From 3720251fcaf0362275aa71d5ff1efcbdcc226374 Mon Sep 17 00:00:00 2001 From: kim <89579420+NyaaaWhatsUpDoc@users.noreply.github.com> Date: Fri, 24 Jan 2025 15:02:13 +0000 Subject: [PATCH 1/3] [feature] show status edits on frontend (#3678) * add 'edited-at' field to status info web template * make the edited-at text italic * small change in phrasing --- web/source/css/status.css | 6 +++++- web/template/status_info.tmpl | 8 ++++++++ 2 files changed, 13 insertions(+), 1 deletion(-) diff --git a/web/source/css/status.css b/web/source/css/status.css index 97713dae2..f08310921 100644 --- a/web/source/css/status.css +++ b/web/source/css/status.css @@ -436,6 +436,10 @@ main { display: flex; flex-wrap: wrap; column-gap: 1rem; + + .edited-at { + font-style: italic; + } } .stats-item { @@ -443,7 +447,7 @@ main { gap: 0.4rem; } - .stats-item:not(.published-at) { + .stats-item:not(.published-at):not(.edited-at) { z-index: 1; user-select: none; } diff --git a/web/template/status_info.tmpl b/web/template/status_info.tmpl index c5ba3ef35..366300071 100644 --- a/web/template/status_info.tmpl +++ b/web/template/status_info.tmpl @@ -26,6 +26,14 @@ + {{- if .EditedAt -}} +
+
Edited
+
+ (last edited ) +
+
+ {{ end }}
From 71b50353ebb9dd844dc6a04590d191123a332a58 Mon Sep 17 00:00:00 2001 From: tobi <31960611+tsmethurst@users.noreply.github.com> Date: Fri, 24 Jan 2025 16:36:34 +0000 Subject: [PATCH 2/3] [feature] Process incoming Undo Announce properly (#3676) * [feature] Process incoming Undo Announce properly * test undo announce --- internal/federation/federatingdb/undo.go | 82 +++++++++++++++++++ internal/processing/workers/fromfediapi.go | 39 +++++++++ .../processing/workers/fromfediapi_test.go | 56 +++++++++++++ 3 files changed, 177 insertions(+) diff --git a/internal/federation/federatingdb/undo.go b/internal/federation/federatingdb/undo.go index b3e0a2825..42c934d44 100644 --- a/internal/federation/federatingdb/undo.go +++ b/internal/federation/federatingdb/undo.go @@ -29,6 +29,7 @@ import ( "github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/log" + "github.com/superseriousbusiness/gotosocial/internal/messages" ) func (f *federatingDB) Undo(ctx context.Context, undo vocab.ActivityStreamsUndo) error { @@ -89,6 +90,18 @@ func (f *federatingDB) Undo(ctx context.Context, undo vocab.ActivityStreamsUndo) return err } + // UNDO ANNOUNCE + case ap.ActivityAnnounce: + if err := f.undoAnnounce( + ctx, + receivingAcct, + requestingAcct, + undo, + asType, + ); err != nil { + return err + } + // UNHANDLED default: log.Debugf(ctx, "unhandled object type: %s", name) @@ -323,3 +336,72 @@ func (f *federatingDB) undoBlock( log.Debug(ctx, "Block undone") return nil } + +func (f *federatingDB) undoAnnounce( + ctx context.Context, + receivingAcct *gtsmodel.Account, + requestingAcct *gtsmodel.Account, + undo vocab.ActivityStreamsUndo, + t vocab.Type, +) error { + asAnnounce, ok := t.(vocab.ActivityStreamsAnnounce) + if !ok { + err := fmt.Errorf("%T not parseable as vocab.ActivityStreamsAnnounce", t) + return gtserror.SetMalformed(err) + } + + // Make sure the Undo actor owns the + // Announce they're trying to undo. + if !sameActor( + undo.GetActivityStreamsActor(), + asAnnounce.GetActivityStreamsActor(), + ) { + // Ignore this Activity. + return nil + } + + // Convert AS Announce to *gtsmodel.Status, + // retrieving origin account + target status. + boost, isNew, err := f.converter.ASAnnounceToStatus( + // Use barebones as we don't + // need to populate attachments + // on boosted status, mentions, etc. + gtscontext.SetBarebones(ctx), + asAnnounce, + ) + if err != nil && !errors.Is(err, db.ErrNoEntries) { + err := gtserror.Newf("error converting AS Announce to boost: %w", err) + return err + } + + if boost == nil { + // We were missing origin or + // target(s) for this Announce, + // so we cannot Undo anything. + return nil + } + + if isNew { + // We hadn't seen this boost + // before anyway, so there's + // nothing to Undo. + return nil + } + + // Ensure requester == announcer. + if boost.AccountID != requestingAcct.ID { + const text = "requestingAcct was not Block origin" + return gtserror.NewErrorForbidden(errors.New(text), text) + } + + // Looks valid. Process side effects asynchronously. + f.state.Workers.Federator.Queue.Push(&messages.FromFediAPI{ + APObjectType: ap.ActivityAnnounce, + APActivityType: ap.ActivityUndo, + GTSModel: boost, + Receiving: receivingAcct, + Requesting: requestingAcct, + }) + + return nil +} diff --git a/internal/processing/workers/fromfediapi.go b/internal/processing/workers/fromfediapi.go index 096e285f6..cf93a5ec5 100644 --- a/internal/processing/workers/fromfediapi.go +++ b/internal/processing/workers/fromfediapi.go @@ -189,6 +189,14 @@ func (p *Processor) ProcessFromFediAPI(ctx context.Context, fMsg *messages.FromF if fMsg.APObjectType == ap.ActorPerson { return p.fediAPI.MoveAccount(ctx, fMsg) } + + // UNDO SOMETHING + case ap.ActivityUndo: + + // UNDO ANNOUNCE + if fMsg.APObjectType == ap.ActivityAnnounce { + return p.fediAPI.UndoAnnounce(ctx, fMsg) + } } return gtserror.Newf("unhandled: %s %s", fMsg.APActivityType, fMsg.APObjectType) @@ -1159,3 +1167,34 @@ func (p *fediAPI) RejectAnnounce(ctx context.Context, fMsg *messages.FromFediAPI return nil } + +func (p *fediAPI) UndoAnnounce( + ctx context.Context, + fMsg *messages.FromFediAPI, +) error { + boost, ok := fMsg.GTSModel.(*gtsmodel.Status) + if !ok { + return gtserror.Newf("%T not parseable as *gtsmodel.Status", fMsg.GTSModel) + } + + // Delete the boost wrapper itself. + if err := p.state.DB.DeleteStatusByID(ctx, boost.ID); err != nil { + return gtserror.Newf("db error deleting boost: %w", err) + } + + // Update statuses count for the requesting account. + if err := p.utils.decrementStatusesCount(ctx, fMsg.Requesting, boost); err != nil { + log.Errorf(ctx, "error updating account stats: %v", err) + } + + // Remove the boost wrapper from all timelines. + if err := p.surface.deleteStatusFromTimelines(ctx, boost.ID); err != nil { + log.Errorf(ctx, "error removing timelined boost: %v", err) + } + + // Interaction counts changed on the boosted status; + // uncache the prepared version from all timelines. + p.surface.invalidateStatusFromTimelines(ctx, boost.BoostOfID) + + return nil +} diff --git a/internal/processing/workers/fromfediapi_test.go b/internal/processing/workers/fromfediapi_test.go index 70886d698..f3e719890 100644 --- a/internal/processing/workers/fromfediapi_test.go +++ b/internal/processing/workers/fromfediapi_test.go @@ -20,6 +20,7 @@ package workers_test import ( "context" "encoding/json" + "errors" "fmt" "io" "testing" @@ -29,6 +30,7 @@ import ( "github.com/superseriousbusiness/gotosocial/internal/ap" apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" "github.com/superseriousbusiness/gotosocial/internal/db" + "github.com/superseriousbusiness/gotosocial/internal/gtscontext" "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/messages" "github.com/superseriousbusiness/gotosocial/internal/stream" @@ -679,6 +681,60 @@ func (suite *FromFediAPITestSuite) TestMoveAccount() { suite.WithinDuration(time.Now(), move.SucceededAt, 1*time.Minute) } +func (suite *FromFediAPITestSuite) TestUndoAnnounce() { + var ( + ctx = context.Background() + testStructs = testrig.SetupTestStructs(rMediaPath, rTemplatePath) + requestingAcct = suite.testAccounts["remote_account_1"] + receivingAcct = suite.testAccounts["local_account_1"] + boostedStatus = suite.testStatuses["admin_account_status_1"] + ) + defer testrig.TearDownTestStructs(testStructs) + + // Have remote_account_1 boost admin_account. + boost, err := testStructs.TypeConverter.StatusToBoost( + ctx, + boostedStatus, + requestingAcct, + "", + ) + if err != nil { + suite.FailNow(err.Error()) + } + + // Set the boost URI + URL to + // fossbros-anonymous.io. + boost.URI = "https://fossbros-anonymous.io/users/foss_satan/" + boost.ID + boost.URL = boost.URI + + // Store the boost. + if err := testStructs.State.DB.PutStatus(ctx, boost); err != nil { + suite.FailNow(err.Error()) + } + + // Process the Undo. + err = testStructs.Processor.Workers().ProcessFromFediAPI(ctx, &messages.FromFediAPI{ + APObjectType: ap.ActivityAnnounce, + APActivityType: ap.ActivityUndo, + GTSModel: boost, + Receiving: receivingAcct, + Requesting: requestingAcct, + }) + suite.NoError(err) + + // Wait for side effects to trigger: + // the boost should be deleted. + if !testrig.WaitFor(func() bool { + _, err := testStructs.State.DB.GetStatusByID( + gtscontext.SetBarebones(ctx), + boost.ID, + ) + return errors.Is(err, db.ErrNoEntries) + }) { + suite.FailNow("timed out waiting for boost to be removed") + } +} + func TestFromFederatorTestSuite(t *testing.T) { suite.Run(t, &FromFediAPITestSuite{}) } From 4c052c85f583a41b2c26428555552186284fe7a7 Mon Sep 17 00:00:00 2001 From: tobi <31960611+tsmethurst@users.noreply.github.com> Date: Fri, 24 Jan 2025 17:09:55 +0000 Subject: [PATCH 3/3] [bugfix] Rename domain perm sub migration to unique date (#3679) * [bugfix] Rename domain perm sub migration to unique date * add repeat migration --- ...112745_domain_permission_subscriptions.go} | 0 ...124164400_domain_perm_sub_migration_fix.go | 82 +++++++++++++++++++ 2 files changed, 82 insertions(+) rename internal/db/bundb/migrations/{20241022153016_domain_permission_subscriptions.go => 20250119112745_domain_permission_subscriptions.go} (100%) create mode 100644 internal/db/bundb/migrations/20250124164400_domain_perm_sub_migration_fix.go diff --git a/internal/db/bundb/migrations/20241022153016_domain_permission_subscriptions.go b/internal/db/bundb/migrations/20250119112745_domain_permission_subscriptions.go similarity index 100% rename from internal/db/bundb/migrations/20241022153016_domain_permission_subscriptions.go rename to internal/db/bundb/migrations/20250119112745_domain_permission_subscriptions.go diff --git a/internal/db/bundb/migrations/20250124164400_domain_perm_sub_migration_fix.go b/internal/db/bundb/migrations/20250124164400_domain_perm_sub_migration_fix.go new file mode 100644 index 000000000..5914c752a --- /dev/null +++ b/internal/db/bundb/migrations/20250124164400_domain_perm_sub_migration_fix.go @@ -0,0 +1,82 @@ +// GoToSocial +// Copyright (C) GoToSocial Authors admin@gotosocial.org +// SPDX-License-Identifier: AGPL-3.0-or-later +// +// This program is free software: you can redistribute it and/or modify +// it under the terms of the GNU Affero General Public License as published by +// the Free Software Foundation, either version 3 of the License, or +// (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +// GNU Affero General Public License for more details. +// +// You should have received a copy of the GNU Affero General Public License +// along with this program. If not, see . + +package migrations + +import ( + "context" + + gtsmodel "github.com/superseriousbusiness/gotosocial/internal/db/bundb/migrations/20241022153016_domain_permission_subscriptions" + "github.com/uptrace/bun" +) + +// This file exists because tobi is a silly billy and named two migration files +// with the same date part, so the latter migration didn't always run properly. +// The file just repeats migrations in 20250119112745_domain_permission_subscriptions.go, +// which will be a noop in most cases, but will fix some issues for those who +// were running snapshots between GtS v0.17.0 and GtS v0.18.0. +// +// See https://github.com/superseriousbusiness/gotosocial/pull/3679. +func init() { + up := func(ctx context.Context, db *bun.DB) error { + return db.RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error { + // Create `domain_permission_subscriptions`. + if _, err := tx. + NewCreateTable(). + Model((*gtsmodel.DomainPermissionSubscription)(nil)). + IfNotExists(). + Exec(ctx); err != nil { + return err + } + + // Create indexes. Indices. Indie sexes. + if _, err := tx. + NewCreateIndex(). + Table("domain_permission_subscriptions"). + // Filter on permission type. + Index("domain_permission_subscriptions_permission_type_idx"). + Column("permission_type"). + IfNotExists(). + Exec(ctx); err != nil { + return err + } + + if _, err := tx. + NewCreateIndex(). + Table("domain_permission_subscriptions"). + // Sort by priority DESC. + Index("domain_permission_subscriptions_priority_order_idx"). + ColumnExpr("? DESC", bun.Ident("priority")). + IfNotExists(). + Exec(ctx); err != nil { + return err + } + + return nil + }) + } + + down := func(ctx context.Context, db *bun.DB) error { + return db.RunInTx(ctx, nil, func(ctx context.Context, tx bun.Tx) error { + return nil + }) + } + + if err := Migrations.Register(up, down); err != nil { + panic(err) + } +}