446 lines
16 KiB
Scala
446 lines
16 KiB
Scala
package controllers
|
|
|
|
import play.api.data._
|
|
import play.api.data.Forms._
|
|
import com.github.ghik.silencer.silent
|
|
import play.api.mvc._
|
|
|
|
import com.github.ghik.silencer.silent
|
|
import lila.api.{ BodyContext, Context }
|
|
import lila.app._
|
|
import lila.chat.Chat
|
|
import lila.common.{ EmailAddress, HTTPRequest, IpAddress }
|
|
import lila.mod.UserSearch
|
|
import lila.report.{ Suspect, Mod => AsMod }
|
|
import lila.security.{ FingerHash, Permission }
|
|
import lila.user.{ User => UserModel, Title }
|
|
import ornicar.scalalib.Zero
|
|
import views._
|
|
|
|
final class Mod(
|
|
env: Env,
|
|
reportC: => Report,
|
|
userC: => User
|
|
) extends LilaController(env) {
|
|
|
|
private def modApi = env.mod.api
|
|
private def modLogApi = env.mod.logApi
|
|
private def assessApi = env.mod.assessApi
|
|
|
|
def alt(username: String, v: Boolean) =
|
|
OAuthModBody(_.CloseAccount) { me =>
|
|
withSuspect(username) { sus =>
|
|
for {
|
|
inquiry <- env.report.api.inquiries ofModId me.id
|
|
_ <- modApi.setAlt(AsMod(me), sus, v)
|
|
_ <- (v && sus.user.enabled) ?? env.closeAccount(sus.user.id, self = false)
|
|
} yield (inquiry, sus).some
|
|
}
|
|
}(ctx =>
|
|
me => {
|
|
case (inquiry, suspect) => reportC.onInquiryClose(inquiry, me, suspect.some)(ctx)
|
|
}
|
|
)
|
|
|
|
def engine(username: String, v: Boolean) =
|
|
OAuthModBody(_.MarkEngine) { me =>
|
|
withSuspect(username) { sus =>
|
|
for {
|
|
inquiry <- env.report.api.inquiries ofModId me.id
|
|
_ <- modApi.setEngine(AsMod(me), sus, v)
|
|
} yield (inquiry, sus).some
|
|
}
|
|
}(ctx =>
|
|
me => {
|
|
case (inquiry, suspect) => reportC.onInquiryClose(inquiry, me, suspect.some)(ctx)
|
|
}
|
|
)
|
|
|
|
def publicChat = Secure(_.ChatTimeout) { implicit ctx => _ =>
|
|
env.mod.publicChat.all map {
|
|
case (tournamentsAndChats, simulsAndChats) =>
|
|
Ok(html.mod.publicChat(tournamentsAndChats, simulsAndChats))
|
|
}
|
|
}
|
|
|
|
def booster(username: String, v: Boolean) =
|
|
OAuthModBody(_.MarkBooster) { me =>
|
|
withSuspect(username) { prev =>
|
|
for {
|
|
inquiry <- env.report.api.inquiries ofModId me.id
|
|
suspect <- modApi.setBoost(AsMod(me), prev, v)
|
|
} yield (inquiry, suspect).some
|
|
}
|
|
}(ctx =>
|
|
me => {
|
|
case (inquiry, suspect) => reportC.onInquiryClose(inquiry, me, suspect.some)(ctx)
|
|
}
|
|
)
|
|
|
|
def troll(username: String, v: Boolean) =
|
|
OAuthModBody(_.Shadowban) { me =>
|
|
withSuspect(username) { prev =>
|
|
for {
|
|
inquiry <- env.report.api.inquiries ofModId me.id
|
|
suspect <- modApi.setTroll(AsMod(me), prev, v)
|
|
} yield (inquiry, suspect).some
|
|
}
|
|
}(ctx =>
|
|
me => {
|
|
case (inquiry, suspect) => reportC.onInquiryClose(inquiry, me, suspect.some)(ctx)
|
|
}
|
|
)
|
|
|
|
def warn(username: String, subject: String) =
|
|
OAuthModBody(_.ModMessage) { me =>
|
|
lila.message.ModPreset.bySubject(subject) ?? { preset =>
|
|
withSuspect(username) { prev =>
|
|
for {
|
|
inquiry <- env.report.api.inquiries ofModId me.id
|
|
suspect <- modApi.setTroll(AsMod(me), prev, prev.user.marks.troll)
|
|
thread <- env.message.api.sendPreset(me, suspect.user, preset)
|
|
_ <- env.mod.logApi.modMessage(thread.creatorId, thread.invitedId, thread.name)
|
|
} yield (inquiry, suspect).some
|
|
}
|
|
}
|
|
}(ctx =>
|
|
me => {
|
|
case (inquiry, suspect) => reportC.onInquiryClose(inquiry, me, suspect.some)(ctx)
|
|
}
|
|
)
|
|
|
|
def ipBan(username: String, v: Boolean) =
|
|
OAuthMod(_.IpBan) { _ => me =>
|
|
withSuspect(username) { sus =>
|
|
modApi.setBan(AsMod(me), sus, v) map some
|
|
}
|
|
}(actionResult(username))
|
|
|
|
def deletePmsAndChats(username: String) =
|
|
OAuthMod(_.Shadowban) { _ => _ =>
|
|
withSuspect(username) { sus =>
|
|
env.mod.publicChat.delete(sus) >>
|
|
env.message.api.deleteThreadsBy(sus.user) map some
|
|
}
|
|
}(actionResult(username))
|
|
|
|
def disableTwoFactor(username: String) = Secure(_.DisableTwoFactor) { implicit ctx => me =>
|
|
modApi.disableTwoFactor(me.id, username) >> userC.modZoneOrRedirect(username)
|
|
}
|
|
|
|
def closeAccount(username: String) =
|
|
OAuthMod(_.CloseAccount) { _ => me =>
|
|
env.user.repo named username flatMap {
|
|
_ ?? { user =>
|
|
modLogApi.closeAccount(me.id, user.id) >>
|
|
env.closeAccount(user.id, self = false) map some
|
|
}
|
|
}
|
|
}(actionResult(username))
|
|
|
|
def reopenAccount(username: String) =
|
|
OAuthMod(_.ReopenAccount) { _ => me =>
|
|
modApi.reopenAccount(me.id, username) map some
|
|
}(actionResult(username))
|
|
|
|
def reportban(username: String, v: Boolean) =
|
|
OAuthMod(_.ReportBan) { _ => me =>
|
|
withSuspect(username) { sus =>
|
|
modApi.setReportban(AsMod(me), sus, v) map some
|
|
}
|
|
}(actionResult(username))
|
|
|
|
def rankban(username: String, v: Boolean) =
|
|
OAuthMod(_.RemoveRanking) { _ => me =>
|
|
withSuspect(username) { sus =>
|
|
modApi.setRankban(AsMod(me), sus, v) map some
|
|
}
|
|
}(actionResult(username))
|
|
|
|
def impersonate(username: String) = Auth { implicit ctx => me =>
|
|
if (username == "-" && env.mod.impersonate.isImpersonated(me)) fuccess {
|
|
env.mod.impersonate.stop(me)
|
|
Redirect(routes.User.show(me.username))
|
|
} else if (isGranted(_.Impersonate)) OptionFuRedirect(env.user.repo named username) { user =>
|
|
env.mod.impersonate.start(me, user)
|
|
fuccess(routes.User.show(user.username))
|
|
} else notFound
|
|
}
|
|
|
|
def setTitle(username: String) = SecureBody(_.SetTitle) { implicit ctx => me =>
|
|
implicit def req = ctx.body
|
|
lila.user.DataForm.title.bindFromRequest.fold(
|
|
_ => fuccess(redirect(username, mod = true)),
|
|
title =>
|
|
modApi.setTitle(me.id, username, title map Title.apply) >>
|
|
env.security.automaticEmail.onTitleSet(username) >>-
|
|
env.user.lightUserApi.invalidate(UserModel normalize username) inject
|
|
redirect(username, mod = false)
|
|
)
|
|
}
|
|
|
|
def setEmail(username: String) = SecureBody(_.SetEmail) { implicit ctx => me =>
|
|
implicit def req = ctx.body
|
|
OptionFuResult(env.user.repo named username) { user =>
|
|
env.security.forms
|
|
.modEmail(user)
|
|
.bindFromRequest
|
|
.fold(
|
|
err => BadRequest(err.toString).fuccess,
|
|
rawEmail => {
|
|
val email = env.security.emailAddressValidator
|
|
.validate(EmailAddress(rawEmail)) err s"Invalid email ${rawEmail}"
|
|
modApi.setEmail(me.id, user.id, email.acceptable) inject redirect(user.username, mod = true)
|
|
}
|
|
)
|
|
}
|
|
}
|
|
|
|
def notifySlack(username: String) =
|
|
OAuthMod(_.ModNote) { _ => me =>
|
|
withSuspect(username) { sus =>
|
|
env.slack.api.userMod(user = sus.user, mod = me) map some
|
|
}
|
|
}(actionResult(username))
|
|
|
|
def log = Secure(_.ModLog) { implicit ctx => _ =>
|
|
modLogApi.recent map { html.mod.log(_) }
|
|
}
|
|
|
|
private def communications(username: String, priv: Boolean) =
|
|
Secure { perms =>
|
|
if (priv) perms.ViewPrivateComms else perms.Shadowban
|
|
} { implicit ctx => me =>
|
|
OptionFuOk(env.user.repo named username) { user =>
|
|
env.game.gameRepo
|
|
.recentPovsByUserFromSecondary(user, 80)
|
|
.mon(_.mod.comm.segment("recentPovs"))
|
|
.flatMap { povs =>
|
|
priv.?? {
|
|
env.chat.api.playerChat
|
|
.optionsByOrderedIds(povs.map(_.gameId).map(Chat.Id.apply))
|
|
.mon(_.mod.comm.segment("playerChats"))
|
|
} zip
|
|
priv.?? {
|
|
env.message.repo
|
|
.visibleOrDeletedByUser(user.id, 60)
|
|
.map {
|
|
_ filter (_ hasPostsWrittenBy user.id) take 30
|
|
}
|
|
.mon(_.mod.comm.segment("pms"))
|
|
} zip
|
|
(env.shutup.api getPublicLines user.id)
|
|
.mon(_.mod.comm.segment("publicChats")) zip
|
|
env.user.noteApi
|
|
.forMod(user.id)
|
|
.mon(_.mod.comm.segment("notes")) zip
|
|
env.mod.logApi
|
|
.userHistory(user.id)
|
|
.mon(_.mod.comm.segment("history")) zip
|
|
env.report.api.inquiries
|
|
.ofModId(me.id)
|
|
.mon(_.mod.comm.segment("inquiries")) map {
|
|
case chats ~ threads ~ publicLines ~ notes ~ history ~ inquiry =>
|
|
if (priv && !inquiry.??(_.isRecentCommOf(Suspect(user))))
|
|
env.slack.api.commlog(mod = me, user = user, inquiry.map(_.oldestAtom.by.value))
|
|
html.mod.communication(
|
|
user,
|
|
(povs zip chats) collect {
|
|
case (p, Some(c)) if c.nonEmpty => p -> c
|
|
} take 15,
|
|
threads,
|
|
publicLines,
|
|
notes.filter(_.from != "irwin"),
|
|
history,
|
|
priv
|
|
)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
def communicationPublic(username: String) = communications(username, false)
|
|
def communicationPrivate(username: String) = communications(username, true)
|
|
|
|
def ipIntel(ip: String) = Secure(_.IpBan) { _ => _ =>
|
|
env.security.ipIntel.failable(IpAddress(ip)).map { Ok(_) }.recover {
|
|
case e: Exception => InternalServerError(e.getMessage)
|
|
}
|
|
}
|
|
|
|
protected[controllers] def redirect(username: String, mod: Boolean = true) =
|
|
Redirect(userUrl(username, mod))
|
|
|
|
protected[controllers] def userUrl(username: String, mod: Boolean = true) =
|
|
s"${routes.User.show(username).url}${mod ?? "?mod"}"
|
|
|
|
def refreshUserAssess(username: String) = Secure(_.MarkEngine) { implicit ctx => me =>
|
|
OptionFuResult(env.user.repo named username) { user =>
|
|
assessApi.refreshAssessByUsername(username) >>
|
|
env.irwin.api.requests.fromMod(Suspect(user), AsMod(me)) >>
|
|
userC.renderModZoneActions(username)
|
|
}
|
|
}
|
|
|
|
def spontaneousInquiry(username: String) = Secure(_.SeeReport) { implicit ctx => me =>
|
|
OptionFuResult(env.user.repo named username) { user =>
|
|
env.report.api.inquiries.spontaneous(AsMod(me), Suspect(user)) inject redirect(user.username, true)
|
|
}
|
|
}
|
|
|
|
def gamify = Secure(_.SeeReport) { implicit ctx => _ =>
|
|
env.mod.gamify.leaderboards zip
|
|
env.mod.gamify.history(orCompute = true) map {
|
|
case (leaderboards, history) => Ok(html.mod.gamify.index(leaderboards, history))
|
|
}
|
|
}
|
|
def gamifyPeriod(@silent periodStr: String) = Secure(_.SeeReport) { implicit ctx => _ =>
|
|
lila.mod.Gamify.Period(periodStr).fold(notFound) { period =>
|
|
env.mod.gamify.leaderboards map { leaderboards =>
|
|
Ok(html.mod.gamify.period(leaderboards, period))
|
|
}
|
|
}
|
|
}
|
|
|
|
def search = SecureBody(_.UserSearch) { implicit ctx => _ =>
|
|
implicit def req = ctx.body
|
|
val f = UserSearch.form
|
|
f.bindFromRequest.fold(
|
|
err => BadRequest(html.mod.search(err, Nil)).fuccess,
|
|
query => env.mod.search(query) map { html.mod.search(f.fill(query), _) }
|
|
)
|
|
}
|
|
|
|
protected[controllers] def searchTerm(q: String)(implicit ctx: Context) = {
|
|
val query = UserSearch exact q
|
|
env.mod.search(query) map { users =>
|
|
Ok(html.mod.search(UserSearch.form fill query, users))
|
|
}
|
|
}
|
|
|
|
def print(fh: String) = SecureBody(_.PrintBan) { implicit ctx => _ =>
|
|
val hash = FingerHash(fh)
|
|
for {
|
|
uids <- env.security.api recentUserIdsByFingerHash hash
|
|
users <- env.user.repo usersFromSecondary uids.reverse
|
|
withEmails <- env.user.repo withEmailsU users
|
|
uas <- env.security.api.printUas(hash)
|
|
} yield Ok(html.mod.search.print(hash, withEmails, uas, env.security.printBan blocks hash))
|
|
}
|
|
|
|
def printBan(v: Boolean, fh: String) = Secure(_.PrintBan) { _ => _ =>
|
|
env.security.printBan.toggle(FingerHash(fh), v) inject
|
|
Redirect(routes.Mod.print(fh))
|
|
}
|
|
|
|
def chatUser(username: String) = Secure(_.ChatTimeout) { implicit ctx => _ =>
|
|
implicit val lightUser = env.user.lightUserSync
|
|
JsonOptionOk {
|
|
env.chat.api.userChat userModInfo username map2 lila.chat.JsonView.userModInfo
|
|
}
|
|
}
|
|
|
|
def permissions(username: String) = Secure(_.ChangePermission) { implicit ctx => _ =>
|
|
OptionOk(env.user.repo named username) { user =>
|
|
html.mod.permissions(user)
|
|
}
|
|
}
|
|
|
|
def savePermissions(username: String) = SecureBody(_.ChangePermission) { implicit ctx => me =>
|
|
implicit def req = ctx.body
|
|
import lila.security.Permission
|
|
OptionFuResult(env.user.repo named username) { user =>
|
|
Form(
|
|
single(
|
|
"permissions" -> list(text.verifying { str =>
|
|
Permission.allButSuperAdmin.exists(_.name == str)
|
|
})
|
|
)
|
|
).bindFromRequest.fold(
|
|
_ => BadRequest(html.mod.permissions(user)).fuccess,
|
|
permissions =>
|
|
modApi.setPermissions(AsMod(me), user.username, Permission(permissions)) >> {
|
|
(Permission(permissions) diff Permission(user.roles) contains Permission.Coach) ??
|
|
env.security.automaticEmail.onBecomeCoach(user)
|
|
} >> {
|
|
Permission(permissions).exists(_ is Permission.SeeReport) ?? env.plan.api.setLifetime(user)
|
|
} inject redirect(user.username, true)
|
|
)
|
|
}
|
|
}
|
|
|
|
def emailConfirm = SecureBody(_.SetEmail) { implicit ctx => me =>
|
|
get("q") match {
|
|
case None => Ok(html.mod.emailConfirm("", none, none)).fuccess
|
|
case Some(rawQuery) =>
|
|
val query = rawQuery.trim.split(' ').toList
|
|
val email = query.headOption
|
|
.map(EmailAddress.apply) flatMap env.security.emailAddressValidator.validate
|
|
val username = query lift 1
|
|
def tryWith(setEmail: EmailAddress, q: String): Fu[Option[Result]] =
|
|
env.mod.search(UserSearch.exact(q)) flatMap {
|
|
case List(UserModel.WithEmails(user, _)) =>
|
|
(!user.everLoggedIn).?? {
|
|
lila.mon.user.register.modConfirmEmail.increment()
|
|
modApi.setEmail(me.id, user.id, setEmail)
|
|
} >>
|
|
env.user.repo.email(user.id) map { email =>
|
|
Ok(html.mod.emailConfirm("", user.some, email)).some
|
|
}
|
|
case _ => fuccess(none)
|
|
}
|
|
email.?? { em =>
|
|
tryWith(em.acceptable, em.acceptable.value) orElse {
|
|
username ?? { tryWith(em.acceptable, _) }
|
|
}
|
|
} getOrElse BadRequest(html.mod.emailConfirm(rawQuery, none, none)).fuccess
|
|
}
|
|
}
|
|
|
|
def chatPanic = Secure(_.Shadowban) { implicit ctx => _ =>
|
|
Ok(html.mod.chatPanic(env.chat.panic.get)).fuccess
|
|
}
|
|
|
|
def chatPanicPost =
|
|
OAuthMod(_.Shadowban) { req => me =>
|
|
val v = getBool("v", req)
|
|
env.chat.panic.set(v)
|
|
env.slack.api.chatPanic(me, v)
|
|
fuccess(().some)
|
|
}(_ => _ => _ => Redirect(routes.Mod.chatPanic).fuccess)
|
|
|
|
def eventStream = OAuthSecure(_.Admin) { _ => _ =>
|
|
noProxyBuffer(Ok.chunked(env.mod.stream())).fuccess
|
|
}
|
|
|
|
private def withSuspect[A](username: String)(f: Suspect => Fu[A])(implicit zero: Zero[A]): Fu[A] =
|
|
env.report.api getSuspect username flatMap {
|
|
_ ?? f
|
|
}
|
|
|
|
private def OAuthMod[A](perm: Permission.Selector)(f: RequestHeader => UserModel => Fu[Option[A]])(
|
|
secure: Context => UserModel => A => Fu[Result]
|
|
): Action[Unit] = SecureOrScoped(perm)(
|
|
secure = ctx => me => f(ctx.req)(me) flatMap { _ ?? secure(ctx)(me) },
|
|
scoped = req =>
|
|
me =>
|
|
f(req)(me) flatMap { res =>
|
|
res.isDefined ?? fuccess(jsonOkResult)
|
|
}
|
|
)
|
|
private def OAuthModBody[A](perm: Permission.Selector)(f: UserModel => Fu[Option[A]])(
|
|
secure: BodyContext[_] => UserModel => A => Fu[Result]
|
|
): Action[AnyContent] = SecureOrScopedBody(perm)(
|
|
secure = ctx => me => f(me) flatMap { _ ?? secure(ctx)(me) },
|
|
scoped = _ =>
|
|
me =>
|
|
f(me) flatMap { res =>
|
|
res.isDefined ?? fuccess(jsonOkResult)
|
|
}
|
|
)
|
|
|
|
private def actionResult(username: String)(ctx: Context)(@silent user: UserModel)(@silent res: Any) =
|
|
if (HTTPRequest isSynchronousHttp ctx.req) fuccess(redirect(username))
|
|
else userC.renderModZoneActions(username)(ctx)
|
|
}
|