2018-12-23 13:04:54 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2018-12-31 08:41:47 -07:00
|
|
|
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:04:54 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-10-02 11:13:21 -06:00
|
|
|
defmodule Pleroma.Plugs.UserIsAdminPlug do
|
2019-07-10 03:25:58 -06:00
|
|
|
import Pleroma.Web.TranslationHelpers
|
2018-10-02 11:13:21 -06:00
|
|
|
import Plug.Conn
|
2019-12-05 14:25:44 -07:00
|
|
|
|
|
|
|
alias Pleroma.Web.OAuth
|
2018-10-02 11:13:21 -06:00
|
|
|
|
|
|
|
def init(options) do
|
|
|
|
options
|
|
|
|
end
|
|
|
|
|
2019-12-06 10:33:47 -07:00
|
|
|
def call(%Plug.Conn{assigns: assigns} = conn, _) do
|
|
|
|
token = assigns[:token]
|
|
|
|
user = assigns[:user]
|
2019-12-06 06:56:23 -07:00
|
|
|
|
2019-12-06 10:33:47 -07:00
|
|
|
cond do
|
|
|
|
token && OAuth.Scopes.contains_admin_scopes?(token.scopes) ->
|
|
|
|
# Note: checking for _any_ admin scope presence, not necessarily fitting requested action.
|
|
|
|
# Thus, controller must explicitly invoke OAuthScopesPlug to verify scope requirements.
|
|
|
|
conn
|
2019-12-05 14:25:44 -07:00
|
|
|
|
2019-12-06 10:33:47 -07:00
|
|
|
user && user.is_admin && !Pleroma.Config.enforce_oauth_admin_scope_usage?() ->
|
|
|
|
conn
|
2019-12-05 14:25:44 -07:00
|
|
|
|
2019-12-06 10:33:47 -07:00
|
|
|
true ->
|
|
|
|
conn
|
|
|
|
|> render_error(:forbidden, "User is not an admin or OAuth admin scope is not granted.")
|
|
|
|
|> halt()
|
|
|
|
end
|
2018-10-02 11:13:21 -06:00
|
|
|
end
|
|
|
|
end
|