1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.User do
10 import Ecto, only: [assoc: 2]
13 alias Pleroma.Activity
15 alias Pleroma.Conversation.Participation
16 alias Pleroma.Delivery
17 alias Pleroma.EctoType.ActivityPub.ObjectValidators
19 alias Pleroma.FollowingRelationship
20 alias Pleroma.Formatter
24 alias Pleroma.Notification
26 alias Pleroma.Registration
28 alias Pleroma.RepoStreamer
30 alias Pleroma.UserRelationship
32 alias Pleroma.Web.ActivityPub.ActivityPub
33 alias Pleroma.Web.ActivityPub.Builder
34 alias Pleroma.Web.ActivityPub.Pipeline
35 alias Pleroma.Web.ActivityPub.Utils
36 alias Pleroma.Web.CommonAPI
37 alias Pleroma.Web.CommonAPI.Utils, as: CommonUtils
38 alias Pleroma.Web.OAuth
39 alias Pleroma.Web.RelMe
40 alias Pleroma.Workers.BackgroundWorker
44 @type t :: %__MODULE__{}
45 @type account_status ::
48 | :password_reset_pending
49 | :confirmation_pending
51 @primary_key {:id, FlakeId.Ecto.CompatType, autogenerate: true}
53 # credo:disable-for-next-line Credo.Check.Readability.MaxLineLength
54 @email_regex ~r/^[a-zA-Z0-9.!#$%&'*+\/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/
56 @strict_local_nickname_regex ~r/^[a-zA-Z\d]+$/
57 @extended_local_nickname_regex ~r/^[a-zA-Z\d_-]+$/
59 # AP ID user relationships (blocks, mutes etc.)
60 # Format: [rel_type: [outgoing_rel: :outgoing_rel_target, incoming_rel: :incoming_rel_source]]
61 @user_relationships_config [
63 blocker_blocks: :blocked_users,
64 blockee_blocks: :blocker_users
67 muter_mutes: :muted_users,
68 mutee_mutes: :muter_users
71 reblog_muter_mutes: :reblog_muted_users,
72 reblog_mutee_mutes: :reblog_muter_users
75 notification_muter_mutes: :notification_muted_users,
76 notification_mutee_mutes: :notification_muter_users
78 # Note: `inverse_subscription` relationship is inverse: subscriber acts as relationship target
79 inverse_subscription: [
80 subscribee_subscriptions: :subscriber_users,
81 subscriber_subscriptions: :subscribee_users
87 field(:raw_bio, :string)
88 field(:email, :string)
90 field(:nickname, :string)
91 field(:password_hash, :string)
92 field(:password, :string, virtual: true)
93 field(:password_confirmation, :string, virtual: true)
95 field(:public_key, :string)
96 field(:ap_id, :string)
97 field(:avatar, :map, default: %{})
98 field(:local, :boolean, default: true)
99 field(:follower_address, :string)
100 field(:following_address, :string)
101 field(:search_rank, :float, virtual: true)
102 field(:search_type, :integer, virtual: true)
103 field(:tags, {:array, :string}, default: [])
104 field(:last_refreshed_at, :naive_datetime_usec)
105 field(:last_digest_emailed_at, :naive_datetime)
106 field(:banner, :map, default: %{})
107 field(:background, :map, default: %{})
108 field(:note_count, :integer, default: 0)
109 field(:follower_count, :integer, default: 0)
110 field(:following_count, :integer, default: 0)
111 field(:locked, :boolean, default: false)
112 field(:confirmation_pending, :boolean, default: false)
113 field(:password_reset_pending, :boolean, default: false)
114 field(:approval_pending, :boolean, default: false)
115 field(:registration_reason, :string, default: nil)
116 field(:confirmation_token, :string, default: nil)
117 field(:default_scope, :string, default: "public")
118 field(:domain_blocks, {:array, :string}, default: [])
119 field(:deactivated, :boolean, default: false)
120 field(:no_rich_text, :boolean, default: false)
121 field(:ap_enabled, :boolean, default: false)
122 field(:is_moderator, :boolean, default: false)
123 field(:is_admin, :boolean, default: false)
124 field(:show_role, :boolean, default: true)
125 field(:mastofe_settings, :map, default: nil)
126 field(:uri, ObjectValidators.Uri, default: nil)
127 field(:hide_followers_count, :boolean, default: false)
128 field(:hide_follows_count, :boolean, default: false)
129 field(:hide_followers, :boolean, default: false)
130 field(:hide_follows, :boolean, default: false)
131 field(:hide_favorites, :boolean, default: true)
132 field(:unread_conversation_count, :integer, default: 0)
133 field(:pinned_activities, {:array, :string}, default: [])
134 field(:email_notifications, :map, default: %{"digest" => false})
135 field(:mascot, :map, default: nil)
136 field(:emoji, :map, default: %{})
137 field(:pleroma_settings_store, :map, default: %{})
138 field(:fields, {:array, :map}, default: [])
139 field(:raw_fields, {:array, :map}, default: [])
140 field(:discoverable, :boolean, default: false)
141 field(:invisible, :boolean, default: false)
142 field(:allow_following_move, :boolean, default: true)
143 field(:skip_thread_containment, :boolean, default: false)
144 field(:actor_type, :string, default: "Person")
145 field(:also_known_as, {:array, :string}, default: [])
146 field(:inbox, :string)
147 field(:shared_inbox, :string)
148 field(:accepts_chat_messages, :boolean, default: nil)
151 :notification_settings,
152 Pleroma.User.NotificationSetting,
156 has_many(:notifications, Notification)
157 has_many(:registrations, Registration)
158 has_many(:deliveries, Delivery)
160 has_many(:outgoing_relationships, UserRelationship, foreign_key: :source_id)
161 has_many(:incoming_relationships, UserRelationship, foreign_key: :target_id)
163 for {relationship_type,
165 {outgoing_relation, outgoing_relation_target},
166 {incoming_relation, incoming_relation_source}
167 ]} <- @user_relationships_config do
168 # Definitions of `has_many` relations: :blocker_blocks, :muter_mutes, :reblog_muter_mutes,
169 # :notification_muter_mutes, :subscribee_subscriptions
170 has_many(outgoing_relation, UserRelationship,
171 foreign_key: :source_id,
172 where: [relationship_type: relationship_type]
175 # Definitions of `has_many` relations: :blockee_blocks, :mutee_mutes, :reblog_mutee_mutes,
176 # :notification_mutee_mutes, :subscriber_subscriptions
177 has_many(incoming_relation, UserRelationship,
178 foreign_key: :target_id,
179 where: [relationship_type: relationship_type]
182 # Definitions of `has_many` relations: :blocked_users, :muted_users, :reblog_muted_users,
183 # :notification_muted_users, :subscriber_users
184 has_many(outgoing_relation_target, through: [outgoing_relation, :target])
186 # Definitions of `has_many` relations: :blocker_users, :muter_users, :reblog_muter_users,
187 # :notification_muter_users, :subscribee_users
188 has_many(incoming_relation_source, through: [incoming_relation, :source])
191 # `:blocks` is deprecated (replaced with `blocked_users` relation)
192 field(:blocks, {:array, :string}, default: [])
193 # `:mutes` is deprecated (replaced with `muted_users` relation)
194 field(:mutes, {:array, :string}, default: [])
195 # `:muted_reblogs` is deprecated (replaced with `reblog_muted_users` relation)
196 field(:muted_reblogs, {:array, :string}, default: [])
197 # `:muted_notifications` is deprecated (replaced with `notification_muted_users` relation)
198 field(:muted_notifications, {:array, :string}, default: [])
199 # `:subscribers` is deprecated (replaced with `subscriber_users` relation)
200 field(:subscribers, {:array, :string}, default: [])
203 :multi_factor_authentication_settings,
211 for {_relationship_type, [{_outgoing_relation, outgoing_relation_target}, _]} <-
212 @user_relationships_config do
213 # `def blocked_users_relation/2`, `def muted_users_relation/2`,
214 # `def reblog_muted_users_relation/2`, `def notification_muted_users/2`,
215 # `def subscriber_users/2`
216 def unquote(:"#{outgoing_relation_target}_relation")(user, restrict_deactivated? \\ false) do
217 target_users_query = assoc(user, unquote(outgoing_relation_target))
219 if restrict_deactivated? do
220 restrict_deactivated(target_users_query)
226 # `def blocked_users/2`, `def muted_users/2`, `def reblog_muted_users/2`,
227 # `def notification_muted_users/2`, `def subscriber_users/2`
228 def unquote(outgoing_relation_target)(user, restrict_deactivated? \\ false) do
230 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
232 restrict_deactivated?
