diff --git a/cmd/gotosocial/action/server/server.go b/cmd/gotosocial/action/server/server.go index fc08c57ac..8de44c4f0 100644 --- a/cmd/gotosocial/action/server/server.go +++ b/cmd/gotosocial/action/server/server.go @@ -176,10 +176,14 @@ var Start action.GTSAction = func(ctx context.Context) error { // Create the processor using all the other services we've created so far. processor := processing.NewProcessor(typeConverter, federator, oauthServer, mediaManager, &state, emailSender) - // Set state client / federator worker enqueue functions + // Set state client / federator asynchronous worker enqueue functions state.Workers.EnqueueClientAPI = processor.Workers().EnqueueClientAPI state.Workers.EnqueueFediAPI = processor.Workers().EnqueueFediAPI + // Set state client / federator synchronous processing functions. + state.Workers.ProcessFromClientAPI = processor.Workers().ProcessFromClientAPI + state.Workers.ProcessFromFediAPI = processor.Workers().ProcessFromFediAPI + /* HTTP router initialization */ diff --git a/docs/api/swagger.yaml b/docs/api/swagger.yaml index a717139cf..793478aeb 100644 --- a/docs/api/swagger.yaml +++ b/docs/api/swagger.yaml @@ -3633,6 +3633,8 @@ paths: description: not found "406": description: not acceptable + "409": + description: 'Conflict: There is already an admin action running that conflicts with this action. Check the error message in the response body for more information. This is a temporary error; it should be possible to process this action if you try again in a bit.' "500": description: internal server error security: @@ -4022,6 +4024,8 @@ paths: description: not found "406": description: not acceptable + "409": + description: 'Conflict: There is already an admin action running that conflicts with this action. Check the error message in the response body for more information. This is a temporary error; it should be possible to process this action if you try again in a bit.' "500": description: internal server error security: @@ -4056,6 +4060,8 @@ paths: description: not found "406": description: not acceptable + "409": + description: 'Conflict: There is already an admin action running that conflicts with this action. Check the error message in the response body for more information. This is a temporary error; it should be possible to process this action if you try again in a bit.' "500": description: internal server error security: diff --git a/internal/api/client/admin/accountaction.go b/internal/api/client/admin/accountaction.go index 484f5bbc4..91186ae73 100644 --- a/internal/api/client/admin/accountaction.go +++ b/internal/api/client/admin/accountaction.go @@ -79,6 +79,11 @@ import ( // description: not found // '406': // description: not acceptable +// '409': +// description: >- +// Conflict: There is already an admin action running that conflicts with this action. +// Check the error message in the response body for more information. This is a temporary +// error; it should be possible to process this action if you try again in a bit. // '500': // description: internal server error func (m *Module) AccountActionPOSTHandler(c *gin.Context) { @@ -94,7 +99,7 @@ func (m *Module) AccountActionPOSTHandler(c *gin.Context) { return } - form := &apimodel.AdminAccountActionRequest{} + form := &apimodel.AdminActionRequest{} if err := c.ShouldBind(form); err != nil { apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1) return @@ -112,9 +117,9 @@ func (m *Module) AccountActionPOSTHandler(c *gin.Context) { apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1) return } - form.TargetAccountID = targetAcctID + form.TargetID = targetAcctID - if errWithCode := m.processor.Admin().AccountAction(c.Request.Context(), authed.Account, form); errWithCode != nil { + if _, errWithCode := m.processor.Admin().AccountAction(c.Request.Context(), authed.Account, form); errWithCode != nil { apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) return } diff --git a/internal/api/client/admin/domainblockcreate.go b/internal/api/client/admin/domainblockcreate.go index 148fad7c9..5cf9ea279 100644 --- a/internal/api/client/admin/domainblockcreate.go +++ b/internal/api/client/admin/domainblockcreate.go @@ -119,6 +119,11 @@ import ( // description: not found // '406': // description: not acceptable +// '409': +// description: >- +// Conflict: There is already an admin action running that conflicts with this action. +// Check the error message in the response body for more information. This is a temporary +// error; it should be possible to process this action if you try again in a bit. // '500': // description: internal server error func (m *Module) DomainBlocksPOSTHandler(c *gin.Context) { @@ -159,7 +164,7 @@ func (m *Module) DomainBlocksPOSTHandler(c *gin.Context) { if !importing { // Single domain block creation. - domainBlock, errWithCode := m.processor.Admin().DomainBlockCreate( + domainBlock, _, errWithCode := m.processor.Admin().DomainBlockCreate( c.Request.Context(), authed.Account, form.Domain, diff --git a/internal/api/client/admin/domainblockdelete.go b/internal/api/client/admin/domainblockdelete.go index 90624addc..9318bad87 100644 --- a/internal/api/client/admin/domainblockdelete.go +++ b/internal/api/client/admin/domainblockdelete.go @@ -66,6 +66,11 @@ import ( // description: not found // '406': // description: not acceptable +// '409': +// description: >- +// Conflict: There is already an admin action running that conflicts with this action. +// Check the error message in the response body for more information. This is a temporary +// error; it should be possible to process this action if you try again in a bit. // '500': // description: internal server error func (m *Module) DomainBlockDELETEHandler(c *gin.Context) { @@ -93,7 +98,7 @@ func (m *Module) DomainBlockDELETEHandler(c *gin.Context) { return } - domainBlock, errWithCode := m.processor.Admin().DomainBlockDelete(c.Request.Context(), authed.Account, domainBlockID) + domainBlock, _, errWithCode := m.processor.Admin().DomainBlockDelete(c.Request.Context(), authed.Account, domainBlockID) if errWithCode != nil { apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) return diff --git a/internal/api/model/admin.go b/internal/api/model/admin.go index 860cb8926..6be3e9cbd 100644 --- a/internal/api/model/admin.go +++ b/internal/api/model/admin.go @@ -163,16 +163,19 @@ type AdminEmoji struct { URI string `json:"uri"` } -// AdminAccountActionRequest models the admin view of an account's details. +// AdminActionRequest models a request +// for an admin action to be performed. // // swagger:ignore -type AdminAccountActionRequest struct { - // Type of the account action. One of disable, silence, suspend. +type AdminActionRequest struct { + // Category of the target entity. + Category string `form:"-" json:"-" xml:"-"` + // Type of admin action to take. One of disable, silence, suspend. Type string `form:"type" json:"type" xml:"type"` // Text describing why an action was taken. Text string `form:"text" json:"text" xml:"text"` - // ID of the account to be acted on. - TargetAccountID string `form:"-" json:"-" xml:"-"` + // ID of the target entity. + TargetID string `form:"-" json:"-" xml:"-"` } // MediaCleanupRequest models admin media cleanup parameters diff --git a/internal/db/admin.go b/internal/db/admin.go index 717ac4b94..fcae928f6 100644 --- a/internal/db/admin.go +++ b/internal/db/admin.go @@ -49,4 +49,23 @@ type Admin interface { // Ie., if the instance is hosted at 'example.org' the instance will have a domain of 'example.org'. // This is needed for things like serving instance information through /api/v1/instance CreateInstanceInstance(ctx context.Context) error + + /* + ACTION FUNCS + */ + + // GetAdminAction returns the admin action with the given ID. + GetAdminAction(ctx context.Context, id string) (*gtsmodel.AdminAction, error) + + // GetAdminActions gets all admin actions from the database. + GetAdminActions(ctx context.Context) ([]*gtsmodel.AdminAction, error) + + // PutAdminAction puts one admin action in the database. + PutAdminAction(ctx context.Context, action *gtsmodel.AdminAction) error + + // UpdateAdminAction updates one admin action by its ID. + UpdateAdminAction(ctx context.Context, action *gtsmodel.AdminAction, columns ...string) error + + // DeleteAdminAction deletes admin action with the given ID. + DeleteAdminAction(ctx context.Context, id string) error } diff --git a/internal/db/bundb/admin.go b/internal/db/bundb/admin.go index 8af08973c..e189c508e 100644 --- a/internal/db/bundb/admin.go +++ b/internal/db/bundb/admin.go @@ -320,3 +320,69 @@ func (a *adminDB) CreateInstanceInstance(ctx context.Context) error { log.Infof(ctx, "created instance instance %s with id %s", host, i.ID) return nil } + +/* + ACTION FUNCS +*/ + +func (a *adminDB) GetAdminAction(ctx context.Context, id string) (*gtsmodel.AdminAction, error) { + action := new(gtsmodel.AdminAction) + + if err := a.db. + NewSelect(). + Model(action). + Scan(ctx); err != nil { + return nil, err + } + + return action, nil +} + +func (a *adminDB) GetAdminActions(ctx context.Context) ([]*gtsmodel.AdminAction, error) { + actions := make([]*gtsmodel.AdminAction, 0) + + if err := a.db. + NewSelect(). + Model(&actions). + Scan(ctx); err != nil { + return nil, err + } + + return actions, nil +} + +func (a *adminDB) PutAdminAction(ctx context.Context, action *gtsmodel.AdminAction) error { + _, err := a.db. + NewInsert(). + Model(action). + Exec(ctx) + + return err +} + +func (a *adminDB) UpdateAdminAction(ctx context.Context, action *gtsmodel.AdminAction, columns ...string) error { + // Update the action's last-updated + action.UpdatedAt = time.Now() + if len(columns) != 0 { + columns = append(columns, "updated_at") + } + + _, err := a.db. + NewUpdate(). + Model(action). + Where("? = ?", bun.Ident("admin_action.id"), action.ID). + Column(columns...). + Exec(ctx) + + return err +} + +func (a *adminDB) DeleteAdminAction(ctx context.Context, id string) error { + _, err := a.db. + NewDelete(). + TableExpr("? AS ?", bun.Ident("admin_actions"), bun.Ident("admin_action")). + Where("? = ?", bun.Ident("admin_action"), id). + Exec(ctx) + + return err +} diff --git a/internal/db/bundb/migrations/20230828101322_admin_action_locking.go b/internal/db/bundb/migrations/20230828101322_admin_action_locking.go new file mode 100644 index 000000000..b72976cc9 --- /dev/null +++ b/internal/db/bundb/migrations/20230828101322_admin_action_locking.go @@ -0,0 +1,132 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package migrations + +import ( + "context" + + "github.com/uptrace/bun" + + oldmodel "github.com/superseriousbusiness/gotosocial/internal/db/bundb/migrations/20220315160814_admin_account_actions" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" + "github.com/superseriousbusiness/gotosocial/internal/util" +) + +func init() { + up := func(ctx context.Context, db *bun.DB) error { + return db.RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error { + // Select all old actions. + var adminAccountActions []*oldmodel.AdminAccountAction + if err := tx. + NewSelect(). + Model(&adminAccountActions). + Scan(ctx); err != nil { + return err + } + + // Create the new table. + if _, err := tx. + NewCreateTable(). + Model(>smodel.AdminAction{}). + Exec(ctx); err != nil { + return err + } + + // Index new table properly. + for index, columns := range map[string][]string{ + "account_actions_id_idx": {"id"}, + // Eg., select all actions of given category. + "account_actions_target_category_idx": {"target_category"}, + // Eg., select all actions targeting given id. + "account_actions_target_id_idx": {"target_id"}, + // Eg., select all actions of given type. + "account_actions_type_idx": {"type"}, + // Eg., select all actions by given account id. + "account_actions_account_id_idx": {"account_id"}, + } { + if _, err := tx. + NewCreateIndex(). + Table("admin_actions"). + Index(index). + Column(columns...). + Exec(ctx); err != nil { + return err + } + } + + // Insert old format entries into new table. + for _, oldAction := range adminAccountActions { + newAction := >smodel.AdminAction{ + ID: oldAction.ID, + CreatedAt: oldAction.CreatedAt, + UpdatedAt: oldAction.UpdatedAt, + TargetCategory: gtsmodel.AdminActionCategoryAccount, + TargetID: oldAction.TargetAccountID, + Type: gtsmodel.NewAdminActionType(string(oldAction.Type)), + AccountID: oldAction.AccountID, + Text: oldAction.Text, + SendEmail: util.Ptr(oldAction.SendEmail), + ReportIDs: []string{oldAction.ReportID}, + } + + if _, err := tx. + NewInsert(). + Model(newAction). + Exec(ctx); err != nil { + return err + } + } + + // Drop the old table. + if _, err := tx. + NewDropTable(). + Table("admin_account_actions"). + Exec(ctx); err != nil { + return err + } + + // Drop any remaining old indexes. + for _, idxName := range []string{ + "admin_account_actions_pkey", + "admin_account_actions_account_id_idx", + "admin_account_actions_target_account_id_idx", + "admin_account_actions_type_idx", + } { + if _, err := tx. + NewDropIndex(). + Index(idxName). + IfExists(). + Exec(ctx); err != nil { + return err + } + } + + return nil + }) + } + + down := func(ctx context.Context, db *bun.DB) error { + return db.RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error { + return nil + }) + } + + if err := Migrations.Register(up, down); err != nil { + panic(err) + } +} diff --git a/internal/gtsmodel/admin.go b/internal/gtsmodel/admin.go deleted file mode 100644 index f1f30db2d..000000000 --- a/internal/gtsmodel/admin.go +++ /dev/null @@ -1,70 +0,0 @@ -// GoToSocial -// Copyright (C) GoToSocial Authors admin@gotosocial.org -// SPDX-License-Identifier: AGPL-3.0-or-later -// -// This program is free software: you can redistribute it and/or modify -// it under the terms of the GNU Affero General Public License as published by -// the Free Software Foundation, either version 3 of the License, or -// (at your option) any later version. -// -// This program is distributed in the hope that it will be useful, -// but WITHOUT ANY WARRANTY; without even the implied warranty of -// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -// GNU Affero General Public License for more details. -// -// You should have received a copy of the GNU Affero General Public License -// along with this program. If not, see . - -package gtsmodel - -import ( - "net" - "time" -) - -// AdminAccountAction models an action taken by an instance administrator on an account. -type AdminAccountAction struct { - ID string `bun:"type:CHAR(26),pk,nullzero,notnull,unique"` // id of this item in the database - CreatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item created - UpdatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item last updated - AccountID string `bun:"type:CHAR(26),notnull,nullzero"` // Who performed this admin action. - Account *Account `bun:"rel:has-one"` // Account corresponding to accountID - TargetAccountID string `bun:"type:CHAR(26),notnull,nullzero"` // Who is the target of this action - TargetAccount *Account `bun:"rel:has-one"` // Account corresponding to targetAccountID - Text string `bun:""` // text explaining why this action was taken - Type AdminActionType `bun:",nullzero,notnull"` // type of action that was taken - SendEmail bool `bun:""` // should an email be sent to the account owner to explain what happened - ReportID string `bun:"type:CHAR(26),nullzero"` // id of a report connected to this action, if it exists -} - -// AdminActionType describes a type of action taken on an entity by an admin -type AdminActionType string - -const ( - // AdminActionDisable -- the account or application etc has been disabled but not deleted. - AdminActionDisable AdminActionType = "disable" - // AdminActionSilence -- the account or application etc has been silenced. - AdminActionSilence AdminActionType = "silence" - // AdminActionSuspend -- the account or application etc has been deleted. - AdminActionSuspend AdminActionType = "suspend" -) - -// NewSignup models parameters for the creation -// of a new user + account on this instance. -// -// Aside from username, email, and password, it is -// fine to use zero values on fields of this struct. -type NewSignup struct { - Username string // Username of the new account. - Email string // Email address of the user. - Password string // Plaintext (not yet hashed) password for the user. - - Reason string // Reason given by the user when submitting a sign up request (optional). - PreApproved bool // Mark the new user/account as preapproved (optional) - SignUpIP net.IP // IP address from which the sign up request occurred (optional). - Locale string // Locale code for the new account/user (optional). - AppID string // ID of the application used to create this account (optional). - EmailVerified bool // Mark submitted email address as already verified (optional). - ExternalID string // ID of this user in external OIDC system (optional). - Admin bool // Mark new user as an admin user (optional). -} diff --git a/internal/gtsmodel/adminaction.go b/internal/gtsmodel/adminaction.go new file mode 100644 index 000000000..c6c598b32 --- /dev/null +++ b/internal/gtsmodel/adminaction.go @@ -0,0 +1,145 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package gtsmodel + +import ( + "path" + "time" +) + +// AdminActionCategory describes the category +// of entity that this admin action targets. +type AdminActionCategory uint8 + +// Only ever add new action categories to the *END* of the list +// below, DO NOT insert them before/between other entries! + +const ( + AdminActionCategoryUnknown AdminActionCategory = iota + AdminActionCategoryAccount + AdminActionCategoryDomain +) + +func (c AdminActionCategory) String() string { + switch c { + case AdminActionCategoryAccount: + return "account" + case AdminActionCategoryDomain: + return "domain" + default: + return "unknown" + } +} + +func NewAdminActionCategory(in string) AdminActionCategory { + switch in { + case "account": + return AdminActionCategoryAccount + case "domain": + return AdminActionCategoryDomain + default: + return AdminActionCategoryUnknown + } +} + +// AdminActionType describes a type of +// action taken on an entity by an admin. +type AdminActionType uint8 + +// Only ever add new action types to the *END* of the list +// below, DO NOT insert them before/between other entries! + +const ( + AdminActionUnknown AdminActionType = iota + AdminActionDisable + AdminActionReenable + AdminActionSilence + AdminActionUnsilence + AdminActionSuspend + AdminActionUnsuspend +) + +func (t AdminActionType) String() string { + switch t { + case AdminActionDisable: + return "disable" + case AdminActionReenable: + return "reenable" + case AdminActionSilence: + return "silence" + case AdminActionUnsilence: + return "unsilence" + case AdminActionSuspend: + return "suspend" + case AdminActionUnsuspend: + return "unsuspend" + default: + return "unknown" + } +} + +func NewAdminActionType(in string) AdminActionType { + switch in { + case "disable": + return AdminActionDisable + case "reenable": + return AdminActionReenable + case "silence": + return AdminActionSilence + case "unsilence": + return AdminActionUnsilence + case "suspend": + return AdminActionSuspend + case "unsuspend": + return AdminActionUnsuspend + default: + return AdminActionUnknown + } +} + +// AdminAction models an action taken by an instance administrator towards an account, domain, etc. +type AdminAction struct { + ID string `bun:"type:CHAR(26),pk,nullzero,notnull,unique"` // ID of this item in the database. + CreatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // Creation time of this item. + UpdatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // Last updated time of this item. + CompletedAt time.Time `bun:"type:timestamptz,nullzero"` // Completion time of this item. + TargetCategory AdminActionCategory `bun:",nullzero,notnull"` // Category of the entity targeted by this action. + TargetID string `bun:",nullzero,notnull"` // Identifier of the target. May be a ULID (in case of accounts), or a domain name (in case of domains). + Target interface{} `bun:"-"` // Target of the action. Might be a domain string, might be an account. + Type AdminActionType `bun:",nullzero,notnull"` // Type of action that was taken. + AccountID string `bun:"type:CHAR(26),notnull,nullzero"` // Who performed this admin action. + Account *Account `bun:"rel:has-one"` // Account corresponding to accountID + Text string `bun:",nullzero"` // Free text field for explaining why this action was taken, or adding a note about this action. + SendEmail *bool `bun:",nullzero,notnull,default:false"` // Send an email to the target account's user to explain what happened (local accounts only). + ReportIDs []string `bun:"reports,array"` // IDs of any reports cited when creating this action. + Reports []*Report `bun:"-"` // Reports corresponding to ReportIDs. + Errors []string `bun:",array"` // String value of any error(s) encountered while processing. May be helpful for admins to debug. +} + +// Key returns a key for the AdminAction which is +// unique only on its TargetCategory and TargetID +// fields. This key can be used to check if this +// AdminAction overlaps with another action performed +// on the same target, regardless of the Type of +// either this or the other action. +func (a *AdminAction) Key() string { + return path.Join( + a.TargetCategory.String(), + a.TargetID, + ) +} diff --git a/internal/gtsmodel/user.go b/internal/gtsmodel/user.go index 16c4d4ee2..7d3da555c 100644 --- a/internal/gtsmodel/user.go +++ b/internal/gtsmodel/user.go @@ -57,3 +57,23 @@ type User struct { ResetPasswordSentAt time.Time `bun:"type:timestamptz,nullzero"` // When did we email the user their reset-password email? ExternalID string `bun:",nullzero,unique"` // If the login for the user is managed externally (e.g OIDC), we need to keep a stable reference to the external object (e.g OIDC sub claim) } + +// NewSignup models parameters for the creation +// of a new user + account on this instance. +// +// Aside from username, email, and password, it is +// fine to use zero values on fields of this struct. +type NewSignup struct { + Username string // Username of the new account. + Email string // Email address of the user. + Password string // Plaintext (not yet hashed) password for the user. + + Reason string // Reason given by the user when submitting a sign up request (optional). + PreApproved bool // Mark the new user/account as preapproved (optional) + SignUpIP net.IP // IP address from which the sign up request occurred (optional). + Locale string // Locale code for the new account/user (optional). + AppID string // ID of the application used to create this account (optional). + EmailVerified bool // Mark submitted email address as already verified (optional). + ExternalID string // ID of this user in external OIDC system (optional). + Admin bool // Mark new user as an admin user (optional). +} diff --git a/internal/processing/admin/account.go b/internal/processing/admin/account.go index 93e324441..155d8c0b4 100644 --- a/internal/processing/admin/account.go +++ b/internal/processing/admin/account.go @@ -29,36 +29,74 @@ import ( "github.com/superseriousbusiness/gotosocial/internal/messages" ) -func (p *Processor) AccountAction(ctx context.Context, account *gtsmodel.Account, form *apimodel.AdminAccountActionRequest) gtserror.WithCode { - targetAccount, err := p.state.DB.GetAccountByID(ctx, form.TargetAccountID) +func (p *Processor) AccountAction( + ctx context.Context, + adminAcct *gtsmodel.Account, + request *apimodel.AdminActionRequest, +) (string, gtserror.WithCode) { + targetAcct, err := p.state.DB.GetAccountByID(ctx, request.TargetID) if err != nil { - return gtserror.NewErrorInternalError(err) + err := gtserror.Newf("db error getting target account: %w", err) + return "", gtserror.NewErrorInternalError(err) } - adminAction := >smodel.AdminAccountAction{ - ID: id.NewULID(), - AccountID: account.ID, - TargetAccountID: targetAccount.ID, - Text: form.Text, - } + switch gtsmodel.NewAdminActionType(request.Type) { + case gtsmodel.AdminActionSuspend: + return p.accountActionSuspend(ctx, adminAcct, targetAcct, request.Text) - switch form.Type { - case string(gtsmodel.AdminActionSuspend): - adminAction.Type = gtsmodel.AdminActionSuspend - // pass the account delete through the client api channel for processing - p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{ - APObjectType: ap.ActorPerson, - APActivityType: ap.ActivityDelete, - OriginAccount: account, - TargetAccount: targetAccount, - }) default: - return gtserror.NewErrorBadRequest(fmt.Errorf("admin action type %s is not supported for this endpoint", form.Type)) - } + // TODO: add more types to this slice when adding + // more types to the switch statement above. + supportedTypes := []string{ + gtsmodel.AdminActionSuspend.String(), + } - if err := p.state.DB.Put(ctx, adminAction); err != nil { - return gtserror.NewErrorInternalError(err) - } + err := fmt.Errorf( + "admin action type %s is not supported for this endpoint, "+ + "currently supported types are: %q", + request.Type, supportedTypes) - return nil + return "", gtserror.NewErrorBadRequest(err, err.Error()) + } +} + +func (p *Processor) accountActionSuspend( + ctx context.Context, + adminAcct *gtsmodel.Account, + targetAcct *gtsmodel.Account, + text string, +) (string, gtserror.WithCode) { + actionID := id.NewULID() + + errWithCode := p.actions.Run( + ctx, + >smodel.AdminAction{ + ID: actionID, + TargetCategory: gtsmodel.AdminActionCategoryAccount, + TargetID: targetAcct.ID, + Target: targetAcct, + Type: gtsmodel.AdminActionSuspend, + AccountID: adminAcct.ID, + Text: text, + }, + func(ctx context.Context) gtserror.MultiError { + if err := p.state.Workers.ProcessFromClientAPI( + ctx, + messages.FromClientAPI{ + APObjectType: ap.ActorPerson, + APActivityType: ap.ActivityDelete, + OriginAccount: adminAcct, + TargetAccount: targetAcct, + }, + ); err != nil { + errs := gtserror.NewMultiError(1) + errs.Append(err) + return errs + } + + return nil + }, + ) + + return actionID, errWithCode } diff --git a/internal/processing/admin/account_test.go b/internal/processing/admin/account_test.go new file mode 100644 index 000000000..59b8afc77 --- /dev/null +++ b/internal/processing/admin/account_test.go @@ -0,0 +1,103 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package admin_test + +import ( + "context" + "testing" + + "github.com/stretchr/testify/suite" + apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" + "github.com/superseriousbusiness/gotosocial/testrig" +) + +type AccountTestSuite struct { + AdminStandardTestSuite +} + +func (suite *AccountTestSuite) TestAccountActionSuspend() { + var ( + ctx = context.Background() + adminAcct = suite.testAccounts["admin_account"] + request = &apimodel.AdminActionRequest{ + Category: gtsmodel.AdminActionCategoryAccount.String(), + Type: gtsmodel.AdminActionSuspend.String(), + Text: "stinky", + TargetID: suite.testAccounts["local_account_1"].ID, + } + ) + + actionID, errWithCode := suite.adminProcessor.AccountAction( + ctx, + adminAcct, + request, + ) + suite.NoError(errWithCode) + suite.NotEmpty(actionID) + + // Wait for action to finish. + if !testrig.WaitFor(func() bool { + return suite.adminProcessor.Actions().TotalRunning() == 0 + }) { + suite.FailNow("timed out waiting for admin action(s) to finish") + } + + // Ensure action marked as + // completed in the database. + adminAction, err := suite.db.GetAdminAction(ctx, actionID) + if err != nil { + suite.FailNow(err.Error()) + } + + suite.NotZero(adminAction.CompletedAt) + suite.Empty(adminAction.Errors) + + // Ensure target account suspended. + targetAcct, err := suite.db.GetAccountByID(ctx, request.TargetID) + if err != nil { + suite.FailNow(err.Error()) + } + + suite.NotZero(targetAcct.SuspendedAt) +} + +func (suite *AccountTestSuite) TestAccountActionUnsupported() { + var ( + ctx = context.Background() + adminAcct = suite.testAccounts["admin_account"] + request = &apimodel.AdminActionRequest{ + Category: gtsmodel.AdminActionCategoryAccount.String(), + Type: "pee pee poo poo", + Text: "stinky", + TargetID: suite.testAccounts["local_account_1"].ID, + } + ) + + actionID, errWithCode := suite.adminProcessor.AccountAction( + ctx, + adminAcct, + request, + ) + suite.EqualError(errWithCode, "admin action type pee pee poo poo is not supported for this endpoint, currently supported types are: [\"suspend\"]") + suite.Empty(actionID) +} + +func TestAccountTestSuite(t *testing.T) { + suite.Run(t, new(AccountTestSuite)) +} diff --git a/internal/processing/admin/actions.go b/internal/processing/admin/actions.go new file mode 100644 index 000000000..b85f05065 --- /dev/null +++ b/internal/processing/admin/actions.go @@ -0,0 +1,159 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package admin + +import ( + "context" + "sync" + "time" + + "github.com/superseriousbusiness/gotosocial/internal/gtserror" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" + "github.com/superseriousbusiness/gotosocial/internal/log" + "github.com/superseriousbusiness/gotosocial/internal/state" + "golang.org/x/exp/slices" +) + +func errActionConflict(action *gtsmodel.AdminAction) gtserror.WithCode { + err := gtserror.NewfAt( + 4, // Include caller's function name. + "an action (%s) is currently running (duration %s) which conflicts with the attempted action", + action.Key(), time.Since(action.CreatedAt), + ) + + const help = "wait until this action is complete and try again" + return gtserror.NewErrorConflict(err, err.Error(), help) +} + +type Actions struct { + r map[string]*gtsmodel.AdminAction + state *state.State + + // Not embedded struct, + // to shield from access + // by outside packages. + m sync.Mutex +} + +// Run runs the given admin action by executing the supplied function. +// +// Run handles locking, action insertion and updating, so you don't have to! +// +// If an action is already running which overlaps/conflicts with the +// given action, an ErrorWithCode 409 will be returned. +// +// If execution of the provided function returns errors, the errors +// will be updated on the provided admin action in the database. +func (a *Actions) Run( + ctx context.Context, + action *gtsmodel.AdminAction, + f func(context.Context) gtserror.MultiError, +) gtserror.WithCode { + actionKey := action.Key() + + // LOCK THE MAP HERE, since we're + // going to do some operations on it. + a.m.Lock() + + // Bail if an action with + // this key is already running. + running, ok := a.r[actionKey] + if ok { + a.m.Unlock() + return errActionConflict(running) + } + + // Action with this key not + // yet running, create it. + if err := a.state.DB.PutAdminAction(ctx, action); err != nil { + err = gtserror.Newf("db error putting admin action %s: %w", actionKey, err) + + // Don't store in map + // if there's an error. + a.m.Unlock() + return gtserror.NewErrorInternalError(err) + } + + // Action was inserted, + // store in map. + a.r[actionKey] = action + + // UNLOCK THE MAP HERE, since + // we're done modifying it for now. + a.m.Unlock() + + // Do the rest of the work asynchronously. + a.state.Workers.ClientAPI.Enqueue(func(ctx context.Context) { + // Run the thing and collect errors. + if errs := f(ctx); errs != nil { + action.Errors = make([]string, 0, len(errs)) + for _, err := range errs { + action.Errors = append(action.Errors, err.Error()) + } + } + + // Action is no longer running: + // remove from running map. + a.m.Lock() + delete(a.r, actionKey) + a.m.Unlock() + + // Mark as completed in the db, + // storing errors for later review. + action.CompletedAt = time.Now() + if err := a.state.DB.UpdateAdminAction(ctx, action, "completed_at", "errors"); err != nil { + log.Errorf(ctx, "db error marking action %s as completed: %q", actionKey, err) + } + }) + + return nil +} + +// GetRunning sounds like a threat, but it actually just +// returns all of the currently running actions held by +// the Actions struct, ordered by ID descending. +func (a *Actions) GetRunning() []*gtsmodel.AdminAction { + a.m.Lock() + defer a.m.Unlock() + + // Assemble all currently running actions. + running := make([]*gtsmodel.AdminAction, 0, len(a.r)) + for _, action := range a.r { + running = append(running, action) + } + + // Order by ID descending (creation date). + slices.SortFunc( + running, + func(a *gtsmodel.AdminAction, b *gtsmodel.AdminAction) bool { + return a.ID > b.ID + }, + ) + + return running +} + +// TotalRunning is a sequel to the classic +// 1972 environmental-themed science fiction +// film Silent Running, starring Bruce Dern. +func (a *Actions) TotalRunning() int { + a.m.Lock() + defer a.m.Unlock() + + return len(a.r) +} diff --git a/internal/processing/admin/actions_test.go b/internal/processing/admin/actions_test.go new file mode 100644 index 000000000..9d12ae84d --- /dev/null +++ b/internal/processing/admin/actions_test.go @@ -0,0 +1,162 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package admin_test + +import ( + "context" + "errors" + "net/http" + "testing" + "time" + + "github.com/stretchr/testify/suite" + "github.com/superseriousbusiness/gotosocial/internal/db" + "github.com/superseriousbusiness/gotosocial/internal/gtserror" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" + "github.com/superseriousbusiness/gotosocial/internal/id" + "github.com/superseriousbusiness/gotosocial/testrig" +) + +type ActionsTestSuite struct { + AdminStandardTestSuite +} + +func (suite *ActionsTestSuite) TestActionOverlap() { + ctx := context.Background() + + // Suspend account. + action1 := >smodel.AdminAction{ + ID: id.NewULID(), + TargetCategory: gtsmodel.AdminActionCategoryAccount, + TargetID: "01H90S1CXQ97J9625C5YBXZWGT", + Type: gtsmodel.AdminActionSuspend, + AccountID: "01H90S1ZZXP4N74H4A9RVW1MRP", + } + key1 := action1.Key() + suite.Equal("account/01H90S1CXQ97J9625C5YBXZWGT", key1) + + // Unsuspend account. + action2 := >smodel.AdminAction{ + ID: id.NewULID(), + TargetCategory: gtsmodel.AdminActionCategoryAccount, + TargetID: "01H90S1CXQ97J9625C5YBXZWGT", + Type: gtsmodel.AdminActionUnsuspend, + AccountID: "01H90S1ZZXP4N74H4A9RVW1MRP", + } + key2 := action2.Key() + suite.Equal("account/01H90S1CXQ97J9625C5YBXZWGT", key2) + + errWithCode := suite.adminProcessor.Actions().Run( + ctx, + action1, + func(ctx context.Context) gtserror.MultiError { + // Noop, just sleep (mood). + time.Sleep(3 * time.Second) + return nil + }, + ) + suite.NoError(errWithCode) + + // While first action is sleeping, try to + // process another with the same key. + errWithCode = suite.adminProcessor.Actions().Run( + ctx, + action2, + func(ctx context.Context) gtserror.MultiError { + return nil + }, + ) + if errWithCode == nil { + suite.FailNow("expected error with code, but error was nil") + } + + // Code should be 409. + suite.Equal(http.StatusConflict, errWithCode.Code()) + + // Wait for action to finish. + if !testrig.WaitFor(func() bool { + return suite.adminProcessor.Actions().TotalRunning() == 0 + }) { + suite.FailNow("timed out waiting for admin action(s) to finish") + } + + // Try again. + errWithCode = suite.adminProcessor.Actions().Run( + ctx, + action2, + func(ctx context.Context) gtserror.MultiError { + return nil + }, + ) + suite.NoError(errWithCode) + + // Wait for action to finish. + if !testrig.WaitFor(func() bool { + return suite.adminProcessor.Actions().TotalRunning() == 0 + }) { + suite.FailNow("timed out waiting for admin action(s) to finish") + } +} + +func (suite *ActionsTestSuite) TestActionWithErrors() { + ctx := context.Background() + + // Suspend a domain. + action := >smodel.AdminAction{ + ID: id.NewULID(), + TargetCategory: gtsmodel.AdminActionCategoryDomain, + TargetID: "example.org", + Type: gtsmodel.AdminActionSuspend, + AccountID: "01H90S1ZZXP4N74H4A9RVW1MRP", + } + + errWithCode := suite.adminProcessor.Actions().Run( + ctx, + action, + func(ctx context.Context) gtserror.MultiError { + // Noop, just return some errs. + return gtserror.MultiError{ + db.ErrNoEntries, + errors.New("fucky wucky"), + } + }, + ) + suite.NoError(errWithCode) + + // Wait for action to finish. + if !testrig.WaitFor(func() bool { + return suite.adminProcessor.Actions().TotalRunning() == 0 + }) { + suite.FailNow("timed out waiting for admin action(s) to finish") + } + + // Get action from the db. + dbAction, err := suite.db.GetAdminAction(ctx, action.ID) + if err != nil { + suite.FailNow(err.Error()) + } + + suite.EqualValues([]string{ + "sql: no rows in result set", + "fucky wucky", + }, dbAction.Errors) +} + +func TestActionsTestSuite(t *testing.T) { + suite.Run(t, new(ActionsTestSuite)) +} diff --git a/internal/processing/admin/admin.go b/internal/processing/admin/admin.go index 0fa24452b..7353c0da8 100644 --- a/internal/processing/admin/admin.go +++ b/internal/processing/admin/admin.go @@ -20,6 +20,7 @@ package admin import ( "github.com/superseriousbusiness/gotosocial/internal/cleaner" "github.com/superseriousbusiness/gotosocial/internal/email" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/media" "github.com/superseriousbusiness/gotosocial/internal/state" "github.com/superseriousbusiness/gotosocial/internal/transport" @@ -33,6 +34,14 @@ type Processor struct { mediaManager *media.Manager transportController transport.Controller emailSender email.Sender + + // admin Actions currently + // undergoing processing + actions *Actions +} + +func (p *Processor) Actions() *Actions { + return p.actions } // New returns a new admin processor. @@ -44,5 +53,10 @@ func New(state *state.State, tc typeutils.TypeConverter, mediaManager *media.Man mediaManager: mediaManager, transportController: transportController, emailSender: emailSender, + + actions: &Actions{ + r: make(map[string]*gtsmodel.AdminAction), + state: state, + }, } } diff --git a/internal/processing/admin/admin_test.go b/internal/processing/admin/admin_test.go new file mode 100644 index 000000000..c1c4d46c2 --- /dev/null +++ b/internal/processing/admin/admin_test.go @@ -0,0 +1,127 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package admin_test + +import ( + "github.com/stretchr/testify/suite" + "github.com/superseriousbusiness/gotosocial/internal/db" + "github.com/superseriousbusiness/gotosocial/internal/email" + "github.com/superseriousbusiness/gotosocial/internal/federation" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" + "github.com/superseriousbusiness/gotosocial/internal/media" + "github.com/superseriousbusiness/gotosocial/internal/messages" + "github.com/superseriousbusiness/gotosocial/internal/oauth" + "github.com/superseriousbusiness/gotosocial/internal/processing" + "github.com/superseriousbusiness/gotosocial/internal/processing/admin" + "github.com/superseriousbusiness/gotosocial/internal/state" + "github.com/superseriousbusiness/gotosocial/internal/storage" + "github.com/superseriousbusiness/gotosocial/internal/transport" + "github.com/superseriousbusiness/gotosocial/internal/typeutils" + "github.com/superseriousbusiness/gotosocial/internal/visibility" + "github.com/superseriousbusiness/gotosocial/testrig" +) + +type AdminStandardTestSuite struct { + // standard suite interfaces + suite.Suite + db db.DB + tc typeutils.TypeConverter + storage *storage.Driver + state state.State + mediaManager *media.Manager + oauthServer oauth.Server + fromClientAPIChan chan messages.FromClientAPI + transportController transport.Controller + federator federation.Federator + emailSender email.Sender + sentEmails map[string]string + processor *processing.Processor + + // standard suite models + testTokens map[string]*gtsmodel.Token + testClients map[string]*gtsmodel.Client + testApplications map[string]*gtsmodel.Application + testUsers map[string]*gtsmodel.User + testAccounts map[string]*gtsmodel.Account + testFollows map[string]*gtsmodel.Follow + testAttachments map[string]*gtsmodel.MediaAttachment + testStatuses map[string]*gtsmodel.Status + + // module being tested + adminProcessor *admin.Processor +} + +func (suite *AdminStandardTestSuite) SetupSuite() { + suite.testTokens = testrig.NewTestTokens() + suite.testClients = testrig.NewTestClients() + suite.testApplications = testrig.NewTestApplications() + suite.testUsers = testrig.NewTestUsers() + suite.testAccounts = testrig.NewTestAccounts() + suite.testFollows = testrig.NewTestFollows() + suite.testAttachments = testrig.NewTestAttachments() + suite.testStatuses = testrig.NewTestStatuses() +} + +func (suite *AdminStandardTestSuite) SetupTest() { + suite.state.Caches.Init() + testrig.StartWorkers(&suite.state) + + testrig.InitTestConfig() + testrig.InitTestLog() + + suite.db = testrig.NewTestDB(&suite.state) + suite.state.DB = suite.db + suite.tc = testrig.NewTestTypeConverter(suite.db) + + testrig.StartTimelines( + &suite.state, + visibility.NewFilter(&suite.state), + suite.tc, + ) + + suite.storage = testrig.NewInMemoryStorage() + suite.state.Storage = suite.storage + suite.mediaManager = testrig.NewTestMediaManager(&suite.state) + suite.oauthServer = testrig.NewTestOauthServer(suite.db) + + suite.transportController = testrig.NewTestTransportController(&suite.state, testrig.NewMockHTTPClient(nil, "../../../testrig/media")) + suite.federator = testrig.NewTestFederator(&suite.state, suite.transportController, suite.mediaManager) + suite.sentEmails = make(map[string]string) + suite.emailSender = testrig.NewEmailSender("../../../web/template/", suite.sentEmails) + + suite.processor = processing.NewProcessor( + suite.tc, + suite.federator, + suite.oauthServer, + suite.mediaManager, + &suite.state, + suite.emailSender, + ) + + suite.state.Workers.ProcessFromClientAPI = suite.processor.Workers().ProcessFromClientAPI + suite.adminProcessor = suite.processor.Admin() + + testrig.StandardDBSetup(suite.db, nil) + testrig.StandardStorageSetup(suite.storage, "../../../testrig/media") +} + +func (suite *AdminStandardTestSuite) TearDownTest() { + testrig.StandardDBTeardown(suite.db) + testrig.StandardStorageTeardown(suite.storage) + testrig.StopWorkers(&suite.state) +} diff --git a/internal/processing/admin/domainblock.go b/internal/processing/admin/domainblock.go index a85d78a56..1262bf6b0 100644 --- a/internal/processing/admin/domainblock.go +++ b/internal/processing/admin/domainblock.go @@ -44,21 +44,24 @@ import ( // and then processes side effects of that block (deleting accounts, media, etc). // // If a domain block already exists for the domain, side effects will be retried. +// +// Return values for this function are the (new) domain block, the ID of the admin +// action resulting from this call, and/or an error if something goes wrong. func (p *Processor) DomainBlockCreate( ctx context.Context, - account *gtsmodel.Account, + adminAcct *gtsmodel.Account, domain string, obfuscate bool, publicComment string, privateComment string, subscriptionID string, -) (*apimodel.DomainBlock, gtserror.WithCode) { +) (*apimodel.DomainBlock, string, gtserror.WithCode) { // Check if a block already exists for this domain. domainBlock, err := p.state.DB.GetDomainBlock(ctx, domain) if err != nil && !errors.Is(err, db.ErrNoEntries) { // Something went wrong in the DB. err = gtserror.Newf("db error getting domain block %s: %w", domain, err) - return nil, gtserror.NewErrorInternalError(err) + return nil, "", gtserror.NewErrorInternalError(err) } if domainBlock == nil { @@ -66,7 +69,7 @@ func (p *Processor) DomainBlockCreate( domainBlock = >smodel.DomainBlock{ ID: id.NewULID(), Domain: domain, - CreatedByAccountID: account.ID, + CreatedByAccountID: adminAcct.ID, PrivateComment: text.SanitizeToPlaintext(privateComment), PublicComment: text.SanitizeToPlaintext(publicComment), Obfuscate: &obfuscate, @@ -75,18 +78,100 @@ func (p *Processor) DomainBlockCreate( // Insert the new block into the database. if err := p.state.DB.CreateDomainBlock(ctx, domainBlock); err != nil { - err = gtserror.Newf("db error putting domain block %s: %s", domain, err) - return nil, gtserror.NewErrorInternalError(err) + err = gtserror.Newf("db error putting domain block %s: %w", domain, err) + return nil, "", gtserror.NewErrorInternalError(err) } } - // Process the side effects of the domain block - // asynchronously since it might take a while. - p.state.Workers.ClientAPI.Enqueue(func(ctx context.Context) { - p.domainBlockSideEffects(ctx, account, domainBlock) - }) + actionID := id.NewULID() - return p.apiDomainBlock(ctx, domainBlock) + // Process domain block side + // effects asynchronously. + if errWithCode := p.actions.Run( + ctx, + >smodel.AdminAction{ + ID: actionID, + TargetCategory: gtsmodel.AdminActionCategoryDomain, + TargetID: domain, + Type: gtsmodel.AdminActionSuspend, + AccountID: adminAcct.ID, + Text: domainBlock.PrivateComment, + }, + func(ctx context.Context) gtserror.MultiError { + return p.domainBlockSideEffects(ctx, domainBlock) + }, + ); errWithCode != nil { + return nil, actionID, errWithCode + } + + apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock) + if errWithCode != nil { + return nil, actionID, errWithCode + } + + return apiDomainBlock, actionID, nil +} + +// DomainBlockDelete removes one domain block with the given ID, +// and processes side effects of removing the block asynchronously. +// +// Return values for this function are the deleted domain block, the ID of the admin +// action resulting from this call, and/or an error if something goes wrong. +func (p *Processor) DomainBlockDelete( + ctx context.Context, + adminAcct *gtsmodel.Account, + domainBlockID string, +) (*apimodel.DomainBlock, string, gtserror.WithCode) { + domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, domainBlockID) + if err != nil { + if !errors.Is(err, db.ErrNoEntries) { + // Real error. + err = gtserror.Newf("db error getting domain block: %w", err) + return nil, "", gtserror.NewErrorInternalError(err) + } + + // There are just no entries for this ID. + err = fmt.Errorf("no domain block entry exists with ID %s", domainBlockID) + return nil, "", gtserror.NewErrorNotFound(err, err.Error()) + } + + // Prepare the domain block to return, *before* the deletion goes through. + apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock) + if errWithCode != nil { + return nil, "", errWithCode + } + + // Copy value of the domain block. + domainBlockC := new(gtsmodel.DomainBlock) + *domainBlockC = *domainBlock + + // Delete the original domain block. + if err := p.state.DB.DeleteDomainBlock(ctx, domainBlock.Domain); err != nil { + err = gtserror.Newf("db error deleting domain block: %w", err) + return nil, "", gtserror.NewErrorInternalError(err) + } + + actionID := id.NewULID() + + // Process domain unblock side + // effects asynchronously. + if errWithCode := p.actions.Run( + ctx, + >smodel.AdminAction{ + ID: actionID, + TargetCategory: gtsmodel.AdminActionCategoryDomain, + TargetID: domainBlockC.Domain, + Type: gtsmodel.AdminActionUnsuspend, + AccountID: adminAcct.ID, + }, + func(ctx context.Context) gtserror.MultiError { + return p.domainUnblockSideEffects(ctx, domainBlock) + }, + ); errWithCode != nil { + return nil, actionID, errWithCode + } + + return apiDomainBlock, actionID, nil } // DomainBlocksImport handles the import of multiple domain blocks, @@ -153,7 +238,7 @@ func (p *Processor) DomainBlocksImport( errWithCode gtserror.WithCode ) - domainBlock, errWithCode = p.DomainBlockCreate( + domainBlock, _, errWithCode = p.DomainBlockCreate( ctx, account, domain, @@ -227,131 +312,6 @@ func (p *Processor) DomainBlockGet(ctx context.Context, id string, export bool) return p.apiDomainBlock(ctx, domainBlock) } -// DomainBlockDelete removes one domain block with the given ID, -// and processes side effects of removing the block asynchronously. -func (p *Processor) DomainBlockDelete(ctx context.Context, account *gtsmodel.Account, id string) (*apimodel.DomainBlock, gtserror.WithCode) { - domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, id) - if err != nil { - if !errors.Is(err, db.ErrNoEntries) { - // Real error. - err = gtserror.Newf("db error getting domain block: %w", err) - return nil, gtserror.NewErrorInternalError(err) - } - - // There are just no entries for this ID. - err = fmt.Errorf("no domain block entry exists with ID %s", id) - return nil, gtserror.NewErrorNotFound(err, err.Error()) - } - - // Prepare the domain block to return, *before* the deletion goes through. - apiDomainBlock, errWithCode := p.apiDomainBlock(ctx, domainBlock) - if errWithCode != nil { - return nil, errWithCode - } - - // Copy value of the domain block. - domainBlockC := new(gtsmodel.DomainBlock) - *domainBlockC = *domainBlock - - // Delete the original domain block. - if err := p.state.DB.DeleteDomainBlock(ctx, domainBlock.Domain); err != nil { - err = gtserror.Newf("db error deleting domain block: %w", err) - return nil, gtserror.NewErrorInternalError(err) - } - - // Process the side effects of the domain unblock - // asynchronously since it might take a while. - p.state.Workers.ClientAPI.Enqueue(func(ctx context.Context) { - p.domainUnblockSideEffects(ctx, domainBlockC) // Use the copy. - }) - - return apiDomainBlock, nil -} - -// stubbifyInstance renders the given instance as a stub, -// removing most information from it and marking it as -// suspended. -// -// For caller's convenience, this function returns the db -// names of all columns that are updated by it. -func stubbifyInstance(instance *gtsmodel.Instance, domainBlockID string) []string { - instance.Title = "" - instance.SuspendedAt = time.Now() - instance.DomainBlockID = domainBlockID - instance.ShortDescription = "" - instance.Description = "" - instance.Terms = "" - instance.ContactEmail = "" - instance.ContactAccountUsername = "" - instance.ContactAccountID = "" - instance.Version = "" - - return []string{ - "title", - "suspended_at", - "domain_block_id", - "short_description", - "description", - "terms", - "contact_email", - "contact_account_username", - "contact_account_id", - "version", - } -} - -// apiDomainBlock is a cheeky shortcut function for returning the API -// version of the given domainBlock, or an appropriate error if -// something goes wrong. -func (p *Processor) apiDomainBlock(ctx context.Context, domainBlock *gtsmodel.DomainBlock) (*apimodel.DomainBlock, gtserror.WithCode) { - apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, domainBlock, false) - if err != nil { - err = gtserror.Newf("error converting domain block for %s to api model : %w", domainBlock.Domain, err) - return nil, gtserror.NewErrorInternalError(err) - } - - return apiDomainBlock, nil -} - -// rangeAccounts iterates through all accounts originating from the -// given domain, and calls the provided range function on each account. -// If an error is returned from the range function, the loop will stop -// and return the error. -func (p *Processor) rangeAccounts( - ctx context.Context, - domain string, - rangeF func(*gtsmodel.Account) error, -) error { - var ( - limit = 50 // Limit selection to avoid spiking mem/cpu. - maxID string // Start with empty string to select from top. - ) - - for { - // Get (next) page of accounts. - accounts, err := p.state.DB.GetInstanceAccounts(ctx, domain, maxID, limit) - if err != nil && !errors.Is(err, db.ErrNoEntries) { - // Real db error. - return gtserror.Newf("db error getting instance accounts: %w", err) - } - - if len(accounts) == 0 { - // No accounts left, we're done. - return nil - } - - // Set next max ID for paging down. - maxID = accounts[len(accounts)-1].ID - - // Call provided range function. - for _, account := range accounts { - if err := rangeF(account); err != nil { - return err - } - } - } -} - // domainBlockSideEffects processes the side effects of a domain block: // // 1. Strip most info away from the instance entry for the domain. @@ -359,7 +319,10 @@ func (p *Processor) rangeAccounts( // // It should be called asynchronously, since it can take a while when // there are many accounts present on the given domain. -func (p *Processor) domainBlockSideEffects(ctx context.Context, account *gtsmodel.Account, block *gtsmodel.DomainBlock) { +func (p *Processor) domainBlockSideEffects( + ctx context.Context, + block *gtsmodel.DomainBlock, +) gtserror.MultiError { l := log. WithContext(ctx). WithFields(kv.Fields{ @@ -367,43 +330,46 @@ func (p *Processor) domainBlockSideEffects(ctx context.Context, account *gtsmode }...) l.Debug("processing domain block side effects") + var errs gtserror.MultiError + // If we have an instance entry for this domain, // update it with the new block ID and clear all fields instance, err := p.state.DB.GetInstance(ctx, block.Domain) if err != nil && !errors.Is(err, db.ErrNoEntries) { - l.Errorf("db error getting instance %s: %q", block.Domain, err) + errs.Appendf("db error getting instance %s: %w", block.Domain, err) + return errs } if instance != nil { // We had an entry for this domain. columns := stubbifyInstance(instance, block.ID) if err := p.state.DB.UpdateInstance(ctx, instance, columns...); err != nil { - l.Errorf("db error updating instance: %s", err) - } else { - l.Debug("instance entry updated") + errs.Appendf("db error updating instance: %w", err) + return errs } + l.Debug("instance entry updated") } - // For each account that belongs to this domain, create - // an account delete message to process via the client API - // worker pool, to remove that account's posts, media, etc. - msgs := []messages.FromClientAPI{} - if err := p.rangeAccounts(ctx, block.Domain, func(account *gtsmodel.Account) error { - msgs = append(msgs, messages.FromClientAPI{ + // For each account that belongs to this domain, + // process an account delete message to remove + // that account's posts, media, etc. + if err := p.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) { + cMsg := messages.FromClientAPI{ APObjectType: ap.ActorPerson, APActivityType: ap.ActivityDelete, GTSModel: block, OriginAccount: account, TargetAccount: account, - }) + } - return nil + if err := p.state.Workers.ProcessFromClientAPI(ctx, cMsg); err != nil { + errs.Append(err) + } }); err != nil { - l.Errorf("error while ranging through accounts: %q", err) + errs.Appendf("db error ranging through accounts: %w", err) } - // Batch process all accreted messages. - p.state.Workers.EnqueueClientAPI(ctx, msgs...) + return errs } // domainUnblockSideEffects processes the side effects of undoing a @@ -415,7 +381,10 @@ func (p *Processor) domainBlockSideEffects(ctx context.Context, account *gtsmode // // It should be called asynchronously, since it can take a while when // there are many accounts present on the given domain. -func (p *Processor) domainUnblockSideEffects(ctx context.Context, block *gtsmodel.DomainBlock) { +func (p *Processor) domainUnblockSideEffects( + ctx context.Context, + block *gtsmodel.DomainBlock, +) gtserror.MultiError { l := log. WithContext(ctx). WithFields(kv.Fields{ @@ -423,10 +392,12 @@ func (p *Processor) domainUnblockSideEffects(ctx context.Context, block *gtsmode }...) l.Debug("processing domain unblock side effects") + var errs gtserror.MultiError + // Update instance entry for this domain, if we have it. instance, err := p.state.DB.GetInstance(ctx, block.Domain) if err != nil && !errors.Is(err, db.ErrNoEntries) { - l.Errorf("db error getting instance %s: %q", block.Domain, err) + errs.Appendf("db error getting instance %s: %w", block.Domain, err) } if instance != nil { @@ -440,23 +411,23 @@ func (p *Processor) domainUnblockSideEffects(ctx context.Context, block *gtsmode "suspended_at", "domain_block_id", ); err != nil { - l.Errorf("db error updating instance: %s", err) - } else { - l.Debug("instance entry updated") + errs.Appendf("db error updating instance: %w", err) + return errs } + l.Debug("instance entry updated") } // Unsuspend all accounts whose suspension origin was this domain block. - if err := p.rangeAccounts(ctx, block.Domain, func(account *gtsmodel.Account) error { + if err := p.rangeDomainAccounts(ctx, block.Domain, func(account *gtsmodel.Account) { if account.SuspensionOrigin == "" || account.SuspendedAt.IsZero() { // Account wasn't suspended, nothing to do. - return nil + return } if account.SuspensionOrigin != block.ID { // Account was suspended, but not by // this domain block, leave it alone. - return nil + return } // Account was suspended by this domain @@ -470,11 +441,11 @@ func (p *Processor) domainUnblockSideEffects(ctx context.Context, block *gtsmode "suspended_at", "suspension_origin", ); err != nil { - return gtserror.Newf("db error updating account %s: %w", account.Username, err) + errs.Appendf("db error updating account %s: %w", account.Username, err) } - - return nil }); err != nil { - l.Errorf("error while ranging through accounts: %q", err) + errs.Appendf("db error ranging through accounts: %w", err) } + + return errs } diff --git a/internal/processing/admin/domainblock_test.go b/internal/processing/admin/domainblock_test.go new file mode 100644 index 000000000..9525ce7c3 --- /dev/null +++ b/internal/processing/admin/domainblock_test.go @@ -0,0 +1,76 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package admin_test + +import ( + "context" + "testing" + + "github.com/stretchr/testify/suite" + "github.com/superseriousbusiness/gotosocial/testrig" +) + +type DomainBlockTestSuite struct { + AdminStandardTestSuite +} + +func (suite *DomainBlockTestSuite) TestCreateDomainBlock() { + var ( + ctx = context.Background() + adminAcct = suite.testAccounts["admin_account"] + domain = "fossbros-anonymous.io" + obfuscate = false + publicComment = "" + privateComment = "" + subscriptionID = "" + ) + + apiBlock, actionID, errWithCode := suite.adminProcessor.DomainBlockCreate( + ctx, + adminAcct, + domain, + obfuscate, + publicComment, + privateComment, + subscriptionID, + ) + suite.NoError(errWithCode) + suite.NotNil(apiBlock) + suite.NotEmpty(actionID) + + // Wait for action to finish. + if !testrig.WaitFor(func() bool { + return suite.adminProcessor.Actions().TotalRunning() == 0 + }) { + suite.FailNow("timed out waiting for admin action(s) to finish") + } + + // Ensure action marked as + // completed in the database. + adminAction, err := suite.db.GetAdminAction(ctx, actionID) + if err != nil { + suite.FailNow(err.Error()) + } + + suite.NotZero(adminAction.CompletedAt) + suite.Empty(adminAction.Errors) +} + +func TestDomainBlockTestSuite(t *testing.T) { + suite.Run(t, new(DomainBlockTestSuite)) +} diff --git a/internal/processing/admin/util.go b/internal/processing/admin/util.go new file mode 100644 index 000000000..403602901 --- /dev/null +++ b/internal/processing/admin/util.go @@ -0,0 +1,116 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package admin + +import ( + "context" + "errors" + "time" + + apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" + "github.com/superseriousbusiness/gotosocial/internal/db" + "github.com/superseriousbusiness/gotosocial/internal/gtserror" + "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" +) + +// apiDomainBlock is a cheeky shortcut for returning +// the API version of the given domainBlock, or an +// appropriate error if something goes wrong. +func (p *Processor) apiDomainBlock( + ctx context.Context, + domainBlock *gtsmodel.DomainBlock, +) (*apimodel.DomainBlock, gtserror.WithCode) { + apiDomainBlock, err := p.tc.DomainBlockToAPIDomainBlock(ctx, domainBlock, false) + if err != nil { + err = gtserror.Newf("error converting domain block for %s to api model : %w", domainBlock.Domain, err) + return nil, gtserror.NewErrorInternalError(err) + } + + return apiDomainBlock, nil +} + +// stubbifyInstance renders the given instance as a stub, +// removing most information from it and marking it as +// suspended. +// +// For caller's convenience, this function returns the db +// names of all columns that are updated by it. +func stubbifyInstance(instance *gtsmodel.Instance, domainBlockID string) []string { + instance.Title = "" + instance.SuspendedAt = time.Now() + instance.DomainBlockID = domainBlockID + instance.ShortDescription = "" + instance.Description = "" + instance.Terms = "" + instance.ContactEmail = "" + instance.ContactAccountUsername = "" + instance.ContactAccountID = "" + instance.Version = "" + + return []string{ + "title", + "suspended_at", + "domain_block_id", + "short_description", + "description", + "terms", + "contact_email", + "contact_account_username", + "contact_account_id", + "version", + } +} + +// rangeDomainAccounts iterates through all accounts +// originating from the given domain, and calls the +// provided range function on each account. +// +// If an error is returned while selecting accounts, +// the loop will stop and return the error. +func (p *Processor) rangeDomainAccounts( + ctx context.Context, + domain string, + rangeF func(*gtsmodel.Account), +) error { + var ( + limit = 50 // Limit selection to avoid spiking mem/cpu. + maxID string // Start with empty string to select from top. + ) + + for { + // Get (next) page of accounts. + accounts, err := p.state.DB.GetInstanceAccounts(ctx, domain, maxID, limit) + if err != nil && !errors.Is(err, db.ErrNoEntries) { + // Real db error. + return gtserror.Newf("db error getting instance accounts: %w", err) + } + + if len(accounts) == 0 { + // No accounts left, we're done. + return nil + } + + // Set next max ID for paging down. + maxID = accounts[len(accounts)-1].ID + + // Call provided range function. + for _, account := range accounts { + rangeF(account) + } + } +} diff --git a/internal/workers/workers.go b/internal/workers/workers.go index 965cf1d2a..8f884d427 100644 --- a/internal/workers/workers.go +++ b/internal/workers/workers.go @@ -45,6 +45,19 @@ type Workers struct { EnqueueClientAPI func(context.Context, ...messages.FromClientAPI) EnqueueFediAPI func(context.Context, ...messages.FromFediAPI) + // Blocking processing functions for clientAPI / federator. + // These are pointers to Processor{}.Process___() msg functions. + // This prevents dependency cycling as Processor depends on Workers. + // + // Rather than queueing messages for asynchronous processing, these + // functions will process immediately and in a blocking manner, and + // will not use up a worker slot. + // + // As such, you should only call them in special cases where something + // synchronous needs to happen before you can do something else. + ProcessFromClientAPI func(context.Context, messages.FromClientAPI) error + ProcessFromFediAPI func(context.Context, messages.FromFediAPI) error + // Media manager worker pools. Media runners.WorkerPool diff --git a/testrig/util.go b/testrig/util.go index 483064e0a..f52ca6d5f 100644 --- a/testrig/util.go +++ b/testrig/util.go @@ -38,6 +38,8 @@ import ( func StartWorkers(state *state.State) { state.Workers.EnqueueClientAPI = func(context.Context, ...messages.FromClientAPI) {} state.Workers.EnqueueFediAPI = func(context.Context, ...messages.FromFediAPI) {} + state.Workers.ProcessFromClientAPI = func(context.Context, messages.FromClientAPI) error { return nil } + state.Workers.ProcessFromFediAPI = func(context.Context, messages.FromFediAPI) error { return nil } _ = state.Workers.Scheduler.Start(nil) _ = state.Workers.ClientAPI.Start(1, 10)