2025-03-23 16:37:43 -04:00
|
|
|
use bitflags::bitflags;
|
|
|
|
use serde::{
|
|
|
|
Deserialize, Deserializer, Serialize,
|
|
|
|
de::{Error as DeError, Visitor},
|
|
|
|
};
|
|
|
|
|
|
|
|
bitflags! {
|
|
|
|
/// Fine-grained permissions built using bitwise operations.
|
|
|
|
#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]
|
|
|
|
pub struct FinePermission: u32 {
|
|
|
|
const DEFAULT = 1 << 0;
|
|
|
|
const ADMINISTRATOR = 1 << 1;
|
2025-03-29 00:26:56 -04:00
|
|
|
const MANAGE_COMMUNITIES = 1 << 2;
|
|
|
|
const MANAGE_POSTS = 1 << 3;
|
2025-03-27 19:08:34 -04:00
|
|
|
const MANAGE_POST_REPLIES = 1 << 4;
|
2025-03-23 16:37:43 -04:00
|
|
|
const MANAGE_USERS = 1 << 5;
|
2025-04-03 11:22:56 -04:00
|
|
|
const MANAGE_BANS = 1 << 6;
|
2025-03-23 16:37:43 -04:00
|
|
|
const MANAGE_WARNINGS = 1 << 7;
|
|
|
|
const MANAGE_NOTIFICATIONS = 1 << 8;
|
|
|
|
const VIEW_REPORTS = 1 << 9;
|
|
|
|
const VIEW_AUDIT_LOG = 1 << 10;
|
2025-03-24 20:19:12 -04:00
|
|
|
const MANAGE_MEMBERSHIPS = 1 << 11;
|
2025-03-24 22:42:33 -04:00
|
|
|
const MANAGE_REACTIONS = 1 << 12;
|
2025-03-25 21:19:55 -04:00
|
|
|
const MANAGE_FOLLOWS = 1 << 13;
|
2025-03-26 21:46:21 -04:00
|
|
|
const MANAGE_VERIFIED = 1 << 14;
|
2025-04-01 23:16:09 -04:00
|
|
|
const MANAGE_AUDITLOG = 1 << 15;
|
|
|
|
const MANAGE_REPORTS = 1 << 16;
|
2025-04-02 11:39:51 -04:00
|
|
|
const BANNED = 1 << 17;
|
2025-04-04 21:42:08 -04:00
|
|
|
const INFINITE_COMMUNITIES = 1 << 18;
|
2025-04-06 13:43:12 -04:00
|
|
|
const SUPPORTER = 1 << 19;
|
2025-04-12 22:25:54 -04:00
|
|
|
const MANAGE_REQUESTS = 1 << 20;
|
|
|
|
const MANAGE_QUESTIONS = 1 << 21;
|
2025-04-25 16:22:38 -04:00
|
|
|
const MANAGE_CHANNELS = 1 << 22;
|
|
|
|
const MANAGE_MESSAGES = 1 << 23;
|
2025-03-23 16:37:43 -04:00
|
|
|
|
|
|
|
const _ = !0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Serialize for FinePermission {
|
|
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
|
|
where
|
|
|
|
S: serde::Serializer,
|
|
|
|
{
|
|
|
|
serializer.serialize_u32(self.bits())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct FinePermissionVisitor;
|
2025-04-10 18:16:52 -04:00
|
|
|
impl Visitor<'_> for FinePermissionVisitor {
|
2025-03-23 16:37:43 -04:00
|
|
|
type Value = FinePermission;
|
|
|
|
|
|
|
|
fn expecting(&self, formatter: &mut std::fmt::Formatter) -> std::fmt::Result {
|
|
|
|
formatter.write_str("u32")
|
|
|
|
}
|
|
|
|
|
|
|
|
fn visit_u32<E>(self, value: u32) -> Result<Self::Value, E>
|
|
|
|
where
|
|
|
|
E: DeError,
|
|
|
|
{
|
|
|
|
if let Some(permission) = FinePermission::from_bits(value) {
|
|
|
|
Ok(permission)
|
|
|
|
} else {
|
|
|
|
Ok(FinePermission::from_bits_retain(value))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn visit_i32<E>(self, value: i32) -> Result<Self::Value, E>
|
|
|
|
where
|
|
|
|
E: DeError,
|
|
|
|
{
|
|
|
|
if let Some(permission) = FinePermission::from_bits(value as u32) {
|
|
|
|
Ok(permission)
|
|
|
|
} else {
|
|
|
|
Ok(FinePermission::from_bits_retain(value as u32))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn visit_u64<E>(self, value: u64) -> Result<Self::Value, E>
|
|
|
|
where
|
|
|
|
E: DeError,
|
|
|
|
{
|
|
|
|
if let Some(permission) = FinePermission::from_bits(value as u32) {
|
|
|
|
Ok(permission)
|
|
|
|
} else {
|
|
|
|
Ok(FinePermission::from_bits_retain(value as u32))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'de> Deserialize<'de> for FinePermission {
|
|
|
|
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
|
|
|
|
where
|
|
|
|
D: Deserializer<'de>,
|
|
|
|
{
|
|
|
|
deserializer.deserialize_any(FinePermissionVisitor)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl FinePermission {
|
|
|
|
/// Join two [`FinePermission`]s into a single `u32`.
|
|
|
|
pub fn join(lhs: FinePermission, rhs: FinePermission) -> FinePermission {
|
|
|
|
lhs | rhs
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check if the given `input` contains the given [`FinePermission`].
|
|
|
|
pub fn check(self, permission: FinePermission) -> bool {
|
|
|
|
if (self & FinePermission::ADMINISTRATOR) == FinePermission::ADMINISTRATOR {
|
|
|
|
// has administrator permission, meaning everything else is automatically true
|
|
|
|
return true;
|
2025-04-02 11:39:51 -04:00
|
|
|
} else if self.check_banned() {
|
|
|
|
// has banned permission, meaning everything else is automatically false
|
|
|
|
return false;
|
2025-03-23 16:37:43 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
(self & permission) == permission
|
|
|
|
}
|
|
|
|
|
2025-03-24 20:19:12 -04:00
|
|
|
/// Check if the given [`FinePermission`] qualifies as "Helper" status.
|
2025-03-23 16:37:43 -04:00
|
|
|
pub fn check_helper(self) -> bool {
|
2025-03-29 00:26:56 -04:00
|
|
|
self.check(FinePermission::MANAGE_COMMUNITIES)
|
|
|
|
&& self.check(FinePermission::MANAGE_POSTS)
|
2025-03-27 19:08:34 -04:00
|
|
|
&& self.check(FinePermission::MANAGE_POST_REPLIES)
|
2025-03-23 16:37:43 -04:00
|
|
|
&& self.check(FinePermission::MANAGE_WARNINGS)
|
|
|
|
&& self.check(FinePermission::VIEW_REPORTS)
|
|
|
|
&& self.check(FinePermission::VIEW_AUDIT_LOG)
|
|
|
|
}
|
|
|
|
|
2025-03-24 20:19:12 -04:00
|
|
|
/// Check if the given [`FinePermission`] qualifies as "Manager" status.
|
2025-03-23 16:37:43 -04:00
|
|
|
pub fn check_manager(self) -> bool {
|
2025-04-02 11:39:51 -04:00
|
|
|
self.check_helper() && self.check(FinePermission::MANAGE_USERS)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check if the given [`FinePermission`] qualifies as "Administrator" status.
|
|
|
|
pub fn check_admin(self) -> bool {
|
|
|
|
self.check_manager() && self.check(FinePermission::ADMINISTRATOR)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check if the given [`FinePermission`] qualifies as "Banned" status.
|
|
|
|
pub fn check_banned(self) -> bool {
|
|
|
|
(self & FinePermission::BANNED) == FinePermission::BANNED
|
2025-03-23 16:37:43 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Default for FinePermission {
|
|
|
|
fn default() -> Self {
|
|
|
|
Self::DEFAULT
|
|
|
|
}
|
|
|
|
}
|