twilight_util/permission_calculator/mod.rs
1//! Calculate the permissions of a member on a guild-level or a channel-level.
2//!
3//! # Examples
4//!
5//! ## Calculating member permissions in a channel
6//!
7//! Take a scenario where a member has two roles: the `@everyone` role (with the
8//! same ID as the guild) that grants the [View Channel] permission across the
9//! whole guild, and a second role that grants the [Send Messages] permission
10//! across the whole guild. This means that - across the server - the member
11//! will have the [View Channel] and [Send Messages] permissions, unless denied
12//! or expanded by channel-specific permission overwrites.
13//!
14//! In a given channel, there are two permission overwrites: one for the
15//! `@everyone` role and one for the member itself. These overwrites look
16//! like:
17//!
18//! - `@everyone` role is allowed the [Embed Links] and [Add Reactions]
19//! permissions; and
20//! - member is denied the [Send Messages] permission.
21//!
22//! Taking into account the guild root-level permissions and the permission
23//! overwrites, the end result is that in the specified channel the user has
24//! the [View Channel], [Embed Links], and [Add Reactions] permission, but is
25//! denied the [Send Messages] permission that their second role was granted on
26//! a root level.
27//!
28//! Let's see that in code:
29//!
30//! ```
31//! use twilight_model::{
32//! channel::{
33//! permission_overwrite::{PermissionOverwrite, PermissionOverwriteType},
34//! ChannelType,
35//! },
36//! guild::Permissions,
37//! id::Id,
38//! };
39//! use twilight_util::permission_calculator::PermissionCalculator;
40//!
41//! let guild_id = Id::new(1);
42//! let user_id = Id::new(3);
43//!
44//! // Guild-level @everyone role that, by default, allows everyone to view
45//! // channels.
46//! let everyone_role = Permissions::VIEW_CHANNEL;
47//!
48//! // Roles that the member has assigned to them and their permissions. This
49//! // should not include the `@everyone` role.
50//! let member_roles = &[
51//! // Guild-level permission that grants members with the role the Send
52//! // Messages permission.
53//! (Id::new(2), Permissions::SEND_MESSAGES),
54//! ];
55//!
56//! let channel_overwrites = &[
57//! // All members are given the Add Reactions and Embed Links members via
58//! // the `@everyone` role.
59//! PermissionOverwrite {
60//! allow: Permissions::ADD_REACTIONS | Permissions::EMBED_LINKS,
61//! deny: Permissions::empty(),
62//! id: Id::new(1),
63//! kind: PermissionOverwriteType::Role,
64//! },
65//! // Member is denied the Send Messages permission.
66//! PermissionOverwrite {
67//! allow: Permissions::empty(),
68//! deny: Permissions::SEND_MESSAGES,
69//! id: user_id.cast(),
70//! kind: PermissionOverwriteType::Member,
71//! },
72//! ];
73//!
74//! let calculator = PermissionCalculator::new(guild_id, user_id, everyone_role, member_roles);
75//! let calculated_permissions = calculator.in_channel(ChannelType::GuildText, channel_overwrites);
76//!
77//! // Now that we've got the member's permissions in the channel, we can
78//! // check that they have the server-wide View Channel permission and
79//! // the Add Reactions permission granted, but their guild-wide Send Messages
80//! // permission was denied. Additionally, since the user can't send messages,
81//! // their Embed Links permission was removed.
82//!
83//! let expected = Permissions::ADD_REACTIONS | Permissions::VIEW_CHANNEL;
84//! assert!(!calculated_permissions.contains(Permissions::EMBED_LINKS));
85//! assert!(!calculated_permissions.contains(Permissions::SEND_MESSAGES));
86//! assert_eq!(expected, calculated_permissions);
87//! ```
88//!
