fecc97c5e5635861aa8ca592c96024d4697bce41
[akkoma] / lib / pleroma / object / fetcher.ex
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Object.Fetcher do
6 alias Pleroma.HTTP
7 alias Pleroma.Object
8 alias Pleroma.Object.Containment
9 alias Pleroma.Signature
10 alias Pleroma.Repo
11 alias Pleroma.Web.ActivityPub.InternalFetchActor
12 alias Pleroma.Web.ActivityPub.Transmogrifier
13 alias Pleroma.Web.OStatus
14
15 require Logger
16 require Pleroma.Constants
17
18 defp touch_changeset(changeset) do
19 updated_at =
20 NaiveDateTime.utc_now()
21 |> NaiveDateTime.truncate(:second)
22
23 Ecto.Changeset.put_change(changeset, :updated_at, updated_at)
24 end
25
26 defp maybe_reinject_internal_fields(data, %{data: %{} = old_data}) do
27 internal_fields = Map.take(old_data, Pleroma.Constants.object_internal_fields())
28
29 Map.merge(data, internal_fields)
30 end
31
32 defp maybe_reinject_internal_fields(data, _), do: data
33
34 defp reinject_object(struct, data) do
35 Logger.debug("Reinjecting object #{data["id"]}")
36
37 with data <- Transmogrifier.fix_object(data),
38 data <- maybe_reinject_internal_fields(data, struct),
39 changeset <- Object.change(struct, %{data: data}),
40 changeset <- touch_changeset(changeset),
41 {:ok, object} <- Repo.insert_or_update(changeset) do
42 {:ok, object}
43 else
44 e ->
45 Logger.error("Error while processing object: #{inspect(e)}")
46 {:error, e}
47 end
48 end
49
50 def refetch_object(%Object{data: %{"id" => id}} = object) do
51 with {:ok, data} <- fetch_and_contain_remote_object_from_id(id),
52 {:ok, object} <- reinject_object(object, data) do
53 {:ok, object}
54 else
55 e -> {:error, e}
56 end
57 end
58
59 # TODO:
60 # This will create a Create activity, which we need internally at the moment.
61 def fetch_object_from_id(id, options \\ []) do
62 if object = Object.get_cached_by_ap_id(id) do
63 {:ok, object}
64 else
65 Logger.info("Fetching #{id} via AP")
66
67 with {:fetch, {:ok, data}} <- {:fetch, fetch_and_contain_remote_object_from_id(id)},
68 {:normalize, nil} <- {:normalize, Object.normalize(data, false)},
69 params <- %{
70 "type" => "Create",
71 "to" => data["to"],
72 "cc" => data["cc"],
73 # Should we seriously keep this attributedTo thing?
74 "actor" => data["actor"] || data["attributedTo"],
75 "object" => data
76 },
77 {:containment, :ok} <- {:containment, Containment.contain_origin(id, params)},
78 {:ok, activity} <- Transmogrifier.handle_incoming(params, options),
79 {:object, _data, %Object{} = object} <-
80 {:object, data, Object.normalize(activity, false)} do
81 {:ok, object}
82 else
83 {:containment, _} ->
84 {:error, "Object containment failed."}
85
86 {:error, {:reject, nil}} ->
87 {:reject, nil}
88
89 {:object, data, nil} ->
90 reinject_object(%Object{}, data)
91
92 {:normalize, object = %Object{}} ->
93 {:ok, object}
94
95 _e ->
96 # Only fallback when receiving a fetch/normalization error with ActivityPub
97 Logger.info("Couldn't get object via AP, trying out OStatus fetching...")
98
99 # FIXME: OStatus Object Containment?
100 case OStatus.fetch_activity_from_url(id) do
101 {:ok, [activity | _]} -> {:ok, Object.normalize(activity, false)}
102 e -> e
103 end
104 end
105 end
106 end
107
108 def fetch_object_from_id!(id, options \\ []) do
109 with {:ok, object} <- fetch_object_from_id(id, options) do
110 object
111 else
112 _e ->
113 nil
114 end
115 end
116
117 defp make_signature(id, date) do
118 uri = URI.parse(id)
119
120 signature =
121 InternalFetchActor.get_actor()
122 |> Signature.sign(%{
123 "(request-target)": "get #{uri.path}",
124 host: uri.host,
125 date: date
126 })
127
128 [{:Signature, signature}]
129 end
130
131 defp sign_fetch(headers, id, date) do
132 if Pleroma.Config.get([:activitypub, :sign_object_fetches]) do
133 headers ++ make_signature(id, date)
134 else
135 headers
136 end
137 end
138
139 defp maybe_date_fetch(headers, date) do
140 if Pleroma.Config.get([:activitypub, :sign_object_fetches]) do
141 headers ++ [{:Date, date}]
142 else
143 headers
144 end
145 end
146
147 def fetch_and_contain_remote_object_from_id(id) when is_binary(id) do
148 Logger.info("Fetching object #{id} via AP")
149
150 date = Pleroma.Signature.signed_date()
151
152 headers =
153 [{:Accept, "application/activity+json"}]
154 |> maybe_date_fetch(date)
155 |> sign_fetch(id, date)
156
157 Logger.debug("Fetch headers: #{inspect(headers)}")
158
159 with true <- String.starts_with?(id, "http"),
160 {:ok, %{body: body, status: code}} when code in 200..299 <- HTTP.get(id, headers),
161 {:ok, data} <- Jason.decode(body),
162 :ok <- Containment.contain_origin_from_id(id, data) do
163 {:ok, data}
164 else
165 {:ok, %{status: code}} when code in [404, 410] ->
166 {:error, "Object has been deleted"}
167
168 e ->
169 {:error, e}
170 end
171 end
172
173 def fetch_and_contain_remote_object_from_id(%{"id" => id}),
174 do: fetch_and_contain_remote_object_from_id(id)
175
176 def fetch_and_contain_remote_object_from_id(_id), do: {:error, "id must be a string"}
177 end