2024-01-25 14:22:11 +00:00
|
|
|
use crate::{
|
|
|
|
context::LemmyContext,
|
2024-03-27 14:54:42 +00:00
|
|
|
lemmy_db_schema::traits::Crud,
|
2024-01-25 14:22:11 +00:00
|
|
|
post::{LinkMetadata, OpenGraphData},
|
2024-03-27 14:54:42 +00:00
|
|
|
send_activity::{ActivityChannel, SendActivityData},
|
2024-09-16 15:18:16 +00:00
|
|
|
utils::proxy_image_link,
|
2024-01-25 14:22:11 +00:00
|
|
|
};
|
2024-03-27 13:00:52 +00:00
|
|
|
use activitypub_federation::config::Data;
|
2024-05-22 08:28:47 +00:00
|
|
|
use chrono::{DateTime, Utc};
|
2024-05-03 10:42:48 +00:00
|
|
|
use encoding_rs::{Encoding, UTF_8};
|
2024-08-07 14:35:08 +00:00
|
|
|
use futures::StreamExt;
|
2024-03-08 15:17:26 +00:00
|
|
|
use lemmy_db_schema::{
|
|
|
|
newtypes::DbUrl,
|
2024-03-27 14:54:42 +00:00
|
|
|
source::{
|
2024-06-20 10:44:06 +00:00
|
|
|
images::{ImageDetailsForm, LocalImage, LocalImageForm},
|
2024-03-27 14:54:42 +00:00
|
|
|
post::{Post, PostUpdateForm},
|
2024-09-16 15:18:16 +00:00
|
|
|
site::Site,
|
2024-03-27 14:54:42 +00:00
|
|
|
},
|
2024-03-08 15:17:26 +00:00
|
|
|
};
|
2022-06-13 19:15:04 +00:00
|
|
|
use lemmy_utils::{
|
2024-04-10 14:14:11 +00:00
|
|
|
error::{LemmyError, LemmyErrorType, LemmyResult},
|
2024-01-25 14:22:11 +00:00
|
|
|
settings::structs::{PictrsImageMode, Settings},
|
2022-06-13 19:15:04 +00:00
|
|
|
REQWEST_TIMEOUT,
|
2024-04-02 15:19:51 +00:00
|
|
|
VERSION,
|
2022-06-13 19:15:04 +00:00
|
|
|
};
|
2024-01-25 14:22:11 +00:00
|
|
|
use mime::Mime;
|
2024-08-07 14:35:08 +00:00
|
|
|
use reqwest::{
|
|
|
|
header::{CONTENT_TYPE, RANGE},
|
|
|
|
Client,
|
|
|
|
ClientBuilder,
|
|
|
|
Response,
|
|
|
|
};
|
2022-05-03 17:44:13 +00:00
|
|
|
use reqwest_middleware::ClientWithMiddleware;
|
2024-05-22 08:28:47 +00:00
|
|
|
use serde::{Deserialize, Serialize};
|
2022-05-03 17:44:13 +00:00
|
|
|
use tracing::info;
|
|
|
|
use url::Url;
|
2024-01-25 14:22:11 +00:00
|
|
|
use urlencoding::encode;
|
2022-05-03 17:44:13 +00:00
|
|
|
use webpage::HTML;
|
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
pub fn client_builder(settings: &Settings) -> ClientBuilder {
|
2024-04-02 15:19:51 +00:00
|
|
|
let user_agent = format!("Lemmy/{VERSION}; +{}", settings.get_protocol_and_hostname());
|
2024-01-25 14:22:11 +00:00
|
|
|
|
|
|
|
Client::builder()
|
|
|
|
.user_agent(user_agent.clone())
|
|
|
|
.timeout(REQWEST_TIMEOUT)
|
|
|
|
.connect_timeout(REQWEST_TIMEOUT)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Fetches metadata for the given link and optionally generates thumbnail.
