Compare commits
183 commits
quote-url-
...
v2
Author | SHA1 | Date | |
---|---|---|---|
|
507e243841 | ||
|
9c8693ea55 | ||
|
febd8c3d26 | ||
|
a5290af5c8 | ||
|
2cec800332 | ||
|
3c07494809 | ||
|
2433fa01cd | ||
|
3169890a39 | ||
|
4e1bb330aa | ||
|
625f399309 | ||
|
2bd6c98538 | ||
|
f13376de84 | ||
|
c97070e3d8 | ||
|
c1692a296d | ||
|
ce6f9238f3 | ||
|
3f129855d1 | ||
|
3fc567861b | ||
|
7b784e3011 | ||
|
5d1ae0c9cd | ||
|
88dd2443d7 | ||
|
4045902068 | ||
|
20109b45da | ||
|
94d14fbef3 | ||
|
f34e0b376b | ||
|
51c596dd1d | ||
|
dfc7ab0470 | ||
|
5d35d5c0a0 | ||
|
17921c1097 | ||
|
24147aedef | ||
|
673baf0d7f | ||
|
9c65919070 | ||
|
c506299089 | ||
|
adbdf6f320 | ||
|
f34bce180c | ||
|
0b86df413a | ||
|
ed214cf0e7 | ||
|
3fb36d6119 | ||
|
1de108b019 | ||
|
7b506f2519 | ||
|
5cf54c2782 | ||
|
db6016394b | ||
|
573a76c0c5 | ||
|
3097dbebe9 | ||
|
e378ec94e0 | ||
|
15dd7e184b | ||
|
22410862f3 | ||
|
7621a19489 | ||
|
cad78fe5e8 | ||
|
6a47b6cf4c | ||
|
9d6ed4cd28 | ||
|
0f10bfddac | ||
|
26efd09304 | ||
|
f2e531cf1a | ||
|
5d95fd44ac | ||
|
a337b32bcd | ||
|
e8fcf5a9a2 | ||
|
7525744f82 | ||
|
7d3fc35a24 | ||
|
73dceee0f5 | ||
|
34c7cdb5fb | ||
|
0527e34476 | ||
|
a82f619e89 | ||
|
a68b3e7318 | ||
|
436d5ccf1b | ||
|
a273f26549 | ||
|
9d357446d2 | ||
|
6cabff21db | ||
|
5df4d420de | ||
|
68884d9afa | ||
|
46a592b11e | ||
|
5f0b8f5dfd | ||
|
5adb2bca9a | ||
|
08cc74d928 | ||
|
578581b4dc | ||
|
ec36272bb4 | ||
|
e30e0de10e | ||
|
e672d9b9f0 | ||
|
dcd44ec3b6 | ||
|
71a4ea2425 | ||
|
441e3d90b1 | ||
|
d9b9f596d3 | ||
|
2cc4eda143 | ||
|
bd065446bf | ||
|
8475f5bccd | ||
|
a435cd33c9 | ||
|
d692ec060f | ||
|
4c6eb51ae2 | ||
|
d36102255f | ||
|
cdbc545d5e | ||
|
fbc46e0517 | ||
|
ef4608f348 | ||
|
4638b98fa8 | ||
|
a9f41d6be7 | ||
|
59dfc3d128 | ||
|
822280c280 | ||
|
c83dd30f41 | ||
|
9d312bc229 | ||
|
b37b77ad34 | ||
|
9ee3f3b971 | ||
|
066f5ec900 | ||
|
a2254f2674 | ||
|
2151733e4f | ||
|
3cff4e4507 | ||
|
120f92a9ed | ||
|
ae8029cd22 | ||
|
434fd98cd9 | ||
|
89c90fba56 | ||
|
e29fe0a079 | ||
|
c5aee435f4 | ||
|
224f5d3f55 | ||
|
6583feb87d | ||
|
04e75c78e0 | ||
|
68c27e083f | ||
|
d52528584a | ||
|
d352dc104a | ||
|
0c5ce67d4e | ||
|
9db7bdf0fb | ||
|
793a939046 | ||
|
c3eb44add7 | ||
|
9b75020c91 | ||
|
36a1a6bd9c | ||
|
164cd9bd00 | ||
|
698a2bae11 | ||
|
4613997fe3 | ||
|
4c995957a6 | ||
|
5c98b8dbfb | ||
|
48d5914851 | ||
|
8f00e522d7 | ||
|
62c9327500 | ||
|
a339ff93b1 | ||
|
afd253a1b4 | ||
|
509e10e79b | ||
|
d96ec913d4 | ||
|
5b505b0e37 | ||
|
530491ff10 | ||
|
48740ea8cb | ||
|
0d7c121781 | ||
|
a4cfd65009 | ||
|
540b9d1470 | ||
|
1c076049cf | ||
|
242bf7b515 | ||
|
2843155501 | ||
|
0badf0bc1f | ||
|
32692a7dcd | ||
|
817dd98c5c | ||
|
b6f0cd01d3 | ||
|
c985dd84c3 | ||
|
3d049da2e5 | ||
|
fd5293a05c | ||
|
3729500e3e | ||
|
2853bf2a28 | ||
|
0144a1c0d4 | ||
|
d93bcf6128 | ||
|
647add2bab | ||
|
f50a233ce9 | ||
|
d909bf93a0 | ||
|
8e7fbcc501 | ||
|
7a665df2b5 | ||
|
b5b56e9ed5 | ||
|
9a36b0edf5 | ||
|
20f996d165 | ||
|
602da69083 | ||
|
f6cfe06f66 | ||
|
c8a9793638 | ||
|
5eaa0f291b | ||
|
881d0ad899 | ||
|
5a20b9d23a | ||
|
919a61f75d | ||
|
7faa4655f8 | ||
|
cf6a891349 | ||
|
58b383ba4e | ||
|
57fc5ef913 | ||
|
5348398b23 | ||
|
572a84b4bd | ||
|
992cd55d7b | ||
|
6216b316e8 | ||
|
96eae971b8 | ||
|
928bdafeea | ||
|
dc89aeb70b | ||
|
25d3daa6d2 | ||
|
715df3c563 | ||
|
cb5d21baeb | ||
|
8d0b5d1114 |
80 changed files with 5948 additions and 2420 deletions
14
.drone.yml
Normal file
14
.drone.yml
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
kind: pipeline
|
||||||
|
name: default
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: build and publish
|
||||||
|
image: plugins/docker
|
||||||
|
pull: always
|
||||||
|
settings:
|
||||||
|
repo: askiiart/microblogpub
|
||||||
|
tags: latest
|
||||||
|
username:
|
||||||
|
from_secret: docker_username
|
||||||
|
password:
|
||||||
|
from_secret: docker_password
|
11
AUTHORS
Normal file
11
AUTHORS
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
Thomas Sileo <t@a4.io>
|
||||||
|
Kevin Wallace <doof@doof.net>
|
||||||
|
Miguel Jacq <mig@mig5.net>
|
||||||
|
Alexey Shpakovsky <alexey@shpakovsky.ru>
|
||||||
|
Josh Washburne <josh@jodh.us>
|
||||||
|
João Costa <jdpc557@gmail.com>
|
||||||
|
Sam <samr1.dev@pm.me>
|
||||||
|
Ash McAllan <acegiak@gmail.com>
|
||||||
|
Cassio Zen <cassio@hey.com>
|
||||||
|
Cocoa <momijizukamori@gmail.com>
|
||||||
|
Jane <jane@janeirl.dev>
|
|
@ -1,4 +1,4 @@
|
||||||
FROM python:3.10-slim as python-base
|
FROM python:3.11-slim as python-base
|
||||||
ENV PYTHONUNBUFFERED=1 \
|
ENV PYTHONUNBUFFERED=1 \
|
||||||
PYTHONDONTWRITEBYTECODE=1 \
|
PYTHONDONTWRITEBYTECODE=1 \
|
||||||
POETRY_HOME="/opt/poetry" \
|
POETRY_HOME="/opt/poetry" \
|
||||||
|
|
20
Makefile
20
Makefile
|
@ -12,32 +12,36 @@ config:
|
||||||
|
|
||||||
.PHONY: update
|
.PHONY: update
|
||||||
update:
|
update:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv update --no-update-deps
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv update --no-update-deps
|
||||||
|
|
||||||
.PHONY: prune-old-data
|
.PHONY: prune-old-data
|
||||||
prune-old-data:
|
prune-old-data:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv prune-old-data
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv prune-old-data
|
||||||
|
|
||||||
.PHONY: webfinger
|
.PHONY: webfinger
|
||||||
webfinger:
|
webfinger:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv webfinger $(account)
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv webfinger $(account)
|
||||||
|
|
||||||
.PHONY: move-to
|
.PHONY: move-to
|
||||||
move-to:
|
move-to:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv move-to $(account)
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv move-to $(account)
|
||||||
|
|
||||||
.PHONY: self-destruct
|
.PHONY: self-destruct
|
||||||
self-destruct:
|
self-destruct:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv self-destruct
|
-docker run --rm --it --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv self-destruct
|
||||||
|
|
||||||
.PHONY: reset-password
|
.PHONY: reset-password
|
||||||
reset-password:
|
reset-password:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv reset-password
|
-docker run --rm -it --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv reset-password
|
||||||
|
|
||||||
.PHONY: check-config
|
.PHONY: check-config
|
||||||
check-config:
|
check-config:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv check-config
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv check-config
|
||||||
|
|
||||||
.PHONY: compile-scss
|
.PHONY: compile-scss
|
||||||
compile-scss:
|
compile-scss:
|
||||||
-docker run --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv compile-scss
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv compile-scss
|
||||||
|
|
||||||
|
.PHONY: import-mastodon-following-accounts
|
||||||
|
import-mastodon-following-accounts:
|
||||||
|
-docker run --rm --volume `pwd`/data:/app/data --volume `pwd`/app/static:/app/app/static microblogpub/microblogpub inv import-mastodon-following-accounts $(path)
|
||||||
|
|
|
@ -10,6 +10,7 @@ Instances in the wild:
|
||||||
- [microblog.pub](https://microblog.pub/) (follow to get updated about the project)
|
- [microblog.pub](https://microblog.pub/) (follow to get updated about the project)
|
||||||
- [hexa.ninja](https://hexa.ninja) (theme customization example)
|
- [hexa.ninja](https://hexa.ninja) (theme customization example)
|
||||||
- [testing.microblog.pub](https://testing.microblog.pub/)
|
- [testing.microblog.pub](https://testing.microblog.pub/)
|
||||||
|
- [Irish Left Archive](https://posts.leftarchive.ie/) (another theme customization example)
|
||||||
|
|
||||||
There are still some rough edges, but the server is mostly functional.
|
There are still some rough edges, but the server is mostly functional.
|
||||||
|
|
||||||
|
@ -22,7 +23,7 @@ There are still some rough edges, but the server is mostly functional.
|
||||||
- Author notes in Markdown, with code highlighting support
|
- Author notes in Markdown, with code highlighting support
|
||||||
- Dedicated section for articles/blog posts (enabled when the first article is posted)
|
- Dedicated section for articles/blog posts (enabled when the first article is posted)
|
||||||
- Lightweight
|
- Lightweight
|
||||||
- Uses SQLite, and no external dependencies except Python 3.10+
|
- Uses SQLite, and Python 3.10+
|
||||||
- Can be deployed on small VPS
|
- Can be deployed on small VPS
|
||||||
- Privacy-aware
|
- Privacy-aware
|
||||||
- EXIF metadata (like GPS location) are stripped before storage
|
- EXIF metadata (like GPS location) are stripped before storage
|
||||||
|
@ -58,7 +59,7 @@ All the development takes place on [sourcehut](https://sr.ht/~tsileo/microblog.p
|
||||||
- [Issue tracker](https://todo.sr.ht/~tsileo/microblog.pub)
|
- [Issue tracker](https://todo.sr.ht/~tsileo/microblog.pub)
|
||||||
- [Mailing list](https://sr.ht/~tsileo/microblog.pub/lists)
|
- [Mailing list](https://sr.ht/~tsileo/microblog.pub/lists)
|
||||||
|
|
||||||
Contributions are welcomed, check out the [documentation](https://docs.microblog.pub) for more details.
|
Contributions are welcomed, check out the [contributing section of the documentation](https://docs.microblog.pub/developer_guide.html#contributing) for more details.
|
||||||
|
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
|
@ -0,0 +1,48 @@
|
||||||
|
"""Add a slug field for outbox objects
|
||||||
|
|
||||||
|
Revision ID: b28c0551c236
|
||||||
|
Revises: 604d125ea2fb
|
||||||
|
Create Date: 2022-10-30 14:09:14.540461+00:00
|
||||||
|
|
||||||
|
"""
|
||||||
|
import sqlalchemy as sa
|
||||||
|
from sqlalchemy import select
|
||||||
|
from sqlalchemy.orm.session import Session
|
||||||
|
|
||||||
|
from alembic import op
|
||||||
|
|
||||||
|
# revision identifiers, used by Alembic.
|
||||||
|
revision = 'b28c0551c236'
|
||||||
|
down_revision = '604d125ea2fb'
|
||||||
|
branch_labels = None
|
||||||
|
depends_on = None
|
||||||
|
|
||||||
|
|
||||||
|
def upgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('outbox', schema=None) as batch_op:
|
||||||
|
batch_op.add_column(sa.Column('slug', sa.String(), nullable=True))
|
||||||
|
batch_op.create_index(batch_op.f('ix_outbox_slug'), ['slug'], unique=False)
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
||||||
|
|
||||||
|
# Backfill the slug for existing articles
|
||||||
|
from app.models import OutboxObject
|
||||||
|
from app.utils.text import slugify
|
||||||
|
sess = Session(op.get_bind())
|
||||||
|
articles = sess.execute(select(OutboxObject).where(
|
||||||
|
OutboxObject.ap_type == "Article")
|
||||||
|
).scalars()
|
||||||
|
for article in articles:
|
||||||
|
title = article.ap_object["name"]
|
||||||
|
article.slug = slugify(title)
|
||||||
|
sess.commit()
|
||||||
|
|
||||||
|
|
||||||
|
def downgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('outbox', schema=None) as batch_op:
|
||||||
|
batch_op.drop_index(batch_op.f('ix_outbox_slug'))
|
||||||
|
batch_op.drop_column('slug')
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
|
@ -0,0 +1,32 @@
|
||||||
|
"""Add Webmention.webmention_type
|
||||||
|
|
||||||
|
Revision ID: fadfd359ce78
|
||||||
|
Revises: b28c0551c236
|
||||||
|
Create Date: 2022-11-16 19:42:56.925512+00:00
|
||||||
|
|
||||||
|
"""
|
||||||
|
import sqlalchemy as sa
|
||||||
|
|
||||||
|
from alembic import op
|
||||||
|
|
||||||
|
# revision identifiers, used by Alembic.
|
||||||
|
revision = 'fadfd359ce78'
|
||||||
|
down_revision = 'b28c0551c236'
|
||||||
|
branch_labels = None
|
||||||
|
depends_on = None
|
||||||
|
|
||||||
|
|
||||||
|
def upgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('webmention', schema=None) as batch_op:
|
||||||
|
batch_op.add_column(sa.Column('webmention_type', sa.Enum('UNKNOWN', 'LIKE', 'REPLY', 'REPOST', name='webmentiontype'), nullable=True))
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
||||||
|
|
||||||
|
|
||||||
|
def downgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('webmention', schema=None) as batch_op:
|
||||||
|
batch_op.drop_column('webmention_type')
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
|
@ -0,0 +1,32 @@
|
||||||
|
"""Add option to hide announces from actor
|
||||||
|
|
||||||
|
Revision ID: 9b404c47970a
|
||||||
|
Revises: fadfd359ce78
|
||||||
|
Create Date: 2022-12-12 19:26:36.912763+00:00
|
||||||
|
|
||||||
|
"""
|
||||||
|
import sqlalchemy as sa
|
||||||
|
|
||||||
|
from alembic import op
|
||||||
|
|
||||||
|
# revision identifiers, used by Alembic.
|
||||||
|
revision = '9b404c47970a'
|
||||||
|
down_revision = 'fadfd359ce78'
|
||||||
|
branch_labels = None
|
||||||
|
depends_on = None
|
||||||
|
|
||||||
|
|
||||||
|
def upgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('actor', schema=None) as batch_op:
|
||||||
|
batch_op.add_column(sa.Column('are_announces_hidden_from_stream', sa.Boolean(), server_default='0', nullable=False))
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
||||||
|
|
||||||
|
|
||||||
|
def downgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('actor', schema=None) as batch_op:
|
||||||
|
batch_op.drop_column('are_announces_hidden_from_stream')
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
|
@ -0,0 +1,48 @@
|
||||||
|
"""Add OAuth client
|
||||||
|
|
||||||
|
Revision ID: 4ab54becec04
|
||||||
|
Revises: 9b404c47970a
|
||||||
|
Create Date: 2022-12-16 17:30:54.520477+00:00
|
||||||
|
|
||||||
|
"""
|
||||||
|
import sqlalchemy as sa
|
||||||
|
|
||||||
|
from alembic import op
|
||||||
|
|
||||||
|
# revision identifiers, used by Alembic.
|
||||||
|
revision = '4ab54becec04'
|
||||||
|
down_revision = '9b404c47970a'
|
||||||
|
branch_labels = None
|
||||||
|
depends_on = None
|
||||||
|
|
||||||
|
|
||||||
|
def upgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
op.create_table('oauth_client',
|
||||||
|
sa.Column('id', sa.Integer(), nullable=False),
|
||||||
|
sa.Column('created_at', sa.DateTime(timezone=True), nullable=False),
|
||||||
|
sa.Column('client_name', sa.String(), nullable=False),
|
||||||
|
sa.Column('redirect_uris', sa.JSON(), nullable=True),
|
||||||
|
sa.Column('client_uri', sa.String(), nullable=True),
|
||||||
|
sa.Column('logo_uri', sa.String(), nullable=True),
|
||||||
|
sa.Column('scope', sa.String(), nullable=True),
|
||||||
|
sa.Column('client_id', sa.String(), nullable=False),
|
||||||
|
sa.Column('client_secret', sa.String(), nullable=False),
|
||||||
|
sa.PrimaryKeyConstraint('id'),
|
||||||
|
sa.UniqueConstraint('client_secret')
|
||||||
|
)
|
||||||
|
with op.batch_alter_table('oauth_client', schema=None) as batch_op:
|
||||||
|
batch_op.create_index(batch_op.f('ix_oauth_client_client_id'), ['client_id'], unique=True)
|
||||||
|
batch_op.create_index(batch_op.f('ix_oauth_client_id'), ['id'], unique=False)
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
||||||
|
|
||||||
|
|
||||||
|
def downgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('oauth_client', schema=None) as batch_op:
|
||||||
|
batch_op.drop_index(batch_op.f('ix_oauth_client_id'))
|
||||||
|
batch_op.drop_index(batch_op.f('ix_oauth_client_client_id'))
|
||||||
|
|
||||||
|
op.drop_table('oauth_client')
|
||||||
|
# ### end Alembic commands ###
|
|
@ -0,0 +1,36 @@
|
||||||
|
"""Add OAuth refresh token support
|
||||||
|
|
||||||
|
Revision ID: a209f0333f5a
|
||||||
|
Revises: 4ab54becec04
|
||||||
|
Create Date: 2022-12-18 11:26:31.976348+00:00
|
||||||
|
|
||||||
|
"""
|
||||||
|
import sqlalchemy as sa
|
||||||
|
|
||||||
|
from alembic import op
|
||||||
|
|
||||||
|
# revision identifiers, used by Alembic.
|
||||||
|
revision = 'a209f0333f5a'
|
||||||
|
down_revision = '4ab54becec04'
|
||||||
|
branch_labels = None
|
||||||
|
depends_on = None
|
||||||
|
|
||||||
|
|
||||||
|
def upgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('indieauth_access_token', schema=None) as batch_op:
|
||||||
|
batch_op.add_column(sa.Column('refresh_token', sa.String(), nullable=True))
|
||||||
|
batch_op.add_column(sa.Column('was_refreshed', sa.Boolean(), server_default='0', nullable=False))
|
||||||
|
batch_op.create_index(batch_op.f('ix_indieauth_access_token_refresh_token'), ['refresh_token'], unique=True)
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
||||||
|
|
||||||
|
|
||||||
|
def downgrade() -> None:
|
||||||
|
# ### commands auto generated by Alembic - please adjust! ###
|
||||||
|
with op.batch_alter_table('indieauth_access_token', schema=None) as batch_op:
|
||||||
|
batch_op.drop_index(batch_op.f('ix_indieauth_access_token_refresh_token'))
|
||||||
|
batch_op.drop_column('was_refreshed')
|
||||||
|
batch_op.drop_column('refresh_token')
|
||||||
|
|
||||||
|
# ### end Alembic commands ###
|
|
@ -6,7 +6,6 @@ from typing import Any
|
||||||
|
|
||||||
import httpx
|
import httpx
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
from markdown import markdown
|
|
||||||
|
|
||||||
from app import config
|
from app import config
|
||||||
from app.config import ALSO_KNOWN_AS
|
from app.config import ALSO_KNOWN_AS
|
||||||
|
@ -14,6 +13,7 @@ from app.config import AP_CONTENT_TYPE # noqa: F401
|
||||||
from app.config import MOVED_TO
|
from app.config import MOVED_TO
|
||||||
from app.httpsig import auth
|
from app.httpsig import auth
|
||||||
from app.key import get_pubkey_as_pem
|
from app.key import get_pubkey_as_pem
|
||||||
|
from app.source import dedup_tags
|
||||||
from app.source import hashtagify
|
from app.source import hashtagify
|
||||||
from app.utils.url import check_url
|
from app.utils.url import check_url
|
||||||
|
|
||||||
|
@ -53,15 +53,26 @@ AS_EXTENDED_CTX = [
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
class ObjectIsGoneError(Exception):
|
class FetchError(Exception):
|
||||||
|
def __init__(self, url: str, resp: httpx.Response | None = None) -> None:
|
||||||
|
resp_part = ""
|
||||||
|
if resp:
|
||||||
|
resp_part = f", got HTTP {resp.status_code}: {resp.text}"
|
||||||
|
message = f"Failed to fetch {url}{resp_part}"
|
||||||
|
super().__init__(message)
|
||||||
|
self.resp = resp
|
||||||
|
self.url = url
|
||||||
|
|
||||||
|
|
||||||
|
class ObjectIsGoneError(FetchError):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
class ObjectNotFoundError(Exception):
|
class ObjectNotFoundError(FetchError):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
class ObjectUnavailableError(Exception):
|
class ObjectUnavailableError(FetchError):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
@ -90,6 +101,19 @@ class VisibilityEnum(str, enum.Enum):
|
||||||
|
|
||||||
|
|
||||||
_LOCAL_ACTOR_SUMMARY, _LOCAL_ACTOR_TAGS = hashtagify(config.CONFIG.summary)
|
_LOCAL_ACTOR_SUMMARY, _LOCAL_ACTOR_TAGS = hashtagify(config.CONFIG.summary)
|
||||||
|
_LOCAL_ACTOR_METADATA = []
|
||||||
|
if config.CONFIG.metadata:
|
||||||
|
for kv in config.CONFIG.metadata:
|
||||||
|
kv_value, kv_tags = hashtagify(kv.value)
|
||||||
|
_LOCAL_ACTOR_METADATA.append(
|
||||||
|
{
|
||||||
|
"name": kv.key,
|
||||||
|
"type": "PropertyValue",
|
||||||
|
"value": kv_value,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
_LOCAL_ACTOR_TAGS.extend(kv_tags)
|
||||||
|
|
||||||
|
|
||||||
ME = {
|
ME = {
|
||||||
"@context": AS_EXTENDED_CTX,
|
"@context": AS_EXTENDED_CTX,
|
||||||
|
@ -102,7 +126,7 @@ ME = {
|
||||||
"outbox": config.BASE_URL + "/outbox",
|
"outbox": config.BASE_URL + "/outbox",
|
||||||
"preferredUsername": config.USERNAME,
|
"preferredUsername": config.USERNAME,
|
||||||
"name": config.CONFIG.name,
|
"name": config.CONFIG.name,
|
||||||
"summary": markdown(_LOCAL_ACTOR_SUMMARY, extensions=["mdx_linkify"]),
|
"summary": _LOCAL_ACTOR_SUMMARY,
|
||||||
"endpoints": {
|
"endpoints": {
|
||||||
# For compat with servers expecting a sharedInbox...
|
# For compat with servers expecting a sharedInbox...
|
||||||
"sharedInbox": config.BASE_URL
|
"sharedInbox": config.BASE_URL
|
||||||
|
@ -110,35 +134,35 @@ ME = {
|
||||||
},
|
},
|
||||||
"url": config.ID + "/", # XXX: the path is important for Mastodon compat
|
"url": config.ID + "/", # XXX: the path is important for Mastodon compat
|
||||||
"manuallyApprovesFollowers": config.CONFIG.manually_approves_followers,
|
"manuallyApprovesFollowers": config.CONFIG.manually_approves_followers,
|
||||||
"attachment": [
|
"attachment": _LOCAL_ACTOR_METADATA,
|
||||||
{
|
|
||||||
"name": kv.key,
|
|
||||||
"type": "PropertyValue",
|
|
||||||
"value": markdown(kv.value, extensions=["mdx_linkify", "fenced_code"]),
|
|
||||||
}
|
|
||||||
for kv in config.CONFIG.metadata
|
|
||||||
]
|
|
||||||
if config.CONFIG.metadata
|
|
||||||
else [],
|
|
||||||
"icon": {
|
|
||||||
"mediaType": mimetypes.guess_type(config.CONFIG.icon_url)[0],
|
|
||||||
"type": "Image",
|
|
||||||
"url": config.CONFIG.icon_url,
|
|
||||||
},
|
|
||||||
"publicKey": {
|
"publicKey": {
|
||||||
"id": f"{config.ID}#main-key",
|
"id": f"{config.ID}#main-key",
|
||||||
"owner": config.ID,
|
"owner": config.ID,
|
||||||
"publicKeyPem": get_pubkey_as_pem(config.KEY_PATH),
|
"publicKeyPem": get_pubkey_as_pem(config.KEY_PATH),
|
||||||
},
|
},
|
||||||
"tag": _LOCAL_ACTOR_TAGS,
|
"tag": dedup_tags(_LOCAL_ACTOR_TAGS),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if config.CONFIG.icon_url:
|
||||||
|
ME["icon"] = {
|
||||||
|
"mediaType": mimetypes.guess_type(config.CONFIG.icon_url)[0],
|
||||||
|
"type": "Image",
|
||||||
|
"url": config.CONFIG.icon_url,
|
||||||
|
}
|
||||||
|
|
||||||
if ALSO_KNOWN_AS:
|
if ALSO_KNOWN_AS:
|
||||||
ME["alsoKnownAs"] = [ALSO_KNOWN_AS]
|
ME["alsoKnownAs"] = [ALSO_KNOWN_AS]
|
||||||
|
|
||||||
if MOVED_TO:
|
if MOVED_TO:
|
||||||
ME["movedTo"] = MOVED_TO
|
ME["movedTo"] = MOVED_TO
|
||||||
|
|
||||||
|
if config.CONFIG.image_url:
|
||||||
|
ME["image"] = {
|
||||||
|
"mediaType": mimetypes.guess_type(config.CONFIG.image_url)[0],
|
||||||
|
"type": "Image",
|
||||||
|
"url": config.CONFIG.image_url,
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
class NotAnObjectError(Exception):
|
class NotAnObjectError(Exception):
|
||||||
def __init__(self, url: str, resp: httpx.Response | None = None) -> None:
|
def __init__(self, url: str, resp: httpx.Response | None = None) -> None:
|
||||||
|
@ -170,13 +194,17 @@ async def fetch(
|
||||||
|
|
||||||
# Special handling for deleted object
|
# Special handling for deleted object
|
||||||
if resp.status_code == 410:
|
if resp.status_code == 410:
|
||||||
raise ObjectIsGoneError(f"{url} is gone")
|
raise ObjectIsGoneError(url, resp)
|
||||||
elif resp.status_code in [401, 403]:
|
elif resp.status_code in [401, 403]:
|
||||||
raise ObjectUnavailableError(f"not allowed to fetch {url}")
|
raise ObjectUnavailableError(url, resp)
|
||||||
elif resp.status_code == 404:
|
elif resp.status_code == 404:
|
||||||
raise ObjectNotFoundError(f"{url} not found")
|
raise ObjectNotFoundError(url, resp)
|
||||||
|
|
||||||
|
try:
|
||||||
|
resp.raise_for_status()
|
||||||
|
except httpx.HTTPError as http_error:
|
||||||
|
raise FetchError(url, resp) from http_error
|
||||||
|
|
||||||
resp.raise_for_status()
|
|
||||||
try:
|
try:
|
||||||
return resp.json()
|
return resp.json()
|
||||||
except json.JSONDecodeError:
|
except json.JSONDecodeError:
|
||||||
|
|
179
app/actor.py
179
app/actor.py
|
@ -1,17 +1,25 @@
|
||||||
import hashlib
|
import hashlib
|
||||||
import typing
|
import typing
|
||||||
from dataclasses import dataclass
|
from dataclasses import dataclass
|
||||||
|
from datetime import timedelta
|
||||||
from functools import cached_property
|
from functools import cached_property
|
||||||
from typing import Union
|
from typing import Union
|
||||||
from urllib.parse import urlparse
|
from urllib.parse import urlparse
|
||||||
|
|
||||||
|
import httpx
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
from sqlalchemy.orm import joinedload
|
from sqlalchemy.orm import joinedload
|
||||||
|
|
||||||
from app import activitypub as ap
|
from app import activitypub as ap
|
||||||
from app import media
|
from app import media
|
||||||
|
from app.config import BASE_URL
|
||||||
|
from app.config import USER_AGENT
|
||||||
|
from app.config import USERNAME
|
||||||
|
from app.config import WEBFINGER_DOMAIN
|
||||||
from app.database import AsyncSession
|
from app.database import AsyncSession
|
||||||
|
from app.utils.datetime import as_utc
|
||||||
|
from app.utils.datetime import now
|
||||||
|
|
||||||
if typing.TYPE_CHECKING:
|
if typing.TYPE_CHECKING:
|
||||||
from app.models import Actor as ActorModel
|
from app.models import Actor as ActorModel
|
||||||
|
@ -23,7 +31,38 @@ def _handle(raw_actor: ap.RawObject) -> str:
|
||||||
if not domain.hostname:
|
if not domain.hostname:
|
||||||
raise ValueError(f"Invalid actor ID {ap_id}")
|
raise ValueError(f"Invalid actor ID {ap_id}")
|
||||||
|
|
||||||
return f'@{raw_actor["preferredUsername"]}@{domain.hostname}' # type: ignore
|
handle = f'@{raw_actor["preferredUsername"]}@{domain.hostname}' # type: ignore
|
||||||
|
|
||||||
|
# TODO: cleanup this
|
||||||
|
# Next, check for custom webfinger domains
|
||||||
|
resp: httpx.Response | None = None
|
||||||
|
for url in {
|
||||||
|
f"https://{domain.hostname}/.well-known/webfinger",
|
||||||
|
f"http://{domain.hostname}/.well-known/webfinger",
|
||||||
|
}:
|
||||||
|
try:
|
||||||
|
logger.info(f"Webfinger {handle} at {url}")
|
||||||
|
resp = httpx.get(
|
||||||
|
url,
|
||||||
|
params={"resource": f"acct:{handle[1:]}"},
|
||||||
|
headers={
|
||||||
|
"User-Agent": USER_AGENT,
|
||||||
|
},
|
||||||
|
follow_redirects=True,
|
||||||
|
)
|
||||||
|
resp.raise_for_status()
|
||||||
|
break
|
||||||
|
except Exception:
|
||||||
|
logger.exception(f"Failed to webfinger {handle}")
|
||||||
|
|
||||||
|
if resp:
|
||||||
|
try:
|
||||||
|
json_resp = resp.json()
|
||||||
|
if json_resp.get("subject", "").startswith("acct:"):
|
||||||
|
return "@" + json_resp["subject"].removeprefix("acct:")
|
||||||
|
except Exception:
|
||||||
|
logger.exception(f"Failed to parse webfinger response for {handle}")
|
||||||
|
return handle
|
||||||
|
|
||||||
|
|
||||||
class Actor:
|
class Actor:
|
||||||
|
@ -57,7 +96,7 @@ class Actor:
|
||||||
return self.name
|
return self.name
|
||||||
return self.preferred_username
|
return self.preferred_username
|
||||||
|
|
||||||
@property
|
@cached_property
|
||||||
def handle(self) -> str:
|
def handle(self) -> str:
|
||||||
return _handle(self.ap_actor)
|
return _handle(self.ap_actor)
|
||||||
|
|
||||||
|
@ -79,11 +118,21 @@ class Actor:
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def icon_url(self) -> str | None:
|
def icon_url(self) -> str | None:
|
||||||
return self.ap_actor.get("icon", {}).get("url")
|
if icon := self.ap_actor.get("icon"):
|
||||||
|
return icon.get("url")
|
||||||
|
return None
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def icon_media_type(self) -> str | None:
|
def icon_media_type(self) -> str | None:
|
||||||
return self.ap_actor.get("icon", {}).get("mediaType")
|
if icon := self.ap_actor.get("icon"):
|
||||||
|
return icon.get("mediaType")
|
||||||
|
return None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def image_url(self) -> str | None:
|
||||||
|
if image := self.ap_actor.get("image"):
|
||||||
|
return image.get("url")
|
||||||
|
return None
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def public_key_as_pem(self) -> str:
|
def public_key_as_pem(self) -> str:
|
||||||
|
@ -98,14 +147,14 @@ class Actor:
|
||||||
if self.icon_url:
|
if self.icon_url:
|
||||||
return media.proxied_media_url(self.icon_url)
|
return media.proxied_media_url(self.icon_url)
|
||||||
else:
|
else:
|
||||||
return "/static/nopic.png"
|
return BASE_URL + "/static/nopic.png"
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def resized_icon_url(self) -> str:
|
def resized_icon_url(self) -> str:
|
||||||
if self.icon_url:
|
if self.icon_url:
|
||||||
return media.resized_media_url(self.icon_url, 50)
|
return media.resized_media_url(self.icon_url, 50)
|
||||||
else:
|
else:
|
||||||
return "/static/nopic.png"
|
return BASE_URL + "/static/nopic.png"
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def tags(self) -> list[ap.RawObject]:
|
def tags(self) -> list[ap.RawObject]:
|
||||||
|
@ -129,13 +178,18 @@ class Actor:
|
||||||
|
|
||||||
|
|
||||||
class RemoteActor(Actor):
|
class RemoteActor(Actor):
|
||||||
def __init__(self, ap_actor: ap.RawObject) -> None:
|
def __init__(self, ap_actor: ap.RawObject, handle: str | None = None) -> None:
|
||||||
if (ap_type := ap_actor.get("type")) not in ap.ACTOR_TYPES:
|
if (ap_type := ap_actor.get("type")) not in ap.ACTOR_TYPES:
|
||||||
raise ValueError(f"Unexpected actor type: {ap_type}")
|
raise ValueError(f"Unexpected actor type: {ap_type}")
|
||||||
|
|
||||||
self._ap_actor = ap_actor
|
self._ap_actor = ap_actor
|
||||||
self._ap_type = ap_type
|
self._ap_type = ap_type
|
||||||
|
|
||||||
|
if handle is None:
|
||||||
|
handle = _handle(ap_actor)
|
||||||
|
|
||||||
|
self._handle = handle
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def ap_actor(self) -> ap.RawObject:
|
def ap_actor(self) -> ap.RawObject:
|
||||||
return self._ap_actor
|
return self._ap_actor
|
||||||
|
@ -148,8 +202,12 @@ class RemoteActor(Actor):
|
||||||
def is_from_db(self) -> bool:
|
def is_from_db(self) -> bool:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
@property
|
||||||
|
def handle(self) -> str:
|
||||||
|
return self._handle
|
||||||
|
|
||||||
LOCAL_ACTOR = RemoteActor(ap_actor=ap.ME)
|
|
||||||
|
LOCAL_ACTOR = RemoteActor(ap_actor=ap.ME, handle=f"@{USERNAME}@{WEBFINGER_DOMAIN}")
|
||||||
|
|
||||||
|
|
||||||
async def save_actor(db_session: AsyncSession, ap_actor: ap.RawObject) -> "ActorModel":
|
async def save_actor(db_session: AsyncSession, ap_actor: ap.RawObject) -> "ActorModel":
|
||||||
|
@ -189,26 +247,64 @@ async def fetch_actor(
|
||||||
if existing_actor:
|
if existing_actor:
|
||||||
if existing_actor.is_deleted:
|
if existing_actor.is_deleted:
|
||||||
raise ap.ObjectNotFoundError(f"{actor_id} was deleted")
|
raise ap.ObjectNotFoundError(f"{actor_id} was deleted")
|
||||||
return existing_actor
|
|
||||||
else:
|
|
||||||
if save_if_not_found:
|
|
||||||
ap_actor = await ap.fetch(actor_id)
|
|
||||||
# Some softwares uses URL when we expect ID
|
|
||||||
if actor_id == ap_actor.get("url"):
|
|
||||||
# Which mean we may already have it in DB
|
|
||||||
existing_actor_by_url = (
|
|
||||||
await db_session.scalars(
|
|
||||||
select(models.Actor).where(
|
|
||||||
models.Actor.ap_id == ap.get_id(ap_actor),
|
|
||||||
)
|
|
||||||
)
|
|
||||||
).one_or_none()
|
|
||||||
if existing_actor_by_url:
|
|
||||||
return existing_actor_by_url
|
|
||||||
|
|
||||||
return await save_actor(db_session, ap_actor)
|
if now() - as_utc(existing_actor.updated_at) > timedelta(hours=24):
|
||||||
|
logger.info(
|
||||||
|
f"Refreshing {actor_id=} last updated {existing_actor.updated_at}"
|
||||||
|
)
|
||||||
|
try:
|
||||||
|
ap_actor = await ap.fetch(actor_id)
|
||||||
|
await update_actor_if_needed(
|
||||||
|
db_session,
|
||||||
|
existing_actor,
|
||||||
|
RemoteActor(ap_actor),
|
||||||
|
)
|
||||||
|
return existing_actor
|
||||||
|
except Exception:
|
||||||
|
logger.exception(f"Failed to refresh {actor_id}")
|
||||||
|
# If we fail to refresh the actor, return the cached one
|
||||||
|
return existing_actor
|
||||||
else:
|
else:
|
||||||
raise ap.ObjectNotFoundError
|
return existing_actor
|
||||||
|
|
||||||
|
if save_if_not_found:
|
||||||
|
ap_actor = await ap.fetch(actor_id)
|
||||||
|
# Some softwares uses URL when we expect ID or uses a different casing
|
||||||
|
# (like Birdsite LIVE) , which mean we may already have it in DB
|
||||||
|
existing_actor_by_url = (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.Actor).where(
|
||||||
|
models.Actor.ap_id == ap.get_id(ap_actor),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
).one_or_none()
|
||||||
|
if existing_actor_by_url:
|
||||||
|
# Update the actor as we had to fetch it anyway
|
||||||
|
await update_actor_if_needed(
|
||||||
|
db_session,
|
||||||
|
existing_actor_by_url,
|
||||||
|
RemoteActor(ap_actor),
|
||||||
|
)
|
||||||
|
return existing_actor_by_url
|
||||||
|
|
||||||
|
return await save_actor(db_session, ap_actor)
|
||||||
|
else:
|
||||||
|
raise ap.ObjectNotFoundError(actor_id)
|
||||||
|
|
||||||
|
|
||||||
|
async def update_actor_if_needed(
|
||||||
|
db_session: AsyncSession,
|
||||||
|
actor_in_db: "ActorModel",
|
||||||
|
ra: RemoteActor,
|
||||||
|
) -> None:
|
||||||
|
# Check if we actually need to udpte the actor in DB
|
||||||
|
if _actor_hash(ra) != _actor_hash(actor_in_db):
|
||||||
|
actor_in_db.ap_actor = ra.ap_actor
|
||||||
|
actor_in_db.handle = ra.handle
|
||||||
|
actor_in_db.ap_type = ra.ap_type
|
||||||
|
|
||||||
|
actor_in_db.updated_at = now()
|
||||||
|
await db_session.flush()
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
@dataclass
|
||||||
|
@ -217,9 +313,11 @@ class ActorMetadata:
|
||||||
is_following: bool
|
is_following: bool
|
||||||
is_follower: bool
|
is_follower: bool
|
||||||
is_follow_request_sent: bool
|
is_follow_request_sent: bool
|
||||||
|
is_follow_request_rejected: bool
|
||||||
outbox_follow_ap_id: str | None
|
outbox_follow_ap_id: str | None
|
||||||
inbox_follow_ap_id: str | None
|
inbox_follow_ap_id: str | None
|
||||||
moved_to: typing.Optional["ActorModel"]
|
moved_to: typing.Optional["ActorModel"]
|
||||||
|
has_blocked_local_actor: bool
|
||||||
|
|
||||||
|
|
||||||
ActorsMetadata = dict[str, ActorMetadata]
|
ActorsMetadata = dict[str, ActorMetadata]
|
||||||
|
@ -262,6 +360,26 @@ async def get_actors_metadata(
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
rejected_follow_requests = {
|
||||||
|
reject.activity_object_ap_id
|
||||||
|
for reject in await db_session.execute(
|
||||||
|
select(models.InboxObject.activity_object_ap_id).where(
|
||||||
|
models.InboxObject.ap_type == "Reject",
|
||||||
|
models.InboxObject.ap_actor_id.in_(ap_actor_ids),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
}
|
||||||
|
blocks = {
|
||||||
|
block.ap_actor_id
|
||||||
|
for block in await db_session.execute(
|
||||||
|
select(models.InboxObject.ap_actor_id).where(
|
||||||
|
models.InboxObject.ap_type == "Block",
|
||||||
|
models.InboxObject.undone_by_inbox_object_id.is_(None),
|
||||||
|
models.InboxObject.ap_actor_id.in_(ap_actor_ids),
|
||||||
|
)
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
idx: ActorsMetadata = {}
|
idx: ActorsMetadata = {}
|
||||||
for actor in actors:
|
for actor in actors:
|
||||||
if not actor.ap_id:
|
if not actor.ap_id:
|
||||||
|
@ -284,9 +402,15 @@ async def get_actors_metadata(
|
||||||
is_following=actor.ap_id in following,
|
is_following=actor.ap_id in following,
|
||||||
is_follower=actor.ap_id in followers,
|
is_follower=actor.ap_id in followers,
|
||||||
is_follow_request_sent=actor.ap_id in sent_follow_requests,
|
is_follow_request_sent=actor.ap_id in sent_follow_requests,
|
||||||
|
is_follow_request_rejected=bool(
|
||||||
|
sent_follow_requests[actor.ap_id] in rejected_follow_requests
|
||||||
|
)
|
||||||
|
if actor.ap_id in sent_follow_requests
|
||||||
|
else False,
|
||||||
outbox_follow_ap_id=sent_follow_requests.get(actor.ap_id),
|
outbox_follow_ap_id=sent_follow_requests.get(actor.ap_id),
|
||||||
inbox_follow_ap_id=followers.get(actor.ap_id),
|
inbox_follow_ap_id=followers.get(actor.ap_id),
|
||||||
moved_to=moved_to,
|
moved_to=moved_to,
|
||||||
|
has_blocked_local_actor=actor.ap_id in blocks,
|
||||||
)
|
)
|
||||||
return idx
|
return idx
|
||||||
|
|
||||||
|
@ -311,6 +435,9 @@ def _actor_hash(actor: Actor) -> bytes:
|
||||||
if actor.icon_url:
|
if actor.icon_url:
|
||||||
h.update(actor.icon_url.encode())
|
h.update(actor.icon_url.encode())
|
||||||
|
|
||||||
|
if actor.image_url:
|
||||||
|
h.update(actor.image_url.encode())
|
||||||
|
|
||||||
if actor.attachments:
|
if actor.attachments:
|
||||||
for a in actor.attachments:
|
for a in actor.attachments:
|
||||||
if a.get("type") != "PropertyValue":
|
if a.get("type") != "PropertyValue":
|
||||||
|
|
135
app/admin.py
135
app/admin.py
|
@ -1,4 +1,5 @@
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
|
from urllib.parse import quote
|
||||||
|
|
||||||
import httpx
|
import httpx
|
||||||
from fastapi import APIRouter
|
from fastapi import APIRouter
|
||||||
|
@ -11,6 +12,7 @@ from fastapi.exceptions import HTTPException
|
||||||
from fastapi.responses import RedirectResponse
|
from fastapi.responses import RedirectResponse
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
from sqlalchemy import and_
|
from sqlalchemy import and_
|
||||||
|
from sqlalchemy import delete
|
||||||
from sqlalchemy import func
|
from sqlalchemy import func
|
||||||
from sqlalchemy import or_
|
from sqlalchemy import or_
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
|
@ -25,8 +27,11 @@ from app.actor import fetch_actor
|
||||||
from app.actor import get_actors_metadata
|
from app.actor import get_actors_metadata
|
||||||
from app.boxes import get_inbox_object_by_ap_id
|
from app.boxes import get_inbox_object_by_ap_id
|
||||||
from app.boxes import get_outbox_object_by_ap_id
|
from app.boxes import get_outbox_object_by_ap_id
|
||||||
|
from app.boxes import send_block
|
||||||
from app.boxes import send_follow
|
from app.boxes import send_follow
|
||||||
|
from app.boxes import send_unblock
|
||||||
from app.config import EMOJIS
|
from app.config import EMOJIS
|
||||||
|
from app.config import SESSION_TIMEOUT
|
||||||
from app.config import generate_csrf_token
|
from app.config import generate_csrf_token
|
||||||
from app.config import session_serializer
|
from app.config import session_serializer
|
||||||
from app.config import verify_csrf_token
|
from app.config import verify_csrf_token
|
||||||
|
@ -55,18 +60,23 @@ async def user_session_or_redirect(
|
||||||
|
|
||||||
_RedirectToLoginPage = HTTPException(
|
_RedirectToLoginPage = HTTPException(
|
||||||
status_code=302,
|
status_code=302,
|
||||||
headers={"Location": request.url_for("login") + f"?redirect={redirect_url}"},
|
headers={
|
||||||
|
"Location": request.url_for("login") + f"?redirect={quote(redirect_url)}"
|
||||||
|
},
|
||||||
)
|
)
|
||||||
|
|
||||||
if not session:
|
if not session:
|
||||||
|
logger.info("No existing admin session")
|
||||||
raise _RedirectToLoginPage
|
raise _RedirectToLoginPage
|
||||||
|
|
||||||
try:
|
try:
|
||||||
loaded_session = session_serializer.loads(session, max_age=3600 * 12)
|
loaded_session = session_serializer.loads(session, max_age=SESSION_TIMEOUT)
|
||||||
except Exception:
|
except Exception:
|
||||||
|
logger.exception("Failed to validate admin session")
|
||||||
raise _RedirectToLoginPage
|
raise _RedirectToLoginPage
|
||||||
|
|
||||||
if not loaded_session.get("is_logged_in"):
|
if not loaded_session.get("is_logged_in"):
|
||||||
|
logger.info(f"Admin session invalidated: {loaded_session}")
|
||||||
raise _RedirectToLoginPage
|
raise _RedirectToLoginPage
|
||||||
|
|
||||||
return None
|
return None
|
||||||
|
@ -179,8 +189,11 @@ async def admin_new(
|
||||||
content += f"{in_reply_to_object.actor.handle} "
|
content += f"{in_reply_to_object.actor.handle} "
|
||||||
for tag in in_reply_to_object.tags:
|
for tag in in_reply_to_object.tags:
|
||||||
if tag.get("type") == "Mention" and tag["name"] != LOCAL_ACTOR.handle:
|
if tag.get("type") == "Mention" and tag["name"] != LOCAL_ACTOR.handle:
|
||||||
mentioned_actor = await fetch_actor(db_session, tag["href"])
|
try:
|
||||||
content += f"{mentioned_actor.handle} "
|
mentioned_actor = await fetch_actor(db_session, tag["href"])
|
||||||
|
content += f"{mentioned_actor.handle} "
|
||||||
|
except Exception:
|
||||||
|
logger.exception(f"Failed to lookup {mentioned_actor}")
|
||||||
|
|
||||||
# Copy the content warning if any
|
# Copy the content warning if any
|
||||||
if in_reply_to_object.summary:
|
if in_reply_to_object.summary:
|
||||||
|
@ -340,6 +353,7 @@ async def admin_inbox(
|
||||||
"Update",
|
"Update",
|
||||||
"Undo",
|
"Undo",
|
||||||
"Read",
|
"Read",
|
||||||
|
"Reject",
|
||||||
"Add",
|
"Add",
|
||||||
"Remove",
|
"Remove",
|
||||||
"EmojiReact",
|
"EmojiReact",
|
||||||
|
@ -436,6 +450,7 @@ async def admin_direct_messages(
|
||||||
models.InboxObject.ap_context.is_not(None),
|
models.InboxObject.ap_context.is_not(None),
|
||||||
# Skip transient object like poll relies
|
# Skip transient object like poll relies
|
||||||
models.InboxObject.is_transient.is_(False),
|
models.InboxObject.is_transient.is_(False),
|
||||||
|
models.InboxObject.is_deleted.is_(False),
|
||||||
)
|
)
|
||||||
.group_by(models.InboxObject.ap_context, models.InboxObject.actor_id)
|
.group_by(models.InboxObject.ap_context, models.InboxObject.actor_id)
|
||||||
)
|
)
|
||||||
|
@ -458,6 +473,7 @@ async def admin_direct_messages(
|
||||||
models.OutboxObject.ap_context.is_not(None),
|
models.OutboxObject.ap_context.is_not(None),
|
||||||
# Skip transient object like poll relies
|
# Skip transient object like poll relies
|
||||||
models.OutboxObject.is_transient.is_(False),
|
models.OutboxObject.is_transient.is_(False),
|
||||||
|
models.OutboxObject.is_deleted.is_(False),
|
||||||
)
|
)
|
||||||
.group_by(models.OutboxObject.ap_context)
|
.group_by(models.OutboxObject.ap_context)
|
||||||
)
|
)
|
||||||
|
@ -713,13 +729,9 @@ async def get_notifications(
|
||||||
actors_metadata = await get_actors_metadata(
|
actors_metadata = await get_actors_metadata(
|
||||||
db_session, [notif.actor for notif in notifications if notif.actor]
|
db_session, [notif.actor for notif in notifications if notif.actor]
|
||||||
)
|
)
|
||||||
|
|
||||||
for notif in notifications:
|
|
||||||
notif.is_new = False
|
|
||||||
await db_session.commit()
|
|
||||||
|
|
||||||
more_unread_count = 0
|
more_unread_count = 0
|
||||||
next_cursor = None
|
next_cursor = None
|
||||||
|
|
||||||
if notifications and remaining_count > page_size:
|
if notifications and remaining_count > page_size:
|
||||||
decoded_next_cursor = notifications[-1].created_at
|
decoded_next_cursor = notifications[-1].created_at
|
||||||
next_cursor = pagination.encode_cursor(decoded_next_cursor)
|
next_cursor = pagination.encode_cursor(decoded_next_cursor)
|
||||||
|
@ -733,7 +745,8 @@ async def get_notifications(
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
|
||||||
return await templates.render_template(
|
# Render the template before we change the new flag on notifications
|
||||||
|
tpl_resp = await templates.render_template(
|
||||||
db_session,
|
db_session,
|
||||||
request,
|
request,
|
||||||
"notifications.html",
|
"notifications.html",
|
||||||
|
@ -745,6 +758,13 @@ async def get_notifications(
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
|
|
||||||
|
if len({notif.id for notif in notifications if notif.is_new}):
|
||||||
|
for notif in notifications:
|
||||||
|
notif.is_new = False
|
||||||
|
await db_session.commit()
|
||||||
|
|
||||||
|
return tpl_resp
|
||||||
|
|
||||||
|
|
||||||
@router.get("/object")
|
@router.get("/object")
|
||||||
async def admin_object(
|
async def admin_object(
|
||||||
|
@ -847,6 +867,66 @@ async def admin_profile(
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/actions/force_delete")
|
||||||
|
async def admin_actions_force_delete(
|
||||||
|
request: Request,
|
||||||
|
ap_object_id: str = Form(),
|
||||||
|
redirect_url: str = Form(),
|
||||||
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> RedirectResponse:
|
||||||
|
ap_object_to_delete = await get_inbox_object_by_ap_id(db_session, ap_object_id)
|
||||||
|
if not ap_object_to_delete:
|
||||||
|
raise ValueError(f"Cannot find {ap_object_id}")
|
||||||
|
|
||||||
|
logger.info(f"Deleting {ap_object_to_delete.ap_type}/{ap_object_to_delete.ap_id}")
|
||||||
|
await boxes._revert_side_effect_for_deleted_object(
|
||||||
|
db_session,
|
||||||
|
None,
|
||||||
|
ap_object_to_delete,
|
||||||
|
None,
|
||||||
|
)
|
||||||
|
ap_object_to_delete.is_deleted = True
|
||||||
|
await db_session.commit()
|
||||||
|
return RedirectResponse(redirect_url, status_code=302)
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/actions/force_delete_webmention")
|
||||||
|
async def admin_actions_force_delete_webmention(
|
||||||
|
request: Request,
|
||||||
|
webmention_id: int = Form(),
|
||||||
|
redirect_url: str = Form(),
|
||||||
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> RedirectResponse:
|
||||||
|
webmention = await boxes.get_webmention_by_id(db_session, webmention_id)
|
||||||
|
if not webmention:
|
||||||
|
raise ValueError(f"Cannot find {webmention_id}")
|
||||||
|
if not webmention.outbox_object:
|
||||||
|
raise ValueError(f"Missing related outbox object for {webmention_id}")
|
||||||
|
|
||||||
|
# TODO: move this
|
||||||
|
logger.info(f"Deleting {webmention_id}")
|
||||||
|
webmention.is_deleted = True
|
||||||
|
await db_session.flush()
|
||||||
|
from app.webmentions import _handle_webmention_side_effects
|
||||||
|
|
||||||
|
await _handle_webmention_side_effects(
|
||||||
|
db_session, webmention, webmention.outbox_object
|
||||||
|
)
|
||||||
|
# Delete related notifications
|
||||||
|
notif_deletion_result = await db_session.execute(
|
||||||
|
delete(models.Notification)
|
||||||
|
.where(models.Notification.webmention_id == webmention.id)
|
||||||
|
.execution_options(synchronize_session=False)
|
||||||
|
)
|
||||||
|
logger.info(
|
||||||
|
f"Deleted {notif_deletion_result.rowcount} notifications" # type: ignore
|
||||||
|
)
|
||||||
|
await db_session.commit()
|
||||||
|
return RedirectResponse(redirect_url, status_code=302)
|
||||||
|
|
||||||
|
|
||||||
@router.post("/actions/follow")
|
@router.post("/actions/follow")
|
||||||
async def admin_actions_follow(
|
async def admin_actions_follow(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
@ -868,10 +948,7 @@ async def admin_actions_block(
|
||||||
csrf_check: None = Depends(verify_csrf_token),
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
) -> RedirectResponse:
|
) -> RedirectResponse:
|
||||||
logger.info(f"Blocking {ap_actor_id}")
|
await send_block(db_session, ap_actor_id)
|
||||||
actor = await fetch_actor(db_session, ap_actor_id)
|
|
||||||
actor.is_blocked = True
|
|
||||||
await db_session.commit()
|
|
||||||
return RedirectResponse(redirect_url, status_code=302)
|
return RedirectResponse(redirect_url, status_code=302)
|
||||||
|
|
||||||
|
|
||||||
|
@ -884,8 +961,34 @@ async def admin_actions_unblock(
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
) -> RedirectResponse:
|
) -> RedirectResponse:
|
||||||
logger.info(f"Unblocking {ap_actor_id}")
|
logger.info(f"Unblocking {ap_actor_id}")
|
||||||
|
await send_unblock(db_session, ap_actor_id)
|
||||||
|
return RedirectResponse(redirect_url, status_code=302)
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/actions/hide_announces")
|
||||||
|
async def admin_actions_hide_announces(
|
||||||
|
request: Request,
|
||||||
|
ap_actor_id: str = Form(),
|
||||||
|
redirect_url: str = Form(),
|
||||||
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> RedirectResponse:
|
||||||
actor = await fetch_actor(db_session, ap_actor_id)
|
actor = await fetch_actor(db_session, ap_actor_id)
|
||||||
actor.is_blocked = False
|
actor.are_announces_hidden_from_stream = True
|
||||||
|
await db_session.commit()
|
||||||
|
return RedirectResponse(redirect_url, status_code=302)
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/actions/show_announces")
|
||||||
|
async def admin_actions_show_announces(
|
||||||
|
request: Request,
|
||||||
|
ap_actor_id: str = Form(),
|
||||||
|
redirect_url: str = Form(),
|
||||||
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> RedirectResponse:
|
||||||
|
actor = await fetch_actor(db_session, ap_actor_id)
|
||||||
|
actor.are_announces_hidden_from_stream = False
|
||||||
await db_session.commit()
|
await db_session.commit()
|
||||||
return RedirectResponse(redirect_url, status_code=302)
|
return RedirectResponse(redirect_url, status_code=302)
|
||||||
|
|
||||||
|
@ -1082,7 +1185,7 @@ async def admin_actions_new(
|
||||||
elif name:
|
elif name:
|
||||||
ap_type = "Article"
|
ap_type = "Article"
|
||||||
|
|
||||||
public_id = await boxes.send_create(
|
public_id, _ = await boxes.send_create(
|
||||||
db_session,
|
db_session,
|
||||||
ap_type=ap_type,
|
ap_type=ap_type,
|
||||||
source=content,
|
source=content,
|
||||||
|
|
|
@ -1,16 +1,18 @@
|
||||||
import hashlib
|
import hashlib
|
||||||
|
import mimetypes
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
from functools import cached_property
|
from functools import cached_property
|
||||||
from typing import Any
|
from typing import Any
|
||||||
|
|
||||||
import pydantic
|
import pydantic
|
||||||
from bs4 import BeautifulSoup # type: ignore
|
from bs4 import BeautifulSoup # type: ignore
|
||||||
from markdown import markdown
|
from mistletoe import markdown # type: ignore
|
||||||
|
|
||||||
from app import activitypub as ap
|
from app import activitypub as ap
|
||||||
from app.actor import LOCAL_ACTOR
|
from app.actor import LOCAL_ACTOR
|
||||||
from app.actor import Actor
|
from app.actor import Actor
|
||||||
from app.actor import RemoteActor
|
from app.actor import RemoteActor
|
||||||
|
from app.config import ID
|
||||||
from app.media import proxied_media_url
|
from app.media import proxied_media_url
|
||||||
from app.utils.datetime import now
|
from app.utils.datetime import now
|
||||||
from app.utils.datetime import parse_isoformat
|
from app.utils.datetime import parse_isoformat
|
||||||
|
@ -95,6 +97,9 @@ class Object:
|
||||||
def attachments(self) -> list["Attachment"]:
|
def attachments(self) -> list["Attachment"]:
|
||||||
attachments = []
|
attachments = []
|
||||||
for obj in ap.as_list(self.ap_object.get("attachment", [])):
|
for obj in ap.as_list(self.ap_object.get("attachment", [])):
|
||||||
|
if obj.get("type") == "PropertyValue":
|
||||||
|
continue
|
||||||
|
|
||||||
if obj.get("type") == "Link":
|
if obj.get("type") == "Link":
|
||||||
attachments.append(
|
attachments.append(
|
||||||
Attachment.parse_obj(
|
Attachment.parse_obj(
|
||||||
|
@ -155,7 +160,7 @@ class Object:
|
||||||
@cached_property
|
@cached_property
|
||||||
def url(self) -> str | None:
|
def url(self) -> str | None:
|
||||||
obj_url = self.ap_object.get("url")
|
obj_url = self.ap_object.get("url")
|
||||||
if isinstance(obj_url, str):
|
if isinstance(obj_url, str) and obj_url:
|
||||||
return obj_url
|
return obj_url
|
||||||
elif obj_url:
|
elif obj_url:
|
||||||
for u in ap.as_list(obj_url):
|
for u in ap.as_list(obj_url):
|
||||||
|
@ -175,7 +180,7 @@ class Object:
|
||||||
|
|
||||||
# PeerTube returns the content as markdown
|
# PeerTube returns the content as markdown
|
||||||
if self.ap_object.get("mediaType") == "text/markdown":
|
if self.ap_object.get("mediaType") == "text/markdown":
|
||||||
content = markdown(content, extensions=["mdx_linkify"])
|
content = markdown(content)
|
||||||
|
|
||||||
return content
|
return content
|
||||||
|
|
||||||
|
@ -208,6 +213,15 @@ class Object:
|
||||||
def in_reply_to(self) -> str | None:
|
def in_reply_to(self) -> str | None:
|
||||||
return self.ap_object.get("inReplyTo")
|
return self.ap_object.get("inReplyTo")
|
||||||
|
|
||||||
|
@property
|
||||||
|
def is_local_reply(self) -> bool:
|
||||||
|
if not self.in_reply_to:
|
||||||
|
return False
|
||||||
|
|
||||||
|
return bool(
|
||||||
|
self.in_reply_to.startswith(ID) and self.content # Hide votes from Question
|
||||||
|
)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def is_in_reply_to_from_inbox(self) -> bool | None:
|
def is_in_reply_to_from_inbox(self) -> bool | None:
|
||||||
if not self.in_reply_to:
|
if not self.in_reply_to:
|
||||||
|
@ -276,6 +290,20 @@ class Attachment(BaseModel):
|
||||||
proxied_url: str | None = None
|
proxied_url: str | None = None
|
||||||
resized_url: str | None = None
|
resized_url: str | None = None
|
||||||
|
|
||||||
|
width: int | None = None
|
||||||
|
height: int | None = None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def mimetype(self) -> str:
|
||||||
|
mimetype = self.media_type
|
||||||
|
if not mimetype:
|
||||||
|
mimetype, _ = mimetypes.guess_type(self.url)
|
||||||
|
|
||||||
|
if not mimetype:
|
||||||
|
return "unknown"
|
||||||
|
|
||||||
|
return mimetype.split("/")[-1]
|
||||||
|
|
||||||
|
|
||||||
class RemoteObject(Object):
|
class RemoteObject(Object):
|
||||||
def __init__(self, raw_object: ap.RawObject, actor: Actor):
|
def __init__(self, raw_object: ap.RawObject, actor: Actor):
|
||||||
|
|
615
app/boxes.py
615
app/boxes.py
File diff suppressed because it is too large
Load diff
|
@ -1,4 +1,5 @@
|
||||||
import hashlib
|
import hashlib
|
||||||
|
import hmac
|
||||||
import os
|
import os
|
||||||
import secrets
|
import secrets
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
|
@ -12,8 +13,11 @@ from fastapi import HTTPException
|
||||||
from fastapi import Request
|
from fastapi import Request
|
||||||
from itsdangerous import URLSafeTimedSerializer
|
from itsdangerous import URLSafeTimedSerializer
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
from markdown import markdown
|
from mistletoe import markdown # type: ignore
|
||||||
|
|
||||||
|
from app.customization import _CUSTOM_ROUTES
|
||||||
|
from app.customization import _StreamVisibilityCallback
|
||||||
|
from app.customization import default_stream_visibility_callback
|
||||||
from app.utils.emoji import _load_emojis
|
from app.utils.emoji import _load_emojis
|
||||||
from app.utils.version import get_version_commit
|
from app.utils.version import get_version_commit
|
||||||
|
|
||||||
|
@ -40,11 +44,14 @@ except FileNotFoundError:
|
||||||
JS_HASH = "none"
|
JS_HASH = "none"
|
||||||
try:
|
try:
|
||||||
# To keep things simple, we keep a single hash for the 2 files
|
# To keep things simple, we keep a single hash for the 2 files
|
||||||
js_data_common = (ROOT_DIR / "app" / "static" / "common-admin.js").read_bytes()
|
dat = b""
|
||||||
js_data_new = (ROOT_DIR / "app" / "static" / "new.js").read_bytes()
|
for j in [
|
||||||
JS_HASH = hashlib.md5(
|
ROOT_DIR / "app" / "static" / "common.js",
|
||||||
js_data_common + js_data_new, usedforsecurity=False
|
ROOT_DIR / "app" / "static" / "common-admin.js",
|
||||||
).hexdigest()
|
ROOT_DIR / "app" / "static" / "new.js",
|
||||||
|
]:
|
||||||
|
dat += j.read_bytes()
|
||||||
|
JS_HASH = hashlib.md5(dat, usedforsecurity=False).hexdigest()
|
||||||
except FileNotFoundError:
|
except FileNotFoundError:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
@ -89,7 +96,8 @@ class Config(pydantic.BaseModel):
|
||||||
name: str
|
name: str
|
||||||
summary: str
|
summary: str
|
||||||
https: bool
|
https: bool
|
||||||
icon_url: str
|
icon_url: str | None = None
|
||||||
|
image_url: str | None = None
|
||||||
secret: str
|
secret: str
|
||||||
debug: bool = False
|
debug: bool = False
|
||||||
trusted_hosts: list[str] = ["127.0.0.1"]
|
trusted_hosts: list[str] = ["127.0.0.1"]
|
||||||
|
@ -107,10 +115,22 @@ class Config(pydantic.BaseModel):
|
||||||
|
|
||||||
inbox_retention_days: int = 15
|
inbox_retention_days: int = 15
|
||||||
|
|
||||||
|
custom_content_security_policy: str | None = None
|
||||||
|
|
||||||
|
webfinger_domain: str | None = None
|
||||||
|
|
||||||
# Config items to make tests easier
|
# Config items to make tests easier
|
||||||
sqlalchemy_database: str | None = None
|
sqlalchemy_database: str | None = None
|
||||||
key_path: str | None = None
|
key_path: str | None = None
|
||||||
|
|
||||||
|
session_timeout: int = 3600 * 24 * 3 # in seconds, 3 days by default
|
||||||
|
csrf_token_exp: int = 3600
|
||||||
|
|
||||||
|
disabled_notifications: list[str] = []
|
||||||
|
|
||||||
|
# Only set when the app is served on a non-root path
|
||||||
|
id: str | None = None
|
||||||
|
|
||||||
|
|
||||||
def load_config() -> Config:
|
def load_config() -> Config:
|
||||||
try:
|
try:
|
||||||
|
@ -145,7 +165,16 @@ CONFIG = load_config()
|
||||||
DOMAIN = CONFIG.domain
|
DOMAIN = CONFIG.domain
|
||||||
_SCHEME = "https" if CONFIG.https else "http"
|
_SCHEME = "https" if CONFIG.https else "http"
|
||||||
ID = f"{_SCHEME}://{DOMAIN}"
|
ID = f"{_SCHEME}://{DOMAIN}"
|
||||||
|
|
||||||
|
# When running the app on a path, the ID maybe set by the config, but in this
|
||||||
|
# case, a valid webfinger must be served on the root domain
|
||||||
|
if CONFIG.id:
|
||||||
|
ID = CONFIG.id
|
||||||
USERNAME = CONFIG.username
|
USERNAME = CONFIG.username
|
||||||
|
|
||||||
|
# Allow to use @handle@webfinger-domain.tld while hosting the server at domain.tld
|
||||||
|
WEBFINGER_DOMAIN = CONFIG.webfinger_domain or DOMAIN
|
||||||
|
|
||||||
MANUALLY_APPROVES_FOLLOWERS = CONFIG.manually_approves_followers
|
MANUALLY_APPROVES_FOLLOWERS = CONFIG.manually_approves_followers
|
||||||
HIDES_FOLLOWERS = CONFIG.hides_followers
|
HIDES_FOLLOWERS = CONFIG.hides_followers
|
||||||
HIDES_FOLLOWING = CONFIG.hides_following
|
HIDES_FOLLOWING = CONFIG.hides_following
|
||||||
|
@ -155,12 +184,12 @@ if CONFIG.privacy_replace:
|
||||||
|
|
||||||
BLOCKED_SERVERS = {blocked_server.hostname for blocked_server in CONFIG.blocked_servers}
|
BLOCKED_SERVERS = {blocked_server.hostname for blocked_server in CONFIG.blocked_servers}
|
||||||
ALSO_KNOWN_AS = CONFIG.also_known_as
|
ALSO_KNOWN_AS = CONFIG.also_known_as
|
||||||
|
CUSTOM_CONTENT_SECURITY_POLICY = CONFIG.custom_content_security_policy
|
||||||
|
|
||||||
INBOX_RETENTION_DAYS = CONFIG.inbox_retention_days
|
INBOX_RETENTION_DAYS = CONFIG.inbox_retention_days
|
||||||
|
SESSION_TIMEOUT = CONFIG.session_timeout
|
||||||
CUSTOM_FOOTER = (
|
CUSTOM_FOOTER = (
|
||||||
markdown(
|
markdown(CONFIG.custom_footer.replace("{version}", VERSION))
|
||||||
CONFIG.custom_footer.replace("{version}", VERSION), extensions=["mdx_linkify"]
|
|
||||||
)
|
|
||||||
if CONFIG.custom_footer
|
if CONFIG.custom_footer
|
||||||
else None
|
else None
|
||||||
)
|
)
|
||||||
|
@ -177,7 +206,9 @@ if CONFIG.emoji:
|
||||||
EMOJIS = CONFIG.emoji
|
EMOJIS = CONFIG.emoji
|
||||||
|
|
||||||
# Emoji template for the FE
|
# Emoji template for the FE
|
||||||
EMOJI_TPL = '<img src="/static/twemoji/{filename}.svg" alt="{raw}" class="emoji">'
|
EMOJI_TPL = (
|
||||||
|
'<img src="{base_url}/static/twemoji/{filename}.svg" alt="{raw}" class="emoji">'
|
||||||
|
)
|
||||||
|
|
||||||
_load_emojis(ROOT_DIR, BASE_URL)
|
_load_emojis(ROOT_DIR, BASE_URL)
|
||||||
|
|
||||||
|
@ -186,6 +217,31 @@ CODE_HIGHLIGHTING_THEME = CONFIG.code_highlighting_theme
|
||||||
MOVED_TO = _get_moved_to()
|
MOVED_TO = _get_moved_to()
|
||||||
|
|
||||||
|
|
||||||
|
_NavBarItem = tuple[str, str]
|
||||||
|
|
||||||
|
|
||||||
|
class NavBarItems:
|
||||||
|
EXTRA_NAVBAR_ITEMS: list[_NavBarItem] = []
|
||||||
|
INDEX_NAVBAR_ITEM: _NavBarItem | None = None
|
||||||
|
NOTES_PATH = "/"
|
||||||
|
|
||||||
|
|
||||||
|
def load_custom_routes() -> None:
|
||||||
|
try:
|
||||||
|
from data import custom_routes # type: ignore # noqa: F401
|
||||||
|
except ImportError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
for path, custom_handler in _CUSTOM_ROUTES.items():
|
||||||
|
# If a handler wants to replace the root, move the index to /notes
|
||||||
|
if path == "/":
|
||||||
|
NavBarItems.NOTES_PATH = "/notes"
|
||||||
|
NavBarItems.INDEX_NAVBAR_ITEM = (path, custom_handler.title)
|
||||||
|
else:
|
||||||
|
if custom_handler.show_in_navbar:
|
||||||
|
NavBarItems.EXTRA_NAVBAR_ITEMS.append((path, custom_handler.title))
|
||||||
|
|
||||||
|
|
||||||
session_serializer = URLSafeTimedSerializer(
|
session_serializer = URLSafeTimedSerializer(
|
||||||
CONFIG.secret,
|
CONFIG.secret,
|
||||||
salt=f"{ID}.session",
|
salt=f"{ID}.session",
|
||||||
|
@ -208,7 +264,7 @@ def verify_csrf_token(
|
||||||
if redirect_url:
|
if redirect_url:
|
||||||
please_try_again = f'<a href="{redirect_url}">please try again</a>'
|
please_try_again = f'<a href="{redirect_url}">please try again</a>'
|
||||||
try:
|
try:
|
||||||
csrf_serializer.loads(csrf_token, max_age=1800)
|
csrf_serializer.loads(csrf_token, max_age=CONFIG.csrf_token_exp)
|
||||||
except (itsdangerous.BadData, itsdangerous.SignatureExpired):
|
except (itsdangerous.BadData, itsdangerous.SignatureExpired):
|
||||||
logger.exception("Failed to verify CSRF token")
|
logger.exception("Failed to verify CSRF token")
|
||||||
raise HTTPException(
|
raise HTTPException(
|
||||||
|
@ -216,3 +272,18 @@ def verify_csrf_token(
|
||||||
detail=f"The security token has expired, {please_try_again}",
|
detail=f"The security token has expired, {please_try_again}",
|
||||||
)
|
)
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
def hmac_sha256() -> hmac.HMAC:
|
||||||
|
return hmac.new(CONFIG.secret.encode(), digestmod=hashlib.sha256)
|
||||||
|
|
||||||
|
|
||||||
|
stream_visibility_callback: _StreamVisibilityCallback
|
||||||
|
try:
|
||||||
|
from data.stream import ( # type: ignore # noqa: F401, E501
|
||||||
|
custom_stream_visibility_callback,
|
||||||
|
)
|
||||||
|
|
||||||
|
stream_visibility_callback = custom_stream_visibility_callback
|
||||||
|
except ImportError:
|
||||||
|
stream_visibility_callback = default_stream_visibility_callback
|
||||||
|
|
155
app/customization.py
Normal file
155
app/customization.py
Normal file
|
@ -0,0 +1,155 @@
|
||||||
|
from dataclasses import dataclass
|
||||||
|
from pathlib import Path
|
||||||
|
from typing import TYPE_CHECKING
|
||||||
|
from typing import Any
|
||||||
|
from typing import Callable
|
||||||
|
|
||||||
|
from fastapi import APIRouter
|
||||||
|
from fastapi import Depends
|
||||||
|
from fastapi import Request
|
||||||
|
from loguru import logger
|
||||||
|
from starlette.responses import JSONResponse
|
||||||
|
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
from app.ap_object import RemoteObject
|
||||||
|
|
||||||
|
|
||||||
|
_DATA_DIR = Path().parent.resolve() / "data"
|
||||||
|
_Handler = Callable[..., Any]
|
||||||
|
|
||||||
|
|
||||||
|
class HTMLPage:
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
title: str,
|
||||||
|
html_file: str,
|
||||||
|
show_in_navbar: bool,
|
||||||
|
) -> None:
|
||||||
|
self.title = title
|
||||||
|
self.html_file = _DATA_DIR / html_file
|
||||||
|
self.show_in_navbar = show_in_navbar
|
||||||
|
|
||||||
|
|
||||||
|
class RawHandler:
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
title: str,
|
||||||
|
handler: Any,
|
||||||
|
show_in_navbar: bool,
|
||||||
|
) -> None:
|
||||||
|
self.title = title
|
||||||
|
self.handler = handler
|
||||||
|
self.show_in_navbar = show_in_navbar
|
||||||
|
|
||||||
|
|
||||||
|
_CUSTOM_ROUTES: dict[str, HTMLPage | RawHandler] = {}
|
||||||
|
|
||||||
|
|
||||||
|
def register_html_page(
|
||||||
|
path: str,
|
||||||
|
*,
|
||||||
|
title: str,
|
||||||
|
html_file: str,
|
||||||
|
show_in_navbar: bool = True,
|
||||||
|
) -> None:
|
||||||
|
if path in _CUSTOM_ROUTES:
|
||||||
|
raise ValueError(f"{path} is already registered")
|
||||||
|
|
||||||
|
_CUSTOM_ROUTES[path] = HTMLPage(title, html_file, show_in_navbar)
|
||||||
|
|
||||||
|
|
||||||
|
def register_raw_handler(
|
||||||
|
path: str,
|
||||||
|
*,
|
||||||
|
title: str,
|
||||||
|
handler: _Handler,
|
||||||
|
show_in_navbar: bool = True,
|
||||||
|
) -> None:
|
||||||
|
if path in _CUSTOM_ROUTES:
|
||||||
|
raise ValueError(f"{path} is already registered")
|
||||||
|
|
||||||
|
_CUSTOM_ROUTES[path] = RawHandler(title, handler, show_in_navbar)
|
||||||
|
|
||||||
|
|
||||||
|
class ActivityPubResponse(JSONResponse):
|
||||||
|
media_type = "application/activity+json"
|
||||||
|
|
||||||
|
|
||||||
|
def _custom_page_handler(path: str, html_page: HTMLPage) -> Any:
|
||||||
|
from app import templates
|
||||||
|
from app.actor import LOCAL_ACTOR
|
||||||
|
from app.config import is_activitypub_requested
|
||||||
|
from app.database import AsyncSession
|
||||||
|
from app.database import get_db_session
|
||||||
|
|
||||||
|
async def _handler(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> templates.TemplateResponse | ActivityPubResponse:
|
||||||
|
if path == "/" and is_activitypub_requested(request):
|
||||||
|
return ActivityPubResponse(LOCAL_ACTOR.ap_actor)
|
||||||
|
|
||||||
|
return await templates.render_template(
|
||||||
|
db_session,
|
||||||
|
request,
|
||||||
|
"custom_page.html",
|
||||||
|
{
|
||||||
|
"page_content": html_page.html_file.read_text(),
|
||||||
|
"title": html_page.title,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
return _handler
|
||||||
|
|
||||||
|
|
||||||
|
def get_custom_router() -> APIRouter | None:
|
||||||
|
if not _CUSTOM_ROUTES:
|
||||||
|
return None
|
||||||
|
|
||||||
|
router = APIRouter()
|
||||||
|
|
||||||
|
for path, handler in _CUSTOM_ROUTES.items():
|
||||||
|
if isinstance(handler, HTMLPage):
|
||||||
|
router.add_api_route(
|
||||||
|
path, _custom_page_handler(path, handler), methods=["GET"]
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
router.add_api_route(path, handler.handler)
|
||||||
|
|
||||||
|
return router
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class ObjectInfo:
|
||||||
|
# Is it a reply?
|
||||||
|
is_reply: bool
|
||||||
|
|
||||||
|
# Is it a reply to an outbox object
|
||||||
|
is_local_reply: bool
|
||||||
|
|
||||||
|
# Is the object mentioning the local actor
|
||||||
|
is_mention: bool
|
||||||
|
|
||||||
|
# Is it from someone the local actor is following
|
||||||
|
is_from_following: bool
|
||||||
|
|
||||||
|
# List of hashtags, e.g. #microblogpub
|
||||||
|
hashtags: list[str]
|
||||||
|
|
||||||
|
# @dev@microblog.pub
|
||||||
|
actor_handle: str
|
||||||
|
|
||||||
|
remote_object: "RemoteObject"
|
||||||
|
|
||||||
|
|
||||||
|
_StreamVisibilityCallback = Callable[[ObjectInfo], bool]
|
||||||
|
|
||||||
|
|
||||||
|
def default_stream_visibility_callback(object_info: ObjectInfo) -> bool:
|
||||||
|
result = (
|
||||||
|
(not object_info.is_reply and object_info.is_from_following)
|
||||||
|
or object_info.is_mention
|
||||||
|
or object_info.is_local_reply
|
||||||
|
)
|
||||||
|
logger.info(f"{object_info=}/{result=}")
|
||||||
|
return result
|
|
@ -1,5 +1,6 @@
|
||||||
import base64
|
import base64
|
||||||
import hashlib
|
import hashlib
|
||||||
|
import json
|
||||||
import typing
|
import typing
|
||||||
from dataclasses import dataclass
|
from dataclasses import dataclass
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
|
@ -22,12 +23,12 @@ from sqlalchemy import select
|
||||||
|
|
||||||
from app import activitypub as ap
|
from app import activitypub as ap
|
||||||
from app import config
|
from app import config
|
||||||
from app.config import BLOCKED_SERVERS
|
|
||||||
from app.config import KEY_PATH
|
from app.config import KEY_PATH
|
||||||
from app.database import AsyncSession
|
from app.database import AsyncSession
|
||||||
from app.database import get_db_session
|
from app.database import get_db_session
|
||||||
from app.key import Key
|
from app.key import Key
|
||||||
from app.utils.datetime import now
|
from app.utils.datetime import now
|
||||||
|
from app.utils.url import is_hostname_blocked
|
||||||
|
|
||||||
_KEY_CACHE: MutableMapping[str, Key] = LFUCache(256)
|
_KEY_CACHE: MutableMapping[str, Key] = LFUCache(256)
|
||||||
|
|
||||||
|
@ -88,8 +89,12 @@ def _body_digest(body: bytes) -> str:
|
||||||
return "SHA-256=" + base64.b64encode(h.digest()).decode("utf-8")
|
return "SHA-256=" + base64.b64encode(h.digest()).decode("utf-8")
|
||||||
|
|
||||||
|
|
||||||
async def _get_public_key(db_session: AsyncSession, key_id: str) -> Key:
|
async def _get_public_key(
|
||||||
if cached_key := _KEY_CACHE.get(key_id):
|
db_session: AsyncSession,
|
||||||
|
key_id: str,
|
||||||
|
should_skip_cache: bool = False,
|
||||||
|
) -> Key:
|
||||||
|
if not should_skip_cache and (cached_key := _KEY_CACHE.get(key_id)):
|
||||||
logger.info(f"Key {key_id} found in cache")
|
logger.info(f"Key {key_id} found in cache")
|
||||||
return cached_key
|
return cached_key
|
||||||
|
|
||||||
|
@ -101,15 +106,18 @@ async def _get_public_key(db_session: AsyncSession, key_id: str) -> Key:
|
||||||
select(models.Actor).where(models.Actor.ap_id == key_id.split("#")[0])
|
select(models.Actor).where(models.Actor.ap_id == key_id.split("#")[0])
|
||||||
)
|
)
|
||||||
).one_or_none()
|
).one_or_none()
|
||||||
if existing_actor and existing_actor.public_key_id == key_id:
|
if not should_skip_cache:
|
||||||
k = Key(existing_actor.ap_id, key_id)
|
if existing_actor and existing_actor.public_key_id == key_id:
|
||||||
k.load_pub(existing_actor.public_key_as_pem)
|
k = Key(existing_actor.ap_id, key_id)
|
||||||
logger.info(f"Found {key_id} on an existing actor")
|
k.load_pub(existing_actor.public_key_as_pem)
|
||||||
_KEY_CACHE[key_id] = k
|
logger.info(f"Found {key_id} on an existing actor")
|
||||||
return k
|
_KEY_CACHE[key_id] = k
|
||||||
|
return k
|
||||||
|
|
||||||
# Fetch it
|
# Fetch it
|
||||||
from app import activitypub as ap
|
from app import activitypub as ap
|
||||||
|
from app.actor import RemoteActor
|
||||||
|
from app.actor import update_actor_if_needed
|
||||||
|
|
||||||
# Without signing the request as if it's the first contact, the 2 servers
|
# Without signing the request as if it's the first contact, the 2 servers
|
||||||
# might race to fetch each other key
|
# might race to fetch each other key
|
||||||
|
@ -133,6 +141,12 @@ async def _get_public_key(db_session: AsyncSession, key_id: str) -> Key:
|
||||||
f"failed to fetch requested key {key_id}: got {actor['publicKey']}"
|
f"failed to fetch requested key {key_id}: got {actor['publicKey']}"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
if should_skip_cache and actor["type"] != "Key" and existing_actor:
|
||||||
|
# We had to skip the cache, which means the actor key probably changed
|
||||||
|
# and we want to update our cached version
|
||||||
|
await update_actor_if_needed(db_session, existing_actor, RemoteActor(actor))
|
||||||
|
await db_session.commit()
|
||||||
|
|
||||||
_KEY_CACHE[key_id] = k
|
_KEY_CACHE[key_id] = k
|
||||||
return k
|
return k
|
||||||
|
|
||||||
|
@ -170,7 +184,7 @@ async def httpsig_checker(
|
||||||
)
|
)
|
||||||
|
|
||||||
server = urlparse(key_id).hostname
|
server = urlparse(key_id).hostname
|
||||||
if server in BLOCKED_SERVERS:
|
if is_hostname_blocked(server):
|
||||||
return HTTPSigInfo(
|
return HTTPSigInfo(
|
||||||
has_valid_signature=False,
|
has_valid_signature=False,
|
||||||
server=server,
|
server=server,
|
||||||
|
@ -185,6 +199,32 @@ async def httpsig_checker(
|
||||||
server=server,
|
server=server,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
# Try to drop Delete activity spams early on, this prevent making an extra
|
||||||
|
# HTTP requests trying to fetch an unavailable actor to verify the HTTP sig
|
||||||
|
try:
|
||||||
|
if request.method == "POST" and request.url.path.endswith("/inbox"):
|
||||||
|
from app import models # TODO: solve this circular import
|
||||||
|
|
||||||
|
activity = json.loads(body)
|
||||||
|
actor_id = ap.get_id(activity["actor"])
|
||||||
|
if (
|
||||||
|
ap.as_list(activity["type"])[0] == "Delete"
|
||||||
|
and actor_id == ap.get_id(activity["object"])
|
||||||
|
and not (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.Actor).where(
|
||||||
|
models.Actor.ap_id == actor_id,
|
||||||
|
)
|
||||||
|
)
|
||||||
|
).one_or_none()
|
||||||
|
):
|
||||||
|
logger.info(f"Dropping Delete activity early for {body=}")
|
||||||
|
raise fastapi.HTTPException(status_code=202)
|
||||||
|
except fastapi.HTTPException as http_exc:
|
||||||
|
raise http_exc
|
||||||
|
except Exception:
|
||||||
|
logger.exception("Failed to check for Delete spam")
|
||||||
|
|
||||||
# logger.debug(f"hsig={hsig}")
|
# logger.debug(f"hsig={hsig}")
|
||||||
signed_string, signature_date = _build_signed_string(
|
signed_string, signature_date = _build_signed_string(
|
||||||
hsig["headers"],
|
hsig["headers"],
|
||||||
|
@ -216,7 +256,17 @@ async def httpsig_checker(
|
||||||
has_valid_signature = _verify_h(
|
has_valid_signature = _verify_h(
|
||||||
signed_string, base64.b64decode(hsig["signature"]), k.pubkey
|
signed_string, base64.b64decode(hsig["signature"]), k.pubkey
|
||||||
)
|
)
|
||||||
# FIXME: fetch/update the user if the signature is wrong
|
|
||||||
|
# If the signature is not valid, we may have to update the cached actor
|
||||||
|
if not has_valid_signature:
|
||||||
|
logger.info("Invalid signature, trying to refresh actor")
|
||||||
|
try:
|
||||||
|
k = await _get_public_key(db_session, hsig["keyId"], should_skip_cache=True)
|
||||||
|
has_valid_signature = _verify_h(
|
||||||
|
signed_string, base64.b64decode(hsig["signature"]), k.pubkey
|
||||||
|
)
|
||||||
|
except Exception:
|
||||||
|
logger.exception("Failed to refresh actor")
|
||||||
|
|
||||||
httpsig_info = HTTPSigInfo(
|
httpsig_info = HTTPSigInfo(
|
||||||
has_valid_signature=has_valid_signature,
|
has_valid_signature=has_valid_signature,
|
||||||
|
|
|
@ -3,7 +3,6 @@ import traceback
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
from datetime import timedelta
|
from datetime import timedelta
|
||||||
|
|
||||||
import httpx
|
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
from sqlalchemy import func
|
from sqlalchemy import func
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
|
@ -61,7 +60,7 @@ def _set_next_try(
|
||||||
if not outgoing_activity.tries:
|
if not outgoing_activity.tries:
|
||||||
raise ValueError("Should never happen")
|
raise ValueError("Should never happen")
|
||||||
|
|
||||||
if outgoing_activity.tries == _MAX_RETRIES:
|
if outgoing_activity.tries >= _MAX_RETRIES:
|
||||||
outgoing_activity.is_errored = True
|
outgoing_activity.is_errored = True
|
||||||
outgoing_activity.next_try = None
|
outgoing_activity.next_try = None
|
||||||
else:
|
else:
|
||||||
|
@ -108,6 +107,7 @@ async def process_next_incoming_activity(
|
||||||
|
|
||||||
next_activity.tries = next_activity.tries + 1
|
next_activity.tries = next_activity.tries + 1
|
||||||
next_activity.last_try = now()
|
next_activity.last_try = now()
|
||||||
|
await db_session.commit()
|
||||||
|
|
||||||
if next_activity.ap_object and next_activity.sent_by_ap_actor_id:
|
if next_activity.ap_object and next_activity.sent_by_ap_actor_id:
|
||||||
try:
|
try:
|
||||||
|
@ -120,13 +120,16 @@ async def process_next_incoming_activity(
|
||||||
),
|
),
|
||||||
timeout=60,
|
timeout=60,
|
||||||
)
|
)
|
||||||
except httpx.TimeoutException as exc:
|
except asyncio.exceptions.TimeoutError:
|
||||||
url = exc._request.url if exc._request else None
|
logger.error("Activity took too long to process")
|
||||||
logger.error(f"Failed, HTTP timeout when fetching {url}")
|
await db_session.rollback()
|
||||||
|
await db_session.refresh(next_activity)
|
||||||
next_activity.error = traceback.format_exc()
|
next_activity.error = traceback.format_exc()
|
||||||
_set_next_try(next_activity)
|
_set_next_try(next_activity)
|
||||||
except Exception:
|
except Exception:
|
||||||
logger.exception("Failed")
|
logger.exception("Failed")
|
||||||
|
await db_session.rollback()
|
||||||
|
await db_session.refresh(next_activity)
|
||||||
next_activity.error = traceback.format_exc()
|
next_activity.error = traceback.format_exc()
|
||||||
_set_next_try(next_activity)
|
_set_next_try(next_activity)
|
||||||
else:
|
else:
|
||||||
|
|
265
app/indieauth.py
265
app/indieauth.py
|
@ -10,9 +10,12 @@ from fastapi import Form
|
||||||
from fastapi import HTTPException
|
from fastapi import HTTPException
|
||||||
from fastapi import Request
|
from fastapi import Request
|
||||||
from fastapi.responses import JSONResponse
|
from fastapi.responses import JSONResponse
|
||||||
from fastapi.responses import RedirectResponse
|
from fastapi.security import HTTPBasic
|
||||||
|
from fastapi.security import HTTPBasicCredentials
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
|
from pydantic import BaseModel
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
|
from sqlalchemy.orm import joinedload
|
||||||
|
|
||||||
from app import config
|
from app import config
|
||||||
from app import models
|
from app import models
|
||||||
|
@ -21,9 +24,12 @@ from app.admin import user_session_or_redirect
|
||||||
from app.config import verify_csrf_token
|
from app.config import verify_csrf_token
|
||||||
from app.database import AsyncSession
|
from app.database import AsyncSession
|
||||||
from app.database import get_db_session
|
from app.database import get_db_session
|
||||||
|
from app.redirect import redirect
|
||||||
from app.utils import indieauth
|
from app.utils import indieauth
|
||||||
from app.utils.datetime import now
|
from app.utils.datetime import now
|
||||||
|
|
||||||
|
basic_auth = HTTPBasic()
|
||||||
|
|
||||||
router = APIRouter()
|
router = APIRouter()
|
||||||
|
|
||||||
|
|
||||||
|
@ -38,9 +44,55 @@ async def well_known_authorization_server(
|
||||||
"code_challenge_methods_supported": ["S256"],
|
"code_challenge_methods_supported": ["S256"],
|
||||||
"revocation_endpoint": request.url_for("indieauth_revocation_endpoint"),
|
"revocation_endpoint": request.url_for("indieauth_revocation_endpoint"),
|
||||||
"revocation_endpoint_auth_methods_supported": ["none"],
|
"revocation_endpoint_auth_methods_supported": ["none"],
|
||||||
|
"registration_endpoint": request.url_for("oauth_registration_endpoint"),
|
||||||
|
"introspection_endpoint": request.url_for("oauth_introspection_endpoint"),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
class OAuthRegisterClientRequest(BaseModel):
|
||||||
|
client_name: str
|
||||||
|
redirect_uris: list[str] | str
|
||||||
|
|
||||||
|
client_uri: str | None = None
|
||||||
|
logo_uri: str | None = None
|
||||||
|
scope: str | None = None
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/oauth/register")
|
||||||
|
async def oauth_registration_endpoint(
|
||||||
|
register_client_request: OAuthRegisterClientRequest,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> JSONResponse:
|
||||||
|
"""Implements OAuth 2.0 Dynamic Registration."""
|
||||||
|
|
||||||
|
client = models.OAuthClient(
|
||||||
|
client_name=register_client_request.client_name,
|
||||||
|
redirect_uris=[register_client_request.redirect_uris]
|
||||||
|
if isinstance(register_client_request.redirect_uris, str)
|
||||||
|
else register_client_request.redirect_uris,
|
||||||
|
client_uri=register_client_request.client_uri,
|
||||||
|
logo_uri=register_client_request.logo_uri,
|
||||||
|
scope=register_client_request.scope,
|
||||||
|
client_id=secrets.token_hex(16),
|
||||||
|
client_secret=secrets.token_hex(32),
|
||||||
|
)
|
||||||
|
|
||||||
|
db_session.add(client)
|
||||||
|
await db_session.commit()
|
||||||
|
|
||||||
|
return JSONResponse(
|
||||||
|
content={
|
||||||
|
**register_client_request.dict(),
|
||||||
|
"client_id_issued_at": int(client.created_at.timestamp()), # type: ignore
|
||||||
|
"grant_types": ["authorization_code", "refresh_token"],
|
||||||
|
"client_secret_expires_at": 0,
|
||||||
|
"client_id": client.client_id,
|
||||||
|
"client_secret": client.client_secret,
|
||||||
|
},
|
||||||
|
status_code=201,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
@router.get("/auth")
|
@router.get("/auth")
|
||||||
async def indieauth_authorization_endpoint(
|
async def indieauth_authorization_endpoint(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
@ -56,12 +108,29 @@ async def indieauth_authorization_endpoint(
|
||||||
code_challenge = request.query_params.get("code_challenge", "")
|
code_challenge = request.query_params.get("code_challenge", "")
|
||||||
code_challenge_method = request.query_params.get("code_challenge_method", "")
|
code_challenge_method = request.query_params.get("code_challenge_method", "")
|
||||||
|
|
||||||
|
# Check if the authorization request is coming from an OAuth client
|
||||||
|
registered_client = (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.OAuthClient).where(
|
||||||
|
models.OAuthClient.client_id == client_id,
|
||||||
|
)
|
||||||
|
)
|
||||||
|
).one_or_none()
|
||||||
|
if registered_client:
|
||||||
|
client = {
|
||||||
|
"name": registered_client.client_name,
|
||||||
|
"logo": registered_client.logo_uri,
|
||||||
|
"url": registered_client.client_uri,
|
||||||
|
}
|
||||||
|
else:
|
||||||
|
client = await indieauth.get_client_id_data(client_id) # type: ignore
|
||||||
|
|
||||||
return await templates.render_template(
|
return await templates.render_template(
|
||||||
db_session,
|
db_session,
|
||||||
request,
|
request,
|
||||||
"indieauth_flow.html",
|
"indieauth_flow.html",
|
||||||
dict(
|
dict(
|
||||||
client=await indieauth.get_client_id_data(client_id),
|
client=client,
|
||||||
scopes=scope,
|
scopes=scope,
|
||||||
redirect_uri=redirect_uri,
|
redirect_uri=redirect_uri,
|
||||||
state=state,
|
state=state,
|
||||||
|
@ -80,7 +149,7 @@ async def indieauth_flow(
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
csrf_check: None = Depends(verify_csrf_token),
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
_: None = Depends(user_session_or_redirect),
|
_: None = Depends(user_session_or_redirect),
|
||||||
) -> RedirectResponse:
|
) -> templates.TemplateResponse:
|
||||||
form_data = await request.form()
|
form_data = await request.form()
|
||||||
logger.info(f"{form_data=}")
|
logger.info(f"{form_data=}")
|
||||||
|
|
||||||
|
@ -114,9 +183,8 @@ async def indieauth_flow(
|
||||||
db_session.add(auth_request)
|
db_session.add(auth_request)
|
||||||
await db_session.commit()
|
await db_session.commit()
|
||||||
|
|
||||||
return RedirectResponse(
|
return await redirect(
|
||||||
redirect_uri + f"?code={code}&state={state}&iss={iss}",
|
request, db_session, redirect_uri + f"?code={code}&state={state}&iss={iss}"
|
||||||
status_code=302,
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -207,29 +275,54 @@ async def indieauth_token_endpoint(
|
||||||
form_data = await request.form()
|
form_data = await request.form()
|
||||||
logger.info(f"{form_data=}")
|
logger.info(f"{form_data=}")
|
||||||
grant_type = form_data.get("grant_type", "authorization_code")
|
grant_type = form_data.get("grant_type", "authorization_code")
|
||||||
if grant_type != "authorization_code":
|
if grant_type not in ["authorization_code", "refresh_token"]:
|
||||||
raise ValueError(f"Invalid grant_type {grant_type}")
|
raise ValueError(f"Invalid grant_type {grant_type}")
|
||||||
|
|
||||||
code = form_data["code"]
|
|
||||||
|
|
||||||
# These must match the params from the first request
|
# These must match the params from the first request
|
||||||
client_id = form_data["client_id"]
|
client_id = form_data["client_id"]
|
||||||
redirect_uri = form_data["redirect_uri"]
|
|
||||||
# code_verifier is optional for backward compat
|
|
||||||
code_verifier = form_data.get("code_verifier")
|
code_verifier = form_data.get("code_verifier")
|
||||||
|
|
||||||
is_code_valid, auth_code_request = await _check_auth_code(
|
if grant_type == "authorization_code":
|
||||||
db_session,
|
code = form_data["code"]
|
||||||
code=code,
|
redirect_uri = form_data["redirect_uri"]
|
||||||
client_id=client_id,
|
# code_verifier is optional for backward compat
|
||||||
redirect_uri=redirect_uri,
|
is_code_valid, auth_code_request = await _check_auth_code(
|
||||||
code_verifier=code_verifier,
|
db_session,
|
||||||
)
|
code=code,
|
||||||
if not is_code_valid or (auth_code_request and not auth_code_request.scope):
|
client_id=client_id,
|
||||||
return JSONResponse(
|
redirect_uri=redirect_uri,
|
||||||
content={"error": "invalid_grant"},
|
code_verifier=code_verifier,
|
||||||
status_code=400,
|
|
||||||
)
|
)
|
||||||
|
if not is_code_valid or (auth_code_request and not auth_code_request.scope):
|
||||||
|
return JSONResponse(
|
||||||
|
content={"error": "invalid_grant"},
|
||||||
|
status_code=400,
|
||||||
|
)
|
||||||
|
|
||||||
|
elif grant_type == "refresh_token":
|
||||||
|
refresh_token = form_data["refresh_token"]
|
||||||
|
access_token = (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.IndieAuthAccessToken)
|
||||||
|
.where(
|
||||||
|
models.IndieAuthAccessToken.refresh_token == refresh_token,
|
||||||
|
models.IndieAuthAccessToken.was_refreshed.is_(False),
|
||||||
|
)
|
||||||
|
.options(
|
||||||
|
joinedload(
|
||||||
|
models.IndieAuthAccessToken.indieauth_authorization_request
|
||||||
|
)
|
||||||
|
)
|
||||||
|
)
|
||||||
|
).one_or_none()
|
||||||
|
if not access_token:
|
||||||
|
raise ValueError("invalid refresh token")
|
||||||
|
|
||||||
|
if access_token.indieauth_authorization_request.client_id != client_id:
|
||||||
|
raise ValueError("invalid client ID")
|
||||||
|
|
||||||
|
auth_code_request = access_token.indieauth_authorization_request
|
||||||
|
access_token.was_refreshed = True
|
||||||
|
|
||||||
if not auth_code_request:
|
if not auth_code_request:
|
||||||
raise ValueError("Should never happen")
|
raise ValueError("Should never happen")
|
||||||
|
@ -237,6 +330,7 @@ async def indieauth_token_endpoint(
|
||||||
access_token = models.IndieAuthAccessToken(
|
access_token = models.IndieAuthAccessToken(
|
||||||
indieauth_authorization_request_id=auth_code_request.id,
|
indieauth_authorization_request_id=auth_code_request.id,
|
||||||
access_token=secrets.token_urlsafe(32),
|
access_token=secrets.token_urlsafe(32),
|
||||||
|
refresh_token=secrets.token_urlsafe(32),
|
||||||
expires_in=3600,
|
expires_in=3600,
|
||||||
scope=auth_code_request.scope,
|
scope=auth_code_request.scope,
|
||||||
)
|
)
|
||||||
|
@ -246,6 +340,7 @@ async def indieauth_token_endpoint(
|
||||||
return JSONResponse(
|
return JSONResponse(
|
||||||
content={
|
content={
|
||||||
"access_token": access_token.access_token,
|
"access_token": access_token.access_token,
|
||||||
|
"refresh_token": access_token.refresh_token,
|
||||||
"token_type": "Bearer",
|
"token_type": "Bearer",
|
||||||
"scope": auth_code_request.scope,
|
"scope": auth_code_request.scope,
|
||||||
"me": config.ID + "/",
|
"me": config.ID + "/",
|
||||||
|
@ -261,8 +356,10 @@ async def _check_access_token(
|
||||||
) -> tuple[bool, models.IndieAuthAccessToken | None]:
|
) -> tuple[bool, models.IndieAuthAccessToken | None]:
|
||||||
access_token_info = (
|
access_token_info = (
|
||||||
await db_session.scalars(
|
await db_session.scalars(
|
||||||
select(models.IndieAuthAccessToken).where(
|
select(models.IndieAuthAccessToken)
|
||||||
models.IndieAuthAccessToken.access_token == token
|
.where(models.IndieAuthAccessToken.access_token == token)
|
||||||
|
.options(
|
||||||
|
joinedload(models.IndieAuthAccessToken.indieauth_authorization_request)
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
).one_or_none()
|
).one_or_none()
|
||||||
|
@ -285,6 +382,9 @@ async def _check_access_token(
|
||||||
@dataclass(frozen=True)
|
@dataclass(frozen=True)
|
||||||
class AccessTokenInfo:
|
class AccessTokenInfo:
|
||||||
scopes: list[str]
|
scopes: list[str]
|
||||||
|
client_id: str | None
|
||||||
|
access_token: str
|
||||||
|
exp: int
|
||||||
|
|
||||||
|
|
||||||
async def verify_access_token(
|
async def verify_access_token(
|
||||||
|
@ -311,9 +411,71 @@ async def verify_access_token(
|
||||||
|
|
||||||
return AccessTokenInfo(
|
return AccessTokenInfo(
|
||||||
scopes=access_token.scope.split(),
|
scopes=access_token.scope.split(),
|
||||||
|
client_id=(
|
||||||
|
access_token.indieauth_authorization_request.client_id
|
||||||
|
if access_token.indieauth_authorization_request
|
||||||
|
else None
|
||||||
|
),
|
||||||
|
access_token=access_token.access_token,
|
||||||
|
exp=int(
|
||||||
|
(
|
||||||
|
access_token.created_at.replace(tzinfo=timezone.utc)
|
||||||
|
+ timedelta(seconds=access_token.expires_in)
|
||||||
|
).timestamp()
|
||||||
|
),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
async def check_access_token(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> AccessTokenInfo | None:
|
||||||
|
token = request.headers.get("Authorization", "").removeprefix("Bearer ")
|
||||||
|
if not token:
|
||||||
|
return None
|
||||||
|
|
||||||
|
is_token_valid, access_token = await _check_access_token(db_session, token)
|
||||||
|
if not is_token_valid:
|
||||||
|
return None
|
||||||
|
|
||||||
|
if not access_token or not access_token.scope:
|
||||||
|
raise ValueError("Should never happen")
|
||||||
|
|
||||||
|
access_token_info = AccessTokenInfo(
|
||||||
|
scopes=access_token.scope.split(),
|
||||||
|
client_id=(
|
||||||
|
access_token.indieauth_authorization_request.client_id
|
||||||
|
if access_token.indieauth_authorization_request
|
||||||
|
else None
|
||||||
|
),
|
||||||
|
access_token=access_token.access_token,
|
||||||
|
exp=int(
|
||||||
|
(
|
||||||
|
access_token.created_at.replace(tzinfo=timezone.utc)
|
||||||
|
+ timedelta(seconds=access_token.expires_in)
|
||||||
|
).timestamp()
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
logger.info(
|
||||||
|
"Authenticated with access token from client_id="
|
||||||
|
f"{access_token_info.client_id} scopes={access_token.scope}"
|
||||||
|
)
|
||||||
|
|
||||||
|
return access_token_info
|
||||||
|
|
||||||
|
|
||||||
|
async def enforce_access_token(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> AccessTokenInfo:
|
||||||
|
maybe_access_token_info = await check_access_token(request, db_session)
|
||||||
|
if not maybe_access_token_info:
|
||||||
|
raise HTTPException(status_code=401, detail="access token required")
|
||||||
|
|
||||||
|
return maybe_access_token_info
|
||||||
|
|
||||||
|
|
||||||
@router.post("/revoke_token")
|
@router.post("/revoke_token")
|
||||||
async def indieauth_revocation_endpoint(
|
async def indieauth_revocation_endpoint(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
@ -333,3 +495,58 @@ async def indieauth_revocation_endpoint(
|
||||||
content={},
|
content={},
|
||||||
status_code=200,
|
status_code=200,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@router.post("/token_introspection")
|
||||||
|
async def oauth_introspection_endpoint(
|
||||||
|
request: Request,
|
||||||
|
credentials: HTTPBasicCredentials = Depends(basic_auth),
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
token: str = Form(),
|
||||||
|
) -> JSONResponse:
|
||||||
|
registered_client = (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.OAuthClient).where(
|
||||||
|
models.OAuthClient.client_id == credentials.username,
|
||||||
|
models.OAuthClient.client_secret == credentials.password,
|
||||||
|
)
|
||||||
|
)
|
||||||
|
).one_or_none()
|
||||||
|
if not registered_client:
|
||||||
|
raise HTTPException(status_code=401, detail="unauthenticated")
|
||||||
|
|
||||||
|
access_token = (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.IndieAuthAccessToken)
|
||||||
|
.where(models.IndieAuthAccessToken.access_token == token)
|
||||||
|
.join(
|
||||||
|
models.IndieAuthAuthorizationRequest,
|
||||||
|
models.IndieAuthAccessToken.indieauth_authorization_request_id
|
||||||
|
== models.IndieAuthAuthorizationRequest.id,
|
||||||
|
)
|
||||||
|
.where(
|
||||||
|
models.IndieAuthAuthorizationRequest.client_id == credentials.username
|
||||||
|
)
|
||||||
|
)
|
||||||
|
).one_or_none()
|
||||||
|
if not access_token:
|
||||||
|
return JSONResponse(content={"active": False})
|
||||||
|
|
||||||
|
is_token_valid, _ = await _check_access_token(db_session, token)
|
||||||
|
if not is_token_valid:
|
||||||
|
return JSONResponse(content={"active": False})
|
||||||
|
|
||||||
|
return JSONResponse(
|
||||||
|
content={
|
||||||
|
"active": True,
|
||||||
|
"client_id": credentials.username,
|
||||||
|
"scope": access_token.scope,
|
||||||
|
"exp": int(
|
||||||
|
(
|
||||||
|
access_token.created_at.replace(tzinfo=timezone.utc)
|
||||||
|
+ timedelta(seconds=access_token.expires_in)
|
||||||
|
).timestamp()
|
||||||
|
),
|
||||||
|
},
|
||||||
|
status_code=200,
|
||||||
|
)
|
||||||
|
|
|
@ -23,6 +23,13 @@ requests_loader = pyld.documentloader.requests.requests_document_loader()
|
||||||
def _loader(url, options={}):
|
def _loader(url, options={}):
|
||||||
# See https://github.com/digitalbazaar/pyld/issues/133
|
# See https://github.com/digitalbazaar/pyld/issues/133
|
||||||
options["headers"]["Accept"] = "application/ld+json"
|
options["headers"]["Accept"] = "application/ld+json"
|
||||||
|
|
||||||
|
# XXX: temp fix/hack is it seems to be down for now
|
||||||
|
if url == "https://w3id.org/identity/v1":
|
||||||
|
url = (
|
||||||
|
"https://raw.githubusercontent.com/web-payments/web-payments.org"
|
||||||
|
"/master/contexts/identity-v1.jsonld"
|
||||||
|
)
|
||||||
return requests_loader(url, options)
|
return requests_loader(url, options)
|
||||||
|
|
||||||
|
|
||||||
|
@ -34,7 +41,7 @@ def _options_hash(doc: ap.RawObject) -> str:
|
||||||
for k in ["type", "id", "signatureValue"]:
|
for k in ["type", "id", "signatureValue"]:
|
||||||
if k in doc:
|
if k in doc:
|
||||||
del doc[k]
|
del doc[k]
|
||||||
doc["@context"] = "https://w3id.org/identity/v1"
|
doc["@context"] = "https://w3id.org/security/v1"
|
||||||
normalized = jsonld.normalize(
|
normalized = jsonld.normalize(
|
||||||
doc, {"algorithm": "URDNA2015", "format": "application/nquads"}
|
doc, {"algorithm": "URDNA2015", "format": "application/nquads"}
|
||||||
)
|
)
|
||||||
|
|
628
app/main.py
628
app/main.py
|
@ -48,6 +48,7 @@ from app import boxes
|
||||||
from app import config
|
from app import config
|
||||||
from app import httpsig
|
from app import httpsig
|
||||||
from app import indieauth
|
from app import indieauth
|
||||||
|
from app import media
|
||||||
from app import micropub
|
from app import micropub
|
||||||
from app import models
|
from app import models
|
||||||
from app import templates
|
from app import templates
|
||||||
|
@ -61,8 +62,10 @@ from app.config import DOMAIN
|
||||||
from app.config import ID
|
from app.config import ID
|
||||||
from app.config import USER_AGENT
|
from app.config import USER_AGENT
|
||||||
from app.config import USERNAME
|
from app.config import USERNAME
|
||||||
|
from app.config import WEBFINGER_DOMAIN
|
||||||
from app.config import is_activitypub_requested
|
from app.config import is_activitypub_requested
|
||||||
from app.config import verify_csrf_token
|
from app.config import verify_csrf_token
|
||||||
|
from app.customization import get_custom_router
|
||||||
from app.database import AsyncSession
|
from app.database import AsyncSession
|
||||||
from app.database import async_session
|
from app.database import async_session
|
||||||
from app.database import get_db_session
|
from app.database import get_db_session
|
||||||
|
@ -71,12 +74,15 @@ from app.templates import is_current_user_admin
|
||||||
from app.uploads import UPLOAD_DIR
|
from app.uploads import UPLOAD_DIR
|
||||||
from app.utils import pagination
|
from app.utils import pagination
|
||||||
from app.utils.emoji import EMOJIS_BY_NAME
|
from app.utils.emoji import EMOJIS_BY_NAME
|
||||||
|
from app.utils.facepile import Face
|
||||||
|
from app.utils.facepile import WebmentionReply
|
||||||
|
from app.utils.facepile import merge_faces
|
||||||
from app.utils.highlight import HIGHLIGHT_CSS_HASH
|
from app.utils.highlight import HIGHLIGHT_CSS_HASH
|
||||||
from app.utils.url import check_url
|
from app.utils.url import check_url
|
||||||
from app.webfinger import get_remote_follow_template
|
from app.webfinger import get_remote_follow_template
|
||||||
|
|
||||||
# Only images <1MB will be cached, so 64MB of data will be cached
|
# Only images <1MB will be cached, so 32MB of data will be cached
|
||||||
_RESIZED_CACHE: MutableMapping[tuple[str, int], tuple[bytes, str, Any]] = LFUCache(64)
|
_RESIZED_CACHE: MutableMapping[tuple[str, int], tuple[bytes, str, Any]] = LFUCache(32)
|
||||||
|
|
||||||
|
|
||||||
# TODO(ts):
|
# TODO(ts):
|
||||||
|
@ -135,9 +141,15 @@ class CustomMiddleware:
|
||||||
headers["x-frame-options"] = "DENY"
|
headers["x-frame-options"] = "DENY"
|
||||||
headers["permissions-policy"] = "interest-cohort=()"
|
headers["permissions-policy"] = "interest-cohort=()"
|
||||||
headers["content-security-policy"] = (
|
headers["content-security-policy"] = (
|
||||||
f"default-src 'self'; "
|
(
|
||||||
f"style-src 'self' 'sha256-{HIGHLIGHT_CSS_HASH}'; "
|
f"default-src 'self'; "
|
||||||
f"frame-ancestors 'none'; base-uri 'self'; form-action 'self';"
|
f"style-src 'self' 'sha256-{HIGHLIGHT_CSS_HASH}'; "
|
||||||
|
f"frame-ancestors 'none'; base-uri 'self'; form-action 'self';"
|
||||||
|
)
|
||||||
|
if not config.CUSTOM_CONTENT_SECURITY_POLICY
|
||||||
|
else config.CUSTOM_CONTENT_SECURITY_POLICY.format(
|
||||||
|
HIGHLIGHT_CSS_HASH=HIGHLIGHT_CSS_HASH
|
||||||
|
)
|
||||||
)
|
)
|
||||||
if not DEBUG:
|
if not DEBUG:
|
||||||
headers["strict-transport-security"] = "max-age=63072000;"
|
headers["strict-transport-security"] = "max-age=63072000;"
|
||||||
|
@ -192,6 +204,9 @@ app.include_router(admin.unauthenticated_router, prefix="/admin")
|
||||||
app.include_router(indieauth.router)
|
app.include_router(indieauth.router)
|
||||||
app.include_router(micropub.router)
|
app.include_router(micropub.router)
|
||||||
app.include_router(webmentions.router)
|
app.include_router(webmentions.router)
|
||||||
|
config.load_custom_routes()
|
||||||
|
if custom_router := get_custom_router():
|
||||||
|
app.include_router(custom_router)
|
||||||
|
|
||||||
# XXX: order matters, the proxy middleware needs to be last
|
# XXX: order matters, the proxy middleware needs to be last
|
||||||
app.add_middleware(CustomMiddleware)
|
app.add_middleware(CustomMiddleware)
|
||||||
|
@ -243,11 +258,34 @@ class ActivityPubResponse(JSONResponse):
|
||||||
media_type = "application/activity+json"
|
media_type = "application/activity+json"
|
||||||
|
|
||||||
|
|
||||||
@app.get("/")
|
async def redirect_to_remote_instance(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession,
|
||||||
|
url: str,
|
||||||
|
) -> templates.TemplateResponse:
|
||||||
|
"""
|
||||||
|
Similar to RedirectResponse, but uses a 200 response with HTML.
|
||||||
|
|
||||||
|
Needed for remote redirects on form submission endpoints,
|
||||||
|
since our CSP policy disallows remote form submission.
|
||||||
|
https://github.com/w3c/webappsec-csp/issues/8#issuecomment-810108984
|
||||||
|
"""
|
||||||
|
return await templates.render_template(
|
||||||
|
db_session,
|
||||||
|
request,
|
||||||
|
"redirect_to_remote_instance.html",
|
||||||
|
{
|
||||||
|
"request": request,
|
||||||
|
"url": url,
|
||||||
|
},
|
||||||
|
headers={"Refresh": "0;url=" + url},
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@app.get(config.NavBarItems.NOTES_PATH)
|
||||||
async def index(
|
async def index(
|
||||||
request: Request,
|
request: Request,
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
|
||||||
page: int | None = None,
|
page: int | None = None,
|
||||||
) -> templates.TemplateResponse | ActivityPubResponse:
|
) -> templates.TemplateResponse | ActivityPubResponse:
|
||||||
if is_activitypub_requested(request):
|
if is_activitypub_requested(request):
|
||||||
|
@ -259,7 +297,7 @@ async def index(
|
||||||
models.OutboxObject.visibility == ap.VisibilityEnum.PUBLIC,
|
models.OutboxObject.visibility == ap.VisibilityEnum.PUBLIC,
|
||||||
models.OutboxObject.is_deleted.is_(False),
|
models.OutboxObject.is_deleted.is_(False),
|
||||||
models.OutboxObject.is_hidden_from_homepage.is_(False),
|
models.OutboxObject.is_hidden_from_homepage.is_(False),
|
||||||
models.OutboxObject.ap_type != "Article",
|
models.OutboxObject.ap_type.in_(["Announce", "Note", "Video", "Question"]),
|
||||||
)
|
)
|
||||||
q = select(models.OutboxObject).where(*where)
|
q = select(models.OutboxObject).where(*where)
|
||||||
total_count = await db_session.scalar(
|
total_count = await db_session.scalar(
|
||||||
|
@ -427,7 +465,12 @@ async def followers(
|
||||||
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
||||||
) -> ActivityPubResponse | templates.TemplateResponse:
|
) -> ActivityPubResponse | templates.TemplateResponse:
|
||||||
if is_activitypub_requested(request):
|
if is_activitypub_requested(request):
|
||||||
if config.HIDES_FOLLOWERS:
|
maybe_access_token_info = await indieauth.check_access_token(
|
||||||
|
request,
|
||||||
|
db_session,
|
||||||
|
)
|
||||||
|
|
||||||
|
if config.HIDES_FOLLOWERS and not maybe_access_token_info:
|
||||||
return ActivityPubResponse(
|
return ActivityPubResponse(
|
||||||
await _empty_followx_collection(
|
await _empty_followx_collection(
|
||||||
db_session=db_session,
|
db_session=db_session,
|
||||||
|
@ -486,7 +529,12 @@ async def following(
|
||||||
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
||||||
) -> ActivityPubResponse | templates.TemplateResponse:
|
) -> ActivityPubResponse | templates.TemplateResponse:
|
||||||
if is_activitypub_requested(request):
|
if is_activitypub_requested(request):
|
||||||
if config.HIDES_FOLLOWING:
|
maybe_access_token_info = await indieauth.check_access_token(
|
||||||
|
request,
|
||||||
|
db_session,
|
||||||
|
)
|
||||||
|
|
||||||
|
if config.HIDES_FOLLOWING and not maybe_access_token_info:
|
||||||
return ActivityPubResponse(
|
return ActivityPubResponse(
|
||||||
await _empty_followx_collection(
|
await _empty_followx_collection(
|
||||||
db_session=db_session,
|
db_session=db_session,
|
||||||
|
@ -542,22 +590,34 @@ async def following(
|
||||||
|
|
||||||
@app.get("/outbox")
|
@app.get("/outbox")
|
||||||
async def outbox(
|
async def outbox(
|
||||||
|
request: Request,
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
||||||
) -> ActivityPubResponse:
|
) -> ActivityPubResponse:
|
||||||
|
maybe_access_token_info = await indieauth.check_access_token(
|
||||||
|
request,
|
||||||
|
db_session,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Default restrictions unless the request is authenticated with an access token
|
||||||
|
restricted_where = [
|
||||||
|
models.OutboxObject.visibility == ap.VisibilityEnum.PUBLIC,
|
||||||
|
models.OutboxObject.ap_type.in_(["Create", "Note", "Article", "Announce"]),
|
||||||
|
]
|
||||||
|
|
||||||
# By design, we only show the last 20 public activities in the oubox
|
# By design, we only show the last 20 public activities in the oubox
|
||||||
outbox_objects = (
|
outbox_objects = (
|
||||||
await db_session.scalars(
|
await db_session.scalars(
|
||||||
select(models.OutboxObject)
|
select(models.OutboxObject)
|
||||||
.where(
|
.where(
|
||||||
models.OutboxObject.visibility == ap.VisibilityEnum.PUBLIC,
|
|
||||||
models.OutboxObject.is_deleted.is_(False),
|
models.OutboxObject.is_deleted.is_(False),
|
||||||
models.OutboxObject.ap_type.in_(["Create", "Announce"]),
|
*([] if maybe_access_token_info else restricted_where),
|
||||||
)
|
)
|
||||||
.order_by(models.OutboxObject.ap_published_at.desc())
|
.order_by(models.OutboxObject.ap_published_at.desc())
|
||||||
.limit(20)
|
.limit(20)
|
||||||
)
|
)
|
||||||
).all()
|
).all()
|
||||||
|
|
||||||
return ActivityPubResponse(
|
return ActivityPubResponse(
|
||||||
{
|
{
|
||||||
"@context": ap.AS_EXTENDED_CTX,
|
"@context": ap.AS_EXTENDED_CTX,
|
||||||
|
@ -572,6 +632,49 @@ async def outbox(
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@app.post("/outbox")
|
||||||
|
async def post_outbox(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
access_token_info: indieauth.AccessTokenInfo = Depends(
|
||||||
|
indieauth.enforce_access_token
|
||||||
|
),
|
||||||
|
) -> ActivityPubResponse:
|
||||||
|
payload = await request.json()
|
||||||
|
logger.info(f"{payload=}")
|
||||||
|
|
||||||
|
if payload.get("type") == "Create":
|
||||||
|
assert payload["actor"] == ID
|
||||||
|
obj = payload["object"]
|
||||||
|
|
||||||
|
to_and_cc = obj.get("to", []) + obj.get("cc", [])
|
||||||
|
if ap.AS_PUBLIC in obj.get("to", []) and ID + "/followers" in to_and_cc:
|
||||||
|
visibility = ap.VisibilityEnum.PUBLIC
|
||||||
|
elif ap.AS_PUBLIC in to_and_cc and ID + "/followers" in to_and_cc:
|
||||||
|
visibility = ap.VisibilityEnum.UNLISTED
|
||||||
|
else:
|
||||||
|
visibility = ap.VisibilityEnum.DIRECT
|
||||||
|
|
||||||
|
object_id, outbox_object = await boxes.send_create(
|
||||||
|
db_session,
|
||||||
|
ap_type=obj["type"],
|
||||||
|
source=obj["content"],
|
||||||
|
uploads=[],
|
||||||
|
in_reply_to=obj.get("inReplyTo"),
|
||||||
|
visibility=visibility,
|
||||||
|
content_warning=obj.get("summary"),
|
||||||
|
is_sensitive=obj.get("sensitive", False),
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
raise ValueError("TODO")
|
||||||
|
|
||||||
|
return ActivityPubResponse(
|
||||||
|
outbox_object.ap_object,
|
||||||
|
status_code=201,
|
||||||
|
headers={"Location": boxes.outbox_object_id(object_id)},
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
@app.get("/featured")
|
@app.get("/featured")
|
||||||
async def featured(
|
async def featured(
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
@ -609,6 +712,14 @@ async def _check_outbox_object_acl(
|
||||||
if templates.is_current_user_admin(request):
|
if templates.is_current_user_admin(request):
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
maybe_access_token_info = await indieauth.check_access_token(
|
||||||
|
request,
|
||||||
|
db_session,
|
||||||
|
)
|
||||||
|
if maybe_access_token_info:
|
||||||
|
# TODO: check scopes
|
||||||
|
return None
|
||||||
|
|
||||||
if ap_object.visibility in [
|
if ap_object.visibility in [
|
||||||
ap.VisibilityEnum.PUBLIC,
|
ap.VisibilityEnum.PUBLIC,
|
||||||
ap.VisibilityEnum.UNLISTED,
|
ap.VisibilityEnum.UNLISTED,
|
||||||
|
@ -632,13 +743,75 @@ async def _check_outbox_object_acl(
|
||||||
raise HTTPException(status_code=404)
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
|
|
||||||
|
async def _fetch_likes(
|
||||||
|
db_session: AsyncSession,
|
||||||
|
outbox_object: models.OutboxObject,
|
||||||
|
) -> list[models.InboxObject]:
|
||||||
|
return (
|
||||||
|
(
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.InboxObject)
|
||||||
|
.where(
|
||||||
|
models.InboxObject.ap_type == "Like",
|
||||||
|
models.InboxObject.activity_object_ap_id == outbox_object.ap_id,
|
||||||
|
models.InboxObject.is_deleted.is_(False),
|
||||||
|
)
|
||||||
|
.options(joinedload(models.InboxObject.actor))
|
||||||
|
.order_by(models.InboxObject.ap_published_at.desc())
|
||||||
|
.limit(10)
|
||||||
|
)
|
||||||
|
)
|
||||||
|
.unique()
|
||||||
|
.all()
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
async def _fetch_shares(
|
||||||
|
db_session: AsyncSession,
|
||||||
|
outbox_object: models.OutboxObject,
|
||||||
|
) -> list[models.InboxObject]:
|
||||||
|
return (
|
||||||
|
(
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.InboxObject)
|
||||||
|
.filter(
|
||||||
|
models.InboxObject.ap_type == "Announce",
|
||||||
|
models.InboxObject.activity_object_ap_id == outbox_object.ap_id,
|
||||||
|
models.InboxObject.is_deleted.is_(False),
|
||||||
|
)
|
||||||
|
.options(joinedload(models.InboxObject.actor))
|
||||||
|
.order_by(models.InboxObject.ap_published_at.desc())
|
||||||
|
.limit(10)
|
||||||
|
)
|
||||||
|
)
|
||||||
|
.unique()
|
||||||
|
.all()
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
async def _fetch_webmentions(
|
||||||
|
db_session: AsyncSession,
|
||||||
|
outbox_object: models.OutboxObject,
|
||||||
|
) -> list[models.Webmention]:
|
||||||
|
return (
|
||||||
|
await db_session.scalars(
|
||||||
|
select(models.Webmention)
|
||||||
|
.filter(
|
||||||
|
models.Webmention.outbox_object_id == outbox_object.id,
|
||||||
|
models.Webmention.is_deleted.is_(False),
|
||||||
|
)
|
||||||
|
.limit(50)
|
||||||
|
)
|
||||||
|
).all()
|
||||||
|
|
||||||
|
|
||||||
@app.get("/o/{public_id}")
|
@app.get("/o/{public_id}")
|
||||||
async def outbox_by_public_id(
|
async def outbox_by_public_id(
|
||||||
public_id: str,
|
public_id: str,
|
||||||
request: Request,
|
request: Request,
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
httpsig_info: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
httpsig_info: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
||||||
) -> ActivityPubResponse | templates.TemplateResponse:
|
) -> ActivityPubResponse | templates.TemplateResponse | RedirectResponse:
|
||||||
maybe_object = (
|
maybe_object = (
|
||||||
(
|
(
|
||||||
await db_session.execute(
|
await db_session.execute(
|
||||||
|
@ -665,69 +838,148 @@ async def outbox_by_public_id(
|
||||||
if is_activitypub_requested(request):
|
if is_activitypub_requested(request):
|
||||||
return ActivityPubResponse(maybe_object.ap_object)
|
return ActivityPubResponse(maybe_object.ap_object)
|
||||||
|
|
||||||
|
if maybe_object.ap_type == "Article":
|
||||||
|
return RedirectResponse(
|
||||||
|
f"{BASE_URL}/articles/{public_id[:7]}/{maybe_object.slug}",
|
||||||
|
status_code=301,
|
||||||
|
)
|
||||||
|
|
||||||
replies_tree = await boxes.get_replies_tree(
|
replies_tree = await boxes.get_replies_tree(
|
||||||
db_session,
|
db_session,
|
||||||
maybe_object,
|
maybe_object,
|
||||||
is_current_user_admin=is_current_user_admin(request),
|
is_current_user_admin=is_current_user_admin(request),
|
||||||
)
|
)
|
||||||
|
|
||||||
likes = (
|
webmentions = await _fetch_webmentions(db_session, maybe_object)
|
||||||
(
|
likes = await _fetch_likes(db_session, maybe_object)
|
||||||
await db_session.scalars(
|
shares = await _fetch_shares(db_session, maybe_object)
|
||||||
select(models.InboxObject)
|
|
||||||
.where(
|
|
||||||
models.InboxObject.ap_type == "Like",
|
|
||||||
models.InboxObject.activity_object_ap_id == maybe_object.ap_id,
|
|
||||||
models.InboxObject.is_deleted.is_(False),
|
|
||||||
)
|
|
||||||
.options(joinedload(models.InboxObject.actor))
|
|
||||||
.order_by(models.InboxObject.ap_published_at.desc())
|
|
||||||
.limit(10)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
.unique()
|
|
||||||
.all()
|
|
||||||
)
|
|
||||||
|
|
||||||
shares = (
|
|
||||||
(
|
|
||||||
await db_session.scalars(
|
|
||||||
select(models.InboxObject)
|
|
||||||
.filter(
|
|
||||||
models.InboxObject.ap_type == "Announce",
|
|
||||||
models.InboxObject.activity_object_ap_id == maybe_object.ap_id,
|
|
||||||
models.InboxObject.is_deleted.is_(False),
|
|
||||||
)
|
|
||||||
.options(joinedload(models.InboxObject.actor))
|
|
||||||
.order_by(models.InboxObject.ap_published_at.desc())
|
|
||||||
.limit(10)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
.unique()
|
|
||||||
.all()
|
|
||||||
)
|
|
||||||
|
|
||||||
webmentions = (
|
|
||||||
await db_session.scalars(
|
|
||||||
select(models.Webmention)
|
|
||||||
.filter(
|
|
||||||
models.Webmention.outbox_object_id == maybe_object.id,
|
|
||||||
models.Webmention.is_deleted.is_(False),
|
|
||||||
)
|
|
||||||
.limit(10)
|
|
||||||
)
|
|
||||||
).all()
|
|
||||||
|
|
||||||
return await templates.render_template(
|
return await templates.render_template(
|
||||||
db_session,
|
db_session,
|
||||||
request,
|
request,
|
||||||
"object.html",
|
"object.html",
|
||||||
{
|
{
|
||||||
"replies_tree": replies_tree,
|
"replies_tree": _merge_replies(replies_tree, webmentions),
|
||||||
"outbox_object": maybe_object,
|
"outbox_object": maybe_object,
|
||||||
"likes": likes,
|
"likes": _merge_faces_from_inbox_object_and_webmentions(
|
||||||
"shares": shares,
|
likes,
|
||||||
"webmentions": webmentions,
|
webmentions,
|
||||||
|
models.WebmentionType.LIKE,
|
||||||
|
),
|
||||||
|
"shares": _merge_faces_from_inbox_object_and_webmentions(
|
||||||
|
shares,
|
||||||
|
webmentions,
|
||||||
|
models.WebmentionType.REPOST,
|
||||||
|
),
|
||||||
|
"webmentions": _filter_webmentions(webmentions),
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def _filter_webmentions(
|
||||||
|
webmentions: list[models.Webmention],
|
||||||
|
) -> list[models.Webmention]:
|
||||||
|
return [
|
||||||
|
wm
|
||||||
|
for wm in webmentions
|
||||||
|
if wm.webmention_type
|
||||||
|
not in [
|
||||||
|
models.WebmentionType.LIKE,
|
||||||
|
models.WebmentionType.REPOST,
|
||||||
|
models.WebmentionType.REPLY,
|
||||||
|
]
|
||||||
|
]
|
||||||
|
|
||||||
|
|
||||||
|
def _merge_faces_from_inbox_object_and_webmentions(
|
||||||
|
inbox_objects: list[models.InboxObject],
|
||||||
|
webmentions: list[models.Webmention],
|
||||||
|
webmention_type: models.WebmentionType,
|
||||||
|
) -> list[Face]:
|
||||||
|
wm_faces = []
|
||||||
|
for wm in webmentions:
|
||||||
|
if wm.webmention_type != webmention_type:
|
||||||
|
continue
|
||||||
|
if face := Face.from_webmention(wm):
|
||||||
|
wm_faces.append(face)
|
||||||
|
|
||||||
|
return merge_faces(
|
||||||
|
[Face.from_inbox_object(obj) for obj in inbox_objects] + wm_faces
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def _merge_replies(
|
||||||
|
reply_tree_node: boxes.ReplyTreeNode,
|
||||||
|
webmentions: list[models.Webmention],
|
||||||
|
) -> boxes.ReplyTreeNode:
|
||||||
|
# TODO: return None as we update the object in place
|
||||||
|
webmention_replies = []
|
||||||
|
for wm in [
|
||||||
|
wm for wm in webmentions if wm.webmention_type == models.WebmentionType.REPLY
|
||||||
|
]:
|
||||||
|
if rep := WebmentionReply.from_webmention(wm):
|
||||||
|
webmention_replies.append(
|
||||||
|
boxes.ReplyTreeNode(
|
||||||
|
ap_object=None,
|
||||||
|
wm_reply=rep,
|
||||||
|
is_requested=False,
|
||||||
|
children=[],
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
reply_tree_node.children = sorted(
|
||||||
|
reply_tree_node.children + webmention_replies,
|
||||||
|
key=lambda node: node.published_at,
|
||||||
|
reverse=True,
|
||||||
|
)
|
||||||
|
return reply_tree_node
|
||||||
|
|
||||||
|
|
||||||
|
@app.get("/articles/{short_id}/{slug}")
|
||||||
|
async def article_by_slug(
|
||||||
|
short_id: str,
|
||||||
|
slug: str,
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
httpsig_info: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
||||||
|
) -> ActivityPubResponse | templates.TemplateResponse | RedirectResponse:
|
||||||
|
maybe_object = await boxes.get_outbox_object_by_slug_and_short_id(
|
||||||
|
db_session, slug, short_id
|
||||||
|
)
|
||||||
|
if not maybe_object:
|
||||||
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
|
await _check_outbox_object_acl(request, db_session, maybe_object, httpsig_info)
|
||||||
|
|
||||||
|
if is_activitypub_requested(request):
|
||||||
|
return ActivityPubResponse(maybe_object.ap_object)
|
||||||
|
|
||||||
|
replies_tree = await boxes.get_replies_tree(
|
||||||
|
db_session,
|
||||||
|
maybe_object,
|
||||||
|
is_current_user_admin=is_current_user_admin(request),
|
||||||
|
)
|
||||||
|
|
||||||
|
likes = await _fetch_likes(db_session, maybe_object)
|
||||||
|
shares = await _fetch_shares(db_session, maybe_object)
|
||||||
|
webmentions = await _fetch_webmentions(db_session, maybe_object)
|
||||||
|
return await templates.render_template(
|
||||||
|
db_session,
|
||||||
|
request,
|
||||||
|
"object.html",
|
||||||
|
{
|
||||||
|
"replies_tree": _merge_replies(replies_tree, webmentions),
|
||||||
|
"outbox_object": maybe_object,
|
||||||
|
"likes": _merge_faces_from_inbox_object_and_webmentions(
|
||||||
|
likes,
|
||||||
|
webmentions,
|
||||||
|
models.WebmentionType.LIKE,
|
||||||
|
),
|
||||||
|
"shares": _merge_faces_from_inbox_object_and_webmentions(
|
||||||
|
shares,
|
||||||
|
webmentions,
|
||||||
|
models.WebmentionType.REPOST,
|
||||||
|
),
|
||||||
|
"webmentions": _filter_webmentions(webmentions),
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -763,7 +1015,7 @@ async def tag_by_name(
|
||||||
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
_: httpsig.HTTPSigInfo = Depends(httpsig.httpsig_checker),
|
||||||
) -> ActivityPubResponse | templates.TemplateResponse:
|
) -> ActivityPubResponse | templates.TemplateResponse:
|
||||||
where = [
|
where = [
|
||||||
models.TaggedOutboxObject.tag == tag,
|
models.TaggedOutboxObject.tag == tag.lower(),
|
||||||
models.OutboxObject.visibility == ap.VisibilityEnum.PUBLIC,
|
models.OutboxObject.visibility == ap.VisibilityEnum.PUBLIC,
|
||||||
models.OutboxObject.is_deleted.is_(False),
|
models.OutboxObject.is_deleted.is_(False),
|
||||||
]
|
]
|
||||||
|
@ -789,7 +1041,7 @@ async def tag_by_name(
|
||||||
return ActivityPubResponse(
|
return ActivityPubResponse(
|
||||||
{
|
{
|
||||||
"@context": ap.AS_CTX,
|
"@context": ap.AS_CTX,
|
||||||
"id": BASE_URL + f"/t/{tag}",
|
"id": BASE_URL + f"/t/{tag.lower()}",
|
||||||
"type": "OrderedCollection",
|
"type": "OrderedCollection",
|
||||||
"totalItems": tagged_count,
|
"totalItems": tagged_count,
|
||||||
"orderedItems": [
|
"orderedItems": [
|
||||||
|
@ -837,6 +1089,78 @@ def emoji_by_name(name: str) -> ActivityPubResponse:
|
||||||
return ActivityPubResponse({"@context": ap.AS_EXTENDED_CTX, **emoji})
|
return ActivityPubResponse({"@context": ap.AS_EXTENDED_CTX, **emoji})
|
||||||
|
|
||||||
|
|
||||||
|
@app.get("/inbox")
|
||||||
|
async def get_inbox(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
access_token_info: indieauth.AccessTokenInfo = Depends(
|
||||||
|
indieauth.enforce_access_token
|
||||||
|
),
|
||||||
|
page: bool | None = None,
|
||||||
|
next_cursor: str | None = None,
|
||||||
|
) -> ActivityPubResponse:
|
||||||
|
where = [
|
||||||
|
models.InboxObject.ap_type.in_(
|
||||||
|
["Create", "Follow", "Like", "Announce", "Undo", "Update"]
|
||||||
|
)
|
||||||
|
]
|
||||||
|
total_items = await db_session.scalar(
|
||||||
|
select(func.count(models.InboxObject.id)).where(*where)
|
||||||
|
)
|
||||||
|
|
||||||
|
if not page and not next_cursor:
|
||||||
|
return ActivityPubResponse(
|
||||||
|
{
|
||||||
|
"@context": ap.AS_CTX,
|
||||||
|
"id": ID + "/inbox",
|
||||||
|
"first": ID + "/inbox?page=true",
|
||||||
|
"type": "OrderedCollection",
|
||||||
|
"totalItems": total_items,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
q = (
|
||||||
|
select(models.InboxObject)
|
||||||
|
.where(*where)
|
||||||
|
.order_by(models.InboxObject.created_at.desc())
|
||||||
|
) # type: ignore
|
||||||
|
if next_cursor:
|
||||||
|
q = q.where(
|
||||||
|
models.InboxObject.created_at
|
||||||
|
< pagination.decode_cursor(next_cursor) # type: ignore
|
||||||
|
)
|
||||||
|
q = q.limit(20)
|
||||||
|
|
||||||
|
items = [item for item in (await db_session.scalars(q)).all()]
|
||||||
|
next_cursor = None
|
||||||
|
if (
|
||||||
|
items
|
||||||
|
and await db_session.scalar(
|
||||||
|
select(func.count(models.InboxObject.id)).where(
|
||||||
|
*where, models.InboxObject.created_at < items[-1].created_at
|
||||||
|
)
|
||||||
|
)
|
||||||
|
> 0
|
||||||
|
):
|
||||||
|
next_cursor = pagination.encode_cursor(items[-1].created_at)
|
||||||
|
|
||||||
|
collection_page = {
|
||||||
|
"@context": ap.AS_CTX,
|
||||||
|
"id": (
|
||||||
|
ID + "/inbox?page=true"
|
||||||
|
if not next_cursor
|
||||||
|
else ID + f"/inbox?next_cursor={next_cursor}"
|
||||||
|
),
|
||||||
|
"partOf": ID + "/inbox",
|
||||||
|
"type": "OrderedCollectionPage",
|
||||||
|
"orderedItems": [item.ap_object for item in items],
|
||||||
|
}
|
||||||
|
if next_cursor:
|
||||||
|
collection_page["next"] = ID + f"/inbox?next_cursor={next_cursor}"
|
||||||
|
|
||||||
|
return ActivityPubResponse(collection_page)
|
||||||
|
|
||||||
|
|
||||||
@app.post("/inbox")
|
@app.post("/inbox")
|
||||||
async def inbox(
|
async def inbox(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
@ -866,9 +1190,10 @@ async def get_remote_follow(
|
||||||
@app.post("/remote_follow")
|
@app.post("/remote_follow")
|
||||||
async def post_remote_follow(
|
async def post_remote_follow(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
csrf_check: None = Depends(verify_csrf_token),
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
profile: str = Form(),
|
profile: str = Form(),
|
||||||
) -> RedirectResponse:
|
) -> templates.TemplateResponse:
|
||||||
if not profile.startswith("@"):
|
if not profile.startswith("@"):
|
||||||
profile = f"@{profile}"
|
profile = f"@{profile}"
|
||||||
|
|
||||||
|
@ -877,21 +1202,70 @@ async def post_remote_follow(
|
||||||
# TODO(ts): error message to user
|
# TODO(ts): error message to user
|
||||||
raise HTTPException(status_code=404)
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
return RedirectResponse(
|
return await redirect_to_remote_instance(
|
||||||
|
request,
|
||||||
|
db_session,
|
||||||
|
remote_follow_template.format(uri=ID),
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@app.get("/remote_interaction")
|
||||||
|
async def remote_interaction(
|
||||||
|
request: Request,
|
||||||
|
ap_id: str,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> templates.TemplateResponse:
|
||||||
|
outbox_object = await boxes.get_outbox_object_by_ap_id(
|
||||||
|
db_session,
|
||||||
|
ap_id,
|
||||||
|
)
|
||||||
|
if not outbox_object:
|
||||||
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
|
return await templates.render_template(
|
||||||
|
db_session,
|
||||||
|
request,
|
||||||
|
"remote_interact.html",
|
||||||
|
{"outbox_object": outbox_object},
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@app.post("/remote_interaction")
|
||||||
|
async def post_remote_interaction(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
csrf_check: None = Depends(verify_csrf_token),
|
||||||
|
profile: str = Form(),
|
||||||
|
ap_id: str = Form(),
|
||||||
|
) -> templates.TemplateResponse:
|
||||||
|
if not profile.startswith("@"):
|
||||||
|
profile = f"@{profile}"
|
||||||
|
|
||||||
|
remote_follow_template = await get_remote_follow_template(profile)
|
||||||
|
if not remote_follow_template:
|
||||||
|
# TODO(ts): error message to user
|
||||||
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
|
return await redirect_to_remote_instance(
|
||||||
|
request,
|
||||||
|
db_session,
|
||||||
remote_follow_template.format(uri=ID),
|
remote_follow_template.format(uri=ID),
|
||||||
status_code=302,
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@app.get("/.well-known/webfinger")
|
@app.get("/.well-known/webfinger")
|
||||||
async def wellknown_webfinger(resource: str) -> JSONResponse:
|
async def wellknown_webfinger(resource: str) -> JSONResponse:
|
||||||
"""Exposes/servers WebFinger data."""
|
"""Exposes/servers WebFinger data."""
|
||||||
if resource not in [f"acct:{USERNAME}@{DOMAIN}", ID]:
|
if resource not in [
|
||||||
|
f"acct:{USERNAME}@{WEBFINGER_DOMAIN}",
|
||||||
|
ID,
|
||||||
|
f"acct:{USERNAME}@{DOMAIN}",
|
||||||
|
]:
|
||||||
logger.info(f"Got invalid req for {resource}")
|
logger.info(f"Got invalid req for {resource}")
|
||||||
raise HTTPException(status_code=404)
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
out = {
|
out = {
|
||||||
"subject": f"acct:{USERNAME}@{DOMAIN}",
|
"subject": f"acct:{USERNAME}@{WEBFINGER_DOMAIN}",
|
||||||
"aliases": [ID],
|
"aliases": [ID],
|
||||||
"links": [
|
"links": [
|
||||||
{
|
{
|
||||||
|
@ -955,11 +1329,11 @@ async def nodeinfo(
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
proxy_client = httpx.AsyncClient(follow_redirects=True, http2=True)
|
|
||||||
|
|
||||||
|
|
||||||
async def _proxy_get(
|
async def _proxy_get(
|
||||||
request: starlette.requests.Request, url: str, stream: bool
|
proxy_client: httpx.AsyncClient,
|
||||||
|
request: starlette.requests.Request,
|
||||||
|
url: str,
|
||||||
|
stream: bool,
|
||||||
) -> httpx.Response:
|
) -> httpx.Response:
|
||||||
# Request the URL (and filter request headers)
|
# Request the URL (and filter request headers)
|
||||||
proxy_req = proxy_client.build_request(
|
proxy_req = proxy_client.build_request(
|
||||||
|
@ -1000,21 +1374,35 @@ def _add_cache_control(headers: dict[str, str]) -> dict[str, str]:
|
||||||
return {**headers, "Cache-Control": "max-age=31536000"}
|
return {**headers, "Cache-Control": "max-age=31536000"}
|
||||||
|
|
||||||
|
|
||||||
@app.get("/proxy/media/{encoded_url}")
|
@app.get("/proxy/media/{exp}/{sig}/{encoded_url}")
|
||||||
async def serve_proxy_media(
|
async def serve_proxy_media(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
exp: int,
|
||||||
|
sig: str,
|
||||||
encoded_url: str,
|
encoded_url: str,
|
||||||
|
background_tasks: fastapi.BackgroundTasks,
|
||||||
) -> StreamingResponse | PlainTextResponse:
|
) -> StreamingResponse | PlainTextResponse:
|
||||||
# Decode the base64-encoded URL
|
# Decode the base64-encoded URL
|
||||||
url = base64.urlsafe_b64decode(encoded_url).decode()
|
url = base64.urlsafe_b64decode(encoded_url).decode()
|
||||||
check_url(url)
|
check_url(url)
|
||||||
|
media.verify_proxied_media_sig(exp, url, sig)
|
||||||
|
|
||||||
proxy_resp = await _proxy_get(request, url, stream=True)
|
proxy_client = httpx.AsyncClient(
|
||||||
|
follow_redirects=True,
|
||||||
|
timeout=httpx.Timeout(timeout=10.0),
|
||||||
|
transport=httpx.AsyncHTTPTransport(retries=1),
|
||||||
|
)
|
||||||
|
|
||||||
|
async def _close_proxy_client():
|
||||||
|
await proxy_client.aclose()
|
||||||
|
|
||||||
|
background_tasks.add_task(_close_proxy_client)
|
||||||
|
proxy_resp = await _proxy_get(proxy_client, request, url, stream=True)
|
||||||
|
|
||||||
if proxy_resp.status_code >= 300:
|
if proxy_resp.status_code >= 300:
|
||||||
logger.info(f"failed to proxy {url}, got {proxy_resp.status_code}")
|
logger.info(f"failed to proxy {url}, got {proxy_resp.status_code}")
|
||||||
|
await proxy_resp.aclose()
|
||||||
return PlainTextResponse(
|
return PlainTextResponse(
|
||||||
"proxy error",
|
|
||||||
status_code=proxy_resp.status_code,
|
status_code=proxy_resp.status_code,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -1025,6 +1413,7 @@ async def serve_proxy_media(
|
||||||
_filter_proxy_resp_headers(
|
_filter_proxy_resp_headers(
|
||||||
proxy_resp,
|
proxy_resp,
|
||||||
[
|
[
|
||||||
|
"content-encoding",
|
||||||
"content-length",
|
"content-length",
|
||||||
"content-type",
|
"content-type",
|
||||||
"content-range",
|
"content-range",
|
||||||
|
@ -1040,20 +1429,26 @@ async def serve_proxy_media(
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
@app.get("/proxy/media/{encoded_url}/{size}")
|
@app.get("/proxy/media/{exp}/{sig}/{encoded_url}/{size}")
|
||||||
async def serve_proxy_media_resized(
|
async def serve_proxy_media_resized(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
exp: int,
|
||||||
|
sig: str,
|
||||||
encoded_url: str,
|
encoded_url: str,
|
||||||
size: int,
|
size: int,
|
||||||
|
background_tasks: fastapi.BackgroundTasks,
|
||||||
) -> PlainTextResponse:
|
) -> PlainTextResponse:
|
||||||
if size not in {50, 740}:
|
if size not in {50, 740}:
|
||||||
raise ValueError("Unsupported size")
|
raise ValueError("Unsupported size")
|
||||||
|
|
||||||
|
is_webp_supported = "image/webp" in request.headers.get("accept")
|
||||||
|
|
||||||
# Decode the base64-encoded URL
|
# Decode the base64-encoded URL
|
||||||
url = base64.urlsafe_b64decode(encoded_url).decode()
|
url = base64.urlsafe_b64decode(encoded_url).decode()
|
||||||
check_url(url)
|
check_url(url)
|
||||||
|
media.verify_proxied_media_sig(exp, url, sig)
|
||||||
|
|
||||||
if cached_resp := _RESIZED_CACHE.get((url, size)):
|
if (cached_resp := _RESIZED_CACHE.get((url, size))) and is_webp_supported:
|
||||||
resized_content, resized_mimetype, resp_headers = cached_resp
|
resized_content, resized_mimetype, resp_headers = cached_resp
|
||||||
return PlainTextResponse(
|
return PlainTextResponse(
|
||||||
resized_content,
|
resized_content,
|
||||||
|
@ -1061,11 +1456,21 @@ async def serve_proxy_media_resized(
|
||||||
headers=resp_headers,
|
headers=resp_headers,
|
||||||
)
|
)
|
||||||
|
|
||||||
proxy_resp = await _proxy_get(request, url, stream=False)
|
proxy_client = httpx.AsyncClient(
|
||||||
|
follow_redirects=True,
|
||||||
|
timeout=httpx.Timeout(timeout=10.0),
|
||||||
|
transport=httpx.AsyncHTTPTransport(retries=1),
|
||||||
|
)
|
||||||
|
|
||||||
|
async def _close_proxy_client():
|
||||||
|
await proxy_client.aclose()
|
||||||
|
|
||||||
|
background_tasks.add_task(_close_proxy_client)
|
||||||
|
proxy_resp = await _proxy_get(proxy_client, request, url, stream=False)
|
||||||
if proxy_resp.status_code >= 300:
|
if proxy_resp.status_code >= 300:
|
||||||
logger.info(f"failed to proxy {url}, got {proxy_resp.status_code}")
|
logger.info(f"failed to proxy {url}, got {proxy_resp.status_code}")
|
||||||
|
await proxy_resp.aclose()
|
||||||
return PlainTextResponse(
|
return PlainTextResponse(
|
||||||
"proxy error",
|
|
||||||
status_code=proxy_resp.status_code,
|
status_code=proxy_resp.status_code,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -1091,10 +1496,10 @@ async def serve_proxy_media_resized(
|
||||||
is_webp = False
|
is_webp = False
|
||||||
try:
|
try:
|
||||||
resized_buf = BytesIO()
|
resized_buf = BytesIO()
|
||||||
i.save(resized_buf, format="webp")
|
i.save(resized_buf, format="webp" if is_webp_supported else i.format)
|
||||||
is_webp = True
|
is_webp = is_webp_supported
|
||||||
except Exception:
|
except Exception:
|
||||||
logger.exception("Failed to convert to webp")
|
logger.exception("Failed to create thumbnail")
|
||||||
resized_buf = BytesIO()
|
resized_buf = BytesIO()
|
||||||
i.save(resized_buf, format=i.format)
|
i.save(resized_buf, format=i.format)
|
||||||
resized_buf.seek(0)
|
resized_buf.seek(0)
|
||||||
|
@ -1152,6 +1557,7 @@ async def serve_attachment(
|
||||||
|
|
||||||
@app.get("/attachments/thumbnails/{content_hash}/{filename}")
|
@app.get("/attachments/thumbnails/{content_hash}/{filename}")
|
||||||
async def serve_attachment_thumbnail(
|
async def serve_attachment_thumbnail(
|
||||||
|
request: Request,
|
||||||
content_hash: str,
|
content_hash: str,
|
||||||
filename: str,
|
filename: str,
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
@ -1166,11 +1572,20 @@ async def serve_attachment_thumbnail(
|
||||||
if not upload or not upload.has_thumbnail:
|
if not upload or not upload.has_thumbnail:
|
||||||
raise HTTPException(status_code=404)
|
raise HTTPException(status_code=404)
|
||||||
|
|
||||||
return FileResponse(
|
is_webp_supported = "image/webp" in request.headers.get("accept")
|
||||||
UPLOAD_DIR / (content_hash + "_resized"),
|
|
||||||
media_type="image/webp",
|
if is_webp_supported:
|
||||||
headers={"Cache-Control": "max-age=31536000"},
|
return FileResponse(
|
||||||
)
|
UPLOAD_DIR / (content_hash + "_resized"),
|
||||||
|
media_type="image/webp",
|
||||||
|
headers={"Cache-Control": "max-age=31536000"},
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
return FileResponse(
|
||||||
|
UPLOAD_DIR / content_hash,
|
||||||
|
media_type=upload.content_type,
|
||||||
|
headers={"Cache-Control": "max-age=31536000"},
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
@app.get("/robots.txt", response_class=PlainTextResponse)
|
@app.get("/robots.txt", response_class=PlainTextResponse)
|
||||||
|
@ -1179,6 +1594,7 @@ async def robots_file():
|
||||||
Disallow: /followers
|
Disallow: /followers
|
||||||
Disallow: /following
|
Disallow: /following
|
||||||
Disallow: /admin
|
Disallow: /admin
|
||||||
|
Disallow: /remote_interaction
|
||||||
Disallow: /remote_follow"""
|
Disallow: /remote_follow"""
|
||||||
|
|
||||||
|
|
||||||
|
@ -1228,22 +1644,27 @@ async def json_feed(
|
||||||
],
|
],
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
return {
|
result = {
|
||||||
"version": "https://jsonfeed.org/version/1",
|
"version": "https://jsonfeed.org/version/1.1",
|
||||||
"title": f"{LOCAL_ACTOR.display_name}'s microblog'",
|
"title": f"{LOCAL_ACTOR.display_name}'s microblog'",
|
||||||
"home_page_url": LOCAL_ACTOR.url,
|
"home_page_url": LOCAL_ACTOR.url,
|
||||||
"feed_url": BASE_URL + "/feed.json",
|
"feed_url": BASE_URL + "/feed.json",
|
||||||
"author": {
|
"authors": [
|
||||||
"name": LOCAL_ACTOR.display_name,
|
{
|
||||||
"url": LOCAL_ACTOR.url,
|
"name": LOCAL_ACTOR.display_name,
|
||||||
"avatar": LOCAL_ACTOR.icon_url,
|
"url": LOCAL_ACTOR.url,
|
||||||
},
|
}
|
||||||
|
],
|
||||||
"items": data,
|
"items": data,
|
||||||
}
|
}
|
||||||
|
if LOCAL_ACTOR.icon_url:
|
||||||
|
result["authors"][0]["avatar"] = LOCAL_ACTOR.icon_url # type: ignore
|
||||||
|
return result
|
||||||
|
|
||||||
|
|
||||||
async def _gen_rss_feed(
|
async def _gen_rss_feed(
|
||||||
db_session: AsyncSession,
|
db_session: AsyncSession,
|
||||||
|
is_rss: bool,
|
||||||
):
|
):
|
||||||
fg = FeedGenerator()
|
fg = FeedGenerator()
|
||||||
fg.id(BASE_URL + "/feed.rss")
|
fg.id(BASE_URL + "/feed.rss")
|
||||||
|
@ -1251,7 +1672,8 @@ async def _gen_rss_feed(
|
||||||
fg.description(f"{LOCAL_ACTOR.display_name}'s microblog")
|
fg.description(f"{LOCAL_ACTOR.display_name}'s microblog")
|
||||||
fg.author({"name": LOCAL_ACTOR.display_name})
|
fg.author({"name": LOCAL_ACTOR.display_name})
|
||||||
fg.link(href=LOCAL_ACTOR.url, rel="alternate")
|
fg.link(href=LOCAL_ACTOR.url, rel="alternate")
|
||||||
fg.logo(LOCAL_ACTOR.icon_url)
|
if LOCAL_ACTOR.icon_url:
|
||||||
|
fg.logo(LOCAL_ACTOR.icon_url)
|
||||||
fg.language("en")
|
fg.language("en")
|
||||||
|
|
||||||
outbox_objects = await _get_outbox_for_feed(db_session)
|
outbox_objects = await _get_outbox_for_feed(db_session)
|
||||||
|
@ -1273,8 +1695,12 @@ async def _gen_rss_feed(
|
||||||
|
|
||||||
fe = fg.add_entry()
|
fe = fg.add_entry()
|
||||||
fe.id(outbox_object.url)
|
fe.id(outbox_object.url)
|
||||||
|
if outbox_object.name is not None:
|
||||||
|
fe.title(outbox_object.name)
|
||||||
|
elif not is_rss: # Atom feeds require a title
|
||||||
|
fe.title(outbox_object.url)
|
||||||
|
|
||||||
fe.link(href=outbox_object.url)
|
fe.link(href=outbox_object.url)
|
||||||
fe.title(outbox_object.url)
|
|
||||||
fe.description(content)
|
fe.description(content)
|
||||||
fe.content(content)
|
fe.content(content)
|
||||||
fe.published(outbox_object.ap_published_at.replace(tzinfo=timezone.utc))
|
fe.published(outbox_object.ap_published_at.replace(tzinfo=timezone.utc))
|
||||||
|
@ -1287,7 +1713,7 @@ async def rss_feed(
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
) -> PlainTextResponse:
|
) -> PlainTextResponse:
|
||||||
return PlainTextResponse(
|
return PlainTextResponse(
|
||||||
(await _gen_rss_feed(db_session)).rss_str(),
|
(await _gen_rss_feed(db_session, is_rss=True)).rss_str(),
|
||||||
headers={"Content-Type": "application/rss+xml"},
|
headers={"Content-Type": "application/rss+xml"},
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -1297,6 +1723,6 @@ async def atom_feed(
|
||||||
db_session: AsyncSession = Depends(get_db_session),
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
) -> PlainTextResponse:
|
) -> PlainTextResponse:
|
||||||
return PlainTextResponse(
|
return PlainTextResponse(
|
||||||
(await _gen_rss_feed(db_session)).atom_str(),
|
(await _gen_rss_feed(db_session, is_rss=False)).atom_str(),
|
||||||
headers={"Content-Type": "application/atom+xml"},
|
headers={"Content-Type": "application/atom+xml"},
|
||||||
)
|
)
|
||||||
|
|
31
app/media.py
31
app/media.py
|
@ -1,15 +1,44 @@
|
||||||
import base64
|
import base64
|
||||||
|
import time
|
||||||
|
|
||||||
from app.config import BASE_URL
|
from app.config import BASE_URL
|
||||||
|
from app.config import hmac_sha256
|
||||||
|
|
||||||
SUPPORTED_RESIZE = [50, 740]
|
SUPPORTED_RESIZE = [50, 740]
|
||||||
|
EXPIRY_PERIOD = 86400
|
||||||
|
EXPIRY_LENGTH = 7
|
||||||
|
|
||||||
|
|
||||||
|
class InvalidProxySignatureError(Exception):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
def proxied_media_sig(expires: int, url: str) -> str:
|
||||||
|
hm = hmac_sha256()
|
||||||
|
hm.update(f"{expires}".encode())
|
||||||
|
hm.update(b"|")
|
||||||
|
hm.update(url.encode())
|
||||||
|
return base64.urlsafe_b64encode(hm.digest()).decode()
|
||||||
|
|
||||||
|
|
||||||
|
def verify_proxied_media_sig(expires: int, url: str, sig: str) -> None:
|
||||||
|
now = int(time.time() / EXPIRY_PERIOD)
|
||||||
|
expected = proxied_media_sig(expires, url)
|
||||||
|
if now > expires or sig != expected:
|
||||||
|
raise InvalidProxySignatureError("invalid or expired media")
|
||||||
|
|
||||||
|
|
||||||
def proxied_media_url(url: str) -> str:
|
def proxied_media_url(url: str) -> str:
|
||||||
if url.startswith(BASE_URL):
|
if url.startswith(BASE_URL):
|
||||||
return url
|
return url
|
||||||
|
expires = int(time.time() / EXPIRY_PERIOD) + EXPIRY_LENGTH
|
||||||
|
sig = proxied_media_sig(expires, url)
|
||||||
|
|
||||||
return "/proxy/media/" + base64.urlsafe_b64encode(url.encode()).decode()
|
return (
|
||||||
|
BASE_URL
|
||||||
|
+ f"/proxy/media/{expires}/{sig}/"
|
||||||
|
+ base64.urlsafe_b64encode(url.encode()).decode()
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def resized_media_url(url: str, size: int) -> str:
|
def resized_media_url(url: str, size: int) -> str:
|
||||||
|
|
|
@ -132,7 +132,7 @@ async def post_micropub_endpoint(
|
||||||
h = form_data["h"]
|
h = form_data["h"]
|
||||||
entry_type = f"h-{h}"
|
entry_type = f"h-{h}"
|
||||||
|
|
||||||
logger.info(f"Creating {entry_type}")
|
logger.info(f"Creating {entry_type=} with {access_token_info=}")
|
||||||
|
|
||||||
if entry_type != "h-entry":
|
if entry_type != "h-entry":
|
||||||
return JSONResponse(
|
return JSONResponse(
|
||||||
|
@ -150,7 +150,7 @@ async def post_micropub_endpoint(
|
||||||
else:
|
else:
|
||||||
content = form_data["content"]
|
content = form_data["content"]
|
||||||
|
|
||||||
public_id = await send_create(
|
public_id, _ = await send_create(
|
||||||
db_session,
|
db_session,
|
||||||
"Note",
|
"Note",
|
||||||
content,
|
content,
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
import enum
|
import enum
|
||||||
|
from datetime import datetime
|
||||||
from typing import Any
|
from typing import Any
|
||||||
from typing import Optional
|
from typing import Optional
|
||||||
from typing import Union
|
from typing import Union
|
||||||
|
@ -54,6 +55,10 @@ class Actor(Base, BaseActor):
|
||||||
is_blocked = Column(Boolean, nullable=False, default=False, server_default="0")
|
is_blocked = Column(Boolean, nullable=False, default=False, server_default="0")
|
||||||
is_deleted = Column(Boolean, nullable=False, default=False, server_default="0")
|
is_deleted = Column(Boolean, nullable=False, default=False, server_default="0")
|
||||||
|
|
||||||
|
are_announces_hidden_from_stream = Column(
|
||||||
|
Boolean, nullable=False, default=False, server_default="0"
|
||||||
|
)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def is_from_db(self) -> bool:
|
def is_from_db(self) -> bool:
|
||||||
return True
|
return True
|
||||||
|
@ -158,6 +163,7 @@ class OutboxObject(Base, BaseObject):
|
||||||
is_hidden_from_homepage = Column(Boolean, nullable=False, default=False)
|
is_hidden_from_homepage = Column(Boolean, nullable=False, default=False)
|
||||||
|
|
||||||
public_id = Column(String, nullable=False, index=True)
|
public_id = Column(String, nullable=False, index=True)
|
||||||
|
slug = Column(String, nullable=True, index=True)
|
||||||
|
|
||||||
ap_type = Column(String, nullable=False, index=True)
|
ap_type = Column(String, nullable=False, index=True)
|
||||||
ap_id: Mapped[str] = Column(String, nullable=False, unique=True, index=True)
|
ap_id: Mapped[str] = Column(String, nullable=False, unique=True, index=True)
|
||||||
|
@ -250,6 +256,8 @@ class OutboxObject(Base, BaseObject):
|
||||||
"mediaType": attachment.upload.content_type,
|
"mediaType": attachment.upload.content_type,
|
||||||
"name": attachment.alt or attachment.filename,
|
"name": attachment.alt or attachment.filename,
|
||||||
"url": url,
|
"url": url,
|
||||||
|
"width": attachment.upload.width,
|
||||||
|
"height": attachment.upload.height,
|
||||||
"proxiedUrl": url,
|
"proxiedUrl": url,
|
||||||
"resizedUrl": BASE_URL
|
"resizedUrl": BASE_URL
|
||||||
+ (
|
+ (
|
||||||
|
@ -281,6 +289,13 @@ class OutboxObject(Base, BaseObject):
|
||||||
def is_from_outbox(self) -> bool:
|
def is_from_outbox(self) -> bool:
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
@property
|
||||||
|
def url(self) -> str | None:
|
||||||
|
# XXX: rewrite old URL here for compat
|
||||||
|
if self.ap_type == "Article" and self.slug and self.public_id:
|
||||||
|
return f"{BASE_URL}/articles/{self.public_id[:7]}/{self.slug}"
|
||||||
|
return super().url
|
||||||
|
|
||||||
|
|
||||||
class Follower(Base):
|
class Follower(Base):
|
||||||
__tablename__ = "follower"
|
__tablename__ = "follower"
|
||||||
|
@ -422,7 +437,7 @@ class OutboxObjectAttachment(Base):
|
||||||
outbox_object_id = Column(Integer, ForeignKey("outbox.id"), nullable=False)
|
outbox_object_id = Column(Integer, ForeignKey("outbox.id"), nullable=False)
|
||||||
|
|
||||||
upload_id = Column(Integer, ForeignKey("upload.id"), nullable=False)
|
upload_id = Column(Integer, ForeignKey("upload.id"), nullable=False)
|
||||||
upload = relationship(Upload, uselist=False)
|
upload: Mapped["Upload"] = relationship(Upload, uselist=False)
|
||||||
|
|
||||||
|
|
||||||
class IndieAuthAuthorizationRequest(Base):
|
class IndieAuthAuthorizationRequest(Base):
|
||||||
|
@ -445,17 +460,53 @@ class IndieAuthAccessToken(Base):
|
||||||
__tablename__ = "indieauth_access_token"
|
__tablename__ = "indieauth_access_token"
|
||||||
|
|
||||||
id = Column(Integer, primary_key=True, index=True)
|
id = Column(Integer, primary_key=True, index=True)
|
||||||
created_at = Column(DateTime(timezone=True), nullable=False, default=now)
|
created_at: Mapped[datetime] = Column(
|
||||||
|
DateTime(timezone=True), nullable=False, default=now
|
||||||
|
)
|
||||||
|
|
||||||
# Will be null for personal access tokens
|
# Will be null for personal access tokens
|
||||||
indieauth_authorization_request_id = Column(
|
indieauth_authorization_request_id = Column(
|
||||||
Integer, ForeignKey("indieauth_authorization_request.id"), nullable=True
|
Integer, ForeignKey("indieauth_authorization_request.id"), nullable=True
|
||||||
)
|
)
|
||||||
|
indieauth_authorization_request = relationship(
|
||||||
|
IndieAuthAuthorizationRequest,
|
||||||
|
uselist=False,
|
||||||
|
)
|
||||||
|
|
||||||
access_token = Column(String, nullable=False, unique=True, index=True)
|
access_token: Mapped[str] = Column(String, nullable=False, unique=True, index=True)
|
||||||
expires_in = Column(Integer, nullable=False)
|
refresh_token = Column(String, nullable=True, unique=True, index=True)
|
||||||
|
expires_in: Mapped[int] = Column(Integer, nullable=False)
|
||||||
scope = Column(String, nullable=False)
|
scope = Column(String, nullable=False)
|
||||||
is_revoked = Column(Boolean, nullable=False, default=False)
|
is_revoked = Column(Boolean, nullable=False, default=False)
|
||||||
|
was_refreshed = Column(Boolean, nullable=False, default=False, server_default="0")
|
||||||
|
|
||||||
|
|
||||||
|
class OAuthClient(Base):
|
||||||
|
__tablename__ = "oauth_client"
|
||||||
|
|
||||||
|
id = Column(Integer, primary_key=True, index=True)
|
||||||
|
created_at = Column(DateTime(timezone=True), nullable=False, default=now)
|
||||||
|
|
||||||
|
# Request
|
||||||
|
client_name = Column(String, nullable=False)
|
||||||
|
redirect_uris: Mapped[list[str]] = Column(JSON, nullable=True)
|
||||||
|
|
||||||
|
# Optional from request
|
||||||
|
client_uri = Column(String, nullable=True)
|
||||||
|
logo_uri = Column(String, nullable=True)
|
||||||
|
scope = Column(String, nullable=True)
|
||||||
|
|
||||||
|
# Response
|
||||||
|
client_id = Column(String, nullable=False, unique=True, index=True)
|
||||||
|
client_secret = Column(String, nullable=False, unique=True)
|
||||||
|
|
||||||
|
|
||||||
|
@enum.unique
|
||||||
|
class WebmentionType(str, enum.Enum):
|
||||||
|
UNKNOWN = "unknown"
|
||||||
|
LIKE = "like"
|
||||||
|
REPLY = "reply"
|
||||||
|
REPOST = "repost"
|
||||||
|
|
||||||
|
|
||||||
class Webmention(Base):
|
class Webmention(Base):
|
||||||
|
@ -474,6 +525,8 @@ class Webmention(Base):
|
||||||
outbox_object_id = Column(Integer, ForeignKey("outbox.id"), nullable=False)
|
outbox_object_id = Column(Integer, ForeignKey("outbox.id"), nullable=False)
|
||||||
outbox_object = relationship(OutboxObject, uselist=False)
|
outbox_object = relationship(OutboxObject, uselist=False)
|
||||||
|
|
||||||
|
webmention_type = Column(Enum(WebmentionType), nullable=True)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def as_facepile_item(self) -> webmentions.Webmention | None:
|
def as_facepile_item(self) -> webmentions.Webmention | None:
|
||||||
if not self.source_microformats:
|
if not self.source_microformats:
|
||||||
|
@ -483,6 +536,7 @@ class Webmention(Base):
|
||||||
self.source_microformats["items"], self.source
|
self.source_microformats["items"], self.source
|
||||||
)
|
)
|
||||||
except Exception:
|
except Exception:
|
||||||
|
# TODO: return a facepile with the unknown image
|
||||||
logger.warning(
|
logger.warning(
|
||||||
f"Failed to generate facefile item for Webmention id={self.id}"
|
f"Failed to generate facefile item for Webmention id={self.id}"
|
||||||
)
|
)
|
||||||
|
@ -551,6 +605,14 @@ class NotificationType(str, enum.Enum):
|
||||||
UPDATED_WEBMENTION = "updated_webmention"
|
UPDATED_WEBMENTION = "updated_webmention"
|
||||||
DELETED_WEBMENTION = "deleted_webmention"
|
DELETED_WEBMENTION = "deleted_webmention"
|
||||||
|
|
||||||
|
# incoming
|
||||||
|
BLOCKED = "blocked"
|
||||||
|
UNBLOCKED = "unblocked"
|
||||||
|
|
||||||
|
# outgoing
|
||||||
|
BLOCK = "block"
|
||||||
|
UNBLOCK = "unblock"
|
||||||
|
|
||||||
|
|
||||||
class Notification(Base):
|
class Notification(Base):
|
||||||
__tablename__ = "notifications"
|
__tablename__ = "notifications"
|
||||||
|
|
|
@ -151,7 +151,7 @@ def _set_next_try(
|
||||||
if not outgoing_activity.tries:
|
if not outgoing_activity.tries:
|
||||||
raise ValueError("Should never happen")
|
raise ValueError("Should never happen")
|
||||||
|
|
||||||
if outgoing_activity.tries == _MAX_RETRIES:
|
if outgoing_activity.tries >= _MAX_RETRIES:
|
||||||
outgoing_activity.is_errored = True
|
outgoing_activity.is_errored = True
|
||||||
outgoing_activity.next_try = None
|
outgoing_activity.next_try = None
|
||||||
else:
|
else:
|
||||||
|
|
|
@ -102,6 +102,8 @@ async def _prune_old_inbox_objects(
|
||||||
models.InboxObject.ap_type.in_(["Note"]),
|
models.InboxObject.ap_type.in_(["Note"]),
|
||||||
)
|
)
|
||||||
),
|
),
|
||||||
|
# Keep Move object as they are linked to notifications
|
||||||
|
models.InboxObject.ap_type.not_in(["Move"]),
|
||||||
# Filter by retention days
|
# Filter by retention days
|
||||||
models.InboxObject.ap_published_at
|
models.InboxObject.ap_published_at
|
||||||
< now() - timedelta(days=INBOX_RETENTION_DAYS),
|
< now() - timedelta(days=INBOX_RETENTION_DAYS),
|
||||||
|
|
28
app/redirect.py
Normal file
28
app/redirect.py
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
from fastapi import Request
|
||||||
|
|
||||||
|
from app import templates
|
||||||
|
from app.database import AsyncSession
|
||||||
|
|
||||||
|
|
||||||
|
async def redirect(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession,
|
||||||
|
url: str,
|
||||||
|
) -> templates.TemplateResponse:
|
||||||
|
"""
|
||||||
|
Similar to RedirectResponse, but uses a 200 response with HTML.
|
||||||
|
|
||||||
|
Needed for remote redirects on form submission endpoints,
|
||||||
|
since our CSP policy disallows remote form submission.
