twilight_util/permission_calculator/
mod.rs

1//! Calculate the permissions of a member on a guild-level or a channel-level.
2//!
3//! # Examples
4//!
5//! ## Calculating member permissions in a channel
6//!
7//! Take a scenario where a member has two roles: the `@everyone` role (with the
8//! same ID as the guild) that grants the [View Channel] permission across the
9//! whole guild, and a second role that grants the [Send Messages] permission
10//! across the whole guild. This means that - across the server - the member
11//! will have the [View Channel] and [Send Messages] permissions, unless denied
12//! or expanded by channel-specific permission overwrites.
13//!
14//! In a given channel, there are two permission overwrites: one for the
15//! `@everyone` role and one for the member itself. These overwrites look
16//! like:
17//!
18//! - `@everyone` role is allowed the [Embed Links] and [Add Reactions]
19//!   permissions; and
20//! - member is denied the [Send Messages] permission.
21//!
22//! Taking into account the guild root-level permissions and the permission
23//! overwrites, the end result is that in the specified channel the user has
24//! the [View Channel], [Embed Links], and [Add Reactions] permission, but is
25//! denied the [Send Messages] permission that their second role was granted on
26//! a root level.
27//!
28//! Let's see that in code:
29//!
30//! ```
31//! use twilight_model::{
32//!     channel::{
33//!         permission_overwrite::{PermissionOverwrite, PermissionOverwriteType},
34//!         ChannelType,
35//!     },
36//!     guild::Permissions,
37//!     id::Id,
38//! };
39//! use twilight_util::permission_calculator::PermissionCalculator;
40//!
41//! let guild_id = Id::new(1);
42//! let user_id = Id::new(3);
43//!
44//! // Guild-level @everyone role that, by default, allows everyone to view
45//! // channels.
46//! let everyone_role = Permissions::VIEW_CHANNEL;
47//!
48//! // Roles that the member has assigned to them and their permissions. This
49//! // should not include the `@everyone` role.
50//! let member_roles = &[
51//!     // Guild-level permission that grants members with the role the Send
52//!     // Messages permission.
53//!     (Id::new(2), Permissions::SEND_MESSAGES),
54//! ];
55//!
56//! let channel_overwrites = &[
57//!     // All members are given the Add Reactions and Embed Links members via
58//!     // the `@everyone` role.
59//!     PermissionOverwrite {
60//!         allow: Permissions::ADD_REACTIONS | Permissions::EMBED_LINKS,
61//!         deny: Permissions::empty(),
62//!         id: Id::new(1),
63//!         kind: PermissionOverwriteType::Role,
64//!     },
65//!     // Member is denied the Send Messages permission.
66//!     PermissionOverwrite {
67//!         allow: Permissions::empty(),
68//!         deny: Permissions::SEND_MESSAGES,
69//!         id: user_id.cast(),
70//!         kind: PermissionOverwriteType::Member,
71//!     },
72//! ];
73//!
74//! let calculator = PermissionCalculator::new(guild_id, user_id, everyone_role, member_roles);
75//! let calculated_permissions = calculator.in_channel(ChannelType::GuildText, channel_overwrites);
76//!
77//! // Now that we've got the member's permissions in the channel, we can
78//! // check that they have the server-wide View Channel permission and
79//! // the Add Reactions permission granted, but their guild-wide Send Messages
80//! // permission was denied. Additionally, since the user can't send messages,
81//! // their Embed Links permission was removed.
82//!
83//! let expected = Permissions::ADD_REACTIONS | Permissions::VIEW_CHANNEL;
84//! assert!(!calculated_permissions.contains(Permissions::EMBED_LINKS));
85//! assert!(!calculated_permissions.contains(Permissions::SEND_MESSAGES));
86//! assert_eq!(expected, calculated_permissions);
87//! ```
88//!
89//! [Add Reactions]: twilight_model::guild::Permissions::ADD_REACTIONS
90//! [Embed Links]: twilight_model::guild::Permissions::EMBED_LINKS
91//! [Send Messages]: twilight_model::guild::Permissions::SEND_MESSAGES
92//! [View Channel]: twilight_model::guild::Permissions::VIEW_CHANNEL
93
94mod bitops;
95mod preset;
96
97use self::preset::{
98    PERMISSIONS_MESSAGING, PERMISSIONS_ROOT_ONLY, PERMISSIONS_STAGE_OMIT, PERMISSIONS_TEXT_OMIT,
99    PERMISSIONS_VOICE_OMIT,
100};
101use twilight_model::{
102    channel::{
103        permission_overwrite::{PermissionOverwrite, PermissionOverwriteType},
104        ChannelType,
105    },
106    guild::Permissions,
107    id::{
108        marker::{GuildMarker, RoleMarker, UserMarker},
109        Id,
110    },
111};
112
113/// Calculate the permissions of a member.
114///
115/// Using the member calculator you can calculate the member's permissions in
116/// the [root-level][`root`] of a guild or [in a given channel][`in_channel`].
117///
118/// [`in_channel`]: Self::in_channel
119/// [`root`]: Self::root
120#[derive(Clone, Debug, Eq, PartialEq)]
121#[must_use = "calculators aren't useful if you don't calculate permissions"]
122pub struct PermissionCalculator<'a> {
123    /// Permissions of the `@everyone` role for the guild.
124    everyone_role: Permissions,
125    /// ID of the guild.
126    guild_id: Id<GuildMarker>,
127    /// Slice of tuples of the member's roles and their permissions.
128    member_roles: &'a [(Id<RoleMarker>, Permissions)],
129    /// ID of the owner.
130    owner_id: Option<Id<UserMarker>>,
131    /// ID of the user whose permissions are being calculated.
132    user_id: Id<UserMarker>,
133}
134
135impl<'a> PermissionCalculator<'a> {
136    /// Create a calculator to calculate the permissions of a member.
137    ///
138    /// `everyone_role` is the permissions of the `@everyone` role on a
139    /// guild-level; the permissions may be empty. The `@everyone` role's ID is
140    /// the same as that of the `guild_id`.
141    ///
142    /// The provided member's roles *should not* contain the `@everyone` role.
143    #[must_use = "calculators should be used to calculate permissions"]
144    pub const fn new(
145        guild_id: Id<GuildMarker>,
146        user_id: Id<UserMarker>,
147        everyone_role: Permissions,
148        member_roles: &'a [(Id<RoleMarker>, Permissions)],
149    ) -> Self {
150        Self {
151            everyone_role,
152            guild_id,
153            owner_id: None,
154            member_roles,
155            user_id,
156        }
157    }
158
159    /// Configure the ID of the owner of the guild.
160    ///
161    /// This should be used if you don't want to manually take the user ID and
162    /// owner ID in account beforehand.
163    ///
164    /// If the member's ID is the same as the owner's ID then permission
165    /// calculating methods such as [`root`] will return all permissions
166    /// enabled.
167    ///
168    /// [`root`]: Self::root
169    #[must_use = "calculators should be used to calculate permissions"]
170    pub const fn owner_id(mut self, owner_id: Id<UserMarker>) -> Self {
171        self.owner_id = Some(owner_id);
172
173        self
174    }
175
176    /// Calculate the guild-level permissions of a member.
177    #[must_use = "calculating permissions is only useful if they're used"]
178    pub const fn root(&self) -> Permissions {
179        // If the user is the owner, then we can just return all of the
180        // permissions.
181        if matches!(self.owner_id, Some(id) if id.get() == self.user_id.get()) {
182            return Permissions::all();
183        }
184
185        // If the `@everyone` role has the `ADMINISTRATOR` permission for some
186        // reason, then we can just return all permissions.
187        if self.everyone_role.contains(Permissions::ADMINISTRATOR) {
188            return Permissions::all();
189        }
190
191        // The permissions that the @everyone role has is the baseline.
192        let mut permissions = self.everyone_role;
193
194        // At time of writing `const` functions don't support `for` loops, so we
195        // use a `while` loop.
196        let member_role_count = self.member_roles.len();
197        let mut idx = 0;
198
199        // Loop over all of the member's roles, adding them to the total
200        // permissions. Role permissions are only additive.
201        //
202        // If one of the roles contains the `ADMINISTRATOR` permission then the
203        // loop can be short-circuited.
204        while idx < member_role_count {
205            let (_, role_permissions) = self.member_roles[idx];
206
207            if role_permissions.contains(Permissions::ADMINISTRATOR) {
208                return Permissions::all();
209            }
210
211            permissions = bitops::insert(permissions, role_permissions);
212            idx += 1;
213        }
214
215        permissions
216    }
217
218    /// Calculate the permissions of the member in a channel, taking into
219    /// account a combination of the guild-level permissions and channel-level
220    /// permissions.
221    ///
222    /// **Note** that this method will not return guild-level permissions such
223    /// as [Manage Guild Expressions]; if you need the guild-level permissions
224    /// use [`root`].
225    ///
226    /// # Conditional exclusions
227    ///
228    /// When the member doesn't have the "View Channel" permission then an empty
229    /// permission set will be returned. This will happen in the following
230    /// circumstances:
231    ///
232    /// - When the permission is denied on the role level and
233    ///   isn't enabled on a role or member permission overwrite;
234    /// - When the permission is denied on a role permission overwrite but isn't
235    ///   enabled on a member permission overwrite; or
236    /// - When permission isn't enabled on a guild level and isn't enabled via a
237    ///   permission overwrite.
238    ///
239    /// When the [Send Messages] permission is denied and is not similarly
240    /// enabled like above then the [Attach Files], [Embed Links],
241    /// [Mention Everyone], and [Send TTS Messages] permissions will not be
242    /// present in the returned permission set.
243    ///
244    /// # Channel-based exclusions
245    ///
246    /// Permissions are removed based on the type of a channel. For example,
247    /// when calculating the permissions of a voice channel we can know that if
248    /// [Send Messages] is granted on a guild-level to everyone then it is
249    /// omitted from the permissions for a specific channel.
250    ///
251    /// ## Stage Channels
252    ///
253    /// When the given channel type is a guild stage channel then the
254    /// following permissions will be removed:
255    ///
256    /// - [Add Reactions]
257    /// - [Attach Files]
258    /// - [Deafen Members]
259    /// - [Embed Links]
260    /// - [Manage Webhooks]
261    /// - [Mention Everyone]
262    /// - [Priority Speaker]
263    /// - [Read Message History]
264    /// - [Send Messages]
265    /// - [Send TTS Messages]
266    /// - [Stream]
267    /// - [Speak]
268    /// - [Use External Emojis]
269    /// - [Use Slash Commands]
270    /// - [Use VAD]
271    ///
272    /// ## Text Channels
273    ///
274    /// When the given channel type is a guild text channel then the
275    /// following permissions will be removed:
276    ///
277    /// - [Connect]
278    /// - [Deafen Members]
279    /// - [Move Members]
280    /// - [Mute Members]
281    /// - [Priority Speaker]
282    /// - [Request To Speak]
283    /// - [Speak]
284    /// - [Stream]
285    /// - [Use VAD]
286    ///
287    /// # Voice Channels
288    ///
289    /// When the given channel type is a guild voice channel then the
290    /// following permissions will be removed:
291    ///
292    /// - [Add Reactions]
293    /// - [Attach Files]
294    /// - [Embed Links]
295    /// - [Manage Messages]
296    /// - [Manage Webhooks]
297    /// - [Mention Everyone]
298    /// - [Read Message History]
299    /// - [Request To Speak]
300    /// - [Send Messages]
301    /// - [Send TTS Messages]
302    /// - [Use External Emojis]
303    /// - [Use Slash Commands]
304    ///
305    /// # Guild-based exclusions
306    ///
307    /// The following guild-level permissions will always be removed:
308    ///
309    /// - [Administrator]
310    /// - [Ban Members]
311    /// - [Change Nickname]
312    /// - [Kick Members]
313    /// - [Manage Guild Expressions]
314    /// - [Manage Guild]
315    /// - [Manage Nicknames]
316    /// - [View Audit Log]
317    /// - [View Guild Insights]
318    ///
319    /// If you need to know a member's guild-level permissions - such as whether
320    /// they have the [View Audit Log] permission - use [`root`] instead.
321    ///
322    /// # Examples
323    ///
324    /// See the crate-level documentation for an example.
325    ///
326    /// [`root`]: Self::root
327    /// [Administrator]: twilight_model::guild::Permissions::ADMINISTRATOR
328    /// [Add Reactions]: twilight_model::guild::Permissions::ADD_REACTIONS
329    /// [Attach Files]: twilight_model::guild::Permissions::ATTACH_FILES
330    /// [Ban Members]: twilight_model::guild::Permissions::BAN_MEMBERS
331    /// [Change Nickname]: twilight_model::guild::Permissions::CHANGE_NICKNAME
332    /// [Connect]: twilight_model::guild::Permissions::CONNECT
333    /// [Deafen Members]: twilight_model::guild::Permissions::DEAFEN_MEMBERS
334    /// [Embed Links]: twilight_model::guild::Permissions::EMBED_LINKS
335    /// [Kick Members]: twilight_model::guild::Permissions::KICK_MEMBERS
336    /// [Manage Guild Expressions]: twilight_model::guild::Permissions::MANAGE_GUILD_EXPRESSIONS
337    /// [Manage Guild]: twilight_model::guild::Permissions::MANAGE_GUILD
338    /// [Manage Messages]: twilight_model::guild::Permissions::MANAGE_MESSAGES
339    /// [Manage Nicknames]: twilight_model::guild::Permissions::MANAGE_NICKNAMES
340    /// [Manage Webhooks]: twilight_model::guild::Permissions::MANAGE_WEBHOOKS
341    /// [Mention Everyone]: twilight_model::guild::Permissions::MENTION_EVERYONE
342    /// [Move Members]: twilight_model::guild::Permissions::MOVE_MEMBERS
343    /// [Mute Members]: twilight_model::guild::Permissions::MUTE_MEMBERS
344    /// [Priority Speaker]: twilight_model::guild::Permissions::PRIORITY_SPEAKER
345    /// [Read Message History]: twilight_model::guild::Permissions::READ_MESSAGE_HISTORY
346    /// [Request To Speak]: twilight_model::guild::Permissions::REQUEST_TO_SPEAK
347    /// [Send Messages]: twilight_model::guild::Permissions::SEND_MESSAGES
348    /// [Send TTS Messages]: twilight_model::guild::Permissions::SEND_TTS_MESSAGES
349    /// [Speak]: twilight_model::guild::Permissions::SPEAK
350    /// [Stream]: twilight_model::guild::Permissions::STREAM
351    /// [Use External Emojis]: twilight_model::guild::Permissions::USE_EXTERNAL_EMOJIS
352    /// [Use Slash Commands]: twilight_model::guild::Permissions::USE_SLASH_COMMANDS
353    /// [Use VAD]: twilight_model::guild::Permissions::USE_VAD
354    /// [View Audit Log]: twilight_model::guild::Permissions::VIEW_AUDIT_LOG
355    /// [View Guild Insights]: twilight_model::guild::Permissions::VIEW_GUILD_INSIGHTS
356    #[must_use = "calculating permissions is only useful if they're used"]
357    pub const fn in_channel(
358        self,
359        channel_type: ChannelType,
360        channel_overwrites: &[PermissionOverwrite],
361    ) -> Permissions {
362        let mut permissions = self.root();
363
364        // If the user contains the administrator privilege from the calculated
365        // root permissions, then we do not need to do any more work.
366        if permissions.contains(Permissions::ADMINISTRATOR) {
367            return Permissions::all();
368        }
369
370        permissions = bitops::remove(permissions, PERMISSIONS_ROOT_ONLY);
371
372        permissions = process_permission_overwrites(
373            permissions,
374            channel_overwrites,
375            self.member_roles,
376            self.guild_id,
377            self.user_id,
378        );
379
380        // If the permission set is empty then we don't need to do any removals.
381        if permissions.is_empty() {
382            return permissions;
383        }
384
385        // Remove permissions that can't be used in a channel, i.e. are relevant
386        // to guild-level permission calculating.
387        permissions = bitops::remove(permissions, PERMISSIONS_ROOT_ONLY);
388
389        // Remove the permissions not used by a channel depending on the channel
390        // type.
391        if matches!(channel_type, ChannelType::GuildStageVoice) {
392            permissions = bitops::remove(permissions, PERMISSIONS_STAGE_OMIT);
393        } else if matches!(channel_type, ChannelType::GuildText) {
394            permissions = bitops::remove(permissions, PERMISSIONS_TEXT_OMIT);
395        } else if matches!(channel_type, ChannelType::GuildVoice) {
396            permissions = bitops::remove(permissions, PERMISSIONS_VOICE_OMIT);
397        }
398
399        permissions
400    }
401}
402
403const fn has_role(roles: &[(Id<RoleMarker>, Permissions)], role_id: Id<RoleMarker>) -> bool {
404    let len = roles.len();
405    let mut idx = 0;
406
407    while idx < len {
408        let (iter_role_id, _) = roles[idx];
409
410        if iter_role_id.get() == role_id.get() {
411            return true;
412        }
413
414        idx += 1;
415    }
416
417    false
418}
419
420const fn process_permission_overwrites(
421    mut permissions: Permissions,
422    channel_overwrites: &[PermissionOverwrite],
423    member_roles: &[(Id<RoleMarker>, Permissions)],
424    configured_guild_id: Id<GuildMarker>,
425    configured_user_id: Id<UserMarker>,
426) -> Permissions {
427    // Hierarchy documentation:
428    // <https://discord.com/developers/docs/topics/permissions>
429    let mut member_allow = Permissions::empty();
430    let mut member_deny = Permissions::empty();
431    let mut roles_allow = Permissions::empty();
432    let mut roles_deny = Permissions::empty();
433
434    let channel_overwrite_len = channel_overwrites.len();
435    let mut idx = 0;
436
437    while idx < channel_overwrite_len {
438        let overwrite = &channel_overwrites[idx];
439
440        match overwrite.kind {
441            PermissionOverwriteType::Role => {
442                // We need to process the @everyone role first, so apply it
443                // straight to the permissions. The other roles' permissions
444                // will be applied later.
445                if overwrite.id.get() == configured_guild_id.get() {
446                    permissions = bitops::remove(permissions, overwrite.deny);
447                    permissions = bitops::insert(permissions, overwrite.allow);
448
449                    idx += 1;
450
451                    continue;
452                }
453
454                if !has_role(member_roles, overwrite.id.cast()) {
455                    idx += 1;
456
457                    continue;
458                }
459
460                roles_allow = bitops::insert(roles_allow, overwrite.allow);
461                roles_deny = bitops::insert(roles_deny, overwrite.deny);
462            }
463            PermissionOverwriteType::Member => {
464                if overwrite.id.get() == configured_user_id.get() {
465                    member_allow = bitops::insert(member_allow, overwrite.allow);
466                    member_deny = bitops::insert(member_deny, overwrite.deny);
467                }
468            }
469            // Unknown, impossible to try and calculate with this
470            PermissionOverwriteType::Unknown(_) => (),
471            _ => unimplemented!(),
472        }
473
474        idx += 1;
475    }
476
477    let user_view_allowed = member_allow.contains(Permissions::VIEW_CHANNEL);
478
479    let user_view_denied = member_deny.contains(Permissions::VIEW_CHANNEL) && !user_view_allowed;
480
481    let role_view_denied = roles_deny.contains(Permissions::VIEW_CHANNEL)
482        && !roles_allow.contains(Permissions::VIEW_CHANNEL)
483        && !user_view_allowed;
484
485    if user_view_denied || role_view_denied {
486        return Permissions::empty();
487    }
488
489    // If the member or any of their roles denies the Send Messages
490    // permission, then the rest of the messaging-related permissions can be
491    // removed.
492    let user_send_allowed = member_allow.contains(Permissions::SEND_MESSAGES);
493
494    let user_send_denied = member_deny.contains(Permissions::SEND_MESSAGES) && !user_send_allowed;
495
496    let role_send_denied = roles_deny.contains(Permissions::SEND_MESSAGES)
497        && !roles_allow.contains(Permissions::SEND_MESSAGES)
498        && !user_send_allowed;
499
500    if user_send_denied || role_send_denied {
501        member_allow = bitops::remove(member_allow, PERMISSIONS_MESSAGING);
502        roles_allow = bitops::remove(roles_allow, PERMISSIONS_MESSAGING);
503        permissions = bitops::remove(permissions, PERMISSIONS_MESSAGING);
504    }
505
506    // Member overwrites take precedence over role overwrites. Permission
507    // allows take precedence over denies.
508    permissions = bitops::remove(permissions, roles_deny);
509    permissions = bitops::insert(permissions, roles_allow);
510    permissions = bitops::remove(permissions, member_deny);
511    permissions = bitops::insert(permissions, member_allow);
512
513    permissions
514}
515
516#[cfg(test)]
517mod tests {
518    use super::{preset::PERMISSIONS_ROOT_ONLY, PermissionCalculator};
519    use static_assertions::assert_impl_all;
520    use std::fmt::Debug;
521    use twilight_model::{
522        channel::{
523            permission_overwrite::{PermissionOverwrite, PermissionOverwriteType},
524            ChannelType,
525        },
526        guild::Permissions,
527        id::Id,
528    };
529
530    assert_impl_all!(PermissionCalculator<'_>: Clone, Debug, Eq, PartialEq, Send, Sync);
531
532    #[test]
533    fn owner_is_admin() {
534        let guild_id = Id::new(1);
535        let user_id = Id::new(2);
536        let everyone_role = Permissions::SEND_MESSAGES;
537        let roles = &[];
538
539        let calculator =
540            PermissionCalculator::new(guild_id, user_id, everyone_role, roles).owner_id(user_id);
541
542        assert_eq!(Permissions::all(), calculator.root());
543    }
544
545    // Test that a permission overwrite denying the "View Channel" permission
546    // implicitly denies all other permissions.
547    #[test]
548    fn view_channel_deny_implicit() {
549        let guild_id = Id::new(1);
550        let user_id = Id::new(2);
551        let everyone_role = Permissions::MENTION_EVERYONE | Permissions::SEND_MESSAGES;
552        let roles = &[(Id::new(3), Permissions::empty())];
553
554        {
555            // First, test when it's denied for an overwrite on a role the user
556            // has.
557            let overwrites = &[PermissionOverwrite {
558                allow: Permissions::SEND_TTS_MESSAGES,
559                deny: Permissions::VIEW_CHANNEL,
560                id: Id::new(3),
561                kind: PermissionOverwriteType::Role,
562            }];
563
564            let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
565                .in_channel(ChannelType::GuildText, overwrites);
566
567            assert_eq!(calculated, Permissions::empty());
568        }
569
570        // And now that it's denied for an overwrite on the member.
571        {
572            let overwrites = &[PermissionOverwrite {
573                allow: Permissions::SEND_TTS_MESSAGES,
574                deny: Permissions::VIEW_CHANNEL,
575                id: Id::new(2),
576                kind: PermissionOverwriteType::Member,
577            }];
578
579            let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
580                .in_channel(ChannelType::GuildText, overwrites);
581
582            assert_eq!(calculated, Permissions::empty());
583        }
584
585        // Member overwrites take precedence over role overwrites.
586        {
587            let overwrites = &[
588                PermissionOverwrite {
589                    allow: Permissions::VIEW_CHANNEL,
590                    deny: Permissions::empty(),
591                    id: Id::new(2),
592                    kind: PermissionOverwriteType::Member,
593                },
594                PermissionOverwrite {
595                    allow: Permissions::empty(),
596                    deny: Permissions::VIEW_CHANNEL,
597                    id: Id::new(3),
598                    kind: PermissionOverwriteType::Role,
599                },
600            ];
601
602            let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
603                .in_channel(ChannelType::GuildText, overwrites);
604
605            assert_eq!(
606                calculated,
607                Permissions::VIEW_CHANNEL
608                    | Permissions::SEND_MESSAGES
609                    | Permissions::MENTION_EVERYONE
610            );
611        }
612    }
613
614    #[test]
615    fn remove_text_and_stage_perms_when_voice() {
616        let guild_id = Id::new(1);
617        let user_id = Id::new(2);
618        let everyone_role = Permissions::CONNECT;
619        let roles = &[(Id::new(3), Permissions::SEND_MESSAGES)];
620
621        let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
622            .in_channel(ChannelType::GuildVoice, &[]);
623
624        assert_eq!(calculated, Permissions::CONNECT);
625    }
626
627    #[test]
628    fn remove_audio_perms_when_text() {
629        let guild_id = Id::new(1);
630        let user_id = Id::new(2);
631        let everyone_role = Permissions::CONNECT;
632        let roles = &[(Id::new(3), Permissions::SEND_MESSAGES)];
633
634        let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
635            .in_channel(ChannelType::GuildText, &[]);
636
637        // The `CONNECT` permission isn't included because text channels don't
638        // have the permission.
639        assert_eq!(calculated, Permissions::SEND_MESSAGES);
640    }
641
642    // Test that denying the "Send Messages" permission denies all message
643    // send related permissions.
644    #[test]
645    fn deny_send_messages_removes_related() {
646        let guild_id = Id::new(1);
647        let user_id = Id::new(2);
648        let everyone_role =
649            Permissions::MANAGE_MESSAGES | Permissions::EMBED_LINKS | Permissions::MENTION_EVERYONE;
650        let roles = &[(Id::new(3), Permissions::empty())];
651
652        // First, test when it's denied for an overwrite on a role the user has.
653        let overwrites = &[PermissionOverwrite {
654            allow: Permissions::ATTACH_FILES,
655            deny: Permissions::SEND_MESSAGES,
656            id: Id::new(3),
657            kind: PermissionOverwriteType::Role,
658        }];
659
660        let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
661            .in_channel(ChannelType::GuildText, overwrites);
662
663        assert_eq!(calculated, Permissions::MANAGE_MESSAGES);
664    }
665
666    /// Test that a member that has a role with the "administrator" permission
667    /// has all denying overwrites ignored.
668    #[test]
669    fn admin() {
670        let member_roles = &[(Id::new(3), Permissions::ADMINISTRATOR)];
671        let calc =
672            PermissionCalculator::new(Id::new(1), Id::new(2), Permissions::empty(), member_roles);
673        assert!(calc.root().is_all());
674
675        // Ensure that the denial of "send messages" doesn't actually occur due
676        // to the user being an administrator.
677        assert!(calc.in_channel(ChannelType::GuildText, &[]).is_all());
678    }
679
680    /// Test that guild-level permissions are removed in the permissions for a
681    /// channel of any type.
682    #[test]
683    fn guild_level_removed_in_channel() {
684        const CHANNEL_TYPES: &[ChannelType] = &[
685            ChannelType::GuildCategory,
686            ChannelType::GuildAnnouncement,
687            ChannelType::GuildStageVoice,
688            ChannelType::GuildText,
689            ChannelType::GuildVoice,
690        ];
691
692        // We need to remove the `ADMINISTRATOR` permission or else the
693        // calculator will (correctly) return all permissions.
694        let mut everyone = PERMISSIONS_ROOT_ONLY;
695        everyone.remove(Permissions::ADMINISTRATOR);
696
697        for kind in CHANNEL_TYPES {
698            let calc = PermissionCalculator::new(Id::new(1), Id::new(2), everyone, &[]);
699            let calculated = calc.in_channel(*kind, &[]);
700
701            assert!(!calculated.intersects(PERMISSIONS_ROOT_ONLY));
702        }
703    }
704}