mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-12-23 10:42:12 +00:00
update remote account get/deref logic
This commit is contained in:
parent
3c1eb155e4
commit
667e7f112c
|
@ -26,12 +26,8 @@
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (f *federator) GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool) (*gtsmodel.Account, bool, error) {
|
func (f *federator) GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, blocking bool, refresh bool) (*gtsmodel.Account, error) {
|
||||||
return f.dereferencer.GetRemoteAccount(ctx, username, remoteAccountID, refresh)
|
return f.dereferencer.GetRemoteAccount(ctx, username, remoteAccountID, blocking, refresh)
|
||||||
}
|
|
||||||
|
|
||||||
func (f *federator) EnrichRemoteAccount(ctx context.Context, username string, account *gtsmodel.Account) (*gtsmodel.Account, error) {
|
|
||||||
return f.dereferencer.EnrichRemoteAccount(ctx, username, account)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *federator) GetRemoteStatus(ctx context.Context, username string, remoteStatusID *url.URL, refresh, includeParent bool) (*gtsmodel.Status, ap.Statusable, bool, error) {
|
func (f *federator) GetRemoteStatus(ctx context.Context, username string, remoteStatusID *url.URL, refresh, includeParent bool) (*gtsmodel.Status, ap.Statusable, bool, error) {
|
||||||
|
|
|
@ -26,6 +26,7 @@
|
||||||
"io"
|
"io"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
|
"sync"
|
||||||
|
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
"github.com/superseriousbusiness/activity/streams"
|
"github.com/superseriousbusiness/activity/streams"
|
||||||
|
@ -44,30 +45,6 @@ func instanceAccount(account *gtsmodel.Account) bool {
|
||||||
(account.Username == "internal.fetch" && strings.Contains(account.Note, "internal service actor"))
|
(account.Username == "internal.fetch" && strings.Contains(account.Note, "internal service actor"))
|
||||||
}
|
}
|
||||||
|
|
||||||
// EnrichRemoteAccount takes an account that's already been inserted into the database in a minimal form,
|
|
||||||
// and populates it with additional fields, media, etc.
|
|
||||||
//
|
|
||||||
// EnrichRemoteAccount is mostly useful for calling after an account has been initially created by
|
|
||||||
// the federatingDB's Create function, or during the federated authorization flow.
|
|
||||||
func (d *deref) EnrichRemoteAccount(ctx context.Context, username string, account *gtsmodel.Account) (*gtsmodel.Account, error) {
|
|
||||||
// if we're dealing with an instance account, we don't need to update anything
|
|
||||||
if instanceAccount(account) {
|
|
||||||
return account, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := d.PopulateAccountFields(ctx, account, username, false); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
updated, err := d.db.UpdateAccount(ctx, account)
|
|
||||||
if err != nil {
|
|
||||||
logrus.Errorf("EnrichRemoteAccount: error updating account: %s", err)
|
|
||||||
return account, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return updated, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetRemoteAccount completely dereferences a remote account, converts it to a GtS model account,
|
// GetRemoteAccount completely dereferences a remote account, converts it to a GtS model account,
|
||||||
// puts it in the database, and returns it to a caller. The boolean indicates whether the account is new
|
// puts it in the database, and returns it to a caller. The boolean indicates whether the account is new
|
||||||
// to us or not. If we haven't seen the account before, bool will be true. If we have seen the account before,
|
// to us or not. If we haven't seen the account before, bool will be true. If we have seen the account before,
|
||||||
|
@ -77,60 +54,73 @@ func (d *deref) EnrichRemoteAccount(ctx context.Context, username string, accoun
|
||||||
// the remote instance again.
|
// the remote instance again.
|
||||||
//
|
//
|
||||||
// SIDE EFFECTS: remote account will be stored in the database, or updated if it already exists (and refresh is true).
|
// SIDE EFFECTS: remote account will be stored in the database, or updated if it already exists (and refresh is true).
|
||||||
func (d *deref) GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool) (*gtsmodel.Account, bool, error) {
|
func (d *deref) GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool, blocking bool) (*gtsmodel.Account, error) {
|
||||||
new := true
|
new := true
|
||||||
|
|
||||||
// check if we already have the account in our db
|
// check if we already have the account in our db, and just return it unless we'd doing a refresh
|
||||||
maybeAccount, err := d.db.GetAccountByURI(ctx, remoteAccountID.String())
|
remoteAccount, err := d.db.GetAccountByURI(ctx, remoteAccountID.String())
|
||||||
if err == nil {
|
if err == nil {
|
||||||
// we've seen this account before so it's not new
|
|
||||||
new = false
|
new = false
|
||||||
if !refresh {
|
if !refresh {
|
||||||
// we're not being asked to refresh, but just in case we don't have the avatar/header cached yet....
|
// make sure the account fields are populated before returning:
|
||||||
maybeAccount, err = d.EnrichRemoteAccount(ctx, username, maybeAccount)
|
// even if we're not doing a refresh, the caller might want to block
|
||||||
return maybeAccount, new, err
|
// until everything is loaded
|
||||||
|
err = d.populateAccountFields(ctx, remoteAccount, username, refresh, blocking)
|
||||||
|
return remoteAccount, err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
accountable, err := d.dereferenceAccountable(ctx, username, remoteAccountID)
|
|
||||||
if err != nil {
|
|
||||||
return nil, new, fmt.Errorf("FullyDereferenceAccount: error dereferencing accountable: %s", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
gtsAccount, err := d.typeConverter.ASRepresentationToAccount(ctx, accountable, refresh)
|
|
||||||
if err != nil {
|
|
||||||
return nil, new, fmt.Errorf("FullyDereferenceAccount: error converting accountable to account: %s", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if new {
|
if new {
|
||||||
// generate a new id since we haven't seen this account before, and do a put
|
// we haven't seen this account before: dereference it from remote
|
||||||
|
accountable, err := d.dereferenceAccountable(ctx, username, remoteAccountID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("GetRemoteAccount: error dereferencing accountable: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
newAccount, err := d.typeConverter.ASRepresentationToAccount(ctx, accountable, refresh)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("GetRemoteAccount: error converting accountable to account: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
ulid, err := id.NewRandomULID()
|
ulid, err := id.NewRandomULID()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, new, fmt.Errorf("FullyDereferenceAccount: error generating new id for account: %s", err)
|
return nil, fmt.Errorf("GetRemoteAccount: error generating new id for account: %s", err)
|
||||||
}
|
}
|
||||||
gtsAccount.ID = ulid
|
newAccount.ID = ulid
|
||||||
|
|
||||||
if err := d.PopulateAccountFields(ctx, gtsAccount, username, refresh); err != nil {
|
if err := d.populateAccountFields(ctx, newAccount, username, refresh, blocking); err != nil {
|
||||||
return nil, new, fmt.Errorf("FullyDereferenceAccount: error populating further account fields: %s", err)
|
return nil, fmt.Errorf("GetRemoteAccount: error populating further account fields: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := d.db.Put(ctx, gtsAccount); err != nil {
|
if err := d.db.Put(ctx, newAccount); err != nil {
|
||||||
return nil, new, fmt.Errorf("FullyDereferenceAccount: error putting new account: %s", err)
|
return nil, fmt.Errorf("GetRemoteAccount: error putting new account: %s", err)
|
||||||
}
|
|
||||||
} else {
|
|
||||||
// take the id we already have and do an update
|
|
||||||
gtsAccount.ID = maybeAccount.ID
|
|
||||||
if err := d.PopulateAccountFields(ctx, gtsAccount, username, refresh); err != nil {
|
|
||||||
return nil, new, fmt.Errorf("FullyDereferenceAccount: error populating further account fields: %s", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
gtsAccount, err = d.db.UpdateAccount(ctx, gtsAccount)
|
return newAccount, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// we have seen this account before, but we have to refresh it
|
||||||
|
refreshedAccountable, err := d.dereferenceAccountable(ctx, username, remoteAccountID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, fmt.Errorf("EnrichRemoteAccount: error updating account: %s", err)
|
return nil, fmt.Errorf("GetRemoteAccount: error dereferencing refreshedAccountable: %s", err)
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return gtsAccount, new, nil
|
refreshedAccount, err := d.typeConverter.ASRepresentationToAccount(ctx, refreshedAccountable, refresh)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("GetRemoteAccount: error converting refreshedAccountable to refreshedAccount: %s", err)
|
||||||
|
}
|
||||||
|
refreshedAccount.ID = remoteAccount.ID
|
||||||
|
|
||||||
|
if err := d.populateAccountFields(ctx, refreshedAccount, username, refresh, blocking); err != nil {
|
||||||
|
return nil, fmt.Errorf("GetRemoteAccount: error populating further refreshedAccount fields: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
updatedAccount, err := d.db.UpdateAccount(ctx, refreshedAccount)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("GetRemoteAccount: error updating refreshedAccount: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return updatedAccount, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// dereferenceAccountable calls remoteAccountID with a GET request, and tries to parse whatever
|
// dereferenceAccountable calls remoteAccountID with a GET request, and tries to parse whatever
|
||||||
|
@ -201,52 +191,68 @@ func (d *deref) dereferenceAccountable(ctx context.Context, username string, rem
|
||||||
return nil, fmt.Errorf("DereferenceAccountable: type name %s not supported", t.GetTypeName())
|
return nil, fmt.Errorf("DereferenceAccountable: type name %s not supported", t.GetTypeName())
|
||||||
}
|
}
|
||||||
|
|
||||||
// PopulateAccountFields populates any fields on the given account that weren't populated by the initial
|
// populateAccountFields populates any fields on the given account that weren't populated by the initial
|
||||||
// dereferencing. This includes things like header and avatar etc.
|
// dereferencing. This includes things like header and avatar etc.
|
||||||
func (d *deref) PopulateAccountFields(ctx context.Context, account *gtsmodel.Account, requestingUsername string, refresh bool) error {
|
func (d *deref) populateAccountFields(ctx context.Context, account *gtsmodel.Account, requestingUsername string, refresh bool, blocking bool) error {
|
||||||
l := logrus.WithFields(logrus.Fields{
|
// if we're dealing with an instance account, just bail, we don't need to do anything
|
||||||
"func": "PopulateAccountFields",
|
if instanceAccount(account) {
|
||||||
"requestingUsername": requestingUsername,
|
return nil
|
||||||
})
|
}
|
||||||
|
|
||||||
accountURI, err := url.Parse(account.URI)
|
accountURI, err := url.Parse(account.URI)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("PopulateAccountFields: couldn't parse account URI %s: %s", account.URI, err)
|
return fmt.Errorf("populateAccountFields: couldn't parse account URI %s: %s", account.URI, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if blocked, err := d.db.IsDomainBlocked(ctx, accountURI.Host); blocked || err != nil {
|
if blocked, err := d.db.IsDomainBlocked(ctx, accountURI.Host); blocked || err != nil {
|
||||||
return fmt.Errorf("PopulateAccountFields: domain %s is blocked", accountURI.Host)
|
return fmt.Errorf("populateAccountFields: domain %s is blocked", accountURI.Host)
|
||||||
}
|
}
|
||||||
|
|
||||||
t, err := d.transportController.NewTransportForUsername(ctx, requestingUsername)
|
t, err := d.transportController.NewTransportForUsername(ctx, requestingUsername)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("PopulateAccountFields: error getting transport for user: %s", err)
|
return fmt.Errorf("populateAccountFields: error getting transport for user: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// fetch the header and avatar
|
// fetch the header and avatar
|
||||||
if err := d.fetchHeaderAndAviForAccount(ctx, account, t, refresh); err != nil {
|
if err := d.fetchRemoteAccountMedia(ctx, account, t, refresh, blocking); err != nil {
|
||||||
// if this doesn't work, just skip it -- we can do it later
|
return fmt.Errorf("populateAccountFields: error fetching header/avi for account: %s", err)
|
||||||
l.Debugf("error fetching header/avi for account: %s", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// fetchHeaderAndAviForAccount fetches the header and avatar for a remote account, using a transport
|
// fetchRemoteAccountMedia fetches and stores the header and avatar for a remote account,
|
||||||
// on behalf of requestingUsername.
|
// using a transport on behalf of requestingUsername.
|
||||||
//
|
//
|
||||||
// targetAccount's AvatarMediaAttachmentID and HeaderMediaAttachmentID will be updated as necessary.
|
// targetAccount's AvatarMediaAttachmentID and HeaderMediaAttachmentID will be updated as necessary.
|
||||||
//
|
//
|
||||||
// SIDE EFFECTS: remote header and avatar will be stored in local storage.
|
// If refresh is true, then the media will be fetched again even if it's already been fetched before.
|
||||||
func (d *deref) fetchHeaderAndAviForAccount(ctx context.Context, targetAccount *gtsmodel.Account, t transport.Transport, refresh bool) error {
|
//
|
||||||
|
// If blocking is true, then the calls to the media manager made by this function will be blocking:
|
||||||
|
// in other words, the function won't return until the header and the avatar have been fully processed.
|
||||||
|
func (d *deref) fetchRemoteAccountMedia(ctx context.Context, targetAccount *gtsmodel.Account, t transport.Transport, refresh bool, blocking bool) error {
|
||||||
accountURI, err := url.Parse(targetAccount.URI)
|
accountURI, err := url.Parse(targetAccount.URI)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("fetchHeaderAndAviForAccount: couldn't parse account URI %s: %s", targetAccount.URI, err)
|
return fmt.Errorf("fetchRemoteAccountMedia: couldn't parse account URI %s: %s", targetAccount.URI, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if blocked, err := d.db.IsDomainBlocked(ctx, accountURI.Host); blocked || err != nil {
|
if blocked, err := d.db.IsDomainBlocked(ctx, accountURI.Host); blocked || err != nil {
|
||||||
return fmt.Errorf("fetchHeaderAndAviForAccount: domain %s is blocked", accountURI.Host)
|
return fmt.Errorf("fetchRemoteAccountMedia: domain %s is blocked", accountURI.Host)
|
||||||
}
|
}
|
||||||
|
|
||||||
if targetAccount.AvatarRemoteURL != "" && (targetAccount.AvatarMediaAttachmentID == "" || refresh) {
|
if targetAccount.AvatarRemoteURL != "" && (targetAccount.AvatarMediaAttachmentID == "" || refresh) {
|
||||||
|
var processingMedia *media.ProcessingMedia
|
||||||
|
|
||||||
|
// first check if we're already processing this media
|
||||||
|
d.dereferencingAvatarsLock.Lock()
|
||||||
|
if alreadyProcessing, ok := d.dereferencingAvatars[targetAccount.ID]; ok {
|
||||||
|
// we're already on it, no worries
|
||||||
|
processingMedia = alreadyProcessing
|
||||||
|
}
|
||||||
|
d.dereferencingAvatarsLock.Unlock()
|
||||||
|
|
||||||
|
if processingMedia == nil {
|
||||||
|
// we're not already processing it so start now
|
||||||
avatarIRI, err := url.Parse(targetAccount.AvatarRemoteURL)
|
avatarIRI, err := url.Parse(targetAccount.AvatarRemoteURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -257,18 +263,51 @@ func (d *deref) fetchHeaderAndAviForAccount(ctx context.Context, targetAccount *
|
||||||
}
|
}
|
||||||
|
|
||||||
avatar := true
|
avatar := true
|
||||||
processingMedia, err := d.mediaManager.ProcessMedia(ctx, data, targetAccount.ID, &media.AdditionalMediaInfo{
|
newProcessing, err := d.mediaManager.ProcessMedia(ctx, data, targetAccount.ID, &media.AdditionalMediaInfo{
|
||||||
RemoteURL: &targetAccount.AvatarRemoteURL,
|
RemoteURL: &targetAccount.AvatarRemoteURL,
|
||||||
Avatar: &avatar,
|
Avatar: &avatar,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
targetAccount.AvatarMediaAttachmentID = newProcessing.AttachmentID()
|
||||||
|
|
||||||
targetAccount.AvatarMediaAttachmentID = processingMedia.AttachmentID()
|
// store it in our map to indicate it's in process
|
||||||
|
d.dereferencingAvatarsLock.Lock()
|
||||||
|
d.dereferencingAvatars[targetAccount.ID] = newProcessing
|
||||||
|
d.dereferencingAvatarsLock.Unlock()
|
||||||
|
|
||||||
|
processingMedia = newProcessing
|
||||||
|
}
|
||||||
|
|
||||||
|
// block until loaded if required...
|
||||||
|
if blocking {
|
||||||
|
if err := lockAndLoad(ctx, d.dereferencingAvatarsLock, processingMedia, d.dereferencingAvatars, targetAccount.ID); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// ...otherwise do it async
|
||||||
|
go func() {
|
||||||
|
if err := lockAndLoad(ctx, d.dereferencingAvatarsLock, processingMedia, d.dereferencingAvatars, targetAccount.ID); err != nil {
|
||||||
|
logrus.Errorf("fetchRemoteAccountMedia: error during async lock and load of avatar: %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if targetAccount.HeaderRemoteURL != "" && (targetAccount.HeaderMediaAttachmentID == "" || refresh) {
|
if targetAccount.HeaderRemoteURL != "" && (targetAccount.HeaderMediaAttachmentID == "" || refresh) {
|
||||||
|
var processingMedia *media.ProcessingMedia
|
||||||
|
|
||||||
|
// first check if we're already processing this media
|
||||||
|
d.dereferencingHeadersLock.Lock()
|
||||||
|
if alreadyProcessing, ok := d.dereferencingHeaders[targetAccount.ID]; ok {
|
||||||
|
// we're already on it, no worries
|
||||||
|
processingMedia = alreadyProcessing
|
||||||
|
}
|
||||||
|
d.dereferencingHeadersLock.Unlock()
|
||||||
|
|
||||||
|
if processingMedia == nil {
|
||||||
|
// we're not already processing it so start now
|
||||||
headerIRI, err := url.Parse(targetAccount.HeaderRemoteURL)
|
headerIRI, err := url.Parse(targetAccount.HeaderRemoteURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -279,15 +318,50 @@ func (d *deref) fetchHeaderAndAviForAccount(ctx context.Context, targetAccount *
|
||||||
}
|
}
|
||||||
|
|
||||||
header := true
|
header := true
|
||||||
processingMedia, err := d.mediaManager.ProcessMedia(ctx, data, targetAccount.ID, &media.AdditionalMediaInfo{
|
newProcessing, err := d.mediaManager.ProcessMedia(ctx, data, targetAccount.ID, &media.AdditionalMediaInfo{
|
||||||
RemoteURL: &targetAccount.HeaderRemoteURL,
|
RemoteURL: &targetAccount.HeaderRemoteURL,
|
||||||
Header: &header,
|
Header: &header,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
targetAccount.HeaderMediaAttachmentID = newProcessing.AttachmentID()
|
||||||
|
|
||||||
targetAccount.HeaderMediaAttachmentID = processingMedia.AttachmentID()
|
// store it in our map to indicate it's in process
|
||||||
|
d.dereferencingHeadersLock.Lock()
|
||||||
|
d.dereferencingHeaders[targetAccount.ID] = newProcessing
|
||||||
|
d.dereferencingHeadersLock.Unlock()
|
||||||
|
|
||||||
|
processingMedia = newProcessing
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// block until loaded if required...
|
||||||
|
if blocking {
|
||||||
|
if err := lockAndLoad(ctx, d.dereferencingHeadersLock, processingMedia, d.dereferencingHeaders, targetAccount.ID); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// ...otherwise do it async
|
||||||
|
go func() {
|
||||||
|
if err := lockAndLoad(ctx, d.dereferencingHeadersLock, processingMedia, d.dereferencingHeaders, targetAccount.ID); err != nil {
|
||||||
|
logrus.Errorf("fetchRemoteAccountMedia: error during async lock and load of header: %s", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func lockAndLoad(ctx context.Context, lock *sync.Mutex, processing *media.ProcessingMedia, processingMap map[string]*media.ProcessingMedia, accountID string) error {
|
||||||
|
// whatever happens, remove the in-process media from the map
|
||||||
|
defer func() {
|
||||||
|
lock.Lock()
|
||||||
|
delete(processingMap, accountID)
|
||||||
|
lock.Unlock()
|
||||||
|
}()
|
||||||
|
|
||||||
|
// try and load it
|
||||||
|
_, err := processing.LoadAttachment(ctx)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
|
@ -35,11 +35,10 @@ func (suite *AccountTestSuite) TestDereferenceGroup() {
|
||||||
fetchingAccount := suite.testAccounts["local_account_1"]
|
fetchingAccount := suite.testAccounts["local_account_1"]
|
||||||
|
|
||||||
groupURL := testrig.URLMustParse("https://unknown-instance.com/groups/some_group")
|
groupURL := testrig.URLMustParse("https://unknown-instance.com/groups/some_group")
|
||||||
group, new, err := suite.dereferencer.GetRemoteAccount(context.Background(), fetchingAccount.Username, groupURL, false)
|
group, err := suite.dereferencer.GetRemoteAccount(context.Background(), fetchingAccount.Username, groupURL, false, false)
|
||||||
suite.NoError(err)
|
suite.NoError(err)
|
||||||
suite.NotNil(group)
|
suite.NotNil(group)
|
||||||
suite.NotNil(group)
|
suite.NotNil(group)
|
||||||
suite.True(new)
|
|
||||||
|
|
||||||
// group values should be set
|
// group values should be set
|
||||||
suite.Equal("https://unknown-instance.com/groups/some_group", group.URI)
|
suite.Equal("https://unknown-instance.com/groups/some_group", group.URI)
|
||||||
|
|
|
@ -33,8 +33,7 @@
|
||||||
|
|
||||||
// Dereferencer wraps logic and functionality for doing dereferencing of remote accounts, statuses, etc, from federated instances.
|
// Dereferencer wraps logic and functionality for doing dereferencing of remote accounts, statuses, etc, from federated instances.
|
||||||
type Dereferencer interface {
|
type Dereferencer interface {
|
||||||
GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool) (*gtsmodel.Account, bool, error)
|
GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool, blocking bool) (*gtsmodel.Account, error)
|
||||||
EnrichRemoteAccount(ctx context.Context, username string, account *gtsmodel.Account) (*gtsmodel.Account, error)
|
|
||||||
|
|
||||||
GetRemoteStatus(ctx context.Context, username string, remoteStatusID *url.URL, refresh, includeParent bool) (*gtsmodel.Status, ap.Statusable, bool, error)
|
GetRemoteStatus(ctx context.Context, username string, remoteStatusID *url.URL, refresh, includeParent bool) (*gtsmodel.Status, ap.Statusable, bool, error)
|
||||||
EnrichRemoteStatus(ctx context.Context, username string, status *gtsmodel.Status, includeParent bool) (*gtsmodel.Status, error)
|
EnrichRemoteStatus(ctx context.Context, username string, status *gtsmodel.Status, includeParent bool) (*gtsmodel.Status, error)
|
||||||
|
@ -54,6 +53,10 @@ type deref struct {
|
||||||
typeConverter typeutils.TypeConverter
|
typeConverter typeutils.TypeConverter
|
||||||
transportController transport.Controller
|
transportController transport.Controller
|
||||||
mediaManager media.Manager
|
mediaManager media.Manager
|
||||||
|
dereferencingAvatars map[string]*media.ProcessingMedia
|
||||||
|
dereferencingAvatarsLock *sync.Mutex
|
||||||
|
dereferencingHeaders map[string]*media.ProcessingMedia
|
||||||
|
dereferencingHeadersLock *sync.Mutex
|
||||||
handshakes map[string][]*url.URL
|
handshakes map[string][]*url.URL
|
||||||
handshakeSync *sync.Mutex // mutex to lock/unlock when checking or updating the handshakes map
|
handshakeSync *sync.Mutex // mutex to lock/unlock when checking or updating the handshakes map
|
||||||
}
|
}
|
||||||
|
@ -65,6 +68,10 @@ func NewDereferencer(db db.DB, typeConverter typeutils.TypeConverter, transportC
|
||||||
typeConverter: typeConverter,
|
typeConverter: typeConverter,
|
||||||
transportController: transportController,
|
transportController: transportController,
|
||||||
mediaManager: mediaManager,
|
mediaManager: mediaManager,
|
||||||
|
dereferencingAvatars: make(map[string]*media.ProcessingMedia),
|
||||||
|
dereferencingAvatarsLock: &sync.Mutex{},
|
||||||
|
dereferencingHeaders: make(map[string]*media.ProcessingMedia),
|
||||||
|
dereferencingHeadersLock: &sync.Mutex{},
|
||||||
handshakeSync: &sync.Mutex{},
|
handshakeSync: &sync.Mutex{},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -89,7 +89,7 @@ func (d *deref) GetRemoteStatus(ctx context.Context, username string, remoteStat
|
||||||
}
|
}
|
||||||
|
|
||||||
// do this so we know we have the remote account of the status in the db
|
// do this so we know we have the remote account of the status in the db
|
||||||
_, _, err = d.GetRemoteAccount(ctx, username, accountURI, false)
|
_, err = d.GetRemoteAccount(ctx, username, accountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, statusable, new, fmt.Errorf("GetRemoteStatus: couldn't derive status author: %s", err)
|
return nil, statusable, new, fmt.Errorf("GetRemoteStatus: couldn't derive status author: %s", err)
|
||||||
}
|
}
|
||||||
|
@ -332,7 +332,7 @@ func (d *deref) populateStatusMentions(ctx context.Context, status *gtsmodel.Sta
|
||||||
if targetAccount == nil {
|
if targetAccount == nil {
|
||||||
// we didn't find the account in our database already
|
// we didn't find the account in our database already
|
||||||
// check if we can get the account remotely (dereference it)
|
// check if we can get the account remotely (dereference it)
|
||||||
if a, _, err := d.GetRemoteAccount(ctx, requestingUsername, targetAccountURI, false); err != nil {
|
if a, err := d.GetRemoteAccount(ctx, requestingUsername, targetAccountURI, false, false); err != nil {
|
||||||
errs = append(errs, err.Error())
|
errs = append(errs, err.Error())
|
||||||
} else {
|
} else {
|
||||||
logrus.Debugf("populateStatusMentions: got target account %s with id %s through GetRemoteAccount", targetAccountURI, a.ID)
|
logrus.Debugf("populateStatusMentions: got target account %s with id %s through GetRemoteAccount", targetAccountURI, a.ID)
|
||||||
|
@ -394,7 +394,7 @@ func (d *deref) populateStatusAttachments(ctx context.Context, status *gtsmodel.
|
||||||
a.AccountID = status.AccountID
|
a.AccountID = status.AccountID
|
||||||
a.StatusID = status.ID
|
a.StatusID = status.ID
|
||||||
|
|
||||||
media, err := d.GetRemoteMedia(ctx, requestingUsername, a.AccountID, a.RemoteURL, &media.AdditionalMediaInfo{
|
processingMedia, err := d.GetRemoteMedia(ctx, requestingUsername, a.AccountID, a.RemoteURL, &media.AdditionalMediaInfo{
|
||||||
CreatedAt: &a.CreatedAt,
|
CreatedAt: &a.CreatedAt,
|
||||||
StatusID: &a.StatusID,
|
StatusID: &a.StatusID,
|
||||||
RemoteURL: &a.RemoteURL,
|
RemoteURL: &a.RemoteURL,
|
||||||
|
@ -406,7 +406,7 @@ func (d *deref) populateStatusAttachments(ctx context.Context, status *gtsmodel.
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
attachment, err := media.LoadAttachment(ctx)
|
attachment, err := processingMedia.LoadAttachment(ctx)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logrus.Errorf("populateStatusAttachments: couldn't load remote attachment %s: %s", a.RemoteURL, err)
|
logrus.Errorf("populateStatusAttachments: couldn't load remote attachment %s: %s", a.RemoteURL, err)
|
||||||
continue
|
continue
|
||||||
|
|
|
@ -153,7 +153,7 @@ func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWr
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
requestingAccount, _, err := f.GetRemoteAccount(ctx, username, publicKeyOwnerURI, false)
|
requestingAccount, err := f.GetRemoteAccount(ctx, username, publicKeyOwnerURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false, fmt.Errorf("couldn't get requesting account %s: %s", publicKeyOwnerURI, err)
|
return nil, false, fmt.Errorf("couldn't get requesting account %s: %s", publicKeyOwnerURI, err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -57,8 +57,7 @@ type Federator interface {
|
||||||
DereferenceRemoteThread(ctx context.Context, username string, statusURI *url.URL) error
|
DereferenceRemoteThread(ctx context.Context, username string, statusURI *url.URL) error
|
||||||
DereferenceAnnounce(ctx context.Context, announce *gtsmodel.Status, requestingUsername string) error
|
DereferenceAnnounce(ctx context.Context, announce *gtsmodel.Status, requestingUsername string) error
|
||||||
|
|
||||||
GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool) (*gtsmodel.Account, bool, error)
|
GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, blocking bool, refresh bool) (*gtsmodel.Account, error)
|
||||||
EnrichRemoteAccount(ctx context.Context, username string, account *gtsmodel.Account) (*gtsmodel.Account, error)
|
|
||||||
|
|
||||||
GetRemoteStatus(ctx context.Context, username string, remoteStatusID *url.URL, refresh, includeParent bool) (*gtsmodel.Status, ap.Statusable, bool, error)
|
GetRemoteStatus(ctx context.Context, username string, remoteStatusID *url.URL, refresh, includeParent bool) (*gtsmodel.Status, ap.Statusable, bool, error)
|
||||||
EnrichRemoteStatus(ctx context.Context, username string, status *gtsmodel.Status, includeParent bool) (*gtsmodel.Status, error)
|
EnrichRemoteStatus(ctx context.Context, username string, status *gtsmodel.Status, includeParent bool) (*gtsmodel.Status, error)
|
||||||
|
|
|
@ -22,6 +22,7 @@
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net/url"
|
||||||
|
|
||||||
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/db"
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
|
@ -56,7 +57,12 @@ func (p *processor) Get(ctx context.Context, requestingAccount *gtsmodel.Account
|
||||||
|
|
||||||
// last-minute check to make sure we have remote account header/avi cached
|
// last-minute check to make sure we have remote account header/avi cached
|
||||||
if targetAccount.Domain != "" {
|
if targetAccount.Domain != "" {
|
||||||
a, err := p.federator.EnrichRemoteAccount(ctx, requestingAccount.Username, targetAccount)
|
targetAccountURI, err := url.Parse(targetAccount.URI)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("error parsing url %s: %s", targetAccount.URI, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
a, err := p.federator.GetRemoteAccount(ctx, requestingAccount.Username, targetAccountURI, true, false)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
targetAccount = a
|
targetAccount = a
|
||||||
}
|
}
|
||||||
|
|
|
@ -41,7 +41,7 @@ func (p *processor) GetFollowers(ctx context.Context, requestedUsername string,
|
||||||
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
||||||
}
|
}
|
||||||
|
|
||||||
requestingAccount, _, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false)
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotAuthorized(err)
|
return nil, gtserror.NewErrorNotAuthorized(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -41,7 +41,7 @@ func (p *processor) GetFollowing(ctx context.Context, requestedUsername string,
|
||||||
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
||||||
}
|
}
|
||||||
|
|
||||||
requestingAccount, _, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false)
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotAuthorized(err)
|
return nil, gtserror.NewErrorNotAuthorized(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -42,7 +42,7 @@ func (p *processor) GetOutbox(ctx context.Context, requestedUsername string, pag
|
||||||
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
||||||
}
|
}
|
||||||
|
|
||||||
requestingAccount, _, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false)
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotAuthorized(err)
|
return nil, gtserror.NewErrorNotAuthorized(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -43,7 +43,7 @@ func (p *processor) GetStatus(ctx context.Context, requestedUsername string, req
|
||||||
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
||||||
}
|
}
|
||||||
|
|
||||||
requestingAccount, _, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false)
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotAuthorized(err)
|
return nil, gtserror.NewErrorNotAuthorized(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -43,7 +43,7 @@ func (p *processor) GetStatusReplies(ctx context.Context, requestedUsername stri
|
||||||
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
return nil, gtserror.NewErrorNotAuthorized(errors.New("not authorized"), "not authorized")
|
||||||
}
|
}
|
||||||
|
|
||||||
requestingAccount, _, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false)
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotAuthorized(err)
|
return nil, gtserror.NewErrorNotAuthorized(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -54,7 +54,7 @@ func (p *processor) GetUser(ctx context.Context, requestedUsername string, reque
|
||||||
|
|
||||||
// if we're not already handshaking/dereferencing a remote account, dereference it now
|
// if we're not already handshaking/dereferencing a remote account, dereference it now
|
||||||
if !p.federator.Handshaking(ctx, requestedUsername, requestingAccountURI) {
|
if !p.federator.Handshaking(ctx, requestedUsername, requestingAccountURI) {
|
||||||
requestingAccount, _, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false)
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, requestedUsername, requestingAccountURI, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotAuthorized(err)
|
return nil, gtserror.NewErrorNotAuthorized(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,6 +22,7 @@
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net/url"
|
||||||
|
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
|
@ -232,7 +233,12 @@ func (p *processor) processUpdateAccountFromFederator(ctx context.Context, feder
|
||||||
return errors.New("profile was not parseable as *gtsmodel.Account")
|
return errors.New("profile was not parseable as *gtsmodel.Account")
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err := p.federator.EnrichRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, incomingAccount); err != nil {
|
incomingAccountURL, err := url.Parse(incomingAccount.URI)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := p.federator.GetRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, incomingAccountURL, false, true); err != nil {
|
||||||
return fmt.Errorf("error enriching updated account from federator: %s", err)
|
return fmt.Errorf("error enriching updated account from federator: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -148,7 +148,7 @@ func (p *processor) searchAccountByURI(ctx context.Context, authed *oauth.Auth,
|
||||||
|
|
||||||
if resolve {
|
if resolve {
|
||||||
// we don't have it locally so try and dereference it
|
// we don't have it locally so try and dereference it
|
||||||
account, _, err := p.federator.GetRemoteAccount(ctx, authed.Account.Username, uri, true)
|
account, err := p.federator.GetRemoteAccount(ctx, authed.Account.Username, uri, true, true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("searchAccountByURI: error dereferencing account with uri %s: %s", uri.String(), err)
|
return nil, fmt.Errorf("searchAccountByURI: error dereferencing account with uri %s: %s", uri.String(), err)
|
||||||
}
|
}
|
||||||
|
@ -203,7 +203,7 @@ func (p *processor) searchAccountByMention(ctx context.Context, authed *oauth.Au
|
||||||
}
|
}
|
||||||
|
|
||||||
// we don't have it locally so try and dereference it
|
// we don't have it locally so try and dereference it
|
||||||
account, _, err := p.federator.GetRemoteAccount(ctx, authed.Account.Username, acctURI, true)
|
account, err := p.federator.GetRemoteAccount(ctx, authed.Account.Username, acctURI, true, true)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("searchAccountByMention: error dereferencing account with uri %s: %s", acctURI.String(), err)
|
return nil, fmt.Errorf("searchAccountByMention: error dereferencing account with uri %s: %s", acctURI.String(), err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -96,36 +96,33 @@ func (c *converter) AccountToAPIAccountPublic(ctx context.Context, a *gtsmodel.A
|
||||||
lastStatusAt = lastPosted.Format(time.RFC3339)
|
lastStatusAt = lastPosted.Format(time.RFC3339)
|
||||||
}
|
}
|
||||||
|
|
||||||
// build the avatar and header URLs
|
// set account avatar fields if available
|
||||||
var aviURL string
|
var aviURL string
|
||||||
var aviURLStatic string
|
var aviURLStatic string
|
||||||
if a.AvatarMediaAttachmentID != "" {
|
if a.AvatarMediaAttachmentID != "" {
|
||||||
// make sure avi is pinned to this account
|
|
||||||
if a.AvatarMediaAttachment == nil {
|
if a.AvatarMediaAttachment == nil {
|
||||||
avi, err := c.db.GetAttachmentByID(ctx, a.AvatarMediaAttachmentID)
|
avi, err := c.db.GetAttachmentByID(ctx, a.AvatarMediaAttachmentID)
|
||||||
if err != nil {
|
if err == nil {
|
||||||
return nil, fmt.Errorf("error retrieving avatar: %s", err)
|
|
||||||
}
|
|
||||||
a.AvatarMediaAttachment = avi
|
a.AvatarMediaAttachment = avi
|
||||||
}
|
|
||||||
aviURL = a.AvatarMediaAttachment.URL
|
aviURL = a.AvatarMediaAttachment.URL
|
||||||
aviURLStatic = a.AvatarMediaAttachment.Thumbnail.URL
|
aviURLStatic = a.AvatarMediaAttachment.Thumbnail.URL
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// set account header fields if available
|
||||||
var headerURL string
|
var headerURL string
|
||||||
var headerURLStatic string
|
var headerURLStatic string
|
||||||
if a.HeaderMediaAttachmentID != "" {
|
if a.HeaderMediaAttachmentID != "" {
|
||||||
// make sure header is pinned to this account
|
|
||||||
if a.HeaderMediaAttachment == nil {
|
if a.HeaderMediaAttachment == nil {
|
||||||
avi, err := c.db.GetAttachmentByID(ctx, a.HeaderMediaAttachmentID)
|
avi, err := c.db.GetAttachmentByID(ctx, a.HeaderMediaAttachmentID)
|
||||||
if err != nil {
|
if err == nil {
|
||||||
return nil, fmt.Errorf("error retrieving avatar: %s", err)
|
|
||||||
}
|
|
||||||
a.HeaderMediaAttachment = avi
|
a.HeaderMediaAttachment = avi
|
||||||
}
|
|
||||||
headerURL = a.HeaderMediaAttachment.URL
|
headerURL = a.HeaderMediaAttachment.URL
|
||||||
headerURLStatic = a.HeaderMediaAttachment.Thumbnail.URL
|
headerURLStatic = a.HeaderMediaAttachment.Thumbnail.URL
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// get the fields set on this account
|
// get the fields set on this account
|
||||||
fields := []model.Field{}
|
fields := []model.Field{}
|
||||||
|
|
Loading…
Reference in a new issue