2018-12-23 21:04:54 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-02 06:08:45 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:04:54 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-10-02 19:13:21 +02:00
|
|
|
defmodule Pleroma.Plugs.UserIsAdminPlug do
|
2019-07-10 11:25:58 +02:00
|
|
|
import Pleroma.Web.TranslationHelpers
|
2018-10-02 19:13:21 +02:00
|
|
|
import Plug.Conn
|
2019-12-05 22:25:44 +01:00
|
|
|
|
2019-12-07 15:49:53 +01:00
|
|
|
alias Pleroma.User
|
2019-12-05 22:25:44 +01:00
|
|
|
alias Pleroma.Web.OAuth
|
2018-10-02 19:13:21 +02:00
|
|
|
|
|
|
|
def init(options) do
|
|
|
|
options
|
|
|
|
end
|
|
|
|
|
2019-12-07 15:49:53 +01:00
|
|
|
def call(%{assigns: %{user: %User{is_admin: true}} = assigns} = conn, _) do
|
2019-12-06 18:33:47 +01:00
|
|
|
token = assigns[:token]
|
2019-12-06 14:56:23 +01:00
|
|
|
|
2019-12-06 18:33:47 +01:00
|
|
|
cond do
|
2019-12-07 15:49:53 +01:00
|
|
|
not Pleroma.Config.enforce_oauth_admin_scope_usage?() ->
|
|
|
|
conn
|
|
|
|
|
2019-12-06 18:33:47 +01:00
|
|
|
token && OAuth.Scopes.contains_admin_scopes?(token.scopes) ->
|
|
|
|
# Note: checking for _any_ admin scope presence, not necessarily fitting requested action.
|
|
|
|
# Thus, controller must explicitly invoke OAuthScopesPlug to verify scope requirements.
|
2020-01-10 08:52:21 +01:00
|
|
|
# Admin might opt out of admin scope for some apps to block any admin actions from them.
|
2019-12-06 18:33:47 +01:00
|
|
|
conn
|
2019-12-05 22:25:44 +01:00
|
|
|
|
2019-12-06 18:33:47 +01:00
|
|
|
true ->
|
2019-12-07 15:49:53 +01:00
|
|
|
fail(conn)
|
2019-12-06 18:33:47 +01:00
|
|
|
end
|
2018-10-02 19:13:21 +02:00
|
|
|
end
|
2019-12-07 15:49:53 +01:00
|
|
|
|
|
|
|
def call(conn, _) do
|
|
|
|
fail(conn)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp fail(conn) do
|
|
|
|
conn
|
|
|
|
|> render_error(:forbidden, "User is not an admin or OAuth admin scope is not granted.")
|
|
|
|
|> halt()
|
|
|
|
end
|
2018-10-02 19:13:21 +02:00
|
|
|
end
|