qb_akkoma/lib/pleroma/web/twitter_api/twitter_api.ex

121 lines
3.1 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
2018-12-31 15:41:47 +00:00
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
2017-03-21 16:53:20 +00:00
defmodule Pleroma.Web.TwitterAPI.TwitterAPI do
alias Pleroma.Emails.Mailer
alias Pleroma.Emails.UserEmail
2019-02-09 15:16:26 +00:00
alias Pleroma.Repo
alias Pleroma.User
alias Pleroma.UserInviteToken
2017-03-21 16:53:20 +00:00
require Pleroma.Constants
def register_user(params, opts \\ []) do
2019-04-06 13:24:22 +00:00
token = params["token"]
2018-06-12 11:52:54 +00:00
2017-04-16 08:25:27 +00:00
params = %{
nickname: params["nickname"],
name: params["fullname"],
2018-12-02 19:03:53 +00:00
bio: User.parse_bio(params["bio"]),
2017-04-16 08:25:27 +00:00
email: params["email"],
password: params["password"],
password_confirmation: params["confirm"],
captcha_solution: params["captcha_solution"],
captcha_token: params["captcha_token"],
captcha_answer_data: params["captcha_answer_data"]
2017-04-16 08:25:27 +00:00
}
2018-12-14 23:00:00 +00:00
captcha_enabled = Pleroma.Config.get([Pleroma.Captcha, :enabled])
# true if captcha is disabled or enabled and valid, false otherwise
2018-12-15 19:08:26 +00:00
captcha_ok =
if !captcha_enabled do
:ok
2018-12-15 19:08:26 +00:00
else
Pleroma.Captcha.validate(
params[:captcha_token],
params[:captcha_solution],
params[:captcha_answer_data]
)
2018-12-15 19:08:26 +00:00
end
2018-12-14 23:00:00 +00:00
# Captcha invalid
if captcha_ok != :ok do
{:error, error} = captcha_ok
# I have no idea how this error handling works
{:error, %{error: Jason.encode!(%{captcha: [error]})}}
else
registration_process(
params,
%{
registrations_open: Pleroma.Config.get([:instance, :registrations_open]),
token: token
},
opts
)
end
end
defp registration_process(params, %{registrations_open: true}, opts) do
create_user(params, opts)
end
defp registration_process(params, %{token: token}, opts) do
2019-04-06 13:24:22 +00:00
invite =
unless is_nil(token) do
Repo.get_by(UserInviteToken, %{token: token})
end
2017-04-16 08:25:27 +00:00
2019-04-06 13:24:22 +00:00
valid_invite? = invite && UserInviteToken.valid_invite?(invite)
2018-12-18 14:30:30 +00:00
2019-04-06 13:24:22 +00:00
case invite do
nil ->
{:error, "Invalid token"}
2018-12-18 14:30:30 +00:00
2019-04-06 13:24:22 +00:00
invite when valid_invite? ->
UserInviteToken.update_usage!(invite)
create_user(params, opts)
2018-06-12 11:52:54 +00:00
_ ->
{:error, "Expired token"}
end
end
defp create_user(params, opts) do
changeset = User.register_changeset(%User{}, params, opts)
case User.register(changeset) do
{:ok, user} ->
{:ok, user}
2018-03-30 13:01:53 +00:00
{:error, changeset} ->
errors =
Ecto.Changeset.traverse_errors(changeset, fn {msg, _opts} -> msg end)
|> Jason.encode!()
{:error, %{error: errors}}
2017-04-16 08:25:27 +00:00
end
end
def password_reset(nickname_or_email) do
with true <- is_binary(nickname_or_email),
%User{local: true} = user <- User.get_by_nickname_or_email(nickname_or_email),
{:ok, token_record} <- Pleroma.PasswordResetToken.create_token(user) do
user
|> UserEmail.password_reset_email(token_record.token)
2019-02-20 16:51:25 +00:00
|> Mailer.deliver_async()
{:ok, :enqueued}
else
false ->
{:error, "bad user identifier"}
%User{local: false} ->
{:error, "remote user"}
nil ->
{:error, "unknown user"}
end
end
2017-03-21 16:53:20 +00:00
end