mirror of
https://github.com/misskey-dev/misskey.git
synced 2025-04-04 14:03:27 +09:00

* 1. ed25519キーペアを発行・Personとして公開鍵を送受信 * validate additionalPublicKeys * getAuthUserFromApIdはmainを選ぶ * ✌️ * fix * signatureAlgorithm * set publicKeyCache lifetime * refresh * httpMessageSignatureAcceptable * ED25519_SIGNED_ALGORITHM * ED25519_PUBLIC_KEY_SIGNATURE_ALGORITHM * remove sign additionalPublicKeys signature requirements * httpMessageSignaturesSupported * httpMessageSignaturesImplementationLevel * httpMessageSignaturesImplementationLevel: '01' * perf(federation): Use hint for getAuthUserFromApId (#13470) * Hint for getAuthUserFromApId * とどのつまりこれでいいのか? * use @misskey-dev/node-http-message-signatures * fix * signedPost, signedGet * ap-request.tsを復活させる * remove digest prerender * fix test? * fix test * add httpMessageSignaturesImplementationLevel to FederationInstance * ManyToOne * fetchPersonWithRenewal * exactKey * ✌️ * use const * use gen-key-pair fn. from '@misskey-dev/node-http-message-signatures' * update node-http-message-signatures * fix * @misskey-dev/node-http-message-signatures@0.0.0-alpha.11 * getAuthUserFromApIdでupdatePersonの頻度を増やす * cacheRaw.date * use requiredInputs https://github.com/misskey-dev/misskey/pull/13464#discussion_r1509964359 * update @misskey-dev/node-http-message-signatures * clean up * err msg * fix(backend): fetchInstanceMetadataのLockが永遠に解除されない問題を修正 Co-authored-by: まっちゃとーにゅ <17376330+u1-liquid@users.noreply.github.com> * fix httpMessageSignaturesImplementationLevel validation * fix test * fix * comment * comment * improve test * fix * use Promise.all in genRSAAndEd25519KeyPair * refreshAndprepareEd25519KeyPair * refreshAndfindKey * commetn * refactor public keys add * digestプリレンダを復活させる RFC実装時にどうするか考える * fix, async * fix * !== true * use save * Deliver update person when new key generated (not tested) https://github.com/misskey-dev/misskey/pull/13464#issuecomment-1977049061 * 循環参照で落ちるのを解消? * fix? * Revert "fix?" This reverts commit0082f6f8e8
. * a * logger * log * change logger * 秘密鍵の変更は、フラグではなく鍵を引き回すようにする * addAllKnowingSharedInboxRecipe * nanka meccha kaeta * delivre * キャッシュ有効チェックはロック取得前に行う * @misskey-dev/node-http-message-signatures@0.0.3 * PrivateKeyPem * getLocalUserPrivateKey * fix test * if * fix ap-request * update node-http-message-signatures * fix type error * update package * fix type * update package * retry no key * @misskey-dev/node-http-message-signatures@0.0.8 * fix type error * log keyid * logger * db-resolver * JSON.stringify * HTTP Signatureがなかったり使えなかったりしそうな場合にLD Signatureを活用するように * inbox-delayed use actor if no signature * ユーザーとキーの同一性チェックはhostの一致にする * log signature parse err * save array * とりあえずtryで囲っておく * fetchPersonWithRenewalでエラーが起きたら古いデータを返す * use transactionalEntityManager * fix spdx * @misskey-dev/node-http-message-signatures@0.0.10 * add comment * fix * publicKeyに配列が入ってもいいようにする https://github.com/misskey-dev/misskey/pull/13950 * define additionalPublicKeys * fix * merge fix * refreshAndprepareEd25519KeyPair → refreshAndPrepareEd25519KeyPair * remove gen-key-pair.ts * defaultMaxListeners = 512 * Revert "defaultMaxListeners = 512" This reverts commitf2c412c180
. * genRSAAndEd25519KeyPairではキーを直列に生成する? * maxConcurrency: 8 * maxConcurrency: 16 * maxConcurrency: 8 * Revert "genRSAAndEd25519KeyPairではキーを直列に生成する?" This reverts commitd0aada55c1
. * maxWorkers: '90%' * Revert "maxWorkers: '90%'" This reverts commit9e0a93f110
