mirror of
				https://github.com/superseriousbusiness/gotosocial
				synced 2025-06-05 21:59:39 +02:00 
			
		
		
		
	[feature] Admin accounts endpoints; approve/reject sign-ups (#2826)
* update settings panels, add pending overview + approve/deny functions * add admin accounts get, approve, reject * send approved/rejected emails * use signup URL * docs! * email * swagger * web linting * fix email tests * wee lil fixerinos * use new paging logic for GetAccounts() series of admin endpoints, small changes to query building * shuffle useAccountIDIn check *before* adding to query * fix parse from toot react error * use `netip.Addr` * put valid slices in globals * optimistic updates for account state --------- Co-authored-by: kim <grufwub@gmail.com>
This commit is contained in:
		
							
								
								
									
										79
									
								
								internal/processing/admin/accountapprove.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										79
									
								
								internal/processing/admin/accountapprove.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,79 @@
 | 
			
		||||
// GoToSocial
 | 
			
		||||
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
			
		||||
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
			
		||||
//
 | 
			
		||||
// This program is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Affero General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// This program is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
// GNU Affero General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Affero General Public License
 | 
			
		||||
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package admin
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | 
			
		||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (p *Processor) AccountApprove(
 | 
			
		||||
	ctx context.Context,
 | 
			
		||||
	adminAcct *gtsmodel.Account,
 | 
			
		||||
	accountID string,
 | 
			
		||||
) (*apimodel.AdminAccountInfo, gtserror.WithCode) {
 | 
			
		||||
	user, err := p.state.DB.GetUserByAccountID(ctx, accountID)
 | 
			
		||||
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
			
		||||
		err := gtserror.Newf("db error getting user for account id %s: %w", accountID, err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if user == nil {
 | 
			
		||||
		err := fmt.Errorf("user for account %s not found", accountID)
 | 
			
		||||
		return nil, gtserror.NewErrorNotFound(err, err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Get a lock on the account URI,
 | 
			
		||||
	// to ensure it's not also being
 | 
			
		||||
	// rejected at the same time!
 | 
			
		||||
	unlock := p.state.ClientLocks.Lock(user.Account.URI)
 | 
			
		||||
	defer unlock()
 | 
			
		||||
 | 
			
		||||
	if !*user.Approved {
 | 
			
		||||
		// Process approval side effects asynschronously.
 | 
			
		||||
		p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | 
			
		||||
			APObjectType:   ap.ActorPerson,
 | 
			
		||||
			APActivityType: ap.ActivityAccept,
 | 
			
		||||
			GTSModel:       user,
 | 
			
		||||
			OriginAccount:  adminAcct,
 | 
			
		||||
			TargetAccount:  user.Account,
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	apiAccount, err := p.converter.AccountToAdminAPIAccount(ctx, user.Account)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		err := gtserror.Newf("error converting account %s to admin api model: %w", accountID, err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Optimistically set approved to true and
 | 
			
		||||
	// clear sign-up IP to reflect state that
 | 
			
		||||
	// will be produced by side effects.
 | 
			
		||||
	apiAccount.Approved = true
 | 
			
		||||
	apiAccount.IP = nil
 | 
			
		||||
 | 
			
		||||
	return apiAccount, nil
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										75
									
								
								internal/processing/admin/accountapprove_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										75
									
								
								internal/processing/admin/accountapprove_test.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,75 @@
 | 
			
		||||
// GoToSocial
 | 
			
		||||
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
			
		||||
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
			
		||||
//
 | 
			
		||||
// This program is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Affero General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// This program is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
// GNU Affero General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Affero General Public License
 | 
			
		||||
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package admin_test
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/stretchr/testify/suite"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/testrig"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type AdminApproveTestSuite struct {
 | 
			
		||||
	AdminStandardTestSuite
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (suite *AdminApproveTestSuite) TestApprove() {
 | 
			
		||||
	var (
 | 
			
		||||
		ctx        = context.Background()
 | 
			
		||||
		adminAcct  = suite.testAccounts["admin_account"]
 | 
			
		||||
		targetAcct = suite.testAccounts["unconfirmed_account"]
 | 
			
		||||
		targetUser = new(gtsmodel.User)
 | 
			
		||||
	)
 | 
			
		||||
 | 
			
		||||
	// Copy user since we're modifying it.
 | 
			
		||||
	*targetUser = *suite.testUsers["unconfirmed_account"]
 | 
			
		||||
 | 
			
		||||
	// Approve the sign-up.
 | 
			
		||||
	acct, errWithCode := suite.adminProcessor.AccountApprove(
 | 
			
		||||
		ctx,
 | 
			
		||||
		adminAcct,
 | 
			
		||||
		targetAcct.ID,
 | 
			
		||||
	)
 | 
			
		||||
	if errWithCode != nil {
 | 
			
		||||
		suite.FailNow(errWithCode.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Account should be approved.
 | 
			
		||||
	suite.NotNil(acct)
 | 
			
		||||
	suite.True(acct.Approved)
 | 
			
		||||
	suite.Nil(acct.IP)
 | 
			
		||||
 | 
			
		||||
	// Wait for processor to
 | 
			
		||||
	// handle side effects.
 | 
			
		||||
	var (
 | 
			
		||||
		dbUser *gtsmodel.User
 | 
			
		||||
		err    error
 | 
			
		||||
	)
 | 
			
		||||
	if !testrig.WaitFor(func() bool {
 | 
			
		||||
		dbUser, err = suite.state.DB.GetUserByID(ctx, targetUser.ID)
 | 
			
		||||
		return err == nil && dbUser != nil && *dbUser.Approved
 | 
			
		||||
	}) {
 | 
			
		||||
		suite.FailNow("waiting for approved user")
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAdminApproveTestSuite(t *testing.T) {
 | 
			
		||||
	suite.Run(t, new(AdminApproveTestSuite))
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										49
									
								
								internal/processing/admin/accountget.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										49
									
								
								internal/processing/admin/accountget.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,49 @@
 | 
			
		||||
// GoToSocial
 | 
			
		||||
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
			
		||||
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
			
		||||
//
 | 
			
		||||
// This program is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Affero General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// This program is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
// GNU Affero General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Affero General Public License
 | 
			
		||||
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package admin
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
 | 
			
		||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (p *Processor) AccountGet(ctx context.Context, accountID string) (*apimodel.AdminAccountInfo, gtserror.WithCode) {
 | 
			
		||||
	account, err := p.state.DB.GetAccountByID(ctx, accountID)
 | 
			
		||||
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
			
		||||
		err := gtserror.Newf("db error getting account %s: %w", accountID, err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if account == nil {
 | 
			
		||||
		err := fmt.Errorf("account %s not found", accountID)
 | 
			
		||||
		return nil, gtserror.NewErrorNotFound(err, err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	apiAccount, err := p.converter.AccountToAdminAPIAccount(ctx, account)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		err := gtserror.Newf("error converting account %s to admin api model: %w", accountID, err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return apiAccount, nil
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										113
									
								
								internal/processing/admin/accountreject.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										113
									
								
								internal/processing/admin/accountreject.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,113 @@
 | 
			
		||||
// GoToSocial
 | 
			
		||||
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
			
		||||
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
			
		||||
//
 | 
			
		||||
// This program is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Affero General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// This program is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
// GNU Affero General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Affero General Public License
 | 
			
		||||
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package admin
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | 
			
		||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/messages"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (p *Processor) AccountReject(
 | 
			
		||||
	ctx context.Context,
 | 
			
		||||
	adminAcct *gtsmodel.Account,
 | 
			
		||||
	accountID string,
 | 
			
		||||
	privateComment string,
 | 
			
		||||
	sendEmail bool,
 | 
			
		||||
	message string,
 | 
			
		||||
) (*apimodel.AdminAccountInfo, gtserror.WithCode) {
 | 
			
		||||
	user, err := p.state.DB.GetUserByAccountID(ctx, accountID)
 | 
			
		||||
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
			
		||||
		err := gtserror.Newf("db error getting user for account id %s: %w", accountID, err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if user == nil {
 | 
			
		||||
		err := fmt.Errorf("user for account %s not found", accountID)
 | 
			
		||||
		return nil, gtserror.NewErrorNotFound(err, err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Get a lock on the account URI,
 | 
			
		||||
	// since we're going to be deleting
 | 
			
		||||
	// it and its associated user.
 | 
			
		||||
	unlock := p.state.ClientLocks.Lock(user.Account.URI)
 | 
			
		||||
	defer unlock()
 | 
			
		||||
 | 
			
		||||
	// Can't reject an account with a
 | 
			
		||||
	// user that's already been approved.
 | 
			
		||||
	if *user.Approved {
 | 
			
		||||
		err := fmt.Errorf("account %s has already been approved", accountID)
 | 
			
		||||
		return nil, gtserror.NewErrorUnprocessableEntity(err, err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Convert to API account *before* doing the
 | 
			
		||||
	// rejection, since the rejection will cause
 | 
			
		||||
	// the user and account to be removed.
 | 
			
		||||
	apiAccount, err := p.converter.AccountToAdminAPIAccount(ctx, user.Account)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		err := gtserror.Newf("error converting account %s to admin api model: %w", accountID, err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Set approved to false on the API model, to
 | 
			
		||||
	// reflect the changes that will occur
 | 
			
		||||
	// asynchronously in the processor.
 | 
			
		||||
	apiAccount.Approved = false
 | 
			
		||||
 | 
			
		||||
	// Ensure we an email address.
 | 
			
		||||
	var email string
 | 
			
		||||
	if user.Email != "" {
 | 
			
		||||
		email = user.Email
 | 
			
		||||
	} else {
 | 
			
		||||
		email = user.UnconfirmedEmail
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Create a denied user entry for
 | 
			
		||||
	// the worker to process + store.
 | 
			
		||||
	deniedUser := >smodel.DeniedUser{
 | 
			
		||||
		ID:                     user.ID,
 | 
			
		||||
		Email:                  email,
 | 
			
		||||
		Username:               user.Account.Username,
 | 
			
		||||
		SignUpIP:               user.SignUpIP,
 | 
			
		||||
		InviteID:               user.InviteID,
 | 
			
		||||
		Locale:                 user.Locale,
 | 
			
		||||
		CreatedByApplicationID: user.CreatedByApplicationID,
 | 
			
		||||
		SignUpReason:           user.Reason,
 | 
			
		||||
		PrivateComment:         privateComment,
 | 
			
		||||
		SendEmail:              &sendEmail,
 | 
			
		||||
		Message:                message,
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Process rejection side effects asynschronously.
 | 
			
		||||
	p.state.Workers.EnqueueClientAPI(ctx, messages.FromClientAPI{
 | 
			
		||||
		APObjectType:   ap.ActorPerson,
 | 
			
		||||
		APActivityType: ap.ActivityReject,
 | 
			
		||||
		GTSModel:       deniedUser,
 | 
			
		||||
		OriginAccount:  adminAcct,
 | 
			
		||||
		TargetAccount:  user.Account,
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	return apiAccount, nil
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										142
									
								
								internal/processing/admin/accountreject_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										142
									
								
								internal/processing/admin/accountreject_test.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,142 @@
 | 
			
		||||
// GoToSocial
 | 
			
		||||
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
			
		||||
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
			
		||||
//
 | 
			
		||||
// This program is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Affero General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// This program is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
// GNU Affero General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Affero General Public License
 | 
			
		||||
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package admin_test
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/stretchr/testify/suite"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/testrig"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type AdminRejectTestSuite struct {
 | 
			
		||||
	AdminStandardTestSuite
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (suite *AdminRejectTestSuite) TestReject() {
 | 
			
		||||
	var (
 | 
			
		||||
		ctx            = context.Background()
 | 
			
		||||
		adminAcct      = suite.testAccounts["admin_account"]
 | 
			
		||||
		targetAcct     = suite.testAccounts["unconfirmed_account"]
 | 
			
		||||
		targetUser     = suite.testUsers["unconfirmed_account"]
 | 
			
		||||
		privateComment = "It's a no from me chief."
 | 
			
		||||
		sendEmail      = true
 | 
			
		||||
		message        = "Too stinky."
 | 
			
		||||
	)
 | 
			
		||||
 | 
			
		||||
	acct, errWithCode := suite.adminProcessor.AccountReject(
 | 
			
		||||
		ctx,
 | 
			
		||||
		adminAcct,
 | 
			
		||||
		targetAcct.ID,
 | 
			
		||||
		privateComment,
 | 
			
		||||
		sendEmail,
 | 
			
		||||
		message,
 | 
			
		||||
	)
 | 
			
		||||
	if errWithCode != nil {
 | 
			
		||||
		suite.FailNow(errWithCode.Error())
 | 
			
		||||
	}
 | 
			
		||||
	suite.NotNil(acct)
 | 
			
		||||
	suite.False(acct.Approved)
 | 
			
		||||
 | 
			
		||||
	// Wait for processor to
 | 
			
		||||
	// handle side effects.
 | 
			
		||||
	var (
 | 
			
		||||
		deniedUser *gtsmodel.DeniedUser
 | 
			
		||||
		err        error
 | 
			
		||||
	)
 | 
			
		||||
	if !testrig.WaitFor(func() bool {
 | 
			
		||||
		deniedUser, err = suite.state.DB.GetDeniedUserByID(ctx, targetUser.ID)
 | 
			
		||||
		return deniedUser != nil && err == nil
 | 
			
		||||
	}) {
 | 
			
		||||
		suite.FailNow("waiting for denied user")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Ensure fields as expected.
 | 
			
		||||
	suite.Equal(targetUser.ID, deniedUser.ID)
 | 
			
		||||
	suite.Equal(targetUser.UnconfirmedEmail, deniedUser.Email)
 | 
			
		||||
	suite.Equal(targetAcct.Username, deniedUser.Username)
 | 
			
		||||
	suite.Equal(targetUser.SignUpIP, deniedUser.SignUpIP)
 | 
			
		||||
	suite.Equal(targetUser.InviteID, deniedUser.InviteID)
 | 
			
		||||
	suite.Equal(targetUser.Locale, deniedUser.Locale)
 | 
			
		||||
	suite.Equal(targetUser.CreatedByApplicationID, deniedUser.CreatedByApplicationID)
 | 
			
		||||
	suite.Equal(targetUser.Reason, deniedUser.SignUpReason)
 | 
			
		||||
	suite.Equal(privateComment, deniedUser.PrivateComment)
 | 
			
		||||
	suite.Equal(sendEmail, *deniedUser.SendEmail)
 | 
			
		||||
	suite.Equal(message, deniedUser.Message)
 | 
			
		||||
 | 
			
		||||
	// Should be no user entry for
 | 
			
		||||
	// this denied request now.
 | 
			
		||||
	_, err = suite.state.DB.GetUserByID(ctx, targetUser.ID)
 | 
			
		||||
	suite.ErrorIs(db.ErrNoEntries, err)
 | 
			
		||||
 | 
			
		||||
	// Should be no account entry for
 | 
			
		||||
	// this denied request now.
 | 
			
		||||
	_, err = suite.state.DB.GetAccountByID(ctx, targetAcct.ID)
 | 
			
		||||
	suite.ErrorIs(db.ErrNoEntries, err)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (suite *AdminRejectTestSuite) TestRejectRemote() {
 | 
			
		||||
	var (
 | 
			
		||||
		ctx            = context.Background()
 | 
			
		||||
		adminAcct      = suite.testAccounts["admin_account"]
 | 
			
		||||
		targetAcct     = suite.testAccounts["remote_account_1"]
 | 
			
		||||
		privateComment = "It's a no from me chief."
 | 
			
		||||
		sendEmail      = true
 | 
			
		||||
		message        = "Too stinky."
 | 
			
		||||
	)
 | 
			
		||||
 | 
			
		||||
	// Try to reject a remote account.
 | 
			
		||||
	_, err := suite.adminProcessor.AccountReject(
 | 
			
		||||
		ctx,
 | 
			
		||||
		adminAcct,
 | 
			
		||||
		targetAcct.ID,
 | 
			
		||||
		privateComment,
 | 
			
		||||
		sendEmail,
 | 
			
		||||
		message,
 | 
			
		||||
	)
 | 
			
		||||
	suite.EqualError(err, "user for account 01F8MH5ZK5VRH73AKHQM6Y9VNX not found")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (suite *AdminRejectTestSuite) TestRejectApproved() {
 | 
			
		||||
	var (
 | 
			
		||||
		ctx            = context.Background()
 | 
			
		||||
		adminAcct      = suite.testAccounts["admin_account"]
 | 
			
		||||
		targetAcct     = suite.testAccounts["local_account_1"]
 | 
			
		||||
		privateComment = "It's a no from me chief."
 | 
			
		||||
		sendEmail      = true
 | 
			
		||||
		message        = "Too stinky."
 | 
			
		||||
	)
 | 
			
		||||
 | 
			
		||||
	// Try to reject an already-approved account.
 | 
			
		||||
	_, err := suite.adminProcessor.AccountReject(
 | 
			
		||||
		ctx,
 | 
			
		||||
		adminAcct,
 | 
			
		||||
		targetAcct.ID,
 | 
			
		||||
		privateComment,
 | 
			
		||||
		sendEmail,
 | 
			
		||||
		message,
 | 
			
		||||
	)
 | 
			
		||||
	suite.EqualError(err, "account 01F8MH1H7YV1Z7D2C8K2730QBF has already been approved")
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestAdminRejectTestSuite(t *testing.T) {
 | 
			
		||||
	suite.Run(t, new(AdminRejectTestSuite))
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										272
									
								
								internal/processing/admin/accounts.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										272
									
								
								internal/processing/admin/accounts.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,272 @@
 | 
			
		||||
// GoToSocial
 | 
			
		||||
// Copyright (C) GoToSocial Authors admin@gotosocial.org
 | 
			
		||||
// SPDX-License-Identifier: AGPL-3.0-or-later
 | 
			
		||||
//
 | 
			
		||||
// This program is free software: you can redistribute it and/or modify
 | 
			
		||||
// it under the terms of the GNU Affero General Public License as published by
 | 
			
		||||
// the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
// (at your option) any later version.
 | 
			
		||||
//
 | 
			
		||||
// This program is distributed in the hope that it will be useful,
 | 
			
		||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
// GNU Affero General Public License for more details.
 | 
			
		||||
//
 | 
			
		||||
// You should have received a copy of the GNU Affero General Public License
 | 
			
		||||
// along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
 | 
			
		||||
package admin
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"net/netip"
 | 
			
		||||
	"net/url"
 | 
			
		||||
	"slices"
 | 
			
		||||
 | 
			
		||||
	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | 
			
		||||
	apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/db"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/gtserror"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/log"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/paging"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var (
 | 
			
		||||
	accountsValidOrigins     = []string{"local", "remote"}
 | 
			
		||||
	accountsValidStatuses    = []string{"active", "pending", "disabled", "silenced", "suspended"}
 | 
			
		||||
	accountsValidPermissions = []string{"staff"}
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func (p *Processor) AccountsGet(
 | 
			
		||||
	ctx context.Context,
 | 
			
		||||
	request *apimodel.AdminGetAccountsRequest,
 | 
			
		||||
	page *paging.Page,
 | 
			
		||||
) (
 | 
			
		||||
	*apimodel.PageableResponse,
 | 
			
		||||
	gtserror.WithCode,
 | 
			
		||||
) {
 | 
			
		||||
	// Validate "origin".
 | 
			
		||||
	if v := request.Origin; v != "" {
 | 
			
		||||
		if !slices.Contains(accountsValidOrigins, v) {
 | 
			
		||||
			err := fmt.Errorf(
 | 
			
		||||
				"origin %s not recognized; valid choices are %+v",
 | 
			
		||||
				v, accountsValidOrigins,
 | 
			
		||||
			)
 | 
			
		||||
			return nil, gtserror.NewErrorBadRequest(err, err.Error())
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Validate "status".
 | 
			
		||||
	if v := request.Status; v != "" {
 | 
			
		||||
		if !slices.Contains(accountsValidStatuses, v) {
 | 
			
		||||
			err := fmt.Errorf(
 | 
			
		||||
				"status %s not recognized; valid choices are %+v",
 | 
			
		||||
				v, accountsValidStatuses,
 | 
			
		||||
			)
 | 
			
		||||
			return nil, gtserror.NewErrorBadRequest(err, err.Error())
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Validate "permissions".
 | 
			
		||||
	if v := request.Permissions; v != "" {
 | 
			
		||||
		if !slices.Contains(accountsValidPermissions, v) {
 | 
			
		||||
			err := fmt.Errorf(
 | 
			
		||||
				"permissions %s not recognized; valid choices are %+v",
 | 
			
		||||
				v, accountsValidPermissions,
 | 
			
		||||
			)
 | 
			
		||||
			return nil, gtserror.NewErrorBadRequest(err, err.Error())
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Validate/parse IP.
 | 
			
		||||
	var ip netip.Addr
 | 
			
		||||
	if v := request.IP; v != "" {
 | 
			
		||||
		var err error
 | 
			
		||||
		ip, err = netip.ParseAddr(request.IP)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			err := fmt.Errorf("invalid ip provided: %w", err)
 | 
			
		||||
			return nil, gtserror.NewErrorBadRequest(err, err.Error())
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Get accounts with the given params.
 | 
			
		||||
	accounts, err := p.state.DB.GetAccounts(
 | 
			
		||||
		ctx,
 | 
			
		||||
		request.Origin,
 | 
			
		||||
		request.Status,
 | 
			
		||||
		func() bool { return request.Permissions == "staff" }(),
 | 
			
		||||
		request.InvitedBy,
 | 
			
		||||
		request.Username,
 | 
			
		||||
		request.DisplayName,
 | 
			
		||||
		request.ByDomain,
 | 
			
		||||
		request.Email,
 | 
			
		||||
		ip,
 | 
			
		||||
		page,
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil && !errors.Is(err, db.ErrNoEntries) {
 | 
			
		||||
		err = gtserror.Newf("db error getting accounts: %w", err)
 | 
			
		||||
		return nil, gtserror.NewErrorInternalError(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	count := len(accounts)
 | 
			
		||||
	if count == 0 {
 | 
			
		||||
		return paging.EmptyResponse(), nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	hi := accounts[count-1].ID
 | 
			
		||||
	lo := accounts[0].ID
 | 
			
		||||
 | 
			
		||||
	items := make([]interface{}, 0, count)
 | 
			
		||||
	for _, account := range accounts {
 | 
			
		||||
		apiAccount, err := p.converter.AccountToAdminAPIAccount(ctx, account)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			log.Errorf(ctx, "error converting to api account: %v", err)
 | 
			
		||||
			continue
 | 
			
		||||
		}
 | 
			
		||||
		items = append(items, apiAccount)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Return packaging + paging appropriate for
 | 
			
		||||
	// the API version used to call this function.
 | 
			
		||||
	switch request.APIVersion {
 | 
			
		||||
	case 1:
 | 
			
		||||
		return packageAccountsV1(items, lo, hi, request, page)
 | 
			
		||||
 | 
			
		||||
	case 2:
 | 
			
		||||
		return packageAccountsV2(items, lo, hi, request, page)
 | 
			
		||||
 | 
			
		||||
	default:
 | 
			
		||||
		log.Panic(ctx, "api version was neither 1 nor 2")
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func packageAccountsV1(
 | 
			
		||||
	items []interface{},
 | 
			
		||||
	loID, hiID string,
 | 
			
		||||
	request *apimodel.AdminGetAccountsRequest,
 | 
			
		||||
	page *paging.Page,
 | 
			
		||||
) (*apimodel.PageableResponse, gtserror.WithCode) {
 | 
			
		||||
	queryParams := make(url.Values, 8)
 | 
			
		||||
 | 
			
		||||
	// Translate origin to v1.
 | 
			
		||||
	if v := request.Origin; v != "" {
 | 
			
		||||
		var k string
 | 
			
		||||
 | 
			
		||||
		if v == "local" {
 | 
			
		||||
			k = apiutil.LocalKey
 | 
			
		||||
		} else {
 | 
			
		||||
			k = apiutil.AdminRemoteKey
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		queryParams.Add(k, "true")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Translate status to v1.
 | 
			
		||||
	if v := request.Status; v != "" {
 | 
			
		||||
		var k string
 | 
			
		||||
 | 
			
		||||
		switch v {
 | 
			
		||||
		case "active":
 | 
			
		||||
			k = apiutil.AdminActiveKey
 | 
			
		||||
		case "pending":
 | 
			
		||||
			k = apiutil.AdminPendingKey
 | 
			
		||||
		case "disabled":
 | 
			
		||||
			k = apiutil.AdminDisabledKey
 | 
			
		||||
		case "silenced":
 | 
			
		||||
			k = apiutil.AdminSilencedKey
 | 
			
		||||
		case "suspended":
 | 
			
		||||
			k = apiutil.AdminSuspendedKey
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		queryParams.Add(k, "true")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.Username; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.UsernameKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.DisplayName; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminDisplayNameKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.ByDomain; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminByDomainKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.Email; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminEmailKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.IP; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminIPKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Translate permissions to v1.
 | 
			
		||||
	if v := request.Permissions; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminStaffKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return paging.PackageResponse(paging.ResponseParams{
 | 
			
		||||
		Items: items,
 | 
			
		||||
		Path:  "/api/v1/admin/accounts",
 | 
			
		||||
		Next:  page.Next(loID, hiID),
 | 
			
		||||
		Prev:  page.Prev(loID, hiID),
 | 
			
		||||
		Query: queryParams,
 | 
			
		||||
	}), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func packageAccountsV2(
 | 
			
		||||
	items []interface{},
 | 
			
		||||
	loID, hiID string,
 | 
			
		||||
	request *apimodel.AdminGetAccountsRequest,
 | 
			
		||||
	page *paging.Page,
 | 
			
		||||
) (*apimodel.PageableResponse, gtserror.WithCode) {
 | 
			
		||||
	queryParams := make(url.Values, 9)
 | 
			
		||||
 | 
			
		||||
	if v := request.Origin; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminOriginKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.Status; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminStatusKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.Permissions; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminPermissionsKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.InvitedBy; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminInvitedByKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.Username; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.UsernameKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.DisplayName; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminDisplayNameKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.ByDomain; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminByDomainKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.Email; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminEmailKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if v := request.IP; v != "" {
 | 
			
		||||
		queryParams.Add(apiutil.AdminIPKey, v)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return paging.PackageResponse(paging.ResponseParams{
 | 
			
		||||
		Items: items,
 | 
			
		||||
		Path:  "/api/v2/admin/accounts",
 | 
			
		||||
		Next:  page.Next(loID, hiID),
 | 
			
		||||
		Prev:  page.Prev(loID, hiID),
 | 
			
		||||
		Query: queryParams,
 | 
			
		||||
	}), nil
 | 
			
		||||
}
 | 
			
		||||
@@ -33,6 +33,7 @@ import (
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/processing/account"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/state"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/typeutils"
 | 
			
		||||
	"github.com/superseriousbusiness/gotosocial/internal/util"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// clientAPI wraps processing functions
 | 
			
		||||
@@ -141,6 +142,10 @@ func (p *Processor) ProcessFromClientAPI(ctx context.Context, cMsg messages.From
 | 
			
		||||
		// ACCEPT FOLLOW (request)
 | 
			
		||||
		case ap.ActivityFollow:
 | 
			
		||||
			return p.clientAPI.AcceptFollow(ctx, cMsg)
 | 
			
		||||
 | 
			
		||||
		// ACCEPT PROFILE/ACCOUNT (sign-up)
 | 
			
		||||
		case ap.ObjectProfile, ap.ActorPerson:
 | 
			
		||||
			return p.clientAPI.AcceptAccount(ctx, cMsg)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	// REJECT SOMETHING
 | 
			
		||||
@@ -150,6 +155,10 @@ func (p *Processor) ProcessFromClientAPI(ctx context.Context, cMsg messages.From
 | 
			
		||||
		// REJECT FOLLOW (request)
 | 
			
		||||
		case ap.ActivityFollow:
 | 
			
		||||
			return p.clientAPI.RejectFollowRequest(ctx, cMsg)
 | 
			
		||||
 | 
			
		||||
		// REJECT PROFILE/ACCOUNT (sign-up)
 | 
			
		||||
		case ap.ObjectProfile, ap.ActorPerson:
 | 
			
		||||
			return p.clientAPI.RejectAccount(ctx, cMsg)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	// UNDO SOMETHING
 | 
			
		||||
@@ -685,3 +694,66 @@ func (p *clientAPI) MoveAccount(ctx context.Context, cMsg messages.FromClientAPI
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (p *clientAPI) AcceptAccount(ctx context.Context, cMsg messages.FromClientAPI) error {
 | 
			
		||||
	newUser, ok := cMsg.GTSModel.(*gtsmodel.User)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return gtserror.Newf("%T not parseable as *gtsmodel.User", cMsg.GTSModel)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Mark user as approved + clear sign-up IP.
 | 
			
		||||
	newUser.Approved = util.Ptr(true)
 | 
			
		||||
	newUser.SignUpIP = nil
 | 
			
		||||
	if err := p.state.DB.UpdateUser(ctx, newUser, "approved", "sign_up_ip"); err != nil {
 | 
			
		||||
		// Error now means we should return without
 | 
			
		||||
		// sending email + let admin try to approve again.
 | 
			
		||||
		return gtserror.Newf("db error updating user %s: %w", newUser.ID, err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Send "your sign-up has been approved" email to the new user.
 | 
			
		||||
	if err := p.surface.emailUserSignupApproved(ctx, newUser); err != nil {
 | 
			
		||||
		log.Errorf(ctx, "error emailing: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (p *clientAPI) RejectAccount(ctx context.Context, cMsg messages.FromClientAPI) error {
 | 
			
		||||
	deniedUser, ok := cMsg.GTSModel.(*gtsmodel.DeniedUser)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return gtserror.Newf("%T not parseable as *gtsmodel.DeniedUser", cMsg.GTSModel)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Remove the account.
 | 
			
		||||
	if err := p.state.DB.DeleteAccount(ctx, cMsg.TargetAccount.ID); err != nil {
 | 
			
		||||
		log.Errorf(ctx,
 | 
			
		||||
			"db error deleting account %s: %v",
 | 
			
		||||
			cMsg.TargetAccount.ID, err,
 | 
			
		||||
		)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Remove the user.
 | 
			
		||||
	if err := p.state.DB.DeleteUserByID(ctx, deniedUser.ID); err != nil {
 | 
			
		||||
		log.Errorf(ctx,
 | 
			
		||||
			"db error deleting user %s: %v",
 | 
			
		||||
			deniedUser.ID, err,
 | 
			
		||||
		)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Store the deniedUser entry.
 | 
			
		||||
	if err := p.state.DB.PutDeniedUser(ctx, deniedUser); err != nil {
 | 
			
		||||
		log.Errorf(ctx,
 | 
			
		||||
			"db error putting denied user %s: %v",
 | 
			
		||||
			deniedUser.ID, err,
 | 
			
		||||
		)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if *deniedUser.SendEmail {
 | 
			
		||||
		// Send "your sign-up has been rejected" email to the denied user.
 | 
			
		||||
		if err := p.surface.emailUserSignupRejected(ctx, deniedUser); err != nil {
 | 
			
		||||
			log.Errorf(ctx, "error emailing: %v", err)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -129,6 +129,69 @@ func (s *surface) emailUserPleaseConfirm(ctx context.Context, user *gtsmodel.Use
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// emailUserSignupApproved emails the given user
 | 
			
		||||
// to inform them their sign-up has been approved.
 | 
			
		||||
func (s *surface) emailUserSignupApproved(ctx context.Context, user *gtsmodel.User) error {
 | 
			
		||||
	// User may have been approved without
 | 
			
		||||
	// their email address being confirmed
 | 
			
		||||
	// yet. Just send to whatever we have.
 | 
			
		||||
	emailAddr := user.Email
 | 
			
		||||
	if emailAddr == "" {
 | 
			
		||||
		emailAddr = user.UnconfirmedEmail
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	instance, err := s.state.DB.GetInstance(ctx, config.GetHost())
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return gtserror.Newf("db error getting instance: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Assemble email contents and send the email.
 | 
			
		||||
	if err := s.emailSender.SendSignupApprovedEmail(
 | 
			
		||||
		emailAddr,
 | 
			
		||||
		email.SignupApprovedData{
 | 
			
		||||
			Username:     user.Account.Username,
 | 
			
		||||
			InstanceURL:  instance.URI,
 | 
			
		||||
			InstanceName: instance.Title,
 | 
			
		||||
		},
 | 
			
		||||
	); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Email sent, update the user
 | 
			
		||||
	// entry with the emailed time.
 | 
			
		||||
	now := time.Now()
 | 
			
		||||
	user.LastEmailedAt = now
 | 
			
		||||
 | 
			
		||||
	if err := s.state.DB.UpdateUser(
 | 
			
		||||
		ctx,
 | 
			
		||||
		user,
 | 
			
		||||
		"last_emailed_at",
 | 
			
		||||
	); err != nil {
 | 
			
		||||
		return gtserror.Newf("error updating user entry after email sent: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// emailUserSignupApproved emails the given user
 | 
			
		||||
// to inform them their sign-up has been approved.
 | 
			
		||||
func (s *surface) emailUserSignupRejected(ctx context.Context, deniedUser *gtsmodel.DeniedUser) error {
 | 
			
		||||
	instance, err := s.state.DB.GetInstance(ctx, config.GetHost())
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return gtserror.Newf("db error getting instance: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Assemble email contents and send the email.
 | 
			
		||||
	return s.emailSender.SendSignupRejectedEmail(
 | 
			
		||||
		deniedUser.Email,
 | 
			
		||||
		email.SignupRejectedData{
 | 
			
		||||
			Message:      deniedUser.Message,
 | 
			
		||||
			InstanceURL:  instance.URI,
 | 
			
		||||
			InstanceName: instance.Title,
 | 
			
		||||
		},
 | 
			
		||||
	)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// emailAdminReportOpened emails all active moderators/admins
 | 
			
		||||
// of this instance that a new report has been created.
 | 
			
		||||
func (s *surface) emailAdminReportOpened(ctx context.Context, report *gtsmodel.Report) error {
 | 
			
		||||
@@ -193,7 +256,7 @@ func (s *surface) emailAdminNewSignup(ctx context.Context, newUser *gtsmodel.Use
 | 
			
		||||
		SignupEmail:    newUser.UnconfirmedEmail,
 | 
			
		||||
		SignupUsername: newUser.Account.Username,
 | 
			
		||||
		SignupReason:   newUser.Reason,
 | 
			
		||||
		SignupURL:      "TODO",
 | 
			
		||||
		SignupURL:      instance.URI + "/settings/admin/accounts/" + newUser.AccountID,
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := s.emailSender.SendNewSignupEmail(toAddresses, newSignupData); err != nil {
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user