]> Untitled Git - lemmy.git/blob - crates/api_crud/src/site/update.rs
47915e43451aa78c9aeb8b9e8c0b49a4e4f2619f
[lemmy.git] / crates / api_crud / src / site / update.rs
1 use crate::PerformCrud;
2 use actix_web::web::Data;
3 use lemmy_api_common::{
4   site::{EditSite, SiteResponse},
5   utils::{
6     blocking,
7     get_local_user_view_from_jwt,
8     is_admin,
9     local_site_to_slur_regex,
10     site_description_length_check,
11   },
12 };
13 use lemmy_db_schema::{
14   source::{
15     actor_language::SiteLanguage,
16     federation_allowlist::FederationAllowList,
17     federation_blocklist::FederationBlockList,
18     local_site::{LocalSite, LocalSiteUpdateForm},
19     local_site_rate_limit::{LocalSiteRateLimit, LocalSiteRateLimitUpdateForm},
20     local_user::LocalUser,
21     site::{Site, SiteUpdateForm},
22   },
23   traits::Crud,
24   utils::{diesel_option_overwrite, diesel_option_overwrite_to_url, naive_now},
25   ListingType,
26 };
27 use lemmy_db_views::structs::SiteView;
28 use lemmy_utils::{
29   error::LemmyError,
30   utils::{check_application_question, check_slurs_opt},
31   ConnectionId,
32 };
33 use lemmy_websocket::{messages::SendAllMessage, LemmyContext, UserOperationCrud};
34 use std::str::FromStr;
35
36 #[async_trait::async_trait(?Send)]
37 impl PerformCrud for EditSite {
38   type Response = SiteResponse;
39
40   #[tracing::instrument(skip(context, websocket_id))]
41   async fn perform(
42     &self,
43     context: &Data<LemmyContext>,
44     websocket_id: Option<ConnectionId>,
45   ) -> Result<SiteResponse, LemmyError> {
46     let data: &EditSite = self;
47     let local_user_view =
48       get_local_user_view_from_jwt(&data.auth, context.pool(), context.secret()).await?;
49     let local_site = blocking(context.pool(), LocalSite::read).await??;
50
51     // Make sure user is an admin
52     is_admin(&local_user_view)?;
53
54     let slur_regex = local_site_to_slur_regex(&local_site);
55
56     check_slurs_opt(&data.name, &slur_regex)?;
57     check_slurs_opt(&data.description, &slur_regex)?;
58
59     if let Some(desc) = &data.description {
60       site_description_length_check(desc)?;
61     }
62
63     let application_question = diesel_option_overwrite(&data.application_question);
64     check_application_question(&application_question, &data.require_application)?;
65
66     if let Some(default_post_listing_type) = &data.default_post_listing_type {
67       // only allow all or local as default listing types
68       let val = ListingType::from_str(default_post_listing_type);
69       if val != Ok(ListingType::All) && val != Ok(ListingType::Local) {
70         return Err(LemmyError::from_message(
71           "invalid_default_post_listing_type",
72         ));
73       }
74     }
75
76     let site_id = local_site.site_id;
77     if let Some(discussion_languages) = data.discussion_languages.clone() {
78       blocking(context.pool(), move |conn| {
79         SiteLanguage::update(conn, discussion_languages.clone(), site_id)
80       })
81       .await??;
82     }
83
84     let name = data.name.to_owned();
85     let site_form = SiteUpdateForm::builder()
86       .name(name)
87       .sidebar(diesel_option_overwrite(&data.sidebar))
88       .description(diesel_option_overwrite(&data.description))
89       .icon(diesel_option_overwrite_to_url(&data.icon)?)
90       .banner(diesel_option_overwrite_to_url(&data.banner)?)
91       .updated(Some(Some(naive_now())))
92       .build();
93
94     blocking(context.pool(), move |conn| {
95       Site::update(conn, site_id, &site_form)
96     })
97     .await
98     // Ignore errors for all these, so as to not throw errors if no update occurs
99     // Diesel will throw an error for empty update forms
100     .ok();
101
102     let local_site_form = LocalSiteUpdateForm::builder()
103       .enable_downvotes(data.enable_downvotes)
104       .open_registration(data.open_registration)
105       .enable_nsfw(data.enable_nsfw)
106       .community_creation_admin_only(data.community_creation_admin_only)
107       .require_email_verification(data.require_email_verification)
108       .require_application(data.require_application)
109       .application_question(application_question)
110       .private_instance(data.private_instance)
111       .default_theme(data.default_theme.clone())
112       .default_post_listing_type(data.default_post_listing_type.clone())
113       .legal_information(diesel_option_overwrite(&data.legal_information))
114       .application_email_admins(data.application_email_admins)
115       .hide_modlog_mod_names(data.hide_modlog_mod_names)
116       .updated(Some(Some(naive_now())))
117       .slur_filter_regex(diesel_option_overwrite(&data.slur_filter_regex))
118       .actor_name_max_length(data.actor_name_max_length)
119       .federation_enabled(data.federation_enabled)
120       .federation_debug(data.federation_debug)
121       .federation_strict_allowlist(data.federation_strict_allowlist)
122       .federation_http_fetch_retry_limit(data.federation_http_fetch_retry_limit)
123       .federation_worker_count(data.federation_worker_count)
124       .captcha_enabled(data.captcha_enabled)
125       .captcha_difficulty(data.captcha_difficulty.to_owned())
126       .build();
127
128     let update_local_site = blocking(context.pool(), move |conn| {
129       LocalSite::update(conn, &local_site_form)
130     })
131     .await
132     .ok();
133
134     let local_site_rate_limit_form = LocalSiteRateLimitUpdateForm::builder()
135       .message(data.rate_limit_message)
136       .message_per_second(data.rate_limit_message_per_second)
137       .post(data.rate_limit_post)
138       .post_per_second(data.rate_limit_post_per_second)
139       .register(data.rate_limit_register)
140       .register_per_second(data.rate_limit_register_per_second)
141       .image(data.rate_limit_image)
142       .image_per_second(data.rate_limit_image_per_second)
143       .comment(data.rate_limit_comment)
144       .comment_per_second(data.rate_limit_comment_per_second)
145       .search(data.rate_limit_search)
146       .search_per_second(data.rate_limit_search_per_second)
147       .build();
148
149     blocking(context.pool(), move |conn| {
150       LocalSiteRateLimit::update(conn, &local_site_rate_limit_form)
151     })
152     .await
153     .ok();
154
155     // Replace the blocked and allowed instances
156     let allowed = data.allowed_instances.to_owned();
157     blocking(context.pool(), move |conn| {
158       FederationAllowList::replace(conn, allowed)
159     })
160     .await??;
161     let blocked = data.blocked_instances.to_owned();
162     blocking(context.pool(), move |conn| {
163       FederationBlockList::replace(conn, blocked)
164     })
165     .await??;
166
167     // TODO can't think of a better way to do this.
168     // If the server suddenly requires email verification, or required applications, no old users
169     // will be able to log in. It really only wants this to be a requirement for NEW signups.
170     // So if it was set from false, to true, you need to update all current users columns to be verified.
171
172     let new_require_application = update_local_site
173       .as_ref()
174       .map(|ols| {
175         ols
176           .as_ref()
177           .map(|ls| ls.require_application)
178           .unwrap_or(false)
179       })
180       .unwrap_or(false);
181     if !local_site.require_application && new_require_application {
182       blocking(context.pool(), move |conn| {
183         LocalUser::set_all_users_registration_applications_accepted(conn)
184       })
185       .await?
186       .map_err(|e| LemmyError::from_error_message(e, "couldnt_set_all_registrations_accepted"))?;
187     }
188
189     let new_require_email_verification = update_local_site
190       .as_ref()
191       .map(|ols| {
192         ols
193           .as_ref()
194           .map(|ls| ls.require_email_verification)
195           .unwrap_or(false)
196       })
197       .unwrap_or(false);
198     if !local_site.require_email_verification && new_require_email_verification {
199       blocking(context.pool(), move |conn| {
200         LocalUser::set_all_users_email_verified(conn)
201       })
202       .await?
203       .map_err(|e| LemmyError::from_error_message(e, "couldnt_set_all_email_verified"))?;
204     }
205
206     let site_view = blocking(context.pool(), SiteView::read_local).await??;
207
208     let res = SiteResponse { site_view };
209
210     context.chat_server().do_send(SendAllMessage {
211       op: UserOperationCrud::EditSite,
212       response: res.clone(),
213       websocket_id,
214     });
215
216     Ok(res)
217   }
218 }