2023-03-12 15:00:57 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-08-25 13:34:33 +00:00
|
|
|
|
2021-06-13 16:42:28 +00:00
|
|
|
package status
|
|
|
|
|
|
|
|
import (
|
2021-08-25 13:34:33 +00:00
|
|
|
"context"
|
2021-06-13 16:42:28 +00:00
|
|
|
"time"
|
|
|
|
|
2021-08-31 13:59:12 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/ap"
|
2021-06-13 16:42:28 +00:00
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtserror"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/id"
|
2024-02-29 14:20:57 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2021-08-31 13:59:12 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
2023-02-22 15:05:26 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/typeutils"
|
2021-12-20 14:19:53 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/uris"
|
2023-10-04 12:09:42 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
2021-06-13 16:42:28 +00:00
|
|
|
)
|
|
|
|
|
2023-02-22 15:05:26 +00:00
|
|
|
// Create processes the given form to create a new status, returning the api model representation of that status if it's OK.
|
2024-12-23 17:54:44 +00:00
|
|
|
// Note this also handles validation of incoming form field data.
|
2024-02-29 14:20:57 +00:00
|
|
|
func (p *Processor) Create(
|
|
|
|
ctx context.Context,
|
|
|
|
requester *gtsmodel.Account,
|
|
|
|
application *gtsmodel.Application,
|
2024-08-22 17:47:10 +00:00
|
|
|
form *apimodel.StatusCreateRequest,
|
2024-02-29 14:20:57 +00:00
|
|
|
) (
|
|
|
|
*apimodel.Status,
|
|
|
|
gtserror.WithCode,
|
|
|
|
) {
|
2024-12-23 17:54:44 +00:00
|
|
|
// Validate incoming form status content.
|
|
|
|
if errWithCode := validateStatusContent(
|
|
|
|
form.Status,
|
|
|
|
form.SpoilerText,
|
|
|
|
form.MediaIDs,
|
|
|
|
form.Poll,
|
|
|
|
); errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure account populated; we'll need their settings.
|
2024-03-22 13:03:46 +00:00
|
|
|
if err := p.state.DB.PopulateAccount(ctx, requester); err != nil {
|
|
|
|
log.Errorf(ctx, "error(s) populating account, will continue: %s", err)
|
|
|
|
}
|
|
|
|
|
2023-10-04 12:09:42 +00:00
|
|
|
// Generate new ID for status.
|
|
|
|
statusID := id.NewULID()
|
|
|
|
|
2024-12-23 17:54:44 +00:00
|
|
|
// Process incoming status content fields.
|
|
|
|
content, errWithCode := p.processContent(ctx,
|
|
|
|
requester,
|
|
|
|
statusID,
|
|
|
|
string(form.ContentType),
|
|
|
|
form.Status,
|
|
|
|
form.SpoilerText,
|
|
|
|
form.Language,
|
|
|
|
form.Poll,
|
|
|
|
)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
// Process incoming status attachments.
|
|
|
|
media, errWithCode := p.processMedia(ctx,
|
|
|
|
requester.ID,
|
|
|
|
statusID,
|
|
|
|
form.MediaIDs,
|
|
|
|
)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
|
|
|
}
|
|
|
|
|
2023-10-04 12:09:42 +00:00
|
|
|
// Generate necessary URIs for username, to build status URIs.
|
2024-02-29 14:20:57 +00:00
|
|
|
accountURIs := uris.GenerateURIsForAccount(requester.Username)
|
2023-10-04 12:09:42 +00:00
|
|
|
|
|
|
|
// Get current time.
|
|
|
|
now := time.Now()
|
|
|
|
|
|
|
|
status := >smodel.Status{
|
|
|
|
ID: statusID,
|
|
|
|
URI: accountURIs.StatusesURI + "/" + statusID,
|
|
|
|
URL: accountURIs.StatusesURL + "/" + statusID,
|
|
|
|
CreatedAt: now,
|
|
|
|
UpdatedAt: now,
|
|
|
|
Local: util.Ptr(true),
|
2024-02-29 14:20:57 +00:00
|
|
|
Account: requester,
|
|
|
|
AccountID: requester.ID,
|
|
|
|
AccountURI: requester.URI,
|
2021-08-31 13:59:12 +00:00
|
|
|
ActivityStreamsType: ap.ObjectNote,
|
2023-10-04 12:09:42 +00:00
|
|
|
Sensitive: &form.Sensitive,
|
2021-06-13 16:42:28 +00:00
|
|
|
CreatedWithApplicationID: application.ID,
|
2024-12-23 17:54:44 +00:00
|
|
|
|
|
|
|
// Set validated language.
|
|
|
|
Language: content.Language,
|
|
|
|
|
|
|
|
// Set formatted status content.
|
|
|
|
Content: content.Content,
|
|
|
|
ContentWarning: content.ContentWarning,
|
|
|
|
Text: form.Status, // raw
|
|
|
|
|
|
|
|
// Set gathered mentions.
|
|
|
|
MentionIDs: content.MentionIDs,
|
|
|
|
Mentions: content.Mentions,
|
|
|
|
|
|
|
|
// Set gathered emojis.
|
|
|
|
EmojiIDs: content.EmojiIDs,
|
|
|
|
Emojis: content.Emojis,
|
|
|
|
|
|
|
|
// Set gathered tags.
|
|
|
|
TagIDs: content.TagIDs,
|
|
|
|
Tags: content.Tags,
|
|
|
|
|
|
|
|
// Set gathered media.
|
|
|
|
AttachmentIDs: form.MediaIDs,
|
|
|
|
Attachments: media,
|
2024-10-11 13:21:45 +00:00
|
|
|
|
|
|
|
// Assume not pending approval; this may
|
|
|
|
// change when permissivity is checked.
|
|
|
|
PendingApproval: util.Ptr(false),
|
2021-06-13 16:42:28 +00:00
|
|
|
}
|
|
|
|
|
2024-02-29 14:20:57 +00:00
|
|
|
// Check + attach in-reply-to status.
|
|
|
|
if errWithCode := p.processInReplyTo(ctx,
|
|
|
|
requester,
|
|
|
|
status,
|
|
|
|
form.InReplyToID,
|
|
|
|
); errWithCode != nil {
|
2022-06-08 18:38:03 +00:00
|
|
|
return nil, errWithCode
|
2021-06-13 16:42:28 +00:00
|
|
|
}
|
|
|
|
|
2023-10-25 14:04:53 +00:00
|
|
|
if errWithCode := p.processThreadID(ctx, status); errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
|
|
|
}
|
|
|
|
|
2024-09-18 16:35:35 +00:00
|
|
|
if err := p.processVisibility(ctx, form, requester.Settings.Privacy, status); err != nil {
|
2021-06-13 16:42:28 +00:00
|
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
2024-09-18 16:35:35 +00:00
|
|
|
// Process policy AFTER visibility as it relies
|
|
|
|
// on status.Visibility and form.Visibility being set.
|
|
|
|
if errWithCode := processInteractionPolicy(form, requester.Settings, status); errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
2024-07-17 14:46:52 +00:00
|
|
|
}
|
|
|
|
|
2024-12-23 17:54:44 +00:00
|
|
|
if status.ContentWarning != "" && len(status.AttachmentIDs) > 0 {
|
|
|
|
// If a content-warning is set, and
|
|
|
|
// the status contains media, always
|
|
|
|
// set the status sensitive flag.
|
|
|
|
status.Sensitive = util.Ptr(true)
|
2021-06-13 16:42:28 +00:00
|
|
|
}
|
|
|
|
|
2024-12-23 17:54:44 +00:00
|
|
|
if form.Poll != nil {
|
|
|
|
// Process poll, inserting into database.
|
|
|
|
poll, errWithCode := p.processPoll(ctx,
|
|
|
|
statusID,
|
|
|
|
form.Poll,
|
|
|
|
now,
|
|
|
|
)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
2023-11-08 14:32:17 +00:00
|
|
|
}
|
2024-12-23 17:54:44 +00:00
|
|
|
|
|
|
|
// Set poll and its ID
|
|
|
|
// on status before insert.
|
|
|
|
status.PollID = poll.ID
|
|
|
|
status.Poll = poll
|
|
|
|
poll.Status = status
|
|
|
|
|
|
|
|
// Update the status' ActivityPub type to Question.
|
|
|
|
status.ActivityStreamsType = ap.ActivityQuestion
|
2023-11-08 14:32:17 +00:00
|
|
|
}
|
|
|
|
|
2024-12-23 17:54:44 +00:00
|
|
|
// Insert this newly prepared status into the database.
|
2023-10-04 12:09:42 +00:00
|
|
|
if err := p.state.DB.PutStatus(ctx, status); err != nil {
|
2024-12-23 17:54:44 +00:00
|
|
|
err := gtserror.Newf("error inserting status in db: %w", err)
|
2021-06-13 16:42:28 +00:00
|
|
|
return nil, gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
2024-12-04 09:35:48 +00:00
|
|
|
if status.Poll != nil && !status.Poll.ExpiresAt.IsZero() {
|
2024-12-23 17:54:44 +00:00
|
|
|
// Now that the status is inserted, attempt to
|
|
|
|
// schedule an expiry handler for the status poll.
|
2024-12-04 09:35:48 +00:00
|
|
|
if err := p.polls.ScheduleExpiry(ctx, status.Poll); err != nil {
|
|
|
|
log.Errorf(ctx, "error scheduling poll expiry: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-12-23 17:54:44 +00:00
|
|
|
// Send it to the client API worker for async side-effects.
|
2024-04-26 12:50:46 +00:00
|
|
|
p.state.Workers.Client.Queue.Push(&messages.FromClientAPI{
|
2021-08-31 13:59:12 +00:00
|
|
|
APObjectType: ap.ObjectNote,
|
|
|
|
APActivityType: ap.ActivityCreate,
|
2023-10-04 12:09:42 +00:00
|
|
|
GTSModel: status,
|
2024-04-26 12:50:46 +00:00
|
|
|
Origin: requester,
|
2022-04-28 12:23:11 +00:00
|
|
|
})
|
2021-06-13 16:42:28 +00:00
|
|
|
|
2024-09-23 12:42:19 +00:00
|
|
|
// If the new status replies to a status that
|
|
|
|
// replies to us, use our reply as an implicit
|
|
|
|
// accept of any pending interaction.
|
|
|
|
implicitlyAccepted, errWithCode := p.implicitlyAccept(ctx,
|
|
|
|
requester, status,
|
|
|
|
)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return nil, errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we ended up implicitly accepting, mark the
|
|
|
|
// replied-to status as no longer pending approval
|
|
|
|
// so it's serialized properly via the API.
|
|
|
|
if implicitlyAccepted {
|
|
|
|
status.InReplyTo.PendingApproval = util.Ptr(false)
|
|
|
|
}
|
|
|
|
|
2024-02-29 14:20:57 +00:00
|
|
|
return p.c.GetAPIStatus(ctx, requester, status)
|
2021-06-13 16:42:28 +00:00
|
|
|
}
|
2023-02-22 15:05:26 +00:00
|
|
|
|
2024-02-29 14:20:57 +00:00
|
|
|
func (p *Processor) processInReplyTo(ctx context.Context, requester *gtsmodel.Account, status *gtsmodel.Status, inReplyToID string) gtserror.WithCode {
|
|
|
|
if inReplyToID == "" {
|
2024-07-24 11:27:42 +00:00
|
|
|
// Not a reply.
|
|
|
|
// Nothing to do.
|
2023-02-22 15:05:26 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-02-29 14:20:57 +00:00
|
|
|
// Fetch target in-reply-to status (checking visibility).
|
|
|
|
inReplyTo, errWithCode := p.c.GetVisibleTargetStatus(ctx,
|
|
|
|
requester,
|
|
|
|
inReplyToID,
|
|
|
|
nil,
|
|
|
|
)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return errWithCode
|
2023-02-22 15:05:26 +00:00
|
|
|
}
|
2023-10-04 12:09:42 +00:00
|
|
|
|
2024-02-29 14:20:57 +00:00
|
|
|
// If this is a boost, unwrap it to get source status.
|
|
|
|
inReplyTo, errWithCode = p.c.UnwrapIfBoost(ctx,
|
|
|
|
requester,
|
|
|
|
inReplyTo,
|
|
|
|
)
|
|
|
|
if errWithCode != nil {
|
|
|
|
return errWithCode
|
2023-02-22 15:05:26 +00:00
|
|
|
}
|
|
|
|
|
2024-07-24 11:27:42 +00:00
|
|
|
// Ensure valid reply target for requester.
|
|
|
|
policyResult, err := p.intFilter.StatusReplyable(ctx,
|
|
|
|
requester,
|
|
|
|
inReplyTo,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
err := gtserror.Newf("error seeing if status %s is replyable: %w", status.ID, err)
|
|
|
|
return gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if policyResult.Forbidden() {
|
|
|
|
const errText = "you do not have permission to reply to this status"
|
|
|
|
err := gtserror.New(errText)
|
|
|
|
return gtserror.NewErrorForbidden(err, errText)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Derive pendingApproval status.
|
|
|
|
var pendingApproval bool
|
|
|
|
switch {
|
|
|
|
case policyResult.WithApproval():
|
|
|
|
// We're allowed to do
|
|
|
|
// this pending approval.
|
|
|
|
pendingApproval = true
|
|
|
|
|
|
|
|
case policyResult.MatchedOnCollection():
|
|
|
|
// We're permitted to do this, but since
|
|
|
|
// we matched due to presence in a followers
|
|
|
|
// or following collection, we should mark
|
2024-07-26 10:04:28 +00:00
|
|
|
// as pending approval and wait until we can
|
|
|
|
// prove it's been Accepted by the target.
|
2024-07-24 11:27:42 +00:00
|
|
|
pendingApproval = true
|
|
|
|
|
2024-07-26 10:04:28 +00:00
|
|
|
if *inReplyTo.Local {
|
|
|
|
// If the target is local we don't need
|
|
|
|
// to wait for an Accept from remote,
|
|
|
|
// we can just preapprove it and have
|
|
|
|
// the processor create the Accept.
|
|
|
|
status.PreApproved = true
|
|
|
|
}
|
|
|
|
|
2024-07-24 11:27:42 +00:00
|
|
|
case policyResult.Permitted():
|
|
|
|
// We're permitted to do this
|
|
|
|
// based on another kind of match.
|
|
|
|
pendingApproval = false
|
|
|
|
}
|
|
|
|
|
|
|
|
status.PendingApproval = &pendingApproval
|
|
|
|
|
2023-10-04 12:09:42 +00:00
|
|
|
// Set status fields from inReplyTo.
|
|
|
|
status.InReplyToID = inReplyTo.ID
|
2023-10-25 14:04:53 +00:00
|
|
|
status.InReplyTo = inReplyTo
|
2023-10-04 12:09:42 +00:00
|
|
|
status.InReplyToURI = inReplyTo.URI
|
|
|
|
status.InReplyToAccountID = inReplyTo.AccountID
|
2023-02-22 15:05:26 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-10-25 14:04:53 +00:00
|
|
|
func (p *Processor) processThreadID(ctx context.Context, status *gtsmodel.Status) gtserror.WithCode {
|
2024-02-19 10:50:49 +00:00
|
|
|
// Status takes the thread ID of
|
|
|
|
// whatever it replies to, if set.
|
|
|
|
//
|
|
|
|
// Might not be set if status is local
|
|
|
|
// and replies to a remote status that
|
|
|
|
// doesn't have a thread ID yet.
|
|
|
|
//
|
|
|
|
// If so, we can just thread from this
|
|
|
|
// status onwards instead, since this
|
|
|
|
// is where the relevant part of the
|
|
|
|
// thread starts, from the perspective
|
|
|
|
// of our instance at least.
|
|
|
|
if status.InReplyTo != nil &&
|
|
|
|
status.InReplyTo.ThreadID != "" {
|
|
|
|
// Just inherit threadID from parent.
|
2023-10-25 14:04:53 +00:00
|
|
|
status.ThreadID = status.InReplyTo.ThreadID
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-02-19 10:50:49 +00:00
|
|
|
// Mark new thread (or threaded
|
|
|
|
// subsection) starting from here.
|
2023-10-25 14:04:53 +00:00
|
|
|
threadID := id.NewULID()
|
|
|
|
if err := p.state.DB.PutThread(
|
|
|
|
ctx,
|
|
|
|
>smodel.Thread{
|
|
|
|
ID: threadID,
|
|
|
|
},
|
|
|
|
); err != nil {
|
|
|
|
err := gtserror.Newf("error inserting new thread in db: %w", err)
|
|
|
|
return gtserror.NewErrorInternalError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Future replies to this status
|
|
|
|
// (if any) will inherit this thread ID.
|
|
|
|
status.ThreadID = threadID
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-09-18 16:35:35 +00:00
|
|
|
func (p *Processor) processVisibility(
|
|
|
|
ctx context.Context,
|
2024-08-22 17:47:10 +00:00
|
|
|
form *apimodel.StatusCreateRequest,
|
2024-07-17 14:46:52 +00:00
|
|
|
accountDefaultVis gtsmodel.Visibility,
|
|
|
|
status *gtsmodel.Status,
|
|
|
|
) error {
|
2023-02-22 15:05:26 +00:00
|
|
|
switch {
|
2024-07-17 14:46:52 +00:00
|
|
|
// Visibility set on form, use that.
|
2023-02-22 15:05:26 +00:00
|
|
|
case form.Visibility != "":
|
2024-07-17 14:46:52 +00:00
|
|
|
status.Visibility = typeutils.APIVisToVis(form.Visibility)
|
|
|
|
|
2024-09-18 16:35:35 +00:00
|
|
|
// Fall back to account default, set
|
|
|
|
// this back on the form for later use.
|
2024-11-25 13:48:59 +00:00
|
|
|
case accountDefaultVis != 0:
|
2024-07-17 14:46:52 +00:00
|
|
|
status.Visibility = accountDefaultVis
|
2024-09-18 16:35:35 +00:00
|
|
|
form.Visibility = p.converter.VisToAPIVis(ctx, accountDefaultVis)
|
2024-07-17 14:46:52 +00:00
|
|
|
|
2024-09-18 16:35:35 +00:00
|
|
|
// What? Fall back to global default, set
|
|
|
|
// this back on the form for later use.
|
2023-02-22 15:05:26 +00:00
|
|
|
default:
|
2024-07-17 14:46:52 +00:00
|
|
|
status.Visibility = gtsmodel.VisibilityDefault
|
2024-09-18 16:35:35 +00:00
|
|
|
form.Visibility = p.converter.VisToAPIVis(ctx, gtsmodel.VisibilityDefault)
|
2023-02-22 15:05:26 +00:00
|
|
|
}
|
|
|
|
|
2024-08-22 17:47:10 +00:00
|
|
|
// Set federated according to "local_only" field,
|
|
|
|
// assuming federated (ie., not local-only) by default.
|
|
|
|
localOnly := util.PtrOrValue(form.LocalOnly, false)
|
|
|
|
status.Federated = util.Ptr(!localOnly)
|
2024-07-17 14:46:52 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func processInteractionPolicy(
|
2024-09-18 16:35:35 +00:00
|
|
|
form *apimodel.StatusCreateRequest,
|
2024-07-17 14:46:52 +00:00
|
|
|
settings *gtsmodel.AccountSettings,
|
|
|
|
status *gtsmodel.Status,
|
2024-09-18 16:35:35 +00:00
|
|
|
) gtserror.WithCode {
|
2024-07-17 14:46:52 +00:00
|
|
|
|
2024-09-18 16:35:35 +00:00
|
|
|
// If policy is set on the
|
|
|
|
// form then prefer this.
|
|
|
|
//
|
2024-07-17 14:46:52 +00:00
|
|
|
// TODO: prevent scope widening by
|
|
|
|
// limiting interaction policy if
|
|
|
|
// inReplyTo status has a stricter
|
|
|
|
// interaction policy than this one.
|
2024-09-18 16:35:35 +00:00
|
|
|
if form.InteractionPolicy != nil {
|
|
|
|
p, err := typeutils.APIInteractionPolicyToInteractionPolicy(
|
|
|
|
form.InteractionPolicy,
|
|
|
|
form.Visibility,
|
|
|
|
)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
errWithCode := gtserror.NewErrorBadRequest(err, err.Error())
|
|
|
|
return errWithCode
|
|
|
|
}
|
|
|
|
|
|
|
|
status.InteractionPolicy = p
|
|
|
|
return nil
|
|
|
|
}
|
2024-07-17 14:46:52 +00:00
|
|
|
|
|
|
|
switch status.Visibility {
|
|
|
|
|
|
|
|
case gtsmodel.VisibilityPublic:
|
|
|
|
// Take account's default "public" policy if set.
|
|
|
|
if p := settings.InteractionPolicyPublic; p != nil {
|
|
|
|
status.InteractionPolicy = p
|
|
|
|
}
|
|
|
|
|
|
|
|
case gtsmodel.VisibilityUnlocked:
|
|
|
|
// Take account's default "unlisted" policy if set.
|
|
|
|
if p := settings.InteractionPolicyUnlocked; p != nil {
|
|
|
|
status.InteractionPolicy = p
|
|
|
|
}
|
|
|
|
|
|
|
|
case gtsmodel.VisibilityFollowersOnly,
|
|
|
|
gtsmodel.VisibilityMutualsOnly:
|
|
|
|
// Take account's default followers-only policy if set.
|
|
|
|
// TODO: separate policy for mutuals-only vis.
|
|
|
|
if p := settings.InteractionPolicyFollowersOnly; p != nil {
|
|
|
|
status.InteractionPolicy = p
|
|
|
|
}
|
|
|
|
|
|
|
|
case gtsmodel.VisibilityDirect:
|
|
|
|
// Take account's default direct policy if set.
|
|
|
|
if p := settings.InteractionPolicyDirect; p != nil {
|
|
|
|
status.InteractionPolicy = p
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If no policy set by now, status interaction
|
|
|
|
// policy will be stored as nil, which just means
|
|
|
|
// "fall back to global default policy". We avoid
|
|
|
|
// setting it explicitly to save space.
|
2023-02-22 15:05:26 +00:00
|
|
|
return nil
|
|
|
|
}
|