2023-03-12 18:00:57 +03:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-05-27 17:06:24 +03:00
|
|
|
|
|
|
|
package federatingdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"net/url"
|
|
|
|
|
2022-07-19 11:47:55 +03:00
|
|
|
"codeberg.org/gruf/go-logger/v2/level"
|
2021-11-13 19:29:43 +03:00
|
|
|
"github.com/superseriousbusiness/activity/streams"
|
|
|
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
2021-08-31 16:59:12 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2021-12-07 15:31:39 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
2021-05-27 17:06:24 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
2023-06-13 17:47:56 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
2021-05-27 17:06:24 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2021-06-13 19:42:28 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
2022-07-19 11:47:55 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2021-12-20 17:19:53 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/uris"
|
2021-05-27 17:06:24 +03:00
|
|
|
)
|
|
|
|
|
2023-11-04 23:21:20 +03:00
|
|
|
func typeNames(objects []ap.TypeOrIRI) []string {
|
|
|
|
names := make([]string, len(objects))
|
|
|
|
for i, object := range objects {
|
|
|
|
if object.IsIRI() {
|
|
|
|
names[i] = "IRI"
|
|
|
|
} else if t := object.GetType(); t != nil {
|
|
|
|
names[i] = t.GetTypeName()
|
|
|
|
} else {
|
|
|
|
names[i] = "nil"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return names
|
|
|
|
}
|
|
|
|
|
|
|
|
// isSender returns whether an object with AttributedTo property comes from the given requesting account.
|
|
|
|
func isSender(with ap.WithAttributedTo, requester *gtsmodel.Account) bool {
|
|
|
|
for _, uri := range ap.GetAttributedTo(with) {
|
|
|
|
if uri.String() == requester.URI {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-04-05 21:10:05 +03:00
|
|
|
func sameActor(actor1 vocab.ActivityStreamsActorProperty, actor2 vocab.ActivityStreamsActorProperty) bool {
|
|
|
|
if actor1 == nil || actor2 == nil {
|
2021-05-27 17:06:24 +03:00
|
|
|
return false
|
|
|
|
}
|
2023-04-05 21:10:05 +03:00
|
|
|
|
|
|
|
for a1Iter := actor1.Begin(); a1Iter != actor1.End(); a1Iter = a1Iter.Next() {
|
|
|
|
for a2Iter := actor2.Begin(); a2Iter != actor2.End(); a2Iter = a2Iter.Next() {
|
|
|
|
if a1Iter.GetIRI() == nil {
|
2021-05-27 17:06:24 +03:00
|
|
|
return false
|
|
|
|
}
|
2023-04-05 21:10:05 +03:00
|
|
|
|
|
|
|
if a2Iter.GetIRI() == nil {
|
2021-05-27 17:06:24 +03:00
|
|
|
return false
|
|
|
|
}
|
2023-04-05 21:10:05 +03:00
|
|
|
|
|
|
|
if a1Iter.GetIRI().String() == a2Iter.GetIRI().String() {
|
2021-05-27 17:06:24 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-04-05 21:10:05 +03:00
|
|
|
|
2021-05-27 17:06:24 +03:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewID creates a new IRI id for the provided activity or object. The
|
|
|
|
// implementation does not need to set the 'id' property and simply
|
|
|
|
// needs to determine the value.
|
|
|
|
//
|
|
|
|
// The go-fed library will handle setting the 'id' property on the
|
|
|
|
// activity or object provided with the value returned.
|
2021-08-25 16:34:33 +03:00
|
|
|
func (f *federatingDB) NewID(ctx context.Context, t vocab.Type) (idURL *url.URL, err error) {
|
2022-07-19 11:47:55 +03:00
|
|
|
if log.Level() >= level.DEBUG {
|
2021-10-04 16:24:19 +03:00
|
|
|
i, err := marshalItem(t)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-02-17 22:05:43 +03:00
|
|
|
l := log.WithContext(ctx).
|
|
|
|
WithField("newID", i)
|
2021-10-04 16:24:19 +03:00
|
|
|
l.Debug("entering NewID")
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
|
|
|
|
2023-11-04 23:21:20 +03:00
|
|
|
// Most of our types set an ID already
|
|
|
|
// by this point, return this if found.
|
|
|
|
idProp := t.GetJSONLDId()
|
|
|
|
if idProp != nil && idProp.IsIRI() {
|
|
|
|
return idProp.GetIRI(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if t.GetTypeName() == ap.ActivityFollow {
|
|
|
|
follow, _ := t.(vocab.ActivityStreamsFollow)
|
|
|
|
|
|
|
|
// If an actor URI has been set, create a new ID
|
|
|
|
// based on actor (i.e. followER not the followEE).
|
2023-11-30 19:22:34 +03:00
|
|
|
if uri := ap.GetActorIRIs(follow); len(uri) == 1 {
|
2023-11-04 23:21:20 +03:00
|
|
|
if actorAccount, err := f.state.DB.GetAccountByURI(ctx, uri[0].String()); err == nil {
|
|
|
|
newID, err := id.NewRandomULID()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
2023-11-04 23:21:20 +03:00
|
|
|
return url.Parse(uris.GenerateURIForFollow(actorAccount.Username, newID))
|
2021-07-11 17:22:21 +03:00
|
|
|
}
|
|
|
|
}
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
|
|
|
|
2023-11-04 23:21:20 +03:00
|
|
|
// Default fallback behaviour:
|
|
|
|
// {proto}://{host}/{randomID}
|
2021-06-13 19:42:28 +03:00
|
|
|
newID, err := id.NewRandomULID()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-12-07 15:31:39 +03:00
|
|
|
|
2022-05-30 15:41:24 +03:00
|
|
|
return url.Parse(fmt.Sprintf("%s://%s/%s", config.GetProtocol(), config.GetHost(), newID))
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// ActorForOutbox fetches the actor's IRI for the given outbox IRI.
|
|
|
|
//
|
|
|
|
// The library makes this call only after acquiring a lock first.
|
2021-08-25 16:34:33 +03:00
|
|
|
func (f *federatingDB) ActorForOutbox(ctx context.Context, outboxIRI *url.URL) (actorIRI *url.URL, err error) {
|
2021-10-04 16:24:19 +03:00
|
|
|
acct, err := f.getAccountForIRI(ctx, outboxIRI)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
|
|
|
return url.Parse(acct.URI)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ActorForInbox fetches the actor's IRI for the given outbox IRI.
|
|
|
|
//
|
|
|
|
// The library makes this call only after acquiring a lock first.
|
2021-08-25 16:34:33 +03:00
|
|
|
func (f *federatingDB) ActorForInbox(ctx context.Context, inboxIRI *url.URL) (actorIRI *url.URL, err error) {
|
2021-10-04 16:24:19 +03:00
|
|
|
acct, err := f.getAccountForIRI(ctx, inboxIRI)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
2021-10-04 16:24:19 +03:00
|
|
|
return url.Parse(acct.URI)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getAccountForIRI returns the account that corresponds to or owns the given IRI.
|
2023-01-27 16:48:11 +03:00
|
|
|
func (f *federatingDB) getAccountForIRI(ctx context.Context, iri *url.URL) (*gtsmodel.Account, error) {
|
|
|
|
var (
|
[performance] refactoring + add fave / follow / request / visibility caching (#1607)
* refactor visibility checking, add caching for visibility
* invalidate visibility cache items on account / status deletes
* fix requester ID passed to visibility cache nil ptr
* de-interface caches, fix home / public timeline caching + visibility
* finish adding code comments for visibility filter
* fix angry goconst linter warnings
* actually finish adding filter visibility code comments for timeline functions
* move home timeline status author check to after visibility
* remove now-unused code
* add more code comments
* add TODO code comment, update printed cache start names
* update printed cache names on stop
* start adding separate follow(request) delete db functions, add specific visibility cache tests
* add relationship type caching
* fix getting local account follows / followed-bys, other small codebase improvements
* simplify invalidation using cache hooks, add more GetAccountBy___() functions
* fix boosting to return 404 if not boostable but no error (to not leak status ID)
* remove dead code
* improved placement of cache invalidation
* update license headers
* add example follow, follow-request config entries
* add example visibility cache configuration to config file
* use specific PutFollowRequest() instead of just Put()
* add tests for all GetAccountBy()
* add GetBlockBy() tests
* update block to check primitive fields
* update and finish adding Get{Account,Block,Follow,FollowRequest}By() tests
* fix copy-pasted code
* update envparsing test
* whitespace
* fix bun struct tag
* add license header to gtscontext
* fix old license header
* improved error creation to not use fmt.Errorf() when not needed
* fix various rebase conflicts, fix account test
* remove commented-out code, fix-up mention caching
* fix mention select bun statement
* ensure mention target account populated, pass in context to customrenderer logging
* remove more uncommented code, fix typeutil test
* add statusfave database model caching
* add status fave cache configuration
* add status fave cache example config
* woops, catch missed error. nice catch linter!
* add back testrig panic on nil db
* update example configuration to match defaults, slight tweak to cache configuration defaults
* update envparsing test with new defaults
* fetch followingget to use the follow target account
* use accounnt.IsLocal() instead of empty domain check
* use constants for the cache visibility type check
* use bun.In() for notification type restriction in db query
* include replies when fetching PublicTimeline() (to account for single-author threads in Visibility{}.StatusPublicTimelineable())
* use bun query building for nested select statements to ensure working with postgres
* update public timeline future status checks to match visibility filter
* same as previous, for home timeline
* update public timeline tests to dynamically check for appropriate statuses
* migrate accounts to allow unique constraint on public_key
* provide minimal account with publicKey
---------
Signed-off-by: kim <grufwub@gmail.com>
Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
2023-03-28 16:03:14 +03:00
|
|
|
acct *gtsmodel.Account
|
2023-01-27 16:48:11 +03:00
|
|
|
err error
|
|
|
|
)
|
2021-10-04 16:24:19 +03:00
|
|
|
|
2023-01-27 16:48:11 +03:00
|
|
|
switch {
|
|
|
|
case uris.IsUserPath(iri):
|
2023-03-01 21:26:53 +03:00
|
|
|
if acct, err = f.state.DB.GetAccountByURI(ctx, iri.String()); err != nil {
|
2021-10-04 16:24:19 +03:00
|
|
|
if err == db.ErrNoEntries {
|
2023-01-27 16:48:11 +03:00
|
|
|
return nil, fmt.Errorf("no actor found that corresponds to uri %s", iri.String())
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
2023-01-27 16:48:11 +03:00
|
|
|
return nil, fmt.Errorf("db error searching for actor with uri %s", iri.String())
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|
2021-10-04 16:24:19 +03:00
|
|
|
return acct, nil
|
2023-01-27 16:48:11 +03:00
|
|
|
case uris.IsInboxPath(iri):
|
[performance] refactoring + add fave / follow / request / visibility caching (#1607)
* refactor visibility checking, add caching for visibility
* invalidate visibility cache items on account / status deletes
* fix requester ID passed to visibility cache nil ptr
* de-interface caches, fix home / public timeline caching + visibility
* finish adding code comments for visibility filter
* fix angry goconst linter warnings
* actually finish adding filter visibility code comments for timeline functions
* move home timeline status author check to after visibility
* remove now-unused code
* add more code comments
* add TODO code comment, update printed cache start names
* update printed cache names on stop
* start adding separate follow(request) delete db functions, add specific visibility cache tests
* add relationship type caching
* fix getting local account follows / followed-bys, other small codebase improvements
* simplify invalidation using cache hooks, add more GetAccountBy___() functions
* fix boosting to return 404 if not boostable but no error (to not leak status ID)
* remove dead code
* improved placement of cache invalidation
* update license headers
* add example follow, follow-request config entries
* add example visibility cache configuration to config file
* use specific PutFollowRequest() instead of just Put()
* add tests for all GetAccountBy()
* add GetBlockBy() tests
* update block to check primitive fields
* update and finish adding Get{Account,Block,Follow,FollowRequest}By() tests
* fix copy-pasted code
* update envparsing test
* whitespace
* fix bun struct tag
* add license header to gtscontext
* fix old license header
* improved error creation to not use fmt.Errorf() when not needed
* fix various rebase conflicts, fix account test
* remove commented-out code, fix-up mention caching
* fix mention select bun statement
* ensure mention target account populated, pass in context to customrenderer logging
* remove more uncommented code, fix typeutil test
* add statusfave database model caching
* add status fave cache configuration
* add status fave cache example config
* woops, catch missed error. nice catch linter!
* add back testrig panic on nil db
* update example configuration to match defaults, slight tweak to cache configuration defaults
* update envparsing test with new defaults
* fetch followingget to use the follow target account
* use accounnt.IsLocal() instead of empty domain check
* use constants for the cache visibility type check
* use bun.In() for notification type restriction in db query
* include replies when fetching PublicTimeline() (to account for single-author threads in Visibility{}.StatusPublicTimelineable())
* use bun query building for nested select statements to ensure working with postgres
* update public timeline future status checks to match visibility filter
* same as previous, for home timeline
* update public timeline tests to dynamically check for appropriate statuses
* migrate accounts to allow unique constraint on public_key
* provide minimal account with publicKey
---------
Signed-off-by: kim <grufwub@gmail.com>
Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
2023-03-28 16:03:14 +03:00
|
|
|
if acct, err = f.state.DB.GetAccountByInboxURI(ctx, iri.String()); err != nil {
|
2021-10-04 16:24:19 +03:00
|
|
|
if err == db.ErrNoEntries {
|
2023-01-27 16:48:11 +03:00
|
|
|
return nil, fmt.Errorf("no actor found that corresponds to inbox %s", iri.String())
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
2023-01-27 16:48:11 +03:00
|
|
|
return nil, fmt.Errorf("db error searching for actor with inbox %s", iri.String())
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
|
|
|
return acct, nil
|
2023-01-27 16:48:11 +03:00
|
|
|
case uris.IsOutboxPath(iri):
|
[performance] refactoring + add fave / follow / request / visibility caching (#1607)
* refactor visibility checking, add caching for visibility
* invalidate visibility cache items on account / status deletes
* fix requester ID passed to visibility cache nil ptr
* de-interface caches, fix home / public timeline caching + visibility
* finish adding code comments for visibility filter
* fix angry goconst linter warnings
* actually finish adding filter visibility code comments for timeline functions
* move home timeline status author check to after visibility
* remove now-unused code
* add more code comments
* add TODO code comment, update printed cache start names
* update printed cache names on stop
* start adding separate follow(request) delete db functions, add specific visibility cache tests
* add relationship type caching
* fix getting local account follows / followed-bys, other small codebase improvements
* simplify invalidation using cache hooks, add more GetAccountBy___() functions
* fix boosting to return 404 if not boostable but no error (to not leak status ID)
* remove dead code
* improved placement of cache invalidation
* update license headers
* add example follow, follow-request config entries
* add example visibility cache configuration to config file
* use specific PutFollowRequest() instead of just Put()
* add tests for all GetAccountBy()
* add GetBlockBy() tests
* update block to check primitive fields
* update and finish adding Get{Account,Block,Follow,FollowRequest}By() tests
* fix copy-pasted code
* update envparsing test
* whitespace
* fix bun struct tag
* add license header to gtscontext
* fix old license header
* improved error creation to not use fmt.Errorf() when not needed
* fix various rebase conflicts, fix account test
* remove commented-out code, fix-up mention caching
* fix mention select bun statement
* ensure mention target account populated, pass in context to customrenderer logging
* remove more uncommented code, fix typeutil test
* add statusfave database model caching
* add status fave cache configuration
* add status fave cache example config
* woops, catch missed error. nice catch linter!
* add back testrig panic on nil db
* update example configuration to match defaults, slight tweak to cache configuration defaults
* update envparsing test with new defaults
* fetch followingget to use the follow target account
* use accounnt.IsLocal() instead of empty domain check
* use constants for the cache visibility type check
* use bun.In() for notification type restriction in db query
* include replies when fetching PublicTimeline() (to account for single-author threads in Visibility{}.StatusPublicTimelineable())
* use bun query building for nested select statements to ensure working with postgres
* update public timeline future status checks to match visibility filter
* same as previous, for home timeline
* update public timeline tests to dynamically check for appropriate statuses
* migrate accounts to allow unique constraint on public_key
* provide minimal account with publicKey
---------
Signed-off-by: kim <grufwub@gmail.com>
Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
2023-03-28 16:03:14 +03:00
|
|
|
if acct, err = f.state.DB.GetAccountByOutboxURI(ctx, iri.String()); err != nil {
|
2021-10-04 16:24:19 +03:00
|
|
|
if err == db.ErrNoEntries {
|
2023-01-27 16:48:11 +03:00
|
|
|
return nil, fmt.Errorf("no actor found that corresponds to outbox %s", iri.String())
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
2023-01-27 16:48:11 +03:00
|
|
|
return nil, fmt.Errorf("db error searching for actor with outbox %s", iri.String())
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
|
|
|
return acct, nil
|
2023-01-27 16:48:11 +03:00
|
|
|
case uris.IsFollowersPath(iri):
|
[performance] refactoring + add fave / follow / request / visibility caching (#1607)
* refactor visibility checking, add caching for visibility
* invalidate visibility cache items on account / status deletes
* fix requester ID passed to visibility cache nil ptr
* de-interface caches, fix home / public timeline caching + visibility
* finish adding code comments for visibility filter
* fix angry goconst linter warnings
* actually finish adding filter visibility code comments for timeline functions
* move home timeline status author check to after visibility
* remove now-unused code
* add more code comments
* add TODO code comment, update printed cache start names
* update printed cache names on stop
* start adding separate follow(request) delete db functions, add specific visibility cache tests
* add relationship type caching
* fix getting local account follows / followed-bys, other small codebase improvements
* simplify invalidation using cache hooks, add more GetAccountBy___() functions
* fix boosting to return 404 if not boostable but no error (to not leak status ID)
* remove dead code
* improved placement of cache invalidation
* update license headers
* add example follow, follow-request config entries
* add example visibility cache configuration to config file
* use specific PutFollowRequest() instead of just Put()
* add tests for all GetAccountBy()
* add GetBlockBy() tests
* update block to check primitive fields
* update and finish adding Get{Account,Block,Follow,FollowRequest}By() tests
* fix copy-pasted code
* update envparsing test
* whitespace
* fix bun struct tag
* add license header to gtscontext
* fix old license header
* improved error creation to not use fmt.Errorf() when not needed
* fix various rebase conflicts, fix account test
* remove commented-out code, fix-up mention caching
* fix mention select bun statement
* ensure mention target account populated, pass in context to customrenderer logging
* remove more uncommented code, fix typeutil test
* add statusfave database model caching
* add status fave cache configuration
* add status fave cache example config
* woops, catch missed error. nice catch linter!
* add back testrig panic on nil db
* update example configuration to match defaults, slight tweak to cache configuration defaults
* update envparsing test with new defaults
* fetch followingget to use the follow target account
* use accounnt.IsLocal() instead of empty domain check
* use constants for the cache visibility type check
* use bun.In() for notification type restriction in db query
* include replies when fetching PublicTimeline() (to account for single-author threads in Visibility{}.StatusPublicTimelineable())
* use bun query building for nested select statements to ensure working with postgres
* update public timeline future status checks to match visibility filter
* same as previous, for home timeline
* update public timeline tests to dynamically check for appropriate statuses
* migrate accounts to allow unique constraint on public_key
* provide minimal account with publicKey
---------
Signed-off-by: kim <grufwub@gmail.com>
Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
2023-03-28 16:03:14 +03:00
|
|
|
if acct, err = f.state.DB.GetAccountByFollowersURI(ctx, iri.String()); err != nil {
|
2021-10-04 16:24:19 +03:00
|
|
|
if err == db.ErrNoEntries {
|
|
|
|
return nil, fmt.Errorf("no actor found that corresponds to followers_uri %s", iri.String())
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("db error searching for actor with followers_uri %s", iri.String())
|
|
|
|
}
|
|
|
|
return acct, nil
|
2023-01-27 16:48:11 +03:00
|
|
|
case uris.IsFollowingPath(iri):
|
[performance] refactoring + add fave / follow / request / visibility caching (#1607)
* refactor visibility checking, add caching for visibility
* invalidate visibility cache items on account / status deletes
* fix requester ID passed to visibility cache nil ptr
* de-interface caches, fix home / public timeline caching + visibility
* finish adding code comments for visibility filter
* fix angry goconst linter warnings
* actually finish adding filter visibility code comments for timeline functions
* move home timeline status author check to after visibility
* remove now-unused code
* add more code comments
* add TODO code comment, update printed cache start names
* update printed cache names on stop
* start adding separate follow(request) delete db functions, add specific visibility cache tests
* add relationship type caching
* fix getting local account follows / followed-bys, other small codebase improvements
* simplify invalidation using cache hooks, add more GetAccountBy___() functions
* fix boosting to return 404 if not boostable but no error (to not leak status ID)
* remove dead code
* improved placement of cache invalidation
* update license headers
* add example follow, follow-request config entries
* add example visibility cache configuration to config file
* use specific PutFollowRequest() instead of just Put()
* add tests for all GetAccountBy()
* add GetBlockBy() tests
* update block to check primitive fields
* update and finish adding Get{Account,Block,Follow,FollowRequest}By() tests
* fix copy-pasted code
* update envparsing test
* whitespace
* fix bun struct tag
* add license header to gtscontext
* fix old license header
* improved error creation to not use fmt.Errorf() when not needed
* fix various rebase conflicts, fix account test
* remove commented-out code, fix-up mention caching
* fix mention select bun statement
* ensure mention target account populated, pass in context to customrenderer logging
* remove more uncommented code, fix typeutil test
* add statusfave database model caching
* add status fave cache configuration
* add status fave cache example config
* woops, catch missed error. nice catch linter!
* add back testrig panic on nil db
* update example configuration to match defaults, slight tweak to cache configuration defaults
* update envparsing test with new defaults
* fetch followingget to use the follow target account
* use accounnt.IsLocal() instead of empty domain check
* use constants for the cache visibility type check
* use bun.In() for notification type restriction in db query
* include replies when fetching PublicTimeline() (to account for single-author threads in Visibility{}.StatusPublicTimelineable())
* use bun query building for nested select statements to ensure working with postgres
* update public timeline future status checks to match visibility filter
* same as previous, for home timeline
* update public timeline tests to dynamically check for appropriate statuses
* migrate accounts to allow unique constraint on public_key
* provide minimal account with publicKey
---------
Signed-off-by: kim <grufwub@gmail.com>
Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
2023-03-28 16:03:14 +03:00
|
|
|
if acct, err = f.state.DB.GetAccountByFollowingURI(ctx, iri.String()); err != nil {
|
2021-10-04 16:24:19 +03:00
|
|
|
if err == db.ErrNoEntries {
|
|
|
|
return nil, fmt.Errorf("no actor found that corresponds to following_uri %s", iri.String())
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("db error searching for actor with following_uri %s", iri.String())
|
|
|
|
}
|
|
|
|
return acct, nil
|
2023-01-27 16:48:11 +03:00
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("getActorForIRI: iri %s not recognised", iri)
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// collectFollows takes a slice of iris and converts them into ActivityStreamsCollection of IRIs.
|
|
|
|
func (f *federatingDB) collectIRIs(ctx context.Context, iris []*url.URL) (vocab.ActivityStreamsCollection, error) {
|
|
|
|
collection := streams.NewActivityStreamsCollection()
|
|
|
|
items := streams.NewActivityStreamsItemsProperty()
|
|
|
|
for _, i := range iris {
|
|
|
|
items.AppendIRI(i)
|
|
|
|
}
|
|
|
|
collection.SetActivityStreamsItems(items)
|
|
|
|
return collection, nil
|
|
|
|
}
|
|
|
|
|
2024-02-17 17:20:39 +03:00
|
|
|
// activityContext represents the context in
|
|
|
|
// which a call to one of the federatingdb
|
|
|
|
// functions is taking place, including the
|
|
|
|
// account who initiated the request via POST
|
|
|
|
// to an inbox, and the account who received
|
|
|
|
// the request in their inbox.
|
|
|
|
type activityContext struct {
|
|
|
|
// The account that owns the inbox
|
|
|
|
// or URI being interacted with.
|
|
|
|
receivingAcct *gtsmodel.Account
|
2021-10-10 13:39:25 +03:00
|
|
|
|
2024-02-17 17:20:39 +03:00
|
|
|
// The account whose keyId was used
|
|
|
|
// to POST a request to the inbox.
|
|
|
|
requestingAcct *gtsmodel.Account
|
|
|
|
|
|
|
|
// Whether this is an internal request,
|
|
|
|
// ie., one originating not from the
|
|
|
|
// API but from inside the instance.
|
|
|
|
//
|
|
|
|
// If the request is internal, it's
|
|
|
|
// safe to assume that the activity
|
|
|
|
// has already been processed elsewhere,
|
|
|
|
// and we can return with no action.
|
|
|
|
internal bool
|
|
|
|
}
|
2021-10-04 16:24:19 +03:00
|
|
|
|
2024-02-17 17:20:39 +03:00
|
|
|
// getActivityContext extracts the context in
|
|
|
|
// which an Activity is taking place from the
|
|
|
|
// context.Context passed in to one of the
|
|
|
|
// federatingdb functions.
|
|
|
|
func getActivityContext(ctx context.Context) activityContext {
|
|
|
|
receivingAcct := gtscontext.ReceivingAccount(ctx)
|
|
|
|
requestingAcct := gtscontext.RequestingAccount(ctx)
|
|
|
|
|
|
|
|
// If the receiving account wasn't set on
|
|
|
|
// the context, that means this request
|
|
|
|
// didn't pass through the fedi API, but
|
|
|
|
// came from inside the instance as the
|
|
|
|
// result of a local activity.
|
|
|
|
internal := receivingAcct == nil
|
|
|
|
|
|
|
|
return activityContext{
|
|
|
|
receivingAcct: receivingAcct,
|
|
|
|
requestingAcct: requestingAcct,
|
|
|
|
internal: internal,
|
|
|
|
}
|
2021-10-04 16:24:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
func marshalItem(item vocab.Type) (string, error) {
|
2023-05-09 13:16:10 +03:00
|
|
|
m, err := ap.Serialize(item)
|
2021-10-04 16:24:19 +03:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2023-06-13 17:47:56 +03:00
|
|
|
|
2021-10-04 16:24:19 +03:00
|
|
|
b, err := json.Marshal(m)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2023-06-13 17:47:56 +03:00
|
|
|
|
2021-10-04 16:24:19 +03:00
|
|
|
return string(b), nil
|
2021-05-27 17:06:24 +03:00
|
|
|
}
|