| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | /* | 
					
						
							|  |  |  |    GoToSocial | 
					
						
							|  |  |  |    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  |    it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  |    the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  |    (at your option) any later version. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  |    GNU Affero General Public License for more details. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |    You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  |    along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | package status | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"errors" | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							|  |  |  | 	"net" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/gin-gonic/gin" | 
					
						
							| 
									
										
										
										
											2021-04-02 21:15:17 +02:00
										 |  |  | 	"github.com/google/uuid" | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/config" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db/model" | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/oauth" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/util" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/pkg/mastotypes" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (m *statusModule) statusCreatePOSTHandler(c *gin.Context) { | 
					
						
							|  |  |  | 	l := m.log.WithField("func", "statusCreatePOSTHandler") | 
					
						
							|  |  |  | 	authed, err := oauth.MustAuth(c, true, true, true, true) // posting a status is serious business so we want *everything* | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		l.Debugf("couldn't auth: %s", err) | 
					
						
							|  |  |  | 		c.JSON(http.StatusForbidden, gin.H{"error": err.Error()}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// check this user/account is permitted to post new statuses | 
					
						
							|  |  |  | 	if authed.User.Disabled || !authed.User.Approved || !authed.Account.SuspendedAt.IsZero() { | 
					
						
							|  |  |  | 		l.Debugf("couldn't auth: %s", err) | 
					
						
							|  |  |  | 		c.JSON(http.StatusForbidden, gin.H{"error": "account is disabled, not yet approved, or suspended"}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	l.Trace("parsing request form") | 
					
						
							|  |  |  | 	form := &mastotypes.StatusCreateRequest{} | 
					
						
							|  |  |  | 	if err := c.ShouldBind(form); err != nil || form == nil { | 
					
						
							|  |  |  | 		l.Debugf("could not parse form from request: %s", err) | 
					
						
							|  |  |  | 		c.JSON(http.StatusBadRequest, gin.H{"error": "missing one or more required form values"}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	l.Tracef("validating form %+v", form) | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | 	if err := validateCreateStatus(form, m.config.StatusesConfig, authed.Account.ID, m.db); err != nil { | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 		l.Debugf("error validating form: %s", err) | 
					
						
							|  |  |  | 		c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	clientIP := c.ClientIP() | 
					
						
							|  |  |  | 	l.Tracef("attempting to parse client ip address %s", clientIP) | 
					
						
							|  |  |  | 	signUpIP := net.ParseIP(clientIP) | 
					
						
							|  |  |  | 	if signUpIP == nil { | 
					
						
							|  |  |  | 		l.Debugf("error validating client ip address %s", clientIP) | 
					
						
							|  |  |  | 		c.JSON(http.StatusBadRequest, gin.H{"error": "ip address could not be parsed from request"}) | 
					
						
							|  |  |  | 		return | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-02 21:15:17 +02:00
										 |  |  | 	uris := util.GenerateURIs(authed.Account.Username, m.config.Protocol, m.config.Host) | 
					
						
							|  |  |  | 	newStatusID := uuid.NewString() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	newStatus := &model.Status{ | 
					
						
							|  |  |  | 		ID:                  newStatusID, | 
					
						
							|  |  |  | 		URI:                 fmt.Sprintf("%s/%s", uris.StatusesURI, newStatusID), | 
					
						
							|  |  |  | 		URL:                 fmt.Sprintf("%s/%s", uris.StatusesURL, newStatusID), | 
					
						
							|  |  |  | 		Content:             util.HTMLFormat(form.Status), | 
					
						
							|  |  |  | 		Local:               true, // will always be true if this status is being created through the client API | 
					
						
							|  |  |  | 		AccountID:           authed.Account.ID, | 
					
						
							|  |  |  | 		InReplyToID:         form.InReplyToID, | 
					
						
							|  |  |  | 		ContentWarning:      form.SpoilerText, | 
					
						
							|  |  |  | 		ActivityStreamsType: "Note", | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | func validateCreateStatus(form *mastotypes.StatusCreateRequest, config *config.StatusesConfig, accountID string, db db.DB) error { | 
					
						
							|  |  |  | 	// validate that, structurally, we have a valid status/post | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 	if form.Status == "" && form.MediaIDs == nil && form.Poll == nil { | 
					
						
							|  |  |  | 		return errors.New("no status, media, or poll provided") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if form.MediaIDs != nil && form.Poll != nil { | 
					
						
							|  |  |  | 		return errors.New("can't post media + poll in same status") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | 	// validate status | 
					
						
							|  |  |  | 	if form.Status != "" { | 
					
						
							|  |  |  | 		if len(form.Status) > config.MaxChars { | 
					
						
							|  |  |  | 			return fmt.Errorf("status too long, %d characters provided but limit is %d", len(form.Status), config.MaxChars) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// validate media attachments | 
					
						
							|  |  |  | 	if len(form.MediaIDs) > config.MaxMediaFiles { | 
					
						
							|  |  |  | 		return fmt.Errorf("too many media files attached to status, %d attached but limit is %d", len(form.MediaIDs), config.MaxMediaFiles) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	for _, m := range form.MediaIDs { | 
					
						
							|  |  |  | 		// check these attachments exist | 
					
						
							|  |  |  | 		a := &model.MediaAttachment{} | 
					
						
							|  |  |  | 		if err := db.GetByID(m, a); err != nil { | 
					
						
							|  |  |  | 			return fmt.Errorf("invalid media type or media not found for media id %s: %s", m, err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		// check they belong to the requesting account id | 
					
						
							|  |  |  | 		if a.AccountID != accountID { | 
					
						
							|  |  |  | 			return fmt.Errorf("media attachment %s does not belong to account id %s", m, accountID) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// validate poll | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 	if form.Poll != nil { | 
					
						
							|  |  |  | 		if form.Poll.Options == nil { | 
					
						
							|  |  |  | 			return errors.New("poll with no options") | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		if len(form.Poll.Options) > config.PollMaxOptions { | 
					
						
							|  |  |  | 			return fmt.Errorf("too many poll options provided, %d provided but limit is %d", len(form.Poll.Options), config.PollMaxOptions) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		for _, p := range form.Poll.Options { | 
					
						
							|  |  |  | 			if len(p) > config.PollOptionMaxChars { | 
					
						
							|  |  |  | 				return fmt.Errorf("poll option too long, %d characters provided but limit is %d", len(p), config.PollOptionMaxChars) | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | 	// validate reply-to status exists and is reply-able | 
					
						
							|  |  |  | 	if form.InReplyToID != "" { | 
					
						
							|  |  |  | 		s := &model.Status{} | 
					
						
							|  |  |  | 		if err := db.GetByID(form.InReplyToID, s); err != nil { | 
					
						
							|  |  |  | 			return fmt.Errorf("status id %s cannot be retrieved from the db: %s", form.InReplyToID, err) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		if !*s.VisibilityAdvanced.Replyable { | 
					
						
							|  |  |  | 			return fmt.Errorf("status with id %s is not replyable", form.InReplyToID) | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-04-02 19:20:41 +02:00
										 |  |  | 	// validate spoiler text/cw | 
					
						
							|  |  |  | 	if form.SpoilerText != "" { | 
					
						
							|  |  |  | 		if len(form.SpoilerText) > config.CWMaxChars { | 
					
						
							|  |  |  | 			return fmt.Errorf("content-warning/spoilertext too long, %d characters provided but limit is %d", len(form.SpoilerText), config.CWMaxChars) | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// validate post language | 
					
						
							|  |  |  | 	if form.Language != "" { | 
					
						
							|  |  |  | 		if err := util.ValidateLanguage(form.Language); err != nil { | 
					
						
							|  |  |  | 			return err | 
					
						
							| 
									
										
										
										
											2021-04-01 23:05:31 +02:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } |