2018-12-23 21:04:54 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 23:44:49 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:04:54 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-03-20 21:30:44 +01:00
|
|
|
defmodule Pleroma.Web.TwitterAPI.Controller do
|
|
|
|
use Pleroma.Web, :controller
|
2018-12-11 18:17:49 +01:00
|
|
|
|
2019-08-31 10:40:04 +02:00
|
|
|
alias Pleroma.Notification
|
2019-09-15 17:22:08 +02:00
|
|
|
alias Pleroma.Plugs.OAuthScopesPlug
|
2019-08-31 12:08:43 +02:00
|
|
|
alias Pleroma.User
|
2019-03-05 03:52:23 +01:00
|
|
|
alias Pleroma.Web.OAuth.Token
|
|
|
|
alias Pleroma.Web.TwitterAPI.TokenView
|
2017-03-20 21:30:44 +01:00
|
|
|
|
2017-08-29 15:14:00 +02:00
|
|
|
require Logger
|
|
|
|
|
2019-09-15 17:22:08 +02:00
|
|
|
plug(OAuthScopesPlug, %{scopes: ["write:notifications"]} when action == :notifications_read)
|
|
|
|
|
2019-10-02 19:42:40 +02:00
|
|
|
plug(Pleroma.Plugs.EnsurePublicOrAuthenticatedPlug)
|
|
|
|
|
2018-06-03 19:11:22 +02:00
|
|
|
action_fallback(:errors)
|
|
|
|
|
2018-12-20 11:41:30 +01:00
|
|
|
def confirm_email(conn, %{"user_id" => uid, "token" => token}) do
|
2019-10-16 20:59:21 +02:00
|
|
|
with %User{} = user <- User.get_cached_by_id(uid),
|
|
|
|
true <- user.local and user.confirmation_pending and user.confirmation_token == token,
|
|
|
|
{:ok, _} <-
|
2019-10-20 12:42:42 +02:00
|
|
|
user
|
|
|
|
|> User.confirmation_changeset(need_confirmation: false)
|
|
|
|
|> User.update_and_set_cache() do
|
2019-09-24 09:14:34 +02:00
|
|
|
redirect(conn, to: "/")
|
2018-12-14 14:38:56 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-02-10 20:41:06 +01:00
|
|
|
def oauth_tokens(%{assigns: %{user: user}} = conn, _params) do
|
|
|
|
with oauth_tokens <- Token.get_user_tokens(user) do
|
|
|
|
conn
|
|
|
|
|> put_view(TokenView)
|
|
|
|
|> render("index.json", %{tokens: oauth_tokens})
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-02-10 22:49:56 +01:00
|
|
|
def revoke_token(%{assigns: %{user: user}} = conn, %{"id" => id} = _params) do
|
|
|
|
Token.delete_user_token(user, id)
|
|
|
|
|
|
|
|
json_reply(conn, 201, "")
|
|
|
|
end
|
|
|
|
|
2018-06-03 19:11:22 +02:00
|
|
|
def errors(conn, {:param_cast, _}) do
|
|
|
|
conn
|
|
|
|
|> put_status(400)
|
|
|
|
|> json("Invalid parameters")
|
|
|
|
end
|
|
|
|
|
|
|
|
def errors(conn, _) do
|
|
|
|
conn
|
|
|
|
|> put_status(500)
|
|
|
|
|> json("Something went wrong")
|
|
|
|
end
|
2019-08-27 11:29:19 +02:00
|
|
|
|
|
|
|
defp json_reply(conn, status, json) do
|
|
|
|
conn
|
|
|
|
|> put_resp_content_type("application/json")
|
|
|
|
|> send_resp(status, json)
|
|
|
|
end
|
2019-08-31 10:40:04 +02:00
|
|
|
|
|
|
|
def notifications_read(%{assigns: %{user: user}} = conn, %{"latest_id" => latest_id} = params) do
|
|
|
|
Notification.set_read_up_to(user, latest_id)
|
|
|
|
|
|
|
|
notifications = Notification.for_user(user, params)
|
|
|
|
|
|
|
|
conn
|
|
|
|
# XXX: This is a hack because pleroma-fe still uses that API.
|
|
|
|
|> put_view(Pleroma.Web.MastodonAPI.NotificationView)
|
|
|
|
|> render("index.json", %{notifications: notifications, for: user})
|
|
|
|
end
|
|
|
|
|
|
|
|
def notifications_read(%{assigns: %{user: _user}} = conn, _) do
|
|
|
|
bad_request_reply(conn, "You need to specify latest_id")
|
|
|
|
end
|
|
|
|
|
|
|
|
defp bad_request_reply(conn, error_message) do
|
|
|
|
json = error_json(conn, error_message)
|
|
|
|
json_reply(conn, 400, json)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp error_json(conn, error_message) do
|
|
|
|
%{"error" => error_message, "request" => conn.request_path} |> Jason.encode!()
|
|
|
|
end
|
2017-03-20 21:30:44 +01:00
|
|
|
end
|