2017-03-22 01:32:27 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-01-22 13:24:22 +00:00
|
|
|
class ResolveURLService < BaseService
|
2017-08-14 12:08:34 +00:00
|
|
|
include JsonLdHelper
|
2018-08-15 17:33:36 +00:00
|
|
|
include Authorization
|
2017-08-14 12:08:34 +00:00
|
|
|
|
2022-11-10 04:49:30 +00:00
|
|
|
USERNAME_STATUS_RE = %r{/@(?<username>#{Account::USERNAME_RE})/(?<status_id>[0-9]+)\Z}
|
|
|
|
|
2018-08-15 17:33:36 +00:00
|
|
|
def call(url, on_behalf_of: nil)
|
2019-07-10 16:59:28 +00:00
|
|
|
@url = url
|
2018-08-15 17:33:36 +00:00
|
|
|
@on_behalf_of = on_behalf_of
|
2017-07-11 22:39:15 +00:00
|
|
|
|
2019-07-10 16:59:28 +00:00
|
|
|
if local_url?
|
|
|
|
process_local_url
|
|
|
|
elsif !fetched_resource.nil?
|
|
|
|
process_url
|
2020-03-12 22:06:43 +00:00
|
|
|
else
|
2020-01-03 04:01:45 +00:00
|
|
|
process_url_from_db
|
2019-07-10 16:59:28 +00:00
|
|
|
end
|
2017-05-05 15:26:04 +00:00
|
|
|
end
|
2017-03-22 01:32:27 +00:00
|
|
|
|
2017-05-05 15:26:04 +00:00
|
|
|
private
|
2017-03-22 01:32:27 +00:00
|
|
|
|
2017-05-05 15:26:04 +00:00
|
|
|
def process_url
|
2022-09-21 20:45:57 +00:00
|
|
|
if equals_or_includes_any?(type, ActivityPub::FetchRemoteActorService::SUPPORTED_TYPES)
|
|
|
|
ActivityPub::FetchRemoteActorService.new.call(resource_url, prefetched_body: body)
|
2019-06-26 17:32:36 +00:00
|
|
|
elsif equals_or_includes_any?(type, ActivityPub::Activity::Create::SUPPORTED_TYPES + ActivityPub::Activity::Create::CONVERTED_TYPES)
|
2023-02-10 21:16:37 +00:00
|
|
|
status = FetchRemoteStatusService.new.call(resource_url, prefetched_body: body)
|
2019-07-15 00:29:04 +00:00
|
|
|
authorize_with @on_behalf_of, status, :show? unless status.nil?
|
|
|
|
status
|
2017-03-22 01:32:27 +00:00
|
|
|
end
|
|
|
|
end
|
2017-05-05 15:26:04 +00:00
|
|
|
|
2020-01-03 04:01:45 +00:00
|
|
|
def process_url_from_db
|
2022-04-28 18:19:10 +00:00
|
|
|
if [500, 502, 503, 504, nil].include?(fetch_resource_service.response_code)
|
|
|
|
account = Account.find_by(uri: @url)
|
|
|
|
return account unless account.nil?
|
|
|
|
end
|
|
|
|
|
2020-03-12 22:06:43 +00:00
|
|
|
return unless @on_behalf_of.present? && [401, 403, 404].include?(fetch_resource_service.response_code)
|
|
|
|
|
2020-01-03 04:01:45 +00:00
|
|
|
# It may happen that the resource is a private toot, and thus not fetchable,
|
|
|
|
# but we can return the toot if we already know about it.
|
2020-12-17 05:51:49 +00:00
|
|
|
scope = Status.where(uri: @url)
|
|
|
|
|
|
|
|
# We don't have an index on `url`, so try guessing the `uri` from `url`
|
|
|
|
parsed_url = Addressable::URI.parse(@url)
|
2022-11-10 04:49:30 +00:00
|
|
|
parsed_url.path.match(USERNAME_STATUS_RE) do |matched|
|
2020-12-17 05:51:49 +00:00
|
|
|
parsed_url.path = "/users/#{matched[:username]}/statuses/#{matched[:status_id]}"
|
|
|
|
scope = scope.or(Status.where(uri: parsed_url.to_s, url: @url))
|
|
|
|
end
|
|
|
|
|
|
|
|
status = scope.first
|
|
|
|
|
2020-01-03 04:01:45 +00:00
|
|
|
authorize_with @on_behalf_of, status, :show? unless status.nil?
|
|
|
|
status
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2019-07-10 16:59:28 +00:00
|
|
|
def fetched_resource
|
2020-03-12 22:06:43 +00:00
|
|
|
@fetched_resource ||= fetch_resource_service.call(@url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def fetch_resource_service
|
2023-07-12 08:08:51 +00:00
|
|
|
@fetch_resource_service ||= FetchResourceService.new
|
2017-05-05 15:26:04 +00:00
|
|
|
end
|
|
|
|
|
2019-07-10 16:59:28 +00:00
|
|
|
def resource_url
|
|
|
|
fetched_resource.first
|
2017-05-05 15:26:04 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def body
|
2019-07-10 16:59:28 +00:00
|
|
|
fetched_resource.second[:prefetched_body]
|
2017-05-05 15:26:04 +00:00
|
|
|
end
|
|
|
|
|
2017-08-14 12:08:34 +00:00
|
|
|
def type
|
2019-12-17 12:32:57 +00:00
|
|
|
json_data['type']
|
2017-08-14 12:08:34 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def json_data
|
2019-07-10 16:59:28 +00:00
|
|
|
@json_data ||= body_to_json(body)
|
2017-05-05 15:26:04 +00:00
|
|
|
end
|
2017-07-11 22:39:15 +00:00
|
|
|
|
|
|
|
def local_url?
|
|
|
|
TagManager.instance.local_url?(@url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def process_local_url
|
|
|
|
recognized_params = Rails.application.routes.recognize_path(@url)
|
|
|
|
|
2023-06-29 12:48:54 +00:00
|
|
|
case recognized_params[:controller]
|
|
|
|
when 'statuses'
|
|
|
|
return unless recognized_params[:action] == 'show'
|
2017-07-11 22:39:15 +00:00
|
|
|
|
|
|
|
status = Status.find_by(id: recognized_params[:id])
|
|
|
|
check_local_status(status)
|
2023-06-29 12:48:54 +00:00
|
|
|
when 'accounts'
|
|
|
|
return unless recognized_params[:action] == 'show'
|
|
|
|
|
2017-07-11 22:39:15 +00:00
|
|
|
Account.find_local(recognized_params[:username])
|
2023-06-29 12:48:54 +00:00
|
|
|
when 'home'
|
|
|
|
return unless recognized_params[:action] == 'index' && recognized_params[:username_with_domain].present?
|
|
|
|
|
|
|
|
if recognized_params[:any]&.match?(/\A[0-9]+\Z/)
|
|
|
|
status = Status.find_by(id: recognized_params[:any])
|
|
|
|
check_local_status(status)
|
|
|
|
elsif recognized_params[:any].blank?
|
|
|
|
username, domain = recognized_params[:username_with_domain].gsub(/\A@/, '').split('@')
|
|
|
|
return unless username.present? && domain.present?
|
|
|
|
|
|
|
|
Account.find_remote(username, domain)
|
|
|
|
end
|
2017-07-11 22:39:15 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def check_local_status(status)
|
|
|
|
return if status.nil?
|
2019-07-10 16:59:28 +00:00
|
|
|
|
2018-08-15 17:33:36 +00:00
|
|
|
authorize_with @on_behalf_of, status, :show?
|
|
|
|
status
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
nil
|
2017-07-11 22:39:15 +00:00
|
|
|
end
|
2017-03-22 01:32:27 +00:00
|
|
|
end
|