2021-12-11 22:43:41 -05:00
|
|
|
//! Event persistence and querying
|
2022-09-06 07:12:07 -04:00
|
|
|
use crate::config::Settings;
|
|
|
|
use crate::error::{Error, Result};
|
2023-01-22 10:49:49 -05:00
|
|
|
use crate::event::Event;
|
2022-11-10 17:27:10 -05:00
|
|
|
use crate::notice::Notice;
|
2023-01-22 12:08:12 -05:00
|
|
|
use crate::server::NostrMetrics;
|
2023-02-11 14:26:08 -05:00
|
|
|
use crate::nauthz;
|
2021-12-30 22:07:21 -05:00
|
|
|
use governor::clock::Clock;
|
|
|
|
use governor::{Quota, RateLimiter};
|
2022-01-25 21:39:24 -05:00
|
|
|
use r2d2;
|
2022-12-27 10:48:07 -05:00
|
|
|
use std::sync::Arc;
|
2021-12-30 22:07:21 -05:00
|
|
|
use std::thread;
|
2023-01-22 17:26:54 -05:00
|
|
|
use sqlx::pool::PoolOptions;
|
|
|
|
use sqlx::postgres::PgConnectOptions;
|
|
|
|
use sqlx::ConnectOptions;
|
2023-01-22 10:49:49 -05:00
|
|
|
use crate::repo::sqlite::SqliteRepo;
|
2023-01-24 09:04:42 -05:00
|
|
|
use crate::repo::postgres::{PostgresRepo,PostgresPool};
|
2023-01-22 10:49:49 -05:00
|
|
|
use crate::repo::NostrRepo;
|
2023-01-22 17:26:54 -05:00
|
|
|
use std::time::{Instant, Duration};
|
|
|
|
use tracing::log::LevelFilter;
|
2022-09-28 08:19:59 -04:00
|
|
|
use tracing::{debug, info, trace, warn};
|
2021-12-11 16:48:59 -05:00
|
|
|
|
2022-01-25 21:39:24 -05:00
|
|
|
pub type SqlitePool = r2d2::Pool<r2d2_sqlite::SqliteConnectionManager>;
|
2022-02-12 10:29:25 -05:00
|
|
|
pub type PooledConnection = r2d2::PooledConnection<r2d2_sqlite::SqliteConnectionManager>;
|
2022-02-13 10:35:54 -05:00
|
|
|
|
|
|
|
/// Events submitted from a client, with a return channel for notices
|
|
|
|
pub struct SubmittedEvent {
|
|
|
|
pub event: Event,
|
2022-11-10 17:27:10 -05:00
|
|
|
pub notice_tx: tokio::sync::mpsc::Sender<Notice>,
|
2023-02-06 18:15:27 -05:00
|
|
|
pub source_ip: String,
|
2023-02-11 14:26:08 -05:00
|
|
|
pub origin: Option<String>,
|
|
|
|
pub user_agent: Option<String>,
|
2023-02-14 22:17:48 -05:00
|
|
|
pub auth_pubkey: Option<Vec<u8>>,
|
2022-02-13 10:35:54 -05:00
|
|
|
}
|
|
|
|
|
2021-12-11 22:43:41 -05:00
|
|
|
/// Database file
|
2022-02-12 10:29:25 -05:00
|
|
|
pub const DB_FILE: &str = "nostr.db";
|
2022-12-22 12:40:17 -05:00
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
/// Build repo
|
2022-09-24 10:19:16 -04:00
|
|
|
/// # Panics
|
|
|
|
///
|
|
|
|
/// Will panic if the pool could not be created.
|
2023-01-22 12:08:12 -05:00
|
|
|
pub async fn build_repo(settings: &Settings, metrics: NostrMetrics) -> Arc<dyn NostrRepo> {
|
2023-01-22 10:49:49 -05:00
|
|
|
match settings.database.engine.as_str() {
|
2023-01-22 12:08:12 -05:00
|
|
|
"sqlite" => {Arc::new(build_sqlite_pool(settings, metrics).await)},
|
2023-01-22 17:26:54 -05:00
|
|
|
"postgres" => {Arc::new(build_postgres_pool(settings, metrics).await)},
|
2023-01-22 10:49:49 -05:00
|
|
|
_ => panic!("Unknown database engine"),
|
2022-12-25 11:43:47 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-22 12:08:12 -05:00
|
|
|
async fn build_sqlite_pool(settings: &Settings, metrics: NostrMetrics) -> SqliteRepo {
|
|
|
|
let repo = SqliteRepo::new(settings, metrics);
|
2023-01-22 10:49:49 -05:00
|
|
|
repo.start().await.ok();
|
|
|
|
repo.migrate_up().await.ok();
|
|
|
|
repo
|
2022-12-22 11:11:05 -05:00
|
|
|
}
|
|
|
|
|
2023-01-22 17:26:54 -05:00
|
|
|
async fn build_postgres_pool(settings: &Settings, metrics: NostrMetrics) -> PostgresRepo {
|
|
|
|
let mut options: PgConnectOptions = settings.database.connection.as_str().parse().unwrap();
|
|
|
|
options.log_statements(LevelFilter::Debug);
|
|
|
|
options.log_slow_statements(LevelFilter::Warn, Duration::from_secs(60));
|
|
|
|
|
|
|
|
let pool: PostgresPool = PoolOptions::new()
|
|
|
|
.max_connections(settings.database.max_conn)
|
|
|
|
.min_connections(settings.database.min_conn)
|
|
|
|
.idle_timeout(Duration::from_secs(60))
|
|
|
|
.connect_with(options)
|
|
|
|
.await
|
|
|
|
.unwrap();
|
2023-01-24 09:04:42 -05:00
|
|
|
let repo = PostgresRepo::new(pool, metrics);
|
2023-01-27 20:02:19 -05:00
|
|
|
// Panic on migration failure
|
|
|
|
let version = repo.migrate_up().await.unwrap();
|
|
|
|
info!("Postgres migration completed, at v{}", version);
|
2023-02-17 14:25:56 -05:00
|
|
|
// startup scheduled tasks
|
|
|
|
repo.start().await.ok();
|
2023-01-24 09:04:37 -05:00
|
|
|
repo
|
2023-01-22 17:26:54 -05:00
|
|
|
}
|
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
/// Spawn a database writer that persists events to the `SQLite` store.
|
2021-12-11 16:48:59 -05:00
|
|
|
pub async fn db_writer(
|
2023-01-22 10:49:49 -05:00
|
|
|
repo: Arc<dyn NostrRepo>,
|
2022-09-06 07:12:07 -04:00
|
|
|
settings: Settings,
|
2022-02-13 10:35:54 -05:00
|
|
|
mut event_rx: tokio::sync::mpsc::Receiver<SubmittedEvent>,
|
2021-12-12 11:20:23 -05:00
|
|
|
bcast_tx: tokio::sync::broadcast::Sender<Event>,
|
2022-02-12 10:29:25 -05:00
|
|
|
metadata_tx: tokio::sync::broadcast::Sender<Event>,
|
2021-12-30 22:07:21 -05:00
|
|
|
mut shutdown: tokio::sync::broadcast::Receiver<()>,
|
2023-01-22 10:49:49 -05:00
|
|
|
) -> Result<()> {
|
2022-02-12 10:29:25 -05:00
|
|
|
// are we performing NIP-05 checking?
|
|
|
|
let nip05_active = settings.verified_users.is_active();
|
|
|
|
// are we requriing NIP-05 user verification?
|
|
|
|
let nip05_enabled = settings.verified_users.is_enabled();
|
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
//upgrade_db(&mut pool.get()?)?;
|
|
|
|
|
|
|
|
// Make a copy of the whitelist
|
|
|
|
let whitelist = &settings.authorization.pubkey_whitelist.clone();
|
|
|
|
|
|
|
|
// get rate limit settings
|
|
|
|
let rps_setting = settings.limits.messages_per_sec;
|
|
|
|
let mut most_recent_rate_limit = Instant::now();
|
|
|
|
let mut lim_opt = None;
|
|
|
|
let clock = governor::clock::QuantaClock::default();
|
|
|
|
if let Some(rps) = rps_setting {
|
|
|
|
if rps > 0 {
|
|
|
|
info!("Enabling rate limits for event creation ({}/sec)", rps);
|
|
|
|
let quota = core::num::NonZeroU32::new(rps * 60).unwrap();
|
|
|
|
lim_opt = Some(RateLimiter::direct(Quota::per_minute(quota)));
|
2022-09-06 07:12:07 -04:00
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
}
|
2023-02-11 14:26:08 -05:00
|
|
|
// create a client if GRPC is enabled.
|
|
|
|
// Check with externalized event admitter service, if one is defined.
|
|
|
|
let mut grpc_client = if let Some(svr) = settings.grpc.event_admission_server {
|
|
|
|
Some(nauthz::EventAuthzService::connect(&svr).await)
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
|
|
|
//let gprc_client = settings.grpc.event_admission_server.map(|s| {
|
|
|
|
// event_admitter_connect(&s);
|
|
|
|
// });
|
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
loop {
|
|
|
|
if shutdown.try_recv().is_ok() {
|
|
|
|
info!("shutting down database writer");
|
|
|
|
break;
|
2021-12-30 22:07:21 -05:00
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
// call blocking read on channel
|
|
|
|
let next_event = event_rx.recv().await;
|
|
|
|
// if the channel has closed, we will never get work
|
|
|
|
if next_event.is_none() {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
// track if an event write occurred; this is used to
|
|
|
|
// update the rate limiter
|
|
|
|
let mut event_write = false;
|
|
|
|
let subm_event = next_event.unwrap();
|
|
|
|
let event = subm_event.event;
|
|
|
|
let notice_tx = subm_event.notice_tx;
|
|
|
|
// check if this event is authorized.
|
|
|
|
if let Some(allowed_addrs) = whitelist {
|
|
|
|
// TODO: incorporate delegated pubkeys
|
|
|
|
// if the event address is not in allowed_addrs.
|
|
|
|
if !allowed_addrs.contains(&event.pubkey) {
|
|
|
|
debug!(
|
|
|
|
"rejecting event: {}, unauthorized author",
|
|
|
|
event.get_event_id_prefix()
|
|
|
|
);
|
|
|
|
notice_tx
|
|
|
|
.try_send(Notice::blocked(
|
|
|
|
event.id,
|
|
|
|
"pubkey is not allowed to publish to this relay",
|
|
|
|
))
|
|
|
|
.ok();
|
|
|
|
continue;
|
2022-01-26 22:39:03 -05:00
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
}
|
2022-01-26 22:39:03 -05:00
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
// Check that event kind isn't blacklisted
|
|
|
|
let kinds_blacklist = &settings.limits.event_kind_blacklist.clone();
|
|
|
|
if let Some(event_kind_blacklist) = kinds_blacklist {
|
|
|
|
if event_kind_blacklist.contains(&event.kind) {
|
|
|
|
debug!(
|
|
|
|
"rejecting event: {}, blacklisted kind: {}",
|
|
|
|
&event.get_event_id_prefix(),
|
2023-01-22 11:06:44 -05:00
|
|
|
&event.kind
|
2023-01-22 10:49:49 -05:00
|
|
|
);
|
|
|
|
notice_tx
|
|
|
|
.try_send(Notice::blocked(
|
2023-02-25 11:20:53 -05:00
|
|
|
event.id,
|
|
|
|
"event kind is blocked by relay"
|
|
|
|
))
|
|
|
|
.ok();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that event kind isn't allowlisted
|
|
|
|
let kinds_allowlist = &settings.limits.event_kind_allowlist.clone();
|
|
|
|
if let Some(event_kind_allowlist) = kinds_allowlist {
|
|
|
|
if !event_kind_allowlist.contains(&event.kind) {
|
|
|
|
debug!(
|
|
|
|
"rejecting event: {}, allowlist kind: {}",
|
|
|
|
&event.get_event_id_prefix(),
|
|
|
|
&event.kind
|
|
|
|
);
|
|
|
|
notice_tx
|
|
|
|
.try_send(Notice::blocked(
|
2023-01-22 10:49:49 -05:00
|
|
|
event.id,
|
|
|
|
"event kind is blocked by relay"
|
|
|
|
))
|
|
|
|
.ok();
|
|
|
|
continue;
|
2022-12-24 18:16:55 -05:00
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
}
|
2022-12-24 18:16:55 -05:00
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
// send any metadata events to the NIP-05 verifier
|
|
|
|
if nip05_active && event.is_kind_metadata() {
|
|
|
|
// we are sending this prior to even deciding if we
|
|
|
|
// persist it. this allows the nip05 module to
|
|
|
|
// inspect it, update if necessary, or persist a new
|
|
|
|
// event and broadcast it itself.
|
|
|
|
metadata_tx.send(event.clone()).ok();
|
|
|
|
}
|
2022-02-12 10:29:25 -05:00
|
|
|
|
2023-02-11 14:26:08 -05:00
|
|
|
// get a validation result for use in verification and GPRC
|
|
|
|
let validation = if nip05_active {
|
|
|
|
Some(repo.get_latest_user_verification(&event.pubkey).await)
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2023-01-22 11:06:44 -05:00
|
|
|
// check for NIP-05 verification
|
2023-02-11 14:26:08 -05:00
|
|
|
if nip05_enabled && validation.is_some() {
|
|
|
|
match validation.as_ref().unwrap() {
|
2023-01-22 11:06:44 -05:00
|
|
|
Ok(uv) => {
|
|
|
|
if uv.is_valid(&settings.verified_users) {
|
|
|
|
info!(
|
|
|
|
"new event from verified author ({:?},{:?})",
|
|
|
|
uv.name.to_string(),
|
|
|
|
event.get_author_prefix()
|
|
|
|
);
|
2023-02-11 14:26:08 -05:00
|
|
|
|
2023-01-22 11:06:44 -05:00
|
|
|
} else {
|
|
|
|
info!(
|
|
|
|
"rejecting event, author ({:?} / {:?}) verification invalid (expired/wrong domain)",
|
|
|
|
uv.name.to_string(),
|
2022-02-12 10:29:25 -05:00
|
|
|
event.get_author_prefix()
|
|
|
|
);
|
2022-02-13 10:35:54 -05:00
|
|
|
notice_tx
|
2022-11-10 17:27:10 -05:00
|
|
|
.try_send(Notice::blocked(
|
|
|
|
event.id,
|
2023-01-22 11:06:44 -05:00
|
|
|
"NIP-05 verification is no longer valid (expired/wrong domain)",
|
2022-11-10 17:27:10 -05:00
|
|
|
))
|
2022-02-13 10:35:54 -05:00
|
|
|
.ok();
|
2022-02-12 10:29:25 -05:00
|
|
|
continue;
|
|
|
|
}
|
2023-01-22 11:06:44 -05:00
|
|
|
}
|
|
|
|
Err(Error::SqlError(rusqlite::Error::QueryReturnedNoRows)) => {
|
|
|
|
debug!(
|
|
|
|
"no verification records found for pubkey: {:?}",
|
|
|
|
event.get_author_prefix()
|
|
|
|
);
|
|
|
|
notice_tx
|
|
|
|
.try_send(Notice::blocked(
|
|
|
|
event.id,
|
|
|
|
"NIP-05 verification needed to publish events",
|
|
|
|
))
|
|
|
|
.ok();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
warn!("checking nip05 verification status failed: {:?}", e);
|
|
|
|
continue;
|
2022-02-12 10:29:25 -05:00
|
|
|
}
|
|
|
|
}
|
2023-01-22 11:06:44 -05:00
|
|
|
}
|
2023-02-11 14:26:08 -05:00
|
|
|
|
|
|
|
// nip05 address
|
|
|
|
let nip05_address : Option<crate::nip05::Nip05Name> = validation.and_then(|x| x.ok().map(|y| y.name));
|
|
|
|
|
|
|
|
// GRPC check
|
|
|
|
if let Some(ref mut c) = grpc_client {
|
|
|
|
trace!("checking if grpc permits");
|
|
|
|
let grpc_start = Instant::now();
|
2023-02-14 22:17:48 -05:00
|
|
|
let decision_res = c.admit_event(&event, &subm_event.source_ip, subm_event.origin, subm_event.user_agent, nip05_address, subm_event.auth_pubkey).await;
|
2023-02-11 14:26:08 -05:00
|
|
|
match decision_res {
|
|
|
|
Ok(decision) => {
|
|
|
|
if !decision.permitted() {
|
|
|
|
// GPRC returned a decision to reject this event
|
|
|
|
info!("GRPC rejected event: {:?} (kind: {}) from: {:?} in: {:?} (IP: {:?})",
|
|
|
|
event.get_event_id_prefix(),
|
|
|
|
event.kind,
|
|
|
|
event.get_author_prefix(),
|
|
|
|
grpc_start.elapsed(),
|
|
|
|
subm_event.source_ip);
|
|
|
|
notice_tx.try_send(Notice::blocked(event.id, &decision.message().unwrap_or_else(|| "".to_string()))).ok();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
},
|
|
|
|
Err(e) => {
|
|
|
|
warn!("GRPC server error: {:?}", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-22 11:06:44 -05:00
|
|
|
// TODO: cache recent list of authors to remove a DB call.
|
2023-01-22 10:49:49 -05:00
|
|
|
let start = Instant::now();
|
2023-01-24 09:04:42 -05:00
|
|
|
if event.is_ephemeral() {
|
2023-01-22 10:49:49 -05:00
|
|
|
bcast_tx.send(event.clone()).ok();
|
2023-01-24 09:04:42 -05:00
|
|
|
debug!(
|
2023-01-22 10:49:49 -05:00
|
|
|
"published ephemeral event: {:?} from: {:?} in: {:?}",
|
|
|
|
event.get_event_id_prefix(),
|
|
|
|
event.get_author_prefix(),
|
|
|
|
start.elapsed()
|
|
|
|
);
|
|
|
|
event_write = true;
|
|
|
|
} else {
|
|
|
|
match repo.write_event(&event).await {
|
|
|
|
Ok(updated) => {
|
|
|
|
if updated == 0 {
|
|
|
|
trace!("ignoring duplicate or deleted event");
|
|
|
|
notice_tx.try_send(Notice::duplicate(event.id)).ok();
|
|
|
|
} else {
|
|
|
|
info!(
|
2023-02-06 18:15:27 -05:00
|
|
|
"persisted event: {:?} (kind: {}) from: {:?} in: {:?} (IP: {:?})",
|
2023-01-22 10:49:49 -05:00
|
|
|
event.get_event_id_prefix(),
|
2023-01-22 11:06:44 -05:00
|
|
|
event.kind,
|
2023-01-22 10:49:49 -05:00
|
|
|
event.get_author_prefix(),
|
2023-02-06 18:15:27 -05:00
|
|
|
start.elapsed(),
|
|
|
|
subm_event.source_ip,
|
2023-01-22 10:49:49 -05:00
|
|
|
);
|
|
|
|
event_write = true;
|
|
|
|
// send this out to all clients
|
|
|
|
bcast_tx.send(event.clone()).ok();
|
|
|
|
notice_tx.try_send(Notice::saved(event.id)).ok();
|
2021-12-11 16:48:59 -05:00
|
|
|
}
|
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
Err(err) => {
|
|
|
|
warn!("event insert failed: {:?}", err);
|
|
|
|
let msg = "relay experienced an error trying to publish the latest event";
|
|
|
|
notice_tx.try_send(Notice::error(event.id, msg)).ok();
|
2021-12-30 22:07:21 -05:00
|
|
|
}
|
|
|
|
}
|
2021-12-11 16:48:59 -05:00
|
|
|
}
|
2023-01-03 18:32:55 -05:00
|
|
|
|
2023-01-22 10:49:49 -05:00
|
|
|
// use rate limit, if defined, and if an event was actually written.
|
|
|
|
if event_write {
|
|
|
|
if let Some(ref lim) = lim_opt {
|
|
|
|
if let Err(n) = lim.check() {
|
|
|
|
let wait_for = n.wait_time_from(clock.now());
|
|
|
|
// check if we have recently logged rate
|
|
|
|
// limits, but print out a message only once
|
|
|
|
// per second.
|
|
|
|
if most_recent_rate_limit.elapsed().as_secs() > 10 {
|
|
|
|
warn!(
|
|
|
|
"rate limit reached for event creation (sleep for {:?}) (suppressing future messages for 10 seconds)",
|
|
|
|
wait_for
|
|
|
|
);
|
|
|
|
// reset last rate limit message
|
|
|
|
most_recent_rate_limit = Instant::now();
|
2022-08-17 19:34:11 -04:00
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
// block event writes, allowing them to queue up
|
|
|
|
thread::sleep(wait_for);
|
|
|
|
continue;
|
2022-08-17 19:34:11 -04:00
|
|
|
}
|
2022-01-22 22:29:15 -05:00
|
|
|
}
|
2021-12-11 16:48:59 -05:00
|
|
|
}
|
|
|
|
}
|
2023-01-22 10:49:49 -05:00
|
|
|
info!("database connection closed");
|
|
|
|
Ok(())
|
2021-12-11 16:48:59 -05:00
|
|
|
}
|
|
|
|
|
2022-02-12 10:29:35 -05:00
|
|
|
/// Serialized event associated with a specific subscription request.
|
2022-09-24 09:30:22 -04:00
|
|
|
#[derive(PartialEq, Eq, Debug, Clone)]
|
2021-12-11 16:48:59 -05:00
|
|
|
pub struct QueryResult {
|
2021-12-11 22:43:41 -05:00
|
|
|
/// Subscription identifier
|
2021-12-11 16:48:59 -05:00
|
|
|
pub sub_id: String,
|
2021-12-11 22:43:41 -05:00
|
|
|
/// Serialized event
|
2021-12-11 16:48:59 -05:00
|
|
|
pub event: String,
|
|
|
|
}
|