[bugfix] Reorder web view logic, other small fixes (#1954)
This commit is contained in:
parent
9ff4c20374
commit
ac564c1862
|
@ -43,6 +43,11 @@ const (
|
||||||
SearchResolveKey = "resolve"
|
SearchResolveKey = "resolve"
|
||||||
SearchTypeKey = "type"
|
SearchTypeKey = "type"
|
||||||
|
|
||||||
|
/* Web endpoint keys */
|
||||||
|
|
||||||
|
WebUsernameKey = "username"
|
||||||
|
WebStatusIDKey = "status"
|
||||||
|
|
||||||
/* Domain block keys */
|
/* Domain block keys */
|
||||||
|
|
||||||
DomainBlockExportKey = "export"
|
DomainBlockExportKey = "export"
|
||||||
|
@ -75,6 +80,14 @@ func ParseLocal(value string, defaultValue bool) (bool, gtserror.WithCode) {
|
||||||
return parseBool(value, defaultValue, LocalKey)
|
return parseBool(value, defaultValue, LocalKey)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ParseMaxID(value string, defaultValue string) string {
|
||||||
|
if value == "" {
|
||||||
|
return defaultValue
|
||||||
|
}
|
||||||
|
|
||||||
|
return value
|
||||||
|
}
|
||||||
|
|
||||||
func ParseSearchExcludeUnreviewed(value string, defaultValue bool) (bool, gtserror.WithCode) {
|
func ParseSearchExcludeUnreviewed(value string, defaultValue bool) (bool, gtserror.WithCode) {
|
||||||
return parseBool(value, defaultValue, SearchExcludeUnreviewedKey)
|
return parseBool(value, defaultValue, SearchExcludeUnreviewedKey)
|
||||||
}
|
}
|
||||||
|
@ -133,6 +146,26 @@ func ParseSearchQuery(value string) (string, gtserror.WithCode) {
|
||||||
return value, nil
|
return value, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ParseWebUsername(value string) (string, gtserror.WithCode) {
|
||||||
|
key := WebUsernameKey
|
||||||
|
|
||||||
|
if value == "" {
|
||||||
|
return "", requiredError(key)
|
||||||
|
}
|
||||||
|
|
||||||
|
return value, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func ParseWebStatusID(value string) (string, gtserror.WithCode) {
|
||||||
|
key := WebStatusIDKey
|
||||||
|
|
||||||
|
if value == "" {
|
||||||
|
return "", requiredError(key)
|
||||||
|
}
|
||||||
|
|
||||||
|
return value, nil
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
Internal functions
|
Internal functions
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -95,7 +95,7 @@ type deref struct {
|
||||||
derefEmojis map[string]*media.ProcessingEmoji
|
derefEmojis map[string]*media.ProcessingEmoji
|
||||||
derefEmojisMu mutexes.Mutex
|
derefEmojisMu mutexes.Mutex
|
||||||
handshakes map[string][]*url.URL
|
handshakes map[string][]*url.URL
|
||||||
handshakeSync sync.Mutex // mutex to lock/unlock when checking or updating the handshakes map
|
handshakesMu sync.Mutex // mutex to lock/unlock when checking or updating the handshakes map
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewDereferencer returns a Dereferencer initialized with the given parameters.
|
// NewDereferencer returns a Dereferencer initialized with the given parameters.
|
||||||
|
|
|
@ -22,68 +22,83 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func (d *deref) Handshaking(username string, remoteAccountID *url.URL) bool {
|
func (d *deref) Handshaking(username string, remoteAccountID *url.URL) bool {
|
||||||
d.handshakeSync.Lock()
|
d.handshakesMu.Lock()
|
||||||
defer d.handshakeSync.Unlock()
|
defer d.handshakesMu.Unlock()
|
||||||
|
|
||||||
if d.handshakes == nil {
|
if d.handshakes == nil {
|
||||||
// handshakes isn't even initialized yet so we can't be handshaking with anyone
|
// Handshakes isn't even initialized yet,
|
||||||
|
// so we can't be handshaking with anyone.
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
remoteIDs, ok := d.handshakes[username]
|
remoteIDs, ok := d.handshakes[username]
|
||||||
if !ok {
|
if !ok {
|
||||||
// user isn't handshaking with anyone, bail
|
// Given username isn't
|
||||||
|
// handshaking with anyone.
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, id := range remoteIDs {
|
for _, id := range remoteIDs {
|
||||||
if id.String() == remoteAccountID.String() {
|
if id.String() == remoteAccountID.String() {
|
||||||
// we are currently handshaking with the remote account, yep
|
// We are currently handshaking
|
||||||
|
// with the remote account.
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// didn't find it which means we're not handshaking
|
// No results: we're not handshaking
|
||||||
|
// with the remote account.
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *deref) startHandshake(username string, remoteAccountID *url.URL) {
|
func (d *deref) startHandshake(username string, remoteAccountID *url.URL) {
|
||||||
d.handshakeSync.Lock()
|
d.handshakesMu.Lock()
|
||||||
defer d.handshakeSync.Unlock()
|
defer d.handshakesMu.Unlock()
|
||||||
|
|
||||||
remoteIDs, ok := d.handshakes[username]
|
remoteIDs, ok := d.handshakes[username]
|
||||||
if !ok {
|
if !ok {
|
||||||
// there was nothing in there yet, so just add this entry and return
|
// No handshakes were stored yet,
|
||||||
|
// so just add this entry and return.
|
||||||
d.handshakes[username] = []*url.URL{remoteAccountID}
|
d.handshakes[username] = []*url.URL{remoteAccountID}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// add the remote ID to the slice
|
// Add the remote account ID to the slice.
|
||||||
remoteIDs = append(remoteIDs, remoteAccountID)
|
remoteIDs = append(remoteIDs, remoteAccountID)
|
||||||
d.handshakes[username] = remoteIDs
|
d.handshakes[username] = remoteIDs
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *deref) stopHandshake(username string, remoteAccountID *url.URL) {
|
func (d *deref) stopHandshake(username string, remoteAccountID *url.URL) {
|
||||||
d.handshakeSync.Lock()
|
d.handshakesMu.Lock()
|
||||||
defer d.handshakeSync.Unlock()
|
defer d.handshakesMu.Unlock()
|
||||||
|
|
||||||
remoteIDs, ok := d.handshakes[username]
|
remoteIDs, ok := d.handshakes[username]
|
||||||
if !ok {
|
if !ok {
|
||||||
|
// No handshake was in progress,
|
||||||
|
// so there's nothing to stop.
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
newRemoteIDs := []*url.URL{}
|
// Generate a new remoteIDs slice that
|
||||||
|
// doesn't contain the removed entry.
|
||||||
|
var (
|
||||||
|
remoteAccountIDStr = remoteAccountID.String()
|
||||||
|
newRemoteIDs = make([]*url.URL, 0, len(remoteIDs)-1)
|
||||||
|
)
|
||||||
|
|
||||||
for _, id := range remoteIDs {
|
for _, id := range remoteIDs {
|
||||||
if id.String() != remoteAccountID.String() {
|
if id.String() != remoteAccountIDStr {
|
||||||
newRemoteIDs = append(newRemoteIDs, id)
|
newRemoteIDs = append(newRemoteIDs, id)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(newRemoteIDs) == 0 {
|
if len(newRemoteIDs) == 0 {
|
||||||
// there are no handshakes so just remove this user entry from the map and save a few bytes
|
// There are no handshakes remaining,
|
||||||
|
// so just remove this username's slice
|
||||||
|
// from the map and save a few bytes.
|
||||||
delete(d.handshakes, username)
|
delete(d.handshakes, username)
|
||||||
} else {
|
} else {
|
||||||
// there are still other handshakes ongoing
|
// There are still other handshakes ongoing.
|
||||||
d.handshakes[username] = newRemoteIDs
|
d.handshakes[username] = newRemoteIDs
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -197,3 +197,9 @@ func (p *Processor) WebStatusesGet(ctx context.Context, targetAccountID string,
|
||||||
NextMaxIDValue: nextMaxIDValue,
|
NextMaxIDValue: nextMaxIDValue,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// PinnedStatusesGet is a shortcut for getting just an account's pinned statuses.
|
||||||
|
// Under the hood, it just calls StatusesGet using mostly default parameters.
|
||||||
|
func (p *Processor) PinnedStatusesGet(ctx context.Context, requestingAccount *gtsmodel.Account, targetAccountID string) (*apimodel.PageableResponse, gtserror.WithCode) {
|
||||||
|
return p.StatusesGet(ctx, requestingAccount, targetAccountID, 0, false, false, "", "", true, false, false)
|
||||||
|
}
|
||||||
|
|
|
@ -19,41 +19,61 @@ package fedi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/url"
|
|
||||||
|
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (p *Processor) authenticate(ctx context.Context, requestedUsername string) (requestedAccount, requestingAccount *gtsmodel.Account, errWithCode gtserror.WithCode) {
|
func (p *Processor) authenticate(ctx context.Context, requestedUsername string) (
|
||||||
|
*gtsmodel.Account, // requestedAccount
|
||||||
|
*gtsmodel.Account, // requestingAccount
|
||||||
|
gtserror.WithCode,
|
||||||
|
) {
|
||||||
|
// Get LOCAL account with the requested username.
|
||||||
requestedAccount, err := p.state.DB.GetAccountByUsernameDomain(ctx, requestedUsername, "")
|
requestedAccount, err := p.state.DB.GetAccountByUsernameDomain(ctx, requestedUsername, "")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errWithCode = gtserror.NewErrorNotFound(fmt.Errorf("database error getting account with username %s: %s", requestedUsername, err))
|
if !errors.Is(err, db.ErrNoEntries) {
|
||||||
return
|
// Real db error.
|
||||||
|
err = gtserror.Newf("db error getting account %s: %w", requestedUsername, err)
|
||||||
|
return nil, nil, gtserror.NewErrorInternalError(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Account just not found in the db.
