1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.ActivityPub do
7 alias Pleroma.Activity.Ir.Topics
9 alias Pleroma.Conversation
10 alias Pleroma.Notification
12 alias Pleroma.Object.Containment
13 alias Pleroma.Object.Fetcher
14 alias Pleroma.Pagination
18 alias Pleroma.Web.ActivityPub.MRF
19 alias Pleroma.Web.ActivityPub.Transmogrifier
20 alias Pleroma.Web.ActivityPub.Utils
21 alias Pleroma.Web.Streamer
22 alias Pleroma.Web.WebFinger
23 alias Pleroma.Workers.BackgroundWorker
26 import Pleroma.Web.ActivityPub.Utils
27 import Pleroma.Web.ActivityPub.Visibility
30 require Pleroma.Constants
32 # For Announce activities, we filter the recipients based on following status for any actors
33 # that match actual users. See issue #164 for more information about why this is necessary.
34 defp get_recipients(%{"type" => "Announce"} = data) do
35 to = Map.get(data, "to", [])
36 cc = Map.get(data, "cc", [])
37 bcc = Map.get(data, "bcc", [])
38 actor = User.get_cached_by_ap_id(data["actor"])
41 Enum.filter(Enum.concat([to, cc, bcc]), fn recipient ->
42 case User.get_cached_by_ap_id(recipient) do
44 user -> User.following?(user, actor)
51 defp get_recipients(%{"type" => "Create"} = data) do
52 to = Map.get(data, "to", [])
53 cc = Map.get(data, "cc", [])
54 bcc = Map.get(data, "bcc", [])
55 actor = Map.get(data, "actor", [])
56 recipients = [to, cc, bcc, [actor]] |> Enum.concat() |> Enum.uniq()
60 defp get_recipients(data) do
61 to = Map.get(data, "to", [])
62 cc = Map.get(data, "cc", [])
63 bcc = Map.get(data, "bcc", [])
64 recipients = Enum.concat([to, cc, bcc])
68 defp check_actor_is_active(actor) do
69 if not is_nil(actor) do
70 with user <- User.get_cached_by_ap_id(actor),
71 false <- user.info.deactivated do
81 defp check_remote_limit(%{"object" => %{"content" => content}}) when not is_nil(content) do
82 limit = Config.get([:instance, :remote_limit])
83 String.length(content) <= limit
86 defp check_remote_limit(_), do: true
88 def increase_note_count_if_public(actor, object) do
89 if is_public?(object), do: User.increase_note_count(actor), else: {:ok, actor}
92 def decrease_note_count_if_public(actor, object) do
93 if is_public?(object), do: User.decrease_note_count(actor), else: {:ok, actor}
96 def increase_replies_count_if_reply(%{
97 "object" => %{"inReplyTo" => reply_ap_id} = object,
100 if is_public?(object) do
101 Object.increase_replies_count(reply_ap_id)
105 def increase_replies_count_if_reply(_create_data), do: :noop
107 def decrease_replies_count_if_reply(%Object{
108 data: %{"inReplyTo" => reply_ap_id} = object
110 if is_public?(object) do
111 Object.decrease_replies_count(reply_ap_id)
115 def decrease_replies_count_if_reply(_object), do: :noop
117 def increase_poll_votes_if_vote(%{
118 "object" => %{"inReplyTo" => reply_ap_id, "name" => name},
121 Object.increase_vote_count(reply_ap_id, name)
124 def increase_poll_votes_if_vote(_create_data), do: :noop
126 # TODO rewrite in with style
127 @spec persist(map(), keyword()) :: {:ok, Activity.t() | Object.t()}
128 def persist(object, meta) do
129 local = Keyword.fetch!(meta, :local)
130 {recipients, _, _} = get_recipients(object)
133 Repo.insert(%Activity{
136 recipients: recipients,
137 actor: object["actor"]
140 {:ok, activity, meta}
143 def insert(map, local \\ true, fake \\ false, bypass_actor_check \\ false) when is_map(map) do
144 with nil <- Activity.normalize(map),
145 map <- lazy_put_activity_defaults(map, fake),
146 true <- bypass_actor_check || check_actor_is_active(map["actor"]),
147 {_, true} <- {:remote_limit_error, check_remote_limit(map)},
148 {:ok, map} <- MRF.filter(map),
149 {recipients, _, _} = get_recipients(map),
151 {:fake, false, map, recipients} <- {:fake, fake, map, recipients},
152 :ok <- Containment.contain_child(map),
153 {:ok, map, object} <- insert_full_object(map) do
155 Repo.insert(%Activity{
159 recipients: recipients
162 # Splice in the child object if we have one.
164 if not is_nil(object) do
165 Map.put(activity, :object, object)
170 BackgroundWorker.enqueue("fetch_data_for_activity", %{"activity_id" => activity.id})
172 Notification.create_notifications(activity)
176 |> Conversation.create_or_bump_for()
177 |> get_participations()
180 stream_out_participations(participations)
183 %Activity{} = activity ->
186 {:fake, true, map, recipients} ->
187 activity = %Activity{
191 recipients: recipients,
195 Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity)
203 defp get_participations({:ok, %{participations: participations}}), do: participations
204 defp get_participations(_), do: []
206 def stream_out_participations(participations) do
209 |> Repo.preload(:user)
211 Streamer.stream("participation", participations)
214 def stream_out_participations(%Object{data: %{"context" => context}}, user) do
215 with %Conversation{} = conversation <- Conversation.get_for_ap_id(context),
216 conversation = Repo.preload(conversation, :participations),
218 fetch_latest_activity_id_for_context(conversation.ap_id, %{
220 "blocking_user" => user
222 if last_activity_id do
223 stream_out_participations(conversation.participations)
228 def stream_out_participations(_, _), do: :noop
230 def stream_out(%Activity{data: %{"type" => data_type}} = activity)
231 when data_type in ["Create", "Announce", "Delete"] do
233 |> Topics.get_activity_topics()
234 |> Streamer.stream(activity)
237 def stream_out(_activity) do
241 def create(%{to: to, actor: actor, context: context, object: object} = params, fake \\ false) do
242 additional = params[:additional] || %{}
243 # only accept false as false value
244 local = !(params[:local] == false)
245 published = params[:published]
249 %{to: to, actor: actor, published: published, context: context, object: object},
252 {:ok, activity} <- insert(create_data, local, fake),
253 {:fake, false, activity} <- {:fake, fake, activity},
254 _ <- increase_replies_count_if_reply(create_data),
255 _ <- increase_poll_votes_if_vote(create_data),
256 # Changing note count prior to enqueuing federation task in order to avoid
257 # race conditions on updating user.info
258 {:ok, _actor} <- increase_note_count_if_public(actor, activity),
259 :ok <- maybe_federate(activity) do
262 {:fake, true, activity} ->
270 def listen(%{to: to, actor: actor, context: context, object: object} = params) do
271 additional = params[:additional] || %{}
272 # only accept false as false value
273 local = !(params[:local] == false)
274 published = params[:published]
278 %{to: to, actor: actor, published: published, context: context, object: object},
281 {:ok, activity} <- insert(listen_data, local),
282 :ok <- maybe_federate(activity) do
290 def accept(params) do
291 accept_or_reject("Accept", params)
294 def reject(params) do
295 accept_or_reject("Reject", params)
298 def accept_or_reject(type, %{to: to, actor: actor, object: object} = params) do
299 local = Map.get(params, :local, true)
300 activity_id = Map.get(params, :activity_id, nil)
303 %{"to" => to, "type" => type, "actor" => actor.ap_id, "object" => object}
304 |> Utils.maybe_put("id", activity_id),
305 {:ok, activity} <- insert(data, local),
306 :ok <- maybe_federate(activity) do
311 def update(%{to: to, cc: cc, actor: actor, object: object} = params) do
312 local = !(params[:local] == false)
313 activity_id = params[:activity_id]
322 data <- Utils.maybe_put(data, "id", activity_id),
323 {:ok, activity} <- insert(data, local),
324 :ok <- maybe_federate(activity) do
329 # TODO: This is weird, maybe we shouldn't check here if we can make the activity.
