2018-03-04 03:19:11 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2019-07-16 18:00:39 -04:00
|
|
|
class ActivityPub::CollectionsController < ActivityPub::BaseController
|
2018-03-04 03:19:11 -05:00
|
|
|
include SignatureVerification
|
2019-07-08 06:03:45 -04:00
|
|
|
include AccountOwnedConcern
|
2018-03-04 03:19:11 -05:00
|
|
|
|
2023-04-19 10:07:29 -04:00
|
|
|
vary_by -> { 'Signature' if authorized_fetch_mode? }
|
|
|
|
|
2022-09-21 16:45:57 -04:00
|
|
|
before_action :require_account_signature!, if: :authorized_fetch_mode?
|
2020-06-02 13:24:53 -04:00
|
|
|
before_action :set_items
|
2018-03-04 03:19:11 -05:00
|
|
|
before_action :set_size
|
2020-06-02 13:24:53 -04:00
|
|
|
before_action :set_type
|
2018-03-04 03:19:11 -05:00
|
|
|
|
|
|
|
def show
|
2019-07-11 14:11:09 -04:00
|
|
|
expires_in 3.minutes, public: public_fetch_mode?
|
2020-09-01 20:11:12 -04:00
|
|
|
render_with_cache json: collection_presenter, content_type: 'application/activity+json', serializer: ActivityPub::CollectionSerializer, adapter: ActivityPub::Adapter
|
2018-03-04 03:19:11 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2020-06-02 13:24:53 -04:00
|
|
|
def set_items
|
|
|
|
case params[:id]
|
|
|
|
when 'featured'
|
2020-09-07 03:21:38 -04:00
|
|
|
@items = for_signed_account { cache_collection(@account.pinned_statuses.not_local_only, Status) }
|
2022-01-16 18:49:55 -05:00
|
|
|
@items = @items.map { |item| item.distributable? ? item : ActivityPub::TagManager.instance.uri_for(item) }
|
2020-09-01 20:11:12 -04:00
|
|
|
when 'tags'
|
|
|
|
@items = for_signed_account { @account.featured_tags }
|
2020-06-02 13:24:53 -04:00
|
|
|
when 'devices'
|
|
|
|
@items = @account.devices
|
|
|
|
else
|
|
|
|
not_found
|
|
|
|
end
|
2018-03-04 03:19:11 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def set_size
|
|
|
|
case params[:id]
|
2020-09-01 20:11:12 -04:00
|
|
|
when 'featured', 'devices', 'tags'
|
2020-06-02 13:24:53 -04:00
|
|
|
@size = @items.size
|
2018-03-04 03:19:11 -05:00
|
|
|
else
|
2020-05-03 10:30:36 -04:00
|
|
|
not_found
|
2018-03-04 03:19:11 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-06-02 13:24:53 -04:00
|
|
|
def set_type
|
2018-03-04 03:19:11 -05:00
|
|
|
case params[:id]
|
|
|
|
when 'featured'
|
2020-06-02 13:24:53 -04:00
|
|
|
@type = :ordered
|
2020-09-01 20:11:12 -04:00
|
|
|
when 'devices', 'tags'
|
2020-06-02 13:24:53 -04:00
|
|
|
@type = :unordered
|
|
|
|
else
|
|
|
|
not_found
|
2018-03-04 03:19:11 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def collection_presenter
|
|
|
|
ActivityPub::CollectionPresenter.new(
|
|
|
|
id: account_collection_url(@account, params[:id]),
|
2020-06-02 13:24:53 -04:00
|
|
|
type: @type,
|
2018-03-04 03:19:11 -05:00
|
|
|
size: @size,
|
2020-06-02 13:24:53 -04:00
|
|
|
items: @items
|
2018-03-04 03:19:11 -05:00
|
|
|
)
|
|
|
|
end
|
2020-09-01 20:11:12 -04:00
|
|
|
|
|
|
|
def for_signed_account
|
|
|
|
# Because in public fetch mode we cache the response, there would be no
|
|
|
|
# benefit from performing the check below, since a blocked account or domain
|
|
|
|
# would likely be served the cache from the reverse proxy anyway
|
|
|
|
|
|
|
|
if authorized_fetch_mode? && !signed_request_account.nil? && (@account.blocking?(signed_request_account) || (!signed_request_account.domain.nil? && @account.domain_blocking?(signed_request_account.domain)))
|
|
|
|
[]
|
|
|
|
else
|
|
|
|
yield
|
|
|
|
end
|
|
|
|
end
|
2018-03-04 03:19:11 -05:00
|
|
|
end
|