2018-10-31 10:40:20 +01:00
|
|
|
use activitypub::object::Image;
|
2018-12-06 18:54:16 +01:00
|
|
|
use askama_escape::escape;
|
2018-11-24 12:44:17 +01:00
|
|
|
use diesel::{self, ExpressionMethods, QueryDsl, RunQueryDsl};
|
2018-10-31 10:40:20 +01:00
|
|
|
use guid_create::GUID;
|
|
|
|
use reqwest;
|
|
|
|
use std::{fs, path::Path};
|
|
|
|
|
2019-04-17 19:31:47 +02:00
|
|
|
use plume_common::{
|
|
|
|
activity_pub::{inbox::FromId, Id},
|
|
|
|
utils::MediaProcessor,
|
|
|
|
};
|
2018-09-02 22:55:42 +02:00
|
|
|
|
|
|
|
use instance::Instance;
|
2018-12-06 18:54:16 +01:00
|
|
|
use safe_string::SafeString;
|
2018-09-02 13:34:48 +02:00
|
|
|
use schema::medias;
|
2018-11-24 12:44:17 +01:00
|
|
|
use users::User;
|
2019-04-17 19:31:47 +02:00
|
|
|
use {ap_url, Connection, Error, PlumeRocket, Result};
|
2018-09-02 13:34:48 +02:00
|
|
|
|
2019-03-12 19:40:54 +01:00
|
|
|
#[derive(Clone, Identifiable, Queryable)]
|
2018-09-02 13:34:48 +02:00
|
|
|
pub struct Media {
|
|
|
|
pub id: i32,
|
|
|
|
pub file_path: String,
|
|
|
|
pub alt_text: String,
|
|
|
|
pub is_remote: bool,
|
|
|
|
pub remote_url: Option<String>,
|
|
|
|
pub sensitive: bool,
|
2018-09-02 22:55:42 +02:00
|
|
|
pub content_warning: Option<String>,
|
2018-11-24 12:44:17 +01:00
|
|
|
pub owner_id: i32,
|
2018-09-02 13:34:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Insertable)]
|
|
|
|
#[table_name = "medias"]
|
|
|
|
pub struct NewMedia {
|
|
|
|
pub file_path: String,
|
|
|
|
pub alt_text: String,
|
|
|
|
pub is_remote: bool,
|
|
|
|
pub remote_url: Option<String>,
|
|
|
|
pub sensitive: bool,
|
2018-09-02 22:55:42 +02:00
|
|
|
pub content_warning: Option<String>,
|
2018-11-24 12:44:17 +01:00
|
|
|
pub owner_id: i32,
|
2018-09-02 13:34:48 +02:00
|
|
|
}
|
|
|
|
|
2018-12-06 18:54:16 +01:00
|
|
|
#[derive(PartialEq)]
|
|
|
|
pub enum MediaCategory {
|
|
|
|
Image,
|
|
|
|
Audio,
|
|
|
|
Video,
|
|
|
|
Unknown,
|
|
|
|
}
|
|
|
|
|
2019-03-06 14:11:36 +01:00
|
|
|
impl MediaCategory {
|
|
|
|
pub fn to_string(&self) -> &str {
|
|
|
|
match *self {
|
|
|
|
MediaCategory::Image => "image",
|
|
|
|
MediaCategory::Audio => "audio",
|
|
|
|
MediaCategory::Video => "video",
|
|
|
|
MediaCategory::Unknown => "unknown",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-02 13:34:48 +02:00
|
|
|
impl Media {
|
|
|
|
insert!(medias, NewMedia);
|
|
|
|
get!(medias);
|
2019-08-28 11:37:03 +02:00
|
|
|
|
|
|
|
pub fn for_user(conn: &Connection, owner: i32) -> Result<Vec<Media>> {
|
|
|
|
medias::table
|
|
|
|
.filter(medias::owner_id.eq(owner))
|
|
|
|
.order(medias::id.desc())
|
|
|
|
.load::<Self>(conn)
|
|
|
|
.map_err(Error::from)
|
|
|
|
}
|
2018-09-02 22:55:42 +02:00
|
|
|
|
2018-12-29 09:36:07 +01:00
|
|
|
pub fn list_all_medias(conn: &Connection) -> Result<Vec<Media>> {
|
2019-03-20 17:56:17 +01:00
|
|
|
medias::table.load::<Media>(conn).map_err(Error::from)
|
2018-11-24 12:44:17 +01:00
|
|
|
}
|
|
|
|
|
2019-03-20 17:56:17 +01:00
|
|
|
pub fn page_for_user(
|
|
|
|
conn: &Connection,
|
|
|
|
user: &User,
|
|
|
|
(min, max): (i32, i32),
|
|
|
|
) -> Result<Vec<Media>> {
|
2019-03-06 14:11:36 +01:00
|
|
|
medias::table
|
|
|
|
.filter(medias::owner_id.eq(user.id))
|
2019-08-28 11:37:03 +02:00
|
|
|
.order(medias::id.desc())
|
2019-03-19 14:37:56 +01:00
|
|
|
.offset(i64::from(min))
|
|
|
|
.limit(i64::from(max - min))
|
2019-03-06 14:11:36 +01:00
|
|
|
.load::<Media>(conn)
|
|
|
|
.map_err(Error::from)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn count_for_user(conn: &Connection, user: &User) -> Result<i64> {
|
|
|
|
medias::table
|
|
|
|
.filter(medias::owner_id.eq(user.id))
|
|
|
|
.count()
|
|
|
|
.get_result(conn)
|
|
|
|
.map_err(Error::from)
|
|
|
|
}
|
|
|
|
|
2018-12-06 18:54:16 +01:00
|
|
|
pub fn category(&self) -> MediaCategory {
|
2019-01-27 13:44:09 +01:00
|
|
|
match &*self
|
2018-11-24 12:44:17 +01:00
|
|
|
.file_path
|
|
|
|
.rsplitn(2, '.')
|
|
|
|
.next()
|
2018-12-06 18:54:16 +01:00
|
|
|
.expect("Media::category: extension error")
|
2019-01-27 13:44:09 +01:00
|
|
|
.to_lowercase()
|
2018-11-24 12:44:17 +01:00
|
|
|
{
|
2018-12-06 18:54:16 +01:00
|
|
|
"png" | "jpg" | "jpeg" | "gif" | "svg" => MediaCategory::Image,
|
|
|
|
"mp3" | "wav" | "flac" => MediaCategory::Audio,
|
|
|
|
"mp4" | "avi" | "webm" | "mov" => MediaCategory::Video,
|
|
|
|
_ => MediaCategory::Unknown,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-10 22:59:34 +02:00
|
|
|
pub fn html(&self) -> Result<SafeString> {
|
|
|
|
let url = self.url()?;
|
2018-12-29 09:36:07 +01:00
|
|
|
Ok(match self.category() {
|
2019-03-06 14:11:36 +01:00
|
|
|
MediaCategory::Image => SafeString::trusted(&format!(
|
2018-12-06 18:54:16 +01:00
|
|
|
r#"<img src="{}" alt="{}" title="{}">"#,
|
|
|
|
url, escape(&self.alt_text), escape(&self.alt_text)
|
|
|
|
)),
|
2019-03-06 14:11:36 +01:00
|
|
|
MediaCategory::Audio => SafeString::trusted(&format!(
|
|
|
|
r#"<div class="media-preview audio"></div><audio src="{}" title="{}" controls></audio>"#,
|
2018-12-06 18:54:16 +01:00
|
|
|
url, escape(&self.alt_text)
|
|
|
|
)),
|
2019-03-06 14:11:36 +01:00
|
|
|
MediaCategory::Video => SafeString::trusted(&format!(
|
|
|
|
r#"<video src="{}" title="{}" controls></video>"#,
|
2018-12-06 18:54:16 +01:00
|
|
|
url, escape(&self.alt_text)
|
|
|
|
)),
|
2019-03-06 14:11:36 +01:00
|
|
|
MediaCategory::Unknown => SafeString::trusted(&format!(
|
|
|
|
r#"<a href="{}" class="media-preview unknown"></a>"#,
|
|
|
|
url,
|
|
|
|
)),
|
2018-12-29 09:36:07 +01:00
|
|
|
})
|
2018-12-06 18:54:16 +01:00
|
|
|
}
|
|
|
|
|
2019-05-10 22:59:34 +02:00
|
|
|
pub fn markdown(&self) -> Result<SafeString> {
|
2018-12-29 09:36:07 +01:00
|
|
|
Ok(match self.category() {
|
2019-03-20 17:56:17 +01:00
|
|
|
MediaCategory::Image => {
|
2019-04-06 19:20:33 +02:00
|
|
|
SafeString::new(&format!("![{}]({})", escape(&self.alt_text), self.id))
|
2019-03-20 17:56:17 +01:00
|
|
|
}
|
2019-05-10 22:59:34 +02:00
|
|
|
MediaCategory::Audio | MediaCategory::Video => self.html()?,
|
2018-12-06 18:54:16 +01:00
|
|
|
MediaCategory::Unknown => SafeString::new(""),
|
2018-12-29 09:36:07 +01:00
|
|
|
})
|
2018-09-02 22:55:42 +02:00
|
|
|
}
|
|
|
|
|
2019-05-10 22:59:34 +02:00
|
|
|
pub fn url(&self) -> Result<String> {
|
2018-09-03 13:17:59 +02:00
|
|
|
if self.is_remote {
|
2018-12-29 09:36:07 +01:00
|
|
|
Ok(self.remote_url.clone().unwrap_or_default())
|
2018-09-03 13:17:59 +02:00
|
|
|
} else {
|
2019-10-28 22:28:28 +01:00
|
|
|
let p = Path::new(&self.file_path);
|
|
|
|
let filename: String = p.file_name().unwrap().to_str().unwrap().to_owned();
|
2018-12-29 09:36:07 +01:00
|
|
|
Ok(ap_url(&format!(
|
2019-10-28 22:28:28 +01:00
|
|
|
"{}/static/media/{}",
|
2019-05-10 22:59:34 +02:00
|
|
|
Instance::get_local()?.public_domain,
|
2019-10-28 22:28:28 +01:00
|
|
|
&filename
|
2018-12-29 09:36:07 +01:00
|
|
|
)))
|
2018-09-03 13:17:59 +02:00
|
|
|
}
|
2018-09-02 22:55:42 +02:00
|
|
|
}
|
2018-09-02 23:10:15 +02:00
|
|
|
|
2018-12-29 09:36:07 +01:00
|
|
|
pub fn delete(&self, conn: &Connection) -> Result<()> {
|
2018-11-24 12:44:17 +01:00
|
|
|
if !self.is_remote {
|
2018-12-29 09:36:07 +01:00
|
|
|
fs::remove_file(self.file_path.as_str())?;
|
2018-11-24 12:44:17 +01:00
|
|
|
}
|
|
|
|
diesel::delete(self)
|
|
|
|
.execute(conn)
|
2018-12-29 09:36:07 +01:00
|
|
|
.map(|_| ())
|
|
|
|
.map_err(Error::from)
|
2018-09-02 23:10:15 +02:00
|
|
|
}
|
2018-09-03 13:17:59 +02:00
|
|
|
|
2018-12-29 09:36:07 +01:00
|
|
|
pub fn save_remote(conn: &Connection, url: String, user: &User) -> Result<Media> {
|
2018-12-02 19:07:36 +01:00
|
|
|
if url.contains(&['<', '>', '"'][..]) {
|
2018-12-29 09:36:07 +01:00
|
|
|
Err(Error::Url)
|
2018-12-02 19:07:36 +01:00
|
|
|
} else {
|
2018-12-29 09:36:07 +01:00
|
|
|
Media::insert(
|
2018-12-02 19:07:36 +01:00
|
|
|
conn,
|
|
|
|
NewMedia {
|
|
|
|
file_path: String::new(),
|
|
|
|
alt_text: String::new(),
|
|
|
|
is_remote: true,
|
|
|
|
remote_url: Some(url),
|
|
|
|
sensitive: false,
|
|
|
|
content_warning: None,
|
|
|
|
owner_id: user.id,
|
|
|
|
},
|
2018-12-29 09:36:07 +01:00
|
|
|
)
|
2018-12-02 19:07:36 +01:00
|
|
|
}
|
2018-09-03 13:17:59 +02:00
|
|
|
}
|
|
|
|
|
2018-12-29 09:36:07 +01:00
|
|
|
pub fn set_owner(&self, conn: &Connection, user: &User) -> Result<()> {
|
2018-09-03 13:17:59 +02:00
|
|
|
diesel::update(self)
|
2018-11-24 12:44:17 +01:00
|
|
|
.set(medias::owner_id.eq(user.id))
|
2018-09-03 13:17:59 +02:00
|
|
|
.execute(conn)
|
2018-12-29 09:36:07 +01:00
|
|
|
.map(|_| ())
|
|
|
|
.map_err(Error::from)
|
2018-09-03 13:17:59 +02:00
|
|
|
}
|
2018-10-31 10:40:20 +01:00
|
|
|
|
|
|
|
// TODO: merge with save_remote?
|
2019-04-17 19:31:47 +02:00
|
|
|
pub fn from_activity(c: &PlumeRocket, image: &Image) -> Result<Media> {
|
|
|
|
let conn = &*c.conn;
|
2018-10-31 10:40:20 +01:00
|
|
|
let remote_url = image.object_props.url_string().ok()?;
|
2018-11-24 12:44:17 +01:00
|
|
|
let ext = remote_url
|
|
|
|
.rsplit('.')
|
|
|
|
.next()
|
2019-04-01 20:28:23 +02:00
|
|
|
.map(ToOwned::to_owned)
|
2018-11-26 10:21:52 +01:00
|
|
|
.unwrap_or_else(|| String::from("png"));
|
2019-10-28 22:28:28 +01:00
|
|
|
let path = Path::new(&super::CONFIG.media_directory).join(format!(
|
|
|
|
"{}.{}",
|
|
|
|
GUID::rand().to_string(),
|
|
|
|
ext
|
|
|
|
));
|
2018-10-31 10:40:20 +01:00
|
|
|
|
|
|
|
let mut dest = fs::File::create(path.clone()).ok()?;
|
2018-11-24 12:44:17 +01:00
|
|
|
reqwest::get(remote_url.as_str())
|
|
|
|
.ok()?
|
|
|
|
.copy_to(&mut dest)
|
|
|
|
.ok()?;
|
|
|
|
|
2018-12-29 09:36:07 +01:00
|
|
|
Media::insert(
|
2018-11-24 12:44:17 +01:00
|
|
|
conn,
|
|
|
|
NewMedia {
|
|
|
|
file_path: path.to_str()?.to_string(),
|
|
|
|
alt_text: image.object_props.content_string().ok()?,
|
2018-12-02 19:07:36 +01:00
|
|
|
is_remote: false,
|
2018-11-24 12:44:17 +01:00
|
|
|
remote_url: None,
|
|
|
|
sensitive: image.object_props.summary_string().is_ok(),
|
|
|
|
content_warning: image.object_props.summary_string().ok(),
|
2019-04-17 19:31:47 +02:00
|
|
|
owner_id: User::from_id(
|
|
|
|
c,
|
2018-11-24 12:44:17 +01:00
|
|
|
image
|
|
|
|
.object_props
|
|
|
|
.attributed_to_link_vec::<Id>()
|
|
|
|
.ok()?
|
|
|
|
.into_iter()
|
|
|
|
.next()?
|
2018-11-26 10:21:52 +01:00
|
|
|
.as_ref(),
|
2019-04-17 19:31:47 +02:00
|
|
|
None,
|
|
|
|
)
|
|
|
|
.map_err(|(_, e)| e)?
|
2019-03-20 17:56:17 +01:00
|
|
|
.id,
|
2018-11-24 12:44:17 +01:00
|
|
|
},
|
2018-12-29 09:36:07 +01:00
|
|
|
)
|
2018-11-24 12:44:17 +01:00
|
|
|
}
|
2019-04-06 19:20:33 +02:00
|
|
|
|
|
|
|
pub fn get_media_processor<'a>(conn: &'a Connection, user: Vec<&User>) -> MediaProcessor<'a> {
|
|
|
|
let uid = user.iter().map(|u| u.id).collect::<Vec<_>>();
|
|
|
|
Box::new(move |id| {
|
|
|
|
let media = Media::get(conn, id).ok()?;
|
|
|
|
// if owner is user or check is disabled
|
|
|
|
if uid.contains(&media.owner_id) || uid.is_empty() {
|
2019-05-10 22:59:34 +02:00
|
|
|
Some((media.url().ok()?, media.content_warning))
|
2019-04-06 19:20:33 +02:00
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2018-11-24 12:44:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
pub(crate) mod tests {
|
|
|
|
use super::*;
|
|
|
|
use diesel::Connection;
|
|
|
|
use std::env::{current_dir, set_current_dir};
|
|
|
|
use std::fs;
|
|
|
|
use std::path::Path;
|
|
|
|
use tests::db;
|
|
|
|
use users::tests as usersTests;
|
|
|
|
use Connection as Conn;
|
|
|
|
|
2018-12-09 18:44:26 +01:00
|
|
|
pub(crate) fn fill_database(conn: &Conn) -> (Vec<User>, Vec<Media>) {
|
2018-11-24 12:44:17 +01:00
|
|
|
let mut wd = current_dir().unwrap().to_path_buf();
|
|
|
|
while wd.pop() {
|
|
|
|
if wd.join(".git").exists() {
|
|
|
|
set_current_dir(wd).unwrap();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let users = usersTests::fill_database(conn);
|
|
|
|
let user_one = users[0].id;
|
|
|
|
let user_two = users[1].id;
|
|
|
|
let f1 = "static/media/1.png".to_owned();
|
|
|
|
let f2 = "static/media/2.mp3".to_owned();
|
|
|
|
fs::write(f1.clone(), []).unwrap();
|
|
|
|
fs::write(f2.clone(), []).unwrap();
|
2019-03-20 17:56:17 +01:00
|
|
|
(
|
|
|
|
users,
|
|
|
|
vec![
|
|
|
|
NewMedia {
|
|
|
|
file_path: f1,
|
|
|
|
alt_text: "some alt".to_owned(),
|
|
|
|
is_remote: false,
|
|
|
|
remote_url: None,
|
|
|
|
sensitive: false,
|
|
|
|
content_warning: None,
|
|
|
|
owner_id: user_one,
|
|
|
|
},
|
|
|
|
NewMedia {
|
|
|
|
file_path: f2,
|
|
|
|
alt_text: "alt message".to_owned(),
|
|
|
|
is_remote: false,
|
|
|
|
remote_url: None,
|
|
|
|
sensitive: true,
|
|
|
|
content_warning: Some("Content warning".to_owned()),
|
|
|
|
owner_id: user_one,
|
|
|
|
},
|
|
|
|
NewMedia {
|
|
|
|
file_path: "".to_owned(),
|
|
|
|
alt_text: "another alt".to_owned(),
|
|
|
|
is_remote: true,
|
|
|
|
remote_url: Some("https://example.com/".to_owned()),
|
|
|
|
sensitive: false,
|
|
|
|
content_warning: None,
|
|
|
|
owner_id: user_two,
|
|
|
|
},
|
|
|
|
]
|
|
|
|
.into_iter()
|
2018-12-29 09:36:07 +01:00
|
|
|
.map(|nm| Media::insert(conn, nm).unwrap())
|
2019-03-20 17:56:17 +01:00
|
|
|
.collect(),
|
|
|
|
)
|
2018-11-24 12:44:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) fn clean(conn: &Conn) {
|
|
|
|
//used to remove files generated by tests
|
2018-12-29 09:36:07 +01:00
|
|
|
for media in Media::list_all_medias(conn).unwrap() {
|
|
|
|
media.delete(conn).unwrap();
|
2018-11-24 12:44:17 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn delete() {
|
|
|
|
let conn = &db();
|
|
|
|
conn.test_transaction::<_, (), _>(|| {
|
2018-12-09 18:44:26 +01:00
|
|
|
let user = fill_database(conn).0[0].id;
|
2018-11-24 12:44:17 +01:00
|
|
|
|
|
|
|
let path = "static/media/test_deletion".to_owned();
|
|
|
|
fs::write(path.clone(), []).unwrap();
|
|
|
|
|
|
|
|
let media = Media::insert(
|
|
|
|
conn,
|
|
|
|
NewMedia {
|
|
|
|
file_path: path.clone(),
|
|
|
|
alt_text: "alt message".to_owned(),
|
|
|
|
is_remote: false,
|
|
|
|
remote_url: None,
|
|
|
|
sensitive: false,
|
|
|
|
content_warning: None,
|
|
|
|
owner_id: user,
|
|
|
|
},
|
2019-03-20 17:56:17 +01:00
|
|
|
)
|
|
|
|
.unwrap();
|
2018-11-24 12:44:17 +01:00
|
|
|
|
|
|
|
assert!(Path::new(&path).exists());
|
2018-12-29 09:36:07 +01:00
|
|
|
media.delete(conn).unwrap();
|
2018-11-24 12:44:17 +01:00
|
|
|
assert!(!Path::new(&path).exists());
|
|
|
|
|
|
|
|
clean(conn);
|
|
|
|
Ok(())
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn set_owner() {
|
|
|
|
let conn = &db();
|
|
|
|
conn.test_transaction::<_, (), _>(|| {
|
2018-12-09 18:44:26 +01:00
|
|
|
let (users, _) = fill_database(conn);
|
2018-11-24 12:44:17 +01:00
|
|
|
let u1 = &users[0];
|
|
|
|
let u2 = &users[1];
|
|
|
|
|
|
|
|
let path = "static/media/test_set_owner".to_owned();
|
|
|
|
fs::write(path.clone(), []).unwrap();
|
|
|
|
|
|
|
|
let media = Media::insert(
|
|
|
|
conn,
|
|
|
|
NewMedia {
|
|
|
|
file_path: path.clone(),
|
|
|
|
alt_text: "alt message".to_owned(),
|
|
|
|
is_remote: false,
|
|
|
|
remote_url: None,
|
|
|
|
sensitive: false,
|
|
|
|
content_warning: None,
|
|
|
|
owner_id: u1.id,
|
|
|
|
},
|
2019-03-20 17:56:17 +01:00
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
assert!(Media::for_user(conn, u1.id)
|
|
|
|
.unwrap()
|
|
|
|
.iter()
|
|
|
|
.any(|m| m.id == media.id));
|
|
|
|
assert!(!Media::for_user(conn, u2.id)
|
|
|
|
.unwrap()
|
|
|
|
.iter()
|
|
|
|
.any(|m| m.id == media.id));
|
2018-12-29 09:36:07 +01:00
|
|
|
media.set_owner(conn, u2).unwrap();
|
2019-03-20 17:56:17 +01:00
|
|
|
assert!(!Media::for_user(conn, u1.id)
|
|
|
|
.unwrap()
|
|
|
|
.iter()
|
|
|
|
.any(|m| m.id == media.id));
|
|
|
|
assert!(Media::for_user(conn, u2.id)
|
|
|
|
.unwrap()
|
|
|
|
.iter()
|
|
|
|
.any(|m| m.id == media.id));
|
2018-11-24 12:44:17 +01:00
|
|
|
|
|
|
|
clean(conn);
|
|
|
|
Ok(())
|
|
|
|
});
|
2018-10-31 10:40:20 +01:00
|
|
|
}
|
2018-09-02 13:34:48 +02:00
|
|
|
}
|