3 block::{generate_cc, generate_instance_inboxes, SiteOrCommunity},
4 community::{announce::GetCommunity, send_activity_in_community},
9 verify_person_in_community,
11 activity_lists::AnnouncableActivities,
13 objects::{community::ApubCommunity, person::ApubPerson},
14 protocol::activities::block::block_user::BlockUser,
17 use activitypub_federation::{
18 core::object_id::ObjectId,
20 traits::ActivityHandler,
21 utils::verify_domains_match,
23 use activitystreams_kinds::{activity::BlockType, public};
25 use chrono::NaiveDateTime;
26 use lemmy_api_common::utils::{blocking, remove_user_data, remove_user_data_in_community};
27 use lemmy_db_schema::{
31 CommunityFollowerForm,
33 CommunityPersonBanForm,
35 moderator::{ModBan, ModBanForm, ModBanFromCommunity, ModBanFromCommunityForm},
38 traits::{Bannable, Crud, Followable},
40 use lemmy_utils::{error::LemmyError, settings::structs::Settings, utils::convert_datetime};
41 use lemmy_websocket::LemmyContext;
45 pub(in crate::activities::block) async fn new(
46 target: &SiteOrCommunity,
49 remove_data: Option<bool>,
50 reason: Option<String>,
51 expires: Option<NaiveDateTime>,
52 context: &LemmyContext,
53 ) -> Result<BlockUser, LemmyError> {
55 actor: ObjectId::new(mod_.actor_id()),
57 object: ObjectId::new(user.actor_id()),
58 cc: generate_cc(target, context.pool()).await?,
60 kind: BlockType::Block,
63 id: generate_activity_id(
65 &context.settings().get_protocol_and_hostname(),
67 expires: expires.map(convert_datetime),
68 unparsed: Default::default(),
72 #[tracing::instrument(skip_all)]
74 target: &SiteOrCommunity,
78 reason: Option<String>,
79 expires: Option<NaiveDateTime>,
80 context: &LemmyContext,
81 ) -> Result<(), LemmyError> {
82 let block = BlockUser::new(
92 let block_id = block.id.clone();
95 SiteOrCommunity::Site(_) => {
96 let inboxes = generate_instance_inboxes(user, context.pool()).await?;
97 send_lemmy_activity(context, &block, &block_id, mod_, inboxes, false).await
99 SiteOrCommunity::Community(c) => {
100 let activity = AnnouncableActivities::BlockUser(block);
101 let inboxes = vec![user.shared_inbox_or_inbox_url()];
102 send_activity_in_community(activity, &block_id, mod_, c, inboxes, context).await
108 #[async_trait::async_trait(?Send)]
109 impl ActivityHandler for BlockUser {
110 type DataType = LemmyContext;
111 type Error = LemmyError;
113 fn id(&self) -> &Url {
117 fn actor(&self) -> &Url {
121 #[tracing::instrument(skip_all)]
124 context: &Data<LemmyContext>,
125 request_counter: &mut i32,
126 ) -> Result<(), LemmyError> {
127 verify_is_public(&self.to, &self.cc)?;
130 .dereference::<LemmyError>(context, local_instance(context), request_counter)
133 SiteOrCommunity::Site(site) => {
134 let domain = self.object.inner().domain().expect("url needs domain");
135 if Settings::get().hostname == domain {
137 anyhow!("Site bans from remote instance can't affect user's home instance").into(),
140 // site ban can only target a user who is on the same instance as the actor (admin)
141 verify_domains_match(&site.actor_id(), self.actor.inner())?;
142 verify_domains_match(&site.actor_id(), self.object.inner())?;
144 SiteOrCommunity::Community(community) => {
145 verify_person_in_community(&self.actor, &community, context, request_counter).await?;
159 #[tracing::instrument(skip_all)]
162 context: &Data<LemmyContext>,
163 request_counter: &mut i32,
164 ) -> Result<(), LemmyError> {
165 let expires = self.expires.map(|u| u.naive_local());
166 let mod_person = self
168 .dereference::<LemmyError>(context, local_instance(context), request_counter)
170 let blocked_person = self
172 .dereference::<LemmyError>(context, local_instance(context), request_counter)
176 .dereference::<LemmyError>(context, local_instance(context), request_counter)
179 SiteOrCommunity::Site(_site) => {
180 let blocked_person = blocking(context.pool(), move |conn| {
181 Person::ban_person(conn, blocked_person.id, true, expires)
184 if self.remove_data.unwrap_or(false) {
185 remove_user_data(blocked_person.id, context.pool()).await?;
189 let form = ModBanForm {
190 mod_person_id: mod_person.id,
191 other_person_id: blocked_person.id,
192 reason: self.summary,
196 blocking(context.pool(), move |conn| ModBan::create(conn, &form)).await??;
198 SiteOrCommunity::Community(community) => {
199 let community_user_ban_form = CommunityPersonBanForm {
200 community_id: community.id,
201 person_id: blocked_person.id,
202 expires: Some(expires),
204 blocking(context.pool(), move |conn| {
205 CommunityPersonBan::ban(conn, &community_user_ban_form)
209 // Also unsubscribe them from the community, if they are subscribed
210 let community_follower_form = CommunityFollowerForm {
211 community_id: community.id,
212 person_id: blocked_person.id,
215 blocking(context.pool(), move |conn: &'_ _| {
216 CommunityFollower::unfollow(conn, &community_follower_form)
221 if self.remove_data.unwrap_or(false) {
222 remove_user_data_in_community(community.id, blocked_person.id, context.pool()).await?;
226 let form = ModBanFromCommunityForm {
227 mod_person_id: mod_person.id,
228 other_person_id: blocked_person.id,
229 community_id: community.id,
230 reason: self.summary,
234 blocking(context.pool(), move |conn| {
235 ModBanFromCommunity::create(conn, &form)
245 #[async_trait::async_trait(?Send)]
246 impl GetCommunity for BlockUser {
247 #[tracing::instrument(skip_all)]
248 async fn get_community(
250 context: &LemmyContext,
251 request_counter: &mut i32,
252 ) -> Result<ApubCommunity, LemmyError> {
255 .dereference::<LemmyError>(context, local_instance(context), request_counter)
258 SiteOrCommunity::Community(c) => Ok(c),
259 SiteOrCommunity::Site(_) => Err(anyhow!("Calling get_community() on site activity").into()),