2018-06-10 13:13:07 +02:00
use activitypub ::{
2018-07-26 22:23:53 +02:00
Activity , Actor , Object , Endpoint , CustomObject ,
2018-06-21 17:14:26 +02:00
actor ::Person ,
collection ::OrderedCollection
2018-05-16 20:20:44 +02:00
} ;
2018-04-24 11:21:39 +02:00
use bcrypt ;
2018-04-30 19:46:27 +02:00
use chrono ::NaiveDateTime ;
2018-05-19 09:39:59 +02:00
use diesel ::{ self , QueryDsl , RunQueryDsl , ExpressionMethods , BelongingToDsl , PgConnection , dsl ::any } ;
use openssl ::{
hash ::MessageDigest ,
pkey ::{ PKey , Private } ,
rsa ::Rsa ,
sign
} ;
2018-06-23 18:36:11 +02:00
use plume_common ::activity_pub ::{
2018-07-18 16:58:28 +02:00
ap_accept_header , ActivityStream , Id , IntoId , ApSignature , PublicKey ,
2018-06-23 18:36:11 +02:00
inbox ::WithInbox ,
sign ::{ Signer , gen_keypair }
} ;
2018-05-19 09:39:59 +02:00
use reqwest ::{
Client ,
header ::{ Accept , qitem } ,
mime ::Mime
} ;
use rocket ::{
request ::{ self , FromRequest , Request } ,
outcome ::IntoOutcome
} ;
2018-05-01 13:48:19 +02:00
use serde_json ;
2018-05-01 20:02:29 +02:00
use url ::Url ;
2018-06-18 23:50:40 +02:00
use webfinger ::* ;
2018-04-24 11:21:39 +02:00
2018-06-26 16:21:58 +02:00
use { BASE_URL , USE_HTTPS , ap_url } ;
2018-04-23 11:52:44 +02:00
use db_conn ::DbConn ;
2018-06-23 18:36:11 +02:00
use blogs ::Blog ;
use blog_authors ::BlogAuthor ;
use follows ::Follow ;
use instance ::* ;
use likes ::Like ;
use post_authors ::PostAuthor ;
use posts ::Post ;
use reshares ::Reshare ;
2018-06-11 16:05:18 +02:00
use safe_string ::SafeString ;
2018-06-23 18:36:11 +02:00
use schema ::users ;
2018-04-23 11:52:44 +02:00
pub const AUTH_COOKIE : & 'static str = " user_id " ;
2018-04-22 20:13:12 +02:00
2018-06-21 22:30:56 +02:00
pub type CustomPerson = CustomObject < ApSignature , Person > ;
2018-06-20 23:51:47 +02:00
#[ derive(Queryable, Identifiable, Serialize, Deserialize, Clone, Debug) ]
2018-04-22 20:13:12 +02:00
pub struct User {
pub id : i32 ,
pub username : String ,
pub display_name : String ,
pub outbox_url : String ,
pub inbox_url : String ,
pub is_admin : bool ,
2018-06-11 16:05:18 +02:00
pub summary : SafeString ,
2018-04-22 20:13:12 +02:00
pub email : Option < String > ,
pub hashed_password : Option < String > ,
2018-04-30 19:46:27 +02:00
pub instance_id : i32 ,
2018-05-01 20:02:29 +02:00
pub creation_date : NaiveDateTime ,
2018-05-03 19:12:01 +02:00
pub ap_url : String ,
pub private_key : Option < String > ,
2018-05-13 20:12:27 +02:00
pub public_key : String ,
pub shared_inbox_url : Option < String >
2018-04-22 20:13:12 +02:00
}
#[ derive(Insertable) ]
#[ table_name = " users " ]
pub struct NewUser {
pub username : String ,
pub display_name : String ,
pub outbox_url : String ,
pub inbox_url : String ,
pub is_admin : bool ,
2018-06-11 16:05:18 +02:00
pub summary : SafeString ,
2018-04-22 20:13:12 +02:00
pub email : Option < String > ,
pub hashed_password : Option < String > ,
2018-05-01 20:02:29 +02:00
pub instance_id : i32 ,