|
2022-05-03 17:44:13 +00:00
|
|
|
#[tracing::instrument(skip_all)]
|
2024-04-17 14:36:45 +00:00
|
|
|
pub async fn fetch_link_metadata(url: &Url, context: &LemmyContext) -> LemmyResult<LinkMetadata> {
|
2022-05-03 17:44:13 +00:00
|
|
|
info!("Fetching site metadata for url: {}", url);
|
2024-08-07 14:35:08 +00:00
|
|
|
// We only fetch the first 64kB of data in order to not waste bandwidth especially for large
|
|
|
|
// binary files
|
|
|
|
let bytes_to_fetch = 64 * 1024;
|
|
|
|
let response = context
|
|
|
|
.client()
|
|
|
|
.get(url.as_str())
|
|
|
|
// we only need the first chunk of data. Note that we do not check for Accept-Range so the
|
|
|
|
// server may ignore this and still respond with the full response
|
|
|
|
.header(RANGE, format!("bytes=0-{}", bytes_to_fetch - 1)) /* -1 because inclusive */
|
|
|
|
.send()
|
|
|
|
.await?;
|
2024-01-25 14:22:11 +00:00
|
|
|
|
|
|
|
let content_type: Option<Mime> = response
|
|
|
|
.headers()
|
|
|
|
.get(CONTENT_TYPE)
|
|
|
|
.and_then(|h| h.to_str().ok())
|
|
|
|
.and_then(|h| h.parse().ok());
|
2022-05-03 17:44:13 +00:00
|
|
|
|
2024-08-07 14:35:08 +00:00
|
|
|
let opengraph_data = {
|
|
|
|
// if the content type is not text/html, we don't need to parse it
|
|
|
|
let is_html = content_type
|
|
|
|
.as_ref()
|
|
|
|
.map(|c| {
|
|
|
|
(c.type_() == mime::TEXT && c.subtype() == mime::HTML)
|
|
|
|
||
|
|
|
|
// application/xhtml+xml is a subset of HTML
|
|
|
|
(c.type_() == mime::APPLICATION && c.subtype() == "xhtml")
|
|
|
|
})
|
|
|
|
.unwrap_or(false);
|
|
|
|
if !is_html {
|
|
|
|
Default::default()
|
|
|
|
} else {
|
|
|
|
// Can't use .text() here, because it only checks the content header, not the actual bytes
|
|
|
|
// https://github.com/LemmyNet/lemmy/issues/1964
|
|
|
|
// So we want to do deep inspection of the actually returned bytes but need to be careful not
|
|
|
|
// spend too much time parsing binary data as HTML
|
2022-05-03 17:44:13 +00:00
|
|
|
|
2024-08-07 14:35:08 +00:00
|
|
|
// only take first bytes regardless of how many bytes the server returns
|
|
|
|
let html_bytes = collect_bytes_until_limit(response, bytes_to_fetch).await?;
|
|
|
|
extract_opengraph_data(&html_bytes, url)
|
|
|
|
.map_err(|e| info!("{e}"))
|
|
|
|
.unwrap_or_default()
|
|
|
|
}
|
|
|
|
};
|
2024-01-25 14:22:11 +00:00
|
|
|
Ok(LinkMetadata {
|
|
|
|
opengraph_data,
|
|
|
|
content_type: content_type.map(|c| c.to_string()),
|
|
|
|
})
|
|
|
|
}
|
2022-05-03 17:44:13 +00:00
|
|
|
|
2024-08-07 14:35:08 +00:00
|
|
|
async fn collect_bytes_until_limit(
|
|
|
|
response: Response,
|
|
|
|
requested_bytes: usize,
|
|
|
|
) -> Result<Vec<u8>, LemmyError> {
|
|
|
|
let mut stream = response.bytes_stream();
|
|
|
|
let mut bytes = Vec::with_capacity(requested_bytes);
|
|
|
|
while let Some(chunk) = stream.next().await {
|
|
|
|
let chunk = chunk.map_err(LemmyError::from)?;
|
|
|
|
// we may go over the requested size here but the important part is we don't keep aggregating
|
|
|
|
// more chunks than needed
|
|
|
|
bytes.extend_from_slice(&chunk);
|
|
|
|
if bytes.len() >= requested_bytes {
|
|
|
|
bytes.truncate(requested_bytes);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(bytes)
|
|
|
|
}
|
|
|
|
|
2024-05-22 08:28:47 +00:00
|
|
|
/// Generates and saves a post thumbnail and metadata.
|
2024-03-27 14:54:42 +00:00
|
|
|
///
|
|
|
|
/// Takes a callback to generate a send activity task, so that post can be federated with metadata.
|
2024-04-17 14:36:45 +00:00
|
|
|
///
|
|
|
|
/// TODO: `federated_thumbnail` param can be removed once we federate full metadata and can
|
|
|
|
/// write it to db directly, without calling this function.
|
|
|
|
/// https://github.com/LemmyNet/lemmy/issues/4598
|
2024-05-22 08:28:47 +00:00
|
|
|
pub async fn generate_post_link_metadata(
|
2024-03-27 14:54:42 +00:00
|
|
|
post: Post,
|
|
|
|
custom_thumbnail: Option<Url>,
|
|
|
|
send_activity: impl FnOnce(Post) -> Option<SendActivityData> + Send + 'static,
|
|
|
|
context: Data<LemmyContext>,
|
2024-05-22 08:28:47 +00:00
|
|
|
) -> LemmyResult<()> {
|
|
|
|
let metadata = match &post.url {
|
|
|
|
Some(url) => fetch_link_metadata(url, &context).await.unwrap_or_default(),
|
|
|
|
_ => Default::default(),
|
|
|
|
};
|
|
|
|
|
|
|
|
let is_image_post = metadata
|
|
|
|
.content_type
|
|
|
|
.as_ref()
|
|
|
|
.is_some_and(|content_type| content_type.starts_with("image"));
|
|
|
|
|
|
|
|
// Decide if we are allowed to generate local thumbnail
|
2024-09-16 15:18:16 +00:00
|
|
|
let site = Site::read_local(&mut context.pool()).await?;
|
|
|
|
let allow_sensitive = site.content_warning.is_some();
|
2024-05-22 08:28:47 +00:00
|
|
|
let allow_generate_thumbnail = allow_sensitive || !post.nsfw;
|
|
|
|
|
|
|
|
let image_url = if is_image_post {
|
|
|
|
post.url
|
|
|
|
} else {
|
|
|
|
metadata.opengraph_data.image.clone()
|
|
|
|
};
|
|
|
|
|
|
|
|
let thumbnail_url = if let (false, Some(url)) = (is_image_post, custom_thumbnail) {
|
|
|
|
proxy_image_link(url, &context).await.ok()
|
|
|
|
} else if let (true, Some(url)) = (allow_generate_thumbnail, image_url) {
|
|
|
|
generate_pictrs_thumbnail(&url, &context)
|
|
|
|
.await
|
|
|
|
.ok()
|
|
|
|
.map(Into::into)
|
|
|
|
} else {
|
|
|
|
metadata.opengraph_data.image.clone()
|
|
|
|
};
|
|
|
|
|
|
|
|
let form = PostUpdateForm {
|
|
|
|
embed_title: Some(metadata.opengraph_data.title),
|
|
|
|
embed_description: Some(metadata.opengraph_data.description),
|
|
|
|
embed_video_url: Some(metadata.opengraph_data.embed_video_url),
|
|
|
|
thumbnail_url: Some(thumbnail_url),
|
|
|
|
url_content_type: Some(metadata.content_type),
|
|
|
|
..Default::default()
|
|
|
|
};
|
|
|
|
let updated_post = Post::update(&mut context.pool(), post.id, &form).await?;
|
|
|
|
if let Some(send_activity) = send_activity(updated_post) {
|
|
|
|
ActivityChannel::submit_activity(send_activity, &context).await?;
|
|
|
|
}
|
|
|
|
Ok(())
|
2024-03-27 14:54:42 +00:00
|
|
|
}
|
2022-05-03 17:44:13 +00:00
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
/// Extract site metadata from HTML Opengraph attributes.
|
2024-04-10 14:14:11 +00:00
|
|
|
fn extract_opengraph_data(html_bytes: &[u8], url: &Url) -> LemmyResult<OpenGraphData> {
|
2022-05-03 17:44:13 +00:00
|
|
|
let html = String::from_utf8_lossy(html_bytes);
|
|
|
|
|
|
|
|
let mut page = HTML::from_string(html.to_string(), None)?;
|
|
|
|
|
|
|
|
// If the web page specifies that it isn't actually UTF-8, re-decode the received bytes with the
|
|
|
|
// proper encoding. If the specified encoding cannot be found, fall back to the original UTF-8
|
|
|
|
// version.
|
|
|
|
if let Some(charset) = page.meta.get("charset") {
|
2024-05-03 10:42:48 +00:00
|
|
|
if charset != UTF_8.name() {
|
|
|
|
if let Some(encoding) = Encoding::for_label(charset.as_bytes()) {
|
|
|
|
page = HTML::from_string(encoding.decode(html_bytes).0.into(), None)?;
|
2022-05-03 17:44:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let page_title = page.title;
|
|
|
|
let page_description = page.description;
|
|
|
|
|
|
|
|
let og_description = page
|
|
|
|
.opengraph
|
|
|
|
.properties
|
|
|
|
.get("description")
|
2022-11-19 04:33:54 +00:00
|
|
|
.map(std::string::ToString::to_string);
|
2022-05-03 17:44:13 +00:00
|
|
|
let og_title = page
|
|
|
|
.opengraph
|
|
|
|
.properties
|
|
|
|
.get("title")
|
2022-11-19 04:33:54 +00:00
|
|
|
.map(std::string::ToString::to_string);
|
2022-05-03 17:44:13 +00:00
|
|
|
let og_image = page
|
|
|
|
.opengraph
|
|
|
|
.images
|
2023-02-28 11:34:50 +00:00
|
|
|
.first()
|
2023-06-26 13:07:57 +00:00
|
|
|
// join also works if the target URL is absolute
|
|
|
|
.and_then(|ogo| url.join(&ogo.url).ok());
|
2022-06-02 21:44:47 +00:00
|
|
|
let og_embed_url = page
|
|
|
|
.opengraph
|
|
|
|
.videos
|
|
|
|
.first()
|
2023-06-26 13:07:57 +00:00
|
|
|
// join also works if the target URL is absolute
|
|
|
|
.and_then(|v| url.join(&v.url).ok());
|
2022-05-03 17:44:13 +00:00
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
Ok(OpenGraphData {
|
2022-06-02 21:44:47 +00:00
|
|
|
title: og_title.or(page_title),
|
|
|
|
description: og_description.or(page_description),
|
|
|
|
image: og_image.map(Into::into),
|
|
|
|
embed_video_url: og_embed_url.map(Into::into),
|
2022-05-03 17:44:13 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-05-22 08:28:47 +00:00
|
|
|
#[derive(Deserialize, Serialize, Debug)]
|
|
|
|
pub struct PictrsResponse {
|
|
|
|
pub files: Option<Vec<PictrsFile>>,
|
|
|
|
pub msg: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize, Serialize, Debug)]
|
|
|
|
pub struct PictrsFile {
|
|
|
|
pub file: String,
|
|
|
|
pub delete_token: String,
|
|
|
|
pub details: PictrsFileDetails,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PictrsFile {
|
|
|
|
pub fn thumbnail_url(&self, protocol_and_hostname: &str) -> Result<Url, url::ParseError> {
|
|
|
|
Url::parse(&format!(
|
|
|
|
"{protocol_and_hostname}/pictrs/image/{}",
|
|
|
|
self.file
|
|
|
|
))
|
|
|
|
}
|
2022-05-03 17:44:13 +00:00
|
|
|
}
|
|
|
|
|
2024-05-22 08:28:47 +00:00
|
|
|
/// Stores extra details about a Pictrs image.
|
|
|
|
#[derive(Deserialize, Serialize, Debug)]
|
|
|
|
pub struct PictrsFileDetails {
|
|
|
|
/// In pixels
|
|
|
|
pub width: u16,
|
|
|
|
/// In pixels
|
|
|
|
pub height: u16,
|
|
|
|
pub content_type: String,
|
|
|
|
pub created_at: DateTime<Utc>,
|
2022-05-03 17:44:13 +00:00
|
|
|
}
|
|
|
|
|
2024-06-20 10:44:06 +00:00
|
|
|
impl PictrsFileDetails {
|
|
|
|
/// Builds the image form. This should always use the thumbnail_url,
|
|
|
|
/// Because the post_view joins to it
|
|
|
|
pub fn build_image_details_form(&self, thumbnail_url: &Url) -> ImageDetailsForm {
|
|
|
|
ImageDetailsForm {
|
|
|
|
link: thumbnail_url.clone().into(),
|
|
|
|
width: self.width.into(),
|
|
|
|
height: self.height.into(),
|
|
|
|
content_type: self.content_type.clone(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-05-22 08:28:47 +00:00
|
|
|
#[derive(Deserialize, Serialize, Debug)]
|
2024-01-25 14:22:11 +00:00
|
|
|
struct PictrsPurgeResponse {
|
2022-06-13 19:15:04 +00:00
|
|
|
msg: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Purges an image from pictrs
|
|
|
|
/// Note: This should often be coerced from a Result to .ok() in order to fail softly, because:
|
|
|
|
/// - It might fail due to image being not local
|
|
|
|
/// - It might not be an image
|
|
|
|
/// - Pictrs might not be set up
|
2024-04-10 14:14:11 +00:00
|
|
|
pub async fn purge_image_from_pictrs(image_url: &Url, context: &LemmyContext) -> LemmyResult<()> {
|
2023-08-28 10:23:45 +00:00
|
|
|
is_image_content_type(context.client(), image_url).await?;
|
2022-06-13 19:15:04 +00:00
|
|
|
|
|
|
|
let alias = image_url
|
|
|
|
.path_segments()
|
2023-07-10 14:50:07 +00:00
|
|
|
.ok_or(LemmyErrorType::ImageUrlMissingPathSegments)?
|
2022-06-13 19:15:04 +00:00
|
|
|
.next_back()
|
2023-07-10 14:50:07 +00:00
|
|
|
.ok_or(LemmyErrorType::ImageUrlMissingLastPathSegment)?;
|
2022-06-13 19:15:04 +00:00
|
|
|
|
2023-09-06 13:13:30 +00:00
|
|
|
let pictrs_config = context.settings().pictrs_config()?;
|
|
|
|
let purge_url = format!("{}internal/purge?alias={}", pictrs_config.url, alias);
|
2022-06-13 19:15:04 +00:00
|
|
|
|
2022-07-11 20:38:37 +00:00
|
|
|
let pictrs_api_key = pictrs_config
|
|
|
|
.api_key
|
2023-07-10 14:50:07 +00:00
|
|
|
.ok_or(LemmyErrorType::PictrsApiKeyNotProvided)?;
|
2023-08-28 10:23:45 +00:00
|
|
|
let response = context
|
|
|
|
.client()
|
2022-06-13 19:15:04 +00:00
|
|
|
.post(&purge_url)
|
|
|
|
.timeout(REQWEST_TIMEOUT)
|
2022-07-11 20:38:37 +00:00
|
|
|
.header("x-api-token", pictrs_api_key)
|
2022-06-13 19:15:04 +00:00
|
|
|
.send()
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
let response: PictrsPurgeResponse = response.json().await.map_err(LemmyError::from)?;
|
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
match response.msg.as_str() {
|
|
|
|
"ok" => Ok(()),
|
|
|
|
_ => Err(LemmyErrorType::PictrsPurgeResponseError(response.msg))?,
|
2022-05-03 17:44:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-06 13:13:30 +00:00
|
|
|
pub async fn delete_image_from_pictrs(
|
|
|
|
alias: &str,
|
|
|
|
delete_token: &str,
|
|
|
|
context: &LemmyContext,
|
2024-04-10 14:14:11 +00:00
|
|
|
) -> LemmyResult<()> {
|
2023-09-06 13:13:30 +00:00
|
|
|
let pictrs_config = context.settings().pictrs_config()?;
|
|
|
|
let url = format!(
|
|
|
|
"{}image/delete/{}/{}",
|
|
|
|
pictrs_config.url, &delete_token, &alias
|
|
|
|
);
|
|
|
|
context
|
|
|
|
.client()
|
|
|
|
.delete(&url)
|
|
|
|
.timeout(REQWEST_TIMEOUT)
|
|
|
|
.send()
|
|
|
|
.await
|
|
|
|
.map_err(LemmyError::from)?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
/// Retrieves the image with local pict-rs and generates a thumbnail. Returns the thumbnail url.
|
2022-05-03 17:44:13 +00:00
|
|
|
#[tracing::instrument(skip_all)]
|
2024-04-10 14:14:11 +00:00
|
|
|
async fn generate_pictrs_thumbnail(image_url: &Url, context: &LemmyContext) -> LemmyResult<Url> {
|
2024-01-25 14:22:11 +00:00
|
|
|
let pictrs_config = context.settings().pictrs_config()?;
|
|
|
|
|
2024-04-10 14:09:54 +00:00
|
|
|
match pictrs_config.image_mode() {
|
|
|
|
PictrsImageMode::None => return Ok(image_url.clone()),
|
|
|
|
PictrsImageMode::ProxyAllImages => {
|
|
|
|
return Ok(proxy_image_link(image_url.clone(), context).await?.into())
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
};
|
2022-05-03 17:44:13 +00:00
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
// fetch remote non-pictrs images for persistent thumbnail link
|
|
|
|
// TODO: should limit size once supported by pictrs
|
|
|
|
let fetch_url = format!(
|
|
|
|
"{}image/download?url={}",
|
|
|
|
pictrs_config.url,
|
|
|
|
encode(image_url.as_str())
|
|
|
|
);
|
|
|
|
|
2024-05-22 08:28:47 +00:00
|
|
|
let res = context
|
2024-01-25 14:22:11 +00:00
|
|
|
.client()
|
|
|
|
.get(&fetch_url)
|
|
|
|
.timeout(REQWEST_TIMEOUT)
|
|
|
|
.send()
|
2024-05-22 08:28:47 +00:00
|
|
|
.await?
|
|
|
|
.json::<PictrsResponse>()
|
2024-01-25 14:22:11 +00:00
|
|
|
.await?;
|
|
|
|
|
2024-05-22 08:28:47 +00:00
|
|
|
let files = res.files.unwrap_or_default();
|
|
|
|
|
|
|
|
let image = files
|
|
|
|
.first()
|
|
|
|
.ok_or(LemmyErrorType::PictrsResponseError(res.msg))?;
|
|
|
|
|
|
|
|
let form = LocalImageForm {
|
|
|
|
// This is none because its an internal request.
|
|
|
|
// IE, a local user shouldn't get to delete the thumbnails for their link posts
|
|
|
|
local_user_id: None,
|
|
|
|
pictrs_alias: image.file.clone(),
|
|
|
|
pictrs_delete_token: image.delete_token.clone(),
|
|
|
|
};
|
|
|
|
let protocol_and_hostname = context.settings().get_protocol_and_hostname();
|
|
|
|
let thumbnail_url = image.thumbnail_url(&protocol_and_hostname)?;
|
|
|
|
|
2024-06-20 10:44:06 +00:00
|
|
|
// Also store the details for the image
|
|
|
|
let details_form = image.details.build_image_details_form(&thumbnail_url);
|
|
|
|
LocalImage::create(&mut context.pool(), &form, &details_form).await?;
|
2024-05-22 08:28:47 +00:00
|
|
|
|
|
|
|
Ok(thumbnail_url)
|
2023-08-31 14:36:39 +00:00
|
|
|
}
|
|
|
|
|
2024-06-20 10:44:06 +00:00
|
|
|
/// Fetches the image details for pictrs proxied images
|
|
|
|
///
|
|
|
|
/// We don't need to check for image mode, as that's already been done
|
|
|
|
#[tracing::instrument(skip_all)]
|
|
|
|
pub async fn fetch_pictrs_proxied_image_details(
|
|
|
|
image_url: &Url,
|
|
|
|
context: &LemmyContext,
|
|
|
|
) -> LemmyResult<PictrsFileDetails> {
|
|
|
|
let pictrs_url = context.settings().pictrs_config()?.url;
|
|
|
|
let encoded_image_url = encode(image_url.as_str());
|
|
|
|
|
|
|
|
// Pictrs needs you to fetch the proxied image before you can fetch the details
|
|
|
|
let proxy_url = format!("{pictrs_url}image/original?proxy={encoded_image_url}");
|
|
|
|
|
|
|
|
let res = context
|
|
|
|
.client()
|
|
|
|
.get(&proxy_url)
|
|
|
|
.timeout(REQWEST_TIMEOUT)
|
|
|
|
.send()
|
|
|
|
.await?
|
|
|
|
.status();
|
|
|
|
if !res.is_success() {
|
|
|
|
Err(LemmyErrorType::NotAnImageType)?
|
|
|
|
}
|
|
|
|
|
|
|
|
let details_url = format!("{pictrs_url}image/details/original?proxy={encoded_image_url}");
|
|
|
|
|
|
|
|
let res = context
|
|
|
|
.client()
|
|
|
|
.get(&details_url)
|
|
|
|
.timeout(REQWEST_TIMEOUT)
|
|
|
|
.send()
|
|
|
|
.await?
|
|
|
|
.json()
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
Ok(res)
|
|
|
|
}
|
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
// TODO: get rid of this by reading content type from db
|
2022-05-03 17:44:13 +00:00
|
|
|
#[tracing::instrument(skip_all)]
|
2024-04-10 14:14:11 +00:00
|
|
|
async fn is_image_content_type(client: &ClientWithMiddleware, url: &Url) -> LemmyResult<()> {
|
2022-06-02 14:33:41 +00:00
|
|
|
let response = client.get(url.as_str()).send().await?;
|
2022-05-03 17:44:13 +00:00
|
|
|
if response
|
|
|
|
.headers()
|
|
|
|
.get("Content-Type")
|
2023-07-10 14:50:07 +00:00
|
|
|
.ok_or(LemmyErrorType::NoContentTypeHeader)?
|
2022-05-03 17:44:13 +00:00
|
|
|
.to_str()?
|
|
|
|
.starts_with("image/")
|
|
|
|
{
|
|
|
|
Ok(())
|
|
|
|
} else {
|
2023-07-10 14:50:07 +00:00
|
|
|
Err(LemmyErrorType::NotAnImageType)?
|
2022-05-03 17:44:13 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-06-04 12:28:22 +00:00
|
|
|
/// When adding a new avatar, banner or similar image, delete the old one.
|
2024-03-27 13:00:52 +00:00
|
|
|
pub async fn replace_image(
|
2024-06-06 13:55:08 +00:00
|
|
|
new_image: &Option<Option<DbUrl>>,
|
2024-03-27 13:00:52 +00:00
|
|
|
old_image: &Option<DbUrl>,
|
|
|
|
context: &Data<LemmyContext>,
|
2024-04-10 14:14:11 +00:00
|
|
|
) -> LemmyResult<()> {
|
2024-06-06 13:55:08 +00:00
|
|
|
if let (Some(Some(new_image)), Some(old_image)) = (new_image, old_image) {
|
2024-06-04 12:28:22 +00:00
|
|
|
// Note: Oftentimes front ends will include the current image in the form.
|
|
|
|
// In this case, deleting `old_image` would also be deletion of `new_image`,
|
|
|
|
// so the deletion must be skipped for the image to be kept.
|
2024-06-06 13:55:08 +00:00
|
|
|
if new_image != old_image {
|
2024-06-04 12:28:22 +00:00
|
|
|
// Ignore errors because image may be stored externally.
|
|
|
|
let image = LocalImage::delete_by_url(&mut context.pool(), old_image)
|
2024-03-27 13:00:52 +00:00
|
|
|
.await
|
|
|
|
.ok();
|
|
|
|
if let Some(image) = image {
|
|
|
|
delete_image_from_pictrs(&image.pictrs_alias, &image.pictrs_delete_token, context).await?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2022-05-03 17:44:13 +00:00
|
|
|
#[cfg(test)]
|
2024-03-26 09:17:42 +00:00
|
|
|
#[allow(clippy::unwrap_used)]
|
|
|
|
#[allow(clippy::indexing_slicing)]
|
2022-05-03 17:44:13 +00:00
|
|
|
mod tests {
|
2023-07-17 15:04:14 +00:00
|
|
|
|
2024-01-25 14:22:11 +00:00
|
|
|
use crate::{
|
|
|
|
context::LemmyContext,
|
|
|
|
request::{extract_opengraph_data, fetch_link_metadata},
|
|
|
|
};
|
2024-01-04 09:47:18 +00:00
|
|
|
use pretty_assertions::assert_eq;
|
2024-01-25 14:22:11 +00:00
|
|
|
use serial_test::serial;
|
2022-05-03 17:44:13 +00:00
|
|
|
use url::Url;
|
|
|
|
|
|
|
|
// These helped with testing
|
2023-06-26 08:24:11 +00:00
|
|
|
#[tokio::test]
|
2024-01-25 14:22:11 +00:00
|
|
|
#[serial]
|
|
|
|
async fn test_link_metadata() {
|
2024-03-06 16:21:46 +00:00
|
|
|
let context = LemmyContext::init_test_context().await;
|
2022-05-03 17:44:13 +00:00
|
|
|
let sample_url = Url::parse("https://gitlab.com/IzzyOnDroid/repo/-/wikis/FAQ").unwrap();
|
