234 lines
6.6 KiB
Go
234 lines
6.6 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package typeutils
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
"slices"
|
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
)
|
|
|
|
func APIVisToVis(m apimodel.Visibility) gtsmodel.Visibility {
|
|
switch m {
|
|
case apimodel.VisibilityPublic:
|
|
return gtsmodel.VisibilityPublic
|
|
case apimodel.VisibilityUnlisted:
|
|
return gtsmodel.VisibilityUnlocked
|
|
case apimodel.VisibilityPrivate:
|
|
return gtsmodel.VisibilityFollowersOnly
|
|
case apimodel.VisibilityMutualsOnly:
|
|
return gtsmodel.VisibilityMutualsOnly
|
|
case apimodel.VisibilityDirect:
|
|
return gtsmodel.VisibilityDirect
|
|
case apimodel.VisibilityNone:
|
|
return gtsmodel.VisibilityNone
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func APIMarkerNameToMarkerName(m apimodel.MarkerName) gtsmodel.MarkerName {
|
|
switch m {
|
|
case apimodel.MarkerNameHome:
|
|
return gtsmodel.MarkerNameHome
|
|
case apimodel.MarkerNameNotifications:
|
|
return gtsmodel.MarkerNameNotifications
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func APIFilterActionToFilterAction(m apimodel.FilterAction) gtsmodel.FilterAction {
|
|
switch m {
|
|
case apimodel.FilterActionWarn:
|
|
return gtsmodel.FilterActionWarn
|
|
case apimodel.FilterActionHide:
|
|
return gtsmodel.FilterActionHide
|
|
}
|
|
return gtsmodel.FilterActionNone
|
|
}
|
|
|
|
func APIPolicyValueToPolicyValue(u apimodel.PolicyValue) (gtsmodel.PolicyValue, error) {
|
|
switch u {
|
|
case apimodel.PolicyValuePublic:
|
|
return gtsmodel.PolicyValuePublic, nil
|
|
|
|
case apimodel.PolicyValueFollowers:
|
|
return gtsmodel.PolicyValueFollowers, nil
|
|
|
|
case apimodel.PolicyValueFollowing:
|
|
return gtsmodel.PolicyValueFollowing, nil
|
|
|
|
case apimodel.PolicyValueMutuals:
|
|
return gtsmodel.PolicyValueMutuals, nil
|
|
|
|
case apimodel.PolicyValueMentioned:
|
|
return gtsmodel.PolicyValueMentioned, nil
|
|
|
|
case apimodel.PolicyValueAuthor:
|
|
return gtsmodel.PolicyValueAuthor, nil
|
|
|
|
case apimodel.PolicyValueMe:
|
|
err := fmt.Errorf("policyURI %s has no corresponding internal model", apimodel.PolicyValueMe)
|
|
return "", err
|
|
|
|
default:
|
|
// Parse URI to ensure it's a
|
|
// url with a valid protocol.
|
|
url, err := url.Parse(string(u))
|
|
if err != nil {
|
|
err := fmt.Errorf("could not parse non-predefined policy value as uri: %w", err)
|
|
return "", err
|
|
}
|
|
|
|
if url.Host != "http" && url.Host != "https" {
|
|
err := fmt.Errorf("non-predefined policy values must have protocol 'http' or 'https' (%s)", u)
|
|
return "", err
|
|
}
|
|
|
|
return gtsmodel.PolicyValue(u), nil
|
|
}
|
|
}
|
|
|
|
func APIInteractionPolicyToInteractionPolicy(
|
|
p *apimodel.InteractionPolicy,
|
|
v apimodel.Visibility,
|
|
) (*gtsmodel.InteractionPolicy, error) {
|
|
visibility := APIVisToVis(v)
|
|
|
|
convertURIs := func(apiURIs []apimodel.PolicyValue) (gtsmodel.PolicyValues, error) {
|
|
policyURIs := gtsmodel.PolicyValues{}
|
|
for _, apiURI := range apiURIs {
|
|
uri, err := APIPolicyValueToPolicyValue(apiURI)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if !uri.FeasibleForVisibility(visibility) {
|
|
err := fmt.Errorf("policyURI %s is not feasible for visibility %s", apiURI, v)
|
|
return nil, err
|
|
}
|
|
|
|
policyURIs = append(policyURIs, uri)
|
|
}
|
|
return policyURIs, nil
|
|
}
|
|
|
|
canLikeAlways, err := convertURIs(p.CanFavourite.Always)
|
|
if err != nil {
|
|
err := fmt.Errorf("error converting %s.can_favourite.always: %w", v, err)
|
|
return nil, err
|
|
}
|
|
|
|
canLikeWithApproval, err := convertURIs(p.CanFavourite.WithApproval)
|
|
if err != nil {
|
|
err := fmt.Errorf("error converting %s.can_favourite.with_approval: %w", v, err)
|
|
return nil, err
|
|
}
|
|
|
|
canReplyAlways, err := convertURIs(p.CanReply.Always)
|
|
if err != nil {
|
|
err := fmt.Errorf("error converting %s.can_reply.always: %w", v, err)
|
|
return nil, err
|
|
}
|
|
|
|
canReplyWithApproval, err := convertURIs(p.CanReply.WithApproval)
|
|
if err != nil {
|
|
err := fmt.Errorf("error converting %s.can_reply.with_approval: %w", v, err)
|
|
return nil, err
|
|
}
|
|
|
|
canAnnounceAlways, err := convertURIs(p.CanReblog.Always)
|
|
if err != nil {
|
|
err := fmt.Errorf("error converting %s.can_reblog.always: %w", v, err)
|
|
return nil, err
|
|
}
|
|
|
|
canAnnounceWithApproval, err := convertURIs(p.CanReblog.WithApproval)
|
|
if err != nil {
|
|
err := fmt.Errorf("error converting %s.can_reblog.with_approval: %w", v, err)
|
|
return nil, err
|
|
}
|
|
|
|
// Normalize URIs.
|
|
//
|
|
// 1. Ensure canLikeAlways, canReplyAlways,
|
|
// and canAnnounceAlways include self
|
|
// (either explicitly or within public).
|
|
|
|
// ensureIncludesSelf adds the "author" PolicyValue
|
|
// to given slice of PolicyValues, if not already
|
|
// explicitly or implicitly included.
|
|
ensureIncludesSelf := func(vals gtsmodel.PolicyValues) gtsmodel.PolicyValues {
|
|
includesSelf := slices.ContainsFunc(
|
|
vals,
|
|
func(uri gtsmodel.PolicyValue) bool {
|
|
return uri == gtsmodel.PolicyValuePublic ||
|
|
uri == gtsmodel.PolicyValueAuthor
|
|
},
|
|
)
|
|
|
|
if includesSelf {
|
|
// This slice of policy values
|
|
// already includes self explicitly
|
|
// or implicitly, nothing to change.
|
|
return vals
|
|
}
|
|
|
|
// Need to add self/author to
|
|
// this slice of policy values.
|
|
vals = append(vals, gtsmodel.PolicyValueAuthor)
|
|
return vals
|
|
}
|
|
|
|
canLikeAlways = ensureIncludesSelf(canLikeAlways)
|
|
canReplyAlways = ensureIncludesSelf(canReplyAlways)
|
|
canAnnounceAlways = ensureIncludesSelf(canAnnounceAlways)
|
|
|
|
// 2. Ensure canReplyAlways includes mentioned
|
|
// accounts (either explicitly or within public).
|
|
if !slices.ContainsFunc(
|
|
canReplyAlways,
|
|
func(uri gtsmodel.PolicyValue) bool {
|
|
return uri == gtsmodel.PolicyValuePublic ||
|
|
uri == gtsmodel.PolicyValueMentioned
|
|
},
|
|
) {
|
|
canReplyAlways = append(
|
|
canReplyAlways,
|
|
gtsmodel.PolicyValueMentioned,
|
|
)
|
|
}
|
|
|
|
return >smodel.InteractionPolicy{
|
|
CanLike: gtsmodel.PolicyRules{
|
|
Always: canLikeAlways,
|
|
WithApproval: canLikeWithApproval,
|
|
},
|
|
CanReply: gtsmodel.PolicyRules{
|
|
Always: canReplyAlways,
|
|
WithApproval: canReplyWithApproval,
|
|
},
|
|
CanAnnounce: gtsmodel.PolicyRules{
|
|
Always: canAnnounceAlways,
|
|
WithApproval: canAnnounceWithApproval,
|
|
},
|
|
}, nil
|
|
}
|