2022-04-13 18:12:25 +00:00
|
|
|
use crate::Perform;
|
|
|
|
use actix_web::web::Data;
|
|
|
|
use lemmy_api_common::{
|
2022-11-28 14:29:33 +00:00
|
|
|
context::LemmyContext,
|
2022-04-13 18:12:25 +00:00
|
|
|
person::{LoginResponse, SaveUserSettings},
|
2023-05-25 14:50:07 +00:00
|
|
|
utils::{local_user_view_from_jwt, send_verification_email},
|
2022-04-13 18:12:25 +00:00
|
|
|
};
|
|
|
|
use lemmy_db_schema::{
|
|
|
|
source::{
|
2022-10-06 18:27:58 +00:00
|
|
|
actor_language::LocalUserLanguage,
|
2022-10-27 09:24:07 +00:00
|
|
|
local_user::{LocalUser, LocalUserUpdateForm},
|
|
|
|
person::{Person, PersonUpdateForm},
|
2022-04-13 18:12:25 +00:00
|
|
|
},
|
|
|
|
traits::Crud,
|
2022-10-27 09:24:07 +00:00
|
|
|
utils::{diesel_option_overwrite, diesel_option_overwrite_to_url},
|
2022-04-13 18:12:25 +00:00
|
|
|
};
|
2023-03-02 20:37:41 +00:00
|
|
|
use lemmy_db_views::structs::SiteView;
|
2022-04-13 18:12:25 +00:00
|
|
|
use lemmy_utils::{
|
|
|
|
claims::Claims,
|
2022-06-02 14:33:41 +00:00
|
|
|
error::LemmyError,
|
2023-03-02 20:37:41 +00:00
|
|
|
utils::validation::{
|
|
|
|
build_totp_2fa,
|
|
|
|
generate_totp_2fa_secret,
|
2023-04-15 14:45:11 +00:00
|
|
|
is_valid_bio_field,
|
2023-03-02 20:37:41 +00:00
|
|
|
is_valid_display_name,
|
|
|
|
is_valid_matrix_id,
|
|
|
|
},
|
2022-04-13 18:12:25 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#[async_trait::async_trait(?Send)]
|
|
|
|
impl Perform for SaveUserSettings {
|
|
|
|
type Response = LoginResponse;
|
|
|
|
|
2023-06-06 16:27:22 +00:00
|
|
|
#[tracing::instrument(skip(context))]
|
|
|
|
async fn perform(&self, context: &Data<LemmyContext>) -> Result<LoginResponse, LemmyError> {
|
2022-04-13 18:12:25 +00:00
|
|
|
let data: &SaveUserSettings = self;
|
2023-05-25 14:50:07 +00:00
|
|
|
let local_user_view = local_user_view_from_jwt(&data.auth, context).await?;
|
2023-03-02 20:37:41 +00:00
|
|
|
let site_view = SiteView::read_local(context.pool()).await?;
|
2022-04-13 18:12:25 +00:00
|
|
|
|
|
|
|
let avatar = diesel_option_overwrite_to_url(&data.avatar)?;
|
|
|
|
let banner = diesel_option_overwrite_to_url(&data.banner)?;
|
|
|
|
let bio = diesel_option_overwrite(&data.bio);
|
|
|
|
let display_name = diesel_option_overwrite(&data.display_name);
|
|
|
|
let matrix_user_id = diesel_option_overwrite(&data.matrix_user_id);
|
2022-11-19 04:33:54 +00:00
|
|
|
let email_deref = data.email.as_deref().map(str::to_lowercase);
|
2022-04-13 18:12:25 +00:00
|
|
|
let email = diesel_option_overwrite(&email_deref);
|
|
|
|
|
|
|
|
if let Some(Some(email)) = &email {
|
|
|
|
let previous_email = local_user_view.local_user.email.clone().unwrap_or_default();
|
|
|
|
// Only send the verification email if there was an email change
|
|
|
|
if previous_email.ne(email) {
|
2022-06-22 20:24:54 +00:00
|
|
|
send_verification_email(&local_user_view, email, context.pool(), context.settings())
|
2022-04-13 18:12:25 +00:00
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// When the site requires email, make sure email is not Some(None). IE, an overwrite to a None value
|
|
|
|
if let Some(email) = &email {
|
2023-03-02 20:37:41 +00:00
|
|
|
if email.is_none() && site_view.local_site.require_email_verification {
|
2022-04-13 18:12:25 +00:00
|
|
|
return Err(LemmyError::from_message("email_required"));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(Some(bio)) = &bio {
|
2023-04-15 14:45:11 +00:00
|
|
|
is_valid_bio_field(bio)?;
|
2022-04-13 18:12:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(Some(display_name)) = &display_name {
|
2023-04-15 14:45:11 +00:00
|
|
|
is_valid_display_name(
|
2022-04-13 18:12:25 +00:00
|
|
|
display_name.trim(),
|
2023-03-02 20:37:41 +00:00
|
|
|
site_view.local_site.actor_name_max_length as usize,
|
2023-04-15 14:45:11 +00:00
|
|
|
)?;
|
2022-04-13 18:12:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(Some(matrix_user_id)) = &matrix_user_id {
|
2023-04-15 14:45:11 +00:00
|
|
|
is_valid_matrix_id(matrix_user_id)?;
|
2022-04-13 18:12:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
let local_user_id = local_user_view.local_user.id;
|
|
|
|
let person_id = local_user_view.person.id;
|
|
|
|
let default_listing_type = data.default_listing_type;
|
|
|
|
let default_sort_type = data.default_sort_type;
|
2022-10-27 09:24:07 +00:00
|
|
|
|
|
|
|
let person_form = PersonUpdateForm::builder()
|
|
|
|
.display_name(display_name)
|
|
|
|
.bio(bio)
|
|
|
|
.matrix_user_id(matrix_user_id)
|
2023-03-02 20:37:41 +00:00
|
|
|
.bot_account(data.bot_account)
|
2022-10-27 09:24:07 +00:00
|
|
|
.avatar(avatar)
|
|
|
|
.banner(banner)
|
|
|
|
.build();
|
2022-04-13 18:12:25 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
Person::update(context.pool(), person_id, &person_form)
|
|
|
|
.await
|
|
|
|
.map_err(|e| LemmyError::from_error_message(e, "user_already_exists"))?;
|
2022-04-13 18:12:25 +00:00
|
|
|
|
2022-08-18 19:11:19 +00:00
|
|
|
if let Some(discussion_languages) = data.discussion_languages.clone() {
|
2022-11-09 10:05:00 +00:00
|
|
|
LocalUserLanguage::update(context.pool(), discussion_languages, local_user_id).await?;
|
2022-08-18 19:11:19 +00:00
|
|
|
}
|
|
|
|
|
2023-03-02 20:37:41 +00:00
|
|
|
// If generate_totp is Some(false), this will clear it out from the database.
|
|
|
|
let (totp_2fa_secret, totp_2fa_url) = if let Some(generate) = data.generate_totp_2fa {
|
|
|
|
if generate {
|
|
|
|
let secret = generate_totp_2fa_secret();
|
|
|
|
let url =
|
|
|
|
build_totp_2fa(&site_view.site.name, &local_user_view.person.name, &secret)?.get_url();
|
|
|
|
(Some(Some(secret)), Some(Some(url)))
|
|
|
|
} else {
|
|
|
|
(Some(None), Some(None))
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
(None, None)
|
|
|
|
};
|
|
|
|
|
2022-10-27 09:24:07 +00:00
|
|
|
let local_user_form = LocalUserUpdateForm::builder()
|
|
|
|
.email(email)
|
|
|
|
.show_avatars(data.show_avatars)
|
|
|
|
.show_read_posts(data.show_read_posts)
|
|
|
|
.show_new_post_notifs(data.show_new_post_notifs)
|
|
|
|
.send_notifications_to_email(data.send_notifications_to_email)
|
|
|
|
.show_nsfw(data.show_nsfw)
|
|
|
|
.show_bot_accounts(data.show_bot_accounts)
|
|
|
|
.show_scores(data.show_scores)
|
|
|
|
.default_sort_type(default_sort_type)
|
|
|
|
.default_listing_type(default_listing_type)
|
2022-11-19 04:33:54 +00:00
|
|
|
.theme(data.theme.clone())
|
|
|
|
.interface_language(data.interface_language.clone())
|
2023-03-02 20:37:41 +00:00
|
|
|
.totp_2fa_secret(totp_2fa_secret)
|
|
|
|
.totp_2fa_url(totp_2fa_url)
|
2022-10-27 09:24:07 +00:00
|
|
|
.build();
|
2022-04-13 18:12:25 +00:00
|
|
|
|
2022-11-09 10:05:00 +00:00
|
|
|
let local_user_res = LocalUser::update(context.pool(), local_user_id, &local_user_form).await;
|
2022-04-13 18:12:25 +00:00
|
|
|
let updated_local_user = match local_user_res {
|
|
|
|
Ok(u) => u,
|
|
|
|
Err(e) => {
|
|
|
|
let err_type = if e.to_string()
|
|
|
|
== "duplicate key value violates unique constraint \"local_user_email_key\""
|
|
|
|
{
|
|
|
|
"email_already_exists"
|
|
|
|
} else {
|
|
|
|
"user_already_exists"
|
|
|
|
};
|
|
|
|
|
|
|
|
return Err(LemmyError::from_error_message(e, err_type));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
// Return the jwt
|
|
|
|
Ok(LoginResponse {
|
|
|
|
jwt: Some(
|
|
|
|
Claims::jwt(
|
|
|
|
updated_local_user.id.0,
|
|
|
|
&context.secret().jwt_secret,
|
|
|
|
&context.settings().hostname,
|
|
|
|
)?
|
|
|
|
.into(),
|
|
|
|
),
|
|
|
|
verify_email_sent: false,
|
|
|
|
registration_created: false,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|