2 check_apub_id_valid_with_strictness,
4 objects::read_from_string_or_source,
6 objects::chat_message::{ChatMessage, ChatMessageType},
10 use activitypub_federation::{
11 core::object_id::ObjectId,
12 deser::values::MediaTypeHtml,
14 utils::verify_domains_match,
16 use chrono::NaiveDateTime;
17 use lemmy_api_common::utils::{blocking, check_person_block};
18 use lemmy_db_schema::{
21 private_message::{PrivateMessage, PrivateMessageForm},
27 utils::{convert_datetime, markdown_to_html},
29 use lemmy_websocket::LemmyContext;
33 #[derive(Clone, Debug)]
34 pub struct ApubPrivateMessage(PrivateMessage);
36 impl Deref for ApubPrivateMessage {
37 type Target = PrivateMessage;
38 fn deref(&self) -> &Self::Target {
43 impl From<PrivateMessage> for ApubPrivateMessage {
44 fn from(pm: PrivateMessage) -> Self {
45 ApubPrivateMessage(pm)
49 #[async_trait::async_trait(?Send)]
50 impl ApubObject for ApubPrivateMessage {
51 type DataType = LemmyContext;
52 type ApubType = ChatMessage;
53 type DbType = PrivateMessage;
54 type Error = LemmyError;
56 fn last_refreshed_at(&self) -> Option<NaiveDateTime> {
60 #[tracing::instrument(skip_all)]
61 async fn read_from_apub_id(
63 context: &LemmyContext,
64 ) -> Result<Option<Self>, LemmyError> {
66 blocking(context.pool(), move |conn| {
67 PrivateMessage::read_from_apub_id(conn, object_id)
74 async fn delete(self, _context: &LemmyContext) -> Result<(), LemmyError> {
75 // do nothing, because pm can't be fetched over http
79 #[tracing::instrument(skip_all)]
80 async fn into_apub(self, context: &LemmyContext) -> Result<ChatMessage, LemmyError> {
81 let creator_id = self.creator_id;
82 let creator = blocking(context.pool(), move |conn| Person::read(conn, creator_id)).await??;
84 let recipient_id = self.recipient_id;
86 blocking(context.pool(), move |conn| Person::read(conn, recipient_id)).await??;
88 let note = ChatMessage {
89 r#type: ChatMessageType::ChatMessage,
90 id: ObjectId::new(self.ap_id.clone()),
91 attributed_to: ObjectId::new(creator.actor_id),
92 to: [ObjectId::new(recipient.actor_id)],
93 content: markdown_to_html(&self.content),
94 media_type: Some(MediaTypeHtml::Html),
95 source: Some(Source::new(self.content.clone())),
96 published: Some(convert_datetime(self.published)),
97 updated: self.updated.map(convert_datetime),
102 #[tracing::instrument(skip_all)]
105 expected_domain: &Url,
106 context: &LemmyContext,
107 request_counter: &mut i32,
108 ) -> Result<(), LemmyError> {
109 verify_domains_match(note.id.inner(), expected_domain)?;
110 verify_domains_match(note.attributed_to.inner(), note.id.inner())?;
111 check_apub_id_valid_with_strictness(note.id.inner(), false, context.settings())?;
114 .dereference(context, local_instance(context), request_counter)
117 return Err(LemmyError::from_message("Person is banned from site"));
122 #[tracing::instrument(skip_all)]
125 context: &LemmyContext,
126 request_counter: &mut i32,
127 ) -> Result<ApubPrivateMessage, LemmyError> {
130 .dereference(context, local_instance(context), request_counter)
132 let recipient = note.to[0]
133 .dereference(context, local_instance(context), request_counter)
135 check_person_block(creator.id, recipient.id, context.pool()).await?;
137 let form = PrivateMessageForm {
138 creator_id: creator.id,
139 recipient_id: recipient.id,
140 content: read_from_string_or_source(¬e.content, &None, ¬e.source),
141 published: note.published.map(|u| u.naive_local()),
142 updated: note.updated.map(|u| u.naive_local()),
145 ap_id: Some(note.id.into()),
148 let pm = blocking(context.pool(), move |conn| {
149 PrivateMessage::upsert(conn, &form)
161 instance::{tests::parse_lemmy_instance, ApubSite},
165 protocol::tests::file_to_json_object,
167 use assert_json_diff::assert_json_include;
168 use lemmy_db_schema::source::site::Site;
169 use serial_test::serial;
171 async fn prepare_comment_test(
173 context: &LemmyContext,
174 ) -> (ApubPerson, ApubPerson, ApubSite) {
175 let lemmy_person = file_to_json_object("assets/lemmy/objects/person.json").unwrap();
176 let site = parse_lemmy_instance(context).await;
177 ApubPerson::verify(&lemmy_person, url, context, &mut 0)
180 let person1 = ApubPerson::from_apub(lemmy_person, context, &mut 0)
183 let pleroma_person = file_to_json_object("assets/pleroma/objects/person.json").unwrap();
184 let pleroma_url = Url::parse("https://queer.hacktivis.me/users/lanodan").unwrap();
185 ApubPerson::verify(&pleroma_person, &pleroma_url, context, &mut 0)
188 let person2 = ApubPerson::from_apub(pleroma_person, context, &mut 0)
191 (person1, person2, site)
194 fn cleanup(data: (ApubPerson, ApubPerson, ApubSite), context: &LemmyContext) {
195 let conn = &mut context.pool().get().unwrap();
196 Person::delete(conn, data.0.id).unwrap();
197 Person::delete(conn, data.1.id).unwrap();
198 Site::delete(conn, data.2.id).unwrap();
203 async fn test_parse_lemmy_pm() {
204 let context = init_context();
205 let conn = &mut context.pool().get().unwrap();
206 let url = Url::parse("https://enterprise.lemmy.ml/private_message/1621").unwrap();
207 let data = prepare_comment_test(&url, &context).await;
208 let json: ChatMessage = file_to_json_object("assets/lemmy/objects/chat_message.json").unwrap();
209 let mut request_counter = 0;
210 ApubPrivateMessage::verify(&json, &url, &context, &mut request_counter)
213 let pm = ApubPrivateMessage::from_apub(json.clone(), &context, &mut request_counter)
217 assert_eq!(pm.ap_id.clone(), url.into());
218 assert_eq!(pm.content.len(), 20);
219 assert_eq!(request_counter, 0);
222 let to_apub = pm.into_apub(&context).await.unwrap();
223 assert_json_include!(actual: json, expected: to_apub);
225 PrivateMessage::delete(conn, pm_id).unwrap();
226 cleanup(data, &context);
231 async fn test_parse_pleroma_pm() {
232 let context = init_context();
233 let conn = &mut context.pool().get().unwrap();
234 let url = Url::parse("https://enterprise.lemmy.ml/private_message/1621").unwrap();
235 let data = prepare_comment_test(&url, &context).await;
236 let pleroma_url = Url::parse("https://queer.hacktivis.me/objects/2").unwrap();
237 let json = file_to_json_object("assets/pleroma/objects/chat_message.json").unwrap();
238 let mut request_counter = 0;
239 ApubPrivateMessage::verify(&json, &pleroma_url, &context, &mut request_counter)
242 let pm = ApubPrivateMessage::from_apub(json, &context, &mut request_counter)
246 assert_eq!(pm.ap_id, pleroma_url.into());
247 assert_eq!(pm.content.len(), 3);
248 assert_eq!(request_counter, 0);
250 PrivateMessage::delete(conn, pm.id).unwrap();
251 cleanup(data, &context);