mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 14:42:26 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			1258 lines
		
	
	
	
		
			37 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1258 lines
		
	
	
	
		
			37 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package dereferencing
 | |
| 
 | |
| import (
 | |
| 	"cmp"
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"net/url"
 | |
| 	"time"
 | |
| 
 | |
| 	"code.superseriousbusiness.org/activity/pub"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/ap"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/config"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/db"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/gtscontext"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/gtserror"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/gtsmodel"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/id"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/log"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/media"
 | |
| 	"code.superseriousbusiness.org/gotosocial/internal/util"
 | |
| 	errorsv2 "codeberg.org/gruf/go-errors/v2"
 | |
| )
 | |
| 
 | |
| // accountFresh returns true if the given account is
 | |
| // still considered "fresh" according to the desired
 | |
| // freshness window (falls back to default if nil).
 | |
| //
 | |
| // Local accounts will always be considered fresh because
 | |
| // there's no remote state that could have changed.
 | |
| //
 | |
| // True is also returned for suspended accounts, since
 | |
| // we'll never want to try to refresh one of these.
 | |
| //
 | |
| // Return value of false indicates that the account
 | |
| // is not fresh and should be refreshed from remote.
 | |
| func accountFresh(
 | |
| 	account *gtsmodel.Account,
 | |
| 	window *FreshnessWindow,
 | |
| ) bool {
 | |
| 	if window == nil {
 | |
| 		window = DefaultAccountFreshness
 | |
| 	}
 | |
| 
 | |
| 	if account.IsLocal() {
 | |
| 		// Can't refresh
 | |
| 		// local accounts.
 | |
| 		return true
 | |
| 	}
 | |
| 
 | |
| 	if account.IsSuspended() {
 | |
| 		// Can't/won't refresh
 | |
| 		// suspended accounts.
 | |
| 		return true
 | |
| 	}
 | |
| 
 | |
| 	if account.IsInstance() &&
 | |
| 		!account.IsNew() {
 | |
| 		// Existing instance account.
 | |
| 		// No need for refresh.
 | |
| 		return true
 | |
| 	}
 | |
| 
 | |
| 	// Moment when the account is
 | |
| 	// considered stale according to
 | |
| 	// desired freshness window.
 | |
| 	staleAt := account.FetchedAt.Add(
 | |
| 		time.Duration(*window),
 | |
| 	)
 | |
| 
 | |
| 	// It's still fresh if the time now
 | |
| 	// is not past the point of staleness.
 | |
| 	return !time.Now().After(staleAt)
 | |
| }
 | |
| 
 | |
| // GetAccountByURI will attempt to fetch an accounts by its
 | |
| // URI, first checking the database. In the case of a newly-met
 | |
| // remote model, or a remote model whose last_fetched date is
 | |
| // beyond a certain interval, the account will be dereferenced.
 | |
| // In the case of dereferencing, some low-priority account info
 | |
| // may be enqueued for asynchronous fetching, e.g. pinned statuses.
 | |
| // An ActivityPub object indicates the account was dereferenced.
 | |
| //
 | |
| // if tryURL is true, then the database will also check for a *single*
 | |
| // account where uri == account.url, not just uri == account.uri.
 | |
| // Because url does not guarantee uniqueness, you should only set
 | |
| // tryURL to true when doing searches set in motion by a user,
 | |
| // ie., when it's not important that an exact account is returned.
 | |
| func (d *Dereferencer) GetAccountByURI(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	uri *url.URL,
 | |
| 	tryURL bool,
 | |
| ) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	// Fetch and dereference account if necessary.
 | |
| 	account, accountable, err := d.getAccountByURI(ctx,
 | |
| 		requestUser,
 | |
| 		uri,
 | |
| 		tryURL,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	if accountable != nil {
 | |
| 		// This account was updated, enqueue re-dereference featured posts + stats.
 | |
| 		d.state.Workers.Dereference.Queue.Push(func(ctx context.Context) {
 | |
| 			if err := d.dereferenceAccountFeatured(ctx, requestUser, account); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | |
| 			}
 | |
| 
 | |
| 			if err := d.dereferenceAccountStats(ctx, requestUser, account); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account stats: %v", err)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	return account, accountable, nil
 | |
| }
 | |
| 
 | |
| // getAccountByURI is a package internal form of
 | |
| // .GetAccountByURI() that doesn't bother dereferencing
 | |
| // featured posts on update.
 | |
| func (d *Dereferencer) getAccountByURI(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	uri *url.URL,
 | |
| 	tryURL bool,
 | |
| ) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	var (
 | |
| 		account *gtsmodel.Account
 | |
| 		uriStr  = uri.String()
 | |
| 		err     error
 | |
| 	)
 | |
| 
 | |
| 	// Search the database for existing account with URI.
 | |
| 	// URI is unique so if we get a hit it's that account for sure.
 | |
| 	account, err = d.state.DB.GetAccountByURI(
 | |
| 		gtscontext.SetBarebones(ctx),
 | |
| 		uriStr,
 | |
| 	)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		return nil, nil, gtserror.Newf("error checking database for account %s by uri: %w", uriStr, err)
 | |
| 	}
 | |
| 
 | |
| 	if account == nil && tryURL {
 | |
| 		// Else if we're permitted, search the database for *ONE*
 | |
| 		// account with this URL. This can return multiple hits
 | |
| 		// so check for ErrMultipleEntries. If we get exactly one
 | |
| 		// hit it's *probably* the account we're looking for.
 | |
| 		account, err = d.state.DB.GetOneAccountByURL(
 | |
| 			gtscontext.SetBarebones(ctx),
 | |
| 			uriStr,
 | |
| 		)
 | |
| 		if err != nil && !errorsv2.IsV2(
 | |
| 			err,
 | |
| 			db.ErrNoEntries,
 | |
| 			db.ErrMultipleEntries,
 | |
| 		) {
 | |
| 			return nil, nil, gtserror.Newf("error checking database for account %s by url: %w", uriStr, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if account == nil {
 | |
| 		// Ensure that this is isn't a search for a local account.
 | |
| 		if uri.Host == config.GetHost() || uri.Host == config.GetAccountDomain() {
 | |
| 			return nil, nil, gtserror.SetUnretrievable(err) // this will be db.ErrNoEntries
 | |
| 		}
 | |
| 
 | |
| 		// Create and pass-through a new bare-bones model for dereferencing.
