mirror of
https://github.com/ZeppelinBot/Zeppelin.git
synced 2025-07-10 12:37:19 +00:00

* update pkgs
Signed-off-by: GitHub <noreply@github.com>
* new knub typings
Signed-off-by: GitHub <noreply@github.com>
* more pkg updates
Signed-off-by: GitHub <noreply@github.com>
* more fixes
Signed-off-by: GitHub <noreply@github.com>
* channel typings
Signed-off-by: GitHub <noreply@github.com>
* more message utils typings fixes
Signed-off-by: GitHub <noreply@github.com>
* migrate permissions
Signed-off-by: GitHub <noreply@github.com>
* fix: InternalPoster webhookables
Signed-off-by: GitHub <noreply@github.com>
* djs typings: Attachment & Util
Signed-off-by: GitHub <noreply@github.com>
* more typings
Signed-off-by: GitHub <noreply@github.com>
* fix: rename permissionNames
Signed-off-by: GitHub <noreply@github.com>
* more fixes
Signed-off-by: GitHub <noreply@github.com>
* half the number of errors
* knub commands => messageCommands
Signed-off-by: GitHub <noreply@github.com>
* configPreprocessor => configParser
Signed-off-by: GitHub <noreply@github.com>
* fix channel.messages
Signed-off-by: GitHub <noreply@github.com>
* revert automod any typing
Signed-off-by: GitHub <noreply@github.com>
* more configParser typings
Signed-off-by: GitHub <noreply@github.com>
* revert
Signed-off-by: GitHub <noreply@github.com>
* remove knub type params
Signed-off-by: GitHub <noreply@github.com>
* fix more MessageEmbed / MessageOptions
Signed-off-by: GitHub <noreply@github.com>
* dumb commit for @almeidx to see why this is stupid
Signed-off-by: GitHub <noreply@github.com>
* temp disable custom_events
Signed-off-by: GitHub <noreply@github.com>
* more minor typings fixes - 23 err left
Signed-off-by: GitHub <noreply@github.com>
* update djs dep
* +debug build method (revert this)
Signed-off-by: GitHub <noreply@github.com>
* Revert "+debug build method (revert this)"
This reverts commit a80af1e729
.
* Redo +debug build (Revert this)
Signed-off-by: GitHub <noreply@github.com>
* uniform before/after Load shorthands
Signed-off-by: GitHub <noreply@github.com>
* remove unused imports & add prettier plugin
Signed-off-by: GitHub <noreply@github.com>
* env fixes for web platform hosting
Signed-off-by: GitHub <noreply@github.com>
* feat: knub v32-next; related fixes
* fix: allow legacy keys in change_perms action
* fix: request Message Content intent
* fix: use Knub's config validation logic in API
* fix(dashboard): fix error when there are no message and/or slash commands in a plugin
* fix(automod): start_thread action thread options
* fix(CustomEvents): message command types
* chore: remove unneeded type annotation
* feat: add forum channel icon; use thread icon for news threads
* chore: make tslint happy
* chore: fix formatting
---------
Signed-off-by: GitHub <noreply@github.com>
Co-authored-by: almeidx <almeidx@pm.me>
Co-authored-by: Dragory <2606411+Dragory@users.noreply.github.com>
147 lines
4.2 KiB
TypeScript
147 lines
4.2 KiB
TypeScript
import { ApiPermissions } from "@shared/apiPermissions";
|
|
import { getRepository, Repository } from "typeorm";
|
|
import { ApiAuditLog } from "./ApiAuditLog";
|
|
import { AuditLogEventTypes } from "./apiAuditLogTypes";
|
|
import { BaseRepository } from "./BaseRepository";
|
|
import { ApiPermissionAssignment } from "./entities/ApiPermissionAssignment";
|
|
|
|
export enum ApiPermissionTypes {
|
|
User = "USER",
|
|
Role = "ROLE",
|
|
}
|
|
|
|
export class ApiPermissionAssignments extends BaseRepository {
|
|
private apiPermissions: Repository<ApiPermissionAssignment>;
|
|
private auditLogs: ApiAuditLog;
|
|
|
|
constructor() {
|
|
super();
|
|
this.apiPermissions = getRepository(ApiPermissionAssignment);
|
|
this.auditLogs = new ApiAuditLog();
|
|
}
|
|
|
|
getByGuildId(guildId) {
|
|
return this.apiPermissions.find({
|
|
where: {
|
|
guild_id: guildId,
|
|
},
|
|
});
|
|
}
|
|
|
|
getByUserId(userId) {
|
|
return this.apiPermissions.find({
|
|
where: {
|
|
type: ApiPermissionTypes.User,
|
|
target_id: userId,
|
|
},
|
|
});
|
|
}
|
|
|
|
getByGuildAndUserId(guildId, userId) {
|
|
return this.apiPermissions.findOne({
|
|
where: {
|
|
guild_id: guildId,
|
|
type: ApiPermissionTypes.User,
|
|
target_id: userId,
|
|
},
|
|
});
|
|
}
|
|
|
|
addUser(guildId, userId, permissions: ApiPermissions[], expiresAt: string | null = null) {
|
|
return this.apiPermissions.insert({
|
|
guild_id: guildId,
|
|
type: ApiPermissionTypes.User,
|
|
target_id: userId,
|
|
permissions,
|
|
expires_at: expiresAt,
|
|
});
|
|
}
|
|
|
|
removeUser(guildId, userId) {
|
|
return this.apiPermissions.delete({ guild_id: guildId, type: ApiPermissionTypes.User, target_id: userId });
|
|
}
|
|
|
|
async updateUserPermissions(guildId: string, userId: string, permissions: ApiPermissions[]): Promise<void> {
|
|
await this.apiPermissions.update(
|
|
{
|
|
guild_id: guildId,
|
|
type: ApiPermissionTypes.User,
|
|
target_id: userId,
|
|
},
|
|
{
|
|
permissions,
|
|
},
|
|
);
|
|
}
|
|
|
|
async clearExpiredPermissions() {
|
|
await this.apiPermissions
|
|
.createQueryBuilder()
|
|
.where("expires_at IS NOT NULL")
|
|
.andWhere("expires_at <= NOW()")
|
|
.delete()
|
|
.execute();
|
|
}
|
|
|
|
async applyOwnerChange(guildId: string, newOwnerId: string) {
|
|
const existingPermissions = await this.getByGuildId(guildId);
|
|
let updatedOwner = false;
|
|
for (const perm of existingPermissions) {
|
|
let hasChanges = false;
|
|
|
|
// Remove owner permission from anyone who currently has it
|
|
if (perm.permissions.includes(ApiPermissions.Owner)) {
|
|
perm.permissions.splice(perm.permissions.indexOf(ApiPermissions.Owner), 1);
|
|
hasChanges = true;
|
|
}
|
|
|
|
// Add owner permission if we encounter the new owner
|
|
if (perm.type === ApiPermissionTypes.User && perm.target_id === newOwnerId) {
|
|
perm.permissions.push(ApiPermissions.Owner);
|
|
updatedOwner = true;
|
|
hasChanges = true;
|
|
}
|
|
|
|
if (hasChanges) {
|
|
const criteria = {
|
|
guild_id: perm.guild_id,
|
|
type: perm.type,
|
|
target_id: perm.target_id,
|
|
};
|
|
if (perm.permissions.length === 0) {
|
|
// No remaining permissions -> remove entry
|
|
this.auditLogs.addEntry(guildId, "0", AuditLogEventTypes.REMOVE_API_PERMISSION, {
|
|
type: perm.type,
|
|
target_id: perm.target_id,
|
|
});
|
|
await this.apiPermissions.delete(criteria);
|
|
} else {
|
|
this.auditLogs.addEntry(guildId, "0", AuditLogEventTypes.EDIT_API_PERMISSION, {
|
|
type: perm.type,
|
|
target_id: perm.target_id,
|
|
permissions: perm.permissions,
|
|
expires_at: perm.expires_at,
|
|
});
|
|
await this.apiPermissions.update(criteria, {
|
|
permissions: perm.permissions,
|
|
});
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!updatedOwner) {
|
|
this.auditLogs.addEntry(guildId, "0", AuditLogEventTypes.ADD_API_PERMISSION, {
|
|
type: ApiPermissionTypes.User,
|
|
target_id: newOwnerId,
|
|
permissions: [ApiPermissions.Owner],
|
|
expires_at: null,
|
|
});
|
|
await this.apiPermissions.insert({
|
|
guild_id: guildId,
|
|
type: ApiPermissionTypes.User,
|
|
target_id: newOwnerId,
|
|
permissions: [ApiPermissions.Owner],
|
|
});
|
|
}
|
|
}
|
|
}
|