1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.Publisher do
9 alias Pleroma.Instances
11 alias Pleroma.Web.ActivityPub.Relay
12 alias Pleroma.Web.ActivityPub.Transmogrifier
14 require Pleroma.Constants
16 import Pleroma.Web.ActivityPub.Visibility
18 @behaviour Pleroma.Web.Federator.Publisher
23 ActivityPub outgoing federation module.
27 Determine if an activity can be represented by running it through Transmogrifier.
29 def is_representable?(%Activity{} = activity) do
30 with {:ok, _data} <- Transmogrifier.prepare_outgoing(activity.data) do
39 Publish a single message to a peer. Takes a struct with the following
42 * `inbox`: the inbox to publish to
43 * `json`: the JSON message body representing the ActivityPub message
44 * `actor`: the actor which is signing the message
45 * `id`: the ActivityStreams URI of the message
47 def publish_one(%{inbox: inbox, json: json, actor: %User{} = actor, id: id} = params) do
48 Logger.info("Federating #{id} to #{inbox}")
49 %{host: host, path: path} = URI.parse(inbox)
51 digest = "SHA-256=" <> (:crypto.hash(:sha256, json) |> Base.encode64())
54 NaiveDateTime.utc_now()
55 |> Timex.format!("{WDshort}, {0D} {Mshort} {YYYY} {h24}:{m}:{s} GMT")
58 Pleroma.Signature.sign(actor, %{
59 "(request-target)": "post #{path}",
61 "content-length": byte_size(json),
66 with {:ok, %{status: code}} when code in 200..299 <-
72 {"Content-Type", "application/activity+json"},
74 {"signature", signature},
78 if !Map.has_key?(params, :unreachable_since) || params[:unreachable_since],
79 do: Instances.set_reachable(inbox)
83 {_post_result, response} ->
84 unless params[:unreachable_since], do: Instances.set_unreachable(inbox)
89 def publish_one(%{actor_id: actor_id} = params) do
90 actor = User.get_by_id(actor_id)
93 |> Map.delete(:actor_id)
94 |> Map.put(:actor, actor)
98 defp should_federate?(inbox, public) do
102 %{host: host} = URI.parse(inbox)
104 quarantined_instances =
105 Config.get([:instance, :quarantined_instances], [])
106 |> Pleroma.Web.ActivityPub.MRF.subdomains_regex()
108 !Pleroma.Web.ActivityPub.MRF.subdomain_match?(quarantined_instances, host)
112 @spec recipients(User.t(), Activity.t()) :: list(User.t()) | []
113 defp recipients(actor, activity) do
115 if actor.follower_address in activity.recipients do
116 User.get_external_followers(actor)
121 Pleroma.Web.Salmon.remote_users(actor, activity) ++ followers
124 defp get_cc_ap_ids(ap_id, recipients) do
125 host = Map.get(URI.parse(ap_id), :host)
128 |> Enum.filter(fn %User{ap_id: ap_id} -> Map.get(URI.parse(ap_id), :host) == host end)
129 |> Enum.map(& &1.ap_id)
132 defp maybe_use_sharedinbox(%User{info: %{source_data: data}}),
133 do: (is_map(data["endpoints"]) && Map.get(data["endpoints"], "sharedInbox")) || data["inbox"]
136 Determine a user inbox to use based on heuristics. These heuristics
137 are based on an approximation of the ``sharedInbox`` rules in the
138 [ActivityPub specification][ap-sharedinbox].
140 Please do not edit this function (or its children) without reading
141 the spec, as editing the code is likely to introduce some breakage
142 without some familiarity.
144 [ap-sharedinbox]: https://www.w3.org/TR/activitypub/#shared-inbox-delivery
147 %Activity{data: activity_data},
148 %User{info: %{source_data: data}} = user
150 to = activity_data["to"] || []
151 cc = activity_data["cc"] || []
152 type = activity_data["type"]
156 maybe_use_sharedinbox(user)
158 Pleroma.Constants.as_public() in to || Pleroma.Constants.as_public() in cc ->
159 maybe_use_sharedinbox(user)
161 length(to) + length(cc) > 1 ->
162 maybe_use_sharedinbox(user)
170 Publishes an activity with BCC to all relevant peers.
173 def publish(%User{} = actor, %{data: %{"bcc" => bcc}} = activity)
174 when is_list(bcc) and bcc != [] do
175 public = is_public?(activity)
176 {:ok, data} = Transmogrifier.prepare_outgoing(activity.data)
178 recipients = recipients(actor, activity)
181 |> Enum.filter(&User.ap_enabled?/1)
182 |> Enum.map(fn %{info: %{source_data: data}} -> data["inbox"] end)
183 |> Enum.filter(fn inbox -> should_federate?(inbox, public) end)
184 |> Instances.filter_reachable()
185 |> Enum.each(fn {inbox, unreachable_since} ->
186 %User{ap_id: ap_id} =
187 Enum.find(recipients, fn %{info: %{source_data: data}} -> data["inbox"] == inbox end)
189 # Get all the recipients on the same host and add them to cc. Otherwise, a remote
190 # instance would only accept a first message for the first recipient and ignore the rest.
191 cc = get_cc_ap_ids(ap_id, recipients)
198 Pleroma.Web.Federator.Publisher.enqueue_one(__MODULE__, %{
202 id: activity.data["id"],
203 unreachable_since: unreachable_since
209 Publishes an activity to all relevant peers.
211 def publish(%User{} = actor, %Activity{} = activity) do
212 public = is_public?(activity)
214 if public && Config.get([:instance, :allow_relay]) do
215 Logger.info(fn -> "Relaying #{activity.data["id"]} out" end)
216 Relay.publish(activity)
219 {:ok, data} = Transmogrifier.prepare_outgoing(activity.data)
220 json = Jason.encode!(data)
222 recipients(actor, activity)
223 |> Enum.filter(fn user -> User.ap_enabled?(user) end)
224 |> Enum.map(fn %User{} = user ->
225 determine_inbox(activity, user)
228 |> Enum.filter(fn inbox -> should_federate?(inbox, public) end)
229 |> Instances.filter_reachable()
230 |> Enum.each(fn {inbox, unreachable_since} ->
231 Pleroma.Web.Federator.Publisher.enqueue_one(
237 id: activity.data["id"],
238 unreachable_since: unreachable_since
244 def gather_webfinger_links(%User{} = user) do
246 %{"rel" => "self", "type" => "application/activity+json", "href" => user.ap_id},
249 "type" => "application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\"",
255 def gather_nodeinfo_protocol_names, do: ["activitypub"]