2021-07-05 14:23:03 +03:00
|
|
|
/*
|
|
|
|
GoToSocial
|
2021-12-20 20:42:19 +03:00
|
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
2021-07-05 14:23:03 +03:00
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package account
|
|
|
|
|
|
|
|
import (
|
2021-08-25 16:34:33 +03:00
|
|
|
"context"
|
2022-03-15 18:12:35 +03:00
|
|
|
"errors"
|
2021-07-05 14:23:03 +03:00
|
|
|
"time"
|
|
|
|
|
2022-07-19 11:47:55 +03:00
|
|
|
"codeberg.org/gruf/go-kv"
|
2021-08-31 16:59:12 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2022-03-15 18:12:35 +03:00
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
2021-07-05 14:23:03 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
2022-03-15 18:12:35 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
2021-07-05 14:23:03 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-07-19 11:47:55 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2021-08-31 16:59:12 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
2022-03-15 18:12:35 +03:00
|
|
|
"golang.org/x/crypto/bcrypt"
|
2021-07-05 14:23:03 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// Delete handles the complete deletion of an account.
|
|
|
|
//
|
2021-09-30 11:56:02 +03:00
|
|
|
// To be done in this function:
|
2021-07-05 14:23:03 +03:00
|
|
|
// 1. Delete account's application(s), clients, and oauth tokens
|
|
|
|
// 2. Delete account's blocks
|
|
|
|
// 3. Delete account's emoji
|
|
|
|
// 4. Delete account's follow requests
|
|
|
|
// 5. Delete account's follows
|
|
|
|
// 6. Delete account's statuses
|
|
|
|
// 7. Delete account's media attachments
|
|
|
|
// 8. Delete account's mentions
|
|
|
|
// 9. Delete account's polls
|
|
|
|
// 10. Delete account's notifications
|
|
|
|
// 11. Delete account's bookmarks
|
|
|
|
// 12. Delete account's faves
|
|
|
|
// 13. Delete account's mutes
|
|
|
|
// 14. Delete account's streams
|
|
|
|
// 15. Delete account's tags
|
|
|
|
// 16. Delete account's user
|
|
|
|
// 17. Delete account's timeline
|
|
|
|
// 18. Delete account itself
|
2022-03-15 18:12:35 +03:00
|
|
|
func (p *processor) Delete(ctx context.Context, account *gtsmodel.Account, origin string) gtserror.WithCode {
|
2022-07-19 11:47:55 +03:00
|
|
|
fields := kv.Fields{
|
|
|
|
{"username", account.Username},
|
2021-09-30 11:56:02 +03:00
|
|
|
}
|
|
|
|
if account.Domain != "" {
|
2022-07-19 11:47:55 +03:00
|
|
|
fields = append(fields, kv.Field{
|
|
|
|
"domain", account.Domain,
|
|
|
|
})
|
2021-09-30 11:56:02 +03:00
|
|
|
}
|
2022-07-19 11:47:55 +03:00
|
|
|
l := log.WithFields(fields...)
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2021-09-30 11:56:02 +03:00
|
|
|
l.Debug("beginning account delete process")
|
2021-07-05 14:23:03 +03:00
|
|
|
|
|
|
|
// 1. Delete account's application(s), clients, and oauth tokens
|
|
|
|
// we only need to do this step for local account since remote ones won't have any tokens or applications on our server
|
2022-10-03 11:46:11 +03:00
|
|
|
var user *gtsmodel.User
|
2021-07-05 14:23:03 +03:00
|
|
|
if account.Domain == "" {
|
|
|
|
// see if we can get a user for this account
|
2022-10-03 11:46:11 +03:00
|
|
|
var err error
|
|
|
|
if user, err = p.db.GetUserByAccountID(ctx, account.ID); err == nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
// we got one! select all tokens with the user's ID
|
2021-09-01 12:45:01 +03:00
|
|
|
tokens := []*gtsmodel.Token{}
|
2022-10-03 11:46:11 +03:00
|
|
|
if err := p.db.GetWhere(ctx, []db.Where{{Key: "user_id", Value: user.ID}}, &tokens); err == nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
// we have some tokens to delete
|
|
|
|
for _, t := range tokens {
|
|
|
|
// delete client(s) associated with this token
|
2021-09-01 12:45:01 +03:00
|
|
|
if err := p.db.DeleteByID(ctx, t.ClientID, >smodel.Client{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting oauth client: %s", err)
|
|
|
|
}
|
|
|
|
// delete application(s) associated with this token
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "client_id", Value: t.ClientID}}, >smodel.Application{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting application: %s", err)
|
|
|
|
}
|
|
|
|
// delete the token itself
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteByID(ctx, t.ID, t); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting oauth token: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// 2. Delete account's blocks
|
|
|
|
l.Debug("deleting account blocks")
|
|
|
|
// first delete any blocks that this account created
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "account_id", Value: account.ID}}, &[]*gtsmodel.Block{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting blocks created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// now delete any blocks that target this account
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "target_account_id", Value: account.ID}}, &[]*gtsmodel.Block{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting blocks targeting account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 3. Delete account's emoji
|
|
|
|
// nothing to do here
|
|
|
|
|
|
|
|
// 4. Delete account's follow requests
|
2021-07-06 14:29:11 +03:00
|
|
|
// TODO: federate these if necessary
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Debug("deleting account follow requests")
|
|
|
|
// first delete any follow requests that this account created
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "account_id", Value: account.ID}}, &[]*gtsmodel.FollowRequest{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting follow requests created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// now delete any follow requests that target this account
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "target_account_id", Value: account.ID}}, &[]*gtsmodel.FollowRequest{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting follow requests targeting account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 5. Delete account's follows
|
2021-07-06 14:29:11 +03:00
|
|
|
// TODO: federate these if necessary
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Debug("deleting account follows")
|
|
|
|
// first delete any follows that this account created
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "account_id", Value: account.ID}}, &[]*gtsmodel.Follow{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting follows created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// now delete any follows that target this account
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "target_account_id", Value: account.ID}}, &[]*gtsmodel.Follow{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting follows targeting account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 6. Delete account's statuses
|
|
|
|
l.Debug("deleting account statuses")
|
|
|
|
// we'll select statuses 20 at a time so we don't wreck the db, and pass them through to the client api channel
