[chore] replaces nested ifs with switch cases, removes defer 'onFail()' being passed to funcs (#3143)
This commit is contained in:
parent
d9e70b942f
commit
ecc114fc00
|
@ -49,70 +49,67 @@ func (d *Dereferencer) isPermittedStatus(
|
||||||
existing *gtsmodel.Status,
|
existing *gtsmodel.Status,
|
||||||
status *gtsmodel.Status,
|
status *gtsmodel.Status,
|
||||||
) (
|
) (
|
||||||
bool, // is permitted?
|
permitted bool, // is permitted?
|
||||||
error,
|
err error,
|
||||||
) {
|
) {
|
||||||
// our failure condition handling
|
switch {
|
||||||
// at the end of this function for
|
case status.Account.IsSuspended():
|
||||||
// the case of permission = false.
|
// we shouldn't reach this point, log to poke devs to investigate.
|
||||||
onFalse := func() (bool, error) {
|
log.Warnf(ctx, "status author suspended: %s", status.AccountURI)
|
||||||
if existing != nil {
|
permitted = false
|
||||||
log.Infof(ctx, "deleting unpermitted: %s", existing.URI)
|
|
||||||
|
|
||||||
// Delete existing status from database as it's no longer permitted.
|
case status.InReplyTo != nil:
|
||||||
if err := d.state.DB.DeleteStatusByID(ctx, existing.ID); err != nil {
|
// Status is a reply, check permissivity.
|
||||||
log.Errorf(ctx, "error deleting %s after permissivity fail: %v", existing.URI, err)
|
permitted, err = d.isPermittedReply(ctx,
|
||||||
}
|
requestUser,
|
||||||
|
status,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return false, gtserror.Newf("error checking reply permissivity: %w", err)
|
||||||
}
|
}
|
||||||
return false, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if status.Account.IsSuspended() {
|
case status.BoostOf != nil:
|
||||||
// The status author is suspended,
|
// Status is a boost, check permissivity.
|
||||||
// this shouldn't have reached here
|
permitted, err = d.isPermittedBoost(ctx,
|
||||||
// but it's a fast check anyways.
|
|
||||||
log.Debugf(ctx,
|
|
||||||
"status author %s is suspended",
|
|
||||||
status.AccountURI,
|
|
||||||
)
|
|
||||||
return onFalse()
|
|
||||||
}
|
|
||||||
|
|
||||||
if inReplyTo := status.InReplyTo; inReplyTo != nil {
|
|
||||||
return d.isPermittedReply(
|
|
||||||
ctx,
|
|
||||||
requestUser,
|
requestUser,
|
||||||
status,
|
status,
|
||||||
inReplyTo,
|
|
||||||
onFalse,
|
|
||||||
)
|
|
||||||
} else if boostOf := status.BoostOf; boostOf != nil {
|
|
||||||
return d.isPermittedBoost(
|
|
||||||
ctx,
|
|
||||||
requestUser,
|
|
||||||
status,
|
|
||||||
boostOf,
|
|
||||||
onFalse,
|
|
||||||
)
|
)
|
||||||
|
if err != nil {
|
||||||
|
return false, gtserror.Newf("error checking boost permissivity: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
default:
|
||||||
|
// In all other cases
|
||||||
|
// permit this status.
|
||||||
|
permitted = true
|
||||||
}
|
}
|
||||||
|
|
||||||
// Nothing else stopping this.
|
if !permitted && existing != nil {
|
||||||
return true, nil
|
log.Infof(ctx, "deleting unpermitted: %s", existing.URI)
|
||||||
|
|
||||||
|
// Delete existing status from database as it's no longer permitted.
|
||||||
|
if err := d.state.DB.DeleteStatusByID(ctx, existing.ID); err != nil {
|
||||||
|
log.Errorf(ctx, "error deleting %s after permissivity fail: %v", existing.URI, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Dereferencer) isPermittedReply(
|
func (d *Dereferencer) isPermittedReply(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
requestUser string,
|
requestUser string,
|
||||||
status *gtsmodel.Status,
|
status *gtsmodel.Status,
|
||||||
inReplyTo *gtsmodel.Status,
|
|
||||||
onFalse func() (bool, error),
|
|
||||||
) (bool, error) {
|
) (bool, error) {
|
||||||
|
// Extract reply from status.
|
||||||
|
inReplyTo := status.InReplyTo
|
||||||
|
|
||||||
if inReplyTo.BoostOfID != "" {
|
if inReplyTo.BoostOfID != "" {
|
||||||
// We do not permit replies to
|
// We do not permit replies to
|
||||||
// boost wrapper statuses. (this
|
// boost wrapper statuses. (this
|
||||||
// shouldn't be able to happen).
|
// shouldn't be able to happen).
|
||||||
log.Info(ctx, "rejecting reply to boost wrapper status")
|
log.Info(ctx, "rejecting reply to boost wrapper status")
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check visibility of local
|
// Check visibility of local
|
||||||
|
@ -130,7 +127,7 @@ func (d *Dereferencer) isPermittedReply(
|
||||||
// Our status is not visible to the
|
// Our status is not visible to the
|
||||||
// account trying to do the reply.
|
// account trying to do the reply.
|
||||||
if !visible {
|
if !visible {
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -147,7 +144,7 @@ func (d *Dereferencer) isPermittedReply(
|
||||||
if replyable.Forbidden() {
|
if replyable.Forbidden() {
|
||||||
// Replier is not permitted
|
// Replier is not permitted
|
||||||
// to do this interaction.
|
// to do this interaction.
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if replyable.Permitted() &&
|
if replyable.Permitted() &&
|
||||||
|
@ -186,7 +183,7 @@ func (d *Dereferencer) isPermittedReply(
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Status claims to be approved, check
|
// Status claims to be approved, check
|
||||||
|
@ -199,14 +196,12 @@ func (d *Dereferencer) isPermittedReply(
|
||||||
status.URI,
|
status.URI,
|
||||||
inReplyTo.AccountURI,
|
inReplyTo.AccountURI,
|
||||||
); err != nil {
|
); err != nil {
|
||||||
|
|
||||||
// Error dereferencing means we couldn't
|
// Error dereferencing means we couldn't
|
||||||
// get the Accept right now or it wasn't
|
// get the Accept right now or it wasn't
|
||||||
// valid, so we shouldn't store this status.
|
// valid, so we shouldn't store this status.
|
||||||
//
|
log.Errorf(ctx, "undereferencable ApprovedByURI: %v", err)
|
||||||
// Do log the error though as it may be
|
return false, nil
|
||||||
// interesting for admins to see.
|
|
||||||
log.Info(ctx, "rejecting reply with undereferenceable ApprovedByURI: %v", err)
|
|
||||||
return onFalse()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Status has been approved.
|
// Status has been approved.
|
||||||
|
@ -218,15 +213,16 @@ func (d *Dereferencer) isPermittedBoost(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
requestUser string,
|
requestUser string,
|
||||||
status *gtsmodel.Status,
|
status *gtsmodel.Status,
|
||||||
boostOf *gtsmodel.Status,
|
|
||||||
onFalse func() (bool, error),
|
|
||||||
) (bool, error) {
|
) (bool, error) {
|
||||||
|
|
||||||
|
// Extract boost from status.
|
||||||
|
boostOf := status.BoostOf
|
||||||
if boostOf.BoostOfID != "" {
|
if boostOf.BoostOfID != "" {
|
||||||
|
|
||||||
// We do not permit boosts of
|
// We do not permit boosts of
|
||||||
// boost wrapper statuses. (this
|
// boost wrapper statuses. (this
|
||||||
// shouldn't be able to happen).
|
// shouldn't be able to happen).
|
||||||
log.Info(ctx, "rejecting boost of boost wrapper status")
|
return false, nil
|
||||||
return onFalse()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check visibility of local
|
// Check visibility of local
|
||||||
|
@ -244,7 +240,7 @@ func (d *Dereferencer) isPermittedBoost(
|
||||||
// Our status is not visible to the
|
// Our status is not visible to the
|
||||||
// account trying to do the boost.
|
// account trying to do the boost.
|
||||||
if !visible {
|
if !visible {
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -261,7 +257,7 @@ func (d *Dereferencer) isPermittedBoost(
|
||||||
if boostable.Forbidden() {
|
if boostable.Forbidden() {
|
||||||
// Booster is not permitted
|
// Booster is not permitted
|
||||||
// to do this interaction.
|
// to do this interaction.
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if boostable.Permitted() &&
|
if boostable.Permitted() &&
|
||||||
|
@ -300,7 +296,7 @@ func (d *Dereferencer) isPermittedBoost(
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return onFalse()
|
return false, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Boost claims to be approved, check
|
// Boost claims to be approved, check
|
||||||
|
@ -313,14 +309,12 @@ func (d *Dereferencer) isPermittedBoost(
|
||||||
status.URI,
|
status.URI,
|
||||||
boostOf.AccountURI,
|
boostOf.AccountURI,
|
||||||
); err != nil {
|
); err != nil {
|
||||||
|
|
||||||
// Error dereferencing means we couldn't
|
// Error dereferencing means we couldn't
|
||||||
// get the Accept right now or it wasn't
|
// get the Accept right now or it wasn't
|
||||||
// valid, so we shouldn't store this status.
|
// valid, so we shouldn't store this status.
|
||||||
//
|
log.Errorf(ctx, "undereferencable ApprovedByURI: %v", err)
|
||||||
// Do log the error though as it may be
|
return false, nil
|
||||||
// interesting for admins to see.
|
|
||||||
log.Info(ctx, "rejecting boost with undereferenceable ApprovedByURI: %v", err)
|
|
||||||
return onFalse()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Status has been approved.
|
// Status has been approved.
|
||||||
|
@ -339,8 +333,8 @@ func (d *Dereferencer) validateApprovedBy(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
requestUser string,
|
requestUser string,
|
||||||
approvedByURIStr string, // Eg., "https://example.org/users/someone/accepts/01J2736AWWJ3411CPR833F6D03"
|
approvedByURIStr string, // Eg., "https://example.org/users/someone/accepts/01J2736AWWJ3411CPR833F6D03"
|
||||||
expectedObject string, // Eg., "https://some.instance.example.org/users/someone_else/statuses/01J27414TWV9F7DC39FN8ABB5R"
|
expectObjectURIStr string, // Eg., "https://some.instance.example.org/users/someone_else/statuses/01J27414TWV9F7DC39FN8ABB5R"
|
||||||
expectedActor string, // Eg., "https://example.org/users/someone"
|
expectActorURIStr string, // Eg., "https://example.org/users/someone"
|
||||||
) error {
|
) error {
|
||||||
approvedByURI, err := url.Parse(approvedByURIStr)
|
approvedByURI, err := url.Parse(approvedByURIStr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -354,14 +348,14 @@ func (d *Dereferencer) validateApprovedBy(
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
transport, err := d.transportController.NewTransportForUsername(ctx, requestUser)
|
tsport, err := d.transportController.NewTransportForUsername(ctx, requestUser)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err := gtserror.Newf("error creating transport: %w", err)
|
err := gtserror.Newf("error creating transport: %w", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Make the call to resolve into an Acceptable.
|
// Make the call to resolve into an Acceptable.
|
||||||
rsp, err := transport.Dereference(ctx, approvedByURI)
|
rsp, err := tsport.Dereference(ctx, approvedByURI)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err := gtserror.Newf("error dereferencing %s: %w", approvedByURIStr, err)
|
err := gtserror.Newf("error dereferencing %s: %w", approvedByURIStr, err)
|
||||||
return err
|
return err
|
||||||
|
@ -385,82 +379,83 @@ func (d *Dereferencer) validateApprovedBy(
|
||||||
// have changed (i.e. we followed some redirects).
|
// have changed (i.e. we followed some redirects).
|
||||||
rspURL := rsp.Request.URL
|
rspURL := rsp.Request.URL
|
||||||
rspURLStr := rspURL.String()
|
rspURLStr := rspURL.String()
|
||||||
if rspURLStr != approvedByURIStr {
|
switch {
|
||||||
// Final URI was different from approvedByURIStr.
|
case rspURLStr == approvedByURIStr:
|
||||||
//
|
|
||||||
// Make sure it's at least on the same host as
|
|
||||||
// what we expected (ie., we weren't redirected
|
|
||||||
// across domains), and make sure it's the same
|
|
||||||
// as the ID of the Accept we were returned.
|
|
||||||
if rspURL.Host != approvedByURI.Host {
|
|
||||||
err := gtserror.Newf(
|
|
||||||
"final dereference host %s did not match approvedByURI host %s",
|
|
||||||
rspURL.Host, approvedByURI.Host,
|
|
||||||
)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if acceptURIStr != rspURLStr {
|
// i.e. from here, rspURLStr != approvedByURIStr.
|
||||||
err := gtserror.Newf(
|
//
|
||||||
"final dereference uri %s did not match returned Accept ID/URI %s",
|
// Make sure it's at least on the same host as
|
||||||
rspURLStr, acceptURIStr,
|
// what we expected (ie., we weren't redirected
|
||||||
)
|
// across domains), and make sure it's the same
|
||||||
return err
|
// as the ID of the Accept we were returned.
|
||||||
}
|
case rspURL.Host != approvedByURI.Host:
|
||||||
}
|
return gtserror.Newf(
|
||||||
|
"final dereference host %s did not match approvedByURI host %s",
|
||||||
// Ensure the Accept URI has the same host
|
rspURL.Host, approvedByURI.Host,
|
||||||
// as the Accept Actor, so we know we're
|
)
|
||||||
// not dealing with someone on a different
|
case acceptURIStr != rspURLStr:
|
||||||
// domain just pretending to be the Actor.
|
return gtserror.Newf(
|
||||||
actorIRIs := ap.GetActorIRIs(acceptable)
|
"final dereference uri %s did not match returned Accept ID/URI %s",
|
||||||
if len(actorIRIs) != 1 {
|
rspURLStr, acceptURIStr,
|
||||||
err := gtserror.New("resolved Accept actor(s) length was not 1")
|
|
||||||
return gtserror.SetMalformed(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
actorIRI := actorIRIs[0]
|
|
||||||
actorStr := actorIRI.String()
|
|
||||||
|
|
||||||
if actorIRI.Host != acceptURI.Host {
|
|
||||||
err := gtserror.Newf(
|
|
||||||
"Accept Actor %s was not the same host as Accept %s",
|
|
||||||
actorStr, acceptURIStr,
|
|
||||||
)
|
)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Extract the actor IRI and string from Accept.
|
||||||
|
actorIRIs := ap.GetActorIRIs(acceptable)
|
||||||
|
actorIRI, actorIRIStr := extractIRI(actorIRIs)
|
||||||
|
switch {
|
||||||
|
case actorIRIStr == "":
|
||||||
|
err := gtserror.New("missing Accept actor IRI")
|
||||||
|
return gtserror.SetMalformed(err)
|
||||||
|
|
||||||
// Ensure the Accept Actor is who we expect
|
// Ensure the Accept Actor is who we expect
|
||||||
// it to be, and not someone else trying to
|
// it to be, and not someone else trying to
|
||||||
// do an Accept for an interaction with a
|
// do an Accept for an interaction with a
|
||||||
// statusable they don't own.
|
// statusable they don't own.
|
||||||
if actorStr != expectedActor {
|
case actorIRI.Host != acceptURI.Host:
|
||||||
err := gtserror.Newf(
|
return gtserror.Newf(
|
||||||
"Accept Actor %s was not the same as expected actor %s",
|
"Accept Actor %s was not the same host as Accept %s",
|
||||||
actorStr, expectedActor,
|
actorIRIStr, acceptURIStr,
|
||||||
|
)
|
||||||
|
|
||||||
|
// Ensure the Accept Actor is who we expect
|
||||||
|
// it to be, and not someone else trying to
|
||||||
|
// do an Accept for an interaction with a
|
||||||
|
// statusable they don't own.
|
||||||
|
case actorIRIStr != expectActorURIStr:
|
||||||
|
return gtserror.Newf(
|
||||||
|
"Accept Actor %s was not the same as expected actor %s",
|
||||||
|
actorIRIStr, expectActorURIStr,
|
||||||
)
|
)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Extract the object IRI string from Accept.
|
||||||
|
objectIRIs := ap.GetObjectIRIs(acceptable)
|
||||||
|
_, objectIRIStr := extractIRI(objectIRIs)
|
||||||
|
switch {
|
||||||
|
case objectIRIStr == "":
|
||||||
|
err := gtserror.New("missing Accept object IRI")
|
||||||
|
return gtserror.SetMalformed(err)
|
||||||
|
|
||||||
// Ensure the Accept Object is what we expect
|
// Ensure the Accept Object is what we expect
|
||||||
// it to be, ie., it's Accepting the interaction
|
// it to be, ie., it's Accepting the interaction
|
||||||
// we need it to Accept, and not something else.
|
// we need it to Accept, and not something else.
|
||||||
objectIRIs := ap.GetObjectIRIs(acceptable)
|
case objectIRIStr != expectObjectURIStr:
|
||||||
if len(objectIRIs) != 1 {
|
return gtserror.Newf(
|
||||||
err := gtserror.New("resolved Accept object(s) length was not 1")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
objectIRI := objectIRIs[0]
|
|
||||||
objectStr := objectIRI.String()
|
|
||||||
|
|
||||||
if objectStr != expectedObject {
|
|
||||||
err := gtserror.Newf(
|
|
||||||
"resolved Accept Object uri %s was not the same as expected object %s",
|
"resolved Accept Object uri %s was not the same as expected object %s",
|
||||||
objectStr, expectedObject,
|
objectIRIStr, expectObjectURIStr,
|
||||||
)
|
)
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// extractIRI is shorthand to extract the first IRI
|
||||||
|
// url.URL{} object and serialized form from slice.
|
||||||
|
func extractIRI(iris []*url.URL) (*url.URL, string) {
|
||||||
|
if len(iris) == 0 {
|
||||||
|
return nil, ""
|
||||||
|
}
|
||||||
|
u := iris[0]
|
||||||
|
return u, u.String()
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in New Issue