2020-04-14 10:59:04 -06:00
|
|
|
|
# Pleroma: A lightweight social networking server
|
|
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
|
|
defmodule Pleroma.Web.ActivityPub.MRF.StealEmojiPolicy do
|
|
|
|
|
require Logger
|
|
|
|
|
|
|
|
|
|
alias Pleroma.Config
|
|
|
|
|
|
|
|
|
|
@moduledoc "Detect new emojis by their shortcode and steals them"
|
|
|
|
|
@behaviour Pleroma.Web.ActivityPub.MRF
|
|
|
|
|
|
|
|
|
|
defp accept_host?(host), do: host in Config.get([:mrf_steal_emoji, :hosts], [])
|
|
|
|
|
|
2020-12-24 10:27:28 -07:00
|
|
|
|
defp steal_emoji({shortcode, url}, emoji_dir_path) do
|
2020-04-14 10:59:04 -06:00
|
|
|
|
url = Pleroma.Web.MediaProxy.url(url)
|
|
|
|
|
|
2020-12-25 01:30:36 -07:00
|
|
|
|
with {:ok, %{status: status} = response} when status in 200..299 <- Pleroma.HTTP.get(url) do
|
|
|
|
|
size_limit = Config.get([:mrf_steal_emoji, :size_limit], 50_000)
|
|
|
|
|
|
|
|
|
|
if byte_size(response.body) <= size_limit do
|
|
|
|
|
extension =
|
|
|
|
|
url
|
|
|
|
|
|> URI.parse()
|
|
|
|
|
|> Map.get(:path)
|
|
|
|
|
|> Path.basename()
|
|
|
|
|
|> Path.extname()
|
|
|
|
|
|
|
|
|
|
file_path = Path.join(emoji_dir_path, shortcode <> (extension || ".png"))
|
2020-04-14 10:59:04 -06:00
|
|
|
|
|
2020-12-25 01:30:36 -07:00
|
|
|
|
case File.write(file_path, response.body) do
|
|
|
|
|
:ok ->
|
|
|
|
|
shortcode
|
2020-04-14 10:59:04 -06:00
|
|
|
|
|
2020-12-25 01:30:36 -07:00
|
|
|
|
e ->
|
|
|
|
|
Logger.warn("MRF.StealEmojiPolicy: Failed to write to #{file_path}: #{inspect(e)}")
|
|
|
|
|
nil
|
|
|
|
|
end
|
2020-12-24 10:27:28 -07:00
|
|
|
|
else
|
2020-12-25 01:30:36 -07:00
|
|
|
|
Logger.debug(
|
|
|
|
|
"MRF.StealEmojiPolicy: :#{shortcode}: at #{url} (#{byte_size(response.body)} B) over size limit (#{
|
|
|
|
|
size_limit
|
|
|
|
|
} B)"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
nil
|
2020-04-14 10:59:04 -06:00
|
|
|
|
end
|
|
|
|
|
else
|
2020-12-25 01:30:36 -07:00
|
|
|
|
e ->
|
|
|
|
|
Logger.warn("MRF.StealEmojiPolicy: Failed to fetch #{url}: #{inspect(e)}")
|
|
|
|
|
nil
|
2020-04-14 10:59:04 -06:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
@impl true
|
|
|
|
|
def filter(%{"object" => %{"emoji" => foreign_emojis, "actor" => actor}} = message) do
|
|
|
|
|
host = URI.parse(actor).host
|
|
|
|
|
|
2020-12-25 01:30:36 -07:00
|
|
|
|
if host != Pleroma.Web.Endpoint.host() and accept_host?(host) do
|
2020-04-14 10:59:04 -06:00
|
|
|
|
installed_emoji = Pleroma.Emoji.get_all() |> Enum.map(fn {k, _} -> k end)
|
|
|
|
|
|
2020-12-24 10:27:28 -07:00
|
|
|
|
emoji_dir_path =
|
|
|
|
|
Config.get(
|
|
|
|
|
[:mrf_steal_emoji, :path],
|
|
|
|
|
Path.join(Config.get([:instance, :static_dir]), "emoji/stolen")
|
|
|
|
|
)
|
|
|
|
|
|
2020-12-27 11:58:15 -07:00
|
|
|
|
File.mkdir_p(emoji_dir_path)
|
2020-12-24 10:27:28 -07:00
|
|
|
|
|
2020-04-14 10:59:04 -06:00
|
|
|
|
new_emojis =
|
|
|
|
|
foreign_emojis
|
2020-12-25 01:30:36 -07:00
|
|
|
|
|> Enum.reject(fn {shortcode, _url} -> shortcode in installed_emoji end)
|
2020-04-14 10:59:04 -06:00
|
|
|
|
|> Enum.filter(fn {shortcode, _url} ->
|
|
|
|
|
reject_emoji? =
|
2020-12-25 01:30:36 -07:00
|
|
|
|
[:mrf_steal_emoji, :rejected_shortcodes]
|
|
|
|
|
|> Config.get([])
|
2020-04-14 10:59:04 -06:00
|
|
|
|
|> Enum.find(false, fn regex -> String.match?(shortcode, regex) end)
|
|
|
|
|
|
|
|
|
|
!reject_emoji?
|
|
|
|
|
end)
|
2020-12-24 10:27:28 -07:00
|
|
|
|
|> Enum.map(&steal_emoji(&1, emoji_dir_path))
|
2020-04-14 10:59:04 -06:00
|
|
|
|
|> Enum.filter(& &1)
|
|
|
|
|
|
|
|
|
|
if !Enum.empty?(new_emojis) do
|
|
|
|
|
Logger.info("Stole new emojis: #{inspect(new_emojis)}")
|
|
|
|
|
Pleroma.Emoji.reload()
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
{:ok, message}
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
def filter(message), do: {:ok, message}
|
|
|
|
|
|
|
|
|
|
@impl true
|
|
|
|
|
def describe do
|
|
|
|
|
{:ok, %{}}
|
|
|
|
|
end
|
|
|
|
|
end
|