mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 12:52:25 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			571 lines
		
	
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			571 lines
		
	
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package status
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"errors"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | |
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/config"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/db"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtscontext"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/id"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/log"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/uris"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/util"
 | |
| )
 | |
| 
 | |
| // Create processes the given form to create a new status, returning the api model representation of that status if it's OK.
 | |
| // Note this also handles validation of incoming form field data.
 | |
| func (p *Processor) Create(
 | |
| 	ctx context.Context,
 | |
| 	requester *gtsmodel.Account,
 | |
| 	application *gtsmodel.Application,
 | |
| 	form *apimodel.StatusCreateRequest,
 | |
| ) (
 | |
| 	*apimodel.Status,
 | |
| 	gtserror.WithCode,
 | |
| ) {
 | |
| 	// Validate incoming form status content.
 | |
| 	if errWithCode := validateStatusContent(
 | |
| 		form.Status,
 | |
| 		form.SpoilerText,
 | |
| 		form.MediaIDs,
 | |
| 		form.Poll,
 | |
| 	); errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	// Ensure account populated; we'll need their settings.
 | |
| 	if err := p.state.DB.PopulateAccount(ctx, requester); err != nil {
 | |
| 		log.Errorf(ctx, "error(s) populating account, will continue: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// Generate new ID for status.
 | |
| 	statusID := id.NewULID()
 | |
| 
 | |
| 	// Process incoming status content fields.
 | |
| 	content, errWithCode := p.processContent(ctx,
 | |
| 		requester,
 | |
| 		statusID,
 | |
| 		string(form.ContentType),
 | |
| 		form.Status,
 | |
| 		form.SpoilerText,
 | |
| 		form.Language,
 | |
| 		form.Poll,
 | |
| 	)
 | |
| 	if errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	// Process incoming status attachments.
 | |
| 	media, errWithCode := p.processMedia(ctx,
 | |
| 		requester.ID,
 | |
| 		statusID,
 | |
| 		form.MediaIDs,
 | |
| 	)
 | |
| 	if errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	// Generate necessary URIs for username, to build status URIs.
 | |
| 	accountURIs := uris.GenerateURIsForAccount(requester.Username)
 | |
| 
 | |
| 	// Get current time.
 | |
| 	now := time.Now()
 | |
| 
 | |
| 	// Default to current
 | |
| 	// time as creation time.
 | |
| 	createdAt := now
 | |
| 
 | |
| 	// Handle backfilled/scheduled statuses.
 | |
| 	backfill := false
 | |
| 	if form.ScheduledAt != nil {
 | |
| 		scheduledAt := *form.ScheduledAt
 | |
| 
 | |
| 		// Statuses may only be scheduled
 | |
| 		// a minimum time into the future.
 | |
| 		if now.Before(scheduledAt) {
 | |
| 			const errText = "scheduled statuses are not yet supported"
 | |
| 			return nil, gtserror.NewErrorNotImplemented(gtserror.New(errText), errText)
 | |
| 		}
 | |
| 
 | |
| 		// If not scheduled into the future, this status is being backfilled.
 | |
| 		if !config.GetInstanceAllowBackdatingStatuses() {
 | |
| 			const errText = "backdating statuses has been disabled on this instance"
 | |
| 			return nil, gtserror.NewErrorForbidden(gtserror.New(errText), errText)
 | |
| 		}
 | |
| 
 | |
| 		// Statuses can't be backdated to or before the UNIX epoch
 | |
| 		// since this would prevent generating a ULID.
 | |
| 		// If backdated even further to the Go epoch,
 | |
| 		// this would also cause issues with time.Time.IsZero() checks
 | |
| 		// that normally signify an absent optional time,
 | |
| 		// but this check covers both cases.
 | |
| 		if scheduledAt.Compare(time.UnixMilli(0)) <= 0 {
 | |
| 			const errText = "statuses can't be backdated to or before the UNIX epoch"
 | |
| 			return nil, gtserror.NewErrorNotAcceptable(gtserror.New(errText), errText)
 | |
| 		}
 | |
| 
 | |
| 		var err error
 | |
| 
 | |
| 		// This is a backfill.
 | |
| 		backfill = true
 | |
| 
 | |
| 		// Update to backfill date.
 | |
| 		createdAt = scheduledAt
 | |
| 
 | |
| 		// Generate an appropriate, (and unique!), ID for the creation time.
 | |
| 		if statusID, err = p.backfilledStatusID(ctx, createdAt); err != nil {
 | |
| 			return nil, gtserror.NewErrorInternalError(err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	status := >smodel.Status{
 | |
| 		ID:                       statusID,
 | |
| 		URI:                      accountURIs.StatusesURI + "/" + statusID,
 | |
| 		URL:                      accountURIs.StatusesURL + "/" + statusID,
 | |
| 		CreatedAt:                createdAt,
 | |
| 		Local:                    util.Ptr(true),
 | |
| 		Account:                  requester,
 | |
| 		AccountID:                requester.ID,
 | |
| 		AccountURI:               requester.URI,
 | |
| 		ActivityStreamsType:      ap.ObjectNote,
 | |
| 		Sensitive:                &form.Sensitive,
 | |
| 		CreatedWithApplicationID: application.ID,
 | |
| 
 | |
| 		// Set validated language.
 | |
| 		Language: content.Language,
 | |
| 
 | |
| 		// Set formatted status content.
 | |
| 		Content:        content.Content,
 | |
| 		ContentWarning: content.ContentWarning,
 | |
| 		Text:           form.Status, // raw
 | |
| 
 | |
| 		// Set gathered mentions.
 | |
| 		MentionIDs: content.MentionIDs,
 | |
| 		Mentions:   content.Mentions,
 | |
| 
 | |
| 		// Set gathered emojis.
 | |
| 		EmojiIDs: content.EmojiIDs,
 | |
| 		Emojis:   content.Emojis,
 | |
| 
 | |
| 		// Set gathered tags.
 | |
| 		TagIDs: content.TagIDs,
 | |
| 		Tags:   content.Tags,
 | |
| 
 | |
| 		// Set gathered media.
 | |
| 		AttachmentIDs: form.MediaIDs,
 | |
| 		Attachments:   media,
 | |
| 
 | |
| 		// Assume not pending approval; this may
 | |
| 		// change when permissivity is checked.
 | |
| 		PendingApproval: util.Ptr(false),
 | |
| 	}
 | |
| 
 | |
| 	if backfill {
 | |
| 		// Ensure backfilled status contains no
 | |
| 		// mentions to anyone other than author.
 | |
| 		for _, mention := range status.Mentions {
 | |
| 			if mention.TargetAccountID != requester.ID {
 | |
| 				const errText = "statuses mentioning others can't be backfilled"
 | |
| 				return nil, gtserror.NewErrorForbidden(gtserror.New(errText), errText)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Check + attach in-reply-to status.
 | |
| 	if errWithCode := p.processInReplyTo(ctx,
 | |
| 		requester,
 | |
| 		status,
 | |
| 		form.InReplyToID,
 | |
| 		backfill,
 | |
| 	); errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	if errWithCode := p.processThreadID(ctx, status); errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	if err := p.processVisibility(ctx, form, requester.Settings.Privacy, status); err != nil {
 | |
| 		return nil, gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	// Process policy AFTER visibility as it relies
 | |
| 	// on status.Visibility and form.Visibility being set.
 | |
| 	if errWithCode := processInteractionPolicy(form, requester.Settings, status); errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	if status.ContentWarning != "" && len(status.AttachmentIDs) > 0 {
 | |
| 		// If a content-warning is set, and
 | |
| 		// the status contains media, always
 | |
| 		// set the status sensitive flag.
 | |
| 		status.Sensitive = util.Ptr(true)
 | |
| 	}
 | |
| 
 | |
| 	if form.Poll != nil {
 | |
| 		if backfill {
 | |
| 			const errText = "statuses with polls can't be backfilled"
 | |
| 			return nil, gtserror.NewErrorForbidden(gtserror.New(errText), errText)
 | |
| 		}
 | |
| 
 | |
| 		// Process poll, inserting into database.
 | |
| 		poll, errWithCode := p.processPoll(ctx,
 | |
| 			statusID,
 | |
| 			form.Poll,
 | |
| 			createdAt,
 | |
| 		)
 | |
| 		if errWithCode != nil {
 | |
| 			return nil, errWithCode
 | |
| 		}
 | |
| 
 | |
| 		// Set poll and its ID
 | |
| 		// on status before insert.
 | |
| 		status.PollID = poll.ID
 | |
| 		status.Poll = poll
 | |
| 		poll.Status = status
 | |
| 
 | |
| 		// Update the status' ActivityPub type to Question.
 | |
| 		status.ActivityStreamsType = ap.ActivityQuestion
 | |
| 	}
 | |
| 
 | |
| 	// Insert this newly prepared status into the database.
 | |
| 	if err := p.state.DB.PutStatus(ctx, status); err != nil {
 | |
| 		err := gtserror.Newf("error inserting status in db: %w", err)
 | |
| 		return nil, gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	if status.Poll != nil && !status.Poll.ExpiresAt.IsZero() {
 | |
| 		// Now that the status is inserted, attempt to
 | |
| 		// schedule an expiry handler for the status poll.
 | |
| 		if err := p.polls.ScheduleExpiry(ctx, status.Poll); err != nil {
 | |
| 			log.Errorf(ctx, "error scheduling poll expiry: %v", err)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var model any = status
 | |
| 	if backfill {
 | |
| 		// We specifically wrap backfilled statuses in
 | |
| 		// a different type to signal to worker process.
 | |
| 		model = >smodel.BackfillStatus{Status: status}
 | |
| 	}
 | |
| 
 | |
| 	// Send it to the client API worker for async side-effects.
 | |
| 	p.state.Workers.Client.Queue.Push(&messages.FromClientAPI{
 | |
| 		APObjectType:   ap.ObjectNote,
 | |
| 		APActivityType: ap.ActivityCreate,
 | |
| 		GTSModel:       model,
 | |
| 		Origin:         requester,
 | |
| 	})
 | |
| 
 | |
| 	// If the new status replies to a status that
 | |
| 	// replies to us, use our reply as an implicit
 | |
| 	// accept of any pending interaction.
 | |
| 	implicitlyAccepted, errWithCode := p.implicitlyAccept(ctx,
 | |
| 		requester, status,
 | |
| 	)
 | |
| 	if errWithCode != nil {
 | |
| 		return nil, errWithCode
 | |
| 	}
 | |
| 
 | |
| 	// If we ended up implicitly accepting, mark the
 | |
| 	// replied-to status as no longer pending approval
 | |
| 	// so it's serialized properly via the API.
 | |
| 	if implicitlyAccepted {
 | |
| 		status.InReplyTo.PendingApproval = util.Ptr(false)
 | |
| 	}
 | |
| 
 | |
| 	return p.c.GetAPIStatus(ctx, requester, status)
 | |
| }
 | |
| 
 | |
| // backfilledStatusID tries to find an unused ULID for a backfilled status.
 | |
| func (p *Processor) backfilledStatusID(ctx context.Context, createdAt time.Time) (string, error) {
 | |
| 
 | |
| 	// Any fetching of statuses here is
 | |
| 	// only to check availability of ID,
 | |
| 	// no need for any attached models.
 | |
| 	ctx = gtscontext.SetBarebones(ctx)
 | |
| 
 | |
| 	// backfilledStatusIDRetries should
 | |
| 	// be more than enough attempts.
 | |
| 	const backfilledStatusIDRetries = 100
 | |
| 	for try := 0; try < backfilledStatusIDRetries; try++ {
 | |
| 		var err error
 | |
| 
 | |
| 		// Generate a ULID based on the backfilled
 | |
| 		// status's original creation time.
 | |
| 		statusID := id.NewULIDFromTime(createdAt)
 | |
| 
 | |
| 		// Check for an existing status with that ID.
 | |
| 		status, err := p.state.DB.GetStatusByID(ctx, statusID)
 | |
| 		if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | |
| 			return "", gtserror.Newf("DB error checking if a status ID was in use: %w", err)
 | |
| 		}
 | |
| 
 | |
| 		if status == nil {
 | |
| 			// We found a free ID!
 | |
| 			return statusID, nil
 | |
| 		}
 | |
| 
 | |
| 		// That status ID is
 | |
| 		// in use. Try again.
 | |
| 	}
 | |
| 
 | |
| 	return "", gtserror.Newf("failed to find an unused ID after %d tries", backfilledStatusIDRetries)
 | |
| }
 | |
| 
 | |
| func (p *Processor) processInReplyTo(
 | |
| 	ctx context.Context,
 | |
| 	requester *gtsmodel.Account,
 | |
| 	status *gtsmodel.Status,
 | |
| 	inReplyToID string,
 | |
| 	backfill bool,
 | |
| ) gtserror.WithCode {
 | |
| 	if inReplyToID == "" {
 | |
| 		// Not a reply.
 | |
| 		// Nothing to do.
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Fetch target in-reply-to status (checking visibility).
 | |
| 	inReplyTo, errWithCode := p.c.GetVisibleTargetStatus(ctx,
 | |
| 		requester,
 | |
| 		inReplyToID,
 | |
| 		nil,
 | |
| 	)
 | |
| 	if errWithCode != nil {
 | |
| 		return errWithCode
 | |
| 	}
 | |
| 
 | |
| 	// If this is a boost, unwrap it to get source status.
 | |
| 	inReplyTo, errWithCode = p.c.UnwrapIfBoost(ctx,
 | |
| 		requester,
 | |
| 		inReplyTo,
 | |
| 	)
 | |
| 	if errWithCode != nil {
 | |
| 		return errWithCode
 | |
| 	}
 | |
| 
 | |
| 	// Ensure valid reply target for requester.
 | |
| 	policyResult, err := p.intFilter.StatusReplyable(ctx,
 | |
| 		requester,
 | |
| 		inReplyTo,
 | |
| 	)
 | |
| 	if err != nil {
 | |
| 		err := gtserror.Newf("error seeing if status %s is replyable: %w", status.ID, err)
 | |
| 		return gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	if policyResult.Forbidden() {
 | |
| 		const errText = "you do not have permission to reply to this status"
 | |
| 		err := gtserror.New(errText)
 | |
| 		return gtserror.NewErrorForbidden(err, errText)
 | |
| 	}
 | |
| 
 | |
| 	// When backfilling, only self-replies are allowed.
 | |
| 	if backfill && requester.ID != inReplyTo.AccountID {
 | |
| 		const errText = "replies to others can't be backfilled"
 | |
| 		err := gtserror.New(errText)
 | |
| 		return gtserror.NewErrorForbidden(err, errText)
 | |
| 	}
 | |
| 
 | |
| 	// Derive pendingApproval status.
 | |
| 	var pendingApproval bool
 | |
| 	switch {
 | |
| 	case policyResult.WithApproval():
 | |
| 		// We're allowed to do
 | |
| 		// this pending approval.
 | |
| 		pendingApproval = true
 | |
| 
 | |
| 	case policyResult.MatchedOnCollection():
 | |
| 		// We're permitted to do this, but since
 | |
| 		// we matched due to presence in a followers
 | |
| 		// or following collection, we should mark
 | |
| 		// as pending approval and wait until we can
 | |
| 		// prove it's been Accepted by the target.
 | |
| 		pendingApproval = true
 | |
| 
 | |
| 		if *inReplyTo.Local {
 | |
| 			// If the target is local we don't need
 | |
| 			// to wait for an Accept from remote,
 | |
| 			// we can just preapprove it and have
 | |
| 			// the processor create the Accept.
 | |
| 			status.PreApproved = true
 | |
| 		}
 | |
| 
 | |
| 	case policyResult.Permitted():
 | |
| 		// We're permitted to do this
 | |
| 		// based on another kind of match.
 | |
| 		pendingApproval = false
 | |
| 	}
 | |
| 
 | |
| 	status.PendingApproval = &pendingApproval
 | |
| 
 | |
| 	// Set status fields from inReplyTo.
 | |
| 	status.InReplyToID = inReplyTo.ID
 | |
| 	status.InReplyTo = inReplyTo
 | |
| 	status.InReplyToURI = inReplyTo.URI
 | |
| 	status.InReplyToAccountID = inReplyTo.AccountID
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (p *Processor) processThreadID(ctx context.Context, status *gtsmodel.Status) gtserror.WithCode {
 | |
| 	// Status takes the thread ID of
 | |
| 	// whatever it replies to, if set.
 | |
| 	//
 | |
| 	// Might not be set if status is local
 | |
| 	// and replies to a remote status that
 | |
| 	// doesn't have a thread ID yet.
 | |
| 	//
 | |
| 	// If so, we can just thread from this
 | |
| 	// status onwards instead, since this
 | |
| 	// is where the relevant part of the
 | |
| 	// thread starts, from the perspective
 | |
| 	// of our instance at least.
 | |
| 	if status.InReplyTo != nil &&
 | |
| 		status.InReplyTo.ThreadID != "" {
 | |
| 		// Just inherit threadID from parent.
 | |
| 		status.ThreadID = status.InReplyTo.ThreadID
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// Mark new thread (or threaded
 | |
| 	// subsection) starting from here.
 | |
| 	threadID := id.NewULID()
 | |
| 	if err := p.state.DB.PutThread(
 | |
| 		ctx,
 | |
| 		>smodel.Thread{
 | |
| 			ID: threadID,
 | |
| 		},
 | |
| 	); err != nil {
 | |
| 		err := gtserror.Newf("error inserting new thread in db: %w", err)
 | |
| 		return gtserror.NewErrorInternalError(err)
 | |
| 	}
 | |
| 
 | |
| 	// Future replies to this status
 | |
| 	// (if any) will inherit this thread ID.
 | |
| 	status.ThreadID = threadID
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (p *Processor) processVisibility(
 | |
| 	ctx context.Context,
 | |
| 	form *apimodel.StatusCreateRequest,
 | |
| 	accountDefaultVis gtsmodel.Visibility,
 | |
| 	status *gtsmodel.Status,
 | |
| ) error {
 | |
| 	switch {
 | |
| 	// Visibility set on form, use that.
 | |
| 	case form.Visibility != "":
 | |
| 		status.Visibility = typeutils.APIVisToVis(form.Visibility)
 | |
| 
 | |
| 	// Fall back to account default, set
 | |
| 	// this back on the form for later use.
 | |
| 	case accountDefaultVis != 0:
 | |
| 		status.Visibility = accountDefaultVis
 | |
| 		form.Visibility = p.converter.VisToAPIVis(ctx, accountDefaultVis)
 | |
| 
 | |
| 	// What? Fall back to global default, set
 | |
| 	// this back on the form for later use.
 | |
| 	default:
 | |
| 		status.Visibility = gtsmodel.VisibilityDefault
 | |
| 		form.Visibility = p.converter.VisToAPIVis(ctx, gtsmodel.VisibilityDefault)
 | |
| 	}
 | |
| 
 | |
| 	// Set federated according to "local_only" field,
 | |
| 	// assuming federated (ie., not local-only) by default.
 | |
| 	localOnly := util.PtrOrValue(form.LocalOnly, false)
 | |
| 	status.Federated = util.Ptr(!localOnly)
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func processInteractionPolicy(
 | |
| 	form *apimodel.StatusCreateRequest,
 | |
| 	settings *gtsmodel.AccountSettings,
 | |
| 	status *gtsmodel.Status,
 | |
| ) gtserror.WithCode {
 | |
| 
 | |
| 	// If policy is set on the
 | |
| 	// form then prefer this.
 | |
| 	//
 | |
| 	// TODO: prevent scope widening by
 | |
| 	// limiting interaction policy if
 | |
| 	// inReplyTo status has a stricter
 | |
| 	// interaction policy than this one.
 | |
| 	if form.InteractionPolicy != nil {
 | |
| 		p, err := typeutils.APIInteractionPolicyToInteractionPolicy(
 | |
| 			form.InteractionPolicy,
 | |
| 			form.Visibility,
 | |
| 		)
 | |
| 
 | |
| 		if err != nil {
 | |
| 			errWithCode := gtserror.NewErrorBadRequest(err, err.Error())
 | |
| 			return errWithCode
 | |
| 		}
 | |
| 
 | |
| 		status.InteractionPolicy = p
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	switch status.Visibility {
 | |
| 
 | |
| 	case gtsmodel.VisibilityPublic:
 | |
| 		// Take account's default "public" policy if set.
 | |
| 		if p := settings.InteractionPolicyPublic; p != nil {
 | |
| 			status.InteractionPolicy = p
 | |
| 		}
 | |
| 
 | |
| 	case gtsmodel.VisibilityUnlocked:
 | |
| 		// Take account's default "unlisted" policy if set.
 | |
| 		if p := settings.InteractionPolicyUnlocked; p != nil {
 | |
| 			status.InteractionPolicy = p
 | |
| 		}
 | |
| 
 | |
| 	case gtsmodel.VisibilityFollowersOnly,
 | |
| 		gtsmodel.VisibilityMutualsOnly:
 | |
| 		// Take account's default followers-only policy if set.
 | |
| 		// TODO: separate policy for mutuals-only vis.
 | |
| 		if p := settings.InteractionPolicyFollowersOnly; p != nil {
 | |
| 			status.InteractionPolicy = p
 | |
| 		}
 | |
| 
 | |
| 	case gtsmodel.VisibilityDirect:
 | |
| 		// Take account's default direct policy if set.
 | |
| 		if p := settings.InteractionPolicyDirect; p != nil {
 | |
| 			status.InteractionPolicy = p
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// If no policy set by now, status interaction
 | |
| 	// policy will be stored as nil, which just means
 | |
| 	// "fall back to global default policy". We avoid
 | |
| 	// setting it explicitly to save space.
 | |
| 	return nil
 | |
| }
 |