. * e2e/timelines.tsで個々のテストに対するtimeoutを削除, maxConcurrency: 32 * better error handling of this.userPublickeysRepository.delete * better comment * set result to keypairEntityCache * deliverJobConcurrency: 16, deliverJobPerSec: 1024, inboxJobConcurrency: 4 * inboxJobPerSec: 64 * delete request.headers['host']; * fix * // node-fetch will generate this for us. if we keep 'Host', it won't change with redirects! * move delete host * modify comment * modify comment * fix correct → collect * refreshAndfindKey → refreshAndFindKey * modify comment * modify attachLdSignature * getApId, InboxProcessorService * TODO * [skip ci] add CHANGELOG --------- Co-authored-by: MeiMei <30769358+mei23@users.noreply.github.com> Co-authored-by: まっちゃとーにゅ <17376330+u1-liquid@users.noreply.github.com>
247 lines
9.7 KiB
TypeScript
247 lines
9.7 KiB
TypeScript
/*
|
|
* SPDX-FileCopyrightText: syuilo and misskey-project
|
|
* SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
import { URL } from 'node:url';
|
|
import { Injectable } from '@nestjs/common';
|
|
import * as Bull from 'bullmq';
|
|
import { verifyDraftSignature } from '@misskey-dev/node-http-message-signatures';
|
|
import type Logger from '@/logger.js';
|
|
import { MetaService } from '@/core/MetaService.js';
|
|
import { FederatedInstanceService } from '@/core/FederatedInstanceService.js';
|
|
import { FetchInstanceMetadataService } from '@/core/FetchInstanceMetadataService.js';
|
|
import InstanceChart from '@/core/chart/charts/instance.js';
|
|
import ApRequestChart from '@/core/chart/charts/ap-request.js';
|
|
import FederationChart from '@/core/chart/charts/federation.js';
|
|
import { getApId } from '@/core/activitypub/type.js';
|
|
import type { IActivity } from '@/core/activitypub/type.js';
|
|
import type { MiRemoteUser } from '@/models/User.js';
|
|
import type { MiUserPublickey } from '@/models/UserPublickey.js';
|
|
import { ApDbResolverService } from '@/core/activitypub/ApDbResolverService.js';
|
|
import { StatusError } from '@/misc/status-error.js';
|
|
import * as Acct from '@/misc/acct.js';
|
|
import { UtilityService } from '@/core/UtilityService.js';
|
|
import { ApPersonService } from '@/core/activitypub/models/ApPersonService.js';
|
|
import { JsonLdService } from '@/core/activitypub/JsonLdService.js';
|
|
import { ApInboxService } from '@/core/activitypub/ApInboxService.js';
|
|
import { bindThis } from '@/decorators.js';
|
|
import { IdentifiableError } from '@/misc/identifiable-error.js';
|
|
import { QueueLoggerService } from '../QueueLoggerService.js';
|
|
import type { InboxJobData } from '../types.js';
|
|
|
|
@Injectable()
|
|
export class InboxProcessorService {
|
|
private logger: Logger;
|
|
|
|
constructor(
|
|
private utilityService: UtilityService,
|
|
private metaService: MetaService,
|
|
private apInboxService: ApInboxService,
|
|
private federatedInstanceService: FederatedInstanceService,
|
|
private fetchInstanceMetadataService: FetchInstanceMetadataService,
|
|
private jsonLdService: JsonLdService,
|
|
private apPersonService: ApPersonService,
|
|
private apDbResolverService: ApDbResolverService,
|
|
private instanceChart: InstanceChart,
|
|
private apRequestChart: ApRequestChart,
|
|
private federationChart: FederationChart,
|
|
private queueLoggerService: QueueLoggerService,
|
|
) {
|
|
this.logger = this.queueLoggerService.logger.createSubLogger('inbox');
|
|
}
|
|
|
|
@bindThis
|
|
public async process(job: Bull.Job<InboxJobData>): Promise<string> {
|
|
const signature = job.data.signature ?
|
|
'version' in job.data.signature ? job.data.signature.value : job.data.signature
|
|
: null;
|
|
if (Array.isArray(signature)) {
|
|
// RFC 9401はsignatureが配列になるが、とりあえずエラーにする
|
|
throw new Error('signature is array');
|
|
}
|
|
let activity = job.data.activity;
|
|
let actorUri = getApId(activity.actor);
|
|
|
|
//#region Log
|
|
const info = Object.assign({}, activity);
|
|
delete info['@context'];
|
|
this.logger.debug(JSON.stringify(info, null, 2));
|
|
//#endregion
|
|
|
|
const host = this.utilityService.toPuny(new URL(actorUri).hostname);
|
|
|
|
// ブロックしてたら中断
|
|
const meta = await this.metaService.fetch();
|
|
if (this.utilityService.isBlockedHost(meta.blockedHosts, host)) {
|
|
return `Blocked request: ${host}`;
|
|
}
|
|
|
|
// HTTP-Signature keyIdを元にDBから取得
|
|
let authUser: Awaited<ReturnType<typeof this.apDbResolverService.getAuthUserFromApId>> = null;
|
|
let httpSignatureIsValid = null as boolean | null;
|
|
|
|
try {
|
|
authUser = await this.apDbResolverService.getAuthUserFromApId(actorUri, signature?.keyId);
|
|
} catch (err) {
|
|
// 対象が4xxならスキップ
|
|
if (err instanceof StatusError) {
|
|
if (!err.isRetryable) {
|
|
throw new Bull.UnrecoverableError(`skip: Ignored deleted actors on both ends ${activity.actor} - ${err.statusCode}`);
|
|
}
|
|
throw new Error(`Error in actor ${activity.actor} - ${err.statusCode}`);
|
|
}
|
|
}
|
|
|
|
// authUser.userがnullならスキップ
|
|
if (authUser != null && authUser.user == null) {
|
|
throw new Bull.UnrecoverableError('skip: failed to resolve user');
|
|
}
|
|
|
|
if (signature != null && authUser != null) {
|
|
if (signature.keyId.toLowerCase().startsWith('acct:')) {
|
|
this.logger.warn(`Old keyId is no longer supported. lowerKeyId=${signature.keyId.toLowerCase()}`);
|
|
} else if (authUser.key != null) {
|
|
// keyがなかったらLD Signatureで検証するべき
|
|
// HTTP-Signatureの検証
|
|
const errorLogger = (ms: any) => this.logger.error(ms);
|
|
httpSignatureIsValid = await verifyDraftSignature(signature, authUser.key.keyPem, errorLogger);
|
|
this.logger.debug('Inbox message validation: ', {
|
|
userId: authUser.user.id,
|
|
userAcct: Acct.toString(authUser.user),
|
|
parsedKeyId: signature.keyId,
|
|
foundKeyId: authUser.key.keyId,
|
|
httpSignatureValid: httpSignatureIsValid,
|
|
});
|
|
}
|
|
}
|
|
|
|
if (
|
|
authUser == null ||
|
|
httpSignatureIsValid !== true ||
|
|
authUser.user.uri !== actorUri // 一応チェック
|
|
) {
|
|
// 一致しなくても、でもLD-Signatureがありそうならそっちも見る
|
|
const ldSignature = activity.signature;
|
|
|
|
if (ldSignature && ldSignature.creator) {
|
|
if (ldSignature.type !== 'RsaSignature2017') {
|
|
throw new Bull.UnrecoverableError(`skip: unsupported LD-signature type ${ldSignature.type}`);
|
|
}
|
|
|
|
if (ldSignature.creator.toLowerCase().startsWith('acct:')) {
|
|
throw new Bull.UnrecoverableError(`old key not supported ${ldSignature.creator}`);
|
|
}
|
|
|
|
authUser = await this.apDbResolverService.getAuthUserFromApId(actorUri, ldSignature.creator);
|
|
|
|
if (authUser == null) {
|
|
throw new Bull.UnrecoverableError(`skip: LD-Signatureのactorとcreatorが一致しませんでした uri=${actorUri} creator=${ldSignature.creator}`);
|
|
}
|
|
if (authUser.user == null) {
|
|
throw new Bull.UnrecoverableError(`skip: LD-Signatureのユーザーが取得できませんでした uri=${actorUri} creator=${ldSignature.creator}`);
|
|
}
|
|
// 一応actorチェック
|
|
if (authUser.user.uri !== actorUri) {
|
|
throw new Bull.UnrecoverableError(`skip: LD-Signature user(${authUser.user.uri}) !== activity.actor(${actorUri})`);
|
|
}
|
|
if (authUser.key == null) {
|
|
throw new Bull.UnrecoverableError(`skip: LD-SignatureのユーザーはpublicKeyを持っていませんでした uri=${actorUri} creator=${ldSignature.creator}`);
|
|
}
|
|
|
|
const jsonLd = this.jsonLdService.use();
|
|
|
|
// LD-Signature検証
|
|
const verified = await jsonLd.verifyRsaSignature2017(activity, authUser.key.keyPem).catch(() => false);
|
|
if (!verified) {
|
|
throw new Bull.UnrecoverableError('skip: LD-Signatureの検証に失敗しました');
|
|
}
|
|
|
|
// ブロックしてたら中断
|
|
const ldHost = this.utilityService.extractDbHost(authUser.user.uri);
|
|
if (this.utilityService.isBlockedHost(meta.blockedHosts, ldHost)) {
|
|
throw new Bull.UnrecoverableError(`Blocked request: ${ldHost}`);
|
|
}
|
|
|
|
// アクティビティを正規化
|
|
// GHSA-2vxv-pv3m-3wvj
|
|
delete activity.signature;
|
|
try {
|
|
activity = await jsonLd.compact(activity) as IActivity;
|
|
} catch (e) {
|
|
throw new Bull.UnrecoverableError(`skip: failed to compact activity: ${e}`);
|
|
}
|
|
|
|
// actorが正規化前後で一致しているか確認
|
|
actorUri = getApId(activity.actor);
|
|
if (authUser.user.uri !== actorUri) {
|
|
throw new Bull.UnrecoverableError(`skip: LD-Signature user(${authUser.user.uri}) !== activity(after normalization).actor(${actorUri})`);
|
|
}
|
|
|
|
// TODO: 元のアクティビティと非互換な形に正規化される場合は転送をスキップする
|
|
// https://github.com/mastodon/mastodon/blob/664b0ca/app/services/activitypub/process_collection_service.rb#L24-L29
|
|
activity.signature = ldSignature;
|
|
|
|
//#region Log
|
|
const compactedInfo = Object.assign({}, activity);
|
|
delete compactedInfo['@context'];
|
|
this.logger.debug(`compacted: ${JSON.stringify(compactedInfo, null, 2)}`);
|
|
//#endregion
|
|
} else {
|
|
throw new Bull.UnrecoverableError(`skip: http-signature verification failed and no LD-Signature. http_signature_keyId=${signature?.keyId}`);
|
|
}
|
|
}
|
|
|
|
// activity.idがあればホストが署名者のホストであることを確認する
|
|
if (typeof activity.id === 'string') {
|
|
const signerHost = this.utilityService.extractDbHost(authUser.user.uri!);
|
|
const activityIdHost = this.utilityService.extractDbHost(activity.id);
|
|
if (signerHost !== activityIdHost) {
|
|
throw new Bull.UnrecoverableError(`skip: signerHost(${signerHost}) !== activity.id host(${activityIdHost}`);
|
|
}
|
|
}
|
|
|
|
// Update stats
|
|
this.federatedInstanceService.fetch(authUser.user.host).then(i => {
|
|
this.federatedInstanceService.update(i.id, {
|
|
latestRequestReceivedAt: new Date(),
|
|
isNotResponding: false,
|
|
// もしサーバーが死んでるために配信が止まっていた場合には自動的に復活させてあげる
|
|
suspensionState: i.suspensionState === 'autoSuspendedForNotResponding' ? 'none' : undefined,
|
|
});
|
|
|
|
this.fetchInstanceMetadataService.fetchInstanceMetadata(i);
|
|
|
|
this.apRequestChart.inbox();
|
|
this.federationChart.inbox(i.host);
|
|
|
|
if (meta.enableChartsForFederatedInstances) {
|
|
this.instanceChart.requestReceived(i.host);
|
|
}
|
|
});
|
|
|
|
// アクティビティを処理
|
|
try {
|
|
const result = await this.apInboxService.performActivity(authUser.user, activity);
|
|
if (result && !result.startsWith('ok')) {
|
|
this.logger.warn(`inbox activity ignored (maybe): id=${activity.id} reason=${result}`);
|
|
return result;
|
|
}
|
|
} catch (e) {
|
|
if (e instanceof IdentifiableError) {
|
|
if (e.id === '689ee33f-f97c-479a-ac49-1b9f8140af99') {
|
|
return 'blocked notes with prohibited words';
|
|
}
|
|
if (e.id === '85ab9bd7-3a41-4530-959d-f07073900109') {
|
|
return 'actor has been suspended';
|
|
}
|
|
if (e.id === 'd450b8a9-48e4-4dab-ae36-f4db763fda7c') { // invalid Note
|
|
return e.message;
|
|
}
|
|
}
|
|
throw e;
|
|
}
|
|
return 'ok';
|
|
}
|
|
}
|