]> git.mxchange.org Git - quix0rs-gnu-social.git/blob - lib/activityimporter.php
Two bug fixes in activityimporter
[quix0rs-gnu-social.git] / lib / activityimporter.php
1 <?php
2 /**
3  * StatusNet - the distributed open-source microblogging tool
4  * Copyright (C) 2010, StatusNet, Inc.
5  *
6  * class to import activities as part of a user's timeline
7  * 
8  * PHP version 5
9  *
10  * This program is free software: you can redistribute it and/or modify
11  * it under the terms of the GNU Affero General Public License as published by
12  * the Free Software Foundation, either version 3 of the License, or
13  * (at your option) any later version.
14  *
15  * This program is distributed in the hope that it will be useful,
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18  * GNU Affero General Public License for more details.
19  *
20  * You should have received a copy of the GNU Affero General Public License
21  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
22  *
23  * @category  Cache
24  * @package   StatusNet
25  * @author    Evan Prodromou <evan@status.net>
26  * @copyright 2010 StatusNet, Inc.
27  * @license   http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0
28  * @link      http://status.net/
29  */
30
31 if (!defined('STATUSNET')) {
32     // This check helps protect against security problems;
33     // your code file can't be executed directly from the web.
34     exit(1);
35 }
36
37 /**
38  * Class comment
39  *
40  * @category  General
41  * @package   StatusNet
42  * @author    Evan Prodromou <evan@status.net>
43  * @copyright 2010 StatusNet, Inc.
44  * @license   http://www.fsf.org/licensing/licenses/agpl-3.0.html AGPL 3.0
45  * @link      http://status.net/
46  */
47
48 class ActivityImporter extends QueueHandler
49 {
50     private $trusted = false;
51
52     /**
53      * Function comment
54      *
55      * @param
56      *
57      * @return
58      */
59
60     function handle($data)
61     {
62         list($user, $author, $activity, $trusted) = $data;
63
64         $this->trusted = $trusted;
65
66         try {
67             switch ($activity->verb) {
68             case ActivityVerb::FOLLOW:
69                 $this->subscribeProfile($user, $author, $activity);
70                 break;
71             case ActivityVerb::JOIN:
72                 $this->joinGroup($user, $activity);
73                 break;
74             case ActivityVerb::POST:
75                 $this->postNote($user, $author, $activity);
76                 break;
77             default:
78                 throw new Exception("Unknown verb: {$activity->verb}");
79             }
80         } catch (ClientException $ce) {
81             common_log(LOG_WARNING, $ce->getMessage());
82             return true;
83         } catch (ServerException $se) {
84             common_log(LOG_ERR, $se->getMessage());
85             return false;
86         } catch (Exception $e) {
87             common_log(LOG_ERR, $e->getMessage());
88             return false;
89         }
90         return true;
91     }
92     
93     function subscribeProfile($user, $author, $activity)
94     {
95         $profile = $user->getProfile();
96
97         if ($activity->objects[0]->id == $author->id) {
98
99             if (!$this->trusted) {
100                 throw new ClientException(_("Can't force subscription for untrusted user."));
101             }
102
103             $other = $activity->actor;
104             $otherUser = User::staticGet('uri', $other->id);
105             
106             if (!empty($otherUser)) {
107                 $otherProfile = $otherUser->getProfile();
108             } else {
109                 throw new Exception("Can't force remote user to subscribe.");
110             }
111
112             // XXX: don't do this for untrusted input!
113
114             Subscription::start($otherProfile, $profile);
115
116         } else if (empty($activity->actor) 
117                    || $activity->actor->id == $author->id) {
118
119             $other = $activity->objects[0];
120
121             $otherProfile = Profile::fromUri($other->id);
122
123             if (empty($otherProfile)) {
124                 throw new ClientException(_("Unknown profile."));
125             }
126
127             Subscription::start($profile, $otherProfile);
128         } else {
129             throw new Exception("This activity seems unrelated to our user.");
130         }
131     }
132
133     function joinGroup($user, $activity)
134     {
135         // XXX: check that actor == subject
136
137         $uri = $activity->objects[0]->id;
138
139         $group = User_group::staticGet('uri', $uri);
140
141         if (empty($group)) {
142             $oprofile = Ostatus_profile::ensureActivityObjectProfile($activity->objects[0]);
143             if (!$oprofile->isGroup()) {
144                 throw new ClientException("Remote profile is not a group!");
145             }
146             $group = $oprofile->localGroup();
147         }
148
149         assert(!empty($group));
150
151         if ($user->isMember($group)) {
152             throw new ClientException("User is already a member of this group.");
153         }
154
155         if (Event::handle('StartJoinGroup', array($group, $user))) {
156             Group_member::join($group->id, $user->id);
157             Event::handle('EndJoinGroup', array($group, $user));
158         }
159     }
160
161     // XXX: largely cadged from Ostatus_profile::processNote()
162
163     function postNote($user, $author, $activity)
164     {
165         $note = $activity->objects[0];
166
167         $sourceUri = $note->id;
168
169         $notice = Notice::staticGet('uri', $sourceUri);
170
171         if (!empty($notice)) {
172             
173             common_log(LOG_INFO, "Notice {$sourceUri} already exists.");
174
175             if ($this->trusted) {
176
177                 $profile = $notice->getProfile();
178
179                 $uri = $profile->getUri();
180
181                 if ($uri == $author->id) {
182                     common_log(LOG_INFO, "Updating notice author from $author->id to $user->uri");
183                     $orig = clone($notice);
184                     $notice->profile_id = $user->id;
185                     $notice->update($orig);
186                     return;
187                 } else {
188                     throw new ClientException(sprintf(_("Already know about notice %s and ".
189                                                         " it's got a different author %s."),
190                                                       $sourceUri, $uri));
191                 }
192             } else {
193                 throw new ClientException("Not overwriting author info for non-trusted user.");
194             }
195         }
196
197         // Use summary as fallback for content
198
199         if (!empty($note->content)) {
200             $sourceContent = $note->content;
201         } else if (!empty($note->summary)) {
202             $sourceContent = $note->summary;
203         } else if (!empty($note->title)) {
204             $sourceContent = $note->title;
205         } else {
206             // @fixme fetch from $sourceUrl?
207             // @todo i18n FIXME: use sprintf and add i18n.
208             throw new ClientException("No content for notice {$sourceUri}.");
209         }
210
211         // Get (safe!) HTML and text versions of the content
212
213         $rendered = $this->purify($sourceContent);
214         $content = html_entity_decode(strip_tags($rendered), ENT_QUOTES, 'UTF-8');
215
216         $shortened = $user->shortenLinks($content);
217
218         $options = array('is_local' => Notice::LOCAL_PUBLIC,
219                          'uri' => $sourceUri,
220                          'rendered' => $rendered,
221                          'replies' => array(),
222                          'groups' => array(),
223                          'tags' => array(),
224                          'urls' => array(),
225                          'distribute' => false);
226
227         // Check for optional attributes...
228
229         if (!empty($activity->time)) {
230             $options['created'] = common_sql_date($activity->time);
231         }
232
233         if ($activity->context) {
234             // Any individual or group attn: targets?
235
236             list($options['groups'], $options['replies']) = $this->filterAttention($activity->context->attention);
237
238             // Maintain direct reply associations
239             // @fixme what about conversation ID?
240             if (!empty($activity->context->replyToID)) {
241                 $orig = Notice::staticGet('uri',
242                                           $activity->context->replyToID);
243                 if (!empty($orig)) {
244                     $options['reply_to'] = $orig->id;
245                 }
246             }
247
248             $location = $activity->context->location;
249
250             if ($location) {
251                 $options['lat'] = $location->lat;
252                 $options['lon'] = $location->lon;
253                 if ($location->location_id) {
254                     $options['location_ns'] = $location->location_ns;
255                     $options['location_id'] = $location->location_id;
256                 }
257             }
258         }
259
260         // Atom categories <-> hashtags
261
262         foreach ($activity->categories as $cat) {
263             if ($cat->term) {
264                 $term = common_canonical_tag($cat->term);
265                 if ($term) {
266                     $options['tags'][] = $term;
267                 }
268             }
269         }
270
271         // Atom enclosures -> attachment URLs
272         foreach ($activity->enclosures as $href) {
273             // @fixme save these locally or....?
274             $options['urls'][] = $href;
275         }
276
277         common_log(LOG_INFO, "Saving notice {$options['uri']}");
278
279         $saved = Notice::saveNew($user->id,
280                                  $content,
281                                  'restore', // TODO: restore the actual source
282                                  $options);
283
284         return $saved;
285     }
286
287     function filterAttention($attn)
288     {
289         $groups = array();
290         $replies = array();
291
292         foreach (array_unique($attn) as $recipient) {
293
294             // Is the recipient a local user?
295
296             $user = User::staticGet('uri', $recipient);
297
298             if ($user) {
299                 // @fixme sender verification, spam etc?
300                 $replies[] = $recipient;
301                 continue;
302             }
303
304             // Is the recipient a remote group?
305             $oprofile = Ostatus_profile::ensureProfileURI($recipient);
306
307             if ($oprofile) {
308                 if (!$oprofile->isGroup()) {
309                     // may be canonicalized or something
310                     $replies[] = $oprofile->uri;
311                 }
312                 continue;
313             }
314
315             // Is the recipient a local group?
316             // @fixme uri on user_group isn't reliable yet
317             // $group = User_group::staticGet('uri', $recipient);
318             $id = OStatusPlugin::localGroupFromUrl($recipient);
319
320             if ($id) {
321                 $group = User_group::staticGet('id', $id);
322                 if ($group) {
323                     // Deliver to all members of this local group if allowed.
324                     $profile = $sender->localProfile();
325                     if ($profile->isMember($group)) {
326                         $groups[] = $group->id;
327                     } else {
328                         common_log(LOG_INFO, "Skipping reply to local group {$group->nickname} as sender {$profile->id} is not a member");
329                     }
330                     continue;
331                 } else {
332                     common_log(LOG_INFO, "Skipping reply to bogus group $recipient");
333                 }
334             }
335         }
336
337         return array($groups, $replies);
338     }
339  
340
341     function purify($content)
342     {
343         require_once INSTALLDIR.'/extlib/htmLawed/htmLawed.php';
344
345         $config = array('safe' => 1,
346                         'deny_attribute' => 'id,style,on*');
347
348         return htmLawed($content, $config);
349     }
350 }