Stage 6
This commit is contained in:
85
src/core/core_banned_word.erl
Normal file
85
src/core/core_banned_word.erl
Normal file
@@ -0,0 +1,85 @@
|
||||
-module(core_banned_word).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([add/1, remove/1, list_all/0, is_banned/1]).
|
||||
-export([check_text/1, filter_text/1]).
|
||||
|
||||
%% Добавить слово в бан-лист
|
||||
add(Word) when is_binary(Word) ->
|
||||
WordLower = string:lowercase(Word),
|
||||
case is_banned(WordLower) of
|
||||
true -> {error, already_exists};
|
||||
false ->
|
||||
BannedWord = #banned_word{
|
||||
id = generate_id(),
|
||||
word = WordLower
|
||||
},
|
||||
F = fun() ->
|
||||
mnesia:write(BannedWord),
|
||||
{ok, BannedWord}
|
||||
end,
|
||||
case mnesia:transaction(F) of
|
||||
{atomic, Result} -> Result;
|
||||
{aborted, Reason} -> {error, Reason}
|
||||
end
|
||||
end.
|
||||
|
||||
%% Удалить слово из бан-листа
|
||||
remove(Word) when is_binary(Word) ->
|
||||
WordLower = string:lowercase(Word),
|
||||
Match = #banned_word{word = WordLower, _ = '_'},
|
||||
case mnesia:dirty_match_object(Match) of
|
||||
[] -> {error, not_found};
|
||||
[BannedWord] ->
|
||||
F = fun() ->
|
||||
mnesia:delete_object(BannedWord),
|
||||
{ok, removed}
|
||||
end,
|
||||
case mnesia:transaction(F) of
|
||||
{atomic, Result} -> Result;
|
||||
{aborted, Reason} -> {error, Reason}
|
||||
end
|
||||
end.
|
||||
|
||||
%% Список всех запрещённых слов
|
||||
list_all() ->
|
||||
Match = #banned_word{_ = '_'},
|
||||
Words = mnesia:dirty_match_object(Match),
|
||||
{ok, [W#banned_word.word || W <- Words]}.
|
||||
|
||||
%% Проверить, является ли слово запрещённым
|
||||
is_banned(Word) when is_binary(Word) ->
|
||||
WordLower = string:lowercase(Word),
|
||||
Match = #banned_word{word = WordLower, _ = '_'},
|
||||
case mnesia:dirty_match_object(Match) of
|
||||
[] -> false;
|
||||
_ -> true
|
||||
end.
|
||||
|
||||
%% Проверить текст на наличие запрещённых слов
|
||||
check_text(Text) when is_binary(Text) ->
|
||||
TextLower = string:lowercase(Text),
|
||||
Words = string:split(TextLower, " ", all),
|
||||
{ok, BannedWords} = list_all(),
|
||||
lists:any(fun(W) -> lists:member(W, BannedWords) end, Words).
|
||||
|
||||
%% Отфильтровать запрещённые слова (заменить на ***)
|
||||
filter_text(Text) when is_binary(Text) ->
|
||||
{ok, BannedWords} = list_all(),
|
||||
Words = binary:split(Text, <<" ">>, [global]),
|
||||
Filtered = lists:map(fun(W) ->
|
||||
case lists:member(string:lowercase(W), BannedWords) of
|
||||
true -> <<"***">>;
|
||||
false -> W
|
||||
end
|
||||
end, Words),
|
||||
iolist_to_binary(join_binary(Filtered, <<" ">>)).
|
||||
|
||||
join_binary([], _) -> [];
|
||||
join_binary([H], _) -> [H];
|
||||
join_binary([H|T], Sep) ->
|
||||
[H, Sep | join_binary(T, Sep)].
|
||||
|
||||
%% Внутренние функции
|
||||
generate_id() ->
|
||||
base64:encode(crypto:strong_rand_bytes(16), #{mode => urlsafe, padding => false}).
|
||||
88
src/core/core_report.erl
Normal file
88
src/core/core_report.erl
Normal file
@@ -0,0 +1,88 @@
|
||||
-module(core_report).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([create/4, get_by_id/1, list_by_target/2, list_by_reporter/1, list_all/0]).
|
||||
-export([update_status/3, get_count_by_target/2]).
|
||||
-export([generate_id/0]).
|
||||
|
||||
%% Создание жалобы
|
||||
create(ReporterId, TargetType, TargetId, Reason) ->
|
||||
Id = generate_id(),
|
||||
Report = #report{
|
||||
id = Id,
|
||||
reporter_id = ReporterId,
|
||||
target_type = TargetType,
|
||||
target_id = TargetId,
|
||||
reason = Reason,
|
||||
status = pending,
|
||||
created_at = calendar:universal_time(),
|
||||
resolved_at = undefined,
|
||||
resolved_by = undefined
|
||||
},
|
||||
|
||||
F = fun() ->
|
||||
mnesia:write(Report),
|
||||
{ok, Report}
|
||||
end,
|
||||
|
||||
case mnesia:transaction(F) of
|
||||
{atomic, Result} -> Result;
|
||||
{aborted, Reason} -> {error, Reason}
|
||||
end.
|
||||
|
||||
%% Получение жалобы по ID
|
||||
get_by_id(Id) ->
|
||||
case mnesia:dirty_read(report, Id) of
|
||||
[] -> {error, not_found};
|
||||
[Report] -> {ok, Report}
|
||||
end.
|
||||
|
||||
%% Список жалоб на цель
|
||||
list_by_target(TargetType, TargetId) ->
|
||||
Match = #report{target_type = TargetType, target_id = TargetId, _ = '_'},
|
||||
Reports = mnesia:dirty_match_object(Match),
|
||||
{ok, Reports}.
|
||||
|
||||
%% Список жалоб от пользователя
|
||||
list_by_reporter(ReporterId) ->
|
||||
Match = #report{reporter_id = ReporterId, _ = '_'},
|
||||
Reports = mnesia:dirty_match_object(Match),
|
||||
{ok, Reports}.
|
||||
|
||||
%% Список всех жалоб (для админов)
|
||||
list_all() ->
|
||||
Match = #report{_ = '_'},
|
||||
Reports = mnesia:dirty_match_object(Match),
|
||||
{ok, Reports}.
|
||||
|
||||
%% Обновление статуса жалобы
|
||||
update_status(Id, Status, ResolvedBy) when Status =:= reviewed; Status =:= dismissed ->
|
||||
F = fun() ->
|
||||
case mnesia:read(report, Id) of
|
||||
[] ->
|
||||
{error, not_found};
|
||||
[Report] ->
|
||||
Updated = Report#report{
|
||||
status = Status,
|
||||
resolved_at = calendar:universal_time(),
|
||||
resolved_by = ResolvedBy
|
||||
},
|
||||
mnesia:write(Updated),
|
||||
{ok, Updated}
|
||||
end
|
||||
end,
|
||||
|
||||
case mnesia:transaction(F) of
|
||||
{atomic, Result} -> Result;
|
||||
{aborted, Reason} -> {error, Reason}
|
||||
end.
|
||||
|
||||
%% Получить количество жалоб на цель
|
||||
get_count_by_target(TargetType, TargetId) ->
|
||||
Match = #report{target_type = TargetType, target_id = TargetId, status = pending, _ = '_'},
|
||||
Reports = mnesia:dirty_match_object(Match),
|
||||
length(Reports).
|
||||
|
||||
%% Внутренние функции
|
||||
generate_id() ->
|
||||
base64:encode(crypto:strong_rand_bytes(16), #{mode => urlsafe, padding => false}).
|
||||
@@ -43,7 +43,13 @@ start_http() ->
|
||||
{"/v1/bookings/:id", handler_booking_by_id, []},
|
||||
{"/v1/reviews", handler_reviews, []},
|
||||
{"/v1/reviews/:id", handler_review_by_id, []},
|
||||
{"/v1/admin/reviews/:id", handler_admin_reviews, []}
|
||||
{"/v1/reports", handler_reports, []},
|
||||
{"/v1/admin/reports", handler_reports, []},
|
||||
{"/v1/admin/reports/:id", handler_report_by_id, []},
|
||||
{"/v1/admin/reviews/:id", handler_admin_reviews, []},
|
||||
{"/v1/admin/banned-words", handler_banned_words, []},
|
||||
{"/v1/admin/banned-words/:word", handler_banned_words, []},
|
||||
{"/v1/admin/:target_type/:id", handler_admin_moderation, []}
|
||||
]}
|
||||
]),
|
||||
|
||||
|
||||
130
src/handlers/handler_admin_moderation.erl
Normal file
130
src/handlers/handler_admin_moderation.erl
Normal file
@@ -0,0 +1,130 @@
|
||||
-module(handler_admin_moderation).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([init/2]).
|
||||
|
||||
init(Req, Opts) ->
|
||||
handle(Req, Opts).
|
||||
|
||||
handle(Req, _Opts) ->
|
||||
case cowboy_req:method(Req) of
|
||||
<<"PUT">> -> moderate(Req);
|
||||
_ -> send_error(Req, 405, <<"Method not allowed">>)
|
||||
end.
|
||||
|
||||
%% PUT /v1/admin/:target_type/:id - заморозка/разморозка
|
||||
moderate(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, AdminId, Req1} ->
|
||||
TargetTypeBin = cowboy_req:binding(target_type, Req1),
|
||||
TargetId = cowboy_req:binding(id, Req1),
|
||||
TargetType = parse_target_type(TargetTypeBin),
|
||||
{ok, Body, Req2} = cowboy_req:read_body(Req1),
|
||||
try jsx:decode(Body, [return_maps]) of
|
||||
#{<<"action">> := Action} ->
|
||||
case {TargetType, Action} of
|
||||
{calendar, <<"freeze">>} ->
|
||||
case logic_moderation:freeze_calendar(AdminId, TargetId) of
|
||||
{ok, Calendar} ->
|
||||
send_json(Req2, 200, calendar_to_json(Calendar));
|
||||
{error, access_denied} ->
|
||||
send_error(Req2, 403, <<"Admin access required">>);
|
||||
{error, not_found} ->
|
||||
send_error(Req2, 404, <<"Calendar not found">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end;
|
||||
{calendar, <<"unfreeze">>} ->
|
||||
case logic_moderation:unfreeze_calendar(AdminId, TargetId) of
|
||||
{ok, Calendar} ->
|
||||
send_json(Req2, 200, calendar_to_json(Calendar));
|
||||
{error, access_denied} ->
|
||||
send_error(Req2, 403, <<"Admin access required">>);
|
||||
{error, not_found} ->
|
||||
send_error(Req2, 404, <<"Calendar not found">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end;
|
||||
{event, <<"freeze">>} ->
|
||||
case logic_moderation:freeze_event(AdminId, TargetId) of
|
||||
{ok, Event} ->
|
||||
send_json(Req2, 200, event_to_json(Event));
|
||||
{error, access_denied} ->
|
||||
send_error(Req2, 403, <<"Admin access required">>);
|
||||
{error, not_found} ->
|
||||
send_error(Req2, 404, <<"Event not found">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end;
|
||||
{event, <<"unfreeze">>} ->
|
||||
case logic_moderation:unfreeze_event(AdminId, TargetId) of
|
||||
{ok, Event} ->
|
||||
send_json(Req2, 200, event_to_json(Event));
|
||||
{error, access_denied} ->
|
||||
send_error(Req2, 403, <<"Admin access required">>);
|
||||
{error, not_found} ->
|
||||
send_error(Req2, 404, <<"Event not found">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end;
|
||||
_ ->
|
||||
send_error(Req2, 400, <<"Invalid target_type or action">>)
|
||||
end;
|
||||
_ ->
|
||||
send_error(Req2, 400, <<"Missing action field">>)
|
||||
catch
|
||||
_:_ ->
|
||||
send_error(Req2, 400, <<"Invalid JSON format">>)
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% Вспомогательные функции
|
||||
parse_target_type(<<"calendars">>) -> calendar;
|
||||
parse_target_type(<<"events">>) -> event;
|
||||
parse_target_type(_) -> undefined.
|
||||
|
||||
calendar_to_json(Calendar) ->
|
||||
#{
|
||||
id => Calendar#calendar.id,
|
||||
owner_id => Calendar#calendar.owner_id,
|
||||
title => Calendar#calendar.title,
|
||||
description => Calendar#calendar.description,
|
||||
type => Calendar#calendar.type,
|
||||
tags => Calendar#calendar.tags,
|
||||
status => Calendar#calendar.status,
|
||||
rating_avg => Calendar#calendar.rating_avg,
|
||||
rating_count => Calendar#calendar.rating_count,
|
||||
created_at => datetime_to_iso8601(Calendar#calendar.created_at),
|
||||
updated_at => datetime_to_iso8601(Calendar#calendar.updated_at)
|
||||
}.
|
||||
|
||||
event_to_json(Event) ->
|
||||
#{
|
||||
id => Event#event.id,
|
||||
calendar_id => Event#event.calendar_id,
|
||||
title => Event#event.title,
|
||||
description => Event#event.description,
|
||||
event_type => Event#event.event_type,
|
||||
start_time => datetime_to_iso8601(Event#event.start_time),
|
||||
duration => Event#event.duration,
|
||||
status => Event#event.status,
|
||||
tags => Event#event.tags,
|
||||
rating_avg => Event#event.rating_avg,
|
||||
rating_count => Event#event.rating_count,
|
||||
created_at => datetime_to_iso8601(Event#event.created_at),
|
||||
updated_at => datetime_to_iso8601(Event#event.updated_at)
|
||||
}.
|
||||
|
||||
datetime_to_iso8601({{Year, Month, Day}, {Hour, Minute, Second}}) ->
|
||||
iolist_to_binary(io_lib:format("~4..0B-~2..0B-~2..0BT~2..0B:~2..0B:~2..0BZ",
|
||||
[Year, Month, Day, Hour, Minute, Second])).
|
||||
|
||||
send_json(Req, Status, Data) ->
|
||||
Body = jsx:encode(Data),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
|
||||
send_error(Req, Status, Message) ->
|
||||
Body = jsx:encode(#{error => Message}),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
86
src/handlers/handler_banned_words.erl
Normal file
86
src/handlers/handler_banned_words.erl
Normal file
@@ -0,0 +1,86 @@
|
||||
-module(handler_banned_words).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([init/2]).
|
||||
|
||||
init(Req, Opts) ->
|
||||
handle(Req, Opts).
|
||||
|
||||
handle(Req, _Opts) ->
|
||||
case cowboy_req:method(Req) of
|
||||
<<"GET">> -> list_banned_words(Req);
|
||||
<<"POST">> -> add_banned_word(Req);
|
||||
<<"DELETE">> -> remove_banned_word(Req);
|
||||
_ -> send_error(Req, 405, <<"Method not allowed">>)
|
||||
end.
|
||||
|
||||
%% GET /v1/admin/banned-words - список запрещённых слов
|
||||
list_banned_words(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, AdminId, Req1} ->
|
||||
case logic_moderation:list_banned_words(AdminId) of
|
||||
{ok, Words} ->
|
||||
send_json(Req1, 200, Words);
|
||||
{error, access_denied} ->
|
||||
send_error(Req1, 403, <<"Admin access required">>);
|
||||
{error, _} ->
|
||||
send_error(Req1, 500, <<"Internal server error">>)
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% POST /v1/admin/banned-words - добавить запрещённое слово
|
||||
add_banned_word(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, AdminId, Req1} ->
|
||||
{ok, Body, Req2} = cowboy_req:read_body(Req1),
|
||||
try jsx:decode(Body, [return_maps]) of
|
||||
#{<<"word">> := Word} ->
|
||||
case logic_moderation:add_banned_word(AdminId, Word) of
|
||||
{ok, _} ->
|
||||
send_json(Req2, 201, #{word => Word, status => <<"added">>});
|
||||
{error, already_exists} ->
|
||||
send_error(Req2, 409, <<"Word already exists">>);
|
||||
{error, access_denied} ->
|
||||
send_error(Req2, 403, <<"Admin access required">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end;
|
||||
_ ->
|
||||
send_error(Req2, 400, <<"Missing 'word' field">>)
|
||||
catch
|
||||
_:_ ->
|
||||
send_error(Req2, 400, <<"Invalid JSON format">>)
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% DELETE /v1/admin/banned-words - удалить запрещённое слово
|
||||
remove_banned_word(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, AdminId, Req1} ->
|
||||
Word = cowboy_req:binding(word, Req1),
|
||||
case logic_moderation:remove_banned_word(AdminId, Word) of
|
||||
{ok, removed} ->
|
||||
send_json(Req1, 200, #{word => Word, status => <<"removed">>});
|
||||
{error, not_found} ->
|
||||
send_error(Req1, 404, <<"Word not found">>);
|
||||
{error, access_denied} ->
|
||||
send_error(Req1, 403, <<"Admin access required">>);
|
||||
{error, _} ->
|
||||
send_error(Req1, 500, <<"Internal server error">>)
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% Вспомогательные функции
|
||||
send_json(Req, Status, Data) ->
|
||||
Body = jsx:encode(Data),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
|
||||
send_error(Req, Status, Message) ->
|
||||
Body = jsx:encode(#{error => Message}),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
83
src/handlers/handler_report_by_id.erl
Normal file
83
src/handlers/handler_report_by_id.erl
Normal file
@@ -0,0 +1,83 @@
|
||||
-module(handler_report_by_id).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([init/2]).
|
||||
|
||||
init(Req, Opts) ->
|
||||
handle(Req, Opts).
|
||||
|
||||
handle(Req, _Opts) ->
|
||||
case cowboy_req:method(Req) of
|
||||
<<"PUT">> -> resolve_report(Req);
|
||||
_ -> send_error(Req, 405, <<"Method not allowed">>)
|
||||
end.
|
||||
|
||||
%% PUT /v1/admin/reports/:id - рассмотрение жалобы
|
||||
resolve_report(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, AdminId, Req1} ->
|
||||
ReportId = cowboy_req:binding(id, Req1),
|
||||
{ok, Body, Req2} = cowboy_req:read_body(Req1),
|
||||
try jsx:decode(Body, [return_maps]) of
|
||||
#{<<"action">> := Action} ->
|
||||
ActionAtom = case Action of
|
||||
<<"review">> -> reviewed;
|
||||
<<"dismiss">> -> dismissed;
|
||||
_ -> undefined
|
||||
end,
|
||||
case ActionAtom of
|
||||
undefined ->
|
||||
send_error(Req2, 400, <<"Invalid action. Use 'review' or 'dismiss'">>);
|
||||
_ ->
|
||||
case logic_moderation:resolve_report(AdminId, ReportId, ActionAtom) of
|
||||
{ok, Report} ->
|
||||
Response = report_to_json(Report),
|
||||
send_json(Req2, 200, Response);
|
||||
{error, access_denied} ->
|
||||
send_error(Req2, 403, <<"Admin access required">>);
|
||||
{error, already_resolved} ->
|
||||
send_error(Req2, 409, <<"Report already resolved">>);
|
||||
{error, not_found} ->
|
||||
send_error(Req2, 404, <<"Report not found">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end
|
||||
end;
|
||||
_ ->
|
||||
send_error(Req2, 400, <<"Missing action field">>)
|
||||
catch
|
||||
_:_ ->
|
||||
send_error(Req2, 400, <<"Invalid JSON format">>)
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% Вспомогательные функции
|
||||
report_to_json(Report) ->
|
||||
#{
|
||||
id => Report#report.id,
|
||||
reporter_id => Report#report.reporter_id,
|
||||
target_type => Report#report.target_type,
|
||||
target_id => Report#report.target_id,
|
||||
reason => Report#report.reason,
|
||||
status => Report#report.status,
|
||||
created_at => datetime_to_iso8601(Report#report.created_at),
|
||||
resolved_at => case Report#report.resolved_at of
|
||||
undefined -> null;
|
||||
Dt -> datetime_to_iso8601(Dt)
|
||||
end,
|
||||
resolved_by => Report#report.resolved_by
|
||||
}.
|
||||
|
||||
datetime_to_iso8601({{Year, Month, Day}, {Hour, Minute, Second}}) ->
|
||||
iolist_to_binary(io_lib:format("~4..0B-~2..0B-~2..0BT~2..0B:~2..0B:~2..0BZ",
|
||||
[Year, Month, Day, Hour, Minute, Second])).
|
||||
|
||||
send_json(Req, Status, Data) ->
|
||||
Body = jsx:encode(Data),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
|
||||
send_error(Req, Status, Message) ->
|
||||
Body = jsx:encode(#{error => Message}),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
113
src/handlers/handler_reports.erl
Normal file
113
src/handlers/handler_reports.erl
Normal file
@@ -0,0 +1,113 @@
|
||||
-module(handler_reports).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([init/2]).
|
||||
|
||||
init(Req, Opts) ->
|
||||
handle(Req, Opts).
|
||||
|
||||
handle(Req, _Opts) ->
|
||||
case cowboy_req:method(Req) of
|
||||
<<"POST">> -> create_report(Req);
|
||||
<<"GET">> -> list_reports(Req);
|
||||
_ -> send_error(Req, 405, <<"Method not allowed">>)
|
||||
end.
|
||||
|
||||
%% POST /v1/reports - создание жалобы
|
||||
create_report(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, UserId, Req1} ->
|
||||
{ok, Body, Req2} = cowboy_req:read_body(Req1),
|
||||
try jsx:decode(Body, [return_maps]) of
|
||||
Decoded when is_map(Decoded) ->
|
||||
case Decoded of
|
||||
#{<<"target_type">> := TargetTypeBin,
|
||||
<<"target_id">> := TargetId,
|
||||
<<"reason">> := Reason} ->
|
||||
TargetType = parse_target_type(TargetTypeBin),
|
||||
case logic_moderation:create_report(UserId, TargetType, TargetId, Reason) of
|
||||
{ok, Report} ->
|
||||
Response = report_to_json(Report),
|
||||
send_json(Req2, 201, Response);
|
||||
{error, target_not_found} ->
|
||||
send_error(Req2, 404, <<"Target not found">>);
|
||||
{error, _} ->
|
||||
send_error(Req2, 500, <<"Internal server error">>)
|
||||
end;
|
||||
_ ->
|
||||
send_error(Req2, 400, <<"Missing required fields">>)
|
||||
end;
|
||||
_ ->
|
||||
send_error(Req2, 400, <<"Invalid JSON">>)
|
||||
catch
|
||||
_:_ ->
|
||||
send_error(Req2, 400, <<"Invalid JSON format">>)
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% GET /v1/admin/reports - список всех жалоб (админ)
|
||||
list_reports(Req) ->
|
||||
case handler_auth:authenticate(Req) of
|
||||
{ok, AdminId, Req1} ->
|
||||
Qs = cowboy_req:parse_qs(Req1),
|
||||
case {proplists:get_value(<<"target_type">>, Qs), proplists:get_value(<<"target_id">>, Qs)} of
|
||||
{undefined, _} ->
|
||||
case logic_moderation:get_reports(AdminId) of
|
||||
{ok, Reports} ->
|
||||
Response = [report_to_json(R) || R <- Reports],
|
||||
send_json(Req1, 200, Response);
|
||||
{error, access_denied} ->
|
||||
send_error(Req1, 403, <<"Admin access required">>);
|
||||
{error, _} ->
|
||||
send_error(Req1, 500, <<"Internal server error">>)
|
||||
end;
|
||||
{TargetTypeBin, TargetId} ->
|
||||
TargetType = parse_target_type(TargetTypeBin),
|
||||
case logic_moderation:get_reports_by_target(AdminId, TargetType, TargetId) of
|
||||
{ok, Reports} ->
|
||||
Response = [report_to_json(R) || R <- Reports],
|
||||
send_json(Req1, 200, Response);
|
||||
{error, access_denied} ->
|
||||
send_error(Req1, 403, <<"Admin access required">>);
|
||||
{error, _} ->
|
||||
send_error(Req1, 500, <<"Internal server error">>)
|
||||
end
|
||||
end;
|
||||
{error, Code, Message, Req1} ->
|
||||
send_error(Req1, Code, Message)
|
||||
end.
|
||||
|
||||
%% Вспомогательные функции
|
||||
parse_target_type(<<"event">>) -> event;
|
||||
parse_target_type(<<"calendar">>) -> calendar;
|
||||
parse_target_type(_) -> undefined.
|
||||
|
||||
report_to_json(Report) ->
|
||||
#{
|
||||
id => Report#report.id,
|
||||
reporter_id => Report#report.reporter_id,
|
||||
target_type => Report#report.target_type,
|
||||
target_id => Report#report.target_id,
|
||||
reason => Report#report.reason,
|
||||
status => Report#report.status,
|
||||
created_at => datetime_to_iso8601(Report#report.created_at),
|
||||
resolved_at => case Report#report.resolved_at of
|
||||
undefined -> null;
|
||||
Dt -> datetime_to_iso8601(Dt)
|
||||
end,
|
||||
resolved_by => Report#report.resolved_by
|
||||
}.
|
||||
|
||||
datetime_to_iso8601({{Year, Month, Day}, {Hour, Minute, Second}}) ->
|
||||
iolist_to_binary(io_lib:format("~4..0B-~2..0B-~2..0BT~2..0B:~2..0B:~2..0BZ",
|
||||
[Year, Month, Day, Hour, Minute, Second])).
|
||||
|
||||
send_json(Req, Status, Data) ->
|
||||
Body = jsx:encode(Data),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
|
||||
send_error(Req, Status, Message) ->
|
||||
Body = jsx:encode(#{error => Message}),
|
||||
cowboy_req:reply(Status, #{<<"content-type">> => <<"application/json">>}, Body, Req).
|
||||
180
src/logic/logic_moderation.erl
Normal file
180
src/logic/logic_moderation.erl
Normal file
@@ -0,0 +1,180 @@
|
||||
-module(logic_moderation).
|
||||
-include("records.hrl").
|
||||
|
||||
-export([create_report/4, get_reports/1, get_reports_by_target/3, resolve_report/3]).
|
||||
-export([add_banned_word/2, remove_banned_word/2, list_banned_words/1]).
|
||||
-export([check_content/1, auto_moderate/1]).
|
||||
-export([freeze_calendar/2, unfreeze_calendar/2, freeze_event/2, unfreeze_event/2]).
|
||||
|
||||
-define(REPORT_THRESHOLD, 3). % Количество жалоб для авто-заморозки
|
||||
|
||||
%% ============ Жалобы ============
|
||||
|
||||
%% Создание жалобы
|
||||
create_report(ReporterId, TargetType, TargetId, Reason) ->
|
||||
case target_exists(TargetType, TargetId) of
|
||||
true ->
|
||||
case core_report:create(ReporterId, TargetType, TargetId, Reason) of
|
||||
{ok, Report} ->
|
||||
% Проверяем порог для авто-модерации
|
||||
check_auto_freeze(TargetType, TargetId),
|
||||
{ok, Report};
|
||||
Error -> Error
|
||||
end;
|
||||
false -> {error, target_not_found}
|
||||
end.
|
||||
|
||||
%% Получить все жалобы (для админа)
|
||||
get_reports(AdminId) ->
|
||||
case is_admin(AdminId) of
|
||||
true -> core_report:list_all();
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Получить жалобы на конкретную цель
|
||||
get_reports_by_target(AdminId, TargetType, TargetId) ->
|
||||
case is_admin(AdminId) of
|
||||
true -> core_report:list_by_target(TargetType, TargetId);
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Рассмотреть жалобу (подтвердить или отклонить)
|
||||
resolve_report(AdminId, ReportId, Action) when Action =:= reviewed; Action =:= dismissed ->
|
||||
case is_admin(AdminId) of
|
||||
true ->
|
||||
case core_report:get_by_id(ReportId) of
|
||||
{ok, Report} ->
|
||||
case Report#report.status of
|
||||
pending ->
|
||||
core_report:update_status(ReportId, Action, AdminId);
|
||||
_ -> {error, already_resolved}
|
||||
end;
|
||||
Error -> Error
|
||||
end;
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Проверка порога для авто-заморозки
|
||||
check_auto_freeze(TargetType, TargetId) ->
|
||||
Count = core_report:get_count_by_target(TargetType, TargetId),
|
||||
if Count >= ?REPORT_THRESHOLD ->
|
||||
auto_freeze(TargetType, TargetId);
|
||||
true -> ok
|
||||
end.
|
||||
|
||||
auto_freeze(event, EventId) ->
|
||||
case core_event:get_by_id(EventId) of
|
||||
{ok, Event} when Event#event.status =:= active ->
|
||||
core_event:update(EventId, [{status, frozen}]);
|
||||
_ -> ok
|
||||
end;
|
||||
auto_freeze(calendar, CalendarId) ->
|
||||
case core_calendar:get_by_id(CalendarId) of
|
||||
{ok, Calendar} when Calendar#calendar.status =:= active ->
|
||||
core_calendar:update(CalendarId, [{status, frozen}]);
|
||||
_ -> ok
|
||||
end;
|
||||
auto_freeze(_, _) -> ok.
|
||||
|
||||
%% ============ Бан-лист ============
|
||||
|
||||
%% Добавить запрещённое слово
|
||||
add_banned_word(AdminId, Word) ->
|
||||
case is_admin(AdminId) of
|
||||
true -> core_banned_word:add(Word);
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Удалить запрещённое слово
|
||||
remove_banned_word(AdminId, Word) ->
|
||||
case is_admin(AdminId) of
|
||||
true -> core_banned_word:remove(Word);
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Список запрещённых слов
|
||||
list_banned_words(AdminId) ->
|
||||
case is_admin(AdminId) of
|
||||
true -> core_banned_word:list_all();
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% ============ Контент-фильтр ============
|
||||
|
||||
%% Проверить контент на запрещённые слова
|
||||
check_content(Text) ->
|
||||
core_banned_word:check_text(Text).
|
||||
|
||||
%% Автоматическая модерация контента (замена запрещённых слов)
|
||||
auto_moderate(Text) ->
|
||||
core_banned_word:filter_text(Text).
|
||||
|
||||
%% ============ Заморозка/разморозка ============
|
||||
|
||||
%% Заморозить календарь
|
||||
freeze_calendar(AdminId, CalendarId) ->
|
||||
case is_admin(AdminId) of
|
||||
true ->
|
||||
case core_calendar:get_by_id(CalendarId) of
|
||||
{ok, Calendar} ->
|
||||
core_calendar:update(CalendarId, [{status, frozen}]);
|
||||
Error -> Error
|
||||
end;
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Разморозить календарь
|
||||
unfreeze_calendar(AdminId, CalendarId) ->
|
||||
case is_admin(AdminId) of
|
||||
true ->
|
||||
case core_calendar:get_by_id(CalendarId) of
|
||||
{ok, Calendar} ->
|
||||
core_calendar:update(CalendarId, [{status, active}]);
|
||||
Error -> Error
|
||||
end;
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Заморозить событие
|
||||
freeze_event(AdminId, EventId) ->
|
||||
case is_admin(AdminId) of
|
||||
true ->
|
||||
case core_event:get_by_id(EventId) of
|
||||
{ok, Event} ->
|
||||
core_event:update(EventId, [{status, frozen}]);
|
||||
Error -> Error
|
||||
end;
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% Разморозить событие
|
||||
unfreeze_event(AdminId, EventId) ->
|
||||
case is_admin(AdminId) of
|
||||
true ->
|
||||
case core_event:get_by_id(EventId) of
|
||||
{ok, Event} ->
|
||||
core_event:update(EventId, [{status, active}]);
|
||||
Error -> Error
|
||||
end;
|
||||
false -> {error, access_denied}
|
||||
end.
|
||||
|
||||
%% ============ Вспомогательные функции ============
|
||||
|
||||
target_exists(event, EventId) ->
|
||||
case core_event:get_by_id(EventId) of
|
||||
{ok, _} -> true;
|
||||
_ -> false
|
||||
end;
|
||||
target_exists(calendar, CalendarId) ->
|
||||
case core_calendar:get_by_id(CalendarId) of
|
||||
{ok, _} -> true;
|
||||
_ -> false
|
||||
end; % ← точка с запятой здесь!
|
||||
target_exists(_, _) -> false.
|
||||
|
||||
is_admin(UserId) ->
|
||||
case core_user:get_by_id(UserId) of
|
||||
{ok, User} -> User#user.role =:= admin;
|
||||
_ -> false
|
||||
end.
|
||||
80
test/core_banned_word_tests.erl
Normal file
80
test/core_banned_word_tests.erl
Normal file
@@ -0,0 +1,80 @@
|
||||
-module(core_banned_word_tests).
|
||||
-include_lib("eunit/include/eunit.hrl").
|
||||
-include("records.hrl").
|
||||
|
||||
setup() ->
|
||||
mnesia:start(),
|
||||
mnesia:create_table(banned_word, [
|
||||
{attributes, record_info(fields, banned_word)},
|
||||
{ram_copies, [node()]}
|
||||
]),
|
||||
ok.
|
||||
|
||||
cleanup(_) ->
|
||||
mnesia:delete_table(banned_word),
|
||||
mnesia:stop(),
|
||||
ok.
|
||||
|
||||
core_banned_word_test_() ->
|
||||
{foreach,
|
||||
fun setup/0,
|
||||
fun cleanup/1,
|
||||
[
|
||||
{"Add banned word test", fun test_add_word/0},
|
||||
{"Add duplicate word test", fun test_add_duplicate/0},
|
||||
{"Remove banned word test", fun test_remove_word/0},
|
||||
{"List banned words test", fun test_list_words/0},
|
||||
{"Is banned test", fun test_is_banned/0},
|
||||
{"Check text test", fun test_check_text/0},
|
||||
{"Filter text test", fun test_filter_text/0}
|
||||
]}.
|
||||
|
||||
test_add_word() ->
|
||||
Word = <<"badword">>,
|
||||
{ok, BannedWord} = core_banned_word:add(Word),
|
||||
?assertEqual(Word, BannedWord#banned_word.word),
|
||||
?assert(is_binary(BannedWord#banned_word.id)).
|
||||
|
||||
test_add_duplicate() ->
|
||||
Word = <<"badword">>,
|
||||
{ok, _} = core_banned_word:add(Word),
|
||||
{error, already_exists} = core_banned_word:add(Word),
|
||||
{error, already_exists} = core_banned_word:add(<<"BADWORD">>). % case insensitive
|
||||
|
||||
test_remove_word() ->
|
||||
Word = <<"badword">>,
|
||||
{ok, _} = core_banned_word:add(Word),
|
||||
{ok, removed} = core_banned_word:remove(Word),
|
||||
{error, not_found} = core_banned_word:remove(<<"nonexistent">>).
|
||||
|
||||
test_list_words() ->
|
||||
{ok, _} = core_banned_word:add(<<"word1">>),
|
||||
{ok, _} = core_banned_word:add(<<"word2">>),
|
||||
{ok, _} = core_banned_word:add(<<"word3">>),
|
||||
|
||||
{ok, Words} = core_banned_word:list_all(),
|
||||
?assertEqual(3, length(Words)),
|
||||
?assert(lists:member(<<"word1">>, Words)).
|
||||
|
||||
test_is_banned() ->
|
||||
Word = <<"badword">>,
|
||||
?assertNot(core_banned_word:is_banned(Word)),
|
||||
{ok, _} = core_banned_word:add(Word),
|
||||
?assert(core_banned_word:is_banned(Word)),
|
||||
?assert(core_banned_word:is_banned(<<"BADWORD">>)). % case insensitive
|
||||
|
||||
test_check_text() ->
|
||||
{ok, _} = core_banned_word:add(<<"bad">>),
|
||||
{ok, _} = core_banned_word:add(<<"spam">>),
|
||||
|
||||
?assertNot(core_banned_word:check_text(<<"Hello world">>)),
|
||||
?assert(core_banned_word:check_text(<<"This is bad">>)),
|
||||
?assert(core_banned_word:check_text(<<"This is SPAM">>)).
|
||||
|
||||
test_filter_text() ->
|
||||
{ok, _} = core_banned_word:add(<<"bad">>),
|
||||
{ok, _} = core_banned_word:add(<<"spam">>),
|
||||
|
||||
?assertEqual(<<"Hello world">>, core_banned_word:filter_text(<<"Hello world">>)),
|
||||
?assertEqual(<<"This is ***">>, core_banned_word:filter_text(<<"This is bad">>)),
|
||||
?assertEqual(<<"*** and ***">>, core_banned_word:filter_text(<<"bad and spam">>)).
|
||||
101
test/core_report_tests.erl
Normal file
101
test/core_report_tests.erl
Normal file
@@ -0,0 +1,101 @@
|
||||
-module(core_report_tests).
|
||||
-include_lib("eunit/include/eunit.hrl").
|
||||
-include("records.hrl").
|
||||
|
||||
setup() ->
|
||||
mnesia:start(),
|
||||
mnesia:create_table(report, [
|
||||
{attributes, record_info(fields, report)},
|
||||
{ram_copies, [node()]}
|
||||
]),
|
||||
ok.
|
||||
|
||||
cleanup(_) ->
|
||||
mnesia:delete_table(report),
|
||||
mnesia:stop(),
|
||||
ok.
|
||||
|
||||
core_report_test_() ->
|
||||
{foreach,
|
||||
fun setup/0,
|
||||
fun cleanup/1,
|
||||
[
|
||||
{"Create report test", fun test_create_report/0},
|
||||
{"Get report by id test", fun test_get_by_id/0},
|
||||
{"List reports by target test", fun test_list_by_target/0},
|
||||
{"List reports by reporter test", fun test_list_by_reporter/0},
|
||||
{"Update report status test", fun test_update_status/0},
|
||||
{"Get count by target test", fun test_get_count_by_target/0}
|
||||
]}.
|
||||
|
||||
test_create_report() ->
|
||||
ReporterId = <<"user123">>,
|
||||
TargetType = event,
|
||||
TargetId = <<"event123">>,
|
||||
Reason = <<"Inappropriate content">>,
|
||||
|
||||
{ok, Report} = core_report:create(ReporterId, TargetType, TargetId, Reason),
|
||||
|
||||
?assertEqual(ReporterId, Report#report.reporter_id),
|
||||
?assertEqual(TargetType, Report#report.target_type),
|
||||
?assertEqual(TargetId, Report#report.target_id),
|
||||
?assertEqual(Reason, Report#report.reason),
|
||||
?assertEqual(pending, Report#report.status),
|
||||
?assertEqual(undefined, Report#report.resolved_at),
|
||||
?assertEqual(undefined, Report#report.resolved_by),
|
||||
?assert(is_binary(Report#report.id)).
|
||||
|
||||
test_get_by_id() ->
|
||||
ReporterId = <<"user123">>,
|
||||
{ok, Report} = core_report:create(ReporterId, event, <<"ev1">>, <<"Bad">>),
|
||||
|
||||
{ok, Found} = core_report:get_by_id(Report#report.id),
|
||||
?assertEqual(Report#report.id, Found#report.id),
|
||||
|
||||
{error, not_found} = core_report:get_by_id(<<"nonexistent">>).
|
||||
|
||||
test_list_by_target() ->
|
||||
User1 = <<"user1">>,
|
||||
User2 = <<"user2">>,
|
||||
EventId = <<"event123">>,
|
||||
|
||||
{ok, _} = core_report:create(User1, event, EventId, <<"Reason 1">>),
|
||||
{ok, _} = core_report:create(User2, event, EventId, <<"Reason 2">>),
|
||||
{ok, _} = core_report:create(User1, calendar, <<"cal1">>, <<"Reason 3">>),
|
||||
|
||||
{ok, Reports} = core_report:list_by_target(event, EventId),
|
||||
?assertEqual(2, length(Reports)).
|
||||
|
||||
test_list_by_reporter() ->
|
||||
User1 = <<"user1">>,
|
||||
User2 = <<"user2">>,
|
||||
|
||||
{ok, _} = core_report:create(User1, event, <<"ev1">>, <<"">>),
|
||||
{ok, _} = core_report:create(User1, event, <<"ev2">>, <<"">>),
|
||||
{ok, _} = core_report:create(User2, event, <<"ev3">>, <<"">>),
|
||||
|
||||
{ok, Reports} = core_report:list_by_reporter(User1),
|
||||
?assertEqual(2, length(Reports)).
|
||||
|
||||
test_update_status() ->
|
||||
ReporterId = <<"user123">>,
|
||||
AdminId = <<"admin123">>,
|
||||
{ok, Report} = core_report:create(ReporterId, event, <<"ev1">>, <<"">>),
|
||||
|
||||
{ok, Updated} = core_report:update_status(Report#report.id, reviewed, AdminId),
|
||||
?assertEqual(reviewed, Updated#report.status),
|
||||
?assertEqual(AdminId, Updated#report.resolved_by),
|
||||
?assert(Updated#report.resolved_at =/= undefined).
|
||||
|
||||
test_get_count_by_target() ->
|
||||
User1 = <<"user1">>,
|
||||
User2 = <<"user2">>,
|
||||
EventId = <<"event123">>,
|
||||
|
||||
?assertEqual(0, core_report:get_count_by_target(event, EventId)),
|
||||
|
||||
{ok, _} = core_report:create(User1, event, EventId, <<"">>),
|
||||
?assertEqual(1, core_report:get_count_by_target(event, EventId)),
|
||||
|
||||
{ok, _} = core_report:create(User2, event, EventId, <<"">>),
|
||||
?assertEqual(2, core_report:get_count_by_target(event, EventId)).
|
||||
146
test/logic_moderation_tests.erl
Normal file
146
test/logic_moderation_tests.erl
Normal file
@@ -0,0 +1,146 @@
|
||||
-module(logic_moderation_tests).
|
||||
-include_lib("eunit/include/eunit.hrl").
|
||||
-include("records.hrl").
|
||||
|
||||
setup() ->
|
||||
mnesia:start(),
|
||||
mnesia:create_table(user, [{attributes, record_info(fields, user)}, {ram_copies, [node()]}]),
|
||||
mnesia:create_table(calendar, [{attributes, record_info(fields, calendar)}, {ram_copies, [node()]}]),
|
||||
mnesia:create_table(event, [{attributes, record_info(fields, event)}, {ram_copies, [node()]}]),
|
||||
mnesia:create_table(report, [{attributes, record_info(fields, report)}, {ram_copies, [node()]}]),
|
||||
mnesia:create_table(banned_word, [{attributes, record_info(fields, banned_word)}, {ram_copies, [node()]}]),
|
||||
ok.
|
||||
|
||||
cleanup(_) ->
|
||||
mnesia:delete_table(banned_word),
|
||||
mnesia:delete_table(report),
|
||||
mnesia:delete_table(event),
|
||||
mnesia:delete_table(calendar),
|
||||
mnesia:delete_table(user),
|
||||
mnesia:stop(),
|
||||
ok.
|
||||
|
||||
logic_moderation_test_() ->
|
||||
{foreach,
|
||||
fun setup/0,
|
||||
fun cleanup/1,
|
||||
[
|
||||
{"Create report test", fun test_create_report/0},
|
||||
{"Get reports test", fun test_get_reports/0},
|
||||
{"Resolve report test", fun test_resolve_report/0},
|
||||
{"Add banned word test", fun test_add_banned_word/0},
|
||||
{"Remove banned word test", fun test_remove_banned_word/0},
|
||||
{"Auto freeze by reports test", fun test_auto_freeze/0},
|
||||
{"Freeze/unfreeze calendar test", fun test_freeze_calendar/0},
|
||||
{"Freeze/unfreeze event test", fun test_freeze_event/0},
|
||||
{"Check content test", fun test_check_content/0}
|
||||
]}.
|
||||
|
||||
create_test_user(Role) ->
|
||||
UserId = base64:encode(crypto:strong_rand_bytes(16), #{mode => urlsafe, padding => false}),
|
||||
User = #user{id = UserId, email = <<UserId/binary, "@test.com">>, password_hash = <<"hash">>,
|
||||
role = Role, status = active, created_at = calendar:universal_time(), updated_at = calendar:universal_time()},
|
||||
mnesia:dirty_write(User),
|
||||
UserId.
|
||||
|
||||
create_test_calendar(OwnerId) ->
|
||||
{ok, Calendar} = core_calendar:create(OwnerId, <<"Test">>, <<"">>, manual),
|
||||
Calendar#calendar.id.
|
||||
|
||||
create_test_event(CalendarId) ->
|
||||
{ok, Event} = core_event:create(CalendarId, <<"Event">>, {{2026, 6, 1}, {10, 0, 0}}, 60),
|
||||
Event#event.id.
|
||||
|
||||
test_create_report() ->
|
||||
ReporterId = create_test_user(user),
|
||||
OwnerId = create_test_user(user),
|
||||
CalendarId = create_test_calendar(OwnerId),
|
||||
EventId = create_test_event(CalendarId),
|
||||
|
||||
{ok, Report} = logic_moderation:create_report(ReporterId, event, EventId, <<"Bad content">>),
|
||||
?assertEqual(ReporterId, Report#report.reporter_id),
|
||||
?assertEqual(pending, Report#report.status).
|
||||
|
||||
test_get_reports() ->
|
||||
AdminId = create_test_user(admin),
|
||||
ReporterId = create_test_user(user),
|
||||
OwnerId = create_test_user(user),
|
||||
CalendarId = create_test_calendar(OwnerId),
|
||||
EventId = create_test_event(CalendarId),
|
||||
|
||||
{ok, _} = logic_moderation:create_report(ReporterId, event, EventId, <<"">>),
|
||||
|
||||
{ok, Reports} = logic_moderation:get_reports(AdminId),
|
||||
?assertEqual(1, length(Reports)).
|
||||
|
||||
test_resolve_report() ->
|
||||
AdminId = create_test_user(admin),
|
||||
ReporterId = create_test_user(user),
|
||||
OwnerId = create_test_user(user),
|
||||
CalendarId = create_test_calendar(OwnerId),
|
||||
EventId = create_test_event(CalendarId),
|
||||
|
||||
{ok, Report} = logic_moderation:create_report(ReporterId, event, EventId, <<"">>),
|
||||
{ok, Resolved} = logic_moderation:resolve_report(AdminId, Report#report.id, reviewed),
|
||||
?assertEqual(reviewed, Resolved#report.status),
|
||||
?assertEqual(AdminId, Resolved#report.resolved_by).
|
||||
|
||||
test_add_banned_word() ->
|
||||
AdminId = create_test_user(admin),
|
||||
{ok, _} = logic_moderation:add_banned_word(AdminId, <<"badword">>),
|
||||
?assert(core_banned_word:is_banned(<<"badword">>)).
|
||||
|
||||
test_remove_banned_word() ->
|
||||
AdminId = create_test_user(admin),
|
||||
{ok, _} = logic_moderation:add_banned_word(AdminId, <<"badword">>),
|
||||
{ok, removed} = logic_moderation:remove_banned_word(AdminId, <<"badword">>),
|
||||
?assertNot(core_banned_word:is_banned(<<"badword">>)).
|
||||
|
||||
test_auto_freeze() ->
|
||||
Reporter1 = create_test_user(user),
|
||||
Reporter2 = create_test_user(user),
|
||||
Reporter3 = create_test_user(user),
|
||||
OwnerId = create_test_user(user),
|
||||
CalendarId = create_test_calendar(OwnerId),
|
||||
EventId = create_test_event(CalendarId),
|
||||
|
||||
% 3 жалобы должны заморозить событие
|
||||
{ok, _} = logic_moderation:create_report(Reporter1, event, EventId, <<"">>),
|
||||
{ok, _} = logic_moderation:create_report(Reporter2, event, EventId, <<"">>),
|
||||
{ok, _} = logic_moderation:create_report(Reporter3, event, EventId, <<"">>),
|
||||
|
||||
{ok, Event} = core_event:get_by_id(EventId),
|
||||
?assertEqual(frozen, Event#event.status).
|
||||
|
||||
test_freeze_calendar() ->
|
||||
AdminId = create_test_user(admin),
|
||||
OwnerId = create_test_user(user),
|
||||
CalendarId = create_test_calendar(OwnerId),
|
||||
|
||||
{ok, Frozen} = logic_moderation:freeze_calendar(AdminId, CalendarId),
|
||||
?assertEqual(frozen, Frozen#calendar.status),
|
||||
|
||||
{ok, Unfrozen} = logic_moderation:unfreeze_calendar(AdminId, CalendarId),
|
||||
?assertEqual(active, Unfrozen#calendar.status).
|
||||
|
||||
test_freeze_event() ->
|
||||
AdminId = create_test_user(admin),
|
||||
OwnerId = create_test_user(user),
|
||||
CalendarId = create_test_calendar(OwnerId),
|
||||
EventId = create_test_event(CalendarId),
|
||||
|
||||
{ok, Frozen} = logic_moderation:freeze_event(AdminId, EventId),
|
||||
?assertEqual(frozen, Frozen#event.status),
|
||||
|
||||
{ok, Unfrozen} = logic_moderation:unfreeze_event(AdminId, EventId),
|
||||
?assertEqual(active, Unfrozen#event.status).
|
||||
|
||||
test_check_content() ->
|
||||
AdminId = create_test_user(admin),
|
||||
{ok, _} = logic_moderation:add_banned_word(AdminId, <<"bad">>),
|
||||
|
||||
?assertNot(logic_moderation:check_content(<<"Hello">>)),
|
||||
?assert(logic_moderation:check_content(<<"This is bad">>)),
|
||||
|
||||
?assertEqual(<<"Hello">>, logic_moderation:auto_moderate(<<"Hello">>)),
|
||||
?assertEqual(<<"This is ***">>, logic_moderation:auto_moderate(<<"This is bad">>)).
|
||||
370
test/scripts/test_moderation_api.sh
Normal file
370
test/scripts/test_moderation_api.sh
Normal file
@@ -0,0 +1,370 @@
|
||||
#!/bin/bash
|
||||
|
||||
RED='\033[0;31m'
|
||||
GREEN='\033[0;32m'
|
||||
YELLOW='\033[1;33m'
|
||||
BLUE='\033[0;34m'
|
||||
NC='\033[0m'
|
||||
|
||||
BASE_URL="http://localhost:8080"
|
||||
|
||||
log_info() { echo -e "${BLUE}[INFO]${NC} $1"; }
|
||||
log_success() { echo -e "${GREEN}[SUCCESS]${NC} $1"; }
|
||||
log_error() { echo -e "${RED}[ERROR]${NC} $1"; }
|
||||
|
||||
extract_json() {
|
||||
echo "$1" | grep -o "\"$2\":\"[^\"]*\"" | head -1 | sed "s/\"$2\":\"//;s/\"$//"
|
||||
}
|
||||
|
||||
http_post() {
|
||||
local url=$1; local data=$2; local token=$3
|
||||
if [ -n "$token" ]; then
|
||||
curl -s -X POST "$url" -H "Content-Type: application/json" -H "Authorization: Bearer $token" -d "$data"
|
||||
else
|
||||
curl -s -X POST "$url" -H "Content-Type: application/json" -d "$data"
|
||||
fi
|
||||
}
|
||||
|
||||
http_get() {
|
||||
local url=$1; local token=$2
|
||||
if [ -n "$token" ]; then
|
||||
curl -s -X GET "$url" -H "Authorization: Bearer $token"
|
||||
else
|
||||
curl -s -X GET "$url"
|
||||
fi
|
||||
}
|
||||
|
||||
http_put() {
|
||||
local url=$1; local data=$2; local token=$3
|
||||
curl -s -X PUT "$url" -H "Content-Type: application/json" -H "Authorization: Bearer $token" -d "$data"
|
||||
}
|
||||
|
||||
http_delete() {
|
||||
local url=$1; local token=$2
|
||||
curl -s -X DELETE "$url" -H "Authorization: Bearer $token"
|
||||
}
|
||||
|
||||
echo "============================================================"
|
||||
echo " EVENTHUB MODERATION API TEST SCRIPT"
|
||||
echo "============================================================"
|
||||
echo ""
|
||||
|
||||
log_info "Checking if server is running..."
|
||||
if ! curl -s "$BASE_URL/health" | grep -q "ok"; then
|
||||
log_error "Server is not running"
|
||||
exit 1
|
||||
fi
|
||||
log_success "Server is running"
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "STEP 1: Create test users"
|
||||
log_info "============================================================"
|
||||
|
||||
# Админ (первый пользователь)
|
||||
ADMIN_EMAIL="mod_admin_$(date +%s)@example.com"
|
||||
ADMIN_PASSWORD="admin123"
|
||||
|
||||
log_info "Creating admin user..."
|
||||
response=$(http_post "$BASE_URL/v1/register" "{\"email\":\"$ADMIN_EMAIL\",\"password\":\"$ADMIN_PASSWORD\"}" "")
|
||||
ADMIN_TOKEN=$(extract_json "$response" "token")
|
||||
ADMIN_ID=$(extract_json "$response" "id")
|
||||
log_success "Admin created"
|
||||
|
||||
# Владелец календаря
|
||||
OWNER_EMAIL="mod_owner_$(date +%s)@example.com"
|
||||
OWNER_PASSWORD="owner123"
|
||||
|
||||
log_info "Creating calendar owner..."
|
||||
response=$(http_post "$BASE_URL/v1/register" "{\"email\":\"$OWNER_EMAIL\",\"password\":\"$OWNER_PASSWORD\"}" "")
|
||||
OWNER_TOKEN=$(extract_json "$response" "token")
|
||||
OWNER_ID=$(extract_json "$response" "id")
|
||||
log_success "Owner created"
|
||||
|
||||
# Пользователь 1 (репортер)
|
||||
USER1_EMAIL="mod_user1_$(date +%s)@example.com"
|
||||
USER1_PASSWORD="user1_123"
|
||||
|
||||
log_info "Creating user 1..."
|
||||
response=$(http_post "$BASE_URL/v1/register" "{\"email\":\"$USER1_EMAIL\",\"password\":\"$USER1_PASSWORD\"}" "")
|
||||
USER1_TOKEN=$(extract_json "$response" "token")
|
||||
log_success "User 1 created"
|
||||
|
||||
# Пользователь 2 (репортер)
|
||||
USER2_EMAIL="mod_user2_$(date +%s)@example.com"
|
||||
USER2_PASSWORD="user2_123"
|
||||
|
||||
log_info "Creating user 2..."
|
||||
response=$(http_post "$BASE_URL/v1/register" "{\"email\":\"$USER2_EMAIL\",\"password\":\"$USER2_PASSWORD\"}" "")
|
||||
USER2_TOKEN=$(extract_json "$response" "token")
|
||||
log_success "User 2 created"
|
||||
|
||||
# Пользователь 3 (для третьего репорта)
|
||||
USER3_EMAIL="mod_user3_$(date +%s)@example.com"
|
||||
USER3_PASSWORD="user3_123"
|
||||
|
||||
log_info "Creating user 3..."
|
||||
response=$(http_post "$BASE_URL/v1/register" "{\"email\":\"$USER3_EMAIL\",\"password\":\"$USER3_PASSWORD\"}" "")
|
||||
USER3_TOKEN=$(extract_json "$response" "token")
|
||||
log_success "User 3 created"
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "STEP 2: Create calendar and event"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Creating calendar..."
|
||||
response=$(http_post "$BASE_URL/v1/calendars" \
|
||||
"{\"title\":\"Moderation Test Calendar\"}" "$OWNER_TOKEN")
|
||||
CALENDAR_ID=$(extract_json "$response" "id")
|
||||
log_success "Calendar created: $CALENDAR_ID"
|
||||
|
||||
log_info "Creating event..."
|
||||
EVENT_START="2026-06-01T10:00:00Z"
|
||||
response=$(http_post "$BASE_URL/v1/calendars/$CALENDAR_ID/events" \
|
||||
"{\"title\":\"Test Event\",\"start_time\":\"$EVENT_START\",\"duration\":60}" "$OWNER_TOKEN")
|
||||
EVENT_ID=$(extract_json "$response" "id")
|
||||
log_success "Event created: $EVENT_ID"
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 1: Create report for event"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "User 1 reporting event..."
|
||||
response=$(http_post "$BASE_URL/v1/reports" \
|
||||
"{\"target_type\":\"event\",\"target_id\":\"$EVENT_ID\",\"reason\":\"Inappropriate content\"}" "$USER1_TOKEN")
|
||||
REPORT1_ID=$(extract_json "$response" "id")
|
||||
|
||||
if [ -n "$REPORT1_ID" ]; then
|
||||
log_success "Report created: $REPORT1_ID"
|
||||
else
|
||||
log_error "Failed to create report: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 2: Create second report"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "User 2 reporting same event..."
|
||||
response=$(http_post "$BASE_URL/v1/reports" \
|
||||
"{\"target_type\":\"event\",\"target_id\":\"$EVENT_ID\",\"reason\":\"Spam\"}" "$USER2_TOKEN")
|
||||
REPORT2_ID=$(extract_json "$response" "id")
|
||||
|
||||
if [ -n "$REPORT2_ID" ]; then
|
||||
log_success "Second report created: $REPORT2_ID"
|
||||
else
|
||||
log_error "Failed to create report: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 3: Admin views all reports"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin getting all reports..."
|
||||
response=$(http_get "$BASE_URL/v1/admin/reports" "$ADMIN_TOKEN")
|
||||
REPORT_COUNT=$(echo "$response" | grep -o "\"id\"" | wc -l)
|
||||
|
||||
if [ "$REPORT_COUNT" -ge 2 ]; then
|
||||
log_success "Admin sees $REPORT_COUNT reports"
|
||||
else
|
||||
log_error "Admin should see reports, found $REPORT_COUNT"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 4: Admin views reports for specific event"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin getting reports for event..."
|
||||
response=$(http_get "$BASE_URL/v1/admin/reports?target_type=event&target_id=$EVENT_ID" "$ADMIN_TOKEN")
|
||||
EVENT_REPORT_COUNT=$(echo "$response" | grep -o "\"id\"" | wc -l)
|
||||
|
||||
if [ "$EVENT_REPORT_COUNT" -eq 2 ]; then
|
||||
log_success "Admin sees $EVENT_REPORT_COUNT reports for event"
|
||||
else
|
||||
log_error "Expected 2 reports, found $EVENT_REPORT_COUNT"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 5: Auto-freeze by reports (threshold 3)"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "User 3 creating third report for event..."
|
||||
response=$(http_post "$BASE_URL/v1/reports" \
|
||||
"{\"target_type\":\"event\",\"target_id\":\"$EVENT_ID\",\"reason\":\"Bad content\"}" "$USER3_TOKEN")
|
||||
REPORT3_ID=$(extract_json "$response" "id")
|
||||
|
||||
if [ -n "$REPORT3_ID" ]; then
|
||||
log_success "Third report created: $REPORT3_ID"
|
||||
else
|
||||
log_error "Failed to create third report"
|
||||
fi
|
||||
|
||||
sleep 1
|
||||
|
||||
log_info "Checking if event was auto-frozen..."
|
||||
response=$(http_get "$BASE_URL/v1/events/$EVENT_ID" "$OWNER_TOKEN")
|
||||
EVENT_STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
|
||||
if [ "$EVENT_STATUS" = "frozen" ]; then
|
||||
log_success "Event auto-frozen after 3 reports"
|
||||
else
|
||||
log_error "Event not auto-frozen: status=$EVENT_STATUS"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 6: Admin resolves report (review)"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin reviewing first report..."
|
||||
response=$(http_put "$BASE_URL/v1/admin/reports/$REPORT1_ID" \
|
||||
"{\"action\":\"review\"}" "$ADMIN_TOKEN")
|
||||
|
||||
STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
if [ "$STATUS" = "reviewed" ]; then
|
||||
log_success "Report marked as reviewed"
|
||||
else
|
||||
log_error "Failed to review report: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 7: Admin resolves report (dismiss)"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin dismissing second report..."
|
||||
response=$(http_put "$BASE_URL/v1/admin/reports/$REPORT2_ID" \
|
||||
"{\"action\":\"dismiss\"}" "$ADMIN_TOKEN")
|
||||
|
||||
STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
if [ "$STATUS" = "dismissed" ]; then
|
||||
log_success "Report dismissed"
|
||||
else
|
||||
log_error "Failed to dismiss report: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 8: Admin adds banned words"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin adding banned word 'spam'..."
|
||||
response=$(http_post "$BASE_URL/v1/admin/banned-words" \
|
||||
"{\"word\":\"spam\"}" "$ADMIN_TOKEN")
|
||||
|
||||
if echo "$response" | grep -q "added"; then
|
||||
log_success "Banned word added"
|
||||
else
|
||||
log_error "Failed to add banned word: $response"
|
||||
fi
|
||||
|
||||
log_info "Admin adding banned word 'inappropriate'..."
|
||||
http_post "$BASE_URL/v1/admin/banned-words" "{\"word\":\"inappropriate\"}" "$ADMIN_TOKEN" > /dev/null
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 9: Admin lists banned words"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin getting banned words..."
|
||||
response=$(http_get "$BASE_URL/v1/admin/banned-words" "$ADMIN_TOKEN")
|
||||
if echo "$response" | grep -q "spam"; then
|
||||
log_success "Banned words retrieved"
|
||||
else
|
||||
log_error "Failed to get banned words: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 10: Admin removes banned word"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin removing banned word 'inappropriate'..."
|
||||
response=$(http_delete "$BASE_URL/v1/admin/banned-words/inappropriate" "$ADMIN_TOKEN")
|
||||
|
||||
if echo "$response" | grep -q "removed"; then
|
||||
log_success "Banned word removed"
|
||||
else
|
||||
log_error "Failed to remove banned word: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 11: Admin freezes calendar"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin freezing calendar..."
|
||||
response=$(http_put "$BASE_URL/v1/admin/calendars/$CALENDAR_ID" \
|
||||
"{\"action\":\"freeze\"}" "$ADMIN_TOKEN")
|
||||
|
||||
CAL_STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
if [ "$CAL_STATUS" = "frozen" ]; then
|
||||
log_success "Calendar frozen"
|
||||
else
|
||||
log_error "Failed to freeze calendar: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 12: Admin unfreezes calendar"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin unfreezing calendar..."
|
||||
response=$(http_put "$BASE_URL/v1/admin/calendars/$CALENDAR_ID" \
|
||||
"{\"action\":\"unfreeze\"}" "$ADMIN_TOKEN")
|
||||
|
||||
CAL_STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
if [ "$CAL_STATUS" = "active" ]; then
|
||||
log_success "Calendar unfrozen"
|
||||
else
|
||||
log_error "Failed to unfreeze calendar: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 13: Admin freezes event"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin freezing event..."
|
||||
response=$(http_put "$BASE_URL/v1/admin/events/$EVENT_ID" \
|
||||
"{\"action\":\"freeze\"}" "$ADMIN_TOKEN")
|
||||
|
||||
EVENT_STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
if [ "$EVENT_STATUS" = "frozen" ]; then
|
||||
log_success "Event frozen"
|
||||
else
|
||||
log_error "Failed to freeze event: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
log_info "============================================================"
|
||||
log_info "TEST 14: Admin unfreezes event"
|
||||
log_info "============================================================"
|
||||
|
||||
log_info "Admin unfreezing event..."
|
||||
response=$(http_put "$BASE_URL/v1/admin/events/$EVENT_ID" \
|
||||
"{\"action\":\"unfreeze\"}" "$ADMIN_TOKEN")
|
||||
|
||||
EVENT_STATUS=$(echo "$response" | grep -o "\"status\":\"[^\"]*\"" | sed 's/"status":"//;s/"//')
|
||||
if [ "$EVENT_STATUS" = "active" ]; then
|
||||
log_success "Event unfrozen"
|
||||
else
|
||||
log_error "Failed to unfreeze event: $response"
|
||||
fi
|
||||
|
||||
echo ""
|
||||
echo "============================================================"
|
||||
log_success "MODERATION API TESTS COMPLETED!"
|
||||
echo "============================================================"
|
||||
echo ""
|
||||
echo "Summary of created resources:"
|
||||
echo " Admin: $ADMIN_EMAIL"
|
||||
echo " Owner: $OWNER_EMAIL"
|
||||
echo " Calendar: $CALENDAR_ID"
|
||||
echo " Event: $EVENT_ID"
|
||||
echo ""
|
||||
Reference in New Issue
Block a user