2017-03-22 02:32:27 +01:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-01-22 14:24:22 +01:00
|
|
|
class ResolveURLService < BaseService
|
2017-08-14 14:08:34 +02:00
|
|
|
include JsonLdHelper
|
2018-08-15 19:33:36 +02:00
|
|
|
include Authorization
|
2017-08-14 14:08:34 +02:00
|
|
|
|
2022-11-10 05:49:30 +01:00
|
|
|
USERNAME_STATUS_RE = %r{/@(?<username>#{Account::USERNAME_RE})/(?<status_id>[0-9]+)\Z}
|
|
|
|
|
2018-08-15 19:33:36 +02:00
|
|
|
def call(url, on_behalf_of: nil)
|
2019-07-10 18:59:28 +02:00
|
|
|
@url = url
|
2018-08-15 19:33:36 +02:00
|
|
|
@on_behalf_of = on_behalf_of
|
2017-07-12 00:39:15 +02:00
|
|
|
|
2019-07-10 18:59:28 +02:00
|
|
|
if local_url?
|
|
|
|
process_local_url
|
|
|
|
elsif !fetched_resource.nil?
|
|
|
|
process_url
|
2020-03-12 23:06:43 +01:00
|
|
|
else
|
2020-01-03 05:01:45 +01:00
|
|
|
process_url_from_db
|
2019-07-10 18:59:28 +02:00
|
|
|
end
|
2017-05-05 17:26:04 +02:00
|
|
|
end
|
2017-03-22 02:32:27 +01:00
|
|
|
|
2017-05-05 17:26:04 +02:00
|
|
|
private
|
2017-03-22 02:32:27 +01:00
|
|
|
|
2017-05-05 17:26:04 +02:00
|
|
|
def process_url
|
2022-09-21 22:45:57 +02:00
|
|
|
if equals_or_includes_any?(type, ActivityPub::FetchRemoteActorService::SUPPORTED_TYPES)
|
|
|
|
ActivityPub::FetchRemoteActorService.new.call(resource_url, prefetched_body: body)
|
2019-06-26 19:32:36 +02:00
|
|
|
elsif equals_or_includes_any?(type, ActivityPub::Activity::Create::SUPPORTED_TYPES + ActivityPub::Activity::Create::CONVERTED_TYPES)
|
2019-12-17 13:32:57 +01:00
|
|
|
status = FetchRemoteStatusService.new.call(resource_url, body)
|
2019-07-15 02:29:04 +02:00
|
|
|
authorize_with @on_behalf_of, status, :show? unless status.nil?
|
|
|
|
status
|
2017-03-22 02:32:27 +01:00
|
|
|
end
|
|
|
|
end
|
2017-05-05 17:26:04 +02:00
|
|
|
|
2020-01-03 05:01:45 +01:00
|
|
|
def process_url_from_db
|
2022-04-28 20:19:10 +02:00
|
|
|
if [500, 502, 503, 504, nil].include?(fetch_resource_service.response_code)
|
|
|
|
account = Account.find_by(uri: @url)
|
|
|
|
return account unless account.nil?
|
|
|
|
end
|
|
|
|
|
2020-03-12 23:06:43 +01:00
|
|
|
return unless @on_behalf_of.present? && [401, 403, 404].include?(fetch_resource_service.response_code)
|
|
|
|
|
2020-01-03 05:01:45 +01:00
|
|
|
# It may happen that the resource is a private toot, and thus not fetchable,
|
|
|
|
# but we can return the toot if we already know about it.
|
2020-12-17 06:51:49 +01:00
|
|
|
scope = Status.where(uri: @url)
|
|
|
|
|
|
|
|
# We don't have an index on `url`, so try guessing the `uri` from `url`
|
|
|
|
parsed_url = Addressable::URI.parse(@url)
|
2022-11-10 05:49:30 +01:00
|
|
|
parsed_url.path.match(USERNAME_STATUS_RE) do |matched|
|
2020-12-17 06:51:49 +01:00
|
|
|
parsed_url.path = "/users/#{matched[:username]}/statuses/#{matched[:status_id]}"
|
|
|
|
scope = scope.or(Status.where(uri: parsed_url.to_s, url: @url))
|
|
|
|
end
|
|
|
|
|
|
|
|
status = scope.first
|
|
|
|
|
2020-01-03 05:01:45 +01:00
|
|
|
authorize_with @on_behalf_of, status, :show? unless status.nil?
|
|
|
|
status
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2019-07-10 18:59:28 +02:00
|
|
|
def fetched_resource
|
2020-03-12 23:06:43 +01:00
|
|
|
@fetched_resource ||= fetch_resource_service.call(@url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def fetch_resource_service
|
|
|
|
@_fetch_resource_service ||= FetchResourceService.new
|
2017-05-05 17:26:04 +02:00
|
|
|
end
|
|
|
|
|
2019-07-10 18:59:28 +02:00
|
|
|
def resource_url
|
|
|
|
fetched_resource.first
|
2017-05-05 17:26:04 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
def body
|
2019-07-10 18:59:28 +02:00
|
|
|
fetched_resource.second[:prefetched_body]
|
2017-05-05 17:26:04 +02:00
|
|
|
end
|
|
|
|
|
2017-08-14 14:08:34 +02:00
|
|
|
def type
|
2019-12-17 13:32:57 +01:00
|
|
|
json_data['type']
|
2017-08-14 14:08:34 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
def json_data
|
2019-07-10 18:59:28 +02:00
|
|
|
@json_data ||= body_to_json(body)
|
2017-05-05 17:26:04 +02:00
|
|
|
end
|
2017-07-12 00:39:15 +02:00
|
|
|
|
|
|
|
def local_url?
|
|
|
|
TagManager.instance.local_url?(@url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def process_local_url
|
|
|
|
recognized_params = Rails.application.routes.recognize_path(@url)
|
|
|
|
|
2023-06-29 14:48:54 +02:00
|
|
|
case recognized_params[:controller]
|
|
|
|
when 'statuses'
|
|
|
|
return unless recognized_params[:action] == 'show'
|
2017-07-12 00:39:15 +02:00
|
|
|
|
|
|
|
status = Status.find_by(id: recognized_params[:id])
|
|
|
|
check_local_status(status)
|
2023-06-29 14:48:54 +02:00
|
|
|
when 'accounts'
|
|
|
|
return unless recognized_params[:action] == 'show'
|
|
|
|
|
2017-07-12 00:39:15 +02:00
|
|
|
Account.find_local(recognized_params[:username])
|
2023-06-29 14:48:54 +02:00
|
|
|
when 'home'
|
|
|
|
return unless recognized_params[:action] == 'index' && recognized_params[:username_with_domain].present?
|
|
|
|
|
|
|
|
if recognized_params[:any]&.match?(/\A[0-9]+\Z/)
|
|
|
|
status = Status.find_by(id: recognized_params[:any])
|
|
|
|
check_local_status(status)
|
|
|
|
elsif recognized_params[:any].blank?
|
|
|
|
username, domain = recognized_params[:username_with_domain].gsub(/\A@/, '').split('@')
|
|
|
|
return unless username.present? && domain.present?
|
|
|
|
|
|
|
|
Account.find_remote(username, domain)
|
|
|
|
end
|
2017-07-12 00:39:15 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def check_local_status(status)
|
|
|
|
return if status.nil?
|
2019-07-10 18:59:28 +02:00
|
|
|
|
2018-08-15 19:33:36 +02:00
|
|
|
authorize_with @on_behalf_of, status, :show?
|
|
|
|
status
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
nil
|
2017-07-12 00:39:15 +02:00
|
|
|
end
|
2017-03-22 02:32:27 +01:00
|
|
|
end
|