mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-03 19:22:24 -06:00 
			
		
		
		
	
		
			
	
	
		
			388 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
		
		
			
		
	
	
			388 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| 
								 | 
							
								// GoToSocial
							 | 
						||
| 
								 | 
							
								// Copyright (C) GoToSocial Authors admin@gotosocial.org
							 | 
						||
| 
								 | 
							
								// SPDX-License-Identifier: AGPL-3.0-or-later
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								// This program is free software: you can redistribute it and/or modify
							 | 
						||
| 
								 | 
							
								// it under the terms of the GNU Affero General Public License as published by
							 | 
						||
| 
								 | 
							
								// the Free Software Foundation, either version 3 of the License, or
							 | 
						||
| 
								 | 
							
								// (at your option) any later version.
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								// This program is distributed in the hope that it will be useful,
							 | 
						||
| 
								 | 
							
								// but WITHOUT ANY WARRANTY; without even the implied warranty of
							 | 
						||
| 
								 | 
							
								// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
							 | 
						||
| 
								 | 
							
								// GNU Affero General Public License for more details.
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								// You should have received a copy of the GNU Affero General Public License
							 | 
						||
| 
								 | 
							
								// along with this program.  If not, see <http://www.gnu.org/licenses/>.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								package admin
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								import (
							 | 
						||
| 
								 | 
							
									"context"
							 | 
						||
| 
								 | 
							
									"errors"
							 | 
						||
| 
								 | 
							
									"time"
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									"codeberg.org/gruf/go-kv"
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/ap"
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/config"
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/db"
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/gtserror"
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/log"
							 | 
						||
| 
								 | 
							
									"github.com/superseriousbusiness/gotosocial/internal/messages"
							 | 
						||
| 
								 | 
							
								)
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// Returns an AdminActionF for
							 | 
						||
| 
								 | 
							
								// domain allow side effects.
							 | 
						||
| 
								 | 
							
								func (a *Actions) DomainAllowF(
							 | 
						||
| 
								 | 
							
									actionID string,
							 | 
						||
| 
								 | 
							
									domainAllow *gtsmodel.DomainAllow,
							 | 
						||
| 
								 | 
							
								) ActionF {
							 | 
						||
| 
								 | 
							
									return func(ctx context.Context) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
										l := log.
							 | 
						||
| 
								 | 
							
											WithContext(ctx).
							 | 
						||
| 
								 | 
							
											WithFields(kv.Fields{
							 | 
						||
| 
								 | 
							
												{"action", "allow"},
							 | 
						||
| 
								 | 
							
												{"actionID", actionID},
							 | 
						||
| 
								 | 
							
												{"domain", domainAllow.Domain},
							 | 
						||
| 
								 | 
							
											}...)
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										// Log start + finish.
							 | 
						||
| 
								 | 
							
										l.Info("processing side effects")
							 | 
						||
| 
								 | 
							
										errs := a.domainAllowSideEffects(ctx, domainAllow)
							 | 
						||
| 
								 | 
							
										l.Info("finished processing side effects")
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								func (a *Actions) domainAllowSideEffects(
							 | 
						||
| 
								 | 
							
									ctx context.Context,
							 | 
						||
| 
								 | 
							
									allow *gtsmodel.DomainAllow,
							 | 
						||
| 
								 | 
							
								) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
									if config.GetInstanceFederationMode() == config.InstanceFederationModeAllowlist {
							 | 
						||
| 
								 | 
							
										// We're running in allowlist mode,
							 | 
						||
| 
								 | 
							
										// so there are no side effects to
							 | 
						||
| 
								 | 
							
										// process here.
							 | 
						||
| 
								 | 
							
										return nil
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// We're running in blocklist mode or
							 | 
						||
| 
								 | 
							
									// some similar mode which necessitates
							 | 
						||
| 
								 | 
							
									// domain allow side effects if a block
							 | 
						||
| 
								 | 
							
									// was in place when the allow was created.
							 | 
						||
| 
								 | 
							
									//
							 | 
						||
| 
								 | 
							
									// So, check if there's a block.
							 | 
						||
| 
								 | 
							
									block, err := a.db.GetDomainBlock(ctx, allow.Domain)
							 | 
						||
| 
								 | 
							
									if err != nil && !errors.Is(err, db.ErrNoEntries) {
							 | 
						||
| 
								 | 
							
										errs := gtserror.NewMultiError(1)
							 | 
						||
| 
								 | 
							
										errs.Appendf("db error getting domain block %s: %w", allow.Domain, err)
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									if block == nil {
							 | 
						||
| 
								 | 
							
										// No block?
							 | 
						||
| 
								 | 
							
										// No problem!
							 | 
						||
| 
								 | 
							
										return nil
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// There was a block, over which the new
							 | 
						||
| 
								 | 
							
									// allow ought to take precedence. To account
							 | 
						||
| 
								 | 
							
									// for this, just run side effects as though
							 | 
						||
| 
								 | 
							
									// the domain was being unblocked, while
							 | 
						||
| 
								 | 
							
									// leaving the existing block in place.
							 | 
						||
| 
								 | 
							
									//
							 | 
						||
| 
								 | 
							
									// Any accounts that were suspended by
							 | 
						||
| 
								 | 
							
									// the block will be unsuspended and be
							 | 
						||
| 
								 | 
							
									// able to interact with the instance again.
							 | 
						||
| 
								 | 
							
									return a.domainUnblockSideEffects(ctx, block)
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// Returns an AdminActionF for
							 | 
						||
| 
								 | 
							
								// domain unallow side effects.
							 | 
						||
| 
								 | 
							
								func (a *Actions) DomainUnallowF(
							 | 
						||
| 
								 | 
							
									actionID string,
							 | 
						||
| 
								 | 
							
									domainAllow *gtsmodel.DomainAllow,
							 | 
						||
| 
								 | 
							
								) ActionF {
							 | 
						||
| 
								 | 
							
									return func(ctx context.Context) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
										l := log.
							 | 
						||
| 
								 | 
							
											WithContext(ctx).
							 | 
						||
| 
								 | 
							
											WithFields(kv.Fields{
							 | 
						||
| 
								 | 
							
												{"action", "unallow"},
							 | 
						||
| 
								 | 
							
												{"actionID", actionID},
							 | 
						||
| 
								 | 
							
												{"domain", domainAllow.Domain},
							 | 
						||
| 
								 | 
							
											}...)
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										// Log start + finish.
							 | 
						||
| 
								 | 
							
										l.Info("processing side effects")
							 | 
						||
| 
								 | 
							
										errs := a.domainUnallowSideEffects(ctx, domainAllow)
							 | 
						||
| 
								 | 
							
										l.Info("finished processing side effects")
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								func (a *Actions) domainUnallowSideEffects(
							 | 
						||
| 
								 | 
							
									ctx context.Context,
							 | 
						||
| 
								 | 
							
									allow *gtsmodel.DomainAllow,
							 | 
						||
| 
								 | 
							
								) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
									if config.GetInstanceFederationMode() == config.InstanceFederationModeAllowlist {
							 | 
						||
| 
								 | 
							
										// We're running in allowlist mode,
							 | 
						||
| 
								 | 
							
										// so there are no side effects to
							 | 
						||
| 
								 | 
							
										// process here.
							 | 
						||
| 
								 | 
							
										return nil
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// We're running in blocklist mode or
							 | 
						||
| 
								 | 
							
									// some similar mode which necessitates
							 | 
						||
| 
								 | 
							
									// domain allow side effects if a block
							 | 
						||
| 
								 | 
							
									// was in place when the allow was removed.
							 | 
						||
| 
								 | 
							
									//
							 | 
						||
| 
								 | 
							
									// So, check if there's a block.
							 | 
						||
| 
								 | 
							
									block, err := a.db.GetDomainBlock(ctx, allow.Domain)
							 | 
						||
| 
								 | 
							
									if err != nil && !errors.Is(err, db.ErrNoEntries) {
							 | 
						||
| 
								 | 
							
										errs := gtserror.NewMultiError(1)
							 | 
						||
| 
								 | 
							
										errs.Appendf("db error getting domain block %s: %w", allow.Domain, err)
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									if block == nil {
							 | 
						||
| 
								 | 
							
										// No block?
							 | 
						||
| 
								 | 
							
										// No problem!
							 | 
						||
| 
								 | 
							
										return nil
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// There was a block, over which the previous
							 | 
						||
| 
								 | 
							
