mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 05:32:25 -05:00 
			
		
		
		
	* prevent moved accounts from taking create-type actions * update move logic * federate move out * indicate on web profile when an account has moved * [docs] Add migration docs section * lock while checking + setting move state * use redirectFollowers func for clientAPI as well * comment typo * linter? i barely know 'er! * Update internal/uris/uri.go Co-authored-by: Daenney <daenney@users.noreply.github.com> * add a couple tests for move * fix little mistake exposed by tests (thanks tests) * ensure Move marked as successful * attach shared util funcs to struct * lock whole account when doing move * move moving check to after error check * replace repeated text with error func * linterrrrrr!!!! * catch self follow case --------- Co-authored-by: Daenney <daenney@users.noreply.github.com>
		
			
				
	
	
		
			111 lines
		
	
	
	
		
			3.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			111 lines
		
	
	
	
		
			3.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package admin
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 
 | |
| 	"github.com/gin-gonic/gin"
 | |
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | |
| 	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/config"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/oauth"
 | |
| )
 | |
| 
 | |
| // MediaCleanupPOSTHandler swagger:operation POST /api/v1/admin/media_cleanup mediaCleanup
 | |
| //
 | |
| // Clean up remote media older than the specified number of days.
 | |
| //
 | |
| // Also cleans up unused headers + avatars from the media cache and prunes orphaned items from storage.
 | |
| //
 | |
| //	---
 | |
| //	tags:
 | |
| //	- admin
 | |
| //
 | |
| //	consumes:
 | |
| //	- application/json
 | |
| //	- application/xml
 | |
| //	- application/x-www-form-urlencoded
 | |
| //
 | |
| //	produces:
 | |
| //	- application/json
 | |
| //
 | |
| //	security:
 | |
| //	- OAuth2 Bearer:
 | |
| //		- admin
 | |
| //
 | |
| //	responses:
 | |
| //		'200':
 | |
| //			description: >-
 | |
| //				Echos the number of days requested.
 | |
| //				The cleanup is performed asynchronously after the request completes.
 | |
| //		'400':
 | |
| //			description: bad request
 | |
| //		'401':
 | |
| //			description: unauthorized
 | |
| //		'403':
 | |
| //			description: forbidden
 | |
| //		'404':
 | |
| //			description: not found
 | |
| //		'406':
 | |
| //			description: not acceptable
 | |
| //		'500':
 | |
| //			description: internal server error
 | |
| func (m *Module) MediaCleanupPOSTHandler(c *gin.Context) {
 | |
| 	authed, err := oauth.Authed(c, true, true, true, true)
 | |
| 	if err != nil {
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if !*authed.User.Admin {
 | |
| 		err := fmt.Errorf("user %s not an admin", authed.User.ID)
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	if authed.Account.IsMoving() {
 | |
| 		apiutil.ForbiddenAfterMove(c)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	form := &apimodel.MediaCleanupRequest{}
 | |
| 	if err := c.ShouldBind(form); err != nil {
 | |
| 		apiutil.ErrorHandler(c, gtserror.NewErrorBadRequest(err, err.Error()), m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	var remoteCacheDays int
 | |
| 	if form.RemoteCacheDays == nil {
 | |
| 		remoteCacheDays = config.GetMediaRemoteCacheDays()
 | |
| 	} else {
 | |
| 		remoteCacheDays = *form.RemoteCacheDays
 | |
| 	}
 | |
| 	if remoteCacheDays < 0 {
 | |
| 		remoteCacheDays = 0
 | |
| 	}
 | |
| 
 | |
| 	if errWithCode := m.processor.Admin().MediaPrune(c.Request.Context(), remoteCacheDays); errWithCode != nil {
 | |
| 		apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	apiutil.JSON(c, http.StatusOK, remoteCacheDays)
 | |
| }
 |