mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-12-23 10:42:12 +00:00
dfdc473cef
* move finger to dereferencer * totally break GetRemoteAccount * start reworking finger func a bit * start reworking getRemoteAccount a bit * move mention parts to namestring * rework webfingerget * use util function to extract webfinger parts * use accountDomain * rework finger again, final form * just a real nasty commit, the worst * remove refresh from account * use new ASRepToAccount signature * fix incorrect debug call * fix for new getRemoteAccount * rework GetRemoteAccount * start updating tests to remove repetition * break a lot of tests Move shared test logic into the testrig, rather than having it scattered all over the place. This allows us to just mock the transport controller once, and have all tests use it (unless they need not to for some other reason). * fix up tests to use main mock httpclient * webfinger only if necessary * cheeky linting with the lads * update mentionName regex recognize instance accounts * don't finger instance accounts * test webfinger part extraction * increase default worker count to 4 per cpu * don't repeat regex parsing * final search for discovered accountDomain * be more permissive in namestring lookup * add more extraction tests * simplify GetParseMentionFunc * skip long search if local account * fix broken test
159 lines
5.1 KiB
Go
159 lines
5.1 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package federatingdb
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
|
)
|
|
|
|
// Update sets an existing entry to the database based on the value's
|
|
// id.
|
|
//
|
|
// Note that Activity values received from federated peers may also be
|
|
// updated in the database this way if the Federating Protocol is
|
|
// enabled. The client may freely decide to store only the id instead of
|
|
// the entire value.
|
|
//
|
|
// The library makes this call only after acquiring a lock first.
|
|
func (f *federatingDB) Update(ctx context.Context, asType vocab.Type) error {
|
|
l := logrus.WithFields(
|
|
logrus.Fields{
|
|
"func": "Update",
|
|
},
|
|
)
|
|
|
|
if logrus.GetLevel() >= logrus.DebugLevel {
|
|
i, err := marshalItem(asType)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
l = l.WithField("update", i)
|
|
l.Debug("entering Update")
|
|
}
|
|
|
|
receivingAccount, _ := extractFromCtx(ctx)
|
|
if receivingAccount == nil {
|
|
// If the receiving account wasn't set on the context, that means this request didn't pass
|
|
// through the API, but came from inside GtS as the result of another activity on this instance. That being so,
|
|
// we can safely just ignore this activity, since we know we've already processed it elsewhere.
|
|
return nil
|
|
}
|
|
|
|
requestingAcctI := ctx.Value(ap.ContextRequestingAccount)
|
|
if requestingAcctI == nil {
|
|
l.Error("UPDATE: requesting account wasn't set on context")
|
|
}
|
|
requestingAcct, ok := requestingAcctI.(*gtsmodel.Account)
|
|
if !ok {
|
|
l.Error("UPDATE: requesting account was set on context but couldn't be parsed")
|
|
}
|
|
|
|
typeName := asType.GetTypeName()
|
|
if typeName == ap.ActorApplication ||
|
|
typeName == ap.ActorGroup ||
|
|
typeName == ap.ActorOrganization ||
|
|
typeName == ap.ActorPerson ||
|
|
typeName == ap.ActorService {
|
|
// it's an UPDATE to some kind of account
|
|
var accountable ap.Accountable
|
|
switch typeName {
|
|
case ap.ActorApplication:
|
|
l.Debug("got update for APPLICATION")
|
|
i, ok := asType.(vocab.ActivityStreamsApplication)
|
|
if !ok {
|
|
return errors.New("UPDATE: could not convert type to application")
|
|
}
|
|
accountable = i
|
|
case ap.ActorGroup:
|
|
l.Debug("got update for GROUP")
|
|
i, ok := asType.(vocab.ActivityStreamsGroup)
|
|
if !ok {
|
|
return errors.New("UPDATE: could not convert type to group")
|
|
}
|
|
accountable = i
|
|
case ap.ActorOrganization:
|
|
l.Debug("got update for ORGANIZATION")
|
|
i, ok := asType.(vocab.ActivityStreamsOrganization)
|
|
if !ok {
|
|
return errors.New("UPDATE: could not convert type to organization")
|
|
}
|
|
accountable = i
|
|
case ap.ActorPerson:
|
|
l.Debug("got update for PERSON")
|
|
i, ok := asType.(vocab.ActivityStreamsPerson)
|
|
if !ok {
|
|
return errors.New("UPDATE: could not convert type to person")
|
|
}
|
|
accountable = i
|
|
case ap.ActorService:
|
|
l.Debug("got update for SERVICE")
|
|
i, ok := asType.(vocab.ActivityStreamsService)
|
|
if !ok {
|
|
return errors.New("UPDATE: could not convert type to service")
|
|
}
|
|
accountable = i
|
|
}
|
|
|
|
updatedAcct, err := f.typeConverter.ASRepresentationToAccount(ctx, accountable, "", true)
|
|
if err != nil {
|
|
return fmt.Errorf("UPDATE: error converting to account: %s", err)
|
|
}
|
|
|
|
if updatedAcct.Domain == config.GetHost() {
|
|
// no need to update local accounts
|
|
// in fact, if we do this will break the shit out of things so do NOT
|
|
return nil
|
|
}
|
|
|
|
if requestingAcct.URI != updatedAcct.URI {
|
|
return fmt.Errorf("UPDATE: update for account %s was requested by account %s, this is not valid", updatedAcct.URI, requestingAcct.URI)
|
|
}
|
|
|
|
// set some fields here on the updatedAccount representation so we don't run into db issues
|
|
updatedAcct.CreatedAt = requestingAcct.CreatedAt
|
|
updatedAcct.ID = requestingAcct.ID
|
|
updatedAcct.Language = requestingAcct.Language
|
|
|
|
// do the update
|
|
updatedAcct, err = f.db.UpdateAccount(ctx, updatedAcct)
|
|
if err != nil {
|
|
return fmt.Errorf("UPDATE: database error inserting updated account: %s", err)
|
|
}
|
|
|
|
// pass to the processor for further processing of eg., avatar/header
|
|
f.fedWorker.Queue(messages.FromFederator{
|
|
APObjectType: ap.ObjectProfile,
|
|
APActivityType: ap.ActivityUpdate,
|
|
GTSModel: updatedAcct,
|
|
ReceivingAccount: receivingAccount,
|
|
})
|
|
}
|
|
|
|
return nil
|
|
}
|