Add option to disable strict allowlist (fixes #1486) (#1581)

* Add option to disable strict allowlist (fixes #1486)

* adjust docs
This commit is contained in:
Nutomic 2021-04-21 13:36:07 +00:00 committed by GitHub
parent 65a11a7239
commit 8bb3ba4a16
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
16 changed files with 54 additions and 47 deletions

View file

@ -65,11 +65,13 @@
# Allows and blocks are described here: # Allows and blocks are described here:
# https://join.lemmy.ml/docs/en/federation/administration.html#instance-allowlist-and-blocklist # https://join.lemmy.ml/docs/en/federation/administration.html#instance-allowlist-and-blocklist
# #
# comma separated list of instances with which federation is allowed # list of instances with which federation is allowed
# Only one of these blocks should be uncommented
# allowed_instances: ["instance1.tld","instance2.tld"] # allowed_instances: ["instance1.tld","instance2.tld"]
# comma separated list of instances which are blocked from federating # instances which we never federate anything with (but previously federated objects are unaffected)
# blocked_instances: [] # blocked_instances: []
# If true, only federate with instances on the allowlist and block everything else. If false,
# use allowlist only for remote communities, and posts/comments in local communities.
# strict_allowlist: true
} }
captcha: { captcha: {
enabled: true enabled: true

View file

@ -290,7 +290,7 @@ impl CommunityType for Community {
.map(|i| i.into_inner()) .map(|i| i.into_inner())
.unique() .unique()
// Don't send to blocked instances // Don't send to blocked instances
.filter(|inbox| check_is_apub_id_valid(inbox).is_ok()) .filter(|inbox| check_is_apub_id_valid(inbox, false).is_ok())
.collect(); .collect();
Ok(inboxes) Ok(inboxes)

View file

@ -46,7 +46,7 @@ where
Kind: Serialize, Kind: Serialize,
<T as Extends<Kind>>::Error: From<serde_json::Error> + Send + Sync + 'static, <T as Extends<Kind>>::Error: From<serde_json::Error> + Send + Sync + 'static,
{ {
if check_is_apub_id_valid(&inbox).is_ok() { if check_is_apub_id_valid(&inbox, false).is_ok() {
debug!( debug!(
"Sending activity {:?} to {}", "Sending activity {:?} to {}",
&activity.id_unchecked(), &activity.id_unchecked(),
@ -83,7 +83,7 @@ where
.flatten() .flatten()
.unique() .unique()
.filter(|inbox| inbox.host_str() != Some(&Settings::get().hostname())) .filter(|inbox| inbox.host_str() != Some(&Settings::get().hostname()))
.filter(|inbox| check_is_apub_id_valid(inbox).is_ok()) .filter(|inbox| check_is_apub_id_valid(inbox, false).is_ok())
.map(|inbox| inbox.to_owned()) .map(|inbox| inbox.to_owned())
.collect(); .collect();
debug!( debug!(
@ -124,7 +124,7 @@ where
.await?; .await?;
} else { } else {
let inbox = community.get_shared_inbox_or_inbox_url(); let inbox = community.get_shared_inbox_or_inbox_url();
check_is_apub_id_valid(&inbox)?; check_is_apub_id_valid(&inbox, false)?;
debug!( debug!(
"Sending activity {:?} to community {}", "Sending activity {:?} to community {}",
&activity.id_unchecked(), &activity.id_unchecked(),
@ -160,7 +160,7 @@ where
); );
let mentions = mentions let mentions = mentions
.iter() .iter()
.filter(|inbox| check_is_apub_id_valid(inbox).is_ok()) .filter(|inbox| check_is_apub_id_valid(inbox, false).is_ok())
.map(|i| i.to_owned()) .map(|i| i.to_owned())
.collect(); .collect();
send_activity_internal( send_activity_internal(

View file

@ -59,7 +59,7 @@ where
if *recursion_counter > MAX_REQUEST_NUMBER { if *recursion_counter > MAX_REQUEST_NUMBER {
return Err(LemmyError::from(anyhow!("Maximum recursion depth reached")).into()); return Err(LemmyError::from(anyhow!("Maximum recursion depth reached")).into());
} }
check_is_apub_id_valid(&url)?; check_is_apub_id_valid(&url, false)?;
let timeout = Duration::from_secs(60); let timeout = Duration::from_secs(60);

View file

@ -65,8 +65,7 @@ pub static APUB_JSON_CONTENT_TYPE: &str = "application/activity+json";
/// - URL being in the allowlist (if it is active) /// - URL being in the allowlist (if it is active)
/// - URL not being in the blocklist (if it is active) /// - URL not being in the blocklist (if it is active)
/// ///
/// Note that only one of allowlist and blacklist can be enabled, not both. pub fn check_is_apub_id_valid(apub_id: &Url, use_strict_allowlist: bool) -> Result<(), LemmyError> {
pub fn check_is_apub_id_valid(apub_id: &Url) -> Result<(), LemmyError> {
let settings = Settings::get(); let settings = Settings::get();
let domain = apub_id.domain().context(location_info!())?.to_string(); let domain = apub_id.domain().context(location_info!())?.to_string();
let local_instance = settings.get_hostname_without_port()?; let local_instance = settings.get_hostname_without_port()?;
@ -95,30 +94,33 @@ pub fn check_is_apub_id_valid(apub_id: &Url) -> Result<(), LemmyError> {
return Err(anyhow!("invalid apub id scheme {}: {}", apub_id.scheme(), apub_id).into()); return Err(anyhow!("invalid apub id scheme {}: {}", apub_id.scheme(), apub_id).into());
} }
let allowed_instances = Settings::get().get_allowed_instances(); // TODO: might be good to put the part above in one method, and below in another
let blocked_instances = Settings::get().get_blocked_instances(); // (which only gets called in apub::objects)
// -> no that doesnt make sense, we still need the code below for blocklist and strict allowlist
if allowed_instances.is_none() && blocked_instances.is_none() { if let Some(blocked) = Settings::get().get_blocked_instances() {
Ok(())
} else if let Some(mut allowed) = allowed_instances {
// need to allow this explicitly because apub receive might contain objects from our local
// instance. split is needed to remove the port in our federation test setup.
allowed.push(local_instance);
if allowed.contains(&domain) {
Ok(())
} else {
Err(anyhow!("{} not in federation allowlist", domain).into())
}
} else if let Some(blocked) = blocked_instances {
if blocked.contains(&domain) { if blocked.contains(&domain) {
Err(anyhow!("{} is in federation blocklist", domain).into()) return Err(anyhow!("{} is in federation blocklist", domain).into());
} else {
Ok(())
} }
} else {
panic!("Invalid config, both allowed_instances and blocked_instances are specified");
} }
if let Some(mut allowed) = Settings::get().get_allowed_instances() {
// Only check allowlist if this is a community, or strict allowlist is enabled.
let strict_allowlist = Settings::get()
.federation()
.strict_allowlist
.unwrap_or(true);
if use_strict_allowlist || strict_allowlist {
// need to allow this explicitly because apub receive might contain objects from our local
// instance.
allowed.push(local_instance);
if !allowed.contains(&domain) {
return Err(anyhow!("{} not in federation allowlist", domain).into());
}
}
}
Ok(())
} }
/// Common functions for ActivityPub objects, which are implemented by most (but not all) objects /// Common functions for ActivityPub objects, which are implemented by most (but not all) objects

View file

@ -1,6 +1,7 @@
use crate::{ use crate::{
extensions::context::lemmy_context, extensions::context::lemmy_context,
fetcher::objects::{get_or_fetch_and_insert_comment, get_or_fetch_and_insert_post}, fetcher::objects::{get_or_fetch_and_insert_comment, get_or_fetch_and_insert_post},
get_community_from_to_or_cc,
objects::{ objects::{
check_object_domain, check_object_domain,
check_object_for_community_or_site_ban, check_object_for_community_or_site_ban,
@ -145,6 +146,8 @@ impl FromApubToForm<NoteExt> for CommentForm {
request_counter: &mut i32, request_counter: &mut i32,
_mod_action_allowed: bool, _mod_action_allowed: bool,
) -> Result<CommentForm, LemmyError> { ) -> Result<CommentForm, LemmyError> {
let community = get_community_from_to_or_cc(note, context, request_counter).await?;
let ap_id = Some(check_object_domain(note, expected_domain, community.local)?);
let creator_actor_id = &note let creator_actor_id = &note
.attributed_to() .attributed_to()
.context(location_info!())? .context(location_info!())?
@ -202,7 +205,7 @@ impl FromApubToForm<NoteExt> for CommentForm {
published: note.published().map(|u| u.to_owned().naive_local()), published: note.published().map(|u| u.to_owned().naive_local()),
updated: note.updated().map(|u| u.to_owned().naive_local()), updated: note.updated().map(|u| u.to_owned().naive_local()),
deleted: None, deleted: None,
ap_id: Some(check_object_domain(note, expected_domain)?), ap_id,
local: Some(false), local: Some(false),
}) })
} }

View file

@ -203,7 +203,7 @@ impl FromApubToForm<GroupExt> for CommunityForm {
updated: group.inner.updated().map(|u| u.to_owned().naive_local()), updated: group.inner.updated().map(|u| u.to_owned().naive_local()),
deleted: None, deleted: None,
nsfw: Some(group.ext_one.sensitive.unwrap_or(false)), nsfw: Some(group.ext_one.sensitive.unwrap_or(false)),
actor_id: Some(check_object_domain(group, expected_domain)?), actor_id: Some(check_object_domain(group, expected_domain, true)?),
local: Some(false), local: Some(false),
private_key: None, private_key: None,
public_key: Some(group.ext_two.to_owned().public_key.public_key_pem), public_key: Some(group.ext_two.to_owned().public_key.public_key_pem),

View file

@ -98,13 +98,14 @@ where
pub(in crate::objects) fn check_object_domain<T, Kind>( pub(in crate::objects) fn check_object_domain<T, Kind>(
apub: &T, apub: &T,
expected_domain: Url, expected_domain: Url,
use_strict_allowlist: bool,
) -> Result<DbUrl, LemmyError> ) -> Result<DbUrl, LemmyError>
where where
T: Base + AsBase<Kind>, T: Base + AsBase<Kind>,
{ {
let domain = expected_domain.domain().context(location_info!())?; let domain = expected_domain.domain().context(location_info!())?;
let object_id = apub.id(domain)?.context(location_info!())?; let object_id = apub.id(domain)?.context(location_info!())?;
check_is_apub_id_valid(object_id)?; check_is_apub_id_valid(object_id, use_strict_allowlist)?;
Ok(object_id.to_owned().into()) Ok(object_id.to_owned().into())
} }

View file

@ -189,7 +189,7 @@ impl FromApubToForm<PersonExt> for PersonForm {
banner: banner.map(|o| o.map(|i| i.into())), banner: banner.map(|o| o.map(|i| i.into())),
published: person.inner.published().map(|u| u.to_owned().naive_local()), published: person.inner.published().map(|u| u.to_owned().naive_local()),
updated: person.updated().map(|u| u.to_owned().naive_local()), updated: person.updated().map(|u| u.to_owned().naive_local()),
actor_id: Some(check_object_domain(person, expected_domain)?), actor_id: Some(check_object_domain(person, expected_domain, false)?),
bio: Some(bio), bio: Some(bio),
local: Some(false), local: Some(false),
admin: Some(false), admin: Some(false),

View file

@ -143,12 +143,13 @@ impl FromApubToForm<PageExt> for PostForm {
request_counter: &mut i32, request_counter: &mut i32,
mod_action_allowed: bool, mod_action_allowed: bool,
) -> Result<PostForm, LemmyError> { ) -> Result<PostForm, LemmyError> {
let community = get_community_from_to_or_cc(page, context, request_counter).await?;
let ap_id = if mod_action_allowed { let ap_id = if mod_action_allowed {
let id = page.id_unchecked().context(location_info!())?; let id = page.id_unchecked().context(location_info!())?;
check_is_apub_id_valid(id)?; check_is_apub_id_valid(id, community.local)?;
id.to_owned().into() id.to_owned().into()
} else { } else {
check_object_domain(page, expected_domain)? check_object_domain(page, expected_domain, community.local)?
}; };
let ext = &page.ext_one; let ext = &page.ext_one;
let creator_actor_id = page let creator_actor_id = page
@ -162,8 +163,6 @@ impl FromApubToForm<PageExt> for PostForm {
let creator = let creator =
get_or_fetch_and_upsert_person(creator_actor_id, context, request_counter).await?; get_or_fetch_and_upsert_person(creator_actor_id, context, request_counter).await?;
let community = get_community_from_to_or_cc(page, context, request_counter).await?;
let thumbnail_url: Option<Url> = match &page.inner.image() { let thumbnail_url: Option<Url> = match &page.inner.image() {
Some(any_image) => Image::from_any_base( Some(any_image) => Image::from_any_base(
any_image any_image

View file

@ -1,5 +1,4 @@
use crate::{ use crate::{
check_is_apub_id_valid,
extensions::context::lemmy_context, extensions::context::lemmy_context,
fetcher::person::get_or_fetch_and_upsert_person, fetcher::person::get_or_fetch_and_upsert_person,
objects::{ objects::{
@ -116,8 +115,7 @@ impl FromApubToForm<NoteExt> for PrivateMessageForm {
.context(location_info!())?; .context(location_info!())?;
let recipient = let recipient =
get_or_fetch_and_upsert_person(&recipient_actor_id, context, request_counter).await?; get_or_fetch_and_upsert_person(&recipient_actor_id, context, request_counter).await?;
let ap_id = note.id_unchecked().context(location_info!())?.to_string(); let ap_id = Some(check_object_domain(note, expected_domain, false)?);
check_is_apub_id_valid(&Url::parse(&ap_id)?)?;
let content = get_source_markdown_value(note)?.context(location_info!())?; let content = get_source_markdown_value(note)?.context(location_info!())?;
@ -129,7 +127,7 @@ impl FromApubToForm<NoteExt> for PrivateMessageForm {
updated: note.updated().map(|u| u.to_owned().naive_local()), updated: note.updated().map(|u| u.to_owned().naive_local()),
deleted: None, deleted: None,
read: None, read: None,
ap_id: Some(check_object_domain(note, expected_domain)?), ap_id,
local: Some(false), local: Some(false),
}) })
} }

View file

@ -220,7 +220,7 @@ where
.to_owned() .to_owned()
.single_xsd_any_uri() .single_xsd_any_uri()
.context(location_info!())?; .context(location_info!())?;
check_is_apub_id_valid(&person_id)?; check_is_apub_id_valid(&person_id, false)?;
// check that the sender is a person, not a community // check that the sender is a person, not a community
get_or_fetch_and_upsert_person(&person_id, &context, request_counter).await?; get_or_fetch_and_upsert_person(&person_id, &context, request_counter).await?;

View file

@ -85,7 +85,7 @@ where
.to_owned() .to_owned()
.single_xsd_any_uri() .single_xsd_any_uri()
.context(location_info!())?; .context(location_info!())?;
check_is_apub_id_valid(&actor_id)?; check_is_apub_id_valid(&actor_id, false)?;
let actor = get_or_fetch_and_upsert_actor(&actor_id, &context, request_counter).await?; let actor = get_or_fetch_and_upsert_actor(&actor_id, &context, request_counter).await?;
verify_signature(&request, actor.as_ref())?; verify_signature(&request, actor.as_ref())?;
Ok(actor) Ok(actor)

View file

@ -302,7 +302,7 @@ pub async fn receive_announce(
.context(location_info!())?; .context(location_info!())?;
let inner_id = inner_activity.id().context(location_info!())?.to_owned(); let inner_id = inner_activity.id().context(location_info!())?.to_owned();
check_is_apub_id_valid(&inner_id)?; check_is_apub_id_valid(&inner_id, false)?;
if is_activity_already_known(context.pool(), &inner_id).await? { if is_activity_already_known(context.pool(), &inner_id).await? {
return Ok(()); return Ok(());
} }

View file

@ -49,6 +49,7 @@ impl Default for FederationConfig {
enabled: false, enabled: false,
allowed_instances: None, allowed_instances: None,
blocked_instances: None, blocked_instances: None,
strict_allowlist: Some(true),
} }
} }
} }

View file

@ -77,6 +77,7 @@ pub struct FederationConfig {
pub enabled: bool, pub enabled: bool,
pub allowed_instances: Option<Vec<String>>, pub allowed_instances: Option<Vec<String>>,
pub blocked_instances: Option<Vec<String>>, pub blocked_instances: Option<Vec<String>>,
pub strict_allowlist: Option<bool>,
} }
#[derive(Debug, Deserialize, Clone)] #[derive(Debug, Deserialize, Clone)]