1 use crate::protocol::Source;
2 use activitypub_federation::protocol::values::MediaTypeMarkdownOrHtml;
4 use html2md::parse_html;
5 use lemmy_utils::{error::LemmyError, settings::structs::Settings};
13 pub mod private_message;
15 pub(crate) fn read_from_string_or_source(
17 media_type: &Option<MediaTypeMarkdownOrHtml>,
18 source: &Option<Source>,
20 if let Some(s) = source {
21 // markdown sent by lemmy in source field
23 } else if media_type == &Some(MediaTypeMarkdownOrHtml::Markdown) {
24 // markdown sent by peertube in content field
27 // otherwise, convert content html to markdown
32 pub(crate) fn read_from_string_or_source_opt(
33 content: &Option<String>,
34 media_type: &Option<MediaTypeMarkdownOrHtml>,
35 source: &Option<Source>,
39 .map(|content| read_from_string_or_source(content, media_type, source))
42 /// When for example a Post is made in a remote community, the community will send it back,
43 /// wrapped in Announce. If we simply receive this like any other federated object, overwrite the
44 /// existing, local Post. In particular, it will set the field local = false, so that the object
45 /// can't be fetched from the Activitypub HTTP endpoint anymore (which only serves local objects).
46 pub(crate) fn verify_is_remote_object(id: &Url, settings: &Settings) -> Result<(), LemmyError> {
47 let local_domain = settings.get_hostname_without_port()?;
48 if id.domain() == Some(&local_domain) {
49 Err(anyhow!("cant accept local object from remote instance").into())
56 pub(crate) mod tests {
57 #![allow(clippy::unwrap_used)]
58 #![allow(clippy::indexing_slicing)]
60 use activitypub_federation::config::{Data, FederationConfig};
62 use lemmy_api_common::{context::LemmyContext, request::build_user_agent};
63 use lemmy_db_schema::{source::secret::Secret, utils::build_db_pool_for_tests};
65 rate_limit::{RateLimitCell, RateLimitConfig},
68 use reqwest::{Client, Request, Response};
69 use reqwest_middleware::{ClientBuilder, Middleware, Next};
70 use task_local_extensions::Extensions;
72 struct BlockedMiddleware;
74 /// A reqwest middleware which blocks all requests
75 #[async_trait::async_trait]
76 impl Middleware for BlockedMiddleware {
80 _extensions: &mut Extensions,
82 ) -> reqwest_middleware::Result<Response> {
83 Err(anyhow!("Network requests not allowed").into())
87 // TODO: would be nice if we didnt have to use a full context for tests.
88 pub(crate) async fn init_context() -> Data<LemmyContext> {
89 // call this to run migrations
90 let pool = build_db_pool_for_tests().await;
92 let settings = SETTINGS.clone();
93 let client = Client::builder()
94 .user_agent(build_user_agent(&settings))
98 let client = ClientBuilder::new(client).with(BlockedMiddleware).build();
101 jwt_secret: String::new(),
104 let rate_limit_config = RateLimitConfig::builder().build();
105 let rate_limit_cell = RateLimitCell::new(rate_limit_config).await;
107 let context = LemmyContext::create(pool, client, secret, rate_limit_cell.clone());
108 let config = FederationConfig::builder()
109 .domain("example.com")
114 config.to_request_data()