1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.Transmogrifier do
7 A module to handle coding from internal to wire ActivityPub and back.
11 alias Pleroma.Object.Containment
14 alias Pleroma.Web.ActivityPub.ActivityPub
15 alias Pleroma.Web.ActivityPub.Utils
16 alias Pleroma.Web.ActivityPub.Visibility
17 alias Pleroma.Web.Federator
18 alias Pleroma.Workers.Transmogrifier, as: TransmogrifierWorker
23 require Pleroma.Constants
25 defdelegate worker_args(queue), to: Pleroma.Workers.Helper
28 Modifies an incoming AP object (mastodon format) to our internal format.
30 def fix_object(object, options \\ []) do
32 |> strip_internal_fields
37 |> fix_in_reply_to(options)
46 def fix_summary(%{"summary" => nil} = object) do
48 |> Map.put("summary", "")
51 def fix_summary(%{"summary" => _} = object) do
52 # summary is present, nothing to do
56 def fix_summary(object) do
58 |> Map.put("summary", "")
61 def fix_addressing_list(map, field) do
63 is_binary(map[field]) ->
64 Map.put(map, field, [map[field]])
67 Map.put(map, field, [])
74 def fix_explicit_addressing(
75 %{"to" => to, "cc" => cc} = object,
81 |> Enum.filter(fn x -> x in explicit_mentions end)
85 |> Enum.filter(fn x -> x not in explicit_mentions end)
89 |> Enum.reject(fn x -> String.ends_with?(x, "/followers") and x != follower_collection end)
93 |> Map.put("to", explicit_to)
94 |> Map.put("cc", final_cc)
97 def fix_explicit_addressing(object, _explicit_mentions, _followers_collection), do: object
99 # if directMessage flag is set to true, leave the addressing alone
100 def fix_explicit_addressing(%{"directMessage" => true} = object), do: object
102 def fix_explicit_addressing(object) do
105 |> Utils.determine_explicit_mentions()
107 follower_collection = User.get_cached_by_ap_id(Containment.get_actor(object)).follower_address
109 explicit_mentions = explicit_mentions ++ [Pleroma.Constants.as_public(), follower_collection]
111 fix_explicit_addressing(object, explicit_mentions, follower_collection)
114 # if as:Public is addressed, then make sure the followers collection is also addressed
115 # so that the activities will be delivered to local users.
116 def fix_implicit_addressing(%{"to" => to, "cc" => cc} = object, followers_collection) do
117 recipients = to ++ cc
119 if followers_collection not in recipients do
121 Pleroma.Constants.as_public() in cc ->
122 to = to ++ [followers_collection]
123 Map.put(object, "to", to)
125 Pleroma.Constants.as_public() in to ->
126 cc = cc ++ [followers_collection]
127 Map.put(object, "cc", cc)
137 def fix_implicit_addressing(object, _), do: object
139 def fix_addressing(object) do
140 {:ok, %User{} = user} = User.get_or_fetch_by_ap_id(object["actor"])
141 followers_collection = User.ap_followers(user)
144 |> fix_addressing_list("to")
145 |> fix_addressing_list("cc")
146 |> fix_addressing_list("bto")
147 |> fix_addressing_list("bcc")
148 |> fix_explicit_addressing()
149 |> fix_implicit_addressing(followers_collection)
152 def fix_actor(%{"attributedTo" => actor} = object) do
154 |> Map.put("actor", Containment.get_actor(%{"actor" => actor}))
157 def fix_in_reply_to(object, options \\ [])
159 def fix_in_reply_to(%{"inReplyTo" => in_reply_to} = object, options)
160 when not is_nil(in_reply_to) do
163 is_bitstring(in_reply_to) ->
166 is_map(in_reply_to) && is_bitstring(in_reply_to["id"]) ->
169 is_list(in_reply_to) && is_bitstring(Enum.at(in_reply_to, 0)) ->
170 Enum.at(in_reply_to, 0)
172 # Maybe I should output an error too?
177 object = Map.put(object, "inReplyToAtomUri", in_reply_to_id)
179 if Federator.allowed_incoming_reply_depth?(options[:depth]) do
180 case get_obj_helper(in_reply_to_id, options) do
181 {:ok, replied_object} ->
182 with %Activity{} = _activity <-
183 Activity.get_create_by_object_ap_id(replied_object.data["id"]) do
185 |> Map.put("inReplyTo", replied_object.data["id"])
186 |> Map.put("inReplyToAtomUri", object["inReplyToAtomUri"] || in_reply_to_id)
187 |> Map.put("conversation", replied_object.data["context"] || object["conversation"])
188 |> Map.put("context", replied_object.data["context"] || object["conversation"])
191 Logger.error("Couldn't fetch \"#{inspect(in_reply_to_id)}\", error: #{inspect(e)}")
196 Logger.error("Couldn't fetch \"#{inspect(in_reply_to_id)}\", error: #{inspect(e)}")
204 def fix_in_reply_to(object, _options), do: object
206 def fix_context(object) do
207 context = object["context"] || object["conversation"] || Utils.generate_context_id()
210 |> Map.put("context", context)
211 |> Map.put("conversation", context)
214 def fix_attachments(%{"attachment" => attachment} = object) when is_list(attachment) do
217 |> Enum.map(fn data ->
218 media_type = data["mediaType"] || data["mimeType"]
219 href = data["url"] || data["href"]
221 url = [%{"type" => "Link", "mediaType" => media_type, "href" => href}]
224 |> Map.put("mediaType", media_type)
225 |> Map.put("url", url)
229 |> Map.put("attachment", attachments)
232 def fix_attachments(%{"attachment" => attachment} = object) when is_map(attachment) do
233 Map.put(object, "attachment", [attachment])
237 def fix_attachments(object), do: object
239 def fix_url(%{"url" => url} = object) when is_map(url) do
241 |> Map.put("url", url["href"])
244 def fix_url(%{"type" => "Video", "url" => url} = object) when is_list(url) do
245 first_element = Enum.at(url, 0)
249 |> Enum.filter(fn x -> is_map(x) end)
250 |> Enum.filter(fn x -> x["mimeType"] == "text/html" end)
254 |> Map.put("attachment", [first_element])
255 |> Map.put("url", link_element["href"])
258 def fix_url(%{"type" => object_type, "url" => url} = object)
259 when object_type != "Video" and is_list(url) do
260 first_element = Enum.at(url, 0)
264 is_bitstring(first_element) -> first_element
265 is_map(first_element) -> first_element["href"] || ""
270 |> Map.put("url", url_string)
273 def fix_url(object), do: object
275 def fix_emoji(%{"tag" => tags} = object) when is_list(tags) do
276 emoji = tags |> Enum.filter(fn data -> data["type"] == "Emoji" and data["icon"] end)
280 |> Enum.reduce(%{}, fn data, mapping ->
281 name = String.trim(data["name"], ":")
283 mapping |> Map.put(name, data["icon"]["url"])
286 # we merge mastodon and pleroma emoji into a single mapping, to allow for both wire formats
287 emoji = Map.merge(object["emoji"] || %{}, emoji)
290 |> Map.put("emoji", emoji)
293 def fix_emoji(%{"tag" => %{"type" => "Emoji"} = tag} = object) do
294 name = String.trim(tag["name"], ":")
295 emoji = %{name => tag["icon"]["url"]}
298 |> Map.put("emoji", emoji)
301 def fix_emoji(object), do: object
303 def fix_tag(%{"tag" => tag} = object) when is_list(tag) do
306 |> Enum.filter(fn data -> data["type"] == "Hashtag" and data["name"] end)
307 |> Enum.map(fn data -> String.slice(data["name"], 1..-1) end)
309 combined = tag ++ tags
312 |> Map.put("tag", combined)
315 def fix_tag(%{"tag" => %{"type" => "Hashtag", "name" => hashtag} = tag} = object) do
316 combined = [tag, String.slice(hashtag, 1..-1)]
319 |> Map.put("tag", combined)
322 def fix_tag(%{"tag" => %{} = tag} = object), do: Map.put(object, "tag", [tag])
324 def fix_tag(object), do: object
326 # content map usually only has one language so this will do for now.
327 def fix_content_map(%{"contentMap" => content_map} = object) do
328 content_groups = Map.to_list(content_map)
329 {_, content} = Enum.at(content_groups, 0)
332 |> Map.put("content", content)
335 def fix_content_map(object), do: object
337 def fix_type(object, options \\ [])
339 def fix_type(%{"inReplyTo" => reply_id, "name" => _} = object, options)
340 when is_binary(reply_id) do
342 with true <- Federator.allowed_incoming_reply_depth?(options[:depth]),
343 {:ok, object} <- get_obj_helper(reply_id, options) do
347 if reply && reply.data["type"] == "Question" do
348 Map.put(object, "type", "Answer")
354 def fix_type(object, _), do: object
356 defp mastodon_follow_hack(%{"id" => id, "actor" => follower_id}, followed) do
357 with true <- id =~ "follows",
358 %User{local: true} = follower <- User.get_cached_by_ap_id(follower_id),
359 %Activity{} = activity <- Utils.fetch_latest_follow(follower, followed) do
366 defp mastodon_follow_hack(_, _), do: {:error, nil}
368 defp get_follow_activity(follow_object, followed) do
369 with object_id when not is_nil(object_id) <- Utils.get_ap_id(follow_object),
370 {_, %Activity{} = activity} <- {:activity, Activity.get_by_ap_id(object_id)} do
373 # Can't find the activity. This might a Mastodon 2.3 "Accept"
375 mastodon_follow_hack(follow_object, followed)
382 def handle_incoming(data, options \\ [])
384 # Flag objects are placed ahead of the ID check because Mastodon 2.8 and earlier send them
386 def handle_incoming(%{"type" => "Flag", "object" => objects, "actor" => actor} = data, _options) do
387 with context <- data["context"] || Utils.generate_context_id(),
388 content <- data["content"] || "",
389 %User{} = actor <- User.get_cached_by_ap_id(actor),
391 # Reduce the object list to find the reported user.
393 Enum.reduce_while(objects, nil, fn ap_id, _ ->
394 with %User{} = user <- User.get_cached_by_ap_id(ap_id) do
401 # Remove the reported user from the object list.
402 statuses <- Enum.filter(objects, fn ap_id -> ap_id != account.ap_id end) do
410 "cc" => [account.ap_id]
414 ActivityPub.flag(params)
418 # disallow objects with bogus IDs
419 def handle_incoming(%{"id" => nil}, _options), do: :error
420 def handle_incoming(%{"id" => ""}, _options), do: :error
421 # length of https:// = 8, should validate better, but good enough for now.
422 def handle_incoming(%{"id" => id}, _options) when not (is_binary(id) and length(id) > 8),
425 # TODO: validate those with a Ecto scheme
429 %{"type" => "Create", "object" => %{"type" => objtype} = object} = data,
432 when objtype in ["Article", "Note", "Video", "Page", "Question", "Answer"] do
433 actor = Containment.get_actor(data)
436 Map.put(data, "actor", actor)
439 with nil <- Activity.get_create_by_object_ap_id(object["id"]),
440 {:ok, %User{} = user} <- User.get_or_fetch_by_ap_id(data["actor"]) do
441 options = Keyword.put(options, :depth, (options[:depth] || 0) + 1)
442 object = fix_object(data["object"], options)
448 context: object["conversation"],
450 published: data["published"],
459 ActivityPub.create(params)
461 %Activity{} = activity -> {:ok, activity}
467 %{"type" => "Follow", "object" => followed, "actor" => follower, "id" => id} = data,
470 with %User{local: true} = followed <- User.get_cached_by_ap_id(followed),
471 {:ok, %User{} = follower} <- User.get_or_fetch_by_ap_id(follower),
472 {:ok, activity} <- ActivityPub.follow(follower, followed, id, false) do
473 with deny_follow_blocked <- Pleroma.Config.get([:user, :deny_follow_blocked]),
474 {_, false} <- {:user_blocked, User.blocks?(followed, follower) && deny_follow_blocked},
475 {_, false} <- {:user_locked, User.locked?(followed)},
476 {_, {:ok, follower}} <- {:follow, User.follow(follower, followed)},
478 {:follow_state_update, Utils.update_follow_state_for_all(activity, "accept")} do
479 ActivityPub.accept(%{
480 to: [follower.ap_id],
486 {:user_blocked, true} ->
487 {:ok, _} = Utils.update_follow_state_for_all(activity, "reject")
489 ActivityPub.reject(%{
490 to: [follower.ap_id],
496 {:follow, {:error, _}} ->
497 {:ok, _} = Utils.update_follow_state_for_all(activity, "reject")
499 ActivityPub.reject(%{
500 to: [follower.ap_id],
506 {:user_locked, true} ->
518 %{"type" => "Accept", "object" => follow_object, "actor" => _actor, "id" => _id} = data,
521 with actor <- Containment.get_actor(data),
522 {:ok, %User{} = followed} <- User.get_or_fetch_by_ap_id(actor),
523 {:ok, follow_activity} <- get_follow_activity(follow_object, followed),
524 {:ok, follow_activity} <- Utils.update_follow_state_for_all(follow_activity, "accept"),
525 %User{local: true} = follower <- User.get_cached_by_ap_id(follow_activity.data["actor"]),
526 {:ok, _follower} = User.follow(follower, followed) do
527 ActivityPub.accept(%{
528 to: follow_activity.data["to"],
531 object: follow_activity.data["id"],
540 %{"type" => "Reject", "object" => follow_object, "actor" => _actor, "id" => _id} = data,
543 with actor <- Containment.get_actor(data),
544 {:ok, %User{} = followed} <- User.get_or_fetch_by_ap_id(actor),
545 {:ok, follow_activity} <- get_follow_activity(follow_object, followed),
546 {:ok, follow_activity} <- Utils.update_follow_state_for_all(follow_activity, "reject"),
547 %User{local: true} = follower <- User.get_cached_by_ap_id(follow_activity.data["actor"]),
549 ActivityPub.reject(%{
550 to: follow_activity.data["to"],
553 object: follow_activity.data["id"],
556 User.unfollow(follower, followed)
565 %{"type" => "Like", "object" => object_id, "actor" => _actor, "id" => id} = data,
568 with actor <- Containment.get_actor(data),
569 {:ok, %User{} = actor} <- User.get_or_fetch_by_ap_id(actor),
570 {:ok, object} <- get_obj_helper(object_id),
571 {:ok, activity, _object} <- ActivityPub.like(actor, object, id, false) do
579 %{"type" => "Announce", "object" => object_id, "actor" => _actor, "id" => id} = data,
582 with actor <- Containment.get_actor(data),
583 {:ok, %User{} = actor} <- User.get_or_fetch_by_ap_id(actor),
584 {:ok, object} <- get_obj_helper(object_id),
585 public <- Visibility.is_public?(data),
586 {:ok, activity, _object} <- ActivityPub.announce(actor, object, id, false, public) do
594 %{"type" => "Update", "object" => %{"type" => object_type} = object, "actor" => actor_id} =
598 when object_type in ["Person", "Application", "Service", "Organization"] do
599 with %User{ap_id: ^actor_id} = actor <- User.get_cached_by_ap_id(object["id"]) do
600 {:ok, new_user_data} = ActivityPub.user_data_from_user_object(object)
602 banner = new_user_data[:info][:banner]
603 locked = new_user_data[:info][:locked] || false
607 |> Map.take([:name, :bio, :avatar])
608 |> Map.put(:info, %{banner: banner, locked: locked})
611 |> User.upgrade_changeset(update_data)
612 |> User.update_and_set_cache()
614 ActivityPub.update(%{
616 to: data["to"] || [],
617 cc: data["cc"] || [],
628 # TODO: We presently assume that any actor on the same origin domain as the object being
629 # deleted has the rights to delete that object. A better way to validate whether or not
630 # the object should be deleted is to refetch the object URI, which should return either
631 # an error or a tombstone. This would allow us to verify that a deletion actually took
634 %{"type" => "Delete", "object" => object_id, "actor" => actor, "id" => _id} = data,
637 object_id = Utils.get_ap_id(object_id)
639 with actor <- Containment.get_actor(data),
640 {:ok, %User{} = actor} <- User.get_or_fetch_by_ap_id(actor),
641 {:ok, object} <- get_obj_helper(object_id),
642 :ok <- Containment.contain_origin(actor.ap_id, object.data),
643 {:ok, activity} <- ActivityPub.delete(object, false) do
647 case User.get_cached_by_ap_id(object_id) do
648 %User{ap_id: ^actor} = user ->
663 "object" => %{"type" => "Announce", "object" => object_id},
669 with actor <- Containment.get_actor(data),
670 {:ok, %User{} = actor} <- User.get_or_fetch_by_ap_id(actor),
671 {:ok, object} <- get_obj_helper(object_id),
672 {:ok, activity, _} <- ActivityPub.unannounce(actor, object, id, false) do
682 "object" => %{"type" => "Follow", "object" => followed},
688 with %User{local: true} = followed <- User.get_cached_by_ap_id(followed),
689 {:ok, %User{} = follower} <- User.get_or_fetch_by_ap_id(follower),
690 {:ok, activity} <- ActivityPub.unfollow(follower, followed, id, false) do
691 User.unfollow(follower, followed)
701 "object" => %{"type" => "Block", "object" => blocked},
707 with %User{local: true} = blocked <- User.get_cached_by_ap_id(blocked),
708 {:ok, %User{} = blocker} <- User.get_or_fetch_by_ap_id(blocker),
709 {:ok, activity} <- ActivityPub.unblock(blocker, blocked, id, false) do
710 User.unblock(blocker, blocked)
718 %{"type" => "Block", "object" => blocked, "actor" => blocker, "id" => id} = _data,
721 with %User{local: true} = blocked = User.get_cached_by_ap_id(blocked),
722 {:ok, %User{} = blocker} = User.get_or_fetch_by_ap_id(blocker),
723 {:ok, activity} <- ActivityPub.block(blocker, blocked, id, false) do
724 User.unfollow(blocker, blocked)
725 User.block(blocker, blocked)
735 "object" => %{"type" => "Like", "object" => object_id},
741 with actor <- Containment.get_actor(data),
742 {:ok, %User{} = actor} <- User.get_or_fetch_by_ap_id(actor),
743 {:ok, object} <- get_obj_helper(object_id),
744 {:ok, activity, _, _} <- ActivityPub.unlike(actor, object, id, false) do
751 def handle_incoming(_, _), do: :error
753 def get_obj_helper(id, options \\ []) do
754 if object = Object.normalize(id, true, options), do: {:ok, object}, else: nil
757 def set_reply_to_uri(%{"inReplyTo" => in_reply_to} = object) when is_binary(in_reply_to) do
758 with false <- String.starts_with?(in_reply_to, "http"),
759 {:ok, %{data: replied_to_object}} <- get_obj_helper(in_reply_to) do
760 Map.put(object, "inReplyTo", replied_to_object["external_url"] || in_reply_to)
766 def set_reply_to_uri(obj), do: obj
768 # Prepares the object of an outgoing create activity.
769 def prepare_object(object) do
776 |> prepare_attachments
779 |> strip_internal_fields
780 |> strip_internal_tags
786 # internal -> Mastodon
789 def prepare_outgoing(%{"type" => "Create", "object" => object_id} = data) do
792 |> Object.normalize()
798 |> Map.put("object", object)
799 |> Map.merge(Utils.make_json_ld_header())
805 # Mastodon Accept/Reject requires a non-normalized object containing the actor URIs,
806 # because of course it does.
807 def prepare_outgoing(%{"type" => "Accept"} = data) do
808 with follow_activity <- Activity.normalize(data["object"]) do
810 "actor" => follow_activity.actor,
811 "object" => follow_activity.data["object"],
812 "id" => follow_activity.data["id"],
818 |> Map.put("object", object)
819 |> Map.merge(Utils.make_json_ld_header())
825 def prepare_outgoing(%{"type" => "Reject"} = data) do
826 with follow_activity <- Activity.normalize(data["object"]) do
828 "actor" => follow_activity.actor,
829 "object" => follow_activity.data["object"],
830 "id" => follow_activity.data["id"],
836 |> Map.put("object", object)
837 |> Map.merge(Utils.make_json_ld_header())
843 def prepare_outgoing(%{"type" => _type} = data) do
846 |> strip_internal_fields
847 |> maybe_fix_object_url
848 |> Map.merge(Utils.make_json_ld_header())
853 def maybe_fix_object_url(data) do
854 if is_binary(data["object"]) and not String.starts_with?(data["object"], "http") do
855 case get_obj_helper(data["object"]) do
856 {:ok, relative_object} ->
857 if relative_object.data["external_url"] do
860 |> Map.put("object", relative_object.data["external_url"])
866 Logger.error("Couldn't fetch #{data["object"]} #{inspect(e)}")
874 def add_hashtags(object) do
876 (object["tag"] || [])
878 # Expand internal representation tags into AS2 tags.
879 tag when is_binary(tag) ->
881 "href" => Pleroma.Web.Endpoint.url() <> "/tags/#{tag}",
886 # Do not process tags which are already AS2 tag objects.
887 tag when is_map(tag) ->
892 |> Map.put("tag", tags)
895 def add_mention_tags(object) do
898 |> Utils.get_notified_from_object()
899 |> Enum.map(fn user ->
900 %{"type" => "Mention", "href" => user.ap_id, "name" => "@#{user.nickname}"}
903 tags = object["tag"] || []
906 |> Map.put("tag", tags ++ mentions)
909 def add_emoji_tags(%User{info: %{"emoji" => _emoji} = user_info} = object) do
910 user_info = add_emoji_tags(user_info)
913 |> Map.put(:info, user_info)
916 # TODO: we should probably send mtime instead of unix epoch time for updated
917 def add_emoji_tags(%{"emoji" => emoji} = object) do
918 tags = object["tag"] || []
922 |> Enum.map(fn {name, url} ->
924 "icon" => %{"url" => url, "type" => "Image"},
925 "name" => ":" <> name <> ":",
927 "updated" => "1970-01-01T00:00:00Z",
933 |> Map.put("tag", tags ++ out)
936 def add_emoji_tags(object) do
940 def set_conversation(object) do
941 Map.put(object, "conversation", object["context"])
944 def set_sensitive(object) do
945 tags = object["tag"] || []
946 Map.put(object, "sensitive", "nsfw" in tags)
949 def set_type(%{"type" => "Answer"} = object) do
950 Map.put(object, "type", "Note")
953 def set_type(object), do: object
955 def add_attributed_to(object) do
956 attributed_to = object["attributedTo"] || object["actor"]
959 |> Map.put("attributedTo", attributed_to)
962 def prepare_attachments(object) do
964 (object["attachment"] || [])
965 |> Enum.map(fn data ->
966 [%{"mediaType" => media_type, "href" => href} | _] = data["url"]
967 %{"url" => href, "mediaType" => media_type, "name" => data["name"], "type" => "Document"}
971 |> Map.put("attachment", attachments)
974 defp strip_internal_fields(object) do
980 "announcement_count",
983 "deleted_activity_id"
987 defp strip_internal_tags(%{"tag" => tags} = object) do
990 |> Enum.filter(fn x -> is_map(x) end)
993 |> Map.put("tag", tags)
996 defp strip_internal_tags(object), do: object
998 def perform(:user_upgrade, user) do
999 # we pass a fake user so that the followers collection is stripped away
1000 old_follower_address = User.ap_followers(%User{nickname: user.nickname})
1005 where: ^old_follower_address in u.following,
1010 "array_replace(?,?,?)",
1012 ^old_follower_address,
1013 ^user.follower_address
1019 Repo.update_all(q, [])
1021 maybe_retire_websub(user.ap_id)
1026 where: ^old_follower_address in a.recipients,
1031 "array_replace(?,?,?)",
1033 ^old_follower_address,
1034 ^user.follower_address
1040 Repo.update_all(q, [])
1043 def upgrade_user_from_ap_id(ap_id) do
1044 with %User{local: false} = user <- User.get_cached_by_ap_id(ap_id),
1045 {:ok, data} <- ActivityPub.fetch_and_prepare_user_from_ap_id(ap_id),
1046 already_ap <- User.ap_enabled?(user),
1047 {:ok, user} <- user |> User.upgrade_changeset(data) |> User.update_and_set_cache() do
1048 unless already_ap do
1049 %{"op" => "user_upgrade", "user_id" => user.id}
1050 |> TransmogrifierWorker.new(worker_args(:transmogrifier))
1056 %User{} = user -> {:ok, user}
1061 def maybe_retire_websub(ap_id) do
1062 # some sanity checks
1063 if is_binary(ap_id) && String.length(ap_id) > 8 do
1066 ws in Pleroma.Web.Websub.WebsubClientSubscription,
1067 where: fragment("? like ?", ws.topic, ^"#{ap_id}%")
1074 def maybe_fix_user_url(data) do
1075 if is_map(data["url"]) do
1076 Map.put(data, "url", data["url"]["href"])
1082 def maybe_fix_user_object(data) do
1084 |> maybe_fix_user_url