1 use crate::PerformCrud;
2 use activitypub_federation::http_signatures::generate_actor_keypair;
3 use actix_web::web::Data;
4 use lemmy_api_common::{
6 person::{LoginResponse, Register},
9 generate_local_apub_endpoint,
10 generate_shared_inbox_url,
12 local_site_to_slur_regex,
13 password_length_check,
14 send_new_applicant_email_to_admins,
15 send_verification_email,
19 use lemmy_db_schema::{
20 aggregates::structs::PersonAggregates,
22 local_user::{LocalUser, LocalUserInsertForm},
23 person::{Person, PersonInsertForm},
24 registration_application::{RegistrationApplication, RegistrationApplicationInsertForm},
29 use lemmy_db_views::structs::{LocalUserView, SiteView};
34 slurs::{check_slurs, check_slurs_opt},
35 validation::is_valid_actor_name,
39 #[async_trait::async_trait(?Send)]
40 impl PerformCrud for Register {
41 type Response = LoginResponse;
43 #[tracing::instrument(skip(self, context))]
44 async fn perform(&self, context: &Data<LemmyContext>) -> Result<LoginResponse, LemmyError> {
45 let data: &Register = self;
47 let site_view = SiteView::read_local(context.pool()).await?;
48 let local_site = site_view.local_site;
49 let require_registration_application =
50 local_site.registration_mode == RegistrationMode::RequireApplication;
52 if local_site.registration_mode == RegistrationMode::Closed {
53 return Err(LemmyError::from_message("registration_closed"));
56 password_length_check(&data.password)?;
57 honeypot_check(&data.honeypot)?;
59 if local_site.require_email_verification && data.email.is_none() {
60 return Err(LemmyError::from_message("email_required"));
63 if local_site.site_setup && require_registration_application && data.answer.is_none() {
64 return Err(LemmyError::from_message(
65 "registration_application_answer_required",
69 // Make sure passwords match
70 if data.password != data.password_verify {
71 return Err(LemmyError::from_message("passwords_dont_match"));
74 let slur_regex = local_site_to_slur_regex(&local_site);
75 check_slurs(&data.username, &slur_regex)?;
76 check_slurs_opt(&data.answer, &slur_regex)?;
78 let actor_keypair = generate_actor_keypair()?;
79 is_valid_actor_name(&data.username, local_site.actor_name_max_length as usize)?;
80 let actor_id = generate_local_apub_endpoint(
83 &context.settings().get_protocol_and_hostname(),
86 // We have to create both a person, and local_user
88 // Register the new person
89 let person_form = PersonInsertForm::builder()
90 .name(data.username.clone())
91 .actor_id(Some(actor_id.clone()))
92 .private_key(Some(actor_keypair.private_key))
93 .public_key(actor_keypair.public_key)
94 .inbox_url(Some(generate_inbox_url(&actor_id)?))
95 .shared_inbox_url(Some(generate_shared_inbox_url(&actor_id)?))
96 // If its the initial site setup, they are an admin
97 .admin(Some(!local_site.site_setup))
98 .instance_id(site_view.site.instance_id)
102 let inserted_person = Person::create(context.pool(), &person_form)
104 .map_err(|e| LemmyError::from_error_message(e, "user_already_exists"))?;
106 // Create the local user
107 let local_user_form = LocalUserInsertForm::builder()
108 .person_id(inserted_person.id)
109 .email(data.email.as_deref().map(str::to_lowercase))
110 .password_encrypted(data.password.to_string())
111 .show_nsfw(Some(data.show_nsfw))
114 let inserted_local_user = match LocalUser::create(context.pool(), &local_user_form).await {
117 let err_type = if e.to_string()
118 == "duplicate key value violates unique constraint \"local_user_email_key\""
120 "email_already_exists"
122 "user_already_exists"
125 // If the local user creation errored, then delete that person
126 Person::delete(context.pool(), inserted_person.id).await?;
128 return Err(LemmyError::from_error_message(e, err_type));
132 if local_site.site_setup && require_registration_application {
133 // Create the registration application
134 let form = RegistrationApplicationInsertForm {
135 local_user_id: inserted_local_user.id,
136 // We already made sure answer was not null above
137 answer: data.answer.clone().expect("must have an answer"),
140 RegistrationApplication::create(context.pool(), &form).await?;
144 if local_site.application_email_admins {
145 send_new_applicant_email_to_admins(&data.username, context.pool(), context.settings())
149 let mut login_response = LoginResponse {
151 registration_created: false,
152 verify_email_sent: false,
155 // Log the user in directly if the site is not setup, or email verification and application aren't required
156 if !local_site.site_setup
157 || (!require_registration_application && !local_site.require_email_verification)
159 login_response.jwt = Some(
161 inserted_local_user.id.0,
162 &context.secret().jwt_secret,
163 &context.settings().hostname,
168 if local_site.require_email_verification {
169 let local_user_view = LocalUserView {
170 local_user: inserted_local_user,
171 person: inserted_person,
172 counts: PersonAggregates::default(),
174 // we check at the beginning of this method that email is set
175 let email = local_user_view
179 .expect("email was provided");
181 send_verification_email(&local_user_view, &email, context.pool(), context.settings())
183 login_response.verify_email_sent = true;
186 if require_registration_application {
187 login_response.registration_created = true;