237 # `def blocked_users_ap_ids/2`, `def muted_users_ap_ids/2`, `def reblog_muted_users_ap_ids/2`,
238 # `def notification_muted_users_ap_ids/2`, `def subscriber_users_ap_ids/2`
239 def unquote(:"#{outgoing_relation_target}_ap_ids")(user, restrict_deactivated? \\ false) do
241 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
243 restrict_deactivated?
245 |> select([u], u.ap_id)
251 Dumps Flake Id to SQL-compatible format (16-byte UUID).
252 E.g. "9pQtDGXuq4p3VlcJEm" -> <<0, 0, 1, 110, 179, 218, 42, 92, 213, 41, 44, 227, 95, 213, 0, 0>>
254 def binary_id(source_id) when is_binary(source_id) do
255 with {:ok, dumped_id} <- FlakeId.Ecto.CompatType.dump(source_id) do
262 def binary_id(source_ids) when is_list(source_ids) do
263 Enum.map(source_ids, &binary_id/1)
266 def binary_id(%User{} = user), do: binary_id(user.id)
268 @doc "Returns status account"
269 @spec account_status(User.t()) :: account_status()
270 def account_status(%User{deactivated: true}), do: :deactivated
271 def account_status(%User{password_reset_pending: true}), do: :password_reset_pending
272 def account_status(%User{approval_pending: true}), do: :approval_pending
274 def account_status(%User{confirmation_pending: true}) do
275 if Config.get([:instance, :account_activation_required]) do
276 :confirmation_pending
282 def account_status(%User{}), do: :active
284 @spec visible_for(User.t(), User.t() | nil) ::
287 | :restricted_unauthenticated
289 | :confirmation_pending
290 def visible_for(user, for_user \\ nil)
292 def visible_for(%User{invisible: true}, _), do: :invisible
294 def visible_for(%User{id: user_id}, %User{id: user_id}), do: :visible
296 def visible_for(%User{} = user, nil) do
297 if restrict_unauthenticated?(user) do
298 :restrict_unauthenticated
300 visible_account_status(user)
304 def visible_for(%User{} = user, for_user) do
305 if superuser?(for_user) do
308 visible_account_status(user)
312 def visible_for(_, _), do: :invisible
314 defp restrict_unauthenticated?(%User{local: local}) do
315 config_key = if local, do: :local, else: :remote
317 Config.get([:restrict_unauthenticated, :profiles, config_key], false)
320 defp visible_account_status(user) do
321 status = account_status(user)
323 if status in [:active, :password_reset_pending] do
330 @spec superuser?(User.t()) :: boolean()
331 def superuser?(%User{local: true, is_admin: true}), do: true
332 def superuser?(%User{local: true, is_moderator: true}), do: true
333 def superuser?(_), do: false
335 @spec invisible?(User.t()) :: boolean()
336 def invisible?(%User{invisible: true}), do: true
337 def invisible?(_), do: false
339 def avatar_url(user, options \\ []) do
341 %{"url" => [%{"href" => href} | _]} ->
345 unless options[:no_default] do
346 Config.get([:assets, :default_user_avatar], "#{Web.base_url()}/images/avi.png")
351 def banner_url(user, options \\ []) do
353 %{"url" => [%{"href" => href} | _]} -> href
354 _ -> !options[:no_default] && "#{Web.base_url()}/images/banner.png"
358 # Should probably be renamed or removed
359 def ap_id(%User{nickname: nickname}), do: "#{Web.base_url()}/users/#{nickname}"
361 def ap_followers(%User{follower_address: fa}) when is_binary(fa), do: fa
362 def ap_followers(%User{} = user), do: "#{ap_id(user)}/followers"
364 @spec ap_following(User.t()) :: String.t()
365 def ap_following(%User{following_address: fa}) when is_binary(fa), do: fa
366 def ap_following(%User{} = user), do: "#{ap_id(user)}/following"
368 @spec restrict_deactivated(Ecto.Query.t()) :: Ecto.Query.t()
369 def restrict_deactivated(query) do
370 from(u in query, where: u.deactivated != ^true)
373 defdelegate following_count(user), to: FollowingRelationship
375 defp truncate_fields_param(params) do
376 if Map.has_key?(params, :fields) do
377 Map.put(params, :fields, Enum.map(params[:fields], &truncate_field/1))
383 defp truncate_if_exists(params, key, max_length) do
384 if Map.has_key?(params, key) and is_binary(params[key]) do
385 {value, _chopped} = String.split_at(params[key], max_length)
386 Map.put(params, key, value)
392 defp fix_follower_address(%{follower_address: _, following_address: _} = params), do: params
394 defp fix_follower_address(%{nickname: nickname} = params),
395 do: Map.put(params, :follower_address, ap_followers(%User{nickname: nickname}))
397 defp fix_follower_address(params), do: params
399 def remote_user_changeset(struct \\ %User{local: false}, params) do
400 bio_limit = Config.get([:instance, :user_bio_length], 5000)
401 name_limit = Config.get([:instance, :user_name_length], 100)
404 case params[:name] do
405 name when is_binary(name) and byte_size(name) > 0 -> name
406 _ -> params[:nickname]
411 |> Map.put(:name, name)
412 |> Map.put_new(:last_refreshed_at, NaiveDateTime.utc_now())
413 |> truncate_if_exists(:name, name_limit)
414 |> truncate_if_exists(:bio, bio_limit)
415 |> truncate_fields_param()
416 |> fix_follower_address()
440 :hide_followers_count,
449 :accepts_chat_messages
452 |> validate_required([:name, :ap_id])
453 |> unique_constraint(:nickname)
454 |> validate_format(:nickname, @email_regex)
455 |> validate_length(:bio, max: bio_limit)
456 |> validate_length(:name, max: name_limit)
457 |> validate_fields(true)
460 def update_changeset(struct, params \\ %{}) do
461 bio_limit = Config.get([:instance, :user_bio_length], 5000)
462 name_limit = Config.get([:instance, :user_name_length], 100)
482 :hide_followers_count,
485 :allow_following_move,
488 :skip_thread_containment,
491 :pleroma_settings_store,
495 :accepts_chat_messages
498 |> unique_constraint(:nickname)
499 |> validate_format(:nickname, local_nickname_regex())
500 |> validate_length(:bio, max: bio_limit)
501 |> validate_length(:name, min: 1, max: name_limit)
502 |> validate_inclusion(:actor_type, ["Person", "Service"])
505 |> put_change_if_present(:bio, &{:ok, parse_bio(&1, struct)})
506 |> put_change_if_present(:avatar, &put_upload(&1, :avatar))
507 |> put_change_if_present(:banner, &put_upload(&1, :banner))
508 |> put_change_if_present(:background, &put_upload(&1, :background))
509 |> put_change_if_present(
510 :pleroma_settings_store,
511 &{:ok, Map.merge(struct.pleroma_settings_store, &1)}
513 |> validate_fields(false)
516 defp put_fields(changeset) do
517 if raw_fields = get_change(changeset, :raw_fields) do
520 |> Enum.filter(fn %{"name" => n} -> n != "" end)
524 |> Enum.map(fn f -> Map.update!(f, "value", &parse_fields(&1)) end)
527 |> put_change(:raw_fields, raw_fields)
528 |> put_change(:fields, fields)
534 defp parse_fields(value) do
536 |> Formatter.linkify(mentions_format: :full)
540 defp put_emoji(changeset) do
541 emojified_fields = [:bio, :name, :raw_fields]
543 if Enum.any?(changeset.changes, fn {k, _} -> k in emojified_fields end) do
544 bio = Emoji.Formatter.get_emoji_map(get_field(changeset, :bio))
545 name = Emoji.Formatter.get_emoji_map(get_field(changeset, :name))
547 emoji = Map.merge(bio, name)
551 |> get_field(:raw_fields)
552 |> Enum.reduce(emoji, fn x, acc ->
553 Map.merge(acc, Emoji.Formatter.get_emoji_map(x["name"] <> x["value"]))
556 put_change(changeset, :emoji, emoji)
562 defp put_change_if_present(changeset, map_field, value_function) do
563 with {:ok, value} <- fetch_change(changeset, map_field),
564 {:ok, new_value} <- value_function.(value) do
565 put_change(changeset, map_field, new_value)
571 defp put_upload(value, type) do
572 with %Plug.Upload{} <- value,
573 {:ok, object} <- ActivityPub.upload(value, type: type) do
578 def update_as_admin_changeset(struct, params) do
580 |> update_changeset(params)
581 |> cast(params, [:email])
582 |> delete_change(:also_known_as)
583 |> unique_constraint(:email)
584 |> validate_format(:email, @email_regex)
585 |> validate_inclusion(:actor_type, ["Person", "Service"])
588 @spec update_as_admin(User.t(), map()) :: {:ok, User.t()} | {:error, Changeset.t()}
589 def update_as_admin(user, params) do
590 params = Map.put(params, "password_confirmation", params["password"])
591 changeset = update_as_admin_changeset(user, params)
593 if params["password"] do
594 reset_password(user, changeset, params)
596 User.update_and_set_cache(changeset)
600 def password_update_changeset(struct, params) do
602 |> cast(params, [:password, :password_confirmation])
603 |> validate_required([:password, :password_confirmation])
604 |> validate_confirmation(:password)
605 |> put_password_hash()
606 |> put_change(:password_reset_pending, false)
609 @spec reset_password(User.t(), map()) :: {:ok, User.t()} | {:error, Changeset.t()}
610 def reset_password(%User{} = user, params) do
611 reset_password(user, user, params)
614 def reset_password(%User{id: user_id} = user, struct, params) do
617 |> Multi.update(:user, password_update_changeset(struct, params))
618 |> Multi.delete_all(:tokens, OAuth.Token.Query.get_by_user(user_id))
619 |> Multi.delete_all(:auth, OAuth.Authorization.delete_by_user_query(user))
621 case Repo.transaction(multi) do
622 {:ok, %{user: user} = _} -> set_cache(user)
623 {:error, _, changeset, _} -> {:error, changeset}
627 def update_password_reset_pending(user, value) do
630 |> put_change(:password_reset_pending, value)
631 |> update_and_set_cache()
634 def force_password_reset_async(user) do
635 BackgroundWorker.enqueue("force_password_reset", %{"user_id" => user.id})
638 @spec force_password_reset(User.t()) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
639 def force_password_reset(user), do: update_password_reset_pending(user, true)
641 def register_changeset(struct, params \\ %{}, opts \\ []) do
642 bio_limit = Config.get([:instance, :user_bio_length], 5000)
643 name_limit = Config.get([:instance, :user_name_length], 100)
644 reason_limit = Config.get([:instance, :registration_reason_length], 500)
645 params = Map.put_new(params, :accepts_chat_messages, true)
648 if is_nil(opts[:need_confirmation]) do
649 Config.get([:instance, :account_activation_required])
651 opts[:need_confirmation]
655 if is_nil(opts[:need_approval]) do
656 Config.get([:instance, :account_approval_required])
662 |> confirmation_changeset(need_confirmation: need_confirmation?)
663 |> approval_changeset(need_approval: need_approval?)
671 :password_confirmation,
673 :accepts_chat_messages,
676 |> validate_required([:name, :nickname, :password, :password_confirmation])
677 |> validate_confirmation(:password)
678 |> unique_constraint(:email)
679 |> unique_constraint(:nickname)
680 |> validate_exclusion(:nickname, Config.get([User, :restricted_nicknames]))
681 |> validate_format(:nickname, local_nickname_regex())
682 |> validate_format(:email, @email_regex)
683 |> validate_length(:bio, max: bio_limit)
684 |> validate_length(:name, min: 1, max: name_limit)
685 |> validate_length(:registration_reason, max: reason_limit)
686 |> maybe_validate_required_email(opts[:external])
689 |> unique_constraint(:ap_id)
690 |> put_following_and_follower_address()
693 def maybe_validate_required_email(changeset, true), do: changeset
695 def maybe_validate_required_email(changeset, _) do
696 if Config.get([:instance, :account_activation_required]) do
697 validate_required(changeset, [:email])
703 defp put_ap_id(changeset) do
704 ap_id = ap_id(%User{nickname: get_field(changeset, :nickname)})
705 put_change(changeset, :ap_id, ap_id)
708 defp put_following_and_follower_address(changeset) do
709 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
712 |> put_change(:follower_address, followers)
715 defp autofollow_users(user) do
716 candidates = Config.get([:instance, :autofollowed_nicknames])
719 User.Query.build(%{nickname: candidates, local: true, deactivated: false})
722 follow_all(user, autofollowed_users)
725 @doc "Inserts provided changeset, performs post-registration actions (confirmation email sending etc.)"
726 def register(%Ecto.Changeset{} = changeset) do
727 with {:ok, user} <- Repo.insert(changeset) do
728 post_register_action(user)
732 def post_register_action(%User{} = user) do
733 with {:ok, user} <- autofollow_users(user),
734 {:ok, user} <- set_cache(user),
735 {:ok, _} <- send_welcome_email(user),
736 {:ok, _} <- send_welcome_message(user),
737 {:ok, _} <- send_welcome_chat_message(user),
738 {:ok, _} <- try_send_confirmation_email(user) do
743 def send_welcome_message(user) do
744 if User.WelcomeMessage.enabled?() do
745 User.WelcomeMessage.post_message(user)
752 def send_welcome_chat_message(user) do
753 if User.WelcomeChatMessage.enabled?() do
754 User.WelcomeChatMessage.post_message(user)
761 def send_welcome_email(%User{email: email} = user) when is_binary(email) do
762 if User.WelcomeEmail.enabled?() do
763 User.WelcomeEmail.send_email(user)
770 def send_welcome_email(_), do: {:ok, :noop}
772 @spec try_send_confirmation_email(User.t()) :: {:ok, :enqueued | :noop}
773 def try_send_confirmation_email(%User{confirmation_pending: true} = user) do
774 if Config.get([:instance, :account_activation_required]) do
775 send_confirmation_email(user)
782 def try_send_confirmation_email(_), do: {:ok, :noop}
784 @spec send_confirmation_email(Uset.t()) :: User.t()
785 def send_confirmation_email(%User{} = user) do
787 |> Pleroma.Emails.UserEmail.account_confirmation_email()
788 |> Pleroma.Emails.Mailer.deliver_async()
793 def needs_update?(%User{local: true}), do: false
795 def needs_update?(%User{local: false, last_refreshed_at: nil}), do: true
797 def needs_update?(%User{local: false} = user) do
798 NaiveDateTime.diff(NaiveDateTime.utc_now(), user.last_refreshed_at) >= 86_400
801 def needs_update?(_), do: true
803 @spec maybe_direct_follow(User.t(), User.t()) :: {:ok, User.t()} | {:error, String.t()}
805 # "Locked" (self-locked) users demand explicit authorization of follow requests
806 def maybe_direct_follow(%User{} = follower, %User{local: true, locked: true} = followed) do
807 follow(follower, followed, :follow_pending)
810 def maybe_direct_follow(%User{} = follower, %User{local: true} = followed) do
811 follow(follower, followed)
814 def maybe_direct_follow(%User{} = follower, %User{} = followed) do
815 if not ap_enabled?(followed) do
816 follow(follower, followed)
822 @doc "A mass follow for local users. Respects blocks in both directions but does not create activities."
823 @spec follow_all(User.t(), list(User.t())) :: {atom(), User.t()}
824 def follow_all(follower, followeds) do
826 |> Enum.reject(fn followed -> blocks?(follower, followed) || blocks?(followed, follower) end)
827 |> Enum.each(&follow(follower, &1, :follow_accept))
832 defdelegate following(user), to: FollowingRelationship
834 def follow(%User{} = follower, %User{} = followed, state \\ :follow_accept) do
835 deny_follow_blocked = Config.get([:user, :deny_follow_blocked])
838 followed.deactivated ->
839 {:error, "Could not follow user: #{followed.nickname} is deactivated."}
841 deny_follow_blocked and blocks?(followed, follower) ->
842 {:error, "Could not follow user: #{followed.nickname} blocked you."}
845 FollowingRelationship.follow(follower, followed, state)
847 {:ok, _} = update_follower_count(followed)
850 |> update_following_count()
854 def unfollow(%User{ap_id: ap_id}, %User{ap_id: ap_id}) do
855 {:error, "Not subscribed!"}
858 @spec unfollow(User.t(), User.t()) :: {:ok, User.t(), Activity.t()} | {:error, String.t()}
859 def unfollow(%User{} = follower, %User{} = followed) do
860 case do_unfollow(follower, followed) do
861 {:ok, follower, followed} ->
862 {:ok, follower, Utils.fetch_latest_follow(follower, followed)}
869 @spec do_unfollow(User.t(), User.t()) :: {:ok, User.t(), User.t()} | {:error, String.t()}
870 defp do_unfollow(%User{} = follower, %User{} = followed) do
871 case get_follow_state(follower, followed) do
872 state when state in [:follow_pending, :follow_accept] ->
873 FollowingRelationship.unfollow(follower, followed)
874 {:ok, followed} = update_follower_count(followed)
878 |> update_following_count()
880 {:ok, follower, followed}
883 {:error, "Not subscribed!"}
887 defdelegate following?(follower, followed), to: FollowingRelationship
889 @doc "Returns follow state as Pleroma.FollowingRelationship.State value"
890 def get_follow_state(%User{} = follower, %User{} = following) do
891 following_relationship = FollowingRelationship.get(follower, following)
892 get_follow_state(follower, following, following_relationship)
895 def get_follow_state(
898 following_relationship
900 case {following_relationship, following.local} do
902 case Utils.fetch_latest_follow(follower, following) do
903 %Activity{data: %{"state" => state}} when state in ["pending", "accept"] ->
904 FollowingRelationship.state_to_enum(state)
910 {%{state: state}, _} ->
918 def locked?(%User{} = user) do
923 Repo.get_by(User, id: id)
926 def get_by_ap_id(ap_id) do
927 Repo.get_by(User, ap_id: ap_id)
930 def get_all_by_ap_id(ap_ids) do
931 from(u in __MODULE__,
932 where: u.ap_id in ^ap_ids
937 def get_all_by_ids(ids) do
938 from(u in __MODULE__, where: u.id in ^ids)
942 # This is mostly an SPC migration fix. This guesses the user nickname by taking the last part
943 # of the ap_id and the domain and tries to get that user
944 def get_by_guessed_nickname(ap_id) do
945 domain = URI.parse(ap_id).host
946 name = List.last(String.split(ap_id, "/"))
947 nickname = "#{name}@#{domain}"
949 get_cached_by_nickname(nickname)
952 def set_cache({:ok, user}), do: set_cache(user)
953 def set_cache({:error, err}), do: {:error, err}
955 def set_cache(%User{} = user) do
956 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
957 Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
958 Cachex.put(:user_cache, "friends_ap_ids:#{user.nickname}", get_user_friends_ap_ids(user))
962 def update_and_set_cache(struct, params) do
964 |> update_changeset(params)
965 |> update_and_set_cache()
968 def update_and_set_cache(changeset) do
969 with {:ok, user} <- Repo.update(changeset, stale_error_field: :id) do
974 def get_user_friends_ap_ids(user) do
975 from(u in User.get_friends_query(user), select: u.ap_id)
979 @spec get_cached_user_friends_ap_ids(User.t()) :: [String.t()]
980 def get_cached_user_friends_ap_ids(user) do
981 Cachex.fetch!(:user_cache, "friends_ap_ids:#{user.ap_id}", fn _ ->
982 get_user_friends_ap_ids(user)
986 def invalidate_cache(user) do
987 Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
988 Cachex.del(:user_cache, "nickname:#{user.nickname}")
989 Cachex.del(:user_cache, "friends_ap_ids:#{user.ap_id}")
992 @spec get_cached_by_ap_id(String.t()) :: User.t() | nil
993 def get_cached_by_ap_id(ap_id) do
994 key = "ap_id:#{ap_id}"
996 with {:ok, nil} <- Cachex.get(:user_cache, key),
997 user when not is_nil(user) <- get_by_ap_id(ap_id),
998 {:ok, true} <- Cachex.put(:user_cache, key, user) do
1006 def get_cached_by_id(id) do
1010 Cachex.fetch!(:user_cache, key, fn _ ->
1011 user = get_by_id(id)
1014 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
1015 {:commit, user.ap_id}
1021 get_cached_by_ap_id(ap_id)
1024 def get_cached_by_nickname(nickname) do
1025 key = "nickname:#{nickname}"
1027 Cachex.fetch!(:user_cache, key, fn ->
1028 case get_or_fetch_by_nickname(nickname) do
1029 {:ok, user} -> {:commit, user}
1030 {:error, _error} -> {:ignore, nil}
1035 def get_cached_by_nickname_or_id(nickname_or_id, opts \\ []) do
1036 restrict_to_local = Config.get([:instance, :limit_to_local_content])
1039 is_integer(nickname_or_id) or FlakeId.flake_id?(nickname_or_id) ->
1040 get_cached_by_id(nickname_or_id) || get_cached_by_nickname(nickname_or_id)
1042 restrict_to_local == false or not String.contains?(nickname_or_id, "@") ->
1043 get_cached_by_nickname(nickname_or_id)
1045 restrict_to_local == :unauthenticated and match?(%User{}, opts[:for]) ->
1046 get_cached_by_nickname(nickname_or_id)
1053 @spec get_by_nickname(String.t()) :: User.t() | nil
1054 def get_by_nickname(nickname) do
1055 Repo.get_by(User, nickname: nickname) ||
1056 if Regex.match?(~r(@#{Pleroma.Web.Endpoint.host()})i, nickname) do
1057 Repo.get_by(User, nickname: local_nickname(nickname))
1061 def get_by_email(email), do: Repo.get_by(User, email: email)
1063 def get_by_nickname_or_email(nickname_or_email) do
1064 get_by_nickname(nickname_or_email) || get_by_email(nickname_or_email)
1067 def fetch_by_nickname(nickname), do: ActivityPub.make_user_from_nickname(nickname)
1069 def get_or_fetch_by_nickname(nickname) do
1070 with %User{} = user <- get_by_nickname(nickname) do
1074 with [_nick, _domain] <- String.split(nickname, "@"),
1075 {:ok, user} <- fetch_by_nickname(nickname) do
1078 _e -> {:error, "not found " <> nickname}
1083 @spec get_followers_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
1084 def get_followers_query(%User{} = user, nil) do
1085 User.Query.build(%{followers: user, deactivated: false})
1088 def get_followers_query(user, page) do
1090 |> get_followers_query(nil)
1091 |> User.Query.paginate(page, 20)
1094 @spec get_followers_query(User.t()) :: Ecto.Query.t()
1095 def get_followers_query(user), do: get_followers_query(user, nil)
1097 @spec get_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
1098 def get_followers(user, page \\ nil) do
1100 |> get_followers_query(page)
1104 @spec get_external_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
1105 def get_external_followers(user, page \\ nil) do
1107 |> get_followers_query(page)
1108 |> User.Query.build(%{external: true})
1112 def get_followers_ids(user, page \\ nil) do
1114 |> get_followers_query(page)
1115 |> select([u], u.id)
1119 @spec get_friends_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
1120 def get_friends_query(%User{} = user, nil) do
1121 User.Query.build(%{friends: user, deactivated: false})
1124 def get_friends_query(user, page) do
1126 |> get_friends_query(nil)
1127 |> User.Query.paginate(page, 20)
1130 @spec get_friends_query(User.t()) :: Ecto.Query.t()
1131 def get_friends_query(user), do: get_friends_query(user, nil)
1133 def get_friends(user, page \\ nil) do
1135 |> get_friends_query(page)
1139 def get_friends_ap_ids(user) do
1141 |> get_friends_query(nil)
1142 |> select([u], u.ap_id)
1146 def get_friends_ids(user, page \\ nil) do
1148 |> get_friends_query(page)
1149 |> select([u], u.id)
1153 defdelegate get_follow_requests(user), to: FollowingRelationship
1155 def increase_note_count(%User{} = user) do
1157 |> where(id: ^user.id)
1158 |> update([u], inc: [note_count: 1])
1160 |> Repo.update_all([])
1162 {1, [user]} -> set_cache(user)
1167 def decrease_note_count(%User{} = user) do
1169 |> where(id: ^user.id)
1172 note_count: fragment("greatest(0, note_count - 1)")
1176 |> Repo.update_all([])
1178 {1, [user]} -> set_cache(user)
1183 def update_note_count(%User{} = user, note_count \\ nil) do
1188 where: fragment("?->>'actor' = ? and ?->>'type' = 'Note'", a.data, ^user.ap_id, a.data),
1194 |> cast(%{note_count: note_count}, [:note_count])
1195 |> update_and_set_cache()
1198 @spec maybe_fetch_follow_information(User.t()) :: User.t()
1199 def maybe_fetch_follow_information(user) do
1200 with {:ok, user} <- fetch_follow_information(user) do
1204 Logger.error("Follower/Following counter update for #{user.ap_id} failed.\n#{inspect(e)}")
1210 def fetch_follow_information(user) do
1211 with {:ok, info} <- ActivityPub.fetch_follow_information_for_user(user) do
1213 |> follow_information_changeset(info)
1214 |> update_and_set_cache()
1218 defp follow_information_changeset(user, params) do
1225 :hide_followers_count,
1230 @spec update_follower_count(User.t()) :: {:ok, User.t()}
1231 def update_follower_count(%User{} = user) do
1232 if user.local or !Config.get([:instance, :external_user_synchronization]) do
1233 follower_count = FollowingRelationship.follower_count(user)
1236 |> follow_information_changeset(%{follower_count: follower_count})
1237 |> update_and_set_cache
1239 {:ok, maybe_fetch_follow_information(user)}
1243 @spec update_following_count(User.t()) :: {:ok, User.t()}
1244 def update_following_count(%User{local: false} = user) do
1245 if Config.get([:instance, :external_user_synchronization]) do
1246 {:ok, maybe_fetch_follow_information(user)}
1252 def update_following_count(%User{local: true} = user) do
1253 following_count = FollowingRelationship.following_count(user)
1256 |> follow_information_changeset(%{following_count: following_count})
1257 |> update_and_set_cache()
1260 def set_unread_conversation_count(%User{local: true} = user) do
1261 unread_query = Participation.unread_conversation_count_for_user(user)
1264 |> join(:inner, [u], p in subquery(unread_query))
1266 set: [unread_conversation_count: p.count]
1268 |> where([u], u.id == ^user.id)
1270 |> Repo.update_all([])
1272 {1, [user]} -> set_cache(user)
1277 def set_unread_conversation_count(user), do: {:ok, user}
1279 def increment_unread_conversation_count(conversation, %User{local: true} = user) do
1281 Participation.unread_conversation_count_for_user(user)
1282 |> where([p], p.conversation_id == ^conversation.id)
1285 |> join(:inner, [u], p in subquery(unread_query))
1287 inc: [unread_conversation_count: 1]
1289 |> where([u], u.id == ^user.id)
1290 |> where([u, p], p.count == 0)
1292 |> Repo.update_all([])
1294 {1, [user]} -> set_cache(user)
1299 def increment_unread_conversation_count(_, user), do: {:ok, user}
1301 @spec get_users_from_set([String.t()], keyword()) :: [User.t()]
1302 def get_users_from_set(ap_ids, opts \\ []) do
1303 local_only = Keyword.get(opts, :local_only, true)
1304 criteria = %{ap_id: ap_ids, deactivated: false}
1305 criteria = if local_only, do: Map.put(criteria, :local, true), else: criteria
1307 User.Query.build(criteria)
1311 @spec get_recipients_from_activity(Activity.t()) :: [User.t()]
1312 def get_recipients_from_activity(%Activity{recipients: to, actor: actor}) do
1315 query = User.Query.build(%{recipients_from_activity: to, local: true, deactivated: false})
1321 @spec mute(User.t(), User.t(), boolean()) ::
1322 {:ok, list(UserRelationship.t())} | {:error, String.t()}
1323 def mute(%User{} = muter, %User{} = mutee, notifications? \\ true) do
1324 add_to_mutes(muter, mutee, notifications?)
1327 def unmute(%User{} = muter, %User{} = mutee) do
1328 remove_from_mutes(muter, mutee)
1331 def subscribe(%User{} = subscriber, %User{} = target) do
1332 deny_follow_blocked = Config.get([:user, :deny_follow_blocked])
1334 if blocks?(target, subscriber) and deny_follow_blocked do
1335 {:error, "Could not subscribe: #{target.nickname} is blocking you"}
1337 # Note: the relationship is inverse: subscriber acts as relationship target
1338 UserRelationship.create_inverse_subscription(target, subscriber)
1342 def subscribe(%User{} = subscriber, %{ap_id: ap_id}) do
1343 with %User{} = subscribee <- get_cached_by_ap_id(ap_id) do
1344 subscribe(subscriber, subscribee)
1348 def unsubscribe(%User{} = unsubscriber, %User{} = target) do
1349 # Note: the relationship is inverse: subscriber acts as relationship target
1350 UserRelationship.delete_inverse_subscription(target, unsubscriber)
1353 def unsubscribe(%User{} = unsubscriber, %{ap_id: ap_id}) do
1354 with %User{} = user <- get_cached_by_ap_id(ap_id) do
1355 unsubscribe(unsubscriber, user)
1359 def block(%User{} = blocker, %User{} = blocked) do
1360 # sever any follow relationships to prevent leaks per activitypub (Pleroma issue #213)
1362 if following?(blocker, blocked) do
1363 {:ok, blocker, _} = unfollow(blocker, blocked)
1369 # clear any requested follows as well
1371 case CommonAPI.reject_follow_request(blocked, blocker) do
1372 {:ok, %User{} = updated_blocked} -> updated_blocked
1376 unsubscribe(blocked, blocker)
1378 unfollowing_blocked = Config.get([:activitypub, :unfollow_blocked], true)
1379 if unfollowing_blocked && following?(blocked, blocker), do: unfollow(blocked, blocker)
1381 {:ok, blocker} = update_follower_count(blocker)
1382 {:ok, blocker, _} = Participation.mark_all_as_read(blocker, blocked)
1383 add_to_block(blocker, blocked)
1386 # helper to handle the block given only an actor's AP id
1387 def block(%User{} = blocker, %{ap_id: ap_id}) do
1388 block(blocker, get_cached_by_ap_id(ap_id))
1391 def unblock(%User{} = blocker, %User{} = blocked) do
1392 remove_from_block(blocker, blocked)
1395 # helper to handle the block given only an actor's AP id
1396 def unblock(%User{} = blocker, %{ap_id: ap_id}) do
1397 unblock(blocker, get_cached_by_ap_id(ap_id))
1400 def mutes?(nil, _), do: false
1401 def mutes?(%User{} = user, %User{} = target), do: mutes_user?(user, target)
1403 def mutes_user?(%User{} = user, %User{} = target) do
1404 UserRelationship.mute_exists?(user, target)
1407 @spec muted_notifications?(User.t() | nil, User.t() | map()) :: boolean()
1408 def muted_notifications?(nil, _), do: false
1410 def muted_notifications?(%User{} = user, %User{} = target),
1411 do: UserRelationship.notification_mute_exists?(user, target)
1413 def blocks?(nil, _), do: false
1415 def blocks?(%User{} = user, %User{} = target) do
1416 blocks_user?(user, target) ||
1417 (blocks_domain?(user, target) and not User.following?(user, target))
1420 def blocks_user?(%User{} = user, %User{} = target) do
1421 UserRelationship.block_exists?(user, target)
1424 def blocks_user?(_, _), do: false
1426 def blocks_domain?(%User{} = user, %User{} = target) do
1427 domain_blocks = Pleroma.Web.ActivityPub.MRF.subdomains_regex(user.domain_blocks)
1428 %{host: host} = URI.parse(target.ap_id)
1429 Pleroma.Web.ActivityPub.MRF.subdomain_match?(domain_blocks, host)
1432 def blocks_domain?(_, _), do: false
1434 def subscribed_to?(%User{} = user, %User{} = target) do
1435 # Note: the relationship is inverse: subscriber acts as relationship target
1436 UserRelationship.inverse_subscription_exists?(target, user)
1439 def subscribed_to?(%User{} = user, %{ap_id: ap_id}) do
1440 with %User{} = target <- get_cached_by_ap_id(ap_id) do
1441 subscribed_to?(user, target)
