@callback describe() :: {:ok | :error, Map.t()}
def describe(policies) do
- policies
- |> Enum.reduce({:ok, %{}}, fn
- policy, {:ok, data} ->
- {:ok, policy_data} = policy.describe()
- {:ok, Map.merge(data, policy_data)}
+ {:ok, policy_configs} =
+ policies
+ |> Enum.reduce({:ok, %{}}, fn
+ policy, {:ok, data} ->
+ {:ok, policy_data} = policy.describe()
+ {:ok, Map.merge(data, policy_data)}
- _, error ->
- error
- end)
+ _, error ->
+ error
+ end)
+
+ mrf_policies =
+ get_policies()
+ |> Enum.map(fn policy -> to_string(policy) |> String.split(".") |> List.last() end)
+
+ exclusions = Pleroma.Config.get([:instance, :mrf_transparency_exclusions])
+
+ base =
+ %{
+ mrf_policies: mrf_policies,
+ exclusions: length(exclusions) > 0,
+ }
+ |> Map.merge(policy_configs)
+
+ {:ok, base}
end
def describe(), do: get_policies() |> describe()
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
defmodule Pleroma.Web.ActivityPub.MRF.AntiLinkSpamPolicy do
alias Pleroma.User
+ @behaviour Pleroma.Web.ActivityPub.MRF
+
require Logger
# has the user successfully posted before?
defp contains_links?(_), do: false
+ @impl true
def filter(%{"type" => "Create", "actor" => actor, "object" => object} = message) do
with {:ok, %User{} = u} <- User.get_or_fetch_by_ap_id(actor),
{:contains_links, true} <- {:contains_links, contains_links?(object)},
# in all other cases, pass through
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
Logger.info("REJECTING #{inspect(object)}")
{:reject, object}
end
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
end
def filter(object), do: {:ok, object}
+
+ def describe(), do: {:ok, %{}}
end
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{mrf_hellthread: Pleroma.Config.get([:mrf_hellthread])}}
end
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe() do
+ # This horror is needed to convert regex sigils to strings
+ mrf_keyword =
+ Pleroma.Config.get(:mrf_keyword, [])
+ |> Enum.map(fn {key, value} ->
+ {key,
+ Enum.map(value, fn
+ {pattern, replacement} ->
+ %{
+ "pattern" =>
+ if not is_binary(pattern) do
+ inspect(pattern)
+ else
+ pattern
+ end,
+ "replacement" => replacement
+ }
+
+ pattern ->
+ if not is_binary(pattern) do
+ inspect(pattern)
+ else
+ pattern
+ end
+ end)}
+ end)
+ |> Enum.into(%{})
+
+ {:ok, %{mrf_keyword: mrf_keyword}}
+ end
end
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
@impl true
def filter(object), do: {:ok, object}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
def filter(object) do
{:ok, object}
end
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
end
def filter(object), do: {:ok, object}
+
+ def describe(), do: {:ok, %{}}
end
@impl true
def filter(object), do: {:ok, object}
+
+ @impl true
+ def describe(), do: {:ok, %{mrf_rejectnonpublic: Pleroma.Config.get([:mrf_rejectnonpublic])}}
end
end
def filter(object), do: {:ok, object}
+
+ @impl true
+ def describe() do
+ exclusions = Pleroma.Config.get([:instance, :mrf_transparency_exclusions])
+
+ mrf_simple =
+ Pleroma.Config.get(:mrf_simple)
+ |> Enum.map(fn {k, v} -> {k, Enum.reject(v, fn v -> v in exclusions end)} end)
+ |> Enum.into(%{})
+
+ {:ok, %{mrf_simple: mrf_simple}}
+ end
end
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
@impl true
def filter(message), do: {:ok, message}
+
+ @impl true
+ def describe(), do: {:ok, %{}}
end
end
def filter(object), do: {:ok, object}
+
+ @impl true
+ def describe() do
+ mrf_user_allowlist =
+ Config.get([:mrf_user_allowlist], [])
+ |> Enum.into(%{}, fn {k, v} -> {k, length(v)} end)
+
+ {:ok, %{mrf_user_allowlist: mrf_user_allowlist}}
+ end
end