upub/web/src/lib.rs

335 lines
8.7 KiB
Rust
Raw Normal View History

#![recursion_limit = "256"] // oh nooo leptos...
mod auth;
mod app;
mod components;
mod page;
mod config;
2025-01-19 05:35:28 +01:00
mod groups;
mod actors;
mod activities;
mod objects;
mod timeline;
2025-01-19 05:28:56 +01:00
use apb::{Activity, Object, Actor, Base};
pub use app::App;
pub use config::Config;
pub use auth::Auth;
pub mod prelude;
pub const URL_BASE: &str = "https://dev.upub.social";
pub const URL_PREFIX: &str = "/web";
pub const URL_SENSITIVE: &str = "https://cdn.alemi.dev/social/nsfw.png";
pub const FALLBACK_IMAGE_URL: &str = "https://cdn.alemi.dev/social/gradient.png";
pub const NAME: &str = "μ";
pub const DEFAULT_COLOR: &str = "#BF616A";
pub const VERSION: &str = env!("CARGO_PKG_VERSION");
2024-07-03 04:05:49 +02:00
use std::{ops::Deref, sync::Arc};
use uriproxy::UriClass;
pub type Doc = Arc<serde_json::Value>;
2024-07-03 04:05:49 +02:00
pub mod cache {
2024-07-03 04:05:49 +02:00
use super::DashmapCache;
lazy_static::lazy_static! {
pub static ref OBJECTS: DashmapCache<super::Doc> = DashmapCache::default();
2024-07-03 04:05:49 +02:00
pub static ref WEBFINGER: DashmapCache<String> = DashmapCache::default();
2025-01-19 05:28:56 +01:00
pub static ref TIMELINES: DashmapCache<(Option<String>, Vec<String>)> = DashmapCache::default();
}
}
2024-07-03 04:05:49 +02:00
#[derive(Debug)]
pub enum LookupStatus<T> {
Resolving, // TODO use this to avoid fetching twice!
2024-07-03 04:05:49 +02:00
Found(T),
NotFound,
}
2024-07-03 04:05:49 +02:00
impl<T> LookupStatus<T> {
fn inner(&self) -> Option<&T> {
if let Self::Found(x) = self {
return Some(x);
}
None
}
2024-04-15 22:20:33 +02:00
}
2024-07-03 04:05:49 +02:00
pub trait Cache {
type Item;
fn lookup(&self, key: &str) -> Option<impl Deref<Target = LookupStatus<Self::Item>>>;
fn store(&self, key: &str, value: Self::Item) -> Option<Self::Item>;
fn invalidate(&self, key: &str);
fn clear(&self);
2024-07-03 04:05:49 +02:00
fn get(&self, key: &str) -> Option<Self::Item> where Self::Item : Clone {
Some(self.lookup(key)?.deref().inner()?.clone())
}
2024-07-03 04:05:49 +02:00
fn get_or(&self, key: &str, or: Self::Item) -> Self::Item where Self::Item : Clone {
self.get(key).unwrap_or(or)
}
2024-04-15 22:32:05 +02:00
2024-07-03 04:05:49 +02:00
fn get_or_default(&self, key: &str) -> Self::Item where Self::Item : Clone + Default {
self.get(key).unwrap_or_default()
}
2024-07-03 04:05:49 +02:00
}
#[derive(Default, Clone)]
pub struct DashmapCache<T>(Arc<dashmap::DashMap<String, LookupStatus<T>>>);
2024-07-03 04:05:49 +02:00
impl<T> Cache for DashmapCache<T> {
type Item = T;
fn lookup(&self, key: &str) -> Option<impl Deref<Target = LookupStatus<Self::Item>>> {
self.0.get(key)
}
2024-07-03 04:05:49 +02:00
fn store(&self, key: &str, value: Self::Item) -> Option<Self::Item> {
self.0.insert(key.to_string(), LookupStatus::Found(value))
.and_then(|x| if let LookupStatus::Found(x) = x { Some(x) } else { None } )
2024-04-16 06:42:02 +02:00
}
fn invalidate(&self, key: &str) {
self.0.remove(key);
}
fn clear(&self) {
self.0.clear();
}
2024-07-03 04:05:49 +02:00
}
impl DashmapCache<Doc> {
pub async fn fetch(&self, key: &str, kind: UriClass, auth: Auth) -> Option<Doc> {
let full_key = Uri::full(kind, key);
tracing::debug!("resolving {key} -> {full_key}");
match self.get(&full_key) {
Some(x) => Some(x),
None => {
2025-01-19 05:28:56 +01:00
match Http::fetch::<serde_json::Value>(&Uri::api(kind, key, true), auth).await {
Ok(obj) => {
let obj = Arc::new(obj);
self.include(obj.clone());
Some(obj)
},
Err(e) => {
tracing::error!("failed loading object from backend: {e}");
2025-01-19 05:28:56 +01:00
None
},
}
},
}
}
2025-01-19 05:28:56 +01:00
pub fn include(&self, obj: Doc) {
if let Ok(id) = obj.id() {
tracing::debug!("storing object {id}: {obj}");
cache::OBJECTS.store(&id, obj.clone());
if obj.actor_type().is_ok() {
if let Ok(url) = obj.url().id() {
cache::WEBFINGER.store(&url, id);
}
2025-01-19 05:28:56 +01:00
}
}
if let Ok(sub_obj) = obj.object().into_inner() {
if let Ok(sub_id) = sub_obj.id() {
tracing::debug!("storing sub object {sub_id}: {sub_obj}");
cache::OBJECTS.store(&sub_id, Arc::new(sub_obj));
}
}
}
pub async fn preload(&self, key: String, kind: UriClass, auth: Auth) -> Option<Doc> {
let doc = self.fetch(&key, kind, auth).await?;
2025-01-19 05:28:56 +01:00
let mut sub_tasks = Vec::new();
match kind {
UriClass::Activity => {
if let Ok(actor) = doc.actor().id() {
sub_tasks.push(self.preload(actor, UriClass::Actor, auth));
2025-01-19 05:28:56 +01:00
}
let clazz = match doc.activity_type().unwrap_or(apb::ActivityType::Activity) {
// TODO activities like Announce or Update may be multiple things, we can't know before
apb::ActivityType::Accept(_) => UriClass::Activity,
apb::ActivityType::Reject(_) => UriClass::Activity,
apb::ActivityType::Undo => UriClass::Activity,
apb::ActivityType::Follow => UriClass::Actor,
_ => UriClass::Object,
};
2025-01-19 05:28:56 +01:00
if let Ok(object) = doc.object().id() {
sub_tasks.push(self.preload(object, clazz, auth));
2025-01-19 05:28:56 +01:00
}
},
UriClass::Object => {
if let Ok(actor) = doc.attributed_to().id() {
sub_tasks.push(self.preload(actor, UriClass::Actor, auth));
2025-01-19 05:28:56 +01:00
}
if let Ok(quote) = doc.quote_url().id() {
sub_tasks.push(self.preload(quote, UriClass::Object, auth));
2025-01-19 05:28:56 +01:00
}
},
_ => {},
}
futures::future::join_all(sub_tasks).await;
Some(doc)
}
}
2024-07-03 04:05:49 +02:00
impl DashmapCache<String> {
2024-05-23 16:16:27 +02:00
pub async fn blocking_resolve(&self, user: &str, domain: &str) -> Option<String> {
2024-07-03 04:05:49 +02:00
if let Some(x) = self.resource(user, domain) { return Some(x); }
2024-05-23 16:16:27 +02:00
self.fetch(user, domain).await;
2024-07-03 04:05:49 +02:00
self.resource(user, domain)
2024-05-23 16:16:27 +02:00
}
pub fn resolve(&self, user: &str, domain: &str) -> Option<String> {
2024-07-03 04:05:49 +02:00
if let Some(x) = self.resource(user, domain) { return Some(x); }
2024-05-23 16:16:27 +02:00
let (_self, user, domain) = (self.clone(), user.to_string(), domain.to_string());
leptos::task::spawn_local(async move { _self.fetch(&user, &domain).await });
2024-05-23 16:16:27 +02:00
None
}
2024-07-03 04:05:49 +02:00
fn resource(&self, user: &str, domain: &str) -> Option<String> {
2024-05-23 16:16:27 +02:00
let query = format!("{user}@{domain}");
2024-07-03 04:05:49 +02:00
self.get(&query)
2024-05-23 16:16:27 +02:00
}
async fn fetch(&self, user: &str, domain: &str) {
let query = format!("{user}@{domain}");
self.0.insert(query.to_string(), LookupStatus::Resolving);
match reqwest::get(format!("{URL_BASE}/.well-known/webfinger?resource=acct:{query}")).await {
Ok(res) => match res.error_for_status() {
Ok(res) => match res.json::<jrd::JsonResourceDescriptor>().await {
Ok(doc) => {
if let Some(uid) = doc.links.into_iter().find(|x| x.rel == "self").and_then(|x| x.href) {
2024-05-23 16:16:27 +02:00
self.0.insert(query, LookupStatus::Found(uid));
} else {
self.0.insert(query, LookupStatus::NotFound);
}
},
Err(e) => {
tracing::error!("invalid webfinger response: {e:?}");
self.0.remove(&query);
},
},
Err(e) => {
tracing::error!("could not resolve webfinbger: {e:?}");
self.0.insert(query, LookupStatus::NotFound);
},
},
Err(e) => {
tracing::error!("failed accessing webfinger server: {e:?}");
self.0.remove(&query);
},
}
}
}
use leptos_router::params::Params; // TODO can i remove this?
#[derive(Clone, leptos::Params, PartialEq)]
pub struct IdParam {
id: Option<String>,
}
pub struct Http;
impl Http {
pub async fn request<T: serde::ser::Serialize>(
method: reqwest::Method,
url: &str,
data: Option<&T>,
auth: Auth,
) -> reqwest::Result<reqwest::Response> {
use leptos::prelude::GetUntracked;
let mut req = reqwest::Client::new()
.request(method, url);
2024-05-03 03:55:26 +02:00
if let Some(auth) = auth.token.get_untracked().filter(|x| !x.is_empty()) {
req = req.header("Authorization", format!("Bearer {}", auth));
}
if let Some(data) = data {
req = req.json(data);
}
req.send().await
}
pub async fn fetch<T: serde::de::DeserializeOwned>(url: &str, token: Auth) -> reqwest::Result<T> {
Self::request::<()>(reqwest::Method::GET, url, None, token)
.await?
.error_for_status()?
.json::<T>()
.await
}
pub async fn post<T: serde::ser::Serialize>(url: &str, data: &T, token: Auth) -> reqwest::Result<()> {
Self::request(reqwest::Method::POST, url, Some(data), token)
.await?
.error_for_status()?;
Ok(())
}
}
pub struct Uri;
impl Uri {
pub fn full(kind: UriClass, id: &str) -> String {
uriproxy::uri(URL_BASE, kind, id)
}
pub fn pretty(url: &str, len: usize) -> String {
let bare = url.replace("https://", "");
if bare.len() < len {
bare
} else {
format!("{}..", bare.get(..len).unwrap_or_default())
2024-07-04 03:43:58 +02:00
}
//.replace('/', "\u{200B}/\u{200B}")
}
2024-04-15 03:03:01 +02:00
pub fn short(url: &str) -> String {
2024-05-20 08:45:41 +02:00
if url.starts_with(URL_BASE) || url.starts_with('/') {
uriproxy::decompose(url)
2024-05-21 15:28:48 +02:00
} else if url.starts_with("https://") || url.starts_with("http://") {
uriproxy::compact(url)
2024-05-20 08:45:41 +02:00
} else {
url.to_string()
}
2024-04-15 03:03:01 +02:00
}
/// convert url id to valid frontend view id:
2024-05-21 15:28:48 +02:00
///
/// accepts:
2024-05-21 15:28:48 +02:00
///
pub fn web(kind: UriClass, url: &str) -> String {
let kind = kind.as_ref();
format!("/web/{kind}/{}", Self::short(url))
}
/// convert url id to valid backend api id
2024-05-21 15:28:48 +02:00
///
/// accepts:
2024-05-21 15:28:48 +02:00
///
pub fn api(kind: UriClass, url: &str, fetch: bool) -> String {
let kind = kind.as_ref();
format!("{URL_BASE}/{kind}/{}{}", Self::short(url), if fetch { "?fetch=true" } else { "" })
}
2024-08-15 17:30:26 +02:00
pub fn domain(full: &str) -> String {
full
.replacen("https://", "", 1)
.replacen("http://", "", 1)
.split('/')
.next()
.unwrap_or_default()
.to_string()
}
}