mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-03 18:32:25 -06:00 
			
		
		
		
	
		
			
				
	
	
		
			270 lines
		
	
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			270 lines
		
	
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
   GoToSocial
 | 
						|
   Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
 | 
						|
 | 
						|
   This program is free software: you can redistribute it and/or modify
 | 
						|
   it under the terms of the GNU Affero General Public License as published by
 | 
						|
   the Free Software Foundation, either version 3 of the License, or
 | 
						|
   (at your option) any later version.
 | 
						|
 | 
						|
   This program is distributed in the hope that it will be useful,
 | 
						|
   but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
   GNU Affero General Public License for more details.
 | 
						|
 | 
						|
   You should have received a copy of the GNU Affero General Public License
 | 
						|
   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
*/
 | 
						|
 | 
						|
package dereferencing
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"net/url"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/sirupsen/logrus"
 | 
						|
	"github.com/superseriousbusiness/activity/streams"
 | 
						|
	"github.com/superseriousbusiness/activity/streams/vocab"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/id"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/transport"
 | 
						|
)
 | 
						|
 | 
						|
func instanceAccount(account *gtsmodel.Account) bool {
 | 
						|
	return strings.EqualFold(account.Username, account.Domain) ||
 | 
						|
		account.FollowersURI == "" ||
 | 
						|
		account.FollowingURI == "" ||
 | 
						|
		(account.Username == "internal.fetch" && strings.Contains(account.Note, "internal service actor"))
 | 
						|
}
 | 
						|
 | 
						|
// EnrichRemoteAccount takes an account that's already been inserted into the database in a minimal form,
 | 
						|
// and populates it with additional fields, media, etc.
 | 
						|
//
 | 
						|
// EnrichRemoteAccount is mostly useful for calling after an account has been initially created by
 | 
						|
// the federatingDB's Create function, or during the federated authorization flow.
 | 
						|
func (d *deref) EnrichRemoteAccount(ctx context.Context, username string, account *gtsmodel.Account) (*gtsmodel.Account, error) {
 | 
						|
	// if we're dealing with an instance account, we don't need to update anything
 | 
						|
	if instanceAccount(account) {
 | 
						|
		return account, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if err := d.PopulateAccountFields(ctx, account, username, false); err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	updated, err := d.db.UpdateAccount(ctx, account)
 | 
						|
	if err != nil {
 | 
						|
		logrus.Errorf("EnrichRemoteAccount: error updating account: %s", err)
 | 
						|
		return account, nil
 | 
						|
	}
 | 
						|
 | 
						|
	return updated, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetRemoteAccount completely dereferences a remote account, converts it to a GtS model account,
 | 
						|
// puts it in the database, and returns it to a caller. The boolean indicates whether the account is new
 | 
						|
// to us or not. If we haven't seen the account before, bool will be true. If we have seen the account before,
 | 
						|
// it will be false.
 | 
						|
//
 | 
						|
// Refresh indicates whether--if the account exists in our db already--it should be refreshed by calling
 | 
						|
// the remote instance again.
 | 
						|
//
 | 
						|
// SIDE EFFECTS: remote account will be stored in the database, or updated if it already exists (and refresh is true).
 | 
						|
func (d *deref) GetRemoteAccount(ctx context.Context, username string, remoteAccountID *url.URL, refresh bool) (*gtsmodel.Account, bool, error) {
 | 
						|
	new := true
 | 
						|
 | 
						|
	// check if we already have the account in our db
 | 
						|
	maybeAccount, err := d.db.GetAccountByURI(ctx, remoteAccountID.String())
 | 
						|
	if err == nil {
 | 
						|
		// we've seen this account before so it's not new
 | 
						|
		new = false
 | 
						|
		if !refresh {
 | 
						|
			// we're not being asked to refresh, but just in case we don't have the avatar/header cached yet....
 | 
						|
			maybeAccount, err = d.EnrichRemoteAccount(ctx, username, maybeAccount)
 | 
						|
			return maybeAccount, new, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	accountable, err := d.dereferenceAccountable(ctx, username, remoteAccountID)
 | 
						|
	if err != nil {
 | 
						|
		return nil, new, fmt.Errorf("FullyDereferenceAccount: error dereferencing accountable: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	gtsAccount, err := d.typeConverter.ASRepresentationToAccount(ctx, accountable, refresh)
 | 
						|
	if err != nil {
 | 
						|
		return nil, new, fmt.Errorf("FullyDereferenceAccount: error converting accountable to account: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if new {
 | 
						|
		// generate a new id since we haven't seen this account before, and do a put
 | 
						|
		ulid, err := id.NewRandomULID()
 | 
						|
		if err != nil {
 | 
						|
			return nil, new, fmt.Errorf("FullyDereferenceAccount: error generating new id for account: %s", err)
 | 
						|
		}
 | 
						|
		gtsAccount.ID = ulid
 | 
						|
 | 
						|
		if err := d.PopulateAccountFields(ctx, gtsAccount, username, refresh); err != nil {
 | 
						|
			return nil, new, fmt.Errorf("FullyDereferenceAccount: error populating further account fields: %s", err)
 | 
						|
		}
 | 
						|
 | 
						|
		if err := d.db.Put(ctx, gtsAccount); err != nil {
 | 
						|
			return nil, new, fmt.Errorf("FullyDereferenceAccount: error putting new account: %s", err)
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		// take the id we already have and do an update
 | 
						|
		gtsAccount.ID = maybeAccount.ID
 | 
						|
 | 
						|
		if err := d.PopulateAccountFields(ctx, gtsAccount, username, refresh); err != nil {
 | 
						|
			return nil, new, fmt.Errorf("FullyDereferenceAccount: error populating further account fields: %s", err)
 | 
						|
		}
 | 
						|
 | 
						|
		gtsAccount, err = d.db.UpdateAccount(ctx, gtsAccount)
 | 
						|
		if err != nil {
 | 
						|
			return nil, false, fmt.Errorf("EnrichRemoteAccount: error updating account: %s", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return gtsAccount, new, nil
 | 
						|
}
 | 
						|
 | 
						|
// dereferenceAccountable calls remoteAccountID with a GET request, and tries to parse whatever
 | 
						|
// it finds as something that an account model can be constructed out of.
 | 
						|
//
 | 
						|
// Will work for Person, Application, or Service models.
 | 
						|
func (d *deref) dereferenceAccountable(ctx context.Context, username string, remoteAccountID *url.URL) (ap.Accountable, error) {
 | 
						|
	d.startHandshake(username, remoteAccountID)
 | 
						|
	defer d.stopHandshake(username, remoteAccountID)
 | 
						|
 | 
						|
	if blocked, err := d.db.IsDomainBlocked(ctx, remoteAccountID.Host); blocked || err != nil {
 | 
						|
		return nil, fmt.Errorf("DereferenceAccountable: domain %s is blocked", remoteAccountID.Host)
 | 
						|
	}
 | 
						|
 | 
						|
	transport, err := d.transportController.NewTransportForUsername(ctx, username)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("DereferenceAccountable: transport err: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	b, err := transport.Dereference(ctx, remoteAccountID)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("DereferenceAccountable: error deferencing %s: %s", remoteAccountID.String(), err)
 | 
						|
	}
 | 
						|
 | 
						|
	m := make(map[string]interface{})
 | 
						|
	if err := json.Unmarshal(b, &m); err != nil {
 | 
						|
		return nil, fmt.Errorf("DereferenceAccountable: error unmarshalling bytes into json: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t, err := streams.ToType(ctx, m)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("DereferenceAccountable: error resolving json into ap vocab type: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	switch t.GetTypeName() {
 | 
						|
	case ap.ActorApplication:
 | 
						|
		p, ok := t.(vocab.ActivityStreamsApplication)
 | 
						|
		if !ok {
 | 
						|
			return nil, errors.New("DereferenceAccountable: error resolving type as activitystreams application")
 | 
						|
		}
 | 
						|
		return p, nil
 | 
						|
	case ap.ActorGroup:
 | 
						|
		p, ok := t.(vocab.ActivityStreamsGroup)
 | 
						|
		if !ok {
 | 
						|
			return nil, errors.New("DereferenceAccountable: error resolving type as activitystreams group")
 | 
						|
		}
 | 
						|
		return p, nil
 | 
						|
	case ap.ActorOrganization:
 | 
						|
		p, ok := t.(vocab.ActivityStreamsOrganization)
 | 
						|
		if !ok {
 | 
						|
			return nil, errors.New("DereferenceAccountable: error resolving type as activitystreams organization")
 | 
						|
		}
 | 
						|
		return p, nil
 | 
						|
	case ap.ActorPerson:
 | 
						|
		p, ok := t.(vocab.ActivityStreamsPerson)
 | 
						|
		if !ok {
 | 
						|
			return nil, errors.New("DereferenceAccountable: error resolving type as activitystreams person")
 | 
						|
		}
 | 
						|
		return p, nil
 | 
						|
	case ap.ActorService:
 | 
						|
		p, ok := t.(vocab.ActivityStreamsService)
 | 
						|
		if !ok {
 | 
						|
			return nil, errors.New("DereferenceAccountable: error resolving type as activitystreams service")
 | 
						|
		}
 | 
						|
		return p, nil
 | 
						|
	}
 | 
						|
 | 
						|
	return nil, fmt.Errorf("DereferenceAccountable: type name %s not supported", t.GetTypeName())
 | 
						|
}
 | 
						|
 | 
						|
// PopulateAccountFields populates any fields on the given account that weren't populated by the initial
 | 
						|
// dereferencing. This includes things like header and avatar etc.
 | 
						|
func (d *deref) PopulateAccountFields(ctx context.Context, account *gtsmodel.Account, requestingUsername string, refresh bool) error {
 | 
						|
	l := logrus.WithFields(logrus.Fields{
 | 
						|
		"func":               "PopulateAccountFields",
 | 
						|
		"requestingUsername": requestingUsername,
 | 
						|
	})
 | 
						|
 | 
						|
	accountURI, err := url.Parse(account.URI)
 | 
						|
	if err != nil {
 | 
						|
		return fmt.Errorf("PopulateAccountFields: couldn't parse account URI %s: %s", account.URI, err)
 | 
						|
	}
 | 
						|
	if blocked, err := d.db.IsDomainBlocked(ctx, accountURI.Host); blocked || err != nil {
 | 
						|
		return fmt.Errorf("PopulateAccountFields: domain %s is blocked", accountURI.Host)
 | 
						|
	}
 | 
						|
 | 
						|
	t, err := d.transportController.NewTransportForUsername(ctx, requestingUsername)
 | 
						|
	if err != nil {
 | 
						|
		return fmt.Errorf("PopulateAccountFields: error getting transport for user: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// fetch the header and avatar
 | 
						|
	if err := d.fetchHeaderAndAviForAccount(ctx, account, t, refresh); err != nil {
 | 
						|
		// if this doesn't work, just skip it -- we can do it later
 | 
						|
		l.Debugf("error fetching header/avi for account: %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// fetchHeaderAndAviForAccount fetches the header and avatar for a remote account, using a transport
 | 
						|
// on behalf of requestingUsername.
 | 
						|
//
 | 
						|
// targetAccount's AvatarMediaAttachmentID and HeaderMediaAttachmentID will be updated as necessary.
 | 
						|
//
 | 
						|
// SIDE EFFECTS: remote header and avatar will be stored in local storage.
 | 
						|
func (d *deref) fetchHeaderAndAviForAccount(ctx context.Context, targetAccount *gtsmodel.Account, t transport.Transport, refresh bool) error {
 | 
						|
	accountURI, err := url.Parse(targetAccount.URI)
 | 
						|
	if err != nil {
 | 
						|
		return fmt.Errorf("fetchHeaderAndAviForAccount: couldn't parse account URI %s: %s", targetAccount.URI, err)
 | 
						|
	}
 | 
						|
	if blocked, err := d.db.IsDomainBlocked(ctx, accountURI.Host); blocked || err != nil {
 | 
						|
		return fmt.Errorf("fetchHeaderAndAviForAccount: domain %s is blocked", accountURI.Host)
 | 
						|
	}
 | 
						|
 | 
						|
	if targetAccount.AvatarRemoteURL != "" && (targetAccount.AvatarMediaAttachmentID == "" || refresh) {
 | 
						|
		a, err := d.mediaHandler.ProcessRemoteHeaderOrAvatar(ctx, t, >smodel.MediaAttachment{
 | 
						|
			RemoteURL: targetAccount.AvatarRemoteURL,
 | 
						|
			Avatar:    true,
 | 
						|
		}, targetAccount.ID)
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("error processing avatar for user: %s", err)
 | 
						|
		}
 | 
						|
		targetAccount.AvatarMediaAttachmentID = a.ID
 | 
						|
	}
 | 
						|
 | 
						|
	if targetAccount.HeaderRemoteURL != "" && (targetAccount.HeaderMediaAttachmentID == "" || refresh) {
 | 
						|
		a, err := d.mediaHandler.ProcessRemoteHeaderOrAvatar(ctx, t, >smodel.MediaAttachment{
 | 
						|
			RemoteURL: targetAccount.HeaderRemoteURL,
 | 
						|
			Header:    true,
 | 
						|
		}, targetAccount.ID)
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("error processing header for user: %s", err)
 | 
						|
		}
 | 
						|
		targetAccount.HeaderMediaAttachmentID = a.ID
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 |