qb_akkoma/lib/pleroma/web/twitter_api/twitter_api.ex

323 lines
9 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
2018-12-31 15:41:47 +00:00
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
2017-03-21 16:53:20 +00:00
defmodule Pleroma.Web.TwitterAPI.TwitterAPI do
2019-02-09 15:16:26 +00:00
alias Pleroma.Activity
alias Pleroma.Mailer
2019-02-09 15:16:26 +00:00
alias Pleroma.Object
alias Pleroma.Repo
alias Pleroma.User
2019-02-09 15:16:26 +00:00
alias Pleroma.UserEmail
alias Pleroma.UserInviteToken
2017-03-21 16:53:20 +00:00
alias Pleroma.Web.ActivityPub.ActivityPub
2018-12-09 09:12:48 +00:00
alias Pleroma.Web.CommonAPI
alias Pleroma.Web.TwitterAPI.UserView
2017-09-16 12:33:47 +00:00
import Ecto.Query
2017-03-21 16:53:20 +00:00
2017-11-19 01:22:07 +00:00
def create_status(%User{} = user, %{"status" => _} = data) do
CommonAPI.post(user, data)
2017-03-21 16:53:20 +00:00
end
2018-04-18 10:00:40 +00:00
def delete(%User{} = user, id) do
2018-12-09 09:12:48 +00:00
with %Activity{data: %{"type" => _type}} <- Repo.get(Activity, id),
{:ok, activity} <- CommonAPI.delete(id, user) do
{:ok, activity}
2018-04-18 10:00:40 +00:00
end
end
2017-04-13 12:32:13 +00:00
def follow(%User{} = follower, params) do
with {:ok, %User{} = followed} <- get_user(params) do
CommonAPI.follow(follower, followed)
2017-03-22 17:36:08 +00:00
end
end
2017-04-20 07:57:37 +00:00
def unfollow(%User{} = follower, params) do
2018-03-30 13:01:53 +00:00
with {:ok, %User{} = unfollowed} <- get_user(params),
{:ok, follower} <- CommonAPI.unfollow(follower, unfollowed) do
2018-03-30 13:01:53 +00:00
{:ok, follower, unfollowed}
2017-03-23 12:13:09 +00:00
end
end
2017-11-07 22:04:53 +00:00
def block(%User{} = blocker, params) do
with {:ok, %User{} = blocked} <- get_user(params),
2018-05-22 09:41:17 +00:00
{:ok, blocker} <- User.block(blocker, blocked),
{:ok, _activity} <- ActivityPub.block(blocker, blocked) do
2017-11-07 22:04:53 +00:00
{:ok, blocker, blocked}
else
err -> err
end
end
def unblock(%User{} = blocker, params) do
with {:ok, %User{} = blocked} <- get_user(params),
2018-05-22 09:41:17 +00:00
{:ok, blocker} <- User.unblock(blocker, blocked),
{:ok, _activity} <- ActivityPub.unblock(blocker, blocked) do
2017-11-07 22:04:53 +00:00
{:ok, blocker, blocked}
else
err -> err
end
end
2017-09-09 15:48:57 +00:00
def repeat(%User{} = user, ap_id_or_id) do
with {:ok, _announce, %{data: %{"id" => id}}} <- CommonAPI.repeat(ap_id_or_id, user),
%Activity{} = activity <- Activity.get_create_by_object_ap_id(id) do
{:ok, activity}
2017-09-09 15:48:57 +00:00
end
2017-04-15 11:54:46 +00:00
end
def unrepeat(%User{} = user, ap_id_or_id) do
with {:ok, _unannounce, %{data: %{"id" => id}}} <- CommonAPI.unrepeat(ap_id_or_id, user),
%Activity{} = activity <- Activity.get_create_by_object_ap_id(id) do
2018-04-18 10:00:40 +00:00
{:ok, activity}
end
end
def pin(%User{} = user, ap_id_or_id) do
CommonAPI.pin(ap_id_or_id, user)
end
def unpin(%User{} = user, ap_id_or_id) do
CommonAPI.unpin(ap_id_or_id, user)
end
2017-09-09 16:09:37 +00:00
def fav(%User{} = user, ap_id_or_id) do
with {:ok, _fav, %{data: %{"id" => id}}} <- CommonAPI.favorite(ap_id_or_id, user),
%Activity{} = activity <- Activity.get_create_by_object_ap_id(id) do
{:ok, activity}
2017-09-09 16:09:37 +00:00
end
end
2017-09-09 16:30:02 +00:00
def unfav(%User{} = user, ap_id_or_id) do
with {:ok, _unfav, _fav, %{data: %{"id" => id}}} <- CommonAPI.unfavorite(ap_id_or_id, user),
%Activity{} = activity <- Activity.get_create_by_object_ap_id(id) do
{:ok, activity}
2017-09-09 16:30:02 +00:00
end
end
def upload(%Plug.Upload{} = file, %User{} = user, format \\ "xml") do
{:ok, object} = ActivityPub.upload(file, actor: User.ap_id(user))
2017-03-29 00:05:51 +00:00
2017-03-30 14:08:23 +00:00
url = List.first(object.data["url"])
2018-11-23 16:40:45 +00:00
href = url["href"]
2017-03-30 14:08:23 +00:00
type = url["mediaType"]
case format do
"xml" ->
# Fake this as good as possible...
"""
<?xml version="1.0" encoding="UTF-8"?>
<rsp stat="ok" xmlns:atom="http://www.w3.org/2005/Atom">
<mediaid>#{object.id}</mediaid>
<media_id>#{object.id}</media_id>
<media_id_string>#{object.id}</media_id_string>
<media_url>#{href}</media_url>
<mediaurl>#{href}</mediaurl>
<atom:link rel="enclosure" href="#{href}" type="#{type}"></atom:link>
</rsp>
"""
2018-03-30 13:01:53 +00:00
"json" ->
%{
media_id: object.id,
media_id_string: "#{object.id}}",
media_url: href,
size: 0
2018-03-30 13:01:53 +00:00
}
|> Jason.encode!()
end
2017-03-29 00:05:51 +00:00
end
2017-04-16 08:25:27 +00:00
def register_user(params) do
token_string = params["token"]
2018-06-12 11:52:54 +00:00
2017-04-16 08:25:27 +00:00
params = %{
nickname: params["nickname"],
name: params["fullname"],
2018-12-02 19:03:53 +00:00
bio: User.parse_bio(params["bio"]),
2017-04-16 08:25:27 +00:00
email: params["email"],
password: params["password"],
password_confirmation: params["confirm"],
captcha_solution: params["captcha_solution"],
captcha_token: params["captcha_token"],
captcha_answer_data: params["captcha_answer_data"]
2017-04-16 08:25:27 +00:00
}
2018-12-14 23:00:00 +00:00
captcha_enabled = Pleroma.Config.get([Pleroma.Captcha, :enabled])
# true if captcha is disabled or enabled and valid, false otherwise
2018-12-15 19:08:26 +00:00
captcha_ok =
if !captcha_enabled do
:ok
2018-12-15 19:08:26 +00:00
else
Pleroma.Captcha.validate(
params[:captcha_token],
params[:captcha_solution],
params[:captcha_answer_data]
)
2018-12-15 19:08:26 +00:00
end
2018-12-14 23:00:00 +00:00
# Captcha invalid
if captcha_ok != :ok do
{:error, error} = captcha_ok
# I have no idea how this error handling works
{:error, %{error: Jason.encode!(%{captcha: [error]})}}
else
registrations_open = Pleroma.Config.get([:instance, :registrations_open])
# no need to query DB if registration is open
token =
unless registrations_open || is_nil(token_string) do
Repo.get_by(UserInviteToken, %{token: token_string})
2018-12-15 19:08:26 +00:00
end
2017-04-16 08:25:27 +00:00
2018-12-18 14:30:30 +00:00
cond do
registrations_open || (!is_nil(token) && !token.used) ->
changeset = User.register_changeset(%User{}, params)
with {:ok, user} <- User.register(changeset) do
!registrations_open && UserInviteToken.mark_as_used(token.token)
{:ok, user}
else
{:error, changeset} ->
errors =
Ecto.Changeset.traverse_errors(changeset, fn {msg, _opts} -> msg end)
|> Jason.encode!()
2018-06-12 11:52:54 +00:00
2018-12-15 19:08:26 +00:00
{:error, %{error: errors}}
end
!registrations_open && is_nil(token) ->
2018-12-15 19:08:26 +00:00
{:error, "Invalid token"}
2018-03-30 13:01:53 +00:00
!registrations_open && token.used ->
2018-12-15 19:08:26 +00:00
{:error, "Expired token"}
end
2017-04-16 08:25:27 +00:00
end
end
def password_reset(nickname_or_email) do
with true <- is_binary(nickname_or_email),
%User{local: true} = user <- User.get_by_nickname_or_email(nickname_or_email),
{:ok, token_record} <- Pleroma.PasswordResetToken.create_token(user) do
user
|> UserEmail.password_reset_email(token_record.token)
2019-02-20 16:51:25 +00:00
|> Mailer.deliver_async()
else
false ->
{:error, "bad user identifier"}
%User{local: false} ->
{:error, "remote user"}
nil ->
{:error, "unknown user"}
end
end
def get_user(user \\ nil, params) do
case params do
2017-05-05 10:07:38 +00:00
%{"user_id" => user_id} ->
case target = User.get_cached_by_nickname_or_id(user_id) do
nil ->
{:error, "No user with such user_id"}
2018-03-30 13:01:53 +00:00
_ ->
{:ok, target}
end
2018-03-30 13:01:53 +00:00
2017-05-05 10:07:38 +00:00
%{"screen_name" => nickname} ->
case target = Repo.get_by(User, nickname: nickname) do
nil ->
{:error, "No user with such screen_name"}
2018-03-30 13:01:53 +00:00
_ ->
{:ok, target}
end
2018-03-30 13:01:53 +00:00
_ ->
if user do
{:ok, user}
else
2017-04-16 14:05:48 +00:00
{:error, "You need to specify screen_name or user_id"}
end
end
end
2017-11-19 01:22:07 +00:00
defp parse_int(string, default)
2018-03-30 13:01:53 +00:00
2017-09-16 12:33:47 +00:00
defp parse_int(string, default) when is_binary(string) do
with {n, _} <- Integer.parse(string) do
n
else
_e -> default
end
end
2018-03-30 13:01:53 +00:00
2017-09-16 12:33:47 +00:00
defp parse_int(_, default), do: default
def search(_user, %{"q" => query} = params) do
2017-09-16 12:33:47 +00:00
limit = parse_int(params["rpp"], 20)
page = parse_int(params["page"], 1)
offset = (page - 1) * limit
2018-03-30 13:01:53 +00:00
q =
from(
a in Activity,
where: fragment("?->>'type' = 'Create'", a.data),
where: "https://www.w3.org/ns/activitystreams#Public" in a.recipients,
2018-03-30 13:01:53 +00:00
where:
fragment(
"to_tsvector('english', ?->'object'->>'content') @@ plainto_tsquery('english', ?)",
a.data,
^query
),
limit: ^limit,
offset: ^offset,
# this one isn't indexed so psql won't take the wrong index.
order_by: [desc: :inserted_at]
)
2017-09-16 12:33:47 +00:00
_activities = Repo.all(q)
2017-09-16 12:33:47 +00:00
end
# DEPRECATED mostly, context objects are now created at insertion time.
def context_to_conversation_id(context) do
2017-05-01 14:15:21 +00:00
with %Object{id: id} <- Object.get_cached_by_ap_id(context) do
id
2018-03-30 13:01:53 +00:00
else
_e ->
changeset = Object.context_mapping(context)
case Repo.insert(changeset) do
{:ok, %{id: id}} ->
id
# This should be solved by an upsert, but it seems ecto
# has problems accessing the constraint inside the jsonb.
{:error, _} ->
Object.get_cached_by_ap_id(context).id
end
2017-05-01 14:15:21 +00:00
end
end
def conversation_id_to_context(id) do
with %Object{data: %{"id" => context}} <- Repo.get(Object, id) do
context
2018-03-30 13:01:53 +00:00
else
_e ->
{:error, "No such conversation"}
end
end
2017-05-10 16:44:57 +00:00
def get_external_profile(for_user, uri) do
2018-03-24 14:09:09 +00:00
with %User{} = user <- User.get_or_fetch(uri) do
2017-06-19 21:12:37 +00:00
{:ok, UserView.render("show.json", %{user: user, for: for_user})}
2018-03-30 13:01:53 +00:00
else
_e ->
{:error, "Couldn't find user"}
2017-05-10 16:44:57 +00:00
end
end
2017-03-21 16:53:20 +00:00
end