2023-08-09 17:14:33 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package workers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
|
|
|
|
"codeberg.org/gruf/go-kv"
|
|
|
|
"codeberg.org/gruf/go-logger/v2/level"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/processing/account"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/state"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/typeutils"
|
2024-04-13 11:25:10 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
2023-08-09 17:14:33 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// clientAPI wraps processing functions
|
|
|
|
// specifically for messages originating
|
|
|
|
// from the client/REST API.
|
|
|
|
type clientAPI struct {
|
2024-03-13 12:53:29 +00:00
|
|
|
state *state.State
|
|
|
|
converter *typeutils.Converter
|
2024-05-02 12:43:00 +00:00
|
|
|
surface *Surface
|
2024-03-13 12:53:29 +00:00
|
|
|
federate *federate
|
|
|
|
account *account.Processor
|
2024-04-26 12:50:46 +00:00
|
|
|
utils *utils
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *Processor) ProcessFromClientAPI(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
// Allocate new log fields slice
|
|
|
|
fields := make([]kv.Field, 3, 4)
|
|
|
|
fields[0] = kv.Field{"activityType", cMsg.APActivityType}
|
|
|
|
fields[1] = kv.Field{"objectType", cMsg.APObjectType}
|
2024-04-26 12:50:46 +00:00
|
|
|
fields[2] = kv.Field{"fromAccount", cMsg.Origin.Username}
|
2023-08-09 17:14:33 +00:00
|
|
|
|
|
|
|
// Include GTSModel in logs if appropriate.
|
|
|
|
if cMsg.GTSModel != nil &&
|
|
|
|
log.Level() >= level.DEBUG {
|
|
|
|
fields = append(fields, kv.Field{
|
|
|
|
"model", cMsg.GTSModel,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
l := log.WithContext(ctx).WithFields(fields...)
|
|
|
|
l.Info("processing from client API")
|
|
|
|
|
|
|
|
switch cMsg.APActivityType {
|
|
|
|
|
|
|
|
// CREATE SOMETHING
|
|
|
|
case ap.ActivityCreate:
|
|
|
|
switch cMsg.APObjectType {
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// CREATE USER (ie., new user+account sign-up)
|
|
|
|
case ap.ObjectProfile:
|
|
|
|
return p.clientAPI.CreateUser(ctx, cMsg)
|
2023-08-09 17:14:33 +00:00
|
|
|
|
|
|
|
// CREATE NOTE/STATUS
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.clientAPI.CreateStatus(ctx, cMsg)
|
|
|
|
|
2023-11-08 14:32:17 +00:00
|
|
|
// CREATE QUESTION
|
|
|
|
// (note we don't handle poll *votes* as AS
|
|
|
|
// question type when federating (just notes),
|
|
|
|
// but it makes for a nicer type switch here.
|
|
|
|
case ap.ActivityQuestion:
|
|
|
|
return p.clientAPI.CreatePollVote(ctx, cMsg)
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
// CREATE FOLLOW (request)
|
|
|
|
case ap.ActivityFollow:
|
|
|
|
return p.clientAPI.CreateFollowReq(ctx, cMsg)
|
|
|
|
|
|
|
|
// CREATE LIKE/FAVE
|
|
|
|
case ap.ActivityLike:
|
|
|
|
return p.clientAPI.CreateLike(ctx, cMsg)
|
|
|
|
|
|
|
|
// CREATE ANNOUNCE/BOOST
|
|
|
|
case ap.ActivityAnnounce:
|
|
|
|
return p.clientAPI.CreateAnnounce(ctx, cMsg)
|
|
|
|
|
|
|
|
// CREATE BLOCK
|
|
|
|
case ap.ActivityBlock:
|
|
|
|
return p.clientAPI.CreateBlock(ctx, cMsg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// UPDATE SOMETHING
|
|
|
|
case ap.ActivityUpdate:
|
|
|
|
switch cMsg.APObjectType {
|
|
|
|
|
2023-10-04 12:09:42 +00:00
|
|
|
// UPDATE NOTE/STATUS
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.clientAPI.UpdateStatus(ctx, cMsg)
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// UPDATE ACCOUNT (ie., bio, settings, etc)
|
|
|
|
case ap.ActorPerson:
|
2023-08-09 17:14:33 +00:00
|
|
|
return p.clientAPI.UpdateAccount(ctx, cMsg)
|
|
|
|
|
|
|
|
// UPDATE A FLAG/REPORT (mark as resolved/closed)
|
|
|
|
case ap.ActivityFlag:
|
|
|
|
return p.clientAPI.UpdateReport(ctx, cMsg)
|
2024-06-06 13:43:25 +00:00
|
|
|
|
|
|
|
// UPDATE USER (ie., email address)
|
|
|
|
case ap.ObjectProfile:
|
|
|
|
return p.clientAPI.UpdateUser(ctx, cMsg)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ACCEPT SOMETHING
|
|
|
|
case ap.ActivityAccept:
|
|
|
|
switch cMsg.APObjectType { //nolint:gocritic
|
|
|
|
|
|
|
|
// ACCEPT FOLLOW (request)
|
|
|
|
case ap.ActivityFollow:
|
|
|
|
return p.clientAPI.AcceptFollow(ctx, cMsg)
|
2024-04-13 11:25:10 +00:00
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// ACCEPT USER (ie., new user+account sign-up)
|
|
|
|
case ap.ObjectProfile:
|
|
|
|
return p.clientAPI.AcceptUser(ctx, cMsg)
|
2024-07-26 10:04:28 +00:00
|
|
|
|
|
|
|
// ACCEPT NOTE/STATUS (ie., accept a reply)
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.clientAPI.AcceptReply(ctx, cMsg)
|
|
|
|
|
|
|
|
// ACCEPT LIKE
|
|
|
|
case ap.ActivityLike:
|
|
|
|
return p.clientAPI.AcceptLike(ctx, cMsg)
|
|
|
|
|
|
|
|
// ACCEPT BOOST
|
|
|
|
case ap.ActivityAnnounce:
|
|
|
|
return p.clientAPI.AcceptAnnounce(ctx, cMsg)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// REJECT SOMETHING
|
|
|
|
case ap.ActivityReject:
|
|
|
|
switch cMsg.APObjectType { //nolint:gocritic
|
|
|
|
|
|
|
|
// REJECT FOLLOW (request)
|
|
|
|
case ap.ActivityFollow:
|
|
|
|
return p.clientAPI.RejectFollowRequest(ctx, cMsg)
|
2024-04-13 11:25:10 +00:00
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// REJECT USER (ie., new user+account sign-up)
|
|
|
|
case ap.ObjectProfile:
|
|
|
|
return p.clientAPI.RejectUser(ctx, cMsg)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// UNDO SOMETHING
|
|
|
|
case ap.ActivityUndo:
|
|
|
|
switch cMsg.APObjectType {
|
|
|
|
|
|
|
|
// UNDO FOLLOW (request)
|
|
|
|
case ap.ActivityFollow:
|
|
|
|
return p.clientAPI.UndoFollow(ctx, cMsg)
|
|
|
|
|
|
|
|
// UNDO BLOCK
|
|
|
|
case ap.ActivityBlock:
|
|
|
|
return p.clientAPI.UndoBlock(ctx, cMsg)
|
|
|
|
|
|
|
|
// UNDO LIKE/FAVE
|
|
|
|
case ap.ActivityLike:
|
|
|
|
return p.clientAPI.UndoFave(ctx, cMsg)
|
|
|
|
|
|
|
|
// UNDO ANNOUNCE/BOOST
|
|
|
|
case ap.ActivityAnnounce:
|
|
|
|
return p.clientAPI.UndoAnnounce(ctx, cMsg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// DELETE SOMETHING
|
|
|
|
case ap.ActivityDelete:
|
|
|
|
switch cMsg.APObjectType {
|
|
|
|
|
|
|
|
// DELETE NOTE/STATUS
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.clientAPI.DeleteStatus(ctx, cMsg)
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// DELETE REMOTE ACCOUNT or LOCAL USER+ACCOUNT
|
|
|
|
case ap.ActorPerson, ap.ObjectProfile:
|
|
|
|
return p.clientAPI.DeleteAccountOrUser(ctx, cMsg)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// FLAG/REPORT SOMETHING
|
|
|
|
case ap.ActivityFlag:
|
|
|
|
switch cMsg.APObjectType { //nolint:gocritic
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// FLAG/REPORT ACCOUNT
|
|
|
|
case ap.ActorPerson:
|
2023-08-09 17:14:33 +00:00
|
|
|
return p.clientAPI.ReportAccount(ctx, cMsg)
|
|
|
|
}
|
2024-03-13 12:53:29 +00:00
|
|
|
|
|
|
|
// MOVE SOMETHING
|
|
|
|
case ap.ActivityMove:
|
|
|
|
switch cMsg.APObjectType { //nolint:gocritic
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
// MOVE ACCOUNT
|
|
|
|
case ap.ActorPerson:
|
2024-03-13 12:53:29 +00:00
|
|
|
return p.clientAPI.MoveAccount(ctx, cMsg)
|
|
|
|
}
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 14:32:17 +00:00
|
|
|
return gtserror.Newf("unhandled: %s %s", cMsg.APActivityType, cMsg.APObjectType)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
func (p *clientAPI) CreateUser(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2024-04-11 09:45:53 +00:00
|
|
|
newUser, ok := cMsg.GTSModel.(*gtsmodel.User)
|
2023-08-09 17:14:33 +00:00
|
|
|
if !ok {
|
2024-04-11 09:45:53 +00:00
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.User", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Notify mods of the new signup.
|
|
|
|
if err := p.surface.notifySignup(ctx, newUser); err != nil {
|
|
|
|
log.Errorf(ctx, "error notifying mods of new sign-up: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-04-11 09:45:53 +00:00
|
|
|
// Send "new sign up" email to mods.
|
|
|
|
if err := p.surface.emailAdminNewSignup(ctx, newUser); err != nil {
|
|
|
|
log.Errorf(ctx, "error emailing new signup: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-04-11 09:45:53 +00:00
|
|
|
// Send "please confirm your address" email to the new user.
|
2024-06-06 13:43:25 +00:00
|
|
|
if err := p.surface.emailUserPleaseConfirm(ctx, newUser, true); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error emailing confirm: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) CreateStatus(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
status, ok := cMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-07-26 10:04:28 +00:00
|
|
|
// If pending approval is true then status must
|
|
|
|
// reply to a status (either one of ours or a
|
|
|
|
// remote) that requires approval for the reply.
|
|
|
|
pendingApproval := util.PtrOrValue(
|
|
|
|
status.PendingApproval,
|
|
|
|
false,
|
|
|
|
)
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case pendingApproval && !status.PreApproved:
|
|
|
|
// If approval is required and status isn't
|
|
|
|
// preapproved, then send out the Create to
|
|
|
|
// only the replied-to account (if it's remote),
|
|
|
|
// and/or notify the account that's being
|
|
|
|
// interacted with (if it's local): they can
|
|
|
|
// approve or deny the interaction later.
|
|
|
|
|
|
|
|
// Notify *local* account of pending reply.
|
|
|
|
if err := p.surface.notifyPendingReply(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error notifying pending reply: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send Create to *remote* account inbox ONLY.
|
|
|
|
if err := p.federate.CreateStatus(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating pending reply: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return early.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case pendingApproval && status.PreApproved:
|
|
|
|
// If approval is required and status is
|
|
|
|
// preapproved, that means this is a reply
|
|
|
|
// to one of our statuses with permission
|
|
|
|
// that matched on a following/followers
|
|
|
|
// collection. Do the Accept immediately and
|
|
|
|
// then process everything else as normal,
|
|
|
|
// sending out the Create with the approval
|
|
|
|
// URI attached.
|
|
|
|
|
|
|
|
// Put approval in the database and
|
|
|
|
// update the status with approvedBy URI.
|
|
|
|
approval, err := p.utils.approveReply(ctx, status)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.Newf("error pre-approving reply: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the approval as Accept.
|
|
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
|
|
return gtserror.Newf("error federating pre-approval of reply: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return, just continue as normal.
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the actor account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.incrementStatusesCount(ctx, cMsg.Origin, status); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, status); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if status.InReplyToID != "" {
|
|
|
|
// Interaction counts changed on the replied status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.InReplyToID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.federate.CreateStatus(ctx, status); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating status: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) CreatePollVote(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-11-08 14:32:17 +00:00
|
|
|
// Cast the create poll vote attached to message.
|
|
|
|
vote, ok := cMsg.GTSModel.(*gtsmodel.PollVote)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Pollvote", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the vote is fully populated in order to get original poll.
|
|
|
|
if err := p.state.DB.PopulatePollVote(ctx, vote); err != nil {
|
|
|
|
return gtserror.Newf("error populating poll vote from db: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the poll on the vote is fully populated to get origin status.
|
|
|
|
if err := p.state.DB.PopulatePoll(ctx, vote.Poll); err != nil {
|
|
|
|
return gtserror.Newf("error populating poll from db: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the origin status,
|
|
|
|
// (also set the poll on it).
|
|
|
|
status := vote.Poll.Status
|
|
|
|
status.Poll = vote.Poll
|
|
|
|
|
|
|
|
// Interaction counts changed on the source status, uncache from timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, vote.Poll.StatusID)
|
|
|
|
|
|
|
|
if *status.Local {
|
|
|
|
// These are poll votes in a local status, we only need to
|
|
|
|
// federate the updated status model with latest vote counts.
|
|
|
|
if err := p.federate.UpdateStatus(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating status update: %v", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// These are votes in a remote poll, federate to origin the new poll vote(s).
|
|
|
|
if err := p.federate.CreatePollVote(ctx, vote.Poll, vote); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating poll vote: %v", err)
|
|
|
|
}
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) CreateFollowReq(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
followRequest, ok := cMsg.GTSModel.(*gtsmodel.FollowRequest)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.FollowRequest", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-06-12 12:23:10 +00:00
|
|
|
// If target is a local, unlocked account,
|
|
|
|
// we can skip side effects for the follow
|
|
|
|
// request and accept the follow immediately.
|
|
|
|
if cMsg.Target.IsLocal() && !*cMsg.Target.Locked {
|
|
|
|
// Accept the FR first to get the Follow.
|
|
|
|
follow, err := p.state.DB.AcceptFollowRequest(
|
|
|
|
ctx,
|
|
|
|
cMsg.Origin.ID,
|
|
|
|
cMsg.Target.ID,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.Newf("db error accepting follow req: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Use AcceptFollow to do side effects.
|
|
|
|
return p.AcceptFollow(ctx, &messages.FromClientAPI{
|
|
|
|
APObjectType: ap.ActivityFollow,
|
|
|
|
APActivityType: ap.ActivityAccept,
|
|
|
|
GTSModel: follow,
|
|
|
|
Origin: cMsg.Origin,
|
|
|
|
Target: cMsg.Target,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the target account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.incrementFollowRequestsCount(ctx, cMsg.Target); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.surface.notifyFollowRequest(ctx, followRequest); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying follow request: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2023-11-08 14:32:17 +00:00
|
|
|
// Convert the follow request to follow model (requests are sent as follows).
|
|
|
|
follow := p.converter.FollowRequestToFollow(ctx, followRequest)
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.federate.Follow(
|
|
|
|
ctx,
|
2023-11-08 14:32:17 +00:00
|
|
|
follow,
|
2023-08-09 17:14:33 +00:00
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating follow request: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) CreateLike(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
fave, ok := cMsg.GTSModel.(*gtsmodel.StatusFave)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.StatusFave", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2023-10-25 14:04:53 +00:00
|
|
|
// Ensure fave populated.
|
|
|
|
if err := p.state.DB.PopulateStatusFave(ctx, fave); err != nil {
|
|
|
|
return gtserror.Newf("error populating status fave: %w", err)
|
|
|
|
}
|
|
|
|
|
2024-07-26 10:04:28 +00:00
|
|
|
// If pending approval is true then fave must
|
|
|
|
// target a status (either one of ours or a
|
|
|
|
// remote) that requires approval for the fave.
|
|
|
|
pendingApproval := util.PtrOrValue(
|
|
|
|
fave.PendingApproval,
|
|
|
|
false,
|
|
|
|
)
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case pendingApproval && !fave.PreApproved:
|
|
|
|
// If approval is required and fave isn't
|
|
|
|
// preapproved, then send out the Like to
|
|
|
|
// only the faved account (if it's remote),
|
|
|
|
// and/or notify the account that's being
|
|
|
|
// interacted with (if it's local): they can
|
|
|
|
// approve or deny the interaction later.
|
|
|
|
|
|
|
|
// Notify *local* account of pending reply.
|
|
|
|
if err := p.surface.notifyPendingFave(ctx, fave); err != nil {
|
|
|
|
log.Errorf(ctx, "error notifying pending fave: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send Like to *remote* account inbox ONLY.
|
|
|
|
if err := p.federate.Like(ctx, fave); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating pending Like: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return early.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case pendingApproval && fave.PreApproved:
|
|
|
|
// If approval is required and fave is
|
|
|
|
// preapproved, that means this is a fave
|
|
|
|
// of one of our statuses with permission
|
|
|
|
// that matched on a following/followers
|
|
|
|
// collection. Do the Accept immediately and
|
|
|
|
// then process everything else as normal,
|
|
|
|
// sending out the Like with the approval
|
|
|
|
// URI attached.
|
|
|
|
|
|
|
|
// Put approval in the database and
|
|
|
|
// update the fave with approvedBy URI.
|
|
|
|
approval, err := p.utils.approveFave(ctx, fave)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.Newf("error pre-approving fave: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the approval as Accept.
|
|
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
|
|
return gtserror.Newf("error federating pre-approval of fave: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return, just continue as normal.
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.surface.notifyFave(ctx, fave); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying fave: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Interaction counts changed on the faved status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, fave.StatusID)
|
|
|
|
|
|
|
|
if err := p.federate.Like(ctx, fave); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating like: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) CreateAnnounce(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
boost, ok := cMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-07-26 10:04:28 +00:00
|
|
|
// If pending approval is true then status must
|
|
|
|
// boost a status (either one of ours or a
|
|
|
|
// remote) that requires approval for the boost.
|
|
|
|
pendingApproval := util.PtrOrValue(
|
|
|
|
boost.PendingApproval,
|
|
|
|
false,
|
|
|
|
)
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case pendingApproval && !boost.PreApproved:
|
|
|
|
// If approval is required and boost isn't
|
|
|
|
// preapproved, then send out the Announce to
|
|
|
|
// only the boosted account (if it's remote),
|
|
|
|
// and/or notify the account that's being
|
|
|
|
// interacted with (if it's local): they can
|
|
|
|
// approve or deny the interaction later.
|
|
|
|
|
|
|
|
// Notify *local* account of pending announce.
|
|
|
|
if err := p.surface.notifyPendingAnnounce(ctx, boost); err != nil {
|
|
|
|
log.Errorf(ctx, "error notifying pending boost: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send Announce to *remote* account inbox ONLY.
|
|
|
|
if err := p.federate.Announce(ctx, boost); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating pending Announce: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return early.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case pendingApproval && boost.PreApproved:
|
|
|
|
// If approval is required and boost is
|
|
|
|
// preapproved, that means this is a boost
|
|
|
|
// of one of our statuses with permission
|
|
|
|
// that matched on a following/followers
|
|
|
|
// collection. Do the Accept immediately and
|
|
|
|
// then process everything else as normal,
|
|
|
|
// sending out the Create with the approval
|
|
|
|
// URI attached.
|
|
|
|
|
|
|
|
// Put approval in the database and
|
|
|
|
// update the boost with approvedBy URI.
|
|
|
|
approval, err := p.utils.approveAnnounce(ctx, boost)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.Newf("error pre-approving boost: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the approval as Accept.
|
|
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
|
|
return gtserror.Newf("error federating pre-approval of boost: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return, just continue as normal.
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the actor account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.incrementStatusesCount(ctx, cMsg.Origin, boost); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
// Timeline and notify the boost wrapper status.
|
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, boost); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Notify the boost target account.
|
|
|
|
if err := p.surface.notifyAnnounce(ctx, boost); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying boost: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Interaction counts changed on the boosted status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, boost.BoostOfID)
|
|
|
|
|
|
|
|
if err := p.federate.Announce(ctx, boost); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating announce: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) CreateBlock(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
block, ok := cMsg.GTSModel.(*gtsmodel.Block)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Block", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove blockee's statuses from blocker's timeline.
|
|
|
|
if err := p.state.Timelines.Home.WipeItemsFromAccountID(
|
|
|
|
ctx,
|
|
|
|
block.AccountID,
|
|
|
|
block.TargetAccountID,
|
|
|
|
); err != nil {
|
|
|
|
return gtserror.Newf("error wiping timeline items for block: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove blocker's statuses from blockee's timeline.
|
|
|
|
if err := p.state.Timelines.Home.WipeItemsFromAccountID(
|
|
|
|
ctx,
|
|
|
|
block.TargetAccountID,
|
|
|
|
block.AccountID,
|
|
|
|
); err != nil {
|
|
|
|
return gtserror.Newf("error wiping timeline items for block: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: same with notifications?
|
|
|
|
// TODO: same with bookmarks?
|
|
|
|
|
|
|
|
if err := p.federate.Block(ctx, block); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating block: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UpdateStatus(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-10-04 12:09:42 +00:00
|
|
|
// Cast the updated Status model attached to msg.
|
|
|
|
status, ok := cMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Status", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Federate the updated status changes out remotely.
|
|
|
|
if err := p.federate.UpdateStatus(ctx, status); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating status update: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Status representation has changed, invalidate from timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.ID)
|
|
|
|
|
|
|
|
if status.Poll != nil && status.Poll.Closing {
|
|
|
|
|
|
|
|
// If the latest status has a newly closed poll, at least compared
|
|
|
|
// to the existing version, then notify poll close to all voters.
|
|
|
|
if err := p.surface.notifyPollClose(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error notifying poll close: %v", err)
|
|
|
|
}
|
2023-10-04 12:09:42 +00:00
|
|
|
}
|
|
|
|
|
2023-12-16 11:55:49 +00:00
|
|
|
// Push message that the status has been edited to streams.
|
|
|
|
if err := p.surface.timelineStatusUpdate(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error streaming status edit: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-10-04 12:09:42 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UpdateAccount(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
account, ok := cMsg.GTSModel.(*gtsmodel.Account)
|
|
|
|
if !ok {
|
2023-10-04 12:09:42 +00:00
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Account", cMsg.GTSModel)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.federate.UpdateAccount(ctx, account); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating account update: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UpdateReport(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
report, ok := cMsg.GTSModel.(*gtsmodel.Report)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Report", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
if report.Account.IsRemote() {
|
|
|
|
// Report creator is a remote account,
|
|
|
|
// we shouldn't try to email them!
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-11 09:45:53 +00:00
|
|
|
if err := p.surface.emailUserReportClosed(ctx, report); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error emailing report closed: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
func (p *clientAPI) UpdateUser(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
|
|
|
user, ok := cMsg.GTSModel.(*gtsmodel.User)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.User", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// The only possible "UpdateUser" action is to update the
|
|
|
|
// user's email address, so we can safely assume by this
|
|
|
|
// point that a new unconfirmed email address has been set.
|
|
|
|
if err := p.surface.emailUserPleaseConfirm(ctx, user, false); err != nil {
|
|
|
|
log.Errorf(ctx, "error emailing report closed: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) AcceptFollow(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
follow, ok := cMsg.GTSModel.(*gtsmodel.Follow)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Follow", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the target account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.decrementFollowRequestsCount(ctx, cMsg.Target); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.incrementFollowersCount(ctx, cMsg.Target); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats for the origin account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.incrementFollowingCount(ctx, cMsg.Origin); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.surface.notifyFollow(ctx, follow); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying follow: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.federate.AcceptFollow(ctx, follow); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating follow accept: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) RejectFollowRequest(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
followReq, ok := cMsg.GTSModel.(*gtsmodel.FollowRequest)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.FollowRequest", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the target account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.decrementFollowRequestsCount(ctx, cMsg.Target); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.federate.RejectFollow(
|
|
|
|
ctx,
|
2023-09-23 16:44:11 +00:00
|
|
|
p.converter.FollowRequestToFollow(ctx, followReq),
|
2023-08-09 17:14:33 +00:00
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating follow reject: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UndoFollow(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
follow, ok := cMsg.GTSModel.(*gtsmodel.Follow)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Follow", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the origin account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.decrementFollowingCount(ctx, cMsg.Origin); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats for the target account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.decrementFollowersCount(ctx, cMsg.Target); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.federate.UndoFollow(ctx, follow); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating follow undo: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UndoBlock(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
block, ok := cMsg.GTSModel.(*gtsmodel.Block)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Block", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.federate.UndoBlock(ctx, block); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating block undo: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UndoFave(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
statusFave, ok := cMsg.GTSModel.(*gtsmodel.StatusFave)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.StatusFave", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Interaction counts changed on the faved status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, statusFave.StatusID)
|
|
|
|
|
|
|
|
if err := p.federate.UndoLike(ctx, statusFave); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating like undo: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) UndoAnnounce(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
status, ok := cMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.state.DB.DeleteStatusByID(ctx, status.ID); err != nil {
|
|
|
|
return gtserror.Newf("db error deleting status: %w", err)
|
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the origin account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.decrementStatusesCount(ctx, cMsg.Origin); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if err := p.surface.deleteStatusFromTimelines(ctx, status.ID); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error removing timelined status: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Interaction counts changed on the boosted status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.BoostOfID)
|
|
|
|
|
|
|
|
if err := p.federate.UndoAnnounce(ctx, status); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating announce undo: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) DeleteStatus(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
// Don't delete attachments, just unattach them:
|
|
|
|
// this request comes from the client API and the
|
|
|
|
// poster may want to use attachments again later.
|
|
|
|
const deleteAttachments = false
|
|
|
|
|
|
|
|
status, ok := cMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to populate status structs if possible,
|
|
|
|
// in order to more thoroughly remove them.
|
|
|
|
if err := p.state.DB.PopulateStatus(
|
|
|
|
ctx, status,
|
|
|
|
); err != nil && !errors.Is(err, db.ErrNoEntries) {
|
|
|
|
return gtserror.Newf("db error populating status: %w", err)
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
// Drop any outgoing queued AP requests about / targeting
|
|
|
|
// this status, (stops queued likes, boosts, creates etc).
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("ObjectID", status.URI)
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("TargetID", status.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued client messages about / targeting
|
|
|
|
// status, (stops processing of local origin data for status).
|
|
|
|
p.state.Workers.Client.Queue.Delete("TargetURI", status.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued federator messages targeting status,
|
|
|
|
// (stops processing of remote origin data targeting this status).
|
|
|
|
p.state.Workers.Federator.Queue.Delete("TargetURI", status.URI)
|
|
|
|
|
|
|
|
// First perform the actual status deletion.
|
|
|
|
if err := p.utils.wipeStatus(ctx, status, deleteAttachments); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error wiping status: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-04-16 11:10:13 +00:00
|
|
|
// Update stats for the origin account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.utils.decrementStatusesCount(ctx, cMsg.Origin); err != nil {
|
2024-04-16 11:10:13 +00:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 17:14:33 +00:00
|
|
|
if status.InReplyToID != "" {
|
|
|
|
// Interaction counts changed on the replied status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.InReplyToID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.federate.DeleteStatus(ctx, status); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating status delete: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
func (p *clientAPI) DeleteAccountOrUser(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
// The originID of the delete, one of:
|
|
|
|
// - ID of a domain block, for which
|
|
|
|
// this account delete is a side effect.
|
|
|
|
// - ID of the deleted account itself (self delete).
|
|
|
|
// - ID of an admin account (account suspension).
|
|
|
|
var originID string
|
|
|
|
|
|
|
|
if domainBlock, ok := cMsg.GTSModel.(*gtsmodel.DomainBlock); ok {
|
|
|
|
// Origin is a domain block.
|
|
|
|
originID = domainBlock.ID
|
|
|
|
} else {
|
|
|
|
// Origin is whichever account
|
|
|
|
// originated this message.
|
2024-04-26 12:50:46 +00:00
|
|
|
originID = cMsg.Origin.ID
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
// Extract target account.
|
|
|
|
account := cMsg.Target
|
|
|
|
|
|
|
|
// Drop any outgoing queued AP requests to / from / targeting
|
|
|
|
// this account, (stops queued likes, boosts, creates etc).
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("ActorID", account.URI)
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("ObjectID", account.URI)
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("TargetID", account.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued client messages to / from this
|
|
|
|
// account, (stops processing of local origin data for acccount).
|
|
|
|
p.state.Workers.Client.Queue.Delete("Origin.ID", account.ID)
|
|
|
|
p.state.Workers.Client.Queue.Delete("Target.ID", account.ID)
|
|
|
|
p.state.Workers.Client.Queue.Delete("TargetURI", account.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued federator messages to this account,
|
|
|
|
// (stops processing of remote origin data targeting this account).
|
|
|
|
p.state.Workers.Federator.Queue.Delete("Receiving.ID", account.ID)
|
|
|
|
p.state.Workers.Federator.Queue.Delete("TargetURI", account.URI)
|
|
|
|
|
|
|
|
if err := p.federate.DeleteAccount(ctx, cMsg.Target); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating account delete: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.account.Delete(ctx, cMsg.Target, originID); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error deleting account: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) ReportAccount(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2023-08-09 17:14:33 +00:00
|
|
|
report, ok := cMsg.GTSModel.(*gtsmodel.Report)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Report", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Federate this report to the
|
|
|
|
// remote instance if desired.
|
|
|
|
if *report.Forwarded {
|
|
|
|
if err := p.federate.Flag(ctx, report); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating flag: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-04-11 09:45:53 +00:00
|
|
|
if err := p.surface.emailAdminReportOpened(ctx, report); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error emailing report opened: %v", err)
|
2023-08-09 17:14:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2024-03-13 12:53:29 +00:00
|
|
|
|
2024-04-26 12:50:46 +00:00
|
|
|
func (p *clientAPI) MoveAccount(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2024-03-13 12:53:29 +00:00
|
|
|
// Redirect each local follower of
|
|
|
|
// OriginAccount to follow move target.
|
2024-04-26 12:50:46 +00:00
|
|
|
p.utils.redirectFollowers(ctx, cMsg.Origin, cMsg.Target)
|
2024-03-13 12:53:29 +00:00
|
|
|
|
|
|
|
// At this point, we know OriginAccount has the
|
|
|
|
// Move set on it. Just make sure it's populated.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.state.DB.PopulateMove(ctx, cMsg.Origin.Move); err != nil {
|
2024-03-13 12:53:29 +00:00
|
|
|
return gtserror.Newf("error populating Move: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now send the Move message out to
|
|
|
|
// OriginAccount's (remote) followers.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.federate.MoveAccount(ctx, cMsg.Origin); err != nil {
|
2024-03-13 12:53:29 +00:00
|
|
|
return gtserror.Newf("error federating account move: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark the move attempt as successful.
|
2024-04-26 12:50:46 +00:00
|
|
|
cMsg.Origin.Move.SucceededAt = cMsg.Origin.Move.AttemptedAt
|
2024-03-13 12:53:29 +00:00
|
|
|
if err := p.state.DB.UpdateMove(
|
|
|
|
ctx,
|
2024-04-26 12:50:46 +00:00
|
|
|
cMsg.Origin.Move,
|
2024-03-13 12:53:29 +00:00
|
|
|
"succeeded_at",
|
|
|
|
); err != nil {
|
|
|
|
return gtserror.Newf("error marking move as successful: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2024-04-13 11:25:10 +00:00
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
func (p *clientAPI) AcceptUser(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2024-04-13 11:25:10 +00:00
|
|
|
newUser, ok := cMsg.GTSModel.(*gtsmodel.User)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.User", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark user as approved + clear sign-up IP.
|
|
|
|
newUser.Approved = util.Ptr(true)
|
|
|
|
newUser.SignUpIP = nil
|
|
|
|
if err := p.state.DB.UpdateUser(ctx, newUser, "approved", "sign_up_ip"); err != nil {
|
|
|
|
// Error now means we should return without
|
|
|
|
// sending email + let admin try to approve again.
|
|
|
|
return gtserror.Newf("db error updating user %s: %w", newUser.ID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send "your sign-up has been approved" email to the new user.
|
|
|
|
if err := p.surface.emailUserSignupApproved(ctx, newUser); err != nil {
|
|
|
|
log.Errorf(ctx, "error emailing: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-06-06 13:43:25 +00:00
|
|
|
func (p *clientAPI) RejectUser(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
2024-04-13 11:25:10 +00:00
|
|
|
deniedUser, ok := cMsg.GTSModel.(*gtsmodel.DeniedUser)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.DeniedUser", cMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the account.
|
2024-04-26 12:50:46 +00:00
|
|
|
if err := p.state.DB.DeleteAccount(ctx, cMsg.Target.ID); err != nil {
|
2024-04-13 11:25:10 +00:00
|
|
|
log.Errorf(ctx,
|
|
|
|
"db error deleting account %s: %v",
|
2024-04-26 12:50:46 +00:00
|
|
|
cMsg.Target.ID, err,
|
2024-04-13 11:25:10 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove the user.
|
|
|
|
if err := p.state.DB.DeleteUserByID(ctx, deniedUser.ID); err != nil {
|
|
|
|
log.Errorf(ctx,
|
|
|
|
"db error deleting user %s: %v",
|
|
|
|
deniedUser.ID, err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Store the deniedUser entry.
|
|
|
|
if err := p.state.DB.PutDeniedUser(ctx, deniedUser); err != nil {
|
|
|
|
log.Errorf(ctx,
|
|
|
|
"db error putting denied user %s: %v",
|
|
|
|
deniedUser.ID, err,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
if *deniedUser.SendEmail {
|
|
|
|
// Send "your sign-up has been rejected" email to the denied user.
|
|
|
|
if err := p.surface.emailUserSignupRejected(ctx, deniedUser); err != nil {
|
|
|
|
log.Errorf(ctx, "error emailing: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2024-07-26 10:04:28 +00:00
|
|
|
|
|
|
|
func (p *clientAPI) AcceptLike(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
|
|
|
// TODO
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *clientAPI) AcceptReply(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
|
|
|
// TODO
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *clientAPI) AcceptAnnounce(ctx context.Context, cMsg *messages.FromClientAPI) error {
|
|
|
|
// TODO
|
|
|
|
return nil
|
|
|
|
}
|