2023-03-12 18:00:57 +03:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2021-07-05 14:23:03 +03:00
|
|
|
package admin
|
|
|
|
|
|
|
|
import (
|
2023-02-22 18:05:26 +03:00
|
|
|
"bytes"
|
2021-08-25 16:34:33 +03:00
|
|
|
"context"
|
2023-02-22 18:05:26 +03:00
|
|
|
"encoding/json"
|
2022-09-02 13:17:46 +03:00
|
|
|
"errors"
|
2021-07-05 14:23:03 +03:00
|
|
|
"fmt"
|
2023-02-22 18:05:26 +03:00
|
|
|
"io"
|
|
|
|
"mime/multipart"
|
2023-07-07 12:34:12 +03:00
|
|
|
"net/http"
|
2021-07-05 14:23:03 +03:00
|
|
|
"time"
|
|
|
|
|
2022-07-19 11:47:55 +03:00
|
|
|
"codeberg.org/gruf/go-kv"
|
2021-08-31 16:59:12 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2021-07-05 14:23:03 +03:00
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
2022-07-19 11:47:55 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2021-08-31 16:59:12 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
2021-07-26 21:25:54 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/text"
|
2021-07-05 14:23:03 +03:00
|
|
|
)
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// DomainBlockCreate creates an instance-level block against the given domain,
|
|
|
|
// and then processes side effects of that block (deleting accounts, media, etc).
|
|
|
|
//
|
|
|
|
// If a domain block already exists for the domain, side effects will be retried.
|
2023-09-04 16:55:17 +03:00
|
|
|
//
|
|
|
|
// Return values for this function are the (new) domain block, the ID of the admin
|
|
|
|
// action resulting from this call, and/or an error if something goes wrong.
|
2023-07-07 12:34:12 +03:00
|
|
|
func (p *Processor) DomainBlockCreate(
|
|
|
|
ctx context.Context,
|
2023-09-04 16:55:17 +03:00
|
|
|
adminAcct *gtsmodel.Account,
|
2023-07-07 12:34:12 +03:00
|
|
|
domain string,
|
|
|
|
obfuscate bool,
|
|
|
|
publicComment string,
|
|
|
|
privateComment string,
|
|
|
|
subscriptionID string,
|
2023-09-04 16:55:17 +03:00
|
|
|
) (*apimodel.DomainBlock, string, gtserror.WithCode) {
|
2023-07-07 12:34:12 +03:00
|
|
|
// Check if a block already exists for this domain.
|
|
|
|
domainBlock, err := p.state.DB.GetDomainBlock(ctx, domain)
|
|
|
|
if err != nil && !errors.Is(err, db.ErrNoEntries) {
|
|
|
|
// Something went wrong in the DB.
|
|
|
|
err = gtserror.Newf("db error getting domain block %s: %w", domain, err)
|
2023-09-04 16:55:17 +03:00
|
|
|
return nil, "", gtserror.NewErrorInternalError(err)
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
if domainBlock == nil {
|
|
|
|
// No block exists yet, create it.
|
|
|
|
domainBlock = >smodel.DomainBlock{
|
2023-02-03 23:03:05 +03:00
|
|
|
ID: id.NewULID(),
|
2021-07-06 14:29:11 +03:00
|
|
|
Domain: domain,
|
2023-09-04 16:55:17 +03:00
|
|
|
CreatedByAccountID: adminAcct.ID,
|
2023-08-11 15:40:11 +03:00
|
|
|
PrivateComment: text.SanitizeToPlaintext(privateComment),
|
|
|
|
PublicComment: text.SanitizeToPlaintext(publicComment),
|
2022-08-15 13:35:05 +03:00
|
|
|
Obfuscate: &obfuscate,
|
2021-07-06 14:29:11 +03:00
|
|
|
SubscriptionID: subscriptionID,
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Insert the new block into the database.
|
|
|
|
if err := p.state.DB.CreateDomainBlock(ctx, domainBlock); err != nil {
|
2023-09-04 16:55:17 +03:00
|
|
|
err = gtserror.Newf("db error putting domain block %s: %w", domain, err)
|
|
|
|
return nil, "", gtserror.NewErrorInternalError(err)
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
actionID := id.NewULID()
|
|
|
|
|
|
|
|
// Process domain block side
|
|
|
|
// effects asynchronously.
|
|
|
|
if errWithCode := p.actions.Run(
|
|
|
|
ctx,
|
|
|
|
>smodel.AdminAction{
|
|
|
|
ID: actionID,
|
|
|
|
TargetCategory: gtsmodel.AdminActionCategoryDomain,
|
|
|
|
TargetID: domain,
|
|
|
|
Type: gtsmodel.AdminActionSuspend,
|
|
|
|
AccountID: adminAcct.ID,
|
|
|
|
Text: domainBlock.PrivateComment,
|
|
|
|
},
|
|
|
|
func(ctx context.Context) gtserror.MultiError {
|
|
|
|
return p.domainBlockSideEffects(ctx, domainBlock)
|
|
|
|
},
|
|
|
|
); errWithCode != nil {
|
|
|
|
return nil, actionID, errWithCode
|
|
|
|
}
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, actionID, errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
return apiDomainBlock, actionID, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DomainBlockDelete removes one domain block with the given ID,
|
|
|
|
// and processes side effects of removing the block asynchronously.
|
|
|
|
//
|
|
|
|
// Return values for this function are the deleted domain block, the ID of the admin
|
|
|
|
// action resulting from this call, and/or an error if something goes wrong.
|
|
|
|
func (p *Processor) DomainBlockDelete(
|
|
|
|
ctx context.Context,
|
|
|
|
adminAcct *gtsmodel.Account,
|
|
|
|
domainBlockID string,
|
|
|
|
) (*apimodel.DomainBlock, string, gtserror.WithCode) {
|
|
|
|
domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, domainBlockID)
|
|
|
|
if err != nil {
|
|
|
|
if !errors.Is(err, db.ErrNoEntries) {
|
|
|
|
// Real error.
|
|
|
|
err = gtserror.Newf("db error getting domain block: %w", err)
|
|
|
|
return nil, "", gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// There are just no entries for this ID.
|
|
|
|
err = fmt.Errorf("no domain block entry exists with ID %s", domainBlockID)
|
|
|
|
return nil, "", gtserror.NewErrorNotFound(err, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare the domain block to return, *before* the deletion goes through.
|
|
|
|
apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, "", errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
// Copy value of the domain block.
|
|
|
|
domainBlockC := new(gtsmodel.DomainBlock)
|
|
|
|
*domainBlockC = *domainBlock
|
|
|
|
|
|
|
|
// Delete the original domain block.
|
|
|
|
if err := p.state.DB.DeleteDomainBlock(ctx, domainBlock.Domain); err != nil {
|
|
|
|
err = gtserror.Newf("db error deleting domain block: %w", err)
|
|
|
|
return nil, "", gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
actionID := id.NewULID()
|
|
|
|
|
|
|
|
// Process domain unblock side
|
|
|
|
// effects asynchronously.
|
|
|
|
if errWithCode := p.actions.Run(
|
|
|
|
ctx,
|
|
|
|
>smodel.AdminAction{
|
|
|
|
ID: actionID,
|
|
|
|
TargetCategory: gtsmodel.AdminActionCategoryDomain,
|
|
|
|
TargetID: domainBlockC.Domain,
|
|
|
|
Type: gtsmodel.AdminActionUnsuspend,
|
|
|
|
AccountID: adminAcct.ID,
|
|
|
|
},
|
|
|
|
func(ctx context.Context) gtserror.MultiError {
|
|
|
|
return p.domainUnblockSideEffects(ctx, domainBlock)
|
|
|
|
},
|
|
|
|
); errWithCode != nil {
|
|
|
|
return nil, actionID, errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
return apiDomainBlock, actionID, nil
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// DomainBlocksImport handles the import of multiple domain blocks,
|
|
|
|
// by calling the DomainBlockCreate function for each domain in the
|
|
|
|
// provided file. Will return a slice of processed domain blocks.
|
2021-07-05 14:23:03 +03:00
|
|
|
//
|
2023-07-07 12:34:12 +03:00
|
|
|
// In the case of total failure, a gtserror.WithCode will be returned
|
|
|
|
// so that the caller can respond appropriately. In the case of
|
|
|
|
// partial or total success, a MultiStatus model will be returned,
|
|
|
|
// which contains information about success/failure count, so that
|
|
|
|
// the caller can retry any failures as they wish.
