2 pub extern crate diesel;
3 pub extern crate dotenv;
4 pub extern crate chrono;
5 pub extern crate serde;
6 pub extern crate serde_json;
7 pub extern crate actix;
8 pub extern crate actix_web;
10 pub extern crate strum;
11 pub extern crate jsonwebtoken;
12 pub extern crate bcrypt;
13 pub extern crate regex;
14 #[macro_use] pub extern crate strum_macros;
15 #[macro_use] pub extern crate lazy_static;
19 pub mod websocket_server;
22 use diesel::pg::PgConnection;
23 use diesel::result::Error;
27 use serde::{Deserialize, Serialize};
28 use chrono::{DateTime, NaiveDateTime, Utc};
31 fn create(conn: &PgConnection, form: &T) -> Result<Self, Error> where Self: Sized;
32 fn read(conn: &PgConnection, id: i32) -> Result<Self, Error> where Self: Sized;
33 fn update(conn: &PgConnection, id: i32, form: &T) -> Result<Self, Error> where Self: Sized;
34 fn delete(conn: &PgConnection, id: i32) -> Result<usize, Error> where Self: Sized;
37 pub trait Followable<T> {
38 fn follow(conn: &PgConnection, form: &T) -> Result<Self, Error> where Self: Sized;
39 fn ignore(conn: &PgConnection, form: &T) -> Result<usize, Error> where Self: Sized;
42 pub trait Joinable<T> {
43 fn join(conn: &PgConnection, form: &T) -> Result<Self, Error> where Self: Sized;
44 fn leave(conn: &PgConnection, form: &T) -> Result<usize, Error> where Self: Sized;
47 pub trait Likeable<T> {
48 fn read(conn: &PgConnection, id: i32) -> Result<Vec<Self>, Error> where Self: Sized;
49 fn like(conn: &PgConnection, form: &T) -> Result<Self, Error> where Self: Sized;
50 fn remove(conn: &PgConnection, form: &T) -> Result<usize, Error> where Self: Sized;
53 pub trait Bannable<T> {
54 fn ban(conn: &PgConnection, form: &T) -> Result<Self, Error> where Self: Sized;
55 fn unban(conn: &PgConnection, form: &T) -> Result<usize, Error> where Self: Sized;
58 pub fn establish_connection() -> PgConnection {
59 let db_url = Settings::get().db_url;
60 PgConnection::establish(&db_url)
61 .expect(&format!("Error connecting to {}", db_url))
73 db_url: env::var("DATABASE_URL")
74 .expect("DATABASE_URL must be set"),
75 hostname: env::var("HOSTNAME").unwrap_or("http://0.0.0.0".to_string())
78 fn api_endpoint(&self) -> String {
79 format!("{}/api/v1", self.hostname)
83 #[derive(EnumString,ToString,Debug, Serialize, Deserialize)]
85 Hot, New, TopDay, TopWeek, TopMonth, TopYear, TopAll
88 pub fn to_datetime_utc(ndt: NaiveDateTime) -> DateTime<Utc> {
89 DateTime::<Utc>::from_utc(ndt, Utc)
92 pub fn naive_now() -> NaiveDateTime {
93 chrono::prelude::Utc::now().naive_utc()
96 pub fn naive_from_unix(time: i64) -> NaiveDateTime {
97 NaiveDateTime::from_timestamp(time, 0)
100 pub fn is_email_regex(test: &str) -> bool {
101 EMAIL_REGEX.is_match(test)
104 pub fn remove_slurs(test: &str) -> String {
105 SLUR_REGEX.replace_all(test, "*removed*").to_string()
108 pub fn has_slurs(test: &str) -> bool {
109 SLUR_REGEX.is_match(test)
114 use {Settings, is_email_regex, remove_slurs, has_slurs};
117 assert_eq!(Settings::get().api_endpoint(), "http://0.0.0.0/api/v1");
120 #[test] fn test_email() {
121 assert!(is_email_regex("gush@gmail.com"));
122 assert!(!is_email_regex("nada_neutho"));
125 #[test] fn test_slur_filter() {
126 let test = "coons test dindu ladyboy tranny. This is a bunch of other safe text.".to_string();
127 let slur_free = "No slurs here";
128 assert_eq!(remove_slurs(&test), "*removed* test *removed* *removed* *removed*. This is a bunch of other safe text.".to_string());
129 assert!(has_slurs(&test));
130 assert!(!has_slurs(slur_free));
136 static ref EMAIL_REGEX: Regex = Regex::new(r"^[a-zA-Z0-9.!#$%&’*+/=?^_`{|}~-]+@[a-zA-Z0-9-]+(?:\.[a-zA-Z0-9-]+)*$").unwrap();
137 static ref SLUR_REGEX: Regex = Regex::new(r"(fag(g|got|tard)?|maricos?|cock\s?sucker(s|ing)?|\bnig(\b|g?(a|er)?s?)\b|dindu(s?)|mudslime?s?|kikes?|mongoloids?|towel\s*heads?|\bspi(c|k)s?\b|\bchinks?|niglets?|beaners?|\bnips?\b|\bcoons?\b|jungle\s*bunn(y|ies?)|jigg?aboo?s?|\bpakis?\b|rag\s*heads?|gooks?|cunts?|bitch(es|ing|y)?|puss(y|ies?)|twats?|feminazis?|whor(es?|ing)|\bslut(s|t?y)?|\btrann?(y|ies?)|ladyboy(s?))").unwrap();