mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-06 00:49:35 +00:00
dfdc473cef
* move finger to dereferencer * totally break GetRemoteAccount * start reworking finger func a bit * start reworking getRemoteAccount a bit * move mention parts to namestring * rework webfingerget * use util function to extract webfinger parts * use accountDomain * rework finger again, final form * just a real nasty commit, the worst * remove refresh from account * use new ASRepToAccount signature * fix incorrect debug call * fix for new getRemoteAccount * rework GetRemoteAccount * start updating tests to remove repetition * break a lot of tests Move shared test logic into the testrig, rather than having it scattered all over the place. This allows us to just mock the transport controller once, and have all tests use it (unless they need not to for some other reason). * fix up tests to use main mock httpclient * webfinger only if necessary * cheeky linting with the lads * update mentionName regex recognize instance accounts * don't finger instance accounts * test webfinger part extraction * increase default worker count to 4 per cpu * don't repeat regex parsing * final search for discovered accountDomain * be more permissive in namestring lookup * add more extraction tests * simplify GetParseMentionFunc * skip long search if local account * fix broken test
106 lines
3.8 KiB
Go
106 lines
3.8 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package account
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
"github.com/superseriousbusiness/gotosocial/internal/federation/dereferencing"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
)
|
|
|
|
func (p *processor) Get(ctx context.Context, requestingAccount *gtsmodel.Account, targetAccountID string) (*apimodel.Account, gtserror.WithCode) {
|
|
targetAccount, err := p.db.GetAccountByID(ctx, targetAccountID)
|
|
if err != nil {
|
|
if err == db.ErrNoEntries {
|
|
return nil, gtserror.NewErrorNotFound(errors.New("account not found"))
|
|
}
|
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("db error: %s", err))
|
|
}
|
|
|
|
return p.getAccountFor(ctx, requestingAccount, targetAccount)
|
|
}
|
|
|
|
func (p *processor) GetLocalByUsername(ctx context.Context, requestingAccount *gtsmodel.Account, username string) (*apimodel.Account, gtserror.WithCode) {
|
|
targetAccount, err := p.db.GetLocalAccountByUsername(ctx, username)
|
|
if err != nil {
|
|
if err == db.ErrNoEntries {
|
|
return nil, gtserror.NewErrorNotFound(errors.New("account not found"))
|
|
}
|
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("db error: %s", err))
|
|
}
|
|
|
|
return p.getAccountFor(ctx, requestingAccount, targetAccount)
|
|
}
|
|
|
|
func (p *processor) getAccountFor(ctx context.Context, requestingAccount *gtsmodel.Account, targetAccount *gtsmodel.Account) (*apimodel.Account, gtserror.WithCode) {
|
|
var blocked bool
|
|
var err error
|
|
if requestingAccount != nil {
|
|
blocked, err = p.db.IsBlocked(ctx, requestingAccount.ID, targetAccount.ID, true)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error checking account block: %s", err))
|
|
}
|
|
}
|
|
|
|
var apiAccount *apimodel.Account
|
|
if blocked {
|
|
apiAccount, err = p.tc.AccountToAPIAccountBlocked(ctx, targetAccount)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error converting account: %s", err))
|
|
}
|
|
return apiAccount, nil
|
|
}
|
|
|
|
// last-minute check to make sure we have remote account header/avi cached
|
|
if targetAccount.Domain != "" {
|
|
targetAccountURI, err := url.Parse(targetAccount.URI)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error parsing url %s: %s", targetAccount.URI, err))
|
|
}
|
|
|
|
a, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: requestingAccount.Username,
|
|
RemoteAccountID: targetAccountURI,
|
|
RemoteAccountHost: targetAccount.Domain,
|
|
RemoteAccountUsername: targetAccount.Username,
|
|
Blocking: true,
|
|
})
|
|
if err == nil {
|
|
targetAccount = a
|
|
}
|
|
}
|
|
|
|
if requestingAccount != nil && targetAccount.ID == requestingAccount.ID {
|
|
apiAccount, err = p.tc.AccountToAPIAccountSensitive(ctx, targetAccount)
|
|
} else {
|
|
apiAccount, err = p.tc.AccountToAPIAccountPublic(ctx, targetAccount)
|
|
}
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(fmt.Errorf("error converting account: %s", err))
|
|
}
|
|
|
|
return apiAccount, nil
|
|
}
|