From aa63b5260e541885bc99efebdbfbfb4361058553 Mon Sep 17 00:00:00 2001 From: Michael Date: Wed, 27 Nov 2024 04:29:44 +0000 Subject: [PATCH] No restrictions check on connector networks --- src/Model/Item.php | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/src/Model/Item.php b/src/Model/Item.php index 63cd31c5a2..a9b1435664 100644 --- a/src/Model/Item.php +++ b/src/Model/Item.php @@ -1472,6 +1472,12 @@ class Item return false; } + // We only have to apply restrictions if the post originates from our server or is federated. + // Every other time we can trust the remote system. + if (!in_array($item['network'], Protocol::FEDERATED) && !$item['origin']) { + return false; + } + if (($restrictions & self::CANT_REPLY) && ($item['verb'] == Activity::POST)) { return true; } @@ -1796,7 +1802,7 @@ class Item } } - if (($source_uid == 0) && (($item['private'] == self::PRIVATE) || !in_array($item['network'], Protocol::FEDERATED))) { + if (($source_uid == 0) && (($item['private'] == self::PRIVATE) || !in_array($item['network'], array_merge(Protocol::FEDERATED, [Protocol::BLUESKY])))) { Logger::notice('Item is private or not from a federated network. It will not be stored for the user.', ['uri-id' => $uri_id, 'uid' => $uid, 'private' => $item['private'], 'network' => $item['network']]); return 0; }