mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 17:02:25 -05:00 
			
		
		
		
	* [chore] Remove years from all license headers Years or year ranges aren't required in license headers. Many projects have removed them in recent years and it avoids a bit of yearly toil. In many cases our copyright claim was also a bit dodgy since we added the 2021-2023 header to files created after 2021 but you can't claim copyright into the past that way. * [chore] Add license header check This ensures a license header is always added to any new file. This avoids maintainers/reviewers needing to remember to check for and ask for it in case a contribution doesn't include it. * [chore] Add missing license headers * [chore] Further updates to license header * Use the more common // indentend comment format * Remove the hack we had for the linter now that we use the // format * Add SPDX license identifier
		
			
				
	
	
		
			191 lines
		
	
	
	
		
			7.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			191 lines
		
	
	
	
		
			7.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package account
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | |
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/db"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/id"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/uris"
 | |
| )
 | |
| 
 | |
| // BlockCreate handles the creation of a block from requestingAccount to targetAccountID, either remote or local.
 | |
| func (p *Processor) BlockCreate(ctx context.Context, requestingAccount *gtsmodel.Account, targetAccountID string) (*apimodel.Relationship, gtserror.WithCode) {
 | |
| 	// make sure the target account actually exists in our db
 | |
| 	targetAccount, err := p.state.DB.GetAccountByID(ctx, targetAccountID)
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorNotFound(fmt.Errorf("BlockCreate: error getting account %s from the db: %s", targetAccountID, err))
 | |
| 	}
 | |
| 
 | |
| 	// if requestingAccount already blocks target account, we don't need to do anything
 | |
| 	if blocked, err := p.state.DB.IsBlocked(ctx, requestingAccount.ID, targetAccountID, false); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockCreate: error checking existence of block: %s", err))
 | |
| 	} else if blocked {
 | |
| 		return p.RelationshipGet(ctx, requestingAccount, targetAccountID)
 | |
| 	}
 | |
| 
 | |
| 	// don't block yourself, silly
 | |
| 	if requestingAccount.ID == targetAccountID {
 | |
| 		return nil, gtserror.NewErrorNotAcceptable(fmt.Errorf("BlockCreate: account %s cannot block itself", requestingAccount.ID))
 | |
| 	}
 | |
| 
 | |
| 	// make the block
 | |
| 	block := >smodel.Block{}
 | |
| 	newBlockID := id.NewULID()
 | |
| 	block.ID = newBlockID
 | |
| 	block.AccountID = requestingAccount.ID
 | |
| 	block.Account = requestingAccount
 | |
| 	block.TargetAccountID = targetAccountID
 | |
| 	block.TargetAccount = targetAccount
 | |
| 	block.URI = uris.GenerateURIForBlock(requestingAccount.Username, newBlockID)
 | |
| 
 | |
| 	// whack it in the database
 | |
| 	if err := p.state.DB.PutBlock(ctx, block); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockCreate: error creating block in db: %s", err))
 | |
| 	}
 | |
| 
 | |
| 	// clear any follows or follow requests from the blocked account to the target account -- this is a simple delete
 | |
| 	if err := p.state.DB.DeleteWhere(ctx, []db.Where{
 | |
| 		{Key: "account_id", Value: targetAccountID},
 | |
| 		{Key: "target_account_id", Value: requestingAccount.ID},
 | |
| 	}, >smodel.Follow{}); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockCreate: error removing follow in db: %s", err))
 | |
| 	}
 | |
| 	if err := p.state.DB.DeleteWhere(ctx, []db.Where{
 | |
| 		{Key: "account_id", Value: targetAccountID},
 | |
| 		{Key: "target_account_id", Value: requestingAccount.ID},
 | |
| 	}, >smodel.FollowRequest{}); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockCreate: error removing follow in db: %s", err))
 | |
| 	}
 | |
| 
 | |
| 	// clear any follows or follow requests from the requesting account to the target account --
 | |
| 	// this might require federation so we need to pass some messages around
 | |
| 
 | |
| 	// check if a follow request exists from the requesting account to the target account, and remove it if it does (storing the URI for later)
 | |
| 	var frChanged bool
 | |
| 	var frURI string
 | |
| 	fr := >smodel.FollowRequest{}
 | |
| 	if err := p.state.DB.GetWhere(ctx, []db.Where{
 | |
| 		{Key: "account_id", Value: requestingAccount.ID},
 | |
| 		{Key: "target_account_id", Value: targetAccountID},
 | |
| 	}, fr); err == nil {
 | |
| 		frURI = fr.URI
 | |
| 		if err := p.state.DB.DeleteByID(ctx, fr.ID, fr); err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockCreate: error removing follow request from db: %s", err))
 | |
| 		}
 | |
| 		frChanged = true
 | |
| 	}
 | |
| 
 | |
| 	// now do the same thing for any existing follow
 | |
| 	var fChanged bool
 | |
| 	var fURI string
 | |
| 	f := >smodel.Follow{}
 | |
| 	if err := p.state.DB.GetWhere(ctx, []db.Where{
 | |
| 		{Key: "account_id", Value: requestingAccount.ID},
 | |
| 		{Key: "target_account_id", Value: targetAccountID},
 | |
| 	}, f); err == nil {
 | |
| 		fURI = f.URI
 | |
| 		if err := p.state.DB.DeleteByID(ctx, f.ID, f); err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockCreate: error removing follow from db: %s", err))
 | |
| 		}
 | |
| 		fChanged = true
 | |
| 	}
 | |
| 
 | |
| 	// follow request status changed so send the UNDO activity to the channel for async processing
 | |
| 	if frChanged {
 | |
| 		p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | |
| 			APObjectType:   ap.ActivityFollow,
 | |
| 			APActivityType: ap.ActivityUndo,
 | |
| 			GTSModel: >smodel.Follow{
 | |
| 				AccountID:       requestingAccount.ID,
 | |
| 				TargetAccountID: targetAccountID,
 | |
| 				URI:             frURI,
 | |
| 			},
 | |
| 			OriginAccount: requestingAccount,
 | |
| 			TargetAccount: targetAccount,
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	// follow status changed so send the UNDO activity to the channel for async processing
 | |
| 	if fChanged {
 | |
| 		p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | |
| 			APObjectType:   ap.ActivityFollow,
 | |
| 			APActivityType: ap.ActivityUndo,
 | |
| 			GTSModel: >smodel.Follow{
 | |
| 				AccountID:       requestingAccount.ID,
 | |
| 				TargetAccountID: targetAccountID,
 | |
| 				URI:             fURI,
 | |
| 			},
 | |
| 			OriginAccount: requestingAccount,
 | |
| 			TargetAccount: targetAccount,
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	// handle the rest of the block process asynchronously
 | |
| 	p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | |
| 		APObjectType:   ap.ActivityBlock,
 | |
| 		APActivityType: ap.ActivityCreate,
 | |
| 		GTSModel:       block,
 | |
| 		OriginAccount:  requestingAccount,
 | |
| 		TargetAccount:  targetAccount,
 | |
| 	})
 | |
| 
 | |
| 	return p.RelationshipGet(ctx, requestingAccount, targetAccountID)
 | |
| }
 | |
| 
 | |
| // BlockRemove handles the removal of a block from requestingAccount to targetAccountID, either remote or local.
 | |
| func (p *Processor) BlockRemove(ctx context.Context, requestingAccount *gtsmodel.Account, targetAccountID string) (*apimodel.Relationship, gtserror.WithCode) {
 | |
| 	// make sure the target account actually exists in our db
 | |
| 	targetAccount, err := p.state.DB.GetAccountByID(ctx, targetAccountID)
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorNotFound(fmt.Errorf("BlockCreate: error getting account %s from the db: %s", targetAccountID, err))
 | |
| 	}
 | |
| 
 | |
| 	// check if a block exists, and remove it if it does
 | |
| 	block, err := p.state.DB.GetBlock(ctx, requestingAccount.ID, targetAccountID)
 | |
| 	if err == nil {
 | |
| 		// we got a block, remove it
 | |
| 		block.Account = requestingAccount
 | |
| 		block.TargetAccount = targetAccount
 | |
| 		if err := p.state.DB.DeleteBlockByID(ctx, block.ID); err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockRemove: error removing block from db: %s", err))
 | |
| 		}
 | |
| 
 | |
| 		// send the UNDO activity to the client worker for async processing
 | |
| 		p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | |
| 			APObjectType:   ap.ActivityBlock,
 | |
| 			APActivityType: ap.ActivityUndo,
 | |
| 			GTSModel:       block,
 | |
| 			OriginAccount:  requestingAccount,
 | |
| 			TargetAccount:  targetAccount,
 | |
| 		})
 | |
| 	} else if !errors.Is(err, db.ErrNoEntries) {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("BlockRemove: error getting possible block from db: %s", err))
 | |
| 	}
 | |
| 
 | |
| 	// return whatever relationship results from all this
 | |
| 	return p.RelationshipGet(ctx, requestingAccount, targetAccountID)
 | |
| }
 |