start implementing editing of existing domain permissions

This commit is contained in:
tobi 2025-04-03 19:29:53 +02:00
commit 7d253550b3
21 changed files with 617 additions and 116 deletions

View file

@ -102,12 +102,14 @@ func (m *Module) Route(attachHandler func(method string, path string, f ...gin.H
attachHandler(http.MethodPost, DomainBlocksPath, m.DomainBlocksPOSTHandler) attachHandler(http.MethodPost, DomainBlocksPath, m.DomainBlocksPOSTHandler)
attachHandler(http.MethodGet, DomainBlocksPath, m.DomainBlocksGETHandler) attachHandler(http.MethodGet, DomainBlocksPath, m.DomainBlocksGETHandler)
attachHandler(http.MethodGet, DomainBlocksPathWithID, m.DomainBlockGETHandler) attachHandler(http.MethodGet, DomainBlocksPathWithID, m.DomainBlockGETHandler)
attachHandler(http.MethodPut, DomainBlocksPathWithID, m.DomainBlockUpdatePUTHandler)
attachHandler(http.MethodDelete, DomainBlocksPathWithID, m.DomainBlockDELETEHandler) attachHandler(http.MethodDelete, DomainBlocksPathWithID, m.DomainBlockDELETEHandler)
// domain allow stuff // domain allow stuff
attachHandler(http.MethodPost, DomainAllowsPath, m.DomainAllowsPOSTHandler) attachHandler(http.MethodPost, DomainAllowsPath, m.DomainAllowsPOSTHandler)
attachHandler(http.MethodGet, DomainAllowsPath, m.DomainAllowsGETHandler) attachHandler(http.MethodGet, DomainAllowsPath, m.DomainAllowsGETHandler)
attachHandler(http.MethodGet, DomainAllowsPathWithID, m.DomainAllowGETHandler) attachHandler(http.MethodGet, DomainAllowsPathWithID, m.DomainAllowGETHandler)
attachHandler(http.MethodPut, DomainAllowsPathWithID, m.DomainAllowUpdatePUTHandler)
attachHandler(http.MethodDelete, DomainAllowsPathWithID, m.DomainAllowDELETEHandler) attachHandler(http.MethodDelete, DomainAllowsPathWithID, m.DomainAllowDELETEHandler)
// domain permission draft stuff // domain permission draft stuff

View file

@ -0,0 +1,91 @@
// GoToSocial
// Copyright (C) GoToSocial Authors admin@gotosocial.org
// SPDX-License-Identifier: AGPL-3.0-or-later
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package admin
import (
"github.com/gin-gonic/gin"
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
)
// DomainAllowUpdatePUTHandler swagger:operation PUT /api/v1/admin/domain_allows/{id} domainAllowUpdate
//
// Update a single domain allow.
//
// ---
// tags:
// - admin
//
// consumes:
// - multipart/form-data
//
// produces:
// - application/json
//
// parameters:
// -
// name: id
// type: string
// description: The id of the domain allow.
// in: path
// required: true
// -
// name: obfuscate
// in: formData
// description: >-
// Obfuscate the name of the domain when serving it publicly.
// Eg., `example.org` becomes something like `ex***e.org`.
// type: boolean
// -
// name: public_comment
// in: formData
// description: >-
// Public comment about this domain allow.
// This will be displayed alongside the domain allow if you choose to share allows.
// type: string
// -
// name: private_comment
// in: formData
// description: >-
// Private comment about this domain allow. Will only be shown to other admins, so this
// is a useful way of internally keeping track of why a certain domain ended up allowed.
// type: string
//
// security:
// - OAuth2 Bearer:
// - admin:write:domain_allows
//
// responses:
// '200':
// description: The updated domain allow.
// schema:
// "$ref": "#/definitions/domainPermission"
// '400':
// description: bad request
// '401':
// description: unauthorized
// '403':
// description: forbidden
// '404':
// description: not found
// '406':
// description: not acceptable
// '500':
// description: internal server error
func (m *Module) DomainAllowUpdatePUTHandler(c *gin.Context) {
m.updateDomainPermission(c, gtsmodel.DomainPermissionAllow)
}

View file

@ -0,0 +1,91 @@
// GoToSocial
// Copyright (C) GoToSocial Authors admin@gotosocial.org
// SPDX-License-Identifier: AGPL-3.0-or-later
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
package admin
import (
"github.com/gin-gonic/gin"
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
)
// DomainBlockUpdatePUTHandler swagger:operation PUT /api/v1/admin/domain_blocks/{id} domainBlockUpdate
//
// Update a single domain block.
//
// ---
// tags:
// - admin
//
// consumes:
// - multipart/form-data
//
// produces:
// - application/json
//
// parameters:
// -
// name: id
// type: string
// description: The id of the domain block.
// in: path
// required: true
// -
// name: obfuscate
// in: formData
// description: >-
// Obfuscate the name of the domain when serving it publicly.
// Eg., `example.org` becomes something like `ex***e.org`.
// type: boolean
// -
// name: public_comment
// in: formData
// description: >-
// Public comment about this domain block.
// This will be displayed alongside the domain block if you choose to share blocks.
// type: string
// -
// name: private_comment
// in: formData
// description: >-
// Private comment about this domain block. Will only be shown to other admins, so this
// is a useful way of internally keeping track of why a certain domain ended up blocked.
// type: string
//
// security:
// - OAuth2 Bearer:
// - admin:write:domain_blocks
//
// responses:
// '200':
// description: The updated domain block.
// schema:
// "$ref": "#/definitions/domainPermission"
// '400':
// description: bad request
// '401':
// description: unauthorized
// '403':
// description: forbidden
// '404':
// description: not found
// '406':
// description: not acceptable
// '500':
// description: internal server error
func (m *Module) DomainBlockUpdatePUTHandler(c *gin.Context) {
m.updateDomainPermission(c, gtsmodel.DomainPermissionBlock)
}

View file

@ -29,6 +29,7 @@ import (
apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util" apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
"github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/internal/gtserror"
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
"github.com/superseriousbusiness/gotosocial/internal/util"
) )
type singleDomainPermCreate func( type singleDomainPermCreate func(
@ -112,7 +113,7 @@ func (m *Module) createDomainPermissions(
if importing && form.Domains.Size == 0 { if importing && form.Domains.Size == 0 {
err = errors.New("import was specified but list of domains is empty") err = errors.New("import was specified but list of domains is empty")
} else if !importing && form.Domain == "" { } else if !importing && form.Domain == "" {
err = errors.New("empty domain provided") err = errors.New("no domain provided")
} }
if err != nil { if err != nil {
@ -122,14 +123,14 @@ func (m *Module) createDomainPermissions(
if !importing { if !importing {
// Single domain permission creation. // Single domain permission creation.
domainBlock, _, errWithCode := single( perm, _, errWithCode := single(
c.Request.Context(), c.Request.Context(),
permType, permType,
authed.Account, authed.Account,
form.Domain, form.Domain,
form.Obfuscate, util.PtrOrZero(form.Obfuscate),
form.PublicComment, util.PtrOrZero(form.PublicComment),
form.PrivateComment, util.PtrOrZero(form.PrivateComment),
"", // No sub ID for single perm creation. "", // No sub ID for single perm creation.
) )
@ -138,7 +139,7 @@ func (m *Module) createDomainPermissions(
return return
} }
apiutil.JSON(c, http.StatusOK, domainBlock) apiutil.JSON(c, http.StatusOK, perm)
return return
} }
@ -177,6 +178,82 @@ func (m *Module) createDomainPermissions(
apiutil.JSON(c, http.StatusOK, domainPerms) apiutil.JSON(c, http.StatusOK, domainPerms)
} }
func (m *Module) updateDomainPermission(
c *gin.Context,
permType gtsmodel.DomainPermissionType,
) {
// Scope differs based on permType.
var requireScope apiutil.Scope
if permType == gtsmodel.DomainPermissionBlock {
requireScope = apiutil.ScopeAdminWriteDomainBlocks
} else {
requireScope = apiutil.ScopeAdminWriteDomainAllows
}
authed, errWithCode := apiutil.TokenAuth(c,
true, true, true, true,
requireScope,
)
if errWithCode != nil {
apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
return
}
if !*authed.User.Admin {
err := fmt.Errorf("user %s not an admin", authed.User.ID)
apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
return
}
if authed.Account.IsMoving() {
apiutil.ForbiddenAfterMove(c)
return
}
if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
return
}
permID, errWithCode := apiutil.ParseID(c.Param(apiutil.IDKey))
if errWithCode != nil {
apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
return
}
// Parse + validate form.
form := new(apimodel.DomainPermissionRequest)
if err := c.ShouldBind(form); err != nil {
apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
return
}
if form.Obfuscate == nil &&
form.PrivateComment == nil &&
form.PublicComment == nil {
const errText = "empty form submitted"
errWithCode := gtserror.NewErrorBadRequest(errors.New(errText), errText)
apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
return
}
perm, errWithCode := m.processor.Admin().DomainPermissionUpdate(
c.Request.Context(),
permType,
permID,
form.Obfuscate,
form.PublicComment,
form.PrivateComment,
nil, // Can't update perm sub ID this way yet.
)
if errWithCode != nil {
apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
return
}
apiutil.JSON(c, http.StatusOK, perm)
}
// deleteDomainPermission deletes a single domain permission (block or allow). // deleteDomainPermission deletes a single domain permission (block or allow).
func (m *Module) deleteDomainPermission( func (m *Module) deleteDomainPermission(
c *gin.Context, c *gin.Context,

View file

@ -26,6 +26,7 @@ import (
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util" apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
"github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/internal/gtserror"
"github.com/superseriousbusiness/gotosocial/internal/util"
) )
// DomainPermissionDraftsPOSTHandler swagger:operation POST /api/v1/admin/domain_permission_drafts domainPermissionDraftCreate // DomainPermissionDraftsPOSTHandler swagger:operation POST /api/v1/admin/domain_permission_drafts domainPermissionDraftCreate
@ -148,9 +149,9 @@ func (m *Module) DomainPermissionDraftsPOSTHandler(c *gin.Context) {
authed.Account, authed.Account,
form.Domain, form.Domain,
permType, permType,
form.Obfuscate, util.PtrOrZero(form.Obfuscate),
form.PublicComment, util.PtrOrZero(form.PublicComment),
form.PrivateComment, util.PtrOrZero(form.PrivateComment),
) )
if errWithCode != nil { if errWithCode != nil {
apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)

View file

@ -80,14 +80,14 @@ type DomainPermissionRequest struct {
// Obfuscate the domain name when displaying this permission entry publicly. // Obfuscate the domain name when displaying this permission entry publicly.
// Ie., instead of 'example.org' show something like 'e**mpl*.or*'. // Ie., instead of 'example.org' show something like 'e**mpl*.or*'.
// example: false // example: false
Obfuscate bool `form:"obfuscate" json:"obfuscate"` Obfuscate *bool `form:"obfuscate" json:"obfuscate"`
// Private comment for other admins on why this permission entry was created. // Private comment for other admins on why this permission entry was created.
// example: don't like 'em!!!! // example: don't like 'em!!!!
PrivateComment string `form:"private_comment" json:"private_comment"` PrivateComment *string `form:"private_comment" json:"private_comment"`
// Public comment on why this permission entry was created. // Public comment on why this permission entry was created.
// Will be visible to requesters at /api/v1/instance/peers if this endpoint is exposed. // Will be visible to requesters at /api/v1/instance/peers if this endpoint is exposed.
// example: foss dorks 😫 // example: foss dorks 😫
PublicComment string `form:"public_comment" json:"public_comment"` PublicComment *string `form:"public_comment" json:"public_comment"`
// Permission type to create (only applies to domain permission drafts, not explicit blocks and allows). // Permission type to create (only applies to domain permission drafts, not explicit blocks and allows).
PermissionType string `form:"permission_type" json:"permission_type"` PermissionType string `form:"permission_type" json:"permission_type"`
} }

View file

@ -36,7 +36,7 @@ type domainDB struct {
state *state.State state *state.State
} }
func (d *domainDB) CreateDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) (err error) { func (d *domainDB) PutDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) (err error) {
// Normalize the domain as punycode, note the extra // Normalize the domain as punycode, note the extra
// validation step for domain name write operations. // validation step for domain name write operations.
allow.Domain, err = util.PunifySafely(allow.Domain) allow.Domain, err = util.PunifySafely(allow.Domain)
@ -162,7 +162,7 @@ func (d *domainDB) DeleteDomainAllow(ctx context.Context, domain string) error {
return nil return nil
} }
func (d *domainDB) CreateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error { func (d *domainDB) PutDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error {
var err error var err error
// Normalize the domain as punycode, note the extra // Normalize the domain as punycode, note the extra

View file

@ -46,7 +46,7 @@ func (suite *DomainTestSuite) TestIsDomainBlocked() {
suite.NoError(err) suite.NoError(err)
suite.False(blocked) suite.False(blocked)
err = suite.db.CreateDomainBlock(ctx, domainBlock) err = suite.db.PutDomainBlock(ctx, domainBlock)
suite.NoError(err) suite.NoError(err)
// domain block now exists // domain block now exists
@ -75,7 +75,7 @@ func (suite *DomainTestSuite) TestIsDomainBlockedWithAllow() {
suite.False(blocked) suite.False(blocked)
// Block this domain. // Block this domain.
if err := suite.db.CreateDomainBlock(ctx, domainBlock); err != nil { if err := suite.db.PutDomainBlock(ctx, domainBlock); err != nil {
suite.FailNow(err.Error()) suite.FailNow(err.Error())
} }
@ -96,7 +96,7 @@ func (suite *DomainTestSuite) TestIsDomainBlockedWithAllow() {
CreatedByAccount: suite.testAccounts["admin_account"], CreatedByAccount: suite.testAccounts["admin_account"],
} }
if err := suite.db.CreateDomainAllow(ctx, domainAllow); err != nil { if err := suite.db.PutDomainAllow(ctx, domainAllow); err != nil {
suite.FailNow(err.Error()) suite.FailNow(err.Error())
} }
@ -124,7 +124,7 @@ func (suite *DomainTestSuite) TestIsDomainBlockedWildcard() {
suite.NoError(err) suite.NoError(err)
suite.False(blocked) suite.False(blocked)
err = suite.db.CreateDomainBlock(ctx, domainBlock) err = suite.db.PutDomainBlock(ctx, domainBlock)
suite.NoError(err) suite.NoError(err)
// Start with the base block domain // Start with the base block domain
@ -164,7 +164,7 @@ func (suite *DomainTestSuite) TestIsDomainBlockedNonASCII() {
suite.NoError(err) suite.NoError(err)
suite.False(blocked) suite.False(blocked)
err = suite.db.CreateDomainBlock(ctx, domainBlock) err = suite.db.PutDomainBlock(ctx, domainBlock)
suite.NoError(err) suite.NoError(err)
// domain block now exists // domain block now exists
@ -200,7 +200,7 @@ func (suite *DomainTestSuite) TestIsDomainBlockedNonASCII2() {
suite.NoError(err) suite.NoError(err)
suite.False(blocked) suite.False(blocked)
err = suite.db.CreateDomainBlock(ctx, domainBlock) err = suite.db.PutDomainBlock(ctx, domainBlock)
suite.NoError(err) suite.NoError(err)
// domain block now exists // domain block now exists
@ -232,7 +232,7 @@ func (suite *DomainTestSuite) TestIsOtherDomainBlockedWildcardAndExplicit() {
} }
for _, block := range blocks { for _, block := range blocks {
if err := suite.db.CreateDomainBlock(ctx, block); err != nil { if err := suite.db.PutDomainBlock(ctx, block); err != nil {
suite.FailNow(err.Error()) suite.FailNow(err.Error())
} }
} }

View file

@ -80,7 +80,7 @@ func (suite *DomainPermissionSubscriptionTestSuite) TestCount() {
// Whack the perms in the db. // Whack the perms in the db.
for _, perm := range perms { for _, perm := range perms {
if err := suite.state.DB.CreateDomainBlock(ctx, perm); err != nil { if err := suite.state.DB.PutDomainBlock(ctx, perm); err != nil {
suite.FailNow(err.Error()) suite.FailNow(err.Error())
} }
} }

View file

@ -31,8 +31,8 @@ type Domain interface {
Block/allow storage + retrieval functions. Block/allow storage + retrieval functions.
*/ */
// CreateDomainAllow puts the given instance-level domain allow into the database. // PutDomainAllow puts the given instance-level domain allow into the database.
CreateDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) error PutDomainAllow(ctx context.Context, allow *gtsmodel.DomainAllow) error
// GetDomainAllow returns one instance-level domain allow with the given domain, if it exists. // GetDomainAllow returns one instance-level domain allow with the given domain, if it exists.
GetDomainAllow(ctx context.Context, domain string) (*gtsmodel.DomainAllow, error) GetDomainAllow(ctx context.Context, domain string) (*gtsmodel.DomainAllow, error)
@ -49,8 +49,8 @@ type Domain interface {
// DeleteDomainAllow deletes an instance-level domain allow with the given domain, if it exists. // DeleteDomainAllow deletes an instance-level domain allow with the given domain, if it exists.
DeleteDomainAllow(ctx context.Context, domain string) error DeleteDomainAllow(ctx context.Context, domain string) error
// CreateDomainBlock puts the given instance-level domain block into the database. // PutDomainBlock puts the given instance-level domain block into the database.
CreateDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error PutDomainBlock(ctx context.Context, block *gtsmodel.DomainBlock) error
// GetDomainBlock returns one instance-level domain block with the given domain, if it exists. // GetDomainBlock returns one instance-level domain block with the given domain, if it exists.
GetDomainBlock(ctx context.Context, domain string) (*gtsmodel.DomainBlock, error) GetDomainBlock(ctx context.Context, domain string) (*gtsmodel.DomainBlock, error)

View file

@ -26,7 +26,7 @@ type DomainAllow struct {
UpdatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item last updated UpdatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item last updated
Domain string `bun:",nullzero,notnull"` // domain to allow. Eg. 'whatever.com' Domain string `bun:",nullzero,notnull"` // domain to allow. Eg. 'whatever.com'
CreatedByAccountID string `bun:"type:CHAR(26),nullzero,notnull"` // Account ID of the creator of this allow CreatedByAccountID string `bun:"type:CHAR(26),nullzero,notnull"` // Account ID of the creator of this allow
CreatedByAccount *Account `bun:"rel:belongs-to"` // Account corresponding to createdByAccountID CreatedByAccount *Account `bun:"-"` // Account corresponding to createdByAccountID
PrivateComment string `bun:""` // Private comment on this allow, viewable to admins PrivateComment string `bun:""` // Private comment on this allow, viewable to admins
PublicComment string `bun:""` // Public comment on this allow, viewable (optionally) by everyone PublicComment string `bun:""` // Public comment on this allow, viewable (optionally) by everyone
Obfuscate *bool `bun:",nullzero,notnull,default:false"` // whether the domain name should appear obfuscated when displaying it publicly Obfuscate *bool `bun:",nullzero,notnull,default:false"` // whether the domain name should appear obfuscated when displaying it publicly

View file

@ -26,7 +26,7 @@ type DomainBlock struct {
UpdatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item last updated UpdatedAt time.Time `bun:"type:timestamptz,nullzero,notnull,default:current_timestamp"` // when was item last updated
Domain string `bun:",nullzero,notnull"` // domain to block. Eg. 'whatever.com' Domain string `bun:",nullzero,notnull"` // domain to block. Eg. 'whatever.com'
CreatedByAccountID string `bun:"type:CHAR(26),nullzero,notnull"` // Account ID of the creator of this block CreatedByAccountID string `bun:"type:CHAR(26),nullzero,notnull"` // Account ID of the creator of this block
CreatedByAccount *Account `bun:"rel:belongs-to"` // Account corresponding to createdByAccountID CreatedByAccount *Account `bun:"-"` // Account corresponding to createdByAccountID
PrivateComment string `bun:""` // Private comment on this block, viewable to admins PrivateComment string `bun:""` // Private comment on this block, viewable to admins
PublicComment string `bun:""` // Public comment on this block, viewable (optionally) by everyone PublicComment string `bun:""` // Public comment on this block, viewable (optionally) by everyone
Obfuscate *bool `bun:",nullzero,notnull,default:false"` // whether the domain name should appear obfuscated when displaying it publicly Obfuscate *bool `bun:",nullzero,notnull,default:false"` // whether the domain name should appear obfuscated when displaying it publicly

View file

@ -60,7 +60,7 @@ func (p *Processor) createDomainAllow(
} }
// Insert the new allow into the database. // Insert the new allow into the database.
if err := p.state.DB.CreateDomainAllow(ctx, domainAllow); err != nil { if err := p.state.DB.PutDomainAllow(ctx, domainAllow); err != nil {
err = gtserror.Newf("db error putting domain allow %s: %w", domain, err) err = gtserror.Newf("db error putting domain allow %s: %w", domain, err)
return nil, "", gtserror.NewErrorInternalError(err) return nil, "", gtserror.NewErrorInternalError(err)
} }
@ -92,6 +92,54 @@ func (p *Processor) createDomainAllow(
return apiDomainAllow, action.ID, nil return apiDomainAllow, action.ID, nil
} }
func (p *Processor) updateDomainAllow(
ctx context.Context,
domainAllowID string,
obfuscate *bool,
publicComment *string,
privateComment *string,
subscriptionID *string,
) (*apimodel.DomainPermission, gtserror.WithCode) {
domainAllow, err := p.state.DB.GetDomainAllowByID(ctx, domainAllowID)
if err != nil {
if !errors.Is(err, db.ErrNoEntries) {
// Real error.
err = gtserror.Newf("db error getting domain allow: %w", err)
return nil, gtserror.NewErrorInternalError(err)
}
// There are just no entries for this ID.
err = fmt.Errorf("no domain allow entry exists with ID %s", domainAllowID)
return nil, gtserror.NewErrorNotFound(err, err.Error())
}
var columns []string
if obfuscate != nil {
domainAllow.Obfuscate = obfuscate
columns = append(columns, "obfuscate")
}
if publicComment != nil {
domainAllow.PublicComment = *publicComment
columns = append(columns, "public_comment")
}
if privateComment != nil {
domainAllow.PrivateComment = *privateComment
columns = append(columns, "private_comment")
}
if subscriptionID != nil {
domainAllow.SubscriptionID = *subscriptionID
columns = append(columns, "subscription_id")
}
// Update the domain allow.
if err := p.state.DB.UpdateDomainAllow(ctx, domainAllow, columns...); err != nil {
err = gtserror.Newf("db error updating domain allow: %w", err)
return nil, gtserror.NewErrorInternalError(err)
}
return p.apiDomainPerm(ctx, domainAllow, false)
}
func (p *Processor) deleteDomainAllow( func (p *Processor) deleteDomainAllow(
ctx context.Context, ctx context.Context,
adminAcct *gtsmodel.Account, adminAcct *gtsmodel.Account,

View file

@ -60,7 +60,7 @@ func (p *Processor) createDomainBlock(
} }
// Insert the new block into the database. // Insert the new block into the database.
if err := p.state.DB.CreateDomainBlock(ctx, domainBlock); err != nil { if err := p.state.DB.PutDomainBlock(ctx, domainBlock); err != nil {
err = gtserror.Newf("db error putting domain block %s: %w", domain, err) err = gtserror.Newf("db error putting domain block %s: %w", domain, err)
return nil, "", gtserror.NewErrorInternalError(err) return nil, "", gtserror.NewErrorInternalError(err)
} }
@ -93,6 +93,54 @@ func (p *Processor) createDomainBlock(
return apiDomainBlock, action.ID, nil return apiDomainBlock, action.ID, nil
} }
func (p *Processor) updateDomainBlock(
ctx context.Context,
domainBlockID string,
obfuscate *bool,
publicComment *string,
privateComment *string,
subscriptionID *string,
) (*apimodel.DomainPermission, gtserror.WithCode) {
domainBlock, err := p.state.DB.GetDomainBlockByID(ctx, domainBlockID)
if err != nil {
if !errors.Is(err, db.ErrNoEntries) {
// Real error.
err = gtserror.Newf("db error getting domain block: %w", err)
return nil, gtserror.NewErrorInternalError(err)
}
// There are just no entries for this ID.
err = fmt.Errorf("no domain block entry exists with ID %s", domainBlockID)
return nil, gtserror.NewErrorNotFound(err, err.Error())
}
var columns []string
if obfuscate != nil {
domainBlock.Obfuscate = obfuscate
columns = append(columns, "obfuscate")
}
if publicComment != nil {
domainBlock.PublicComment = *publicComment
columns = append(columns, "public_comment")
}
if privateComment != nil {
domainBlock.PrivateComment = *privateComment
columns = append(columns, "private_comment")
}
if subscriptionID != nil {
domainBlock.SubscriptionID = *subscriptionID
columns = append(columns, "subscription_id")
}
// Update the domain block.
if err := p.state.DB.UpdateDomainBlock(ctx, domainBlock, columns...); err != nil {
err = gtserror.Newf("db error updating domain block: %w", err)
return nil, gtserror.NewErrorInternalError(err)
}
return p.apiDomainPerm(ctx, domainBlock, false)
}
func (p *Processor) deleteDomainBlock( func (p *Processor) deleteDomainBlock(
ctx context.Context, ctx context.Context,
adminAcct *gtsmodel.Account, adminAcct *gtsmodel.Account,

View file

@ -84,6 +84,50 @@ func (p *Processor) DomainPermissionCreate(
} }
} }
// DomainPermissionUpdate updates a domain permission
// of the given permissionType, with the given ID.
func (p *Processor) DomainPermissionUpdate(
ctx context.Context,
permissionType gtsmodel.DomainPermissionType,
permID string,
obfuscate *bool,
publicComment *string,
privateComment *string,
subscriptionID *string,
) (*apimodel.DomainPermission, gtserror.WithCode) {
switch permissionType {
// Explicitly block a domain.
case gtsmodel.DomainPermissionBlock:
return p.updateDomainBlock(
ctx,
permID,
obfuscate,
publicComment,
privateComment,
subscriptionID,
)
// Explicitly allow a domain.
case gtsmodel.DomainPermissionAllow:
return p.updateDomainAllow(
ctx,
permID,
obfuscate,
publicComment,
privateComment,
subscriptionID,
)
// 🎵 Why don't we all strap bombs to our chests,
// and ride our bikes to the next G7 picnic?
// Seems easier with every clock-tick. 🎵
default:
err := gtserror.Newf("unrecognized permission type %d", permissionType)
return nil, gtserror.NewErrorInternalError(err)
}
}
// DomainPermissionDelete removes one domain block with the given ID, // DomainPermissionDelete removes one domain block with the given ID,
// and processes side effects of removing the block asynchronously. // and processes side effects of removing the block asynchronously.
// //

View file

@ -438,7 +438,7 @@ func (s *Subscriptions) processDomainPermission(
Obfuscate: wantedPerm.GetObfuscate(), Obfuscate: wantedPerm.GetObfuscate(),
SubscriptionID: permSub.ID, SubscriptionID: permSub.ID,
} }
insertF = func() error { return s.state.DB.CreateDomainBlock(ctx, domainBlock) } insertF = func() error { return s.state.DB.PutDomainBlock(ctx, domainBlock) }
action = &gtsmodel.AdminAction{ action = &gtsmodel.AdminAction{
ID: id.NewULID(), ID: id.NewULID(),
@ -461,7 +461,7 @@ func (s *Subscriptions) processDomainPermission(
Obfuscate: wantedPerm.GetObfuscate(), Obfuscate: wantedPerm.GetObfuscate(),
SubscriptionID: permSub.ID, SubscriptionID: permSub.ID,
} }
insertF = func() error { return s.state.DB.CreateDomainAllow(ctx, domainAllow) } insertF = func() error { return s.state.DB.PutDomainAllow(ctx, domainAllow) }
action = &gtsmodel.AdminAction{ action = &gtsmodel.AdminAction{
ID: id.NewULID(), ID: id.NewULID(),

View file

@ -775,7 +775,7 @@ func (suite *SubscriptionsTestSuite) TestAdoption() {
existingBlock2, existingBlock2,
existingBlock3, existingBlock3,
} { } {
if err := testStructs.State.DB.CreateDomainBlock( if err := testStructs.State.DB.PutDomainBlock(
ctx, block, ctx, block,
); err != nil { ); err != nil {
suite.FailNow(err.Error()) suite.FailNow(err.Error())
@ -876,7 +876,7 @@ func (suite *SubscriptionsTestSuite) TestDomainAllowsAndBlocks() {
} }
// Store existing allow. // Store existing allow.
if err := testStructs.State.DB.CreateDomainAllow(ctx, existingAllow); err != nil { if err := testStructs.State.DB.PutDomainAllow(ctx, existingAllow); err != nil {
suite.FailNow(err.Error()) suite.FailNow(err.Error())
} }

View file

@ -22,6 +22,7 @@ import { gtsApi } from "../../gts-api";
import { import {
replaceCacheOnMutation, replaceCacheOnMutation,
removeFromCacheOnMutation, removeFromCacheOnMutation,
updateCacheOnMutation,
} from "../../query-modifiers"; } from "../../query-modifiers";
import { listToKeyedObject } from "../../transforms"; import { listToKeyedObject } from "../../transforms";
import type { import type {
@ -55,6 +56,36 @@ const extended = gtsApi.injectEndpoints({
...replaceCacheOnMutation("domainAllows") ...replaceCacheOnMutation("domainAllows")
}), }),
updateDomainBlock: build.mutation<DomainPerm, any>({
query: (formData) => ({
method: "PUT",
url: `/api/v1/admin/domain_blocks/${formData.id}`,
asForm: true,
body: formData,
discardEmpty: false
}),
...updateCacheOnMutation("domainBlocks", {
key: (_draft, newData) => {
return newData.domain;
}
})
}),
updateDomainAllow: build.mutation<DomainPerm, any>({
query: (formData) => ({
method: "PUT",
url: `/api/v1/admin/domain_allows/${formData.id}`,
asForm: true,
body: formData,
discardEmpty: false
}),
...updateCacheOnMutation("domainAllows", {
key: (_draft, newData) => {
return newData.domain;
}
})
}),
removeDomainBlock: build.mutation<DomainPerm, string>({ removeDomainBlock: build.mutation<DomainPerm, string>({
query: (id) => ({ query: (id) => ({
method: "DELETE", method: "DELETE",
@ -91,6 +122,16 @@ const useAddDomainBlockMutation = extended.useAddDomainBlockMutation;
*/ */
const useAddDomainAllowMutation = extended.useAddDomainAllowMutation; const useAddDomainAllowMutation = extended.useAddDomainAllowMutation;
/**
* Update a single domain permission (block) by PUTing to `/api/v1/admin/domain_blocks/{id}`.
*/
const useUpdateDomainBlockMutation = extended.useUpdateDomainBlockMutation;
/**
* Update a single domain permission (allow) by PUTing to `/api/v1/admin/domain_allows/{id}`.
*/
const useUpdateDomainAllowMutation = extended.useUpdateDomainAllowMutation;
/** /**
* Remove a single domain permission (block) by DELETEing to `/api/v1/admin/domain_blocks/{id}`. * Remove a single domain permission (block) by DELETEing to `/api/v1/admin/domain_blocks/{id}`.
*/ */
@ -104,6 +145,8 @@ const useRemoveDomainAllowMutation = extended.useRemoveDomainAllowMutation;
export { export {
useAddDomainBlockMutation, useAddDomainBlockMutation,
useAddDomainAllowMutation, useAddDomainAllowMutation,
useUpdateDomainBlockMutation,
useUpdateDomainAllowMutation,
useRemoveDomainBlockMutation, useRemoveDomainBlockMutation,
useRemoveDomainAllowMutation useRemoveDomainAllowMutation
}; };

View file

@ -1406,6 +1406,7 @@ button.tab-button {
} }
} }
.domain-permission-details,
.domain-permission-draft-details, .domain-permission-draft-details,
.domain-permission-exclude-details, .domain-permission-exclude-details,
.domain-permission-subscription-details { .domain-permission-subscription-details {
@ -1414,6 +1415,7 @@ button.tab-button {
} }
} }
.domain-permission-details,
.domain-permission-drafts-view, .domain-permission-drafts-view,
.domain-permission-draft-details, .domain-permission-draft-details,
.domain-permission-subscriptions-view, .domain-permission-subscriptions-view,

View file

@ -32,8 +32,18 @@ import Loading from "../../../components/loading";
import BackButton from "../../../components/back-button"; import BackButton from "../../../components/back-button";
import MutationButton from "../../../components/form/mutation-button"; import MutationButton from "../../../components/form/mutation-button";
import { useDomainAllowsQuery, useDomainBlocksQuery } from "../../../lib/query/admin/domain-permissions/get"; import {
import { useAddDomainAllowMutation, useAddDomainBlockMutation, useRemoveDomainAllowMutation, useRemoveDomainBlockMutation } from "../../../lib/query/admin/domain-permissions/update"; useDomainAllowsQuery,
useDomainBlocksQuery,
} from "../../../lib/query/admin/domain-permissions/get";
import {
useAddDomainAllowMutation,
useAddDomainBlockMutation,
useRemoveDomainAllowMutation,
useRemoveDomainBlockMutation,
useUpdateDomainAllowMutation,
useUpdateDomainBlockMutation,
} from "../../../lib/query/admin/domain-permissions/update";
import { DomainPerm } from "../../../lib/types/domain-permission"; import { DomainPerm } from "../../../lib/types/domain-permission";
import { NoArg } from "../../../lib/types/query"; import { NoArg } from "../../../lib/types/query";
import { Error } from "../../../components/error"; import { Error } from "../../../components/error";
@ -41,8 +51,9 @@ import { useBaseUrl } from "../../../lib/navigation/util";
import { PermType } from "../../../lib/types/perm"; import { PermType } from "../../../lib/types/perm";
import { useCapitalize } from "../../../lib/util"; import { useCapitalize } from "../../../lib/util";
import { formDomainValidator } from "../../../lib/util/formvalidators"; import { formDomainValidator } from "../../../lib/util/formvalidators";
import UsernameLozenge from "../../../components/username-lozenge";
export default function DomainPermDetail() { export default function DomainPermView() {
const baseUrl = useBaseUrl(); const baseUrl = useBaseUrl();
const search = useSearch(); const search = useSearch();
@ -101,33 +112,16 @@ export default function DomainPermDetail() {
? blocks[domain] ? blocks[domain]
: allows[domain]; : allows[domain];
// Render different into content depending on const title = <span>Domain {permType} for {domain}</span>;
// if we have a perm already for this domain.
let infoContent: React.JSX.Element;
if (existingPerm === undefined) {
infoContent = (
<span>
No stored {permType} yet, you can add one below:
</span>
);
} else {
infoContent = (
<div className="info">
<i className="fa fa-fw fa-exclamation-triangle" aria-hidden="true"></i>
<b>Editing existing domain {permTypeRaw} isn't implemented yet, <a href="https://github.com/superseriousbusiness/gotosocial/issues/1198" target="_blank" rel="noopener noreferrer">check here for progress</a></b>
</div>
);
}
return ( return (
<div> <div className="domain-permission-details">
<h1 className="text-cutoff"> <h1><BackButton to={`~${baseUrl}/${permTypeRaw}`} /> {title}</h1>
<BackButton to={`~${baseUrl}/${permTypeRaw}`} /> { existingPerm
{" "} ? <DomainPermDetails perm={existingPerm} permType={permType} />
Domain {permType} for {domain} : <span>No stored {permType} yet, you can add one below:</span>
</h1> }
{infoContent} <CreateOrUpdateDomainPerm
<DomainPermForm
defaultDomain={domain} defaultDomain={domain}
perm={existingPerm} perm={existingPerm}
permType={permType} permType={permType}
@ -136,23 +130,75 @@ export default function DomainPermDetail() {
); );
} }
interface DomainPermFormProps { interface DomainPermDetailsProps {
perm: DomainPerm,
permType: PermType,
}
function DomainPermDetails({
perm,
permType
}: DomainPermDetailsProps) {
const baseUrl = useBaseUrl();
const [ location ] = useLocation();
const created = useMemo(() => {
if (perm.created_at) {
return new Date(perm.created_at).toDateString();
}
return "unknown";
}, [perm.created_at]);
return (
<dl className="info-list">
<div className="info-list-entry">
<dt>Created</dt>
<dd><time dateTime={perm.created_at}>{created}</time></dd>
</div>
<div className="info-list-entry">
<dt>Created By</dt>
<dd>
<UsernameLozenge
account={perm.created_by}
linkTo={`~/settings/moderation/accounts/${perm.created_by}`}
backLocation={`~${baseUrl}/${location}`}
/>
</dd>
</div>
<div className="info-list-entry">
<dt>Domain</dt>
<dd>{perm.domain}</dd>
</div>
<div className="info-list-entry">
<dt>Permission type</dt>
<dd className={`permission-type ${permType}`}>
<i
aria-hidden={true}
className={`fa fa-${permType === "allow" ? "check" : "close"}`}
></i>
{permType}
</dd>
</div>
<div className="info-list-entry">
<dt>Subscription ID</dt>
<dd>{perm.subscription_id ?? "[none]"}</dd>
</div>
</dl>
);
}
interface CreateOrUpdateDomainPermProps {
defaultDomain: string; defaultDomain: string;
perm?: DomainPerm; perm?: DomainPerm;
permType: PermType; permType: PermType;
} }
function DomainPermForm({ defaultDomain, perm, permType }: DomainPermFormProps) { function CreateOrUpdateDomainPerm({
defaultDomain,
perm,
permType
}: CreateOrUpdateDomainPermProps) {
const isExistingPerm = perm !== undefined; const isExistingPerm = perm !== undefined;
const disabledForm = isExistingPerm
? {
disabled: true,
title: "Domain permissions currently cannot be edited."
}
: {
disabled: false,
title: "",
};
const form = { const form = {
domain: useTextInput("domain", { domain: useTextInput("domain", {
@ -171,70 +217,80 @@ function DomainPermForm({ defaultDomain, perm, permType }: DomainPermFormProps)
// react is like "weh" (mood), but we can decide // react is like "weh" (mood), but we can decide
// which ones to use conditionally. // which ones to use conditionally.
const [ addBlock, addBlockResult ] = useAddDomainBlockMutation(); const [ addBlock, addBlockResult ] = useAddDomainBlockMutation();
const [ updateBlock, updateBlockResult ] = useUpdateDomainBlockMutation({ fixedCacheKey: perm?.id });
const [ removeBlock, removeBlockResult] = useRemoveDomainBlockMutation({ fixedCacheKey: perm?.id }); const [ removeBlock, removeBlockResult] = useRemoveDomainBlockMutation({ fixedCacheKey: perm?.id });
const [ addAllow, addAllowResult ] = useAddDomainAllowMutation(); const [ addAllow, addAllowResult ] = useAddDomainAllowMutation();
const [ updateAllow, updateAllowResult ] = useUpdateDomainAllowMutation({ fixedCacheKey: perm?.id });
const [ removeAllow, removeAllowResult ] = useRemoveDomainAllowMutation({ fixedCacheKey: perm?.id }); const [ removeAllow, removeAllowResult ] = useRemoveDomainAllowMutation({ fixedCacheKey: perm?.id });
const [ const [
addTrigger, createOrUpdateTrigger,
addResult, createOrUpdateResult,
removeTrigger, removeTrigger,
removeResult, removeResult,
] = useMemo(() => { ] = useMemo(() => {
return permType == "block" switch (true) {
? [ case (permType === "block" && !isExistingPerm):
addBlock, return [ addBlock, addBlockResult, removeBlock, removeBlockResult ];
addBlockResult, case (permType === "block"):
removeBlock, return [ updateBlock, updateBlockResult, removeBlock, removeBlockResult ];
removeBlockResult, case !isExistingPerm:
] return [ addAllow, addAllowResult, removeAllow, removeAllowResult ];
: [ default:
addAllow, return [ updateAllow, updateAllowResult, removeAllow, removeAllowResult ];
addAllowResult, }
removeAllow, }, [permType, isExistingPerm,
removeAllowResult, addBlock, addBlockResult, updateBlock, updateBlockResult, removeBlock, removeBlockResult,
]; addAllow, addAllowResult, updateAllow, updateAllowResult, removeAllow, removeAllowResult,
}, [permType,
addBlock, addBlockResult, removeBlock, removeBlockResult,
addAllow, addAllowResult, removeAllow, removeAllowResult,
]); ]);
// Use appropriate submission params for this permType. // Use appropriate submission params for this
const [submitForm, submitFormResult] = useFormSubmit(form, [addTrigger, addResult], { changedOnly: false }); // permType, and whether we're creating or updating.
const [submit, submitResult] = useFormSubmit(
form,
[
createOrUpdateTrigger,
createOrUpdateResult,
],
{
changedOnly: isExistingPerm
},
);
// Uppercase first letter of given permType. // Uppercase first letter of given permType.
const permTypeUpper = useCapitalize(permType); const permTypeUpper = useCapitalize(permType);
const [location, setLocation] = useLocation(); const [location, setLocation] = useLocation();
function verifyUrlThenSubmit(e) { function verifyUrlThenSubmit(e) {
// Adding a new domain permissions happens on a url like // Adding a new domain permissions happens on a url like
// "/settings/admin/domain-permissions/:permType/domain.com", // "/settings/admin/domain-permissions/:permType/domain.com",
// but if domain input changes, that doesn't match anymore // but if domain input changes, that doesn't match anymore
// and causes issues later on so, before submitting the form, // and causes issues later on so, before submitting the form,
// silently change url, and THEN submit. // silently change url, and THEN submit.
let correctUrl = `/${permType}s/${form.domain.value}`; if (!isExistingPerm) {
if (location != correctUrl) { let correctUrl = `/${permType}s/${form.domain.value}`;
setLocation(correctUrl); if (location != correctUrl) {
setLocation(correctUrl);
}
} }
return submitForm(e); return submit(e);
} }
return ( return (
<form onSubmit={verifyUrlThenSubmit}> <form onSubmit={verifyUrlThenSubmit}>
<TextInput { !isExistingPerm &&
field={form.domain} <TextInput
label="Domain" field={form.domain}
placeholder="example.com" label="Domain"
autoCapitalize="none" placeholder="example.com"
spellCheck="false" autoCapitalize="none"
{...disabledForm} spellCheck="false"
/> />
}
<Checkbox <Checkbox
field={form.obfuscate} field={form.obfuscate}
label="Obfuscate domain in public lists" label="Obfuscate domain in public lists"
{...disabledForm}
/> />
<TextArea <TextArea
@ -242,7 +298,6 @@ function DomainPermForm({ defaultDomain, perm, permType }: DomainPermFormProps)
label="Private comment" label="Private comment"
autoCapitalize="sentences" autoCapitalize="sentences"
rows={3} rows={3}
{...disabledForm}
/> />
<TextArea <TextArea
@ -250,15 +305,14 @@ function DomainPermForm({ defaultDomain, perm, permType }: DomainPermFormProps)
label="Public comment" label="Public comment"
autoCapitalize="sentences" autoCapitalize="sentences"
rows={3} rows={3}
{...disabledForm}
/> />
<div className="action-buttons row"> <div className="action-buttons row">
<MutationButton <MutationButton
label={permTypeUpper} label={isExistingPerm ? "Update " + permType.toString() : permTypeUpper}
result={submitFormResult} result={submitResult}
showError={false} showError={false}
{...disabledForm} disabled={false}
/> />
{ {
@ -266,7 +320,7 @@ function DomainPermForm({ defaultDomain, perm, permType }: DomainPermFormProps)
<MutationButton <MutationButton
type="button" type="button"
onClick={() => removeTrigger(perm.id?? "")} onClick={() => removeTrigger(perm.id?? "")}
label="Remove" label={"Remove " + permType.toString()}
result={removeResult} result={removeResult}
className="button danger" className="button danger"
showError={false} showError={false}
@ -276,7 +330,7 @@ function DomainPermForm({ defaultDomain, perm, permType }: DomainPermFormProps)
</div> </div>
<> <>
{addResult.error && <Error error={addResult.error} />} {createOrUpdateResult.error && <Error error={createOrUpdateResult.error} />}
{removeResult.error && <Error error={removeResult.error} />} {removeResult.error && <Error error={removeResult.error} />}
</> </>

View file

@ -25,7 +25,7 @@ import ReportDetail from "./reports/detail";
import { ErrorBoundary } from "../../lib/navigation/error"; import { ErrorBoundary } from "../../lib/navigation/error";
import ImportExport from "./domain-permissions/import-export"; import ImportExport from "./domain-permissions/import-export";
import DomainPermissionsOverview from "./domain-permissions/overview"; import DomainPermissionsOverview from "./domain-permissions/overview";
import DomainPermDetail from "./domain-permissions/detail"; import DomainPermView from "./domain-permissions/detail";
import AccountsSearch from "./accounts"; import AccountsSearch from "./accounts";
import AccountsPending from "./accounts/pending"; import AccountsPending from "./accounts/pending";
import AccountDetail from "./accounts/detail"; import AccountDetail from "./accounts/detail";
@ -160,7 +160,7 @@ function ModerationDomainPermsRouter() {
<Route path="/subscriptions/preview" component={DomainPermissionSubscriptionsPreview} /> <Route path="/subscriptions/preview" component={DomainPermissionSubscriptionsPreview} />
<Route path="/subscriptions/:permSubId" component={DomainPermissionSubscriptionDetail} /> <Route path="/subscriptions/:permSubId" component={DomainPermissionSubscriptionDetail} />
<Route path="/:permType" component={DomainPermissionsOverview} /> <Route path="/:permType" component={DomainPermissionsOverview} />
<Route path="/:permType/:domain" component={DomainPermDetail} /> <Route path="/:permType/:domain" component={DomainPermView} />
<Route><Redirect to="/blocks"/></Route> <Route><Redirect to="/blocks"/></Route>
</Switch> </Switch>
</ErrorBoundary> </ErrorBoundary>