1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258 |
- <?php
- namespace App\Http\Controllers\Api;
- use App\AccountLog;
- use App\EmailVerification;
- use App\Http\Controllers\Controller;
- use App\Http\Controllers\StatusController;
- use App\Http\Resources\StatusStateless;
- use App\Jobs\ImageOptimizePipeline\ImageOptimize;
- use App\Jobs\ReportPipeline\ReportNotifyAdminViaEmail;
- use App\Jobs\StatusPipeline\NewStatusPipeline;
- use App\Jobs\StatusPipeline\RemoteStatusDelete;
- use App\Jobs\StatusPipeline\StatusDelete;
- use App\Jobs\VideoPipeline\VideoThumbnail;
- use App\Mail\ConfirmAppEmail;
- use App\Mail\PasswordChange;
- use App\Media;
- use App\Place;
- use App\Profile;
- use App\Report;
- use App\Services\AccountService;
- use App\Services\BouncerService;
- use App\Services\EmailService;
- use App\Services\FollowerService;
- use App\Services\MediaBlocklistService;
- use App\Services\MediaPathService;
- use App\Services\NetworkTimelineService;
- use App\Services\ProfileStatusService;
- use App\Services\PublicTimelineService;
- use App\Services\StatusService;
- use App\Status;
- use App\StatusArchived;
- use App\User;
- use App\UserSetting;
- use App\Util\Lexer\Autolink;
- use App\Util\Lexer\RestrictedNames;
- use Cache;
- use DB;
- use Illuminate\Http\Request;
- use Illuminate\Support\Facades\Hash;
- use Illuminate\Support\Facades\RateLimiter;
- use Illuminate\Support\Str;
- use Jenssegers\Agent\Agent;
- use League\Fractal;
- use League\Fractal\Serializer\ArraySerializer;
- use Mail;
- use NotificationChannels\Expo\ExpoPushToken;
- class ApiV1Dot1Controller extends Controller
- {
- protected $fractal;
- public function __construct()
- {
- $this->fractal = new Fractal\Manager();
- $this->fractal->setSerializer(new ArraySerializer());
- }
- public function json($res, $code = 200, $headers = [])
- {
- return response()->json($res, $code, $headers, JSON_UNESCAPED_SLASHES);
- }
- public function error($msg, $code = 400, $extra = [], $headers = [])
- {
- $res = [
- 'msg' => $msg,
- 'code' => $code,
- ];
- return response()->json(array_merge($res, $extra), $code, $headers, JSON_UNESCAPED_SLASHES);
- }
- public function report(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $report_type = $request->input('report_type');
- $object_id = $request->input('object_id');
- $object_type = $request->input('object_type');
- $types = [
- 'spam',
- 'sensitive',
- 'abusive',
- 'underage',
- 'violence',
- 'copyright',
- 'impersonation',
- 'scam',
- 'terrorism',
- ];
- if (! $report_type || ! $object_id || ! $object_type) {
- return $this->error('Invalid or missing parameters', 400, ['error_code' => 'ERROR_INVALID_PARAMS']);
- }
- if (! in_array($report_type, $types)) {
- return $this->error('Invalid report type', 400, ['error_code' => 'ERROR_TYPE_INVALID']);
- }
- if ($object_type === 'user' && $object_id == $user->profile_id) {
- return $this->error('Cannot self report', 400, ['error_code' => 'ERROR_NO_SELF_REPORTS']);
- }
- $rpid = null;
- switch ($object_type) {
- case 'post':
- $object = Status::find($object_id);
- if (! $object) {
- return $this->error('Invalid object id', 400, ['error_code' => 'ERROR_INVALID_OBJECT_ID']);
- }
- $object_type = 'App\Status';
- $exists = Report::whereUserId($user->id)
- ->whereObjectId($object->id)
- ->whereObjectType('App\Status')
- ->count();
- $rpid = $object->profile_id;
- break;
- case 'user':
- $object = Profile::find($object_id);
- if (! $object) {
- return $this->error('Invalid object id', 400, ['error_code' => 'ERROR_INVALID_OBJECT_ID']);
- }
- $object_type = 'App\Profile';
- $exists = Report::whereUserId($user->id)
- ->whereObjectId($object->id)
- ->whereObjectType('App\Profile')
- ->count();
- $rpid = $object->id;
- break;
- default:
- return $this->error('Invalid report type', 400, ['error_code' => 'ERROR_REPORT_OBJECT_TYPE_INVALID']);
- break;
- }
- if ($exists !== 0) {
- return $this->error('Duplicate report', 400, ['error_code' => 'ERROR_REPORT_DUPLICATE']);
- }
- if ($object->profile_id == $user->profile_id) {
- return $this->error('Cannot self report', 400, ['error_code' => 'ERROR_NO_SELF_REPORTS']);
- }
- $report = new Report;
- $report->profile_id = $user->profile_id;
- $report->user_id = $user->id;
- $report->object_id = $object->id;
- $report->object_type = $object_type;
- $report->reported_profile_id = $rpid;
- $report->type = $report_type;
- $report->save();
- if (config('instance.reports.email.enabled')) {
- ReportNotifyAdminViaEmail::dispatch($report)->onQueue('default');
- }
- $res = [
- 'msg' => 'Successfully sent report',
- 'code' => 200,
- ];
- return $this->json($res);
- }
- /**
- * DELETE /api/v1.1/accounts/avatar
- *
- * @return \App\Transformer\Api\AccountTransformer
- */
- public function deleteAvatar(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $avatar = $user->profile->avatar;
- if ($avatar->media_path == 'public/avatars/default.png' ||
- $avatar->media_path == 'public/avatars/default.jpg'
- ) {
- return AccountService::get($user->profile_id);
- }
- if (is_file(storage_path('app/'.$avatar->media_path))) {
- @unlink(storage_path('app/'.$avatar->media_path));
- }
- $avatar->media_path = 'public/avatars/default.jpg';
- $avatar->change_count = $avatar->change_count + 1;
- $avatar->save();
- Cache::forget('avatar:'.$user->profile_id);
- Cache::forget("avatar:{$user->profile_id}");
- Cache::forget('user:account:id:'.$user->id);
- AccountService::del($user->profile_id);
- return AccountService::get($user->profile_id);
- }
- /**
- * GET /api/v1.1/accounts/{id}/posts
- *
- * @return \App\Transformer\Api\StatusTransformer
- */
- public function accountPosts(Request $request, $id)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $account = AccountService::get($id);
- if (! $account || $account['username'] !== $request->input('username')) {
- return $this->json([]);
- }
- $posts = ProfileStatusService::get($id);
- if (! $posts) {
- return $this->json([]);
- }
- $res = collect($posts)
- ->map(function ($id) {
- return StatusService::get($id);
- })
- ->filter(function ($post) {
- return $post && isset($post['account']);
- })
- ->toArray();
- return $this->json($res);
- }
- /**
- * POST /api/v1.1/accounts/change-password
- *
- * @return \App\Transformer\Api\AccountTransformer
- */
- public function accountChangePassword(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $this->validate($request, [
- 'current_password' => 'bail|required|current_password',
- 'new_password' => 'required|min:'.config('pixelfed.min_password_length', 8),
- 'confirm_password' => 'required|same:new_password',
- ], [
- 'current_password' => 'The password you entered is incorrect',
- ]);
- $user->password = bcrypt($request->input('new_password'));
- $user->save();
- $log = new AccountLog;
- $log->user_id = $user->id;
- $log->item_id = $user->id;
- $log->item_type = 'App\User';
- $log->action = 'account.edit.password';
- $log->message = 'Password changed';
- $log->link = null;
- $log->ip_address = $request->ip();
- $log->user_agent = $request->userAgent();
- $log->save();
- Mail::to($request->user())->send(new PasswordChange($user));
- return $this->json(AccountService::get($user->profile_id));
- }
- /**
- * GET /api/v1.1/accounts/login-activity
- *
- * @return array
- */
- public function accountLoginActivity(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $agent = new Agent();
- $currentIp = $request->ip();
- $activity = AccountLog::whereUserId($user->id)
- ->whereAction('auth.login')
- ->orderBy('created_at', 'desc')
- ->groupBy('ip_address')
- ->limit(10)
- ->get()
- ->map(function ($item) use ($agent, $currentIp) {
- $agent->setUserAgent($item->user_agent);
- return [
- 'id' => $item->id,
- 'action' => $item->action,
- 'ip' => $item->ip_address,
- 'ip_current' => $item->ip_address === $currentIp,
- 'is_mobile' => $agent->isMobile(),
- 'device' => $agent->device(),
- 'browser' => $agent->browser(),
- 'platform' => $agent->platform(),
- 'created_at' => $item->created_at->format('c'),
- ];
- });
- return $this->json($activity);
- }
- /**
- * GET /api/v1.1/accounts/two-factor
- *
- * @return array
- */
- public function accountTwoFactor(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $res = [
- 'active' => (bool) $user->{'2fa_enabled'},
- 'setup_at' => $user->{'2fa_setup_at'},
- ];
- return $this->json($res);
- }
- /**
- * GET /api/v1.1/accounts/emails-from-pixelfed
- *
- * @return array
- */
- public function accountEmailsFromPixelfed(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $from = config('mail.from.address');
- $emailVerifications = EmailVerification::whereUserId($user->id)
- ->orderByDesc('id')
- ->where('created_at', '>', now()->subDays(14))
- ->limit(10)
- ->get()
- ->map(function ($mail) use ($user, $from) {
- return [
- 'type' => 'Email Verification',
- 'subject' => 'Confirm Email',
- 'to_address' => $user->email,
- 'from_address' => $from,
- 'created_at' => str_replace('@', 'at', $mail->created_at->format('M j, Y @ g:i:s A')),
- ];
- })
- ->toArray();
- $passwordResets = DB::table('password_resets')
- ->whereEmail($user->email)
- ->where('created_at', '>', now()->subDays(14))
- ->orderByDesc('created_at')
- ->limit(10)
- ->get()
- ->map(function ($mail) use ($user, $from) {
- return [
- 'type' => 'Password Reset',
- 'subject' => 'Reset Password Notification',
- 'to_address' => $user->email,
- 'from_address' => $from,
- 'created_at' => str_replace('@', 'at', now()->parse($mail->created_at)->format('M j, Y @ g:i:s A')),
- ];
- })
- ->toArray();
- $passwordChanges = AccountLog::whereUserId($user->id)
- ->whereAction('account.edit.password')
- ->where('created_at', '>', now()->subDays(14))
- ->orderByDesc('created_at')
- ->limit(10)
- ->get()
- ->map(function ($mail) use ($user, $from) {
- return [
- 'type' => 'Password Change',
- 'subject' => 'Password Change',
- 'to_address' => $user->email,
- 'from_address' => $from,
- 'created_at' => str_replace('@', 'at', now()->parse($mail->created_at)->format('M j, Y @ g:i:s A')),
- ];
- })
- ->toArray();
- $res = collect([])
- ->merge($emailVerifications)
- ->merge($passwordResets)
- ->merge($passwordChanges)
- ->sortByDesc('created_at')
- ->values();
- return $this->json($res);
- }
- /**
- * GET /api/v1.1/accounts/apps-and-applications
- *
- * @return array
- */
- public function accountApps(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $user = $request->user();
- abort_if($user->status != null, 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $res = $user->tokens->sortByDesc('created_at')->take(10)->map(function ($token, $key) use ($request) {
- return [
- 'id' => $token->id,
- 'current_session' => $request->user()->token()->id == $token->id,
- 'name' => $token->client->name,
- 'scopes' => $token->scopes,
- 'revoked' => $token->revoked,
- 'created_at' => str_replace('@', 'at', now()->parse($token->created_at)->format('M j, Y @ g:i:s A')),
- 'expires_at' => str_replace('@', 'at', now()->parse($token->expires_at)->format('M j, Y @ g:i:s A')),
- ];
- });
- return $this->json($res);
- }
- public function inAppRegistrationPreFlightCheck(Request $request)
- {
- return [
- 'open' => (bool) config_cache('pixelfed.open_registration'),
- 'iara' => (bool) config_cache('pixelfed.allow_app_registration'),
- ];
- }
- public function inAppRegistration(Request $request)
- {
- abort_if($request->user(), 404);
- abort_unless((bool) config_cache('pixelfed.open_registration'), 404);
- abort_unless((bool) config_cache('pixelfed.allow_app_registration'), 404);
- abort_unless($request->hasHeader('X-PIXELFED-APP'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $rl = RateLimiter::attempt('pf:apiv1.1:iar:'.$request->ip(), config('pixelfed.app_registration_rate_limit_attempts', 3), function () {}, config('pixelfed.app_registration_rate_limit_decay', 1800));
- abort_if(! $rl, 400, 'Too many requests');
- $this->validate($request, [
- 'email' => [
- 'required',
- 'string',
- 'email',
- 'max:255',
- 'unique:users',
- function ($attribute, $value, $fail) {
- $banned = EmailService::isBanned($value);
- if ($banned) {
- return $fail('Email is invalid.');
- }
- },
- ],
- 'username' => [
- 'required',
- 'min:2',
- 'max:15',
- 'unique:users',
- function ($attribute, $value, $fail) {
- $dash = substr_count($value, '-');
- $underscore = substr_count($value, '_');
- $period = substr_count($value, '.');
- if (ends_with($value, ['.php', '.js', '.css'])) {
- return $fail('Username is invalid.');
- }
- if (($dash + $underscore + $period) > 1) {
- return $fail('Username is invalid. Can only contain one dash (-), period (.) or underscore (_).');
- }
- if (! ctype_alnum($value[0])) {
- return $fail('Username is invalid. Must start with a letter or number.');
- }
- if (! ctype_alnum($value[strlen($value) - 1])) {
- return $fail('Username is invalid. Must end with a letter or number.');
- }
- $val = str_replace(['_', '.', '-'], '', $value);
- if (! ctype_alnum($val)) {
- return $fail('Username is invalid. Username must be alpha-numeric and may contain dashes (-), periods (.) and underscores (_).');
- }
- $restricted = RestrictedNames::get();
- if (in_array(strtolower($value), array_map('strtolower', $restricted))) {
- return $fail('Username cannot be used.');
- }
- },
- ],
- 'password' => 'required|string|min:8',
- ]);
- $email = $request->input('email');
- $username = $request->input('username');
- $password = $request->input('password');
- if (config('database.default') == 'pgsql') {
- $username = strtolower($username);
- $email = strtolower($email);
- }
- $user = new User;
- $user->name = $username;
- $user->username = $username;
- $user->email = $email;
- $user->password = Hash::make($password);
- $user->register_source = 'app';
- $user->app_register_ip = $request->ip();
- $user->app_register_token = Str::random(40);
- $user->save();
- $rtoken = Str::random(64);
- $verify = new EmailVerification();
- $verify->user_id = $user->id;
- $verify->email = $user->email;
- $verify->user_token = $user->app_register_token;
- $verify->random_token = $rtoken;
- $verify->save();
- $params = http_build_query([
- 'ut' => $user->app_register_token,
- 'rt' => $rtoken,
- 'ea' => base64_encode($user->email),
- ]);
- $appUrl = url('/api/v1.1/auth/iarer?'.$params);
- Mail::to($user->email)->send(new ConfirmAppEmail($verify, $appUrl));
- return response()->json([
- 'success' => true,
- ]);
- }
- public function inAppRegistrationEmailRedirect(Request $request)
- {
- $this->validate($request, [
- 'ut' => 'required',
- 'rt' => 'required',
- 'ea' => 'required',
- ]);
- $ut = $request->input('ut');
- $rt = $request->input('rt');
- $ea = $request->input('ea');
- $params = http_build_query([
- 'ut' => $ut,
- 'rt' => $rt,
- 'domain' => config('pixelfed.domain.app'),
- 'ea' => $ea,
- ]);
- $url = 'pixelfed://confirm-account/'.$ut.'?'.$params;
- return redirect()->away($url);
- }
- public function inAppRegistrationConfirm(Request $request)
- {
- abort_if($request->user(), 404);
- abort_unless((bool) config_cache('pixelfed.open_registration'), 404);
- abort_unless((bool) config_cache('pixelfed.allow_app_registration'), 404);
- abort_unless($request->hasHeader('X-PIXELFED-APP'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $rl = RateLimiter::attempt('pf:apiv1.1:iarc:'.$request->ip(), config('pixelfed.app_registration_confirm_rate_limit_attempts', 20), function () {}, config('pixelfed.app_registration_confirm_rate_limit_decay', 1800));
- abort_if(! $rl, 429, 'Too many requests');
- $request->validate([
- 'user_token' => 'required',
- 'random_token' => 'required',
- 'email' => 'required',
- ]);
- $verify = EmailVerification::whereEmail($request->input('email'))
- ->whereUserToken($request->input('user_token'))
- ->whereRandomToken($request->input('random_token'))
- ->first();
- if (! $verify) {
- return response()->json(['error' => 'Invalid tokens'], 403);
- }
- if ($verify->created_at->lt(now()->subHours(24))) {
- $verify->delete();
- return response()->json(['error' => 'Invalid tokens'], 403);
- }
- $user = User::findOrFail($verify->user_id);
- $user->email_verified_at = now();
- $user->last_active_at = now();
- $user->save();
- $token = $user->createToken('Pixelfed', ['read', 'write', 'follow', 'admin:read', 'admin:write', 'push']);
- return response()->json([
- 'access_token' => $token->accessToken,
- ]);
- }
- public function archive(Request $request, $id)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $status = Status::whereNull('in_reply_to_id')
- ->whereNull('reblog_of_id')
- ->whereProfileId($request->user()->profile_id)
- ->findOrFail($id);
- if ($status->scope === 'archived') {
- return [200];
- }
- $archive = new StatusArchived;
- $archive->status_id = $status->id;
- $archive->profile_id = $status->profile_id;
- $archive->original_scope = $status->scope;
- $archive->save();
- $status->scope = 'archived';
- $status->visibility = 'draft';
- $status->save();
- StatusService::del($status->id, true);
- AccountService::syncPostCount($status->profile_id);
- return [200];
- }
- public function unarchive(Request $request, $id)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $status = Status::whereNull('in_reply_to_id')
- ->whereNull('reblog_of_id')
- ->whereProfileId($request->user()->profile_id)
- ->findOrFail($id);
- if ($status->scope !== 'archived') {
- return [200];
- }
- $archive = StatusArchived::whereStatusId($status->id)
- ->whereProfileId($status->profile_id)
- ->firstOrFail();
- $status->scope = $archive->original_scope;
- $status->visibility = $archive->original_scope;
- $status->save();
- $archive->delete();
- StatusService::del($status->id, true);
- AccountService::syncPostCount($status->profile_id);
- return [200];
- }
- public function archivedPosts(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $statuses = Status::whereProfileId($request->user()->profile_id)
- ->whereScope('archived')
- ->orderByDesc('id')
- ->cursorPaginate(10);
- return StatusStateless::collection($statuses);
- }
- public function placesById(Request $request, $id, $slug)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $place = Place::whereSlug($slug)->findOrFail($id);
- $posts = Cache::remember('pf-api:v1.1:places-by-id:'.$place->id, 3600, function () use ($place) {
- return Status::wherePlaceId($place->id)
- ->whereNull('uri')
- ->whereScope('public')
- ->orderByDesc('created_at')
- ->limit(60)
- ->pluck('id');
- });
- $posts = $posts->map(function ($id) {
- return StatusService::get($id);
- })
- ->filter()
- ->values();
- return [
- 'place' => [
- 'id' => $place->id,
- 'name' => $place->name,
- 'slug' => $place->slug,
- 'country' => $place->country,
- 'lat' => $place->lat,
- 'long' => $place->long,
- ],
- 'posts' => $posts];
- }
- public function moderatePost(Request $request, $id)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_if($request->user()->is_admin != true, 403);
- abort_unless($request->user()->tokenCan('admin:write'), 403);
- if (config('pixelfed.bouncer.cloud_ips.ban_signups')) {
- abort_if(BouncerService::checkIp($request->ip()), 404);
- }
- $this->validate($request, [
- 'action' => 'required|in:cw,mark-public,mark-unlisted,mark-private,mark-spammer,delete',
- ]);
- $action = $request->input('action');
- $status = Status::find($id);
- if (! $status) {
- return response()->json(['error' => 'Cannot find status'], 400);
- }
- if ($status->uri == null) {
- if ($status->profile->user && $status->profile->user->is_admin) {
- return response()->json(['error' => 'Cannot moderate admin accounts'], 400);
- }
- }
- if ($action == 'mark-spammer') {
- $status->profile->update([
- 'unlisted' => true,
- 'cw' => true,
- 'no_autolink' => true,
- ]);
- Status::whereProfileId($status->profile_id)
- ->get()
- ->each(function ($s) {
- if (in_array($s->scope, ['public', 'unlisted'])) {
- $s->scope = 'private';
- $s->visibility = 'private';
- }
- $s->is_nsfw = true;
- $s->save();
- StatusService::del($s->id, true);
- });
- Cache::forget('pf:bouncer_v0:exemption_by_pid:'.$status->profile_id);
- Cache::forget('pf:bouncer_v0:recent_by_pid:'.$status->profile_id);
- Cache::forget('admin-dash:reports:spam-count');
- } elseif ($action == 'cw') {
- $state = $status->is_nsfw;
- $status->is_nsfw = ! $state;
- $status->save();
- StatusService::del($status->id);
- } elseif ($action == 'mark-public') {
- $state = $status->scope;
- $status->scope = 'public';
- $status->visibility = 'public';
- $status->save();
- StatusService::del($status->id, true);
- if ($state !== 'public') {
- if ($status->uri) {
- if ($status->in_reply_to_id == null && $status->reblog_of_id == null) {
- NetworkTimelineService::add($status->id);
- }
- } else {
- if ($status->in_reply_to_id == null && $status->reblog_of_id == null) {
- PublicTimelineService::add($status->id);
- }
- }
- }
- } elseif ($action == 'mark-unlisted') {
- $state = $status->scope;
- $status->scope = 'unlisted';
- $status->visibility = 'unlisted';
- $status->save();
- StatusService::del($status->id);
- if ($state == 'public') {
- PublicTimelineService::del($status->id);
- NetworkTimelineService::del($status->id);
- }
- } elseif ($action == 'mark-private') {
- $state = $status->scope;
- $status->scope = 'private';
- $status->visibility = 'private';
- $status->save();
- StatusService::del($status->id);
- if ($state == 'public') {
- PublicTimelineService::del($status->id);
- NetworkTimelineService::del($status->id);
- }
- } elseif ($action == 'delete') {
- PublicTimelineService::del($status->id);
- NetworkTimelineService::del($status->id);
- Cache::forget('_api:statuses:recent_9:'.$status->profile_id);
- Cache::forget('profile:status_count:'.$status->profile_id);
- Cache::forget('profile:embed:'.$status->profile_id);
- StatusService::del($status->id, true);
- Cache::forget('profile:status_count:'.$status->profile_id);
- $status->uri ? RemoteStatusDelete::dispatch($status) : StatusDelete::dispatch($status);
- return [];
- }
- Cache::forget('_api:statuses:recent_9:'.$status->profile_id);
- return StatusService::get($status->id, false);
- }
- public function getWebSettings(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $uid = $request->user()->id;
- $settings = UserSetting::firstOrCreate([
- 'user_id' => $uid,
- ]);
- if (! $settings->other) {
- return [];
- }
- return $settings->other;
- }
- public function setWebSettings(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- $this->validate($request, [
- 'field' => 'required|in:enable_reblogs,hide_reblog_banner',
- 'value' => 'required',
- ]);
- $field = $request->input('field');
- $value = $request->input('value');
- $settings = UserSetting::firstOrCreate([
- 'user_id' => $request->user()->id,
- ]);
- if (! $settings->other) {
- $other = [];
- } else {
- $other = $settings->other;
- }
- $other[$field] = $value;
- $settings->other = $other;
- $settings->save();
- return [200];
- }
- public function getMutualAccounts(Request $request, $id)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('follow'), 403);
- $account = AccountService::get($id, true);
- if (! $account || ! isset($account['id'])) {
- return [];
- }
- $res = collect(FollowerService::mutualAccounts($request->user()->profile_id, $id))
- ->map(function ($accountId) {
- return AccountService::get($accountId, true);
- })
- ->filter()
- ->take(24)
- ->values();
- return $this->json($res);
- }
- public function accountUsernameToId(Request $request, $username)
- {
- abort_if(! $request->user() || ! $request->user()->token() || ! $username, 403);
- abort_unless($request->user()->tokenCan('read'), 403);
- $username = trim($username);
- $rateLimiting = (bool) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.enabled');
- $ipRateLimiting = (bool) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.ip_enabled');
- if ($ipRateLimiting) {
- $userLimit = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.ip_limit');
- $userDecay = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.ip_decay');
- $userKey = 'pf:apiv1.1:acctU2ID:byIp:'.$request->ip();
- if (RateLimiter::tooManyAttempts($userKey, $userLimit)) {
- $limits = [
- 'X-Rate-Limit-Limit' => $userLimit,
- 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit),
- 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey),
- ];
- return $this->json(['error' => 'Too many attempts!'], 429, $limits);
- }
- RateLimiter::increment($userKey, $userDecay);
- $limits = [
- 'X-Rate-Limit-Limit' => $userLimit,
- 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit),
- 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey),
- ];
- }
- if ($rateLimiting) {
- $userLimit = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.limit');
- $userDecay = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.decay');
- $userKey = 'pf:apiv1.1:acctU2ID:byUid:'.$request->user()->id;
- if (RateLimiter::tooManyAttempts($userKey, $userLimit)) {
- $limits = [
- 'X-Rate-Limit-Limit' => $userLimit,
- 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit),
- 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey),
- ];
- return $this->json(['error' => 'Too many attempts!'], 429, $limits);
- }
- RateLimiter::increment($userKey, $userDecay);
- $limits = [
- 'X-Rate-Limit-Limit' => $userLimit,
- 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit),
- 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey),
- ];
- }
- if (str_ends_with($username, config_cache('pixelfed.domain.app'))) {
- $pre = str_starts_with($username, '@') ? substr($username, 1) : $username;
- $parts = explode('@', $pre);
- $username = $parts[0];
- }
- $accountId = AccountService::usernameToId($username, true);
- if (! $accountId) {
- return [];
- }
- $account = AccountService::get($accountId);
- return $this->json($account, 200, $rateLimiting ? $limits : []);
- }
- public function getExpoPushNotifications(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('push'), 403);
- abort_unless(config('services.expo.access_token') && strlen(config('services.expo.access_token')) > 10, 404, 'Push notifications are not supported on this server.');
- $user = $request->user();
- $res = [
- 'expo_token' => (bool) $user->expo_token,
- 'notify_like' => (bool) $user->notify_like,
- 'notify_follow' => (bool) $user->notify_follow,
- 'notify_mention' => (bool) $user->notify_mention,
- 'notify_comment' => (bool) $user->notify_comment,
- ];
- return $this->json($res);
- }
- public function disableExpoPushNotifications(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('push'), 403);
- abort_unless(config('services.expo.access_token') && strlen(config('services.expo.access_token')) > 10, 404, 'Push notifications are not supported on this server.');
- $request->user()->update([
- 'expo_token' => null,
- ]);
- return $this->json(['expo_token' => null]);
- }
- public function updateExpoPushNotifications(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('push'), 403);
- abort_unless(config('services.expo.access_token') && strlen(config('services.expo.access_token')) > 10, 404, 'Push notifications are not supported on this server.');
- $this->validate($request, [
- 'expo_token' => ['required', ExpoPushToken::rule()],
- 'notify_like' => 'sometimes',
- 'notify_follow' => 'sometimes',
- 'notify_mention' => 'sometimes',
- 'notify_comment' => 'sometimes',
- ]);
- $user = $request->user()->update([
- 'expo_token' => $request->input('expo_token'),
- 'notify_like' => $request->has('notify_like') && $request->boolean('notify_like'),
- 'notify_follow' => $request->has('notify_follow') && $request->boolean('notify_follow'),
- 'notify_mention' => $request->has('notify_mention') && $request->boolean('notify_mention'),
- 'notify_comment' => $request->has('notify_comment') && $request->boolean('notify_comment'),
- ]);
- $res = [
- 'expo_token' => (bool) $request->user()->expo_token,
- 'notify_like' => (bool) $request->user()->notify_like,
- 'notify_follow' => (bool) $request->user()->notify_follow,
- 'notify_mention' => (bool) $request->user()->notify_mention,
- 'notify_comment' => (bool) $request->user()->notify_comment,
- ];
- return $this->json($res);
- }
- /**
- * POST /api/v1.1/status/create
- *
- *
- * @return StatusTransformer
- */
- public function statusCreate(Request $request)
- {
- abort_if(! $request->user() || ! $request->user()->token(), 403);
- abort_unless($request->user()->tokenCan('write'), 403);
- $this->validate($request, [
- 'status' => 'nullable|string|max:'.(int) config_cache('pixelfed.max_caption_length'),
- 'file' => [
- 'required',
- 'file',
- 'mimetypes:'.config_cache('pixelfed.media_types'),
- 'max:'.config_cache('pixelfed.max_photo_size'),
- function ($attribute, $value, $fail) {
- if (is_array($value) && count($value) > 1) {
- $fail('Only one file can be uploaded at a time.');
- }
- },
- ],
- 'sensitive' => 'nullable',
- 'visibility' => 'string|in:private,unlisted,public',
- 'spoiler_text' => 'sometimes|max:140',
- ]);
- if ($request->hasHeader('idempotency-key')) {
- $key = 'pf:api:v1:status:idempotency-key:'.$request->user()->id.':'.hash('sha1', $request->header('idempotency-key'));
- $exists = Cache::has($key);
- abort_if($exists, 400, 'Duplicate idempotency key.');
- Cache::put($key, 1, 3600);
- }
- if (config('costar.enabled') == true) {
- $blockedKeywords = config('costar.keyword.block');
- if ($blockedKeywords !== null && $request->status) {
- $keywords = config('costar.keyword.block');
- foreach ($keywords as $kw) {
- if (Str::contains($request->status, $kw) == true) {
- abort(400, 'Invalid object. Contains banned keyword.');
- }
- }
- }
- }
- $user = $request->user();
- $limitKey = 'compose:rate-limit:media-upload:'.$user->id;
- $limitTtl = now()->addMinutes(15);
- $limitReached = Cache::remember($limitKey, $limitTtl, function () use ($user) {
- $dailyLimit = Media::whereUserId($user->id)->where('created_at', '>', now()->subDays(1))->count();
- return $dailyLimit >= 1250;
- });
- abort_if($limitReached == true, 429);
- if ($user->has_roles) {
- abort_if(! UserRoleService::can('can-post', $user->id), 403, 'Invalid permissions for this action');
- }
- $profile = $user->profile;
- if (config_cache('pixelfed.enforce_account_limit') == true) {
- $size = Cache::remember($user->storageUsedKey(), now()->addDays(3), function () use ($user) {
- return Media::whereUserId($user->id)->sum('size') / 1000;
- });
- $limit = (int) config_cache('pixelfed.max_account_size');
- if ($size >= $limit) {
- abort(403, 'Account size limit reached.');
- }
- }
- abort_if($limitReached == true, 429);
- $photo = $request->file('file');
- $mimes = explode(',', config_cache('pixelfed.media_types'));
- if (in_array($photo->getMimeType(), $mimes) == false) {
- abort(403, 'Invalid or unsupported mime type.');
- }
- $storagePath = MediaPathService::get($user, 2);
- $path = $photo->storePublicly($storagePath);
- $hash = \hash_file('sha256', $photo);
- $license = null;
- $mime = $photo->getMimeType();
- $settings = UserSetting::whereUserId($user->id)->first();
- if ($settings && ! empty($settings->compose_settings)) {
- $compose = $settings->compose_settings;
- if (isset($compose['default_license']) && $compose['default_license'] != 1) {
- $license = $compose['default_license'];
- }
- }
- abort_if(MediaBlocklistService::exists($hash) == true, 451);
- $visibility = $profile->is_private ? 'private' : (
- $profile->unlisted == true &&
- $request->input('visibility', 'public') == 'public' ?
- 'unlisted' :
- $request->input('visibility', 'public'));
- if ($user->last_active_at == null) {
- return [];
- }
- $content = strip_tags($request->input('status'));
- $rendered = Autolink::create()->autolink($content);
- $cw = $user->profile->cw == true ? true : $request->boolean('sensitive', false);
- $spoilerText = $cw && $request->filled('spoiler_text') ? $request->input('spoiler_text') : null;
- $status = new Status;
- $status->caption = $content;
- $status->rendered = $rendered;
- $status->profile_id = $user->profile_id;
- $status->is_nsfw = $cw;
- $status->cw_summary = $spoilerText;
- $status->scope = $visibility;
- $status->visibility = $visibility;
- $status->type = StatusController::mimeTypeCheck([$mime]);
- $status->save();
- if (! $status) {
- abort(500, 'An error occured.');
- }
- $media = new Media();
- $media->status_id = $status->id;
- $media->profile_id = $profile->id;
- $media->user_id = $user->id;
- $media->media_path = $path;
- $media->original_sha256 = $hash;
- $media->size = $photo->getSize();
- $media->mime = $mime;
- $media->order = 1;
- $media->caption = $request->input('description');
- if ($license) {
- $media->license = $license;
- }
- $media->save();
- switch ($media->mime) {
- case 'image/jpeg':
- case 'image/png':
- ImageOptimize::dispatch($media)->onQueue('mmo');
- break;
- case 'video/mp4':
- VideoThumbnail::dispatch($media)->onQueue('mmo');
- $preview_url = '/storage/no-preview.png';
- $url = '/storage/no-preview.png';
- break;
- }
- NewStatusPipeline::dispatch($status);
- Cache::forget('user:account:id:'.$user->id);
- Cache::forget('_api:statuses:recent_9:'.$user->profile_id);
- Cache::forget('profile:status_count:'.$user->profile_id);
- Cache::forget($user->storageUsedKey());
- Cache::forget('profile:embed:'.$status->profile_id);
- Cache::forget($limitKey);
- $res = StatusService::getMastodon($status->id, false);
- $res['favourited'] = false;
- $res['language'] = 'en';
- $res['bookmarked'] = false;
- $res['card'] = null;
- return $this->json($res);
- }
- }
|