| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | /* | 
					
						
							|  |  |  |    GoToSocial | 
					
						
							| 
									
										
										
										
											2021-12-20 18:42:19 +01:00
										 |  |  |    Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  |    This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  |    it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  |    the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  |    (at your option) any later version. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  |    GNU Affero General Public License for more details. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  |    along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package federation | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"errors" | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"net/url" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	"github.com/sirupsen/logrus" | 
					
						
							| 
									
										
										
										
											2021-11-13 17:29:43 +01:00
										 |  |  | 	"github.com/superseriousbusiness/activity/pub" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/activity/streams" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/activity/streams/vocab" | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/ap" | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/uris" | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | /* | 
					
						
							|  |  |  | 	GO FED FEDERATING PROTOCOL INTERFACE | 
					
						
							|  |  |  | 	FederatingProtocol contains behaviors an application needs to satisfy for the | 
					
						
							|  |  |  | 	full ActivityPub S2S implementation to be supported by this library. | 
					
						
							|  |  |  | 	It is only required if the client application wants to support the server-to- | 
					
						
							|  |  |  | 	server, or federating, protocol. | 
					
						
							|  |  |  | 	It is passed to the library as a dependency injection from the client | 
					
						
							|  |  |  | 	application. | 
					
						
							|  |  |  | */ | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // PostInboxRequestBodyHook callback after parsing the request body for a federated request | 
					
						
							|  |  |  | // to the Actor's inbox. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Can be used to set contextual information based on the Activity | 
					
						
							|  |  |  | // received. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Only called if the Federated Protocol is enabled. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Warning: Neither authentication nor authorization has taken place at | 
					
						
							|  |  |  | // this time. Doing anything beyond setting contextual information is | 
					
						
							|  |  |  | // strongly discouraged. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If an error is returned, it is passed back to the caller of | 
					
						
							|  |  |  | // PostInbox. In this case, the DelegateActor implementation must not | 
					
						
							|  |  |  | // write a response to the ResponseWriter as is expected that the caller | 
					
						
							|  |  |  | // to PostInbox will do so when handling the error. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) PostInboxRequestBodyHook(ctx context.Context, r *http.Request, activity pub.Activity) (context.Context, error) { | 
					
						
							| 
									
										
										
										
											2021-10-11 05:37:33 -07:00
										 |  |  | 	l := logrus.WithFields(logrus.Fields{ | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 		"func":      "PostInboxRequestBodyHook", | 
					
						
							|  |  |  | 		"useragent": r.UserAgent(), | 
					
						
							|  |  |  | 		"url":       r.URL.String(), | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if activity == nil { | 
					
						
							|  |  |  | 		err := errors.New("nil activity in PostInboxRequestBodyHook") | 
					
						
							|  |  |  | 		l.Debug(err) | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	// set the activity on the context for use later on | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	return context.WithValue(ctx, ap.ContextActivity, activity), nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // AuthenticatePostInbox delegates the authentication of a POST to an | 
					
						
							|  |  |  | // inbox. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If an error is returned, it is passed back to the caller of | 
					
						
							|  |  |  | // PostInbox. In this case, the implementation must not write a | 
					
						
							|  |  |  | // response to the ResponseWriter as is expected that the client will | 
					
						
							|  |  |  | // do so when handling the error. The 'authenticated' is ignored. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If no error is returned, but authentication or authorization fails, | 
					
						
							|  |  |  | // then authenticated must be false and error nil. It is expected that | 
					
						
							|  |  |  | // the implementation handles writing to the ResponseWriter in this | 
					
						
							|  |  |  | // case. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Finally, if the authentication and authorization succeeds, then | 
					
						
							|  |  |  | // authenticated must be true and error nil. The request will continue | 
					
						
							|  |  |  | // to be processed. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWriter, r *http.Request) (context.Context, bool, error) { | 
					
						
							| 
									
										
										
										
											2021-10-11 05:37:33 -07:00
										 |  |  | 	l := logrus.WithFields(logrus.Fields{ | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 		"func":      "AuthenticatePostInbox", | 
					
						
							|  |  |  | 		"useragent": r.UserAgent(), | 
					
						
							|  |  |  | 		"url":       r.URL.String(), | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	l.Trace("received request to authenticate") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	if !uris.IsInboxPath(r.URL) { | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 		return nil, false, fmt.Errorf("path %s was not an inbox path", r.URL.String()) | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	username, err := uris.ParseInboxPath(r.URL) | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, false, fmt.Errorf("could not parse path %s: %s", r.URL.String(), err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if username == "" { | 
					
						
							|  |  |  | 		return nil, false, errors.New("username was empty") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	receivingAccount, err := f.db.GetLocalAccountByUsername(ctx, username) | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 		return nil, false, fmt.Errorf("could not fetch receiving account with username %s: %s", username, err) | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-26 18:10:11 +02:00
										 |  |  | 	publicKeyOwnerURI, errWithCode := f.AuthenticateFederatedRequest(ctx, receivingAccount.Username) | 
					
						
							|  |  |  | 	if errWithCode != nil { | 
					
						
							|  |  |  | 		switch errWithCode.Code() { | 
					
						
							|  |  |  | 		case http.StatusUnauthorized, http.StatusForbidden, http.StatusBadRequest: | 
					
						
							|  |  |  | 			// if 400, 401, or 403, obey the interface by writing the header and bailing | 
					
						
							|  |  |  | 			w.WriteHeader(errWithCode.Code()) | 
					
						
							|  |  |  | 			return ctx, false, nil | 
					
						
							|  |  |  | 		default: | 
					
						
							|  |  |  | 			// if not, there's been a proper error | 
					
						
							|  |  |  | 			return ctx, false, err | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-06-27 16:52:18 +02:00
										 |  |  | 	// authentication has passed, so add an instance entry for this instance if it hasn't been done already | 
					
						
							|  |  |  | 	i := >smodel.Instance{} | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | 	if err := f.db.GetWhere(ctx, []db.Where{{Key: "domain", Value: publicKeyOwnerURI.Host, CaseInsensitive: true}}, i); err != nil { | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 		if err != db.ErrNoEntries { | 
					
						
							| 
									
										
										
										
											2021-06-27 16:52:18 +02:00
										 |  |  | 			// there's been an actual error | 
					
						
							|  |  |  | 			return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// we don't have an entry for this instance yet so dereference it | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | 		i, err = f.GetRemoteInstance(ctx, username, &url.URL{ | 
					
						
							| 
									
										
										
										
											2021-06-27 16:52:18 +02:00
										 |  |  | 			Scheme: publicKeyOwnerURI.Scheme, | 
					
						
							|  |  |  | 			Host:   publicKeyOwnerURI.Host, | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return nil, false, fmt.Errorf("could not dereference new remote instance %s during AuthenticatePostInbox: %s", publicKeyOwnerURI.Host, err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// and put it in the db | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | 		if err := f.db.Put(ctx, i); err != nil { | 
					
						
							| 
									
										
										
										
											2021-06-27 16:52:18 +02:00
										 |  |  | 			return nil, false, fmt.Errorf("error inserting newly dereferenced instance %s: %s", publicKeyOwnerURI.Host, err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-24 13:12:17 +01:00
										 |  |  | 	requestingAccount, err := f.GetRemoteAccount(ctx, username, publicKeyOwnerURI, false, false) | 
					
						
							| 
									
										
										
										
											2021-08-10 13:32:39 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 		return nil, false, fmt.Errorf("couldn't get requesting account %s: %s", publicKeyOwnerURI, err) | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	withRequesting := context.WithValue(ctx, ap.ContextRequestingAccount, requestingAccount) | 
					
						
							|  |  |  | 	withReceiving := context.WithValue(withRequesting, ap.ContextReceivingAccount, receivingAccount) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	return withReceiving, true, nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // Blocked should determine whether to permit a set of actors given by | 
					
						
							|  |  |  | // their ids are able to interact with this particular end user due to | 
					
						
							|  |  |  | // being blocked or other application-specific logic. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If an error is returned, it is passed back to the caller of | 
					
						
							|  |  |  | // PostInbox. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If no error is returned, but authentication or authorization fails, | 
					
						
							|  |  |  | // then blocked must be true and error nil. An http.StatusForbidden | 
					
						
							|  |  |  | // will be written in the wresponse. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Finally, if the authentication and authorization succeeds, then | 
					
						
							|  |  |  | // blocked must be false and error nil. The request will continue | 
					
						
							|  |  |  | // to be processed. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) Blocked(ctx context.Context, actorIRIs []*url.URL) (bool, error) { | 
					
						
							| 
									
										
										
