1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.MastodonAPI.TimelineController do
6 use Pleroma.Web, :controller
8 import Pleroma.Web.ControllerHelper,
9 only: [add_link_headers: 2, add_link_headers: 3]
12 alias Pleroma.Pagination
14 alias Pleroma.Web.ActivityPub.ActivityPub
15 alias Pleroma.Web.Plugs.EnsurePublicOrAuthenticatedPlug
16 alias Pleroma.Web.Plugs.OAuthScopesPlug
17 alias Pleroma.Web.Plugs.RateLimiter
19 plug(Pleroma.Web.ApiSpec.CastAndValidate)
20 plug(:skip_plug, EnsurePublicOrAuthenticatedPlug when action in [:public, :hashtag])
22 # TODO: Replace with a macro when there is a Phoenix release with the following commit in it:
23 # https://github.com/phoenixframework/phoenix/commit/2e8c63c01fec4dde5467dbbbf9705ff9e780735e
25 plug(RateLimiter, [name: :timeline, bucket_name: :direct_timeline] when action == :direct)
26 plug(RateLimiter, [name: :timeline, bucket_name: :public_timeline] when action == :public)
27 plug(RateLimiter, [name: :timeline, bucket_name: :home_timeline] when action == :home)
28 plug(RateLimiter, [name: :timeline, bucket_name: :hashtag_timeline] when action == :hashtag)
29 plug(RateLimiter, [name: :timeline, bucket_name: :list_timeline] when action == :list)
31 plug(OAuthScopesPlug, %{scopes: ["read:statuses"]} when action in [:home, :direct])
32 plug(OAuthScopesPlug, %{scopes: ["read:lists"]} when action == :list)
36 %{scopes: ["read:statuses"], fallback: :proceed_unauthenticated}
37 when action in [:public, :hashtag]
40 plug(:put_view, Pleroma.Web.MastodonAPI.StatusView)
42 defdelegate open_api_operation(action), to: Pleroma.Web.ApiSpec.TimelineOperation
44 # GET /api/v1/timelines/home
45 def home(%{assigns: %{user: user}} = conn, params) do
48 |> Map.put(:type, ["Create", "Announce"])
49 |> Map.put(:blocking_user, user)
50 |> Map.put(:muting_user, user)
51 |> Map.put(:reply_filtering_user, user)
52 |> Map.put(:announce_filtering_user, user)
53 |> Map.put(:user, user)
56 [user.ap_id | User.following(user)]
57 |> ActivityPub.fetch_activities(params)
61 |> add_link_headers(activities)
62 |> render("index.json",
63 activities: activities,
69 # GET /api/v1/timelines/direct
70 def direct(%{assigns: %{user: user}} = conn, params) do
73 |> Map.put(:type, "Create")
74 |> Map.put(:blocking_user, user)
75 |> Map.put(:user, user)
76 |> Map.put(:visibility, "direct")
80 |> ActivityPub.fetch_activities_query(params)
81 |> Pagination.fetch_paginated(params)
84 |> add_link_headers(activities)
85 |> render("index.json",
86 activities: activities,
92 defp restrict_unauthenticated?(true = _local_only) do
93 Config.restrict_unauthenticated_access?(:timelines, :local)
96 defp restrict_unauthenticated?(_) do
97 Config.restrict_unauthenticated_access?(:timelines, :federated)
100 # GET /api/v1/timelines/public
101 def public(%{assigns: %{user: user}} = conn, params) do
102 local_only = params[:local]
104 if is_nil(user) and restrict_unauthenticated?(local_only) do
105 fail_on_bad_auth(conn)
109 |> Map.put(:type, ["Create"])
110 |> Map.put(:local_only, local_only)
111 |> Map.put(:blocking_user, user)
112 |> Map.put(:muting_user, user)
113 |> Map.put(:reply_filtering_user, user)
114 |> ActivityPub.fetch_public_activities()
117 |> add_link_headers(activities, %{"local" => local_only})
118 |> render("index.json",
119 activities: activities,
126 defp fail_on_bad_auth(conn) do
127 render_error(conn, :unauthorized, "authorization required for timeline view")
130 defp hashtag_fetching(params, user, local_only) do
132 [params[:tag], params[:any]]
135 |> Enum.reject(&is_nil/1)
136 |> Enum.map(&String.downcase/1)
141 |> Enum.map(&String.downcase/1)
145 |> Map.get(:none, [])
146 |> Enum.map(&String.downcase/1)
150 |> Map.put(:type, "Create")
151 |> Map.put(:local_only, local_only)
152 |> Map.put(:blocking_user, user)
153 |> Map.put(:muting_user, user)
154 |> Map.put(:user, user)
155 |> Map.put(:tag, tags)
156 |> Map.put(:tag_all, tag_all)
157 |> Map.put(:tag_reject, tag_reject)
158 |> ActivityPub.fetch_public_activities()
161 # GET /api/v1/timelines/tag/:tag
162 def hashtag(%{assigns: %{user: user}} = conn, params) do
163 local_only = params[:local]
165 if is_nil(user) and restrict_unauthenticated?(local_only) do
166 fail_on_bad_auth(conn)
168 activities = hashtag_fetching(params, user, local_only)
171 |> add_link_headers(activities, %{"local" => local_only})
172 |> render("index.json",
173 activities: activities,
180 # GET /api/v1/timelines/list/:list_id
181 def list(%{assigns: %{user: user}} = conn, %{list_id: id} = params) do
182 with %Pleroma.List{title: _title, following: following} <- Pleroma.List.get(id, user) do
185 |> Map.put(:type, "Create")
186 |> Map.put(:blocking_user, user)
187 |> Map.put(:user, user)
188 |> Map.put(:muting_user, user)
190 # we must filter the following list for the user to avoid leaking statuses the user
191 # does not actually have permission to see (for more info, peruse security issue #270).
193 user_following = User.following(user)
197 |> Enum.filter(fn x -> x in user_following end)
198 |> ActivityPub.fetch_activities_bounded(following, params)
201 render(conn, "index.json",
202 activities: activities,
207 _e -> render_error(conn, :forbidden, "Error.")