331 %User{ap_id: ap_id} = user,
332 %Object{data: %{"id" => _}} = object,
336 with nil <- get_existing_like(ap_id, object),
337 like_data <- make_like_data(user, object, activity_id),
338 {:ok, activity} <- insert(like_data, local),
339 {:ok, object} <- add_like_to_object(activity, object),
340 :ok <- maybe_federate(activity) do
341 {:ok, activity, object}
343 %Activity{} = activity -> {:ok, activity, object}
344 error -> {:error, error}
348 def unlike(%User{} = actor, %Object{} = object, activity_id \\ nil, local \\ true) do
349 with %Activity{} = like_activity <- get_existing_like(actor.ap_id, object),
350 unlike_data <- make_unlike_data(actor, like_activity, activity_id),
351 {:ok, unlike_activity} <- insert(unlike_data, local),
352 {:ok, _activity} <- Repo.delete(like_activity),
353 {:ok, object} <- remove_like_from_object(like_activity, object),
354 :ok <- maybe_federate(unlike_activity) do
355 {:ok, unlike_activity, like_activity, object}
362 %User{ap_id: _} = user,
363 %Object{data: %{"id" => _}} = object,
368 with true <- is_announceable?(object, user, public),
369 announce_data <- make_announce_data(user, object, activity_id, public),
370 {:ok, activity} <- insert(announce_data, local),
371 {:ok, object} <- add_announce_to_object(activity, object),
372 :ok <- maybe_federate(activity) do
373 {:ok, activity, object}
375 error -> {:error, error}
385 with %Activity{} = announce_activity <- get_existing_announce(actor.ap_id, object),
386 unannounce_data <- make_unannounce_data(actor, announce_activity, activity_id),
387 {:ok, unannounce_activity} <- insert(unannounce_data, local),
388 :ok <- maybe_federate(unannounce_activity),
389 {:ok, _activity} <- Repo.delete(announce_activity),
390 {:ok, object} <- remove_announce_from_object(announce_activity, object) do
391 {:ok, unannounce_activity, object}
397 def follow(follower, followed, activity_id \\ nil, local \\ true) do
398 with data <- make_follow_data(follower, followed, activity_id),
399 {:ok, activity} <- insert(data, local),
400 :ok <- maybe_federate(activity),
401 _ <- User.set_follow_state_cache(follower.ap_id, followed.ap_id, activity.data["state"]) do
406 def unfollow(follower, followed, activity_id \\ nil, local \\ true) do
407 with %Activity{} = follow_activity <- fetch_latest_follow(follower, followed),
408 {:ok, follow_activity} <- update_follow_state(follow_activity, "cancelled"),
409 unfollow_data <- make_unfollow_data(follower, followed, follow_activity, activity_id),
410 {:ok, activity} <- insert(unfollow_data, local),
411 :ok <- maybe_federate(activity) do
416 def delete(%User{ap_id: ap_id, follower_address: follower_address} = user) do
418 "to" => [follower_address],
421 "object" => %{"type" => "Person", "id" => ap_id}
423 {:ok, activity} <- insert(data, true, true, true),
424 :ok <- maybe_federate(activity) do
429 def delete(%Object{data: %{"id" => id, "actor" => actor}} = object, options \\ []) do
430 local = Keyword.get(options, :local, true)
431 activity_id = Keyword.get(options, :activity_id, nil)
432 actor = Keyword.get(options, :actor, actor)
434 user = User.get_cached_by_ap_id(actor)
435 to = (object.data["to"] || []) ++ (object.data["cc"] || [])
437 with {:ok, object, activity} <- Object.delete(object),
444 "deleted_activity_id" => activity && activity.id
446 |> maybe_put("id", activity_id),
447 {:ok, activity} <- insert(data, local, false),
448 stream_out_participations(object, user),
449 _ <- decrease_replies_count_if_reply(object),
450 # Changing note count prior to enqueuing federation task in order to avoid
451 # race conditions on updating user.info
452 {:ok, _actor} <- decrease_note_count_if_public(user, object),
453 :ok <- maybe_federate(activity) do
458 @spec block(User.t(), User.t(), String.t() | nil, boolean) :: {:ok, Activity.t() | nil}
459 def block(blocker, blocked, activity_id \\ nil, local \\ true) do
460 outgoing_blocks = Config.get([:activitypub, :outgoing_blocks])
461 unfollow_blocked = Config.get([:activitypub, :unfollow_blocked])
463 if unfollow_blocked do
464 follow_activity = fetch_latest_follow(blocker, blocked)
465 if follow_activity, do: unfollow(blocker, blocked, nil, local)
468 with true <- outgoing_blocks,
469 block_data <- make_block_data(blocker, blocked, activity_id),
470 {:ok, activity} <- insert(block_data, local),
471 :ok <- maybe_federate(activity) do
478 def unblock(blocker, blocked, activity_id \\ nil, local \\ true) do
479 with %Activity{} = block_activity <- fetch_latest_block(blocker, blocked),
480 unblock_data <- make_unblock_data(blocker, blocked, block_activity, activity_id),
481 {:ok, activity} <- insert(unblock_data, local),
482 :ok <- maybe_federate(activity) do
487 @spec flag(map()) :: {:ok, Activity.t()} | any
497 # only accept false as false value
498 local = !(params[:local] == false)
499 forward = !(params[:forward] == false)
501 additional = params[:additional] || %{}
505 Map.merge(additional, %{"to" => [], "cc" => [account.ap_id]})
507 Map.merge(additional, %{"to" => [], "cc" => []})
510 with flag_data <- make_flag_data(params, additional),
511 {:ok, activity} <- insert(flag_data, local),
512 :ok <- maybe_federate(activity) do
513 Enum.each(User.all_superusers(), fn superuser ->
515 |> Pleroma.Emails.AdminEmail.report(actor, account, statuses, content)
516 |> Pleroma.Emails.Mailer.deliver_async()
523 defp fetch_activities_for_context_query(context, opts) do
524 public = [Pleroma.Constants.as_public()]
527 if opts["user"], do: [opts["user"].ap_id | opts["user"].following] ++ public, else: public
529 from(activity in Activity)
530 |> maybe_preload_objects(opts)
531 |> maybe_preload_bookmarks(opts)
532 |> maybe_set_thread_muted_field(opts)
533 |> restrict_blocked(opts)
534 |> restrict_recipients(recipients, opts["user"])
538 "?->>'type' = ? and ?->>'context' = ?",
545 |> exclude_poll_votes(opts)
547 |> order_by([activity], desc: activity.id)
550 @spec fetch_activities_for_context(String.t(), keyword() | map()) :: [Activity.t()]
551 def fetch_activities_for_context(context, opts \\ %{}) do
553 |> fetch_activities_for_context_query(opts)
557 @spec fetch_latest_activity_id_for_context(String.t(), keyword() | map()) ::
558 FlakeId.Ecto.CompatType.t() | nil
559 def fetch_latest_activity_id_for_context(context, opts \\ %{}) do
561 |> fetch_activities_for_context_query(Map.merge(%{"skip_preload" => true}, opts))
567 def fetch_public_activities(opts \\ %{}, pagination \\ :keyset) do
568 opts = Map.drop(opts, ["user"])
570 [Pleroma.Constants.as_public()]
571 |> fetch_activities_query(opts)
572 |> restrict_unlisted()
573 |> Pagination.fetch_paginated(opts, pagination)
577 @valid_visibilities ~w[direct unlisted public private]
579 defp restrict_visibility(query, %{visibility: visibility})
580 when is_list(visibility) do
581 if Enum.all?(visibility, &(&1 in @valid_visibilities)) do
587 "activity_visibility(?, ?, ?) = ANY (?)",
597 Logger.error("Could not restrict visibility to #{visibility}")
601 defp restrict_visibility(query, %{visibility: visibility})
602 when visibility in @valid_visibilities do
606 fragment("activity_visibility(?, ?, ?) = ?", a.actor, a.recipients, a.data, ^visibility)
610 defp restrict_visibility(_query, %{visibility: visibility})
611 when visibility not in @valid_visibilities do
612 Logger.error("Could not restrict visibility to #{visibility}")
615 defp restrict_visibility(query, _visibility), do: query
617 defp restrict_thread_visibility(query, _, %{skip_thread_containment: true} = _),
620 defp restrict_thread_visibility(
622 %{"user" => %User{info: %{skip_thread_containment: true}}},
627 defp restrict_thread_visibility(query, %{"user" => %User{ap_id: ap_id}}, _) do
630 where: fragment("thread_visibility(?, (?)->>'id') = true", ^ap_id, a.data)
634 defp restrict_thread_visibility(query, _, _), do: query
636 def fetch_user_abstract_activities(user, reading_user, params \\ %{}) do
639 |> Map.put("user", reading_user)
640 |> Map.put("actor_id", user.ap_id)
641 |> Map.put("whole_db", true)