										
											2021-10-11 05:37:33 -07:00
										 |  |  | 	l := logrus.WithFields(logrus.Fields{ | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 		"func": "Blocked", | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	l.Debugf("entering BLOCKED function with IRI list: %+v", actorIRIs) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-12-20 15:19:53 +01:00
										 |  |  | 	receivingAccountI := ctx.Value(ap.ContextReceivingAccount) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	receivingAccount, ok := receivingAccountI.(*gtsmodel.Account) | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	if !ok { | 
					
						
							| 
									
										
										
										
											2021-10-11 05:37:33 -07:00
										 |  |  | 		l.Errorf("receiving account not set on request context") | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 		return false, errors.New("receiving account not set on request context, so couldn't determine blocks") | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | 	blocked, err := f.db.AreURIsBlocked(ctx, actorIRIs) | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return false, fmt.Errorf("error checking domain blocks: %s", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if blocked { | 
					
						
							|  |  |  | 		return blocked, nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	for _, uri := range actorIRIs { | 
					
						
							| 
									
										
										
										
											2021-08-25 15:34:33 +02:00
										 |  |  | 		requestingAccount, err := f.db.GetAccountByURI(ctx, uri.String()) | 
					
						
							| 
									
										
										
										
											2021-07-05 13:23:03 +02:00
										 |  |  | 		if err != nil { | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 			if err == db.ErrNoEntries { | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 				// we don't have an entry for this account so it's not blocked | 
					
						
							|  |  |  | 				// TODO: allow a different default to be set for this behavior | 
					
						
							| 
									
										
										
										
											2021-09-24 17:56:48 +02:00
										 |  |  | 				l.Tracef("no entry for account with URI %s so it can't be blocked", uri) | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 				continue | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			return false, fmt.Errorf("error getting account with uri %s: %s", uri.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-07-11 16:22:21 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 		blocked, err = f.db.IsBlocked(ctx, receivingAccount.ID, requestingAccount.ID, false) | 
					
						
							| 
									
										
										
										
											2021-08-20 12:26:56 +02:00
										 |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return false, fmt.Errorf("error checking account block: %s", err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		if blocked { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 			l.Tracef("local account %s blocks account with uri %s", receivingAccount.Username, uri) | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 			return true, nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-09-24 17:56:48 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	return false, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // FederatingCallbacks returns the application logic that handles | 
					
						
							|  |  |  | // ActivityStreams received from federating peers. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Note that certain types of callbacks will be 'wrapped' with default | 
					
						
							|  |  |  | // behaviors supported natively by the library. Other callbacks | 
					
						
							|  |  |  | // compatible with streams.TypeResolver can be specified by 'other'. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // For example, setting the 'Create' field in the | 
					
						
							|  |  |  | // FederatingWrappedCallbacks lets an application dependency inject | 
					
						
							|  |  |  | // additional behaviors they want to take place, including the default | 
					
						
							|  |  |  | // behavior supplied by this library. This is guaranteed to be compliant | 
					
						
							|  |  |  | // with the ActivityPub Social protocol. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // To override the default behavior, instead supply the function in | 
					
						
							|  |  |  | // 'other', which does not guarantee the application will be compliant | 
					
						
							|  |  |  | // with the ActivityPub Social Protocol. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Applications are not expected to handle every single ActivityStreams | 
					
						
							|  |  |  | // type and extension. The unhandled ones are passed to DefaultCallback. | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | func (f *federator) FederatingCallbacks(ctx context.Context) (wrapped pub.FederatingWrappedCallbacks, other []interface{}, err error) { | 
					
						
							|  |  |  | 	wrapped = pub.FederatingWrappedCallbacks{ | 
					
						
							|  |  |  | 		// OnFollow determines what action to take for this particular callback | 
					
						
							|  |  |  | 		// if a Follow Activity is handled. | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 		// | 
					
						
							|  |  |  | 		// For our implementation, we always want to do nothing because we have internal logic for handling follows. | 
					
						
							|  |  |  | 		OnFollow: pub.OnFollowDoNothing, | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-16 13:27:43 +02:00
										 |  |  | 	// override some default behaviors and trigger our own side effects | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	other = []interface{}{ | 
					
						
							|  |  |  | 		func(ctx context.Context, undo vocab.ActivityStreamsUndo) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Undo(ctx, undo) | 
					
						
							|  |  |  | 		}, | 
					
						
							|  |  |  | 		func(ctx context.Context, accept vocab.ActivityStreamsAccept) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Accept(ctx, accept) | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2021-10-16 13:27:43 +02:00
										 |  |  | 		func(ctx context.Context, reject vocab.ActivityStreamsReject) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Reject(ctx, reject) | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2021-05-28 19:57:04 +02:00
										 |  |  | 		func(ctx context.Context, announce vocab.ActivityStreamsAnnounce) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Announce(ctx, announce) | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	return | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // DefaultCallback is called for types that go-fed can deserialize but | 
					
						
							|  |  |  | // are not handled by the application's callbacks returned in the | 
					
						
							|  |  |  | // Callbacks method. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Applications are not expected to handle every single ActivityStreams | 
					
						
							|  |  |  | // type and extension, so the unhandled ones are passed to | 
					
						
							|  |  |  | // DefaultCallback. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) DefaultCallback(ctx context.Context, activity pub.Activity) error { | 
					
						
							| 
									
										
										
										
											2021-10-11 05:37:33 -07:00
										 |  |  | 	l := logrus.WithFields(logrus.Fields{ | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 		"func":   "DefaultCallback", | 
					
						
							|  |  |  | 		"aptype": activity.GetTypeName(), | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	l.Debugf("received unhandle-able activity type so ignoring it") | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // MaxInboxForwardingRecursionDepth determines how deep to search within | 
					
						
							|  |  |  | // an activity to determine if inbox forwarding needs to occur. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Zero or negative numbers indicate infinite recursion. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) MaxInboxForwardingRecursionDepth(ctx context.Context) int { | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	// TODO | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	return 4 | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // MaxDeliveryRecursionDepth determines how deep to search within | 
					
						
							|  |  |  | // collections owned by peers when they are targeted to receive a | 
					
						
							|  |  |  | // delivery. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Zero or negative numbers indicate infinite recursion. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) MaxDeliveryRecursionDepth(ctx context.Context) int { | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	// TODO | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	return 4 | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // FilterForwarding allows the implementation to apply business logic | 
					
						
							|  |  |  | // such as blocks, spam filtering, and so on to a list of potential | 
					
						
							|  |  |  | // Collections and OrderedCollections of recipients when inbox | 
					
						
							|  |  |  | // forwarding has been triggered. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The activity is provided as a reference for more intelligent | 
					
						
							|  |  |  | // logic to be used, but the implementation must not modify it. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) FilterForwarding(ctx context.Context, potentialRecipients []*url.URL, a pub.Activity) ([]*url.URL, error) { | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	// TODO | 
					
						
							| 
									
										
										
										
											2021-05-29 19:36:54 +02:00
										 |  |  | 	return []*url.URL{}, nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // GetInbox returns the OrderedCollection inbox of the actor for this | 
					
						
							|  |  |  | // context. It is up to the implementation to provide the correct | 
					
						
							|  |  |  | // collection for the kind of authorization given in the request. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // AuthenticateGetInbox will be called prior to this. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Always called, regardless whether the Federated Protocol or Social | 
					
						
							|  |  |  | // API is enabled. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) GetInbox(ctx context.Context, r *http.Request) (vocab.ActivityStreamsOrderedCollectionPage, error) { | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	// IMPLEMENTATION NOTE: For GoToSocial, we serve GETS to outboxes and inboxes through | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	// the CLIENT API, not through the federation API, so we just do nothing here. | 
					
						
							| 
									
										
										
										
											2021-05-29 19:36:54 +02:00
										 |  |  | 	return streams.NewActivityStreamsOrderedCollectionPage(), nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } |