1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.AdminAPI.AdminAPIController do
6 use Pleroma.Web, :controller
8 import Pleroma.Web.ControllerHelper,
9 only: [json_response: 3, fetch_integer_param: 3]
13 alias Pleroma.ModerationLog
16 alias Pleroma.Web.ActivityPub.ActivityPub
17 alias Pleroma.Web.AdminAPI
18 alias Pleroma.Web.AdminAPI.AccountView
19 alias Pleroma.Web.AdminAPI.ModerationLogView
20 alias Pleroma.Web.Endpoint
21 alias Pleroma.Web.Plugs.OAuthScopesPlug
22 alias Pleroma.Web.Router
28 %{scopes: ["read:accounts"], admin: true}
29 when action in [:right_get, :show_user_credentials, :create_backup]
34 %{scopes: ["write:accounts"], admin: true}
37 :force_password_reset,
44 :right_delete_multiple,
45 :update_user_credentials
51 %{scopes: ["read:statuses"], admin: true}
52 when action in [:list_user_statuses, :list_instance_statuses]
57 %{scopes: ["read:chats"], admin: true}
58 when action in [:list_user_chats]
63 %{scopes: ["read"], admin: true}
73 %{scopes: ["write"], admin: true}
76 :resend_confirmation_email,
82 action_fallback(AdminAPI.FallbackController)
84 def list_instance_statuses(conn, %{"instance" => instance} = params) do
85 with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
86 {page, page_size} = page_params(params)
89 ActivityPub.fetch_statuses(nil, %{
92 offset: (page - 1) * page_size,
93 exclude_reblogs: not with_reblogs
97 |> put_view(AdminAPI.StatusView)
98 |> render("index.json", %{activities: activities, as: :activity})
101 def list_user_statuses(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = params) do
102 with_reblogs = params["with_reblogs"] == "true" || params["with_reblogs"] == true
103 godmode = params["godmode"] == "true" || params["godmode"] == true
105 with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
106 {_, page_size} = page_params(params)
109 ActivityPub.fetch_user_activities(user, nil, %{
112 exclude_reblogs: not with_reblogs
116 |> put_view(AdminAPI.StatusView)
117 |> render("index.json", %{activities: activities, as: :activity})
119 _ -> {:error, :not_found}
123 def list_user_chats(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname} = _params) do
124 with %User{id: user_id} <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
126 Pleroma.Chat.for_user_query(user_id)
127 |> Pleroma.Repo.all()
130 |> put_view(AdminAPI.ChatView)
131 |> render("index.json", chats: chats)
133 _ -> {:error, :not_found}
137 def tag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
138 with {:ok, _} <- User.tag(nicknames, tags) do
139 ModerationLog.insert_log(%{
141 nicknames: nicknames,
146 json_response(conn, :no_content, "")
150 def untag_users(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames, "tags" => tags}) do
151 with {:ok, _} <- User.untag(nicknames, tags) do
152 ModerationLog.insert_log(%{
154 nicknames: nicknames,
159 json_response(conn, :no_content, "")
163 def right_add_multiple(%{assigns: %{user: admin}} = conn, %{
164 "permission_group" => permission_group,
165 "nicknames" => nicknames
167 when permission_group in ["moderator", "admin"] do
168 update = %{:"is_#{permission_group}" => true}
170 users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
172 for u <- users, do: User.admin_api_update(u, update)
174 ModerationLog.insert_log(%{
178 permission: permission_group
184 def right_add_multiple(conn, _) do
185 render_error(conn, :not_found, "No such permission_group")
188 def right_add(%{assigns: %{user: admin}} = conn, %{
189 "permission_group" => permission_group,
190 "nickname" => nickname
192 when permission_group in ["moderator", "admin"] do
193 fields = %{:"is_#{permission_group}" => true}
197 |> User.get_cached_by_nickname()
198 |> User.admin_api_update(fields)
200 ModerationLog.insert_log(%{
204 permission: permission_group
210 def right_add(conn, _) do
211 render_error(conn, :not_found, "No such permission_group")
214 def right_get(conn, %{"nickname" => nickname}) do
215 user = User.get_cached_by_nickname(nickname)
219 is_moderator: user.is_moderator,
220 is_admin: user.is_admin
224 def right_delete_multiple(
225 %{assigns: %{user: %{nickname: admin_nickname} = admin}} = conn,
227 "permission_group" => permission_group,
228 "nicknames" => nicknames
231 when permission_group in ["moderator", "admin"] do
232 with false <- Enum.member?(nicknames, admin_nickname) do
233 update = %{:"is_#{permission_group}" => false}
235 users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
237 for u <- users, do: User.admin_api_update(u, update)
239 ModerationLog.insert_log(%{
243 permission: permission_group
248 _ -> render_error(conn, :forbidden, "You can't revoke your own admin/moderator status.")
252 def right_delete_multiple(conn, _) do
253 render_error(conn, :not_found, "No such permission_group")
257 %{assigns: %{user: admin}} = conn,
259 "permission_group" => permission_group,
260 "nickname" => nickname
263 when permission_group in ["moderator", "admin"] do
264 fields = %{:"is_#{permission_group}" => false}
268 |> User.get_cached_by_nickname()
269 |> User.admin_api_update(fields)
271 ModerationLog.insert_log(%{
275 permission: permission_group
281 def right_delete(%{assigns: %{user: %{nickname: nickname}}} = conn, %{"nickname" => nickname}) do
282 render_error(conn, :forbidden, "You can't revoke your own admin status.")
285 @doc "Get a password reset token (base64 string) for given nickname"
286 def get_password_reset(conn, %{"nickname" => nickname}) do
287 (%User{local: true} = user) = User.get_cached_by_nickname(nickname)
288 {:ok, token} = Pleroma.PasswordResetToken.create_token(user)
293 link: Router.Helpers.reset_password_url(Endpoint, :reset, token.token)
297 @doc "Force password reset for a given user"
298 def force_password_reset(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
299 users = nicknames |> Enum.map(&User.get_cached_by_nickname/1)
301 Enum.each(users, &User.force_password_reset_async/1)
303 ModerationLog.insert_log(%{
306 action: "force_password_reset"
309 json_response(conn, :no_content, "")
312 @doc "Disable mfa for user's account."
313 def disable_mfa(conn, %{"nickname" => nickname}) do
314 case User.get_by_nickname(nickname) do
324 @doc "Show a given user's credentials"
325 def show_user_credentials(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
326 with %User{} = user <- User.get_cached_by_nickname_or_id(nickname, for: admin) do
328 |> put_view(AccountView)
329 |> render("credentials.json", %{user: user, for: admin})
331 _ -> {:error, :not_found}
335 @doc "Updates a given user"
336 def update_user_credentials(
337 %{assigns: %{user: admin}} = conn,
338 %{"nickname" => nickname} = params
340 with {_, %User{} = user} <- {:user, User.get_cached_by_nickname(nickname)},
342 User.update_as_admin(user, params) do
343 ModerationLog.insert_log(%{
346 action: "updated_users"
349 if params["password"] do
350 User.force_password_reset_async(user)
353 ModerationLog.insert_log(%{
356 action: "force_password_reset"
359 json(conn, %{status: "success"})
361 {:error, changeset} ->
362 errors = Map.new(changeset.errors, fn {key, {error, _}} -> {key, error} end)
371 def list_log(conn, params) do
372 {page, page_size} = page_params(params)
375 ModerationLog.get_all(%{
377 page_size: page_size,
378 start_date: params["start_date"],
379 end_date: params["end_date"],
380 user_id: params["user_id"],
381 search: params["search"]
385 |> put_view(ModerationLogView)
386 |> render("index.json", %{log: log})
389 def restart(conn, _params) do
390 with :ok <- configurable_from_database() do
391 Restarter.Pleroma.restart(Config.get(:env), 50)
397 def need_reboot(conn, _params) do
398 json(conn, %{need_reboot: Restarter.Pleroma.need_reboot?()})
401 defp configurable_from_database do
402 if Config.get(:configurable_from_database) do
405 {:error, "To use this endpoint you need to enable configuration from database."}
409 def reload_emoji(conn, _params) do
410 Pleroma.Emoji.reload()
415 def confirm_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
416 users = Enum.map(nicknames, &User.get_cached_by_nickname/1)
420 ModerationLog.insert_log(%{actor: admin, subject: users, action: "confirm_email"})
425 def resend_confirmation_email(%{assigns: %{user: admin}} = conn, %{"nicknames" => nicknames}) do
427 Enum.map(nicknames, fn nickname ->
429 |> User.get_cached_by_nickname()
430 |> User.send_confirmation_email()
433 ModerationLog.insert_log(%{actor: admin, subject: users, action: "resend_confirmation_email"})
438 def stats(conn, params) do
439 counters = Stats.get_status_visibility_count(params["instance"])
441 json(conn, %{"status_visibility" => counters})
444 def create_backup(%{assigns: %{user: admin}} = conn, %{"nickname" => nickname}) do
445 with %User{} = user <- User.get_by_nickname(nickname),
446 {:ok, _} <- Pleroma.User.Backup.create(user, admin.id) do
447 ModerationLog.insert_log(%{actor: admin, subject: user, action: "create_backup"})
453 defp page_params(params) do
455 fetch_integer_param(params, "page", 1),
456 fetch_integer_param(params, "page_size", @users_page_size)