1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.User do
10 import Ecto, only: [assoc: 2]
13 alias Pleroma.Activity
15 alias Pleroma.Conversation.Participation
16 alias Pleroma.Delivery
17 alias Pleroma.EctoType.ActivityPub.ObjectValidators
19 alias Pleroma.FollowingRelationship
20 alias Pleroma.Formatter
24 alias Pleroma.Notification
26 alias Pleroma.Registration
28 alias Pleroma.RepoStreamer
30 alias Pleroma.UserRelationship
32 alias Pleroma.Web.ActivityPub.ActivityPub
33 alias Pleroma.Web.ActivityPub.Builder
34 alias Pleroma.Web.ActivityPub.Pipeline
35 alias Pleroma.Web.ActivityPub.Utils
36 alias Pleroma.Web.CommonAPI
37 alias Pleroma.Web.CommonAPI.Utils, as: CommonUtils
38 alias Pleroma.Web.OAuth
39 alias Pleroma.Web.RelMe
40 alias Pleroma.Workers.BackgroundWorker
44 @type t :: %__MODULE__{}
45 @type account_status :: :active | :deactivated | :password_reset_pending | :confirmation_pending
46 @primary_key {:id, FlakeId.Ecto.CompatType, autogenerate: true}
48 # credo:disable-for-next-line Credo.Check.Readability.MaxLineLength
49 @email_regex ~r/^[a-zA-Z0-9.!#$%&'*+\/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/
51 @strict_local_nickname_regex ~r/^[a-zA-Z\d]+$/
52 @extended_local_nickname_regex ~r/^[a-zA-Z\d_-]+$/
54 # AP ID user relationships (blocks, mutes etc.)
55 # Format: [rel_type: [outgoing_rel: :outgoing_rel_target, incoming_rel: :incoming_rel_source]]
56 @user_relationships_config [
58 blocker_blocks: :blocked_users,
59 blockee_blocks: :blocker_users
62 muter_mutes: :muted_users,
63 mutee_mutes: :muter_users
66 reblog_muter_mutes: :reblog_muted_users,
67 reblog_mutee_mutes: :reblog_muter_users
70 notification_muter_mutes: :notification_muted_users,
71 notification_mutee_mutes: :notification_muter_users
73 # Note: `inverse_subscription` relationship is inverse: subscriber acts as relationship target
74 inverse_subscription: [
75 subscribee_subscriptions: :subscriber_users,
76 subscriber_subscriptions: :subscribee_users
82 field(:raw_bio, :string)
83 field(:email, :string)
85 field(:nickname, :string)
86 field(:password_hash, :string)
87 field(:password, :string, virtual: true)
88 field(:password_confirmation, :string, virtual: true)
90 field(:public_key, :string)
91 field(:ap_id, :string)
92 field(:avatar, :map, default: %{})
93 field(:local, :boolean, default: true)
94 field(:follower_address, :string)
95 field(:following_address, :string)
96 field(:search_rank, :float, virtual: true)
97 field(:search_type, :integer, virtual: true)
98 field(:tags, {:array, :string}, default: [])
99 field(:last_refreshed_at, :naive_datetime_usec)
100 field(:last_digest_emailed_at, :naive_datetime)
101 field(:banner, :map, default: %{})
102 field(:background, :map, default: %{})
103 field(:note_count, :integer, default: 0)
104 field(:follower_count, :integer, default: 0)
105 field(:following_count, :integer, default: 0)
106 field(:locked, :boolean, default: false)
107 field(:confirmation_pending, :boolean, default: false)
108 field(:password_reset_pending, :boolean, default: false)
109 field(:confirmation_token, :string, default: nil)
110 field(:default_scope, :string, default: "public")
111 field(:domain_blocks, {:array, :string}, default: [])
112 field(:deactivated, :boolean, default: false)
113 field(:no_rich_text, :boolean, default: false)
114 field(:ap_enabled, :boolean, default: false)
115 field(:is_moderator, :boolean, default: false)
116 field(:is_admin, :boolean, default: false)
117 field(:show_role, :boolean, default: true)
118 field(:mastofe_settings, :map, default: nil)
119 field(:uri, ObjectValidators.Uri, default: nil)
120 field(:hide_followers_count, :boolean, default: false)
121 field(:hide_follows_count, :boolean, default: false)
122 field(:hide_followers, :boolean, default: false)
123 field(:hide_follows, :boolean, default: false)
124 field(:hide_favorites, :boolean, default: true)
125 field(:unread_conversation_count, :integer, default: 0)
126 field(:pinned_activities, {:array, :string}, default: [])
127 field(:email_notifications, :map, default: %{"digest" => false})
128 field(:mascot, :map, default: nil)
129 field(:emoji, :map, default: %{})
130 field(:pleroma_settings_store, :map, default: %{})
131 field(:fields, {:array, :map}, default: [])
132 field(:raw_fields, {:array, :map}, default: [])
133 field(:discoverable, :boolean, default: false)
134 field(:invisible, :boolean, default: false)
135 field(:allow_following_move, :boolean, default: true)
136 field(:skip_thread_containment, :boolean, default: false)
137 field(:actor_type, :string, default: "Person")
138 field(:also_known_as, {:array, :string}, default: [])
139 field(:inbox, :string)
140 field(:shared_inbox, :string)
141 field(:accepts_chat_messages, :boolean, default: nil)
144 :notification_settings,
145 Pleroma.User.NotificationSetting,
149 has_many(:notifications, Notification)
150 has_many(:registrations, Registration)
151 has_many(:deliveries, Delivery)
153 has_many(:outgoing_relationships, UserRelationship, foreign_key: :source_id)
154 has_many(:incoming_relationships, UserRelationship, foreign_key: :target_id)
156 for {relationship_type,
158 {outgoing_relation, outgoing_relation_target},
159 {incoming_relation, incoming_relation_source}
160 ]} <- @user_relationships_config do
161 # Definitions of `has_many` relations: :blocker_blocks, :muter_mutes, :reblog_muter_mutes,
162 # :notification_muter_mutes, :subscribee_subscriptions
163 has_many(outgoing_relation, UserRelationship,
164 foreign_key: :source_id,
165 where: [relationship_type: relationship_type]
168 # Definitions of `has_many` relations: :blockee_blocks, :mutee_mutes, :reblog_mutee_mutes,
169 # :notification_mutee_mutes, :subscriber_subscriptions
170 has_many(incoming_relation, UserRelationship,
171 foreign_key: :target_id,
172 where: [relationship_type: relationship_type]
175 # Definitions of `has_many` relations: :blocked_users, :muted_users, :reblog_muted_users,
176 # :notification_muted_users, :subscriber_users
177 has_many(outgoing_relation_target, through: [outgoing_relation, :target])
179 # Definitions of `has_many` relations: :blocker_users, :muter_users, :reblog_muter_users,
180 # :notification_muter_users, :subscribee_users
181 has_many(incoming_relation_source, through: [incoming_relation, :source])
184 # `:blocks` is deprecated (replaced with `blocked_users` relation)
185 field(:blocks, {:array, :string}, default: [])
186 # `:mutes` is deprecated (replaced with `muted_users` relation)
187 field(:mutes, {:array, :string}, default: [])
188 # `:muted_reblogs` is deprecated (replaced with `reblog_muted_users` relation)
189 field(:muted_reblogs, {:array, :string}, default: [])
190 # `:muted_notifications` is deprecated (replaced with `notification_muted_users` relation)
191 field(:muted_notifications, {:array, :string}, default: [])
192 # `:subscribers` is deprecated (replaced with `subscriber_users` relation)
193 field(:subscribers, {:array, :string}, default: [])
196 :multi_factor_authentication_settings,
204 for {_relationship_type, [{_outgoing_relation, outgoing_relation_target}, _]} <-
205 @user_relationships_config do
206 # `def blocked_users_relation/2`, `def muted_users_relation/2`,
207 # `def reblog_muted_users_relation/2`, `def notification_muted_users/2`,
208 # `def subscriber_users/2`
209 def unquote(:"#{outgoing_relation_target}_relation")(user, restrict_deactivated? \\ false) do
210 target_users_query = assoc(user, unquote(outgoing_relation_target))
212 if restrict_deactivated? do
213 restrict_deactivated(target_users_query)
219 # `def blocked_users/2`, `def muted_users/2`, `def reblog_muted_users/2`,
220 # `def notification_muted_users/2`, `def subscriber_users/2`
221 def unquote(outgoing_relation_target)(user, restrict_deactivated? \\ false) do
223 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
225 restrict_deactivated?
230 # `def blocked_users_ap_ids/2`, `def muted_users_ap_ids/2`, `def reblog_muted_users_ap_ids/2`,
231 # `def notification_muted_users_ap_ids/2`, `def subscriber_users_ap_ids/2`
232 def unquote(:"#{outgoing_relation_target}_ap_ids")(user, restrict_deactivated? \\ false) do
234 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
236 restrict_deactivated?
238 |> select([u], u.ap_id)
244 Dumps Flake Id to SQL-compatible format (16-byte UUID).
245 E.g. "9pQtDGXuq4p3VlcJEm" -> <<0, 0, 1, 110, 179, 218, 42, 92, 213, 41, 44, 227, 95, 213, 0, 0>>
247 def binary_id(source_id) when is_binary(source_id) do
248 with {:ok, dumped_id} <- FlakeId.Ecto.CompatType.dump(source_id) do
255 def binary_id(source_ids) when is_list(source_ids) do
256 Enum.map(source_ids, &binary_id/1)
259 def binary_id(%User{} = user), do: binary_id(user.id)
261 @doc "Returns status account"
262 @spec account_status(User.t()) :: account_status()
263 def account_status(%User{deactivated: true}), do: :deactivated
264 def account_status(%User{password_reset_pending: true}), do: :password_reset_pending
266 def account_status(%User{confirmation_pending: true}) do
267 if Config.get([:instance, :account_activation_required]) do
268 :confirmation_pending
274 def account_status(%User{}), do: :active
276 @spec visible_for(User.t(), User.t() | nil) ::
279 | :restricted_unauthenticated
281 | :confirmation_pending
282 def visible_for(user, for_user \\ nil)
284 def visible_for(%User{invisible: true}, _), do: :invisible
286 def visible_for(%User{id: user_id}, %User{id: user_id}), do: :visible
288 def visible_for(%User{} = user, nil) do
289 if restrict_unauthenticated?(user) do
290 :restrict_unauthenticated
292 visible_account_status(user)
296 def visible_for(%User{} = user, for_user) do
297 if superuser?(for_user) do
300 visible_account_status(user)
304 def visible_for(_, _), do: :invisible
306 defp restrict_unauthenticated?(%User{local: local}) do
307 config_key = if local, do: :local, else: :remote
309 Config.get([:restrict_unauthenticated, :profiles, config_key], false)
312 defp visible_account_status(user) do
313 status = account_status(user)
315 if status in [:active, :password_reset_pending] do
322 @spec superuser?(User.t()) :: boolean()
323 def superuser?(%User{local: true, is_admin: true}), do: true
324 def superuser?(%User{local: true, is_moderator: true}), do: true
325 def superuser?(_), do: false
327 @spec invisible?(User.t()) :: boolean()
328 def invisible?(%User{invisible: true}), do: true
329 def invisible?(_), do: false
331 def avatar_url(user, options \\ []) do
333 %{"url" => [%{"href" => href} | _]} ->
337 unless options[:no_default] do
338 Config.get([:assets, :default_user_avatar], "#{Web.base_url()}/images/avi.png")
343 def banner_url(user, options \\ []) do
345 %{"url" => [%{"href" => href} | _]} -> href
346 _ -> !options[:no_default] && "#{Web.base_url()}/images/banner.png"
350 # Should probably be renamed or removed
351 def ap_id(%User{nickname: nickname}), do: "#{Web.base_url()}/users/#{nickname}"
353 def ap_followers(%User{follower_address: fa}) when is_binary(fa), do: fa
354 def ap_followers(%User{} = user), do: "#{ap_id(user)}/followers"
356 @spec ap_following(User.t()) :: String.t()
357 def ap_following(%User{following_address: fa}) when is_binary(fa), do: fa
358 def ap_following(%User{} = user), do: "#{ap_id(user)}/following"
360 @spec restrict_deactivated(Ecto.Query.t()) :: Ecto.Query.t()
361 def restrict_deactivated(query) do
362 from(u in query, where: u.deactivated != ^true)
365 defdelegate following_count(user), to: FollowingRelationship
367 defp truncate_fields_param(params) do
368 if Map.has_key?(params, :fields) do
369 Map.put(params, :fields, Enum.map(params[:fields], &truncate_field/1))
375 defp truncate_if_exists(params, key, max_length) do
376 if Map.has_key?(params, key) and is_binary(params[key]) do
377 {value, _chopped} = String.split_at(params[key], max_length)
378 Map.put(params, key, value)
384 defp fix_follower_address(%{follower_address: _, following_address: _} = params), do: params
386 defp fix_follower_address(%{nickname: nickname} = params),
387 do: Map.put(params, :follower_address, ap_followers(%User{nickname: nickname}))
389 defp fix_follower_address(params), do: params
391 def remote_user_changeset(struct \\ %User{local: false}, params) do
392 bio_limit = Config.get([:instance, :user_bio_length], 5000)
393 name_limit = Config.get([:instance, :user_name_length], 100)
396 case params[:name] do
397 name when is_binary(name) and byte_size(name) > 0 -> name
398 _ -> params[:nickname]
403 |> Map.put(:name, name)
404 |> Map.put_new(:last_refreshed_at, NaiveDateTime.utc_now())
405 |> truncate_if_exists(:name, name_limit)
406 |> truncate_if_exists(:bio, bio_limit)
407 |> truncate_fields_param()
408 |> fix_follower_address()
432 :hide_followers_count,
441 :accepts_chat_messages
444 |> validate_required([:name, :ap_id])
445 |> unique_constraint(:nickname)
446 |> validate_format(:nickname, @email_regex)
447 |> validate_length(:bio, max: bio_limit)
448 |> validate_length(:name, max: name_limit)
449 |> validate_fields(true)
452 def update_changeset(struct, params \\ %{}) do
453 bio_limit = Config.get([:instance, :user_bio_length], 5000)
454 name_limit = Config.get([:instance, :user_name_length], 100)
474 :hide_followers_count,
477 :allow_following_move,
480 :skip_thread_containment,
483 :pleroma_settings_store,
487 :accepts_chat_messages
490 |> unique_constraint(:nickname)
491 |> validate_format(:nickname, local_nickname_regex())
492 |> validate_length(:bio, max: bio_limit)
493 |> validate_length(:name, min: 1, max: name_limit)
494 |> validate_inclusion(:actor_type, ["Person", "Service"])
497 |> put_change_if_present(:bio, &{:ok, parse_bio(&1, struct)})
498 |> put_change_if_present(:avatar, &put_upload(&1, :avatar))
499 |> put_change_if_present(:banner, &put_upload(&1, :banner))
500 |> put_change_if_present(:background, &put_upload(&1, :background))
501 |> put_change_if_present(
502 :pleroma_settings_store,
503 &{:ok, Map.merge(struct.pleroma_settings_store, &1)}
505 |> validate_fields(false)
508 defp put_fields(changeset) do
509 if raw_fields = get_change(changeset, :raw_fields) do
512 |> Enum.filter(fn %{"name" => n} -> n != "" end)
516 |> Enum.map(fn f -> Map.update!(f, "value", &parse_fields(&1)) end)
519 |> put_change(:raw_fields, raw_fields)
520 |> put_change(:fields, fields)
526 defp parse_fields(value) do
528 |> Formatter.linkify(mentions_format: :full)
532 defp put_emoji(changeset) do
533 emojified_fields = [:bio, :name, :raw_fields]
535 if Enum.any?(changeset.changes, fn {k, _} -> k in emojified_fields end) do
536 bio = Emoji.Formatter.get_emoji_map(get_field(changeset, :bio))
537 name = Emoji.Formatter.get_emoji_map(get_field(changeset, :name))
539 emoji = Map.merge(bio, name)
543 |> get_field(:raw_fields)
544 |> Enum.reduce(emoji, fn x, acc ->
545 Map.merge(acc, Emoji.Formatter.get_emoji_map(x["name"] <> x["value"]))
548 put_change(changeset, :emoji, emoji)
554 defp put_change_if_present(changeset, map_field, value_function) do
555 with {:ok, value} <- fetch_change(changeset, map_field),
556 {:ok, new_value} <- value_function.(value) do
557 put_change(changeset, map_field, new_value)
563 defp put_upload(value, type) do
564 with %Plug.Upload{} <- value,
565 {:ok, object} <- ActivityPub.upload(value, type: type) do
570 def update_as_admin_changeset(struct, params) do
572 |> update_changeset(params)
573 |> cast(params, [:email])
574 |> delete_change(:also_known_as)
575 |> unique_constraint(:email)
576 |> validate_format(:email, @email_regex)
577 |> validate_inclusion(:actor_type, ["Person", "Service"])
580 @spec update_as_admin(User.t(), map()) :: {:ok, User.t()} | {:error, Changeset.t()}
581 def update_as_admin(user, params) do
582 params = Map.put(params, "password_confirmation", params["password"])
583 changeset = update_as_admin_changeset(user, params)
585 if params["password"] do
586 reset_password(user, changeset, params)
588 User.update_and_set_cache(changeset)
592 def password_update_changeset(struct, params) do
594 |> cast(params, [:password, :password_confirmation])
595 |> validate_required([:password, :password_confirmation])
596 |> validate_confirmation(:password)
597 |> put_password_hash()
598 |> put_change(:password_reset_pending, false)
601 @spec reset_password(User.t(), map()) :: {:ok, User.t()} | {:error, Changeset.t()}
602 def reset_password(%User{} = user, params) do
603 reset_password(user, user, params)
606 def reset_password(%User{id: user_id} = user, struct, params) do
609 |> Multi.update(:user, password_update_changeset(struct, params))
610 |> Multi.delete_all(:tokens, OAuth.Token.Query.get_by_user(user_id))
611 |> Multi.delete_all(:auth, OAuth.Authorization.delete_by_user_query(user))
613 case Repo.transaction(multi) do
614 {:ok, %{user: user} = _} -> set_cache(user)
615 {:error, _, changeset, _} -> {:error, changeset}
619 def update_password_reset_pending(user, value) do
622 |> put_change(:password_reset_pending, value)
623 |> update_and_set_cache()
626 def force_password_reset_async(user) do
627 BackgroundWorker.enqueue("force_password_reset", %{"user_id" => user.id})
630 @spec force_password_reset(User.t()) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
631 def force_password_reset(user), do: update_password_reset_pending(user, true)
633 def register_changeset(struct, params \\ %{}, opts \\ []) do
634 bio_limit = Config.get([:instance, :user_bio_length], 5000)
635 name_limit = Config.get([:instance, :user_name_length], 100)
636 params = Map.put_new(params, :accepts_chat_messages, true)
639 if is_nil(opts[:need_confirmation]) do
640 Config.get([:instance, :account_activation_required])
642 opts[:need_confirmation]
646 |> confirmation_changeset(need_confirmation: need_confirmation?)
654 :password_confirmation,
656 :accepts_chat_messages
658 |> validate_required([:name, :nickname, :password, :password_confirmation])
659 |> validate_confirmation(:password)
660 |> unique_constraint(:email)
661 |> unique_constraint(:nickname)
662 |> validate_exclusion(:nickname, Config.get([User, :restricted_nicknames]))
663 |> validate_format(:nickname, local_nickname_regex())
664 |> validate_format(:email, @email_regex)
665 |> validate_length(:bio, max: bio_limit)
666 |> validate_length(:name, min: 1, max: name_limit)
667 |> maybe_validate_required_email(opts[:external])
670 |> unique_constraint(:ap_id)
671 |> put_following_and_follower_address()
674 def maybe_validate_required_email(changeset, true), do: changeset
676 def maybe_validate_required_email(changeset, _) do
677 if Config.get([:instance, :account_activation_required]) do
678 validate_required(changeset, [:email])
684 defp put_ap_id(changeset) do
685 ap_id = ap_id(%User{nickname: get_field(changeset, :nickname)})
686 put_change(changeset, :ap_id, ap_id)
689 defp put_following_and_follower_address(changeset) do
690 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
693 |> put_change(:follower_address, followers)
696 defp autofollow_users(user) do
697 candidates = Config.get([:instance, :autofollowed_nicknames])
700 User.Query.build(%{nickname: candidates, local: true, deactivated: false})
703 follow_all(user, autofollowed_users)
706 @doc "Inserts provided changeset, performs post-registration actions (confirmation email sending etc.)"
707 def register(%Ecto.Changeset{} = changeset) do
708 with {:ok, user} <- Repo.insert(changeset) do
709 post_register_action(user)
713 def post_register_action(%User{} = user) do
714 with {:ok, user} <- autofollow_users(user),
715 {:ok, user} <- set_cache(user),
716 {:ok, _} <- send_welcome_email(user),
717 {:ok, _} <- send_welcome_message(user),
718 {:ok, _} <- try_send_confirmation_email(user) do
723 def send_welcome_message(user) do
724 if User.WelcomeMessage.enabled?() do
725 User.WelcomeMessage.post_message(user)
732 def send_welcome_email(user) do
733 if User.WelcomeEmail.enabled?() do
734 User.WelcomeEmail.send_email(user)
741 def try_send_confirmation_email(%User{} = user) do
742 if user.confirmation_pending &&
743 Config.get([:instance, :account_activation_required]) do
745 |> Pleroma.Emails.UserEmail.account_confirmation_email()
746 |> Pleroma.Emails.Mailer.deliver_async()
754 def try_send_confirmation_email(users) do
755 Enum.each(users, &try_send_confirmation_email/1)
758 def needs_update?(%User{local: true}), do: false
760 def needs_update?(%User{local: false, last_refreshed_at: nil}), do: true
762 def needs_update?(%User{local: false} = user) do
763 NaiveDateTime.diff(NaiveDateTime.utc_now(), user.last_refreshed_at) >= 86_400
766 def needs_update?(_), do: true
768 @spec maybe_direct_follow(User.t(), User.t()) :: {:ok, User.t()} | {:error, String.t()}
770 # "Locked" (self-locked) users demand explicit authorization of follow requests
771 def maybe_direct_follow(%User{} = follower, %User{local: true, locked: true} = followed) do
772 follow(follower, followed, :follow_pending)
775 def maybe_direct_follow(%User{} = follower, %User{local: true} = followed) do
776 follow(follower, followed)
779 def maybe_direct_follow(%User{} = follower, %User{} = followed) do
780 if not ap_enabled?(followed) do
781 follow(follower, followed)
787 @doc "A mass follow for local users. Respects blocks in both directions but does not create activities."
788 @spec follow_all(User.t(), list(User.t())) :: {atom(), User.t()}
789 def follow_all(follower, followeds) do
791 |> Enum.reject(fn followed -> blocks?(follower, followed) || blocks?(followed, follower) end)
792 |> Enum.each(&follow(follower, &1, :follow_accept))
797 defdelegate following(user), to: FollowingRelationship
799 def follow(%User{} = follower, %User{} = followed, state \\ :follow_accept) do
800 deny_follow_blocked = Config.get([:user, :deny_follow_blocked])
803 followed.deactivated ->
804 {:error, "Could not follow user: #{followed.nickname} is deactivated."}
806 deny_follow_blocked and blocks?(followed, follower) ->
807 {:error, "Could not follow user: #{followed.nickname} blocked you."}
810 FollowingRelationship.follow(follower, followed, state)
812 {:ok, _} = update_follower_count(followed)
815 |> update_following_count()
819 def unfollow(%User{ap_id: ap_id}, %User{ap_id: ap_id}) do
820 {:error, "Not subscribed!"}
823 @spec unfollow(User.t(), User.t()) :: {:ok, User.t(), Activity.t()} | {:error, String.t()}
824 def unfollow(%User{} = follower, %User{} = followed) do
825 case do_unfollow(follower, followed) do
826 {:ok, follower, followed} ->
827 {:ok, follower, Utils.fetch_latest_follow(follower, followed)}
834 @spec do_unfollow(User.t(), User.t()) :: {:ok, User.t(), User.t()} | {:error, String.t()}
835 defp do_unfollow(%User{} = follower, %User{} = followed) do
836 case get_follow_state(follower, followed) do
837 state when state in [:follow_pending, :follow_accept] ->
838 FollowingRelationship.unfollow(follower, followed)
839 {:ok, followed} = update_follower_count(followed)
843 |> update_following_count()
845 {:ok, follower, followed}
848 {:error, "Not subscribed!"}
852 defdelegate following?(follower, followed), to: FollowingRelationship
854 @doc "Returns follow state as Pleroma.FollowingRelationship.State value"
855 def get_follow_state(%User{} = follower, %User{} = following) do
856 following_relationship = FollowingRelationship.get(follower, following)
857 get_follow_state(follower, following, following_relationship)
860 def get_follow_state(
863 following_relationship
865 case {following_relationship, following.local} do
867 case Utils.fetch_latest_follow(follower, following) do
868 %Activity{data: %{"state" => state}} when state in ["pending", "accept"] ->
869 FollowingRelationship.state_to_enum(state)
875 {%{state: state}, _} ->
883 def locked?(%User{} = user) do
888 Repo.get_by(User, id: id)
891 def get_by_ap_id(ap_id) do
892 Repo.get_by(User, ap_id: ap_id)
895 def get_all_by_ap_id(ap_ids) do
896 from(u in __MODULE__,
897 where: u.ap_id in ^ap_ids
902 def get_all_by_ids(ids) do
903 from(u in __MODULE__, where: u.id in ^ids)
907 # This is mostly an SPC migration fix. This guesses the user nickname by taking the last part
908 # of the ap_id and the domain and tries to get that user
909 def get_by_guessed_nickname(ap_id) do
910 domain = URI.parse(ap_id).host
911 name = List.last(String.split(ap_id, "/"))
912 nickname = "#{name}@#{domain}"
914 get_cached_by_nickname(nickname)
917 def set_cache({:ok, user}), do: set_cache(user)
918 def set_cache({:error, err}), do: {:error, err}
920 def set_cache(%User{} = user) do
921 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
922 Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
923 Cachex.put(:user_cache, "friends_ap_ids:#{user.nickname}", get_user_friends_ap_ids(user))
927 def update_and_set_cache(struct, params) do
929 |> update_changeset(params)
930 |> update_and_set_cache()
933 def update_and_set_cache(changeset) do
934 with {:ok, user} <- Repo.update(changeset, stale_error_field: :id) do
939 def get_user_friends_ap_ids(user) do
940 from(u in User.get_friends_query(user), select: u.ap_id)
944 @spec get_cached_user_friends_ap_ids(User.t()) :: [String.t()]
945 def get_cached_user_friends_ap_ids(user) do
946 Cachex.fetch!(:user_cache, "friends_ap_ids:#{user.ap_id}", fn _ ->
947 get_user_friends_ap_ids(user)
951 def invalidate_cache(user) do
952 Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
953 Cachex.del(:user_cache, "nickname:#{user.nickname}")
954 Cachex.del(:user_cache, "friends_ap_ids:#{user.ap_id}")
957 @spec get_cached_by_ap_id(String.t()) :: User.t() | nil
958 def get_cached_by_ap_id(ap_id) do
959 key = "ap_id:#{ap_id}"
961 with {:ok, nil} <- Cachex.get(:user_cache, key),
962 user when not is_nil(user) <- get_by_ap_id(ap_id),
963 {:ok, true} <- Cachex.put(:user_cache, key, user) do
971 def get_cached_by_id(id) do
975 Cachex.fetch!(:user_cache, key, fn _ ->
979 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
980 {:commit, user.ap_id}
986 get_cached_by_ap_id(ap_id)
989 def get_cached_by_nickname(nickname) do
990 key = "nickname:#{nickname}"
992 Cachex.fetch!(:user_cache, key, fn ->
993 case get_or_fetch_by_nickname(nickname) do
994 {:ok, user} -> {:commit, user}
995 {:error, _error} -> {:ignore, nil}
1000 def get_cached_by_nickname_or_id(nickname_or_id, opts \\ []) do
1001 restrict_to_local = Config.get([:instance, :limit_to_local_content])
1004 is_integer(nickname_or_id) or FlakeId.flake_id?(nickname_or_id) ->
1005 get_cached_by_id(nickname_or_id) || get_cached_by_nickname(nickname_or_id)
1007 restrict_to_local == false or not String.contains?(nickname_or_id, "@") ->
1008 get_cached_by_nickname(nickname_or_id)
1010 restrict_to_local == :unauthenticated and match?(%User{}, opts[:for]) ->
1011 get_cached_by_nickname(nickname_or_id)
1018 @spec get_by_nickname(String.t()) :: User.t() | nil
1019 def get_by_nickname(nickname) do
1020 Repo.get_by(User, nickname: nickname) ||
1021 if Regex.match?(~r(@#{Pleroma.Web.Endpoint.host()})i, nickname) do
1022 Repo.get_by(User, nickname: local_nickname(nickname))
1026 def get_by_email(email), do: Repo.get_by(User, email: email)
1028 def get_by_nickname_or_email(nickname_or_email) do
1029 get_by_nickname(nickname_or_email) || get_by_email(nickname_or_email)
1032 def fetch_by_nickname(nickname), do: ActivityPub.make_user_from_nickname(nickname)
1034 def get_or_fetch_by_nickname(nickname) do
1035 with %User{} = user <- get_by_nickname(nickname) do
1039 with [_nick, _domain] <- String.split(nickname, "@"),
1040 {:ok, user} <- fetch_by_nickname(nickname) do
1043 _e -> {:error, "not found " <> nickname}
1048 @spec get_followers_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
1049 def get_followers_query(%User{} = user, nil) do
1050 User.Query.build(%{followers: user, deactivated: false})
1053 def get_followers_query(user, page) do
1055 |> get_followers_query(nil)
1056 |> User.Query.paginate(page, 20)
1059 @spec get_followers_query(User.t()) :: Ecto.Query.t()
1060 def get_followers_query(user), do: get_followers_query(user, nil)
1062 @spec get_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
1063 def get_followers(user, page \\ nil) do
1065 |> get_followers_query(page)
1069 @spec get_external_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
1070 def get_external_followers(user, page \\ nil) do
1072 |> get_followers_query(page)
1073 |> User.Query.build(%{external: true})
1077 def get_followers_ids(user, page \\ nil) do
1079 |> get_followers_query(page)
1080 |> select([u], u.id)
1084 @spec get_friends_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
1085 def get_friends_query(%User{} = user, nil) do
1086 User.Query.build(%{friends: user, deactivated: false})
1089 def get_friends_query(user, page) do
1091 |> get_friends_query(nil)
1092 |> User.Query.paginate(page, 20)
1095 @spec get_friends_query(User.t()) :: Ecto.Query.t()
1096 def get_friends_query(user), do: get_friends_query(user, nil)
1098 def get_friends(user, page \\ nil) do
1100 |> get_friends_query(page)
1104 def get_friends_ap_ids(user) do
1106 |> get_friends_query(nil)
1107 |> select([u], u.ap_id)
1111 def get_friends_ids(user, page \\ nil) do
1113 |> get_friends_query(page)
1114 |> select([u], u.id)
1118 defdelegate get_follow_requests(user), to: FollowingRelationship
1120 def increase_note_count(%User{} = user) do
1122 |> where(id: ^user.id)
1123 |> update([u], inc: [note_count: 1])
1125 |> Repo.update_all([])
1127 {1, [user]} -> set_cache(user)
1132 def decrease_note_count(%User{} = user) do
1134 |> where(id: ^user.id)
1137 note_count: fragment("greatest(0, note_count - 1)")
1141 |> Repo.update_all([])
1143 {1, [user]} -> set_cache(user)
1148 def update_note_count(%User{} = user, note_count \\ nil) do
1153 where: fragment("?->>'actor' = ? and ?->>'type' = 'Note'", a.data, ^user.ap_id, a.data),
1159 |> cast(%{note_count: note_count}, [:note_count])
1160 |> update_and_set_cache()
1163 @spec maybe_fetch_follow_information(User.t()) :: User.t()
1164 def maybe_fetch_follow_information(user) do
1165 with {:ok, user} <- fetch_follow_information(user) do
1169 Logger.error("Follower/Following counter update for #{user.ap_id} failed.\n#{inspect(e)}")
1175 def fetch_follow_information(user) do
1176 with {:ok, info} <- ActivityPub.fetch_follow_information_for_user(user) do
1178 |> follow_information_changeset(info)
1179 |> update_and_set_cache()
1183 defp follow_information_changeset(user, params) do
1190 :hide_followers_count,
1195 @spec update_follower_count(User.t()) :: {:ok, User.t()}
1196 def update_follower_count(%User{} = user) do
1197 if user.local or !Config.get([:instance, :external_user_synchronization]) do
1198 follower_count = FollowingRelationship.follower_count(user)
1201 |> follow_information_changeset(%{follower_count: follower_count})
1202 |> update_and_set_cache
1204 {:ok, maybe_fetch_follow_information(user)}
1208 @spec update_following_count(User.t()) :: {:ok, User.t()}
1209 def update_following_count(%User{local: false} = user) do
1210 if Config.get([:instance, :external_user_synchronization]) do
1211 {:ok, maybe_fetch_follow_information(user)}
1217 def update_following_count(%User{local: true} = user) do
1218 following_count = FollowingRelationship.following_count(user)
1221 |> follow_information_changeset(%{following_count: following_count})
1222 |> update_and_set_cache()
1225 def set_unread_conversation_count(%User{local: true} = user) do
1226 unread_query = Participation.unread_conversation_count_for_user(user)
1229 |> join(:inner, [u], p in subquery(unread_query))
1231 set: [unread_conversation_count: p.count]
1233 |> where([u], u.id == ^user.id)
1235 |> Repo.update_all([])
1237 {1, [user]} -> set_cache(user)
1242 def set_unread_conversation_count(user), do: {:ok, user}
1244 def increment_unread_conversation_count(conversation, %User{local: true} = user) do
1246 Participation.unread_conversation_count_for_user(user)
1247 |> where([p], p.conversation_id == ^conversation.id)
1250 |> join(:inner, [u], p in subquery(unread_query))
1252 inc: [unread_conversation_count: 1]
1254 |> where([u], u.id == ^user.id)
1255 |> where([u, p], p.count == 0)
1257 |> Repo.update_all([])
1259 {1, [user]} -> set_cache(user)
1264 def increment_unread_conversation_count(_, user), do: {:ok, user}
1266 @spec get_users_from_set([String.t()], keyword()) :: [User.t()]
1267 def get_users_from_set(ap_ids, opts \\ []) do
1268 local_only = Keyword.get(opts, :local_only, true)
1269 criteria = %{ap_id: ap_ids, deactivated: false}
1270 criteria = if local_only, do: Map.put(criteria, :local, true), else: criteria
1272 User.Query.build(criteria)
1276 @spec get_recipients_from_activity(Activity.t()) :: [User.t()]
1277 def get_recipients_from_activity(%Activity{recipients: to, actor: actor}) do
1280 query = User.Query.build(%{recipients_from_activity: to, local: true, deactivated: false})
1286 @spec mute(User.t(), User.t(), boolean()) ::
1287 {:ok, list(UserRelationship.t())} | {:error, String.t()}
1288 def mute(%User{} = muter, %User{} = mutee, notifications? \\ true) do
1289 add_to_mutes(muter, mutee, notifications?)
1292 def unmute(%User{} = muter, %User{} = mutee) do
1293 remove_from_mutes(muter, mutee)
1296 def subscribe(%User{} = subscriber, %User{} = target) do
1297 deny_follow_blocked = Config.get([:user, :deny_follow_blocked])
1299 if blocks?(target, subscriber) and deny_follow_blocked do
1300 {:error, "Could not subscribe: #{target.nickname} is blocking you"}
1302 # Note: the relationship is inverse: subscriber acts as relationship target
1303 UserRelationship.create_inverse_subscription(target, subscriber)
1307 def subscribe(%User{} = subscriber, %{ap_id: ap_id}) do
1308 with %User{} = subscribee <- get_cached_by_ap_id(ap_id) do
1309 subscribe(subscriber, subscribee)
1313 def unsubscribe(%User{} = unsubscriber, %User{} = target) do
1314 # Note: the relationship is inverse: subscriber acts as relationship target
1315 UserRelationship.delete_inverse_subscription(target, unsubscriber)
1318 def unsubscribe(%User{} = unsubscriber, %{ap_id: ap_id}) do
1319 with %User{} = user <- get_cached_by_ap_id(ap_id) do
1320 unsubscribe(unsubscriber, user)
1324 def block(%User{} = blocker, %User{} = blocked) do
1325 # sever any follow relationships to prevent leaks per activitypub (Pleroma issue #213)
1327 if following?(blocker, blocked) do
1328 {:ok, blocker, _} = unfollow(blocker, blocked)
1334 # clear any requested follows as well
1336 case CommonAPI.reject_follow_request(blocked, blocker) do
1337 {:ok, %User{} = updated_blocked} -> updated_blocked
1341 unsubscribe(blocked, blocker)
1343 unfollowing_blocked = Config.get([:activitypub, :unfollow_blocked], true)
1344 if unfollowing_blocked && following?(blocked, blocker), do: unfollow(blocked, blocker)
1346 {:ok, blocker} = update_follower_count(blocker)
1347 {:ok, blocker, _} = Participation.mark_all_as_read(blocker, blocked)
1348 add_to_block(blocker, blocked)
1351 # helper to handle the block given only an actor's AP id
1352 def block(%User{} = blocker, %{ap_id: ap_id}) do
1353 block(blocker, get_cached_by_ap_id(ap_id))
1356 def unblock(%User{} = blocker, %User{} = blocked) do
1357 remove_from_block(blocker, blocked)
1360 # helper to handle the block given only an actor's AP id
1361 def unblock(%User{} = blocker, %{ap_id: ap_id}) do
1362 unblock(blocker, get_cached_by_ap_id(ap_id))
1365 def mutes?(nil, _), do: false
1366 def mutes?(%User{} = user, %User{} = target), do: mutes_user?(user, target)
1368 def mutes_user?(%User{} = user, %User{} = target) do
1369 UserRelationship.mute_exists?(user, target)
1372 @spec muted_notifications?(User.t() | nil, User.t() | map()) :: boolean()
1373 def muted_notifications?(nil, _), do: false
1375 def muted_notifications?(%User{} = user, %User{} = target),
1376 do: UserRelationship.notification_mute_exists?(user, target)
1378 def blocks?(nil, _), do: false
1380 def blocks?(%User{} = user, %User{} = target) do
1381 blocks_user?(user, target) ||
1382 (blocks_domain?(user, target) and not User.following?(user, target))
1385 def blocks_user?(%User{} = user, %User{} = target) do
1386 UserRelationship.block_exists?(user, target)
1389 def blocks_user?(_, _), do: false
1391 def blocks_domain?(%User{} = user, %User{} = target) do
1392 domain_blocks = Pleroma.Web.ActivityPub.MRF.subdomains_regex(user.domain_blocks)
1393 %{host: host} = URI.parse(target.ap_id)
1394 Pleroma.Web.ActivityPub.MRF.subdomain_match?(domain_blocks, host)
1397 def blocks_domain?(_, _), do: false
1399 def subscribed_to?(%User{} = user, %User{} = target) do
1400 # Note: the relationship is inverse: subscriber acts as relationship target
1401 UserRelationship.inverse_subscription_exists?(target, user)
1404 def subscribed_to?(%User{} = user, %{ap_id: ap_id}) do
1405 with %User{} = target <- get_cached_by_ap_id(ap_id) do
1406 subscribed_to?(user, target)
1411 Returns map of outgoing (blocked, muted etc.) relationships' user AP IDs by relation type.
1412 E.g. `outgoing_relationships_ap_ids(user, [:block])` -> `%{block: ["https://some.site/users/userapid"]}`
1414 @spec outgoing_relationships_ap_ids(User.t(), list(atom())) :: %{atom() => list(String.t())}
1415 def outgoing_relationships_ap_ids(_user, []), do: %{}
1417 def outgoing_relationships_ap_ids(nil, _relationship_types), do: %{}
1419 def outgoing_relationships_ap_ids(%User{} = user, relationship_types)
1420 when is_list(relationship_types) do
1423 |> assoc(:outgoing_relationships)
1424 |> join(:inner, [user_rel], u in assoc(user_rel, :target))
1425 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1426 |> select([user_rel, u], [user_rel.relationship_type, fragment("array_agg(?)", u.ap_id)])
1427 |> group_by([user_rel, u], user_rel.relationship_type)
1429 |> Enum.into(%{}, fn [k, v] -> {k, v} end)
1434 fn rel_type -> {rel_type, db_result[rel_type] || []} end
1438 def incoming_relationships_ungrouped_ap_ids(user, relationship_types, ap_ids \\ nil)
1440 def incoming_relationships_ungrouped_ap_ids(_user, [], _ap_ids), do: []
1442 def incoming_relationships_ungrouped_ap_ids(nil, _relationship_types, _ap_ids), do: []
1444 def incoming_relationships_ungrouped_ap_ids(%User{} = user, relationship_types, ap_ids)
1445 when is_list(relationship_types) do
1447 |> assoc(:incoming_relationships)
1448 |> join(:inner, [user_rel], u in assoc(user_rel, :source))
1449 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1450 |> maybe_filter_on_ap_id(ap_ids)
1451 |> select([user_rel, u], u.ap_id)
1456 defp maybe_filter_on_ap_id(query, ap_ids) when is_list(ap_ids) do
1457 where(query, [user_rel, u], u.ap_id in ^ap_ids)
1460 defp maybe_filter_on_ap_id(query, _ap_ids), do: query
1462 def deactivate_async(user, status \\ true) do
1463 BackgroundWorker.enqueue("deactivate_user", %{"user_id" => user.id, "status" => status})
1466 def deactivate(user, status \\ true)
1468 def deactivate(users, status) when is_list(users) do
1469 Repo.transaction(fn ->
1470 for user <- users, do: deactivate(user, status)
1474 def deactivate(%User{} = user, status) do
1475 with {:ok, user} <- set_activation_status(user, status) do
1478 |> Enum.filter(& &1.local)
1479 |> Enum.each(&set_cache(update_following_count(&1)))
1481 # Only update local user counts, remote will be update during the next pull.
1484 |> Enum.filter(& &1.local)
1485 |> Enum.each(&do_unfollow(user, &1))
1491 def update_notification_settings(%User{} = user, settings) do
1493 |> cast(%{notification_settings: settings}, [])
1494 |> cast_embed(:notification_settings)
1495 |> validate_required([:notification_settings])
1496 |> update_and_set_cache()
1499 def delete(users) when is_list(users) do
1500 for user <- users, do: delete(user)
1503 def delete(%User{} = user) do
1504 BackgroundWorker.enqueue("delete_user", %{"user_id" => user.id})
1507 defp delete_and_invalidate_cache(%User{} = user) do
1508 invalidate_cache(user)
1512 defp delete_or_deactivate(%User{local: false} = user), do: delete_and_invalidate_cache(user)
1514 defp delete_or_deactivate(%User{local: true} = user) do
1515 status = account_status(user)
1517 if status == :confirmation_pending do
1518 delete_and_invalidate_cache(user)
1521 |> change(%{deactivated: true, email: nil})
1522 |> update_and_set_cache()
1526 def perform(:force_password_reset, user), do: force_password_reset(user)
1528 @spec perform(atom(), User.t()) :: {:ok, User.t()}
1529 def perform(:delete, %User{} = user) do
1530 # Remove all relationships
1533 |> Enum.each(fn follower ->
1534 ActivityPub.unfollow(follower, user)
1535 unfollow(follower, user)
1540 |> Enum.each(fn followed ->
1541 ActivityPub.unfollow(user, followed)
1542 unfollow(user, followed)
1545 delete_user_activities(user)
1546 delete_notifications_from_user_activities(user)
1548 delete_outgoing_pending_follow_requests(user)
1550 delete_or_deactivate(user)
1553 def perform(:deactivate_async, user, status), do: deactivate(user, status)
1555 @spec perform(atom(), User.t(), list()) :: list() | {:error, any()}
1556 def perform(:blocks_import, %User{} = blocker, blocked_identifiers)
1557 when is_list(blocked_identifiers) do
1559 blocked_identifiers,
1560 fn blocked_identifier ->
1561 with {:ok, %User{} = blocked} <- get_or_fetch(blocked_identifier),
1562 {:ok, _block} <- CommonAPI.block(blocker, blocked) do
1566 Logger.debug("blocks_import failed for #{blocked_identifier} with: #{inspect(err)}")
1573 def perform(:follow_import, %User{} = follower, followed_identifiers)
1574 when is_list(followed_identifiers) do
1576 followed_identifiers,
1577 fn followed_identifier ->
1578 with {:ok, %User{} = followed} <- get_or_fetch(followed_identifier),
1579 {:ok, follower} <- maybe_direct_follow(follower, followed),
1580 {:ok, _, _, _} <- CommonAPI.follow(follower, followed) do
1584 Logger.debug("follow_import failed for #{followed_identifier} with: #{inspect(err)}")
1591 @spec external_users_query() :: Ecto.Query.t()
1592 def external_users_query do
1600 @spec external_users(keyword()) :: [User.t()]
1601 def external_users(opts \\ []) do
1603 external_users_query()
1604 |> select([u], struct(u, [:id, :ap_id]))
1608 do: where(query, [u], u.id > ^opts[:max_id]),
1613 do: limit(query, ^opts[:limit]),
1619 def blocks_import(%User{} = blocker, blocked_identifiers) when is_list(blocked_identifiers) do
1620 BackgroundWorker.enqueue("blocks_import", %{
1621 "blocker_id" => blocker.id,
1622 "blocked_identifiers" => blocked_identifiers
1626 def follow_import(%User{} = follower, followed_identifiers)
1627 when is_list(followed_identifiers) do
1628 BackgroundWorker.enqueue("follow_import", %{
1629 "follower_id" => follower.id,
1630 "followed_identifiers" => followed_identifiers
1634 def delete_notifications_from_user_activities(%User{ap_id: ap_id}) do
1636 |> join(:inner, [n], activity in assoc(n, :activity))
1637 |> where([n, a], fragment("? = ?", a.actor, ^ap_id))
1638 |> Repo.delete_all()
1641 def delete_user_activities(%User{ap_id: ap_id} = user) do
1643 |> Activity.Queries.by_actor()
1644 |> RepoStreamer.chunk_stream(50)
1645 |> Stream.each(fn activities ->
1646 Enum.each(activities, fn activity -> delete_activity(activity, user) end)
1651 defp delete_activity(%{data: %{"type" => "Create", "object" => object}} = activity, user) do
1652 with {_, %Object{}} <- {:find_object, Object.get_by_ap_id(object)},
1653 {:ok, delete_data, _} <- Builder.delete(user, object) do
1654 Pipeline.common_pipeline(delete_data, local: user.local)
1656 {:find_object, nil} ->
1657 # We have the create activity, but not the object, it was probably pruned.
1658 # Insert a tombstone and try again
1659 with {:ok, tombstone_data, _} <- Builder.tombstone(user.ap_id, object),
1660 {:ok, _tombstone} <- Object.create(tombstone_data) do
1661 delete_activity(activity, user)
1665 Logger.error("Could not delete #{object} created by #{activity.data["ap_id"]}")
1666 Logger.error("Error: #{inspect(e)}")
1670 defp delete_activity(%{data: %{"type" => type}} = activity, user)
1671 when type in ["Like", "Announce"] do
1672 {:ok, undo, _} = Builder.undo(user, activity)
1673 Pipeline.common_pipeline(undo, local: user.local)
1676 defp delete_activity(_activity, _user), do: "Doing nothing"
1678 defp delete_outgoing_pending_follow_requests(user) do
1680 |> FollowingRelationship.outgoing_pending_follow_requests_query()
1681 |> Repo.delete_all()
1684 def html_filter_policy(%User{no_rich_text: true}) do
1685 Pleroma.HTML.Scrubber.TwitterText
1688 def html_filter_policy(_), do: Config.get([:markup, :scrub_policy])
1690 def fetch_by_ap_id(ap_id), do: ActivityPub.make_user_from_ap_id(ap_id)
1692 def get_or_fetch_by_ap_id(ap_id) do
1693 cached_user = get_cached_by_ap_id(ap_id)
1695 maybe_fetched_user = needs_update?(cached_user) && fetch_by_ap_id(ap_id)
1697 case {cached_user, maybe_fetched_user} do
1698 {_, {:ok, %User{} = user}} ->
1701 {%User{} = user, _} ->
1705 {:error, :not_found}
1710 Creates an internal service actor by URI if missing.
1711 Optionally takes nickname for addressing.
1713 @spec get_or_create_service_actor_by_ap_id(String.t(), String.t()) :: User.t() | nil
1714 def get_or_create_service_actor_by_ap_id(uri, nickname) do
1716 case get_cached_by_ap_id(uri) do
1718 with {:error, %{errors: errors}} <- create_service_actor(uri, nickname) do
1719 Logger.error("Cannot create service actor: #{uri}/.\n#{inspect(errors)}")
1723 %User{invisible: false} = user ->
1733 @spec set_invisible(User.t()) :: {:ok, User.t()}
1734 defp set_invisible(user) do
1736 |> change(%{invisible: true})
1737 |> update_and_set_cache()
1740 @spec create_service_actor(String.t(), String.t()) ::
1741 {:ok, User.t()} | {:error, Ecto.Changeset.t()}
1742 defp create_service_actor(uri, nickname) do
1748 follower_address: uri <> "/followers"
1751 |> unique_constraint(:nickname)
1756 def public_key(%{public_key: public_key_pem}) when is_binary(public_key_pem) do
1759 |> :public_key.pem_decode()
1761 |> :public_key.pem_entry_decode()
1766 def public_key(_), do: {:error, "key not found"}
1768 def get_public_key_for_ap_id(ap_id) do
1769 with {:ok, %User{} = user} <- get_or_fetch_by_ap_id(ap_id),
1770 {:ok, public_key} <- public_key(user) do
1777 def ap_enabled?(%User{local: true}), do: true
1778 def ap_enabled?(%User{ap_enabled: ap_enabled}), do: ap_enabled
1779 def ap_enabled?(_), do: false
1781 @doc "Gets or fetch a user by uri or nickname."
1782 @spec get_or_fetch(String.t()) :: {:ok, User.t()} | {:error, String.t()}
1783 def get_or_fetch("http" <> _host = uri), do: get_or_fetch_by_ap_id(uri)
1784 def get_or_fetch(nickname), do: get_or_fetch_by_nickname(nickname)
1786 # wait a period of time and return newest version of the User structs
1787 # this is because we have synchronous follow APIs and need to simulate them
1788 # with an async handshake
1789 def wait_and_refresh(_, %User{local: true} = a, %User{local: true} = b) do
1790 with %User{} = a <- get_cached_by_id(a.id),
1791 %User{} = b <- get_cached_by_id(b.id) do
1798 def wait_and_refresh(timeout, %User{} = a, %User{} = b) do
1799 with :ok <- :timer.sleep(timeout),
1800 %User{} = a <- get_cached_by_id(a.id),
1801 %User{} = b <- get_cached_by_id(b.id) do
1808 def parse_bio(bio) when is_binary(bio) and bio != "" do
1810 |> CommonUtils.format_input("text/plain", mentions_format: :full)
1814 def parse_bio(_), do: ""
1816 def parse_bio(bio, user) when is_binary(bio) and bio != "" do
1817 # TODO: get profile URLs other than user.ap_id
1818 profile_urls = [user.ap_id]
1821 |> CommonUtils.format_input("text/plain",
1822 mentions_format: :full,
1823 rel: &RelMe.maybe_put_rel_me(&1, profile_urls)
1828 def parse_bio(_, _), do: ""
1830 def tag(user_identifiers, tags) when is_list(user_identifiers) do
1831 Repo.transaction(fn ->
1832 for user_identifier <- user_identifiers, do: tag(user_identifier, tags)
1836 def tag(nickname, tags) when is_binary(nickname),
1837 do: tag(get_by_nickname(nickname), tags)
1839 def tag(%User{} = user, tags),
1840 do: update_tags(user, Enum.uniq((user.tags || []) ++ normalize_tags(tags)))
1842 def untag(user_identifiers, tags) when is_list(user_identifiers) do
1843 Repo.transaction(fn ->
1844 for user_identifier <- user_identifiers, do: untag(user_identifier, tags)
1848 def untag(nickname, tags) when is_binary(nickname),
1849 do: untag(get_by_nickname(nickname), tags)
1851 def untag(%User{} = user, tags),
1852 do: update_tags(user, (user.tags || []) -- normalize_tags(tags))
1854 defp update_tags(%User{} = user, new_tags) do
1855 {:ok, updated_user} =
1857 |> change(%{tags: new_tags})
1858 |> update_and_set_cache()
1863 defp normalize_tags(tags) do
1866 |> Enum.map(&String.downcase/1)
1869 defp local_nickname_regex do
1870 if Config.get([:instance, :extended_nickname_format]) do
1871 @extended_local_nickname_regex
1873 @strict_local_nickname_regex
1877 def local_nickname(nickname_or_mention) do
1880 |> String.split("@")
1884 def full_nickname(nickname_or_mention),
1885 do: String.trim_leading(nickname_or_mention, "@")
1887 def error_user(ap_id) do
1891 nickname: "erroruser@example.com",
1892 inserted_at: NaiveDateTime.utc_now()
1896 @spec all_superusers() :: [User.t()]
1897 def all_superusers do
1898 User.Query.build(%{super_users: true, local: true, deactivated: false})
1902 def muting_reblogs?(%User{} = user, %User{} = target) do
1903 UserRelationship.reblog_mute_exists?(user, target)
1906 def showing_reblogs?(%User{} = user, %User{} = target) do
1907 not muting_reblogs?(user, target)
1911 The function returns a query to get users with no activity for given interval of days.
1912 Inactive users are those who didn't read any notification, or had any activity where
1913 the user is the activity's actor, during `inactivity_threshold` days.
1914 Deactivated users will not appear in this list.
1918 iex> Pleroma.User.list_inactive_users()
1921 @spec list_inactive_users_query(integer()) :: Ecto.Query.t()
1922 def list_inactive_users_query(inactivity_threshold \\ 7) do
1923 negative_inactivity_threshold = -inactivity_threshold
1924 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1925 # Subqueries are not supported in `where` clauses, join gets too complicated.
1926 has_read_notifications =
1927 from(n in Pleroma.Notification,
1928 where: n.seen == true,
1930 having: max(n.updated_at) > datetime_add(^now, ^negative_inactivity_threshold, "day"),
1933 |> Pleroma.Repo.all()
1935 from(u in Pleroma.User,
1936 left_join: a in Pleroma.Activity,
1937 on: u.ap_id == a.actor,
1938 where: not is_nil(u.nickname),
1939 where: u.deactivated != ^true,
1940 where: u.id not in ^has_read_notifications,
1943 max(a.inserted_at) < datetime_add(^now, ^negative_inactivity_threshold, "day") or
1944 is_nil(max(a.inserted_at))
1949 Enable or disable email notifications for user
1953 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => false}}, "digest", true)
1954 Pleroma.User{email_notifications: %{"digest" => true}}
1956 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => true}}, "digest", false)
1957 Pleroma.User{email_notifications: %{"digest" => false}}
1959 @spec switch_email_notifications(t(), String.t(), boolean()) ::
1960 {:ok, t()} | {:error, Ecto.Changeset.t()}
1961 def switch_email_notifications(user, type, status) do
1962 User.update_email_notifications(user, %{type => status})
1966 Set `last_digest_emailed_at` value for the user to current time
1968 @spec touch_last_digest_emailed_at(t()) :: t()
1969 def touch_last_digest_emailed_at(user) do
1970 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1972 {:ok, updated_user} =
1974 |> change(%{last_digest_emailed_at: now})
1975 |> update_and_set_cache()
1980 @spec toggle_confirmation(User.t()) :: {:ok, User.t()} | {:error, Changeset.t()}
1981 def toggle_confirmation(%User{} = user) do
1983 |> confirmation_changeset(need_confirmation: !user.confirmation_pending)
1984 |> update_and_set_cache()
1987 @spec toggle_confirmation([User.t()]) :: [{:ok, User.t()} | {:error, Changeset.t()}]
1988 def toggle_confirmation(users) do
1989 Enum.map(users, &toggle_confirmation/1)
1992 def get_mascot(%{mascot: %{} = mascot}) when not is_nil(mascot) do
1996 def get_mascot(%{mascot: mascot}) when is_nil(mascot) do
1997 # use instance-default
1998 config = Config.get([:assets, :mascots])
1999 default_mascot = Config.get([:assets, :default_mascot])
2000 mascot = Keyword.get(config, default_mascot)
2003 "id" => "default-mascot",
2004 "url" => mascot[:url],
2005 "preview_url" => mascot[:url],
2007 "mime_type" => mascot[:mime_type]
2012 def ensure_keys_present(%{keys: keys} = user) when not is_nil(keys), do: {:ok, user}
2014 def ensure_keys_present(%User{} = user) do
2015 with {:ok, pem} <- Keys.generate_rsa_pem() do
2017 |> cast(%{keys: pem}, [:keys])
2018 |> validate_required([:keys])
2019 |> update_and_set_cache()
2023 def get_ap_ids_by_nicknames(nicknames) do
2025 where: u.nickname in ^nicknames,
2031 defdelegate search(query, opts \\ []), to: User.Search
2033 defp put_password_hash(
2034 %Ecto.Changeset{valid?: true, changes: %{password: password}} = changeset
2036 change(changeset, password_hash: Pbkdf2.hash_pwd_salt(password))
2039 defp put_password_hash(changeset), do: changeset
2041 def is_internal_user?(%User{nickname: nil}), do: true
2042 def is_internal_user?(%User{local: true, nickname: "internal." <> _}), do: true
2043 def is_internal_user?(_), do: false
2045 # A hack because user delete activities have a fake id for whatever reason
2046 # TODO: Get rid of this
2047 def get_delivered_users_by_object_id("pleroma:fake_object_id"), do: []
2049 def get_delivered_users_by_object_id(object_id) do
2051 inner_join: delivery in assoc(u, :deliveries),
2052 where: delivery.object_id == ^object_id
2057 def change_email(user, email) do
2059 |> cast(%{email: email}, [:email])
2060 |> validate_required([:email])
2061 |> unique_constraint(:email)
2062 |> validate_format(:email, @email_regex)
2063 |> update_and_set_cache()
2066 # Internal function; public one is `deactivate/2`
2067 defp set_activation_status(user, deactivated) do
2069 |> cast(%{deactivated: deactivated}, [:deactivated])
2070 |> update_and_set_cache()
2073 def update_banner(user, banner) do
2075 |> cast(%{banner: banner}, [:banner])
2076 |> update_and_set_cache()
2079 def update_background(user, background) do
2081 |> cast(%{background: background}, [:background])
2082 |> update_and_set_cache()
2085 def roles(%{is_moderator: is_moderator, is_admin: is_admin}) do
2088 moderator: is_moderator
2092 def validate_fields(changeset, remote? \\ false) do
2093 limit_name = if remote?, do: :max_remote_account_fields, else: :max_account_fields
2094 limit = Config.get([:instance, limit_name], 0)
2097 |> validate_length(:fields, max: limit)
2098 |> validate_change(:fields, fn :fields, fields ->
2099 if Enum.all?(fields, &valid_field?/1) do
2107 defp valid_field?(%{"name" => name, "value" => value}) do
2108 name_limit = Config.get([:instance, :account_field_name_length], 255)
2109 value_limit = Config.get([:instance, :account_field_value_length], 255)
2111 is_binary(name) && is_binary(value) && String.length(name) <= name_limit &&
2112 String.length(value) <= value_limit
2115 defp valid_field?(_), do: false
2117 defp truncate_field(%{"name" => name, "value" => value}) do
2119 String.split_at(name, Config.get([:instance, :account_field_name_length], 255))
2122 String.split_at(value, Config.get([:instance, :account_field_value_length], 255))
2124 %{"name" => name, "value" => value}
2127 def admin_api_update(user, params) do
2134 |> update_and_set_cache()
2137 @doc "Signs user out of all applications"
2138 def global_sign_out(user) do
2139 OAuth.Authorization.delete_user_authorizations(user)
2140 OAuth.Token.delete_user_tokens(user)
2143 def mascot_update(user, url) do
2145 |> cast(%{mascot: url}, [:mascot])
2146 |> validate_required([:mascot])
2147 |> update_and_set_cache()
2150 def mastodon_settings_update(user, settings) do
2152 |> cast(%{mastofe_settings: settings}, [:mastofe_settings])
2153 |> validate_required([:mastofe_settings])
2154 |> update_and_set_cache()
2157 @spec confirmation_changeset(User.t(), keyword()) :: Changeset.t()
2158 def confirmation_changeset(user, need_confirmation: need_confirmation?) do
2160 if need_confirmation? do
2162 confirmation_pending: true,
2163 confirmation_token: :crypto.strong_rand_bytes(32) |> Base.url_encode64()
2167 confirmation_pending: false,
2168 confirmation_token: nil
2172 cast(user, params, [:confirmation_pending, :confirmation_token])
2175 def add_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2176 if id not in user.pinned_activities do
2177 max_pinned_statuses = Config.get([:instance, :max_pinned_statuses], 0)
2178 params = %{pinned_activities: user.pinned_activities ++ [id]}
2181 |> cast(params, [:pinned_activities])
2182 |> validate_length(:pinned_activities,
2183 max: max_pinned_statuses,
2184 message: "You have already pinned the maximum number of statuses"
2189 |> update_and_set_cache()
2192 def remove_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2193 params = %{pinned_activities: List.delete(user.pinned_activities, id)}
2196 |> cast(params, [:pinned_activities])
2197 |> update_and_set_cache()
2200 def update_email_notifications(user, settings) do
2201 email_notifications =
2202 user.email_notifications
2203 |> Map.merge(settings)
2204 |> Map.take(["digest"])
2206 params = %{email_notifications: email_notifications}
2207 fields = [:email_notifications]
2210 |> cast(params, fields)
2211 |> validate_required(fields)
2212 |> update_and_set_cache()
2215 defp set_domain_blocks(user, domain_blocks) do
2216 params = %{domain_blocks: domain_blocks}
2219 |> cast(params, [:domain_blocks])
2220 |> validate_required([:domain_blocks])
2221 |> update_and_set_cache()
2224 def block_domain(user, domain_blocked) do
2225 set_domain_blocks(user, Enum.uniq([domain_blocked | user.domain_blocks]))
2228 def unblock_domain(user, domain_blocked) do
2229 set_domain_blocks(user, List.delete(user.domain_blocks, domain_blocked))
2232 @spec add_to_block(User.t(), User.t()) ::
2233 {:ok, UserRelationship.t()} | {:error, Ecto.Changeset.t()}
2234 defp add_to_block(%User{} = user, %User{} = blocked) do
2235 UserRelationship.create_block(user, blocked)
2238 @spec add_to_block(User.t(), User.t()) ::
2239 {:ok, UserRelationship.t()} | {:ok, nil} | {:error, Ecto.Changeset.t()}
2240 defp remove_from_block(%User{} = user, %User{} = blocked) do
2241 UserRelationship.delete_block(user, blocked)
2244 defp add_to_mutes(%User{} = user, %User{} = muted_user, notifications?) do
2245 with {:ok, user_mute} <- UserRelationship.create_mute(user, muted_user),
2246 {:ok, user_notification_mute} <-
2247 (notifications? && UserRelationship.create_notification_mute(user, muted_user)) ||
2249 {:ok, Enum.filter([user_mute, user_notification_mute], & &1)}
2253 defp remove_from_mutes(user, %User{} = muted_user) do
2254 with {:ok, user_mute} <- UserRelationship.delete_mute(user, muted_user),
2255 {:ok, user_notification_mute} <-
2256 UserRelationship.delete_notification_mute(user, muted_user) do
2257 {:ok, [user_mute, user_notification_mute]}
2261 def set_invisible(user, invisible) do
2262 params = %{invisible: invisible}
2265 |> cast(params, [:invisible])
2266 |> validate_required([:invisible])
2267 |> update_and_set_cache()
2270 def sanitize_html(%User{} = user) do
2271 sanitize_html(user, nil)
2274 # User data that mastodon isn't filtering (treated as plaintext):
2277 def sanitize_html(%User{} = user, filter) do
2279 Enum.map(user.fields, fn %{"name" => name, "value" => value} ->
2282 "value" => HTML.filter_tags(value, Pleroma.HTML.Scrubber.LinksOnly)
2287 |> Map.put(:bio, HTML.filter_tags(user.bio, filter))
2288 |> Map.put(:fields, fields)