mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-10-31 22:18:52 +00:00
c9c0773f2c
* start replacing client + federator + media workers with new worker + queue types * refactor federatingDB.Delete(), drop queued messages when deleting account / status * move all queue purging to the processor workers * undo toolchain updates * code comments, ensure dereferencer worker pool gets started * update gruf libraries in readme * start the job scheduler separately to the worker pools * reshuffle ordering or server.go + remove duplicate worker start / stop * update go-list version * fix vendoring * move queue invalidation to before wipeing / deletion, to ensure queued work not dropped * add logging to worker processing functions in testrig, don't start workers in unexpected places * update go-structr to add (+then rely on) QueueCtx{} type * ensure more worker pools get started properly in tests * fix remaining broken tests relying on worker queue logic * fix account test suite queue popping logic, ensure noop workers do not pull from queue * move back accidentally shuffled account deletion order * ensure error (non nil!!) gets passed in refactored federatingDB{}.Delete() * silently drop deletes from accounts not permitted to * don't warn log on forwarded deletes * make if else clauses easier to parse * use getFederatorMsg() * improved code comment * improved code comment re: requesting account delete checks * remove boolean result from worker start / stop since false = already running or already stopped * remove optional passed-in http.client * remove worker starting from the admin CLI commands (we don't need to handle side-effects) * update prune cli to start scheduler but not all of the workers * fix rebase issues * remove redundant return statements * i'm sorry sir linter
165 lines
5.3 KiB
Go
165 lines
5.3 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package account
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
|
"github.com/superseriousbusiness/gotosocial/internal/text"
|
|
"github.com/superseriousbusiness/oauth2/v4"
|
|
)
|
|
|
|
// Create processes the given form for creating a new account,
|
|
// returning a new user (with attached account) if successful.
|
|
//
|
|
// App should be the app used to create the account.
|
|
// If nil, the instance app will be used.
|
|
//
|
|
// Precondition: the form's fields should have already been
|
|
// validated and normalized by the caller.
|
|
func (p *Processor) Create(
|
|
ctx context.Context,
|
|
app *gtsmodel.Application,
|
|
form *apimodel.AccountCreateRequest,
|
|
) (*gtsmodel.User, gtserror.WithCode) {
|
|
const (
|
|
usersPerDay = 10
|
|
regBacklog = 20
|
|
)
|
|
|
|
// Ensure no more than usersPerDay
|
|
// have registered in the last 24h.
|
|
newUsersCount, err := p.state.DB.CountApprovedSignupsSince(ctx, time.Now().Add(-24*time.Hour))
|
|
if err != nil {
|
|
err := fmt.Errorf("db error counting new users: %w", err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
if newUsersCount >= usersPerDay {
|
|
err := fmt.Errorf("this instance has hit its limit of new sign-ups for today; you can try again tomorrow")
|
|
return nil, gtserror.NewErrorUnprocessableEntity(err, err.Error())
|
|
}
|
|
|
|
// Ensure the new users backlog isn't full.
|
|
backlogLen, err := p.state.DB.CountUnhandledSignups(ctx)
|
|
if err != nil {
|
|
err := fmt.Errorf("db error counting registration backlog length: %w", err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
if backlogLen >= regBacklog {
|
|
err := fmt.Errorf("this instance's sign-up backlog is currently full; you must wait until pending sign-ups are handled by the admin(s)")
|
|
return nil, gtserror.NewErrorUnprocessableEntity(err, err.Error())
|
|
}
|
|
|
|
emailAvailable, err := p.state.DB.IsEmailAvailable(ctx, form.Email)
|
|
if err != nil {
|
|
err := fmt.Errorf("db error checking email availability: %w", err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
if !emailAvailable {
|
|
err := fmt.Errorf("email address %s is not available", form.Email)
|
|
return nil, gtserror.NewErrorConflict(err, err.Error())
|
|
}
|
|
|
|
usernameAvailable, err := p.state.DB.IsUsernameAvailable(ctx, form.Username)
|
|
if err != nil {
|
|
err := fmt.Errorf("db error checking username availability: %w", err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
if !usernameAvailable {
|
|
err := fmt.Errorf("username %s is not available", form.Username)
|
|
return nil, gtserror.NewErrorConflict(err, err.Error())
|
|
}
|
|
|
|
// Only store reason if one is required.
|
|
var reason string
|
|
if config.GetAccountsReasonRequired() {
|
|
reason = form.Reason
|
|
}
|
|
|
|
// Use instance app if no app provided.
|
|
if app == nil {
|
|
app, err = p.state.DB.GetInstanceApplication(ctx)
|
|
if err != nil {
|
|
err := fmt.Errorf("db error getting instance app: %w", err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
}
|
|
|
|
user, err := p.state.DB.NewSignup(ctx, gtsmodel.NewSignup{
|
|
Username: form.Username,
|
|
Email: form.Email,
|
|
Password: form.Password,
|
|
Reason: text.SanitizeToPlaintext(reason),
|
|
SignUpIP: form.IP,
|
|
Locale: form.Locale,
|
|
AppID: app.ID,
|
|
})
|
|
if err != nil {
|
|
err := fmt.Errorf("db error creating new signup: %w", err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
// There are side effects for creating a new account
|
|
// (confirmation emails etc), perform these async.
|
|
p.state.Workers.Client.Queue.Push(&messages.FromClientAPI{
|
|
APObjectType: ap.ObjectProfile,
|
|
APActivityType: ap.ActivityCreate,
|
|
GTSModel: user,
|
|
Origin: user.Account,
|
|
})
|
|
|
|
return user, nil
|
|
}
|
|
|
|
// TokenForNewUser generates an OAuth Bearer token
|
|
// for a new user (with account) created by Create().
|
|
func (p *Processor) TokenForNewUser(
|
|
ctx context.Context,
|
|
appToken oauth2.TokenInfo,
|
|
app *gtsmodel.Application,
|
|
user *gtsmodel.User,
|
|
) (*apimodel.Token, gtserror.WithCode) {
|
|
// Generate access token.
|
|
accessToken, err := p.oauthServer.GenerateUserAccessToken(
|
|
ctx,
|
|
appToken,
|
|
app.ClientSecret,
|
|
user.ID,
|
|
)
|
|
if err != nil {
|
|
err := fmt.Errorf("error creating new access token for user %s: %w", user.ID, err)
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
return &apimodel.Token{
|
|
AccessToken: accessToken.GetAccess(),
|
|
TokenType: "Bearer",
|
|
Scope: accessToken.GetScope(),
|
|
CreatedAt: accessToken.GetAccessCreateAt().Unix(),
|
|
}, nil
|
|
}
|