akkoma/lib/pleroma/web/admin_api/controllers/admin_api_controller.ex

691 lines
18 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.AdminAPI.AdminAPIController do
2018-10-02 16:38:16 +00:00
use Pleroma.Web, :controller
2019-09-29 08:17:38 +00:00
import Pleroma.Web.ControllerHelper,
only: [json_response: 3, fetch_integer_param: 3]
2019-09-29 08:17:38 +00:00
2020-02-08 09:55:37 +00:00
alias Pleroma.Config
alias Pleroma.MFA
2019-08-25 19:39:37 +00:00
alias Pleroma.ModerationLog
alias Pleroma.Stats
alias Pleroma.User
2019-05-16 19:09:18 +00:00
alias Pleroma.Web.ActivityPub.ActivityPub
alias Pleroma.Web.ActivityPub.Builder
alias Pleroma.Web.ActivityPub.Pipeline
alias Pleroma.Web.AdminAPI
alias Pleroma.Web.AdminAPI.AccountView
2019-08-25 19:39:37 +00:00
alias Pleroma.Web.AdminAPI.ModerationLogView
alias Pleroma.Web.AdminAPI.Search
alias Pleroma.Web.Endpoint
2020-06-24 10:07:47 +00:00
alias Pleroma.Web.Plugs.OAuthScopesPlug
alias Pleroma.Web.Router
2019-04-06 13:25:19 +00:00
2019-09-29 08:17:38 +00:00
@users_page_size 50
plug(
OAuthScopesPlug,
%{scopes: ["read:accounts"], admin: true}
when action in [:list_users, :user_show, :right_get, :show_user_credentials]
)
plug(
OAuthScopesPlug,
%{scopes: ["write:accounts"], admin: true}
when action in [
:get_password_reset,
:force_password_reset,
:user_delete,
:users_create,
:user_toggle_activation,
:user_activate,
:user_deactivate,
:user_approve,
:tag_users,
:untag_users,
:right_add,
:right_add_multiple,
:right_delete,
:disable_mfa,
:right_delete_multiple,
:update_user_credentials
]
)
plug(
OAuthScopesPlug,
%{scopes: ["write:follows"], admin: true}
when action in [:user_follow, :user_unfollow]
)
plug(
OAuthScopesPlug,
%{scopes: ["read:statuses"], admin: true}
when action in [:list_user_statuses, :list_instance_statuses]
)
2020-09-01 01:23:33 +00:00
plug(
OAuthScopesPlug,
%{scopes: ["read:chats"], admin: true}
when action in [:list_user_chats]
)
plug(
OAuthScopesPlug,
%{scopes: ["read"], admin: true}
when action in [
:list_log,
:stats,
:need_reboot
]
)
plug(
OAuthScopesPlug,
%{scopes: ["write"], admin: true}
when action in [
:restart,
:resend_confirmation_email,
:confirm_email,
:reload_emoji
]
)
action_fallback(AdminAPI.FallbackController)
2018-10-02 16:38:16 +00:00
2020-05-01 12:22:39 +00:00
def user_delete(conn, %{"nickname" => nickname}) do
user_delete(conn, %{"nicknames" => [nickname]})
2018-10-02 16:38:16 +00:00
end
def user_delete(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
Enum.each(users, fn user ->
{:ok, delete_data, _} = Builder.delete(admin, user.ap_id)
Pipeline.common_pipeline(delete_data, local: true)
end)
ModerationLog.insert_log(%{
actor: admin,
subject: users,
action: "delete"
})
json(conn, nicknames)
end
2019-08-25 19:39:37 +00:00
def user_follow(%{assigns: %{user: admin}} = conn, %{
"follower" => follower_nick,
"followed" => followed_nick
}) do
2019-04-22 07:20:43 +00:00
with %User{} = follower <- User.get_cached_by_nickname(follower_nick),
%User{} = followed <- User.get_cached_by_nickname(followed_nick) do
User.follow(follower, followed)
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
actor: admin,
followed: followed,
follower: follower,
action: "follow"
})
end
json(conn, "ok")
end
2019-08-25 19:39:37 +00:00
def user_unfollow(%{assigns: %{user: admin}} = conn, %{
"follower" => follower_nick,
"followed" => followed_nick
}) do
2019-04-22 07:20:43 +00:00
with %User{} = follower <- User.get_cached_by_nickname(follower_nick),
%User{} = followed <- User.get_cached_by_nickname(followed_nick) do
User.unfollow(follower, followed)
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
actor: admin,
followed: followed,
follower: follower,
action: "unfollow"
})
end
json(conn, "ok")
end
2019-08-25 19:39:37 +00:00
def users_create(%{assigns: %{user: admin}} = conn, %{"users" => users}) do
changesets =
Enum.map(users, fn %{"nickname" => nickname, "email" => email, "password" => password} ->
user_data = %{
nickname: nickname,
name: nickname,
email: email,
password: password,
password_confirmation: password,
bio: "."
}
User.register_changeset(%User{}, user_data, need_confirmation: false)
end)
|> Enum.reduce(Ecto.Multi.new(), fn changeset, multi ->
Ecto.Multi.insert(multi, Ecto.UUID.generate(), changeset)
end)
case Pleroma.Repo.transaction(changesets) do
{:ok, users} ->
res =
users
|> Map.values()
|> Enum.map(fn user ->
{:ok, user} = User.post_register_action(user)
2019-08-25 19:39:37 +00:00
user
end)
|> Enum.map(&AccountView.render("created.json", %{user: &1}))
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
actor: admin,
subjects: Map.values(users),
action: "create"
})
json(conn, res)
{:error, id, changeset, _} ->
res =
Enum.map(changesets.operations, fn
{current_id, {:changeset, _current_changeset, _}} when current_id == id ->
AccountView.render("create-error.json", %{changeset: changeset})
{_, {:changeset, current_changeset, _}} ->
AccountView.render("create-error.json", %{changeset: current_changeset})
end)
conn
|> put_status(:conflict)
|> json(res)
end
end
def user_show(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
conn
2019-09-23 22:33:59 +00:00
|> put_view(AccountView)
|> render("show.json", %{user: user})
else
_ -> {:error, :not_found}
end
end
def list_instance_statuses(conn, %{"instance" => instance} = params) do
with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
{page, page_size} = page_params(params)
activities =
ActivityPub.fetch_statuses(nil, %{
instance: instance,
limit: page_size,
offset: (page - 1) * page_size,
exclude_reblogs: not with_reblogs
})
conn
|> put_view(AdminAPI.StatusView)
|> render("index.json", %{activities: activities, as: :activity})
end
def list_user_statuses(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = params) do
with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
godmode = params["godmode"] == "true" || params["godmode"] == true
with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
{_, page_size} = page_params(params)
activities =
ActivityPub.fetch_user_activities(user, nil, %{
limit: page_size,
godmode: godmode,
exclude_reblogs: not with_reblogs
})
conn
|> put_view(AdminAPI.StatusView)
|> render("index.json", %{activities: activities, as: :activity})
else
_ -> {:error, :not_found}
end
end
2020-09-01 01:23:33 +00:00
def list_user_chats(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = _params) do
with %User{id: user_id} <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
chats =
2020-09-02 00:05:24 +00:00
Pleroma.Chat.for_user_query(user_id)
2020-09-01 01:23:33 +00:00
|> Pleroma.Repo.all()
conn
|> put_view(AdminAPI.ChatView)
2020-09-01 01:23:33 +00:00
|> render("index.json", chats: chats)
else
_ -> {:error, :not_found}
end
end
2019-08-25 19:39:37 +00:00
def user_toggle_activation(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
2019-04-22 07:20:43 +00:00
user = User.get_cached_by_nickname(nickname)
2019-02-26 21:13:38 +00:00
{:ok, updated_user} = User.deactivate(user, !user.deactivated)
2019-02-26 21:13:38 +00:00
action = if user.deactivated, do: "activate", else: "deactivate"
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
actor: admin,
subject: [user],
2019-08-25 19:39:37 +00:00
action: action
})
2019-02-26 21:13:38 +00:00
conn
2019-09-23 22:33:59 +00:00
|> put_view(AccountView)
|> render("show.json", %{user: updated_user})
2019-02-26 21:13:38 +00:00
end
def user_activate(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
{:ok, updated_users} = User.deactivate(users, false)
2019-02-26 21:13:38 +00:00
ModerationLog.insert_log(%{
actor: admin,
subject: users,
action: "activate"
})
2019-02-26 21:13:38 +00:00
conn
|> put_view(AccountView)
|> render("index.json", %{users: Keyword.values(updated_users)})
end
def user_deactivate(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
{:ok, updated_users} = User.deactivate(users, true)
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
actor: admin,
subject: users,
action: "deactivate"
2019-08-25 19:39:37 +00:00
})
2019-02-26 21:13:38 +00:00
conn
2019-09-23 22:33:59 +00:00
|> put_view(AccountView)
|> render("index.json", %{users: Keyword.values(updated_users)})
2019-02-26 21:13:38 +00:00
end
def user_approve(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
{:ok, updated_users} = User.approve(users)
ModerationLog.insert_log(%{
actor: admin,
subject: users,
action: "approve"
})
conn
|> put_view(AccountView)
|> render("index.json", %{users: updated_users})
end
2019-08-25 19:39:37 +00:00
def tag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
with {:ok, _} <- User.tag(nicknames, tags) do
ModerationLog.insert_log(%{
actor: admin,
nicknames: nicknames,
tags: tags,
action: "tag"
})
json_response(conn, :no_content, "")
end
end
2019-08-25 19:39:37 +00:00
def untag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
with {:ok, _} <- User.untag(nicknames, tags) do
ModerationLog.insert_log(%{
actor: admin,
nicknames: nicknames,
tags: tags,
action: "untag"
})
json_response(conn, :no_content, "")
end
end
def list_users(conn, params) do
2019-03-02 14:21:18 +00:00
{page, page_size} = page_params(params)
filters = maybe_parse_filters(params["filters"])
search_params =
%{
query: params["query"],
page: page,
page_size: page_size,
tags: params["tags"],
name: params["name"],
email: params["email"]
}
|> Map.merge(filters)
2019-02-28 16:04:47 +00:00
with {:ok, users, count} <- Search.user(search_params) do
json(
conn,
AccountView.render("index.json",
users: users,
count: count,
page_size: page_size
)
)
end
end
@filters ~w(local external active deactivated need_approval need_confirmed is_admin is_moderator)
@spec maybe_parse_filters(String.t()) :: %{required(String.t()) => true} | %{}
defp maybe_parse_filters(filters) when is_nil(filters) or filters == "", do: %{}
defp maybe_parse_filters(filters) do
filters
|> String.split(",")
|> Enum.filter(&Enum.member?(@filters, &1))
|> Map.new(&{String.to_existing_atom(&1), true})
end
def right_add_multiple(%{assigns: %{user: admin}} = conn, %{
2019-08-25 19:39:37 +00:00
"permission_group" => permission_group,
"nicknames" => nicknames
2019-08-25 19:39:37 +00:00
})
when permission_group in ["moderator", "admin"] do
update = %{:"is_#{permission_group}" => true}
users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
for u <- users, do: User.admin_api_update(u, update)
2018-12-01 08:03:16 +00:00
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
action: "grant",
actor: admin,
subject: users,
2019-08-25 19:39:37 +00:00
permission: permission_group
})
json(conn, update)
2018-12-09 09:12:48 +00:00
end
def right_add_multiple(conn, _) do
render_error(conn, :not_found, "No such permission_group")
end
2019-08-25 19:39:37 +00:00
def right_add(%{assigns: %{user: admin}} = conn, %{
"permission_group" => permission_group,
"nickname" => nickname
})
when permission_group in ["moderator", "admin"] do
fields = %{:"is_#{permission_group}" => true}
{:ok, user} =
nickname
|> User.get_cached_by_nickname()
|> User.admin_api_update(fields)
2018-12-01 08:03:16 +00:00
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
action: "grant",
actor: admin,
subject: [user],
2019-08-25 19:39:37 +00:00
permission: permission_group
})
json(conn, fields)
2018-12-09 09:12:48 +00:00
end
def right_add(conn, _) do
render_error(conn, :not_found, "No such permission_group")
end
def right_get(conn, %{"nickname" => nickname}) do
2019-04-22 07:20:43 +00:00
user = User.get_cached_by_nickname(nickname)
conn
2018-12-01 08:03:16 +00:00
|> json(%{
is_moderator: user.is_moderator,
is_admin: user.is_admin
2018-12-01 08:03:16 +00:00
})
end
def right_delete_multiple(
%{assigns: %{user: %{nickname: admin_nickname} = admin}} = conn,
%{
"permission_group" => permission_group,
"nicknames" => nicknames
}
)
when permission_group in ["moderator", "admin"] do
with false <- Enum.member?(nicknames, admin_nickname) do
update = %{:"is_#{permission_group}" => false}
users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
2018-12-01 08:03:16 +00:00
for u <- users, do: User.admin_api_update(u, update)
2019-08-25 19:39:37 +00:00
ModerationLog.insert_log(%{
action: "revoke",
2019-08-25 19:39:37 +00:00
actor: admin,
subject: users,
permission: permission_group
2019-08-25 19:39:37 +00:00
})
json(conn, update)
else
_ -> render_error(conn, :forbidden, "You can't revoke your own admin/moderator status.")
2019-08-25 19:39:37 +00:00
end
end
def right_delete_multiple(conn, _) do
render_error(conn, :not_found, "No such permission_group")
end
def right_delete(
%{assigns: %{user: admin}} = conn,
%{
"permission_group" => permission_group,
"nickname" => nickname
}
)
when permission_group in ["moderator", "admin"] do
fields = %{:"is_#{permission_group}" => false}
{:ok, user} =
nickname
|> User.get_cached_by_nickname()
|> User.admin_api_update(fields)
2018-12-01 08:03:16 +00:00
ModerationLog.insert_log(%{
action: "revoke",
actor: admin,
subject: [user],
permission: permission_group
})
2019-08-25 19:39:37 +00:00
json(conn, fields)
end
def right_delete(%{assigns: %{user: %{nickname: nickname}}} = conn, %{"nickname" => nickname}) do
render_error(conn, :forbidden, "You can't revoke your own admin status.")
2018-10-02 16:38:16 +00:00
end
2018-12-09 09:12:48 +00:00
@doc "Get a password reset token (base64 string) for given nickname"
def get_password_reset(conn, %{"nickname" => nickname}) do
2019-04-22 07:20:43 +00:00
(%User{local: true} = user) = User.get_cached_by_nickname(nickname)
{:ok, token} = Pleroma.PasswordResetToken.create_token(user)
conn
|> json(%{
token: token.token,
link: Router.Helpers.reset_password_url(Endpoint, :reset, token.token)
})
end
@doc "Force password reset for a given user"
def force_password_reset(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
2020-01-20 10:53:14 +00:00
Enum.each(users, &User.force_password_reset_async/1)
ModerationLog.insert_log(%{
actor: admin,
subject: users,
action: "force_password_reset"
})
json_response(conn, :no_content, "")
end
@doc "Disable mfa for user's account."
def disable_mfa(conn, %{"nickname" => nickname}) do
case User.get_by_nickname(nickname) do
%User{} = user ->
MFA.disable(user)
json(conn, nickname)
_ ->
{:error, :not_found}
end
end
@doc "Show a given user's credentials"
def show_user_credentials(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
conn
|> put_view(AccountView)
|> render("credentials.json", %{user: user, for: admin})
else
_ -> {:error, :not_found}
end
end
@doc "Updates a given user"
def update_user_credentials(
%{assigns: %{user: admin}} = conn,
%{"nickname" => nickname} = params
) do
2020-05-27 06:42:28 +00:00
with {_, %User{} = user} <- {:user, User.get_cached_by_nickname(nickname)},
{:ok, _user} <-
User.update_as_admin(user, params) do
ModerationLog.insert_log(%{
actor: admin,
subject: [user],
action: "updated_users"
})
if params["password"] do
User.force_password_reset_async(user)
end
ModerationLog.insert_log(%{
actor: admin,
subject: [user],
action: "force_password_reset"
})
json(conn, %{status: "success"})
else
{:error, changeset} ->
errors = Map.new(changeset.errors, fn {key, {error, _}} -> {key, error} end)
2019-05-16 19:09:18 +00:00
{:errors, errors}
2019-08-25 19:39:37 +00:00
_ ->
{:error, :not_found}
2019-05-16 19:09:18 +00:00
end
end
2019-08-25 19:39:37 +00:00
def list_log(conn, params) do
{page, page_size} = page_params(params)
2019-08-27 17:48:16 +00:00
log =
ModerationLog.get_all(%{
page: page,
page_size: page_size,
start_date: params["start_date"],
2019-08-30 21:57:15 +00:00
end_date: params["end_date"],
user_id: params["user_id"],
search: params["search"]
2019-08-27 17:48:16 +00:00
})
2019-08-25 19:39:37 +00:00
conn
|> put_view(ModerationLogView)
|> render("index.json", %{log: log})
end
def restart(conn, _params) do
with :ok <- configurable_from_database() do
2020-02-08 09:55:37 +00:00
Restarter.Pleroma.restart(Config.get(:env), 50)
json(conn, %{})
2019-12-06 14:50:53 +00:00
end
end
def need_reboot(conn, _params) do
json(conn, %{need_reboot: Restarter.Pleroma.need_reboot?()})
end
defp configurable_from_database do
2020-02-08 09:55:37 +00:00
if Config.get(:configurable_from_database) do
2019-12-06 14:50:53 +00:00
:ok
else
{:error, "To use this endpoint you need to enable configuration from database."}
2019-12-06 14:50:53 +00:00
end
end
2019-09-12 17:38:57 +00:00
def reload_emoji(conn, _params) do
Pleroma.Emoji.reload()
json(conn, "ok")
2019-09-12 17:38:57 +00:00
end
def confirm_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
User.toggle_confirmation(users)
ModerationLog.insert_log(%{actor: admin, subject: users, action: "confirm_email"})
json(conn, "")
end
def resend_confirmation_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
users =
Enum.map(nicknames, fn nickname ->
nickname
|> User.get_cached_by_nickname()
|> User.send_confirmation_email()
end)
ModerationLog.insert_log(%{actor: admin, subject: users, action: "resend_confirmation_email"})
json(conn, "")
end
2020-05-09 08:30:37 +00:00
def stats(conn, params) do
counters = Stats.get_status_visibility_count(params["instance"])
2020-05-09 08:30:37 +00:00
json(conn, %{"status_visibility" => counters})
end
2019-03-02 14:21:18 +00:00
defp page_params(params) do
{
fetch_integer_param(params, "page", 1),
fetch_integer_param(params, "page_size", @users_page_size)
}
2019-03-02 14:21:18 +00:00
end
2018-10-02 16:38:16 +00:00
end