|
||||||
|
https://github.com/w3c/webappsec-csp/issues/8#issuecomment-810108984
|
||||||
|
"""
|
||||||
|
return await templates.render_template(
|
||||||
|
db_session,
|
||||||
|
request,
|
||||||
|
"redirect.html",
|
||||||
|
{
|
||||||
|
"request": request,
|
||||||
|
"url": url,
|
||||||
|
},
|
||||||
|
headers={"Refresh": "0;url=" + url},
|
||||||
|
)
|
|
@ -51,17 +51,20 @@ $code-highlight-background: #f0f0f0;
|
||||||
.p-summary {
|
.p-summary {
|
||||||
display: inline-block;
|
display: inline-block;
|
||||||
}
|
}
|
||||||
label {
|
.show-more-btn {
|
||||||
margin-left: 5px;
|
margin-left: 5px;
|
||||||
}
|
}
|
||||||
.show-more-state {
|
summary {
|
||||||
display: none;
|
display: inline-block;
|
||||||
}
|
}
|
||||||
.show-more-state ~ .obj-content {
|
summary::-webkit-details-marker {
|
||||||
margin-top: 0;
|
display: none
|
||||||
}
|
}
|
||||||
.show-more-state:checked ~ .obj-content {
|
&:not([open]) .show-more-btn::after {
|
||||||
display: none;
|
content: 'show more';
|
||||||
|
}
|
||||||
|
&[open] .show-more-btn::after {
|
||||||
|
content: 'show less';
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
.sensitive-attachment {
|
.sensitive-attachment {
|
||||||
|
@ -388,7 +391,7 @@ nav.flexbox {
|
||||||
margin-right: 0px;
|
margin-right: 0px;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
a {
|
a:not(.label-btn) {
|
||||||
color: $primary-color;
|
color: $primary-color;
|
||||||
text-decoration: none;
|
text-decoration: none;
|
||||||
&:hover, &:active {
|
&:hover, &:active {
|
||||||
|
@ -396,25 +399,31 @@ nav.flexbox {
|
||||||
text-decoration: underline;
|
text-decoration: underline;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
a.active {
|
a.active:not(.label-btn) {
|
||||||
color: $secondary-color;
|
color: $secondary-color;
|
||||||
font-weight: bold;
|
font-weight: bold;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// after nav.flexbox to override default behavior
|
||||||
|
a.label-btn {
|
||||||
|
color: $form-text-color;
|
||||||
|
&:hover {
|
||||||
|
text-decoration: none;
|
||||||
|
color: $form-text-color;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
.ap-object {
|
.ap-object {
|
||||||
margin: 15px 0;
|
margin: 15px 0;
|
||||||
padding: 20px;
|
padding: 20px;
|
||||||
.in-reply-to {
|
|
||||||
color: $muted-color;
|
|
||||||
&:hover {
|
|
||||||
color: $secondary-color;
|
|
||||||
text-decoration: underline;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
nav {
|
nav {
|
||||||
color: $muted-color;
|
color: $muted-color;
|
||||||
}
|
}
|
||||||
|
.in-reply-to {
|
||||||
|
display: inline;
|
||||||
|
color: $muted-color;
|
||||||
|
}
|
||||||
.e-content, .activity-og-meta {
|
.e-content, .activity-og-meta {
|
||||||
a:hover {
|
a:hover {
|
||||||
text-decoration: underline;
|
text-decoration: underline;
|
||||||
|
@ -423,8 +432,7 @@ nav.flexbox {
|
||||||
.activity-attachment {
|
.activity-attachment {
|
||||||
margin: 30px 0 20px 0;
|
margin: 30px 0 20px 0;
|
||||||
img, audio, video {
|
img, audio, video {
|
||||||
width: 100%;
|
max-width: calc(min(740px, 100%));
|
||||||
max-width: 740px;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
img.inline-img {
|
img.inline-img {
|
||||||
|
@ -450,7 +458,7 @@ nav.flexbox {
|
||||||
border: 2px dashed $secondary-color;
|
border: 2px dashed $secondary-color;
|
||||||
}
|
}
|
||||||
|
|
||||||
.error-box {
|
.error-box, .scolor {
|
||||||
color: $secondary-color;
|
color: $secondary-color;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -461,6 +469,9 @@ nav.flexbox {
|
||||||
span {
|
span {
|
||||||
color: $muted-color;
|
color: $muted-color;
|
||||||
}
|
}
|
||||||
|
span.new {
|
||||||
|
color: $secondary-color;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
.actor-metadata {
|
.actor-metadata {
|
||||||
color: $muted-color;
|
color: $muted-color;
|
||||||
|
@ -525,3 +536,36 @@ nav.flexbox {
|
||||||
text-decoration: underline;
|
text-decoration: underline;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
.ap-place {
|
||||||
|
h3 {
|
||||||
|
display: inline;
|
||||||
|
font-weight: normal;
|
||||||
|
}
|
||||||
|
h3::after {
|
||||||
|
content: ': ';
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
.margin-top-20 {
|
||||||
|
margin-top: 20px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.video-wrapper {
|
||||||
|
position: relative;
|
||||||
|
}
|
||||||
|
|
||||||
|
.video-gif-overlay {
|
||||||
|
display: none;
|
||||||
|
}
|
||||||
|
|
||||||
|
.video-gif-mode + .video-gif-overlay {
|
||||||
|
display: block;
|
||||||
|
position: absolute;
|
||||||
|
top: 5px;
|
||||||
|
left: 5px;
|
||||||
|
padding: 0 3px;
|
||||||
|
font-size: 0.8em;
|
||||||
|
background: rgba(0,0,0,.5);
|
||||||
|
color: #fff;
|
||||||
|
}
|
||||||
|
|
224
app/source.py
224
app/source.py
|
@ -1,74 +1,178 @@
|
||||||
import re
|
import re
|
||||||
import typing
|
import typing
|
||||||
|
|
||||||
from markdown import markdown
|
from loguru import logger
|
||||||
|
from mistletoe import Document # type: ignore
|
||||||
|
from mistletoe.block_token import CodeFence # type: ignore
|
||||||
|
from mistletoe.html_renderer import HTMLRenderer # type: ignore
|
||||||
|
from mistletoe.span_token import SpanToken # type: ignore
|
||||||
|
from pygments.formatters import HtmlFormatter # type: ignore
|
||||||
|
from pygments.lexers import get_lexer_by_name as get_lexer # type: ignore
|
||||||
|
from pygments.util import ClassNotFound # type: ignore
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
|
|
||||||
from app import webfinger
|
from app import webfinger
|
||||||
from app.config import BASE_URL
|
from app.config import BASE_URL
|
||||||
|
from app.config import CODE_HIGHLIGHTING_THEME
|
||||||
from app.database import AsyncSession
|
from app.database import AsyncSession
|
||||||
from app.utils import emoji
|
from app.utils import emoji
|
||||||
|
|
||||||
if typing.TYPE_CHECKING:
|
if typing.TYPE_CHECKING:
|
||||||
from app.actor import Actor
|
from app.actor import Actor
|
||||||
|
|
||||||
|
_FORMATTER = HtmlFormatter(style=CODE_HIGHLIGHTING_THEME)
|
||||||
def _set_a_attrs(attrs, new=False):
|
|
||||||
attrs[(None, "target")] = "_blank"
|
|
||||||
attrs[(None, "class")] = "external"
|
|
||||||
attrs[(None, "rel")] = "noopener"
|
|
||||||
attrs[(None, "title")] = attrs[(None, "href")]
|
|
||||||
return attrs
|
|
||||||
|
|
||||||
|
|
||||||
_HASHTAG_REGEX = re.compile(r"(#[\d\w]+)")
|
_HASHTAG_REGEX = re.compile(r"(#[\d\w]+)")
|
||||||
_MENTION_REGEX = re.compile(r"@[\d\w_.+-]+@[\d\w-]+\.[\d\w\-.]+")
|
_MENTION_REGEX = re.compile(r"(@[\d\w_.+-]+@[\d\w-]+\.[\d\w\-.]+)")
|
||||||
|
_URL_REGEX = re.compile(
|
||||||
|
"(https?:\\/\\/(?:www\\.)?[-a-zA-Z0-9@:%._\\+~#=]{1,256}\\.[a-zA-Z0-9()]{1,6}\\b(?:[-a-zA-Z0-9()@:%_\\+.~#?&\\/=]*))" # noqa: E501
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def hashtagify(content: str) -> tuple[str, list[dict[str, str]]]:
|
class AutoLink(SpanToken):
|
||||||
tags = []
|
parse_inner = False
|
||||||
hashtags = re.findall(_HASHTAG_REGEX, content)
|
precedence = 1
|
||||||
hashtags = sorted(set(hashtags), reverse=True) # unique tags, longest first
|
pattern = _URL_REGEX
|
||||||
for hashtag in hashtags:
|
|
||||||
tag = hashtag[1:]
|
def __init__(self, match_obj: re.Match) -> None:
|
||||||
link = f'<a href="{BASE_URL}/t/{tag}" class="mention hashtag" rel="tag">#<span>{tag}</span></a>' # noqa: E501
|
self.target = match_obj.group()
|
||||||
tags.append(dict(href=f"{BASE_URL}/t/{tag}", name=hashtag, type="Hashtag"))
|
|
||||||
content = content.replace(hashtag, link)
|
|
||||||
return content, tags
|
|
||||||
|
|
||||||
|
|
||||||
async def _mentionify(
|
class Mention(SpanToken):
|
||||||
|
parse_inner = False
|
||||||
|
precedence = 10
|
||||||
|
pattern = _MENTION_REGEX
|
||||||
|
|
||||||
|
def __init__(self, match_obj: re.Match) -> None:
|
||||||
|
self.target = match_obj.group()
|
||||||
|
|
||||||
|
|
||||||
|
class Hashtag(SpanToken):
|
||||||
|
parse_inner = False
|
||||||
|
precedence = 10
|
||||||
|
pattern = _HASHTAG_REGEX
|
||||||
|
|
||||||
|
def __init__(self, match_obj: re.Match) -> None:
|
||||||
|
self.target = match_obj.group()
|
||||||
|
|
||||||
|
|
||||||
|
class CustomRenderer(HTMLRenderer):
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
mentioned_actors: dict[str, "Actor"] = {},
|
||||||
|
enable_mentionify: bool = True,
|
||||||
|
enable_hashtagify: bool = True,
|
||||||
|
) -> None:
|
||||||
|
extra_tokens = []
|
||||||
|
if enable_mentionify:
|
||||||
|
extra_tokens.append(Mention)
|
||||||
|
if enable_hashtagify:
|
||||||
|
extra_tokens.append(Hashtag)
|
||||||
|
super().__init__(AutoLink, *extra_tokens)
|
||||||
|
|
||||||
|
self.tags: list[dict[str, str]] = []
|
||||||
|
self.mentioned_actors = mentioned_actors
|
||||||
|
|
||||||
|
def render_auto_link(self, token: AutoLink) -> str:
|
||||||
|
template = '<a href="{target}" rel="noopener">{inner}</a>'
|
||||||
|
target = self.escape_url(token.target)
|
||||||
|
return template.format(target=target, inner=target)
|
||||||
|
|
||||||
|
def render_mention(self, token: Mention) -> str:
|
||||||
|
mention = token.target
|
||||||
|
suffix = ""
|
||||||
|
if mention.endswith("."):
|
||||||
|
mention = mention[:-1]
|
||||||
|
suffix = "."
|
||||||
|
actor = self.mentioned_actors.get(mention)
|
||||||
|
if not actor:
|
||||||
|
return mention
|
||||||
|
|
||||||
|
self.tags.append(dict(type="Mention", href=actor.ap_id, name=mention))
|
||||||
|
|
||||||
|
link = f'<span class="h-card"><a href="{actor.url}" class="u-url mention">{actor.handle}</a></span>{suffix}' # noqa: E501
|
||||||
|
return link
|
||||||
|
|
||||||
|
def render_hashtag(self, token: Hashtag) -> str:
|
||||||
|
tag = token.target[1:]
|
||||||
|
link = f'<a href="{BASE_URL}/t/{tag.lower()}" class="mention hashtag" rel="tag">#<span>{tag}</span></a>' # noqa: E501
|
||||||
|
self.tags.append(
|
||||||
|
dict(
|
||||||
|
href=f"{BASE_URL}/t/{tag.lower()}",
|
||||||
|
name=token.target.lower(),
|
||||||
|
type="Hashtag",
|
||||||
|
)
|
||||||
|
)
|
||||||
|
return link
|
||||||
|
|
||||||
|
def render_block_code(self, token: CodeFence) -> str:
|
||||||
|
lexer_attr = ""
|
||||||
|
try:
|
||||||
|
lexer = get_lexer(token.language)
|
||||||
|
lexer_attr = f' data-microblogpub-lexer="{lexer.aliases[0]}"'
|
||||||
|
except ClassNotFound:
|
||||||
|
pass
|
||||||
|
|
||||||
|
code = token.children[0].content
|
||||||
|
return f"<pre><code{lexer_attr}>\n{code}\n</code></pre>"
|
||||||
|
|
||||||
|
|
||||||
|
async def _prefetch_mentioned_actors(
|
||||||
db_session: AsyncSession,
|
db_session: AsyncSession,
|
||||||
content: str,
|
content: str,
|
||||||
) -> tuple[str, list[dict[str, str]], list["Actor"]]:
|
) -> dict[str, "Actor"]:
|
||||||
from app import models
|
from app import models
|
||||||
from app.actor import fetch_actor
|
from app.actor import fetch_actor
|
||||||
|
|
||||||
tags = []
|
actors = {}
|
||||||
mentioned_actors = []
|
|
||||||
for mention in re.findall(_MENTION_REGEX, content):
|
for mention in re.findall(_MENTION_REGEX, content):
|
||||||
_, username, domain = mention.split("@")
|
if mention in actors:
|
||||||
actor = (
|
continue
|
||||||
await db_session.execute(
|
|
||||||
select(models.Actor).where(
|
# XXX: the regex catches stuff like `@toto@example.com.`
|
||||||
models.Actor.handle == mention,
|
if mention.endswith("."):
|
||||||
models.Actor.is_deleted.is_(False),
|
mention = mention[:-1]
|
||||||
|
|
||||||
|
try:
|
||||||
|
_, username, domain = mention.split("@")
|
||||||
|
actor = (
|
||||||
|
await db_session.execute(
|
||||||
|
select(models.Actor).where(
|
||||||
|
models.Actor.handle == mention,
|
||||||
|
models.Actor.is_deleted.is_(False),
|
||||||
|
)
|
||||||
)
|
)
|
||||||
)
|
).scalar_one_or_none()
|
||||||
).scalar_one_or_none()
|
if not actor:
|
||||||
if not actor:
|
actor_url = await webfinger.get_actor_url(mention)
|
||||||
actor_url = await webfinger.get_actor_url(mention)
|
if not actor_url:
|
||||||
if not actor_url:
|
# FIXME(ts): raise an error?
|
||||||
# FIXME(ts): raise an error?
|
continue
|
||||||
continue
|
actor = await fetch_actor(db_session, actor_url)
|
||||||
actor = await fetch_actor(db_session, actor_url)
|
|
||||||
|
|
||||||
mentioned_actors.append(actor)
|
actors[mention] = actor
|
||||||
tags.append(dict(type="Mention", href=actor.ap_id, name=mention))
|
except Exception:
|
||||||
|
logger.exception(f"Failed to prefetch {mention}")
|
||||||
|
|
||||||
link = f'<span class="h-card"><a href="{actor.url}" class="u-url mention">{actor.handle}</a></span>' # noqa: E501
|
return actors
|
||||||
content = content.replace(mention, link)
|
|
||||||
return content, tags, mentioned_actors
|
|
||||||
|
def hashtagify(
|
||||||
|
content: str,
|
||||||
|
) -> tuple[str, list[dict[str, str]]]:
|
||||||
|
tags = []
|
||||||
|
with CustomRenderer(
|
||||||
|
mentioned_actors={},
|
||||||
|
enable_mentionify=False,
|
||||||
|
enable_hashtagify=True,
|
||||||
|
) as renderer:
|
||||||
|
rendered_content = renderer.render(Document(content))
|
||||||
|
tags.extend(renderer.tags)
|
||||||
|
|
||||||
|
# Handle custom emoji
|
||||||
|
tags.extend(emoji.tags(content))
|
||||||
|
|
||||||
|
return rendered_content, tags
|
||||||
|
|
||||||
|
|
||||||
async def markdownify(
|
async def markdownify(
|
||||||
|
@ -82,17 +186,33 @@ async def markdownify(
|
||||||
|
|
||||||
"""
|
"""
|
||||||
tags = []
|
tags = []
|
||||||
mentioned_actors: list["Actor"] = []
|
mentioned_actors: dict[str, "Actor"] = {}
|
||||||
if enable_hashtagify:
|
|
||||||
content, hashtag_tags = hashtagify(content)
|
|
||||||
tags.extend(hashtag_tags)
|
|
||||||
if enable_mentionify:
|
if enable_mentionify:
|
||||||
content, mention_tags, mentioned_actors = await _mentionify(db_session, content)
|
mentioned_actors = await _prefetch_mentioned_actors(db_session, content)
|
||||||
tags.extend(mention_tags)
|
|
||||||
|
with CustomRenderer(
|
||||||
|
mentioned_actors=mentioned_actors,
|
||||||
|
enable_mentionify=enable_mentionify,
|
||||||
|
enable_hashtagify=enable_hashtagify,
|
||||||
|
) as renderer:
|
||||||
|
rendered_content = renderer.render(Document(content))
|
||||||
|
tags.extend(renderer.tags)
|
||||||
|
|
||||||
# Handle custom emoji
|
# Handle custom emoji
|
||||||
tags.extend(emoji.tags(content))
|
tags.extend(emoji.tags(content))
|
||||||
|
|
||||||
content = markdown(content, extensions=["mdx_linkify", "fenced_code"])
|
return rendered_content, dedup_tags(tags), list(mentioned_actors.values())
|
||||||
|
|
||||||
return content, tags, mentioned_actors
|
|
||||||
|
def dedup_tags(tags: list[dict[str, str]]) -> list[dict[str, str]]:
|
||||||
|
idx = set()
|
||||||
|
deduped_tags = []
|
||||||
|
for tag in tags:
|
||||||
|
tag_idx = (tag["type"], tag["name"])
|
||||||
|
if tag_idx in idx:
|
||||||
|
continue
|
||||||
|
|
||||||
|
idx.add(tag_idx)
|
||||||
|
deduped_tags.append(tag)
|
||||||
|
|
||||||
|
return deduped_tags
|
||||||
|
|
32
app/static/common.js
Normal file
32
app/static/common.js
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
function hasAudio (video) {
|
||||||
|
return video.mozHasAudio ||
|
||||||
|
Boolean(video.webkitAudioDecodedByteCount) ||
|
||||||
|
Boolean(video.audioTracks && video.audioTracks.length);
|
||||||
|
}
|
||||||
|
|
||||||
|
function setVideoInGIFMode(video) {
|
||||||
|
if (!hasAudio(video)) {
|
||||||
|
if (typeof video.loop == 'boolean' && video.duration <= 10.0) {
|
||||||
|
video.classList.add("video-gif-mode");
|
||||||
|
video.loop = true;
|
||||||
|
video.controls = false;
|
||||||
|
video.addEventListener("mouseover", () => {
|
||||||
|
video.play();
|
||||||
|
})
|
||||||
|
video.addEventListener("mouseleave", () => {
|
||||||
|
video.pause();
|
||||||
|
})
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
var items = document.getElementsByTagName("video")
|
||||||
|
for (var i = 0; i < items.length; i++) {
|
||||||
|
if (items[i].duration) {
|
||||||
|
setVideoInGIFMode(items[i]);
|
||||||
|
} else {
|
||||||
|
items[i].addEventListener("loadeddata", function() {
|
||||||
|
setVideoInGIFMode(this);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,4 +1,3 @@
|
||||||
import base64
|
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
from datetime import timezone
|
from datetime import timezone
|
||||||
from functools import lru_cache
|
from functools import lru_cache
|
||||||
|
@ -28,6 +27,7 @@ from app.ap_object import Object
|
||||||
from app.config import BASE_URL
|
from app.config import BASE_URL
|
||||||
from app.config import CUSTOM_FOOTER
|
from app.config import CUSTOM_FOOTER
|
||||||
from app.config import DEBUG
|
from app.config import DEBUG
|
||||||
|
from app.config import SESSION_TIMEOUT
|
||||||
from app.config import VERSION
|
from app.config import VERSION
|
||||||
from app.config import generate_csrf_token
|
from app.config import generate_csrf_token
|
||||||
from app.config import session_serializer
|
from app.config import session_serializer
|
||||||
|
@ -39,7 +39,7 @@ from app.utils.highlight import HIGHLIGHT_CSS
|
||||||
from app.utils.highlight import highlight
|
from app.utils.highlight import highlight
|
||||||
|
|
||||||
_templates = Jinja2Templates(
|
_templates = Jinja2Templates(
|
||||||
directory="app/templates",
|
directory=["data/templates", "app/templates"], # type: ignore # bad typing
|
||||||
trim_blocks=True,
|
trim_blocks=True,
|
||||||
lstrip_blocks=True,
|
lstrip_blocks=True,
|
||||||
)
|
)
|
||||||
|
@ -59,13 +59,8 @@ def _filter_domain(text: str) -> str:
|
||||||
|
|
||||||
def _media_proxy_url(url: str | None) -> str:
|
def _media_proxy_url(url: str | None) -> str:
|
||||||
if not url:
|
if not url:
|
||||||
return "/static/nopic.png"
|
return BASE_URL + "/static/nopic.png"
|
||||||
|
return proxied_media_url(url)
|
||||||
if url.startswith(BASE_URL):
|
|
||||||
return url
|
|
||||||
|
|
||||||
encoded_url = base64.urlsafe_b64encode(url.encode()).decode()
|
|
||||||
return f"/proxy/media/{encoded_url}"
|
|
||||||
|
|
||||||
|
|
||||||
def is_current_user_admin(request: Request) -> bool:
|
def is_current_user_admin(request: Request) -> bool:
|
||||||
|
@ -75,10 +70,10 @@ def is_current_user_admin(request: Request) -> bool:
|
||||||
try:
|
try:
|
||||||
loaded_session = session_serializer.loads(
|
loaded_session = session_serializer.loads(
|
||||||
session_cookie,
|
session_cookie,
|
||||||
max_age=3600 * 12,
|
max_age=SESSION_TIMEOUT,
|
||||||
)
|
)
|
||||||
except Exception:
|
except Exception:
|
||||||
pass
|
logger.exception("Failed to validate session timeout")
|
||||||
else:
|
else:
|
||||||
is_admin = loaded_session.get("is_logged_in")
|
is_admin = loaded_session.get("is_logged_in")
|
||||||
|
|
||||||
|
@ -91,6 +86,7 @@ async def render_template(
|
||||||
template: str,
|
template: str,
|
||||||
template_args: dict[str, Any] | None = None,
|
template_args: dict[str, Any] | None = None,
|
||||||
status_code: int = 200,
|
status_code: int = 200,
|
||||||
|
headers: dict[str, str] | None = None,
|
||||||
) -> TemplateResponse:
|
) -> TemplateResponse:
|
||||||
if template_args is None:
|
if template_args is None:
|
||||||
template_args = {}
|
template_args = {}
|
||||||
|
@ -135,6 +131,7 @@ async def render_template(
|
||||||
**template_args,
|
**template_args,
|
||||||
},
|
},
|
||||||
status_code=status_code,
|
status_code=status_code,
|
||||||
|
headers=headers,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -291,6 +288,10 @@ ALLOWED_ATTRIBUTES: dict[str, list[str] | Callable[[str, str, str], bool]] = {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def _allow_all_attributes(tag: Any, name: Any, value: Any) -> bool:
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
@lru_cache(maxsize=256)
|
@lru_cache(maxsize=256)
|
||||||
def _update_inline_imgs(content):
|
def _update_inline_imgs(content):
|
||||||
soup = BeautifulSoup(content, "html5lib")
|
soup = BeautifulSoup(content, "html5lib")
|
||||||
|
@ -320,7 +321,11 @@ def _clean_html(html: str, note: Object) -> str:
|
||||||
_update_inline_imgs(highlight(html))
|
_update_inline_imgs(highlight(html))
|
||||||
),
|
),
|
||||||
tags=ALLOWED_TAGS,
|
tags=ALLOWED_TAGS,
|
||||||
attributes=ALLOWED_ATTRIBUTES,
|
attributes=(
|
||||||
|
_allow_all_attributes
|
||||||
|
if note.ap_id.startswith(config.ID)
|
||||||
|
else ALLOWED_ATTRIBUTES
|
||||||
|
),
|
||||||
strip=True,
|
strip=True,
|
||||||
),
|
),
|
||||||
note,
|
note,
|
||||||
|
@ -331,6 +336,14 @@ def _clean_html(html: str, note: Object) -> str:
|
||||||
raise
|
raise
|
||||||
|
|
||||||
|
|
||||||
|
def _clean_html_wm(html: str) -> str:
|
||||||
|
return bleach.clean(
|
||||||
|
html,
|
||||||
|
attributes=ALLOWED_ATTRIBUTES,
|
||||||
|
strip=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def _timeago(original_dt: datetime) -> str:
|
def _timeago(original_dt: datetime) -> str:
|
||||||
dt = original_dt
|
dt = original_dt
|
||||||
if dt.tzinfo:
|
if dt.tzinfo:
|
||||||
|
@ -380,7 +393,7 @@ def _html2text(content: str) -> str:
|
||||||
|
|
||||||
def _replace_emoji(u: str, _) -> str:
|
def _replace_emoji(u: str, _) -> str:
|
||||||
filename = "-".join(hex(ord(c))[2:] for c in u)
|
filename = "-".join(hex(ord(c))[2:] for c in u)
|
||||||
return config.EMOJI_TPL.format(filename=filename, raw=u)
|
return config.EMOJI_TPL.format(base_url=BASE_URL, filename=filename, raw=u)
|
||||||
|
|
||||||
|
|
||||||
def _emojify(text: str, is_local: bool) -> str:
|
def _emojify(text: str, is_local: bool) -> str:
|
||||||
|
@ -407,6 +420,7 @@ def _poll_item_pct(item: ap.RawObject, voters_count: int) -> int:
|
||||||
_templates.env.filters["domain"] = _filter_domain
|
_templates.env.filters["domain"] = _filter_domain
|
||||||
_templates.env.filters["media_proxy_url"] = _media_proxy_url
|
_templates.env.filters["media_proxy_url"] = _media_proxy_url
|
||||||
_templates.env.filters["clean_html"] = _clean_html
|
_templates.env.filters["clean_html"] = _clean_html
|
||||||
|
_templates.env.filters["clean_html_wm"] = _clean_html_wm
|
||||||
_templates.env.filters["timeago"] = _timeago
|
_templates.env.filters["timeago"] = _timeago
|
||||||
_templates.env.filters["format_date"] = _format_date
|
_templates.env.filters["format_date"] = _format_date
|
||||||
_templates.env.filters["has_media_type"] = _has_media_type
|
_templates.env.filters["has_media_type"] = _has_media_type
|
||||||
|
@ -421,3 +435,5 @@ _templates.env.globals["CSS_HASH"] = config.CSS_HASH
|
||||||
_templates.env.globals["BASE_URL"] = config.BASE_URL
|
_templates.env.globals["BASE_URL"] = config.BASE_URL
|
||||||
_templates.env.globals["HIDES_FOLLOWERS"] = config.HIDES_FOLLOWERS
|
_templates.env.globals["HIDES_FOLLOWERS"] = config.HIDES_FOLLOWERS
|
||||||
_templates.env.globals["HIDES_FOLLOWING"] = config.HIDES_FOLLOWING
|
_templates.env.globals["HIDES_FOLLOWING"] = config.HIDES_FOLLOWING
|
||||||
|
_templates.env.globals["NAVBAR_ITEMS"] = config.NavBarItems
|
||||||
|
_templates.env.globals["ICON_URL"] = config.CONFIG.icon_url
|
||||||
|
|
|
@ -90,5 +90,5 @@
|
||||||
</p>
|
</p>
|
||||||
</form>
|
</form>
|
||||||
</div>
|
</div>
|
||||||
<script src="/static/new.js?v={{ JS_HASH }}"></script>
|
<script src="{{ BASE_URL }}/static/new.js?v={{ JS_HASH }}"></script>
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
|
@ -12,18 +12,16 @@
|
||||||
{% for outbox_object in outbox %}
|
{% for outbox_object in outbox %}
|
||||||
|
|
||||||
{% if outbox_object.ap_type == "Announce" %}
|
{% if outbox_object.ap_type == "Announce" %}
|
||||||
<div class="actor-action">You shared</div>
|
<div class="actor-action">You shared <span title="{{ outbox_object.ap_published_at.isoformat() }}">{{ outbox_object.ap_published_at | timeago }}</span></div>
|
||||||
{{ utils.display_object(outbox_object.relates_to_anybox_object) }}
|
{{ utils.display_object(outbox_object.relates_to_anybox_object) }}
|
||||||
{% elif outbox_object.ap_type == "Like" %}
|
{% elif outbox_object.ap_type == "Like" %}
|
||||||
<div class="actor-action">You liked</div>
|
<div class="actor-action">You liked <span title="{{ outbox_object.ap_published_at.isoformat() }}">{{ outbox_object.ap_published_at | timeago }}</span></div>
|
||||||
{{ utils.display_object(outbox_object.relates_to_anybox_object) }}
|
{{ utils.display_object(outbox_object.relates_to_anybox_object) }}
|
||||||
{% elif outbox_object.ap_type == "Follow" %}
|
{% elif outbox_object.ap_type == "Follow" %}
|
||||||
<div class="actor-action">You followed</div>
|
<div class="actor-action">You followed <span title="{{ outbox_object.ap_published_at.isoformat() }}">{{ outbox_object.ap_published_at | timeago }}</span></div>
|
||||||
{{ utils.display_actor(outbox_object.relates_to_actor, actors_metadata) }}
|
{{ utils.display_actor(outbox_object.relates_to_actor, actors_metadata) }}
|
||||||
{% elif outbox_object.ap_type in ["Article", "Note", "Video", "Question"] %}
|
{% elif outbox_object.ap_type in ["Article", "Note", "Video", "Question"] %}
|
||||||
{{ utils.display_object(outbox_object) }}
|
{{ utils.display_object(outbox_object) }}
|
||||||
{% else %}
|
|
||||||
Implement {{ outbox_object.ap_type }}
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|
|
@ -11,8 +11,8 @@
|
||||||
<ul class="h-feed" id="articles">
|
<ul class="h-feed" id="articles">
|
||||||
<data class="p-name" value="{{ local_actor.display_name}}'s articles"></data>
|
<data class="p-name" value="{{ local_actor.display_name}}'s articles"></data>
|
||||||
{% for outbox_object in objects %}
|
{% for outbox_object in objects %}
|
||||||
<li>
|
<li class="h-entry">
|
||||||
<span class="muted">{{ outbox_object.ap_published_at.strftime("%b %d, %Y") }}</span> <a href="{{ outbox_object.url }}">{{ outbox_object.name }}</a>
|
<time class="muted dt-published" datetime="{{ outbox_object.ap_published_at.isoformat() }}">{{ outbox_object.ap_published_at.strftime("%b %d, %Y") }}</time> <a href="{{ outbox_object.url }}" class="u-url u-uid p-name">{{ outbox_object.name }}</a>
|
||||||
</li>
|
</li>
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
</ul>
|
</ul>
|
||||||
|
|
30
app/templates/custom_page.html
Normal file
30
app/templates/custom_page.html
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
{%- import "utils.html" as utils with context -%}
|
||||||
|
{% extends "layout.html" %}
|
||||||
|
|
||||||
|
{% block head %}
|
||||||
|
<title>{{ title }}</title>
|
||||||
|
{% if request.url.path == "/" %}
|
||||||
|
<link rel="indieauth-metadata" href="{{ url_for("well_known_authorization_server") }}">
|
||||||
|
<link rel="authorization_endpoint" href="{{ url_for("indieauth_authorization_endpoint") }}">
|
||||||
|
<link rel="token_endpoint" href="{{ url_for("indieauth_token_endpoint") }}">
|
||||||
|
<link rel="micropub" href="{{ url_for("micropub_endpoint") }}">
|
||||||
|
<link rel="alternate" href="{{ local_actor.url }}" title="ActivityPub profile" type="application/activity+json">
|
||||||
|
<meta content="profile" property="og:type" />
|
||||||
|
<meta content="{{ local_actor.url }}" property="og:url" />
|
||||||
|
<meta content="{{ local_actor.display_name }}'s microblog" property="og:site_name" />
|
||||||
|
<meta content="Homepage" property="og:title" />
|
||||||
|
<meta content="{{ local_actor.summary | html2text | trim }}" property="og:description" />
|
||||||
|
<meta content="{{ ICON_URL }}" property="og:image" />
|
||||||
|
<meta content="summary" property="twitter:card" />
|
||||||
|
<meta content="{{ local_actor.handle }}" property="profile:username" />
|
||||||
|
{% endif %}
|
||||||
|
{% endblock %}
|
||||||
|
|
||||||
|
{% block content %}
|
||||||
|
{% include "header.html" %}
|
||||||
|
|
||||||
|
<div class="box">
|
||||||
|
{{ page_content | safe }}
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{% endblock %}
|
|
@ -3,6 +3,7 @@
|
||||||
|
|
||||||
{% block head %}
|
{% block head %}
|
||||||
<title>{{ local_actor.display_name }}'s followers</title>
|
<title>{{ local_actor.display_name }}'s followers</title>
|
||||||
|
<meta name="robots" content="noindex, nofollow">
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
||||||
{% block content %}
|
{% block content %}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
|
|
||||||
{% block head %}
|
{% block head %}
|
||||||
<title>{{ local_actor.display_name }}'s follows</title>
|
<title>{{ local_actor.display_name }}'s follows</title>
|
||||||
|
<meta name="robots" content="noindex, nofollow">
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
||||||
{% block content %}
|
{% block content %}
|
||||||
|
|
|
@ -25,13 +25,21 @@
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
{%- macro header_link(url, text) -%}
|
{%- macro header_link(url, text) -%}
|
||||||
{% set url_for = request.app.router.url_path_for(url) %}
|
{% set url_for = BASE_URL + request.app.router.url_path_for(url) %}
|
||||||
<a href="{{ url_for }}" {% if request.url.path == url_for %}class="active"{% endif %}>{{ text }}</a>
|
<a href="{{ url_for }}" {% if BASE_URL + request.url.path == url_for %}class="active"{% endif %}>{{ text }}</a>
|
||||||
|
{% endmacro %}
|
||||||
|
|
||||||
|
{%- macro navbar_item_link(navbar_item) -%}
|
||||||
|
{% set url_for = BASE_URL + navbar_item[0] %}
|
||||||
|
<a href="{{ navbar_item[0] }}" {% if BASE_URL + request.url.path == url_for %}class="active"{% endif %}>{{ navbar_item[1] }}</a>
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
<div class="public-top-menu">
|
<div class="public-top-menu">
|
||||||
<nav class="flexbox">
|
<nav class="flexbox">
|
||||||
<ul>
|
<ul>
|
||||||
|
{% if NAVBAR_ITEMS.INDEX_NAVBAR_ITEM %}
|
||||||
|
<li>{{ navbar_item_link(NAVBAR_ITEMS.INDEX_NAVBAR_ITEM) }}</li>
|
||||||
|
{% endif %}
|
||||||
<li>{{ header_link("index", "Notes") }}</li>
|
<li>{{ header_link("index", "Notes") }}</li>
|
||||||
{% if articles_count %}
|
{% if articles_count %}
|
||||||
<li>{{ header_link("articles", "Articles") }}</li>
|
<li>{{ header_link("articles", "Articles") }}</li>
|
||||||
|
@ -43,6 +51,9 @@
|
||||||
<li>{{ header_link("following", "Following") }} <span class="counter">{{ following_count }}</span></li>
|
<li>{{ header_link("following", "Following") }} <span class="counter">{{ following_count }}</span></li>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
<li>{{ header_link("get_remote_follow", "Remote follow") }}</li>
|
<li>{{ header_link("get_remote_follow", "Remote follow") }}</li>
|
||||||
|
{% for navbar_item in NAVBAR_ITEMS.EXTRA_NAVBAR_ITEMS %}
|
||||||
|
{{ navbar_item_link(navbar_item) }}
|
||||||
|
{% endfor %}
|
||||||
</ul>
|
</ul>
|
||||||
</nav>
|
</nav>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
<meta content="{{ local_actor.display_name }}'s microblog" property="og:site_name" />
|
<meta content="{{ local_actor.display_name }}'s microblog" property="og:site_name" />
|
||||||
<meta content="Homepage" property="og:title" />
|
<meta content="Homepage" property="og:title" />
|
||||||
<meta content="{{ local_actor.summary | html2text | trim }}" property="og:description" />
|
<meta content="{{ local_actor.summary | html2text | trim }}" property="og:description" />
|
||||||
<meta content="{{ local_actor.url }}" property="og:image" />
|
<meta content="{{ ICON_URL }}" property="og:image" />
|
||||||
<meta content="summary" property="twitter:card" />
|
<meta content="summary" property="twitter:card" />
|
||||||
<meta content="{{ local_actor.handle }}" property="profile:username" />
|
<meta content="{{ local_actor.handle }}" property="profile:username" />
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
@ -26,24 +26,30 @@
|
||||||
<div class="h-feed">
|
<div class="h-feed">
|
||||||
<data class="p-name" value="{{ local_actor.display_name}}'s notes"></data>
|
<data class="p-name" value="{{ local_actor.display_name}}'s notes"></data>
|
||||||
{% for outbox_object in objects %}
|
{% for outbox_object in objects %}
|
||||||
{% if outbox_object.ap_type in ["Note", "Article", "Video", "Question"] %}
|
{% if outbox_object.ap_type in ["Note", "Video", "Question"] %}
|
||||||
{{ utils.display_object(outbox_object) }}
|
{{ utils.display_object(outbox_object) }}
|
||||||
{% elif outbox_object.ap_type == "Announce" %}
|
{% elif outbox_object.ap_type == "Announce" %}
|
||||||
<div class="shared-header"><strong>{{ utils.display_tiny_actor_icon(local_actor) }} {{ local_actor.display_name | clean_html(local_actor) | safe }}</strong> shared <span title="{{ outbox_object.ap_published_at.isoformat() }}">{{ outbox_object.ap_published_at | timeago }}</span></div>
|
<div class="h-entry" id="{{ outbox_object.permalink_id }}">
|
||||||
{{ utils.display_object(outbox_object.relates_to_anybox_object) }}
|
<div class="shared-header"><strong><a class="p-author h-card" href="{{ local_actor.url }}">{{ utils.display_tiny_actor_icon(local_actor) }} {{ local_actor.display_name | clean_html(local_actor) | safe }}</a></strong> shared <span title="{{ outbox_object.ap_published_at.isoformat() }}">{{ outbox_object.ap_published_at | timeago }}</span></div>
|
||||||
|
<div class="h-cite u-repost-of">
|
||||||
|
{{ utils.display_object(outbox_object.relates_to_anybox_object, is_h_entry=False) }}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="box">
|
{% if has_previous_page or has_next_page %}
|
||||||
{% if has_previous_page %}
|
<div class="box">
|
||||||
<a href="{{ url_for("index") }}?page={{ current_page - 1 }}">Previous</a>
|
{% if has_previous_page %}
|
||||||
{% endif %}
|
<a href="{{ url_for("index") }}?page={{ current_page - 1 }}">Previous</a>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{% if has_next_page %}
|
{% if has_next_page %}
|
||||||
<a href="{{ url_for("index") }}?page={{ current_page + 1 }}">Next</a>
|
<a href="{{ url_for("index") }}?page={{ current_page + 1 }}">Next</a>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
</div>
|
</div>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{% else %}
|
{% else %}
|
||||||
<div class="empty-state">
|
<div class="empty-state">
|
||||||
|
|
|
@ -10,8 +10,12 @@
|
||||||
{% endif %}
|
{% endif %}
|
||||||
<div class="indieauth-details">
|
<div class="indieauth-details">
|
||||||
<div>
|
<div>
|
||||||
<a class="lcolor" href="{{ client.url }}">{{ client.name }}</a>
|
{% if client.url %}
|
||||||
<p>wants you to login as <strong class="lcolor">{{ me }}</strong> with the following redirect URI: <code>{{ redirect_uri }}</code>.</p>
|
<a class="scolor" href="{{ client.url }}">{{ client.name }}</a>
|
||||||
|
{% else %}
|
||||||
|
<span class="scolor">{{ client.name }}</span>
|
||||||
|
{% endif %}
|
||||||
|
<p>wants you to login{% if me %} as <strong class="lcolor">{{ me }}</strong>{% endif %} with the following redirect URI: <code>{{ redirect_uri }}</code>.</p>
|
||||||
|
|
||||||
|
|
||||||
<form method="POST" action="{{ url_for('indieauth_flow') }}" class="form">
|
<form method="POST" action="{{ url_for('indieauth_flow') }}" class="form">
|
||||||
|
|
|
@ -4,11 +4,11 @@
|
||||||
<meta charset="utf-8">
|
<meta charset="utf-8">
|
||||||
<meta http-equiv="x-ua-compatible" content="ie=edge">
|
<meta http-equiv="x-ua-compatible" content="ie=edge">
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
|
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
|
||||||
<link rel="stylesheet" href="/static/css/main.css?v={{ CSS_HASH }}">
|
<link rel="stylesheet" href="{{ BASE_URL }}/static/css/main.css?v={{ CSS_HASH }}">
|
||||||
<link rel="alternate" title="{{ local_actor.display_name}}'s microblog" type="application/json" href="{{ url_for("json_feed") }}" />
|
<link rel="alternate" title="{{ local_actor.display_name}}'s microblog" type="application/json" href="{{ url_for("json_feed") }}" />
|
||||||
<link rel="alternate" href="{{ url_for("rss_feed") }}" type="application/rss+xml" title="{{ local_actor.display_name}}'s microblog">
|
<link rel="alternate" href="{{ url_for("rss_feed") }}" type="application/rss+xml" title="{{ local_actor.display_name}}'s microblog">
|
||||||
<link rel="alternate" href="{{ url_for("atom_feed") }}" type="application/atom+xml" title="{{ local_actor.display_name}}'s microblog">
|
<link rel="alternate" href="{{ url_for("atom_feed") }}" type="application/atom+xml" title="{{ local_actor.display_name}}'s microblog">
|
||||||
<link rel="icon" type="image/x-icon" href="/static/favicon.ico">
|
<link rel="icon" type="image/x-icon" href="{{ BASE_URL }}/static/favicon.ico">
|
||||||
<style>{{ highlight_css }}</style>
|
<style>{{ highlight_css }}</style>
|
||||||
{% block head %}{% endblock %}
|
{% block head %}{% endblock %}
|
||||||
</head>
|
</head>
|
||||||
|
@ -18,8 +18,8 @@
|
||||||
{% if is_admin %}
|
{% if is_admin %}
|
||||||
<div id="admin">
|
<div id="admin">
|
||||||
{% macro admin_link(url, text) %}
|
{% macro admin_link(url, text) %}
|
||||||
{% set url_for = request.app.router.url_path_for(url) %}
|
{% set url_for = BASE_URL + request.app.router.url_path_for(url) %}
|
||||||
<a href="{{ url_for }}" {% if request.url.path == url_for %}class="active"{% endif %}>{{ text }}</a>
|
<a href="{{ url_for }}" {% if BASE_URL + request.url.path == url_for %}class="active"{% endif %}>{{ text }}</a>
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
<div class="admin-menu">
|
<div class="admin-menu">
|
||||||
<nav class="flexbox">
|
<nav class="flexbox">
|
||||||
|
@ -53,7 +53,8 @@
|
||||||
</div>
|
</div>
|
||||||
</footer>
|
</footer>
|
||||||
{% if is_admin %}
|
{% if is_admin %}
|
||||||
<script src="/static/common-admin.js?v={{ JS_HASH }}"></script>
|
<script src="{{ BASE_URL }}/static/common-admin.js?v={{ JS_HASH }}"></script>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
<script src="{{ BASE_URL }}/static/common.js?v={{ JS_HASH }}"></script>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -1,5 +1,8 @@
|
||||||
{%- import "utils.html" as utils with context -%}
|
{%- import "utils.html" as utils with context -%}
|
||||||
{% extends "layout.html" %}
|
{% extends "layout.html" %}
|
||||||
|
{% block head %}
|
||||||
|
<meta name="robots" content="noindex, nofollow">
|
||||||
|
{% endblock %}
|
||||||
{% block main_tag %} class="main-flex"{% endblock %}
|
{% block main_tag %} class="main-flex"{% endblock %}
|
||||||
{% block content %}
|
{% block content %}
|
||||||
<div class="centered">
|
<div class="centered">
|
||||||
|
@ -7,7 +10,7 @@
|
||||||
{% if error %}
|
{% if error %}
|
||||||
<p class="primary-color">Invalid password.</p>
|
<p class="primary-color">Invalid password.</p>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
<form class="form" action="/admin/login" method="POST">
|
<form class="form" action="{{ BASE_URL }}/admin/login" method="POST">
|
||||||
<input type="hidden" name="csrf_token" value="{{ csrf_token }}">
|
<input type="hidden" name="csrf_token" value="{{ csrf_token }}">
|
||||||
<input type="hidden" name="redirect" value="{{ redirect }}">
|
<input type="hidden" name="redirect" value="{{ redirect }}">
|
||||||
<input type="password" placeholder="password" name="password" autofocus>
|
<input type="password" placeholder="password" name="password" autofocus>
|
||||||
|
|
|
@ -10,6 +10,9 @@
|
||||||
<a href="{{ url_for("admin_profile") }}?actor_id={{ notif.actor.ap_id }}">
|
<a href="{{ url_for("admin_profile") }}?actor_id={{ notif.actor.ap_id }}">
|
||||||
{% if with_icon %}{{ utils.display_tiny_actor_icon(notif.actor) }}{% endif %} {{ notif.actor.display_name | clean_html(notif.actor) | safe }}</a> {{ text }}
|
