1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.ActivityPub do
7 alias Pleroma.Activity.Ir.Topics
9 alias Pleroma.Conversation
10 alias Pleroma.Notification
12 alias Pleroma.Object.Containment
13 alias Pleroma.Object.Fetcher
14 alias Pleroma.Pagination
18 alias Pleroma.Web.ActivityPub.MRF
19 alias Pleroma.Web.ActivityPub.Transmogrifier
20 alias Pleroma.Web.ActivityPub.Utils
21 alias Pleroma.Web.Streamer
22 alias Pleroma.Web.WebFinger
23 alias Pleroma.Workers.BackgroundWorker
26 import Pleroma.Web.ActivityPub.Utils
27 import Pleroma.Web.ActivityPub.Visibility
30 require Pleroma.Constants
32 # For Announce activities, we filter the recipients based on following status for any actors
33 # that match actual users. See issue #164 for more information about why this is necessary.
34 defp get_recipients(%{"type" => "Announce"} = data) do
35 to = Map.get(data, "to", [])
36 cc = Map.get(data, "cc", [])
37 bcc = Map.get(data, "bcc", [])
38 actor = User.get_cached_by_ap_id(data["actor"])
41 Enum.filter(Enum.concat([to, cc, bcc]), fn recipient ->
42 case User.get_cached_by_ap_id(recipient) do
44 user -> User.following?(user, actor)
51 defp get_recipients(%{"type" => "Create"} = data) do
52 to = Map.get(data, "to", [])
53 cc = Map.get(data, "cc", [])
54 bcc = Map.get(data, "bcc", [])
55 actor = Map.get(data, "actor", [])
56 recipients = [to, cc, bcc, [actor]] |> Enum.concat() |> Enum.uniq()
60 defp get_recipients(data) do
61 to = Map.get(data, "to", [])
62 cc = Map.get(data, "cc", [])
63 bcc = Map.get(data, "bcc", [])
64 recipients = Enum.concat([to, cc, bcc])
68 defp check_actor_is_active(actor) do
69 if not is_nil(actor) do
70 with user <- User.get_cached_by_ap_id(actor),
71 false <- user.info.deactivated do
81 defp check_remote_limit(%{"object" => %{"content" => content}}) when not is_nil(content) do
82 limit = Config.get([:instance, :remote_limit])
83 String.length(content) <= limit
86 defp check_remote_limit(_), do: true
88 def increase_note_count_if_public(actor, object) do
89 if is_public?(object), do: User.increase_note_count(actor), else: {:ok, actor}
92 def decrease_note_count_if_public(actor, object) do
93 if is_public?(object), do: User.decrease_note_count(actor), else: {:ok, actor}
96 def increase_replies_count_if_reply(%{
97 "object" => %{"inReplyTo" => reply_ap_id} = object,
100 if is_public?(object) do
101 Object.increase_replies_count(reply_ap_id)
105 def increase_replies_count_if_reply(_create_data), do: :noop
107 def decrease_replies_count_if_reply(%Object{
108 data: %{"inReplyTo" => reply_ap_id} = object
110 if is_public?(object) do
111 Object.decrease_replies_count(reply_ap_id)
115 def decrease_replies_count_if_reply(_object), do: :noop
117 def increase_poll_votes_if_vote(%{
118 "object" => %{"inReplyTo" => reply_ap_id, "name" => name},
121 Object.increase_vote_count(reply_ap_id, name)
124 def increase_poll_votes_if_vote(_create_data), do: :noop
126 def insert(map, local \\ true, fake \\ false, bypass_actor_check \\ false) when is_map(map) do
127 with nil <- Activity.normalize(map),
128 map <- lazy_put_activity_defaults(map, fake),
129 true <- bypass_actor_check || check_actor_is_active(map["actor"]),
130 {_, true} <- {:remote_limit_error, check_remote_limit(map)},
131 {:ok, map} <- MRF.filter(map),
132 {recipients, _, _} = get_recipients(map),
133 {:fake, false, map, recipients} <- {:fake, fake, map, recipients},
134 :ok <- Containment.contain_child(map),
135 {:ok, map, object} <- insert_full_object(map) do
137 Repo.insert(%Activity{
141 recipients: recipients
144 # Splice in the child object if we have one.
146 if not is_nil(object) do
147 Map.put(activity, :object, object)
152 BackgroundWorker.enqueue("fetch_data_for_activity", %{"activity_id" => activity.id})
154 Notification.create_notifications(activity)
158 |> Conversation.create_or_bump_for()
159 |> get_participations()
162 stream_out_participations(participations)
165 %Activity{} = activity ->
168 {:fake, true, map, recipients} ->
169 activity = %Activity{
173 recipients: recipients,
177 Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity)
185 defp get_participations({:ok, %{participations: participations}}), do: participations
186 defp get_participations(_), do: []
188 def stream_out_participations(participations) do
191 |> Repo.preload(:user)
193 Streamer.stream("participation", participations)
196 def stream_out_participations(%Object{data: %{"context" => context}}, user) do
197 with %Conversation{} = conversation <- Conversation.get_for_ap_id(context),
198 conversation = Repo.preload(conversation, :participations),
200 fetch_latest_activity_id_for_context(conversation.ap_id, %{
202 "blocking_user" => user
204 if last_activity_id do
205 stream_out_participations(conversation.participations)
210 def stream_out_participations(_, _), do: :noop
212 def stream_out(%Activity{data: %{"type" => data_type}} = activity)
213 when data_type in ["Create", "Announce", "Delete"] do
215 |> Topics.get_activity_topics()
216 |> Streamer.stream(activity)
219 def stream_out(_activity) do
223 def create(%{to: to, actor: actor, context: context, object: object} = params, fake \\ false) do
224 additional = params[:additional] || %{}
225 # only accept false as false value
226 local = !(params[:local] == false)
227 published = params[:published]
231 %{to: to, actor: actor, published: published, context: context, object: object},
234 {:ok, activity} <- insert(create_data, local, fake),
235 {:fake, false, activity} <- {:fake, fake, activity},
236 _ <- increase_replies_count_if_reply(create_data),
237 _ <- increase_poll_votes_if_vote(create_data),
238 # Changing note count prior to enqueuing federation task in order to avoid
239 # race conditions on updating user.info
240 {:ok, _actor} <- increase_note_count_if_public(actor, activity),
241 :ok <- maybe_federate(activity) do
244 {:fake, true, activity} ->
252 def listen(%{to: to, actor: actor, context: context, object: object} = params) do
253 additional = params[:additional] || %{}
254 # only accept false as false value
255 local = !(params[:local] == false)
256 published = params[:published]
260 %{to: to, actor: actor, published: published, context: context, object: object},
263 {:ok, activity} <- insert(listen_data, local),
264 :ok <- maybe_federate(activity) do
272 def accept(%{to: to, actor: actor, object: object} = params) do
273 # only accept false as false value
274 local = !(params[:local] == false)
276 with data <- %{"to" => to, "type" => "Accept", "actor" => actor.ap_id, "object" => object},
277 {:ok, activity} <- insert(data, local),
278 :ok <- maybe_federate(activity) do
283 def reject(%{to: to, actor: actor, object: object} = params) do
284 # only accept false as false value
285 local = !(params[:local] == false)
287 with data <- %{"to" => to, "type" => "Reject", "actor" => actor.ap_id, "object" => object},
288 {:ok, activity} <- insert(data, local),
289 :ok <- maybe_federate(activity) do
294 def update(%{to: to, cc: cc, actor: actor, object: object} = params) do
295 local = !(params[:local] == false)
296 activity_id = params[:activity_id]
305 data <- Utils.maybe_put(data, "id", activity_id),
306 {:ok, activity} <- insert(data, local),
307 :ok <- maybe_federate(activity) do
312 # TODO: This is weird, maybe we shouldn't check here if we can make the activity.
314 %User{ap_id: ap_id} = user,
315 %Object{data: %{"id" => _}} = object,
319 with nil <- get_existing_like(ap_id, object),
320 like_data <- make_like_data(user, object, activity_id),
321 {:ok, activity} <- insert(like_data, local),
322 {:ok, object} <- add_like_to_object(activity, object),
323 :ok <- maybe_federate(activity) do
324 {:ok, activity, object}
326 %Activity{} = activity -> {:ok, activity, object}
327 error -> {:error, error}
331 def unlike(%User{} = actor, %Object{} = object, activity_id \\ nil, local \\ true) do
332 with %Activity{} = like_activity <- get_existing_like(actor.ap_id, object),
333 unlike_data <- make_unlike_data(actor, like_activity, activity_id),
334 {:ok, unlike_activity} <- insert(unlike_data, local),
335 {:ok, _activity} <- Repo.delete(like_activity),
336 {:ok, object} <- remove_like_from_object(like_activity, object),
337 :ok <- maybe_federate(unlike_activity) do
338 {:ok, unlike_activity, like_activity, object}
345 %User{ap_id: _} = user,
346 %Object{data: %{"id" => _}} = object,
351 with true <- is_announceable?(object, user, public),
352 announce_data <- make_announce_data(user, object, activity_id, public),
353 {:ok, activity} <- insert(announce_data, local),
354 {:ok, object} <- add_announce_to_object(activity, object),
355 :ok <- maybe_federate(activity) do
356 {:ok, activity, object}
358 error -> {:error, error}
368 with %Activity{} = announce_activity <- get_existing_announce(actor.ap_id, object),
369 unannounce_data <- make_unannounce_data(actor, announce_activity, activity_id),
370 {:ok, unannounce_activity} <- insert(unannounce_data, local),
371 :ok <- maybe_federate(unannounce_activity),
372 {:ok, _activity} <- Repo.delete(announce_activity),
373 {:ok, object} <- remove_announce_from_object(announce_activity, object) do
374 {:ok, unannounce_activity, object}
380 def follow(follower, followed, activity_id \\ nil, local \\ true) do
381 with data <- make_follow_data(follower, followed, activity_id),
382 {:ok, activity} <- insert(data, local),
383 :ok <- maybe_federate(activity),
384 _ <- User.set_follow_state_cache(follower.ap_id, followed.ap_id, activity.data["state"]) do
389 def unfollow(follower, followed, activity_id \\ nil, local \\ true) do
390 with %Activity{} = follow_activity <- fetch_latest_follow(follower, followed),
391 {:ok, follow_activity} <- update_follow_state(follow_activity, "cancelled"),
392 unfollow_data <- make_unfollow_data(follower, followed, follow_activity, activity_id),
393 {:ok, activity} <- insert(unfollow_data, local),
394 :ok <- maybe_federate(activity) do
399 def delete(%User{ap_id: ap_id, follower_address: follower_address} = user) do
401 "to" => [follower_address],
404 "object" => %{"type" => "Person", "id" => ap_id}
406 {:ok, activity} <- insert(data, true, true, true),
407 :ok <- maybe_federate(activity) do
412 def delete(%Object{data: %{"id" => id, "actor" => actor}} = object, options \\ []) do
413 local = Keyword.get(options, :local, true)
414 activity_id = Keyword.get(options, :activity_id, nil)
416 user = User.get_cached_by_ap_id(actor)
417 to = (object.data["to"] || []) ++ (object.data["cc"] || [])
419 with {:ok, object, activity} <- Object.delete(object),
425 "deleted_activity_id" => activity && activity.id
427 |> maybe_put("id", activity_id),
428 {:ok, activity} <- insert(data, local, false),
429 stream_out_participations(object, user),
430 _ <- decrease_replies_count_if_reply(object),
431 # Changing note count prior to enqueuing federation task in order to avoid
432 # race conditions on updating user.info
433 {:ok, _actor} <- decrease_note_count_if_public(user, object),
434 :ok <- maybe_federate(activity) do
439 @spec block(User.t(), User.t(), String.t() | nil, boolean) :: {:ok, Activity.t() | nil}
440 def block(blocker, blocked, activity_id \\ nil, local \\ true) do
441 outgoing_blocks = Config.get([:activitypub, :outgoing_blocks])
442 unfollow_blocked = Config.get([:activitypub, :unfollow_blocked])
444 if unfollow_blocked do
445 follow_activity = fetch_latest_follow(blocker, blocked)
446 if follow_activity, do: unfollow(blocker, blocked, nil, local)
449 with true <- outgoing_blocks,
450 block_data <- make_block_data(blocker, blocked, activity_id),
451 {:ok, activity} <- insert(block_data, local),
452 :ok <- maybe_federate(activity) do
459 def unblock(blocker, blocked, activity_id \\ nil, local \\ true) do
460 with %Activity{} = block_activity <- fetch_latest_block(blocker, blocked),
461 unblock_data <- make_unblock_data(blocker, blocked, block_activity, activity_id),
462 {:ok, activity} <- insert(unblock_data, local),
463 :ok <- maybe_federate(activity) do
468 @spec flag(map()) :: {:ok, Activity.t()} | any
478 # only accept false as false value
479 local = !(params[:local] == false)
480 forward = !(params[:forward] == false)
482 additional = params[:additional] || %{}
486 Map.merge(additional, %{"to" => [], "cc" => [account.ap_id]})
488 Map.merge(additional, %{"to" => [], "cc" => []})
491 with flag_data <- make_flag_data(params, additional),
492 {:ok, activity} <- insert(flag_data, local),
493 :ok <- maybe_federate(activity) do
494 Enum.each(User.all_superusers(), fn superuser ->
496 |> Pleroma.Emails.AdminEmail.report(actor, account, statuses, content)
497 |> Pleroma.Emails.Mailer.deliver_async()
504 defp fetch_activities_for_context_query(context, opts) do
505 public = [Pleroma.Constants.as_public()]
508 if opts["user"], do: [opts["user"].ap_id | opts["user"].following] ++ public, else: public
510 from(activity in Activity)
511 |> maybe_preload_objects(opts)
512 |> maybe_preload_bookmarks(opts)
513 |> maybe_set_thread_muted_field(opts)
514 |> restrict_blocked(opts)
515 |> restrict_recipients(recipients, opts["user"])
519 "?->>'type' = ? and ?->>'context' = ?",
526 |> exclude_poll_votes(opts)
528 |> order_by([activity], desc: activity.id)
531 @spec fetch_activities_for_context(String.t(), keyword() | map()) :: [Activity.t()]
532 def fetch_activities_for_context(context, opts \\ %{}) do
534 |> fetch_activities_for_context_query(opts)
538 @spec fetch_latest_activity_id_for_context(String.t(), keyword() | map()) ::
539 FlakeId.Ecto.CompatType.t() | nil
540 def fetch_latest_activity_id_for_context(context, opts \\ %{}) do
542 |> fetch_activities_for_context_query(Map.merge(%{"skip_preload" => true}, opts))
548 def fetch_public_activities(opts \\ %{}, pagination \\ :keyset) do
549 opts = Map.drop(opts, ["user"])
551 [Pleroma.Constants.as_public()]
552 |> fetch_activities_query(opts)
553 |> restrict_unlisted()
554 |> Pagination.fetch_paginated(opts, pagination)
558 @valid_visibilities ~w[direct unlisted public private]
560 defp restrict_visibility(query, %{visibility: visibility})
561 when is_list(visibility) do
562 if Enum.all?(visibility, &(&1 in @valid_visibilities)) do
568 "activity_visibility(?, ?, ?) = ANY (?)",
578 Logger.error("Could not restrict visibility to #{visibility}")
582 defp restrict_visibility(query, %{visibility: visibility})
583 when visibility in @valid_visibilities do
587 fragment("activity_visibility(?, ?, ?) = ?", a.actor, a.recipients, a.data, ^visibility)
591 defp restrict_visibility(_query, %{visibility: visibility})
592 when visibility not in @valid_visibilities do
593 Logger.error("Could not restrict visibility to #{visibility}")
596 defp restrict_visibility(query, _visibility), do: query
598 defp restrict_thread_visibility(query, _, %{skip_thread_containment: true} = _),
601 defp restrict_thread_visibility(
603 %{"user" => %User{info: %{skip_thread_containment: true}}},
608 defp restrict_thread_visibility(query, %{"user" => %User{ap_id: ap_id}}, _) do
611 where: fragment("thread_visibility(?, (?)->>'id') = true", ^ap_id, a.data)
615 defp restrict_thread_visibility(query, _, _), do: query
617 def fetch_user_abstract_activities(user, reading_user, params \\ %{}) do
620 |> Map.put("user", reading_user)
621 |> Map.put("actor_id", user.ap_id)
622 |> Map.put("whole_db", true)
625 user_activities_recipients(%{
626 "godmode" => params["godmode"],
627 "reading_user" => reading_user
630 fetch_activities(recipients, params)
634 def fetch_user_activities(user, reading_user, params \\ %{}) do
637 |> Map.put("type", ["Create", "Announce"])
638 |> Map.put("user", reading_user)
639 |> Map.put("actor_id", user.ap_id)
640 |> Map.put("whole_db", true)
641 |> Map.put("pinned_activity_ids", user.info.pinned_activities)
644 user_activities_recipients(%{
645 "godmode" => params["godmode"],
646 "reading_user" => reading_user
649 fetch_activities(recipients, params)
653 defp user_activities_recipients(%{"godmode" => true}) do
657 defp user_activities_recipients(%{"reading_user" => reading_user}) do
659 [Pleroma.Constants.as_public()] ++ [reading_user.ap_id | reading_user.following]
661 [Pleroma.Constants.as_public()]
665 defp restrict_since(query, %{"since_id" => ""}), do: query
667 defp restrict_since(query, %{"since_id" => since_id}) do
668 from(activity in query, where: activity.id > ^since_id)
671 defp restrict_since(query, _), do: query
673 defp restrict_tag_reject(_query, %{"tag_reject" => _tag_reject, "skip_preload" => true}) do
674 raise "Can't use the child object without preloading!"
677 defp restrict_tag_reject(query, %{"tag_reject" => tag_reject})
678 when is_list(tag_reject) and tag_reject != [] do
680 [_activity, object] in query,
681 where: fragment("not (?)->'tag' \\?| (?)", object.data, ^tag_reject)
685 defp restrict_tag_reject(query, _), do: query
687 defp restrict_tag_all(_query, %{"tag_all" => _tag_all, "skip_preload" => true}) do
688 raise "Can't use the child object without preloading!"
691 defp restrict_tag_all(query, %{"tag_all" => tag_all})
692 when is_list(tag_all) and tag_all != [] do
694 [_activity, object] in query,
695 where: fragment("(?)->'tag' \\?& (?)", object.data, ^tag_all)
699 defp restrict_tag_all(query, _), do: query
701 defp restrict_tag(_query, %{"tag" => _tag, "skip_preload" => true}) do
702 raise "Can't use the child object without preloading!"
705 defp restrict_tag(query, %{"tag" => tag}) when is_list(tag) do
707 [_activity, object] in query,
708 where: fragment("(?)->'tag' \\?| (?)", object.data, ^tag)
712 defp restrict_tag(query, %{"tag" => tag}) when is_binary(tag) do
714 [_activity, object] in query,
715 where: fragment("(?)->'tag' \\? (?)", object.data, ^tag)
719 defp restrict_tag(query, _), do: query
721 defp restrict_recipients(query, [], _user), do: query
723 defp restrict_recipients(query, recipients, nil) do
724 from(activity in query, where: fragment("? && ?", ^recipients, activity.recipients))
727 defp restrict_recipients(query, recipients, user) do
730 where: fragment("? && ?", ^recipients, activity.recipients),
731 or_where: activity.actor == ^user.ap_id
735 defp restrict_local(query, %{"local_only" => true}) do
736 from(activity in query, where: activity.local == true)
739 defp restrict_local(query, _), do: query
741 defp restrict_actor(query, %{"actor_id" => actor_id}) do
742 from(activity in query, where: activity.actor == ^actor_id)
745 defp restrict_actor(query, _), do: query
747 defp restrict_type(query, %{"type" => type}) when is_binary(type) do
748 from(activity in query, where: fragment("?->>'type' = ?", activity.data, ^type))
751 defp restrict_type(query, %{"type" => type}) do
752 from(activity in query, where: fragment("?->>'type' = ANY(?)", activity.data, ^type))
755 defp restrict_type(query, _), do: query
757 defp restrict_state(query, %{"state" => state}) do
758 from(activity in query, where: fragment("?->>'state' = ?", activity.data, ^state))
761 defp restrict_state(query, _), do: query
763 defp restrict_favorited_by(query, %{"favorited_by" => ap_id}) do
765 [_activity, object] in query,
766 where: fragment("(?)->'likes' \\? (?)", object.data, ^ap_id)
770 defp restrict_favorited_by(query, _), do: query
772 defp restrict_media(_query, %{"only_media" => _val, "skip_preload" => true}) do
773 raise "Can't use the child object without preloading!"
776 defp restrict_media(query, %{"only_media" => val}) when val == "true" or val == "1" do
778 [_activity, object] in query,
779 where: fragment("not (?)->'attachment' = (?)", object.data, ^[])
783 defp restrict_media(query, _), do: query
785 defp restrict_replies(query, %{"exclude_replies" => val}) when val == "true" or val == "1" do
787 [_activity, object] in query,
788 where: fragment("?->>'inReplyTo' is null", object.data)
792 defp restrict_replies(query, _), do: query
794 defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val == "true" or val == "1" do
795 from(activity in query, where: fragment("?->>'type' != 'Announce'", activity.data))
798 defp restrict_reblogs(query, _), do: query
800 defp restrict_muted(query, %{"with_muted" => val}) when val in [true, "true", "1"], do: query
802 defp restrict_muted(query, %{"muting_user" => %User{info: info}} = opts) do
806 from([activity] in query,
807 where: fragment("not (? = ANY(?))", activity.actor, ^mutes),
808 where: fragment("not (?->'to' \\?| ?)", activity.data, ^mutes)
811 unless opts["skip_preload"] do
812 from([thread_mute: tm] in query, where: is_nil(tm.user_id))
818 defp restrict_muted(query, _), do: query
820 defp restrict_blocked(query, %{"blocking_user" => %User{info: info}}) do
821 blocks = info.blocks || []
822 domain_blocks = info.domain_blocks || []
825 if has_named_binding?(query, :object), do: query, else: Activity.with_joined_object(query)
828 [activity, object: o] in query,
829 where: fragment("not (? = ANY(?))", activity.actor, ^blocks),
830 where: fragment("not (? && ?)", activity.recipients, ^blocks),
833 "not (?->>'type' = 'Announce' and ?->'to' \\?| ?)",
838 where: fragment("not (split_part(?, '/', 3) = ANY(?))", activity.actor, ^domain_blocks),
839 where: fragment("not (split_part(?->>'actor', '/', 3) = ANY(?))", o.data, ^domain_blocks)
843 defp restrict_blocked(query, _), do: query
845 defp restrict_unlisted(query) do
850 "not (coalesce(?->'cc', '{}'::jsonb) \\?| ?)",
852 ^[Pleroma.Constants.as_public()]
857 defp restrict_pinned(query, %{"pinned" => "true", "pinned_activity_ids" => ids}) do
858 from(activity in query, where: activity.id in ^ids)
861 defp restrict_pinned(query, _), do: query
863 defp restrict_muted_reblogs(query, %{"muting_user" => %User{info: info}}) do
864 muted_reblogs = info.muted_reblogs || []
870 "not ( ?->>'type' = 'Announce' and ? = ANY(?))",
878 defp restrict_muted_reblogs(query, _), do: query
880 defp exclude_poll_votes(query, %{"include_poll_votes" => true}), do: query
882 defp exclude_poll_votes(query, _) do
883 if has_named_binding?(query, :object) do
884 from([activity, object: o] in query,
885 where: fragment("not(?->>'type' = ?)", o.data, "Answer")
892 defp exclude_id(query, %{"exclude_id" => id}) when is_binary(id) do
893 from(activity in query, where: activity.id != ^id)
896 defp exclude_id(query, _), do: query
898 defp maybe_preload_objects(query, %{"skip_preload" => true}), do: query
900 defp maybe_preload_objects(query, _) do
902 |> Activity.with_preloaded_object()
905 defp maybe_preload_bookmarks(query, %{"skip_preload" => true}), do: query
907 defp maybe_preload_bookmarks(query, opts) do
909 |> Activity.with_preloaded_bookmark(opts["user"])
912 defp maybe_set_thread_muted_field(query, %{"skip_preload" => true}), do: query
914 defp maybe_set_thread_muted_field(query, opts) do
916 |> Activity.with_set_thread_muted_field(opts["muting_user"] || opts["user"])
919 defp maybe_order(query, %{order: :desc}) do
921 |> order_by(desc: :id)
924 defp maybe_order(query, %{order: :asc}) do
926 |> order_by(asc: :id)
929 defp maybe_order(query, _), do: query
931 def fetch_activities_query(recipients, opts \\ %{}) do
933 skip_thread_containment: Config.get([:instance, :skip_thread_containment])
937 |> maybe_preload_objects(opts)
938 |> maybe_preload_bookmarks(opts)
939 |> maybe_set_thread_muted_field(opts)
941 |> restrict_recipients(recipients, opts["user"])
942 |> restrict_tag(opts)
943 |> restrict_tag_reject(opts)
944 |> restrict_tag_all(opts)
945 |> restrict_since(opts)
946 |> restrict_local(opts)
947 |> restrict_actor(opts)
948 |> restrict_type(opts)
949 |> restrict_state(opts)
950 |> restrict_favorited_by(opts)
951 |> restrict_blocked(opts)
952 |> restrict_muted(opts)
953 |> restrict_media(opts)
954 |> restrict_visibility(opts)
955 |> restrict_thread_visibility(opts, config)
956 |> restrict_replies(opts)
957 |> restrict_reblogs(opts)
958 |> restrict_pinned(opts)
959 |> restrict_muted_reblogs(opts)
960 |> Activity.restrict_deactivated_users()
961 |> exclude_poll_votes(opts)
964 def fetch_activities(recipients, opts \\ %{}, pagination \\ :keyset) do
965 list_memberships = Pleroma.List.memberships(opts["user"])
967 fetch_activities_query(recipients ++ list_memberships, opts)
968 |> Pagination.fetch_paginated(opts, pagination)
970 |> maybe_update_cc(list_memberships, opts["user"])
973 defp maybe_update_cc(activities, list_memberships, %User{ap_id: user_ap_id})
974 when is_list(list_memberships) and length(list_memberships) > 0 do
975 Enum.map(activities, fn
976 %{data: %{"bcc" => bcc}} = activity when is_list(bcc) and length(bcc) > 0 ->
977 if Enum.any?(bcc, &(&1 in list_memberships)) do
978 update_in(activity.data["cc"], &[user_ap_id | &1])
988 defp maybe_update_cc(activities, _, _), do: activities
990 def fetch_activities_bounded_query(query, recipients, recipients_with_public) do
991 from(activity in query,
993 fragment("? && ?", activity.recipients, ^recipients) or
994 (fragment("? && ?", activity.recipients, ^recipients_with_public) and
995 ^Pleroma.Constants.as_public() in activity.recipients)
999 def fetch_activities_bounded(
1001 recipients_with_public,
1003 pagination \\ :keyset
1005 fetch_activities_query([], opts)
1006 |> fetch_activities_bounded_query(recipients, recipients_with_public)
1007 |> Pagination.fetch_paginated(opts, pagination)
1011 def upload(file, opts \\ []) do
1012 with {:ok, data} <- Upload.store(file, opts) do
1015 Map.put(data, "actor", opts[:actor])
1020 Repo.insert(%Object{data: obj_data})
1024 defp object_to_user_data(data) do
1026 data["icon"]["url"] &&
1029 "url" => [%{"href" => data["icon"]["url"]}]
1033 data["image"]["url"] &&
1036 "url" => [%{"href" => data["image"]["url"]}]
1041 |> Map.get("attachment", [])
1042 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1043 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1045 locked = data["manuallyApprovesFollowers"] || false
1046 data = Transmogrifier.maybe_fix_user_object(data)
1047 discoverable = data["discoverable"] || false
1057 discoverable: discoverable
1061 follower_address: data["followers"],
1062 following_address: data["following"],
1063 bio: data["summary"]
1066 # nickname can be nil because of virtual actors
1068 if data["preferredUsername"] do
1072 "#{data["preferredUsername"]}@#{URI.parse(data["id"]).host}"
1075 Map.put(user_data, :nickname, nil)
1081 def fetch_follow_information_for_user(user) do
1082 with {:ok, following_data} <-
1083 Fetcher.fetch_and_contain_remote_object_from_id(user.following_address),
1084 following_count when is_integer(following_count) <- following_data["totalItems"],
1085 {:ok, hide_follows} <- collection_private(following_data),
1086 {:ok, followers_data} <-
1087 Fetcher.fetch_and_contain_remote_object_from_id(user.follower_address),
1088 followers_count when is_integer(followers_count) <- followers_data["totalItems"],
1089 {:ok, hide_followers} <- collection_private(followers_data) do
1092 hide_follows: hide_follows,
1093 follower_count: followers_count,
1094 following_count: following_count,
1095 hide_followers: hide_followers
1106 defp maybe_update_follow_information(data) do
1107 with {:enabled, true} <-
1108 {:enabled, Pleroma.Config.get([:instance, :external_user_synchronization])},
1109 {:ok, info} <- fetch_follow_information_for_user(data) do
1110 info = Map.merge(data.info, info)
1111 Map.put(data, :info, info)
1113 {:enabled, false} ->
1118 "Follower/Following counter update for #{data.ap_id} failed.\n" <> inspect(e)
1125 defp collection_private(data) do
1126 if is_map(data["first"]) and
1127 data["first"]["type"] in ["CollectionPage", "OrderedCollectionPage"] do
1130 with {:ok, %{"type" => type}} when type in ["CollectionPage", "OrderedCollectionPage"] <-
1131 Fetcher.fetch_and_contain_remote_object_from_id(data["first"]) do
1134 {:error, {:ok, %{status: code}}} when code in [401, 403] ->
1146 def user_data_from_user_object(data) do
1147 with {:ok, data} <- MRF.filter(data),
1148 {:ok, data} <- object_to_user_data(data) do
1155 def fetch_and_prepare_user_from_ap_id(ap_id) do
1156 with {:ok, data} <- Fetcher.fetch_and_contain_remote_object_from_id(ap_id),
1157 {:ok, data} <- user_data_from_user_object(data),
1158 data <- maybe_update_follow_information(data) do
1161 e -> Logger.error("Could not decode user at fetch #{ap_id}, #{inspect(e)}")
1165 def make_user_from_ap_id(ap_id) do
1166 if _user = User.get_cached_by_ap_id(ap_id) do
1167 Transmogrifier.upgrade_user_from_ap_id(ap_id)
1169 with {:ok, data} <- fetch_and_prepare_user_from_ap_id(ap_id) do
1170 User.insert_or_update_user(data)
1177 def make_user_from_nickname(nickname) do
1178 with {:ok, %{"ap_id" => ap_id}} when not is_nil(ap_id) <- WebFinger.finger(nickname) do
1179 make_user_from_ap_id(ap_id)
1181 _e -> {:error, "No AP id in WebFinger"}
1185 # filter out broken threads
1186 def contain_broken_threads(%Activity{} = activity, %User{} = user) do
1187 entire_thread_visible_for_user?(activity, user)
1190 # do post-processing on a specific activity
1191 def contain_activity(%Activity{} = activity, %User{} = user) do
1192 contain_broken_threads(activity, user)
1195 def fetch_direct_messages_query do
1197 |> restrict_type(%{"type" => "Create"})
1198 |> restrict_visibility(%{visibility: "direct"})
1199 |> order_by([activity], asc: activity.id)