mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-25 21:26:40 +00:00
ee65d19ff3
1. Proper DELETE of federated statuses (not yet deleting all the media and stuff -- i still have to implement this -- but the actual status is toast). 2. Proper UPDATE of profiles. When you change your profile picture on your remote instance, that will now register properly in GoToSocial. 3. Scrolling down the home timeline - it no longer just sort of ends, and will keep loading older statuses as you scroll. 4. Little bugfixes -- still had some nil pointer errors when dereferencing remote accounts.
1040 lines
34 KiB
Go
1040 lines
34 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package federation
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
"sync"
|
|
|
|
"github.com/go-fed/activity/pub"
|
|
"github.com/go-fed/activity/streams"
|
|
"github.com/go-fed/activity/streams/vocab"
|
|
"github.com/google/uuid"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/typeutils"
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
|
)
|
|
|
|
type FederatingDB interface {
|
|
pub.Database
|
|
Undo(ctx context.Context, undo vocab.ActivityStreamsUndo) error
|
|
Accept(ctx context.Context, accept vocab.ActivityStreamsAccept) error
|
|
}
|
|
|
|
// FederatingDB uses the underlying DB interface to implement the go-fed pub.Database interface.
|
|
// It doesn't care what the underlying implementation of the DB interface is, as long as it works.
|
|
type federatingDB struct {
|
|
locks *sync.Map
|
|
db db.DB
|
|
config *config.Config
|
|
log *logrus.Logger
|
|
typeConverter typeutils.TypeConverter
|
|
}
|
|
|
|
// NewFederatingDB returns a FederatingDB interface using the given database, config, and logger.
|
|
func NewFederatingDB(db db.DB, config *config.Config, log *logrus.Logger) FederatingDB {
|
|
return &federatingDB{
|
|
locks: new(sync.Map),
|
|
db: db,
|
|
config: config,
|
|
log: log,
|
|
typeConverter: typeutils.NewConverter(config, db),
|
|
}
|
|
}
|
|
|
|
/*
|
|
GO-FED DB INTERFACE-IMPLEMENTING FUNCTIONS
|
|
*/
|
|
|
|
// Lock takes a lock for the object at the specified id. If an error
|
|
// is returned, the lock must not have been taken.
|
|
//
|
|
// The lock must be able to succeed for an id that does not exist in
|
|
// the database. This means acquiring the lock does not guarantee the
|
|
// entry exists in the database.
|
|
//
|
|
// Locks are encouraged to be lightweight and in the Go layer, as some
|
|
// processes require tight loops acquiring and releasing locks.
|
|
//
|
|
// Used to ensure race conditions in multiple requests do not occur.
|
|
func (f *federatingDB) Lock(c context.Context, id *url.URL) error {
|
|
// Before any other Database methods are called, the relevant `id`
|
|
// entries are locked to allow for fine-grained concurrency.
|
|
|
|
// Strategy: create a new lock, if stored, continue. Otherwise, lock the
|
|
// existing mutex.
|
|
mu := &sync.Mutex{}
|
|
mu.Lock() // Optimistically lock if we do store it.
|
|
i, loaded := f.locks.LoadOrStore(id.String(), mu)
|
|
if loaded {
|
|
mu = i.(*sync.Mutex)
|
|
mu.Lock()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Unlock makes the lock for the object at the specified id available.
|
|
// If an error is returned, the lock must have still been freed.
|
|
//
|
|
// Used to ensure race conditions in multiple requests do not occur.
|
|
func (f *federatingDB) Unlock(c context.Context, id *url.URL) error {
|
|
// Once Go-Fed is done calling Database methods, the relevant `id`
|
|
// entries are unlocked.
|
|
|
|
i, ok := f.locks.Load(id.String())
|
|
if !ok {
|
|
return errors.New("missing an id in unlock")
|
|
}
|
|
mu := i.(*sync.Mutex)
|
|
mu.Unlock()
|
|
return nil
|
|
}
|
|
|
|
// InboxContains returns true if the OrderedCollection at 'inbox'
|
|
// contains the specified 'id'.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) InboxContains(c context.Context, inbox, id *url.URL) (contains bool, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "InboxContains",
|
|
"id": id.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering INBOXCONTAINS function with for inbox %s and id %s", inbox.String(), id.String())
|
|
|
|
if !util.IsInboxPath(inbox) {
|
|
return false, fmt.Errorf("%s is not an inbox URI", inbox.String())
|
|
}
|
|
|
|
activityI := c.Value(util.APActivity)
|
|
if activityI == nil {
|
|
return false, fmt.Errorf("no activity was set for id %s", id.String())
|
|
}
|
|
activity, ok := activityI.(pub.Activity)
|
|
if !ok || activity == nil {
|
|
return false, fmt.Errorf("could not parse contextual activity for id %s", id.String())
|
|
}
|
|
|
|
l.Debugf("activity type %s for id %s", activity.GetTypeName(), id.String())
|
|
|
|
return false, nil
|
|
|
|
// if err := f.db.GetByID(statusID, >smodel.Status{}); err != nil {
|
|
// if _, ok := err.(db.ErrNoEntries); ok {
|
|
// // we don't have it
|
|
// return false, nil
|
|
// }
|
|
// // actual error
|
|
// return false, fmt.Errorf("error getting status from db: %s", err)
|
|
// }
|
|
|
|
// // we must have it
|
|
// return true, nil
|
|
}
|
|
|
|
// GetInbox returns the first ordered collection page of the outbox at
|
|
// the specified IRI, for prepending new items.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) GetInbox(c context.Context, inboxIRI *url.URL) (inbox vocab.ActivityStreamsOrderedCollectionPage, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "GetInbox",
|
|
},
|
|
)
|
|
l.Debugf("entering GETINBOX function with inboxIRI %s", inboxIRI.String())
|
|
return streams.NewActivityStreamsOrderedCollectionPage(), nil
|
|
}
|
|
|
|
// SetInbox saves the inbox value given from GetInbox, with new items
|
|
// prepended. Note that the new items must not be added as independent
|
|
// database entries. Separate calls to Create will do that.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) SetInbox(c context.Context, inbox vocab.ActivityStreamsOrderedCollectionPage) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "SetInbox",
|
|
},
|
|
)
|
|
l.Debug("entering SETINBOX function")
|
|
return nil
|
|
}
|
|
|
|
// Owns returns true if the IRI belongs to this instance, and if
|
|
// the database has an entry for the IRI.
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Owns(c context.Context, id *url.URL) (bool, error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Owns",
|
|
"id": id.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering OWNS function with id %s", id.String())
|
|
|
|
// if the id host isn't this instance host, we don't own this IRI
|
|
if id.Host != f.config.Host {
|
|
l.Debugf("we DO NOT own activity because the host is %s not %s", id.Host, f.config.Host)
|
|
return false, nil
|
|
}
|
|
|
|
// apparently it belongs to this host, so what *is* it?
|
|
|
|
// check if it's a status, eg /users/example_username/statuses/SOME_UUID_OF_A_STATUS
|
|
if util.IsStatusesPath(id) {
|
|
_, uid, err := util.ParseStatusesPath(id)
|
|
if err != nil {
|
|
return false, fmt.Errorf("error parsing statuses path for url %s: %s", id.String(), err)
|
|
}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: uid}}, >smodel.Status{}); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
// there are no entries for this status
|
|
return false, nil
|
|
}
|
|
// an actual error happened
|
|
return false, fmt.Errorf("database error fetching status with id %s: %s", uid, err)
|
|
}
|
|
l.Debug("we DO own this")
|
|
return true, nil
|
|
}
|
|
|
|
// check if it's a user, eg /users/example_username
|
|
if util.IsUserPath(id) {
|
|
username, err := util.ParseUserPath(id)
|
|
if err != nil {
|
|
return false, fmt.Errorf("error parsing statuses path for url %s: %s", id.String(), err)
|
|
}
|
|
if err := f.db.GetLocalAccountByUsername(username, >smodel.Account{}); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
// there are no entries for this username
|
|
return false, nil
|
|
}
|
|
// an actual error happened
|
|
return false, fmt.Errorf("database error fetching account with username %s: %s", username, err)
|
|
}
|
|
l.Debug("we DO own this")
|
|
return true, nil
|
|
}
|
|
|
|
if util.IsFollowersPath(id) {
|
|
username, err := util.ParseFollowersPath(id)
|
|
if err != nil {
|
|
return false, fmt.Errorf("error parsing statuses path for url %s: %s", id.String(), err)
|
|
}
|
|
if err := f.db.GetLocalAccountByUsername(username, >smodel.Account{}); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
// there are no entries for this username
|
|
return false, nil
|
|
}
|
|
// an actual error happened
|
|
return false, fmt.Errorf("database error fetching account with username %s: %s", username, err)
|
|
}
|
|
l.Debug("we DO own this")
|
|
return true, nil
|
|
}
|
