2021-08-20 12:26:56 +02:00
|
|
|
/*
|
|
|
|
GoToSocial
|
|
|
|
Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
|
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2021-05-27 16:06:24 +02:00
|
|
|
package federatingdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/go-fed/activity/streams"
|
|
|
|
"github.com/go-fed/activity/streams/vocab"
|
|
|
|
"github.com/sirupsen/logrus"
|
2021-08-10 13:32:39 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2021-05-27 16:06:24 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Update sets an existing entry to the database based on the value's
|
|
|
|
// id.
|
|
|
|
//
|
|
|
|
// Note that Activity values received from federated peers may also be
|
|
|
|
// updated in the database this way if the Federating Protocol is
|
|
|
|
// enabled. The client may freely decide to store only the id instead of
|
|
|
|
// the entire value.
|
|
|
|
//
|
|
|
|
// The library makes this call only after acquiring a lock first.
|
|
|
|
func (f *federatingDB) Update(ctx context.Context, asType vocab.Type) error {
|
|
|
|
l := f.log.WithFields(
|
|
|
|
logrus.Fields{
|
|
|
|
"func": "Update",
|
|
|
|
"asType": asType.GetTypeName(),
|
|
|
|
},
|
|
|
|
)
|
|
|
|
m, err := streams.Serialize(asType)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
b, err := json.Marshal(m)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
l.Debugf("received UPDATE asType %s", string(b))
|
|
|
|
|
2021-07-27 10:45:22 +02:00
|
|
|
targetAcctI := ctx.Value(util.APAccount)
|
|
|
|
if targetAcctI == nil {
|
|
|
|
// If the target account wasn't set on the context, that means this request didn't pass through the
|
|
|
|
// API, but came from inside GtS as the result of another activity on this instance. That being so,
|
|
|
|
// we can safely just ignore this activity, since we know we've already processed it elsewhere.
|
|
|
|
return nil
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
2021-07-27 10:45:22 +02:00
|
|
|
targetAcct, ok := targetAcctI.(*gtsmodel.Account)
|
2021-05-27 16:06:24 +02:00
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
l.Error("UPDATE: target account was set on context but couldn't be parsed")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
requestingAcctI := ctx.Value(util.APRequestingAccount)
|
2021-07-27 10:45:22 +02:00
|
|
|
if targetAcctI == nil {
|
|
|
|
l.Error("UPDATE: requesting account wasn't set on context")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
requestingAcct, ok := requestingAcctI.(*gtsmodel.Account)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
l.Error("UPDATE: requesting account was set on context but couldn't be parsed")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
fromFederatorChanI := ctx.Value(util.APFromFederatorChanKey)
|
|
|
|
if fromFederatorChanI == nil {
|
2021-07-27 10:45:22 +02:00
|
|
|
l.Error("UPDATE: from federator channel wasn't set on context")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
fromFederatorChan, ok := fromFederatorChanI.(chan gtsmodel.FromFederator)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
l.Error("UPDATE: from federator channel was set on context but couldn't be parsed")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
typeName := asType.GetTypeName()
|
|
|
|
if typeName == gtsmodel.ActivityStreamsApplication ||
|
|
|
|
typeName == gtsmodel.ActivityStreamsGroup ||
|
|
|
|
typeName == gtsmodel.ActivityStreamsOrganization ||
|
|
|
|
typeName == gtsmodel.ActivityStreamsPerson ||
|
|
|
|
typeName == gtsmodel.ActivityStreamsService {
|
|
|
|
// it's an UPDATE to some kind of account
|
2021-08-10 13:32:39 +02:00
|
|
|
var accountable ap.Accountable
|
2021-05-27 16:06:24 +02:00
|
|
|
|
|
|
|
switch asType.GetTypeName() {
|
|
|
|
case gtsmodel.ActivityStreamsApplication:
|
|
|
|
l.Debug("got update for APPLICATION")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsApplication)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
return errors.New("UPDATE: could not convert type to application")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
case gtsmodel.ActivityStreamsGroup:
|
|
|
|
l.Debug("got update for GROUP")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsGroup)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
return errors.New("UPDATE: could not convert type to group")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
case gtsmodel.ActivityStreamsOrganization:
|
|
|
|
l.Debug("got update for ORGANIZATION")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsOrganization)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
return errors.New("UPDATE: could not convert type to organization")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
case gtsmodel.ActivityStreamsPerson:
|
|
|
|
l.Debug("got update for PERSON")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsPerson)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
return errors.New("UPDATE: could not convert type to person")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
case gtsmodel.ActivityStreamsService:
|
|
|
|
l.Debug("got update for SERVICE")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsService)
|
|
|
|
if !ok {
|
2021-07-27 10:45:22 +02:00
|
|
|
return errors.New("UPDATE: could not convert type to service")
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
}
|
|
|
|
|
2021-08-25 15:34:33 +02:00
|
|
|
updatedAcct, err := f.typeConverter.ASRepresentationToAccount(ctx, accountable, true)
|
2021-05-27 16:06:24 +02:00
|
|
|
if err != nil {
|
2021-07-27 10:45:22 +02:00
|
|
|
return fmt.Errorf("UPDATE: error converting to account: %s", err)
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
2021-05-28 22:47:18 +02:00
|
|
|
if updatedAcct.Domain == f.config.Host {
|
|
|
|
// no need to update local accounts
|
|
|
|
// in fact, if we do this will break the shit out of things so do NOT
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-05-27 16:06:24 +02:00
|
|
|
if requestingAcct.URI != updatedAcct.URI {
|
2021-07-27 10:45:22 +02:00
|
|
|
return fmt.Errorf("UPDATE: update for account %s was requested by account %s, this is not valid", updatedAcct.URI, requestingAcct.URI)
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
updatedAcct.ID = requestingAcct.ID // set this here so the db will update properly instead of trying to PUT this and getting constraint issues
|
2021-08-25 15:34:33 +02:00
|
|
|
updatedAcct, err = f.db.UpdateAccount(ctx, updatedAcct)
|
|
|
|
if err != nil {
|
2021-07-27 10:45:22 +02:00
|
|
|
return fmt.Errorf("UPDATE: database error inserting updated account: %s", err)
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
fromFederatorChan <- gtsmodel.FromFederator{
|
|
|
|
APObjectType: gtsmodel.ActivityStreamsProfile,
|
|
|
|
APActivityType: gtsmodel.ActivityStreamsUpdate,
|
|
|
|
GTSModel: updatedAcct,
|
2021-07-27 10:45:22 +02:00
|
|
|
ReceivingAccount: targetAcct,
|
2021-05-27 16:06:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|