f785744556825a2e30c08f8e31dff99522f2efec
[akkoma] / lib / pleroma / web / activity_pub / activity_pub.ex
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Web.ActivityPub.ActivityPub do
6 alias Pleroma.Activity
7 alias Pleroma.Activity.Ir.Topics
8 alias Pleroma.Config
9 alias Pleroma.Conversation
10 alias Pleroma.Notification
11 alias Pleroma.Object
12 alias Pleroma.Object.Containment
13 alias Pleroma.Object.Fetcher
14 alias Pleroma.Pagination
15 alias Pleroma.Repo
16 alias Pleroma.Upload
17 alias Pleroma.User
18 alias Pleroma.Web.ActivityPub.MRF
19 alias Pleroma.Web.ActivityPub.Transmogrifier
20 alias Pleroma.Web.ActivityPub.Utils
21 alias Pleroma.Web.Streamer
22 alias Pleroma.Web.WebFinger
23 alias Pleroma.Workers.BackgroundWorker
24
25 import Ecto.Query
26 import Pleroma.Web.ActivityPub.Utils
27 import Pleroma.Web.ActivityPub.Visibility
28
29 require Logger
30 require Pleroma.Constants
31
32 # For Announce activities, we filter the recipients based on following status for any actors
33 # that match actual users. See issue #164 for more information about why this is necessary.
34 defp get_recipients(%{"type" => "Announce"} = data) do
35 to = Map.get(data, "to", [])
36 cc = Map.get(data, "cc", [])
37 bcc = Map.get(data, "bcc", [])
38 actor = User.get_cached_by_ap_id(data["actor"])
39
40 recipients =
41 Enum.filter(Enum.concat([to, cc, bcc]), fn recipient ->
42 case User.get_cached_by_ap_id(recipient) do
43 nil -> true
44 user -> User.following?(user, actor)
45 end
46 end)
47
48 {recipients, to, cc}
49 end
50
51 defp get_recipients(%{"type" => "Create"} = data) do
52 to = Map.get(data, "to", [])
53 cc = Map.get(data, "cc", [])
54 bcc = Map.get(data, "bcc", [])
55 actor = Map.get(data, "actor", [])
56 recipients = [to, cc, bcc, [actor]] |> Enum.concat() |> Enum.uniq()
57 {recipients, to, cc}
58 end
59
60 defp get_recipients(data) do
61 to = Map.get(data, "to", [])
62 cc = Map.get(data, "cc", [])
63 bcc = Map.get(data, "bcc", [])
64 recipients = Enum.concat([to, cc, bcc])
65 {recipients, to, cc}
66 end
67
68 defp check_actor_is_active(actor) do
69 if not is_nil(actor) do
70 with user <- User.get_cached_by_ap_id(actor),
71 false <- user.info.deactivated do
72 true
73 else
74 _e -> false
75 end
76 else
77 true
78 end
79 end
80
81 defp check_remote_limit(%{"object" => %{"content" => content}}) when not is_nil(content) do
82 limit = Config.get([:instance, :remote_limit])
83 String.length(content) <= limit
84 end
85
86 defp check_remote_limit(_), do: true
87
88 def increase_note_count_if_public(actor, object) do
89 if is_public?(object), do: User.increase_note_count(actor), else: {:ok, actor}
90 end
91
92 def decrease_note_count_if_public(actor, object) do
93 if is_public?(object), do: User.decrease_note_count(actor), else: {:ok, actor}
94 end
95
96 def increase_replies_count_if_reply(%{
97 "object" => %{"inReplyTo" => reply_ap_id} = object,
98 "type" => "Create"
99 }) do
100 if is_public?(object) do
101 Object.increase_replies_count(reply_ap_id)
102 end
103 end
104
105 def increase_replies_count_if_reply(_create_data), do: :noop
106
107 def decrease_replies_count_if_reply(%Object{
108 data: %{"inReplyTo" => reply_ap_id} = object
109 }) do
110 if is_public?(object) do
111 Object.decrease_replies_count(reply_ap_id)
112 end
113 end
114
115 def decrease_replies_count_if_reply(_object), do: :noop
116
117 def increase_poll_votes_if_vote(%{
118 "object" => %{"inReplyTo" => reply_ap_id, "name" => name},
119 "type" => "Create"
120 }) do
121 Object.increase_vote_count(reply_ap_id, name)
122 end
123
124 def increase_poll_votes_if_vote(_create_data), do: :noop
125
126 def insert(map, local \\ true, fake \\ false, bypass_actor_check \\ false) when is_map(map) do
127 with nil <- Activity.normalize(map),
128 map <- lazy_put_activity_defaults(map, fake),
129 true <- bypass_actor_check || check_actor_is_active(map["actor"]),
130 {_, true} <- {:remote_limit_error, check_remote_limit(map)},
131 {:ok, map} <- MRF.filter(map),
132 {recipients, _, _} = get_recipients(map),
133 {:fake, false, map, recipients} <- {:fake, fake, map, recipients},
134 :ok <- Containment.contain_child(map),
135 {:ok, map, object} <- insert_full_object(map) do
136 {:ok, activity} =
137 Repo.insert(%Activity{
138 data: map,
139 local: local,
140 actor: map["actor"],
141 recipients: recipients
142 })
143
144 # Splice in the child object if we have one.
145 activity =
146 if not is_nil(object) do
147 Map.put(activity, :object, object)
148 else
149 activity
150 end
151
152 BackgroundWorker.enqueue("fetch_data_for_activity", %{"activity_id" => activity.id})
153
154 Notification.create_notifications(activity)
155
156 participations =
157 activity
158 |> Conversation.create_or_bump_for()
159 |> get_participations()
160
161 stream_out(activity)
162 stream_out_participations(participations)
163 {:ok, activity}
164 else
165 %Activity{} = activity ->
166 {:ok, activity}
167
168 {:fake, true, map, recipients} ->
169 activity = %Activity{
170 data: map,
171 local: local,
172 actor: map["actor"],
173 recipients: recipients,
174 id: "pleroma:fakeid"
175 }
176
177 Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity)
178 {:ok, activity}
179
180 error ->
181 {:error, error}
182 end
183 end
184
185 defp get_participations({:ok, %{participations: participations}}), do: participations
186 defp get_participations(_), do: []
187
188 def stream_out_participations(participations) do
189 participations =
190 participations
191 |> Repo.preload(:user)
192
193 Streamer.stream("participation", participations)
194 end
195
196 def stream_out_participations(%Object{data: %{"context" => context}}, user) do
197 with %Conversation{} = conversation <- Conversation.get_for_ap_id(context),
198 conversation = Repo.preload(conversation, :participations),
199 last_activity_id =
200 fetch_latest_activity_id_for_context(conversation.ap_id, %{
201 "user" => user,
202 "blocking_user" => user
203 }) do
204 if last_activity_id do
205 stream_out_participations(conversation.participations)
206 end
207 end
208 end
209
210 def stream_out_participations(_, _), do: :noop
211
212 def stream_out(%Activity{data: %{"type" => data_type}} = activity)
213 when data_type in ["Create", "Announce", "Delete"] do
214 activity
215 |> Topics.get_activity_topics()
216 |> Streamer.stream(activity)
217 end
218
219 def stream_out(_activity) do
220 :noop
221 end
222
223 def create(%{to: to, actor: actor, context: context, object: object} = params, fake \\ false) do
224 additional = params[:additional] || %{}
225 # only accept false as false value
226 local = !(params[:local] == false)
227 published = params[:published]
228
229 with create_data <-
230 make_create_data(
231 %{to: to, actor: actor, published: published, context: context, object: object},
232 additional
233 ),
234 {:ok, activity} <- insert(create_data, local, fake),
235 {:fake, false, activity} <- {:fake, fake, activity},
236 _ <- increase_replies_count_if_reply(create_data),
237 _ <- increase_poll_votes_if_vote(create_data),
238 # Changing note count prior to enqueuing federation task in order to avoid
239 # race conditions on updating user.info
240 {:ok, _actor} <- increase_note_count_if_public(actor, activity),
241 :ok <- maybe_federate(activity) do
242 {:ok, activity}
243 else
244 {:fake, true, activity} ->
245 {:ok, activity}
246
247 {:error, message} ->
248 {:error, message}
249 end
250 end
251
252 def listen(%{to: to, actor: actor, context: context, object: object} = params) do
253 additional = params[:additional] || %{}
254 # only accept false as false value
255 local = !(params[:local] == false)
256 published = params[:published]
257
258 with listen_data <-
259 make_listen_data(
260 %{to: to, actor: actor, published: published, context: context, object: object},
261 additional
262 ),
263 {:ok, activity} <- insert(listen_data, local),
264 :ok <- maybe_federate(activity) do
265 {:ok, activity}
266 else
267 {:error, message} ->
268 {:error, message}
269 end
270 end
271
272 def accept(%{to: to, actor: actor, object: object} = params) do
273 # only accept false as false value
274 local = !(params[:local] == false)
275
276 with data <- %{"to" => to, "type" => "Accept", "actor" => actor.ap_id, "object" => object},
277 {:ok, activity} <- insert(data, local),
278 :ok <- maybe_federate(activity) do
279 {:ok, activity}
280 end
281 end
282
283 def reject(%{to: to, actor: actor, object: object} = params) do
284 # only accept false as false value
285 local = !(params[:local] == false)
286
287 with data <- %{"to" => to, "type" => "Reject", "actor" => actor.ap_id, "object" => object},
288 {:ok, activity} <- insert(data, local),
289 :ok <- maybe_federate(activity) do
290 {:ok, activity}
291 end
292 end
293
294 def update(%{to: to, cc: cc, actor: actor, object: object} = params) do
295 local = !(params[:local] == false)
296 activity_id = params[:activity_id]
297
298 with data <- %{
299 "to" => to,
300 "cc" => cc,
301 "type" => "Update",
302 "actor" => actor,
303 "object" => object
304 },
305 data <- Utils.maybe_put(data, "id", activity_id),
306 {:ok, activity} <- insert(data, local),
307 :ok <- maybe_federate(activity) do
308 {:ok, activity}
309 end
310 end
311
312 # TODO: This is weird, maybe we shouldn't check here if we can make the activity.
313 def like(
314 %User{ap_id: ap_id} = user,
315 %Object{data: %{"id" => _}} = object,
316 activity_id \\ nil,
317 local \\ true
318 ) do
319 with nil <- get_existing_like(ap_id, object),
320 like_data <- make_like_data(user, object, activity_id),
321 {:ok, activity} <- insert(like_data, local),
322 {:ok, object} <- add_like_to_object(activity, object),
323 :ok <- maybe_federate(activity) do
324 {:ok, activity, object}
325 else
326 %Activity{} = activity -> {:ok, activity, object}
327 error -> {:error, error}
328 end
329 end
330
331 def unlike(%User{} = actor, %Object{} = object, activity_id \\ nil, local \\ true) do
332 with %Activity{} = like_activity <- get_existing_like(actor.ap_id, object),
333 unlike_data <- make_unlike_data(actor, like_activity, activity_id),
334 {:ok, unlike_activity} <- insert(unlike_data, local),
335 {:ok, _activity} <- Repo.delete(like_activity),
336 {:ok, object} <- remove_like_from_object(like_activity, object),
337 :ok <- maybe_federate(unlike_activity) do
338 {:ok, unlike_activity, like_activity, object}
339 else
340 _e -> {:ok, object}
341 end
342 end
343
344 def announce(
345 %User{ap_id: _} = user,
346 %Object{data: %{"id" => _}} = object,
347 activity_id \\ nil,
348 local \\ true,
349 public \\ true
350 ) do
351 with true <- is_announceable?(object, user, public),
352 announce_data <- make_announce_data(user, object, activity_id, public),
353 {:ok, activity} <- insert(announce_data, local),
354 {:ok, object} <- add_announce_to_object(activity, object),
355 :ok <- maybe_federate(activity) do
356 {:ok, activity, object}
357 else
358 error -> {:error, error}
359 end
360 end
361
362 def unannounce(
363 %User{} = actor,
364 %Object{} = object,
365 activity_id \\ nil,
366 local \\ true
367 ) do
368 with %Activity{} = announce_activity <- get_existing_announce(actor.ap_id, object),
369 unannounce_data <- make_unannounce_data(actor, announce_activity, activity_id),
370 {:ok, unannounce_activity} <- insert(unannounce_data, local),
371 :ok <- maybe_federate(unannounce_activity),
372 {:ok, _activity} <- Repo.delete(announce_activity),
373 {:ok, object} <- remove_announce_from_object(announce_activity, object) do
374 {:ok, unannounce_activity, object}
375 else
376 _e -> {:ok, object}
377 end
378 end
379
380 def follow(follower, followed, activity_id \\ nil, local \\ true) do
381 with data <- make_follow_data(follower, followed, activity_id),
382 {:ok, activity} <- insert(data, local),
383 :ok <- maybe_federate(activity),
384 _ <- User.set_follow_state_cache(follower.ap_id, followed.ap_id, activity.data["state"]) do
385 {:ok, activity}
386 end
387 end
388
389 def unfollow(follower, followed, activity_id \\ nil, local \\ true) do
390 with %Activity{} = follow_activity <- fetch_latest_follow(follower, followed),
391 {:ok, follow_activity} <- update_follow_state(follow_activity, "cancelled"),
392 unfollow_data <- make_unfollow_data(follower, followed, follow_activity, activity_id),
393 {:ok, activity} <- insert(unfollow_data, local),
394 :ok <- maybe_federate(activity) do
395 {:ok, activity}
396 end
397 end
398
399 def delete(%User{ap_id: ap_id, follower_address: follower_address} = user) do
400 with data <- %{
401 "to" => [follower_address],
402 "type" => "Delete",
403 "actor" => ap_id,
404 "object" => %{"type" => "Person", "id" => ap_id}
405 },
406 {:ok, activity} <- insert(data, true, true, true),
407 :ok <- maybe_federate(activity) do
408 {:ok, user}
409 end
410 end
411
412 def delete(%Object{data: %{"id" => id, "actor" => actor}} = object, options \\ []) do
413 local = Keyword.get(options, :local, true)
414 activity_id = Keyword.get(options, :activity_id, nil)
415 actor = Keyword.get(options, :actor, actor)
416
417 user = User.get_cached_by_ap_id(actor)
418 to = (object.data["to"] || []) ++ (object.data["cc"] || [])
419
420 with {:ok, object, activity} <- Object.delete(object),
421 data <-
422 %{
423 "type" => "Delete",
424 "actor" => actor,
425 "object" => id,
426 "to" => to,
427 "deleted_activity_id" => activity && activity.id
428 }
429 |> maybe_put("id", activity_id),
430 {:ok, activity} <- insert(data, local, false),
431 stream_out_participations(object, user),
432 _ <- decrease_replies_count_if_reply(object),
433 # Changing note count prior to enqueuing federation task in order to avoid
434 # race conditions on updating user.info
435 {:ok, _actor} <- decrease_note_count_if_public(user, object),
436 :ok <- maybe_federate(activity) do
437 {:ok, activity}
438 end
439 end
440
441 @spec block(User.t(), User.t(), String.t() | nil, boolean) :: {:ok, Activity.t() | nil}
442 def block(blocker, blocked, activity_id \\ nil, local \\ true) do
443 outgoing_blocks = Config.get([:activitypub, :outgoing_blocks])
444 unfollow_blocked = Config.get([:activitypub, :unfollow_blocked])
445
446 if unfollow_blocked do
447 follow_activity = fetch_latest_follow(blocker, blocked)
448 if follow_activity, do: unfollow(blocker, blocked, nil, local)
449 end
450
451 with true <- outgoing_blocks,
452 block_data <- make_block_data(blocker, blocked, activity_id),
453 {:ok, activity} <- insert(block_data, local),
454 :ok <- maybe_federate(activity) do
455 {:ok, activity}
456 else
457 _e -> {:ok, nil}
458 end
459 end
460
461 def unblock(blocker, blocked, activity_id \\ nil, local \\ true) do
462 with %Activity{} = block_activity <- fetch_latest_block(blocker, blocked),
463 unblock_data <- make_unblock_data(blocker, blocked, block_activity, activity_id),
464 {:ok, activity} <- insert(unblock_data, local),
465 :ok <- maybe_federate(activity) do
466 {:ok, activity}
467 end
468 end
469
470 @spec flag(map()) :: {:ok, Activity.t()} | any
471 def flag(
472 %{
473 actor: actor,
474 context: _context,
475 account: account,
476 statuses: statuses,
477 content: content
478 } = params
479 ) do
480 # only accept false as false value
481 local = !(params[:local] == false)
482 forward = !(params[:forward] == false)
483
484 additional = params[:additional] || %{}
485
486 additional =
487 if forward do
488 Map.merge(additional, %{"to" => [], "cc" => [account.ap_id]})
489 else
490 Map.merge(additional, %{"to" => [], "cc" => []})
491 end
492
493 with flag_data <- make_flag_data(params, additional),
494 {:ok, activity} <- insert(flag_data, local),
495 :ok <- maybe_federate(activity) do
496 Enum.each(User.all_superusers(), fn superuser ->
497 superuser
498 |> Pleroma.Emails.AdminEmail.report(actor, account, statuses, content)
499 |> Pleroma.Emails.Mailer.deliver_async()
500 end)
501
502 {:ok, activity}
503 end
504 end
505
506 defp fetch_activities_for_context_query(context, opts) do
507 public = [Pleroma.Constants.as_public()]
508
509 recipients =
510 if opts["user"], do: [opts["user"].ap_id | opts["user"].following] ++ public, else: public
511
512 from(activity in Activity)
513 |> maybe_preload_objects(opts)
514 |> maybe_preload_bookmarks(opts)
515 |> maybe_set_thread_muted_field(opts)
516 |> restrict_blocked(opts)
517 |> restrict_recipients(recipients, opts["user"])
518 |> where(
519 [activity],
520 fragment(
521 "?->>'type' = ? and ?->>'context' = ?",
522 activity.data,
523 "Create",
524 activity.data,
525 ^context
526 )
527 )
528 |> exclude_poll_votes(opts)
529 |> exclude_id(opts)
530 |> order_by([activity], desc: activity.id)
531 end
532
533 @spec fetch_activities_for_context(String.t(), keyword() | map()) :: [Activity.t()]
534 def fetch_activities_for_context(context, opts \\ %{}) do
535 context
536 |> fetch_activities_for_context_query(opts)
537 |> Repo.all()
538 end
539
540 @spec fetch_latest_activity_id_for_context(String.t(), keyword() | map()) ::
541 FlakeId.Ecto.CompatType.t() | nil
542 def fetch_latest_activity_id_for_context(context, opts \\ %{}) do
543 context
544 |> fetch_activities_for_context_query(Map.merge(%{"skip_preload" => true}, opts))
545 |> limit(1)
546 |> select([a], a.id)
547 |> Repo.one()
548 end
549
550 def fetch_public_activities(opts \\ %{}, pagination \\ :keyset) do
551 opts = Map.drop(opts, ["user"])
552
553 [Pleroma.Constants.as_public()]
554 |> fetch_activities_query(opts)
555 |> restrict_unlisted()
556 |> Pagination.fetch_paginated(opts, pagination)
557 |> Enum.reverse()
558 end
559
560 @valid_visibilities ~w[direct unlisted public private]
561
562 defp restrict_visibility(query, %{visibility: visibility})
563 when is_list(visibility) do
564 if Enum.all?(visibility, &(&1 in @valid_visibilities)) do
565 query =
566 from(
567 a in query,
568 where:
569 fragment(
570 "activity_visibility(?, ?, ?) = ANY (?)",
571 a.actor,
572 a.recipients,
573 a.data,
574 ^visibility
575 )
576 )
577
578 query
579 else
580 Logger.error("Could not restrict visibility to #{visibility}")
581 end
582 end
583
584 defp restrict_visibility(query, %{visibility: visibility})
585 when visibility in @valid_visibilities do
586 from(
587 a in query,
588 where:
589 fragment("activity_visibility(?, ?, ?) = ?", a.actor, a.recipients, a.data, ^visibility)
590 )
591 end
592
593 defp restrict_visibility(_query, %{visibility: visibility})
594 when visibility not in @valid_visibilities do
595 Logger.error("Could not restrict visibility to #{visibility}")
596 end
597
598 defp restrict_visibility(query, _visibility), do: query
599
600 defp restrict_thread_visibility(query, _, %{skip_thread_containment: true} = _),
601 do: query
602
603 defp restrict_thread_visibility(
604 query,
605 %{"user" => %User{info: %{skip_thread_containment: true}}},
606 _
607 ),
608 do: query
609
610 defp restrict_thread_visibility(query, %{"user" => %User{ap_id: ap_id}}, _) do
611 from(
612 a in query,
613 where: fragment("thread_visibility(?, (?)->>'id') = true", ^ap_id, a.data)
614 )
615 end
616
617 defp restrict_thread_visibility(query, _, _), do: query
618
619 def fetch_user_abstract_activities(user, reading_user, params \\ %{}) do
620 params =
621 params
622 |> Map.put("user", reading_user)
623 |> Map.put("actor_id", user.ap_id)
624 |> Map.put("whole_db", true)
625
626 recipients =
627 user_activities_recipients(%{
628 "godmode" => params["godmode"],
629 "reading_user" => reading_user
630 })
631
632 fetch_activities(recipients, params)
633 |> Enum.reverse()
634 end
635
636 def fetch_user_activities(user, reading_user, params \\ %{}) do
637 params =
638 params
639 |> Map.put("type", ["Create", "Announce"])
640 |> Map.put("user", reading_user)
641 |> Map.put("actor_id", user.ap_id)
642 |> Map.put("whole_db", true)
643 |> Map.put("pinned_activity_ids", user.info.pinned_activities)
644
645 recipients =
646 user_activities_recipients(%{
647 "godmode" => params["godmode"],
648 "reading_user" => reading_user
649 })
650
651 fetch_activities(recipients, params)
652 |> Enum.reverse()
653 end
654
655 defp user_activities_recipients(%{"godmode" => true}) do
656 []
657 end
658
659 defp user_activities_recipients(%{"reading_user" => reading_user}) do
660 if reading_user do
661 [Pleroma.Constants.as_public()] ++ [reading_user.ap_id | reading_user.following]
662 else
663 [Pleroma.Constants.as_public()]
664 end
665 end
666
667 defp restrict_since(query, %{"since_id" => ""}), do: query
668
669 defp restrict_since(query, %{"since_id" => since_id}) do
670 from(activity in query, where: activity.id > ^since_id)
671 end
672
673 defp restrict_since(query, _), do: query
674
675 defp restrict_tag_reject(_query, %{"tag_reject" => _tag_reject, "skip_preload" => true}) do
676 raise "Can't use the child object without preloading!"
677 end
678
679 defp restrict_tag_reject(query, %{"tag_reject" => tag_reject})
680 when is_list(tag_reject) and tag_reject != [] do
681 from(
682 [_activity, object] in query,
683 where: fragment("not (?)->'tag' \\?| (?)", object.data, ^tag_reject)
684 )
685 end
686
687 defp restrict_tag_reject(query, _), do: query
688
689 defp restrict_tag_all(_query, %{"tag_all" => _tag_all, "skip_preload" => true}) do
690 raise "Can't use the child object without preloading!"
691 end
692
693 defp restrict_tag_all(query, %{"tag_all" => tag_all})
694 when is_list(tag_all) and tag_all != [] do
695 from(
696 [_activity, object] in query,
697 where: fragment("(?)->'tag' \\?& (?)", object.data, ^tag_all)
698 )
699 end
700
701 defp restrict_tag_all(query, _), do: query
702
703 defp restrict_tag(_query, %{"tag" => _tag, "skip_preload" => true}) do
704 raise "Can't use the child object without preloading!"
705 end
706
707 defp restrict_tag(query, %{"tag" => tag}) when is_list(tag) do
708 from(
709 [_activity, object] in query,
710 where: fragment("(?)->'tag' \\?| (?)", object.data, ^tag)
711 )
712 end
713
714 defp restrict_tag(query, %{"tag" => tag}) when is_binary(tag) do
715 from(
716 [_activity, object] in query,
717 where: fragment("(?)->'tag' \\? (?)", object.data, ^tag)
718 )
719 end
720
721 defp restrict_tag(query, _), do: query
722
723 defp restrict_recipients(query, [], _user), do: query
724
725 defp restrict_recipients(query, recipients, nil) do
726 from(activity in query, where: fragment("? && ?", ^recipients, activity.recipients))
727 end
728
729 defp restrict_recipients(query, recipients, user) do
730 from(
731 activity in query,
732 where: fragment("? && ?", ^recipients, activity.recipients),
733 or_where: activity.actor == ^user.ap_id
734 )
735 end
736
737 defp restrict_local(query, %{"local_only" => true}) do
738 from(activity in query, where: activity.local == true)
739 end
740
741 defp restrict_local(query, _), do: query
742
743 defp restrict_actor(query, %{"actor_id" => actor_id}) do
744 from(activity in query, where: activity.actor == ^actor_id)
745 end
746
747 defp restrict_actor(query, _), do: query
748
749 defp restrict_type(query, %{"type" => type}) when is_binary(type) do
750 from(activity in query, where: fragment("?->>'type' = ?", activity.data, ^type))
751 end
752
753 defp restrict_type(query, %{"type" => type}) do
754 from(activity in query, where: fragment("?->>'type' = ANY(?)", activity.data, ^type))
755 end
756
757 defp restrict_type(query, _), do: query
758
759 defp restrict_state(query, %{"state" => state}) do
760 from(activity in query, where: fragment("?->>'state' = ?", activity.data, ^state))
761 end
762
763 defp restrict_state(query, _), do: query
764
765 defp restrict_favorited_by(query, %{"favorited_by" => ap_id}) do
766 from(
767 [_activity, object] in query,
768 where: fragment("(?)->'likes' \\? (?)", object.data, ^ap_id)
769 )
770 end
771
772 defp restrict_favorited_by(query, _), do: query
773
774 defp restrict_media(_query, %{"only_media" => _val, "skip_preload" => true}) do
775 raise "Can't use the child object without preloading!"
776 end
777
778 defp restrict_media(query, %{"only_media" => val}) when val == "true" or val == "1" do
779 from(
780 [_activity, object] in query,
781 where: fragment("not (?)->'attachment' = (?)", object.data, ^[])
782 )
783 end
784
785 defp restrict_media(query, _), do: query
786
787 defp restrict_replies(query, %{"exclude_replies" => val}) when val == "true" or val == "1" do
788 from(
789 [_activity, object] in query,
790 where: fragment("?->>'inReplyTo' is null", object.data)
791 )
792 end
793
794 defp restrict_replies(query, _), do: query
795
796 defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val == "true" or val == "1" do
797 from(activity in query, where: fragment("?->>'type' != 'Announce'", activity.data))
798 end
799
800 defp restrict_reblogs(query, _), do: query
801
802 defp restrict_muted(query, %{"with_muted" => val}) when val in [true, "true", "1"], do: query
803
804 defp restrict_muted(query, %{"muting_user" => %User{info: info}} = opts) do
805 mutes = info.mutes
806
807 query =
808 from([activity] in query,
809 where: fragment("not (? = ANY(?))", activity.actor, ^mutes),
810 where: fragment("not (?->'to' \\?| ?)", activity.data, ^mutes)
811 )
812
813 unless opts["skip_preload"] do
814 from([thread_mute: tm] in query, where: is_nil(tm.user_id))
815 else
816 query
817 end
818 end
819
820 defp restrict_muted(query, _), do: query
821
822 defp restrict_blocked(query, %{"blocking_user" => %User{info: info}}) do
823 blocks = info.blocks || []
824 domain_blocks = info.domain_blocks || []
825
826 query =
827 if has_named_binding?(query, :object), do: query, else: Activity.with_joined_object(query)
828
829 from(
830 [activity, object: o] in query,
831 where: fragment("not (? = ANY(?))", activity.actor, ^blocks),
832 where: fragment("not (? && ?)", activity.recipients, ^blocks),
833 where:
834 fragment(
835 "not (?->>'type' = 'Announce' and ?->'to' \\?| ?)",
836 activity.data,
837 activity.data,
838 ^blocks
839 ),
840 where: fragment("not (split_part(?, '/', 3) = ANY(?))", activity.actor, ^domain_blocks),
841 where: fragment("not (split_part(?->>'actor', '/', 3) = ANY(?))", o.data, ^domain_blocks)
842 )
843 end
844
845 defp restrict_blocked(query, _), do: query
846
847 defp restrict_unlisted(query) do
848 from(
849 activity in query,
850 where:
851 fragment(
852 "not (coalesce(?->'cc', '{}'::jsonb) \\?| ?)",
853 activity.data,
854 ^[Pleroma.Constants.as_public()]
855 )
856 )
857 end
858
859 defp restrict_pinned(query, %{"pinned" => "true", "pinned_activity_ids" => ids}) do
860 from(activity in query, where: activity.id in ^ids)
861 end
862
863 defp restrict_pinned(query, _), do: query
864
865 defp restrict_muted_reblogs(query, %{"muting_user" => %User{info: info}}) do
866 muted_reblogs = info.muted_reblogs || []
867
868 from(
869 activity in query,
870 where:
871 fragment(
872 "not ( ?->>'type' = 'Announce' and ? = ANY(?))",
873 activity.data,
874 activity.actor,
875 ^muted_reblogs
876 )
877 )
878 end
879
880 defp restrict_muted_reblogs(query, _), do: query
881
882 defp exclude_poll_votes(query, %{"include_poll_votes" => true}), do: query
883
884 defp exclude_poll_votes(query, _) do
885 if has_named_binding?(query, :object) do
886 from([activity, object: o] in query,
887 where: fragment("not(?->>'type' = ?)", o.data, "Answer")
888 )
889 else
890 query
891 end
892 end
893
894 defp exclude_id(query, %{"exclude_id" => id}) when is_binary(id) do
895 from(activity in query, where: activity.id != ^id)
896 end
897
898 defp exclude_id(query, _), do: query
899
900 defp maybe_preload_objects(query, %{"skip_preload" => true}), do: query
901
902 defp maybe_preload_objects(query, _) do
903 query
904 |> Activity.with_preloaded_object()
905 end
906
907 defp maybe_preload_bookmarks(query, %{"skip_preload" => true}), do: query
908
909 defp maybe_preload_bookmarks(query, opts) do
910 query
911 |> Activity.with_preloaded_bookmark(opts["user"])
912 end
913
914 defp maybe_set_thread_muted_field(query, %{"skip_preload" => true}), do: query
915
916 defp maybe_set_thread_muted_field(query, opts) do
917 query
918 |> Activity.with_set_thread_muted_field(opts["muting_user"] || opts["user"])
919 end
920
921 defp maybe_order(query, %{order: :desc}) do
922 query
923 |> order_by(desc: :id)
924 end
925
926 defp maybe_order(query, %{order: :asc}) do
927 query
928 |> order_by(asc: :id)
929 end
930
931 defp maybe_order(query, _), do: query
932
933 def fetch_activities_query(recipients, opts \\ %{}) do
934 config = %{
935 skip_thread_containment: Config.get([:instance, :skip_thread_containment])
936 }
937
938 Activity
939 |> maybe_preload_objects(opts)
940 |> maybe_preload_bookmarks(opts)
941 |> maybe_set_thread_muted_field(opts)
942 |> maybe_order(opts)
943 |> restrict_recipients(recipients, opts["user"])
944 |> restrict_tag(opts)
945 |> restrict_tag_reject(opts)
946 |> restrict_tag_all(opts)
947 |> restrict_since(opts)
948 |> restrict_local(opts)
949 |> restrict_actor(opts)
950 |> restrict_type(opts)
951 |> restrict_state(opts)
952 |> restrict_favorited_by(opts)
953 |> restrict_blocked(opts)
954 |> restrict_muted(opts)
955 |> restrict_media(opts)
956 |> restrict_visibility(opts)
957 |> restrict_thread_visibility(opts, config)
958 |> restrict_replies(opts)
959 |> restrict_reblogs(opts)
960 |> restrict_pinned(opts)
961 |> restrict_muted_reblogs(opts)
962 |> Activity.restrict_deactivated_users()
963 |> exclude_poll_votes(opts)
964 end
965
966 def fetch_activities(recipients, opts \\ %{}, pagination \\ :keyset) do
967 list_memberships = Pleroma.List.memberships(opts["user"])
968
969 fetch_activities_query(recipients ++ list_memberships, opts)
970 |> Pagination.fetch_paginated(opts, pagination)
971 |> Enum.reverse()
972 |> maybe_update_cc(list_memberships, opts["user"])
973 end
974
975 defp maybe_update_cc(activities, list_memberships, %User{ap_id: user_ap_id})
976 when is_list(list_memberships) and length(list_memberships) > 0 do
977 Enum.map(activities, fn
978 %{data: %{"bcc" => bcc}} = activity when is_list(bcc) and length(bcc) > 0 ->
979 if Enum.any?(bcc, &(&1 in list_memberships)) do
980 update_in(activity.data["cc"], &[user_ap_id | &1])
981 else
982 activity
983 end
984
985 activity ->
986 activity
987 end)
988 end
989
990 defp maybe_update_cc(activities, _, _), do: activities
991
992 def fetch_activities_bounded_query(query, recipients, recipients_with_public) do
993 from(activity in query,
994 where:
995 fragment("? && ?", activity.recipients, ^recipients) or
996 (fragment("? && ?", activity.recipients, ^recipients_with_public) and
997 ^Pleroma.Constants.as_public() in activity.recipients)
998 )
999 end
1000
1001 def fetch_activities_bounded(
1002 recipients,
1003 recipients_with_public,
1004 opts \\ %{},
1005 pagination \\ :keyset
1006 ) do
1007 fetch_activities_query([], opts)
1008 |> fetch_activities_bounded_query(recipients, recipients_with_public)
1009 |> Pagination.fetch_paginated(opts, pagination)
1010 |> Enum.reverse()
1011 end
1012
1013 def upload(file, opts \\ []) do
1014 with {:ok, data} <- Upload.store(file, opts) do
1015 obj_data =
1016 if opts[:actor] do
1017 Map.put(data, "actor", opts[:actor])
1018 else
1019 data
1020 end
1021
1022 Repo.insert(%Object{data: obj_data})
1023 end
1024 end
1025
1026 defp object_to_user_data(data) do
1027 avatar =
1028 data["icon"]["url"] &&
1029 %{
1030 "type" => "Image",
1031 "url" => [%{"href" => data["icon"]["url"]}]
1032 }
1033
1034 banner =
1035 data["image"]["url"] &&
1036 %{
1037 "type" => "Image",
1038 "url" => [%{"href" => data["image"]["url"]}]
1039 }
1040
1041 fields =
1042 data
1043 |> Map.get("attachment", [])
1044 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1045 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1046
1047 locked = data["manuallyApprovesFollowers"] || false
1048 data = Transmogrifier.maybe_fix_user_object(data)
1049 discoverable = data["discoverable"] || false
1050
1051 user_data = %{
1052 ap_id: data["id"],
1053 info: %{
1054 ap_enabled: true,
1055 source_data: data,
1056 banner: banner,
1057 fields: fields,
1058 locked: locked,
1059 discoverable: discoverable
1060 },
1061 avatar: avatar,
1062 name: data["name"],
1063 follower_address: data["followers"],
1064 following_address: data["following"],
1065 bio: data["summary"]
1066 }
1067
1068 # nickname can be nil because of virtual actors
1069 user_data =
1070 if data["preferredUsername"] do
1071 Map.put(
1072 user_data,
1073 :nickname,
1074 "#{data["preferredUsername"]}@#{URI.parse(data["id"]).host}"
1075 )
1076 else
1077 Map.put(user_data, :nickname, nil)
1078 end
1079
1080 {:ok, user_data}
1081 end
1082
1083 def fetch_follow_information_for_user(user) do
1084 with {:ok, following_data} <-
1085 Fetcher.fetch_and_contain_remote_object_from_id(user.following_address),
1086 following_count when is_integer(following_count) <- following_data["totalItems"],
1087 {:ok, hide_follows} <- collection_private(following_data),
1088 {:ok, followers_data} <-
1089 Fetcher.fetch_and_contain_remote_object_from_id(user.follower_address),
1090 followers_count when is_integer(followers_count) <- followers_data["totalItems"],
1091 {:ok, hide_followers} <- collection_private(followers_data) do
1092 {:ok,
1093 %{
1094 hide_follows: hide_follows,
1095 follower_count: followers_count,
1096 following_count: following_count,
1097 hide_followers: hide_followers
1098 }}
1099 else
1100 {:error, _} = e ->
1101 e
1102
1103 e ->
1104 {:error, e}
1105 end
1106 end
1107
1108 defp maybe_update_follow_information(data) do
1109 with {:enabled, true} <-
1110 {:enabled, Pleroma.Config.get([:instance, :external_user_synchronization])},
1111 {:ok, info} <- fetch_follow_information_for_user(data) do
1112 info = Map.merge(data.info, info)
1113 Map.put(data, :info, info)
1114 else
1115 {:enabled, false} ->
1116 data
1117
1118 e ->
1119 Logger.error(
1120 "Follower/Following counter update for #{data.ap_id} failed.\n" <> inspect(e)
1121 )
1122
1123 data
1124 end
1125 end
1126
1127 defp collection_private(data) do
1128 if is_map(data["first"]) and
1129 data["first"]["type"] in ["CollectionPage", "OrderedCollectionPage"] do
1130 {:ok, false}
1131 else
1132 with {:ok, %{"type" => type}} when type in ["CollectionPage", "OrderedCollectionPage"] <-
1133 Fetcher.fetch_and_contain_remote_object_from_id(data["first"]) do
1134 {:ok, false}
1135 else
1136 {:error, {:ok, %{status: code}}} when code in [401, 403] ->
1137 {:ok, true}
1138
1139 {:error, _} = e ->
1140 e
1141
1142 e ->
1143 {:error, e}
1144 end
1145 end
1146 end
1147
1148 def user_data_from_user_object(data) do
1149 with {:ok, data} <- MRF.filter(data),
1150 {:ok, data} <- object_to_user_data(data) do
1151 {:ok, data}
1152 else
1153 e -> {:error, e}
1154 end
1155 end
1156
1157 def fetch_and_prepare_user_from_ap_id(ap_id) do
1158 with {:ok, data} <- Fetcher.fetch_and_contain_remote_object_from_id(ap_id),
1159 {:ok, data} <- user_data_from_user_object(data),
1160 data <- maybe_update_follow_information(data) do
1161 {:ok, data}
1162 else
1163 e -> Logger.error("Could not decode user at fetch #{ap_id}, #{inspect(e)}")
1164 end
1165 end
1166
1167 def make_user_from_ap_id(ap_id) do
1168 if _user = User.get_cached_by_ap_id(ap_id) do
1169 Transmogrifier.upgrade_user_from_ap_id(ap_id)
1170 else
1171 with {:ok, data} <- fetch_and_prepare_user_from_ap_id(ap_id) do
1172 User.insert_or_update_user(data)
1173 else
1174 e -> {:error, e}
1175 end
1176 end
1177 end
1178
1179 def make_user_from_nickname(nickname) do
1180 with {:ok, %{"ap_id" => ap_id}} when not is_nil(ap_id) <- WebFinger.finger(nickname) do
1181 make_user_from_ap_id(ap_id)
1182 else
1183 _e -> {:error, "No AP id in WebFinger"}
1184 end
1185 end
1186
1187 # filter out broken threads
1188 def contain_broken_threads(%Activity{} = activity, %User{} = user) do
1189 entire_thread_visible_for_user?(activity, user)
1190 end
1191
1192 # do post-processing on a specific activity
1193 def contain_activity(%Activity{} = activity, %User{} = user) do
1194 contain_broken_threads(activity, user)
1195 end
1196
1197 def fetch_direct_messages_query do
1198 Activity
1199 |> restrict_type(%{"type" => "Create"})
1200 |> restrict_visibility(%{visibility: "direct"})
1201 |> order_by([activity], asc: activity.id)
1202 end
1203 end