fractal = new Fractal\Manager(); $this->fractal->setSerializer(new ArraySerializer()); } public function json($res, $code = 200, $headers = []) { return response()->json($res, $code, $headers, JSON_UNESCAPED_SLASHES); } public function error($msg, $code = 400, $extra = [], $headers = []) { $res = [ 'msg' => $msg, 'code' => $code, ]; return response()->json(array_merge($res, $extra), $code, $headers, JSON_UNESCAPED_SLASHES); } public function report(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $report_type = $request->input('report_type'); $object_id = $request->input('object_id'); $object_type = $request->input('object_type'); $types = [ 'spam', 'sensitive', 'abusive', 'underage', 'violence', 'copyright', 'impersonation', 'scam', 'terrorism', ]; if (! $report_type || ! $object_id || ! $object_type) { return $this->error('Invalid or missing parameters', 400, ['error_code' => 'ERROR_INVALID_PARAMS']); } if (! in_array($report_type, $types)) { return $this->error('Invalid report type', 400, ['error_code' => 'ERROR_TYPE_INVALID']); } if ($object_type === 'user' && $object_id == $user->profile_id) { return $this->error('Cannot self report', 400, ['error_code' => 'ERROR_NO_SELF_REPORTS']); } $rpid = null; switch ($object_type) { case 'post': $object = Status::find($object_id); if (! $object) { return $this->error('Invalid object id', 400, ['error_code' => 'ERROR_INVALID_OBJECT_ID']); } $object_type = 'App\Status'; $exists = Report::whereUserId($user->id) ->whereObjectId($object->id) ->whereObjectType('App\Status') ->count(); $rpid = $object->profile_id; break; case 'user': $object = Profile::find($object_id); if (! $object) { return $this->error('Invalid object id', 400, ['error_code' => 'ERROR_INVALID_OBJECT_ID']); } $object_type = 'App\Profile'; $exists = Report::whereUserId($user->id) ->whereObjectId($object->id) ->whereObjectType('App\Profile') ->count(); $rpid = $object->id; break; default: return $this->error('Invalid report type', 400, ['error_code' => 'ERROR_REPORT_OBJECT_TYPE_INVALID']); break; } if ($exists !== 0) { return $this->error('Duplicate report', 400, ['error_code' => 'ERROR_REPORT_DUPLICATE']); } if ($object->profile_id == $user->profile_id) { return $this->error('Cannot self report', 400, ['error_code' => 'ERROR_NO_SELF_REPORTS']); } $report = new Report; $report->profile_id = $user->profile_id; $report->user_id = $user->id; $report->object_id = $object->id; $report->object_type = $object_type; $report->reported_profile_id = $rpid; $report->type = $report_type; $report->save(); if (config('instance.reports.email.enabled')) { ReportNotifyAdminViaEmail::dispatch($report)->onQueue('default'); } $res = [ 'msg' => 'Successfully sent report', 'code' => 200, ]; return $this->json($res); } /** * DELETE /api/v1.1/accounts/avatar * * @return \App\Transformer\Api\AccountTransformer */ public function deleteAvatar(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $avatar = $user->profile->avatar; if ($avatar->media_path == 'public/avatars/default.png' || $avatar->media_path == 'public/avatars/default.jpg' ) { return AccountService::get($user->profile_id); } if (is_file(storage_path('app/'.$avatar->media_path))) { @unlink(storage_path('app/'.$avatar->media_path)); } $avatar->media_path = 'public/avatars/default.jpg'; $avatar->change_count = $avatar->change_count + 1; $avatar->save(); Cache::forget('avatar:'.$user->profile_id); Cache::forget("avatar:{$user->profile_id}"); Cache::forget('user:account:id:'.$user->id); AccountService::del($user->profile_id); return AccountService::get($user->profile_id); } /** * GET /api/v1.1/accounts/{id}/posts * * @return \App\Transformer\Api\StatusTransformer */ public function accountPosts(Request $request, $id) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $account = AccountService::get($id); if (! $account || $account['username'] !== $request->input('username')) { return $this->json([]); } $posts = ProfileStatusService::get($id); if (! $posts) { return $this->json([]); } $res = collect($posts) ->map(function ($id) { return StatusService::get($id); }) ->filter(function ($post) { return $post && isset($post['account']); }) ->toArray(); return $this->json($res); } /** * POST /api/v1.1/accounts/change-password * * @return \App\Transformer\Api\AccountTransformer */ public function accountChangePassword(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $this->validate($request, [ 'current_password' => 'bail|required|current_password', 'new_password' => 'required|min:'.config('pixelfed.min_password_length', 8), 'confirm_password' => 'required|same:new_password', ], [ 'current_password' => 'The password you entered is incorrect', ]); $user->password = bcrypt($request->input('new_password')); $user->save(); $log = new AccountLog; $log->user_id = $user->id; $log->item_id = $user->id; $log->item_type = 'App\User'; $log->action = 'account.edit.password'; $log->message = 'Password changed'; $log->link = null; $log->ip_address = $request->ip(); $log->user_agent = $request->userAgent(); $log->save(); Mail::to($request->user())->send(new PasswordChange($user)); return $this->json(AccountService::get($user->profile_id)); } /** * GET /api/v1.1/accounts/login-activity * * @return array */ public function accountLoginActivity(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $agent = new Agent(); $currentIp = $request->ip(); $activity = AccountLog::whereUserId($user->id) ->whereAction('auth.login') ->orderBy('created_at', 'desc') ->groupBy('ip_address') ->limit(10) ->get() ->map(function ($item) use ($agent, $currentIp) { $agent->setUserAgent($item->user_agent); return [ 'id' => $item->id, 'action' => $item->action, 'ip' => $item->ip_address, 'ip_current' => $item->ip_address === $currentIp, 'is_mobile' => $agent->isMobile(), 'device' => $agent->device(), 'browser' => $agent->browser(), 'platform' => $agent->platform(), 'created_at' => $item->created_at->format('c'), ]; }); return $this->json($activity); } /** * GET /api/v1.1/accounts/two-factor * * @return array */ public function accountTwoFactor(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $res = [ 'active' => (bool) $user->{'2fa_enabled'}, 'setup_at' => $user->{'2fa_setup_at'}, ]; return $this->json($res); } /** * GET /api/v1.1/accounts/emails-from-pixelfed * * @return array */ public function accountEmailsFromPixelfed(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $from = config('mail.from.address'); $emailVerifications = EmailVerification::whereUserId($user->id) ->orderByDesc('id') ->where('created_at', '>', now()->subDays(14)) ->limit(10) ->get() ->map(function ($mail) use ($user, $from) { return [ 'type' => 'Email Verification', 'subject' => 'Confirm Email', 'to_address' => $user->email, 'from_address' => $from, 'created_at' => str_replace('@', 'at', $mail->created_at->format('M j, Y @ g:i:s A')), ]; }) ->toArray(); $passwordResets = DB::table('password_resets') ->whereEmail($user->email) ->where('created_at', '>', now()->subDays(14)) ->orderByDesc('created_at') ->limit(10) ->get() ->map(function ($mail) use ($user, $from) { return [ 'type' => 'Password Reset', 'subject' => 'Reset Password Notification', 'to_address' => $user->email, 'from_address' => $from, 'created_at' => str_replace('@', 'at', now()->parse($mail->created_at)->format('M j, Y @ g:i:s A')), ]; }) ->toArray(); $passwordChanges = AccountLog::whereUserId($user->id) ->whereAction('account.edit.password') ->where('created_at', '>', now()->subDays(14)) ->orderByDesc('created_at') ->limit(10) ->get() ->map(function ($mail) use ($user, $from) { return [ 'type' => 'Password Change', 'subject' => 'Password Change', 'to_address' => $user->email, 'from_address' => $from, 'created_at' => str_replace('@', 'at', now()->parse($mail->created_at)->format('M j, Y @ g:i:s A')), ]; }) ->toArray(); $res = collect([]) ->merge($emailVerifications) ->merge($passwordResets) ->merge($passwordChanges) ->sortByDesc('created_at') ->values(); return $this->json($res); } /** * GET /api/v1.1/accounts/apps-and-applications * * @return array */ public function accountApps(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); $user = $request->user(); abort_if($user->status != null, 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $res = $user->tokens->sortByDesc('created_at')->take(10)->map(function ($token, $key) use ($request) { return [ 'id' => $token->id, 'current_session' => $request->user()->token()->id == $token->id, 'name' => $token->client->name, 'scopes' => $token->scopes, 'revoked' => $token->revoked, 'created_at' => str_replace('@', 'at', now()->parse($token->created_at)->format('M j, Y @ g:i:s A')), 'expires_at' => str_replace('@', 'at', now()->parse($token->expires_at)->format('M j, Y @ g:i:s A')), ]; }); return $this->json($res); } public function inAppRegistrationPreFlightCheck(Request $request) { return [ 'open' => (bool) config_cache('pixelfed.open_registration'), 'iara' => (bool) config_cache('pixelfed.allow_app_registration'), ]; } public function inAppRegistration(Request $request) { abort_if($request->user(), 404); abort_unless((bool) config_cache('pixelfed.open_registration'), 404); abort_unless((bool) config_cache('pixelfed.allow_app_registration'), 404); abort_unless($request->hasHeader('X-PIXELFED-APP'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $rl = RateLimiter::attempt('pf:apiv1.1:iar:'.$request->ip(), config('pixelfed.app_registration_rate_limit_attempts', 3), function () {}, config('pixelfed.app_registration_rate_limit_decay', 1800)); abort_if(! $rl, 400, 'Too many requests'); $this->validate($request, [ 'email' => [ 'required', 'string', 'email', 'max:255', 'unique:users', function ($attribute, $value, $fail) { $banned = EmailService::isBanned($value); if ($banned) { return $fail('Email is invalid.'); } }, ], 'username' => [ 'required', 'min:2', 'max:15', 'unique:users', function ($attribute, $value, $fail) { $dash = substr_count($value, '-'); $underscore = substr_count($value, '_'); $period = substr_count($value, '.'); if (ends_with($value, ['.php', '.js', '.css'])) { return $fail('Username is invalid.'); } if (($dash + $underscore + $period) > 1) { return $fail('Username is invalid. Can only contain one dash (-), period (.) or underscore (_).'); } if (! ctype_alnum($value[0])) { return $fail('Username is invalid. Must start with a letter or number.'); } if (! ctype_alnum($value[strlen($value) - 1])) { return $fail('Username is invalid. Must end with a letter or number.'); } $val = str_replace(['_', '.', '-'], '', $value); if (! ctype_alnum($val)) { return $fail('Username is invalid. Username must be alpha-numeric and may contain dashes (-), periods (.) and underscores (_).'); } $restricted = RestrictedNames::get(); if (in_array(strtolower($value), array_map('strtolower', $restricted))) { return $fail('Username cannot be used.'); } }, ], 'password' => 'required|string|min:8', ]); $email = $request->input('email'); $username = $request->input('username'); $password = $request->input('password'); if (config('database.default') == 'pgsql') { $username = strtolower($username); $email = strtolower($email); } $user = new User; $user->name = $username; $user->username = $username; $user->email = $email; $user->password = Hash::make($password); $user->register_source = 'app'; $user->app_register_ip = $request->ip(); $user->app_register_token = Str::random(40); $user->save(); $rtoken = Str::random(64); $verify = new EmailVerification(); $verify->user_id = $user->id; $verify->email = $user->email; $verify->user_token = $user->app_register_token; $verify->random_token = $rtoken; $verify->save(); $params = http_build_query([ 'ut' => $user->app_register_token, 'rt' => $rtoken, 'ea' => base64_encode($user->email), ]); $appUrl = url('/api/v1.1/auth/iarer?'.$params); Mail::to($user->email)->send(new ConfirmAppEmail($verify, $appUrl)); return response()->json([ 'success' => true, ]); } public function inAppRegistrationEmailRedirect(Request $request) { $this->validate($request, [ 'ut' => 'required', 'rt' => 'required', 'ea' => 'required', ]); $ut = $request->input('ut'); $rt = $request->input('rt'); $ea = $request->input('ea'); $params = http_build_query([ 'ut' => $ut, 'rt' => $rt, 'domain' => config('pixelfed.domain.app'), 'ea' => $ea, ]); $url = 'pixelfed://confirm-account/'.$ut.'?'.$params; return redirect()->away($url); } public function inAppRegistrationConfirm(Request $request) { abort_if($request->user(), 404); abort_unless((bool) config_cache('pixelfed.open_registration'), 404); abort_unless((bool) config_cache('pixelfed.allow_app_registration'), 404); abort_unless($request->hasHeader('X-PIXELFED-APP'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $rl = RateLimiter::attempt('pf:apiv1.1:iarc:'.$request->ip(), config('pixelfed.app_registration_confirm_rate_limit_attempts', 20), function () {}, config('pixelfed.app_registration_confirm_rate_limit_decay', 1800)); abort_if(! $rl, 429, 'Too many requests'); $request->validate([ 'user_token' => 'required', 'random_token' => 'required', 'email' => 'required', ]); $verify = EmailVerification::whereEmail($request->input('email')) ->whereUserToken($request->input('user_token')) ->whereRandomToken($request->input('random_token')) ->first(); if (! $verify) { return response()->json(['error' => 'Invalid tokens'], 403); } if ($verify->created_at->lt(now()->subHours(24))) { $verify->delete(); return response()->json(['error' => 'Invalid tokens'], 403); } $user = User::findOrFail($verify->user_id); $user->email_verified_at = now(); $user->last_active_at = now(); $user->save(); $token = $user->createToken('Pixelfed', ['read', 'write', 'follow', 'admin:read', 'admin:write', 'push']); return response()->json([ 'access_token' => $token->accessToken, ]); } public function archive(Request $request, $id) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $status = Status::whereNull('in_reply_to_id') ->whereNull('reblog_of_id') ->whereProfileId($request->user()->profile_id) ->findOrFail($id); if ($status->scope === 'archived') { return [200]; } $archive = new StatusArchived; $archive->status_id = $status->id; $archive->profile_id = $status->profile_id; $archive->original_scope = $status->scope; $archive->save(); $status->scope = 'archived'; $status->visibility = 'draft'; $status->save(); StatusService::del($status->id, true); AccountService::syncPostCount($status->profile_id); return [200]; } public function unarchive(Request $request, $id) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $status = Status::whereNull('in_reply_to_id') ->whereNull('reblog_of_id') ->whereProfileId($request->user()->profile_id) ->findOrFail($id); if ($status->scope !== 'archived') { return [200]; } $archive = StatusArchived::whereStatusId($status->id) ->whereProfileId($status->profile_id) ->firstOrFail(); $status->scope = $archive->original_scope; $status->visibility = $archive->original_scope; $status->save(); $archive->delete(); StatusService::del($status->id, true); AccountService::syncPostCount($status->profile_id); return [200]; } public function archivedPosts(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $statuses = Status::whereProfileId($request->user()->profile_id) ->whereScope('archived') ->orderByDesc('id') ->cursorPaginate(10); return StatusStateless::collection($statuses); } public function placesById(Request $request, $id, $slug) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $place = Place::whereSlug($slug)->findOrFail($id); $posts = Cache::remember('pf-api:v1.1:places-by-id:'.$place->id, 3600, function () use ($place) { return Status::wherePlaceId($place->id) ->whereNull('uri') ->whereScope('public') ->orderByDesc('created_at') ->limit(60) ->pluck('id'); }); $posts = $posts->map(function ($id) { return StatusService::get($id); }) ->filter() ->values(); return [ 'place' => [ 'id' => $place->id, 'name' => $place->name, 'slug' => $place->slug, 'country' => $place->country, 'lat' => $place->lat, 'long' => $place->long, ], 'posts' => $posts]; } public function moderatePost(Request $request, $id) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_if($request->user()->is_admin != true, 403); abort_unless($request->user()->tokenCan('admin:write'), 403); if (config('pixelfed.bouncer.cloud_ips.ban_signups')) { abort_if(BouncerService::checkIp($request->ip()), 404); } $this->validate($request, [ 'action' => 'required|in:cw,mark-public,mark-unlisted,mark-private,mark-spammer,delete', ]); $action = $request->input('action'); $status = Status::find($id); if (! $status) { return response()->json(['error' => 'Cannot find status'], 400); } if ($status->uri == null) { if ($status->profile->user && $status->profile->user->is_admin) { return response()->json(['error' => 'Cannot moderate admin accounts'], 400); } } if ($action == 'mark-spammer') { $status->profile->update([ 'unlisted' => true, 'cw' => true, 'no_autolink' => true, ]); Status::whereProfileId($status->profile_id) ->get() ->each(function ($s) { if (in_array($s->scope, ['public', 'unlisted'])) { $s->scope = 'private'; $s->visibility = 'private'; } $s->is_nsfw = true; $s->save(); StatusService::del($s->id, true); }); Cache::forget('pf:bouncer_v0:exemption_by_pid:'.$status->profile_id); Cache::forget('pf:bouncer_v0:recent_by_pid:'.$status->profile_id); Cache::forget('admin-dash:reports:spam-count'); } elseif ($action == 'cw') { $state = $status->is_nsfw; $status->is_nsfw = ! $state; $status->save(); StatusService::del($status->id); } elseif ($action == 'mark-public') { $state = $status->scope; $status->scope = 'public'; $status->visibility = 'public'; $status->save(); StatusService::del($status->id, true); if ($state !== 'public') { if ($status->uri) { if ($status->in_reply_to_id == null && $status->reblog_of_id == null) { NetworkTimelineService::add($status->id); } } else { if ($status->in_reply_to_id == null && $status->reblog_of_id == null) { PublicTimelineService::add($status->id); } } } } elseif ($action == 'mark-unlisted') { $state = $status->scope; $status->scope = 'unlisted'; $status->visibility = 'unlisted'; $status->save(); StatusService::del($status->id); if ($state == 'public') { PublicTimelineService::del($status->id); NetworkTimelineService::del($status->id); } } elseif ($action == 'mark-private') { $state = $status->scope; $status->scope = 'private'; $status->visibility = 'private'; $status->save(); StatusService::del($status->id); if ($state == 'public') { PublicTimelineService::del($status->id); NetworkTimelineService::del($status->id); } } elseif ($action == 'delete') { PublicTimelineService::del($status->id); NetworkTimelineService::del($status->id); Cache::forget('_api:statuses:recent_9:'.$status->profile_id); Cache::forget('profile:status_count:'.$status->profile_id); Cache::forget('profile:embed:'.$status->profile_id); StatusService::del($status->id, true); Cache::forget('profile:status_count:'.$status->profile_id); $status->uri ? RemoteStatusDelete::dispatch($status) : StatusDelete::dispatch($status); return []; } Cache::forget('_api:statuses:recent_9:'.$status->profile_id); return StatusService::get($status->id, false); } public function getWebSettings(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('read'), 403); $uid = $request->user()->id; $settings = UserSetting::firstOrCreate([ 'user_id' => $uid, ]); if (! $settings->other) { return []; } return $settings->other; } public function setWebSettings(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); $this->validate($request, [ 'field' => 'required|in:enable_reblogs,hide_reblog_banner', 'value' => 'required', ]); $field = $request->input('field'); $value = $request->input('value'); $settings = UserSetting::firstOrCreate([ 'user_id' => $request->user()->id, ]); if (! $settings->other) { $other = []; } else { $other = $settings->other; } $other[$field] = $value; $settings->other = $other; $settings->save(); return [200]; } public function getMutualAccounts(Request $request, $id) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('follow'), 403); $account = AccountService::get($id, true); if (! $account || ! isset($account['id'])) { return []; } $res = collect(FollowerService::mutualAccounts($request->user()->profile_id, $id)) ->map(function ($accountId) { return AccountService::get($accountId, true); }) ->filter() ->take(24) ->values(); return $this->json($res); } public function accountUsernameToId(Request $request, $username) { abort_if(! $request->user() || ! $request->user()->token() || ! $username, 403); abort_unless($request->user()->tokenCan('read'), 403); $username = trim($username); $rateLimiting = (bool) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.enabled'); $ipRateLimiting = (bool) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.ip_enabled'); if ($ipRateLimiting) { $userLimit = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.ip_limit'); $userDecay = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.ip_decay'); $userKey = 'pf:apiv1.1:acctU2ID:byIp:'.$request->ip(); if (RateLimiter::tooManyAttempts($userKey, $userLimit)) { $limits = [ 'X-Rate-Limit-Limit' => $userLimit, 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit), 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey), ]; return $this->json(['error' => 'Too many attempts!'], 429, $limits); } RateLimiter::increment($userKey, $userDecay); $limits = [ 'X-Rate-Limit-Limit' => $userLimit, 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit), 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey), ]; } if ($rateLimiting) { $userLimit = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.limit'); $userDecay = (int) config_cache('api.rate-limits.v1Dot1.accounts.usernameToId.decay'); $userKey = 'pf:apiv1.1:acctU2ID:byUid:'.$request->user()->id; if (RateLimiter::tooManyAttempts($userKey, $userLimit)) { $limits = [ 'X-Rate-Limit-Limit' => $userLimit, 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit), 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey), ]; return $this->json(['error' => 'Too many attempts!'], 429, $limits); } RateLimiter::increment($userKey, $userDecay); $limits = [ 'X-Rate-Limit-Limit' => $userLimit, 'X-Rate-Limit-Remaining' => RateLimiter::remaining($userKey, $userLimit), 'X-Rate-Limit-Reset' => RateLimiter::availableIn($userKey), ]; } if (str_ends_with($username, config_cache('pixelfed.domain.app'))) { $pre = str_starts_with($username, '@') ? substr($username, 1) : $username; $parts = explode('@', $pre); $username = $parts[0]; } $accountId = AccountService::usernameToId($username, true); if (! $accountId) { return []; } $account = AccountService::get($accountId); return $this->json($account, 200, $rateLimiting ? $limits : []); } public function getExpoPushNotifications(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('push'), 403); abort_unless(config('services.expo.access_token') && strlen(config('services.expo.access_token')) > 10, 404, 'Push notifications are not supported on this server.'); $user = $request->user(); $res = [ 'expo_token' => (bool) $user->expo_token, 'notify_like' => (bool) $user->notify_like, 'notify_follow' => (bool) $user->notify_follow, 'notify_mention' => (bool) $user->notify_mention, 'notify_comment' => (bool) $user->notify_comment, ]; return $this->json($res); } public function disableExpoPushNotifications(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('push'), 403); abort_unless(config('services.expo.access_token') && strlen(config('services.expo.access_token')) > 10, 404, 'Push notifications are not supported on this server.'); $request->user()->update([ 'expo_token' => null, ]); return $this->json(['expo_token' => null]); } public function updateExpoPushNotifications(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('push'), 403); abort_unless(config('services.expo.access_token') && strlen(config('services.expo.access_token')) > 10, 404, 'Push notifications are not supported on this server.'); $this->validate($request, [ 'expo_token' => ['required', ExpoPushToken::rule()], 'notify_like' => 'sometimes', 'notify_follow' => 'sometimes', 'notify_mention' => 'sometimes', 'notify_comment' => 'sometimes', ]); $user = $request->user()->update([ 'expo_token' => $request->input('expo_token'), 'notify_like' => $request->has('notify_like') && $request->boolean('notify_like'), 'notify_follow' => $request->has('notify_follow') && $request->boolean('notify_follow'), 'notify_mention' => $request->has('notify_mention') && $request->boolean('notify_mention'), 'notify_comment' => $request->has('notify_comment') && $request->boolean('notify_comment'), ]); $res = [ 'expo_token' => (bool) $request->user()->expo_token, 'notify_like' => (bool) $request->user()->notify_like, 'notify_follow' => (bool) $request->user()->notify_follow, 'notify_mention' => (bool) $request->user()->notify_mention, 'notify_comment' => (bool) $request->user()->notify_comment, ]; return $this->json($res); } /** * POST /api/v1.1/status/create * * * @return StatusTransformer */ public function statusCreate(Request $request) { abort_if(! $request->user() || ! $request->user()->token(), 403); abort_unless($request->user()->tokenCan('write'), 403); $this->validate($request, [ 'status' => 'nullable|string|max:'.(int) config_cache('pixelfed.max_caption_length'), 'file' => [ 'required', 'file', 'mimetypes:'.config_cache('pixelfed.media_types'), 'max:'.config_cache('pixelfed.max_photo_size'), function ($attribute, $value, $fail) { if (is_array($value) && count($value) > 1) { $fail('Only one file can be uploaded at a time.'); } }, ], 'sensitive' => 'nullable', 'visibility' => 'string|in:private,unlisted,public', 'spoiler_text' => 'sometimes|max:140', ]); if ($request->hasHeader('idempotency-key')) { $key = 'pf:api:v1:status:idempotency-key:'.$request->user()->id.':'.hash('sha1', $request->header('idempotency-key')); $exists = Cache::has($key); abort_if($exists, 400, 'Duplicate idempotency key.'); Cache::put($key, 1, 3600); } if (config('costar.enabled') == true) { $blockedKeywords = config('costar.keyword.block'); if ($blockedKeywords !== null && $request->status) { $keywords = config('costar.keyword.block'); foreach ($keywords as $kw) { if (Str::contains($request->status, $kw) == true) { abort(400, 'Invalid object. Contains banned keyword.'); } } } } $user = $request->user(); $limitKey = 'compose:rate-limit:media-upload:'.$user->id; $limitTtl = now()->addMinutes(15); $limitReached = Cache::remember($limitKey, $limitTtl, function () use ($user) { $dailyLimit = Media::whereUserId($user->id)->where('created_at', '>', now()->subDays(1))->count(); return $dailyLimit >= 1250; }); abort_if($limitReached == true, 429); if ($user->has_roles) { abort_if(! UserRoleService::can('can-post', $user->id), 403, 'Invalid permissions for this action'); } $profile = $user->profile; if (config_cache('pixelfed.enforce_account_limit') == true) { $size = Cache::remember($user->storageUsedKey(), now()->addDays(3), function () use ($user) { return Media::whereUserId($user->id)->sum('size') / 1000; }); $limit = (int) config_cache('pixelfed.max_account_size'); if ($size >= $limit) { abort(403, 'Account size limit reached.'); } } abort_if($limitReached == true, 429); $photo = $request->file('file'); $mimes = explode(',', config_cache('pixelfed.media_types')); if (in_array($photo->getMimeType(), $mimes) == false) { abort(403, 'Invalid or unsupported mime type.'); } $storagePath = MediaPathService::get($user, 2); $path = $photo->storePublicly($storagePath); $hash = \hash_file('sha256', $photo); $license = null; $mime = $photo->getMimeType(); $settings = UserSetting::whereUserId($user->id)->first(); if ($settings && ! empty($settings->compose_settings)) { $compose = $settings->compose_settings; if (isset($compose['default_license']) && $compose['default_license'] != 1) { $license = $compose['default_license']; } } abort_if(MediaBlocklistService::exists($hash) == true, 451); $visibility = $profile->is_private ? 'private' : ( $profile->unlisted == true && $request->input('visibility', 'public') == 'public' ? 'unlisted' : $request->input('visibility', 'public')); if ($user->last_active_at == null) { return []; } $content = strip_tags($request->input('status')); $rendered = Autolink::create()->autolink($content); $cw = $user->profile->cw == true ? true : $request->boolean('sensitive', false); $spoilerText = $cw && $request->filled('spoiler_text') ? $request->input('spoiler_text') : null; $status = new Status; $status->caption = $content; $status->rendered = $rendered; $status->profile_id = $user->profile_id; $status->is_nsfw = $cw; $status->cw_summary = $spoilerText; $status->scope = $visibility; $status->visibility = $visibility; $status->type = StatusController::mimeTypeCheck([$mime]); $status->save(); if (! $status) { abort(500, 'An error occured.'); } $media = new Media(); $media->status_id = $status->id; $media->profile_id = $profile->id; $media->user_id = $user->id; $media->media_path = $path; $media->original_sha256 = $hash; $media->size = $photo->getSize(); $media->mime = $mime; $media->order = 1; $media->caption = $request->input('description'); if ($license) { $media->license = $license; } $media->save(); switch ($media->mime) { case 'image/jpeg': case 'image/png': ImageOptimize::dispatch($media)->onQueue('mmo'); break; case 'video/mp4': VideoThumbnail::dispatch($media)->onQueue('mmo'); $preview_url = '/storage/no-preview.png'; $url = '/storage/no-preview.png'; break; } NewStatusPipeline::dispatch($status); Cache::forget('user:account:id:'.$user->id); Cache::forget('_api:statuses:recent_9:'.$user->profile_id); Cache::forget('profile:status_count:'.$user->profile_id); Cache::forget($user->storageUsedKey()); Cache::forget('profile:embed:'.$status->profile_id); Cache::forget($limitKey); $res = StatusService::getMastodon($status->id, false); $res['favourited'] = false; $res['language'] = 'en'; $res['bookmarked'] = false; $res['card'] = null; return $this->json($res); } }