|
|
|
|
func (p *Processor) DomainBlocksImport(
|
|
|
|
ctx context.Context,
|
|
|
|
account *gtsmodel.Account,
|
|
|
|
domainsF *multipart.FileHeader,
|
|
|
|
) (*apimodel.MultiStatus, gtserror.WithCode) {
|
|
|
|
// Open the provided file.
|
|
|
|
file, err := domainsF.Open()
|
|
|
|
if err != nil {
|
|
|
|
err = gtserror.Newf("error opening attachment: %w", err)
|
|
|
|
return nil, gtserror.NewErrorBadRequest(err, err.Error())
|
|
|
|
}
|
|
|
|
defer file.Close()
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Copy the file contents into a buffer.
|
|
|
|
buf := new(bytes.Buffer)
|
|
|
|
size, err := io.Copy(buf, file)
|
|
|
|
if err != nil {
|
|
|
|
err = gtserror.Newf("error reading attachment: %w", err)
|
|
|
|
return nil, gtserror.NewErrorBadRequest(err, err.Error())
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Ensure we actually read something.
|
|
|
|
if size == 0 {
|
|
|
|
err = gtserror.New("error reading attachment: size 0 bytes")
|
|
|
|
return nil, gtserror.NewErrorBadRequest(err, err.Error())
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Parse bytes as slice of domain blocks.
|
|
|
|
domainBlocks := make([]*apimodel.DomainBlock, 0)
|
|
|
|
if err := json.Unmarshal(buf.Bytes(), &domainBlocks); err != nil {
|
|
|
|
err = gtserror.Newf("error parsing attachment as domain blocks: %w", err)
|
|
|
|
return nil, gtserror.NewErrorBadRequest(err, err.Error())
|
|
|
|
}
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
count := len(domainBlocks)
|
|
|
|
if count == 0 {
|
|
|
|
err = gtserror.New("error importing domain blocks: 0 entries provided")
|
|
|
|
return nil, gtserror.NewErrorBadRequest(err, err.Error())
|
|
|
|
}
|
2021-07-05 14:23:03 +03:00
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Try to process each domain block, differentiating
|
|
|
|
// between successes and errors so that the caller can
|
|
|
|
// try failed imports again if desired.
|
|
|
|
multiStatusEntries := make([]apimodel.MultiStatusEntry, 0, count)
|
|
|
|
|
|
|
|
for _, domainBlock := range domainBlocks {
|
|
|
|
var (
|
|
|
|
domain = domainBlock.Domain.Domain
|
|
|
|
obfuscate = domainBlock.Obfuscate
|
|
|
|
publicComment = domainBlock.PublicComment
|
|
|
|
privateComment = domainBlock.PrivateComment
|
|
|
|
subscriptionID = "" // No sub ID for imports.
|
|
|
|
errWithCode gtserror.WithCode
|
|
|
|
)
|
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
domainBlock, _, errWithCode = p.DomainBlockCreate(
|
2023-07-07 12:34:12 +03:00
|
|
|
ctx,
|
|
|
|
account,
|
|
|
|
domain,
|
|
|
|
obfuscate,
|
|
|
|
publicComment,
|
|
|
|
privateComment,
|
|
|
|
subscriptionID,
|
|
|
|
)
|
|
|
|
|
|
|
|
var entry *apimodel.MultiStatusEntry
|
|
|
|
|
|
|
|
if errWithCode != nil {
|
|
|
|
entry = &apimodel.MultiStatusEntry{
|
|
|
|
// Use the failed domain entry as the resource value.
|
|
|
|
Resource: domain,
|
|
|
|
Message: errWithCode.Safe(),
|
|
|
|
Status: errWithCode.Code(),
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
2023-07-07 12:34:12 +03:00
|
|
|
} else {
|
|
|
|
entry = &apimodel.MultiStatusEntry{
|
|
|
|
// Use successfully created API model domain block as the resource value.
|
|
|
|
Resource: domainBlock,
|
|
|
|
Message: http.StatusText(http.StatusOK),
|
|
|
|
Status: http.StatusOK,
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
|
|
|
}
|
2023-07-07 12:34:12 +03:00
|
|
|
|
|
|
|
multiStatusEntries = append(multiStatusEntries, *entry)
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
2023-07-07 12:34:12 +03:00
|
|
|
|
|
|
|
return apimodel.NewMultiStatus(multiStatusEntries), nil
|
2021-07-05 14:23:03 +03:00
|
|
|
}
|
2023-02-22 18:05:26 +03:00
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// DomainBlocksGet returns all existing domain blocks. If export is
|
|
|
|
// true, the format will be suitable for writing out to an export.
|
|
|
|
func (p *Processor) DomainBlocksGet(ctx context.Context, account *gtsmodel.Account, export bool) ([]*apimodel.DomainBlock, gtserror.WithCode) {
|
|
|
|
domainBlocks, err := p.state.DB.GetDomainBlocks(ctx)
|
|
|
|
if err != nil && !errors.Is(err, db.ErrNoEntries) {
|
|
|
|
err = gtserror.Newf("db error getting domain blocks: %w", err)
|
|
|
|
return nil, gtserror.NewErrorInternalError(err)
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
apiDomainBlocks := make([]*apimodel.DomainBlock, 0, len(domainBlocks))
|
|
|
|
for _, domainBlock := range domainBlocks {
|
|
|
|
apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
apiDomainBlocks = append(apiDomainBlocks, apiDomainBlock)
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
return apiDomainBlocks, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DomainBlockGet returns one domain block with the given id. If export
|
|
|
|
// is true, the format will be suitable for writing out to an export.
|
|
|
|
func (p *Processor) DomainBlockGet(ctx context.Context, id string, export bool) (*apimodel.DomainBlock, gtserror.WithCode) {
|
|
|
|
domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, id)
|
|
|
|
if err != nil {
|
|
|
|
if errors.Is(err, db.ErrNoEntries) {
|
|
|
|
err = fmt.Errorf("no domain block exists with id %s", id)
|
|
|
|
return nil, gtserror.NewErrorNotFound(err, err.Error())
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Something went wrong in the DB.
|
|
|
|
err = gtserror.Newf("db error getting domain block %s: %w", id, err)
|
|
|
|
return nil, gtserror.NewErrorInternalError(err)
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
return p.apiDomainBlock(ctx, domainBlock)
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// domainBlockSideEffects processes the side effects of a domain block:
|
|
|
|
//
|
|
|
|
// 1. Strip most info away from the instance entry for the domain.
|
|
|
|
// 2. Pass each account from the domain to the processor for deletion.
|
|
|
|
//
|
|
|
|
// It should be called asynchronously, since it can take a while when
|
|
|
|
// there are many accounts present on the given domain.
|
2023-09-04 16:55:17 +03:00
|
|
|
func (p *Processor) domainBlockSideEffects(
|
|
|
|
ctx context.Context,
|
|
|
|
block *gtsmodel.DomainBlock,
|
|
|
|
) gtserror.MultiError {
|
2023-07-07 12:34:12 +03:00
|
|
|
l := log.
|
|
|
|
WithContext(ctx).
|
|
|
|
WithFields(kv.Fields{
|
|
|
|
{"domain", block.Domain},
|
|
|
|
}...)
|
|
|
|
l.Debug("processing domain block side effects")
|
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
var errs gtserror.MultiError
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// If we have an instance entry for this domain,
|
|
|
|
// update it with the new block ID and clear all fields
|
|
|
|
instance, err := p.state.DB.GetInstance(ctx, block.Domain)
|
|
|
|
if err != nil && !errors.Is(err, db.ErrNoEntries) {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error getting instance %s: %w", block.Domain, err)
|
|
|
|
return errs
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
if instance != nil {
|
|
|
|
// We had an entry for this domain.
|
|
|
|
columns := stubbifyInstance(instance, block.ID)
|
|
|
|
if err := p.state.DB.UpdateInstance(ctx, instance, columns...); err != nil {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error updating instance: %w", err)
|
|
|
|
return errs
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
2023-09-04 16:55:17 +03:00
|
|
|
l.Debug("instance entry updated")
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
// For each account that belongs to this domain,
|
|
|
|
// process an account delete message to remove
|
|
|
|
// that account's posts, media, etc.
|
|
|
|
if err := p.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) {
|
|
|
|
cMsg := messages.FromClientAPI{
|
2023-07-07 12:34:12 +03:00
|
|
|
APObjectType: ap.ActorPerson,
|
|
|
|
APActivityType: ap.ActivityDelete,
|
|
|
|
GTSModel: block,
|
|
|
|
OriginAccount: account,
|
|
|
|
TargetAccount: account,
|
2023-09-04 16:55:17 +03:00
|
|
|
}
|
2023-07-07 12:34:12 +03:00
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
if err := p.state.Workers.ProcessFromClientAPI(ctx, cMsg); err != nil {
|
|
|
|
errs.Append(err)
|
|
|
|
}
|
2023-07-07 12:34:12 +03:00
|
|
|
}); err != nil {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error ranging through accounts: %w", err)
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
return errs
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// domainUnblockSideEffects processes the side effects of undoing a
|
|
|
|
// domain block:
|
|
|
|
//
|
|
|
|
// 1. Mark instance entry as no longer suspended.
|
|
|
|
// 2. Mark each account from the domain as no longer suspended, if the
|
|
|
|
// suspension origin corresponds to the ID of the provided domain block.
|
|
|
|
//
|
|
|
|
// It should be called asynchronously, since it can take a while when
|
|
|
|
// there are many accounts present on the given domain.
|
2023-09-04 16:55:17 +03:00
|
|
|
func (p *Processor) domainUnblockSideEffects(
|
|
|
|
ctx context.Context,
|
|
|
|
block *gtsmodel.DomainBlock,
|
|
|
|
) gtserror.MultiError {
|
2023-07-07 12:34:12 +03:00
|
|
|
l := log.
|
|
|
|
WithContext(ctx).
|
|
|
|
WithFields(kv.Fields{
|
|
|
|
{"domain", block.Domain},
|
|
|
|
}...)
|
|
|
|
l.Debug("processing domain unblock side effects")
|
|
|
|
|
2023-09-04 16:55:17 +03:00
|
|
|
var errs gtserror.MultiError
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
// Update instance entry for this domain, if we have it.
|
|
|
|
instance, err := p.state.DB.GetInstance(ctx, block.Domain)
|
|
|
|
if err != nil && !errors.Is(err, db.ErrNoEntries) {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error getting instance %s: %w", block.Domain, err)
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|
|
|
|
|
2023-07-07 12:34:12 +03:00
|
|
|
if instance != nil {
|
|
|
|
// We had an entry, update it to signal
|
|
|
|
// that it's no longer suspended.
|
|
|
|
instance.SuspendedAt = time.Time{}
|
|
|
|
instance.DomainBlockID = ""
|
|
|
|
if err := p.state.DB.UpdateInstance(
|
|
|
|
ctx,
|
|
|
|
instance,
|
|
|
|
"suspended_at",
|
|
|
|
"domain_block_id",
|
|
|
|
); err != nil {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error updating instance: %w", err)
|
|
|
|
return errs
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
2023-09-04 16:55:17 +03:00
|
|
|
l.Debug("instance entry updated")
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Unsuspend all accounts whose suspension origin was this domain block.
|
2023-09-04 16:55:17 +03:00
|
|
|
if err := p.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) {
|
2023-07-07 12:34:12 +03:00
|
|
|
if account.SuspensionOrigin == "" || account.SuspendedAt.IsZero() {
|
|
|
|
// Account wasn't suspended, nothing to do.
|
2023-09-04 16:55:17 +03:00
|
|
|
return
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if account.SuspensionOrigin != block.ID {
|
|
|
|
// Account was suspended, but not by
|
|
|
|
// this domain block, leave it alone.
|
2023-09-04 16:55:17 +03:00
|
|
|
return
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Account was suspended by this domain
|
|
|
|
// block, mark it as unsuspended.
|
|
|
|
account.SuspendedAt = time.Time{}
|
|
|
|
account.SuspensionOrigin = ""
|
|
|
|
|
|
|
|
if err := p.state.DB.UpdateAccount(
|
|
|
|
ctx,
|
|
|
|
account,
|
|
|
|
"suspended_at",
|
|
|
|
"suspension_origin",
|
|
|
|
); err != nil {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error updating account %s: %w", account.Username, err)
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
|
|
|
}); err != nil {
|
2023-09-04 16:55:17 +03:00
|
|
|
errs.Appendf("db error ranging through accounts: %w", err)
|
2023-07-07 12:34:12 +03:00
|
|
|
}
|
2023-09-04 16:55:17 +03:00
|
|
|
|
|
|
|
return errs
|
2023-02-22 18:05:26 +03:00
|
|
|
}
|