2021-10-06 20:20:05 +00:00
|
|
|
use crate::http::{
|
|
|
|
comment::get_apub_comment,
|
|
|
|
community::{
|
2021-12-30 18:39:28 +00:00
|
|
|
community_inbox,
|
2023-02-18 14:50:28 +00:00
|
|
|
get_apub_community_featured,
|
2021-12-30 18:39:28 +00:00
|
|
|
get_apub_community_followers,
|
|
|
|
get_apub_community_http,
|
|
|
|
get_apub_community_moderators,
|
|
|
|
get_apub_community_outbox,
|
2020-10-12 14:10:09 +00:00
|
|
|
},
|
2021-10-06 20:20:05 +00:00
|
|
|
get_activity,
|
2021-10-27 16:03:07 +00:00
|
|
|
person::{get_apub_person_http, get_apub_person_outbox, person_inbox},
|
2021-10-06 20:20:05 +00:00
|
|
|
post::get_apub_post,
|
|
|
|
shared_inbox,
|
2023-11-16 13:22:40 +00:00
|
|
|
site::{get_apub_site_http, get_apub_site_outbox},
|
2020-05-16 14:04:08 +00:00
|
|
|
};
|
2021-12-30 18:37:59 +00:00
|
|
|
use actix_web::{
|
|
|
|
guard::{Guard, GuardContext},
|
2021-12-30 18:39:28 +00:00
|
|
|
http::{header, Method},
|
2021-12-30 18:37:59 +00:00
|
|
|
web,
|
|
|
|
};
|
2019-12-31 12:55:33 +00:00
|
|
|
|
2022-10-27 09:24:07 +00:00
|
|
|
pub fn config(cfg: &mut web::ServiceConfig) {
|
|
|
|
cfg
|
|
|
|
.route("/", web::get().to(get_apub_site_http))
|
|
|
|
.route("/site_outbox", web::get().to(get_apub_site_outbox))
|
|
|
|
.route(
|
|
|
|
"/c/{community_name}",
|
|
|
|
web::get().to(get_apub_community_http),
|
|
|
|
)
|
|
|
|
.route(
|
|
|
|
"/c/{community_name}/followers",
|
|
|
|
web::get().to(get_apub_community_followers),
|
|
|
|
)
|
|
|
|
.route(
|
|
|
|
"/c/{community_name}/outbox",
|
|
|
|
web::get().to(get_apub_community_outbox),
|
|
|
|
)
|
2023-02-18 14:50:28 +00:00
|
|
|
.route(
|
|
|
|
"/c/{community_name}/featured",
|
|
|
|
web::get().to(get_apub_community_featured),
|
|
|
|
)
|
2022-10-27 09:24:07 +00:00
|
|
|
.route(
|
|
|
|
"/c/{community_name}/moderators",
|
|
|
|
web::get().to(get_apub_community_moderators),
|
|
|
|
)
|
|
|
|
.route("/u/{user_name}", web::get().to(get_apub_person_http))
|
|
|
|
.route(
|
|
|
|
"/u/{user_name}/outbox",
|
|
|
|
web::get().to(get_apub_person_outbox),
|
|
|
|
)
|
|
|
|
.route("/post/{post_id}", web::get().to(get_apub_post))
|
|
|
|
.route("/comment/{comment_id}", web::get().to(get_apub_comment))
|
|
|
|
.route("/activities/{type_}/{id}", web::get().to(get_activity));
|
2020-10-21 13:48:43 +00:00
|
|
|
|
2022-10-27 09:24:07 +00:00
|
|
|
cfg.service(
|
|
|
|
web::scope("")
|
|
|
|
.guard(InboxRequestGuard)
|
|
|
|
.route("/c/{community_name}/inbox", web::post().to(community_inbox))
|
|
|
|
.route("/u/{user_name}/inbox", web::post().to(person_inbox))
|
2023-11-16 13:22:40 +00:00
|
|
|
.route("/inbox", web::post().to(shared_inbox)),
|
2022-10-27 09:24:07 +00:00
|
|
|
);
|
2021-11-10 13:17:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Without this, things like webfinger or RSS feeds stop working, as all requests seem to get
|
|
|
|
/// routed into the inbox service (because it covers the root path). So we filter out anything that
|
|
|
|
/// definitely can't be an inbox request (based on Accept header and request method).
|
|
|
|
struct InboxRequestGuard;
|
|
|
|
|
|
|
|
impl Guard for InboxRequestGuard {
|
2021-12-30 18:39:28 +00:00
|
|
|
fn check(&self, ctx: &GuardContext) -> bool {
|
|
|
|
if ctx.head().method != Method::POST {
|
2021-11-10 13:17:56 +00:00
|
|
|
return false;
|
|
|
|
}
|
2021-12-30 18:39:28 +00:00
|
|
|
if let Some(val) = ctx.head().headers.get(header::CONTENT_TYPE) {
|
|
|
|
return val.as_bytes().starts_with(b"application/");
|
2021-11-10 13:17:56 +00:00
|
|
|
}
|
|
|
|
false
|
2020-01-02 18:22:23 +00:00
|
|
|
}
|
2019-12-31 12:55:33 +00:00
|
|
|
}
|