3 block::{generate_cc, SiteOrCommunity},
4 community::{announce::GetCommunity, send_activity_in_community},
9 verify_person_in_community,
11 activity_lists::AnnouncableActivities,
13 objects::{community::ApubCommunity, instance::remote_instance_inboxes, person::ApubPerson},
14 protocol::activities::block::block_user::BlockUser,
17 use activitypub_federation::{
18 core::object_id::ObjectId,
20 traits::{ActivityHandler, Actor},
21 utils::verify_domains_match,
23 use activitystreams_kinds::{activity::BlockType, public};
25 use chrono::NaiveDateTime;
26 use lemmy_api_common::utils::{blocking, remove_user_data, remove_user_data_in_community};
27 use lemmy_db_schema::{
31 CommunityFollowerForm,
33 CommunityPersonBanForm,
35 moderator::{ModBan, ModBanForm, ModBanFromCommunity, ModBanFromCommunityForm},
38 traits::{Bannable, Crud, Followable},
40 use lemmy_utils::{error::LemmyError, utils::convert_datetime};
41 use lemmy_websocket::LemmyContext;
45 pub(in crate::activities::block) async fn new(
46 target: &SiteOrCommunity,
49 remove_data: Option<bool>,
50 reason: Option<String>,
51 expires: Option<NaiveDateTime>,
52 context: &LemmyContext,
53 ) -> Result<BlockUser, LemmyError> {
55 actor: ObjectId::new(mod_.actor_id()),
57 object: ObjectId::new(user.actor_id()),
58 cc: generate_cc(target, context.pool()).await?,
60 kind: BlockType::Block,
63 id: generate_activity_id(
65 &context.settings().get_protocol_and_hostname(),
67 expires: expires.map(convert_datetime),
68 unparsed: Default::default(),
72 #[tracing::instrument(skip_all)]
74 target: &SiteOrCommunity,
78 reason: Option<String>,
79 expires: Option<NaiveDateTime>,
80 context: &LemmyContext,
81 ) -> Result<(), LemmyError> {
82 let block = BlockUser::new(
94 SiteOrCommunity::Site(_) => {
95 let inboxes = remote_instance_inboxes(context.pool()).await?;
96 send_lemmy_activity(context, block, mod_, inboxes, false).await
98 SiteOrCommunity::Community(c) => {
99 let activity = AnnouncableActivities::BlockUser(block);
100 let inboxes = vec![user.shared_inbox_or_inbox()];
101 send_activity_in_community(activity, mod_, c, inboxes, context).await
107 #[async_trait::async_trait(?Send)]
108 impl ActivityHandler for BlockUser {
109 type DataType = LemmyContext;
110 type Error = LemmyError;
112 fn id(&self) -> &Url {
116 fn actor(&self) -> &Url {
120 #[tracing::instrument(skip_all)]
123 context: &Data<LemmyContext>,
124 request_counter: &mut i32,
125 ) -> Result<(), LemmyError> {
126 verify_is_public(&self.to, &self.cc)?;
129 .dereference(context, local_instance(context), request_counter)
132 SiteOrCommunity::Site(site) => {
133 let domain = self.object.inner().domain().expect("url needs domain");
134 if context.settings().hostname == domain {
136 anyhow!("Site bans from remote instance can't affect user's home instance").into(),
139 // site ban can only target a user who is on the same instance as the actor (admin)
140 verify_domains_match(&site.actor_id(), self.actor.inner())?;
141 verify_domains_match(&site.actor_id(), self.object.inner())?;
143 SiteOrCommunity::Community(community) => {
144 verify_person_in_community(&self.actor, &community, context, request_counter).await?;
158 #[tracing::instrument(skip_all)]
161 context: &Data<LemmyContext>,
162 request_counter: &mut i32,
163 ) -> Result<(), LemmyError> {
164 let expires = self.expires.map(|u| u.naive_local());
165 let mod_person = self
167 .dereference(context, local_instance(context), request_counter)
169 let blocked_person = self
171 .dereference(context, local_instance(context), request_counter)
175 .dereference(context, local_instance(context), request_counter)
178 SiteOrCommunity::Site(_site) => {
179 let blocked_person = blocking(context.pool(), move |conn| {
180 Person::ban_person(conn, blocked_person.id, true, expires)
183 if self.remove_data.unwrap_or(false) {
194 let form = ModBanForm {
195 mod_person_id: mod_person.id,
196 other_person_id: blocked_person.id,
197 reason: self.summary,
201 blocking(context.pool(), move |conn| ModBan::create(conn, &form)).await??;
203 SiteOrCommunity::Community(community) => {
204 let community_user_ban_form = CommunityPersonBanForm {
205 community_id: community.id,
206 person_id: blocked_person.id,
207 expires: Some(expires),
209 blocking(context.pool(), move |conn| {
210 CommunityPersonBan::ban(conn, &community_user_ban_form)
214 // Also unsubscribe them from the community, if they are subscribed
215 let community_follower_form = CommunityFollowerForm {
216 community_id: community.id,
217 person_id: blocked_person.id,
220 blocking(context.pool(), move |conn: &mut _| {
221 CommunityFollower::unfollow(conn, &community_follower_form)
226 if self.remove_data.unwrap_or(false) {
227 remove_user_data_in_community(community.id, blocked_person.id, context.pool()).await?;
231 let form = ModBanFromCommunityForm {
232 mod_person_id: mod_person.id,
233 other_person_id: blocked_person.id,
234 community_id: community.id,
235 reason: self.summary,
239 blocking(context.pool(), move |conn| {
240 ModBanFromCommunity::create(conn, &form)
250 #[async_trait::async_trait(?Send)]
251 impl GetCommunity for BlockUser {
252 #[tracing::instrument(skip_all)]
253 async fn get_community(
255 context: &LemmyContext,
256 request_counter: &mut i32,
257 ) -> Result<ApubCommunity, LemmyError> {
260 .dereference(context, local_instance(context), request_counter)
263 SiteOrCommunity::Community(c) => Ok(c),
264 SiteOrCommunity::Site(_) => Err(anyhow!("Calling get_community() on site activity").into()),