mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-03 20:22:25 -06:00 
			
		
		
		
	* only perform status-up-to-date checks if no statusable has been provided * copy over the same style of freshness checking from status deref -> accounts * change some var names * check for empty account domain
		
			
				
	
	
		
			1042 lines
		
	
	
	
		
			34 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1042 lines
		
	
	
	
		
			34 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// GoToSocial
 | 
						|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
						|
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
						|
//
 | 
						|
// This program is free software: you can redistribute it and/or modify
 | 
						|
// it under the terms of the GNU Affero General Public License as published by
 | 
						|
// the Free Software Foundation, either version 3 of the License, or
 | 
						|
// (at your option) any later version.
 | 
						|
//
 | 
						|
// This program is distributed in the hope that it will be useful,
 | 
						|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
// GNU Affero General Public License for more details.
 | 
						|
//
 | 
						|
// You should have received a copy of the GNU Affero General Public License
 | 
						|
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
 | 
						|
package dereferencing
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"errors"
 | 
						|
	"io"
 | 
						|
	"net/url"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/superseriousbusiness/activity/streams"
 | 
						|
	"github.com/superseriousbusiness/activity/streams/vocab"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/config"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/id"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/log"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/media"
 | 
						|
	"github.com/superseriousbusiness/gotosocial/internal/transport"
 | 
						|
)
 | 
						|
 | 
						|
// accountUpToDate returns whether the given account model is both updateable (i.e.
 | 
						|
// non-instance remote account) and whether it needs an update based on `fetched_at`.
 | 
						|
func accountUpToDate(account *gtsmodel.Account, force bool) bool {
 | 
						|
	if !account.SuspendedAt.IsZero() {
 | 
						|
		// Can't update suspended accounts.
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	if account.IsLocal() {
 | 
						|
		// Can't update local accounts.
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	if !account.CreatedAt.IsZero() && account.IsInstance() {
 | 
						|
		// Existing instance account. No need for update.
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	// Default limit we allow
 | 
						|
	// statuses to be refreshed.
 | 
						|
	limit := 6 * time.Hour
 | 
						|
 | 
						|
	if force {
 | 
						|
		// We specifically allow the force flag
 | 
						|
		// to force an early refresh (on a much
 | 
						|
		// smaller cooldown period).
 | 
						|
		limit = 5 * time.Minute
 | 
						|
	}
 | 
						|
 | 
						|
	// If account was updated recently (within limit), we return as-is.
 | 
						|
	if next := account.FetchedAt.Add(limit); time.Now().Before(next) {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// GetAccountByURI will attempt to fetch an accounts by its URI, first checking the database. In the case of a newly-met remote model, or a remote model
 | 
						|
// whose last_fetched date is beyond a certain interval, the account will be dereferenced. In the case of dereferencing, some low-priority account information
 | 
						|
// may be enqueued for asynchronous fetching, e.g. featured account statuses (pins). An ActivityPub object indicates the account was dereferenced.
 | 
						|
func (d *Dereferencer) GetAccountByURI(ctx context.Context, requestUser string, uri *url.URL) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	// Fetch and dereference account if necessary.
 | 
						|
	account, accountable, err := d.getAccountByURI(ctx,
 | 
						|
		requestUser,
 | 
						|
		uri,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	if accountable != nil {
 | 
						|
		// This account was updated, enqueue re-dereference featured posts.
 | 
						|
		d.state.Workers.Federator.MustEnqueueCtx(ctx, func(ctx context.Context) {
 | 
						|
			if err := d.dereferenceAccountFeatured(ctx, requestUser, account); err != nil {
 | 
						|
				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	return account, accountable, nil
 | 
						|
}
 | 
						|
 | 
						|
// getAccountByURI is a package internal form of .GetAccountByURI() that doesn't bother dereferencing featured posts on update.
 | 
						|
func (d *Dereferencer) getAccountByURI(ctx context.Context, requestUser string, uri *url.URL) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	var (
 | 
						|
		account *gtsmodel.Account
 | 
						|
		uriStr  = uri.String()
 | 
						|
		err     error
 | 
						|
	)
 | 
						|
 | 
						|
	// Search the database for existing account with URI.
 | 
						|
	account, err = d.state.DB.GetAccountByURI(
 | 
						|
		// request a barebones object, it may be in the
 | 
						|
		// db but with related models not yet dereferenced.
 | 
						|
		gtscontext.SetBarebones(ctx),
 | 
						|
		uriStr,
 | 
						|
	)
 | 
						|
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
		return nil, nil, gtserror.Newf("error checking database for account %s by uri: %w", uriStr, err)
 | 
						|
	}
 | 
						|
 | 
						|
	if account == nil {
 | 
						|
		// Else, search the database for existing by URL.
 | 
						|
		account, err = d.state.DB.GetAccountByURL(
 | 
						|
			gtscontext.SetBarebones(ctx),
 | 
						|
			uriStr,
 | 
						|
		)
 | 
						|
		if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
			return nil, nil, gtserror.Newf("error checking database for account %s by url: %w", uriStr, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if account == nil {
 | 
						|
		// Ensure that this is isn't a search for a local account.
 | 
						|
		if uri.Host == config.GetHost() || uri.Host == config.GetAccountDomain() {
 | 
						|
			return nil, nil, gtserror.SetUnretrievable(err) // this will be db.ErrNoEntries
 | 
						|
		}
 | 
						|
 | 
						|
		// Create and pass-through a new bare-bones model for dereferencing.
 | 
						|
		return d.enrichAccountSafely(ctx, requestUser, uri, >smodel.Account{
 | 
						|
			ID:     id.NewULID(),
 | 
						|
			Domain: uri.Host,
 | 
						|
			URI:    uriStr,
 | 
						|
		}, nil)
 | 
						|
	}
 | 
						|
 | 
						|
	if accountUpToDate(account, false) {
 | 
						|
		// This is an existing account that is up-to-date,
 | 
						|
		// before returning ensure it is fully populated.
 | 
						|
		if err := d.state.DB.PopulateAccount(ctx, account); err != nil {
 | 
						|
			log.Errorf(ctx, "error populating existing account: %v", err)
 | 
						|
		}
 | 
						|
 | 
						|
		return account, nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Try to update existing account model.
 | 
						|
	latest, accountable, err := d.enrichAccountSafely(ctx,
 | 
						|
		requestUser,
 | 
						|
		uri,
 | 
						|
		account,
 | 
						|
		nil,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		log.Errorf(ctx, "error enriching remote account: %v", err)
 | 
						|
 | 
						|
		// Fallback to existing.
 | 
						|
		return account, nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	return latest, accountable, nil
 | 
						|
}
 | 
						|
 | 
						|
// GetAccountByUsernameDomain will attempt to fetch an accounts by its username@domain, first checking the database. In the case of a newly-met remote model,
 | 
						|
// or a remote model whose last_fetched date is beyond a certain interval, the account will be dereferenced. In the case of dereferencing, some low-priority
 | 
						|
// account information may be enqueued for asynchronous fetching, e.g. featured account statuses (pins). An ActivityPub object indicates the account was dereferenced.
 | 
						|
func (d *Dereferencer) GetAccountByUsernameDomain(ctx context.Context, requestUser string, username string, domain string) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	account, accountable, err := d.getAccountByUsernameDomain(
 | 
						|
		ctx,
 | 
						|
		requestUser,
 | 
						|
		username,
 | 
						|
		domain,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, err
 | 
						|
	}
 | 
						|
 | 
						|
	if accountable != nil {
 | 
						|
		// This account was updated, enqueue re-dereference featured posts.
 | 
						|
		d.state.Workers.Federator.MustEnqueueCtx(ctx, func(ctx context.Context) {
 | 
						|
			if err := d.dereferenceAccountFeatured(ctx, requestUser, account); err != nil {
 | 
						|
				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	return account, accountable, nil
 | 
						|
}
 | 
						|
 | 
						|
// getAccountByUsernameDomain is a package internal form of
 | 
						|
// GetAccountByUsernameDomain() that doesn't bother deref of featured posts.
 | 
						|
func (d *Dereferencer) getAccountByUsernameDomain(
 | 
						|
	ctx context.Context,
 | 
						|
	requestUser string,
 | 
						|
	username string,
 | 
						|
	domain string,
 | 
						|
) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	if domain == config.GetHost() || domain == config.GetAccountDomain() {
 | 
						|
		// We do local lookups using an empty domain,
 | 
						|
		// else it will fail the db search below.
 | 
						|
		domain = ""
 | 
						|
	}
 | 
						|
 | 
						|
	// Search the database for existing account with USERNAME@DOMAIN.
 | 
						|
	account, err := d.state.DB.GetAccountByUsernameDomain(
 | 
						|
		// request a barebones object, it may be in the
 | 
						|
		// db but with related models not yet dereferenced.
 | 
						|
		gtscontext.SetBarebones(ctx),
 | 
						|
		username, domain,
 | 
						|
	)
 | 
						|
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
		return nil, nil, gtserror.Newf("error checking database for account %s@%s: %w", username, domain, err)
 | 
						|
	}
 | 
						|
 | 
						|
	if account == nil {
 | 
						|
		if domain == "" {
 | 
						|
			// failed local lookup, will be db.ErrNoEntries.
 | 
						|
			return nil, nil, gtserror.SetUnretrievable(err)
 | 
						|
		}
 | 
						|
 | 
						|
		// Create and pass-through a new bare-bones model for dereferencing.
 | 
						|
		account, accountable, err := d.enrichAccountSafely(ctx, requestUser, nil, >smodel.Account{
 | 
						|
			ID:       id.NewULID(),
 | 
						|
			Username: username,
 | 
						|
			Domain:   domain,
 | 
						|
		}, nil)
 | 
						|
		if err != nil {
 | 
						|
			return nil, nil, err
 | 
						|
		}
 | 
						|
 | 
						|
		return account, accountable, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Try to update existing account model.
 | 
						|
	latest, accountable, err := d.RefreshAccount(ctx,
 | 
						|
		requestUser,
 | 
						|
		account,
 | 
						|
		nil,
 | 
						|
		false,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		// Fallback to existing.
 | 
						|
		return account, nil, nil //nolint
 | 
						|
	}
 | 
						|
 | 
						|
	if accountable == nil {
 | 
						|
		// This is existing up-to-date account, ensure it is populated.
 | 
						|
		if err := d.state.DB.PopulateAccount(ctx, latest); err != nil {
 | 
						|
			log.Errorf(ctx, "error populating existing account: %v", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return latest, accountable, nil
 | 
						|
}
 | 
						|
 | 
						|
// RefreshAccount updates the given account if remote and last_fetched is
 | 
						|
// beyond fetch interval, or if force is set. An updated account model is
 | 
						|
// returned, but in the case of dereferencing, some low-priority account info
 | 
						|
// may be enqueued for asynchronous fetching, e.g. featured account statuses (pins).
 | 
						|
// An ActivityPub object indicates the account was dereferenced (i.e. updated).
 | 
						|
func (d *Dereferencer) RefreshAccount(
 | 
						|
	ctx context.Context,
 | 
						|
	requestUser string,
 | 
						|
	account *gtsmodel.Account,
 | 
						|
	accountable ap.Accountable,
 | 
						|
	force bool,
 | 
						|
) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	// If no incoming data is provided,
 | 
						|
	// check whether account needs update.
 | 
						|
	if accountable == nil &&
 | 
						|
		accountUpToDate(account, force) {
 | 
						|
		return account, nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// Parse the URI from account.
 | 
						|
	uri, err := url.Parse(account.URI)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, gtserror.Newf("invalid account uri %q: %w", account.URI, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Try to update + deref passed account model.
 | 
						|
	latest, accountable, err := d.enrichAccountSafely(ctx,
 | 
						|
		requestUser,
 | 
						|
		uri,
 | 
						|
		account,
 | 
						|
		accountable,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		log.Errorf(ctx, "error enriching remote account: %v", err)
 | 
						|
		return nil, nil, gtserror.Newf("error enriching remote account: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if accountable != nil {
 | 
						|
		// This account was updated, enqueue re-dereference featured posts.
 | 
						|
		d.state.Workers.Federator.MustEnqueueCtx(ctx, func(ctx context.Context) {
 | 
						|
			if err := d.dereferenceAccountFeatured(ctx, requestUser, latest); err != nil {
 | 
						|
				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	return latest, accountable, nil
 | 
						|
}
 | 
						|
 | 
						|
// RefreshAccountAsync enqueues the given account for an asychronous
 | 
						|
// update fetching, if last_fetched is beyond fetch interval, or if force
 | 
						|
// is set. This is a more optimized form of manually enqueueing .UpdateAccount()
 | 
						|
// to the federation worker, since it only enqueues update if necessary.
 | 
						|
func (d *Dereferencer) RefreshAccountAsync(
 | 
						|
	ctx context.Context,
 | 
						|
	requestUser string,
 | 
						|
	account *gtsmodel.Account,
 | 
						|
	accountable ap.Accountable,
 | 
						|
	force bool,
 | 
						|
) {
 | 
						|
	// If no incoming data is provided,
 | 
						|
	// check whether account needs update.
 | 
						|
	if accountable == nil &&
 | 
						|
		accountUpToDate(account, force) {
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Parse the URI from account.
 | 
						|
	uri, err := url.Parse(account.URI)
 | 
						|
	if err != nil {
 | 
						|
		log.Errorf(ctx, "invalid account uri %q: %v", account.URI, err)
 | 
						|
		return
 | 
						|
	}
 | 
						|
 | 
						|
	// Enqueue a worker function to enrich this account async.
 | 
						|
	d.state.Workers.Federator.MustEnqueueCtx(ctx, func(ctx context.Context) {
 | 
						|
		latest, accountable, err := d.enrichAccountSafely(ctx, requestUser, uri, account, accountable)
 | 
						|
		if err != nil {
 | 
						|
			log.Errorf(ctx, "error enriching remote account: %v", err)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		if accountable != nil {
 | 
						|
			// This account was updated, enqueue re-dereference featured posts.
 | 
						|
			if err := d.dereferenceAccountFeatured(ctx, requestUser, latest); err != nil {
 | 
						|
				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// enrichAccountSafely wraps enrichAccount() to perform
 | 
						|
// it within the State{}.FedLocks mutexmap, which protects
 | 
						|
// dereferencing actions with per-URI mutex locks.
 | 
						|
func (d *Dereferencer) enrichAccountSafely(
 | 
						|
	ctx context.Context,
 | 
						|
	requestUser string,
 | 
						|
	uri *url.URL,
 | 
						|
	account *gtsmodel.Account,
 | 
						|
	accountable ap.Accountable,
 | 
						|
) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	// Noop if account has been suspended.
 | 
						|
	if !account.SuspendedAt.IsZero() {
 | 
						|
		return account, nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// By default use account.URI
 | 
						|
	// as the per-URI deref lock.
 | 
						|
	uriStr := account.URI
 | 
						|
 | 
						|
	if uriStr == "" {
 | 
						|
		// No URI is set yet, instead generate a faux-one from user+domain.
 | 
						|
		uriStr = "https://" + account.Domain + "/user/" + account.Username
 | 
						|
	}
 | 
						|
 | 
						|
	// Acquire per-URI deref lock, wraping unlock
 | 
						|
	// to safely defer in case of panic, while still
 | 
						|
	// performing more granular unlocks when needed.
 | 
						|
	unlock := d.state.FedLocks.Lock(uriStr)
 | 
						|
	unlock = doOnce(unlock)
 | 
						|
	defer unlock()
 | 
						|
 | 
						|
	// Perform status enrichment with passed vars.
 | 
						|
	latest, apubAcc, err := d.enrichAccount(ctx,
 | 
						|
		requestUser,
 | 
						|
		uri,
 | 
						|
		account,
 | 
						|
		accountable,
 | 
						|
	)
 | 
						|
 | 
						|
	if gtserror.StatusCode(err) >= 400 {
 | 
						|
		// Update fetch-at to slow re-attempts.
 | 
						|
		account.FetchedAt = time.Now()
 | 
						|
		_ = d.state.DB.UpdateAccount(ctx, account, "fetched_at")
 | 
						|
	}
 | 
						|
 | 
						|
	// Unlock now
 | 
						|
	// we're done.
 | 
						|
	unlock()
 | 
						|
 | 
						|
	if errors.Is(err, db.ErrAlreadyExists) {
 | 
						|
		// Ensure AP model isn't set,
 | 
						|
		// otherwise this indicates WE
 | 
						|
		// enriched the account.
 | 
						|
		apubAcc = nil
 | 
						|
 | 
						|
		// DATA RACE! We likely lost out to another goroutine
 | 
						|
		// in a call to db.Put(Account). Look again in DB by URI.
 | 
						|
		latest, err = d.state.DB.GetAccountByURI(ctx, account.URI)
 | 
						|
		if err != nil {
 | 
						|
			err = gtserror.Newf("error getting account %s from database after race: %w", uriStr, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return latest, apubAcc, err
 | 
						|
}
 | 
						|
 | 
						|
// enrichAccount will enrich the given account, whether a
 | 
						|
// new barebones model, or existing model from the database.
 | 
						|
// It handles necessary dereferencing, webfingering etc.
 | 
						|
func (d *Dereferencer) enrichAccount(
 | 
						|
	ctx context.Context,
 | 
						|
	requestUser string,
 | 
						|
	uri *url.URL,
 | 
						|
	account *gtsmodel.Account,
 | 
						|
	apubAcc ap.Accountable,
 | 
						|
) (*gtsmodel.Account, ap.Accountable, error) {
 | 
						|
	// Pre-fetch a transport for requesting username, used by later deref procedures.
 | 
						|
	tsport, err := d.transportController.NewTransportForUsername(ctx, requestUser)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, gtserror.Newf("couldn't create transport: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if account.Username != "" {
 | 
						|
		// A username was provided so we can attempt a webfinger, this ensures up-to-date accountdomain info.
 | 
						|
		accDomain, accURI, err := d.fingerRemoteAccount(ctx, tsport, account.Username, account.Domain)
 | 
						|
		if err != nil {
 | 
						|
			if account.URI == "" {
 | 
						|
				// this is a new account (to us) with username@domain
 | 
						|
				// but failed webfinger, nothing more we can do.
 | 
						|
				err := gtserror.Newf("error webfingering account: %w", err)
 | 
						|
				return nil, nil, gtserror.SetUnretrievable(err)
 | 
						|
			}
 | 
						|
 | 
						|
			// Simply log this error and move on, we already have an account URI.
 | 
						|
			log.Errorf(ctx, "error webfingering[1] remote account %s@%s: %v", account.Username, account.Domain, err)
 | 
						|
		}
 | 
						|
 | 
						|
		if err == nil {
 | 
						|
			if account.Domain != accDomain {
 | 
						|
				// After webfinger, we now have correct account domain from which we can do a final DB check.
 | 
						|
				alreadyAccount, err := d.state.DB.GetAccountByUsernameDomain(ctx, account.Username, accDomain)
 | 
						|
				if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
					return nil, nil, gtserror.Newf("db err looking for account again after webfinger: %w", err)
 | 
						|
				}
 | 
						|
 | 
						|
				if alreadyAccount != nil {
 | 
						|
					// Enrich existing account.
 | 
						|
					account = alreadyAccount
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			// Update account with latest info.
 | 
						|
			account.URI = accURI.String()
 | 
						|
			account.Domain = accDomain
 | 
						|
			uri = accURI
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if uri == nil {
 | 
						|
		// No URI provided / found, must parse from account.
 | 
						|
		uri, err = url.Parse(account.URI)
 | 
						|
		if err != nil {
 | 
						|
			return nil, nil, gtserror.Newf("invalid uri %q: %w", account.URI, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Check whether this account URI is a blocked domain / subdomain.
 | 
						|
	if blocked, err := d.state.DB.IsDomainBlocked(ctx, uri.Host); err != nil {
 | 
						|
		return nil, nil, gtserror.Newf("error checking blocked domain: %w", err)
 | 
						|
	} else if blocked {
 | 
						|
		return nil, nil, gtserror.Newf("%s is blocked", uri.Host)
 | 
						|
	}
 | 
						|
 | 
						|
	// Mark deref+update handshake start.
 | 
						|
	d.startHandshake(requestUser, uri)
 | 
						|
	defer d.stopHandshake(requestUser, uri)
 | 
						|
 | 
						|
	if apubAcc == nil {
 | 
						|
		// Dereference latest version of the account.
 | 
						|
		b, err := tsport.Dereference(ctx, uri)
 | 
						|
		if err != nil {
 | 
						|
			err := gtserror.Newf("error deferencing %s: %w", uri, err)
 | 
						|
			return nil, nil, gtserror.SetUnretrievable(err)
 | 
						|
		}
 | 
						|
 | 
						|
		// Attempt to resolve ActivityPub acc from data.
 | 
						|
		apubAcc, err = ap.ResolveAccountable(ctx, b)
 | 
						|
		if err != nil {
 | 
						|
			return nil, nil, gtserror.Newf("error resolving accountable from data for account %s: %w", uri, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Convert the dereferenced AP account object to our GTS model.
 | 
						|
	latestAcc, err := d.converter.ASRepresentationToAccount(ctx,
 | 
						|
		apubAcc,
 | 
						|
		account.Domain,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		return nil, nil, gtserror.Newf("error converting accountable to gts model for account %s: %w", uri, err)
 | 
						|
	}
 | 
						|
 | 
						|
	if account.Username == "" {
 | 
						|
		// No username was provided, so no webfinger was attempted earlier.
 | 
						|
		//
 | 
						|
		// Now we have a username we can attempt again, to ensure up-to-date
 | 
						|
		// accountDomain info. For this final attempt we should use the domain
 | 
						|
		// of the ID of the dereffed account, rather than the URI we were given.
 | 
						|
		//
 | 
						|
		// This avoids cases where we were given a URI like
 | 
						|
		// https://example.org/@someone@somewhere.else and we've been redirected
 | 
						|
		// from example.org to somewhere.else: we want to take somewhere.else
 | 
						|
		// as the accountDomain then, not the example.org we were redirected from.
 | 
						|
 | 
						|
		// Assume the host from the returned ActivityPub representation.
 | 
						|
		idProp := apubAcc.GetJSONLDId()
 | 
						|
		if idProp == nil || !idProp.IsIRI() {
 | 
						|
			return nil, nil, gtserror.New("no id property found on person, or id was not an iri")
 | 
						|
		}
 | 
						|
 | 
						|
		// Get IRI host value.
 | 
						|
		accHost := idProp.GetIRI().Host
 | 
						|
 | 
						|
		latestAcc.Domain, _, err = d.fingerRemoteAccount(ctx,
 | 
						|
			tsport,
 | 
						|
			latestAcc.Username,
 | 
						|
			accHost,
 | 
						|
		)
 | 
						|
		if err != nil {
 | 
						|
			// We still couldn't webfinger the account, so we're not certain
 | 
						|
			// what the accountDomain actually is. Still, we can make a solid
 | 
						|
			// guess that it's the Host of the ActivityPub URI of the account.
 | 
						|
			// If we're wrong, we can just try again in a couple days.
 | 
						|
			log.Errorf(ctx, "error webfingering[2] remote account %s@%s: %v", latestAcc.Username, accHost, err)
 | 
						|
			latestAcc.Domain = accHost
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if latestAcc.Domain == "" {
 | 
						|
		// ensure we have a domain set by this point,
 | 
						|
		// otherwise it gets stored as a local user!
 | 
						|
		//
 | 
						|
		// TODO: there is probably a more granular way
 | 
						|
		// way of checking this in each of the above parts,
 | 
						|
		// and honestly it could do with a smol refactor.
 | 
						|
		return nil, nil, gtserror.Newf("empty domain for %s", uri)
 | 
						|
	}
 | 
						|
 | 
						|
	// Ensure ID is set and update fetch time.
 | 
						|
	latestAcc.ID = account.ID
 | 
						|
	latestAcc.FetchedAt = time.Now()
 | 
						|
 | 
						|
	// Ensure the account's avatar media is populated, passing in existing to check for chages.
 | 
						|
	if err := d.fetchRemoteAccountAvatar(ctx, tsport, account, latestAcc); err != nil {
 | 
						|
		log.Errorf(ctx, "error fetching remote avatar for account %s: %v", uri, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Ensure the account's avatar media is populated, passing in existing to check for chages.
 | 
						|
	if err := d.fetchRemoteAccountHeader(ctx, tsport, account, latestAcc); err != nil {
 | 
						|
		log.Errorf(ctx, "error fetching remote header for account %s: %v", uri, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Fetch the latest remote account emoji IDs used in account display name/bio.
 | 
						|
	if _, err = d.fetchRemoteAccountEmojis(ctx, latestAcc, requestUser); err != nil {
 | 
						|
		log.Errorf(ctx, "error fetching remote emojis for account %s: %v", uri, err)
 | 
						|
	}
 | 
						|
 | 
						|
	if account.CreatedAt.IsZero() {
 | 
						|
		// CreatedAt will be zero if no local copy was
 | 
						|
		// found in one of the GetAccountBy___() functions.
 | 
						|
		//
 | 
						|
		// Set time of creation from the last-fetched date.
 | 
						|
		latestAcc.CreatedAt = latestAcc.FetchedAt
 | 
						|
		latestAcc.UpdatedAt = latestAcc.FetchedAt
 | 
						|
 | 
						|
		// This is new, put it in the database.
 | 
						|
		err := d.state.DB.PutAccount(ctx, latestAcc)
 | 
						|
		if err != nil {
 | 
						|
			return nil, nil, gtserror.Newf("error putting in database: %w", err)
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		// Set time of update from the last-fetched date.
 | 
						|
		latestAcc.UpdatedAt = latestAcc.FetchedAt
 | 
						|
 | 
						|
		// Use existing account values.
 | 
						|
		latestAcc.CreatedAt = account.CreatedAt
 | 
						|
		latestAcc.Language = account.Language
 | 
						|
 | 
						|
		// This is an existing account, update the model in the database.
 | 
						|
		if err := d.state.DB.UpdateAccount(ctx, latestAcc); err != nil {
 | 
						|
			return nil, nil, gtserror.Newf("error updating database: %w", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return latestAcc, apubAcc, nil
 | 
						|
}
 | 
						|
 | 
						|
func (d *Dereferencer) fetchRemoteAccountAvatar(ctx context.Context, tsport transport.Transport, existing, latestAcc *gtsmodel.Account) error {
 | 
						|
	if latestAcc.AvatarRemoteURL == "" {
 | 
						|
		// No avatar set on newest model, leave
 | 
						|
		// latest avatar attachment ID empty.
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	// By default we keep the previous media attachment ID. This will only
 | 
						|
	// be changed if and when we have the new media loaded into storage.
 | 
						|
	latestAcc.AvatarMediaAttachmentID = existing.AvatarMediaAttachmentID
 | 
						|
 | 
						|
	// If we had a media attachment ID already, and the URL
 | 
						|
	// of the attachment hasn't changed from existing -> latest,
 | 
						|
	// then we may be able to just keep our existing attachment
 | 
						|
	// without having to make any remote calls.
 | 
						|
	if latestAcc.AvatarMediaAttachmentID != "" &&
 | 
						|
		existing.AvatarRemoteURL == latestAcc.AvatarRemoteURL {
 | 
						|
 | 
						|
		// Ensure we have media attachment with the known ID.
 | 
						|
		media, err := d.state.DB.GetAttachmentByID(ctx, existing.AvatarMediaAttachmentID)
 | 
						|
		if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
			return gtserror.Newf("error getting attachment %s: %w", existing.AvatarMediaAttachmentID, err)
 | 
						|
		}
 | 
						|
 | 
						|
		// Ensure attachment has correct properties.
 | 
						|
		if media != nil && media.RemoteURL == latestAcc.AvatarRemoteURL {
 | 
						|
			// We already have the most up-to-date
 | 
						|
			// media attachment, keep using it.
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// If we reach here, we know we need to fetch the most
 | 
						|
	// up-to-date version of the attachment from remote.
 | 
						|
 | 
						|
	// Parse and validate the newly provided media URL.
 | 
						|
	avatarURI, err := url.Parse(latestAcc.AvatarRemoteURL)
 | 
						|
	if err != nil {
 | 
						|
		return gtserror.Newf("error parsing url %s: %w", latestAcc.AvatarRemoteURL, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Acquire lock for derefs map.
 | 
						|
	unlock := d.state.FedLocks.Lock(latestAcc.AvatarRemoteURL)
 | 
						|
	unlock = doOnce(unlock)
 | 
						|
	defer unlock()
 | 
						|
 | 
						|
	// Look for an existing dereference in progress.
 | 
						|
	processing, ok := d.derefAvatars[latestAcc.AvatarRemoteURL]
 | 
						|
 | 
						|
	if !ok {
 | 
						|
		// Set the media data function to dereference avatar from URI.
 | 
						|
		data := func(ctx context.Context) (io.ReadCloser, int64, error) {
 | 
						|
			return tsport.DereferenceMedia(ctx, avatarURI)
 | 
						|
		}
 | 
						|
 | 
						|
		// Create new media processing request from the media manager instance.
 | 
						|
		processing = d.mediaManager.PreProcessMedia(data, latestAcc.ID, &media.AdditionalMediaInfo{
 | 
						|
			Avatar:    func() *bool { v := true; return &v }(),
 | 
						|
			RemoteURL: &latestAcc.AvatarRemoteURL,
 | 
						|
		})
 | 
						|
 | 
						|
		// Store media in map to mark as processing.
 | 
						|
		d.derefAvatars[latestAcc.AvatarRemoteURL] = processing
 | 
						|
 | 
						|
		defer func() {
 | 
						|
			// On exit safely remove media from map.
 | 
						|
			unlock := d.state.FedLocks.Lock(latestAcc.AvatarRemoteURL)
 | 
						|
			delete(d.derefAvatars, latestAcc.AvatarRemoteURL)
 | 
						|
			unlock()
 | 
						|
		}()
 | 
						|
	}
 | 
						|
 | 
						|
	// Unlock map.
 | 
						|
	unlock()
 | 
						|
 | 
						|
	// Start media attachment loading (blocking call).
 | 
						|
	if _, err := processing.LoadAttachment(ctx); err != nil {
 | 
						|
		return gtserror.Newf("error loading attachment %s: %w", latestAcc.AvatarRemoteURL, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Set the newly loaded avatar media attachment ID.
 | 
						|
	latestAcc.AvatarMediaAttachmentID = processing.AttachmentID()
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (d *Dereferencer) fetchRemoteAccountHeader(ctx context.Context, tsport transport.Transport, existing, latestAcc *gtsmodel.Account) error {
 | 
						|
	if latestAcc.HeaderRemoteURL == "" {
 | 
						|
		// No header set on newest model, leave
 | 
						|
		// latest header attachment ID empty.
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	// By default we keep the previous media attachment ID. This will only
 | 
						|
	// be changed if and when we have the new media loaded into storage.
 | 
						|
	latestAcc.HeaderMediaAttachmentID = existing.HeaderMediaAttachmentID
 | 
						|
 | 
						|
	// If we had a media attachment ID already, and the URL
 | 
						|
	// of the attachment hasn't changed from existing -> latest,
 | 
						|
	// then we may be able to just keep our existing attachment
 | 
						|
	// without having to make any remote calls.
 | 
						|
	if latestAcc.HeaderMediaAttachmentID != "" &&
 | 
						|
		existing.HeaderRemoteURL == latestAcc.HeaderRemoteURL {
 | 
						|
 | 
						|
		// Ensure we have media attachment with the known ID.
 | 
						|
		media, err := d.state.DB.GetAttachmentByID(ctx, existing.HeaderMediaAttachmentID)
 | 
						|
		if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
			return gtserror.Newf("error getting attachment %s: %w", existing.HeaderMediaAttachmentID, err)
 | 
						|
		}
 | 
						|
 | 
						|
		// Ensure attachment has correct properties.
 | 
						|
		if media != nil && media.RemoteURL == latestAcc.HeaderRemoteURL {
 | 
						|
			// We already have the most up-to-date
 | 
						|
			// media attachment, keep using it.
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// If we reach here, we know we need to fetch the most
 | 
						|
	// up-to-date version of the attachment from remote.
 | 
						|
 | 
						|
	// Parse and validate the newly provided media URL.
 | 
						|
	headerURI, err := url.Parse(latestAcc.HeaderRemoteURL)
 | 
						|
	if err != nil {
 | 
						|
		return gtserror.Newf("error parsing url %s: %w", latestAcc.HeaderRemoteURL, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Acquire lock for derefs map.
 | 
						|
	unlock := d.state.FedLocks.Lock(latestAcc.HeaderRemoteURL)
 | 
						|
	unlock = doOnce(unlock)
 | 
						|
	defer unlock()
 | 
						|
 | 
						|
	// Look for an existing dereference in progress.
 | 
						|
	processing, ok := d.derefHeaders[latestAcc.HeaderRemoteURL]
 | 
						|
 | 
						|
	if !ok {
 | 
						|
		// Set the media data function to dereference avatar from URI.
 | 
						|
		data := func(ctx context.Context) (io.ReadCloser, int64, error) {
 | 
						|
			return tsport.DereferenceMedia(ctx, headerURI)
 | 
						|
		}
 | 
						|
 | 
						|
		// Create new media processing request from the media manager instance.
 | 
						|
		processing = d.mediaManager.PreProcessMedia(data, latestAcc.ID, &media.AdditionalMediaInfo{
 | 
						|
			Header:    func() *bool { v := true; return &v }(),
 | 
						|
			RemoteURL: &latestAcc.HeaderRemoteURL,
 | 
						|
		})
 | 
						|
 | 
						|
		// Store media in map to mark as processing.
 | 
						|
		d.derefHeaders[latestAcc.HeaderRemoteURL] = processing
 | 
						|
 | 
						|
		defer func() {
 | 
						|
			// On exit safely remove media from map.
 | 
						|
			unlock := d.state.FedLocks.Lock(latestAcc.HeaderRemoteURL)
 | 
						|
			delete(d.derefHeaders, latestAcc.HeaderRemoteURL)
 | 
						|
			unlock()
 | 
						|
		}()
 | 
						|
	}
 | 
						|
 | 
						|
	// Unlock map.
 | 
						|
	unlock()
 | 
						|
 | 
						|
	// Start media attachment loading (blocking call).
 | 
						|
	if _, err := processing.LoadAttachment(ctx); err != nil {
 | 
						|
		return gtserror.Newf("error loading attachment %s: %w", latestAcc.HeaderRemoteURL, err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Set the newly loaded avatar media attachment ID.
 | 
						|
	latestAcc.HeaderMediaAttachmentID = processing.AttachmentID()
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (d *Dereferencer) fetchRemoteAccountEmojis(ctx context.Context, targetAccount *gtsmodel.Account, requestingUsername string) (bool, error) {
 | 
						|
	maybeEmojis := targetAccount.Emojis
 | 
						|
	maybeEmojiIDs := targetAccount.EmojiIDs
 | 
						|
 | 
						|
	// It's possible that the account had emoji IDs set on it, but not Emojis
 | 
						|
	// themselves, depending on how it was fetched before being passed to us.
 | 
						|
	//
 | 
						|
	// If we only have IDs, fetch the emojis from the db. We know they're in
 | 
						|
	// there or else they wouldn't have IDs.
 | 
						|
	if len(maybeEmojiIDs) > len(maybeEmojis) {
 | 
						|
		maybeEmojis = make([]*gtsmodel.Emoji, 0, len(maybeEmojiIDs))
 | 
						|
		for _, emojiID := range maybeEmojiIDs {
 | 
						|
			maybeEmoji, err := d.state.DB.GetEmojiByID(ctx, emojiID)
 | 
						|
			if err != nil {
 | 
						|
				return false, err
 | 
						|
			}
 | 
						|
			maybeEmojis = append(maybeEmojis, maybeEmoji)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// For all the maybe emojis we have, we either fetch them from the database
 | 
						|
	// (if we haven't already), or dereference them from the remote instance.
 | 
						|
	gotEmojis, err := d.populateEmojis(ctx, maybeEmojis, requestingUsername)
 | 
						|
	if err != nil {
 | 
						|
		return false, err
 | 
						|
	}
 | 
						|
 | 
						|
	// Extract the ID of each fetched or dereferenced emoji, so we can attach
 | 
						|
	// this to the account if necessary.
 | 
						|
	gotEmojiIDs := make([]string, 0, len(gotEmojis))
 | 
						|
	for _, e := range gotEmojis {
 | 
						|
		gotEmojiIDs = append(gotEmojiIDs, e.ID)
 | 
						|
	}
 | 
						|
 | 
						|
	var (
 | 
						|
		changed  = false // have the emojis for this account changed?
 | 
						|
		maybeLen = len(maybeEmojis)
 | 
						|
		gotLen   = len(gotEmojis)
 | 
						|
	)
 | 
						|
 | 
						|
	// if the length of everything is zero, this is simple:
 | 
						|
	// nothing has changed and there's nothing to do
 | 
						|
	if maybeLen == 0 && gotLen == 0 {
 | 
						|
		return changed, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// if the *amount* of emojis on the account has changed, then the got emojis
 | 
						|
	// are definitely different from the previous ones (if there were any) --
 | 
						|
	// the account has either more or fewer emojis set on it now, so take the
 | 
						|
	// discovered emojis as the new correct ones.
 | 
						|
	if maybeLen != gotLen {
 | 
						|
		changed = true
 | 
						|
		targetAccount.Emojis = gotEmojis
 | 
						|
		targetAccount.EmojiIDs = gotEmojiIDs
 | 
						|
		return changed, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// if the lengths are the same but not all of the slices are
 | 
						|
	// zero, something *might* have changed, so we have to check
 | 
						|
 | 
						|
	// 1. did we have emojis before that we don't have now?
 | 
						|
	for _, maybeEmoji := range maybeEmojis {
 | 
						|
		var stillPresent bool
 | 
						|
 | 
						|
		for _, gotEmoji := range gotEmojis {
 | 
						|
			if maybeEmoji.URI == gotEmoji.URI {
 | 
						|
				// the emoji we maybe had is still present now,
 | 
						|
				// so we can stop checking gotEmojis
 | 
						|
				stillPresent = true
 | 
						|
				break
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		if !stillPresent {
 | 
						|
			// at least one maybeEmoji is no longer present in
 | 
						|
			// the got emojis, so we can stop checking now
 | 
						|
			changed = true
 | 
						|
			targetAccount.Emojis = gotEmojis
 | 
						|
			targetAccount.EmojiIDs = gotEmojiIDs
 | 
						|
			return changed, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// 2. do we have emojis now that we didn't have before?
 | 
						|
	for _, gotEmoji := range gotEmojis {
 | 
						|
		var wasPresent bool
 | 
						|
 | 
						|
		for _, maybeEmoji := range maybeEmojis {
 | 
						|
			// check emoji IDs here as well, because unreferenced
 | 
						|
			// maybe emojis we didn't already have would not have
 | 
						|
			// had IDs set on them yet
 | 
						|
			if gotEmoji.URI == maybeEmoji.URI && gotEmoji.ID == maybeEmoji.ID {
 | 
						|
				// this got emoji was present already in the maybeEmoji,
 | 
						|
				// so we can stop checking through maybeEmojis
 | 
						|
				wasPresent = true
 | 
						|
				break
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		if !wasPresent {
 | 
						|
			// at least one gotEmojis was not present in
 | 
						|
			// the maybeEmojis, so we can stop checking now
 | 
						|
			changed = true
 | 
						|
			targetAccount.Emojis = gotEmojis
 | 
						|
			targetAccount.EmojiIDs = gotEmojiIDs
 | 
						|
			return changed, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return changed, nil
 | 
						|
}
 | 
						|
 | 
						|
// dereferenceAccountFeatured dereferences an account's featuredCollectionURI (if not empty). For each discovered status, this status will
 | 
						|
// be dereferenced (if necessary) and marked as pinned (if necessary). Then, old pins will be removed if they're not included in new pins.
 | 
						|
func (d *Dereferencer) dereferenceAccountFeatured(ctx context.Context, requestUser string, account *gtsmodel.Account) error {
 | 
						|
	uri, err := url.Parse(account.FeaturedCollectionURI)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	// Pre-fetch a transport for requesting username, used by later deref procedures.
 | 
						|
	tsport, err := d.transportController.NewTransportForUsername(ctx, requestUser)
 | 
						|
	if err != nil {
 | 
						|
		return gtserror.Newf("couldn't create transport: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	b, err := tsport.Dereference(ctx, uri)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	m := make(map[string]interface{})
 | 
						|
	if err := json.Unmarshal(b, &m); err != nil {
 | 
						|
		return gtserror.Newf("error unmarshalling bytes into json: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t, err := streams.ToType(ctx, m)
 | 
						|
	if err != nil {
 | 
						|
		return gtserror.Newf("error resolving json into ap vocab type: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if t.GetTypeName() != ap.ObjectOrderedCollection {
 | 
						|
		return gtserror.Newf("%s was not an OrderedCollection", uri)
 | 
						|
	}
 | 
						|
 | 
						|
	collection, ok := t.(vocab.ActivityStreamsOrderedCollection)
 | 
						|
	if !ok {
 | 
						|
		return gtserror.New("couldn't coerce OrderedCollection")
 | 
						|
	}
 | 
						|
 | 
						|
	items := collection.GetActivityStreamsOrderedItems()
 | 
						|
	if items == nil {
 | 
						|
		return gtserror.New("nil orderedItems")
 | 
						|
	}
 | 
						|
 | 
						|
	// Get previous pinned statuses (we'll need these later).
 | 
						|
	wasPinned, err := d.state.DB.GetAccountPinnedStatuses(ctx, account.ID)
 | 
						|
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
						|
		return gtserror.Newf("error getting account pinned statuses: %w", err)
 | 
						|
	}
 | 
						|
 | 
						|
	statusURIs := make([]*url.URL, 0, items.Len())
 | 
						|
	for iter := items.Begin(); iter != items.End(); iter = iter.Next() {
 | 
						|
		var statusURI *url.URL
 | 
						|
 | 
						|
		switch {
 | 
						|
		case iter.IsActivityStreamsNote():
 | 
						|
			// We got a whole Note. Extract the URI.
 | 
						|
			if note := iter.GetActivityStreamsNote(); note != nil {
 | 
						|
				if id := note.GetJSONLDId(); id != nil {
 | 
						|
					statusURI = id.GetIRI()
 | 
						|
				}
 | 
						|
			}
 | 
						|
		case iter.IsActivityStreamsArticle():
 | 
						|
			// We got a whole Article. Extract the URI.
 | 
						|
			if article := iter.GetActivityStreamsArticle(); article != nil {
 | 
						|
				if id := article.GetJSONLDId(); id != nil {
 | 
						|
					statusURI = id.GetIRI()
 | 
						|
				}
 | 
						|
			}
 | 
						|
		default:
 | 
						|
			// Try to get just the URI.
 | 
						|
			statusURI = iter.GetIRI()
 | 
						|
		}
 | 
						|
 | 
						|
		if statusURI == nil {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		if statusURI.Host != uri.Host {
 | 
						|
			// If this status doesn't share a host with its featured
 | 
						|
			// collection URI, we shouldn't trust it. Just move on.
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		// Already append this status URI to our slice.
 | 
						|
		// We do this here so that even if we can't get
 | 
						|
		// the status in the next part for some reason,
 | 
						|
		// we still know it was *meant* to be pinned.
 | 
						|
		statusURIs = append(statusURIs, statusURI)
 | 
						|
 | 
						|
		status, _, _, err := d.getStatusByURI(ctx, requestUser, statusURI)
 | 
						|
		if err != nil {
 | 
						|
			// We couldn't get the status, bummer. Just log + move on, we can try later.
 | 
						|
			log.Errorf(ctx, "error getting status from featured collection %s: %v", statusURI, err)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		// If the status was already pinned, we don't need to do anything.
 | 
						|
		if !status.PinnedAt.IsZero() {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		if status.AccountID != account.ID {
 | 
						|
			// Someone's pinned a status that doesn't
 | 
						|
			// belong to them, this doesn't work for us.
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		if status.BoostOfID != "" {
 | 
						|
			// Someone's pinned a boost. This also
 | 
						|
			// doesn't work for us.
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		// All conditions are met for this status to
 | 
						|
		// be pinned, so we can finally update it.
 | 
						|
		status.PinnedAt = time.Now()
 | 
						|
		if err := d.state.DB.UpdateStatus(ctx, status, "pinned_at"); err != nil {
 | 
						|
			log.Errorf(ctx, "error updating status in featured collection %s: %v", status.URI, err)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Now that we know which statuses are pinned, we should
 | 
						|
	// *unpin* previous pinned statuses that aren't included.
 | 
						|
outerLoop:
 | 
						|
	for _, status := range wasPinned {
 | 
						|
		for _, statusURI := range statusURIs {
 | 
						|
			if status.URI == statusURI.String() {
 | 
						|
				// This status is included in most recent
 | 
						|
				// pinned uris. No need to keep checking.
 | 
						|
				continue outerLoop
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		// Status was pinned before, but is not included
 | 
						|
		// in most recent pinned uris, so unpin it now.
 | 
						|
		status.PinnedAt = time.Time{}
 | 
						|
		if err := d.state.DB.UpdateStatus(ctx, status, "pinned_at"); err != nil {
 | 
						|
			log.Errorf(ctx, "error unpinning status %s: %v", status.URI, err)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 |