mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 06:42:25 -05:00 
			
		
		
		
	* prevent moved accounts from taking create-type actions * update move logic * federate move out * indicate on web profile when an account has moved * [docs] Add migration docs section * lock while checking + setting move state * use redirectFollowers func for clientAPI as well * comment typo * linter? i barely know 'er! * Update internal/uris/uri.go Co-authored-by: Daenney <daenney@users.noreply.github.com> * add a couple tests for move * fix little mistake exposed by tests (thanks tests) * ensure Move marked as successful * attach shared util funcs to struct * lock whole account when doing move * move moving check to after error check * replace repeated text with error func * linterrrrrr!!!! * catch self follow case --------- Co-authored-by: Daenney <daenney@users.noreply.github.com>
		
			
				
	
	
		
			116 lines
		
	
	
	
		
			3.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			116 lines
		
	
	
	
		
			3.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package admin
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"github.com/gin-gonic/gin"
 | |
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | |
| 	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/oauth"
 | |
| )
 | |
| 
 | |
| // RulePOSTHandler swagger:operation POST /api/v1/admin/instance/rules ruleCreate
 | |
| //
 | |
| // Create a new instance rule.
 | |
| //
 | |
| //	---
 | |
| //	tags:
 | |
| //	- admin
 | |
| //
 | |
| //	consumes:
 | |
| //	- multipart/form-data
 | |
| //
 | |
| //	produces:
 | |
| //	- application/json
 | |
| //
 | |
| //	security:
 | |
| //	- OAuth2 Bearer:
 | |
| //		- admin
 | |
| //
 | |
| //	responses:
 | |
| //		'200':
 | |
| //			description: The newly-created instance rule.
 | |
| //			schema:
 | |
| //				"$ref": "#/definitions/instanceRule"
 | |
| //		'400':
 | |
| //			description: bad request
 | |
| //		'401':
 | |
| //			description: unauthorized
 | |
| //		'403':
 | |
| //			description: forbidden
 | |
| //		'404':
 | |
| //			description: not found
 | |
| //		'406':
 | |
| //			description: not acceptable
 | |
| //		'500':
 | |
| //			description: internal server error
 | |
| func (m *Module) RulePOSTHandler(c *gin.Context) {
 | |
| 	authed, err := oauth.Authed(c, true, true, true, true)
 | |
| 	if err != nil {
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if !*authed.User.Admin {
 | |
| 		err := fmt.Errorf("user %s not an admin", authed.User.ID)
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if authed.Account.IsMoving() {
 | |
| 		apiutil.ForbiddenAfterMove(c)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil {
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	form := &apimodel.InstanceRuleCreateRequest{}
 | |
| 	if err := c.ShouldBind(form); err != nil {
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if err := validateCreateRule(form); err != nil {
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	apiRule, errWithCode := m.processor.Admin().RuleCreate(c.Request.Context(), form)
 | |
| 	if errWithCode != nil {
 | |
| 		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	apiutil.JSON(c, http.StatusOK, apiRule)
 | |
| }
 | |
| 
 | |
| func validateCreateRule(form *apimodel.InstanceRuleCreateRequest) error {
 | |
| 	if form.Text == "" {
 | |
| 		return errors.New("Instance rule text is empty")
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |