2016-11-16 00:56:29 +09:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-06-08 03:09:25 +09:00
|
|
|
class Api::V1::StatusesController < Api::BaseController
|
2017-05-30 01:22:22 +09:00
|
|
|
include Authorization
|
|
|
|
|
2017-06-10 16:39:26 +09:00
|
|
|
before_action :authorize_if_got_token, except: [:create, :destroy]
|
|
|
|
before_action -> { doorkeeper_authorize! :write }, only: [:create, :destroy]
|
2017-06-10 03:12:40 +09:00
|
|
|
before_action :require_user!, except: [:show, :context, :card]
|
2017-06-10 16:39:26 +09:00
|
|
|
before_action :set_status, only: [:show, :context, :card]
|
2016-11-03 22:50:22 +09:00
|
|
|
|
|
|
|
respond_to :json
|
2016-03-07 20:42:33 +09:00
|
|
|
|
|
|
|
def show
|
2016-11-24 02:56:30 +09:00
|
|
|
cached = Rails.cache.read(@status.cache_key)
|
|
|
|
@status = cached unless cached.nil?
|
2017-07-07 11:02:06 +09:00
|
|
|
render json: @status, serializer: REST::StatusSerializer
|
2016-03-07 20:42:33 +09:00
|
|
|
end
|
|
|
|
|
2016-09-16 07:21:51 +09:00
|
|
|
def context
|
2017-02-06 01:51:44 +09:00
|
|
|
ancestors_results = @status.in_reply_to_id.nil? ? [] : @status.ancestors(current_account)
|
|
|
|
descendants_results = @status.descendants(current_account)
|
|
|
|
loaded_ancestors = cache_collection(ancestors_results, Status)
|
|
|
|
loaded_descendants = cache_collection(descendants_results, Status)
|
|
|
|
|
2017-07-07 11:02:06 +09:00
|
|
|
@context = Context.new(ancestors: loaded_ancestors, descendants: loaded_descendants)
|
|
|
|
statuses = [@status] + @context.ancestors + @context.descendants
|
2016-11-23 06:59:54 +09:00
|
|
|
|
2017-07-07 11:02:06 +09:00
|
|
|
render json: @context, serializer: REST::ContextSerializer, relationships: StatusRelationshipsPresenter.new(statuses, current_user&.account_id)
|
2016-09-16 07:21:51 +09:00
|
|
|
end
|
|
|
|
|
2017-01-20 09:00:14 +09:00
|
|
|
def card
|
2017-09-01 23:20:16 +09:00
|
|
|
@card = @status.preview_cards.first
|
2017-07-07 11:02:06 +09:00
|
|
|
|
|
|
|
if @card.nil?
|
|
|
|
render_empty
|
|
|
|
else
|
|
|
|
render json: @card, serializer: REST::PreviewCardSerializer
|
|
|
|
end
|
2017-01-20 09:00:14 +09:00
|
|
|
end
|
|
|
|
|
2016-03-07 20:42:33 +09:00
|
|
|
def create
|
2017-04-25 22:04:49 +09:00
|
|
|
@status = PostStatusService.new.call(current_user.account,
|
|
|
|
status_params[:status],
|
|
|
|
status_params[:in_reply_to_id].blank? ? nil : Status.find(status_params[:in_reply_to_id]),
|
|
|
|
media_ids: status_params[:media_ids],
|
|
|
|
sensitive: status_params[:sensitive],
|
|
|
|
spoiler_text: status_params[:spoiler_text],
|
|
|
|
visibility: status_params[:visibility],
|
|
|
|
application: doorkeeper_token.application,
|
|
|
|
idempotency: request.headers['Idempotency-Key'])
|
|
|
|
|
2017-07-07 11:02:06 +09:00
|
|
|
render json: @status, serializer: REST::StatusSerializer
|
2016-03-07 20:42:33 +09:00
|
|
|
end
|
|
|
|
|
2016-09-27 06:55:21 +09:00
|
|
|
def destroy
|
|
|
|
@status = Status.where(account_id: current_user.account).find(params[:id])
|
2017-05-31 05:56:31 +09:00
|
|
|
authorize @status, :destroy?
|
|
|
|
|
2016-11-29 23:32:25 +09:00
|
|
|
RemovalWorker.perform_async(@status.id)
|
2017-05-31 05:56:31 +09:00
|
|
|
|
2016-09-27 06:55:21 +09:00
|
|
|
render_empty
|
|
|
|
end
|
|
|
|
|
2016-11-03 22:50:22 +09:00
|
|
|
private
|
|
|
|
|
|
|
|
def set_status
|
|
|
|
@status = Status.find(params[:id])
|
2017-05-30 01:22:22 +09:00
|
|
|
authorize @status, :show?
|
|
|
|
rescue Mastodon::NotPermittedError
|
|
|
|
# Reraise in order to get a 404 instead of a 403 error code
|
|
|
|
raise ActiveRecord::RecordNotFound
|
2016-11-03 22:50:22 +09:00
|
|
|
end
|
2017-04-04 08:33:34 +09:00
|
|
|
|
|
|
|
def status_params
|
|
|
|
params.permit(:status, :in_reply_to_id, :sensitive, :spoiler_text, :visibility, media_ids: [])
|
|
|
|
end
|
2017-04-09 06:39:31 +09:00
|
|
|
|
|
|
|
def pagination_params(core_params)
|
2018-04-02 09:09:50 +09:00
|
|
|
params.slice(:limit).permit(:limit).merge(core_params)
|
2017-04-09 06:39:31 +09:00
|
|
|
end
|
2017-04-19 04:58:57 +09:00
|
|
|
|
|
|
|
def authorize_if_got_token
|
|
|
|
request_token = Doorkeeper::OAuth::Token.from_request(request, *Doorkeeper.configuration.access_token_methods)
|
|
|
|
doorkeeper_authorize! :read if request_token
|
|
|
|
end
|
2016-03-07 20:42:33 +09:00
|
|
|
end
|