1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.ActivityPub do
7 alias Pleroma.Activity.Ir.Topics
9 alias Pleroma.Conversation
10 alias Pleroma.Notification
12 alias Pleroma.Object.Containment
13 alias Pleroma.Object.Fetcher
14 alias Pleroma.Pagination
18 alias Pleroma.Web.ActivityPub.MRF
19 alias Pleroma.Web.ActivityPub.Transmogrifier
20 alias Pleroma.Web.ActivityPub.Utils
21 alias Pleroma.Web.Streamer
22 alias Pleroma.Web.WebFinger
23 alias Pleroma.Workers.BackgroundWorker
26 import Pleroma.Web.ActivityPub.Utils
27 import Pleroma.Web.ActivityPub.Visibility
30 require Pleroma.Constants
32 # For Announce activities, we filter the recipients based on following status for any actors
33 # that match actual users. See issue #164 for more information about why this is necessary.
34 defp get_recipients(%{"type" => "Announce"} = data) do
35 to = Map.get(data, "to", [])
36 cc = Map.get(data, "cc", [])
37 bcc = Map.get(data, "bcc", [])
38 actor = User.get_cached_by_ap_id(data["actor"])
41 Enum.filter(Enum.concat([to, cc, bcc]), fn recipient ->
42 case User.get_cached_by_ap_id(recipient) do
44 user -> User.following?(user, actor)
51 defp get_recipients(%{"type" => "Create"} = data) do
52 to = Map.get(data, "to", [])
53 cc = Map.get(data, "cc", [])
54 bcc = Map.get(data, "bcc", [])
55 actor = Map.get(data, "actor", [])
56 recipients = [to, cc, bcc, [actor]] |> Enum.concat() |> Enum.uniq()
60 defp get_recipients(data) do
61 to = Map.get(data, "to", [])
62 cc = Map.get(data, "cc", [])
63 bcc = Map.get(data, "bcc", [])
64 recipients = Enum.concat([to, cc, bcc])
68 defp check_actor_is_active(actor) do
69 if not is_nil(actor) do
70 with user <- User.get_cached_by_ap_id(actor),
71 false <- user.info.deactivated do
81 defp check_remote_limit(%{"object" => %{"content" => content}}) when not is_nil(content) do
82 limit = Config.get([:instance, :remote_limit])
83 String.length(content) <= limit
86 defp check_remote_limit(_), do: true
88 def increase_note_count_if_public(actor, object) do
89 if is_public?(object), do: User.increase_note_count(actor), else: {:ok, actor}
92 def decrease_note_count_if_public(actor, object) do
93 if is_public?(object), do: User.decrease_note_count(actor), else: {:ok, actor}
96 def increase_replies_count_if_reply(%{
97 "object" => %{"inReplyTo" => reply_ap_id} = object,
100 if is_public?(object) do
101 Object.increase_replies_count(reply_ap_id)
105 def increase_replies_count_if_reply(_create_data), do: :noop
107 def decrease_replies_count_if_reply(%Object{
108 data: %{"inReplyTo" => reply_ap_id} = object
110 if is_public?(object) do
111 Object.decrease_replies_count(reply_ap_id)
115 def decrease_replies_count_if_reply(_object), do: :noop
117 def increase_poll_votes_if_vote(%{
118 "object" => %{"inReplyTo" => reply_ap_id, "name" => name},
121 Object.increase_vote_count(reply_ap_id, name)
124 def increase_poll_votes_if_vote(_create_data), do: :noop
126 def insert(map, local \\ true, fake \\ false, bypass_actor_check \\ false) when is_map(map) do
127 with nil <- Activity.normalize(map),
128 map <- lazy_put_activity_defaults(map, fake),
129 true <- bypass_actor_check || check_actor_is_active(map["actor"]),
130 {_, true} <- {:remote_limit_error, check_remote_limit(map)},
131 {:ok, map} <- MRF.filter(map),
132 {recipients, _, _} = get_recipients(map),
133 {:fake, false, map, recipients} <- {:fake, fake, map, recipients},
134 :ok <- Containment.contain_child(map),
135 {:ok, map, object} <- insert_full_object(map) do
137 Repo.insert(%Activity{
141 recipients: recipients
144 # Splice in the child object if we have one.
