mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 06:42:25 -05:00 
			
		
		
		
	* [chore] Remove years from all license headers Years or year ranges aren't required in license headers. Many projects have removed them in recent years and it avoids a bit of yearly toil. In many cases our copyright claim was also a bit dodgy since we added the 2021-2023 header to files created after 2021 but you can't claim copyright into the past that way. * [chore] Add license header check This ensures a license header is always added to any new file. This avoids maintainers/reviewers needing to remember to check for and ask for it in case a contribution doesn't include it. * [chore] Add missing license headers * [chore] Further updates to license header * Use the more common // indentend comment format * Remove the hack we had for the linter now that we use the // format * Add SPDX license identifier
		
			
				
	
	
		
			311 lines
		
	
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			311 lines
		
	
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package admin
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"encoding/json"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"mime/multipart"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"codeberg.org/gruf/go-kv"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | |
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/db"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/id"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/log"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/text"
 | |
| )
 | |
| 
 | |
| func (p *Processor) DomainBlockCreate(ctx context.Context, account *gtsmodel.Account, domain string, obfuscate bool, publicComment string, privateComment string, subscriptionID string) (*apimodel.DomainBlock, gtserror.WithCode) {
 | |
| 	// domain blocks will always be lowercase
 | |
| 	domain = strings.ToLower(domain)
 | |
| 
 | |
| 	// first check if we already have a block -- if err == nil we already had a block so we can skip a whole lot of work
 | |
| 	block, err := p.state.DB.GetDomainBlock(ctx, domain)
 | |
| 	if err != nil {
 | |
| 		if !errors.Is(err, db.ErrNoEntries) {
 | |
| 			// something went wrong in the DB
 | |
| 			return nil, gtserror.NewErrorInternalError(fmt.Errorf("db error checking for existence of domain block %s: %s", domain, err))
 | |
| 		}
 | |
| 
 | |
| 		// there's no block for this domain yet so create one
 | |
| 		newBlock := >smodel.DomainBlock{
 | |
| 			ID:                 id.NewULID(),
 | |
| 			Domain:             domain,
 | |
| 			CreatedByAccountID: account.ID,
 | |
| 			PrivateComment:     text.SanitizePlaintext(privateComment),
 | |
| 			PublicComment:      text.SanitizePlaintext(publicComment),
 | |
| 			Obfuscate:          &obfuscate,
 | |
| 			SubscriptionID:     subscriptionID,
 | |
| 		}
 | |
| 
 | |
| 		// Insert the new block into the database
 | |
| 		if err := p.state.DB.CreateDomainBlock(ctx, newBlock); err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(fmt.Errorf("db error putting new domain block %s: %s", domain, err))
 | |
| 		}
 | |
| 
 | |
| 		// Set the newly created block
 | |
| 		block = newBlock
 | |
| 
 | |
| 		// Process the side effects of the domain block asynchronously since it might take a while
 | |
| 		go func() {
 | |
| 			p.initiateDomainBlockSideEffects(context.Background(), account, block)
 | |
| 		}()
 | |
| 	}
 | |
| 
 | |
| 	// Convert our gts model domain block into an API model
 | |
| 	apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, block, false)
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("error converting domain block to frontend/api representation %s: %s", domain, err))
 | |
| 	}
 | |
| 
 | |
| 	return apiDomainBlock, nil
 | |
| }
 | |
| 
 | |
| // initiateDomainBlockSideEffects should be called asynchronously, to process the side effects of a domain block:
 | |
| //
 | |
| // 1. Strip most info away from the instance entry for the domain.
 | |
| // 2. Delete the instance account for that instance if it exists.
 | |
| // 3. Select all accounts from this instance and pass them through the delete functionality of the processor.
 | |
| func (p *Processor) initiateDomainBlockSideEffects(ctx context.Context, account *gtsmodel.Account, block *gtsmodel.DomainBlock) {
 | |
| 	l := log.WithContext(ctx).WithFields(kv.Fields{{"domain", block.Domain}}...)
 | |
| 	l.Debug("processing domain block side effects")
 | |
| 
 | |
| 	// if we have an instance entry for this domain, update it with the new block ID and clear all fields
 | |
| 	instance := >smodel.Instance{}
 | |
| 	if err := p.state.DB.GetWhere(ctx, []db.Where{{Key: "domain", Value: block.Domain}}, instance); err == nil {
 | |
| 		updatingColumns := []string{
 | |
| 			"title",
 | |
| 			"updated_at",
 | |
| 			"suspended_at",
 | |
| 			"domain_block_id",
 | |
| 			"short_description",
 | |
| 			"description",
 | |
| 			"terms",
 | |
| 			"contact_email",
 | |
| 			"contact_account_username",
 | |
| 			"contact_account_id",
 | |
| 			"version",
 | |
| 		}
 | |
| 		instance.Title = ""
 | |
| 		instance.UpdatedAt = time.Now()
 | |
| 		instance.SuspendedAt = time.Now()
 | |
| 		instance.DomainBlockID = block.ID
 | |
| 		instance.ShortDescription = ""
 | |
| 		instance.Description = ""
 | |
| 		instance.Terms = ""
 | |
| 		instance.ContactEmail = ""
 | |
| 		instance.ContactAccountUsername = ""
 | |
| 		instance.ContactAccountID = ""
 | |
| 		instance.Version = ""
 | |
| 		if err := p.state.DB.UpdateByID(ctx, instance, instance.ID, updatingColumns...); err != nil {
 | |
| 			l.Errorf("domainBlockProcessSideEffects: db error updating instance: %s", err)
 | |
| 		}
 | |
| 		l.Debug("domainBlockProcessSideEffects: instance entry updated")
 | |
| 	}
 | |
| 
 | |
| 	// if we have an instance account for this instance, delete it
 | |
| 	if instanceAccount, err := p.state.DB.GetAccountByUsernameDomain(ctx, block.Domain, block.Domain); err == nil {
 | |
| 		if err := p.state.DB.DeleteAccount(ctx, instanceAccount.ID); err != nil {
 | |
| 			l.Errorf("domainBlockProcessSideEffects: db error deleting instance account: %s", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// delete accounts through the normal account deletion system (which should also delete media + posts + remove posts from timelines)
 | |
| 
 | |
| 	limit := 20      // just select 20 accounts at a time so we don't nuke our DB/mem with one huge query
 | |
| 	var maxID string // this is initially an empty string so we'll start at the top of accounts list (sorted by ID)
 | |
| 
 | |
| selectAccountsLoop:
 | |
| 	for {
 | |
| 		accounts, err := p.state.DB.GetInstanceAccounts(ctx, block.Domain, maxID, limit)
 | |
| 		if err != nil {
 | |
| 			if err == db.ErrNoEntries {
 | |
| 				// no accounts left for this instance so we're done
 | |
| 				l.Infof("domainBlockProcessSideEffects: done iterating through accounts for domain %s", block.Domain)
 | |
| 				break selectAccountsLoop
 | |
| 			}
 | |
| 			// an actual error has occurred
 | |
| 			l.Errorf("domainBlockProcessSideEffects: db error selecting accounts for domain %s: %s", block.Domain, err)
 | |
| 			break selectAccountsLoop
 | |
| 		}
 | |
| 
 | |
| 		for i, a := range accounts {
 | |
| 			l.Debugf("putting delete for account %s in the clientAPI channel", a.Username)
 | |
| 
 | |
| 			// pass the account delete through the client api channel for processing
 | |
| 			p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | |
| 				APObjectType:   ap.ActorPerson,
 | |
| 				APActivityType: ap.ActivityDelete,
 | |
| 				GTSModel:       block,
 | |
| 				OriginAccount:  account,
 | |
| 				TargetAccount:  a,
 | |
| 			})
 | |
| 
 | |
| 			// if this is the last account in the slice, set the maxID appropriately for the next query
 | |
| 			if i == len(accounts)-1 {
 | |
| 				maxID = a.ID
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // DomainBlocksImport handles the import of a bunch of domain blocks at once, by calling the DomainBlockCreate function for each domain in the provided file.
 | |
| func (p *Processor) DomainBlocksImport(ctx context.Context, account *gtsmodel.Account, domains *multipart.FileHeader) ([]*apimodel.DomainBlock, gtserror.WithCode) {
 | |
| 	f, err := domains.Open()
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorBadRequest(fmt.Errorf("DomainBlocksImport: error opening attachment: %s", err))
 | |
| 	}
 | |
| 	buf := new(bytes.Buffer)
 | |
| 	size, err := io.Copy(buf, f)
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorBadRequest(fmt.Errorf("DomainBlocksImport: error reading attachment: %s", err))
 | |
| 	}
 | |
| 	if size == 0 {
 | |
| 		return nil, gtserror.NewErrorBadRequest(errors.New("DomainBlocksImport: could not read provided attachment: size 0 bytes"))
 | |
| 	}
 | |
| 
 | |
| 	d := []apimodel.DomainBlock{}
 | |
| 	if err := json.Unmarshal(buf.Bytes(), &d); err != nil {
 | |
| 		return nil, gtserror.NewErrorBadRequest(fmt.Errorf("DomainBlocksImport: could not read provided attachment: %s", err))
 | |
| 	}
 | |
| 
 | |
| 	blocks := []*apimodel.DomainBlock{}
 | |
| 	for _, d := range d {
 | |
| 		block, err := p.DomainBlockCreate(ctx, account, d.Domain.Domain, false, d.PublicComment, "", "")
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 
 | |
| 		blocks = append(blocks, block)
 | |
| 	}
 | |
| 
 | |
| 	return blocks, nil
 | |
| }
 | |
| 
 | |
| // DomainBlocksGet returns all existing domain blocks.
 | |
| // If export is true, the format will be suitable for writing out to an export.
 | |
| func (p *Processor) DomainBlocksGet(ctx context.Context, account *gtsmodel.Account, export bool) ([]*apimodel.DomainBlock, gtserror.WithCode) {
 | |
| 	domainBlocks := []*gtsmodel.DomainBlock{}
 | |
| 
 | |
| 	if err := p.state.DB.GetAll(ctx, &domainBlocks); err != nil {
 | |
| 		if !errors.Is(err, db.ErrNoEntries) {
 | |
| 			// something has gone really wrong
 | |
| 			return nil, gtserror.NewErrorInternalError(err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	apiDomainBlocks := []*apimodel.DomainBlock{}
 | |
| 	for _, b := range domainBlocks {
 | |
| 		apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, b, export)
 | |
| 		if err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(err)
 | |
| 		}
 | |
| 		apiDomainBlocks = append(apiDomainBlocks, apiDomainBlock)
 | |
| 	}
 | |
| 
 | |
| 	return apiDomainBlocks, nil
 | |
| }
 | |
| 
 | |
| // DomainBlockGet returns one domain block with the given id.
 | |
| // If export is true, the format will be suitable for writing out to an export.
 | |
| func (p *Processor) DomainBlockGet(ctx context.Context, account *gtsmodel.Account, id string, export bool) (*apimodel.DomainBlock, gtserror.WithCode) {
 | |
| 	domainBlock := >smodel.DomainBlock{}
 | |
| 
 | |
| 	if err := p.state.DB.GetByID(ctx, id, domainBlock); err != nil {
 | |
| 		if !errors.Is(err, db.ErrNoEntries) {
 | |
| 			// something has gone really wrong
 | |
| 			return nil, gtserror.NewErrorInternalError(err)
 | |
| 		}
 | |
| 		// there are no entries for this ID
 | |
| 		return nil, gtserror.NewErrorNotFound(fmt.Errorf("no entry for ID %s", id))
 | |
| 	}
 | |
| 
 | |
| 	apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, domainBlock, export)
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	return apiDomainBlock, nil
 | |
| }
 | |
| 
 | |
| // DomainBlockDelete removes one domain block with the given ID.
 | |
| func (p *Processor) DomainBlockDelete(ctx context.Context, account *gtsmodel.Account, id string) (*apimodel.DomainBlock, gtserror.WithCode) {
 | |
| 	domainBlock := >smodel.DomainBlock{}
 | |
| 
 | |
| 	if err := p.state.DB.GetByID(ctx, id, domainBlock); err != nil {
 | |
| 		if !errors.Is(err, db.ErrNoEntries) {
 | |
| 			// something has gone really wrong
 | |
| 			return nil, gtserror.NewErrorInternalError(err)
 | |
| 		}
 | |
| 		// there are no entries for this ID
 | |
| 		return nil, gtserror.NewErrorNotFound(fmt.Errorf("no entry for ID %s", id))
 | |
| 	}
 | |
| 
 | |
| 	// prepare the domain block to return
 | |
| 	apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, domainBlock, false)
 | |
| 	if err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	// Delete the domain block
 | |
| 	if err := p.state.DB.DeleteDomainBlock(ctx, domainBlock.Domain); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	// remove the domain block reference from the instance, if we have an entry for it
 | |
| 	i := >smodel.Instance{}
 | |
| 	if err := p.state.DB.GetWhere(ctx, []db.Where{
 | |
| 		{Key: "domain", Value: domainBlock.Domain},
 | |
| 		{Key: "domain_block_id", Value: id},
 | |
| 	}, i); err == nil {
 | |
| 		updatingColumns := []string{"suspended_at", "domain_block_id", "updated_at"}
 | |
| 		i.SuspendedAt = time.Time{}
 | |
| 		i.DomainBlockID = ""
 | |
| 		i.UpdatedAt = time.Now()
 | |
| 		if err := p.state.DB.UpdateByID(ctx, i, i.ID, updatingColumns...); err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(fmt.Errorf("couldn't update database entry for instance %s: %s", domainBlock.Domain, err))
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// unsuspend all accounts whose suspension origin was this domain block
 | |
| 	// 1. remove the 'suspended_at' entry from their accounts
 | |
| 	if err := p.state.DB.UpdateWhere(ctx, []db.Where{
 | |
| 		{Key: "suspension_origin", Value: domainBlock.ID},
 | |
| 	}, "suspended_at", nil, &[]*gtsmodel.Account{}); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("database error removing suspended_at from accounts: %s", err))
 | |
| 	}
 | |
| 
 | |
| 	// 2. remove the 'suspension_origin' entry from their accounts
 | |
| 	if err := p.state.DB.UpdateWhere(ctx, []db.Where{
 | |
| 		{Key: "suspension_origin", Value: domainBlock.ID},
 | |
| 	}, "suspension_origin", nil, &[]*gtsmodel.Account{}); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(fmt.Errorf("database error removing suspension_origin from accounts: %s", err))
 | |
| 	}
 | |
| 
 | |
| 	return apiDomainBlock, nil
 | |
| }
 |