| 
									
										
										
										
											2023-03-12 16:00:57 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | package federatingdb | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"errors" | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 	"github.com/miekg/dns" | 
					
						
							| 
									
										
										
										
											2021-11-13 17:29:43 +01:00
										 |  |  | 	"github.com/superseriousbusiness/activity/streams/vocab" | 
					
						
							| 
									
										
										
										
											2021-08-31 15:59:12 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/ap" | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2023-11-08 14:32:17 +00:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtscontext" | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtserror" | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							| 
									
										
										
										
											2021-06-13 18:42:28 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/id" | 
					
						
							| 
									
										
										
										
											2022-07-19 09:47:55 +01:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/log" | 
					
						
							| 
									
										
										
										
											2021-08-31 15:59:12 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/messages" | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Create adds a new entry to the database which must be able to be | 
					
						
							|  |  |  | // keyed by its id. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Note that Activity values received from federated peers may also be | 
					
						
							|  |  |  | // created in the database this way if the Federating Protocol is | 
					
						
							|  |  |  | // enabled. The client may freely decide to store only the id instead of | 
					
						
							|  |  |  | // the entire value. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The library makes this call only after acquiring a lock first. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Under certain conditions and network activities, Create may be called | 
					
						
							|  |  |  | // multiple times for the same ActivityStreams object. | 
					
						
							|  |  |  | func (f *federatingDB) Create(ctx context.Context, asType vocab.Type) error { | 
					
						
							| 
									
										
										
										
											2024-09-17 19:35:47 +00:00
										 |  |  | 	log.DebugKV(ctx, "create", serialize{asType}) | 
					
						
							| 
									
										
										
										
											2021-10-04 15:24:19 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 	activityContext := getActivityContext(ctx) | 
					
						
							|  |  |  | 	if activityContext.internal { | 
					
						
							| 
									
										
										
										
											2023-06-13 16:47:56 +02:00
										 |  |  | 		return nil // Already processed. | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 	requestingAcct := activityContext.requestingAcct | 
					
						
							|  |  |  | 	receivingAcct := activityContext.receivingAcct | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-03-12 15:34:08 +01:00
										 |  |  | 	if requestingAcct.IsMoving() { | 
					
						
							|  |  |  | 		// A Moving account | 
					
						
							|  |  |  | 		// can't do this. | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-01-22 12:42:12 +00:00
										 |  |  | 	// Cache entry for this create activity ID for later | 
					
						
							|  |  |  | 	// checks in the Exist() function if we see it again. | 
					
						
							|  |  |  | 	f.activityIDs.Set(ap.GetJSONLDId(asType).String(), struct{}{}) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-09-17 19:35:47 +00:00
										 |  |  | 	switch name := asType.GetTypeName(); name { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	case ap.ActivityBlock: | 
					
						
							|  |  |  | 		// BLOCK SOMETHING | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 		return f.activityBlock(ctx, asType, receivingAcct, requestingAcct) | 
					
						
							| 
									
										
										
										
											2021-08-31 15:59:12 +02:00
										 |  |  | 	case ap.ActivityCreate: | 
					
						
							| 
									
										
										
										
											2021-06-17 18:02:33 +02:00
										 |  |  | 		// CREATE SOMETHING | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 		return f.activityCreate(ctx, asType, receivingAcct, requestingAcct) | 
					
						
							| 
									
										
										
										
											2021-08-31 15:59:12 +02:00
										 |  |  | 	case ap.ActivityFollow: | 
					
						
							| 
									
										
										
										
											2021-07-11 16:22:21 +02:00
										 |  |  | 		// FOLLOW SOMETHING | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 		return f.activityFollow(ctx, asType, receivingAcct, requestingAcct) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	case ap.ActivityLike: | 
					
						
							|  |  |  | 		// LIKE SOMETHING | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 		return f.activityLike(ctx, asType, receivingAcct, requestingAcct) | 
					
						
							| 
									
										
										
										
											2023-01-25 11:12:27 +01:00
										 |  |  | 	case ap.ActivityFlag: | 
					
						
							|  |  |  | 		// FLAG / REPORT SOMETHING | 
					
						
							| 
									
										
										
										
											2024-02-17 15:20:39 +01:00
										 |  |  | 		return f.activityFlag(ctx, asType, receivingAcct, requestingAcct) | 
					
						
							| 
									
										
										
										
											2024-09-17 19:35:47 +00:00
										 |  |  | 	default: | 
					
						
							|  |  |  | 		log.Debugf(ctx, "unhandled object type: %s", name) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2023-10-04 13:09:42 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | /* | 
					
						
							|  |  |  | 	BLOCK HANDLERS | 
					
						
							|  |  |  | */ | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | func (f *federatingDB) activityBlock(ctx context.Context, asType vocab.Type, receiving *gtsmodel.Account, requesting *gtsmodel.Account) error { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	blockable, ok := asType.(vocab.ActivityStreamsBlock) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		return errors.New("activityBlock: could not convert type to block") | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-06-13 18:42:28 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-23 17:44:11 +01:00
										 |  |  | 	block, err := f.converter.ASBlockToBlock(ctx, blockable) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return fmt.Errorf("activityBlock: could not convert Block to gts model block") | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	if block.AccountID != requesting.ID { | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 		return fmt.Errorf( | 
					
						
							|  |  |  | 			"activityBlock: requestingAccount %s is not Block actor account %s", | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 			requesting.URI, block.Account.URI, | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 		) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if block.TargetAccountID != receiving.ID { | 
					
						
							|  |  |  | 		return fmt.Errorf( | 
					
						
							|  |  |  | 			"activityBlock: inbox account %s is not Block object account %s", | 
					
						
							|  |  |  | 			receiving.URI, block.TargetAccount.URI, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	block.ID = id.NewULID() | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	if err := f.state.DB.PutBlock(ctx, block); err != nil { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 		return fmt.Errorf("activityBlock: database error inserting block: %s", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							|  |  |  | 		APObjectType:   ap.ActivityBlock, | 
					
						
							|  |  |  | 		APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 		GTSModel:       block, | 
					
						
							|  |  |  | 		Receiving:      receiving, | 
					
						
							|  |  |  | 		Requesting:     requesting, | 
					
						
							| 
									
										
										
										
											2022-04-28 13:23:11 +01:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2023-10-04 13:09:42 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* | 
					
						
							|  |  |  | 	CREATE HANDLERS | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | // activityCreate handles asType Create by checking | 
					
						
							|  |  |  | // the Object entries of the Create and calling other | 
					
						
							|  |  |  | // handlers as appropriate. | 
					
						
							|  |  |  | func (f *federatingDB) activityCreate( | 
					
						
							|  |  |  | 	ctx context.Context, | 
					
						
							|  |  |  | 	asType vocab.Type, | 
					
						
							|  |  |  | 	receivingAccount *gtsmodel.Account, | 
					
						
							|  |  |  | 	requestingAccount *gtsmodel.Account, | 
					
						
							|  |  |  | ) error { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	create, ok := asType.(vocab.ActivityStreamsCreate) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 		return gtserror.Newf("could not convert asType %T to ActivityStreamsCreate", asType) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	var errs gtserror.MultiError | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Extract objects from create activity. | 
					
						
							|  |  |  | 	objects := ap.ExtractObjects(create) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-08 14:32:17 +00:00
										 |  |  | 	// Extract PollOptionables (votes!) from objects slice. | 
					
						
							|  |  |  | 	optionables, objects := ap.ExtractPollOptionables(objects) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if len(optionables) > 0 { | 
					
						
							|  |  |  | 		// Handle provided poll vote(s) creation, this can | 
					
						
							|  |  |  | 		// be for single or multiple votes in the same poll. | 
					
						
							|  |  |  | 		err := f.createPollOptionables(ctx, | 
					
						
							|  |  |  | 			receivingAccount, | 
					
						
							|  |  |  | 			requestingAccount, | 
					
						
							|  |  |  | 			optionables, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			errs.Appendf("error creating poll vote(s): %w", err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	// Extract Statusables from objects slice (this must be | 
					
						
							|  |  |  | 	// done AFTER extracting options due to how AS typing works). | 
					
						
							|  |  |  | 	statusables, objects := ap.ExtractStatusables(objects) | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	for _, statusable := range statusables { | 
					
						
							|  |  |  | 		// Check if this is a forwarded object, i.e. did | 
					
						
							|  |  |  | 		// the account making the request also create this? | 
					
						
							|  |  |  | 		forwarded := !isSender(statusable, requestingAccount) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Handle create event for this statusable. | 
					
						
							|  |  |  | 		if err := f.createStatusable(ctx, | 
					
						
							|  |  |  | 			receivingAccount, | 
					
						
							|  |  |  | 			requestingAccount, | 
					
						
							|  |  |  | 			statusable, | 
					
						
							|  |  |  | 			forwarded, | 
					
						
							|  |  |  | 		); err != nil { | 
					
						
							|  |  |  | 			errs.Appendf("error creating statusable: %w", err) | 
					
						
							| 
									
										
										
										
											2021-06-13 18:42:28 +02:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	if len(objects) > 0 { | 
					
						
							|  |  |  | 		// Log any unhandled objects after filtering for debug purposes. | 
					
						
							|  |  |  | 		log.Debugf(ctx, "unhandled CREATE types: %v", typeNames(objects)) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-06-13 18:42:28 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	return errs.Combine() | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-11-08 14:32:17 +00:00
										 |  |  | // createPollOptionable handles a Create activity for a PollOptionable. | 
					
						
							|  |  |  | // This function doesn't handle database insertion, only validation checks | 
					
						
							|  |  |  | // before passing off to a worker for asynchronous processing. | 
					
						
							|  |  |  | func (f *federatingDB) createPollOptionables( | 
					
						
							|  |  |  | 	ctx context.Context, | 
					
						
							|  |  |  | 	receiver *gtsmodel.Account, | 
					
						
							|  |  |  | 	requester *gtsmodel.Account, | 
					
						
							|  |  |  | 	options []ap.PollOptionable, | 
					
						
							|  |  |  | ) error { | 
					
						
							|  |  |  | 	var ( | 
					
						
							|  |  |  | 		// the origin Status w/ Poll the vote | 
					
						
							|  |  |  | 		// options are in. This gets set on first | 
					
						
							|  |  |  | 		// iteration, relevant checks performed | 
					
						
							|  |  |  | 		// then re-used in each further iteration. | 
					
						
							|  |  |  | 		inReplyTo *gtsmodel.Status | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// the resulting slices of Poll.Option | 
					
						
							|  |  |  | 		// choice indices passed into the new | 
					
						
							|  |  |  | 		// created PollVote object. | 
					
						
							|  |  |  | 		choices []int | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for _, option := range options { | 
					
						
							|  |  |  | 		// Extract the "inReplyTo" property. | 
					
						
							|  |  |  | 		inReplyToURIs := ap.GetInReplyTo(option) | 
					
						
							|  |  |  | 		if len(inReplyToURIs) != 1 { | 
					
						
							|  |  |  | 			return gtserror.Newf("invalid inReplyTo property length: %d", len(inReplyToURIs)) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Stringify the inReplyTo URI. | 
					
						
							|  |  |  | 		statusURI := inReplyToURIs[0].String() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		if inReplyTo == nil { | 
					
						
							|  |  |  | 			var err error | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			// This is the first object in the activity slice, | 
					
						
							|  |  |  | 			// check database for the poll source status by URI. | 
					
						
							|  |  |  | 			inReplyTo, err = f.state.DB.GetStatusByURI(ctx, statusURI) | 
					
						
							|  |  |  | 			if err != nil { | 
					
						
							|  |  |  | 				return gtserror.Newf("error getting poll source from database %s: %w", statusURI, err) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			switch { | 
					
						
							|  |  |  | 			// The origin status isn't a poll? | 
					
						
							|  |  |  | 			case inReplyTo.PollID == "": | 
					
						
							|  |  |  | 				return gtserror.Newf("poll vote in status %s without poll", statusURI) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			// We don't own the poll ... | 
					
						
							|  |  |  | 			case !*inReplyTo.Local: | 
					
						
							|  |  |  | 				return gtserror.Newf("poll vote in remote status %s", statusURI) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			// Check whether user has already vote in this poll. | 
					
						
							|  |  |  | 			// (we only check this for the first object, as multiple | 
					
						
							|  |  |  | 			// may be sent in response to a multiple-choice poll). | 
					
						
							|  |  |  | 			vote, err := f.state.DB.GetPollVoteBy( | 
					
						
							|  |  |  | 				gtscontext.SetBarebones(ctx), | 
					
						
							|  |  |  | 				inReplyTo.PollID, | 
					
						
							|  |  |  | 				requester.ID, | 
					
						
							|  |  |  | 			) | 
					
						
							|  |  |  | 			if err != nil && !errors.Is(err, db.ErrNoEntries) { | 
					
						
							|  |  |  | 				return gtserror.Newf("error getting status %s poll votes from database: %w", statusURI, err) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			if vote != nil { | 
					
						
							|  |  |  | 				log.Warnf(ctx, "%s has already voted in poll %s", requester.URI, statusURI) | 
					
						
							|  |  |  | 				return nil // this is a useful warning for admins to report to us from logs | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		if statusURI != inReplyTo.URI { | 
					
						
							|  |  |  | 			// All activity votes should be to the same poll per activity. | 
					
						
							|  |  |  | 			return gtserror.New("votes to multiple polls in single activity") | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Extract the poll option name. | 
					
						
							|  |  |  | 		name := ap.ExtractName(option) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Check that this is a valid option name. | 
					
						
							|  |  |  | 		choice := inReplyTo.Poll.GetChoice(name) | 
					
						
							|  |  |  | 		if choice == -1 { | 
					
						
							|  |  |  | 			return gtserror.Newf("poll vote in status %s invalid: %s", statusURI, name) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Append the option index to choices. | 
					
						
							|  |  |  | 		choices = append(choices, choice) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Enqueue message to the fedi API worker with poll vote(s). | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							| 
									
										
										
										
											2023-11-08 14:32:17 +00:00
										 |  |  | 		APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 		APObjectType:   ap.ActivityQuestion, | 
					
						
							|  |  |  | 		GTSModel: >smodel.PollVote{ | 
					
						
							|  |  |  | 			ID:        id.NewULID(), | 
					
						
							|  |  |  | 			Choices:   choices, | 
					
						
							|  |  |  | 			AccountID: requester.ID, | 
					
						
							|  |  |  | 			Account:   requester, | 
					
						
							|  |  |  | 			PollID:    inReplyTo.PollID, | 
					
						
							|  |  |  | 			Poll:      inReplyTo.Poll, | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 		Receiving:  receiver, | 
					
						
							|  |  |  | 		Requesting: requester, | 
					
						
							| 
									
										
										
										
											2023-11-08 14:32:17 +00:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | // createStatusable handles a Create activity for a Statusable. | 
					
						
							|  |  |  | // This function won't insert anything in the database yet, | 
					
						
							|  |  |  | // but will pass the Statusable (if appropriate) through to | 
					
						
							|  |  |  | // the processor for further asynchronous processing. | 
					
						
							|  |  |  | func (f *federatingDB) createStatusable( | 
					
						
							|  |  |  | 	ctx context.Context, | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	receiver *gtsmodel.Account, | 
					
						
							|  |  |  | 	requester *gtsmodel.Account, | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 	statusable ap.Statusable, | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 	forwarded bool, | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | ) error { | 
					
						
							| 
									
										
										
										
											2024-02-27 13:22:05 +01:00
										 |  |  | 	// Check whether this status is both | 
					
						
							|  |  |  | 	// relevant, and doesn't look like spam. | 
					
						
							|  |  |  | 	err := f.spamFilter.StatusableOK(ctx, | 
					
						
							| 
									
										
										
										
											2023-11-04 20:21:20 +00:00
										 |  |  | 		receiver, | 
					
						
							|  |  |  | 		requester, | 
					
						
							|  |  |  | 		statusable, | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2021-07-11 16:22:21 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-27 13:22:05 +01:00
										 |  |  | 	switch { | 
					
						
							|  |  |  | 	case err == nil: | 
					
						
							|  |  |  | 		// No problem! | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case gtserror.IsNotRelevant(err): | 
					
						
							|  |  |  | 		// This case is quite common if a remote (Mastodon) | 
					
						
							|  |  |  | 		// instance forwards a message to us which is a reply | 
					
						
							|  |  |  | 		// from someone else to a status we've also replied to. | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 		// | 
					
						
							| 
									
										
										
										
											2024-02-27 13:22:05 +01:00
										 |  |  | 		// It does this to try to ensure thread completion, but | 
					
						
							|  |  |  | 		// we have our own thread fetching mechanism anyway. | 
					
						
							|  |  |  | 		log.Debugf(ctx, | 
					
						
							|  |  |  | 			"status %s is not relevant to receiver (%v); dropping it", | 
					
						
							|  |  |  | 			ap.GetJSONLDId(statusable), err, | 
					
						
							|  |  |  | 		) | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 		return nil | 
					
						
							| 
									
										
										
										
											2024-02-27 13:22:05 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	case gtserror.IsSpam(err): | 
					
						
							|  |  |  | 		// Log this at a higher level so admins can | 
					
						
							|  |  |  | 		// gauge how much spam is being sent to them. | 
					
						
							|  |  |  | 		// | 
					
						
							|  |  |  | 		// TODO: add Prometheus metrics for this. | 
					
						
							|  |  |  | 		log.Infof(ctx, | 
					
						
							|  |  |  | 			"status %s looked like spam (%v); dropping it", | 
					
						
							|  |  |  | 			ap.GetJSONLDId(statusable), err, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	default: | 
					
						
							|  |  |  | 		// A real error has occurred. | 
					
						
							|  |  |  | 		return gtserror.Newf("error checking relevancy/spam: %w", err) | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-01-31 13:29:47 +00:00
										 |  |  | 	// If we do have a forward, we should ignore the content | 
					
						
							|  |  |  | 	// and instead deref based on the URI of the statusable. | 
					
						
							|  |  |  | 	// | 
					
						
							|  |  |  | 	// In other words, don't automatically trust whoever sent | 
					
						
							|  |  |  | 	// this status to us, but fetch the authentic article from | 
					
						
							|  |  |  | 	// the server it originated from. | 
					
						
							|  |  |  | 	if forwarded { | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Pass the statusable URI (APIri) into the processor | 
					
						
							|  |  |  | 		// worker and do the rest of the processing asynchronously. | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 		f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							|  |  |  | 			APObjectType:   ap.ObjectNote, | 
					
						
							|  |  |  | 			APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 			APIRI:          ap.GetJSONLDId(statusable), | 
					
						
							|  |  |  | 			APObject:       nil, | 
					
						
							|  |  |  | 			GTSModel:       nil, | 
					
						
							|  |  |  | 			Receiving:      receiver, | 
					
						
							|  |  |  | 			Requesting:     requester, | 
					
						
							| 
									
										
										
										
											2024-01-31 13:29:47 +00:00
										 |  |  | 		}) | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-08-08 12:26:34 +01:00
										 |  |  | 	// Do the rest of the processing asynchronously. The processor | 
					
						
							|  |  |  | 	// will handle inserting/updating + further dereferencing the status. | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							|  |  |  | 		APObjectType:   ap.ObjectNote, | 
					
						
							|  |  |  | 		APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 		APIRI:          nil, | 
					
						
							|  |  |  | 		GTSModel:       nil, | 
					
						
							|  |  |  | 		APObject:       statusable, | 
					
						
							|  |  |  | 		Receiving:      receiver, | 
					
						
							|  |  |  | 		Requesting:     requester, | 
					
						
							| 
									
										
										
										
											2022-04-28 13:23:11 +01:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* | 
					
						
							|  |  |  | 	FOLLOW HANDLERS | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-28 13:23:11 +01:00
										 |  |  | func (f *federatingDB) activityFollow(ctx context.Context, asType vocab.Type, receivingAccount *gtsmodel.Account, requestingAccount *gtsmodel.Account) error { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	follow, ok := asType.(vocab.ActivityStreamsFollow) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		return errors.New("activityFollow: could not convert type to follow") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-23 17:44:11 +01:00
										 |  |  | 	followRequest, err := f.converter.ASFollowToFollowRequest(ctx, follow) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return fmt.Errorf("activityFollow: could not convert Follow to follow request: %s", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 	if followRequest.AccountID != requestingAccount.ID { | 
					
						
							|  |  |  | 		return fmt.Errorf( | 
					
						
							|  |  |  | 			"activityFollow: requestingAccount %s is not Follow actor account %s", | 
					
						
							|  |  |  | 			requestingAccount.URI, followRequest.Account.URI, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if followRequest.TargetAccountID != receivingAccount.ID { | 
					
						
							|  |  |  | 		return fmt.Errorf( | 
					
						
							|  |  |  | 			"activityFollow: inbox account %s is not Follow object account %s", | 
					
						
							|  |  |  | 			receivingAccount.URI, followRequest.TargetAccount.URI, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	followRequest.ID = id.NewULID() | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
											  
											
												[performance] refactoring + add fave / follow / request / visibility caching (#1607)
* refactor visibility checking, add caching for visibility
* invalidate visibility cache items on account / status deletes
* fix requester ID passed to visibility cache nil ptr
* de-interface caches, fix home / public timeline caching + visibility
* finish adding code comments for visibility filter
* fix angry goconst linter warnings
* actually finish adding filter visibility code comments for timeline functions
* move home timeline status author check to after visibility
* remove now-unused code
* add more code comments
* add TODO code comment, update printed cache start names
* update printed cache names on stop
* start adding separate follow(request) delete db functions, add specific visibility cache tests
* add relationship type caching
* fix getting local account follows / followed-bys, other small codebase improvements
* simplify invalidation using cache hooks, add more GetAccountBy___() functions
* fix boosting to return 404 if not boostable but no error (to not leak status ID)
* remove dead code
* improved placement of cache invalidation
* update license headers
* add example follow, follow-request config entries
* add example visibility cache configuration to config file
* use specific PutFollowRequest() instead of just Put()
* add tests for all GetAccountBy()
* add GetBlockBy() tests
* update block to check primitive fields
* update and finish adding Get{Account,Block,Follow,FollowRequest}By() tests
* fix copy-pasted code
* update envparsing test
* whitespace
* fix bun struct tag
* add license header to gtscontext
* fix old license header
* improved error creation to not use fmt.Errorf() when not needed
* fix various rebase conflicts, fix account test
* remove commented-out code, fix-up mention caching
* fix mention select bun statement
* ensure mention target account populated, pass in context to customrenderer logging
* remove more uncommented code, fix typeutil test
* add statusfave database model caching
* add status fave cache configuration
* add status fave cache example config
* woops, catch missed error. nice catch linter!
* add back testrig panic on nil db
* update example configuration to match defaults, slight tweak to cache configuration defaults
* update envparsing test with new defaults
* fetch followingget to use the follow target account
* use accounnt.IsLocal() instead of empty domain check
* use constants for the cache visibility type check
* use bun.In() for notification type restriction in db query
* include replies when fetching PublicTimeline() (to account for single-author threads in Visibility{}.StatusPublicTimelineable())
* use bun query building for nested select statements to ensure working with postgres
* update public timeline future status checks to match visibility filter
* same as previous, for home timeline
* update public timeline tests to dynamically check for appropriate statuses
* migrate accounts to allow unique constraint on public_key
* provide minimal account with publicKey
---------
Signed-off-by: kim <grufwub@gmail.com>
Co-authored-by: tsmethurst <tobi.smethurst@protonmail.com>
											
										 
											2023-03-28 14:03:14 +01:00
										 |  |  | 	if err := f.state.DB.PutFollowRequest(ctx, followRequest); err != nil { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 		return fmt.Errorf("activityFollow: database error inserting follow request: %s", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							|  |  |  | 		APObjectType:   ap.ActivityFollow, | 
					
						
							|  |  |  | 		APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 		GTSModel:       followRequest, | 
					
						
							|  |  |  | 		Receiving:      receivingAccount, | 
					
						
							|  |  |  | 		Requesting:     requestingAccount, | 
					
						
							| 
									
										
										
										
											2022-04-28 13:23:11 +01:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* | 
					
						
							|  |  |  | 	LIKE HANDLERS | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | func (f *federatingDB) activityLike( | 
					
						
							|  |  |  | 	ctx context.Context, | 
					
						
							|  |  |  | 	asType vocab.Type, | 
					
						
							|  |  |  | 	receivingAcct *gtsmodel.Account, | 
					
						
							|  |  |  | 	requestingAcct *gtsmodel.Account, | 
					
						
							|  |  |  | ) error { | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	like, ok := asType.(vocab.ActivityStreamsLike) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 		err := gtserror.Newf("could not convert asType %T to ActivityStreamsLike", asType) | 
					
						
							|  |  |  | 		return gtserror.SetMalformed(err) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-23 17:44:11 +01:00
										 |  |  | 	fave, err := f.converter.ASLikeToFave(ctx, like) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	if err != nil { | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 		return gtserror.Newf("could not convert Like to fave: %w", err) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 	// Ensure requester not trying to | 
					
						
							|  |  |  | 	// Like on someone else's behalf. | 
					
						
							|  |  |  | 	if fave.AccountID != requestingAcct.ID { | 
					
						
							|  |  |  | 		text := fmt.Sprintf( | 
					
						
							|  |  |  | 			"requestingAcct %s is not Like actor account %s", | 
					
						
							|  |  |  | 			requestingAcct.URI, fave.Account.URI, | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 		) | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 		return gtserror.NewErrorForbidden(errors.New(text), text) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if !*fave.Status.Local { | 
					
						
							|  |  |  | 		// Only process likes of local statuses. | 
					
						
							|  |  |  | 		// TODO: process for remote statuses as well. | 
					
						
							|  |  |  | 		return nil | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Ensure valid Like target for requester. | 
					
						
							|  |  |  | 	policyResult, err := f.intFilter.StatusLikeable(ctx, | 
					
						
							|  |  |  | 		requestingAcct, | 
					
						
							|  |  |  | 		fave.Status, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		err := gtserror.Newf("error seeing if status %s is likeable: %w", fave.Status.ID, err) | 
					
						
							|  |  |  | 		return gtserror.NewErrorInternalError(err) | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 	if policyResult.Forbidden() { | 
					
						
							|  |  |  | 		const errText = "requester does not have permission to Like this status" | 
					
						
							|  |  |  | 		err := gtserror.New(errText) | 
					
						
							|  |  |  | 		return gtserror.NewErrorForbidden(err, errText) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Derive pendingApproval | 
					
						
							|  |  |  | 	// and preapproved status. | 
					
						
							|  |  |  | 	var ( | 
					
						
							|  |  |  | 		pendingApproval bool | 
					
						
							|  |  |  | 		preApproved     bool | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	switch { | 
					
						
							|  |  |  | 	case policyResult.WithApproval(): | 
					
						
							|  |  |  | 		// Requester allowed to do | 
					
						
							|  |  |  | 		// this pending approval. | 
					
						
							|  |  |  | 		pendingApproval = true | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case policyResult.MatchedOnCollection(): | 
					
						
							|  |  |  | 		// Requester allowed to do this, | 
					
						
							|  |  |  | 		// but matched on collection. | 
					
						
							|  |  |  | 		// Preapprove Like and have the | 
					
						
							|  |  |  | 		// processor send out an Accept. | 
					
						
							|  |  |  | 		pendingApproval = true | 
					
						
							|  |  |  | 		preApproved = true | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	case policyResult.Permitted(): | 
					
						
							|  |  |  | 		// Requester straight up | 
					
						
							|  |  |  | 		// permitted to do this, | 
					
						
							|  |  |  | 		// no need for Accept. | 
					
						
							|  |  |  | 		pendingApproval = false | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Set appropriate fields | 
					
						
							|  |  |  | 	// on fave and store it. | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	fave.ID = id.NewULID() | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 	fave.PendingApproval = &pendingApproval | 
					
						
							|  |  |  | 	fave.PreApproved = preApproved | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-04-05 20:10:05 +02:00
										 |  |  | 	if err := f.state.DB.PutStatusFave(ctx, fave); err != nil { | 
					
						
							|  |  |  | 		if errors.Is(err, db.ErrAlreadyExists) { | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 			// The fave already exists in the | 
					
						
							|  |  |  | 			// database, which means we've already | 
					
						
							|  |  |  | 			// handled side effects. We can just | 
					
						
							|  |  |  | 			// return nil here and be done with it. | 
					
						
							| 
									
										
										
