1 use crate::protocol::Source;
2 use activitypub_federation::deser::values::MediaTypeMarkdownOrHtml;
4 use html2md::parse_html;
5 use lemmy_utils::{error::LemmyError, settings::structs::Settings};
13 pub mod private_message;
15 pub(crate) fn read_from_string_or_source(
17 media_type: &Option<MediaTypeMarkdownOrHtml>,
18 source: &Option<Source>,
20 if let Some(s) = source {
21 // markdown sent by lemmy in source field
23 } else if media_type == &Some(MediaTypeMarkdownOrHtml::Markdown) {
24 // markdown sent by peertube in content field
27 // otherwise, convert content html to markdown
32 pub(crate) fn read_from_string_or_source_opt(
33 content: &Option<String>,
34 media_type: &Option<MediaTypeMarkdownOrHtml>,
35 source: &Option<Source>,
39 .map(|content| read_from_string_or_source(content, media_type, source))
42 /// When for example a Post is made in a remote community, the community will send it back,
43 /// wrapped in Announce. If we simply receive this like any other federated object, overwrite the
44 /// existing, local Post. In particular, it will set the field local = false, so that the object
45 /// can't be fetched from the Activitypub HTTP endpoint anymore (which only serves local objects).
46 pub(crate) fn verify_is_remote_object(id: &Url) -> Result<(), LemmyError> {
47 let local_domain = Settings::get().get_hostname_without_port()?;
48 if id.domain() == Some(&local_domain) {
49 Err(anyhow!("cant accept local object from remote instance").into())
56 pub(crate) mod tests {
60 r2d2::{ConnectionManager, Pool},
63 use lemmy_api_common::request::build_user_agent;
64 use lemmy_db_schema::{
65 source::secret::Secret,
66 utils::{establish_unpooled_connection, get_database_url_from_env},
70 rate_limit::{rate_limiter::RateLimiter, RateLimit},
71 settings::structs::Settings,
73 use lemmy_websocket::{chat_server::ChatServer, LemmyContext};
74 use parking_lot::Mutex;
75 use reqwest::{Client, Request, Response};
76 use reqwest_middleware::{ClientBuilder, Middleware, Next};
78 use task_local_extensions::Extensions;
80 struct BlockedMiddleware;
82 /// A reqwest middleware which blocks all requests
83 #[async_trait::async_trait]
84 impl Middleware for BlockedMiddleware {
88 _extensions: &mut Extensions,
90 ) -> reqwest_middleware::Result<Response> {
91 Err(anyhow!("Network requests not allowed").into())
95 // TODO: would be nice if we didnt have to use a full context for tests.
96 pub(crate) fn init_context() -> LemmyContext {
97 // call this to run migrations
98 establish_unpooled_connection();
99 let settings = Settings::init().unwrap();
100 let rate_limiter = RateLimit {
101 rate_limiter: Arc::new(Mutex::new(RateLimiter::default())),
102 rate_limit_config: settings.rate_limit.to_owned().unwrap_or_default(),
104 let client = Client::builder()
105 .user_agent(build_user_agent(&settings))
109 let client = ClientBuilder::new(client).with(BlockedMiddleware).build();
110 let secret = Secret {
112 jwt_secret: "".to_string(),
114 let db_url = match get_database_url_from_env() {
116 Err(_) => settings.get_database_url(),
118 let manager = ConnectionManager::<PgConnection>::new(&db_url);
119 let pool = Pool::builder()
120 .max_size(settings.database.pool_size)
122 .unwrap_or_else(|_| panic!("Error connecting to {}", db_url));
123 async fn x() -> Result<String, LemmyError> {
126 let chat_server = ChatServer::startup(
129 |_, _, _, _| Box::pin(x()),
130 |_, _, _, _| Box::pin(x()),
136 LemmyContext::create(pool, chat_server, client, settings, secret)