									// allow was taking precedence. Now that the
							 | 
						||
| 
								 | 
							
									// allow has been removed, we should put the
							 | 
						||
| 
								 | 
							
									// side effects of the block back in place.
							 | 
						||
| 
								 | 
							
									//
							 | 
						||
| 
								 | 
							
									// To do this, process the block side effects
							 | 
						||
| 
								 | 
							
									// again as though the block were freshly
							 | 
						||
| 
								 | 
							
									// created. This will mark all accounts from
							 | 
						||
| 
								 | 
							
									// the blocked domain as suspended, and clean
							 | 
						||
| 
								 | 
							
									// up their follows/following, media, etc.
							 | 
						||
| 
								 | 
							
									return a.domainBlockSideEffects(ctx, block)
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								func (a *Actions) DomainBlockF(
							 | 
						||
| 
								 | 
							
									actionID string,
							 | 
						||
| 
								 | 
							
									domainBlock *gtsmodel.DomainBlock,
							 | 
						||
| 
								 | 
							
								) ActionF {
							 | 
						||
| 
								 | 
							
									return func(ctx context.Context) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
										l := log.
							 | 
						||
| 
								 | 
							
											WithContext(ctx).
							 | 
						||
| 
								 | 
							
											WithFields(kv.Fields{
							 | 
						||
| 
								 | 
							
												{"action", "block"},
							 | 
						||
| 
								 | 
							
												{"actionID", actionID},
							 | 
						||
| 
								 | 
							
												{"domain", domainBlock.Domain},
							 | 
						||
| 
								 | 
							
											}...)
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										skip, err := a.skipBlockSideEffects(ctx, domainBlock.Domain)
							 | 
						||
| 
								 | 
							
										if err != nil {
							 | 
						||
| 
								 | 
							
											return err
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										if skip != "" {
							 | 
						||
| 
								 | 
							
											l.Infof("skipping side effects: %s", skip)
							 | 
						||
| 
								 | 
							
											return nil
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										l.Info("processing side effects")
							 | 
						||
| 
								 | 
							
										errs := a.domainBlockSideEffects(ctx, domainBlock)
							 | 
						||
| 
								 | 
							
										l.Info("finished processing side effects")
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// domainBlockSideEffects processes the side effects of a domain block:
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								//  1. Strip most info away from the instance entry for the domain.
							 | 
						||
| 
								 | 
							
								//  2. Pass each account from the domain to the processor for deletion.
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								// It should be called asynchronously, since it can take a while when
							 | 
						||
| 
								 | 
							
								// there are many accounts present on the given domain.
							 | 
						||
| 
								 | 
							
								func (a *Actions) domainBlockSideEffects(
							 | 
						||
| 
								 | 
							
									ctx context.Context,
							 | 
						||
| 
								 | 
							
									block *gtsmodel.DomainBlock,
							 | 
						||
| 
								 | 
							
								) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
									var errs gtserror.MultiError
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// If we have an instance entry for this domain,
							 | 
						||
| 
								 | 
							
									// update it with the new block ID and clear all fields
							 | 
						||
| 
								 | 
							
									instance, err := a.db.GetInstance(ctx, block.Domain)
							 | 
						||
| 
								 | 
							
									if err != nil && !errors.Is(err, db.ErrNoEntries) {
							 | 
						||
| 
								 | 
							
										errs.Appendf("db error getting instance %s: %w", block.Domain, err)
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									if instance != nil {
							 | 
						||
| 
								 | 
							
										// We had an entry for this domain.
							 | 
						||
| 
								 | 
							
										columns := stubbifyInstance(instance, block.ID)
							 | 
						||
| 
								 | 
							
										if err := a.db.UpdateInstance(ctx, instance, columns...); err != nil {
							 | 
						||
| 
								 | 
							
											errs.Appendf("db error updating instance: %w", err)
							 | 
						||
| 
								 | 
							
											return errs
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// For each account that belongs to this domain,
							 | 
						||
| 
								 | 
							
									// process an account delete message to remove
							 | 
						||
| 
								 | 
							
									// that account's posts, media, etc.
							 | 
						||
| 
								 | 
							
									if err := a.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) {
							 | 
						||
| 
								 | 
							
										if err := a.workers.Client.Process(ctx, &messages.FromClientAPI{
							 | 
						||
| 
								 | 
							
											APObjectType:   ap.ActorPerson,
							 | 
						||
| 
								 | 
							
											APActivityType: ap.ActivityDelete,
							 | 
						||
| 
								 | 
							
											GTSModel:       block,
							 | 
						||
| 
								 | 
							
											Origin:         account,
							 | 
						||
| 
								 | 
							
											Target:         account,
							 | 
						||
| 
								 | 
							
										}); err != nil {
							 | 
						||
| 
								 | 
							
											errs.Append(err)
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
									}); err != nil {
							 | 
						||
| 
								 | 
							
										errs.Appendf("db error ranging through accounts: %w", err)
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									return errs
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								func (a *Actions) DomainUnblockF(
							 | 
						||
| 
								 | 
							
									actionID string,
							 | 
						||
| 
								 | 
							
									domainBlock *gtsmodel.DomainBlock,
							 | 
						||
| 
								 | 
							
								) ActionF {
							 | 
						||
| 
								 | 
							
									return func(ctx context.Context) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
										l := log.
							 | 
						||
| 
								 | 
							
											WithContext(ctx).
							 | 
						||
| 
								 | 
							
											WithFields(kv.Fields{
							 | 
						||
| 
								 | 
							
												{"action", "unblock"},
							 | 
						||
| 
								 | 
							
												{"actionID", actionID},
							 | 
						||
| 
								 | 
							
												{"domain", domainBlock.Domain},
							 | 
						||
| 
								 | 
							
											}...)
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										l.Info("processing side effects")
							 | 
						||
| 
								 | 
							
										errs := a.domainUnblockSideEffects(ctx, domainBlock)
							 | 
						||
| 
								 | 
							
										l.Info("finished processing side effects")
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										return errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// domainUnblockSideEffects processes the side effects of undoing a
							 | 
						||
| 
								 | 
							
								// domain block:
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								//  1. Mark instance entry as no longer suspended.
							 | 
						||
| 
								 | 
							
								//  2. Mark each account from the domain as no longer suspended, if the
							 | 
						||
| 
								 | 
							
								//     suspension origin corresponds to the ID of the provided domain block.
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								// It should be called asynchronously, since it can take a while when
							 | 
						||
| 
								 | 
							
								// there are many accounts present on the given domain.
							 | 
						||
| 
								 | 
							
								func (a *Actions) domainUnblockSideEffects(
							 | 
						||
| 
								 | 
							
									ctx context.Context,
							 | 
						||
| 
								 | 
							
									block *gtsmodel.DomainBlock,
							 | 
						||
| 
								 | 
							
								) gtserror.MultiError {
							 | 
						||
| 
								 | 
							
									var errs gtserror.MultiError
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// Update instance entry for this domain, if we have it.
							 | 
						||
| 
								 | 
							
									instance, err := a.db.GetInstance(ctx, block.Domain)
							 | 
						||
| 
								 | 
							
									if err != nil && !errors.Is(err, db.ErrNoEntries) {
							 | 
						||
| 
								 | 
							
										errs.Appendf("db error getting instance %s: %w", block.Domain, err)
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									if instance != nil {
							 | 
						||
| 
								 | 
							
										// We had an entry, update it to signal
							 | 
						||
| 
								 | 
							
										// that it's no longer suspended.
							 | 
						||
| 
								 | 
							
										instance.SuspendedAt = time.Time{}
							 | 
						||
| 
								 | 
							
										instance.DomainBlockID = ""
							 | 
						||
| 
								 | 
							
										if err := a.db.UpdateInstance(
							 | 
						||
| 
								 | 
							
											ctx,
							 | 
						||
| 
								 | 
							
											instance,
							 | 
						||
| 
								 | 
							
											"suspended_at",
							 | 
						||
| 
								 | 
							
											"domain_block_id",
							 | 
						||
| 
								 | 
							
										); err != nil {
							 | 
						||
| 
								 | 
							
											errs.Appendf("db error updating instance: %w", err)
							 | 
						||
| 
								 | 
							
											return errs
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// Unsuspend all accounts whose suspension origin was this domain block.
							 | 
						||
| 
								 | 
							
									if err := a.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) {
							 | 
						||
| 
								 | 
							
										if account.SuspensionOrigin == "" || account.SuspendedAt.IsZero() {
							 | 
						||
| 
								 | 
							
											// Account wasn't suspended, nothing to do.
							 | 
						||
| 
								 | 
							
											return
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										if account.SuspensionOrigin != block.ID {
							 | 
						||
| 
								 | 
							
											// Account was suspended, but not by
							 | 
						||
| 
								 | 
							
											// this domain block, leave it alone.
							 | 
						||
| 
								 | 
							
											return
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										// Account was suspended by this domain
							 | 
						||
| 
								 | 
							
										// block, mark it as unsuspended.
							 | 
						||
| 
								 | 
							
										account.SuspendedAt = time.Time{}
							 | 
						||
| 
								 | 
							
										account.SuspensionOrigin = ""
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										if err := a.db.UpdateAccount(
							 | 
						||
| 
								 | 
							
											ctx,
							 | 
						||
| 
								 | 
							
											account,
							 | 
						||
| 
								 | 
							
											"suspended_at",
							 | 
						||
| 
								 | 
							
											"suspension_origin",
							 | 
						||
| 
								 | 
							
										); err != nil {
							 | 
						||
| 
								 | 
							
											errs.Appendf("db error updating account %s: %w", account.Username, err)
							 | 
						||
| 
								 | 
							
										}
							 | 
						||
| 
								 | 
							
									}); err != nil {
							 | 
						||
| 
								 | 
							
										errs.Appendf("db error ranging through accounts: %w", err)
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									return errs
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// skipBlockSideEffects checks if side effects of block creation
							 | 
						||
| 
								 | 
							
								// should be skipped for the given domain, taking account of
							 | 
						||
| 
								 | 
							
								// instance federation mode, and existence of any allows
							 | 
						||
| 
								 | 
							
								// which ought to "shield" this domain from being blocked.
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								// If the caller should skip, the returned string will be non-zero
							 | 
						||
| 
								 | 
							
								// and will be set to a reason why side effects should be skipped.
							 | 
						||
| 
								 | 
							
								//
							 | 
						||
| 
								 | 
							
								//   - blocklist mode + allow exists: "..." (skip)
							 | 
						||
| 
								 | 
							
								//   - blocklist mode + no allow:     ""    (don't skip)
							 | 
						||
| 
								 | 
							
								//   - allowlist mode + allow exists: ""    (don't skip)
							 | 
						||
| 
								 | 
							
								//   - allowlist mode + no allow:     ""    (don't skip)
							 | 
						||
| 
								 | 
							
								func (a *Actions) skipBlockSideEffects(
							 | 
						||
| 
								 | 
							
									ctx context.Context,
							 | 
						||
| 
								 | 
							
									domain string,
							 | 
						||
| 
								 | 
							
								) (string, gtserror.MultiError) {
							 | 
						||
| 
								 | 
							
									var (
							 | 
						||
| 
								 | 
							
										skip string // Assume "" (don't skip).
							 | 
						||
| 
								 | 
							
										errs gtserror.MultiError
							 | 
						||
| 
								 | 
							
									)
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// Never skip block side effects in allowlist mode.
							 | 
						||
| 
								 | 
							
									fediMode := config.GetInstanceFederationMode()
							 | 
						||
| 
								 | 
							
									if fediMode == config.InstanceFederationModeAllowlist {
							 | 
						||
| 
								 | 
							
										return skip, errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// We know we're in blocklist mode.
							 | 
						||
| 
								 | 
							
									//
							 | 
						||
| 
								 | 
							
									// We want to skip domain block side
							 | 
						||
| 
								 | 
							
									// effects if an allow is already
							 | 
						||
| 
								 | 
							
									// in place which overrides the block.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									// Check if an explicit allow exists for this domain.
							 | 
						||
| 
								 | 
							
									domainAllow, err := a.db.GetDomainAllow(ctx, domain)
							 | 
						||
| 
								 | 
							
									if err != nil && !errors.Is(err, db.ErrNoEntries) {
							 | 
						||
| 
								 | 
							
										errs.Appendf("error getting domain allow: %w", err)
							 | 
						||
| 
								 | 
							
										return skip, errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									if domainAllow != nil {
							 | 
						||
| 
								 | 
							
										skip = "running in blocklist mode, and an explicit allow exists for this domain"
							 | 
						||
| 
								 | 
							
										return skip, errs
							 | 
						||
| 
								 | 
							
									}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									return skip, errs
							 | 
						||
| 
								 | 
							
								}
							 |