mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2025-10-29 15:52:26 -05:00
~~Still WIP!~~ This PR allows v0.20.0 of GtS to be forward-compatible with the interaction request / authorization flow that will fully replace the current flow in v0.21.0. Basically, this means we need to recognize LikeRequest, ReplyRequest, and AnnounceRequest, and in response to those requests, deliver either a Reject or an Accept, with the latter pointing towards a LikeAuthorization, ReplyAuthorization, or AnnounceAuthorization, respectively. This can then be used by the remote instance to prove to third parties that the interaction has been accepted by the interactee. These Authorization types need to be dereferencable to third parties, so we need to serve them. As well as recognizing the above "polite" interaction request types, we also need to still serve appropriate responses to "impolite" interaction request types, where an instance that's unaware of interaction policies tries to interact with a post by sending a reply, like, or boost directly, without wrapping it in a WhateverRequest type. Doesn't fully close https://codeberg.org/superseriousbusiness/gotosocial/issues/4026 but gets damn near (just gotta update the federating with GtS documentation). Migrations tested on both Postgres and SQLite. Co-authored-by: kim <grufwub@gmail.com> Reviewed-on: https://codeberg.org/superseriousbusiness/gotosocial/pulls/4394 Co-authored-by: tobi <tobi.smethurst@protonmail.com> Co-committed-by: tobi <tobi.smethurst@protonmail.com>
1690 lines
51 KiB
Go
1690 lines
51 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package workers
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/url"
|
|
"time"
|
|
|
|
"code.superseriousbusiness.org/gotosocial/internal/ap"
|
|
"code.superseriousbusiness.org/gotosocial/internal/db"
|
|
"code.superseriousbusiness.org/gotosocial/internal/federation/dereferencing"
|
|
"code.superseriousbusiness.org/gotosocial/internal/gtscontext"
|
|
"code.superseriousbusiness.org/gotosocial/internal/id"
|
|
"code.superseriousbusiness.org/gotosocial/internal/uris"
|
|
"codeberg.org/gruf/go-kv/v2"
|
|
|
|
"code.superseriousbusiness.org/gotosocial/internal/gtserror"
|
|
"code.superseriousbusiness.org/gotosocial/internal/gtsmodel"
|
|
"code.superseriousbusiness.org/gotosocial/internal/log"
|
|
"code.superseriousbusiness.org/gotosocial/internal/messages"
|
|
"code.superseriousbusiness.org/gotosocial/internal/processing/account"
|
|
"code.superseriousbusiness.org/gotosocial/internal/processing/common"
|
|
"code.superseriousbusiness.org/gotosocial/internal/state"
|
|
"code.superseriousbusiness.org/gotosocial/internal/util"
|
|
)
|
|
|
|
// fediAPI wraps processing functions
|
|
// specifically for messages originating
|
|
// from the federation/ActivityPub API.
|
|
type fediAPI struct {
|
|
state *state.State
|
|
surface *Surface
|
|
federate *federate
|
|
account *account.Processor
|
|
common *common.Processor
|
|
utils *utils
|
|
}
|
|
|
|
func (p *Processor) ProcessFromFediAPI(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Allocate new log fields slice
|
|
fields := make([]kv.Field, 3, 5)
|
|
fields[0] = kv.Field{"activityType", fMsg.APActivityType}
|
|
fields[1] = kv.Field{"objectType", fMsg.APObjectType}
|
|
fields[2] = kv.Field{"toAccount", fMsg.Receiving.Username}
|
|
|
|
if fMsg.APIRI != nil {
|
|
// An IRI was supplied, append to log
|
|
fields = append(fields, kv.Field{
|
|
"iri", fMsg.APIRI,
|
|
})
|
|
}
|
|
|
|
// Include GTSModel in logs if appropriate.
|
|
if fMsg.GTSModel != nil &&
|
|
log.Level() >= log.DEBUG {
|
|
fields = append(fields, kv.Field{
|
|
"model", fMsg.GTSModel,
|
|
})
|
|
}
|
|
|
|
l := log.WithContext(ctx).WithFields(fields...)
|
|
l.Info("processing from fedi API")
|
|
|
|
switch fMsg.APActivityType {
|
|
|
|
// CREATE SOMETHING
|
|
case ap.ActivityCreate:
|
|
switch fMsg.APObjectType {
|
|
|
|
// CREATE NOTE/STATUS
|
|
case ap.ObjectNote:
|
|
return p.fediAPI.CreateStatus(ctx, fMsg)
|
|
|
|
// REQUEST TO REPLY TO A STATUS
|
|
case ap.ActivityReplyRequest:
|
|
return p.fediAPI.CreateReplyRequest(ctx, fMsg)
|
|
|
|
// CREATE FOLLOW (request)
|
|
case ap.ActivityFollow:
|
|
return p.fediAPI.CreateFollowReq(ctx, fMsg)
|
|
|
|
// CREATE LIKE/FAVE
|
|
case ap.ActivityLike:
|
|
return p.fediAPI.CreateLike(ctx, fMsg)
|
|
|
|
// REQUEST TO LIKE A STATUS
|
|
case ap.ActivityLikeRequest:
|
|
return p.fediAPI.CreateLikeRequest(ctx, fMsg)
|
|
|
|
// CREATE ANNOUNCE/BOOST
|
|
case ap.ActivityAnnounce:
|
|
return p.fediAPI.CreateAnnounce(ctx, fMsg)
|
|
|
|
// REQUEST TO BOOST A STATUS
|
|
case ap.ActivityAnnounceRequest:
|
|
return p.fediAPI.CreateAnnounceRequest(ctx, fMsg)
|
|
|
|
// CREATE BLOCK
|
|
case ap.ActivityBlock:
|
|
return p.fediAPI.CreateBlock(ctx, fMsg)
|
|
|
|
// CREATE FLAG/REPORT
|
|
case ap.ActivityFlag:
|
|
return p.fediAPI.CreateFlag(ctx, fMsg)
|
|
|
|
// CREATE QUESTION
|
|
case ap.ActivityQuestion:
|
|
return p.fediAPI.CreatePollVote(ctx, fMsg)
|
|
}
|
|
|
|
// UPDATE SOMETHING
|
|
case ap.ActivityUpdate:
|
|
switch fMsg.APObjectType {
|
|
|
|
// UPDATE NOTE/STATUS
|
|
case ap.ObjectNote:
|
|
return p.fediAPI.UpdateStatus(ctx, fMsg)
|
|
|
|
// UPDATE ACCOUNT
|
|
case ap.ActorPerson:
|
|
return p.fediAPI.UpdateAccount(ctx, fMsg)
|
|
|
|
// UPDATE QUESTION
|
|
case ap.ActivityQuestion:
|
|
return p.fediAPI.UpdatePollVote(ctx, fMsg)
|
|
}
|
|
|
|
// ACCEPT SOMETHING
|
|
case ap.ActivityAccept:
|
|
switch fMsg.APObjectType {
|
|
|
|
// ACCEPT (pending) FOLLOW
|
|
case ap.ActivityFollow:
|
|
return p.fediAPI.AcceptFollow(ctx, fMsg)
|
|
|
|
// ACCEPT (pending) LIKE
|
|
case ap.ActivityLike:
|
|
return p.fediAPI.AcceptLike(ctx, fMsg)
|
|
|
|
// ACCEPT (pending) REPLY
|
|
case ap.ObjectNote:
|
|
return p.fediAPI.AcceptReply(ctx, fMsg)
|
|
|
|
// ACCEPT (pending) POLITE REPLY REQUEST
|
|
case ap.ActivityReplyRequest:
|
|
return p.fediAPI.AcceptPoliteReplyRequest(ctx, fMsg)
|
|
|
|
// ACCEPT (pending) ANNOUNCE
|
|
case ap.ActivityAnnounce:
|
|
return p.fediAPI.AcceptAnnounce(ctx, fMsg)
|
|
|
|
// ACCEPT (remote) IMPOLITE REPLY or ANNOUNCE
|
|
case ap.ObjectUnknown:
|
|
return p.fediAPI.AcceptRemoteStatus(ctx, fMsg)
|
|
}
|
|
|
|
// REJECT SOMETHING
|
|
case ap.ActivityReject:
|
|
switch fMsg.APObjectType {
|
|
|
|
// REJECT LIKE
|
|
case ap.ActivityLike:
|
|
return p.fediAPI.RejectLike(ctx, fMsg)
|
|
|
|
// REJECT NOTE/STATUS (ie., reject a reply)
|
|
case ap.ObjectNote:
|
|
return p.fediAPI.RejectReply(ctx, fMsg)
|
|
|
|
// REJECT BOOST
|
|
case ap.ActivityAnnounce:
|
|
return p.fediAPI.RejectAnnounce(ctx, fMsg)
|
|
}
|
|
|
|
// DELETE SOMETHING
|
|
case ap.ActivityDelete:
|
|
switch fMsg.APObjectType {
|
|
|
|
// DELETE NOTE/STATUS
|
|
case ap.ObjectNote:
|
|
return p.fediAPI.DeleteStatus(ctx, fMsg)
|
|
|
|
// DELETE ACCOUNT
|
|
case ap.ActorPerson:
|
|
return p.fediAPI.DeleteAccount(ctx, fMsg)
|
|
}
|
|
|
|
// MOVE SOMETHING
|
|
case ap.ActivityMove:
|
|
|
|
// MOVE ACCOUNT
|
|
// fromfediapi_move.go.
|
|
if fMsg.APObjectType == ap.ActorPerson {
|
|
return p.fediAPI.MoveAccount(ctx, fMsg)
|
|
}
|
|
|
|
// UNDO SOMETHING
|
|
case ap.ActivityUndo:
|
|
|
|
switch fMsg.APObjectType {
|
|
// UNDO FOLLOW
|
|
case ap.ActivityFollow:
|
|
return p.fediAPI.UndoFollow(ctx, fMsg)
|
|
|
|
// UNDO BLOCK
|
|
case ap.ActivityBlock:
|
|
return p.fediAPI.UndoBlock(ctx, fMsg)
|
|
|
|
// UNDO ANNOUNCE
|
|
case ap.ActivityAnnounce:
|
|
return p.fediAPI.UndoAnnounce(ctx, fMsg)
|
|
|
|
// UNDO LIKE
|
|
case ap.ActivityLike:
|
|
return p.fediAPI.UndoFave(ctx, fMsg)
|
|
}
|
|
}
|
|
|
|
return gtserror.Newf("unhandled: %s %s", fMsg.APActivityType, fMsg.APObjectType)
|
|
}
|
|
|
|
// CreateStatus handles the creation of a status/post sent as a Create message.
|
|
// It is also capable of handling impolite reply requests to local + remote statuses,
|
|
// ie., replies sent directly without doing the ReplyRequest process first.
|
|
func (p *fediAPI) CreateStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
var (
|
|
status *gtsmodel.Status
|
|
statusable ap.Statusable
|
|
err error
|
|
)
|
|
|
|
var ok bool
|
|
|
|
switch {
|
|
case fMsg.APObject != nil:
|
|
// A model was provided, extract this from message.
|
|
statusable, ok = fMsg.APObject.(ap.Statusable)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> ap.Statusable", fMsg.APObject)
|
|
}
|
|
|
|
// Create bare-bones model to pass
|
|
// into RefreshStatus(), which it will
|
|
// further populate and insert as new.
|
|
bareStatus := new(gtsmodel.Status)
|
|
bareStatus.Local = util.Ptr(false)
|
|
bareStatus.URI = ap.GetJSONLDId(statusable).String()
|
|
|
|
// Call RefreshStatus() to parse and process the provided
|
|
// statusable model, which it will use to further flesh out
|
|
// the bare bones model and insert it into the database.
|
|
status, statusable, err = p.federate.RefreshStatus(ctx,
|
|
fMsg.Receiving.Username,
|
|
bareStatus,
|
|
statusable,
|
|
// Force refresh within 5min window.
|
|
dereferencing.Fresh,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("error processing new status %s: %w", bareStatus.URI, err)
|
|
}
|
|
|
|
case fMsg.APIRI != nil:
|
|
// Model was not set, deref with IRI (this is a forward).
|
|
// This will also cause the status to be inserted into the db.
|
|
status, statusable, err = p.federate.GetStatusByURI(ctx,
|
|
fMsg.Receiving.Username,
|
|
fMsg.APIRI,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("error dereferencing forwarded status %s: %w", fMsg.APIRI, err)
|
|
}
|
|
|
|
default:
|
|
return gtserror.New("neither APObjectModel nor APIri set")
|
|
}
|
|
|
|
if statusable == nil {
|
|
// Another thread beat us to
|
|
// creating this status! Return
|
|
// here and let the other thread
|
|
// handle timelining + notifying.
|
|
return nil
|
|
}
|
|
|
|
// If pending approval is true then
|
|
// status must reply to a LOCAL status
|
|
// that requires approval for the reply.
|
|
pendingApproval := util.PtrOrZero(status.PendingApproval)
|
|
|
|
switch {
|
|
case pendingApproval && !status.PreApproved:
|
|
// If approval is required and status isn't
|
|
// preapproved, then just notify the account
|
|
// that's being interacted with: they can
|
|
// approve or deny the interaction later.
|
|
if err := p.utils.impoliteReplyRequest(ctx, status); err != nil {
|
|
return gtserror.Newf("error pending reply: %w", err)
|
|
}
|
|
|
|
// Return early.
|
|
return nil
|
|
|
|
case pendingApproval && status.PreApproved:
|
|
// If approval is required and status is
|
|
// preapproved, that means this is a reply
|
|
// to one of our statuses with permission
|
|
// that matched on a following/followers
|
|
// collection. Do the Accept immediately and
|
|
// then process everything else as normal.
|
|
|
|
// Store an already-accepted
|
|
// impolite interaction request.
|
|
requestID := id.NewULID()
|
|
approval := >smodel.InteractionRequest{
|
|
ID: requestID,
|
|
TargetStatusID: status.InReplyToID,
|
|
TargetAccountID: status.InReplyToAccountID,
|
|
TargetAccount: status.InReplyToAccount,
|
|
InteractingAccountID: status.AccountID,
|
|
InteractingAccount: status.Account,
|
|
InteractionRequestURI: gtsmodel.ForwardCompatibleInteractionRequestURI(status.URI, gtsmodel.ReplyRequestSuffix),
|
|
InteractionURI: status.URI,
|
|
InteractionType: gtsmodel.InteractionReply,
|
|
Polite: util.Ptr(false),
|
|
Reply: status,
|
|
ResponseURI: uris.GenerateURIForAccept(status.InReplyToAccount.Username, requestID),
|
|
AuthorizationURI: uris.GenerateURIForAuthorization(status.InReplyToAccount.Username, requestID),
|
|
AcceptedAt: time.Now(),
|
|
}
|
|
if err := p.state.DB.PutInteractionRequest(ctx, approval); err != nil {
|
|
return gtserror.Newf("db error putting pre-approved interaction request: %w", err)
|
|
}
|
|
|
|
// Mark the status as now approved.
|
|
status.PendingApproval = util.Ptr(false)
|
|
status.PreApproved = false
|
|
status.ApprovedByURI = approval.AuthorizationURI
|
|
if err := p.state.DB.UpdateStatus(
|
|
ctx,
|
|
status,
|
|
"pending_approval",
|
|
"approved_by_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating status: %w", err)
|
|
}
|
|
|
|
// Send out the approval as Accept.
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
return gtserror.Newf("error federating pre-approval of reply: %w", err)
|
|
}
|
|
|
|
// Don't return, just continue as normal.
|
|
}
|
|
|
|
// Update stats for the remote account.
|
|
if err := p.utils.incrementStatusesCount(ctx, fMsg.Requesting, status); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, status); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
if status.InReplyToID != "" {
|
|
// Interaction counts changed on the replied status; uncache the
|
|
// prepared version from all timelines. The status dereferencer
|
|
// functions will ensure necessary ancestors exist before this point.
|
|
p.surface.invalidateStatusFromTimelines(status.InReplyToID)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CreateReplyRequest handles a polite ReplyRequest.
|
|
// This is distinct from CreateStatus, which is capable
|
|
// of handling both "normal" top-level status creation,
|
|
// in addition to *impolite* reply requests.
|
|
func (p *fediAPI) CreateReplyRequest(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Extract the ap model Statusable
|
|
// set by the federating db.
|
|
statusable, ok := fMsg.APObject.(ap.Statusable)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> ap.Statusable", fMsg.APObject)
|
|
}
|
|
|
|
// Call RefreshStatus to parse and process the
|
|
// statusable. This will also check permissions.
|
|
replyURI := ap.GetJSONLDId(statusable).String()
|
|
reply, _, err := p.federate.RefreshStatus(ctx,
|
|
fMsg.Receiving.Username,
|
|
>smodel.Status{
|
|
URI: replyURI,
|
|
Local: util.Ptr(false),
|
|
},
|
|
statusable,
|
|
// Force refresh within 5min window.
|
|
dereferencing.Fresh,
|
|
)
|
|
|
|
switch {
|
|
case err == nil:
|
|
// All fine.
|
|
|
|
case gtserror.IsNotPermitted(err):
|
|
// Reply is straight up not permitted by
|
|
// the interaction policy of the status
|
|
// it's replying to. Nothing more to do.
|
|
log.Debugf(ctx,
|
|
"dropping unpermitted ReplyRequest with instrument %s",
|
|
replyURI,
|
|
)
|
|
return nil
|
|
|
|
default:
|
|
// There's some real error.
|
|
return gtserror.Newf(
|
|
"error processing ReplyRequest with instrument %s: %w",
|
|
replyURI, err,
|
|
)
|
|
}
|
|
|
|
// The reply is permitted. Check if we
|
|
// should send out an Accept immediately.
|
|
manualApproval := *reply.PendingApproval && !reply.PreApproved
|
|
if manualApproval {
|
|
// The reply requires manual approval.
|
|
//
|
|
// Just notify target account about
|
|
// the requested interaction.
|
|
if err := p.surface.notifyPendingReply(ctx, reply); err != nil {
|
|
return gtserror.Newf("error notifying pending reply: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// The reply is automatically approved,
|
|
// handle side effects of this.
|
|
req, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// Mark the request as accepted.
|
|
req.AcceptedAt = time.Now()
|
|
req.ResponseURI = uris.GenerateURIForAccept(
|
|
req.TargetAccount.Username, req.ID,
|
|
)
|
|
req.AuthorizationURI = uris.GenerateURIForAuthorization(
|
|
req.TargetAccount.Username, req.ID,
|
|
)
|
|
|
|
// Update in the db.
|
|
if err := p.state.DB.UpdateInteractionRequest(
|
|
ctx,
|
|
req,
|
|
"accepted_at",
|
|
"response_uri",
|
|
"authorization_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating interaction request: %w", err)
|
|
}
|
|
|
|
// Send out the accept.
|
|
if err := p.federate.AcceptInteraction(ctx, req); err != nil {
|
|
log.Errorf(ctx, "error federating accept: %v", err)
|
|
}
|
|
|
|
// Update stats for the replying account.
|
|
if err := p.utils.incrementStatusesCount(ctx, fMsg.Requesting, reply); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Timeline the reply + notify recipient(s).
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the replied status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(reply.InReplyToID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) CreatePollVote(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Cast poll vote type from the worker message.
|
|
vote, ok := fMsg.GTSModel.(*gtsmodel.PollVote)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.PollVote", fMsg.GTSModel)
|
|
}
|
|
|
|
// Insert the new poll vote in the database, note this
|
|
// will handle updating votes on the poll model itself.
|
|
if err := p.state.DB.PutPollVote(ctx, vote); err != nil {
|
|
return gtserror.Newf("error inserting poll vote in db: %w", err)
|
|
}
|
|
|
|
// Ensure the poll vote is fully populated at this point.
|
|
if err := p.state.DB.PopulatePollVote(ctx, vote); err != nil {
|
|
return gtserror.Newf("error populating poll vote from db: %w", err)
|
|
}
|
|
|
|
// Ensure the poll on the vote is fully populated to get origin status.
|
|
if err := p.state.DB.PopulatePoll(ctx, vote.Poll); err != nil {
|
|
return gtserror.Newf("error populating poll from db: %w", err)
|
|
}
|
|
|
|
// Get the origin status,
|
|
// (also set the poll on it).
|
|
status := vote.Poll.Status
|
|
status.Poll = vote.Poll
|
|
|
|
if *status.Local {
|
|
// Before federating it, increment the poll vote
|
|
// and voter counts, *only on our local copy*.
|
|
status.Poll.IncrementVotes(vote.Choices, true)
|
|
|
|
// These were poll votes in a local status, we need to
|
|
// federate the updated status model with latest vote counts.
|
|
if err := p.federate.UpdateStatus(ctx, status); err != nil {
|
|
log.Errorf(ctx, "error federating status update: %v", err)
|
|
}
|
|
}
|
|
|
|
// Interaction counts changed, uncache from timelines.
|
|
p.surface.invalidateStatusFromTimelines(status.ID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UpdatePollVote(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Cast poll vote type from the worker message.
|
|
vote, ok := fMsg.GTSModel.(*gtsmodel.PollVote)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.PollVote", fMsg.GTSModel)
|
|
}
|
|
|
|
// Update poll vote model (specifically only choices) in the database.
|
|
if err := p.state.DB.UpdatePollVote(ctx, vote, "choices"); err != nil {
|
|
return gtserror.Newf("error updating poll vote in db: %w", err)
|
|
}
|
|
|
|
// Update the vote counts on the poll model itself. These will have
|
|
// been updated by message pusher as we can't know which were new.
|
|
if err := p.state.DB.UpdatePoll(ctx, vote.Poll, "votes"); err != nil {
|
|
return gtserror.Newf("error updating poll in db: %w", err)
|
|
}
|
|
|
|
// Get the origin status.
|
|
reply := vote.Poll.Status
|
|
|
|
if *reply.Local {
|
|
// These were poll votes in a local status, we need to
|
|
// federate the updated status model with latest vote counts.
|
|
if err := p.federate.UpdateStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error federating status update: %v", err)
|
|
}
|
|
}
|
|
|
|
// Interaction counts changed, uncache from timelines.
|
|
p.surface.invalidateStatusFromTimelines(reply.ID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) CreateFollowReq(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
followRequest, ok := fMsg.GTSModel.(*gtsmodel.FollowRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.FollowRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
if err := p.state.DB.PopulateFollowRequest(ctx, followRequest); err != nil {
|
|
return gtserror.Newf("error populating follow request: %w", err)
|
|
}
|
|
|
|
if *followRequest.TargetAccount.Locked {
|
|
// Local account is locked: just notify the follow request.
|
|
if err := p.surface.notifyFollowRequest(ctx, followRequest); err != nil {
|
|
log.Errorf(ctx, "error notifying follow request: %v", err)
|
|
}
|
|
|
|
// And update stats for the local account.
|
|
if err := p.utils.incrementFollowRequestsCount(ctx, fMsg.Receiving); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Local account is not locked:
|
|
// Automatically accept the follow request
|
|
// and notify about the new follower.
|
|
follow, err := p.state.DB.AcceptFollowRequest(
|
|
ctx,
|
|
followRequest.AccountID,
|
|
followRequest.TargetAccountID,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("error accepting follow request: %w", err)
|
|
}
|
|
|
|
// Update stats for the local account.
|
|
if err := p.utils.incrementFollowersCount(ctx, fMsg.Receiving); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Update stats for the remote account.
|
|
if err := p.utils.incrementFollowingCount(ctx, fMsg.Requesting); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
if err := p.federate.AcceptFollow(ctx, follow); err != nil {
|
|
log.Errorf(ctx, "error federating follow request accept: %v", err)
|
|
}
|
|
|
|
if err := p.surface.notifyFollow(ctx, follow); err != nil {
|
|
log.Errorf(ctx, "error notifying follow: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CreateLike handles an impolite Like, ie., a Like sent directly.
|
|
// This is different from the CreateLikeRequest function, which handles polite LikeRequests.
|
|
func (p *fediAPI) CreateLike(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
fave, ok := fMsg.GTSModel.(*gtsmodel.StatusFave)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.StatusFave", fMsg.GTSModel)
|
|
}
|
|
|
|
// Ensure fave populated.
|
|
if err := p.state.DB.PopulateStatusFave(ctx, fave); err != nil {
|
|
return gtserror.Newf("error populating status fave: %w", err)
|
|
}
|
|
|
|
// If pending approval is true then
|
|
// fave must target a LOCAL status
|
|
// that requires approval for the fave.
|
|
pendingApproval := util.PtrOrZero(fave.PendingApproval)
|
|
|
|
switch {
|
|
case pendingApproval && !fave.PreApproved:
|
|
// If approval is required and fave isn't
|
|
// preapproved, then just notify the account
|
|
// that's being interacted with: they can
|
|
// approve or deny the interaction later.
|
|
if err := p.utils.impoliteFaveRequest(ctx, fave); err != nil {
|
|
return gtserror.Newf("error pending fave: %w", err)
|
|
}
|
|
|
|
// Return early.
|
|
return nil
|
|
|
|
case pendingApproval && fave.PreApproved:
|
|
// If approval is required and fave is
|
|
// preapproved, that means this is a fave
|
|
// of one of our statuses with permission
|
|
// that matched on a following/followers
|
|
// collection. Do the Accept immediately and
|
|
// then process everything else as normal.
|
|
|
|
// Store an already-accepted
|
|
// impolite interaction request.
|
|
requestID := id.NewULID()
|
|
approval := >smodel.InteractionRequest{
|
|
ID: requestID,
|
|
TargetStatusID: fave.StatusID,
|
|
TargetAccountID: fave.TargetAccountID,
|
|
TargetAccount: fave.TargetAccount,
|
|
InteractingAccountID: fave.AccountID,
|
|
InteractingAccount: fave.Account,
|
|
InteractionRequestURI: gtsmodel.ForwardCompatibleInteractionRequestURI(fave.URI, gtsmodel.LikeRequestSuffix),
|
|
InteractionURI: fave.URI,
|
|
InteractionType: gtsmodel.InteractionLike,
|
|
Polite: util.Ptr(false),
|
|
Like: fave,
|
|
ResponseURI: uris.GenerateURIForAccept(fave.TargetAccount.Username, requestID),
|
|
AuthorizationURI: uris.GenerateURIForAuthorization(fave.TargetAccount.Username, requestID),
|
|
AcceptedAt: time.Now(),
|
|
}
|
|
if err := p.state.DB.PutInteractionRequest(ctx, approval); err != nil {
|
|
return gtserror.Newf("db error putting pre-approved interaction request: %w", err)
|
|
}
|
|
|
|
// Mark the fave itself as now approved.
|
|
fave.PendingApproval = util.Ptr(false)
|
|
fave.PreApproved = false
|
|
fave.ApprovedByURI = approval.AuthorizationURI
|
|
if err := p.state.DB.UpdateStatusFave(
|
|
ctx,
|
|
fave,
|
|
"pending_approval",
|
|
"approved_by_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating status fave: %w", err)
|
|
}
|
|
|
|
// Send out the approval as Accept.
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
return gtserror.Newf("error federating pre-approval of fave: %w", err)
|
|
}
|
|
|
|
// Don't return, just continue as normal.
|
|
}
|
|
|
|
if err := p.surface.notifyFave(ctx, fave); err != nil {
|
|
log.Errorf(ctx, "error notifying fave: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the faved status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(fave.StatusID)
|
|
|
|
return nil
|
|
}
|
|
|
|
// CreateLikeRequest handles a polite LikeRequest, as
|
|
// opposed to CreateLike, which handles *impolite* like
|
|
// requests (ie., Likes sent directly).
|
|
func (p *fediAPI) CreateLikeRequest(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
req, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// At this point the not-yet-approved
|
|
// interaction request, and the pending
|
|
// fave, are both in the database.
|
|
|
|
if !req.Like.PreApproved {
|
|
// The fave is *not* pre-approved, and
|
|
// therefore requires manual approval.
|
|
//
|
|
// Just notify target account about
|
|
// the requested interaction.
|
|
if err := p.surface.notifyPendingFave(ctx, req.Like); err != nil {
|
|
return gtserror.Newf("error notifying pending like: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// If it's pre-approved on the other hand
|
|
// we can handle everything immediately.
|
|
|
|
// Mark the request as accepted.
|
|
req.AcceptedAt = time.Now()
|
|
req.ResponseURI = uris.GenerateURIForAccept(
|
|
req.TargetAccount.Username, req.ID,
|
|
)
|
|
req.AuthorizationURI = uris.GenerateURIForAuthorization(
|
|
req.TargetAccount.Username, req.ID,
|
|
)
|
|
|
|
// Update in the db.
|
|
if err := p.state.DB.UpdateInteractionRequest(
|
|
ctx,
|
|
req,
|
|
"accepted_at",
|
|
"response_uri",
|
|
"authorization_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating interaction request: %w", err)
|
|
}
|
|
|
|
// Send out the accept.
|
|
if err := p.federate.AcceptInteraction(ctx, req); err != nil {
|
|
log.Errorf(ctx, "error federating accept: %v", err)
|
|
}
|
|
|
|
// Mark the fave as approved.
|
|
req.Like.PendingApproval = util.Ptr(false)
|
|
req.Like.ApprovedByURI = req.AuthorizationURI
|
|
req.Like.PreApproved = false
|
|
|
|
// Update in the db.
|
|
if err := p.state.DB.UpdateStatusFave(
|
|
ctx,
|
|
req.Like,
|
|
"pending_approval",
|
|
"approved_by_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating status fave: %w", err)
|
|
}
|
|
|
|
// Notify the faved account.
|
|
if err := p.surface.notifyFave(ctx, req.Like); err != nil {
|
|
log.Errorf(ctx, "error notifying fave: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the faved status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(req.Like.StatusID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) CreateAnnounce(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
boost, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
}
|
|
|
|
// Dereference into a boost wrapper status.
|
|
//
|
|
// Note: this will handle storing the boost in
|
|
// the db, and dereferencing the target status
|
|
// ancestors / descendants where appropriate.
|
|
var err error
|
|
boost, err = p.federate.EnrichAnnounce(
|
|
ctx,
|
|
boost,
|
|
fMsg.Receiving.Username,
|
|
)
|
|
if err != nil {
|
|
if gtserror.IsUnretrievable(err) ||
|
|
gtserror.IsNotPermitted(err) {
|
|
// Boosted status domain blocked, or
|
|
// otherwise not permitted, nothing to do.
|
|
log.Debugf(ctx, "skipping announce: %v", err)
|
|
return nil
|
|
}
|
|
|
|
// Actual error.
|
|
return gtserror.Newf("error dereferencing announce: %w", err)
|
|
}
|
|
|
|
// If pending approval is true then
|
|
// boost must target a LOCAL status
|
|
// that requires approval for the boost.
|
|
pendingApproval := util.PtrOrZero(boost.PendingApproval)
|
|
|
|
switch {
|
|
case pendingApproval && !boost.PreApproved:
|
|
// If approval is required and boost isn't
|
|
// preapproved, then just notify the account
|
|
// that's being interacted with: they can
|
|
// approve or deny the interaction later.
|
|
if err := p.utils.impoliteAnnounceRequest(ctx, boost); err != nil {
|
|
return gtserror.Newf("error pending boost: %w", err)
|
|
}
|
|
|
|
// Return early.
|
|
return nil
|
|
|
|
case pendingApproval && boost.PreApproved:
|
|
// If approval is required and status is
|
|
// preapproved, that means this is a boost
|
|
// of one of our statuses with permission
|
|
// that matched on a following/followers
|
|
// collection. Do the Accept immediately and
|
|
// then process everything else as normal.
|
|
|
|
// Store an already-accepted
|
|
// impolite interaction request.
|
|
requestID := id.NewULID()
|
|
approval := >smodel.InteractionRequest{
|
|
ID: requestID,
|
|
TargetStatusID: boost.BoostOfID,
|
|
TargetAccountID: boost.BoostOfAccountID,
|
|
TargetAccount: boost.BoostOfAccount,
|
|
InteractingAccountID: boost.AccountID,
|
|
InteractingAccount: boost.Account,
|
|
InteractionRequestURI: gtsmodel.ForwardCompatibleInteractionRequestURI(boost.URI, gtsmodel.AnnounceRequestSuffix),
|
|
InteractionURI: boost.URI,
|
|
InteractionType: gtsmodel.InteractionAnnounce,
|
|
Polite: util.Ptr(false),
|
|
Announce: boost,
|
|
ResponseURI: uris.GenerateURIForAccept(boost.BoostOfAccount.Username, requestID),
|
|
AuthorizationURI: uris.GenerateURIForAuthorization(boost.BoostOfAccount.Username, requestID),
|
|
AcceptedAt: time.Now(),
|
|
}
|
|
if err := p.state.DB.PutInteractionRequest(ctx, approval); err != nil {
|
|
return gtserror.Newf("db error putting pre-approved interaction request: %w", err)
|
|
}
|
|
|
|
// Mark the boost itself as now approved.
|
|
boost.PendingApproval = util.Ptr(false)
|
|
boost.PreApproved = false
|
|
boost.ApprovedByURI = approval.AuthorizationURI
|
|
if err := p.state.DB.UpdateStatus(
|
|
ctx,
|
|
boost,
|
|
"pending_approval",
|
|
"approved_by_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating status: %w", err)
|
|
}
|
|
|
|
// Send out the approval as Accept.
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
return gtserror.Newf("error federating pre-approval of boost: %w", err)
|
|
}
|
|
|
|
// Don't return, just continue as normal.
|
|
}
|
|
|
|
// Update stats for the remote account.
|
|
if err := p.utils.incrementStatusesCount(ctx, fMsg.Requesting, boost); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Timeline and notify the announce.
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, boost); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
if err := p.surface.notifyAnnounce(ctx, boost); err != nil {
|
|
log.Errorf(ctx, "error notifying announce: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the original status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(boost.BoostOfID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) CreateAnnounceRequest(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
req, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// At this point the not-yet-handled interaction req
|
|
// is in the database, but the announce isn't yet.
|
|
//
|
|
// We can check permissions for the announce *and*
|
|
// put it in the db (if acceptable) by doing Enrich.
|
|
boost, err := p.federate.EnrichAnnounce(
|
|
ctx,
|
|
req.Announce,
|
|
fMsg.Receiving.Username,
|
|
)
|
|
|
|
switch {
|
|
case err == nil:
|
|
// All fine.
|
|
|
|
case gtserror.IsNotPermitted(err):
|
|
// Announce is straight up not permitted
|
|
// by the interaction policy of the status
|
|
// it's targeting. Nothing more to do.
|
|
log.Debugf(ctx,
|
|
"dropping unpermitted AnnounceRequest with instrument %s",
|
|
req.Announce.URI,
|
|
)
|
|
return nil
|
|
|
|
default:
|
|
// There's some real error.
|
|
return gtserror.Newf(
|
|
"error processing AnnounceRequest with instrument %s: %w",
|
|
req.Announce.URI, err,
|
|
)
|
|
}
|
|
|
|
// The announce is permitted. Check if we
|
|
// should send out an Accept immediately.
|
|
manualApproval := *boost.PendingApproval && !boost.PreApproved
|
|
if manualApproval {
|
|
// The announce requires manual approval.
|
|
//
|
|
// Just notify target account about
|
|
// the requested interaction.
|
|
if err := p.surface.notifyPendingAnnounce(ctx, boost); err != nil {
|
|
return gtserror.Newf("error notifying pending announce: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// The announce is automatically approved,
|
|
// mark the request as accepted.
|
|
req.AcceptedAt = time.Now()
|
|
req.ResponseURI = uris.GenerateURIForAccept(
|
|
req.TargetAccount.Username, req.ID,
|
|
)
|
|
req.AuthorizationURI = uris.GenerateURIForAuthorization(
|
|
req.TargetAccount.Username, req.ID,
|
|
)
|
|
|
|
// Update in the db.
|
|
if err := p.state.DB.UpdateInteractionRequest(
|
|
ctx,
|
|
req,
|
|
"accepted_at",
|
|
"response_uri",
|
|
"authorization_uri",
|
|
); err != nil {
|
|
return gtserror.Newf("db error updating interaction request: %w", err)
|
|
}
|
|
|
|
// Send out the accept.
|
|
if err := p.federate.AcceptInteraction(ctx, req); err != nil {
|
|
log.Errorf(ctx, "error federating accept: %v", err)
|
|
}
|
|
|
|
// Update stats for the boosting account.
|
|
if err := p.utils.incrementStatusesCount(ctx, fMsg.Requesting, boost); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Timeline the boost + notify recipient(s).
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, boost); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the boosted status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(boost.BoostOfID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) CreateBlock(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
block, ok := fMsg.GTSModel.(*gtsmodel.Block)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Block", fMsg.GTSModel)
|
|
}
|
|
|
|
if block.Account.IsLocal() {
|
|
// Remove posts by target from origin's timelines.
|
|
p.surface.removeRelationshipFromTimelines(ctx,
|
|
block.AccountID,
|
|
block.TargetAccountID,
|
|
)
|
|
}
|
|
|
|
if block.TargetAccount.IsLocal() {
|
|
// Remove posts by origin from target's timelines.
|
|
p.surface.removeRelationshipFromTimelines(ctx,
|
|
block.TargetAccountID,
|
|
block.AccountID,
|
|
)
|
|
}
|
|
|
|
// Remove any follows that existed between blocker + blockee.
|
|
// (note this handles removing any necessary list entries).
|
|
if err := p.state.DB.DeleteFollow(ctx,
|
|
block.AccountID,
|
|
block.TargetAccountID,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error deleting follow from block -> target: %v", err)
|
|
}
|
|
|
|
if err := p.state.DB.DeleteFollow(ctx,
|
|
block.TargetAccountID,
|
|
block.AccountID,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error deleting follow from target -> block: %v", err)
|
|
}
|
|
|
|
// Remove any follow requests that existed between blocker + blockee.
|
|
if err := p.state.DB.DeleteFollowRequest(ctx,
|
|
block.AccountID,
|
|
block.TargetAccountID,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error deleting follow request from block -> target: %v", err)
|
|
}
|
|
|
|
if err := p.state.DB.DeleteFollowRequest(ctx,
|
|
block.TargetAccountID,
|
|
block.AccountID,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error deleting follow request from target -> block: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) CreateFlag(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
incomingReport, ok := fMsg.GTSModel.(*gtsmodel.Report)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Report", fMsg.GTSModel)
|
|
}
|
|
|
|
// TODO: handle additional side effects of flag creation:
|
|
// - notify admins by dm / notification
|
|
|
|
if err := p.surface.emailAdminReportOpened(ctx, incomingReport); err != nil {
|
|
log.Errorf(ctx, "error emailing report opened: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UpdateAccount(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Parse the old/existing account model.
|
|
account, ok := fMsg.GTSModel.(*gtsmodel.Account)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Account", fMsg.GTSModel)
|
|
}
|
|
|
|
// Because this was an Update, the new Accountable should be set on the message.
|
|
apubAcc, ok := fMsg.APObject.(ap.Accountable)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> ap.Accountable", fMsg.APObject)
|
|
}
|
|
|
|
// Fetch up-to-date bio, avatar, header, etc.
|
|
_, _, err := p.federate.RefreshAccount(
|
|
ctx,
|
|
fMsg.Receiving.Username,
|
|
account,
|
|
apubAcc,
|
|
|
|
// Force refresh within 5s window.
|
|
//
|
|
// Missing account updates could be
|
|
// detrimental to federation if they
|
|
// include public key changes.
|
|
dereferencing.Freshest,
|
|
)
|
|
if err != nil {
|
|
log.Errorf(ctx, "error refreshing account: %v", err)
|
|
}
|
|
|
|
// Account representation has changed, invalidate from timelines.
|
|
p.surface.invalidateTimelineEntriesByAccount(account.ID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) AcceptFollow(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Update stats for the remote account.
|
|
if err := p.utils.decrementFollowRequestsCount(ctx, fMsg.Requesting); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
if err := p.utils.incrementFollowersCount(ctx, fMsg.Requesting); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Update stats for the local account.
|
|
if err := p.utils.incrementFollowingCount(ctx, fMsg.Receiving); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) AcceptLike(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// TODO: Add something here if we ever implement sending out Likes to
|
|
// followers more broadly and not just the owner of the Liked status.
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) AcceptReply(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
reply, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
}
|
|
|
|
// Update stats for the actor account.
|
|
if err := p.utils.incrementStatusesCount(ctx, reply.Account, reply); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Timeline and notify the status.
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
// Send out the reply again, fully this time.
|
|
if err := p.federate.CreateStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error federating announce: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the replied-to status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(reply.InReplyToID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) AcceptRemoteStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// See if we can accept a remote
|
|
// status we don't have stored yet.
|
|
objectIRI, ok := fMsg.APObject.(*url.URL)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *url.URL", fMsg.APObject)
|
|
}
|
|
|
|
approvedByURI := fMsg.APIRI
|
|
if approvedByURI == nil {
|
|
return gtserror.New("approvedByURI was nil")
|
|
}
|
|
|
|
// Assume we're accepting a status; create a
|
|
// barebones status for dereferencing purposes.
|
|
bareStatus := >smodel.Status{
|
|
URI: objectIRI.String(),
|
|
ApprovedByURI: approvedByURI.String(),
|
|
}
|
|
|
|
// Call RefreshStatus() to process the provided
|
|
// barebones status and insert it into the database,
|
|
// if indeed it's actually a status URI we can fetch.
|
|
//
|
|
// This will also check whether the given approvedByURI
|
|
// actually grants permission for this status.
|
|
reply, _, err := p.federate.RefreshStatus(ctx,
|
|
fMsg.Receiving.Username,
|
|
bareStatus,
|
|
nil, nil,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("error processing accepted status %s: %w", bareStatus.URI, err)
|
|
}
|
|
|
|
// No error means it was indeed a remote status, and the
|
|
// given approvedByURI permitted it. Timeline and notify it.
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the interacted status;
|
|
// uncache the prepared version from all timelines.
|
|
if reply.InReplyToID != "" {
|
|
p.surface.invalidateStatusFromTimelines(reply.InReplyToID)
|
|
}
|
|
|
|
if reply.BoostOfID != "" {
|
|
p.surface.invalidateStatusFromTimelines(reply.BoostOfID)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) AcceptPoliteReplyRequest(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
if util.IsNil(fMsg.GTSModel) {
|
|
// If the interaction request is nil, this
|
|
// must be an accept of a remote ReplyRequest
|
|
// not targeting one of our statuses.
|
|
//
|
|
// Just pass it to the AcceptRemoteStatus
|
|
// func to do dereferencing + side effects.
|
|
log.Debug(ctx, "accepting remote ReplyRequest for remote reply")
|
|
return p.AcceptRemoteStatus(ctx, fMsg)
|
|
}
|
|
|
|
// If the interaction request is not nil, this will
|
|
// be an accept of one of our replies to a remote.
|
|
//
|
|
// Since the int req + reply have already been updated
|
|
// in the federatingDB, we just need to do side effects.
|
|
intReq, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// Ensure reply populated.
|
|
reply := intReq.Reply
|
|
if err := p.state.DB.PopulateStatus(ctx, reply); err != nil {
|
|
return gtserror.Newf("error populating status: %w", err)
|
|
}
|
|
|
|
// Update stats for the actor account.
|
|
if err := p.utils.incrementStatusesCount(ctx, reply.Account, reply); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Timeline and notify the status.
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
// Send out the reply with approval attached.
|
|
if err := p.federate.CreateStatus(ctx, reply); err != nil {
|
|
log.Errorf(ctx, "error federating announce: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the replied-to status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(reply.InReplyToID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) AcceptAnnounce(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
boost, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
}
|
|
|
|
// Update stats for the actor account.
|
|
if err := p.utils.incrementStatusesCount(ctx, boost.Account, boost); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Timeline and notify the boost wrapper status.
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, boost); err != nil {
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
}
|
|
|
|
// Send out the boost again, fully this time.
|
|
if err := p.federate.Announce(ctx, boost); err != nil {
|
|
log.Errorf(ctx, "error federating announce: %v", err)
|
|
}
|
|
|
|
// Interaction counts changed on the boosted status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(boost.BoostOfID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UpdateStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
// Cast the existing Status model attached to msg.
|
|
existing, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Status", fMsg.GTSModel)
|
|
}
|
|
|
|
var freshness *dereferencing.FreshnessWindow
|
|
|
|
// Cast the updated ActivityPub statusable object .
|
|
apStatus, _ := fMsg.APObject.(ap.Statusable)
|
|
|
|
if apStatus != nil {
|
|
// If an AP object was provided, we
|
|
// allow very fast refreshes that likely
|
|
// indicate a status edit after post.
|
|
freshness = dereferencing.Freshest
|
|
}
|
|
|
|
// Fetch up-to-date attach status attachments, etc.
|
|
status, _, err := p.federate.RefreshStatus(
|
|
ctx,
|
|
fMsg.Receiving.Username,
|
|
existing,
|
|
apStatus,
|
|
freshness,
|
|
)
|
|
if err != nil {
|
|
log.Errorf(ctx, "error refreshing status: %v", err)
|
|
}
|
|
|
|
if status.Poll != nil && status.Poll.Closing {
|
|
|
|
// If the latest status has a newly closed poll, at least compared
|
|
// to the existing version, then notify poll close to all voters.
|
|
if err := p.surface.notifyPollClose(ctx, status); err != nil {
|
|
log.Errorf(ctx, "error sending poll notification: %v", err)
|
|
}
|
|
}
|
|
|
|
// Notify any *new* mentions added
|
|
// to this status by the editor.
|
|
for _, mention := range status.Mentions {
|
|
// Check if we've seen
|
|
// this mention already.
|
|
if !mention.IsNew {
|
|
// Already seen
|
|
// it, skip.
|
|
continue
|
|
}
|
|
|
|
// Haven't seen this mention
|
|
// yet, notify it if necessary.
|
|
mention.Status = status
|
|
if err := p.surface.notifyMention(ctx, mention); err != nil {
|
|
log.Errorf(ctx, "error notifying mention: %v", err)
|
|
}
|
|
}
|
|
|
|
if len(status.EditIDs) > 0 {
|
|
// Ensure edits are fully populated for this status before anything.
|
|
if err := p.surface.State.DB.PopulateStatusEdits(ctx, status); err != nil {
|
|
log.Error(ctx, "error populating updated status edits: %v")
|
|
|
|
// Then send notifications of a status edit
|
|
// to any local interactors of the status.
|
|
} else if err := p.surface.notifyStatusEdit(ctx,
|
|
status,
|
|
status.Edits[len(status.Edits)-1], // latest
|
|
); err != nil {
|
|
log.Errorf(ctx, "error notifying status edit: %v", err)
|
|
}
|
|
}
|
|
|
|
// Push message that the status has been edited to streams.
|
|
if err := p.surface.timelineStatusUpdate(ctx, status); err != nil {
|
|
log.Errorf(ctx, "error streaming status edit: %v", err)
|
|
}
|
|
|
|
// Status representation changed, uncache from timelines.
|
|
p.surface.invalidateStatusFromTimelines(status.ID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) DeleteStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
status, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
}
|
|
|
|
// Try to populate status structs if possible,
|
|
// in order to more thoroughly remove them.
|
|
if err := p.state.DB.PopulateStatus(
|
|
ctx, status,
|
|
); err != nil && !errors.Is(err, db.ErrNoEntries) {
|
|
return gtserror.Newf("db error populating status: %w", err)
|
|
}
|
|
|
|
// Drop any outgoing queued AP requests about / targeting
|
|
// this status, (stops queued likes, boosts, creates etc).
|
|
p.state.Workers.Delivery.Queue.Delete("ObjectID", status.URI)
|
|
p.state.Workers.Delivery.Queue.Delete("TargetID", status.URI)
|
|
|
|
// Drop any incoming queued client messages about / targeting
|
|
// status, (stops processing of local origin data for status).
|
|
p.state.Workers.Client.Queue.Delete("TargetURI", status.URI)
|
|
|
|
// Drop any incoming queued federator messages targeting status,
|
|
// (stops processing of remote origin data targeting this status).
|
|
p.state.Workers.Federator.Queue.Delete("TargetURI", status.URI)
|
|
|
|
// Delete attachments from this status, since this request
|
|
// comes from the federating API, and there's no way the
|
|
// poster can do a delete + redraft for it on our instance.
|
|
const deleteAttachments = true
|
|
|
|
// This is just a deletion, not a Reject,
|
|
// we don't need to take a copy of this status.
|
|
const copyToSinBin = false
|
|
|
|
// Perform the actual status deletion.
|
|
if err := p.utils.wipeStatus(
|
|
ctx,
|
|
status,
|
|
deleteAttachments,
|
|
copyToSinBin,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error wiping status: %v", err)
|
|
}
|
|
|
|
// Update stats for the remote account.
|
|
if err := p.utils.decrementStatusesCount(ctx, fMsg.Requesting, status); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
if status.InReplyToID != "" {
|
|
// Interaction counts changed on the replied status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(status.InReplyToID)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) DeleteAccount(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
account, ok := fMsg.GTSModel.(*gtsmodel.Account)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Account", fMsg.GTSModel)
|
|
}
|
|
|
|
// Drop any outgoing queued AP requests to / from / targeting
|
|
// this account, (stops queued likes, boosts, creates etc).
|
|
p.state.Workers.Delivery.Queue.Delete("ObjectID", account.URI)
|
|
p.state.Workers.Delivery.Queue.Delete("TargetID", account.URI)
|
|
|
|
// Drop any incoming queued client messages to / from this
|
|
// account, (stops processing of local origin data for acccount).
|
|
p.state.Workers.Client.Queue.Delete("Target.ID", account.ID)
|
|
p.state.Workers.Client.Queue.Delete("TargetURI", account.URI)
|
|
|
|
// Drop any incoming queued federator messages to this account,
|
|
// (stops processing of remote origin data targeting this account).
|
|
p.state.Workers.Federator.Queue.Delete("Requesting.ID", account.ID)
|
|
p.state.Workers.Federator.Queue.Delete("TargetURI", account.URI)
|
|
|
|
// Remove any entries authored by account from timelines.
|
|
p.surface.removeTimelineEntriesByAccount(account.ID)
|
|
|
|
// And finally, perform the actual account deletion synchronously.
|
|
if err := p.account.Delete(ctx, account, account.ID); err != nil {
|
|
log.Errorf(ctx, "error deleting account: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) RejectLike(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
req, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// At this point the InteractionRequest should already
|
|
// be in the database, we just need to do side effects.
|
|
|
|
// Send out the Reject.
|
|
if err := p.federate.RejectInteraction(ctx, req); err != nil {
|
|
log.Errorf(ctx, "error federating rejection of like: %v", err)
|
|
}
|
|
|
|
// Get the rejected fave.
|
|
fave, err := p.state.DB.GetStatusFaveByURI(
|
|
gtscontext.SetBarebones(ctx),
|
|
req.InteractionURI,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("db error getting rejected fave: %w", err)
|
|
}
|
|
|
|
// Delete the fave.
|
|
if err := p.state.DB.DeleteStatusFaveByID(ctx, fave.ID); err != nil {
|
|
return gtserror.Newf("db error deleting fave: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) RejectReply(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
req, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// At this point the InteractionRequest should already
|
|
// be in the database, we just need to do side effects.
|
|
|
|
// Get the rejected status.
|
|
reply, err := p.state.DB.GetStatusByURI(
|
|
gtscontext.SetBarebones(ctx),
|
|
req.InteractionURI,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("db error getting rejected reply: %w", err)
|
|
}
|
|
|
|
// Delete attachments from this status.
|
|
// It's rejected so there's no possibility
|
|
// for the poster to delete + redraft it.
|
|
const deleteAttachments = true
|
|
|
|
// Keep a copy of the status in
|
|
// the sin bin for future review.
|
|
const copyToSinBin = true
|
|
|
|
// Perform the actual status deletion.
|
|
if err := p.utils.wipeStatus(
|
|
ctx,
|
|
reply,
|
|
deleteAttachments,
|
|
copyToSinBin,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error wiping reply: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) RejectAnnounce(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
req, ok := fMsg.GTSModel.(*gtsmodel.InteractionRequest)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.InteractionRequest", fMsg.GTSModel)
|
|
}
|
|
|
|
// At this point the InteractionRequest should already
|
|
// be in the database, we just need to do side effects.
|
|
|
|
// Get the rejected boost.
|
|
boost, err := p.state.DB.GetStatusByURI(
|
|
gtscontext.SetBarebones(ctx),
|
|
req.InteractionURI,
|
|
)
|
|
if err != nil {
|
|
return gtserror.Newf("db error getting rejected announce: %w", err)
|
|
}
|
|
|
|
// Boosts don't have attachments anyway
|
|
// so it doesn't matter what we set here.
|
|
const deleteAttachments = true
|
|
|
|
// This is just a boost, don't
|
|
// keep a copy in the sin bin.
|
|
const copyToSinBin = true
|
|
|
|
// Perform the actual status deletion.
|
|
if err := p.utils.wipeStatus(
|
|
ctx,
|
|
boost,
|
|
deleteAttachments,
|
|
copyToSinBin,
|
|
); err != nil {
|
|
log.Errorf(ctx, "error wiping announce: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UndoFollow(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
follow, ok := fMsg.GTSModel.(*gtsmodel.Follow)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Follow", fMsg.GTSModel)
|
|
}
|
|
|
|
if follow.Account.IsLocal() {
|
|
// Remove posts by target from origin's timelines.
|
|
p.surface.removeRelationshipFromTimelines(ctx,
|
|
follow.AccountID,
|
|
follow.TargetAccountID,
|
|
)
|
|
}
|
|
|
|
if follow.TargetAccount.IsLocal() {
|
|
// Remove posts by origin from target's timelines.
|
|
p.surface.removeRelationshipFromTimelines(ctx,
|
|
follow.TargetAccountID,
|
|
follow.AccountID,
|
|
)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UndoBlock(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
_, ok := fMsg.GTSModel.(*gtsmodel.Block)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Block", fMsg.GTSModel)
|
|
}
|
|
|
|
// TODO: any required changes
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UndoAnnounce(
|
|
ctx context.Context,
|
|
fMsg *messages.FromFediAPI,
|
|
) error {
|
|
boost, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
}
|
|
|
|
// Delete the boost wrapper itself.
|
|
if err := p.state.DB.DeleteStatusByID(ctx, boost.ID); err != nil {
|
|
return gtserror.Newf("db error deleting boost: %w", err)
|
|
}
|
|
|
|
// Update statuses count for the requesting account.
|
|
if err := p.utils.decrementStatusesCount(ctx, fMsg.Requesting, boost); err != nil {
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
}
|
|
|
|
// Remove the boost wrapper from all timelines.
|
|
p.surface.deleteStatusFromTimelines(ctx, boost.ID)
|
|
|
|
// Interaction counts changed on the boosted status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(boost.BoostOfID)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (p *fediAPI) UndoFave(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
statusFave, ok := fMsg.GTSModel.(*gtsmodel.StatusFave)
|
|
if !ok {
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.StatusFave", fMsg.GTSModel)
|
|
}
|
|
|
|
// Interaction counts changed on the faved status;
|
|
// uncache the prepared version from all timelines.
|
|
p.surface.invalidateStatusFromTimelines(statusFave.StatusID)
|
|
|
|
return nil
|
|
}
|