2023-03-12 18:00:57 +03:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2022-09-12 14:03:23 +03:00
|
|
|
|
|
|
|
package dereferencing
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/url"
|
|
|
|
|
2022-09-26 12:56:01 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
2024-06-06 11:50:14 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
2022-09-26 12:56:01 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2022-09-12 14:03:23 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/media"
|
2024-02-09 14:38:51 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
2022-09-12 14:03:23 +03:00
|
|
|
)
|
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
func (d *Dereferencer) GetRemoteEmoji(ctx context.Context, requestUser string, remoteURL string, shortcode string, domain string, id string, emojiURI string, ai *media.AdditionalEmojiInfo, refresh bool) (*media.ProcessingEmoji, error) {
|
|
|
|
var shortcodeDomain = shortcode + "@" + domain
|
2022-11-11 22:27:37 +03:00
|
|
|
|
2023-10-31 14:12:22 +03:00
|
|
|
// Ensure we have been passed a valid URL.
|
|
|
|
derefURI, err := url.Parse(remoteURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("GetRemoteEmoji: error parsing url for emoji %s: %s", shortcodeDomain, err)
|
|
|
|
}
|
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
// Acquire derefs lock.
|
|
|
|
d.derefEmojisMu.Lock()
|
|
|
|
|
|
|
|
// Ensure unlock only done once.
|
|
|
|
unlock := d.derefEmojisMu.Unlock
|
2024-02-09 14:38:51 +03:00
|
|
|
unlock = util.DoOnce(unlock)
|
2023-02-10 23:15:23 +03:00
|
|
|
defer unlock()
|
2022-11-11 22:27:37 +03:00
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
// Look for an existing dereference in progress.
|
|
|
|
processing, ok := d.derefEmojis[shortcodeDomain]
|
|
|
|
|
|
|
|
if !ok {
|
|
|
|
// Fetch a transport for current request user in order to perform request.
|
|
|
|
tsport, err := d.transportController.NewTransportForUsername(ctx, requestUser)
|
2022-11-11 22:27:37 +03:00
|
|
|
if err != nil {
|
2024-06-06 11:50:14 +03:00
|
|
|
return nil, gtserror.Newf("couldn't create transport: %w", err)
|
2022-11-11 22:27:37 +03:00
|
|
|
}
|
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
// Set the media data function to dereference emoji from URI.
|
|
|
|
data := func(ctx context.Context) (io.ReadCloser, int64, error) {
|
|
|
|
return tsport.DereferenceMedia(ctx, derefURI)
|
2022-11-11 22:27:37 +03:00
|
|
|
}
|
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
// Create new emoji processing request from the media manager.
|
|
|
|
processing, err = d.mediaManager.PreProcessEmoji(ctx, data,
|
|
|
|
shortcode,
|
|
|
|
id,
|
|
|
|
emojiURI,
|
|
|
|
ai,
|
|
|
|
refresh,
|
|
|
|
)
|
2022-11-11 22:27:37 +03:00
|
|
|
if err != nil {
|
2024-06-06 11:50:14 +03:00
|
|
|
return nil, gtserror.Newf("error preprocessing emoji %s: %s", shortcodeDomain, err)
|
2022-11-11 22:27:37 +03:00
|
|
|
}
|
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
// Store media in map to mark as processing.
|
|
|
|
d.derefEmojis[shortcodeDomain] = processing
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
// On exit safely remove emoji from map.
|
|
|
|
d.derefEmojisMu.Lock()
|
|
|
|
delete(d.derefEmojis, shortcodeDomain)
|
|
|
|
d.derefEmojisMu.Unlock()
|
|
|
|
}()
|
2022-09-12 14:03:23 +03:00
|
|
|
}
|
|
|
|
|
2023-02-10 23:15:23 +03:00
|
|
|
// Unlock map.
|
|
|
|
unlock()
|
2022-11-11 22:27:37 +03:00
|
|
|
|
2023-02-10 23:15:23 +03:00
|
|
|
// Start emoji attachment loading (blocking call).
|
2024-06-06 11:50:14 +03:00
|
|
|
if _, err := processing.LoadEmoji(ctx); err != nil {
|
2022-11-11 22:27:37 +03:00
|
|
|
return nil, err
|
2022-09-12 14:03:23 +03:00
|
|
|
}
|
|
|
|
|
2024-06-06 11:50:14 +03:00
|
|
|
return processing, nil
|
2022-09-12 14:03:23 +03:00
|
|
|
}
|
2022-09-26 12:56:01 +03:00
|
|
|
|
2023-10-23 12:58:13 +03:00
|
|
|
func (d *Dereferencer) populateEmojis(ctx context.Context, rawEmojis []*gtsmodel.Emoji, requestingUsername string) ([]*gtsmodel.Emoji, error) {
|
2022-09-26 12:56:01 +03:00
|
|
|
// At this point we should know:
|
|
|
|
// * the AP uri of the emoji
|
|
|
|
// * the domain of the emoji
|
|
|
|
// * the shortcode of the emoji
|
|
|
|
// * the remote URL of the image
|
|
|
|
// This should be enough to dereference the emoji
|
|
|
|
gotEmojis := make([]*gtsmodel.Emoji, 0, len(rawEmojis))
|
|
|
|
|
|
|
|
for _, e := range rawEmojis {
|
|
|
|
var gotEmoji *gtsmodel.Emoji
|
|
|
|
var err error
|
2022-11-11 22:27:37 +03:00
|
|
|
shortcodeDomain := e.Shortcode + "@" + e.Domain
|
|
|
|
|
|
|
|
// check if we already know this emoji
|
|
|
|
if e.ID != "" {
|
|
|
|
// we had an ID for this emoji already, which means
|
|
|
|
// it should be fleshed out already and we won't
|
|
|
|
// have to get it from the database again
|
|
|
|
gotEmoji = e
|
2023-05-12 12:15:54 +03:00
|
|
|
} else if gotEmoji, err = d.state.DB.GetEmojiByShortcodeDomain(ctx, e.Shortcode, e.Domain); err != nil && err != db.ErrNoEntries {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Errorf(ctx, "error checking database for emoji %s: %s", shortcodeDomain, err)
|
2022-09-26 12:56:01 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2022-11-11 22:27:37 +03:00
|
|
|
var refresh bool
|
|
|
|
|
2022-10-13 16:16:24 +03:00
|
|
|
if gotEmoji != nil {
|
2022-11-11 22:27:37 +03:00
|
|
|
// we had the emoji already, but refresh it if necessary
|
|
|
|
if e.UpdatedAt.Unix() > gotEmoji.ImageUpdatedAt.Unix() {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Tracef(ctx, "emoji %s was updated since we last saw it, will refresh", shortcodeDomain)
|
2022-11-11 22:27:37 +03:00
|
|
|
refresh = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if !refresh && (e.URI != gotEmoji.URI) {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Tracef(ctx, "emoji %s changed URI since we last saw it, will refresh", shortcodeDomain)
|
2022-11-11 22:27:37 +03:00
|
|
|
refresh = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if !refresh && (e.ImageRemoteURL != gotEmoji.ImageRemoteURL) {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Tracef(ctx, "emoji %s changed image URL since we last saw it, will refresh", shortcodeDomain)
|
2022-11-11 22:27:37 +03:00
|
|
|
refresh = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if !refresh {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Tracef(ctx, "emoji %s is up to date, will not refresh", shortcodeDomain)
|
2022-11-11 22:27:37 +03:00
|
|
|
} else {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Tracef(ctx, "refreshing emoji %s", shortcodeDomain)
|
2022-10-13 16:16:24 +03:00
|
|
|
emojiID := gotEmoji.ID // use existing ID
|
2022-11-11 22:27:37 +03:00
|
|
|
processingEmoji, err := d.GetRemoteEmoji(ctx, requestingUsername, e.ImageRemoteURL, e.Shortcode, e.Domain, emojiID, e.URI, &media.AdditionalEmojiInfo{
|
2022-10-13 16:16:24 +03:00
|
|
|
Domain: &e.Domain,
|
|
|
|
ImageRemoteURL: &e.ImageRemoteURL,
|
2022-11-11 22:27:37 +03:00
|
|
|
ImageStaticRemoteURL: &e.ImageStaticRemoteURL,
|
2022-10-13 16:16:24 +03:00
|
|
|
Disabled: gotEmoji.Disabled,
|
|
|
|
VisibleInPicker: gotEmoji.VisibleInPicker,
|
2022-11-11 22:27:37 +03:00
|
|
|
}, refresh)
|
2022-10-13 16:16:24 +03:00
|
|
|
if err != nil {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Errorf(ctx, "couldn't refresh remote emoji %s: %s", shortcodeDomain, err)
|
2022-10-13 16:16:24 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if gotEmoji, err = processingEmoji.LoadEmoji(ctx); err != nil {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Errorf(ctx, "couldn't load refreshed remote emoji %s: %s", shortcodeDomain, err)
|
2022-10-13 16:16:24 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2022-09-26 12:56:01 +03:00
|
|
|
// it's new! go get it!
|
|
|
|
newEmojiID, err := id.NewRandomULID()
|
|
|
|
if err != nil {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Errorf(ctx, "error generating id for remote emoji %s: %s", shortcodeDomain, err)
|
2022-09-26 12:56:01 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2022-11-11 22:27:37 +03:00
|
|
|
processingEmoji, err := d.GetRemoteEmoji(ctx, requestingUsername, e.ImageRemoteURL, e.Shortcode, e.Domain, newEmojiID, e.URI, &media.AdditionalEmojiInfo{
|
2022-09-26 12:56:01 +03:00
|
|
|
Domain: &e.Domain,
|
|
|
|
ImageRemoteURL: &e.ImageRemoteURL,
|
2022-11-11 22:27:37 +03:00
|
|
|
ImageStaticRemoteURL: &e.ImageStaticRemoteURL,
|
2022-09-26 12:56:01 +03:00
|
|
|
Disabled: e.Disabled,
|
|
|
|
VisibleInPicker: e.VisibleInPicker,
|
2022-11-11 22:27:37 +03:00
|
|
|
}, refresh)
|
2022-09-26 12:56:01 +03:00
|
|
|
if err != nil {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Errorf(ctx, "couldn't get remote emoji %s: %s", shortcodeDomain, err)
|
2022-09-26 12:56:01 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if gotEmoji, err = processingEmoji.LoadEmoji(ctx); err != nil {
|
2023-02-17 14:02:29 +03:00
|
|
|
log.Errorf(ctx, "couldn't load remote emoji %s: %s", shortcodeDomain, err)
|
2022-09-26 12:56:01 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// if we get here, we either had the emoji already or we successfully fetched it
|
|
|
|
gotEmojis = append(gotEmojis, gotEmoji)
|
|
|
|
}
|
|
|
|
|
|
|
|
return gotEmojis, nil
|
|
|
|
}
|