2023-03-12 15:00:57 +00:00
// GoToSocial
// Copyright (C) GoToSocial Authors admin@gotosocial.org
// SPDX-License-Identifier: AGPL-3.0-or-later
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
2021-05-08 13:25:55 +01:00
package media
import (
"errors"
"fmt"
"net/http"
"github.com/gin-gonic/gin"
2023-01-02 12:10:50 +00:00
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
2021-05-08 13:25:55 +01:00
"github.com/superseriousbusiness/gotosocial/internal/config"
2022-06-08 19:38:03 +01:00
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
2021-05-08 13:25:55 +01:00
"github.com/superseriousbusiness/gotosocial/internal/oauth"
)
2022-07-22 11:48:19 +01:00
// MediaCreatePOSTHandler swagger:operation POST /api/{api_version}/media mediaCreate
2021-08-02 18:06:44 +01:00
//
// Upload a new media attachment.
//
2022-09-28 18:30:40 +01:00
// ---
// tags:
// - media
2021-08-02 18:06:44 +01:00
//
2022-09-28 18:30:40 +01:00
// consumes:
// - multipart/form-data
2021-08-02 18:06:44 +01:00
//
2022-09-28 18:30:40 +01:00
// produces:
// - application/json
2021-08-02 18:06:44 +01:00
//
2022-09-28 18:30:40 +01:00
// parameters:
// -
// name: api_version
// type: string
// in: path
// description: Version of the API to use. Must be either `v1` or `v2`.
// required: true
// -
// name: description
// in: formData
// description: >-
// Image or media description to use as alt-text on the attachment.
// This is very useful for users of screenreaders!
// May or may not be required, depending on your instance settings.
// type: string
// -
// name: focus
// in: formData
// description: >-
// Focus of the media file.
// If present, it should be in the form of two comma-separated floats between -1 and 1.
// For example: `-0.5,0.25`.
// type: string
// default: "0,0"
// -
// name: file
// in: formData
// description: The media attachment to upload.
// type: file
// required: true
2021-08-02 18:06:44 +01:00
//
2022-09-28 18:30:40 +01:00
// security:
// - OAuth2 Bearer:
// - write:media
2021-08-02 18:06:44 +01:00
//
2022-09-28 18:30:40 +01:00
// responses:
// '200':
// description: The newly-created media attachment.
// schema:
// "$ref": "#/definitions/attachment"
// '400':
// description: bad request
// '401':
// description: unauthorized
// '422':
// description: unprocessable
// '500':
// description: internal server error
2021-05-08 13:25:55 +01:00
func ( m * Module ) MediaCreatePOSTHandler ( c * gin . Context ) {
2023-07-31 14:47:35 +01:00
apiVersion , errWithCode := apiutil . ParseAPIVersion (
c . Param ( apiutil . APIVersionKey ) ,
[ ] string { apiutil . APIv1 , apiutil . APIv2 } ... ,
)
if errWithCode != nil {
apiutil . ErrorHandler ( c , errWithCode , m . processor . InstanceGetV1 )
2021-05-08 13:25:55 +01:00
return
}
2023-01-02 12:10:50 +00:00
authed , err := oauth . Authed ( c , true , true , true , true )
if err != nil {
2023-02-02 13:08:13 +00:00
apiutil . ErrorHandler ( c , gtserror . NewErrorUnauthorized ( err , err . Error ( ) ) , m . processor . InstanceGetV1 )
2021-12-11 16:50:00 +00:00
return
}
2023-01-02 12:10:50 +00:00
if _ , err := apiutil . NegotiateAccept ( c , apiutil . JSONAcceptHeaders ... ) ; err != nil {
2023-02-02 13:08:13 +00:00
apiutil . ErrorHandler ( c , gtserror . NewErrorNotAcceptable ( err , err . Error ( ) ) , m . processor . InstanceGetV1 )
2022-07-22 11:48:19 +01:00
return
}
2023-01-02 12:10:50 +00:00
form := & apimodel . AttachmentRequest { }
2021-05-10 15:29:05 +01:00
if err := c . ShouldBind ( & form ) ; err != nil {
2023-02-02 13:08:13 +00:00
apiutil . ErrorHandler ( c , gtserror . NewErrorBadRequest ( err , err . Error ( ) ) , m . processor . InstanceGetV1 )
2021-05-08 13:25:55 +01:00
return
}
2021-12-07 12:31:39 +00:00
if err := validateCreateMedia ( form ) ; err != nil {
2023-02-02 13:08:13 +00:00
apiutil . ErrorHandler ( c , gtserror . NewErrorBadRequest ( err , err . Error ( ) ) , m . processor . InstanceGetV1 )
2021-05-08 13:25:55 +01:00
return
}
2023-02-22 15:05:26 +00:00
apiAttachment , errWithCode := m . processor . Media ( ) . Create ( c . Request . Context ( ) , authed . Account , form )
2022-12-21 16:52:07 +00:00
if errWithCode != nil {
2023-02-02 13:08:13 +00:00
apiutil . ErrorHandler ( c , errWithCode , m . processor . InstanceGetV1 )
2021-05-08 13:25:55 +01:00
return
}
2023-07-31 14:47:35 +01:00
if apiVersion == apiutil . APIv2 {
2022-07-22 11:48:19 +01:00
// the mastodon v2 media API specifies that the URL should be null
// and that the client should call /api/v1/media/:id to get the URL
//
// so even though we have the URL already, remove it now to comply
// with the api
apiAttachment . URL = nil
}
2023-11-27 14:00:57 +00:00
apiutil . JSON ( c , http . StatusOK , apiAttachment )
2021-05-08 13:25:55 +01:00
}
2023-01-02 12:10:50 +00:00
func validateCreateMedia ( form * apimodel . AttachmentRequest ) error {
2021-05-08 13:25:55 +01:00
// check there actually is a file attached and it's not size 0
2021-05-15 10:58:11 +01:00
if form . File == nil {
2021-05-08 13:25:55 +01:00
return errors . New ( "no attachment given" )
}
2022-05-30 13:41:24 +01:00
maxVideoSize := config . GetMediaVideoMaxSize ( )
maxImageSize := config . GetMediaImageMaxSize ( )
minDescriptionChars := config . GetMediaDescriptionMinChars ( )
maxDescriptionChars := config . GetMediaDescriptionMaxChars ( )
2021-12-07 12:31:39 +00:00
2021-05-08 13:25:55 +01:00
// a very superficial check to see if no size limits are exceeded
// we still don't actually know which media types we're dealing with but the other handlers will go into more detail there
2021-12-07 12:31:39 +00:00
maxSize := maxVideoSize
if maxImageSize > maxSize {
maxSize = maxImageSize
2021-05-08 13:25:55 +01:00
}
2022-06-08 19:38:03 +01:00
2021-05-08 13:25:55 +01:00
if form . File . Size > int64 ( maxSize ) {
return fmt . Errorf ( "file size limit exceeded: limit is %d bytes but attachment was %d bytes" , maxSize , form . File . Size )
}
2022-11-03 13:38:06 +00:00
if length := len ( [ ] rune ( form . Description ) ) ; length > maxDescriptionChars {
return fmt . Errorf ( "image description length must be between %d and %d characters (inclusive), but provided image description was %d chars" , minDescriptionChars , maxDescriptionChars , length )
2021-05-08 13:25:55 +01:00
}
return nil
}