2024-04-17 14:36:45 +00:00
|
|
|
let sample_res = fetch_link_metadata(&sample_url, &context).await.unwrap();
|
2024-01-25 14:22:11 +00:00
|
|
|
assert_eq!(
|
|
|
|
Some("FAQ · Wiki · IzzyOnDroid / repo · GitLab".to_string()),
|
|
|
|
sample_res.opengraph_data.title
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
Some("The F-Droid compatible repo at https://apt.izzysoft.de/fdroid/".to_string()),
|
|
|
|
sample_res.opengraph_data.description
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
Some(
|
|
|
|
Url::parse("https://gitlab.com/uploads/-/system/project/avatar/4877469/iod_logo.png")
|
|
|
|
.unwrap()
|
|
|
|
.into()
|
|
|
|
),
|
|
|
|
sample_res.opengraph_data.image
|
|
|
|
);
|
|
|
|
assert_eq!(None, sample_res.opengraph_data.embed_video_url);
|
2022-05-03 17:44:13 +00:00
|
|
|
assert_eq!(
|
2024-01-25 14:22:11 +00:00
|
|
|
Some(mime::TEXT_HTML_UTF_8.to_string()),
|
|
|
|
sample_res.content_type
|
2022-05-03 17:44:13 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2023-06-26 13:07:57 +00:00
|
|
|
#[test]
|
|
|
|
fn test_resolve_image_url() {
|
|
|
|
// url that lists the opengraph fields
|
|
|
|
let url = Url::parse("https://example.com/one/two.html").unwrap();
|
|
|
|
|
|
|
|
// root relative url
|
|
|
|
let html_bytes = b"<!DOCTYPE html><html><head><meta property='og:image' content='/image.jpg'></head><body></body></html>";
|
2024-01-25 14:22:11 +00:00
|
|
|
let metadata = extract_opengraph_data(html_bytes, &url).expect("Unable to parse metadata");
|
2023-06-26 13:07:57 +00:00
|
|
|
assert_eq!(
|
|
|
|
metadata.image,
|
|
|
|
Some(Url::parse("https://example.com/image.jpg").unwrap().into())
|
|
|
|
);
|
|
|
|
|
|
|
|
// base relative url
|
|
|
|
let html_bytes = b"<!DOCTYPE html><html><head><meta property='og:image' content='image.jpg'></head><body></body></html>";
|
2024-01-25 14:22:11 +00:00
|
|
|
let metadata = extract_opengraph_data(html_bytes, &url).expect("Unable to parse metadata");
|
2023-06-26 13:07:57 +00:00
|
|
|
assert_eq!(
|
|
|
|
metadata.image,
|
|
|
|
Some(
|
|
|
|
Url::parse("https://example.com/one/image.jpg")
|
|
|
|
.unwrap()
|
|
|
|
.into()
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
// absolute url
|
|
|
|
let html_bytes = b"<!DOCTYPE html><html><head><meta property='og:image' content='https://cdn.host.com/image.jpg'></head><body></body></html>";
|
2024-01-25 14:22:11 +00:00
|
|
|
let metadata = extract_opengraph_data(html_bytes, &url).expect("Unable to parse metadata");
|
2023-06-26 13:07:57 +00:00
|
|
|
assert_eq!(
|
|
|
|
metadata.image,
|
|
|
|
Some(Url::parse("https://cdn.host.com/image.jpg").unwrap().into())
|
|
|
|
);
|
|
|
|
|
|
|
|
// protocol relative url
|
|
|
|
let html_bytes = b"<!DOCTYPE html><html><head><meta property='og:image' content='//example.com/image.jpg'></head><body></body></html>";
|
2024-01-25 14:22:11 +00:00
|
|
|
let metadata = extract_opengraph_data(html_bytes, &url).expect("Unable to parse metadata");
|
2023-06-26 13:07:57 +00:00
|
|
|
assert_eq!(
|
|
|
|
metadata.image,
|
|
|
|
Some(Url::parse("https://example.com/image.jpg").unwrap().into())
|
|
|
|
);
|
|
|
|
}
|
2022-05-03 17:44:13 +00:00
|
|
|
}
|