2018-05-03 19:12:01 +02:00
pub ap_url : String ,
pub private_key : Option < String > ,
2018-05-13 20:12:27 +02:00
pub public_key : String ,
pub shared_inbox_url : Option < String >
2018-04-22 20:13:12 +02:00
}
2018-06-21 19:42:17 +02:00
const USER_PREFIX : & 'static str = " @ " ;
2018-04-22 20:13:12 +02:00
impl User {
2018-06-18 15:57:38 +02:00
insert! ( users , NewUser ) ;
2018-06-20 10:44:56 +02:00
get! ( users ) ;
find_by! ( users , find_by_email , email as String ) ;
find_by! ( users , find_by_name , username as String , instance_id as i32 ) ;
2018-06-20 21:06:34 +02:00
find_by! ( users , find_by_ap_url , ap_url as String ) ;
2018-06-18 15:57:38 +02:00
2018-06-21 19:53:57 +02:00
pub fn get_instance ( & self , conn : & PgConnection ) -> Instance {
Instance ::get ( conn , self . instance_id ) . expect ( " Couldn't find instance " )
}
2018-05-13 13:53:58 +02:00
pub fn grant_admin_rights ( & self , conn : & PgConnection ) {
diesel ::update ( self )
. set ( users ::is_admin . eq ( true ) )
. load ::< User > ( conn )
. expect ( " Couldn't grant admin rights " ) ;
}
2018-04-22 20:13:12 +02:00
2018-05-12 17:30:14 +02:00
pub fn update ( & self , conn : & PgConnection , name : String , email : String , summary : String ) -> User {
diesel ::update ( self )
. set ( (
users ::display_name . eq ( name ) ,
users ::email . eq ( email ) ,
users ::summary . eq ( summary ) ,
) ) . load ::< User > ( conn )
. expect ( " Couldn't update user " )
. into_iter ( ) . nth ( 0 ) . unwrap ( )
}
2018-06-10 21:33:42 +02:00
pub fn count_local ( conn : & PgConnection ) -> usize {
users ::table . filter ( users ::instance_id . eq ( Instance ::local_id ( conn ) ) )
. load ::< User > ( conn )
. expect ( " Couldn't load local users " )
. len ( )
}
2018-05-01 13:48:19 +02:00
pub fn find_local ( conn : & PgConnection , username : String ) -> Option < User > {
User ::find_by_name ( conn , username , Instance ::local_id ( conn ) )
}
pub fn find_by_fqn ( conn : & PgConnection , fqn : String ) -> Option < User > {
if fqn . contains ( " @ " ) { // remote user
2018-05-13 13:53:58 +02:00
match Instance ::find_by_domain ( conn , String ::from ( fqn . split ( " @ " ) . last ( ) . unwrap ( ) ) ) {
2018-05-01 13:48:19 +02:00
Some ( instance ) = > {
match User ::find_by_name ( conn , String ::from ( fqn . split ( " @ " ) . nth ( 0 ) . unwrap ( ) ) , instance . id ) {
Some ( u ) = > Some ( u ) ,
None = > User ::fetch_from_webfinger ( conn , fqn )
}
} ,
None = > User ::fetch_from_webfinger ( conn , fqn )
}
} else { // local user
User ::find_local ( conn , fqn )
}
}
fn fetch_from_webfinger ( conn : & PgConnection , acct : String ) -> Option < User > {
2018-06-26 16:16:59 +02:00
match resolve ( acct . clone ( ) , * USE_HTTPS ) {
2018-07-26 21:35:35 +02:00
Ok ( wf ) = > wf . links . into_iter ( ) . find ( | l | l . mime_type = = Some ( String ::from ( " application/activity+json " ) ) ) . and_then ( | l | User ::fetch_from_url ( conn , l . href . expect ( " No href for AP WF link " ) ) ) ,
2018-05-01 13:48:19 +02:00
Err ( details ) = > {
2018-07-26 21:35:35 +02:00
println! ( " WF Error: {:?} " , details ) ;
2018-05-01 13:48:19 +02:00
None
}
}
}
2018-05-01 20:02:29 +02:00
fn fetch_from_url ( conn : & PgConnection , url : String ) -> Option < User > {
let req = Client ::new ( )
. get ( & url [ .. ] )
2018-07-18 16:58:28 +02:00
. header ( Accept ( ap_accept_header ( ) . into_iter ( ) . map ( | h | qitem ( h . parse ::< Mime > ( ) . expect ( " Invalid Content-Type " ) ) ) . collect ( ) ) )
2018-05-01 20:02:29 +02:00
. send ( ) ;
match req {
Ok ( mut res ) = > {
2018-06-22 17:17:53 +02:00
let text = & res . text ( ) . unwrap ( ) ;
let ap_sign : ApSignature = serde_json ::from_str ( text ) . unwrap ( ) ;
let mut json : CustomPerson = serde_json ::from_str ( text ) . unwrap ( ) ;
json . custom_props = ap_sign ; // without this workaround, publicKey is not correctly deserialized
2018-05-01 20:02:29 +02:00
Some ( User ::from_activity ( conn , json , Url ::parse ( url . as_ref ( ) ) . unwrap ( ) . host_str ( ) . unwrap ( ) . to_string ( ) ) )
} ,
2018-06-26 16:16:59 +02:00
Err ( e ) = > {
2018-07-26 21:35:35 +02:00
println! ( " User fetch error: {:?} " , e ) ;
2018-06-26 16:16:59 +02:00
None
}
2018-05-01 20:02:29 +02:00
}
}
2018-06-21 22:30:56 +02:00
fn from_activity ( conn : & PgConnection , acct : CustomPerson , inst : String ) -> User {
2018-05-13 13:53:58 +02:00
let instance = match Instance ::find_by_domain ( conn , inst . clone ( ) ) {
2018-05-01 13:48:19 +02:00
Some ( instance ) = > instance ,
None = > {
2018-06-18 15:57:38 +02:00
Instance ::insert ( conn , NewInstance {
name : inst . clone ( ) ,
public_domain : inst . clone ( ) ,
local : false
} )
2018-05-01 13:48:19 +02:00
}
} ;
2018-06-22 17:17:53 +02:00
println! ( " User from act : {:?} " , acct . custom_props ) ;
2018-05-01 13:48:19 +02:00
User ::insert ( conn , NewUser {
2018-06-21 22:30:56 +02:00
username : acct . object . ap_actor_props . preferred_username_string ( ) . expect ( " User::from_activity: preferredUsername error " ) ,
display_name : acct . object . object_props . name_string ( ) . expect ( " User::from_activity: name error " ) ,
outbox_url : acct . object . ap_actor_props . outbox_string ( ) . expect ( " User::from_activity: outbox error " ) ,
inbox_url : acct . object . ap_actor_props . inbox_string ( ) . expect ( " User::from_activity: inbox error " ) ,
2018-05-01 13:48:19 +02:00
is_admin : false ,
2018-07-19 10:41:37 +02:00
summary : SafeString ::new ( & acct . object . object_props . summary_string ( ) . unwrap_or ( String ::new ( ) ) ) ,
2018-05-01 13:48:19 +02:00
email : None ,
hashed_password : None ,
2018-05-01 20:02:29 +02:00
instance_id : instance . id ,
2018-06-21 22:30:56 +02:00
ap_url : acct . object . object_props . id_string ( ) . expect ( " User::from_activity: id error " ) ,
public_key : acct . custom_props . public_key_publickey ( ) . expect ( " User::from_activity: publicKey error " )
. public_key_pem_string ( ) . expect ( " User::from_activity: publicKey.publicKeyPem error " ) ,
2018-05-13 20:12:27 +02:00
private_key : None ,
2018-06-21 22:30:56 +02:00
shared_inbox_url : acct . object . ap_actor_props . endpoints_endpoint ( )
. and_then ( | e | e . shared_inbox_string ( ) ) . ok ( )
2018-05-01 13:48:19 +02:00
} )
}
2018-04-23 11:52:44 +02:00
pub fn hash_pass ( pass : String ) -> String {
bcrypt ::hash ( pass . as_str ( ) , bcrypt ::DEFAULT_COST ) . unwrap ( )
}
pub fn auth ( & self , pass : String ) -> bool {
2018-06-25 15:38:39 +02:00
if let Ok ( valid ) = bcrypt ::verify ( pass . as_str ( ) , self . hashed_password . clone ( ) . unwrap ( ) . as_str ( ) ) {
valid
} else {
false
}
2018-04-23 11:52:44 +02:00
}
2018-04-23 15:12:59 +02:00
pub fn update_boxes ( & self , conn : & PgConnection ) {
2018-06-21 19:42:17 +02:00
let instance = self . get_instance ( conn ) ;
2018-04-23 15:12:59 +02:00
if self . outbox_url . len ( ) = = 0 {
diesel ::update ( self )
2018-06-21 19:42:17 +02:00
. set ( users ::outbox_url . eq ( instance . compute_box ( USER_PREFIX , self . username . clone ( ) , " outbox " ) ) )
. get_result ::< User > ( conn ) . expect ( " Couldn't update outbox URL " ) ;
2018-04-23 15:12:59 +02:00
}
if self . inbox_url . len ( ) = = 0 {
diesel ::update ( self )
2018-06-21 19:42:17 +02:00
. set ( users ::inbox_url . eq ( instance . compute_box ( USER_PREFIX , self . username . clone ( ) , " inbox " ) ) )
2018-05-01 20:02:29 +02:00
. get_result ::< User > ( conn ) . expect ( " Couldn't update inbox URL " ) ;
}
if self . ap_url . len ( ) = = 0 {
diesel ::update ( self )
2018-06-21 19:42:17 +02:00
. set ( users ::ap_url . eq ( instance . compute_box ( USER_PREFIX , self . username . clone ( ) , " " ) ) )
2018-05-01 20:02:29 +02:00
. get_result ::< User > ( conn ) . expect ( " Couldn't update AP URL " ) ;
2018-04-23 15:12:59 +02:00
}
2018-05-13 20:12:27 +02:00
if self . shared_inbox_url . is_none ( ) {
diesel ::update ( self )
. set ( users ::shared_inbox_url . eq ( ap_url ( format! ( " {} /inbox " , Instance ::get_local ( conn ) . unwrap ( ) . public_domain ) ) ) )
. get_result ::< User > ( conn ) . expect ( " Couldn't update shared inbox URL " ) ;
}
2018-04-23 15:12:59 +02:00
}
2018-04-29 20:01:42 +02:00
2018-05-16 20:20:44 +02:00
pub fn outbox ( & self , conn : & PgConnection ) -> ActivityStream < OrderedCollection > {
2018-05-19 00:04:30 +02:00
let acts = self . get_activities ( conn ) ;
let n_acts = acts . len ( ) ;
let mut coll = OrderedCollection ::default ( ) ;
coll . collection_props . items = serde_json ::to_value ( acts ) . unwrap ( ) ;
coll . collection_props . set_total_items_u64 ( n_acts as u64 ) . unwrap ( ) ;
2018-05-16 20:20:44 +02:00
ActivityStream ::new ( coll )
2018-04-29 20:01:42 +02:00
}
2018-07-26 22:23:53 +02:00
pub fn fetch_outbox < T : Activity > ( & self ) -> Vec < T > {
let req = Client ::new ( )
. get ( & self . outbox_url [ .. ] )
