mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 21:12:24 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			385 lines
		
	
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			385 lines
		
	
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    GoToSocial
 | |
|    Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
 | |
| 
 | |
|    This program is free software: you can redistribute it and/or modify
 | |
|    it under the terms of the GNU Affero General Public License as published by
 | |
|    the Free Software Foundation, either version 3 of the License, or
 | |
|    (at your option) any later version.
 | |
| 
 | |
|    This program is distributed in the hope that it will be useful,
 | |
|    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|    GNU Affero General Public License for more details.
 | |
| 
 | |
|    You should have received a copy of the GNU Affero General Public License
 | |
|    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| */
 | |
| 
 | |
| package processing
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/url"
 | |
| 
 | |
| 	"github.com/sirupsen/logrus"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/db"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/id"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | |
| )
 | |
| 
 | |
| // ProcessFromFederator reads the APActivityType and APObjectType of an incoming message from the federator,
 | |
| // and directs the message into the appropriate side effect handler function, or simply does nothing if there's
 | |
| // no handler function defined for the combination of Activity and Object.
 | |
| func (p *processor) ProcessFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	l := logrus.WithFields(logrus.Fields{
 | |
| 		"func":           "processFromFederator",
 | |
| 		"APActivityType": federatorMsg.APActivityType,
 | |
| 		"APObjectType":   federatorMsg.APObjectType,
 | |
| 	})
 | |
| 	l.Trace("processing message from federator")
 | |
| 
 | |
| 	switch federatorMsg.APActivityType {
 | |
| 	case ap.ActivityCreate:
 | |
| 		// CREATE SOMETHING
 | |
| 		switch federatorMsg.APObjectType {
 | |
| 		case ap.ObjectNote:
 | |
| 			// CREATE A STATUS
 | |
| 			return p.processCreateStatusFromFederator(ctx, federatorMsg)
 | |
| 		case ap.ActivityLike:
 | |
| 			// CREATE A FAVE
 | |
| 			return p.processCreateFaveFromFederator(ctx, federatorMsg)
 | |
| 		case ap.ActivityFollow:
 | |
| 			// CREATE A FOLLOW REQUEST
 | |
| 			return p.processCreateFollowRequestFromFederator(ctx, federatorMsg)
 | |
| 		case ap.ActivityAnnounce:
 | |
| 			// CREATE AN ANNOUNCE
 | |
| 			return p.processCreateAnnounceFromFederator(ctx, federatorMsg)
 | |
| 		case ap.ActivityBlock:
 | |
| 			// CREATE A BLOCK
 | |
| 			return p.processCreateBlockFromFederator(ctx, federatorMsg)
 | |
| 		}
 | |
| 	case ap.ActivityUpdate:
 | |
| 		// UPDATE SOMETHING
 | |
| 		if federatorMsg.APObjectType == ap.ObjectProfile {
 | |
| 			// UPDATE AN ACCOUNT
 | |
| 			return p.processUpdateAccountFromFederator(ctx, federatorMsg)
 | |
| 		}
 | |
| 	case ap.ActivityDelete:
 | |
| 		// DELETE SOMETHING
 | |
| 		switch federatorMsg.APObjectType {
 | |
| 		case ap.ObjectNote:
 | |
| 			// DELETE A STATUS
 | |
| 			return p.processDeleteStatusFromFederator(ctx, federatorMsg)
 | |
| 		case ap.ObjectProfile:
 | |
| 			// DELETE A PROFILE/ACCOUNT
 | |
| 			return p.processDeleteAccountFromFederator(ctx, federatorMsg)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// not a combination we can/need to process
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // processCreateStatusFromFederator handles Activity Create and Object Note
 | |
| func (p *processor) processCreateStatusFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	// check for either an IRI that we still need to dereference, OR an already dereferenced
 | |
| 	// and converted status pinned to the message.
 | |
| 	var status *gtsmodel.Status
 | |
| 
 | |
| 	if federatorMsg.GTSModel != nil {
 | |
| 		// there's a gts model already pinned to the message, it should be a status
 | |
| 		var ok bool
 | |
| 		if status, ok = federatorMsg.GTSModel.(*gtsmodel.Status); !ok {
 | |
| 			return errors.New("ProcessFromFederator: note was not parseable as *gtsmodel.Status")
 | |
| 		}
 | |
| 
 | |
| 		var err error
 | |
| 		status, err = p.federator.EnrichRemoteStatus(ctx, federatorMsg.ReceivingAccount.Username, status, true)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	} else {
 | |
| 		// no model pinned, we need to dereference based on the IRI
 | |
| 		if federatorMsg.APIri == nil {
 | |
| 			return errors.New("ProcessFromFederator: status was not pinned to federatorMsg, and neither was an IRI for us to dereference")
 | |
| 		}
 | |
| 		var err error
 | |
| 		status, _, _, err = p.federator.GetRemoteStatus(ctx, federatorMsg.ReceivingAccount.Username, federatorMsg.APIri, false, false)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// make sure the account is pinned
 | |
| 	if status.Account == nil {
 | |
| 		a, err := p.db.GetAccountByID(ctx, status.AccountID)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		status.Account = a
 | |
| 	}
 | |
| 
 | |
| 	// do a BLOCKING get of the remote account to make sure the avi and header are cached
 | |
| 	if status.Account.Domain != "" {
 | |
| 		remoteAccountID, err := url.Parse(status.Account.URI)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		a, err := p.federator.GetRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, remoteAccountID, true, false)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		status.Account = a
 | |
| 	}
 | |
| 
 | |
| 	if err := p.timelineStatus(ctx, status); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err := p.notifyStatus(ctx, status); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // processCreateFaveFromFederator handles Activity Create and Object Like
 | |
| func (p *processor) processCreateFaveFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	incomingFave, ok := federatorMsg.GTSModel.(*gtsmodel.StatusFave)
 | |
| 	if !ok {
 | |
| 		return errors.New("like was not parseable as *gtsmodel.StatusFave")
 | |
| 	}
 | |
| 
 | |
| 	// make sure the account is pinned
 | |
| 	if incomingFave.Account == nil {
 | |
| 		a, err := p.db.GetAccountByID(ctx, incomingFave.AccountID)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		incomingFave.Account = a
 | |
| 	}
 | |
| 
 | |
| 	// do a BLOCKING get of the remote account to make sure the avi and header are cached
 | |
| 	if incomingFave.Account.Domain != "" {
 | |
| 		remoteAccountID, err := url.Parse(incomingFave.Account.URI)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		a, err := p.federator.GetRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, remoteAccountID, true, false)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		incomingFave.Account = a
 | |
| 	}
 | |
| 
 | |
| 	if err := p.notifyFave(ctx, incomingFave); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // processCreateFollowRequestFromFederator handles Activity Create and Object Follow
 | |
| func (p *processor) processCreateFollowRequestFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	followRequest, ok := federatorMsg.GTSModel.(*gtsmodel.FollowRequest)
 | |
| 	if !ok {
 | |
| 		return errors.New("incomingFollowRequest was not parseable as *gtsmodel.FollowRequest")
 | |
| 	}
 | |
| 
 | |
| 	// make sure the account is pinned
 | |
| 	if followRequest.Account == nil {
 | |
| 		a, err := p.db.GetAccountByID(ctx, followRequest.AccountID)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		followRequest.Account = a
 | |
| 	}
 | |
| 
 | |
| 	// do a BLOCKING get of the remote account to make sure the avi and header are cached
 | |
| 	if followRequest.Account.Domain != "" {
 | |
| 		remoteAccountID, err := url.Parse(followRequest.Account.URI)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		a, err := p.federator.GetRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, remoteAccountID, true, false)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		followRequest.Account = a
 | |
| 	}
 | |
| 
 | |
| 	if followRequest.TargetAccount == nil {
 | |
| 		a, err := p.db.GetAccountByID(ctx, followRequest.TargetAccountID)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		followRequest.TargetAccount = a
 | |
| 	}
 | |
| 
 | |
| 	if followRequest.TargetAccount.Locked {
 | |
| 		// if the account is locked just notify the follow request and nothing else
 | |
| 		return p.notifyFollowRequest(ctx, followRequest)
 | |
| 	}
 | |
| 
 | |
| 	// if the target account isn't locked, we should already accept the follow and notify about the new follower instead
 | |
| 	follow, err := p.db.AcceptFollowRequest(ctx, followRequest.AccountID, followRequest.TargetAccountID)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err := p.federateAcceptFollowRequest(ctx, follow); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return p.notifyFollow(ctx, follow, followRequest.TargetAccount)
 | |
| }
 | |
| 
 | |
| // processCreateAnnounceFromFederator handles Activity Create and Object Announce
 | |
| func (p *processor) processCreateAnnounceFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	incomingAnnounce, ok := federatorMsg.GTSModel.(*gtsmodel.Status)
 | |
| 	if !ok {
 | |
| 		return errors.New("announce was not parseable as *gtsmodel.Status")
 | |
| 	}
 | |
| 
 | |
| 	// make sure the account is pinned
 | |
| 	if incomingAnnounce.Account == nil {
 | |
| 		a, err := p.db.GetAccountByID(ctx, incomingAnnounce.AccountID)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		incomingAnnounce.Account = a
 | |
| 	}
 | |
| 
 | |
| 	// do a BLOCKING get of the remote account to make sure the avi and header are cached
 | |
| 	if incomingAnnounce.Account.Domain != "" {
 | |
| 		remoteAccountID, err := url.Parse(incomingAnnounce.Account.URI)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		a, err := p.federator.GetRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, remoteAccountID, true, false)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		incomingAnnounce.Account = a
 | |
| 	}
 | |
| 
 | |
| 	if err := p.federator.DereferenceAnnounce(ctx, incomingAnnounce, federatorMsg.ReceivingAccount.Username); err != nil {
 | |
| 		return fmt.Errorf("error dereferencing announce from federator: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	incomingAnnounceID, err := id.NewULIDFromTime(incomingAnnounce.CreatedAt)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	incomingAnnounce.ID = incomingAnnounceID
 | |
| 
 | |
| 	if err := p.db.PutStatus(ctx, incomingAnnounce); err != nil {
 | |
| 		return fmt.Errorf("error adding dereferenced announce to the db: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	if err := p.timelineStatus(ctx, incomingAnnounce); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if err := p.notifyAnnounce(ctx, incomingAnnounce); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // processCreateBlockFromFederator handles Activity Create and Object Block
 | |
| func (p *processor) processCreateBlockFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	block, ok := federatorMsg.GTSModel.(*gtsmodel.Block)
 | |
| 	if !ok {
 | |
| 		return errors.New("block was not parseable as *gtsmodel.Block")
 | |
| 	}
 | |
| 
 | |
| 	// remove any of the blocking account's statuses from the blocked account's timeline, and vice versa
 | |
| 	if err := p.statusTimelines.WipeItemsFromAccountID(ctx, block.AccountID, block.TargetAccountID); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	if err := p.statusTimelines.WipeItemsFromAccountID(ctx, block.TargetAccountID, block.AccountID); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 	// TODO: same with notifications
 | |
| 	// TODO: same with bookmarks
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // processUpdateAccountFromFederator handles Activity Update and Object Profile
 | |
| func (p *processor) processUpdateAccountFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	incomingAccount, ok := federatorMsg.GTSModel.(*gtsmodel.Account)
 | |
| 	if !ok {
 | |
| 		return errors.New("profile was not parseable as *gtsmodel.Account")
 | |
| 	}
 | |
| 
 | |
| 	incomingAccountURL, err := url.Parse(incomingAccount.URI)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	if _, err := p.federator.GetRemoteAccount(ctx, federatorMsg.ReceivingAccount.Username, incomingAccountURL, false, true); err != nil {
 | |
| 		return fmt.Errorf("error enriching updated account from federator: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // processDeleteStatusFromFederator handles Activity Delete and Object Note
 | |
| func (p *processor) processDeleteStatusFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	// TODO: handle side effects of status deletion here:
 | |
| 	// 1. delete all media associated with status
 | |
| 	// 2. delete boosts of status
 | |
| 	// 3. etc etc etc
 | |
| 	statusToDelete, ok := federatorMsg.GTSModel.(*gtsmodel.Status)
 | |
| 	if !ok {
 | |
| 		return errors.New("note was not parseable as *gtsmodel.Status")
 | |
| 	}
 | |
| 
 | |
| 	// delete all attachments for this status
 | |
| 	for _, a := range statusToDelete.AttachmentIDs {
 | |
| 		if err := p.mediaProcessor.Delete(ctx, a); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// delete all mentions for this status
 | |
| 	for _, m := range statusToDelete.MentionIDs {
 | |
| 		if err := p.db.DeleteByID(ctx, m, >smodel.Mention{}); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// delete all notifications for this status
 | |
| 	if err := p.db.DeleteWhere(ctx, []db.Where{{Key: "status_id", Value: statusToDelete.ID}}, &[]*gtsmodel.Notification{}); err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// remove this status from any and all timelines
 | |
| 	return p.deleteStatusFromTimelines(ctx, statusToDelete)
 | |
| }
 | |
| 
 | |
| // processDeleteAccountFromFederator handles Activity Delete and Object Profile
 | |
| func (p *processor) processDeleteAccountFromFederator(ctx context.Context, federatorMsg messages.FromFederator) error {
 | |
| 	account, ok := federatorMsg.GTSModel.(*gtsmodel.Account)
 | |
| 	if !ok {
 | |
| 		return errors.New("account delete was not parseable as *gtsmodel.Account")
 | |
| 	}
 | |
| 
 | |
| 	return p.accountProcessor.Delete(ctx, account, account.ID)
 | |
| }
 |