| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | /* | 
					
						
							|  |  |  |    GoToSocial | 
					
						
							|  |  |  |    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  |    it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  |    the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  |    (at your option) any later version. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  |    GNU Affero General Public License for more details. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  |    along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package federation | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"errors" | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"net/url" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/go-fed/activity/pub" | 
					
						
							| 
									
										
										
										
											2021-05-29 19:36:54 +02:00
										 |  |  | 	"github.com/go-fed/activity/streams" | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	"github.com/go-fed/activity/streams/vocab" | 
					
						
							| 
									
										
										
										
											2021-04-01 20:46:45 +02:00
										 |  |  | 	"github.com/sirupsen/logrus" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							| 
									
										
										
										
											2021-06-13 18:42:28 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/id" | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/util" | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | /* | 
					
						
							|  |  |  | 	GO FED FEDERATING PROTOCOL INTERFACE | 
					
						
							|  |  |  | 	FederatingProtocol contains behaviors an application needs to satisfy for the | 
					
						
							|  |  |  | 	full ActivityPub S2S implementation to be supported by this library. | 
					
						
							|  |  |  | 	It is only required if the client application wants to support the server-to- | 
					
						
							|  |  |  | 	server, or federating, protocol. | 
					
						
							|  |  |  | 	It is passed to the library as a dependency injection from the client | 
					
						
							|  |  |  | 	application. | 
					
						
							|  |  |  | */ | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // PostInboxRequestBodyHook callback after parsing the request body for a federated request | 
					
						
							|  |  |  | // to the Actor's inbox. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Can be used to set contextual information based on the Activity | 
					
						
							|  |  |  | // received. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Only called if the Federated Protocol is enabled. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Warning: Neither authentication nor authorization has taken place at | 
					
						
							|  |  |  | // this time. Doing anything beyond setting contextual information is | 
					
						
							|  |  |  | // strongly discouraged. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If an error is returned, it is passed back to the caller of | 
					
						
							|  |  |  | // PostInbox. In this case, the DelegateActor implementation must not | 
					
						
							|  |  |  | // write a response to the ResponseWriter as is expected that the caller | 
					
						
							|  |  |  | // to PostInbox will do so when handling the error. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) PostInboxRequestBodyHook(ctx context.Context, r *http.Request, activity pub.Activity) (context.Context, error) { | 
					
						
							|  |  |  | 	l := f.log.WithFields(logrus.Fields{ | 
					
						
							|  |  |  | 		"func":      "PostInboxRequestBodyHook", | 
					
						
							|  |  |  | 		"useragent": r.UserAgent(), | 
					
						
							|  |  |  | 		"url":       r.URL.String(), | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if activity == nil { | 
					
						
							|  |  |  | 		err := errors.New("nil activity in PostInboxRequestBodyHook") | 
					
						
							|  |  |  | 		l.Debug(err) | 
					
						
							|  |  |  | 		return nil, err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	// set the activity on the context for use later on | 
					
						
							|  |  |  | 	return context.WithValue(ctx, util.APActivity, activity), nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // AuthenticatePostInbox delegates the authentication of a POST to an | 
					
						
							|  |  |  | // inbox. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If an error is returned, it is passed back to the caller of | 
					
						
							|  |  |  | // PostInbox. In this case, the implementation must not write a | 
					
						
							|  |  |  | // response to the ResponseWriter as is expected that the client will | 
					
						
							|  |  |  | // do so when handling the error. The 'authenticated' is ignored. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If no error is returned, but authentication or authorization fails, | 
					
						
							|  |  |  | // then authenticated must be false and error nil. It is expected that | 
					
						
							|  |  |  | // the implementation handles writing to the ResponseWriter in this | 
					
						
							|  |  |  | // case. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Finally, if the authentication and authorization succeeds, then | 
					
						
							|  |  |  | // authenticated must be true and error nil. The request will continue | 
					
						
							|  |  |  | // to be processed. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) AuthenticatePostInbox(ctx context.Context, w http.ResponseWriter, r *http.Request) (context.Context, bool, error) { | 
					
						
							|  |  |  | 	l := f.log.WithFields(logrus.Fields{ | 
					
						
							|  |  |  | 		"func":      "AuthenticatePostInbox", | 
					
						
							|  |  |  | 		"useragent": r.UserAgent(), | 
					
						
							|  |  |  | 		"url":       r.URL.String(), | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	l.Trace("received request to authenticate") | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	if !util.IsInboxPath(r.URL) { | 
					
						
							|  |  |  | 		return nil, false, fmt.Errorf("path %s was not an inbox path", r.URL.String()) | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	username, err := util.ParseInboxPath(r.URL) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		return nil, false, fmt.Errorf("could not parse path %s: %s", r.URL.String(), err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if username == "" { | 
					
						
							|  |  |  | 		return nil, false, errors.New("username was empty") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	requestedAccount := >smodel.Account{} | 
					
						
							|  |  |  | 	if err := f.db.GetLocalAccountByUsername(username, requestedAccount); err != nil { | 
					
						
							|  |  |  | 		return nil, false, fmt.Errorf("could not fetch requested account with username %s: %s", username, err) | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	publicKeyOwnerURI, err := f.AuthenticateFederatedRequest(requestedAccount.Username, r) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		l.Debugf("request not authenticated: %s", err) | 
					
						
							|  |  |  | 		return ctx, false, fmt.Errorf("not authenticated: %s", err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-06-27 16:52:18 +02:00
										 |  |  | 	// authentication has passed, so add an instance entry for this instance if it hasn't been done already | 
					
						
							|  |  |  | 	i := >smodel.Instance{} | 
					
						
							|  |  |  | 	if err := f.db.GetWhere([]db.Where{{Key: "domain", Value: publicKeyOwnerURI.Host, CaseInsensitive: true}}, i); err != nil { | 
					
						
							|  |  |  | 		if _, ok := err.(db.ErrNoEntries); !ok { | 
					
						
							|  |  |  | 			// there's been an actual error | 
					
						
							|  |  |  | 			return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// we don't have an entry for this instance yet so dereference it | 
					
						
							|  |  |  | 		i, err = f.DereferenceRemoteInstance(username, &url.URL{ | 
					
						
							|  |  |  | 			Scheme: publicKeyOwnerURI.Scheme, | 
					
						
							|  |  |  | 			Host:   publicKeyOwnerURI.Host, | 
					
						
							|  |  |  | 		}) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return nil, false, fmt.Errorf("could not dereference new remote instance %s during AuthenticatePostInbox: %s", publicKeyOwnerURI.Host, err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// and put it in the db | 
					
						
							|  |  |  | 		if err := f.db.Put(i); err != nil { | 
					
						
							|  |  |  | 			return nil, false, fmt.Errorf("error inserting newly dereferenced instance %s: %s", publicKeyOwnerURI.Host, err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	requestingAccount := >smodel.Account{} | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: publicKeyOwnerURI.String()}}, requestingAccount); err != nil { | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 		// there's been a proper error so return it | 
					
						
							|  |  |  | 		if _, ok := err.(db.ErrNoEntries); !ok { | 
					
						
							|  |  |  | 			return ctx, false, fmt.Errorf("error getting requesting account with public key id %s: %s", publicKeyOwnerURI.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// we don't know this account (yet) so let's dereference it right now | 
					
						
							|  |  |  | 		person, err := f.DereferenceRemoteAccount(requestedAccount.Username, publicKeyOwnerURI) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return ctx, false, fmt.Errorf("error dereferencing account with public key id %s: %s", publicKeyOwnerURI.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-23 18:07:04 +02:00
										 |  |  | 		a, err := f.typeConverter.ASRepresentationToAccount(person, false) | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return ctx, false, fmt.Errorf("error converting person with public key id %s to account: %s", publicKeyOwnerURI.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-06-13 18:42:28 +02:00
										 |  |  | 		aID, err := id.NewRandomULID() | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return ctx, false, err | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		a.ID = aID | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 		if err := f.db.Put(a); err != nil { | 
					
						
							|  |  |  | 			l.Errorf("error inserting dereferenced remote account: %s", err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 		requestingAccount = a | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		// send the newly dereferenced account into the processor channel for further async processing | 
					
						
							|  |  |  | 		fromFederatorChanI := ctx.Value(util.APFromFederatorChanKey) | 
					
						
							|  |  |  | 		if fromFederatorChanI == nil { | 
					
						
							|  |  |  | 			l.Error("from federator channel wasn't set on context") | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		fromFederatorChan, ok := fromFederatorChanI.(chan gtsmodel.FromFederator) | 
					
						
							|  |  |  | 		if !ok { | 
					
						
							|  |  |  | 			l.Error("from federator channel was set on context but couldn't be parsed") | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		fromFederatorChan <- gtsmodel.FromFederator{ | 
					
						
							|  |  |  | 			APObjectType:   gtsmodel.ActivityStreamsProfile, | 
					
						
							|  |  |  | 			APActivityType: gtsmodel.ActivityStreamsCreate, | 
					
						
							|  |  |  | 			GTSModel:       requestingAccount, | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	withRequester := context.WithValue(ctx, util.APRequestingAccount, requestingAccount) | 
					
						
							|  |  |  | 	withRequested := context.WithValue(withRequester, util.APAccount, requestedAccount) | 
					
						
							|  |  |  | 	return withRequested, true, nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // Blocked should determine whether to permit a set of actors given by | 
					
						
							|  |  |  | // their ids are able to interact with this particular end user due to | 
					
						
							|  |  |  | // being blocked or other application-specific logic. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If an error is returned, it is passed back to the caller of | 
					
						
							|  |  |  | // PostInbox. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // If no error is returned, but authentication or authorization fails, | 
					
						
							|  |  |  | // then blocked must be true and error nil. An http.StatusForbidden | 
					
						
							|  |  |  | // will be written in the wresponse. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Finally, if the authentication and authorization succeeds, then | 
					
						
							|  |  |  | // blocked must be false and error nil. The request will continue | 
					
						
							|  |  |  | // to be processed. | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | // | 
					
						
							|  |  |  | // TODO: implement domain block checking here as well | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) Blocked(ctx context.Context, actorIRIs []*url.URL) (bool, error) { | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	l := f.log.WithFields(logrus.Fields{ | 
					
						
							|  |  |  | 		"func": "Blocked", | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	l.Debugf("entering BLOCKED function with IRI list: %+v", actorIRIs) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	requestedAccountI := ctx.Value(util.APAccount) | 
					
						
							|  |  |  | 	requestedAccount, ok := requestedAccountI.(*gtsmodel.Account) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		f.log.Errorf("requested account not set on request context") | 
					
						
							|  |  |  | 		return false, errors.New("requested account not set on request context, so couldn't determine blocks") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for _, uri := range actorIRIs { | 
					
						
							|  |  |  | 		a := >smodel.Account{} | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 		if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: uri.String()}}, a); err != nil { | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 			_, ok := err.(db.ErrNoEntries) | 
					
						
							|  |  |  | 			if ok { | 
					
						
							|  |  |  | 				// we don't have an entry for this account so it's not blocked | 
					
						
							|  |  |  | 				// TODO: allow a different default to be set for this behavior | 
					
						
							|  |  |  | 				continue | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 			return false, fmt.Errorf("error getting account with uri %s: %s", uri.String(), err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		blocked, err := f.db.Blocked(requestedAccount.ID, a.ID) | 
					
						
							|  |  |  | 		if err != nil { | 
					
						
							|  |  |  | 			return false, fmt.Errorf("error checking account blocks: %s", err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		if blocked { | 
					
						
							|  |  |  | 			return true, nil | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	return false, nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // FederatingCallbacks returns the application logic that handles | 
					
						
							|  |  |  | // ActivityStreams received from federating peers. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Note that certain types of callbacks will be 'wrapped' with default | 
					
						
							|  |  |  | // behaviors supported natively by the library. Other callbacks | 
					
						
							|  |  |  | // compatible with streams.TypeResolver can be specified by 'other'. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // For example, setting the 'Create' field in the | 
					
						
							|  |  |  | // FederatingWrappedCallbacks lets an application dependency inject | 
					
						
							|  |  |  | // additional behaviors they want to take place, including the default | 
					
						
							|  |  |  | // behavior supplied by this library. This is guaranteed to be compliant | 
					
						
							|  |  |  | // with the ActivityPub Social protocol. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // To override the default behavior, instead supply the function in | 
					
						
							|  |  |  | // 'other', which does not guarantee the application will be compliant | 
					
						
							|  |  |  | // with the ActivityPub Social Protocol. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Applications are not expected to handle every single ActivityStreams | 
					
						
							|  |  |  | // type and extension. The unhandled ones are passed to DefaultCallback. | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | func (f *federator) FederatingCallbacks(ctx context.Context) (wrapped pub.FederatingWrappedCallbacks, other []interface{}, err error) { | 
					
						
							|  |  |  | 	wrapped = pub.FederatingWrappedCallbacks{ | 
					
						
							|  |  |  | 		// OnFollow determines what action to take for this particular callback | 
					
						
							|  |  |  | 		// if a Follow Activity is handled. | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 		// | 
					
						
							|  |  |  | 		// For our implementation, we always want to do nothing because we have internal logic for handling follows. | 
					
						
							|  |  |  | 		OnFollow: pub.OnFollowDoNothing, | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	other = []interface{}{ | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 		// override default undo behavior and trigger our own side effects | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 		func(ctx context.Context, undo vocab.ActivityStreamsUndo) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Undo(ctx, undo) | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2021-05-27 16:06:24 +02:00
										 |  |  | 		// override default accept behavior and trigger our own side effects | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 		func(ctx context.Context, accept vocab.ActivityStreamsAccept) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Accept(ctx, accept) | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2021-05-28 19:57:04 +02:00
										 |  |  | 		// override default announce behavior and trigger our own side effects | 
					
						
							|  |  |  | 		func(ctx context.Context, announce vocab.ActivityStreamsAnnounce) error { | 
					
						
							|  |  |  | 			return f.FederatingDB().Announce(ctx, announce) | 
					
						
							|  |  |  | 		}, | 
					
						
							| 
									
										
										
										
											2021-05-21 15:48:26 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	return | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // DefaultCallback is called for types that go-fed can deserialize but | 
					
						
							|  |  |  | // are not handled by the application's callbacks returned in the | 
					
						
							|  |  |  | // Callbacks method. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Applications are not expected to handle every single ActivityStreams | 
					
						
							|  |  |  | // type and extension, so the unhandled ones are passed to | 
					
						
							|  |  |  | // DefaultCallback. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) DefaultCallback(ctx context.Context, activity pub.Activity) error { | 
					
						
							|  |  |  | 	l := f.log.WithFields(logrus.Fields{ | 
					
						
							|  |  |  | 		"func":   "DefaultCallback", | 
					
						
							|  |  |  | 		"aptype": activity.GetTypeName(), | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	l.Debugf("received unhandle-able activity type so ignoring it") | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // MaxInboxForwardingRecursionDepth determines how deep to search within | 
					
						
							|  |  |  | // an activity to determine if inbox forwarding needs to occur. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Zero or negative numbers indicate infinite recursion. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) MaxInboxForwardingRecursionDepth(ctx context.Context) int { | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	// TODO | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	return 4 | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // MaxDeliveryRecursionDepth determines how deep to search within | 
					
						
							|  |  |  | // collections owned by peers when they are targeted to receive a | 
					
						
							|  |  |  | // delivery. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Zero or negative numbers indicate infinite recursion. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) MaxDeliveryRecursionDepth(ctx context.Context) int { | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	// TODO | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	return 4 | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // FilterForwarding allows the implementation to apply business logic | 
					
						
							|  |  |  | // such as blocks, spam filtering, and so on to a list of potential | 
					
						
							|  |  |  | // Collections and OrderedCollections of recipients when inbox | 
					
						
							|  |  |  | // forwarding has been triggered. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // The activity is provided as a reference for more intelligent | 
					
						
							|  |  |  | // logic to be used, but the implementation must not modify it. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) FilterForwarding(ctx context.Context, potentialRecipients []*url.URL, a pub.Activity) ([]*url.URL, error) { | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | 	// TODO | 
					
						
							| 
									
										
										
										
											2021-05-29 19:36:54 +02:00
										 |  |  | 	return []*url.URL{}, nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-20 18:14:23 +02:00
										 |  |  | // GetInbox returns the OrderedCollection inbox of the actor for this | 
					
						
							|  |  |  | // context. It is up to the implementation to provide the correct | 
					
						
							|  |  |  | // collection for the kind of authorization given in the request. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // AuthenticateGetInbox will be called prior to this. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // Always called, regardless whether the Federated Protocol or Social | 
					
						
							|  |  |  | // API is enabled. | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | func (f *federator) GetInbox(ctx context.Context, r *http.Request) (vocab.ActivityStreamsOrderedCollectionPage, error) { | 
					
						
							| 
									
										
										
										
											2021-05-15 11:58:11 +02:00
										 |  |  | 	// IMPLEMENTATION NOTE: For GoToSocial, we serve GETS to outboxes and inboxes through | 
					
						
							| 
									
										
										
										
											2021-05-08 14:25:55 +02:00
										 |  |  | 	// the CLIENT API, not through the federation API, so we just do nothing here. | 
					
						
							| 
									
										
										
										
											2021-05-29 19:36:54 +02:00
										 |  |  | 	return streams.NewActivityStreamsOrderedCollectionPage(), nil | 
					
						
							| 
									
										
										
										
											2021-03-07 13:05:33 +01:00
										 |  |  | } |