* Move ActivityPub::FetchRemoteAccountService to ActivityPub::FetchRemoteActorService ActivityPub::FetchRemoteAccountService is kept as a wrapper for when the actor is specifically required to be an Account * Refactor SignatureVerification to allow non-Account actors * fixup! Move ActivityPub::FetchRemoteAccountService to ActivityPub::FetchRemoteActorService * Refactor ActivityPub::FetchRemoteKeyService to potentially return non-Account actors * Refactor inbound ActivityPub payload processing to accept non-Account actors * Refactor inbound ActivityPub processing to accept activities relayed through non-Account * Refactor how Account key URIs are built * Refactor Request and drop unused key_id_format parameter * Rename ActivityPub::Dereferencer `signature_account` to `signature_actor`
		
			
				
	
	
		
			73 lines
		
	
	
	
		
			2.2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			73 lines
		
	
	
	
		
			2.2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
# frozen_string_literal: true
 | 
						|
 | 
						|
class ActivityPub::DeliveryWorker
 | 
						|
  include Sidekiq::Worker
 | 
						|
  include RoutingHelper
 | 
						|
  include JsonLdHelper
 | 
						|
 | 
						|
  STOPLIGHT_FAILURE_THRESHOLD = 10
 | 
						|
  STOPLIGHT_COOLDOWN = 60
 | 
						|
 | 
						|
  sidekiq_options queue: 'push', retry: 16, dead: false
 | 
						|
 | 
						|
  HEADERS = { 'Content-Type' => 'application/activity+json' }.freeze
 | 
						|
 | 
						|
  def perform(json, source_account_id, inbox_url, options = {})
 | 
						|
    return unless DeliveryFailureTracker.available?(inbox_url)
 | 
						|
 | 
						|
    @options        = options.with_indifferent_access
 | 
						|
    @json           = json
 | 
						|
    @source_account = Account.find(source_account_id)
 | 
						|
    @inbox_url      = inbox_url
 | 
						|
    @host           = Addressable::URI.parse(inbox_url).normalized_site
 | 
						|
    @performed      = false
 | 
						|
 | 
						|
    perform_request
 | 
						|
  ensure
 | 
						|
    if @inbox_url.present?
 | 
						|
      if @performed
 | 
						|
        failure_tracker.track_success!
 | 
						|
      else
 | 
						|
        failure_tracker.track_failure!
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  private
 | 
						|
 | 
						|
  def build_request(http_client)
 | 
						|
    Request.new(:post, @inbox_url, body: @json, http_client: http_client).tap do |request|
 | 
						|
      request.on_behalf_of(@source_account, sign_with: @options[:sign_with])
 | 
						|
      request.add_headers(HEADERS)
 | 
						|
      request.add_headers({ 'Collection-Synchronization' => synchronization_header }) if ENV['DISABLE_FOLLOWERS_SYNCHRONIZATION'] != 'true' && @options[:synchronize_followers]
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  def synchronization_header
 | 
						|
    "collectionId=\"#{account_followers_url(@source_account)}\", digest=\"#{@source_account.remote_followers_hash(@inbox_url)}\", url=\"#{account_followers_synchronization_url(@source_account)}\""
 | 
						|
  end
 | 
						|
 | 
						|
  def perform_request
 | 
						|
    light = Stoplight(@inbox_url) do
 | 
						|
      request_pool.with(@host) do |http_client|
 | 
						|
        build_request(http_client).perform do |response|
 | 
						|
          raise Mastodon::UnexpectedResponseError, response unless response_successful?(response) || response_error_unsalvageable?(response)
 | 
						|
 | 
						|
          @performed = true
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    light.with_threshold(STOPLIGHT_FAILURE_THRESHOLD)
 | 
						|
         .with_cool_off_time(STOPLIGHT_COOLDOWN)
 | 
						|
         .run
 | 
						|
  end
 | 
						|
 | 
						|
  def failure_tracker
 | 
						|
    @failure_tracker ||= DeliveryFailureTracker.new(@inbox_url)
 | 
						|
  end
 | 
						|
 | 
						|
  def request_pool
 | 
						|
    RequestPool.current
 | 
						|
  end
 | 
						|
end
 |