honkoma/lib/pleroma/web/mastodon_api/controllers/mastodon_api_controller.ex

589 lines
17 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
2018-12-31 15:41:47 +00:00
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.MastodonAPI.MastodonAPIController do
use Pleroma.Web, :controller
import Pleroma.Web.ControllerHelper, only: [add_link_headers: 2]
2019-02-09 15:16:26 +00:00
alias Pleroma.Activity
2019-04-14 12:45:56 +00:00
alias Pleroma.Bookmark
2019-02-09 15:16:26 +00:00
alias Pleroma.Config
2019-05-25 04:24:21 +00:00
alias Pleroma.HTTP
2019-02-09 15:16:26 +00:00
alias Pleroma.Object
alias Pleroma.Pagination
alias Pleroma.Plugs.OAuthScopesPlug
alias Pleroma.Plugs.RateLimiter
2019-02-09 15:16:26 +00:00
alias Pleroma.Repo
alias Pleroma.Stats
alias Pleroma.User
2017-09-07 06:58:10 +00:00
alias Pleroma.Web
alias Pleroma.Web.ActivityPub.ActivityPub
alias Pleroma.Web.ActivityPub.Visibility
alias Pleroma.Web.CommonAPI
2019-02-09 15:16:26 +00:00
alias Pleroma.Web.MastodonAPI.AccountView
alias Pleroma.Web.MastodonAPI.AppView
2019-02-09 15:16:26 +00:00
alias Pleroma.Web.MastodonAPI.MastodonView
alias Pleroma.Web.MastodonAPI.StatusView
alias Pleroma.Web.MediaProxy
2019-02-09 15:16:26 +00:00
alias Pleroma.Web.OAuth.App
alias Pleroma.Web.OAuth.Authorization
alias Pleroma.Web.OAuth.Scopes
2019-02-09 15:16:26 +00:00
alias Pleroma.Web.OAuth.Token
alias Pleroma.Web.TwitterAPI.TwitterAPI
2018-12-06 13:50:20 +00:00
2017-11-19 01:22:07 +00:00
require Logger
@unauthenticated_access %{fallback: :proceed_unauthenticated, scopes: []}
# Note: :index action handles attempt of unauthenticated access to private instance with redirect
plug(
OAuthScopesPlug,
Map.merge(@unauthenticated_access, %{scopes: ["read"], skip_instance_privacy_check: true})
when action == :index
)
plug(
OAuthScopesPlug,
%{scopes: ["read"]} when action in [:suggestions, :verify_app_credentials]
)
plug(OAuthScopesPlug, %{scopes: ["write:accounts"]} when action == :put_settings)
plug(
OAuthScopesPlug,
%{@unauthenticated_access | scopes: ["read:statuses"]} when action == :get_poll
)
plug(OAuthScopesPlug, %{scopes: ["write:statuses"]} when action == :poll_vote)
plug(OAuthScopesPlug, %{scopes: ["read:favourites"]} when action == :favourites)
plug(OAuthScopesPlug, %{scopes: ["write:media"]} when action in [:upload, :update_media])
plug(
OAuthScopesPlug,
%{scopes: ["follow", "read:blocks"]} when action == :blocks
)
# To do: POST /api/v1/follows is not present in Mastodon; consider removing the action
plug(
OAuthScopesPlug,
%{scopes: ["follow", "write:follows"]} when action == :follows
)
plug(OAuthScopesPlug, %{scopes: ["follow", "read:mutes"]} when action == :mutes)
# Note: scope not present in Mastodon: read:bookmarks
plug(OAuthScopesPlug, %{scopes: ["read:bookmarks"]} when action == :bookmarks)
# An extra safety measure for possible actions not guarded by OAuth permissions specification
plug(
Pleroma.Plugs.EnsurePublicOrAuthenticatedPlug
when action not in [
:create_app,
:index,
:login,
:logout,
:password_reset,
:masto_instance,
:peers,
:custom_emojis
]
)
plug(RateLimiter, :password_reset when action == :password_reset)
2019-06-11 07:28:39 +00:00
@local_mastodon_name "Mastodon-Local"
action_fallback(Pleroma.Web.MastodonAPI.FallbackController)
def create_app(conn, params) do
scopes = Scopes.fetch_scopes(params, ["read"])
app_attrs =
params
|> Map.drop(["scope", "scopes"])
|> Map.put("scopes", scopes)
with cs <- App.register_changeset(%App{}, app_attrs),
false <- cs.changes[:client_name] == @local_mastodon_name,
{:ok, app} <- Repo.insert(cs) do
conn
|> put_view(AppView)
|> render("show.json", %{app: app})
end
end
def verify_app_credentials(%{assigns: %{user: _user, token: token}} = conn, _) do
with %Token{app: %App{} = app} <- Repo.preload(token, :app) do
conn
|> put_view(AppView)
|> render("short.json", %{app: app})
end
end
2019-05-13 20:52:16 +00:00
@mastodon_api_level "2.7.2"
2017-09-15 08:26:28 +00:00
2017-09-07 06:58:10 +00:00
def masto_instance(conn, _params) do
2019-02-03 17:44:18 +00:00
instance = Config.get(:instance)
2017-09-07 06:58:10 +00:00
response = %{
2018-03-30 13:01:53 +00:00
uri: Web.base_url(),
title: Keyword.get(instance, :name),
description: Keyword.get(instance, :description),
2018-11-20 16:55:03 +00:00
version: "#{@mastodon_api_level} (compatible; #{Pleroma.Application.named_version()})",
email: Keyword.get(instance, :email),
2017-09-15 08:26:28 +00:00
urls: %{
streaming_api: Pleroma.Web.Endpoint.websocket_url()
2017-09-15 08:26:28 +00:00
},
2018-03-30 13:01:53 +00:00
stats: Stats.get_stats(),
thumbnail: Web.base_url() <> "/instance/thumbnail.jpeg",
languages: ["en"],
registrations: Pleroma.Config.get([:instance, :registrations_open]),
# Extra (not present in Mastodon):
max_toot_chars: Keyword.get(instance, :limit),
poll_limits: Keyword.get(instance, :poll_limits)
}
2017-09-07 06:58:10 +00:00
json(conn, response)
end
2017-09-09 11:15:01 +00:00
def peers(conn, _params) do
2018-03-30 13:01:53 +00:00
json(conn, Stats.get_peers())
end
defp mastodonized_emoji do
Pleroma.Emoji.get_all()
2019-08-31 07:14:53 +00:00
|> Enum.map(fn {shortcode, %Pleroma.Emoji{file: relative_url, tags: tags}} ->
2018-03-30 13:01:53 +00:00
url = to_string(URI.merge(Web.base_url(), relative_url))
%{
"shortcode" => shortcode,
"static_url" => url,
"visible_in_picker" => true,
"url" => url,
"tags" => tags,
# Assuming that a comma is authorized in the category name
"category" => (tags -- ["Custom"]) |> Enum.join(",")
}
end)
2017-09-14 11:22:09 +00:00
end
def custom_emojis(conn, _params) do
mastodon_emoji = mastodonized_emoji()
2018-03-30 13:01:53 +00:00
json(conn, mastodon_emoji)
end
2019-05-21 17:40:35 +00:00
def get_poll(%{assigns: %{user: user}} = conn, %{"id" => id}) do
with %Object{} = object <- Object.get_by_id_and_maybe_refetch(id, interval: 60),
2019-05-21 17:40:35 +00:00
%Activity{} = activity <- Activity.get_create_by_object_ap_id(object.data["id"]),
true <- Visibility.visible_for_user?(activity, user) do
2018-12-16 16:49:42 +00:00
conn
2019-05-21 17:40:35 +00:00
|> put_view(StatusView)
|> try_render("poll.json", %{object: object, for: user})
else
error when is_nil(error) or error == false ->
render_error(conn, :not_found, "Record not found")
2017-09-14 16:30:05 +00:00
end
end
defp get_cached_vote_or_vote(user, object, choices) do
idempotency_key = "polls:#{user.id}:#{object.data["id"]}"
{_, res} =
Cachex.fetch(:idempotency_cache, idempotency_key, fn _ ->
case CommonAPI.vote(user, object, choices) do
{:error, _message} = res -> {:ignore, res}
res -> {:commit, res}
end
end)
2017-09-14 16:30:05 +00:00
res
2018-05-26 16:03:32 +00:00
end
def poll_vote(%{assigns: %{user: user}} = conn, %{"id" => id, "choices" => choices}) do
with %Object{} = object <- Object.get_by_id(id),
true <- object.data["type"] == "Question",
%Activity{} = activity <- Activity.get_create_by_object_ap_id(object.data["id"]),
true <- Visibility.visible_for_user?(activity, user),
{:ok, _activities, object} <- get_cached_vote_or_vote(user, object, choices) do
2018-12-16 16:49:42 +00:00
conn
|> put_view(StatusView)
|> try_render("poll.json", %{object: object, for: user})
2018-05-26 16:16:20 +00:00
else
nil ->
render_error(conn, :not_found, "Record not found")
false ->
render_error(conn, :not_found, "Record not found")
2018-05-26 16:16:20 +00:00
{:error, message} ->
conn
|> put_status(:unprocessable_entity)
|> json(%{error: message})
2018-05-26 16:16:20 +00:00
end
end
2019-09-06 18:50:00 +00:00
def update_media(
%{assigns: %{user: user}} = conn,
%{"id" => id, "description" => description} = _
)
when is_binary(description) do
with %Object{} = object <- Repo.get(Object, id),
true <- Object.authorize_mutation(object, user),
2019-09-06 18:50:00 +00:00
{:ok, %Object{data: data}} <- Object.update_data(object, %{"name" => description}) do
attachment_data = Map.put(data, "id", object.id)
2018-12-16 16:49:42 +00:00
conn
|> put_view(StatusView)
|> render("attachment.json", %{attachment: attachment_data})
2018-05-26 18:03:23 +00:00
end
end
2018-05-26 16:16:20 +00:00
2019-09-06 18:50:00 +00:00
def update_media(_conn, _data), do: {:error, :bad_request}
def upload(%{assigns: %{user: user}} = conn, %{"file" => file} = data) do
with {:ok, object} <-
2019-01-27 12:39:20 +00:00
ActivityPub.upload(
file,
actor: User.ap_id(user),
description: Map.get(data, "description")
) do
attachment_data = Map.put(object.data, "id", object.id)
2017-09-14 16:30:05 +00:00
2018-12-16 16:49:42 +00:00
conn
|> put_view(StatusView)
|> render("attachment.json", %{attachment: attachment_data})
2017-10-28 21:07:38 +00:00
end
end
2019-09-30 12:10:54 +00:00
def follows(%{assigns: %{user: follower}} = conn, %{"uri" => uri}) do
2019-04-15 09:37:49 +00:00
with {_, %User{} = followed} <- {:followed, User.get_cached_by_nickname(uri)},
{_, true} <- {:followed, follower.id != followed.id},
{:ok, follower, followed, _} <- CommonAPI.follow(follower, followed) do
2018-12-16 16:49:42 +00:00
conn
|> put_view(AccountView)
2019-09-30 12:10:54 +00:00
|> render("show.json", %{user: followed, for: follower})
else
{:followed, _} ->
{:error, :not_found}
{:error, message} ->
conn
|> put_status(:forbidden)
|> json(%{error: message})
end
end
def mutes(%{assigns: %{user: user}} = conn, _) do
with muted_accounts <- User.muted_users(user) do
2019-09-30 12:10:54 +00:00
res = AccountView.render("index.json", users: muted_accounts, for: user, as: :user)
json(conn, res)
end
end
2017-11-03 07:51:17 +00:00
def blocks(%{assigns: %{user: user}} = conn, _) do
with blocked_accounts <- User.blocked_users(user) do
2019-09-30 12:10:54 +00:00
res = AccountView.render("index.json", users: blocked_accounts, for: user, as: :user)
2017-11-03 07:51:17 +00:00
json(conn, res)
end
end
def favourites(%{assigns: %{user: user}} = conn, params) do
2018-03-30 13:01:53 +00:00
params =
params
2018-03-30 13:01:53 +00:00
|> Map.put("type", "Create")
|> Map.put("favorited_by", user.ap_id)
|> Map.put("blocking_user", user)
2018-03-30 13:01:53 +00:00
activities =
ActivityPub.fetch_activities([], params)
2018-03-30 13:01:53 +00:00
|> Enum.reverse()
conn
|> add_link_headers(activities)
2018-12-16 16:49:42 +00:00
|> put_view(StatusView)
|> render("index.json", %{activities: activities, for: user, as: :activity})
end
2019-04-14 12:45:56 +00:00
def bookmarks(%{assigns: %{user: user}} = conn, params) do
2019-04-22 07:20:43 +00:00
user = User.get_cached_by_id(user.id)
2019-04-14 12:45:56 +00:00
bookmarks =
Bookmark.for_user_query(user.id)
|> Pagination.fetch_paginated(params)
2018-09-19 00:04:56 +00:00
activities =
2019-04-14 12:45:56 +00:00
bookmarks
|> Enum.map(fn b -> Map.put(b.activity, :bookmark, Map.delete(b, :activity)) end)
2018-09-19 00:04:56 +00:00
conn
|> add_link_headers(bookmarks)
2018-09-19 00:04:56 +00:00
|> put_view(StatusView)
|> render("index.json", %{activities: activities, for: user, as: :activity})
end
2017-11-12 13:23:05 +00:00
def index(%{assigns: %{user: user}} = conn, _params) do
token = get_session(conn, :oauth_token)
2017-11-12 13:23:05 +00:00
if user && token do
mastodon_emoji = mastodonized_emoji()
2018-09-22 02:48:42 +00:00
2019-02-03 17:44:18 +00:00
limit = Config.get([:instance, :limit])
2019-09-30 12:10:54 +00:00
accounts = Map.put(%{}, user.id, AccountView.render("show.json", %{user: user, for: user}))
2018-03-30 13:01:53 +00:00
initial_state =
%{
meta: %{
streaming_api_base_url: Pleroma.Web.Endpoint.websocket_url(),
2018-03-30 13:01:53 +00:00
access_token: token,
locale: "en",
domain: Pleroma.Web.Endpoint.host(),
admin: "1",
me: "#{user.id}",
unfollow_modal: false,
boost_modal: false,
delete_modal: true,
auto_play_gif: false,
2018-06-04 15:44:08 +00:00
display_sensitive_media: false,
reduce_motion: false,
max_toot_chars: limit,
mascot: User.get_mascot(user)["url"]
2017-11-12 13:23:05 +00:00
},
poll_limits: Config.get([:instance, :poll_limits]),
rights: %{
2019-02-03 17:44:18 +00:00
delete_others_notice: present?(user.info.is_moderator),
admin: present?(user.info.is_admin)
},
2018-03-30 13:01:53 +00:00
compose: %{
me: "#{user.id}",
2018-11-20 19:12:39 +00:00
default_privacy: user.info.default_scope,
default_sensitive: false,
allow_content_types: Config.get([:instance, :allowed_post_formats])
2018-03-30 13:01:53 +00:00
},
media_attachments: %{
accept_content_types: [
".jpg",
".jpeg",
".png",
".gif",
".webm",
".mp4",
".m4v",
"image\/jpeg",
"image\/png",
"image\/gif",
"video\/webm",
"video\/mp4"
]
},
2018-04-10 16:38:52 +00:00
settings:
user.info.settings ||
2018-04-10 16:38:52 +00:00
%{
onboarded: true,
home: %{
shows: %{
reblog: true,
reply: true
}
},
notifications: %{
alerts: %{
follow: true,
favourite: true,
reblog: true,
mention: true
},
shows: %{
follow: true,
favourite: true,
reblog: true,
mention: true
},
sounds: %{
follow: true,
favourite: true,
reblog: true,
mention: true
}
}
2018-03-30 13:01:53 +00:00
},
push_subscription: nil,
accounts: accounts,
custom_emojis: mastodon_emoji,
char_limit: limit
2018-03-30 13:01:53 +00:00
}
|> Jason.encode!()
2017-11-12 13:23:05 +00:00
conn
|> put_layout(false)
2018-12-16 16:49:42 +00:00
|> put_view(MastodonView)
2019-05-31 23:42:46 +00:00
|> render("index.html", %{initial_state: initial_state})
2017-11-12 13:23:05 +00:00
else
conn
|> put_session(:return_to, conn.request_path)
2017-11-12 13:23:05 +00:00
|> redirect(to: "/web/login")
end
end
def put_settings(%{assigns: %{user: user}} = conn, %{"data" => settings} = _params) do
2019-09-24 07:49:02 +00:00
with {:ok, _} <- User.update_info(user, &User.Info.mastodon_settings_update(&1, settings)) do
2018-12-09 09:12:48 +00:00
json(conn, %{})
2018-04-10 16:38:52 +00:00
else
e ->
conn
|> put_status(:internal_server_error)
|> json(%{error: inspect(e)})
end
end
def login(%{assigns: %{user: %User{}}} = conn, _params) do
redirect(conn, to: local_mastodon_root_path(conn))
end
@doc "Local Mastodon FE login init action"
def login(conn, %{"code" => auth_token}) do
with {:ok, app} <- get_or_make_app(),
2019-09-06 18:50:00 +00:00
{:ok, auth} <- Authorization.get_by_token(app, auth_token),
{:ok, token} <- Token.exchange_token(app, auth) do
conn
|> put_session(:oauth_token, token.token)
|> redirect(to: local_mastodon_root_path(conn))
end
end
@doc "Local Mastodon FE callback action"
2017-11-19 01:22:07 +00:00
def login(conn, _) do
with {:ok, app} <- get_or_make_app() do
path =
2019-09-06 18:50:00 +00:00
o_auth_path(conn, :authorize,
response_type: "code",
client_id: app.client_id,
redirect_uri: ".",
scope: Enum.join(app.scopes, " ")
)
redirect(conn, to: path)
end
2017-11-12 13:23:05 +00:00
end
defp local_mastodon_root_path(conn) do
case get_session(conn, :return_to) do
nil ->
mastodon_api_path(conn, :index, ["getting-started"])
return_to ->
delete_session(conn, :return_to)
return_to
end
2017-11-12 13:23:05 +00:00
end
2019-09-06 18:50:00 +00:00
@spec get_or_make_app() :: {:ok, App.t()} | {:error, Ecto.Changeset.t()}
defp get_or_make_app do
2019-09-06 18:50:00 +00:00
App.get_or_make(
%{client_name: @local_mastodon_name, redirect_uris: "."},
["read", "write", "follow", "push"]
)
2017-11-12 13:23:05 +00:00
end
2017-11-19 12:23:16 +00:00
def logout(conn, _) do
conn
|> clear_session
|> redirect(to: "/")
end
2019-09-06 18:50:00 +00:00
# Stubs for unimplemented mastodon api
#
def empty_array(conn, _) do
Logger.debug("Unimplemented, returning an empty array")
json(conn, [])
end
def empty_object(conn, _) do
Logger.debug("Unimplemented, returning an empty object")
json(conn, %{})
end
2018-07-13 15:44:18 +00:00
def suggestions(%{assigns: %{user: user}} = conn, _) do
2019-02-03 17:44:18 +00:00
suggestions = Config.get(:suggestions)
if Keyword.get(suggestions, :enabled, false) do
api = Keyword.get(suggestions, :third_party_engine, "")
timeout = Keyword.get(suggestions, :timeout, 5000)
limit = Keyword.get(suggestions, :limit, 23)
2018-07-17 07:45:18 +00:00
2019-02-03 17:44:18 +00:00
host = Config.get([Pleroma.Web.Endpoint, :url, :host])
2018-07-17 07:45:18 +00:00
user = user.nickname
2019-02-03 17:44:18 +00:00
url =
api
|> String.replace("{{host}}", host)
|> String.replace("{{user}}", user)
2018-07-17 07:45:18 +00:00
2018-12-02 14:08:36 +00:00
with {:ok, %{status: 200, body: body}} <-
HTTP.get(url, [], adapter: [recv_timeout: timeout, pool: :default]),
2018-07-17 07:45:18 +00:00
{:ok, data} <- Jason.decode(body) do
2019-02-03 17:44:18 +00:00
data =
data
|> Enum.slice(0, limit)
2018-07-17 07:45:18 +00:00
|> Enum.map(fn x ->
x
|> Map.put("id", fetch_suggestion_id(x))
|> Map.put("avatar", MediaProxy.url(x["avatar"]))
|> Map.put("avatar_static", MediaProxy.url(x["avatar_static"]))
2018-08-28 08:01:17 +00:00
end)
2018-07-15 11:36:26 +00:00
json(conn, data)
2018-07-17 07:45:18 +00:00
else
e ->
Logger.error("Could not retrieve suggestions at fetch #{url}, #{inspect(e)}")
2018-07-17 07:45:18 +00:00
end
else
2018-07-17 07:45:18 +00:00
json(conn, [])
end
end
defp fetch_suggestion_id(attrs) do
case User.get_or_fetch(attrs["acct"]) do
{:ok, %User{id: id}} -> id
_ -> 0
end
2018-07-13 15:21:38 +00:00
end
def password_reset(conn, params) do
nickname_or_email = params["email"] || params["nickname"]
with {:ok, _} <- TwitterAPI.password_reset(nickname_or_email) do
conn
|> put_status(:no_content)
|> json("")
else
{:error, "unknown user"} ->
send_resp(conn, :not_found, "")
{:error, _} ->
send_resp(conn, :bad_request, "")
end
end
2018-12-16 16:49:42 +00:00
def try_render(conn, target, params)
when is_binary(target) do
case render(conn, target, params) do
nil -> render_error(conn, :not_implemented, "Can't display this activity")
res -> res
end
end
2018-12-16 16:49:42 +00:00
def try_render(conn, _, _) do
render_error(conn, :not_implemented, "Can't display this activity")
end
2019-02-03 17:44:18 +00:00
defp present?(nil), do: false
defp present?(false), do: false
defp present?(_), do: true
end