mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-10 11:19:50 +00:00
dfdc473cef
* move finger to dereferencer * totally break GetRemoteAccount * start reworking finger func a bit * start reworking getRemoteAccount a bit * move mention parts to namestring * rework webfingerget * use util function to extract webfinger parts * use accountDomain * rework finger again, final form * just a real nasty commit, the worst * remove refresh from account * use new ASRepToAccount signature * fix incorrect debug call * fix for new getRemoteAccount * rework GetRemoteAccount * start updating tests to remove repetition * break a lot of tests Move shared test logic into the testrig, rather than having it scattered all over the place. This allows us to just mock the transport controller once, and have all tests use it (unless they need not to for some other reason). * fix up tests to use main mock httpclient * webfinger only if necessary * cheeky linting with the lads * update mentionName regex recognize instance accounts * don't finger instance accounts * test webfinger part extraction * increase default worker count to 4 per cpu * don't repeat regex parsing * final search for discovered accountDomain * be more permissive in namestring lookup * add more extraction tests * simplify GetParseMentionFunc * skip long search if local account * fix broken test
165 lines
5.8 KiB
Go
165 lines
5.8 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package federation
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/url"
|
|
|
|
"github.com/superseriousbusiness/activity/streams"
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
"github.com/superseriousbusiness/gotosocial/internal/federation/dereferencing"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
)
|
|
|
|
func (p *processor) GetStatusReplies(ctx context.Context, requestedUsername string, requestedStatusID string, page bool, onlyOtherAccounts bool, minID string, requestURL *url.URL) (interface{}, gtserror.WithCode) {
|
|
// get the account the request is referring to
|
|
requestedAccount, err := p.db.GetLocalAccountByUsername(ctx, requestedUsername)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorNotFound(fmt.Errorf("database error getting account with username %s: %s", requestedUsername, err))
|
|
}
|
|
|
|
// authenticate the request
|
|
requestingAccountURI, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUsername)
|
|
if errWithCode != nil {
|
|
return nil, errWithCode
|
|
}
|
|
|
|
requestingAccount, err := p.federator.GetRemoteAccount(ctx, dereferencing.GetRemoteAccountParams{
|
|
RequestingUsername: requestedUsername,
|
|
RemoteAccountID: requestingAccountURI,
|
|
})
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorUnauthorized(err)
|
|
}
|
|
|
|
// authorize the request:
|
|
// 1. check if a block exists between the requester and the requestee
|
|
blocked, err := p.db.IsBlocked(ctx, requestedAccount.ID, requestingAccount.ID, true)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
if blocked {
|
|
return nil, gtserror.NewErrorUnauthorized(fmt.Errorf("block exists between accounts %s and %s", requestedAccount.ID, requestingAccount.ID))
|
|
}
|
|
|
|
// get the status out of the database here
|
|
s := >smodel.Status{}
|
|
if err := p.db.GetWhere(ctx, []db.Where{
|
|
{Key: "id", Value: requestedStatusID},
|
|
{Key: "account_id", Value: requestedAccount.ID},
|
|
}, s); err != nil {
|
|
return nil, gtserror.NewErrorNotFound(fmt.Errorf("database error getting status with id %s and account id %s: %s", requestedStatusID, requestedAccount.ID, err))
|
|
}
|
|
|
|
visible, err := p.filter.StatusVisible(ctx, s, requestingAccount)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
if !visible {
|
|
return nil, gtserror.NewErrorNotFound(fmt.Errorf("status with id %s not visible to user with id %s", s.ID, requestingAccount.ID))
|
|
}
|
|
|
|
var data map[string]interface{}
|
|
|
|
// now there are three scenarios:
|
|
// 1. we're asked for the whole collection and not a page -- we can just return the collection, with no items, but a link to 'first' page.
|
|
// 2. we're asked for a page but only_other_accounts has not been set in the query -- so we should just return the first page of the collection, with no items.
|
|
// 3. we're asked for a page, and only_other_accounts has been set, and min_id has optionally been set -- so we need to return some actual items!
|
|
switch {
|
|
case !page:
|
|
// scenario 1
|
|
// get the collection
|
|
collection, err := p.tc.StatusToASRepliesCollection(ctx, s, onlyOtherAccounts)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
data, err = streams.Serialize(collection)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
case page && requestURL.Query().Get("only_other_accounts") == "":
|
|
// scenario 2
|
|
// get the collection
|
|
collection, err := p.tc.StatusToASRepliesCollection(ctx, s, onlyOtherAccounts)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
// but only return the first page
|
|
data, err = streams.Serialize(collection.GetActivityStreamsFirst().GetActivityStreamsCollectionPage())
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
default:
|
|
// scenario 3
|
|
// get immediate children
|
|
replies, err := p.db.GetStatusChildren(ctx, s, true, minID)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
|
|
// filter children and extract URIs
|
|
replyURIs := map[string]*url.URL{}
|
|
for _, r := range replies {
|
|
// only show public or unlocked statuses as replies
|
|
if r.Visibility != gtsmodel.VisibilityPublic && r.Visibility != gtsmodel.VisibilityUnlocked {
|
|
continue
|
|
}
|
|
|
|
// respect onlyOtherAccounts parameter
|
|
if onlyOtherAccounts && r.AccountID == requestedAccount.ID {
|
|
continue
|
|
}
|
|
|
|
// only show replies that the status owner can see
|
|
visibleToStatusOwner, err := p.filter.StatusVisible(ctx, r, requestedAccount)
|
|
if err != nil || !visibleToStatusOwner {
|
|
continue
|
|
}
|
|
|
|
// only show replies that the requester can see
|
|
visibleToRequester, err := p.filter.StatusVisible(ctx, r, requestingAccount)
|
|
if err != nil || !visibleToRequester {
|
|
continue
|
|
}
|
|
|
|
rURI, err := url.Parse(r.URI)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
replyURIs[r.ID] = rURI
|
|
}
|
|
|
|
repliesPage, err := p.tc.StatusURIsToASRepliesPage(ctx, s, onlyOtherAccounts, minID, replyURIs)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
data, err = streams.Serialize(repliesPage)
|
|
if err != nil {
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
}
|
|
}
|
|
|
|
return data, nil
|
|
}
|