|
|
|
|
// Deleting the statuses in this way also handles 7. Delete account's media attachments, 8. Delete account's mentions, and 9. Delete account's polls,
|
|
|
|
// since these are all attached to statuses.
|
|
|
|
var maxID string
|
|
|
|
selectStatusesLoop:
|
|
|
|
for {
|
2022-04-15 15:33:01 +03:00
|
|
|
statuses, err := p.db.GetAccountStatuses(ctx, account.ID, 20, false, false, maxID, "", false, false, false)
|
2021-07-05 14:23:03 +03:00
|
|
|
if err != nil {
|
2022-07-10 18:18:21 +03:00
|
|
|
if errors.Is(err, db.ErrNoEntries) {
|
2021-07-05 14:23:03 +03:00
|
|
|
// no statuses left for this instance so we're done
|
|
|
|
l.Infof("Delete: done iterating through statuses for account %s", account.Username)
|
|
|
|
break selectStatusesLoop
|
|
|
|
}
|
2022-07-10 18:18:21 +03:00
|
|
|
|
2021-07-05 14:23:03 +03:00
|
|
|
// an actual error has occurred
|
|
|
|
l.Errorf("Delete: db error selecting statuses for account %s: %s", account.Username, err)
|
|
|
|
break selectStatusesLoop
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, s := range statuses {
|
|
|
|
// pass the status delete through the client api channel for processing
|
2021-08-20 13:26:56 +03:00
|
|
|
s.Account = account
|
2022-07-10 18:18:21 +03:00
|
|
|
|
2022-09-21 20:55:52 +03:00
|
|
|
l.Debug("putting status delete in the client api channel")
|
2022-04-28 15:23:11 +03:00
|
|
|
p.clientWorker.Queue(messages.FromClientAPI{
|
2021-08-31 16:59:12 +03:00
|
|
|
APObjectType: ap.ObjectNote,
|
|
|
|
APActivityType: ap.ActivityDelete,
|
2021-07-05 14:23:03 +03:00
|
|
|
GTSModel: s,
|
|
|
|
OriginAccount: account,
|
|
|
|
TargetAccount: account,
|
2022-04-28 15:23:11 +03:00
|
|
|
})
|
2021-07-05 14:23:03 +03:00
|
|
|
|
|
|
|
// if there are any boosts of this status, delete them as well
|
2022-09-21 20:55:52 +03:00
|
|
|
if boosts, err := p.db.GetStatusReblogs(ctx, s); err == nil {
|
|
|
|
for _, b := range boosts {
|
|
|
|
if b.Account == nil {
|
|
|
|
bAccount, err := p.db.GetAccountByID(ctx, b.AccountID)
|
|
|
|
if err != nil {
|
|
|
|
l.Errorf("Delete: db error populating boosted status account: %v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
b.Account = bAccount
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
2022-07-10 18:18:21 +03:00
|
|
|
|
2022-09-21 20:55:52 +03:00
|
|
|
l.Debug("putting boost undo in the client api channel")
|
|
|
|
p.clientWorker.Queue(messages.FromClientAPI{
|
|
|
|
APObjectType: ap.ActivityAnnounce,
|
|
|
|
APActivityType: ap.ActivityUndo,
|
|
|
|
GTSModel: s,
|
|
|
|
OriginAccount: b.Account,
|
|
|
|
TargetAccount: account,
|
|
|
|
})
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// if this is the last status in the slice, set the maxID appropriately for the next query
|
|
|
|
if i == len(statuses)-1 {
|
|
|
|
maxID = s.ID
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
l.Debug("done deleting statuses")
|
|
|
|
|
|
|
|
// 10. Delete account's notifications
|
|
|
|
l.Debug("deleting account notifications")
|
2021-09-30 11:56:02 +03:00
|
|
|
// first notifications created by account
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "origin_account_id", Value: account.ID}}, &[]*gtsmodel.Notification{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting notifications created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
2021-09-30 11:56:02 +03:00
|
|
|
// now notifications targeting account
|
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "target_account_id", Value: account.ID}}, &[]*gtsmodel.Notification{}); err != nil {
|
|
|
|
l.Errorf("error deleting notifications targeting account: %s", err)
|
|
|
|
}
|
|
|
|
|
2021-07-05 14:23:03 +03:00
|
|
|
// 11. Delete account's bookmarks
|
|
|
|
l.Debug("deleting account bookmarks")
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "account_id", Value: account.ID}}, &[]*gtsmodel.StatusBookmark{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting bookmarks created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 12. Delete account's faves
|
2021-07-06 14:29:11 +03:00
|
|
|
// TODO: federate these if necessary
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Debug("deleting account faves")
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "account_id", Value: account.ID}}, &[]*gtsmodel.StatusFave{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting faves created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 13. Delete account's mutes
|
|
|
|
l.Debug("deleting account mutes")
|
2021-08-25 16:34:33 +03:00
|
|
|
if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "account_id", Value: account.ID}}, &[]*gtsmodel.StatusMute{}); err != nil {
|
2021-07-05 14:23:03 +03:00
|
|
|
l.Errorf("error deleting status mutes created by account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 14. Delete account's streams
|
2021-07-06 14:29:11 +03:00
|
|
|
// TODO
|
2021-07-05 14:23:03 +03:00
|
|
|
|
|
|
|
// 15. Delete account's tags
|
|
|
|
// TODO
|
|
|
|
|
|
|
|
// 16. Delete account's user
|
2022-10-03 11:46:11 +03:00
|
|
|
if user != nil {
|
|
|
|
l.Debug("deleting account user")
|
|
|
|
if err := p.db.DeleteUserByID(ctx, user.ID); err != nil {
|
|
|
|
return gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// 17. Delete account's timeline
|
2021-07-06 14:29:11 +03:00
|
|
|
// TODO
|
2021-07-05 14:23:03 +03:00
|
|
|
|
|
|
|
// 18. Delete account itself
|
|
|
|
// to prevent the account being created again, set all these fields and update it in the db
|
|
|
|
// the account won't actually be *removed* from the database but it will be set to just a stub
|
|
|
|
|
|
|
|
account.Note = ""
|
|
|
|
account.DisplayName = ""
|
|
|
|
account.AvatarMediaAttachmentID = ""
|
|
|
|
account.AvatarRemoteURL = ""
|
|
|
|
account.HeaderMediaAttachmentID = ""
|
|
|
|
account.HeaderRemoteURL = ""
|
|
|
|
account.Reason = ""
|
2022-09-26 12:56:01 +03:00
|
|
|
account.Emojis = []*gtsmodel.Emoji{}
|
|
|
|
account.EmojiIDs = []string{}
|
2021-07-05 14:23:03 +03:00
|
|
|
account.Fields = []gtsmodel.Field{}
|
2022-08-15 13:35:05 +03:00
|
|
|
hideCollections := true
|
|
|
|
account.HideCollections = &hideCollections
|
|
|
|
discoverable := false
|
|
|
|
account.Discoverable = &discoverable
|
2021-07-05 14:23:03 +03:00
|
|
|
|
|
|
|
account.SuspendedAt = time.Now()
|
2021-07-06 14:29:11 +03:00
|
|
|
account.SuspensionOrigin = origin
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2021-08-25 16:34:33 +03:00
|
|
|
account, err := p.db.UpdateAccount(ctx, account)
|
|
|
|
if err != nil {
|
2022-03-15 18:12:35 +03:00
|
|
|
return gtserror.NewErrorInternalError(err)
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
l.Infof("deleted account with username %s from domain %s", account.Username, account.Domain)
|
|
|
|
return nil
|
|
|
|
}
|
2022-03-15 18:12:35 +03:00
|
|
|
|
|
|
|
func (p *processor) DeleteLocal(ctx context.Context, account *gtsmodel.Account, form *apimodel.AccountDeleteRequest) gtserror.WithCode {
|
|
|
|
fromClientAPIMessage := messages.FromClientAPI{
|
|
|
|
APObjectType: ap.ActorPerson,
|
|
|
|
APActivityType: ap.ActivityDelete,
|
|
|
|
TargetAccount: account,
|
|
|
|
}
|
|
|
|
|
|
|
|
if form.DeleteOriginID == account.ID {
|
|
|
|
// the account owner themself has requested deletion via the API, get their user from the db
|
2022-10-03 11:46:11 +03:00
|
|
|
user, err := p.db.GetUserByAccountID(ctx, account.ID)
|
|
|
|
if err != nil {
|
2022-03-15 18:12:35 +03:00
|
|
|
return gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// now check that the password they supplied is correct
|
|
|
|
// make sure a password is actually set and bail if not
|
|
|
|
if user.EncryptedPassword == "" {
|
|
|
|
return gtserror.NewErrorForbidden(errors.New("user password was not set"))
|
|
|
|
}
|
|
|
|
|
|
|
|
// compare the provided password with the encrypted one from the db, bail if they don't match
|
|
|
|
if err := bcrypt.CompareHashAndPassword([]byte(user.EncryptedPassword), []byte(form.Password)); err != nil {
|
|
|
|
return gtserror.NewErrorForbidden(errors.New("invalid password"))
|
|
|
|
}
|
|
|
|
|
|
|
|
fromClientAPIMessage.OriginAccount = account
|
|
|
|
} else {
|
|
|
|
// the delete has been requested by some other account, grab it;
|
|
|
|
// if we've reached this point we know it has permission already
|
|
|
|
requestingAccount, err := p.db.GetAccountByID(ctx, form.DeleteOriginID)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fromClientAPIMessage.OriginAccount = requestingAccount
|
|
|
|
}
|
|
|
|
|
|
|
|
// put the delete in the processor queue to handle the rest of it asynchronously
|
2022-04-28 15:23:11 +03:00
|
|
|
p.clientWorker.Queue(fromClientAPIMessage)
|
2022-03-15 18:12:35 +03:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|