|
|
|
if util.IsFollowingPath(id) {
|
|
username, err := util.ParseFollowingPath(id)
|
|
if err != nil {
|
|
return false, fmt.Errorf("error parsing statuses path for url %s: %s", id.String(), err)
|
|
}
|
|
if err := f.db.GetLocalAccountByUsername(username, >smodel.Account{}); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
// there are no entries for this username
|
|
return false, nil
|
|
}
|
|
// an actual error happened
|
|
return false, fmt.Errorf("database error fetching account with username %s: %s", username, err)
|
|
}
|
|
l.Debug("we DO own this")
|
|
return true, nil
|
|
}
|
|
|
|
return false, fmt.Errorf("could not match activityID: %s", id.String())
|
|
}
|
|
|
|
// ActorForOutbox fetches the actor's IRI for the given outbox IRI.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) ActorForOutbox(c context.Context, outboxIRI *url.URL) (actorIRI *url.URL, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "ActorForOutbox",
|
|
"inboxIRI": outboxIRI.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering ACTORFOROUTBOX function with outboxIRI %s", outboxIRI.String())
|
|
|
|
if !util.IsOutboxPath(outboxIRI) {
|
|
return nil, fmt.Errorf("%s is not an outbox URI", outboxIRI.String())
|
|
}
|
|
acct := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "outbox_uri", Value: outboxIRI.String()}}, acct); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
return nil, fmt.Errorf("no actor found that corresponds to outbox %s", outboxIRI.String())
|
|
}
|
|
return nil, fmt.Errorf("db error searching for actor with outbox %s", outboxIRI.String())
|
|
}
|
|
return url.Parse(acct.URI)
|
|
}
|
|
|
|
// ActorForInbox fetches the actor's IRI for the given outbox IRI.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) ActorForInbox(c context.Context, inboxIRI *url.URL) (actorIRI *url.URL, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "ActorForInbox",
|
|
"inboxIRI": inboxIRI.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering ACTORFORINBOX function with inboxIRI %s", inboxIRI.String())
|
|
|
|
if !util.IsInboxPath(inboxIRI) {
|
|
return nil, fmt.Errorf("%s is not an inbox URI", inboxIRI.String())
|
|
}
|
|
acct := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "inbox_uri", Value: inboxIRI.String()}}, acct); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
return nil, fmt.Errorf("no actor found that corresponds to inbox %s", inboxIRI.String())
|
|
}
|
|
return nil, fmt.Errorf("db error searching for actor with inbox %s", inboxIRI.String())
|
|
}
|
|
return url.Parse(acct.URI)
|
|
}
|
|
|
|
// OutboxForInbox fetches the corresponding actor's outbox IRI for the
|
|
// actor's inbox IRI.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) OutboxForInbox(c context.Context, inboxIRI *url.URL) (outboxIRI *url.URL, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "OutboxForInbox",
|
|
"inboxIRI": inboxIRI.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering OUTBOXFORINBOX function with inboxIRI %s", inboxIRI.String())
|
|
|
|
if !util.IsInboxPath(inboxIRI) {
|
|
return nil, fmt.Errorf("%s is not an inbox URI", inboxIRI.String())
|
|
}
|
|
acct := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "inbox_uri", Value: inboxIRI.String()}}, acct); err != nil {
|
|
if _, ok := err.(db.ErrNoEntries); ok {
|
|
return nil, fmt.Errorf("no actor found that corresponds to inbox %s", inboxIRI.String())
|
|
}
|
|
return nil, fmt.Errorf("db error searching for actor with inbox %s", inboxIRI.String())
|
|
}
|
|
return url.Parse(acct.OutboxURI)
|
|
}
|
|
|
|
// Exists returns true if the database has an entry for the specified
|
|
// id. It may not be owned by this application instance.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Exists(c context.Context, id *url.URL) (exists bool, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Exists",
|
|
"id": id.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering EXISTS function with id %s", id.String())
|
|
|
|
return false, nil
|
|
}
|
|
|
|
// Get returns the database entry for the specified id.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Get(c context.Context, id *url.URL) (value vocab.Type, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Get",
|
|
"id": id.String(),
|
|
},
|
|
)
|
|
l.Debug("entering GET function")
|
|
|
|
if util.IsUserPath(id) {
|
|
acct := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: id.String()}}, acct); err != nil {
|
|
return nil, err
|
|
}
|
|
l.Debug("is user path! returning account")
|
|
return f.typeConverter.AccountToAS(acct)
|
|
}
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
// Create adds a new entry to the database which must be able to be
|
|
// keyed by its id.
|
|
//
|
|
// Note that Activity values received from federated peers may also be
|
|
// created in the database this way if the Federating Protocol is
|
|
// enabled. The client may freely decide to store only the id instead of
|
|
// the entire value.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
//
|
|
// Under certain conditions and network activities, Create may be called
|
|
// multiple times for the same ActivityStreams object.
|
|
func (f *federatingDB) Create(ctx context.Context, asType vocab.Type) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Create",
|
|
"asType": asType.GetTypeName(),
|
|
},
|
|
)
|
|
m, err := streams.Serialize(asType)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
b, err := json.Marshal(m)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
l.Debugf("received CREATE asType %s", string(b))
|
|
|
|
targetAcctI := ctx.Value(util.APAccount)
|
|
if targetAcctI == nil {
|
|
l.Error("target account wasn't set on context")
|
|
return nil
|
|
}
|
|
targetAcct, ok := targetAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("target account was set on context but couldn't be parsed")
|
|
return nil
|
|
}
|
|
|
|
fromFederatorChanI := ctx.Value(util.APFromFederatorChanKey)
|
|
if fromFederatorChanI == nil {
|
|
l.Error("from federator channel wasn't set on context")
|
|
return nil
|
|
}
|
|
fromFederatorChan, ok := fromFederatorChanI.(chan gtsmodel.FromFederator)
|
|
if !ok {
|
|
l.Error("from federator channel was set on context but couldn't be parsed")
|
|
return nil
|
|
}
|
|
|
|
switch asType.GetTypeName() {
|
|
case gtsmodel.ActivityStreamsCreate:
|
|
create, ok := asType.(vocab.ActivityStreamsCreate)
|
|
if !ok {
|
|
return errors.New("could not convert type to create")
|
|
}
|
|
object := create.GetActivityStreamsObject()
|
|
for objectIter := object.Begin(); objectIter != object.End(); objectIter = objectIter.Next() {
|
|
switch objectIter.GetType().GetTypeName() {
|
|
case gtsmodel.ActivityStreamsNote:
|
|
note := objectIter.GetActivityStreamsNote()
|
|
status, err := f.typeConverter.ASStatusToStatus(note)
|
|
if err != nil {
|
|
return fmt.Errorf("error converting note to status: %s", err)
|
|
}
|
|
if err := f.db.Put(status); err != nil {
|
|
if _, ok := err.(db.ErrAlreadyExists); ok {
|
|
return nil
|
|
}
|
|
return fmt.Errorf("database error inserting status: %s", err)
|
|
}
|
|
|
|
fromFederatorChan <- gtsmodel.FromFederator{
|
|
APObjectType: gtsmodel.ActivityStreamsNote,
|
|
APActivityType: gtsmodel.ActivityStreamsCreate,
|
|
GTSModel: status,
|
|
ReceivingAccount: targetAcct,
|
|
}
|
|
}
|
|
}
|
|
case gtsmodel.ActivityStreamsFollow:
|
|
follow, ok := asType.(vocab.ActivityStreamsFollow)
|
|
if !ok {
|
|
return errors.New("could not convert type to follow")
|
|
}
|
|
|
|
followRequest, err := f.typeConverter.ASFollowToFollowRequest(follow)
|
|
if err != nil {
|
|
return fmt.Errorf("could not convert Follow to follow request: %s", err)
|
|
}
|
|
|
|
if err := f.db.Put(followRequest); err != nil {
|
|
return fmt.Errorf("database error inserting follow request: %s", err)
|
|
}
|
|
|
|
if !targetAcct.Locked {
|
|
if _, err := f.db.AcceptFollowRequest(followRequest.AccountID, followRequest.TargetAccountID); err != nil {
|
|
return fmt.Errorf("database error accepting follow request: %s", err)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Update sets an existing entry to the database based on the value's
|
|
// id.
|
|
//
|
|
// Note that Activity values received from federated peers may also be
|
|
// updated in the database this way if the Federating Protocol is
|
|
// enabled. The client may freely decide to store only the id instead of
|
|
// the entire value.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Update(ctx context.Context, asType vocab.Type) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Update",
|
|
"asType": asType.GetTypeName(),
|
|
},
|
|
)
|
|
m, err := streams.Serialize(asType)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
b, err := json.Marshal(m)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
l.Debugf("received UPDATE asType %s", string(b))
|
|
|
|
receivingAcctI := ctx.Value(util.APAccount)
|
|
if receivingAcctI == nil {
|
|
l.Error("receiving account wasn't set on context")
|
|
}
|
|
receivingAcct, ok := receivingAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("receiving account was set on context but couldn't be parsed")
|
|
}
|
|
|
|
requestingAcctI := ctx.Value(util.APRequestingAccount)
|
|
if receivingAcctI == nil {
|
|
l.Error("requesting account wasn't set on context")
|
|
}
|
|
requestingAcct, ok := requestingAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("requesting account was set on context but couldn't be parsed")
