PeerTube/server/middlewares/validators/blocklist.ts

163 lines
5.3 KiB
TypeScript
Raw Normal View History

2019-07-25 16:23:44 +02:00
import { body, param } from 'express-validator'
import * as express from 'express'
import { logger } from '../../helpers/logger'
import { areValidationErrors } from './utils'
import { AccountBlocklistModel } from '../../models/account/account-blocklist'
import { isHostValid } from '../../helpers/custom-validators/servers'
import { ServerBlocklistModel } from '../../models/server/server-blocklist'
import { ServerModel } from '../../models/server/server'
2019-04-11 11:33:44 +02:00
import { WEBSERVER } from '../../initializers/constants'
2019-07-23 10:40:39 +02:00
import { doesAccountNameWithHostExist } from '../../helpers/middlewares'
2020-04-23 09:32:53 +02:00
import { getServerActor } from '@server/models/application/application'
const blockAccountValidator = [
body('accountName').exists().withMessage('Should have an account name with host'),
async (req: express.Request, res: express.Response, next: express.NextFunction) => {
logger.debug('Checking blockAccountByAccountValidator parameters', { parameters: req.body })
if (areValidationErrors(req, res)) return
2019-03-19 09:26:50 +01:00
if (!await doesAccountNameWithHostExist(req.body.accountName, res)) return
2019-03-19 10:35:15 +01:00
const user = res.locals.oauth.token.User
const accountToBlock = res.locals.account
if (user.Account.id === accountToBlock.id) {
res.status(409)
2020-05-14 16:56:15 +02:00
.json({ error: 'You cannot block yourself.' })
return
}
return next()
}
]
const unblockAccountByAccountValidator = [
param('accountName').exists().withMessage('Should have an account name with host'),
async (req: express.Request, res: express.Response, next: express.NextFunction) => {
logger.debug('Checking unblockAccountByAccountValidator parameters', { parameters: req.params })
if (areValidationErrors(req, res)) return
2019-03-19 09:26:50 +01:00
if (!await doesAccountNameWithHostExist(req.params.accountName, res)) return
2019-03-19 10:35:15 +01:00
const user = res.locals.oauth.token.User
const targetAccount = res.locals.account
2019-03-19 09:26:50 +01:00
if (!await doesUnblockAccountExist(user.Account.id, targetAccount.id, res)) return
return next()
}
]
const unblockAccountByServerValidator = [
param('accountName').exists().withMessage('Should have an account name with host'),
async (req: express.Request, res: express.Response, next: express.NextFunction) => {
logger.debug('Checking unblockAccountByServerValidator parameters', { parameters: req.params })
if (areValidationErrors(req, res)) return
2019-03-19 09:26:50 +01:00
if (!await doesAccountNameWithHostExist(req.params.accountName, res)) return
const serverActor = await getServerActor()
const targetAccount = res.locals.account
2019-03-19 09:26:50 +01:00
if (!await doesUnblockAccountExist(serverActor.Account.id, targetAccount.id, res)) return
return next()
}
]
const blockServerValidator = [
body('host').custom(isHostValid).withMessage('Should have a valid host'),
async (req: express.Request, res: express.Response, next: express.NextFunction) => {
logger.debug('Checking serverGetValidator parameters', { parameters: req.body })
if (areValidationErrors(req, res)) return
const host: string = req.body.host
2019-04-11 11:33:44 +02:00
if (host === WEBSERVER.HOST) {
return res.status(409)
2020-05-14 16:56:15 +02:00
.json({ error: 'You cannot block your own server.' })
}
2020-05-07 14:58:24 +02:00
const server = await ServerModel.loadOrCreateByHost(host)
res.locals.server = server
return next()
}
]
const unblockServerByAccountValidator = [
param('host').custom(isHostValid).withMessage('Should have an account name with host'),
async (req: express.Request, res: express.Response, next: express.NextFunction) => {
logger.debug('Checking unblockServerByAccountValidator parameters', { parameters: req.params })
if (areValidationErrors(req, res)) return
2019-03-19 10:35:15 +01:00
const user = res.locals.oauth.token.User
2019-03-19 09:26:50 +01:00
if (!await doesUnblockServerExist(user.Account.id, req.params.host, res)) return
return next()
}
]
const unblockServerByServerValidator = [
param('host').custom(isHostValid).withMessage('Should have an account name with host'),
async (req: express.Request, res: express.Response, next: express.NextFunction) => {
logger.debug('Checking unblockServerByServerValidator parameters', { parameters: req.params })
if (areValidationErrors(req, res)) return
const serverActor = await getServerActor()
2019-03-19 09:26:50 +01:00
if (!await doesUnblockServerExist(serverActor.Account.id, req.params.host, res)) return
return next()
}
]
// ---------------------------------------------------------------------------
export {
blockServerValidator,
blockAccountValidator,
unblockAccountByAccountValidator,
unblockServerByAccountValidator,
unblockAccountByServerValidator,
unblockServerByServerValidator
}
// ---------------------------------------------------------------------------
2019-03-19 09:26:50 +01:00
async function doesUnblockAccountExist (accountId: number, targetAccountId: number, res: express.Response) {
const accountBlock = await AccountBlocklistModel.loadByAccountAndTarget(accountId, targetAccountId)
if (!accountBlock) {
res.status(404)
2020-05-14 16:56:15 +02:00
.json({ error: 'Account block entry not found.' })
return false
}
res.locals.accountBlock = accountBlock
return true
}
2019-03-19 09:26:50 +01:00
async function doesUnblockServerExist (accountId: number, host: string, res: express.Response) {
const serverBlock = await ServerBlocklistModel.loadByAccountAndHost(accountId, host)
if (!serverBlock) {
res.status(404)
2020-05-14 16:56:15 +02:00
.json({ error: 'Server block entry not found.' })
return false
}
res.locals.serverBlock = serverBlock
return true
}