1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.ActivityPub do
7 alias Pleroma.Activity.Ir.Topics
9 alias Pleroma.Constants
10 alias Pleroma.Conversation
11 alias Pleroma.Conversation.Participation
12 alias Pleroma.Notification
14 alias Pleroma.Object.Containment
15 alias Pleroma.Object.Fetcher
16 alias Pleroma.Pagination
20 alias Pleroma.Web.ActivityPub.MRF
21 alias Pleroma.Web.ActivityPub.Transmogrifier
22 alias Pleroma.Web.ActivityPub.Utils
23 alias Pleroma.Web.Streamer
24 alias Pleroma.Web.WebFinger
25 alias Pleroma.Workers.BackgroundWorker
28 import Pleroma.Web.ActivityPub.Utils
29 import Pleroma.Web.ActivityPub.Visibility
32 require Pleroma.Constants
34 # For Announce activities, we filter the recipients based on following status for any actors
35 # that match actual users. See issue #164 for more information about why this is necessary.
36 defp get_recipients(%{"type" => "Announce"} = data) do
37 to = Map.get(data, "to", [])
38 cc = Map.get(data, "cc", [])
39 bcc = Map.get(data, "bcc", [])
40 actor = User.get_cached_by_ap_id(data["actor"])
43 Enum.filter(Enum.concat([to, cc, bcc]), fn recipient ->
44 case User.get_cached_by_ap_id(recipient) do
46 user -> User.following?(user, actor)
53 defp get_recipients(%{"type" => "Create"} = data) do
54 to = Map.get(data, "to", [])
55 cc = Map.get(data, "cc", [])
56 bcc = Map.get(data, "bcc", [])
57 actor = Map.get(data, "actor", [])
58 recipients = [to, cc, bcc, [actor]] |> Enum.concat() |> Enum.uniq()
62 defp get_recipients(data) do
63 to = Map.get(data, "to", [])
64 cc = Map.get(data, "cc", [])
65 bcc = Map.get(data, "bcc", [])
66 recipients = Enum.concat([to, cc, bcc])
70 defp check_actor_is_active(actor) do
71 if not is_nil(actor) do
72 with user <- User.get_cached_by_ap_id(actor),
73 false <- user.deactivated do
83 defp check_remote_limit(%{"object" => %{"content" => content}}) when not is_nil(content) do
84 limit = Config.get([:instance, :remote_limit])
85 String.length(content) <= limit
88 defp check_remote_limit(_), do: true
90 def increase_note_count_if_public(actor, object) do
91 if is_public?(object), do: User.increase_note_count(actor), else: {:ok, actor}
94 def decrease_note_count_if_public(actor, object) do
95 if is_public?(object), do: User.decrease_note_count(actor), else: {:ok, actor}
98 def increase_replies_count_if_reply(%{
99 "object" => %{"inReplyTo" => reply_ap_id} = object,
102 if is_public?(object) do
103 Object.increase_replies_count(reply_ap_id)
107 def increase_replies_count_if_reply(_create_data), do: :noop
109 def decrease_replies_count_if_reply(%Object{
110 data: %{"inReplyTo" => reply_ap_id} = object
112 if is_public?(object) do
113 Object.decrease_replies_count(reply_ap_id)
117 def decrease_replies_count_if_reply(_object), do: :noop
119 def increase_poll_votes_if_vote(%{
120 "object" => %{"inReplyTo" => reply_ap_id, "name" => name},
124 Object.increase_vote_count(reply_ap_id, name, actor)
127 def increase_poll_votes_if_vote(_create_data), do: :noop
129 @spec persist(map(), keyword()) :: {:ok, Activity.t() | Object.t()}
130 def persist(object, meta) do
131 with local <- Keyword.fetch!(meta, :local),
132 {recipients, _, _} <- get_recipients(object),
134 Repo.insert(%Activity{
137 recipients: recipients,
138 actor: object["actor"]
140 {:ok, activity, meta}
144 @spec insert(map(), boolean(), boolean(), boolean()) :: {:ok, Activity.t()} | {:error, any()}
145 def insert(map, local \\ true, fake \\ false, bypass_actor_check \\ false) when is_map(map) do
146 with nil <- Activity.normalize(map),
147 map <- lazy_put_activity_defaults(map, fake),
148 true <- bypass_actor_check || check_actor_is_active(map["actor"]),
149 {_, true} <- {:remote_limit_error, check_remote_limit(map)},
150 {:ok, map} <- MRF.filter(map),
151 {recipients, _, _} = get_recipients(map),
152 {:fake, false, map, recipients} <- {:fake, fake, map, recipients},
153 {:containment, :ok} <- {:containment, Containment.contain_child(map)},
154 {:ok, map, object} <- insert_full_object(map) do
156 Repo.insert(%Activity{
160 recipients: recipients
163 # Splice in the child object if we have one.
165 if not is_nil(object) do
166 Map.put(activity, :object, object)
171 BackgroundWorker.enqueue("fetch_data_for_activity", %{"activity_id" => activity.id})
175 %Activity{} = activity ->
178 {:fake, true, map, recipients} ->
179 activity = %Activity{
183 recipients: recipients,
187 Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity)
195 def notify_and_stream(activity) do
196 Notification.create_notifications(activity)
198 conversation = create_or_bump_conversation(activity, activity.actor)
199 participations = get_participations(conversation)
201 stream_out_participations(participations)
204 defp create_or_bump_conversation(activity, actor) do
205 with {:ok, conversation} <- Conversation.create_or_bump_for(activity),
206 %User{} = user <- User.get_cached_by_ap_id(actor),
207 Participation.mark_as_read(user, conversation) do
212 defp get_participations({:ok, conversation}) do
214 |> Repo.preload(:participations, force: true)
215 |> Map.get(:participations)
218 defp get_participations(_), do: []
220 def stream_out_participations(participations) do
223 |> Repo.preload(:user)
225 Streamer.stream("participation", participations)
228 def stream_out_participations(%Object{data: %{"context" => context}}, user) do
229 with %Conversation{} = conversation <- Conversation.get_for_ap_id(context),
230 conversation = Repo.preload(conversation, :participations),
232 fetch_latest_activity_id_for_context(conversation.ap_id, %{
234 "blocking_user" => user
236 if last_activity_id do
237 stream_out_participations(conversation.participations)
242 def stream_out_participations(_, _), do: :noop
244 def stream_out(%Activity{data: %{"type" => data_type}} = activity)
245 when data_type in ["Create", "Announce", "Delete"] do
247 |> Topics.get_activity_topics()
248 |> Streamer.stream(activity)
251 def stream_out(_activity) do
255 @spec create(map(), boolean()) :: {:ok, Activity.t()} | {:error, any()}
256 def create(params, fake \\ false) do
257 with {:ok, result} <- Repo.transaction(fn -> do_create(params, fake) end) do
262 defp do_create(%{to: to, actor: actor, context: context, object: object} = params, fake) do
263 additional = params[:additional] || %{}
264 # only accept false as false value
265 local = !(params[:local] == false)
266 published = params[:published]
267 quick_insert? = Config.get([:env]) == :benchmark
271 %{to: to, actor: actor, published: published, context: context, object: object},
274 {:ok, activity} <- insert(create_data, local, fake),
275 {:fake, false, activity} <- {:fake, fake, activity},
276 _ <- increase_replies_count_if_reply(create_data),
277 _ <- increase_poll_votes_if_vote(create_data),
278 {:quick_insert, false, activity} <- {:quick_insert, quick_insert?, activity},
279 {:ok, _actor} <- increase_note_count_if_public(actor, activity),
280 _ <- notify_and_stream(activity),
281 :ok <- maybe_federate(activity) do
284 {:quick_insert, true, activity} ->
287 {:fake, true, activity} ->
291 Repo.rollback(message)
295 @spec listen(map()) :: {:ok, Activity.t()} | {:error, any()}
296 def listen(%{to: to, actor: actor, context: context, object: object} = params) do
297 additional = params[:additional] || %{}
298 # only accept false as false value
299 local = !(params[:local] == false)
300 published = params[:published]
304 %{to: to, actor: actor, published: published, context: context, object: object},
307 {:ok, activity} <- insert(listen_data, local),
308 _ <- notify_and_stream(activity),
309 :ok <- maybe_federate(activity) do
314 @spec accept(map()) :: {:ok, Activity.t()} | {:error, any()}
315 def accept(params) do
316 accept_or_reject("Accept", params)
319 @spec reject(map()) :: {:ok, Activity.t()} | {:error, any()}
320 def reject(params) do
321 accept_or_reject("Reject", params)
324 @spec accept_or_reject(String.t(), map()) :: {:ok, Activity.t()} | {:error, any()}
325 def accept_or_reject(type, %{to: to, actor: actor, object: object} = params) do
326 local = Map.get(params, :local, true)
327 activity_id = Map.get(params, :activity_id, nil)
330 %{"to" => to, "type" => type, "actor" => actor.ap_id, "object" => object}
331 |> Utils.maybe_put("id", activity_id),
332 {:ok, activity} <- insert(data, local),
333 _ <- notify_and_stream(activity),
334 :ok <- maybe_federate(activity) do
339 @spec update(map()) :: {:ok, Activity.t()} | {:error, any()}
340 def update(%{to: to, cc: cc, actor: actor, object: object} = params) do
341 local = !(params[:local] == false)
342 activity_id = params[:activity_id]
351 data <- Utils.maybe_put(data, "id", activity_id),
352 {:ok, activity} <- insert(data, local),
353 _ <- notify_and_stream(activity),
354 :ok <- maybe_federate(activity) do
359 @spec react_with_emoji(User.t(), Object.t(), String.t(), keyword()) ::
360 {:ok, Activity.t(), Object.t()} | {:error, any()}
361 def react_with_emoji(user, object, emoji, options \\ []) do
362 with {:ok, result} <-
363 Repo.transaction(fn -> do_react_with_emoji(user, object, emoji, options) end) do
368 defp do_react_with_emoji(user, object, emoji, options) do
369 with local <- Keyword.get(options, :local, true),
370 activity_id <- Keyword.get(options, :activity_id, nil),
371 true <- Pleroma.Emoji.is_unicode_emoji?(emoji),
372 reaction_data <- make_emoji_reaction_data(user, object, emoji, activity_id),
373 {:ok, activity} <- insert(reaction_data, local),
374 {:ok, object} <- add_emoji_reaction_to_object(activity, object),
375 _ <- notify_and_stream(activity),
376 :ok <- maybe_federate(activity) do
377 {:ok, activity, object}
379 false -> {:error, false}
380 {:error, error} -> Repo.rollback(error)
384 @spec unreact_with_emoji(User.t(), String.t(), keyword()) ::
385 {:ok, Activity.t(), Object.t()} | {:error, any()}
386 def unreact_with_emoji(user, reaction_id, options \\ []) do
387 with {:ok, result} <-
388 Repo.transaction(fn -> do_unreact_with_emoji(user, reaction_id, options) end) do
393 defp do_unreact_with_emoji(user, reaction_id, options) do
394 with local <- Keyword.get(options, :local, true),
395 activity_id <- Keyword.get(options, :activity_id, nil),
396 user_ap_id <- user.ap_id,
397 %Activity{actor: ^user_ap_id} = reaction_activity <- Activity.get_by_ap_id(reaction_id),
398 object <- Object.normalize(reaction_activity),
399 unreact_data <- make_undo_data(user, reaction_activity, activity_id),
400 {:ok, activity} <- insert(unreact_data, local),
401 {:ok, object} <- remove_emoji_reaction_from_object(reaction_activity, object),
402 _ <- notify_and_stream(activity),
403 :ok <- maybe_federate(activity) do
404 {:ok, activity, object}
406 {:error, error} -> Repo.rollback(error)
410 @spec unlike(User.t(), Object.t(), String.t() | nil, boolean()) ::
411 {:ok, Activity.t(), Activity.t(), Object.t()} | {:ok, Object.t()} | {:error, any()}
412 def unlike(%User{} = actor, %Object{} = object, activity_id \\ nil, local \\ true) do
413 with {:ok, result} <-
414 Repo.transaction(fn -> do_unlike(actor, object, activity_id, local) end) do
419 defp do_unlike(actor, object, activity_id, local) do
420 with %Activity{} = like_activity <- get_existing_like(actor.ap_id, object),
421 unlike_data <- make_unlike_data(actor, like_activity, activity_id),
422 {:ok, unlike_activity} <- insert(unlike_data, local),
423 {:ok, _activity} <- Repo.delete(like_activity),
424 {:ok, object} <- remove_like_from_object(like_activity, object),
425 _ <- notify_and_stream(unlike_activity),
426 :ok <- maybe_federate(unlike_activity) do
427 {:ok, unlike_activity, like_activity, object}
430 {:error, error} -> Repo.rollback(error)
434 @spec announce(User.t(), Object.t(), String.t() | nil, boolean(), boolean()) ::
435 {:ok, Activity.t(), Object.t()} | {:error, any()}
437 %User{ap_id: _} = user,
438 %Object{data: %{"id" => _}} = object,
443 with {:ok, result} <-
444 Repo.transaction(fn -> do_announce(user, object, activity_id, local, public) end) do
449 defp do_announce(user, object, activity_id, local, public) do
450 with true <- is_announceable?(object, user, public),
451 object <- Object.get_by_id(object.id),
452 announce_data <- make_announce_data(user, object, activity_id, public),
453 {:ok, activity} <- insert(announce_data, local),
454 {:ok, object} <- add_announce_to_object(activity, object),
455 _ <- notify_and_stream(activity),
456 :ok <- maybe_federate(activity) do
457 {:ok, activity, object}
459 false -> {:error, false}
460 {:error, error} -> Repo.rollback(error)
464 @spec unannounce(User.t(), Object.t(), String.t() | nil, boolean()) ::
465 {:ok, Activity.t(), Object.t()} | {:ok, Object.t()} | {:error, any()}
472 with {:ok, result} <-
473 Repo.transaction(fn -> do_unannounce(actor, object, activity_id, local) end) do
478 defp do_unannounce(actor, object, activity_id, local) do
479 with %Activity{} = announce_activity <- get_existing_announce(actor.ap_id, object),
480 unannounce_data <- make_unannounce_data(actor, announce_activity, activity_id),
481 {:ok, unannounce_activity} <- insert(unannounce_data, local),
482 _ <- notify_and_stream(unannounce_activity),
483 :ok <- maybe_federate(unannounce_activity),
484 {:ok, _activity} <- Repo.delete(announce_activity),
485 {:ok, object} <- remove_announce_from_object(announce_activity, object) do
486 {:ok, unannounce_activity, object}
489 {:error, error} -> Repo.rollback(error)
493 @spec follow(User.t(), User.t(), String.t() | nil, boolean()) ::
494 {:ok, Activity.t()} | {:error, any()}
495 def follow(follower, followed, activity_id \\ nil, local \\ true) do
496 with {:ok, result} <-
497 Repo.transaction(fn -> do_follow(follower, followed, activity_id, local) end) do
502 defp do_follow(follower, followed, activity_id, local) do
503 with data <- make_follow_data(follower, followed, activity_id),
504 {:ok, activity} <- insert(data, local),
505 _ <- notify_and_stream(activity),
506 :ok <- maybe_federate(activity) do
509 {:error, error} -> Repo.rollback(error)
513 @spec unfollow(User.t(), User.t(), String.t() | nil, boolean()) ::
514 {:ok, Activity.t()} | nil | {:error, any()}
515 def unfollow(follower, followed, activity_id \\ nil, local \\ true) do
516 with {:ok, result} <-
517 Repo.transaction(fn -> do_unfollow(follower, followed, activity_id, local) end) do
522 defp do_unfollow(follower, followed, activity_id, local) do
523 with %Activity{} = follow_activity <- fetch_latest_follow(follower, followed),
524 {:ok, follow_activity} <- update_follow_state(follow_activity, "cancelled"),
525 unfollow_data <- make_unfollow_data(follower, followed, follow_activity, activity_id),
526 {:ok, activity} <- insert(unfollow_data, local),
527 _ <- notify_and_stream(activity),
528 :ok <- maybe_federate(activity) do
532 {:error, error} -> Repo.rollback(error)
536 @spec block(User.t(), User.t(), String.t() | nil, boolean()) ::
537 {:ok, Activity.t()} | {:error, any()}
538 def block(blocker, blocked, activity_id \\ nil, local \\ true) do
539 with {:ok, result} <-
540 Repo.transaction(fn -> do_block(blocker, blocked, activity_id, local) end) do
545 defp do_block(blocker, blocked, activity_id, local) do
546 outgoing_blocks = Config.get([:activitypub, :outgoing_blocks])
547 unfollow_blocked = Config.get([:activitypub, :unfollow_blocked])
549 if unfollow_blocked do
550 follow_activity = fetch_latest_follow(blocker, blocked)
551 if follow_activity, do: unfollow(blocker, blocked, nil, local)
554 with true <- outgoing_blocks,
555 block_data <- make_block_data(blocker, blocked, activity_id),
556 {:ok, activity} <- insert(block_data, local),
557 _ <- notify_and_stream(activity),
558 :ok <- maybe_federate(activity) do
561 {:error, error} -> Repo.rollback(error)
565 @spec unblock(User.t(), User.t(), String.t() | nil, boolean()) ::
566 {:ok, Activity.t()} | {:error, any()} | nil
567 def unblock(blocker, blocked, activity_id \\ nil, local \\ true) do
568 with {:ok, result} <-
569 Repo.transaction(fn -> do_unblock(blocker, blocked, activity_id, local) end) do
574 defp do_unblock(blocker, blocked, activity_id, local) do
575 with %Activity{} = block_activity <- fetch_latest_block(blocker, blocked),
576 unblock_data <- make_unblock_data(blocker, blocked, block_activity, activity_id),
577 {:ok, activity} <- insert(unblock_data, local),
578 _ <- notify_and_stream(activity),
579 :ok <- maybe_federate(activity) do
583 {:error, error} -> Repo.rollback(error)
587 @spec flag(map()) :: {:ok, Activity.t()} | {:error, any()}
597 # only accept false as false value
598 local = !(params[:local] == false)
599 forward = !(params[:forward] == false)
601 additional = params[:additional] || %{}
605 Map.merge(additional, %{"to" => [], "cc" => [account.ap_id]})
607 Map.merge(additional, %{"to" => [], "cc" => []})
610 with flag_data <- make_flag_data(params, additional),
611 {:ok, activity} <- insert(flag_data, local),
612 {:ok, stripped_activity} <- strip_report_status_data(activity),
613 _ <- notify_and_stream(activity),
614 :ok <- maybe_federate(stripped_activity) do
615 User.all_superusers()
616 |> Enum.filter(fn user -> not is_nil(user.email) end)
617 |> Enum.each(fn superuser ->
619 |> Pleroma.Emails.AdminEmail.report(actor, account, statuses, content)
620 |> Pleroma.Emails.Mailer.deliver_async()
627 @spec move(User.t(), User.t(), boolean()) :: {:ok, Activity.t()} | {:error, any()}
628 def move(%User{} = origin, %User{} = target, local \\ true) do
631 "actor" => origin.ap_id,
632 "object" => origin.ap_id,
633 "target" => target.ap_id
636 with true <- origin.ap_id in target.also_known_as,
637 {:ok, activity} <- insert(params, local),
638 _ <- notify_and_stream(activity) do
639 maybe_federate(activity)
641 BackgroundWorker.enqueue("move_following", %{
642 "origin_id" => origin.id,
643 "target_id" => target.id
648 false -> {:error, "Target account must have the origin in `alsoKnownAs`"}
653 def fetch_activities_for_context_query(context, opts) do
654 public = [Constants.as_public()]
658 do: [opts["user"].ap_id | User.following(opts["user"])] ++ public,
661 from(activity in Activity)
662 |> maybe_preload_objects(opts)
663 |> maybe_preload_bookmarks(opts)
664 |> maybe_set_thread_muted_field(opts)
665 |> restrict_blocked(opts)
666 |> restrict_recipients(recipients, opts["user"])
670 "?->>'type' = ? and ?->>'context' = ?",
677 |> exclude_poll_votes(opts)
679 |> order_by([activity], desc: activity.id)
682 @spec fetch_activities_for_context(String.t(), keyword() | map()) :: [Activity.t()]
683 def fetch_activities_for_context(context, opts \\ %{}) do
685 |> fetch_activities_for_context_query(opts)
689 @spec fetch_latest_activity_id_for_context(String.t(), keyword() | map()) ::
690 FlakeId.Ecto.CompatType.t() | nil
691 def fetch_latest_activity_id_for_context(context, opts \\ %{}) do
693 |> fetch_activities_for_context_query(Map.merge(%{"skip_preload" => true}, opts))
699 @spec fetch_public_activities(map(), Pagination.type()) :: [Activity.t()]
700 def fetch_public_activities(opts \\ %{}, pagination \\ :keyset) do
701 opts = Map.drop(opts, ["user"])
703 [Constants.as_public()]
704 |> fetch_activities_query(opts)
705 |> restrict_unlisted()
706 |> Pagination.fetch_paginated(opts, pagination)
709 @valid_visibilities ~w[direct unlisted public private]
711 defp restrict_visibility(query, %{visibility: visibility})
712 when is_list(visibility) do
713 if Enum.all?(visibility, &(&1 in @valid_visibilities)) do
719 "activity_visibility(?, ?, ?) = ANY (?)",
729 Logger.error("Could not restrict visibility to #{visibility}")
733 defp restrict_visibility(query, %{visibility: visibility})
734 when visibility in @valid_visibilities do
738 fragment("activity_visibility(?, ?, ?) = ?", a.actor, a.recipients, a.data, ^visibility)
742 defp restrict_visibility(_query, %{visibility: visibility})
743 when visibility not in @valid_visibilities do
744 Logger.error("Could not restrict visibility to #{visibility}")
747 defp restrict_visibility(query, _visibility), do: query
749 defp exclude_visibility(query, %{"exclude_visibilities" => visibility})
750 when is_list(visibility) do
751 if Enum.all?(visibility, &(&1 in @valid_visibilities)) do
756 "activity_visibility(?, ?, ?) = ANY (?)",
764 Logger.error("Could not exclude visibility to #{visibility}")
769 defp exclude_visibility(query, %{"exclude_visibilities" => visibility})
770 when visibility in @valid_visibilities do
775 "activity_visibility(?, ?, ?) = ?",
784 defp exclude_visibility(query, %{"exclude_visibilities" => visibility})
785 when visibility not in [nil | @valid_visibilities] do
786 Logger.error("Could not exclude visibility to #{visibility}")
790 defp exclude_visibility(query, _visibility), do: query
792 defp restrict_thread_visibility(query, _, %{skip_thread_containment: true} = _),
795 defp restrict_thread_visibility(
797 %{"user" => %User{skip_thread_containment: true}},
802 defp restrict_thread_visibility(query, %{"user" => %User{ap_id: ap_id}}, _) do
805 where: fragment("thread_visibility(?, (?)->>'id') = true", ^ap_id, a.data)
809 defp restrict_thread_visibility(query, _, _), do: query
811 def fetch_user_abstract_activities(user, reading_user, params \\ %{}) do
814 |> Map.put("user", reading_user)
815 |> Map.put("actor_id", user.ap_id)
818 user_activities_recipients(%{
819 "godmode" => params["godmode"],
820 "reading_user" => reading_user
823 fetch_activities(recipients, params)
827 def fetch_user_activities(user, reading_user, params \\ %{}) do
830 |> Map.put("type", ["Create", "Announce"])
831 |> Map.put("user", reading_user)
832 |> Map.put("actor_id", user.ap_id)
833 |> Map.put("pinned_activity_ids", user.pinned_activities)
836 if User.blocks?(reading_user, user) do
840 |> Map.put("blocking_user", reading_user)
841 |> Map.put("muting_user", reading_user)
845 user_activities_recipients(%{
846 "godmode" => params["godmode"],
847 "reading_user" => reading_user
850 fetch_activities(recipients, params)
854 def fetch_statuses(reading_user, params) do
857 |> Map.put("type", ["Create", "Announce"])
860 user_activities_recipients(%{
861 "godmode" => params["godmode"],
862 "reading_user" => reading_user
865 fetch_activities(recipients, params, :offset)
869 defp user_activities_recipients(%{"godmode" => true}) do
873 defp user_activities_recipients(%{"reading_user" => reading_user}) do
875 [Constants.as_public()] ++ [reading_user.ap_id | User.following(reading_user)]
877 [Constants.as_public()]
881 defp restrict_since(query, %{"since_id" => ""}), do: query
883 defp restrict_since(query, %{"since_id" => since_id}) do
884 from(activity in query, where: activity.id > ^since_id)
887 defp restrict_since(query, _), do: query
889 defp restrict_tag_reject(_query, %{"tag_reject" => _tag_reject, "skip_preload" => true}) do
890 raise "Can't use the child object without preloading!"
893 defp restrict_tag_reject(query, %{"tag_reject" => tag_reject})
894 when is_list(tag_reject) and tag_reject != [] do
896 [_activity, object] in query,
897 where: fragment("not (?)->'tag' \\?| (?)", object.data, ^tag_reject)
901 defp restrict_tag_reject(query, _), do: query
903 defp restrict_tag_all(_query, %{"tag_all" => _tag_all, "skip_preload" => true}) do
904 raise "Can't use the child object without preloading!"
907 defp restrict_tag_all(query, %{"tag_all" => tag_all})
908 when is_list(tag_all) and tag_all != [] do
910 [_activity, object] in query,
911 where: fragment("(?)->'tag' \\?& (?)", object.data, ^tag_all)
915 defp restrict_tag_all(query, _), do: query
917 defp restrict_tag(_query, %{"tag" => _tag, "skip_preload" => true}) do
918 raise "Can't use the child object without preloading!"
921 defp restrict_tag(query, %{"tag" => tag}) when is_list(tag) do
923 [_activity, object] in query,
924 where: fragment("(?)->'tag' \\?| (?)", object.data, ^tag)
928 defp restrict_tag(query, %{"tag" => tag}) when is_binary(tag) do
930 [_activity, object] in query,
931 where: fragment("(?)->'tag' \\? (?)", object.data, ^tag)
935 defp restrict_tag(query, _), do: query
937 defp restrict_recipients(query, [], _user), do: query
939 defp restrict_recipients(query, recipients, nil) do
940 from(activity in query, where: fragment("? && ?", ^recipients, activity.recipients))
943 defp restrict_recipients(query, recipients, user) do
946 where: fragment("? && ?", ^recipients, activity.recipients),
947 or_where: activity.actor == ^user.ap_id
951 defp restrict_local(query, %{"local_only" => true}) do
952 from(activity in query, where: activity.local == true)
955 defp restrict_local(query, _), do: query
957 defp restrict_actor(query, %{"actor_id" => actor_id}) do
958 from(activity in query, where: activity.actor == ^actor_id)
961 defp restrict_actor(query, _), do: query
963 defp restrict_type(query, %{"type" => type}) when is_binary(type) do
964 from(activity in query, where: fragment("?->>'type' = ?", activity.data, ^type))
967 defp restrict_type(query, %{"type" => type}) do
968 from(activity in query, where: fragment("?->>'type' = ANY(?)", activity.data, ^type))
971 defp restrict_type(query, _), do: query
973 defp restrict_state(query, %{"state" => state}) do
974 from(activity in query, where: fragment("?->>'state' = ?", activity.data, ^state))
977 defp restrict_state(query, _), do: query
979 defp restrict_favorited_by(query, %{"favorited_by" => ap_id}) do
981 [_activity, object] in query,
982 where: fragment("(?)->'likes' \\? (?)", object.data, ^ap_id)
986 defp restrict_favorited_by(query, _), do: query
988 defp restrict_media(_query, %{"only_media" => _val, "skip_preload" => true}) do
989 raise "Can't use the child object without preloading!"
992 defp restrict_media(query, %{"only_media" => val}) when val in [true, "true", "1"] do
994 [_activity, object] in query,
995 where: fragment("not (?)->'attachment' = (?)", object.data, ^[])
999 defp restrict_media(query, _), do: query
1001 defp restrict_replies(query, %{"exclude_replies" => val}) when val in [true, "true", "1"] do
1003 [_activity, object] in query,
1004 where: fragment("?->>'inReplyTo' is null", object.data)
1008 defp restrict_replies(query, %{
1009 "reply_filtering_user" => user,
1010 "reply_visibility" => "self"
1013 [activity, object] in query,
1016 "?->>'inReplyTo' is null OR ? = ANY(?)",
1024 defp restrict_replies(query, %{
1025 "reply_filtering_user" => user,
1026 "reply_visibility" => "following"
1029 [activity, object] in query,
1032 "?->>'inReplyTo' is null OR ? && array_remove(?, ?) OR ? = ?",
1034 ^[user.ap_id | User.get_cached_user_friends_ap_ids(user)],
1035 activity.recipients,
1043 defp restrict_replies(query, _), do: query
1045 defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val in [true, "true", "1"] do
1046 from(activity in query, where: fragment("?->>'type' != 'Announce'", activity.data))
1049 defp restrict_reblogs(query, _), do: query
1051 defp restrict_muted(query, %{"with_muted" => val}) when val in [true, "true", "1"], do: query
1053 defp restrict_muted(query, %{"muting_user" => %User{} = user} = opts) do
1054 mutes = opts["muted_users_ap_ids"] || User.muted_users_ap_ids(user)
1057 from([activity] in query,
1058 where: fragment("not (? = ANY(?))", activity.actor, ^mutes),
1059 where: fragment("not (?->'to' \\?| ?)", activity.data, ^mutes)
1062 unless opts["skip_preload"] do
1063 from([thread_mute: tm] in query, where: is_nil(tm.user_id))
1069 defp restrict_muted(query, _), do: query
1071 defp restrict_blocked(query, %{"blocking_user" => %User{} = user} = opts) do
1072 blocked_ap_ids = opts["blocked_users_ap_ids"] || User.blocked_users_ap_ids(user)
1073 domain_blocks = user.domain_blocks || []
1075 following_ap_ids = User.get_friends_ap_ids(user)
1078 if has_named_binding?(query, :object), do: query, else: Activity.with_joined_object(query)
1081 [activity, object: o] in query,
1082 where: fragment("not (? = ANY(?))", activity.actor, ^blocked_ap_ids),
1083 where: fragment("not (? && ?)", activity.recipients, ^blocked_ap_ids),
1086 "not (?->>'type' = 'Announce' and ?->'to' \\?| ?)",
1093 "(not (split_part(?, '/', 3) = ANY(?))) or ? = ANY(?)",
1101 "(not (split_part(?->>'actor', '/', 3) = ANY(?))) or (?->>'actor') = ANY(?)",
1110 defp restrict_blocked(query, _), do: query
1112 defp restrict_unlisted(query) do
1117 "not (coalesce(?->'cc', '{}'::jsonb) \\?| ?)",
1119 ^[Constants.as_public()]
1124 # TODO: when all endpoints migrated to OpenAPI compare `pinned` with `true` (boolean) only,
1125 # the same for `restrict_media/2`, `restrict_replies/2`, 'restrict_reblogs/2'
1126 # and `restrict_muted/2`
1128 defp restrict_pinned(query, %{"pinned" => pinned, "pinned_activity_ids" => ids})
1129 when pinned in [true, "true", "1"] do
1130 from(activity in query, where: activity.id in ^ids)
1133 defp restrict_pinned(query, _), do: query
1135 defp restrict_muted_reblogs(query, %{"muting_user" => %User{} = user} = opts) do
1136 muted_reblogs = opts["reblog_muted_users_ap_ids"] || User.reblog_muted_users_ap_ids(user)
1142 "not ( ?->>'type' = 'Announce' and ? = ANY(?))",
1150 defp restrict_muted_reblogs(query, _), do: query
1152 defp restrict_instance(query, %{"instance" => instance}) do
1157 where: fragment("? LIKE ?", u.nickname, ^"%@#{instance}")
1161 from(activity in query, where: activity.actor in ^users)
1164 defp restrict_instance(query, _), do: query
1166 defp exclude_poll_votes(query, %{"include_poll_votes" => true}), do: query
1168 defp exclude_poll_votes(query, _) do
1169 if has_named_binding?(query, :object) do
1170 from([activity, object: o] in query,
1171 where: fragment("not(?->>'type' = ?)", o.data, "Answer")
1178 defp exclude_id(query, %{"exclude_id" => id}) when is_binary(id) do
1179 from(activity in query, where: activity.id != ^id)
1182 defp exclude_id(query, _), do: query
1184 defp maybe_preload_objects(query, %{"skip_preload" => true}), do: query
1186 defp maybe_preload_objects(query, _) do
1188 |> Activity.with_preloaded_object()
1191 defp maybe_preload_bookmarks(query, %{"skip_preload" => true}), do: query
1193 defp maybe_preload_bookmarks(query, opts) do
1195 |> Activity.with_preloaded_bookmark(opts["user"])
1198 defp maybe_preload_report_notes(query, %{"preload_report_notes" => true}) do
1200 |> Activity.with_preloaded_report_notes()
1203 defp maybe_preload_report_notes(query, _), do: query
1205 defp maybe_set_thread_muted_field(query, %{"skip_preload" => true}), do: query
1207 defp maybe_set_thread_muted_field(query, opts) do
1209 |> Activity.with_set_thread_muted_field(opts["muting_user"] || opts["user"])
1212 defp maybe_order(query, %{order: :desc}) do
1214 |> order_by(desc: :id)
1217 defp maybe_order(query, %{order: :asc}) do
1219 |> order_by(asc: :id)
1222 defp maybe_order(query, _), do: query
1224 defp fetch_activities_query_ap_ids_ops(opts) do
1225 source_user = opts["muting_user"]
1226 ap_id_relationships = if source_user, do: [:mute, :reblog_mute], else: []
1228 ap_id_relationships =
1229 ap_id_relationships ++
1230 if opts["blocking_user"] && opts["blocking_user"] == source_user do
1236 preloaded_ap_ids = User.outgoing_relationships_ap_ids(source_user, ap_id_relationships)
1238 restrict_blocked_opts = Map.merge(%{"blocked_users_ap_ids" => preloaded_ap_ids[:block]}, opts)
1239 restrict_muted_opts = Map.merge(%{"muted_users_ap_ids" => preloaded_ap_ids[:mute]}, opts)
1241 restrict_muted_reblogs_opts =
1242 Map.merge(%{"reblog_muted_users_ap_ids" => preloaded_ap_ids[:reblog_mute]}, opts)
1244 {restrict_blocked_opts, restrict_muted_opts, restrict_muted_reblogs_opts}
1247 def fetch_activities_query(recipients, opts \\ %{}) do
1248 {restrict_blocked_opts, restrict_muted_opts, restrict_muted_reblogs_opts} =
1249 fetch_activities_query_ap_ids_ops(opts)
1252 skip_thread_containment: Config.get([:instance, :skip_thread_containment])
1256 |> maybe_preload_objects(opts)
1257 |> maybe_preload_bookmarks(opts)
1258 |> maybe_preload_report_notes(opts)
1259 |> maybe_set_thread_muted_field(opts)
1260 |> maybe_order(opts)
1261 |> restrict_recipients(recipients, opts["user"])
1262 |> restrict_replies(opts)
1263 |> restrict_tag(opts)
1264 |> restrict_tag_reject(opts)
1265 |> restrict_tag_all(opts)
1266 |> restrict_since(opts)
1267 |> restrict_local(opts)
1268 |> restrict_actor(opts)
1269 |> restrict_type(opts)
1270 |> restrict_state(opts)
1271 |> restrict_favorited_by(opts)
1272 |> restrict_blocked(restrict_blocked_opts)
1273 |> restrict_muted(restrict_muted_opts)
1274 |> restrict_media(opts)
1275 |> restrict_visibility(opts)
1276 |> restrict_thread_visibility(opts, config)
1277 |> restrict_reblogs(opts)
1278 |> restrict_pinned(opts)
1279 |> restrict_muted_reblogs(restrict_muted_reblogs_opts)
1280 |> restrict_instance(opts)
1281 |> Activity.restrict_deactivated_users()
1282 |> exclude_poll_votes(opts)
1283 |> exclude_visibility(opts)
1286 def fetch_activities(recipients, opts \\ %{}, pagination \\ :keyset) do
1287 list_memberships = Pleroma.List.memberships(opts["user"])
1289 fetch_activities_query(recipients ++ list_memberships, opts)
1290 |> Pagination.fetch_paginated(opts, pagination)
1292 |> maybe_update_cc(list_memberships, opts["user"])
1296 Fetch favorites activities of user with order by sort adds to favorites
1298 @spec fetch_favourites(User.t(), map(), Pagination.type()) :: list(Activity.t())
1299 def fetch_favourites(user, params \\ %{}, pagination \\ :keyset) do
1301 |> Activity.Queries.by_actor()
1302 |> Activity.Queries.by_type("Like")
1303 |> Activity.with_joined_object()
1304 |> Object.with_joined_activity()
1305 |> select([_like, object, activity], %{activity | object: object})
1306 |> order_by([like, _, _], desc: like.id)
1307 |> Pagination.fetch_paginated(
1308 Map.merge(params, %{"skip_order" => true}),
1314 defp maybe_update_cc(activities, list_memberships, %User{ap_id: user_ap_id})
1315 when is_list(list_memberships) and length(list_memberships) > 0 do
1316 Enum.map(activities, fn
1317 %{data: %{"bcc" => bcc}} = activity when is_list(bcc) and length(bcc) > 0 ->
1318 if Enum.any?(bcc, &(&1 in list_memberships)) do
1319 update_in(activity.data["cc"], &[user_ap_id | &1])
1329 defp maybe_update_cc(activities, _, _), do: activities
1331 def fetch_activities_bounded_query(query, recipients, recipients_with_public) do
1332 from(activity in query,
1334 fragment("? && ?", activity.recipients, ^recipients) or
1335 (fragment("? && ?", activity.recipients, ^recipients_with_public) and
1336 ^Constants.as_public() in activity.recipients)
1340 def fetch_activities_bounded(
1342 recipients_with_public,
1344 pagination \\ :keyset
1346 fetch_activities_query([], opts)
1347 |> fetch_activities_bounded_query(recipients, recipients_with_public)
1348 |> Pagination.fetch_paginated(opts, pagination)
1352 @spec upload(Upload.source(), keyword()) :: {:ok, Object.t()} | {:error, any()}
1353 def upload(file, opts \\ []) do
1354 with {:ok, data} <- Upload.store(file, opts) do
1357 Map.put(data, "actor", opts[:actor])
1362 Repo.insert(%Object{data: obj_data})
1366 @spec get_actor_url(any()) :: binary() | nil
1367 defp get_actor_url(url) when is_binary(url), do: url
1368 defp get_actor_url(%{"href" => href}) when is_binary(href), do: href
1370 defp get_actor_url(url) when is_list(url) do
1376 defp get_actor_url(_url), do: nil
1378 defp object_to_user_data(data) do
1380 data["icon"]["url"] &&
1383 "url" => [%{"href" => data["icon"]["url"]}]
1387 data["image"]["url"] &&
1390 "url" => [%{"href" => data["image"]["url"]}]
1395 |> Map.get("attachment", [])
1396 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1397 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1401 |> Map.get("tag", [])
1403 %{"type" => "Emoji"} -> true
1406 |> Enum.reduce(%{}, fn %{"icon" => %{"url" => url}, "name" => name}, acc ->
1407 Map.put(acc, String.trim(name, ":"), url)
1410 locked = data["manuallyApprovesFollowers"] || false
1411 data = Transmogrifier.maybe_fix_user_object(data)
1412 discoverable = data["discoverable"] || false
1413 invisible = data["invisible"] || false
1414 actor_type = data["type"] || "Person"
1417 if is_map(data["publicKey"]) && is_binary(data["publicKey"]["publicKeyPem"]) do
1418 data["publicKey"]["publicKeyPem"]
1424 if is_map(data["endpoints"]) && is_binary(data["endpoints"]["sharedInbox"]) do
1425 data["endpoints"]["sharedInbox"]
1432 uri: get_actor_url(data["url"]),
1438 discoverable: discoverable,
1439 invisible: invisible,
1442 follower_address: data["followers"],
1443 following_address: data["following"],
1444 bio: data["summary"],
1445 actor_type: actor_type,
1446 also_known_as: Map.get(data, "alsoKnownAs", []),
1447 public_key: public_key,
1448 inbox: data["inbox"],
1449 shared_inbox: shared_inbox
1452 # nickname can be nil because of virtual actors
1454 if data["preferredUsername"] do
1458 "#{data["preferredUsername"]}@#{URI.parse(data["id"]).host}"
1461 Map.put(user_data, :nickname, nil)
1467 def fetch_follow_information_for_user(user) do
1468 with {:ok, following_data} <-
1469 Fetcher.fetch_and_contain_remote_object_from_id(user.following_address),
1470 {:ok, hide_follows} <- collection_private(following_data),
1471 {:ok, followers_data} <-
1472 Fetcher.fetch_and_contain_remote_object_from_id(user.follower_address),
1473 {:ok, hide_followers} <- collection_private(followers_data) do
1476 hide_follows: hide_follows,
1477 follower_count: normalize_counter(followers_data["totalItems"]),
1478 following_count: normalize_counter(following_data["totalItems"]),
1479 hide_followers: hide_followers
1482 {:error, _} = e -> e
1487 defp normalize_counter(counter) when is_integer(counter), do: counter
1488 defp normalize_counter(_), do: 0
1490 def maybe_update_follow_information(user_data) do
1491 with {:enabled, true} <- {:enabled, Config.get([:instance, :external_user_synchronization])},
1492 {_, true} <- {:user_type_check, user_data[:type] in ["Person", "Service"]},
1494 {:collections_available,
1495 !!(user_data[:following_address] && user_data[:follower_address])},
1497 fetch_follow_information_for_user(user_data) do
1498 info = Map.merge(user_data[:info] || %{}, info)
1501 |> Map.put(:info, info)
1503 {:user_type_check, false} ->
1506 {:collections_available, false} ->
1509 {:enabled, false} ->
1514 "Follower/Following counter update for #{user_data.ap_id} failed.\n" <> inspect(e)
1521 defp collection_private(%{"first" => %{"type" => type}})
1522 when type in ["CollectionPage", "OrderedCollectionPage"],
1525 defp collection_private(%{"first" => first}) do
1526 with {:ok, %{"type" => type}} when type in ["CollectionPage", "OrderedCollectionPage"] <-
1527 Fetcher.fetch_and_contain_remote_object_from_id(first) do
1530 {:error, {:ok, %{status: code}}} when code in [401, 403] -> {:ok, true}
1531 {:error, _} = e -> e
1536 defp collection_private(_data), do: {:ok, true}
1538 def user_data_from_user_object(data) do
1539 with {:ok, data} <- MRF.filter(data),
1540 {:ok, data} <- object_to_user_data(data) do
1547 def fetch_and_prepare_user_from_ap_id(ap_id) do
1548 with {:ok, data} <- Fetcher.fetch_and_contain_remote_object_from_id(ap_id),
1549 {:ok, data} <- user_data_from_user_object(data),
1550 data <- maybe_update_follow_information(data) do
1553 {:error, "Object has been deleted"} = e ->
1554 Logger.debug("Could not decode user at fetch #{ap_id}, #{inspect(e)}")
1558 Logger.error("Could not decode user at fetch #{ap_id}, #{inspect(e)}")
1563 def make_user_from_ap_id(ap_id) do
1564 user = User.get_cached_by_ap_id(ap_id)
1566 if user && !User.ap_enabled?(user) do
1567 Transmogrifier.upgrade_user_from_ap_id(ap_id)
1569 with {:ok, data} <- fetch_and_prepare_user_from_ap_id(ap_id) do
1572 |> User.remote_user_changeset(data)
1573 |> User.update_and_set_cache()
1576 |> User.remote_user_changeset()
1586 def make_user_from_nickname(nickname) do
1587 with {:ok, %{"ap_id" => ap_id}} when not is_nil(ap_id) <- WebFinger.finger(nickname) do
1588 make_user_from_ap_id(ap_id)
1590 _e -> {:error, "No AP id in WebFinger"}
1594 # filter out broken threads
1595 def contain_broken_threads(%Activity{} = activity, %User{} = user) do
1596 entire_thread_visible_for_user?(activity, user)
1599 # do post-processing on a specific activity
1600 def contain_activity(%Activity{} = activity, %User{} = user) do
1601 contain_broken_threads(activity, user)
1604 def fetch_direct_messages_query do
1606 |> restrict_type(%{"type" => "Create"})
1607 |> restrict_visibility(%{visibility: "direct"})
1608 |> order_by([activity], asc: activity.id)