2018-12-23 20:04:54 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-13 06:49:20 +00:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 20:04:54 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-04-26 16:33:10 +00:00
|
|
|
defmodule Pleroma.Web.Federator do
|
2019-08-13 17:20:26 +00:00
|
|
|
alias Pleroma.Activity
|
|
|
|
alias Pleroma.Object.Containment
|
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.Web.ActivityPub.ActivityPub
|
|
|
|
alias Pleroma.Web.ActivityPub.Transmogrifier
|
|
|
|
alias Pleroma.Web.ActivityPub.Utils
|
|
|
|
alias Pleroma.Web.Federator.Publisher
|
2019-08-31 16:08:56 +00:00
|
|
|
alias Pleroma.Workers.PublisherWorker
|
|
|
|
alias Pleroma.Workers.ReceiverWorker
|
2019-02-06 19:20:02 +00:00
|
|
|
|
2017-04-26 16:33:10 +00:00
|
|
|
require Logger
|
|
|
|
|
2020-12-16 16:51:48 +00:00
|
|
|
@behaviour Pleroma.Web.Federator.Publishing
|
|
|
|
|
2020-02-15 17:41:38 +00:00
|
|
|
@doc """
|
|
|
|
Returns `true` if the distance to target object does not exceed max configured value.
|
|
|
|
Serves to prevent fetching of very long threads, especially useful on smaller instances.
|
|
|
|
Addresses [memory leaks on recursive replies fetching](https://git.pleroma.social/pleroma/pleroma/issues/161).
|
|
|
|
Applies to fetching of both ancestor (reply-to) and child (reply) objects.
|
|
|
|
"""
|
2019-06-29 17:04:50 +00:00
|
|
|
# credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
|
2020-02-15 17:41:38 +00:00
|
|
|
def allowed_thread_distance?(distance) do
|
|
|
|
max_distance = Pleroma.Config.get([:instance, :federation_incoming_replies_max_depth])
|
2019-06-30 12:58:50 +00:00
|
|
|
|
2020-02-15 17:41:38 +00:00
|
|
|
if max_distance && max_distance >= 0 do
|
|
|
|
# Default depth is 0 (an object has zero distance from itself in its thread)
|
|
|
|
(distance || 0) <= max_distance
|
2019-06-30 12:58:50 +00:00
|
|
|
else
|
|
|
|
true
|
|
|
|
end
|
|
|
|
end
|
2019-06-29 17:04:50 +00:00
|
|
|
|
2019-01-28 15:17:17 +00:00
|
|
|
# Client API
|
|
|
|
|
|
|
|
def incoming_ap_doc(params) do
|
2019-08-31 18:58:42 +00:00
|
|
|
ReceiverWorker.enqueue("incoming_ap_doc", %{"params" => params})
|
2019-01-28 15:17:17 +00:00
|
|
|
end
|
|
|
|
|
2020-12-16 16:51:48 +00:00
|
|
|
@impl true
|
2019-08-09 17:08:01 +00:00
|
|
|
def publish(%{id: "pleroma:fakeid"} = activity) do
|
2019-08-13 17:20:26 +00:00
|
|
|
perform(:publish, activity)
|
2019-01-28 15:17:17 +00:00
|
|
|
end
|
|
|
|
|
2020-12-16 16:51:48 +00:00
|
|
|
@impl true
|
2019-08-09 17:08:01 +00:00
|
|
|
def publish(activity) do
|
2019-08-31 18:58:42 +00:00
|
|
|
PublisherWorker.enqueue("publish", %{"activity_id" => activity.id})
|
2017-08-02 10:34:48 +00:00
|
|
|
end
|
|
|
|
|
2019-08-13 17:20:26 +00:00
|
|
|
# Job Worker Callbacks
|
|
|
|
|
|
|
|
@spec perform(atom(), module(), any()) :: {:ok, any()} | {:error, any()}
|
|
|
|
def perform(:publish_one, module, params) do
|
|
|
|
apply(module, :publish_one, [params])
|
|
|
|
end
|
|
|
|
|
|
|
|
def perform(:publish, activity) do
|
|
|
|
Logger.debug(fn -> "Running publish for #{activity.data["id"]}" end)
|
|
|
|
|
|
|
|
with %User{} = actor <- User.get_cached_by_ap_id(activity.data["actor"]),
|
|
|
|
{:ok, actor} <- User.ensure_keys_present(actor) do
|
|
|
|
Publisher.publish(actor, activity)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def perform(:incoming_ap_doc, params) do
|
2019-12-11 10:46:07 +00:00
|
|
|
Logger.debug("Handling incoming AP activity")
|
2019-08-13 17:20:26 +00:00
|
|
|
|
2020-09-10 21:13:51 +00:00
|
|
|
actor =
|
|
|
|
params
|
|
|
|
|> Map.get("actor")
|
|
|
|
|> Utils.get_ap_id()
|
2019-08-13 17:20:26 +00:00
|
|
|
|
|
|
|
# NOTE: we use the actor ID to do the containment, this is fine because an
|
|
|
|
# actor shouldn't be acting on objects outside their own AP server.
|
2020-09-10 21:13:51 +00:00
|
|
|
with {_, {:ok, _user}} <- {:actor, ap_enabled_actor(actor)},
|
2019-08-13 17:20:26 +00:00
|
|
|
nil <- Activity.normalize(params["id"]),
|
2020-04-22 11:28:52 +00:00
|
|
|
{_, :ok} <-
|
2020-09-10 21:13:51 +00:00
|
|
|
{:correct_origin?, Containment.contain_origin_from_id(actor, params)},
|
2019-08-13 17:20:26 +00:00
|
|
|
{:ok, activity} <- Transmogrifier.handle_incoming(params) do
|
|
|
|
{:ok, activity}
|
|
|
|
else
|
2020-04-22 11:28:52 +00:00
|
|
|
{:correct_origin?, _} ->
|
|
|
|
Logger.debug("Origin containment failure for #{params["id"]}")
|
|
|
|
{:error, :origin_containment_failed}
|
|
|
|
|
2019-08-13 17:20:26 +00:00
|
|
|
%Activity{} ->
|
2019-12-11 10:46:07 +00:00
|
|
|
Logger.debug("Already had #{params["id"]}")
|
2020-04-22 11:28:52 +00:00
|
|
|
{:error, :already_present}
|
2019-08-13 17:20:26 +00:00
|
|
|
|
2020-09-10 21:13:51 +00:00
|
|
|
{:actor, e} ->
|
|
|
|
Logger.debug("Unhandled actor #{actor}, #{inspect(e)}")
|
|
|
|
{:error, e}
|
|
|
|
|
2020-04-22 11:28:52 +00:00
|
|
|
e ->
|
2019-08-13 17:20:26 +00:00
|
|
|
# Just drop those for now
|
2020-09-11 10:46:16 +00:00
|
|
|
Logger.debug(fn -> "Unhandled activity\n" <> Jason.encode!(params, pretty: true) end)
|
2020-04-22 11:28:52 +00:00
|
|
|
{:error, e}
|
2019-08-13 17:20:26 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def ap_enabled_actor(id) do
|
|
|
|
user = User.get_cached_by_ap_id(id)
|
|
|
|
|
|
|
|
if User.ap_enabled?(user) do
|
|
|
|
{:ok, user}
|
2018-02-21 07:51:03 +00:00
|
|
|
else
|
2019-08-13 17:20:26 +00:00
|
|
|
ActivityPub.make_user_from_ap_id(id)
|
2018-02-21 07:51:03 +00:00
|
|
|
end
|
|
|
|
end
|
2017-04-26 16:33:10 +00:00
|
|
|
end
|