mattermost/server/channels/app/post.go
Nick Misasi 0263262ef4
Some checks are pending
API / build (push) Waiting to run
Server CI / Compute Go Version (push) Waiting to run
Server CI / Check mocks (push) Blocked by required conditions
Server CI / Check go mod tidy (push) Blocked by required conditions
Server CI / check-style (push) Blocked by required conditions
Server CI / Check serialization methods for hot structs (push) Blocked by required conditions
Server CI / Vet API (push) Blocked by required conditions
Server CI / Check migration files (push) Blocked by required conditions
Server CI / Generate email templates (push) Blocked by required conditions
Server CI / Check store layers (push) Blocked by required conditions
Server CI / Check mmctl docs (push) Blocked by required conditions
Server CI / Postgres with binary parameters (push) Blocked by required conditions
Server CI / Postgres (push) Blocked by required conditions
Server CI / Postgres (FIPS) (push) Blocked by required conditions
Server CI / Generate Test Coverage (push) Blocked by required conditions
Server CI / Run mmctl tests (push) Blocked by required conditions
Server CI / Run mmctl tests (FIPS) (push) Blocked by required conditions
Server CI / Build mattermost server app (push) Blocked by required conditions
Web App CI / check-lint (push) Waiting to run
Web App CI / check-i18n (push) Blocked by required conditions
Web App CI / check-types (push) Blocked by required conditions
Web App CI / test (platform) (push) Blocked by required conditions
Web App CI / test (mattermost-redux) (push) Blocked by required conditions
Web App CI / test (channels shard 1/4) (push) Blocked by required conditions
Web App CI / test (channels shard 2/4) (push) Blocked by required conditions
Web App CI / test (channels shard 3/4) (push) Blocked by required conditions
Web App CI / test (channels shard 4/4) (push) Blocked by required conditions
Web App CI / upload-coverage (push) Blocked by required conditions
Web App CI / build (push) Blocked by required conditions
MM-66577 Preserve locale in rewrite prompt (#35013)
* Preserve rewrite locale in prompt

* Add license header to rewrite tests
2026-02-03 11:32:03 -05:00

3728 lines
134 KiB
Go

// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
// See LICENSE.txt for license information.
package app
import (
"context"
"encoding/json"
"errors"
"fmt"
"net/http"
"regexp"
"strconv"
"strings"
"sync"
"time"
"maps"
"slices"
agentclient "github.com/mattermost/mattermost-plugin-ai/public/bridgeclient"
"github.com/mattermost/mattermost/server/public/model"
"github.com/mattermost/mattermost/server/public/plugin"
"github.com/mattermost/mattermost/server/public/shared/i18n"
"github.com/mattermost/mattermost/server/public/shared/mlog"
"github.com/mattermost/mattermost/server/public/shared/request"
"github.com/mattermost/mattermost/server/v8/channels/store"
"github.com/mattermost/mattermost/server/v8/channels/store/sqlstore"
"github.com/mattermost/mattermost/server/v8/platform/services/cache"
)
var pendingPostIDsCacheTTL = 30 * time.Second
const (
PendingPostIDsCacheSize = 25000
PageDefault = 0
)
var atMentionPattern = regexp.MustCompile(`\B@`)
func (a *App) CreatePostAsUser(rctx request.CTX, post *model.Post, currentSessionId string, setOnline bool) (*model.Post, bool, *model.AppError) {
// Check that channel has not been deleted
channel, errCh := a.Srv().Store().Channel().Get(post.ChannelId, true)
if errCh != nil {
err := model.NewAppError("CreatePostAsUser", "api.context.invalid_param.app_error", map[string]any{"Name": "post.channel_id"}, "", http.StatusBadRequest).Wrap(errCh)
return nil, false, err
}
if strings.HasPrefix(post.Type, model.PostSystemMessagePrefix) {
err := model.NewAppError("CreatePostAsUser", "api.context.invalid_param.app_error", map[string]any{"Name": "post.type"}, "", http.StatusBadRequest)
return nil, false, err
}
if channel.DeleteAt != 0 {
err := model.NewAppError("createPost", "api.post.create_post.can_not_post_to_deleted.error", nil, "", http.StatusBadRequest)
return nil, false, err
}
restrictDM, err := a.CheckIfChannelIsRestrictedDM(rctx, channel)
if err != nil {
return nil, false, err
}
if restrictDM {
return nil, false, model.NewAppError("createPost", "api.post.create_post.can_not_post_in_restricted_dm.error", nil, "", http.StatusBadRequest)
}
rp, isMemberForPreviews, err := a.CreatePost(rctx, post, channel, model.CreatePostFlags{TriggerWebhooks: true, SetOnline: setOnline})
if err != nil {
if err.Id == "api.post.create_post.root_id.app_error" ||
err.Id == "api.post.create_post.channel_root_id.app_error" {
err.StatusCode = http.StatusBadRequest
}
return nil, false, err
}
// Update the Channel LastViewAt only if:
// the post does NOT have from_webhook prop set (e.g. Zapier app), and
// the post does NOT have from_bot set (e.g. from discovering the user is a bot within CreatePost), and
// the post is NOT a reply post with CRT enabled
_, fromWebhook := post.GetProps()[model.PostPropsFromWebhook]
_, fromBot := post.GetProps()[model.PostPropsFromBot]
isCRTEnabled := a.IsCRTEnabledForUser(rctx, post.UserId)
isCRTReply := post.RootId != "" && isCRTEnabled
if !fromWebhook && !fromBot && !isCRTReply {
if _, err := a.MarkChannelsAsViewed(rctx, []string{post.ChannelId}, post.UserId, currentSessionId, true, isCRTEnabled); err != nil {
rctx.Logger().Warn(
"Encountered error updating last viewed",
mlog.String("channel_id", post.ChannelId),
mlog.String("user_id", post.UserId),
mlog.Err(err),
)
}
}
return rp, isMemberForPreviews, nil
}
func (a *App) CreatePostMissingChannel(rctx request.CTX, post *model.Post, triggerWebhooks bool, setOnline bool) (*model.Post, bool, *model.AppError) {
channel, err := a.Srv().Store().Channel().Get(post.ChannelId, true)
if err != nil {
errCtx := map[string]any{"channel_id": post.ChannelId}
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
return nil, false, model.NewAppError("CreatePostMissingChannel", "app.channel.get.existing.app_error", errCtx, "", http.StatusNotFound).Wrap(err)
default:
return nil, false, model.NewAppError("CreatePostMissingChannel", "app.channel.get.find.app_error", errCtx, "", http.StatusInternalServerError).Wrap(err)
}
}
return a.CreatePost(rctx, post, channel, model.CreatePostFlags{TriggerWebhooks: triggerWebhooks, SetOnline: setOnline})
}
// deduplicateCreatePost attempts to make posting idempotent within a caching window.
func (a *App) deduplicateCreatePost(rctx request.CTX, post *model.Post) (foundPost *model.Post, err *model.AppError) {
// We rely on the client sending the pending post id across "duplicate" requests. If there
// isn't one, we can't deduplicate, so allow creation normally.
if post.PendingPostId == "" {
return nil, nil
}
const unknownPostId = ""
// Query the cache atomically for the given pending post id, saving a record if
// it hasn't previously been seen.
var postID string
nErr := a.Srv().seenPendingPostIdsCache.Get(post.PendingPostId, &postID)
if nErr == cache.ErrKeyNotFound {
if appErr := a.Srv().seenPendingPostIdsCache.SetWithExpiry(post.PendingPostId, unknownPostId, pendingPostIDsCacheTTL); appErr != nil {
return nil, model.NewAppError("deduplicateCreatePost", "api.post.deduplicate_create_post.cache_error", nil, "", http.StatusInternalServerError).Wrap(appErr)
}
return nil, nil
}
if nErr != nil {
return nil, model.NewAppError("deduplicateCreatePost", "api.post.error_get_post_id.pending", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
// If another thread saved the cache record, but hasn't yet updated it with the actual post
// id (because it's still saving), notify the client with an error. Ideally, we'd wait
// for the other thread, but coordinating that adds complexity to the happy path.
if postID == unknownPostId {
return nil, model.NewAppError("deduplicateCreatePost", "api.post.deduplicate_create_post.pending", nil, "", http.StatusInternalServerError)
}
// If the other thread finished creating the post, return the created post back to the
// client, making the API call feel idempotent.
actualPost, err, _ := a.GetPostIfAuthorized(rctx, postID, rctx.Session(), false)
if err != nil && err.StatusCode == http.StatusForbidden {
rctx.Logger().Warn("Ignoring pending_post_id for which the user is unauthorized", mlog.String("pending_post_id", post.PendingPostId), mlog.String("post_id", postID), mlog.Err(err))
return nil, nil
} else if err != nil {
return nil, model.NewAppError("deduplicateCreatePost", "api.post.deduplicate_create_post.failed_to_get", nil, "", http.StatusInternalServerError).Wrap(err)
}
rctx.Logger().Debug("Deduplicated create post", mlog.String("post_id", actualPost.Id), mlog.String("pending_post_id", post.PendingPostId))
return actualPost, nil
}
func (a *App) CreatePost(rctx request.CTX, post *model.Post, channel *model.Channel, flags model.CreatePostFlags) (savedPost *model.Post, isMemberForPreviews bool, err *model.AppError) {
if !a.Config().FeatureFlags.EnableSharedChannelsDMs && channel.IsShared() && (channel.Type == model.ChannelTypeDirect || channel.Type == model.ChannelTypeGroup) {
return nil, false, model.NewAppError("CreatePost", "app.post.create_post.shared_dm_or_gm.app_error", nil, "", http.StatusBadRequest)
}
foundPost, err := a.deduplicateCreatePost(rctx, post)
if err != nil {
return nil, false, err
}
if foundPost != nil {
isMemberForPreviews = true
if previewPost := foundPost.GetPreviewPost(); previewPost != nil {
var member *model.ChannelMember
member, err = a.GetChannelMember(rctx, previewPost.Post.ChannelId, rctx.Session().UserId)
if err != nil || member == nil {
isMemberForPreviews = false
}
}
return foundPost, isMemberForPreviews, nil
}
// If we get this far, we've recorded the client-provided pending post id to the cache.
// Remove it if we fail below, allowing a proper retry by the client.
defer func() {
if post.PendingPostId == "" {
return
}
if err != nil {
if appErr := a.Srv().seenPendingPostIdsCache.Remove(post.PendingPostId); appErr != nil {
err = model.NewAppError("CreatePost", "api.post.deduplicate_create_post.cache_error", nil, "", http.StatusInternalServerError).Wrap(appErr)
}
return
}
if appErr := a.Srv().seenPendingPostIdsCache.SetWithExpiry(post.PendingPostId, savedPost.Id, pendingPostIDsCacheTTL); appErr != nil {
err = model.NewAppError("CreatePost", "api.post.deduplicate_create_post.cache_error", nil, "", http.StatusInternalServerError).Wrap(appErr)
}
}()
// Validate recipients counts in case it's not DM
if persistentNotification := post.GetPersistentNotification(); persistentNotification != nil && *persistentNotification && channel.Type != model.ChannelTypeDirect {
err := a.forEachPersistentNotificationPost([]*model.Post{post}, func(_ *model.Post, _ *model.Channel, _ *model.Team, mentions *MentionResults, _ model.UserMap, _ map[string]map[string]model.StringMap) error {
if maxRecipients := *a.Config().ServiceSettings.PersistentNotificationMaxRecipients; len(mentions.Mentions) > maxRecipients {
return model.NewAppError("CreatePost", "api.post.post_priority.max_recipients_persistent_notification_post.request_error", map[string]any{"MaxRecipients": maxRecipients}, "", http.StatusBadRequest)
} else if len(mentions.Mentions) == 0 {
return model.NewAppError("CreatePost", "api.post.post_priority.min_recipients_persistent_notification_post.request_error", nil, "", http.StatusBadRequest)
}
return nil
})
if err != nil {
return nil, false, model.NewAppError("CreatePost", "api.post.post_priority.persistent_notification_validation_error.request_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
post.SanitizeProps()
var pchan chan store.StoreResult[*model.PostList]
if post.RootId != "" {
pchan = make(chan store.StoreResult[*model.PostList], 1)
go func() {
r, pErr := a.Srv().Store().Post().Get(RequestContextWithMaster(rctx), post.RootId, model.GetPostsOptions{}, "", a.Config().GetSanitizeOptions())
pchan <- store.StoreResult[*model.PostList]{Data: r, NErr: pErr}
close(pchan)
}()
}
user, nErr := a.Srv().Store().User().Get(context.Background(), post.UserId)
if nErr != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(nErr, &nfErr):
return nil, false, model.NewAppError("CreatePost", MissingAccountError, nil, "", http.StatusNotFound).Wrap(nErr)
default:
return nil, false, model.NewAppError("CreatePost", "app.user.get.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
}
if user.IsBot {
post.AddProp(model.PostPropsFromBot, "true")
}
if flags.ForceNotification {
post.AddProp(model.PostPropsForceNotification, model.NewId())
}
if rctx.Session().IsOAuth {
post.AddProp(model.PostPropsFromOAuthApp, "true")
}
var ephemeralPost *model.Post
if post.Type == "" {
if hasPermission, _ := a.HasPermissionToChannel(rctx, user.Id, channel.Id, model.PermissionUseChannelMentions); !hasPermission {
mention := post.DisableMentionHighlights()
if mention != "" {
T := i18n.GetUserTranslations(user.Locale)
ephemeralPost = &model.Post{
UserId: user.Id,
RootId: post.RootId,
ChannelId: channel.Id,
Message: T("model.post.channel_notifications_disabled_in_channel.message", model.StringInterface{"ChannelName": channel.Name, "Mention": mention}),
Props: model.StringInterface{model.PostPropsMentionHighlightDisabled: true},
}
}
}
}
// Verify the parent/child relationships are correct
var parentPostList *model.PostList
if pchan != nil {
result := <-pchan
if result.NErr != nil {
return nil, false, model.NewAppError("createPost", "api.post.create_post.root_id.app_error", nil, "", http.StatusBadRequest).Wrap(result.NErr)
}
parentPostList = result.Data
if len(parentPostList.Posts) == 0 || !parentPostList.IsChannelId(post.ChannelId) {
return nil, false, model.NewAppError("createPost", "api.post.create_post.channel_root_id.app_error", nil, "", http.StatusInternalServerError)
}
rootPost := parentPostList.Posts[post.RootId]
if rootPost.RootId != "" {
return nil, false, model.NewAppError("createPost", "api.post.create_post.root_id.app_error", nil, "", http.StatusBadRequest)
}
if rootPost.Type == model.PostTypeBurnOnRead {
return nil, false, model.NewAppError("createPost", "api.post.create_post.burn_on_read.app_error", nil, "", http.StatusBadRequest)
}
}
post.Hashtags, _ = model.ParseHashtags(post.Message)
if err = a.FillInPostProps(rctx, post, channel); err != nil {
return nil, false, err
}
// Temporary fix so old plugins don't clobber new fields in SlackAttachment struct, see MM-13088
if attachments, ok := post.GetProp(model.PostPropsAttachments).([]*model.SlackAttachment); ok {
jsonAttachments, err := json.Marshal(attachments)
if err == nil {
attachmentsInterface := []any{}
err = json.Unmarshal(jsonAttachments, &attachmentsInterface)
post.AddProp(model.PostPropsAttachments, attachmentsInterface)
}
if err != nil {
rctx.Logger().Warn("Could not convert post attachments to map interface.", mlog.Err(err))
}
}
var metadata *model.PostMetadata
if post.Metadata != nil {
metadata = post.Metadata.Copy()
}
var rejectionError *model.AppError
pluginContext := pluginContext(rctx)
if post.Type != model.PostTypeBurnOnRead {
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
replacementPost, rejectionReason := hooks.MessageWillBePosted(pluginContext, post.ForPlugin())
if rejectionReason != "" {
id := "Post rejected by plugin. " + rejectionReason
if rejectionReason == plugin.DismissPostError {
id = plugin.DismissPostError
}
rejectionError = model.NewAppError("createPost", id, nil, "", http.StatusBadRequest)
return false
}
if replacementPost != nil {
post = replacementPost
if post.Metadata != nil && metadata != nil {
post.Metadata.Priority = metadata.Priority
} else {
post.Metadata = metadata
}
}
return true
}, plugin.MessageWillBePostedID)
if rejectionError != nil {
return nil, false, rejectionError
}
}
// Pre-fill the CreateAt field for link previews to get the correct timestamp.
if post.CreateAt == 0 {
post.CreateAt = model.GetMillis()
}
post = a.getEmbedsAndImages(rctx, post, true)
previewPost := post.GetPreviewPost()
if previewPost != nil {
post.AddProp(model.PostPropsPreviewedPost, previewPost.PostID)
}
// saving file IDs here to later attach them to post.
// For BoR posts, store layer removes file IDs so we need to retain them here.
fileIDs := post.FileIds
rpost, nErr := a.Srv().Store().Post().Save(rctx, post)
if nErr != nil {
var appErr *model.AppError
var invErr *store.ErrInvalidInput
switch {
case errors.As(nErr, &appErr):
return nil, false, appErr
case errors.As(nErr, &invErr):
return nil, false, model.NewAppError("CreatePost", "app.post.save.existing.app_error", nil, "", http.StatusBadRequest).Wrap(nErr)
default:
return nil, false, model.NewAppError("CreatePost", "app.post.save.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
}
// Update the mapping from pending post id to the actual post id, for any clients that
// might be duplicating requests.
if appErr := a.Srv().seenPendingPostIdsCache.SetWithExpiry(post.PendingPostId, rpost.Id, pendingPostIDsCacheTTL); appErr != nil {
return nil, false, model.NewAppError("CreatePost", "api.post.deduplicate_create_post.cache_error", nil, "", http.StatusInternalServerError).Wrap(appErr)
}
if a.Metrics() != nil {
a.Metrics().IncrementPostCreate()
}
if len(fileIDs) > 0 {
var attachedFileIds model.StringArray
attachedFileIds, err = a.attachFilesToPost(rctx, post, fileIDs)
if err != nil {
rctx.Logger().Warn("Encountered error attaching files to post", mlog.String("post_id", post.Id), mlog.Array("file_ids", fileIDs), mlog.Err(err))
} else if post.Type != model.PostTypeBurnOnRead {
post.FileIds = attachedFileIds
}
if a.Metrics() != nil {
a.Metrics().IncrementPostFileAttachment(len(post.FileIds))
}
}
// We make a copy of the post for the plugin hook to avoid a race condition,
// and to remove the non-GOB-encodable Metadata from it.
// Skip plugin hooks for burn-on-read posts
if rpost.Type != model.PostTypeBurnOnRead {
pluginPost := rpost.ForPlugin()
a.Srv().Go(func() {
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
hooks.MessageHasBeenPosted(pluginContext, pluginPost)
return true
}, plugin.MessageHasBeenPostedID)
})
}
// Normally, we would let the API layer call PreparePostForClient, but we do it here since it also needs
// to be done when we send the post over the websocket in handlePostEvents
// PS: we don't want to include PostPriority from the db to avoid the replica lag,
// so we just return the one that was passed with post
rpost = a.PreparePostForClient(rctx, rpost, &model.PreparePostForClientOpts{IsEditPost: true})
// Initialize translations for the post before sending WebSocket events
// This ensures translation metadata is included in the 'posted' event
// Check if auto-translation is available before making database calls
if a.AutoTranslation() != nil && a.AutoTranslation().IsFeatureAvailable() {
enabled, atErr := a.AutoTranslation().IsChannelEnabled(rpost.ChannelId)
if atErr == nil && enabled {
_, translateErr := a.AutoTranslation().Translate(rctx.Context(), model.TranslationObjectTypePost, rpost.Id, rpost.ChannelId, rpost.UserId, rpost)
if translateErr != nil {
var notAvailErr *model.ErrAutoTranslationNotAvailable
if errors.As(translateErr, &notAvailErr) {
// Feature not available - log at debug level and continue
rctx.Logger().Debug("Auto-translation feature not available", mlog.String("post_id", rpost.Id), mlog.Err(translateErr))
} else if translateErr.Id == "ent.autotranslation.no_translatable_content" {
// No translatable content (only URLs/mentions) - this is expected, don't log
} else {
// Unexpected error - log at warn level but don't fail post creation
rctx.Logger().Warn("Failed to translate post", mlog.String("post_id", rpost.Id), mlog.Err(translateErr))
}
}
} else if atErr != nil {
rctx.Logger().Warn("Failed to check if channel is enabled for auto-translation", mlog.String("channel_id", rpost.ChannelId), mlog.Err(atErr))
}
}
a.applyPostWillBeConsumedHook(&rpost)
if rpost.RootId != "" {
if appErr := a.ResolvePersistentNotification(rctx, parentPostList.Posts[post.RootId], rpost.UserId); appErr != nil {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeWebsocket, model.NotificationReasonResolvePersistentNotificationError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "Error resolving persistent notification",
mlog.String("sender_id", rpost.UserId),
mlog.String("post_id", post.RootId),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonResolvePersistentNotificationError),
mlog.Err(appErr),
)
return nil, false, appErr
}
}
// Make sure poster is following the thread
if *a.Config().ServiceSettings.ThreadAutoFollow && rpost.RootId != "" {
_, err := a.Srv().Store().Thread().MaintainMembership(user.Id, rpost.RootId, store.ThreadMembershipOpts{
Following: true,
UpdateFollowing: true,
})
if err != nil {
rctx.Logger().Warn("Failed to update thread membership", mlog.Err(err))
}
}
if err := a.handlePostEvents(rctx, rpost, user, channel, flags.TriggerWebhooks, parentPostList, flags.SetOnline); err != nil {
rctx.Logger().Warn("Failed to handle post events", mlog.Err(err))
}
// Send any ephemeral posts after the post is created to ensure it shows up after the latest post created
if ephemeralPost != nil {
a.SendEphemeralPost(rctx, post.UserId, ephemeralPost)
}
rpost, isMemberForPreviews, err = a.SanitizePostMetadataForUser(rctx, rpost, rctx.Session().UserId)
if err != nil {
return nil, false, err
}
return rpost, isMemberForPreviews, nil
}
func (a *App) addPostPreviewProp(rctx request.CTX, post *model.Post) (*model.Post, error) {
previewPost := post.GetPreviewPost()
if previewPost != nil {
updatedPost := post.Clone()
updatedPost.AddProp(model.PostPropsPreviewedPost, previewPost.PostID)
updatedPost, err := a.Srv().Store().Post().Update(rctx, updatedPost, post)
return updatedPost, err
}
return post, nil
}
func (a *App) attachFilesToPost(rctx request.CTX, post *model.Post, fileIDs model.StringArray) (model.StringArray, *model.AppError) {
attachedIds := a.attachFileIDsToPost(rctx, post.Id, post.ChannelId, post.UserId, fileIDs)
if len(fileIDs) != len(attachedIds) {
post.FileIds = attachedIds
if _, err := a.Srv().Store().Post().Overwrite(rctx, post); err != nil {
return nil, model.NewAppError("attachFilesToPost", "app.post.overwrite.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
return attachedIds, nil
}
func (a *App) attachFileIDsToPost(rctx request.CTX, postID, channelID, userID string, fileIDs []string) []string {
var attachedIds []string
for _, fileID := range fileIDs {
err := a.Srv().Store().FileInfo().AttachToPost(rctx, fileID, postID, channelID, userID)
if err != nil {
rctx.Logger().Warn("Failed to attach file to post", mlog.String("file_id", fileID), mlog.String("post_id", postID), mlog.Err(err))
continue
}
attachedIds = append(attachedIds, fileID)
}
return attachedIds
}
// FillInPostProps should be invoked before saving posts to fill in properties such as
// channel_mentions.
//
// If channel is nil, FillInPostProps will look up the channel corresponding to the post.
func (a *App) FillInPostProps(rctx request.CTX, post *model.Post, channel *model.Channel) *model.AppError {
channelMentions := post.ChannelMentions()
channelMentionsProp := make(map[string]any)
if len(channelMentions) > 0 {
if channel == nil {
postChannel, err := a.Srv().Store().Channel().GetForPost(post.Id)
if err != nil {
return model.NewAppError("FillInPostProps", "api.context.invalid_param.app_error", map[string]any{"Name": "post.channel_id"}, "", http.StatusBadRequest).Wrap(err)
}
channel = postChannel
}
mentionedChannels, err := a.GetChannelsByNames(rctx, channelMentions, channel.TeamId)
if err != nil {
return err
}
for _, mentioned := range mentionedChannels {
if mentioned.Type == model.ChannelTypeOpen {
if ok, _ := a.HasPermissionToReadChannel(rctx, post.UserId, mentioned); ok {
team, err := a.Srv().Store().Team().Get(mentioned.TeamId)
if err != nil {
rctx.Logger().Warn("Failed to get team of the channel mention", mlog.String("team_id", channel.TeamId), mlog.String("channel_id", channel.Id), mlog.Err(err))
continue
}
channelMentionsProp[mentioned.Name] = map[string]any{
"display_name": mentioned.DisplayName,
"team_name": team.Name,
}
}
}
}
}
if len(channelMentionsProp) > 0 {
post.AddProp(model.PostPropsChannelMentions, channelMentionsProp)
} else if post.GetProps() != nil {
post.DelProp(model.PostPropsChannelMentions)
}
matched := atMentionPattern.MatchString(post.Message)
shouldAddProp := false
if a.Srv().License() != nil && *a.Srv().License().Features.LDAPGroups && matched {
hasPermission, _ := a.HasPermissionToChannel(rctx, post.UserId, post.ChannelId, model.PermissionUseGroupMentions)
shouldAddProp = !hasPermission
}
if shouldAddProp {
post.AddProp(model.PostPropsGroupHighlightDisabled, true)
}
// Populate AI-generated username from provided user ID
if aiGenUserID, ok := post.GetProp(model.PostPropsAIGeneratedByUserID).(string); ok && aiGenUserID != "" {
user, err := a.GetUser(aiGenUserID)
if err != nil {
// If user doesn't exist, remove the ai_generated_by prop to avoid storing invalid data
rctx.Logger().Warn("Failed to get user for AI-generated post, removing ai_generated_by prop", mlog.String("user_id", aiGenUserID), mlog.Err(err))
post.DelProp(model.PostPropsAIGeneratedByUserID)
} else {
// Only allow AI-generated username if the user is the post creator or a bot
if user.Id == post.UserId || user.IsBot {
post.AddProp(model.PostPropsAIGeneratedByUsername, user.Username)
} else {
// User ID cannot be a different non-bot user - return error
return model.NewAppError("FillInPostProps", "api.post.fill_in_post_props.invalid_ai_generated_user.app_error", nil, "", http.StatusBadRequest)
}
}
}
if post.Type == model.PostTypeBurnOnRead {
if !model.MinimumEnterpriseAdvancedLicense(a.Srv().License()) {
return model.NewAppError("FillInPostProps", "api.post.fill_in_post_props.burn_on_read.license.app_error", nil, "", http.StatusNotImplemented)
}
if !a.Config().FeatureFlags.BurnOnRead || !model.SafeDereference(a.Config().ServiceSettings.EnableBurnOnRead) {
return model.NewAppError("FillInPostProps", "api.post.fill_in_post_props.burn_on_read.config.app_error", nil, "", http.StatusNotImplemented)
}
// Apply burn-on-read expiration settings from configuration
maxTTLSeconds := int64(model.SafeDereference(a.Config().ServiceSettings.BurnOnReadMaximumTimeToLiveSeconds))
readDurationSeconds := int64(model.SafeDereference(a.Config().ServiceSettings.BurnOnReadDurationSeconds))
post.AddProp(model.PostPropsExpireAt, model.GetMillis()+(maxTTLSeconds*1000))
post.AddProp(model.PostPropsReadDurationSeconds, readDurationSeconds*1000)
}
return nil
}
func (a *App) handlePostEvents(rctx request.CTX, post *model.Post, user *model.User, channel *model.Channel, triggerWebhooks bool, parentPostList *model.PostList, setOnline bool) error {
var team *model.Team
if channel.TeamId != "" {
t, err := a.Srv().Store().Team().Get(channel.TeamId)
if err != nil {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeAll, model.NotificationReasonFetchError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "Missing team",
mlog.String("post_id", post.Id),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonFetchError),
mlog.Err(err),
)
return err
}
team = t
} else {
// Blank team for DMs
team = &model.Team{}
}
a.Srv().Platform().InvalidateCacheForChannel(channel)
if post.IsPinned {
a.Srv().Store().Channel().InvalidatePinnedPostCount(channel.Id)
}
a.Srv().Store().Post().InvalidateLastPostTimeCache(channel.Id)
if _, err := a.SendNotifications(rctx, post, team, channel, user, parentPostList, setOnline); err != nil {
return err
}
if post.Type != model.PostTypeAutoResponder { // don't respond to an auto-responder
a.Srv().Go(func() {
_, err := a.SendAutoResponseIfNecessary(rctx, channel, user, post)
if err != nil {
rctx.Logger().Error("Failed to send auto response", mlog.String("user_id", user.Id), mlog.String("post_id", post.Id), mlog.Err(err))
}
})
}
if triggerWebhooks && post.Type != model.PostTypeBurnOnRead {
a.Srv().Go(func() {
if err := a.handleWebhookEvents(rctx, post, team, channel, user); err != nil {
rctx.Logger().Error("Failed to handle webhook event", mlog.String("user_id", user.Id), mlog.String("post_id", post.Id), mlog.Err(err))
}
})
}
return nil
}
func (a *App) SendEphemeralPost(rctx request.CTX, userID string, post *model.Post) (*model.Post, bool) {
post.Type = model.PostTypeEphemeral
// fill in fields which haven't been specified which have sensible defaults
if post.Id == "" {
post.Id = model.NewId()
}
if post.CreateAt == 0 {
post.CreateAt = model.GetMillis()
}
if post.GetProps() == nil {
post.SetProps(make(model.StringInterface))
}
post.GenerateActionIds()
message := model.NewWebSocketEvent(model.WebsocketEventEphemeralMessage, "", post.ChannelId, userID, nil, "")
post = a.PreparePostForClientWithEmbedsAndImages(rctx, post, &model.PreparePostForClientOpts{IsNewPost: true, IncludePriority: true})
post = model.AddPostActionCookies(post, a.PostActionCookieSecret())
sanitizedPost, isMemberForPreviews, appErr := a.SanitizePostMetadataForUser(rctx, post, userID)
if appErr != nil {
rctx.Logger().Error("Failed to sanitize post metadata for user", mlog.String("user_id", userID), mlog.Err(appErr))
// If we failed to sanitize the post, we still want to remove the metadata.
sanitizedPost = post.Clone()
sanitizedPost.Metadata = nil
sanitizedPost.DelProp(model.PostPropsPreviewedPost)
}
post = sanitizedPost
postJSON, jsonErr := post.ToJSON()
if jsonErr != nil {
rctx.Logger().Warn("Failed to encode post to JSON", mlog.Err(jsonErr))
}
message.Add("post", postJSON)
a.Publish(message)
return post, isMemberForPreviews
}
func (a *App) UpdateEphemeralPost(rctx request.CTX, userID string, post *model.Post) (*model.Post, bool) {
post.Type = model.PostTypeEphemeral
post.UpdateAt = model.GetMillis()
if post.GetProps() == nil {
post.SetProps(make(model.StringInterface))
}
post.GenerateActionIds()
message := model.NewWebSocketEvent(model.WebsocketEventPostEdited, "", post.ChannelId, userID, nil, "")
post = a.PreparePostForClientWithEmbedsAndImages(rctx, post, &model.PreparePostForClientOpts{IsNewPost: true, IncludePriority: true})
post = model.AddPostActionCookies(post, a.PostActionCookieSecret())
sanitizedPost, isMemberForPreviews, appErr := a.SanitizePostMetadataForUser(rctx, post, userID)
if appErr != nil {
rctx.Logger().Error("Failed to sanitize post metadata for user", mlog.String("user_id", userID), mlog.Err(appErr))
// If we failed to sanitize the post, we still want to remove the metadata.
sanitizedPost = post.Clone()
sanitizedPost.Metadata = nil
sanitizedPost.DelProp(model.PostPropsPreviewedPost)
}
post = sanitizedPost
postJSON, jsonErr := post.ToJSON()
if jsonErr != nil {
rctx.Logger().Warn("Failed to encode post to JSON", mlog.Err(jsonErr))
}
message.Add("post", postJSON)
a.Publish(message)
return post, isMemberForPreviews
}
func (a *App) DeleteEphemeralPost(rctx request.CTX, userID, postID string) {
post := &model.Post{
Id: postID,
UserId: userID,
Type: model.PostTypeEphemeral,
DeleteAt: model.GetMillis(),
UpdateAt: model.GetMillis(),
}
message := model.NewWebSocketEvent(model.WebsocketEventPostDeleted, "", "", userID, nil, "")
postJSON, jsonErr := post.ToJSON()
if jsonErr != nil {
rctx.Logger().Warn("Failed to encode post to JSON", mlog.Err(jsonErr))
}
message.Add("post", postJSON)
a.Publish(message)
}
func (a *App) UpdatePost(rctx request.CTX, receivedUpdatedPost *model.Post, updatePostOptions *model.UpdatePostOptions) (*model.Post, bool, *model.AppError) {
if updatePostOptions == nil {
updatePostOptions = model.DefaultUpdatePostOptions()
}
receivedUpdatedPost.SanitizeProps()
postLists, nErr := a.Srv().Store().Post().Get(rctx, receivedUpdatedPost.Id, model.GetPostsOptions{}, "", a.Config().GetSanitizeOptions())
if nErr != nil {
var nfErr *store.ErrNotFound
var invErr *store.ErrInvalidInput
switch {
case errors.As(nErr, &invErr):
return nil, false, model.NewAppError("UpdatePost", "app.post.get.app_error", nil, "", http.StatusBadRequest).Wrap(nErr)
case errors.As(nErr, &nfErr):
return nil, false, model.NewAppError("UpdatePost", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(nErr)
default:
return nil, false, model.NewAppError("UpdatePost", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
}
oldPost := postLists.Posts[receivedUpdatedPost.Id]
var appErr *model.AppError
if oldPost == nil {
appErr = model.NewAppError("UpdatePost", "api.post.update_post.find.app_error", nil, "id="+receivedUpdatedPost.Id, http.StatusBadRequest)
return nil, false, appErr
}
if oldPost.DeleteAt != 0 {
appErr = model.NewAppError("UpdatePost", "api.post.update_post.permissions_details.app_error", map[string]any{"PostId": receivedUpdatedPost.Id}, "", http.StatusBadRequest)
return nil, false, appErr
}
if oldPost.Type == model.PostTypeBurnOnRead {
return nil, false, model.NewAppError("UpdatePost", "api.post.update_post.burn_on_read.app_error", nil, "", http.StatusBadRequest)
}
if oldPost.IsSystemMessage() {
appErr = model.NewAppError("UpdatePost", "api.post.update_post.system_message.app_error", nil, "id="+receivedUpdatedPost.Id, http.StatusBadRequest)
return nil, false, appErr
}
channel, appErr := a.GetChannel(rctx, oldPost.ChannelId)
if appErr != nil {
return nil, false, appErr
}
if channel.DeleteAt != 0 {
return nil, false, model.NewAppError("UpdatePost", "api.post.update_post.can_not_update_post_in_deleted.error", nil, "", http.StatusBadRequest)
}
restrictDM, err := a.CheckIfChannelIsRestrictedDM(rctx, channel)
if err != nil {
return nil, false, err
}
if restrictDM {
err := model.NewAppError("UpdatePost", "api.post.update_post.can_not_update_post_in_restricted_dm.error", nil, "", http.StatusBadRequest)
return nil, false, err
}
newPost := oldPost.Clone()
if newPost.Message != receivedUpdatedPost.Message {
newPost.Message = receivedUpdatedPost.Message
newPost.EditAt = model.GetMillis()
newPost.Hashtags, _ = model.ParseHashtags(receivedUpdatedPost.Message)
}
if !updatePostOptions.SafeUpdate {
newPost.IsPinned = receivedUpdatedPost.IsPinned
newPost.HasReactions = receivedUpdatedPost.HasReactions
newPost.SetProps(receivedUpdatedPost.GetProps())
var fileIds []string
fileIds, appErr = a.processPostFileChanges(rctx, receivedUpdatedPost, oldPost, updatePostOptions)
if appErr != nil {
return nil, false, appErr
}
newPost.FileIds = fileIds
}
// Avoid deep-equal checks if EditAt was already modified through message change
if newPost.EditAt == oldPost.EditAt && (!oldPost.FileIds.Equals(newPost.FileIds) || !oldPost.AttachmentsEqual(newPost)) {
newPost.EditAt = model.GetMillis()
}
if appErr = a.FillInPostProps(rctx, newPost, nil); appErr != nil {
return nil, false, appErr
}
if receivedUpdatedPost.IsRemote() {
oldPost.RemoteId = model.NewPointer(*receivedUpdatedPost.RemoteId)
}
var rejectionReason string
pluginContext := pluginContext(rctx)
if newPost.Type != model.PostTypeBurnOnRead {
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
newPost, rejectionReason = hooks.MessageWillBeUpdated(pluginContext, newPost.ForPlugin(), oldPost.ForPlugin())
return newPost != nil
}, plugin.MessageWillBeUpdatedID)
if newPost == nil {
return nil, false, model.NewAppError("UpdatePost", "Post rejected by plugin. "+rejectionReason, nil, "", http.StatusBadRequest)
}
}
// Always use incoming metadata when provided, otherwise retain existing
if receivedUpdatedPost.Metadata != nil {
newPost.Metadata = receivedUpdatedPost.Metadata.Copy()
// MM-67055: Strip embeds - always server-generated. Preserves Priority/Acks for Shared Channels sync.
newPost.Metadata.Embeds = nil
} else {
// Restore the post metadata that was stripped by the plugin. Set it to
// the last known good.
newPost.Metadata = oldPost.Metadata
}
rpost, nErr := a.Srv().Store().Post().Update(rctx, newPost, oldPost)
if nErr != nil {
switch {
case errors.As(nErr, &appErr):
return nil, false, appErr
default:
return nil, false, model.NewAppError("UpdatePost", "app.post.update.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
}
pluginOldPost := oldPost.ForPlugin()
pluginNewPost := newPost.ForPlugin()
if newPost.Type != model.PostTypeBurnOnRead {
a.Srv().Go(func() {
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
hooks.MessageHasBeenUpdated(pluginContext, pluginNewPost, pluginOldPost)
return true
}, plugin.MessageHasBeenUpdatedID)
})
}
rpost = a.PreparePostForClientWithEmbedsAndImages(rctx, rpost, &model.PreparePostForClientOpts{IsEditPost: true, IncludePriority: true})
// Ensure IsFollowing is nil since this updated post will be broadcast to all users
// and we don't want to have to populate it for every single user and broadcast to each
// individually.
rpost.IsFollowing = nil
rpost, nErr = a.addPostPreviewProp(rctx, rpost)
if nErr != nil {
return nil, false, model.NewAppError("UpdatePost", "app.post.update.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
// Re-translate post if content changed
// Our updated Translate() function detects content changes via NormHash comparison
// and automatically re-initializes translations for all configured languages
if a.AutoTranslation() != nil && a.AutoTranslation().IsFeatureAvailable() {
enabled, atErr := a.AutoTranslation().IsChannelEnabled(rpost.ChannelId)
if atErr == nil && enabled {
_, translateErr := a.AutoTranslation().Translate(rctx.Context(), model.TranslationObjectTypePost, rpost.Id, rpost.ChannelId, rpost.UserId, rpost)
if translateErr != nil {
var notAvailErr *model.ErrAutoTranslationNotAvailable
if errors.As(translateErr, &notAvailErr) {
// Feature not available - log at debug level and continue
rctx.Logger().Debug("Auto-translation feature not available for edited post", mlog.String("post_id", rpost.Id), mlog.Err(translateErr))
} else if translateErr.Id == "ent.autotranslation.no_translatable_content" {
// No translatable content (only URLs/mentions) - this is expected, don't log
} else {
// Unexpected error - log at warn level but don't fail post update
rctx.Logger().Warn("Failed to translate edited post", mlog.String("post_id", rpost.Id), mlog.Err(translateErr))
}
}
} else if atErr != nil {
rctx.Logger().Warn("Failed to check if channel is enabled for auto-translation", mlog.String("channel_id", rpost.ChannelId), mlog.Err(atErr))
}
}
message := model.NewWebSocketEvent(model.WebsocketEventPostEdited, "", rpost.ChannelId, "", nil, "")
appErr = a.publishWebsocketEventForPost(rctx, rpost, message)
if appErr != nil {
return nil, false, appErr
}
a.invalidateCacheForChannelPosts(rpost.ChannelId)
userID := rctx.Session().UserId
sanitizedPost, isMemberForPreviews, appErr := a.SanitizePostMetadataForUser(rctx, rpost, userID)
if appErr != nil {
mlog.Error("Failed to sanitize post metadata for user", mlog.String("user_id", userID), mlog.Err(appErr))
// If we failed to sanitize the post, we still want to remove the metadata.
sanitizedPost = rpost.Clone()
sanitizedPost.Metadata = nil
sanitizedPost.DelProp(model.PostPropsPreviewedPost)
}
rpost = sanitizedPost
return rpost, isMemberForPreviews, nil
}
func (a *App) publishWebsocketEventForPost(rctx request.CTX, post *model.Post, message *model.WebSocketEvent) *model.AppError {
var postJSON string
var jsonErr error
if post.Type == model.PostTypeBurnOnRead {
post.Message = ""
post.FileIds = []string{}
}
postJSON, jsonErr = post.ToJSON()
if jsonErr != nil {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeAll, model.NotificationReasonMarshalError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "Error in marshalling post to JSON",
mlog.String("type", model.NotificationTypeWebsocket),
mlog.String("post_id", post.Id),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonMarshalError),
)
return model.NewAppError("publishWebsocketEventForPost", "app.post.marshal.app_error", nil, "", http.StatusInternalServerError).Wrap(jsonErr)
}
message.Add("post", postJSON)
appErr := a.setupBroadcastHookForPermalink(rctx, post, message, postJSON)
if appErr != nil {
return appErr
}
if post.Type == model.PostTypeBurnOnRead {
appErr = a.processBroadcastHookForBurnOnRead(rctx, postJSON, post, message)
if appErr != nil {
return appErr
}
}
a.Publish(message)
return nil
}
func (a *App) setupBroadcastHookForPermalink(rctx request.CTX, post *model.Post, message *model.WebSocketEvent, postJSON string) *model.AppError {
// We check for the post first, and then the prop to prevent
// any embedded data to remain in case a post does not contain the prop
// but contains the embedded data.
permalinkPreviewedPost := post.GetPreviewPost()
if permalinkPreviewedPost == nil {
return nil
}
previewProp := post.GetPreviewedPostProp()
if previewProp == "" {
return nil
}
// To remain secure by default, we wipe out the metadata unconditionally.
removePermalinkMetadataFromPost(post)
postWithoutPermalinkPreviewJSON, err := post.ToJSON()
if err != nil {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeAll, model.NotificationReasonMarshalError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "Error in marshalling post to JSON",
mlog.String("type", model.NotificationTypeWebsocket),
mlog.String("post_id", post.Id),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonMarshalError),
)
return model.NewAppError("publishWebsocketEventForPost", "app.post.marshal.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
message.Add("post", postWithoutPermalinkPreviewJSON)
if !model.IsValidId(previewProp) {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeAll, model.NotificationReasonParseError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "Invalid post prop id for permalink post",
mlog.String("type", model.NotificationTypeWebsocket),
mlog.String("post_id", post.Id),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonParseError),
mlog.String("prop_value", previewProp),
)
rctx.Logger().Warn("invalid post prop value", mlog.String("prop_key", model.PostPropsPreviewedPost), mlog.String("prop_value", previewProp))
// In this case, it will broadcast the message with metadata wiped out
return nil
}
previewedPost, appErr := a.GetSinglePost(rctx, previewProp, false)
if appErr != nil {
if appErr.StatusCode == http.StatusNotFound {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeAll, model.NotificationReasonFetchError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "permalink post not found",
mlog.String("type", model.NotificationTypeWebsocket),
mlog.String("post_id", post.Id),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonFetchError),
mlog.String("referenced_post_id", previewProp),
mlog.Err(appErr),
)
rctx.Logger().Warn("permalinked post not found", mlog.String("referenced_post_id", previewProp))
// In this case, it will broadcast the message with metadata wiped out
return nil
}
return appErr
}
permalinkPreviewedChannel, appErr := a.GetChannel(rctx, previewedPost.ChannelId)
if appErr != nil {
if appErr.StatusCode == http.StatusNotFound {
a.CountNotificationReason(model.NotificationStatusError, model.NotificationTypeAll, model.NotificationReasonFetchError, model.NotificationNoPlatform)
a.Log().LogM(mlog.MlvlNotificationError, "Cannot get channel",
mlog.String("type", model.NotificationTypeWebsocket),
mlog.String("post_id", post.Id),
mlog.String("status", model.NotificationStatusError),
mlog.String("reason", model.NotificationReasonFetchError),
mlog.String("referenced_post_id", previewedPost.Id),
)
rctx.Logger().Warn("channel containing permalinked post not found", mlog.String("referenced_channel_id", previewedPost.ChannelId))
// In this case, it will broadcast the message with metadata wiped out
return nil
}
return appErr
}
// In case the user does have permission to read, we set the metadata back.
// Note that this is the return value to the post creator, and has nothing to do
// with the content of the websocket broadcast to that user or any other.
// We also don't check the membership for the previewed post, since
// the broadcast handler will create the audit events if needed.
if ok, _ := a.HasPermissionToReadChannel(rctx, post.UserId, permalinkPreviewedChannel); ok {
post.AddProp(model.PostPropsPreviewedPost, previewProp)
post.Metadata.Embeds = append(post.Metadata.Embeds, &model.PostEmbed{Type: model.PostEmbedPermalink, Data: permalinkPreviewedPost})
}
usePermalinkHook(message, post.UserId, permalinkPreviewedChannel, postJSON)
return nil
}
func (a *App) processBroadcastHookForBurnOnRead(rctx request.CTX, postJSON string, post *model.Post, message *model.WebSocketEvent) *model.AppError {
tmpPost, appErr := a.getBurnOnReadPost(rctx, post)
if appErr != nil {
return appErr
}
tmpPost = a.PreparePostForClient(rctx, tmpPost, &model.PreparePostForClientOpts{IncludePriority: true, RetainContent: true})
revealedPostJSON, err := tmpPost.ToJSON()
if err != nil {
return model.NewAppError("processBroadcastHookForBurnOnRead", "app.post.marshal.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
useBurnOnReadHook(message, post.UserId, revealedPostJSON, postJSON)
return nil
}
func (a *App) PatchPost(rctx request.CTX, postID string, patch *model.PostPatch, patchPostOptions *model.UpdatePostOptions) (*model.Post, bool, *model.AppError) {
if patchPostOptions == nil {
patchPostOptions = model.DefaultUpdatePostOptions()
}
post, err := a.GetSinglePost(rctx, postID, false)
if err != nil {
return nil, false, err
}
// only allow to update the pinned status of burn-on-read posts if the status is different
if post.Type == model.PostTypeBurnOnRead {
return nil, false, model.NewAppError("PatchPost", "api.post.patch_post.can_not_update_burn_on_read_post.error", nil, "", http.StatusBadRequest)
}
channel, err := a.GetChannel(rctx, post.ChannelId)
if err != nil {
return nil, false, err
}
if channel.DeleteAt != 0 {
err = model.NewAppError("PatchPost", "api.post.patch_post.can_not_update_post_in_deleted.error", nil, "", http.StatusBadRequest)
return nil, false, err
}
restrictDM, err := a.CheckIfChannelIsRestrictedDM(rctx, channel)
if err != nil {
return nil, false, err
}
if restrictDM {
return nil, false, model.NewAppError("PatchPost", "api.post.patch_post.can_not_update_post_in_restricted_dm.error", nil, "", http.StatusBadRequest)
}
if ok, _ := a.HasPermissionToChannel(rctx, post.UserId, post.ChannelId, model.PermissionUseChannelMentions); !ok {
patch.DisableMentionHighlights()
}
post.Patch(patch)
patchPostOptions.SafeUpdate = false
updatedPost, isMemberForPreviews, err := a.UpdatePost(rctx, post, patchPostOptions)
if err != nil {
return nil, false, err
}
return updatedPost, isMemberForPreviews, nil
}
func (a *App) GetPostsPage(rctx request.CTX, options model.GetPostsOptions) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetPosts(rctx, options, false, a.Config().GetSanitizeOptions())
if err != nil {
var invErr *store.ErrInvalidInput
switch {
case errors.As(err, &invErr):
return nil, model.NewAppError("GetPostsPage", "app.post.get_posts.app_error", nil, "", http.StatusBadRequest).Wrap(err)
default:
return nil, model.NewAppError("GetPostsPage", "app.post.get_root_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, options.UserId)
if appErr != nil {
return nil, appErr
}
// The postList is sorted as only rootPosts Order is included
if appErr = a.filterInaccessiblePosts(postList, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetPosts(rctx request.CTX, channelID string, offset int, limit int) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetPosts(rctx, model.GetPostsOptions{ChannelId: channelID, Page: offset, PerPage: limit}, true, a.Config().GetSanitizeOptions())
if err != nil {
var invErr *store.ErrInvalidInput
switch {
case errors.As(err, &invErr):
return nil, model.NewAppError("GetPosts", "app.post.get_posts.app_error", nil, "", http.StatusBadRequest).Wrap(err)
default:
return nil, model.NewAppError("GetPosts", "app.post.get_root_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, rctx.Session().UserId)
if appErr != nil {
return nil, appErr
}
if appErr = a.filterInaccessiblePosts(postList, filterPostOptions{}); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetPostsEtag(channelID string, collapsedThreads bool) string {
return a.Srv().Store().Post().GetEtag(channelID, true, collapsedThreads)
}
func (a *App) GetPostsSince(rctx request.CTX, options model.GetPostsSinceOptions) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetPostsSince(rctx, options, true, a.Config().GetSanitizeOptions())
if err != nil {
return nil, model.NewAppError("GetPostsSince", "app.post.get_posts_since.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
if appErr := a.filterInaccessiblePosts(postList, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, options.UserId)
if appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetSinglePost(rctx request.CTX, postID string, includeDeleted bool) (*model.Post, *model.AppError) {
post, err := a.Srv().Store().Post().GetSingle(rctx, postID, includeDeleted)
if err != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
return nil, model.NewAppError("GetSinglePost", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(err)
default:
return nil, model.NewAppError("GetSinglePost", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
post, appErr := a.revealSingleBurnOnReadPost(rctx, post, rctx.Session().UserId)
if appErr != nil {
return nil, appErr
}
firstInaccessiblePostTime, appErr := a.isInaccessiblePost(post)
if appErr != nil {
return nil, appErr
}
if firstInaccessiblePostTime != 0 {
return nil, model.NewAppError("GetSinglePost", "app.post.cloud.get.app_error", nil, "", http.StatusForbidden)
}
a.applyPostWillBeConsumedHook(&post)
return post, nil
}
func (a *App) GetPostThread(rctx request.CTX, postID string, opts model.GetPostsOptions, userID string) (*model.PostList, *model.AppError) {
posts, err := a.Srv().Store().Post().Get(rctx, postID, opts, userID, a.Config().GetSanitizeOptions())
if err != nil {
var nfErr *store.ErrNotFound
var invErr *store.ErrInvalidInput
switch {
case errors.As(err, &invErr):
return nil, model.NewAppError("GetPostThread", "app.post.get.app_error", nil, "", http.StatusBadRequest).Wrap(err)
case errors.As(err, &nfErr):
return nil, model.NewAppError("GetPostThread", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(err)
default:
return nil, model.NewAppError("GetPostThread", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
var appErr *model.AppError
posts, appErr = a.revealBurnOnReadPostsForUser(rctx, posts, userID)
if appErr != nil {
return nil, appErr
}
// Get inserts the requested post first in the list, then adds the sorted threadPosts.
// So, the whole postList.Order is not sorted.
// The fully sorted list comes only when the CollapsedThreads is true and the Directions is not empty.
filterOptions := filterPostOptions{}
if opts.CollapsedThreads && opts.Direction != "" {
filterOptions.assumeSortedCreatedAt = true
}
if appErr = a.filterInaccessiblePosts(posts, filterOptions); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(posts.Posts)
return posts, nil
}
func (a *App) GetFlaggedPosts(rctx request.CTX, userID string, offset int, limit int) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetFlaggedPosts(userID, offset, limit)
if err != nil {
return nil, model.NewAppError("GetFlaggedPosts", "app.post.get_flagged_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// Process burn-on-read posts for the requesting user
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, userID)
if appErr != nil {
return nil, appErr
}
if appErr = a.filterInaccessiblePosts(postList, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetFlaggedPostsForTeam(rctx request.CTX, userID, teamID string, offset int, limit int) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetFlaggedPostsForTeam(userID, teamID, offset, limit)
if err != nil {
return nil, model.NewAppError("GetFlaggedPostsForTeam", "app.post.get_flagged_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// Process burn-on-read posts for the requesting user
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, userID)
if appErr != nil {
return nil, appErr
}
if appErr = a.filterInaccessiblePosts(postList, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetFlaggedPostsForChannel(rctx request.CTX, userID, channelID string, offset int, limit int) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetFlaggedPostsForChannel(userID, channelID, offset, limit)
if err != nil {
return nil, model.NewAppError("GetFlaggedPostsForChannel", "app.post.get_flagged_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// Process burn-on-read posts for the requesting user
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, userID)
if appErr != nil {
return nil, appErr
}
if appErr = a.filterInaccessiblePosts(postList, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetPermalinkPost(rctx request.CTX, postID string, userID string) (*model.PostList, *model.AppError) {
list, nErr := a.Srv().Store().Post().Get(rctx, postID, model.GetPostsOptions{}, userID, a.Config().GetSanitizeOptions())
if nErr != nil {
var nfErr *store.ErrNotFound
var invErr *store.ErrInvalidInput
switch {
case errors.As(nErr, &invErr):
return nil, model.NewAppError("GetPermalinkPost", "app.post.get.app_error", nil, "", http.StatusBadRequest).Wrap(nErr)
case errors.As(nErr, &nfErr):
return nil, model.NewAppError("GetPermalinkPost", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(nErr)
default:
return nil, model.NewAppError("GetPermalinkPost", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
}
var appErr *model.AppError
list, appErr = a.revealBurnOnReadPostsForUser(rctx, list, userID)
if appErr != nil {
return nil, appErr
}
if len(list.Order) != 1 {
return nil, model.NewAppError("getPermalinkTmp", "api.post_get_post_by_id.get.app_error", nil, "", http.StatusNotFound)
}
post := list.Posts[list.Order[0]]
channel, err := a.GetChannel(rctx, post.ChannelId)
if err != nil {
return nil, err
}
if err = a.JoinChannel(rctx, channel, userID); err != nil {
return nil, err
}
if appErr := a.filterInaccessiblePosts(list, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(list.Posts)
return list, nil
}
func (a *App) GetPostsBeforePost(rctx request.CTX, options model.GetPostsOptions) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetPostsBefore(rctx, options, a.Config().GetSanitizeOptions())
if err != nil {
var invErr *store.ErrInvalidInput
switch {
case errors.As(err, &invErr):
return nil, model.NewAppError("GetPostsBeforePost", "app.post.get_posts_around.get.app_error", nil, "", http.StatusBadRequest).Wrap(err)
default:
return nil, model.NewAppError("GetPostsBeforePost", "app.post.get_posts_around.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, options.UserId)
if appErr != nil {
return nil, appErr
}
// GetPostsBefore orders by channel id and deleted at,
// before sorting based on created at.
// but the deleted at is only ever where deleted at = 0,
// and channel id may or may not be empty (all channels) or defined (single channel),
// so we can still optimize if the search is for a single channel
filterOptions := filterPostOptions{}
if options.ChannelId != "" {
filterOptions.assumeSortedCreatedAt = true
}
if appErr := a.filterInaccessiblePosts(postList, filterOptions); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetPostsAfterPost(rctx request.CTX, options model.GetPostsOptions) (*model.PostList, *model.AppError) {
postList, err := a.Srv().Store().Post().GetPostsAfter(rctx, options, a.Config().GetSanitizeOptions())
if err != nil {
var invErr *store.ErrInvalidInput
switch {
case errors.As(err, &invErr):
return nil, model.NewAppError("GetPostsAfterPost", "app.post.get_posts_around.get.app_error", nil, "", http.StatusBadRequest).Wrap(err)
default:
return nil, model.NewAppError("GetPostsAfterPost", "app.post.get_posts_around.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, options.UserId)
if appErr != nil {
return nil, appErr
}
// GetPostsAfter orders by channel id and deleted at,
// before sorting based on created at.
// but the deleted at is only ever where deleted at = 0,
// and channel id may or may not be empty (all channels) or defined (single channel),
// so we can still optimize if the search is for a single channel
filterOptions := filterPostOptions{}
if options.ChannelId != "" {
filterOptions.assumeSortedCreatedAt = true
}
if appErr := a.filterInaccessiblePosts(postList, filterOptions); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetPostsAroundPost(rctx request.CTX, before bool, options model.GetPostsOptions) (*model.PostList, *model.AppError) {
var postList *model.PostList
var err error
sanitize := a.Config().GetSanitizeOptions()
if before {
postList, err = a.Srv().Store().Post().GetPostsBefore(rctx, options, sanitize)
} else {
postList, err = a.Srv().Store().Post().GetPostsAfter(rctx, options, sanitize)
}
if err != nil {
var invErr *store.ErrInvalidInput
switch {
case errors.As(err, &invErr):
return nil, model.NewAppError("GetPostsAroundPost", "app.post.get_posts_around.get.app_error", nil, "", http.StatusBadRequest).Wrap(err)
default:
return nil, model.NewAppError("GetPostsAroundPost", "app.post.get_posts_around.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
var appErr *model.AppError
postList, appErr = a.revealBurnOnReadPostsForUser(rctx, postList, options.UserId)
if appErr != nil {
return nil, appErr
}
// GetPostsBefore and GetPostsAfter order by channel id and deleted at,
// before sorting based on created at.
// but the deleted at is only ever where deleted at = 0,
// and channel id may or may not be empty (all channels) or defined (single channel),
// so we can still optimize if the search is for a single channel
filterOptions := filterPostOptions{}
if options.ChannelId != "" {
filterOptions.assumeSortedCreatedAt = true
}
if appErr := a.filterInaccessiblePosts(postList, filterOptions); appErr != nil {
return nil, appErr
}
a.applyPostsWillBeConsumedHook(postList.Posts)
return postList, nil
}
func (a *App) GetPostAfterTime(channelID string, time int64, collapsedThreads bool) (*model.Post, *model.AppError) {
post, err := a.Srv().Store().Post().GetPostAfterTime(channelID, time, collapsedThreads)
if err != nil {
return nil, model.NewAppError("GetPostAfterTime", "app.post.get_post_after_time.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
a.applyPostWillBeConsumedHook(&post)
return post, nil
}
func (a *App) GetPostIdAfterTime(channelID string, time int64, collapsedThreads bool) (string, *model.AppError) {
postID, err := a.Srv().Store().Post().GetPostIdAfterTime(channelID, time, collapsedThreads)
if err != nil {
return "", model.NewAppError("GetPostIdAfterTime", "app.post.get_post_id_around.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
return postID, nil
}
func (a *App) GetPostIdBeforeTime(channelID string, time int64, collapsedThreads bool) (string, *model.AppError) {
postID, err := a.Srv().Store().Post().GetPostIdBeforeTime(channelID, time, collapsedThreads)
if err != nil {
return "", model.NewAppError("GetPostIdBeforeTime", "app.post.get_post_id_around.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
return postID, nil
}
func (a *App) GetNextPostIdFromPostList(postList *model.PostList, collapsedThreads bool) string {
if len(postList.Order) > 0 {
firstPostId := postList.Order[0]
firstPost := postList.Posts[firstPostId]
nextPostId, err := a.GetPostIdAfterTime(firstPost.ChannelId, firstPost.CreateAt, collapsedThreads)
if err != nil {
mlog.Warn("GetNextPostIdFromPostList: failed in getting next post", mlog.Err(err))
}
return nextPostId
}
return ""
}
func (a *App) GetPrevPostIdFromPostList(postList *model.PostList, collapsedThreads bool) string {
if len(postList.Order) > 0 {
lastPostId := postList.Order[len(postList.Order)-1]
lastPost := postList.Posts[lastPostId]
previousPostId, err := a.GetPostIdBeforeTime(lastPost.ChannelId, lastPost.CreateAt, collapsedThreads)
if err != nil {
mlog.Warn("GetPrevPostIdFromPostList: failed in getting previous post", mlog.Err(err))
}
return previousPostId
}
return ""
}
// AddCursorIdsForPostList adds NextPostId and PrevPostId as cursor to the PostList.
// The conditional blocks ensure that it sets those cursor IDs immediately as afterPost, beforePost or empty,
// and only query to database whenever necessary.
func (a *App) AddCursorIdsForPostList(originalList *model.PostList, afterPost, beforePost string, since int64, page, perPage int, collapsedThreads bool) {
prevPostIdSet := false
prevPostId := ""
nextPostIdSet := false
nextPostId := ""
if since > 0 { // "since" query to return empty NextPostId and PrevPostId
nextPostIdSet = true
prevPostIdSet = true
} else if afterPost != "" {
if page == 0 {
prevPostId = afterPost
prevPostIdSet = true
}
if len(originalList.Order) < perPage {
nextPostIdSet = true
}
} else if beforePost != "" {
if page == 0 {
nextPostId = beforePost
nextPostIdSet = true
}
if len(originalList.Order) < perPage {
prevPostIdSet = true
}
}
if !nextPostIdSet {
nextPostId = a.GetNextPostIdFromPostList(originalList, collapsedThreads)
}
if !prevPostIdSet {
prevPostId = a.GetPrevPostIdFromPostList(originalList, collapsedThreads)
}
originalList.NextPostId = nextPostId
originalList.PrevPostId = prevPostId
}
func (a *App) GetPostsForChannelAroundLastUnread(rctx request.CTX, channelID, userID string, limitBefore, limitAfter int, skipFetchThreads bool, collapsedThreads, collapsedThreadsExtended bool) (*model.PostList, *model.AppError) {
var lastViewedAt int64
var err *model.AppError
if lastViewedAt, err = a.Srv().getChannelMemberLastViewedAt(rctx, channelID, userID); err != nil {
return nil, err
} else if lastViewedAt == 0 {
return model.NewPostList(), nil
}
lastUnreadPostId, err := a.GetPostIdAfterTime(channelID, lastViewedAt, collapsedThreads)
if err != nil {
return nil, err
} else if lastUnreadPostId == "" {
return model.NewPostList(), nil
}
opts := model.GetPostsOptions{
SkipFetchThreads: skipFetchThreads,
CollapsedThreads: collapsedThreads,
CollapsedThreadsExtended: collapsedThreadsExtended,
}
postList, err := a.GetPostThread(rctx, lastUnreadPostId, opts, userID)
if err != nil {
return nil, err
}
// Reset order to only include the last unread post: if the thread appears in the centre
// channel organically, those replies will be added below.
postList.Order = []string{}
// Add lastUnreadPostId in order, only if it hasn't been filtered as per the cloud plan's limit
if _, ok := postList.Posts[lastUnreadPostId]; ok {
postList.Order = []string{lastUnreadPostId}
// BeforePosts will only be accessible if the lastUnreadPostId is itself accessible
if postListBefore, err := a.GetPostsBeforePost(rctx, model.GetPostsOptions{ChannelId: channelID, PostId: lastUnreadPostId, Page: PageDefault, PerPage: limitBefore, SkipFetchThreads: skipFetchThreads, CollapsedThreads: collapsedThreads, CollapsedThreadsExtended: collapsedThreadsExtended, UserId: userID}); err != nil {
return nil, err
} else if postListBefore != nil {
postList.Extend(postListBefore)
}
}
if postListAfter, err := a.GetPostsAfterPost(rctx, model.GetPostsOptions{ChannelId: channelID, PostId: lastUnreadPostId, Page: PageDefault, PerPage: limitAfter - 1, SkipFetchThreads: skipFetchThreads, CollapsedThreads: collapsedThreads, CollapsedThreadsExtended: collapsedThreadsExtended, UserId: userID}); err != nil {
return nil, err
} else if postListAfter != nil {
postList.Extend(postListAfter)
}
postList.SortByCreateAt()
return postList, nil
}
func (a *App) DeletePost(rctx request.CTX, postID, deleteByID string) (*model.Post, *model.AppError) {
post, err := a.Srv().Store().Post().GetSingle(sqlstore.RequestContextWithMaster(rctx), postID, false)
if err != nil {
return nil, model.NewAppError("DeletePost", "app.post.get.app_error", nil, "", http.StatusBadRequest).Wrap(err)
}
if post.Type == model.PostTypeBurnOnRead {
return nil, a.PermanentDeletePost(rctx, postID, deleteByID)
}
channel, appErr := a.GetChannel(rctx, post.ChannelId)
if appErr != nil {
return nil, appErr
}
if channel.DeleteAt != 0 {
return nil, model.NewAppError("DeletePost", "api.post.delete_post.can_not_delete_post_in_deleted.error", nil, "", http.StatusBadRequest)
}
restrictDM, appErr := a.CheckIfChannelIsRestrictedDM(rctx, channel)
if appErr != nil {
return nil, appErr
}
if restrictDM {
err := model.NewAppError("DeletePost", "api.post.delete_post.can_not_delete_from_restricted_dm.error", nil, "", http.StatusBadRequest)
return nil, err
}
err = a.Srv().Store().Post().Delete(rctx, postID, model.GetMillis(), deleteByID)
if err != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
return nil, model.NewAppError("DeletePost", "app.post.delete.app_error", nil, "", http.StatusNotFound).Wrap(err)
default:
return nil, model.NewAppError("DeletePost", "app.post.delete.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
if len(post.FileIds) > 0 {
a.Srv().Go(func() {
a.deletePostFiles(rctx, post.Id)
})
a.Srv().Store().FileInfo().InvalidateFileInfosForPostCache(postID, true)
a.Srv().Store().FileInfo().InvalidateFileInfosForPostCache(postID, false)
}
appErr = a.CleanUpAfterPostDeletion(rctx, post, deleteByID)
if appErr != nil {
return nil, appErr
}
return post, nil
}
func (a *App) deleteDraftsAssociatedWithPost(rctx request.CTX, channel *model.Channel, post *model.Post) {
if err := a.Srv().Store().Draft().DeleteDraftsAssociatedWithPost(channel.Id, post.Id); err != nil {
rctx.Logger().Error("Failed to delete drafts associated with post when deleting post", mlog.Err(err))
return
}
}
func (a *App) deleteFlaggedPosts(rctx request.CTX, postID string) {
if err := a.Srv().Store().Preference().DeleteCategoryAndName(model.PreferenceCategoryFlaggedPost, postID); err != nil {
rctx.Logger().Warn("Unable to delete flagged post preference when deleting post.", mlog.Err(err))
return
}
}
func (a *App) deletePostFiles(rctx request.CTX, postID string) {
if _, err := a.Srv().Store().FileInfo().DeleteForPost(rctx, postID); err != nil {
rctx.Logger().Warn("Encountered error when deleting files for post", mlog.String("post_id", postID), mlog.Err(err))
}
}
func (a *App) parseAndFetchChannelIdByNameFromInFilter(rctx request.CTX, channelName, userID, teamID string, includeDeleted bool) (*model.Channel, error) {
cleanChannelName := strings.TrimLeft(channelName, "~")
if strings.HasPrefix(cleanChannelName, "@") && strings.Contains(cleanChannelName, ",") {
var userIDs []string
users, err := a.GetUsersByUsernames(strings.Split(cleanChannelName[1:], ","), false, nil)
if err != nil {
return nil, err
}
for _, user := range users {
userIDs = append(userIDs, user.Id)
}
channel, err := a.GetGroupChannel(rctx, userIDs)
if err != nil {
return nil, err
}
return channel, nil
}
if strings.HasPrefix(cleanChannelName, "@") && !strings.Contains(cleanChannelName, ",") {
user, err := a.GetUserByUsername(cleanChannelName[1:])
if err != nil {
return nil, err
}
channel, err := a.GetOrCreateDirectChannel(rctx, userID, user.Id)
if err != nil {
return nil, err
}
return channel, nil
}
channel, err := a.GetChannelByName(rctx, cleanChannelName, teamID, includeDeleted)
if err != nil {
return nil, err
}
return channel, nil
}
func (a *App) searchPostsInTeam(teamID string, userID string, paramsList []*model.SearchParams, modifierFun func(*model.SearchParams)) (*model.PostList, *model.AppError) {
var wg sync.WaitGroup
pchan := make(chan store.StoreResult[*model.PostList], len(paramsList))
for _, params := range paramsList {
// Don't allow users to search for everything.
if params.Terms == "*" {
continue
}
modifierFun(params)
wg.Add(1)
go func(params *model.SearchParams) {
defer wg.Done()
postList, err := a.Srv().Store().Post().Search(teamID, userID, params)
pchan <- store.StoreResult[*model.PostList]{Data: postList, NErr: err}
}(params)
}
wg.Wait()
close(pchan)
posts := model.NewPostList()
for result := range pchan {
if result.NErr != nil {
return nil, model.NewAppError("searchPostsInTeam", "app.post.search.app_error", nil, "", http.StatusInternalServerError).Wrap(result.NErr)
}
posts.Extend(result.Data)
}
posts.SortByCreateAt()
if appErr := a.filterInaccessiblePosts(posts, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, appErr
}
if appErr := a.filterBurnOnReadPosts(posts); appErr != nil {
return nil, appErr
}
return posts, nil
}
func (a *App) convertChannelNamesToChannelIds(rctx request.CTX, channels []string, userID string, teamID string, includeDeletedChannels bool) []string {
for idx, channelName := range channels {
channel, err := a.parseAndFetchChannelIdByNameFromInFilter(rctx, channelName, userID, teamID, includeDeletedChannels)
if err != nil {
rctx.Logger().Warn("error getting channel id by name from in filter", mlog.Err(err))
continue
}
channels[idx] = channel.Id
}
return channels
}
func (a *App) convertUserNameToUserIds(rctx request.CTX, usernames []string) []string {
for idx, username := range usernames {
user, err := a.GetUserByUsername(strings.TrimLeft(username, "@"))
if err != nil {
rctx.Logger().Warn("error getting user by username", mlog.String("user_name", username), mlog.Err(err))
continue
}
usernames[idx] = user.Id
}
return usernames
}
// GetLastAccessiblePostTime returns CreateAt time(from cache) of the last accessible post as per the license limit
func (a *App) GetLastAccessiblePostTime() (int64, *model.AppError) {
// Only calculate the last accessible post time when there are actual post history limits
license := a.Srv().License()
if license == nil || license.Limits == nil || license.Limits.PostHistory == 0 {
return 0, nil
}
system, err := a.Srv().Store().System().GetByName(model.SystemLastAccessiblePostTime)
if err != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
// All posts are accessible
return 0, nil
default:
return 0, model.NewAppError("GetLastAccessiblePostTime", "app.system.get_by_name.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
lastAccessiblePostTime, err := strconv.ParseInt(system.Value, 10, 64)
if err != nil {
return 0, model.NewAppError("GetLastAccessiblePostTime", "common.parse_error_int64", map[string]any{"Value": system.Value}, "", http.StatusInternalServerError).Wrap(err)
}
return lastAccessiblePostTime, nil
}
// ComputeLastAccessiblePostTime updates cache with CreateAt time of the last accessible post as per the license limit.
// Use GetLastAccessiblePostTime() to access the result.
func (a *App) ComputeLastAccessiblePostTime() error {
limit := a.GetPostHistoryLimit()
if limit == 0 {
// All posts are accessible - we must check if a previous value was set so we can clear it
systemValue, err := a.Srv().Store().System().GetByName(model.SystemLastAccessiblePostTime)
if err != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
// There was no previous value, nothing to do
return nil
default:
return model.NewAppError("ComputeLastAccessiblePostTime", "app.system.get_by_name.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
if systemValue != nil {
// Previous value was set, so we must clear it
if _, err = a.Srv().Store().System().PermanentDeleteByName(model.SystemLastAccessiblePostTime); err != nil {
return model.NewAppError("ComputeLastAccessiblePostTime", "app.system.permanent_delete_by_name.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
// Message history limit is not applicable
return nil
}
createdAt, err := a.Srv().GetStore().Post().GetNthRecentPostTime(limit)
if err != nil {
var nfErr *store.ErrNotFound
if !errors.As(err, &nfErr) {
return model.NewAppError("ComputeLastAccessiblePostTime", "app.last_accessible_post.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
// Update Cache
err = a.Srv().Store().System().SaveOrUpdate(&model.System{
Name: model.SystemLastAccessiblePostTime,
Value: strconv.FormatInt(createdAt, 10),
})
if err != nil {
return model.NewAppError("ComputeLastAccessiblePostTime", "app.system.save.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
return nil
}
func (a *App) SearchPostsInTeam(teamID string, paramsList []*model.SearchParams) (*model.PostList, *model.AppError) {
if !*a.Config().ServiceSettings.EnablePostSearch {
return nil, model.NewAppError("SearchPostsInTeam", "store.sql_post.search.disabled", nil, fmt.Sprintf("teamId=%v", teamID), http.StatusNotImplemented)
}
return a.searchPostsInTeam(teamID, "", paramsList, func(params *model.SearchParams) {
params.SearchWithoutUserId = true
})
}
func (a *App) SearchPostsForUser(rctx request.CTX, terms string, userID string, teamID string, isOrSearch bool, includeDeletedChannels bool, timeZoneOffset int, page, perPage int) (*model.PostSearchResults, bool, *model.AppError) {
var postSearchResults *model.PostSearchResults
paramsList := model.ParseSearchParams(strings.TrimSpace(terms), timeZoneOffset)
if !*a.Config().ServiceSettings.EnablePostSearch {
return nil, false, model.NewAppError("SearchPostsForUser", "store.sql_post.search.disabled", nil, fmt.Sprintf("teamId=%v userId=%v", teamID, userID), http.StatusNotImplemented)
}
finalParamsList := []*model.SearchParams{}
for _, params := range paramsList {
params.OrTerms = isOrSearch
params.IncludeDeletedChannels = includeDeletedChannels
// Don't allow users to search for "*"
if params.Terms != "*" {
// TODO: we have to send channel ids
// from the front-end. Otherwise it's not possible to distinguish
// from just the channel name at a cross-team level.
// Convert channel names to channel IDs
params.InChannels = a.convertChannelNamesToChannelIds(rctx, params.InChannels, userID, teamID, includeDeletedChannels)
params.ExcludedChannels = a.convertChannelNamesToChannelIds(rctx, params.ExcludedChannels, userID, teamID, includeDeletedChannels)
// Convert usernames to user IDs
params.FromUsers = a.convertUserNameToUserIds(rctx, params.FromUsers)
params.ExcludedUsers = a.convertUserNameToUserIds(rctx, params.ExcludedUsers)
finalParamsList = append(finalParamsList, params)
}
}
// If the processed search params are empty, return empty search results.
if len(finalParamsList) == 0 {
return model.MakePostSearchResults(model.NewPostList(), nil), true, nil
}
postSearchResults, err := a.Srv().Store().Post().SearchPostsForUser(rctx, finalParamsList, userID, teamID, page, perPage)
if err != nil {
var appErr *model.AppError
switch {
case errors.As(err, &appErr):
return nil, false, appErr
default:
return nil, false, model.NewAppError("SearchPostsForUser", "app.post.search.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
if appErr := a.filterInaccessiblePosts(postSearchResults.PostList, filterPostOptions{assumeSortedCreatedAt: true}); appErr != nil {
return nil, false, appErr
}
allPostHaveMembership, appErr := a.FilterPostsByChannelPermissions(rctx, postSearchResults.PostList, userID)
if appErr != nil {
return nil, false, appErr
}
if appErr := a.filterBurnOnReadPosts(postSearchResults.PostList); appErr != nil {
return nil, false, appErr
}
return postSearchResults, allPostHaveMembership, nil
}
func (a *App) FilterPostsByChannelPermissions(rctx request.CTX, postList *model.PostList, userID string) (bool, *model.AppError) {
if postList == nil || postList.Posts == nil || len(postList.Posts) == 0 {
return true, nil // On an empty post list, we consider all posts as having membership
}
channels := make(map[string]*model.Channel)
for _, post := range postList.Posts {
if post.ChannelId != "" {
channels[post.ChannelId] = nil
}
}
if len(channels) > 0 {
channelIDs := slices.Collect(maps.Keys(channels))
channelList, err := a.GetChannels(rctx, channelIDs)
if err != nil && err.StatusCode != http.StatusNotFound {
return false, err
}
for _, channel := range channelList {
channels[channel.Id] = channel
}
}
channelReadPermission := make(map[string]bool)
filteredPosts := make(map[string]*model.Post)
filteredOrder := []string{}
allPostHaveMembership := true
for _, postID := range postList.Order {
post, ok := postList.Posts[postID]
if !ok {
continue
}
if _, ok := channelReadPermission[post.ChannelId]; !ok {
channel := channels[post.ChannelId]
allowed := false
isMember := true
if channel != nil {
allowed, isMember = a.HasPermissionToReadChannel(rctx, userID, channel)
}
channelReadPermission[post.ChannelId] = allowed
if allowed {
allPostHaveMembership = allPostHaveMembership && isMember
}
}
if channelReadPermission[post.ChannelId] {
filteredPosts[postID] = post
filteredOrder = append(filteredOrder, postID)
}
}
postList.Posts = filteredPosts
postList.Order = filteredOrder
return allPostHaveMembership, nil
}
func (a *App) GetFileInfosForPostWithMigration(rctx request.CTX, postID string, includeDeleted bool) ([]*model.FileInfo, *model.AppError) {
pchan := make(chan store.StoreResult[*model.Post], 1)
go func() {
post, err := a.Srv().Store().Post().GetSingle(rctx, postID, includeDeleted)
pchan <- store.StoreResult[*model.Post]{Data: post, NErr: err}
close(pchan)
}()
infos, firstInaccessibleFileTime, err := a.GetFileInfosForPost(rctx, postID, false, includeDeleted)
if err != nil {
return nil, err
}
if len(infos) == 0 && firstInaccessibleFileTime == 0 {
// No FileInfos were returned so check if they need to be created for this post
result := <-pchan
if result.NErr != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(result.NErr, &nfErr):
return nil, model.NewAppError("GetFileInfosForPostWithMigration", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(result.NErr)
default:
return nil, model.NewAppError("GetFileInfosForPostWithMigration", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(result.NErr)
}
}
post := result.Data
if len(post.Filenames) > 0 {
a.Srv().Store().FileInfo().InvalidateFileInfosForPostCache(postID, false)
a.Srv().Store().FileInfo().InvalidateFileInfosForPostCache(postID, true)
// The post has Filenames that need to be replaced with FileInfos
infos = a.MigrateFilenamesToFileInfos(rctx, post)
}
}
return infos, nil
}
// GetFileInfosForPost also returns firstInaccessibleFileTime based on cloud plan's limit.
func (a *App) GetFileInfosForPost(rctx request.CTX, postID string, fromMaster bool, includeDeleted bool) ([]*model.FileInfo, int64, *model.AppError) {
fileInfos, err := a.Srv().Store().FileInfo().GetForPost(postID, fromMaster, includeDeleted, true)
if err != nil {
return nil, 0, model.NewAppError("GetFileInfosForPost", "app.file_info.get_for_post.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
firstInaccessibleFileTime, appErr := a.removeInaccessibleContentFromFilesSlice(fileInfos)
if appErr != nil {
return nil, 0, appErr
}
a.generateMiniPreviewForInfos(rctx, fileInfos)
return fileInfos, firstInaccessibleFileTime, nil
}
func (a *App) PostWithProxyAddedToImageURLs(post *model.Post) *model.Post {
if f := a.ImageProxyAdder(); f != nil {
return post.WithRewrittenImageURLs(f)
}
return post
}
func (a *App) PostWithProxyRemovedFromImageURLs(post *model.Post) *model.Post {
if f := a.ImageProxyRemover(); f != nil {
return post.WithRewrittenImageURLs(f)
}
return post
}
func (a *App) PostPatchWithProxyRemovedFromImageURLs(patch *model.PostPatch) *model.PostPatch {
if f := a.ImageProxyRemover(); f != nil {
return patch.WithRewrittenImageURLs(f)
}
return patch
}
func (a *App) ImageProxyAdder() func(string) string {
if !*a.Config().ImageProxySettings.Enable {
return nil
}
return func(url string) string {
return a.ImageProxy().GetProxiedImageURL(url)
}
}
func (a *App) ImageProxyRemover() (f func(string) string) {
if !*a.Config().ImageProxySettings.Enable {
return nil
}
return func(url string) string {
return a.ImageProxy().GetUnproxiedImageURL(url)
}
}
func (a *App) MaxPostSize() int {
return a.Srv().Platform().MaxPostSize()
}
// countThreadMentions returns the number of times the user is mentioned in a specified thread after the timestamp.
func (a *App) countThreadMentions(rctx request.CTX, user *model.User, post *model.Post, teamID string, timestamp int64) (int64, *model.AppError) {
channel, err := a.GetChannel(rctx, post.ChannelId)
if err != nil {
return 0, err
}
keywords := MentionKeywords{}
keywords.AddUser(
user,
map[string]string{},
&model.Status{Status: model.StatusOnline}, // Assume the user is online since they would've triggered this
true, // Assume channel mentions are always allowed for simplicity
)
posts, nErr := a.Srv().Store().Post().GetPostsByThread(post.Id, timestamp)
if nErr != nil {
return 0, model.NewAppError("countThreadMentions", "app.channel.count_posts_since.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
count := 0
if channel.Type == model.ChannelTypeDirect || channel.Type == model.ChannelTypeGroup {
// In a DM channel, every post made by the other user is a mention
otherId := channel.GetOtherUserIdForDM(user.Id)
for _, p := range posts {
if p.UserId == otherId {
count++
}
}
return int64(count), nil
}
var team *model.Team
if teamID != "" {
team, err = a.GetTeam(teamID)
if err != nil {
return 0, err
}
}
groups, nErr := a.getGroupsAllowedForReferenceInChannel(channel, team)
if nErr != nil {
return 0, model.NewAppError("countThreadMentions", "app.channel.count_posts_since.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
keywords.AddGroupsMap(groups)
for _, p := range posts {
if p.CreateAt >= timestamp {
mentions := getExplicitMentions(p, keywords)
if _, ok := mentions.Mentions[user.Id]; ok {
count += 1
}
}
}
return int64(count), nil
}
// countMentionsFromPost returns the number of posts in the post's channel that mention the user after and including the
// given post.
func (a *App) countMentionsFromPost(rctx request.CTX, user *model.User, post *model.Post) (int, int, int, *model.AppError) {
channel, appErr := a.GetChannel(rctx, post.ChannelId)
if appErr != nil {
return 0, 0, 0, appErr
}
if channel.Type == model.ChannelTypeDirect || channel.Type == model.ChannelTypeGroup {
// In a DM channel, every post made by the other user is a mention
count, countRoot, nErr := a.Srv().Store().Channel().CountPostsAfter(post.ChannelId, post.CreateAt-1, user.Id)
if nErr != nil {
return 0, 0, 0, model.NewAppError("countMentionsFromPost", "app.channel.count_posts_since.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
var urgentCount int
if a.IsPostPriorityEnabled() {
urgentCount, nErr = a.Srv().Store().Channel().CountUrgentPostsAfter(post.ChannelId, post.CreateAt-1, user.Id)
if nErr != nil {
return 0, 0, 0, model.NewAppError("countMentionsFromPost", "app.channel.count_urgent_posts_since.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
}
return count, countRoot, urgentCount, nil
}
members, err := a.Srv().Store().Channel().GetAllChannelMembersNotifyPropsForChannel(channel.Id, true)
if err != nil {
return 0, 0, 0, model.NewAppError("countMentionsFromPost", "app.channel.count_posts_since.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
keywords := MentionKeywords{}
keywords.AddUser(
user,
members[user.Id],
&model.Status{Status: model.StatusOnline}, // Assume the user is online since they would've triggered this
true, // Assume channel mentions are always allowed for simplicity
)
commentMentions := user.NotifyProps[model.CommentsNotifyProp]
checkForCommentMentions := commentMentions == model.CommentsNotifyRoot || commentMentions == model.CommentsNotifyAny
// A mapping of thread root IDs to whether or not a post in that thread mentions the user
mentionedByThread := make(map[string]bool)
thread, appErr := a.GetPostThread(rctx, post.Id, model.GetPostsOptions{}, user.Id)
if appErr != nil {
return 0, 0, 0, appErr
}
count := 0
countRoot := 0
urgentCount := 0
if isPostMention(user, post, keywords, thread.Posts, mentionedByThread, checkForCommentMentions) {
count += 1
if post.RootId == "" {
countRoot += 1
if a.IsPostPriorityEnabled() {
priority, err := a.GetPriorityForPost(post.Id)
if err != nil {
return 0, 0, 0, err
}
if priority != nil && *priority.Priority == model.PostPriorityUrgent {
urgentCount += 1
}
}
}
}
page := 0
perPage := 200
for {
postList, err := a.GetPostsAfterPost(rctx, model.GetPostsOptions{
ChannelId: post.ChannelId,
PostId: post.Id,
Page: page,
PerPage: perPage,
UserId: rctx.Session().UserId,
})
if err != nil {
return 0, 0, 0, err
}
mentionPostIds := make([]string, 0)
for _, postID := range postList.Order {
if isPostMention(user, postList.Posts[postID], keywords, postList.Posts, mentionedByThread, checkForCommentMentions) {
count += 1
if postList.Posts[postID].RootId == "" {
mentionPostIds = append(mentionPostIds, postID)
countRoot += 1
}
}
}
if a.IsPostPriorityEnabled() {
priorityList, nErr := a.Srv().Store().PostPriority().GetForPosts(mentionPostIds)
if nErr != nil {
return 0, 0, 0, model.NewAppError("countMentionsFromPost", "app.channel.get_priority_for_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(nErr)
}
for _, priority := range priorityList {
if *priority.Priority == model.PostPriorityUrgent {
urgentCount += 1
}
}
}
if len(postList.Order) < perPage {
break
}
page += 1
}
return count, countRoot, urgentCount, nil
}
func isCommentMention(user *model.User, post *model.Post, otherPosts map[string]*model.Post, mentionedByThread map[string]bool) bool {
if post.RootId == "" {
// Not a comment
return false
}
if mentioned, ok := mentionedByThread[post.RootId]; ok {
// We've already figured out if the user was mentioned by this thread
return mentioned
}
if _, ok := otherPosts[post.RootId]; !ok {
mlog.Warn("Can't determine the comment mentions as the rootPost is past the cloud plan's limit", mlog.String("rootPostID", post.RootId), mlog.String("commentID", post.Id))
return false
}
// Whether or not the user was mentioned because they started the thread
mentioned := otherPosts[post.RootId].UserId == user.Id
// Or because they commented on it before this post
if !mentioned && user.NotifyProps[model.CommentsNotifyProp] == model.CommentsNotifyAny {
for _, otherPost := range otherPosts {
if otherPost.Id == post.Id {
continue
}
if otherPost.RootId != post.RootId {
continue
}
if otherPost.UserId == user.Id && otherPost.CreateAt < post.CreateAt {
// Found a comment made by the user from before this post
mentioned = true
break
}
}
}
mentionedByThread[post.RootId] = mentioned
return mentioned
}
func isPostMention(user *model.User, post *model.Post, keywords MentionKeywords, otherPosts map[string]*model.Post, mentionedByThread map[string]bool, checkForCommentMentions bool) bool {
// Prevent the user from mentioning themselves
if post.UserId == user.Id && post.GetProp(model.PostPropsFromWebhook) != "true" {
return false
}
// Check for keyword mentions
mentions := getExplicitMentions(post, keywords)
if _, ok := mentions.Mentions[user.Id]; ok {
return true
}
// Check for mentions caused by being added to the channel
if post.Type == model.PostTypeAddToChannel {
if addedUserId, ok := post.GetProp(model.PostPropsAddedUserId).(string); ok && addedUserId == user.Id {
return true
}
}
// Check for comment mentions
if checkForCommentMentions && isCommentMention(user, post, otherPosts, mentionedByThread) {
return true
}
return false
}
func (a *App) GetThreadMembershipsForUser(userID, teamID string) ([]*model.ThreadMembership, error) {
return a.Srv().Store().Thread().GetMembershipsForUser(userID, teamID)
}
func (a *App) GetPostIfAuthorized(rctx request.CTX, postID string, session *model.Session, includeDeleted bool) (*model.Post, *model.AppError, bool) {
post, err := a.GetSinglePost(rctx, postID, includeDeleted)
if err != nil {
return nil, err, false
}
channel, err := a.GetChannel(rctx, post.ChannelId)
if err != nil {
return nil, err, false
}
ok, isMember := a.SessionHasPermissionToReadChannel(rctx, *session, channel)
if !ok {
if channel.Type == model.ChannelTypeOpen && !*a.Config().ComplianceSettings.Enable {
if !a.SessionHasPermissionToTeam(*session, channel.TeamId, model.PermissionReadPublicChannel) {
return nil, model.MakePermissionError(session, []*model.Permission{model.PermissionReadPublicChannel}), false
}
} else {
return nil, model.MakePermissionError(session, []*model.Permission{model.PermissionReadChannelContent}), false
}
}
return post, nil, isMember
}
// GetPostsByIds response bool value indicates, if the post is inaccessible due to cloud plan's limit.
func (a *App) GetPostsByIds(postIDs []string) ([]*model.Post, int64, *model.AppError) {
posts, err := a.Srv().Store().Post().GetPostsByIds(postIDs)
if err != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
return nil, 0, model.NewAppError("GetPostsByIds", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(err)
default:
return nil, 0, model.NewAppError("GetPostsByIds", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
posts, firstInaccessiblePostTime, appErr := a.getFilteredAccessiblePosts(posts, filterPostOptions{assumeSortedCreatedAt: true})
if appErr != nil {
return nil, 0, appErr
}
return posts, firstInaccessiblePostTime, nil
}
func (a *App) GetEditHistoryForPost(postID string) ([]*model.Post, *model.AppError) {
posts, err := a.Srv().Store().Post().GetEditHistoryForPost(postID)
if err != nil {
var nfErr *store.ErrNotFound
switch {
case errors.As(err, &nfErr):
return nil, model.NewAppError("GetEditHistoryForPost", "app.post.get.app_error", nil, "", http.StatusNotFound).Wrap(err)
default:
return nil, model.NewAppError("GetEditHistoryForPost", "app.post.get.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
}
if appErr := a.populateEditHistoryFileMetadata(posts); appErr != nil {
return nil, appErr
}
return posts, nil
}
func (a *App) populateEditHistoryFileMetadata(editHistoryPosts []*model.Post) *model.AppError {
for _, post := range editHistoryPosts {
fileInfos, err := a.Srv().Store().FileInfo().GetByIds(post.FileIds, true, true)
if err != nil {
return model.NewAppError("app.populateEditHistoryFileMetadata", "app.file_info.get_by_ids.app_error", map[string]any{"post_id": post.Id}, "", http.StatusInternalServerError).Wrap(err)
}
if post.Metadata == nil {
post.Metadata = &model.PostMetadata{}
}
post.Metadata.Files = fileInfos
}
return nil
}
func (a *App) SetPostReminder(rctx request.CTX, postID, userID string, targetTime int64) *model.AppError {
// Store the reminder in the DB
reminder := &model.PostReminder{
PostId: postID,
UserId: userID,
TargetTime: targetTime,
}
err := a.Srv().Store().Post().SetPostReminder(reminder)
if err != nil {
return model.NewAppError("SetPostReminder", model.NoTranslation, nil, "", http.StatusInternalServerError).Wrap(err)
}
metadata, err := a.Srv().Store().Post().GetPostReminderMetadata(postID)
if err != nil {
return model.NewAppError("SetPostReminder", model.NoTranslation, nil, "", http.StatusInternalServerError).Wrap(err)
}
parsedTime := time.Unix(targetTime, 0).UTC().Format(time.RFC822)
siteURL := *a.Config().ServiceSettings.SiteURL
var permalink string
if metadata.TeamName == "" {
permalink = fmt.Sprintf("%s/pl/%s", siteURL, postID)
} else {
permalink = fmt.Sprintf("%s/%s/pl/%s", siteURL, metadata.TeamName, postID)
}
// Send an ack message.
ephemeralPost := &model.Post{
Type: model.PostTypeEphemeral,
Id: model.NewId(),
CreateAt: model.GetMillis(),
UserId: userID,
RootId: postID,
ChannelId: metadata.ChannelID,
// It's okay to keep this non-translated. This is just a fallback.
// The webapp will parse the timestamp and show that in user's local timezone.
Message: fmt.Sprintf("You will be reminded about %s by @%s at %s", permalink, metadata.Username, parsedTime),
Props: model.StringInterface{
"target_time": targetTime,
"team_name": metadata.TeamName,
"post_id": postID,
"username": metadata.Username,
"type": model.PostTypeReminder,
},
}
message := model.NewWebSocketEvent(model.WebsocketEventEphemeralMessage, "", ephemeralPost.ChannelId, userID, nil, "")
ephemeralPost = a.PreparePostForClientWithEmbedsAndImages(rctx, ephemeralPost, &model.PreparePostForClientOpts{IsNewPost: true, IncludePriority: true})
ephemeralPost = model.AddPostActionCookies(ephemeralPost, a.PostActionCookieSecret())
postJSON, jsonErr := ephemeralPost.ToJSON()
if jsonErr != nil {
rctx.Logger().Warn("Failed to encode post to JSON", mlog.Err(jsonErr))
}
message.Add("post", postJSON)
a.Publish(message)
return nil
}
func (a *App) CheckPostReminders(rctx request.CTX) {
rctx = rctx.WithLogFields(mlog.String("component", "post_reminders"))
systemBot, appErr := a.GetSystemBot(rctx)
if appErr != nil {
rctx.Logger().Error("Failed to get system bot", mlog.Err(appErr))
return
}
// This will return the reminders and also delete them from the DB.
// In case, any of the next steps fail, those reminders would be lost.
// Alternatively, if we delete those reminders _after_ it has been sent,
// then in case of any temporary failure, they would get sent in the next batch.
// MM-45595.
reminders, err := a.Srv().Store().Post().GetPostReminders(time.Now().UTC().Unix())
if err != nil {
rctx.Logger().Error("Failed to get post reminders", mlog.Err(err))
return
}
// We group multiple reminders for a single user.
groupedReminders := make(map[string][]string)
for _, r := range reminders {
if groupedReminders[r.UserId] == nil {
groupedReminders[r.UserId] = []string{r.PostId}
} else {
groupedReminders[r.UserId] = append(groupedReminders[r.UserId], r.PostId)
}
}
siteURL := *a.Config().ServiceSettings.SiteURL
for userID, postIDs := range groupedReminders {
ch, appErr := a.GetOrCreateDirectChannel(request.EmptyContext(a.Log()), userID, systemBot.UserId)
if appErr != nil {
rctx.Logger().Error("Failed to get direct channel", mlog.Err(appErr))
return
}
for _, postID := range postIDs {
metadata, err := a.Srv().Store().Post().GetPostReminderMetadata(postID)
if err != nil {
rctx.Logger().Error("Failed to get post reminder metadata", mlog.Err(err), mlog.String("post_id", postID))
continue
}
T := i18n.GetUserTranslations(metadata.UserLocale)
dm := &model.Post{
ChannelId: ch.Id,
Message: T("app.post_reminder_dm", model.StringInterface{
"SiteURL": siteURL,
"TeamName": metadata.TeamName,
"PostId": postID,
"Username": metadata.Username,
}),
Type: model.PostTypeReminder,
UserId: systemBot.UserId,
Props: model.StringInterface{
"team_name": metadata.TeamName,
"post_id": postID,
"username": metadata.Username,
},
}
if _, _, err := a.CreatePost(request.EmptyContext(a.Log()), dm, ch, model.CreatePostFlags{SetOnline: true}); err != nil {
rctx.Logger().Error("Failed to post reminder message", mlog.Err(err))
}
}
}
}
func (a *App) GetPostInfo(rctx request.CTX, postID string, channel *model.Channel, team *model.Team, userID string, hasJoinedChannel bool) (*model.PostInfo, *model.AppError) {
info := model.PostInfo{
ChannelId: channel.Id,
ChannelType: channel.Type,
ChannelDisplayName: channel.DisplayName,
HasJoinedChannel: hasJoinedChannel,
}
if team != nil {
teamMember, teamMemberErr := a.GetTeamMember(rctx, team.Id, userID)
teamType := model.TeamInvite
if team.AllowOpenInvite {
teamType = model.TeamOpen
}
info.TeamId = team.Id
info.TeamType = teamType
info.TeamDisplayName = team.DisplayName
info.HasJoinedTeam = teamMemberErr == nil && teamMember.DeleteAt == 0
}
return &info, nil
}
func (a *App) applyPostsWillBeConsumedHook(posts map[string]*model.Post) {
if !a.Config().FeatureFlags.ConsumePostHook {
return
}
postsSlice := make([]*model.Post, 0, len(posts))
for _, post := range posts {
postsSlice = append(postsSlice, post.ForPlugin())
}
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
postReplacements := hooks.MessagesWillBeConsumed(postsSlice)
for _, postReplacement := range postReplacements {
posts[postReplacement.Id] = postReplacement
}
return true
}, plugin.MessagesWillBeConsumedID)
}
func (a *App) applyPostWillBeConsumedHook(post **model.Post) {
if !a.Config().FeatureFlags.ConsumePostHook || (*post).Type == model.PostTypeBurnOnRead {
return
}
ps := []*model.Post{*post}
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
rp := hooks.MessagesWillBeConsumed(ps)
if len(rp) > 0 {
(*post) = rp[0]
}
return true
}, plugin.MessagesWillBeConsumedID)
}
func makePostLink(siteURL, teamName, postID string) string {
return fmt.Sprintf("%s/%s/pl/%s", siteURL, teamName, postID)
}
// validateMoveOrCopy performs validation on a provided post list to determine
// if all permissions are in place to allow the for the posts to be moved or
// copied.
func (a *App) ValidateMoveOrCopy(rctx request.CTX, wpl *model.WranglerPostList, originalChannel *model.Channel, targetChannel *model.Channel, user *model.User) error {
if wpl.NumPosts() == 0 {
return errors.New("The wrangler post list contains no posts")
}
config := a.Config().WranglerSettings
switch originalChannel.Type {
case model.ChannelTypePrivate:
if !*config.MoveThreadFromPrivateChannelEnable {
return errors.New("Wrangler is currently configured to not allow moving posts from private channels")
}
case model.ChannelTypeDirect:
if !*config.MoveThreadFromDirectMessageChannelEnable {
return errors.New("Wrangler is currently configured to not allow moving posts from direct message channels")
}
case model.ChannelTypeGroup:
if !*config.MoveThreadFromGroupMessageChannelEnable {
return errors.New("Wrangler is currently configured to not allow moving posts from group message channels")
}
}
if !originalChannel.IsGroupOrDirect() && !targetChannel.IsGroupOrDirect() {
// DM and GM channels are "teamless" so it doesn't make sense to check
// the MoveThreadToAnotherTeamEnable config when dealing with those.
if !*config.MoveThreadToAnotherTeamEnable && targetChannel.TeamId != originalChannel.TeamId {
return errors.New("Wrangler is currently configured to not allow moving messages to different teams")
}
}
if *config.MoveThreadMaxCount != int64(0) && *config.MoveThreadMaxCount < int64(wpl.NumPosts()) {
return fmt.Errorf("the thread is %d posts long, but this command is configured to only move threads of up to %d posts", wpl.NumPosts(), *config.MoveThreadMaxCount)
}
_, appErr := a.GetChannelMember(rctx, targetChannel.Id, user.Id)
if appErr != nil {
return fmt.Errorf("channel with ID %s doesn't exist or you are not a member", targetChannel.Id)
}
_, appErr = a.GetChannelMember(rctx, originalChannel.Id, user.Id)
if appErr != nil {
return fmt.Errorf("channel with ID %s doesn't exist or you are not a member", originalChannel.Id)
}
return nil
}
func (a *App) CopyWranglerPostlist(rctx request.CTX, wpl *model.WranglerPostList, targetChannel *model.Channel) (*model.Post, bool, *model.AppError) {
var appErr *model.AppError
var newRootPost *model.Post
if wpl.ContainsFileAttachments() {
// The thread contains at least one attachment. To properly move the
// thread, the files will have to be re-uploaded. This is completed
// before any messages are moved.
// TODO: check number of files that need to be re-uploaded or file size?
rctx.Logger().Info("Wrangler is re-uploading file attachments",
mlog.String("file_count", fmt.Sprintf("%d", wpl.FileAttachmentCount)),
)
for _, post := range wpl.Posts {
var newFileIDs []string
var fileBytes []byte
var oldFileInfo, newFileInfo *model.FileInfo
for _, fileID := range post.FileIds {
oldFileInfo, appErr = a.GetFileInfo(rctx, fileID)
if appErr != nil {
return nil, false, appErr
}
fileBytes, appErr = a.GetFile(rctx, fileID)
if appErr != nil {
return nil, false, appErr
}
newFileInfo, appErr = a.UploadFile(rctx, fileBytes, targetChannel.Id, oldFileInfo.Name)
if appErr != nil {
return nil, false, appErr
}
newFileIDs = append(newFileIDs, newFileInfo.Id)
}
post.FileIds = newFileIDs
}
}
var isMemberForPreviews bool
for i, post := range wpl.Posts {
var reactions []*model.Reaction
// Store reactions to be reapplied later.
reactions, appErr = a.GetReactionsForPost(post.Id)
if appErr != nil {
// Reaction-based errors are logged, but do not abort
rctx.Logger().Error("Failed to get reactions on original post")
}
newPost := post.Clone()
newPost = newPost.CleanPost()
newPost.ChannelId = targetChannel.Id
if i == 0 {
newPost, isMemberForPreviews, appErr = a.CreatePost(rctx, newPost, targetChannel, model.CreatePostFlags{})
if appErr != nil {
return nil, false, appErr
}
newRootPost = newPost.Clone()
} else {
newPost.RootId = newRootPost.Id
newPost, _, appErr = a.CreatePost(rctx, newPost, targetChannel, model.CreatePostFlags{})
if appErr != nil {
return nil, false, appErr
}
}
for _, reaction := range reactions {
reaction.PostId = newPost.Id
_, appErr = a.SaveReactionForPost(rctx, reaction)
if appErr != nil {
// Reaction-based errors are logged, but do not abort
rctx.Logger().Error("Failed to reapply reactions to post")
}
}
}
return newRootPost, isMemberForPreviews, nil
}
func (a *App) MoveThread(rctx request.CTX, postID string, sourceChannelID, channelID string, user *model.User) *model.AppError {
postListResponse, appErr := a.GetPostThread(rctx, postID, model.GetPostsOptions{}, user.Id)
if appErr != nil {
return model.NewAppError("getPostThread", "app.post.move_thread_command.error", nil, "postID="+postID+", "+"UserId="+user.Id+"", http.StatusBadRequest).Wrap(appErr)
}
wpl := postListResponse.BuildWranglerPostList()
originalChannel, appErr := a.GetChannel(rctx, sourceChannelID)
if appErr != nil {
return appErr
}
targetChannel, appErr := a.GetChannel(rctx, channelID)
if appErr != nil {
return appErr
}
err := a.ValidateMoveOrCopy(rctx, wpl, originalChannel, targetChannel, user)
if err != nil {
return model.NewAppError("validateMoveOrCopy", "app.post.move_thread_command.error", nil, "", http.StatusBadRequest).Wrap(err)
}
var targetTeam *model.Team
if targetChannel.IsGroupOrDirect() {
if !originalChannel.IsGroupOrDirect() {
targetTeam, appErr = a.GetTeam(originalChannel.TeamId)
}
} else {
targetTeam, appErr = a.GetTeam(targetChannel.TeamId)
}
if appErr != nil {
return appErr
}
if targetTeam == nil {
return model.NewAppError("validateMoveOrCopy", "app.post.move_thread_command.error", nil, "target team is nil", http.StatusBadRequest)
}
// Begin creating the new thread.
rctx.Logger().Info("Wrangler is moving a thread", mlog.String("user_id", user.Id), mlog.String("original_post_id", wpl.RootPost().Id), mlog.String("original_channel_id", originalChannel.Id))
// To simulate the move, we first copy the original messages(s) to the
// new channel and later delete the original messages(s).
newRootPost, _, appErr := a.CopyWranglerPostlist(rctx, wpl, targetChannel)
if appErr != nil {
return appErr
}
T, err := i18n.GetTranslationsBySystemLocale()
if err != nil {
return model.NewAppError("MoveThread", "app.post.move_thread_command.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
ephemeralPostProps := model.StringInterface{
"TranslationID": "app.post.move_thread.from_another_channel",
}
_, _, appErr = a.CreatePost(rctx, &model.Post{
UserId: user.Id,
Type: model.PostTypeWrangler,
RootId: newRootPost.Id,
ChannelId: channelID,
Message: T("app.post.move_thread.from_another_channel"),
Props: ephemeralPostProps,
}, targetChannel, model.CreatePostFlags{})
if appErr != nil {
return appErr
}
// Cleanup is handled by simply deleting the root post. Any comments/replies
// are automatically marked as deleted for us.
_, appErr = a.DeletePost(rctx, wpl.RootPost().Id, user.Id)
if appErr != nil {
return appErr
}
rctx.Logger().Info("Wrangler thread move complete", mlog.String("user_id", user.Id), mlog.String("new_post_id", newRootPost.Id), mlog.String("channel_id", channelID))
// Translate to the system locale, webapp will attempt to render in each user's specific locale (based on the TranslationID prop) before falling back on the initiating user's locale
ephemeralPostProps = model.StringInterface{}
msg := T("app.post.move_thread_command.direct_or_group.multiple_messages", model.StringInterface{"NumMessages": wpl.NumPosts()})
ephemeralPostProps["TranslationID"] = "app.post.move_thread_command.direct_or_group.multiple_messages"
if wpl.NumPosts() == 1 {
msg = T("app.post.move_thread_command.direct_or_group.one_message")
ephemeralPostProps["TranslationID"] = "app.post.move_thread_command.direct_or_group.one_message"
}
if targetChannel.TeamId != "" {
targetTeam, teamErr := a.GetTeam(targetChannel.TeamId)
if teamErr != nil {
return teamErr
}
targetName := targetTeam.Name
newPostLink := makePostLink(*a.Config().ServiceSettings.SiteURL, targetName, newRootPost.Id)
msg = T("app.post.move_thread_command.channel.multiple_messages", model.StringInterface{"NumMessages": wpl.NumPosts(), "Link": newPostLink})
ephemeralPostProps["TranslationID"] = "app.post.move_thread_command.channel.multiple_messages"
if wpl.NumPosts() == 1 {
msg = T("app.post.move_thread_command.channel.one_message", model.StringInterface{"Link": newPostLink})
ephemeralPostProps["TranslationID"] = "app.post.move_thread_command.channel.one_message"
}
ephemeralPostProps["MovedThreadPermalink"] = newPostLink
}
ephemeralPostProps["NumMessages"] = wpl.NumPosts()
_, _, appErr = a.CreatePost(rctx, &model.Post{
UserId: user.Id,
Type: model.PostTypeWrangler,
ChannelId: originalChannel.Id,
Message: msg,
Props: ephemeralPostProps,
}, originalChannel, model.CreatePostFlags{})
if appErr != nil {
return appErr
}
rctx.Logger().Info(msg)
return nil
}
func (a *App) PermanentDeletePost(rctx request.CTX, postID, deleteByID string) *model.AppError {
post, err := a.Srv().Store().Post().GetSingle(sqlstore.RequestContextWithMaster(rctx), postID, true)
if err != nil {
return model.NewAppError("DeletePost", "app.post.get.app_error", nil, "", http.StatusBadRequest).Wrap(err)
}
postHasFiles := len(post.FileIds) > 0
// If the post is a burn-on-read post, we should get the original post contents
if post.Type == model.PostTypeBurnOnRead {
revealedPost, appErr := a.getBurnOnReadPost(rctx, post)
if appErr != nil {
rctx.Logger().Warn("Failed to get burn-on-read post", mlog.Err(appErr))
}
if revealedPost != nil {
postHasFiles = len(revealedPost.FileIds) > 0
}
}
if postHasFiles {
appErr := a.PermanentDeleteFilesByPost(rctx, post.Id)
if appErr != nil {
return appErr
}
}
err = a.Srv().Store().Post().PermanentDelete(rctx, post.Id)
if err != nil {
return model.NewAppError("PermanentDeletePost", "app.post.permanent_delete_post.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
appErr := a.CleanUpAfterPostDeletion(rctx, post, deleteByID)
if appErr != nil {
return appErr
}
return nil
}
func (a *App) CleanUpAfterPostDeletion(rctx request.CTX, post *model.Post, deleteByID string) *model.AppError {
channel, appErr := a.GetChannel(rctx, post.ChannelId)
if appErr != nil {
return appErr
}
if post.RootId == "" {
if appErr := a.DeletePersistentNotification(rctx, post); appErr != nil {
return appErr
}
}
postJSON, err := json.Marshal(post)
if err != nil {
return model.NewAppError("DeletePost", "api.marshal_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
userMessage := model.NewWebSocketEvent(model.WebsocketEventPostDeleted, "", post.ChannelId, "", nil, "")
userMessage.Add("post", string(postJSON))
userMessage.GetBroadcast().ContainsSanitizedData = true
a.Publish(userMessage)
adminMessage := model.NewWebSocketEvent(model.WebsocketEventPostDeleted, "", post.ChannelId, "", nil, "")
adminMessage.Add("post", string(postJSON))
adminMessage.Add("delete_by", deleteByID)
adminMessage.GetBroadcast().ContainsSensitiveData = true
a.Publish(adminMessage)
a.Srv().Go(func() {
a.deleteFlaggedPosts(rctx, post.Id)
})
pluginPost := post.ForPlugin()
pluginContext := pluginContext(rctx)
a.Srv().Go(func() {
a.ch.RunMultiHook(func(hooks plugin.Hooks, _ *model.Manifest) bool {
hooks.MessageHasBeenDeleted(pluginContext, pluginPost)
return true
}, plugin.MessageHasBeenDeletedID)
})
a.Srv().Go(func() {
if err = a.RemoveNotifications(rctx, post, channel); err != nil {
rctx.Logger().Error("DeletePost failed to delete notification", mlog.Err(err))
}
})
// delete drafts associated with the post when deleting the post
a.Srv().Go(func() {
a.deleteDraftsAssociatedWithPost(rctx, channel, post)
})
a.invalidateCacheForChannelPosts(post.ChannelId)
if post.Type == model.PostTypeBurnOnRead {
a.invalidateCacheForReadReceipts(post.Id)
a.invalidateCacheForTemporaryPost(post.Id)
}
return nil
}
func (a *App) SendTestMessage(rctx request.CTX, userID string) (*model.Post, *model.AppError) {
bot, err := a.GetSystemBot(rctx)
if err != nil {
return nil, model.NewAppError("SendTestMessage", "app.notifications.send_test_message.errors.no_bot", nil, "", http.StatusInternalServerError).Wrap(err)
}
channel, err := a.GetOrCreateDirectChannel(rctx, userID, bot.UserId)
if err != nil {
return nil, model.NewAppError("SendTestMessage", "app.notifications.send_test_message.errors.no_channel", nil, "", http.StatusInternalServerError).Wrap(err)
}
user, err := a.GetUser(userID)
if err != nil {
return nil, model.NewAppError("SendTestMessage", "app.notifications.send_test_message.errors.no_user", nil, "", http.StatusInternalServerError).Wrap(err)
}
T := i18n.GetUserTranslations(user.Locale)
post := &model.Post{
ChannelId: channel.Id,
Message: T("app.notifications.send_test_message.message_body"),
Type: model.PostTypeDefault,
UserId: bot.UserId,
}
// We don't check the preview membership because the test message does not send a link to a different post.
post, _, err = a.CreatePost(rctx, post, channel, model.CreatePostFlags{ForceNotification: true})
if err != nil {
return nil, model.NewAppError("SendTestMessage", "app.notifications.send_test_message.errors.create_post", nil, "", http.StatusInternalServerError).Wrap(err)
}
return post, nil
}
// RewriteMessage rewrites a message using AI based on the specified action
func (a *App) RewriteMessage(
rctx request.CTX,
agentID string,
message string,
action model.RewriteAction,
customPrompt string,
rootID string,
) (*model.RewriteResponse, *model.AppError) {
// Build thread context if rootID is provided
var threadContext string
if rootID != "" {
context, appErr := a.buildThreadContextForRewrite(rctx, rootID)
if appErr != nil {
// Log error but continue without context rather than failing the rewrite
rctx.Logger().Warn("Failed to build thread context for rewrite", mlog.String("root_id", rootID), mlog.Err(appErr))
} else {
threadContext = context
}
}
userPrompt := getRewritePromptForAction(action, message, customPrompt, threadContext)
if userPrompt == "" {
return nil, model.NewAppError("RewriteMessage", "app.post.rewrite.invalid_action", nil, fmt.Sprintf("invalid action: %s", action), 400)
}
userLocale := ""
if session := rctx.Session(); session != nil && session.UserId != "" {
user, appErr := a.GetUser(session.UserId)
if appErr == nil {
userLocale = user.Locale
} else {
rctx.Logger().Warn("Failed to get user for rewrite locale", mlog.Err(appErr), mlog.String("user_id", session.UserId))
}
}
systemPrompt := buildRewriteSystemPrompt(userLocale)
// Prepare completion request in the format expected by the client
client := a.GetBridgeClient(rctx.Session().UserId)
completionRequest := agentclient.CompletionRequest{
Posts: []agentclient.Post{
{Role: "system", Message: systemPrompt},
{Role: "user", Message: userPrompt},
},
}
completion, err := client.AgentCompletion(agentID, completionRequest)
if err != nil {
return nil, model.NewAppError("RewriteMessage", "app.post.rewrite.agent_call_failed", nil, err.Error(), 500)
}
var response model.RewriteResponse
if err := json.Unmarshal([]byte(completion), &response); err != nil {
return nil, model.NewAppError("RewriteMessage", "app.post.rewrite.parse_response_failed", nil, err.Error(), 500)
}
if response.RewrittenText == "" {
return nil, model.NewAppError("RewriteMessage", "app.post.rewrite.empty_response", nil, "", 500)
}
return &response, nil
}
// buildThreadContextForRewrite builds context from root post + last 10 posts in the thread
func (a *App) buildThreadContextForRewrite(rctx request.CTX, rootID string) (string, *model.AppError) {
const maxContextPosts = 10
// Get the thread posts
postList, appErr := a.GetPostThread(rctx, rootID, model.GetPostsOptions{}, rctx.Session().UserId)
if appErr != nil {
return "", appErr
}
if postList == nil || len(postList.Posts) == 0 {
return "", nil
}
// Get root post
rootPost, ok := postList.Posts[rootID]
if !ok {
return "", nil
}
// Skip if root post is a system post or deleted
if strings.HasPrefix(rootPost.Type, model.PostSystemMessagePrefix) || rootPost.DeleteAt > 0 {
return "", nil
}
// Collect reply posts, filtering out system posts and deleted posts
var replies []*model.Post
for _, postID := range postList.Order {
if postID == rootID {
continue // Skip root post
}
post, ok := postList.Posts[postID]
if !ok {
continue
}
// Skip system posts
if strings.HasPrefix(post.Type, model.PostSystemMessagePrefix) {
continue
}
// Skip deleted posts
if post.DeleteAt > 0 {
continue
}
replies = append(replies, post)
}
// Get last maxContextPosts replies
var contextReplies []*model.Post
startIdx := 0
if len(replies) > maxContextPosts {
startIdx = len(replies) - maxContextPosts
}
contextReplies = replies[startIdx:]
// Get user profiles for all posts in context
userIDs := []string{rootPost.UserId}
for _, reply := range contextReplies {
userIDs = append(userIDs, reply.UserId)
}
slices.Sort(userIDs)
userIDs = slices.Compact(userIDs)
users, appErr := a.GetUsersByIds(rctx, userIDs, &store.UserGetByIdsOpts{})
if appErr != nil {
return "", appErr
}
userMap := make(map[string]string, len(users))
for _, user := range users {
userMap[user.Id] = user.Username
}
// Build context string
var contextBuilder strings.Builder
contextBuilder.WriteString("Thread context:\n")
rootUsername := userMap[rootPost.UserId]
if rootUsername == "" {
rootUsername = "Unknown"
}
contextBuilder.WriteString(fmt.Sprintf("Root post (%s): %s\n", rootUsername, rootPost.Message))
if len(contextReplies) > 0 {
contextBuilder.WriteString("\nRecent replies:\n")
for _, reply := range contextReplies {
username := userMap[reply.UserId]
if username == "" {
username = "Unknown"
}
contextBuilder.WriteString(fmt.Sprintf("- %s: %s\n", username, reply.Message))
}
}
return contextBuilder.String(), nil
}
// getRewritePromptForAction returns the appropriate prompt and system prompt for the given rewrite action
func getRewritePromptForAction(action model.RewriteAction, message string, customPrompt string, threadContext string) string {
var actionPrompt string
if message == "" {
actionPrompt = fmt.Sprintf(`Write according to these instructions: %s`, customPrompt)
} else {
switch action {
case model.RewriteActionCustom:
actionPrompt = fmt.Sprintf(`%s
%s`, customPrompt, message)
case model.RewriteActionShorten:
actionPrompt = fmt.Sprintf(`Make this up to 2 to 3 times shorter: %s`, message)
case model.RewriteActionElaborate:
actionPrompt = fmt.Sprintf(`Make this up to 2 to 3 times longer, using Markdown if necessary: %s`, message)
case model.RewriteActionImproveWriting:
actionPrompt = fmt.Sprintf(`Improve this writing, using Markdown if necessary: %s`, message)
case model.RewriteActionFixSpelling:
actionPrompt = fmt.Sprintf(`Fix spelling and grammar: %s`, message)
case model.RewriteActionSimplify:
actionPrompt = fmt.Sprintf(`Simplify this: %s`, message)
case model.RewriteActionSummarize:
actionPrompt = fmt.Sprintf(`Summarize this, using Markdown if necessary: %s`, message)
default:
// Invalid action - return empty string to trigger validation error
return ""
}
}
// If no action prompt was generated, return empty string
if actionPrompt == "" {
return ""
}
// Build final prompt with thread context if available
if threadContext != "" {
var promptBuilder strings.Builder
promptBuilder.WriteString("=== THREAD CONTEXT (for reference only) ===\n")
promptBuilder.WriteString(threadContext)
promptBuilder.WriteString("\n\n=== REWRITE TASK ===\n")
promptBuilder.WriteString(actionPrompt)
promptBuilder.WriteString("\n\nRewrite the message considering the thread context above.")
return promptBuilder.String()
}
return actionPrompt
}
func buildRewriteSystemPrompt(userLocale string) string {
locale := strings.TrimSpace(userLocale)
if locale == "" {
return model.RewriteSystemPrompt
}
return fmt.Sprintf(`%s
User locale: %s. Preserve locale-specific spelling, grammar, and formatting. Keep locale identifiers (like %s) unchanged. Do not translate between locales.`, model.RewriteSystemPrompt, locale, locale)
}
// RevealPost reveals a burn-on-read post for a specific user, creating a read receipt
// if this is the first time the user is revealing it. Returns the revealed post content
// with expiration metadata.
func (a *App) RevealPost(rctx request.CTX, post *model.Post, userID string, connectionID string) (*model.Post, *model.AppError) {
// Validate that this is a burn-on-read post
if err := a.validateBurnOnReadPost(rctx, post); err != nil {
return nil, err
}
// Extract and validate post expiration time
postExpireAt, err := a.extractPostExpiration(post)
if err != nil {
return nil, err
}
// Ensure post hasn't expired yet
currentTime := model.GetMillis()
if err = a.validatePostNotExpired(post.Id, postExpireAt, currentTime); err != nil {
return nil, err
}
// Get or create read receipt for this user
receipt, isFirstReveal, err := a.getOrCreateReadReceipt(rctx, post, userID, postExpireAt, currentTime)
if err != nil {
return nil, err
}
// Ensure user's read receipt hasn't expired
if err = a.validateReadReceiptNotExpired(receipt, currentTime); err != nil {
return nil, err
}
// Retrieve the actual post content from temporary storage
revealedPost, err := a.getBurnOnReadPost(rctx, post)
if err != nil {
return nil, err
}
// Attach expiration metadata to the revealed post
a.enrichPostWithExpirationMetadata(revealedPost, receipt.ExpireAt)
// Add all metadata (reactions, emojis, files, embeds, images, priority, etc.)
revealedPost = a.PreparePostForClientWithEmbedsAndImages(rctx, revealedPost, &model.PreparePostForClientOpts{
IncludePriority: true,
RetainContent: true,
})
// Publish websocket event if this is the first time revealing
if isFirstReveal {
// Send to post author for recipient count updates
if err := a.publishPostRevealedEventToAuthor(rctx, revealedPost, userID, connectionID); err != nil {
return nil, err
}
// Send to revealing user for multi-device sync
// Note: API layer already ensures userID != post.UserId (api4/post.go:1483-1486)
if err := a.publishPostRevealedEventToUser(rctx, revealedPost, userID, connectionID); err != nil {
return nil, err
}
}
return revealedPost, nil
}
// validateBurnOnReadPost ensures the post is of type burn-on-read.
func (a *App) validateBurnOnReadPost(rctx request.CTX, post *model.Post) *model.AppError {
if post.Type != model.PostTypeBurnOnRead {
return model.NewAppError("RevealPost", "app.reveal_post.not_burn_on_read.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
if post.UserId == rctx.Session().UserId {
return model.NewAppError("RevealPost", "app.reveal_post.cannot_reveal_own_post.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
return nil
}
// extractPostExpiration extracts the expiration timestamp from post properties.
func (a *App) extractPostExpiration(post *model.Post) (int64, *model.AppError) {
expirationProp := post.GetProp(model.PostPropsExpireAt)
if expirationProp == nil {
return 0, model.NewAppError("RevealPost", "app.reveal_post.missing_expire_at.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
var expireAt int64
switch v := expirationProp.(type) {
case int64:
expireAt = v
case float64:
expireAt = int64(v)
default:
return 0, model.NewAppError("RevealPost", "app.reveal_post.missing_expire_at.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
if expireAt == 0 {
return 0, model.NewAppError("RevealPost", "app.reveal_post.missing_expire_at.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
return expireAt, nil
}
// validatePostNotExpired ensures the post hasn't expired yet.
func (a *App) validatePostNotExpired(postID string, expireAt, currentTime int64) *model.AppError {
if currentTime >= expireAt {
return model.NewAppError("RevealPost", "app.reveal_post.post_expired.app_error", nil, fmt.Sprintf("postId=%s", postID), http.StatusBadRequest)
}
return nil
}
// getOrCreateReadReceipt retrieves an existing read receipt or creates a new one
// for the user. Returns the receipt, whether this is the first reveal, and any error.
func (a *App) getOrCreateReadReceipt(rctx request.CTX, post *model.Post, userID string, postExpireAt int64, currentTime int64) (*model.ReadReceipt, bool, *model.AppError) {
// Try to get existing read receipt
receipt, err := a.Srv().Store().ReadReceipt().Get(rctx, post.Id, userID)
if err != nil && !store.IsErrNotFound(err) {
return nil, false, model.NewAppError("RevealPost", "app.reveal_post.read_receipt.get.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// If receipt exists, this is not the first reveal
if receipt != nil {
return receipt, false, nil
}
// Create new read receipt for first-time reveal
// Use configured burn-on-read duration (defaults to 10 minutes)
burnOnReadDurationSeconds := int64(model.SafeDereference(a.Config().ServiceSettings.BurnOnReadDurationSeconds))
readDurationMillis := burnOnReadDurationSeconds * 1000
userExpireAt := min(postExpireAt, currentTime+readDurationMillis)
receipt = &model.ReadReceipt{
UserID: userID,
PostID: post.Id,
ExpireAt: userExpireAt,
}
if _, err := a.Srv().Store().ReadReceipt().Save(rctx, receipt); err != nil {
return nil, false, model.NewAppError("RevealPost", "app.reveal_post.read_receipt.save.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// If all recipients have read the post, update temporary post expiration
if err := a.updateTemporaryPostIfAllRead(rctx, post, receipt); err != nil {
// Log warning but don't fail the operation
rctx.Logger().Warn("Failed to update temporary post expiration after all recipients read", mlog.String("post_id", post.Id), mlog.Err(err))
}
return receipt, true, nil
}
// updateTemporaryPostIfAllRead updates the temporary post expiration if all recipients
// have read the post. This ensures the post expires when the last reader's receipt expires.
func (a *App) updateTemporaryPostIfAllRead(rctx request.CTX, post *model.Post, receipt *model.ReadReceipt) *model.AppError {
unreadCount, err := a.Srv().Store().ReadReceipt().GetUnreadCountForPost(rctx, post)
if err != nil {
return model.NewAppError("RevealPost", "app.reveal_post.read_receipt.get_unread_count.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// If there are still unread recipients, no update needed
if unreadCount > 0 {
return nil
}
// All recipients have read - update temporary post expiration to match receipt
tmpPost, err := a.Srv().Store().TemporaryPost().Get(rctx, post.Id)
if err != nil {
return model.NewAppError("RevealPost", "app.post.get_post.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
tmpPost.ExpireAt = receipt.ExpireAt
if _, err := a.Srv().Store().TemporaryPost().Save(rctx, tmpPost); err != nil {
return model.NewAppError("RevealPost", "app.post.get_post.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// Send WebSocket event to author that all recipients have revealed
if err := a.publishAllRecipientsRevealedEvent(rctx, post, receipt.ExpireAt); err != nil {
// Log warning but don't fail the operation
rctx.Logger().Warn("Failed to publish all recipients revealed event", mlog.String("post_id", post.Id), mlog.Err(err))
}
return nil
}
// validateReadReceiptNotExpired ensures the user's read receipt hasn't expired.
func (a *App) validateReadReceiptNotExpired(receipt *model.ReadReceipt, currentTime int64) *model.AppError {
if receipt.ExpireAt < currentTime {
return model.NewAppError("RevealPost", "app.reveal_post.read_receipt_expired.error", nil, "", http.StatusForbidden)
}
return nil
}
// publishPostRevealedEventToAuthor publishes a websocket event to the post author
// with updated recipients list for real-time recipient count tracking.
func (a *App) publishPostRevealedEventToAuthor(rctx request.CTX, post *model.Post, revealingUserID string, connectionID string) *model.AppError {
event := model.NewWebSocketEvent(
model.WebsocketEventPostRevealed,
"",
"",
post.UserId, // Send to post author only
nil,
connectionID,
)
postJSON, err := post.ToJSON()
if err != nil {
return model.NewAppError("RevealPost", "app.post.marshal.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
event.Add("post", postJSON)
// Only include the revealing user ID (not all recipients) for better performance
// Frontend will add this user to its existing recipient list
// If revealingUserID is empty (e.g., initial post creation), send empty array
if revealingUserID != "" {
event.Add("recipients", []string{revealingUserID})
} else {
event.Add("recipients", []string{})
}
a.Publish(event)
return nil
}
// publishPostRevealedEventToUser publishes a websocket event to the revealing user
// for multi-device synchronization of revealed post content.
func (a *App) publishPostRevealedEventToUser(rctx request.CTX, post *model.Post, userID string, connectionID string) *model.AppError {
event := model.NewWebSocketEvent(
model.WebsocketEventPostRevealed,
"",
"",
userID, // Send to revealing user
nil,
connectionID,
)
postJSON, err := post.ToJSON()
if err != nil {
return model.NewAppError("RevealPost", "app.post.marshal.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
event.Add("post", postJSON)
a.Publish(event)
return nil
}
// publishPostBurnedEvent publishes a websocket event when a post is burned for a user.
func (a *App) publishPostBurnedEvent(postID string, channelID string, userID string, connectionID string) *model.AppError {
event := model.NewWebSocketEvent(
model.WebsocketEventPostBurned,
"",
channelID,
userID,
nil,
connectionID,
)
event.Add("post_id", postID)
a.Publish(event)
return nil
}
// publishAllRecipientsRevealedEvent notifies the post author when all recipients have revealed the message.
func (a *App) publishAllRecipientsRevealedEvent(rctx request.CTX, post *model.Post, senderExpireAt int64) *model.AppError {
event := model.NewWebSocketEvent(
model.WebsocketEventBurnOnReadAllRevealed,
"",
post.ChannelId,
post.UserId, // Send to post author only
nil,
"",
)
event.Add("post_id", post.Id)
event.Add("sender_expire_at", senderExpireAt)
a.Publish(event)
return nil
}
// enrichPostWithExpirationMetadata attaches expiration metadata to the post.
func (a *App) enrichPostWithExpirationMetadata(post *model.Post, expireAt int64) {
if post.Metadata == nil {
post.Metadata = &model.PostMetadata{}
}
post.Metadata.ExpireAt = expireAt
}
func (a *App) getBurnOnReadPost(rctx request.CTX, post *model.Post) (*model.Post, *model.AppError) {
tmpPost, err := a.Srv().Store().TemporaryPost().Get(rctx, post.Id)
if err != nil {
return nil, model.NewAppError("getBurnOnReadPost", "app.post.get_post.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
clone := post.Clone()
clone.Message = tmpPost.Message
clone.FileIds = tmpPost.FileIDs
return clone, nil
}
// revealPostForAuthor reveals a burn-on-read post for its author, including recipient list.
func (a *App) revealPostForAuthor(rctx request.CTX, postList *model.PostList, post *model.Post) *model.AppError {
revealedPost, appErr := a.getBurnOnReadPost(rctx, post)
if appErr != nil {
return appErr
}
a.ensurePostMetadata(revealedPost)
recipients, err := a.Srv().Store().ReadReceipt().GetByPost(rctx, post.Id)
if err != nil {
return model.NewAppError("RevealBurnOnReadPostsForUser", "app.post.get_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
for _, recipient := range recipients {
revealedPost.Metadata.Recipients = append(revealedPost.Metadata.Recipients, recipient.UserID)
}
postList.Posts[post.Id] = revealedPost
return nil
}
// getUserReadReceipt retrieves a user's read receipt for a post, returning nil if not found.
func (a *App) getUserReadReceipt(rctx request.CTX, postID, userID string) (*model.ReadReceipt, *model.AppError) {
receipt, err := a.Srv().Store().ReadReceipt().Get(rctx, postID, userID)
if err != nil && !store.IsErrNotFound(err) {
return nil, model.NewAppError("RevealBurnOnReadPostsForUser", "app.post.get_posts.app_error", nil, "", http.StatusInternalServerError).Wrap(err)
}
return receipt, nil
}
// setUnrevealedPost sets an unrevealed post message in the post list.
func (a *App) setUnrevealedPost(postList *model.PostList, postID string) {
unrevealedPost := postList.Posts[postID].Clone()
a.ensurePostMetadata(unrevealedPost)
unrevealedPost.Metadata.Emojis = []*model.Emoji{}
unrevealedPost.Metadata.Reactions = []*model.Reaction{}
unrevealedPost.Metadata.Files = []*model.FileInfo{}
unrevealedPost.Metadata.Images = map[string]*model.PostImage{}
unrevealedPost.Metadata.Acknowledgements = []*model.PostAcknowledgement{}
unrevealedPost.Message = ""
postList.Posts[postID] = unrevealedPost
}
// isReceiptExpired checks if a read receipt has expired.
func (a *App) isReceiptExpired(receipt *model.ReadReceipt) bool {
return receipt.ExpireAt < model.GetMillis()
}
// removePostFromList removes a post from both the posts map and order slice.
func (a *App) removePostFromList(postList *model.PostList, postID string) {
for i, orderPostID := range postList.Order {
if orderPostID == postID {
postList.Order = append(postList.Order[:i], postList.Order[i+1:]...)
break
}
}
delete(postList.Posts, postID)
}
// revealPostForUser reveals a burn-on-read post for a user with expiration metadata.
func (a *App) revealPostForUser(rctx request.CTX, postList *model.PostList, post *model.Post, receipt *model.ReadReceipt) *model.AppError {
revealedPost, err := a.getBurnOnReadPost(rctx, post)
if err != nil {
return err
}
a.ensurePostMetadata(revealedPost)
revealedPost.Metadata.ExpireAt = receipt.ExpireAt
postList.Posts[post.Id] = revealedPost
return nil
}
// ensurePostMetadata initializes post metadata if it doesn't exist.
func (a *App) ensurePostMetadata(post *model.Post) {
if post.Metadata == nil {
post.Metadata = &model.PostMetadata{}
}
}
func (a *App) BurnPost(rctx request.CTX, post *model.Post, userID string, connectionID string) *model.AppError {
if post.Type != model.PostTypeBurnOnRead {
return model.NewAppError("BurnPost", "app.burn_post.not_burn_on_read.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
// If user is the author, permanently delete the post
if post.UserId == userID {
return a.PermanentDeletePost(rctx, post.Id, userID)
}
// If not the author, check read receipt
receipt, err := a.Srv().Store().ReadReceipt().Get(rctx, post.Id, userID)
if err != nil {
if store.IsErrNotFound(err) {
return model.NewAppError("BurnPost", "app.burn_post.not_revealed.app_error", nil, fmt.Sprintf("postId=%s", post.Id), http.StatusBadRequest)
}
return model.NewAppError("BurnPost", "app.burn_post.read_receipt.get.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// Check if receipt is already expired
currentTime := model.GetMillis()
if receipt.ExpireAt < currentTime {
// Already expired, no-op
return nil
}
// Update ExpireAt to current time to explicitly expire the post
receipt.ExpireAt = currentTime
_, err = a.Srv().Store().ReadReceipt().Update(rctx, receipt)
if err != nil {
return model.NewAppError("BurnPost", "app.burn_post.read_receipt.update.error", nil, "", http.StatusInternalServerError).Wrap(err)
}
// Publish websocket event to user's other clients
if err := a.publishPostBurnedEvent(post.Id, post.ChannelId, userID, connectionID); err != nil {
// Log warning but don't fail the operation
rctx.Logger().Warn("Failed to publish post burned websocket event", mlog.String("post_id", post.Id), mlog.String("user_id", userID), mlog.Err(err))
}
return nil
}