										
											2023-04-05 20:10:05 +02:00
										 |  |  | 			return nil | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 		return gtserror.Newf("db error inserting fave: %w", err) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							|  |  |  | 		APObjectType:   ap.ActivityLike, | 
					
						
							|  |  |  | 		APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 		GTSModel:       fave, | 
					
						
							| 
									
										
										
										
											2024-10-11 15:21:56 +02:00
										 |  |  | 		Receiving:      receivingAcct, | 
					
						
							|  |  |  | 		Requesting:     requestingAcct, | 
					
						
							| 
									
										
										
										
											2022-04-28 13:23:11 +01:00
										 |  |  | 	}) | 
					
						
							| 
									
										
										
										
											2021-10-10 12:39:25 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2023-01-25 11:12:27 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | /* | 
					
						
							|  |  |  | 	FLAG HANDLERS | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (f *federatingDB) activityFlag(ctx context.Context, asType vocab.Type, receivingAccount *gtsmodel.Account, requestingAccount *gtsmodel.Account) error { | 
					
						
							|  |  |  | 	flag, ok := asType.(vocab.ActivityStreamsFlag) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		return errors.New("activityFlag: could not convert type to flag") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-09-23 17:44:11 +01:00
										 |  |  | 	report, err := f.converter.ASFlagToReport(ctx, flag) | 
					
						
							| 
									
										
										
										
											2023-01-25 11:12:27 +01:00
										 |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return fmt.Errorf("activityFlag: could not convert Flag to report: %w", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-06 12:59:37 +01:00
										 |  |  | 	// Requesting account must have at | 
					
						
							|  |  |  | 	// least two domains from the right | 
					
						
							|  |  |  | 	// in common with reporting account. | 
					
						
							|  |  |  | 	if dns.CompareDomainName( | 
					
						
							|  |  |  | 		requestingAccount.Domain, | 
					
						
							|  |  |  | 		report.Account.Domain, | 
					
						
							|  |  |  | 	) < 2 { | 
					
						
							|  |  |  | 		return fmt.Errorf( | 
					
						
							|  |  |  | 			"activityFlag: requesting account %s does not share a domain with Flag Actor account %s", | 
					
						
							|  |  |  | 			requestingAccount.URI, report.Account.URI, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if report.TargetAccountID != receivingAccount.ID { | 
					
						
							|  |  |  | 		return fmt.Errorf( | 
					
						
							|  |  |  | 			"activityFlag: inbox account %s is not Flag object account %s", | 
					
						
							|  |  |  | 			receivingAccount.URI, report.TargetAccount.URI, | 
					
						
							|  |  |  | 		) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	report.ID = id.NewULID() | 
					
						
							| 
									
										
										
										
											2023-01-25 11:12:27 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	if err := f.state.DB.PutReport(ctx, report); err != nil { | 
					
						
							| 
									
										
										
										
											2023-01-25 11:12:27 +01:00
										 |  |  | 		return fmt.Errorf("activityFlag: database error inserting report: %w", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-26 13:50:46 +01:00
										 |  |  | 	f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ | 
					
						
							|  |  |  | 		APObjectType:   ap.ActivityFlag, | 
					
						
							|  |  |  | 		APActivityType: ap.ActivityCreate, | 
					
						
							|  |  |  | 		GTSModel:       report, | 
					
						
							|  |  |  | 		Receiving:      receivingAccount, | 
					
						
							|  |  |  | 		Requesting:     requestingAccount, | 
					
						
							| 
									
										
										
										
											2023-01-25 11:12:27 +01:00
										 |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } |