Rework task system and fetching.
I can taste how close follow is to working.
This commit is contained in:
parent
0d5f7e7a89
commit
fb6c409a9a
|
@ -1,2 +1,3 @@
|
||||||
*.psql
|
*.psql
|
||||||
*.sqlite3
|
*.sqlite3
|
||||||
|
notes.md
|
||||||
|
|
59
core/ld.py
59
core/ld.py
|
@ -227,6 +227,49 @@ schemas = {
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
"*/schemas/litepub-0.1.jsonld": {
|
||||||
|
"contentType": "application/ld+json",
|
||||||
|
"documentUrl": "http://w3id.org/security/v1",
|
||||||
|
"contextUrl": None,
|
||||||
|
"document": {
|
||||||
|
"@context": [
|
||||||
|
"https://www.w3.org/ns/activitystreams",
|
||||||
|
"https://w3id.org/security/v1",
|
||||||
|
{
|
||||||
|
"Emoji": "toot:Emoji",
|
||||||
|
"Hashtag": "as:Hashtag",
|
||||||
|
"PropertyValue": "schema:PropertyValue",
|
||||||
|
"atomUri": "ostatus:atomUri",
|
||||||
|
"conversation": {"@id": "ostatus:conversation", "@type": "@id"},
|
||||||
|
"discoverable": "toot:discoverable",
|
||||||
|
"manuallyApprovesFollowers": "as:manuallyApprovesFollowers",
|
||||||
|
"capabilities": "litepub:capabilities",
|
||||||
|
"ostatus": "http://ostatus.org#",
|
||||||
|
"schema": "http://schema.org#",
|
||||||
|
"toot": "http://joinmastodon.org/ns#",
|
||||||
|
"misskey": "https://misskey-hub.net/ns#",
|
||||||
|
"fedibird": "http://fedibird.com/ns#",
|
||||||
|
"value": "schema:value",
|
||||||
|
"sensitive": "as:sensitive",
|
||||||
|
"litepub": "http://litepub.social/ns#",
|
||||||
|
"invisible": "litepub:invisible",
|
||||||
|
"directMessage": "litepub:directMessage",
|
||||||
|
"listMessage": {"@id": "litepub:listMessage", "@type": "@id"},
|
||||||
|
"quoteUrl": "as:quoteUrl",
|
||||||
|
"quoteUri": "fedibird:quoteUri",
|
||||||
|
"oauthRegistrationEndpoint": {
|
||||||
|
"@id": "litepub:oauthRegistrationEndpoint",
|
||||||
|
"@type": "@id",
|
||||||
|
},
|
||||||
|
"EmojiReact": "litepub:EmojiReact",
|
||||||
|
"ChatMessage": "litepub:ChatMessage",
|
||||||
|
"alsoKnownAs": {"@id": "as:alsoKnownAs", "@type": "@id"},
|
||||||
|
"vcard": "http://www.w3.org/2006/vcard/ns#",
|
||||||
|
"formerRepresentations": "litepub:formerRepresentations",
|
||||||
|
},
|
||||||
|
]
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -244,12 +287,16 @@ def builtin_document_loader(url: str, options={}):
|
||||||
try:
|
try:
|
||||||
return schemas[key]
|
return schemas[key]
|
||||||
except KeyError:
|
except KeyError:
|
||||||
raise JsonLdError(
|
try:
|
||||||
f"No schema built-in for {key!r}",
|
key = "*" + pieces.path.rstrip("/")
|
||||||
"jsonld.LoadDocumentError",
|
return schemas[key]
|
||||||
code="loading document failed",
|
except KeyError:
|
||||||
cause="KeyError",
|
raise JsonLdError(
|
||||||
)
|
f"No schema built-in for {key!r}",
|
||||||
|
"jsonld.LoadDocumentError",
|
||||||
|
code="loading document failed",
|
||||||
|
cause="KeyError",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def canonicalise(json_data, include_security=False):
|
def canonicalise(json_data, include_security=False):
|
||||||
|
|
|
@ -1,8 +1,14 @@
|
||||||
import base64
|
import base64
|
||||||
from typing import List, TypedDict
|
import json
|
||||||
|
from typing import Dict, List, Literal, TypedDict
|
||||||
|
from urllib.parse import urlparse
|
||||||
|
|
||||||
|
import httpx
|
||||||
from cryptography.hazmat.primitives import hashes
|
from cryptography.hazmat.primitives import hashes
|
||||||
from django.http import HttpRequest
|
from django.http import HttpRequest
|
||||||
|
from django.utils.http import http_date
|
||||||
|
|
||||||
|
from users.models import Identity
|
||||||
|
|
||||||
|
|
||||||
class HttpSignature:
|
class HttpSignature:
|
||||||
|
@ -25,7 +31,8 @@ class HttpSignature:
|
||||||
@classmethod
|
@classmethod
|
||||||
def headers_from_request(cls, request: HttpRequest, header_names: List[str]) -> str:
|
def headers_from_request(cls, request: HttpRequest, header_names: List[str]) -> str:
|
||||||
"""
|
"""
|
||||||
Creates the to-be-signed header payload from a Django request"""
|
Creates the to-be-signed header payload from a Django request
|
||||||
|
"""
|
||||||
headers = {}
|
headers = {}
|
||||||
for header_name in header_names:
|
for header_name in header_names:
|
||||||
if header_name == "(request-target)":
|
if header_name == "(request-target)":
|
||||||
|
@ -38,7 +45,7 @@ class HttpSignature:
|
||||||
return "\n".join(f"{name.lower()}: {value}" for name, value in headers.items())
|
return "\n".join(f"{name.lower()}: {value}" for name, value in headers.items())
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def parse_signature(cls, signature) -> "SignatureDetails":
|
def parse_signature(cls, signature: str) -> "SignatureDetails":
|
||||||
bits = {}
|
bits = {}
|
||||||
for item in signature.split(","):
|
for item in signature.split(","):
|
||||||
name, value = item.split("=", 1)
|
name, value = item.split("=", 1)
|
||||||
|
@ -52,6 +59,60 @@ class HttpSignature:
|
||||||
}
|
}
|
||||||
return signature_details
|
return signature_details
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def compile_signature(cls, details: "SignatureDetails") -> str:
|
||||||
|
value = f'keyId="{details["keyid"]}",headers="'
|
||||||
|
value += " ".join(h.lower() for h in details["headers"])
|
||||||
|
value += '",signature="'
|
||||||
|
value += base64.b64encode(details["signature"]).decode("ascii")
|
||||||
|
value += f'",algorithm="{details["algorithm"]}"'
|
||||||
|
return value
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
async def signed_request(
|
||||||
|
self,
|
||||||
|
uri: str,
|
||||||
|
body: Dict,
|
||||||
|
identity: Identity,
|
||||||
|
content_type: str = "application/json",
|
||||||
|
method: Literal["post"] = "post",
|
||||||
|
):
|
||||||
|
"""
|
||||||
|
Performs an async request to the given path, with a document, signed
|
||||||
|
as an identity.
