summaryrefslogtreecommitdiff
path: root/internal/processing
diff options
context:
space:
mode:
Diffstat (limited to 'internal/processing')
-rw-r--r--internal/processing/admin/domainkeysexpire.go4
-rw-r--r--internal/processing/fedi/common.go33
-rw-r--r--internal/processing/fedi/status.go1
-rw-r--r--internal/processing/fedi/user.go69
4 files changed, 37 insertions, 70 deletions
diff --git a/internal/processing/admin/domainkeysexpire.go b/internal/processing/admin/domainkeysexpire.go
index 886da8b2f..9853becbd 100644
--- a/internal/processing/admin/domainkeysexpire.go
+++ b/internal/processing/admin/domainkeysexpire.go
@@ -71,9 +71,7 @@ func (p *Processor) domainKeysExpireSideEffects(ctx context.Context, domain stri
// the public key and update the account.
if err := p.rangeDomainAccounts(ctx, domain, func(account *gtsmodel.Account) {
account.PublicKeyExpiresAt = expiresAt
-
- if err := p.state.DB.UpdateAccount(
- ctx,
+ if err := p.state.DB.UpdateAccount(ctx,
account,
"public_key_expires_at",
); err != nil {
diff --git a/internal/processing/fedi/common.go b/internal/processing/fedi/common.go
index f395ec3cf..a02779e73 100644
--- a/internal/processing/fedi/common.go
+++ b/internal/processing/fedi/common.go
@@ -22,7 +22,6 @@ import (
"errors"
"github.com/superseriousbusiness/gotosocial/internal/db"
- "github.com/superseriousbusiness/gotosocial/internal/gtscontext"
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
)
@@ -45,8 +44,6 @@ func (p *Processor) authenticate(ctx context.Context, requestedUser string) (
return nil, nil, gtserror.NewErrorNotFound(err)
}
- var requester *gtsmodel.Account
-
// Ensure request signed, and use signature URI to
// get requesting account, dereferencing if necessary.
pubKeyAuth, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUser)
@@ -54,33 +51,23 @@ func (p *Processor) authenticate(ctx context.Context, requestedUser string) (
return nil, nil, errWithCode
}
- if requester = pubKeyAuth.Owner; requester == nil {
- requester, _, err = p.federator.GetAccountByURI(
- gtscontext.SetFastFail(ctx),
- requestedUser,
- pubKeyAuth.OwnerURI,
- )
- if err != nil {
- err = gtserror.Newf("error getting account %s: %w", pubKeyAuth.OwnerURI, err)
- return nil, nil, gtserror.NewErrorUnauthorized(err)
- }
+ if pubKeyAuth.Handshaking {
+ // This should happen very rarely, we are in the middle of handshaking.
+ err := gtserror.Newf("network race handshaking %s", pubKeyAuth.OwnerURI)
+ return nil, nil, gtserror.NewErrorInternalError(err)
}
- if !requester.SuspendedAt.IsZero() {
- // Account was marked as suspended by a
- // local admin action. Stop request early.
- const text = "requesting account is suspended"
- return nil, nil, gtserror.NewErrorForbidden(errors.New(text))
- }
+ // Get requester from auth.
+ requester := pubKeyAuth.Owner
- // Ensure no block exists between requester + requested.
+ // Check that block does not exist between receiver and requester.
blocked, err := p.state.DB.IsEitherBlocked(ctx, receiver.ID, requester.ID)
if err != nil {
- err = gtserror.Newf("db error getting checking block: %w", err)
+ err := gtserror.Newf("error checking block: %w", err)
return nil, nil, gtserror.NewErrorInternalError(err)
} else if blocked {
- err = gtserror.Newf("block exists between accounts %s and %s", requester.ID, receiver.ID)
- return nil, nil, gtserror.NewErrorForbidden(err)
+ const text = "block exists between accounts"
+ return nil, nil, gtserror.NewErrorForbidden(errors.New(text))
}
return requester, receiver, nil
diff --git a/internal/processing/fedi/status.go b/internal/processing/fedi/status.go
index b8b75841c..8082c79bc 100644
--- a/internal/processing/fedi/status.go
+++ b/internal/processing/fedi/status.go
@@ -35,7 +35,6 @@ import (
// StatusGet handles the getting of a fedi/activitypub representation of a local status.
// It performs appropriate authentication before returning a JSON serializable interface.
func (p *Processor) StatusGet(ctx context.Context, requestedUser string, statusID string) (interface{}, gtserror.WithCode) {
- // Authenticate using http signature.
