2018-12-23 21:04:54 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-13 07:49:20 +01:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:04:54 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-10-12 06:26:58 +02:00
|
|
|
defmodule Pleroma.Web.AdminAPI.AdminAPIController do
|
2018-10-02 18:38:16 +02:00
|
|
|
use Pleroma.Web, :controller
|
2019-09-29 10:17:38 +02:00
|
|
|
|
2020-09-21 08:33:51 +02:00
|
|
|
import Pleroma.Web.ControllerHelper,
|
|
|
|
only: [json_response: 3, fetch_integer_param: 3]
|
2019-09-29 10:17:38 +02:00
|
|
|
|
2020-02-08 10:55:37 +01:00
|
|
|
alias Pleroma.Config
|
2020-05-07 10:14:54 +02:00
|
|
|
alias Pleroma.MFA
|
2019-08-25 21:39:37 +02:00
|
|
|
alias Pleroma.ModerationLog
|
2020-01-09 20:18:55 +01:00
|
|
|
alias Pleroma.Stats
|
2018-12-18 11:13:57 +01:00
|
|
|
alias Pleroma.User
|
2019-05-16 21:09:18 +02:00
|
|
|
alias Pleroma.Web.ActivityPub.ActivityPub
|
2020-05-10 08:16:48 +02:00
|
|
|
alias Pleroma.Web.AdminAPI
|
2019-03-13 04:13:28 +01:00
|
|
|
alias Pleroma.Web.AdminAPI.AccountView
|
2019-08-25 21:39:37 +02:00
|
|
|
alias Pleroma.Web.AdminAPI.ModerationLogView
|
2019-09-22 15:36:59 +02:00
|
|
|
alias Pleroma.Web.Endpoint
|
2020-06-24 12:07:47 +02:00
|
|
|
alias Pleroma.Web.Plugs.OAuthScopesPlug
|
2019-09-22 15:36:59 +02:00
|
|
|
alias Pleroma.Web.Router
|
2019-04-06 15:25:19 +02:00
|
|
|
|
2019-09-29 10:17:38 +02:00
|
|
|
@users_page_size 50
|
|
|
|
|
2019-09-15 17:22:08 +02:00
|
|
|
plug(
|
|
|
|
OAuthScopesPlug,
|
2019-12-06 18:33:47 +01:00
|
|
|
%{scopes: ["read:accounts"], admin: true}
|
2020-10-30 16:34:02 +01:00
|
|
|
when action in [:right_get, :show_user_credentials, :create_backup]
|
2019-09-15 17:22:08 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
plug(
|
|
|
|
OAuthScopesPlug,
|
2019-12-06 18:33:47 +01:00
|
|
|
%{scopes: ["write:accounts"], admin: true}
|
2019-09-15 17:22:08 +02:00
|
|
|
when action in [
|
|
|
|
:get_password_reset,
|
2020-04-21 15:29:19 +02:00
|
|
|
:force_password_reset,
|
2019-09-15 17:22:08 +02:00
|
|
|
:tag_users,
|
|
|
|
:untag_users,
|
|
|
|
:right_add,
|
2020-04-21 15:29:19 +02:00
|
|
|
:right_add_multiple,
|
2020-01-31 19:07:46 +01:00
|
|
|
:right_delete,
|
2020-05-07 10:14:54 +02:00
|
|
|
:disable_mfa,
|
2020-04-21 15:29:19 +02:00
|
|
|
:right_delete_multiple,
|
2020-01-31 19:07:46 +01:00
|
|
|
:update_user_credentials
|
2019-09-15 17:22:08 +02:00
|
|
|
]
|
|
|
|
)
|
|
|
|
|
2019-09-17 21:19:39 +02:00
|
|
|
plug(
|
|
|
|
OAuthScopesPlug,
|
2019-12-06 18:33:47 +01:00
|
|
|
%{scopes: ["read:statuses"], admin: true}
|
2020-05-20 16:00:41 +02:00
|
|
|
when action in [:list_user_statuses, :list_instance_statuses]
|
2019-09-17 21:19:39 +02:00
|
|
|
)
|
|
|
|
|
2020-09-01 03:23:33 +02:00
|
|
|
plug(
|
|
|
|
OAuthScopesPlug,
|
|
|
|
%{scopes: ["read:chats"], admin: true}
|
|
|
|
when action in [:list_user_chats]
|
|
|
|
)
|
|
|
|
|
2019-09-17 21:19:39 +02:00
|
|
|
plug(
|
|
|
|
OAuthScopesPlug,
|
2019-12-06 18:33:47 +01:00
|
|
|
%{scopes: ["read"], admin: true}
|
2020-04-21 15:29:19 +02:00
|
|
|
when action in [
|
|
|
|
:list_log,
|
|
|
|
:stats,
|
|
|
|
:need_reboot
|
|
|
|
]
|
2019-09-17 21:19:39 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
plug(
|
|
|
|
OAuthScopesPlug,
|
2019-12-06 18:33:47 +01:00
|
|
|
%{scopes: ["write"], admin: true}
|
2020-04-21 15:29:19 +02:00
|
|
|
when action in [
|
|
|
|
:restart,
|
|
|
|
:resend_confirmation_email,
|
|
|
|
:confirm_email,
|
|
|
|
:reload_emoji
|
|
|
|
]
|
2019-09-17 21:19:39 +02:00
|
|
|
)
|
|
|
|
|
2020-05-20 16:00:41 +02:00
|
|
|
action_fallback(AdminAPI.FallbackController)
|
2018-10-02 18:38:16 +02:00
|
|
|
|
2019-11-14 15:44:07 +01:00
|
|
|
def list_instance_statuses(conn, %{"instance" => instance} = params) do
|
2020-02-26 12:47:19 +01:00
|
|
|
with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
|
2019-11-14 15:44:07 +01:00
|
|
|
{page, page_size} = page_params(params)
|
|
|
|
|
2021-01-21 17:17:37 +01:00
|
|
|
result =
|
2020-02-10 12:32:38 +01:00
|
|
|
ActivityPub.fetch_statuses(nil, %{
|
2020-06-04 19:33:16 +02:00
|
|
|
instance: instance,
|
|
|
|
limit: page_size,
|
|
|
|
offset: (page - 1) * page_size,
|
2021-01-21 17:17:37 +01:00
|
|
|
exclude_reblogs: not with_reblogs,
|
|
|
|
total: true
|
2019-11-14 15:44:07 +01:00
|
|
|
})
|
|
|
|
|
|
|
|
conn
|
2020-05-10 08:16:48 +02:00
|
|
|
|> put_view(AdminAPI.StatusView)
|
2021-01-21 17:17:37 +01:00
|
|
|
|> render("index.json", %{total: result[:total], activities: result[:items], as: :activity})
|
2019-11-14 15:44:07 +01:00
|
|
|
end
|
2019-03-27 19:19:00 +01:00
|
|
|
|
2020-05-18 21:56:09 +02:00
|
|
|
def list_user_statuses(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = params) do
|
2020-02-26 12:47:19 +01:00
|
|
|
with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
|
2019-07-24 00:50:09 +02:00
|
|
|
godmode = params["godmode"] == "true" || params["godmode"] == true
|
|
|
|
|
2020-05-18 21:56:09 +02:00
|
|
|
with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
|
2020-12-30 21:36:04 +01:00
|
|
|
{page, page_size} = page_params(params)
|
2019-07-13 23:37:19 +02:00
|
|
|
|
2021-01-21 16:51:21 +01:00
|
|
|
result =
|
2020-12-30 23:10:10 +01:00
|
|
|
ActivityPub.fetch_user_activities(user, nil, %{
|
2020-06-04 19:33:16 +02:00
|
|
|
limit: page_size,
|
2020-12-30 21:36:04 +01:00
|
|
|
offset: (page - 1) * page_size,
|
2020-06-04 19:33:16 +02:00
|
|
|
godmode: godmode,
|
2021-01-04 17:13:17 +01:00
|
|
|
exclude_reblogs: not with_reblogs,
|
2021-01-21 16:51:21 +01:00
|
|
|
pagination_type: :offset,
|
|
|
|
total: true
|
2019-07-13 23:37:19 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
conn
|
2020-06-03 12:53:46 +02:00
|
|
|
|> put_view(AdminAPI.StatusView)
|
2021-01-21 16:51:21 +01:00
|
|
|
|> render("index.json", %{total: result[:total], activities: result[:items], as: :activity})
|
2019-07-13 23:37:19 +02:00
|
|
|
else
|
|
|
|
_ -> {:error, :not_found}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-01 03:23:33 +02:00
|
|
|
def list_user_chats(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = _params) do
|
|
|
|
with %User{id: user_id} <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
|
|
|
|
chats =
|
2020-09-02 02:05:24 +02:00
|
|
|
Pleroma.Chat.for_user_query(user_id)
|
2020-09-01 03:23:33 +02:00
|
|
|
|> Pleroma.Repo.all()
|
|
|
|
|
|
|
|
conn
|
2020-09-10 08:44:32 +02:00
|
|
|
|> put_view(AdminAPI.ChatView)
|
2020-09-01 03:23:33 +02:00
|
|
|
|> render("index.json", chats: chats)
|
|
|
|
else
|
|
|
|
_ -> {:error, :not_found}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-08-25 21:39:37 +02:00
|
|
|
def tag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
|
|
|
|
with {:ok, _} <- User.tag(nicknames, tags) do
|
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
actor: admin,
|
|
|
|
nicknames: nicknames,
|
|
|
|
tags: tags,
|
|
|
|
action: "tag"
|
|
|
|
})
|
|
|
|
|
|
|
|
json_response(conn, :no_content, "")
|
|
|
|
end
|
2018-12-06 18:06:50 +01:00
|
|
|
end
|
|
|
|
|
2019-08-25 21:39:37 +02:00
|
|
|
def untag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
|
|
|
|
with {:ok, _} <- User.untag(nicknames, tags) do
|
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
actor: admin,
|
|
|
|
nicknames: nicknames,
|
|
|
|
tags: tags,
|
|
|
|
action: "untag"
|
|
|
|
})
|
|
|
|
|
|
|
|
json_response(conn, :no_content, "")
|
|
|
|
end
|
2018-12-06 18:06:50 +01:00
|
|
|
end
|
|
|
|
|
2019-10-11 14:58:45 +02:00
|
|
|
def right_add_multiple(%{assigns: %{user: admin}} = conn, %{
|
2019-08-25 21:39:37 +02:00
|
|
|
"permission_group" => permission_group,
|
2019-10-09 16:03:54 +02:00
|
|
|
"nicknames" => nicknames
|
2019-08-25 21:39:37 +02:00
|
|
|
})
|
2018-11-10 15:16:19 +01:00
|
|
|
when permission_group in ["moderator", "admin"] do
|
2019-10-20 21:29:56 +02:00
|
|
|
update = %{:"is_#{permission_group}" => true}
|
2018-11-02 08:15:09 +01:00
|
|
|
|
2019-10-09 16:03:54 +02:00
|
|
|
users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
|
|
|
|
|
2019-10-20 21:29:56 +02:00
|
|
|
for u <- users, do: User.admin_api_update(u, update)
|
2018-12-01 09:03:16 +01:00
|
|
|
|
2019-08-25 21:39:37 +02:00
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
action: "grant",
|
|
|
|
actor: admin,
|
2019-10-09 16:03:54 +02:00
|
|
|
subject: users,
|
2019-08-25 21:39:37 +02:00
|
|
|
permission: permission_group
|
|
|
|
})
|
|
|
|
|
2019-10-20 21:29:56 +02:00
|
|
|
json(conn, update)
|
2018-12-09 10:12:48 +01:00
|
|
|
end
|
|
|
|
|
2019-10-11 14:58:45 +02:00
|
|
|
def right_add_multiple(conn, _) do
|
|
|
|
render_error(conn, :not_found, "No such permission_group")
|
|
|
|
end
|
|
|
|
|
2019-08-25 21:39:37 +02:00
|
|
|
def right_add(%{assigns: %{user: admin}} = conn, %{
|
|
|
|
"permission_group" => permission_group,
|
|
|
|
"nickname" => nickname
|
|
|
|
})
|
2018-11-10 15:16:19 +01:00
|
|
|
when permission_group in ["moderator", "admin"] do
|
2019-10-16 20:59:21 +02:00
|
|
|
fields = %{:"is_#{permission_group}" => true}
|
2018-11-02 08:15:09 +01:00
|
|
|
|
2019-09-24 14:50:07 +02:00
|
|
|
{:ok, user} =
|
|
|
|
nickname
|
|
|
|
|> User.get_cached_by_nickname()
|
2019-10-16 20:59:21 +02:00
|
|
|
|> User.admin_api_update(fields)
|
2018-12-01 09:03:16 +01:00
|
|
|
|
2019-08-25 21:39:37 +02:00
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
action: "grant",
|
|
|
|
actor: admin,
|
2019-10-11 14:58:45 +02:00
|
|
|
subject: [user],
|
2019-08-25 21:39:37 +02:00
|
|
|
permission: permission_group
|
|
|
|
})
|
|
|
|
|
2019-10-16 20:59:21 +02:00
|
|
|
json(conn, fields)
|
2018-12-09 10:12:48 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def right_add(conn, _) do
|
2019-07-10 11:25:58 +02:00
|
|
|
render_error(conn, :not_found, "No such permission_group")
|
2018-11-02 08:15:09 +01:00
|
|
|
end
|
|
|
|
|
2018-11-02 08:19:56 +01:00
|
|
|
def right_get(conn, %{"nickname" => nickname}) do
|
2019-04-22 09:20:43 +02:00
|
|
|
user = User.get_cached_by_nickname(nickname)
|
2018-11-02 08:19:56 +01:00
|
|
|
|
|
|
|
conn
|
2018-12-01 09:03:16 +01:00
|
|
|
|> json(%{
|
2019-10-16 20:59:21 +02:00
|
|
|
is_moderator: user.is_moderator,
|
|
|
|
is_admin: user.is_admin
|
2018-12-01 09:03:16 +01:00
|
|
|
})
|
2018-11-02 08:19:56 +01:00
|
|
|
end
|
|
|
|
|
2019-10-11 14:58:45 +02:00
|
|
|
def right_delete_multiple(
|
2019-10-09 16:03:54 +02:00
|
|
|
%{assigns: %{user: %{nickname: admin_nickname} = admin}} = conn,
|
2018-11-10 14:42:34 +01:00
|
|
|
%{
|
2018-11-10 15:16:19 +01:00
|
|
|
"permission_group" => permission_group,
|
2019-10-09 16:03:54 +02:00
|
|
|
"nicknames" => nicknames
|
2018-11-10 14:42:34 +01:00
|
|
|
}
|
|
|
|
)
|
2018-11-10 15:16:19 +01:00
|
|
|
when permission_group in ["moderator", "admin"] do
|
2019-10-09 16:03:54 +02:00
|
|
|
with false <- Enum.member?(nicknames, admin_nickname) do
|
2019-10-20 21:29:56 +02:00
|
|
|
update = %{:"is_#{permission_group}" => false}
|
2018-11-02 08:15:09 +01:00
|
|
|
|
2019-10-09 16:03:54 +02:00
|
|
|
users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
|
2018-12-01 09:03:16 +01:00
|
|
|
|
2019-10-20 21:29:56 +02:00
|
|
|
for u <- users, do: User.admin_api_update(u, update)
|
2019-08-25 21:39:37 +02:00
|
|
|
|
|
|
|
ModerationLog.insert_log(%{
|
2019-10-09 16:03:54 +02:00
|
|
|
action: "revoke",
|
2019-08-25 21:39:37 +02:00
|
|
|
actor: admin,
|
2019-10-09 16:03:54 +02:00
|
|
|
subject: users,
|
|
|
|
permission: permission_group
|
2019-08-25 21:39:37 +02:00
|
|
|
})
|
|
|
|
|
2019-10-20 21:29:56 +02:00
|
|
|
json(conn, update)
|
2019-10-09 16:03:54 +02:00
|
|
|
else
|
|
|
|
_ -> render_error(conn, :forbidden, "You can't revoke your own admin/moderator status.")
|
2019-08-25 21:39:37 +02:00
|
|
|
end
|
2019-02-19 16:40:57 +01:00
|
|
|
end
|
|
|
|
|
2019-10-11 14:58:45 +02:00
|
|
|
def right_delete_multiple(conn, _) do
|
2019-10-09 16:03:54 +02:00
|
|
|
render_error(conn, :not_found, "No such permission_group")
|
2019-09-24 14:50:07 +02:00
|
|
|
end
|
|
|
|
|
2018-11-10 14:42:34 +01:00
|
|
|
def right_delete(
|
2019-09-24 14:50:07 +02:00
|
|
|
%{assigns: %{user: admin}} = conn,
|
2018-11-10 14:42:34 +01:00
|
|
|
%{
|
2018-11-10 15:16:19 +01:00
|
|
|
"permission_group" => permission_group,
|
2018-11-10 14:42:34 +01:00
|
|
|
"nickname" => nickname
|
|
|
|
}
|
|
|
|
)
|
2018-11-10 15:16:19 +01:00
|
|
|
when permission_group in ["moderator", "admin"] do
|
2019-10-16 20:59:21 +02:00
|
|
|
fields = %{:"is_#{permission_group}" => false}
|
2018-11-02 08:15:09 +01:00
|
|
|
|
2019-09-24 14:50:07 +02:00
|
|
|
{:ok, user} =
|
|
|
|
nickname
|
|
|
|
|> User.get_cached_by_nickname()
|
2019-10-16 20:59:21 +02:00
|
|
|
|> User.admin_api_update(fields)
|
2018-12-01 09:03:16 +01:00
|
|
|
|
2019-09-24 14:50:07 +02:00
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
action: "revoke",
|
|
|
|
actor: admin,
|
2019-10-11 14:58:45 +02:00
|
|
|
subject: [user],
|
2019-09-24 14:50:07 +02:00
|
|
|
permission: permission_group
|
|
|
|
})
|
2019-08-25 21:39:37 +02:00
|
|
|
|
2019-10-16 20:59:21 +02:00
|
|
|
json(conn, fields)
|
2018-11-02 08:15:09 +01:00
|
|
|
end
|
|
|
|
|
2019-10-11 14:58:45 +02:00
|
|
|
def right_delete(%{assigns: %{user: %{nickname: nickname}}} = conn, %{"nickname" => nickname}) do
|
|
|
|
render_error(conn, :forbidden, "You can't revoke your own admin status.")
|
2018-10-02 18:38:16 +02:00
|
|
|
end
|
|
|
|
|
2018-12-09 10:12:48 +01:00
|
|
|
@doc "Get a password reset token (base64 string) for given nickname"
|
2018-10-12 06:28:20 +02:00
|
|
|
def get_password_reset(conn, %{"nickname" => nickname}) do
|
2019-04-22 09:20:43 +02:00
|
|
|
(%User{local: true} = user) = User.get_cached_by_nickname(nickname)
|
2018-10-02 19:03:05 +02:00
|
|
|
{:ok, token} = Pleroma.PasswordResetToken.create_token(user)
|
|
|
|
|
|
|
|
conn
|
2019-09-17 22:09:08 +02:00
|
|
|
|> json(%{
|
|
|
|
token: token.token,
|
2019-09-22 15:36:59 +02:00
|
|
|
link: Router.Helpers.reset_password_url(Endpoint, :reset, token.token)
|
2019-09-17 22:09:08 +02:00
|
|
|
})
|
2018-10-12 06:28:20 +02:00
|
|
|
end
|
|
|
|
|
2019-09-22 15:08:07 +02:00
|
|
|
@doc "Force password reset for a given user"
|
2019-11-01 16:45:47 +01:00
|
|
|
def force_password_reset(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
|
|
|
|
users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
|
2019-09-22 15:08:07 +02:00
|
|
|
|
2020-01-20 11:53:14 +01:00
|
|
|
Enum.each(users, &User.force_password_reset_async/1)
|
2019-11-01 16:45:47 +01:00
|
|
|
|
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
actor: admin,
|
|
|
|
subject: users,
|
|
|
|
action: "force_password_reset"
|
|
|
|
})
|
2019-09-22 15:08:07 +02:00
|
|
|
|
|
|
|
json_response(conn, :no_content, "")
|
2018-10-12 06:28:20 +02:00
|
|
|
end
|
|
|
|
|
2020-05-07 10:14:54 +02:00
|
|
|
@doc "Disable mfa for user's account."
|
|
|
|
def disable_mfa(conn, %{"nickname" => nickname}) do
|
|
|
|
case User.get_by_nickname(nickname) do
|
|
|
|
%User{} = user ->
|
|
|
|
MFA.disable(user)
|
|
|
|
json(conn, nickname)
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
{:error, :not_found}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-31 19:07:46 +01:00
|
|
|
@doc "Show a given user's credentials"
|
|
|
|
def show_user_credentials(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
|
2020-05-18 21:56:09 +02:00
|
|
|
with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
|
2020-01-31 19:07:46 +01:00
|
|
|
conn
|
|
|
|
|> put_view(AccountView)
|
|
|
|
|> render("credentials.json", %{user: user, for: admin})
|
|
|
|
else
|
|
|
|
_ -> {:error, :not_found}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
@doc "Updates a given user"
|
|
|
|
def update_user_credentials(
|
|
|
|
%{assigns: %{user: admin}} = conn,
|
|
|
|
%{"nickname" => nickname} = params
|
|
|
|
) do
|
2020-05-27 08:42:28 +02:00
|
|
|
with {_, %User{} = user} <- {:user, User.get_cached_by_nickname(nickname)},
|
2020-01-28 07:47:59 +01:00
|
|
|
{:ok, _user} <-
|
2020-01-31 19:07:46 +01:00
|
|
|
User.update_as_admin(user, params) do
|
2020-01-28 07:47:59 +01:00
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
actor: admin,
|
|
|
|
subject: [user],
|
2020-01-31 19:07:46 +01:00
|
|
|
action: "updated_users"
|
2020-01-28 07:47:59 +01:00
|
|
|
})
|
|
|
|
|
2020-01-31 19:07:46 +01:00
|
|
|
if params["password"] do
|
|
|
|
User.force_password_reset_async(user)
|
|
|
|
end
|
2020-01-28 07:47:59 +01:00
|
|
|
|
|
|
|
ModerationLog.insert_log(%{
|
|
|
|
actor: admin,
|
|
|
|
subject: [user],
|
|
|
|
action: "force_password_reset"
|
|
|
|
})
|
|
|
|
|
|
|
|
json(conn, %{status: "success"})
|
|
|
|
else
|
|
|
|
{:error, changeset} ->
|
2020-05-27 12:55:42 +02:00
|
|
|
errors = Map.new(changeset.errors, fn {key, {error, _}} -> {key, error} end)
|
2019-05-16 21:09:18 +02:00
|
|
|
|
2020-06-20 12:53:57 +02:00
|
|
|
{:errors, errors}
|
2019-08-25 21:39:37 +02:00
|
|
|
|
2020-01-28 07:47:59 +01:00
|
|
|
_ ->
|
2020-06-20 12:53:57 +02:00
|
|
|
{:error, :not_found}
|
2019-05-16 21:09:18 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-08-25 21:39:37 +02:00
|
|
|
def list_log(conn, params) do
|
|
|
|
{page, page_size} = page_params(params)
|
|
|
|
|
2019-08-27 19:48:16 +02:00
|
|
|
log =
|
|
|
|
ModerationLog.get_all(%{
|
|
|
|
page: page,
|
|
|
|
page_size: page_size,
|
|
|
|
start_date: params["start_date"],
|
2019-08-30 23:57:15 +02:00
|
|
|
end_date: params["end_date"],
|
|
|
|
user_id: params["user_id"],
|
|
|
|
search: params["search"]
|
2019-08-27 19:48:16 +02:00
|
|
|
})
|
2019-08-25 21:39:37 +02:00
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_view(ModerationLogView)
|
|
|
|
|> render("index.json", %{log: log})
|
|
|
|
end
|
|
|
|
|
2020-01-25 16:42:04 +01:00
|
|
|
def restart(conn, _params) do
|
2020-05-20 16:00:41 +02:00
|
|
|
with :ok <- configurable_from_database() do
|
2020-02-08 10:55:37 +01:00
|
|
|
Restarter.Pleroma.restart(Config.get(:env), 50)
|
2020-01-25 16:42:04 +01:00
|
|
|
|
|
|
|
json(conn, %{})
|
2019-12-06 15:50:53 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-04-13 13:07:23 +02:00
|
|
|
def need_reboot(conn, _params) do
|
|
|
|
json(conn, %{need_reboot: Restarter.Pleroma.need_reboot?()})
|
|
|
|
end
|
|
|
|
|
2020-05-20 16:00:41 +02:00
|
|
|
defp configurable_from_database do
|
2020-02-08 10:55:37 +01:00
|
|
|
if Config.get(:configurable_from_database) do
|
2019-12-06 15:50:53 +01:00
|
|
|
:ok
|
|
|
|
else
|
2021-01-28 21:57:24 +01:00
|
|
|
{:error, "You must enable configurable_from_database in your config file."}
|
2019-12-06 15:50:53 +01:00
|
|
|
end
|
2019-06-14 17:45:05 +02:00
|
|
|
end
|
|
|
|
|
2019-09-12 19:38:57 +02:00
|
|
|
def reload_emoji(conn, _params) do
|
|
|
|
Pleroma.Emoji.reload()
|
|
|
|
|
2020-06-20 12:53:57 +02:00
|
|
|
json(conn, "ok")
|
2019-09-12 19:38:57 +02:00
|
|
|
end
|
|
|
|
|
2019-11-19 12:14:02 +01:00
|
|
|
def confirm_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
|
2020-07-11 06:20:35 +02:00
|
|
|
users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
|
2019-11-19 12:14:02 +01:00
|
|
|
|
2020-10-14 04:52:06 +02:00
|
|
|
User.confirm(users)
|
2019-11-19 12:14:02 +01:00
|
|
|
|
2020-07-11 06:20:35 +02:00
|
|
|
ModerationLog.insert_log(%{actor: admin, subject: users, action: "confirm_email"})
|
2019-11-19 12:14:02 +01:00
|
|
|
|
2020-06-20 12:53:57 +02:00
|
|
|
json(conn, "")
|
2019-11-19 12:14:02 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def resend_confirmation_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
|
2020-07-11 06:20:35 +02:00
|
|
|
users =
|
|
|
|
Enum.map(nicknames, fn nickname ->
|
|
|
|
nickname
|
|
|
|
|> User.get_cached_by_nickname()
|
|
|
|
|> User.send_confirmation_email()
|
|
|
|
end)
|
2019-11-19 12:14:02 +01:00
|
|
|
|
2020-07-11 06:20:35 +02:00
|
|
|
ModerationLog.insert_log(%{actor: admin, subject: users, action: "resend_confirmation_email"})
|
2019-11-19 12:14:02 +01:00
|
|
|
|
2020-06-20 12:53:57 +02:00
|
|
|
json(conn, "")
|
2019-11-19 12:14:02 +01:00
|
|
|
end
|
|
|
|
|
2020-05-09 10:30:37 +02:00
|
|
|
def stats(conn, params) do
|
|
|
|
counters = Stats.get_status_visibility_count(params["instance"])
|
2020-01-09 20:18:55 +01:00
|
|
|
|
2020-05-09 10:30:37 +02:00
|
|
|
json(conn, %{"status_visibility" => counters})
|
2020-01-09 20:18:55 +01:00
|
|
|
end
|
|
|
|
|
2020-09-18 20:18:34 +02:00
|
|
|
def create_backup(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
|
|
|
|
with %User{} = user <- User.get_by_nickname(nickname),
|
2020-10-20 15:16:58 +02:00
|
|
|
{:ok, _} <- Pleroma.User.Backup.create(user, admin.id) do
|
2020-09-26 21:16:56 +02:00
|
|
|
ModerationLog.insert_log(%{actor: admin, subject: user, action: "create_backup"})
|
2019-03-02 15:21:18 +01:00
|
|
|
|
2020-09-18 20:18:34 +02:00
|
|
|
json(conn, "")
|
2019-03-02 15:21:18 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp page_params(params) do
|
2020-09-21 08:33:51 +02:00
|
|
|
{
|
|
|
|
fetch_integer_param(params, "page", 1),
|
|
|
|
fetch_integer_param(params, "page_size", @users_page_size)
|
|
|
|
}
|
2019-03-02 15:21:18 +01:00
|
|
|
end
|
2018-10-02 18:38:16 +02:00
|
|
|
end
|