1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.User do
10 import Ecto, only: [assoc: 2]
13 alias Pleroma.Activity
15 alias Pleroma.Conversation.Participation
16 alias Pleroma.Delivery
17 alias Pleroma.EctoType.ActivityPub.ObjectValidators
19 alias Pleroma.FollowingRelationship
20 alias Pleroma.Formatter
24 alias Pleroma.Notification
26 alias Pleroma.Registration
28 alias Pleroma.RepoStreamer
30 alias Pleroma.UserRelationship
32 alias Pleroma.Web.ActivityPub.ActivityPub
33 alias Pleroma.Web.ActivityPub.Builder
34 alias Pleroma.Web.ActivityPub.Pipeline
35 alias Pleroma.Web.ActivityPub.Utils
36 alias Pleroma.Web.CommonAPI
37 alias Pleroma.Web.CommonAPI.Utils, as: CommonUtils
38 alias Pleroma.Web.OAuth
39 alias Pleroma.Web.RelMe
40 alias Pleroma.Workers.BackgroundWorker
44 @type t :: %__MODULE__{}
45 @type account_status :: :active | :deactivated | :password_reset_pending | :confirmation_pending
46 @primary_key {:id, FlakeId.Ecto.CompatType, autogenerate: true}
48 # credo:disable-for-next-line Credo.Check.Readability.MaxLineLength
49 @email_regex ~r/^[a-zA-Z0-9.!#$%&'*+\/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/
51 @strict_local_nickname_regex ~r/^[a-zA-Z\d]+$/
52 @extended_local_nickname_regex ~r/^[a-zA-Z\d_-]+$/
54 # AP ID user relationships (blocks, mutes etc.)
55 # Format: [rel_type: [outgoing_rel: :outgoing_rel_target, incoming_rel: :incoming_rel_source]]
56 @user_relationships_config [
58 blocker_blocks: :blocked_users,
59 blockee_blocks: :blocker_users
62 muter_mutes: :muted_users,
63 mutee_mutes: :muter_users
66 reblog_muter_mutes: :reblog_muted_users,
67 reblog_mutee_mutes: :reblog_muter_users
70 notification_muter_mutes: :notification_muted_users,
71 notification_mutee_mutes: :notification_muter_users
73 # Note: `inverse_subscription` relationship is inverse: subscriber acts as relationship target
74 inverse_subscription: [
75 subscribee_subscriptions: :subscriber_users,
76 subscriber_subscriptions: :subscribee_users
82 field(:raw_bio, :string)
83 field(:email, :string)
85 field(:nickname, :string)
86 field(:password_hash, :string)
87 field(:password, :string, virtual: true)
88 field(:password_confirmation, :string, virtual: true)
90 field(:public_key, :string)
91 field(:ap_id, :string)
92 field(:avatar, :map, default: %{})
93 field(:local, :boolean, default: true)
94 field(:follower_address, :string)
95 field(:following_address, :string)
96 field(:search_rank, :float, virtual: true)
97 field(:search_type, :integer, virtual: true)
98 field(:tags, {:array, :string}, default: [])
99 field(:last_refreshed_at, :naive_datetime_usec)
100 field(:last_digest_emailed_at, :naive_datetime)
101 field(:banner, :map, default: %{})
102 field(:background, :map, default: %{})
103 field(:note_count, :integer, default: 0)
104 field(:follower_count, :integer, default: 0)
105 field(:following_count, :integer, default: 0)
106 field(:locked, :boolean, default: false)
107 field(:confirmation_pending, :boolean, default: false)
108 field(:password_reset_pending, :boolean, default: false)
109 field(:confirmation_token, :string, default: nil)
110 field(:default_scope, :string, default: "public")
111 field(:domain_blocks, {:array, :string}, default: [])
112 field(:deactivated, :boolean, default: false)
113 field(:no_rich_text, :boolean, default: false)
114 field(:ap_enabled, :boolean, default: false)
115 field(:is_moderator, :boolean, default: false)
116 field(:is_admin, :boolean, default: false)
117 field(:show_role, :boolean, default: true)
118 field(:mastofe_settings, :map, default: nil)
119 field(:uri, ObjectValidators.Uri, default: nil)
120 field(:hide_followers_count, :boolean, default: false)
121 field(:hide_follows_count, :boolean, default: false)
122 field(:hide_followers, :boolean, default: false)
123 field(:hide_follows, :boolean, default: false)
124 field(:hide_favorites, :boolean, default: true)
125 field(:unread_conversation_count, :integer, default: 0)
126 field(:pinned_activities, {:array, :string}, default: [])
127 field(:email_notifications, :map, default: %{"digest" => false})
128 field(:mascot, :map, default: nil)
129 field(:emoji, :map, default: %{})
130 field(:pleroma_settings_store, :map, default: %{})
131 field(:fields, {:array, :map}, default: [])
132 field(:raw_fields, {:array, :map}, default: [])
133 field(:discoverable, :boolean, default: false)
134 field(:invisible, :boolean, default: false)
135 field(:allow_following_move, :boolean, default: true)
136 field(:skip_thread_containment, :boolean, default: false)
137 field(:actor_type, :string, default: "Person")
138 field(:also_known_as, {:array, :string}, default: [])
139 field(:inbox, :string)
140 field(:shared_inbox, :string)
141 field(:accepts_chat_messages, :boolean, default: nil)
144 :notification_settings,
145 Pleroma.User.NotificationSetting,
149 has_many(:notifications, Notification)
150 has_many(:registrations, Registration)
151 has_many(:deliveries, Delivery)
153 has_many(:outgoing_relationships, UserRelationship, foreign_key: :source_id)
154 has_many(:incoming_relationships, UserRelationship, foreign_key: :target_id)
156 for {relationship_type,
158 {outgoing_relation, outgoing_relation_target},
159 {incoming_relation, incoming_relation_source}
160 ]} <- @user_relationships_config do
161 # Definitions of `has_many` relations: :blocker_blocks, :muter_mutes, :reblog_muter_mutes,
162 # :notification_muter_mutes, :subscribee_subscriptions
163 has_many(outgoing_relation, UserRelationship,
164 foreign_key: :source_id,
165 where: [relationship_type: relationship_type]
168 # Definitions of `has_many` relations: :blockee_blocks, :mutee_mutes, :reblog_mutee_mutes,
169 # :notification_mutee_mutes, :subscriber_subscriptions
170 has_many(incoming_relation, UserRelationship,
171 foreign_key: :target_id,
172 where: [relationship_type: relationship_type]
175 # Definitions of `has_many` relations: :blocked_users, :muted_users, :reblog_muted_users,
176 # :notification_muted_users, :subscriber_users
177 has_many(outgoing_relation_target, through: [outgoing_relation, :target])
179 # Definitions of `has_many` relations: :blocker_users, :muter_users, :reblog_muter_users,
180 # :notification_muter_users, :subscribee_users
181 has_many(incoming_relation_source, through: [incoming_relation, :source])
184 # `:blocks` is deprecated (replaced with `blocked_users` relation)
185 field(:blocks, {:array, :string}, default: [])
186 # `:mutes` is deprecated (replaced with `muted_users` relation)
187 field(:mutes, {:array, :string}, default: [])
188 # `:muted_reblogs` is deprecated (replaced with `reblog_muted_users` relation)
189 field(:muted_reblogs, {:array, :string}, default: [])
190 # `:muted_notifications` is deprecated (replaced with `notification_muted_users` relation)
191 field(:muted_notifications, {:array, :string}, default: [])
192 # `:subscribers` is deprecated (replaced with `subscriber_users` relation)
193 field(:subscribers, {:array, :string}, default: [])
196 :multi_factor_authentication_settings,
204 for {_relationship_type, [{_outgoing_relation, outgoing_relation_target}, _]} <-
205 @user_relationships_config do
206 # `def blocked_users_relation/2`, `def muted_users_relation/2`,
207 # `def reblog_muted_users_relation/2`, `def notification_muted_users/2`,
208 # `def subscriber_users/2`
209 def unquote(:"#{outgoing_relation_target}_relation")(user, restrict_deactivated? \\ false) do
210 target_users_query = assoc(user, unquote(outgoing_relation_target))
212 if restrict_deactivated? do
213 restrict_deactivated(target_users_query)
219 # `def blocked_users/2`, `def muted_users/2`, `def reblog_muted_users/2`,
220 # `def notification_muted_users/2`, `def subscriber_users/2`
221 def unquote(outgoing_relation_target)(user, restrict_deactivated? \\ false) do
223 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
225 restrict_deactivated?
230 # `def blocked_users_ap_ids/2`, `def muted_users_ap_ids/2`, `def reblog_muted_users_ap_ids/2`,
231 # `def notification_muted_users_ap_ids/2`, `def subscriber_users_ap_ids/2`
232 def unquote(:"#{outgoing_relation_target}_ap_ids")(user, restrict_deactivated? \\ false) do
234 |> apply(unquote(:"#{outgoing_relation_target}_relation"), [
236 restrict_deactivated?
238 |> select([u], u.ap_id)
244 Dumps Flake Id to SQL-compatible format (16-byte UUID).
245 E.g. "9pQtDGXuq4p3VlcJEm" -> <<0, 0, 1, 110, 179, 218, 42, 92, 213, 41, 44, 227, 95, 213, 0, 0>>
247 def binary_id(source_id) when is_binary(source_id) do
248 with {:ok, dumped_id} <- FlakeId.Ecto.CompatType.dump(source_id) do
255 def binary_id(source_ids) when is_list(source_ids) do
256 Enum.map(source_ids, &binary_id/1)
259 def binary_id(%User{} = user), do: binary_id(user.id)
261 @doc "Returns status account"
262 @spec account_status(User.t()) :: account_status()
263 def account_status(%User{deactivated: true}), do: :deactivated
264 def account_status(%User{password_reset_pending: true}), do: :password_reset_pending
266 def account_status(%User{confirmation_pending: true}) do
267 if Config.get([:instance, :account_activation_required]) do
268 :confirmation_pending
274 def account_status(%User{}), do: :active
276 @spec visible_for(User.t(), User.t() | nil) ::
279 | :restricted_unauthenticated
281 | :confirmation_pending
282 def visible_for(user, for_user \\ nil)
284 def visible_for(%User{invisible: true}, _), do: :invisible
286 def visible_for(%User{id: user_id}, %User{id: user_id}), do: :visible
288 def visible_for(%User{} = user, nil) do
289 if restrict_unauthenticated?(user) do
290 :restrict_unauthenticated
292 visible_account_status(user)
296 def visible_for(%User{} = user, for_user) do
297 if superuser?(for_user) do
300 visible_account_status(user)
304 def visible_for(_, _), do: :invisible
306 defp restrict_unauthenticated?(%User{local: local}) do
307 config_key = if local, do: :local, else: :remote
309 Config.get([:restrict_unauthenticated, :profiles, config_key], false)
312 defp visible_account_status(user) do
313 status = account_status(user)
315 if status in [:active, :password_reset_pending] do
322 @spec superuser?(User.t()) :: boolean()
323 def superuser?(%User{local: true, is_admin: true}), do: true
324 def superuser?(%User{local: true, is_moderator: true}), do: true
325 def superuser?(_), do: false
327 @spec invisible?(User.t()) :: boolean()
328 def invisible?(%User{invisible: true}), do: true
329 def invisible?(_), do: false
331 def avatar_url(user, options \\ []) do
333 %{"url" => [%{"href" => href} | _]} ->
337 unless options[:no_default] do
338 Config.get([:assets, :default_user_avatar], "#{Web.base_url()}/images/avi.png")
343 def banner_url(user, options \\ []) do
345 %{"url" => [%{"href" => href} | _]} -> href
346 _ -> !options[:no_default] && "#{Web.base_url()}/images/banner.png"
350 # Should probably be renamed or removed
351 def ap_id(%User{nickname: nickname}), do: "#{Web.base_url()}/users/#{nickname}"
353 def ap_followers(%User{follower_address: fa}) when is_binary(fa), do: fa
354 def ap_followers(%User{} = user), do: "#{ap_id(user)}/followers"
356 @spec ap_following(User.t()) :: String.t()
357 def ap_following(%User{following_address: fa}) when is_binary(fa), do: fa
358 def ap_following(%User{} = user), do: "#{ap_id(user)}/following"
360 @spec restrict_deactivated(Ecto.Query.t()) :: Ecto.Query.t()
361 def restrict_deactivated(query) do
362 from(u in query, where: u.deactivated != ^true)
365 defdelegate following_count(user), to: FollowingRelationship
367 defp truncate_fields_param(params) do
368 if Map.has_key?(params, :fields) do
369 Map.put(params, :fields, Enum.map(params[:fields], &truncate_field/1))
375 defp truncate_if_exists(params, key, max_length) do
376 if Map.has_key?(params, key) and is_binary(params[key]) do
377 {value, _chopped} = String.split_at(params[key], max_length)
378 Map.put(params, key, value)
384 defp fix_follower_address(%{follower_address: _, following_address: _} = params), do: params
386 defp fix_follower_address(%{nickname: nickname} = params),
387 do: Map.put(params, :follower_address, ap_followers(%User{nickname: nickname}))
389 defp fix_follower_address(params), do: params
391 def remote_user_changeset(struct \\ %User{local: false}, params) do
392 bio_limit = Config.get([:instance, :user_bio_length], 5000)
393 name_limit = Config.get([:instance, :user_name_length], 100)
396 case params[:name] do
397 name when is_binary(name) and byte_size(name) > 0 -> name
398 _ -> params[:nickname]
403 |> Map.put(:name, name)
404 |> Map.put_new(:last_refreshed_at, NaiveDateTime.utc_now())
405 |> truncate_if_exists(:name, name_limit)
406 |> truncate_if_exists(:bio, bio_limit)
407 |> truncate_fields_param()
408 |> fix_follower_address()
432 :hide_followers_count,
441 :accepts_chat_messages
444 |> validate_required([:name, :ap_id])
445 |> unique_constraint(:nickname)
446 |> validate_format(:nickname, @email_regex)
447 |> validate_length(:bio, max: bio_limit)
448 |> validate_length(:name, max: name_limit)
449 |> validate_fields(true)
452 def update_changeset(struct, params \\ %{}) do
453 bio_limit = Config.get([:instance, :user_bio_length], 5000)
454 name_limit = Config.get([:instance, :user_name_length], 100)
474 :hide_followers_count,
477 :allow_following_move,
480 :skip_thread_containment,
483 :pleroma_settings_store,
487 :accepts_chat_messages
490 |> unique_constraint(:nickname)
491 |> validate_format(:nickname, local_nickname_regex())
492 |> validate_length(:bio, max: bio_limit)
493 |> validate_length(:name, min: 1, max: name_limit)
494 |> validate_inclusion(:actor_type, ["Person", "Service"])
497 |> put_change_if_present(:bio, &{:ok, parse_bio(&1, struct)})
498 |> put_change_if_present(:avatar, &put_upload(&1, :avatar))
499 |> put_change_if_present(:banner, &put_upload(&1, :banner))
500 |> put_change_if_present(:background, &put_upload(&1, :background))
501 |> put_change_if_present(
502 :pleroma_settings_store,
503 &{:ok, Map.merge(struct.pleroma_settings_store, &1)}
505 |> validate_fields(false)
508 defp put_fields(changeset) do
509 if raw_fields = get_change(changeset, :raw_fields) do
512 |> Enum.filter(fn %{"name" => n} -> n != "" end)
516 |> Enum.map(fn f -> Map.update!(f, "value", &parse_fields(&1)) end)
519 |> put_change(:raw_fields, raw_fields)
520 |> put_change(:fields, fields)
526 defp parse_fields(value) do
528 |> Formatter.linkify(mentions_format: :full)
532 defp put_emoji(changeset) do
533 bio = get_change(changeset, :bio)
534 name = get_change(changeset, :name)
537 emoji = Map.merge(Emoji.Formatter.get_emoji_map(bio), Emoji.Formatter.get_emoji_map(name))
538 put_change(changeset, :emoji, emoji)
544 defp put_change_if_present(changeset, map_field, value_function) do
545 with {:ok, value} <- fetch_change(changeset, map_field),
546 {:ok, new_value} <- value_function.(value) do
547 put_change(changeset, map_field, new_value)
553 defp put_upload(value, type) do
554 with %Plug.Upload{} <- value,
555 {:ok, object} <- ActivityPub.upload(value, type: type) do
560 def update_as_admin_changeset(struct, params) do
562 |> update_changeset(params)
563 |> cast(params, [:email])
564 |> delete_change(:also_known_as)
565 |> unique_constraint(:email)
566 |> validate_format(:email, @email_regex)
567 |> validate_inclusion(:actor_type, ["Person", "Service"])
570 @spec update_as_admin(User.t(), map()) :: {:ok, User.t()} | {:error, Changeset.t()}
571 def update_as_admin(user, params) do
572 params = Map.put(params, "password_confirmation", params["password"])
573 changeset = update_as_admin_changeset(user, params)
575 if params["password"] do
576 reset_password(user, changeset, params)
578 User.update_and_set_cache(changeset)
582 def password_update_changeset(struct, params) do
584 |> cast(params, [:password, :password_confirmation])
585 |> validate_required([:password, :password_confirmation])
586 |> validate_confirmation(:password)
587 |> put_password_hash()
588 |> put_change(:password_reset_pending, false)
591 @spec reset_password(User.t(), map()) :: {:ok, User.t()} | {:error, Changeset.t()}
592 def reset_password(%User{} = user, params) do
593 reset_password(user, user, params)
596 def reset_password(%User{id: user_id} = user, struct, params) do
599 |> Multi.update(:user, password_update_changeset(struct, params))
600 |> Multi.delete_all(:tokens, OAuth.Token.Query.get_by_user(user_id))
601 |> Multi.delete_all(:auth, OAuth.Authorization.delete_by_user_query(user))
603 case Repo.transaction(multi) do
604 {:ok, %{user: user} = _} -> set_cache(user)
605 {:error, _, changeset, _} -> {:error, changeset}
609 def update_password_reset_pending(user, value) do
612 |> put_change(:password_reset_pending, value)
613 |> update_and_set_cache()
616 def force_password_reset_async(user) do
617 BackgroundWorker.enqueue("force_password_reset", %{"user_id" => user.id})
620 @spec force_password_reset(User.t()) :: {:ok, User.t()} | {:error, Ecto.Changeset.t()}
621 def force_password_reset(user), do: update_password_reset_pending(user, true)
623 def register_changeset(struct, params \\ %{}, opts \\ []) do
624 bio_limit = Config.get([:instance, :user_bio_length], 5000)
625 name_limit = Config.get([:instance, :user_name_length], 100)
626 params = Map.put_new(params, :accepts_chat_messages, true)
629 if is_nil(opts[:need_confirmation]) do
630 Config.get([:instance, :account_activation_required])
632 opts[:need_confirmation]
636 |> confirmation_changeset(need_confirmation: need_confirmation?)
644 :password_confirmation,
646 :accepts_chat_messages
648 |> validate_required([:name, :nickname, :password, :password_confirmation])
649 |> validate_confirmation(:password)
650 |> unique_constraint(:email)
651 |> unique_constraint(:nickname)
652 |> validate_exclusion(:nickname, Config.get([User, :restricted_nicknames]))
653 |> validate_format(:nickname, local_nickname_regex())
654 |> validate_format(:email, @email_regex)
655 |> validate_length(:bio, max: bio_limit)
656 |> validate_length(:name, min: 1, max: name_limit)
657 |> maybe_validate_required_email(opts[:external])
660 |> unique_constraint(:ap_id)
661 |> put_following_and_follower_address()
664 def maybe_validate_required_email(changeset, true), do: changeset
666 def maybe_validate_required_email(changeset, _) do
667 if Config.get([:instance, :account_activation_required]) do
668 validate_required(changeset, [:email])
674 defp put_ap_id(changeset) do
675 ap_id = ap_id(%User{nickname: get_field(changeset, :nickname)})
676 put_change(changeset, :ap_id, ap_id)
679 defp put_following_and_follower_address(changeset) do
680 followers = ap_followers(%User{nickname: get_field(changeset, :nickname)})
683 |> put_change(:follower_address, followers)
686 defp autofollow_users(user) do
687 candidates = Config.get([:instance, :autofollowed_nicknames])
690 User.Query.build(%{nickname: candidates, local: true, deactivated: false})
693 follow_all(user, autofollowed_users)
696 @doc "Inserts provided changeset, performs post-registration actions (confirmation email sending etc.)"
697 def register(%Ecto.Changeset{} = changeset) do
698 with {:ok, user} <- Repo.insert(changeset) do
699 post_register_action(user)
703 def post_register_action(%User{} = user) do
704 with {:ok, user} <- autofollow_users(user),
705 {:ok, user} <- set_cache(user),
706 {:ok, _} <- User.WelcomeMessage.post_welcome_message_to_user(user),
707 {:ok, _} <- try_send_confirmation_email(user) do
712 def try_send_confirmation_email(%User{} = user) do
713 if user.confirmation_pending &&
714 Config.get([:instance, :account_activation_required]) do
716 |> Pleroma.Emails.UserEmail.account_confirmation_email()
717 |> Pleroma.Emails.Mailer.deliver_async()
725 def try_send_confirmation_email(users) do
726 Enum.each(users, &try_send_confirmation_email/1)
729 def needs_update?(%User{local: true}), do: false
731 def needs_update?(%User{local: false, last_refreshed_at: nil}), do: true
733 def needs_update?(%User{local: false} = user) do
734 NaiveDateTime.diff(NaiveDateTime.utc_now(), user.last_refreshed_at) >= 86_400
737 def needs_update?(_), do: true
739 @spec maybe_direct_follow(User.t(), User.t()) :: {:ok, User.t()} | {:error, String.t()}
741 # "Locked" (self-locked) users demand explicit authorization of follow requests
742 def maybe_direct_follow(%User{} = follower, %User{local: true, locked: true} = followed) do
743 follow(follower, followed, :follow_pending)
746 def maybe_direct_follow(%User{} = follower, %User{local: true} = followed) do
747 follow(follower, followed)
750 def maybe_direct_follow(%User{} = follower, %User{} = followed) do
751 if not ap_enabled?(followed) do
752 follow(follower, followed)
758 @doc "A mass follow for local users. Respects blocks in both directions but does not create activities."
759 @spec follow_all(User.t(), list(User.t())) :: {atom(), User.t()}
760 def follow_all(follower, followeds) do
762 |> Enum.reject(fn followed -> blocks?(follower, followed) || blocks?(followed, follower) end)
763 |> Enum.each(&follow(follower, &1, :follow_accept))
768 defdelegate following(user), to: FollowingRelationship
770 def follow(%User{} = follower, %User{} = followed, state \\ :follow_accept) do
771 deny_follow_blocked = Config.get([:user, :deny_follow_blocked])
774 followed.deactivated ->
775 {:error, "Could not follow user: #{followed.nickname} is deactivated."}
777 deny_follow_blocked and blocks?(followed, follower) ->
778 {:error, "Could not follow user: #{followed.nickname} blocked you."}
781 FollowingRelationship.follow(follower, followed, state)
783 {:ok, _} = update_follower_count(followed)
786 |> update_following_count()
790 def unfollow(%User{ap_id: ap_id}, %User{ap_id: ap_id}) do
791 {:error, "Not subscribed!"}
794 @spec unfollow(User.t(), User.t()) :: {:ok, User.t(), Activity.t()} | {:error, String.t()}
795 def unfollow(%User{} = follower, %User{} = followed) do
796 case do_unfollow(follower, followed) do
797 {:ok, follower, followed} ->
798 {:ok, follower, Utils.fetch_latest_follow(follower, followed)}
805 @spec do_unfollow(User.t(), User.t()) :: {:ok, User.t(), User.t()} | {:error, String.t()}
806 defp do_unfollow(%User{} = follower, %User{} = followed) do
807 case get_follow_state(follower, followed) do
808 state when state in [:follow_pending, :follow_accept] ->
809 FollowingRelationship.unfollow(follower, followed)
810 {:ok, followed} = update_follower_count(followed)
814 |> update_following_count()
816 {:ok, follower, followed}
819 {:error, "Not subscribed!"}
823 defdelegate following?(follower, followed), to: FollowingRelationship
825 @doc "Returns follow state as Pleroma.FollowingRelationship.State value"
826 def get_follow_state(%User{} = follower, %User{} = following) do
827 following_relationship = FollowingRelationship.get(follower, following)
828 get_follow_state(follower, following, following_relationship)
831 def get_follow_state(
834 following_relationship
836 case {following_relationship, following.local} do
838 case Utils.fetch_latest_follow(follower, following) do
839 %Activity{data: %{"state" => state}} when state in ["pending", "accept"] ->
840 FollowingRelationship.state_to_enum(state)
846 {%{state: state}, _} ->
854 def locked?(%User{} = user) do
859 Repo.get_by(User, id: id)
862 def get_by_ap_id(ap_id) do
863 Repo.get_by(User, ap_id: ap_id)
866 def get_all_by_ap_id(ap_ids) do
867 from(u in __MODULE__,
868 where: u.ap_id in ^ap_ids
873 def get_all_by_ids(ids) do
874 from(u in __MODULE__, where: u.id in ^ids)
878 # This is mostly an SPC migration fix. This guesses the user nickname by taking the last part
879 # of the ap_id and the domain and tries to get that user
880 def get_by_guessed_nickname(ap_id) do
881 domain = URI.parse(ap_id).host
882 name = List.last(String.split(ap_id, "/"))
883 nickname = "#{name}@#{domain}"
885 get_cached_by_nickname(nickname)
888 def set_cache({:ok, user}), do: set_cache(user)
889 def set_cache({:error, err}), do: {:error, err}
891 def set_cache(%User{} = user) do
892 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
893 Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
894 Cachex.put(:user_cache, "friends_ap_ids:#{user.nickname}", get_user_friends_ap_ids(user))
898 def update_and_set_cache(struct, params) do
900 |> update_changeset(params)
901 |> update_and_set_cache()
904 def update_and_set_cache(changeset) do
905 with {:ok, user} <- Repo.update(changeset, stale_error_field: :id) do
910 def get_user_friends_ap_ids(user) do
911 from(u in User.get_friends_query(user), select: u.ap_id)
915 @spec get_cached_user_friends_ap_ids(User.t()) :: [String.t()]
916 def get_cached_user_friends_ap_ids(user) do
917 Cachex.fetch!(:user_cache, "friends_ap_ids:#{user.ap_id}", fn _ ->
918 get_user_friends_ap_ids(user)
922 def invalidate_cache(user) do
923 Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
924 Cachex.del(:user_cache, "nickname:#{user.nickname}")
925 Cachex.del(:user_cache, "friends_ap_ids:#{user.ap_id}")
928 @spec get_cached_by_ap_id(String.t()) :: User.t() | nil
929 def get_cached_by_ap_id(ap_id) do
930 key = "ap_id:#{ap_id}"
932 with {:ok, nil} <- Cachex.get(:user_cache, key),
933 user when not is_nil(user) <- get_by_ap_id(ap_id),
934 {:ok, true} <- Cachex.put(:user_cache, key, user) do
942 def get_cached_by_id(id) do
946 Cachex.fetch!(:user_cache, key, fn _ ->
950 Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
951 {:commit, user.ap_id}
957 get_cached_by_ap_id(ap_id)
960 def get_cached_by_nickname(nickname) do
961 key = "nickname:#{nickname}"
963 Cachex.fetch!(:user_cache, key, fn ->
964 case get_or_fetch_by_nickname(nickname) do
965 {:ok, user} -> {:commit, user}
966 {:error, _error} -> {:ignore, nil}
971 def get_cached_by_nickname_or_id(nickname_or_id, opts \\ []) do
972 restrict_to_local = Config.get([:instance, :limit_to_local_content])
975 is_integer(nickname_or_id) or FlakeId.flake_id?(nickname_or_id) ->
976 get_cached_by_id(nickname_or_id) || get_cached_by_nickname(nickname_or_id)
978 restrict_to_local == false or not String.contains?(nickname_or_id, "@") ->
979 get_cached_by_nickname(nickname_or_id)
981 restrict_to_local == :unauthenticated and match?(%User{}, opts[:for]) ->
982 get_cached_by_nickname(nickname_or_id)
989 @spec get_by_nickname(String.t()) :: User.t() | nil
990 def get_by_nickname(nickname) do
991 Repo.get_by(User, nickname: nickname) ||
992 if Regex.match?(~r(@#{Pleroma.Web.Endpoint.host()})i, nickname) do
993 Repo.get_by(User, nickname: local_nickname(nickname))
997 def get_by_email(email), do: Repo.get_by(User, email: email)
999 def get_by_nickname_or_email(nickname_or_email) do
1000 get_by_nickname(nickname_or_email) || get_by_email(nickname_or_email)
1003 def fetch_by_nickname(nickname), do: ActivityPub.make_user_from_nickname(nickname)
1005 def get_or_fetch_by_nickname(nickname) do
1006 with %User{} = user <- get_by_nickname(nickname) do
1010 with [_nick, _domain] <- String.split(nickname, "@"),
1011 {:ok, user} <- fetch_by_nickname(nickname) do
1014 _e -> {:error, "not found " <> nickname}
1019 @spec get_followers_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
1020 def get_followers_query(%User{} = user, nil) do
1021 User.Query.build(%{followers: user, deactivated: false})
1024 def get_followers_query(user, page) do
1026 |> get_followers_query(nil)
1027 |> User.Query.paginate(page, 20)
1030 @spec get_followers_query(User.t()) :: Ecto.Query.t()
1031 def get_followers_query(user), do: get_followers_query(user, nil)
1033 @spec get_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
1034 def get_followers(user, page \\ nil) do
1036 |> get_followers_query(page)
1040 @spec get_external_followers(User.t(), pos_integer() | nil) :: {:ok, list(User.t())}
1041 def get_external_followers(user, page \\ nil) do
1043 |> get_followers_query(page)
1044 |> User.Query.build(%{external: true})
1048 def get_followers_ids(user, page \\ nil) do
1050 |> get_followers_query(page)
1051 |> select([u], u.id)
1055 @spec get_friends_query(User.t(), pos_integer() | nil) :: Ecto.Query.t()
1056 def get_friends_query(%User{} = user, nil) do
1057 User.Query.build(%{friends: user, deactivated: false})
1060 def get_friends_query(user, page) do
1062 |> get_friends_query(nil)
1063 |> User.Query.paginate(page, 20)
1066 @spec get_friends_query(User.t()) :: Ecto.Query.t()
1067 def get_friends_query(user), do: get_friends_query(user, nil)
1069 def get_friends(user, page \\ nil) do
1071 |> get_friends_query(page)
1075 def get_friends_ap_ids(user) do
1077 |> get_friends_query(nil)
1078 |> select([u], u.ap_id)
1082 def get_friends_ids(user, page \\ nil) do
1084 |> get_friends_query(page)
1085 |> select([u], u.id)
1089 defdelegate get_follow_requests(user), to: FollowingRelationship
1091 def increase_note_count(%User{} = user) do
1093 |> where(id: ^user.id)
1094 |> update([u], inc: [note_count: 1])
1096 |> Repo.update_all([])
1098 {1, [user]} -> set_cache(user)
1103 def decrease_note_count(%User{} = user) do
1105 |> where(id: ^user.id)
1108 note_count: fragment("greatest(0, note_count - 1)")
1112 |> Repo.update_all([])
1114 {1, [user]} -> set_cache(user)
1119 def update_note_count(%User{} = user, note_count \\ nil) do
1124 where: fragment("?->>'actor' = ? and ?->>'type' = 'Note'", a.data, ^user.ap_id, a.data),
1130 |> cast(%{note_count: note_count}, [:note_count])
1131 |> update_and_set_cache()
1134 @spec maybe_fetch_follow_information(User.t()) :: User.t()
1135 def maybe_fetch_follow_information(user) do
1136 with {:ok, user} <- fetch_follow_information(user) do
1140 Logger.error("Follower/Following counter update for #{user.ap_id} failed.\n#{inspect(e)}")
1146 def fetch_follow_information(user) do
1147 with {:ok, info} <- ActivityPub.fetch_follow_information_for_user(user) do
1149 |> follow_information_changeset(info)
1150 |> update_and_set_cache()
1154 defp follow_information_changeset(user, params) do
1161 :hide_followers_count,
1166 @spec update_follower_count(User.t()) :: {:ok, User.t()}
1167 def update_follower_count(%User{} = user) do
1168 if user.local or !Config.get([:instance, :external_user_synchronization]) do
1169 follower_count = FollowingRelationship.follower_count(user)
1172 |> follow_information_changeset(%{follower_count: follower_count})
1173 |> update_and_set_cache
1175 {:ok, maybe_fetch_follow_information(user)}
1179 @spec update_following_count(User.t()) :: {:ok, User.t()}
1180 def update_following_count(%User{local: false} = user) do
1181 if Config.get([:instance, :external_user_synchronization]) do
1182 {:ok, maybe_fetch_follow_information(user)}
1188 def update_following_count(%User{local: true} = user) do
1189 following_count = FollowingRelationship.following_count(user)
1192 |> follow_information_changeset(%{following_count: following_count})
1193 |> update_and_set_cache()
1196 def set_unread_conversation_count(%User{local: true} = user) do
1197 unread_query = Participation.unread_conversation_count_for_user(user)
1200 |> join(:inner, [u], p in subquery(unread_query))
1202 set: [unread_conversation_count: p.count]
1204 |> where([u], u.id == ^user.id)
1206 |> Repo.update_all([])
1208 {1, [user]} -> set_cache(user)
1213 def set_unread_conversation_count(user), do: {:ok, user}
1215 def increment_unread_conversation_count(conversation, %User{local: true} = user) do
1217 Participation.unread_conversation_count_for_user(user)
1218 |> where([p], p.conversation_id == ^conversation.id)
1221 |> join(:inner, [u], p in subquery(unread_query))
1223 inc: [unread_conversation_count: 1]
1225 |> where([u], u.id == ^user.id)
1226 |> where([u, p], p.count == 0)
1228 |> Repo.update_all([])
1230 {1, [user]} -> set_cache(user)
1235 def increment_unread_conversation_count(_, user), do: {:ok, user}
1237 @spec get_users_from_set([String.t()], keyword()) :: [User.t()]
1238 def get_users_from_set(ap_ids, opts \\ []) do
1239 local_only = Keyword.get(opts, :local_only, true)
1240 criteria = %{ap_id: ap_ids, deactivated: false}
1241 criteria = if local_only, do: Map.put(criteria, :local, true), else: criteria
1243 User.Query.build(criteria)
1247 @spec get_recipients_from_activity(Activity.t()) :: [User.t()]
1248 def get_recipients_from_activity(%Activity{recipients: to, actor: actor}) do
1251 query = User.Query.build(%{recipients_from_activity: to, local: true, deactivated: false})
1257 @spec mute(User.t(), User.t(), boolean()) ::
1258 {:ok, list(UserRelationship.t())} | {:error, String.t()}
1259 def mute(%User{} = muter, %User{} = mutee, notifications? \\ true) do
1260 add_to_mutes(muter, mutee, notifications?)
1263 def unmute(%User{} = muter, %User{} = mutee) do
1264 remove_from_mutes(muter, mutee)
1267 def subscribe(%User{} = subscriber, %User{} = target) do
1268 deny_follow_blocked = Config.get([:user, :deny_follow_blocked])
1270 if blocks?(target, subscriber) and deny_follow_blocked do
1271 {:error, "Could not subscribe: #{target.nickname} is blocking you"}
1273 # Note: the relationship is inverse: subscriber acts as relationship target
1274 UserRelationship.create_inverse_subscription(target, subscriber)
1278 def subscribe(%User{} = subscriber, %{ap_id: ap_id}) do
1279 with %User{} = subscribee <- get_cached_by_ap_id(ap_id) do
1280 subscribe(subscriber, subscribee)
1284 def unsubscribe(%User{} = unsubscriber, %User{} = target) do
1285 # Note: the relationship is inverse: subscriber acts as relationship target
1286 UserRelationship.delete_inverse_subscription(target, unsubscriber)
1289 def unsubscribe(%User{} = unsubscriber, %{ap_id: ap_id}) do
1290 with %User{} = user <- get_cached_by_ap_id(ap_id) do
1291 unsubscribe(unsubscriber, user)
1295 def block(%User{} = blocker, %User{} = blocked) do
1296 # sever any follow relationships to prevent leaks per activitypub (Pleroma issue #213)
1298 if following?(blocker, blocked) do
1299 {:ok, blocker, _} = unfollow(blocker, blocked)
1305 # clear any requested follows as well
1307 case CommonAPI.reject_follow_request(blocked, blocker) do
1308 {:ok, %User{} = updated_blocked} -> updated_blocked
1312 unsubscribe(blocked, blocker)
1314 unfollowing_blocked = Config.get([:activitypub, :unfollow_blocked], true)
1315 if unfollowing_blocked && following?(blocked, blocker), do: unfollow(blocked, blocker)
1317 {:ok, blocker} = update_follower_count(blocker)
1318 {:ok, blocker, _} = Participation.mark_all_as_read(blocker, blocked)
1319 add_to_block(blocker, blocked)
1322 # helper to handle the block given only an actor's AP id
1323 def block(%User{} = blocker, %{ap_id: ap_id}) do
1324 block(blocker, get_cached_by_ap_id(ap_id))
1327 def unblock(%User{} = blocker, %User{} = blocked) do
1328 remove_from_block(blocker, blocked)
1331 # helper to handle the block given only an actor's AP id
1332 def unblock(%User{} = blocker, %{ap_id: ap_id}) do
1333 unblock(blocker, get_cached_by_ap_id(ap_id))
1336 def mutes?(nil, _), do: false
1337 def mutes?(%User{} = user, %User{} = target), do: mutes_user?(user, target)
1339 def mutes_user?(%User{} = user, %User{} = target) do
1340 UserRelationship.mute_exists?(user, target)
1343 @spec muted_notifications?(User.t() | nil, User.t() | map()) :: boolean()
1344 def muted_notifications?(nil, _), do: false
1346 def muted_notifications?(%User{} = user, %User{} = target),
1347 do: UserRelationship.notification_mute_exists?(user, target)
1349 def blocks?(nil, _), do: false
1351 def blocks?(%User{} = user, %User{} = target) do
1352 blocks_user?(user, target) ||
1353 (blocks_domain?(user, target) and not User.following?(user, target))
1356 def blocks_user?(%User{} = user, %User{} = target) do
1357 UserRelationship.block_exists?(user, target)
1360 def blocks_user?(_, _), do: false
1362 def blocks_domain?(%User{} = user, %User{} = target) do
1363 domain_blocks = Pleroma.Web.ActivityPub.MRF.subdomains_regex(user.domain_blocks)
1364 %{host: host} = URI.parse(target.ap_id)
1365 Pleroma.Web.ActivityPub.MRF.subdomain_match?(domain_blocks, host)
1368 def blocks_domain?(_, _), do: false
1370 def subscribed_to?(%User{} = user, %User{} = target) do
1371 # Note: the relationship is inverse: subscriber acts as relationship target
1372 UserRelationship.inverse_subscription_exists?(target, user)
1375 def subscribed_to?(%User{} = user, %{ap_id: ap_id}) do
1376 with %User{} = target <- get_cached_by_ap_id(ap_id) do
1377 subscribed_to?(user, target)
1382 Returns map of outgoing (blocked, muted etc.) relationships' user AP IDs by relation type.
1383 E.g. `outgoing_relationships_ap_ids(user, [:block])` -> `%{block: ["https://some.site/users/userapid"]}`
1385 @spec outgoing_relationships_ap_ids(User.t(), list(atom())) :: %{atom() => list(String.t())}
1386 def outgoing_relationships_ap_ids(_user, []), do: %{}
1388 def outgoing_relationships_ap_ids(nil, _relationship_types), do: %{}
1390 def outgoing_relationships_ap_ids(%User{} = user, relationship_types)
1391 when is_list(relationship_types) do
1394 |> assoc(:outgoing_relationships)
1395 |> join(:inner, [user_rel], u in assoc(user_rel, :target))
1396 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1397 |> select([user_rel, u], [user_rel.relationship_type, fragment("array_agg(?)", u.ap_id)])
1398 |> group_by([user_rel, u], user_rel.relationship_type)
1400 |> Enum.into(%{}, fn [k, v] -> {k, v} end)
1405 fn rel_type -> {rel_type, db_result[rel_type] || []} end
1409 def incoming_relationships_ungrouped_ap_ids(user, relationship_types, ap_ids \\ nil)
1411 def incoming_relationships_ungrouped_ap_ids(_user, [], _ap_ids), do: []
1413 def incoming_relationships_ungrouped_ap_ids(nil, _relationship_types, _ap_ids), do: []
1415 def incoming_relationships_ungrouped_ap_ids(%User{} = user, relationship_types, ap_ids)
1416 when is_list(relationship_types) do
1418 |> assoc(:incoming_relationships)
1419 |> join(:inner, [user_rel], u in assoc(user_rel, :source))
1420 |> where([user_rel, u], user_rel.relationship_type in ^relationship_types)
1421 |> maybe_filter_on_ap_id(ap_ids)
1422 |> select([user_rel, u], u.ap_id)
1427 defp maybe_filter_on_ap_id(query, ap_ids) when is_list(ap_ids) do
1428 where(query, [user_rel, u], u.ap_id in ^ap_ids)
1431 defp maybe_filter_on_ap_id(query, _ap_ids), do: query
1433 def deactivate_async(user, status \\ true) do
1434 BackgroundWorker.enqueue("deactivate_user", %{"user_id" => user.id, "status" => status})
1437 def deactivate(user, status \\ true)
1439 def deactivate(users, status) when is_list(users) do
1440 Repo.transaction(fn ->
1441 for user <- users, do: deactivate(user, status)
1445 def deactivate(%User{} = user, status) do
1446 with {:ok, user} <- set_activation_status(user, status) do
1449 |> Enum.filter(& &1.local)
1450 |> Enum.each(&set_cache(update_following_count(&1)))
1452 # Only update local user counts, remote will be update during the next pull.
1455 |> Enum.filter(& &1.local)
1456 |> Enum.each(&do_unfollow(user, &1))
1462 def update_notification_settings(%User{} = user, settings) do
1464 |> cast(%{notification_settings: settings}, [])
1465 |> cast_embed(:notification_settings)
1466 |> validate_required([:notification_settings])
1467 |> update_and_set_cache()
1470 def delete(users) when is_list(users) do
1471 for user <- users, do: delete(user)
1474 def delete(%User{} = user) do
1475 BackgroundWorker.enqueue("delete_user", %{"user_id" => user.id})
1478 defp delete_and_invalidate_cache(%User{} = user) do
1479 invalidate_cache(user)
1483 defp delete_or_deactivate(%User{local: false} = user), do: delete_and_invalidate_cache(user)
1485 defp delete_or_deactivate(%User{local: true} = user) do
1486 status = account_status(user)
1488 if status == :confirmation_pending do
1489 delete_and_invalidate_cache(user)
1492 |> change(%{deactivated: true, email: nil})
1493 |> update_and_set_cache()
1497 def perform(:force_password_reset, user), do: force_password_reset(user)
1499 @spec perform(atom(), User.t()) :: {:ok, User.t()}
1500 def perform(:delete, %User{} = user) do
1501 # Remove all relationships
1504 |> Enum.each(fn follower ->
1505 ActivityPub.unfollow(follower, user)
1506 unfollow(follower, user)
1511 |> Enum.each(fn followed ->
1512 ActivityPub.unfollow(user, followed)
1513 unfollow(user, followed)
1516 delete_user_activities(user)
1517 delete_notifications_from_user_activities(user)
1519 delete_outgoing_pending_follow_requests(user)
1521 delete_or_deactivate(user)
1524 def perform(:deactivate_async, user, status), do: deactivate(user, status)
1526 @spec perform(atom(), User.t(), list()) :: list() | {:error, any()}
1527 def perform(:blocks_import, %User{} = blocker, blocked_identifiers)
1528 when is_list(blocked_identifiers) do
1530 blocked_identifiers,
1531 fn blocked_identifier ->
1532 with {:ok, %User{} = blocked} <- get_or_fetch(blocked_identifier),
1533 {:ok, _block} <- CommonAPI.block(blocker, blocked) do
1537 Logger.debug("blocks_import failed for #{blocked_identifier} with: #{inspect(err)}")
1544 def perform(:follow_import, %User{} = follower, followed_identifiers)
1545 when is_list(followed_identifiers) do
1547 followed_identifiers,
1548 fn followed_identifier ->
1549 with {:ok, %User{} = followed} <- get_or_fetch(followed_identifier),
1550 {:ok, follower} <- maybe_direct_follow(follower, followed),
1551 {:ok, _, _, _} <- CommonAPI.follow(follower, followed) do
1555 Logger.debug("follow_import failed for #{followed_identifier} with: #{inspect(err)}")
1562 @spec external_users_query() :: Ecto.Query.t()
1563 def external_users_query do
1571 @spec external_users(keyword()) :: [User.t()]
1572 def external_users(opts \\ []) do
1574 external_users_query()
1575 |> select([u], struct(u, [:id, :ap_id]))
1579 do: where(query, [u], u.id > ^opts[:max_id]),
1584 do: limit(query, ^opts[:limit]),
1590 def blocks_import(%User{} = blocker, blocked_identifiers) when is_list(blocked_identifiers) do
1591 BackgroundWorker.enqueue("blocks_import", %{
1592 "blocker_id" => blocker.id,
1593 "blocked_identifiers" => blocked_identifiers
1597 def follow_import(%User{} = follower, followed_identifiers)
1598 when is_list(followed_identifiers) do
1599 BackgroundWorker.enqueue("follow_import", %{
1600 "follower_id" => follower.id,
1601 "followed_identifiers" => followed_identifiers
1605 def delete_notifications_from_user_activities(%User{ap_id: ap_id}) do
1607 |> join(:inner, [n], activity in assoc(n, :activity))
1608 |> where([n, a], fragment("? = ?", a.actor, ^ap_id))
1609 |> Repo.delete_all()
1612 def delete_user_activities(%User{ap_id: ap_id} = user) do
1614 |> Activity.Queries.by_actor()
1615 |> RepoStreamer.chunk_stream(50)
1616 |> Stream.each(fn activities ->
1617 Enum.each(activities, fn activity -> delete_activity(activity, user) end)
1622 defp delete_activity(%{data: %{"type" => "Create", "object" => object}} = activity, user) do
1623 with {_, %Object{}} <- {:find_object, Object.get_by_ap_id(object)},
1624 {:ok, delete_data, _} <- Builder.delete(user, object) do
1625 Pipeline.common_pipeline(delete_data, local: user.local)
1627 {:find_object, nil} ->
1628 # We have the create activity, but not the object, it was probably pruned.
1629 # Insert a tombstone and try again
1630 with {:ok, tombstone_data, _} <- Builder.tombstone(user.ap_id, object),
1631 {:ok, _tombstone} <- Object.create(tombstone_data) do
1632 delete_activity(activity, user)
1636 Logger.error("Could not delete #{object} created by #{activity.data["ap_id"]}")
1637 Logger.error("Error: #{inspect(e)}")
1641 defp delete_activity(%{data: %{"type" => type}} = activity, user)
1642 when type in ["Like", "Announce"] do
1643 {:ok, undo, _} = Builder.undo(user, activity)
1644 Pipeline.common_pipeline(undo, local: user.local)
1647 defp delete_activity(_activity, _user), do: "Doing nothing"
1649 defp delete_outgoing_pending_follow_requests(user) do
1651 |> FollowingRelationship.outgoing_pending_follow_requests_query()
1652 |> Repo.delete_all()
1655 def html_filter_policy(%User{no_rich_text: true}) do
1656 Pleroma.HTML.Scrubber.TwitterText
1659 def html_filter_policy(_), do: Config.get([:markup, :scrub_policy])
1661 def fetch_by_ap_id(ap_id), do: ActivityPub.make_user_from_ap_id(ap_id)
1663 def get_or_fetch_by_ap_id(ap_id) do
1664 cached_user = get_cached_by_ap_id(ap_id)
1666 maybe_fetched_user = needs_update?(cached_user) && fetch_by_ap_id(ap_id)
1668 case {cached_user, maybe_fetched_user} do
1669 {_, {:ok, %User{} = user}} ->
1672 {%User{} = user, _} ->
1676 {:error, :not_found}
1681 Creates an internal service actor by URI if missing.
1682 Optionally takes nickname for addressing.
1684 @spec get_or_create_service_actor_by_ap_id(String.t(), String.t()) :: User.t() | nil
1685 def get_or_create_service_actor_by_ap_id(uri, nickname) do
1687 case get_cached_by_ap_id(uri) do
1689 with {:error, %{errors: errors}} <- create_service_actor(uri, nickname) do
1690 Logger.error("Cannot create service actor: #{uri}/.\n#{inspect(errors)}")
1694 %User{invisible: false} = user ->
1704 @spec set_invisible(User.t()) :: {:ok, User.t()}
1705 defp set_invisible(user) do
1707 |> change(%{invisible: true})
1708 |> update_and_set_cache()
1711 @spec create_service_actor(String.t(), String.t()) ::
1712 {:ok, User.t()} | {:error, Ecto.Changeset.t()}
1713 defp create_service_actor(uri, nickname) do
1719 follower_address: uri <> "/followers"
1722 |> unique_constraint(:nickname)
1727 def public_key(%{public_key: public_key_pem}) when is_binary(public_key_pem) do
1730 |> :public_key.pem_decode()
1732 |> :public_key.pem_entry_decode()
1737 def public_key(_), do: {:error, "key not found"}
1739 def get_public_key_for_ap_id(ap_id) do
1740 with {:ok, %User{} = user} <- get_or_fetch_by_ap_id(ap_id),
1741 {:ok, public_key} <- public_key(user) do
1748 def ap_enabled?(%User{local: true}), do: true
1749 def ap_enabled?(%User{ap_enabled: ap_enabled}), do: ap_enabled
1750 def ap_enabled?(_), do: false
1752 @doc "Gets or fetch a user by uri or nickname."
1753 @spec get_or_fetch(String.t()) :: {:ok, User.t()} | {:error, String.t()}
1754 def get_or_fetch("http" <> _host = uri), do: get_or_fetch_by_ap_id(uri)
1755 def get_or_fetch(nickname), do: get_or_fetch_by_nickname(nickname)
1757 # wait a period of time and return newest version of the User structs
1758 # this is because we have synchronous follow APIs and need to simulate them
1759 # with an async handshake
1760 def wait_and_refresh(_, %User{local: true} = a, %User{local: true} = b) do
1761 with %User{} = a <- get_cached_by_id(a.id),
1762 %User{} = b <- get_cached_by_id(b.id) do
1769 def wait_and_refresh(timeout, %User{} = a, %User{} = b) do
1770 with :ok <- :timer.sleep(timeout),
1771 %User{} = a <- get_cached_by_id(a.id),
1772 %User{} = b <- get_cached_by_id(b.id) do
1779 def parse_bio(bio) when is_binary(bio) and bio != "" do
1781 |> CommonUtils.format_input("text/plain", mentions_format: :full)
1785 def parse_bio(_), do: ""
1787 def parse_bio(bio, user) when is_binary(bio) and bio != "" do
1788 # TODO: get profile URLs other than user.ap_id
1789 profile_urls = [user.ap_id]
1792 |> CommonUtils.format_input("text/plain",
1793 mentions_format: :full,
1794 rel: &RelMe.maybe_put_rel_me(&1, profile_urls)
1799 def parse_bio(_, _), do: ""
1801 def tag(user_identifiers, tags) when is_list(user_identifiers) do
1802 Repo.transaction(fn ->
1803 for user_identifier <- user_identifiers, do: tag(user_identifier, tags)
1807 def tag(nickname, tags) when is_binary(nickname),
1808 do: tag(get_by_nickname(nickname), tags)
1810 def tag(%User{} = user, tags),
1811 do: update_tags(user, Enum.uniq((user.tags || []) ++ normalize_tags(tags)))
1813 def untag(user_identifiers, tags) when is_list(user_identifiers) do
1814 Repo.transaction(fn ->
1815 for user_identifier <- user_identifiers, do: untag(user_identifier, tags)
1819 def untag(nickname, tags) when is_binary(nickname),
1820 do: untag(get_by_nickname(nickname), tags)
1822 def untag(%User{} = user, tags),
1823 do: update_tags(user, (user.tags || []) -- normalize_tags(tags))
1825 defp update_tags(%User{} = user, new_tags) do
1826 {:ok, updated_user} =
1828 |> change(%{tags: new_tags})
1829 |> update_and_set_cache()
1834 defp normalize_tags(tags) do
1837 |> Enum.map(&String.downcase/1)
1840 defp local_nickname_regex do
1841 if Config.get([:instance, :extended_nickname_format]) do
1842 @extended_local_nickname_regex
1844 @strict_local_nickname_regex
1848 def local_nickname(nickname_or_mention) do
1851 |> String.split("@")
1855 def full_nickname(nickname_or_mention),
1856 do: String.trim_leading(nickname_or_mention, "@")
1858 def error_user(ap_id) do
1862 nickname: "erroruser@example.com",
1863 inserted_at: NaiveDateTime.utc_now()
1867 @spec all_superusers() :: [User.t()]
1868 def all_superusers do
1869 User.Query.build(%{super_users: true, local: true, deactivated: false})
1873 def muting_reblogs?(%User{} = user, %User{} = target) do
1874 UserRelationship.reblog_mute_exists?(user, target)
1877 def showing_reblogs?(%User{} = user, %User{} = target) do
1878 not muting_reblogs?(user, target)
1882 The function returns a query to get users with no activity for given interval of days.
1883 Inactive users are those who didn't read any notification, or had any activity where
1884 the user is the activity's actor, during `inactivity_threshold` days.
1885 Deactivated users will not appear in this list.
1889 iex> Pleroma.User.list_inactive_users()
1892 @spec list_inactive_users_query(integer()) :: Ecto.Query.t()
1893 def list_inactive_users_query(inactivity_threshold \\ 7) do
1894 negative_inactivity_threshold = -inactivity_threshold
1895 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1896 # Subqueries are not supported in `where` clauses, join gets too complicated.
1897 has_read_notifications =
1898 from(n in Pleroma.Notification,
1899 where: n.seen == true,
1901 having: max(n.updated_at) > datetime_add(^now, ^negative_inactivity_threshold, "day"),
1904 |> Pleroma.Repo.all()
1906 from(u in Pleroma.User,
1907 left_join: a in Pleroma.Activity,
1908 on: u.ap_id == a.actor,
1909 where: not is_nil(u.nickname),
1910 where: u.deactivated != ^true,
1911 where: u.id not in ^has_read_notifications,
1914 max(a.inserted_at) < datetime_add(^now, ^negative_inactivity_threshold, "day") or
1915 is_nil(max(a.inserted_at))
1920 Enable or disable email notifications for user
1924 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => false}}, "digest", true)
1925 Pleroma.User{email_notifications: %{"digest" => true}}
1927 iex> Pleroma.User.switch_email_notifications(Pleroma.User{email_notifications: %{"digest" => true}}, "digest", false)
1928 Pleroma.User{email_notifications: %{"digest" => false}}
1930 @spec switch_email_notifications(t(), String.t(), boolean()) ::
1931 {:ok, t()} | {:error, Ecto.Changeset.t()}
1932 def switch_email_notifications(user, type, status) do
1933 User.update_email_notifications(user, %{type => status})
1937 Set `last_digest_emailed_at` value for the user to current time
1939 @spec touch_last_digest_emailed_at(t()) :: t()
1940 def touch_last_digest_emailed_at(user) do
1941 now = NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second)
1943 {:ok, updated_user} =
1945 |> change(%{last_digest_emailed_at: now})
1946 |> update_and_set_cache()
1951 @spec toggle_confirmation(User.t()) :: {:ok, User.t()} | {:error, Changeset.t()}
1952 def toggle_confirmation(%User{} = user) do
1954 |> confirmation_changeset(need_confirmation: !user.confirmation_pending)
1955 |> update_and_set_cache()
1958 @spec toggle_confirmation([User.t()]) :: [{:ok, User.t()} | {:error, Changeset.t()}]
1959 def toggle_confirmation(users) do
1960 Enum.map(users, &toggle_confirmation/1)
1963 def get_mascot(%{mascot: %{} = mascot}) when not is_nil(mascot) do
1967 def get_mascot(%{mascot: mascot}) when is_nil(mascot) do
1968 # use instance-default
1969 config = Config.get([:assets, :mascots])
1970 default_mascot = Config.get([:assets, :default_mascot])
1971 mascot = Keyword.get(config, default_mascot)
1974 "id" => "default-mascot",
1975 "url" => mascot[:url],
1976 "preview_url" => mascot[:url],
1978 "mime_type" => mascot[:mime_type]
1983 def ensure_keys_present(%{keys: keys} = user) when not is_nil(keys), do: {:ok, user}
1985 def ensure_keys_present(%User{} = user) do
1986 with {:ok, pem} <- Keys.generate_rsa_pem() do
1988 |> cast(%{keys: pem}, [:keys])
1989 |> validate_required([:keys])
1990 |> update_and_set_cache()
1994 def get_ap_ids_by_nicknames(nicknames) do
1996 where: u.nickname in ^nicknames,
2002 defdelegate search(query, opts \\ []), to: User.Search
2004 defp put_password_hash(
2005 %Ecto.Changeset{valid?: true, changes: %{password: password}} = changeset
2007 change(changeset, password_hash: Pbkdf2.hash_pwd_salt(password))
2010 defp put_password_hash(changeset), do: changeset
2012 def is_internal_user?(%User{nickname: nil}), do: true
2013 def is_internal_user?(%User{local: true, nickname: "internal." <> _}), do: true
2014 def is_internal_user?(_), do: false
2016 # A hack because user delete activities have a fake id for whatever reason
2017 # TODO: Get rid of this
2018 def get_delivered_users_by_object_id("pleroma:fake_object_id"), do: []
2020 def get_delivered_users_by_object_id(object_id) do
2022 inner_join: delivery in assoc(u, :deliveries),
2023 where: delivery.object_id == ^object_id
2028 def change_email(user, email) do
2030 |> cast(%{email: email}, [:email])
2031 |> validate_required([:email])
2032 |> unique_constraint(:email)
2033 |> validate_format(:email, @email_regex)
2034 |> update_and_set_cache()
2037 # Internal function; public one is `deactivate/2`
2038 defp set_activation_status(user, deactivated) do
2040 |> cast(%{deactivated: deactivated}, [:deactivated])
2041 |> update_and_set_cache()
2044 def update_banner(user, banner) do
2046 |> cast(%{banner: banner}, [:banner])
2047 |> update_and_set_cache()
2050 def update_background(user, background) do
2052 |> cast(%{background: background}, [:background])
2053 |> update_and_set_cache()
2056 def roles(%{is_moderator: is_moderator, is_admin: is_admin}) do
2059 moderator: is_moderator
2063 def validate_fields(changeset, remote? \\ false) do
2064 limit_name = if remote?, do: :max_remote_account_fields, else: :max_account_fields
2065 limit = Config.get([:instance, limit_name], 0)
2068 |> validate_length(:fields, max: limit)
2069 |> validate_change(:fields, fn :fields, fields ->
2070 if Enum.all?(fields, &valid_field?/1) do
2078 defp valid_field?(%{"name" => name, "value" => value}) do
2079 name_limit = Config.get([:instance, :account_field_name_length], 255)
2080 value_limit = Config.get([:instance, :account_field_value_length], 255)
2082 is_binary(name) && is_binary(value) && String.length(name) <= name_limit &&
2083 String.length(value) <= value_limit
2086 defp valid_field?(_), do: false
2088 defp truncate_field(%{"name" => name, "value" => value}) do
2090 String.split_at(name, Config.get([:instance, :account_field_name_length], 255))
2093 String.split_at(value, Config.get([:instance, :account_field_value_length], 255))
2095 %{"name" => name, "value" => value}
2098 def admin_api_update(user, params) do
2105 |> update_and_set_cache()
2108 @doc "Signs user out of all applications"
2109 def global_sign_out(user) do
2110 OAuth.Authorization.delete_user_authorizations(user)
2111 OAuth.Token.delete_user_tokens(user)
2114 def mascot_update(user, url) do
2116 |> cast(%{mascot: url}, [:mascot])
2117 |> validate_required([:mascot])
2118 |> update_and_set_cache()
2121 def mastodon_settings_update(user, settings) do
2123 |> cast(%{mastofe_settings: settings}, [:mastofe_settings])
2124 |> validate_required([:mastofe_settings])
2125 |> update_and_set_cache()
2128 @spec confirmation_changeset(User.t(), keyword()) :: Changeset.t()
2129 def confirmation_changeset(user, need_confirmation: need_confirmation?) do
2131 if need_confirmation? do
2133 confirmation_pending: true,
2134 confirmation_token: :crypto.strong_rand_bytes(32) |> Base.url_encode64()
2138 confirmation_pending: false,
2139 confirmation_token: nil
2143 cast(user, params, [:confirmation_pending, :confirmation_token])
2146 def add_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2147 if id not in user.pinned_activities do
2148 max_pinned_statuses = Config.get([:instance, :max_pinned_statuses], 0)
2149 params = %{pinned_activities: user.pinned_activities ++ [id]}
2152 |> cast(params, [:pinned_activities])
2153 |> validate_length(:pinned_activities,
2154 max: max_pinned_statuses,
2155 message: "You have already pinned the maximum number of statuses"
2160 |> update_and_set_cache()
2163 def remove_pinnned_activity(user, %Pleroma.Activity{id: id}) do
2164 params = %{pinned_activities: List.delete(user.pinned_activities, id)}
2167 |> cast(params, [:pinned_activities])
2168 |> update_and_set_cache()
2171 def update_email_notifications(user, settings) do
2172 email_notifications =
2173 user.email_notifications
2174 |> Map.merge(settings)
2175 |> Map.take(["digest"])
2177 params = %{email_notifications: email_notifications}
2178 fields = [:email_notifications]
2181 |> cast(params, fields)
2182 |> validate_required(fields)
2183 |> update_and_set_cache()
2186 defp set_domain_blocks(user, domain_blocks) do
2187 params = %{domain_blocks: domain_blocks}
2190 |> cast(params, [:domain_blocks])
2191 |> validate_required([:domain_blocks])
2192 |> update_and_set_cache()
2195 def block_domain(user, domain_blocked) do
2196 set_domain_blocks(user, Enum.uniq([domain_blocked | user.domain_blocks]))
2199 def unblock_domain(user, domain_blocked) do
2200 set_domain_blocks(user, List.delete(user.domain_blocks, domain_blocked))
2203 @spec add_to_block(User.t(), User.t()) ::
2204 {:ok, UserRelationship.t()} | {:error, Ecto.Changeset.t()}
2205 defp add_to_block(%User{} = user, %User{} = blocked) do
2206 UserRelationship.create_block(user, blocked)
2209 @spec add_to_block(User.t(), User.t()) ::
2210 {:ok, UserRelationship.t()} | {:ok, nil} | {:error, Ecto.Changeset.t()}
2211 defp remove_from_block(%User{} = user, %User{} = blocked) do
2212 UserRelationship.delete_block(user, blocked)
2215 defp add_to_mutes(%User{} = user, %User{} = muted_user, notifications?) do
2216 with {:ok, user_mute} <- UserRelationship.create_mute(user, muted_user),
2217 {:ok, user_notification_mute} <-
2218 (notifications? && UserRelationship.create_notification_mute(user, muted_user)) ||
2220 {:ok, Enum.filter([user_mute, user_notification_mute], & &1)}
2224 defp remove_from_mutes(user, %User{} = muted_user) do
2225 with {:ok, user_mute} <- UserRelationship.delete_mute(user, muted_user),
2226 {:ok, user_notification_mute} <-
2227 UserRelationship.delete_notification_mute(user, muted_user) do
2228 {:ok, [user_mute, user_notification_mute]}
2232 def set_invisible(user, invisible) do
2233 params = %{invisible: invisible}
2236 |> cast(params, [:invisible])
2237 |> validate_required([:invisible])
2238 |> update_and_set_cache()
2241 def sanitize_html(%User{} = user) do
2242 sanitize_html(user, nil)
2245 # User data that mastodon isn't filtering (treated as plaintext):
2248 def sanitize_html(%User{} = user, filter) do
2250 Enum.map(user.fields, fn %{"name" => name, "value" => value} ->
2253 "value" => HTML.filter_tags(value, Pleroma.HTML.Scrubber.LinksOnly)
2258 |> Map.put(:bio, HTML.filter_tags(user.bio, filter))
2259 |> Map.put(:fields, fields)