 6da6540036
			
		
	
	
		6da6540036
		
			
		
	
	
	
	
		
			
			Done via the following command:
git diff fcd5dd259a --stat --name-only | xargs sed -i '/Pleroma Authors/c# Copyright © 2017-2020 Pleroma Authors <https:\/\/pleroma.social\/>'
		
	
			
		
			
				
	
	
		
			43 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
			
		
		
	
	
			43 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
| # Pleroma: A lightweight social networking server
 | |
| # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
 | |
| # SPDX-License-Identifier: AGPL-3.0-only
 | |
| 
 | |
| defmodule Pleroma.Plugs.UserIsAdminPlug do
 | |
|   import Pleroma.Web.TranslationHelpers
 | |
|   import Plug.Conn
 | |
| 
 | |
|   alias Pleroma.User
 | |
|   alias Pleroma.Web.OAuth
 | |
| 
 | |
|   def init(options) do
 | |
|     options
 | |
|   end
 | |
| 
 | |
|   def call(%{assigns: %{user: %User{is_admin: true}} = assigns} = conn, _) do
 | |
|     token = assigns[:token]
 | |
| 
 | |
|     cond do
 | |
|       not Pleroma.Config.enforce_oauth_admin_scope_usage?() ->
 | |
|         conn
 | |
| 
 | |
|       token && OAuth.Scopes.contains_admin_scopes?(token.scopes) ->
 | |
|         # Note: checking for _any_ admin scope presence, not necessarily fitting requested action.
 | |
|         #   Thus, controller must explicitly invoke OAuthScopesPlug to verify scope requirements.
 | |
|         #   Admin might opt out of admin scope for some apps to block any admin actions from them.
 | |
|         conn
 | |
| 
 | |
|       true ->
 | |
|         fail(conn)
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   def call(conn, _) do
 | |
|     fail(conn)
 | |
|   end
 | |
| 
 | |
|   defp fail(conn) do
 | |
|     conn
 | |
|     |> render_error(:forbidden, "User is not an admin or OAuth admin scope is not granted.")
 | |
|     |> halt()
 | |
|   end
 | |
| end
 |