2016-11-15 17:56:29 +02:00
# frozen_string_literal: true
2017-05-02 03:14:47 +03:00
# == Schema Information
#
# Table name: accounts
#
2020-04-27 00:29:08 +03:00
# id :bigint(8) not null, primary key
# username :string default(""), not null
# domain :string
# secret :string default(""), not null
# private_key :text
# public_key :text default(""), not null
# remote_url :string default(""), not null
# salmon_url :string default(""), not null
# hub_url :string default(""), not null
# created_at :datetime not null
# updated_at :datetime not null
# note :text default(""), not null
# display_name :string default(""), not null
# uri :string default(""), not null
# url :string
# avatar_file_name :string
# avatar_content_type :string
# avatar_file_size :integer
# avatar_updated_at :datetime
# header_file_name :string
# header_content_type :string
# header_file_size :integer
# header_updated_at :datetime
# avatar_remote_url :string
# subscription_expires_at :datetime
# locked :boolean default(FALSE), not null
# header_remote_url :string default(""), not null
# last_webfingered_at :datetime
# inbox_url :string default(""), not null
# outbox_url :string default(""), not null
# shared_inbox_url :string default(""), not null
# followers_url :string default(""), not null
# protocol :integer default("ostatus"), not null
# memorial :boolean default(FALSE), not null
# moved_to_account_id :bigint(8)
# featured_collection_url :string
# fields :jsonb
# actor_type :string
# discoverable :boolean
# also_known_as :string is an Array
# silenced_at :datetime
# suspended_at :datetime
# trust_level :integer
# hide_collections :boolean
# avatar_storage_schema_version :integer
# header_storage_schema_version :integer
2020-06-02 20:24:53 +03:00
# devices_url :string
2020-11-04 21:45:01 +02:00
# sensitized_at :datetime
2020-11-08 01:28:39 +02:00
# suspension_origin :integer
2017-05-02 03:14:47 +03:00
#
2016-11-15 17:56:29 +02:00
2016-08-17 18:56:23 +03:00
class Account < ApplicationRecord
2018-11-27 13:28:01 +02:00
USERNAME_RE = / [a-z0-9_]+([a-z0-9_ \ .-]+[a-z0-9_]+)? /i
2019-12-30 20:20:43 +02:00
MENTION_RE = / (?<=^|[^ \/ [:word:]])@(( #{ USERNAME_RE } )(?:@[[:word:] \ . \ -]+[a-z0-9]+)?) /i
2017-05-05 22:37:02 +03:00
2018-12-03 02:32:08 +02:00
include AccountAssociations
2017-05-05 22:37:02 +03:00
include AccountAvatar
2017-05-31 21:28:45 +03:00
include AccountFinderConcern
2017-05-05 22:37:02 +03:00
include AccountHeader
Account domain blocks (#2381)
* Add <ostatus:conversation /> tag to Atom input/output
Only uses ref attribute (not href) because href would be
the alternate link that's always included also.
Creates new conversation for every non-reply status. Carries
over conversation for every reply. Keeps remote URIs verbatim,
generates local URIs on the fly like the rest of them.
* Conversation muting - prevents notifications that reference a conversation
(including replies, favourites, reblogs) from being created. API endpoints
/api/v1/statuses/:id/mute and /api/v1/statuses/:id/unmute
Currently no way to tell when a status/conversation is muted, so the web UI
only has a "disable notifications" button, doesn't work as a toggle
* Display "Dismiss notifications" on all statuses in notifications column, not just own
* Add "muted" as a boolean attribute on statuses JSON
For now always false on contained reblogs, since it's only relevant for
statuses returned from the notifications endpoint, which are not nested
Remove "Disable notifications" from detailed status view, since it's
only relevant in the notifications column
* Up max class length
* Remove pending test for conversation mute
* Add tests, clean up
* Rename to "mute conversation" and "unmute conversation"
* Raise validation error when trying to mute/unmute status without conversation
* Adding account domain blocks that filter notifications and public timelines
* Add tests for domain blocks in notifications, public timelines
Filter reblogs of blocked domains from home
* Add API for listing and creating account domain blocks
* API for creating/deleting domain blocks, tests for Status#ancestors
and Status#descendants, filter domain blocks from them
* Filter domains in streaming API
* Update account_domain_block_spec.rb
2017-05-19 02:14:30 +03:00
include AccountInteractions
2017-05-05 22:37:02 +03:00
include Attachmentable
2017-11-18 01:16:48 +02:00
include Paginable
2018-11-19 01:43:52 +02:00
include AccountCounters
2018-12-26 07:38:42 +02:00
include DomainNormalizable
2020-12-14 10:06:34 +02:00
include DomainMaterializable
2020-11-23 18:50:16 +02:00
include AccountMerging
2016-09-12 19:22:43 +03:00
2018-10-22 03:57:25 +03:00
MAX_DISPLAY_NAME_LENGTH = ( ENV [ 'MAX_DISPLAY_NAME_CHARS' ] || 30 ) . to_i
MAX_NOTE_LENGTH = ( ENV [ 'MAX_BIO_CHARS' ] || 500 ) . to_i
MAX_FIELDS = ( ENV [ 'MAX_PROFILE_FIELDS' ] || 4 ) . to_i
2017-09-11 03:43:52 +03:00
2019-07-13 17:45:50 +03:00
TRUST_LEVELS = {
untrusted : 0 ,
trusted : 1 ,
} . freeze
2017-07-19 18:06:46 +03:00
enum protocol : [ :ostatus , :activitypub ]
2020-11-08 01:28:39 +02:00
enum suspension_origin : [ :local , :remote ] , _prefix : true
2017-07-19 18:06:46 +03:00
2017-05-07 17:40:57 +03:00
validates :username , presence : true
2020-02-01 16:42:24 +02:00
validates_with UniqueUsernameValidator , if : - > { will_save_change_to_username? }
2017-06-08 16:22:01 +03:00
# Remote user validations
2018-07-30 23:29:52 +03:00
validates :username , format : { with : / \ A #{ USERNAME_RE } \ z /i } , if : - > { ! local? && will_save_change_to_username? }
2017-05-07 17:40:57 +03:00
# Local user validations
2019-07-19 02:44:42 +03:00
validates :username , format : { with : / \ A[a-z0-9_]+ \ z /i } , length : { maximum : 30 } , if : - > { local? && will_save_change_to_username? && actor_type != 'Application' }
2017-06-11 18:01:32 +03:00
validates_with UnreservedUsernameValidator , if : - > { local? && will_save_change_to_username? }
2018-10-22 03:57:25 +03:00
validates :display_name , length : { maximum : MAX_DISPLAY_NAME_LENGTH } , if : - > { local? && will_save_change_to_display_name? }
2019-01-10 20:12:10 +02:00
validates :note , note_length : { maximum : MAX_NOTE_LENGTH } , if : - > { local? && will_save_change_to_note? }
2018-10-22 03:57:25 +03:00
validates :fields , length : { maximum : MAX_FIELDS } , if : - > { local? && will_save_change_to_fields? }
2016-03-16 12:18:09 +02:00
2016-09-20 01:39:03 +03:00
scope :remote , - > { where . not ( domain : nil ) }
scope :local , - > { where ( domain : nil ) }
2017-08-21 18:32:41 +03:00
scope :expiring , - > ( time ) { remote . where . not ( subscription_expires_at : nil ) . where ( 'subscription_expires_at < ?' , time ) }
2018-04-17 14:50:48 +03:00
scope :partitioned , - > { order ( Arel . sql ( 'row_number() over (partition by domain)' ) ) }
2019-05-14 20:05:02 +03:00
scope :silenced , - > { where . not ( silenced_at : nil ) }
scope :suspended , - > { where . not ( suspended_at : nil ) }
2020-11-04 21:45:01 +02:00
scope :sensitized , - > { where . not ( sensitized_at : nil ) }
2019-05-14 20:05:02 +03:00
scope :without_suspended , - > { where ( suspended_at : nil ) }
scope :without_silenced , - > { where ( silenced_at : nil ) }
2020-12-15 18:23:58 +02:00
scope :without_instance_actor , - > { where . not ( id : - 99 ) }
2017-01-08 03:55:40 +02:00
scope :recent , - > { reorder ( id : :desc ) }
2018-11-26 16:53:27 +02:00
scope :bots , - > { where ( actor_type : %w( Application Service ) ) }
2019-12-04 21:36:33 +02:00
scope :groups , - > { where ( actor_type : 'Group' ) }
2017-01-08 03:55:40 +02:00
scope :alphabetic , - > { order ( domain : :asc , username : :asc ) }
2017-05-22 22:50:58 +03:00
scope :matches_username , - > ( value ) { where ( arel_table [ :username ] . matches ( " #{ value } % " ) ) }
scope :matches_display_name , - > ( value ) { where ( arel_table [ :display_name ] . matches ( " #{ value } % " ) ) }
2017-09-13 13:30:07 +03:00
scope :matches_domain , - > ( value ) { where ( arel_table [ :domain ] . matches ( " % #{ value } % " ) ) }
2019-01-02 11:47:32 +02:00
scope :searchable , - > { without_suspended . where ( moved_to_account_id : nil ) }
2019-08-30 01:14:36 +03:00
scope :discoverable , - > { searchable . without_silenced . where ( discoverable : true ) . left_outer_joins ( :account_stat ) }
2018-12-06 18:36:11 +02:00
scope :tagged_with , - > ( tag ) { joins ( :accounts_tags ) . where ( accounts_tags : { tag_id : tag } ) }
2019-08-30 01:14:36 +03:00
scope :by_recent_status , - > { order ( Arel . sql ( '(case when account_stats.last_status_at is null then 1 else 0 end) asc, account_stats.last_status_at desc, accounts.id desc' ) ) }
2020-03-08 16:39:13 +02:00
scope :by_recent_sign_in , - > { order ( Arel . sql ( '(case when users.current_sign_in_at is null then 1 else 0 end) asc, users.current_sign_in_at desc, accounts.id desc' ) ) }
2018-12-17 05:32:36 +02:00
scope :popular , - > { order ( 'account_stats.followers_count desc' ) }
2019-06-22 01:13:10 +03:00
scope :by_domain_and_subdomains , - > ( domain ) { where ( domain : domain ) . or ( where ( arel_table [ :domain ] . matches ( '%.' + domain ) ) ) }
2019-08-30 01:14:36 +03:00
scope :not_excluded_by_account , - > ( account ) { where . not ( id : account . excluded_from_timeline_account_ids ) }
scope :not_domain_blocked_by_account , - > ( account ) { where ( arel_table [ :domain ] . eq ( nil ) . or ( arel_table [ :domain ] . not_in ( account . excluded_from_timeline_domains ) ) ) }
2016-10-16 19:57:54 +03:00
2017-04-28 16:12:37 +03:00
delegate :email ,
2018-04-10 10:16:06 +03:00
:unconfirmed_email ,
2017-05-01 17:31:02 +03:00
:current_sign_in_ip ,
:current_sign_in_at ,
:confirmed? ,
2019-03-14 06:28:30 +02:00
:approved? ,
:pending? ,
2019-06-20 03:52:34 +03:00
:disabled? ,
2019-09-11 17:32:44 +03:00
:unconfirmed_or_pending? ,
2019-06-20 03:52:34 +03:00
:role ,
2017-08-16 18:12:58 +03:00
:admin? ,
2017-11-17 02:22:38 +02:00
:moderator? ,
:staff? ,
2017-05-09 00:10:50 +03:00
:locale ,
2018-05-18 03:26:51 +03:00
:hides_network? ,
2019-01-21 20:36:33 +02:00
:shows_application? ,
2017-05-01 17:31:02 +03:00
to : :user ,
prefix : true ,
allow_nil : true
2017-04-28 16:12:37 +03:00
2018-06-17 14:54:02 +03:00
delegate :chosen_languages , to : :user , prefix : false , allow_nil : true
2017-05-01 18:42:13 +03:00
2019-10-01 02:19:11 +03:00
update_index ( 'accounts#account' , :self )
2019-08-16 02:24:03 +03:00
2016-02-22 17:00:20 +02:00
def local?
2016-09-29 22:28:21 +03:00
domain . nil?
2016-02-22 17:00:20 +02:00
end
2017-11-18 20:39:02 +02:00
def moved?
moved_to_account_id . present?
end
2018-05-07 10:31:07 +03:00
def bot?
%w( Application Service ) . include? actor_type
end
2019-07-19 02:44:42 +03:00
def instance_actor?
id == - 99
end
2018-05-07 10:31:07 +03:00
alias bot bot?
def bot = ( val )
self . actor_type = ActiveModel :: Type :: Boolean . new . cast ( val ) ? 'Service' : 'Person'
end
2019-12-04 21:36:33 +02:00
def group?
actor_type == 'Group'
end
alias group group?
2016-02-22 19:10:30 +02:00
def acct
2016-09-29 22:28:21 +03:00
local? ? username : " #{ username } @ #{ domain } "
2016-02-22 19:10:30 +02:00
end
2019-12-30 20:20:43 +02:00
def pretty_acct
local? ? username : " #{ username } @ #{ Addressable :: IDNA . to_unicode ( domain ) } "
end
2017-04-10 23:58:06 +03:00
def local_username_and_domain
" #{ username } @ #{ Rails . configuration . x . local_domain } "
end
Add local followers page to admin account UI (#9610)
* Add local followers page to admin account UI
For moderation, I often find myself wondering who, locally, is following
a remote user. Currently, to see this, I have to go back to the web UI,
paste in their full handle, click their profile, and go to the
"Followers" tab (plus, this information is incidental, and if mastodon
ever decides to resolve all of the follower information, there will be
no place local followers are shown). This PR adds a new page which is
accessible via the "following" count on the admin's account view
page, which shows the local followers. (It has filter parameters for
account location to indicate that only local followers are shown, and
leave room for expansion if mastodon ever decides to store the entire
remote follow list).
* Normalize en.yml
2018-12-27 14:15:39 +02:00
def local_followers_count
Follow . where ( target_account_id : id ) . count
end
2017-04-10 23:58:06 +03:00
def to_webfinger_s
" acct: #{ local_username_and_domain } "
end
2016-02-22 19:10:30 +02:00
def subscribed?
2017-05-03 20:13:04 +03:00
subscription_expires_at . present?
2016-02-22 19:10:30 +02:00
end
2019-08-16 02:24:03 +03:00
def searchable?
! ( suspended? || moved? )
end
2017-09-28 18:50:14 +03:00
def possibly_stale?
last_webfingered_at . nil? || last_webfingered_at < = 1 . day . ago
end
2019-07-13 17:45:50 +03:00
def trust_level
self [ :trust_level ] || 0
end
2017-09-28 18:50:14 +03:00
def refresh!
2019-07-07 00:26:16 +03:00
ResolveAccountService . new . call ( acct ) unless local?
2017-09-28 18:50:14 +03:00
end
2019-05-14 20:05:02 +03:00
def silenced?
silenced_at . present?
end
2019-07-13 17:45:50 +03:00
def silence! ( date = Time . now . utc )
2019-05-14 20:05:02 +03:00
update! ( silenced_at : date )
Add moderation warnings (#9519)
* Add moderation warnings
Replace individual routes for disabling, silencing, and suspending
a user, as well as the report update route, with a unified account
action controller that allows you to select an action (none,
disable, silence, suspend) as well as whether it should generate an
e-mail notification with optional custom text. That notification,
with the optional custom text, is saved as a warning.
Additionally, there are warning presets you can configure to save
time when performing the above.
* Use Account#local_username_and_domain
2018-12-22 21:02:09 +02:00
end
def unsilence!
2019-10-09 08:11:23 +03:00
update! ( silenced_at : nil )
2019-05-14 20:05:02 +03:00
end
def suspended?
2020-12-15 18:23:58 +02:00
suspended_at . present? && ! instance_actor?
Add moderation warnings (#9519)
* Add moderation warnings
Replace individual routes for disabling, silencing, and suspending
a user, as well as the report update route, with a unified account
action controller that allows you to select an action (none,
disable, silence, suspend) as well as whether it should generate an
e-mail notification with optional custom text. That notification,
with the optional custom text, is saved as a warning.
Additionally, there are warning presets you can configure to save
time when performing the above.
* Use Account#local_username_and_domain
2018-12-22 21:02:09 +02:00
end
2020-11-08 01:28:39 +02:00
def suspended_permanently?
suspended? && deletion_request . nil?
end
def suspended_temporarily?
suspended? && deletion_request . present?
end
def suspend! ( date : Time . now . utc , origin : :local )
2018-08-22 12:53:41 +03:00
transaction do
2020-09-15 15:37:58 +03:00
create_deletion_request!
2020-11-08 01:28:39 +02:00
update! ( suspended_at : date , suspension_origin : origin )
2018-08-22 12:53:41 +03:00
end
end
2017-11-07 20:06:44 +02:00
def unsuspend!
transaction do
2020-09-15 15:37:58 +03:00
deletion_request & . destroy!
2020-11-08 01:28:39 +02:00
update! ( suspended_at : nil , suspension_origin : nil )
2017-11-07 20:06:44 +02:00
end
end
2020-11-04 21:45:01 +02:00
def sensitized?
sensitized_at . present?
end
def sensitize! ( date = Time . now . utc )
update! ( sensitized_at : date )
end
def unsensitize!
update! ( sensitized_at : nil )
end
2017-11-07 20:06:44 +02:00
def memorialize!
2020-09-15 15:37:58 +03:00
update! ( memorial : true )
2017-11-07 20:06:44 +02:00
end
2019-06-05 00:11:18 +03:00
def sign?
true
end
2016-02-22 17:00:20 +02:00
def keypair
2017-08-21 18:32:41 +03:00
@keypair || = OpenSSL :: PKey :: RSA . new ( private_key || public_key )
2016-02-22 17:00:20 +02:00
end
2018-12-06 18:36:11 +02:00
def tags_as_strings = ( tag_names )
2021-01-12 10:27:38 +02:00
hashtags_map = Tag . find_or_create_by_names ( tag_names ) . index_by ( & :name )
2018-12-06 18:36:11 +02:00
# Remove hashtags that are to be deleted
tags . each do | tag |
if hashtags_map . key? ( tag . name )
hashtags_map . delete ( tag . name )
else
transaction do
tags . delete ( tag )
tag . decrement_count! ( :accounts_count )
end
end
end
# Add hashtags that were so far missing
hashtags_map . each_value do | tag |
transaction do
tags << tag
tag . increment_count! ( :accounts_count )
end
end
end
2019-01-10 19:46:17 +02:00
def also_known_as
self [ :also_known_as ] || [ ]
end
2018-04-14 13:41:08 +03:00
def fields
( self [ :fields ] || [ ] ) . map { | f | Field . new ( self , f ) }
end
def fields_attributes = ( attributes )
2018-09-18 17:45:58 +03:00
fields = [ ]
old_fields = self [ :fields ] || [ ]
2019-03-05 16:19:54 +02:00
old_fields = [ ] if old_fields . is_a? ( Hash )
2018-04-14 13:41:08 +03:00
2018-05-05 22:11:19 +03:00
if attributes . is_a? ( Hash )
attributes . each_value do | attr |
next if attr [ :name ] . blank?
2018-09-18 17:45:58 +03:00
previous = old_fields . find { | item | item [ 'value' ] == attr [ :value ] }
if previous && previous [ 'verified_at' ] . present?
attr [ :verified_at ] = previous [ 'verified_at' ]
end
2018-05-05 22:11:19 +03:00
fields << attr
end
2018-04-14 13:41:08 +03:00
end
self [ :fields ] = fields
end
def build_fields
2018-10-22 03:57:25 +03:00
return if fields . size > = MAX_FIELDS
2018-09-18 17:45:58 +03:00
tmp = self [ :fields ] || [ ]
2019-03-08 20:59:08 +02:00
tmp = [ ] if tmp . is_a? ( Hash )
2018-09-18 17:45:58 +03:00
2018-10-22 03:57:25 +03:00
( MAX_FIELDS - tmp . size ) . times do
2018-09-18 17:45:58 +03:00
tmp << { name : '' , value : '' }
end
2018-04-14 13:41:08 +03:00
2018-09-18 17:45:58 +03:00
self . fields = tmp
2018-04-14 13:41:08 +03:00
end
2017-05-05 22:37:02 +03:00
def save_with_optional_media!
2016-12-02 15:14:49 +02:00
save!
2017-01-19 03:14:57 +02:00
rescue ActiveRecord :: RecordInvalid
2019-10-09 08:10:46 +03:00
self . avatar = nil
self . header = nil
2017-01-19 03:14:57 +02:00
save!
2016-02-28 15:33:13 +02:00
end
2020-03-09 01:10:29 +02:00
def hides_followers?
hide_collections? || user_hides_network?
end
def hides_following?
hide_collections? || user_hides_network?
end
2016-03-25 03:13:30 +02:00
def object_type
:person
end
2016-02-29 20:42:08 +02:00
def to_param
2016-09-29 22:28:21 +03:00
username
2016-02-29 20:42:08 +02:00
end
2017-04-28 16:10:41 +03:00
def excluded_from_timeline_account_ids
Rails . cache . fetch ( " exclude_account_ids_for: #{ id } " ) { blocking . pluck ( :target_account_id ) + blocked_by . pluck ( :account_id ) + muting . pluck ( :target_account_id ) }
end
Account domain blocks (#2381)
* Add <ostatus:conversation /> tag to Atom input/output
Only uses ref attribute (not href) because href would be
the alternate link that's always included also.
Creates new conversation for every non-reply status. Carries
over conversation for every reply. Keeps remote URIs verbatim,
generates local URIs on the fly like the rest of them.
* Conversation muting - prevents notifications that reference a conversation
(including replies, favourites, reblogs) from being created. API endpoints
/api/v1/statuses/:id/mute and /api/v1/statuses/:id/unmute
Currently no way to tell when a status/conversation is muted, so the web UI
only has a "disable notifications" button, doesn't work as a toggle
* Display "Dismiss notifications" on all statuses in notifications column, not just own
* Add "muted" as a boolean attribute on statuses JSON
For now always false on contained reblogs, since it's only relevant for
statuses returned from the notifications endpoint, which are not nested
Remove "Disable notifications" from detailed status view, since it's
only relevant in the notifications column
* Up max class length
* Remove pending test for conversation mute
* Add tests, clean up
* Rename to "mute conversation" and "unmute conversation"
* Raise validation error when trying to mute/unmute status without conversation
* Adding account domain blocks that filter notifications and public timelines
* Add tests for domain blocks in notifications, public timelines
Filter reblogs of blocked domains from home
* Add API for listing and creating account domain blocks
* API for creating/deleting domain blocks, tests for Status#ancestors
and Status#descendants, filter domain blocks from them
* Filter domains in streaming API
* Update account_domain_block_spec.rb
2017-05-19 02:14:30 +03:00
def excluded_from_timeline_domains
Rails . cache . fetch ( " exclude_domains_for: #{ id } " ) { domain_blocks . pluck ( :domain ) }
end
2017-11-30 04:50:05 +02:00
def preferred_inbox_url
shared_inbox_url . presence || inbox_url
end
Add follower synchronization mechanism (#14510)
* Add support for followers synchronization on the receiving end
Check the `collectionSynchronization` attribute on `Create` and `Announce`
activities and synchronize followers from provided collection if possible.
* Add tests for followers synchronization on the receiving end
* Add support for follower synchronization on the sender's end
* Add tests for the sending end
* Switch from AS attributes to HTTP header
Replace the custom `collectionSynchronization` ActivityStreams attribute by
an HTTP header (`X-AS-Collection-Synchronization`) with the same syntax as
the `Signature` header and the following fields:
- `collectionId` to specify which collection to synchronize
- `digest` for the SHA256 hex-digest of the list of followers known on the
receiving instance (where “receiving instance” is determined by accounts
sharing the same host name for their ActivityPub actor `id`)
- `url` of a collection that should be fetched by the instance actor
Internally, move away from the webfinger-based `domain` attribute and use
account `uri` prefix to group accounts.
* Add environment variable to disable followers synchronization
Since the whole mechanism relies on some new preconditions that, in some
extremely rare cases, might not be met, add an environment variable
(DISABLE_FOLLOWERS_SYNCHRONIZATION) to disable the mechanism altogether and
avoid followers being incorrectly removed.
The current conditions are:
1. all managed accounts' actor `id` and inbox URL have the same URI scheme and
netloc.
2. all accounts whose actor `id` or inbox URL share the same URI scheme and
netloc as a managed account must be managed by the same Mastodon instance
as well.
As far as Mastodon is concerned, breaking those preconditions require extensive
configuration changes in the reverse proxy and might also cause other issues.
Therefore, this environment variable provides a way out for people with highly
unusual configurations, and can be safely ignored for the overwhelming majority
of Mastodon administrators.
* Only set follower synchronization header on non-public statuses
This is to avoid unnecessary computations and allow Follow-related
activities to be handled by the usual codepath instead of going through
the synchronization mechanism (otherwise, any Follow/Undo/Accept activity
would trigger the synchronization mechanism even if processing the activity
itself would be enough to re-introduce synchronization)
* Change how ActivityPub::SynchronizeFollowersService handles follow requests
If the remote lists a local follower which we only know has sent a follow
request, consider the follow request as accepted instead of sending an Undo.
* Integrate review feeback
- rename X-AS-Collection-Synchronization to Collection-Synchronization
- various minor refactoring and code style changes
* Only select required fields when computing followers_hash
* Use actor URI rather than webfinger domain in synchronization endpoint
* Change hash computation to be a XOR of individual hashes
Makes it much easier to be memory-efficient, and avoid sorting discrepancy issues.
* Marginally improve followers_hash computation speed
* Further improve hash computation performances by using pluck_each
2020-10-21 19:04:09 +03:00
def synchronization_uri_prefix
return 'local' if local?
@synchronization_uri_prefix || = uri [ / http(s?): \/ \/ [^ \/ ]+ \/ / ]
end
2018-04-14 13:41:08 +03:00
class Field < ActiveModelSerializers :: Model
2021-01-07 10:40:55 +02:00
attributes :name , :value , :verified_at , :account
2018-09-18 17:45:58 +03:00
def initialize ( account , attributes )
2021-01-07 10:40:55 +02:00
@original_field = attributes
string_limit = account . local? ? 255 : 2047
super (
account : account ,
name : attributes [ 'name' ] . strip [ 0 , string_limit ] ,
value : attributes [ 'value' ] . strip [ 0 , string_limit ] ,
verified_at : attributes [ 'verified_at' ] & . to_datetime ,
)
2018-09-18 17:45:58 +03:00
end
def verified?
verified_at . present?
end
2018-10-04 16:47:03 +03:00
def value_for_verification
@value_for_verification || = begin
if account . local?
value
else
ActionController :: Base . helpers . strip_tags ( value )
end
end
end
2018-09-18 17:45:58 +03:00
def verifiable?
2018-10-04 16:47:03 +03:00
value_for_verification . present? && value_for_verification . start_with? ( 'http://' , 'https://' )
2018-09-18 17:45:58 +03:00
end
2018-04-14 13:41:08 +03:00
2018-09-18 17:45:58 +03:00
def mark_verified!
2021-01-07 10:40:55 +02:00
self . verified_at = Time . now . utc
@original_field [ 'verified_at' ] = verified_at
2018-04-14 13:41:08 +03:00
end
2018-05-02 16:57:37 +03:00
def to_h
2021-01-07 10:40:55 +02:00
{ name : name , value : value , verified_at : verified_at }
2018-10-04 16:47:03 +03:00
end
2018-04-14 13:41:08 +03:00
end
2016-11-09 18:48:44 +02:00
class << self
2017-09-12 01:16:03 +03:00
def readonly_attributes
super - %w( statuses_count following_count followers_count )
end
2017-08-13 01:44:41 +03:00
def inboxes
2020-12-07 13:08:30 +02:00
urls = reorder ( nil ) . where ( protocol : :activitypub ) . group ( :preferred_inbox_url ) . pluck ( Arel . sql ( " coalesce(nullif(accounts.shared_inbox_url, ''), accounts.inbox_url) AS preferred_inbox_url " ) )
2020-04-15 21:33:24 +03:00
DeliveryFailureTracker . without_unavailable ( urls )
2017-08-13 01:44:41 +03:00
end
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
def search_for ( terms , limit = 10 , offset = 0 )
2017-05-07 17:40:57 +03:00
textsearch , query = generate_query_for_search ( terms )
2017-03-17 21:47:38 +02:00
2017-04-09 15:45:01 +03:00
sql = <<-SQL.squish
2017-03-17 21:47:38 +02:00
SELECT
accounts . * ,
ts_rank_cd ( #{textsearch}, #{query}, 32) AS rank
FROM accounts
WHERE #{query} @@ #{textsearch}
2019-05-14 20:05:02 +03:00
AND accounts . suspended_at IS NULL
2017-12-12 03:14:33 +02:00
AND accounts . moved_to_account_id IS NULL
2017-03-17 21:47:38 +02:00
ORDER BY rank DESC
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
LIMIT ? OFFSET ?
2017-04-09 15:45:01 +03:00
SQL
2017-03-17 21:47:38 +02:00
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
records = find_by_sql ( [ sql , limit , offset ] )
2018-11-19 01:43:52 +02:00
ActiveRecord :: Associations :: Preloader . new . preload ( records , :account_stat )
records
2017-03-17 21:47:38 +02:00
end
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
def advanced_search_for ( terms , account , limit = 10 , following = false , offset = 0 )
2017-05-07 17:40:57 +03:00
textsearch , query = generate_query_for_search ( terms )
2017-03-17 21:47:38 +02:00
2017-12-06 00:02:27 +02:00
if following
sql = <<-SQL.squish
WITH first_degree AS (
SELECT target_account_id
FROM follows
WHERE account_id = ?
2019-11-04 14:02:01 +02:00
UNION ALL
SELECT ?
2017-12-06 00:02:27 +02:00
)
SELECT
accounts . * ,
( count ( f . id ) + 1 ) * ts_rank_cd ( #{textsearch}, #{query}, 32) AS rank
FROM accounts
2019-11-21 18:35:04 +02:00
LEFT OUTER JOIN follows AS f ON ( accounts . id = f . account_id AND f . target_account_id = ?)
2017-12-06 00:02:27 +02:00
WHERE accounts . id IN ( SELECT * FROM first_degree )
AND #{query} @@ #{textsearch}
2019-05-14 20:05:02 +03:00
AND accounts . suspended_at IS NULL
2017-12-12 03:14:33 +02:00
AND accounts . moved_to_account_id IS NULL
2017-12-06 00:02:27 +02:00
GROUP BY accounts . id
ORDER BY rank DESC
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
LIMIT ? OFFSET ?
2017-12-06 00:02:27 +02:00
SQL
2019-11-21 18:35:04 +02:00
records = find_by_sql ( [ sql , account . id , account . id , account . id , limit , offset ] )
2017-12-06 00:02:27 +02:00
else
sql = <<-SQL.squish
SELECT
accounts . * ,
( count ( f . id ) + 1 ) * ts_rank_cd ( #{textsearch}, #{query}, 32) AS rank
FROM accounts
LEFT OUTER JOIN follows AS f ON ( accounts . id = f . account_id AND f . target_account_id = ?) OR ( accounts . id = f . target_account_id AND f . account_id = ?)
WHERE #{query} @@ #{textsearch}
2019-05-14 20:05:02 +03:00
AND accounts . suspended_at IS NULL
2017-12-12 03:14:33 +02:00
AND accounts . moved_to_account_id IS NULL
2017-12-06 00:02:27 +02:00
GROUP BY accounts . id
ORDER BY rank DESC
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
LIMIT ? OFFSET ?
2017-12-06 00:02:27 +02:00
SQL
Add type, limit, offset, min_id, max_id, account_id to search API (#10091)
* Add type, limit, offset, min_id, max_id, account_id to search API
Fix #8939
* Make the offset work on accounts and hashtags search as well
* Assure brakeman we are not doing mass assignment here
* Do not allow paginating unless a type is chosen
* Fix search query and index id field on statuses instead of created_at
2019-02-26 16:21:36 +02:00
records = find_by_sql ( [ sql , account . id , account . id , limit , offset ] )
2017-12-06 00:02:27 +02:00
end
2018-11-19 01:43:52 +02:00
ActiveRecord :: Associations :: Preloader . new . preload ( records , :account_stat )
records
2017-03-17 21:47:38 +02:00
end
2020-01-23 23:00:13 +02:00
def from_text ( text )
return [ ] if text . blank?
2021-01-10 01:32:01 +02:00
text . scan ( MENTION_RE ) . map { | match | match . first . split ( '@' , 2 ) } . uniq . filter_map do | ( username , domain ) |
2020-02-28 14:49:45 +02:00
domain = begin
if TagManager . instance . local_domain? ( domain )
nil
else
TagManager . instance . normalize_domain ( domain )
end
end
EntityCache . instance . mention ( username , domain )
2021-01-10 01:32:01 +02:00
end
2020-01-23 23:00:13 +02:00
end
2017-01-08 20:12:54 +02:00
private
2017-05-07 17:40:57 +03:00
def generate_query_for_search ( terms )
terms = Arel . sql ( connection . quote ( terms . gsub ( / ['? \\ :] / , ' ' ) ) )
textsearch = " (setweight(to_tsvector('simple', accounts.display_name), 'A') || setweight(to_tsvector('simple', accounts.username), 'B') || setweight(to_tsvector('simple', coalesce(accounts.domain, '')), 'C')) "
query = " to_tsquery('simple', ''' ' || #{ terms } || ' ''' || ':*') "
[ textsearch , query ]
end
2016-10-03 18:16:58 +03:00
end
2018-04-02 00:55:42 +03:00
def emojis
2018-05-06 12:48:51 +03:00
@emojis || = CustomEmoji . from_text ( emojifiable_text , domain )
2018-04-02 00:55:42 +03:00
end
2017-04-25 03:47:31 +03:00
before_create :generate_keys
2017-07-14 20:47:53 +03:00
before_validation :prepare_contents , if : :local?
2019-03-11 21:48:24 +02:00
before_validation :prepare_username , on : :create
2018-12-03 02:32:08 +02:00
before_destroy :clean_feed_manager
2017-04-19 00:15:44 +03:00
private
2017-07-14 20:47:53 +03:00
def prepare_contents
display_name & . strip!
note & . strip!
end
2019-03-11 21:48:24 +02:00
def prepare_username
username & . squish!
end
2017-04-25 03:47:31 +03:00
def generate_keys
2019-07-19 02:44:42 +03:00
return unless local? && private_key . blank? && public_key . blank?
2017-04-25 03:47:31 +03:00
2018-05-02 16:45:24 +03:00
keypair = OpenSSL :: PKey :: RSA . new ( 2048 )
2017-04-25 03:47:31 +03:00
self . private_key = keypair . to_pem
self . public_key = keypair . public_key . to_pem
end
def normalize_domain
return if local?
2018-12-26 07:38:42 +02:00
super
2017-04-25 03:47:31 +03:00
end
2018-05-06 12:48:51 +03:00
def emojifiable_text
2019-08-11 14:15:18 +03:00
[ note , display_name , fields . map ( & :name ) , fields . map ( & :value ) ] . join ( ' ' )
2018-05-06 12:48:51 +03:00
end
2018-12-03 02:32:08 +02:00
def clean_feed_manager
2020-12-23 00:57:46 +02:00
FeedManager . instance . clean_feeds! ( :home , [ id ] )
2018-12-03 02:32:08 +02:00
end
2016-02-20 23:53:20 +02:00
end