···
err = i.ingestSpindleMember(e)
case tangled.SpindleNSID:
+
case tangled.KnotMemberNSID:
+
err = i.ingestKnotMember(e)
···
+
func (i *Ingester) ingestKnotMember(e *models.Event) error {
+
l := i.Logger.With("handler", "ingestKnotMember")
+
l = l.With("nsid", e.Commit.Collection)
+
switch e.Commit.Operation {
+
case models.CommitOperationCreate:
+
raw := json.RawMessage(e.Commit.Record)
+
record := tangled.KnotMember{}
+
err = json.Unmarshal(raw, &record)
+
l.Error("invalid record", "err", err)
+
// only knot owner can invite to knots
+
ok, err := i.Enforcer.IsKnotInviteAllowed(did, record.Domain)
+
return fmt.Errorf("failed to enforce permissions: %w", err)
+
memberId, err := i.IdResolver.ResolveIdent(context.Background(), record.Subject)
+
if memberId.Handle.IsInvalidHandle() {
+
err = i.Enforcer.AddKnotMember(record.Domain, memberId.DID.String())
+
return fmt.Errorf("failed to update ACLs: %w", err)
+
l.Info("added knot member")
+
case models.CommitOperationDelete:
+
// we don't store knot members in a table (like we do for spindle)
+
// and we can't remove this just yet. possibly fixed if we switch
+
// 1. a knot_members table like with spindle and store the rkey
+
// 2. use the knot host as the rkey
+
// TODO: implement member deletion
+
l.Info("skipping knot member delete", "did", did, "rkey", e.Commit.RKey)
+
func (i *Ingester) ingestKnot(e *models.Event) error {
+
l := i.Logger.With("handler", "ingestKnot")
+
l = l.With("nsid", e.Commit.Collection)
+
switch e.Commit.Operation {
+
case models.CommitOperationCreate:
+
raw := json.RawMessage(e.Commit.Record)
+
record := tangled.Knot{}
+
err = json.Unmarshal(raw, &record)
+
l.Error("invalid record", "err", err)
+
domain := e.Commit.RKey
+
ddb, ok := i.Db.Execer.(*db.DB)
+
return fmt.Errorf("failed to index profile record, invalid db cast")
+
err := db.AddKnot(ddb, domain, did)
+
l.Error("failed to add knot to db", "err", err, "domain", domain)
+
err = serververify.RunVerification(context.Background(), domain, did, i.Config.Core.Dev)
+
l.Error("failed to verify knot", "err", err, "domain", domain)
+
err = serververify.MarkKnotVerified(ddb, i.Enforcer, domain, did)
+
return fmt.Errorf("failed to mark verified: %w", err)
+
case models.CommitOperationDelete:
+
domain := e.Commit.RKey
+
ddb, ok := i.Db.Execer.(*db.DB)
+
return fmt.Errorf("failed to index knot record, invalid db cast")
+
// get record from db first
+
registrations, err := db.GetRegistrations(
+
db.FilterEq("domain", domain),
+
db.FilterEq("did", did),
+
return fmt.Errorf("failed to get registration: %w", err)
+
if len(registrations) != 1 {
+
return fmt.Errorf("got incorret number of registrations: %d, expected 1", len(registrations))
+
registration := registrations[0]
+
i.Enforcer.E.LoadPolicy()
+
db.FilterEq("did", did),
+
db.FilterEq("domain", domain),
+
if registration.Registered != nil {
+
err = i.Enforcer.RemoveKnot(domain)
+
err = i.Enforcer.E.SavePolicy()