2016-11-15 17:56:29 +02:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-01-22 15:25:09 +02:00
|
|
|
class ResolveAccountService < BaseService
|
2017-08-08 22:52:15 +03:00
|
|
|
include JsonLdHelper
|
2019-07-09 04:27:35 +03:00
|
|
|
include DomainControlHelper
|
2020-05-10 12:41:43 +03:00
|
|
|
include WebfingerHelper
|
2019-07-09 04:27:35 +03:00
|
|
|
|
|
|
|
# Find or create an account record for a remote user. When creating,
|
|
|
|
# look up the user's webfinger and fetch ActivityPub data
|
|
|
|
# @param [String, Account] uri URI in the username@domain format or account record
|
2018-11-08 22:05:42 +02:00
|
|
|
# @param [Hash] options
|
2019-07-09 04:27:35 +03:00
|
|
|
# @option options [Boolean] :redirected Do not follow further Webfinger redirects
|
|
|
|
# @option options [Boolean] :skip_webfinger Do not attempt to refresh account data
|
2016-02-24 13:57:29 +02:00
|
|
|
# @return [Account]
|
2018-11-08 22:05:42 +02:00
|
|
|
def call(uri, options = {})
|
2019-07-09 04:27:35 +03:00
|
|
|
return if uri.blank?
|
|
|
|
|
|
|
|
process_options!(uri, options)
|
|
|
|
|
|
|
|
# First of all we want to check if we've got the account
|
|
|
|
# record with the URI already, and if so, we can exit early
|
|
|
|
|
|
|
|
return if domain_not_allowed?(@domain)
|
|
|
|
|
|
|
|
@account ||= Account.find_remote(@username, @domain)
|
|
|
|
|
2020-10-08 01:34:57 +03:00
|
|
|
return @account if @account&.local? || @domain.nil? || !webfinger_update_due?
|
2019-07-09 04:27:35 +03:00
|
|
|
|
|
|
|
# At this point we are in need of a Webfinger query, which may
|
|
|
|
# yield us a different username/domain through a redirect
|
2019-07-10 18:10:12 +03:00
|
|
|
process_webfinger!(@uri)
|
2020-11-19 20:52:06 +02:00
|
|
|
@domain = nil if TagManager.instance.local_domain?(@domain)
|
2019-07-09 04:27:35 +03:00
|
|
|
|
|
|
|
# Because the username/domain pair may be different than what
|
|
|
|
# we already checked, we need to check if we've already got
|
|
|
|
# the record with that URI, again
|
|
|
|
|
|
|
|
return if domain_not_allowed?(@domain)
|
|
|
|
|
|
|
|
@account ||= Account.find_remote(@username, @domain)
|
|
|
|
|
2020-11-08 01:28:39 +02:00
|
|
|
if gone_from_origin? && not_yet_deleted?
|
|
|
|
queue_deletion!
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
return @account if @account&.local? || gone_from_origin? || !webfinger_update_due?
|
2019-07-09 04:27:35 +03:00
|
|
|
|
|
|
|
# Now it is certain, it is definitely a remote account, and it
|
|
|
|
# either needs to be created, or updated from fresh data
|
|
|
|
|
|
|
|
process_account!
|
2020-11-08 01:28:39 +02:00
|
|
|
rescue Webfinger::Error, Oj::ParseError => e
|
2019-07-09 04:27:35 +03:00
|
|
|
Rails.logger.debug "Webfinger query for #{@uri} failed: #{e}"
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def process_options!(uri, options)
|
2018-11-08 22:05:42 +02:00
|
|
|
@options = options
|
2016-03-21 19:26:47 +02:00
|
|
|
|
2018-11-08 22:05:42 +02:00
|
|
|
if uri.is_a?(Account)
|
|
|
|
@account = uri
|
|
|
|
@username = @account.username
|
|
|
|
@domain = @account.domain
|
|
|
|
else
|
|
|
|
@username, @domain = uri.split('@')
|
|
|
|
end
|
2016-09-20 01:39:03 +03:00
|
|
|
|
2019-08-07 22:14:08 +03:00
|
|
|
@domain = begin
|
|
|
|
if TagManager.instance.local_domain?(@domain)
|
|
|
|
nil
|
|
|
|
else
|
|
|
|
TagManager.instance.normalize_domain(@domain)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
@uri = [@username, @domain].compact.join('@')
|
2019-07-09 04:27:35 +03:00
|
|
|
end
|
2016-02-20 23:53:20 +02:00
|
|
|
|
2020-11-19 20:52:06 +02:00
|
|
|
def process_webfinger!(uri)
|
2020-05-10 12:41:43 +03:00
|
|
|
@webfinger = webfinger!("acct:#{uri}")
|
2020-11-19 20:52:06 +02:00
|
|
|
confirmed_username, confirmed_domain = split_acct(@webfinger.subject)
|
2016-11-03 17:57:44 +02:00
|
|
|
|
2017-07-19 15:44:04 +03:00
|
|
|
if confirmed_username.casecmp(@username).zero? && confirmed_domain.casecmp(@domain).zero?
|
|
|
|
@username = confirmed_username
|
|
|
|
@domain = confirmed_domain
|
2020-11-19 20:52:06 +02:00
|
|
|
return
|
2017-04-19 18:28:35 +03:00
|
|
|
end
|
|
|
|
|
2020-11-19 20:52:06 +02:00
|
|
|
# Account doesn't match, so it may have been redirected
|
|
|
|
@webfinger = webfinger!("acct:#{confirmed_username}@#{confirmed_domain}")
|
|
|
|
@username, @domain = split_acct(@webfinger.subject)
|
|
|
|
|
|
|
|
unless confirmed_username.casecmp(@username).zero? && confirmed_domain.casecmp(@domain).zero?
|
|
|
|
raise Webfinger::RedirectError, "The URI #{uri} tries to hijack #{@username}@#{@domain}"
|
|
|
|
end
|
2020-11-08 01:28:39 +02:00
|
|
|
rescue Webfinger::GoneError
|
|
|
|
@gone = true
|
2019-07-09 04:27:35 +03:00
|
|
|
end
|
|
|
|
|
2020-11-19 20:52:06 +02:00
|
|
|
def split_acct(acct)
|
|
|
|
acct.gsub(/\Aacct:/, '').split('@')
|
|
|
|
end
|
|
|
|
|
2019-07-09 04:27:35 +03:00
|
|
|
def process_account!
|
2019-07-07 00:26:16 +03:00
|
|
|
return unless activitypub_ready?
|
2016-11-03 17:57:44 +02:00
|
|
|
|
2017-07-19 15:44:04 +03:00
|
|
|
RedisLock.acquire(lock_options) do |lock|
|
|
|
|
if lock.acquired?
|
|
|
|
@account = Account.find_remote(@username, @domain)
|
2016-11-03 17:57:44 +02:00
|
|
|
|
2020-02-22 02:26:41 +02:00
|
|
|
next if actor_json.nil?
|
2019-07-07 00:26:16 +03:00
|
|
|
|
2019-07-09 04:27:35 +03:00
|
|
|
@account = ActivityPub::ProcessAccountService.new.call(@username, @domain, actor_json)
|
2018-05-16 13:29:45 +03:00
|
|
|
else
|
|
|
|
raise Mastodon::RaceConditionError
|
2017-07-19 15:44:04 +03:00
|
|
|
end
|
2017-04-15 04:16:05 +03:00
|
|
|
end
|
2016-11-03 17:57:44 +02:00
|
|
|
|
2017-07-19 15:44:04 +03:00
|
|
|
@account
|
|
|
|
end
|
2017-01-23 18:38:38 +02:00
|
|
|
|
2017-07-19 15:44:04 +03:00
|
|
|
def webfinger_update_due?
|
2020-06-09 11:26:58 +03:00
|
|
|
return false if @options[:check_delivery_availability] && !DeliveryFailureTracker.available?(@domain)
|
|
|
|
|
2018-11-08 22:05:42 +02:00
|
|
|
@account.nil? || ((!@options[:skip_webfinger] || @account.ostatus?) && @account.possibly_stale?)
|
2017-07-19 15:44:04 +03:00
|
|
|
end
|
2016-02-22 19:10:30 +02:00
|
|
|
|
2017-08-08 22:52:15 +03:00
|
|
|
def activitypub_ready?
|
2020-10-08 01:34:57 +03:00
|
|
|
['application/activity+json', 'application/ld+json; profile="https://www.w3.org/ns/activitystreams"'].include?(@webfinger.link('self', 'type'))
|
2017-08-08 22:52:15 +03:00
|
|
|
end
|
|
|
|
|
|
|
|
def actor_url
|
2020-10-08 01:34:57 +03:00
|
|
|
@actor_url ||= @webfinger.link('self', 'href')
|
2017-08-08 22:52:15 +03:00
|
|
|
end
|
|
|
|
|
2017-08-14 12:27:25 +03:00
|
|
|
def actor_json
|
|
|
|
return @actor_json if defined?(@actor_json)
|
|
|
|
|
2017-10-04 02:13:48 +03:00
|
|
|
json = fetch_resource(actor_url, false)
|
2018-05-02 13:40:24 +03:00
|
|
|
@actor_json = supported_context?(json) && equals_or_includes_any?(json['type'], ActivityPub::FetchRemoteAccountService::SUPPORTED_TYPES) ? json : nil
|
2017-08-14 12:27:25 +03:00
|
|
|
end
|
|
|
|
|
2020-11-08 01:28:39 +02:00
|
|
|
def gone_from_origin?
|
|
|
|
@gone
|
|
|
|
end
|
|
|
|
|
|
|
|
def not_yet_deleted?
|
|
|
|
@account.present? && !@account.local?
|
|
|
|
end
|
|
|
|
|
|
|
|
def queue_deletion!
|
2020-11-19 18:39:47 +02:00
|
|
|
AccountDeletionWorker.perform_async(@account.id, reserve_username: false, skip_activitypub: true)
|
2020-11-08 01:28:39 +02:00
|
|
|
end
|
|
|
|
|
2017-07-19 15:44:04 +03:00
|
|
|
def lock_options
|
|
|
|
{ redis: Redis.current, key: "resolve:#{@username}@#{@domain}" }
|
2016-02-28 15:26:26 +02:00
|
|
|
end
|
2016-02-20 23:53:20 +02:00
|
|
|
end
|