6da6540036
Done via the following command:
git diff fcd5dd259a
--stat --name-only | xargs sed -i '/Pleroma Authors/c# Copyright © 2017-2020 Pleroma Authors <https:\/\/pleroma.social\/>'
44 lines
1.1 KiB
Elixir
44 lines
1.1 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Plugs.UserIsAdminPlug do
|
|
import Pleroma.Web.TranslationHelpers
|
|
import Plug.Conn
|
|
|
|
alias Pleroma.User
|
|
alias Pleroma.Web.OAuth
|
|
|
|
def init(options) do
|
|
options
|
|
end
|
|
|
|
def call(%{assigns: %{user: %User{is_admin: true}} = assigns} = conn, _) do
|
|
token = assigns[:token]
|
|
|
|
cond do
|
|
not Pleroma.Config.enforce_oauth_admin_scope_usage?() ->
|
|
conn
|
|
|
|
token && OAuth.Scopes.contains_admin_scopes?(token.scopes) ->
|
|
# Note: checking for _any_ admin scope presence, not necessarily fitting requested action.
|
|
# Thus, controller must explicitly invoke OAuthScopesPlug to verify scope requirements.
|
|
# Admin might opt out of admin scope for some apps to block any admin actions from them.
|
|
conn
|
|
|
|
true ->
|
|
fail(conn)
|
|
end
|
|
end
|
|
|
|
def call(conn, _) do
|
|
fail(conn)
|
|
end
|
|
|
|
defp fail(conn) do
|
|
conn
|
|
|> render_error(:forbidden, "User is not an admin or OAuth admin scope is not granted.")
|
|
|> halt()
|
|
end
|
|
end
|