1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.User do
10 import Ecto, only: [assoc: 2]
14 alias Pleroma.Activity
16 alias Pleroma.Conversation.Participation
17 alias Pleroma.Delivery
18 alias Pleroma.FollowingRelationship
19 alias Pleroma.Formatter
22 alias Pleroma.Notification
24 alias Pleroma.Registration
26 alias Pleroma.RepoStreamer
28 alias Pleroma.UserRelationship
30 alias Pleroma.Web.ActivityPub.ActivityPub
31 alias Pleroma.Web.ActivityPub.Utils
32 alias Pleroma.Web.CommonAPI
33 alias Pleroma.Web.CommonAPI.Utils, as: CommonUtils
34 alias Pleroma.Web.OAuth
35 alias Pleroma.Web.RelMe
36 alias Pleroma.Workers.BackgroundWorker
40 @type t :: %__MODULE__{}
41 @type account_status :: :active | :deactivated | :password_reset_pending | :confirmation_pending
42 @primary_key {:id, FlakeId.Ecto.CompatType, autogenerate: true}
44 # credo:disable-for-next-line Credo.Check.Readability.MaxLineLength
45 @email_regex ~r/^[a-zA-Z0-9.!#$%&'*+\/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/
47 @strict_local_nickname_regex ~r/^[a-zA-Z\d]+$/
48 @extended_local_nickname_regex ~r/^[a-zA-Z\d_-]+$/
50 # AP ID user relationships (blocks, mutes etc.)
51 # Format: [rel_type: [outgoing_rel: :outgoing_rel_target, incoming_rel: :incoming_rel_source]]
52 @user_relationships_config [
54 blocker_blocks: :blocked_users,
55 blockee_blocks: :blocker_users
58 muter_mutes: :muted_users,
59 mutee_mutes: :muter_users
62 reblog_muter_mutes: :reblog_muted_users,
63 reblog_mutee_mutes: :reblog_muter_users
66 notification_muter_mutes: :notification_muted_users,
67 notification_mutee_mutes: :notification_muter_users
69 # Note: `inverse_subscription` relationship is inverse: subscriber acts as relationship target
70 inverse_subscription: [
71 subscribee_subscriptions: :subscriber_users,
72 subscriber_subscriptions: :subscribee_users
78 field(:email, :string)
80 field(:nickname, :string)
81 field(:password_hash, :string)
82 field(:password, :string, virtual: true)
83 field(:password_confirmation, :string, virtual: true)
85 field(:ap_id, :string)
87 field(:local, :boolean, default: true)
88 field(:follower_address, :string)
89 field(:following_address, :string)
90 field(:search_rank, :float, virtual: true)
91 field(:search_type, :integer, virtual: true)
92 field(:tags, {:array, :string}, default: [])
93 field(:last_refreshed_at, :naive_datetime_usec)
94 field(:last_digest_emailed_at, :naive_datetime)
95 field(:banner, :map, default: %{})
96 field(:background, :map, default: %{})
97 field(:source_data, :map, default: %{})
98 field(:note_count, :integer, default: 0)
99 field(:follower_count, :integer, default: 0)
100 field(:following_count, :integer, default: 0)
101 field(:locked, :boolean, default: false)
102 field(:confirmation_pending, :boolean, default: false)
103 field(:password_reset_pending, :boolean, default: false)
104 field(:confirmation_token, :string, default: nil)
105 field(:default_scope, :string, default: "public")
106 field(:domain_blocks, {:array, :string}, default: [])
107 field(:deactivated, :boolean, default: false)
108 field(:no_rich_text, :boolean, default: false)
109 field(:ap_enabled, :boolean, default: false)
110 field(:is_moderator, :boolean, default: false)
111 field(:is_admin, :boolean, default: false)
112 field(:show_role, :boolean, default: true)
113 field(:settings, :map, default: nil)
114 field(:magic_key, :string, default: nil)
115 field(:uri, :string, default: nil)
116 field(:hide_followers_count, :boolean, default: false)
117 field(:hide_follows_count, :boolean, default: false)
118 field(:hide_followers, :boolean, default: false)
119 field(:hide_follows, :boolean, default: false)
120 field(:hide_favorites, :boolean, default: true)
121 field(:unread_conversation_count, :integer, default: 0)
122 field(:pinned_activities, {:array, :string}, default: [])
123 field(:email_notifications, :map, default: %{"digest" => false})
124 field(:mascot, :map, default: nil)
125 field(:emoji, {:array, :map}, default: [])
126 field(:pleroma_settings_store, :map, default: %{})
127 field(:fields, {:array, :map}, default: [])
128 field(:raw_fields, {:array, :map}, default: [])
129 field(:discoverable, :boolean, default: false)
130 field(:invisible, :boolean, default: false)
131 field(:allow_following_move, :boolean, default: true)
132 field(:skip_thread_containment, :boolean, default: false)
133 field(:actor_type, :string, default: "Person")
134 field(:also_known_as, {:array, :string}, default: [])
137 :notification_settings,
138 Pleroma.User.NotificationSetting,
142 has_many(:notifications, Notification)
143 has_many(:registrations, Registration)
144 has_many(:deliveries, Delivery)
146 has_many(:outgoing_relationships, UserRelationship, foreign_key: :source_id)
147 has_many(:incoming_relationships, UserRelationship, foreign_key: :target_id)
149 for {relationship_type,
151 {outgoing_relation, outgoing_relation_target},
152 {incoming_relation, incoming_relation_source}
153 ]} <- @user_relationships_config do
154 # Definitions of `has_many` relations: :blocker_blocks, :muter_mutes, :reblog_muter_mutes,
155 # :notification_muter_mutes, :subscribee_subscriptions
156 has_many(outgoing_relation, UserRelationship,
157 foreign_key: :source_id,
158 where: [relationship_type: relationship_type]
161 # Definitions of `has_many` relations: :blockee_blocks, :mutee_mutes, :reblog_mutee_mutes,
162 # :notification_mutee_mutes, :subscriber_subscriptions
163 has_many(incoming_relation, UserRelationship,
164 foreign_key: :target_id,
165 where: [relationship_type: relationship_type]
168 # Definitions of `has_many` relations: :blocked_users, :muted_users, :reblog_muted_users,
169 # :notification_muted_users, :subscriber_users
170 has_many(outgoing_relation_target, through: [outgoing_relation, :target])
172 # Definitions of `has_many` relations: :blocker_users, :muter_users, :reblog_muter_users,
173 # :notification_muter_users, :subscribee_users
174 has_many(incoming_relation_source, through: [incoming_relation, :source])
177 # `:blocks` is deprecated (replaced with `blocked_users` relation)
178 field(:blocks, {:array, :string}, default: [])
179 # `:mutes` is deprecated (replaced with `muted_users` relation)
180 field(:mutes, {:array, :string}, default: [])
181 # `:muted_reblogs` is deprecated (replaced with `reblog_muted_users` relation)
182 field(:muted_reblogs, {:array, :string}, default: [])
183 # `:muted_notifications` is deprecated (replaced with `notification_muted_users` relation)
184 field(:muted_notifications, {:array, :string}, default: [])
185 # `:subscribers` is deprecated (replaced with `subscriber_users` relation)
186 field(:subscribers, {:array, :string}, default: [])
191 for {_relationship_type, [{_outgoing_relation, outgoing_relation_target}, _]} <-
192 @user_relationships_config do
193 # `def blocked_users_relation/2`, `def muted_users_relation/2`,
194 # `def reblog_muted_users_relation/2`, `def notification_muted_users/2`,
195 # `def subscriber_users/2`
196 def unquote(:"#{outgoing_relation_target}_relation")(user, restrict_deactivated? \\ false) do
197 target_users_query = assoc(user, unquote(outgoing_relation_target))
199 if restrict_deactivated? do
200 restrict_deactivated(target_users_query)
206 # `def blocked_users/2`, `def muted_users/2`, `def reblog_muted_users/2`,
207 # `def notification_muted_users/2`, `def subscriber_users/2`
208 def unquote(outgoing_relation_target)(user, restrict_deactivated? \\ false) do
210 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
212 restrict_deactivated?
217 # `def blocked_users_ap_ids/2`, `def muted_users_ap_ids/2`, `def reblog_muted_users_ap_ids/2`,
218 # `def notification_muted_users_ap_ids/2`, `def subscriber_users_ap_ids/2`
219 def unquote(:"#{outgoing_relation_target}_ap_ids")(user, restrict_deactivated? \\ false) do
221 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
223 restrict_deactivated?
225 |> select([u], u.ap_id)
231 Dumps Flake Id to SQL-compatible format (16-byte UUID).
232 E.g. "9pQtDGXuq4p3VlcJEm" -> <<0, 0, 1, 110, 179, 218, 42, 92, 213, 41, 44, 227, 95, 213, 0, 0>>
234 def binary_id(source_id) when is_binary(source_id) do
235 with {:ok, dumped_id} <- FlakeId.Ecto.CompatType.dump(source_id) do
242 def binary_id(source_ids) when is_list(source_ids) do
243 Enum.map(source_ids, &binary_id/1)
246 def binary_id(%User{} = user), do: binary_id(user.id)
248 @doc "Returns status account"
249 @spec account_status(User.t()) :: account_status()
250 def account_status(%User{deactivated: true}), do: :deactivated
251 def account_status(%User{password_reset_pending: true}), do: :password_reset_pending
253 def account_status(%User{confirmation_pending: true}) do
254 case Config.get([:instance, :account_activation_required]) do
255 true -> :confirmation_pending
260 def account_status(%User{}), do: :active
262 @spec visible_for?(User.t(), User.t() | nil) :: boolean()
263 def visible_for?(user, for_user \\ nil)
265 def visible_for?(%User{invisible: true}, _), do: false
267 def visible_for?(%User{id: user_id}, %User{id: user_id}), do: true
269 def visible_for?(%User{local: local} = user, nil) do
275 if Config.get([:restrict_unauthenticated, :profiles, cfg_key]),
277 else: account_status(user) == :active
280 def visible_for?(%User{} = user, for_user) do
281 account_status(user) == :active || superuser?(for_user)
284 def visible_for?(_, _), do: false
286 @spec superuser?(User.t()) :: boolean()
287 def superuser?(%User{local: true, is_admin: true}), do: true
288 def superuser?(%User{local: true, is_moderator: true}), do: true
289 def superuser?(_), do: false
291 @spec invisible?(User.t()) :: boolean()
292 def invisible?(%User{invisible: true}), do: true
293 def invisible?(_), do: false
295 def avatar_url(user, options \\ []) do
297 %{"url" => [%{"href" => href} | _]} -> href
298 _ -> !options[:no_default] && "#{Web.base_url()}/images/avi.png"
302 def banner_url(user, options \\ []) do
304 %{"url" => [%{"href" => href} | _]} -> href
305 _ -> !options[:no_default] && "#{Web.base_url()}/images/banner.png"
309 def ap_id(%User{nickname: nickname}), do: "#{Web.base_url()}/users/#{nickname}"
311 def ap_followers(%User{follower_address: fa}) when is_binary(fa), do: fa
312 def ap_followers(%User{} = user), do: "#{ap_id(user)}/followers"
314 @spec ap_following(User.t()) :: String.t()
315 def ap_following(%User{following_address: fa}) when is_binary(fa), do: fa
316 def ap_following(%User{} = user), do: "#{ap_id(user)}/following"
318 @spec restrict_deactivated(Ecto.Query.t()) :: Ecto.Query.t()
319 def restrict_deactivated(query) do
320 from(u in query, where: u.deactivated != ^true)
323 defdelegate following_count(user), to: FollowingRelationship
325 defp truncate_fields_param(params) do
326 if Map.has_key?(params, :fields) do
327 Map.put(params, :fields, Enum.map(params[:fields], &truncate_field/1))
333 defp truncate_if_exists(params, key, max_length) do
334 if Map.has_key?(params, key) and is_binary(params[key]) do
335 {value, _chopped} = String.split_at(params[key], max_length)
336 Map.put(params, key, value)
342 def remote_user_changeset(struct \\ %User{local: false}, params) do
343 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
344 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
348 |> Map.put(:name, blank?(params[:name]) || params[:nickname])
349 |> Map.put_new(:last_refreshed_at, NaiveDateTime.utc_now())
350 |> truncate_if_exists(:name, name_limit)
351 |> truncate_if_exists(:bio, bio_limit)
352 |> truncate_fields_param()
372 :hide_followers_count,
384 |> validate_required([:name, :ap_id])
385 |> unique_constraint(:nickname)
386 |> validate_format(:nickname, @email_regex)
387 |> validate_length(:bio, max: bio_limit)
388 |> validate_length(:name, max: name_limit)
389 |> validate_fields(true)
391 case params[:source_data] do
392 %{"followers" => followers, "following" => following} ->
394 |> put_change(:follower_address, followers)
395 |> put_change(:following_address, following)
398 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
399 put_change(changeset, :follower_address, followers)
403 def update_changeset(struct, params \\ %{}) do
404 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
405 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
420 :hide_followers_count,
423 :allow_following_move,
426 :skip_thread_containment,
429 :pleroma_settings_store,
435 |> unique_constraint(:nickname)
436 |> validate_format(:nickname, local_nickname_regex())
437 |> validate_length(:bio, max: bio_limit)
438 |> validate_length(:name, min: 1, max: name_limit)
440 |> put_change_if_present(:bio, &{:ok, parse_bio(&1, struct)})
441 |> put_change_if_present(:avatar, &put_upload(&1, :avatar))
442 |> put_change_if_present(:banner, &put_upload(&1, :banner))
443 |> put_change_if_present(:background, &put_upload(&1, :background))
444 |> put_change_if_present(
445 :pleroma_settings_store,
446 &{:ok, Map.merge(struct.pleroma_settings_store, &1)}
448 |> validate_fields(false)
451 defp put_fields(changeset) do
452 if raw_fields = get_change(changeset, :raw_fields) do
455 |> Enum.filter(fn %{"name" => n} -> n != "" end)
459 |> Enum.map(fn f -> Map.update!(f, "value", &parse_fields(&1)) end)
462 |> put_change(:raw_fields, raw_fields)
463 |> put_change(:fields, fields)
469 defp parse_fields(value) do
471 |> Formatter.linkify(mentions_format: :full)
475 defp put_change_if_present(changeset, map_field, value_function) do
476 if value = get_change(changeset, map_field) do
477 with {:ok, new_value} <- value_function.(value) do
478 put_change(changeset, map_field, new_value)
487 defp put_upload(value, type) do
488 with %Plug.Upload{} <- value,
489 {:ok, object} <- ActivityPub.upload(value, type: type) do
494 def update_as_admin_changeset(struct, params) do
496 |> update_changeset(params)
497 |> cast(params, [:email])
498 |> delete_change(:also_known_as)
499 |> unique_constraint(:email)
500 |> validate_format(:email, @email_regex)
503 @spec update_as_admin(%User{}, map) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
504 def update_as_admin(user, params) do
505 params = Map.put(params, "password_confirmation", params["password"])
506 changeset = update_as_admin_changeset(user, params)
508 if params["password"] do
509 reset_password(user, changeset, params)
511 User.update_and_set_cache(changeset)
515 def password_update_changeset(struct, params) do
517 |> cast(params, [:password, :password_confirmation])
518 |> validate_required([:password, :password_confirmation])
519 |> validate_confirmation(:password)
520 |> put_password_hash()
521 |> put_change(:password_reset_pending, false)
524 @spec reset_password(User.t(), map) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
525 def reset_password(%User{} = user, params) do
526 reset_password(user, user, params)
529 def reset_password(%User{id: user_id} = user, struct, params) do
532 |> Multi.update(:user, password_update_changeset(struct, params))
533 |> Multi.delete_all(:tokens, OAuth.Token.Query.get_by_user(user_id))
534 |> Multi.delete_all(:auth, OAuth.Authorization.delete_by_user_query(user))
536 case Repo.transaction(multi) do
537 {:ok, %{user: user} = _} -> set_cache(user)
538 {:error, _, changeset, _} -> {:error, changeset}
542 def update_password_reset_pending(user, value) do
545 |> put_change(:password_reset_pending, value)
546 |> update_and_set_cache()
549 def force_password_reset_async(user) do
550 BackgroundWorker.enqueue("force_password_reset", %{"user_id" => user.id})
553 @spec force_password_reset(User.t()) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
554 def force_password_reset(user), do: update_password_reset_pending(user, true)
556 def register_changeset(struct, params \\ %{}, opts \\ []) do
557 bio_limit = Pleroma.Config.get([:instance, :user_bio_length], 5000)
558 name_limit = Pleroma.Config.get([:instance, :user_name_length], 100)
561 if is_nil(opts[:need_confirmation]) do
562 Pleroma.Config.get([:instance, :account_activation_required])
564 opts[:need_confirmation]
568 |> confirmation_changeset(need_confirmation: need_confirmation?)
569 |> cast(params, [:bio, :email, :name, :nickname, :password, :password_confirmation])
570 |> validate_required([:name, :nickname, :password, :password_confirmation])
571 |> validate_confirmation(:password)
572 |> unique_constraint(:email)
573 |> unique_constraint(:nickname)
574 |> validate_exclusion(:nickname, Pleroma.Config.get([User, :restricted_nicknames]))
575 |> validate_format(:nickname, local_nickname_regex())
576 |> validate_format(:email, @email_regex)
577 |> validate_length(:bio, max: bio_limit)
578 |> validate_length(:name, min: 1, max: name_limit)
579 |> maybe_validate_required_email(opts[:external])
582 |> unique_constraint(:ap_id)
583 |> put_following_and_follower_address()
586 def maybe_validate_required_email(changeset, true), do: changeset
588 def maybe_validate_required_email(changeset, _) do
589 if Pleroma.Config.get([:instance, :account_activation_required]) do
590 validate_required(changeset, [:email])
596 defp put_ap_id(changeset) do
597 ap_id = ap_id(%User{nickname: get_field(changeset, :nickname)})
598 put_change(changeset, :ap_id, ap_id)
601 defp put_following_and_follower_address(changeset) do
602 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
605 |> put_change(:follower_address, followers)
608 defp autofollow_users(user) do
609 candidates = Pleroma.Config.get([:instance, :autofollowed_nicknames])
612 User.Query.build(%{nickname: candidates, local: true, deactivated: false})
615 follow_all(user, autofollowed_users)
618 @doc "Inserts provided changeset, performs post-registration actions (confirmation email sending etc.)"
619 def register(%Ecto.Changeset{} = changeset) do
620 with {:ok, user} <- Repo.insert(changeset) do
621 post_register_action(user)
625 def post_register_action(%User{} = user) do
626 with {:ok, user} <- autofollow_users(user),
627 {:ok, user} <- set_cache(user),
628 {:ok, _} <- User.WelcomeMessage.post_welcome_message_to_user(user),
629 {:ok, _} <- try_send_confirmation_email(user) do
634 def try_send_confirmation_email(%User{} = user) do
635 if user.confirmation_pending &&
636 Pleroma.Config.get([:instance, :account_activation_required]) do
638 |> Pleroma.Emails.UserEmail.account_confirmation_email()
639 |> Pleroma.Emails.Mailer.deliver_async()
647 def try_send_confirmation_email(users) do
648 Enum.each(users, &try_send_confirmation_email/1)
651 def needs_update?(%User{local: true}), do: false
653 def needs_update?(%User{local: false, last_refreshed_at: nil}), do: true
655 def needs_update?(%User{local: false} = user) do
656 NaiveDateTime.diff(NaiveDateTime.utc_now(), user.last_refreshed_at) >= 86_400
659 def needs_update?(_), do: true
661 @spec maybe_direct_follow(User.t(), User.t()) :: {:ok, User.t()} | {:error, String.t()}
662 def maybe_direct_follow(%User{} = follower, %User{local: true, locked: true} = followed) do
663 follow(follower, followed, "pending")
666 def maybe_direct_follow(%User{} = follower, %User{local: true} = followed) do
667 follow(follower, followed)
670 def maybe_direct_follow(%User{} = follower, %User{} = followed) do
671 if not ap_enabled?(followed) do
672 follow(follower, followed)
678 @doc "A mass follow for local users. Respects blocks in both directions but does not create activities."
679 @spec follow_all(User.t(), list(User.t())) :: {atom(), User.t()}
680 def follow_all(follower, followeds) do
682 |> Enum.reject(fn followed -> blocks?(follower, followed) || blocks?(followed, follower) end)
683 |> Enum.each(&follow(follower, &1, "accept"))
688 defdelegate following(user), to: FollowingRelationship
690 def follow(%User{} = follower, %User{} = followed, state \\ "accept") do
691 deny_follow_blocked = Pleroma.Config.get([:user, :deny_follow_blocked])
694 followed.deactivated ->
695 {:error, "Could not follow user: #{followed.nickname} is deactivated."}
697 deny_follow_blocked and blocks?(followed, follower) ->
698 {:error, "Could not follow user: #{followed.nickname} blocked you."}
701 FollowingRelationship.follow(follower, followed, state)
703 {:ok, _} = update_follower_count(followed)
706 |> update_following_count()
711 def unfollow(%User{ap_id: ap_id}, %User{ap_id: ap_id}) do
712 {:error, "Not subscribed!"}
715 def unfollow(%User{} = follower, %User{} = followed) do
716 case get_follow_state(follower, followed) do
717 state when state in ["accept", "pending"] ->
718 FollowingRelationship.unfollow(follower, followed)
719 {:ok, followed} = update_follower_count(followed)
723 |> update_following_count()
726 {:ok, follower, Utils.fetch_latest_follow(follower, followed)}
729 {:error, "Not subscribed!"}
733 defdelegate following?(follower, followed), to: FollowingRelationship
735 def get_follow_state(%User{} = follower, %User{} = following) do
736 following_relationship = FollowingRelationship.get(follower, following)
737 get_follow_state(follower, following, following_relationship)
740 def get_follow_state(
743 following_relationship
745 case {following_relationship, following.local} do
747 case Utils.fetch_latest_follow(follower, following) do
748 %{data: %{"state" => state}} when state in ["pending", "accept"] -> state
752 {%{state: state}, _} ->
760 def locked?(%User{} = user) do
765 Repo.get_by(User, id: id)
768 def get_by_ap_id(ap_id) do
769 Repo.get_by(User, ap_id: ap_id)
772 def get_all_by_ap_id(ap_ids) do
773 from(u in __MODULE__,
774 where: u.ap_id in ^ap_ids
779 def get_all_by_ids(ids) do
780 from(u in __MODULE__, where: u.id in ^ids)
784 # This is mostly an SPC migration fix. This guesses the user nickname by taking the last part
785 # of the ap_id and the domain and tries to get that user
786 def get_by_guessed_nickname(ap_id) do
787 domain = URI.parse(ap_id).host
788 name = List.last(String.split(ap_id, "/"))
789 nickname = "#{name}@#{domain}"
791 get_cached_by_nickname(nickname)
794 def set_cache({:ok, user}), do: set_cache(user)
795 def set_cache({:error, err}), do: {:error, err}
797 def set_cache(%User{} = user) do
798 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
799 Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
803 def update_and_set_cache(struct, params) do
805 |> update_changeset(params)
806 |> update_and_set_cache()
809 def update_and_set_cache(changeset) do
810 with {:ok, user} <- Repo.update(changeset, stale_error_field: :id) do
815 def invalidate_cache(user) do
816 Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
817 Cachex.del(:user_cache, "nickname:#{user.nickname}")
820 @spec get_cached_by_ap_id(String.t()) :: User.t() | nil
821 def get_cached_by_ap_id(ap_id) do
822 key = "ap_id:#{ap_id}"
824 with {:ok, nil} <- Cachex.get(:user_cache, key),
825 user when not is_nil(user) <- get_by_ap_id(ap_id),
826 {:ok, true} <- Cachex.put(:user_cache, key, user) do
834 def get_cached_by_id(id) do
838 Cachex.fetch!(:user_cache, key, fn _ ->
842 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
843 {:commit, user.ap_id}
849 get_cached_by_ap_id(ap_id)
852 def get_cached_by_nickname(nickname) do
853 key = "nickname:#{nickname}"
855 Cachex.fetch!(:user_cache, key, fn ->
856 case get_or_fetch_by_nickname(nickname) do
857 {:ok, user} -> {:commit, user}
858 {:error, _error} -> {:ignore, nil}
863 def get_cached_by_nickname_or_id(nickname_or_id, opts \\ []) do
864 restrict_to_local = Pleroma.Config.get([:instance, :limit_to_local_content])
867 is_integer(nickname_or_id) or FlakeId.flake_id?(nickname_or_id) ->
868 get_cached_by_id(nickname_or_id) || get_cached_by_nickname(nickname_or_id)
870 restrict_to_local == false or not String.contains?(nickname_or_id, "@") ->
871 get_cached_by_nickname(nickname_or_id)
873 restrict_to_local == :unauthenticated and match?(%User{}, opts[:for]) ->
874 get_cached_by_nickname(nickname_or_id)
881 def get_by_nickname(nickname) do
882 Repo.get_by(User, nickname: nickname) ||
883 if Regex.match?(~r(@#{Pleroma.Web.Endpoint.host()})i, nickname) do
884 Repo.get_by(User, nickname: local_nickname(nickname))
888 def get_by_email(email), do: Repo.get_by(User, email: email)
890 def get_by_nickname_or_email(nickname_or_email) do
891 get_by_nickname(nickname_or_email) || get_by_email(nickname_or_email)
894 def fetch_by_nickname(nickname), do: ActivityPub.make_user_from_nickname(nickname)
896 def get_or_fetch_by_nickname(nickname) do
897 with %User{} = user <- get_by_nickname(nickname) do
901 with [_nick, _domain] <- String.split(nickname, "@"),
902 {:ok, user} <- fetch_by_nickname(nickname) do
905 _e -> {:error, "not found " <> nickname}
910 @spec get_followers_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
911 def get_followers_query(%User{} = user, nil) do
912 User.Query.build(%{followers: user, deactivated: false})
915 def get_followers_query(user, page) do
917 |> get_followers_query(nil)
918 |> User.Query.paginate(page, 20)
921 @spec get_followers_query(User.t()) :: Ecto.Query.t()
922 def get_followers_query(user), do: get_followers_query(user, nil)
924 @spec get_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
925 def get_followers(user, page \\ nil) do
927 |> get_followers_query(page)
931 @spec get_external_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
932 def get_external_followers(user, page \\ nil) do
934 |> get_followers_query(page)
935 |> User.Query.build(%{external: true})
939 def get_followers_ids(user, page \\ nil) do
941 |> get_followers_query(page)
946 @spec get_friends_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
947 def get_friends_query(%User{} = user, nil) do
948 User.Query.build(%{friends: user, deactivated: false})
951 def get_friends_query(user, page) do
953 |> get_friends_query(nil)
954 |> User.Query.paginate(page, 20)
957 @spec get_friends_query(User.t()) :: Ecto.Query.t()
958 def get_friends_query(user), do: get_friends_query(user, nil)
960 def get_friends(user, page \\ nil) do
962 |> get_friends_query(page)
966 def get_friends_ap_ids(user) do
968 |> get_friends_query(nil)
969 |> select([u], u.ap_id)
973 def get_friends_ids(user, page \\ nil) do
975 |> get_friends_query(page)
980 defdelegate get_follow_requests(user), to: FollowingRelationship
982 def increase_note_count(%User{} = user) do
984 |> where(id: ^user.id)
985 |> update([u], inc: [note_count: 1])
987 |> Repo.update_all([])
989 {1, [user]} -> set_cache(user)
994 def decrease_note_count(%User{} = user) do
996 |> where(id: ^user.id)
999 note_count: fragment("greatest(0, note_count - 1)")
1003 |> Repo.update_all([])
1005 {1, [user]} -> set_cache(user)
1010 def update_note_count(%User{} = user, note_count \\ nil) do
1015 where: fragment("?->>'actor' = ? and ?->>'type' = 'Note'", a.data, ^user.ap_id, a.data),
1021 |> cast(%{note_count: note_count}, [:note_count])
1022 |> update_and_set_cache()
1025 @spec maybe_fetch_follow_information(User.t()) :: User.t()
1026 def maybe_fetch_follow_information(user) do
1027 with {:ok, user} <- fetch_follow_information(user) do
1031 Logger.error("Follower/Following counter update for #{user.ap_id} failed.\n#{inspect(e)}")
1037 def fetch_follow_information(user) do
1038 with {:ok, info} <- ActivityPub.fetch_follow_information_for_user(user) do
1040 |> follow_information_changeset(info)
1041 |> update_and_set_cache()
1045 defp follow_information_changeset(user, params) do
1052 :hide_followers_count,
1057 def update_follower_count(%User{} = user) do
1058 if user.local or !Pleroma.Config.get([:instance, :external_user_synchronization]) do
1059 follower_count_query =
1060 User.Query.build(%{followers: user, deactivated: false})
1061 |> select([u], %{count: count(u.id)})
1064 |> where(id: ^user.id)
1065 |> join(:inner, [u], s in subquery(follower_count_query))
1067 set: [follower_count: s.count]
1070 |> Repo.update_all([])
1072 {1, [user]} -> set_cache(user)
1076 {:ok, maybe_fetch_follow_information(user)}
1080 @spec update_following_count(User.t()) :: User.t()
1081 def update_following_count(%User{local: false} = user) do
1082 if Pleroma.Config.get([:instance, :external_user_synchronization]) do
1083 maybe_fetch_follow_information(user)
1089 def update_following_count(%User{local: true} = user) do
1090 following_count = FollowingRelationship.following_count(user)
1093 |> follow_information_changeset(%{following_count: following_count})
1097 def set_unread_conversation_count(%User{local: true} = user) do
1098 unread_query = Participation.unread_conversation_count_for_user(user)
1101 |> join(:inner, [u], p in subquery(unread_query))
1103 set: [unread_conversation_count: p.count]
1105 |> where([u], u.id == ^user.id)
1107 |> Repo.update_all([])
1109 {1, [user]} -> set_cache(user)
1114 def set_unread_conversation_count(user), do: {:ok, user}
1116 def increment_unread_conversation_count(conversation, %User{local: true} = user) do
1118 Participation.unread_conversation_count_for_user(user)
1119 |> where([p], p.conversation_id == ^conversation.id)
1122 |> join(:inner, [u], p in subquery(unread_query))
1124 inc: [unread_conversation_count: 1]
1126 |> where([u], u.id == ^user.id)
1127 |> where([u, p], p.count == 0)
1129 |> Repo.update_all([])
1131 {1, [user]} -> set_cache(user)
1136 def increment_unread_conversation_count(_, user), do: {:ok, user}
1138 @spec get_users_from_set([String.t()], boolean()) :: [User.t()]
1139 def get_users_from_set(ap_ids, local_only \\ true) do
1140 criteria = %{ap_id: ap_ids, deactivated: false}
1141 criteria = if local_only, do: Map.put(criteria, :local, true), else: criteria
1143 User.Query.build(criteria)
1147 @spec get_recipients_from_activity(Activity.t()) :: [User.t()]
1148 def get_recipients_from_activity(%Activity{recipients: to}) do
1149 User.Query.build(%{recipients_from_activity: to, local: true, deactivated: false})
1153 @spec mute(User.t(), User.t(), boolean()) ::
1154 {:ok, list(UserRelationship.t())} | {:error, String.t()}
1155 def mute(%User{} = muter, %User{} = mutee, notifications? \\ true) do
1156 add_to_mutes(muter, mutee, notifications?)
1159 def unmute(%User{} = muter, %User{} = mutee) do
1160 remove_from_mutes(muter, mutee)
1163 def subscribe(%User{} = subscriber, %User{} = target) do
1164 deny_follow_blocked = Pleroma.Config.get([:user, :deny_follow_blocked])
1166 if blocks?(target, subscriber) and deny_follow_blocked do
1167 {:error, "Could not subscribe: #{target.nickname} is blocking you"}
1169 # Note: the relationship is inverse: subscriber acts as relationship target
1170 UserRelationship.create_inverse_subscription(target, subscriber)
1174 def subscribe(%User{} = subscriber, %{ap_id: ap_id}) do
1175 with %User{} = subscribee <- get_cached_by_ap_id(ap_id) do
1176 subscribe(subscriber, subscribee)
1180 def unsubscribe(%User{} = unsubscriber, %User{} = target) do
1181 # Note: the relationship is inverse: subscriber acts as relationship target
1182 UserRelationship.delete_inverse_subscription(target, unsubscriber)
1185 def unsubscribe(%User{} = unsubscriber, %{ap_id: ap_id}) do
1186 with %User{} = user <- get_cached_by_ap_id(ap_id) do
1187 unsubscribe(unsubscriber, user)
1191 def block(%User{} = blocker, %User{} = blocked) do
1192 # sever any follow relationships to prevent leaks per activitypub (Pleroma issue #213)
1194 if following?(blocker, blocked) do
1195 {:ok, blocker, _} = unfollow(blocker, blocked)
1201 # clear any requested follows as well
1203 case CommonAPI.reject_follow_request(blocked, blocker) do
1204 {:ok, %User{} = updated_blocked} -> updated_blocked
1208 unsubscribe(blocked, blocker)
1210 if following?(blocked, blocker), do: unfollow(blocked, blocker)
1212 {:ok, blocker} = update_follower_count(blocker)
1213 {:ok, blocker, _} = Participation.mark_all_as_read(blocker, blocked)
1214 add_to_block(blocker, blocked)
1217 # helper to handle the block given only an actor's AP id
1218 def block(%User{} = blocker, %{ap_id: ap_id}) do
1219 block(blocker, get_cached_by_ap_id(ap_id))
1222 def unblock(%User{} = blocker, %User{} = blocked) do
1223 remove_from_block(blocker, blocked)
1226 # helper to handle the block given only an actor's AP id
1227 def unblock(%User{} = blocker, %{ap_id: ap_id}) do
1228 unblock(blocker, get_cached_by_ap_id(ap_id))
1231 def mutes?(nil, _), do: false
1232 def mutes?(%User{} = user, %User{} = target), do: mutes_user?(user, target)
1234 def mutes_user?(%User{} = user, %User{} = target) do
1235 UserRelationship.mute_exists?(user, target)
1238 @spec muted_notifications?(User.t() | nil, User.t() | map()) :: boolean()
1239 def muted_notifications?(nil, _), do: false
1241 def muted_notifications?(%User{} = user, %User{} = target),
1242 do: UserRelationship.notification_mute_exists?(user, target)
1244 def blocks?(nil, _), do: false
1246 def blocks?(%User{} = user, %User{} = target) do
1247 blocks_user?(user, target) ||
1248 (!User.following?(user, target) && blocks_domain?(user, target))
1251 def blocks_user?(%User{} = user, %User{} = target) do
1252 UserRelationship.block_exists?(user, target)
1255 def blocks_user?(_, _), do: false
1257 def blocks_domain?(%User{} = user, %User{} = target) do
1258 domain_blocks = Pleroma.Web.ActivityPub.MRF.subdomains_regex(user.domain_blocks)
1259 %{host: host} = URI.parse(target.ap_id)
1260 Pleroma.Web.ActivityPub.MRF.subdomain_match?(domain_blocks, host)
1263 def blocks_domain?(_, _), do: false
1265 def subscribed_to?(%User{} = user, %User{} = target) do
1266 # Note: the relationship is inverse: subscriber acts as relationship target
1267 UserRelationship.inverse_subscription_exists?(target, user)
1270 def subscribed_to?(%User{} = user, %{ap_id: ap_id}) do
1271 with %User{} = target <- get_cached_by_ap_id(ap_id) do
1272 subscribed_to?(user, target)
1277 Returns map of outgoing (blocked, muted etc.) relationships' user AP IDs by relation type.
1278 E.g. `outgoing_relationships_ap_ids(user, [:block])` -> `%{block: ["https://some.site/users/userapid"]}`
1280 @spec outgoing_relationships_ap_ids(User.t(), list(atom())) :: %{atom() => list(String.t())}
1281 def outgoing_relationships_ap_ids(_user, []), do: %{}
1283 def outgoing_relationships_ap_ids(nil, _relationship_types), do: %{}
1285 def outgoing_relationships_ap_ids(%User{} = user, relationship_types)
1286 when is_list(relationship_types) do
1289 |> assoc(:outgoing_relationships)
1290 |> join(:inner, [user_rel], u in assoc(user_rel, :target))
1291 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1292 |> select([user_rel, u], [user_rel.relationship_type, fragment("array_agg(?)", u.ap_id)])
1293 |> group_by([user_rel, u], user_rel.relationship_type)
1295 |> Enum.into(%{}, fn [k, v] -> {k, v} end)
1300 fn rel_type -> {rel_type, db_result[rel_type] || []} end
1304 def incoming_relationships_ungrouped_ap_ids(user, relationship_types, ap_ids \\ nil)
1306 def incoming_relationships_ungrouped_ap_ids(_user, [], _ap_ids), do: []
1308 def incoming_relationships_ungrouped_ap_ids(nil, _relationship_types, _ap_ids), do: []
1310 def incoming_relationships_ungrouped_ap_ids(%User{} = user, relationship_types, ap_ids)
1311 when is_list(relationship_types) do
1313 |> assoc(:incoming_relationships)
1314 |> join(:inner, [user_rel], u in assoc(user_rel, :source))
1315 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1316 |> maybe_filter_on_ap_id(ap_ids)
1317 |> select([user_rel, u], u.ap_id)
1322 defp maybe_filter_on_ap_id(query, ap_ids) when is_list(ap_ids) do
1323 where(query, [user_rel, u], u.ap_id in ^ap_ids)
1326 defp maybe_filter_on_ap_id(query, _ap_ids), do: query
1328 def deactivate_async(user, status \\ true) do
1329 BackgroundWorker.enqueue("deactivate_user", %{"user_id" => user.id, "status" => status})
1332 def deactivate(user, status \\ true)
1334 def deactivate(users, status) when is_list(users) do
1335 Repo.transaction(fn ->
1336 for user <- users, do: deactivate(user, status)
1340 def deactivate(%User{} = user, status) do
1341 with {:ok, user} <- set_activation_status(user, status) do
1344 |> Enum.filter(& &1.local)
1345 |> Enum.each(fn follower ->
1346 follower |> update_following_count() |> set_cache()
1349 # Only update local user counts, remote will be update during the next pull.
1352 |> Enum.filter(& &1.local)
1353 |> Enum.each(&update_follower_count/1)
1359 def update_notification_settings(%User{} = user, settings) do
1361 |> cast(%{notification_settings: settings}, [])
1362 |> cast_embed(:notification_settings)
1363 |> validate_required([:notification_settings])
1364 |> update_and_set_cache()
1367 def delete(users) when is_list(users) do
1368 for user <- users, do: delete(user)
1371 def delete(%User{} = user) do
1372 BackgroundWorker.enqueue("delete_user", %{"user_id" => user.id})
1375 def perform(:force_password_reset, user), do: force_password_reset(user)
1377 @spec perform(atom(), User.t()) :: {:ok, User.t()}
1378 def perform(:delete, %User{} = user) do
1379 {:ok, _user} = ActivityPub.delete(user)
1381 # Remove all relationships
1384 |> Enum.each(fn follower ->
1385 ActivityPub.unfollow(follower, user)
1386 unfollow(follower, user)
1391 |> Enum.each(fn followed ->
1392 ActivityPub.unfollow(user, followed)
1393 unfollow(user, followed)
1396 delete_user_activities(user)
1397 invalidate_cache(user)
1401 def perform(:deactivate_async, user, status), do: deactivate(user, status)
1403 @spec perform(atom(), User.t(), list()) :: list() | {:error, any()}
1404 def perform(:blocks_import, %User{} = blocker, blocked_identifiers)
1405 when is_list(blocked_identifiers) do
1407 blocked_identifiers,
1408 fn blocked_identifier ->
1409 with {:ok, %User{} = blocked} <- get_or_fetch(blocked_identifier),
1410 {:ok, _user_block} <- block(blocker, blocked),
1411 {:ok, _} <- ActivityPub.block(blocker, blocked) do
1415 Logger.debug("blocks_import failed for #{blocked_identifier} with: #{inspect(err)}")
1422 def perform(:follow_import, %User{} = follower, followed_identifiers)
1423 when is_list(followed_identifiers) do
1425 followed_identifiers,
1426 fn followed_identifier ->
1427 with {:ok, %User{} = followed} <- get_or_fetch(followed_identifier),
1428 {:ok, follower} <- maybe_direct_follow(follower, followed),
1429 {:ok, _} <- ActivityPub.follow(follower, followed) do
1433 Logger.debug("follow_import failed for #{followed_identifier} with: #{inspect(err)}")
1440 @spec external_users_query() :: Ecto.Query.t()
1441 def external_users_query do
1449 @spec external_users(keyword()) :: [User.t()]
1450 def external_users(opts \\ []) do
1452 external_users_query()
1453 |> select([u], struct(u, [:id, :ap_id]))
1457 do: where(query, [u], u.id > ^opts[:max_id]),
1462 do: limit(query, ^opts[:limit]),
1468 def blocks_import(%User{} = blocker, blocked_identifiers) when is_list(blocked_identifiers) do
1469 BackgroundWorker.enqueue("blocks_import", %{
1470 "blocker_id" => blocker.id,
1471 "blocked_identifiers" => blocked_identifiers
1475 def follow_import(%User{} = follower, followed_identifiers)
1476 when is_list(followed_identifiers) do
1477 BackgroundWorker.enqueue("follow_import", %{
1478 "follower_id" => follower.id,
1479 "followed_identifiers" => followed_identifiers
1483 def delete_user_activities(%User{ap_id: ap_id}) do
1485 |> Activity.Queries.by_actor()
1486 |> RepoStreamer.chunk_stream(50)
1487 |> Stream.each(fn activities -> Enum.each(activities, &delete_activity/1) end)
1491 defp delete_activity(%{data: %{"type" => "Create"}} = activity) do
1493 |> Object.normalize()
1494 |> ActivityPub.delete()
1497 defp delete_activity(%{data: %{"type" => "Like"}} = activity) do
1498 object = Object.normalize(activity)
1501 |> get_cached_by_ap_id()
1502 |> ActivityPub.unlike(object)
1505 defp delete_activity(%{data: %{"type" => "Announce"}} = activity) do
1506 object = Object.normalize(activity)
1509 |> get_cached_by_ap_id()
1510 |> ActivityPub.unannounce(object)
1513 defp delete_activity(_activity), do: "Doing nothing"
1515 def html_filter_policy(%User{no_rich_text: true}) do
1516 Pleroma.HTML.Scrubber.TwitterText
1519 def html_filter_policy(_), do: Pleroma.Config.get([:markup, :scrub_policy])
1521 def fetch_by_ap_id(ap_id), do: ActivityPub.make_user_from_ap_id(ap_id)
1523 def get_or_fetch_by_ap_id(ap_id) do
1524 user = get_cached_by_ap_id(ap_id)
1526 if !is_nil(user) and !needs_update?(user) do
1529 fetch_by_ap_id(ap_id)
1534 Creates an internal service actor by URI if missing.
1535 Optionally takes nickname for addressing.
1537 @spec get_or_create_service_actor_by_ap_id(String.t(), String.t()) :: User.t() | nil
1538 def get_or_create_service_actor_by_ap_id(uri, nickname) do
1540 case get_cached_by_ap_id(uri) do
1542 with {:error, %{errors: errors}} <- create_service_actor(uri, nickname) do
1543 Logger.error("Cannot create service actor: #{uri}/.\n#{inspect(errors)}")
1547 %User{invisible: false} = user ->
1557 @spec set_invisible(User.t()) :: {:ok, User.t()}
1558 defp set_invisible(user) do
1560 |> change(%{invisible: true})
1561 |> update_and_set_cache()
1564 @spec create_service_actor(String.t(), String.t()) ::
1565 {:ok, User.t()} | {:error, Ecto.Changeset.t()}
1566 defp create_service_actor(uri, nickname) do
1572 follower_address: uri <> "/followers"
1575 |> unique_constraint(:nickname)
1581 def public_key(%{source_data: %{"publicKey" => %{"publicKeyPem" => public_key_pem}}}) do
1584 |> :public_key.pem_decode()
1586 |> :public_key.pem_entry_decode()
1591 def public_key(_), do: {:error, "not found key"}
1593 def get_public_key_for_ap_id(ap_id) do
1594 with {:ok, %User{} = user} <- get_or_fetch_by_ap_id(ap_id),
1595 {:ok, public_key} <- public_key(user) do
1602 defp blank?(""), do: nil
1603 defp blank?(n), do: n
1605 def ap_enabled?(%User{local: true}), do: true
1606 def ap_enabled?(%User{ap_enabled: ap_enabled}), do: ap_enabled
1607 def ap_enabled?(_), do: false
1609 @doc "Gets or fetch a user by uri or nickname."
1610 @spec get_or_fetch(String.t()) :: {:ok, User.t()} | {:error, String.t()}
1611 def get_or_fetch("http" <> _host = uri), do: get_or_fetch_by_ap_id(uri)
1612 def get_or_fetch(nickname), do: get_or_fetch_by_nickname(nickname)
1614 # wait a period of time and return newest version of the User structs
1615 # this is because we have synchronous follow APIs and need to simulate them
1616 # with an async handshake
1617 def wait_and_refresh(_, %User{local: true} = a, %User{local: true} = b) do
1618 with %User{} = a <- get_cached_by_id(a.id),
1619 %User{} = b <- get_cached_by_id(b.id) do
1626 def wait_and_refresh(timeout, %User{} = a, %User{} = b) do
1627 with :ok <- :timer.sleep(timeout),
1628 %User{} = a <- get_cached_by_id(a.id),
1629 %User{} = b <- get_cached_by_id(b.id) do
1636 def parse_bio(bio) when is_binary(bio) and bio != "" do
1638 |> CommonUtils.format_input("text/plain", mentions_format: :full)
1642 def parse_bio(_), do: ""
1644 def parse_bio(bio, user) when is_binary(bio) and bio != "" do
1645 # TODO: get profile URLs other than user.ap_id
1646 profile_urls = [user.ap_id]
1649 |> CommonUtils.format_input("text/plain",
1650 mentions_format: :full,
1651 rel: &RelMe.maybe_put_rel_me(&1, profile_urls)
1656 def parse_bio(_, _), do: ""
1658 def tag(user_identifiers, tags) when is_list(user_identifiers) do
1659 Repo.transaction(fn ->
1660 for user_identifier <- user_identifiers, do: tag(user_identifier, tags)
1664 def tag(nickname, tags) when is_binary(nickname),
1665 do: tag(get_by_nickname(nickname), tags)
1667 def tag(%User{} = user, tags),
1668 do: update_tags(user, Enum.uniq((user.tags || []) ++ normalize_tags(tags)))
1670 def untag(user_identifiers, tags) when is_list(user_identifiers) do
1671 Repo.transaction(fn ->
1672 for user_identifier <- user_identifiers, do: untag(user_identifier, tags)
1676 def untag(nickname, tags) when is_binary(nickname),
1677 do: untag(get_by_nickname(nickname), tags)
1679 def untag(%User{} = user, tags),
1680 do: update_tags(user, (user.tags || []) -- normalize_tags(tags))
1682 defp update_tags(%User{} = user, new_tags) do
1683 {:ok, updated_user} =
1685 |> change(%{tags: new_tags})
1686 |> update_and_set_cache()
1691 defp normalize_tags(tags) do
1694 |> Enum.map(&String.downcase/1)
1697 defp local_nickname_regex do
1698 if Pleroma.Config.get([:instance, :extended_nickname_format]) do
1699 @extended_local_nickname_regex
1701 @strict_local_nickname_regex
1705 def local_nickname(nickname_or_mention) do
1708 |> String.split("@")
1712 def full_nickname(nickname_or_mention),
1713 do: String.trim_leading(nickname_or_mention, "@")
1715 def error_user(ap_id) do
1719 nickname: "erroruser@example.com",
1720 inserted_at: NaiveDateTime.utc_now()
1724 @spec all_superusers() :: [User.t()]
1725 def all_superusers do
1726 User.Query.build(%{super_users: true, local: true, deactivated: false})
1730 def muting_reblogs?(%User{} = user, %User{} = target) do
1731 UserRelationship.reblog_mute_exists?(user, target)
1734 def showing_reblogs?(%User{} = user, %User{} = target) do
1735 not muting_reblogs?(user, target)
1739 The function returns a query to get users with no activity for given interval of days.
1740 Inactive users are those who didn't read any notification, or had any activity where
1741 the user is the activity's actor, during `inactivity_threshold` days.
1742 Deactivated users will not appear in this list.
1746 iex> Pleroma.User.list_inactive_users()
1749 @spec list_inactive_users_query(integer()) :: Ecto.Query.t()
1750 def list_inactive_users_query(inactivity_threshold \\ 7) do
1751 negative_inactivity_threshold = -inactivity_threshold
1752 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1753 # Subqueries are not supported in `where` clauses, join gets too complicated.
1754 has_read_notifications =
1755 from(n in Pleroma.Notification,
1756 where: n.seen == true,
1758 having: max(n.updated_at) > datetime_add(^now, ^negative_inactivity_threshold, "day"),
1761 |> Pleroma.Repo.all()
1763 from(u in Pleroma.User,
1764 left_join: a in Pleroma.Activity,
1765 on: u.ap_id == a.actor,
1766 where: not is_nil(u.nickname),
1767 where: u.deactivated != ^true,
1768 where: u.id not in ^has_read_notifications,
1771 max(a.inserted_at) < datetime_add(^now, ^negative_inactivity_threshold, "day") or
1772 is_nil(max(a.inserted_at))
1777 Enable or disable email notifications for user
1781 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => false}}, "digest", true)
1782 Pleroma.User{email_notifications: %{"digest" => true}}
1784 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => true}}, "digest", false)
1785 Pleroma.User{email_notifications: %{"digest" => false}}
1787 @spec switch_email_notifications(t(), String.t(), boolean()) ::
1788 {:ok, t()} | {:error, Ecto.Changeset.t()}
1789 def switch_email_notifications(user, type, status) do
1790 User.update_email_notifications(user, %{type => status})
1794 Set `last_digest_emailed_at` value for the user to current time
1796 @spec touch_last_digest_emailed_at(t()) :: t()
1797 def touch_last_digest_emailed_at(user) do
1798 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1800 {:ok, updated_user} =
1802 |> change(%{last_digest_emailed_at: now})
1803 |> update_and_set_cache()
1808 @spec toggle_confirmation(User.t()) :: {:ok, User.t()} | {:error, Changeset.t()}
1809 def toggle_confirmation(%User{} = user) do
1811 |> confirmation_changeset(need_confirmation: !user.confirmation_pending)
1812 |> update_and_set_cache()
1815 @spec toggle_confirmation([User.t()]) :: [{:ok, User.t()} | {:error, Changeset.t()}]
1816 def toggle_confirmation(users) do
1817 Enum.map(users, &toggle_confirmation/1)
1820 def get_mascot(%{mascot: %{} = mascot}) when not is_nil(mascot) do
1824 def get_mascot(%{mascot: mascot}) when is_nil(mascot) do
1825 # use instance-default
1826 config = Pleroma.Config.get([:assets, :mascots])
1827 default_mascot = Pleroma.Config.get([:assets, :default_mascot])
1828 mascot = Keyword.get(config, default_mascot)
1831 "id" => "default-mascot",
1832 "url" => mascot[:url],
1833 "preview_url" => mascot[:url],
1835 "mime_type" => mascot[:mime_type]
1840 def ensure_keys_present(%{keys: keys} = user) when not is_nil(keys), do: {:ok, user}
1842 def ensure_keys_present(%User{} = user) do
1843 with {:ok, pem} <- Keys.generate_rsa_pem() do
1845 |> cast(%{keys: pem}, [:keys])
1846 |> validate_required([:keys])
1847 |> update_and_set_cache()
1851 def get_ap_ids_by_nicknames(nicknames) do
1853 where: u.nickname in ^nicknames,
1859 defdelegate search(query, opts \\ []), to: User.Search
1861 defp put_password_hash(
1862 %Ecto.Changeset{valid?: true, changes: %{password: password}} = changeset
1864 change(changeset, password_hash: Pbkdf2.hashpwsalt(password))
1867 defp put_password_hash(changeset), do: changeset
1869 def is_internal_user?(%User{nickname: nil}), do: true
1870 def is_internal_user?(%User{local: true, nickname: "internal." <> _}), do: true
1871 def is_internal_user?(_), do: false
1873 # A hack because user delete activities have a fake id for whatever reason
1874 # TODO: Get rid of this
1875 def get_delivered_users_by_object_id("pleroma:fake_object_id"), do: []
1877 def get_delivered_users_by_object_id(object_id) do
1879 inner_join: delivery in assoc(u, :deliveries),
1880 where: delivery.object_id == ^object_id
1885 def change_email(user, email) do
1887 |> cast(%{email: email}, [:email])
1888 |> validate_required([:email])
1889 |> unique_constraint(:email)
1890 |> validate_format(:email, @email_regex)
1891 |> update_and_set_cache()
1894 # Internal function; public one is `deactivate/2`
1895 defp set_activation_status(user, deactivated) do
1897 |> cast(%{deactivated: deactivated}, [:deactivated])
1898 |> update_and_set_cache()
1901 def update_banner(user, banner) do
1903 |> cast(%{banner: banner}, [:banner])
1904 |> update_and_set_cache()
1907 def update_background(user, background) do
1909 |> cast(%{background: background}, [:background])
1910 |> update_and_set_cache()
1913 def update_source_data(user, source_data) do
1915 |> cast(%{source_data: source_data}, [:source_data])
1916 |> update_and_set_cache()
1919 def roles(%{is_moderator: is_moderator, is_admin: is_admin}) do
1922 moderator: is_moderator
1926 # ``fields`` is an array of mastodon profile field, containing ``{"name": "…", "value": "…"}``.
1927 # For example: [{"name": "Pronoun", "value": "she/her"}, …]
1928 def fields(%{fields: nil, source_data: %{"attachment" => attachment}}) do
1929 limit = Pleroma.Config.get([:instance, :max_remote_account_fields], 0)
1932 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1933 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1937 def fields(%{fields: nil}), do: []
1939 def fields(%{fields: fields}), do: fields
1941 def validate_fields(changeset, remote? \\ false) do
1942 limit_name = if remote?, do: :max_remote_account_fields, else: :max_account_fields
1943 limit = Pleroma.Config.get([:instance, limit_name], 0)
1946 |> validate_length(:fields, max: limit)
1947 |> validate_change(:fields, fn :fields, fields ->
1948 if Enum.all?(fields, &valid_field?/1) do
1956 defp valid_field?(%{"name" => name, "value" => value}) do
1957 name_limit = Pleroma.Config.get([:instance, :account_field_name_length], 255)
1958 value_limit = Pleroma.Config.get([:instance, :account_field_value_length], 255)
1960 is_binary(name) && is_binary(value) && String.length(name) <= name_limit &&
1961 String.length(value) <= value_limit
1964 defp valid_field?(_), do: false
1966 defp truncate_field(%{"name" => name, "value" => value}) do
1968 String.split_at(name, Pleroma.Config.get([:instance, :account_field_name_length], 255))
1971 String.split_at(value, Pleroma.Config.get([:instance, :account_field_value_length], 255))
1973 %{"name" => name, "value" => value}
1976 def admin_api_update(user, params) do
1983 |> update_and_set_cache()
1986 @doc "Signs user out of all applications"
1987 def global_sign_out(user) do
1988 OAuth.Authorization.delete_user_authorizations(user)
1989 OAuth.Token.delete_user_tokens(user)
1992 def mascot_update(user, url) do
1994 |> cast(%{mascot: url}, [:mascot])
1995 |> validate_required([:mascot])
1996 |> update_and_set_cache()
1999 def mastodon_settings_update(user, settings) do
2001 |> cast(%{settings: settings}, [:settings])
2002 |> validate_required([:settings])
2003 |> update_and_set_cache()
2006 @spec confirmation_changeset(User.t(), keyword()) :: Changeset.t()
2007 def confirmation_changeset(user, need_confirmation: need_confirmation?) do
2009 if need_confirmation? do
2011 confirmation_pending: true,
2012 confirmation_token: :crypto.strong_rand_bytes(32) |> Base.url_encode64()
2016 confirmation_pending: false,
2017 confirmation_token: nil
2021 cast(user, params, [:confirmation_pending, :confirmation_token])
2024 def add_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2025 if id not in user.pinned_activities do
2026 max_pinned_statuses = Pleroma.Config.get([:instance, :max_pinned_statuses], 0)
2027 params = %{pinned_activities: user.pinned_activities ++ [id]}
2030 |> cast(params, [:pinned_activities])
2031 |> validate_length(:pinned_activities,
2032 max: max_pinned_statuses,
2033 message: "You have already pinned the maximum number of statuses"
2038 |> update_and_set_cache()
2041 def remove_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2042 params = %{pinned_activities: List.delete(user.pinned_activities, id)}
2045 |> cast(params, [:pinned_activities])
2046 |> update_and_set_cache()
2049 def update_email_notifications(user, settings) do
2050 email_notifications =
2051 user.email_notifications
2052 |> Map.merge(settings)
2053 |> Map.take(["digest"])
2055 params = %{email_notifications: email_notifications}
2056 fields = [:email_notifications]
2059 |> cast(params, fields)
2060 |> validate_required(fields)
2061 |> update_and_set_cache()
2064 defp set_domain_blocks(user, domain_blocks) do
2065 params = %{domain_blocks: domain_blocks}
2068 |> cast(params, [:domain_blocks])
2069 |> validate_required([:domain_blocks])
2070 |> update_and_set_cache()
2073 def block_domain(user, domain_blocked) do
2074 set_domain_blocks(user, Enum.uniq([domain_blocked | user.domain_blocks]))
2077 def unblock_domain(user, domain_blocked) do
2078 set_domain_blocks(user, List.delete(user.domain_blocks, domain_blocked))
2081 @spec add_to_block(User.t(), User.t()) ::
2082 {:ok, UserRelationship.t()} | {:error, Ecto.Changeset.t()}
2083 defp add_to_block(%User{} = user, %User{} = blocked) do
2084 UserRelationship.create_block(user, blocked)
2087 @spec add_to_block(User.t(), User.t()) ::
2088 {:ok, UserRelationship.t()} | {:ok, nil} | {:error, Ecto.Changeset.t()}
2089 defp remove_from_block(%User{} = user, %User{} = blocked) do
2090 UserRelationship.delete_block(user, blocked)
2093 defp add_to_mutes(%User{} = user, %User{} = muted_user, notifications?) do
2094 with {:ok, user_mute} <- UserRelationship.create_mute(user, muted_user),
2095 {:ok, user_notification_mute} <-
2096 (notifications? && UserRelationship.create_notification_mute(user, muted_user)) ||
2098 {:ok, Enum.filter([user_mute, user_notification_mute], & &1)}
2102 defp remove_from_mutes(user, %User{} = muted_user) do
2103 with {:ok, user_mute} <- UserRelationship.delete_mute(user, muted_user),
2104 {:ok, user_notification_mute} <-
2105 UserRelationship.delete_notification_mute(user, muted_user) do
2106 {:ok, [user_mute, user_notification_mute]}
2110 def set_invisible(user, invisible) do
2111 params = %{invisible: invisible}
2114 |> cast(params, [:invisible])
2115 |> validate_required([:invisible])
2116 |> update_and_set_cache()
2119 def sanitize_html(%User{} = user) do
2120 sanitize_html(user, nil)
2123 # User data that mastodon isn't filtering (treated as plaintext):
2126 def sanitize_html(%User{} = user, filter) do
2130 |> Enum.map(fn %{"name" => name, "value" => value} ->
2133 "value" => HTML.filter_tags(value, Pleroma.HTML.Scrubber.LinksOnly)
2138 |> Map.put(:bio, HTML.filter_tags(user.bio, filter))
2139 |> Map.put(:fields, fields)