Iceshrimp.NET/Iceshrimp.Backend/Core/Extensions/ServiceExtensions.cs

201 lines
No EOL
8.2 KiB
C#

using System.Net.Sockets;
using System.Threading.RateLimiting;
using Iceshrimp.Backend.Controllers.Mastodon.Renderers;
using Iceshrimp.Backend.Controllers.Schemas;
using Iceshrimp.Backend.Core.Configuration;
using Iceshrimp.Backend.Core.Database;
using Iceshrimp.Backend.Core.Federation.WebFinger;
using Iceshrimp.Backend.Core.Helpers.LibMfm.Conversion;
using Iceshrimp.Backend.Core.Middleware;
using Iceshrimp.Backend.Core.Services;
using Microsoft.AspNetCore.DataProtection;
using Microsoft.AspNetCore.DataProtection.AuthenticatedEncryption;
using Microsoft.AspNetCore.DataProtection.AuthenticatedEncryption.ConfigurationModel;
using Microsoft.AspNetCore.RateLimiting;
using Microsoft.OpenApi.Models;
using StackExchange.Redis;
namespace Iceshrimp.Backend.Core.Extensions;
public static class ServiceExtensions {
public static void AddServices(this IServiceCollection services) {
// Transient = instantiated per request and class
//services.AddTransient<T>();
// Scoped = instantiated per request
services
.AddScoped<ActivityPub.ActivityRenderer>()
.AddScoped<ActivityPub.UserRenderer>()
.AddScoped<ActivityPub.NoteRenderer>()
.AddScoped<ActivityPub.UserResolver>()
.AddScoped<ActivityPub.ObjectResolver>()
.AddScoped<ActivityPub.MentionsResolver>()
.AddScoped<ActivityPub.ActivityDeliverService>()
.AddScoped<ActivityPub.FederationControlService>()
.AddScoped<ActivityPub.ActivityHandlerService>()
.AddScoped<ActivityPub.ActivityFetcherService>()
.AddScoped<UserService>()
.AddScoped<NoteService>()
.AddScoped<WebFingerService>()
.AddScoped<SystemUserService>()
.AddScoped<DriveService>()
.AddScoped<NotificationService>()
.AddScoped<DatabaseMaintenanceService>()
.AddScoped<AuthorizedFetchMiddleware>()
.AddScoped<AuthenticationMiddleware>()
.AddScoped<ErrorHandlerMiddleware>()
.AddScoped<UserRenderer>()
.AddScoped<NoteRenderer>()
.AddScoped<NotificationRenderer>();
// Singleton = instantiated once across application lifetime
services
.AddSingleton<HttpClient>()
.AddSingleton<MfmConverter>()
.AddSingleton<HttpRequestService>()
.AddSingleton<CronService>()
.AddSingleton<QueueService>()
.AddSingleton<ObjectStorageService>()
.AddSingleton<EventService>()
.AddSingleton<RequestBufferingMiddleware>()
.AddSingleton<AuthorizationMiddleware>()
.AddSingleton<RequestVerificationMiddleware>()
.AddSingleton<RequestDurationMiddleware>();
// Hosted services = long running background tasks
// Note: These need to be added as a singleton as well to ensure data consistency
services.AddHostedService<CronService>(provider => provider.GetRequiredService<CronService>());
services.AddHostedService<QueueService>(provider => provider.GetRequiredService<QueueService>());
}
public static void ConfigureServices(this IServiceCollection services, IConfiguration configuration) {
//TODO: fail if config doesn't parse correctly / required things are missing
services.Configure<Config>(configuration);
services.Configure<Config.InstanceSection>(configuration.GetSection("Instance"));
services.Configure<Config.SecuritySection>(configuration.GetSection("Security"));
services.Configure<Config.DatabaseSection>(configuration.GetSection("Database"));
services.Configure<Config.RedisSection>(configuration.GetSection("Redis"));
services.Configure<Config.StorageSection>(configuration.GetSection("Storage"));
services.Configure<Config.LocalStorageSection>(configuration.GetSection("Storage:Local"));
services.Configure<Config.ObjectStorageSection>(configuration.GetSection("Storage:ObjectStorage"));
}
public static void AddDatabaseContext(this IServiceCollection services, IConfiguration configuration) {
var config = configuration.GetSection("Database").Get<Config.DatabaseSection>();
var dataSource = DatabaseContext.GetDataSource(config);
services.AddDbContext<DatabaseContext>(options => { DatabaseContext.Configure(options, dataSource); });
