2025-04-02 11:39:51 -04:00
|
|
|
use super::{PaginatedQuery, render_error};
|
|
|
|
use crate::{State, assets::initial_context, get_lang, get_user_from_token};
|
|
|
|
use axum::{
|
2025-04-06 13:43:12 -04:00
|
|
|
extract::{Path, Query},
|
2025-04-02 11:39:51 -04:00
|
|
|
response::{Html, IntoResponse},
|
2025-04-06 13:43:12 -04:00
|
|
|
Extension,
|
2025-04-02 11:39:51 -04:00
|
|
|
};
|
|
|
|
use axum_extra::extract::CookieJar;
|
|
|
|
use serde::Deserialize;
|
2025-05-02 20:51:19 -04:00
|
|
|
use tetratto_core::{
|
|
|
|
cache::Cache,
|
|
|
|
model::{permissions::FinePermission, reactions::AssetType, Error},
|
|
|
|
};
|
2025-04-02 11:39:51 -04:00
|
|
|
|
|
|
|
/// `/mod_panel/audit_log`
|
|
|
|
pub async fn audit_log_request(
|
|
|
|
jar: CookieJar,
|
|
|
|
Extension(data): Extension<State>,
|
|
|
|
Query(req): Query<PaginatedQuery>,
|
|
|
|
) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.permissions.check(FinePermission::VIEW_AUDIT_LOG) {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
let items = match data.0.get_audit_log_entries(12, req.page).await {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
|
|
|
context.insert("items", &items);
|
|
|
|
context.insert("page", &req.page);
|
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(data.1.render("mod/audit_log.html", &context).unwrap()))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// `/mod_panel/reports`
|
|
|
|
pub async fn reports_request(
|
|
|
|
jar: CookieJar,
|
|
|
|
Extension(data): Extension<State>,
|
|
|
|
Query(req): Query<PaginatedQuery>,
|
|
|
|
) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.permissions.check(FinePermission::VIEW_REPORTS) {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
let items = match data.0.get_reports(12, req.page).await {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
|
|
|
context.insert("items", &items);
|
|
|
|
context.insert("page", &req.page);
|
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(data.1.render("mod/reports.html", &context).unwrap()))
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
pub struct FileReportQuery {
|
|
|
|
pub asset: String,
|
|
|
|
pub asset_type: AssetType,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// `/mod_panel/file_report`
|
|
|
|
pub async fn file_report_request(
|
|
|
|
jar: CookieJar,
|
|
|
|
Extension(data): Extension<State>,
|
|
|
|
Query(req): Query<FileReportQuery>,
|
|
|
|
) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
|
|
|
context.insert("asset", &req.asset);
|
|
|
|
context.insert("asset_type", &req.asset_type);
|
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(
|
|
|
|
data.1.render("mod/file_report.html", &context).unwrap(),
|
|
|
|
))
|
|
|
|
}
|
2025-04-03 11:22:56 -04:00
|
|
|
|
|
|
|
/// `/mod_panel/ip_bans`
|
|
|
|
pub async fn ip_bans_request(
|
|
|
|
jar: CookieJar,
|
|
|
|
Extension(data): Extension<State>,
|
|
|
|
Query(req): Query<PaginatedQuery>,
|
|
|
|
) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.permissions.check(FinePermission::MANAGE_BANS) {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
let items = match data.0.get_ipbans(12, req.page).await {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
|
|
|
context.insert("items", &items);
|
|
|
|
context.insert("page", &req.page);
|
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(data.1.render("mod/ip_bans.html", &context).unwrap()))
|
|
|
|
}
|
2025-04-06 13:43:12 -04:00
|
|
|
|
|
|
|
/// `/mod_panel/profile/{id}`
|
|
|
|
pub async fn manage_profile_request(
|
|
|
|
jar: CookieJar,
|
|
|
|
Extension(data): Extension<State>,
|
|
|
|
Path(id): Path<usize>,
|
|
|
|
) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.permissions.check(FinePermission::MANAGE_USERS) {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
let profile = match data.0.get_user_by_id(id).await {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
|
|
|
|
};
|
|
|
|
|
2025-06-05 20:56:56 -04:00
|
|
|
let associations = {
|
|
|
|
let mut out = Vec::new();
|
|
|
|
|
|
|
|
for id in &profile.associated {
|
|
|
|
out.push(match data.0.get_user_by_id(id.to_owned()).await {
|
|
|
|
Ok(ua) => ua,
|
|
|
|
// TODO: remove from associated on error
|
|
|
|
Err(_) => continue,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
out
|
|
|
|
};
|
|
|
|
|
2025-04-06 13:43:12 -04:00
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
2025-06-05 20:56:56 -04:00
|
|
|
|
2025-04-06 13:43:12 -04:00
|
|
|
context.insert("profile", &profile);
|
2025-06-05 20:56:56 -04:00
|
|
|
context.insert("associations", &associations);
|
2025-04-06 13:43:12 -04:00
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(data.1.render("mod/profile.html", &context).unwrap()))
|
|
|
|
}
|
2025-04-11 22:12:43 -04:00
|
|
|
|
|
|
|
/// `/mod_panel/profile/{id}/warnings`
|
|
|
|
pub async fn manage_profile_warnings_request(
|
|
|
|
jar: CookieJar,
|
|
|
|
Extension(data): Extension<State>,
|
|
|
|
Path(id): Path<usize>,
|
|
|
|
Query(req): Query<PaginatedQuery>,
|
|
|
|
) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.permissions.check(FinePermission::MANAGE_USERS) {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
let profile = match data.0.get_user_by_id(id).await {
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let list = match data
|
|
|
|
.0
|
|
|
|
.get_user_warnings_by_user(profile.id, 12, req.page)
|
|
|
|
.await
|
|
|
|
{
|
|
|
|
Ok(p) => p,
|
|
|
|
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
|
|
|
|
|
|
|
context.insert("profile", &profile);
|
|
|
|
context.insert("items", &list);
|
|
|
|
context.insert("page", &req.page);
|
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(data.1.render("mod/warnings.html", &context).unwrap()))
|
|
|
|
}
|
2025-05-02 20:51:19 -04:00
|
|
|
|
|
|
|
/// `/mod_panel/stats`
|
|
|
|
pub async fn stats_request(jar: CookieJar, Extension(data): Extension<State>) -> impl IntoResponse {
|
|
|
|
let data = data.read().await;
|
|
|
|
let user = match get_user_from_token!(jar, data.0) {
|
|
|
|
Some(ua) => ua,
|
|
|
|
None => {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if !user.permissions.check(FinePermission::VIEW_AUDIT_LOG) {
|
|
|
|
return Err(Html(
|
|
|
|
render_error(Error::NotAllowed, &jar, &data, &None).await,
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
|
|
|
let lang = get_lang!(jar, data.0);
|
|
|
|
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
|
|
|
|
|
|
|
|
context.insert(
|
|
|
|
"active_users_chats",
|
|
|
|
&data
|
|
|
|
.0
|
|
|
|
.2
|
|
|
|
.get("atto.active_connections:chats".to_string())
|
|
|
|
.await
|
|
|
|
.unwrap_or("0".to_string())
|
|
|
|
.parse::<i64>()
|
|
|
|
.unwrap(),
|
|
|
|
);
|
|
|
|
context.insert(
|
|
|
|
"active_users",
|
|
|
|
&data
|
|
|
|
.0
|
|
|
|
.2
|
|
|
|
.get("atto.active_connections:users".to_string())
|
|
|
|
.await
|
|
|
|
.unwrap_or("0".to_string())
|
|
|
|
.parse::<i64>()
|
|
|
|
.unwrap(),
|
|
|
|
);
|
|
|
|
|
|
|
|
// return
|
|
|
|
Ok(Html(data.1.render("mod/stats.html", &context).unwrap()))
|
|
|
|
}
|