2019-08-14 02:52:43 +00:00
#![ recursion_limit = " 512 " ]
2019-09-07 15:35:05 +00:00
#[ macro_use ]
pub extern crate strum_macros ;
#[ macro_use ]
pub extern crate lazy_static ;
#[ macro_use ]
pub extern crate failure ;
#[ macro_use ]
pub extern crate diesel ;
2019-03-21 01:22:31 +00:00
pub extern crate actix ;
pub extern crate actix_web ;
2019-03-23 01:42:57 +00:00
pub extern crate bcrypt ;
2019-09-07 15:35:05 +00:00
pub extern crate chrono ;
2020-03-28 22:02:49 +00:00
pub extern crate comrak ;
2019-09-07 15:35:05 +00:00
pub extern crate dotenv ;
pub extern crate jsonwebtoken ;
2019-11-02 06:43:21 +00:00
pub extern crate lettre ;
pub extern crate lettre_email ;
2020-03-14 21:03:05 +00:00
extern crate log ;
2020-04-03 04:12:05 +00:00
pub extern crate openssl ;
2019-09-07 15:35:05 +00:00
pub extern crate rand ;
2019-03-23 01:42:57 +00:00
pub extern crate regex ;
2020-03-28 22:02:49 +00:00
pub extern crate rss ;
2019-09-07 15:35:05 +00:00
pub extern crate serde ;
pub extern crate serde_json ;
2019-12-26 19:48:13 +00:00
pub extern crate sha2 ;
2019-09-07 15:35:05 +00:00
pub extern crate strum ;
2019-04-21 07:26:26 +00:00
2019-05-05 05:20:38 +00:00
pub mod api ;
2019-03-21 01:22:31 +00:00
pub mod apub ;
2019-05-03 01:34:21 +00:00
pub mod db ;
2020-04-19 22:08:25 +00:00
pub mod rate_limit ;
2019-12-31 12:55:33 +00:00
pub mod routes ;
2019-11-21 19:27:52 +00:00
pub mod schema ;
2019-12-15 16:40:55 +00:00
pub mod settings ;
2019-11-15 02:08:25 +00:00
pub mod version ;
2019-11-21 19:27:52 +00:00
pub mod websocket ;
2019-02-28 06:02:55 +00:00
2019-12-15 16:40:55 +00:00
use crate ::settings ::Settings ;
2020-04-20 18:02:25 +00:00
use actix_web ::dev ::ConnectionInfo ;
2020-04-21 14:25:29 +00:00
use chrono ::{ DateTime , FixedOffset , Local , NaiveDateTime , Utc } ;
2020-03-19 03:11:37 +00:00
use isahc ::prelude ::* ;
2020-05-15 16:36:11 +00:00
use itertools ::Itertools ;
2020-05-16 14:04:08 +00:00
use lettre ::{
smtp ::{
authentication ::{ Credentials , Mechanism } ,
extension ::ClientId ,
ConnectionReuseParameters ,
} ,
ClientSecurity ,
SmtpClient ,
Transport ,
} ;
2019-11-02 06:43:21 +00:00
use lettre_email ::Email ;
2020-03-13 15:08:42 +00:00
use log ::error ;
2020-03-07 23:31:13 +00:00
use percent_encoding ::{ utf8_percent_encode , NON_ALPHANUMERIC } ;
2020-05-16 14:04:08 +00:00
use rand ::{ distributions ::Alphanumeric , thread_rng , Rng } ;
2019-12-30 01:29:07 +00:00
use regex ::{ Regex , RegexBuilder } ;
2020-03-07 23:31:13 +00:00
use serde ::Deserialize ;
2019-03-05 03:52:09 +00:00
2020-04-19 22:08:25 +00:00
pub type ConnectionId = usize ;
pub type PostId = i32 ;
pub type CommunityId = i32 ;
pub type UserId = i32 ;
pub type IPAddr = String ;
2019-03-05 03:52:09 +00:00
pub fn to_datetime_utc ( ndt : NaiveDateTime ) -> DateTime < Utc > {
DateTime ::< Utc > ::from_utc ( ndt , Utc )
}
2019-02-28 06:02:55 +00:00
2019-03-05 03:52:09 +00:00
pub fn naive_now ( ) -> NaiveDateTime {
chrono ::prelude ::Utc ::now ( ) . naive_utc ( )
2019-02-28 06:02:55 +00:00
}
2019-09-07 15:35:05 +00:00
pub fn naive_from_unix ( time : i64 ) -> NaiveDateTime {
2019-04-15 23:12:06 +00:00
NaiveDateTime ::from_timestamp ( time , 0 )
}
2020-03-12 00:01:25 +00:00
pub fn convert_datetime ( datetime : NaiveDateTime ) -> DateTime < FixedOffset > {
let now = Local ::now ( ) ;
DateTime ::< FixedOffset > ::from_utc ( datetime , * now . offset ( ) )
}
2019-03-23 01:42:57 +00:00
pub fn is_email_regex ( test : & str ) -> bool {
2019-04-09 18:35:16 +00:00
EMAIL_REGEX . is_match ( test )
}
2020-05-12 19:23:48 +00:00
pub fn is_image_content_type ( test : & str ) -> Result < ( ) , failure ::Error > {
if isahc ::get ( test ) ?
. headers ( )
. get ( " Content-Type " )
. ok_or_else ( | | format_err! ( " No Content-Type header " ) ) ?
. to_str ( ) ?
. starts_with ( " image/ " )
{
Ok ( ( ) )
} else {
Err ( format_err! ( " Not an image type. " ) )
2020-05-11 23:06:12 +00:00
}
}
2019-04-09 18:35:16 +00:00
pub fn remove_slurs ( test : & str ) -> String {
SLUR_REGEX . replace_all ( test , " *removed* " ) . to_string ( )
}
2020-02-03 03:51:54 +00:00
pub fn slur_check ( test : & str ) -> Result < ( ) , Vec < & str > > {
let mut matches : Vec < & str > = SLUR_REGEX . find_iter ( test ) . map ( | mat | mat . as_str ( ) ) . collect ( ) ;
// Unique
matches . sort_unstable ( ) ;
matches . dedup ( ) ;
if matches . is_empty ( ) {
Ok ( ( ) )
} else {
Err ( matches )
}
}
pub fn slurs_vec_to_str ( slurs : Vec < & str > ) -> String {
let start = " No slurs - " ;
let combined = & slurs . join ( " , " ) ;
[ start , combined ] . concat ( )
2019-03-23 01:42:57 +00:00
}
2019-10-30 03:35:39 +00:00
pub fn generate_random_string ( ) -> String {
2019-11-02 06:43:21 +00:00
thread_rng ( ) . sample_iter ( & Alphanumeric ) . take ( 30 ) . collect ( )
2019-10-30 03:35:39 +00:00
}
2019-11-02 06:43:21 +00:00
pub fn send_email (
subject : & str ,
to_email : & str ,
to_username : & str ,
html : & str ,
) -> Result < ( ) , String > {
2020-04-11 18:06:04 +00:00
let email_config = Settings ::get ( ) . email . ok_or ( " no_email_setup " ) ? ;
2019-10-30 03:35:39 +00:00
let email = Email ::builder ( )
. to ( ( to_email , to_username ) )
2020-01-31 11:03:26 +00:00
. from ( email_config . smtp_from_address . to_owned ( ) )
2019-10-30 03:35:39 +00:00
. subject ( subject )
. html ( html )
. build ( )
. unwrap ( ) ;
2020-01-31 11:03:26 +00:00
let mailer = if email_config . use_tls {
SmtpClient ::new_simple ( & email_config . smtp_server ) . unwrap ( )
} else {
SmtpClient ::new ( & email_config . smtp_server , ClientSecurity ::None ) . unwrap ( )
}
2020-04-11 18:06:04 +00:00
. hello_name ( ClientId ::Domain ( Settings ::get ( ) . hostname ) )
2020-01-31 11:03:26 +00:00
. smtp_utf8 ( true )
. authentication_mechanism ( Mechanism ::Plain )
. connection_reuse ( ConnectionReuseParameters ::ReuseUnlimited ) ;
let mailer = if let ( Some ( login ) , Some ( password ) ) =
( & email_config . smtp_login , & email_config . smtp_password )
{
mailer . credentials ( Credentials ::new ( login . to_owned ( ) , password . to_owned ( ) ) )
} else {
mailer
} ;
2019-10-30 03:35:39 +00:00
2020-01-31 11:03:26 +00:00
let mut transport = mailer . transport ( ) ;
let result = transport . send ( email . into ( ) ) ;
transport . close ( ) ;
2020-01-23 01:35:20 +00:00
2019-10-30 03:35:39 +00:00
match result {
Ok ( _ ) = > Ok ( ( ) ) ,
2020-01-31 11:03:26 +00:00
Err ( e ) = > Err ( e . to_string ( ) ) ,
2019-10-30 03:35:39 +00:00
}
}
2020-03-07 23:31:13 +00:00
#[ derive(Deserialize, Debug) ]
pub struct IframelyResponse {
title : Option < String > ,
description : Option < String > ,
thumbnail_url : Option < String > ,
html : Option < String > ,
}
pub fn fetch_iframely ( url : & str ) -> Result < IframelyResponse , failure ::Error > {
2020-03-09 16:50:28 +00:00
let fetch_url = format! ( " http://iframely/oembed?url= {} " , url ) ;
2020-03-19 03:11:37 +00:00
let text = isahc ::get ( & fetch_url ) ? . text ( ) ? ;
2020-03-07 23:31:13 +00:00
let res : IframelyResponse = serde_json ::from_str ( & text ) ? ;
Ok ( res )
}
#[ derive(Deserialize, Debug) ]
pub struct PictshareResponse {
status : String ,
url : String ,
}
pub fn fetch_pictshare ( image_url : & str ) -> Result < PictshareResponse , failure ::Error > {
2020-05-12 19:23:48 +00:00
is_image_content_type ( image_url ) ? ;
2020-05-11 23:06:12 +00:00
2020-03-07 23:31:13 +00:00
let fetch_url = format! (
2020-03-09 16:50:28 +00:00
" http://pictshare/api/geturl.php?url={} " ,
2020-03-07 23:31:13 +00:00
utf8_percent_encode ( image_url , NON_ALPHANUMERIC )
) ;
2020-03-19 03:11:37 +00:00
let text = isahc ::get ( & fetch_url ) ? . text ( ) ? ;
2020-03-07 23:31:13 +00:00
let res : PictshareResponse = serde_json ::from_str ( & text ) ? ;
Ok ( res )
}
fn fetch_iframely_and_pictshare_data (
url : Option < String > ,
) -> (
Option < String > ,
Option < String > ,
Option < String > ,
Option < String > ,
) {
2020-05-11 18:01:10 +00:00
match & url {
Some ( url ) = > {
// Fetch iframely data
let ( iframely_title , iframely_description , iframely_thumbnail_url , iframely_html ) =
match fetch_iframely ( url ) {
Ok ( res ) = > ( res . title , res . description , res . thumbnail_url , res . html ) ,
Err ( e ) = > {
error! ( " iframely err: {} " , e ) ;
( None , None , None , None )
}
} ;
// Fetch pictshare thumbnail
let pictshare_thumbnail = match iframely_thumbnail_url {
Some ( iframely_thumbnail_url ) = > match fetch_pictshare ( & iframely_thumbnail_url ) {
Ok ( res ) = > Some ( res . url ) ,
Err ( e ) = > {
error! ( " pictshare err: {} " , e ) ;
None
}
} ,
2020-05-07 00:40:36 +00:00
// Try to generate a small thumbnail if iframely is not supported
2020-05-11 18:01:10 +00:00
None = > match fetch_pictshare ( & url ) {
Ok ( res ) = > Some ( res . url ) ,
Err ( e ) = > {
error! ( " pictshare err: {} " , e ) ;
None
}
} ,
} ;
(
iframely_title ,
iframely_description ,
iframely_html ,
pictshare_thumbnail ,
)
}
2020-03-07 23:31:13 +00:00
None = > ( None , None , None , None ) ,
2020-05-11 18:01:10 +00:00
}
2020-03-07 23:31:13 +00:00
}
2020-03-28 22:02:49 +00:00
pub fn markdown_to_html ( text : & str ) -> String {
comrak ::markdown_to_html ( text , & comrak ::ComrakOptions ::default ( ) )
}
2020-04-20 18:02:25 +00:00
pub fn get_ip ( conn_info : & ConnectionInfo ) -> String {
conn_info
2020-04-19 22:08:25 +00:00
. remote ( )
. unwrap_or ( " 127.0.0.1:12345 " )
. split ( ':' )
. next ( )
. unwrap_or ( " 127.0.0.1 " )
. to_string ( )
}
2020-05-15 16:36:11 +00:00
// TODO nothing is done with community / group webfingers yet, so just ignore those for now
#[ derive(Clone, PartialEq, Eq, Hash) ]
pub struct MentionData {
pub name : String ,
pub domain : String ,
}
impl MentionData {
pub fn is_local ( & self ) -> bool {
Settings ::get ( ) . hostname . eq ( & self . domain )
}
pub fn full_name ( & self ) -> String {
format! ( " @ {} @ {} " , & self . name , & self . domain )
}
}
pub fn scrape_text_for_mentions ( text : & str ) -> Vec < MentionData > {
let mut out : Vec < MentionData > = Vec ::new ( ) ;
for caps in WEBFINGER_USER_REGEX . captures_iter ( text ) {
out . push ( MentionData {
name : caps [ " name " ] . to_string ( ) ,
domain : caps [ " domain " ] . to_string ( ) ,
} ) ;
}
out . into_iter ( ) . unique ( ) . collect ( )
}
2020-05-28 18:07:36 +00:00
pub fn is_valid_username ( name : & str ) -> bool {
VALID_USERNAME_REGEX . is_match ( name )
}
2019-03-05 03:52:09 +00:00
#[ cfg(test) ]
mod tests {
2020-05-15 16:36:11 +00:00
use crate ::{
2020-05-17 01:09:26 +00:00
is_email_regex ,
2020-06-09 12:01:26 +00:00
is_image_content_type ,
is_valid_username ,
2020-05-17 01:09:26 +00:00
remove_slurs ,
scrape_text_for_mentions ,
slur_check ,
slurs_vec_to_str ,
2020-05-15 16:36:11 +00:00
} ;
#[ test ]
fn test_mentions_regex ( ) {
let text = " Just read a great blog post by [@tedu@honk.teduangst.com](/u/test). And another by !test_community@fish.teduangst.com . Another [@lemmy@lemmy_alpha:8540](/u/fish) " ;
let mentions = scrape_text_for_mentions ( text ) ;
assert_eq! ( mentions [ 0 ] . name , " tedu " . to_string ( ) ) ;
assert_eq! ( mentions [ 0 ] . domain , " honk.teduangst.com " . to_string ( ) ) ;
assert_eq! ( mentions [ 1 ] . domain , " lemmy_alpha:8540 " . to_string ( ) ) ;
}
2019-03-23 01:42:57 +00:00
2020-05-11 23:06:12 +00:00
#[ test ]
fn test_image ( ) {
2020-05-12 19:23:48 +00:00
assert! ( is_image_content_type ( " https://1734811051.rsc.cdn77.org/data/images/full/365645/as-virus-kills-navajos-in-their-homes-tribal-women-provide-lifeline.jpg?w=600?w=650 " ) . is_ok ( ) ) ;
assert! ( is_image_content_type (
2020-05-11 23:06:12 +00:00
" https://twitter.com/BenjaminNorton/status/1259922424272957440?s=20 "
2020-05-12 19:23:48 +00:00
)
. is_err ( ) ) ;
2020-05-11 23:06:12 +00:00
}
2019-03-23 01:42:57 +00:00
2019-09-07 15:35:05 +00:00
#[ test ]
fn test_email ( ) {
2019-03-23 01:42:57 +00:00
assert! ( is_email_regex ( " gush@gmail.com " ) ) ;
assert! ( ! is_email_regex ( " nada_neutho " ) ) ;
2019-09-07 15:35:05 +00:00
}
2019-04-09 18:35:16 +00:00
2020-05-28 18:07:36 +00:00
#[ test ]
fn test_valid_register_username ( ) {
assert! ( is_valid_username ( " Hello_98 " ) ) ;
assert! ( is_valid_username ( " ten " ) ) ;
assert! ( ! is_valid_username ( " Hello-98 " ) ) ;
assert! ( ! is_valid_username ( " a " ) ) ;
assert! ( ! is_valid_username ( " " ) ) ;
}
2019-09-07 15:35:05 +00:00
#[ test ]
fn test_slur_filter ( ) {
2019-10-13 19:06:18 +00:00
let test =
2020-02-03 03:51:54 +00:00
" coons test dindu ladyboy tranny retardeds. Capitalized Niggerz. This is a bunch of other safe text. " ;
2019-04-09 18:35:16 +00:00
let slur_free = " No slurs here " ;
2019-09-07 15:35:05 +00:00
assert_eq! (
remove_slurs ( & test ) ,
2019-12-30 01:29:07 +00:00
" *removed* test *removed* *removed* *removed* *removed*. Capitalized *removed*. This is a bunch of other safe text. "
2019-09-07 15:35:05 +00:00
. to_string ( )
) ;
2020-02-03 03:51:54 +00:00
let has_slurs_vec = vec! [
" Niggerz " ,
" coons " ,
" dindu " ,
" ladyboy " ,
" retardeds " ,
" tranny " ,
] ;
let has_slurs_err_str = " No slurs - Niggerz, coons, dindu, ladyboy, retardeds, tranny " ;
assert_eq! ( slur_check ( test ) , Err ( has_slurs_vec ) ) ;
assert_eq! ( slur_check ( slur_free ) , Ok ( ( ) ) ) ;
if let Err ( slur_vec ) = slur_check ( test ) {
assert_eq! ( & slurs_vec_to_str ( slur_vec ) , has_slurs_err_str ) ;
}
2019-09-07 15:35:05 +00:00
}
2019-10-20 00:46:29 +00:00
2020-03-07 23:31:13 +00:00
// These helped with testing
// #[test]
// fn test_iframely() {
// let res = fetch_iframely("https://www.redspark.nu/?p=15341");
// assert!(res.is_ok());
// }
// #[test]
// fn test_pictshare() {
// let res = fetch_pictshare("https://upload.wikimedia.org/wikipedia/en/2/27/The_Mandalorian_logo.jpg");
// assert!(res.is_ok());
// let res_other = fetch_pictshare("https://upload.wikimedia.org/wikipedia/en/2/27/The_Mandalorian_logo.jpgaoeu");
// assert!(res_other.is_err());
// }
2019-10-30 03:35:39 +00:00
// #[test]
// fn test_send_email() {
// let result = send_email("not a subject", "test_email@gmail.com", "ur user", "<h1>HI there</h1>");
// assert!(result.is_ok());
// }
2019-04-09 18:35:16 +00:00
}
lazy_static! {
static ref EMAIL_REGEX : Regex = Regex ::new ( r "^[a-zA-Z0-9.!#$%&’ *+/=?^_`{|}~-]+@[a-zA-Z0-9-]+(?:\.[a-zA-Z0-9-]+)*$" ) . unwrap ( ) ;
2020-01-20 22:12:23 +00:00
static ref SLUR_REGEX : Regex = RegexBuilder ::new ( r "(fag(g|got|tard)?|maricos?|cock\s?sucker(s|ing)?|nig(\b|g?(a|er)?(s|z)?)\b|dindu(s?)|mudslime?s?|kikes?|mongoloids?|towel\s*heads?|\bspi(c|k)s?\b|\bchinks?|niglets?|beaners?|\bnips?\b|\bcoons?\b|jungle\s*bunn(y|ies?)|jigg?aboo?s?|\bpakis?\b|rag\s*heads?|gooks?|cunts?|bitch(es|ing|y)?|puss(y|ies?)|twats?|feminazis?|whor(es?|ing)|\bslut(s|t?y)?|\btrann?(y|ies?)|ladyboy(s?)|\b(b|re|r)tard(ed)?s?)" ) . case_insensitive ( true ) . build ( ) . unwrap ( ) ;
2019-10-20 00:46:29 +00:00
static ref USERNAME_MATCHES_REGEX : Regex = Regex ::new ( r "/u/[a-zA-Z][0-9a-zA-Z_]*" ) . unwrap ( ) ;
2020-05-15 16:36:11 +00:00
// TODO keep this old one, it didn't work with port well tho
// static ref WEBFINGER_USER_REGEX: Regex = Regex::new(r"@(?P<name>[\w.]+)@(?P<domain>[a-zA-Z0-9._-]+\.[a-zA-Z0-9_-]+)").unwrap();
static ref WEBFINGER_USER_REGEX : Regex = Regex ::new ( r "@(?P<name>[\w.]+)@(?P<domain>[a-zA-Z0-9._:-]+)" ) . unwrap ( ) ;
2020-05-28 18:07:36 +00:00
static ref VALID_USERNAME_REGEX : Regex = Regex ::new ( r "^[a-zA-Z0-9_]{3,20}$" ) . unwrap ( ) ;
2019-03-23 01:42:57 +00:00
}