tetratto/crates/app/src/routes/pages/mod_panel.rs

302 lines
8.5 KiB
Rust
Raw Normal View History

use super::{PaginatedQuery, render_error};
use crate::{State, assets::initial_context, get_lang, get_user_from_token};
use axum::{
2025-04-06 13:43:12 -04:00
extract::{Path, Query},
response::{Html, IntoResponse},
2025-04-06 13:43:12 -04:00
Extension,
};
use axum_extra::extract::CookieJar;
use serde::Deserialize;
2025-05-02 20:51:19 -04:00
use tetratto_core::{
cache::Cache,
model::{permissions::FinePermission, reactions::AssetType, Error},
};
/// `/mod_panel/audit_log`
pub async fn audit_log_request(
jar: CookieJar,
Extension(data): Extension<State>,
Query(req): Query<PaginatedQuery>,
) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
if !user.permissions.check(FinePermission::VIEW_AUDIT_LOG) {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
let items = match data.0.get_audit_log_entries(12, req.page).await {
Ok(p) => p,
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
};
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
context.insert("items", &items);
context.insert("page", &req.page);
// return
Ok(Html(data.1.render("mod/audit_log.html", &context).unwrap()))
}
/// `/mod_panel/reports`
pub async fn reports_request(
jar: CookieJar,
Extension(data): Extension<State>,
Query(req): Query<PaginatedQuery>,
) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
if !user.permissions.check(FinePermission::VIEW_REPORTS) {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
let items = match data.0.get_reports(12, req.page).await {
Ok(p) => p,
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
};
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
context.insert("items", &items);
context.insert("page", &req.page);
// return
Ok(Html(data.1.render("mod/reports.html", &context).unwrap()))
}
#[derive(Deserialize)]
pub struct FileReportQuery {
pub asset: String,
pub asset_type: AssetType,
}
/// `/mod_panel/file_report`
pub async fn file_report_request(
jar: CookieJar,
Extension(data): Extension<State>,
Query(req): Query<FileReportQuery>,
) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
context.insert("asset", &req.asset);
context.insert("asset_type", &req.asset_type);
// return
Ok(Html(
data.1.render("mod/file_report.html", &context).unwrap(),
))
}
/// `/mod_panel/ip_bans`
pub async fn ip_bans_request(
jar: CookieJar,
Extension(data): Extension<State>,
Query(req): Query<PaginatedQuery>,
) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
if !user.permissions.check(FinePermission::MANAGE_BANS) {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
let items = match data.0.get_ipbans(12, req.page).await {
Ok(p) => p,
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
};
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
context.insert("items", &items);
context.insert("page", &req.page);
// return
Ok(Html(data.1.render("mod/ip_bans.html", &context).unwrap()))
}
2025-04-06 13:43:12 -04:00
/// `/mod_panel/profile/{id}`
pub async fn manage_profile_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
if !user.permissions.check(FinePermission::MANAGE_USERS) {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
let profile = match data.0.get_user_by_id(id).await {
Ok(p) => p,
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
};
2025-06-05 20:56:56 -04:00
let associations = {
let mut out = Vec::new();
for id in &profile.associated {
out.push(match data.0.get_user_by_id(id.to_owned()).await {
Ok(ua) => ua,
// TODO: remove from associated on error
Err(_) => continue,
});
}
out
};
2025-04-06 13:43:12 -04:00
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
2025-06-05 20:56:56 -04:00
2025-04-06 13:43:12 -04:00
context.insert("profile", &profile);
2025-06-05 20:56:56 -04:00
context.insert("associations", &associations);
2025-04-06 13:43:12 -04:00
// return
Ok(Html(data.1.render("mod/profile.html", &context).unwrap()))
}
2025-04-11 22:12:43 -04:00
/// `/mod_panel/profile/{id}/warnings`
pub async fn manage_profile_warnings_request(
jar: CookieJar,
Extension(data): Extension<State>,
Path(id): Path<usize>,
Query(req): Query<PaginatedQuery>,
) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
if !user.permissions.check(FinePermission::MANAGE_USERS) {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
let profile = match data.0.get_user_by_id(id).await {
Ok(p) => p,
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
};
let list = match data
.0
.get_user_warnings_by_user(profile.id, 12, req.page)
.await
{
Ok(p) => p,
Err(e) => return Err(Html(render_error(e, &jar, &data, &Some(user)).await)),
};
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
context.insert("profile", &profile);
context.insert("items", &list);
context.insert("page", &req.page);
// return
Ok(Html(data.1.render("mod/warnings.html", &context).unwrap()))
}
2025-05-02 20:51:19 -04:00
/// `/mod_panel/stats`
pub async fn stats_request(jar: CookieJar, Extension(data): Extension<State>) -> impl IntoResponse {
let data = data.read().await;
let user = match get_user_from_token!(jar, data.0) {
Some(ua) => ua,
None => {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
};
if !user.permissions.check(FinePermission::VIEW_AUDIT_LOG) {
return Err(Html(
render_error(Error::NotAllowed, &jar, &data, &None).await,
));
}
let lang = get_lang!(jar, data.0);
let mut context = initial_context(&data.0.0, lang, &Some(user)).await;
context.insert(
"active_users_chats",
&data
.0
.2
.get("atto.active_connections:chats".to_string())
.await
.unwrap_or("0".to_string())
.parse::<i64>()
.unwrap(),
);
context.insert(
"active_users",
&data
.0
.2
.get("atto.active_connections:users".to_string())
.await
.unwrap_or("0".to_string())
.parse::<i64>()
.unwrap(),
);
// return
Ok(Html(data.1.render("mod/stats.html", &context).unwrap()))
}