146 if not is_nil(object) do
147 Map.put(activity, :object, object)
152 BackgroundWorker.enqueue("fetch_data_for_activity", %{"activity_id" => activity.id})
154 Notification.create_notifications(activity)
158 |> Conversation.create_or_bump_for()
159 |> get_participations()
162 stream_out_participations(participations)
165 %Activity{} = activity ->
168 {:fake, true, map, recipients} ->
169 activity = %Activity{
173 recipients: recipients,
177 Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity)
185 defp get_participations({:ok, %{participations: participations}}), do: participations
186 defp get_participations(_), do: []
188 def stream_out_participations(participations) do
191 |> Repo.preload(:user)
193 Streamer.stream("participation", participations)
196 def stream_out_participations(%Object{data: %{"context" => context}}, user) do
197 with %Conversation{} = conversation <- Conversation.get_for_ap_id(context),
198 conversation = Repo.preload(conversation, :participations),
200 fetch_latest_activity_id_for_context(conversation.ap_id, %{
202 "blocking_user" => user
204 if last_activity_id do
205 stream_out_participations(conversation.participations)
210 def stream_out_participations(_, _), do: :noop
212 def stream_out(%Activity{data: %{"type" => data_type}} = activity)
213 when data_type in ["Create", "Announce", "Delete"] do
215 |> Topics.get_activity_topics()
216 |> Streamer.stream(activity)
219 def stream_out(_activity) do
223 def create(%{to: to, actor: actor, context: context, object: object} = params, fake \\ false) do
224 additional = params[:additional] || %{}
225 # only accept false as false value
226 local = !(params[:local] == false)
227 published = params[:published]
231 %{to: to, actor: actor, published: published, context: context, object: object},
234 {:ok, activity} <- insert(create_data, local, fake),
235 {:fake, false, activity} <- {:fake, fake, activity},
236 _ <- increase_replies_count_if_reply(create_data),
237 _ <- increase_poll_votes_if_vote(create_data),
238 # Changing note count prior to enqueuing federation task in order to avoid
239 # race conditions on updating user.info
240 {:ok, _actor} <- increase_note_count_if_public(actor, activity),
241 :ok <- maybe_federate(activity) do
244 {:fake, true, activity} ->
252 def listen(%{to: to, actor: actor, context: context, object: object} = params) do
253 additional = params[:additional] || %{}
254 # only accept false as false value
255 local = !(params[:local] == false)
256 published = params[:published]
260 %{to: to, actor: actor, published: published, context: context, object: object},
263 {:ok, activity} <- insert(listen_data, local),
264 :ok <- maybe_federate(activity) do
272 def accept(%{to: to, actor: actor, object: object} = params) do
273 # only accept false as false value
274 local = !(params[:local] == false)
276 with data <- %{"to" => to, "type" => "Accept", "actor" => actor.ap_id, "object" => object},
277 {:ok, activity} <- insert(data, local),
278 :ok <- maybe_federate(activity) do
283 def reject(%{to: to, actor: actor, object: object} = params) do
284 # only accept false as false value
285 local = !(params[:local] == false)
287 with data <- %{"to" => to, "type" => "Reject", "actor" => actor.ap_id, "object" => object},
288 {:ok, activity} <- insert(data, local),
289 :ok <- maybe_federate(activity) do
294 def update(%{to: to, cc: cc, actor: actor, object: object} = params) do
295 local = !(params[:local] == false)
296 activity_id = params[:activity_id]
305 data <- Utils.maybe_put(data, "id", activity_id),
306 {:ok, activity} <- insert(data, local),
307 :ok <- maybe_federate(activity) do
312 # TODO: This is weird, maybe we shouldn't check here if we can make the activity.
314 %User{ap_id: ap_id} = user,
315 %Object{data: %{"id" => _}} = object,
319 with nil <- get_existing_like(ap_id, object),
320 like_data <- make_like_data(user, object, activity_id),
321 {:ok, activity} <- insert(like_data, local),
322 {:ok, object} <- add_like_to_object(activity, object),
323 :ok <- maybe_federate(activity) do
324 {:ok, activity, object}
326 %Activity{} = activity -> {:ok, activity, object}
327 error -> {:error, error}
331 def unlike(%User{} = actor, %Object{} = object, activity_id \\ nil, local \\ true) do
332 with %Activity{} = like_activity <- get_existing_like(actor.ap_id, object),
333 unlike_data <- make_unlike_data(actor, like_activity, activity_id),
334 {:ok, unlike_activity} <- insert(unlike_data, local),
335 {:ok, _activity} <- Repo.delete(like_activity),
336 {:ok, object} <- remove_like_from_object(like_activity, object),
337 :ok <- maybe_federate(unlike_activity) do
338 {:ok, unlike_activity, like_activity, object}
345 %User{ap_id: _} = user,
346 %Object{data: %{"id" => _}} = object,
351 with true <- is_announceable?(object, user, public),
352 announce_data <- make_announce_data(user, object, activity_id, public),
353 {:ok, activity} <- insert(announce_data, local),
354 {:ok, object} <- add_announce_to_object(activity, object),
355 :ok <- maybe_federate(activity) do
356 {:ok, activity, object}
358 error -> {:error, error}
368 with %Activity{} = announce_activity <- get_existing_announce(actor.ap_id, object),
369 unannounce_data <- make_unannounce_data(actor, announce_activity, activity_id),
370 {:ok, unannounce_activity} <- insert(unannounce_data, local),
371 :ok <- maybe_federate(unannounce_activity),
372 {:ok, _activity} <- Repo.delete(announce_activity),
373 {:ok, object} <- remove_announce_from_object(announce_activity, object) do
374 {:ok, unannounce_activity, object}
380 def follow(follower, followed, activity_id \\ nil, local \\ true) do
381 with data <- make_follow_data(follower, followed, activity_id),
382 {:ok, activity} <- insert(data, local),
383 :ok <- maybe_federate(activity),
384 _ <- User.set_follow_state_cache(follower.ap_id, followed.ap_id, activity.data["state"]) do
389 def unfollow(follower, followed, activity_id \\ nil, local \\ true) do
390 with %Activity{} = follow_activity <- fetch_latest_follow(follower, followed),
391 {:ok, follow_activity} <- update_follow_state(follow_activity, "cancelled"),
392 unfollow_data <- make_unfollow_data(follower, followed, follow_activity, activity_id),
393 {:ok, activity} <- insert(unfollow_data, local),
394 :ok <- maybe_federate(activity) do
399 def delete(%User{ap_id: ap_id, follower_address: follower_address} = user) do
401 "to" => [follower_address],
404 "object" => %{"type" => "Person", "id" => ap_id}
406 {:ok, activity} <- insert(data, true, true, true),
407 :ok <- maybe_federate(activity) do
412 def delete(%Object{data: %{"id" => id, "actor" => actor}} = object, local \\ true) do
413 user = User.get_cached_by_ap_id(actor)
414 to = (object.data["to"] || []) ++ (object.data["cc"] || [])
416 with {:ok, object, activity} <- Object.delete(object),
422 "deleted_activity_id" => activity && activity.id
424 {:ok, activity} <- insert(data, local, false),
425 stream_out_participations(object, user),
426 _ <- decrease_replies_count_if_reply(object),
427 # Changing note count prior to enqueuing federation task in order to avoid
428 # race conditions on updating user.info
429 {:ok, _actor} <- decrease_note_count_if_public(user, object),
430 :ok <- maybe_federate(activity) do
435 @spec block(User.t(), User.t(), String.t() | nil, boolean) :: {:ok, Activity.t() | nil}
436 def block(blocker, blocked, activity_id \\ nil, local \\ true) do
437 outgoing_blocks = Config.get([:activitypub, :outgoing_blocks])
438 unfollow_blocked = Config.get([:activitypub, :unfollow_blocked])
440 if unfollow_blocked do
441 follow_activity = fetch_latest_follow(blocker, blocked)
442 if follow_activity, do: unfollow(blocker, blocked, nil, local)
445 with true <- outgoing_blocks,
446 block_data <- make_block_data(blocker, blocked, activity_id),
447 {:ok, activity} <- insert(block_data, local),
448 :ok <- maybe_federate(activity) do
455 def unblock(blocker, blocked, activity_id \\ nil, local \\ true) do
456 with %Activity{} = block_activity <- fetch_latest_block(blocker, blocked),
457 unblock_data <- make_unblock_data(blocker, blocked, block_activity, activity_id),
458 {:ok, activity} <- insert(unblock_data, local),
459 :ok <- maybe_federate(activity) do
464 @spec flag(map()) :: {:ok, Activity.t()} | any
474 # only accept false as false value
475 local = !(params[:local] == false)
476 forward = !(params[:forward] == false)
478 additional = params[:additional] || %{}
482 Map.merge(additional, %{"to" => [], "cc" => [account.ap_id]})
484 Map.merge(additional, %{"to" => [], "cc" => []})
487 with flag_data <- make_flag_data(params, additional),
488 {:ok, activity} <- insert(flag_data, local),
489 :ok <- maybe_federate(activity) do
490 Enum.each(User.all_superusers(), fn superuser ->
492 |> Pleroma.Emails.AdminEmail.report(actor, account, statuses, content)
493 |> Pleroma.Emails.Mailer.deliver_async()
500 defp fetch_activities_for_context_query(context, opts) do
501 public = [Pleroma.Constants.as_public()]
505 do: [opts["user"].ap_id | User.following(opts["user"])] ++ public,
508 from(activity in Activity)
509 |> maybe_preload_objects(opts)
510 |> maybe_preload_bookmarks(opts)
511 |> maybe_set_thread_muted_field(opts)
512 |> restrict_blocked(opts)
513 |> restrict_recipients(recipients, opts["user"])
517 "?->>'type' = ? and ?->>'context' = ?",
524 |> exclude_poll_votes(opts)
526 |> order_by([activity], desc: activity.id)
529 @spec fetch_activities_for_context(String.t(), keyword() | map()) :: [Activity.t()]
530 def fetch_activities_for_context(context, opts \\ %{}) do
532 |> fetch_activities_for_context_query(opts)
536 @spec fetch_latest_activity_id_for_context(String.t(), keyword() | map()) ::
537 FlakeId.Ecto.CompatType.t() | nil
538 def fetch_latest_activity_id_for_context(context, opts \\ %{}) do
540 |> fetch_activities_for_context_query(Map.merge(%{"skip_preload" => true}, opts))
546 def fetch_public_activities(opts \\ %{}, pagination \\ :keyset) do
547 opts = Map.drop(opts, ["user"])
549 [Pleroma.Constants.as_public()]
550 |> fetch_activities_query(opts)
551 |> restrict_unlisted()
552 |> Pagination.fetch_paginated(opts, pagination)
556 @valid_visibilities ~w[direct unlisted public private]
558 defp restrict_visibility(query, %{visibility: visibility})
559 when is_list(visibility) do
560 if Enum.all?(visibility, &(&1 in @valid_visibilities)) do
566 "activity_visibility(?, ?, ?) = ANY (?)",
576 Logger.error("Could not restrict visibility to #{visibility}")
580 defp restrict_visibility(query, %{visibility: visibility})
581 when visibility in @valid_visibilities do
585 fragment("activity_visibility(?, ?, ?) = ?", a.actor, a.recipients, a.data, ^visibility)
589 defp restrict_visibility(_query, %{visibility: visibility})
590 when visibility not in @valid_visibilities do
591 Logger.error("Could not restrict visibility to #{visibility}")
594 defp restrict_visibility(query, _visibility), do: query
596 defp restrict_thread_visibility(query, _, %{skip_thread_containment: true} = _),
599 defp restrict_thread_visibility(
601 %{"user" => %User{info: %{skip_thread_containment: true}}},
606 defp restrict_thread_visibility(query, %{"user" => %User{ap_id: ap_id}}, _) do
609 where: fragment("thread_visibility(?, (?)->>'id') = true", ^ap_id, a.data)
613 defp restrict_thread_visibility(query, _, _), do: query
615 def fetch_user_abstract_activities(user, reading_user, params \\ %{}) do
618 |> Map.put("user", reading_user)
619 |> Map.put("actor_id", user.ap_id)
620 |> Map.put("whole_db", true)
623 user_activities_recipients(%{
624 "godmode" => params["godmode"],
625 "reading_user" => reading_user
628 fetch_activities(recipients, params)
632 def fetch_user_activities(user, reading_user, params \\ %{}) do
635 |> Map.put("type", ["Create", "Announce"])
636 |> Map.put("user", reading_user)
637 |> Map.put("actor_id", user.ap_id)
638 |> Map.put("whole_db", true)
639 |> Map.put("pinned_activity_ids", user.info.pinned_activities)
642 user_activities_recipients(%{
643 "godmode" => params["godmode"],
644 "reading_user" => reading_user
647 fetch_activities(recipients, params)
651 defp user_activities_recipients(%{"godmode" => true}) do
655 defp user_activities_recipients(%{"reading_user" => reading_user}) do
657 [Pleroma.Constants.as_public()] ++ [reading_user.ap_id | User.following(reading_user)]
659 [Pleroma.Constants.as_public()]
663 defp restrict_since(query, %{"since_id" => ""}), do: query
665 defp restrict_since(query, %{"since_id" => since_id}) do
666 from(activity in query, where: activity.id > ^since_id)
669 defp restrict_since(query, _), do: query
671 defp restrict_tag_reject(_query, %{"tag_reject" => _tag_reject, "skip_preload" => true}) do
672 raise "Can't use the child object without preloading!"
675 defp restrict_tag_reject(query, %{"tag_reject" => tag_reject})
676 when is_list(tag_reject) and tag_reject != [] do
678 [_activity, object] in query,
679 where: fragment("not (?)->'tag' \\?| (?)", object.data, ^tag_reject)
683 defp restrict_tag_reject(query, _), do: query
685 defp restrict_tag_all(_query, %{"tag_all" => _tag_all, "skip_preload" => true}) do
686 raise "Can't use the child object without preloading!"
689 defp restrict_tag_all(query, %{"tag_all" => tag_all})
690 when is_list(tag_all) and tag_all != [] do
692 [_activity, object] in query,
693 where: fragment("(?)->'tag' \\?& (?)", object.data, ^tag_all)
697 defp restrict_tag_all(query, _), do: query
699 defp restrict_tag(_query, %{"tag" => _tag, "skip_preload" => true}) do
700 raise "Can't use the child object without preloading!"
703 defp restrict_tag(query, %{"tag" => tag}) when is_list(tag) do
705 [_activity, object] in query,
706 where: fragment("(?)->'tag' \\?| (?)", object.data, ^tag)
710 defp restrict_tag(query, %{"tag" => tag}) when is_binary(tag) do
712 [_activity, object] in query,
713 where: fragment("(?)->'tag' \\? (?)", object.data, ^tag)
717 defp restrict_tag(query, _), do: query
719 defp restrict_recipients(query, [], _user), do: query
721 defp restrict_recipients(query, recipients, nil) do
722 from(activity in query, where: fragment("? && ?", ^recipients, activity.recipients))
725 defp restrict_recipients(query, recipients, user) do
728 where: fragment("? && ?", ^recipients, activity.recipients),
729 or_where: activity.actor == ^user.ap_id
733 defp restrict_local(query, %{"local_only" => true}) do
734 from(activity in query, where: activity.local == true)
737 defp restrict_local(query, _), do: query
739 defp restrict_actor(query, %{"actor_id" => actor_id}) do
740 from(activity in query, where: activity.actor == ^actor_id)
743 defp restrict_actor(query, _), do: query
745 defp restrict_type(query, %{"type" => type}) when is_binary(type) do
746 from(activity in query, where: fragment("?->>'type' = ?", activity.data, ^type))
749 defp restrict_type(query, %{"type" => type}) do
750 from(activity in query, where: fragment("?->>'type' = ANY(?)", activity.data, ^type))
753 defp restrict_type(query, _), do: query
755 defp restrict_state(query, %{"state" => state}) do
756 from(activity in query, where: fragment("?->>'state' = ?", activity.data, ^state))
759 defp restrict_state(query, _), do: query
761 defp restrict_favorited_by(query, %{"favorited_by" => ap_id}) do
763 [_activity, object] in query,
764 where: fragment("(?)->'likes' \\? (?)", object.data, ^ap_id)
768 defp restrict_favorited_by(query, _), do: query
770 defp restrict_media(_query, %{"only_media" => _val, "skip_preload" => true}) do
771 raise "Can't use the child object without preloading!"
774 defp restrict_media(query, %{"only_media" => val}) when val == "true" or val == "1" do
776 [_activity, object] in query,
777 where: fragment("not (?)->'attachment' = (?)", object.data, ^[])
781 defp restrict_media(query, _), do: query
783 defp restrict_replies(query, %{"exclude_replies" => val}) when val == "true" or val == "1" do
785 [_activity, object] in query,
786 where: fragment("?->>'inReplyTo' is null", object.data)
790 defp restrict_replies(query, _), do: query
792 defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val == "true" or val == "1" do
793 from(activity in query, where: fragment("?->>'type' != 'Announce'", activity.data))
796 defp restrict_reblogs(query, _), do: query
798 defp restrict_muted(query, %{"with_muted" => val}) when val in [true, "true", "1"], do: query
800 defp restrict_muted(query, %{"muting_user" => %User{info: info}} = opts) do
804 from([activity] in query,
805 where: fragment("not (? = ANY(?))", activity.actor, ^mutes),
806 where: fragment("not (?->'to' \\?| ?)", activity.data, ^mutes)
809 unless opts["skip_preload"] do
810 from([thread_mute: tm] in query, where: is_nil(tm.user_id))
816 defp restrict_muted(query, _), do: query
818 defp restrict_blocked(query, %{"blocking_user" => %User{info: info}}) do
819 blocks = info.blocks || []
820 domain_blocks = info.domain_blocks || []
823 if has_named_binding?(query, :object), do: query, else: Activity.with_joined_object(query)
826 [activity, object: o] in query,
827 where: fragment("not (? = ANY(?))", activity.actor, ^blocks),
828 where: fragment("not (? && ?)", activity.recipients, ^blocks),
831 "not (?->>'type' = 'Announce' and ?->'to' \\?| ?)",
836 where: fragment("not (split_part(?, '/', 3) = ANY(?))", activity.actor, ^domain_blocks),
837 where: fragment("not (split_part(?->>'actor', '/', 3) = ANY(?))", o.data, ^domain_blocks)
841 defp restrict_blocked(query, _), do: query
843 defp restrict_unlisted(query) do
848 "not (coalesce(?->'cc', '{}'::jsonb) \\?| ?)",
850 ^[Pleroma.Constants.as_public()]
855 defp restrict_pinned(query, %{"pinned" => "true", "pinned_activity_ids" => ids}) do
856 from(activity in query, where: activity.id in ^ids)
859 defp restrict_pinned(query, _), do: query
861 defp restrict_muted_reblogs(query, %{"muting_user" => %User{info: info}}) do
862 muted_reblogs = info.muted_reblogs || []
868 "not ( ?->>'type' = 'Announce' and ? = ANY(?))",
876 defp restrict_muted_reblogs(query, _), do: query
878 defp exclude_poll_votes(query, %{"include_poll_votes" => true}), do: query
880 defp exclude_poll_votes(query, _) do
881 if has_named_binding?(query, :object) do
882 from([activity, object: o] in query,
883 where: fragment("not(?->>'type' = ?)", o.data, "Answer")
890 defp exclude_id(query, %{"exclude_id" => id}) when is_binary(id) do
891 from(activity in query, where: activity.id != ^id)
894 defp exclude_id(query, _), do: query
896 defp maybe_preload_objects(query, %{"skip_preload" => true}), do: query
898 defp maybe_preload_objects(query, _) do
900 |> Activity.with_preloaded_object()
903 defp maybe_preload_bookmarks(query, %{"skip_preload" => true}), do: query
905 defp maybe_preload_bookmarks(query, opts) do
907 |> Activity.with_preloaded_bookmark(opts["user"])
910 defp maybe_set_thread_muted_field(query, %{"skip_preload" => true}), do: query
912 defp maybe_set_thread_muted_field(query, opts) do
914 |> Activity.with_set_thread_muted_field(opts["muting_user"] || opts["user"])
917 defp maybe_order(query, %{order: :desc}) do
919 |> order_by(desc: :id)
922 defp maybe_order(query, %{order: :asc}) do
924 |> order_by(asc: :id)
927 defp maybe_order(query, _), do: query
929 def fetch_activities_query(recipients, opts \\ %{}) do
931 skip_thread_containment: Config.get([:instance, :skip_thread_containment])
935 |> maybe_preload_objects(opts)
936 |> maybe_preload_bookmarks(opts)
937 |> maybe_set_thread_muted_field(opts)
939 |> restrict_recipients(recipients, opts["user"])
940 |> restrict_tag(opts)
941 |> restrict_tag_reject(opts)
942 |> restrict_tag_all(opts)
943 |> restrict_since(opts)
944 |> restrict_local(opts)
945 |> restrict_actor(opts)
946 |> restrict_type(opts)
947 |> restrict_state(opts)
948 |> restrict_favorited_by(opts)
949 |> restrict_blocked(opts)
950 |> restrict_muted(opts)
951 |> restrict_media(opts)
952 |> restrict_visibility(opts)
953 |> restrict_thread_visibility(opts, config)
954 |> restrict_replies(opts)
955 |> restrict_reblogs(opts)
956 |> restrict_pinned(opts)
957 |> restrict_muted_reblogs(opts)
958 |> Activity.restrict_deactivated_users()
959 |> exclude_poll_votes(opts)
962 def fetch_activities(recipients, opts \\ %{}, pagination \\ :keyset) do
963 list_memberships = Pleroma.List.memberships(opts["user"])
965 fetch_activities_query(recipients ++ list_memberships, opts)
966 |> Pagination.fetch_paginated(opts, pagination)
968 |> maybe_update_cc(list_memberships, opts["user"])
971 defp maybe_update_cc(activities, list_memberships, %User{ap_id: user_ap_id})
972 when is_list(list_memberships) and length(list_memberships) > 0 do
973 Enum.map(activities, fn
974 %{data: %{"bcc" => bcc}} = activity when is_list(bcc) and length(bcc) > 0 ->
975 if Enum.any?(bcc, &(&1 in list_memberships)) do
976 update_in(activity.data["cc"], &[user_ap_id | &1])
986 defp maybe_update_cc(activities, _, _), do: activities
988 def fetch_activities_bounded_query(query, recipients, recipients_with_public) do
989 from(activity in query,
991 fragment("? && ?", activity.recipients, ^recipients) or
992 (fragment("? && ?", activity.recipients, ^recipients_with_public) and
993 ^Pleroma.Constants.as_public() in activity.recipients)
997 def fetch_activities_bounded(
999 recipients_with_public,
1001 pagination \\ :keyset
1003 fetch_activities_query([], opts)
1004 |> fetch_activities_bounded_query(recipients, recipients_with_public)
1005 |> Pagination.fetch_paginated(opts, pagination)
1009 def upload(file, opts \\ []) do
1010 with {:ok, data} <- Upload.store(file, opts) do
1013 Map.put(data, "actor", opts[:actor])
1018 Repo.insert(%Object{data: obj_data})
1022 defp object_to_user_data(data) do
1024 data["icon"]["url"] &&
1027 "url" => [%{"href" => data["icon"]["url"]}]
1031 data["image"]["url"] &&
1034 "url" => [%{"href" => data["image"]["url"]}]
1039 |> Map.get("attachment", [])
1040 |> Enum.filter(fn %{"type" => t} -> t == "PropertyValue" end)
1041 |> Enum.map(fn fields -> Map.take(fields, ["name", "value"]) end)
1043 locked = data["manuallyApprovesFollowers"] || false
1044 data = Transmogrifier.maybe_fix_user_object(data)
1045 discoverable = data["discoverable"] || false
1055 discoverable: discoverable
1059 follower_address: data["followers"],
1060 following_address: data["following"],
1061 bio: data["summary"]
1064 # nickname can be nil because of virtual actors
1066 if data["preferredUsername"] do
1070 "#{data["preferredUsername"]}@#{URI.parse(data["id"]).host}"
1073 Map.put(user_data, :nickname, nil)
1079 def fetch_follow_information_for_user(user) do
1080 with {:ok, following_data} <-
1081 Fetcher.fetch_and_contain_remote_object_from_id(user.following_address),
1082 following_count when is_integer(following_count) <- following_data["totalItems"],
1083 {:ok, hide_follows} <- collection_private(following_data),
1084 {:ok, followers_data} <-
1085 Fetcher.fetch_and_contain_remote_object_from_id(user.follower_address),
1086 followers_count when is_integer(followers_count) <- followers_data["totalItems"],
1087 {:ok, hide_followers} <- collection_private(followers_data) do
1090 hide_follows: hide_follows,
1091 follower_count: followers_count,
1092 following_count: following_count,
1093 hide_followers: hide_followers
1104 defp maybe_update_follow_information(data) do
1105 with {:enabled, true} <-
1106 {:enabled, Pleroma.Config.get([:instance, :external_user_synchronization])},
1107 {:ok, info} <- fetch_follow_information_for_user(data) do
1108 info = Map.merge(data.info, info)
1109 Map.put(data, :info, info)
1111 {:enabled, false} ->
1116 "Follower/Following counter update for #{data.ap_id} failed.\n" <> inspect(e)
1123 defp collection_private(data) do
1124 if is_map(data["first"]) and
1125 data["first"]["type"] in ["CollectionPage", "OrderedCollectionPage"] do
1128 with {:ok, %{"type" => type}} when type in ["CollectionPage", "OrderedCollectionPage"] <-
1129 Fetcher.fetch_and_contain_remote_object_from_id(data["first"]) do
1132 {:error, {:ok, %{status: code}}} when code in [401, 403] ->
1144 def user_data_from_user_object(data) do
1145 with {:ok, data} <- MRF.filter(data),
1146 {:ok, data} <- object_to_user_data(data) do
1153 def fetch_and_prepare_user_from_ap_id(ap_id) do
1154 with {:ok, data} <- Fetcher.fetch_and_contain_remote_object_from_id(ap_id),
1155 {:ok, data} <- user_data_from_user_object(data),
1156 data <- maybe_update_follow_information(data) do
1159 e -> Logger.error("Could not decode user at fetch #{ap_id}, #{inspect(e)}")
1163 def make_user_from_ap_id(ap_id) do
1164 if _user = User.get_cached_by_ap_id(ap_id) do
1165 Transmogrifier.upgrade_user_from_ap_id(ap_id)
1167 with {:ok, data} <- fetch_and_prepare_user_from_ap_id(ap_id) do
1168 User.insert_or_update_user(data)
1175 def make_user_from_nickname(nickname) do
1176 with {:ok, %{"ap_id" => ap_id}} when not is_nil(ap_id) <- WebFinger.finger(nickname) do
1177 make_user_from_ap_id(ap_id)
1179 _e -> {:error, "No AP id in WebFinger"}
1183 # filter out broken threads
1184 def contain_broken_threads(%Activity{} = activity, %User{} = user) do
1185 entire_thread_visible_for_user?(activity, user)
1188 # do post-processing on a specific activity
1189 def contain_activity(%Activity{} = activity, %User{} = user) do
1190 contain_broken_threads(activity, user)
1193 def fetch_direct_messages_query do
1195 |> restrict_type(%{"type" => "Create"})
1196 |> restrict_visibility(%{visibility: "direct"})
1197 |> order_by([activity], asc: activity.id)