grain/server/handlers/event.go

220 lines
6.5 KiB
Go
Raw Normal View History

package handlers
import (
"context"
"encoding/json"
"fmt"
2024-07-30 15:27:38 +00:00
"grain/config"
"grain/server/db/mongo"
2024-10-18 15:22:01 +00:00
"time"
2024-09-02 00:51:02 +00:00
"grain/server/handlers/response"
"grain/server/utils"
2024-09-02 00:51:02 +00:00
nostr "grain/server/types"
"golang.org/x/net/websocket"
)
2024-07-25 13:57:24 +00:00
func HandleEvent(ws *websocket.Conn, message []interface{}) {
2024-09-15 22:53:28 +00:00
if len(message) != 2 {
fmt.Println("Invalid EVENT message format")
response.SendNotice(ws, "", "Invalid EVENT message format")
return
}
2024-09-15 22:53:28 +00:00
eventData, ok := message[1].(map[string]interface{})
if !ok {
fmt.Println("Invalid event data format")
response.SendNotice(ws, "", "Invalid event data format")
return
}
eventBytes, err := json.Marshal(eventData)
if err != nil {
fmt.Println("Error marshaling event data:", err)
response.SendNotice(ws, "", "Error marshaling event data")
return
}
2024-09-15 22:53:28 +00:00
var evt nostr.Event
err = json.Unmarshal(eventBytes, &evt)
if err != nil {
fmt.Println("Error unmarshaling event data:", err)
response.SendNotice(ws, "", "Error unmarshaling event data")
return
}
2024-10-18 15:22:01 +00:00
// Validate event timestamps
if !validateEventTimestamp(evt) {
response.SendOK(ws, evt.ID, false, "invalid: event created_at timestamp is out of allowed range")
return
}
2024-09-15 22:53:28 +00:00
// Signature check moved here
if !utils.CheckSignature(evt) {
response.SendOK(ws, evt.ID, false, "invalid: signature verification failed")
return
}
2024-08-30 19:51:46 +00:00
2024-10-18 15:22:01 +00:00
eventSize := len(eventBytes)
2024-08-30 19:51:46 +00:00
2024-09-15 22:53:28 +00:00
if !handleBlacklistAndWhitelist(ws, evt) {
return
}
if !handleRateAndSizeLimits(ws, evt, eventSize) {
return
}
2024-10-18 15:22:01 +00:00
// Store the event in MongoDB or other storage
mongo.StoreMongoEvent(context.TODO(), evt, ws)
2024-09-15 22:53:28 +00:00
fmt.Println("Event processed:", evt.ID)
2024-10-18 15:22:01 +00:00
}
// Validate event timestamps against the configured min and max values
func validateEventTimestamp(evt nostr.Event) bool {
cfg := config.GetConfig()
if cfg == nil {
fmt.Println("Server configuration is not loaded")
return false
}
// Adjust event time constraints in the configuration
utils.AdjustEventTimeConstraints(cfg)
2024-10-18 15:22:01 +00:00
// Use current time for max and a fixed date for min if not specified
now := time.Now().Unix()
minCreatedAt := cfg.EventTimeConstraints.MinCreatedAt
if minCreatedAt == 0 {
// Use January 1, 2020, as the default minimum timestamp
minCreatedAt = time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix()
}
maxCreatedAt := cfg.EventTimeConstraints.MaxCreatedAt
if maxCreatedAt == 0 {
// Default to the current time if not set
maxCreatedAt = now
}
// Check if the event's created_at timestamp falls within the allowed range
if evt.CreatedAt < minCreatedAt || evt.CreatedAt > maxCreatedAt {
fmt.Printf("Event %s created_at timestamp %d is out of range [%d, %d]\n", evt.ID, evt.CreatedAt, minCreatedAt, maxCreatedAt)
return false
}
2024-10-18 15:22:01 +00:00
return true
}
2024-09-02 00:51:02 +00:00
func handleBlacklistAndWhitelist(ws *websocket.Conn, evt nostr.Event) bool {
2024-10-16 18:07:37 +00:00
// Get the current whitelist configuration
whitelistCfg := config.GetWhitelistConfig()
2024-10-16 18:07:37 +00:00
if whitelistCfg == nil {
fmt.Println("Whitelist configuration is not loaded.")
response.SendNotice(ws, "", "Internal server error: whitelist configuration is missing")
return false
}
// If domain whitelisting is enabled, dynamically fetch pubkeys from domains
if whitelistCfg.DomainWhitelist.Enabled {
domains := whitelistCfg.DomainWhitelist.Domains
pubkeys, err := utils.FetchPubkeysFromDomains(domains)
if err != nil {
fmt.Println("Error fetching pubkeys from domains:", err)
response.SendNotice(ws, "", "Error fetching pubkeys from domains")
return false
}
// Update the whitelisted pubkeys dynamically
whitelistCfg.PubkeyWhitelist.Pubkeys = append(whitelistCfg.PubkeyWhitelist.Pubkeys, pubkeys...)