// Authenticate the incoming request, getting related user accounts.
requester, receiver, errWithCode := p.authenticate(ctx, requestedUser)
if errWithCode != nil {
diff --git a/internal/processing/fedi/user.go b/internal/processing/fedi/user.go
index 17663a8f4..bf14554cf 100644
--- a/internal/processing/fedi/user.go
+++ b/internal/processing/fedi/user.go
@@ -26,7 +26,6 @@ import (
"github.com/superseriousbusiness/activity/streams/vocab"
"github.com/superseriousbusiness/gotosocial/internal/ap"
"github.com/superseriousbusiness/gotosocial/internal/db"
- "github.com/superseriousbusiness/gotosocial/internal/gtscontext"
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
"github.com/superseriousbusiness/gotosocial/internal/uris"
)
@@ -35,7 +34,7 @@ import (
// performing authentication before returning a JSON serializable interface to the caller.
func (p *Processor) UserGet(ctx context.Context, requestedUsername string, requestURL *url.URL) (interface{}, gtserror.WithCode) {
// (Try to) get the requested local account from the db.
- requestedAccount, err := p.state.DB.GetAccountByUsernameDomain(ctx, requestedUsername, "")
+ receiver, err := p.state.DB.GetAccountByUsernameDomain(ctx, requestedUsername, "")
if err != nil {
if errors.Is(err, db.ErrNoEntries) {
// Account just not found w/ this username.
@@ -54,8 +53,9 @@ func (p *Processor) UserGet(ctx context.Context, requestedUsername string, reque
// the bare minimum user profile needed for the pubkey.
//
// TODO: https://github.com/superseriousbusiness/gotosocial/issues/1186
- minimalPerson, err := p.converter.AccountToASMinimal(ctx, requestedAccount)
+ minimalPerson, err := p.converter.AccountToASMinimal(ctx, receiver)
if err != nil {
+ err := gtserror.Newf("error converting to minimal account: %w", err)
return nil, gtserror.NewErrorInternalError(err)
}
@@ -72,56 +72,39 @@ func (p *Processor) UserGet(ctx context.Context, requestedUsername string, reque
}
// Auth passed, generate the proper AP representation.
- person, err := p.converter.AccountToAS(ctx, requestedAccount)
+ person, err := p.converter.AccountToAS(ctx, receiver)
if err != nil {
+ err := gtserror.Newf("error converting account: %w", err)
return nil, gtserror.NewErrorInternalError(err)
}
- // If we are currently handshaking with the remote account
- // making the request, then don't be coy: just serve the AP
- // representation of the target account.
- //
- // This handshake check ensures that we don't get stuck in
- // a loop with another GtS instance, where each instance is
- // trying repeatedly to dereference the other account that's
- // making the request before it will reveal its own account.
- //
- // Instead, we end up in an 'I'll show you mine if you show me
- // yours' situation, where we sort of agree to reveal each
- // other's profiles at the same time.
- if p.federator.Handshaking(requestedUsername, pubKeyAuth.OwnerURI) {
+ if pubKeyAuth.Handshaking {
+ // If we are currently handshaking with the remote account
+ // making the request, then don't be coy: just serve the AP
+ // representation of the target account.
+ //
+ // This handshake check ensures that we don't get stuck in
+ // a loop with another GtS instance, where each instance is
+ // trying repeatedly to dereference the other account that's
+ // making the request before it will reveal its own account.
+ //
+ // Instead, we end up in an 'I'll show you mine if you show me
+ // yours' situation, where we sort of agree to reveal each
+ // other's profiles at the same time.
return data(person)
}
- // We're not currently handshaking with the requestingAccountURI,
- // so fetch its details and ensure it's up to date + not blocked.
- requestingAccount, _, err := p.federator.GetAccountByURI(
- // On a hot path so fail quickly.
- gtscontext.SetFastFail(ctx),
- requestedUsername,
- pubKeyAuth.OwnerURI,
- )
- if err != nil {
- err := gtserror.Newf("error getting account %s: %w", pubKeyAuth.OwnerURI, err)
- return nil, gtserror.NewErrorUnauthorized(err)
- }
-
- if !requestingAccount.SuspendedAt.IsZero() {
- // Account was marked as suspended by a
- // local admin action. Stop request early.
- err = fmt.Errorf("account %s marked as suspended", requestingAccount.ID)
- return nil, gtserror.NewErrorForbidden(err)
- }
+ // Get requester from auth.
+ requester := pubKeyAuth.Owner
- blocked, err := p.state.DB.IsBlocked(ctx, requestedAccount.ID, requestingAccount.ID)
+ // Check that block does not exist between receiver and requester.
+ blocked, err := p.state.DB.IsBlocked(ctx, receiver.ID, requester.ID)
if err != nil {
- err := gtserror.Newf("error checking block from account %s to account %s: %w", requestedAccount.ID, requestingAccount.ID, err)
+ err := gtserror.Newf("error checking block: %w", err)
return nil, gtserror.NewErrorInternalError(err)
- }
-
- if blocked {
- err := fmt.Errorf("account %s blocks account %s", requestedAccount.ID, requestingAccount.ID)
- return nil, gtserror.NewErrorForbidden(err)
+ } else if blocked {
+ const text = "block exists between accounts"
+ return nil, gtserror.NewErrorForbidden(errors.New(text))
}
return data(person)