 | |
| 		account, accountable, err := d.enrichAccountSafely(ctx, requestUser, uri, >smodel.Account{
 | |
| 			ID:     id.NewULID(),
 | |
| 			Domain: uri.Host,
 | |
| 			URI:    uriStr,
 | |
| 		}, nil)
 | |
| 		if err != nil {
 | |
| 			return nil, nil, err
 | |
| 		}
 | |
| 
 | |
| 		// We have a new account. Ensure basic account stats populated;
 | |
| 		// real stats will be fetched from remote asynchronously.
 | |
| 		if err := d.state.DB.StubAccountStats(ctx, account); err != nil {
 | |
| 			return nil, nil, gtserror.Newf("error stubbing account stats: %w", err)
 | |
| 		}
 | |
| 
 | |
| 		return account, accountable, nil
 | |
| 	}
 | |
| 
 | |
| 	if accountFresh(account, nil) {
 | |
| 		// This is an existing account that is up-to-date,
 | |
| 		// before returning ensure it is fully populated.
 | |
| 		if err := d.state.DB.PopulateAccount(ctx, account); err != nil {
 | |
| 			log.Errorf(ctx, "error populating existing account: %v", err)
 | |
| 		}
 | |
| 
 | |
| 		return account, nil, nil
 | |
| 	}
 | |
| 
 | |
| 	// Try to update existing account model.
 | |
| 	latest, accountable, err := d.enrichAccountSafely(ctx,
 | |
| 		requestUser,
 | |
| 		uri,
 | |
| 		account,
 | |
| 		nil,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		log.Errorf(ctx, "error enriching remote account: %v", err)
 | |
| 
 | |
| 		// Fallback to existing.
 | |
| 		return account, nil, nil
 | |
| 	}
 | |
| 
 | |
| 	return latest, accountable, nil
 | |
| }
 | |
| 
 | |
| // GetAccountByUsernameDomain will attempt to fetch an accounts by its username@domain, first checking the database. In the case of a newly-met remote model,
 | |
| // or a remote model whose last_fetched date is beyond a certain interval, the account will be dereferenced. In the case of dereferencing, some low-priority
 | |
| // account information may be enqueued for asynchronous fetching, e.g. featured account statuses (pins). An ActivityPub object indicates the account was dereferenced.
 | |
| func (d *Dereferencer) GetAccountByUsernameDomain(ctx context.Context, requestUser string, username string, domain string) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	account, accountable, err := d.getAccountByUsernameDomain(
 | |
| 		ctx,
 | |
| 		requestUser,
 | |
| 		username,
 | |
| 		domain,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	if accountable != nil {
 | |
| 		// This account was updated, enqueue re-dereference featured posts + stats.
 | |
| 		d.state.Workers.Dereference.Queue.Push(func(ctx context.Context) {
 | |
| 			if err := d.dereferenceAccountFeatured(ctx, requestUser, account); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | |
| 			}
 | |
| 
 | |
| 			if err := d.dereferenceAccountStats(ctx, requestUser, account); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account stats: %v", err)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	return account, accountable, nil
 | |
| }
 | |
| 
 | |
| // getAccountByUsernameDomain is a package internal form of
 | |
| // GetAccountByUsernameDomain() that doesn't bother deref of featured posts.
 | |
| func (d *Dereferencer) getAccountByUsernameDomain(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	username string,
 | |
| 	domain string,
 | |
| ) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	if domain == config.GetHost() || domain == config.GetAccountDomain() {
 | |
| 		// We do local lookups using an empty domain,
 | |
| 		// else it will fail the db search below.
 | |
| 		domain = ""
 | |
| 	}
 | |
| 
 | |
| 	// Search the database for existing account with USERNAME@DOMAIN.
 | |
| 	account, err := d.state.DB.GetAccountByUsernameDomain(
 | |
| 		// request a barebones object, it may be in the
 | |
| 		// db but with related models not yet dereferenced.
 | |
| 		gtscontext.SetBarebones(ctx),
 | |
| 		username, domain,
 | |
| 	)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		return nil, nil, gtserror.Newf("error checking database for account %s@%s: %w", username, domain, err)
 | |
| 	}
 | |
| 
 | |
| 	if account == nil {
 | |
| 		if domain == "" {
 | |
| 			// failed local lookup, will be db.ErrNoEntries.
 | |
| 			return nil, nil, gtserror.SetUnretrievable(err)
 | |
| 		}
 | |
| 
 | |
| 		// Create and pass-through a new bare-bones model for dereferencing.
 | |
| 		account, accountable, err := d.enrichAccountSafely(ctx, requestUser, nil, >smodel.Account{
 | |
| 			ID:       id.NewULID(),
 | |
| 			Domain:   domain,
 | |
| 			Username: username,
 | |
| 		}, nil)
 | |
| 		if err != nil {
 | |
| 			return nil, nil, err
 | |
| 		}
 | |
| 
 | |
| 		// We have a new account. Ensure basic account stats populated;
 | |
| 		// real stats will be fetched from remote asynchronously.
 | |
| 		if err := d.state.DB.StubAccountStats(ctx, account); err != nil {
 | |
| 			return nil, nil, gtserror.Newf("error stubbing account stats: %w", err)
 | |
| 		}
 | |
| 
 | |
| 		return account, accountable, nil
 | |
| 	}
 | |
| 
 | |
| 	// Try to update existing account model.
 | |
| 	latest, accountable, err := d.RefreshAccount(ctx,
 | |
| 		requestUser,
 | |
| 		account,
 | |
| 		nil,
 | |
| 		nil,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		// Fallback to existing.
 | |
| 		return account, nil, nil //nolint
 | |
| 	}
 | |
| 
 | |
| 	if accountable == nil {
 | |
| 		// This is existing up-to-date account, ensure it is populated.
 | |
| 		if err := d.state.DB.PopulateAccount(ctx, latest); err != nil {
 | |
| 			log.Errorf(ctx, "error populating existing account: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return latest, accountable, nil
 | |
| }
 | |
| 
 | |
| // RefreshAccount updates the given account if it's a
 | |
| // remote account, and considered stale / not fresh
 | |
| // based on Account.FetchedAt and desired freshness.
 | |
| //
 | |
| // An updated account model is returned, but in the
 | |
| // case of dereferencing, some low-priority account
 | |
| // info may be enqueued for asynchronous fetching,
 | |
| // e.g. featured account statuses (pins).
 | |
| //
 | |
| // An ActivityPub object indicates the account was
 | |
| // dereferenced (i.e. updated).
 | |
| func (d *Dereferencer) RefreshAccount(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	account *gtsmodel.Account,
 | |
| 	accountable ap.Accountable,
 | |
| 	window *FreshnessWindow,
 | |
| ) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	// If no incoming data is provided,
 | |
| 	// check whether account needs refresh.
 | |
| 	if accountable == nil &&
 | |
| 		accountFresh(account, window) {
 | |
| 		return account, nil, nil
 | |
| 	}
 | |
| 
 | |
| 	// Parse the URI from account.
 | |
| 	uri, err := url.Parse(account.URI)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, gtserror.Newf("invalid account uri %q: %w", account.URI, err)
 | |
| 	}
 | |
| 
 | |
| 	// Try to update + deref passed account model.
 | |
| 	latest, accountable, err := d.enrichAccountSafely(ctx,
 | |
| 		requestUser,
 | |
| 		uri,
 | |
| 		account,
 | |
| 		accountable,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		log.Errorf(ctx, "error enriching remote account: %v", err)
 | |
| 		return nil, nil, gtserror.Newf("%w", err)
 | |
| 	}
 | |
| 
 | |
| 	if accountable != nil {
 | |
| 		// This account was updated, enqueue re-dereference featured posts + stats.
 | |
| 		d.state.Workers.Dereference.Queue.Push(func(ctx context.Context) {
 | |
| 			if err := d.dereferenceAccountFeatured(ctx, requestUser, latest); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | |
| 			}
 | |
| 
 | |
| 			if err := d.dereferenceAccountStats(ctx, requestUser, latest); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account stats: %v", err)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	return latest, accountable, nil
 | |
| }
 | |
| 
 | |
| // RefreshAccountAsync enqueues the given account for
 | |
| // an asychronous update fetching, if it's a remote
 | |
| // account, and considered stale / not fresh based on
 | |
| // Account.FetchedAt and desired freshness.
 | |
| //
 | |
| // This is a more optimized form of manually enqueueing
 | |
| // .UpdateAccount() to the federation worker, since it
 | |
| // only enqueues update if necessary.
 | |
| func (d *Dereferencer) RefreshAccountAsync(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	account *gtsmodel.Account,
 | |
| 	accountable ap.Accountable,
 | |
| 	window *FreshnessWindow,
 | |
| ) {
 | |
| 	// If no incoming data is provided,
 | |
| 	// check whether account needs refresh.
 | |
| 	if accountable == nil &&
 | |
| 		accountFresh(account, window) {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// Parse the URI from account.
 | |
| 	uri, err := url.Parse(account.URI)
 | |
| 	if err != nil {
 | |
| 		log.Errorf(ctx, "invalid account uri %q: %v", account.URI, err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// Enqueue a worker function to enrich this account async.
 | |
| 	d.state.Workers.Dereference.Queue.Push(func(ctx context.Context) {
 | |
| 		latest, accountable, err := d.enrichAccountSafely(ctx, requestUser, uri, account, accountable)
 | |
| 		if err != nil {
 | |
| 			log.Errorf(ctx, "error enriching remote account: %v", err)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		if accountable != nil {
 | |
| 			// This account was updated, enqueue re-dereference featured posts + stats.
 | |
| 			if err := d.dereferenceAccountFeatured(ctx, requestUser, latest); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account featured collection: %v", err)
 | |
| 			}
 | |
| 
 | |
| 			if err := d.dereferenceAccountStats(ctx, requestUser, latest); err != nil {
 | |
| 				log.Errorf(ctx, "error fetching account stats: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 	})
 | |
| }
 | |
| 
 | |
| // enrichAccountSafely wraps enrichAccount() to perform
 | |
| // it within the State{}.FedLocks mutexmap, which protects
 | |
| // dereferencing actions with per-URI mutex locks.
 | |
| func (d *Dereferencer) enrichAccountSafely(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	uri *url.URL,
 | |
| 	account *gtsmodel.Account,
 | |
| 	accountable ap.Accountable,
 | |
| ) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	// Noop if account suspended;
 | |
| 	// we don't want to deref it.
 | |
| 	if account.IsSuspended() {
 | |
| 		return account, nil, nil
 | |
| 	}
 | |
| 
 | |
| 	// By default use account.URI
 | |
| 	// as the per-URI deref lock.
 | |
| 	var uriStr string
 | |
| 	if account.URI != "" {
 | |
| 		uriStr = account.URI
 | |
| 	} else {
 | |
| 		// No URI is set yet, instead generate a faux-one from user+domain.
 | |
| 		uriStr = "https://" + account.Domain + "/users/" + account.Username
 | |
| 	}
 | |
| 
 | |
| 	// Acquire per-URI deref lock, wraping unlock
 | |
| 	// to safely defer in case of panic, while still
 | |
| 	// performing more granular unlocks when needed.
 | |
| 	unlock := d.state.FedLocks.Lock(uriStr)
 | |
| 	unlock = util.DoOnce(unlock)
 | |
| 	defer unlock()
 | |
| 
 | |
| 	// Perform status enrichment with passed vars.
 | |
| 	latest, apubAcc, err := d.enrichAccount(ctx,
 | |
| 		requestUser,
 | |
| 		uri,
 | |
| 		account,
 | |
| 		accountable,
 | |
| 	)
 | |
| 
 | |
| 	if gtserror.StatusCode(err) >= 400 {
 | |
| 		if account.IsNew() {
 | |
| 			// This was a new account enrich
 | |
| 			// attempt which failed before we
 | |
| 			// got to store it, so we can't
 | |
| 			// return anything useful.
 | |
| 			return nil, nil, err
 | |
| 		}
 | |
| 
 | |
| 		// We had this account stored already
 | |
| 		// before this enrichment attempt.
 | |
| 		//
 | |
| 		// Update fetched_at to slow re-attempts
 | |
| 		// but don't return early. We can still
 | |
| 		// return the model we had stored already.
 | |
| 		account.FetchedAt = time.Now()
 | |
| 		if err := d.state.DB.UpdateAccount(ctx, account, "fetched_at"); err != nil {
 | |
| 			log.Error(ctx, "error updating %s fetched_at: %v", uriStr, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Unlock now
 | |
| 	// we're done.
 | |
| 	unlock()
 | |
| 
 | |
| 	if errors.Is(err, db.ErrAlreadyExists) {
 | |
| 		// Ensure AP model isn't set,
 | |
| 		// otherwise this indicates WE
 | |
| 		// enriched the account.
 | |
| 		apubAcc = nil
 | |
| 
 | |
| 		// DATA RACE! We likely lost out to another goroutine
 | |
| 		// in a call to db.Put(Account). Look again in DB by URI.
 | |
| 		latest, err = d.state.DB.GetAccountByURI(ctx, account.URI)
 | |
| 		if err != nil {
 | |
| 			err = gtserror.Newf("error getting account %s from database after race: %w", uriStr, err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return latest, apubAcc, err
 | |
| }
 | |
| 
 | |
| // enrichAccount will enrich the given account, whether a
 | |
| // new barebones model, or existing model from the database.
 | |
| // It handles necessary dereferencing, webfingering etc.
 | |
| func (d *Dereferencer) enrichAccount(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	uri *url.URL,
 | |
| 	account *gtsmodel.Account,
 | |
| 	apubAcc ap.Accountable,
 | |
| ) (*gtsmodel.Account, ap.Accountable, error) {
 | |
| 	// Pre-fetch a transport for requesting username, used by later deref procedures.
 | |
| 	tsport, err := d.transportController.NewTransportForUsername(ctx, requestUser)
 | |
| 	if err != nil {
 | |
| 		return nil, nil, gtserror.Newf("couldn't create transport: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	if account.Username != "" {
 | |
| 		// A username was provided so we can attempt to webfinger,
 | |
| 		// this ensures up-to-date account domain, and handles some
 | |
| 		// edge cases where servers don't provide a preferred_username.
 | |
| 		accUsername, accDomain, accURI, err := d.fingerRemoteAccount(ctx,
 | |
| 			tsport,
 | |
| 			account.Username,
 | |
| 			account.Domain,
 | |
| 		)
 | |
| 
 | |
| 		switch {
 | |
| 		case err != nil && account.URI == "":
 | |
| 			// This is a new account (to us) with username@domain
 | |
| 			// but failed webfinger, nothing more we can do.
 | |
| 			err := gtserror.Newf("error webfingering account: %w", err)
 | |
| 			return nil, nil, gtserror.SetUnretrievable(err)
 | |
| 
 | |
| 		case err != nil:
 | |
| 			// Simply log this error and move on,
 | |
| 			// we already have an account URI.
 | |
| 			log.Errorf(ctx,
 | |
| 				"error webfingering[1] remote account %s@%s: %v",
 | |
| 				account.Username, account.Domain, err,
 | |
| 			)
 | |
| 
 | |
| 		case account.Domain != accDomain:
 | |
| 			// After webfinger, we now have correct account domain from which we can do a final DB check.
 | |
| 			alreadyAcc, err := d.state.DB.GetAccountByUsernameDomain(ctx, account.Username, accDomain)
 | |
| 			if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 				return nil, nil, gtserror.Newf("db error getting account after webfinger: %w", err)
 | |
| 			}
 | |
| 
 | |
| 			if alreadyAcc != nil {
 | |
| 				// We had this account stored
 | |
| 				// under discovered accountDomain.
 | |
| 				//
 | |
| 				// Proceed with this account.
 | |
| 				account = alreadyAcc
 | |
| 			}
 | |
| 
 | |
| 			// Whether we had the account or not, we
 | |
| 			// now have webfinger info relevant to the
 | |
| 			// account, so fallthrough to set webfinger
 | |
| 			// info on either the account we just found,
 | |
| 			// or the stub account we were passed.
 | |
| 			fallthrough
 | |
| 
 | |
| 		default:
 | |
| 			// Update account with latest info.
 | |
| 			account.URI = accURI.String()
 | |
| 			account.Domain = accDomain
 | |
| 			uri = accURI
 | |
| 
 | |
| 			// Specifically only update username if not already set.
 | |
| 			account.Username = cmp.Or(account.Username, accUsername)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if uri == nil {
 | |
| 		// No URI provided / found,
 | |
| 		// must parse from account.
 | |
| 		uri, err = url.Parse(account.URI)
 | |
| 		if err != nil {
 | |
| 			err := gtserror.Newf("invalid uri %q: %w", account.URI, err)
 | |
| 			return nil, nil, gtserror.SetUnretrievable(err)
 | |
| 		}
 | |
| 
 | |
| 		// Check URI scheme ahead of time for more useful errs.
 | |
| 		if uri.Scheme != "http" && uri.Scheme != "https" {
 | |
| 			err := gtserror.Newf("invalid uri %q: scheme must be http(s)", account.URI)
 | |
| 			return nil, nil, gtserror.SetUnretrievable(err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	/*
 | |
| 		BY THIS POINT we must have an account URI set,
 | |
| 		either provided, pinned to the account, or
 | |
| 		obtained via webfinger call.
 | |
| 	*/
 | |
| 
 | |
| 	// Check whether this account URI is a blocked domain / subdomain.
 | |
| 	if blocked, err := d.state.DB.IsDomainBlocked(ctx, uri.Host); err != nil {
 | |
| 		return nil, nil, gtserror.Newf("error checking blocked domain: %w", err)
 | |
| 	} else if blocked {
 | |
| 		return nil, nil, gtserror.Newf("%s is blocked", uri.Host)
 | |
| 	}
 | |
| 
 | |
| 	// Mark deref+update handshake start.
 | |
| 	d.startHandshake(requestUser, uri)
 | |
| 	defer d.stopHandshake(requestUser, uri)
 | |
| 
 | |
| 	var resolve bool
 | |
| 
 | |
| 	if resolve = (apubAcc == nil); resolve {
 | |
| 		// We were not given any (partial) ActivityPub
 | |
| 		// version of this account as a parameter.
 | |
| 		// Dereference latest version of the account.
 | |
| 		rsp, err := tsport.Dereference(ctx, uri)
 | |
| 		if err != nil {
 | |
| 			err := gtserror.Newf("error dereferencing %s: %w", uri, err)
 | |
| 			return nil, nil, gtserror.SetUnretrievable(err)
 | |
| 		}
 | |
| 
 | |
| 		// Attempt to resolve ActivityPub acc from response.
 | |
| 		apubAcc, err = ap.ResolveAccountable(ctx, rsp.Body)
 | |
| 
 | |
| 		// Tidy up now done.
 | |
| 		_ = rsp.Body.Close()
 | |
| 
 | |
| 		if err != nil {
 | |
| 			// ResolveAccountable will set gtserror.WrongType
 | |
| 			// on the returned error, so we don't need to do it here.
 | |
| 			err := gtserror.Newf("error resolving accountable %s: %w", uri, err)
 | |
| 			return nil, nil, err
 | |
| 		}
 | |
| 
 | |
| 		// Check whether input URI and final returned URI
 | |
| 		// have changed (i.e. we followed some redirects).
 | |
| 		if finalURIStr := rsp.Request.URL.String(); //
 | |
| 		finalURIStr != uri.String() {
 | |
| 
 | |
| 			// NOTE: this URI check + database call is performed
 | |
| 			// AFTER reading and closing response body, for performance.
 | |
| 			//
 | |
| 			// Check whether we have this account stored under *final* URI.
 | |
| 			alreadyAcc, err := d.state.DB.GetAccountByURI(ctx, finalURIStr)
 | |
| 			if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 				return nil, nil, gtserror.Newf("db error getting account after redirects: %w", err)
 | |
| 			}
 | |
| 
 | |
| 			switch {
 | |
| 			case alreadyAcc == nil:
 | |
| 				// nothing to do
 | |
| 
 | |
| 			case alreadyAcc.IsLocal():
 | |
| 				// Request eventually redirected to a
 | |
| 				// local account. Return it as-is here.
 | |
| 				return alreadyAcc, nil, nil
 | |
| 
 | |
| 			default:
 | |
| 				// We had this account stored
 | |
| 				// under discovered final URI.
 | |
| 				//
 | |
| 				// Proceed with this account.
 | |
| 				account = alreadyAcc
 | |
| 			}
 | |
| 
 | |
| 			// Update the input URI to
 | |
| 			// the final determined URI
 | |
| 			// for later URI checks.
 | |
| 			uri = rsp.Request.URL
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	/*
 | |
| 		BY THIS POINT we must have the ActivityPub
 | |
| 		representation of the account, either provided,
 | |
| 		or obtained via a dereference call.
 | |
| 	*/
 | |
| 
 | |
| 	// Convert the dereferenced AP account object to our GTS model.
 | |
| 	//
 | |
| 	// We put this in the variable latestAcc because we might want
 | |
| 	// to compare the provided account model with this fresh version,
 | |
| 	// in order to check if anything changed since we last saw it.
 | |
| 	latestAcc, err := d.converter.ASRepresentationToAccount(ctx,
 | |
| 		apubAcc,
 | |
| 		account.Domain,
 | |
| 		account.Username,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		// ASRepresentationToAccount will set Malformed on the
 | |
| 		// returned error, so we don't need to do it here.
 | |
| 		err := gtserror.Newf("error converting %s to gts model: %w", uri, err)
 | |
| 		return nil, nil, err
 | |
| 	}
 | |
| 
 | |
| 	if account.Username == "" {
 | |
| 		var accUsername string
 | |
| 
 | |
| 		// Assume the host from the
 | |
| 		// ActivityPub representation.
 | |
| 		id := ap.GetJSONLDId(apubAcc)
 | |
| 		if id == nil {
 | |
| 			return nil, nil, gtserror.New("no id property found on person, or id was not an iri")
 | |
| 		}
 | |
| 
 | |
| 		// Get IRI host value.
 | |
| 		accHost := id.Host
 | |
| 
 | |
| 		// No username was provided, so no webfinger was attempted earlier.
 | |
| 		//
 | |
| 		// Now we have a username we can attempt again, to ensure up-to-date
 | |
| 		// accountDomain info. For this final attempt we should use the domain
 | |
| 		// of the ID of the dereffed account, rather than the URI we were given.
 | |
| 		//
 | |
| 		// This avoids cases where we were given a URI like
 | |
| 		// https://example.org/@someone@somewhere.else and we've been redirected
 | |
| 		// from example.org to somewhere.else: we want to take somewhere.else
 | |
| 		// as the accountDomain then, not the example.org we were redirected from.
 | |
| 		accUsername, latestAcc.Domain, _, err = d.fingerRemoteAccount(ctx,
 | |
| 			tsport,
 | |
| 			latestAcc.Username,
 | |
| 			accHost,
 | |
| 		)
 | |
| 		if err != nil {
 | |
| 			// Webfingering account still failed, so we're not certain
 | |
| 			// what the accountDomain actually is. Exit here for safety.
 | |
| 			return nil, nil, gtserror.Newf(
 | |
| 				"error webfingering remote account %s@%s: %w",
 | |
| 				latestAcc.Username, accHost, err,
 | |
| 			)
 | |
| 		}
 | |
| 
 | |
| 		// Specifically only update username if not already set.
 | |
| 		latestAcc.Username = cmp.Or(latestAcc.Username, accUsername)
 | |
| 	}
 | |
| 
 | |
| 	// Ensure the final parsed account URI matches
 | |
| 	// the input URI we fetched (or received) it as.
 | |
| 	if matches, err := util.URIMatches(
 | |
| 		uri,
 | |
| 		append(
 | |
| 			ap.GetURL(apubAcc),      // account URL(s)
 | |
| 			ap.GetJSONLDId(apubAcc), // account URI
 | |
| 		)...,
 | |
| 	); err != nil {
 | |
| 		return nil, nil, gtserror.Newf(
 | |
| 			"error checking account uri %s: %w",
 | |
| 			latestAcc.URI, err,
 | |
| 		)
 | |
| 	} else if !matches {
 | |
| 		return nil, nil, gtserror.Newf(
 | |
| 			"account uri %s does not match %s",
 | |
| 			latestAcc.URI, uri,
 | |
| 		)
 | |
| 	}
 | |
| 
 | |
| 	// Ensure this isn't a local account,
 | |
| 	// or a remote masquerading as such!
 | |
| 	if latestAcc.IsLocal() {
 | |
| 		return nil, nil, gtserror.Newf("cannot dereference local account %s", uri)
 | |
| 	}
 | |
| 
 | |
| 	// Get current time.
 | |
| 	now := time.Now()
 | |
| 
 | |
| 	// Before expending any further serious compute, we need
 | |
| 	// to ensure account keys haven't unexpectedly been changed.
 | |
| 	if !verifyAccountKeysOnUpdate(account, latestAcc, now, !resolve) {
 | |
| 		return nil, nil, gtserror.Newf("account %s pubkey has changed (key rotation required?)", uri)
 | |
| 	}
 | |
| 
 | |
| 	/*
 | |
| 		BY THIS POINT we have more or less a fullly-formed
 | |
| 		representation of the target account, derived from
 | |
| 		a combination of webfinger lookups and dereferencing.
 | |
| 		Further fetching beyond this point is for peripheral
 | |
| 		things like account avatar, header, emojis, stats.
 | |
| 	*/
 | |
| 
 | |
| 	// Ensure internal db ID is
 | |
| 	// set and update fetch time.
 | |
| 	latestAcc.ID = account.ID
 | |
| 	latestAcc.FetchedAt = now
 | |
| 	latestAcc.UpdatedAt = now
 | |
| 
 | |
| 	// Ensure the account's avatar media is populated, passing in existing to check for chages.
 | |
| 	if err := d.fetchAccountAvatar(ctx, requestUser, account, latestAcc); err != nil {
 | |
| 		log.Errorf(ctx, "error fetching remote avatar for account %s: %v", uri, err)
 | |
| 	}
 | |
| 
 | |
| 	// Ensure the account's avatar media is populated, passing in existing to check for chages.
 | |
| 	if err := d.fetchAccountHeader(ctx, requestUser, account, latestAcc); err != nil {
 | |
| 		log.Errorf(ctx, "error fetching remote header for account %s: %v", uri, err)
 | |
| 	}
 | |
| 
 | |
| 	// Fetch the latest remote account emoji IDs used in account display name/bio.
 | |
| 	if err = d.fetchAccountEmojis(ctx, account, latestAcc); err != nil {
 | |
| 		log.Errorf(ctx, "error fetching remote emojis for account %s: %v", uri, err)
 | |
| 	}
 | |
| 
 | |
| 	if account.IsNew() {
 | |
| 		// Prefer published/created time from
 | |
| 		// apubAcc, fall back to current time.
 | |
| 		if latestAcc.CreatedAt.IsZero() {
 | |
| 			latestAcc.CreatedAt = now
 | |
| 		}
 | |
| 
 | |
| 		// This is new, put it in the database.
 | |
| 		err := d.state.DB.PutAccount(ctx, latestAcc)
 | |
| 		if err != nil {
 | |
| 			return nil, nil, gtserror.Newf("error putting in database: %w", err)
 | |
| 		}
 | |
| 	} else {
 | |
| 		// Prefer published time from apubAcc,
 | |
| 		// fall back to previous stored value.
 | |
| 		if latestAcc.CreatedAt.IsZero() {
 | |
| 			latestAcc.CreatedAt = account.CreatedAt
 | |
| 		}
 | |
| 
 | |
| 		// This is an existing account, update the model in the database.
 | |
| 		if err := d.state.DB.UpdateAccount(ctx, latestAcc); err != nil {
 | |
| 			return nil, nil, gtserror.Newf("error updating database: %w", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return latestAcc, apubAcc, nil
 | |
| }
 | |
| 
 | |
| func (d *Dereferencer) fetchAccountAvatar(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	existingAcc *gtsmodel.Account,
 | |
| 	latestAcc *gtsmodel.Account,
 | |
| ) error {
 | |
| 	if latestAcc.AvatarRemoteURL == "" {
 | |
| 		// No avatar set on newest model, leave
 | |
| 		// latest avatar attachment ID empty.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Check for an existing stored media attachment
 | |
| 	// specifically with unchanged remote URL we can use.
 | |
| 	if existingAcc.AvatarMediaAttachmentID != "" &&
 | |
| 		existingAcc.AvatarRemoteURL == latestAcc.AvatarRemoteURL {
 | |
| 
 | |
| 		// Fetch the existing avatar media attachment with ID.
 | |
| 		existing, err := d.state.DB.GetAttachmentByID(ctx,
 | |
| 			existingAcc.AvatarMediaAttachmentID,
 | |
| 		)
 | |
| 		if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 			return gtserror.Newf("error getting attachment %s: %w", existingAcc.AvatarMediaAttachmentID, err)
 | |
| 		}
 | |
| 
 | |
| 		if existing != nil {
 | |
| 			// Ensuring existing attachment is up-to-date
 | |
| 			// and any recaching is performed if required.
 | |
| 			existing, err := d.updateAttachment(ctx,
 | |
| 				requestUser,
 | |
| 				existing,
 | |
| 				nil,
 | |
| 			)
 | |
| 
 | |
| 			if err != nil {
 | |
| 				log.Errorf(ctx, "error updating existing attachment: %v", err)
 | |
| 
 | |
| 				// specifically do NOT return nil here,
 | |
| 				// we already have a model, we don't
 | |
| 				// want to drop it from the account, just
 | |
| 				// log that an update for it failed.
 | |
| 			}
 | |
| 
 | |
| 			// Set the avatar attachment on account model.
 | |
| 			latestAcc.AvatarMediaAttachment = existing
 | |
| 			latestAcc.AvatarMediaAttachmentID = existing.ID
 | |
| 
 | |
| 			return nil
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Fetch newly changed avatar.
 | |
| 	attachment, err := d.GetMedia(ctx,
 | |
| 		requestUser,
 | |
| 		latestAcc.ID,
 | |
| 		latestAcc.AvatarRemoteURL,
 | |
| 		media.AdditionalMediaInfo{
 | |
| 			Avatar:    util.Ptr(true),
 | |
| 			RemoteURL: &latestAcc.AvatarRemoteURL,
 | |
| 		},
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		if attachment == nil {
 | |
| 			return gtserror.Newf("error loading attachment %s: %w", latestAcc.AvatarRemoteURL, err)
 | |
| 		}
 | |
| 
 | |
| 		// non-fatal error occurred during loading, still use it.
 | |
| 		log.Warnf(ctx, "partially loaded attachment: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Set the avatar attachment on account model.
 | |
| 	latestAcc.AvatarMediaAttachment = attachment
 | |
| 	latestAcc.AvatarMediaAttachmentID = attachment.ID
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (d *Dereferencer) fetchAccountHeader(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	existingAcc *gtsmodel.Account,
 | |
| 	latestAcc *gtsmodel.Account,
 | |
| ) error {
 | |
| 	if latestAcc.HeaderRemoteURL == "" {
 | |
| 		// No header set on newest model, leave
 | |
| 		// latest header attachment ID empty.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Check for an existing stored media attachment
 | |
| 	// specifically with unchanged remote URL we can use.
 | |
| 	if existingAcc.HeaderMediaAttachmentID != "" &&
 | |
| 		existingAcc.HeaderRemoteURL == latestAcc.HeaderRemoteURL {
 | |
| 
 | |
| 		// Fetch the existing header media attachment with ID.
 | |
| 		existing, err := d.state.DB.GetAttachmentByID(ctx,
 | |
| 			existingAcc.HeaderMediaAttachmentID,
 | |
| 		)
 | |
| 		if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 			return gtserror.Newf("error getting attachment %s: %w", existingAcc.HeaderMediaAttachmentID, err)
 | |
| 		}
 | |
| 
 | |
| 		if existing != nil {
 | |
| 			// Ensuring existing attachment is up-to-date
 | |
| 			// and any recaching is performed if required.
 | |
| 			existing, err := d.updateAttachment(ctx,
 | |
| 				requestUser,
 | |
| 				existing,
 | |
| 				nil,
 | |
| 			)
 | |
| 
 | |
| 			if err != nil {
 | |
| 				log.Errorf(ctx, "error updating existing attachment: %v", err)
 | |
| 
 | |
| 				// specifically do NOT return nil here,
 | |
| 				// we already have a model, we don't
 | |
| 				// want to drop it from the account, just
 | |
| 				// log that an update for it failed.
 | |
| 			}
 | |
| 
 | |
| 			// Set the header attachment on account model.
 | |
| 			latestAcc.HeaderMediaAttachment = existing
 | |
| 			latestAcc.HeaderMediaAttachmentID = existing.ID
 | |
| 
 | |
| 			return nil
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Fetch newly changed header.
 | |
| 	attachment, err := d.GetMedia(ctx,
 | |
| 		requestUser,
 | |
| 		latestAcc.ID,
 | |
| 		latestAcc.HeaderRemoteURL,
 | |
| 		media.AdditionalMediaInfo{
 | |
| 			Header:    util.Ptr(true),
 | |
| 			RemoteURL: &latestAcc.HeaderRemoteURL,
 | |
| 		},
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		if attachment == nil {
 | |
| 			return gtserror.Newf("error loading attachment %s: %w", latestAcc.HeaderRemoteURL, err)
 | |
| 		}
 | |
| 
 | |
| 		// non-fatal error occurred during loading, still use it.
 | |
| 		log.Warnf(ctx, "partially loaded attachment: %v", err)
 | |
| 	}
 | |
| 
 | |
| 	// Set the header attachment on account model.
 | |
| 	latestAcc.HeaderMediaAttachment = attachment
 | |
| 	latestAcc.HeaderMediaAttachmentID = attachment.ID
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (d *Dereferencer) fetchAccountEmojis(
 | |
| 	ctx context.Context,
 | |
| 	existing *gtsmodel.Account,
 | |
| 	account *gtsmodel.Account,
 | |
| ) error {
 | |
| 	// Fetch the updated emojis for our account.
 | |
| 	emojis, changed, err := d.fetchEmojis(ctx,
 | |
| 		existing.Emojis,
 | |
| 		account.Emojis,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		return gtserror.Newf("error fetching emojis: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	if !changed {
 | |
| 		// Use existing account emoji objects.
 | |
| 		account.EmojiIDs = existing.EmojiIDs
 | |
| 		account.Emojis = existing.Emojis
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Set latest emojis.
 | |
| 	account.Emojis = emojis
 | |
| 
 | |
| 	// Iterate over and set changed emoji IDs.
 | |
| 	account.EmojiIDs = make([]string, len(emojis))
 | |
| 	for i, emoji := range emojis {
 | |
| 		account.EmojiIDs[i] = emoji.ID
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (d *Dereferencer) dereferenceAccountStats(
 | |
| 	ctx context.Context,
 | |
| 	requestUser string,
 | |
| 	account *gtsmodel.Account,
 | |
| ) error {
 | |
| 	// Ensure we have a stats model for this account.
 | |
| 	if err := d.state.DB.PopulateAccountStats(ctx, account); err != nil {
 | |
| 		return gtserror.Newf("db error getting account stats: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	// We want to update stats by getting remote
 | |
| 	// followers/following/statuses counts for
 | |
| 	// this account.
 | |
| 	//
 | |
| 	// If we fail getting any particular stat,
 | |
| 	// it will just fall back to counting local.
 | |
| 
 | |
| 	// Followers first.
 | |
| 	if count, err := d.countCollection(
 | |
| 		ctx,
 | |
| 		account.FollowersURI,
 | |
| 		requestUser,
 | |
| 	); err != nil {
 | |
| 		// Log this but don't bail.
 | |
| 		log.Warnf(ctx,
 | |
| 			"couldn't count followers for @%s@%s: %v",
 | |
| 			account.Username, account.Domain, err,
 | |
| 		)
 | |
| 	} else if count > 0 {
 | |
| 		// Positive integer is useful!
 | |
| 		account.Stats.FollowersCount = &count
 | |
| 	}
 | |
| 
 | |
| 	// Now following.
 | |
| 	if count, err := d.countCollection(
 | |
| 		ctx,
 | |
| 		account.FollowingURI,
 | |
| 		requestUser,
 | |
| 	); err != nil {
 | |
| 		// Log this but don't bail.
 | |
| 		log.Warnf(ctx,
 | |
| 			"couldn't count following for @%s@%s: %v",
 | |
| 			account.Username, account.Domain, err,
 | |
| 		)
 | |
| 	} else if count > 0 {
 | |
| 		// Positive integer is useful!
 | |
| 		account.Stats.FollowingCount = &count
 | |
| 	}
 | |
| 
 | |
| 	// Now statuses count.
 | |
| 	if count, err := d.countCollection(
 | |
| 		ctx,
 | |
| 		account.OutboxURI,
 | |
| 		requestUser,
 | |
| 	); err != nil {
 | |
| 		// Log this but don't bail.
 | |
| 		log.Warnf(ctx,
 | |
| 			"couldn't count statuses for @%s@%s: %v",
 | |
| 			account.Username, account.Domain, err,
 | |
| 		)
 | |
| 	} else if count > 0 {
 | |
| 		// Positive integer is useful!
 | |
| 		account.Stats.StatusesCount = &count
 | |
| 	}
 | |
| 
 | |
| 	// Update stats now.
 | |
| 	if err := d.state.DB.UpdateAccountStats(
 | |
| 		ctx,
 | |
| 		account.Stats,
 | |
| 		"followers_count",
 | |
| 		"following_count",
 | |
| 		"statuses_count",
 | |
| 	); err != nil {
 | |
| 		return gtserror.Newf("db error updating account stats: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // countCollection parses the given uriStr,
 | |
| // dereferences the result as a collection
 | |
| // type, and returns total items as 0, or
 | |
| // a positive integer, or -1 if total items
 | |
| // cannot be counted.
 | |
| //
 | |
| // Error will be returned for invalid non-empty
 | |
| // URIs or dereferencing isses.
 | |
| func (d *Dereferencer) countCollection(
 | |
| 	ctx context.Context,
 | |
| 	uriStr string,
 | |
| 	requestUser string,
 | |
| ) (int, error) {
 | |
| 	if uriStr == "" {
 | |
| 		return -1, nil
 | |
| 	}
 | |
| 
 | |
| 	uri, err := url.Parse(uriStr)
 | |
| 	if err != nil {
 | |
| 		return -1, err
 | |
| 	}
 | |
| 
 | |
| 	collect, err := d.dereferenceCollection(ctx, requestUser, uri)
 | |
| 	if err != nil {
 | |
| 		return -1, err
 | |
| 	}
 | |
| 
 | |
| 	return collect.TotalItems(), nil
 | |
| }
 | |
| 
 | |
| // dereferenceAccountFeatured dereferences an account's featuredCollectionURI (if not empty). For each discovered status, this status will
 | |
| // be dereferenced (if necessary) and marked as pinned (if necessary). Then, old pins will be removed if they're not included in new pins.
 | |
| func (d *Dereferencer) dereferenceAccountFeatured(ctx context.Context, requestUser string, account *gtsmodel.Account) error {
 | |
| 	uri, err := url.Parse(account.FeaturedCollectionURI)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	collect, err := d.dereferenceCollection(ctx, requestUser, uri)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// Get previous pinned statuses (we'll need these later).
 | |
| 	wasPinned, err := d.state.DB.GetAccountPinnedStatuses(ctx, account.ID)
 | |
| 	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 		return gtserror.Newf("error getting account pinned statuses: %w", err)
 | |
| 	}
 | |
| 
 | |
| 	var statusURIs []*url.URL
 | |
| 
 | |
| 	for {
 | |
| 		// Get next collect item.
 | |
| 		item := collect.NextItem()
 | |
| 		if item == nil {
 | |
| 			break
 | |
| 		}
 | |
| 
 | |
| 		// Check for available IRI.
 | |
| 		itemIRI, _ := pub.ToId(item)
 | |
| 		if itemIRI == nil {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if itemIRI.Host != uri.Host {
 | |
| 			// If this status doesn't share a host with its featured
 | |
| 			// collection URI, we shouldn't trust it. Just move on.
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// Already append this status URI to our slice.
 | |
| 		// We do this here so that even if we can't get
 | |
| 		// the status in the next part for some reason,
 | |
| 		// we still know it was *meant* to be pinned.
 | |
| 		statusURIs = append(statusURIs, itemIRI)
 | |
| 
 | |
| 		// Search for status by URI. Note this may return an existing model
 | |
| 		// we have stored with an error from attempted update, so check both.
 | |
| 		status, _, _, err := d.getStatusByURI(ctx, requestUser, itemIRI)
 | |
| 		if err != nil {
 | |
| 			log.Errorf(ctx, "error getting status from featured collection %s: %v", itemIRI, err)
 | |
| 
 | |
| 			if status == nil {
 | |
| 				// This is only unactionable
 | |
| 				// if no status was returned.
 | |
| 				continue
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// If the status was already pinned,
 | |
| 		// we don't need to do anything.
 | |
| 		if !status.PinnedAt.IsZero() {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if status.AccountURI != account.URI {
 | |
| 			// Someone's pinned a status that doesn't
 | |
| 			// belong to them, this doesn't work for us.
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if status.BoostOfID != "" {
 | |
| 			// Someone's pinned a boost. This
 | |
| 			// also doesn't work for us. (note
 | |
| 			// we check using BoostOfID since
 | |
| 			// BoostOfURI isn't *always* set).
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		// All conditions are met for this status to
 | |
| 		// be pinned, so we can finally update it.
 | |
| 		status.PinnedAt = time.Now()
 | |
| 		if err := d.state.DB.UpdateStatus(ctx, status, "pinned_at"); err != nil {
 | |
| 			log.Errorf(ctx, "error updating status in featured collection %s: %v", status.URI, err)
 | |
| 			continue
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Now that we know which statuses are pinned, we should
 | |
| 	// *unpin* previous pinned statuses that aren't included.
 | |
| outerLoop:
 | |
| 	for _, status := range wasPinned {
 | |
| 		for _, statusURI := range statusURIs {
 | |
| 			if status.URI == statusURI.String() {
 | |
| 				// This status is included in most recent
 | |
| 				// pinned uris. No need to keep checking.
 | |
| 				continue outerLoop
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		// Status was pinned before, but is not included
 | |
| 		// in most recent pinned uris, so unpin it now.
 | |
| 		status.PinnedAt = time.Time{}
 | |
| 		if err := d.state.DB.UpdateStatus(ctx, status, "pinned_at"); err != nil {
 | |
| 			log.Errorf(ctx, "error unpinning status %s: %v", status.URI, err)
 | |
| 			continue
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |