lemmy/crates/apub/src/objects/mod.rs

123 lines
3.6 KiB
Rust
Raw Normal View History

use crate::protocol::Source;
use activitypub_federation::deser::values::MediaTypeMarkdownOrHtml;
use anyhow::anyhow;
use html2md::parse_html;
use lemmy_utils::{error::LemmyError, settings::structs::Settings};
use url::Url;
pub mod comment;
pub mod community;
pub mod instance;
pub mod person;
pub mod post;
pub mod private_message;
2022-05-06 23:53:33 +00:00
pub(crate) fn read_from_string_or_source(
content: &str,
media_type: &Option<MediaTypeMarkdownOrHtml>,
source: &Option<Source>,
) -> String {
if let Some(s) = source {
2022-05-06 23:53:33 +00:00
// markdown sent by lemmy in source field
s.content.clone()
2022-05-06 23:53:33 +00:00
} else if media_type == &Some(MediaTypeMarkdownOrHtml::Markdown) {
// markdown sent by peertube in content field
content.to_string()
} else {
2022-05-06 23:53:33 +00:00
// otherwise, convert content html to markdown
parse_html(content)
}
}
pub(crate) fn read_from_string_or_source_opt(
2022-05-06 23:53:33 +00:00
content: &Option<String>,
media_type: &Option<MediaTypeMarkdownOrHtml>,
source: &Option<Source>,
) -> Option<String> {
2022-05-06 23:53:33 +00:00
content
.as_ref()
.map(|content| read_from_string_or_source(content, media_type, source))
}
/// When for example a Post is made in a remote community, the community will send it back,
/// wrapped in Announce. If we simply receive this like any other federated object, overwrite the
/// existing, local Post. In particular, it will set the field local = false, so that the object
/// can't be fetched from the Activitypub HTTP endpoint anymore (which only serves local objects).
pub(crate) fn verify_is_remote_object(id: &Url, settings: &Settings) -> Result<(), LemmyError> {
let local_domain = settings.get_hostname_without_port()?;
if id.domain() == Some(&local_domain) {
Err(anyhow!("cant accept local object from remote instance").into())
} else {
Ok(())
}
}
#[cfg(test)]
pub(crate) mod tests {
use anyhow::anyhow;
2022-11-26 02:04:46 +00:00
use lemmy_api_common::{
context::LemmyContext,
2022-11-26 02:04:46 +00:00
request::build_user_agent,
websocket::chat_server::ChatServer,
};
2022-11-09 10:05:00 +00:00
use lemmy_db_schema::{source::secret::Secret, utils::build_db_pool_for_tests};
use lemmy_utils::{
error::LemmyError,
rate_limit::{RateLimitCell, RateLimitConfig},
settings::SETTINGS,
};
use reqwest::{Client, Request, Response};
use reqwest_middleware::{ClientBuilder, Middleware, Next};
use std::sync::Arc;
use task_local_extensions::Extensions;
struct BlockedMiddleware;
/// A reqwest middleware which blocks all requests
#[async_trait::async_trait]
impl Middleware for BlockedMiddleware {
async fn handle(
&self,
_req: Request,
_extensions: &mut Extensions,
_next: Next<'_>,
) -> reqwest_middleware::Result<Response> {
Err(anyhow!("Network requests not allowed").into())
}
}
// TODO: would be nice if we didnt have to use a full context for tests.
2022-11-09 10:05:00 +00:00
pub(crate) async fn init_context() -> LemmyContext {
async fn x() -> Result<String, LemmyError> {
Ok(String::new())
}
// call this to run migrations
2022-11-09 10:05:00 +00:00
let pool = build_db_pool_for_tests().await;
let settings = SETTINGS.clone();
let client = Client::builder()
.user_agent(build_user_agent(&settings))
.build()
.unwrap();
let client = ClientBuilder::new(client).with(BlockedMiddleware).build();
let secret = Secret {
id: 0,
jwt_secret: String::new(),
};
let rate_limit_config = RateLimitConfig::builder().build();
let rate_limit_cell = RateLimitCell::new(rate_limit_config).await;
let chat_server = Arc::new(ChatServer::startup());
LemmyContext::create(
pool,
chat_server,
client,
settings,
secret,
rate_limit_cell.clone(),
)
}
}