2019-09-02 07:38:29 +00:00
|
|
|
from flask import Flask, render_template, session, request, redirect, url_for, send_file
|
2019-09-01 05:19:30 +00:00
|
|
|
from flask_mysqldb import MySQL
|
2019-09-02 03:07:46 +00:00
|
|
|
from mastodon import Mastodon
|
2019-09-01 14:22:26 +00:00
|
|
|
import requests
|
2019-09-01 07:30:00 +00:00
|
|
|
import MySQLdb
|
2019-09-01 07:09:08 +00:00
|
|
|
import bcrypt
|
2019-09-01 15:07:50 +00:00
|
|
|
import json, hashlib, re
|
2019-09-11 04:37:13 +00:00
|
|
|
import functions
|
2019-08-31 03:26:20 +00:00
|
|
|
|
|
|
|
cfg = json.load(open("config.json"))
|
2019-08-27 10:36:54 +00:00
|
|
|
|
|
|
|
app = Flask(__name__)
|
2019-08-31 03:26:20 +00:00
|
|
|
app.secret_key = cfg['secret_key']
|
2019-08-27 10:36:54 +00:00
|
|
|
|
2019-09-01 06:28:45 +00:00
|
|
|
app.config['MYSQL_HOST'] = cfg['db_host']
|
|
|
|
app.config['MYSQL_DB'] = cfg['db_name']
|
|
|
|
app.config['MYSQL_USER'] = cfg['db_user']
|
|
|
|
app.config['MYSQL_PASSWORD'] = cfg['db_pass']
|
2019-09-01 05:19:30 +00:00
|
|
|
|
2019-09-01 06:28:45 +00:00
|
|
|
mysql = MySQL(app)
|
2019-09-01 05:19:30 +00:00
|
|
|
|
2019-09-03 01:47:59 +00:00
|
|
|
scopes = ['write:statuses', 'write:accounts', 'read:accounts', 'read:notifications', 'read:statuses', 'push']
|
2019-09-02 03:07:46 +00:00
|
|
|
|
2019-09-09 09:56:19 +00:00
|
|
|
@app.before_request
|
|
|
|
def login_check():
|
2019-09-10 12:53:15 +00:00
|
|
|
if request.path not in ['/', '/about', '/welcome', '/login', '/signup', '/do/login', '/do/signup', '/static/style.css'] and not request.path.startswith("/push"):
|
2019-09-09 09:56:19 +00:00
|
|
|
# page requires authentication
|
|
|
|
if 'user_id' not in session:
|
|
|
|
return redirect(url_for('home'))
|
|
|
|
|
2019-08-27 10:36:54 +00:00
|
|
|
@app.route("/")
|
2019-09-01 06:28:45 +00:00
|
|
|
def home():
|
2019-09-02 03:07:46 +00:00
|
|
|
if 'user_id' in session:
|
2019-09-01 10:24:45 +00:00
|
|
|
c = mysql.connection.cursor()
|
2019-09-02 03:07:46 +00:00
|
|
|
c.execute("SELECT COUNT(*) FROM `bots` WHERE user_id = %s", (session['user_id'],))
|
2019-09-01 10:24:45 +00:00
|
|
|
bot_count = c.fetchone()[0]
|
|
|
|
active_count = None
|
2019-09-02 06:36:42 +00:00
|
|
|
bots = {}
|
2019-09-02 03:42:34 +00:00
|
|
|
bot_users = None
|
|
|
|
|
2019-09-01 10:24:45 +00:00
|
|
|
if bot_count > 0:
|
2019-09-02 03:07:46 +00:00
|
|
|
c.execute("SELECT COUNT(*) FROM `bots` WHERE user_id = %s AND enabled = TRUE", (session['user_id'],))
|
2019-09-01 10:24:45 +00:00
|
|
|
active_count = c.fetchone()[0]
|
2019-09-02 03:42:34 +00:00
|
|
|
dc = mysql.connection.cursor(MySQLdb.cursors.DictCursor)
|
2019-09-02 06:49:21 +00:00
|
|
|
dc.execute("SELECT `handle`, `enabled` FROM `bots` WHERE user_id = %s", (session['user_id'],))
|
2019-09-02 03:42:34 +00:00
|
|
|
bots = dc.fetchall()
|
|
|
|
dc.close()
|
|
|
|
bot_users = {}
|
|
|
|
|
|
|
|
for bot in bots:
|
2019-09-02 05:35:02 +00:00
|
|
|
# multiple SELECTS is slow, maybe SELECT all at once and filter with python?
|
2019-09-02 06:36:42 +00:00
|
|
|
c.execute("SELECT COUNT(*) FROM `bot_learned_accounts` WHERE bot_id = %s", (bot['handle'],))
|
|
|
|
bot_users[bot['handle']] = c.fetchone()[0]
|
2019-09-02 03:42:34 +00:00
|
|
|
|
2019-09-01 10:24:45 +00:00
|
|
|
c.close()
|
2019-09-02 03:42:34 +00:00
|
|
|
return render_template("home.html", bot_count = bot_count, active_count = active_count, bots = bots, bot_users = bot_users)
|
2019-08-29 06:23:56 +00:00
|
|
|
else:
|
|
|
|
return render_template("front_page.html")
|
2019-08-28 03:53:44 +00:00
|
|
|
|
2019-08-29 01:15:47 +00:00
|
|
|
@app.route("/welcome")
|
|
|
|
def welcome():
|
|
|
|
return render_template("welcome.html")
|
|
|
|
|
2019-08-30 12:30:59 +00:00
|
|
|
@app.route("/about")
|
|
|
|
def about():
|
|
|
|
return render_template("about.html")
|
|
|
|
|
2019-08-28 03:53:44 +00:00
|
|
|
@app.route("/login")
|
|
|
|
def show_login_page():
|
2019-09-09 12:15:10 +00:00
|
|
|
return render_template("login.html", signup = False, error = session.pop('error', None))
|
2019-08-29 05:08:11 +00:00
|
|
|
|
|
|
|
@app.route("/signup")
|
2019-09-03 03:22:00 +00:00
|
|
|
def show_signup_page():
|
2019-09-09 12:15:10 +00:00
|
|
|
return render_template("login.html", signup = True, error = session.pop('error', None))
|
2019-08-29 13:51:31 +00:00
|
|
|
|
2019-09-09 12:08:43 +00:00
|
|
|
@app.route("/settings", methods=['GET', 'POST'])
|
2019-08-30 03:56:28 +00:00
|
|
|
def settings():
|
2019-09-09 12:08:43 +00:00
|
|
|
if request.method == 'GET':
|
|
|
|
dc = mysql.connection.cursor(MySQLdb.cursors.DictCursor)
|
|
|
|
dc.execute("SELECT * FROM `users` WHERE id = %s", (session['user_id'],))
|
|
|
|
user = dc.fetchone()
|
|
|
|
dc.close()
|
2019-09-09 12:15:10 +00:00
|
|
|
return render_template("settings.html", user = user, error = session.pop('error', None), success = session.pop('success', None))
|
2019-09-09 12:08:43 +00:00
|
|
|
|
|
|
|
else:
|
|
|
|
# update settings
|
|
|
|
c = mysql.connection.cursor()
|
|
|
|
|
|
|
|
c.execute("SELECT COUNT(*) FROM users WHERE email = %s AND id != %s", (request.form['email'], session['user_id']))
|
|
|
|
if c.fetchone()[0] > 0:
|
|
|
|
session['error'] = "Email address already in use."
|
|
|
|
return redirect(url_for("settings"), 303)
|
|
|
|
|
|
|
|
for setting in [request.form['fetch-error'], request.form['submit-error'], request.form['reply-error'], request.form['generation-error']]:
|
|
|
|
if setting not in ['once', 'always', 'never']:
|
|
|
|
session['error'] = 'Invalid option "{}".'.format(setting)
|
|
|
|
return redirect(url_for('settings'), 303)
|
|
|
|
|
|
|
|
if request.form['password'] != '':
|
|
|
|
# user is updating their password
|
|
|
|
if len(request.form['password']) < 8:
|
|
|
|
session['error'] = "Password too short."
|
|
|
|
return redirect(url_for("settings"), 303)
|
|
|
|
|
|
|
|
pw_hashed = hashlib.sha256(request.form['password'].encode('utf-8')).digest()
|
|
|
|
pw = bcrypt.hashpw(pw_hashed, bcrypt.gensalt(12))
|
|
|
|
c.execute("UPDATE users SET password = %s WHERE id = %s", (pw, session['user_id']))
|
2019-09-10 01:17:06 +00:00
|
|
|
|
|
|
|
# don't require email verification again if the new email address is the same as the old one
|
|
|
|
c.execute("SELECT email_verified FROM users WHERE id = %s", (session['user_id'],))
|
|
|
|
if c.fetchone()[0]:
|
|
|
|
c.execute("SELECT email FROM users WHERE id = %s", (session['user_id'],))
|
|
|
|
previous_email = c.fetchone()[0]
|
|
|
|
|
|
|
|
email_verified = (previous_email == request.form['email'])
|
|
|
|
else:
|
|
|
|
email_verified = False
|
2019-09-09 12:08:43 +00:00
|
|
|
|
|
|
|
try:
|
2019-09-10 01:17:06 +00:00
|
|
|
c.execute("UPDATE users SET email = %s, email_verified = %s, `fetch` = %s, submit = %s, generation = %s, reply = %s WHERE id = %s", (
|
2019-09-09 12:08:43 +00:00
|
|
|
request.form['email'],
|
2019-09-10 01:17:06 +00:00
|
|
|
email_verified,
|
2019-09-09 12:08:43 +00:00
|
|
|
request.form['fetch-error'],
|
|
|
|
request.form['submit-error'],
|
|
|
|
request.form['generation-error'],
|
|
|
|
request.form['reply-error'],
|
|
|
|
session['user_id']
|
|
|
|
))
|
|
|
|
c.close()
|
|
|
|
mysql.connection.commit()
|
|
|
|
except:
|
|
|
|
session['error'] = "Encountered an error while updating the database."
|
|
|
|
return redirect(url_for('settings'), 303)
|
|
|
|
|
|
|
|
session['success'] = True
|
|
|
|
return redirect(url_for('settings'), 303)
|
2019-08-30 03:56:28 +00:00
|
|
|
|
2019-09-10 04:07:44 +00:00
|
|
|
@app.route("/bot/edit/<id>", methods = ['GET', 'POST'])
|
2019-08-29 13:51:31 +00:00
|
|
|
def bot_edit(id):
|
2019-09-10 04:07:44 +00:00
|
|
|
if request.method == "GET":
|
|
|
|
dc = mysql.connection.cursor(MySQLdb.cursors.DictCursor)
|
|
|
|
dc.execute("SELECT * FROM bots WHERE handle = %s", (id,))
|
|
|
|
return render_template("bot_edit.html", bot = dc.fetchone(), error = session.pop('error', None), success = session.pop('success', None))
|
|
|
|
else:
|
|
|
|
# update stored settings
|
|
|
|
replies_enabled = 'replies' in request.form
|
|
|
|
learn_from_cw = 'cw-learning' in request.form
|
|
|
|
|
|
|
|
if request.form['fake-mention-style'] not in ['full', 'brief']:
|
|
|
|
session['error'] = "Invalid setting for fake mention style."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
if request.form['fake-mentions'] not in ['always', 'middle', 'never']:
|
|
|
|
session['error'] = "Invalid setting for fake mentions."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
if request.form['privacy'] not in ['public', 'unlisted', 'private']:
|
|
|
|
session['error'] = "Invalid setting for post privacy."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
if int(request.form['length']) < 100 or int(request.form['length']) > 5000:
|
|
|
|
session['error'] = "Invalid setting for maximum post length."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
if int(request.form['freq']) < 15 or int(request.form['freq']) > 240 or int(request.form['freq']) % 5:
|
|
|
|
session['error'] = "Invalid setting for post frequency."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
if len(request.form['cw']) > 128:
|
|
|
|
session['error'] = "Content warning cannot exceed 128 characters."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
c = mysql.connection.cursor()
|
|
|
|
try:
|
|
|
|
c.execute("UPDATE bots SET replies_enabled = %s, post_frequency = %s, content_warning = %s, length = %s, fake_mentions = %s, fake_mentions_full = %s, post_privacy = %s, learn_from_cw = %s WHERE handle = %s", (
|
|
|
|
replies_enabled,
|
|
|
|
request.form['freq'],
|
|
|
|
request.form['cw'] if request.form['cw'] != "" else None,
|
|
|
|
request.form['length'],
|
|
|
|
request.form['fake-mentions'],
|
|
|
|
request.form['fake-mention-style'] == 'full',
|
|
|
|
request.form['privacy'],
|
|
|
|
learn_from_cw,
|
|
|
|
id
|
|
|
|
))
|
|
|
|
mysql.connection.commit()
|
|
|
|
c.close()
|
|
|
|
except:
|
|
|
|
session['error'] = "Couldn't save your settings."
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
|
|
|
session['success'] = True
|
|
|
|
return redirect("/bot/edit/{}".format(id), 303)
|
|
|
|
|
2019-09-02 08:02:26 +00:00
|
|
|
@app.route("/bot/delete/<id>", methods=['GET', 'POST'])
|
2019-08-30 11:28:34 +00:00
|
|
|
def bot_delete(id):
|
2019-09-02 06:59:49 +00:00
|
|
|
if bot_check(id):
|
2019-09-02 08:02:26 +00:00
|
|
|
if request.method == 'GET':
|
|
|
|
instance = id.split("@")[2]
|
|
|
|
return render_template("bot_delete.html", instance = instance)
|
|
|
|
else:
|
|
|
|
# delete bot by deleting its credentials
|
|
|
|
# FK constraint will delete bot
|
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("SELECT `credentials_id` FROM `bots` WHERE `handle` = %s", (id,))
|
|
|
|
credentials_id = c.fetchone()[0]
|
|
|
|
c.execute("DELETE FROM `credentials` WHERE `id` = %s", (credentials_id,))
|
|
|
|
c.close()
|
|
|
|
mysql.connection.commit()
|
|
|
|
|
|
|
|
return redirect(url_for("home"), 303)
|
2019-08-30 11:28:34 +00:00
|
|
|
|
2019-09-02 07:38:29 +00:00
|
|
|
@app.route("/bot/toggle/<id>")
|
|
|
|
def bot_toggle(id):
|
|
|
|
if bot_check(id):
|
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("UPDATE `bots` SET `enabled` = NOT `enabled` WHERE `handle` = %s", (id,))
|
|
|
|
mysql.connection.commit()
|
|
|
|
c.close()
|
|
|
|
return redirect(url_for("home"), 303)
|
|
|
|
|
2019-09-02 07:20:28 +00:00
|
|
|
@app.route("/bot/chat/<id>")
|
|
|
|
def bot_chat(id):
|
|
|
|
return render_template("coming_soon.html")
|
|
|
|
|
|
|
|
@app.route("/bot/blacklist/<id>")
|
|
|
|
def bot_blacklist(id):
|
|
|
|
return render_template("coming_soon.html")
|
|
|
|
|
2019-09-01 04:02:42 +00:00
|
|
|
@app.route("/bot/accounts/<id>")
|
|
|
|
def bot_accounts(id):
|
2019-09-02 10:07:16 +00:00
|
|
|
if bot_check(id):
|
|
|
|
session['bot'] = id
|
2019-09-02 10:26:45 +00:00
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("SELECT COUNT(*) FROM `bot_learned_accounts` WHERE `bot_id` = %s", (id,))
|
|
|
|
user_count = c.fetchone()[0]
|
|
|
|
users = {}
|
2019-09-06 02:47:39 +00:00
|
|
|
post_count = {}
|
2019-09-02 10:26:45 +00:00
|
|
|
|
|
|
|
if user_count > 0:
|
|
|
|
dc = mysql.connection.cursor(MySQLdb.cursors.DictCursor)
|
|
|
|
dc.execute("SELECT `fedi_id`, `enabled` FROM `bot_learned_accounts` WHERE `bot_id` = %s", (id,))
|
|
|
|
users = dc.fetchall()
|
|
|
|
dc.close()
|
|
|
|
|
2019-09-06 02:47:39 +00:00
|
|
|
post_count = {}
|
|
|
|
for user in users:
|
|
|
|
c.execute("SELECT COUNT(*) FROM `posts` WHERE `fedi_id` = %s", (user['fedi_id'],))
|
|
|
|
post_count[user['fedi_id']] = c.fetchone()[0]
|
|
|
|
|
2019-09-02 10:26:45 +00:00
|
|
|
c.close()
|
|
|
|
|
2019-09-06 02:47:39 +00:00
|
|
|
return render_template("bot_accounts.html", users = users, post_count = post_count)
|
2019-09-01 04:02:42 +00:00
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
@app.route("/bot/accounts/add", methods = ['GET', 'POST'])
|
2019-09-01 04:41:33 +00:00
|
|
|
def bot_accounts_add():
|
2019-09-02 10:07:16 +00:00
|
|
|
if request.method == 'POST':
|
|
|
|
if session['step'] == 1:
|
2019-09-03 03:22:00 +00:00
|
|
|
if request.form['account'] == session['bot']:
|
|
|
|
error = "Bots cannot learn from themselves."
|
2019-09-03 03:31:44 +00:00
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
2019-09-03 03:22:00 +00:00
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
# look up user
|
|
|
|
handle_list = request.form['account'].split('@')
|
2019-09-10 03:12:40 +00:00
|
|
|
if len(handle_list) != 3:
|
|
|
|
# not formatted correctly
|
|
|
|
error = "Incorrectly formatted handle."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
username = handle_list[1]
|
|
|
|
instance = handle_list[2]
|
|
|
|
|
2019-09-10 03:03:28 +00:00
|
|
|
# gab check
|
2019-09-10 03:12:40 +00:00
|
|
|
try:
|
|
|
|
r = requests.get("https://{}/api/v1/instance".format(instance), timeout=10)
|
|
|
|
except requests.exceptions.ConnectionError:
|
|
|
|
error = "Couldn't connect to {}.".format(instance)
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
except:
|
|
|
|
error = "An unknown error occurred."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
|
2019-09-10 03:03:28 +00:00
|
|
|
if r.status_code == 200:
|
|
|
|
j = r.json()
|
|
|
|
if 'is_pro' in j['contact_account']:
|
|
|
|
# gab instance
|
|
|
|
error = "Gab instances are not supported."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
# 1. download host-meta to find webfinger URL
|
|
|
|
r = requests.get("https://{}/.well-known/host-meta".format(instance), timeout=10)
|
2019-09-10 03:12:40 +00:00
|
|
|
if r.status_code != 200:
|
|
|
|
error = "Couldn't get host-meta."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
# 2. use webfinger to find user's info page
|
|
|
|
#TODO: use more reliable method
|
2019-09-10 03:12:40 +00:00
|
|
|
try:
|
|
|
|
uri = re.search(r'template="([^"]+)"', r.text).group(1)
|
|
|
|
uri = uri.format(uri = "{}@{}".format(username, instance))
|
|
|
|
except:
|
|
|
|
error = "Couldn't find WebFinger URL."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
r = requests.get(uri, headers={"Accept": "application/json"}, timeout=10)
|
2019-09-10 03:12:40 +00:00
|
|
|
try:
|
|
|
|
j = r.json()
|
|
|
|
except:
|
|
|
|
error = "Invalid WebFinger response."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
|
|
|
|
2019-09-02 10:07:16 +00:00
|
|
|
found = False
|
|
|
|
for link in j['links']:
|
|
|
|
if link['rel'] == 'self':
|
|
|
|
#this is a link formatted like "https://instan.ce/users/username", which is what we need
|
|
|
|
uri = link['href']
|
|
|
|
found = True
|
|
|
|
break
|
|
|
|
if not found:
|
2019-09-03 03:22:00 +00:00
|
|
|
error = "Couldn't find a valid ActivityPub outbox URL."
|
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
2019-09-02 10:07:16 +00:00
|
|
|
|
|
|
|
# 3. format as outbox URL and check to make sure it works
|
|
|
|
outbox = "{}/outbox?page=true".format(uri)
|
|
|
|
r = requests.get(uri, headers={"Accept": "application/json"}, timeout=10)
|
|
|
|
if r.status_code == 200:
|
|
|
|
# success!!
|
|
|
|
c = mysql.connection.cursor()
|
2019-09-07 09:55:37 +00:00
|
|
|
c.execute("REPLACE INTO `fedi_accounts` (`handle`, `outbox`) VALUES (%s, %s)", (request.form['account'], outbox))
|
2019-09-02 10:07:16 +00:00
|
|
|
c.execute("INSERT INTO `bot_learned_accounts` (`bot_id`, `fedi_id`) VALUES (%s, %s)", (session['bot'], request.form['account']))
|
|
|
|
c.close()
|
|
|
|
mysql.connection.commit()
|
2019-09-03 04:27:03 +00:00
|
|
|
return redirect("/bot/accounts/{}".format(session['bot']), 303)
|
2019-09-03 03:22:00 +00:00
|
|
|
else:
|
2019-09-10 03:13:06 +00:00
|
|
|
error = "Couldn't access ActivityPub outbox. {} may require authenticated fetches, which FediBooks doesn't support yet.".format(instance)
|
2019-09-03 03:22:00 +00:00
|
|
|
return render_template("bot_accounts_add.html", error = error)
|
2019-09-10 07:06:24 +00:00
|
|
|
else:
|
|
|
|
# new account add request
|
|
|
|
session['step'] = 1
|
2019-09-02 10:07:16 +00:00
|
|
|
|
2019-09-09 12:15:10 +00:00
|
|
|
return render_template("bot_accounts_add.html", error = session.pop('error', None))
|
2019-09-01 04:41:33 +00:00
|
|
|
|
2019-09-02 10:44:03 +00:00
|
|
|
@app.route("/bot/accounts/toggle/<id>")
|
|
|
|
def bot_accounts_toggle(id):
|
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("UPDATE `bot_learned_accounts` SET `enabled` = NOT `enabled` WHERE `fedi_id` = %s AND `bot_id` = %s", (id, session['bot']))
|
|
|
|
mysql.connection.commit()
|
|
|
|
c.close()
|
|
|
|
return redirect("/bot/accounts/{}".format(session['bot']), 303)
|
|
|
|
|
2019-09-03 01:44:54 +00:00
|
|
|
@app.route("/bot/accounts/delete/<id>", methods=['GET', 'POST'])
|
|
|
|
def bot_accounts_delete(id):
|
|
|
|
if request.method == 'GET':
|
|
|
|
instance = id.split("@")[2]
|
|
|
|
return render_template("bot_accounts_delete.html", user = id, instance = instance)
|
|
|
|
else:
|
|
|
|
#NOTE: when user credential support is added, we'll need to delete the creds too
|
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("DELETE FROM `bot_learned_accounts` WHERE `fedi_id` = %s AND bot_id = %s", (id, session['bot']))
|
|
|
|
# check to see if anyone else is learning from this account
|
|
|
|
c.execute("SELECT COUNT(*) FROM `bot_learned_accounts` WHERE `fedi_id` = %s", (id,))
|
|
|
|
if c.fetchone()[0] == 0:
|
|
|
|
# nobody else learns from this account, remove it from the db
|
|
|
|
c.execute("DELETE FROM `fedi_accounts` WHERE `handle` = %s", (id,))
|
|
|
|
c.close()
|
|
|
|
mysql.connection.commit()
|
|
|
|
|
2019-09-06 02:38:50 +00:00
|
|
|
return redirect("/bot/accounts/{}".format(session['bot']), 303)
|
2019-09-02 10:44:03 +00:00
|
|
|
|
2019-09-01 15:07:50 +00:00
|
|
|
@app.route("/bot/create/", methods=['GET', 'POST'])
|
2019-08-30 08:52:13 +00:00
|
|
|
def bot_create():
|
2019-09-01 15:07:50 +00:00
|
|
|
if request.method == 'POST':
|
|
|
|
if session['step'] == 1:
|
|
|
|
# strip leading https://, if provided
|
|
|
|
session['instance'] = re.match(r"^(?:https?:\/\/)?(.*)", request.form['instance']).group(1)
|
|
|
|
|
|
|
|
# check for mastodon/pleroma
|
2019-09-02 08:06:21 +00:00
|
|
|
r = requests.get("https://{}/api/v1/instance".format(session['instance']), timeout=10)
|
2019-09-01 15:07:50 +00:00
|
|
|
if r.status_code == 200:
|
|
|
|
j = r.json()
|
|
|
|
if "Pleroma" in j['version']:
|
|
|
|
session['instance_type'] = "Pleroma"
|
|
|
|
session['step'] += 1
|
|
|
|
else:
|
|
|
|
if 'is_pro' in j['contact_account']:
|
|
|
|
# gab instance
|
2019-09-10 01:41:27 +00:00
|
|
|
session['error'] = "Gab instances are not supported."
|
2019-09-01 15:07:50 +00:00
|
|
|
else:
|
|
|
|
session['instance_type'] = "Mastodon"
|
|
|
|
session['step'] += 1
|
|
|
|
|
|
|
|
else:
|
|
|
|
# not a masto/pleroma instance
|
|
|
|
# misskey is currently unsupported
|
|
|
|
# all other instance types are also unsupported
|
|
|
|
# return an error message
|
|
|
|
#TODO: misskey
|
2019-09-03 03:29:50 +00:00
|
|
|
session['error'] = "Unsupported instance type. Misskey support is planned."
|
2019-09-01 15:07:50 +00:00
|
|
|
|
|
|
|
elif session['step'] == 2:
|
2019-09-02 03:07:46 +00:00
|
|
|
# nothing needs to be done here, this step just informs the user that their instance type is supported
|
|
|
|
session['step'] += 1
|
|
|
|
|
|
|
|
elif session['step'] == 3:
|
|
|
|
# authenticate with the given instance and obtain credentials
|
|
|
|
if session['instance_type'] in ['Mastodon', 'Pleroma']:
|
|
|
|
redirect_uri = '{}/do/authenticate_bot'.format(cfg['base_uri'])
|
|
|
|
|
|
|
|
session['client_id'], session['client_secret'] = Mastodon.create_app(
|
|
|
|
"FediBooks",
|
|
|
|
api_base_url="https://{}".format(session['instance']),
|
|
|
|
scopes=scopes,
|
|
|
|
redirect_uris=[redirect_uri],
|
|
|
|
website=cfg['base_uri']
|
|
|
|
)
|
|
|
|
|
|
|
|
client = Mastodon(
|
|
|
|
client_id=session['client_id'],
|
|
|
|
client_secret=session['client_secret'],
|
|
|
|
api_base_url="https://{}".format(session['instance'])
|
|
|
|
)
|
|
|
|
|
|
|
|
url = client.auth_request_url(client_id=session['client_id'], redirect_uris=redirect_uri, scopes=scopes)
|
|
|
|
return redirect(url, code=303)
|
|
|
|
|
|
|
|
elif session['instance_type'] == 'Misskey':
|
|
|
|
# todo
|
|
|
|
pass
|
|
|
|
|
|
|
|
else:
|
|
|
|
# the user clicked next on step 2 while having an unsupported instance type
|
2019-09-10 06:21:00 +00:00
|
|
|
# take them back home
|
2019-09-02 03:07:46 +00:00
|
|
|
del session['instance']
|
|
|
|
del session['instance_type']
|
|
|
|
session['step'] = 1
|
2019-09-10 06:21:00 +00:00
|
|
|
return redirect(url_for("home"), 303)
|
2019-09-02 03:07:46 +00:00
|
|
|
|
2019-09-02 06:47:49 +00:00
|
|
|
else:
|
2019-09-10 12:03:56 +00:00
|
|
|
if 'step' in session and session['step'] == 4:
|
2019-09-02 03:07:46 +00:00
|
|
|
try:
|
|
|
|
# test authentication
|
|
|
|
client = Mastodon(client_id=session['client_id'], client_secret=session['client_secret'], api_base_url=session['instance'])
|
|
|
|
session['secret'] = client.log_in(code = session['code'], scopes=scopes, redirect_uri='{}/do/authenticate_bot'.format(cfg['base_uri']))
|
|
|
|
username = client.account_verify_credentials()['username']
|
|
|
|
handle = "@{}@{}".format(username, session['instance'])
|
|
|
|
except:
|
|
|
|
# authentication error occurred
|
2019-09-03 03:22:00 +00:00
|
|
|
error = "Authentication failed."
|
2019-09-03 03:29:50 +00:00
|
|
|
session['step'] = 3
|
2019-09-03 03:22:00 +00:00
|
|
|
return render_template("bot_create.html", error = error)
|
2019-09-02 03:07:46 +00:00
|
|
|
|
|
|
|
# authentication success!!
|
|
|
|
c = mysql.connection.cursor()
|
2019-09-07 09:55:37 +00:00
|
|
|
c.execute("INSERT INTO `credentials` (client_id, client_secret, secret) VALUES (%s, %s, %s)", (session['client_id'], session['client_secret'], session['secret']))
|
2019-09-02 03:07:46 +00:00
|
|
|
credentials_id = c.lastrowid
|
|
|
|
mysql.connection.commit()
|
|
|
|
|
2019-09-03 04:17:20 +00:00
|
|
|
# get webpush url
|
|
|
|
privated, publicd = client.push_subscription_generate_keys()
|
|
|
|
private = privated['privkey']
|
|
|
|
public = publicd['pubkey']
|
|
|
|
secret = privated['auth']
|
2019-09-10 04:18:21 +00:00
|
|
|
client.push_subscription_set("{}/push/{}".format(cfg['base_uri'], handle), publicd, mention_events = True)
|
2019-09-03 04:17:20 +00:00
|
|
|
|
|
|
|
c.execute("INSERT INTO `bots` (handle, user_id, credentials_id, push_public_key, push_private_key, push_secret) VALUES (%s, %s, %s, %s, %s, %s)", (handle, session['user_id'], credentials_id, public, private, secret))
|
2019-09-02 03:07:46 +00:00
|
|
|
mysql.connection.commit()
|
|
|
|
c.close()
|
|
|
|
|
|
|
|
# clean up unneeded variables
|
|
|
|
del session['code']
|
|
|
|
del session['instance']
|
|
|
|
del session['instance_type']
|
|
|
|
del session['client_id']
|
|
|
|
del session['client_secret']
|
2019-09-10 07:06:24 +00:00
|
|
|
else:
|
|
|
|
# user is starting a new bot create request
|
|
|
|
session['step'] = 1
|
|
|
|
|
2019-09-01 15:07:50 +00:00
|
|
|
|
2019-09-09 12:15:10 +00:00
|
|
|
return render_template("bot_create.html", error = session.pop('error', None))
|
2019-09-01 07:09:08 +00:00
|
|
|
|
2019-09-02 05:35:02 +00:00
|
|
|
@app.route("/bot/create/back")
|
|
|
|
def bot_create_back():
|
|
|
|
session['step'] -= 1
|
|
|
|
return redirect(url_for("bot_create"), 303)
|
|
|
|
|
2019-09-02 03:07:46 +00:00
|
|
|
@app.route("/do/authenticate_bot")
|
|
|
|
def do_authenticate_bot():
|
|
|
|
session['code'] = request.args.get('code')
|
|
|
|
session['step'] = 4
|
|
|
|
return redirect(url_for("bot_create"), 303)
|
|
|
|
|
2019-09-11 04:15:26 +00:00
|
|
|
@app.route("/push/<id>", methods = ['POST'])
|
2019-09-10 12:53:15 +00:00
|
|
|
def push(id):
|
2019-09-11 04:15:26 +00:00
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("SELECT client_id, client_secret, secret FROM credentials WHERE id = (SELECT credentials_id FROM bots WHERE handle = %s)", (id,))
|
|
|
|
login = c.fetchone()
|
|
|
|
client = Mastodon(
|
|
|
|
client_id = login[0],
|
|
|
|
client_secret = login[1],
|
|
|
|
access_token = login[2],
|
|
|
|
api_base_url = "https://{}".format(id.split("@")[2])
|
|
|
|
)
|
|
|
|
|
2019-09-11 04:37:13 +00:00
|
|
|
c.execute("SELECT push_private_key, push_secret, replies_enabled FROM bots WHERE handle = %s", (id,))
|
|
|
|
bot = c.fetchone()
|
|
|
|
if not bot[2]:
|
|
|
|
return "Replies disabled."
|
|
|
|
|
2019-09-11 04:15:26 +00:00
|
|
|
params = {
|
2019-09-11 04:37:13 +00:00
|
|
|
'privkey': int(bot[0].rstrip("\0")),
|
|
|
|
'auth': bot[1]
|
2019-09-11 04:15:26 +00:00
|
|
|
}
|
|
|
|
push_object = client.push_subscription_decrypt_push(request.data, params, request.headers['Encryption'], request.headers['Crypto-Key'])
|
2019-09-11 04:37:13 +00:00
|
|
|
notification = client.notifications(id = push_object['notification_id'])
|
|
|
|
me = client.account_verify_credentials()['id']
|
|
|
|
|
|
|
|
# first, check how many times the bot has posted in this thread.
|
|
|
|
# if it's over 15, don't reply.
|
|
|
|
# this is to stop endless reply chains between two bots.
|
|
|
|
try:
|
|
|
|
context = client.status_context(notification['status']['id'])
|
|
|
|
my_posts = 0
|
|
|
|
for post in context['ancestors']:
|
|
|
|
if post['account']['id'] == me:
|
|
|
|
my_posts += 1
|
|
|
|
if my_posts >= 15:
|
|
|
|
# don't reply
|
|
|
|
return "Didn't reply."
|
|
|
|
except:
|
|
|
|
# failed to fetch context
|
|
|
|
# assume we haven't been participating in this thread
|
|
|
|
pass
|
|
|
|
|
2019-09-11 05:00:15 +00:00
|
|
|
functions.make_post([id, notification['status']['id'], notification['status']['visibility'], "@" + notification['account']['acct']])
|
2019-09-11 04:37:13 +00:00
|
|
|
|
|
|
|
return "Success!"
|
2019-09-10 12:53:15 +00:00
|
|
|
|
2019-09-01 07:09:08 +00:00
|
|
|
@app.route("/do/signup", methods=['POST'])
|
|
|
|
def do_signup():
|
|
|
|
# email validation is basically impossible without actually sending an email to the address
|
|
|
|
# because fedibooks can't send email yet, we'll just check if the string contains an @ ;)
|
|
|
|
if "@" not in request.form['email']:
|
2019-09-03 03:22:00 +00:00
|
|
|
session['error'] = "Invalid email address."
|
|
|
|
return redirect(url_for("show_signup_page"), 303)
|
2019-09-01 07:09:08 +00:00
|
|
|
|
|
|
|
if len(request.form['password']) < 8:
|
2019-09-03 03:22:00 +00:00
|
|
|
session['error'] = "Password too short."
|
|
|
|
return redirect(url_for("show_signup_page"), 303)
|
2019-09-01 07:09:08 +00:00
|
|
|
|
2019-09-09 12:08:43 +00:00
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("SELECT COUNT(*) FROM users WHERE email = %s", (request.form['email'],))
|
|
|
|
if c.fetchone()[0] > 0:
|
|
|
|
session['error'] = "Email address already in use."
|
|
|
|
return redirect(url_for("show_signup_page"), 303)
|
|
|
|
|
2019-09-01 07:09:08 +00:00
|
|
|
pw_hashed = hashlib.sha256(request.form['password'].encode('utf-8')).digest()
|
2019-09-01 07:17:07 +00:00
|
|
|
pw = bcrypt.hashpw(pw_hashed, bcrypt.gensalt(12))
|
2019-09-01 07:09:08 +00:00
|
|
|
|
|
|
|
# try to sign up
|
2019-09-01 09:53:38 +00:00
|
|
|
c.execute("INSERT INTO `users` (email, password) VALUES (%s, %s)", (request.form['email'], pw))
|
2019-09-02 03:07:46 +00:00
|
|
|
user_id = c.lastrowid
|
2019-09-01 07:09:08 +00:00
|
|
|
mysql.connection.commit()
|
|
|
|
c.close()
|
2019-09-01 07:16:52 +00:00
|
|
|
|
|
|
|
# success!
|
2019-09-02 03:07:46 +00:00
|
|
|
session['user_id'] = user_id
|
2019-09-01 07:16:52 +00:00
|
|
|
return redirect(url_for('home'))
|
2019-09-01 07:19:17 +00:00
|
|
|
|
|
|
|
@app.route("/do/signout")
|
|
|
|
def do_signout():
|
|
|
|
session.clear()
|
|
|
|
return redirect(url_for("home"))
|
2019-09-01 07:30:00 +00:00
|
|
|
|
|
|
|
@app.route("/do/login", methods=['POST'])
|
|
|
|
def do_login():
|
|
|
|
pw_hashed = hashlib.sha256(request.form['password'].encode('utf-8')).digest()
|
|
|
|
c = mysql.connection.cursor(MySQLdb.cursors.DictCursor)
|
|
|
|
c.execute("SELECT * FROM users WHERE email = %s", (request.form['email'],))
|
|
|
|
data = c.fetchone()
|
|
|
|
c.close()
|
2019-09-03 03:22:00 +00:00
|
|
|
if data == None:
|
|
|
|
session['error'] = "Incorrect login information."
|
|
|
|
return redirect(url_for("show_login_page"), 303)
|
|
|
|
|
2019-09-01 07:30:00 +00:00
|
|
|
if bcrypt.checkpw(pw_hashed, data['password']):
|
2019-09-02 03:07:46 +00:00
|
|
|
session['user_id'] = data['id']
|
2019-09-01 07:30:00 +00:00
|
|
|
return redirect(url_for("home"))
|
|
|
|
|
|
|
|
else:
|
2019-09-03 03:22:00 +00:00
|
|
|
session['error'] = "Incorrect login information."
|
|
|
|
return redirect(url_for("show_login_page"), 303)
|
2019-09-02 06:59:49 +00:00
|
|
|
|
2019-09-06 10:54:29 +00:00
|
|
|
@app.route("/issue/bug")
|
|
|
|
def report_bug():
|
|
|
|
return render_template("report_bug.html")
|
|
|
|
|
2019-09-02 07:38:29 +00:00
|
|
|
@app.route("/img/bot_generic.png")
|
|
|
|
def img_bot_generic():
|
|
|
|
return send_file("static/bot_generic.png", mimetype="image/png")
|
|
|
|
|
2019-09-10 07:00:14 +00:00
|
|
|
@app.route("/favicon.ico")
|
|
|
|
def favicon():
|
|
|
|
return send_file("static/favicon.ico")
|
|
|
|
|
2019-09-02 06:59:49 +00:00
|
|
|
def bot_check(bot):
|
2019-09-03 03:29:50 +00:00
|
|
|
# check to ensure bot is owned by user
|
2019-09-02 06:59:49 +00:00
|
|
|
c = mysql.connection.cursor()
|
|
|
|
c.execute("SELECT COUNT(*) FROM `bots` WHERE `handle` = %s AND `user_id` = %s", (bot, session['user_id']))
|
|
|
|
return c.fetchone()[0] == 1
|