activitypub/src/http.rs

100 lines
3.2 KiB
Rust
Raw Normal View History

2024-04-09 19:48:18 +02:00
use crate::{
2024-04-18 04:03:52 +02:00
database::StateHandle,
entities::user,
error::Error,
objects::person::{DbUser, PersonAcceptedActivities},
2024-04-09 19:48:18 +02:00
};
use activitypub_federation::{
actix_web::{inbox::receive_activity, signing_actor},
config::{Data, FederationConfig, FederationMiddleware},
fetch::webfinger::{build_webfinger_response, extract_webfinger_name},
protocol::context::WithContext,
traits::{Actor, Object},
FEDERATION_CONTENT_TYPE,
};
use actix_web::{web, web::Bytes, App, HttpRequest, HttpResponse, HttpServer};
use anyhow::anyhow;
use serde::Deserialize;
use tracing::info;
2024-04-18 03:41:52 +02:00
use url::Url;
2024-04-09 19:48:18 +02:00
2024-04-18 03:41:52 +02:00
pub fn listen(config: &FederationConfig<StateHandle>) -> Result<(), Error> {
2024-04-09 19:48:18 +02:00
let hostname = config.domain();
info!("Listening with actix-web on {hostname}");
let config = config.clone();
let server = HttpServer::new(move || {
App::new()
.wrap(FederationMiddleware::new(config.clone()))
//.route("/", web::get().to(http_get_system_user))
.route("/{user}", web::get().to(http_get_user))
.route("/{user}/inbox", web::post().to(http_post_user_inbox))
.route("/.well-known/webfinger", web::get().to(webfinger))
})
.bind(hostname)?
.run();
tokio::spawn(server);
Ok(())
}
/// Handles requests to fetch system user json over HTTP
/*pub async fn http_get_system_user(data: Data<DatabaseHandle>) -> Result<HttpResponse, Error> {
let json_user = data.system_user.clone().into_json(&data).await?;
Ok(HttpResponse::Ok()
.content_type(FEDERATION_CONTENT_TYPE)
.json(WithContext::new_default(json_user)))
}*/
/// Handles requests to fetch user json over HTTP
pub async fn http_get_user(
request: HttpRequest,
user_name: web::Path<String>,
2024-04-18 03:41:52 +02:00
data: Data<StateHandle>,
2024-04-09 19:48:18 +02:00
) -> Result<HttpResponse, Error> {
2024-04-10 00:38:45 +02:00
//let signed_by = signing_actor::<DbUser>(&request, None, &data).await?;
2024-04-09 19:48:18 +02:00
// here, checks can be made on the actor or the domain to which
// it belongs, to verify whether it is allowed to access this resource
2024-04-10 00:38:45 +02:00
//info!(
// "Fetch user request is signed by system account {}",
// signed_by.id()
//);
2024-04-09 19:48:18 +02:00
2024-04-18 03:41:52 +02:00
let db_user = data.local_user().await?;
if user_name.into_inner() == db_user.username {
2024-04-09 19:48:18 +02:00
let json_user = db_user.into_json(&data).await?;
Ok(HttpResponse::Ok()
.content_type(FEDERATION_CONTENT_TYPE)
.json(WithContext::new_default(json_user)))
} else {
Err(anyhow!("Invalid user").into())
}
}
/// Handles messages received in user inbox
pub async fn http_post_user_inbox(
request: HttpRequest,
body: Bytes,
2024-04-18 03:41:52 +02:00
data: Data<StateHandle>,
2024-04-09 19:48:18 +02:00
) -> Result<HttpResponse, Error> {
2024-04-18 03:41:52 +02:00
receive_activity::<WithContext<PersonAcceptedActivities>, user::Model, StateHandle>(
2024-04-09 19:48:18 +02:00
request, body, &data,
)
.await
}
#[derive(Deserialize)]
pub struct WebfingerQuery {
resource: String,
}
pub async fn webfinger(
query: web::Query<WebfingerQuery>,
2024-04-18 03:41:52 +02:00
data: Data<StateHandle>,
2024-04-09 19:48:18 +02:00
) -> Result<HttpResponse, Error> {
let name = extract_webfinger_name(&query.resource, &data)?;
2024-04-18 03:41:52 +02:00
let db_user = data.read_user(name).await?;
2024-04-09 19:48:18 +02:00
Ok(HttpResponse::Ok().json(build_webfinger_response(
query.resource.clone(),
2024-04-18 03:41:52 +02:00
Url::parse(&db_user.id)?,
2024-04-09 19:48:18 +02:00
)))
}