2023-08-09 18:14:33 +01:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package workers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2024-04-26 13:50:46 +01:00
|
|
|
"errors"
|
2024-08-24 10:49:37 +01:00
|
|
|
"time"
|
2023-08-09 18:14:33 +01:00
|
|
|
|
|
|
|
"codeberg.org/gruf/go-kv"
|
|
|
|
"codeberg.org/gruf/go-logger/v2/level"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2024-04-26 13:50:46 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
2024-02-09 14:24:49 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/federation/dereferencing"
|
2024-08-24 10:49:37 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/uris"
|
2024-02-09 14:24:49 +00:00
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/processing/account"
|
2024-08-24 10:49:37 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/processing/common"
|
2023-08-09 18:14:33 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/state"
|
2023-11-04 20:21:20 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
2023-08-09 18:14:33 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// fediAPI wraps processing functions
|
|
|
|
// specifically for messages originating
|
|
|
|
// from the federation/ActivityPub API.
|
|
|
|
type fediAPI struct {
|
2024-03-13 12:53:29 +00:00
|
|
|
state *state.State
|
2024-05-02 13:43:00 +01:00
|
|
|
surface *Surface
|
2024-03-13 12:53:29 +00:00
|
|
|
federate *federate
|
|
|
|
account *account.Processor
|
2024-08-24 10:49:37 +01:00
|
|
|
common *common.Processor
|
2024-04-26 13:50:46 +01:00
|
|
|
utils *utils
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *Processor) ProcessFromFediAPI(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
// Allocate new log fields slice
|
|
|
|
fields := make([]kv.Field, 3, 5)
|
|
|
|
fields[0] = kv.Field{"activityType", fMsg.APActivityType}
|
|
|
|
fields[1] = kv.Field{"objectType", fMsg.APObjectType}
|
2024-04-26 13:50:46 +01:00
|
|
|
fields[2] = kv.Field{"toAccount", fMsg.Receiving.Username}
|
2023-08-09 18:14:33 +01:00
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
if fMsg.APIRI != nil {
|
2023-08-09 18:14:33 +01:00
|
|
|
// An IRI was supplied, append to log
|
|
|
|
fields = append(fields, kv.Field{
|
2024-04-26 13:50:46 +01:00
|
|
|
"iri", fMsg.APIRI,
|
2023-08-09 18:14:33 +01:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Include GTSModel in logs if appropriate.
|
|
|
|
if fMsg.GTSModel != nil &&
|
|
|
|
log.Level() >= level.DEBUG {
|
|
|
|
fields = append(fields, kv.Field{
|
|
|
|
"model", fMsg.GTSModel,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
l := log.WithContext(ctx).WithFields(fields...)
|
|
|
|
l.Info("processing from fedi API")
|
|
|
|
|
|
|
|
switch fMsg.APActivityType {
|
|
|
|
|
|
|
|
// CREATE SOMETHING
|
|
|
|
case ap.ActivityCreate:
|
|
|
|
switch fMsg.APObjectType {
|
|
|
|
|
|
|
|
// CREATE NOTE/STATUS
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.fediAPI.CreateStatus(ctx, fMsg)
|
|
|
|
|
|
|
|
// CREATE FOLLOW (request)
|
|
|
|
case ap.ActivityFollow:
|
|
|
|
return p.fediAPI.CreateFollowReq(ctx, fMsg)
|
|
|
|
|
|
|
|
// CREATE LIKE/FAVE
|
|
|
|
case ap.ActivityLike:
|
|
|
|
return p.fediAPI.CreateLike(ctx, fMsg)
|
|
|
|
|
|
|
|
// CREATE ANNOUNCE/BOOST
|
|
|
|
case ap.ActivityAnnounce:
|
|
|
|
return p.fediAPI.CreateAnnounce(ctx, fMsg)
|
|
|
|
|
|
|
|
// CREATE BLOCK
|
|
|
|
case ap.ActivityBlock:
|
|
|
|
return p.fediAPI.CreateBlock(ctx, fMsg)
|
|
|
|
|
|
|
|
// CREATE FLAG/REPORT
|
|
|
|
case ap.ActivityFlag:
|
|
|
|
return p.fediAPI.CreateFlag(ctx, fMsg)
|
2023-11-08 14:32:17 +00:00
|
|
|
|
|
|
|
// CREATE QUESTION
|
|
|
|
case ap.ActivityQuestion:
|
|
|
|
return p.fediAPI.CreatePollVote(ctx, fMsg)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// UPDATE SOMETHING
|
|
|
|
case ap.ActivityUpdate:
|
2024-04-16 12:10:13 +01:00
|
|
|
switch fMsg.APObjectType {
|
2023-08-09 18:14:33 +01:00
|
|
|
|
2023-10-04 13:09:42 +01:00
|
|
|
// UPDATE NOTE/STATUS
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.fediAPI.UpdateStatus(ctx, fMsg)
|
|
|
|
|
2024-06-06 14:43:25 +01:00
|
|
|
// UPDATE ACCOUNT
|
|
|
|
case ap.ActorPerson:
|
2023-08-09 18:14:33 +01:00
|
|
|
return p.fediAPI.UpdateAccount(ctx, fMsg)
|
|
|
|
}
|
|
|
|
|
2024-04-16 12:10:13 +01:00
|
|
|
// ACCEPT SOMETHING
|
|
|
|
case ap.ActivityAccept:
|
2024-07-26 11:04:28 +01:00
|
|
|
switch fMsg.APObjectType {
|
2024-04-16 12:10:13 +01:00
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
// ACCEPT (pending) FOLLOW
|
2024-04-16 12:10:13 +01:00
|
|
|
case ap.ActivityFollow:
|
|
|
|
return p.fediAPI.AcceptFollow(ctx, fMsg)
|
2024-07-26 11:04:28 +01:00
|
|
|
|
|
|
|
// ACCEPT (pending) LIKE
|
|
|
|
case ap.ActivityLike:
|
|
|
|
return p.fediAPI.AcceptLike(ctx, fMsg)
|
|
|
|
|
|
|
|
// ACCEPT (pending) REPLY
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.fediAPI.AcceptReply(ctx, fMsg)
|
|
|
|
|
|
|
|
// ACCEPT (pending) ANNOUNCE
|
|
|
|
case ap.ActivityAnnounce:
|
|
|
|
return p.fediAPI.AcceptAnnounce(ctx, fMsg)
|
2024-04-16 12:10:13 +01:00
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
// DELETE SOMETHING
|
|
|
|
case ap.ActivityDelete:
|
|
|
|
switch fMsg.APObjectType {
|
|
|
|
|
|
|
|
// DELETE NOTE/STATUS
|
|
|
|
case ap.ObjectNote:
|
|
|
|
return p.fediAPI.DeleteStatus(ctx, fMsg)
|
|
|
|
|
2024-06-06 14:43:25 +01:00
|
|
|
// DELETE ACCOUNT
|
|
|
|
case ap.ActorPerson:
|
2023-08-09 18:14:33 +01:00
|
|
|
return p.fediAPI.DeleteAccount(ctx, fMsg)
|
|
|
|
}
|
2024-03-12 14:34:08 +00:00
|
|
|
|
|
|
|
// MOVE SOMETHING
|
|
|
|
case ap.ActivityMove:
|
|
|
|
|
2024-06-06 14:43:25 +01:00
|
|
|
// MOVE ACCOUNT
|
2024-03-12 14:34:08 +00:00
|
|
|
// fromfediapi_move.go.
|
2024-06-06 14:43:25 +01:00
|
|
|
if fMsg.APObjectType == ap.ActorPerson {
|
2024-03-12 14:34:08 +00:00
|
|
|
return p.fediAPI.MoveAccount(ctx, fMsg)
|
|
|
|
}
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2023-11-04 20:21:20 +00:00
|
|
|
return gtserror.Newf("unhandled: %s %s", fMsg.APActivityType, fMsg.APObjectType)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreateStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
var (
|
2023-12-01 10:53:53 +00:00
|
|
|
status *gtsmodel.Status
|
|
|
|
statusable ap.Statusable
|
|
|
|
err error
|
2023-08-09 18:14:33 +01:00
|
|
|
)
|
|
|
|
|
2023-12-01 10:53:53 +00:00
|
|
|
var ok bool
|
|
|
|
|
|
|
|
switch {
|
2024-04-26 13:50:46 +01:00
|
|
|
case fMsg.APObject != nil:
|
2023-12-01 10:53:53 +00:00
|
|
|
// A model was provided, extract this from message.
|
2024-04-26 13:50:46 +01:00
|
|
|
statusable, ok = fMsg.APObject.(ap.Statusable)
|
2023-12-01 10:53:53 +00:00
|
|
|
if !ok {
|
2024-04-26 13:50:46 +01:00
|
|
|
return gtserror.Newf("cannot cast %T -> ap.Statusable", fMsg.APObject)
|
2023-12-01 10:53:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create bare-bones model to pass
|
|
|
|
// into RefreshStatus(), which it will
|
|
|
|
// further populate and insert as new.
|
|
|
|
bareStatus := new(gtsmodel.Status)
|
|
|
|
bareStatus.Local = util.Ptr(false)
|
|
|
|
bareStatus.URI = ap.GetJSONLDId(statusable).String()
|
|
|
|
|
|
|
|
// Call RefreshStatus() to parse and process the provided
|
|
|
|
// statusable model, which it will use to further flesh out
|
|
|
|
// the bare bones model and insert it into the database.
|
|
|
|
status, statusable, err = p.federate.RefreshStatus(ctx,
|
2024-04-26 13:50:46 +01:00
|
|
|
fMsg.Receiving.Username,
|
2023-12-01 10:53:53 +00:00
|
|
|
bareStatus,
|
|
|
|
statusable,
|
2024-02-09 14:24:49 +00:00
|
|
|
// Force refresh within 5min window.
|
|
|
|
dereferencing.Fresh,
|
2023-12-01 10:53:53 +00:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.Newf("error processing new status %s: %w", bareStatus.URI, err)
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
case fMsg.APIRI != nil:
|
2023-11-04 20:21:20 +00:00
|
|
|
// Model was not set, deref with IRI (this is a forward).
|
2023-08-09 18:14:33 +01:00
|
|
|
// This will also cause the status to be inserted into the db.
|
2023-12-01 10:53:53 +00:00
|
|
|
status, statusable, err = p.federate.GetStatusByURI(ctx,
|
2024-04-26 13:50:46 +01:00
|
|
|
fMsg.Receiving.Username,
|
|
|
|
fMsg.APIRI,
|
2023-12-01 10:53:53 +00:00
|
|
|
)
|
|
|
|
if err != nil {
|
2024-04-26 13:50:46 +01:00
|
|
|
return gtserror.Newf("error dereferencing forwarded status %s: %w", fMsg.APIRI, err)
|
2023-12-01 10:53:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
return gtserror.New("neither APObjectModel nor APIri set")
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2023-12-01 10:53:53 +00:00
|
|
|
if statusable == nil {
|
|
|
|
// Another thread beat us to
|
|
|
|
// creating this status! Return
|
|
|
|
// here and let the other thread
|
|
|
|
// handle timelining + notifying.
|
|
|
|
return nil
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
// If pending approval is true then
|
|
|
|
// status must reply to a LOCAL status
|
|
|
|
// that requires approval for the reply.
|
2024-08-24 10:49:37 +01:00
|
|
|
pendingApproval := util.PtrOrZero(status.PendingApproval)
|
2024-07-26 11:04:28 +01:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case pendingApproval && !status.PreApproved:
|
|
|
|
// If approval is required and status isn't
|
|
|
|
// preapproved, then just notify the account
|
|
|
|
// that's being interacted with: they can
|
|
|
|
// approve or deny the interaction later.
|
2024-08-24 10:49:37 +01:00
|
|
|
if err := p.utils.requestReply(ctx, status); err != nil {
|
|
|
|
return gtserror.Newf("error pending reply: %w", err)
|
2024-07-26 11:04:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return early.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case pendingApproval && status.PreApproved:
|
|
|
|
// If approval is required and status is
|
|
|
|
// preapproved, that means this is a reply
|
|
|
|
// to one of our statuses with permission
|
|
|
|
// that matched on a following/followers
|
|
|
|
// collection. Do the Accept immediately and
|
|
|
|
// then process everything else as normal.
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Store an already-accepted interaction request.
|
|
|
|
id := id.NewULID()
|
|
|
|
approval := >smodel.InteractionRequest{
|
|
|
|
ID: id,
|
|
|
|
StatusID: status.InReplyToID,
|
|
|
|
TargetAccountID: status.InReplyToAccountID,
|
|
|
|
TargetAccount: status.InReplyToAccount,
|
|
|
|
InteractingAccountID: status.AccountID,
|
|
|
|
InteractingAccount: status.Account,
|
|
|
|
InteractionURI: status.URI,
|
|
|
|
InteractionType: gtsmodel.InteractionLike,
|
|
|
|
Reply: status,
|
|
|
|
URI: uris.GenerateURIForAccept(status.InReplyToAccount.Username, id),
|
|
|
|
AcceptedAt: time.Now(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark the status as now approved.
|
|
|
|
status.PendingApproval = util.Ptr(false)
|
|
|
|
status.PreApproved = false
|
|
|
|
status.ApprovedByURI = approval.URI
|
|
|
|
if err := p.state.DB.UpdateStatus(
|
|
|
|
ctx,
|
|
|
|
status,
|
|
|
|
"pending_approval",
|
|
|
|
"approved_by_uri",
|
|
|
|
); err != nil {
|
|
|
|
return gtserror.Newf("db error updating status: %w", err)
|
2024-07-26 11:04:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the approval as Accept.
|
|
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
|
|
return gtserror.Newf("error federating pre-approval of reply: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return, just continue as normal.
|
|
|
|
}
|
|
|
|
|
2024-04-16 12:10:13 +01:00
|
|
|
// Update stats for the remote account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementStatusesCount(ctx, fMsg.Requesting, status); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
if status.InReplyToID != "" {
|
2023-11-04 20:21:20 +00:00
|
|
|
// Interaction counts changed on the replied status; uncache the
|
|
|
|
// prepared version from all timelines. The status dereferencer
|
|
|
|
// functions will ensure necessary ancestors exist before this point.
|
2023-08-09 18:14:33 +01:00
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.InReplyToID)
|
|
|
|
}
|
|
|
|
|
2023-11-08 14:32:17 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreatePollVote(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-11-08 14:32:17 +00:00
|
|
|
// Cast poll vote type from the worker message.
|
|
|
|
vote, ok := fMsg.GTSModel.(*gtsmodel.PollVote)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.PollVote", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Insert the new poll vote in the database.
|
|
|
|
if err := p.state.DB.PutPollVote(ctx, vote); err != nil {
|
|
|
|
return gtserror.Newf("error inserting poll vote in db: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the poll vote is fully populated at this point.
|
|
|
|
if err := p.state.DB.PopulatePollVote(ctx, vote); err != nil {
|
|
|
|
return gtserror.Newf("error populating poll vote from db: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the poll on the vote is fully populated to get origin status.
|
|
|
|
if err := p.state.DB.PopulatePoll(ctx, vote.Poll); err != nil {
|
|
|
|
return gtserror.Newf("error populating poll from db: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the origin status,
|
|
|
|
// (also set the poll on it).
|
|
|
|
status := vote.Poll.Status
|
|
|
|
status.Poll = vote.Poll
|
|
|
|
|
|
|
|
if *status.Local {
|
2023-11-08 22:37:35 +00:00
|
|
|
// Before federating it, increment the
|
|
|
|
// poll vote counts on our local copy.
|
|
|
|
status.Poll.IncrementVotes(vote.Choices)
|
|
|
|
|
2023-11-08 14:32:17 +00:00
|
|
|
// These were poll votes in a local status, we need to
|
|
|
|
// federate the updated status model with latest vote counts.
|
|
|
|
if err := p.federate.UpdateStatus(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating status update: %v", err)
|
|
|
|
}
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Interaction counts changed on the source status, uncache from timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, vote.Poll.StatusID)
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreateFollowReq(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
followRequest, ok := fMsg.GTSModel.(*gtsmodel.FollowRequest)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.FollowRequest", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2023-08-11 10:05:49 +01:00
|
|
|
if err := p.state.DB.PopulateFollowRequest(ctx, followRequest); err != nil {
|
|
|
|
return gtserror.Newf("error populating follow request: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
if *followRequest.TargetAccount.Locked {
|
2024-04-16 12:10:13 +01:00
|
|
|
// Local account is locked: just notify the follow request.
|
2023-08-09 18:14:33 +01:00
|
|
|
if err := p.surface.notifyFollowRequest(ctx, followRequest); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying follow request: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
2024-04-16 12:10:13 +01:00
|
|
|
|
|
|
|
// And update stats for the local account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementFollowRequestsCount(ctx, fMsg.Receiving); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-16 12:10:13 +01:00
|
|
|
// Local account is not locked:
|
2023-08-09 18:14:33 +01:00
|
|
|
// Automatically accept the follow request
|
|
|
|
// and notify about the new follower.
|
|
|
|
follow, err := p.state.DB.AcceptFollowRequest(
|
|
|
|
ctx,
|
|
|
|
followRequest.AccountID,
|
|
|
|
followRequest.TargetAccountID,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return gtserror.Newf("error accepting follow request: %w", err)
|
|
|
|
}
|
|
|
|
|
2024-04-16 12:10:13 +01:00
|
|
|
// Update stats for the local account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementFollowersCount(ctx, fMsg.Receiving); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats for the remote account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementFollowingCount(ctx, fMsg.Requesting); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
if err := p.federate.AcceptFollow(ctx, follow); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error federating follow request accept: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.surface.notifyFollow(ctx, follow); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying follow: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreateLike(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
fave, ok := fMsg.GTSModel.(*gtsmodel.StatusFave)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.StatusFave", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2023-10-25 15:04:53 +01:00
|
|
|
// Ensure fave populated.
|
|
|
|
if err := p.state.DB.PopulateStatusFave(ctx, fave); err != nil {
|
|
|
|
return gtserror.Newf("error populating status fave: %w", err)
|
|
|
|
}
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
// If pending approval is true then
|
|
|
|
// fave must target a LOCAL status
|
|
|
|
// that requires approval for the fave.
|
2024-08-24 10:49:37 +01:00
|
|
|
pendingApproval := util.PtrOrZero(fave.PendingApproval)
|
2024-07-26 11:04:28 +01:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case pendingApproval && !fave.PreApproved:
|
|
|
|
// If approval is required and fave isn't
|
|
|
|
// preapproved, then just notify the account
|
|
|
|
// that's being interacted with: they can
|
|
|
|
// approve or deny the interaction later.
|
2024-08-24 10:49:37 +01:00
|
|
|
if err := p.utils.requestFave(ctx, fave); err != nil {
|
|
|
|
return gtserror.Newf("error pending fave: %w", err)
|
2024-07-26 11:04:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return early.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case pendingApproval && fave.PreApproved:
|
|
|
|
// If approval is required and fave is
|
|
|
|
// preapproved, that means this is a fave
|
|
|
|
// of one of our statuses with permission
|
|
|
|
// that matched on a following/followers
|
|
|
|
// collection. Do the Accept immediately and
|
|
|
|
// then process everything else as normal.
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Store an already-accepted interaction request.
|
|
|
|
id := id.NewULID()
|
|
|
|
approval := >smodel.InteractionRequest{
|
|
|
|
ID: id,
|
|
|
|
StatusID: fave.StatusID,
|
|
|
|
TargetAccountID: fave.TargetAccountID,
|
|
|
|
TargetAccount: fave.TargetAccount,
|
|
|
|
InteractingAccountID: fave.AccountID,
|
|
|
|
InteractingAccount: fave.Account,
|
|
|
|
InteractionURI: fave.URI,
|
|
|
|
InteractionType: gtsmodel.InteractionLike,
|
|
|
|
Like: fave,
|
|
|
|
URI: uris.GenerateURIForAccept(fave.TargetAccount.Username, id),
|
|
|
|
AcceptedAt: time.Now(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark the fave itself as now approved.
|
|
|
|
fave.PendingApproval = util.Ptr(false)
|
|
|
|
fave.PreApproved = false
|
|
|
|
fave.ApprovedByURI = approval.URI
|
|
|
|
if err := p.state.DB.UpdateStatusFave(
|
|
|
|
ctx,
|
|
|
|
fave,
|
|
|
|
"pending_approval",
|
|
|
|
"approved_by_uri",
|
|
|
|
); err != nil {
|
|
|
|
return gtserror.Newf("db error updating status fave: %w", err)
|
2024-07-26 11:04:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the approval as Accept.
|
|
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
|
|
return gtserror.Newf("error federating pre-approval of fave: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return, just continue as normal.
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
if err := p.surface.notifyFave(ctx, fave); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying fave: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Interaction counts changed on the faved status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, fave.StatusID)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreateAnnounce(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-12-01 14:27:15 +00:00
|
|
|
boost, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
2023-08-09 18:14:33 +01:00
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
// Dereference into a boost wrapper status.
|
|
|
|
//
|
|
|
|
// Note: this will handle storing the boost in
|
2023-12-01 14:27:15 +00:00
|
|
|
// the db, and dereferencing the target status
|
2023-11-04 20:21:20 +00:00
|
|
|
// ancestors / descendants where appropriate.
|
2023-12-01 14:27:15 +00:00
|
|
|
var err error
|
|
|
|
boost, err = p.federate.EnrichAnnounce(
|
|
|
|
ctx,
|
|
|
|
boost,
|
2024-04-26 13:50:46 +01:00
|
|
|
fMsg.Receiving.Username,
|
2023-12-01 14:27:15 +00:00
|
|
|
)
|
2023-08-09 18:14:33 +01:00
|
|
|
if err != nil {
|
2024-07-26 11:04:28 +01:00
|
|
|
if gtserror.IsUnretrievable(err) ||
|
|
|
|
gtserror.NotPermitted(err) {
|
|
|
|
// Boosted status domain blocked, or
|
|
|
|
// otherwise not permitted, nothing to do.
|
2023-12-01 14:27:15 +00:00
|
|
|
log.Debugf(ctx, "skipping announce: %v", err)
|
|
|
|
return nil
|
|
|
|
}
|
2023-08-09 18:14:33 +01:00
|
|
|
|
2023-12-01 14:27:15 +00:00
|
|
|
// Actual error.
|
|
|
|
return gtserror.Newf("error dereferencing announce: %w", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
// If pending approval is true then
|
|
|
|
// boost must target a LOCAL status
|
|
|
|
// that requires approval for the boost.
|
2024-08-24 10:49:37 +01:00
|
|
|
pendingApproval := util.PtrOrZero(boost.PendingApproval)
|
2024-07-26 11:04:28 +01:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case pendingApproval && !boost.PreApproved:
|
|
|
|
// If approval is required and boost isn't
|
|
|
|
// preapproved, then just notify the account
|
|
|
|
// that's being interacted with: they can
|
|
|
|
// approve or deny the interaction later.
|
2024-08-24 10:49:37 +01:00
|
|
|
if err := p.utils.requestAnnounce(ctx, boost); err != nil {
|
|
|
|
return gtserror.Newf("error pending boost: %w", err)
|
2024-07-26 11:04:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return early.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
case pendingApproval && boost.PreApproved:
|
|
|
|
// If approval is required and status is
|
|
|
|
// preapproved, that means this is a boost
|
|
|
|
// of one of our statuses with permission
|
|
|
|
// that matched on a following/followers
|
|
|
|
// collection. Do the Accept immediately and
|
|
|
|
// then process everything else as normal.
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Store an already-accepted interaction request.
|
|
|
|
id := id.NewULID()
|
|
|
|
approval := >smodel.InteractionRequest{
|
|
|
|
ID: id,
|
|
|
|
StatusID: boost.BoostOfID,
|
|
|
|
TargetAccountID: boost.BoostOfAccountID,
|
|
|
|
TargetAccount: boost.BoostOfAccount,
|
|
|
|
InteractingAccountID: boost.AccountID,
|
|
|
|
InteractingAccount: boost.Account,
|
|
|
|
InteractionURI: boost.URI,
|
|
|
|
InteractionType: gtsmodel.InteractionLike,
|
|
|
|
Announce: boost,
|
|
|
|
URI: uris.GenerateURIForAccept(boost.BoostOfAccount.Username, id),
|
|
|
|
AcceptedAt: time.Now(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mark the boost itself as now approved.
|
|
|
|
boost.PendingApproval = util.Ptr(false)
|
|
|
|
boost.PreApproved = false
|
|
|
|
boost.ApprovedByURI = approval.URI
|
|
|
|
if err := p.state.DB.UpdateStatus(
|
|
|
|
ctx,
|
|
|
|
boost,
|
|
|
|
"pending_approval",
|
|
|
|
"approved_by_uri",
|
|
|
|
); err != nil {
|
|
|
|
return gtserror.Newf("db error updating status: %w", err)
|
2024-07-26 11:04:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the approval as Accept.
|
|
|
|
if err := p.federate.AcceptInteraction(ctx, approval); err != nil {
|
|
|
|
return gtserror.Newf("error federating pre-approval of boost: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't return, just continue as normal.
|
|
|
|
}
|
|
|
|
|
2024-04-16 12:10:13 +01:00
|
|
|
// Update stats for the remote account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementStatusesCount(ctx, fMsg.Requesting, boost); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
// Timeline and notify the announce.
|
2023-12-01 14:27:15 +00:00
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, boost); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2023-12-01 14:27:15 +00:00
|
|
|
if err := p.surface.notifyAnnounce(ctx, boost); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error notifying announce: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2023-12-01 10:53:53 +00:00
|
|
|
// Interaction counts changed on the original status;
|
2023-08-09 18:14:33 +01:00
|
|
|
// uncache the prepared version from all timelines.
|
2023-12-01 14:27:15 +00:00
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, boost.BoostOfID)
|
2023-08-09 18:14:33 +01:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreateBlock(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
block, ok := fMsg.GTSModel.(*gtsmodel.Block)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Block", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove each account's posts from the other's timelines.
|
|
|
|
//
|
|
|
|
// First home timelines.
|
|
|
|
if err := p.state.Timelines.Home.WipeItemsFromAccountID(
|
|
|
|
ctx,
|
|
|
|
block.AccountID,
|
|
|
|
block.TargetAccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error wiping items from block -> target's home timeline: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.state.Timelines.Home.WipeItemsFromAccountID(
|
|
|
|
ctx,
|
|
|
|
block.TargetAccountID,
|
|
|
|
block.AccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error wiping items from target -> block's home timeline: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now list timelines.
|
|
|
|
if err := p.state.Timelines.List.WipeItemsFromAccountID(
|
|
|
|
ctx,
|
|
|
|
block.AccountID,
|
|
|
|
block.TargetAccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error wiping items from block -> target's list timeline(s): %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.state.Timelines.List.WipeItemsFromAccountID(
|
|
|
|
ctx,
|
|
|
|
block.TargetAccountID,
|
|
|
|
block.AccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error wiping items from target -> block's list timeline(s): %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remove any follows that existed between blocker + blockee.
|
|
|
|
if err := p.state.DB.DeleteFollow(
|
|
|
|
ctx,
|
|
|
|
block.AccountID,
|
|
|
|
block.TargetAccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error deleting follow from block -> target: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.state.DB.DeleteFollow(
|
|
|
|
ctx,
|
|
|
|
block.TargetAccountID,
|
|
|
|
block.AccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error deleting follow from target -> block: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remove any follow requests that existed between blocker + blockee.
|
|
|
|
if err := p.state.DB.DeleteFollowRequest(
|
|
|
|
ctx,
|
|
|
|
block.AccountID,
|
|
|
|
block.TargetAccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error deleting follow request from block -> target: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := p.state.DB.DeleteFollowRequest(
|
|
|
|
ctx,
|
|
|
|
block.TargetAccountID,
|
|
|
|
block.AccountID,
|
|
|
|
); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error deleting follow request from target -> block: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) CreateFlag(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
incomingReport, ok := fMsg.GTSModel.(*gtsmodel.Report)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Report", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: handle additional side effects of flag creation:
|
|
|
|
// - notify admins by dm / notification
|
|
|
|
|
2024-04-11 10:45:53 +01:00
|
|
|
if err := p.surface.emailAdminReportOpened(ctx, incomingReport); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error emailing report opened: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) UpdateAccount(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
// Parse the old/existing account model.
|
|
|
|
account, ok := fMsg.GTSModel.(*gtsmodel.Account)
|
|
|
|
if !ok {
|
2023-10-04 13:09:42 +01:00
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Account", fMsg.GTSModel)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Because this was an Update, the new Accountable should be set on the message.
|
2024-04-26 13:50:46 +01:00
|
|
|
apubAcc, ok := fMsg.APObject.(ap.Accountable)
|
2023-08-09 18:14:33 +01:00
|
|
|
if !ok {
|
2024-04-26 13:50:46 +01:00
|
|
|
return gtserror.Newf("cannot cast %T -> ap.Accountable", fMsg.APObject)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Fetch up-to-date bio, avatar, header, etc.
|
|
|
|
_, _, err := p.federate.RefreshAccount(
|
|
|
|
ctx,
|
2024-04-26 13:50:46 +01:00
|
|
|
fMsg.Receiving.Username,
|
2023-08-09 18:14:33 +01:00
|
|
|
account,
|
|
|
|
apubAcc,
|
2024-08-13 16:37:09 +01:00
|
|
|
|
|
|
|
// Force refresh within 10s window.
|
|
|
|
//
|
|
|
|
// Missing account updates could be
|
|
|
|
// detrimental to federation if they
|
|
|
|
// include public key changes.
|
|
|
|
dereferencing.Freshest,
|
2023-08-09 18:14:33 +01:00
|
|
|
)
|
|
|
|
if err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error refreshing account: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) AcceptFollow(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2024-04-16 12:10:13 +01:00
|
|
|
// Update stats for the remote account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.decrementFollowRequestsCount(ctx, fMsg.Requesting); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementFollowersCount(ctx, fMsg.Requesting); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats for the local account.
|
2024-04-26 13:50:46 +01:00
|
|
|
if err := p.utils.incrementFollowingCount(ctx, fMsg.Receiving); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
func (p *fediAPI) AcceptLike(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
|
|
// TODO: Add something here if we ever implement sending out Likes to
|
|
|
|
// followers more broadly and not just the owner of the Liked status.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *fediAPI) AcceptReply(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
|
|
status, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats for the actor account.
|
|
|
|
if err := p.utils.incrementStatusesCount(ctx, status.Account, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Timeline and notify the status.
|
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the reply again, fully this time.
|
|
|
|
if err := p.federate.CreateStatus(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating announce: %v", err)
|
|
|
|
}
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Interaction counts changed on the replied-to status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.InReplyToID)
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *fediAPI) AcceptAnnounce(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
|
|
|
boost, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update stats for the actor account.
|
|
|
|
if err := p.utils.incrementStatusesCount(ctx, boost.Account, boost); err != nil {
|
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Timeline and notify the boost wrapper status.
|
|
|
|
if err := p.surface.timelineAndNotifyStatus(ctx, boost); err != nil {
|
|
|
|
log.Errorf(ctx, "error timelining and notifying status: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send out the boost again, fully this time.
|
|
|
|
if err := p.federate.Announce(ctx, boost); err != nil {
|
|
|
|
log.Errorf(ctx, "error federating announce: %v", err)
|
|
|
|
}
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Interaction counts changed on the boosted status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, boost.BoostOfID)
|
|
|
|
|
2024-07-26 11:04:28 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) UpdateStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-10-04 13:09:42 +01:00
|
|
|
// Cast the existing Status model attached to msg.
|
|
|
|
existing, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("cannot cast %T -> *gtsmodel.Status", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cast the updated ActivityPub statusable object .
|
2024-04-26 13:50:46 +01:00
|
|
|
apStatus, _ := fMsg.APObject.(ap.Statusable)
|
2023-10-04 13:09:42 +01:00
|
|
|
|
|
|
|
// Fetch up-to-date attach status attachments, etc.
|
2023-11-08 14:32:17 +00:00
|
|
|
status, _, err := p.federate.RefreshStatus(
|
2023-10-04 13:09:42 +01:00
|
|
|
ctx,
|
2024-04-26 13:50:46 +01:00
|
|
|
fMsg.Receiving.Username,
|
2023-10-04 13:09:42 +01:00
|
|
|
existing,
|
|
|
|
apStatus,
|
2024-02-09 14:24:49 +00:00
|
|
|
// Force refresh within 5min window.
|
|
|
|
dereferencing.Fresh,
|
2023-10-04 13:09:42 +01:00
|
|
|
)
|
|
|
|
if err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error refreshing status: %v", err)
|
2023-10-04 13:09:42 +01:00
|
|
|
}
|
|
|
|
|
2023-11-08 14:32:17 +00:00
|
|
|
if status.Poll != nil && status.Poll.Closing {
|
|
|
|
|
|
|
|
// If the latest status has a newly closed poll, at least compared
|
|
|
|
// to the existing version, then notify poll close to all voters.
|
|
|
|
if err := p.surface.notifyPollClose(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error sending poll notification: %v", err)
|
|
|
|
}
|
2023-11-04 20:21:20 +00:00
|
|
|
}
|
|
|
|
|
2023-12-16 11:55:49 +00:00
|
|
|
// Push message that the status has been edited to streams.
|
|
|
|
if err := p.surface.timelineStatusUpdate(ctx, status); err != nil {
|
|
|
|
log.Errorf(ctx, "error streaming status edit: %v", err)
|
|
|
|
}
|
|
|
|
|
2024-08-24 10:49:37 +01:00
|
|
|
// Status representation was refetched, uncache from timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.ID)
|
|
|
|
|
2023-10-04 13:09:42 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) DeleteStatus(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
// Delete attachments from this status, since this request
|
|
|
|
// comes from the federating API, and there's no way the
|
|
|
|
// poster can do a delete + redraft for it on our instance.
|
|
|
|
const deleteAttachments = true
|
|
|
|
|
|
|
|
status, ok := fMsg.GTSModel.(*gtsmodel.Status)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
// Try to populate status structs if possible,
|
|
|
|
// in order to more thoroughly remove them.
|
|
|
|
if err := p.state.DB.PopulateStatus(
|
|
|
|
ctx, status,
|
|
|
|
); err != nil && !errors.Is(err, db.ErrNoEntries) {
|
|
|
|
return gtserror.Newf("db error populating status: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Drop any outgoing queued AP requests about / targeting
|
|
|
|
// this status, (stops queued likes, boosts, creates etc).
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("ObjectID", status.URI)
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("TargetID", status.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued client messages about / targeting
|
|
|
|
// status, (stops processing of local origin data for status).
|
|
|
|
p.state.Workers.Client.Queue.Delete("TargetURI", status.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued federator messages targeting status,
|
|
|
|
// (stops processing of remote origin data targeting this status).
|
|
|
|
p.state.Workers.Federator.Queue.Delete("TargetURI", status.URI)
|
|
|
|
|
|
|
|
// First perform the actual status deletion.
|
|
|
|
if err := p.utils.wipeStatus(ctx, status, deleteAttachments); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error wiping status: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
2024-04-16 12:10:13 +01:00
|
|
|
// Update stats for the remote account.
|
2024-08-11 10:23:36 +01:00
|
|
|
if err := p.utils.decrementStatusesCount(ctx, fMsg.Requesting, status); err != nil {
|
2024-04-16 12:10:13 +01:00
|
|
|
log.Errorf(ctx, "error updating account stats: %v", err)
|
|
|
|
}
|
|
|
|
|
2023-08-09 18:14:33 +01:00
|
|
|
if status.InReplyToID != "" {
|
|
|
|
// Interaction counts changed on the replied status;
|
|
|
|
// uncache the prepared version from all timelines.
|
|
|
|
p.surface.invalidateStatusFromTimelines(ctx, status.InReplyToID)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
func (p *fediAPI) DeleteAccount(ctx context.Context, fMsg *messages.FromFediAPI) error {
|
2023-08-09 18:14:33 +01:00
|
|
|
account, ok := fMsg.GTSModel.(*gtsmodel.Account)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("%T not parseable as *gtsmodel.Account", fMsg.GTSModel)
|
|
|
|
}
|
|
|
|
|
2024-04-26 13:50:46 +01:00
|
|
|
// Drop any outgoing queued AP requests to / from / targeting
|
|
|
|
// this account, (stops queued likes, boosts, creates etc).
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("ObjectID", account.URI)
|
|
|
|
p.state.Workers.Delivery.Queue.Delete("TargetID", account.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued client messages to / from this
|
|
|
|
// account, (stops processing of local origin data for acccount).
|
|
|
|
p.state.Workers.Client.Queue.Delete("Target.ID", account.ID)
|
|
|
|
p.state.Workers.Client.Queue.Delete("TargetURI", account.URI)
|
|
|
|
|
|
|
|
// Drop any incoming queued federator messages to this account,
|
|
|
|
// (stops processing of remote origin data targeting this account).
|
|
|
|
p.state.Workers.Federator.Queue.Delete("Requesting.ID", account.ID)
|
|
|
|
p.state.Workers.Federator.Queue.Delete("TargetURI", account.URI)
|
|
|
|
|
|
|
|
// First perform the actual account deletion.
|
2023-08-09 18:14:33 +01:00
|
|
|
if err := p.account.Delete(ctx, account, account.ID); err != nil {
|
2023-11-08 14:32:17 +00:00
|
|
|
log.Errorf(ctx, "error deleting account: %v", err)
|
2023-08-09 18:14:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|