2022-11-28 14:29:33 +00:00
|
|
|
use actix_web::web::Data;
|
2021-04-01 17:30:24 +00:00
|
|
|
use captcha::Captcha;
|
2022-11-28 14:29:33 +00:00
|
|
|
use lemmy_api_common::{context::LemmyContext, utils::local_site_to_slur_regex};
|
2022-10-27 09:24:07 +00:00
|
|
|
use lemmy_db_schema::source::local_site::LocalSite;
|
2022-09-19 22:58:42 +00:00
|
|
|
use lemmy_utils::{error::LemmyError, utils::check_slurs, ConnectionId};
|
2020-09-24 13:53:21 +00:00
|
|
|
|
2021-03-25 19:19:40 +00:00
|
|
|
mod comment;
|
|
|
|
mod comment_report;
|
|
|
|
mod community;
|
|
|
|
mod local_user;
|
|
|
|
mod post;
|
|
|
|
mod post_report;
|
|
|
|
mod private_message;
|
2022-09-19 22:58:42 +00:00
|
|
|
mod private_message_report;
|
2021-03-25 19:19:40 +00:00
|
|
|
mod site;
|
|
|
|
mod websocket;
|
2020-09-24 13:53:21 +00:00
|
|
|
|
|
|
|
#[async_trait::async_trait(?Send)]
|
|
|
|
pub trait Perform {
|
|
|
|
type Response: serde::ser::Serialize + Send;
|
|
|
|
|
|
|
|
async fn perform(
|
|
|
|
&self,
|
|
|
|
context: &Data<LemmyContext>,
|
|
|
|
websocket_id: Option<ConnectionId>,
|
|
|
|
) -> Result<Self::Response, LemmyError>;
|
|
|
|
}
|
|
|
|
|
2021-04-01 17:30:24 +00:00
|
|
|
/// Converts the captcha to a base64 encoded wav audio file
|
|
|
|
pub(crate) fn captcha_as_wav_base64(captcha: &Captcha) -> String {
|
|
|
|
let letters = captcha.as_wav();
|
2020-09-24 13:53:21 +00:00
|
|
|
|
2021-04-01 17:30:24 +00:00
|
|
|
let mut concat_letters: Vec<u8> = Vec::new();
|
2020-09-24 13:53:21 +00:00
|
|
|
|
2021-04-01 17:30:24 +00:00
|
|
|
for letter in letters {
|
|
|
|
let bytes = letter.unwrap_or_default();
|
|
|
|
concat_letters.extend(bytes);
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Convert to base64
|
2021-04-01 17:30:24 +00:00
|
|
|
base64::encode(concat_letters)
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|
|
|
|
|
2022-09-19 22:58:42 +00:00
|
|
|
/// Check size of report and remove whitespace
|
2022-10-27 09:24:07 +00:00
|
|
|
pub(crate) fn check_report_reason(reason: &str, local_site: &LocalSite) -> Result<(), LemmyError> {
|
|
|
|
let slur_regex = &local_site_to_slur_regex(local_site);
|
|
|
|
|
|
|
|
check_slurs(reason, slur_regex)?;
|
2022-09-19 22:58:42 +00:00
|
|
|
if reason.is_empty() {
|
|
|
|
return Err(LemmyError::from_message("report_reason_required"));
|
|
|
|
}
|
|
|
|
if reason.chars().count() > 1000 {
|
|
|
|
return Err(LemmyError::from_message("report_too_long"));
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-09-24 13:53:21 +00:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2022-05-03 17:44:13 +00:00
|
|
|
use lemmy_api_common::utils::check_validator_time;
|
2021-10-16 13:33:38 +00:00
|
|
|
use lemmy_db_schema::{
|
|
|
|
source::{
|
2022-10-27 09:24:07 +00:00
|
|
|
instance::Instance,
|
|
|
|
local_user::{LocalUser, LocalUserInsertForm},
|
|
|
|
person::{Person, PersonInsertForm},
|
2021-10-16 13:33:38 +00:00
|
|
|
secret::Secret,
|
|
|
|
},
|
|
|
|
traits::Crud,
|
2022-11-09 10:05:00 +00:00
|
|
|
utils::build_db_pool_for_tests,
|
2021-03-13 18:16:35 +00:00
|
|
|
};
|
2022-06-22 20:24:54 +00:00
|
|
|
use lemmy_utils::{claims::Claims, settings::SETTINGS};
|
2022-11-09 10:05:00 +00:00
|
|
|
use serial_test::serial;
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
#[tokio::test]
|
|
|
|
#[serial]
|
|
|
|
async fn test_should_not_validate_user_token_after_password_change() {
|
|
|
|
let pool = &build_db_pool_for_tests().await;
|
|
|
|
let secret = Secret::init(pool).await.unwrap();
|
2022-06-22 20:24:54 +00:00
|
|
|
let settings = &SETTINGS.to_owned();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
let inserted_instance = Instance::create(pool, "my_domain.tld").await.unwrap();
|
2022-10-27 09:24:07 +00:00
|
|
|
|
|
|
|
let new_person = PersonInsertForm::builder()
|
|
|
|
.name("Gerry9812".into())
|
|
|
|
.public_key("pubkey".to_string())
|
|
|
|
.instance_id(inserted_instance.id)
|
|
|
|
.build();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
let inserted_person = Person::create(pool, &new_person).await.unwrap();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2022-10-27 09:24:07 +00:00
|
|
|
let local_user_form = LocalUserInsertForm::builder()
|
|
|
|
.person_id(inserted_person.id)
|
|
|
|
.password_encrypted("123456".to_string())
|
|
|
|
.build();
|
2021-03-13 20:36:40 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
let inserted_local_user = LocalUser::create(pool, &local_user_form).await.unwrap();
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-09-22 15:57:09 +00:00
|
|
|
let jwt = Claims::jwt(
|
|
|
|
inserted_local_user.id.0,
|
|
|
|
&secret.jwt_secret,
|
|
|
|
&settings.hostname,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
let claims = Claims::decode(&jwt, &secret.jwt_secret).unwrap().claims;
|
2021-03-19 04:31:49 +00:00
|
|
|
let check = check_validator_time(&inserted_local_user.validator_time, &claims);
|
|
|
|
assert!(check.is_ok());
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2021-03-19 04:31:49 +00:00
|
|
|
// The check should fail, since the validator time is now newer than the jwt issue time
|
|
|
|
let updated_local_user =
|
2022-11-09 10:05:00 +00:00
|
|
|
LocalUser::update_password(pool, inserted_local_user.id, "password111")
|
|
|
|
.await
|
|
|
|
.unwrap();
|
2021-03-19 04:31:49 +00:00
|
|
|
let check_after = check_validator_time(&updated_local_user.validator_time, &claims);
|
|
|
|
assert!(check_after.is_err());
|
2021-03-13 18:16:35 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
let num_deleted = Person::delete(pool, inserted_person.id).await.unwrap();
|
2021-03-19 04:31:49 +00:00
|
|
|
assert_eq!(1, num_deleted);
|
2021-03-13 18:16:35 +00:00
|
|
|
}
|
2020-09-24 13:53:21 +00:00
|
|
|
}
|