2023-01-28 03:45:11 +00:00
|
|
|
use crate::{utils::reqwest_shim::ResponseExt, Error, LocalInstance, APUB_JSON_CONTENT_TYPE};
|
2022-11-28 21:19:56 +00:00
|
|
|
use http::{header::HeaderName, HeaderValue, StatusCode};
|
2022-06-02 11:17:12 +00:00
|
|
|
use serde::de::DeserializeOwned;
|
2022-11-28 21:19:56 +00:00
|
|
|
use std::collections::BTreeMap;
|
|
|
|
use tracing::info;
|
2022-06-02 11:17:12 +00:00
|
|
|
use url::Url;
|
|
|
|
|
2023-01-28 03:45:11 +00:00
|
|
|
pub(crate) mod reqwest_shim;
|
|
|
|
|
2022-06-02 11:17:12 +00:00
|
|
|
pub async fn fetch_object_http<Kind: DeserializeOwned>(
|
|
|
|
url: &Url,
|
|
|
|
instance: &LocalInstance,
|
|
|
|
request_counter: &mut i32,
|
|
|
|
) -> Result<Kind, Error> {
|
|
|
|
// dont fetch local objects this way
|
|
|
|
debug_assert!(url.domain() != Some(&instance.hostname));
|
2022-11-28 21:19:56 +00:00
|
|
|
instance.verify_url_valid(url).await?;
|
2022-06-02 11:17:12 +00:00
|
|
|
info!("Fetching remote object {}", url.to_string());
|
|
|
|
|
|
|
|
*request_counter += 1;
|
2022-11-28 21:47:48 +00:00
|
|
|
if *request_counter > instance.settings.http_fetch_limit {
|
2022-06-02 11:17:12 +00:00
|
|
|
return Err(Error::RequestLimit);
|
|
|
|
}
|
|
|
|
|
|
|
|
let res = instance
|
|
|
|
.client
|
|
|
|
.get(url.as_str())
|
|
|
|
.header("Accept", APUB_JSON_CONTENT_TYPE)
|
|
|
|
.timeout(instance.settings.request_timeout)
|
|
|
|
.send()
|
|
|
|
.await
|
|
|
|
.map_err(Error::conv)?;
|
|
|
|
|
|
|
|
if res.status() == StatusCode::GONE {
|
|
|
|
return Err(Error::ObjectDeleted);
|
|
|
|
}
|
|
|
|
|
2023-01-28 03:45:11 +00:00
|
|
|
res.json_limited().await
|
2022-06-02 11:17:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Check that both urls have the same domain. If not, return UrlVerificationError.
|
|
|
|
pub fn verify_domains_match(a: &Url, b: &Url) -> Result<(), Error> {
|
|
|
|
if a.domain() != b.domain() {
|
|
|
|
return Err(Error::UrlVerificationError("Domains do not match"));
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check that both urls are identical. If not, return UrlVerificationError.
|
|
|
|
pub fn verify_urls_match(a: &Url, b: &Url) -> Result<(), Error> {
|
|
|
|
if a != b {
|
|
|
|
return Err(Error::UrlVerificationError("Urls do not match"));
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
2022-06-02 12:30:08 +00:00
|
|
|
|
2022-11-28 21:19:56 +00:00
|
|
|
/// Utility to converts either actix or axum headermap to a BTreeMap
|
|
|
|
pub fn header_to_map<'a, H>(headers: H) -> BTreeMap<String, String>
|
|
|
|
where
|
|
|
|
H: IntoIterator<Item = (&'a HeaderName, &'a HeaderValue)>,
|
|
|
|
{
|
|
|
|
let mut header_map = BTreeMap::new();
|
2022-06-02 12:30:08 +00:00
|
|
|
|
2022-11-28 21:19:56 +00:00
|
|
|
for (name, value) in headers {
|
|
|
|
if let Ok(value) = value.to_str() {
|
|
|
|
header_map.insert(name.to_string(), value.to_string());
|
|
|
|
}
|
2022-06-02 12:30:08 +00:00
|
|
|
}
|
|
|
|
|
2022-11-28 21:19:56 +00:00
|
|
|
header_map
|
2022-06-02 12:30:08 +00:00
|
|
|
}
|