1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Object.Fetcher do
8 alias Pleroma.Object.Containment
9 alias Pleroma.Signature
11 alias Pleroma.Web.ActivityPub.InternalFetchActor
12 alias Pleroma.Web.ActivityPub.Transmogrifier
13 alias Pleroma.Web.OStatus
17 defp reinject_object(struct, data) do
18 Logger.debug("Reinjecting object #{data["id"]}")
20 with data <- Transmogrifier.fix_object(data),
21 changeset <- Object.change(struct, %{data: data}),
22 {:ok, object} <- Repo.insert_or_update(changeset) do
26 Logger.error("Error while processing object: #{inspect(e)}")
31 def refetch_object(%Object{data: %{"id" => id}} = object) do
32 with {:ok, data} <- fetch_and_contain_remote_object_from_id(id),
33 {:ok, object} <- reinject_object(object, data) do
41 # This will create a Create activity, which we need internally at the moment.
42 def fetch_object_from_id(id, options \\ []) do
43 if object = Object.get_cached_by_ap_id(id) do
46 Logger.info("Fetching #{id} via AP")
48 with {:fetch, {:ok, data}} <- {:fetch, fetch_and_contain_remote_object_from_id(id)},
49 {:normalize, nil} <- {:normalize, Object.normalize(data, false)},
54 # Should we seriously keep this attributedTo thing?
55 "actor" => data["actor"] || data["attributedTo"],
58 {:containment, :ok} <- {:containment, Containment.contain_origin(id, params)},
59 {:ok, activity} <- Transmogrifier.handle_incoming(params, options),
60 {:object, _data, %Object{} = object} <-
61 {:object, data, Object.normalize(activity, false)} do
65 {:error, "Object containment failed."}
67 {:error, {:reject, nil}} ->
70 {:object, data, nil} ->
71 reinject_object(%Object{}, data)
73 {:normalize, object = %Object{}} ->
77 # Only fallback when receiving a fetch/normalization error with ActivityPub
78 Logger.info("Couldn't get object via AP, trying out OStatus fetching...")
80 # FIXME: OStatus Object Containment?
81 case OStatus.fetch_activity_from_url(id) do
82 {:ok, [activity | _]} -> {:ok, Object.normalize(activity, false)}
89 def fetch_object_from_id!(id, options \\ []) do
90 with {:ok, object} <- fetch_object_from_id(id, options) do
98 defp make_signature(id, date) do
102 InternalFetchActor.get_actor()
104 "(request-target)": "get #{uri.path}",
109 [{:Signature, signature}]
112 defp sign_fetch(headers, id, date) do
113 if Pleroma.Config.get([:activitypub, :sign_object_fetches]) do
114 headers ++ make_signature(id, date)
120 defp maybe_date_fetch(headers, date) do
121 if Pleroma.Config.get([:activitypub, :sign_object_fetches]) do
122 headers ++ [{:Date, date}]
128 def fetch_and_contain_remote_object_from_id(id) when is_binary(id) do
129 Logger.info("Fetching object #{id} via AP")
131 date = Pleroma.Signature.signed_date()
134 [{:Accept, "application/activity+json"}]
135 |> maybe_date_fetch(date)
136 |> sign_fetch(id, date)
138 Logger.debug("Fetch headers: #{inspect(headers)}")
140 with true <- String.starts_with?(id, "http"),
141 {:ok, %{body: body, status: code}} when code in 200..299 <- HTTP.get(id, headers),
142 {:ok, data} <- Jason.decode(body),
143 :ok <- Containment.contain_origin_from_id(id, data) do
146 {:ok, %{status: code}} when code in [404, 410] ->
147 {:error, "Object has been deleted"}
154 def fetch_and_contain_remote_object_from_id(%{"id" => id}),
155 do: fetch_and_contain_remote_object_from_id(id)
157 def fetch_and_contain_remote_object_from_id(_id), do: {:error, "id must be a string"}