1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.AdminAPI.AdminAPIController do
6 use Pleroma.Web, :controller
8 import Pleroma.Web.ControllerHelper,
9 only: [json_response: 3, fetch_integer_param: 3]
13 alias Pleroma.ModerationLog
16 alias Pleroma.Web.ActivityPub.ActivityPub
17 alias Pleroma.Web.AdminAPI
18 alias Pleroma.Web.AdminAPI.AccountView
19 alias Pleroma.Web.AdminAPI.ModerationLogView
20 alias Pleroma.Web.Endpoint
21 alias Pleroma.Web.Plugs.OAuthScopesPlug
22 alias Pleroma.Web.Router
28 %{scopes: ["admin:read:accounts"]}
29 when action in [:right_get, :show_user_credentials, :create_backup]
34 %{scopes: ["admin:write:accounts"]}
37 :force_password_reset,
44 :right_delete_multiple,
45 :update_user_credentials
51 %{scopes: ["admin:read:statuses"]}
52 when action in [:list_user_statuses]
57 %{scopes: ["admin:read"]}
67 %{scopes: ["admin:write"]}
70 :resend_confirmation_email,
76 action_fallback(AdminAPI.FallbackController)
78 def list_user_statuses(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = params) do
79 with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
80 godmode = params["godmode"] == "true" || params["godmode"] == true
82 with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
83 {page, page_size} = page_params(params)
86 ActivityPub.fetch_user_activities(user, nil, %{
88 offset: (page - 1) * page_size,
90 exclude_reblogs: not with_reblogs,
91 pagination_type: :offset,
96 |> put_view(AdminAPI.StatusView)
97 |> render("index.json", %{total: result[:total], activities: result[:items], as: :activity})
99 _ -> {:error, :not_found}
103 def tag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
104 with {:ok, _} <- User.tag(nicknames, tags) do
105 ModerationLog.insert_log(%{
107 nicknames: nicknames,
112 json_response(conn, :no_content, "")
116 def untag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
117 with {:ok, _} <- User.untag(nicknames, tags) do
118 ModerationLog.insert_log(%{
120 nicknames: nicknames,
125 json_response(conn, :no_content, "")
129 def right_add_multiple(%{assigns: %{user: admin}} = conn, %{
130 "permission_group" => permission_group,
131 "nicknames" => nicknames
133 when permission_group in ["moderator", "admin"] do
134 update = %{:"is_#{permission_group}" => true}
136 users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
138 for u <- users, do: User.admin_api_update(u, update)
140 ModerationLog.insert_log(%{
144 permission: permission_group
150 def right_add_multiple(conn, _) do
151 render_error(conn, :not_found, "No such permission_group")
154 def right_add(%{assigns: %{user: admin}} = conn, %{
155 "permission_group" => permission_group,
156 "nickname" => nickname
158 when permission_group in ["moderator", "admin"] do
159 fields = %{:"is_#{permission_group}" => true}
163 |> User.get_cached_by_nickname()
164 |> User.admin_api_update(fields)
166 ModerationLog.insert_log(%{
170 permission: permission_group
176 def right_add(conn, _) do
177 render_error(conn, :not_found, "No such permission_group")
180 def right_get(conn, %{"nickname" => nickname}) do
181 user = User.get_cached_by_nickname(nickname)
185 is_moderator: user.is_moderator,
186 is_admin: user.is_admin
190 def right_delete_multiple(
191 %{assigns: %{user: %{nickname: admin_nickname} = admin}} = conn,
193 "permission_group" => permission_group,
194 "nicknames" => nicknames
197 when permission_group in ["moderator", "admin"] do
198 with false <- Enum.member?(nicknames, admin_nickname) do
199 update = %{:"is_#{permission_group}" => false}
201 users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
203 for u <- users, do: User.admin_api_update(u, update)
205 ModerationLog.insert_log(%{
209 permission: permission_group
214 _ -> render_error(conn, :forbidden, "You can't revoke your own admin/moderator status.")
218 def right_delete_multiple(conn, _) do
219 render_error(conn, :not_found, "No such permission_group")
223 %{assigns: %{user: admin}} = conn,
225 "permission_group" => permission_group,
226 "nickname" => nickname
229 when permission_group in ["moderator", "admin"] do
230 fields = %{:"is_#{permission_group}" => false}
234 |> User.get_cached_by_nickname()
235 |> User.admin_api_update(fields)
237 ModerationLog.insert_log(%{
241 permission: permission_group
247 def right_delete(%{assigns: %{user: %{nickname: nickname}}} = conn, %{"nickname" => nickname}) do
248 render_error(conn, :forbidden, "You can't revoke your own admin status.")
251 @doc "Get a password reset token (base64 string) for given nickname"
252 def get_password_reset(conn, %{"nickname" => nickname}) do
253 (%User{local: true} = user) = User.get_cached_by_nickname(nickname)
254 {:ok, token} = Pleroma.PasswordResetToken.create_token(user)
259 link: Router.Helpers.reset_password_url(Endpoint, :reset, token.token)
263 @doc "Force password reset for a given user"
264 def force_password_reset(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
265 users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
267 Enum.each(users, &User.force_password_reset_async/1)
269 ModerationLog.insert_log(%{
272 action: "force_password_reset"
275 json_response(conn, :no_content, "")
278 @doc "Disable mfa for user's account."
279 def disable_mfa(conn, %{"nickname" => nickname}) do
280 case User.get_by_nickname(nickname) do
290 @doc "Show a given user's credentials"
291 def show_user_credentials(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
292 with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
294 |> put_view(AccountView)
295 |> render("credentials.json", %{user: user, for: admin})
297 _ -> {:error, :not_found}
301 @doc "Updates a given user"
302 def update_user_credentials(
303 %{assigns: %{user: admin}} = conn,
304 %{"nickname" => nickname} = params
306 with {_, %User{} = user} <- {:user, User.get_cached_by_nickname(nickname)},
308 User.update_as_admin(user, params) do
309 ModerationLog.insert_log(%{
312 action: "updated_users"
315 if params["password"] do
316 User.force_password_reset_async(user)
319 ModerationLog.insert_log(%{
322 action: "force_password_reset"
325 json(conn, %{status: "success"})
327 {:error, changeset} ->
328 errors = Map.new(changeset.errors, fn {key, {error, _}} -> {key, error} end)
337 def list_log(conn, params) do
338 {page, page_size} = page_params(params)
341 ModerationLog.get_all(%{
343 page_size: page_size,
344 start_date: params["start_date"],
345 end_date: params["end_date"],
346 user_id: params["user_id"],
347 search: params["search"]
351 |> put_view(ModerationLogView)
352 |> render("index.json", %{log: log})
355 def restart(conn, _params) do
356 with :ok <- configurable_from_database() do
357 Restarter.Pleroma.restart(Config.get(:env), 50)
363 def need_reboot(conn, _params) do
364 json(conn, %{need_reboot: Restarter.Pleroma.need_reboot?()})
367 defp configurable_from_database do
368 if Config.get(:configurable_from_database) do
371 {:error, "You must enable configurable_from_database in your config file."}
375 def reload_emoji(conn, _params) do
376 Pleroma.Emoji.reload()
381 def confirm_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
382 users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
386 ModerationLog.insert_log(%{actor: admin, subject: users, action: "confirm_email"})
391 def resend_confirmation_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
393 Enum.map(nicknames, fn nickname ->
395 |> User.get_cached_by_nickname()
396 |> User.send_confirmation_email()
399 ModerationLog.insert_log(%{actor: admin, subject: users, action: "resend_confirmation_email"})
404 def stats(conn, params) do
405 counters = Stats.get_status_visibility_count(params["instance"])
407 json(conn, %{"status_visibility" => counters})
410 def create_backup(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
411 with %User{} = user <- User.get_by_nickname(nickname),
412 {:ok, _} <- Pleroma.User.Backup.create(user, admin.id) do
413 ModerationLog.insert_log(%{actor: admin, subject: user, action: "create_backup"})
419 defp page_params(params) do
421 fetch_integer_param(params, "page", 1),
422 fetch_integer_param(params, "page_size", @users_page_size)