mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-22 09:15:50 +03:00
dfdc473cef
* move finger to dereferencer * totally break GetRemoteAccount * start reworking finger func a bit * start reworking getRemoteAccount a bit * move mention parts to namestring * rework webfingerget * use util function to extract webfinger parts * use accountDomain * rework finger again, final form * just a real nasty commit, the worst * remove refresh from account * use new ASRepToAccount signature * fix incorrect debug call * fix for new getRemoteAccount * rework GetRemoteAccount * start updating tests to remove repetition * break a lot of tests Move shared test logic into the testrig, rather than having it scattered all over the place. This allows us to just mock the transport controller once, and have all tests use it (unless they need not to for some other reason). * fix up tests to use main mock httpclient * webfinger only if necessary * cheeky linting with the lads * update mentionName regex recognize instance accounts * don't finger instance accounts * test webfinger part extraction * increase default worker count to 4 per cpu * don't repeat regex parsing * final search for discovered accountDomain * be more permissive in namestring lookup * add more extraction tests * simplify GetParseMentionFunc * skip long search if local account * fix broken test
381 lines
12 KiB
Go
381 lines
12 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package processing
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
|
"github.com/superseriousbusiness/gotosocial/internal/federation/dereferencing"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
|
)
|
|
|
|
// ProcessFromFederator reads the APActivityType and APObjectType of an incoming message from the federator,
|
|
// and directs the message into the appropriate side effect handler function, or simply does nothing if there's
|
|
// no handler function defined for the combination of Activity and Object.
|
|
func (p *processor) ProcessFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
l := logrus.WithFields(logrus.Fields{
|
|
"func": "processFromFederator",
|
|
"APActivityType": federatorMsg.APActivityType,
|
|
"APObjectType": federatorMsg.APObjectType,
|
|
})
|
|
l.Trace("processing message from federator")
|
|
|
|
switch federatorMsg.APActivityType {
|
|
case ap.ActivityCreate:
|
|
// CREATE SOMETHING
|
|
switch federatorMsg.APObjectType {
|
|
case ap.ObjectNote:
|
|
// CREATE A STATUS
|
|
return p.processCreateStatusFromFederator(ctx, federatorMsg)
|
|
case ap.ActivityLike:
|
|
// CREATE A FAVE
|
|
return p.processCreateFaveFromFederator(ctx, federatorMsg)
|
|
case ap.ActivityFollow:
|
|
// CREATE A FOLLOW REQUEST
|
|
return p.processCreateFollowRequestFromFederator(ctx, federatorMsg)
|
|
case ap.ActivityAnnounce:
|
|
// CREATE AN ANNOUNCE
|
|
return p.processCreateAnnounceFromFederator(ctx, federatorMsg)
|
|
case ap.ActivityBlock:
|
|
// CREATE A BLOCK
|
|
return p.processCreateBlockFromFederator(ctx, federatorMsg)
|
|
}
|
|
case ap.ActivityUpdate:
|
|
// UPDATE SOMETHING
|
|
if federatorMsg.APObjectType == ap.ObjectProfile {
|
|
// UPDATE AN ACCOUNT
|
|
return p.processUpdateAccountFromFederator(ctx, federatorMsg)
|
|
}
|
|
case ap.ActivityDelete:
|
|
// DELETE SOMETHING
|
|
switch federatorMsg.APObjectType {
|
|
case ap.ObjectNote:
|
|
// DELETE A STATUS
|
|
return p.processDeleteStatusFromFederator(ctx, federatorMsg)
|
|
case ap.ObjectProfile:
|
|
// DELETE A PROFILE/ACCOUNT
|
|
return p.processDeleteAccountFromFederator(ctx, federatorMsg)
|
|
}
|
|
}
|
|
|
|
// not a combination we can/need to process
|
|
return nil
|
|
}
|
|
|
|
// processCreateStatusFromFederator handles Activity Create and Object Note
|
|
func (p *processor) processCreateStatusFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
// check for either an IRI that we still need to dereference, OR an already dereferenced
|
|
// and converted status pinned to the message.
|
|
var status *gtsmodel.Status
|
|
|
|
if federatorMsg.GTSModel != nil {
|
|
// there's a gts model already pinned to the message, it should be a status
|
|
var ok bool
|
|
if status, ok = federatorMsg.GTSModel.(*gtsmodel.Status); !ok {
|
|
return errors.New("ProcessFromFederator: note was not parseable as *gtsmodel.Status")
|
|
}
|
|
|
|
var err error
|
|
status, err = p.federator.EnrichRemoteStatus(ctx, federatorMsg.ReceivingAccount.Username, status, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
// no model pinned, we need to dereference based on the IRI
|
|
if federatorMsg.APIri == nil {
|
|
return errors.New("ProcessFromFederator: status was not pinned to federatorMsg, and neither was an IRI for us to dereference")
|
|
}
|
|
var err error
|
|
status, _, err = p.federator.GetRemoteStatus(ctx, federatorMsg.ReceivingAccount.Username, federatorMsg.APIri, false, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// make sure the account is pinned
|
|
if status.Account == nil {
|
|
a, err := p.db.GetAccountByID(ctx, status.AccountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
status.Account = a
|
|
}
|
|
|
|
// do a BLOCKING get of the remote account to make sure the avi and header are cached
|
|
if status.Account.Domain != "" {
|
|
remoteAccountID, err := url.Parse(status.Account.URI)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: federatorMsg.ReceivingAccount.Username,
|
|
RemoteAccountID: remoteAccountID,
|
|
Blocking: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
status.Account = a
|
|
}
|
|
|
|
if err := p.timelineStatus(ctx, status); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := p.notifyStatus(ctx, status); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// processCreateFaveFromFederator handles Activity Create and Object Like
|
|
func (p *processor) processCreateFaveFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
incomingFave, ok := federatorMsg.GTSModel.(*gtsmodel.StatusFave)
|
|
if !ok {
|
|
return errors.New("like was not parseable as *gtsmodel.StatusFave")
|
|
}
|
|
|
|
// make sure the account is pinned
|
|
if incomingFave.Account == nil {
|
|
a, err := p.db.GetAccountByID(ctx, incomingFave.AccountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
incomingFave.Account = a
|
|
}
|
|
|
|
// do a BLOCKING get of the remote account to make sure the avi and header are cached
|
|
if incomingFave.Account.Domain != "" {
|
|
remoteAccountID, err := url.Parse(incomingFave.Account.URI)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: federatorMsg.ReceivingAccount.Username,
|
|
RemoteAccountID: remoteAccountID,
|
|
Blocking: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
incomingFave.Account = a
|
|
}
|
|
|
|
if err := p.notifyFave(ctx, incomingFave); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// processCreateFollowRequestFromFederator handles Activity Create and Object Follow
|
|
func (p *processor) processCreateFollowRequestFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
followRequest, ok := federatorMsg.GTSModel.(*gtsmodel.FollowRequest)
|
|
if !ok {
|
|
return errors.New("incomingFollowRequest was not parseable as *gtsmodel.FollowRequest")
|
|
}
|
|
|
|
// make sure the account is pinned
|
|
if followRequest.Account == nil {
|
|
a, err := p.db.GetAccountByID(ctx, followRequest.AccountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
followRequest.Account = a
|
|
}
|
|
|
|
// do a BLOCKING get of the remote account to make sure the avi and header are cached
|
|
if followRequest.Account.Domain != "" {
|
|
remoteAccountID, err := url.Parse(followRequest.Account.URI)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: federatorMsg.ReceivingAccount.Username,
|
|
RemoteAccountID: remoteAccountID,
|
|
Blocking: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
followRequest.Account = a
|
|
}
|
|
|
|
if followRequest.TargetAccount == nil {
|
|
a, err := p.db.GetAccountByID(ctx, followRequest.TargetAccountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
followRequest.TargetAccount = a
|
|
}
|
|
|
|
if followRequest.TargetAccount.Locked {
|
|
// if the account is locked just notify the follow request and nothing else
|
|
return p.notifyFollowRequest(ctx, followRequest)
|
|
}
|
|
|
|
// if the target account isn't locked, we should already accept the follow and notify about the new follower instead
|
|
follow, err := p.db.AcceptFollowRequest(ctx, followRequest.AccountID, followRequest.TargetAccountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := p.federateAcceptFollowRequest(ctx, follow); err != nil {
|
|
return err
|
|
}
|
|
|
|
return p.notifyFollow(ctx, follow, followRequest.TargetAccount)
|
|
}
|
|
|
|
// processCreateAnnounceFromFederator handles Activity Create and Object Announce
|
|
func (p *processor) processCreateAnnounceFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
incomingAnnounce, ok := federatorMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return errors.New("announce was not parseable as *gtsmodel.Status")
|
|
}
|
|
|
|
// make sure the account is pinned
|
|
if incomingAnnounce.Account == nil {
|
|
a, err := p.db.GetAccountByID(ctx, incomingAnnounce.AccountID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
incomingAnnounce.Account = a
|
|
}
|
|
|
|
// do a BLOCKING get of the remote account to make sure the avi and header are cached
|
|
if incomingAnnounce.Account.Domain != "" {
|
|
remoteAccountID, err := url.Parse(incomingAnnounce.Account.URI)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
a, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: federatorMsg.ReceivingAccount.Username,
|
|
RemoteAccountID: remoteAccountID,
|
|
Blocking: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
incomingAnnounce.Account = a
|
|
}
|
|
|
|
if err := p.federator.DereferenceAnnounce(ctx, incomingAnnounce, federatorMsg.ReceivingAccount.Username); err != nil {
|
|
return fmt.Errorf("error dereferencing announce from federator: %s", err)
|
|
}
|
|
|
|
incomingAnnounceID, err := id.NewULIDFromTime(incomingAnnounce.CreatedAt)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
incomingAnnounce.ID = incomingAnnounceID
|
|
|
|
if err := p.db.PutStatus(ctx, incomingAnnounce); err != nil {
|
|
return fmt.Errorf("error adding dereferenced announce to the db: %s", err)
|
|
}
|
|
|
|
if err := p.timelineStatus(ctx, incomingAnnounce); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := p.notifyAnnounce(ctx, incomingAnnounce); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// processCreateBlockFromFederator handles Activity Create and Object Block
|
|
func (p *processor) processCreateBlockFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
block, ok := federatorMsg.GTSModel.(*gtsmodel.Block)
|
|
if !ok {
|
|
return errors.New("block was not parseable as *gtsmodel.Block")
|
|
}
|
|
|
|
// remove any of the blocking account's statuses from the blocked account's timeline, and vice versa
|
|
if err := p.statusTimelines.WipeItemsFromAccountID(ctx, block.AccountID, block.TargetAccountID); err != nil {
|
|
return err
|
|
}
|
|
if err := p.statusTimelines.WipeItemsFromAccountID(ctx, block.TargetAccountID, block.AccountID); err != nil {
|
|
return err
|
|
}
|
|
// TODO: same with notifications
|
|
// TODO: same with bookmarks
|
|
|
|
return nil
|
|
}
|
|
|
|
// processUpdateAccountFromFederator handles Activity Update and Object Profile
|
|
func (p *processor) processUpdateAccountFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
incomingAccount, ok := federatorMsg.GTSModel.(*gtsmodel.Account)
|
|
if !ok {
|
|
return errors.New("profile was not parseable as *gtsmodel.Account")
|
|
}
|
|
|
|
incomingAccountURL, err := url.Parse(incomingAccount.URI)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: federatorMsg.ReceivingAccount.Username,
|
|
RemoteAccountID: incomingAccountURL,
|
|
Blocking: true,
|
|
}); err != nil {
|
|
return fmt.Errorf("error enriching updated account from federator: %s", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// processDeleteStatusFromFederator handles Activity Delete and Object Note
|
|
func (p *processor) processDeleteStatusFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
statusToDelete, ok := federatorMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return errors.New("note was not parseable as *gtsmodel.Status")
|
|
}
|
|
|
|
return p.wipeStatus(ctx, statusToDelete)
|
|
}
|
|
|
|
// processDeleteAccountFromFederator handles Activity Delete and Object Profile
|
|
func (p *processor) processDeleteAccountFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
|
|
account, ok := federatorMsg.GTSModel.(*gtsmodel.Account)
|
|
if !ok {
|
|
return errors.New("account delete was not parseable as *gtsmodel.Account")
|
|
}
|
|
|
|
return p.accountProcessor.Delete(ctx, account, account.ID)
|
|
}
|