]> git.mxchange.org Git - friendica.git/commitdiff
No restrictions check on connector networks
authorMichael <heluecht@pirati.ca>
Wed, 27 Nov 2024 04:29:44 +0000 (04:29 +0000)
committerMichael <heluecht@pirati.ca>
Wed, 27 Nov 2024 04:29:44 +0000 (04:29 +0000)
src/Model/Item.php

index 63cd31c5a20269dad7cdaa81c1d162ba706637ed..a9b1435664a00a9ee2b210d52b42ce015bc56483 100644 (file)
@@ -1472,6 +1472,12 @@ class Item
                        return false;
                }
 
+               // We only have to apply restrictions if the post originates from our server or is federated.
+               // Every other time we can trust the remote system.
+               if (!in_array($item['network'], Protocol::FEDERATED) && !$item['origin']) {
+                       return false;
+               }
+
                if (($restrictions & self::CANT_REPLY) && ($item['verb'] == Activity::POST)) {
                        return true;
                }
@@ -1796,7 +1802,7 @@ class Item
                        }
                }
 
-               if (($source_uid == 0) && (($item['private'] == self::PRIVATE) || !in_array($item['network'], Protocol::FEDERATED))) {
+               if (($source_uid == 0) && (($item['private'] == self::PRIVATE) || !in_array($item['network'], array_merge(Protocol::FEDERATED, [Protocol::BLUESKY])))) {
                        Logger::notice('Item is private or not from a federated network. It will not be stored for the user.', ['uri-id' => $uri_id, 'uid' => $uid, 'private' => $item['private'], 'network' => $item['network']]);
                        return 0;
                }