-use crate::fetcher::person::get_or_fetch_and_upsert_person;
-use activitystreams::{
- base::BaseExt,
- object::{kind::ImageType, Tombstone, TombstoneExt},
-};
+use crate::protocol::Source;
+use activitypub_federation::protocol::values::MediaTypeMarkdownOrHtml;
use anyhow::anyhow;
-use chrono::NaiveDateTime;
-use lemmy_apub_lib::values::MediaTypeMarkdown;
-use lemmy_db_queries::DbPool;
-use lemmy_utils::{utils::convert_datetime, LemmyError};
-use lemmy_websocket::LemmyContext;
+use html2md::parse_html;
+use lemmy_utils::{error::LemmyError, settings::structs::Settings};
use url::Url;
-pub(crate) mod comment;
-pub(crate) mod community;
-pub(crate) mod person;
-pub(crate) mod post;
-pub(crate) mod private_message;
+pub mod comment;
+pub mod community;
+pub mod instance;
+pub mod person;
+pub mod post;
+pub mod private_message;
-/// Trait for converting an object or actor into the respective ActivityPub type.
-#[async_trait::async_trait(?Send)]
-pub(crate) trait ToApub {
- type ApubType;
- async fn to_apub(&self, pool: &DbPool) -> Result<Self::ApubType, LemmyError>;
- fn to_tombstone(&self) -> Result<Tombstone, LemmyError>;
+pub(crate) fn read_from_string_or_source(
+ content: &str,
+ media_type: &Option<MediaTypeMarkdownOrHtml>,
+ source: &Option<Source>,
+) -> String {
+ if let Some(s) = source {
+ // markdown sent by lemmy in source field
+ s.content.clone()
+ } else if media_type == &Some(MediaTypeMarkdownOrHtml::Markdown) {
+ // markdown sent by peertube in content field
+ content.to_string()
+ } else {
+ // otherwise, convert content html to markdown
+ parse_html(content)
+ }
}
-#[async_trait::async_trait(?Send)]
-pub(crate) trait FromApub {
- type ApubType;
- /// Converts an object from ActivityPub type to Lemmy internal type.
- ///
- /// * `apub` The object to read from
- /// * `context` LemmyContext which holds DB pool, HTTP client etc
- /// * `expected_domain` Domain where the object was received from. None in case of mod action.
- /// * `mod_action_allowed` True if the object can be a mod activity, ignore `expected_domain` in this case
- async fn from_apub(
- apub: &Self::ApubType,
- context: &LemmyContext,
- expected_domain: &Url,
- request_counter: &mut i32,
- ) -> Result<Self, LemmyError>
- where
- Self: Sized;
+pub(crate) fn read_from_string_or_source_opt(
+ content: &Option<String>,
+ media_type: &Option<MediaTypeMarkdownOrHtml>,
+ source: &Option<Source>,
+) -> Option<String> {
+ content
+ .as_ref()
+ .map(|content| read_from_string_or_source(content, media_type, source))
}
-#[derive(Clone, Debug, serde::Deserialize, serde::Serialize)]
-#[serde(rename_all = "camelCase")]
-pub struct Source {
- content: String,
- media_type: MediaTypeMarkdown,
+/// When for example a Post is made in a remote community, the community will send it back,
+/// wrapped in Announce. If we simply receive this like any other federated object, overwrite the
+/// existing, local Post. In particular, it will set the field local = false, so that the object
+/// can't be fetched from the Activitypub HTTP endpoint anymore (which only serves local objects).
+pub(crate) fn verify_is_remote_object(id: &Url, settings: &Settings) -> Result<(), LemmyError> {
+ let local_domain = settings.get_hostname_without_port()?;
+ if id.domain() == Some(&local_domain) {
+ Err(anyhow!("cant accept local object from remote instance").into())
+ } else {
+ Ok(())
+ }
}
-#[derive(Clone, Debug, serde::Deserialize, serde::Serialize)]
-#[serde(rename_all = "camelCase")]
-pub struct ImageObject {
- #[serde(rename = "type")]
- kind: ImageType,
- url: Url,
-}
+#[cfg(test)]
+pub(crate) mod tests {
+ #![allow(clippy::unwrap_used)]
+ #![allow(clippy::indexing_slicing)]
+
+ use activitypub_federation::config::{Data, FederationConfig};
+ use anyhow::anyhow;
+ use lemmy_api_common::{context::LemmyContext, request::build_user_agent};
+ use lemmy_db_schema::{source::secret::Secret, utils::build_db_pool_for_tests};
+ use lemmy_utils::{
+ rate_limit::{RateLimitCell, RateLimitConfig},
+ settings::SETTINGS,
+ };
+ use reqwest::{Client, Request, Response};
+ use reqwest_middleware::{ClientBuilder, Middleware, Next};
+ use task_local_extensions::Extensions;
+
+ struct BlockedMiddleware;
-/// Updated is actually the deletion time
-fn create_tombstone<T>(
- deleted: bool,
- object_id: Url,
- updated: Option<NaiveDateTime>,
- former_type: T,
-) -> Result<Tombstone, LemmyError>
-where
- T: ToString,
-{
- if deleted {
- if let Some(updated) = updated {
- let mut tombstone = Tombstone::new();
- tombstone.set_id(object_id);
- tombstone.set_former_type(former_type.to_string());
- tombstone.set_deleted(convert_datetime(updated));
- Ok(tombstone)
- } else {
- Err(anyhow!("Cant convert to tombstone because updated time was None.").into())
+ /// A reqwest middleware which blocks all requests
+ #[async_trait::async_trait]
+ impl Middleware for BlockedMiddleware {
+ async fn handle(
+ &self,
+ _req: Request,
+ _extensions: &mut Extensions,
+ _next: Next<'_>,
+ ) -> reqwest_middleware::Result<Response> {
+ Err(anyhow!("Network requests not allowed").into())
}
- } else {
- Err(anyhow!("Cant convert object to tombstone if it wasnt deleted").into())
+ }
+
+ // TODO: would be nice if we didnt have to use a full context for tests.
+ pub(crate) async fn init_context() -> Data<LemmyContext> {
+ // call this to run migrations
+ let pool = build_db_pool_for_tests().await;
+
+ let settings = SETTINGS.clone();
+ let client = Client::builder()
+ .user_agent(build_user_agent(&settings))
+ .build()
+ .unwrap();
+
+ let client = ClientBuilder::new(client).with(BlockedMiddleware).build();
+ let secret = Secret {
+ id: 0,
+ jwt_secret: String::new(),
+ };
+
+ let rate_limit_config = RateLimitConfig::builder().build();
+ let rate_limit_cell = RateLimitCell::new(rate_limit_config).await;
+
+ let context = LemmyContext::create(pool, client, secret, rate_limit_cell.clone());
+ let config = FederationConfig::builder()
+ .domain("example.com")
+ .app_data(context)
+ .build()
+ .await
+ .unwrap();
+ config.to_request_data()
}
}