// GoToSocial // Copyright (C) GoToSocial Authors admin@gotosocial.org // SPDX-License-Identifier: AGPL-3.0-or-later // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . package federatingdb import ( "context" "errors" "net/url" "github.com/superseriousbusiness/activity/streams/vocab" "github.com/superseriousbusiness/gotosocial/internal/ap" "github.com/superseriousbusiness/gotosocial/internal/config" "github.com/superseriousbusiness/gotosocial/internal/db" "github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/log" "github.com/superseriousbusiness/gotosocial/internal/messages" "github.com/superseriousbusiness/gotosocial/internal/uris" "github.com/superseriousbusiness/gotosocial/internal/util" ) func (f *federatingDB) GetAccept( ctx context.Context, acceptIRI *url.URL, ) (vocab.ActivityStreamsAccept, error) { approval, err := f.state.DB.GetInteractionRequestByURI(ctx, acceptIRI.String()) if err != nil { return nil, err } return f.converter.InteractionReqToASAccept(ctx, approval) } func (f *federatingDB) Accept(ctx context.Context, accept vocab.ActivityStreamsAccept) error { log.DebugKV(ctx, "accept", serialize{accept}) activityContext := getActivityContext(ctx) if activityContext.internal { return nil // Already processed. } requestingAcct := activityContext.requestingAcct receivingAcct := activityContext.receivingAcct if requestingAcct.IsMoving() { // A Moving account // can't do this. return nil } activityID := ap.GetJSONLDId(accept) if activityID == nil { // We need an ID. const text = "Accept had no id property" return gtserror.NewErrorBadRequest(errors.New(text), text) } // Ensure requester is the same as the // Actor of the Accept; you can't Accept // something on someone else's behalf. actorURI, err := ap.ExtractActorURI(accept) if err != nil { const text = "Accept had empty or invalid actor property" return gtserror.NewErrorBadRequest(errors.New(text), text) } if requestingAcct.URI != actorURI.String() { const text = "Accept actor and requesting account were not the same" return gtserror.NewErrorBadRequest(errors.New(text), text) } // Iterate all provided objects in the activity, // handling the ones we know how to handle. for _, object := range ap.ExtractObjects(accept) { if asType := object.GetType(); asType != nil { // Check and handle any vocab.Type objects. switch name := asType.GetTypeName(); name { // ACCEPT FOLLOW case ap.ActivityFollow: if err := f.acceptFollowType( ctx, asType, receivingAcct, requestingAcct, ); err != nil { return err } // UNHANDLED default: log.Debugf(ctx, "unhandled object type: %s", name) } } else if object.IsIRI() { // Check and handle any // IRI type objects. switch objIRI := object.GetIRI(); { // ACCEPT FOLLOW case uris.IsFollowPath(objIRI): if err := f.acceptFollowIRI( ctx, objIRI.String(), receivingAcct, requestingAcct, ); err != nil { return err } // ACCEPT LIKE case uris.IsLikePath(objIRI): if err := f.acceptLikeIRI( ctx, activityID.String(), objIRI.String(), receivingAcct, requestingAcct, ); err != nil { return err } // ACCEPT OTHER (reply? boost?) // // Don't check on IsStatusesPath // as this may be a remote status. default: if err := f.acceptOtherIRI( ctx, activityID, objIRI, receivingAcct, requestingAcct, ); err != nil { return err } } } } return nil } func (f *federatingDB) acceptFollowType( ctx context.Context, asType vocab.Type, receivingAcct *gtsmodel.Account, requestingAcct *gtsmodel.Account, ) error { // Cast the vocab.Type object to known AS type. asFollow := asType.(vocab.ActivityStreamsFollow) // Reconstruct the follow. follow, err := f.converter.ASFollowToFollow(ctx, asFollow) if err != nil { err := gtserror.Newf("error converting Follow to *gtsmodel.Follow: %w", err) return gtserror.NewErrorInternalError(err) } // Lock on the Follow URI // as we may be updating it. unlock := f.state.FedLocks.Lock(follow.URI) defer unlock() // Make sure the creator of the original follow // is the same as whatever inbox this landed in. if follow.AccountID != receivingAcct.ID { const text = "Follow account and inbox account were not the same" return gtserror.NewErrorUnprocessableEntity(errors.New(text), text) } // Make sure the target of the original follow // is the same as the account making the request. if follow.TargetAccountID != requestingAcct.ID { const text = "Follow target account and requesting account were not the same" return gtserror.NewErrorForbidden(errors.New(text), text) } // Accept and get the populated follow back. follow, err = f.state.DB.AcceptFollowRequest( ctx, follow.AccountID, follow.TargetAccountID, ) if err != nil && !errors.Is(err, db.ErrNoEntries) { err := gtserror.Newf("db error accepting follow request: %w", err) return gtserror.NewErrorInternalError(err) } if follow == nil { // There was no follow request // to accept, just return 202. return nil } // Send the accepted follow through // the processor to do side effects. f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ APObjectType: ap.ActivityFollow, APActivityType: ap.ActivityAccept, GTSModel: follow, Receiving: receivingAcct, Requesting: requestingAcct, }) return nil } func (f *federatingDB) acceptFollowIRI( ctx context.Context, objectIRI string, receivingAcct *gtsmodel.Account, requestingAcct *gtsmodel.Account, ) error { // Lock on this potential Follow // URI as we may be updating it. unlock := f.state.FedLocks.Lock(objectIRI) defer unlock() // Get the follow req from the db. followReq, err := f.state.DB.GetFollowRequestByURI(ctx, objectIRI) if err != nil && !errors.Is(err, db.ErrNoEntries) { err := gtserror.Newf("db error getting follow request: %w", err) return gtserror.NewErrorInternalError(err) } if followReq == nil { // We didn't have a follow request // with this URI, so nothing to do. // Just return. return nil } // Make sure the creator of the original follow // is the same as whatever inbox this landed in. if followReq.AccountID != receivingAcct.ID { const text = "Follow account and inbox account were not the same" return gtserror.NewErrorUnprocessableEntity(errors.New(text), text) } // Make sure the target of the original follow // is the same as the account making the request. if followReq.TargetAccountID != requestingAcct.ID { const text = "Follow target account and requesting account were not the same" return gtserror.NewErrorForbidden(errors.New(text), text) } // Accept and get the populated follow back. follow, err := f.state.DB.AcceptFollowRequest( ctx, followReq.AccountID, followReq.TargetAccountID, ) if err != nil && !errors.Is(err, db.ErrNoEntries) { err := gtserror.Newf("db error accepting follow request: %w", err) return gtserror.NewErrorInternalError(err) } if follow == nil { // There was no follow request // to accept, just return 202. return nil } // Send the accepted follow through // the processor to do side effects. f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ APObjectType: ap.ActivityFollow, APActivityType: ap.ActivityAccept, GTSModel: follow, Receiving: receivingAcct, Requesting: requestingAcct, }) return nil } func (f *federatingDB) acceptOtherIRI( ctx context.Context, activityID *url.URL, objectIRI *url.URL, receivingAcct *gtsmodel.Account, requestingAcct *gtsmodel.Account, ) error { // See if we can get a status from the db. status, err := f.state.DB.GetStatusByURI(ctx, objectIRI.String()) if err != nil && !errors.Is(err, db.ErrNoEntries) { err := gtserror.Newf("db error getting status: %w", err) return gtserror.NewErrorInternalError(err) } if status != nil { // We had a status stored with this // objectIRI, proceed to accept it. return f.acceptStoredStatus( ctx, activityID, status, receivingAcct, requestingAcct, ) } if objectIRI.Host == config.GetHost() || objectIRI.Host == config.GetAccountDomain() { // Claims to be Accepting something of ours, // but we don't have a status stored for this // URI, so most likely it's been deleted in // the meantime, just bail. return nil } // This must be an Accept of a remote Activity // or Object. Ensure relevance of this message // by checking that receiver follows requester. following, err := f.state.DB.IsFollowing( ctx, receivingAcct.ID, requestingAcct.ID, ) if err != nil { err := gtserror.Newf("db error checking following: %w", err) return gtserror.NewErrorInternalError(err) } if !following { // If we don't follow this person, and // they're not Accepting something we know // about, then we don't give a good goddamn. return nil } // This may be a reply, or it may be a boost, // we can't know yet without dereferencing it, // but let the processor worry about that. apObjectType := ap.ObjectUnknown // Pass to the processor and let them handle side effects. f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ APObjectType: apObjectType, APActivityType: ap.ActivityAccept, APIRI: activityID, APObject: objectIRI, Receiving: receivingAcct, Requesting: requestingAcct, }) return nil } func (f *federatingDB) acceptStoredStatus( ctx context.Context, activityID *url.URL, status *gtsmodel.Status, receivingAcct *gtsmodel.Account, requestingAcct *gtsmodel.Account, ) error { // Lock on this status URI // as we may be updating it. unlock := f.state.FedLocks.Lock(status.URI) defer unlock() pendingApproval := util.PtrOrValue(status.PendingApproval, false) if !pendingApproval { // Status doesn't need approval or it's // already been approved by an Accept. // Just return. return nil } // Make sure the target of the interaction (reply/boost) // is the same as the account doing the Accept. if status.BoostOfAccountID != requestingAcct.ID && status.InReplyToAccountID != requestingAcct.ID { const text = "status reply to or boost of account and requesting account were not the same" return gtserror.NewErrorForbidden(errors.New(text), text) } // Mark the status as approved by this Accept URI. status.PendingApproval = util.Ptr(false) status.ApprovedByURI = activityID.String() if err := f.state.DB.UpdateStatus( ctx, status, "pending_approval", "approved_by_uri", ); err != nil { err := gtserror.Newf("db error accepting status: %w", err) return gtserror.NewErrorInternalError(err) } var apObjectType string if status.InReplyToID != "" { // Accepting a Reply. apObjectType = ap.ObjectNote } else { // Accepting an Announce. apObjectType = ap.ActivityAnnounce } // Send the now-approved status through to the // fedi worker again to process side effects. f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ APObjectType: apObjectType, APActivityType: ap.ActivityAccept, GTSModel: status, Receiving: receivingAcct, Requesting: requestingAcct, }) return nil } func (f *federatingDB) acceptLikeIRI( ctx context.Context, activityID string, objectIRI string, receivingAcct *gtsmodel.Account, requestingAcct *gtsmodel.Account, ) error { // Lock on this potential Like // URI as we may be updating it. unlock := f.state.FedLocks.Lock(objectIRI) defer unlock() // Get the fave from the db. fave, err := f.state.DB.GetStatusFaveByURI(ctx, objectIRI) if err != nil && !errors.Is(err, db.ErrNoEntries) { err := gtserror.Newf("db error getting fave: %w", err) return gtserror.NewErrorInternalError(err) } if fave == nil { // We didn't have a fave with // this URI, so nothing to do. // Just return. return nil } if !fave.Account.IsLocal() { // We don't process Accepts of Likes // that weren't created on our instance. // Just return. return nil } pendingApproval := util.PtrOrValue(fave.PendingApproval, false) if !pendingApproval { // Like doesn't need approval or it's // already been approved by an Accept. // Just return. return nil } // Make sure the creator of the original Like // is the same as the inbox processing the Accept; // this also ensures the Like is local. if fave.AccountID != receivingAcct.ID { const text = "fave creator account and inbox account were not the same" return gtserror.NewErrorUnprocessableEntity(errors.New(text), text) } // Make sure the target of the Like is the // same as the account doing the Accept. if fave.TargetAccountID != requestingAcct.ID { const text = "status fave target account and requesting account were not the same" return gtserror.NewErrorForbidden(errors.New(text), text) } // Mark the fave as approved by this Accept URI. fave.PendingApproval = util.Ptr(false) fave.ApprovedByURI = activityID if err := f.state.DB.UpdateStatusFave( ctx, fave, "pending_approval", "approved_by_uri", ); err != nil { err := gtserror.Newf("db error accepting status: %w", err) return gtserror.NewErrorInternalError(err) } // Send the now-approved fave through to the // fedi worker again to process side effects. f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ APObjectType: ap.ActivityLike, APActivityType: ap.ActivityAccept, GTSModel: fave, Receiving: receivingAcct, Requesting: requestingAcct, }) return nil }