mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 11:42:25 -05:00 
			
		
		
		
	[feature] Add domain permission drafts and excludes (#3547)
* [feature] Add domain permission drafts and excludes * fix typescript complaining * lint * make filenames more consistent * test own domain excluded
This commit is contained in:
		
					parent
					
						
							
								c2029df9bc
							
						
					
				
			
			
				commit
				
					
						301543616b
					
				
			
		
					 69 changed files with 5664 additions and 264 deletions
				
			
		
							
								
								
									
										189
									
								
								internal/api/client/admin/domainpermissiondraftsget.go
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										189
									
								
								internal/api/client/admin/domainpermissiondraftsget.go
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,189 @@ | |||
| // GoToSocial | ||||
| // Copyright (C) GoToSocial Authors admin@gotosocial.org | ||||
| // SPDX-License-Identifier: AGPL-3.0-or-later | ||||
| // | ||||
| // This program is free software: you can redistribute it and/or modify | ||||
| // it under the terms of the GNU Affero General Public License as published by | ||||
| // the Free Software Foundation, either version 3 of the License, or | ||||
| // (at your option) any later version. | ||||
| // | ||||
| // This program is distributed in the hope that it will be useful, | ||||
| // but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||
| // GNU Affero General Public License for more details. | ||||
| // | ||||
| // You should have received a copy of the GNU Affero General Public License | ||||
| // along with this program.  If not, see <http://www.gnu.org/licenses/>. | ||||
| 
 | ||||
| package admin | ||||
| 
 | ||||
| import ( | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"net/http" | ||||
| 
 | ||||
| 	"github.com/gin-gonic/gin" | ||||
| 	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util" | ||||
| 	"github.com/superseriousbusiness/gotosocial/internal/gtserror" | ||||
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | ||||
| 	"github.com/superseriousbusiness/gotosocial/internal/oauth" | ||||
| 	"github.com/superseriousbusiness/gotosocial/internal/paging" | ||||
| ) | ||||
| 
 | ||||
| // DomainPermissionDraftsGETHandler swagger:operation GET /api/v1/admin/domain_permission_drafts domainPermissionDraftsGet | ||||
| // | ||||
| // View domain permission drafts. | ||||
| // | ||||
| // The drafts will be returned in descending chronological order (newest first), with sequential IDs (bigger = newer). | ||||
| // | ||||
| // The next and previous queries can be parsed from the returned Link header. | ||||
| // | ||||
| // Example: | ||||
| // | ||||
| // ``` | ||||
| // <https://example.org/api/v1/admin/domain_permission_drafts?limit=20&max_id=01FC0SKA48HNSVR6YKZCQGS2V8>; rel="next", <https://example.org/api/v1/admin/domain_permission_drafts?limit=20&min_id=01FC0SKW5JK2Q4EVAV2B462YY0>; rel="prev" | ||||
| // ```` | ||||
| // | ||||
| //	--- | ||||
| //	tags: | ||||
| //	- admin | ||||
| // | ||||
| //	produces: | ||||
| //	- application/json | ||||
| // | ||||
| //	parameters: | ||||
| //	- | ||||
| //		name: subscription_id | ||||
| //		type: string | ||||
| //		description: Show only drafts created by the given subscription ID. | ||||
| //		in: query | ||||
| //	- | ||||
| //		name: domain | ||||
| //		type: string | ||||
| //		description: Return only drafts that target the given domain. | ||||
| //		in: query | ||||
| //	- | ||||
| //		name: permission_type | ||||
| //		type: string | ||||
| //		description: Filter on "block" or "allow" type drafts. | ||||
| //		in: query | ||||
| //	- | ||||
| //		name: max_id | ||||
| //		type: string | ||||
| //		description: >- | ||||
| //			Return only items *OLDER* than the given max ID (for paging downwards). | ||||
| //			The item with the specified ID will not be included in the response. | ||||
| //		in: query | ||||
| //	- | ||||
| //		name: since_id | ||||
| //		type: string | ||||
| //		description: >- | ||||
| //			Return only items *NEWER* than the given since ID. | ||||
| //			The item with the specified ID will not be included in the response. | ||||
| //		in: query | ||||
| //	- | ||||
| //		name: min_id | ||||
| //		type: string | ||||
| //		description: >- | ||||
| //			Return only items immediately *NEWER* than the given min ID (for paging upwards). | ||||
| //			The item with the specified ID will not be included in the response. | ||||
| //		in: query | ||||
| //	- | ||||
| //		name: limit | ||||
| //		type: integer | ||||
| //		description: Number of items to return. | ||||
| //		default: 20 | ||||
| //		minimum: 1 | ||||
| //		maximum: 100 | ||||
| //		in: query | ||||
| // | ||||
| //	security: | ||||
| //	- OAuth2 Bearer: | ||||
| //		- admin | ||||
| // | ||||
| //	responses: | ||||
| //		'200': | ||||
| //			description: Domain permission drafts. | ||||
| //			schema: | ||||
| //				type: array | ||||
| //				items: | ||||
| //					"$ref": "#/definitions/domainPermission" | ||||
| //			headers: | ||||
| //				Link: | ||||
| //					type: string | ||||
| //					description: Links to the next and previous queries. | ||||
| //		'400': | ||||
| //			description: bad request | ||||
| //		'401': | ||||
| //			description: unauthorized | ||||
| //		'403': | ||||
| //			description: forbidden | ||||
| //		'404': | ||||
| //			description: not found | ||||
| //		'406': | ||||
| //			description: not acceptable | ||||
| //		'500': | ||||
| //			description: internal server error | ||||
| func (m *Module) DomainPermissionDraftsGETHandler(c *gin.Context) { | ||||
| 	authed, err := oauth.Authed(c, true, true, true, true) | ||||
| 	if err != nil { | ||||
| 		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	if !*authed.User.Admin { | ||||
| 		err := fmt.Errorf("user %s not an admin", authed.User.ID) | ||||
| 		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	if authed.Account.IsMoving() { | ||||
| 		apiutil.ForbiddenAfterMove(c) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil { | ||||
| 		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	permType := c.Query(apiutil.DomainPermissionPermTypeKey) | ||||
| 	switch permType { | ||||
| 	case "", "block", "allow": | ||||
| 		// No problem. | ||||
| 
 | ||||
| 	default: | ||||
| 		// Invalid. | ||||
| 		text := fmt.Sprintf( | ||||
| 			"permission_type %s not recognized, valid values are empty string, block, or allow", | ||||
| 			permType, | ||||
| 		) | ||||
| 		errWithCode := gtserror.NewErrorBadRequest(errors.New(text), text) | ||||
| 		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	page, errWithCode := paging.ParseIDPage(c, 1, 200, 20) | ||||
| 	if errWithCode != nil { | ||||
| 		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	resp, errWithCode := m.processor.Admin().DomainPermissionDraftsGet( | ||||
| 		c.Request.Context(), | ||||
| 		c.Query(apiutil.DomainPermissionSubscriptionIDKey), | ||||
| 		c.Query(apiutil.DomainPermissionDomainKey), | ||||
| 		gtsmodel.NewDomainPermissionType(permType), | ||||
| 		page, | ||||
| 	) | ||||
| 	if errWithCode != nil { | ||||
| 		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	if resp.LinkHeader != "" { | ||||
| 		c.Header("Link", resp.LinkHeader) | ||||
| 	} | ||||
| 
 | ||||
| 	apiutil.JSON(c, http.StatusOK, resp.Items) | ||||
| } | ||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue