19:59 +00:00
|
|
|
breaker.succeed();
|
2021-02-10 05:45:13 +00:00
|
|
|
false
|
|
|
|
} else {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if should_write {
|
2022-01-17 22:54:45 +00:00
|
|
|
let mut breaker = self.inner.entry(authority.to_owned()).or_default();
|
2021-11-23 22:19:59 +00:00
|
|
|
breaker.succeed();
|
2020-12-29 17:27:14 +00:00
|
|
|
}
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for Breakers {
|
|
|
|
fn default() -> Self {
|
|
|
|
Breakers {
|
2021-11-23 22:19:59 +00:00
|
|
|
inner: Arc::new(DashMap::new()),
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-18 17:55:39 +00:00
|
|
|
#[derive(Debug)]
|
2020-12-23 18:06:15 +00:00
|
|
|
struct Breaker {
|
|
|
|
failures: usize,
|
2022-01-17 23:57:06 +00:00
|
|
|
last_attempt: SystemTime,
|
|
|
|
last_success: SystemTime,
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Breaker {
|
2022-11-16 17:23:36 +00:00
|
|
|
const FAILURE_WAIT: Duration = Duration::from_secs(ONE_DAY);
|
|
|
|
const FAILURE_THRESHOLD: usize = 10;
|
2020-12-23 18:06:15 +00:00
|
|
|
|
|
|
|
fn should_try(&self) -> bool {
|
2022-11-16 17:23:36 +00:00
|
|
|
self.failures < Self::FAILURE_THRESHOLD
|
|
|
|
|| self.last_attempt + Self::FAILURE_WAIT < SystemTime::now()
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn fail(&mut self) {
|
|
|
|
self.failures += 1;
|
2022-01-17 23:57:06 +00:00
|
|
|
self.last_attempt = SystemTime::now();
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn succeed(&mut self) {
|
|
|
|
self.failures = 0;
|
2022-01-17 23:57:06 +00:00
|
|
|
self.last_attempt = SystemTime::now();
|
|
|
|
self.last_success = SystemTime::now();
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for Breaker {
|
|
|
|
fn default() -> Self {
|
2022-01-17 23:57:06 +00:00
|
|
|
let now = SystemTime::now();
|
2020-12-23 18:06:15 +00:00
|
|
|
|
|
|
|
Breaker {
|
|
|
|
failures: 0,
|
|
|
|
last_attempt: now,
|
|
|
|
last_success: now,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-18 04:35:20 +00:00
|
|
|
#[derive(Clone)]
|
2021-02-10 04:17:20 +00:00
|
|
|
pub(crate) struct Requests {
|
2023-08-17 22:09:35 +00:00
|
|
|
client: ClientWithMiddleware,
|
2020-03-18 04:35:20 +00:00
|
|
|
key_id: String,
|
2023-08-04 23:34:42 +00:00
|
|
|
private_key: Arc<RsaKeyPair>,
|
|
|
|
rng: SystemRandom,
|
2023-07-26 23:03:21 +00:00
|
|
|
config: Config<Spawner>,
|
2020-12-23 18:06:15 +00:00
|
|
|
breakers: Breakers,
|
2022-12-21 22:51:17 +00:00
|
|
|
last_online: Arc<LastOnline>,
|
2020-03-18 04:35:20 +00:00
|
|
|
}
|
2020-03-17 17:15:16 +00:00
|
|
|
|
2021-09-18 17:55:39 +00:00
|
|
|
impl std::fmt::Debug for Requests {
|
|
|
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
|
|
f.debug_struct("Requests")
|
|
|
|
.field("key_id", &self.key_id)
|
|
|
|
.field("config", &self.config)
|
|
|
|
.field("breakers", &self.breakers)
|
|
|
|
.finish()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-18 04:35:20 +00:00
|
|
|
impl Requests {
|
2023-07-26 23:04:09 +00:00
|
|
|
#[allow(clippy::too_many_arguments)]
|
2021-02-10 04:17:20 +00:00
|
|
|
pub(crate) fn new(
|
2020-12-23 18:06:15 +00:00
|
|
|
key_id: String,
|
2021-08-01 20:12:06 +00:00
|
|
|
private_key: RsaPrivateKey,
|
2020-12-23 18:06:15 +00:00
|
|
|
breakers: Breakers,
|
2022-12-21 22:51:17 +00:00
|
|
|
last_online: Arc<LastOnline>,
|
2023-07-26 23:03:21 +00:00
|
|
|
spawner: Spawner,
|
2023-08-17 22:09:35 +00:00
|
|
|
client: ClientWithMiddleware,
|
2020-12-23 18:06:15 +00:00
|
|
|
) -> Self {
|
2023-08-04 23:34:42 +00:00
|
|
|
let private_key_der = private_key.to_pkcs1_der().expect("Can encode der");
|
|
|
|
let private_key = ring::signature::RsaKeyPair::from_der(private_key_der.as_bytes())
|
|
|
|
.expect("Key is valid");
|
2020-03-18 04:35:20 +00:00
|
|
|
Requests {
|
2023-08-17 22:09:35 +00:00
|
|
|
client,
|
2020-03-18 04:35:20 +00:00
|
|
|
key_id,
|
2023-08-04 23:34:42 +00:00
|
|
|
private_key: Arc::new(private_key),
|
|
|
|
rng: SystemRandom::new(),
|
2023-08-17 22:09:35 +00:00
|
|
|
config: Config::new_with_spawner(spawner).mastodon_compat(),
|
2020-12-23 18:06:15 +00:00
|
|
|
breakers,
|
2022-12-21 22:51:17 +00:00
|
|
|
last_online,
|
2020-03-18 04:35:20 +00:00
|
|
|
}
|
2020-03-17 17:15:16 +00:00
|
|
|
}
|
|
|
|
|
2023-07-27 18:09:03 +00:00
|
|
|
pub(crate) fn spawner(mut self, spawner: Spawner) -> Self {
|
2023-08-17 22:09:35 +00:00
|
|
|
self.config = self.config.set_spawner(spawner);
|
2023-07-27 18:09:03 +00:00
|
|
|
self
|
|
|
|
}
|
|
|
|
|
2022-11-16 20:29:57 +00:00
|
|
|
pub(crate) fn reset_breaker(&self, iri: &IriString) {
|
|
|
|
self.breakers.succeed(iri);
|
|
|
|
}
|
|
|
|
|
2022-11-16 17:23:36 +00:00
|
|
|
async fn check_response(
|
|
|
|
&self,
|
|
|
|
parsed_url: &IriString,
|
2023-09-09 01:11:24 +00:00
|
|
|
strategy: BreakerStrategy,
|
2023-08-17 22:09:35 +00:00
|
|
|
res: Result<reqwest::Response, reqwest_middleware::Error>,
|
|
|
|
) -> Result<reqwest::Response, Error> {
|
2022-11-16 18:38:34 +00:00
|
|
|
if res.is_err() {
|
|
|
|
self.breakers.fail(&parsed_url);
|
|
|
|
}
|
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
let res = res?;
|
|
|
|
|
|
|
|
let status = res.status();
|
2022-11-16 18:38:34 +00:00
|
|
|
|
2023-09-09 01:11:24 +00:00
|
|
|
let success = match strategy {
|
|
|
|
BreakerStrategy::Require2XX => status.is_success(),
|
|
|
|
BreakerStrategy::Allow401AndBelow => (200..=401).contains(&status.as_u16()),
|
|
|
|
BreakerStrategy::Allow404AndBelow => (200..=404).contains(&status.as_u16()),
|
|
|
|
};
|
|
|
|
|
|
|
|
if !success {
|
2022-11-16 17:23:36 +00:00
|
|
|
self.breakers.fail(&parsed_url);
|
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
if let Ok(s) = res.text().await {
|
|
|
|
if !s.is_empty() {
|
|
|
|
tracing::debug!("Response from {parsed_url}, {s}");
|
2022-11-16 17:23:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
return Err(ErrorKind::Status(parsed_url.to_string(), status).into());
|
2022-11-16 17:23:36 +00:00
|
|
|
}
|
|
|
|
|
2023-09-09 01:11:24 +00:00
|
|
|
// only actually succeed a breaker on 2xx response
|
|
|
|
if status.is_success() {
|
|
|
|
self.last_online.mark_seen(&parsed_url);
|
|
|
|
self.breakers.succeed(&parsed_url);
|
|
|
|
}
|
2022-11-16 17:23:36 +00:00
|
|
|
|
2022-11-16 18:38:34 +00:00
|
|
|
Ok(res)
|
2022-11-16 17:23:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tracing::instrument(name = "Fetch Json", skip(self), fields(signing_string))]
|
2023-09-09 01:11:24 +00:00
|
|
|
pub(crate) async fn fetch_json<T>(
|
|
|
|
&self,
|
|
|
|
url: &IriString,
|
|
|
|
strategy: BreakerStrategy,
|
|
|
|
) -> Result<T, Error>
|
2020-07-10 22:24:47 +00:00
|
|
|
where
|
|
|
|
T: serde::de::DeserializeOwned,
|
|
|
|
{
|
2023-09-09 01:11:24 +00:00
|
|
|
self.do_fetch(url, "application/json", strategy).await
|
2020-07-10 22:24:47 +00:00
|
|
|
}
|
|
|
|
|
2022-12-17 11:57:37 +00:00
|
|
|
#[tracing::instrument(name = "Fetch Json", skip(self), fields(signing_string))]
|
2023-09-09 01:11:24 +00:00
|
|
|
pub(crate) async fn fetch_json_msky<T>(
|
|
|
|
&self,
|
|
|
|
url: &IriString,
|
|
|
|
strategy: BreakerStrategy,
|
|
|
|
) -> Result<T, Error>
|
2022-12-17 11:57:37 +00:00
|
|
|
where
|
|
|
|
T: serde::de::DeserializeOwned,
|
|
|
|
{
|
2023-08-17 22:09:35 +00:00
|
|
|
let body = self
|
2023-02-25 21:02:16 +00:00
|
|
|
.do_deliver(
|
|
|
|
url,
|
|
|
|
&serde_json::json!({}),
|
|
|
|
"application/json",
|
|
|
|
"application/json",
|
2023-09-09 01:11:24 +00:00
|
|
|
strategy,
|
2023-02-25 21:02:16 +00:00
|
|
|
)
|
2023-08-17 22:09:35 +00:00
|
|
|
.await?
|
|
|
|
.bytes()
|
2023-02-25 21:02:16 +00:00
|
|
|
.await?;
|
2022-12-17 11:57:37 +00:00
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
Ok(serde_json::from_slice(&body)?)
|
2022-12-17 11:57:37 +00:00
|
|
|
}
|
|
|
|
|
2023-02-25 21:02:16 +00:00
|
|
|
#[tracing::instrument(name = "Fetch Activity+Json", skip(self), fields(signing_string))]
|
2023-09-09 01:11:24 +00:00
|
|
|
pub(crate) async fn fetch<T>(
|
|
|
|
&self,
|
|
|
|
url: &IriString,
|
|
|
|
strategy: BreakerStrategy,
|
|
|
|
) -> Result<T, Error>
|
2022-12-17 11:57:37 +00:00
|
|
|
where
|
|
|
|
T: serde::de::DeserializeOwned,
|
|
|
|
{
|
2023-09-09 01:11:24 +00:00
|
|
|
self.do_fetch(url, "application/activity+json", strategy)
|
|
|
|
.await
|
2022-12-17 11:57:37 +00:00
|
|
|
}
|
|
|
|
|
2023-09-09 01:11:24 +00:00
|
|
|
async fn do_fetch<T>(
|
|
|
|
&self,
|
|
|
|
url: &IriString,
|
|
|
|
accept: &str,
|
|
|
|
strategy: BreakerStrategy,
|
|
|
|
) -> Result<T, Error>
|
2020-03-18 04:35:20 +00:00
|
|
|
where
|
|
|
|
T: serde::de::DeserializeOwned,
|
|
|
|
{
|
2023-09-09 01:11:24 +00:00
|
|
|
let body = self
|
|
|
|
.do_fetch_response(url, accept, strategy)
|
|
|
|
.await?
|
|
|
|
.bytes()
|
|
|
|
.await?;
|
2020-12-23 18:06:15 +00:00
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
Ok(serde_json::from_slice(&body)?)
|
2020-03-17 21:53:31 +00:00
|
|
|
}
|
|
|
|
|
2022-11-18 04:39:26 +00:00
|
|
|
#[tracing::instrument(name = "Fetch response", skip(self), fields(signing_string))]
|
2023-09-09 01:11:24 +00:00
|
|
|
pub(crate) async fn fetch_response(
|
|
|
|
&self,
|
|
|
|
url: &IriString,
|
|
|
|
strategy: BreakerStrategy,
|
|
|
|
) -> Result<reqwest::Response, Error> {
|
|
|
|
self.do_fetch_response(url, "*/*", strategy).await
|
2023-02-25 21:02:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) async fn do_fetch_response(
|
|
|
|
&self,
|
|
|
|
url: &IriString,
|
|
|
|
accept: &str,
|
2023-09-09 01:11:24 +00:00
|
|
|
strategy: BreakerStrategy,
|
2023-08-17 22:09:35 +00:00
|
|
|
) -> Result<reqwest::Response, Error> {
|
2023-02-25 21:02:16 +00:00
|
|
|
if !self.breakers.should_try(url) {
|
2021-09-18 17:55:39 +00:00
|
|
|
return Err(ErrorKind::Breaker.into());
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
|
2020-03-30 06:06:13 +00:00
|
|
|
let signer = self.signer();
|
2022-11-16 17:23:36 +00:00
|
|
|
let span = tracing::Span::current();
|
2020-03-30 06:06:13 +00:00
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
let request = self
|
2023-06-23 19:27:20 +00:00
|
|
|
.client
|
2022-11-18 04:39:26 +00:00
|
|
|
.get(url.as_str())
|
2023-08-17 22:09:35 +00:00
|
|
|
.header("Accept", accept)
|
|
|
|
.header("Date", Date(SystemTime::now().into()).to_string())
|
|
|
|
.signature(&self.config, self.key_id.clone(), move |signing_string| {
|
|
|
|
span.record("signing_string", signing_string);
|
|
|
|
span.in_scope(|| signer.sign(signing_string))
|
|
|
|
})
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
let res = self.client.execute(request).await;
|
2020-05-23 23:56:27 +00:00
|
|
|
|
2023-09-09 01:11:24 +00:00
|
|
|
let res = self.check_response(url, strategy, res).await?;
|
2020-03-26 03:26:45 +00:00
|
|
|
|
2022-11-18 04:39:26 +00:00
|
|
|
Ok(res)
|
2020-03-26 03:26:45 +00:00
|
|
|
}
|
|
|
|
|
2021-09-21 19:32:25 +00:00
|
|
|
#[tracing::instrument(
|
|
|
|
"Deliver to Inbox",
|
2022-11-01 20:57:33 +00:00
|
|
|
skip_all,
|
2022-11-16 17:23:36 +00:00
|
|
|
fields(inbox = inbox.to_string().as_str(), signing_string)
|
2021-09-21 19:32:25 +00:00
|
|
|
)]
|
2023-09-09 01:11:24 +00:00
|
|
|
pub(crate) async fn deliver<T>(
|
|
|
|
&self,
|
|
|
|
inbox: &IriString,
|
|
|
|
item: &T,
|
|
|
|
strategy: BreakerStrategy,
|
|
|
|
) -> Result<(), Error>
|
2023-02-25 21:02:16 +00:00
|
|
|
where
|
|
|
|
T: serde::ser::Serialize + std::fmt::Debug,
|
|
|
|
{
|
|
|
|
self.do_deliver(
|
|
|
|
inbox,
|
|
|
|
item,
|
|
|
|
"application/activity+json",
|
|
|
|
"application/activity+json",
|
2023-09-09 01:11:24 +00:00
|
|
|
strategy,
|
2023-02-25 21:02:16 +00:00
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn do_deliver<T>(
|
|
|
|
&self,
|
|
|
|
inbox: &IriString,
|
|
|
|
item: &T,
|
|
|
|
content_type: &str,
|
|
|
|
accept: &str,
|
2023-09-09 01:11:24 +00:00
|
|
|
strategy: BreakerStrategy,
|
2023-08-17 22:09:35 +00:00
|
|
|
) -> Result<reqwest::Response, Error>
|
2020-03-18 04:35:20 +00:00
|
|
|
where
|
2021-09-21 18:26:31 +00:00
|
|
|
T: serde::ser::Serialize + std::fmt::Debug,
|
2020-03-18 04:35:20 +00:00
|
|
|
{
|
2021-11-23 22:19:59 +00:00
|
|
|
if !self.breakers.should_try(&inbox) {
|
2021-09-18 17:55:39 +00:00
|
|
|
return Err(ErrorKind::Breaker.into());
|
2020-12-23 18:06:15 +00:00
|
|
|
}
|
|
|
|
|
2020-03-30 06:06:13 +00:00
|
|
|
let signer = self.signer();
|
2022-11-16 17:23:36 +00:00
|
|
|
let span = tracing::Span::current();
|
2020-03-18 04:35:20 +00:00
|
|
|
let item_string = serde_json::to_string(item)?;
|
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
let request = self
|
2023-06-23 19:27:20 +00:00
|
|
|
.client
|
2020-09-07 21:51:02 +00:00
|
|
|
.post(inbox.as_str())
|
2023-08-17 22:09:35 +00:00
|
|
|
.header("Accept", accept)
|
|
|
|
.header("Content-Type", content_type)
|
|
|
|
.header("Date", Date(SystemTime::now().into()).to_string())
|
2020-03-18 04:35:20 +00:00
|
|
|
.signature_with_digest(
|
2020-03-30 06:06:13 +00:00
|
|
|
self.config.clone(),
|
|
|
|
self.key_id.clone(),
|
|
|
|
Sha256::new(),
|
2020-03-18 04:35:20 +00:00
|
|
|
item_string,
|
2022-11-16 17:23:36 +00:00
|
|
|
move |signing_string| {
|
|
|
|
span.record("signing_string", signing_string);
|
|
|
|
span.in_scope(|| signer.sign(signing_string))
|
|
|
|
},
|
2020-03-30 06:06:13 +00:00
|
|
|
)
|
2023-08-17 22:09:35 +00:00
|
|
|
.await?;
|
2021-09-21 16:21:06 +00:00
|
|
|
|
2023-08-17 22:09:35 +00:00
|
|
|
let res = self.client.execute(request).await;
|
2020-05-23 23:56:27 +00:00
|
|
|
|
2023-09-09 01:11:24 +00:00
|
|
|
let res = self.check_response(inbox, strategy, res).await?;
|
2020-12-23 18:06:15 +00:00
|
|
|
|
2023-02-25 21:02:16 +00:00
|
|
|
Ok(res)
|
2020-03-18 04:35:20 +00:00
|
|
|
}
|
2020-03-17 17:15:16 +00:00
|
|
|
|
2020-03-30 06:06:13 +00:00
|
|
|
fn signer(&self) -> Signer {
|
|
|
|
Signer {
|
|
|
|
private_key: self.private_key.clone(),
|
2023-08-04 23:34:42 +00:00
|
|
|
rng: self.rng.clone(),
|
2020-03-30 06:06:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct Signer {
|
2023-08-04 23:34:42 +00:00
|
|
|
private_key: Arc<RsaKeyPair>,
|
|
|
|
rng: SystemRandom,
|
2020-03-30 06:06:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl Signer {
|
2021-09-18 17:55:39 +00:00
|
|
|
fn sign(&self, signing_string: &str) -> Result<String, Error> {
|
2023-11-26 01:59:28 +00:00
|
|
|
let mut signature = vec![0; self.private_key.public().modulus_len()];
|
2023-08-04 23:34:42 +00:00
|
|
|
|
|
|
|
self.private_key
|
|
|
|
.sign(
|
|
|
|
&RSA_PKCS1_SHA256,
|
|
|
|
&self.rng,
|
|
|
|
signing_string.as_bytes(),
|
|
|
|
&mut signature,
|
|
|
|
)
|
|
|
|
.map_err(|_| ErrorKind::SignRequest)?;
|
|
|
|
|
|
|
|
Ok(STANDARD.encode(&signature))
|
2020-03-18 04:35:20 +00:00
|
|
|
}
|
2020-03-17 17:15:16 +00:00
|
|
|
}
|