|
||||||
|
"""
|
||||||
|
uri_parts = urlparse(uri)
|
||||||
|
date_string = http_date()
|
||||||
|
body_bytes = json.dumps(body).encode("utf8")
|
||||||
|
headers = {
|
||||||
|
"(request-target)": f"{method} {uri_parts.path}",
|
||||||
|
"Host": uri_parts.hostname,
|
||||||
|
"Date": date_string,
|
||||||
|
"Digest": self.calculate_digest(body_bytes),
|
||||||
|
"Content-Type": content_type,
|
||||||
|
}
|
||||||
|
signed_string = "\n".join(
|
||||||
|
f"{name.lower()}: {value}" for name, value in headers.items()
|
||||||
|
)
|
||||||
|
headers["Signature"] = self.compile_signature(
|
||||||
|
{
|
||||||
|
"keyid": identity.urls.key.full(), # type:ignore
|
||||||
|
"headers": list(headers.keys()),
|
||||||
|
"signature": identity.sign(signed_string),
|
||||||
|
"algorithm": "rsa-sha256",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
del headers["(request-target)"]
|
||||||
|
async with httpx.AsyncClient() as client:
|
||||||
|
print(f"Calling {method} {uri}")
|
||||||
|
print(body)
|
||||||
|
return await client.request(
|
||||||
|
method,
|
||||||
|
uri,
|
||||||
|
headers=headers,
|
||||||
|
content=body_bytes,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
class SignatureDetails(TypedDict):
|
class SignatureDetails(TypedDict):
|
||||||
algorithm: str
|
algorithm: str
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Generated by Django 4.1.3 on 2022-11-06 19:58
|
# Generated by Django 4.1.3 on 2022-11-07 04:19
|
||||||
|
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
@ -25,7 +25,13 @@ class Migration(migrations.Migration):
|
||||||
(
|
(
|
||||||
"type",
|
"type",
|
||||||
models.CharField(
|
models.CharField(
|
||||||
choices=[("identity_fetch", "Identity Fetch")], max_length=500
|
choices=[
|
||||||
|
("identity_fetch", "Identity Fetch"),
|
||||||
|
("inbox_item", "Inbox Item"),
|
||||||
|
("follow_request", "Follow Request"),
|
||||||
|
("follow_acknowledge", "Follow Acknowledge"),
|
||||||
|
],
|
||||||
|
max_length=500,
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
("priority", models.IntegerField(default=0)),
|
("priority", models.IntegerField(default=0)),
|
||||||
|
|
|
@ -11,6 +11,9 @@ class Task(models.Model):
|
||||||
|
|
||||||
class TypeChoices(models.TextChoices):
|
class TypeChoices(models.TextChoices):
|
||||||
identity_fetch = "identity_fetch"
|
identity_fetch = "identity_fetch"
|
||||||
|
inbox_item = "inbox_item"
|
||||||
|
follow_request = "follow_request"
|
||||||
|
follow_acknowledge = "follow_acknowledge"
|
||||||
|
|
||||||
type = models.CharField(max_length=500, choices=TypeChoices.choices)
|
type = models.CharField(max_length=500, choices=TypeChoices.choices)
|
||||||
priority = models.IntegerField(default=0)
|
priority = models.IntegerField(default=0)
|
||||||
|
@ -42,7 +45,7 @@ class Task(models.Model):
|
||||||
return next_task
|
return next_task
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def submit(cls, type, subject, payload=None, deduplicate=True):
|
def submit(cls, type, subject: str, payload=None, deduplicate=True):
|
||||||
# Deduplication is done against tasks that have not started yet only,
|
# Deduplication is done against tasks that have not started yet only,
|
||||||
# and only on tasks without payloads
|
# and only on tasks without payloads
|
||||||
if deduplicate and not payload:
|
if deduplicate and not payload:
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
import traceback
|
||||||
|
|
||||||
|
from users.tasks.follow import handle_follow_request
|
||||||
|
from users.tasks.identity import handle_identity_fetch
|
||||||
|
from users.tasks.inbox import handle_inbox_item
|
||||||
|
|
||||||
|
|
||||||
|
class TaskHandler:
|
||||||
|
|
||||||
|
handlers = {
|
||||||
|
"identity_fetch": handle_identity_fetch,
|
||||||
|
"inbox_item": handle_inbox_item,
|
||||||
|
"follow_request": handle_follow_request,
|
||||||
|
}
|
||||||
|
|
||||||
|
def __init__(self, task):
|
||||||
|
self.task = task
|
||||||
|
self.subject = self.task.subject
|
||||||
|
self.payload = self.task.payload
|
||||||
|
|
||||||
|
async def handle(self):
|
||||||
|
try:
|
||||||
|
print(f"Task {self.task}: Starting")
|
||||||
|
if self.task.type not in self.handlers:
|
||||||
|
raise ValueError(f"Cannot handle type {self.task.type}")
|
||||||
|
await self.handlers[self.task.type](
|
||||||
|
self,
|
||||||
|
)
|
||||||
|
await self.task.complete()
|
||||||
|
print(f"Task {self.task}: Complete")
|
||||||
|
except BaseException as e:
|
||||||
|
print(f"Task {self.task}: Error {e}")
|
||||||
|
traceback.print_exc()
|
||||||
|
await self.task.fail(f"{e}\n\n" + traceback.format_exc())
|
|
@ -1,6 +1,5 @@
|
||||||
import asyncio
|
import asyncio
|
||||||
import time
|
import time
|
||||||
import traceback
|
|
||||||
import uuid
|
import uuid
|
||||||
|
|
||||||
from asgiref.sync import sync_to_async
|
from asgiref.sync import sync_to_async
|
||||||
|
@ -8,7 +7,7 @@ from django.http import HttpResponse
|
||||||
from django.views import View
|
from django.views import View
|
||||||
|
|
||||||
from miniq.models import Task
|
from miniq.models import Task
|
||||||
from users.models import Identity
|
from miniq.tasks import TaskHandler
|
||||||
|
|
||||||
|
|
||||||
class QueueProcessor(View):
|
class QueueProcessor(View):
|
||||||
|
@ -19,7 +18,8 @@ class QueueProcessor(View):
|
||||||
|
|
||||||
START_TIMEOUT = 30
|
START_TIMEOUT = 30
|
||||||
TOTAL_TIMEOUT = 60
|
TOTAL_TIMEOUT = 60
|
||||||
MAX_TASKS = 10
|
LOCK_TIMEOUT = 200
|
||||||
|
MAX_TASKS = 20
|
||||||
|
|
||||||
async def get(self, request):
|
async def get(self, request):
|
||||||
start_time = time.monotonic()
|
start_time = time.monotonic()
|
||||||
|
@ -35,10 +35,11 @@ class QueueProcessor(View):
|
||||||
# Pop a task off the queue and run it
|
# Pop a task off the queue and run it
|
||||||
task = await sync_to_async(Task.get_one_available)(processor_id)
|
task = await sync_to_async(Task.get_one_available)(processor_id)
|
||||||
if task is not None:
|
if task is not None:
|
||||||
self.tasks.append(asyncio.create_task(self.run_task(task)))
|
self.tasks.append(asyncio.create_task(TaskHandler(task).handle()))
|
||||||
handled += 1
|
handled += 1
|
||||||
# Prevent busylooping
|
# Prevent busylooping
|
||||||
await asyncio.sleep(0.01)
|
await asyncio.sleep(0.01)
|
||||||
|
# TODO: Clean up old locks here
|
||||||
# Then wait for tasks to finish
|
# Then wait for tasks to finish
|
||||||
while (time.monotonic() - start_time) < self.TOTAL_TIMEOUT:
|
while (time.monotonic() - start_time) < self.TOTAL_TIMEOUT:
|
||||||
# Remove completed tasks
|
# Remove completed tasks
|
||||||
|
@ -48,24 +49,3 @@ class QueueProcessor(View):
|
||||||
# Prevent busylooping
|
# Prevent busylooping
|
||||||
await asyncio.sleep(1)
|
await asyncio.sleep(1)
|
||||||
return HttpResponse(f"{handled} tasks handled")
|
return HttpResponse(f"{handled} tasks handled")
|
||||||
|
|
||||||
async def run_task(self, task):
|
|
||||||
try:
|
|
||||||
print(f"Task {task}: Starting")
|
|
||||||
handler = getattr(self, f"handle_{task.type}", None)
|
|
||||||
if handler is None:
|
|
||||||
raise ValueError(f"Cannot handle type {task.type}")
|
|
||||||
await handler(task.subject, task.payload)
|
|
||||||
await task.complete()
|
|
||||||
print(f"Task {task}: Complete")
|
|
||||||
except BaseException as e:
|
|
||||||
print(f"Task {task}: Error {e}")
|
|
||||||
traceback.print_exc()
|
|
||||||
await task.fail(f"{e}\n\n" + traceback.format_exc())
|
|
||||||
|
|
||||||
async def handle_identity_fetch(self, subject, payload):
|
|
||||||
# Get the actor URI via webfinger
|
|
||||||
actor_uri, handle = await Identity.fetch_webfinger(subject)
|
|
||||||
# Get or create the identity, then fetch
|
|
||||||
identity = await sync_to_async(Identity.by_actor_uri)(actor_uri, create=True)
|
|
||||||
await identity.fetch_actor()
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Generated by Django 4.1.3 on 2022-11-06 19:58
|
# Generated by Django 4.1.3 on 2022-11-07 04:19
|
||||||
|
|
||||||
import django.db.models.deletion
|
import django.db.models.deletion
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
||||||
|
|
|
@ -62,8 +62,9 @@ WSGI_APPLICATION = "takahe.wsgi.application"
|
||||||
|
|
||||||
DATABASES = {
|
DATABASES = {
|
||||||
"default": {
|
"default": {
|
||||||
"ENGINE": "django.db.backends.sqlite3",
|
"ENGINE": "django.db.backends.postgresql_psycopg2",
|
||||||
"NAME": BASE_DIR / "db.sqlite3",
|
"NAME": "takahe",
|
||||||
|
"USER": "postgres",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -14,6 +14,7 @@ urlpatterns = [
|
||||||
path("@<handle>/", identity.ViewIdentity.as_view()),
|
path("@<handle>/", identity.ViewIdentity.as_view()),
|
||||||
path("@<handle>/actor/", identity.Actor.as_view()),
|
path("@<handle>/actor/", identity.Actor.as_view()),
|
||||||
path("@<handle>/actor/inbox/", identity.Inbox.as_view()),
|
path("@<handle>/actor/inbox/", identity.Inbox.as_view()),
|
||||||
|
path("@<handle>/action/", identity.ActionIdentity.as_view()),
|
||||||
# Identity selection
|
# Identity selection
|
||||||
path("@<handle>/activate/", identity.ActivateIdentity.as_view()),
|
path("@<handle>/activate/", identity.ActivateIdentity.as_view()),
|
||||||
path("identity/select/", identity.SelectIdentity.as_view()),
|
path("identity/select/", identity.SelectIdentity.as_view()),
|
||||||
|
|
|
@ -10,11 +10,11 @@
|
||||||
{% else %}
|
{% else %}
|
||||||
<img src="{% static "img/unknown-icon-128.png" %}" class="icon">
|
<img src="{% static "img/unknown-icon-128.png" %}" class="icon">
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{{ identity }} <small>@{{ identity.handle }}</small>
|
{{ identity.name_or_handle }} <small>@{{ identity.handle }}</small>
|
||||||
</h1>
|
</h1>
|
||||||
|
|
||||||
{% if not identity.local %}
|
{% if not identity.local %}
|
||||||
{% if not identity.actor_uri %}
|
{% if identity.outdated and not identity.name %}
|
||||||
<p class="system-note">
|
<p class="system-note">
|
||||||
The system is still fetching this profile. Refresh to see updates.
|
The system is still fetching this profile. Refresh to see updates.