|
||||||
|
return nil, nil, gtserror.NewErrorNotFound(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
var requestingAccountURI *url.URL
|
// Ensure request signed, and use signature URI to
|
||||||
requestingAccountURI, errWithCode = p.federator.AuthenticateFederatedRequest(ctx, requestedUsername)
|
// get requesting account, dereferencing if necessary.
|
||||||
|
requestingAccountURI, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUsername)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
return
|
return nil, nil, errWithCode
|
||||||
}
|
}
|
||||||
|
|
||||||
if requestingAccount, _, err = p.federator.GetAccountByURI(gtscontext.SetFastFail(ctx), requestedUsername, requestingAccountURI); err != nil {
|
requestingAccount, _, err := p.federator.GetAccountByURI(
|
||||||
errWithCode = gtserror.NewErrorUnauthorized(err)
|
gtscontext.SetFastFail(ctx),
|
||||||
return
|
requestedUsername,
|
||||||
|
requestingAccountURI,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
err = gtserror.Newf("error getting account %s: %w", requestingAccountURI, err)
|
||||||
|
return nil, nil, gtserror.NewErrorUnauthorized(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Ensure no block exists between requester + requested.
|
||||||
blocked, err := p.state.DB.IsEitherBlocked(ctx, requestedAccount.ID, requestingAccount.ID)
|
blocked, err := p.state.DB.IsEitherBlocked(ctx, requestedAccount.ID, requestingAccount.ID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errWithCode = gtserror.NewErrorInternalError(err)
|
err = gtserror.Newf("db error getting checking block: %w", err)
|
||||||
return
|
return nil, nil, gtserror.NewErrorInternalError(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if blocked {
|
if blocked {
|
||||||
errWithCode = gtserror.NewErrorUnauthorized(fmt.Errorf("block exists between accounts %s and %s", requestedAccount.ID, requestingAccount.ID))
|
err = fmt.Errorf("block exists between accounts %s and %s", requestedAccount.ID, requestingAccount.ID)
|
||||||
|
return nil, nil, gtserror.NewErrorUnauthorized(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return
|
return requestedAccount, requestingAccount, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -27,9 +27,10 @@ import (
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
||||||
)
|
)
|
||||||
|
|
||||||
// StatusGet handles the getting of a fedi/activitypub representation of a particular status, performing appropriate
|
// StatusGet handles the getting of a fedi/activitypub representation of a local status.
|
||||||
// authentication before returning a JSON serializable interface to the caller.
|
// It performs appropriate authentication before returning a JSON serializable interface.
|
||||||
func (p *Processor) StatusGet(ctx context.Context, requestedUsername string, requestedStatusID string) (interface{}, gtserror.WithCode) {
|
func (p *Processor) StatusGet(ctx context.Context, requestedUsername string, requestedStatusID string) (interface{}, gtserror.WithCode) {
|
||||||
|
// Authenticate using http signature.
|
||||||
requestedAccount, requestingAccount, errWithCode := p.authenticate(ctx, requestedUsername)
|
requestedAccount, requestingAccount, errWithCode := p.authenticate(ctx, requestedUsername)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
return nil, errWithCode
|
return nil, errWithCode
|
||||||
|
@ -41,15 +42,18 @@ func (p *Processor) StatusGet(ctx context.Context, requestedUsername string, req
|
||||||
}
|
}
|
||||||
|
|
||||||
if status.AccountID != requestedAccount.ID {
|
if status.AccountID != requestedAccount.ID {
|
||||||
return nil, gtserror.NewErrorNotFound(fmt.Errorf("status with id %s does not belong to account with id %s", status.ID, requestedAccount.ID))
|
err := fmt.Errorf("status with id %s does not belong to account with id %s", status.ID, requestedAccount.ID)
|
||||||
|
return nil, gtserror.NewErrorNotFound(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
visible, err := p.filter.StatusVisible(ctx, requestingAccount, status)
|
visible, err := p.filter.StatusVisible(ctx, requestingAccount, status)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorInternalError(err)
|
return nil, gtserror.NewErrorInternalError(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if !visible {
|
if !visible {
|
||||||
return nil, gtserror.NewErrorNotFound(fmt.Errorf("status with id %s not visible to user with id %s", status.ID, requestingAccount.ID))
|
err := fmt.Errorf("status with id %s not visible to user with id %s", status.ID, requestingAccount.ID)
|
||||||
|
return nil, gtserror.NewErrorNotFound(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
asStatus, err := p.tc.StatusToAS(ctx, status)
|
asStatus, err := p.tc.StatusToAS(ctx, status)
|
||||||
|
|
|
@ -19,65 +19,110 @@ package fedi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
|
||||||
"github.com/superseriousbusiness/activity/streams/vocab"
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/uris"
|
"github.com/superseriousbusiness/gotosocial/internal/uris"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UserGet handles the getting of a fedi/activitypub representation of a user/account, performing appropriate authentication
|
// UserGet handles the getting of a fedi/activitypub representation of a user/account,
|
||||||
// before returning a JSON serializable interface to the caller.
|
// performing authentication before returning a JSON serializable interface to the caller.
|
||||||
func (p *Processor) UserGet(ctx context.Context, requestedUsername string, requestURL *url.URL) (interface{}, gtserror.WithCode) {
|
func (p *Processor) UserGet(ctx context.Context, requestedUsername string, requestURL *url.URL) (interface{}, gtserror.WithCode) {
|
||||||
// Get the instance-local account the request is referring to.
|
// (Try to) get the requested local account from the db.
|
||||||
requestedAccount, err := p.state.DB.GetAccountByUsernameDomain(ctx, requestedUsername, "")
|
requestedAccount, err := p.state.DB.GetAccountByUsernameDomain(ctx, requestedUsername, "")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorNotFound(fmt.Errorf("database error getting account with username %s: %s", requestedUsername, err))
|
if errors.Is(err, db.ErrNoEntries) {
|
||||||
}
|
// Account just not found w/ this username.
|
||||||
|
err := fmt.Errorf("account with username %s not found in the db", requestedUsername)
|
||||||
|
return nil, gtserror.NewErrorNotFound(err)
|
||||||
|
}
|
||||||
|
|
||||||
var requestedPerson vocab.ActivityStreamsPerson
|
// Real db error.
|
||||||
|
err := fmt.Errorf("db error getting account with username %s: %w", requestedUsername, err)
|
||||||
|
return nil, gtserror.NewErrorInternalError(err)
|
||||||
|
}
|
||||||
|
|
||||||
if uris.IsPublicKeyPath(requestURL) {
|
if uris.IsPublicKeyPath(requestURL) {
|
||||||
// if it's a public key path, we don't need to authenticate but we'll only serve the bare minimum user profile needed for the public key
|
// If request is on a public key path, we don't need to
|
||||||
requestedPerson, err = p.tc.AccountToASMinimal(ctx, requestedAccount)
|
// authenticate this request. However, we'll only serve
|
||||||
|
// the bare minimum user profile needed for the pubkey.
|
||||||
|
//
|
||||||
|
// TODO: https://github.com/superseriousbusiness/gotosocial/issues/1186
|
||||||
|
minimalPerson, err := p.tc.AccountToASMinimal(ctx, requestedAccount)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, gtserror.NewErrorInternalError(err)
|
return nil, gtserror.NewErrorInternalError(err)
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
// if it's any other path, we want to fully authenticate the request before we serve any data, and then we can serve a more complete profile
|
|
||||||
requestingAccountURI, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUsername)
|
|
||||||
if errWithCode != nil {
|
|
||||||
return nil, errWithCode
|
|
||||||
}
|
|
||||||
|
|
||||||
// if we're not already handshaking/dereferencing a remote account, dereference it now
|
// Return early with bare minimum data.
|
||||||
if !p.federator.Handshaking(requestedUsername, requestingAccountURI) {
|
return data(minimalPerson)
|
||||||
requestingAccount, _, err := p.federator.GetAccountByURI(gtscontext.SetFastFail(ctx), requestedUsername, requestingAccountURI)
|
|
||||||
if err != nil {
|
|
||||||
return nil, gtserror.NewErrorUnauthorized(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
blocked, err := p.state.DB.IsEitherBlocked(ctx, requestedAccount.ID, requestingAccount.ID)
|
|
||||||
if err != nil {
|
|
||||||
return nil, gtserror.NewErrorInternalError(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if blocked {
|
|
||||||
return nil, gtserror.NewErrorUnauthorized(fmt.Errorf("block exists between accounts %s and %s", requestedAccount.ID, requestingAccount.ID))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
requestedPerson, err = p.tc.AccountToAS(ctx, requestedAccount)
|
|
||||||
if err != nil {
|
|
||||||
return nil, gtserror.NewErrorInternalError(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// If the request is not on a public key path, we want to
|
||||||
|
// try to authenticate it before we serve any data, so that
|
||||||
|
// we can serve a more complete profile.
|
||||||
|
requestingAccountURI, errWithCode := p.federator.AuthenticateFederatedRequest(ctx, requestedUsername)
|
||||||
|
if errWithCode != nil {
|
||||||
|
return nil, errWithCode // likely 401
|
||||||
|
}
|
||||||
|
|
||||||
|
// Auth passed, generate the proper AP representation.
|
||||||
|
person, err := p.tc.AccountToAS(ctx, requestedAccount)
|
||||||
|
if err != nil {
|
||||||
|
return nil, gtserror.NewErrorInternalError(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we are currently handshaking with the remote account
|
||||||
|
// making the request, then don't be coy: just serve the AP
|
||||||
|
// representation of the target account.
|
||||||
|
//
|
||||||
|
// This handshake check ensures that we don't get stuck in
|
||||||
|
// a loop with another GtS instance, where each instance is
|
||||||
|
// trying repeatedly to dereference the other account that's
|
||||||
|
// making the request before it will reveal its own account.
|
||||||
|
//
|
||||||
|
// Instead, we end up in an 'I'll show you mine if you show me
|
||||||
|
// yours' situation, where we sort of agree to reveal each
|
||||||
|
// other's profiles at the same time.
|
||||||
|
if p.federator.Handshaking(requestedUsername, requestingAccountURI) {
|
||||||
|
return data(person)
|
||||||
|
}
|
||||||
|
|
||||||
|
// We're not currently handshaking with the requestingAccountURI,
|
||||||
|
// so fetch its details and ensure it's up to date + not blocked.
|
||||||
|
requestingAccount, _, err := p.federator.GetAccountByURI(
|
||||||
|
// On a hot path so fail quickly.
|
||||||
|
gtscontext.SetFastFail(ctx),
|
||||||
|
requestedUsername, requestingAccountURI,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
err := gtserror.Newf("error getting account %s: %w", requestingAccountURI, err)
|
||||||
|
return nil, gtserror.NewErrorUnauthorized(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
blocked, err := p.state.DB.IsBlocked(ctx, requestedAccount.ID, requestingAccount.ID)
|
||||||
|
if err != nil {
|
||||||
|
err := gtserror.Newf("error checking block from account %s to account %s: %w", requestedAccount.ID, requestingAccount.ID, err)
|
||||||
|
return nil, gtserror.NewErrorInternalError(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if blocked {
|
||||||
|
err := fmt.Errorf("account %s blocks account %s", requestedAccount.ID, requestingAccount.ID)
|
||||||
|
return nil, gtserror.NewErrorUnauthorized(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return data(person)
|
||||||
|
}
|
||||||
|
|
||||||
|
func data(requestedPerson vocab.ActivityStreamsPerson) (interface{}, gtserror.WithCode) {
|
||||||
data, err := ap.Serialize(requestedPerson)
|
data, err := ap.Serialize(requestedPerson)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
err := gtserror.Newf("error serializing person: %w", err)
|
||||||
return nil, gtserror.NewErrorInternalError(err)
|
return nil, gtserror.NewErrorInternalError(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -20,7 +20,6 @@ package web
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -33,91 +32,117 @@ import (
|
||||||
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
// MaxStatusIDKey is for specifying the maximum ID of the status to retrieve.
|
|
||||||
MaxStatusIDKey = "max_id"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (m *Module) profileGETHandler(c *gin.Context) {
|
func (m *Module) profileGETHandler(c *gin.Context) {
|
||||||
ctx := c.Request.Context()
|
ctx := c.Request.Context()
|
||||||
|
|
||||||
|
// We'll need the instance later, and we can also use it
|
||||||
|
// before then to make it easier to return a web error.
|
||||||
|
instance, errWithCode := m.processor.InstanceGetV1(ctx)
|
||||||
|
if errWithCode != nil {
|
||||||
|
apiutil.WebErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return instance we already got from the db,
|
||||||
|
// don't try to fetch it again when erroring.
|
||||||
|
instanceGet := func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode) {
|
||||||
|
return instance, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse account targetUsername from the URL.
|
||||||
|
targetUsername, errWithCode := apiutil.ParseWebUsername(c.Param(apiutil.WebUsernameKey))
|
||||||
|
if errWithCode != nil {
|
||||||
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Normalize requested username:
|
||||||
|
//
|
||||||
|
// - Usernames on our instance are (currently) always lowercase.
|
||||||
|
//
|
||||||
|
// todo: Update this logic when different username patterns
|
||||||
|
// are allowed, and/or when status slugs are introduced.
|
||||||
|
targetUsername = strings.ToLower(targetUsername)
|
||||||
|
|
||||||
|
// Check what type of content is being requested. If we're getting an AP
|
||||||
|
// request on this endpoint we should render the AP representation instead.
|
||||||
|
accept, err := apiutil.NegotiateAccept(c, apiutil.HTMLOrActivityPubHeaders...)
|
||||||
|
if err != nil {
|
||||||
|
apiutil.WebErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if accept == string(apiutil.AppActivityJSON) || accept == string(apiutil.AppActivityLDJSON) {
|
||||||
|
// AP account representation has been requested.
|
||||||
|
m.returnAPAccount(c, targetUsername, accept, instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// text/html has been requested. Proceed with getting the web view of the account.
|
||||||
|
|
||||||
|
// Don't require auth for web endpoints, but do take it if it was provided.
|
||||||
|
// authed.Account might end up nil here, but that's fine in case of public pages.
|
||||||
authed, err := oauth.Authed(c, false, false, false, false)
|
authed, err := oauth.Authed(c, false, false, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
|
apiutil.WebErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
username := strings.ToLower(c.Param(usernameKey))
|
// Fetch the target account so we can do some checks on it.
|
||||||
if username == "" {
|
targetAccount, errWithCode := m.processor.Account().GetLocalByUsername(ctx, authed.Account, targetUsername)
|
||||||
err := errors.New("no account username specified")
|
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
instance, err := m.processor.InstanceGetV1(ctx)
|
|
||||||
if err != nil {
|
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorInternalError(err), m.processor.InstanceGetV1)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
instanceGet := func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode) {
|
|
||||||
return instance, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
account, errWithCode := m.processor.Account().GetLocalByUsername(ctx, authed.Account, username)
|
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// if we're getting an AP request on this endpoint we
|
// If target account is suspended, this page should not be visible.
|
||||||
// should render the account's AP representation instead
|
// TODO: change this to 410?
|
||||||
accept := apiutil.NegotiateFormat(c, string(apiutil.TextHTML), string(apiutil.AppActivityJSON), string(apiutil.AppActivityLDJSON))
|
if targetAccount.Suspended {
|
||||||
if accept == string(apiutil.AppActivityJSON) || accept == string(apiutil.AppActivityLDJSON) {
|
err := fmt.Errorf("target account %s is suspended", targetUsername)
|
||||||
m.returnAPProfile(c, username, accept)
|
apiutil.WebErrorHandler(c, gtserror.NewErrorNotFound(err), instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Only generate RSS link if account has RSS enabled.
|
||||||
var rssFeed string
|
var rssFeed string
|
||||||
if account.EnableRSS {
|
if targetAccount.EnableRSS {
|
||||||
rssFeed = "/@" + account.Username + "/feed.rss"
|
rssFeed = "/@" + targetAccount.Username + "/feed.rss"
|
||||||
}
|
}
|
||||||
|
|
||||||
// only allow search engines / robots to view this page if account is discoverable
|
// Only allow search engines / robots to
|
||||||
|
// index if account is discoverable.
|
||||||
var robotsMeta string
|
var robotsMeta string
|
||||||
if account.Discoverable {
|
if targetAccount.Discoverable {
|
||||||
robotsMeta = robotsMetaAllowSome
|
robotsMeta = robotsMetaAllowSome
|
||||||
}
|
}
|
||||||
|
|
||||||
// We need to change our response slightly if the
|
// We need to change our response slightly if the
|
||||||
// profile visitor is paging through statuses.
|
// profile visitor is paging through statuses.
|
||||||
var (
|
var (
|
||||||
paging bool
|
maxStatusID = apiutil.ParseMaxID(c.Query(apiutil.MaxIDKey), "")
|
||||||
pinnedResp = &apimodel.PageableResponse{}
|
paging = maxStatusID != ""
|
||||||
maxStatusID string
|
pinnedStatuses *apimodel.PageableResponse
|
||||||
)
|
)
|
||||||
|
|
||||||
if maxStatusIDString := c.Query(MaxStatusIDKey); maxStatusIDString != "" {
|
|
||||||
maxStatusID = maxStatusIDString
|
|
||||||
paging = true
|
|
||||||
}
|
|
||||||
|
|
||||||
statusResp, errWithCode := m.processor.Account().WebStatusesGet(ctx, account.ID, maxStatusID)
|
|
||||||
if errWithCode != nil {
|
|
||||||
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// If we're not paging, then the profile visitor
|
|
||||||
// is currently just opening the bare profile, so
|
|
||||||
// load pinned statuses so we can show them at the
|
|
||||||
// top of the profile.
|
|
||||||
if !paging {
|
if !paging {
|
||||||
pinnedResp, errWithCode = m.processor.Account().StatusesGet(ctx, authed.Account, account.ID, 0, false, false, "", "", true, false, false)
|
// Client opened bare profile (from the top)
|
||||||
|
// so load + display pinned statuses.
|
||||||
|
pinnedStatuses, errWithCode = m.processor.Account().PinnedStatusesGet(ctx, authed.Account, targetAccount.ID)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
} else {
|
||||||
|
// Don't load pinned statuses at
|
||||||
|
// the top of profile while paging.
|
||||||
|
pinnedStatuses = new(apimodel.PageableResponse)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get statuses from maxStatusID onwards (or from top if empty string).
|
||||||
|
statusResp, errWithCode := m.processor.Account().WebStatusesGet(ctx, targetAccount.ID, maxStatusID)
|
||||||
|
if errWithCode != nil {
|
||||||
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
stylesheets := []string{
|
stylesheets := []string{
|
||||||
|
@ -126,34 +151,41 @@ func (m *Module) profileGETHandler(c *gin.Context) {
|
||||||
distPathPrefix + "/profile.css",
|
distPathPrefix + "/profile.css",
|
||||||
}
|
}
|
||||||
if config.GetAccountsAllowCustomCSS() {
|
if config.GetAccountsAllowCustomCSS() {
|
||||||
stylesheets = append(stylesheets, "/@"+account.Username+"/custom.css")
|
stylesheets = append(stylesheets, "/@"+targetAccount.Username+"/custom.css")
|
||||||
}
|
}
|
||||||
|
|
||||||
c.HTML(http.StatusOK, "profile.tmpl", gin.H{
|
c.HTML(http.StatusOK, "profile.tmpl", gin.H{
|
||||||
"instance": instance,
|
"instance": instance,
|
||||||
"account": account,
|
"account": targetAccount,
|
||||||
"ogMeta": ogBase(instance).withAccount(account),
|
"ogMeta": ogBase(instance).withAccount(targetAccount),
|
||||||
"rssFeed": rssFeed,
|
"rssFeed": rssFeed,
|
||||||
"robotsMeta": robotsMeta,
|
"robotsMeta": robotsMeta,
|
||||||
"statuses": statusResp.Items,
|
"statuses": statusResp.Items,
|
||||||
"statuses_next": statusResp.NextLink,
|
"statuses_next": statusResp.NextLink,
|
||||||
"pinned_statuses": pinnedResp.Items,
|
"pinned_statuses": pinnedStatuses.Items,
|
||||||
"show_back_to_top": paging,
|
"show_back_to_top": paging,
|
||||||
"stylesheets": stylesheets,
|
"stylesheets": stylesheets,
|
||||||
"javascript": []string{distPathPrefix + "/frontend.js"},
|
"javascript": []string{distPathPrefix + "/frontend.js"},
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Module) returnAPProfile(c *gin.Context, username string, accept string) {
|
// returnAPAccount returns an ActivityPub representation of
|
||||||
user, errWithCode := m.processor.Fedi().UserGet(c.Request.Context(), username, c.Request.URL)
|
// target account. It will do http signature authentication.
|
||||||
|
func (m *Module) returnAPAccount(
|
||||||
|
c *gin.Context,
|
||||||
|
targetUsername string,
|
||||||
|
accept string,
|
||||||
|
instanceGet func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode),
|
||||||
|
) {
|
||||||
|
user, errWithCode := m.processor.Fedi().UserGet(c.Request.Context(), targetUsername, c.Request.URL)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
apiutil.WebErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
|
apiutil.WebErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
b, mErr := json.Marshal(user)
|
b, err := json.Marshal(user)
|
||||||
if mErr != nil {
|
if err != nil {
|
||||||
err := fmt.Errorf("could not marshal json: %s", mErr)
|
err := gtserror.Newf("could not marshal json: %w", err)
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorInternalError(err), m.processor.InstanceGetV1)
|
apiutil.WebErrorHandler(c, gtserror.NewErrorInternalError(err), m.processor.InstanceGetV1)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,7 +20,6 @@ package web
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -36,66 +35,97 @@ import (
|
||||||
func (m *Module) threadGETHandler(c *gin.Context) {
|
func (m *Module) threadGETHandler(c *gin.Context) {
|
||||||
ctx := c.Request.Context()
|
ctx := c.Request.Context()
|
||||||
|
|
||||||
|
// We'll need the instance later, and we can also use it
|
||||||
|
// before then to make it easier to return a web error.
|
||||||
|
instance, errWithCode := m.processor.InstanceGetV1(ctx)
|
||||||
|
if errWithCode != nil {
|
||||||
|
apiutil.WebErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return instance we already got from the db,
|
||||||
|
// don't try to fetch it again when erroring.
|
||||||
|
instanceGet := func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode) {
|
||||||
|
return instance, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse account targetUsername and status ID from the URL.
|
||||||
|
targetUsername, errWithCode := apiutil.ParseWebUsername(c.Param(apiutil.WebUsernameKey))
|
||||||
|
if errWithCode != nil {
|
||||||
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
targetStatusID, errWithCode := apiutil.ParseWebStatusID(c.Param(apiutil.WebStatusIDKey))
|
||||||
|
if errWithCode != nil {
|
||||||
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Normalize requested username + status ID:
|
||||||
|
//
|
||||||
|
// - Usernames on our instance are (currently) always lowercase.
|
||||||
|
// - StatusIDs on our instance are (currently) always ULIDs.
|
||||||
|
//
|
||||||
|
// todo: Update this logic when different username patterns
|
||||||
|
// are allowed, and/or when status slugs are introduced.
|
||||||
|
targetUsername = strings.ToLower(targetUsername)
|
||||||
|
targetStatusID = strings.ToUpper(targetStatusID)
|
||||||
|
|
||||||
|
// Check what type of content is being requested. If we're getting an AP
|
||||||
|
// request on this endpoint we should render the AP representation instead.
|
||||||
|
accept, err := apiutil.NegotiateAccept(c, apiutil.HTMLOrActivityPubHeaders...)
|
||||||
|
if err != nil {
|
||||||
|
apiutil.WebErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if accept == string(apiutil.AppActivityJSON) || accept == string(apiutil.AppActivityLDJSON) {
|
||||||
|
// AP status representation has been requested.
|
||||||
|
m.returnAPStatus(c, targetUsername, targetStatusID, accept, instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// text/html has been requested. Proceed with getting the web view of the status.
|
||||||
|
|
||||||
|
// Don't require auth for web endpoints, but do take it if it was provided.
|
||||||
|
// authed.Account might end up nil here, but that's fine in case of public pages.
|
||||||
authed, err := oauth.Authed(c, false, false, false, false)
|
authed, err := oauth.Authed(c, false, false, false, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
|
apiutil.WebErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// usernames on our instance will always be lowercase
|
// Fetch the target account so we can do some checks on it.
|
||||||
username := strings.ToLower(c.Param(usernameKey))
|
targetAccount, errWithCode := m.processor.Account().GetLocalByUsername(ctx, authed.Account, targetUsername)
|
||||||
if username == "" {
|
|
||||||
err := errors.New("no account username specified")
|
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// status ids will always be uppercase
|
|
||||||
statusID := strings.ToUpper(c.Param(statusIDKey))
|
|
||||||
if statusID == "" {
|
|
||||||
err := errors.New("no status id specified")
|
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
instance, err := m.processor.InstanceGetV1(ctx)
|
|
||||||
if err != nil {
|
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorInternalError(err), m.processor.InstanceGetV1)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
instanceGet := func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode) {
|
|
||||||
return instance, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// do this check to make sure the status is actually from a local account,
|
|
||||||
// we shouldn't render threads from statuses that don't belong to us!
|
|
||||||
if _, errWithCode := m.processor.Account().GetLocalByUsername(ctx, authed.Account, username); errWithCode != nil {
|
|
||||||
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
status, errWithCode := m.processor.Status().Get(ctx, authed.Account, statusID)
|
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if !strings.EqualFold(username, status.Account.Username) {
|
// If target account is suspended, this page should not be visible.
|
||||||
err := gtserror.NewErrorNotFound(errors.New("path username not equal to status author username"))
|
if targetAccount.Suspended {
|
||||||
|
err := fmt.Errorf("target account %s is suspended", targetUsername)
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorNotFound(err), instanceGet)
|
apiutil.WebErrorHandler(c, gtserror.NewErrorNotFound(err), instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// if we're getting an AP request on this endpoint we
|
// Get the status itself from the processor using provided ID and authorization (if any).
|
||||||
// should render the status's AP representation instead
|
status, errWithCode := m.processor.Status().Get(ctx, authed.Account, targetStatusID)
|
||||||
accept := apiutil.NegotiateFormat(c, string(apiutil.TextHTML), string(apiutil.AppActivityJSON), string(apiutil.AppActivityLDJSON))
|
if errWithCode != nil {
|
||||||
if accept == string(apiutil.AppActivityJSON) || accept == string(apiutil.AppActivityLDJSON) {
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
m.returnAPStatus(c, username, statusID, accept)
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
context, errWithCode := m.processor.Status().ContextGet(ctx, authed.Account, statusID)
|
// Ensure status actually belongs to target account.
|
||||||
|
if status.GetAccountID() != targetAccount.ID {
|
||||||
|
err := fmt.Errorf("target account %s does not own status %s", targetUsername, targetStatusID)
|
||||||
|
apiutil.WebErrorHandler(c, gtserror.NewErrorNotFound(err), instanceGet)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fill in the rest of the thread context.
|
||||||
|
context, errWithCode := m.processor.Status().ContextGet(ctx, authed.Account, targetStatusID)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
return
|
return
|
||||||
|
@ -106,7 +136,7 @@ func (m *Module) threadGETHandler(c *gin.Context) {
|
||||||
distPathPrefix + "/status.css",
|
distPathPrefix + "/status.css",
|
||||||
}
|
}
|
||||||
if config.GetAccountsAllowCustomCSS() {
|
if config.GetAccountsAllowCustomCSS() {
|
||||||
stylesheets = append(stylesheets, "/@"+username+"/custom.css")
|
stylesheets = append(stylesheets, "/@"+targetUsername+"/custom.css")
|
||||||
}
|
}
|
||||||
|
|
||||||
c.HTML(http.StatusOK, "thread.tmpl", gin.H{
|
c.HTML(http.StatusOK, "thread.tmpl", gin.H{
|
||||||
|
@ -119,17 +149,25 @@ func (m *Module) threadGETHandler(c *gin.Context) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Module) returnAPStatus(c *gin.Context, username string, statusID string, accept string) {
|
// returnAPStatus returns an ActivityPub representation of target status,
|
||||||
status, errWithCode := m.processor.Fedi().StatusGet(c.Request.Context(), username, statusID)
|
// created by targetUsername. It will do http signature authentication.
|
||||||
|
func (m *Module) returnAPStatus(
|
||||||
|
c *gin.Context,
|
||||||
|
targetUsername string,
|
||||||
|
targetStatusID string,
|
||||||
|
accept string,
|
||||||
|
instanceGet func(ctx context.Context) (*apimodel.InstanceV1, gtserror.WithCode),
|
||||||
|
) {
|
||||||
|
status, errWithCode := m.processor.Fedi().StatusGet(c.Request.Context(), targetUsername, targetStatusID)
|
||||||
if errWithCode != nil {
|
if errWithCode != nil {
|
||||||
apiutil.WebErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
|
apiutil.WebErrorHandler(c, errWithCode, instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
b, mErr := json.Marshal(status)
|
b, err := json.Marshal(status)
|
||||||
if mErr != nil {
|
if err != nil {
|
||||||
err := fmt.Errorf("could not marshal json: %s", mErr)
|
err := gtserror.Newf("could not marshal json: %w", err)
|
||||||
apiutil.WebErrorHandler(c, gtserror.NewErrorInternalError(err), m.processor.InstanceGetV1)
|
apiutil.WebErrorHandler(c, gtserror.NewErrorInternalError(err), instanceGet)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue