2023-03-12 16:00:57 +01:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2022-01-11 17:49:14 +01:00
|
|
|
|
|
|
|
package media
|
|
|
|
|
|
|
|
import (
|
2022-01-16 18:52:55 +01:00
|
|
|
"bytes"
|
2022-01-11 17:49:14 +01:00
|
|
|
"context"
|
2022-01-16 18:52:55 +01:00
|
|
|
"io"
|
2024-01-05 13:39:53 +01:00
|
|
|
"slices"
|
2022-01-11 17:49:14 +01:00
|
|
|
|
2023-01-11 12:13:13 +01:00
|
|
|
"codeberg.org/gruf/go-bytesize"
|
2024-06-26 17:01:16 +02:00
|
|
|
errorsv2 "codeberg.org/gruf/go-errors/v2"
|
2023-02-13 19:40:48 +01:00
|
|
|
"codeberg.org/gruf/go-runners"
|
2023-01-11 12:13:13 +01:00
|
|
|
"github.com/h2non/filetype"
|
2022-09-12 13:03:23 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
2024-06-26 17:01:16 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
2023-06-22 21:46:36 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
2022-01-11 17:49:14 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-07-19 10:47:55 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2023-07-24 14:14:13 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/regexes"
|
2024-06-26 17:01:16 +02:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/storage"
|
2022-01-11 17:49:14 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/uris"
|
2023-11-10 19:29:26 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
2022-01-11 17:49:14 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// ProcessingEmoji represents an emoji currently processing. It exposes
|
|
|
|
// various functions for retrieving data from the process.
|
|
|
|
type ProcessingEmoji struct {
|
2023-05-28 14:08:35 +02:00
|
|
|
emoji *gtsmodel.Emoji // processing emoji details
|
2023-07-24 14:14:13 +02:00
|
|
|
newPathID string // new emoji path ID to use when being refreshed
|
2023-05-28 14:08:35 +02:00
|
|
|
dataFn DataFunc // load-data function, returns media stream
|
|
|
|
done bool // done is set when process finishes with non ctx canceled type error
|
|
|
|
proc runners.Processor // proc helps synchronize only a singular running processing instance
|
|
|
|
err error // error stores permanent error value when done
|
|
|
|
mgr *Manager // mgr instance (access to db / storage)
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// ID returns the ID of the underlying emoji.
|
|
|
|
func (p *ProcessingEmoji) ID() string {
|
2023-01-11 12:13:13 +01:00
|
|
|
return p.emoji.ID // immutable, safe outside mutex.
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
|
|
|
|
2023-02-13 19:40:48 +01:00
|
|
|
// LoadEmoji blocks until the static and fullsize image has been processed, and then returns the completed emoji.
|
2024-06-26 17:01:16 +02:00
|
|
|
func (p *ProcessingEmoji) Load(ctx context.Context) (*gtsmodel.Emoji, error) {
|
2023-02-13 19:40:48 +01:00
|
|
|
emoji, done, err := p.load(ctx)
|
|
|
|
if !done {
|
2024-06-26 17:01:16 +02:00
|
|
|
// On a context-canceled error (marked as !done), requeue for loading.
|
|
|
|
p.mgr.state.Workers.Dereference.Queue.Push(func(ctx context.Context) {
|
|
|
|
if _, _, err := p.load(ctx); err != nil {
|
|
|
|
log.Errorf(ctx, "error loading emoji: %v", err)
|
|
|
|
}
|
|
|
|
})
|
2023-02-13 19:40:48 +01:00
|
|
|
}
|
2024-06-26 17:01:16 +02:00
|
|
|
return emoji, err
|
2023-02-13 19:40:48 +01:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// load is the package private form of load() that is wrapped to catch context canceled.
|
|
|
|
func (p *ProcessingEmoji) load(ctx context.Context) (
|
|
|
|
emoji *gtsmodel.Emoji,
|
|
|
|
done bool,
|
|
|
|
err error,
|
|
|
|
) {
|
2023-02-13 19:40:48 +01:00
|
|
|
err = p.proc.Process(func() error {
|
2024-06-26 17:01:16 +02:00
|
|
|
if done = p.done; done {
|
2023-02-13 19:40:48 +01:00
|
|
|
// Already proc'd.
|
|
|
|
return p.err
|
|
|
|
}
|
2023-01-11 12:13:13 +01:00
|
|
|
|
|
|
|
defer func() {
|
2023-02-13 19:40:48 +01:00
|
|
|
// This is only done when ctx NOT cancelled.
|
2024-06-26 17:01:16 +02:00
|
|
|
done = (err == nil || !errorsv2.IsV2(err,
|
2023-02-13 19:40:48 +01:00
|
|
|
context.Canceled,
|
|
|
|
context.DeadlineExceeded,
|
2024-06-26 17:01:16 +02:00
|
|
|
))
|
|
|
|
|
|
|
|
if !done {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Anything from here, we
|
|
|
|
// need to ensure happens
|
|
|
|
// (i.e. no ctx canceled).
|
|
|
|
ctx = gtscontext.WithValues(
|
|
|
|
context.Background(),
|
|
|
|
ctx, // values
|
2023-02-13 19:40:48 +01:00
|
|
|
)
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// On error, clean
|
|
|
|
// downloaded files.
|
|
|
|
if err != nil {
|
|
|
|
p.cleanup(ctx)
|
|
|
|
}
|
|
|
|
|
2023-02-13 19:40:48 +01:00
|
|
|
if !done {
|
|
|
|
return
|
2023-01-11 12:13:13 +01:00
|
|
|
}
|
2022-01-11 17:49:14 +01:00
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Update with latest details, whatever happened.
|
|
|
|
e := p.mgr.state.DB.UpdateEmoji(ctx, p.emoji)
|
|
|
|
if e != nil {
|
|
|
|
log.Errorf(ctx, "error updating emoji in db: %v", e)
|
|
|
|
}
|
|
|
|
|
2023-02-13 19:40:48 +01:00
|
|
|
// Store final values.
|
|
|
|
p.done = true
|
|
|
|
p.err = err
|
2023-01-11 12:13:13 +01:00
|
|
|
}()
|
|
|
|
|
|
|
|
// Attempt to store media and calculate
|
|
|
|
// full-size media attachment details.
|
2024-06-26 17:01:16 +02:00
|
|
|
//
|
|
|
|
// This will update p.emoji as it goes.
|
2023-01-11 12:13:13 +01:00
|
|
|
if err = p.store(ctx); err != nil {
|
2023-02-13 19:40:48 +01:00
|
|
|
return err
|
2023-01-11 12:13:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Finish processing by reloading media into
|
|
|
|
// memory to get dimension and generate a thumb.
|
2024-06-26 17:01:16 +02:00
|
|
|
//
|
|
|
|
// This will update p.emoji as it goes.
|
2023-01-11 12:13:13 +01:00
|
|
|
if err = p.finish(ctx); err != nil {
|
2024-06-26 17:01:16 +02:00
|
|
|
return err //nolint:revive
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
2022-09-19 13:43:22 +02:00
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
return nil
|
2023-01-11 12:13:13 +01:00
|
|
|
})
|
2024-06-26 17:01:16 +02:00
|
|
|
emoji = p.emoji
|
|
|
|
return
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
|
|
|
|
2022-01-16 18:52:55 +01:00
|
|
|
// store calls the data function attached to p if it hasn't been called yet,
|
|
|
|
// and updates the underlying attachment fields as necessary. It will then stream
|
|
|
|
// bytes from p's reader directly into storage so that it can be retrieved later.
|
|
|
|
func (p *ProcessingEmoji) store(ctx context.Context) error {
|
2024-06-26 17:01:16 +02:00
|
|
|
// Load media from provided data fun
|
2023-01-11 12:13:13 +01:00
|
|
|
rc, sz, err := p.dataFn(ctx)
|
2022-01-11 17:49:14 +01:00
|
|
|
if err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error executing data function: %w", err)
|
2022-01-16 18:52:55 +01:00
|
|
|
}
|
|
|
|
|
2022-03-21 13:41:44 +01:00
|
|
|
defer func() {
|
2023-01-11 12:13:13 +01:00
|
|
|
// Ensure data reader gets closed on return.
|
2022-11-03 15:03:12 +01:00
|
|
|
if err := rc.Close(); err != nil {
|
2023-02-17 12:02:29 +01:00
|
|
|
log.Errorf(ctx, "error closing data reader: %v", err)
|
2022-03-21 13:41:44 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2023-11-10 19:29:26 +01:00
|
|
|
var maxSize bytesize.Size
|
|
|
|
|
2024-01-29 15:57:22 +01:00
|
|
|
if p.emoji.IsLocal() {
|
2023-11-10 19:29:26 +01:00
|
|
|
// this is a local emoji upload
|
|
|
|
maxSize = config.GetMediaEmojiLocalMaxSize()
|
|
|
|
} else {
|
|
|
|
// this is a remote incoming emoji
|
|
|
|
maxSize = config.GetMediaEmojiRemoteMaxSize()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that provided size isn't beyond max. We check beforehand
|
|
|
|
// so that we don't attempt to stream the emoji into storage if not needed.
|
2024-06-26 17:01:16 +02:00
|
|
|
if sz > 0 && sz > int64(maxSize) {
|
|
|
|
sz := bytesize.Size(sz) // improves log readability
|
|
|
|
return gtserror.Newf("given emoji size %s greater than max allowed %s", sz, maxSize)
|
2023-11-10 19:29:26 +01:00
|
|
|
}
|
2022-11-11 20:27:37 +01:00
|
|
|
|
2023-11-10 19:29:26 +01:00
|
|
|
// Prepare to read bytes from
|
|
|
|
// file header or magic number.
|
|
|
|
fileSize := int(sz)
|
|
|
|
hdrBuf := newHdrBuf(fileSize)
|
|
|
|
|
|
|
|
// Read into buffer as much as possible.
|
|
|
|
//
|
|
|
|
// UnexpectedEOF means we couldn't read up to the
|
|
|
|
// given size, but we may still have read something.
|
|
|
|
//
|
|
|
|
// EOF means we couldn't read anything at all.
|
|
|
|
//
|
|
|
|
// Any other error likely means the connection messed up.
|
|
|
|
//
|
|
|
|
// In other words, rather counterintuitively, we
|
|
|
|
// can only proceed on no error or unexpected error!
|
|
|
|
n, err := io.ReadFull(rc, hdrBuf)
|
|
|
|
if err != nil {
|
|
|
|
if err != io.ErrUnexpectedEOF {
|
|
|
|
return gtserror.Newf("error reading first bytes of incoming media: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initial file size was misreported, so we didn't read
|
|
|
|
// fully into hdrBuf. Reslice it to the size we did read.
|
|
|
|
hdrBuf = hdrBuf[:n]
|
2024-06-26 17:01:16 +02:00
|
|
|
fileSize = n
|
|
|
|
p.emoji.ImageFileSize = fileSize
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 12:13:13 +01:00
|
|
|
// Parse file type info from header buffer.
|
2024-06-26 17:01:16 +02:00
|
|
|
// This should only ever error if the buffer
|
|
|
|
// is empty (ie., the attachment is 0 bytes).
|
2023-01-11 12:13:13 +01:00
|
|
|
info, err := filetype.Match(hdrBuf)
|
2022-01-11 17:49:14 +01:00
|
|
|
if err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error parsing file type: %w", err)
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
|
|
|
|
2024-01-05 13:39:53 +01:00
|
|
|
// Ensure supported emoji img type.
|
|
|
|
if !slices.Contains(SupportedEmojiMIMETypes, info.MIME.Value) {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("unsupported emoji filetype: %s", info.Extension)
|
2022-01-11 17:49:14 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 12:13:13 +01:00
|
|
|
// Recombine header bytes with remaining stream
|
|
|
|
r := io.MultiReader(bytes.NewReader(hdrBuf), rc)
|
|
|
|
|
2022-10-13 15:16:24 +02:00
|
|
|
var pathID string
|
2023-07-24 14:14:13 +02:00
|
|
|
if p.newPathID != "" {
|
2023-01-11 12:13:13 +01:00
|
|
|
// This is a refreshed emoji with a new
|
|
|
|
// path ID that this will be stored under.
|
2022-10-13 15:16:24 +02:00
|
|
|
pathID = p.newPathID
|
|
|
|
} else {
|
2023-01-11 12:13:13 +01:00
|
|
|
// This is a new emoji, simply use provided ID.
|
2022-10-13 15:16:24 +02:00
|
|
|
pathID = p.emoji.ID
|
|
|
|
}
|
2022-01-11 17:49:14 +01:00
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Determine instance account ID from generated image static path.
|
|
|
|
instanceAccID, ok := getInstanceAccountID(p.emoji.ImageStaticPath)
|
|
|
|
if !ok {
|
|
|
|
return gtserror.Newf("invalid emoji static path; no instance account id: %s", p.emoji.ImageStaticPath)
|
|
|
|
}
|
2023-07-24 14:14:13 +02:00
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Calculate final media attachment file path.
|
2023-11-10 19:29:26 +01:00
|
|
|
p.emoji.ImagePath = uris.StoragePathForAttachment(
|
2023-07-24 14:14:13 +02:00
|
|
|
instanceAccID,
|
2023-11-10 19:29:26 +01:00
|
|
|
string(TypeEmoji),
|
|
|
|
string(SizeOriginal),
|
2023-01-11 12:13:13 +01:00
|
|
|
pathID,
|
|
|
|
info.Extension,
|
|
|
|
)
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// File shouldn't already exist in storage at this point,
|
|
|
|
// but we do a check as it's worth logging / cleaning up.
|
2023-02-13 19:40:48 +01:00
|
|
|
if have, _ := p.mgr.state.Storage.Has(ctx, p.emoji.ImagePath); have {
|
2024-06-26 17:01:16 +02:00
|
|
|
log.Warnf(ctx, "emoji already exists at: %s", p.emoji.ImagePath)
|
2023-01-11 12:13:13 +01:00
|
|
|
|
|
|
|
// Attempt to remove existing emoji at storage path (might be broken / out-of-date)
|
2023-02-13 19:40:48 +01:00
|
|
|
if err := p.mgr.state.Storage.Delete(ctx, p.emoji.ImagePath); err != nil {
|
2024-06-26 17:01:16 +02:00
|
|
|
return gtserror.Newf("error removing emoji %s from storage: %v", p.emoji.ImagePath, err)
|
2023-01-11 12:13:13 +01:00
|
|
|
}
|
|
|
|
}
|
2022-09-24 11:11:47 +02:00
|
|
|
|
2023-01-11 12:13:13 +01:00
|
|
|
// Write the final image reader stream to our storage.
|
2024-06-26 17:01:16 +02:00
|
|
|
sz, err = p.mgr.state.Storage.PutStream(ctx, p.emoji.ImagePath, r)
|
2023-01-11 12:13:13 +01:00
|
|
|
if err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error writing emoji to storage: %w", err)
|
2022-09-24 11:11:47 +02:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Perform final size check in case none was
|
|
|
|
// given previously, or size was mis-reported.
|
|
|
|
// (error here will later perform p.cleanup()).
|
|
|
|
if sz > int64(maxSize) {
|
|
|
|
sz := bytesize.Size(sz) // improves log readability
|
|
|
|
return gtserror.Newf("written emoji size %s greater than max allowed %s", sz, maxSize)
|
2022-09-24 11:11:47 +02:00
|
|
|
}
|
2022-01-16 18:52:55 +01:00
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Fill in remaining emoji data now it's stored.
|
2023-11-10 19:29:26 +01:00
|
|
|
p.emoji.ImageURL = uris.URIForAttachment(
|
2023-07-24 14:14:13 +02:00
|
|
|
instanceAccID,
|
2023-01-11 12:13:13 +01:00
|
|
|
string(TypeEmoji),
|
|
|
|
string(SizeOriginal),
|
|
|
|
pathID,
|
|
|
|
info.Extension,
|
|
|
|
)
|
|
|
|
p.emoji.ImageContentType = info.MIME.Value
|
2024-06-26 17:01:16 +02:00
|
|
|
p.emoji.ImageFileSize = int(sz)
|
2023-11-10 19:29:26 +01:00
|
|
|
p.emoji.Cached = util.Ptr(true)
|
2023-01-11 12:13:13 +01:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *ProcessingEmoji) finish(ctx context.Context) error {
|
2024-06-26 17:01:16 +02:00
|
|
|
// Get a stream to the original file for further processing.
|
2023-02-13 19:40:48 +01:00
|
|
|
rc, err := p.mgr.state.Storage.GetStream(ctx, p.emoji.ImagePath)
|
2023-01-11 12:13:13 +01:00
|
|
|
if err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error loading file from storage: %w", err)
|
2022-01-16 18:52:55 +01:00
|
|
|
}
|
2023-01-11 12:13:13 +01:00
|
|
|
defer rc.Close()
|
2022-01-16 18:52:55 +01:00
|
|
|
|
2023-01-11 12:13:13 +01:00
|
|
|
// Decode the image from storage.
|
|
|
|
staticImg, err := decodeImage(rc)
|
|
|
|
if err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error decoding image: %w", err)
|
2023-01-11 12:13:13 +01:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// staticImg should be in-memory by
|
|
|
|
// now so we're done with storage.
|
2023-01-11 12:13:13 +01:00
|
|
|
if err := rc.Close(); err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error closing file: %w", err)
|
2023-01-11 12:13:13 +01:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Static img shouldn't exist in storage at this point,
|
|
|
|
// but we do a check as it's worth logging / cleaning up.
|
2023-02-13 19:40:48 +01:00
|
|
|
if have, _ := p.mgr.state.Storage.Has(ctx, p.emoji.ImageStaticPath); have {
|
2024-06-26 17:01:16 +02:00
|
|
|
log.Warnf(ctx, "static emoji already exists at: %s", p.emoji.ImageStaticPath)
|
2023-07-24 14:14:13 +02:00
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Attempt to remove existing thumbnail (might be broken / out-of-date).
|
2023-02-13 19:40:48 +01:00
|
|
|
if err := p.mgr.state.Storage.Delete(ctx, p.emoji.ImageStaticPath); err != nil {
|
2024-06-26 17:01:16 +02:00
|
|
|
return gtserror.Newf("error removing static emoji %s from storage: %v", p.emoji.ImageStaticPath, err)
|
2022-11-11 20:27:37 +01:00
|
|
|
}
|
2022-09-24 11:11:47 +02:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Create emoji PNG encoder stream.
|
2023-01-11 12:13:13 +01:00
|
|
|
enc := staticImg.ToPNG()
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Stream-encode the PNG static emoji image into our storage driver.
|
2023-02-13 19:40:48 +01:00
|
|
|
sz, err := p.mgr.state.Storage.PutStream(ctx, p.emoji.ImageStaticPath, enc)
|
2023-01-11 12:13:13 +01:00
|
|
|
if err != nil {
|
2023-06-22 21:46:36 +02:00
|
|
|
return gtserror.Newf("error stream-encoding static emoji to storage: %w", err)
|
2023-01-11 12:13:13 +01:00
|
|
|
}
|
|
|
|
|
2024-06-26 17:01:16 +02:00
|
|
|
// Set final written thumb size.
|
2023-01-11 12:13:13 +01:00
|
|
|
p.emoji.ImageStaticFileSize = int(sz)
|
2022-02-22 13:50:33 +01:00
|
|
|
|
2022-01-11 17:49:14 +01:00
|
|
|
return nil
|
|
|
|
}
|
2024-06-26 17:01:16 +02:00
|
|
|
|
|
|
|
// cleanup will remove any traces of processing emoji from storage,
|
|
|
|
// and perform any other necessary cleanup steps after failure.
|
|
|
|
func (p *ProcessingEmoji) cleanup(ctx context.Context) {
|
|
|
|
var err error
|
|
|
|
|
|
|
|
if p.emoji.ImagePath != "" {
|
|
|
|
// Ensure emoji file at path is deleted from storage.
|
|
|
|
err = p.mgr.state.Storage.Delete(ctx, p.emoji.ImagePath)
|
|
|
|
if err != nil && !storage.IsNotFound(err) {
|
|
|
|
log.Errorf(ctx, "error deleting %s: %v", p.emoji.ImagePath, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.emoji.ImageStaticPath != "" {
|
|
|
|
// Ensure emoji static file at path is deleted from storage.
|
|
|
|
err = p.mgr.state.Storage.Delete(ctx, p.emoji.ImageStaticPath)
|
|
|
|
if err != nil && !storage.IsNotFound(err) {
|
|
|
|
log.Errorf(ctx, "error deleting %s: %v", p.emoji.ImageStaticPath, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure marked as not cached.
|
|
|
|
p.emoji.Cached = util.Ptr(false)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getInstanceAccountID determines the instance account ID from
|
|
|
|
// emoji static image storage path. returns false on failure.
|
|
|
|
func getInstanceAccountID(staticPath string) (string, bool) {
|
|
|
|
matches := regexes.FilePath.FindStringSubmatch(staticPath)
|
|
|
|
if len(matches) < 2 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
return matches[1], true
|
|
|
|
}
|