mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 17:42:24 -05:00 
			
		
		
		
	* remote + local block logic, incl. federation * improve blocking stuff * fiddle with display of blocked profiles * go fmt
		
			
				
	
	
		
			526 lines
		
	
	
	
		
			19 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			526 lines
		
	
	
	
		
			19 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package federation
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"encoding/json"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/url"
 | |
| 
 | |
| 	"github.com/go-fed/activity/streams"
 | |
| 	"github.com/go-fed/activity/streams/vocab"
 | |
| 	"github.com/sirupsen/logrus"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/db"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/id"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/transport"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | |
| )
 | |
| 
 | |
| func (f *federator) DereferenceRemoteAccount(username string, remoteAccountID *url.URL) (typeutils.Accountable, error) {
 | |
| 	f.startHandshake(username, remoteAccountID)
 | |
| 	defer f.stopHandshake(username, remoteAccountID)
 | |
| 
 | |
| 	if blocked, err := f.blockedDomain(remoteAccountID.Host); blocked || err != nil {
 | |
| 		return nil, fmt.Errorf("DereferenceRemoteAccount: domain %s is blocked", remoteAccountID.Host)
 | |
| 	}
 | |
| 
 | |
| 	transport, err := f.GetTransportForUser(username)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("transport err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	b, err := transport.Dereference(context.Background(), remoteAccountID)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("error deferencing %s: %s", remoteAccountID.String(), err)
 | |
| 	}
 | |
| 
 | |
| 	m := make(map[string]interface{})
 | |
| 	if err := json.Unmarshal(b, &m); err != nil {
 | |
| 		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	t, err := streams.ToType(context.Background(), m)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	switch t.GetTypeName() {
 | |
| 	case string(gtsmodel.ActivityStreamsPerson):
 | |
| 		p, ok := t.(vocab.ActivityStreamsPerson)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as activitystreams person")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case string(gtsmodel.ActivityStreamsApplication):
 | |
| 		p, ok := t.(vocab.ActivityStreamsApplication)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as activitystreams application")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case string(gtsmodel.ActivityStreamsService):
 | |
| 		p, ok := t.(vocab.ActivityStreamsService)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as activitystreams service")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName())
 | |
| }
 | |
| 
 | |
| func (f *federator) DereferenceRemoteStatus(username string, remoteStatusID *url.URL) (typeutils.Statusable, error) {
 | |
| 	if blocked, err := f.blockedDomain(remoteStatusID.Host); blocked || err != nil {
 | |
| 		return nil, fmt.Errorf("DereferenceRemoteStatus: domain %s is blocked", remoteStatusID.Host)
 | |
| 	}
 | |
| 
 | |
| 	transport, err := f.GetTransportForUser(username)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("transport err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	b, err := transport.Dereference(context.Background(), remoteStatusID)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("error deferencing %s: %s", remoteStatusID.String(), err)
 | |
| 	}
 | |
| 
 | |
| 	m := make(map[string]interface{})
 | |
| 	if err := json.Unmarshal(b, &m); err != nil {
 | |
| 		return nil, fmt.Errorf("error unmarshalling bytes into json: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	t, err := streams.ToType(context.Background(), m)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("error resolving json into ap vocab type: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// Article, Document, Image, Video, Note, Page, Event, Place, Mention, Profile
 | |
| 	switch t.GetTypeName() {
 | |
| 	case gtsmodel.ActivityStreamsArticle:
 | |
| 		p, ok := t.(vocab.ActivityStreamsArticle)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsArticle")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsDocument:
 | |
| 		p, ok := t.(vocab.ActivityStreamsDocument)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsDocument")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsImage:
 | |
| 		p, ok := t.(vocab.ActivityStreamsImage)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsImage")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsVideo:
 | |
| 		p, ok := t.(vocab.ActivityStreamsVideo)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsVideo")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsNote:
 | |
| 		p, ok := t.(vocab.ActivityStreamsNote)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsNote")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsPage:
 | |
| 		p, ok := t.(vocab.ActivityStreamsPage)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsPage")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsEvent:
 | |
| 		p, ok := t.(vocab.ActivityStreamsEvent)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsEvent")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsPlace:
 | |
| 		p, ok := t.(vocab.ActivityStreamsPlace)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsPlace")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	case gtsmodel.ActivityStreamsProfile:
 | |
| 		p, ok := t.(vocab.ActivityStreamsProfile)
 | |
| 		if !ok {
 | |
| 			return nil, errors.New("error resolving type as ActivityStreamsProfile")
 | |
| 		}
 | |
| 		return p, nil
 | |
| 	}
 | |
| 
 | |
| 	return nil, fmt.Errorf("type name %s not supported", t.GetTypeName())
 | |
| }
 | |
| 
 | |
| func (f *federator) DereferenceRemoteInstance(username string, remoteInstanceURI *url.URL) (*gtsmodel.Instance, error) {
 | |
| 	if blocked, err := f.blockedDomain(remoteInstanceURI.Host); blocked || err != nil {
 | |
| 		return nil, fmt.Errorf("DereferenceRemoteInstance: domain %s is blocked", remoteInstanceURI.Host)
 | |
| 	}
 | |
| 
 | |
| 	transport, err := f.GetTransportForUser(username)
 | |
| 	if err != nil {
 | |
| 		return nil, fmt.Errorf("transport err: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	return transport.DereferenceInstance(context.Background(), remoteInstanceURI)
 | |
| }
 | |
| 
 | |
| // dereferenceStatusFields fetches all the information we temporarily pinned to an incoming
 | |
| // federated status, back in the federating db's Create function.
 | |
| //
 | |
| // When a status comes in from the federation API, there are certain fields that
 | |
| // haven't been dereferenced yet, because we needed to provide a snappy synchronous
 | |
| // response to the caller. By the time it reaches this function though, it's being
 | |
| // processed asynchronously, so we have all the time in the world to fetch the various
 | |
| // bits and bobs that are attached to the status, and properly flesh it out, before we
 | |
| // send the status to any timelines and notify people.
 | |
| //
 | |
| // Things to dereference and fetch here:
 | |
| //
 | |
| // 1. Media attachments.
 | |
| // 2. Hashtags.
 | |
| // 3. Emojis.
 | |
| // 4. Mentions.
 | |
| // 5. Posting account.
 | |
| // 6. Replied-to-status.
 | |
| //
 | |
| // SIDE EFFECTS:
 | |
| // This function will deference all of the above, insert them in the database as necessary,
 | |
| // and attach them to the status. The status itself will not be added to the database yet,
 | |
| // that's up the caller to do.
 | |
| func (f *federator) DereferenceStatusFields(status *gtsmodel.Status, requestingUsername string) error {
 | |
| 	l := f.log.WithFields(logrus.Fields{
 | |
| 		"func":   "dereferenceStatusFields",
 | |
| 		"status": fmt.Sprintf("%+v", status),
 | |
| 	})
 | |
| 	l.Debug("entering function")
 | |
| 
 | |
| 	statusURI, err := url.Parse(status.URI)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("DereferenceStatusFields: couldn't parse status URI %s: %s", status.URI, err)
 | |
| 	}
 | |
| 	if blocked, err := f.blockedDomain(statusURI.Host); blocked || err != nil {
 | |
| 		return fmt.Errorf("DereferenceStatusFields: domain %s is blocked", statusURI.Host)
 | |
| 	}
 | |
| 
 | |
| 	t, err := f.GetTransportForUser(requestingUsername)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("error creating transport: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// the status should have an ID by now, but just in case it doesn't let's generate one here
 | |
| 	// because we'll need it further down
 | |
| 	if status.ID == "" {
 | |
| 		newID, err := id.NewULIDFromTime(status.CreatedAt)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		status.ID = newID
 | |
| 	}
 | |
| 
 | |
| 	// 1. Media attachments.
 | |
| 	//
 | |
| 	// At this point we should know:
 | |
| 	// * the media type of the file we're looking for (a.File.ContentType)
 | |
| 	// * the blurhash (a.Blurhash)
 | |
| 	// * the file type (a.Type)
 | |
| 	// * the remote URL (a.RemoteURL)
 | |
| 	// This should be enough to pass along to the media processor.
 | |
| 	attachmentIDs := []string{}
 | |
| 	for _, a := range status.GTSMediaAttachments {
 | |
| 		l.Debugf("dereferencing attachment: %+v", a)
 | |
| 
 | |
| 		// it might have been processed elsewhere so check first if it's already in the database or not
 | |
| 		maybeAttachment := >smodel.MediaAttachment{}
 | |
| 		err := f.db.GetWhere([]db.Where{{Key: "remote_url", Value: a.RemoteURL}}, maybeAttachment)
 | |
| 		if err == nil {
 | |
| 			// we already have it in the db, dereferenced, no need to do it again
 | |
| 			l.Debugf("attachment already exists with id %s", maybeAttachment.ID)
 | |
| 			attachmentIDs = append(attachmentIDs, maybeAttachment.ID)
 | |
| 			continue
 | |
| 		}
 | |
| 		if _, ok := err.(db.ErrNoEntries); !ok {
 | |
| 			// we have a real error
 | |
| 			return fmt.Errorf("error checking db for existence of attachment with remote url %s: %s", a.RemoteURL, err)
 | |
| 		}
 | |
| 		// it just doesn't exist yet so carry on
 | |
| 		l.Debug("attachment doesn't exist yet, calling ProcessRemoteAttachment", a)
 | |
| 		deferencedAttachment, err := f.mediaHandler.ProcessRemoteAttachment(t, a, status.AccountID)
 | |
| 		if err != nil {
 | |
| 			l.Errorf("error dereferencing status attachment: %s", err)
 | |
| 			continue
 | |
| 		}
 | |
| 		l.Debugf("dereferenced attachment: %+v", deferencedAttachment)
 | |
| 		deferencedAttachment.StatusID = status.ID
 | |
| 		deferencedAttachment.Description = a.Description
 | |
| 		if err := f.db.Put(deferencedAttachment); err != nil {
 | |
| 			return fmt.Errorf("error inserting dereferenced attachment with remote url %s: %s", a.RemoteURL, err)
 | |
| 		}
 | |
| 		attachmentIDs = append(attachmentIDs, deferencedAttachment.ID)
 | |
| 	}
 | |
| 	status.Attachments = attachmentIDs
 | |
| 
 | |
| 	// 2. Hashtags
 | |
| 
 | |
| 	// 3. Emojis
 | |
| 
 | |
| 	// 4. Mentions
 | |
| 	// At this point, mentions should have the namestring and mentionedAccountURI set on them.
 | |
| 	//
 | |
| 	// We should dereference any accounts mentioned here which we don't have in our db yet, by their URI.
 | |
| 	mentions := []string{}
 | |
| 	for _, m := range status.GTSMentions {
 | |
| 		if m.ID == "" {
 | |
| 			mID, err := id.NewRandomULID()
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			m.ID = mID
 | |
| 		}
 | |
| 
 | |
| 		uri, err := url.Parse(m.MentionedAccountURI)
 | |
| 		if err != nil {
 | |
| 			l.Debugf("error parsing mentioned account uri %s: %s", m.MentionedAccountURI, err)
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		m.StatusID = status.ID
 | |
| 		m.OriginAccountID = status.GTSAuthorAccount.ID
 | |
| 		m.OriginAccountURI = status.GTSAuthorAccount.URI
 | |
| 
 | |
| 		targetAccount := >smodel.Account{}
 | |
| 		if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: uri.String()}}, targetAccount); err != nil {
 | |
| 			// proper error
 | |
| 			if _, ok := err.(db.ErrNoEntries); !ok {
 | |
| 				return fmt.Errorf("db error checking for account with uri %s", uri.String())
 | |
| 			}
 | |
| 
 | |
| 			// we just don't have it yet, so we should go get it....
 | |
| 			accountable, err := f.DereferenceRemoteAccount(requestingUsername, uri)
 | |
| 			if err != nil {
 | |
| 				// we can't dereference it so just skip it
 | |
| 				l.Debugf("error dereferencing remote account with uri %s: %s", uri.String(), err)
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			targetAccount, err = f.typeConverter.ASRepresentationToAccount(accountable, false)
 | |
| 			if err != nil {
 | |
| 				l.Debugf("error converting remote account with uri %s into gts model: %s", uri.String(), err)
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			targetAccountID, err := id.NewRandomULID()
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			targetAccount.ID = targetAccountID
 | |
| 
 | |
| 			if err := f.db.Put(targetAccount); err != nil {
 | |
| 				return fmt.Errorf("db error inserting account with uri %s", uri.String())
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// by this point, we know the targetAccount exists in our database with an ID :)
 | |
| 		m.TargetAccountID = targetAccount.ID
 | |
| 		if err := f.db.Put(m); err != nil {
 | |
| 			return fmt.Errorf("error creating mention: %s", err)
 | |
| 		}
 | |
| 		mentions = append(mentions, m.ID)
 | |
| 	}
 | |
| 	status.Mentions = mentions
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (f *federator) DereferenceAccountFields(account *gtsmodel.Account, requestingUsername string, refresh bool) error {
 | |
| 	l := f.log.WithFields(logrus.Fields{
 | |
| 		"func":               "dereferenceAccountFields",
 | |
| 		"requestingUsername": requestingUsername,
 | |
| 	})
 | |
| 
 | |
| 	accountURI, err := url.Parse(account.URI)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("DereferenceAccountFields: couldn't parse account URI %s: %s", account.URI, err)
 | |
| 	}
 | |
| 	if blocked, err := f.blockedDomain(accountURI.Host); blocked || err != nil {
 | |
| 		return fmt.Errorf("DereferenceAccountFields: domain %s is blocked", accountURI.Host)
 | |
| 	}
 | |
| 
 | |
| 	t, err := f.GetTransportForUser(requestingUsername)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("error getting transport for user: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// fetch the header and avatar
 | |
| 	if err := f.fetchHeaderAndAviForAccount(account, t, refresh); err != nil {
 | |
| 		// if this doesn't work, just skip it -- we can do it later
 | |
| 		l.Debugf("error fetching header/avi for account: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	if err := f.db.UpdateByID(account.ID, account); err != nil {
 | |
| 		return fmt.Errorf("error updating account in database: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (f *federator) DereferenceAnnounce(announce *gtsmodel.Status, requestingUsername string) error {
 | |
| 	if announce.GTSBoostedStatus == nil || announce.GTSBoostedStatus.URI == "" {
 | |
| 		// we can't do anything unfortunately
 | |
| 		return errors.New("DereferenceAnnounce: no URI to dereference")
 | |
| 	}
 | |
| 
 | |
| 	boostedStatusURI, err := url.Parse(announce.GTSBoostedStatus.URI)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("DereferenceAnnounce: couldn't parse boosted status URI %s: %s", announce.GTSBoostedStatus.URI, err)
 | |
| 	}
 | |
| 	if blocked, err := f.blockedDomain(boostedStatusURI.Host); blocked || err != nil {
 | |
| 		return fmt.Errorf("DereferenceAnnounce: domain %s is blocked", boostedStatusURI.Host)
 | |
| 	}
 | |
| 
 | |
| 	// check if we already have the boosted status in the database
 | |
| 	boostedStatus := >smodel.Status{}
 | |
| 	err = f.db.GetWhere([]db.Where{{Key: "uri", Value: announce.GTSBoostedStatus.URI}}, boostedStatus)
 | |
| 	if err == nil {
 | |
| 		// nice, we already have it so we don't actually need to dereference it from remote
 | |
| 		announce.Content = boostedStatus.Content
 | |
| 		announce.ContentWarning = boostedStatus.ContentWarning
 | |
| 		announce.ActivityStreamsType = boostedStatus.ActivityStreamsType
 | |
| 		announce.Sensitive = boostedStatus.Sensitive
 | |
| 		announce.Language = boostedStatus.Language
 | |
| 		announce.Text = boostedStatus.Text
 | |
| 		announce.BoostOfID = boostedStatus.ID
 | |
| 		announce.BoostOfAccountID = boostedStatus.AccountID
 | |
| 		announce.Visibility = boostedStatus.Visibility
 | |
| 		announce.VisibilityAdvanced = boostedStatus.VisibilityAdvanced
 | |
| 		announce.GTSBoostedStatus = boostedStatus
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// we don't have it so we need to dereference it
 | |
| 	statusable, err := f.DereferenceRemoteStatus(requestingUsername, boostedStatusURI)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("dereferenceAnnounce: error dereferencing remote status with id %s: %s", announce.GTSBoostedStatus.URI, err)
 | |
| 	}
 | |
| 
 | |
| 	// make sure we have the author account in the db
 | |
| 	attributedToProp := statusable.GetActivityStreamsAttributedTo()
 | |
| 	for iter := attributedToProp.Begin(); iter != attributedToProp.End(); iter = iter.Next() {
 | |
| 		accountURI := iter.GetIRI()
 | |
| 		if accountURI == nil {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if err := f.db.GetWhere([]db.Where{{Key: "uri", Value: accountURI.String()}}, >smodel.Account{}); err == nil {
 | |
| 			// we already have it, fine
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// we don't have the boosted status author account yet so dereference it
 | |
| 		accountable, err := f.DereferenceRemoteAccount(requestingUsername, accountURI)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("dereferenceAnnounce: error dereferencing remote account with id %s: %s", accountURI.String(), err)
 | |
| 		}
 | |
| 		account, err := f.typeConverter.ASRepresentationToAccount(accountable, false)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("dereferenceAnnounce: error converting dereferenced account with id %s into account : %s", accountURI.String(), err)
 | |
| 		}
 | |
| 
 | |
| 		accountID, err := id.NewRandomULID()
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		account.ID = accountID
 | |
| 
 | |
| 		if err := f.db.Put(account); err != nil {
 | |
| 			return fmt.Errorf("dereferenceAnnounce: error putting dereferenced account with id %s into database : %s", accountURI.String(), err)
 | |
| 		}
 | |
| 
 | |
| 		if err := f.DereferenceAccountFields(account, requestingUsername, false); err != nil {
 | |
| 			return fmt.Errorf("dereferenceAnnounce: error dereferencing fields on account with id %s : %s", accountURI.String(), err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// now convert the statusable into something we can understand
 | |
| 	boostedStatus, err = f.typeConverter.ASStatusToStatus(statusable)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("dereferenceAnnounce: error converting dereferenced statusable with id %s into status : %s", announce.GTSBoostedStatus.URI, err)
 | |
| 	}
 | |
| 
 | |
| 	boostedStatusID, err := id.NewULIDFromTime(boostedStatus.CreatedAt)
 | |
| 	if err != nil {
 | |
| 		return nil
 | |
| 	}
 | |
| 	boostedStatus.ID = boostedStatusID
 | |
| 
 | |
| 	if err := f.db.Put(boostedStatus); err != nil {
 | |
| 		return fmt.Errorf("dereferenceAnnounce: error putting dereferenced status with id %s into the db: %s", announce.GTSBoostedStatus.URI, err)
 | |
| 	}
 | |
| 
 | |
| 	// now dereference additional fields straight away (we're already async here so we have time)
 | |
| 	if err := f.DereferenceStatusFields(boostedStatus, requestingUsername); err != nil {
 | |
| 		return fmt.Errorf("dereferenceAnnounce: error dereferencing status fields for status with id %s: %s", announce.GTSBoostedStatus.URI, err)
 | |
| 	}
 | |
| 
 | |
| 	// update with the newly dereferenced fields
 | |
| 	if err := f.db.UpdateByID(boostedStatus.ID, boostedStatus); err != nil {
 | |
| 		return fmt.Errorf("dereferenceAnnounce: error updating dereferenced status in the db: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// we have everything we need!
 | |
| 	announce.Content = boostedStatus.Content
 | |
| 	announce.ContentWarning = boostedStatus.ContentWarning
 | |
| 	announce.ActivityStreamsType = boostedStatus.ActivityStreamsType
 | |
| 	announce.Sensitive = boostedStatus.Sensitive
 | |
| 	announce.Language = boostedStatus.Language
 | |
| 	announce.Text = boostedStatus.Text
 | |
| 	announce.BoostOfID = boostedStatus.ID
 | |
| 	announce.BoostOfAccountID = boostedStatus.AccountID
 | |
| 	announce.Visibility = boostedStatus.Visibility
 | |
| 	announce.VisibilityAdvanced = boostedStatus.VisibilityAdvanced
 | |
| 	announce.GTSBoostedStatus = boostedStatus
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // fetchHeaderAndAviForAccount fetches the header and avatar for a remote account, using a transport
 | |
| // on behalf of requestingUsername.
 | |
| //
 | |
| // targetAccount's AvatarMediaAttachmentID and HeaderMediaAttachmentID will be updated as necessary.
 | |
| //
 | |
| // SIDE EFFECTS: remote header and avatar will be stored in local storage, and the database will be updated
 | |
| // to reflect the creation of these new attachments.
 | |
| func (f *federator) fetchHeaderAndAviForAccount(targetAccount *gtsmodel.Account, t transport.Transport, refresh bool) error {
 | |
| 	accountURI, err := url.Parse(targetAccount.URI)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("fetchHeaderAndAviForAccount: couldn't parse account URI %s: %s", targetAccount.URI, err)
 | |
| 	}
 | |
| 	if blocked, err := f.blockedDomain(accountURI.Host); blocked || err != nil {
 | |
| 		return fmt.Errorf("fetchHeaderAndAviForAccount: domain %s is blocked", accountURI.Host)
 | |
| 	}
 | |
| 
 | |
| 	if targetAccount.AvatarRemoteURL != "" && (targetAccount.AvatarMediaAttachmentID == "" || refresh) {
 | |
| 		a, err := f.mediaHandler.ProcessRemoteHeaderOrAvatar(t, >smodel.MediaAttachment{
 | |
| 			RemoteURL: targetAccount.AvatarRemoteURL,
 | |
| 			Avatar:    true,
 | |
| 		}, targetAccount.ID)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("error processing avatar for user: %s", err)
 | |
| 		}
 | |
| 		targetAccount.AvatarMediaAttachmentID = a.ID
 | |
| 	}
 | |
| 
 | |
| 	if targetAccount.HeaderRemoteURL != "" && (targetAccount.HeaderMediaAttachmentID == "" || refresh) {
 | |
| 		a, err := f.mediaHandler.ProcessRemoteHeaderOrAvatar(t, >smodel.MediaAttachment{
 | |
| 			RemoteURL: targetAccount.HeaderRemoteURL,
 | |
| 			Header:    true,
 | |
| 		}, targetAccount.ID)
 | |
| 		if err != nil {
 | |
| 			return fmt.Errorf("error processing header for user: %s", err)
 | |
| 		}
 | |
| 		targetAccount.HeaderMediaAttachmentID = a.ID
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |