e05735265b
Closes #827 Signed-off-by: Thomas Citharel <tcit@tcit.fr>
419 lines
13 KiB
Elixir
419 lines
13 KiB
Elixir
defmodule Mobilizon.GraphQL.Resolvers.Event do
|
|
@moduledoc """
|
|
Handles the event-related GraphQL calls.
|
|
"""
|
|
|
|
alias Mobilizon.{Actors, Admin, Events, Users}
|
|
alias Mobilizon.Actors.Actor
|
|
alias Mobilizon.Config
|
|
alias Mobilizon.Events.{Event, EventParticipantStats}
|
|
alias Mobilizon.Users.User
|
|
|
|
alias Mobilizon.GraphQL.API
|
|
|
|
alias Mobilizon.Federation.ActivityPub.Activity
|
|
alias Mobilizon.Federation.ActivityPub.Permission
|
|
import Mobilizon.Users.Guards, only: [is_moderator: 1]
|
|
import Mobilizon.Web.Gettext
|
|
import Mobilizon.GraphQL.Resolvers.Event.Utils
|
|
|
|
# We limit the max number of events that can be retrieved
|
|
@event_max_limit 100
|
|
@number_of_related_events 3
|
|
|
|
def organizer_for_event(
|
|
%Event{attributed_to_id: attributed_to_id, organizer_actor_id: organizer_actor_id},
|
|
_args,
|
|
%{context: %{current_user: %User{role: user_role} = user}} = _resolution
|
|
)
|
|
when not is_nil(attributed_to_id) do
|
|
with %Actor{id: group_id} <- Actors.get_actor(attributed_to_id),
|
|
%Actor{id: actor_id} <- Users.get_actor_for_user(user),
|
|
{:member, true} <-
|
|
{:member, Actors.is_member?(actor_id, group_id) or is_moderator(user_role)},
|
|
%Actor{} = actor <- Actors.get_actor(organizer_actor_id) do
|
|
{:ok, actor}
|
|
else
|
|
_ -> {:ok, nil}
|
|
end
|
|
end
|
|
|
|
def organizer_for_event(
|
|
%Event{attributed_to_id: attributed_to_id},
|
|
_args,
|
|
_resolution
|
|
)
|
|
when not is_nil(attributed_to_id) do
|
|
case Actors.get_actor(attributed_to_id) do
|
|
%Actor{} -> {:ok, nil}
|
|
_ -> {:error, "Unable to get organizer actor"}
|
|
end
|
|
end
|
|
|
|
def organizer_for_event(
|
|
%Event{organizer_actor_id: organizer_actor_id},
|
|
_args,
|
|
_resolution
|
|
) do
|
|
case Actors.get_actor(organizer_actor_id) do
|
|
%Actor{} = actor -> {:ok, actor}
|
|
_ -> {:error, "Unable to get organizer actor"}
|
|
end
|
|
end
|
|
|
|
def list_events(
|
|
_parent,
|
|
%{page: page, limit: limit, order_by: order_by, direction: direction},
|
|
_resolution
|
|
)
|
|
when limit < @event_max_limit do
|
|
{:ok, Events.list_events(page, limit, order_by, direction)}
|
|
end
|
|
|
|
def list_events(_parent, %{page: _page, limit: _limit}, _resolution) do
|
|
{:error, :events_max_limit_reached}
|
|
end
|
|
|
|
defp find_private_event(
|
|
_parent,
|
|
%{uuid: uuid},
|
|
%{context: %{current_user: %User{} = user}} = _resolution
|
|
) do
|
|
%Actor{} = profile = Users.get_actor_for_user(user)
|
|
|
|
case Events.get_event_by_uuid_with_preload(uuid) do
|
|
# Event attributed to group
|
|
%Event{attributed_to: %Actor{}} = event ->
|
|
if Permission.can_access_group_object?(profile, event) do
|
|
{:ok, event}
|
|
else
|
|
{:error, :event_not_found}
|
|
end
|
|
|
|
# Own event
|
|
%Event{organizer_actor: %Actor{id: actor_id}} = event ->
|
|
if actor_id == profile.id do
|
|
{:ok, event}
|
|
else
|
|
{:error, :event_not_found}
|
|
end
|
|
|
|
_ ->
|
|
{:error, :event_not_found}
|
|
end
|
|
end
|
|
|
|
defp find_private_event(_parent, _args, _resolution) do
|
|
{:error, :event_not_found}
|
|
end
|
|
|
|
def find_event(parent, %{uuid: uuid} = args, %{context: context} = resolution) do
|
|
with {:has_event, %Event{} = event} <-
|
|
{:has_event, Events.get_public_event_by_uuid_with_preload(uuid)},
|
|
{:access_valid, true} <-
|
|
{:access_valid, Map.has_key?(context, :current_user) || check_event_access(event)} do
|
|
{:ok, event}
|
|
else
|
|
{:has_event, _} ->
|
|
find_private_event(parent, args, resolution)
|
|
|
|
{:access_valid, _} ->
|
|
{:error, :event_not_found}
|
|
end
|
|
end
|
|
|
|
@spec check_event_access(Event.t()) :: boolean()
|
|
defp check_event_access(%Event{local: true}), do: true
|
|
|
|
defp check_event_access(%Event{url: url}) do
|
|
relay_actor_id = Config.relay_actor_id()
|
|
Events.check_if_event_has_instance_follow(url, relay_actor_id)
|
|
end
|
|
|
|
@doc """
|
|
List participants for event (through an event request)
|
|
"""
|
|
def list_participants_for_event(
|
|
%Event{id: event_id} = event,
|
|
%{page: page, limit: limit, roles: roles},
|
|
%{context: %{current_user: %User{} = user}} = _resolution
|
|
) do
|
|
with %Actor{} = actor <- Users.get_actor_for_user(user),
|
|
# Check that moderator has right
|
|
{:event_can_be_managed, true} <-
|
|
{:event_can_be_managed, can_event_be_updated_by?(event, actor)} do
|
|
roles =
|
|
case roles do
|
|
nil ->
|
|
[]
|
|
|
|
"" ->
|
|
[]
|
|
|
|
roles ->
|
|
roles
|
|
|> String.split(",")
|
|
|> Enum.map(&String.downcase/1)
|
|
|> Enum.map(&String.to_existing_atom/1)
|
|
end
|
|
|
|
participants = Events.list_participants_for_event(event_id, roles, page, limit)
|
|
{:ok, participants}
|
|
else
|
|
{:event_can_be_managed, _} ->
|
|
{:error,
|
|
dgettext("errors", "Provided profile doesn't have moderator permissions on this event")}
|
|
end
|
|
end
|
|
|
|
def list_participants_for_event(_, _args, _resolution) do
|
|
{:ok, %{total: 0, elements: []}}
|
|
end
|
|
|
|
def stats_participants(
|
|
%Event{participant_stats: %EventParticipantStats{} = stats, id: event_id} = _event,
|
|
_args,
|
|
%{context: %{current_user: %User{id: user_id} = _user}} = _resolution
|
|
) do
|
|
if Events.is_user_moderator_for_event?(user_id, event_id) do
|
|
{:ok,
|
|
Map.put(
|
|
stats,
|
|
:going,
|
|
stats.participant + stats.moderator + stats.administrator + stats.creator
|
|
)}
|
|
else
|
|
{:ok, %{participant: stats.participant}}
|
|
end
|
|
end
|
|
|
|
def stats_participants(
|
|
%Event{participant_stats: %EventParticipantStats{participant: participant}},
|
|
_args,
|
|
_resolution
|
|
) do
|
|
{:ok, %EventParticipantStats{participant: participant}}
|
|
end
|
|
|
|
def stats_participants(_event, _args, _resolution) do
|
|
{:ok, %EventParticipantStats{}}
|
|
end
|
|
|
|
@doc """
|
|
List related events
|
|
"""
|
|
def list_related_events(
|
|
%Event{tags: tags, organizer_actor: organizer_actor, uuid: uuid},
|
|
_args,
|
|
_resolution
|
|
) do
|
|
# We get the organizer's next public event
|
|
events =
|
|
[Events.get_upcoming_public_event_for_actor(organizer_actor, uuid)]
|
|
|> Enum.filter(&is_map/1)
|
|
|
|
# We find similar events with the same tags
|
|
# uniq_by : It's possible event_from_same_actor is inside events_from_tags
|
|
events =
|
|
events
|
|
|> Enum.concat(Events.list_events_by_tags(tags, @number_of_related_events))
|
|
|> uniq_events()
|
|
|
|
# TODO: We should use tag_relations to find more appropriate events
|
|
|
|
# We've considered all recommended events, so we fetch the latest events
|
|
events =
|
|
if @number_of_related_events - length(events) > 0 do
|
|
events
|
|
|> Enum.concat(
|
|
Events.list_events(1, @number_of_related_events, :begins_on, :asc, true).elements
|
|
)
|
|
|> uniq_events()
|
|
else
|
|
events
|
|
end
|
|
|
|
events =
|
|
events
|
|
# We remove the same event from the results
|
|
|> Enum.filter(fn event -> event.uuid != uuid end)
|
|
# We return only @number_of_related_events right now
|
|
|> Enum.take(@number_of_related_events)
|
|
|
|
{:ok, events}
|
|
end
|
|
|
|
defp uniq_events(events), do: Enum.uniq_by(events, fn event -> event.uuid end)
|
|
|
|
@doc """
|
|
Create an event
|
|
"""
|
|
def create_event(
|
|
_parent,
|
|
%{organizer_actor_id: organizer_actor_id} = args,
|
|
%{context: %{current_user: user}} = _resolution
|
|
) do
|
|
# See https://github.com/absinthe-graphql/absinthe/issues/490
|
|
with {:is_owned, %Actor{} = organizer_actor} <- User.owns_actor(user, organizer_actor_id),
|
|
args <- Map.put(args, :options, args[:options] || %{}),
|
|
{:group_check, true} <- {:group_check, is_organizer_group_member?(args)},
|
|
args_with_organizer <- Map.put(args, :organizer_actor, organizer_actor),
|
|
{:ok, %Activity{data: %{"object" => %{"type" => "Event"}}}, %Event{} = event} <-
|
|
API.Events.create_event(args_with_organizer) do
|
|
{:ok, event}
|
|
else
|
|
{:group_check, false} ->
|
|
{:error,
|
|
dgettext(
|
|
"errors",
|
|
"Organizer profile doesn't have permission to create an event on behalf of this group"
|
|
)}
|
|
|
|
{:is_owned, nil} ->
|
|
{:error, dgettext("errors", "Organizer profile is not owned by the user")}
|
|
|
|
{:error, _, %Ecto.Changeset{} = error, _} ->
|
|
{:error, error}
|
|
|
|
{:error, %Ecto.Changeset{} = error} ->
|
|
{:error, error}
|
|
end
|
|
end
|
|
|
|
def create_event(_parent, _args, _resolution) do
|
|
{:error, dgettext("errors", "You need to be logged-in to create events")}
|
|
end
|
|
|
|
@doc """
|
|
Update an event
|
|
"""
|
|
def update_event(
|
|
_parent,
|
|
%{event_id: event_id} = args,
|
|
%{context: %{current_user: %User{} = user}} = _resolution
|
|
) do
|
|
# See https://github.com/absinthe-graphql/absinthe/issues/490
|
|
with args <- Map.put(args, :options, args[:options] || %{}),
|
|
{:ok, %Event{} = event} <- Events.get_event_with_preload(event_id),
|
|
%Actor{} = actor <- Users.get_actor_for_user(user),
|
|
{:ok, args} <- verify_profile_change(args, event, user, actor),
|
|
{:event_can_be_managed, true} <-
|
|
{:event_can_be_managed, can_event_be_updated_by?(event, actor)},
|
|
{:ok, %Activity{data: %{"object" => %{"type" => "Event"}}}, %Event{} = event} <-
|
|
API.Events.update_event(args, event) do
|
|
{:ok, event}
|
|
else
|
|
{:event_can_be_managed, false} ->
|
|
{:error,
|
|
dgettext(
|
|
"errors",
|
|
"This profile doesn't have permission to update an event on behalf of this group"
|
|
)}
|
|
|
|
{:error, :event_not_found} ->
|
|
{:error, dgettext("errors", "Event not found")}
|
|
|
|
{:old_actor, _} ->
|
|
{:error, dgettext("errors", "You can't edit this event.")}
|
|
|
|
{:new_actor, _} ->
|
|
{:error, dgettext("errors", "You can't attribute this event to this profile.")}
|
|
|
|
{:error, _, %Ecto.Changeset{} = error, _} ->
|
|
{:error, error}
|
|
end
|
|
end
|
|
|
|
def update_event(_parent, _args, _resolution) do
|
|
{:error, dgettext("errors", "You need to be logged-in to update an event")}
|
|
end
|
|
|
|
@doc """
|
|
Delete an event
|
|
"""
|
|
def delete_event(
|
|
_parent,
|
|
%{event_id: event_id},
|
|
%{context: %{current_user: %User{role: role} = user}}
|
|
) do
|
|
with {:ok, %Event{local: is_local} = event} <- Events.get_event_with_preload(event_id),
|
|
%Actor{id: actor_id} = actor <- Users.get_actor_for_user(user) do
|
|
cond do
|
|
{:event_can_be_managed, true} ==
|
|
{:event_can_be_managed, can_event_be_deleted_by?(event, actor)} ->
|
|
do_delete_event(event, actor)
|
|
|
|
role in [:moderator, :administrator] ->
|
|
with {:ok, res} <- do_delete_event(event, actor, !is_local),
|
|
%Actor{} = actor <- Actors.get_actor(actor_id) do
|
|
Admin.log_action(actor, "delete", event)
|
|
|
|
{:ok, res}
|
|
end
|
|
|
|
true ->
|
|
{:error, dgettext("errors", "You cannot delete this event")}
|
|
end
|
|
else
|
|
{:error, :event_not_found} ->
|
|
{:error, dgettext("errors", "Event not found")}
|
|
end
|
|
end
|
|
|
|
def delete_event(_parent, _args, _resolution) do
|
|
{:error, dgettext("errors", "You need to be logged-in to delete an event")}
|
|
end
|
|
|
|
defp do_delete_event(%Event{} = event, %Actor{} = actor, federate \\ true)
|
|
when is_boolean(federate) do
|
|
with {:ok, _activity, event} <- API.Events.delete_event(event, actor) do
|
|
{:ok, %{id: event.id}}
|
|
end
|
|
end
|
|
|
|
defp is_organizer_group_member?(%{
|
|
attributed_to_id: attributed_to_id,
|
|
organizer_actor_id: organizer_actor_id
|
|
})
|
|
when not is_nil(attributed_to_id) do
|
|
Actors.is_member?(organizer_actor_id, attributed_to_id) &&
|
|
Permission.can_create_group_object?(organizer_actor_id, attributed_to_id, %Event{})
|
|
end
|
|
|
|
defp is_organizer_group_member?(_), do: true
|
|
|
|
defp verify_profile_change(
|
|
args,
|
|
%Event{attributed_to: %Actor{}},
|
|
%User{} = _user,
|
|
%Actor{} = current_profile
|
|
) do
|
|
# The organizer_actor has to be the current profile, because otherwise we're left with a possible remote organizer
|
|
args =
|
|
args
|
|
|> Map.put(:organizer_actor, current_profile)
|
|
|> Map.put(:organizer_actor_id, current_profile.id)
|
|
|
|
{:ok, args}
|
|
end
|
|
|
|
defp verify_profile_change(
|
|
args,
|
|
%Event{organizer_actor: %Actor{id: organizer_actor_id}},
|
|
%User{} = user,
|
|
%Actor{} = _actor
|
|
) do
|
|
with {:old_actor, {:is_owned, %Actor{}}} <-
|
|
{:old_actor, User.owns_actor(user, organizer_actor_id)},
|
|
new_organizer_actor_id <- args |> Map.get(:organizer_actor_id, organizer_actor_id),
|
|
{:new_actor, {:is_owned, %Actor{} = organizer_actor}} <-
|
|
{:new_actor, User.owns_actor(user, new_organizer_actor_id)},
|
|
args <-
|
|
args
|
|
|> Map.put(:organizer_actor, organizer_actor)
|
|
|> Map.put(:organizer_actor_id, organizer_actor.id) do
|
|
{:ok, args}
|
|
end
|
|
end
|
|
end
|