mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 23:42:25 -05:00 
			
		
		
		
	* start replacing client + federator + media workers with new worker + queue types
* refactor federatingDB.Delete(), drop queued messages when deleting account / status
* move all queue purging to the processor workers
* undo toolchain updates
* code comments, ensure dereferencer worker pool gets started
* update gruf libraries in readme
* start the job scheduler separately to the worker pools
* reshuffle ordering or server.go + remove duplicate worker start / stop
* update go-list version
* fix vendoring
* move queue invalidation to before wipeing / deletion, to ensure queued work not dropped
* add logging to worker processing functions in testrig, don't start workers in unexpected places
* update go-structr to add (+then rely on) QueueCtx{} type
* ensure more worker pools get started properly in tests
* fix remaining broken tests relying on worker queue logic
* fix account test suite queue popping logic, ensure noop workers do not pull from queue
* move back accidentally shuffled account deletion order
* ensure error (non nil!!) gets passed in refactored federatingDB{}.Delete()
* silently drop deletes from accounts not permitted to
* don't warn log on forwarded deletes
* make if else clauses easier to parse
* use getFederatorMsg()
* improved code comment
* improved code comment re: requesting account delete checks
* remove boolean result from worker start / stop since false = already running or already stopped
* remove optional passed-in http.client
* remove worker starting from the admin CLI commands (we don't need to handle side-effects)
* update prune cli to start scheduler but not all of the workers
* fix rebase issues
* remove redundant return statements
* i'm sorry sir linter
		
	
			
		
			
				
	
	
		
			154 lines
		
	
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			154 lines
		
	
	
	
		
			4.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package federatingdb
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 
 | |
| 	"codeberg.org/gruf/go-logger/v2/level"
 | |
| 	"github.com/superseriousbusiness/activity/streams/vocab"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/log"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/uris"
 | |
| )
 | |
| 
 | |
| func (f *federatingDB) Accept(ctx context.Context, accept vocab.ActivityStreamsAccept) error {
 | |
| 	if log.Level() >= level.DEBUG {
 | |
| 		i, err := marshalItem(accept)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		l := log.WithContext(ctx).
 | |
| 			WithField("accept", i)
 | |
| 		l.Debug("entering Accept")
 | |
| 	}
 | |
| 
 | |
| 	activityContext := getActivityContext(ctx)
 | |
| 	if activityContext.internal {
 | |
| 		return nil // Already processed.
 | |
| 	}
 | |
| 
 | |
| 	requestingAcct := activityContext.requestingAcct
 | |
| 	receivingAcct := activityContext.receivingAcct
 | |
| 
 | |
| 	if requestingAcct.IsMoving() {
 | |
| 		// A Moving account
 | |
| 		// can't do this.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Iterate all provided objects in the activity.
 | |
| 	for _, object := range ap.ExtractObjects(accept) {
 | |
| 
 | |
| 		// Check and handle any vocab.Type objects.
 | |
| 		if objType := object.GetType(); objType != nil {
 | |
| 			switch objType.GetTypeName() { //nolint:gocritic
 | |
| 
 | |
| 			case ap.ActivityFollow:
 | |
| 				// Cast the vocab.Type object to known AS type.
 | |
| 				asFollow := objType.(vocab.ActivityStreamsFollow)
 | |
| 
 | |
| 				// convert the follow to something we can understand
 | |
| 				gtsFollow, err := f.converter.ASFollowToFollow(ctx, asFollow)
 | |
| 				if err != nil {
 | |
| 					return fmt.Errorf("ACCEPT: error converting asfollow to gtsfollow: %s", err)
 | |
| 				}
 | |
| 
 | |
| 				// Make sure the creator of the original follow
 | |
| 				// is the same as whatever inbox this landed in.
 | |
| 				if gtsFollow.AccountID != receivingAcct.ID {
 | |
| 					return errors.New("ACCEPT: follow account and inbox account were not the same")
 | |
| 				}
 | |
| 
 | |
| 				// Make sure the target of the original follow
 | |
| 				// is the same as the account making the request.
 | |
| 				if gtsFollow.TargetAccountID != requestingAcct.ID {
 | |
| 					return errors.New("ACCEPT: follow target account and requesting account were not the same")
 | |
| 				}
 | |
| 
 | |
| 				follow, err := f.state.DB.AcceptFollowRequest(ctx, gtsFollow.AccountID, gtsFollow.TargetAccountID)
 | |
| 				if err != nil {
 | |
| 					return err
 | |
| 				}
 | |
| 
 | |
| 				f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{
 | |
| 					APObjectType:   ap.ActivityFollow,
 | |
| 					APActivityType: ap.ActivityAccept,
 | |
| 					GTSModel:       follow,
 | |
| 					Receiving:      receivingAcct,
 | |
| 					Requesting:     requestingAcct,
 | |
| 				})
 | |
| 			}
 | |
| 
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// Check and handle any
 | |
| 		// IRI type objects.
 | |
| 		if object.IsIRI() {
 | |
| 
 | |
| 			// Extract IRI from object.
 | |
| 			iri := object.GetIRI()
 | |
| 			if !uris.IsFollowPath(iri) {
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			// Serialize IRI.
 | |
| 			iriStr := iri.String()
 | |
| 
 | |
| 			// ACCEPT FOLLOW
 | |
| 			followReq, err := f.state.DB.GetFollowRequestByURI(ctx, iriStr)
 | |
| 			if err != nil {
 | |
| 				return fmt.Errorf("ACCEPT: couldn't get follow request with id %s from the database: %s", iriStr, err)
 | |
| 			}
 | |
| 
 | |
| 			// Make sure the creator of the original follow
 | |
| 			// is the same as whatever inbox this landed in.
 | |
| 			if followReq.AccountID != receivingAcct.ID {
 | |
| 				return errors.New("ACCEPT: follow account and inbox account were not the same")
 | |
| 			}
 | |
| 
 | |
| 			// Make sure the target of the original follow
 | |
| 			// is the same as the account making the request.
 | |
| 			if followReq.TargetAccountID != requestingAcct.ID {
 | |
| 				return errors.New("ACCEPT: follow target account and requesting account were not the same")
 | |
| 			}
 | |
| 
 | |
| 			follow, err := f.state.DB.AcceptFollowRequest(ctx, followReq.AccountID, followReq.TargetAccountID)
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 
 | |
| 			f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{
 | |
| 				APObjectType:   ap.ActivityFollow,
 | |
| 				APActivityType: ap.ActivityAccept,
 | |
| 				GTSModel:       follow,
 | |
| 				Receiving:      receivingAcct,
 | |
| 				Requesting:     requestingAcct,
 | |
| 			})
 | |
| 
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |