* Fix already-known remote private toots not being searchable by URL Whenever an URL search fails, and an account is provided, try getting a private status matching that URL from database. * Fix searching by `id` field instead of `uri`
		
			
				
	
	
		
			86 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			86 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| class ResolveURLService < BaseService
 | |
|   include JsonLdHelper
 | |
|   include Authorization
 | |
| 
 | |
|   def call(url, on_behalf_of: nil)
 | |
|     @url          = url
 | |
|     @on_behalf_of = on_behalf_of
 | |
| 
 | |
|     if local_url?
 | |
|       process_local_url
 | |
|     elsif !fetched_resource.nil?
 | |
|       process_url
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   private
 | |
| 
 | |
|   def process_url
 | |
|     if equals_or_includes_any?(type, ActivityPub::FetchRemoteAccountService::SUPPORTED_TYPES)
 | |
|       FetchRemoteAccountService.new.call(resource_url, body, protocol)
 | |
|     elsif equals_or_includes_any?(type, ActivityPub::Activity::Create::SUPPORTED_TYPES + ActivityPub::Activity::Create::CONVERTED_TYPES)
 | |
|       status = FetchRemoteStatusService.new.call(resource_url, body, protocol)
 | |
|       authorize_with @on_behalf_of, status, :show? unless status.nil?
 | |
|       status
 | |
|     elsif fetched_resource.nil? && @on_behalf_of.present?
 | |
|       # It may happen that the resource is a private toot, and thus not fetchable,
 | |
|       # but we can return the toot if we already know about it.
 | |
|       status = Status.find_by(uri: @url) || Status.find_by(url: @url)
 | |
|       authorize_with @on_behalf_of, status, :show? unless status.nil?
 | |
|       status
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def fetched_resource
 | |
|     @fetched_resource ||= FetchResourceService.new.call(@url)
 | |
|   end
 | |
| 
 | |
|   def resource_url
 | |
|     fetched_resource.first
 | |
|   end
 | |
| 
 | |
|   def body
 | |
|     fetched_resource.second[:prefetched_body]
 | |
|   end
 | |
| 
 | |
|   def protocol
 | |
|     fetched_resource.third
 | |
|   end
 | |
| 
 | |
|   def type
 | |
|     return json_data['type'] if protocol == :activitypub
 | |
|   end
 | |
| 
 | |
|   def json_data
 | |
|     @json_data ||= body_to_json(body)
 | |
|   end
 | |
| 
 | |
|   def local_url?
 | |
|     TagManager.instance.local_url?(@url)
 | |
|   end
 | |
| 
 | |
|   def process_local_url
 | |
|     recognized_params = Rails.application.routes.recognize_path(@url)
 | |
| 
 | |
|     return unless recognized_params[:action] == 'show'
 | |
| 
 | |
|     if recognized_params[:controller] == 'statuses'
 | |
|       status = Status.find_by(id: recognized_params[:id])
 | |
|       check_local_status(status)
 | |
|     elsif recognized_params[:controller] == 'accounts'
 | |
|       Account.find_local(recognized_params[:username])
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def check_local_status(status)
 | |
|     return if status.nil?
 | |
| 
 | |
|     authorize_with @on_behalf_of, status, :show?
 | |
|     status
 | |
|   rescue Mastodon::NotPermittedError
 | |
|     nil
 | |
|   end
 | |
| end
 |