{% if with_icon %}{{ utils.display_tiny_actor_icon(notif.actor) }}{% endif %} {{ notif.actor.display_name | clean_html(notif.actor) | safe }}</a> {{ text }}
|
||||||
<span title="{{ notif.created_at.isoformat() }}">{{ notif.created_at | timeago }}</span>
|
<span title="{{ notif.created_at.isoformat() }}">{{ notif.created_at | timeago }}</span>
|
||||||
|
{% if notif.is_new %}
|
||||||
|
<span class="new">new</span>
|
||||||
|
{% endif %}
|
||||||
</div>
|
</div>
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
|
@ -36,7 +39,19 @@
|
||||||
{%- elif notif.notification_type.value == "follow_request_rejected" %}
|
{%- elif notif.notification_type.value == "follow_request_rejected" %}
|
||||||
{{ notif_actor_action(notif, "rejected your follow request") }}
|
{{ notif_actor_action(notif, "rejected your follow request") }}
|
||||||
{{ utils.display_actor(notif.actor, actors_metadata) }}
|
{{ utils.display_actor(notif.actor, actors_metadata) }}
|
||||||
{%- elif notif.notification_type.value == "move" %}
|
{% elif notif.notification_type.value == "blocked" %}
|
||||||
|
{{ notif_actor_action(notif, "blocked you") }}
|
||||||
|
{{ utils.display_actor(notif.actor, actors_metadata) }}
|
||||||
|
{% elif notif.notification_type.value == "unblocked" %}
|
||||||
|
{{ notif_actor_action(notif, "unblocked you") }}
|
||||||
|
{{ utils.display_actor(notif.actor, actors_metadata) }}
|
||||||
|
{% elif notif.notification_type.value == "block" %}
|
||||||
|
{{ notif_actor_action(notif, "was blocked") }}
|
||||||
|
{{ utils.display_actor(notif.actor, actors_metadata) }}
|
||||||
|
{% elif notif.notification_type.value == "unblock" %}
|
||||||
|
{{ notif_actor_action(notif, "was unblocked") }}
|
||||||
|
{{ utils.display_actor(notif.actor, actors_metadata) }}
|
||||||
|
{%- elif notif.notification_type.value == "move" and notif.inbox_object %}
|
||||||
{# for move notif, the actor is the target and the inbox object the Move activity #}
|
{# for move notif, the actor is the target and the inbox object the Move activity #}
|
||||||
<div class="actor-action">
|
<div class="actor-action">
|
||||||
<a href="{{ url_for("admin_profile") }}?actor_id={{ notif.inbox_object.actor.ap_id }}">
|
<a href="{{ url_for("admin_profile") }}?actor_id={{ notif.inbox_object.actor.ap_id }}">
|
||||||
|
@ -54,8 +69,8 @@
|
||||||
{{ notif_actor_action(notif, "shared a post", with_icon=True) }}
|
{{ notif_actor_action(notif, "shared a post", with_icon=True) }}
|
||||||
{{ utils.display_object(notif.outbox_object) }}
|
{{ utils.display_object(notif.outbox_object) }}
|
||||||
{% elif notif.notification_type.value == "undo_announce" %}
|
{% elif notif.notification_type.value == "undo_announce" %}
|
||||||
{{ notif_actor_action(notif, "unshared a post") }}
|
{{ notif_actor_action(notif, "unshared a post", with_icon=True) }}
|
||||||
{{ utils.display_object(notif.outbox_object, with_icon=True) }}
|
{{ utils.display_object(notif.outbox_object) }}
|
||||||
{% elif notif.notification_type.value == "mention" %}
|
{% elif notif.notification_type.value == "mention" %}
|
||||||
{{ notif_actor_action(notif, "mentioned you") }}
|
{{ notif_actor_action(notif, "mentioned you") }}
|
||||||
{{ utils.display_object(notif.inbox_object) }}
|
{{ utils.display_object(notif.inbox_object) }}
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
<meta content="article" property="og:type" />
|
<meta content="article" property="og:type" />
|
||||||
<meta content="{{ outbox_object.url }}" property="og:url" />
|
<meta content="{{ outbox_object.url }}" property="og:url" />
|
||||||
<meta content="{{ local_actor.display_name }}'s microblog" property="og:site_name" />
|
<meta content="{{ local_actor.display_name }}'s microblog" property="og:site_name" />
|
||||||
<meta content="{% if outbox_object.name %}{{ name }}{% else %}Note{% endif %}" property="og:title" />
|
<meta content="{% if outbox_object.name %}{{ outbox_object.name }}{% else %}Note{% endif %}" property="og:title" />
|
||||||
<meta content="{{ excerpt }}" property="og:description" />
|
<meta content="{{ excerpt }}" property="og:description" />
|
||||||
<meta content="{{ local_actor.icon_url }}" property="og:image" />
|
<meta content="{{ local_actor.icon_url }}" property="og:image" />
|
||||||
<meta content="summary" property="twitter:card" />
|
<meta content="summary" property="twitter:card" />
|
||||||
|
@ -31,9 +31,16 @@
|
||||||
{% macro display_replies_tree(replies_tree_node) %}
|
{% macro display_replies_tree(replies_tree_node) %}
|
||||||
|
|
||||||
{% if replies_tree_node.is_requested %}
|
{% if replies_tree_node.is_requested %}
|
||||||
{{ utils.display_object(replies_tree_node.ap_object, likes=likes, shares=shares, webmentions=webmentions, expanded=not replies_tree_node.is_root, is_object_page=True) }}
|
{{ utils.display_object(replies_tree_node.ap_object, likes=likes, shares=shares, webmentions=webmentions, expanded=not replies_tree_node.is_root, is_object_page=True, is_h_entry=False) }}
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ utils.display_object(replies_tree_node.ap_object) }}
|
{% if replies_tree_node.wm_reply %}
|
||||||
|
{# u-comment h-cite is displayed by default for webmention #}
|
||||||
|
{{ utils.display_webmention_reply(replies_tree_node.wm_reply) }}
|
||||||
|
{% else %}
|
||||||
|
<div class="u-comment h-cite">
|
||||||
|
{{ utils.display_object(replies_tree_node.ap_object, is_h_entry=False) }}
|
||||||
|
</div>
|
||||||
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% for child in replies_tree_node.children %}
|
{% for child in replies_tree_node.children %}
|
||||||
|
@ -42,6 +49,8 @@
|
||||||
|
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
|
<div class="h-entry">
|
||||||
{{ display_replies_tree(replies_tree) }}
|
{{ display_replies_tree(replies_tree) }}
|
||||||
|
</div>
|
||||||
|
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
15
app/templates/redirect.html
Normal file
15
app/templates/redirect.html
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
{%- import "utils.html" as utils with context -%}
|
||||||
|
{% extends "layout.html" %}
|
||||||
|
|
||||||
|
{% block head %}
|
||||||
|
<title>{{ local_actor.display_name }}'s microblog - Redirect</title>
|
||||||
|
{% endblock %}
|
||||||
|
|
||||||
|
{% block content %}
|
||||||
|
{% include "header.html" %}
|
||||||
|
|
||||||
|
<div class="box">
|
||||||
|
<p>You are being redirected to: <a href="{{ url }}">{{ url }}</a></p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{% endblock %}
|
15
app/templates/redirect_to_remote_instance.html
Normal file
15
app/templates/redirect_to_remote_instance.html
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
{%- import "utils.html" as utils with context -%}
|
||||||
|
{% extends "layout.html" %}
|
||||||
|
|
||||||
|
{% block head %}
|
||||||
|
<title>{{ local_actor.display_name }}'s microblog - Redirect</title>
|
||||||
|
{% endblock %}
|
||||||
|
|
||||||
|
{% block content %}
|
||||||
|
{% include "header.html" %}
|
||||||
|
|
||||||
|
<div class="box">
|
||||||
|
<p>You are being redirected to your instance: <a href="{{ url }}">{{ url }}</a></p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{% endblock %}
|
|
@ -3,6 +3,7 @@
|
||||||
|
|
||||||
{% block head %}
|
{% block head %}
|
||||||
<title>Remote follow {{ local_actor.display_name }}</title>
|
<title>Remote follow {{ local_actor.display_name }}</title>
|
||||||
|
<meta name="robots" content="noindex, nofollow">
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
||||||
{% block content %}
|
{% block content %}
|
||||||
|
|
27
app/templates/remote_interact.html
Normal file
27
app/templates/remote_interact.html
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
{%- import "utils.html" as utils with context -%}
|
||||||
|
{% extends "layout.html" %}
|
||||||
|
|
||||||
|
{% block head %}
|
||||||
|
<title>Interact from your instance</title>
|
||||||
|
<meta name="robots" content="noindex, nofollow">
|
||||||
|
{% endblock %}
|
||||||
|
|
||||||
|
{% block content %}
|
||||||
|
{% include "header.html" %}
|
||||||
|
|
||||||
|
<div class="box">
|
||||||
|
<h2>Interact with this object</h2>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{{ utils.display_object(outbox_object) }}
|
||||||
|
|
||||||
|
<div class="box">
|
||||||
|
<form class="form" action="{{ url_for("post_remote_interaction") }}" method="POST">
|
||||||
|
{{ utils.embed_csrf_token() }}
|
||||||
|
<input type="text" name="profile" placeholder="you@instance.tld" autofocus>
|
||||||
|
<input type="hidden" name="ap_id" value="{{ outbox_object.ap_id }}">
|
||||||
|
<input type="submit" value="interact from your instance">
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{% endblock %}
|
|
@ -1,168 +1,254 @@
|
||||||
{% macro embed_csrf_token() %}
|
{% macro embed_csrf_token() %}
|
||||||
|
{% block embed_csrf_token scoped %}
|
||||||
<input type="hidden" name="csrf_token" value="{{ csrf_token }}">
|
<input type="hidden" name="csrf_token" value="{{ csrf_token }}">
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro embed_redirect_url(permalink_id=None) %}
|
{% macro embed_redirect_url(permalink_id=None) %}
|
||||||
|
{% block embed_redirect_url scoped %}
|
||||||
<input type="hidden" name="redirect_url" value="{{ request.url }}{% if permalink_id %}#{{ permalink_id }}{% endif %}">
|
<input type="hidden" name="redirect_url" value="{{ request.url }}{% if permalink_id %}#{{ permalink_id }}{% endif %}">
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_block_button(actor) %}
|
{% macro admin_block_button(actor) %}
|
||||||
|
{% block admin_block_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_block") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_block") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url() }}
|
{{ embed_redirect_url() }}
|
||||||
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
||||||
<input type="submit" value="block">
|
<input type="submit" value="block">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_unblock_button(actor) %}
|
{% macro admin_unblock_button(actor) %}
|
||||||
|
{% block admin_unblock_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_unblock") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_unblock") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url() }}
|
{{ embed_redirect_url() }}
|
||||||
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
||||||
<input type="submit" value="unblock">
|
<input type="submit" value="unblock">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
|
{% macro admin_hide_shares_button(actor) %}
|
||||||
|
{% block admin_hide_shares_button scoped %}
|
||||||
|
<form action="{{ request.url_for("admin_actions_hide_announces") }}" method="POST">
|
||||||
|
{{ embed_csrf_token() }}
|
||||||
|
{{ embed_redirect_url() }}
|
||||||
|
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
||||||
|
<input type="submit" value="hide shares">
|
||||||
|
</form>
|
||||||
|
{% endblock %}
|
||||||
|
{% endmacro %}
|
||||||
|
|
||||||
|
{% macro admin_show_shares_button(actor) %}
|
||||||
|
{% block admin_show_shares_button scoped %}
|
||||||
|
<form action="{{ request.url_for("admin_actions_show_announces") }}" method="POST">
|
||||||
|
{{ embed_csrf_token() }}
|
||||||
|
{{ embed_redirect_url() }}
|
||||||
|
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
||||||
|
<input type="submit" value="show shares">
|
||||||
|
</form>
|
||||||
|
{% endblock %}
|
||||||
|
{% endmacro %}
|
||||||
|
|
||||||
|
|
||||||
{% macro admin_follow_button(actor) %}
|
{% macro admin_follow_button(actor) %}
|
||||||
|
{% block admin_follow_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_follow") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_follow") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url() }}
|
{{ embed_redirect_url() }}
|
||||||
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
<input type="hidden" name="ap_actor_id" value="{{ actor.ap_id }}">
|
||||||
<input type="submit" value="follow">
|
<input type="submit" value="follow">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_accept_incoming_follow_button(notif) %}
|
{% macro admin_accept_incoming_follow_button(notif) %}
|
||||||
|
{% block admin_accept_incoming_follow_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_accept_incoming_follow") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_accept_incoming_follow") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url() }}
|
{{ embed_redirect_url() }}
|
||||||
<input type="hidden" name="notification_id" value="{{ notif.id }}">
|
<input type="hidden" name="notification_id" value="{{ notif.id }}">
|
||||||
<input type="submit" value="accept follow">
|
<input type="submit" value="accept follow">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_reject_incoming_follow_button(notif) %}
|
{% macro admin_reject_incoming_follow_button(notif) %}
|
||||||
|
{% block admin_reject_incoming_follow_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_reject_incoming_follow") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_reject_incoming_follow") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url() }}
|
{{ embed_redirect_url() }}
|
||||||
<input type="hidden" name="notification_id" value="{{ notif.id }}">
|
<input type="hidden" name="notification_id" value="{{ notif.id }}">
|
||||||
<input type="submit" value="reject follow">
|
<input type="submit" value="reject follow">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_like_button(ap_object_id, permalink_id) %}
|
{% macro admin_like_button(ap_object_id, permalink_id) %}
|
||||||
|
{% block admin_like_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_like") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_like") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="like">
|
<input type="submit" value="like">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_bookmark_button(ap_object_id, permalink_id) %}
|
{% macro admin_bookmark_button(ap_object_id, permalink_id) %}
|
||||||
|
{% block admin_bookmark_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_bookmark") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_bookmark") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="bookmark">
|
<input type="submit" value="bookmark">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_unbookmark_button(ap_object_id, permalink_id) %}
|
{% macro admin_unbookmark_button(ap_object_id, permalink_id) %}
|
||||||
|
{% block admin_unbookmark_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_unbookmark") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_unbookmark") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="unbookmark">
|
<input type="submit" value="unbookmark">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_pin_button(ap_object_id, permalink_id) %}
|
{% macro admin_pin_button(ap_object_id, permalink_id) %}
|
||||||
|
{% block admin_pin_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_pin") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_pin") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="pin">
|
<input type="submit" value="pin">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_unpin_button(ap_object_id, permalink_id) %}
|
{% macro admin_unpin_button(ap_object_id, permalink_id) %}
|
||||||
|
{% block admin_unpin_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_unpin") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_unpin") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="unpin">
|
<input type="submit" value="unpin">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_delete_button(ap_object) %}
|
{% macro admin_delete_button(ap_object) %}
|
||||||
|
{% block admin_delete_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_delete") }}" class="object-delete-form" method="POST">
|
<form action="{{ request.url_for("admin_actions_delete") }}" class="object-delete-form" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
<input type="hidden" name="redirect_url" value="{% if request.url.path.endswith("/" + ap_object.public_id) or (request.url.path == "/admin/object" and request.query_params.ap_id.endswith("/" + ap_object.public_id)) %}{{ request.base_url}}{% else %}{{ request.url }}{% endif %}">
|
<input type="hidden" name="redirect_url" value="{% if request.url.path.endswith("/" + ap_object.public_id) or (request.url.path == "/admin/object" and request.query_params.ap_id.endswith("/" + ap_object.public_id)) %}{{ request.base_url}}{% else %}{{ request.url }}{% endif %}">
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object.ap_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object.ap_id }}">
|
||||||
<input type="submit" value="delete">
|
<input type="submit" value="delete">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
|
{% endmacro %}
|
||||||
|
|
||||||
|
{% macro admin_force_delete_button(ap_object_id, permalink_id=None) %}
|
||||||
|
{% block admin_force_delete_button scoped %}
|
||||||
|
<form action="{{ request.url_for("admin_actions_force_delete") }}" class="object-delete-form" method="POST">
|
||||||
|
{{ embed_csrf_token() }}
|
||||||
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
|
<input type="submit" value="local delete">
|
||||||
|
</form>
|
||||||
|
{% endblock %}
|
||||||
|
{% endmacro %}
|
||||||
|
|
||||||
|
{% macro admin_force_delete_webmention_button(webmention_id, permalink_id=None) %}
|
||||||
|
{% block admin_force_delete_webmention_button scoped %}
|
||||||
|
<form action="{{ request.url_for("admin_actions_force_delete_webmention") }}" class="object-delete-form" method="POST">
|
||||||
|
{{ embed_csrf_token() }}
|
||||||
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
|
<input type="hidden" name="webmention_id" value="{{ webmention_id }}">
|
||||||
|
<input type="submit" value="local delete">
|
||||||
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_announce_button(ap_object_id, permalink_id=None) %}
|
{% macro admin_announce_button(ap_object_id, permalink_id=None) %}
|
||||||
|
{% block admin_announce_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_announce") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_announce") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="share">
|
<input type="submit" value="share">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_undo_button(ap_object_id, action="undo", permalink_id=None) %}
|
{% macro admin_undo_button(ap_object_id, action="undo", permalink_id=None) %}
|
||||||
|
{% block admin_undo_button scoped %}
|
||||||
<form action="{{ request.url_for("admin_actions_undo") }}" method="POST">
|
<form action="{{ request.url_for("admin_actions_undo") }}" method="POST">
|
||||||
{{ embed_csrf_token() }}
|
{{ embed_csrf_token() }}
|
||||||
{{ embed_redirect_url(permalink_id) }}
|
{{ embed_redirect_url(permalink_id) }}
|
||||||
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
<input type="hidden" name="ap_object_id" value="{{ ap_object_id }}">
|
||||||
<input type="submit" value="{{ action }}">
|
<input type="submit" value="{{ action }}">
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_reply_button(ap_object_id) %}
|
{% macro admin_reply_button(ap_object_id) %}
|
||||||
<form action="/admin/new" method="GET">
|
{% block admin_reply_button scoped %}
|
||||||
|
<form action="{{ BASE_URL }}/admin/new" method="GET">
|
||||||
<input type="hidden" name="in_reply_to" value="{{ ap_object_id }}">
|
<input type="hidden" name="in_reply_to" value="{{ ap_object_id }}">
|
||||||
<button type="submit">reply</button>
|
<button type="submit">reply</button>
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_dm_button(actor_handle) %}
|
{% macro admin_dm_button(actor_handle) %}
|
||||||
<form action="/admin/new" method="GET">
|
{% block admin_dm_button scoped %}
|
||||||
|
<form action="{{ BASE_URL }}/admin/new" method="GET">
|
||||||
<input type="hidden" name="with_content" value="{{ actor_handle }}">
|
<input type="hidden" name="with_content" value="{{ actor_handle }}">
|
||||||
<input type="hidden" name="with_visibility" value="DIRECT">
|
<input type="hidden" name="with_visibility" value="DIRECT">
|
||||||
<button type="submit">direct message</button>
|
<button type="submit">direct message</button>
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_mention_button(actor_handle) %}
|
{% macro admin_mention_button(actor_handle) %}
|
||||||
<form action="/admin/new" method="GET">
|
{% block admin_mention_button scoped %}
|
||||||
|
<form action="{{ BASE_URL }}/admin/new" method="GET">
|
||||||
<input type="hidden" name="with_content" value="{{ actor_handle }}">
|
<input type="hidden" name="with_content" value="{{ actor_handle }}">
|
||||||
<button type="submit">mention</button>
|
<button type="submit">mention</button>
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
{% macro admin_profile_button(ap_actor_id) %}
|
{% macro admin_profile_button(ap_actor_id) %}
|
||||||
|
{% block admin_profile_button scoped %}
|
||||||
<form action="{{ url_for("admin_profile") }}" method="GET">
|
<form action="{{ url_for("admin_profile") }}" method="GET">
|
||||||
<input type="hidden" name="actor_id" value="{{ ap_actor_id }}">
|
<input type="hidden" name="actor_id" value="{{ ap_actor_id }}">
|
||||||
<button type="submit">profile</button>
|
<button type="submit">profile</button>
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro admin_expand_button(ap_object) %}
|
{% macro admin_expand_button(ap_object) %}
|
||||||
|
{% block admin_expand_button scoped %}
|
||||||
{# TODO turn these into a regular link and append permalink ID if it's a reply #}
|
{# TODO turn these into a regular link and append permalink ID if it's a reply #}
|
||||||
<form action="{{ url_for("admin_object") }}" method="GET">
|
<form action="{{ url_for("admin_object") }}" method="GET">
|
||||||
<input type="hidden" name="ap_id" value="{{ ap_object.ap_id }}">
|
<input type="hidden" name="ap_id" value="{{ ap_object.ap_id }}">
|
||||||
<button type="submit">expand</button>
|
<button type="submit">expand</button>
|
||||||
</form>
|
</form>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro display_box_filters(route) %}
|
{% macro display_box_filters(route) %}
|
||||||
|
{% block display_box_filters scoped %}
|
||||||
<nav class="flexbox box">
|
<nav class="flexbox box">
|
||||||
<ul>
|
<ul>
|
||||||
<li>Filter by</li>
|
<li>Filter by</li>
|
||||||
|
@ -179,13 +265,17 @@
|
||||||
{% endif %}
|
{% endif %}
|
||||||
</ul>
|
</ul>
|
||||||
</nav>
|
</nav>
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro display_tiny_actor_icon(actor) %}
|
{% macro display_tiny_actor_icon(actor) %}
|
||||||
<img class="tiny-actor-icon" src="{{ actor.resized_icon_url }}" alt="{{ actor.display_name }}'s avatar">
|
{% block display_tiny_actor_icon scoped %}
|
||||||
|
<img class="tiny-actor-icon" src="{{ actor.resized_icon_url }}" alt="">
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro actor_action(inbox_object, text, with_icon=False) %}
|
{% macro actor_action(inbox_object, text, with_icon=False) %}
|
||||||
|
{% block actor_action scoped %}
|
||||||
<div class="actor-action">
|
<div class="actor-action">
|
||||||
<a href="{{ url_for("admin_profile") }}?actor_id={{ inbox_object.actor.ap_id }}">
|
<a href="{{ url_for("admin_profile") }}?actor_id={{ inbox_object.actor.ap_id }}">
|
||||||
{% if with_icon %}{{ display_tiny_actor_icon(inbox_object.actor) }}{% endif %} {{ inbox_object.actor.display_name | clean_html(inbox_object.actor) | safe }}
|
{% if with_icon %}{{ display_tiny_actor_icon(inbox_object.actor) }}{% endif %} {{ inbox_object.actor.display_name | clean_html(inbox_object.actor) | safe }}
|
||||||
|
@ -193,9 +283,11 @@
|
||||||
<span title="{{ inbox_object.ap_published_at.isoformat() }}">{{ inbox_object.ap_published_at | timeago }}</span>
|
<span title="{{ inbox_object.ap_published_at.isoformat() }}">{{ inbox_object.ap_published_at | timeago }}</span>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro display_actor(actor, actors_metadata={}, embedded=False, with_details=False, pending_incoming_follow_notif=None) %}
|
{% macro display_actor(actor, actors_metadata={}, embedded=False, with_details=False, pending_incoming_follow_notif=None) %}
|
||||||
|
{% block display_actor scoped %}
|
||||||
{% set metadata = actors_metadata.get(actor.ap_id) %}
|
{% set metadata = actors_metadata.get(actor.ap_id) %}
|
||||||
|
|
||||||
{% if not embedded %}
|
{% if not embedded %}
|
||||||
|
@ -216,13 +308,25 @@
|
||||||
<div>
|
<div>
|
||||||
<nav class="flexbox actor-metadata">
|
<nav class="flexbox actor-metadata">
|
||||||
<ul>
|
<ul>
|
||||||
|
{% if metadata.has_blocked_local_actor %}
|
||||||
|
<li>blocked you</li>
|
||||||
|
{% endif %}
|
||||||
{% if metadata.is_following %}
|
{% if metadata.is_following %}
|
||||||
<li>already following</li>
|
<li>already following</li>
|
||||||
<li>{{ admin_undo_button(metadata.outbox_follow_ap_id, "unfollow")}}</li>
|
<li>{{ admin_undo_button(metadata.outbox_follow_ap_id, "unfollow")}}</li>
|
||||||
<li>{{ admin_profile_button(actor.ap_id) }}</li>
|
{% if not with_details %}
|
||||||
|
<li>{{ admin_profile_button(actor.ap_id) }}</li>
|
||||||
|
{% endif %}
|
||||||
{% elif metadata.is_follow_request_sent %}
|
{% elif metadata.is_follow_request_sent %}
|
||||||
<li>follow request sent</li>
|
{% if metadata.is_follow_request_rejected %}
|
||||||
<li>{{ admin_undo_button(metadata.outbox_follow_ap_id, "undo follow") }}</li>
|
<li>follow request rejected</li>
|
||||||
|
{% if not metadata.has_blocked_local_actor %}
|
||||||
|
<li>{{ admin_follow_button(actor) }}</li>
|
||||||
|
{% endif %}
|
||||||
|
{% else %}
|
||||||
|
<li>follow request sent</li>
|
||||||
|
<li>{{ admin_undo_button(metadata.outbox_follow_ap_id, "undo follow") }}</li>
|
||||||
|
{% endif %}
|
||||||
{% elif not actor.moved_to %}
|
{% elif not actor.moved_to %}
|
||||||
<li>{{ admin_follow_button(actor) }}</li>
|
<li>{{ admin_follow_button(actor) }}</li>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -231,7 +335,7 @@
|
||||||
{% if not metadata.is_following and not with_details %}
|
{% if not metadata.is_following and not with_details %}
|
||||||
<li>{{ admin_profile_button(actor.ap_id) }}</li>
|
<li>{{ admin_profile_button(actor.ap_id) }}</li>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% elif actor.is_from_db and not with_details %}
|
{% elif actor.is_from_db and not with_details and not metadata.is_following %}
|
||||||
<li>{{ admin_profile_button(actor.ap_id) }}</li>
|
<li>{{ admin_profile_button(actor.ap_id) }}</li>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if actor.moved_to %}
|
{% if actor.moved_to %}
|
||||||
|
@ -261,6 +365,14 @@
|
||||||
<li>rejected</li>
|
<li>rejected</li>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% if actor.are_announces_hidden_from_stream %}
|
||||||
|
<li>{{ admin_show_shares_button(actor) }}</li>
|
||||||
|
{% else %}
|
||||||
|
<li>{{ admin_hide_shares_button(actor) }}</li>
|
||||||
|
{% endif %}
|
||||||
|
{% if with_details %}
|
||||||
|
<li><a href="{{ actor.url }}" class="label-btn">remote profile</a></li>
|
||||||
|
{% endif %}
|
||||||
</ul>
|
</ul>
|
||||||
</nav>
|
</nav>
|
||||||
</div>
|
</div>
|
||||||
|
@ -291,9 +403,11 @@
|
||||||
</div>
|
</div>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro display_og_meta(object) %}
|
{% macro display_og_meta(object) %}
|
||||||
|
{% block display_og_meta scoped %}
|
||||||
{% if object.og_meta %}
|
{% if object.og_meta %}
|
||||||
{% for og_meta in object.og_meta[:1] %}
|
{% for og_meta in object.og_meta[:1] %}
|
||||||
<div class="activity-og-meta">
|
<div class="activity-og-meta">
|
||||||
|
@ -311,38 +425,52 @@
|
||||||
</div>
|
</div>
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
|
|
||||||
{% macro display_attachments(object) %}
|
{% macro display_attachments(object) %}
|
||||||
|
{% block display_attachments scoped %}
|
||||||
|
|
||||||
{% for attachment in object.attachments %}
|
{% for attachment in object.attachments %}
|
||||||
|
{% if attachment.type != "PropertyValue" %}
|
||||||
|
{% set orientation = "unknown" %}
|
||||||
|
{% if attachment.width %}
|
||||||
|
{% set orientation = "portrait" if attachment.width < attachment.height else "landscape" %}
|
||||||
|
{% endif %}
|
||||||
{% if object.sensitive and (attachment.type == "Image" or (attachment | has_media_type("image")) or attachment.type == "Video" or (attachment | has_media_type("video"))) %}
|
{% if object.sensitive and (attachment.type == "Image" or (attachment | has_media_type("image")) or attachment.type == "Video" or (attachment | has_media_type("video"))) %}
|
||||||
<div class="attachment-wrapper">
|
<div class="attachment-wrapper">
|
||||||
<label for="{{attachment.proxied_url}}" class="label-btn show-hide-sensitive-btn">show/hide sensitive content</label>
|
<label for="{{attachment.proxied_url}}" class="label-btn show-hide-sensitive-btn">show/hide sensitive content</label>
|
||||||
<div>
|
<div>
|
||||||
<div class="sensitive-attachment">
|
<div class="sensitive-attachment">
|
||||||
<input class="sensitive-attachment-state" type="checkbox" id="{{attachment.proxied_url}}" aria-hidden="true">
|
<input class="sensitive-attachment-state" type="checkbox" id="{{attachment.proxied_url}}" aria-hidden="true">
|
||||||
<div class="sensitive-attachment-box">
|
<div class="sensitive-attachment-box attachment-orientation-{{orientation}}">
|
||||||
<div></div>
|
<div></div>
|
||||||
{% else %}
|
{% else %}
|
||||||
<div class="attachment-item">
|
<div class="attachment-item attachment-orientation-{{orientation}}">
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if attachment.type == "Image" or (attachment | has_media_type("image")) %}
|
{% if attachment.type == "Image" or (attachment | has_media_type("image")) %}
|
||||||
{% if attachment.url not in object.inlined_images %}
|
{% if attachment.url not in object.inlined_images %}
|
||||||
<img src="{{ attachment.resized_url or attachment.proxied_url }}"{% if attachment.name %} title="{{ attachment.name }}" alt="{{ attachment.name }}"{% endif %} class="attachment">
|
<a class="media-link" href="{{ attachment.proxied_url }}" target="_blank">
|
||||||
|
<img src="{{ attachment.resized_url or attachment.proxied_url }}"{% if attachment.name %} title="{{ attachment.name }}" alt="{{ attachment.name }}"{% endif %} class="attachment u-photo">
|
||||||
|
</a>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% elif attachment.type == "Video" or (attachment | has_media_type("video")) %}
|
{% elif attachment.type == "Video" or (attachment | has_media_type("video")) %}
|
||||||
<video controls preload="metadata" src="{{ attachment.url | media_proxy_url }}"{% if attachment.name %} title="{{ attachment.name }}"{% endif %}></video>
|
<div class="video-wrapper">
|
||||||
|
<video controls preload="metadata" src="{{ attachment.url | media_proxy_url }}"{% if attachment.name %} title="{{ attachment.name }}"{% endif %} class="u-video"></video>
|
||||||
|
<div class="video-gif-overlay">GIF</div>
|
||||||
|
</div>
|
||||||
{% elif attachment.type == "Audio" or (attachment | has_media_type("audio")) %}
|
{% elif attachment.type == "Audio" or (attachment | has_media_type("audio")) %}
|
||||||
<audio controls preload="metadata" src="{{ attachment.url | media_proxy_url }}"{% if attachment.name%} title="{{ attachment.name }}"{% endif %} class="attachment"></audio>
|
<audio controls preload="metadata" src="{{ attachment.url | media_proxy_url }}"{% if attachment.name%} title="{{ attachment.name }}"{% endif %} class="attachment u-audio"></audio>
|
||||||
{% elif attachment.type == "Link" %}
|
{% elif attachment.type == "Link" %}
|
||||||
<a href="{{ attachment.url }}" class="attachment">{{ attachment.url }}</a>
|
<a href="{{ attachment.url }}" class="attachment">{{ attachment.url | truncate(64, True) }}</a> ({{ attachment.mimetype}})
|
||||||
{% else %}
|
{% else %}
|
||||||
<a href="{{ attachment.url | media_proxy_url }}"{% if attachment.name %} title="{{ attachment.name }}"{% endif %} class="attachment">{{ attachment.url }}</a>
|
<a href="{{ attachment.url | media_proxy_url }}"{% if attachment.name %} title="{{ attachment.url }}"{% endif %} class="attachment">
|
||||||
|
{% if attachment.name %}{{ attachment.name }}{% else %}{{ attachment.url | truncate(64, True) }}{% endif %}
|
||||||
|
</a> ({{ attachment.mimetype }})
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if object.sensitive %}
|
{% if object.sensitive and (attachment.type == "Image" or (attachment | has_media_type("image")) or attachment.type == "Video" or (attachment | has_media_type("video"))) %}
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
@ -350,13 +478,60 @@
|
||||||
{% else %}
|
{% else %}
|
||||||
</div>
|
</div>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% endif %}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
{% macro display_object(object, likes=[], shares=[], webmentions=[], expanded=False, actors_metadata={}, is_object_page=False) %}
|
{% macro display_webmention_reply(wm_reply) %}
|
||||||
|
{% block display_webmention_reply scoped %}
|
||||||
|
|
||||||
|
<div class="ap-object u-comment h-cite">
|
||||||
|
<div class="actor-box h-card p-author">
|
||||||
|
<div class="icon-box">
|
||||||
|
<img src="{{ wm_reply.face.picture_url }}" alt="{{ wm_reply.face.name }}'s avatar" class="actor-icon u-photo">
|
||||||
|
</div>
|
||||||
|
<a href="{{ wm_reply.face.url }}" class="u-url">
|
||||||
|
<div><strong class="p-name">{{ wm_reply.face.name | clean_html_wm | safe }}</strong></div>
|
||||||
|
<div class="actor-handle">{{ wm_reply.face.url | truncate(64, True) }}</div>
|
||||||
|
</a>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<p class="in-reply-to">in reply to <a href="{{ wm_reply.in_reply_to }}" title="{{ wm_reply.in_reply_to }}" rel="nofollow">
|
||||||
|
this object
|
||||||
|
</a></p>
|
||||||
|
|
||||||
|
<div class="obj-content margin-top-20">
|
||||||
|
<div class="e-content">
|
||||||
|
{{ wm_reply.content | clean_html_wm | safe }}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<nav class="flexbox activity-bar margin-top-20">
|
||||||
|
<ul>
|
||||||
|
<li>
|
||||||
|
<div><a href="{{ wm_reply.url }}" rel="nofollow" class="object-permalink u-url u-uid">permalink</a></div>
|
||||||
|
</li>
|
||||||
|
<li>
|
||||||
|
<time class="dt-published" datetime="{{ wm_reply.published_at.replace(microsecond=0).isoformat() }}" title="{{ wm_reply.published_at.replace(microsecond=0).isoformat() }}">{{ wm_reply.published_at | timeago }}</time>
|
||||||
|
</li>
|
||||||
|
{% if is_admin %}
|
||||||
|
<li>
|
||||||
|
{{ admin_force_delete_webmention_button(wm_reply.webmention_id) }}
|
||||||
|
</li>
|
||||||
|
{% endif %}
|
||||||
|
</ul>
|
||||||
|
</nav>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{% endblock %}
|
||||||
|
{% endmacro %}
|
||||||
|
|
||||||
|
{% macro display_object(object, likes=[], shares=[], webmentions=[], expanded=False, actors_metadata={}, is_object_page=False, is_h_entry=True) %}
|
||||||
|
{% block display_object scoped %}
|
||||||
{% set is_article_mode = object.is_from_outbox and object.ap_type == "Article" and is_object_page %}
|
{% set is_article_mode = object.is_from_outbox and object.ap_type == "Article" and is_object_page %}
|
||||||
{% if object.ap_type in ["Note", "Article", "Video", "Page", "Question"] %}
|
{% if object.ap_type in ["Note", "Article", "Video", "Page", "Question", "Event"] %}
|
||||||
<div class="ap-object {% if expanded %}ap-object-expanded {% endif %}h-entry" id="{{ object.permalink_id }}">
|
<div class="ap-object {% if expanded %}ap-object-expanded {% endif %}{% if is_h_entry %}h-entry{% endif %}" id="{{ object.permalink_id }}">
|
||||||
|
|
||||||
{% if is_article_mode %}
|
{% if is_article_mode %}
|
||||||
<data class="h-card">
|
<data class="h-card">
|
||||||
|
@ -369,26 +544,49 @@
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if object.in_reply_to %}
|
{% if object.in_reply_to %}
|
||||||
<a href="{% if is_admin and object.is_in_reply_to_from_inbox %}{{ url_for("get_lookup") }}?query={% endif %}{{ object.in_reply_to }}" title="{{ object.in_reply_to }}" class="in-reply-to" rel="nofollow">
|
<p class="in-reply-to">in reply to <a href="{% if is_admin and object.is_in_reply_to_from_inbox %}{{ url_for("get_lookup") }}?query={% endif %}{{ object.in_reply_to }}" title="{{ object.in_reply_to }}" rel="nofollow">
|
||||||
in reply to {{ object.in_reply_to|truncate(64, True) }}
|
this object
|
||||||
</a>
|
</a></p>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if object.ap_type == "Article" %}
|
{% if object.ap_type in ["Article", "Event"] %}
|
||||||
<h2 class="p-name no-margin-top">{{ object.name }}</h2>
|
<h2 class="p-name no-margin-top">{{ object.name }}</h2>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% if object.ap_type == "Event" %}
|
||||||
|
{% if object.ap_object.get("endTime") and object.ap_object.get("startTime") %}
|
||||||
|
<p>On {{ object.ap_object.startTime | parse_datetime | format_date }}
|
||||||
|
(ends {{ object.ap_object.endTime | parse_datetime | format_date }})</p>
|
||||||
|
{% endif %}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
{% if object.ap_object.get("location") %}
|
||||||
|
{% set loc = object.ap_object.get("location") %}
|
||||||
|
{% if loc.type == "Place" and loc.latitude and loc.longitude %}
|
||||||
|
<div class="ap-place">
|
||||||
|
<h3>Location</h3>
|
||||||
|
{% if loc.name %}{{ loc.name }}{% endif %}
|
||||||
|
<span class="h-geo">
|
||||||
|
<data class="p-latitude" value="{{ loc.latitude}}"></data>
|
||||||
|
<data class="p-longitude" value="{{ loc.longitude }}"></data>
|
||||||
|
<a href="https://www.openstreetmap.org/?mlat={{ loc.latitude }}&mlon={{ loc.longitude }}#map=16/{{loc.latitude}}/{{loc.longitude}}">{{loc.latitude}},{{loc.longitude}}</a>
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
{% endif %}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{% if is_article_mode %}
|
{% if is_article_mode %}
|
||||||
<time class="dt-published muted" datetime="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}" title="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}">{{ object.ap_published_at.strftime("%b %d, %Y") }}</time>
|
<time class="dt-published muted" datetime="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}" title="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}">{{ object.ap_published_at.strftime("%b %d, %Y") }}</time>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if object.summary %}
|
{% if object.summary %}
|
||||||
<div class="show-more-wrapper">
|
<details class="show-more-wrapper">
|
||||||
<div class="p-summary">
|
<summary>
|
||||||
<p>{{ object.summary | clean_html(object) | safe }}</p>
|
<div class="p-summary">
|
||||||
</div>
|
<p>{{ object.summary | clean_html(object) | safe }}</p>
|
||||||
<label for="show-more-{{ object.permalink_id }}" class="show-more-btn">show/hide more</label>
|
</div>
|
||||||
<input class="show-more-state" type="checkbox" aria-hidden="true" id="show-more-{{ object.permalink_id }}" checked>
|
<span class="show-more-btn" aria-hidden="true"></span>
|
||||||
|
</summary>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
<div class="obj-content">
|
<div class="obj-content">
|
||||||
<div class="e-content">
|
<div class="e-content">
|
||||||
|
@ -449,7 +647,7 @@
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
{% if object.summary %}
|
{% if object.summary %}
|
||||||
</div>
|
</details>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
<div class="activity-attachment">
|
<div class="activity-attachment">
|
||||||
|
@ -461,6 +659,16 @@
|
||||||
<li>
|
<li>
|
||||||
<div><a href="{{ object.url }}"{% if object.is_from_inbox %} rel="nofollow"{% endif %} class="object-permalink u-url u-uid">permalink</a></div>
|
<div><a href="{{ object.url }}"{% if object.is_from_inbox %} rel="nofollow"{% endif %} class="object-permalink u-url u-uid">permalink</a></div>
|
||||||
</li>
|
</li>
|
||||||
|
|
||||||
|
{% if object.is_from_outbox and is_object_page and not is_admin and not request.url.path.startswith("/remote_interaction") %}
|
||||||
|
<li>
|
||||||
|
<a class="label-btn" href="{{ request.url_for("remote_interaction") }}?ap_id={{ object.ap_id }}">
|
||||||
|
interact from your instance
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
|
||||||
{% if not is_article_mode %}
|
{% if not is_article_mode %}
|
||||||
<li>
|
<li>
|
||||||
<time class="dt-published" datetime="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}" title="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}">{{ object.ap_published_at | timeago }}</time>
|
<time class="dt-published" datetime="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}" title="{{ object.ap_published_at.replace(microsecond=0).isoformat() }}">{{ object.ap_published_at | timeago }}</time>
|
||||||
|
@ -556,7 +764,7 @@
|
||||||
{% if object.visibility in [visibility_enum.PUBLIC, visibility_enum.UNLISTED] %}
|
{% if object.visibility in [visibility_enum.PUBLIC, visibility_enum.UNLISTED] %}
|
||||||
<li>
|
<li>
|
||||||
{% if object.announced_via_outbox_object_ap_id %}
|
{% if object.announced_via_outbox_object_ap_id %}
|
||||||
{{ admin_undo_button(object.liked_via_outbox_object_ap_id, "unshare") }}
|
{{ admin_undo_button(object.announced_via_outbox_object_ap_id, "unshare") }}
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ admin_announce_button(object.ap_id, permalink_id=object.permalink_id) }}
|
{{ admin_announce_button(object.ap_id, permalink_id=object.permalink_id) }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -574,6 +782,11 @@
|
||||||
{{ admin_expand_button(object) }}
|
{{ admin_expand_button(object) }}
|
||||||
</li>
|
</li>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% if object.is_from_inbox and not object.announced_via_outbox_object_ap_id and object.is_local_reply %}
|
||||||
|
<li>
|
||||||
|
{{ admin_force_delete_button(object.ap_id) }}
|
||||||
|
</li>
|
||||||
|
{% endif %}
|
||||||
</ul>
|
</ul>
|
||||||
</nav>
|
</nav>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -585,8 +798,8 @@
|
||||||
<div class="interactions-block">Likes
|
<div class="interactions-block">Likes
|
||||||
<div class="facepile-wrapper">
|
<div class="facepile-wrapper">
|
||||||
{% for like in likes %}
|
{% for like in likes %}
|
||||||
<a href="{% if is_admin %}{{ url_for("admin_profile") }}?actor_id={{ like.actor.ap_id }}{% else %}{{ like.actor.url }}{% endif %}" title="{{ like.actor.handle }}" rel="noreferrer">
|
<a href="{% if is_admin and like.ap_actor_id %}{{ url_for("admin_profile") }}?actor_id={{ like.ap_actor_id }}{% else %}{{ like.url }}{% endif %}" title="{{ like.name }}" rel="noreferrer">
|
||||||
<img src="{{ like.actor.resized_icon_url }}" alt="{{ like.actor.handle}}">
|
<img src="{{ like.picture_url }}" alt="{{ like.name }}">
|
||||||
</a>
|
</a>
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
{% if object.likes_count > likes | length %}
|
{% if object.likes_count > likes | length %}
|
||||||
|
@ -602,8 +815,8 @@
|
||||||
<div class="interactions-block">Shares
|
<div class="interactions-block">Shares
|
||||||
<div class="facepile-wrapper">
|
<div class="facepile-wrapper">
|
||||||
{% for share in shares %}
|
{% for share in shares %}
|
||||||
<a href="{% if is_admin %}{{ url_for("admin_profile") }}?actor_id={{ share.actor.ap_id }}{% else %}{{ share.actor.url }}{% endif %}" title="{{ share.actor.handle }}" rel="noreferrer">
|
<a href="{% if is_admin and share.ap_actor_id %}{{ url_for("admin_profile") }}?actor_id={{ share.ap_actor_id }}{% else %}{{ share.url }}{% endif %}" title="{{ share.name }}" rel="noreferrer">
|
||||||
<img src="{{ share.actor.resized_icon_url }}" alt="{{ share.actor.handle}}">
|
<img src="{{ share.picture_url }}" alt="{{ share.name }}">
|
||||||
</a>
|
</a>
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
{% if object.announces_count > shares | length %}
|
{% if object.announces_count > shares | length %}
|
||||||
|
@ -636,4 +849,5 @@
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
{% endblock %}
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
|
@ -60,7 +60,7 @@ async def save_upload(db_session: AsyncSession, f: UploadFile) -> models.Upload:
|
||||||
destination_image.putdata(original_image.getdata())
|
destination_image.putdata(original_image.getdata())
|
||||||
destination_image.save(
|
destination_image.save(
|
||||||
dest_filename,
|
dest_filename,
|
||||||
format=_original_image.format,
|
format=_original_image.format, # type: ignore
|
||||||
)
|
)
|
||||||
|
|
||||||
with open(dest_filename, "rb") as dest_f:
|
with open(dest_filename, "rb") as dest_f:
|
||||||
|
|
32
app/utils/custom_index_handler.py
Normal file
32
app/utils/custom_index_handler.py
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
from typing import Any
|
||||||
|
from typing import Awaitable
|
||||||
|
from typing import Callable
|
||||||
|
|
||||||
|
from fastapi import Depends
|
||||||
|
from fastapi import Request
|
||||||
|
from fastapi.responses import JSONResponse
|
||||||
|
|
||||||
|
from app.actor import LOCAL_ACTOR
|
||||||
|
from app.config import is_activitypub_requested
|
||||||
|
from app.database import AsyncSession
|
||||||
|
from app.database import get_db_session
|
||||||
|
|
||||||
|
_Handler = Callable[[Request, AsyncSession], Awaitable[Any]]
|
||||||
|
|
||||||
|
|
||||||
|
def build_custom_index_handler(handler: _Handler) -> _Handler:
|
||||||
|
async def custom_index(
|
||||||
|
request: Request,
|
||||||
|
db_session: AsyncSession = Depends(get_db_session),
|
||||||
|
) -> Any:
|
||||||
|
# Serve the AP actor if requested
|
||||||
|
if is_activitypub_requested(request):
|
||||||
|
return JSONResponse(
|
||||||
|
LOCAL_ACTOR.ap_actor,
|
||||||
|
media_type="application/activity+json",
|
||||||
|
)
|
||||||
|
|
||||||
|
# Defer to the custom handler
|
||||||
|
return await handler(request, db_session)
|
||||||
|
|
||||||
|
return custom_index
|
|
@ -23,6 +23,8 @@ def _load_emojis(root_dir: Path, base_url: str) -> None:
|
||||||
mt = mimetypes.guess_type(emoji.name)[0]
|
mt = mimetypes.guess_type(emoji.name)[0]
|
||||||
if mt and mt.startswith("image/"):
|
if mt and mt.startswith("image/"):
|
||||||
name = emoji.name.split(".")[0]
|
name = emoji.name.split(".")[0]
|
||||||
|
if not re.match(EMOJI_REGEX, f":{name}:"):
|
||||||
|
continue
|
||||||
ap_emoji: "RawObject" = {
|
ap_emoji: "RawObject" = {
|
||||||
"type": "Emoji",
|
"type": "Emoji",
|
||||||
"name": f":{name}:",
|
"name": f":{name}:",
|
||||||
|
|
172
app/utils/facepile.py
Normal file
172
app/utils/facepile.py
Normal file
|
@ -0,0 +1,172 @@
|
||||||
|
import datetime
|
||||||
|
from dataclasses import dataclass
|
||||||
|
from datetime import timezone
|
||||||
|
from typing import Any
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
|
from loguru import logger
|
||||||
|
|
||||||
|
from app import media
|
||||||
|
from app.models import InboxObject
|
||||||
|
from app.models import Webmention
|
||||||
|
from app.utils.datetime import parse_isoformat
|
||||||
|
from app.utils.url import must_make_abs
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class Face:
|
||||||
|
ap_actor_id: str | None
|
||||||
|
url: str
|
||||||
|
name: str
|
||||||
|
picture_url: str
|
||||||
|
created_at: datetime.datetime
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def from_inbox_object(cls, like: InboxObject) -> "Face":
|
||||||
|
return cls(
|
||||||
|
ap_actor_id=like.actor.ap_id,
|
||||||
|
url=like.actor.url, # type: ignore
|
||||||
|
name=like.actor.handle, # type: ignore
|
||||||
|
picture_url=like.actor.resized_icon_url,
|
||||||
|
created_at=like.created_at, # type: ignore
|
||||||
|
)
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def from_webmention(cls, webmention: Webmention) -> Optional["Face"]:
|
||||||
|
items = webmention.source_microformats.get("items", []) # type: ignore
|
||||||
|
for item in items:
|
||||||
|
if item["type"][0] == "h-card":
|
||||||
|
try:
|
||||||
|
return cls(
|
||||||
|
ap_actor_id=None,
|
||||||
|
url=(
|
||||||
|
must_make_abs(
|
||||||
|
item["properties"]["url"][0], webmention.source
|
||||||
|
)
|
||||||
|
if item["properties"].get("url")
|
||||||
|
else webmention.source
|
||||||
|
),
|
||||||
|
name=item["properties"]["name"][0],
|
||||||
|
picture_url=media.resized_media_url(
|
||||||
|
must_make_abs(
|
||||||
|
item["properties"]["photo"][0], webmention.source
|
||||||
|
), # type: ignore
|
||||||
|
50,
|
||||||
|
),
|
||||||
|
created_at=webmention.created_at, # type: ignore
|
||||||
|
)
|
||||||
|
except Exception:
|
||||||
|
logger.exception(
|
||||||
|
f"Failed to build Face for webmention id={webmention.id}"
|
||||||
|
)
|
||||||
|
break
|
||||||
|
elif item["type"][0] == "h-entry":
|
||||||
|
author = item["properties"]["author"][0]
|
||||||
|
try:
|
||||||
|
return cls(
|
||||||
|
ap_actor_id=None,
|
||||||
|
url=webmention.source,
|
||||||
|
name=author["properties"]["name"][0],
|
||||||
|
picture_url=media.resized_media_url(
|
||||||
|
must_make_abs(
|
||||||
|
author["properties"]["photo"][0], webmention.source
|
||||||
|
), # type: ignore
|
||||||
|
50,
|
||||||
|
),
|
||||||
|
created_at=webmention.created_at, # type: ignore
|
||||||
|
)
|
||||||
|
except Exception:
|
||||||
|
logger.exception(
|
||||||
|
f"Failed to build Face for webmention id={webmention.id}"
|
||||||
|
)
|
||||||
|
break
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
def merge_faces(faces: list[Face]) -> list[Face]:
|
||||||
|
return sorted(
|
||||||
|
faces,
|
||||||
|
key=lambda f: f.created_at,
|
||||||
|
reverse=True,
|
||||||
|
)[:10]
|
||||||
|
|
||||||
|
|
||||||
|
def _parse_face(webmention: Webmention, items: list[dict[str, Any]]) -> Face | None:
|
||||||
|
for item in items:
|
||||||
|
if item["type"][0] == "h-card":
|
||||||
|
try:
|
||||||
|
return Face(
|
||||||
|
ap_actor_id=None,
|
||||||
|
url=(
|
||||||
|
must_make_abs(item["properties"]["url"][0], webmention.source)
|
||||||
|
if item["properties"].get("url")
|
||||||
|
else webmention.source
|
||||||
|
),
|
||||||
|
name=item["properties"]["name"][0],
|
||||||
|
picture_url=media.resized_media_url(
|
||||||
|
must_make_abs(
|
||||||
|
item["properties"]["photo"][0], webmention.source
|
||||||
|
), # type: ignore
|
||||||
|
50,
|
||||||
|
),
|
||||||
|
created_at=webmention.created_at, # type: ignore
|
||||||
|
)
|
||||||
|
except Exception:
|
||||||
|
logger.exception(
|
||||||
|
f"Failed to build Face for webmention id={webmention.id}"
|
||||||
|
)
|
||||||
|
break
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class WebmentionReply:
|
||||||
|
face: Face
|
||||||
|
content: str
|
||||||
|
url: str
|
||||||
|
published_at: datetime.datetime
|
||||||
|
in_reply_to: str
|
||||||
|
webmention_id: int
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def from_webmention(cls, webmention: Webmention) -> Optional["WebmentionReply"]:
|
||||||
|
items = webmention.source_microformats.get("items", []) # type: ignore
|
||||||
|
for item in items:
|
||||||
|
if item["type"][0] == "h-entry":
|
||||||
|
try:
|
||||||
|
face = _parse_face(webmention, item["properties"].get("author", []))
|
||||||
|
if not face:
|
||||||
|
logger.info(
|
||||||
|
"Failed to build WebmentionReply/Face for "
|
||||||
|
f"webmention id={webmention.id}"
|
||||||
|
)
|
||||||
|
break
|
||||||
|
|
||||||
|
if "published" in item["properties"]:
|
||||||
|
published_at = (
|
||||||
|
parse_isoformat(item["properties"]["published"][0])
|
||||||
|
.astimezone(timezone.utc)
|
||||||
|
.replace(tzinfo=None)
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
published_at = webmention.created_at # type: ignore
|
||||||
|
|
||||||
|
return cls(
|
||||||
|
face=face,
|
||||||
|
content=item["properties"]["content"][0]["html"],
|
||||||
|
url=must_make_abs(
|
||||||
|
item["properties"]["url"][0], webmention.source
|
||||||
|
),
|
||||||
|
published_at=published_at,
|
||||||
|
in_reply_to=webmention.target, # type: ignore
|
||||||
|
webmention_id=webmention.id, # type: ignore
|
||||||
|
)
|
||||||
|
except Exception:
|
||||||
|
logger.exception(
|
||||||
|
f"Failed to build Face for webmention id={webmention.id}"
|
||||||
|
)
|
||||||
|
break
|
||||||
|
|
||||||
|
return None
|
|
@ -32,23 +32,22 @@ def highlight(html: str) -> str:
|
||||||
|
|
||||||
# If this comes from a microblog.pub instance we may have the language
|
# If this comes from a microblog.pub instance we may have the language
|
||||||
# in the class name
|
# in the class name
|
||||||
if "class" in code.attrs and code.attrs["class"][0].startswith("language-"):
|
if "data-microblogpub-lexer" in code.attrs:
|
||||||
try:
|
try:
|
||||||
lexer = get_lexer_by_name(
|
lexer = get_lexer_by_name(code.attrs["data-microblogpub-lexer"])
|
||||||
code.attrs["class"][0].removeprefix("language-")
|
|
||||||
)
|
|
||||||
except Exception:
|
except Exception:
|
||||||
lexer = guess_lexer(code_content)
|
lexer = guess_lexer(code_content)
|
||||||
else:
|
|
||||||
lexer = guess_lexer(code_content)
|
|
||||||
|
|
||||||
# Replace the code with Pygment output
|
# Replace the code with Pygment output
|
||||||
# XXX: the HTML escaping causes issue with Python type annotations
|
# XXX: the HTML escaping causes issue with Python type annotations
|
||||||
code_content = code_content.replace(") -> ", ") -> ")
|
code_content = code_content.replace(") -> ", ") -> ")
|
||||||
code.parent.replaceWith(
|
code.parent.replaceWith(
|
||||||
BeautifulSoup(
|
BeautifulSoup(
|
||||||
phighlight(code_content, lexer, _FORMATTER), "html5lib"
|
phighlight(code_content, lexer, _FORMATTER), "html5lib"
|
||||||
).body.next
|
).body.next
|
||||||
)
|
)
|
||||||
|
else:
|
||||||
|
code.name = "div"
|
||||||
|
code["class"] = code.get("class", []) + ["highlight"]
|
||||||
|
|
||||||
return soup.body.encode_contents().decode()
|
return soup.body.encode_contents().decode()
|
||||||
|
|
|
@ -10,7 +10,7 @@ from app.utils.url import make_abs
|
||||||
class IndieAuthClient:
|
class IndieAuthClient:
|
||||||
logo: str | None
|
logo: str | None
|
||||||
name: str
|
name: str
|
||||||
url: str
|
url: str | None
|
||||||
|
|
||||||
|
|
||||||
def _get_prop(props: dict[str, Any], name: str, default=None) -> Any:
|
def _get_prop(props: dict[str, Any], name: str, default=None) -> Any:
|
||||||
|
|
32
app/utils/mastodon.py
Normal file
32
app/utils/mastodon.py
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
from loguru import logger
|
||||||
|
|
||||||
|
from app.webfinger import get_actor_url
|
||||||
|
|
||||||
|
|
||||||
|
def _load_mastodon_following_accounts_csv_file(path: str) -> list[str]:
|
||||||
|
handles = []
|
||||||
|
for line in Path(path).read_text().splitlines()[1:]:
|
||||||
|
handle = line.split(",")[0]
|
||||||
|
handles.append(handle)
|
||||||
|
|
||||||
|
return handles
|
||||||
|
|
||||||
|
|
||||||
|
async def get_actor_urls_from_following_accounts_csv_file(
|
||||||
|
path: str,
|
||||||
|
) -> list[tuple[str, str]]:
|
||||||
|
actor_urls = []
|
||||||
|
for handle in _load_mastodon_following_accounts_csv_file(path):
|
||||||
|
try:
|
||||||
|
actor_url = await get_actor_url(handle)
|
||||||
|
except Exception:
|
||||||
|
logger.error("Failed to fetch actor URL for {handle=}")
|
||||||
|
else:
|
||||||
|
if actor_url:
|
||||||
|
actor_urls.append((handle, actor_url))
|
||||||
|
else:
|
||||||
|
logger.info(f"No actor URL found for {handle=}")
|
||||||
|
|
||||||
|
return actor_urls
|
|
@ -1,14 +1,18 @@
|
||||||
import asyncio
|
import asyncio
|
||||||
import mimetypes
|
import mimetypes
|
||||||
import re
|
import re
|
||||||
|
import signal
|
||||||
|
from concurrent.futures import TimeoutError
|
||||||
from typing import Any
|
from typing import Any
|
||||||
from urllib.parse import urlparse
|
from urllib.parse import urlparse
|
||||||
|
|
||||||
import httpx
|
import httpx
|
||||||
from bs4 import BeautifulSoup # type: ignore
|
from bs4 import BeautifulSoup # type: ignore
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
|
from pebble import concurrent # type: ignore
|
||||||
from pydantic import BaseModel
|
from pydantic import BaseModel
|
||||||
|
|
||||||
|
from app import activitypub as ap
|
||||||
from app import ap_object
|
from app import ap_object
|
||||||
from app import config
|
from app import config
|
||||||
from app.actor import LOCAL_ACTOR
|
from app.actor import LOCAL_ACTOR
|
||||||
|
@ -28,7 +32,11 @@ class OpenGraphMeta(BaseModel):
|
||||||
site_name: str
|
site_name: str
|
||||||
|
|
||||||
|
|
||||||
|
@concurrent.process(timeout=5)
|
||||||
def _scrap_og_meta(url: str, html: str) -> OpenGraphMeta | None:
|
def _scrap_og_meta(url: str, html: str) -> OpenGraphMeta | None:
|
||||||
|
# Prevent SIGTERM to bubble up to the worker
|
||||||
|
signal.signal(signal.SIGTERM, signal.SIG_IGN)
|
||||||
|
|
||||||
soup = BeautifulSoup(html, "html5lib")
|
soup = BeautifulSoup(html, "html5lib")
|
||||||
ogs = {
|
ogs = {
|
||||||
og.attrs["property"]: og.attrs.get("content")
|
og.attrs["property"]: og.attrs.get("content")
|
||||||
|
@ -54,9 +62,20 @@ def _scrap_og_meta(url: str, html: str) -> OpenGraphMeta | None:
|
||||||
if u := raw.get(maybe_rel):
|
if u := raw.get(maybe_rel):
|
||||||
raw[maybe_rel] = make_abs(u, url)
|
raw[maybe_rel] = make_abs(u, url)
|
||||||
|
|
||||||
|
if not is_url_valid(raw[maybe_rel]):
|
||||||
|
logger.info(f"Invalid url {raw[maybe_rel]}")
|
||||||
|
if maybe_rel == "url":
|
||||||
|
raw["url"] = url
|
||||||
|
elif maybe_rel == "image":
|
||||||
|
raw["image"] = None
|
||||||
|
|
||||||
return OpenGraphMeta.parse_obj(raw)
|
return OpenGraphMeta.parse_obj(raw)
|
||||||
|
|
||||||
|
|
||||||
|
def scrap_og_meta(url: str, html: str) -> OpenGraphMeta | None:
|
||||||
|
return _scrap_og_meta(url, html).result()
|
||||||
|
|
||||||
|
|
||||||
async def external_urls(
|
async def external_urls(
|
||||||
db_session: AsyncSession,
|
db_session: AsyncSession,
|
||||||
ro: ap_object.RemoteObject | OutboxObject | InboxObject,
|
ro: ap_object.RemoteObject | OutboxObject | InboxObject,
|
||||||
|
@ -69,7 +88,12 @@ async def external_urls(
|
||||||
tags_hrefs.add(tag_href)
|
tags_hrefs.add(tag_href)
|
||||||
if tag.get("type") == "Mention":
|
if tag.get("type") == "Mention":
|
||||||
if tag["href"] != LOCAL_ACTOR.ap_id:
|
if tag["href"] != LOCAL_ACTOR.ap_id:
|
||||||
mentioned_actor = await fetch_actor(db_session, tag["href"])
|
try:
|
||||||
|
mentioned_actor = await fetch_actor(db_session, tag["href"])
|
||||||
|
except (ap.FetchError, ap.NotAnObjectError):
|
||||||
|
tags_hrefs.add(tag["href"])
|
||||||
|
continue
|
||||||
|
|
||||||
tags_hrefs.add(mentioned_actor.url)
|
tags_hrefs.add(mentioned_actor.url)
|
||||||
tags_hrefs.add(mentioned_actor.ap_id)
|
tags_hrefs.add(mentioned_actor.ap_id)
|
||||||
else:
|
else:
|
||||||
|
@ -84,18 +108,22 @@ async def external_urls(
|
||||||
if not h:
|
if not h:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
ph = urlparse(h)
|
try:
|
||||||
mimetype, _ = mimetypes.guess_type(h)
|
ph = urlparse(h)
|
||||||
if (
|
mimetype, _ = mimetypes.guess_type(h)
|
||||||
ph.scheme in {"http", "https"}
|
if (
|
||||||
and ph.hostname != note_host
|
ph.scheme in {"http", "https"}
|
||||||
and is_url_valid(h)
|
and ph.hostname != note_host
|
||||||
and (
|
and is_url_valid(h)
|
||||||
not mimetype
|
and (
|
||||||
or mimetype.split("/")[0] not in ["image", "video", "audio"]
|
not mimetype
|
||||||
)
|
or mimetype.split("/")[0] not in ["image", "video", "audio"]
|
||||||
):
|
)
|
||||||
urls.add(h)
|
):
|
||||||
|
urls.add(h)
|
||||||
|
except Exception:
|
||||||
|
logger.exception(f"Failed to check {h}")
|
||||||
|
continue
|
||||||
|
|
||||||
return urls - tags_hrefs
|
return urls - tags_hrefs
|
||||||
|
|
||||||
|
@ -116,7 +144,10 @@ async def _og_meta_from_url(url: str) -> OpenGraphMeta | None:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
try:
|
try:
|
||||||
return _scrap_og_meta(url, resp.text)
|
return scrap_og_meta(url, resp.text)
|
||||||
|
except TimeoutError:
|
||||||
|
logger.info(f"Timed out when scraping OG meta for {url}")
|
||||||
|
return None
|
||||||
except Exception:
|
except Exception:
|
||||||
logger.info(f"Failed to scrap OG meta for {url}")
|
logger.info(f"Failed to scrap OG meta for {url}")
|
||||||
return None
|
return None
|
||||||
|
|
8
app/utils/text.py
Normal file
8
app/utils/text.py
Normal file
|
@ -0,0 +1,8 @@
|
||||||
|
import re
|
||||||
|
import unicodedata
|
||||||
|
|
||||||
|
|
||||||
|
def slugify(text: str) -> str:
|
||||||
|
value = unicodedata.normalize("NFKC", text)
|
||||||
|
value = re.sub(r"[^\w\s-]", "", value.lower())
|
||||||
|
return re.sub(r"[-\s]+", "-", value).strip("-_")
|
|
@ -21,6 +21,13 @@ def make_abs(url: str | None, parent: str) -> str | None:
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def must_make_abs(url: str | None, parent: str) -> str:
|
||||||
|
abs_url = make_abs(url, parent)
|
||||||
|
if not abs_url:
|
||||||
|
raise ValueError("missing URL")
|
||||||
|
return abs_url
|
||||||
|
|
||||||
|
|
||||||
class InvalidURLError(Exception):
|
class InvalidURLError(Exception):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
@ -54,10 +61,14 @@ def is_url_valid(url: str) -> bool:
|
||||||
if not parsed.hostname or parsed.hostname.lower() in ["localhost"]:
|
if not parsed.hostname or parsed.hostname.lower() in ["localhost"]:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if parsed.hostname in BLOCKED_SERVERS:
|
if is_hostname_blocked(parsed.hostname):
|
||||||
logger.warning(f"{parsed.hostname} is blocked")
|
logger.warning(f"{parsed.hostname} is blocked")
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
if parsed.hostname.endswith(".onion"):
|
||||||
|
logger.warning(f"{url} is an onion service")
|
||||||
|
return False
|
||||||
|
|
||||||
ip_address = _getaddrinfo(
|
ip_address = _getaddrinfo(
|
||||||
parsed.hostname, parsed.port or (80 if parsed.scheme == "http" else 443)
|
parsed.hostname, parsed.port or (80 if parsed.scheme == "http" else 443)
|
||||||
)
|
)
|
||||||
|
@ -77,3 +88,11 @@ def check_url(url: str) -> None:
|
||||||
raise InvalidURLError(f'"{url}" is invalid')
|
raise InvalidURLError(f'"{url}" is invalid')
|
||||||
|
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
@functools.lru_cache(maxsize=256)
|
||||||
|
def is_hostname_blocked(hostname: str) -> bool:
|
||||||
|
for blocked_hostname in BLOCKED_SERVERS:
|
||||||
|
if hostname == blocked_hostname or hostname.endswith(f".{blocked_hostname}"):
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
|
@ -24,7 +24,7 @@ async def _discover_webmention_endoint(url: str) -> str | None:
|
||||||
follow_redirects=True,
|
follow_redirects=True,
|
||||||
)
|
)
|
||||||
resp.raise_for_status()
|
resp.raise_for_status()
|
||||||
except (httpx.HTTPError, httpx.HTTPStatusError):
|
except Exception:
|
||||||
logger.exception(f"Failed to discover webmention endpoint for {url}")
|
logger.exception(f"Failed to discover webmention endpoint for {url}")
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
|
@ -69,5 +69,5 @@ class Worker(Generic[T]):
|
||||||
logger.info("stopping loop")
|
logger.info("stopping loop")
|
||||||
|
|
||||||
async def _shutdown(self, sig: signal.Signals) -> None:
|
async def _shutdown(self, sig: signal.Signals) -> None:
|
||||||
logger.info(f"Caught {signal=}")
|
logger.info(f"Caught {sig=}")
|
||||||
self._stop_event.set()
|
self._stop_event.set()
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
import xml.etree.ElementTree as ET
|
||||||
from typing import Any
|
from typing import Any
|
||||||
from urllib.parse import urlparse
|
from urllib.parse import urlparse
|
||||||
|
|
||||||
|
@ -8,32 +9,85 @@ from app import config
|
||||||
from app.utils.url import check_url
|
from app.utils.url import check_url
|
||||||
|
|
||||||
|
|
||||||
|
async def get_webfinger_via_host_meta(host: str) -> str | None:
|
||||||
|
resp: httpx.Response | None = None
|
||||||
|
is_404 = False
|
||||||
|
async with httpx.AsyncClient() as client:
|
||||||
|
for i, proto in enumerate({"http", "https"}):
|
||||||
|
try:
|
||||||
|
url = f"{proto}://{host}/.well-known/host-meta"
|
||||||
|
check_url(url)
|
||||||
|
resp = await client.get(
|
||||||
|
url,
|
||||||
|
headers={
|
||||||
|
"User-Agent": config.USER_AGENT,
|
||||||
|
},
|
||||||
|
follow_redirects=True,
|
||||||
|
)
|
||||||
|
resp.raise_for_status()
|
||||||
|
break
|
||||||
|
except httpx.HTTPStatusError as http_error:
|
||||||
|
logger.exception("HTTP error")
|
||||||
|
if http_error.response.status_code in [403, 404, 410]:
|
||||||
|
is_404 = True
|
||||||
|
continue
|
||||||
|
raise
|
||||||
|
except httpx.HTTPError:
|
||||||
|
logger.exception("req failed")
|
||||||
|
# If we tried https first and the domain is "http only"
|
||||||
|
if i == 0:
|
||||||
|
continue
|
||||||
|
break
|
||||||
|
|
||||||
|
if is_404:
|
||||||
|
return None
|
||||||
|
|
||||||
|
if resp:
|
||||||
|
tree = ET.fromstring(resp.text)
|
||||||
|
maybe_link = tree.find(
|
||||||
|
"./{http://docs.oasis-open.org/ns/xri/xrd-1.0}Link[@rel='lrdd']"
|
||||||
|
)
|
||||||
|
if maybe_link is not None:
|
||||||
|
return maybe_link.attrib.get("template")
|
||||||
|
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
async def webfinger(
|
async def webfinger(
|
||||||
resource: str,
|
resource: str,
|
||||||
|
webfinger_url: str | None = None,
|
||||||
) -> dict[str, Any] | None: # noqa: C901
|
) -> dict[str, Any] | None: # noqa: C901
|
||||||
"""Mastodon-like WebFinger resolution to retrieve the activity stream Actor URL."""
|
"""Mastodon-like WebFinger resolution to retrieve the activity stream Actor URL."""
|
||||||
|
resource = resource.strip()
|
||||||
logger.info(f"performing webfinger resolution for {resource}")
|
logger.info(f"performing webfinger resolution for {resource}")
|
||||||
protos = ["https", "http"]
|
urls = []
|
||||||
if resource.startswith("http://"):
|
host = None
|
||||||
protos.reverse()
|
if webfinger_url:
|
||||||
host = urlparse(resource).netloc
|
urls = [webfinger_url]
|
||||||
elif resource.startswith("https://"):
|
|
||||||
host = urlparse(resource).netloc
|
|
||||||
else:
|
else:
|
||||||
if resource.startswith("acct:"):
|
if resource.startswith("http://"):
|
||||||
resource = resource[5:]
|
host = urlparse(resource).netloc
|
||||||
if resource.startswith("@"):
|
url = f"http://{host}/.well-known/webfinger"
|
||||||
resource = resource[1:]
|
elif resource.startswith("https://"):
|
||||||
_, host = resource.split("@", 1)
|
host = urlparse(resource).netloc
|
||||||
resource = "acct:" + resource
|
url = f"https://{host}/.well-known/webfinger"
|
||||||
|
else:
|
||||||
|
protos = ["https", "http"]
|
||||||
|
_, host = resource.split("@", 1)
|
||||||
|
urls = [f"{proto}://{host}/.well-known/webfinger" for proto in protos]
|
||||||
|
|
||||||
|
if resource.startswith("acct:"):
|
||||||
|
resource = resource[5:]
|
||||||
|
if resource.startswith("@"):
|
||||||
|
resource = resource[1:]
|
||||||
|
resource = "acct:" + resource
|
||||||
|
|
||||||
is_404 = False
|
is_404 = False
|
||||||
|
|
||||||
resp: httpx.Response | None = None
|
resp: httpx.Response | None = None
|
||||||
async with httpx.AsyncClient() as client:
|
async with httpx.AsyncClient() as client:
|
||||||
for i, proto in enumerate(protos):
|
for i, url in enumerate(urls):
|
||||||
try:
|
try:
|
||||||
url = f"{proto}://{host}/.well-known/webfinger"
|
|
||||||
check_url(url)
|
check_url(url)
|
||||||
resp = await client.get(
|
resp = await client.get(
|
||||||
url,
|
url,
|
||||||
|
@ -57,7 +111,14 @@ async def webfinger(
|
||||||
if i == 0:
|
if i == 0:
|
||||||
continue
|
continue
|
||||||
break
|
break
|
||||||
|
|
||||||
if is_404:
|
if is_404:
|
||||||
|
if not webfinger_url and host:
|
||||||
|
if webfinger_url := (await get_webfinger_via_host_meta(host)):
|
||||||
|
return await webfinger(
|
||||||
|
resource,
|
||||||
|
webfinger_url=webfinger_url,
|
||||||
|
)
|
||||||
return None
|
return None
|
||||||
|
|
||||||
if resp:
|
if resp:
|
||||||
|
|
|
@ -1,3 +1,5 @@
|
||||||
|
from urllib.parse import urlparse
|
||||||
|
|
||||||
import httpx
|
import httpx
|
||||||
from bs4 import BeautifulSoup # type: ignore
|
from bs4 import BeautifulSoup # type: ignore
|
||||||
from fastapi import APIRouter
|
from fastapi import APIRouter
|
||||||
|
@ -6,13 +8,21 @@ from fastapi import HTTPException
|
||||||
from fastapi import Request
|
from fastapi import Request
|
||||||
from fastapi.responses import JSONResponse
|
from fastapi.responses import JSONResponse
|
||||||
from loguru import logger
|
from loguru import logger
|
||||||
|
from sqlalchemy import func
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
|
|
||||||
from app import models
|
from app import models
|
||||||
|
from app.boxes import _get_outbox_announces_count
|
||||||
|
from app.boxes import _get_outbox_likes_count
|
||||||
|
from app.boxes import _get_outbox_replies_count
|
||||||
from app.boxes import get_outbox_object_by_ap_id
|
from app.boxes import get_outbox_object_by_ap_id
|
||||||
|
from app.boxes import get_outbox_object_by_slug_and_short_id
|
||||||
|
from app.boxes import is_notification_enabled
|
||||||
from app.database import AsyncSession
|
from app.database import AsyncSession
|
||||||
from app.database import get_db_session
|
from app.database import get_db_session
|
||||||
from app.utils import microformats
|
from app.utils import microformats
|
||||||
|
from app.utils.facepile import Face
|
||||||
|
from app.utils.facepile import WebmentionReply
|
||||||
from app.utils.url import check_url
|
from app.utils.url import check_url
|
||||||
from app.utils.url import is_url_valid
|
from app.utils.url import is_url_valid
|
||||||
|
|
||||||
|
@ -47,6 +57,7 @@ async def webmention_endpoint(
|
||||||
|
|
||||||
check_url(source)
|
check_url(source)
|
||||||
check_url(target)
|
check_url(target)
|
||||||
|
parsed_target_url = urlparse(target)
|
||||||
except Exception:
|
except Exception:
|
||||||
logger.exception("Invalid webmention request")
|
logger.exception("Invalid webmention request")
|
||||||
raise HTTPException(status_code=400, detail="Invalid payload")
|
raise HTTPException(status_code=400, detail="Invalid payload")
|
||||||
|
@ -65,6 +76,16 @@ async def webmention_endpoint(
|
||||||
logger.info("Found existing Webmention, will try to update or delete")
|
logger.info("Found existing Webmention, will try to update or delete")
|
||||||
|
|
||||||
mentioned_object = await get_outbox_object_by_ap_id(db_session, target)
|
mentioned_object = await get_outbox_object_by_ap_id(db_session, target)
|
||||||
|
|
||||||
|
if not mentioned_object and parsed_target_url.path.startswith("/articles/"):
|
||||||
|
try:
|
||||||
|
_, _, short_id, slug = parsed_target_url.path.split("/")
|
||||||
|
mentioned_object = await get_outbox_object_by_slug_and_short_id(
|
||||||
|
db_session, slug, short_id
|
||||||
|
)
|
||||||
|
except Exception:
|
||||||
|
logger.exception(f"Failed to match {target}")
|
||||||
|
|
||||||
if not mentioned_object:
|
if not mentioned_object:
|
||||||
logger.info(f"Invalid target {target=}")
|
logger.info(f"Invalid target {target=}")
|
||||||
|
|
||||||
|
@ -90,15 +111,21 @@ async def webmention_endpoint(
|
||||||
logger.warning(f"target {target=} not found in source")
|
logger.warning(f"target {target=} not found in source")
|
||||||
if existing_webmention_in_db:
|
if existing_webmention_in_db:
|
||||||
logger.info("Deleting existing Webmention")
|
logger.info("Deleting existing Webmention")
|
||||||
mentioned_object.webmentions_count = mentioned_object.webmentions_count - 1
|
|
||||||
existing_webmention_in_db.is_deleted = True
|
existing_webmention_in_db.is_deleted = True
|
||||||
|
await db_session.flush()
|
||||||
|
|
||||||
notif = models.Notification(
|
# Revert side effects
|
||||||
notification_type=models.NotificationType.DELETED_WEBMENTION,
|
await _handle_webmention_side_effects(
|
||||||
outbox_object_id=mentioned_object.id,
|
db_session, existing_webmention_in_db, mentioned_object
|
||||||
webmention_id=existing_webmention_in_db.id,
|
|
||||||
)
|
)
|
||||||
db_session.add(notif)
|
|
||||||
|
if is_notification_enabled(models.NotificationType.DELETED_WEBMENTION):
|
||||||
|
notif = models.Notification(
|
||||||
|
notification_type=models.NotificationType.DELETED_WEBMENTION,
|
||||||
|
outbox_object_id=mentioned_object.id,
|
||||||
|
webmention_id=existing_webmention_in_db.id,
|
||||||
|
)
|
||||||
|
db_session.add(notif)
|
||||||
|
|
||||||
await db_session.commit()
|
await db_session.commit()
|
||||||
|
|
||||||
|
@ -110,36 +137,96 @@ async def webmention_endpoint(
|
||||||
else:
|
else:
|
||||||
return JSONResponse(content={}, status_code=200)
|
return JSONResponse(content={}, status_code=200)
|
||||||
|
|
||||||
|
webmention_type = models.WebmentionType.UNKNOWN
|
||||||
|
webmention: models.Webmention
|
||||||
if existing_webmention_in_db:
|
if existing_webmention_in_db:
|
||||||
# Undelete if needed
|
# Undelete if needed
|
||||||
existing_webmention_in_db.is_deleted = False
|
existing_webmention_in_db.is_deleted = False
|
||||||
existing_webmention_in_db.source_microformats = data
|
existing_webmention_in_db.source_microformats = data
|
||||||
|
await db_session.flush()
|
||||||
|
webmention = existing_webmention_in_db
|
||||||
|
|
||||||
notif = models.Notification(
|
if is_notification_enabled(models.NotificationType.UPDATED_WEBMENTION):
|
||||||
notification_type=models.NotificationType.UPDATED_WEBMENTION,
|
notif = models.Notification(
|
||||||
outbox_object_id=mentioned_object.id,
|
notification_type=models.NotificationType.UPDATED_WEBMENTION,
|
||||||
webmention_id=existing_webmention_in_db.id,
|
outbox_object_id=mentioned_object.id,
|
||||||
)
|
webmention_id=existing_webmention_in_db.id,
|
||||||
db_session.add(notif)
|
)
|
||||||
|
db_session.add(notif)
|
||||||
else:
|
else:
|
||||||
new_webmention = models.Webmention(
|
new_webmention = models.Webmention(
|
||||||
source=source,
|
source=source,
|
||||||
target=target,
|
target=target,
|
||||||
source_microformats=data,
|
source_microformats=data,
|
||||||
outbox_object_id=mentioned_object.id,
|
outbox_object_id=mentioned_object.id,
|
||||||
|
webmention_type=webmention_type,
|
||||||
)
|
)
|
||||||
db_session.add(new_webmention)
|
db_session.add(new_webmention)
|
||||||
await db_session.flush()
|
await db_session.flush()
|
||||||
|
webmention = new_webmention
|
||||||
|
|
||||||
notif = models.Notification(
|
if is_notification_enabled(models.NotificationType.NEW_WEBMENTION):
|
||||||
notification_type=models.NotificationType.NEW_WEBMENTION,
|
notif = models.Notification(
|
||||||
outbox_object_id=mentioned_object.id,
|
notification_type=models.NotificationType.NEW_WEBMENTION,
|
||||||
webmention_id=new_webmention.id,
|
outbox_object_id=mentioned_object.id,
|
||||||
)
|
webmention_id=new_webmention.id,
|
||||||
db_session.add(notif)
|
)
|
||||||
|
db_session.add(notif)
|
||||||
|
|
||||||
mentioned_object.webmentions_count = mentioned_object.webmentions_count + 1
|
# Determine the webmention type
|
||||||
|
for item in data.get("items", []):
|
||||||
|
if target in item.get("properties", {}).get(
|
||||||
|
"in-reply-to", []
|
||||||
|
) and WebmentionReply.from_webmention(webmention):
|
||||||
|
webmention_type = models.WebmentionType.REPLY
|
||||||
|
break
|
||||||
|
elif target in item.get("properties", {}).get(
|
||||||
|
"like-of", []
|
||||||
|
) and Face.from_webmention(webmention):
|
||||||
|
webmention_type = models.WebmentionType.LIKE
|
||||||
|
break
|
||||||
|
elif target in item.get("properties", {}).get(
|
||||||
|
"repost-of", []
|
||||||
|
) and Face.from_webmention(webmention):
|
||||||
|
webmention_type = models.WebmentionType.REPOST
|
||||||
|
break
|
||||||
|
|
||||||
|
if webmention_type != models.WebmentionType.UNKNOWN:
|
||||||
|
webmention.webmention_type = webmention_type
|
||||||
|
await db_session.flush()
|
||||||
|
|
||||||
|
# Handle side effect
|
||||||
|
await _handle_webmention_side_effects(db_session, webmention, mentioned_object)
|
||||||
await db_session.commit()
|
await db_session.commit()
|
||||||
|
|
||||||
return JSONResponse(content={}, status_code=200)
|
return JSONResponse(content={}, status_code=200)
|
||||||
|
|
||||||
|
|
||||||
|
async def _handle_webmention_side_effects(
|
||||||
|
db_session: AsyncSession,
|
||||||
|
webmention: models.Webmention,
|
||||||
|
mentioned_object: models.OutboxObject,
|
||||||
|
) -> None:
|
||||||
|
if webmention.webmention_type == models.WebmentionType.UNKNOWN:
|
||||||
|
# TODO: recount everything
|
||||||
|
mentioned_object.webmentions_count = await db_session.scalar(
|
||||||
|
select(func.count(models.Webmention.id)).where(
|
||||||
|
models.Webmention.is_deleted.is_(False),
|
||||||
|
models.Webmention.outbox_object_id == mentioned_object.id,
|
||||||
|
models.Webmention.webmention_type == models.WebmentionType.UNKNOWN,
|
||||||
|
)
|
||||||
|
)
|
||||||
|
elif webmention.webmention_type == models.WebmentionType.LIKE:
|
||||||
|
mentioned_object.likes_count = await _get_outbox_likes_count(
|
||||||
|
db_session, mentioned_object
|
||||||
|
)
|
||||||
|
elif webmention.webmention_type == models.WebmentionType.REPOST:
|
||||||
|
mentioned_object.announces_count = await _get_outbox_announces_count(
|
||||||
|
db_session, mentioned_object
|
||||||
|
)
|
||||||
|
elif webmention.webmention_type == models.WebmentionType.REPLY:
|
||||||
|
mentioned_object.replies_count = await _get_outbox_replies_count(
|
||||||
|
db_session, mentioned_object
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
raise ValueError(f"Unhandled {webmention.webmention_type} webmention")
|
||||||
|
|
1
data/templates/app
Symbolic link
1
data/templates/app
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../app/templates/
|
|
@ -5,6 +5,7 @@ admin_password = "$2b$12$OwCyZM33uXQUVrChgER.h.qgFJ4fBp6tdFwArR3Lm1LV8NgMvIxVa"
|
||||||
name = "test"
|
name = "test"
|
||||||
summary = "<p>Hello</p>"
|
summary = "<p>Hello</p>"
|
||||||
https = false
|
https = false
|
||||||
|
id = "http://localhost:8000"
|
||||||
icon_url = "https://localhost:8000/static/nopic.png"
|
icon_url = "https://localhost:8000/static/nopic.png"
|
||||||
secret = "1dd4079e0474d1a519052b8fe3cb5fa6"
|
secret = "1dd4079e0474d1a519052b8fe3cb5fa6"
|
||||||
debug = true
|
debug = true
|
||||||
|
|
|
@ -58,3 +58,24 @@ And check out the result by starting a static server using Python standard libra
|
||||||
cd docs/dist
|
cd docs/dist
|
||||||
python -m http.server 8001
|
python -m http.server 8001
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Contributing
|
||||||
|
|
||||||
|
Contributions/patches are welcome, but please start a discussion in a [ticket](https://todo.sr.ht/~tsileo/microblog.pub) or a [thread in the mailing list](https://lists.sr.ht/~tsileo/microblog.pub-devel) before working on anything consequent.
|
||||||
|
|
||||||
|
### Patches
|
||||||
|
|
||||||
|
Please ensure your code passes the code quality checks:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
inv autoformat
|
||||||
|
inv lint
|
||||||
|
```
|
||||||
|
|
||||||
|
And that the tests suite is passing:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
inv tests
|
||||||
|
```
|
||||||
|
|
||||||
|
Please also consider adding new test cases if needed.
|
||||||
|
|
|
@ -89,6 +89,12 @@ Setup config.
|
||||||
poetry run inv configuration-wizard
|
poetry run inv configuration-wizard
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Setup the database.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
poetry run inv migrate-db
|
||||||
|
```
|
||||||
|
|
||||||
Grab your virtualenv path.
|
Grab your virtualenv path.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
|
@ -185,6 +191,72 @@ http {
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## (Advanced) Running on a subdomain
|
||||||
|
|
||||||
|
It is possible to run microblogpub on a subdomain (`sub.domain.tld`) while being reachable from the root root domain (`domain.tld`) using the `name@domain.tld` handle.
|
||||||
|
|
||||||
|
This requires forwarding/proxying requests from the root domain to the subdomain, for example using NGINX:
|
||||||
|
|
||||||
|
```nginx
|
||||||
|
location /.well-known/webfinger {
|
||||||
|
add_header Access-Control-Allow-Origin '*';
|
||||||
|
return 301 https://sub.domain.tld$request_uri;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
And updating `data/profile.toml` to specify the root domain as the webfinger domain:
|
||||||
|
|
||||||
|
```toml
|
||||||
|
webfinger_domain = "domain.tld"
|
||||||
|
```
|
||||||
|
|
||||||
|
Once configured correctly, people will be able to follow you using `name@domain.tld`, while using `sub.domain.tld` for the web interface.
|
||||||
|
|
||||||
|
|
||||||
|
## (Advanced) Running from subpath
|
||||||
|
|
||||||
|
It is possible to configure microblogpub to run from subpath.
|
||||||
|
To achieve this, do the following configuration _between_ config and start steps.
|
||||||
|
i.e. _after_ you run `make config` or `poetry run inv configuration-wizard`,
|
||||||
|
but _before_ you run `docker compose up` or `poetry run supervisord`.
|
||||||
|
Changing this settings on an instance which has some posts or was seen by other instances will likely break links to these posts or federation (i.e. links to your instance, posts and profile from other instances).
|
||||||
|
|
||||||
|
The following steps will explain how to configure instance to be available at `https://example.com/subdir`.
|
||||||
|
Change them to your actual domain and subdir.
|
||||||
|
|
||||||
|
* Edit `data/profile.toml` file, add this line:
|
||||||
|
|
||||||
|
id = "https://example.com/subdir"
|
||||||
|
|
||||||
|
* Edit `misc/*-supervisord.conf` file which is relevant to you (it depends on how you start microblogpub - if in doubt, do the same change in all of them) - in `[program:uvicorn]` section, in the line which starts with `command`, add this argument at the very end: ` --root-path /subdir`
|
||||||
|
|
||||||
|
Above two steps are enough to configure microblogpub.
|
||||||
|
Next, you also need to configure reverse proxy.
|
||||||
|
It might slightly differ if you plan to have other services running on the same domain, but for [NGINX config shown above](#reverse-proxy), the following changes are enough:
|
||||||
|
|
||||||
|
* Add subdir to location, so location block starts like this:
|
||||||
|
|
||||||
|
location /subdir {
|
||||||
|
|
||||||
|
* Add `/` at the end of `proxy_pass` directive, like this:
|
||||||
|
|
||||||
|
proxy_pass http://localhost:8000/;
|
||||||
|
|
||||||
|
These two changes will instruct NGINX that requests sent to `https://example.com/subdir/...` should be forwarded to `http://localhost:8000/...`.
|
||||||
|
|
||||||
|
* Inside `server` block, add redirects for well-known URLs (add these lines after `client_max_body_size`, remember to replace `subdir` with your actual subdir!):
|
||||||
|
|
||||||
|
location /.well-known/webfinger { return 301 /subdir$request_uri; }
|
||||||
|
location /.well-known/nodeinfo { return 301 /subdir$request_uri; }
|
||||||
|
location /.well-known/oauth-authorization-server { return 301 /subdir$request_uri; }
|
||||||
|
|
||||||
|
* Optionally, [check robots.txt from a running microblogpub instance](https://microblog.pub/robots.txt) and integrate it into robots.txt file in the root of your server - remember to prepend `subdir` to URLs, so for example `Disallow: /admin` becomes `Disallow: /subdir/admin`.
|
||||||
|
|
||||||
## YunoHost edition
|
## YunoHost edition
|
||||||
|
|
||||||
[YunoHost](https://yunohost.org/) support is a work in progress.
|
[YunoHost](https://yunohost.org/) support is available (although it is not an official package for now): <https://git.sr.ht/~tsileo/microblog.pub_ynh>.
|
||||||
|
|
||||||
|
## Available tutorial/guides
|
||||||
|
|
||||||
|
- [Opalstack](https://community.opalstack.com/d/1055-howto-install-and-run-microblogpub-on-opalstack), thanks to [@defulmere@mastodon.social](https://mastodon.online/@defulmere).
|
||||||
|
|
2
docs/templates/layout.html
vendored
2
docs/templates/layout.html
vendored
|
@ -63,7 +63,7 @@ nav a:hover, main a:hover, header p a:hover {
|
||||||
max-width: 960px;
|
max-width: 960px;
|
||||||
margin: 50px auto;
|
margin: 50px auto;
|
||||||
}
|
}
|
||||||
pre code {
|
pre {
|
||||||
padding: 10px;
|
padding: 10px;
|
||||||
overflow: auto;
|
overflow: auto;
|
||||||
display: block;
|
display: block;
|
||||||
|
|
|
@ -25,9 +25,10 @@ As these two config items define your ActivityPub handle `@handle@domain`.
|
||||||
|
|
||||||
You can tweak your profile by tweaking these items:
|
You can tweak your profile by tweaking these items:
|
||||||
|
|
||||||
- `name`
|
- `name`: The name shown with your profile.
|
||||||
- `summary` (using Markdown)
|
- `summary`: The summary or 'bio' part of your profile, written in Markdown.
|
||||||
- `icon_url`
|
- `icon_url`: Your profile image or avatar.
|
||||||
|
- `image_url`: This provides a 'header' or 'banner' image. Note that it is not shown by the default Microblog.pub templates. It will be used by Mastodon (which uses a 3:1 ratio image) and Pleroma. Pixelfed and Peertube, for example, don't show these images by default.
|
||||||
|
|
||||||
Whenever one of these config items is updated, an `Update` activity will be sent to all known servers to update your remote profile.
|
Whenever one of these config items is updated, an `Update` activity will be sent to all known servers to update your remote profile.
|
||||||
|
|
||||||
|
@ -35,6 +36,15 @@ The server will need to be restarted for taking changes into account.
|
||||||
|
|
||||||
Before restarting the server, you can ensure you haven't made any mistakes by running the [configuration checking task](/user_guide.html#configuration-checking).
|
Before restarting the server, you can ensure you haven't made any mistakes by running the [configuration checking task](/user_guide.html#configuration-checking).
|
||||||
|
|
||||||
|
Note that currently `image_url` is not used anywhere in microblog.pub itself, but other clients/servers do occasionally use it when showing remote profiles as a background image.
|
||||||
|
Also, this image _can_ be used in microblog.pub - just add this:
|
||||||
|
|
||||||
|
```html
|
||||||
|
<img src="{{ local_actor.image_url | media_proxy_url }}">
|
||||||
|
```
|
||||||
|
|
||||||
|
to an appropriate place of your template (most likely, `header.html`).
|
||||||
|
For more information, see a section about [custom templates](/user_guide.html#custom-templates) further in this document.
|
||||||
|
|
||||||
### Profile metadata
|
### Profile metadata
|
||||||
|
|
||||||
|
@ -98,6 +108,39 @@ privacy_replace = [
|
||||||
]
|
]
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Disabling certain notification types
|
||||||
|
|
||||||
|
All notifications are enabled by default.
|
||||||
|
|
||||||
|
You can disabled specific notifications by adding them to the `disabled_notifications` list.
|
||||||
|
|
||||||
|
This example disables likes and shares notifications:
|
||||||
|
|
||||||
|
```
|
||||||
|
disabled_notifications = ["like", "announce"]
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Available notification types
|
||||||
|
|
||||||
|
- `new_follower`
|
||||||
|
- `rejected_follower`
|
||||||
|
- `unfollow`
|
||||||
|
- `follow_request_accepted`
|
||||||
|
- `follow_request_rejected`
|
||||||
|
- `move`
|
||||||
|
- `like`
|
||||||
|
- `undo_like`
|
||||||
|
- `announce`
|
||||||
|
- `undo_announce`
|
||||||
|
- `mention`
|
||||||
|
- `new_webmention`
|
||||||
|
- `updated_webmention`
|
||||||
|
- `deleted_webmention`
|
||||||
|
- `blocked`
|
||||||
|
- `unblocked`
|
||||||
|
- `block`
|
||||||
|
- `unblock`
|
||||||
|
|
||||||
### Customization
|
### Customization
|
||||||
|
|
||||||
#### Default emoji
|
#### Default emoji
|
||||||
|
@ -113,6 +156,7 @@ You can copy/paste them from [getemoji.com](https://getemoji.com/).
|
||||||
#### Custom emoji
|
#### Custom emoji
|
||||||
|
|
||||||
You can add custom emoji in the `data/custom_emoji` directory and they will be picked automatically.
|
You can add custom emoji in the `data/custom_emoji` directory and they will be picked automatically.
|
||||||
|
Do not use exotic characters in filename - only letters, numbers, and underscore symbol `_` are allowed.
|
||||||
|
|
||||||
#### Custom CSS
|
#### Custom CSS
|
||||||
|
|
||||||
|
@ -127,9 +171,48 @@ $secondary-color: #32cd32;
|
||||||
|
|
||||||
See `app/scss/main.scss` to see what variables can be overridden.
|
See `app/scss/main.scss` to see what variables can be overridden.
|
||||||
|
|
||||||
|
You will need to [recompile CSS](#recompiling-css-files) after doing any CSS changes (for actual css files to be updates) and restart microblog.pub (for css link in HTML documents to be updated with a new checksum - otherwise, browsers that downloaded old CSS will keep using it).
|
||||||
|
|
||||||
|
#### Custom favicon
|
||||||
|
|
||||||
|
By default, microblog.pub favicon is a square of `$primary-color` CSS color (see above section on how to redefine CSS colors).
|
||||||
|
You can change it to any icon you like - just save a desired file as `data/favicon.ico`.
|
||||||
|
After that, run the "[recompile CSS](#recompiling-css-files)" task to copy it to `app/static/favicon.ico`.
|
||||||
|
|
||||||
|
#### Custom templates
|
||||||
|
|
||||||
|
If you'd like to customize your instance's theme beyond CSS, you can modify the app's HTML by placing templates in `data/templates` which overwrite the defaults in `app/templates`.
|
||||||
|
|
||||||
|
Templates are written using [Jinja](https://jinja.palletsprojects.com/en/latest/templates/) templating language.
|
||||||
|
Moreover, `utils.html` has scoped blocks around the body of every macro.
|
||||||
|
This allows macros to be overridden individually in `data/templates/utils.html`, without copying the whole file.
|
||||||
|
For example, to only override the display of a specific actor's name/icon, you can create `data/templates/utils.html` file with following content:
|
||||||
|
|
||||||
|
```jinja
|
||||||
|
{% extends "app/utils.html" %}
|
||||||
|
|
||||||
|
{% block display_actor %}
|
||||||
|
{% if actor.ap_id == "https://me.example.com" %}
|
||||||
|
<!-- custom actor display -->
|
||||||
|
{% else %}
|
||||||
|
{{ super() }}
|
||||||
|
{% endif %}
|
||||||
|
{% endblock %}
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Custom Content Security Policy (CSP)
|
||||||
|
|
||||||
|
You can override the default Content Security Policy by adding a line in `data/profile.toml`:
|
||||||
|
|
||||||
|
```toml
|
||||||
|
custom_content_security_policy = "default-src 'self'; style-src 'self' 'sha256-{HIGHLIGHT_CSS_HASH}'; frame-ancestors 'none'; base-uri 'self'; form-action 'self';"
|
||||||
|
```
|
||||||
|
|
||||||
|
This example will output the default CSP, note that `{HIGHLIGHT_CSS_HASH}` will be dynamically replaced by the correct value (the hash of the CSS needed for syntax highlighting).
|
||||||
|
|
||||||
#### Code highlighting theme
|
#### Code highlighting theme
|
||||||
|
|
||||||
You can switch to one of the [styles supported by Pygments](https://pygments.org/styles/) by adding a line in `profile.toml`:
|
You can switch to one of the [styles supported by Pygments](https://pygments.org/styles/) by adding a line in `data/profile.toml`:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
code_highlighting_theme = "solarized-dark"
|
code_highlighting_theme = "solarized-dark"
|
||||||
|
@ -272,7 +355,7 @@ First you need to grab the "ActivityPub actor URL" for your existing account:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# For a Python install
|
# For a Python install
|
||||||
poetry run inv webfinger username@domain.tld
|
poetry run inv webfinger username@instance-you-want-to-move-from.tld
|
||||||
```
|
```
|
||||||
|
|
||||||
Edit the config.
|
Edit the config.
|
||||||
|
@ -281,7 +364,7 @@ Edit the config.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# For a Docker install
|
# For a Docker install
|
||||||
make account=username@domain.tld webfinger
|
make account=username@instance-you-want-to-move-from.tld webfinger
|
||||||
```
|
```
|
||||||
|
|
||||||
Edit the config.
|
Edit the config.
|
||||||
|
@ -291,11 +374,35 @@ Edit the config.
|
||||||
And add a reference to your old/existing account in `profile.toml`:
|
And add a reference to your old/existing account in `profile.toml`:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
also_known_as = "my@old-account.com"
|
also_known_as = "https://instance-you-want-to-move-form.tld/users/username"
|
||||||
```
|
```
|
||||||
|
|
||||||
Restart the server, and you should be able to complete the move from your existing account.
|
Restart the server, and you should be able to complete the move from your existing account.
|
||||||
|
|
||||||
|
Note that if you already have a redirect in place on Mastodon, you may have to remove it before initiating the migration.
|
||||||
|
|
||||||
|
## Import follows from Mastodon
|
||||||
|
|
||||||
|
You can import the list of follows/following accounts from Mastodon.
|
||||||
|
|
||||||
|
It requires downloading the "Follows" CSV file from your Mastodon instance via "Settings" / "Import and export" / "Data export".
|
||||||
|
|
||||||
|
Then you need to run the import task:
|
||||||
|
|
||||||
|
### Python edition
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# For a Python install
|
||||||
|
poetry run inv import-mastodon-following-accounts following_accounts.csv
|
||||||
|
```
|
||||||
|
|
||||||
|
### Docker edition
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# For a Docker install
|
||||||
|
make path=following_accounts.csv import-mastodon-following-accounts
|
||||||
|
```
|
||||||
|
|
||||||
## Tasks
|
## Tasks
|
||||||
|
|
||||||
### Configuration checking
|
### Configuration checking
|
||||||
|
@ -333,13 +440,13 @@ make compile-scss
|
||||||
|
|
||||||
### Password reset
|
### Password reset
|
||||||
|
|
||||||
If have lost your password, you can generate a new one using the `password-reset` task.
|
If have lost your password, you can generate a new one using the `reset-password` task.
|
||||||
|
|
||||||
#### Python edition
|
#### Python edition
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# shutdown supervisord
|
# shutdown supervisord
|
||||||
poetry run inv password-reset
|
poetry run inv reset-password
|
||||||
# edit data/profile.toml
|
# edit data/profile.toml
|
||||||
# restart supervisord
|
# restart supervisord
|
||||||
```
|
```
|
||||||
|
@ -348,7 +455,7 @@ poetry run inv password-reset
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
docker compose stop
|
docker compose stop
|
||||||
make password-reset
|
make reset-password
|
||||||
# edit data/profile.toml
|
# edit data/profile.toml
|
||||||
docker compose up -d
|
docker compose up -d
|
||||||
```
|
```
|
||||||
|
@ -451,6 +558,7 @@ make self-destruct
|
||||||
|
|
||||||
If the server is not (re)starting, you can:
|
If the server is not (re)starting, you can:
|
||||||
|
|
||||||
- [Ensure that the configuration is valid](/user_guide.html#configuration-checking)
|
- [Ensure that the configuration is valid](/user_guide.html#configuration-checking).
|
||||||
- [Verify if you haven't any syntax error in the custom theme by recompiling the CSS](/user_guide.html#recompiling-css-files)
|
- [Verify if you haven't any syntax error in the custom theme by recompiling the CSS](/user_guide.html#recompiling-css-files).
|
||||||
- Look at the log files
|
- Look at the log files (in `data/uvicorn.log`, `data/incoming.log` and `data/outgoing.log`).
|
||||||
|
- If the CSS is not working, ensure your reverse proxy is serving the static file correctly.
|
||||||
|
|
3723
poetry.lock
generated
3723
poetry.lock
generated
File diff suppressed because it is too large
Load diff
|
@ -14,11 +14,10 @@ bcrypt = "^3.2.2"
|
||||||
itsdangerous = "^2.1.2"
|
itsdangerous = "^2.1.2"
|
||||||
python-multipart = "^0.0.5"
|
python-multipart = "^0.0.5"
|
||||||
tomli = "^2.0.1"
|
tomli = "^2.0.1"
|
||||||
httpx = {extras = ["http2"], version = "^0.23.0"}
|
httpx = {version = "0.23.0", extras = ["http2"]}
|
||||||
SQLAlchemy = {extras = ["asyncio"], version = "^1.4.39"}
|
SQLAlchemy = {extras = ["asyncio"], version = "^1.4.39"}
|
||||||
alembic = "^1.8.0"
|
alembic = "^1.8.0"
|
||||||
bleach = "^5.0.0"
|
bleach = "^5.0.0"
|
||||||
Markdown = "^3.3.7"
|
|
||||||
prompt-toolkit = "^3.0.29"
|
prompt-toolkit = "^3.0.29"
|
||||||
tomli-w = "^1.0.0"
|
tomli-w = "^1.0.0"
|
||||||
python-dateutil = "^2.8.2"
|
python-dateutil = "^2.8.2"
|
||||||
|
@ -27,7 +26,6 @@ html5lib = "^1.1"
|
||||||
mf2py = "^1.1.2"
|
mf2py = "^1.1.2"
|
||||||
Pygments = "^2.12.0"
|
Pygments = "^2.12.0"
|
||||||
loguru = "^0.6.0"
|
loguru = "^0.6.0"
|
||||||
mdx-linkify = "^2.1"
|
|
||||||
Pillow = "^9.1.1"
|
Pillow = "^9.1.1"
|
||||||
blurhash-python = "^1.1.3"
|
blurhash-python = "^1.1.3"
|
||||||
html2text = "^2020.1.16"
|
html2text = "^2020.1.16"
|
||||||
|
@ -45,6 +43,8 @@ boussole = "^2.0.0"
|
||||||
uvicorn = {extras = ["standard"], version = "^0.18.3"}
|
uvicorn = {extras = ["standard"], version = "^0.18.3"}
|
||||||
Brotli = "^1.0.9"
|
Brotli = "^1.0.9"
|
||||||
greenlet = "^1.1.3"
|
greenlet = "^1.1.3"
|
||||||
|
mistletoe = "^0.9.0"
|
||||||
|
Pebble = "^5.0.2"
|
||||||
|
|
||||||
[tool.poetry.dev-dependencies]
|
[tool.poetry.dev-dependencies]
|
||||||
black = "^22.3.0"
|
black = "^22.3.0"
|
||||||
|
|
|
@ -1,19 +1,115 @@
|
||||||
|
import re
|
||||||
import shutil
|
import shutil
|
||||||
|
import typing
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
|
from typing import Any
|
||||||
|
|
||||||
from jinja2 import Environment
|
from jinja2 import Environment
|
||||||
from jinja2 import FileSystemLoader
|
from jinja2 import FileSystemLoader
|
||||||
from jinja2 import select_autoescape
|
from jinja2 import select_autoescape
|
||||||
from markdown import markdown
|
from mistletoe import Document # type: ignore
|
||||||
|
from mistletoe import HTMLRenderer # type: ignore
|
||||||
|
from mistletoe import block_token # type: ignore
|
||||||
|
from pygments import highlight # type: ignore
|
||||||
|
from pygments.formatters import HtmlFormatter # type: ignore
|
||||||
|
from pygments.lexers import get_lexer_by_name as get_lexer # type: ignore
|
||||||
|
from pygments.lexers import guess_lexer # type: ignore
|
||||||
|
|
||||||
from app.config import VERSION
|
from app.config import VERSION
|
||||||
|
from app.source import CustomRenderer
|
||||||
from app.utils.datetime import now
|
from app.utils.datetime import now
|
||||||
|
|
||||||
|
_FORMATTER = HtmlFormatter()
|
||||||
|
_FORMATTER.noclasses = True
|
||||||
|
|
||||||
def markdownify(content: str) -> str:
|
|
||||||
return markdown(
|
class DocRenderer(CustomRenderer):
|
||||||
content, extensions=["mdx_linkify", "fenced_code", "codehilite", "toc"]
|
def __init__(
|
||||||
)
|
self,
|
||||||
|
depth=5,
|
||||||
|
omit_title=True,
|
||||||
|
filter_conds=[],
|
||||||
|
) -> None:
|
||||||
|
super().__init__(
|
||||||
|
enable_mentionify=False,
|
||||||
|
enable_hashtagify=False,
|
||||||
|
)
|
||||||
|
self._headings: list[tuple[int, str, str]] = []
|
||||||
|
self._ids: set[str] = set()
|
||||||
|
self.depth = depth
|
||||||
|
self.omit_title = omit_title
|
||||||
|
self.filter_conds = filter_conds
|
||||||
|
|
||||||
|
@property
|
||||||
|
def toc(self):
|
||||||
|
"""
|
||||||
|
Returns table of contents as a block_token.List instance.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def get_indent(level):
|
||||||
|
if self.omit_title:
|
||||||
|
level -= 1
|
||||||
|
return " " * 4 * (level - 1)
|
||||||
|
|
||||||
|
def build_list_item(heading):
|
||||||
|
level, content, title_id = heading
|
||||||
|
template = '{indent}- <a href="#{id}" rel="nofollow">{content}</a>\n'
|
||||||
|
return template.format(
|
||||||
|
indent=get_indent(level), content=content, id=title_id
|
||||||
|
)
|
||||||
|
|
||||||
|
lines = [build_list_item(heading) for heading in self._headings]
|
||||||
|
items = block_token.tokenize(lines)
|
||||||
|
return items[0]
|
||||||
|
|
||||||
|
def render_heading(self, token):
|
||||||
|
"""
|
||||||
|
Overrides super().render_heading; stores rendered heading first,
|
||||||
|
then returns it.
|
||||||
|
"""
|
||||||
|
template = '<h{level} id="{id}">{inner}</h{level}>'
|
||||||
|
inner = self.render_inner(token)
|
||||||
|
title_id = inner.lower().replace(" ", "-")
|
||||||
|
if title_id in self._ids:
|
||||||
|
i = 1
|
||||||
|
while 1:
|
||||||
|
title_id = f"{title_id}_{i}"
|
||||||
|
if title_id not in self._ids:
|
||||||
|
break
|
||||||
|
self._ids.add(title_id)
|
||||||
|
rendered = template.format(level=token.level, inner=inner, id=title_id)
|
||||||
|
content = self.parse_rendered_heading(rendered)
|
||||||
|
|
||||||
|
if not (
|
||||||
|
self.omit_title
|
||||||
|
and token.level == 1
|
||||||
|
or token.level > self.depth
|
||||||
|
or any(cond(content) for cond in self.filter_conds)
|
||||||
|
):
|
||||||
|
self._headings.append((token.level, content, title_id))
|
||||||
|
return rendered
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def parse_rendered_heading(rendered):
|
||||||
|
"""
|
||||||
|
Helper method; converts rendered heading to plain text.
|
||||||
|
"""
|
||||||
|
return re.sub(r"<.+?>", "", rendered)
|
||||||
|
|
||||||
|
def render_block_code(self, token: typing.Any) -> str:
|
||||||
|
code = token.children[0].content
|
||||||
|
lexer = get_lexer(token.language) if token.language else guess_lexer(code)
|
||||||
|
return highlight(code, lexer, _FORMATTER)
|
||||||
|
|
||||||
|
|
||||||
|
def markdownify(content: str) -> tuple[str, Any]:
|
||||||
|
with DocRenderer() as renderer:
|
||||||
|
rendered_content = renderer.render(Document(content))
|
||||||
|
|
||||||
|
with HTMLRenderer() as html_renderer:
|
||||||
|
toc = html_renderer.render(renderer.toc)
|
||||||
|
|
||||||
|
return rendered_content, toc
|
||||||
|
|
||||||
|
|
||||||
def main() -> None:
|
def main() -> None:
|
||||||
|
@ -30,32 +126,36 @@ def main() -> None:
|
||||||
last_updated = now().replace(second=0, microsecond=0).isoformat()
|
last_updated = now().replace(second=0, microsecond=0).isoformat()
|
||||||
|
|
||||||
readme = Path("README.md")
|
readme = Path("README.md")
|
||||||
|
content, toc = markdownify(readme.read_text().removeprefix("# microblog.pub"))
|
||||||
template.stream(
|
template.stream(
|
||||||
content=markdownify(readme.read_text().removeprefix("# microblog.pub")),
|
content=content,
|
||||||
version=VERSION,
|
version=VERSION,
|
||||||
path="/",
|
path="/",
|
||||||
last_updated=last_updated,
|
last_updated=last_updated,
|
||||||
).dump("docs/dist/index.html")
|
).dump("docs/dist/index.html")
|
||||||
|
|
||||||
install = Path("docs/install.md")
|
install = Path("docs/install.md")
|
||||||
|
content, toc = markdownify(install.read_text())
|
||||||
template.stream(
|
template.stream(
|
||||||
content=markdownify(install.read_text()),
|
content=content.replace("[TOC]", toc),
|
||||||
version=VERSION,
|
version=VERSION,
|
||||||
path="/installing.html",
|
path="/installing.html",
|
||||||
last_updated=last_updated,
|
last_updated=last_updated,
|
||||||
).dump("docs/dist/installing.html")
|
).dump("docs/dist/installing.html")
|
||||||
|
|
||||||
user_guide = Path("docs/user_guide.md")
|
user_guide = Path("docs/user_guide.md")
|
||||||
|
content, toc = markdownify(user_guide.read_text())
|
||||||
template.stream(
|
template.stream(
|
||||||
content=markdownify(user_guide.read_text()),
|
content=content.replace("[TOC]", toc),
|
||||||
version=VERSION,
|
version=VERSION,
|
||||||
path="/user_guide.html",
|
path="/user_guide.html",
|
||||||
last_updated=last_updated,
|
last_updated=last_updated,
|
||||||
).dump("docs/dist/user_guide.html")
|
).dump("docs/dist/user_guide.html")
|
||||||
|
|
||||||
developer_guide = Path("docs/developer_guide.md")
|
developer_guide = Path("docs/developer_guide.md")
|
||||||
|
content, toc = markdownify(developer_guide.read_text())
|
||||||
template.stream(
|
template.stream(
|
||||||
content=markdownify(developer_guide.read_text()),
|
content=content.replace("[TOC]", toc),
|
||||||
version=VERSION,
|
version=VERSION,
|
||||||
path="/developer_guide.html",
|
path="/developer_guide.html",
|
||||||
last_updated=last_updated,
|
last_updated=last_updated,
|
||||||
|
|
|
@ -75,9 +75,10 @@ def main() -> None:
|
||||||
proto = "http"
|
proto = "http"
|
||||||
|
|
||||||
print("Note that you can put your icon/avatar in the static/ directory")
|
print("Note that you can put your icon/avatar in the static/ directory")
|
||||||
dat["icon_url"] = prompt(
|
if icon_url := prompt(
|
||||||
"icon URL: ", default=f'{proto}://{dat["domain"]}/static/nopic.png'
|
"icon URL: ", default=f'{proto}://{dat["domain"]}/static/nopic.png'
|
||||||
)
|
):
|
||||||
|
dat["icon_url"] = icon_url
|
||||||
dat["secret"] = os.urandom(16).hex()
|
dat["secret"] = os.urandom(16).hex()
|
||||||
|
|
||||||
with config_file.open("w") as f:
|
with config_file.open("w") as f:
|
||||||
|
|
77
tasks.py
77
tasks.py
|
@ -1,17 +1,50 @@
|
||||||
import asyncio
|
import asyncio
|
||||||
import io
|
import io
|
||||||
|
import shutil
|
||||||
import tarfile
|
import tarfile
|
||||||
|
from collections import namedtuple
|
||||||
from contextlib import contextmanager
|
from contextlib import contextmanager
|
||||||
|
from inspect import getfullargspec
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
from typing import Generator
|
from typing import Generator
|
||||||
from typing import Optional
|
from typing import Optional
|
||||||
|
from unittest.mock import patch
|
||||||
|
|
||||||
import httpx
|
import httpx
|
||||||
|
import invoke # type: ignore
|
||||||
from invoke import Context # type: ignore
|
from invoke import Context # type: ignore
|
||||||
from invoke import run # type: ignore
|
from invoke import run # type: ignore
|
||||||
from invoke import task # type: ignore
|
from invoke import task # type: ignore
|
||||||
|
|
||||||
|
|
||||||
|
def fix_annotations():
|
||||||
|
"""
|
||||||
|
Pyinvoke doesn't accept annotations by default, this fix that
|
||||||
|
Based on: @zelo's fix in https://github.com/pyinvoke/invoke/pull/606
|
||||||
|
Context in: https://github.com/pyinvoke/invoke/issues/357
|
||||||
|
Python 3.11 https://github.com/pyinvoke/invoke/issues/833
|
||||||
|
"""
|
||||||
|
|
||||||
|
ArgSpec = namedtuple("ArgSpec", ["args", "defaults"])
|
||||||
|
|
||||||
|
def patched_inspect_getargspec(func):
|
||||||
|
spec = getfullargspec(func)
|
||||||
|
return ArgSpec(spec.args, spec.defaults)
|
||||||
|
|
||||||
|
org_task_argspec = invoke.tasks.Task.argspec
|
||||||
|
|
||||||
|
def patched_task_argspec(*args, **kwargs):
|
||||||
|
with patch(
|
||||||
|
target="inspect.getargspec", new=patched_inspect_getargspec, create=True
|
||||||
|
):
|
||||||
|
return org_task_argspec(*args, **kwargs)
|
||||||
|
|
||||||
|
invoke.tasks.Task.argspec = patched_task_argspec
|
||||||
|
|
||||||
|
|
||||||
|
fix_annotations()
|
||||||
|
|
||||||
|
|
||||||
@task
|
@task
|
||||||
def generate_db_migration(ctx, message):
|
def generate_db_migration(ctx, message):
|
||||||
# type: (Context, str) -> None
|
# type: (Context, str) -> None
|
||||||
|
@ -45,7 +78,12 @@ def compile_scss(ctx, watch=False):
|
||||||
# type: (Context, bool) -> None
|
# type: (Context, bool) -> None
|
||||||
from app.utils.favicon import build_favicon
|
from app.utils.favicon import build_favicon
|
||||||
|
|
||||||
build_favicon()
|
favicon_file = Path("data/favicon.ico")
|
||||||
|
if not favicon_file.exists():
|
||||||
|
build_favicon()
|
||||||
|
else:
|
||||||
|
shutil.copy2(favicon_file, "app/static/favicon.ico")
|
||||||
|
|
||||||
theme_file = Path("data/_theme.scss")
|
theme_file = Path("data/_theme.scss")
|
||||||
if not theme_file.exists():
|
if not theme_file.exists():
|
||||||
theme_file.write_text("// override vars for theming here")
|
theme_file.write_text("// override vars for theming here")
|
||||||
|
@ -347,3 +385,40 @@ def check_config(ctx):
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
else:
|
else:
|
||||||
print("Config is OK")
|
print("Config is OK")
|
||||||
|
|
||||||
|
|
||||||
|
@task
|
||||||
|
def import_mastodon_following_accounts(ctx, path):
|
||||||
|
# type: (Context, str) -> None
|
||||||
|
from loguru import logger
|
||||||
|
|
||||||
|
from app.boxes import _get_following
|
||||||
|
from app.boxes import _send_follow
|
||||||
|
from app.database import async_session
|
||||||
|
from app.utils.mastodon import get_actor_urls_from_following_accounts_csv_file
|
||||||
|
|
||||||
|
async def _import_following() -> int:
|
||||||
|
count = 0
|
||||||
|
async with async_session() as db_session:
|
||||||
|
followings = {
|
||||||
|
following.ap_actor_id for following in await _get_following(db_session)
|
||||||
|
}
|
||||||
|
for (
|
||||||
|
handle,
|
||||||
|
actor_url,
|
||||||
|
) in await get_actor_urls_from_following_accounts_csv_file(path):
|
||||||
|
if actor_url in followings:
|
||||||
|
logger.info(f"Already following {handle}")
|
||||||
|
continue
|
||||||
|
|
||||||
|
logger.info(f"Importing {actor_url=}")
|
||||||
|
|
||||||
|
await _send_follow(db_session, actor_url)
|
||||||
|
count += 1
|
||||||
|
|
||||||
|
await db_session.commit()
|
||||||
|
|
||||||
|
return count
|
||||||
|
|
||||||
|
count = asyncio.run(_import_following())
|
||||||
|
logger.info(f"Import done, {count} follow requests sent")
|
||||||
|
|
|
@ -68,6 +68,20 @@ def build_accept_activity(
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def build_block_activity(
|
||||||
|
from_remote_actor: actor.RemoteActor,
|
||||||
|
for_remote_actor: actor.RemoteActor,
|
||||||
|
outbox_public_id: str | None = None,
|
||||||
|
) -> ap.RawObject:
|
||||||
|
return {
|
||||||
|
"@context": ap.AS_CTX,
|
||||||
|
"type": "Block",
|
||||||
|
"id": from_remote_actor.ap_id + "/block/" + (outbox_public_id or uuid4().hex),
|
||||||
|
"actor": from_remote_actor.ap_id,
|
||||||
|
"object": for_remote_actor.ap_id,
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
def build_move_activity(
|
def build_move_activity(
|
||||||
from_remote_actor: actor.RemoteActor,
|
from_remote_actor: actor.RemoteActor,
|
||||||
for_remote_object: actor.RemoteActor,
|
for_remote_object: actor.RemoteActor,
|
||||||
|
|
|
@ -20,12 +20,16 @@ async def test_fetch_actor(async_db_session: AsyncSession, respx_mock) -> None:
|
||||||
public_key="pk",
|
public_key="pk",
|
||||||
)
|
)
|
||||||
respx_mock.get(ra.ap_id).mock(return_value=httpx.Response(200, json=ra.ap_actor))
|
respx_mock.get(ra.ap_id).mock(return_value=httpx.Response(200, json=ra.ap_actor))
|
||||||
|
respx_mock.get(
|
||||||
|
"https://example.com/.well-known/webfinger",
|
||||||
|
params={"resource": "acct%3Atoto%40example.com"},
|
||||||
|
).mock(return_value=httpx.Response(200, json={"subject": "acct:toto@example.com"}))
|
||||||
|
|
||||||
# When fetching this actor for the first time
|
# When fetching this actor for the first time
|
||||||
saved_actor = await fetch_actor(async_db_session, ra.ap_id)
|
saved_actor = await fetch_actor(async_db_session, ra.ap_id)
|
||||||
|
|
||||||
# Then it has been fetched and saved in DB
|
# Then it has been fetched and saved in DB
|
||||||
assert respx.calls.call_count == 1
|
assert respx.calls.call_count == 2
|
||||||
assert (
|
assert (
|
||||||
await async_db_session.execute(select(models.Actor))
|
await async_db_session.execute(select(models.Actor))
|
||||||
).scalar_one().ap_id == saved_actor.ap_id
|
).scalar_one().ap_id == saved_actor.ap_id
|
||||||
|
@ -38,7 +42,7 @@ async def test_fetch_actor(async_db_session: AsyncSession, respx_mock) -> None:
|
||||||
assert (
|
assert (
|
||||||
await async_db_session.execute(select(func.count(models.Actor.id)))
|
await async_db_session.execute(select(func.count(models.Actor.id)))
|
||||||
).scalar_one() == 1
|
).scalar_one() == 1
|
||||||
assert respx.calls.call_count == 1
|
assert respx.calls.call_count == 2
|
||||||
|
|
||||||
|
|
||||||
def test_sqlalchemy_factory(db: Session) -> None:
|
def test_sqlalchemy_factory(db: Session) -> None:
|
||||||
|
|
|
@ -423,3 +423,53 @@ def test_inbox__move_activity(
|
||||||
).scalar_one()
|
).scalar_one()
|
||||||
assert notif.actor.ap_id == new_ra.ap_id
|
assert notif.actor.ap_id == new_ra.ap_id
|
||||||
assert notif.inbox_object_id == inbox_activity.id
|
assert notif.inbox_object_id == inbox_activity.id
|
||||||
|
|
||||||
|
|
||||||
|
def test_inbox__block_activity(
|
||||||
|
db: Session,
|
||||||
|
client: TestClient,
|
||||||
|
respx_mock: respx.MockRouter,
|
||||||
|
) -> None:
|
||||||
|
# Given a remote actor
|
||||||
|
ra = setup_remote_actor(respx_mock)
|
||||||
|
|
||||||
|
# Which is followed by the local actor
|
||||||
|
setup_remote_actor_as_following(ra)
|
||||||
|
|
||||||
|
# When receiving a Block activity
|
||||||
|
follow_activity = RemoteObject(
|
||||||
|
factories.build_block_activity(
|
||||||
|
from_remote_actor=ra,
|
||||||
|
for_remote_actor=LOCAL_ACTOR,
|
||||||
|
),
|
||||||
|
ra,
|
||||||
|
)
|
||||||
|
with mock_httpsig_checker(ra):
|
||||||
|
response = client.post(
|
||||||
|
"/inbox",
|
||||||
|
headers={"Content-Type": ap.AS_CTX},
|
||||||
|
json=follow_activity.ap_object,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Then the server returns a 202
|
||||||
|
assert response.status_code == 202
|
||||||
|
|
||||||
|
run_process_next_incoming_activity()
|
||||||
|
|
||||||
|
# And the actor was saved in DB
|
||||||
|
saved_actor = db.execute(select(models.Actor)).scalar_one()
|
||||||
|
assert saved_actor.ap_id == ra.ap_id
|
||||||
|
|
||||||
|
# And the Block activity was saved in the inbox
|
||||||
|
inbox_activity = db.execute(
|
||||||
|
select(models.InboxObject).where(models.InboxObject.ap_type == "Block")
|
||||||
|
).scalar_one()
|
||||||
|
|
||||||
|
# And a notification was created
|
||||||
|
notif = db.execute(
|
||||||
|
select(models.Notification).where(
|
||||||
|
models.Notification.notification_type == models.NotificationType.BLOCKED
|
||||||
|
)
|
||||||
|
).scalar_one()
|
||||||
|
assert notif.actor.ap_id == ra.ap_id
|
||||||
|
assert notif.inbox_object_id == inbox_activity.id
|
||||||
|
|
|
@ -179,7 +179,7 @@ def test_send_create_activity__with_attachment(
|
||||||
outbox_object = db.execute(select(models.OutboxObject)).scalar_one()
|
outbox_object = db.execute(select(models.OutboxObject)).scalar_one()
|
||||||
assert outbox_object.ap_type == "Note"
|
assert outbox_object.ap_type == "Note"
|
||||||
assert outbox_object.summary is None
|
assert outbox_object.summary is None
|
||||||
assert outbox_object.content == "<p>hello</p>"
|
assert outbox_object.content == "<p>hello</p>\n"
|
||||||
assert len(outbox_object.attachments) == 1
|
assert len(outbox_object.attachments) == 1
|
||||||
attachment = outbox_object.attachments[0]
|
attachment = outbox_object.attachments[0]
|
||||||
assert attachment.type == "Document"
|
assert attachment.type == "Document"
|
||||||
|
@ -227,7 +227,7 @@ def test_send_create_activity__no_content_with_cw_and_attachments(
|
||||||
outbox_object = db.execute(select(models.OutboxObject)).scalar_one()
|
outbox_object = db.execute(select(models.OutboxObject)).scalar_one()
|
||||||
assert outbox_object.ap_type == "Note"
|
assert outbox_object.ap_type == "Note"
|
||||||
assert outbox_object.summary is None
|
assert outbox_object.summary is None
|
||||||
assert outbox_object.content == "<p>cw</p>"
|
assert outbox_object.content == "<p>cw</p>\n"
|
||||||
assert len(outbox_object.attachments) == 1
|
assert len(outbox_object.attachments) == 1
|
||||||
|
|
||||||
|
|
||||||
|
|
19
tests/test_utils.py
Normal file
19
tests/test_utils.py
Normal file
|
@ -0,0 +1,19 @@
|
||||||
|
from unittest import mock
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
|
||||||
|
from app.utils.url import is_hostname_blocked
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.parametrize(
|
||||||
|
"hostname,should_be_blocked",
|
||||||
|
[
|
||||||
|
("example.com", True),
|
||||||
|
("subdomain.example.com", True),
|
||||||
|
("example.xyz", False),
|
||||||
|
],
|
||||||
|
)
|
||||||
|
def test_is_hostname_blocked(hostname: str, should_be_blocked: bool) -> None:
|
||||||
|
with mock.patch("app.utils.url.BLOCKED_SERVERS", ["example.com"]):
|
||||||
|
is_hostname_blocked.cache_clear()
|
||||||
|
assert is_hostname_blocked(hostname) is should_be_blocked
|
Loading…
Reference in a new issue