mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-29 04:22:24 -05:00 
			
		
		
		
	updates our codeberg.org/gruf/go-kv log key-value formatting library to latest version, which comes with some maaaaaaajor speed boosts in the form of:
- very minimal reflect.Value{} usage
- caching prepared formatting functions per type
~~still a work-in-progress until i make a release tag on the go-kv repository, which itself is waiting on published benchmark results in the README and finishing writing some code comments~~
benchmarks so far show this to be ~3x faster than the "fmt" stdlib package on average, when run across a wide variety (106 different types) of test cases, while still creating more visually friendly log output and actually recursing down nested struct ptrs
Reviewed-on: https://codeberg.org/superseriousbusiness/gotosocial/pulls/4341
Co-authored-by: kim <grufwub@gmail.com>
Co-committed-by: kim <grufwub@gmail.com>
		
	
			
		
			
				
	
	
		
			387 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			387 lines
		
	
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package admin
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"time"
 | |
| 
 | |
| 	"codeberg.org/gruf/go-kv/v2"
 | |
| 
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/ap"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/config"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/db"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/gtserror"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/gtsmodel"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/log"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/messages"
 | |
| )
 | |
| 
 | |
| // Returns an AdminActionF for
 | |
| // domain allow side effects.
 | |
| func (a *Actions) DomainAllowF(
 | |
| 	actionID string,
 | |
| 	domainAllow *gtsmodel.DomainAllow,
 | |
| ) ActionF {
 | |
| 	return func(ctx context.Context) gtserror.MultiError {
 | |
| 		l := log.
 | |
| 			WithContext(ctx).
 | |
| 			WithFields(kv.Fields{
 | |
| 				{"action", "allow"},
 | |
| 				{"actionID", actionID},
 | |
| 				{"domain", domainAllow.Domain},
 | |
| 			}...)
 | |
| 
 | |
| 		// Log start + finish.
 | |
| 		l.Info("processing side effects")
 | |
| 		errs := a.domainAllowSideEffects(ctx, domainAllow)
 | |
| 		l.Info("finished processing side effects")
 | |
| 
 | |
| 		return errs
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a *Actions) domainAllowSideEffects(
 | |
| 	ctx context.Context,
 | |
| 	allow *gtsmodel.DomainAllow,
 | |
| ) gtserror.MultiError {
 | |
| 	if config.GetInstanceFederationMode() == config.InstanceFederationModeAllowlist {
 | |
| 		// We're running in allowlist mode,
 | |
| 		// so there are no side effects to
 | |
| 		// process here.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// We're running in blocklist mode or
 | |
| 	// some similar mode which necessitates
 | |
| 	// domain allow side effects if a block
 | |
| 	// was in place when the allow was created.
 | |
| 	//
 | |
| 	// So, check if there's a block.
 | |
| 	block, err := a.db.GetDomainBlock(ctx, allow.Domain)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		errs := gtserror.NewMultiError(1)
 | |
| 		errs.Appendf("db error getting domain block %s: %w", allow.Domain, err)
 | |
| 		return errs
 | |
| 	}
 | |
| 
 | |
| 	if block == nil {
 | |
| 		// No block?
 | |
| 		// No problem!
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// There was a block, over which the new
 | |
| 	// allow ought to take precedence. To account
 | |
| 	// for this, just run side effects as though
 | |
| 	// the domain was being unblocked, while
 | |
| 	// leaving the existing block in place.
 | |
| 	//
 | |
| 	// Any accounts that were suspended by
 | |
| 	// the block will be unsuspended and be
 | |
| 	// able to interact with the instance again.
 | |
| 	return a.domainUnblockSideEffects(ctx, block)
 | |
| }
 | |
| 
 | |
| // Returns an AdminActionF for
 | |
| // domain unallow side effects.
 | |
| func (a *Actions) DomainUnallowF(
 | |
| 	actionID string,
 | |
| 	domainAllow *gtsmodel.DomainAllow,
 | |
| ) ActionF {
 | |
| 	return func(ctx context.Context) gtserror.MultiError {
 | |
| 		l := log.
 | |
| 			WithContext(ctx).
 | |
| 			WithFields(kv.Fields{
 | |
| 				{"action", "unallow"},
 | |
| 				{"actionID", actionID},
 | |
| 				{"domain", domainAllow.Domain},
 | |
| 			}...)
 | |
| 
 | |
| 		// Log start + finish.
 | |
| 		l.Info("processing side effects")
 | |
| 		errs := a.domainUnallowSideEffects(ctx, domainAllow)
 | |
| 		l.Info("finished processing side effects")
 | |
| 
 | |
| 		return errs
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a *Actions) domainUnallowSideEffects(
 | |
| 	ctx context.Context,
 | |
| 	allow *gtsmodel.DomainAllow,
 | |
| ) gtserror.MultiError {
 | |
| 	if config.GetInstanceFederationMode() == config.InstanceFederationModeAllowlist {
 | |
| 		// We're running in allowlist mode,
 | |
| 		// so there are no side effects to
 | |
| 		// process here.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// We're running in blocklist mode or
 | |
| 	// some similar mode which necessitates
 | |
| 	// domain allow side effects if a block
 | |
| 	// was in place when the allow was removed.
 | |
| 	//
 | |
| 	// So, check if there's a block.
 | |
| 	block, err := a.db.GetDomainBlock(ctx, allow.Domain)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		errs := gtserror.NewMultiError(1)
 | |
| 		errs.Appendf("db error getting domain block %s: %w", allow.Domain, err)
 | |
| 		return errs
 | |
| 	}
 | |
| 
 | |
| 	if block == nil {
 | |
| 		// No block?
 | |
| 		// No problem!
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// There was a block, over which the previous
 | |
| 	// allow was taking precedence. Now that the
 | |
| 	// allow has been removed, we should put the
 | |
| 	// side effects of the block back in place.
 | |
| 	//
 | |
| 	// To do this, process the block side effects
 | |
| 	// again as though the block were freshly
 | |
| 	// created. This will mark all accounts from
 | |
| 	// the blocked domain as suspended, and clean
 | |
| 	// up their follows/following, media, etc.
 | |
| 	return a.domainBlockSideEffects(ctx, block)
 | |
| }
 | |
| 
 | |
| func (a *Actions) DomainBlockF(
 | |
| 	actionID string,
 | |
| 	domainBlock *gtsmodel.DomainBlock,
 | |
| ) ActionF {
 | |
| 	return func(ctx context.Context) gtserror.MultiError {
 | |
| 		l := log.
 | |
| 			WithContext(ctx).
 | |
| 			WithFields(kv.Fields{
 | |
| 				{"action", "block"},
 | |
| 				{"actionID", actionID},
 | |
| 				{"domain", domainBlock.Domain},
 | |
| 			}...)
 | |
| 
 | |
| 		skip, err := a.skipBlockSideEffects(ctx, domainBlock.Domain)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		if skip != "" {
 | |
| 			l.Infof("skipping side effects: %s", skip)
 | |
| 			return nil
 | |
| 		}
 | |
| 
 | |
| 		l.Info("processing side effects")
 | |
| 		errs := a.domainBlockSideEffects(ctx, domainBlock)
 | |
| 		l.Info("finished processing side effects")
 | |
| 
 | |
| 		return errs
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // domainBlockSideEffects processes the side effects of a domain block:
 | |
| //
 | |
| //  1. Strip most info away from the instance entry for the domain.
 | |
| //  2. Pass each account from the domain to the processor for deletion.
 | |
| //
 | |
| // It should be called asynchronously, since it can take a while when
 | |
| // there are many accounts present on the given domain.
 | |
| func (a *Actions) domainBlockSideEffects(
 | |
| 	ctx context.Context,
 | |
| 	block *gtsmodel.DomainBlock,
 | |
| ) gtserror.MultiError {
 | |
| 	var errs gtserror.MultiError
 | |
| 
 | |
| 	// If we have an instance entry for this domain,
 | |
| 	// update it with the new block ID and clear all fields
 | |
| 	instance, err := a.db.GetInstance(ctx, block.Domain)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		errs.Appendf("db error getting instance %s: %w", block.Domain, err)
 | |
| 		return errs
 | |
| 	}
 | |
| 
 | |
| 	if instance != nil {
 | |
| 		// We had an entry for this domain.
 | |
| 		columns := stubbifyInstance(instance, block.ID)
 | |
| 		if err := a.db.UpdateInstance(ctx, instance, columns...); err != nil {
 | |
| 			errs.Appendf("db error updating instance: %w", err)
 | |
| 			return errs
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// For each account that belongs to this domain,
 | |
| 	// process an account delete message to remove
 | |
| 	// that account's posts, media, etc.
 | |
| 	if err := a.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) {
 | |
| 		if err := a.workers.Client.Process(ctx, &messages.FromClientAPI{
 | |
| 			APObjectType:   ap.ActorPerson,
 | |
| 			APActivityType: ap.ActivityDelete,
 | |
| 			GTSModel:       block,
 | |
| 			Origin:         account,
 | |
| 			Target:         account,
 | |
| 		}); err != nil {
 | |
| 			errs.Append(err)
 | |
| 		}
 | |
| 	}); err != nil {
 | |
| 		errs.Appendf("db error ranging through accounts: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return errs
 | |
| }
 | |
| 
 | |
| func (a *Actions) DomainUnblockF(
 | |
| 	actionID string,
 | |
| 	domainBlock *gtsmodel.DomainBlock,
 | |
| ) ActionF {
 | |
| 	return func(ctx context.Context) gtserror.MultiError {
 | |
| 		l := log.
 | |
| 			WithContext(ctx).
 | |
| 			WithFields(kv.Fields{
 | |
| 				{"action", "unblock"},
 | |
| 				{"actionID", actionID},
 | |
| 				{"domain", domainBlock.Domain},
 | |
| 			}...)
 | |
| 
 | |
| 		l.Info("processing side effects")
 | |
| 		errs := a.domainUnblockSideEffects(ctx, domainBlock)
 | |
| 		l.Info("finished processing side effects")
 | |
| 
 | |
| 		return errs
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // domainUnblockSideEffects processes the side effects of undoing a
 | |
| // domain block:
 | |
| //
 | |
| //  1. Mark instance entry as no longer suspended.
 | |
| //  2. Mark each account from the domain as no longer suspended, if the
 | |
| //     suspension origin corresponds to the ID of the provided domain block.
 | |
| //
 | |
| // It should be called asynchronously, since it can take a while when
 | |
| // there are many accounts present on the given domain.
 | |
| func (a *Actions) domainUnblockSideEffects(
 | |
| 	ctx context.Context,
 | |
| 	block *gtsmodel.DomainBlock,
 | |
| ) gtserror.MultiError {
 | |
| 	var errs gtserror.MultiError
 | |
| 
 | |
| 	// Update instance entry for this domain, if we have it.
 | |
| 	instance, err := a.db.GetInstance(ctx, block.Domain)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		errs.Appendf("db error getting instance %s: %w", block.Domain, err)
 | |
| 	}
 | |
| 
 | |
| 	if instance != nil {
 | |
| 		// We had an entry, update it to signal
 | |
| 		// that it's no longer suspended.
 | |
| 		instance.SuspendedAt = time.Time{}
 | |
| 		instance.DomainBlockID = ""
 | |
| 		if err := a.db.UpdateInstance(
 | |
| 			ctx,
 | |
| 			instance,
 | |
| 			"suspended_at",
 | |
| 			"domain_block_id",
 | |
| 		); err != nil {
 | |
| 			errs.Appendf("db error updating instance: %w", err)
 | |
| 			return errs
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Unsuspend all accounts whose suspension origin was this domain block.
 | |
| 	if err := a.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) {
 | |
| 		if account.SuspensionOrigin == "" || account.SuspendedAt.IsZero() {
 | |
| 			// Account wasn't suspended, nothing to do.
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		if account.SuspensionOrigin != block.ID {
 | |
| 			// Account was suspended, but not by
 | |
| 			// this domain block, leave it alone.
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		// Account was suspended by this domain
 | |
| 		// block, mark it as unsuspended.
 | |
| 		account.SuspendedAt = time.Time{}
 | |
| 		account.SuspensionOrigin = ""
 | |
| 
 | |
| 		if err := a.db.UpdateAccount(
 | |
| 			ctx,
 | |
| 			account,
 | |
| 			"suspended_at",
 | |
| 			"suspension_origin",
 | |
| 		); err != nil {
 | |
| 			errs.Appendf("db error updating account %s: %w", account.Username, err)
 | |
| 		}
 | |
| 	}); err != nil {
 | |
| 		errs.Appendf("db error ranging through accounts: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return errs
 | |
| }
 | |
| 
 | |
| // skipBlockSideEffects checks if side effects of block creation
 | |
| // should be skipped for the given domain, taking account of
 | |
| // instance federation mode, and existence of any allows
 | |
| // which ought to "shield" this domain from being blocked.
 | |
| //
 | |
| // If the caller should skip, the returned string will be non-zero
 | |
| // and will be set to a reason why side effects should be skipped.
 | |
| //
 | |
| //   - blocklist mode + allow exists: "..." (skip)
 | |
| //   - blocklist mode + no allow:     ""    (don't skip)
 | |
| //   - allowlist mode + allow exists: ""    (don't skip)
 | |
| //   - allowlist mode + no allow:     ""    (don't skip)
 | |
| func (a *Actions) skipBlockSideEffects(
 | |
| 	ctx context.Context,
 | |
| 	domain string,
 | |
| ) (string, gtserror.MultiError) {
 | |
| 	var (
 | |
| 		skip string // Assume "" (don't skip).
 | |
| 		errs gtserror.MultiError
 | |
| 	)
 | |
| 
 | |
| 	// Never skip block side effects in allowlist mode.
 | |
| 	fediMode := config.GetInstanceFederationMode()
 | |
| 	if fediMode == config.InstanceFederationModeAllowlist {
 | |
| 		return skip, errs
 | |
| 	}
 | |
| 
 | |
| 	// We know we're in blocklist mode.
 | |
| 	//
 | |
| 	// We want to skip domain block side
 | |
| 	// effects if an allow is already
 | |
| 	// in place which overrides the block.
 | |
| 
 | |
| 	// Check if an explicit allow exists for this domain.
 | |
| 	domainAllow, err := a.db.GetDomainAllow(ctx, domain)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		errs.Appendf("error getting domain allow: %w", err)
 | |
| 		return skip, errs
 | |
| 	}
 | |
| 
 | |
| 	if domainAllow != nil {
 | |
| 		skip = "running in blocklist mode, and an explicit allow exists for this domain"
 | |
| 		return skip, errs
 | |
| 	}
 | |
| 
 | |
| 	return skip, errs
 | |
| }
 |