2023-03-12 15:00:57 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-08-20 10:26:56 +00:00
|
|
|
|
2021-05-27 14:06:24 +00:00
|
|
|
package federatingdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
|
2022-07-19 08:47:55 +00:00
|
|
|
"codeberg.org/gruf/go-logger/v2/level"
|
2021-11-13 16:29:43 +00:00
|
|
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
2021-08-10 11:32:39 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2021-12-07 12:31:39 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
2021-05-27 14:06:24 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-07-19 08:47:55 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2021-08-31 13:59:12 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
2021-05-27 14:06:24 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Update sets an existing entry to the database based on the value's
|
|
|
|
// id.
|
|
|
|
//
|
|
|
|
// Note that Activity values received from federated peers may also be
|
|
|
|
// updated in the database this way if the Federating Protocol is
|
|
|
|
// enabled. The client may freely decide to store only the id instead of
|
|
|
|
// the entire value.
|
|
|
|
//
|
|
|
|
// The library makes this call only after acquiring a lock first.
|
|
|
|
func (f *federatingDB) Update(ctx context.Context, asType vocab.Type) error {
|
2023-02-17 19:05:43 +00:00
|
|
|
l := log.Entry{}.WithContext(ctx)
|
2021-10-04 13:24:19 +00:00
|
|
|
|
2022-07-19 08:47:55 +00:00
|
|
|
if log.Level() >= level.DEBUG {
|
2021-10-04 13:24:19 +00:00
|
|
|
i, err := marshalItem(asType)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
l = l.WithField("update", i)
|
|
|
|
l.Debug("entering Update")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
2021-10-04 13:24:19 +00:00
|
|
|
|
2022-04-28 12:23:11 +00:00
|
|
|
receivingAccount, _ := extractFromCtx(ctx)
|
|
|
|
if receivingAccount == nil {
|
|
|
|
// If the receiving account wasn't set on the context, that means this request didn't pass
|
2021-10-04 13:24:19 +00:00
|
|
|
// through the API, but came from inside GtS as the result of another activity on this instance. That being so,
|
2021-07-27 08:45:22 +00:00
|
|
|
// we can safely just ignore this activity, since we know we've already processed it elsewhere.
|
|
|
|
return nil
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
|
2021-12-20 14:19:53 +00:00
|
|
|
requestingAcctI := ctx.Value(ap.ContextRequestingAccount)
|
2021-10-04 13:24:19 +00:00
|
|
|
if requestingAcctI == nil {
|
2021-07-27 08:45:22 +00:00
|
|
|
l.Error("UPDATE: requesting account wasn't set on context")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
requestingAcct, ok := requestingAcctI.(*gtsmodel.Account)
|
|
|
|
if !ok {
|
2021-07-27 08:45:22 +00:00
|
|
|
l.Error("UPDATE: requesting account was set on context but couldn't be parsed")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
typeName := asType.GetTypeName()
|
2021-08-31 13:59:12 +00:00
|
|
|
if typeName == ap.ActorApplication ||
|
|
|
|
typeName == ap.ActorGroup ||
|
|
|
|
typeName == ap.ActorOrganization ||
|
|
|
|
typeName == ap.ActorPerson ||
|
|
|
|
typeName == ap.ActorService {
|
2021-05-27 14:06:24 +00:00
|
|
|
// it's an UPDATE to some kind of account
|
2021-08-10 11:32:39 +00:00
|
|
|
var accountable ap.Accountable
|
2021-09-28 13:21:59 +00:00
|
|
|
switch typeName {
|
2021-08-31 13:59:12 +00:00
|
|
|
case ap.ActorApplication:
|
2021-05-27 14:06:24 +00:00
|
|
|
l.Debug("got update for APPLICATION")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsApplication)
|
|
|
|
if !ok {
|
2021-07-27 08:45:22 +00:00
|
|
|
return errors.New("UPDATE: could not convert type to application")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 13:59:12 +00:00
|
|
|
case ap.ActorGroup:
|
2021-05-27 14:06:24 +00:00
|
|
|
l.Debug("got update for GROUP")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsGroup)
|
|
|
|
if !ok {
|
2021-07-27 08:45:22 +00:00
|
|
|
return errors.New("UPDATE: could not convert type to group")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 13:59:12 +00:00
|
|
|
case ap.ActorOrganization:
|
2021-05-27 14:06:24 +00:00
|
|
|
l.Debug("got update for ORGANIZATION")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsOrganization)
|
|
|
|
if !ok {
|
2021-07-27 08:45:22 +00:00
|
|
|
return errors.New("UPDATE: could not convert type to organization")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 13:59:12 +00:00
|
|
|
case ap.ActorPerson:
|
2021-05-27 14:06:24 +00:00
|
|
|
l.Debug("got update for PERSON")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsPerson)
|
|
|
|
if !ok {
|
2021-07-27 08:45:22 +00:00
|
|
|
return errors.New("UPDATE: could not convert type to person")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
accountable = i
|
2021-08-31 13:59:12 +00:00
|
|
|
case ap.ActorService:
|
2021-05-27 14:06:24 +00:00
|
|
|
l.Debug("got update for SERVICE")
|
|
|
|
i, ok := asType.(vocab.ActivityStreamsService)
|
|
|
|
if !ok {
|
2021-07-27 08:45:22 +00:00
|
|
|
return errors.New("UPDATE: could not convert type to service")
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
accountable = i
|
|
|
|
}
|
|
|
|
|
2023-02-03 20:03:05 +00:00
|
|
|
updatedAcct, err := f.typeConverter.ASRepresentationToAccount(ctx, accountable, "")
|
2021-05-27 14:06:24 +00:00
|
|
|
if err != nil {
|
2021-07-27 08:45:22 +00:00
|
|
|
return fmt.Errorf("UPDATE: error converting to account: %s", err)
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
|
2022-09-26 09:56:01 +00:00
|
|
|
if updatedAcct.Domain == config.GetHost() || updatedAcct.Domain == config.GetAccountDomain() {
|
2021-05-28 20:47:18 +00:00
|
|
|
// no need to update local accounts
|
|
|
|
// in fact, if we do this will break the shit out of things so do NOT
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-05-27 14:06:24 +00:00
|
|
|
if requestingAcct.URI != updatedAcct.URI {
|
2021-07-27 08:45:22 +00:00
|
|
|
return fmt.Errorf("UPDATE: update for account %s was requested by account %s, this is not valid", updatedAcct.URI, requestingAcct.URI)
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
|
2021-09-28 13:21:59 +00:00
|
|
|
// set some fields here on the updatedAccount representation so we don't run into db issues
|
|
|
|
updatedAcct.CreatedAt = requestingAcct.CreatedAt
|
|
|
|
updatedAcct.ID = requestingAcct.ID
|
|
|
|
updatedAcct.Language = requestingAcct.Language
|
|
|
|
|
2022-09-26 09:56:01 +00:00
|
|
|
// pass to the processor for further updating of eg., avatar/header, emojis
|
|
|
|
// the actual db insert/update will take place a bit later
|
2023-03-01 18:26:53 +00:00
|
|
|
f.state.Workers.EnqueueFederator(ctx, messages.FromFederator{
|
2021-08-31 13:59:12 +00:00
|
|
|
APObjectType: ap.ObjectProfile,
|
|
|
|
APActivityType: ap.ActivityUpdate,
|
2021-05-27 14:06:24 +00:00
|
|
|
GTSModel: updatedAcct,
|
2021-10-10 10:39:25 +00:00
|
|
|
ReceivingAccount: receivingAccount,
|
2022-04-28 12:23:11 +00:00
|
|
|
})
|
2021-05-27 14:06:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|