2021-03-25 19:19:40 +00:00
|
|
|
use crate::PerformCrud;
|
2022-06-02 14:33:41 +00:00
|
|
|
use activitypub_federation::core::signatures::generate_actor_keypair;
|
2021-03-25 19:19:40 +00:00
|
|
|
use actix_web::web::Data;
|
2021-12-15 19:49:59 +00:00
|
|
|
use lemmy_api_common::{
|
2022-05-03 17:44:13 +00:00
|
|
|
person::{LoginResponse, Register},
|
2022-09-27 16:48:44 +00:00
|
|
|
utils::{
|
|
|
|
blocking,
|
|
|
|
honeypot_check,
|
|
|
|
password_length_check,
|
|
|
|
send_new_applicant_email_to_admins,
|
|
|
|
send_verification_email,
|
|
|
|
},
|
2021-12-15 19:49:59 +00:00
|
|
|
};
|
2021-03-25 19:19:40 +00:00
|
|
|
use lemmy_apub::{
|
|
|
|
generate_inbox_url,
|
2021-10-25 16:09:21 +00:00
|
|
|
generate_local_apub_endpoint,
|
2021-03-25 19:19:40 +00:00
|
|
|
generate_shared_inbox_url,
|
|
|
|
EndpointType,
|
|
|
|
};
|
|
|
|
use lemmy_db_schema::{
|
2022-05-03 17:44:13 +00:00
|
|
|
aggregates::structs::PersonAggregates,
|
2021-03-25 19:19:40 +00:00
|
|
|
source::{
|
|
|
|
local_user::{LocalUser, LocalUserForm},
|
2021-10-16 13:33:38 +00:00
|
|
|
person::{Person, PersonForm},
|
2021-12-15 19:49:59 +00:00
|
|
|
registration_application::{RegistrationApplication, RegistrationApplicationForm},
|
2021-10-16 13:33:38 +00:00
|
|
|
site::Site,
|
2021-03-25 19:19:40 +00:00
|
|
|
},
|
2022-06-22 19:38:27 +00:00
|
|
|
traits::Crud,
|
2021-03-25 19:19:40 +00:00
|
|
|
};
|
2022-05-03 17:44:13 +00:00
|
|
|
use lemmy_db_views::structs::LocalUserView;
|
|
|
|
use lemmy_db_views_actor::structs::PersonViewSafe;
|
2021-03-25 19:19:40 +00:00
|
|
|
use lemmy_utils::{
|
|
|
|
claims::Claims,
|
2022-06-02 14:33:41 +00:00
|
|
|
error::LemmyError,
|
2022-09-19 19:42:42 +00:00
|
|
|
utils::{check_slurs, check_slurs_opt, is_valid_actor_name},
|
2021-03-25 19:19:40 +00:00
|
|
|
ConnectionId,
|
|
|
|
};
|
|
|
|
use lemmy_websocket::{messages::CheckCaptcha, LemmyContext};
|
|
|
|
|
|
|
|
#[async_trait::async_trait(?Send)]
|
|
|
|
impl PerformCrud for Register {
|
|
|
|
type Response = LoginResponse;
|
|
|
|
|
2021-12-06 14:54:47 +00:00
|
|
|
#[tracing::instrument(skip(self, context, _websocket_id))]
|
2021-03-25 19:19:40 +00:00
|
|
|
async fn perform(
|
|
|
|
&self,
|
|
|
|
context: &Data<LemmyContext>,
|
|
|
|
_websocket_id: Option<ConnectionId>,
|
|
|
|
) -> Result<LoginResponse, LemmyError> {
|
2021-07-05 16:07:26 +00:00
|
|
|
let data: &Register = self;
|
2021-03-25 19:19:40 +00:00
|
|
|
|
2021-12-15 19:49:59 +00:00
|
|
|
// no email verification, or applications if the site is not setup yet
|
|
|
|
let (mut email_verification, mut require_application) = (false, false);
|
|
|
|
|
2021-03-25 19:19:40 +00:00
|
|
|
// Make sure site has open registration
|
2022-10-06 18:27:58 +00:00
|
|
|
let site = blocking(context.pool(), Site::read_local).await?;
|
2022-09-27 16:48:44 +00:00
|
|
|
if let Ok(site) = &site {
|
2021-03-25 19:19:40 +00:00
|
|
|
if !site.open_registration {
|
2021-12-06 14:54:47 +00:00
|
|
|
return Err(LemmyError::from_message("registration_closed"));
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
2021-12-15 19:49:59 +00:00
|
|
|
email_verification = site.require_email_verification;
|
|
|
|
require_application = site.require_application;
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
password_length_check(&data.password)?;
|
2021-10-01 11:37:39 +00:00
|
|
|
honeypot_check(&data.honeypot)?;
|
2021-03-25 19:19:40 +00:00
|
|
|
|
2021-12-15 19:49:59 +00:00
|
|
|
if email_verification && data.email.is_none() {
|
|
|
|
return Err(LemmyError::from_message("email_required"));
|
|
|
|
}
|
|
|
|
|
|
|
|
if require_application && data.answer.is_none() {
|
|
|
|
return Err(LemmyError::from_message(
|
|
|
|
"registration_application_answer_required",
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
2021-03-25 19:19:40 +00:00
|
|
|
// Make sure passwords match
|
|
|
|
if data.password != data.password_verify {
|
2021-12-06 14:54:47 +00:00
|
|
|
return Err(LemmyError::from_message("passwords_dont_match"));
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if there are admins. False if admins exist
|
|
|
|
let no_admins = blocking(context.pool(), move |conn| {
|
|
|
|
PersonViewSafe::admins(conn).map(|a| a.is_empty())
|
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
|
|
|
|
// If its not the admin, check the captcha
|
2021-09-22 15:57:09 +00:00
|
|
|
if !no_admins && context.settings().captcha.enabled {
|
2021-03-25 19:19:40 +00:00
|
|
|
let check = context
|
|
|
|
.chat_server()
|
|
|
|
.send(CheckCaptcha {
|
|
|
|
uuid: data
|
|
|
|
.captcha_uuid
|
|
|
|
.to_owned()
|
|
|
|
.unwrap_or_else(|| "".to_string()),
|
|
|
|
answer: data
|
|
|
|
.captcha_answer
|
|
|
|
.to_owned()
|
|
|
|
.unwrap_or_else(|| "".to_string()),
|
|
|
|
})
|
|
|
|
.await?;
|
|
|
|
if !check {
|
2021-12-06 14:54:47 +00:00
|
|
|
return Err(LemmyError::from_message("captcha_incorrect"));
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-19 19:42:42 +00:00
|
|
|
let slur_regex = &context.settings().slur_regex();
|
|
|
|
check_slurs(&data.username, slur_regex)?;
|
|
|
|
check_slurs_opt(&data.answer, slur_regex)?;
|
2021-03-25 19:19:40 +00:00
|
|
|
|
|
|
|
let actor_keypair = generate_actor_keypair()?;
|
2021-09-22 15:57:09 +00:00
|
|
|
if !is_valid_actor_name(&data.username, context.settings().actor_name_max_length) {
|
2021-12-06 14:54:47 +00:00
|
|
|
return Err(LemmyError::from_message("invalid_username"));
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
2021-10-25 16:09:21 +00:00
|
|
|
let actor_id = generate_local_apub_endpoint(
|
2021-09-22 15:57:09 +00:00
|
|
|
EndpointType::Person,
|
|
|
|
&data.username,
|
|
|
|
&context.settings().get_protocol_and_hostname(),
|
|
|
|
)?;
|
2021-03-25 19:19:40 +00:00
|
|
|
|
|
|
|
// We have to create both a person, and local_user
|
|
|
|
|
|
|
|
// Register the new person
|
|
|
|
let person_form = PersonForm {
|
|
|
|
name: data.username.to_owned(),
|
|
|
|
actor_id: Some(actor_id.clone()),
|
|
|
|
private_key: Some(Some(actor_keypair.private_key)),
|
2022-07-11 18:25:33 +00:00
|
|
|
public_key: Some(actor_keypair.public_key),
|
2021-03-25 19:19:40 +00:00
|
|
|
inbox_url: Some(generate_inbox_url(&actor_id)?),
|
|
|
|
shared_inbox_url: Some(Some(generate_shared_inbox_url(&actor_id)?)),
|
2021-03-29 20:24:50 +00:00
|
|
|
admin: Some(no_admins),
|
|
|
|
..PersonForm::default()
|
2021-03-25 19:19:40 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
// insert the person
|
2021-04-16 13:10:43 +00:00
|
|
|
let inserted_person = blocking(context.pool(), move |conn| {
|
2021-03-25 19:19:40 +00:00
|
|
|
Person::create(conn, &person_form)
|
|
|
|
})
|
|
|
|
.await?
|
2022-03-16 20:11:49 +00:00
|
|
|
.map_err(|e| LemmyError::from_error_message(e, "user_already_exists"))?;
|
2021-03-25 19:19:40 +00:00
|
|
|
|
|
|
|
// Create the local user
|
|
|
|
let local_user_form = LocalUserForm {
|
2021-12-15 19:49:59 +00:00
|
|
|
person_id: Some(inserted_person.id),
|
2022-09-27 16:02:04 +00:00
|
|
|
email: Some(data.email.as_deref().map(|s| s.to_lowercase())),
|
2021-12-15 19:49:59 +00:00
|
|
|
password_encrypted: Some(data.password.to_string()),
|
2021-03-25 19:19:40 +00:00
|
|
|
show_nsfw: Some(data.show_nsfw),
|
2021-12-15 19:49:59 +00:00
|
|
|
email_verified: Some(false),
|
|
|
|
..LocalUserForm::default()
|
2021-03-25 19:19:40 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
let inserted_local_user = match blocking(context.pool(), move |conn| {
|
|
|
|
LocalUser::register(conn, &local_user_form)
|
|
|
|
})
|
|
|
|
.await?
|
|
|
|
{
|
|
|
|
Ok(lu) => lu,
|
|
|
|
Err(e) => {
|
|
|
|
let err_type = if e.to_string()
|
|
|
|
== "duplicate key value violates unique constraint \"local_user_email_key\""
|
|
|
|
{
|
|
|
|
"email_already_exists"
|
|
|
|
} else {
|
|
|
|
"user_already_exists"
|
|
|
|
};
|
|
|
|
|
|
|
|
// If the local user creation errored, then delete that person
|
|
|
|
blocking(context.pool(), move |conn| {
|
2021-07-05 16:07:26 +00:00
|
|
|
Person::delete(conn, inserted_person.id)
|
2021-03-25 19:19:40 +00:00
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
|
2022-03-16 20:11:49 +00:00
|
|
|
return Err(LemmyError::from_error_message(e, err_type));
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-12-15 19:49:59 +00:00
|
|
|
if require_application {
|
|
|
|
// Create the registration application
|
|
|
|
let form = RegistrationApplicationForm {
|
2022-09-01 09:20:33 +00:00
|
|
|
local_user_id: Some(inserted_local_user.id),
|
2021-12-15 19:49:59 +00:00
|
|
|
// We already made sure answer was not null above
|
|
|
|
answer: data.answer.to_owned(),
|
|
|
|
..RegistrationApplicationForm::default()
|
|
|
|
};
|
|
|
|
|
|
|
|
blocking(context.pool(), move |conn| {
|
|
|
|
RegistrationApplication::create(conn, &form)
|
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
}
|
|
|
|
|
2022-09-27 16:48:44 +00:00
|
|
|
// Email the admins
|
|
|
|
if site.map(|s| s.application_email_admins).unwrap_or(false) {
|
|
|
|
send_new_applicant_email_to_admins(&data.username, context.pool(), context.settings())
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
|
2021-12-15 19:49:59 +00:00
|
|
|
let mut login_response = LoginResponse {
|
|
|
|
jwt: None,
|
|
|
|
registration_created: false,
|
|
|
|
verify_email_sent: false,
|
|
|
|
};
|
|
|
|
|
|
|
|
// Log the user in directly if email verification and application aren't required
|
|
|
|
if !require_application && !email_verification {
|
|
|
|
login_response.jwt = Some(
|
|
|
|
Claims::jwt(
|
|
|
|
inserted_local_user.id.0,
|
|
|
|
&context.secret().jwt_secret,
|
|
|
|
&context.settings().hostname,
|
|
|
|
)?
|
|
|
|
.into(),
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
if email_verification {
|
2022-03-24 15:25:51 +00:00
|
|
|
let local_user_view = LocalUserView {
|
|
|
|
local_user: inserted_local_user,
|
|
|
|
person: inserted_person,
|
|
|
|
counts: PersonAggregates::default(),
|
|
|
|
};
|
|
|
|
// we check at the beginning of this method that email is set
|
|
|
|
let email = local_user_view
|
|
|
|
.local_user
|
|
|
|
.email
|
|
|
|
.clone()
|
|
|
|
.expect("email was provided");
|
2022-06-22 20:24:54 +00:00
|
|
|
send_verification_email(&local_user_view, &email, context.pool(), context.settings())
|
|
|
|
.await?;
|
2021-12-15 19:49:59 +00:00
|
|
|
login_response.verify_email_sent = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if require_application {
|
|
|
|
login_response.registration_created = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(login_response)
|
2021-03-25 19:19:40 +00:00
|
|
|
}
|
|
|
|
}
|