1446 Returns map of outgoing (blocked, muted etc.) relationships' user AP IDs by relation type.
1447 E.g. `outgoing_relationships_ap_ids(user, [:block])` -> `%{block: ["https://some.site/users/userapid"]}`
1449 @spec outgoing_relationships_ap_ids(User.t(), list(atom())) :: %{atom() => list(String.t())}
1450 def outgoing_relationships_ap_ids(_user, []), do: %{}
1452 def outgoing_relationships_ap_ids(nil, _relationship_types), do: %{}
1454 def outgoing_relationships_ap_ids(%User{} = user, relationship_types)
1455 when is_list(relationship_types) do
1458 |> assoc(:outgoing_relationships)
1459 |> join(:inner, [user_rel], u in assoc(user_rel, :target))
1460 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1461 |> select([user_rel, u], [user_rel.relationship_type, fragment("array_agg(?)", u.ap_id)])
1462 |> group_by([user_rel, u], user_rel.relationship_type)
1464 |> Enum.into(%{}, fn [k, v] -> {k, v} end)
1469 fn rel_type -> {rel_type, db_result[rel_type] || []} end
1473 def incoming_relationships_ungrouped_ap_ids(user, relationship_types, ap_ids \\ nil)
1475 def incoming_relationships_ungrouped_ap_ids(_user, [], _ap_ids), do: []
1477 def incoming_relationships_ungrouped_ap_ids(nil, _relationship_types, _ap_ids), do: []
1479 def incoming_relationships_ungrouped_ap_ids(%User{} = user, relationship_types, ap_ids)
1480 when is_list(relationship_types) do
1482 |> assoc(:incoming_relationships)
1483 |> join(:inner, [user_rel], u in assoc(user_rel, :source))
1484 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1485 |> maybe_filter_on_ap_id(ap_ids)
1486 |> select([user_rel, u], u.ap_id)
1491 defp maybe_filter_on_ap_id(query, ap_ids) when is_list(ap_ids) do
1492 where(query, [user_rel, u], u.ap_id in ^ap_ids)
1495 defp maybe_filter_on_ap_id(query, _ap_ids), do: query
1497 def deactivate_async(user, status \\ true) do
1498 BackgroundWorker.enqueue("deactivate_user", %{"user_id" => user.id, "status" => status})
1501 def deactivate(user, status \\ true)
1503 def deactivate(users, status) when is_list(users) do
1504 Repo.transaction(fn ->
1505 for user <- users, do: deactivate(user, status)
1509 def deactivate(%User{} = user, status) do
1510 with {:ok, user} <- set_activation_status(user, status) do
1513 |> Enum.filter(& &1.local)
1514 |> Enum.each(&set_cache(update_following_count(&1)))
1516 # Only update local user counts, remote will be update during the next pull.
1519 |> Enum.filter(& &1.local)
1520 |> Enum.each(&do_unfollow(user, &1))
1526 def approve(users) when is_list(users) do
1527 Repo.transaction(fn ->
1528 Enum.map(users, fn user ->
1529 with {:ok, user} <- approve(user), do: user
1534 def approve(%User{} = user) do
1535 change(user, approval_pending: false)
1536 |> update_and_set_cache()
1539 def update_notification_settings(%User{} = user, settings) do
1541 |> cast(%{notification_settings: settings}, [])
1542 |> cast_embed(:notification_settings)
1543 |> validate_required([:notification_settings])
1544 |> update_and_set_cache()
1547 def delete(users) when is_list(users) do
1548 for user <- users, do: delete(user)
1551 def delete(%User{} = user) do
1552 BackgroundWorker.enqueue("delete_user", %{"user_id" => user.id})
1555 defp delete_and_invalidate_cache(%User{} = user) do
1556 invalidate_cache(user)
1560 defp delete_or_deactivate(%User{local: false} = user), do: delete_and_invalidate_cache(user)
1562 defp delete_or_deactivate(%User{local: true} = user) do
1563 status = account_status(user)
1566 :confirmation_pending ->
1567 delete_and_invalidate_cache(user)
1569 :approval_pending ->
1570 delete_and_invalidate_cache(user)
1574 |> change(%{deactivated: true, email: nil})
1575 |> update_and_set_cache()
1579 def perform(:force_password_reset, user), do: force_password_reset(user)
1581 @spec perform(atom(), User.t()) :: {:ok, User.t()}
1582 def perform(:delete, %User{} = user) do
1583 # Remove all relationships
1586 |> Enum.each(fn follower ->
1587 ActivityPub.unfollow(follower, user)
1588 unfollow(follower, user)
1593 |> Enum.each(fn followed ->
1594 ActivityPub.unfollow(user, followed)
1595 unfollow(user, followed)
1598 delete_user_activities(user)
1599 delete_notifications_from_user_activities(user)
1601 delete_outgoing_pending_follow_requests(user)
1603 delete_or_deactivate(user)
1606 def perform(:deactivate_async, user, status), do: deactivate(user, status)
1608 @spec perform(atom(), User.t(), list()) :: list() | {:error, any()}
1609 def perform(:blocks_import, %User{} = blocker, blocked_identifiers)
1610 when is_list(blocked_identifiers) do
1612 blocked_identifiers,
1613 fn blocked_identifier ->
1614 with {:ok, %User{} = blocked} <- get_or_fetch(blocked_identifier),
1615 {:ok, _block} <- CommonAPI.block(blocker, blocked) do
1619 Logger.debug("blocks_import failed for #{blocked_identifier} with: #{inspect(err)}")
1626 def perform(:follow_import, %User{} = follower, followed_identifiers)
1627 when is_list(followed_identifiers) do
1629 followed_identifiers,
1630 fn followed_identifier ->
1631 with {:ok, %User{} = followed} <- get_or_fetch(followed_identifier),
1632 {:ok, follower} <- maybe_direct_follow(follower, followed),
1633 {:ok, _, _, _} <- CommonAPI.follow(follower, followed) do
1637 Logger.debug("follow_import failed for #{followed_identifier} with: #{inspect(err)}")
1644 @spec external_users_query() :: Ecto.Query.t()
1645 def external_users_query do
1653 @spec external_users(keyword()) :: [User.t()]
1654 def external_users(opts \\ []) do
1656 external_users_query()
1657 |> select([u], struct(u, [:id, :ap_id]))
1661 do: where(query, [u], u.id > ^opts[:max_id]),
1666 do: limit(query, ^opts[:limit]),
1672 def blocks_import(%User{} = blocker, blocked_identifiers) when is_list(blocked_identifiers) do
1673 BackgroundWorker.enqueue("blocks_import", %{
1674 "blocker_id" => blocker.id,
1675 "blocked_identifiers" => blocked_identifiers
1679 def follow_import(%User{} = follower, followed_identifiers)
1680 when is_list(followed_identifiers) do
1681 BackgroundWorker.enqueue("follow_import", %{
1682 "follower_id" => follower.id,
1683 "followed_identifiers" => followed_identifiers
1687 def delete_notifications_from_user_activities(%User{ap_id: ap_id}) do
1689 |> join(:inner, [n], activity in assoc(n, :activity))
1690 |> where([n, a], fragment("? = ?", a.actor, ^ap_id))
1691 |> Repo.delete_all()
1694 def delete_user_activities(%User{ap_id: ap_id} = user) do
1696 |> Activity.Queries.by_actor()
1697 |> RepoStreamer.chunk_stream(50)
1698 |> Stream.each(fn activities ->
1699 Enum.each(activities, fn activity -> delete_activity(activity, user) end)
1704 defp delete_activity(%{data: %{"type" => "Create", "object" => object}} = activity, user) do
1705 with {_, %Object{}} <- {:find_object, Object.get_by_ap_id(object)},
1706 {:ok, delete_data, _} <- Builder.delete(user, object) do
1707 Pipeline.common_pipeline(delete_data, local: user.local)
1709 {:find_object, nil} ->
1710 # We have the create activity, but not the object, it was probably pruned.
1711 # Insert a tombstone and try again
1712 with {:ok, tombstone_data, _} <- Builder.tombstone(user.ap_id, object),
1713 {:ok, _tombstone} <- Object.create(tombstone_data) do
1714 delete_activity(activity, user)
1718 Logger.error("Could not delete #{object} created by #{activity.data["ap_id"]}")
1719 Logger.error("Error: #{inspect(e)}")
1723 defp delete_activity(%{data: %{"type" => type}} = activity, user)
1724 when type in ["Like", "Announce"] do
1725 {:ok, undo, _} = Builder.undo(user, activity)
1726 Pipeline.common_pipeline(undo, local: user.local)
1729 defp delete_activity(_activity, _user), do: "Doing nothing"
1731 defp delete_outgoing_pending_follow_requests(user) do
1733 |> FollowingRelationship.outgoing_pending_follow_requests_query()
1734 |> Repo.delete_all()
1737 def html_filter_policy(%User{no_rich_text: true}) do
1738 Pleroma.HTML.Scrubber.TwitterText
1741 def html_filter_policy(_), do: Config.get([:markup, :scrub_policy])
1743 def fetch_by_ap_id(ap_id), do: ActivityPub.make_user_from_ap_id(ap_id)
1745 def get_or_fetch_by_ap_id(ap_id) do
1746 cached_user = get_cached_by_ap_id(ap_id)
1748 maybe_fetched_user = needs_update?(cached_user) && fetch_by_ap_id(ap_id)
1750 case {cached_user, maybe_fetched_user} do
1751 {_, {:ok, %User{} = user}} ->
1754 {%User{} = user, _} ->
1758 {:error, :not_found}
1763 Creates an internal service actor by URI if missing.
1764 Optionally takes nickname for addressing.
1766 @spec get_or_create_service_actor_by_ap_id(String.t(), String.t()) :: User.t() | nil
1767 def get_or_create_service_actor_by_ap_id(uri, nickname) do
1769 case get_cached_by_ap_id(uri) do
1771 with {:error, %{errors: errors}} <- create_service_actor(uri, nickname) do
1772 Logger.error("Cannot create service actor: #{uri}/.\n#{inspect(errors)}")
1776 %User{invisible: false} = user ->
1786 @spec set_invisible(User.t()) :: {:ok, User.t()}
1787 defp set_invisible(user) do
1789 |> change(%{invisible: true})
1790 |> update_and_set_cache()
1793 @spec create_service_actor(String.t(), String.t()) ::
1794 {:ok, User.t()} | {:error, Ecto.Changeset.t()}
1795 defp create_service_actor(uri, nickname) do
1801 follower_address: uri <> "/followers"
1804 |> unique_constraint(:nickname)
1809 def public_key(%{public_key: public_key_pem}) when is_binary(public_key_pem) do
1812 |> :public_key.pem_decode()
1814 |> :public_key.pem_entry_decode()
1819 def public_key(_), do: {:error, "key not found"}
1821 def get_public_key_for_ap_id(ap_id) do
1822 with {:ok, %User{} = user} <- get_or_fetch_by_ap_id(ap_id),
1823 {:ok, public_key} <- public_key(user) do
1830 def ap_enabled?(%User{local: true}), do: true
1831 def ap_enabled?(%User{ap_enabled: ap_enabled}), do: ap_enabled
1832 def ap_enabled?(_), do: false
1834 @doc "Gets or fetch a user by uri or nickname."
1835 @spec get_or_fetch(String.t()) :: {:ok, User.t()} | {:error, String.t()}
1836 def get_or_fetch("http" <> _host = uri), do: get_or_fetch_by_ap_id(uri)
1837 def get_or_fetch(nickname), do: get_or_fetch_by_nickname(nickname)
1839 # wait a period of time and return newest version of the User structs
1840 # this is because we have synchronous follow APIs and need to simulate them
1841 # with an async handshake
1842 def wait_and_refresh(_, %User{local: true} = a, %User{local: true} = b) do
1843 with %User{} = a <- get_cached_by_id(a.id),
1844 %User{} = b <- get_cached_by_id(b.id) do
1851 def wait_and_refresh(timeout, %User{} = a, %User{} = b) do
1852 with :ok <- :timer.sleep(timeout),
1853 %User{} = a <- get_cached_by_id(a.id),
1854 %User{} = b <- get_cached_by_id(b.id) do
1861 def parse_bio(bio) when is_binary(bio) and bio != "" do
1863 |> CommonUtils.format_input("text/plain", mentions_format: :full)
1867 def parse_bio(_), do: ""
1869 def parse_bio(bio, user) when is_binary(bio) and bio != "" do
1870 # TODO: get profile URLs other than user.ap_id
1871 profile_urls = [user.ap_id]
1874 |> CommonUtils.format_input("text/plain",
1875 mentions_format: :full,
1876 rel: &RelMe.maybe_put_rel_me(&1, profile_urls)
1881 def parse_bio(_, _), do: ""
1883 def tag(user_identifiers, tags) when is_list(user_identifiers) do
1884 Repo.transaction(fn ->
1885 for user_identifier <- user_identifiers, do: tag(user_identifier, tags)
1889 def tag(nickname, tags) when is_binary(nickname),
1890 do: tag(get_by_nickname(nickname), tags)
1892 def tag(%User{} = user, tags),
1893 do: update_tags(user, Enum.uniq((user.tags || []) ++ normalize_tags(tags)))
1895 def untag(user_identifiers, tags) when is_list(user_identifiers) do
1896 Repo.transaction(fn ->
1897 for user_identifier <- user_identifiers, do: untag(user_identifier, tags)
1901 def untag(nickname, tags) when is_binary(nickname),
1902 do: untag(get_by_nickname(nickname), tags)
1904 def untag(%User{} = user, tags),
1905 do: update_tags(user, (user.tags || []) -- normalize_tags(tags))
1907 defp update_tags(%User{} = user, new_tags) do
1908 {:ok, updated_user} =
1910 |> change(%{tags: new_tags})
1911 |> update_and_set_cache()
1916 defp normalize_tags(tags) do
1919 |> Enum.map(&String.downcase/1)
1922 defp local_nickname_regex do
1923 if Config.get([:instance, :extended_nickname_format]) do
1924 @extended_local_nickname_regex
1926 @strict_local_nickname_regex
1930 def local_nickname(nickname_or_mention) do
1933 |> String.split("@")
1937 def full_nickname(nickname_or_mention),
1938 do: String.trim_leading(nickname_or_mention, "@")
1940 def error_user(ap_id) do
1944 nickname: "erroruser@example.com",
1945 inserted_at: NaiveDateTime.utc_now()
1949 @spec all_superusers() :: [User.t()]
1950 def all_superusers do
1951 User.Query.build(%{super_users: true, local: true, deactivated: false})
1955 def muting_reblogs?(%User{} = user, %User{} = target) do
1956 UserRelationship.reblog_mute_exists?(user, target)
1959 def showing_reblogs?(%User{} = user, %User{} = target) do
1960 not muting_reblogs?(user, target)
1964 The function returns a query to get users with no activity for given interval of days.
1965 Inactive users are those who didn't read any notification, or had any activity where
1966 the user is the activity's actor, during `inactivity_threshold` days.
1967 Deactivated users will not appear in this list.
1971 iex> Pleroma.User.list_inactive_users()
1974 @spec list_inactive_users_query(integer()) :: Ecto.Query.t()
1975 def list_inactive_users_query(inactivity_threshold \\ 7) do
1976 negative_inactivity_threshold = -inactivity_threshold
1977 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1978 # Subqueries are not supported in `where` clauses, join gets too complicated.
1979 has_read_notifications =
1980 from(n in Pleroma.Notification,
1981 where: n.seen == true,
1983 having: max(n.updated_at) > datetime_add(^now, ^negative_inactivity_threshold, "day"),
1986 |> Pleroma.Repo.all()
1988 from(u in Pleroma.User,
1989 left_join: a in Pleroma.Activity,
1990 on: u.ap_id == a.actor,
1991 where: not is_nil(u.nickname),
1992 where: u.deactivated != ^true,
1993 where: u.id not in ^has_read_notifications,
1996 max(a.inserted_at) < datetime_add(^now, ^negative_inactivity_threshold, "day") or
1997 is_nil(max(a.inserted_at))
2002 Enable or disable email notifications for user
2006 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => false}}, "digest", true)
2007 Pleroma.User{email_notifications: %{"digest" => true}}
2009 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => true}}, "digest", false)
2010 Pleroma.User{email_notifications: %{"digest" => false}}
2012 @spec switch_email_notifications(t(), String.t(), boolean()) ::
2013 {:ok, t()} | {:error, Ecto.Changeset.t()}
2014 def switch_email_notifications(user, type, status) do
2015 User.update_email_notifications(user, %{type => status})
2019 Set `last_digest_emailed_at` value for the user to current time
2021 @spec touch_last_digest_emailed_at(t()) :: t()
2022 def touch_last_digest_emailed_at(user) do
2023 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
2025 {:ok, updated_user} =
2027 |> change(%{last_digest_emailed_at: now})
2028 |> update_and_set_cache()
2033 @spec toggle_confirmation(User.t()) :: {:ok, User.t()} | {:error, Changeset.t()}
2034 def toggle_confirmation(%User{} = user) do
2036 |> confirmation_changeset(need_confirmation: !user.confirmation_pending)
2037 |> update_and_set_cache()
2040 @spec toggle_confirmation([User.t()]) :: [{:ok, User.t()} | {:error, Changeset.t()}]
2041 def toggle_confirmation(users) do
2042 Enum.map(users, &toggle_confirmation/1)
2045 def get_mascot(%{mascot: %{} = mascot}) when not is_nil(mascot) do
2049 def get_mascot(%{mascot: mascot}) when is_nil(mascot) do
2050 # use instance-default
2051 config = Config.get([:assets, :mascots])
2052 default_mascot = Config.get([:assets, :default_mascot])
2053 mascot = Keyword.get(config, default_mascot)
2056 "id" => "default-mascot",
2057 "url" => mascot[:url],
2058 "preview_url" => mascot[:url],
2060 "mime_type" => mascot[:mime_type]
2065 def ensure_keys_present(%{keys: keys} = user) when not is_nil(keys), do: {:ok, user}
2067 def ensure_keys_present(%User{} = user) do
2068 with {:ok, pem} <- Keys.generate_rsa_pem() do
2070 |> cast(%{keys: pem}, [:keys])
2071 |> validate_required([:keys])
2072 |> update_and_set_cache()
2076 def get_ap_ids_by_nicknames(nicknames) do
2078 where: u.nickname in ^nicknames,
2084 defdelegate search(query, opts \\ []), to: User.Search
2086 defp put_password_hash(
2087 %Ecto.Changeset{valid?: true, changes: %{password: password}} = changeset
2089 change(changeset, password_hash: Pbkdf2.hash_pwd_salt(password))
2092 defp put_password_hash(changeset), do: changeset
2094 def is_internal_user?(%User{nickname: nil}), do: true
2095 def is_internal_user?(%User{local: true, nickname: "internal." <> _}), do: true
2096 def is_internal_user?(_), do: false
2098 # A hack because user delete activities have a fake id for whatever reason
2099 # TODO: Get rid of this
2100 def get_delivered_users_by_object_id("pleroma:fake_object_id"), do: []
2102 def get_delivered_users_by_object_id(object_id) do
2104 inner_join: delivery in assoc(u, :deliveries),
2105 where: delivery.object_id == ^object_id
2110 def change_email(user, email) do
2112 |> cast(%{email: email}, [:email])
2113 |> validate_required([:email])
2114 |> unique_constraint(:email)
2115 |> validate_format(:email, @email_regex)
2116 |> update_and_set_cache()
2119 # Internal function; public one is `deactivate/2`
2120 defp set_activation_status(user, deactivated) do
2122 |> cast(%{deactivated: deactivated}, [:deactivated])
2123 |> update_and_set_cache()
2126 def update_banner(user, banner) do
2128 |> cast(%{banner: banner}, [:banner])
2129 |> update_and_set_cache()
2132 def update_background(user, background) do
2134 |> cast(%{background: background}, [:background])
2135 |> update_and_set_cache()
2138 def roles(%{is_moderator: is_moderator, is_admin: is_admin}) do
2141 moderator: is_moderator
2145 def validate_fields(changeset, remote? \\ false) do
2146 limit_name = if remote?, do: :max_remote_account_fields, else: :max_account_fields
2147 limit = Config.get([:instance, limit_name], 0)
2150 |> validate_length(:fields, max: limit)
2151 |> validate_change(:fields, fn :fields, fields ->
2152 if Enum.all?(fields, &valid_field?/1) do
2160 defp valid_field?(%{"name" => name, "value" => value}) do
2161 name_limit = Config.get([:instance, :account_field_name_length], 255)
2162 value_limit = Config.get([:instance, :account_field_value_length], 255)
2164 is_binary(name) && is_binary(value) && String.length(name) <= name_limit &&
2165 String.length(value) <= value_limit
2168 defp valid_field?(_), do: false
2170 defp truncate_field(%{"name" => name, "value" => value}) do
2172 String.split_at(name, Config.get([:instance, :account_field_name_length], 255))
2175 String.split_at(value, Config.get([:instance, :account_field_value_length], 255))
2177 %{"name" => name, "value" => value}
2180 def admin_api_update(user, params) do
2187 |> update_and_set_cache()
2190 @doc "Signs user out of all applications"
2191 def global_sign_out(user) do
2192 OAuth.Authorization.delete_user_authorizations(user)
2193 OAuth.Token.delete_user_tokens(user)
2196 def mascot_update(user, url) do
2198 |> cast(%{mascot: url}, [:mascot])
2199 |> validate_required([:mascot])
2200 |> update_and_set_cache()
2203 def mastodon_settings_update(user, settings) do
2205 |> cast(%{mastofe_settings: settings}, [:mastofe_settings])
2206 |> validate_required([:mastofe_settings])
2207 |> update_and_set_cache()
2210 @spec confirmation_changeset(User.t(), keyword()) :: Changeset.t()
2211 def confirmation_changeset(user, need_confirmation: need_confirmation?) do
2213 if need_confirmation? do
2215 confirmation_pending: true,
2216 confirmation_token: :crypto.strong_rand_bytes(32) |> Base.url_encode64()
2220 confirmation_pending: false,
2221 confirmation_token: nil
2225 cast(user, params, [:confirmation_pending, :confirmation_token])
2228 @spec approval_changeset(User.t(), keyword()) :: Changeset.t()
2229 def approval_changeset(user, need_approval: need_approval?) do
2230 params = if need_approval?, do: %{approval_pending: true}, else: %{approval_pending: false}
2231 cast(user, params, [:approval_pending])
2234 def add_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2235 if id not in user.pinned_activities do
2236 max_pinned_statuses = Config.get([:instance, :max_pinned_statuses], 0)
2237 params = %{pinned_activities: user.pinned_activities ++ [id]}
2240 |> cast(params, [:pinned_activities])
2241 |> validate_length(:pinned_activities,
2242 max: max_pinned_statuses,
2243 message: "You have already pinned the maximum number of statuses"
2248 |> update_and_set_cache()
2251 def remove_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2252 params = %{pinned_activities: List.delete(user.pinned_activities, id)}
2255 |> cast(params, [:pinned_activities])
2256 |> update_and_set_cache()
2259 def update_email_notifications(user, settings) do
2260 email_notifications =
2261 user.email_notifications
2262 |> Map.merge(settings)
2263 |> Map.take(["digest"])
2265 params = %{email_notifications: email_notifications}
2266 fields = [:email_notifications]
2269 |> cast(params, fields)
2270 |> validate_required(fields)
2271 |> update_and_set_cache()
2274 defp set_domain_blocks(user, domain_blocks) do
2275 params = %{domain_blocks: domain_blocks}
2278 |> cast(params, [:domain_blocks])
2279 |> validate_required([:domain_blocks])
2280 |> update_and_set_cache()
2283 def block_domain(user, domain_blocked) do
2284 set_domain_blocks(user, Enum.uniq([domain_blocked | user.domain_blocks]))
2287 def unblock_domain(user, domain_blocked) do
2288 set_domain_blocks(user, List.delete(user.domain_blocks, domain_blocked))
2291 @spec add_to_block(User.t(), User.t()) ::
2292 {:ok, UserRelationship.t()} | {:error, Ecto.Changeset.t()}
2293 defp add_to_block(%User{} = user, %User{} = blocked) do
2294 UserRelationship.create_block(user, blocked)
2297 @spec add_to_block(User.t(), User.t()) ::
2298 {:ok, UserRelationship.t()} | {:ok, nil} | {:error, Ecto.Changeset.t()}
2299 defp remove_from_block(%User{} = user, %User{} = blocked) do
2300 UserRelationship.delete_block(user, blocked)
2303 defp add_to_mutes(%User{} = user, %User{} = muted_user, notifications?) do
2304 with {:ok, user_mute} <- UserRelationship.create_mute(user, muted_user),
2305 {:ok, user_notification_mute} <-
2306 (notifications? && UserRelationship.create_notification_mute(user, muted_user)) ||
2308 {:ok, Enum.filter([user_mute, user_notification_mute], & &1)}
2312 defp remove_from_mutes(user, %User{} = muted_user) do
2313 with {:ok, user_mute} <- UserRelationship.delete_mute(user, muted_user),
2314 {:ok, user_notification_mute} <-
2315 UserRelationship.delete_notification_mute(user, muted_user) do
2316 {:ok, [user_mute, user_notification_mute]}
2320 def set_invisible(user, invisible) do
2321 params = %{invisible: invisible}
2324 |> cast(params, [:invisible])
2325 |> validate_required([:invisible])
2326 |> update_and_set_cache()
2329 def sanitize_html(%User{} = user) do
2330 sanitize_html(user, nil)
2333 # User data that mastodon isn't filtering (treated as plaintext):
2336 def sanitize_html(%User{} = user, filter) do
2338 Enum.map(user.fields, fn %{"name" => name, "value" => value} ->
2341 "value" => HTML.filter_tags(value, Pleroma.HTML.Scrubber.LinksOnly)
2346 |> Map.put(:bio, HTML.filter_tags(user.bio, filter))
2347 |> Map.put(:fields, fields)