Compare commits

...

12 commits

Author SHA1 Message Date
754b2a0f3d Revert Object trait id() ref 2026-04-25 22:40:47 -07:00
Felix Ableitner
588f431266 Version 0.7.0-beta.11 2026-04-24 11:31:10 +02:00
Hong Minhee (洪 民憙)
838dd9e501
Add a public-aware deserializer for recipient URLs (#165)
* Accept Public aliases in URL deserializer

Update deserialize_one_or_many to deserialize recipient URL fields while
accepting `Public` and `as:Public` as aliases for the canonical
ActivityStreams public URL.

Add focused tests for single and array inputs, and verify that unrelated
string fields such as `content` are left unchanged.

https://github.com/LemmyNet/lemmy/issues/6465

* Deduplicate deserialized recipients

Drop repeated recipient URLs after deserialization so equivalent public
aliases such as `Public`, `as:Public`, and the canonical public URL do
not produce duplicate entries.

Update the helper documentation and tests to match the deduplicated
result.
2026-04-24 11:25:06 +02:00
Felix Ableitner
279d29d350 Version 0.7.0-beta.10 2026-04-15 13:39:03 +02:00
Nutomic
fcb69ebffe
Make IP check public (#164)
* Make IP check public

* change
2026-04-15 13:38:29 +02:00
Felix Ableitner
5e8e918003 Version 0.7.0-beta.9 2026-03-16 11:39:46 +01:00
Nutomic
4ae8532b17
Add some more IP checks (#162) 2026-03-16 11:11:01 +01:00
Nutomic
f47fe58285
Better IP check (#161) 2026-02-05 07:04:08 -05:00
Nutomic
f60afae428
Add to_canonical() for ip check (#160) 2026-02-04 12:05:59 +01:00
Nutomic
11f95ff384
Improve error message, allow local IP federation via env var (#158)
* Improve error message, allow local IP federation via env var (fixes #152)

* fix
2026-01-28 08:44:39 -05:00
Nutomic
9d7bd965a4
Upgrade reqwest (#159) 2026-01-28 14:40:03 +01:00
Nutomic
b5dd86ab07
Update deps (#157) 2026-01-12 08:44:16 -05:00
18 changed files with 1251 additions and 913 deletions

View file

@ -1,5 +1,5 @@
variables: variables:
- &rust_image "rust:1.81-bullseye" - &rust_image "rust:1.91-bullseye"
steps: steps:
cargo_fmt: cargo_fmt:

1816
Cargo.lock generated

File diff suppressed because it is too large Load diff

View file

@ -1,6 +1,6 @@
[package] [package]
name = "activitypub_federation" name = "activitypub_federation"
version = "0.7.0-beta.8" version = "0.7.0-beta.11"
edition = "2021" edition = "2021"
description = "High-level Activitypub framework" description = "High-level Activitypub framework"
keywords = ["activitypub", "activitystreams", "federation", "fediverse"] keywords = ["activitypub", "activitystreams", "federation", "fediverse"]
@ -14,10 +14,6 @@ actix-web = ["dep:actix-web", "dep:http02"]
axum = ["dep:axum", "dep:tower"] axum = ["dep:axum", "dep:tower"]
axum-original-uri = ["dep:axum", "axum/original-uri"] axum-original-uri = ["dep:axum", "axum/original-uri"]
[lints.rust]
warnings = "deny"
deprecated = "deny"
[lints.clippy] [lints.clippy]
perf = { level = "deny", priority = -1 } perf = { level = "deny", priority = -1 }
complexity = { level = "deny", priority = -1 } complexity = { level = "deny", priority = -1 }
@ -32,69 +28,71 @@ redundant_closure_for_method_calls = "deny"
unwrap_used = "deny" unwrap_used = "deny"
[dependencies] [dependencies]
chrono = { version = "0.4.41", features = ["clock"], default-features = false } chrono = { version = "0.4.42", features = ["clock"], default-features = false }
serde = { version = "1.0.219", features = ["derive"] } serde = { version = "1.0.228", features = ["derive"] }
async-trait = "0.1.88" async-trait = "0.1.89"
url = { version = "2.5.4", features = ["serde"] } url = { version = "2.5.8", features = ["serde"] }
serde_json = { version = "1.0.140", features = ["preserve_order"] } serde_json = { version = "1.0.149", features = ["preserve_order"] }
reqwest = { version = "0.12.18", default-features = false, features = [ reqwest = { version = "0.13.1", default-features = false, features = [
"json", "json",
"stream", "stream",
"rustls-tls",
] } ] }
reqwest-middleware = "0.4.2" reqwest-middleware = "0.5.0"
tracing = "0.1.41" tracing = "0.1.44"
base64 = "0.22.1" base64 = "0.22.1"
rand = "0.8.5" rand = "0.8.5"
rsa = "0.9.8" rsa = "0.9.10"
http = "1.3.1" http = "1.4.0"
sha2 = { version = "0.10.9", features = ["oid"] } sha2 = { version = "0.10.9", features = ["oid"] }
thiserror = "2.0.12" thiserror = "2.0.17"
derive_builder = "0.20.2" derive_builder = "0.20.2"
itertools = "0.14.0" itertools = "0.14.0"
dyn-clone = "1.0.19" dyn-clone = "1.0.20"
enum_delegate = "0.2.0" enum_delegate = "0.2.0"
httpdate = "1.0.3" httpdate = "1.0.3"
http-signature-normalization-reqwest = { version = "0.13.0", default-features = false, features = [ http-signature-normalization-reqwest = { version = "0.14.0", default-features = false, features = [
"sha-2", "sha-2",
"middleware", "middleware",
"default-spawner", "default-spawner",
] } ] }
http-signature-normalization = "0.7.0" http-signature-normalization = "0.7.0"
bytes = "1.10.1" bytes = "1.11.0"
futures-core = { version = "0.3.31", default-features = false } futures-core = { version = "0.3.31", default-features = false }
pin-project-lite = "0.2.16" pin-project-lite = "0.2.16"
activitystreams-kinds = "0.3.0" activitystreams-kinds = "0.3.0"
regex = { version = "1.11.1", default-features = false, features = [ regex = { version = "1.12.2", default-features = false, features = [
"std", "std",
"unicode", "unicode",
] } ] }
tokio = { version = "1.45.0", features = [ tokio = { version = "1.49.0", features = [
"sync", "sync",
"rt", "rt",
"rt-multi-thread", "rt-multi-thread",
"time", "time",
] } ] }
futures = "0.3.31" futures = "0.3.31"
moka = { version = "0.12.10", features = ["future"] } moka = { version = "0.12.12", features = ["future"] }
either = "1.15.0" either = "1.15.0"
# Actix-web # Actix-web
actix-web = { version = "4.11.0", default-features = false, optional = true } actix-web = { version = "4.12.1", default-features = false, optional = true }
http02 = { package = "http", version = "0.2.12", optional = true } http02 = { package = "http", version = "0.2.12", optional = true }
# Axum # Axum
axum = { version = "0.8.4", features = [ axum = { version = "0.8.8", features = [
"json", "json",
], default-features = false, optional = true } ], default-features = false, optional = true }
tower = { version = "0.5.2", optional = true } tower = { version = "0.5.2", optional = true }
[dev-dependencies] [dev-dependencies]
anyhow = "1.0.98" anyhow = "1.0.100"
axum = { version = "0.8.4", features = ["macros"] } axum = { version = "0.8.8", features = ["macros"] }
axum-extra = { version = "0.10.1", features = ["typed-header"] } axum-extra = { version = "0.12.5", features = ["typed-header"] }
env_logger = "0.11.8" env_logger = "0.11.8"
tokio = { version = "1.45.0", features = ["full"] } tokio = { version = "1.49.0", features = ["full"] }
reqwest = { version = "0.13.1",features = [
"rustls"
] }
[profile.dev] [profile.dev]
strip = "symbols" strip = "symbols"

View file

@ -32,10 +32,10 @@ impl Object for SearchableDbObjects {
type Kind = SearchableObjects; type Kind = SearchableObjects;
type Error = anyhow::Error; type Error = anyhow::Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
match self { match self {
SearchableDbObjects::User(p) => &p.federation_id, SearchableDbObjects::User(p) => p.federation_id.clone(),
SearchableDbObjects::Post(n) => &n.federation_id, SearchableDbObjects::Post(n) => n.federation_id.clone(),
} }
} }

View file

@ -69,8 +69,8 @@ impl Object for DbUser {
type Kind = Person; type Kind = Person;
type Error = Error; type Error = Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
self.ap_id.inner() self.ap_id.inner().clone()
} }
fn last_refreshed_at(&self) -> Option<DateTime<Utc>> { fn last_refreshed_at(&self) -> Option<DateTime<Utc>> {

View file

@ -50,8 +50,8 @@ impl Object for DbPost {
type Kind = Note; type Kind = Note;
type Error = Error; type Error = Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
self.ap_id.inner() self.ap_id.inner().clone()
} }
async fn read_from_id( async fn read_from_id(

View file

@ -134,8 +134,8 @@ impl Object for DbUser {
type Kind = Person; type Kind = Person;
type Error = Error; type Error = Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
self.ap_id.inner() self.ap_id.inner().clone()
} }
fn last_refreshed_at(&self) -> Option<DateTime<Utc>> { fn last_refreshed_at(&self) -> Option<DateTime<Utc>> {

View file

@ -47,8 +47,8 @@ impl Object for DbPost {
type Kind = Note; type Kind = Note;
type Error = Error; type Error = Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
self.ap_id.inner() self.ap_id.inner().clone()
} }
async fn read_from_id( async fn read_from_id(

View file

@ -190,7 +190,7 @@ where
// PKey is internally like an Arc<>, so cloning is ok // PKey is internally like an Arc<>, so cloning is ok
data.config data.config
.actor_pkey_cache .actor_pkey_cache
.try_get_with_by_ref(actor_id, async { .try_get_with_by_ref(&actor_id, async {
let private_key_pem = actor.private_key_pem().ok_or_else(|| { let private_key_pem = actor.private_key_pem().ok_or_else(|| {
Error::Other(format!( Error::Other(format!(
"Actor {actor_id} does not contain a private key for signing" "Actor {actor_id} does not contain a private key for signing"

View file

@ -20,6 +20,7 @@ use crate::{
http_signatures::sign_request, http_signatures::sign_request,
protocol::verification::verify_domains_match, protocol::verification::verify_domains_match,
traits::{Activity, Actor}, traits::{Activity, Actor},
utils::validate_ip,
}; };
use async_trait::async_trait; use async_trait::async_trait;
use bytes::Bytes; use bytes::Bytes;
@ -32,7 +33,6 @@ use reqwest_middleware::{ClientWithMiddleware, RequestBuilder};
use rsa::{pkcs8::DecodePrivateKey, RsaPrivateKey}; use rsa::{pkcs8::DecodePrivateKey, RsaPrivateKey};
use serde::de::DeserializeOwned; use serde::de::DeserializeOwned;
use std::{ use std::{
net::IpAddr,
ops::Deref, ops::Deref,
sync::{ sync::{
atomic::{AtomicU32, Ordering}, atomic::{AtomicU32, Ordering},
@ -41,7 +41,6 @@ use std::{
}, },
time::Duration, time::Duration,
}; };
use tokio::net::lookup_host;
use url::Url; use url::Url;
/// Configuration for this library, with various federation related settings /// Configuration for this library, with various federation related settings
@ -183,30 +182,9 @@ impl<T: Clone> FederationConfig<T> {
return Err(Error::UrlVerificationError("Explicit port is not allowed")); return Err(Error::UrlVerificationError("Explicit port is not allowed"));
} }
// Resolve domain and see if it points to private IP let allow_local = std::env::var("DANGER_FEDERATION_ALLOW_LOCAL_IP").is_ok();
// TODO: Use is_global() once stabilized if !allow_local && validate_ip(&url).await.is_err() {
// https://doc.rust-lang.org/std/net/enum.IpAddr.html#method.is_global return Err(Error::DomainResolveError(domain.to_string()));
let invalid_ip =
lookup_host((domain.to_owned(), 80))
.await?
.any(|addr| match addr.ip() {
IpAddr::V4(addr) => {
addr.is_private()
|| addr.is_link_local()
|| addr.is_loopback()
|| addr.is_multicast()
}
IpAddr::V6(addr) => {
addr.is_loopback()
|| addr.is_multicast()
|| ((addr.segments()[0] & 0xfe00) == 0xfc00) // is_unique_local
|| ((addr.segments()[0] & 0xffc0) == 0xfe80) // is_unicast_link_local
}
});
if invalid_ip {
return Err(Error::UrlVerificationError(
"Localhost is only allowed in debug mode",
));
} }
} }
@ -400,6 +378,15 @@ impl<T: Clone> Data<T> {
) )
.await .await
} }
/// Resolve domain of the url and throw error if it points to local/private IP.
pub async fn is_valid_ip(&self, url: &Url) -> Result<(), Error> {
if self.config.debug {
return Ok(());
}
validate_ip(url).await
}
} }
impl<T: Clone> Deref for Data<T> { impl<T: Clone> Deref for Data<T> {

View file

@ -28,6 +28,9 @@ pub enum Error {
/// url verification error /// url verification error
#[error("URL failed verification: {0}")] #[error("URL failed verification: {0}")]
UrlVerificationError(&'static str), UrlVerificationError(&'static str),
/// Resolving domain points to local IP.
#[error("Resolving domain {0} points to local IP address. This may indicate an attacker attempting to access internal services. If intentional, you can ignore this error by setting DANGER_FEDERATION_ALLOW_LOCAL_IP=1")]
DomainResolveError(String),
/// Incoming activity has invalid digest for body /// Incoming activity has invalid digest for body
#[error("Incoming activity has invalid digest for body")] #[error("Incoming activity has invalid digest for body")]
ActivityBodyDigestInvalid, ActivityBodyDigestInvalid,

View file

@ -23,6 +23,7 @@ pub mod http_signatures;
pub mod protocol; pub mod protocol;
pub(crate) mod reqwest_shim; pub(crate) mod reqwest_shim;
pub mod traits; pub mod traits;
mod utils;
use crate::{ use crate::{
config::Data, config::Data,

View file

@ -1,13 +1,22 @@
//! Serde deserialization functions which help to receive differently shaped data //! Serde deserialization functions which help to receive differently shaped data
use serde::{Deserialize, Deserializer}; use activitystreams_kinds::public;
use itertools::Itertools;
use serde::{de::Error, Deserialize, Deserializer};
use serde_json::Value;
use url::Url;
/// Deserialize JSON single value or array into Vec. /// Deserialize JSON single value or array into `Vec<Url>`.
/// ///
/// Useful if your application can handle multiple values for a field, but another federated /// Useful if your application can handle multiple values for a field, but another federated
/// platform only sends a single one. /// platform only sends a single one.
/// ///
/// Also accepts common `Public` aliases for recipient fields. Some implementations send `Public`
/// or `as:Public` instead of the canonical `https://www.w3.org/ns/activitystreams#Public` URL
/// in fields such as `to` and `cc`.
///
/// ``` /// ```
/// # use activitypub_federation::kinds::public;
/// # use activitypub_federation::protocol::helpers::deserialize_one_or_many; /// # use activitypub_federation::protocol::helpers::deserialize_one_or_many;
/// # use url::Url; /// # use url::Url;
/// #[derive(serde::Deserialize)] /// #[derive(serde::Deserialize)]
@ -25,24 +34,39 @@ use serde::{Deserialize, Deserializer};
/// "https://lemmy.ml/u/bob" /// "https://lemmy.ml/u/bob"
/// ]}"#)?; /// ]}"#)?;
/// assert_eq!(multiple.to.len(), 2); /// assert_eq!(multiple.to.len(), 2);
/// Ok::<(), anyhow::Error>(()) ///
pub fn deserialize_one_or_many<'de, T, D>(deserializer: D) -> Result<Vec<T>, D::Error> /// let note: Note = serde_json::from_str(r#"{"to": ["Public", "as:Public"]}"#)?;
/// assert_eq!(note.to, vec![public()]);
/// # Ok::<(), anyhow::Error>(())
/// ```
pub fn deserialize_one_or_many<'de, D>(deserializer: D) -> Result<Vec<Url>, D::Error>
where where
T: Deserialize<'de>,
D: Deserializer<'de>, D: Deserializer<'de>,
{ {
#[derive(Deserialize)] #[derive(Deserialize)]
#[serde(untagged)] #[serde(untagged)]
enum OneOrMany<T> { enum OneOrMany {
One(T), Many(Vec<Value>),
Many(Vec<T>), One(Value),
} }
let result: OneOrMany<T> = Deserialize::deserialize(deserializer)?; let result: OneOrMany = Deserialize::deserialize(deserializer)?;
Ok(match result { let values = match result {
OneOrMany::Many(list) => list,
OneOrMany::One(value) => vec![value], OneOrMany::One(value) => vec![value],
OneOrMany::Many(values) => values,
};
values
.into_iter()
.map(|value| match value {
Value::String(value) if matches!(value.as_str(), "Public" | "as:Public") => {
Ok(public())
}
Value::String(value) => Url::parse(&value).map_err(D::Error::custom),
value => Url::deserialize(value).map_err(D::Error::custom),
}) })
.collect::<Result<Vec<_>, _>>()
.map(|values| values.into_iter().unique().collect())
} }
/// Deserialize JSON single value or single element array into single value. /// Deserialize JSON single value or single element array into single value.
@ -140,6 +164,11 @@ where
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::deserialize_one_or_many;
use activitystreams_kinds::public;
use anyhow::Result;
use serde::Deserialize;
#[test] #[test]
fn deserialize_one_multiple_values() { fn deserialize_one_multiple_values() {
use crate::protocol::helpers::deserialize_one; use crate::protocol::helpers::deserialize_one;
@ -155,4 +184,70 @@ mod tests {
); );
assert!(note.is_err()); assert!(note.is_err());
} }
#[test]
fn deserialize_one_or_many_single_public_aliases() -> Result<()> {
use url::Url;
#[derive(Deserialize)]
struct Note {
#[serde(deserialize_with = "deserialize_one_or_many")]
to: Vec<Url>,
}
for alias in ["Public", "as:Public"] {
let note = serde_json::from_str::<Note>(&format!(r#"{{"to": "{alias}"}}"#))?;
assert_eq!(note.to, vec![public()]);
}
Ok(())
}
#[test]
fn deserialize_one_or_many_array() -> Result<()> {
use url::Url;
#[derive(Deserialize)]
struct Note {
#[serde(deserialize_with = "deserialize_one_or_many")]
to: Vec<Url>,
}
let note = serde_json::from_str::<Note>(
r#"{
"to": [
"https://example.com/c/main",
"Public",
"as:Public",
"https://www.w3.org/ns/activitystreams#Public"
]
}"#,
)?;
assert_eq!(
note.to,
vec![Url::parse("https://example.com/c/main")?, public(),]
);
Ok(())
}
#[test]
fn deserialize_one_or_many_leaves_other_strings_unchanged() -> Result<()> {
use url::Url;
#[derive(Deserialize)]
struct Note {
#[serde(deserialize_with = "deserialize_one_or_many")]
to: Vec<Url>,
content: String,
}
let note = serde_json::from_str::<Note>(r#"{"to": "Public", "content": "Public"}"#)?;
assert_eq!(note.to, vec![public()]);
assert_eq!(note.content, "Public");
Ok(())
}
} }

View file

@ -30,7 +30,7 @@ where
type Error = E; type Error = E;
/// `id` field of the object /// `id` field of the object
fn id(&self) -> &Url { fn id(&self) -> Url {
match self { match self {
Either::Left(l) => l.id(), Either::Left(l) => l.id(),
Either::Right(r) => r.id(), Either::Right(r) => r.id(),

View file

@ -53,7 +53,7 @@ pub mod tests;
/// type Kind = Note; /// type Kind = Note;
/// type Error = anyhow::Error; /// type Error = anyhow::Error;
/// ///
/// fn id(&self) -> &Url { self.ap_id.inner() } /// fn id(&self) -> Url { self.ap_id.inner().clone() }
/// ///
/// async fn read_from_id(object_id: Url, data: &Data<Self::DataType>) -> Result<Option<Self>, Self::Error> { /// async fn read_from_id(object_id: Url, data: &Data<Self::DataType>) -> Result<Option<Self>, Self::Error> {
/// // Attempt to read object from local database. Return Ok(None) if not found. /// // Attempt to read object from local database. Return Ok(None) if not found.
@ -110,7 +110,7 @@ pub trait Object: Sized + Debug {
type Error; type Error;
/// `id` field of the object /// `id` field of the object
fn id(&self) -> &Url; fn id(&self) -> Url;
/// Returns the last time this object was updated. /// Returns the last time this object was updated.
/// ///
@ -194,8 +194,8 @@ pub trait Object: Sized + Debug {
redirect_remote_object, redirect_remote_object,
}; };
let id = self.id(); let id = self.id();
let res = if !data.config.is_local_url(id) { let res = if !data.config.is_local_url(&id) {
redirect_remote_object(id) redirect_remote_object(&id)
} else if !self.is_deleted() { } else if !self.is_deleted() {
let json = self.into_json(data).await?; let json = self.into_json(data).await?;
create_http_response(json, federation_context)? create_http_response(json, federation_context)?

View file

@ -73,8 +73,8 @@ impl Object for DbUser {
type Kind = Person; type Kind = Person;
type Error = Error; type Error = Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
&self.federation_id self.federation_id.clone()
} }
async fn read_from_id( async fn read_from_id(
@ -179,7 +179,7 @@ impl Object for DbPost {
type Kind = Note; type Kind = Note;
type Error = Error; type Error = Error;
fn id(&self) -> &Url { fn id(&self) -> Url {
todo!() todo!()
} }

78
src/utils.rs Normal file
View file

@ -0,0 +1,78 @@
use std::net::{IpAddr, Ipv4Addr, Ipv6Addr};
use crate::error::Error;
use tokio::net::lookup_host;
use url::{Host, Url};
// TODO: Use is_global() once stabilized
// https://doc.rust-lang.org/std/net/enum.IpAddr.html#method.is_global
pub(crate) async fn validate_ip(url: &Url) -> Result<(), Error> {
let mut ip = vec![];
let host = url
.host()
.ok_or(Error::UrlVerificationError("Url must have a domain"))?;
match host {
Host::Domain(domain) => ip.extend(
lookup_host((domain.to_owned(), 80))
.await?
.map(|s| s.ip().to_canonical()),
),
Host::Ipv4(ipv4) => ip.push(ipv4.into()),
Host::Ipv6(ipv6) => ip.push(ipv6.into()),
};
let invalid_ip = ip.into_iter().any(|addr| match addr {
IpAddr::V4(addr) => v4_is_invalid(addr),
IpAddr::V6(addr) => v6_is_invalid(addr),
});
if invalid_ip {
return Err(Error::DomainResolveError(host.to_string()));
}
Ok(())
}
fn v4_is_invalid(v4: Ipv4Addr) -> bool {
v4.is_private()
|| v4.is_loopback()
|| v4.is_link_local()
|| v4.is_multicast()
|| v4.is_documentation()
|| v4.is_unspecified()
|| v4.is_broadcast()
}
fn v6_is_invalid(v6: Ipv6Addr) -> bool {
v6.is_loopback()
|| v6.is_multicast()
|| v6.is_unique_local()
|| v6.is_unicast_link_local()
|| v6.is_unspecified()
|| v6_is_documentation(v6)
|| v6.to_ipv4_mapped().is_some_and(v4_is_invalid)
}
fn v6_is_documentation(v6: std::net::Ipv6Addr) -> bool {
matches!(
v6.segments(),
[0x2001, 0xdb8, ..] | [0x3fff, 0..=0x0fff, ..]
)
}
#[cfg(test)]
#[allow(clippy::unwrap_used)]
mod test {
use super::*;
#[tokio::test]
async fn test_is_valid_ip() -> Result<(), Error> {
assert!(validate_ip(&Url::parse("http://example.com")?)
.await
.is_ok());
assert!(validate_ip(&Url::parse("http://172.66.147.243")?)
.await
.is_ok());
assert!(validate_ip(&Url::parse("http://localhost")?).await.is_err());
assert!(validate_ip(&Url::parse("http://127.0.0.1")?).await.is_err());
Ok(())
}
}