summaryrefslogtreecommitdiffstats
path: root/adenosine-pds
diff options
context:
space:
mode:
authorBryan Newbold <bnewbold@robocracy.org>2022-11-10 19:33:42 -0800
committerBryan Newbold <bnewbold@robocracy.org>2022-11-10 19:33:42 -0800
commite385e9992a393221f837e98c8c99bb98d543357f (patch)
tree0311d6bac8d6ad3ddd7efaf16a4bb78c79e55920 /adenosine-pds
parent46c1ee9c08d1f5b187c530465123190d5ae83d87 (diff)
downloadadenosine-e385e9992a393221f837e98c8c99bb98d543357f.tar.gz
adenosine-e385e9992a393221f837e98c8c99bb98d543357f.zip
pds: enforce invite code; implement describe
Diffstat (limited to 'adenosine-pds')
-rw-r--r--adenosine-pds/src/lib.rs21
1 files changed, 20 insertions, 1 deletions
diff --git a/adenosine-pds/src/lib.rs b/adenosine-pds/src/lib.rs
index 2f2c114..5794b95 100644
--- a/adenosine-pds/src/lib.rs
+++ b/adenosine-pds/src/lib.rs
@@ -422,6 +422,21 @@ fn xrpc_get_handler(
)))?,
}
}
+ "com.atproto.repo.describe" => {
+ let did = Did::from_str(&xrpc_required_param(request, "user")?)?;
+
+ let mut srv = srv.lock().or(Err(XrpcError::MutexPoisoned))?;
+ let did_doc = srv.atp_db.get_did_doc(&did)?;
+ let collections: Vec<String> = srv.repo.collections(&did)?;
+ let desc = RepoDescribe {
+ name: did.to_string(), // TODO: handle?
+ did: did.to_string(),
+ didDoc: did_doc,
+ collections: collections,
+ nameIsCorrect: true,
+ };
+ Ok(json!(desc))
+ }
// =========== app.bsky methods
"app.bsky.actor.getProfile" => {
// TODO did or handle
@@ -453,8 +468,9 @@ fn xrpc_get_handler(
}
fn xrpc_get_repo_handler(srv: &Mutex<AtpService>, request: &Request) -> Result<Vec<u8>> {
- let did = Did::from_str(&xrpc_required_param(request, "user")?)?;
+ let did = Did::from_str(&xrpc_required_param(request, "did")?)?;
let mut srv = srv.lock().or(Err(XrpcError::MutexPoisoned))?;
+ // TODO: don't unwrap here
let commit_cid = srv.repo.lookup_commit(&did)?.unwrap();
Ok(srv.repo.export_car(&commit_cid, None)?)
}
@@ -535,6 +551,9 @@ fn xrpc_post_handler(
.map_err(|e| XrpcError::BadRequest(format!("failed to parse JSON body: {}", e)))?;
// TODO: validate handle, email, recoverykey
let mut srv = srv.lock().unwrap();
+ if srv.config.invite_code.is_some() && srv.config.invite_code != req.inviteCode {
+ Err(XrpcError::Forbidden("a valid invite code is required".to_string()))?;
+ };
let sess = create_account(&mut srv, &req, true)?;
Ok(json!(sess))
}