2021-08-20 11:26:56 +01:00
|
|
|
/*
|
|
|
|
GoToSocial
|
2021-12-20 17:42:19 +00:00
|
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
2021-08-20 11:26:56 +01:00
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2021-05-27 15:06:24 +01:00
|
|
|
package federatingdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/sirupsen/logrus"
|
2021-11-13 16:29:43 +00:00
|
|
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
2021-08-10 12:32:39 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2021-12-07 12:31:39 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
2021-05-27 15:06:24 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2021-08-31 14:59:12 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
2021-05-27 15:06:24 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Update sets an existing entry to the database based on the value's
|
|
|
|
// id.
|
|
|
|
//
|
|
|
|
// Note that Activity values received from federated peers may also be
|
|
|
|
// updated in the database this way if the Federating Protocol is
|
|
|
|
// enabled. The client may freely decide to store only the id instead of
|
|
|
|
// the entire value.
|
|
|
|
//
|
|
|
|
// The library makes this call only after acquiring a lock first.
|
|
|
|
func (f *federatingDB) Update(ctx context.Context, asType vocab.Type) error {
|
2021-10-11 13:37:33 +01:00
|
|
|
l := logrus.WithFields(
|
2021-05-27 15:06:24 +01:00
|
|
|
logrus.Fields{
|
2021-10-04 14:24:19 +01:00
|
|
|
"func": "Update",
|
2021-05-27 15:06:24 +01:00
|
|
|
},
|
|
|
|
)
|
2021-10-04 14:24:19 +01:00
|
|
|
|
2021-10-11 13:37:33 +01:00
|
|
|
if logrus.GetLevel() >= logrus.DebugLevel {
|
2021-10-04 14:24:19 +01:00
|
|
|
i, err := marshalItem(asType)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
l = l.WithField("update", i)
|
|
|
|
l.Debug("entering Update")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
2021-10-04 14:24:19 +01:00
|
|
|
|
2022-04-28 13:23:11 +01:00
|
|
|
receivingAccount, _ := extractFromCtx(ctx)
|
|
|
|
if receivingAccount == nil {
|
|
|
|
// If the receiving account wasn't set on the context, that means this request didn't pass
|
2021-10-04 14:24:19 +01:00
|
|
|
// through the API, but came from inside GtS as the result of another activity on this instance. That being so,
|
2021-07-27 09:45:22 +01:00
|
|
|
// we can safely just ignore this activity, since we know we've already processed it elsewhere.
|
|
|
|
return nil
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
|
2021-12-20 14:19:53 +00:00
|
|
|
requestingAcctI := ctx.Value(ap.ContextRequestingAccount)
|
2021-10-04 14:24:19 +01:00
|
|
|
if requestingAcctI == nil {
|
2021-07-27 09:45:22 +01:00
|
|
|
l.Error("UPDATE: requesting account wasn't set on context")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
requestingAcct, ok := requestingAcctI.(*gtsmodel.Account)
|
|
|
|
if !ok {
|
2021-07-27 09:45:22 +01:00
|
|
|
l.Error("UPDATE: requesting account was set on context but couldn't be parsed")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
typeName := asType.GetTypeName()
|
2021-08-31 14:59:12 +01:00
|
|
|
if typeName == ap.ActorApplication ||
|
|
|
|
typeName == ap.ActorGroup ||
|
|
|
|
typeName == ap.ActorOrganization ||
|
|
|
|
typeName == ap.ActorPerson ||
|
|
|
|
typeName == ap.ActorService {
|
2021-05-27 15:06:24 +01:00
|
|
|
// it's an UPDATE to some kind of account
|
2021-08-10 12:32:39 +01:00
|
|
|
var accountable ap.Accountable
|
2021-09-28 14:21:59 +01:00
|
|
|
switch typeName {
|
2021-08-31 14:59:12 +01:00
|
|
|
case ap.ActorApplication:
|
2021-05-27 15:06:24 +01:00
|
|
|
l.Debug("got update for APPLICATION")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsApplication)
|
|
|
|
if !ok {
|
2021-07-27 09:45:22 +01:00
|
|
|
return errors.New("UPDATE: could not convert type to application")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 14:59:12 +01:00
|
|
|
case ap.ActorGroup:
|
2021-05-27 15:06:24 +01:00
|
|
|
l.Debug("got update for GROUP")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsGroup)
|
|
|
|
if !ok {
|
2021-07-27 09:45:22 +01:00
|
|
|
return errors.New("UPDATE: could not convert type to group")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 14:59:12 +01:00
|
|
|
case ap.ActorOrganization:
|
2021-05-27 15:06:24 +01:00
|
|
|
l.Debug("got update for ORGANIZATION")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsOrganization)
|
|
|
|
if !ok {
|
2021-07-27 09:45:22 +01:00
|
|
|
return errors.New("UPDATE: could not convert type to organization")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 14:59:12 +01:00
|
|
|
case ap.ActorPerson:
|
2021-05-27 15:06:24 +01:00
|
|
|
l.Debug("got update for PERSON")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsPerson)
|
|
|
|
if !ok {
|
2021-07-27 09:45:22 +01:00
|
|
|
return errors.New("UPDATE: could not convert type to person")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 14:59:12 +01:00
|
|
|
case ap.ActorService:
|
2021-05-27 15:06:24 +01:00
|
|
|
l.Debug("got update for SERVICE")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsService)
|
|
|
|
if !ok {
|
2021-07-27 09:45:22 +01:00
|
|
|
return errors.New("UPDATE: could not convert type to service")
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
}
|
|
|
|
|
2022-06-01 15:10:28 +01:00
|
|
|
updatedAcct, err := f.typeConverter.ASRepresentationToAccount(ctx, accountable, "", true)
|
2021-05-27 15:06:24 +01:00
|
|
|
if err != nil {
|
2021-07-27 09:45:22 +01:00
|
|
|
return fmt.Errorf("UPDATE: error converting to account: %s", err)
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
|
2022-05-30 13:41:24 +01:00
|
|
|
if updatedAcct.Domain == config.GetHost() {
|
2021-05-28 21:47:18 +01:00
|
|
|
// no need to update local accounts
|
|
|
|
// in fact, if we do this will break the shit out of things so do NOT
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-05-27 15:06:24 +01:00
|
|
|
if requestingAcct.URI != updatedAcct.URI {
|
2021-07-27 09:45:22 +01:00
|
|
|
return fmt.Errorf("UPDATE: update for account %s was requested by account %s, this is not valid", updatedAcct.URI, requestingAcct.URI)
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
|
2021-09-28 14:21:59 +01:00
|
|
|
// set some fields here on the updatedAccount representation so we don't run into db issues
|
|
|
|
updatedAcct.CreatedAt = requestingAcct.CreatedAt
|
|
|
|
updatedAcct.ID = requestingAcct.ID
|
|
|
|
updatedAcct.Language = requestingAcct.Language
|
|
|
|
|
|
|
|
// do the update
|
2021-08-25 14:34:33 +01:00
|
|
|
updatedAcct, err = f.db.UpdateAccount(ctx, updatedAcct)
|
|
|
|
if err != nil {
|
2021-07-27 09:45:22 +01:00
|
|
|
return fmt.Errorf("UPDATE: database error inserting updated account: %s", err)
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
|
2021-09-28 14:21:59 +01:00
|
|
|
// pass to the processor for further processing of eg., avatar/header
|
2022-04-28 13:23:11 +01:00
|
|
|
f.fedWorker.Queue(messages.FromFederator{
|
2021-08-31 14:59:12 +01:00
|
|
|
APObjectType: ap.ObjectProfile,
|
|
|
|
APActivityType: ap.ActivityUpdate,
|
2021-05-27 15:06:24 +01:00
|
|
|
GTSModel: updatedAcct,
|
2021-10-10 11:39:25 +01:00
|
|
|
ReceivingAccount: receivingAccount,
|
2022-04-28 13:23:11 +01:00
|
|
|
})
|
2021-05-27 15:06:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|