|
|
}
|
|
|
|
fromFederatorChanI := ctx.Value(util.APFromFederatorChanKey)
|
|
if fromFederatorChanI == nil {
|
|
l.Error("from federator channel wasn't set on context")
|
|
}
|
|
fromFederatorChan, ok := fromFederatorChanI.(chan gtsmodel.FromFederator)
|
|
if !ok {
|
|
l.Error("from federator channel was set on context but couldn't be parsed")
|
|
}
|
|
|
|
typeName := asType.GetTypeName()
|
|
if typeName == gtsmodel.ActivityStreamsApplication ||
|
|
typeName == gtsmodel.ActivityStreamsGroup ||
|
|
typeName == gtsmodel.ActivityStreamsOrganization ||
|
|
typeName == gtsmodel.ActivityStreamsPerson ||
|
|
typeName == gtsmodel.ActivityStreamsService {
|
|
// it's an UPDATE to some kind of account
|
|
var accountable typeutils.Accountable
|
|
|
|
switch asType.GetTypeName() {
|
|
case gtsmodel.ActivityStreamsApplication:
|
|
l.Debug("got update for APPLICATION")
|
|
i, ok := asType.(vocab.ActivityStreamsApplication)
|
|
if !ok {
|
|
return errors.New("could not convert type to application")
|
|
}
|
|
accountable = i
|
|
case gtsmodel.ActivityStreamsGroup:
|
|
l.Debug("got update for GROUP")
|
|
i, ok := asType.(vocab.ActivityStreamsGroup)
|
|
if !ok {
|
|
return errors.New("could not convert type to group")
|
|
}
|
|
accountable = i
|
|
case gtsmodel.ActivityStreamsOrganization:
|
|
l.Debug("got update for ORGANIZATION")
|
|
i, ok := asType.(vocab.ActivityStreamsOrganization)
|
|
if !ok {
|
|
return errors.New("could not convert type to organization")
|
|
}
|
|
accountable = i
|
|
case gtsmodel.ActivityStreamsPerson:
|
|
l.Debug("got update for PERSON")
|
|
i, ok := asType.(vocab.ActivityStreamsPerson)
|
|
if !ok {
|
|
return errors.New("could not convert type to person")
|
|
}
|
|
accountable = i
|
|
case gtsmodel.ActivityStreamsService:
|
|
l.Debug("got update for SERVICE")
|
|
i, ok := asType.(vocab.ActivityStreamsService)
|
|
if !ok {
|
|
return errors.New("could not convert type to service")
|
|
}
|
|
accountable = i
|
|
}
|
|
|
|
updatedAcct, err := f.typeConverter.ASRepresentationToAccount(accountable, true)
|
|
if err != nil {
|
|
return fmt.Errorf("error converting to account: %s", err)
|
|
}
|
|
|
|
if requestingAcct.URI != updatedAcct.URI {
|
|
return fmt.Errorf("update for account %s was requested by account %s, this is not valid", updatedAcct.URI, requestingAcct.URI)
|
|
}
|
|
|
|
updatedAcct.ID = requestingAcct.ID // set this here so the db will update properly instead of trying to PUT this and getting constraint issues
|
|
if err := f.db.UpdateByID(requestingAcct.ID, updatedAcct); err != nil {
|
|
return fmt.Errorf("database error inserting updated account: %s", err)
|
|
}
|
|
|
|
fromFederatorChan <- gtsmodel.FromFederator{
|
|
APObjectType: gtsmodel.ActivityStreamsProfile,
|
|
APActivityType: gtsmodel.ActivityStreamsUpdate,
|
|
GTSModel: updatedAcct,
|
|
ReceivingAccount: receivingAcct,
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Delete removes the entry with the given id.
|
|
//
|
|
// Delete is only called for federated objects. Deletes from the Social
|
|
// Protocol instead call Update to create a Tombstone.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Delete(ctx context.Context, id *url.URL) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Delete",
|
|
"id": id.String(),
|
|
},
|
|
)
|
|
l.Debugf("received DELETE id %s", id.String())
|
|
|
|
inboxAcctI := ctx.Value(util.APAccount)
|
|
if inboxAcctI == nil {
|
|
l.Error("inbox account wasn't set on context")
|
|
return nil
|
|
}
|
|
inboxAcct, ok := inboxAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("inbox account was set on context but couldn't be parsed")
|
|
return nil
|
|
}
|
|
|
|
fromFederatorChanI := ctx.Value(util.APFromFederatorChanKey)
|
|
if fromFederatorChanI == nil {
|
|
l.Error("from federator channel wasn't set on context")
|
|
return nil
|
|
}
|
|
fromFederatorChan, ok := fromFederatorChanI.(chan gtsmodel.FromFederator)
|
|
if !ok {
|
|
l.Error("from federator channel was set on context but couldn't be parsed")
|
|
return nil
|
|
}
|
|
|
|
// in a delete we only get the URI, we can't know if we have a status or a profile or something else,
|
|
// so we have to try a few different things...
|
|
where := []db.Where{{Key: "uri", Value: id.String()}}
|
|
|
|
s := >smodel.Status{}
|
|
if err := f.db.GetWhere(where, s); err == nil {
|
|
// it's a status
|
|
l.Debugf("uri is for status with id: %s", s.ID)
|
|
if err := f.db.DeleteByID(s.ID, >smodel.Status{}); err != nil {
|
|
return fmt.Errorf("Delete: err deleting status: %s", err)
|
|
}
|
|
fromFederatorChan <- gtsmodel.FromFederator{
|
|
APObjectType: gtsmodel.ActivityStreamsNote,
|
|
APActivityType: gtsmodel.ActivityStreamsDelete,
|
|
GTSModel: s,
|
|
ReceivingAccount: inboxAcct,
|
|
}
|
|
}
|
|
|
|
a := >smodel.Account{}
|
|
if err := f.db.GetWhere(where, a); err == nil {
|
|
// it's an account
|
|
l.Debugf("uri is for an account with id: %s", s.ID)
|
|
if err := f.db.DeleteByID(a.ID, >smodel.Account{}); err != nil {
|
|
return fmt.Errorf("Delete: err deleting account: %s", err)
|
|
}
|
|
fromFederatorChan <- gtsmodel.FromFederator{
|
|
APObjectType: gtsmodel.ActivityStreamsProfile,
|
|
APActivityType: gtsmodel.ActivityStreamsDelete,
|
|
GTSModel: a,
|
|
ReceivingAccount: inboxAcct,
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetOutbox returns the first ordered collection page of the outbox
|
|
// at the specified IRI, for prepending new items.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) GetOutbox(c context.Context, outboxIRI *url.URL) (inbox vocab.ActivityStreamsOrderedCollectionPage, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "GetOutbox",
|
|
},
|
|
)
|
|
l.Debug("entering GETOUTBOX function")
|
|
|
|
return streams.NewActivityStreamsOrderedCollectionPage(), nil
|
|
}
|
|
|
|
// SetOutbox saves the outbox value given from GetOutbox, with new items
|
|
// prepended. Note that the new items must not be added as independent
|
|
// database entries. Separate calls to Create will do that.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) SetOutbox(c context.Context, outbox vocab.ActivityStreamsOrderedCollectionPage) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "SetOutbox",
|
|
},
|
|
)
|
|
l.Debug("entering SETOUTBOX function")
|
|
|
|
return nil
|
|
}
|
|
|
|
// NewID creates a new IRI id for the provided activity or object. The
|
|
// implementation does not need to set the 'id' property and simply
|
|
// needs to determine the value.
|
|
//
|
|
// The go-fed library will handle setting the 'id' property on the
|
|
// activity or object provided with the value returned.
|
|
func (f *federatingDB) NewID(c context.Context, t vocab.Type) (id *url.URL, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "NewID",
|
|
"asType": t.GetTypeName(),
|
|
},
|
|
)
|
|
m, err := streams.Serialize(t)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
b, err := json.Marshal(m)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
l.Debugf("received NEWID request for asType %s", string(b))
|
|
|
|
switch t.GetTypeName() {
|
|
case gtsmodel.ActivityStreamsFollow:
|
|
// FOLLOW
|
|
// ID might already be set on a follow we've created, so check it here and return it if it is
|
|
follow, ok := t.(vocab.ActivityStreamsFollow)
|
|
if !ok {
|
|
return nil, errors.New("newid: follow couldn't be parsed into vocab.ActivityStreamsFollow")
|
|
}
|
|
idProp := follow.GetJSONLDId()
|
|
if idProp != nil {
|
|
if idProp.IsIRI() {
|
|
return idProp.GetIRI(), nil
|
|
}
|
|
}
|
|
// it's not set so create one based on the actor set on the follow (ie., the followER not the followEE)
|
|
actorProp := follow.GetActivityStreamsActor()
|
|
if actorProp != nil {
|
|
for iter := actorProp.Begin(); iter != actorProp.End(); iter = iter.Next() {
|
|
// take the IRI of the first actor we can find (there should only be one)
|
|
if iter.IsIRI() {
|
|
actorAccount := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: iter.GetIRI().String()}}, actorAccount); err == nil { // if there's an error here, just use the fallback behavior -- we don't need to return an error here
|
|
return url.Parse(util.GenerateURIForFollow(actorAccount.Username, f.config.Protocol, f.config.Host))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
case gtsmodel.ActivityStreamsNote:
|
|
// NOTE aka STATUS
|
|
// ID might already be set on a note we've created, so check it here and return it if it is
|
|
note, ok := t.(vocab.ActivityStreamsNote)
|
|
if !ok {
|
|
return nil, errors.New("newid: follow couldn't be parsed into vocab.ActivityStreamsNote")
|
|
}
|
|
idProp := note.GetJSONLDId()
|
|
if idProp != nil {
|
|
if idProp.IsIRI() {
|
|
return idProp.GetIRI(), nil
|
|
}
|
|
}
|
|
}
|
|
|
|
// fallback default behavior: just return a random UUID after our protocol and host
|
|
return url.Parse(fmt.Sprintf("%s://%s/%s", f.config.Protocol, f.config.Host, uuid.NewString()))
|
|
}
|
|
|
|
// Followers obtains the Followers Collection for an actor with the
|
|
// given id.
|
|
//
|
|
// If modified, the library will then call Update.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Followers(c context.Context, actorIRI *url.URL) (followers vocab.ActivityStreamsCollection, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Followers",
|
|
"actorIRI": actorIRI.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering FOLLOWERS function with actorIRI %s", actorIRI.String())
|
|
|
|
acct := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: actorIRI.String()}}, acct); err != nil {
|
|
return nil, fmt.Errorf("db error getting account with uri %s: %s", actorIRI.String(), err)
|
|
}
|
|
|
|
acctFollowers := []gtsmodel.Follow{}
|
|
if err := f.db.GetFollowersByAccountID(acct.ID, &acctFollowers); err != nil {
|
|
return nil, fmt.Errorf("db error getting followers for account id %s: %s", acct.ID, err)
|
|
}
|
|
|
|
followers = streams.NewActivityStreamsCollection()
|
|
items := streams.NewActivityStreamsItemsProperty()
|
|
for _, follow := range acctFollowers {
|
|
gtsFollower := >smodel.Account{}
|
|
if err := f.db.GetByID(follow.AccountID, gtsFollower); err != nil {
|
|
return nil, fmt.Errorf("db error getting account id %s: %s", follow.AccountID, err)
|
|
}
|
|
uri, err := url.Parse(gtsFollower.URI)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error parsing %s as url: %s", gtsFollower.URI, err)
|
|
}
|
|
items.AppendIRI(uri)
|
|
}
|
|
followers.SetActivityStreamsItems(items)
|
|
return
|
|
}
|
|
|
|
// Following obtains the Following Collection for an actor with the
|
|
// given id.
|
|
//
|
|
// If modified, the library will then call Update.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Following(c context.Context, actorIRI *url.URL) (following vocab.ActivityStreamsCollection, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Following",
|
|
"actorIRI": actorIRI.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering FOLLOWING function with actorIRI %s", actorIRI.String())
|
|
|
|
acct := >smodel.Account{}
|
|
if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: actorIRI.String()}}, acct); err != nil {
|
|
return nil, fmt.Errorf("db error getting account with uri %s: %s", actorIRI.String(), err)
|
|
}
|
|
|
|
acctFollowing := []gtsmodel.Follow{}
|
|
if err := f.db.GetFollowingByAccountID(acct.ID, &acctFollowing); err != nil {
|
|
return nil, fmt.Errorf("db error getting following for account id %s: %s", acct.ID, err)
|
|
}
|
|
|
|
following = streams.NewActivityStreamsCollection()
|
|
items := streams.NewActivityStreamsItemsProperty()
|
|
for _, follow := range acctFollowing {
|
|
gtsFollowing := >smodel.Account{}
|
|
if err := f.db.GetByID(follow.AccountID, gtsFollowing); err != nil {
|
|
return nil, fmt.Errorf("db error getting account id %s: %s", follow.AccountID, err)
|
|
}
|
|
uri, err := url.Parse(gtsFollowing.URI)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error parsing %s as url: %s", gtsFollowing.URI, err)
|
|
}
|
|
items.AppendIRI(uri)
|
|
}
|
|
following.SetActivityStreamsItems(items)
|
|
return
|
|
}
|
|
|
|
// Liked obtains the Liked Collection for an actor with the
|
|
// given id.
|
|
//
|
|
// If modified, the library will then call Update.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Liked(c context.Context, actorIRI *url.URL) (liked vocab.ActivityStreamsCollection, err error) {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Liked",
|
|
"actorIRI": actorIRI.String(),
|
|
},
|
|
)
|
|
l.Debugf("entering LIKED function with actorIRI %s", actorIRI.String())
|
|
return nil, nil
|
|
}
|
|
|
|
/*
|
|
CUSTOM FUNCTIONALITY FOR GTS
|
|
*/
|
|
|
|
func (f *federatingDB) Undo(ctx context.Context, undo vocab.ActivityStreamsUndo) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Undo",
|
|
"asType": undo.GetTypeName(),
|
|
},
|
|
)
|
|
m, err := streams.Serialize(undo)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
b, err := json.Marshal(m)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
l.Debugf("received UNDO asType %s", string(b))
|
|
|
|
targetAcctI := ctx.Value(util.APAccount)
|
|
if targetAcctI == nil {
|
|
l.Error("UNDO: target account wasn't set on context")
|
|
return nil
|
|
}
|
|
targetAcct, ok := targetAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("UNDO: target account was set on context but couldn't be parsed")
|
|
return nil
|
|
}
|
|
|
|
undoObject := undo.GetActivityStreamsObject()
|
|
if undoObject == nil {
|
|
return errors.New("UNDO: no object set on vocab.ActivityStreamsUndo")
|
|
}
|
|
|
|
for iter := undoObject.Begin(); iter != undoObject.End(); iter = iter.Next() {
|
|
switch iter.GetType().GetTypeName() {
|
|
case string(gtsmodel.ActivityStreamsFollow):
|
|
// UNDO FOLLOW
|
|
ASFollow, ok := iter.GetType().(vocab.ActivityStreamsFollow)
|
|
if !ok {
|
|
return errors.New("UNDO: couldn't parse follow into vocab.ActivityStreamsFollow")
|
|
}
|
|
// make sure the actor owns the follow
|
|
if !sameActor(undo.GetActivityStreamsActor(), ASFollow.GetActivityStreamsActor()) {
|
|
return errors.New("UNDO: follow actor and activity actor not the same")
|
|
}
|
|
// convert the follow to something we can understand
|
|
gtsFollow, err := f.typeConverter.ASFollowToFollow(ASFollow)
|
|
if err != nil {
|
|
return fmt.Errorf("UNDO: error converting asfollow to gtsfollow: %s", err)
|
|
}
|
|
// make sure the addressee of the original follow is the same as whatever inbox this landed in
|
|
if gtsFollow.TargetAccountID != targetAcct.ID {
|
|
return errors.New("UNDO: follow object account and inbox account were not the same")
|
|
}
|
|
// delete any existing FOLLOW
|
|
if err := f.db.DeleteWhere([]db.Where{{Key: "uri", Value: gtsFollow.URI}}, >smodel.Follow{}); err != nil {
|
|
return fmt.Errorf("UNDO: db error removing follow: %s", err)
|
|
}
|
|
// delete any existing FOLLOW REQUEST
|
|
if err := f.db.DeleteWhere([]db.Where{{Key: "uri", Value: gtsFollow.URI}}, >smodel.FollowRequest{}); err != nil {
|
|
return fmt.Errorf("UNDO: db error removing follow request: %s", err)
|
|
}
|
|
l.Debug("follow undone")
|
|
return nil
|
|
case string(gtsmodel.ActivityStreamsLike):
|
|
// UNDO LIKE
|
|
case string(gtsmodel.ActivityStreamsAnnounce):
|
|
// UNDO BOOST/REBLOG/ANNOUNCE
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (f *federatingDB) Accept(ctx context.Context, accept vocab.ActivityStreamsAccept) error {
|
|
l := f.log.WithFields(
|
|
logrus.Fields{
|
|
"func": "Accept",
|
|
"asType": accept.GetTypeName(),
|
|
},
|
|
)
|
|
m, err := streams.Serialize(accept)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
b, err := json.Marshal(m)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
l.Debugf("received ACCEPT asType %s", string(b))
|
|
|
|
inboxAcctI := ctx.Value(util.APAccount)
|
|
if inboxAcctI == nil {
|
|
l.Error("ACCEPT: inbox account wasn't set on context")
|
|
return nil
|
|
}
|
|
inboxAcct, ok := inboxAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("ACCEPT: inbox account was set on context but couldn't be parsed")
|
|
return nil
|
|
}
|
|
|
|
acceptObject := accept.GetActivityStreamsObject()
|
|
if acceptObject == nil {
|
|
return errors.New("ACCEPT: no object set on vocab.ActivityStreamsUndo")
|
|
}
|
|
|
|
for iter := acceptObject.Begin(); iter != acceptObject.End(); iter = iter.Next() {
|
|
switch iter.GetType().GetTypeName() {
|
|
case string(gtsmodel.ActivityStreamsFollow):
|
|
// ACCEPT FOLLOW
|
|
asFollow, ok := iter.GetType().(vocab.ActivityStreamsFollow)
|
|
if !ok {
|
|
return errors.New("ACCEPT: couldn't parse follow into vocab.ActivityStreamsFollow")
|
|
}
|
|
// convert the follow to something we can understand
|
|
gtsFollow, err := f.typeConverter.ASFollowToFollow(asFollow)
|
|
if err != nil {
|
|
return fmt.Errorf("ACCEPT: error converting asfollow to gtsfollow: %s", err)
|
|
}
|
|
// make sure the addressee of the original follow is the same as whatever inbox this landed in
|
|
if gtsFollow.AccountID != inboxAcct.ID {
|
|
return errors.New("ACCEPT: follow object account and inbox account were not the same")
|
|
}
|
|
_, err = f.db.AcceptFollowRequest(gtsFollow.AccountID, gtsFollow.TargetAccountID)
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|