1 use crate::{captcha_espeak_wav_base64, Perform};
2 use actix_web::web::Data;
5 use captcha::{gen, Difficulty};
7 use lemmy_api_common::{
9 collect_moderated_communities,
10 community::{GetFollowedCommunities, GetFollowedCommunitiesResponse},
11 get_local_user_view_from_jwt,
13 password_length_check,
16 use lemmy_db_queries::{
17 diesel_option_overwrite,
18 diesel_option_overwrite_to_url,
21 community::Community_,
22 local_user::LocalUser_,
23 password_reset_request::PasswordResetRequest_,
25 person_mention::PersonMention_,
27 private_message::PrivateMessage_,
32 use lemmy_db_schema::{
37 local_user::{LocalUser, LocalUserForm},
39 password_reset_request::*,
43 private_message::PrivateMessage,
48 comment_report_view::CommentReportView,
49 comment_view::CommentQueryBuilder,
50 local_user_view::LocalUserView,
51 post_report_view::PostReportView,
53 use lemmy_db_views_actor::{
54 community_follower_view::CommunityFollowerView,
55 person_mention_view::{PersonMentionQueryBuilder, PersonMentionView},
56 person_view::PersonViewSafe,
62 settings::structs::Settings,
63 utils::{generate_random_string, is_valid_preferred_username, naive_from_unix},
68 use lemmy_websocket::{
69 messages::{CaptchaItem, SendAllMessage, SendUserRoomMessage},
73 use std::str::FromStr;
75 #[async_trait::async_trait(?Send)]
76 impl Perform for Login {
77 type Response = LoginResponse;
81 context: &Data<LemmyContext>,
82 _websocket_id: Option<ConnectionId>,
83 ) -> Result<LoginResponse, LemmyError> {
84 let data: &Login = &self;
86 // Fetch that username / email
87 let username_or_email = data.username_or_email.clone();
88 let local_user_view = match blocking(context.pool(), move |conn| {
89 LocalUserView::find_by_email_or_name(conn, &username_or_email)
94 Err(_e) => return Err(ApiError::err("couldnt_find_that_username_or_email").into()),
97 // Verify the password
98 let valid: bool = verify(
100 &local_user_view.local_user.password_encrypted,
104 return Err(ApiError::err("password_incorrect").into());
109 jwt: Claims::jwt(local_user_view.local_user.id.0)?,
114 #[async_trait::async_trait(?Send)]
115 impl Perform for GetCaptcha {
116 type Response = GetCaptchaResponse;
120 context: &Data<LemmyContext>,
121 _websocket_id: Option<ConnectionId>,
122 ) -> Result<Self::Response, LemmyError> {
123 let captcha_settings = Settings::get().captcha();
125 if !captcha_settings.enabled {
126 return Ok(GetCaptchaResponse { ok: None });
129 let captcha = match captcha_settings.difficulty.as_str() {
130 "easy" => gen(Difficulty::Easy),
131 "medium" => gen(Difficulty::Medium),
132 "hard" => gen(Difficulty::Hard),
133 _ => gen(Difficulty::Medium),
136 let answer = captcha.chars_as_string();
138 let png_byte_array = captcha.as_png().expect("failed to generate captcha");
140 let png = base64::encode(png_byte_array);
142 let uuid = uuid::Uuid::new_v4().to_string();
144 let wav = captcha_espeak_wav_base64(&answer).ok();
146 let captcha_item = CaptchaItem {
148 uuid: uuid.to_owned(),
149 expires: naive_now() + Duration::minutes(10), // expires in 10 minutes
152 // Stores the captcha item on the queue
153 context.chat_server().do_send(captcha_item);
155 Ok(GetCaptchaResponse {
156 ok: Some(CaptchaResponse { png, wav, uuid }),
161 #[async_trait::async_trait(?Send)]
162 impl Perform for SaveUserSettings {
163 type Response = LoginResponse;
167 context: &Data<LemmyContext>,
168 _websocket_id: Option<ConnectionId>,
169 ) -> Result<LoginResponse, LemmyError> {
170 let data: &SaveUserSettings = &self;
171 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
173 let avatar = diesel_option_overwrite_to_url(&data.avatar)?;
174 let banner = diesel_option_overwrite_to_url(&data.banner)?;
175 let email = diesel_option_overwrite(&data.email);
176 let bio = diesel_option_overwrite(&data.bio);
177 let preferred_username = diesel_option_overwrite(&data.preferred_username);
178 let matrix_user_id = diesel_option_overwrite(&data.matrix_user_id);
180 if let Some(Some(bio)) = &bio {
181 if bio.chars().count() > 300 {
182 return Err(ApiError::err("bio_length_overflow").into());
186 if let Some(Some(preferred_username)) = &preferred_username {
187 if !is_valid_preferred_username(preferred_username.trim()) {
188 return Err(ApiError::err("invalid_username").into());
192 let local_user_id = local_user_view.local_user.id;
193 let person_id = local_user_view.person.id;
194 let default_listing_type = data.default_listing_type;
195 let default_sort_type = data.default_sort_type;
196 let password_encrypted = local_user_view.local_user.password_encrypted;
198 let person_form = PersonForm {
199 name: local_user_view.person.name,
205 updated: Some(naive_now()),
214 last_refreshed_at: None,
215 shared_inbox_url: None,
219 let person_res = blocking(context.pool(), move |conn| {
220 Person::update(conn, person_id, &person_form)
223 let _updated_person: Person = match person_res {
226 return Err(ApiError::err("user_already_exists").into());
230 let local_user_form = LocalUserForm {
234 show_nsfw: data.show_nsfw,
235 theme: data.theme.to_owned(),
237 default_listing_type,
238 lang: data.lang.to_owned(),
239 show_avatars: data.show_avatars,
240 send_notifications_to_email: data.send_notifications_to_email,
243 let local_user_res = blocking(context.pool(), move |conn| {
244 LocalUser::update(conn, local_user_id, &local_user_form)
247 let updated_local_user = match local_user_res {
250 let err_type = if e.to_string()
251 == "duplicate key value violates unique constraint \"local_user_email_key\""
253 "email_already_exists"
255 "user_already_exists"
258 return Err(ApiError::err(err_type).into());
264 jwt: Claims::jwt(updated_local_user.id.0)?,
269 #[async_trait::async_trait(?Send)]
270 impl Perform for ChangePassword {
271 type Response = LoginResponse;
275 context: &Data<LemmyContext>,
276 _websocket_id: Option<ConnectionId>,
277 ) -> Result<LoginResponse, LemmyError> {
278 let data: &ChangePassword = &self;
279 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
281 password_length_check(&data.new_password)?;
283 // Make sure passwords match
284 if data.new_password != data.new_password_verify {
285 return Err(ApiError::err("passwords_dont_match").into());
288 // Check the old password
289 let valid: bool = verify(
291 &local_user_view.local_user.password_encrypted,
295 return Err(ApiError::err("password_incorrect").into());
298 let local_user_id = local_user_view.local_user.id;
299 let new_password = data.new_password.to_owned();
300 let updated_local_user = blocking(context.pool(), move |conn| {
301 LocalUser::update_password(conn, local_user_id, &new_password)
307 jwt: Claims::jwt(updated_local_user.id.0)?,
312 #[async_trait::async_trait(?Send)]
313 impl Perform for AddAdmin {
314 type Response = AddAdminResponse;
318 context: &Data<LemmyContext>,
319 websocket_id: Option<ConnectionId>,
320 ) -> Result<AddAdminResponse, LemmyError> {
321 let data: &AddAdmin = &self;
322 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
324 // Make sure user is an admin
325 is_admin(&local_user_view)?;
327 let added = data.added;
328 let added_person_id = data.person_id;
329 let added_admin = match blocking(context.pool(), move |conn| {
330 Person::add_admin(conn, added_person_id, added)
336 return Err(ApiError::err("couldnt_update_user").into());
341 let form = ModAddForm {
342 mod_person_id: local_user_view.person.id,
343 other_person_id: added_admin.id,
344 removed: Some(!data.added),
347 blocking(context.pool(), move |conn| ModAdd::create(conn, &form)).await??;
349 let site_creator_id = blocking(context.pool(), move |conn| {
350 Site::read(conn, 1).map(|s| s.creator_id)
354 let mut admins = blocking(context.pool(), move |conn| PersonViewSafe::admins(conn)).await??;
355 let creator_index = admins
357 .position(|r| r.person.id == site_creator_id)
358 .context(location_info!())?;
359 let creator_person = admins.remove(creator_index);
360 admins.insert(0, creator_person);
362 let res = AddAdminResponse { admins };
364 context.chat_server().do_send(SendAllMessage {
365 op: UserOperation::AddAdmin,
366 response: res.clone(),
374 #[async_trait::async_trait(?Send)]
375 impl Perform for BanPerson {
376 type Response = BanPersonResponse;
380 context: &Data<LemmyContext>,
381 websocket_id: Option<ConnectionId>,
382 ) -> Result<BanPersonResponse, LemmyError> {
383 let data: &BanPerson = &self;
384 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
386 // Make sure user is an admin
387 is_admin(&local_user_view)?;
390 let banned_person_id = data.person_id;
391 let ban_person = move |conn: &'_ _| Person::ban_person(conn, banned_person_id, ban);
392 if blocking(context.pool(), ban_person).await?.is_err() {
393 return Err(ApiError::err("couldnt_update_user").into());
396 // Remove their data if that's desired
397 if data.remove_data {
399 blocking(context.pool(), move |conn: &'_ _| {
400 Post::update_removed_for_creator(conn, banned_person_id, None, true)
405 blocking(context.pool(), move |conn: &'_ _| {
406 Community::update_removed_for_creator(conn, banned_person_id, true)
411 blocking(context.pool(), move |conn: &'_ _| {
412 Comment::update_removed_for_creator(conn, banned_person_id, true)
418 let expires = data.expires.map(naive_from_unix);
420 let form = ModBanForm {
421 mod_person_id: local_user_view.person.id,
422 other_person_id: data.person_id,
423 reason: data.reason.to_owned(),
424 banned: Some(data.ban),
428 blocking(context.pool(), move |conn| ModBan::create(conn, &form)).await??;
430 let person_id = data.person_id;
431 let person_view = blocking(context.pool(), move |conn| {
432 PersonViewSafe::read(conn, person_id)
436 let res = BanPersonResponse {
441 context.chat_server().do_send(SendAllMessage {
442 op: UserOperation::BanPerson,
443 response: res.clone(),
451 #[async_trait::async_trait(?Send)]
452 impl Perform for GetReplies {
453 type Response = GetRepliesResponse;
457 context: &Data<LemmyContext>,
458 _websocket_id: Option<ConnectionId>,
459 ) -> Result<GetRepliesResponse, LemmyError> {
460 let data: &GetReplies = &self;
461 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
463 let sort = SortType::from_str(&data.sort)?;
465 let page = data.page;
466 let limit = data.limit;
467 let unread_only = data.unread_only;
468 let person_id = local_user_view.person.id;
469 let replies = blocking(context.pool(), move |conn| {
470 CommentQueryBuilder::create(conn)
472 .unread_only(unread_only)
473 .recipient_id(person_id)
474 .my_person_id(person_id)
481 Ok(GetRepliesResponse { replies })
485 #[async_trait::async_trait(?Send)]
486 impl Perform for GetPersonMentions {
487 type Response = GetPersonMentionsResponse;
491 context: &Data<LemmyContext>,
492 _websocket_id: Option<ConnectionId>,
493 ) -> Result<GetPersonMentionsResponse, LemmyError> {
494 let data: &GetPersonMentions = &self;
495 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
497 let sort = SortType::from_str(&data.sort)?;
499 let page = data.page;
500 let limit = data.limit;
501 let unread_only = data.unread_only;
502 let person_id = local_user_view.person.id;
503 let mentions = blocking(context.pool(), move |conn| {
504 PersonMentionQueryBuilder::create(conn)
505 .recipient_id(person_id)
506 .my_person_id(person_id)
508 .unread_only(unread_only)
515 Ok(GetPersonMentionsResponse { mentions })
519 #[async_trait::async_trait(?Send)]
520 impl Perform for MarkPersonMentionAsRead {
521 type Response = PersonMentionResponse;
525 context: &Data<LemmyContext>,
526 _websocket_id: Option<ConnectionId>,
527 ) -> Result<PersonMentionResponse, LemmyError> {
528 let data: &MarkPersonMentionAsRead = &self;
529 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
531 let person_mention_id = data.person_mention_id;
532 let read_person_mention = blocking(context.pool(), move |conn| {
533 PersonMention::read(conn, person_mention_id)
537 if local_user_view.person.id != read_person_mention.recipient_id {
538 return Err(ApiError::err("couldnt_update_comment").into());
541 let person_mention_id = read_person_mention.id;
542 let read = data.read;
544 move |conn: &'_ _| PersonMention::update_read(conn, person_mention_id, read);
545 if blocking(context.pool(), update_mention).await?.is_err() {
546 return Err(ApiError::err("couldnt_update_comment").into());
549 let person_mention_id = read_person_mention.id;
550 let person_id = local_user_view.person.id;
551 let person_mention_view = blocking(context.pool(), move |conn| {
552 PersonMentionView::read(conn, person_mention_id, Some(person_id))
556 Ok(PersonMentionResponse {
562 #[async_trait::async_trait(?Send)]
563 impl Perform for MarkAllAsRead {
564 type Response = GetRepliesResponse;
568 context: &Data<LemmyContext>,
569 _websocket_id: Option<ConnectionId>,
570 ) -> Result<GetRepliesResponse, LemmyError> {
571 let data: &MarkAllAsRead = &self;
572 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
574 let person_id = local_user_view.person.id;
575 let replies = blocking(context.pool(), move |conn| {
576 CommentQueryBuilder::create(conn)
577 .my_person_id(person_id)
578 .recipient_id(person_id)
586 // TODO: this should probably be a bulk operation
587 // Not easy to do as a bulk operation,
588 // because recipient_id isn't in the comment table
589 for comment_view in &replies {
590 let reply_id = comment_view.comment.id;
591 let mark_as_read = move |conn: &'_ _| Comment::update_read(conn, reply_id, true);
592 if blocking(context.pool(), mark_as_read).await?.is_err() {
593 return Err(ApiError::err("couldnt_update_comment").into());
597 // Mark all user mentions as read
598 let update_person_mentions =
599 move |conn: &'_ _| PersonMention::mark_all_as_read(conn, person_id);
600 if blocking(context.pool(), update_person_mentions)
604 return Err(ApiError::err("couldnt_update_comment").into());
607 // Mark all private_messages as read
608 let update_pm = move |conn: &'_ _| PrivateMessage::mark_all_as_read(conn, person_id);
609 if blocking(context.pool(), update_pm).await?.is_err() {
610 return Err(ApiError::err("couldnt_update_private_message").into());
613 Ok(GetRepliesResponse { replies: vec![] })
617 #[async_trait::async_trait(?Send)]
618 impl Perform for PasswordReset {
619 type Response = PasswordResetResponse;
623 context: &Data<LemmyContext>,
624 _websocket_id: Option<ConnectionId>,
625 ) -> Result<PasswordResetResponse, LemmyError> {
626 let data: &PasswordReset = &self;
629 let email = data.email.clone();
630 let local_user_view = match blocking(context.pool(), move |conn| {
631 LocalUserView::find_by_email(conn, &email)
636 Err(_e) => return Err(ApiError::err("couldnt_find_that_username_or_email").into()),
639 // Generate a random token
640 let token = generate_random_string();
643 let token2 = token.clone();
644 let local_user_id = local_user_view.local_user.id;
645 blocking(context.pool(), move |conn| {
646 PasswordResetRequest::create_token(conn, local_user_id, &token2)
650 // Email the pure token to the user.
651 // TODO no i18n support here.
652 let email = &local_user_view.local_user.email.expect("email");
653 let subject = &format!("Password reset for {}", local_user_view.person.name);
654 let hostname = &Settings::get().get_protocol_and_hostname();
655 let html = &format!("<h1>Password Reset Request for {}</h1><br><a href={}/password_change/{}>Click here to reset your password</a>", local_user_view.person.name, hostname, &token);
656 match send_email(subject, email, &local_user_view.person.name, html) {
658 Err(_e) => return Err(ApiError::err(&_e).into()),
661 Ok(PasswordResetResponse {})
665 #[async_trait::async_trait(?Send)]
666 impl Perform for PasswordChange {
667 type Response = LoginResponse;
671 context: &Data<LemmyContext>,
672 _websocket_id: Option<ConnectionId>,
673 ) -> Result<LoginResponse, LemmyError> {
674 let data: &PasswordChange = &self;
676 // Fetch the user_id from the token
677 let token = data.token.clone();
678 let local_user_id = blocking(context.pool(), move |conn| {
679 PasswordResetRequest::read_from_token(conn, &token).map(|p| p.local_user_id)
683 password_length_check(&data.password)?;
685 // Make sure passwords match
686 if data.password != data.password_verify {
687 return Err(ApiError::err("passwords_dont_match").into());
690 // Update the user with the new password
691 let password = data.password.clone();
692 let updated_local_user = match blocking(context.pool(), move |conn| {
693 LocalUser::update_password(conn, local_user_id, &password)
698 Err(_e) => return Err(ApiError::err("couldnt_update_user").into()),
703 jwt: Claims::jwt(updated_local_user.id.0)?,
708 #[async_trait::async_trait(?Send)]
709 impl Perform for GetReportCount {
710 type Response = GetReportCountResponse;
714 context: &Data<LemmyContext>,
715 websocket_id: Option<ConnectionId>,
716 ) -> Result<GetReportCountResponse, LemmyError> {
717 let data: &GetReportCount = &self;
718 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
720 let person_id = local_user_view.person.id;
721 let community_id = data.community;
723 collect_moderated_communities(person_id, community_id, context.pool()).await?;
726 if community_ids.is_empty() {
727 GetReportCountResponse {
733 let ids = community_ids.clone();
734 let comment_reports = blocking(context.pool(), move |conn| {
735 CommentReportView::get_report_count(conn, &ids)
739 let ids = community_ids.clone();
740 let post_reports = blocking(context.pool(), move |conn| {
741 PostReportView::get_report_count(conn, &ids)
745 GetReportCountResponse {
746 community: data.community,
753 context.chat_server().do_send(SendUserRoomMessage {
754 op: UserOperation::GetReportCount,
755 response: res.clone(),
756 local_recipient_id: local_user_view.local_user.id,
764 #[async_trait::async_trait(?Send)]
765 impl Perform for GetFollowedCommunities {
766 type Response = GetFollowedCommunitiesResponse;
770 context: &Data<LemmyContext>,
771 _websocket_id: Option<ConnectionId>,
772 ) -> Result<GetFollowedCommunitiesResponse, LemmyError> {
773 let data: &GetFollowedCommunities = &self;
774 let local_user_view = get_local_user_view_from_jwt(&data.auth, context.pool()).await?;
776 let person_id = local_user_view.person.id;
777 let communities = match blocking(context.pool(), move |conn| {
778 CommunityFollowerView::for_person(conn, person_id)
782 Ok(communities) => communities,
783 _ => return Err(ApiError::err("system_err_login").into()),
787 Ok(GetFollowedCommunitiesResponse { communities })