services.AddDataProtection()
.PersistKeysToDbContext<DatabaseContext>()
.UseCryptographicAlgorithms(new AuthenticatedEncryptorConfiguration {
EncryptionAlgorithm = EncryptionAlgorithm.AES_256_CBC,
ValidationAlgorithm = ValidationAlgorithm.HMACSHA256
});
}
public static void AddRedis(this IServiceCollection services, IConfiguration configuration) {
var instance = configuration.GetSection("Instance").Get<Config.InstanceSection>();
var redis = configuration.GetSection("Redis").Get<Config.RedisSection>();
if (redis == null || instance == null)
throw new Exception("Failed to initialize redis: Failed to load configuration");
var redisOptions = new ConfigurationOptions {
User = redis.Username,
Password = redis.Password,
DefaultDatabase = redis.Database,
EndPoints = new EndPointCollection()
};
if (redis.UnixDomainSocket != null)
redisOptions.EndPoints.Add(new UnixDomainSocketEndPoint(redis.UnixDomainSocket));
else
redisOptions.EndPoints.Add(redis.Host, redis.Port);
services.AddSingleton<IConnectionMultiplexer>(_ => ConnectionMultiplexer.Connect(redisOptions));
services.AddStackExchangeRedisCache(options => {
options.InstanceName = (redis.Prefix ?? instance.WebDomain) + ":cache:";
options.ConfigurationOptions = redisOptions;
});
}
public static void AddSwaggerGenWithOptions(this IServiceCollection services) {
services.AddEndpointsApiExplorer();
services.AddSwaggerGen(options => {
options.SwaggerDoc("v1", new OpenApiInfo { Title = "Iceshrimp.NET", Version = "1.0" });
options.AddSecurityDefinition("user", new OpenApiSecurityScheme {
Name = "Authorization token",
In = ParameterLocation.Header,
Type = SecuritySchemeType.Http,
Scheme = "bearer"
});
options.AddSecurityDefinition("admin", new OpenApiSecurityScheme {
Name = "Authorization token",
In = ParameterLocation.Header,
Type = SecuritySchemeType.Http,
Scheme = "bearer"
});
options.AddSecurityDefinition("mastodon", new OpenApiSecurityScheme {
Name = "Authorization token",
In = ParameterLocation.Header,
Type = SecuritySchemeType.Http,
Scheme = "bearer"
});
options.AddOperationFilters();
});
}
public static void AddSlidingWindowRateLimiter(this IServiceCollection services) {
//TODO: separate limiter for authenticated users, partitioned by user id
//TODO: ipv6 /64 subnet buckets
//TODO: rate limit status headers - maybe switch to https://github.com/stefanprodan/AspNetCoreRateLimit?
//TODO: alternatively just write our own
services.AddRateLimiter(options => {
options.AddSlidingWindowLimiter("sliding", limiterOptions => {
limiterOptions.PermitLimit = 500;
limiterOptions.SegmentsPerWindow = 60;
limiterOptions.Window = TimeSpan.FromSeconds(60);
limiterOptions.QueueProcessingOrder = QueueProcessingOrder.OldestFirst;
limiterOptions.QueueLimit = 0;
});
options.AddSlidingWindowLimiter("strict", limiterOptions => {
limiterOptions.PermitLimit = 10;
limiterOptions.SegmentsPerWindow = 60;
limiterOptions.Window = TimeSpan.FromSeconds(60);
limiterOptions.QueueProcessingOrder = QueueProcessingOrder.OldestFirst;
limiterOptions.QueueLimit = 0;
});
options.OnRejected = async (context, token) => {
context.HttpContext.Response.StatusCode = 429;
context.HttpContext.Response.ContentType = "application/json";
var res = new ErrorResponse {
Error = "Too Many Requests",
StatusCode = 429,
RequestId = context.HttpContext.TraceIdentifier
};
await context.HttpContext.Response.WriteAsJsonAsync(res, token);
};
});
}
public static void AddCorsPolicies(this IServiceCollection services) {
services.AddCors(options => {
options.AddPolicy("well-known", policy => {
policy.WithOrigins("*")
.WithMethods("GET")
.WithHeaders("Accept")
.WithExposedHeaders("Vary");
});
options.AddPolicy("drive", policy => {
policy.WithOrigins("*")
.WithMethods("GET", "HEAD");
});
options.AddPolicy("mastodon", policy => {
policy.WithOrigins("*")
.WithHeaders("Authorization")
.WithExposedHeaders("Link,Connection,Sec-Websocket-Accept,Upgrade");
});
});
}
}