2017-03-22 12:32:27 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-01-23 00:24:22 +11:00
|
|
|
class ResolveURLService < BaseService
|
2017-08-14 22:08:34 +10:00
|
|
|
include JsonLdHelper
|
2018-08-16 03:33:36 +10:00
|
|
|
include Authorization
|
2017-08-14 22:08:34 +10:00
|
|
|
|
2018-08-16 03:33:36 +10:00
|
|
|
def call(url, on_behalf_of: nil)
|
2019-07-11 02:59:28 +10:00
|
|
|
@url = url
|
2018-08-16 03:33:36 +10:00
|
|
|
@on_behalf_of = on_behalf_of
|
2017-07-12 08:39:15 +10:00
|
|
|
|
2019-07-11 02:59:28 +10:00
|
|
|
if local_url?
|
|
|
|
process_local_url
|
|
|
|
elsif !fetched_resource.nil?
|
|
|
|
process_url
|
2020-03-13 09:06:43 +11:00
|
|
|
else
|
2020-01-03 15:01:45 +11:00
|
|
|
process_url_from_db
|
2019-07-11 02:59:28 +10:00
|
|
|
end
|
2017-05-06 01:26:04 +10:00
|
|
|
end
|
2017-03-22 12:32:27 +11:00
|
|
|
|
2017-05-06 01:26:04 +10:00
|
|
|
private
|
2017-03-22 12:32:27 +11:00
|
|
|
|
2017-05-06 01:26:04 +10:00
|
|
|
def process_url
|
2019-06-27 03:32:36 +10:00
|
|
|
if equals_or_includes_any?(type, ActivityPub::FetchRemoteAccountService::SUPPORTED_TYPES)
|
2019-12-17 23:32:57 +11:00
|
|
|
ActivityPub::FetchRemoteAccountService.new.call(resource_url, prefetched_body: body)
|
2019-06-27 03:32:36 +10:00
|
|
|
elsif equals_or_includes_any?(type, ActivityPub::Activity::Create::SUPPORTED_TYPES + ActivityPub::Activity::Create::CONVERTED_TYPES)
|
2019-12-17 23:32:57 +11:00
|
|
|
status = FetchRemoteStatusService.new.call(resource_url, body)
|
2019-07-15 10:29:04 +10:00
|
|
|
authorize_with @on_behalf_of, status, :show? unless status.nil?
|
|
|
|
status
|
2017-03-22 12:32:27 +11:00
|
|
|
end
|
|
|
|
end
|
2017-05-06 01:26:04 +10:00
|
|
|
|
2020-01-03 15:01:45 +11:00
|
|
|
def process_url_from_db
|
2022-04-29 04:19:10 +10:00
|
|
|
if [500, 502, 503, 504, nil].include?(fetch_resource_service.response_code)
|
|
|
|
account = Account.find_by(uri: @url)
|
|
|
|
return account unless account.nil?
|
|
|
|
end
|
|
|
|
|
2020-03-13 09:06:43 +11:00
|
|
|
return unless @on_behalf_of.present? && [401, 403, 404].include?(fetch_resource_service.response_code)
|
|
|
|
|
2020-01-03 15:01:45 +11:00
|
|
|
# It may happen that the resource is a private toot, and thus not fetchable,
|
|
|
|
# but we can return the toot if we already know about it.
|
2020-12-17 16:51:49 +11:00
|
|
|
scope = Status.where(uri: @url)
|
|
|
|
|
|
|
|
# We don't have an index on `url`, so try guessing the `uri` from `url`
|
|
|
|
parsed_url = Addressable::URI.parse(@url)
|
|
|
|
parsed_url.path.match(%r{/@(?<username>#{Account::USERNAME_RE})/(?<status_id>[0-9]+)\Z}) do |matched|
|
|
|
|
parsed_url.path = "/users/#{matched[:username]}/statuses/#{matched[:status_id]}"
|
|
|
|
scope = scope.or(Status.where(uri: parsed_url.to_s, url: @url))
|
|
|
|
end
|
|
|
|
|
|
|
|
status = scope.first
|
|
|
|
|
2020-01-03 15:01:45 +11:00
|
|
|
authorize_with @on_behalf_of, status, :show? unless status.nil?
|
|
|
|
status
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2019-07-11 02:59:28 +10:00
|
|
|
def fetched_resource
|
2020-03-13 09:06:43 +11:00
|
|
|
@fetched_resource ||= fetch_resource_service.call(@url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def fetch_resource_service
|
|
|
|
@_fetch_resource_service ||= FetchResourceService.new
|
2017-05-06 01:26:04 +10:00
|
|
|
end
|
|
|
|
|
2019-07-11 02:59:28 +10:00
|
|
|
def resource_url
|
|
|
|
fetched_resource.first
|
2017-05-06 01:26:04 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
def body
|
2019-07-11 02:59:28 +10:00
|
|
|
fetched_resource.second[:prefetched_body]
|
2017-05-06 01:26:04 +10:00
|
|
|
end
|
|
|
|
|
2017-08-14 22:08:34 +10:00
|
|
|
def type
|
2019-12-17 23:32:57 +11:00
|
|
|
json_data['type']
|
2017-08-14 22:08:34 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
def json_data
|
2019-07-11 02:59:28 +10:00
|
|
|
@json_data ||= body_to_json(body)
|
2017-05-06 01:26:04 +10:00
|
|
|
end
|
2017-07-12 08:39:15 +10:00
|
|
|
|
|
|
|
def local_url?
|
|
|
|
TagManager.instance.local_url?(@url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def process_local_url
|
|
|
|
recognized_params = Rails.application.routes.recognize_path(@url)
|
|
|
|
|
|
|
|
return unless recognized_params[:action] == 'show'
|
|
|
|
|
2019-07-08 00:16:51 +10:00
|
|
|
if recognized_params[:controller] == 'statuses'
|
2017-07-12 08:39:15 +10:00
|
|
|
status = Status.find_by(id: recognized_params[:id])
|
|
|
|
check_local_status(status)
|
|
|
|
elsif recognized_params[:controller] == 'accounts'
|
|
|
|
Account.find_local(recognized_params[:username])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def check_local_status(status)
|
|
|
|
return if status.nil?
|
2019-07-11 02:59:28 +10:00
|
|
|
|
2018-08-16 03:33:36 +10:00
|
|
|
authorize_with @on_behalf_of, status, :show?
|
|
|
|
status
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
nil
|
2017-07-12 08:39:15 +10:00
|
|
|
end
|
2017-03-22 12:32:27 +11:00
|
|
|
end
|