Plume/src/routes/instance.rs

502 lines
15 KiB
Rust
Raw Normal View History

2019-03-20 17:56:17 +01:00
use rocket::{
request::{Form, FormItems, FromForm, LenientForm},
response::{status, Flash, Redirect},
2019-03-20 17:56:17 +01:00
};
use rocket_contrib::json::Json;
use rocket_i18n::I18n;
use scheduled_thread_pool::ScheduledThreadPool;
use std::str::FromStr;
use validator::{Validate, ValidationErrors};
2020-01-21 07:02:03 +01:00
use crate::inbox;
use crate::routes::{errors::ErrorPage, rocket_uri_macro_static_files, Page, RespondOrRedirect};
use crate::template_utils::{IntoContext, Ructe};
2022-05-02 05:58:01 +02:00
use plume_common::activity_pub::{broadcast, inbox::FromId07};
use plume_models::{
admin::*,
blocklisted_emails::*,
comments::Comment,
db_conn::DbConn,
headers::Headers,
instance::*,
posts::Post,
safe_string::SafeString,
Add support for generic timeline (#525) * Begin adding support for timeline * fix some bugs with parser * fmt * add error reporting for parser * add tests for timeline query parser * add rejection tests for parse * begin adding support for lists also run migration before compiling, so schema.rs is up to date * add sqlite migration * end adding lists still miss tests and query integration * cargo fmt * try to add some tests * Add some constraint to db, and fix list test and refactor other tests to use begin_transaction * add more tests for lists * add support for lists in query executor * add keywords for including/excluding boosts and likes * cargo fmt * add function to list lists used by query will make it easier to warn users when creating timeline with unknown lists * add lang support * add timeline creation error message when using unexisting lists * Update .po files * WIP: interface for timelines * don't use diesel for migrations not sure how it passed the ci on the other branch * add some tests for timeline add an int representing the order of timelines (first one will be on top, second just under...) use first() instead of limit(1).get().into_iter().nth(0) remove migrations from build artifacts as they are now compiled in * cargo fmt * remove timeline order * fix tests * add tests for timeline creation failure * cargo fmt * add tests for timelines * add test for matching direct lists and keywords * add test for language filtering * Add a more complex test for Timeline::matches, and fix TQ::matches for TQ::Or * Make the main crate compile + FMT * Use the new timeline system - Replace the old "feed" system with timelines - Display all timelines someone can access on their home page (either their personal ones, or instance timelines) - Remove functions that were used to get user/local/federated feed - Add new posts to timelines - Create a default timeline called "My feed" for everyone, and "Local feed"/"Federated feed" with timelines @fdb-hiroshima I don't know if that's how you pictured it? If you imagined it differently I can of course make changes. I hope I didn't forgot anything… * Cargo fmt * Try to fix the migration * Fix tests * Fix the test (for real this time ?) * Fix the tests ? + fmt * Use Kind::Like and Kind::Reshare when needed * Forgot to run cargo fmt once again * revert translations * fix reviewed stuff * reduce code duplication by macros * cargo fmt
2019-10-07 19:08:20 +02:00
timeline::Timeline,
users::{Role, User},
Connection, Error, PlumeRocket, CONFIG,
2018-05-19 09:39:59 +02:00
};
2018-09-05 19:03:02 +02:00
#[get("/")]
2021-01-30 13:44:29 +01:00
pub fn index(conn: DbConn, rockets: PlumeRocket) -> Result<Ructe, ErrorPage> {
let inst = Instance::get_local()?;
Add support for generic timeline (#525) * Begin adding support for timeline * fix some bugs with parser * fmt * add error reporting for parser * add tests for timeline query parser * add rejection tests for parse * begin adding support for lists also run migration before compiling, so schema.rs is up to date * add sqlite migration * end adding lists still miss tests and query integration * cargo fmt * try to add some tests * Add some constraint to db, and fix list test and refactor other tests to use begin_transaction * add more tests for lists * add support for lists in query executor * add keywords for including/excluding boosts and likes * cargo fmt * add function to list lists used by query will make it easier to warn users when creating timeline with unknown lists * add lang support * add timeline creation error message when using unexisting lists * Update .po files * WIP: interface for timelines * don't use diesel for migrations not sure how it passed the ci on the other branch * add some tests for timeline add an int representing the order of timelines (first one will be on top, second just under...) use first() instead of limit(1).get().into_iter().nth(0) remove migrations from build artifacts as they are now compiled in * cargo fmt * remove timeline order * fix tests * add tests for timeline creation failure * cargo fmt * add tests for timelines * add test for matching direct lists and keywords * add test for language filtering * Add a more complex test for Timeline::matches, and fix TQ::matches for TQ::Or * Make the main crate compile + FMT * Use the new timeline system - Replace the old "feed" system with timelines - Display all timelines someone can access on their home page (either their personal ones, or instance timelines) - Remove functions that were used to get user/local/federated feed - Add new posts to timelines - Create a default timeline called "My feed" for everyone, and "Local feed"/"Federated feed" with timelines @fdb-hiroshima I don't know if that's how you pictured it? If you imagined it differently I can of course make changes. I hope I didn't forgot anything… * Cargo fmt * Try to fix the migration * Fix tests * Fix the test (for real this time ?) * Fix the tests ? + fmt * Use Kind::Like and Kind::Reshare when needed * Forgot to run cargo fmt once again * revert translations * fix reviewed stuff * reduce code duplication by macros * cargo fmt
2019-10-07 19:08:20 +02:00
let timelines = Timeline::list_all_for_user(&conn, rockets.user.clone().map(|u| u.id))?
.into_iter()
.filter_map(|t| {
if let Ok(latest) = t.get_latest(&conn, 12) {
Some((t, latest))
} else {
None
}
})
.collect();
Ok(render!(instance::index(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
inst,
2021-01-30 13:44:29 +01:00
User::count_local(&conn)?,
Post::count_local(&conn)?,
Add support for generic timeline (#525) * Begin adding support for timeline * fix some bugs with parser * fmt * add error reporting for parser * add tests for timeline query parser * add rejection tests for parse * begin adding support for lists also run migration before compiling, so schema.rs is up to date * add sqlite migration * end adding lists still miss tests and query integration * cargo fmt * try to add some tests * Add some constraint to db, and fix list test and refactor other tests to use begin_transaction * add more tests for lists * add support for lists in query executor * add keywords for including/excluding boosts and likes * cargo fmt * add function to list lists used by query will make it easier to warn users when creating timeline with unknown lists * add lang support * add timeline creation error message when using unexisting lists * Update .po files * WIP: interface for timelines * don't use diesel for migrations not sure how it passed the ci on the other branch * add some tests for timeline add an int representing the order of timelines (first one will be on top, second just under...) use first() instead of limit(1).get().into_iter().nth(0) remove migrations from build artifacts as they are now compiled in * cargo fmt * remove timeline order * fix tests * add tests for timeline creation failure * cargo fmt * add tests for timelines * add test for matching direct lists and keywords * add test for language filtering * Add a more complex test for Timeline::matches, and fix TQ::matches for TQ::Or * Make the main crate compile + FMT * Use the new timeline system - Replace the old "feed" system with timelines - Display all timelines someone can access on their home page (either their personal ones, or instance timelines) - Remove functions that were used to get user/local/federated feed - Add new posts to timelines - Create a default timeline called "My feed" for everyone, and "Local feed"/"Federated feed" with timelines @fdb-hiroshima I don't know if that's how you pictured it? If you imagined it differently I can of course make changes. I hope I didn't forgot anything… * Cargo fmt * Try to fix the migration * Fix tests * Fix the test (for real this time ?) * Fix the tests ? + fmt * Use Kind::Like and Kind::Reshare when needed * Forgot to run cargo fmt once again * revert translations * fix reviewed stuff * reduce code duplication by macros * cargo fmt
2019-10-07 19:08:20 +02:00
timelines
)))
2018-09-05 16:21:50 +02:00
}
#[get("/admin")]
2021-01-30 13:44:29 +01:00
pub fn admin(_admin: Admin, conn: DbConn, rockets: PlumeRocket) -> Result<Ructe, ErrorPage> {
let local_inst = Instance::get_local()?;
Ok(render!(instance::admin(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
local_inst.clone(),
InstanceSettingsForm {
name: local_inst.name.clone(),
open_registrations: local_inst.open_registrations,
short_description: local_inst.short_description,
long_description: local_inst.long_description,
default_license: local_inst.default_license,
},
ValidationErrors::default()
)))
}
#[get("/admin", rank = 2)]
2021-01-30 13:44:29 +01:00
pub fn admin_mod(_mod: Moderator, conn: DbConn, rockets: PlumeRocket) -> Ructe {
render!(instance::admin_mod(&(&conn, &rockets).to_context()))
}
#[derive(Clone, FromForm, Validate)]
pub struct InstanceSettingsForm {
2022-01-06 20:55:49 +01:00
#[validate(length(min = 1))]
pub name: String,
pub open_registrations: bool,
pub short_description: SafeString,
pub long_description: SafeString,
2022-01-06 20:55:49 +01:00
#[validate(length(min = 1))]
2019-03-20 17:56:17 +01:00
pub default_license: String,
}
#[post("/admin", data = "<form>")]
2019-03-20 17:56:17 +01:00
pub fn update_settings(
_admin: Admin,
2019-03-20 17:56:17 +01:00
form: LenientForm<InstanceSettingsForm>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
) -> RespondOrRedirect {
if let Err(e) = form.validate() {
let local_inst =
Instance::get_local().expect("instance::update_settings: local instance error");
render!(instance::admin(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
local_inst,
form.clone(),
e
))
.into()
} else {
let instance =
Instance::get_local().expect("instance::update_settings: local instance error");
instance
.update(
2021-01-30 13:44:29 +01:00
&*conn,
form.name.clone(),
form.open_registrations,
form.short_description.clone(),
form.long_description.clone(),
2019-08-27 21:47:45 +02:00
form.default_license.clone(),
)
.expect("instance::update_settings: save error");
Flash::success(
Redirect::to(uri!(admin)),
i18n!(rockets.intl.catalog, "Instance settings have been saved."),
)
.into()
}
}
#[get("/admin/instances?<page>")]
2019-03-20 17:56:17 +01:00
pub fn admin_instances(
_mod: Moderator,
2019-03-20 17:56:17 +01:00
page: Option<Page>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
2019-03-20 17:56:17 +01:00
) -> Result<Ructe, ErrorPage> {
let page = page.unwrap_or_default();
2021-01-30 13:44:29 +01:00
let instances = Instance::page(&conn, page.limits())?;
Ok(render!(instance::list(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
Instance::get_local()?,
instances,
page.0,
2021-01-30 13:44:29 +01:00
Page::total(Instance::count(&conn)? as i32)
)))
}
#[post("/admin/instances/<id>/block")]
pub fn toggle_block(
_mod: Moderator,
conn: DbConn,
id: i32,
intl: I18n,
) -> Result<Flash<Redirect>, ErrorPage> {
2021-01-30 13:44:29 +01:00
let inst = Instance::get(&conn, id)?;
let message = if inst.blocked {
2019-05-29 13:26:37 +02:00
i18n!(intl.catalog, "{} has been unblocked."; &inst.name)
} else {
2019-05-29 13:26:37 +02:00
i18n!(intl.catalog, "{} has been blocked."; &inst.name)
};
2021-01-30 13:44:29 +01:00
inst.toggle_block(&conn)?;
Ok(Flash::success(
Redirect::to(uri!(admin_instances: page = _)),
message,
))
2018-09-09 12:25:55 +02:00
}
#[get("/admin/users?<page>")]
2019-03-20 17:56:17 +01:00
pub fn admin_users(
_mod: Moderator,
2019-03-20 17:56:17 +01:00
page: Option<Page>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
2019-03-20 17:56:17 +01:00
) -> Result<Ructe, ErrorPage> {
let page = page.unwrap_or_default();
Ok(render!(instance::users(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
User::get_local_page(&conn, page.limits())?,
page.0,
2021-01-30 13:44:29 +01:00
Page::total(User::count_local(&conn)? as i32)
)))
2018-09-09 12:25:55 +02:00
}
pub struct BlocklistEmailDeletion {
ids: Vec<i32>,
}
impl<'f> FromForm<'f> for BlocklistEmailDeletion {
type Error = ();
fn from_form(items: &mut FormItems<'f>, _strict: bool) -> Result<BlocklistEmailDeletion, ()> {
let mut c: BlocklistEmailDeletion = BlocklistEmailDeletion { ids: Vec::new() };
for item in items {
let key = item.key.parse::<i32>();
if let Ok(i) = key {
c.ids.push(i);
}
}
Ok(c)
}
}
#[post("/admin/emails/delete", data = "<form>")]
pub fn delete_email_blocklist(
_mod: Moderator,
form: Form<BlocklistEmailDeletion>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
) -> Result<Flash<Redirect>, ErrorPage> {
2021-01-30 13:44:29 +01:00
BlocklistedEmail::delete_entries(&conn, form.0.ids)?;
Ok(Flash::success(
Redirect::to(uri!(admin_email_blocklist: page = None)),
i18n!(rockets.intl.catalog, "Blocks deleted"),
))
}
#[post("/admin/emails/new", data = "<form>")]
pub fn add_email_blocklist(
_mod: Moderator,
form: LenientForm<NewBlocklistedEmail>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
) -> Result<Flash<Redirect>, ErrorPage> {
2021-01-30 13:44:29 +01:00
let result = BlocklistedEmail::insert(&conn, form.0);
if let Err(Error::Db(_)) = result {
Ok(Flash::error(
Redirect::to(uri!(admin_email_blocklist: page = None)),
2020-12-01 00:38:58 +01:00
i18n!(rockets.intl.catalog, "Email already blocked"),
))
} else {
Ok(Flash::success(
Redirect::to(uri!(admin_email_blocklist: page = None)),
i18n!(rockets.intl.catalog, "Email Blocked"),
))
}
}
#[get("/admin/emails?<page>")]
pub fn admin_email_blocklist(
_mod: Moderator,
page: Option<Page>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
) -> Result<Ructe, ErrorPage> {
let page = page.unwrap_or_default();
Ok(render!(instance::emailblocklist(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
BlocklistedEmail::page(&conn, page.limits())?,
page.0,
2021-01-30 13:44:29 +01:00
Page::total(BlocklistedEmail::count(&conn)? as i32)
)))
}
2018-09-09 12:25:55 +02:00
/// A structure to handle forms that are a list of items on which actions are applied.
///
/// This is for instance the case of the user list in the administration.
pub struct MultiAction<T>
where
T: FromStr,
{
ids: Vec<i32>,
action: T,
}
impl<'f, T> FromForm<'f> for MultiAction<T>
where
T: FromStr,
{
type Error = ();
2020-01-21 07:02:03 +01:00
fn from_form(items: &mut FormItems<'_>, _strict: bool) -> Result<Self, Self::Error> {
let (ids, act) = items.fold((vec![], None), |(mut ids, act), item| {
let (name, val) = item.key_value_decoded();
if name == "action" {
(ids, T::from_str(&val).ok())
} else if let Ok(id) = name.parse::<i32>() {
ids.push(id);
(ids, act)
} else {
(ids, act)
}
});
if let Some(act) = act {
Ok(MultiAction { ids, action: act })
} else {
Err(())
}
}
}
pub enum UserActions {
Admin,
RevokeAdmin,
Moderator,
RevokeModerator,
Ban,
}
impl FromStr for UserActions {
type Err = ();
fn from_str(s: &str) -> Result<Self, Self::Err> {
match s {
"admin" => Ok(UserActions::Admin),
"un-admin" => Ok(UserActions::RevokeAdmin),
"moderator" => Ok(UserActions::Moderator),
"un-moderator" => Ok(UserActions::RevokeModerator),
"ban" => Ok(UserActions::Ban),
_ => Err(()),
}
}
}
#[post("/admin/users/edit", data = "<form>")]
pub fn edit_users(
moderator: Moderator,
form: LenientForm<MultiAction<UserActions>>,
2021-01-30 13:44:29 +01:00
conn: DbConn,
rockets: PlumeRocket,
) -> Result<Flash<Redirect>, ErrorPage> {
// you can't change your own rights
if form.ids.contains(&moderator.0.id) {
return Ok(Flash::error(
Redirect::to(uri!(admin_users: page = _)),
i18n!(rockets.intl.catalog, "You can't change your own rights."),
));
}
// moderators can't grant or revoke admin rights
if !moderator.0.is_admin() {
match form.action {
UserActions::Admin | UserActions::RevokeAdmin => {
return Ok(Flash::error(
Redirect::to(uri!(admin_users: page = _)),
i18n!(
rockets.intl.catalog,
"You are not allowed to take this action."
),
))
}
_ => {}
}
}
let worker = &*rockets.worker;
match form.action {
UserActions::Admin => {
for u in form.ids.clone() {
2021-01-30 13:44:29 +01:00
User::get(&conn, u)?.set_role(&conn, Role::Admin)?;
}
}
UserActions::Moderator => {
for u in form.ids.clone() {
2021-01-30 13:44:29 +01:00
User::get(&conn, u)?.set_role(&conn, Role::Moderator)?;
}
}
UserActions::RevokeAdmin | UserActions::RevokeModerator => {
for u in form.ids.clone() {
2021-01-30 13:44:29 +01:00
User::get(&conn, u)?.set_role(&conn, Role::Normal)?;
}
}
UserActions::Ban => {
for u in form.ids.clone() {
2021-01-30 13:44:29 +01:00
ban(u, &conn, worker)?;
}
}
}
Ok(Flash::success(
Redirect::to(uri!(admin_users: page = _)),
i18n!(rockets.intl.catalog, "Done."),
))
}
fn ban(id: i32, conn: &Connection, worker: &ScheduledThreadPool) -> Result<(), ErrorPage> {
let u = User::get(&*conn, id)?;
u.delete(&*conn)?;
if Instance::get_local()
.map(|i| u.instance_id == i.id)
.unwrap_or(false)
{
BlocklistedEmail::insert(
2021-11-27 23:53:13 +01:00
conn,
NewBlocklistedEmail {
email_address: u.email.clone().unwrap(),
note: "Banned".to_string(),
notify_user: false,
notification_text: "".to_owned(),
},
)
.unwrap();
let target = User::one_by_instance(&*conn)?;
let delete_act = u.delete_activity(&*conn)?;
2021-01-11 21:27:52 +01:00
worker.execute(move || broadcast(&u, delete_act, target, CONFIG.proxy().cloned()));
}
Ok(())
2018-09-09 12:25:55 +02:00
}
2018-05-13 19:39:18 +02:00
#[post("/inbox", data = "<data>")]
2019-03-20 17:56:17 +01:00
pub fn shared_inbox(
2021-01-30 13:44:29 +01:00
conn: DbConn,
Big refactoring of the Inbox (#443) * Big refactoring of the Inbox We now have a type that routes an activity through the registered handlers until one of them matches. Each Actor/Activity/Object combination is represented by an implementation of AsObject These combinations are then registered on the Inbox type, which will try to deserialize the incoming activity in the requested types. Advantages: - nicer syntax: the final API is clearer and more idiomatic - more generic: only two traits (`AsActor` and `AsObject`) instead of one for each kind of activity - it is easier to see which activities we handle and which one we don't * Small fixes - Avoid panics - Don't search for AP ID infinitely - Code style issues * Fix tests * Introduce a new trait: FromId It should be implemented for any AP object. It allows to look for an object in database using its AP ID, or to dereference it if it was not present in database Also moves the inbox code to plume-models to test it (and write a basic test for each activity type we handle) * Use if let instead of match * Don't require PlumeRocket::intl for tests * Return early and remove a forgotten dbg! * Add more tests to try to understand where the issues come from * Also add a test for comment federation * Don't check creation_date is the same for blogs * Make user and blog federation more tolerant to errors/missing fields * Make clippy happy * Use the correct Accept header when dereferencing * Fix follow approval with Mastodon * Add spaces to characters that should not be in usernames And validate blog names too * Smarter dereferencing: only do it once for each actor/object * Forgot some files * Cargo fmt * Delete plume_test * Delete plume_tests * Update get_id docs + Remove useless : Sized * Appease cargo fmt * Remove dbg! + Use as_ref instead of clone when possible + Use and_then instead of map when possible * Remove .po~ * send unfollow to local instance * read cover from update activity * Make sure "cc" and "to" are never empty and fix a typo in a constant name * Cargo fmt
2019-04-17 19:31:47 +02:00
data: inbox::SignedJson<serde_json::Value>,
2020-01-21 07:02:03 +01:00
headers: Headers<'_>,
2019-03-20 17:56:17 +01:00
) -> Result<String, status::BadRequest<&'static str>> {
2021-01-30 13:44:29 +01:00
inbox::handle_incoming(conn, data, headers)
2018-05-13 19:39:18 +02:00
}
2018-06-10 21:33:42 +02:00
#[get("/remote_interact?<target>")]
2021-01-30 13:44:29 +01:00
pub fn interact(conn: DbConn, user: Option<User>, target: String) -> Option<Redirect> {
if User::find_by_fqn(&conn, &target).is_ok() {
return Some(Redirect::to(uri!(super::user::details: name = target)));
}
2022-05-02 05:58:01 +02:00
if let Ok(post) = Post::from_id07(&conn, &target, None, CONFIG.proxy()) {
2021-01-15 17:13:45 +01:00
return Some(Redirect::to(uri!(
2021-01-30 13:44:29 +01:00
super::posts::details: blog = post.get_blog(&conn).expect("Can't retrieve blog").fqn,
2021-01-15 17:13:45 +01:00
slug = &post.slug,
responding_to = _
)));
}
2022-05-02 05:58:01 +02:00
if let Ok(comment) = Comment::from_id07(&conn, &target, None, CONFIG.proxy()) {
2021-01-30 13:44:29 +01:00
if comment.can_see(&conn, user.as_ref()) {
let post = comment.get_post(&conn).expect("Can't retrieve post");
return Some(Redirect::to(uri!(
2021-01-30 13:44:29 +01:00
super::posts::details: blog =
post.get_blog(&conn).expect("Can't retrieve blog").fqn,
slug = &post.slug,
responding_to = comment.id
)));
}
}
None
}
#[get("/nodeinfo/<version>")]
pub fn nodeinfo(conn: DbConn, version: String) -> Result<Json<serde_json::Value>, ErrorPage> {
if version != "2.0" && version != "2.1" {
return Err(ErrorPage::from(Error::NotFound));
}
let local_inst = Instance::get_local()?;
let mut doc = json!({
"version": version,
2018-06-10 21:33:42 +02:00
"software": {
"name": env!("CARGO_PKG_NAME"),
"version": env!("CARGO_PKG_VERSION"),
2018-06-10 21:33:42 +02:00
},
"protocols": ["activitypub"],
"services": {
"inbound": [],
"outbound": []
},
"openRegistrations": local_inst.open_registrations,
2018-06-10 21:33:42 +02:00
"usage": {
"users": {
2021-01-30 13:44:29 +01:00
"total": User::count_local(&conn)?
2018-06-10 21:33:42 +02:00
},
2021-01-30 13:44:29 +01:00
"localPosts": Post::count_local(&conn)?,
"localComments": Comment::count_local(&conn)?
2018-06-10 21:33:42 +02:00
},
"metadata": {
"nodeName": local_inst.name,
"nodeDescription": local_inst.short_description
}
});
if version == "2.1" {
doc["software"]["repository"] = json!(env!("CARGO_PKG_REPOSITORY"));
}
Ok(Json(doc))
2018-06-10 21:33:42 +02:00
}
2018-09-01 18:39:40 +02:00
#[get("/about")]
2021-01-30 13:44:29 +01:00
pub fn about(conn: DbConn, rockets: PlumeRocket) -> Result<Ructe, ErrorPage> {
Ok(render!(instance::about(
2021-01-30 13:44:29 +01:00
&(&conn, &rockets).to_context(),
Instance::get_local()?,
2021-01-30 13:44:29 +01:00
Instance::get_local()?.main_admin(&conn)?,
User::count_local(&conn)?,
Post::count_local(&conn)?,
Instance::count(&conn)? - 1
)))
2018-09-01 18:39:40 +02:00
}
2018-09-10 16:08:22 +02:00
#[get("/privacy")]
2021-01-30 13:44:29 +01:00
pub fn privacy(conn: DbConn, rockets: PlumeRocket) -> Ructe {
render!(instance::privacy(&(&conn, &rockets).to_context()))
}
2018-09-10 16:08:22 +02:00
#[get("/manifest.json")]
pub fn web_manifest() -> Result<Json<serde_json::Value>, ErrorPage> {
let instance = Instance::get_local()?;
Ok(Json(json!({
2018-09-10 16:08:22 +02:00
"name": &instance.name,
"description": &instance.short_description,
"start_url": String::from("/"),
"scope": String::from("/"),
"display": String::from("standalone"),
"background_color": String::from("#f4f4f4"),
2018-10-09 20:38:01 +02:00
"theme_color": String::from("#7765e3"),
"categories": [String::from("social")],
"icons": CONFIG.logo.other.iter()
.map(|i| i.with_prefix(&uri!(static_files: file = "").to_string()))
.collect::<Vec<_>>()
})))
2018-09-10 16:08:22 +02:00
}