mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-01 15:00:00 +00:00
43ac0cdb9c
* move config flag names and usage to config package, rewrite config package to use global Configuration{} struct Signed-off-by: kim <grufwub@gmail.com> * improved code comment Signed-off-by: kim <grufwub@gmail.com> * linter Signed-off-by: kim <grufwub@gmail.com> * fix unmarshaling Signed-off-by: kim <grufwub@gmail.com> * remove kim's custom go compiler changes Signed-off-by: kim <grufwub@gmail.com> * generate setter and flag-name functions, implement these in codebase Signed-off-by: kim <grufwub@gmail.com> * update deps Signed-off-by: kim <grufwub@gmail.com> * small change Signed-off-by: kim <grufwub@gmail.com> * appease the linter... Signed-off-by: kim <grufwub@gmail.com> * move configuration into ConfigState structure, ensure reloading to/from viper settings to keep in sync Signed-off-by: kim <grufwub@gmail.com> * lint Signed-off-by: kim <grufwub@gmail.com> * update code comments Signed-off-by: kim <grufwub@gmail.com> * fix merge issue Signed-off-by: kim <grufwub@gmail.com> * fix merge issue Signed-off-by: kim <grufwub@gmail.com> * improved version string (removes time + go version) Signed-off-by: kim <grufwub@gmail.com> * fix version string build to pass test script + consolidate logic in func Signed-off-by: kim <grufwub@gmail.com> * add license text, update config.Defaults comment Signed-off-by: kim <grufwub@gmail.com> * add license text to generated config helpers file Signed-off-by: kim <grufwub@gmail.com> * defer unlock on config.Set___(), to ensure unlocked on panic Signed-off-by: kim <grufwub@gmail.com> * make it more obvious which cmd flags are being attached Signed-off-by: kim <grufwub@gmail.com>
139 lines
4.5 KiB
Go
139 lines
4.5 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package web
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"math/rand"
|
|
"net/http"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
|
"github.com/superseriousbusiness/gotosocial/internal/api"
|
|
"github.com/superseriousbusiness/gotosocial/internal/config"
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
|
)
|
|
|
|
func (m *Module) profileTemplateHandler(c *gin.Context) {
|
|
l := logrus.WithField("func", "profileTemplateHandler")
|
|
l.Trace("rendering profile template")
|
|
ctx := c.Request.Context()
|
|
|
|
username := c.Param(usernameKey)
|
|
if username == "" {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "no account username specified"})
|
|
return
|
|
}
|
|
|
|
authed, err := oauth.Authed(c, false, false, false, false)
|
|
if err != nil {
|
|
l.Errorf("error authing profile GET request: %s", err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "internal server error"})
|
|
return
|
|
}
|
|
|
|
instance, errWithCode := m.processor.InstanceGet(ctx, config.GetHost())
|
|
if errWithCode != nil {
|
|
l.Debugf("error getting instance from processor: %s", errWithCode.Error())
|
|
c.JSON(errWithCode.Code(), gin.H{"error": errWithCode.Safe()})
|
|
return
|
|
}
|
|
|
|
account, errWithCode := m.processor.AccountGetLocalByUsername(ctx, authed, username)
|
|
if errWithCode != nil {
|
|
l.Debugf("error getting account from processor: %s", errWithCode.Error())
|
|
if errWithCode.Code() == http.StatusNotFound {
|
|
m.NotFoundHandler(c)
|
|
return
|
|
}
|
|
c.JSON(errWithCode.Code(), gin.H{"error": errWithCode.Safe()})
|
|
return
|
|
}
|
|
|
|
// if we're getting an AP request on this endpoint we should render the account's AP representation instead
|
|
accept := c.NegotiateFormat(string(api.TextHTML), string(api.AppActivityJSON), string(api.AppActivityLDJSON))
|
|
if accept == string(api.AppActivityJSON) || accept == string(api.AppActivityLDJSON) {
|
|
m.returnAPRepresentation(ctx, c, username, accept)
|
|
return
|
|
}
|
|
|
|
// get latest 10 top-level public statuses;
|
|
// ie., exclude replies and boosts, public only,
|
|
// with or without media
|
|
statuses, errWithCode := m.processor.AccountStatusesGet(ctx, authed, account.ID, 10, true, true, "", "", false, false, true)
|
|
if errWithCode != nil {
|
|
l.Debugf("error getting statuses from processor: %s", errWithCode.Error())
|
|
c.JSON(errWithCode.Code(), gin.H{"error": errWithCode.Safe()})
|
|
return
|
|
}
|
|
|
|
// pick a random dummy avatar if this account avatar isn't set yet
|
|
if account.Avatar == "" && len(m.defaultAvatars) > 0 {
|
|
//nolint:gosec
|
|
randomIndex := rand.Intn(len(m.defaultAvatars))
|
|
dummyAvatar := m.defaultAvatars[randomIndex]
|
|
account.Avatar = dummyAvatar
|
|
for _, s := range statuses {
|
|
s.Account.Avatar = dummyAvatar
|
|
}
|
|
}
|
|
|
|
c.HTML(http.StatusOK, "profile.tmpl", gin.H{
|
|
"instance": instance,
|
|
"account": account,
|
|
"statuses": statuses,
|
|
"stylesheets": []string{
|
|
"/assets/Fork-Awesome/css/fork-awesome.min.css",
|
|
"/assets/status.css",
|
|
"/assets/profile.css",
|
|
},
|
|
})
|
|
}
|
|
|
|
func (m *Module) returnAPRepresentation(ctx context.Context, c *gin.Context, username string, accept string) {
|
|
verifier, signed := c.Get(string(ap.ContextRequestingPublicKeyVerifier))
|
|
if signed {
|
|
ctx = context.WithValue(ctx, ap.ContextRequestingPublicKeyVerifier, verifier)
|
|
}
|
|
|
|
signature, signed := c.Get(string(ap.ContextRequestingPublicKeySignature))
|
|
if signed {
|
|
ctx = context.WithValue(ctx, ap.ContextRequestingPublicKeySignature, signature)
|
|
}
|
|
|
|
user, errWithCode := m.processor.GetFediUser(ctx, username, c.Request.URL) // GetFediUser handles auth as well
|
|
if errWithCode != nil {
|
|
logrus.Infof(errWithCode.Error())
|
|
c.JSON(errWithCode.Code(), gin.H{"error": errWithCode.Safe()})
|
|
return
|
|
}
|
|
|
|
b, mErr := json.Marshal(user)
|
|
if mErr != nil {
|
|
err := fmt.Errorf("could not marshal json: %s", mErr)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
c.Data(http.StatusOK, accept, b)
|
|
}
|