require_dependency 'user_destroyer' require_dependency 'admin_user_index_query' require_dependency 'boost_trust_level' class Admin::UsersController < Admin::AdminController before_filter :fetch_user, only: [:ban, :unban, :refresh_browsers, :revoke_admin, :grant_admin, :revoke_moderation, :grant_moderation, :approve, :activate, :deactivate, :block, :unblock, :trust_level, :generate_api_key, :revoke_api_key] def index query = ::AdminUserIndexQuery.new(params) render_serialized(query.find_users, AdminUserSerializer) end def show @user = User.where(username_lower: params[:id]).first raise Discourse::NotFound.new unless @user render_serialized(@user, AdminDetailedUserSerializer, root: false) end def delete_all_posts @user = User.where(id: params[:user_id]).first @user.delete_all_posts!(guardian) render nothing: true end def ban guardian.ensure_can_ban!(@user) @user.banned_till = params[:duration].to_i.days.from_now @user.banned_at = DateTime.now @user.save! # TODO logging render nothing: true end def unban guardian.ensure_can_ban!(@user) @user.banned_till = nil @user.banned_at = nil @user.save! # TODO logging render nothing: true end def refresh_browsers MessageBus.publish "/file-change", ["refresh"], user_ids: [@user.id] render nothing: true end def revoke_admin guardian.ensure_can_revoke_admin!(@user) @user.revoke_admin! render nothing: true end def generate_api_key api_key = @user.generate_api_key(current_user) render_serialized(api_key, ApiKeySerializer) end def revoke_api_key @user.revoke_api_key render nothing: true end def grant_admin guardian.ensure_can_grant_admin!(@user) @user.grant_admin! render_serialized(@user, AdminUserSerializer) end def revoke_moderation guardian.ensure_can_revoke_moderation!(@user) @user.revoke_moderation! render nothing: true end def grant_moderation guardian.ensure_can_grant_moderation!(@user) @user.grant_moderation! render_serialized(@user, AdminUserSerializer) end def trust_level guardian.ensure_can_change_trust_level!(@user) logger = StaffActionLogger.new(current_user) BoostTrustLevel.new(user: @user, level: params[:level], logger: logger).save! render_serialized(@user, AdminUserSerializer) end def approve guardian.ensure_can_approve!(@user) @user.approve(current_user) render nothing: true end def approve_bulk User.where(id: params[:users]).each do |u| u.approve(current_user) if guardian.can_approve?(u) end render nothing: true end def activate guardian.ensure_can_activate!(@user) @user.activate render nothing: true end def deactivate guardian.ensure_can_deactivate!(@user) @user.deactivate render nothing: true end def block guardian.ensure_can_block_user! @user UserBlocker.block(@user, current_user) render nothing: true end def unblock guardian.ensure_can_unblock_user! @user UserBlocker.unblock(@user, current_user) render nothing: true end def reject_bulk d = UserDestroyer.new(current_user) success_count = 0 User.where(id: params[:users]).each do |u| success_count += 1 if guardian.can_delete_user?(u) and d.destroy(u, params.slice(:context)) rescue UserDestroyer::PostsExistError end render json: {success: success_count, failed: (params[:users].try(:size) || 0) - success_count} end def destroy user = User.where(id: params[:id]).first guardian.ensure_can_delete_user!(user) begin if UserDestroyer.new(current_user).destroy(user, params.slice(:delete_posts, :block_email, :block_urls, :block_ip, :context)) render json: {deleted: true} else render json: {deleted: false, user: AdminDetailedUserSerializer.new(user, root: false).as_json} end rescue UserDestroyer::PostsExistError raise Discourse::InvalidAccess.new("User #{user.username} has #{user.post_count} posts, so can't be deleted.") end end private def fetch_user @user = User.where(id: params[:user_id]).first end end