644 user_activities_recipients(%{
645 "godmode" => params["godmode"],
646 "reading_user" => reading_user
649 fetch_activities(recipients, params)
653 def fetch_user_activities(user, reading_user, params \\ %{}) do
656 |> Map.put("type", ["Create", "Announce"])
657 |> Map.put("user", reading_user)
658 |> Map.put("actor_id", user.ap_id)
659 |> Map.put("whole_db", true)
660 |> Map.put("pinned_activity_ids", user.info.pinned_activities)
663 user_activities_recipients(%{
664 "godmode" => params["godmode"],
665 "reading_user" => reading_user
668 fetch_activities(recipients, params)
672 defp user_activities_recipients(%{"godmode" => true}) do
676 defp user_activities_recipients(%{"reading_user" => reading_user}) do
678 [Pleroma.Constants.as_public()] ++ [reading_user.ap_id | reading_user.following]
680 [Pleroma.Constants.as_public()]
684 defp restrict_since(query, %{"since_id" => ""}), do: query
686 defp restrict_since(query, %{"since_id" => since_id}) do
687 from(activity in query, where: activity.id > ^since_id)
690 defp restrict_since(query, _), do: query
692 defp restrict_tag_reject(_query, %{"tag_reject" => _tag_reject, "skip_preload" => true}) do
693 raise "Can't use the child object without preloading!"
696 defp restrict_tag_reject(query, %{"tag_reject" => tag_reject})
697 when is_list(tag_reject) and tag_reject != [] do
699 [_activity, object] in query,
700 where: fragment("not (?)->'tag' \\?| (?)", object.data, ^tag_reject)
704 defp restrict_tag_reject(query, _), do: query
706 defp restrict_tag_all(_query, %{"tag_all" => _tag_all, "skip_preload" => true}) do
707 raise "Can't use the child object without preloading!"
710 defp restrict_tag_all(query, %{"tag_all" => tag_all})
711 when is_list(tag_all) and tag_all != [] do
713 [_activity, object] in query,
714 where: fragment("(?)->'tag' \\?& (?)", object.data, ^tag_all)
718 defp restrict_tag_all(query, _), do: query
720 defp restrict_tag(_query, %{"tag" => _tag, "skip_preload" => true}) do
721 raise "Can't use the child object without preloading!"
724 defp restrict_tag(query, %{"tag" => tag}) when is_list(tag) do
726 [_activity, object] in query,
727 where: fragment("(?)->'tag' \\?| (?)", object.data, ^tag)
731 defp restrict_tag(query, %{"tag" => tag}) when is_binary(tag) do
733 [_activity, object] in query,
734 where: fragment("(?)->'tag' \\? (?)", object.data, ^tag)
738 defp restrict_tag(query, _), do: query
740 defp restrict_recipients(query, [], _user), do: query
742 defp restrict_recipients(query, recipients, nil) do
743 from(activity in query, where: fragment("? && ?", ^recipients, activity.recipients))
746 defp restrict_recipients(query, recipients, user) do
749 where: fragment("? && ?", ^recipients, activity.recipients),
750 or_where: activity.actor == ^user.ap_id
754 defp restrict_local(query, %{"local_only" => true}) do
755 from(activity in query, where: activity.local == true)
758 defp restrict_local(query, _), do: query
760 defp restrict_actor(query, %{"actor_id" => actor_id}) do
761 from(activity in query, where: activity.actor == ^actor_id)
764 defp restrict_actor(query, _), do: query
766 defp restrict_type(query, %{"type" => type}) when is_binary(type) do
767 from(activity in query, where: fragment("?->>'type' = ?", activity.data, ^type))
770 defp restrict_type(query, %{"type" => type}) do
771 from(activity in query, where: fragment("?->>'type' = ANY(?)", activity.data, ^type))
774 defp restrict_type(query, _), do: query
776 defp restrict_state(query, %{"state" => state}) do
777 from(activity in query, where: fragment("?->>'state' = ?", activity.data, ^state))
780 defp restrict_state(query, _), do: query
782 defp restrict_favorited_by(query, %{"favorited_by" => ap_id}) do
784 [_activity, object] in query,
785 where: fragment("(?)->'likes' \\? (?)", object.data, ^ap_id)
789 defp restrict_favorited_by(query, _), do: query
791 defp restrict_media(_query, %{"only_media" => _val, "skip_preload" => true}) do
792 raise "Can't use the child object without preloading!"
795 defp restrict_media(query, %{"only_media" => val}) when val == "true" or val == "1" do
797 [_activity, object] in query,
798 where: fragment("not (?)->'attachment' = (?)", object.data, ^[])
802 defp restrict_media(query, _), do: query
804 defp restrict_replies(query, %{"exclude_replies" => val}) when val == "true" or val == "1" do
806 [_activity, object] in query,
807 where: fragment("?->>'inReplyTo' is null", object.data)
811 defp restrict_replies(query, _), do: query
813 defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val == "true" or val == "1" do
814 from(activity in query, where: fragment("?->>'type' != 'Announce'", activity.data))
817 defp restrict_reblogs(query, _), do: query
819 defp restrict_muted(query, %{"with_muted" => val}) when val in [true, "true", "1"], do: query
821 defp restrict_muted(query, %{"muting_user" => %User{info: info}} = opts) do
825 from([activity] in query,
826 where: fragment("not (? = ANY(?))", activity.actor, ^mutes),
827 where: fragment("not (?->'to' \\?| ?)", activity.data, ^mutes)
830 unless opts["skip_preload"] do
831 from([thread_mute: tm] in query, where: is_nil(tm.user_id))
837 defp restrict_muted(query, _), do: query
839 defp restrict_blocked(query, %{"blocking_user" => %User{info: info}}) do
840 blocks = info.blocks || []
841 domain_blocks = info.domain_blocks || []
844 if has_named_binding?(query, :object), do: query, else: Activity.with_joined_object(query)
847 [activity, object: o] in query,
848 where: fragment("not (? = ANY(?))", activity.actor, ^blocks),
849 where: fragment("not (? && ?)", activity.recipients, ^blocks),
852 "not (?->>'type' = 'Announce' and ?->'to' \\?| ?)",
857 where: fragment("not (split_part(?, '/', 3) = ANY(?))", activity.actor, ^domain_blocks),
858 where: fragment("not (split_part(?->>'actor', '/', 3) = ANY(?))", o.data, ^domain_blocks)
862 defp restrict_blocked(query, _), do: query
864 defp restrict_unlisted(query) do
869 "not (coalesce(?->'cc', '{}'::jsonb) \\?| ?)",
871 ^[Pleroma.Constants.as_public()]
876 defp restrict_pinned(query, %{"pinned" => "true", "pinned_activity_ids" => ids}) do
877 from(activity in query, where: activity.id in ^ids)
880 defp restrict_pinned(query, _), do: query
882 defp restrict_muted_reblogs(query, %{"muting_user" => %User{info: info}}) do
883 muted_reblogs = info.muted_reblogs || []
889 "not ( ?->>'type' = 'Announce' and ? = ANY(?))",
897 defp restrict_muted_reblogs(query, _), do: query
899 defp exclude_poll_votes(query, %{"include_poll_votes" => true}), do: query
901 defp exclude_poll_votes(query, _) do
902 if has_named_binding?(query, :object) do
903 from([activity, object: o] in query,
904 where: fragment("not(?->>'type' = ?)", o.data, "Answer")
911 defp exclude_id(query, %{"exclude_id" => id}) when is_binary(id) do
912 from(activity in query, where: activity.id != ^id)
915 defp exclude_id(query, _), do: query
917 defp maybe_preload_objects(query, %{"skip_preload" => true}), do: query
919 defp maybe_preload_objects(query, _) do
921 |> Activity.with_preloaded_object()
924 defp maybe_preload_bookmarks(query, %{"skip_preload" => true}), do: query
926 defp maybe_preload_bookmarks(query, opts) do
928 |> Activity.with_preloaded_bookmark(opts["user"])
931 defp maybe_set_thread_muted_field(query, %{"skip_preload" => true}), do: query
933 defp maybe_set_thread_muted_field(query, opts) do
935 |> Activity.with_set_thread_muted_field(opts["muting_user"] || opts["user"])
938 defp maybe_order(query, %{order: :desc}) do
940 |> order_by(desc: :id)
943 defp maybe_order(query, %{order: :asc}) do
945 |> order_by(asc: :id)
948 defp maybe_order(query, _), do: query
950 def fetch_activities_query(recipients, opts \\ %{}) do
952 skip_thread_containment: Config.get([:instance, :skip_thread_containment])
956 |> maybe_preload_objects(opts)
957 |> maybe_preload_bookmarks(opts)
958 |> maybe_set_thread_muted_field(opts)
960 |> restrict_recipients(recipients, opts["user"])
961 |> restrict_tag(opts)
962 |> restrict_tag_reject(opts)
963 |> restrict_tag_all(opts)
964 |> restrict_since(opts)
965 |> restrict_local(opts)
966 |> restrict_actor(opts)
967 |> restrict_type(opts)
968 |> restrict_state(opts)
969 |> restrict_favorited_by(opts)
970 |> restrict_blocked(opts)
971 |> restrict_muted(opts)
972 |> restrict_media(opts)
973 |> restrict_visibility(opts)
974 |> restrict_thread_visibility(opts, config)
975 |> restrict_replies(opts)
976 |> restrict_reblogs(opts)
977 |> restrict_pinned(opts)
978 |> restrict_muted_reblogs(opts)
979 |> Activity.restrict_deactivated_users()
980 |> exclude_poll_votes(opts)
983 def fetch_activities(recipients, opts \\ %{}, pagination \\ :keyset) do
984 list_memberships = Pleroma.List.memberships(opts["user"])
986 fetch_activities_query(recipients ++ list_memberships, opts)
987 |> Pagination.fetch_paginated(opts, pagination)
989 |> maybe_update_cc(list_memberships, opts["user"])
992 defp maybe_update_cc(activities, list_memberships, %User{ap_id: user_ap_id})
993 when is_list(list_memberships) and length(list_memberships) > 0 do
994 Enum.map(activities, fn
995 %{data: %{"bcc" => bcc}} = activity when is_list(bcc) and length(bcc) > 0 ->
996 if Enum.any?(bcc, &(&1 in list_memberships)) do
997 update_in(activity.data["cc"], &[user_ap_id | &1])
1007 defp maybe_update_cc(activities, _, _), do: activities
1009 def fetch_activities_bounded_query(query, recipients, recipients_with_public) do
1010 from(activity in query,
1012 fragment("? && ?", activity.recipients, ^recipients) or
1013 (fragment("? && ?", activity.recipients, ^recipients_with_public) and
1014 ^Pleroma.Constants.as_public() in activity.recipients)
1018 def fetch_activities_bounded(
1020 recipients_with_public,
1022 pagination \\ :keyset
1024 fetch_activities_query([], opts)
1025 |> fetch_activities_bounded_query(recipients, recipients_with_public)
1026 |> Pagination.fetch_paginated(opts, pagination)
1030 def upload(file, opts \\ []) do
1031 with {:ok, data} <- Upload.store(file, opts) do
1034 Map.put(data, "actor", opts[:actor])
1039 Repo.insert(%Object{data: obj_data})
1043 defp object_to_user_data(data) do
1045 data["icon"]["url"] &&
1048 "url" => [%{"href" => data["icon"]["url"]}]
1052 data["image"]["url"] &&
1055 "url" => [%{"href" => data["image"]["url"]}]
1060 |> Map.get("attachment", [])
1061 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1062 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1064 locked = data["manuallyApprovesFollowers"] || false
1065 data = Transmogrifier.maybe_fix_user_object(data)
1066 discoverable = data["discoverable"] || false
1076 discoverable: discoverable
1080 follower_address: data["followers"],
1081 following_address: data["following"],
1082 bio: data["summary"]
1085 # nickname can be nil because of virtual actors
1087 if data["preferredUsername"] do
1091 "#{data["preferredUsername"]}@#{URI.parse(data["id"]).host}"
1094 Map.put(user_data, :nickname, nil)
1100 def fetch_follow_information_for_user(user) do
1101 with {:ok, following_data} <-
1102 Fetcher.fetch_and_contain_remote_object_from_id(user.following_address),
1103 following_count when is_integer(following_count) <- following_data["totalItems"],
1104 {:ok, hide_follows} <- collection_private(following_data),
1105 {:ok, followers_data} <-
1106 Fetcher.fetch_and_contain_remote_object_from_id(user.follower_address),
1107 followers_count when is_integer(followers_count) <- followers_data["totalItems"],
1108 {:ok, hide_followers} <- collection_private(followers_data) do
1111 hide_follows: hide_follows,
1112 follower_count: followers_count,
1113 following_count: following_count,
1114 hide_followers: hide_followers
1125 defp maybe_update_follow_information(data) do
1126 with {:enabled, true} <-
1127 {:enabled, Pleroma.Config.get([:instance, :external_user_synchronization])},
1128 {:ok, info} <- fetch_follow_information_for_user(data) do
1129 info = Map.merge(data.info, info)
1130 Map.put(data, :info, info)
1132 {:enabled, false} ->
1137 "Follower/Following counter update for #{data.ap_id} failed.\n" <> inspect(e)
1144 defp collection_private(data) do
1145 if is_map(data["first"]) and
1146 data["first"]["type"] in ["CollectionPage", "OrderedCollectionPage"] do
1149 with {:ok, %{"type" => type}} when type in ["CollectionPage", "OrderedCollectionPage"] <-
1150 Fetcher.fetch_and_contain_remote_object_from_id(data["first"]) do
1153 {:error, {:ok, %{status: code}}} when code in [401, 403] ->
1165 def user_data_from_user_object(data) do
1166 with {:ok, data} <- MRF.filter(data),
1167 {:ok, data} <- object_to_user_data(data) do
1174 def fetch_and_prepare_user_from_ap_id(ap_id) do
1175 with {:ok, data} <- Fetcher.fetch_and_contain_remote_object_from_id(ap_id),
1176 {:ok, data} <- user_data_from_user_object(data),
1177 data <- maybe_update_follow_information(data) do
1180 e -> Logger.error("Could not decode user at fetch #{ap_id}, #{inspect(e)}")
1184 def make_user_from_ap_id(ap_id) do
1185 if _user = User.get_cached_by_ap_id(ap_id) do
1186 Transmogrifier.upgrade_user_from_ap_id(ap_id)
1188 with {:ok, data} <- fetch_and_prepare_user_from_ap_id(ap_id) do
1189 User.insert_or_update_user(data)
1196 def make_user_from_nickname(nickname) do
1197 with {:ok, %{"ap_id" => ap_id}} when not is_nil(ap_id) <- WebFinger.finger(nickname) do
1198 make_user_from_ap_id(ap_id)
1200 _e -> {:error, "No AP id in WebFinger"}
1204 # filter out broken threads
1205 def contain_broken_threads(%Activity{} = activity, %User{} = user) do
1206 entire_thread_visible_for_user?(activity, user)
1209 # do post-processing on a specific activity
1210 def contain_activity(%Activity{} = activity, %User{} = user) do
1211 contain_broken_threads(activity, user)
1214 def fetch_direct_messages_query do
1216 |> restrict_type(%{"type" => "Create"})
1217 |> restrict_visibility(%{visibility: "direct"})
1218 |> order_by([activity], asc: activity.id)