|
||||||
</p>
|
</p>
|
||||||
|
@ -26,6 +26,19 @@
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% if request.identity %}
|
||||||
|
<form action="{{ identity.urls.action }}" method="POST">
|
||||||
|
{% csrf_token %}
|
||||||
|
{% if follow %}
|
||||||
|
<input type="hidden" name="action" value="unfollow">
|
||||||
|
<button>Unfollow</button>
|
||||||
|
{% else %}
|
||||||
|
<input type="hidden" name="action" value="follow">
|
||||||
|
<button>Follow</button>
|
||||||
|
{% endif %}
|
||||||
|
</form>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{% for status in statuses %}
|
{% for status in statuses %}
|
||||||
{% include "statuses/_status.html" %}
|
{% include "statuses/_status.html" %}
|
||||||
{% empty %}
|
{% empty %}
|
||||||
|
|
|
@ -21,4 +21,4 @@ class UserEventAdmin(admin.ModelAdmin):
|
||||||
@admin.register(Identity)
|
@admin.register(Identity)
|
||||||
class IdentityAdmin(admin.ModelAdmin):
|
class IdentityAdmin(admin.ModelAdmin):
|
||||||
|
|
||||||
list_display = ["id", "handle", "name", "local"]
|
list_display = ["id", "handle", "actor_uri", "name", "local"]
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Generated by Django 4.1.3 on 2022-11-06 19:58
|
# Generated by Django 4.1.3 on 2022-11-07 04:19
|
||||||
|
|
||||||
import functools
|
import functools
|
||||||
|
|
||||||
|
@ -56,11 +56,17 @@ class Migration(migrations.Migration):
|
||||||
),
|
),
|
||||||
(
|
(
|
||||||
"service_domain",
|
"service_domain",
|
||||||
models.CharField(blank=True, max_length=250, null=True),
|
models.CharField(
|
||||||
|
blank=True,
|
||||||
|
db_index=True,
|
||||||
|
max_length=250,
|
||||||
|
null=True,
|
||||||
|
unique=True,
|
||||||
|
),
|
||||||
),
|
),
|
||||||
("local", models.BooleanField()),
|
("local", models.BooleanField()),
|
||||||
("blocked", models.BooleanField(default=False)),
|
("blocked", models.BooleanField(default=False)),
|
||||||
("public", models.BooleanField()),
|
("public", models.BooleanField(default=False)),
|
||||||
("created", models.DateTimeField(auto_now_add=True)),
|
("created", models.DateTimeField(auto_now_add=True)),
|
||||||
("updated", models.DateTimeField(auto_now=True)),
|
("updated", models.DateTimeField(auto_now=True)),
|
||||||
(
|
(
|
||||||
|
@ -118,12 +124,7 @@ class Migration(migrations.Migration):
|
||||||
verbose_name="ID",
|
verbose_name="ID",
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
(
|
("actor_uri", models.CharField(max_length=500, unique=True)),
|
||||||
"actor_uri",
|
|
||||||
models.CharField(
|
|
||||||
blank=True, max_length=500, null=True, unique=True
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("local", models.BooleanField()),
|
("local", models.BooleanField()),
|
||||||
("username", models.CharField(blank=True, max_length=500, null=True)),
|
("username", models.CharField(blank=True, max_length=500, null=True)),
|
||||||
("name", models.CharField(blank=True, max_length=500, null=True)),
|
("name", models.CharField(blank=True, max_length=500, null=True)),
|
||||||
|
@ -191,39 +192,6 @@ class Migration(migrations.Migration):
|
||||||
"unique_together": {("username", "domain")},
|
"unique_together": {("username", "domain")},
|
||||||
},
|
},
|
||||||
),
|
),
|
||||||
migrations.CreateModel(
|
|
||||||
name="Follow",
|
|
||||||
fields=[
|
|
||||||
(
|
|
||||||
"id",
|
|
||||||
models.BigAutoField(
|
|
||||||
auto_created=True,
|
|
||||||
primary_key=True,
|
|
||||||
serialize=False,
|
|
||||||
verbose_name="ID",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("note", models.TextField(blank=True, null=True)),
|
|
||||||
("created", models.DateTimeField(auto_now_add=True)),
|
|
||||||
("updated", models.DateTimeField(auto_now=True)),
|
|
||||||
(
|
|
||||||
"source",
|
|
||||||
models.ForeignKey(
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
related_name="outbound_follows",
|
|
||||||
to="users.identity",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
(
|
|
||||||
"target",
|
|
||||||
models.ForeignKey(
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
related_name="inbound_follows",
|
|
||||||
to="users.identity",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
],
|
|
||||||
),
|
|
||||||
migrations.CreateModel(
|
migrations.CreateModel(
|
||||||
name="Block",
|
name="Block",
|
||||||
fields=[
|
fields=[
|
||||||
|
@ -259,4 +227,43 @@ class Migration(migrations.Migration):
|
||||||
),
|
),
|
||||||
],
|
],
|
||||||
),
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name="Follow",
|
||||||
|
fields=[
|
||||||
|
(
|
||||||
|
"id",
|
||||||
|
models.BigAutoField(
|
||||||
|
auto_created=True,
|
||||||
|
primary_key=True,
|
||||||
|
serialize=False,
|
||||||
|
verbose_name="ID",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
("uri", models.CharField(blank=True, max_length=500, null=True)),
|
||||||
|
("note", models.TextField(blank=True, null=True)),
|
||||||
|
("requested", models.BooleanField(default=False)),
|
||||||
|
("accepted", models.BooleanField(default=False)),
|
||||||
|
("created", models.DateTimeField(auto_now_add=True)),
|
||||||
|
("updated", models.DateTimeField(auto_now=True)),
|
||||||
|
(
|
||||||
|
"source",
|
||||||
|
models.ForeignKey(
|
||||||
|
on_delete=django.db.models.deletion.CASCADE,
|
||||||
|
related_name="outbound_follows",
|
||||||
|
to="users.identity",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
(
|
||||||
|
"target",
|
||||||
|
models.ForeignKey(
|
||||||
|
on_delete=django.db.models.deletion.CASCADE,
|
||||||
|
related_name="inbound_follows",
|
||||||
|
to="users.identity",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
"unique_together": {("source", "target")},
|
||||||
|
},
|
||||||
|
),
|
||||||
]
|
]
|
||||||
|
|
|
@ -48,14 +48,14 @@ class Domain(models.Model):
|
||||||
updated = models.DateTimeField(auto_now=True)
|
updated = models.DateTimeField(auto_now=True)
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def get_remote_domain(cls, domain) -> "Domain":
|
def get_remote_domain(cls, domain: str) -> "Domain":
|
||||||
try:
|
try:
|
||||||
return cls.objects.get(domain=domain, local=False)
|
return cls.objects.get(domain=domain, local=False)
|
||||||
except cls.DoesNotExist:
|
except cls.DoesNotExist:
|
||||||
return cls.objects.create(domain=domain, local=False)
|
return cls.objects.create(domain=domain, local=False)
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def get_local_domain(cls, domain) -> Optional["Domain"]:
|
def get_local_domain(cls, domain: str) -> Optional["Domain"]:
|
||||||
try:
|
try:
|
||||||
return cls.objects.get(
|
return cls.objects.get(
|
||||||
models.Q(domain=domain) | models.Q(service_domain=domain)
|
models.Q(domain=domain) | models.Q(service_domain=domain)
|
||||||
|
|
|
@ -1,5 +1,9 @@
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
from django.db import models
|
from django.db import models
|
||||||
|
|
||||||
|
from miniq.models import Task
|
||||||
|
|
||||||
|
|
||||||
class Follow(models.Model):
|
class Follow(models.Model):
|
||||||
"""
|
"""
|
||||||
|
@ -17,7 +21,53 @@ class Follow(models.Model):
|
||||||
related_name="inbound_follows",
|
related_name="inbound_follows",
|
||||||
)
|
)
|
||||||
|
|
||||||
|
uri = models.CharField(blank=True, null=True, max_length=500)
|
||||||
note = models.TextField(blank=True, null=True)
|
note = models.TextField(blank=True, null=True)
|
||||||
|
|
||||||
|
requested = models.BooleanField(default=False)
|
||||||
|
accepted = models.BooleanField(default=False)
|
||||||
|
|
||||||
created = models.DateTimeField(auto_now_add=True)
|
created = models.DateTimeField(auto_now_add=True)
|
||||||
updated = models.DateTimeField(auto_now=True)
|
updated = models.DateTimeField(auto_now=True)
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
unique_together = [("source", "target")]
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def maybe_get(cls, source, target) -> Optional["Follow"]:
|
||||||
|
"""
|
||||||
|
Returns a follow if it exists between source and target
|
||||||
|
"""
|
||||||
|
try:
|
||||||
|
return Follow.objects.get(source=source, target=target)
|
||||||
|
except Follow.DoesNotExist:
|
||||||
|
return None
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def create_local(cls, source, target):
|
||||||
|
"""
|
||||||
|
Creates a Follow from a local Identity to the target
|
||||||
|
(which can be local or remote).
|
||||||
|
"""
|
||||||
|
if not source.local:
|
||||||
|
raise ValueError("You cannot initiate follows on a remote Identity")
|
||||||
|
try:
|
||||||
|
follow = Follow.objects.get(source=source, target=target)
|
||||||
|
except Follow.DoesNotExist:
|
||||||
|
follow = Follow.objects.create(source=source, target=target, uri="")
|
||||||
|
follow.uri = source.actor_uri + f"follow/{follow.pk}/"
|
||||||
|
if target.local:
|
||||||
|
follow.requested = True
|
||||||
|
follow.accepted = True
|
||||||
|
else:
|
||||||
|
Task.submit("follow_request", str(follow.pk))
|
||||||
|
follow.save()
|
||||||
|
return follow
|
||||||
|
|
||||||
|
def undo(self):
|
||||||
|
"""
|
||||||
|
Undoes this follow
|
||||||
|
"""
|
||||||
|
if not self.target.local:
|
||||||
|
Task.submit("follow_undo", str(self.pk))
|
||||||
|
self.delete()
|
||||||
|
|
|
@ -6,12 +6,11 @@ from urllib.parse import urlparse
|
||||||
|
|
||||||
import httpx
|
import httpx
|
||||||
import urlman
|
import urlman
|
||||||
from asgiref.sync import sync_to_async
|
from asgiref.sync import async_to_sync, sync_to_async
|
||||||
from cryptography.hazmat.primitives import hashes, serialization
|
from cryptography.hazmat.primitives import serialization
|
||||||
from cryptography.hazmat.primitives.asymmetric import padding, rsa
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
||||||
from django.db import models
|
from django.db import models
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
from django.utils.http import http_date
|
|
||||||
from OpenSSL import crypto
|
from OpenSSL import crypto
|
||||||
|
|
||||||
from core.ld import canonicalise
|
from core.ld import canonicalise
|
||||||
|
@ -34,7 +33,7 @@ class Identity(models.Model):
|
||||||
|
|
||||||
# The Actor URI is essentially also a PK - we keep the default numeric
|
# The Actor URI is essentially also a PK - we keep the default numeric
|
||||||
# one around as well for making nice URLs etc.
|
# one around as well for making nice URLs etc.
|
||||||
actor_uri = models.CharField(max_length=500, blank=True, null=True, unique=True)
|
actor_uri = models.CharField(max_length=500, unique=True)
|
||||||
|
|
||||||
local = models.BooleanField()
|
local = models.BooleanField()
|
||||||
users = models.ManyToManyField("users.User", related_name="identities")
|
users = models.ManyToManyField("users.User", related_name="identities")
|
||||||
|
@ -73,10 +72,35 @@ class Identity(models.Model):
|
||||||
fetched = models.DateTimeField(null=True, blank=True)
|
fetched = models.DateTimeField(null=True, blank=True)
|
||||||
deleted = models.DateTimeField(null=True, blank=True)
|
deleted = models.DateTimeField(null=True, blank=True)
|
||||||
|
|
||||||
|
### Model attributes ###
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
verbose_name_plural = "identities"
|
verbose_name_plural = "identities"
|
||||||
unique_together = [("username", "domain")]
|
unique_together = [("username", "domain")]
|
||||||
|
|
||||||
|
class urls(urlman.Urls):
|
||||||
|
view = "/@{self.username}@{self.domain_id}/"
|
||||||
|
view_short = "/@{self.username}/"
|
||||||
|
action = "{view}action/"
|
||||||
|
actor = "{view}actor/"
|
||||||
|
activate = "{view}activate/"
|
||||||
|
key = "{actor}#main-key"
|
||||||
|
inbox = "{actor}inbox/"
|
||||||
|
outbox = "{actor}outbox/"
|
||||||
|
|
||||||
|
def get_scheme(self, url):
|
||||||
|
return "https"
|
||||||
|
|
||||||
|
def get_hostname(self, url):
|
||||||
|
return self.instance.domain.uri_domain
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
if self.username and self.domain_id:
|
||||||
|
return self.handle
|
||||||
|
return self.actor_uri
|
||||||
|
|
||||||
|
### Alternate constructors/fetchers ###
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def by_handle(cls, handle, fetch=False, local=False):
|
def by_handle(cls, handle, fetch=False, local=False):
|
||||||
if handle.startswith("@"):
|
if handle.startswith("@"):
|
||||||
|
@ -91,7 +115,15 @@ class Identity(models.Model):
|
||||||
return cls.objects.get(username=username, domain_id=domain)
|
return cls.objects.get(username=username, domain_id=domain)
|
||||||
except cls.DoesNotExist:
|
except cls.DoesNotExist:
|
||||||
if fetch and not local:
|
if fetch and not local:
|
||||||
return cls.objects.create(handle=handle, local=False)
|
actor_uri, handle = async_to_sync(cls.fetch_webfinger)(handle)
|
||||||
|
username, domain = handle.split("@")
|
||||||
|
domain = Domain.get_remote_domain(domain)
|
||||||
|
return cls.objects.create(
|
||||||
|
actor_uri=actor_uri,
|
||||||
|
username=username,
|
||||||
|
domain_id=domain,
|
||||||
|
local=False,
|
||||||
|
)
|
||||||
return None
|
return None
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
|
@ -108,9 +140,17 @@ class Identity(models.Model):
|
||||||
except cls.DoesNotExist:
|
except cls.DoesNotExist:
|
||||||
return cls.objects.create(actor_uri=uri, local=False)
|
return cls.objects.create(actor_uri=uri, local=False)
|
||||||
|
|
||||||
|
### Dynamic properties ###
|
||||||
|
|
||||||
|
@property
|
||||||
|
def name_or_handle(self):
|
||||||
|
return self.name or self.handle
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def handle(self):
|
def handle(self):
|
||||||
return f"{self.username}@{self.domain_id}"
|
if self.domain_id:
|
||||||
|
return f"{self.username}@{self.domain_id}"
|
||||||
|
return f"{self.username}@UNKNOWN-DOMAIN"
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def data_age(self) -> float:
|
def data_age(self) -> float:
|
||||||
|
@ -123,23 +163,12 @@ class Identity(models.Model):
|
||||||
return 10000000000
|
return 10000000000
|
||||||
return (timezone.now() - self.fetched).total_seconds()
|
return (timezone.now() - self.fetched).total_seconds()
|
||||||
|
|
||||||
def generate_keypair(self):
|
@property
|
||||||
if not self.local:
|
def outdated(self) -> bool:
|
||||||
raise ValueError("Cannot generate keypair for remote user")
|
# TODO: Setting
|
||||||
private_key = rsa.generate_private_key(
|
return self.data_age > 60 * 24 * 24
|
||||||
public_exponent=65537,
|
|
||||||
key_size=2048,
|
### Actor/Webfinger fetching ###
|
||||||
)
|
|
||||||
self.private_key = private_key.private_bytes(
|
|
||||||
encoding=serialization.Encoding.PEM,
|
|
||||||
format=serialization.PrivateFormat.PKCS8,
|
|
||||||
encryption_algorithm=serialization.NoEncryption(),
|
|
||||||
)
|
|
||||||
self.public_key = private_key.public_key().public_bytes(
|
|
||||||
encoding=serialization.Encoding.PEM,
|
|
||||||
format=serialization.PublicFormat.SubjectPublicKeyInfo,
|
|
||||||
)
|
|
||||||
self.save()
|
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
async def fetch_webfinger(cls, handle: str) -> Tuple[Optional[str], Optional[str]]:
|
async def fetch_webfinger(cls, handle: str) -> Tuple[Optional[str], Optional[str]]:
|
||||||
|
@ -189,6 +218,8 @@ class Identity(models.Model):
|
||||||
self.outbox_uri = document.get("outbox")
|
self.outbox_uri = document.get("outbox")
|
||||||
self.summary = document.get("summary")
|
self.summary = document.get("summary")
|
||||||
self.username = document.get("preferredUsername")
|
self.username = document.get("preferredUsername")
|
||||||
|
if "@value" in self.username:
|
||||||
|
self.username = self.username["@value"]
|
||||||
self.manually_approves_followers = document.get(
|
self.manually_approves_followers = document.get(
|
||||||
"as:manuallyApprovesFollowers"
|
"as:manuallyApprovesFollowers"
|
||||||
)
|
)
|
||||||
|
@ -214,23 +245,42 @@ class Identity(models.Model):
|
||||||
await sync_to_async(self.save)()
|
await sync_to_async(self.save)()
|
||||||
return True
|
return True
|
||||||
|
|
||||||
def sign(self, cleartext: str) -> str:
|
### Cryptography ###
|
||||||
|
|
||||||
|
def generate_keypair(self):
|
||||||
|
if not self.local:
|
||||||
|
raise ValueError("Cannot generate keypair for remote user")
|
||||||
|
private_key = rsa.generate_private_key(
|
||||||
|
public_exponent=65537,
|
||||||
|
key_size=2048,
|
||||||
|
)
|
||||||
|
self.private_key = private_key.private_bytes(
|
||||||
|
encoding=serialization.Encoding.PEM,
|
||||||
|
format=serialization.PrivateFormat.PKCS8,
|
||||||
|
encryption_algorithm=serialization.NoEncryption(),
|
||||||
|
).decode("ascii")
|
||||||
|
self.public_key = (
|
||||||
|
private_key.public_key()
|
||||||
|
.public_bytes(
|
||||||
|
encoding=serialization.Encoding.PEM,
|
||||||
|
format=serialization.PublicFormat.SubjectPublicKeyInfo,
|
||||||
|
)
|
||||||
|
.decode("ascii")
|
||||||
|
)
|
||||||
|
self.save()
|
||||||
|
|
||||||
|
def sign(self, cleartext: str) -> bytes:
|
||||||
if not self.private_key:
|
if not self.private_key:
|
||||||
raise ValueError("Cannot sign - no private key")
|
raise ValueError("Cannot sign - no private key")
|
||||||
private_key = serialization.load_pem_private_key(
|
pkey = crypto.load_privatekey(
|
||||||
|
crypto.FILETYPE_PEM,
|
||||||
self.private_key.encode("ascii"),
|
self.private_key.encode("ascii"),
|
||||||
password=None,
|
|
||||||
)
|
)
|
||||||
return base64.b64encode(
|
return crypto.sign(
|
||||||
private_key.sign(
|
pkey,
|
||||||
cleartext.encode("ascii"),
|
cleartext.encode("ascii"),
|
||||||
padding.PSS(
|
"sha256",
|
||||||
mgf=padding.MGF1(hashes.SHA256()),
|
)
|
||||||
salt_length=padding.PSS.MAX_LENGTH,
|
|
||||||
),
|
|
||||||
hashes.SHA256(),
|
|
||||||
)
|
|
||||||
).decode("ascii")
|
|
||||||
|
|
||||||
def verify_signature(self, signature: bytes, cleartext: str) -> bool:
|
def verify_signature(self, signature: bytes, cleartext: str) -> bool:
|
||||||
if not self.public_key:
|
if not self.public_key:
|
||||||
|
@ -247,55 +297,3 @@ class Identity(models.Model):
|
||||||
except crypto.Error:
|
except crypto.Error:
|
||||||
return False
|
return False
|
||||||
return True
|
return True
|
||||||
|
|
||||||
async def signed_request(self, host, method, path, document):
|
|
||||||
"""
|
|
||||||
Delivers the document to the specified host, method, path and signed
|
|
||||||
as this user.
|
|
||||||
"""
|
|
||||||
date_string = http_date(timezone.now().timestamp())
|
|
||||||
headers = {
|
|
||||||
"(request-target)": f"{method} {path}",
|
|
||||||
"Host": host,
|
|
||||||
"Date": date_string,
|
|
||||||
}
|
|
||||||
headers_string = " ".join(headers.keys())
|
|
||||||
signed_string = "\n".join(f"{name}: {value}" for name, value in headers.items())
|
|
||||||
signature = self.sign(signed_string)
|
|
||||||
del headers["(request-target)"]
|
|
||||||
headers[
|
|
||||||
"Signature"
|
|
||||||
] = f'keyId="{self.urls.key.full()}",headers="{headers_string}",signature="{signature}"'
|
|
||||||
async with httpx.AsyncClient() as client:
|
|
||||||
return await client.request(
|
|
||||||
method,
|
|
||||||
"https://{host}{path}",
|
|
||||||
headers=headers,
|
|
||||||
data=document,
|
|
||||||
)
|
|
||||||
|
|
||||||
def validate_signature(self, request):
|
|
||||||
"""
|
|
||||||
Attempts to validate the signature on an incoming request.
|
|
||||||
Returns False if the signature is invalid, None if it cannot be verified
|
|
||||||
as we do not have the key locally, or the name of the actor if it is valid.
|
|
||||||
"""
|
|
||||||
pass
|
|
||||||
|
|
||||||
def __str__(self):
|
|
||||||
return self.handle or self.actor_uri
|
|
||||||
|
|
||||||
class urls(urlman.Urls):
|
|
||||||
view = "/@{self.username}@{self.domain_id}/"
|
|
||||||
view_short = "/@{self.username}/"
|
|
||||||
actor = "{view}actor/"
|
|
||||||
key = "{actor}#main-key"
|
|
||||||
inbox = "{actor}inbox/"
|
|
||||||
outbox = "{actor}outbox/"
|
|
||||||
activate = "{view}activate/"
|
|
||||||
|
|
||||||
def get_scheme(self, url):
|
|
||||||
return "https"
|
|
||||||
|
|
||||||
def get_hostname(self, url):
|
|
||||||
return self.instance.domain.uri_domain
|
|
||||||
|
|
|
@ -1,10 +1,9 @@
|
||||||
from django.http import Http404
|
from django.http import Http404
|
||||||
from django.shortcuts import get_object_or_404
|
|
||||||
|
|
||||||
from users.models import Domain, Identity
|
from users.models import Domain, Identity
|
||||||
|
|
||||||
|
|
||||||
def by_handle_or_404(request, handle, local=True):
|
def by_handle_or_404(request, handle, local=True, fetch=False):
|
||||||
"""
|
"""
|
||||||
Retrieves an Identity by its long or short handle.
|
Retrieves an Identity by its long or short handle.
|
||||||
Domain-sensitive, so it will understand short handles on alternate domains.
|
Domain-sensitive, so it will understand short handles on alternate domains.
|
||||||
|
@ -19,15 +18,7 @@ def by_handle_or_404(request, handle, local=True):
|
||||||
domain = domain_instance.domain
|
domain = domain_instance.domain
|
||||||
else:
|
else:
|
||||||
username, domain = handle.split("@", 1)
|
username, domain = handle.split("@", 1)
|
||||||
if local:
|
identity = Identity.by_handle(handle, local=local, fetch=fetch)
|
||||||
return get_object_or_404(
|
if identity is None:
|
||||||
Identity.objects.filter(local=True),
|
raise Http404(f"No identity for handle {handle}")
|
||||||
username=username,
|
return identity
|
||||||
domain_id=domain,
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
return get_object_or_404(
|
|
||||||
Identity,
|
|
||||||
username=username,
|
|
||||||
domain_id=domain,
|
|
||||||
)
|
|
||||||
|
|
|
@ -0,0 +1,28 @@
|
||||||
|
from core.ld import canonicalise
|
||||||
|
from core.signatures import HttpSignature
|
||||||
|
from users.models import Follow
|
||||||
|
|
||||||
|
|
||||||
|
async def handle_follow_request(task_handler):
|
||||||
|
"""
|
||||||
|
Request a follow from a remote server
|
||||||
|
"""
|
||||||
|
follow = await Follow.objects.select_related(
|
||||||
|
"source", "source__domain", "target"
|
||||||
|
).aget(pk=task_handler.subject)
|
||||||
|
# Construct the request
|
||||||
|
request = canonicalise(
|
||||||
|
{
|
||||||
|
"@context": "https://www.w3.org/ns/activitystreams",
|
||||||
|
"id": follow.uri,
|
||||||
|
"type": "Follow",
|
||||||
|
"actor": follow.source.actor_uri,
|
||||||
|
"object": follow.target.actor_uri,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
# Sign it and send it
|
||||||
|
response = await HttpSignature.signed_request(
|
||||||
|
follow.target.inbox_uri, request, follow.source
|
||||||
|
)
|
||||||
|
print(response)
|
||||||
|
print(response.content)
|
|
@ -0,0 +1,11 @@
|
||||||
|
from asgiref.sync import sync_to_async
|
||||||
|
|
||||||
|
from users.models import Identity
|
||||||
|
|
||||||
|
|
||||||
|
async def handle_identity_fetch(task_handler):
|
||||||
|
# Get the actor URI via webfinger
|
||||||
|
actor_uri, handle = await Identity.fetch_webfinger(task_handler.subject)
|
||||||
|
# Get or create the identity, then fetch
|
||||||
|
identity = await sync_to_async(Identity.by_actor_uri_with_create)(actor_uri)
|
||||||
|
await identity.fetch_actor()
|
|
@ -0,0 +1,36 @@
|
||||||
|
from users.models import Follow, Identity
|
||||||
|
|
||||||
|
|
||||||
|
async def handle_inbox_item(task_handler):
|
||||||
|
type = task_handler.payload["type"].lower()
|
||||||
|
if type == "follow":
|
||||||
|
await inbox_follow(task_handler.payload)
|
||||||
|
elif type == "undo":
|
||||||
|
inner_type = task_handler.payload["object"]["type"].lower()
|
||||||
|
if inner_type == "follow":
|
||||||
|
await inbox_unfollow(task_handler.payload["object"])
|
||||||
|
else:
|
||||||
|
raise ValueError("Cannot undo activity of type {inner_type}")
|
||||||
|
else:
|
||||||
|
raise ValueError("Cannot handle activity of type {inner_type}")
|
||||||
|
|
||||||
|
|
||||||
|
async def inbox_follow(payload):
|
||||||
|
"""
|
||||||
|
Handles an incoming follow request
|
||||||
|
"""
|
||||||
|
# TODO: Manually approved follows
|
||||||
|
source = Identity.by_actor_uri_with_create(payload["actor"])
|
||||||
|
target = Identity.by_actor_uri(payload["object"])
|
||||||
|
# See if this follow already exists
|
||||||
|
try:
|
||||||
|
follow = Follow.objects.get(source=source, target=target)
|
||||||
|
except Follow.DoesNotExist:
|
||||||
|
follow = Follow.objects.create(source=source, target=target, uri=payload["id"])
|
||||||
|
# See if we need to acknowledge it
|
||||||
|
if not follow.acknowledged:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
async def inbox_unfollow(payload):
|
||||||
|
pass
|
|
@ -5,9 +5,11 @@ from asgiref.sync import async_to_sync
|
||||||
from django import forms
|
from django import forms
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from django.contrib.auth.decorators import login_required
|
from django.contrib.auth.decorators import login_required
|
||||||
from django.http import Http404, HttpResponseBadRequest, JsonResponse
|
from django.http import Http404, HttpResponse, HttpResponseBadRequest, JsonResponse
|
||||||
from django.shortcuts import redirect
|
from django.shortcuts import redirect
|
||||||
|
from django.utils import timezone
|
||||||
from django.utils.decorators import method_decorator
|
from django.utils.decorators import method_decorator
|
||||||
|
from django.utils.http import parse_http_date
|
||||||
from django.views.decorators.csrf import csrf_exempt
|
from django.views.decorators.csrf import csrf_exempt
|
||||||
from django.views.generic import FormView, TemplateView, View
|
from django.views.generic import FormView, TemplateView, View
|
||||||
|
|
||||||
|
@ -15,7 +17,8 @@ from core.forms import FormHelper
|
||||||
from core.ld import canonicalise
|
from core.ld import canonicalise
|
||||||
from core.signatures import HttpSignature
|
from core.signatures import HttpSignature
|
||||||
from miniq.models import Task
|
from miniq.models import Task
|
||||||
from users.models import Domain, Identity
|
from users.decorators import identity_required
|
||||||
|
from users.models import Domain, Follow, Identity
|
||||||
from users.shortcuts import by_handle_or_404
|
from users.shortcuts import by_handle_or_404
|
||||||
|
|
||||||
|
|
||||||
|
@ -24,16 +27,39 @@ class ViewIdentity(TemplateView):
|
||||||
template_name = "identity/view.html"
|
template_name = "identity/view.html"
|
||||||
|
|
||||||
def get_context_data(self, handle):
|
def get_context_data(self, handle):
|
||||||
identity = by_handle_or_404(self.request, handle, local=False)
|
identity = by_handle_or_404(
|
||||||
|
self.request,
|
||||||
|
handle,
|
||||||
|
local=False,
|
||||||
|
fetch=True,
|
||||||
|
)
|
||||||
statuses = identity.statuses.all()[:100]
|
statuses = identity.statuses.all()[:100]
|
||||||
if identity.data_age > settings.IDENTITY_MAX_AGE:
|
if identity.data_age > settings.IDENTITY_MAX_AGE:
|
||||||
Task.submit("identity_fetch", identity.handle)
|
Task.submit("identity_fetch", identity.handle)
|
||||||
return {
|
return {
|
||||||
"identity": identity,
|
"identity": identity,
|
||||||
"statuses": statuses,
|
"statuses": statuses,
|
||||||
|
"follow": Follow.maybe_get(self.request.identity, identity)
|
||||||
|
if self.request.identity
|
||||||
|
else None,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@method_decorator(identity_required, name="dispatch")
|
||||||
|
class ActionIdentity(View):
|
||||||
|
def post(self, request, handle):
|
||||||
|
identity = by_handle_or_404(self.request, handle, local=False)
|
||||||
|
# See what action we should perform
|
||||||
|
action = self.request.POST["action"]
|
||||||
|
if action == "follow":
|
||||||
|
existing_follow = Follow.maybe_get(self.request.identity, identity)
|
||||||
|
if not existing_follow:
|
||||||
|
Follow.create_local(self.request.identity, identity)
|
||||||
|
else:
|
||||||
|
raise ValueError(f"Cannot handle identity action {action}")
|
||||||
|
return redirect(identity.urls.view)
|
||||||
|
|
||||||
|
|
||||||
@method_decorator(login_required, name="dispatch")
|
@method_decorator(login_required, name="dispatch")
|
||||||
class SelectIdentity(TemplateView):
|
class SelectIdentity(TemplateView):
|
||||||
|
|
||||||
|
@ -158,42 +184,43 @@ class Inbox(View):
|
||||||
if "HTTP_DIGEST" in request.META:
|
if "HTTP_DIGEST" in request.META:
|
||||||
expected_digest = HttpSignature.calculate_digest(request.body)
|
expected_digest = HttpSignature.calculate_digest(request.body)
|
||||||
if request.META["HTTP_DIGEST"] != expected_digest:
|
if request.META["HTTP_DIGEST"] != expected_digest:
|
||||||
print("Bad digest")
|
return HttpResponseBadRequest("Digest is incorrect")
|
||||||
return HttpResponseBadRequest()
|
# Verify date header
|
||||||
|
if "HTTP_DATE" in request.META:
|
||||||
|
header_date = parse_http_date(request.META["HTTP_DATE"])
|
||||||
|
if abs(timezone.now().timestamp() - header_date) > 60:
|
||||||
|
return HttpResponseBadRequest("Date is too far away")
|
||||||
# Get the signature details
|
# Get the signature details
|
||||||
if "HTTP_SIGNATURE" not in request.META:
|
if "HTTP_SIGNATURE" not in request.META:
|
||||||
print("No signature")
|
return HttpResponseBadRequest("No signature present")
|
||||||
return HttpResponseBadRequest()
|
|
||||||
signature_details = HttpSignature.parse_signature(
|
signature_details = HttpSignature.parse_signature(
|
||||||
request.META["HTTP_SIGNATURE"]
|
request.META["HTTP_SIGNATURE"]
|
||||||
)
|
)
|
||||||
# Reject unknown algorithms
|
# Reject unknown algorithms
|
||||||
if signature_details["algorithm"] != "rsa-sha256":
|
if signature_details["algorithm"] != "rsa-sha256":
|
||||||
print("Unknown algorithm")
|
return HttpResponseBadRequest("Unknown signature algorithm")
|
||||||
return HttpResponseBadRequest()
|
|
||||||
# Create the signature payload
|
# Create the signature payload
|
||||||
headers_string = HttpSignature.headers_from_request(
|
headers_string = HttpSignature.headers_from_request(
|
||||||
request, signature_details["headers"]
|
request, signature_details["headers"]
|
||||||
)
|
)
|
||||||
# Load the LD
|
# Load the LD
|
||||||
document = canonicalise(json.loads(request.body))
|
document = canonicalise(json.loads(request.body))
|
||||||
print(signature_details)
|
|
||||||
print(headers_string)
|
|
||||||
print(document)
|
|
||||||
# Find the Identity by the actor on the incoming item
|
# Find the Identity by the actor on the incoming item
|
||||||
|
# This ensures that the signature used for the headers matches the actor
|
||||||
|
# described in the payload.
|
||||||
identity = Identity.by_actor_uri_with_create(document["actor"])
|
identity = Identity.by_actor_uri_with_create(document["actor"])
|
||||||
if not identity.public_key:
|
if not identity.public_key:
|
||||||
# See if we can fetch it right now
|
# See if we can fetch it right now
|
||||||
async_to_sync(identity.fetch_actor)()
|
async_to_sync(identity.fetch_actor)()
|
||||||
if not identity.public_key:
|
if not identity.public_key:
|
||||||
print("Cannot retrieve actor")
|
|
||||||
return HttpResponseBadRequest("Cannot retrieve actor")
|
return HttpResponseBadRequest("Cannot retrieve actor")
|
||||||
if not identity.verify_signature(
|
if not identity.verify_signature(
|
||||||
signature_details["signature"], headers_string
|
signature_details["signature"], headers_string
|
||||||
):
|
):
|
||||||
print("Bad signature")
|
return HttpResponseBadRequest("Bad signature")
|
||||||
# return HttpResponseBadRequest("Bad signature")
|
# Hand off the item to be processed by the queue
|
||||||
return JsonResponse({"status": "OK"})
|
Task.submit("inbox_item", subject=identity.actor_uri, payload=document)
|
||||||
|
return HttpResponse(status=202)
|
||||||
|
|
||||||
|
|
||||||
class Webfinger(View):
|
class Webfinger(View):
|
||||||
|
|
Loading…
Reference in New Issue