1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.User do
10 import Ecto, only: [assoc: 2]
14 alias Pleroma.Activity
16 alias Pleroma.Conversation.Participation
17 alias Pleroma.Delivery
18 alias Pleroma.FollowingRelationship
21 alias Pleroma.Notification
23 alias Pleroma.Registration
25 alias Pleroma.RepoStreamer
27 alias Pleroma.UserRelationship
29 alias Pleroma.Web.ActivityPub.ActivityPub
30 alias Pleroma.Web.ActivityPub.Utils
31 alias Pleroma.Web.CommonAPI
32 alias Pleroma.Web.CommonAPI.Utils, as: CommonUtils
33 alias Pleroma.Web.OAuth
34 alias Pleroma.Web.RelMe
35 alias Pleroma.Workers.BackgroundWorker
39 @type t :: %__MODULE__{}
40 @type account_status :: :active | :deactivated | :password_reset_pending | :confirmation_pending
41 @primary_key {:id, FlakeId.Ecto.CompatType, autogenerate: true}
43 # credo:disable-for-next-line Credo.Check.Readability.MaxLineLength
44 @email_regex ~r/^[a-zA-Z0-9.!#$%&'*+\/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/
46 @strict_local_nickname_regex ~r/^[a-zA-Z\d]+$/
47 @extended_local_nickname_regex ~r/^[a-zA-Z\d_-]+$/
49 # AP ID user relationships (blocks, mutes etc.)
50 # Format: [rel_type: [outgoing_rel: :outgoing_rel_target, incoming_rel: :incoming_rel_source]]
51 @user_relationships_config [
53 blocker_blocks: :blocked_users,
54 blockee_blocks: :blocker_users
57 muter_mutes: :muted_users,
58 mutee_mutes: :muter_users
61 reblog_muter_mutes: :reblog_muted_users,
62 reblog_mutee_mutes: :reblog_muter_users
65 notification_muter_mutes: :notification_muted_users,
66 notification_mutee_mutes: :notification_muter_users
68 # Note: `inverse_subscription` relationship is inverse: subscriber acts as relationship target
69 inverse_subscription: [
70 subscribee_subscriptions: :subscriber_users,
71 subscriber_subscriptions: :subscribee_users
77 field(:email, :string)
79 field(:nickname, :string)
80 field(:password_hash, :string)
81 field(:password, :string, virtual: true)
82 field(:password_confirmation, :string, virtual: true)
84 field(:ap_id, :string)
86 field(:local, :boolean, default: true)
87 field(:follower_address, :string)
88 field(:following_address, :string)
89 field(:search_rank, :float, virtual: true)
90 field(:search_type, :integer, virtual: true)
91 field(:tags, {:array, :string}, default: [])
92 field(:last_refreshed_at, :naive_datetime_usec)
93 field(:last_digest_emailed_at, :naive_datetime)
94 field(:banner, :map, default: %{})
95 field(:background, :map, default: %{})
96 field(:source_data, :map, default: %{})
97 field(:note_count, :integer, default: 0)
98 field(:follower_count, :integer, default: 0)
99 field(:following_count, :integer, default: 0)
100 field(:locked, :boolean, default: false)
101 field(:confirmation_pending, :boolean, default: false)
102 field(:password_reset_pending, :boolean, default: false)
103 field(:confirmation_token, :string, default: nil)
104 field(:default_scope, :string, default: "public")
105 field(:domain_blocks, {:array, :string}, default: [])
106 field(:deactivated, :boolean, default: false)
107 field(:no_rich_text, :boolean, default: false)
108 field(:ap_enabled, :boolean, default: false)
109 field(:is_moderator, :boolean, default: false)
110 field(:is_admin, :boolean, default: false)
111 field(:show_role, :boolean, default: true)
112 field(:settings, :map, default: nil)
113 field(:magic_key, :string, default: nil)
114 field(:uri, :string, default: nil)
115 field(:hide_followers_count, :boolean, default: false)
116 field(:hide_follows_count, :boolean, default: false)
117 field(:hide_followers, :boolean, default: false)
118 field(:hide_follows, :boolean, default: false)
119 field(:hide_favorites, :boolean, default: true)
120 field(:unread_conversation_count, :integer, default: 0)
121 field(:pinned_activities, {:array, :string}, default: [])
122 field(:email_notifications, :map, default: %{"digest" => false})
123 field(:mascot, :map, default: nil)
124 field(:emoji, {:array, :map}, default: [])
125 field(:pleroma_settings_store, :map, default: %{})
126 field(:fields, {:array, :map}, default: [])
127 field(:raw_fields, {:array, :map}, default: [])
128 field(:discoverable, :boolean, default: false)
129 field(:invisible, :boolean, default: false)
130 field(:allow_following_move, :boolean, default: true)
131 field(:skip_thread_containment, :boolean, default: false)
132 field(:actor_type, :string, default: "Person")
133 field(:also_known_as, {:array, :string}, default: [])
136 :notification_settings,
137 Pleroma.User.NotificationSetting,
141 has_many(:notifications, Notification)
142 has_many(:registrations, Registration)
143 has_many(:deliveries, Delivery)
145 has_many(:outgoing_relationships, UserRelationship, foreign_key: :source_id)
146 has_many(:incoming_relationships, UserRelationship, foreign_key: :target_id)
148 for {relationship_type,
150 {outgoing_relation, outgoing_relation_target},
151 {incoming_relation, incoming_relation_source}
152 ]} <- @user_relationships_config do
153 # Definitions of `has_many` relations: :blocker_blocks, :muter_mutes, :reblog_muter_mutes,
154 # :notification_muter_mutes, :subscribee_subscriptions
155 has_many(outgoing_relation, UserRelationship,
156 foreign_key: :source_id,
157 where: [relationship_type: relationship_type]
160 # Definitions of `has_many` relations: :blockee_blocks, :mutee_mutes, :reblog_mutee_mutes,
161 # :notification_mutee_mutes, :subscriber_subscriptions
162 has_many(incoming_relation, UserRelationship,
163 foreign_key: :target_id,
164 where: [relationship_type: relationship_type]
167 # Definitions of `has_many` relations: :blocked_users, :muted_users, :reblog_muted_users,
168 # :notification_muted_users, :subscriber_users
169 has_many(outgoing_relation_target, through: [outgoing_relation, :target])
171 # Definitions of `has_many` relations: :blocker_users, :muter_users, :reblog_muter_users,
172 # :notification_muter_users, :subscribee_users
173 has_many(incoming_relation_source, through: [incoming_relation, :source])
176 # `:blocks` is deprecated (replaced with `blocked_users` relation)
177 field(:blocks, {:array, :string}, default: [])
178 # `:mutes` is deprecated (replaced with `muted_users` relation)
179 field(:mutes, {:array, :string}, default: [])
180 # `:muted_reblogs` is deprecated (replaced with `reblog_muted_users` relation)
181 field(:muted_reblogs, {:array, :string}, default: [])
182 # `:muted_notifications` is deprecated (replaced with `notification_muted_users` relation)
183 field(:muted_notifications, {:array, :string}, default: [])
184 # `:subscribers` is deprecated (replaced with `subscriber_users` relation)
185 field(:subscribers, {:array, :string}, default: [])
190 for {_relationship_type, [{_outgoing_relation, outgoing_relation_target}, _]} <-
191 @user_relationships_config do
192 # `def blocked_users_relation/2`, `def muted_users_relation/2`,
193 # `def reblog_muted_users_relation/2`, `def notification_muted_users/2`,
194 # `def subscriber_users/2`
195 def unquote(:"#{outgoing_relation_target}_relation")(user, restrict_deactivated? \\ false) do
196 target_users_query = assoc(user, unquote(outgoing_relation_target))
198 if restrict_deactivated? do
199 restrict_deactivated(target_users_query)
205 # `def blocked_users/2`, `def muted_users/2`, `def reblog_muted_users/2`,
206 # `def notification_muted_users/2`, `def subscriber_users/2`
207 def unquote(outgoing_relation_target)(user, restrict_deactivated? \\ false) do
209 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
211 restrict_deactivated?
216 # `def blocked_users_ap_ids/2`, `def muted_users_ap_ids/2`, `def reblog_muted_users_ap_ids/2`,
217 # `def notification_muted_users_ap_ids/2`, `def subscriber_users_ap_ids/2`
218 def unquote(:"#{outgoing_relation_target}_ap_ids")(user, restrict_deactivated? \\ false) do
220 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
222 restrict_deactivated?
224 |> select([u], u.ap_id)
230 Dumps Flake Id to SQL-compatible format (16-byte UUID).
231 E.g. "9pQtDGXuq4p3VlcJEm" -> <<0, 0, 1, 110, 179, 218, 42, 92, 213, 41, 44, 227, 95, 213, 0, 0>>
233 def binary_id(source_id) when is_binary(source_id) do
234 with {:ok, dumped_id} <- FlakeId.Ecto.CompatType.dump(source_id) do
241 def binary_id(source_ids) when is_list(source_ids) do
242 Enum.map(source_ids, &binary_id/1)
245 def binary_id(%User{} = user), do: binary_id(user.id)
247 @doc "Returns status account"
248 @spec account_status(User.t()) :: account_status()
249 def account_status(%User{deactivated: true}), do: :deactivated
250 def account_status(%User{password_reset_pending: true}), do: :password_reset_pending
252 def account_status(%User{confirmation_pending: true}) do
253 case Config.get([:instance, :account_activation_required]) do
254 true -> :confirmation_pending
259 def account_status(%User{}), do: :active
261 @spec visible_for?(User.t(), User.t() | nil) :: boolean()
262 def visible_for?(user, for_user \\ nil)
264 def visible_for?(%User{invisible: true}, _), do: false
266 def visible_for?(%User{id: user_id}, %User{id: user_id}), do: true
268 def visible_for?(%User{local: local} = user, nil) do
274 if Config.get([:restrict_unauthenticated, :profiles, cfg_key]),
276 else: account_status(user) == :active
279 def visible_for?(%User{} = user, for_user) do
280 account_status(user) == :active || superuser?(for_user)
283 def visible_for?(_, _), do: false
285 @spec superuser?(User.t()) :: boolean()
286 def superuser?(%User{local: true, is_admin: true}), do: true
287 def superuser?(%User{local: true, is_moderator: true}), do: true
288 def superuser?(_), do: false
290 @spec invisible?(User.t()) :: boolean()
291 def invisible?(%User{invisible: true}), do: true
292 def invisible?(_), do: false
294 def avatar_url(user, options \\ []) do
296 %{"url" => [%{"href" => href} | _]} -> href
297 _ -> !options[:no_default] && "#{Web.base_url()}/images/avi.png"
301 def banner_url(user, options \\ []) do
303 %{"url" => [%{"href" => href} | _]} -> href
304 _ -> !options[:no_default] && "#{Web.base_url()}/images/banner.png"
308 def profile_url(%User{source_data: %{"url" => url}}), do: url
309 def profile_url(%User{ap_id: ap_id}), do: ap_id
310 def profile_url(_), do: nil
312 def ap_id(%User{nickname: nickname}), do: "#{Web.base_url()}/users/#{nickname}"
314 def ap_followers(%User{follower_address: fa}) when is_binary(fa), do: fa
315 def ap_followers(%User{} = user), do: "#{ap_id(user)}/followers"
317 @spec ap_following(User.t()) :: Sring.t()
318 def ap_following(%User{following_address: fa}) when is_binary(fa), do: fa
319 def ap_following(%User{} = user), do: "#{ap_id(user)}/following"
321 @spec restrict_deactivated(Ecto.Query.t()) :: Ecto.Query.t()
322 def restrict_deactivated(query) do
323 from(u in query, where: u.deactivated != ^true)
326 defdelegate following_count(user), to: FollowingRelationship
328 defp truncate_fields_param(params) do
329 if Map.has_key?(params, :fields) do
330 Map.put(params, :fields, Enum.map(params[:fields], &truncate_field/1))
336 defp truncate_if_exists(params, key, max_length) do
337 if Map.has_key?(params, key) and is_binary(params[key]) do
338 {value, _chopped} = String.split_at(params[key], max_length)
339 Map.put(params, key, value)
345 def remote_user_creation(params) do
346 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
347 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
351 |> truncate_if_exists(:name, name_limit)
352 |> truncate_if_exists(:bio, bio_limit)
353 |> truncate_fields_param()
373 :hide_followers_count,
384 |> validate_required([:name, :ap_id])
385 |> unique_constraint(:nickname)
386 |> validate_format(:nickname, @email_regex)
387 |> validate_length(:bio, max: bio_limit)
388 |> validate_length(:name, max: name_limit)
389 |> validate_fields(true)
391 case params[:source_data] do
392 %{"followers" => followers, "following" => following} ->
394 |> put_change(:follower_address, followers)
395 |> put_change(:following_address, following)
398 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
399 put_change(changeset, :follower_address, followers)
403 def update_changeset(struct, params \\ %{}) do
404 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
405 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
420 :hide_followers_count,
423 :allow_following_move,
426 :skip_thread_containment,
429 :pleroma_settings_store,
435 |> unique_constraint(:nickname)
436 |> validate_format(:nickname, local_nickname_regex())
437 |> validate_length(:bio, max: bio_limit)
438 |> validate_length(:name, min: 1, max: name_limit)
440 |> put_change_if_present(:bio, &{:ok, parse_bio(&1, struct)})
441 |> put_change_if_present(:avatar, &put_upload(&1, :avatar))
442 |> put_change_if_present(:banner, &put_upload(&1, :banner))
443 |> put_change_if_present(:background, &put_upload(&1, :background))
444 |> put_change_if_present(
445 :pleroma_settings_store,
446 &{:ok, Map.merge(struct.pleroma_settings_store, &1)}
448 |> validate_fields(false)
451 defp put_fields(changeset) do
452 if raw_fields = get_change(changeset, :raw_fields) do
455 |> Enum.filter(fn %{"name" => n} -> n != "" end)
459 |> Enum.map(fn f -> Map.update!(f, "value", &AutoLinker.link(&1)) end)
462 |> put_change(:raw_fields, raw_fields)
463 |> put_change(:fields, fields)
469 defp put_change_if_present(changeset, map_field, value_function) do
470 if value = get_change(changeset, map_field) do
471 with {:ok, new_value} <- value_function.(value) do
472 put_change(changeset, map_field, new_value)
481 defp put_upload(value, type) do
482 with %Plug.Upload{} <- value,
483 {:ok, object} <- ActivityPub.upload(value, type: type) do
488 def upgrade_changeset(struct, params \\ %{}, remote? \\ false) do
489 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
490 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
492 params = Map.put(params, :last_refreshed_at, NaiveDateTime.utc_now())
494 params = if remote?, do: truncate_fields_param(params), else: params
516 :allow_following_move,
518 :hide_followers_count,
524 |> unique_constraint(:nickname)
525 |> validate_format(:nickname, local_nickname_regex())
526 |> validate_length(:bio, max: bio_limit)
527 |> validate_length(:name, max: name_limit)
528 |> validate_fields(remote?)
531 def update_as_admin_changeset(struct, params) do
533 |> update_changeset(params)
534 |> cast(params, [:email])
535 |> delete_change(:also_known_as)
536 |> unique_constraint(:email)
537 |> validate_format(:email, @email_regex)
540 @spec update_as_admin(%User{}, map) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
541 def update_as_admin(user, params) do
542 params = Map.put(params, "password_confirmation", params["password"])
543 changeset = update_as_admin_changeset(user, params)
545 if params["password"] do
546 reset_password(user, changeset, params)
548 User.update_and_set_cache(changeset)
552 def password_update_changeset(struct, params) do
554 |> cast(params, [:password, :password_confirmation])
555 |> validate_required([:password, :password_confirmation])
556 |> validate_confirmation(:password)
557 |> put_password_hash()
558 |> put_change(:password_reset_pending, false)
561 @spec reset_password(User.t(), map) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
562 def reset_password(%User{} = user, params) do
563 reset_password(user, user, params)
566 def reset_password(%User{id: user_id} = user, struct, params) do
569 |> Multi.update(:user, password_update_changeset(struct, params))
570 |> Multi.delete_all(:tokens, OAuth.Token.Query.get_by_user(user_id))
571 |> Multi.delete_all(:auth, OAuth.Authorization.delete_by_user_query(user))
573 case Repo.transaction(multi) do
574 {:ok, %{user: user} = _} -> set_cache(user)
575 {:error, _, changeset, _} -> {:error, changeset}
579 def update_password_reset_pending(user, value) do
582 |> put_change(:password_reset_pending, value)
583 |> update_and_set_cache()
586 def force_password_reset_async(user) do
587 BackgroundWorker.enqueue("force_password_reset", %{"user_id" => user.id})
590 @spec force_password_reset(User.t()) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
591 def force_password_reset(user), do: update_password_reset_pending(user, true)
593 def register_changeset(struct, params \\ %{}, opts \\ []) do
594 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
595 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
598 if is_nil(opts[:need_confirmation]) do
599 Pleroma.Config.get([:instance, :account_activation_required])
601 opts[:need_confirmation]
605 |> confirmation_changeset(need_confirmation: need_confirmation?)
606 |> cast(params, [:bio, :email, :name, :nickname, :password, :password_confirmation])
607 |> validate_required([:name, :nickname, :password, :password_confirmation])
608 |> validate_confirmation(:password)
609 |> unique_constraint(:email)
610 |> unique_constraint(:nickname)
611 |> validate_exclusion(:nickname, Pleroma.Config.get([User, :restricted_nicknames]))
612 |> validate_format(:nickname, local_nickname_regex())
613 |> validate_format(:email, @email_regex)
614 |> validate_length(:bio, max: bio_limit)
615 |> validate_length(:name, min: 1, max: name_limit)
616 |> maybe_validate_required_email(opts[:external])
619 |> unique_constraint(:ap_id)
620 |> put_following_and_follower_address()
623 def maybe_validate_required_email(changeset, true), do: changeset
625 def maybe_validate_required_email(changeset, _) do
626 if Pleroma.Config.get([:instance, :account_activation_required]) do
627 validate_required(changeset, [:email])
633 defp put_ap_id(changeset) do
634 ap_id = ap_id(%User{nickname: get_field(changeset, :nickname)})
635 put_change(changeset, :ap_id, ap_id)
638 defp put_following_and_follower_address(changeset) do
639 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
642 |> put_change(:follower_address, followers)
645 defp autofollow_users(user) do
646 candidates = Pleroma.Config.get([:instance, :autofollowed_nicknames])
649 User.Query.build(%{nickname: candidates, local: true, deactivated: false})
652 follow_all(user, autofollowed_users)
655 @doc "Inserts provided changeset, performs post-registration actions (confirmation email sending etc.)"
656 def register(%Ecto.Changeset{} = changeset) do
657 with {:ok, user} <- Repo.insert(changeset) do
658 post_register_action(user)
662 def post_register_action(%User{} = user) do
663 with {:ok, user} <- autofollow_users(user),
664 {:ok, user} <- set_cache(user),
665 {:ok, _} <- User.WelcomeMessage.post_welcome_message_to_user(user),
666 {:ok, _} <- try_send_confirmation_email(user) do
671 def try_send_confirmation_email(%User{} = user) do
672 if user.confirmation_pending &&
673 Pleroma.Config.get([:instance, :account_activation_required]) do
675 |> Pleroma.Emails.UserEmail.account_confirmation_email()
676 |> Pleroma.Emails.Mailer.deliver_async()
684 def try_send_confirmation_email(users) do
685 Enum.each(users, &try_send_confirmation_email/1)
688 def needs_update?(%User{local: true}), do: false
690 def needs_update?(%User{local: false, last_refreshed_at: nil}), do: true
692 def needs_update?(%User{local: false} = user) do
693 NaiveDateTime.diff(NaiveDateTime.utc_now(), user.last_refreshed_at) >= 86_400
696 def needs_update?(_), do: true
698 @spec maybe_direct_follow(User.t(), User.t()) :: {:ok, User.t()} | {:error, String.t()}
699 def maybe_direct_follow(%User{} = follower, %User{local: true, locked: true} = followed) do
700 follow(follower, followed, "pending")
703 def maybe_direct_follow(%User{} = follower, %User{local: true} = followed) do
704 follow(follower, followed)
707 def maybe_direct_follow(%User{} = follower, %User{} = followed) do
708 if not ap_enabled?(followed) do
709 follow(follower, followed)
715 @doc "A mass follow for local users. Respects blocks in both directions but does not create activities."
716 @spec follow_all(User.t(), list(User.t())) :: {atom(), User.t()}
717 def follow_all(follower, followeds) do
719 |> Enum.reject(fn followed -> blocks?(follower, followed) || blocks?(followed, follower) end)
720 |> Enum.each(&follow(follower, &1, "accept"))
725 defdelegate following(user), to: FollowingRelationship
727 def follow(%User{} = follower, %User{} = followed, state \\ "accept") do
728 deny_follow_blocked = Pleroma.Config.get([:user, :deny_follow_blocked])
731 followed.deactivated ->
732 {:error, "Could not follow user: #{followed.nickname} is deactivated."}
734 deny_follow_blocked and blocks?(followed, follower) ->
735 {:error, "Could not follow user: #{followed.nickname} blocked you."}
738 FollowingRelationship.follow(follower, followed, state)
740 {:ok, _} = update_follower_count(followed)
743 |> update_following_count()
748 def unfollow(%User{ap_id: ap_id}, %User{ap_id: ap_id}) do
749 {:error, "Not subscribed!"}
752 def unfollow(%User{} = follower, %User{} = followed) do
753 case get_follow_state(follower, followed) do
754 state when state in ["accept", "pending"] ->
755 FollowingRelationship.unfollow(follower, followed)
756 {:ok, followed} = update_follower_count(followed)
760 |> update_following_count()
763 {:ok, follower, Utils.fetch_latest_follow(follower, followed)}
766 {:error, "Not subscribed!"}
770 defdelegate following?(follower, followed), to: FollowingRelationship
772 def get_follow_state(%User{} = follower, %User{} = following) do
773 following_relationship = FollowingRelationship.get(follower, following)
774 get_follow_state(follower, following, following_relationship)
777 def get_follow_state(
780 following_relationship
782 case {following_relationship, following.local} do
784 case Utils.fetch_latest_follow(follower, following) do
785 %{data: %{"state" => state}} when state in ["pending", "accept"] -> state
789 {%{state: state}, _} ->
797 def locked?(%User{} = user) do
802 Repo.get_by(User, id: id)
805 def get_by_ap_id(ap_id) do
806 Repo.get_by(User, ap_id: ap_id)
809 def get_all_by_ap_id(ap_ids) do
810 from(u in __MODULE__,
811 where: u.ap_id in ^ap_ids
816 def get_all_by_ids(ids) do
817 from(u in __MODULE__, where: u.id in ^ids)
821 # This is mostly an SPC migration fix. This guesses the user nickname by taking the last part
822 # of the ap_id and the domain and tries to get that user
823 def get_by_guessed_nickname(ap_id) do
824 domain = URI.parse(ap_id).host
825 name = List.last(String.split(ap_id, "/"))
826 nickname = "#{name}@#{domain}"
828 get_cached_by_nickname(nickname)
831 def set_cache({:ok, user}), do: set_cache(user)
832 def set_cache({:error, err}), do: {:error, err}
834 def set_cache(%User{} = user) do
835 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
836 Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
840 def update_and_set_cache(struct, params) do
842 |> update_changeset(params)
843 |> update_and_set_cache()
846 def update_and_set_cache(changeset) do
847 with {:ok, user} <- Repo.update(changeset, stale_error_field: :id) do
852 def invalidate_cache(user) do
853 Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
854 Cachex.del(:user_cache, "nickname:#{user.nickname}")
857 @spec get_cached_by_ap_id(String.t()) :: User.t() | nil
858 def get_cached_by_ap_id(ap_id) do
859 key = "ap_id:#{ap_id}"
861 with {:ok, nil} <- Cachex.get(:user_cache, key),
862 user when not is_nil(user) <- get_by_ap_id(ap_id),
863 {:ok, true} <- Cachex.put(:user_cache, key, user) do
871 def get_cached_by_id(id) do
875 Cachex.fetch!(:user_cache, key, fn _ ->
879 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
880 {:commit, user.ap_id}
886 get_cached_by_ap_id(ap_id)
889 def get_cached_by_nickname(nickname) do
890 key = "nickname:#{nickname}"
892 Cachex.fetch!(:user_cache, key, fn ->
893 case get_or_fetch_by_nickname(nickname) do
894 {:ok, user} -> {:commit, user}
895 {:error, _error} -> {:ignore, nil}
900 def get_cached_by_nickname_or_id(nickname_or_id, opts \\ []) do
901 restrict_to_local = Pleroma.Config.get([:instance, :limit_to_local_content])
904 is_integer(nickname_or_id) or FlakeId.flake_id?(nickname_or_id) ->
905 get_cached_by_id(nickname_or_id) || get_cached_by_nickname(nickname_or_id)
907 restrict_to_local == false or not String.contains?(nickname_or_id, "@") ->
908 get_cached_by_nickname(nickname_or_id)
910 restrict_to_local == :unauthenticated and match?(%User{}, opts[:for]) ->
911 get_cached_by_nickname(nickname_or_id)
918 def get_by_nickname(nickname) do
919 Repo.get_by(User, nickname: nickname) ||
920 if Regex.match?(~r(@#{Pleroma.Web.Endpoint.host()})i, nickname) do
921 Repo.get_by(User, nickname: local_nickname(nickname))
925 def get_by_email(email), do: Repo.get_by(User, email: email)
927 def get_by_nickname_or_email(nickname_or_email) do
928 get_by_nickname(nickname_or_email) || get_by_email(nickname_or_email)
931 def fetch_by_nickname(nickname), do: ActivityPub.make_user_from_nickname(nickname)
933 def get_or_fetch_by_nickname(nickname) do
934 with %User{} = user <- get_by_nickname(nickname) do
938 with [_nick, _domain] <- String.split(nickname, "@"),
939 {:ok, user} <- fetch_by_nickname(nickname) do
942 _e -> {:error, "not found " <> nickname}
947 @spec get_followers_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
948 def get_followers_query(%User{} = user, nil) do
949 User.Query.build(%{followers: user, deactivated: false})
952 def get_followers_query(user, page) do
954 |> get_followers_query(nil)
955 |> User.Query.paginate(page, 20)
958 @spec get_followers_query(User.t()) :: Ecto.Query.t()
959 def get_followers_query(user), do: get_followers_query(user, nil)
961 @spec get_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
962 def get_followers(user, page \\ nil) do
964 |> get_followers_query(page)
968 @spec get_external_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
969 def get_external_followers(user, page \\ nil) do
971 |> get_followers_query(page)
972 |> User.Query.build(%{external: true})
976 def get_followers_ids(user, page \\ nil) do
978 |> get_followers_query(page)
983 @spec get_friends_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
984 def get_friends_query(%User{} = user, nil) do
985 User.Query.build(%{friends: user, deactivated: false})
988 def get_friends_query(user, page) do
990 |> get_friends_query(nil)
991 |> User.Query.paginate(page, 20)
994 @spec get_friends_query(User.t()) :: Ecto.Query.t()
995 def get_friends_query(user), do: get_friends_query(user, nil)
997 def get_friends(user, page \\ nil) do
999 |> get_friends_query(page)
1003 def get_friends_ap_ids(user) do
1005 |> get_friends_query(nil)
1006 |> select([u], u.ap_id)
1010 def get_friends_ids(user, page \\ nil) do
1012 |> get_friends_query(page)
1013 |> select([u], u.id)
1017 defdelegate get_follow_requests(user), to: FollowingRelationship
1019 def increase_note_count(%User{} = user) do
1021 |> where(id: ^user.id)
1022 |> update([u], inc: [note_count: 1])
1024 |> Repo.update_all([])
1026 {1, [user]} -> set_cache(user)
1031 def decrease_note_count(%User{} = user) do
1033 |> where(id: ^user.id)
1036 note_count: fragment("greatest(0, note_count - 1)")
1040 |> Repo.update_all([])
1042 {1, [user]} -> set_cache(user)
1047 def update_note_count(%User{} = user, note_count \\ nil) do
1052 where: fragment("?->>'actor' = ? and ?->>'type' = 'Note'", a.data, ^user.ap_id, a.data),
1058 |> cast(%{note_count: note_count}, [:note_count])
1059 |> update_and_set_cache()
1062 @spec maybe_fetch_follow_information(User.t()) :: User.t()
1063 def maybe_fetch_follow_information(user) do
1064 with {:ok, user} <- fetch_follow_information(user) do
1068 Logger.error("Follower/Following counter update for #{user.ap_id} failed.\n#{inspect(e)}")
1074 def fetch_follow_information(user) do
1075 with {:ok, info} <- ActivityPub.fetch_follow_information_for_user(user) do
1077 |> follow_information_changeset(info)
1078 |> update_and_set_cache()
1082 defp follow_information_changeset(user, params) do
1089 :hide_followers_count,
1094 def update_follower_count(%User{} = user) do
1095 if user.local or !Pleroma.Config.get([:instance, :external_user_synchronization]) do
1096 follower_count_query =
1097 User.Query.build(%{followers: user, deactivated: false})
1098 |> select([u], %{count: count(u.id)})
1101 |> where(id: ^user.id)
1102 |> join(:inner, [u], s in subquery(follower_count_query))
1104 set: [follower_count: s.count]
1107 |> Repo.update_all([])
1109 {1, [user]} -> set_cache(user)
1113 {:ok, maybe_fetch_follow_information(user)}
1117 @spec update_following_count(User.t()) :: User.t()
1118 def update_following_count(%User{local: false} = user) do
1119 if Pleroma.Config.get([:instance, :external_user_synchronization]) do
1120 maybe_fetch_follow_information(user)
1126 def update_following_count(%User{local: true} = user) do
1127 following_count = FollowingRelationship.following_count(user)
1130 |> follow_information_changeset(%{following_count: following_count})
1134 def set_unread_conversation_count(%User{local: true} = user) do
1135 unread_query = Participation.unread_conversation_count_for_user(user)
1138 |> join(:inner, [u], p in subquery(unread_query))
1140 set: [unread_conversation_count: p.count]
1142 |> where([u], u.id == ^user.id)
1144 |> Repo.update_all([])
1146 {1, [user]} -> set_cache(user)
1151 def set_unread_conversation_count(user), do: {:ok, user}
1153 def increment_unread_conversation_count(conversation, %User{local: true} = user) do
1155 Participation.unread_conversation_count_for_user(user)
1156 |> where([p], p.conversation_id == ^conversation.id)
1159 |> join(:inner, [u], p in subquery(unread_query))
1161 inc: [unread_conversation_count: 1]
1163 |> where([u], u.id == ^user.id)
1164 |> where([u, p], p.count == 0)
1166 |> Repo.update_all([])
1168 {1, [user]} -> set_cache(user)
1173 def increment_unread_conversation_count(_, user), do: {:ok, user}
1175 @spec get_users_from_set([String.t()], boolean()) :: [User.t()]
1176 def get_users_from_set(ap_ids, local_only \\ true) do
1177 criteria = %{ap_id: ap_ids, deactivated: false}
1178 criteria = if local_only, do: Map.put(criteria, :local, true), else: criteria
1180 User.Query.build(criteria)
1184 @spec get_recipients_from_activity(Activity.t()) :: [User.t()]
1185 def get_recipients_from_activity(%Activity{recipients: to}) do
1186 User.Query.build(%{recipients_from_activity: to, local: true, deactivated: false})
1190 @spec mute(User.t(), User.t(), boolean()) ::
1191 {:ok, list(UserRelationship.t())} | {:error, String.t()}
1192 def mute(%User{} = muter, %User{} = mutee, notifications? \\ true) do
1193 add_to_mutes(muter, mutee, notifications?)
1196 def unmute(%User{} = muter, %User{} = mutee) do
1197 remove_from_mutes(muter, mutee)
1200 def subscribe(%User{} = subscriber, %User{} = target) do
1201 deny_follow_blocked = Pleroma.Config.get([:user, :deny_follow_blocked])
1203 if blocks?(target, subscriber) and deny_follow_blocked do
1204 {:error, "Could not subscribe: #{target.nickname} is blocking you"}
1206 # Note: the relationship is inverse: subscriber acts as relationship target
1207 UserRelationship.create_inverse_subscription(target, subscriber)
1211 def subscribe(%User{} = subscriber, %{ap_id: ap_id}) do
1212 with %User{} = subscribee <- get_cached_by_ap_id(ap_id) do
1213 subscribe(subscriber, subscribee)
1217 def unsubscribe(%User{} = unsubscriber, %User{} = target) do
1218 # Note: the relationship is inverse: subscriber acts as relationship target
1219 UserRelationship.delete_inverse_subscription(target, unsubscriber)
1222 def unsubscribe(%User{} = unsubscriber, %{ap_id: ap_id}) do
1223 with %User{} = user <- get_cached_by_ap_id(ap_id) do
1224 unsubscribe(unsubscriber, user)
1228 def block(%User{} = blocker, %User{} = blocked) do
1229 # sever any follow relationships to prevent leaks per activitypub (Pleroma issue #213)
1231 if following?(blocker, blocked) do
1232 {:ok, blocker, _} = unfollow(blocker, blocked)
1238 # clear any requested follows as well
1240 case CommonAPI.reject_follow_request(blocked, blocker) do
1241 {:ok, %User{} = updated_blocked} -> updated_blocked
1245 unsubscribe(blocked, blocker)
1247 if following?(blocked, blocker), do: unfollow(blocked, blocker)
1249 {:ok, blocker} = update_follower_count(blocker)
1250 {:ok, blocker, _} = Participation.mark_all_as_read(blocker, blocked)
1251 add_to_block(blocker, blocked)
1254 # helper to handle the block given only an actor's AP id
1255 def block(%User{} = blocker, %{ap_id: ap_id}) do
1256 block(blocker, get_cached_by_ap_id(ap_id))
1259 def unblock(%User{} = blocker, %User{} = blocked) do
1260 remove_from_block(blocker, blocked)
1263 # helper to handle the block given only an actor's AP id
1264 def unblock(%User{} = blocker, %{ap_id: ap_id}) do
1265 unblock(blocker, get_cached_by_ap_id(ap_id))
1268 def mutes?(nil, _), do: false
1269 def mutes?(%User{} = user, %User{} = target), do: mutes_user?(user, target)
1271 def mutes_user?(%User{} = user, %User{} = target) do
1272 UserRelationship.mute_exists?(user, target)
1275 @spec muted_notifications?(User.t() | nil, User.t() | map()) :: boolean()
1276 def muted_notifications?(nil, _), do: false
1278 def muted_notifications?(%User{} = user, %User{} = target),
1279 do: UserRelationship.notification_mute_exists?(user, target)
1281 def blocks?(nil, _), do: false
1283 def blocks?(%User{} = user, %User{} = target) do
1284 blocks_user?(user, target) ||
1285 (!User.following?(user, target) && blocks_domain?(user, target))
1288 def blocks_user?(%User{} = user, %User{} = target) do
1289 UserRelationship.block_exists?(user, target)
1292 def blocks_user?(_, _), do: false
1294 def blocks_domain?(%User{} = user, %User{} = target) do
1295 domain_blocks = Pleroma.Web.ActivityPub.MRF.subdomains_regex(user.domain_blocks)
1296 %{host: host} = URI.parse(target.ap_id)
1297 Pleroma.Web.ActivityPub.MRF.subdomain_match?(domain_blocks, host)
1300 def blocks_domain?(_, _), do: false
1302 def subscribed_to?(%User{} = user, %User{} = target) do
1303 # Note: the relationship is inverse: subscriber acts as relationship target
1304 UserRelationship.inverse_subscription_exists?(target, user)
1307 def subscribed_to?(%User{} = user, %{ap_id: ap_id}) do
1308 with %User{} = target <- get_cached_by_ap_id(ap_id) do
1309 subscribed_to?(user, target)
1314 Returns map of outgoing (blocked, muted etc.) relationships' user AP IDs by relation type.
1315 E.g. `outgoing_relationships_ap_ids(user, [:block])` -> `%{block: ["https://some.site/users/userapid"]}`
1317 @spec outgoing_relationships_ap_ids(User.t(), list(atom())) :: %{atom() => list(String.t())}
1318 def outgoing_relationships_ap_ids(_user, []), do: %{}
1320 def outgoing_relationships_ap_ids(nil, _relationship_types), do: %{}
1322 def outgoing_relationships_ap_ids(%User{} = user, relationship_types)
1323 when is_list(relationship_types) do
1326 |> assoc(:outgoing_relationships)
1327 |> join(:inner, [user_rel], u in assoc(user_rel, :target))
1328 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1329 |> select([user_rel, u], [user_rel.relationship_type, fragment("array_agg(?)", u.ap_id)])
1330 |> group_by([user_rel, u], user_rel.relationship_type)
1332 |> Enum.into(%{}, fn [k, v] -> {k, v} end)
1337 fn rel_type -> {rel_type, db_result[rel_type] || []} end
1341 def incoming_relationships_ungrouped_ap_ids(user, relationship_types, ap_ids \\ nil)
1343 def incoming_relationships_ungrouped_ap_ids(_user, [], _ap_ids), do: []
1345 def incoming_relationships_ungrouped_ap_ids(nil, _relationship_types, _ap_ids), do: []
1347 def incoming_relationships_ungrouped_ap_ids(%User{} = user, relationship_types, ap_ids)
1348 when is_list(relationship_types) do
1350 |> assoc(:incoming_relationships)
1351 |> join(:inner, [user_rel], u in assoc(user_rel, :source))
1352 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1353 |> maybe_filter_on_ap_id(ap_ids)
1354 |> select([user_rel, u], u.ap_id)
1359 defp maybe_filter_on_ap_id(query, ap_ids) when is_list(ap_ids) do
1360 where(query, [user_rel, u], u.ap_id in ^ap_ids)
1363 defp maybe_filter_on_ap_id(query, _ap_ids), do: query
1365 def deactivate_async(user, status \\ true) do
1366 BackgroundWorker.enqueue("deactivate_user", %{"user_id" => user.id, "status" => status})
1369 def deactivate(user, status \\ true)
1371 def deactivate(users, status) when is_list(users) do
1372 Repo.transaction(fn ->
1373 for user <- users, do: deactivate(user, status)
1377 def deactivate(%User{} = user, status) do
1378 with {:ok, user} <- set_activation_status(user, status) do
1381 |> Enum.filter(& &1.local)
1382 |> Enum.each(fn follower ->
1383 follower |> update_following_count() |> set_cache()
1386 # Only update local user counts, remote will be update during the next pull.
1389 |> Enum.filter(& &1.local)
1390 |> Enum.each(&update_follower_count/1)
1396 def update_notification_settings(%User{} = user, settings) do
1398 |> cast(%{notification_settings: settings}, [])
1399 |> cast_embed(:notification_settings)
1400 |> validate_required([:notification_settings])
1401 |> update_and_set_cache()
1404 def delete(users) when is_list(users) do
1405 for user <- users, do: delete(user)
1408 def delete(%User{} = user) do
1409 BackgroundWorker.enqueue("delete_user", %{"user_id" => user.id})
1412 def perform(:force_password_reset, user), do: force_password_reset(user)
1414 @spec perform(atom(), User.t()) :: {:ok, User.t()}
1415 def perform(:delete, %User{} = user) do
1416 {:ok, _user} = ActivityPub.delete(user)
1418 # Remove all relationships
1421 |> Enum.each(fn follower ->
1422 ActivityPub.unfollow(follower, user)
1423 unfollow(follower, user)
1428 |> Enum.each(fn followed ->
1429 ActivityPub.unfollow(user, followed)
1430 unfollow(user, followed)
1433 delete_user_activities(user)
1434 invalidate_cache(user)
1438 def perform(:deactivate_async, user, status), do: deactivate(user, status)
1440 @spec perform(atom(), User.t(), list()) :: list() | {:error, any()}
1441 def perform(:blocks_import, %User{} = blocker, blocked_identifiers)
1442 when is_list(blocked_identifiers) do
1444 blocked_identifiers,
1445 fn blocked_identifier ->
1446 with {:ok, %User{} = blocked} <- get_or_fetch(blocked_identifier),
1447 {:ok, _user_block} <- block(blocker, blocked),
1448 {:ok, _} <- ActivityPub.block(blocker, blocked) do
1452 Logger.debug("blocks_import failed for #{blocked_identifier} with: #{inspect(err)}")
1459 def perform(:follow_import, %User{} = follower, followed_identifiers)
1460 when is_list(followed_identifiers) do
1462 followed_identifiers,
1463 fn followed_identifier ->
1464 with {:ok, %User{} = followed} <- get_or_fetch(followed_identifier),
1465 {:ok, follower} <- maybe_direct_follow(follower, followed),
1466 {:ok, _} <- ActivityPub.follow(follower, followed) do
1470 Logger.debug("follow_import failed for #{followed_identifier} with: #{inspect(err)}")
1477 @spec external_users_query() :: Ecto.Query.t()
1478 def external_users_query do
1486 @spec external_users(keyword()) :: [User.t()]
1487 def external_users(opts \\ []) do
1489 external_users_query()
1490 |> select([u], struct(u, [:id, :ap_id]))
1494 do: where(query, [u], u.id > ^opts[:max_id]),
1499 do: limit(query, ^opts[:limit]),
1505 def blocks_import(%User{} = blocker, blocked_identifiers) when is_list(blocked_identifiers) do
1506 BackgroundWorker.enqueue("blocks_import", %{
1507 "blocker_id" => blocker.id,
1508 "blocked_identifiers" => blocked_identifiers
1512 def follow_import(%User{} = follower, followed_identifiers)
1513 when is_list(followed_identifiers) do
1514 BackgroundWorker.enqueue("follow_import", %{
1515 "follower_id" => follower.id,
1516 "followed_identifiers" => followed_identifiers
1520 def delete_user_activities(%User{ap_id: ap_id}) do
1522 |> Activity.Queries.by_actor()
1523 |> RepoStreamer.chunk_stream(50)
1524 |> Stream.each(fn activities -> Enum.each(activities, &delete_activity/1) end)
1528 defp delete_activity(%{data: %{"type" => "Create"}} = activity) do
1530 |> Object.normalize()
1531 |> ActivityPub.delete()
1534 defp delete_activity(%{data: %{"type" => "Like"}} = activity) do
1535 object = Object.normalize(activity)
1538 |> get_cached_by_ap_id()
1539 |> ActivityPub.unlike(object)
1542 defp delete_activity(%{data: %{"type" => "Announce"}} = activity) do
1543 object = Object.normalize(activity)
1546 |> get_cached_by_ap_id()
1547 |> ActivityPub.unannounce(object)
1550 defp delete_activity(_activity), do: "Doing nothing"
1552 def html_filter_policy(%User{no_rich_text: true}) do
1553 Pleroma.HTML.Scrubber.TwitterText
1556 def html_filter_policy(_), do: Pleroma.Config.get([:markup, :scrub_policy])
1558 def fetch_by_ap_id(ap_id), do: ActivityPub.make_user_from_ap_id(ap_id)
1560 def get_or_fetch_by_ap_id(ap_id) do
1561 user = get_cached_by_ap_id(ap_id)
1563 if !is_nil(user) and !needs_update?(user) do
1566 fetch_by_ap_id(ap_id)
1571 Creates an internal service actor by URI if missing.
1572 Optionally takes nickname for addressing.
1574 @spec get_or_create_service_actor_by_ap_id(String.t(), String.t()) :: User.t() | nil
1575 def get_or_create_service_actor_by_ap_id(uri, nickname) do
1577 case get_cached_by_ap_id(uri) do
1579 with {:error, %{errors: errors}} <- create_service_actor(uri, nickname) do
1580 Logger.error("Cannot create service actor: #{uri}/.\n#{inspect(errors)}")
1584 %User{invisible: false} = user ->
1594 @spec set_invisible(User.t()) :: {:ok, User.t()}
1595 defp set_invisible(user) do
1597 |> change(%{invisible: true})
1598 |> update_and_set_cache()
1601 @spec create_service_actor(String.t(), String.t()) ::
1602 {:ok, User.t()} | {:error, Ecto.Changeset.t()}
1603 defp create_service_actor(uri, nickname) do
1609 follower_address: uri <> "/followers"
1612 |> unique_constraint(:nickname)
1618 def public_key(%{source_data: %{"publicKey" => %{"publicKeyPem" => public_key_pem}}}) do
1621 |> :public_key.pem_decode()
1623 |> :public_key.pem_entry_decode()
1628 def public_key(_), do: {:error, "not found key"}
1630 def get_public_key_for_ap_id(ap_id) do
1631 with {:ok, %User{} = user} <- get_or_fetch_by_ap_id(ap_id),
1632 {:ok, public_key} <- public_key(user) do
1639 defp blank?(""), do: nil
1640 defp blank?(n), do: n
1642 def insert_or_update_user(data) do
1644 |> Map.put(:name, blank?(data[:name]) || data[:nickname])
1645 |> remote_user_creation()
1646 |> Repo.insert(on_conflict: {:replace_all_except, [:id]}, conflict_target: :nickname)
1650 def ap_enabled?(%User{local: true}), do: true
1651 def ap_enabled?(%User{ap_enabled: ap_enabled}), do: ap_enabled
1652 def ap_enabled?(_), do: false
1654 @doc "Gets or fetch a user by uri or nickname."
1655 @spec get_or_fetch(String.t()) :: {:ok, User.t()} | {:error, String.t()}
1656 def get_or_fetch("http" <> _host = uri), do: get_or_fetch_by_ap_id(uri)
1657 def get_or_fetch(nickname), do: get_or_fetch_by_nickname(nickname)
1659 # wait a period of time and return newest version of the User structs
1660 # this is because we have synchronous follow APIs and need to simulate them
1661 # with an async handshake
1662 def wait_and_refresh(_, %User{local: true} = a, %User{local: true} = b) do
1663 with %User{} = a <- get_cached_by_id(a.id),
1664 %User{} = b <- get_cached_by_id(b.id) do
1671 def wait_and_refresh(timeout, %User{} = a, %User{} = b) do
1672 with :ok <- :timer.sleep(timeout),
1673 %User{} = a <- get_cached_by_id(a.id),
1674 %User{} = b <- get_cached_by_id(b.id) do
1681 def parse_bio(bio) when is_binary(bio) and bio != "" do
1683 |> CommonUtils.format_input("text/plain", mentions_format: :full)
1687 def parse_bio(_), do: ""
1689 def parse_bio(bio, user) when is_binary(bio) and bio != "" do
1690 # TODO: get profile URLs other than user.ap_id
1691 profile_urls = [user.ap_id]
1694 |> CommonUtils.format_input("text/plain",
1695 mentions_format: :full,
1696 rel: &RelMe.maybe_put_rel_me(&1, profile_urls)
1701 def parse_bio(_, _), do: ""
1703 def tag(user_identifiers, tags) when is_list(user_identifiers) do
1704 Repo.transaction(fn ->
1705 for user_identifier <- user_identifiers, do: tag(user_identifier, tags)
1709 def tag(nickname, tags) when is_binary(nickname),
1710 do: tag(get_by_nickname(nickname), tags)
1712 def tag(%User{} = user, tags),
1713 do: update_tags(user, Enum.uniq((user.tags || []) ++ normalize_tags(tags)))
1715 def untag(user_identifiers, tags) when is_list(user_identifiers) do
1716 Repo.transaction(fn ->
1717 for user_identifier <- user_identifiers, do: untag(user_identifier, tags)
1721 def untag(nickname, tags) when is_binary(nickname),
1722 do: untag(get_by_nickname(nickname), tags)
1724 def untag(%User{} = user, tags),
1725 do: update_tags(user, (user.tags || []) -- normalize_tags(tags))
1727 defp update_tags(%User{} = user, new_tags) do
1728 {:ok, updated_user} =
1730 |> change(%{tags: new_tags})
1731 |> update_and_set_cache()
1736 defp normalize_tags(tags) do
1739 |> Enum.map(&String.downcase/1)
1742 defp local_nickname_regex do
1743 if Pleroma.Config.get([:instance, :extended_nickname_format]) do
1744 @extended_local_nickname_regex
1746 @strict_local_nickname_regex
1750 def local_nickname(nickname_or_mention) do
1753 |> String.split("@")
1757 def full_nickname(nickname_or_mention),
1758 do: String.trim_leading(nickname_or_mention, "@")
1760 def error_user(ap_id) do
1764 nickname: "erroruser@example.com",
1765 inserted_at: NaiveDateTime.utc_now()
1769 @spec all_superusers() :: [User.t()]
1770 def all_superusers do
1771 User.Query.build(%{super_users: true, local: true, deactivated: false})
1775 def muting_reblogs?(%User{} = user, %User{} = target) do
1776 UserRelationship.reblog_mute_exists?(user, target)
1779 def showing_reblogs?(%User{} = user, %User{} = target) do
1780 not muting_reblogs?(user, target)
1784 The function returns a query to get users with no activity for given interval of days.
1785 Inactive users are those who didn't read any notification, or had any activity where
1786 the user is the activity's actor, during `inactivity_threshold` days.
1787 Deactivated users will not appear in this list.
1791 iex> Pleroma.User.list_inactive_users()
1794 @spec list_inactive_users_query(integer()) :: Ecto.Query.t()
1795 def list_inactive_users_query(inactivity_threshold \\ 7) do
1796 negative_inactivity_threshold = -inactivity_threshold
1797 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1798 # Subqueries are not supported in `where` clauses, join gets too complicated.
1799 has_read_notifications =
1800 from(n in Pleroma.Notification,
1801 where: n.seen == true,
1803 having: max(n.updated_at) > datetime_add(^now, ^negative_inactivity_threshold, "day"),
1806 |> Pleroma.Repo.all()
1808 from(u in Pleroma.User,
1809 left_join: a in Pleroma.Activity,
1810 on: u.ap_id == a.actor,
1811 where: not is_nil(u.nickname),
1812 where: u.deactivated != ^true,
1813 where: u.id not in ^has_read_notifications,
1816 max(a.inserted_at) < datetime_add(^now, ^negative_inactivity_threshold, "day") or
1817 is_nil(max(a.inserted_at))
1822 Enable or disable email notifications for user
1826 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => false}}, "digest", true)
1827 Pleroma.User{email_notifications: %{"digest" => true}}
1829 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => true}}, "digest", false)
1830 Pleroma.User{email_notifications: %{"digest" => false}}
1832 @spec switch_email_notifications(t(), String.t(), boolean()) ::
1833 {:ok, t()} | {:error, Ecto.Changeset.t()}
1834 def switch_email_notifications(user, type, status) do
1835 User.update_email_notifications(user, %{type => status})
1839 Set `last_digest_emailed_at` value for the user to current time
1841 @spec touch_last_digest_emailed_at(t()) :: t()
1842 def touch_last_digest_emailed_at(user) do
1843 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1845 {:ok, updated_user} =
1847 |> change(%{last_digest_emailed_at: now})
1848 |> update_and_set_cache()
1853 @spec toggle_confirmation(User.t()) :: {:ok, User.t()} | {:error, Changeset.t()}
1854 def toggle_confirmation(%User{} = user) do
1856 |> confirmation_changeset(need_confirmation: !user.confirmation_pending)
1857 |> update_and_set_cache()
1860 @spec toggle_confirmation([User.t()]) :: [{:ok, User.t()} | {:error, Changeset.t()}]
1861 def toggle_confirmation(users) do
1862 Enum.map(users, &toggle_confirmation/1)
1865 def get_mascot(%{mascot: %{} = mascot}) when not is_nil(mascot) do
1869 def get_mascot(%{mascot: mascot}) when is_nil(mascot) do
1870 # use instance-default
1871 config = Pleroma.Config.get([:assets, :mascots])
1872 default_mascot = Pleroma.Config.get([:assets, :default_mascot])
1873 mascot = Keyword.get(config, default_mascot)
1876 "id" => "default-mascot",
1877 "url" => mascot[:url],
1878 "preview_url" => mascot[:url],
1880 "mime_type" => mascot[:mime_type]
1885 def ensure_keys_present(%{keys: keys} = user) when not is_nil(keys), do: {:ok, user}
1887 def ensure_keys_present(%User{} = user) do
1888 with {:ok, pem} <- Keys.generate_rsa_pem() do
1890 |> cast(%{keys: pem}, [:keys])
1891 |> validate_required([:keys])
1892 |> update_and_set_cache()
1896 def get_ap_ids_by_nicknames(nicknames) do
1898 where: u.nickname in ^nicknames,
1904 defdelegate search(query, opts \\ []), to: User.Search
1906 defp put_password_hash(
1907 %Ecto.Changeset{valid?: true, changes: %{password: password}} = changeset
1909 change(changeset, password_hash: Pbkdf2.hashpwsalt(password))
1912 defp put_password_hash(changeset), do: changeset
1914 def is_internal_user?(%User{nickname: nil}), do: true
1915 def is_internal_user?(%User{local: true, nickname: "internal." <> _}), do: true
1916 def is_internal_user?(_), do: false
1918 # A hack because user delete activities have a fake id for whatever reason
1919 # TODO: Get rid of this
1920 def get_delivered_users_by_object_id("pleroma:fake_object_id"), do: []
1922 def get_delivered_users_by_object_id(object_id) do
1924 inner_join: delivery in assoc(u, :deliveries),
1925 where: delivery.object_id == ^object_id
1930 def change_email(user, email) do
1932 |> cast(%{email: email}, [:email])
1933 |> validate_required([:email])
1934 |> unique_constraint(:email)
1935 |> validate_format(:email, @email_regex)
1936 |> update_and_set_cache()
1939 # Internal function; public one is `deactivate/2`
1940 defp set_activation_status(user, deactivated) do
1942 |> cast(%{deactivated: deactivated}, [:deactivated])
1943 |> update_and_set_cache()
1946 def update_banner(user, banner) do
1948 |> cast(%{banner: banner}, [:banner])
1949 |> update_and_set_cache()
1952 def update_background(user, background) do
1954 |> cast(%{background: background}, [:background])
1955 |> update_and_set_cache()
1958 def update_source_data(user, source_data) do
1960 |> cast(%{source_data: source_data}, [:source_data])
1961 |> update_and_set_cache()
1964 def roles(%{is_moderator: is_moderator, is_admin: is_admin}) do
1967 moderator: is_moderator
1971 # ``fields`` is an array of mastodon profile field, containing ``{"name": "…", "value": "…"}``.
1972 # For example: [{"name": "Pronoun", "value": "she/her"}, …]
1973 def fields(%{fields: nil, source_data: %{"attachment" => attachment}}) do
1974 limit = Pleroma.Config.get([:instance, :max_remote_account_fields], 0)
1977 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1978 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1982 def fields(%{fields: nil}), do: []
1984 def fields(%{fields: fields}), do: fields
1986 def validate_fields(changeset, remote? \\ false) do
1987 limit_name = if remote?, do: :max_remote_account_fields, else: :max_account_fields
1988 limit = Pleroma.Config.get([:instance, limit_name], 0)
1991 |> validate_length(:fields, max: limit)
1992 |> validate_change(:fields, fn :fields, fields ->
1993 if Enum.all?(fields, &valid_field?/1) do
2001 defp valid_field?(%{"name" => name, "value" => value}) do
2002 name_limit = Pleroma.Config.get([:instance, :account_field_name_length], 255)
2003 value_limit = Pleroma.Config.get([:instance, :account_field_value_length], 255)
2005 is_binary(name) && is_binary(value) && String.length(name) <= name_limit &&
2006 String.length(value) <= value_limit
2009 defp valid_field?(_), do: false
2011 defp truncate_field(%{"name" => name, "value" => value}) do
2013 String.split_at(name, Pleroma.Config.get([:instance, :account_field_name_length], 255))
2016 String.split_at(value, Pleroma.Config.get([:instance, :account_field_value_length], 255))
2018 %{"name" => name, "value" => value}
2021 def admin_api_update(user, params) do
2028 |> update_and_set_cache()
2031 @doc "Signs user out of all applications"
2032 def global_sign_out(user) do
2033 OAuth.Authorization.delete_user_authorizations(user)
2034 OAuth.Token.delete_user_tokens(user)
2037 def mascot_update(user, url) do
2039 |> cast(%{mascot: url}, [:mascot])
2040 |> validate_required([:mascot])
2041 |> update_and_set_cache()
2044 def mastodon_settings_update(user, settings) do
2046 |> cast(%{settings: settings}, [:settings])
2047 |> validate_required([:settings])
2048 |> update_and_set_cache()
2051 @spec confirmation_changeset(User.t(), keyword()) :: Changeset.t()
2052 def confirmation_changeset(user, need_confirmation: need_confirmation?) do
2054 if need_confirmation? do
2056 confirmation_pending: true,
2057 confirmation_token: :crypto.strong_rand_bytes(32) |> Base.url_encode64()
2061 confirmation_pending: false,
2062 confirmation_token: nil
2066 cast(user, params, [:confirmation_pending, :confirmation_token])
2069 def add_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2070 if id not in user.pinned_activities do
2071 max_pinned_statuses = Pleroma.Config.get([:instance, :max_pinned_statuses], 0)
2072 params = %{pinned_activities: user.pinned_activities ++ [id]}
2075 |> cast(params, [:pinned_activities])
2076 |> validate_length(:pinned_activities,
2077 max: max_pinned_statuses,
2078 message: "You have already pinned the maximum number of statuses"
2083 |> update_and_set_cache()
2086 def remove_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2087 params = %{pinned_activities: List.delete(user.pinned_activities, id)}
2090 |> cast(params, [:pinned_activities])
2091 |> update_and_set_cache()
2094 def update_email_notifications(user, settings) do
2095 email_notifications =
2096 user.email_notifications
2097 |> Map.merge(settings)
2098 |> Map.take(["digest"])
2100 params = %{email_notifications: email_notifications}
2101 fields = [:email_notifications]
2104 |> cast(params, fields)
2105 |> validate_required(fields)
2106 |> update_and_set_cache()
2109 defp set_domain_blocks(user, domain_blocks) do
2110 params = %{domain_blocks: domain_blocks}
2113 |> cast(params, [:domain_blocks])
2114 |> validate_required([:domain_blocks])
2115 |> update_and_set_cache()
2118 def block_domain(user, domain_blocked) do
2119 set_domain_blocks(user, Enum.uniq([domain_blocked | user.domain_blocks]))
2122 def unblock_domain(user, domain_blocked) do
2123 set_domain_blocks(user, List.delete(user.domain_blocks, domain_blocked))
2126 @spec add_to_block(User.t(), User.t()) ::
2127 {:ok, UserRelationship.t()} | {:error, Ecto.Changeset.t()}
2128 defp add_to_block(%User{} = user, %User{} = blocked) do
2129 UserRelationship.create_block(user, blocked)
2132 @spec add_to_block(User.t(), User.t()) ::
2133 {:ok, UserRelationship.t()} | {:ok, nil} | {:error, Ecto.Changeset.t()}
2134 defp remove_from_block(%User{} = user, %User{} = blocked) do
2135 UserRelationship.delete_block(user, blocked)
2138 defp add_to_mutes(%User{} = user, %User{} = muted_user, notifications?) do
2139 with {:ok, user_mute} <- UserRelationship.create_mute(user, muted_user),
2140 {:ok, user_notification_mute} <-
2141 (notifications? && UserRelationship.create_notification_mute(user, muted_user)) ||
2143 {:ok, Enum.filter([user_mute, user_notification_mute], & &1)}
2147 defp remove_from_mutes(user, %User{} = muted_user) do
2148 with {:ok, user_mute} <- UserRelationship.delete_mute(user, muted_user),
2149 {:ok, user_notification_mute} <-
2150 UserRelationship.delete_notification_mute(user, muted_user) do
2151 {:ok, [user_mute, user_notification_mute]}
2155 def set_invisible(user, invisible) do
2156 params = %{invisible: invisible}
2159 |> cast(params, [:invisible])
2160 |> validate_required([:invisible])
2161 |> update_and_set_cache()
2164 def sanitize_html(%User{} = user) do
2165 sanitize_html(user, nil)
2168 # User data that mastodon isn't filtering (treated as plaintext):
2171 def sanitize_html(%User{} = user, filter) do
2175 |> Enum.map(fn %{"name" => name, "value" => value} ->
2178 "value" => HTML.filter_tags(value, Pleroma.HTML.Scrubber.LinksOnly)
2183 |> Map.put(:bio, HTML.filter_tags(user.bio, filter))
2184 |> Map.put(:fields, fields)