840 lines
29 KiB
Python
840 lines
29 KiB
Python
import functools
|
|
import random
|
|
import re
|
|
import string
|
|
import time
|
|
import typing
|
|
from enum import StrEnum
|
|
from urllib.parse import quote
|
|
|
|
import django_rq
|
|
import httpx
|
|
import requests
|
|
from django.conf import settings
|
|
from django.core.cache import cache
|
|
from django.core.files.base import ContentFile
|
|
from django.db import models
|
|
from django.db.models import Count
|
|
from django.http import HttpRequest
|
|
from django.urls import reverse
|
|
from django.utils import timezone
|
|
|
|
# from django.utils.translation import gettext as _
|
|
from django.utils.translation import gettext_lazy as _
|
|
from loguru import logger
|
|
|
|
from catalog.common import jsondata
|
|
|
|
from .common import SocialAccount
|
|
|
|
if typing.TYPE_CHECKING:
|
|
from journal.models.common import VisibilityType
|
|
|
|
|
|
class TootVisibilityEnum(StrEnum):
|
|
PUBLIC = "public"
|
|
PRIVATE = "private"
|
|
DIRECT = "direct"
|
|
UNLISTED = "unlisted"
|
|
|
|
|
|
# See https://docs.joinmastodon.org/methods/accounts/
|
|
|
|
# returns user info
|
|
# retruns the same info as verify account credentials
|
|
# GET
|
|
API_GET_ACCOUNT = "/api/v1/accounts/:id"
|
|
|
|
# returns user info if valid, 401 if invalid
|
|
# GET
|
|
API_VERIFY_ACCOUNT = "/api/v1/accounts/verify_credentials"
|
|
|
|
# obtain token
|
|
# GET
|
|
API_OBTAIN_TOKEN = "/oauth/token"
|
|
|
|
# obatin auth code
|
|
# GET
|
|
API_OAUTH_AUTHORIZE = "/oauth/authorize"
|
|
|
|
# revoke token
|
|
# POST
|
|
API_REVOKE_TOKEN = "/oauth/revoke"
|
|
|
|
# relationships
|
|
# GET
|
|
API_GET_RELATIONSHIPS = "/api/v1/accounts/relationships"
|
|
|
|
# toot
|
|
# POST
|
|
API_PUBLISH_TOOT = "/api/v1/statuses"
|
|
|
|
# create new app
|
|
# POST
|
|
API_CREATE_APP = "/api/v1/apps"
|
|
|
|
# search
|
|
# GET
|
|
API_SEARCH = "/api/v2/search"
|
|
|
|
USER_AGENT = settings.NEODB_USER_AGENT
|
|
|
|
|
|
def get_api_domain(domain):
|
|
app = MastodonApplication.objects.filter(domain_name=domain).first()
|
|
return app.api_domain if app and app.api_domain else domain
|
|
|
|
|
|
# low level api below
|
|
|
|
|
|
def boost_toot(domain, token, toot_url):
|
|
headers = {
|
|
"User-Agent": USER_AGENT,
|
|
"Authorization": f"Bearer {token}",
|
|
}
|
|
url = (
|
|
"https://"
|
|
+ domain
|
|
+ API_SEARCH
|
|
+ "?type=statuses&resolve=true&q="
|
|
+ quote(toot_url)
|
|
)
|
|
try:
|
|
response = get(url, headers=headers)
|
|
if response.status_code != 200:
|
|
logger.warning(
|
|
f"Error search {toot_url} on {domain} {response.status_code}"
|
|
)
|
|
return None
|
|
j = response.json()
|
|
if "statuses" in j and len(j["statuses"]) > 0:
|
|
s = j["statuses"][0]
|
|
url_id = toot_url.split("/posts/")[-1]
|
|
url_id2 = s["uri"].split("/posts/")[-1]
|
|
if s["uri"] != toot_url and s["url"] != toot_url and url_id != url_id2:
|
|
logger.warning(
|
|
f"Error status url mismatch {s['uri']} or {s['uri']} != {toot_url}"
|
|
)
|
|
return None
|
|
if s["reblogged"]:
|
|
logger.warning(f"Already boosted {toot_url}")
|
|
# TODO unboost and boost again?
|
|
return None
|
|
url = (
|
|
"https://"
|
|
+ domain
|
|
+ API_PUBLISH_TOOT
|
|
+ "/"
|
|
+ j["statuses"][0]["id"]
|
|
+ "/reblog"
|
|
)
|
|
response = post(url, headers=headers)
|
|
if response.status_code != 200:
|
|
logger.warning(
|
|
f"Error search {toot_url} on {domain} {response.status_code}"
|
|
)
|
|
return None
|
|
return response.json()
|
|
except Exception:
|
|
logger.warning(f"Error search {toot_url} on {domain}")
|
|
return None
|
|
|
|
|
|
def delete_toot(api_domain, access_token, toot_url):
|
|
headers = {
|
|
"User-Agent": USER_AGENT,
|
|
"Authorization": f"Bearer {access_token}",
|
|
}
|
|
toot_id = get_status_id_by_url(toot_url)
|
|
url = "https://" + api_domain + API_PUBLISH_TOOT + "/" + toot_id
|
|
try:
|
|
response = delete(url, headers=headers)
|
|
if response.status_code != 200:
|
|
logger.warning(f"Error DELETE {url} {response.status_code}")
|
|
except Exception as e:
|
|
logger.warning(f"Error deleting {e}")
|
|
|
|
|
|
def post_toot2(
|
|
api_domain: str,
|
|
access_token: str,
|
|
content: str,
|
|
visibility: TootVisibilityEnum,
|
|
update_toot_url: str | None = None,
|
|
reply_to_toot_url: str | None = None,
|
|
sensitive: bool = False,
|
|
spoiler_text: str | None = None,
|
|
attachments: list = [],
|
|
):
|
|
headers = {
|
|
"User-Agent": USER_AGENT,
|
|
"Authorization": f"Bearer {access_token}",
|
|
"Idempotency-Key": random_string_generator(16),
|
|
}
|
|
base_url = "https://" + api_domain
|
|
response = None
|
|
url = base_url + API_PUBLISH_TOOT
|
|
payload = {
|
|
"status": content,
|
|
"visibility": visibility,
|
|
}
|
|
update_id = get_status_id_by_url(update_toot_url)
|
|
reply_to_id = get_status_id_by_url(reply_to_toot_url)
|
|
if reply_to_id:
|
|
payload["in_reply_to_id"] = reply_to_id
|
|
if spoiler_text:
|
|
payload["spoiler_text"] = spoiler_text
|
|
if sensitive:
|
|
payload["sensitive"] = True
|
|
media_ids = []
|
|
for atta in attachments:
|
|
try:
|
|
media_id = (
|
|
post(
|
|
base_url + "/api/v1/media",
|
|
headers=headers,
|
|
data={},
|
|
files={"file": atta},
|
|
)
|
|
.json()
|
|
.get("id")
|
|
)
|
|
media_ids.append(media_id)
|
|
except Exception as e:
|
|
logger.warning(f"Error uploading image {e}")
|
|
headers["Idempotency-Key"] = random_string_generator(16)
|
|
if media_ids:
|
|
payload["media_ids[]"] = media_ids
|
|
try:
|
|
if update_id:
|
|
response = put(url + "/" + update_id, headers=headers, data=payload)
|
|
if not update_id or (response is not None and response.status_code != 200):
|
|
headers["Idempotency-Key"] = random_string_generator(16)
|
|
response = post(url, headers=headers, data=payload)
|
|
if response is not None and response.status_code != 200:
|
|
headers["Idempotency-Key"] = random_string_generator(16)
|
|
payload["in_reply_to_id"] = None
|
|
response = post(url, headers=headers, data=payload)
|
|
if response is not None and response.status_code == 201:
|
|
response.status_code = 200
|
|
if response is not None and response.status_code != 200:
|
|
logger.warning(f"Error {url} {response.status_code}")
|
|
except Exception as e:
|
|
logger.warning(f"Error posting {e}")
|
|
response = None
|
|
return response
|
|
|
|
|
|
def _get_redirect_uris(allow_multiple=True) -> str:
|
|
u = settings.SITE_INFO["site_url"] + "/account/login/oauth"
|
|
if not allow_multiple:
|
|
return u
|
|
u2s = [f"https://{d}/account/login/oauth" for d in settings.ALTERNATIVE_DOMAINS]
|
|
return "\n".join([u] + u2s)
|
|
|
|
|
|
def create_app(domain_name, allow_multiple_redir):
|
|
url = "https://" + domain_name + API_CREATE_APP
|
|
payload = {
|
|
"client_name": settings.SITE_INFO["site_name"],
|
|
"scopes": settings.MASTODON_CLIENT_SCOPE,
|
|
"redirect_uris": _get_redirect_uris(allow_multiple_redir),
|
|
"website": settings.SITE_INFO["site_url"],
|
|
}
|
|
response = post(url, data=payload, headers={"User-Agent": USER_AGENT})
|
|
return response
|
|
|
|
|
|
def webfinger(site, username) -> dict | None:
|
|
url = f"https://{site}/.well-known/webfinger?resource=acct:{username}@{site}"
|
|
try:
|
|
response = get(url, headers={"User-Agent": USER_AGENT})
|
|
if response.status_code != 200:
|
|
logger.warning(f"Error webfinger {username}@{site} {response.status_code}")
|
|
return None
|
|
j = response.json()
|
|
return j
|
|
except Exception:
|
|
logger.warning(f"Error webfinger {username}@{site}")
|
|
return None
|
|
|
|
|
|
def random_string_generator(n):
|
|
s = string.ascii_letters + string.punctuation + string.digits
|
|
return "".join(random.choice(s) for i in range(n))
|
|
|
|
|
|
def rating_to_emoji(score, star_mode=0):
|
|
"""convert score to mastodon star emoji code"""
|
|
if score is None or score == "" or score == 0:
|
|
return ""
|
|
solid_stars = score // 2
|
|
half_star = int(bool(score % 2))
|
|
empty_stars = 5 - solid_stars if not half_star else 5 - solid_stars - 1
|
|
if star_mode == 1:
|
|
emoji_code = "🌕" * solid_stars + "🌗" * half_star + "🌑" * empty_stars
|
|
else:
|
|
emoji_code = (
|
|
settings.STAR_SOLID * solid_stars
|
|
+ settings.STAR_HALF * half_star
|
|
+ settings.STAR_EMPTY * empty_stars
|
|
)
|
|
emoji_code = emoji_code.replace("::", ": :")
|
|
emoji_code = " " + emoji_code + " "
|
|
return emoji_code
|
|
|
|
|
|
def verify_account(site, token):
|
|
url = "https://" + get_api_domain(site) + API_VERIFY_ACCOUNT
|
|
try:
|
|
response = get(
|
|
url, headers={"User-Agent": USER_AGENT, "Authorization": f"Bearer {token}"}
|
|
)
|
|
return response.status_code, (
|
|
response.json() if response.status_code == 200 else None
|
|
)
|
|
except Exception:
|
|
return -1, None
|
|
|
|
|
|
def get_related_acct_list(site, token, api):
|
|
url = "https://" + get_api_domain(site) + api
|
|
results = []
|
|
while url:
|
|
try:
|
|
response = get(
|
|
url,
|
|
headers={"User-Agent": USER_AGENT, "Authorization": f"Bearer {token}"},
|
|
)
|
|
url = None
|
|
if response.status_code == 200:
|
|
r: list[dict[str, str]] = response.json()
|
|
results.extend(
|
|
map(
|
|
lambda u: (
|
|
( # type: ignore
|
|
u["acct"]
|
|
if u["acct"].find("@") != -1
|
|
else u["acct"] + "@" + site
|
|
)
|
|
if "acct" in u
|
|
else u
|
|
),
|
|
r,
|
|
)
|
|
)
|
|
if "Link" in response.headers:
|
|
for ls in response.headers["Link"].split(","):
|
|
li = ls.strip().split(";")
|
|
if li[1].strip() == 'rel="next"':
|
|
url = li[0].strip().replace(">", "").replace("<", "")
|
|
except Exception as e:
|
|
logger.warning(f"Error GET {url} : {e}")
|
|
url = None
|
|
return results
|
|
|
|
|
|
def detect_server_info(login_domain: str) -> tuple[str, str, str]:
|
|
url = f"https://{login_domain}/api/v1/instance"
|
|
try:
|
|
response = get(url, headers={"User-Agent": USER_AGENT})
|
|
except Exception as e:
|
|
logger.error(f"Error connecting {login_domain}", extra={"exception": e})
|
|
raise Exception(f"Error connecting to instance {login_domain}")
|
|
if response.status_code != 200:
|
|
logger.error(f"Error connecting {login_domain}", extra={"response": response})
|
|
raise Exception(
|
|
f"Instance {login_domain} returned error code {response.status_code}"
|
|
)
|
|
try:
|
|
j = response.json()
|
|
domain = j["uri"].lower().split("//")[-1].split("/")[0]
|
|
except Exception as e:
|
|
logger.error(f"Error connecting {login_domain}", extra={"exception": e})
|
|
raise Exception(f"Instance {login_domain} returned invalid data")
|
|
server_version = j["version"]
|
|
api_domain = domain
|
|
if domain != login_domain:
|
|
url = f"https://{domain}/api/v1/instance"
|
|
try:
|
|
response = get(url, headers={"User-Agent": USER_AGENT})
|
|
j = response.json()
|
|
except Exception:
|
|
api_domain = login_domain
|
|
logger.info(
|
|
f"detect_server_info: {login_domain} {domain} {api_domain} {server_version}"
|
|
)
|
|
return domain, api_domain, server_version
|
|
|
|
|
|
def verify_client(mast_app):
|
|
payload = {
|
|
"client_id": mast_app.client_id,
|
|
"client_secret": mast_app.client_secret,
|
|
"redirect_uri": "urn:ietf:wg:oauth:2.0:oob",
|
|
"scope": settings.MASTODON_CLIENT_SCOPE,
|
|
"grant_type": "client_credentials",
|
|
}
|
|
headers = {"User-Agent": USER_AGENT}
|
|
url = "https://" + (mast_app.api_domain or mast_app.domain_name) + API_OBTAIN_TOKEN
|
|
try:
|
|
response = post(
|
|
url, data=payload, headers=headers, timeout=settings.MASTODON_TIMEOUT
|
|
)
|
|
except Exception as e:
|
|
logger.warning(f"Error {url} {e}")
|
|
return False
|
|
if response.status_code != 200:
|
|
logger.warning(f"Error {url} {response.status_code}")
|
|
return False
|
|
data = response.json()
|
|
return data.get("access_token") is not None
|
|
|
|
|
|
def obtain_token(site, code, request):
|
|
"""Returns token if success else None."""
|
|
mast_app = MastodonApplication.objects.get(domain_name=site)
|
|
redirect_uri = request.build_absolute_uri(reverse("users:login_oauth"))
|
|
payload = {
|
|
"client_id": mast_app.client_id,
|
|
"client_secret": mast_app.client_secret,
|
|
"redirect_uri": redirect_uri,
|
|
"scope": settings.MASTODON_CLIENT_SCOPE,
|
|
"grant_type": "authorization_code",
|
|
"code": code,
|
|
}
|
|
headers = {"User-Agent": USER_AGENT}
|
|
auth = None
|
|
if mast_app.is_proxy:
|
|
url = "https://" + mast_app.proxy_to + API_OBTAIN_TOKEN
|
|
else:
|
|
url = (
|
|
"https://"
|
|
+ (mast_app.api_domain or mast_app.domain_name)
|
|
+ API_OBTAIN_TOKEN
|
|
)
|
|
try:
|
|
response = post(url, data=payload, headers=headers, auth=auth)
|
|
if response.status_code != 200:
|
|
logger.warning(f"Error {url} {response.status_code}")
|
|
return None, None
|
|
except Exception as e:
|
|
logger.warning(f"Error {url} {e}")
|
|
return None, None
|
|
data = response.json()
|
|
return data.get("access_token"), data.get("refresh_token", "")
|
|
|
|
|
|
def get_status_id_by_url(url):
|
|
if not url:
|
|
return None
|
|
r = re.match(
|
|
r".+/(\w+)$", url
|
|
) # might be re.match(r'.+/([^/]+)$', u) if Pleroma supports edit
|
|
return r[1] if r else None
|
|
|
|
|
|
def get_spoiler_text(text, item):
|
|
if text.find(">!") != -1:
|
|
spoiler_text = _(
|
|
"regarding {item_title}, may contain spoiler or triggering content"
|
|
).format(item_title=item.display_title)
|
|
return spoiler_text, text.replace(">!", "").replace("!<", "")
|
|
else:
|
|
return None, text
|
|
|
|
|
|
def get_toot_visibility(visibility, user) -> TootVisibilityEnum:
|
|
if visibility == 2:
|
|
return TootVisibilityEnum.DIRECT
|
|
elif visibility == 1:
|
|
return TootVisibilityEnum.PRIVATE
|
|
elif user.preference.post_public_mode == 0:
|
|
return TootVisibilityEnum.PUBLIC
|
|
else:
|
|
return TootVisibilityEnum.UNLISTED
|
|
|
|
|
|
get = functools.partial(requests.get, timeout=settings.MASTODON_TIMEOUT)
|
|
put = functools.partial(requests.put, timeout=settings.MASTODON_TIMEOUT)
|
|
post = functools.partial(requests.post, timeout=settings.MASTODON_TIMEOUT)
|
|
delete = functools.partial(requests.post, timeout=settings.MASTODON_TIMEOUT)
|
|
_sites_cache_key = "login_sites"
|
|
|
|
|
|
def get_or_create_fediverse_application(login_domain):
|
|
domain = login_domain
|
|
app = MastodonApplication.objects.filter(domain_name__iexact=domain).first()
|
|
if not app:
|
|
app = MastodonApplication.objects.filter(api_domain__iexact=domain).first()
|
|
if app:
|
|
return app
|
|
if not settings.MASTODON_ALLOW_ANY_SITE:
|
|
logger.warning(f"Disallowed to create app for {domain}")
|
|
raise ValueError("Unsupported instance")
|
|
if login_domain.lower() in settings.SITE_DOMAINS:
|
|
raise ValueError("Unsupported instance")
|
|
domain, api_domain, server_version = detect_server_info(login_domain)
|
|
if (
|
|
domain.lower() in settings.SITE_DOMAINS
|
|
or api_domain.lower() in settings.SITE_DOMAINS
|
|
):
|
|
raise ValueError("Unsupported instance")
|
|
if "neodb/" in server_version:
|
|
raise ValueError("Unsupported instance type")
|
|
if login_domain != domain:
|
|
app = MastodonApplication.objects.filter(domain_name__iexact=domain).first()
|
|
if app:
|
|
return app
|
|
allow_multiple_redir = True
|
|
if "; Pixelfed" in server_version or server_version.startswith("0."):
|
|
# Pixelfed and GoToSocial don't support multiple redirect uris
|
|
allow_multiple_redir = False
|
|
response = create_app(api_domain, allow_multiple_redir)
|
|
if response.status_code != 200:
|
|
logger.error(
|
|
f"Error creating app for {domain} on {api_domain}: {response.status_code}"
|
|
)
|
|
raise Exception("Error creating app, code: " + str(response.status_code))
|
|
try:
|
|
data = response.json()
|
|
except Exception:
|
|
logger.error(f"Error creating app for {domain}: unable to parse response")
|
|
raise Exception("Error creating app, invalid response")
|
|
app = MastodonApplication.objects.create(
|
|
domain_name=domain.lower(),
|
|
api_domain=api_domain.lower(),
|
|
server_version=server_version,
|
|
app_id=data["id"],
|
|
client_id=data["client_id"],
|
|
client_secret=data["client_secret"],
|
|
vapid_key=data.get("vapid_key", ""),
|
|
)
|
|
# create a client token to avoid vacuum by Mastodon 4.2+
|
|
try:
|
|
verify_client(app)
|
|
except Exception as e:
|
|
logger.error(f"Error creating client token for {domain}", extra={"error": e})
|
|
return app
|
|
|
|
|
|
def get_mastodon_login_url(app, login_domain, request):
|
|
url = request.build_absolute_uri(reverse("users:login_oauth"))
|
|
version = app.server_version or ""
|
|
scope = (
|
|
settings.MASTODON_LEGACY_CLIENT_SCOPE
|
|
if "Pixelfed" in version
|
|
else settings.MASTODON_CLIENT_SCOPE
|
|
)
|
|
return (
|
|
"https://"
|
|
+ login_domain
|
|
+ "/oauth/authorize?client_id="
|
|
+ app.client_id
|
|
+ "&scope="
|
|
+ quote(scope)
|
|
+ "&redirect_uri="
|
|
+ url
|
|
+ "&response_type=code"
|
|
)
|
|
|
|
|
|
class MastodonApplication(models.Model):
|
|
domain_name = models.CharField(_("site domain name"), max_length=200, unique=True)
|
|
api_domain = models.CharField(_("domain for api call"), max_length=200, blank=True)
|
|
server_version = models.CharField(_("type and verion"), max_length=200, blank=True)
|
|
app_id = models.CharField(_("in-site app id"), max_length=200)
|
|
client_id = models.CharField(_("client id"), max_length=200)
|
|
client_secret = models.CharField(_("client secret"), max_length=200)
|
|
vapid_key = models.CharField(_("vapid key"), max_length=200, null=True, blank=True)
|
|
star_mode = models.PositiveIntegerField(
|
|
_("0: custom emoji; 1: unicode moon; 2: text"), blank=False, default=0
|
|
)
|
|
max_status_len = models.PositiveIntegerField(
|
|
_("max toot len"), blank=False, default=500
|
|
)
|
|
last_reachable_date = models.DateTimeField(null=True, default=None)
|
|
disabled = models.BooleanField(default=False)
|
|
is_proxy = models.BooleanField(default=False, blank=True)
|
|
proxy_to = models.CharField(max_length=100, blank=True, default="")
|
|
|
|
def __str__(self):
|
|
return self.domain_name
|
|
|
|
|
|
class Mastodon:
|
|
@staticmethod
|
|
def get_sites():
|
|
sites = cache.get(_sites_cache_key, [])
|
|
if not sites:
|
|
sites = list(
|
|
MastodonAccount.objects.values("domain")
|
|
.annotate(total=Count("domain"))
|
|
.order_by("-total")
|
|
.values_list("domain", flat=True)
|
|
)
|
|
cache.set(_sites_cache_key, sites, timeout=3600 * 8)
|
|
|
|
@staticmethod
|
|
def obtain_token(domain: str, code: str, request: HttpRequest):
|
|
return obtain_token(domain, code, request)
|
|
|
|
@staticmethod
|
|
def generate_auth_url(domain: str, request):
|
|
login_domain = (
|
|
domain.strip().lower().split("//")[-1].split("/")[0].split("@")[-1]
|
|
)
|
|
app = get_or_create_fediverse_application(login_domain)
|
|
if app.api_domain and app.api_domain != app.domain_name:
|
|
login_domain = app.api_domain
|
|
login_url = get_mastodon_login_url(app, login_domain, request)
|
|
request.session["mastodon_domain"] = app.domain_name
|
|
return login_url
|
|
|
|
@staticmethod
|
|
def authenticate(domain, access_token, refresh_token) -> "MastodonAccount | None":
|
|
mastodon_account = MastodonAccount()
|
|
mastodon_account.domain = domain
|
|
mastodon_account.access_token = access_token
|
|
mastodon_account.refresh_token = refresh_token
|
|
if mastodon_account.refresh(save=False):
|
|
existing_account = MastodonAccount.objects.filter(
|
|
uid=mastodon_account.uid,
|
|
domain=mastodon_account.domain,
|
|
).first()
|
|
if existing_account:
|
|
existing_account.access_token = mastodon_account.access_token
|
|
existing_account.refresh_token = mastodon_account.refresh_token
|
|
existing_account.account_data = mastodon_account.account_data
|
|
existing_account.save(update_fields=["access_data", "account_data"])
|
|
return existing_account
|
|
return mastodon_account
|
|
|
|
|
|
class MastodonAccount(SocialAccount):
|
|
class CrosspostMode(models.IntegerChoices):
|
|
BOOST = 0, _("Boost")
|
|
POST = 1, _("New Post")
|
|
|
|
access_token = jsondata.EncryptedTextField(
|
|
json_field_name="access_data", default=""
|
|
)
|
|
refresh_token = jsondata.EncryptedTextField(
|
|
json_field_name="access_data", default=""
|
|
)
|
|
display_name = jsondata.CharField(json_field_name="account_data", default="")
|
|
username = jsondata.CharField(json_field_name="account_data", default="")
|
|
avatar = jsondata.CharField(json_field_name="account_data", default="")
|
|
locked = jsondata.BooleanField(json_field_name="account_data", default=False)
|
|
note = jsondata.CharField(json_field_name="account_data", default="")
|
|
url = jsondata.CharField(json_field_name="account_data", default="")
|
|
|
|
crosspost_mode = jsondata.IntegerField(
|
|
json_field_name="preference_data", choices=CrosspostMode.choices, default=0
|
|
)
|
|
|
|
def webfinger(self) -> dict | None:
|
|
acct = self.handle
|
|
site = self.domain
|
|
url = f"https://{site}/.well-known/webfinger?resource=acct:{acct}"
|
|
try:
|
|
response = get(url, headers={"User-Agent": settings.NEODB_USER_AGENT})
|
|
if response.status_code != 200:
|
|
logger.warning(f"Error webfinger {acct} {response.status_code}")
|
|
return None
|
|
j = response.json()
|
|
return j
|
|
except Exception:
|
|
logger.warning(f"Error webfinger {acct}")
|
|
return None
|
|
|
|
@property
|
|
def application(self) -> MastodonApplication | None:
|
|
app = MastodonApplication.objects.filter(domain_name=self.domain).first()
|
|
return app
|
|
|
|
@functools.cached_property
|
|
def api_domain(self) -> str:
|
|
app = self.application
|
|
return app.api_domain if app else self.domain
|
|
|
|
def rating_to_emoji(self, rating_grade: int) -> str:
|
|
app = self.application
|
|
return rating_to_emoji(rating_grade, app.star_mode if app else 0)
|
|
|
|
def _get(self, url: str):
|
|
url = url if url.startswith("https://") else f"https://{self.api_domain}{url}"
|
|
headers = {
|
|
"User-Agent": settings.NEODB_USER_AGENT,
|
|
"Authorization": f"Bearer {self.access_token}",
|
|
}
|
|
return get(url, headers=headers)
|
|
|
|
def _post(self, url: str, data, files=None):
|
|
url = url if url.startswith("https://") else f"https://{self.api_domain}{url}"
|
|
return post(
|
|
url,
|
|
data=data,
|
|
files=files,
|
|
headers={
|
|
"User-Agent": settings.NEODB_USER_AGENT,
|
|
"Authorization": f"Bearer {self.access_token}",
|
|
"Idempotency-Key": random_string_generator(16),
|
|
},
|
|
)
|
|
|
|
def _delete(self, url: str, data, files=None):
|
|
url = url if url.startswith("https://") else f"https://{self.api_domain}{url}"
|
|
return delete(
|
|
url,
|
|
headers={
|
|
"User-Agent": settings.NEODB_USER_AGENT,
|
|
"Authorization": f"Bearer {self.access_token}",
|
|
},
|
|
)
|
|
|
|
def _put(self, url: str, data, files=None):
|
|
url = url if url.startswith("https://") else f"https://{self.api_domain}{url}"
|
|
return put(
|
|
url,
|
|
data=data,
|
|
files=files,
|
|
headers={
|
|
"User-Agent": settings.NEODB_USER_AGENT,
|
|
"Authorization": f"Bearer {self.access_token}",
|
|
"Idempotency-Key": random_string_generator(16),
|
|
},
|
|
)
|
|
|
|
def verify_account(self):
|
|
try:
|
|
response = self._get("/api/v1/accounts/verify_credentials")
|
|
return response.status_code, (
|
|
response.json() if response.status_code == 200 else None
|
|
)
|
|
except Exception:
|
|
return -1, None
|
|
|
|
def get_related_accounts(self, api_path):
|
|
if api_path in ["followers", "following"]:
|
|
url = f"/api/v1/accounts/{self.account_data['id']}/{api_path}"
|
|
else:
|
|
url = f"/api/v1/{api_path}"
|
|
results = []
|
|
while url:
|
|
try:
|
|
response = self._get(url)
|
|
url = None
|
|
if response.status_code == 200:
|
|
r: list[dict[str, str]] = response.json()
|
|
results.extend(
|
|
map(
|
|
lambda u: (
|
|
(
|
|
u["acct"]
|
|
if u["acct"].find("@") != -1
|
|
else u["acct"] + "@" + self.domain
|
|
)
|
|
if "acct" in u
|
|
else u
|
|
),
|
|
r,
|
|
)
|
|
)
|
|
if "Link" in response.headers:
|
|
for ls in response.headers["Link"].split(","):
|
|
li = ls.strip().split(";")
|
|
if li[1].strip() == 'rel="next"':
|
|
url = li[0].strip().replace(">", "").replace("<", "")
|
|
except Exception as e:
|
|
logger.warning(f"Error GET {url} : {e}")
|
|
url = None
|
|
return results
|
|
|
|
def check_alive(self, save=True):
|
|
self.last_refresh = timezone.now()
|
|
if not self.webfinger():
|
|
logger.warning(f"Unable to fetch web finger for {self}")
|
|
return False
|
|
self.last_reachable = timezone.now()
|
|
if save:
|
|
self.save(update_fields=["last_reachable"])
|
|
return True
|
|
|
|
def refresh(self, save=True):
|
|
code, mastodon_account = self.verify_account()
|
|
self.last_refresh = timezone.now()
|
|
if code == 401:
|
|
logger.warning(f"Refresh mastodon data error 401 for {self}")
|
|
# self.access_token = ""
|
|
# if save:
|
|
# self.save(update_fields=["access_data"])
|
|
return False
|
|
if not mastodon_account:
|
|
logger.warning(f"Refresh mastodon data error {code} for {self}")
|
|
return False
|
|
handle = f"{mastodon_account['username']}@{self.domain}"
|
|
uid = mastodon_account["id"]
|
|
if self.uid != uid:
|
|
if self.uid:
|
|
logger.warning(f"user id changed {self.uid} -> {uid}")
|
|
self.uid = uid
|
|
if self.handle != handle:
|
|
if self.handle:
|
|
logger.warning(f"username changed {self.handle} -> {handle}")
|
|
self.handle = handle
|
|
self.account_data = mastodon_account
|
|
if save:
|
|
self.save(update_fields=["uid", "handle", "account_data", "last_refresh"])
|
|
return True
|
|
|
|
def refresh_graph(self, save=True):
|
|
self.followers = self.get_related_accounts("followers")
|
|
self.following = self.get_related_accounts("following")
|
|
self.mutes = self.get_related_accounts("mutes")
|
|
self.blocks = self.get_related_accounts("blocks")
|
|
self.domain_blocks = self.get_related_accounts("domain_blocks")
|
|
if save:
|
|
self.save(
|
|
update_fields=[
|
|
"followers",
|
|
"following",
|
|
"mutes",
|
|
"blocks",
|
|
"domain_blocks",
|
|
]
|
|
)
|
|
|
|
def boost_later(self, post_url: str):
|
|
django_rq.get_queue("fetch").enqueue(
|
|
boost_toot, self.api_domain, self.access_token, post_url
|
|
)
|
|
|
|
def delete_later(self, post_url: str):
|
|
django_rq.get_queue("fetch").enqueue(
|
|
delete_toot, self.api_domain, self.access_token, post_url
|
|
)
|
|
|
|
def post(
|
|
self,
|
|
content: str,
|
|
visibility: "VisibilityType",
|
|
update_toot_url: str | None = None,
|
|
reply_to_toot_url: str | None = None,
|
|
sensitive: bool = False,
|
|
spoiler_text: str | None = None,
|
|
attachments: list = [],
|
|
) -> requests.Response | None:
|
|
v = get_toot_visibility(visibility, self.user)
|
|
return post_toot2(
|
|
self.api_domain,
|
|
self.access_token,
|
|
content,
|
|
v,
|
|
update_toot_url,
|
|
reply_to_toot_url,
|
|
sensitive,
|
|
spoiler_text,
|
|
attachments,
|
|
)
|