}
// Check if the event's pubkey or content is blacklisted
if blacklisted, msg := config.CheckBlacklist(evt.PubKey, evt.Content); blacklisted {
response.SendOK(ws, evt.ID, false, msg)
return false
}
2024-10-17 21:05:33 +00:00
// Check mutelist blacklist
cfg := config.GetConfig()
if cfg == nil {
fmt.Println("Server configuration is not loaded")
response.SendNotice(ws, "", "Internal server error: server configuration is missing")
return false
}
blacklistCfg := config.GetBlacklistConfig()
if blacklistCfg == nil {
fmt.Println("Blacklist configuration is not loaded")
response.SendNotice(ws, "", "Internal server error: blacklist configuration is missing")
return false
}
// Only proceed if there are mutelist event IDs specified
2024-10-18 11:52:48 +00:00
if len(blacklistCfg.MuteListAuthors) > 0 {
2024-10-17 21:05:33 +00:00
localRelayURL := fmt.Sprintf("ws://localhost%s", cfg.Server.Port)
2024-10-18 11:52:48 +00:00
mutelistedPubkeys, err := config.FetchPubkeysFromLocalMuteList(localRelayURL, blacklistCfg.MuteListAuthors)
2024-10-17 21:05:33 +00:00
if err != nil {
fmt.Println("Error fetching pubkeys from mutelist:", err)
response.SendNotice(ws, "", "Error fetching pubkeys from mutelist")
return false
}
for _, mutelistedPubkey := range mutelistedPubkeys {
if evt.PubKey == mutelistedPubkey {
response.SendOK(ws, evt.ID, false, "not allowed: pubkey is in mutelist")
return false
}
}
} else {
fmt.Println("No mutelist event IDs specified in the blacklist configuration")
}
// Check if the event's kind is whitelisted
if whitelistCfg.KindWhitelist.Enabled && !config.IsKindWhitelisted(evt.Kind) {
response.SendOK(ws, evt.ID, false, "not allowed: event kind is not whitelisted")
return false
}
// Check if the event's pubkey is whitelisted
if whitelistCfg.PubkeyWhitelist.Enabled && !config.IsPubKeyWhitelisted(evt.PubKey) {
response.SendOK(ws, evt.ID, false, "not allowed: pubkey or npub is not whitelisted")
return false
}
return true
2024-08-30 19:51:46 +00:00
}
2024-10-16 18:07:37 +00:00
2024-09-02 00:51:02 +00:00
func handleRateAndSizeLimits(ws *websocket.Conn, evt nostr.Event, eventSize int) bool {
2024-08-30 19:51:46 +00:00
rateLimiter := config.GetRateLimiter()
sizeLimiter := config.GetSizeLimiter()
2024-07-27 14:06:34 +00:00
category := determineCategory(evt.Kind)
2024-07-25 13:57:24 +00:00
2024-07-26 14:02:34 +00:00
if allowed, msg := rateLimiter.AllowEvent(evt.Kind, category); !allowed {
response.SendOK(ws, evt.ID, false, msg)
2024-08-30 19:51:46 +00:00
return false
2024-07-25 13:57:24 +00:00
}
2024-07-26 20:46:01 +00:00
if allowed, msg := sizeLimiter.AllowSize(evt.Kind, eventSize); !allowed {
response.SendOK(ws, evt.ID, false, msg)
2024-08-30 19:51:46 +00:00
return false
}
return true
}
2024-07-27 14:06:34 +00:00
func determineCategory(kind int) string {
switch {
case kind == 0, kind == 3, kind >= 10000 && kind < 20000:
return "replaceable"
case kind == 1, kind >= 4 && kind < 45, kind >= 1000 && kind < 10000:
return "regular"
case kind == 2:
return "deprecated"
case kind >= 20000 && kind < 30000:
return "ephemeral"
case kind >= 30000 && kind < 40000:
return "parameterized_replaceable"
default:
return "unknown"
}
}