2020-09-24 13:53:21 +00:00
|
|
|
use actix_web::{web, web::Data};
|
2021-03-01 13:08:41 +00:00
|
|
|
use lemmy_api_structs::{
|
|
|
|
blocking,
|
|
|
|
comment::*,
|
|
|
|
community::*,
|
2021-03-11 04:43:11 +00:00
|
|
|
person::*,
|
2021-03-01 13:08:41 +00:00
|
|
|
post::*,
|
|
|
|
site::*,
|
|
|
|
websocket::*,
|
|
|
|
};
|
2020-12-21 23:27:42 +00:00
|
|
|
use lemmy_db_queries::{
|
2020-12-13 17:04:42 +00:00
|
|
|
source::{
|
2020-12-21 14:28:20 +00:00
|
|
|
community::{CommunityModerator_, Community_},
|
|
|
|
site::Site_,
|
2020-12-13 17:04:42 +00:00
|
|
|
},
|
2020-09-24 13:53:21 +00:00
|
|
|
Crud,
|
|
|
|
DbPool,
|
|
|
|
};
|
2021-03-18 20:25:21 +00:00
|
|
|
use lemmy_db_schema::{
|
|
|
|
source::{
|
|
|
|
community::{Community, CommunityModerator},
|
|
|
|
post::Post,
|
|
|
|
site::Site,
|
|
|
|
},
|
|
|
|
CommunityId,
|
|
|
|
LocalUserId,
|
|
|
|
PersonId,
|
|
|
|
PostId,
|
2020-12-21 12:28:12 +00:00
|
|
|
};
|
2021-03-11 04:43:11 +00:00
|
|
|
use lemmy_db_views::local_user_view::{LocalUserSettingsView, LocalUserView};
|
2020-12-21 23:27:42 +00:00
|
|
|
use lemmy_db_views_actor::{
|
2021-03-10 22:33:55 +00:00
|
|
|
community_person_ban_view::CommunityPersonBanView,
|
2020-12-21 16:30:34 +00:00
|
|
|
community_view::CommunityView,
|
|
|
|
};
|
2021-03-01 17:24:11 +00:00
|
|
|
use lemmy_utils::{
|
|
|
|
claims::Claims,
|
|
|
|
settings::structs::Settings,
|
|
|
|
ApiError,
|
|
|
|
ConnectionId,
|
|
|
|
LemmyError,
|
|
|
|
};
|
2020-09-24 13:53:21 +00:00
|
|
|
use lemmy_websocket::{serialize_websocket_message, LemmyContext, UserOperation};
|
|
|
|
use serde::Deserialize;
|
2021-03-13 18:16:35 +00:00
|
|
|
use std::{env, process::Command};
|
2020-09-24 14:14:09 +00:00
|
|
|
use url::Url;
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
pub mod comment;
|
|
|
|
pub mod community;
|
2021-03-11 04:43:11 +00:00
|
|
|
pub mod local_user;
|
2020-09-24 13:53:21 +00:00
|
|
|
pub mod post;
|
2021-02-09 18:26:06 +00:00
|
|
|
pub mod routes;
|
2020-09-24 13:53:21 +00:00
|
|
|
pub mod site;
|
2021-01-18 21:57:31 +00:00
|
|
|
pub mod websocket;
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
#[async_trait::async_trait(?Send)]
|
|
|
|
pub trait Perform {
|
|
|
|
type Response: serde::ser::Serialize + Send;
|
|
|
|
|
|
|
|
async fn perform(
|
|
|
|
&self,
|
|
|
|
context: &Data<LemmyContext>,
|
|
|
|
websocket_id: Option<ConnectionId>,
|
|
|
|
) -> Result<Self::Response, LemmyError>;
|
|
|
|
}
|
|
|
|
|
2020-11-16 15:44:04 +00:00
|
|
|
pub(crate) async fn is_mod_or_admin(
|
2020-09-24 13:53:21 +00:00
|
|
|
pool: &DbPool,
|
2021-03-18 20:25:21 +00:00
|
|
|
person_id: PersonId,
|
|
|
|
community_id: CommunityId,
|
2020-09-24 13:53:21 +00:00
|
|
|
) -> Result<(), LemmyError> {
|
|
|
|
let is_mod_or_admin = blocking(pool, move |conn| {
|
2021-03-10 22:33:55 +00:00
|
|
|
CommunityView::is_mod_or_admin(conn, person_id, community_id)
|
2020-09-24 13:53:21 +00:00
|
|
|
})
|
|
|
|
.await?;
|
|
|
|
if !is_mod_or_admin {
|
2021-02-22 18:04:32 +00:00
|
|
|
return Err(ApiError::err("not_a_mod_or_admin").into());
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
2021-03-10 22:33:55 +00:00
|
|
|
|
|
|
|
pub fn is_admin(local_user_view: &LocalUserView) -> Result<(), LemmyError> {
|
2021-03-22 14:28:00 +00:00
|
|
|
if !local_user_view.person.admin {
|
2021-02-22 18:04:32 +00:00
|
|
|
return Err(ApiError::err("not_an_admin").into());
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-03-18 20:25:21 +00:00
|
|
|
pub(crate) async fn get_post(post_id: PostId, pool: &DbPool) -> Result<Post, LemmyError> {
|
2020-09-24 13:53:21 +00:00
|
|
|
match blocking(pool, move |conn| Post::read(conn, post_id)).await? {
|
|
|
|
Ok(post) => Ok(post),
|
2021-02-22 18:04:32 +00:00
|
|
|
Err(_e) => Err(ApiError::err("couldnt_find_post").into()),
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 04:43:11 +00:00
|
|
|
pub(crate) async fn get_local_user_view_from_jwt(
|
|
|
|
jwt: &str,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<LocalUserView, LemmyError> {
|
2020-09-24 13:53:21 +00:00
|
|
|
let claims = match Claims::decode(&jwt) {
|
|
|
|
Ok(claims) => claims.claims,
|
2021-02-22 18:04:32 +00:00
|
|
|
Err(_e) => return Err(ApiError::err("not_logged_in").into()),
|
2020-09-24 13:53:21 +00:00
|
|
|
};
|
2021-03-19 04:31:49 +00:00
|
|
|
let local_user_id = LocalUserId(claims.sub);
|
2021-03-11 22:47:44 +00:00
|
|
|
let local_user_view =
|
|
|
|
blocking(pool, move |conn| LocalUserView::read(conn, local_user_id)).await??;
|
2020-09-24 13:53:21 +00:00
|
|
|
// Check for a site ban
|
2021-03-10 22:33:55 +00:00
|
|
|
if local_user_view.person.banned {
|
2021-02-22 18:04:32 +00:00
|
|
|
return Err(ApiError::err("site_ban").into());
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
2021-03-19 04:31:49 +00:00
|
|
|
|
|
|
|
check_validator_time(&local_user_view.local_user.validator_time, &claims)?;
|
|
|
|
|
2021-03-10 22:33:55 +00:00
|
|
|
Ok(local_user_view)
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
/// Checks if user's token was issued before user's password reset.
|
|
|
|
pub(crate) fn check_validator_time(
|
|
|
|
validator_time: &chrono::NaiveDateTime,
|
|
|
|
claims: &Claims,
|
|
|
|
) -> Result<(), LemmyError> {
|
2021-03-19 14:02:58 +00:00
|
|
|
let user_validation_time = validator_time.timestamp();
|
2021-03-13 18:16:35 +00:00
|
|
|
if user_validation_time > claims.iat {
|
2021-03-19 04:31:49 +00:00
|
|
|
Err(ApiError::err("not_logged_in").into())
|
|
|
|
} else {
|
|
|
|
Ok(())
|
2021-03-13 18:16:35 +00:00
|
|
|
}
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
|
2021-03-10 22:33:55 +00:00
|
|
|
pub(crate) async fn get_local_user_view_from_jwt_opt(
|
2020-09-24 13:53:21 +00:00
|
|
|
jwt: &Option<String>,
|
|
|
|
pool: &DbPool,
|
2021-03-10 22:33:55 +00:00
|
|
|
) -> Result<Option<LocalUserView>, LemmyError> {
|
2020-09-24 13:53:21 +00:00
|
|
|
match jwt {
|
2021-03-10 22:33:55 +00:00
|
|
|
Some(jwt) => Ok(Some(get_local_user_view_from_jwt(jwt, pool).await?)),
|
2020-09-24 13:53:21 +00:00
|
|
|
None => Ok(None),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-11 04:43:11 +00:00
|
|
|
pub(crate) async fn get_local_user_settings_view_from_jwt(
|
|
|
|
jwt: &str,
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<LocalUserSettingsView, LemmyError> {
|
2021-01-18 21:57:31 +00:00
|
|
|
let claims = match Claims::decode(&jwt) {
|
|
|
|
Ok(claims) => claims.claims,
|
2021-02-22 18:04:32 +00:00
|
|
|
Err(_e) => return Err(ApiError::err("not_logged_in").into()),
|
2021-01-18 21:57:31 +00:00
|
|
|
};
|
2021-03-19 04:31:49 +00:00
|
|
|
let local_user_id = LocalUserId(claims.sub);
|
2021-03-11 04:43:11 +00:00
|
|
|
let local_user_view = blocking(pool, move |conn| {
|
2021-03-11 22:47:44 +00:00
|
|
|
LocalUserSettingsView::read(conn, local_user_id)
|
2021-03-11 04:43:11 +00:00
|
|
|
})
|
|
|
|
.await??;
|
2021-01-18 21:57:31 +00:00
|
|
|
// Check for a site ban
|
2021-03-10 22:33:55 +00:00
|
|
|
if local_user_view.person.banned {
|
2021-02-22 18:04:32 +00:00
|
|
|
return Err(ApiError::err("site_ban").into());
|
2021-01-18 21:57:31 +00:00
|
|
|
}
|
2021-03-19 04:31:49 +00:00
|
|
|
|
|
|
|
check_validator_time(&local_user_view.local_user.validator_time, &claims)?;
|
|
|
|
|
2021-03-10 22:33:55 +00:00
|
|
|
Ok(local_user_view)
|
2021-01-18 21:57:31 +00:00
|
|
|
}
|
|
|
|
|
2021-03-10 22:33:55 +00:00
|
|
|
pub(crate) async fn get_local_user_settings_view_from_jwt_opt(
|
2021-01-18 21:57:31 +00:00
|
|
|
jwt: &Option<String>,
|
|
|
|
pool: &DbPool,
|
2021-03-10 22:33:55 +00:00
|
|
|
) -> Result<Option<LocalUserSettingsView>, LemmyError> {
|
2021-01-18 21:57:31 +00:00
|
|
|
match jwt {
|
2021-03-11 04:43:11 +00:00
|
|
|
Some(jwt) => Ok(Some(
|
|
|
|
get_local_user_settings_view_from_jwt(jwt, pool).await?,
|
|
|
|
)),
|
2021-01-18 21:57:31 +00:00
|
|
|
None => Ok(None),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-16 15:44:04 +00:00
|
|
|
pub(crate) async fn check_community_ban(
|
2021-03-18 20:25:21 +00:00
|
|
|
person_id: PersonId,
|
|
|
|
community_id: CommunityId,
|
2020-09-24 13:53:21 +00:00
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<(), LemmyError> {
|
2021-03-11 04:43:11 +00:00
|
|
|
let is_banned =
|
|
|
|
move |conn: &'_ _| CommunityPersonBanView::get(conn, person_id, community_id).is_ok();
|
2020-09-24 13:53:21 +00:00
|
|
|
if blocking(pool, is_banned).await? {
|
2021-02-22 18:04:32 +00:00
|
|
|
Err(ApiError::err("community_ban").into())
|
2020-09-24 13:53:21 +00:00
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-20 01:10:47 +00:00
|
|
|
pub(crate) async fn check_downvotes_enabled(score: i16, pool: &DbPool) -> Result<(), LemmyError> {
|
|
|
|
if score == -1 {
|
|
|
|
let site = blocking(pool, move |conn| Site::read_simple(conn)).await??;
|
|
|
|
if !site.enable_downvotes {
|
2021-02-22 18:04:32 +00:00
|
|
|
return Err(ApiError::err("downvotes_disabled").into());
|
2020-12-20 01:10:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-11-04 02:15:11 +00:00
|
|
|
/// Returns a list of communities that the user moderates
|
|
|
|
/// or if a community_id is supplied validates the user is a moderator
|
|
|
|
/// of that community and returns the community id in a vec
|
|
|
|
///
|
2021-03-11 22:47:44 +00:00
|
|
|
/// * `person_id` - the person id of the moderator
|
2020-11-04 02:15:11 +00:00
|
|
|
/// * `community_id` - optional community id to check for moderator privileges
|
|
|
|
/// * `pool` - the diesel db pool
|
2020-11-26 12:28:58 +00:00
|
|
|
pub(crate) async fn collect_moderated_communities(
|
2021-03-18 20:25:21 +00:00
|
|
|
person_id: PersonId,
|
|
|
|
community_id: Option<CommunityId>,
|
2020-10-25 02:59:13 +00:00
|
|
|
pool: &DbPool,
|
2021-03-18 20:25:21 +00:00
|
|
|
) -> Result<Vec<CommunityId>, LemmyError> {
|
2020-10-25 02:59:13 +00:00
|
|
|
if let Some(community_id) = community_id {
|
|
|
|
// if the user provides a community_id, just check for mod/admin privileges
|
2021-03-11 22:47:44 +00:00
|
|
|
is_mod_or_admin(pool, person_id, community_id).await?;
|
2020-10-25 02:59:13 +00:00
|
|
|
Ok(vec![community_id])
|
|
|
|
} else {
|
|
|
|
let ids = blocking(pool, move |conn: &'_ _| {
|
2021-03-11 22:47:44 +00:00
|
|
|
CommunityModerator::get_person_moderated_communities(conn, person_id)
|
2020-11-04 02:15:11 +00:00
|
|
|
})
|
|
|
|
.await??;
|
2020-10-25 02:59:13 +00:00
|
|
|
Ok(ids)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-01 18:11:37 +00:00
|
|
|
pub(crate) async fn build_federated_instances(
|
|
|
|
pool: &DbPool,
|
|
|
|
) -> Result<Option<FederatedInstances>, LemmyError> {
|
2021-03-01 17:24:11 +00:00
|
|
|
if Settings::get().federation().enabled {
|
2020-09-24 14:14:09 +00:00
|
|
|
let distinct_communities = blocking(pool, move |conn| {
|
|
|
|
Community::distinct_federated_communities(conn)
|
|
|
|
})
|
|
|
|
.await??;
|
|
|
|
|
2021-02-01 18:11:37 +00:00
|
|
|
let allowed = Settings::get().get_allowed_instances();
|
|
|
|
let blocked = Settings::get().get_blocked_instances();
|
|
|
|
|
|
|
|
let mut linked = distinct_communities
|
2020-09-24 14:14:09 +00:00
|
|
|
.iter()
|
|
|
|
.map(|actor_id| Ok(Url::parse(actor_id)?.host_str().unwrap_or("").to_string()))
|
|
|
|
.collect::<Result<Vec<String>, LemmyError>>()?;
|
|
|
|
|
2021-03-01 17:24:11 +00:00
|
|
|
if let Some(allowed) = allowed.as_ref() {
|
|
|
|
linked.extend_from_slice(allowed);
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(blocked) = blocked.as_ref() {
|
|
|
|
linked.retain(|a| !blocked.contains(a) && !a.eq(&Settings::get().hostname()));
|
|
|
|
}
|
2020-09-24 14:14:09 +00:00
|
|
|
|
|
|
|
// Sort and remove dupes
|
2021-02-01 18:11:37 +00:00
|
|
|
linked.sort_unstable();
|
|
|
|
linked.dedup();
|
|
|
|
|
|
|
|
Ok(Some(FederatedInstances {
|
|
|
|
linked,
|
|
|
|
allowed,
|
|
|
|
blocked,
|
|
|
|
}))
|
|
|
|
} else {
|
|
|
|
Ok(None)
|
2020-09-24 14:14:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-24 13:53:21 +00:00
|
|
|
pub async fn match_websocket_operation(
|
|
|
|
context: LemmyContext,
|
|
|
|
id: ConnectionId,
|
|
|
|
op: UserOperation,
|
|
|
|
data: &str,
|
|
|
|
) -> Result<String, LemmyError> {
|
|
|
|
match op {
|
|
|
|
// User ops
|
|
|
|
UserOperation::Login => do_websocket_operation::<Login>(context, id, op, data).await,
|
|
|
|
UserOperation::Register => do_websocket_operation::<Register>(context, id, op, data).await,
|
|
|
|
UserOperation::GetCaptcha => do_websocket_operation::<GetCaptcha>(context, id, op, data).await,
|
2021-03-10 22:33:55 +00:00
|
|
|
UserOperation::GetPersonDetails => {
|
|
|
|
do_websocket_operation::<GetPersonDetails>(context, id, op, data).await
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
UserOperation::GetReplies => do_websocket_operation::<GetReplies>(context, id, op, data).await,
|
|
|
|
UserOperation::AddAdmin => do_websocket_operation::<AddAdmin>(context, id, op, data).await,
|
2021-03-10 22:33:55 +00:00
|
|
|
UserOperation::BanPerson => do_websocket_operation::<BanPerson>(context, id, op, data).await,
|
|
|
|
UserOperation::GetPersonMentions => {
|
|
|
|
do_websocket_operation::<GetPersonMentions>(context, id, op, data).await
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
2021-03-10 22:33:55 +00:00
|
|
|
UserOperation::MarkPersonMentionAsRead => {
|
|
|
|
do_websocket_operation::<MarkPersonMentionAsRead>(context, id, op, data).await
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
UserOperation::MarkAllAsRead => {
|
|
|
|
do_websocket_operation::<MarkAllAsRead>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::DeleteAccount => {
|
|
|
|
do_websocket_operation::<DeleteAccount>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::PasswordReset => {
|
|
|
|
do_websocket_operation::<PasswordReset>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::PasswordChange => {
|
|
|
|
do_websocket_operation::<PasswordChange>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::UserJoin => do_websocket_operation::<UserJoin>(context, id, op, data).await,
|
|
|
|
UserOperation::PostJoin => do_websocket_operation::<PostJoin>(context, id, op, data).await,
|
|
|
|
UserOperation::CommunityJoin => {
|
|
|
|
do_websocket_operation::<CommunityJoin>(context, id, op, data).await
|
|
|
|
}
|
2020-11-04 02:15:11 +00:00
|
|
|
UserOperation::ModJoin => do_websocket_operation::<ModJoin>(context, id, op, data).await,
|
2020-09-24 13:53:21 +00:00
|
|
|
UserOperation::SaveUserSettings => {
|
|
|
|
do_websocket_operation::<SaveUserSettings>(context, id, op, data).await
|
|
|
|
}
|
2020-10-25 02:59:13 +00:00
|
|
|
UserOperation::GetReportCount => {
|
|
|
|
do_websocket_operation::<GetReportCount>(context, id, op, data).await
|
|
|
|
}
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
// Private Message ops
|
|
|
|
UserOperation::CreatePrivateMessage => {
|
|
|
|
do_websocket_operation::<CreatePrivateMessage>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::EditPrivateMessage => {
|
|
|
|
do_websocket_operation::<EditPrivateMessage>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::DeletePrivateMessage => {
|
|
|
|
do_websocket_operation::<DeletePrivateMessage>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::MarkPrivateMessageAsRead => {
|
|
|
|
do_websocket_operation::<MarkPrivateMessageAsRead>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::GetPrivateMessages => {
|
|
|
|
do_websocket_operation::<GetPrivateMessages>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
|
|
|
|
// Site ops
|
|
|
|
UserOperation::GetModlog => do_websocket_operation::<GetModlog>(context, id, op, data).await,
|
|
|
|
UserOperation::CreateSite => do_websocket_operation::<CreateSite>(context, id, op, data).await,
|
|
|
|
UserOperation::EditSite => do_websocket_operation::<EditSite>(context, id, op, data).await,
|
|
|
|
UserOperation::GetSite => do_websocket_operation::<GetSite>(context, id, op, data).await,
|
|
|
|
UserOperation::GetSiteConfig => {
|
|
|
|
do_websocket_operation::<GetSiteConfig>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::SaveSiteConfig => {
|
|
|
|
do_websocket_operation::<SaveSiteConfig>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::Search => do_websocket_operation::<Search>(context, id, op, data).await,
|
|
|
|
UserOperation::TransferCommunity => {
|
|
|
|
do_websocket_operation::<TransferCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::TransferSite => {
|
|
|
|
do_websocket_operation::<TransferSite>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
|
|
|
|
// Community ops
|
|
|
|
UserOperation::GetCommunity => {
|
|
|
|
do_websocket_operation::<GetCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::ListCommunities => {
|
|
|
|
do_websocket_operation::<ListCommunities>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::CreateCommunity => {
|
|
|
|
do_websocket_operation::<CreateCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::EditCommunity => {
|
|
|
|
do_websocket_operation::<EditCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::DeleteCommunity => {
|
|
|
|
do_websocket_operation::<DeleteCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::RemoveCommunity => {
|
|
|
|
do_websocket_operation::<RemoveCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::FollowCommunity => {
|
|
|
|
do_websocket_operation::<FollowCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::GetFollowedCommunities => {
|
|
|
|
do_websocket_operation::<GetFollowedCommunities>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::BanFromCommunity => {
|
|
|
|
do_websocket_operation::<BanFromCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::AddModToCommunity => {
|
|
|
|
do_websocket_operation::<AddModToCommunity>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
|
|
|
|
// Post ops
|
|
|
|
UserOperation::CreatePost => do_websocket_operation::<CreatePost>(context, id, op, data).await,
|
|
|
|
UserOperation::GetPost => do_websocket_operation::<GetPost>(context, id, op, data).await,
|
|
|
|
UserOperation::GetPosts => do_websocket_operation::<GetPosts>(context, id, op, data).await,
|
|
|
|
UserOperation::EditPost => do_websocket_operation::<EditPost>(context, id, op, data).await,
|
|
|
|
UserOperation::DeletePost => do_websocket_operation::<DeletePost>(context, id, op, data).await,
|
|
|
|
UserOperation::RemovePost => do_websocket_operation::<RemovePost>(context, id, op, data).await,
|
|
|
|
UserOperation::LockPost => do_websocket_operation::<LockPost>(context, id, op, data).await,
|
|
|
|
UserOperation::StickyPost => do_websocket_operation::<StickyPost>(context, id, op, data).await,
|
|
|
|
UserOperation::CreatePostLike => {
|
|
|
|
do_websocket_operation::<CreatePostLike>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::SavePost => do_websocket_operation::<SavePost>(context, id, op, data).await,
|
2020-10-25 02:59:13 +00:00
|
|
|
UserOperation::CreatePostReport => {
|
|
|
|
do_websocket_operation::<CreatePostReport>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::ListPostReports => {
|
|
|
|
do_websocket_operation::<ListPostReports>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::ResolvePostReport => {
|
|
|
|
do_websocket_operation::<ResolvePostReport>(context, id, op, data).await
|
|
|
|
}
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
// Comment ops
|
|
|
|
UserOperation::CreateComment => {
|
|
|
|
do_websocket_operation::<CreateComment>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::EditComment => {
|
|
|
|
do_websocket_operation::<EditComment>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::DeleteComment => {
|
|
|
|
do_websocket_operation::<DeleteComment>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::RemoveComment => {
|
|
|
|
do_websocket_operation::<RemoveComment>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::MarkCommentAsRead => {
|
|
|
|
do_websocket_operation::<MarkCommentAsRead>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::SaveComment => {
|
|
|
|
do_websocket_operation::<SaveComment>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::GetComments => {
|
|
|
|
do_websocket_operation::<GetComments>(context, id, op, data).await
|
|
|
|
}
|
|
|
|
UserOperation::CreateCommentLike => {
|
|
|
|
do_websocket_operation::<CreateCommentLike>(context, id, op, data).await
|
|
|
|
}
|
2020-10-25 02:59:13 +00:00
|
|
|
UserOperation::CreateCommentReport => {
|
|
|
|
do_websocket_operation::<CreateCommentReport>(context, id, op, data).await
|
2020-10-21 00:31:01 +00:00
|
|
|
}
|
2020-10-25 02:59:13 +00:00
|
|
|
UserOperation::ListCommentReports => {
|
|
|
|
do_websocket_operation::<ListCommentReports>(context, id, op, data).await
|
2020-10-13 23:32:35 +00:00
|
|
|
}
|
2020-10-25 02:59:13 +00:00
|
|
|
UserOperation::ResolveCommentReport => {
|
|
|
|
do_websocket_operation::<ResolveCommentReport>(context, id, op, data).await
|
2020-10-13 23:32:35 +00:00
|
|
|
}
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn do_websocket_operation<'a, 'b, Data>(
|
|
|
|
context: LemmyContext,
|
|
|
|
id: ConnectionId,
|
|
|
|
op: UserOperation,
|
|
|
|
data: &str,
|
|
|
|
) -> Result<String, LemmyError>
|
|
|
|
where
|
|
|
|
for<'de> Data: Deserialize<'de> + 'a,
|
|
|
|
Data: Perform,
|
|
|
|
{
|
|
|
|
let parsed_data: Data = serde_json::from_str(&data)?;
|
|
|
|
let res = parsed_data
|
|
|
|
.perform(&web::Data::new(context), Some(id))
|
|
|
|
.await?;
|
|
|
|
serialize_websocket_message(&op, &res)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) fn captcha_espeak_wav_base64(captcha: &str) -> Result<String, LemmyError> {
|
|
|
|
let mut built_text = String::new();
|
|
|
|
|
|
|
|
// Building proper speech text for espeak
|
|
|
|
for mut c in captcha.chars() {
|
|
|
|
let new_str = if c.is_alphabetic() {
|
|
|
|
if c.is_lowercase() {
|
|
|
|
c.make_ascii_uppercase();
|
|
|
|
format!("lower case {} ... ", c)
|
|
|
|
} else {
|
|
|
|
c.make_ascii_uppercase();
|
|
|
|
format!("capital {} ... ", c)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
format!("{} ...", c)
|
|
|
|
};
|
|
|
|
|
|
|
|
built_text.push_str(&new_str);
|
|
|
|
}
|
|
|
|
|
|
|
|
espeak_wav_base64(&built_text)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) fn espeak_wav_base64(text: &str) -> Result<String, LemmyError> {
|
|
|
|
// Make a temp file path
|
|
|
|
let uuid = uuid::Uuid::new_v4().to_string();
|
2021-03-13 18:16:35 +00:00
|
|
|
let file_path = format!(
|
|
|
|
"{}/lemmy_espeak_{}.wav",
|
|
|
|
env::temp_dir().to_string_lossy(),
|
|
|
|
&uuid
|
|
|
|
);
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
// Write the wav file
|
|
|
|
Command::new("espeak")
|
|
|
|
.arg("-w")
|
|
|
|
.arg(&file_path)
|
|
|
|
.arg(text)
|
|
|
|
.status()?;
|
|
|
|
|
|
|
|
// Read the wav file bytes
|
|
|
|
let bytes = std::fs::read(&file_path)?;
|
|
|
|
|
|
|
|
// Delete the file
|
|
|
|
std::fs::remove_file(file_path)?;
|
|
|
|
|
|
|
|
// Convert to base64
|
|
|
|
let base64 = base64::encode(bytes);
|
|
|
|
|
|
|
|
Ok(base64)
|
|
|
|
}
|
|
|
|
|
2021-03-02 15:36:10 +00:00
|
|
|
/// Checks the password length
|
|
|
|
pub(crate) fn password_length_check(pass: &str) -> Result<(), LemmyError> {
|
|
|
|
if pass.len() > 60 {
|
|
|
|
Err(ApiError::err("invalid_password").into())
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-24 13:53:21 +00:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2021-03-19 04:31:49 +00:00
|
|
|
use crate::{captcha_espeak_wav_base64, check_validator_time};
|
|
|
|
use lemmy_db_queries::{establish_unpooled_connection, source::local_user::LocalUser_, Crud};
|
|
|
|
use lemmy_db_schema::source::{
|
|
|
|
local_user::{LocalUser, LocalUserForm},
|
|
|
|
person::{Person, PersonForm},
|
2021-03-13 18:16:35 +00:00
|
|
|
};
|
|
|
|
use lemmy_utils::claims::Claims;
|
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
#[test]
|
|
|
|
fn test_should_not_validate_user_token_after_password_change() {
|
|
|
|
let conn = establish_unpooled_connection();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
let new_person = PersonForm {
|
|
|
|
name: "Gerry9812".into(),
|
2021-03-20 20:59:07 +00:00
|
|
|
..PersonForm::default()
|
2021-03-13 18:16:35 +00:00
|
|
|
};
|
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
let inserted_person = Person::create(&conn, &new_person).unwrap();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
let local_user_form = LocalUserForm {
|
|
|
|
person_id: inserted_person.id,
|
|
|
|
password_encrypted: "123456".to_string(),
|
2021-03-20 20:59:07 +00:00
|
|
|
..LocalUserForm::default()
|
2021-03-19 04:31:49 +00:00
|
|
|
};
|
2021-03-13 20:36:40 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
let inserted_local_user = LocalUser::create(&conn, &local_user_form).unwrap();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
let jwt = Claims::jwt(inserted_local_user.id.0).unwrap();
|
|
|
|
let claims = Claims::decode(&jwt).unwrap().claims;
|
|
|
|
let check = check_validator_time(&inserted_local_user.validator_time, &claims);
|
|
|
|
assert!(check.is_ok());
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
// The check should fail, since the validator time is now newer than the jwt issue time
|
|
|
|
let updated_local_user =
|
|
|
|
LocalUser::update_password(&conn, inserted_local_user.id, &"password111").unwrap();
|
|
|
|
let check_after = check_validator_time(&updated_local_user.validator_time, &claims);
|
|
|
|
assert!(check_after.is_err());
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
let num_deleted = Person::delete(&conn, inserted_person.id).unwrap();
|
|
|
|
assert_eq!(1, num_deleted);
|
2021-03-13 18:16:35 +00:00
|
|
|
}
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_espeak() {
|
|
|
|
assert!(captcha_espeak_wav_base64("WxRt2l").is_ok())
|
|
|
|
}
|
|
|
|
}
|