// GoToSocial // Copyright (C) GoToSocial Authors admin@gotosocial.org // SPDX-License-Identifier: AGPL-3.0-or-later // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . package admin import ( "errors" "fmt" "net/http" "github.com/gin-gonic/gin" apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util" "github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/oauth" "github.com/superseriousbusiness/gotosocial/internal/paging" ) // DomainPermissionDraftsGETHandler swagger:operation GET /api/v1/admin/domain_permission_drafts domainPermissionDraftsGet // // View domain permission drafts. // // The drafts will be returned in descending chronological order (newest first), with sequential IDs (bigger = newer). // // The next and previous queries can be parsed from the returned Link header. // // Example: // // ``` // ; rel="next", ; rel="prev" // ```` // // --- // tags: // - admin // // produces: // - application/json // // parameters: // - // name: subscription_id // type: string // description: Show only drafts created by the given subscription ID. // in: query // - // name: domain // type: string // description: Return only drafts that target the given domain. // in: query // - // name: permission_type // type: string // description: Filter on "block" or "allow" type drafts. // in: query // - // name: max_id // type: string // description: >- // Return only items *OLDER* than the given max ID (for paging downwards). // The item with the specified ID will not be included in the response. // in: query // - // name: since_id // type: string // description: >- // Return only items *NEWER* than the given since ID. // The item with the specified ID will not be included in the response. // in: query // - // name: min_id // type: string // description: >- // Return only items immediately *NEWER* than the given min ID (for paging upwards). // The item with the specified ID will not be included in the response. // in: query // - // name: limit // type: integer // description: Number of items to return. // default: 20 // minimum: 1 // maximum: 100 // in: query // // security: // - OAuth2 Bearer: // - admin // // responses: // '200': // description: Domain permission drafts. // schema: // type: array // items: // "$ref": "#/definitions/domainPermission" // headers: // Link: // type: string // description: Links to the next and previous queries. // '400': // description: bad request // '401': // description: unauthorized // '403': // description: forbidden // '404': // description: not found // '406': // description: not acceptable // '500': // description: internal server error func (m *Module) DomainPermissionDraftsGETHandler(c *gin.Context) { authed, err := oauth.Authed(c, true, true, true, true) if err != nil { apiutil.ErrorHandler(c, gtserror.NewErrorUnauthorized(err, err.Error()), m.processor.InstanceGetV1) return } if !*authed.User.Admin { err := fmt.Errorf("user %s not an admin", authed.User.ID) apiutil.ErrorHandler(c, gtserror.NewErrorForbidden(err, err.Error()), m.processor.InstanceGetV1) return } if authed.Account.IsMoving() { apiutil.ForbiddenAfterMove(c) return } if _, err := apiutil.NegotiateAccept(c, apiutil.JSONAcceptHeaders...); err != nil { apiutil.ErrorHandler(c, gtserror.NewErrorNotAcceptable(err, err.Error()), m.processor.InstanceGetV1) return } permTypeStr := c.Query(apiutil.DomainPermissionPermTypeKey) permType := gtsmodel.ParseDomainPermissionType(permTypeStr) if permTypeStr != "" && permType == gtsmodel.DomainPermissionUnknown { text := fmt.Sprintf( "permission_type %s not recognized, valid values are empty string, block, or allow", permTypeStr, ) errWithCode := gtserror.NewErrorBadRequest(errors.New(text), text) apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) return } page, errWithCode := paging.ParseIDPage(c, 1, 200, 20) if errWithCode != nil { apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) return } resp, errWithCode := m.processor.Admin().DomainPermissionDraftsGet( c.Request.Context(), c.Query(apiutil.DomainPermissionSubscriptionIDKey), c.Query(apiutil.DomainPermissionDomainKey), permType, page, ) if errWithCode != nil { apiutil.ErrorHandler(c, errWithCode, m.processor.InstanceGetV1) return } if resp.LinkHeader != "" { c.Header("Link", resp.LinkHeader) } apiutil.JSON(c, http.StatusOK, resp.Items) }