mirror of
https://github.com/mastodon/mastodon.git
synced 2024-11-23 22:41:29 +00:00
8cf7006d4e
* Move ActivityPub::FetchRemoteAccountService to ActivityPub::FetchRemoteActorService ActivityPub::FetchRemoteAccountService is kept as a wrapper for when the actor is specifically required to be an Account * Refactor SignatureVerification to allow non-Account actors * fixup! Move ActivityPub::FetchRemoteAccountService to ActivityPub::FetchRemoteActorService * Refactor ActivityPub::FetchRemoteKeyService to potentially return non-Account actors * Refactor inbound ActivityPub payload processing to accept non-Account actors * Refactor inbound ActivityPub processing to accept activities relayed through non-Account * Refactor how Account key URIs are built * Refactor Request and drop unused key_id_format parameter * Rename ActivityPub::Dereferencer `signature_account` to `signature_actor`
79 lines
2.3 KiB
Ruby
79 lines
2.3 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
class ActivityPub::ProcessCollectionService < BaseService
|
|
include JsonLdHelper
|
|
|
|
def call(body, actor, **options)
|
|
@account = actor
|
|
@json = original_json = Oj.load(body, mode: :strict)
|
|
@options = options
|
|
|
|
begin
|
|
@json = compact(@json) if @json['signature'].is_a?(Hash)
|
|
rescue JSON::LD::JsonLdError => e
|
|
Rails.logger.debug "Error when compacting JSON-LD document for #{value_or_id(@json['actor'])}: #{e.message}"
|
|
@json = original_json.without('signature')
|
|
end
|
|
|
|
return if !supported_context? || (different_actor? && verify_account!.nil?) || suspended_actor? || @account.local?
|
|
return unless @account.is_a?(Account)
|
|
|
|
if @json['signature'].present?
|
|
# We have verified the signature, but in the compaction step above, might
|
|
# have introduced incompatibilities with other servers that do not
|
|
# normalize the JSON-LD documents (for instance, previous Mastodon
|
|
# versions), so skip redistribution if we can't get a safe document.
|
|
patch_for_forwarding!(original_json, @json)
|
|
@json.delete('signature') unless safe_for_forwarding?(original_json, @json)
|
|
end
|
|
|
|
case @json['type']
|
|
when 'Collection', 'CollectionPage'
|
|
process_items @json['items']
|
|
when 'OrderedCollection', 'OrderedCollectionPage'
|
|
process_items @json['orderedItems']
|
|
else
|
|
process_items [@json]
|
|
end
|
|
rescue Oj::ParseError
|
|
nil
|
|
end
|
|
|
|
private
|
|
|
|
def different_actor?
|
|
@json['actor'].present? && value_or_id(@json['actor']) != @account.uri
|
|
end
|
|
|
|
def suspended_actor?
|
|
@account.suspended? && !activity_allowed_while_suspended?
|
|
end
|
|
|
|
def activity_allowed_while_suspended?
|
|
%w(Delete Reject Undo Update).include?(@json['type'])
|
|
end
|
|
|
|
def process_items(items)
|
|
items.reverse_each.filter_map { |item| process_item(item) }
|
|
end
|
|
|
|
def supported_context?
|
|
super(@json)
|
|
end
|
|
|
|
def process_item(item)
|
|
activity = ActivityPub::Activity.factory(item, @account, **@options)
|
|
activity&.perform
|
|
end
|
|
|
|
def verify_account!
|
|
@options[:relayed_through_actor] = @account
|
|
@account = ActivityPub::LinkedDataSignature.new(@json).verify_actor!
|
|
@account = nil unless @account.is_a?(Account)
|
|
@account
|
|
rescue JSON::LD::JsonLdError => e
|
|
Rails.logger.debug "Could not verify LD-Signature for #{value_or_id(@json['actor'])}: #{e.message}"
|
|
nil
|
|
end
|
|
end
|