1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.Federator.Publishing do
6 @callback publish(map()) :: any()
9 defmodule Pleroma.Web.Federator do
10 alias Pleroma.Activity
11 alias Pleroma.Object.Containment
13 alias Pleroma.Web.ActivityPub.ActivityPub
14 alias Pleroma.Web.ActivityPub.Transmogrifier
15 alias Pleroma.Web.ActivityPub.Utils
16 alias Pleroma.Web.Federator.Publisher
17 alias Pleroma.Workers.PublisherWorker
18 alias Pleroma.Workers.ReceiverWorker
22 @behaviour Pleroma.Web.Federator.Publishing
25 Returns `true` if the distance to target object does not exceed max configured value.
26 Serves to prevent fetching of very long threads, especially useful on smaller instances.
27 Addresses [memory leaks on recursive replies fetching](https://git.pleroma.social/pleroma/pleroma/issues/161).
28 Applies to fetching of both ancestor (reply-to) and child (reply) objects.
30 # credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
31 def allowed_thread_distance?(distance) do
32 max_distance = Pleroma.Config.get([:instance, :federation_incoming_replies_max_depth])
34 if max_distance && max_distance >= 0 do
35 # Default depth is 0 (an object has zero distance from itself in its thread)
36 (distance || 0) <= max_distance
44 def incoming_ap_doc(params) do
45 ReceiverWorker.enqueue("incoming_ap_doc", %{"params" => params})
49 def publish(%{id: "pleroma:fakeid"} = activity) do
50 perform(:publish, activity)
54 def publish(activity) do
55 PublisherWorker.enqueue("publish", %{"activity_id" => activity.id})
58 # Job Worker Callbacks
60 @spec perform(atom(), module(), any()) :: {:ok, any()} | {:error, any()}
61 def perform(:publish_one, module, params) do
62 apply(module, :publish_one, [params])
65 def perform(:publish, activity) do
66 Logger.debug(fn -> "Running publish for #{activity.data["id"]}" end)
68 with %User{} = actor <- User.get_cached_by_ap_id(activity.data["actor"]),
69 {:ok, actor} <- User.ensure_keys_present(actor) do
70 Publisher.publish(actor, activity)
74 def perform(:incoming_ap_doc, params) do
75 Logger.debug("Handling incoming AP activity")
82 # NOTE: we use the actor ID to do the containment, this is fine because an
83 # actor shouldn't be acting on objects outside their own AP server.
84 with {_, {:ok, _user}} <- {:actor, ap_enabled_actor(actor)},
85 nil <- Activity.normalize(params["id"]),
87 {:correct_origin?, Containment.contain_origin_from_id(actor, params)},
88 {:ok, activity} <- Transmogrifier.handle_incoming(params) do
91 {:correct_origin?, _} ->
92 Logger.debug("Origin containment failure for #{params["id"]}")
93 {:error, :origin_containment_failed}
96 Logger.debug("Already had #{params["id"]}")
97 {:error, :already_present}
100 Logger.debug("Unhandled actor #{actor}, #{inspect(e)}")
104 # Just drop those for now
105 Logger.debug(fn -> "Unhandled activity\n" <> Jason.encode!(params, pretty: true) end)
110 def ap_enabled_actor(id) do
111 user = User.get_cached_by_ap_id(id)
113 if User.ap_enabled?(user) do
116 ActivityPub.make_user_from_ap_id(id)