mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-24 04:36:38 +00:00
Compare commits
3 commits
22f771e8f6
...
9a91726700
Author | SHA1 | Date | |
---|---|---|---|
9a91726700 | |||
2f610eb955 | |||
a9b72c6d28 |
120
internal/db/bundb/domainpermissiondraft_test.go
Normal file
120
internal/db/bundb/domainpermissiondraft_test.go
Normal file
|
@ -0,0 +1,120 @@
|
||||||
|
// GoToSocial
|
||||||
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
||||||
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
//
|
||||||
|
// This program is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Affero General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This program is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Affero General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package bundb_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/util"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DomainPermissionDraftTestSuite struct {
|
||||||
|
BunDBStandardTestSuite
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DomainPermissionDraftTestSuite) TestPermDraftCreateGetDelete() {
|
||||||
|
var (
|
||||||
|
ctx = context.Background()
|
||||||
|
draft = >smodel.DomainPermissionDraft{
|
||||||
|
ID: "01JCZN614XG85GCGAMSV9ZZAEJ",
|
||||||
|
PermissionType: gtsmodel.DomainPermissionBlock,
|
||||||
|
Domain: "exämple.org",
|
||||||
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
||||||
|
PrivateComment: "this domain is poo",
|
||||||
|
PublicComment: "this domain is poo, but phrased in a more outward-facing way",
|
||||||
|
Obfuscate: util.Ptr(false),
|
||||||
|
SubscriptionID: "01JCZN8PG55KKEVTDAY52D0T3P",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
// Whack the draft in.
|
||||||
|
if err := suite.state.DB.PutDomainPermissionDraft(ctx, draft); err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the draft again.
|
||||||
|
dbDraft, err := suite.state.DB.GetDomainPermissionDraftByID(ctx, draft.ID)
|
||||||
|
if err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
// Domain should have been stored punycoded.
|
||||||
|
suite.Equal("xn--exmple-cua.org", dbDraft.Domain)
|
||||||
|
|
||||||
|
// Search for domain using both
|
||||||
|
// punycode and unicode variants.
|
||||||
|
search1, err := suite.state.DB.GetDomainPermissionDrafts(
|
||||||
|
ctx,
|
||||||
|
gtsmodel.DomainPermissionUnknown,
|
||||||
|
"",
|
||||||
|
"exämple.org",
|
||||||
|
nil,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
if len(search1) != 1 {
|
||||||
|
suite.FailNow("couldn't get domain perm draft exämple.org")
|
||||||
|
}
|
||||||
|
|
||||||
|
search2, err := suite.state.DB.GetDomainPermissionDrafts(
|
||||||
|
ctx,
|
||||||
|
gtsmodel.DomainPermissionUnknown,
|
||||||
|
"",
|
||||||
|
"xn--exmple-cua.org",
|
||||||
|
nil,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
if len(search2) != 1 {
|
||||||
|
suite.FailNow("couldn't get domain perm draft example.org")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Change ID + try to put the same draft again.
|
||||||
|
draft.ID = "01JCZNVYSDT3JE385FABMJ7ADQ"
|
||||||
|
err = suite.state.DB.PutDomainPermissionDraft(ctx, draft)
|
||||||
|
if !errors.Is(err, db.ErrAlreadyExists) {
|
||||||
|
suite.FailNow("was able to insert same domain perm draft twice")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Put same draft but change permission type, should work.
|
||||||
|
draft.PermissionType = gtsmodel.DomainPermissionAllow
|
||||||
|
if err := suite.state.DB.PutDomainPermissionDraft(ctx, draft); err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete both drafts.
|
||||||
|
for _, id := range []string{
|
||||||
|
"01JCZN614XG85GCGAMSV9ZZAEJ",
|
||||||
|
"01JCZNVYSDT3JE385FABMJ7ADQ",
|
||||||
|
} {
|
||||||
|
if err := suite.state.DB.DeleteDomainPermissionDraft(ctx, id); err != nil {
|
||||||
|
suite.FailNow("error deleting domain permission draft")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDomainPermissionDraftTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(DomainPermissionDraftTestSuite))
|
||||||
|
}
|
105
internal/db/bundb/domainpermissionexclude_test.go
Normal file
105
internal/db/bundb/domainpermissionexclude_test.go
Normal file
|
@ -0,0 +1,105 @@
|
||||||
|
// GoToSocial
|
||||||
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
||||||
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
//
|
||||||
|
// This program is free software: you can redistribute it and/or modify
|
||||||
|
// it under the terms of the GNU Affero General Public License as published by
|
||||||
|
// the Free Software Foundation, either version 3 of the License, or
|
||||||
|
// (at your option) any later version.
|
||||||
|
//
|
||||||
|
// This program is distributed in the hope that it will be useful,
|
||||||
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
// GNU Affero General Public License for more details.
|
||||||
|
//
|
||||||
|
// You should have received a copy of the GNU Affero General Public License
|
||||||
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
package bundb_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
||||||
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DomainPermissionExcludeTestSuite struct {
|
||||||
|
BunDBStandardTestSuite
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DomainPermissionExcludeTestSuite) TestPermExcludeCreateGetDelete() {
|
||||||
|
var (
|
||||||
|
ctx = context.Background()
|
||||||
|
exclude = >smodel.DomainPermissionExclude{
|
||||||
|
ID: "01JCZN614XG85GCGAMSV9ZZAEJ",
|
||||||
|
Domain: "exämple.org",
|
||||||
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
||||||
|
PrivateComment: "this domain is poo",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
// Whack the exclude in.
|
||||||
|
if err := suite.state.DB.PutDomainPermissionExclude(ctx, exclude); err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the exclude again.
|
||||||
|
dbExclude, err := suite.state.DB.GetDomainPermissionExcludeByID(ctx, exclude.ID)
|
||||||
|
if err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
// Domain should have been stored punycoded.
|
||||||
|
suite.Equal("xn--exmple-cua.org", dbExclude.Domain)
|
||||||
|
|
||||||
|
// Search for domain using both
|
||||||
|
// punycode and unicode variants.
|
||||||
|
search1, err := suite.state.DB.GetDomainPermissionExcludes(
|
||||||
|
ctx,
|
||||||
|
"exämple.org",
|
||||||
|
nil,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
if len(search1) != 1 {
|
||||||
|
suite.FailNow("couldn't get domain perm exclude exämple.org")
|
||||||
|
}
|
||||||
|
|
||||||
|
search2, err := suite.state.DB.GetDomainPermissionExcludes(
|
||||||
|
ctx,
|
||||||
|
"xn--exmple-cua.org",
|
||||||
|
nil,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
suite.FailNow(err.Error())
|
||||||
|
}
|
||||||
|
if len(search2) != 1 {
|
||||||
|
suite.FailNow("couldn't get domain perm exclude example.org")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Change ID + try to put the same exclude again.
|
||||||
|
exclude.ID = "01JCZNVYSDT3JE385FABMJ7ADQ"
|
||||||
|
err = suite.state.DB.PutDomainPermissionExclude(ctx, exclude)
|
||||||
|
if !errors.Is(err, db.ErrAlreadyExists) {
|
||||||
|
suite.FailNow("was able to insert same domain perm exclude twice")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete both excludes.
|
||||||
|
for _, id := range []string{
|
||||||
|
"01JCZN614XG85GCGAMSV9ZZAEJ",
|
||||||
|
"01JCZNVYSDT3JE385FABMJ7ADQ",
|
||||||
|
} {
|
||||||
|
if err := suite.state.DB.DeleteDomainPermissionExclude(ctx, id); err != nil {
|
||||||
|
suite.FailNow("error deleting domain permission exclude")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDomainPermissionExcludeTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(DomainPermissionExcludeTestSuite))
|
||||||
|
}
|
|
@ -249,38 +249,37 @@ func (p *Processor) DomainPermissionDraftAccept(
|
||||||
deleteDraft()
|
deleteDraft()
|
||||||
|
|
||||||
return new, actionID, errWithCode
|
return new, actionID, errWithCode
|
||||||
} else {
|
|
||||||
// Domain permission exists but we should overwrite
|
|
||||||
// it by just updating the existing domain permission.
|
|
||||||
// Domain can't change, so no need to re-run side effects.
|
|
||||||
existing.SetCreatedByAccountID(permDraft.CreatedByAccountID)
|
|
||||||
existing.SetCreatedByAccount(permDraft.CreatedByAccount)
|
|
||||||
existing.SetPrivateComment(permDraft.PrivateComment)
|
|
||||||
existing.SetPublicComment(permDraft.PublicComment)
|
|
||||||
existing.SetObfuscate(permDraft.Obfuscate)
|
|
||||||
existing.SetSubscriptionID(permDraft.SubscriptionID)
|
|
||||||
|
|
||||||
var err error
|
|
||||||
switch dp := existing.(type) {
|
|
||||||
case *gtsmodel.DomainBlock:
|
|
||||||
err = p.state.DB.UpdateDomainBlock(ctx, dp)
|
|
||||||
|
|
||||||
case *gtsmodel.DomainAllow:
|
|
||||||
err = p.state.DB.UpdateDomainAllow(ctx, dp)
|
|
||||||
}
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
err := gtserror.Newf("db error updating existing domain permission: %w", err)
|
|
||||||
return nil, "", gtserror.NewErrorInternalError(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Clean up the draft
|
|
||||||
// before returning.
|
|
||||||
deleteDraft()
|
|
||||||
|
|
||||||
apiPerm, errWithCode := p.apiDomainPerm(ctx, existing, false)
|
|
||||||
return apiPerm, "", errWithCode
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Domain permission exists but we should overwrite
|
||||||
|
// it by just updating the existing domain permission.
|
||||||
|
// Domain can't change, so no need to re-run side effects.
|
||||||
|
existing.SetCreatedByAccountID(permDraft.CreatedByAccountID)
|
||||||
|
existing.SetCreatedByAccount(permDraft.CreatedByAccount)
|
||||||
|
existing.SetPrivateComment(permDraft.PrivateComment)
|
||||||
|
existing.SetPublicComment(permDraft.PublicComment)
|
||||||
|
existing.SetObfuscate(permDraft.Obfuscate)
|
||||||
|
existing.SetSubscriptionID(permDraft.SubscriptionID)
|
||||||
|
|
||||||
|
switch dp := existing.(type) {
|
||||||
|
case *gtsmodel.DomainBlock:
|
||||||
|
err = p.state.DB.UpdateDomainBlock(ctx, dp)
|
||||||
|
|
||||||
|
case *gtsmodel.DomainAllow:
|
||||||
|
err = p.state.DB.UpdateDomainAllow(ctx, dp)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
err := gtserror.Newf("db error updating existing domain permission: %w", err)
|
||||||
|
return nil, "", gtserror.NewErrorInternalError(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Clean up the draft
|
||||||
|
// before returning.
|
||||||
|
deleteDraft()
|
||||||
|
|
||||||
|
apiPerm, errWithCode := p.apiDomainPerm(ctx, existing, false)
|
||||||
|
return apiPerm, "", errWithCode
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *Processor) DomainPermissionDraftRemove(
|
func (p *Processor) DomainPermissionDraftRemove(
|
||||||
|
|
|
@ -34,6 +34,7 @@ EXPECT=$(cat << "EOF"
|
||||||
"client-mem-ratio": 0.1,
|
"client-mem-ratio": 0.1,
|
||||||
"conversation-last-status-ids-mem-ratio": 2,
|
"conversation-last-status-ids-mem-ratio": 2,
|
||||||
"conversation-mem-ratio": 1,
|
"conversation-mem-ratio": 1,
|
||||||
|
"domain-permission-draft-mem-ratio": 0.5,
|
||||||
"emoji-category-mem-ratio": 0.1,
|
"emoji-category-mem-ratio": 0.1,
|
||||||
"emoji-mem-ratio": 3,
|
"emoji-mem-ratio": 3,
|
||||||
"filter-keyword-mem-ratio": 0.5,
|
"filter-keyword-mem-ratio": 0.5,
|
||||||
|
|
|
@ -30,8 +30,6 @@ import MutationButton from "../../../../components/form/mutation-button";
|
||||||
export default function DomainPermissionExcludeDetail() {
|
export default function DomainPermissionExcludeDetail() {
|
||||||
const baseUrl = useBaseUrl();
|
const baseUrl = useBaseUrl();
|
||||||
const backLocation: string = history.state?.backLocation ?? `~${baseUrl}`;
|
const backLocation: string = history.state?.backLocation ?? `~${baseUrl}`;
|
||||||
const [_location, setLocation] = useLocation();
|
|
||||||
const [ deleteExclude, deleteResult ] = useDeleteDomainPermissionExcludeMutation();
|
|
||||||
|
|
||||||
const params = useParams();
|
const params = useParams();
|
||||||
let id = params.excludeId as string | undefined;
|
let id = params.excludeId as string | undefined;
|
||||||
|
@ -86,25 +84,36 @@ export default function DomainPermissionExcludeDetail() {
|
||||||
<dd>{privateComment}</dd>
|
<dd>{privateComment}</dd>
|
||||||
</div>
|
</div>
|
||||||
</dl>
|
</dl>
|
||||||
<MutationButton
|
<HandleExclude
|
||||||
label={`Delete exclude`}
|
id={id}
|
||||||
title={`Delete exclude`}
|
backLocation={backLocation}
|
||||||
type="button"
|
|
||||||
className="button danger"
|
|
||||||
onClick={(e) => {
|
|
||||||
e.preventDefault();
|
|
||||||
e.stopPropagation();
|
|
||||||
deleteExclude(id).then(res => {
|
|
||||||
if ("data" in res) {
|
|
||||||
setLocation(backLocation);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}}
|
|
||||||
disabled={false}
|
|
||||||
showError={true}
|
|
||||||
result={deleteResult}
|
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function HandleExclude({ id, backLocation}: {id: string, backLocation: string}) {
|
||||||
|
const [_location, setLocation] = useLocation();
|
||||||
|
const [ deleteExclude, deleteResult ] = useDeleteDomainPermissionExcludeMutation();
|
||||||
|
|
||||||
|
return (
|
||||||
|
<MutationButton
|
||||||
|
label={`Delete exclude`}
|
||||||
|
title={`Delete exclude`}
|
||||||
|
type="button"
|
||||||
|
className="button danger"
|
||||||
|
onClick={(e) => {
|
||||||
|
e.preventDefault();
|
||||||
|
e.stopPropagation();
|
||||||
|
deleteExclude(id).then(res => {
|
||||||
|
if ("data" in res) {
|
||||||
|
setLocation(backLocation);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}}
|
||||||
|
disabled={false}
|
||||||
|
showError={true}
|
||||||
|
result={deleteResult}
|
||||||
|
/>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue