perf(federation): Ed25519署名に対応する (#13464)
* 1. ed25519キーペアを発行・Personとして公開鍵を送受信 * validate additionalPublicKeys * getAuthUserFromApIdはmainを選ぶ * ✌️ * fix * signatureAlgorithm * set publicKeyCache lifetime * refresh * httpMessageSignatureAcceptable * ED25519_SIGNED_ALGORITHM * ED25519_PUBLIC_KEY_SIGNATURE_ALGORITHM * remove sign additionalPublicKeys signature requirements * httpMessageSignaturesSupported * httpMessageSignaturesImplementationLevel * httpMessageSignaturesImplementationLevel: '01' * perf(federation): Use hint for getAuthUserFromApId (#13470) * Hint for getAuthUserFromApId * とどのつまりこれでいいのか? * use @misskey-dev/node-http-message-signatures * fix * signedPost, signedGet * ap-request.tsを復活させる * remove digest prerender * fix test? * fix test * add httpMessageSignaturesImplementationLevel to FederationInstance * ManyToOne * fetchPersonWithRenewal * exactKey * ✌️ * use const * use gen-key-pair fn. from '@misskey-dev/node-http-message-signatures' * update node-http-message-signatures * fix * @misskey-dev/node-http-message-signatures@0.0.0-alpha.11 * getAuthUserFromApIdでupdatePersonの頻度を増やす * cacheRaw.date * use requiredInputs https://github.com/misskey-dev/misskey/pull/13464#discussion_r1509964359 * update @misskey-dev/node-http-message-signatures * clean up * err msg * fix(backend): fetchInstanceMetadataのLockが永遠に解除されない問題を修正 Co-authored-by: まっちゃとーにゅ <17376330+u1-liquid@users.noreply.github.com> * fix httpMessageSignaturesImplementationLevel validation * fix test * fix * comment * comment * improve test * fix * use Promise.all in genRSAAndEd25519KeyPair * refreshAndprepareEd25519KeyPair * refreshAndfindKey * commetn * refactor public keys add * digestプリレンダを復活させる RFC実装時にどうするか考える * fix, async * fix * !== true * use save * Deliver update person when new key generated (not tested) https://github.com/misskey-dev/misskey/pull/13464#issuecomment-1977049061 * 循環参照で落ちるのを解消? * fix? * Revert "fix?" This reverts commit 0082f6f8e8c5d5febd14933ba9a1ac643f70ca92. * a * logger * log * change logger * 秘密鍵の変更は、フラグではなく鍵を引き回すようにする * addAllKnowingSharedInboxRecipe * nanka meccha kaeta * delivre * キャッシュ有効チェックはロック取得前に行う * @misskey-dev/node-http-message-signatures@0.0.3 * PrivateKeyPem * getLocalUserPrivateKey * fix test * if * fix ap-request * update node-http-message-signatures * fix type error * update package * fix type * update package * retry no key * @misskey-dev/node-http-message-signatures@0.0.8 * fix type error * log keyid * logger * db-resolver * JSON.stringify * HTTP Signatureがなかったり使えなかったりしそうな場合にLD Signatureを活用するように * inbox-delayed use actor if no signature * ユーザーとキーの同一性チェックはhostの一致にする * log signature parse err * save array * とりあえずtryで囲っておく * fetchPersonWithRenewalでエラーが起きたら古いデータを返す * use transactionalEntityManager * fix spdx * @misskey-dev/node-http-message-signatures@0.0.10 * add comment * fix * publicKeyに配列が入ってもいいようにする https://github.com/misskey-dev/misskey/pull/13950 * define additionalPublicKeys * fix * merge fix * refreshAndprepareEd25519KeyPair → refreshAndPrepareEd25519KeyPair * remove gen-key-pair.ts * defaultMaxListeners = 512 * Revert "defaultMaxListeners = 512" This reverts commit f2c412c18057a9300540794ccbe4dfbf6d259ed6. * genRSAAndEd25519KeyPairではキーを直列に生成する? * maxConcurrency: 8 * maxConcurrency: 16 * maxConcurrency: 8 * Revert "genRSAAndEd25519KeyPairではキーを直列に生成する?" This reverts commit d0aada55c1ed5aa98f18731ec82f3ac5eb5a6c16. * maxWorkers: '90%' * Revert "maxWorkers: '90%'" This reverts commit 9e0a93f110456320d6485a871f014f7cdab29b33. * e2e/timelines.tsで個々のテストに対するtimeoutを削除, maxConcurrency: 32 * better error handling of this.userPublickeysRepository.delete * better comment * set result to keypairEntityCache * deliverJobConcurrency: 16, deliverJobPerSec: 1024, inboxJobConcurrency: 4 * inboxJobPerSec: 64 * delete request.headers['host']; * fix * // node-fetch will generate this for us. if we keep 'Host', it won't change with redirects! * move delete host * modify comment * modify comment * fix correct → collect * refreshAndfindKey → refreshAndFindKey * modify comment * modify attachLdSignature * getApId, InboxProcessorService * TODO * [skip ci] add CHANGELOG --------- Co-authored-by: MeiMei <30769358+mei23@users.noreply.github.com> Co-authored-by: まっちゃとーにゅ <17376330+u1-liquid@users.noreply.github.com>
This commit is contained in:
		
							parent
							
								
									3331f3972a
								
							
						
					
					
						commit
						5f88d56d96
					
				
					 52 changed files with 1096 additions and 694 deletions
				
			
		| 
						 | 
				
			
			@ -164,12 +164,12 @@ id: 'aidx'
 | 
			
		|||
#clusterLimit: 1
 | 
			
		||||
 | 
			
		||||
# Job concurrency per worker
 | 
			
		||||
# deliverJobConcurrency: 128
 | 
			
		||||
# inboxJobConcurrency: 16
 | 
			
		||||
# deliverJobConcurrency: 16
 | 
			
		||||
# inboxJobConcurrency: 4
 | 
			
		||||
 | 
			
		||||
# Job rate limiter
 | 
			
		||||
# deliverJobPerSec: 128
 | 
			
		||||
# inboxJobPerSec: 32
 | 
			
		||||
# inboxJobPerSec: 64
 | 
			
		||||
 | 
			
		||||
# Job attempts
 | 
			
		||||
# deliverJobMaxAttempts: 12
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -230,15 +230,15 @@ id: 'aidx'
 | 
			
		|||
#clusterLimit: 1
 | 
			
		||||
 | 
			
		||||
# Job concurrency per worker
 | 
			
		||||
#deliverJobConcurrency: 128
 | 
			
		||||
#inboxJobConcurrency: 16
 | 
			
		||||
#deliverJobConcurrency: 16
 | 
			
		||||
#inboxJobConcurrency: 4
 | 
			
		||||
#relationshipJobConcurrency: 16
 | 
			
		||||
# What's relationshipJob?:
 | 
			
		||||
#  Follow, unfollow, block and unblock(ings) while following-imports, etc. or account migrations.
 | 
			
		||||
 | 
			
		||||
# Job rate limiter
 | 
			
		||||
#deliverJobPerSec: 128
 | 
			
		||||
#inboxJobPerSec: 32
 | 
			
		||||
#deliverJobPerSec: 1024
 | 
			
		||||
#inboxJobPerSec: 64
 | 
			
		||||
#relationshipJobPerSec: 64
 | 
			
		||||
 | 
			
		||||
# Job attempts
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -157,12 +157,12 @@ id: 'aidx'
 | 
			
		|||
#clusterLimit: 1
 | 
			
		||||
 | 
			
		||||
# Job concurrency per worker
 | 
			
		||||
# deliverJobConcurrency: 128
 | 
			
		||||
# inboxJobConcurrency: 16
 | 
			
		||||
# deliverJobConcurrency: 16
 | 
			
		||||
# inboxJobConcurrency: 4
 | 
			
		||||
 | 
			
		||||
# Job rate limiter
 | 
			
		||||
# deliverJobPerSec: 128
 | 
			
		||||
# inboxJobPerSec: 32
 | 
			
		||||
# deliverJobPerSec: 1024
 | 
			
		||||
# inboxJobPerSec: 64
 | 
			
		||||
 | 
			
		||||
# Job attempts
 | 
			
		||||
# deliverJobMaxAttempts: 12
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -7,6 +7,8 @@
 | 
			
		|||
- Feat: 通報を受けた際、または解決した際に、予め登録した宛先に通知を飛ばせるように(mail or webhook) #13705
 | 
			
		||||
- Feat: ユーザーのアイコン/バナーの変更可否をロールで設定可能に
 | 
			
		||||
  - 変更不可となっていても、設定済みのものを解除してデフォルト画像に戻すことは出来ます
 | 
			
		||||
- Feat: 連合に使うHTTP SignaturesがEd25519鍵に対応するように #13464
 | 
			
		||||
  - Ed25519署名に対応するサーバーが増えると、deliverで要求されるサーバーリソースが削減されます
 | 
			
		||||
- Fix: 配信停止したインスタンス一覧が見れなくなる問題を修正
 | 
			
		||||
- Fix: Dockerコンテナの立ち上げ時に`pnpm`のインストールで固まることがある問題
 | 
			
		||||
- Fix: デフォルトテーマに無効なテーマコードを入力するとUIが使用できなくなる問題を修正
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -185,7 +185,7 @@ TODO
 | 
			
		|||
## Environment Variable
 | 
			
		||||
 | 
			
		||||
- `MISSKEY_CONFIG_YML`: Specify the file path of config.yml instead of default.yml (e.g. `2nd.yml`).
 | 
			
		||||
- `MISSKEY_WEBFINGER_USE_HTTP`: If it's set true, WebFinger requests will be http instead of https, useful for testing federation between servers in localhost. NEVER USE IN PRODUCTION.
 | 
			
		||||
- `MISSKEY_USE_HTTP`: If it's set true, federation requests (like nodeinfo and webfinger) will be http instead of https, useful for testing federation between servers in localhost. NEVER USE IN PRODUCTION. (was `MISSKEY_WEBFINGER_USE_HTTP`)
 | 
			
		||||
 | 
			
		||||
## Continuous integration
 | 
			
		||||
Misskey uses GitHub Actions for executing automated tests.
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -178,12 +178,12 @@ id: "aidx"
 | 
			
		|||
#clusterLimit: 1
 | 
			
		||||
 | 
			
		||||
# Job concurrency per worker
 | 
			
		||||
# deliverJobConcurrency: 128
 | 
			
		||||
# inboxJobConcurrency: 16
 | 
			
		||||
# deliverJobConcurrency: 16
 | 
			
		||||
# inboxJobConcurrency: 4
 | 
			
		||||
 | 
			
		||||
# Job rate limiter
 | 
			
		||||
# deliverJobPerSec: 128
 | 
			
		||||
# inboxJobPerSec: 32
 | 
			
		||||
# deliverJobPerSec: 1024
 | 
			
		||||
# inboxJobPerSec: 64
 | 
			
		||||
 | 
			
		||||
# Job attempts
 | 
			
		||||
# deliverJobMaxAttempts: 12
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										39
									
								
								packages/backend/migration/1708980134301-APMultipleKeys.js
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										39
									
								
								packages/backend/migration/1708980134301-APMultipleKeys.js
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,39 @@
 | 
			
		|||
/*
 | 
			
		||||
 * SPDX-FileCopyrightText: syuilo and misskey-project
 | 
			
		||||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
export class APMultipleKeys1708980134301 {
 | 
			
		||||
    name = 'APMultipleKeys1708980134301'
 | 
			
		||||
 | 
			
		||||
    async up(queryRunner) {
 | 
			
		||||
        await queryRunner.query(`DROP INDEX "public"."IDX_171e64971c780ebd23fae140bb"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_keypair" ADD "ed25519PublicKey" character varying(128)`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_keypair" ADD "ed25519PrivateKey" character varying(128)`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "FK_10c146e4b39b443ede016f6736d"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "PK_10c146e4b39b443ede016f6736d"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "PK_0db6a5fdb992323449edc8ee421" PRIMARY KEY ("userId", "keyId")`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "PK_0db6a5fdb992323449edc8ee421"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "PK_171e64971c780ebd23fae140bba" PRIMARY KEY ("keyId")`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "UQ_10c146e4b39b443ede016f6736d" UNIQUE ("userId")`);
 | 
			
		||||
        await queryRunner.query(`CREATE INDEX "IDX_10c146e4b39b443ede016f6736" ON "user_publickey" ("userId") `);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "FK_10c146e4b39b443ede016f6736d" FOREIGN KEY ("userId") REFERENCES "user"("id") ON DELETE CASCADE ON UPDATE NO ACTION`);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async down(queryRunner) {
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "FK_10c146e4b39b443ede016f6736d"`);
 | 
			
		||||
        await queryRunner.query(`DROP INDEX "public"."IDX_10c146e4b39b443ede016f6736"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "UQ_10c146e4b39b443ede016f6736d"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "PK_171e64971c780ebd23fae140bba"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "PK_0db6a5fdb992323449edc8ee421" PRIMARY KEY ("userId", "keyId")`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "PK_0db6a5fdb992323449edc8ee421"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "PK_10c146e4b39b443ede016f6736d" PRIMARY KEY ("userId")`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "FK_10c146e4b39b443ede016f6736d" FOREIGN KEY ("userId") REFERENCES "user"("id") ON DELETE CASCADE ON UPDATE NO ACTION`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_profile" ALTER COLUMN "followersVisibility" DROP DEFAULT`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_profile" ALTER COLUMN "followersVisibility" TYPE "public"."user_profile_followersVisibility_enum_old" USING "followersVisibility"::"text"::"public"."user_profile_followersVisibility_enum_old"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_profile" ALTER COLUMN "followersVisibility" SET DEFAULT 'public'`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_keypair" DROP COLUMN "ed25519PrivateKey"`);
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_keypair" DROP COLUMN "ed25519PublicKey"`);
 | 
			
		||||
        await queryRunner.query(`CREATE UNIQUE INDEX "IDX_171e64971c780ebd23fae140bb" ON "user_publickey" ("keyId") `);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										16
									
								
								packages/backend/migration/1709242519122-HttpSignImplLv.js
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								packages/backend/migration/1709242519122-HttpSignImplLv.js
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,16 @@
 | 
			
		|||
/*
 | 
			
		||||
 * SPDX-FileCopyrightText: syuilo and misskey-project
 | 
			
		||||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
export class HttpSignImplLv1709242519122 {
 | 
			
		||||
    name = 'HttpSignImplLv1709242519122'
 | 
			
		||||
 | 
			
		||||
    async up(queryRunner) {
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "instance" ADD "httpMessageSignaturesImplementationLevel" character varying(16) NOT NULL DEFAULT '00'`);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async down(queryRunner) {
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "instance" DROP COLUMN "httpMessageSignaturesImplementationLevel"`);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -0,0 +1,16 @@
 | 
			
		|||
/*
 | 
			
		||||
 * SPDX-FileCopyrightText: syuilo and misskey-project
 | 
			
		||||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
export class APMultipleKeys1709269211718 {
 | 
			
		||||
    name = 'APMultipleKeys1709269211718'
 | 
			
		||||
 | 
			
		||||
    async up(queryRunner) {
 | 
			
		||||
        await queryRunner.query(`ALTER TABLE "user_publickey" DROP CONSTRAINT "UQ_10c146e4b39b443ede016f6736d"`);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    async down(queryRunner) {
 | 
			
		||||
			await queryRunner.query(`ALTER TABLE "user_publickey" ADD CONSTRAINT "UQ_10c146e4b39b443ede016f6736d" UNIQUE ("userId")`);
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -79,13 +79,13 @@
 | 
			
		|||
		"@fastify/multipart": "8.3.0",
 | 
			
		||||
		"@fastify/static": "7.0.4",
 | 
			
		||||
		"@fastify/view": "9.1.0",
 | 
			
		||||
		"@misskey-dev/node-http-message-signatures": "0.0.10",
 | 
			
		||||
		"@misskey-dev/sharp-read-bmp": "1.2.0",
 | 
			
		||||
		"@misskey-dev/summaly": "5.1.0",
 | 
			
		||||
		"@napi-rs/canvas": "^0.1.53",
 | 
			
		||||
		"@nestjs/common": "10.3.10",
 | 
			
		||||
		"@nestjs/core": "10.3.10",
 | 
			
		||||
		"@nestjs/testing": "10.3.10",
 | 
			
		||||
		"@peertube/http-signature": "1.7.0",
 | 
			
		||||
		"@sentry/node": "8.13.0",
 | 
			
		||||
		"@sentry/profiling-node": "8.13.0",
 | 
			
		||||
		"@simplewebauthn/server": "10.0.0",
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										82
									
								
								packages/backend/src/@types/http-signature.d.ts
									
										
									
									
										vendored
									
									
								
							
							
						
						
									
										82
									
								
								packages/backend/src/@types/http-signature.d.ts
									
										
									
									
										vendored
									
									
								
							| 
						 | 
				
			
			@ -1,82 +0,0 @@
 | 
			
		|||
/*
 | 
			
		||||
 * SPDX-FileCopyrightText: syuilo and misskey-project
 | 
			
		||||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
declare module '@peertube/http-signature' {
 | 
			
		||||
	import type { IncomingMessage, ClientRequest } from 'node:http';
 | 
			
		||||
 | 
			
		||||
	interface ISignature {
 | 
			
		||||
		keyId: string;
 | 
			
		||||
		algorithm: string;
 | 
			
		||||
		headers: string[];
 | 
			
		||||
		signature: string;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	interface IOptions {
 | 
			
		||||
		headers?: string[];
 | 
			
		||||
		algorithm?: string;
 | 
			
		||||
		strict?: boolean;
 | 
			
		||||
		authorizationHeaderName?: string;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	interface IParseRequestOptions extends IOptions {
 | 
			
		||||
		clockSkew?: number;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	interface IParsedSignature {
 | 
			
		||||
		scheme: string;
 | 
			
		||||
		params: ISignature;
 | 
			
		||||
		signingString: string;
 | 
			
		||||
		algorithm: string;
 | 
			
		||||
		keyId: string;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	type RequestSignerConstructorOptions =
 | 
			
		||||
		IRequestSignerConstructorOptionsFromProperties |
 | 
			
		||||
		IRequestSignerConstructorOptionsFromFunction;
 | 
			
		||||
 | 
			
		||||
	interface IRequestSignerConstructorOptionsFromProperties {
 | 
			
		||||
		keyId: string;
 | 
			
		||||
		key: string | Buffer;
 | 
			
		||||
		algorithm?: string;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	interface IRequestSignerConstructorOptionsFromFunction {
 | 
			
		||||
		sign?: (data: string, cb: (err: any, sig: ISignature) => void) => void;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	class RequestSigner {
 | 
			
		||||
		constructor(options: RequestSignerConstructorOptions);
 | 
			
		||||
 | 
			
		||||
		public writeHeader(header: string, value: string): string;
 | 
			
		||||
 | 
			
		||||
		public writeDateHeader(): string;
 | 
			
		||||
 | 
			
		||||
		public writeTarget(method: string, path: string): void;
 | 
			
		||||
 | 
			
		||||
		public sign(cb: (err: any, authz: string) => void): void;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	interface ISignRequestOptions extends IOptions {
 | 
			
		||||
		keyId: string;
 | 
			
		||||
		key: string;
 | 
			
		||||
		httpVersion?: string;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	export function parse(request: IncomingMessage, options?: IParseRequestOptions): IParsedSignature;
 | 
			
		||||
	export function parseRequest(request: IncomingMessage, options?: IParseRequestOptions): IParsedSignature;
 | 
			
		||||
 | 
			
		||||
	export function sign(request: ClientRequest, options: ISignRequestOptions): boolean;
 | 
			
		||||
	export function signRequest(request: ClientRequest, options: ISignRequestOptions): boolean;
 | 
			
		||||
	export function createSigner(): RequestSigner;
 | 
			
		||||
	export function isSigner(obj: any): obj is RequestSigner;
 | 
			
		||||
 | 
			
		||||
	export function sshKeyToPEM(key: string): string;
 | 
			
		||||
	export function sshKeyFingerprint(key: string): string;
 | 
			
		||||
	export function pemToRsaSSHKey(pem: string, comment: string): string;
 | 
			
		||||
 | 
			
		||||
	export function verify(parsedSignature: IParsedSignature, pubkey: string | Buffer): boolean;
 | 
			
		||||
	export function verifySignature(parsedSignature: IParsedSignature, pubkey: string | Buffer): boolean;
 | 
			
		||||
	export function verifyHMAC(parsedSignature: IParsedSignature, secret: string): boolean;
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -9,6 +9,11 @@ export const MAX_NOTE_TEXT_LENGTH = 3000;
 | 
			
		|||
export const USER_ONLINE_THRESHOLD = 1000 * 60 * 10; // 10min
 | 
			
		||||
export const USER_ACTIVE_THRESHOLD = 1000 * 60 * 60 * 24 * 3; // 3days
 | 
			
		||||
 | 
			
		||||
export const REMOTE_USER_CACHE_TTL = 1000 * 60 * 60 * 3; // 3hours
 | 
			
		||||
export const REMOTE_USER_MOVE_COOLDOWN = 1000 * 60 * 60 * 24 * 14; // 14days
 | 
			
		||||
 | 
			
		||||
export const REMOTE_SERVER_CACHE_TTL = 1000 * 60 * 60 * 3; // 3hours
 | 
			
		||||
 | 
			
		||||
//#region hard limits
 | 
			
		||||
// If you change DB_* values, you must also change the DB schema.
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,7 +3,8 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import { Inject, Injectable, OnModuleInit } from '@nestjs/common';
 | 
			
		||||
import { ModuleRef } from '@nestjs/core';
 | 
			
		||||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import type { UsersRepository } from '@/models/_.js';
 | 
			
		||||
import type { MiUser } from '@/models/User.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -12,30 +13,44 @@ import { RelayService } from '@/core/RelayService.js';
 | 
			
		|||
import { ApDeliverManagerService } from '@/core/activitypub/ApDeliverManagerService.js';
 | 
			
		||||
import { UserEntityService } from '@/core/entities/UserEntityService.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import type { PrivateKeyWithPem } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class AccountUpdateService {
 | 
			
		||||
export class AccountUpdateService implements OnModuleInit {
 | 
			
		||||
	private apDeliverManagerService: ApDeliverManagerService;
 | 
			
		||||
	constructor(
 | 
			
		||||
		private moduleRef: ModuleRef,
 | 
			
		||||
 | 
			
		||||
		@Inject(DI.usersRepository)
 | 
			
		||||
		private usersRepository: UsersRepository,
 | 
			
		||||
 | 
			
		||||
		private userEntityService: UserEntityService,
 | 
			
		||||
		private apRendererService: ApRendererService,
 | 
			
		||||
		private apDeliverManagerService: ApDeliverManagerService,
 | 
			
		||||
		private relayService: RelayService,
 | 
			
		||||
	) {
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	async onModuleInit() {
 | 
			
		||||
		this.apDeliverManagerService = this.moduleRef.get(ApDeliverManagerService.name);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async publishToFollowers(userId: MiUser['id']) {
 | 
			
		||||
	/**
 | 
			
		||||
	 * Deliver account update to followers
 | 
			
		||||
	 * @param userId user id
 | 
			
		||||
	 * @param deliverKey optional. Private key to sign the deliver.
 | 
			
		||||
	 */
 | 
			
		||||
	public async publishToFollowers(userId: MiUser['id'], deliverKey?: PrivateKeyWithPem) {
 | 
			
		||||
		const user = await this.usersRepository.findOneBy({ id: userId });
 | 
			
		||||
		if (user == null) throw new Error('user not found');
 | 
			
		||||
 | 
			
		||||
		// フォロワーがリモートユーザーかつ投稿者がローカルユーザーならUpdateを配信
 | 
			
		||||
		if (this.userEntityService.isLocalUser(user)) {
 | 
			
		||||
			const content = this.apRendererService.addContext(this.apRendererService.renderUpdate(await this.apRendererService.renderPerson(user), user));
 | 
			
		||||
			this.apDeliverManagerService.deliverToFollowers(user, content);
 | 
			
		||||
			this.relayService.deliverToRelays(user, content);
 | 
			
		||||
			await Promise.allSettled([
 | 
			
		||||
				this.apDeliverManagerService.deliverToFollowers(user, content, deliverKey),
 | 
			
		||||
				this.relayService.deliverToRelays(user, content, deliverKey),
 | 
			
		||||
			]);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -7,7 +7,7 @@ import { randomUUID } from 'node:crypto';
 | 
			
		|||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import bcrypt from 'bcryptjs';
 | 
			
		||||
import { IsNull, DataSource } from 'typeorm';
 | 
			
		||||
import { genRsaKeyPair } from '@/misc/gen-key-pair.js';
 | 
			
		||||
import { genRSAAndEd25519KeyPair } from '@/misc/gen-key-pair.js';
 | 
			
		||||
import { MiUser } from '@/models/User.js';
 | 
			
		||||
import { MiUserProfile } from '@/models/UserProfile.js';
 | 
			
		||||
import { IdService } from '@/core/IdService.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -38,7 +38,7 @@ export class CreateSystemUserService {
 | 
			
		|||
		// Generate secret
 | 
			
		||||
		const secret = generateNativeUserToken();
 | 
			
		||||
 | 
			
		||||
		const keyPair = await genRsaKeyPair();
 | 
			
		||||
		const keyPair = await genRSAAndEd25519KeyPair();
 | 
			
		||||
 | 
			
		||||
		let account!: MiUser;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -64,9 +64,8 @@ export class CreateSystemUserService {
 | 
			
		|||
			}).then(x => transactionalEntityManager.findOneByOrFail(MiUser, x.identifiers[0]));
 | 
			
		||||
 | 
			
		||||
			await transactionalEntityManager.insert(MiUserKeypair, {
 | 
			
		||||
				publicKey: keyPair.publicKey,
 | 
			
		||||
				privateKey: keyPair.privateKey,
 | 
			
		||||
				userId: account.id,
 | 
			
		||||
				...keyPair,
 | 
			
		||||
			});
 | 
			
		||||
 | 
			
		||||
			await transactionalEntityManager.insert(MiUserProfile, {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -15,6 +15,7 @@ import { LoggerService } from '@/core/LoggerService.js';
 | 
			
		|||
import { HttpRequestService } from '@/core/HttpRequestService.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { FederatedInstanceService } from '@/core/FederatedInstanceService.js';
 | 
			
		||||
import { REMOTE_SERVER_CACHE_TTL } from '@/const.js';
 | 
			
		||||
import type { DOMWindow } from 'jsdom';
 | 
			
		||||
 | 
			
		||||
type NodeInfo = {
 | 
			
		||||
| 
						 | 
				
			
			@ -24,6 +25,7 @@ type NodeInfo = {
 | 
			
		|||
		version?: unknown;
 | 
			
		||||
	};
 | 
			
		||||
	metadata?: {
 | 
			
		||||
		httpMessageSignaturesImplementationLevel?: unknown,
 | 
			
		||||
		name?: unknown;
 | 
			
		||||
		nodeName?: unknown;
 | 
			
		||||
		nodeDescription?: unknown;
 | 
			
		||||
| 
						 | 
				
			
			@ -39,6 +41,7 @@ type NodeInfo = {
 | 
			
		|||
@Injectable()
 | 
			
		||||
export class FetchInstanceMetadataService {
 | 
			
		||||
	private logger: Logger;
 | 
			
		||||
	private httpColon = 'https://';
 | 
			
		||||
 | 
			
		||||
	constructor(
 | 
			
		||||
		private httpRequestService: HttpRequestService,
 | 
			
		||||
| 
						 | 
				
			
			@ -48,6 +51,7 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
		private redisClient: Redis.Redis,
 | 
			
		||||
	) {
 | 
			
		||||
		this.logger = this.loggerService.getLogger('metadata', 'cyan');
 | 
			
		||||
		this.httpColon = process.env.MISSKEY_USE_HTTP?.toLowerCase() === 'true' ? 'http://' : 'https://';
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
| 
						 | 
				
			
			@ -59,7 +63,7 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
		return await this.redisClient.set(
 | 
			
		||||
			`fetchInstanceMetadata:mutex:v2:${host}`, '1',
 | 
			
		||||
			'EX', 30, // 30秒したら自動でロック解除 https://github.com/misskey-dev/misskey/issues/13506#issuecomment-1975375395
 | 
			
		||||
			'GET' // 古い値を返す(なかったらnull)
 | 
			
		||||
			'GET', // 古い値を返す(なかったらnull)
 | 
			
		||||
		);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -73,23 +77,24 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
	public async fetchInstanceMetadata(instance: MiInstance, force = false): Promise<void> {
 | 
			
		||||
		const host = instance.host;
 | 
			
		||||
 | 
			
		||||
		if (!force) {
 | 
			
		||||
			// キャッシュ有効チェックはロック取得前に行う
 | 
			
		||||
			const _instance = await this.federatedInstanceService.fetch(host);
 | 
			
		||||
			const now = Date.now();
 | 
			
		||||
			if (_instance && _instance.infoUpdatedAt != null && (now - _instance.infoUpdatedAt.getTime() < REMOTE_SERVER_CACHE_TTL)) {
 | 
			
		||||
				this.logger.debug(`Skip because updated recently ${_instance.infoUpdatedAt.toJSON()}`);
 | 
			
		||||
				return;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			// finallyでunlockされてしまうのでtry内でロックチェックをしない
 | 
			
		||||
			// (returnであってもfinallyは実行される)
 | 
			
		||||
		if (!force && await this.tryLock(host) === '1') {
 | 
			
		||||
			// 1が返ってきていたらロックされているという意味なので、何もしない
 | 
			
		||||
			if (await this.tryLock(host) === '1') {
 | 
			
		||||
				// 1が返ってきていたら他にロックされているという意味なので、何もしない
 | 
			
		||||
				return;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		try {
 | 
			
		||||
			if (!force) {
 | 
			
		||||
				const _instance = await this.federatedInstanceService.fetch(host);
 | 
			
		||||
				const now = Date.now();
 | 
			
		||||
				if (_instance && _instance.infoUpdatedAt && (now - _instance.infoUpdatedAt.getTime() < 1000 * 60 * 60 * 24)) {
 | 
			
		||||
					// unlock at the finally caluse
 | 
			
		||||
					return;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			this.logger.info(`Fetching metadata of ${instance.host} ...`);
 | 
			
		||||
 | 
			
		||||
			const [info, dom, manifest] = await Promise.all([
 | 
			
		||||
| 
						 | 
				
			
			@ -118,6 +123,14 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
				updates.openRegistrations = info.openRegistrations;
 | 
			
		||||
				updates.maintainerName = info.metadata ? info.metadata.maintainer ? (info.metadata.maintainer.name ?? null) : null : null;
 | 
			
		||||
				updates.maintainerEmail = info.metadata ? info.metadata.maintainer ? (info.metadata.maintainer.email ?? null) : null : null;
 | 
			
		||||
				if (info.metadata && info.metadata.httpMessageSignaturesImplementationLevel && (
 | 
			
		||||
					info.metadata.httpMessageSignaturesImplementationLevel === '01' ||
 | 
			
		||||
					info.metadata.httpMessageSignaturesImplementationLevel === '11'
 | 
			
		||||
				)) {
 | 
			
		||||
					updates.httpMessageSignaturesImplementationLevel = info.metadata.httpMessageSignaturesImplementationLevel;
 | 
			
		||||
				} else {
 | 
			
		||||
					updates.httpMessageSignaturesImplementationLevel = '00';
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if (name) updates.name = name;
 | 
			
		||||
| 
						 | 
				
			
			@ -129,6 +142,12 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
			await this.federatedInstanceService.update(instance.id, updates);
 | 
			
		||||
 | 
			
		||||
			this.logger.succ(`Successfuly updated metadata of ${instance.host}`);
 | 
			
		||||
			this.logger.debug('Updated metadata:', {
 | 
			
		||||
				info: !!info,
 | 
			
		||||
				dom: !!dom,
 | 
			
		||||
				manifest: !!manifest,
 | 
			
		||||
				updates,
 | 
			
		||||
			});
 | 
			
		||||
		} catch (e) {
 | 
			
		||||
			this.logger.error(`Failed to update metadata of ${instance.host}: ${e}`);
 | 
			
		||||
		} finally {
 | 
			
		||||
| 
						 | 
				
			
			@ -141,7 +160,7 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
		this.logger.info(`Fetching nodeinfo of ${instance.host} ...`);
 | 
			
		||||
 | 
			
		||||
		try {
 | 
			
		||||
			const wellknown = await this.httpRequestService.getJson('https://' + instance.host + '/.well-known/nodeinfo')
 | 
			
		||||
			const wellknown = await this.httpRequestService.getJson(this.httpColon + instance.host + '/.well-known/nodeinfo')
 | 
			
		||||
				.catch(err => {
 | 
			
		||||
					if (err.statusCode === 404) {
 | 
			
		||||
						throw new Error('No nodeinfo provided');
 | 
			
		||||
| 
						 | 
				
			
			@ -184,7 +203,7 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
	private async fetchDom(instance: MiInstance): Promise<DOMWindow['document']> {
 | 
			
		||||
		this.logger.info(`Fetching HTML of ${instance.host} ...`);
 | 
			
		||||
 | 
			
		||||
		const url = 'https://' + instance.host;
 | 
			
		||||
		const url = this.httpColon + instance.host;
 | 
			
		||||
 | 
			
		||||
		const html = await this.httpRequestService.getHtml(url);
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -196,7 +215,7 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	private async fetchManifest(instance: MiInstance): Promise<Record<string, unknown> | null> {
 | 
			
		||||
		const url = 'https://' + instance.host;
 | 
			
		||||
		const url = this.httpColon + instance.host;
 | 
			
		||||
 | 
			
		||||
		const manifestUrl = url + '/manifest.json';
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -207,7 +226,7 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	private async fetchFaviconUrl(instance: MiInstance, doc: DOMWindow['document'] | null): Promise<string | null> {
 | 
			
		||||
		const url = 'https://' + instance.host;
 | 
			
		||||
		const url = this.httpColon + instance.host;
 | 
			
		||||
 | 
			
		||||
		if (doc) {
 | 
			
		||||
			// https://github.com/misskey-dev/misskey/pull/8220#issuecomment-1025104043
 | 
			
		||||
| 
						 | 
				
			
			@ -234,12 +253,12 @@ export class FetchInstanceMetadataService {
 | 
			
		|||
	@bindThis
 | 
			
		||||
	private async fetchIconUrl(instance: MiInstance, doc: DOMWindow['document'] | null, manifest: Record<string, any> | null): Promise<string | null> {
 | 
			
		||||
		if (manifest && manifest.icons && manifest.icons.length > 0 && manifest.icons[0].src) {
 | 
			
		||||
			const url = 'https://' + instance.host;
 | 
			
		||||
			const url = this.httpColon + instance.host;
 | 
			
		||||
			return (new URL(manifest.icons[0].src, url)).href;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (doc) {
 | 
			
		||||
			const url = 'https://' + instance.host;
 | 
			
		||||
			const url = this.httpColon + instance.host;
 | 
			
		||||
 | 
			
		||||
			// https://github.com/misskey-dev/misskey/pull/8220#issuecomment-1025104043
 | 
			
		||||
			const links = Array.from(doc.getElementsByTagName('link')).reverse();
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -245,6 +245,7 @@ export interface InternalEventTypes {
 | 
			
		|||
	unmute: { muterId: MiUser['id']; muteeId: MiUser['id']; };
 | 
			
		||||
	userListMemberAdded: { userListId: MiUserList['id']; memberId: MiUser['id']; };
 | 
			
		||||
	userListMemberRemoved: { userListId: MiUserList['id']; memberId: MiUser['id']; };
 | 
			
		||||
	userKeypairUpdated: { userId: MiUser['id']; };
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// name/messages(spec) pairs dictionary
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -70,7 +70,7 @@ export class HttpRequestService {
 | 
			
		|||
			localAddress: config.outgoingAddress,
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		const maxSockets = Math.max(256, config.deliverJobConcurrency ?? 128);
 | 
			
		||||
		const maxSockets = Math.max(256, config.deliverJobConcurrency ?? 16);
 | 
			
		||||
 | 
			
		||||
		this.httpAgent = config.proxy
 | 
			
		||||
			? new HttpProxyAgent({
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -13,7 +13,6 @@ import type { Config } from '@/config.js';
 | 
			
		|||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import type { Antenna } from '@/server/api/endpoints/i/import-antennas.js';
 | 
			
		||||
import { ApRequestCreator } from '@/core/activitypub/ApRequestService.js';
 | 
			
		||||
import type {
 | 
			
		||||
	DbJobData,
 | 
			
		||||
	DeliverJobData,
 | 
			
		||||
| 
						 | 
				
			
			@ -33,7 +32,7 @@ import type {
 | 
			
		|||
	UserWebhookDeliverQueue,
 | 
			
		||||
	SystemWebhookDeliverQueue,
 | 
			
		||||
} from './QueueModule.js';
 | 
			
		||||
import type httpSignature from '@peertube/http-signature';
 | 
			
		||||
import { genRFC3230DigestHeader, type PrivateKeyWithPem, type ParsedSignature } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
import type * as Bull from 'bullmq';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
| 
						 | 
				
			
			@ -90,21 +89,21 @@ export class QueueService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public deliver(user: ThinUser, content: IActivity | null, to: string | null, isSharedInbox: boolean) {
 | 
			
		||||
	public async deliver(user: ThinUser, content: IActivity | null, to: string | null, isSharedInbox: boolean, privateKey?: PrivateKeyWithPem) {
 | 
			
		||||
		if (content == null) return null;
 | 
			
		||||
		if (to == null) return null;
 | 
			
		||||
 | 
			
		||||
		const contentBody = JSON.stringify(content);
 | 
			
		||||
		const digest = ApRequestCreator.createDigest(contentBody);
 | 
			
		||||
 | 
			
		||||
		const data: DeliverJobData = {
 | 
			
		||||
			user: {
 | 
			
		||||
				id: user.id,
 | 
			
		||||
			},
 | 
			
		||||
			content: contentBody,
 | 
			
		||||
			digest,
 | 
			
		||||
			digest: await genRFC3230DigestHeader(contentBody, 'SHA-256'),
 | 
			
		||||
			to,
 | 
			
		||||
			isSharedInbox,
 | 
			
		||||
			privateKey: privateKey && { keyId: privateKey.keyId, privateKeyPem: privateKey.privateKeyPem },
 | 
			
		||||
		};
 | 
			
		||||
 | 
			
		||||
		return this.deliverQueue.add(to, data, {
 | 
			
		||||
| 
						 | 
				
			
			@ -122,13 +121,13 @@ export class QueueService {
 | 
			
		|||
	 * @param user `{ id: string; }` この関数ではThinUserに変換しないので前もって変換してください
 | 
			
		||||
	 * @param content IActivity | null
 | 
			
		||||
	 * @param inboxes `Map<string, boolean>` / key: to (inbox url), value: isSharedInbox (whether it is sharedInbox)
 | 
			
		||||
	 * @param forceMainKey boolean | undefined, force to use main (rsa) key
 | 
			
		||||
	 * @returns void
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async deliverMany(user: ThinUser, content: IActivity | null, inboxes: Map<string, boolean>) {
 | 
			
		||||
	public async deliverMany(user: ThinUser, content: IActivity | null, inboxes: Map<string, boolean>, privateKey?: PrivateKeyWithPem) {
 | 
			
		||||
		if (content == null) return null;
 | 
			
		||||
		const contentBody = JSON.stringify(content);
 | 
			
		||||
		const digest = ApRequestCreator.createDigest(contentBody);
 | 
			
		||||
 | 
			
		||||
		const opts = {
 | 
			
		||||
			attempts: this.config.deliverJobMaxAttempts ?? 12,
 | 
			
		||||
| 
						 | 
				
			
			@ -144,9 +143,9 @@ export class QueueService {
 | 
			
		|||
			data: {
 | 
			
		||||
				user,
 | 
			
		||||
				content: contentBody,
 | 
			
		||||
				digest,
 | 
			
		||||
				to: d[0],
 | 
			
		||||
				isSharedInbox: d[1],
 | 
			
		||||
				privateKey: privateKey && { keyId: privateKey.keyId, privateKeyPem: privateKey.privateKeyPem },
 | 
			
		||||
			} as DeliverJobData,
 | 
			
		||||
			opts,
 | 
			
		||||
		})));
 | 
			
		||||
| 
						 | 
				
			
			@ -155,7 +154,7 @@ export class QueueService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public inbox(activity: IActivity, signature: httpSignature.IParsedSignature) {
 | 
			
		||||
	public inbox(activity: IActivity, signature: ParsedSignature | null) {
 | 
			
		||||
		const data = {
 | 
			
		||||
			activity: activity,
 | 
			
		||||
			signature,
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -16,6 +16,8 @@ import { ApRendererService } from '@/core/activitypub/ApRendererService.js';
 | 
			
		|||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import { deepClone } from '@/misc/clone.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { UserKeypairService } from './UserKeypairService.js';
 | 
			
		||||
import type { PrivateKeyWithPem } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
const ACTOR_USERNAME = 'relay.actor' as const;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -34,6 +36,7 @@ export class RelayService {
 | 
			
		|||
		private queueService: QueueService,
 | 
			
		||||
		private createSystemUserService: CreateSystemUserService,
 | 
			
		||||
		private apRendererService: ApRendererService,
 | 
			
		||||
		private userKeypairService: UserKeypairService,
 | 
			
		||||
	) {
 | 
			
		||||
		this.relaysCache = new MemorySingleCache<MiRelay[]>(1000 * 60 * 10);
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -111,7 +114,7 @@ export class RelayService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async deliverToRelays(user: { id: MiUser['id']; host: null; }, activity: any): Promise<void> {
 | 
			
		||||
	public async deliverToRelays(user: { id: MiUser['id']; host: null; }, activity: any, privateKey?: PrivateKeyWithPem): Promise<void> {
 | 
			
		||||
		if (activity == null) return;
 | 
			
		||||
 | 
			
		||||
		const relays = await this.relaysCache.fetch(() => this.relaysRepository.findBy({
 | 
			
		||||
| 
						 | 
				
			
			@ -121,11 +124,9 @@ export class RelayService {
 | 
			
		|||
 | 
			
		||||
		const copy = deepClone(activity);
 | 
			
		||||
		if (!copy.to) copy.to = ['https://www.w3.org/ns/activitystreams#Public'];
 | 
			
		||||
		privateKey = privateKey ?? await this.userKeypairService.getLocalUserPrivateKeyPem(user.id);
 | 
			
		||||
		const signed = await this.apRendererService.attachLdSignature(copy, privateKey);
 | 
			
		||||
 | 
			
		||||
		const signed = await this.apRendererService.attachLdSignature(copy, user);
 | 
			
		||||
 | 
			
		||||
		for (const relay of relays) {
 | 
			
		||||
			this.queueService.deliver(user, signed, relay.inbox, false);
 | 
			
		||||
		}
 | 
			
		||||
		this.queueService.deliverMany(user, signed, new Map(relays.map(({ inbox }) => [inbox, false])), privateKey);
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,7 +3,6 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import { generateKeyPair } from 'node:crypto';
 | 
			
		||||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import bcrypt from 'bcryptjs';
 | 
			
		||||
import { DataSource, IsNull } from 'typeorm';
 | 
			
		||||
| 
						 | 
				
			
			@ -21,6 +20,7 @@ import { bindThis } from '@/decorators.js';
 | 
			
		|||
import UsersChart from '@/core/chart/charts/users.js';
 | 
			
		||||
import { UtilityService } from '@/core/UtilityService.js';
 | 
			
		||||
import { MetaService } from '@/core/MetaService.js';
 | 
			
		||||
import { genRSAAndEd25519KeyPair } from '@/misc/gen-key-pair.js';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class SignupService {
 | 
			
		||||
| 
						 | 
				
			
			@ -93,22 +93,7 @@ export class SignupService {
 | 
			
		|||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const keyPair = await new Promise<string[]>((res, rej) =>
 | 
			
		||||
			generateKeyPair('rsa', {
 | 
			
		||||
				modulusLength: 2048,
 | 
			
		||||
				publicKeyEncoding: {
 | 
			
		||||
					type: 'spki',
 | 
			
		||||
					format: 'pem',
 | 
			
		||||
				},
 | 
			
		||||
				privateKeyEncoding: {
 | 
			
		||||
					type: 'pkcs8',
 | 
			
		||||
					format: 'pem',
 | 
			
		||||
					cipher: undefined,
 | 
			
		||||
					passphrase: undefined,
 | 
			
		||||
				},
 | 
			
		||||
			}, (err, publicKey, privateKey) =>
 | 
			
		||||
				err ? rej(err) : res([publicKey, privateKey]),
 | 
			
		||||
			));
 | 
			
		||||
		const keyPair = await genRSAAndEd25519KeyPair();
 | 
			
		||||
 | 
			
		||||
		let account!: MiUser;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -131,9 +116,8 @@ export class SignupService {
 | 
			
		|||
			}));
 | 
			
		||||
 | 
			
		||||
			await transactionalEntityManager.save(new MiUserKeypair({
 | 
			
		||||
				publicKey: keyPair[0],
 | 
			
		||||
				privateKey: keyPair[1],
 | 
			
		||||
				userId: account.id,
 | 
			
		||||
				...keyPair,
 | 
			
		||||
			}));
 | 
			
		||||
 | 
			
		||||
			await transactionalEntityManager.save(new MiUserProfile({
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -5,41 +5,184 @@
 | 
			
		|||
 | 
			
		||||
import { Inject, Injectable, OnApplicationShutdown } from '@nestjs/common';
 | 
			
		||||
import * as Redis from 'ioredis';
 | 
			
		||||
import { genEd25519KeyPair, importPrivateKey, PrivateKey, PrivateKeyWithPem } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
import type { MiUser } from '@/models/User.js';
 | 
			
		||||
import type { UserKeypairsRepository } from '@/models/_.js';
 | 
			
		||||
import { RedisKVCache } from '@/misc/cache.js';
 | 
			
		||||
import { RedisKVCache, MemoryKVCache } from '@/misc/cache.js';
 | 
			
		||||
import type { MiUserKeypair } from '@/models/UserKeypair.js';
 | 
			
		||||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { GlobalEventService, GlobalEvents } from '@/core/GlobalEventService.js';
 | 
			
		||||
import { UserEntityService } from '@/core/entities/UserEntityService.js';
 | 
			
		||||
import type { webcrypto } from 'node:crypto';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class UserKeypairService implements OnApplicationShutdown {
 | 
			
		||||
	private cache: RedisKVCache<MiUserKeypair>;
 | 
			
		||||
	private keypairEntityCache: RedisKVCache<MiUserKeypair>;
 | 
			
		||||
	private privateKeyObjectCache: MemoryKVCache<webcrypto.CryptoKey>;
 | 
			
		||||
 | 
			
		||||
	constructor(
 | 
			
		||||
		@Inject(DI.redis)
 | 
			
		||||
		private redisClient: Redis.Redis,
 | 
			
		||||
 | 
			
		||||
		@Inject(DI.redisForSub)
 | 
			
		||||
		private redisForSub: Redis.Redis,
 | 
			
		||||
		@Inject(DI.userKeypairsRepository)
 | 
			
		||||
		private userKeypairsRepository: UserKeypairsRepository,
 | 
			
		||||
 | 
			
		||||
		private globalEventService: GlobalEventService,
 | 
			
		||||
		private userEntityService: UserEntityService,
 | 
			
		||||
	) {
 | 
			
		||||
		this.cache = new RedisKVCache<MiUserKeypair>(this.redisClient, 'userKeypair', {
 | 
			
		||||
		this.keypairEntityCache = new RedisKVCache<MiUserKeypair>(this.redisClient, 'userKeypair', {
 | 
			
		||||
			lifetime: 1000 * 60 * 60 * 24, // 24h
 | 
			
		||||
			memoryCacheLifetime: Infinity,
 | 
			
		||||
			fetcher: (key) => this.userKeypairsRepository.findOneByOrFail({ userId: key }),
 | 
			
		||||
			toRedisConverter: (value) => JSON.stringify(value),
 | 
			
		||||
			fromRedisConverter: (value) => JSON.parse(value),
 | 
			
		||||
		});
 | 
			
		||||
		this.privateKeyObjectCache = new MemoryKVCache<webcrypto.CryptoKey>(1000 * 60 * 60 * 1);
 | 
			
		||||
 | 
			
		||||
		this.redisForSub.on('message', this.onMessage);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async getUserKeypair(userId: MiUser['id']): Promise<MiUserKeypair> {
 | 
			
		||||
		return await this.cache.fetch(userId);
 | 
			
		||||
		return await this.keypairEntityCache.fetch(userId);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * Get private key [Only PrivateKeyWithPem for queue data etc.]
 | 
			
		||||
	 * @param userIdOrHint user id or MiUserKeypair
 | 
			
		||||
	 * @param preferType
 | 
			
		||||
	 *		If ed25519-like(`ed25519`, `01`, `11`) is specified, ed25519 keypair will be returned if exists.
 | 
			
		||||
	 *		Otherwise, main keypair will be returned.
 | 
			
		||||
	 * @returns
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async getLocalUserPrivateKeyPem(
 | 
			
		||||
		userIdOrHint: MiUser['id'] | MiUserKeypair,
 | 
			
		||||
		preferType?: string,
 | 
			
		||||
	): Promise<PrivateKeyWithPem> {
 | 
			
		||||
		const keypair = typeof userIdOrHint === 'string' ? await this.getUserKeypair(userIdOrHint) : userIdOrHint;
 | 
			
		||||
		if (
 | 
			
		||||
			preferType && ['01', '11', 'ed25519'].includes(preferType.toLowerCase()) &&
 | 
			
		||||
			keypair.ed25519PublicKey != null && keypair.ed25519PrivateKey != null
 | 
			
		||||
		) {
 | 
			
		||||
			return {
 | 
			
		||||
				keyId: `${this.userEntityService.genLocalUserUri(keypair.userId)}#ed25519-key`,
 | 
			
		||||
				privateKeyPem: keypair.ed25519PrivateKey,
 | 
			
		||||
			};
 | 
			
		||||
		}
 | 
			
		||||
		return {
 | 
			
		||||
			keyId: `${this.userEntityService.genLocalUserUri(keypair.userId)}#main-key`,
 | 
			
		||||
			privateKeyPem: keypair.privateKey,
 | 
			
		||||
		};
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * Get private key [Only PrivateKey for ap request]
 | 
			
		||||
	 * Using cache due to performance reasons of `crypto.subtle.importKey`
 | 
			
		||||
	 * @param userIdOrHint user id, MiUserKeypair, or PrivateKeyWithPem
 | 
			
		||||
	 * @param preferType
 | 
			
		||||
	 * 		If ed25519-like(`ed25519`, `01`, `11`) is specified, ed25519 keypair will be returned if exists.
 | 
			
		||||
	 *		Otherwise, main keypair will be returned. (ignored if userIdOrHint is PrivateKeyWithPem)
 | 
			
		||||
	 * @returns
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async getLocalUserPrivateKey(
 | 
			
		||||
		userIdOrHint: MiUser['id'] | MiUserKeypair | PrivateKeyWithPem,
 | 
			
		||||
		preferType?: string,
 | 
			
		||||
	): Promise<PrivateKey> {
 | 
			
		||||
		if (typeof userIdOrHint === 'object' && 'privateKeyPem' in userIdOrHint) {
 | 
			
		||||
			// userIdOrHint is PrivateKeyWithPem
 | 
			
		||||
			return {
 | 
			
		||||
				keyId: userIdOrHint.keyId,
 | 
			
		||||
				privateKey: await this.privateKeyObjectCache.fetch(userIdOrHint.keyId, async () => {
 | 
			
		||||
					return await importPrivateKey(userIdOrHint.privateKeyPem);
 | 
			
		||||
				}),
 | 
			
		||||
			};
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const userId = typeof userIdOrHint === 'string' ? userIdOrHint : userIdOrHint.userId;
 | 
			
		||||
		const getKeypair = () => typeof userIdOrHint === 'string' ? this.getUserKeypair(userId) : userIdOrHint;
 | 
			
		||||
 | 
			
		||||
		if (preferType && ['01', '11', 'ed25519'].includes(preferType.toLowerCase())) {
 | 
			
		||||
			const keyId = `${this.userEntityService.genLocalUserUri(userId)}#ed25519-key`;
 | 
			
		||||
			const fetched = await this.privateKeyObjectCache.fetchMaybe(keyId, async () => {
 | 
			
		||||
				const keypair = await getKeypair();
 | 
			
		||||
				if (keypair.ed25519PublicKey != null && keypair.ed25519PrivateKey != null) {
 | 
			
		||||
					return await importPrivateKey(keypair.ed25519PrivateKey);
 | 
			
		||||
				}
 | 
			
		||||
				return;
 | 
			
		||||
			});
 | 
			
		||||
			if (fetched) {
 | 
			
		||||
				return {
 | 
			
		||||
					keyId,
 | 
			
		||||
					privateKey: fetched,
 | 
			
		||||
				};
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const keyId = `${this.userEntityService.genLocalUserUri(userId)}#main-key`;
 | 
			
		||||
		return {
 | 
			
		||||
			keyId,
 | 
			
		||||
			privateKey: await this.privateKeyObjectCache.fetch(keyId, async () => {
 | 
			
		||||
				const keypair = await getKeypair();
 | 
			
		||||
				return await importPrivateKey(keypair.privateKey);
 | 
			
		||||
			}),
 | 
			
		||||
		};
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async refresh(userId: MiUser['id']): Promise<void> {
 | 
			
		||||
		return await this.keypairEntityCache.refresh(userId);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * If DB has ed25519 keypair, refresh cache and return it.
 | 
			
		||||
	 * If not, create, save and return ed25519 keypair.
 | 
			
		||||
	 * @param userId user id
 | 
			
		||||
	 * @returns MiUserKeypair if keypair is created, void if keypair is already exists
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async refreshAndPrepareEd25519KeyPair(userId: MiUser['id']): Promise<MiUserKeypair | void> {
 | 
			
		||||
		await this.refresh(userId);
 | 
			
		||||
		const keypair = await this.keypairEntityCache.fetch(userId);
 | 
			
		||||
		if (keypair.ed25519PublicKey != null) {
 | 
			
		||||
			return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const ed25519 = await genEd25519KeyPair();
 | 
			
		||||
		await this.userKeypairsRepository.update({ userId }, {
 | 
			
		||||
			ed25519PublicKey: ed25519.publicKey,
 | 
			
		||||
			ed25519PrivateKey: ed25519.privateKey,
 | 
			
		||||
		});
 | 
			
		||||
		this.globalEventService.publishInternalEvent('userKeypairUpdated', { userId });
 | 
			
		||||
		const result = {
 | 
			
		||||
			...keypair,
 | 
			
		||||
			ed25519PublicKey: ed25519.publicKey,
 | 
			
		||||
			ed25519PrivateKey: ed25519.privateKey,
 | 
			
		||||
		};
 | 
			
		||||
		this.keypairEntityCache.set(userId, result);
 | 
			
		||||
		return result;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	private async onMessage(_: string, data: string): Promise<void> {
 | 
			
		||||
		const obj = JSON.parse(data);
 | 
			
		||||
 | 
			
		||||
		if (obj.channel === 'internal') {
 | 
			
		||||
			const { type, body } = obj.message as GlobalEvents['internal']['payload'];
 | 
			
		||||
			switch (type) {
 | 
			
		||||
				case 'userKeypairUpdated': {
 | 
			
		||||
					this.refresh(body.userId);
 | 
			
		||||
					break;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public dispose(): void {
 | 
			
		||||
		this.cache.dispose();
 | 
			
		||||
		this.keypairEntityCache.dispose();
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,27 +3,23 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import { Not, IsNull } from 'typeorm';
 | 
			
		||||
import type { FollowingsRepository } from '@/models/_.js';
 | 
			
		||||
import { Injectable } from '@nestjs/common';
 | 
			
		||||
import type { MiUser } from '@/models/User.js';
 | 
			
		||||
import { QueueService } from '@/core/QueueService.js';
 | 
			
		||||
import { GlobalEventService } from '@/core/GlobalEventService.js';
 | 
			
		||||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import { ApRendererService } from '@/core/activitypub/ApRendererService.js';
 | 
			
		||||
import { UserEntityService } from '@/core/entities/UserEntityService.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { UserKeypairService } from './UserKeypairService.js';
 | 
			
		||||
import { ApDeliverManagerService } from './activitypub/ApDeliverManagerService.js';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class UserSuspendService {
 | 
			
		||||
	constructor(
 | 
			
		||||
		@Inject(DI.followingsRepository)
 | 
			
		||||
		private followingsRepository: FollowingsRepository,
 | 
			
		||||
 | 
			
		||||
		private userEntityService: UserEntityService,
 | 
			
		||||
		private queueService: QueueService,
 | 
			
		||||
		private globalEventService: GlobalEventService,
 | 
			
		||||
		private apRendererService: ApRendererService,
 | 
			
		||||
		private userKeypairService: UserKeypairService,
 | 
			
		||||
		private apDeliverManagerService: ApDeliverManagerService,
 | 
			
		||||
	) {
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -32,28 +28,12 @@ export class UserSuspendService {
 | 
			
		|||
		this.globalEventService.publishInternalEvent('userChangeSuspendedState', { id: user.id, isSuspended: true });
 | 
			
		||||
 | 
			
		||||
		if (this.userEntityService.isLocalUser(user)) {
 | 
			
		||||
			// 知り得る全SharedInboxにDelete配信
 | 
			
		||||
			const content = this.apRendererService.addContext(this.apRendererService.renderDelete(this.userEntityService.genLocalUserUri(user.id), user));
 | 
			
		||||
 | 
			
		||||
			const queue: string[] = [];
 | 
			
		||||
 | 
			
		||||
			const followings = await this.followingsRepository.find({
 | 
			
		||||
				where: [
 | 
			
		||||
					{ followerSharedInbox: Not(IsNull()) },
 | 
			
		||||
					{ followeeSharedInbox: Not(IsNull()) },
 | 
			
		||||
				],
 | 
			
		||||
				select: ['followerSharedInbox', 'followeeSharedInbox'],
 | 
			
		||||
			});
 | 
			
		||||
 | 
			
		||||
			const inboxes = followings.map(x => x.followerSharedInbox ?? x.followeeSharedInbox);
 | 
			
		||||
 | 
			
		||||
			for (const inbox of inboxes) {
 | 
			
		||||
				if (inbox != null && !queue.includes(inbox)) queue.push(inbox);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			for (const inbox of queue) {
 | 
			
		||||
				this.queueService.deliver(user, content, inbox, true);
 | 
			
		||||
			}
 | 
			
		||||
			const manager = this.apDeliverManagerService.createDeliverManager(user, content);
 | 
			
		||||
			manager.addAllKnowingSharedInboxRecipe();
 | 
			
		||||
			// process deliver時にはキーペアが消去されているはずなので、ここで挿入する
 | 
			
		||||
			const privateKey = await this.userKeypairService.getLocalUserPrivateKeyPem(user.id, 'main');
 | 
			
		||||
			manager.execute({ privateKey });
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -62,28 +42,12 @@ export class UserSuspendService {
 | 
			
		|||
		this.globalEventService.publishInternalEvent('userChangeSuspendedState', { id: user.id, isSuspended: false });
 | 
			
		||||
 | 
			
		||||
		if (this.userEntityService.isLocalUser(user)) {
 | 
			
		||||
			// 知り得る全SharedInboxにUndo Delete配信
 | 
			
		||||
			const content = this.apRendererService.addContext(this.apRendererService.renderUndo(this.apRendererService.renderDelete(this.userEntityService.genLocalUserUri(user.id), user), user));
 | 
			
		||||
 | 
			
		||||
			const queue: string[] = [];
 | 
			
		||||
 | 
			
		||||
			const followings = await this.followingsRepository.find({
 | 
			
		||||
				where: [
 | 
			
		||||
					{ followerSharedInbox: Not(IsNull()) },
 | 
			
		||||
					{ followeeSharedInbox: Not(IsNull()) },
 | 
			
		||||
				],
 | 
			
		||||
				select: ['followerSharedInbox', 'followeeSharedInbox'],
 | 
			
		||||
			});
 | 
			
		||||
 | 
			
		||||
			const inboxes = followings.map(x => x.followerSharedInbox ?? x.followeeSharedInbox);
 | 
			
		||||
 | 
			
		||||
			for (const inbox of inboxes) {
 | 
			
		||||
				if (inbox != null && !queue.includes(inbox)) queue.push(inbox);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			for (const inbox of queue) {
 | 
			
		||||
				this.queueService.deliver(user as any, content, inbox, true);
 | 
			
		||||
			}
 | 
			
		||||
			const manager = this.apDeliverManagerService.createDeliverManager(user, content);
 | 
			
		||||
			manager.addAllKnowingSharedInboxRecipe();
 | 
			
		||||
			// process deliver時にはキーペアが消去されているはずなので、ここで挿入する
 | 
			
		||||
			const privateKey = await this.userKeypairService.getLocalUserPrivateKeyPem(user.id, 'main');
 | 
			
		||||
			manager.execute({ privateKey });
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -46,7 +46,7 @@ export class WebfingerService {
 | 
			
		|||
		const m = query.match(mRegex);
 | 
			
		||||
		if (m) {
 | 
			
		||||
			const hostname = m[2];
 | 
			
		||||
			const useHttp = process.env.MISSKEY_WEBFINGER_USE_HTTP && process.env.MISSKEY_WEBFINGER_USE_HTTP.toLowerCase() === 'true';
 | 
			
		||||
			const useHttp = process.env.MISSKEY_USE_HTTP && process.env.MISSKEY_USE_HTTP.toLowerCase() === 'true';
 | 
			
		||||
			return `http${useHttp ? '' : 's'}://${hostname}/.well-known/webfinger?${urlQuery({ resource: `acct:${query}` })}`;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -5,7 +5,7 @@
 | 
			
		|||
 | 
			
		||||
import { Inject, Injectable, OnApplicationShutdown } from '@nestjs/common';
 | 
			
		||||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import type { NotesRepository, UserPublickeysRepository, UsersRepository } from '@/models/_.js';
 | 
			
		||||
import type { MiUser, NotesRepository, UserPublickeysRepository, UsersRepository } from '@/models/_.js';
 | 
			
		||||
import type { Config } from '@/config.js';
 | 
			
		||||
import { MemoryKVCache } from '@/misc/cache.js';
 | 
			
		||||
import type { MiUserPublickey } from '@/models/UserPublickey.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -13,9 +13,12 @@ import { CacheService } from '@/core/CacheService.js';
 | 
			
		|||
import type { MiNote } from '@/models/Note.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { MiLocalUser, MiRemoteUser } from '@/models/User.js';
 | 
			
		||||
import Logger from '@/logger.js';
 | 
			
		||||
import { getApId } from './type.js';
 | 
			
		||||
import { ApPersonService } from './models/ApPersonService.js';
 | 
			
		||||
import { ApLoggerService } from './ApLoggerService.js';
 | 
			
		||||
import type { IObject } from './type.js';
 | 
			
		||||
import { UtilityService } from '../UtilityService.js';
 | 
			
		||||
 | 
			
		||||
export type UriParseResult = {
 | 
			
		||||
	/** wether the URI was generated by us */
 | 
			
		||||
| 
						 | 
				
			
			@ -35,8 +38,8 @@ export type UriParseResult = {
 | 
			
		|||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class ApDbResolverService implements OnApplicationShutdown {
 | 
			
		||||
	private publicKeyCache: MemoryKVCache<MiUserPublickey | null>;
 | 
			
		||||
	private publicKeyByUserIdCache: MemoryKVCache<MiUserPublickey | null>;
 | 
			
		||||
	private publicKeyByUserIdCache: MemoryKVCache<MiUserPublickey[] | null>;
 | 
			
		||||
	private logger: Logger;
 | 
			
		||||
 | 
			
		||||
	constructor(
 | 
			
		||||
		@Inject(DI.config)
 | 
			
		||||
| 
						 | 
				
			
			@ -53,9 +56,17 @@ export class ApDbResolverService implements OnApplicationShutdown {
 | 
			
		|||
 | 
			
		||||
		private cacheService: CacheService,
 | 
			
		||||
		private apPersonService: ApPersonService,
 | 
			
		||||
		private apLoggerService: ApLoggerService,
 | 
			
		||||
		private utilityService: UtilityService,
 | 
			
		||||
	) {
 | 
			
		||||
		this.publicKeyCache = new MemoryKVCache<MiUserPublickey | null>(Infinity);
 | 
			
		||||
		this.publicKeyByUserIdCache = new MemoryKVCache<MiUserPublickey | null>(Infinity);
 | 
			
		||||
		this.publicKeyByUserIdCache = new MemoryKVCache<MiUserPublickey[] | null>(Infinity);
 | 
			
		||||
		this.logger = this.apLoggerService.logger.createSubLogger('db-resolver');
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	private punyHost(url: string): string {
 | 
			
		||||
		const urlObj = new URL(url);
 | 
			
		||||
		const host = `${this.utilityService.toPuny(urlObj.hostname)}${urlObj.port.length > 0 ? ':' + urlObj.port : ''}`;
 | 
			
		||||
		return host;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
| 
						 | 
				
			
			@ -116,62 +127,141 @@ export class ApDbResolverService implements OnApplicationShutdown {
 | 
			
		|||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * AP KeyId => Misskey User and Key
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async getAuthUserFromKeyId(keyId: string): Promise<{
 | 
			
		||||
		user: MiRemoteUser;
 | 
			
		||||
		key: MiUserPublickey;
 | 
			
		||||
	} | null> {
 | 
			
		||||
		const key = await this.publicKeyCache.fetch(keyId, async () => {
 | 
			
		||||
			const key = await this.userPublickeysRepository.findOneBy({
 | 
			
		||||
				keyId,
 | 
			
		||||
			});
 | 
			
		||||
 | 
			
		||||
			if (key == null) return null;
 | 
			
		||||
 | 
			
		||||
			return key;
 | 
			
		||||
		}, key => key != null);
 | 
			
		||||
 | 
			
		||||
		if (key == null) return null;
 | 
			
		||||
 | 
			
		||||
		const user = await this.cacheService.findUserById(key.userId).catch(() => null) as MiRemoteUser | null;
 | 
			
		||||
		if (user == null) return null;
 | 
			
		||||
		if (user.isDeleted) return null;
 | 
			
		||||
 | 
			
		||||
		return {
 | 
			
		||||
			user,
 | 
			
		||||
			key,
 | 
			
		||||
		};
 | 
			
		||||
	private async refreshAndFindKey(userId: MiUser['id'], keyId: string): Promise<MiUserPublickey | null> {
 | 
			
		||||
		this.refreshCacheByUserId(userId);
 | 
			
		||||
		const keys = await this.getPublicKeyByUserId(userId);
 | 
			
		||||
		if (keys == null || !Array.isArray(keys) || keys.length === 0) {
 | 
			
		||||
			this.logger.warn(`No key found (refreshAndFindKey) userId=${userId} keyId=${keyId} keys=${JSON.stringify(keys)}`);
 | 
			
		||||
			return null;
 | 
			
		||||
		}
 | 
			
		||||
		const exactKey = keys.find(x => x.keyId === keyId);
 | 
			
		||||
		if (exactKey) return exactKey;
 | 
			
		||||
		this.logger.warn(`No exact key found (refreshAndFindKey) userId=${userId} keyId=${keyId} keys=${JSON.stringify(keys)}`);
 | 
			
		||||
		return null;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * AP Actor id => Misskey User and Key
 | 
			
		||||
	 * @param uri AP Actor id
 | 
			
		||||
	 * @param keyId Key id to find. If not specified, main key will be selected.
 | 
			
		||||
	 * @returns
 | 
			
		||||
	 *	1. `null` if the user and key host do not match
 | 
			
		||||
	 *	2. `{ user: null, key: null }` if the user is not found
 | 
			
		||||
	 *	3. `{ user: MiRemoteUser, key: null }` if key is not found
 | 
			
		||||
	 *  4. `{ user: MiRemoteUser, key: MiUserPublickey }` if both are found
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async getAuthUserFromApId(uri: string): Promise<{
 | 
			
		||||
	public async getAuthUserFromApId(uri: string, keyId?: string): Promise<{
 | 
			
		||||
		user: MiRemoteUser;
 | 
			
		||||
		key: MiUserPublickey | null;
 | 
			
		||||
	} | null> {
 | 
			
		||||
		const user = await this.apPersonService.resolvePerson(uri) as MiRemoteUser;
 | 
			
		||||
		if (user.isDeleted) return null;
 | 
			
		||||
	} | {
 | 
			
		||||
		user: null;
 | 
			
		||||
		key: null;
 | 
			
		||||
	} |
 | 
			
		||||
	null> {
 | 
			
		||||
		if (keyId) {
 | 
			
		||||
			if (this.punyHost(uri) !== this.punyHost(keyId)) {
 | 
			
		||||
				/**
 | 
			
		||||
				 * keyIdはURL形式かつkeyIdのホストはuriのホストと一致するはず
 | 
			
		||||
				 * (ApPersonService.validateActorに由来)
 | 
			
		||||
				 *
 | 
			
		||||
				 * ただ、Mastodonはリプライ関連で他人のトゥートをHTTP Signature署名して送ってくることがある
 | 
			
		||||
				 * そのような署名は有効性に疑問があるので無視することにする
 | 
			
		||||
				 * ここではuriとkeyIdのホストが一致しない場合は無視する
 | 
			
		||||
				 * ハッシュをなくしたkeyIdとuriの同一性を比べてみてもいいが、`uri#*-key`というkeyIdを設定するのが
 | 
			
		||||
				 * 決まりごとというわけでもないため幅を持たせることにする
 | 
			
		||||
				 *
 | 
			
		||||
				 *
 | 
			
		||||
				 * The keyId should be in URL format and its host should match the host of the uri
 | 
			
		||||
				 * (derived from ApPersonService.validateActor)
 | 
			
		||||
				 *
 | 
			
		||||
				 * However, Mastodon sometimes sends toots from other users with HTTP Signature signing for reply-related purposes
 | 
			
		||||
				 * Such signatures are of questionable validity, so we choose to ignore them
 | 
			
		||||
				 * Here, we ignore cases where the hosts of uri and keyId do not match
 | 
			
		||||
				 * We could also compare the equality of keyId without the hash and uri, but since setting a keyId like `uri#*-key`
 | 
			
		||||
				 * is not a strict rule, we decide to allow for some flexibility
 | 
			
		||||
				 */
 | 
			
		||||
				this.logger.warn(`actor uri and keyId are not matched uri=${uri} keyId=${keyId}`);
 | 
			
		||||
				return null;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const key = await this.publicKeyByUserIdCache.fetch(
 | 
			
		||||
			user.id,
 | 
			
		||||
			() => this.userPublickeysRepository.findOneBy({ userId: user.id }),
 | 
			
		||||
		const user = await this.apPersonService.resolvePerson(uri, undefined, true) as MiRemoteUser;
 | 
			
		||||
		if (user.isDeleted) return { user: null, key: null };
 | 
			
		||||
 | 
			
		||||
		const keys = await this.getPublicKeyByUserId(user.id);
 | 
			
		||||
 | 
			
		||||
		if (keys == null || !Array.isArray(keys) || keys.length === 0) {
 | 
			
		||||
			this.logger.warn(`No key found uri=${uri} userId=${user.id} keys=${JSON.stringify(keys)}`);
 | 
			
		||||
			return { user, key: null };
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (!keyId) {
 | 
			
		||||
			// Choose the main-like
 | 
			
		||||
			const mainKey = keys.find(x => {
 | 
			
		||||
				try {
 | 
			
		||||
					const url = new URL(x.keyId);
 | 
			
		||||
					const path = url.pathname.split('/').pop()?.toLowerCase();
 | 
			
		||||
					if (url.hash) {
 | 
			
		||||
						if (url.hash.toLowerCase().includes('main')) {
 | 
			
		||||
							return true;
 | 
			
		||||
						}
 | 
			
		||||
					} else if (path?.includes('main') || path === 'publickey') {
 | 
			
		||||
						return true;
 | 
			
		||||
					}
 | 
			
		||||
				} catch { /* noop */ }
 | 
			
		||||
 | 
			
		||||
				return false;
 | 
			
		||||
			});
 | 
			
		||||
			return { user, key: mainKey ?? keys[0] };
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const exactKey = keys.find(x => x.keyId === keyId);
 | 
			
		||||
		if (exactKey) return { user, key: exactKey };
 | 
			
		||||
 | 
			
		||||
		/**
 | 
			
		||||
		 * keyIdで見つからない場合、まずはキャッシュを更新して再取得
 | 
			
		||||
		 * If not found with keyId, update cache and reacquire
 | 
			
		||||
		 */
 | 
			
		||||
		const cacheRaw = this.publicKeyByUserIdCache.cache.get(user.id);
 | 
			
		||||
		if (cacheRaw && cacheRaw.date > Date.now() - 1000 * 60 * 12) {
 | 
			
		||||
			const exactKey = await this.refreshAndFindKey(user.id, keyId);
 | 
			
		||||
			if (exactKey) return { user, key: exactKey };
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		/**
 | 
			
		||||
		 * lastFetchedAtでの更新制限を弱めて再取得
 | 
			
		||||
		 * Reacquisition with weakened update limit at lastFetchedAt
 | 
			
		||||
		 */
 | 
			
		||||
		if (user.lastFetchedAt == null || user.lastFetchedAt < new Date(Date.now() - 1000 * 60 * 12)) {
 | 
			
		||||
			this.logger.info(`Fetching user to find public key uri=${uri} userId=${user.id} keyId=${keyId}`);
 | 
			
		||||
			const renewed = await this.apPersonService.fetchPersonWithRenewal(uri, 0);
 | 
			
		||||
			if (renewed == null || renewed.isDeleted) return null;
 | 
			
		||||
 | 
			
		||||
			return { user, key: await this.refreshAndFindKey(user.id, keyId) };
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		this.logger.warn(`No key found uri=${uri} userId=${user.id} keyId=${keyId}`);
 | 
			
		||||
		return { user, key: null };
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async getPublicKeyByUserId(userId: MiUser['id']): Promise<MiUserPublickey[] | null> {
 | 
			
		||||
		return await this.publicKeyByUserIdCache.fetch(
 | 
			
		||||
			userId,
 | 
			
		||||
			() => this.userPublickeysRepository.find({ where: { userId } }),
 | 
			
		||||
			v => v != null,
 | 
			
		||||
		);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
		return {
 | 
			
		||||
			user,
 | 
			
		||||
			key,
 | 
			
		||||
		};
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public refreshCacheByUserId(userId: MiUser['id']): void {
 | 
			
		||||
		this.publicKeyByUserIdCache.delete(userId);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public dispose(): void {
 | 
			
		||||
		this.publicKeyCache.dispose();
 | 
			
		||||
		this.publicKeyByUserIdCache.dispose();
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -9,10 +9,14 @@ import { DI } from '@/di-symbols.js';
 | 
			
		|||
import type { FollowingsRepository } from '@/models/_.js';
 | 
			
		||||
import type { MiLocalUser, MiRemoteUser, MiUser } from '@/models/User.js';
 | 
			
		||||
import { QueueService } from '@/core/QueueService.js';
 | 
			
		||||
import { UserEntityService } from '@/core/entities/UserEntityService.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import type { IActivity } from '@/core/activitypub/type.js';
 | 
			
		||||
import { ThinUser } from '@/queue/types.js';
 | 
			
		||||
import { AccountUpdateService } from '@/core/AccountUpdateService.js';
 | 
			
		||||
import type Logger from '@/logger.js';
 | 
			
		||||
import { UserKeypairService } from '../UserKeypairService.js';
 | 
			
		||||
import { ApLoggerService } from './ApLoggerService.js';
 | 
			
		||||
import type { PrivateKeyWithPem } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
interface IRecipe {
 | 
			
		||||
	type: string;
 | 
			
		||||
| 
						 | 
				
			
			@ -27,12 +31,19 @@ interface IDirectRecipe extends IRecipe {
 | 
			
		|||
	to: MiRemoteUser;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
interface IAllKnowingSharedInboxRecipe extends IRecipe {
 | 
			
		||||
	type: 'AllKnowingSharedInbox';
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
const isFollowers = (recipe: IRecipe): recipe is IFollowersRecipe =>
 | 
			
		||||
	recipe.type === 'Followers';
 | 
			
		||||
 | 
			
		||||
const isDirect = (recipe: IRecipe): recipe is IDirectRecipe =>
 | 
			
		||||
	recipe.type === 'Direct';
 | 
			
		||||
 | 
			
		||||
const isAllKnowingSharedInbox = (recipe: IRecipe): recipe is IAllKnowingSharedInboxRecipe =>
 | 
			
		||||
	recipe.type === 'AllKnowingSharedInbox';
 | 
			
		||||
 | 
			
		||||
class DeliverManager {
 | 
			
		||||
	private actor: ThinUser;
 | 
			
		||||
	private activity: IActivity | null;
 | 
			
		||||
| 
						 | 
				
			
			@ -40,16 +51,18 @@ class DeliverManager {
 | 
			
		|||
 | 
			
		||||
	/**
 | 
			
		||||
	 * Constructor
 | 
			
		||||
	 * @param userEntityService
 | 
			
		||||
	 * @param userKeypairService
 | 
			
		||||
	 * @param followingsRepository
 | 
			
		||||
	 * @param queueService
 | 
			
		||||
	 * @param actor Actor
 | 
			
		||||
	 * @param activity Activity to deliver
 | 
			
		||||
	 */
 | 
			
		||||
	constructor(
 | 
			
		||||
		private userEntityService: UserEntityService,
 | 
			
		||||
		private userKeypairService: UserKeypairService,
 | 
			
		||||
		private followingsRepository: FollowingsRepository,
 | 
			
		||||
		private queueService: QueueService,
 | 
			
		||||
		private accountUpdateService: AccountUpdateService,
 | 
			
		||||
		private logger: Logger,
 | 
			
		||||
 | 
			
		||||
		actor: { id: MiUser['id']; host: null; },
 | 
			
		||||
		activity: IActivity | null,
 | 
			
		||||
| 
						 | 
				
			
			@ -91,6 +104,18 @@ class DeliverManager {
 | 
			
		|||
		this.addRecipe(recipe);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * Add recipe for all-knowing shared inbox deliver
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public addAllKnowingSharedInboxRecipe(): void {
 | 
			
		||||
		const deliver: IAllKnowingSharedInboxRecipe = {
 | 
			
		||||
			type: 'AllKnowingSharedInbox',
 | 
			
		||||
		};
 | 
			
		||||
 | 
			
		||||
		this.addRecipe(deliver);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * Add recipe
 | 
			
		||||
	 * @param recipe Recipe
 | 
			
		||||
| 
						 | 
				
			
			@ -104,11 +129,44 @@ class DeliverManager {
 | 
			
		|||
	 * Execute delivers
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async execute(): Promise<void> {
 | 
			
		||||
	public async execute(opts?: { privateKey?: PrivateKeyWithPem }): Promise<void> {
 | 
			
		||||
		//#region MIGRATION
 | 
			
		||||
		if (!opts?.privateKey) {
 | 
			
		||||
			/**
 | 
			
		||||
			 * ed25519の署名がなければ追加する
 | 
			
		||||
			 */
 | 
			
		||||
			const created = await this.userKeypairService.refreshAndPrepareEd25519KeyPair(this.actor.id);
 | 
			
		||||
			if (created) {
 | 
			
		||||
				// createdが存在するということは新規作成されたということなので、フォロワーに配信する
 | 
			
		||||
				this.logger.info(`ed25519 key pair created for user ${this.actor.id} and publishing to followers`);
 | 
			
		||||
				// リモートに配信
 | 
			
		||||
				const keyPair = await this.userKeypairService.getLocalUserPrivateKeyPem(created, 'main');
 | 
			
		||||
				await this.accountUpdateService.publishToFollowers(this.actor.id, keyPair);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		//#endregion
 | 
			
		||||
 | 
			
		||||
		//#region collect inboxes by recipes
 | 
			
		||||
		// The value flags whether it is shared or not.
 | 
			
		||||
		// key: inbox URL, value: whether it is sharedInbox
 | 
			
		||||
		const inboxes = new Map<string, boolean>();
 | 
			
		||||
 | 
			
		||||
		if (this.recipes.some(r => isAllKnowingSharedInbox(r))) {
 | 
			
		||||
			// all-knowing shared inbox
 | 
			
		||||
			const followings = await this.followingsRepository.find({
 | 
			
		||||
				where: [
 | 
			
		||||
					{ followerSharedInbox: Not(IsNull()) },
 | 
			
		||||
					{ followeeSharedInbox: Not(IsNull()) },
 | 
			
		||||
				],
 | 
			
		||||
				select: ['followerSharedInbox', 'followeeSharedInbox'],
 | 
			
		||||
			});
 | 
			
		||||
 | 
			
		||||
			for (const following of followings) {
 | 
			
		||||
				if (following.followeeSharedInbox) inboxes.set(following.followeeSharedInbox, true);
 | 
			
		||||
				if (following.followerSharedInbox) inboxes.set(following.followerSharedInbox, true);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// build inbox list
 | 
			
		||||
		// Process follower recipes first to avoid duplication when processing direct recipes later.
 | 
			
		||||
		if (this.recipes.some(r => isFollowers(r))) {
 | 
			
		||||
| 
						 | 
				
			
			@ -142,39 +200,49 @@ class DeliverManager {
 | 
			
		|||
 | 
			
		||||
			inboxes.set(recipe.to.inbox, false);
 | 
			
		||||
		}
 | 
			
		||||
		//#endregion
 | 
			
		||||
 | 
			
		||||
		// deliver
 | 
			
		||||
		await this.queueService.deliverMany(this.actor, this.activity, inboxes);
 | 
			
		||||
		await this.queueService.deliverMany(this.actor, this.activity, inboxes, opts?.privateKey);
 | 
			
		||||
		this.logger.info(`Deliver queues dispatched: inboxes=${inboxes.size} actorId=${this.actor.id} activityId=${this.activity?.id}`);
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class ApDeliverManagerService {
 | 
			
		||||
	private logger: Logger;
 | 
			
		||||
 | 
			
		||||
	constructor(
 | 
			
		||||
		@Inject(DI.followingsRepository)
 | 
			
		||||
		private followingsRepository: FollowingsRepository,
 | 
			
		||||
 | 
			
		||||
		private userEntityService: UserEntityService,
 | 
			
		||||
		private userKeypairService: UserKeypairService,
 | 
			
		||||
		private queueService: QueueService,
 | 
			
		||||
		private accountUpdateService: AccountUpdateService,
 | 
			
		||||
		private apLoggerService: ApLoggerService,
 | 
			
		||||
	) {
 | 
			
		||||
		this.logger = this.apLoggerService.logger.createSubLogger('deliver-manager');
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * Deliver activity to followers
 | 
			
		||||
	 * @param actor
 | 
			
		||||
	 * @param activity Activity
 | 
			
		||||
	 * @param forceMainKey Force to use main (rsa) key
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async deliverToFollowers(actor: { id: MiLocalUser['id']; host: null; }, activity: IActivity): Promise<void> {
 | 
			
		||||
	public async deliverToFollowers(actor: { id: MiLocalUser['id']; host: null; }, activity: IActivity, privateKey?: PrivateKeyWithPem): Promise<void> {
 | 
			
		||||
		const manager = new DeliverManager(
 | 
			
		||||
			this.userEntityService,
 | 
			
		||||
			this.userKeypairService,
 | 
			
		||||
			this.followingsRepository,
 | 
			
		||||
			this.queueService,
 | 
			
		||||
			this.accountUpdateService,
 | 
			
		||||
			this.logger,
 | 
			
		||||
			actor,
 | 
			
		||||
			activity,
 | 
			
		||||
		);
 | 
			
		||||
		manager.addFollowersRecipe();
 | 
			
		||||
		await manager.execute();
 | 
			
		||||
		await manager.execute({ privateKey });
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
| 
						 | 
				
			
			@ -186,9 +254,11 @@ export class ApDeliverManagerService {
 | 
			
		|||
	@bindThis
 | 
			
		||||
	public async deliverToUser(actor: { id: MiLocalUser['id']; host: null; }, activity: IActivity, to: MiRemoteUser): Promise<void> {
 | 
			
		||||
		const manager = new DeliverManager(
 | 
			
		||||
			this.userEntityService,
 | 
			
		||||
			this.userKeypairService,
 | 
			
		||||
			this.followingsRepository,
 | 
			
		||||
			this.queueService,
 | 
			
		||||
			this.accountUpdateService,
 | 
			
		||||
			this.logger,
 | 
			
		||||
			actor,
 | 
			
		||||
			activity,
 | 
			
		||||
		);
 | 
			
		||||
| 
						 | 
				
			
			@ -199,10 +269,11 @@ export class ApDeliverManagerService {
 | 
			
		|||
	@bindThis
 | 
			
		||||
	public createDeliverManager(actor: { id: MiUser['id']; host: null; }, activity: IActivity | null): DeliverManager {
 | 
			
		||||
		return new DeliverManager(
 | 
			
		||||
			this.userEntityService,
 | 
			
		||||
			this.userKeypairService,
 | 
			
		||||
			this.followingsRepository,
 | 
			
		||||
			this.queueService,
 | 
			
		||||
 | 
			
		||||
			this.accountUpdateService,
 | 
			
		||||
			this.logger,
 | 
			
		||||
			actor,
 | 
			
		||||
			activity,
 | 
			
		||||
		);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -114,15 +114,8 @@ export class ApInboxService {
 | 
			
		|||
			result = await this.performOneActivity(actor, activity);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// ついでにリモートユーザーの情報が古かったら更新しておく
 | 
			
		||||
		if (actor.uri) {
 | 
			
		||||
			if (actor.lastFetchedAt == null || Date.now() - actor.lastFetchedAt.getTime() > 1000 * 60 * 60 * 24) {
 | 
			
		||||
				setImmediate(() => {
 | 
			
		||||
					this.apPersonService.updatePerson(actor.uri);
 | 
			
		||||
				});
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		return result;
 | 
			
		||||
		// ついでにリモートユーザーの情報が古かったら更新しておく?
 | 
			
		||||
		// → No, この関数が呼び出される前に署名検証で更新されているはず
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -22,7 +22,6 @@ import { UserKeypairService } from '@/core/UserKeypairService.js';
 | 
			
		|||
import { MfmService } from '@/core/MfmService.js';
 | 
			
		||||
import { UserEntityService } from '@/core/entities/UserEntityService.js';
 | 
			
		||||
import { DriveFileEntityService } from '@/core/entities/DriveFileEntityService.js';
 | 
			
		||||
import type { MiUserKeypair } from '@/models/UserKeypair.js';
 | 
			
		||||
import type { UsersRepository, UserProfilesRepository, NotesRepository, DriveFilesRepository, PollsRepository } from '@/models/_.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { CustomEmojiService } from '@/core/CustomEmojiService.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -31,6 +30,7 @@ import { JsonLdService } from './JsonLdService.js';
 | 
			
		|||
import { ApMfmService } from './ApMfmService.js';
 | 
			
		||||
import { CONTEXT } from './misc/contexts.js';
 | 
			
		||||
import type { IAccept, IActivity, IAdd, IAnnounce, IApDocument, IApEmoji, IApHashtag, IApImage, IApMention, IBlock, ICreate, IDelete, IFlag, IFollow, IKey, ILike, IMove, IObject, IPost, IQuestion, IReject, IRemove, ITombstone, IUndo, IUpdate } from './type.js';
 | 
			
		||||
import type { PrivateKeyWithPem } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class ApRendererService {
 | 
			
		||||
| 
						 | 
				
			
			@ -251,15 +251,15 @@ export class ApRendererService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public renderKey(user: MiLocalUser, key: MiUserKeypair, postfix?: string): IKey {
 | 
			
		||||
	public renderKey(user: MiLocalUser, publicKey: string, postfix?: string): IKey {
 | 
			
		||||
		return {
 | 
			
		||||
			id: `${this.config.url}/users/${user.id}${postfix ?? '/publickey'}`,
 | 
			
		||||
			id: `${this.userEntityService.genLocalUserUri(user.id)}${postfix ?? '/publickey'}`,
 | 
			
		||||
			type: 'Key',
 | 
			
		||||
			owner: this.userEntityService.genLocalUserUri(user.id),
 | 
			
		||||
			publicKeyPem: createPublicKey(key.publicKey).export({
 | 
			
		||||
			publicKeyPem: createPublicKey(publicKey).export({
 | 
			
		||||
				type: 'spki',
 | 
			
		||||
				format: 'pem',
 | 
			
		||||
			}),
 | 
			
		||||
			}) as string,
 | 
			
		||||
		};
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -499,7 +499,10 @@ export class ApRendererService {
 | 
			
		|||
			tag,
 | 
			
		||||
			manuallyApprovesFollowers: user.isLocked,
 | 
			
		||||
			discoverable: user.isExplorable,
 | 
			
		||||
			publicKey: this.renderKey(user, keypair, '#main-key'),
 | 
			
		||||
			publicKey: this.renderKey(user, keypair.publicKey, '#main-key'),
 | 
			
		||||
			additionalPublicKeys: [
 | 
			
		||||
				...(keypair.ed25519PublicKey ? [this.renderKey(user, keypair.ed25519PublicKey, '#ed25519-key')] : []),
 | 
			
		||||
			],
 | 
			
		||||
			isCat: user.isCat,
 | 
			
		||||
			attachment: attachment.length ? attachment : undefined,
 | 
			
		||||
		};
 | 
			
		||||
| 
						 | 
				
			
			@ -622,12 +625,10 @@ export class ApRendererService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async attachLdSignature(activity: any, user: { id: MiUser['id']; host: null; }): Promise<IActivity> {
 | 
			
		||||
		const keypair = await this.userKeypairService.getUserKeypair(user.id);
 | 
			
		||||
 | 
			
		||||
	public async attachLdSignature(activity: any, key: PrivateKeyWithPem): Promise<IActivity> {
 | 
			
		||||
		const jsonLd = this.jsonLdService.use();
 | 
			
		||||
		jsonLd.debug = false;
 | 
			
		||||
		activity = await jsonLd.signRsaSignature2017(activity, keypair.privateKey, `${this.config.url}/users/${user.id}#main-key`);
 | 
			
		||||
		activity = await jsonLd.signRsaSignature2017(activity, key.privateKeyPem, key.keyId);
 | 
			
		||||
 | 
			
		||||
		return activity;
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,9 +3,9 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import * as crypto from 'node:crypto';
 | 
			
		||||
import { URL } from 'node:url';
 | 
			
		||||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import { genRFC3230DigestHeader, signAsDraftToRequest } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import type { Config } from '@/config.js';
 | 
			
		||||
import type { MiUser } from '@/models/User.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -15,122 +15,61 @@ import { LoggerService } from '@/core/LoggerService.js';
 | 
			
		|||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import type Logger from '@/logger.js';
 | 
			
		||||
import { validateContentTypeSetAsActivityPub } from '@/core/activitypub/misc/validator.js';
 | 
			
		||||
import type { PrivateKeyWithPem, PrivateKey } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
type Request = {
 | 
			
		||||
	url: string;
 | 
			
		||||
	method: string;
 | 
			
		||||
	headers: Record<string, string>;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
type Signed = {
 | 
			
		||||
	request: Request;
 | 
			
		||||
	signingString: string;
 | 
			
		||||
	signature: string;
 | 
			
		||||
	signatureHeader: string;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
type PrivateKey = {
 | 
			
		||||
	privateKeyPem: string;
 | 
			
		||||
	keyId: string;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
export class ApRequestCreator {
 | 
			
		||||
	static createSignedPost(args: { key: PrivateKey, url: string, body: string, digest?: string, additionalHeaders: Record<string, string> }): Signed {
 | 
			
		||||
export async function createSignedPost(args: { level: string; key: PrivateKey; url: string; body: string; digest?: string, additionalHeaders: Record<string, string> }) {
 | 
			
		||||
	const u = new URL(args.url);
 | 
			
		||||
		const digestHeader = args.digest ?? this.createDigest(args.body);
 | 
			
		||||
 | 
			
		||||
		const request: Request = {
 | 
			
		||||
	const request = {
 | 
			
		||||
		url: u.href,
 | 
			
		||||
		method: 'POST',
 | 
			
		||||
			headers: this.#objectAssignWithLcKey({
 | 
			
		||||
		headers: {
 | 
			
		||||
			'Date': new Date().toUTCString(),
 | 
			
		||||
			'Host': u.host,
 | 
			
		||||
			'Content-Type': 'application/activity+json',
 | 
			
		||||
				'Digest': digestHeader,
 | 
			
		||||
			}, args.additionalHeaders),
 | 
			
		||||
			...args.additionalHeaders,
 | 
			
		||||
		} as Record<string, string>,
 | 
			
		||||
	};
 | 
			
		||||
 | 
			
		||||
		const result = this.#signToRequest(request, args.key, ['(request-target)', 'date', 'host', 'digest']);
 | 
			
		||||
	// TODO: httpMessageSignaturesImplementationLevelによって新規格で通信をするようにする
 | 
			
		||||
	const digestHeader = args.digest ?? await genRFC3230DigestHeader(args.body, 'SHA-256');
 | 
			
		||||
	request.headers['Digest'] = digestHeader;
 | 
			
		||||
 | 
			
		||||
	const result = await signAsDraftToRequest(
 | 
			
		||||
		request,
 | 
			
		||||
		args.key,
 | 
			
		||||
		['(request-target)', 'date', 'host', 'digest'],
 | 
			
		||||
	);
 | 
			
		||||
 | 
			
		||||
	return {
 | 
			
		||||
		request,
 | 
			
		||||
			signingString: result.signingString,
 | 
			
		||||
			signature: result.signature,
 | 
			
		||||
			signatureHeader: result.signatureHeader,
 | 
			
		||||
		...result,
 | 
			
		||||
	};
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
	static createDigest(body: string) {
 | 
			
		||||
		return `SHA-256=${crypto.createHash('sha256').update(body).digest('base64')}`;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	static createSignedGet(args: { key: PrivateKey, url: string, additionalHeaders: Record<string, string> }): Signed {
 | 
			
		||||
export async function createSignedGet(args: { level: string; key: PrivateKey; url: string; additionalHeaders: Record<string, string> }) {
 | 
			
		||||
	const u = new URL(args.url);
 | 
			
		||||
 | 
			
		||||
		const request: Request = {
 | 
			
		||||
	const request = {
 | 
			
		||||
		url: u.href,
 | 
			
		||||
		method: 'GET',
 | 
			
		||||
			headers: this.#objectAssignWithLcKey({
 | 
			
		||||
		headers: {
 | 
			
		||||
			'Accept': 'application/activity+json, application/ld+json; profile="https://www.w3.org/ns/activitystreams"',
 | 
			
		||||
			'Date': new Date().toUTCString(),
 | 
			
		||||
			'Host': new URL(args.url).host,
 | 
			
		||||
			}, args.additionalHeaders),
 | 
			
		||||
			...args.additionalHeaders,
 | 
			
		||||
		} as Record<string, string>,
 | 
			
		||||
	};
 | 
			
		||||
 | 
			
		||||
		const result = this.#signToRequest(request, args.key, ['(request-target)', 'date', 'host', 'accept']);
 | 
			
		||||
	// TODO: httpMessageSignaturesImplementationLevelによって新規格で通信をするようにする
 | 
			
		||||
	const result = await signAsDraftToRequest(
 | 
			
		||||
		request,
 | 
			
		||||
		args.key,
 | 
			
		||||
		['(request-target)', 'date', 'host', 'accept'],
 | 
			
		||||
	);
 | 
			
		||||
 | 
			
		||||
	return {
 | 
			
		||||
		request,
 | 
			
		||||
			signingString: result.signingString,
 | 
			
		||||
			signature: result.signature,
 | 
			
		||||
			signatureHeader: result.signatureHeader,
 | 
			
		||||
		...result,
 | 
			
		||||
	};
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	static #signToRequest(request: Request, key: PrivateKey, includeHeaders: string[]): Signed {
 | 
			
		||||
		const signingString = this.#genSigningString(request, includeHeaders);
 | 
			
		||||
		const signature = crypto.sign('sha256', Buffer.from(signingString), key.privateKeyPem).toString('base64');
 | 
			
		||||
		const signatureHeader = `keyId="${key.keyId}",algorithm="rsa-sha256",headers="${includeHeaders.join(' ')}",signature="${signature}"`;
 | 
			
		||||
 | 
			
		||||
		request.headers = this.#objectAssignWithLcKey(request.headers, {
 | 
			
		||||
			Signature: signatureHeader,
 | 
			
		||||
		});
 | 
			
		||||
		// node-fetch will generate this for us. if we keep 'Host', it won't change with redirects!
 | 
			
		||||
		delete request.headers['host'];
 | 
			
		||||
 | 
			
		||||
		return {
 | 
			
		||||
			request,
 | 
			
		||||
			signingString,
 | 
			
		||||
			signature,
 | 
			
		||||
			signatureHeader,
 | 
			
		||||
		};
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	static #genSigningString(request: Request, includeHeaders: string[]): string {
 | 
			
		||||
		request.headers = this.#lcObjectKey(request.headers);
 | 
			
		||||
 | 
			
		||||
		const results: string[] = [];
 | 
			
		||||
 | 
			
		||||
		for (const key of includeHeaders.map(x => x.toLowerCase())) {
 | 
			
		||||
			if (key === '(request-target)') {
 | 
			
		||||
				results.push(`(request-target): ${request.method.toLowerCase()} ${new URL(request.url).pathname}`);
 | 
			
		||||
			} else {
 | 
			
		||||
				results.push(`${key}: ${request.headers[key]}`);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return results.join('\n');
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	static #lcObjectKey(src: Record<string, string>): Record<string, string> {
 | 
			
		||||
		const dst: Record<string, string> = {};
 | 
			
		||||
		for (const key of Object.keys(src).filter(x => x !== '__proto__' && typeof src[x] === 'string')) dst[key.toLowerCase()] = src[key];
 | 
			
		||||
		return dst;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	static #objectAssignWithLcKey(a: Record<string, string>, b: Record<string, string>): Record<string, string> {
 | 
			
		||||
		return Object.assign(this.#lcObjectKey(a), this.#lcObjectKey(b));
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
| 
						 | 
				
			
			@ -150,21 +89,28 @@ export class ApRequestService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async signedPost(user: { id: MiUser['id'] }, url: string, object: unknown, digest?: string): Promise<void> {
 | 
			
		||||
	public async signedPost(user: { id: MiUser['id'] }, url: string, object: unknown, level: string, digest?: string, key?: PrivateKeyWithPem): Promise<void> {
 | 
			
		||||
		const body = typeof object === 'string' ? object : JSON.stringify(object);
 | 
			
		||||
 | 
			
		||||
		const keypair = await this.userKeypairService.getUserKeypair(user.id);
 | 
			
		||||
 | 
			
		||||
		const req = ApRequestCreator.createSignedPost({
 | 
			
		||||
			key: {
 | 
			
		||||
				privateKeyPem: keypair.privateKey,
 | 
			
		||||
				keyId: `${this.config.url}/users/${user.id}#main-key`,
 | 
			
		||||
			},
 | 
			
		||||
		const keyFetched = await this.userKeypairService.getLocalUserPrivateKey(key ?? user.id, level);
 | 
			
		||||
		const req = await createSignedPost({
 | 
			
		||||
			level,
 | 
			
		||||
			key: keyFetched,
 | 
			
		||||
			url,
 | 
			
		||||
			body,
 | 
			
		||||
			digest,
 | 
			
		||||
			additionalHeaders: {
 | 
			
		||||
				'User-Agent': this.config.userAgent,
 | 
			
		||||
			},
 | 
			
		||||
			digest,
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		// node-fetch will generate this for us. if we keep 'Host', it won't change with redirects!
 | 
			
		||||
		delete req.request.headers['Host'];
 | 
			
		||||
 | 
			
		||||
		this.logger.debug('create signed post', {
 | 
			
		||||
			version: 'draft',
 | 
			
		||||
			level,
 | 
			
		||||
			url,
 | 
			
		||||
			keyId: keyFetched.keyId,
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		await this.httpRequestService.send(url, {
 | 
			
		||||
| 
						 | 
				
			
			@ -180,19 +126,27 @@ export class ApRequestService {
 | 
			
		|||
	 * @param url URL to fetch
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async signedGet(url: string, user: { id: MiUser['id'] }): Promise<unknown> {
 | 
			
		||||
		const keypair = await this.userKeypairService.getUserKeypair(user.id);
 | 
			
		||||
 | 
			
		||||
		const req = ApRequestCreator.createSignedGet({
 | 
			
		||||
			key: {
 | 
			
		||||
				privateKeyPem: keypair.privateKey,
 | 
			
		||||
				keyId: `${this.config.url}/users/${user.id}#main-key`,
 | 
			
		||||
			},
 | 
			
		||||
	public async signedGet(url: string, user: { id: MiUser['id'] }, level: string): Promise<unknown> {
 | 
			
		||||
		const key = await this.userKeypairService.getLocalUserPrivateKey(user.id, level);
 | 
			
		||||
		const req = await createSignedGet({
 | 
			
		||||
			level,
 | 
			
		||||
			key,
 | 
			
		||||
			url,
 | 
			
		||||
			additionalHeaders: {
 | 
			
		||||
				'User-Agent': this.config.userAgent,
 | 
			
		||||
			},
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		// node-fetch will generate this for us. if we keep 'Host', it won't change with redirects!
 | 
			
		||||
		delete req.request.headers['Host'];
 | 
			
		||||
 | 
			
		||||
		this.logger.debug('create signed get', {
 | 
			
		||||
			version: 'draft',
 | 
			
		||||
			level,
 | 
			
		||||
			url,
 | 
			
		||||
			keyId: key.keyId,
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		const res = await this.httpRequestService.send(url, {
 | 
			
		||||
			method: req.request.method,
 | 
			
		||||
			headers: req.request.headers,
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -16,6 +16,7 @@ import { UtilityService } from '@/core/UtilityService.js';
 | 
			
		|||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import { LoggerService } from '@/core/LoggerService.js';
 | 
			
		||||
import type Logger from '@/logger.js';
 | 
			
		||||
import { FederatedInstanceService } from '@/core/FederatedInstanceService.js';
 | 
			
		||||
import { isCollectionOrOrderedCollection } from './type.js';
 | 
			
		||||
import { ApDbResolverService } from './ApDbResolverService.js';
 | 
			
		||||
import { ApRendererService } from './ApRendererService.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -41,6 +42,7 @@ export class Resolver {
 | 
			
		|||
		private httpRequestService: HttpRequestService,
 | 
			
		||||
		private apRendererService: ApRendererService,
 | 
			
		||||
		private apDbResolverService: ApDbResolverService,
 | 
			
		||||
		private federatedInstanceService: FederatedInstanceService,
 | 
			
		||||
		private loggerService: LoggerService,
 | 
			
		||||
		private recursionLimit = 100,
 | 
			
		||||
	) {
 | 
			
		||||
| 
						 | 
				
			
			@ -103,8 +105,10 @@ export class Resolver {
 | 
			
		|||
			this.user = await this.instanceActorService.getInstanceActor();
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const server = await this.federatedInstanceService.fetch(host);
 | 
			
		||||
 | 
			
		||||
		const object = (this.user
 | 
			
		||||
			? await this.apRequestService.signedGet(value, this.user) as IObject
 | 
			
		||||
			? await this.apRequestService.signedGet(value, this.user, server.httpMessageSignaturesImplementationLevel) as IObject
 | 
			
		||||
			: await this.httpRequestService.getActivityJson(value)) as IObject;
 | 
			
		||||
 | 
			
		||||
		if (
 | 
			
		||||
| 
						 | 
				
			
			@ -200,6 +204,7 @@ export class ApResolverService {
 | 
			
		|||
		private httpRequestService: HttpRequestService,
 | 
			
		||||
		private apRendererService: ApRendererService,
 | 
			
		||||
		private apDbResolverService: ApDbResolverService,
 | 
			
		||||
		private federatedInstanceService: FederatedInstanceService,
 | 
			
		||||
		private loggerService: LoggerService,
 | 
			
		||||
	) {
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -220,6 +225,7 @@ export class ApResolverService {
 | 
			
		|||
			this.httpRequestService,
 | 
			
		||||
			this.apRendererService,
 | 
			
		||||
			this.apDbResolverService,
 | 
			
		||||
			this.federatedInstanceService,
 | 
			
		||||
			this.loggerService,
 | 
			
		||||
		);
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -134,6 +134,7 @@ const security_v1 = {
 | 
			
		|||
		'privateKey': { '@id': 'sec:privateKey', '@type': '@id' },
 | 
			
		||||
		'privateKeyPem': 'sec:privateKeyPem',
 | 
			
		||||
		'publicKey': { '@id': 'sec:publicKey', '@type': '@id' },
 | 
			
		||||
		'additionalPublicKeys': { '@id': 'sec:publicKey', '@type': '@id' },
 | 
			
		||||
		'publicKeyBase58': 'sec:publicKeyBase58',
 | 
			
		||||
		'publicKeyPem': 'sec:publicKeyPem',
 | 
			
		||||
		'publicKeyWif': 'sec:publicKeyWif',
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,9 +3,10 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import { verify } from 'crypto';
 | 
			
		||||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import promiseLimit from 'promise-limit';
 | 
			
		||||
import { DataSource } from 'typeorm';
 | 
			
		||||
import { DataSource, In, Not } from 'typeorm';
 | 
			
		||||
import { ModuleRef } from '@nestjs/core';
 | 
			
		||||
import { DI } from '@/di-symbols.js';
 | 
			
		||||
import type { FollowingsRepository, InstancesRepository, UserProfilesRepository, UserPublickeysRepository, UsersRepository } from '@/models/_.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -39,6 +40,7 @@ import { MetaService } from '@/core/MetaService.js';
 | 
			
		|||
import { DriveFileEntityService } from '@/core/entities/DriveFileEntityService.js';
 | 
			
		||||
import type { AccountMoveService } from '@/core/AccountMoveService.js';
 | 
			
		||||
import { checkHttps } from '@/misc/check-https.js';
 | 
			
		||||
import { REMOTE_USER_CACHE_TTL, REMOTE_USER_MOVE_COOLDOWN } from '@/const.js';
 | 
			
		||||
import { getApId, getApType, getOneApHrefNullable, isActor, isCollection, isCollectionOrOrderedCollection, isPropertyValue } from '../type.js';
 | 
			
		||||
import { extractApHashtags } from './tag.js';
 | 
			
		||||
import type { OnModuleInit } from '@nestjs/common';
 | 
			
		||||
| 
						 | 
				
			
			@ -48,7 +50,7 @@ import type { ApResolverService, Resolver } from '../ApResolverService.js';
 | 
			
		|||
import type { ApLoggerService } from '../ApLoggerService.js';
 | 
			
		||||
// eslint-disable-next-line @typescript-eslint/consistent-type-imports
 | 
			
		||||
import type { ApImageService } from './ApImageService.js';
 | 
			
		||||
import type { IActor, IObject } from '../type.js';
 | 
			
		||||
import type { IActor, IKey, IObject } from '../type.js';
 | 
			
		||||
 | 
			
		||||
const nameLength = 128;
 | 
			
		||||
const summaryLength = 2048;
 | 
			
		||||
| 
						 | 
				
			
			@ -185,15 +187,40 @@ export class ApPersonService implements OnModuleInit {
 | 
			
		|||
		}
 | 
			
		||||
 | 
			
		||||
		if (x.publicKey) {
 | 
			
		||||
			if (typeof x.publicKey.id !== 'string') {
 | 
			
		||||
			const publicKeys = Array.isArray(x.publicKey) ? x.publicKey : [x.publicKey];
 | 
			
		||||
 | 
			
		||||
			for (const publicKey of publicKeys) {
 | 
			
		||||
				if (typeof publicKey.id !== 'string') {
 | 
			
		||||
					throw new Error('invalid Actor: publicKey.id is not a string');
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
			const publicKeyIdHost = this.punyHost(x.publicKey.id);
 | 
			
		||||
				const publicKeyIdHost = this.punyHost(publicKey.id);
 | 
			
		||||
				if (publicKeyIdHost !== expectHost) {
 | 
			
		||||
					throw new Error('invalid Actor: publicKey.id has different host');
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (x.additionalPublicKeys) {
 | 
			
		||||
			if (!x.publicKey) {
 | 
			
		||||
				throw new Error('invalid Actor: additionalPublicKeys is set but publicKey is not');
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if (!Array.isArray(x.additionalPublicKeys)) {
 | 
			
		||||
				throw new Error('invalid Actor: additionalPublicKeys is not an array');
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			for (const key of x.additionalPublicKeys) {
 | 
			
		||||
				if (typeof key.id !== 'string') {
 | 
			
		||||
					throw new Error('invalid Actor: additionalPublicKeys.id is not a string');
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				const keyIdHost = this.punyHost(key.id);
 | 
			
		||||
				if (keyIdHost !== expectHost) {
 | 
			
		||||
					throw new Error('invalid Actor: additionalPublicKeys.id has different host');
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return x;
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -228,6 +255,33 @@ export class ApPersonService implements OnModuleInit {
 | 
			
		|||
		return null;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * uriからUser(Person)をフェッチします。
 | 
			
		||||
	 *
 | 
			
		||||
	 * Misskeyに対象のPersonが登録されていればそれを返し、登録がなければnullを返します。
 | 
			
		||||
	 * また、TTLが0でない場合、TTLを過ぎていた場合はupdatePersonを実行します。
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	async fetchPersonWithRenewal(uri: string, TTL = REMOTE_USER_CACHE_TTL): Promise<MiLocalUser | MiRemoteUser | null> {
 | 
			
		||||
		const exist = await this.fetchPerson(uri);
 | 
			
		||||
		if (exist == null) return null;
 | 
			
		||||
 | 
			
		||||
		if (this.userEntityService.isRemoteUser(exist)) {
 | 
			
		||||
			if (TTL === 0 || exist.lastFetchedAt == null || Date.now() - exist.lastFetchedAt.getTime() > TTL) {
 | 
			
		||||
				this.logger.debug('fetchPersonWithRenewal: renew', { uri, TTL, lastFetchedAt: exist.lastFetchedAt });
 | 
			
		||||
				try {
 | 
			
		||||
					await this.updatePerson(exist.uri);
 | 
			
		||||
					return await this.fetchPerson(uri);
 | 
			
		||||
				} catch (err) {
 | 
			
		||||
					this.logger.error('error occurred while renewing user', { err });
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
			this.logger.debug('fetchPersonWithRenewal: use cache', { uri, TTL, lastFetchedAt: exist.lastFetchedAt });
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return exist;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	private async resolveAvatarAndBanner(user: MiRemoteUser, icon: any, image: any): Promise<Partial<Pick<MiRemoteUser, 'avatarId' | 'bannerId' | 'avatarUrl' | 'bannerUrl' | 'avatarBlurhash' | 'bannerBlurhash'>>> {
 | 
			
		||||
		if (user == null) throw new Error('failed to create user: user is null');
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -363,11 +417,15 @@ export class ApPersonService implements OnModuleInit {
 | 
			
		|||
				}));
 | 
			
		||||
 | 
			
		||||
				if (person.publicKey) {
 | 
			
		||||
					await transactionalEntityManager.save(new MiUserPublickey({
 | 
			
		||||
						userId: user.id,
 | 
			
		||||
						keyId: person.publicKey.id,
 | 
			
		||||
						keyPem: person.publicKey.publicKeyPem,
 | 
			
		||||
					}));
 | 
			
		||||
					const publicKeys = new Map<string, IKey>();
 | 
			
		||||
					(person.additionalPublicKeys ?? []).forEach(key => publicKeys.set(key.id, key));
 | 
			
		||||
					(Array.isArray(person.publicKey) ? person.publicKey : [person.publicKey]).forEach(key => publicKeys.set(key.id, key));
 | 
			
		||||
 | 
			
		||||
					await transactionalEntityManager.save(Array.from(publicKeys.values(), key => new MiUserPublickey({
 | 
			
		||||
						keyId: key.id,
 | 
			
		||||
						userId: user!.id,
 | 
			
		||||
						keyPem: key.publicKeyPem,
 | 
			
		||||
					})));
 | 
			
		||||
				}
 | 
			
		||||
			});
 | 
			
		||||
		} catch (e) {
 | 
			
		||||
| 
						 | 
				
			
			@ -513,11 +571,29 @@ export class ApPersonService implements OnModuleInit {
 | 
			
		|||
		// Update user
 | 
			
		||||
		await this.usersRepository.update(exist.id, updates);
 | 
			
		||||
 | 
			
		||||
		try {
 | 
			
		||||
			// Deleteアクティビティ受信時にもここが走ってsaveがuserforeign key制約エラーを吐くことがある
 | 
			
		||||
			// とりあえずtry-catchで囲っておく
 | 
			
		||||
			const publicKeys = new Map<string, IKey>();
 | 
			
		||||
			if (person.publicKey) {
 | 
			
		||||
			await this.userPublickeysRepository.update({ userId: exist.id }, {
 | 
			
		||||
				keyId: person.publicKey.id,
 | 
			
		||||
				keyPem: person.publicKey.publicKeyPem,
 | 
			
		||||
				(person.additionalPublicKeys ?? []).forEach(key => publicKeys.set(key.id, key));
 | 
			
		||||
				(Array.isArray(person.publicKey) ? person.publicKey : [person.publicKey]).forEach(key => publicKeys.set(key.id, key));
 | 
			
		||||
 | 
			
		||||
				await this.userPublickeysRepository.save(Array.from(publicKeys.values(), key => ({
 | 
			
		||||
					keyId: key.id,
 | 
			
		||||
					userId: exist.id,
 | 
			
		||||
					keyPem: key.publicKeyPem,
 | 
			
		||||
				})));
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			this.userPublickeysRepository.delete({
 | 
			
		||||
				keyId: Not(In(Array.from(publicKeys.keys()))),
 | 
			
		||||
				userId: exist.id,
 | 
			
		||||
			}).catch(err => {
 | 
			
		||||
				this.logger.error('something happened while deleting remote user public keys:', { userId: exist.id, err });
 | 
			
		||||
			});
 | 
			
		||||
		} catch (err) {
 | 
			
		||||
			this.logger.error('something happened while updating remote user public keys:', { userId: exist.id, err });
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		let _description: string | null = null;
 | 
			
		||||
| 
						 | 
				
			
			@ -559,7 +635,7 @@ export class ApPersonService implements OnModuleInit {
 | 
			
		|||
			exist.movedAt == null ||
 | 
			
		||||
			// 以前のmovingから14日以上経過した場合のみ移行処理を許可
 | 
			
		||||
			// (Mastodonのクールダウン期間は30日だが若干緩めに設定しておく)
 | 
			
		||||
			exist.movedAt.getTime() + 1000 * 60 * 60 * 24 * 14 < updated.movedAt.getTime()
 | 
			
		||||
			exist.movedAt.getTime() + REMOTE_USER_MOVE_COOLDOWN < updated.movedAt.getTime()
 | 
			
		||||
		)) {
 | 
			
		||||
			this.logger.info(`Start to process Move of @${updated.username}@${updated.host} (${uri})`);
 | 
			
		||||
			return this.processRemoteMove(updated, movePreventUris)
 | 
			
		||||
| 
						 | 
				
			
			@ -582,9 +658,9 @@ export class ApPersonService implements OnModuleInit {
 | 
			
		|||
	 * リモートサーバーからフェッチしてMisskeyに登録しそれを返します。
 | 
			
		||||
	 */
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async resolvePerson(uri: string, resolver?: Resolver): Promise<MiLocalUser | MiRemoteUser> {
 | 
			
		||||
	public async resolvePerson(uri: string, resolver?: Resolver, withRenewal = false): Promise<MiLocalUser | MiRemoteUser> {
 | 
			
		||||
		//#region このサーバーに既に登録されていたらそれを返す
 | 
			
		||||
		const exist = await this.fetchPerson(uri);
 | 
			
		||||
		const exist = withRenewal ? await this.fetchPersonWithRenewal(uri) : await this.fetchPerson(uri);
 | 
			
		||||
		if (exist) return exist;
 | 
			
		||||
		//#endregion
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -55,7 +55,7 @@ export function getOneApId(value: ApObject): string {
 | 
			
		|||
export function getApId(value: string | IObject): string {
 | 
			
		||||
	if (typeof value === 'string') return value;
 | 
			
		||||
	if (typeof value.id === 'string') return value.id;
 | 
			
		||||
	throw new Error('cannot detemine id');
 | 
			
		||||
	throw new Error('cannot determine id');
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
| 
						 | 
				
			
			@ -169,10 +169,8 @@ export interface IActor extends IObject {
 | 
			
		|||
	discoverable?: boolean;
 | 
			
		||||
	inbox: string;
 | 
			
		||||
	sharedInbox?: string;	// 後方互換性のため
 | 
			
		||||
	publicKey?: {
 | 
			
		||||
		id: string;
 | 
			
		||||
		publicKeyPem: string;
 | 
			
		||||
	};
 | 
			
		||||
	publicKey?: IKey | IKey[];
 | 
			
		||||
	additionalPublicKeys?: IKey[];
 | 
			
		||||
	followers?: string | ICollection | IOrderedCollection;
 | 
			
		||||
	following?: string | ICollection | IOrderedCollection;
 | 
			
		||||
	featured?: string | IOrderedCollection;
 | 
			
		||||
| 
						 | 
				
			
			@ -236,8 +234,9 @@ export const isEmoji = (object: IObject): object is IApEmoji =>
 | 
			
		|||
 | 
			
		||||
export interface IKey extends IObject {
 | 
			
		||||
	type: 'Key';
 | 
			
		||||
	id: string;
 | 
			
		||||
	owner: string;
 | 
			
		||||
	publicKeyPem: string | Buffer;
 | 
			
		||||
	publicKeyPem: string;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
export interface IApDocument extends IObject {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -56,6 +56,7 @@ export class InstanceEntityService {
 | 
			
		|||
			infoUpdatedAt: instance.infoUpdatedAt ? instance.infoUpdatedAt.toISOString() : null,
 | 
			
		||||
			latestRequestReceivedAt: instance.latestRequestReceivedAt ? instance.latestRequestReceivedAt.toISOString() : null,
 | 
			
		||||
			moderationNote: iAmModerator ? instance.moderationNote : null,
 | 
			
		||||
			httpMessageSignaturesImplementationLevel: instance.httpMessageSignaturesImplementationLevel,
 | 
			
		||||
		};
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -195,6 +195,9 @@ export class MemoryKVCache<T> {
 | 
			
		|||
	private lifetime: number;
 | 
			
		||||
	private gcIntervalHandle: NodeJS.Timeout;
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * @param lifetime キャッシュの生存期間 (ms)
 | 
			
		||||
	 */
 | 
			
		||||
	constructor(lifetime: MemoryKVCache<never>['lifetime']) {
 | 
			
		||||
		this.cache = new Map();
 | 
			
		||||
		this.lifetime = lifetime;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,39 +3,14 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import * as crypto from 'node:crypto';
 | 
			
		||||
import * as util from 'node:util';
 | 
			
		||||
import { genEd25519KeyPair, genRsaKeyPair } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
const generateKeyPair = util.promisify(crypto.generateKeyPair);
 | 
			
		||||
 | 
			
		||||
export async function genRsaKeyPair(modulusLength = 2048) {
 | 
			
		||||
	return await generateKeyPair('rsa', {
 | 
			
		||||
		modulusLength,
 | 
			
		||||
		publicKeyEncoding: {
 | 
			
		||||
			type: 'spki',
 | 
			
		||||
			format: 'pem',
 | 
			
		||||
		},
 | 
			
		||||
		privateKeyEncoding: {
 | 
			
		||||
			type: 'pkcs8',
 | 
			
		||||
			format: 'pem',
 | 
			
		||||
			cipher: undefined,
 | 
			
		||||
			passphrase: undefined,
 | 
			
		||||
		},
 | 
			
		||||
	});
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
export async function genEcKeyPair(namedCurve: 'prime256v1' | 'secp384r1' | 'secp521r1' | 'curve25519' = 'prime256v1') {
 | 
			
		||||
	return await generateKeyPair('ec', {
 | 
			
		||||
		namedCurve,
 | 
			
		||||
		publicKeyEncoding: {
 | 
			
		||||
			type: 'spki',
 | 
			
		||||
			format: 'pem',
 | 
			
		||||
		},
 | 
			
		||||
		privateKeyEncoding: {
 | 
			
		||||
			type: 'pkcs8',
 | 
			
		||||
			format: 'pem',
 | 
			
		||||
			cipher: undefined,
 | 
			
		||||
			passphrase: undefined,
 | 
			
		||||
		},
 | 
			
		||||
	});
 | 
			
		||||
export async function genRSAAndEd25519KeyPair(rsaModulusLength = 4096) {
 | 
			
		||||
	const [rsa, ed25519] = await Promise.all([genRsaKeyPair(rsaModulusLength), genEd25519KeyPair()]);
 | 
			
		||||
	return {
 | 
			
		||||
		publicKey: rsa.publicKey,
 | 
			
		||||
		privateKey: rsa.privateKey,
 | 
			
		||||
		ed25519PublicKey: ed25519.publicKey,
 | 
			
		||||
		ed25519PrivateKey: ed25519.privateKey,
 | 
			
		||||
	};
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -158,4 +158,9 @@ export class MiInstance {
 | 
			
		|||
		length: 16384, default: '',
 | 
			
		||||
	})
 | 
			
		||||
	public moderationNote: string;
 | 
			
		||||
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 16, default: '00', nullable: false,
 | 
			
		||||
	})
 | 
			
		||||
	public httpMessageSignaturesImplementationLevel: string;
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,7 +3,7 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import { PrimaryColumn, Entity, JoinColumn, Column, OneToOne } from 'typeorm';
 | 
			
		||||
import { PrimaryColumn, Entity, JoinColumn, Column, ManyToOne } from 'typeorm';
 | 
			
		||||
import { id } from './util/id.js';
 | 
			
		||||
import { MiUser } from './User.js';
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -12,22 +12,42 @@ export class MiUserKeypair {
 | 
			
		|||
	@PrimaryColumn(id())
 | 
			
		||||
	public userId: MiUser['id'];
 | 
			
		||||
 | 
			
		||||
	@OneToOne(type => MiUser, {
 | 
			
		||||
	@ManyToOne(type => MiUser, {
 | 
			
		||||
		onDelete: 'CASCADE',
 | 
			
		||||
	})
 | 
			
		||||
	@JoinColumn()
 | 
			
		||||
	public user: MiUser | null;
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * RSA public key
 | 
			
		||||
	 */
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 4096,
 | 
			
		||||
	})
 | 
			
		||||
	public publicKey: string;
 | 
			
		||||
 | 
			
		||||
	/**
 | 
			
		||||
	 * RSA private key
 | 
			
		||||
	 */
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 4096,
 | 
			
		||||
	})
 | 
			
		||||
	public privateKey: string;
 | 
			
		||||
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 128,
 | 
			
		||||
		nullable: true,
 | 
			
		||||
		default: null,
 | 
			
		||||
	})
 | 
			
		||||
	public ed25519PublicKey: string | null;
 | 
			
		||||
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 128,
 | 
			
		||||
		nullable: true,
 | 
			
		||||
		default: null,
 | 
			
		||||
	})
 | 
			
		||||
	public ed25519PrivateKey: string | null;
 | 
			
		||||
 | 
			
		||||
	constructor(data: Partial<MiUserKeypair>) {
 | 
			
		||||
		if (data == null) return;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -9,7 +9,13 @@ import { MiUser } from './User.js';
 | 
			
		|||
 | 
			
		||||
@Entity('user_publickey')
 | 
			
		||||
export class MiUserPublickey {
 | 
			
		||||
	@PrimaryColumn(id())
 | 
			
		||||
	@PrimaryColumn('varchar', {
 | 
			
		||||
		length: 256,
 | 
			
		||||
	})
 | 
			
		||||
	public keyId: string;
 | 
			
		||||
 | 
			
		||||
	@Index()
 | 
			
		||||
	@Column(id())
 | 
			
		||||
	public userId: MiUser['id'];
 | 
			
		||||
 | 
			
		||||
	@OneToOne(type => MiUser, {
 | 
			
		||||
| 
						 | 
				
			
			@ -18,12 +24,6 @@ export class MiUserPublickey {
 | 
			
		|||
	@JoinColumn()
 | 
			
		||||
	public user: MiUser | null;
 | 
			
		||||
 | 
			
		||||
	@Index({ unique: true })
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 256,
 | 
			
		||||
	})
 | 
			
		||||
	public keyId: string;
 | 
			
		||||
 | 
			
		||||
	@Column('varchar', {
 | 
			
		||||
		length: 4096,
 | 
			
		||||
	})
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -116,5 +116,9 @@ export const packedFederationInstanceSchema = {
 | 
			
		|||
			type: 'string',
 | 
			
		||||
			optional: true, nullable: true,
 | 
			
		||||
		},
 | 
			
		||||
		httpMessageSignaturesImplementationLevel: {
 | 
			
		||||
			type: 'string',
 | 
			
		||||
			optional: false, nullable: false,
 | 
			
		||||
		},
 | 
			
		||||
	},
 | 
			
		||||
} as const;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -250,9 +250,9 @@ export class QueueProcessorService implements OnApplicationShutdown {
 | 
			
		|||
			}, {
 | 
			
		||||
				...baseQueueOptions(this.config, QUEUE.DELIVER),
 | 
			
		||||
				autorun: false,
 | 
			
		||||
				concurrency: this.config.deliverJobConcurrency ?? 128,
 | 
			
		||||
				concurrency: this.config.deliverJobConcurrency ?? 16,
 | 
			
		||||
				limiter: {
 | 
			
		||||
					max: this.config.deliverJobPerSec ?? 128,
 | 
			
		||||
					max: this.config.deliverJobPerSec ?? 1024,
 | 
			
		||||
					duration: 1000,
 | 
			
		||||
				},
 | 
			
		||||
				settings: {
 | 
			
		||||
| 
						 | 
				
			
			@ -290,9 +290,9 @@ export class QueueProcessorService implements OnApplicationShutdown {
 | 
			
		|||
			}, {
 | 
			
		||||
				...baseQueueOptions(this.config, QUEUE.INBOX),
 | 
			
		||||
				autorun: false,
 | 
			
		||||
				concurrency: this.config.inboxJobConcurrency ?? 16,
 | 
			
		||||
				concurrency: this.config.inboxJobConcurrency ?? 4,
 | 
			
		||||
				limiter: {
 | 
			
		||||
					max: this.config.inboxJobPerSec ?? 32,
 | 
			
		||||
					max: this.config.inboxJobPerSec ?? 64,
 | 
			
		||||
					duration: 1000,
 | 
			
		||||
				},
 | 
			
		||||
				settings: {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -73,25 +73,33 @@ export class DeliverProcessorService {
 | 
			
		|||
		}
 | 
			
		||||
 | 
			
		||||
		try {
 | 
			
		||||
			await this.apRequestService.signedPost(job.data.user, job.data.to, job.data.content, job.data.digest);
 | 
			
		||||
			const _server = await this.federatedInstanceService.fetch(host);
 | 
			
		||||
			await this.fetchInstanceMetadataService.fetchInstanceMetadata(_server).then(() => {});
 | 
			
		||||
			const server = await this.federatedInstanceService.fetch(host);
 | 
			
		||||
 | 
			
		||||
			await this.apRequestService.signedPost(
 | 
			
		||||
				job.data.user,
 | 
			
		||||
				job.data.to,
 | 
			
		||||
				job.data.content,
 | 
			
		||||
				server.httpMessageSignaturesImplementationLevel,
 | 
			
		||||
				job.data.digest,
 | 
			
		||||
				job.data.privateKey,
 | 
			
		||||
			);
 | 
			
		||||
 | 
			
		||||
			// Update stats
 | 
			
		||||
			this.federatedInstanceService.fetch(host).then(i => {
 | 
			
		||||
				if (i.isNotResponding) {
 | 
			
		||||
					this.federatedInstanceService.update(i.id, {
 | 
			
		||||
			if (server.isNotResponding) {
 | 
			
		||||
				this.federatedInstanceService.update(server.id, {
 | 
			
		||||
					isNotResponding: false,
 | 
			
		||||
					notRespondingSince: null,
 | 
			
		||||
				});
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
				this.fetchInstanceMetadataService.fetchInstanceMetadata(i);
 | 
			
		||||
			this.apRequestChart.deliverSucc();
 | 
			
		||||
				this.federationChart.deliverd(i.host, true);
 | 
			
		||||
			this.federationChart.deliverd(server.host, true);
 | 
			
		||||
 | 
			
		||||
			if (meta.enableChartsForFederatedInstances) {
 | 
			
		||||
					this.instanceChart.requestSent(i.host, true);
 | 
			
		||||
				this.instanceChart.requestSent(server.host, true);
 | 
			
		||||
			}
 | 
			
		||||
			});
 | 
			
		||||
 | 
			
		||||
			return 'Success';
 | 
			
		||||
		} catch (res) {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -5,8 +5,8 @@
 | 
			
		|||
 | 
			
		||||
import { URL } from 'node:url';
 | 
			
		||||
import { Injectable } from '@nestjs/common';
 | 
			
		||||
import httpSignature from '@peertube/http-signature';
 | 
			
		||||
import * as Bull from 'bullmq';
 | 
			
		||||
import { verifyDraftSignature } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
import type Logger from '@/logger.js';
 | 
			
		||||
import { MetaService } from '@/core/MetaService.js';
 | 
			
		||||
import { FederatedInstanceService } from '@/core/FederatedInstanceService.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -20,6 +20,7 @@ import type { MiRemoteUser } from '@/models/User.js';
 | 
			
		|||
import type { MiUserPublickey } from '@/models/UserPublickey.js';
 | 
			
		||||
import { ApDbResolverService } from '@/core/activitypub/ApDbResolverService.js';
 | 
			
		||||
import { StatusError } from '@/misc/status-error.js';
 | 
			
		||||
import * as Acct from '@/misc/acct.js';
 | 
			
		||||
import { UtilityService } from '@/core/UtilityService.js';
 | 
			
		||||
import { ApPersonService } from '@/core/activitypub/models/ApPersonService.js';
 | 
			
		||||
import { JsonLdService } from '@/core/activitypub/JsonLdService.js';
 | 
			
		||||
| 
						 | 
				
			
			@ -52,8 +53,15 @@ export class InboxProcessorService {
 | 
			
		|||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	public async process(job: Bull.Job<InboxJobData>): Promise<string> {
 | 
			
		||||
		const signature = job.data.signature;	// HTTP-signature
 | 
			
		||||
		const signature = job.data.signature ?
 | 
			
		||||
			'version' in job.data.signature ? job.data.signature.value : job.data.signature
 | 
			
		||||
			: null;
 | 
			
		||||
		if (Array.isArray(signature)) {
 | 
			
		||||
			// RFC 9401はsignatureが配列になるが、とりあえずエラーにする
 | 
			
		||||
			throw new Error('signature is array');
 | 
			
		||||
		}
 | 
			
		||||
		let activity = job.data.activity;
 | 
			
		||||
		let actorUri = getApId(activity.actor);
 | 
			
		||||
 | 
			
		||||
		//#region Log
 | 
			
		||||
		const info = Object.assign({}, activity);
 | 
			
		||||
| 
						 | 
				
			
			@ -61,7 +69,7 @@ export class InboxProcessorService {
 | 
			
		|||
		this.logger.debug(JSON.stringify(info, null, 2));
 | 
			
		||||
		//#endregion
 | 
			
		||||
 | 
			
		||||
		const host = this.utilityService.toPuny(new URL(signature.keyId).hostname);
 | 
			
		||||
		const host = this.utilityService.toPuny(new URL(actorUri).hostname);
 | 
			
		||||
 | 
			
		||||
		// ブロックしてたら中断
 | 
			
		||||
		const meta = await this.metaService.fetch();
 | 
			
		||||
| 
						 | 
				
			
			@ -69,21 +77,12 @@ export class InboxProcessorService {
 | 
			
		|||
			return `Blocked request: ${host}`;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		const keyIdLower = signature.keyId.toLowerCase();
 | 
			
		||||
		if (keyIdLower.startsWith('acct:')) {
 | 
			
		||||
			return `Old keyId is no longer supported. ${keyIdLower}`;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// HTTP-Signature keyIdを元にDBから取得
 | 
			
		||||
		let authUser: {
 | 
			
		||||
			user: MiRemoteUser;
 | 
			
		||||
			key: MiUserPublickey | null;
 | 
			
		||||
		} | null = await this.apDbResolverService.getAuthUserFromKeyId(signature.keyId);
 | 
			
		||||
		let authUser: Awaited<ReturnType<typeof this.apDbResolverService.getAuthUserFromApId>> = null;
 | 
			
		||||
		let httpSignatureIsValid = null as boolean | null;
 | 
			
		||||
 | 
			
		||||
		// keyIdでわからなければ、activity.actorを元にDBから取得 || activity.actorを元にリモートから取得
 | 
			
		||||
		if (authUser == null) {
 | 
			
		||||
		try {
 | 
			
		||||
				authUser = await this.apDbResolverService.getAuthUserFromApId(getApId(activity.actor));
 | 
			
		||||
			authUser = await this.apDbResolverService.getAuthUserFromApId(actorUri, signature?.keyId);
 | 
			
		||||
		} catch (err) {
 | 
			
		||||
			// 対象が4xxならスキップ
 | 
			
		||||
			if (err instanceof StatusError) {
 | 
			
		||||
| 
						 | 
				
			
			@ -93,45 +92,61 @@ export class InboxProcessorService {
 | 
			
		|||
				throw new Error(`Error in actor ${activity.actor} - ${err.statusCode}`);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// それでもわからなければ終了
 | 
			
		||||
		if (authUser == null) {
 | 
			
		||||
		// authUser.userがnullならスキップ
 | 
			
		||||
		if (authUser != null && authUser.user == null) {
 | 
			
		||||
			throw new Bull.UnrecoverableError('skip: failed to resolve user');
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// publicKey がなくても終了
 | 
			
		||||
		if (authUser.key == null) {
 | 
			
		||||
			throw new Bull.UnrecoverableError('skip: failed to resolve user publicKey');
 | 
			
		||||
		if (signature != null && authUser != null) {
 | 
			
		||||
			if (signature.keyId.toLowerCase().startsWith('acct:')) {
 | 
			
		||||
				this.logger.warn(`Old keyId is no longer supported. lowerKeyId=${signature.keyId.toLowerCase()}`);
 | 
			
		||||
			} else if (authUser.key != null) {
 | 
			
		||||
				// keyがなかったらLD Signatureで検証するべき
 | 
			
		||||
				// HTTP-Signatureの検証
 | 
			
		||||
				const errorLogger = (ms: any) => this.logger.error(ms);
 | 
			
		||||
				httpSignatureIsValid = await verifyDraftSignature(signature, authUser.key.keyPem, errorLogger);
 | 
			
		||||
				this.logger.debug('Inbox message validation: ', {
 | 
			
		||||
					userId: authUser.user.id,
 | 
			
		||||
					userAcct: Acct.toString(authUser.user),
 | 
			
		||||
					parsedKeyId: signature.keyId,
 | 
			
		||||
					foundKeyId: authUser.key.keyId,
 | 
			
		||||
					httpSignatureValid: httpSignatureIsValid,
 | 
			
		||||
				});
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// HTTP-Signatureの検証
 | 
			
		||||
		const httpSignatureValidated = httpSignature.verifySignature(signature, authUser.key.keyPem);
 | 
			
		||||
 | 
			
		||||
		// また、signatureのsignerは、activity.actorと一致する必要がある
 | 
			
		||||
		if (!httpSignatureValidated || authUser.user.uri !== activity.actor) {
 | 
			
		||||
		if (
 | 
			
		||||
			authUser == null ||
 | 
			
		||||
			httpSignatureIsValid !== true ||
 | 
			
		||||
			authUser.user.uri !== actorUri // 一応チェック
 | 
			
		||||
		) {
 | 
			
		||||
			// 一致しなくても、でもLD-Signatureがありそうならそっちも見る
 | 
			
		||||
			const ldSignature = activity.signature;
 | 
			
		||||
			if (ldSignature) {
 | 
			
		||||
 | 
			
		||||
			if (ldSignature && ldSignature.creator) {
 | 
			
		||||
				if (ldSignature.type !== 'RsaSignature2017') {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: unsupported LD-signature type ${ldSignature.type}`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// ldSignature.creator: https://example.oom/users/user#main-key
 | 
			
		||||
				// みたいになっててUserを引っ張れば公開キーも入ることを期待する
 | 
			
		||||
				if (ldSignature.creator) {
 | 
			
		||||
					const candicate = ldSignature.creator.replace(/#.*/, '');
 | 
			
		||||
					await this.apPersonService.resolvePerson(candicate).catch(() => null);
 | 
			
		||||
				if (ldSignature.creator.toLowerCase().startsWith('acct:')) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`old key not supported ${ldSignature.creator}`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// keyIdからLD-Signatureのユーザーを取得
 | 
			
		||||
				authUser = await this.apDbResolverService.getAuthUserFromKeyId(ldSignature.creator);
 | 
			
		||||
				authUser = await this.apDbResolverService.getAuthUserFromApId(actorUri, ldSignature.creator);
 | 
			
		||||
 | 
			
		||||
				if (authUser == null) {
 | 
			
		||||
					throw new Bull.UnrecoverableError('skip: LD-Signatureのユーザーが取得できませんでした');
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: LD-Signatureのactorとcreatorが一致しませんでした uri=${actorUri} creator=${ldSignature.creator}`);
 | 
			
		||||
				}
 | 
			
		||||
				if (authUser.user == null) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: LD-Signatureのユーザーが取得できませんでした uri=${actorUri} creator=${ldSignature.creator}`);
 | 
			
		||||
				}
 | 
			
		||||
				// 一応actorチェック
 | 
			
		||||
				if (authUser.user.uri !== actorUri) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: LD-Signature user(${authUser.user.uri}) !== activity.actor(${actorUri})`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				if (authUser.key == null) {
 | 
			
		||||
					throw new Bull.UnrecoverableError('skip: LD-SignatureのユーザーはpublicKeyを持っていませんでした');
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: LD-SignatureのユーザーはpublicKeyを持っていませんでした uri=${actorUri} creator=${ldSignature.creator}`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				const jsonLd = this.jsonLdService.use();
 | 
			
		||||
| 
						 | 
				
			
			@ -142,13 +157,27 @@ export class InboxProcessorService {
 | 
			
		|||
					throw new Bull.UnrecoverableError('skip: LD-Signatureの検証に失敗しました');
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// ブロックしてたら中断
 | 
			
		||||
				const ldHost = this.utilityService.extractDbHost(authUser.user.uri);
 | 
			
		||||
				if (this.utilityService.isBlockedHost(meta.blockedHosts, ldHost)) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`Blocked request: ${ldHost}`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// アクティビティを正規化
 | 
			
		||||
				// GHSA-2vxv-pv3m-3wvj
 | 
			
		||||
				delete activity.signature;
 | 
			
		||||
				try {
 | 
			
		||||
					activity = await jsonLd.compact(activity) as IActivity;
 | 
			
		||||
				} catch (e) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: failed to compact activity: ${e}`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// actorが正規化前後で一致しているか確認
 | 
			
		||||
				actorUri = getApId(activity.actor);
 | 
			
		||||
				if (authUser.user.uri !== actorUri) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: LD-Signature user(${authUser.user.uri}) !== activity(after normalization).actor(${actorUri})`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// TODO: 元のアクティビティと非互換な形に正規化される場合は転送をスキップする
 | 
			
		||||
				// https://github.com/mastodon/mastodon/blob/664b0ca/app/services/activitypub/process_collection_service.rb#L24-L29
 | 
			
		||||
				activity.signature = ldSignature;
 | 
			
		||||
| 
						 | 
				
			
			@ -158,19 +187,8 @@ export class InboxProcessorService {
 | 
			
		|||
				delete compactedInfo['@context'];
 | 
			
		||||
				this.logger.debug(`compacted: ${JSON.stringify(compactedInfo, null, 2)}`);
 | 
			
		||||
				//#endregion
 | 
			
		||||
 | 
			
		||||
				// もう一度actorチェック
 | 
			
		||||
				if (authUser.user.uri !== activity.actor) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`skip: LD-Signature user(${authUser.user.uri}) !== activity.actor(${activity.actor})`);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// ブロックしてたら中断
 | 
			
		||||
				const ldHost = this.utilityService.extractDbHost(authUser.user.uri);
 | 
			
		||||
				if (this.utilityService.isBlockedHost(meta.blockedHosts, ldHost)) {
 | 
			
		||||
					throw new Bull.UnrecoverableError(`Blocked request: ${ldHost}`);
 | 
			
		||||
				}
 | 
			
		||||
			} else {
 | 
			
		||||
				throw new Bull.UnrecoverableError(`skip: http-signature verification failed and no LD-Signature. keyId=${signature.keyId}`);
 | 
			
		||||
				throw new Bull.UnrecoverableError(`skip: http-signature verification failed and no LD-Signature. http_signature_keyId=${signature?.keyId}`);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -9,7 +9,24 @@ import type { MiNote } from '@/models/Note.js';
 | 
			
		|||
import type { MiUser } from '@/models/User.js';
 | 
			
		||||
import type { MiWebhook } from '@/models/Webhook.js';
 | 
			
		||||
import type { IActivity } from '@/core/activitypub/type.js';
 | 
			
		||||
import type httpSignature from '@peertube/http-signature';
 | 
			
		||||
import type { ParsedSignature, PrivateKeyWithPem } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * @peertube/http-signature 時代の古いデータにも対応しておく
 | 
			
		||||
 * TODO: 2026年ぐらいには消す
 | 
			
		||||
 */
 | 
			
		||||
export interface OldParsedSignature {
 | 
			
		||||
	scheme: 'Signature';
 | 
			
		||||
	params: {
 | 
			
		||||
		keyId: string;
 | 
			
		||||
		algorithm: string;
 | 
			
		||||
		headers: string[];
 | 
			
		||||
		signature: string;
 | 
			
		||||
	};
 | 
			
		||||
	signingString: string;
 | 
			
		||||
	algorithm: string;
 | 
			
		||||
	keyId: string;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
export type DeliverJobData = {
 | 
			
		||||
	/** Actor */
 | 
			
		||||
| 
						 | 
				
			
			@ -22,11 +39,13 @@ export type DeliverJobData = {
 | 
			
		|||
	to: string;
 | 
			
		||||
	/** whether it is sharedInbox */
 | 
			
		||||
	isSharedInbox: boolean;
 | 
			
		||||
	/** force to use main (rsa) key */
 | 
			
		||||
	privateKey?: PrivateKeyWithPem;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
export type InboxJobData = {
 | 
			
		||||
	activity: IActivity;
 | 
			
		||||
	signature: httpSignature.IParsedSignature;
 | 
			
		||||
	signature: ParsedSignature | OldParsedSignature | null;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
export type RelationshipJobData = {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -3,11 +3,10 @@
 | 
			
		|||
 * SPDX-License-Identifier: AGPL-3.0-only
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
import * as crypto from 'node:crypto';
 | 
			
		||||
import { IncomingMessage } from 'node:http';
 | 
			
		||||
import { Inject, Injectable } from '@nestjs/common';
 | 
			
		||||
import fastifyAccepts from '@fastify/accepts';
 | 
			
		||||
import httpSignature from '@peertube/http-signature';
 | 
			
		||||
import { verifyDigestHeader, parseRequestSignature } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
import { Brackets, In, IsNull, LessThan, Not } from 'typeorm';
 | 
			
		||||
import accepts from 'accepts';
 | 
			
		||||
import vary from 'vary';
 | 
			
		||||
| 
						 | 
				
			
			@ -31,12 +30,17 @@ import { IActivity } from '@/core/activitypub/type.js';
 | 
			
		|||
import { isQuote, isRenote } from '@/misc/is-renote.js';
 | 
			
		||||
import type { FastifyInstance, FastifyRequest, FastifyReply, FastifyPluginOptions, FastifyBodyParser } from 'fastify';
 | 
			
		||||
import type { FindOptionsWhere } from 'typeorm';
 | 
			
		||||
import { LoggerService } from '@/core/LoggerService.js';
 | 
			
		||||
import Logger from '@/logger.js';
 | 
			
		||||
 | 
			
		||||
const ACTIVITY_JSON = 'application/activity+json; charset=utf-8';
 | 
			
		||||
const LD_JSON = 'application/ld+json; profile="https://www.w3.org/ns/activitystreams"; charset=utf-8';
 | 
			
		||||
 | 
			
		||||
@Injectable()
 | 
			
		||||
export class ActivityPubServerService {
 | 
			
		||||
	private logger: Logger;
 | 
			
		||||
	private inboxLogger: Logger;
 | 
			
		||||
 | 
			
		||||
	constructor(
 | 
			
		||||
		@Inject(DI.config)
 | 
			
		||||
		private config: Config,
 | 
			
		||||
| 
						 | 
				
			
			@ -71,8 +75,11 @@ export class ActivityPubServerService {
 | 
			
		|||
		private queueService: QueueService,
 | 
			
		||||
		private userKeypairService: UserKeypairService,
 | 
			
		||||
		private queryService: QueryService,
 | 
			
		||||
		private loggerService: LoggerService,
 | 
			
		||||
	) {
 | 
			
		||||
		//this.createServer = this.createServer.bind(this);
 | 
			
		||||
		this.logger = this.loggerService.getLogger('server-ap', 'gray');
 | 
			
		||||
		this.inboxLogger = this.logger.createSubLogger('inbox', 'gray');
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
| 
						 | 
				
			
			@ -100,70 +107,44 @@ export class ActivityPubServerService {
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	@bindThis
 | 
			
		||||
	private inbox(request: FastifyRequest, reply: FastifyReply) {
 | 
			
		||||
		let signature;
 | 
			
		||||
 | 
			
		||||
		try {
 | 
			
		||||
			signature = httpSignature.parseRequest(request.raw, { 'headers': [] });
 | 
			
		||||
		} catch (e) {
 | 
			
		||||
			reply.code(401);
 | 
			
		||||
			return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (signature.params.headers.indexOf('host') === -1
 | 
			
		||||
			|| request.headers.host !== this.config.host) {
 | 
			
		||||
			// Host not specified or not match.
 | 
			
		||||
			reply.code(401);
 | 
			
		||||
			return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (signature.params.headers.indexOf('digest') === -1) {
 | 
			
		||||
			// Digest not found.
 | 
			
		||||
			reply.code(401);
 | 
			
		||||
		} else {
 | 
			
		||||
			const digest = request.headers.digest;
 | 
			
		||||
 | 
			
		||||
			if (typeof digest !== 'string') {
 | 
			
		||||
				// Huh?
 | 
			
		||||
				reply.code(401);
 | 
			
		||||
				return;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			const re = /^([a-zA-Z0-9\-]+)=(.+)$/;
 | 
			
		||||
			const match = digest.match(re);
 | 
			
		||||
 | 
			
		||||
			if (match == null) {
 | 
			
		||||
				// Invalid digest
 | 
			
		||||
				reply.code(401);
 | 
			
		||||
				return;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			const algo = match[1].toUpperCase();
 | 
			
		||||
			const digestValue = match[2];
 | 
			
		||||
 | 
			
		||||
			if (algo !== 'SHA-256') {
 | 
			
		||||
				// Unsupported digest algorithm
 | 
			
		||||
				reply.code(401);
 | 
			
		||||
				return;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if (request.rawBody == null) {
 | 
			
		||||
				// Bad request
 | 
			
		||||
	private async inbox(request: FastifyRequest, reply: FastifyReply) {
 | 
			
		||||
		if (request.body == null) {
 | 
			
		||||
			this.inboxLogger.warn('request body is empty');
 | 
			
		||||
			reply.code(400);
 | 
			
		||||
			return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
			const hash = crypto.createHash('sha256').update(request.rawBody).digest('base64');
 | 
			
		||||
		let signature: ReturnType<typeof parseRequestSignature>;
 | 
			
		||||
 | 
			
		||||
			if (hash !== digestValue) {
 | 
			
		||||
				// Invalid digest
 | 
			
		||||
		const verifyDigest = await verifyDigestHeader(request.raw, request.rawBody || '', true);
 | 
			
		||||
		if (verifyDigest !== true) {
 | 
			
		||||
			this.inboxLogger.warn('digest verification failed');
 | 
			
		||||
			reply.code(401);
 | 
			
		||||
			return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		try {
 | 
			
		||||
			signature = parseRequestSignature(request.raw, {
 | 
			
		||||
				requiredInputs: {
 | 
			
		||||
					draft: ['(request-target)', 'digest', 'host', 'date'],
 | 
			
		||||
				},
 | 
			
		||||
			});
 | 
			
		||||
		} catch (err) {
 | 
			
		||||
			this.inboxLogger.warn('signature header parsing failed', { err });
 | 
			
		||||
 | 
			
		||||
			if (typeof request.body === 'object' && 'signature' in request.body) {
 | 
			
		||||
				// LD SignatureがあればOK
 | 
			
		||||
				this.queueService.inbox(request.body as IActivity, null);
 | 
			
		||||
				reply.code(202);
 | 
			
		||||
				return;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			this.inboxLogger.warn('signature header parsing failed and LD signature not found');
 | 
			
		||||
			reply.code(401);
 | 
			
		||||
			return;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		this.queueService.inbox(request.body as IActivity, signature);
 | 
			
		||||
 | 
			
		||||
		reply.code(202);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -640,7 +621,7 @@ export class ActivityPubServerService {
 | 
			
		|||
			if (this.userEntityService.isLocalUser(user)) {
 | 
			
		||||
				reply.header('Cache-Control', 'public, max-age=180');
 | 
			
		||||
				this.setResponseType(request, reply);
 | 
			
		||||
				return (this.apRendererService.addContext(this.apRendererService.renderKey(user, keypair)));
 | 
			
		||||
				return (this.apRendererService.addContext(this.apRendererService.renderKey(user, keypair.publicKey)));
 | 
			
		||||
			} else {
 | 
			
		||||
				reply.code(400);
 | 
			
		||||
				return;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -94,6 +94,13 @@ export class NodeinfoServerService {
 | 
			
		|||
					localComments: 0,
 | 
			
		||||
				},
 | 
			
		||||
				metadata: {
 | 
			
		||||
					/**
 | 
			
		||||
					 * '00': Draft, RSA only
 | 
			
		||||
					 * '01': Draft, Ed25519 suported
 | 
			
		||||
					 * '11': RFC 9421, Ed25519 supported
 | 
			
		||||
					 */
 | 
			
		||||
					httpMessageSignaturesImplementationLevel: '01',
 | 
			
		||||
 | 
			
		||||
					nodeName: meta.name,
 | 
			
		||||
					nodeDescription: meta.description,
 | 
			
		||||
					nodeAdmins: [{
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -56,7 +56,8 @@ export default class extends Endpoint<typeof meta, typeof paramDef> { // eslint-
 | 
			
		|||
			const res = [] as [string, number][];
 | 
			
		||||
 | 
			
		||||
			for (const job of jobs) {
 | 
			
		||||
				const host = new URL(job.data.signature.keyId).host;
 | 
			
		||||
				const signature = job.data.signature ? 'version' in job.data.signature ? job.data.signature.value : job.data.signature : null;
 | 
			
		||||
				const host = signature ? Array.isArray(signature) ? 'TODO' : new URL(signature.keyId).host : new URL(job.data.activity.actor).host;
 | 
			
		||||
				if (res.find(x => x[0] === host)) {
 | 
			
		||||
					res.find(x => x[0] === host)![1]++;
 | 
			
		||||
				} else {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -378,7 +378,7 @@ describe('Timelines', () => {
 | 
			
		|||
			assert.strictEqual(res.body.some(note => note.id === bobNote2.id), true);
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === carolNote1.id), false);
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === carolNote2.id), false);
 | 
			
		||||
		}, 1000 * 10);
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		test.concurrent('フォローしているユーザーのチャンネル投稿が含まれない', async () => {
 | 
			
		||||
			const [alice, bob] = await Promise.all([signup(), signup()]);
 | 
			
		||||
| 
						 | 
				
			
			@ -672,7 +672,7 @@ describe('Timelines', () => {
 | 
			
		|||
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote1.id), false);
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote2.id), true);
 | 
			
		||||
		}, 1000 * 10);
 | 
			
		||||
		});
 | 
			
		||||
	});
 | 
			
		||||
 | 
			
		||||
	describe('Social TL', () => {
 | 
			
		||||
| 
						 | 
				
			
			@ -812,7 +812,7 @@ describe('Timelines', () => {
 | 
			
		|||
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote1.id), false);
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote2.id), true);
 | 
			
		||||
		}, 1000 * 10);
 | 
			
		||||
		});
 | 
			
		||||
	});
 | 
			
		||||
 | 
			
		||||
	describe('User List TL', () => {
 | 
			
		||||
| 
						 | 
				
			
			@ -1025,7 +1025,7 @@ describe('Timelines', () => {
 | 
			
		|||
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote1.id), false);
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote2.id), true);
 | 
			
		||||
		}, 1000 * 10);
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		test.concurrent('リスインしているユーザーの自身宛ての visibility: specified なノートが含まれる', async () => {
 | 
			
		||||
			const [alice, bob] = await Promise.all([signup(), signup()]);
 | 
			
		||||
| 
						 | 
				
			
			@ -1184,7 +1184,7 @@ describe('Timelines', () => {
 | 
			
		|||
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote1.id), false);
 | 
			
		||||
			assert.strictEqual(res.body.some(note => note.id === bobNote2.id), true);
 | 
			
		||||
		}, 1000 * 10);
 | 
			
		||||
		});
 | 
			
		||||
 | 
			
		||||
		test.concurrent('[withChannelNotes: true] チャンネル投稿が含まれる', async () => {
 | 
			
		||||
			const [alice, bob] = await Promise.all([signup(), signup()]);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -14,6 +14,7 @@ import type { InstanceActorService } from '@/core/InstanceActorService.js';
 | 
			
		|||
import type { LoggerService } from '@/core/LoggerService.js';
 | 
			
		||||
import type { MetaService } from '@/core/MetaService.js';
 | 
			
		||||
import type { UtilityService } from '@/core/UtilityService.js';
 | 
			
		||||
import type { FederatedInstanceService } from '@/core/FederatedInstanceService.js';
 | 
			
		||||
import { bindThis } from '@/decorators.js';
 | 
			
		||||
import type {
 | 
			
		||||
	FollowRequestsRepository,
 | 
			
		||||
| 
						 | 
				
			
			@ -47,6 +48,7 @@ export class MockResolver extends Resolver {
 | 
			
		|||
			{} as HttpRequestService,
 | 
			
		||||
			{} as ApRendererService,
 | 
			
		||||
			{} as ApDbResolverService,
 | 
			
		||||
			{} as FederatedInstanceService,
 | 
			
		||||
			loggerService,
 | 
			
		||||
		);
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -75,62 +75,61 @@ describe('FetchInstanceMetadataService', () => {
 | 
			
		|||
	test('Lock and update', async () => {
 | 
			
		||||
		redisClient.set = mockRedis();
 | 
			
		||||
		const now = Date.now();
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: { getTime: () => { return now - 10 * 1000 * 60 * 60 * 24; } } } as any);
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: new Date(now - 10 * 1000 * 60 * 60 * 24) } as any);
 | 
			
		||||
		httpRequestService.getJson.mockImplementation(() => { throw Error(); });
 | 
			
		||||
		const tryLockSpy = jest.spyOn(fetchInstanceMetadataService, 'tryLock');
 | 
			
		||||
		const unlockSpy = jest.spyOn(fetchInstanceMetadataService, 'unlock');
 | 
			
		||||
 | 
			
		||||
		await fetchInstanceMetadataService.fetchInstanceMetadata({ host: 'example.com' } as any);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(tryLockSpy).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(unlockSpy).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(httpRequestService.getJson).toHaveBeenCalled();
 | 
			
		||||
	});
 | 
			
		||||
 | 
			
		||||
	test('Lock and don\'t update', async () => {
 | 
			
		||||
	test('Don\'t lock and update if recently updated', async () => {
 | 
			
		||||
		redisClient.set = mockRedis();
 | 
			
		||||
		const now = Date.now();
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: { getTime: () => now } } as any);
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: new Date() } as any);
 | 
			
		||||
		httpRequestService.getJson.mockImplementation(() => { throw Error(); });
 | 
			
		||||
		const tryLockSpy = jest.spyOn(fetchInstanceMetadataService, 'tryLock');
 | 
			
		||||
		const unlockSpy = jest.spyOn(fetchInstanceMetadataService, 'unlock');
 | 
			
		||||
 | 
			
		||||
		await fetchInstanceMetadataService.fetchInstanceMetadata({ host: 'example.com' } as any);
 | 
			
		||||
		expect(tryLockSpy).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(unlockSpy).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(tryLockSpy).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(unlockSpy).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(httpRequestService.getJson).toHaveBeenCalledTimes(0);
 | 
			
		||||
	});
 | 
			
		||||
 | 
			
		||||
	test('Do nothing when lock not acquired', async () => {
 | 
			
		||||
		redisClient.set = mockRedis();
 | 
			
		||||
		const now = Date.now();
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: { getTime: () => now - 10 * 1000 * 60 * 60 * 24 } } as any);
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: new Date(now - 10 * 1000 * 60 * 60 * 24) } as any);
 | 
			
		||||
		httpRequestService.getJson.mockImplementation(() => { throw Error(); });
 | 
			
		||||
		await fetchInstanceMetadataService.tryLock('example.com');
 | 
			
		||||
		const tryLockSpy = jest.spyOn(fetchInstanceMetadataService, 'tryLock');
 | 
			
		||||
		const unlockSpy = jest.spyOn(fetchInstanceMetadataService, 'unlock');
 | 
			
		||||
 | 
			
		||||
		await fetchInstanceMetadataService.fetchInstanceMetadata({ host: 'example.com' } as any);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(tryLockSpy).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(unlockSpy).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(httpRequestService.getJson).toHaveBeenCalledTimes(0);
 | 
			
		||||
	});
 | 
			
		||||
 | 
			
		||||
	test('Do when lock not acquired but forced', async () => {
 | 
			
		||||
	test('Do when forced', async () => {
 | 
			
		||||
		redisClient.set = mockRedis();
 | 
			
		||||
		const now = Date.now();
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: { getTime: () => now - 10 * 1000 * 60 * 60 * 24 } } as any);
 | 
			
		||||
		federatedInstanceService.fetch.mockResolvedValue({ infoUpdatedAt: new Date(now - 10 * 1000 * 60 * 60 * 24) } as any);
 | 
			
		||||
		httpRequestService.getJson.mockImplementation(() => { throw Error(); });
 | 
			
		||||
		await fetchInstanceMetadataService.tryLock('example.com');
 | 
			
		||||
		const tryLockSpy = jest.spyOn(fetchInstanceMetadataService, 'tryLock');
 | 
			
		||||
		const unlockSpy = jest.spyOn(fetchInstanceMetadataService, 'unlock');
 | 
			
		||||
 | 
			
		||||
		await fetchInstanceMetadataService.fetchInstanceMetadata({ host: 'example.com' } as any, true);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(tryLockSpy).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(unlockSpy).toHaveBeenCalledTimes(1);
 | 
			
		||||
		expect(federatedInstanceService.fetch).toHaveBeenCalledTimes(0);
 | 
			
		||||
		expect(httpRequestService.getJson).toHaveBeenCalled();
 | 
			
		||||
	});
 | 
			
		||||
});
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -4,10 +4,8 @@
 | 
			
		|||
 */
 | 
			
		||||
 | 
			
		||||
import * as assert from 'assert';
 | 
			
		||||
import httpSignature from '@peertube/http-signature';
 | 
			
		||||
 | 
			
		||||
import { genRsaKeyPair } from '@/misc/gen-key-pair.js';
 | 
			
		||||
import { ApRequestCreator } from '@/core/activitypub/ApRequestService.js';
 | 
			
		||||
import { verifyDraftSignature, parseRequestSignature, genEd25519KeyPair, genRsaKeyPair, importPrivateKey } from '@misskey-dev/node-http-message-signatures';
 | 
			
		||||
import { createSignedGet, createSignedPost } from '@/core/activitypub/ApRequestService.js';
 | 
			
		||||
 | 
			
		||||
export const buildParsedSignature = (signingString: string, signature: string, algorithm: string) => {
 | 
			
		||||
	return {
 | 
			
		||||
| 
						 | 
				
			
			@ -24,10 +22,16 @@ export const buildParsedSignature = (signingString: string, signature: string, a
 | 
			
		|||
	};
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
describe('ap-request', () => {
 | 
			
		||||
	test('createSignedPost with verify', async () => {
 | 
			
		||||
		const keypair = await genRsaKeyPair();
 | 
			
		||||
		const key = { keyId: 'x', 'privateKeyPem': keypair.privateKey };
 | 
			
		||||
async function getKeyPair(level: string) {
 | 
			
		||||
	if (level === '00') {
 | 
			
		||||
		return await genRsaKeyPair();
 | 
			
		||||
	} else if (level === '01') {
 | 
			
		||||
		return await genEd25519KeyPair();
 | 
			
		||||
	}
 | 
			
		||||
	throw new Error('Invalid level');
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
describe('ap-request post', () => {
 | 
			
		||||
	const url = 'https://example.com/inbox';
 | 
			
		||||
	const activity = { a: 1 };
 | 
			
		||||
	const body = JSON.stringify(activity);
 | 
			
		||||
| 
						 | 
				
			
			@ -35,27 +39,51 @@ describe('ap-request', () => {
 | 
			
		|||
		'User-Agent': 'UA',
 | 
			
		||||
	};
 | 
			
		||||
 | 
			
		||||
		const req = ApRequestCreator.createSignedPost({ key, url, body, additionalHeaders: headers });
 | 
			
		||||
	describe.each(['00', '01'])('createSignedPost with verify', (level) => {
 | 
			
		||||
		test('pem', async () => {
 | 
			
		||||
			const keypair = await getKeyPair(level);
 | 
			
		||||
			const key = { keyId: 'x', 'privateKeyPem': keypair.privateKey };
 | 
			
		||||
 | 
			
		||||
		const parsed = buildParsedSignature(req.signingString, req.signature, 'rsa-sha256');
 | 
			
		||||
			const req = await createSignedPost({ level, key, url, body, additionalHeaders: headers });
 | 
			
		||||
 | 
			
		||||
		const result = httpSignature.verifySignature(parsed, keypair.publicKey);
 | 
			
		||||
		assert.deepStrictEqual(result, true);
 | 
			
		||||
			const parsed = parseRequestSignature(req.request);
 | 
			
		||||
			expect(parsed.version).toBe('draft');
 | 
			
		||||
			expect(Array.isArray(parsed.value)).toBe(false);
 | 
			
		||||
			const verify = await verifyDraftSignature(parsed.value as any, keypair.publicKey);
 | 
			
		||||
			assert.deepStrictEqual(verify, true);
 | 
			
		||||
		});
 | 
			
		||||
		test('imported', async () => {
 | 
			
		||||
			const keypair = await getKeyPair(level);
 | 
			
		||||
			const key = { keyId: 'x', 'privateKey': await importPrivateKey(keypair.privateKey) };
 | 
			
		||||
 | 
			
		||||
	test('createSignedGet with verify', async () => {
 | 
			
		||||
		const keypair = await genRsaKeyPair();
 | 
			
		||||
			const req = await createSignedPost({ level, key, url, body, additionalHeaders: headers });
 | 
			
		||||
 | 
			
		||||
			const parsed = parseRequestSignature(req.request);
 | 
			
		||||
			expect(parsed.version).toBe('draft');
 | 
			
		||||
			expect(Array.isArray(parsed.value)).toBe(false);
 | 
			
		||||
			const verify = await verifyDraftSignature(parsed.value as any, keypair.publicKey);
 | 
			
		||||
			assert.deepStrictEqual(verify, true);
 | 
			
		||||
		});
 | 
			
		||||
	});
 | 
			
		||||
});
 | 
			
		||||
 | 
			
		||||
describe('ap-request get', () => {
 | 
			
		||||
	describe.each(['00', '01'])('createSignedGet with verify', (level) => {
 | 
			
		||||
		test('pass', async () => {
 | 
			
		||||
			const keypair = await getKeyPair(level);
 | 
			
		||||
			const key = { keyId: 'x', 'privateKeyPem': keypair.privateKey };
 | 
			
		||||
			const url = 'https://example.com/outbox';
 | 
			
		||||
			const headers = {
 | 
			
		||||
				'User-Agent': 'UA',
 | 
			
		||||
			};
 | 
			
		||||
 | 
			
		||||
		const req = ApRequestCreator.createSignedGet({ key, url, additionalHeaders: headers });
 | 
			
		||||
			const req = await createSignedGet({ level, key, url, additionalHeaders: headers });
 | 
			
		||||
 | 
			
		||||
		const parsed = buildParsedSignature(req.signingString, req.signature, 'rsa-sha256');
 | 
			
		||||
 | 
			
		||||
		const result = httpSignature.verifySignature(parsed, keypair.publicKey);
 | 
			
		||||
		assert.deepStrictEqual(result, true);
 | 
			
		||||
			const parsed = parseRequestSignature(req.request);
 | 
			
		||||
			expect(parsed.version).toBe('draft');
 | 
			
		||||
			expect(Array.isArray(parsed.value)).toBe(false);
 | 
			
		||||
			const verify = await verifyDraftSignature(parsed.value as any, keypair.publicKey);
 | 
			
		||||
			assert.deepStrictEqual(verify, true);
 | 
			
		||||
		});
 | 
			
		||||
	});
 | 
			
		||||
});
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -4608,6 +4608,7 @@ export type components = {
 | 
			
		|||
      /** Format: date-time */
 | 
			
		||||
      latestRequestReceivedAt: string | null;
 | 
			
		||||
      moderationNote?: string | null;
 | 
			
		||||
      httpMessageSignaturesImplementationLevel: string;
 | 
			
		||||
    };
 | 
			
		||||
    GalleryPost: {
 | 
			
		||||
      /**
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										44
									
								
								pnpm-lock.yaml
									
										
									
										generated
									
									
									
								
							
							
						
						
									
										44
									
								
								pnpm-lock.yaml
									
										
									
										generated
									
									
									
								
							| 
						 | 
				
			
			@ -125,6 +125,9 @@ importers:
 | 
			
		|||
      '@fastify/view':
 | 
			
		||||
        specifier: 9.1.0
 | 
			
		||||
        version: 9.1.0
 | 
			
		||||
      '@misskey-dev/node-http-message-signatures':
 | 
			
		||||
        specifier: 0.0.10
 | 
			
		||||
        version: 0.0.10
 | 
			
		||||
      '@misskey-dev/sharp-read-bmp':
 | 
			
		||||
        specifier: 1.2.0
 | 
			
		||||
        version: 1.2.0
 | 
			
		||||
| 
						 | 
				
			
			@ -143,9 +146,6 @@ importers:
 | 
			
		|||
      '@nestjs/testing':
 | 
			
		||||
        specifier: 10.3.10
 | 
			
		||||
        version: 10.3.10(@nestjs/common@10.3.10(reflect-metadata@0.2.2)(rxjs@7.8.1))(@nestjs/core@10.3.10(@nestjs/common@10.3.10(reflect-metadata@0.2.2)(rxjs@7.8.1))(@nestjs/platform-express@10.3.10)(encoding@0.1.13)(reflect-metadata@0.2.2)(rxjs@7.8.1))(@nestjs/platform-express@10.3.10(@nestjs/common@10.3.10(reflect-metadata@0.2.2)(rxjs@7.8.1))(@nestjs/core@10.3.10))
 | 
			
		||||
      '@peertube/http-signature':
 | 
			
		||||
        specifier: 1.7.0
 | 
			
		||||
        version: 1.7.0
 | 
			
		||||
      '@sentry/node':
 | 
			
		||||
        specifier: 8.13.0
 | 
			
		||||
        version: 8.13.0
 | 
			
		||||
| 
						 | 
				
			
			@ -3228,6 +3228,11 @@ packages:
 | 
			
		|||
  '@kurkle/color@0.3.2':
 | 
			
		||||
    resolution: {integrity: sha512-fuscdXJ9G1qb7W8VdHi+IwRqij3lBkosAm4ydQtEmbY58OzHXqQhvlxqEkoz0yssNVn38bcpRWgA9PP+OGoisw==}
 | 
			
		||||
 | 
			
		||||
  '@lapo/asn1js@2.0.4':
 | 
			
		||||
    resolution: {integrity: sha512-KJD3wQAZxozcraJdWp3utDU6DEZgAVBGp9INCdptUpZaXCEYkpwNb7h7wyYh5y6DxtpvIud8k0suhWJ/z2rKvw==}
 | 
			
		||||
    engines: {node: '>=12.20.0'}
 | 
			
		||||
    hasBin: true
 | 
			
		||||
 | 
			
		||||
  '@levischuck/tiny-cbor@0.2.2':
 | 
			
		||||
    resolution: {integrity: sha512-f5CnPw997Y2GQ8FAvtuVVC19FX8mwNNC+1XJcIi16n/LTJifKO6QBgGLgN3YEmqtGMk17SKSuoWES3imJVxAVw==}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -3281,6 +3286,10 @@ packages:
 | 
			
		|||
      eslint-plugin-import: '>= 2'
 | 
			
		||||
      globals: '>= 15'
 | 
			
		||||
 | 
			
		||||
  '@misskey-dev/node-http-message-signatures@0.0.10':
 | 
			
		||||
    resolution: {integrity: sha512-HiAuc//tOU077KFUJhHYLAPWku9enTpOFIqQiK6l2i2mIizRvv7HhV7Y+yuav5quDOAz+WZGK/i5C9OR5fkKIg==}
 | 
			
		||||
    engines: {node: '>=18.4.0'}
 | 
			
		||||
 | 
			
		||||
  '@misskey-dev/sharp-read-bmp@1.2.0':
 | 
			
		||||
    resolution: {integrity: sha512-er4pRakXzHYfEgOFAFfQagqDouG+wLm+kwNq1I30oSdIHDa0wM3KjFpfIGQ25Fks4GcmOl1s7Zh6xoQu5dNjTw==}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -3671,10 +3680,6 @@ packages:
 | 
			
		|||
  '@peculiar/asn1-x509@2.3.8':
 | 
			
		||||
    resolution: {integrity: sha512-voKxGfDU1c6r9mKiN5ZUsZWh3Dy1BABvTM3cimf0tztNwyMJPhiXY94eRTgsMQe6ViLfT6EoXxkWVzcm3mFAFw==}
 | 
			
		||||
 | 
			
		||||
  '@peertube/http-signature@1.7.0':
 | 
			
		||||
    resolution: {integrity: sha512-aGQIwo6/sWtyyqhVK4e1MtxYz4N1X8CNt6SOtCc+Wnczs5S5ONaLHDDR8LYaGn0MgOwvGgXyuZ5sJIfd7iyoUw==}
 | 
			
		||||
    engines: {node: '>=0.10'}
 | 
			
		||||
 | 
			
		||||
  '@pkgjs/parseargs@0.11.0':
 | 
			
		||||
    resolution: {integrity: sha512-+1VkjdD0QBLPodGrJUeqarH8VAIvQODIbwh9XpP5Syisf7YoQgsJKPNFoqqLQlu+VQ/tVSshMR6loPMn8U+dPg==}
 | 
			
		||||
    engines: {node: '>=14'}
 | 
			
		||||
| 
						 | 
				
			
			@ -10524,6 +10529,9 @@ packages:
 | 
			
		|||
    resolution: {integrity: sha512-U9nH88a3fc/ekCF1l0/UP1IosiuIjyTh7hBvXVMHYgVcfGvt897Xguj2UOLDeI5BG2m7/uwyaLVT6fbtCwTyzw==}
 | 
			
		||||
    engines: {iojs: '>=1.0.0', node: '>=0.10.0'}
 | 
			
		||||
 | 
			
		||||
  rfc4648@1.5.3:
 | 
			
		||||
    resolution: {integrity: sha512-MjOWxM065+WswwnmNONOT+bD1nXzY9Km6u3kzvnx8F8/HXGZdz3T6e6vZJ8Q/RIMUSp/nxqjH3GwvJDy8ijeQQ==}
 | 
			
		||||
 | 
			
		||||
  rfdc@1.3.0:
 | 
			
		||||
    resolution: {integrity: sha512-V2hovdzFbOi77/WajaSMXk2OLm+xNIeQdMMuB7icj7bk6zi2F8GGAxigcnDFpJHbNyNcgyJDiP+8nOrY5cZGrA==}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -11075,6 +11083,10 @@ packages:
 | 
			
		|||
    resolution: {integrity: sha512-pQ+V+nYQdC5H3Q7qBZAz/MO6lwGhoC2gOAjuouGf/VO0m7vQRh8QNMl2Uf6SwAtzZ9bOw3UIeBukEGNJl5dtXQ==}
 | 
			
		||||
    engines: {node: '>=14.16'}
 | 
			
		||||
 | 
			
		||||
  structured-headers@1.0.1:
 | 
			
		||||
    resolution: {integrity: sha512-QYBxdBtA4Tl5rFPuqmbmdrS9kbtren74RTJTcs0VSQNVV5iRhJD4QlYTLD0+81SBwUQctjEQzjTRI3WG4DzICA==}
 | 
			
		||||
    engines: {node: '>= 14', npm: '>=6'}
 | 
			
		||||
 | 
			
		||||
  stylehacks@6.1.1:
 | 
			
		||||
    resolution: {integrity: sha512-gSTTEQ670cJNoaeIp9KX6lZmm8LJ3jPB5yJmX8Zq/wQxOsAFXV3qjWzHas3YYk1qesuVIyYWWUpZ0vSE/dTSGg==}
 | 
			
		||||
    engines: {node: ^14 || ^16 || >=18.0}
 | 
			
		||||
| 
						 | 
				
			
			@ -14642,6 +14654,8 @@ snapshots:
 | 
			
		|||
 | 
			
		||||
  '@kurkle/color@0.3.2': {}
 | 
			
		||||
 | 
			
		||||
  '@lapo/asn1js@2.0.4': {}
 | 
			
		||||
 | 
			
		||||
  '@levischuck/tiny-cbor@0.2.2': {}
 | 
			
		||||
 | 
			
		||||
  '@lukeed/csprng@1.0.1': {}
 | 
			
		||||
| 
						 | 
				
			
			@ -14722,6 +14736,12 @@ snapshots:
 | 
			
		|||
      eslint-plugin-import: 2.29.1(@typescript-eslint/parser@7.15.0(eslint@9.6.0)(typescript@5.5.3))(eslint@9.6.0)
 | 
			
		||||
      globals: 15.7.0
 | 
			
		||||
 | 
			
		||||
  '@misskey-dev/node-http-message-signatures@0.0.10':
 | 
			
		||||
    dependencies:
 | 
			
		||||
      '@lapo/asn1js': 2.0.4
 | 
			
		||||
      rfc4648: 1.5.3
 | 
			
		||||
      structured-headers: 1.0.1
 | 
			
		||||
 | 
			
		||||
  '@misskey-dev/sharp-read-bmp@1.2.0':
 | 
			
		||||
    dependencies:
 | 
			
		||||
      decode-bmp: 0.2.1
 | 
			
		||||
| 
						 | 
				
			
			@ -15182,12 +15202,6 @@ snapshots:
 | 
			
		|||
      pvtsutils: 1.3.5
 | 
			
		||||
      tslib: 2.6.2
 | 
			
		||||
 | 
			
		||||
  '@peertube/http-signature@1.7.0':
 | 
			
		||||
    dependencies:
 | 
			
		||||
      assert-plus: 1.0.0
 | 
			
		||||
      jsprim: 1.4.2
 | 
			
		||||
      sshpk: 1.17.0
 | 
			
		||||
 | 
			
		||||
  '@pkgjs/parseargs@0.11.0':
 | 
			
		||||
    optional: true
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -23879,6 +23893,8 @@ snapshots:
 | 
			
		|||
 | 
			
		||||
  reusify@1.0.4: {}
 | 
			
		||||
 | 
			
		||||
  rfc4648@1.5.3: {}
 | 
			
		||||
 | 
			
		||||
  rfdc@1.3.0: {}
 | 
			
		||||
 | 
			
		||||
  rimraf@2.6.3:
 | 
			
		||||
| 
						 | 
				
			
			@ -24474,6 +24490,8 @@ snapshots:
 | 
			
		|||
      '@tokenizer/token': 0.3.0
 | 
			
		||||
      peek-readable: 5.0.0
 | 
			
		||||
 | 
			
		||||
  structured-headers@1.0.1: {}
 | 
			
		||||
 | 
			
		||||
  stylehacks@6.1.1(postcss@8.4.38):
 | 
			
		||||
    dependencies:
 | 
			
		||||
      browserslist: 4.23.0
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue