183 lines
5.8 KiB
TypeScript
183 lines
5.8 KiB
TypeScript
/*
|
|
* Copyright (C) 2026 Fluxer Contributors
|
|
*
|
|
* This file is part of Fluxer.
|
|
*
|
|
* Fluxer is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Fluxer is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with Fluxer. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
import type {UserID} from '~/BrandedTypes';
|
|
import {createUserID} from '~/BrandedTypes';
|
|
import {deleteOneOrMany, fetchMany, fetchOne, upsertOne} from '~/database/Cassandra';
|
|
import type {AdminAuditLogRow, PendingVerificationRow} from '~/database/types/AdminArchiveTypes';
|
|
import {AdminAuditLogs, BannedEmails, BannedIps, BannedPhones, PendingVerifications} from '~/Tables';
|
|
import type {AdminAuditLog, IAdminRepository} from './IAdminRepository';
|
|
|
|
const FETCH_AUDIT_LOG_BY_ID_QUERY = AdminAuditLogs.select({
|
|
where: AdminAuditLogs.where.eq('log_id'),
|
|
});
|
|
|
|
const FETCH_AUDIT_LOGS_BY_IDS_QUERY = AdminAuditLogs.select({
|
|
where: AdminAuditLogs.where.in('log_id', 'log_ids'),
|
|
});
|
|
|
|
const IS_IP_BANNED_QUERY = BannedIps.select({
|
|
where: BannedIps.where.eq('ip'),
|
|
});
|
|
|
|
const LOAD_ALL_BANNED_IPS_QUERY = BannedIps.select();
|
|
|
|
const IS_EMAIL_BANNED_QUERY = BannedEmails.select({
|
|
where: BannedEmails.where.eq('email_lower'),
|
|
});
|
|
|
|
const IS_PHONE_BANNED_QUERY = BannedPhones.select({
|
|
where: BannedPhones.where.eq('phone'),
|
|
});
|
|
|
|
const createListAllAuditLogsPaginatedQuery = (limit: number) =>
|
|
AdminAuditLogs.select({
|
|
where: AdminAuditLogs.where.tokenGt('log_id', 'last_log_id'),
|
|
limit,
|
|
});
|
|
|
|
const createListAllAuditLogsFirstPageQuery = (limit: number) =>
|
|
AdminAuditLogs.select({
|
|
limit,
|
|
});
|
|
|
|
const createListPendingVerificationsQuery = (limit: number) =>
|
|
PendingVerifications.select({
|
|
limit,
|
|
});
|
|
|
|
export class AdminRepository implements IAdminRepository {
|
|
async createAuditLog(log: AdminAuditLogRow): Promise<AdminAuditLog> {
|
|
await upsertOne(AdminAuditLogs.insert(log));
|
|
return this.mapRowToAuditLog(log);
|
|
}
|
|
|
|
async getAuditLog(logId: bigint): Promise<AdminAuditLog | null> {
|
|
const row = await fetchOne<AdminAuditLogRow>(FETCH_AUDIT_LOG_BY_ID_QUERY.bind({log_id: logId}));
|
|
return row ? this.mapRowToAuditLog(row) : null;
|
|
}
|
|
|
|
async listAuditLogsByIds(logIds: Array<bigint>): Promise<Array<AdminAuditLog>> {
|
|
if (logIds.length === 0) {
|
|
return [];
|
|
}
|
|
|
|
const rows = await fetchMany<AdminAuditLogRow>(FETCH_AUDIT_LOGS_BY_IDS_QUERY.bind({log_ids: logIds}));
|
|
return rows.map((row) => this.mapRowToAuditLog(row));
|
|
}
|
|
|
|
async listAllAuditLogsPaginated(limit: number, lastLogId?: bigint): Promise<Array<AdminAuditLog>> {
|
|
let rows: Array<AdminAuditLogRow>;
|
|
|
|
if (lastLogId) {
|
|
const query = createListAllAuditLogsPaginatedQuery(limit);
|
|
rows = await fetchMany<AdminAuditLogRow>(query.bind({last_log_id: lastLogId}));
|
|
} else {
|
|
const query = createListAllAuditLogsFirstPageQuery(limit);
|
|
rows = await fetchMany<AdminAuditLogRow>(query.bind({}));
|
|
}
|
|
|
|
return rows.map((row) => this.mapRowToAuditLog(row));
|
|
}
|
|
|
|
async isIpBanned(ip: string): Promise<boolean> {
|
|
const result = await fetchOne<{ip: string}>(IS_IP_BANNED_QUERY.bind({ip}));
|
|
return !!result;
|
|
}
|
|
|
|
async banIp(ip: string): Promise<void> {
|
|
await upsertOne(BannedIps.insert({ip}));
|
|
}
|
|
|
|
async unbanIp(ip: string): Promise<void> {
|
|
await deleteOneOrMany(BannedIps.deleteByPk({ip}));
|
|
}
|
|
|
|
async listBannedIps(): Promise<Array<string>> {
|
|
const rows = await fetchMany<{ip: string}>(LOAD_ALL_BANNED_IPS_QUERY.bind({}));
|
|
return rows.map((row) => row.ip);
|
|
}
|
|
|
|
async loadAllBannedIps(): Promise<Set<string>> {
|
|
const rows = await fetchMany<{ip: string}>(LOAD_ALL_BANNED_IPS_QUERY.bind({}));
|
|
return new Set(rows.map((row) => row.ip));
|
|
}
|
|
|
|
async isEmailBanned(email: string): Promise<boolean> {
|
|
const emailLower = email.toLowerCase();
|
|
const result = await fetchOne<{email_lower: string}>(IS_EMAIL_BANNED_QUERY.bind({email_lower: emailLower}));
|
|
return !!result;
|
|
}
|
|
|
|
async banEmail(email: string): Promise<void> {
|
|
const emailLower = email.toLowerCase();
|
|
await upsertOne(BannedEmails.insert({email_lower: emailLower}));
|
|
}
|
|
|
|
async unbanEmail(email: string): Promise<void> {
|
|
const emailLower = email.toLowerCase();
|
|
await deleteOneOrMany(BannedEmails.deleteByPk({email_lower: emailLower}));
|
|
}
|
|
|
|
async isPhoneBanned(phone: string): Promise<boolean> {
|
|
const result = await fetchOne<{phone: string}>(IS_PHONE_BANNED_QUERY.bind({phone}));
|
|
return !!result;
|
|
}
|
|
|
|
async banPhone(phone: string): Promise<void> {
|
|
await upsertOne(BannedPhones.insert({phone}));
|
|
}
|
|
|
|
async unbanPhone(phone: string): Promise<void> {
|
|
await deleteOneOrMany(BannedPhones.deleteByPk({phone}));
|
|
}
|
|
|
|
async listPendingVerifications(
|
|
limit = 100,
|
|
): Promise<Array<{userId: UserID; createdAt: Date; metadata: Map<string, string>}>> {
|
|
const query = createListPendingVerificationsQuery(limit);
|
|
const rows = await fetchMany<PendingVerificationRow>(query.bind({}));
|
|
|
|
return rows
|
|
.sort((a, b) => (a.user_id < b.user_id ? -1 : 1))
|
|
.map((row) => ({
|
|
userId: createUserID(row.user_id),
|
|
createdAt: row.created_at,
|
|
metadata: row.metadata ?? new Map(),
|
|
}));
|
|
}
|
|
|
|
async removePendingVerification(userId: UserID): Promise<void> {
|
|
await deleteOneOrMany(PendingVerifications.deleteByPk({user_id: userId}));
|
|
}
|
|
|
|
private mapRowToAuditLog(row: AdminAuditLogRow): AdminAuditLog {
|
|
return {
|
|
logId: row.log_id,
|
|
adminUserId: createUserID(row.admin_user_id),
|
|
targetType: row.target_type,
|
|
targetId: row.target_id,
|
|
action: row.action,
|
|
auditLogReason: row.audit_log_reason,
|
|
metadata: row.metadata || new Map(),
|
|
createdAt: row.created_at,
|
|
};
|
|
}
|
|
}
|