. header ( Accept ( ap_accept_header ( ) . into_iter ( ) . map ( | h | qitem ( h . parse ::< Mime > ( ) . expect ( " Invalid Content-Type " ) ) ) . collect ( ) ) )
. send ( ) ;
match req {
Ok ( mut res ) = > {
let text = & res . text ( ) . unwrap ( ) ;
let json : serde_json ::Value = serde_json ::from_str ( text ) . unwrap ( ) ;
json [ " items " ] . as_array ( )
. expect ( " Outbox.items is not an array " )
. into_iter ( )
. filter_map ( | j | serde_json ::from_value ( j . clone ( ) ) . ok ( ) )
. collect ::< Vec < T > > ( )
} ,
Err ( e ) = > {
println! ( " User outbox fetch error: {:?} " , e ) ;
vec! [ ]
}
}
}
2018-05-16 20:20:44 +02:00
fn get_activities ( & self , conn : & PgConnection ) -> Vec < serde_json ::Value > {
2018-04-29 22:23:44 +02:00
use schema ::posts ;
use schema ::post_authors ;
let posts_by_self = PostAuthor ::belonging_to ( self ) . select ( post_authors ::post_id ) ;
let posts = posts ::table . filter ( posts ::id . eq ( any ( posts_by_self ) ) ) . load ::< Post > ( conn ) . unwrap ( ) ;
2018-05-19 00:04:30 +02:00
posts . into_iter ( ) . map ( | p | {
serde_json ::to_value ( p . create_activity ( conn ) ) . unwrap ( )
2018-05-16 20:20:44 +02:00
} ) . collect ::< Vec < serde_json ::Value > > ( )
2018-04-29 20:01:42 +02:00
}
2018-05-01 15:23:23 +02:00
2018-05-13 13:53:58 +02:00
pub fn get_fqn ( & self , conn : & PgConnection ) -> String {
2018-05-13 19:19:23 +02:00
if self . instance_id = = Instance ::local_id ( conn ) {
self . username . clone ( )
} else {
format! ( " {} @ {} " , self . username , self . get_instance ( conn ) . public_domain )
}
2018-05-13 13:53:58 +02:00
}
2018-05-01 15:23:23 +02:00
pub fn get_followers ( & self , conn : & PgConnection ) -> Vec < User > {
use schema ::follows ;
let follows = Follow ::belonging_to ( self ) . select ( follows ::follower_id ) ;
users ::table . filter ( users ::id . eq ( any ( follows ) ) ) . load ::< User > ( conn ) . unwrap ( )
}
2018-07-25 15:50:29 +02:00
pub fn get_followers_page ( & self , conn : & PgConnection , ( min , max ) : ( i32 , i32 ) ) -> Vec < User > {
use schema ::follows ;
let follows = Follow ::belonging_to ( self ) . select ( follows ::follower_id ) ;
users ::table . filter ( users ::id . eq ( any ( follows ) ) )
. offset ( min . into ( ) )
. limit ( ( max - min ) . into ( ) )
. load ::< User > ( conn ) . unwrap ( )
}
2018-05-01 15:23:23 +02:00
pub fn get_following ( & self , conn : & PgConnection ) -> Vec < User > {
use schema ::follows ;
let follows = follows ::table . filter ( follows ::follower_id . eq ( self . id ) ) . select ( follows ::following_id ) ;
users ::table . filter ( users ::id . eq ( any ( follows ) ) ) . load ::< User > ( conn ) . unwrap ( )
}
2018-05-03 19:12:01 +02:00
2018-07-20 17:51:32 +02:00
pub fn is_followed_by ( & self , conn : & PgConnection , other_id : i32 ) -> bool {
2018-06-13 20:06:14 +02:00
use schema ::follows ;
follows ::table
. filter ( follows ::follower_id . eq ( other_id ) )
. filter ( follows ::following_id . eq ( self . id ) )
. load ::< Follow > ( conn )
. expect ( " Couldn't load follow relationship " )
. len ( ) > 0
}
2018-07-20 17:51:32 +02:00
pub fn is_following ( & self , conn : & PgConnection , other_id : i32 ) -> bool {
use schema ::follows ;
follows ::table
. filter ( follows ::follower_id . eq ( self . id ) )
. filter ( follows ::following_id . eq ( other_id ) )
. load ::< Follow > ( conn )
. expect ( " Couldn't load follow relationship " )
. len ( ) > 0
}
2018-05-12 22:56:57 +02:00
pub fn has_liked ( & self , conn : & PgConnection , post : & Post ) -> bool {
use schema ::likes ;
likes ::table
. filter ( likes ::post_id . eq ( post . id ) )
. filter ( likes ::user_id . eq ( self . id ) )
. load ::< Like > ( conn )
. expect ( " Couldn't load likes " )
. len ( ) > 0
}
2018-05-19 11:51:10 +02:00
pub fn has_reshared ( & self , conn : & PgConnection , post : & Post ) -> bool {
use schema ::reshares ;
reshares ::table
. filter ( reshares ::post_id . eq ( post . id ) )
. filter ( reshares ::user_id . eq ( self . id ) )
. load ::< Reshare > ( conn )
. expect ( " Couldn't load reshares " )
. len ( ) > 0
}
2018-06-10 20:16:25 +02:00
pub fn is_author_in ( & self , conn : & PgConnection , blog : Blog ) -> bool {
use schema ::blog_authors ;
blog_authors ::table . filter ( blog_authors ::author_id . eq ( self . id ) )
. filter ( blog_authors ::blog_id . eq ( blog . id ) )
. load ::< BlogAuthor > ( conn )
. expect ( " Couldn't load blog/author relationship " )
. len ( ) > 0
}
2018-05-03 19:12:01 +02:00
pub fn get_keypair ( & self ) -> PKey < Private > {
PKey ::from_rsa ( Rsa ::private_key_from_pem ( self . private_key . clone ( ) . unwrap ( ) . as_ref ( ) ) . unwrap ( ) ) . unwrap ( )
}
2018-05-19 00:04:30 +02:00
2018-06-21 23:12:24 +02:00
pub fn into_activity ( & self , _conn : & PgConnection ) -> CustomPerson {
2018-05-19 00:04:30 +02:00
let mut actor = Person ::default ( ) ;
2018-06-21 17:14:26 +02:00
actor . object_props . set_id_string ( self . ap_url . clone ( ) ) . expect ( " User::into_activity: id error " ) ;
2018-06-21 19:23:01 +02:00
actor . object_props . set_name_string ( self . display_name . clone ( ) ) . expect ( " User::into_activity: name error " ) ;
actor . object_props . set_summary_string ( self . summary . get ( ) . clone ( ) ) . expect ( " User::into_activity: summary error " ) ;
2018-06-21 17:14:26 +02:00
actor . object_props . set_url_string ( self . ap_url . clone ( ) ) . expect ( " User::into_activity: url error " ) ;
actor . ap_actor_props . set_inbox_string ( self . inbox_url . clone ( ) ) . expect ( " User::into_activity: inbox error " ) ;
actor . ap_actor_props . set_outbox_string ( self . outbox_url . clone ( ) ) . expect ( " User::into_activity: outbox error " ) ;
2018-06-21 19:53:57 +02:00
actor . ap_actor_props . set_preferred_username_string ( self . username . clone ( ) ) . expect ( " User::into_activity: preferredUsername error " ) ;
2018-06-21 17:14:26 +02:00
let mut endpoints = Endpoint ::default ( ) ;
endpoints . set_shared_inbox_string ( ap_url ( format! ( " {} /inbox/ " , BASE_URL . as_str ( ) ) ) ) . expect ( " User::into_activity: endpoints.sharedInbox error " ) ;
actor . ap_actor_props . set_endpoints_endpoint ( endpoints ) . expect ( " User::into_activity: endpoints error " ) ;
2018-06-21 23:12:24 +02:00
let mut public_key = PublicKey ::default ( ) ;
2018-06-22 17:17:53 +02:00
public_key . set_id_string ( format! ( " {} #main-key " , self . ap_url ) ) . expect ( " User::into_activity: publicKey.id error " ) ;
public_key . set_owner_string ( self . ap_url . clone ( ) ) . expect ( " User::into_activity: publicKey.owner error " ) ;
public_key . set_public_key_pem_string ( self . public_key . clone ( ) ) . expect ( " User::into_activity: publicKey.publicKeyPem error " ) ;
2018-06-21 23:12:24 +02:00
let mut ap_signature = ApSignature ::default ( ) ;
2018-06-22 17:17:53 +02:00
ap_signature . set_public_key_publickey ( public_key ) . expect ( " User::into_activity: publicKey error " ) ;
2018-06-21 23:12:24 +02:00
CustomPerson ::new ( actor , ap_signature )
2018-05-19 00:04:30 +02:00
}
2018-06-18 18:34:29 +02:00
pub fn to_json ( & self , conn : & PgConnection ) -> serde_json ::Value {
let mut json = serde_json ::to_value ( self ) . unwrap ( ) ;
json [ " fqn " ] = serde_json ::Value ::String ( self . get_fqn ( conn ) ) ;
2018-07-26 16:36:19 +02:00
json [ " name " ] = if self . display_name . len ( ) > 0 {
json! ( self . display_name )
} else {
json! ( self . get_fqn ( conn ) )
} ;
2018-06-18 18:34:29 +02:00
json
}
2018-06-18 23:50:40 +02:00
pub fn webfinger ( & self , conn : & PgConnection ) -> Webfinger {
Webfinger {
subject : format ! ( " acct:{}@{} " , self . username , self . get_instance ( conn ) . public_domain ) ,
2018-06-21 16:48:54 +02:00
aliases : vec ! [ self . ap_url . clone ( ) ] ,
2018-06-18 23:50:40 +02:00
links : vec ! [
Link {
rel : String ::from ( " http://webfinger.net/rel/profile-page " ) ,
mime_type : None ,
2018-07-26 21:35:35 +02:00
href : Some ( self . ap_url . clone ( ) ) ,
template : None
2018-06-18 23:50:40 +02:00
} ,
Link {
rel : String ::from ( " http://schemas.google.com/g/2010#updates-from " ) ,
mime_type : Some ( String ::from ( " application/atom+xml " ) ) ,
2018-07-26 21:35:35 +02:00
href : Some ( self . get_instance ( conn ) . compute_box ( USER_PREFIX , self . username . clone ( ) , " feed.atom " ) ) ,
template : None
2018-06-18 23:50:40 +02:00
} ,
Link {
rel : String ::from ( " self " ) ,
mime_type : Some ( String ::from ( " application/activity+json " ) ) ,
2018-07-26 21:35:35 +02:00
href : Some ( self . ap_url . clone ( ) ) ,
template : None
2018-06-18 23:50:40 +02:00
}
]
}
}
2018-06-21 19:23:01 +02:00
pub fn from_url ( conn : & PgConnection , url : String ) -> Option < User > {
User ::find_by_ap_url ( conn , url . clone ( ) ) . or_else ( | | {
// The requested user was not in the DB
// We try to fetch it if it is remote
if Url ::parse ( url . as_ref ( ) ) . unwrap ( ) . host_str ( ) . unwrap ( ) ! = BASE_URL . as_str ( ) {
2018-06-23 13:14:03 +02:00
User ::fetch_from_url ( conn , url )
2018-06-21 19:23:01 +02:00
} else {
None
}
} )
}
2018-05-19 00:04:30 +02:00
}
2018-04-23 11:52:44 +02:00
impl < ' a , ' r > FromRequest < ' a , ' r > for User {
type Error = ( ) ;
fn from_request ( request : & ' a Request < ' r > ) -> request ::Outcome < User , ( ) > {
let conn = request . guard ::< DbConn > ( ) ? ;
request . cookies ( )
. get_private ( AUTH_COOKIE )
. and_then ( | cookie | cookie . value ( ) . parse ( ) . ok ( ) )
. map ( | id | User ::get ( & * conn , id ) . unwrap ( ) )
. or_forward ( ( ) )
}
2018-04-22 20:13:12 +02:00
}
2018-04-23 14:01:32 +02:00
2018-05-18 10:04:40 +02:00
impl IntoId for User {
2018-05-19 00:04:30 +02:00
fn into_id ( self ) -> Id {
2018-05-18 10:04:40 +02:00
Id ::new ( self . ap_url . clone ( ) )
}
}
impl Object for User { }
impl Actor for User { }
impl WithInbox for User {
fn get_inbox_url ( & self ) -> String {
self . inbox_url . clone ( )
}
fn get_shared_inbox_url ( & self ) -> Option < String > {
self . shared_inbox_url . clone ( )
}
2018-07-18 15:49:13 +02:00
fn is_local ( & self ) -> bool {
self . instance_id = = 0
}
2018-05-18 10:04:40 +02:00
}
2018-05-03 21:11:04 +02:00
impl Signer for User {
2018-06-21 17:25:32 +02:00
fn get_key_id ( & self ) -> String {
2018-06-21 16:48:54 +02:00
format! ( " {} #main-key " , self . ap_url )
2018-05-03 19:12:01 +02:00
}
fn sign ( & self , to_sign : String ) -> Vec < u8 > {
let key = self . get_keypair ( ) ;
2018-05-03 21:11:04 +02:00
let mut signer = sign ::Signer ::new ( MessageDigest ::sha256 ( ) , & key ) . unwrap ( ) ;
2018-05-03 19:12:01 +02:00
signer . update ( to_sign . as_bytes ( ) ) . unwrap ( ) ;
signer . sign_to_vec ( ) . unwrap ( )
}
}
2018-04-23 15:12:59 +02:00
impl NewUser {
/// Creates a new local user
pub fn new_local (
2018-06-19 19:29:34 +02:00
conn : & PgConnection ,
2018-04-23 15:12:59 +02:00
username : String ,
display_name : String ,
is_admin : bool ,
summary : String ,
email : String ,
2018-06-19 19:29:34 +02:00
password : String
) -> User {
2018-05-03 21:11:04 +02:00
let ( pub_key , priv_key ) = gen_keypair ( ) ;
2018-06-19 19:29:34 +02:00
User ::insert ( conn , NewUser {
2018-04-23 15:12:59 +02:00
username : username ,
display_name : display_name ,
outbox_url : String ::from ( " " ) ,
inbox_url : String ::from ( " " ) ,
is_admin : is_admin ,
2018-06-11 16:05:18 +02:00
summary : SafeString ::new ( & summary ) ,
2018-04-23 15:12:59 +02:00
email : Some ( email ) ,
hashed_password : Some ( password ) ,
2018-06-19 19:29:34 +02:00
instance_id : Instance ::local_id ( conn ) ,
2018-05-03 19:12:01 +02:00
ap_url : String ::from ( " " ) ,
public_key : String ::from_utf8 ( pub_key ) . unwrap ( ) ,
2018-05-13 20:12:27 +02:00
private_key : Some ( String ::from_utf8 ( priv_key ) . unwrap ( ) ) ,
shared_inbox_url : None
2018-06-19 19:29:34 +02:00
} )
2018-04-23 15:12:59 +02:00
}
}