Conflicts: - `.github/dependabot.yml`: Updated upstream, removed in glitch-soc to disable noise. Kept removed. - `CODE_OF_CONDUCT.md`: Upstream updated to a new version of the covenant, but I have not read it yet, so kept unchanged. - `Gemfile.lock`: Not a real conflict, one upstream dependency updated textually too close to the glitch-soc only `hcaptcha` dependency. Applied upstream changes. - `app/controllers/admin/base_controller.rb`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `app/controllers/application_controller.rb`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `app/controllers/disputes/base_controller.rb`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `app/controllers/relationships_controller.rb`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `app/controllers/statuses_cleanup_controller.rb`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `app/helpers/application_helper.rb`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `app/javascript/mastodon/features/compose/components/compose_form.jsx`: Upstream added a highlight animation for onboarding, while we changed the max character limit. Applied our local changes on top of upstream's new version. - `app/views/layouts/application.html.haml`: Minor conflict due to glitch-soc's theming system. Applied upstream changes. - `stylelint.config.js`: Upstream added ignore paths, glitch-soc had extra ignore paths. Added the same paths as upstream.
		
			
				
	
	
		
			75 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			75 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| class ActivityPub::CollectionsController < ActivityPub::BaseController
 | |
|   include SignatureVerification
 | |
|   include AccountOwnedConcern
 | |
| 
 | |
|   vary_by -> { 'Signature' if authorized_fetch_mode? }
 | |
| 
 | |
|   before_action :require_account_signature!, if: :authorized_fetch_mode?
 | |
|   before_action :set_items
 | |
|   before_action :set_size
 | |
|   before_action :set_type
 | |
| 
 | |
|   def show
 | |
|     expires_in 3.minutes, public: public_fetch_mode?
 | |
|     render_with_cache json: collection_presenter, content_type: 'application/activity+json', serializer: ActivityPub::CollectionSerializer, adapter: ActivityPub::Adapter
 | |
|   end
 | |
| 
 | |
|   private
 | |
| 
 | |
|   def set_items
 | |
|     case params[:id]
 | |
|     when 'featured'
 | |
|       @items = for_signed_account { cache_collection(@account.pinned_statuses.not_local_only, Status) }
 | |
|       @items = @items.map { |item| item.distributable? ? item : ActivityPub::TagManager.instance.uri_for(item) }
 | |
|     when 'tags'
 | |
|       @items = for_signed_account { @account.featured_tags }
 | |
|     when 'devices'
 | |
|       @items = @account.devices
 | |
|     else
 | |
|       not_found
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def set_size
 | |
|     case params[:id]
 | |
|     when 'featured', 'devices', 'tags'
 | |
|       @size = @items.size
 | |
|     else
 | |
|       not_found
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def set_type
 | |
|     case params[:id]
 | |
|     when 'featured'
 | |
|       @type = :ordered
 | |
|     when 'devices', 'tags'
 | |
|       @type = :unordered
 | |
|     else
 | |
|       not_found
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def collection_presenter
 | |
|     ActivityPub::CollectionPresenter.new(
 | |
|       id: account_collection_url(@account, params[:id]),
 | |
|       type: @type,
 | |
|       size: @size,
 | |
|       items: @items
 | |
|     )
 | |
|   end
 | |
| 
 | |
|   def for_signed_account
 | |
|     # Because in public fetch mode we cache the response, there would be no
 | |
|     # benefit from performing the check below, since a blocked account or domain
 | |
|     # would likely be served the cache from the reverse proxy anyway
 | |
| 
 | |
|     if authorized_fetch_mode? && !signed_request_account.nil? && (@account.blocking?(signed_request_account) || (!signed_request_account.domain.nil? && @account.domain_blocking?(signed_request_account.domain)))
 | |
|       []
 | |
|     else
 | |
|       yield
 | |
|     end
 | |
|   end
 | |
| end
 |