2018-12-23 20:04:54 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2018-12-31 15:41:47 +00:00
|
|
|
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 20:04:54 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-10-02 17:13:21 +00:00
|
|
|
defmodule Pleroma.Plugs.UserIsAdminPlug do
|
2019-07-10 09:25:58 +00:00
|
|
|
import Pleroma.Web.TranslationHelpers
|
2018-10-02 17:13:21 +00:00
|
|
|
import Plug.Conn
|
2019-12-05 21:25:44 +00:00
|
|
|
|
2019-12-07 14:49:53 +00:00
|
|
|
alias Pleroma.User
|
2019-12-05 21:25:44 +00:00
|
|
|
alias Pleroma.Web.OAuth
|
2018-10-02 17:13:21 +00:00
|
|
|
|
|
|
|
def init(options) do
|
|
|
|
options
|
|
|
|
end
|
|
|
|
|
2019-12-07 14:49:53 +00:00
|
|
|
def call(%{assigns: %{user: %User{is_admin: true}} = assigns} = conn, _) do
|
2019-12-06 17:33:47 +00:00
|
|
|
token = assigns[:token]
|
2019-12-06 13:56:23 +00:00
|
|
|
|
2019-12-06 17:33:47 +00:00
|
|
|
cond do
|
2019-12-07 14:49:53 +00:00
|
|
|
not Pleroma.Config.enforce_oauth_admin_scope_usage?() ->
|
|
|
|
conn
|
|
|
|
|
2019-12-06 17:33:47 +00:00
|
|
|
token && OAuth.Scopes.contains_admin_scopes?(token.scopes) ->
|
|
|
|
# Note: checking for _any_ admin scope presence, not necessarily fitting requested action.
|
|
|
|
# Thus, controller must explicitly invoke OAuthScopesPlug to verify scope requirements.
|
2020-01-10 07:52:21 +00:00
|
|
|
# Admin might opt out of admin scope for some apps to block any admin actions from them.
|
2019-12-06 17:33:47 +00:00
|
|
|
conn
|
2019-12-05 21:25:44 +00:00
|
|
|
|
2019-12-06 17:33:47 +00:00
|
|
|
true ->
|
2019-12-07 14:49:53 +00:00
|
|
|
fail(conn)
|
2019-12-06 17:33:47 +00:00
|
|
|
end
|
2018-10-02 17:13:21 +00:00
|
|
|
end
|
2019-12-07 14:49:53 +00:00
|
|
|
|
|
|
|
def call(conn, _) do
|
|
|
|
fail(conn)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp fail(conn) do
|
|
|
|
conn
|
|
|
|
|> render_error(:forbidden, "User is not an admin or OAuth admin scope is not granted.")
|
|
|
|
|> halt()
|
|
|
|
end
|
2018-10-02 17:13:21 +00:00
|
|
|
end
|