89//! [Add Reactions]: twilight_model::guild::Permissions::ADD_REACTIONS
90//! [Embed Links]: twilight_model::guild::Permissions::EMBED_LINKS
91//! [Send Messages]: twilight_model::guild::Permissions::SEND_MESSAGES
92//! [View Channel]: twilight_model::guild::Permissions::VIEW_CHANNEL
93
94mod bitops;
95mod preset;
96
97use self::preset::{
98 PERMISSIONS_MESSAGING, PERMISSIONS_ROOT_ONLY, PERMISSIONS_STAGE_OMIT, PERMISSIONS_TEXT_OMIT,
99 PERMISSIONS_VOICE_OMIT,
100};
101use twilight_model::{
102 channel::{
103 permission_overwrite::{PermissionOverwrite, PermissionOverwriteType},
104 ChannelType,
105 },
106 guild::Permissions,
107 id::{
108 marker::{GuildMarker, RoleMarker, UserMarker},
109 Id,
110 },
111};
112
113/// Calculate the permissions of a member.
114///
115/// Using the member calculator you can calculate the member's permissions in
116/// the [root-level][`root`] of a guild or [in a given channel][`in_channel`].
117///
118/// [`in_channel`]: Self::in_channel
119/// [`root`]: Self::root
120#[derive(Clone, Debug, Eq, PartialEq)]
121#[must_use = "calculators aren't useful if you don't calculate permissions"]
122pub struct PermissionCalculator<'a> {
123 /// Permissions of the `@everyone` role for the guild.
124 everyone_role: Permissions,
125 /// ID of the guild.
126 guild_id: Id<GuildMarker>,
127 /// Slice of tuples of the member's roles and their permissions.
128 member_roles: &'a [(Id<RoleMarker>, Permissions)],
129 /// ID of the owner.
130 owner_id: Option<Id<UserMarker>>,
131 /// ID of the user whose permissions are being calculated.
132 user_id: Id<UserMarker>,
133}
134
135impl<'a> PermissionCalculator<'a> {
136 /// Create a calculator to calculate the permissions of a member.
137 ///
138 /// `everyone_role` is the permissions of the `@everyone` role on a
139 /// guild-level; the permissions may be empty. The `@everyone` role's ID is
140 /// the same as that of the `guild_id`.
141 ///
142 /// The provided member's roles *should not* contain the `@everyone` role.
143 #[must_use = "calculators should be used to calculate permissions"]
144 pub const fn new(
145 guild_id: Id<GuildMarker>,
146 user_id: Id<UserMarker>,
147 everyone_role: Permissions,
148 member_roles: &'a [(Id<RoleMarker>, Permissions)],
149 ) -> Self {
150 Self {
151 everyone_role,
152 guild_id,
153 owner_id: None,
154 member_roles,
155 user_id,
156 }
157 }
158
159 /// Configure the ID of the owner of the guild.
160 ///
161 /// This should be used if you don't want to manually take the user ID and
162 /// owner ID in account beforehand.
163 ///
164 /// If the member's ID is the same as the owner's ID then permission
165 /// calculating methods such as [`root`] will return all permissions
166 /// enabled.
167 ///
168 /// [`root`]: Self::root
169 #[must_use = "calculators should be used to calculate permissions"]
170 pub const fn owner_id(mut self, owner_id: Id<UserMarker>) -> Self {
171 self.owner_id = Some(owner_id);
172
173 self
174 }
175
176 /// Calculate the guild-level permissions of a member.
177 #[must_use = "calculating permissions is only useful if they're used"]
178 pub const fn root(&self) -> Permissions {
179 // If the user is the owner, then we can just return all of the
180 // permissions.
181 if matches!(self.owner_id, Some(id) if id.get() == self.user_id.get()) {
182 return Permissions::all();
183 }
184
185 // If the `@everyone` role has the `ADMINISTRATOR` permission for some
186 // reason, then we can just return all permissions.
187 if self.everyone_role.contains(Permissions::ADMINISTRATOR) {
188 return Permissions::all();
189 }
190
191 // The permissions that the @everyone role has is the baseline.
192 let mut permissions = self.everyone_role;
193
194 // At time of writing `const` functions don't support `for` loops, so we
195 // use a `while` loop.
196 let member_role_count = self.member_roles.len();
197 let mut idx = 0;
198
199 // Loop over all of the member's roles, adding them to the total
200 // permissions. Role permissions are only additive.
201 //
202 // If one of the roles contains the `ADMINISTRATOR` permission then the
203 // loop can be short-circuited.
204 while idx < member_role_count {
205 let (_, role_permissions) = self.member_roles[idx];
206
207 if role_permissions.contains(Permissions::ADMINISTRATOR) {
208 return Permissions::all();
209 }
210
211 permissions = bitops::insert(permissions, role_permissions);
212 idx += 1;
213 }
214
215 permissions
216 }
217
218 /// Calculate the permissions of the member in a channel, taking into
219 /// account a combination of the guild-level permissions and channel-level
220 /// permissions.
221 ///
222 /// **Note** that this method will not return guild-level permissions such
223 /// as [Manage Guild Expressions]; if you need the guild-level permissions
224 /// use [`root`].
225 ///
226 /// # Conditional exclusions
227 ///
228 /// When the member doesn't have the "View Channel" permission then an empty
229 /// permission set will be returned. This will happen in the following
230 /// circumstances:
231 ///
232 /// - When the permission is denied on the role level and
233 /// isn't enabled on a role or member permission overwrite;
234 /// - When the permission is denied on a role permission overwrite but isn't
235 /// enabled on a member permission overwrite; or
236 /// - When permission isn't enabled on a guild level and isn't enabled via a
237 /// permission overwrite.
238 ///
239 /// When the [Send Messages] permission is denied and is not similarly
240 /// enabled like above then the [Attach Files], [Embed Links],
241 /// [Mention Everyone], and [Send TTS Messages] permissions will not be
242 /// present in the returned permission set.
243 ///
244 /// # Channel-based exclusions
245 ///
246 /// Permissions are removed based on the type of a channel. For example,
247 /// when calculating the permissions of a voice channel we can know that if
248 /// [Send Messages] is granted on a guild-level to everyone then it is
249 /// omitted from the permissions for a specific channel.
250 ///
251 /// ## Stage Channels
252 ///
253 /// When the given channel type is a guild stage channel then the
254 /// following permissions will be removed:
255 ///
256 /// - [Add Reactions]
257 /// - [Attach Files]
258 /// - [Deafen Members]
259 /// - [Embed Links]
260 /// - [Manage Webhooks]
261 /// - [Mention Everyone]
262 /// - [Priority Speaker]
263 /// - [Read Message History]
264 /// - [Send Messages]
265 /// - [Send TTS Messages]
266 /// - [Stream]
267 /// - [Speak]
268 /// - [Use External Emojis]
269 /// - [Use Slash Commands]
270 /// - [Use VAD]
271 ///
272 /// ## Text Channels
273 ///
274 /// When the given channel type is a guild text channel then the
275 /// following permissions will be removed:
276 ///
277 /// - [Connect]
278 /// - [Deafen Members]
279 /// - [Move Members]
280 /// - [Mute Members]
281 /// - [Priority Speaker]
282 /// - [Request To Speak]
283 /// - [Speak]
284 /// - [Stream]
285 /// - [Use VAD]
286 ///
287 /// # Voice Channels
288 ///
289 /// When the given channel type is a guild voice channel then the
290 /// following permissions will be removed:
291 ///
292 /// - [Add Reactions]
293 /// - [Attach Files]
294 /// - [Embed Links]
295 /// - [Manage Messages]
296 /// - [Manage Webhooks]
297 /// - [Mention Everyone]
298 /// - [Read Message History]
299 /// - [Request To Speak]
300 /// - [Send Messages]
301 /// - [Send TTS Messages]
302 /// - [Use External Emojis]
303 /// - [Use Slash Commands]
304 ///
305 /// # Guild-based exclusions
306 ///
307 /// The following guild-level permissions will always be removed:
308 ///
309 /// - [Administrator]
310 /// - [Ban Members]
311 /// - [Change Nickname]
312 /// - [Kick Members]
313 /// - [Manage Guild Expressions]
314 /// - [Manage Guild]
315 /// - [Manage Nicknames]
316 /// - [View Audit Log]
317 /// - [View Guild Insights]
318 ///
319 /// If you need to know a member's guild-level permissions - such as whether
320 /// they have the [View Audit Log] permission - use [`root`] instead.
321 ///
322 /// # Examples
323 ///
324 /// See the crate-level documentation for an example.
325 ///
326 /// [`root`]: Self::root
327 /// [Administrator]: twilight_model::guild::Permissions::ADMINISTRATOR
328 /// [Add Reactions]: twilight_model::guild::Permissions::ADD_REACTIONS
329 /// [Attach Files]: twilight_model::guild::Permissions::ATTACH_FILES
330 /// [Ban Members]: twilight_model::guild::Permissions::BAN_MEMBERS
331 /// [Change Nickname]: twilight_model::guild::Permissions::CHANGE_NICKNAME
332 /// [Connect]: twilight_model::guild::Permissions::CONNECT
333 /// [Deafen Members]: twilight_model::guild::Permissions::DEAFEN_MEMBERS
334 /// [Embed Links]: twilight_model::guild::Permissions::EMBED_LINKS
335 /// [Kick Members]: twilight_model::guild::Permissions::KICK_MEMBERS
336 /// [Manage Guild Expressions]: twilight_model::guild::Permissions::MANAGE_GUILD_EXPRESSIONS
337 /// [Manage Guild]: twilight_model::guild::Permissions::MANAGE_GUILD
338 /// [Manage Messages]: twilight_model::guild::Permissions::MANAGE_MESSAGES
339 /// [Manage Nicknames]: twilight_model::guild::Permissions::MANAGE_NICKNAMES
340 /// [Manage Webhooks]: twilight_model::guild::Permissions::MANAGE_WEBHOOKS
341 /// [Mention Everyone]: twilight_model::guild::Permissions::MENTION_EVERYONE
342 /// [Move Members]: twilight_model::guild::Permissions::MOVE_MEMBERS
343 /// [Mute Members]: twilight_model::guild::Permissions::MUTE_MEMBERS
344 /// [Priority Speaker]: twilight_model::guild::Permissions::PRIORITY_SPEAKER
345 /// [Read Message History]: twilight_model::guild::Permissions::READ_MESSAGE_HISTORY
346 /// [Request To Speak]: twilight_model::guild::Permissions::REQUEST_TO_SPEAK
347 /// [Send Messages]: twilight_model::guild::Permissions::SEND_MESSAGES
348 /// [Send TTS Messages]: twilight_model::guild::Permissions::SEND_TTS_MESSAGES
349 /// [Speak]: twilight_model::guild::Permissions::SPEAK
350 /// [Stream]: twilight_model::guild::Permissions::STREAM
351 /// [Use External Emojis]: twilight_model::guild::Permissions::USE_EXTERNAL_EMOJIS
352 /// [Use Slash Commands]: twilight_model::guild::Permissions::USE_SLASH_COMMANDS
353 /// [Use VAD]: twilight_model::guild::Permissions::USE_VAD
354 /// [View Audit Log]: twilight_model::guild::Permissions::VIEW_AUDIT_LOG
355 /// [View Guild Insights]: twilight_model::guild::Permissions::VIEW_GUILD_INSIGHTS
356 #[must_use = "calculating permissions is only useful if they're used"]
357 pub const fn in_channel(
358 self,
359 channel_type: ChannelType,
360 channel_overwrites: &[PermissionOverwrite],
361 ) -> Permissions {
362 let mut permissions = self.root();
363
364 // If the user contains the administrator privilege from the calculated
365 // root permissions, then we do not need to do any more work.
366 if permissions.contains(Permissions::ADMINISTRATOR) {
367 return Permissions::all();
368 }
369
370 permissions = bitops::remove(permissions, PERMISSIONS_ROOT_ONLY);
371
372 permissions = process_permission_overwrites(
373 permissions,
374 channel_overwrites,
375 self.member_roles,
376 self.guild_id,
377 self.user_id,
378 );
379
380 // If the permission set is empty then we don't need to do any removals.
381 if permissions.is_empty() {
382 return permissions;
383 }
384
385 // Remove permissions that can't be used in a channel, i.e. are relevant
386 // to guild-level permission calculating.
387 permissions = bitops::remove(permissions, PERMISSIONS_ROOT_ONLY);
388
389 // Remove the permissions not used by a channel depending on the channel
390 // type.
391 if matches!(channel_type, ChannelType::GuildStageVoice) {
392 permissions = bitops::remove(permissions, PERMISSIONS_STAGE_OMIT);
393 } else if matches!(channel_type, ChannelType::GuildText) {
394 permissions = bitops::remove(permissions, PERMISSIONS_TEXT_OMIT);
395 } else if matches!(channel_type, ChannelType::GuildVoice) {
396 permissions = bitops::remove(permissions, PERMISSIONS_VOICE_OMIT);
397 }
398
399 permissions
400 }
401}
402
403const fn has_role(roles: &[(Id<RoleMarker>, Permissions)], role_id: Id<RoleMarker>) -> bool {
404 let len = roles.len();
405 let mut idx = 0;
406
407 while idx < len {
408 let (iter_role_id, _) = roles[idx];
409
410 if iter_role_id.get() == role_id.get() {
411 return true;
412 }
413
414 idx += 1;
415 }
416
417 false
418}
419
420const fn process_permission_overwrites(
421 mut permissions: Permissions,
422 channel_overwrites: &[PermissionOverwrite],
423 member_roles: &[(Id<RoleMarker>, Permissions)],
424 configured_guild_id: Id<GuildMarker>,
425 configured_user_id: Id<UserMarker>,
426) -> Permissions {
427 // Hierarchy documentation:
428 // <https://discord.com/developers/docs/topics/permissions>
429 let mut member_allow = Permissions::empty();
430 let mut member_deny = Permissions::empty();
431 let mut roles_allow = Permissions::empty();
432 let mut roles_deny = Permissions::empty();
433
434 let channel_overwrite_len = channel_overwrites.len();
435 let mut idx = 0;
436
437 while idx < channel_overwrite_len {
438 let overwrite = &channel_overwrites[idx];
439
440 match overwrite.kind {
441 PermissionOverwriteType::Role => {
442 // We need to process the @everyone role first, so apply it
443 // straight to the permissions. The other roles' permissions
444 // will be applied later.
445 if overwrite.id.get() == configured_guild_id.get() {
446 permissions = bitops::remove(permissions, overwrite.deny);
447 permissions = bitops::insert(permissions, overwrite.allow);
448
449 idx += 1;
450
451 continue;
452 }
453
454 if !has_role(member_roles, overwrite.id.cast()) {
455 idx += 1;
456
457 continue;
458 }
459
460 roles_allow = bitops::insert(roles_allow, overwrite.allow);
461 roles_deny = bitops::insert(roles_deny, overwrite.deny);
462 }
463 PermissionOverwriteType::Member => {
464 if overwrite.id.get() == configured_user_id.get() {
465 member_allow = bitops::insert(member_allow, overwrite.allow);
466 member_deny = bitops::insert(member_deny, overwrite.deny);
467 }
468 }
469 // Unknown, impossible to try and calculate with this
470 PermissionOverwriteType::Unknown(_) => (),
471 _ => unimplemented!(),
472 }
473
474 idx += 1;
475 }
476
477 let user_view_allowed = member_allow.contains(Permissions::VIEW_CHANNEL);
478
479 let user_view_denied = member_deny.contains(Permissions::VIEW_CHANNEL) && !user_view_allowed;
480
481 let role_view_denied = roles_deny.contains(Permissions::VIEW_CHANNEL)
482 && !roles_allow.contains(Permissions::VIEW_CHANNEL)
483 && !user_view_allowed;
484
485 if user_view_denied || role_view_denied {
486 return Permissions::empty();
487 }
488
489 // If the member or any of their roles denies the Send Messages
490 // permission, then the rest of the messaging-related permissions can be
491 // removed.
492 let user_send_allowed = member_allow.contains(Permissions::SEND_MESSAGES);
493
494 let user_send_denied = member_deny.contains(Permissions::SEND_MESSAGES) && !user_send_allowed;
495
496 let role_send_denied = roles_deny.contains(Permissions::SEND_MESSAGES)
497 && !roles_allow.contains(Permissions::SEND_MESSAGES)
498 && !user_send_allowed;
499
500 if user_send_denied || role_send_denied {
501 member_allow = bitops::remove(member_allow, PERMISSIONS_MESSAGING);
502 roles_allow = bitops::remove(roles_allow, PERMISSIONS_MESSAGING);
503 permissions = bitops::remove(permissions, PERMISSIONS_MESSAGING);
504 }
505
506 // Member overwrites take precedence over role overwrites. Permission
507 // allows take precedence over denies.
508 permissions = bitops::remove(permissions, roles_deny);
509 permissions = bitops::insert(permissions, roles_allow);
510 permissions = bitops::remove(permissions, member_deny);
511 permissions = bitops::insert(permissions, member_allow);
512
513 permissions
514}
515
516#[cfg(test)]
517mod tests {
518 use super::{preset::PERMISSIONS_ROOT_ONLY, PermissionCalculator};
519 use static_assertions::assert_impl_all;
520 use std::fmt::Debug;
521 use twilight_model::{
522 channel::{
523 permission_overwrite::{PermissionOverwrite, PermissionOverwriteType},
524 ChannelType,
525 },
526 guild::Permissions,
527 id::Id,
528 };
529
530 assert_impl_all!(PermissionCalculator<'_>: Clone, Debug, Eq, PartialEq, Send, Sync);
531
532 #[test]
533 fn owner_is_admin() {
534 let guild_id = Id::new(1);
535 let user_id = Id::new(2);
536 let everyone_role = Permissions::SEND_MESSAGES;
537 let roles = &[];
538
539 let calculator =
540 PermissionCalculator::new(guild_id, user_id, everyone_role, roles).owner_id(user_id);
541
542 assert_eq!(Permissions::all(), calculator.root());
543 }
544
545 // Test that a permission overwrite denying the "View Channel" permission
546 // implicitly denies all other permissions.
547 #[test]
548 fn view_channel_deny_implicit() {
549 let guild_id = Id::new(1);
550 let user_id = Id::new(2);
551 let everyone_role = Permissions::MENTION_EVERYONE | Permissions::SEND_MESSAGES;
552 let roles = &[(Id::new(3), Permissions::empty())];
553
554 {
555 // First, test when it's denied for an overwrite on a role the user
556 // has.
557 let overwrites = &[PermissionOverwrite {
558 allow: Permissions::SEND_TTS_MESSAGES,
559 deny: Permissions::VIEW_CHANNEL,
560 id: Id::new(3),
561 kind: PermissionOverwriteType::Role,
562 }];
563
564 let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
565 .in_channel(ChannelType::GuildText, overwrites);
566
567 assert_eq!(calculated, Permissions::empty());
568 }
569
570 // And now that it's denied for an overwrite on the member.
571 {
572 let overwrites = &[PermissionOverwrite {
573 allow: Permissions::SEND_TTS_MESSAGES,
574 deny: Permissions::VIEW_CHANNEL,
575 id: Id::new(2),
576 kind: PermissionOverwriteType::Member,
577 }];
578
579 let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
580 .in_channel(ChannelType::GuildText, overwrites);
581
582 assert_eq!(calculated, Permissions::empty());
583 }
584
585 // Member overwrites take precedence over role overwrites.
586 {
587 let overwrites = &[
588 PermissionOverwrite {
589 allow: Permissions::VIEW_CHANNEL,
590 deny: Permissions::empty(),
591 id: Id::new(2),
592 kind: PermissionOverwriteType::Member,
593 },
594 PermissionOverwrite {
595 allow: Permissions::empty(),
596 deny: Permissions::VIEW_CHANNEL,
597 id: Id::new(3),
598 kind: PermissionOverwriteType::Role,
599 },
600 ];
601
602 let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
603 .in_channel(ChannelType::GuildText, overwrites);
604
605 assert_eq!(
606 calculated,
607 Permissions::VIEW_CHANNEL
608 | Permissions::SEND_MESSAGES
609 | Permissions::MENTION_EVERYONE
610 );
611 }
612 }
613
614 #[test]
615 fn remove_text_and_stage_perms_when_voice() {
616 let guild_id = Id::new(1);
617 let user_id = Id::new(2);
618 let everyone_role = Permissions::CONNECT;
619 let roles = &[(Id::new(3), Permissions::SEND_MESSAGES)];
620
621 let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
622 .in_channel(ChannelType::GuildVoice, &[]);
623
624 assert_eq!(calculated, Permissions::CONNECT);
625 }
626
627 #[test]
628 fn remove_audio_perms_when_text() {
629 let guild_id = Id::new(1);
630 let user_id = Id::new(2);
631 let everyone_role = Permissions::CONNECT;
632 let roles = &[(Id::new(3), Permissions::SEND_MESSAGES)];
633
634 let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
635 .in_channel(ChannelType::GuildText, &[]);
636
637 // The `CONNECT` permission isn't included because text channels don't
638 // have the permission.
639 assert_eq!(calculated, Permissions::SEND_MESSAGES);
640 }
641
642 // Test that denying the "Send Messages" permission denies all message
643 // send related permissions.
644 #[test]
645 fn deny_send_messages_removes_related() {
646 let guild_id = Id::new(1);
647 let user_id = Id::new(2);
648 let everyone_role =
649 Permissions::MANAGE_MESSAGES | Permissions::EMBED_LINKS | Permissions::MENTION_EVERYONE;
650 let roles = &[(Id::new(3), Permissions::empty())];
651
652 // First, test when it's denied for an overwrite on a role the user has.
653 let overwrites = &[PermissionOverwrite {
654 allow: Permissions::ATTACH_FILES,
655 deny: Permissions::SEND_MESSAGES,
656 id: Id::new(3),
657 kind: PermissionOverwriteType::Role,
658 }];
659
660 let calculated = PermissionCalculator::new(guild_id, user_id, everyone_role, roles)
661 .in_channel(ChannelType::GuildText, overwrites);
662
663 assert_eq!(calculated, Permissions::MANAGE_MESSAGES);
664 }
665
666 /// Test that a member that has a role with the "administrator" permission
667 /// has all denying overwrites ignored.
668 #[test]
669 fn admin() {
670 let member_roles = &[(Id::new(3), Permissions::ADMINISTRATOR)];
671 let calc =
672 PermissionCalculator::new(Id::new(1), Id::new(2), Permissions::empty(), member_roles);
673 assert!(calc.root().is_all());
674
675 // Ensure that the denial of "send messages" doesn't actually occur due
676 // to the user being an administrator.
677 assert!(calc.in_channel(ChannelType::GuildText, &[]).is_all());
678 }
679
680 /// Test that guild-level permissions are removed in the permissions for a
681 /// channel of any type.
682 #[test]
683 fn guild_level_removed_in_channel() {
684 const CHANNEL_TYPES: &[ChannelType] = &[
685 ChannelType::GuildCategory,
686 ChannelType::GuildAnnouncement,
687 ChannelType::GuildStageVoice,
688 ChannelType::GuildText,
689 ChannelType::GuildVoice,
690 ];
691
692 // We need to remove the `ADMINISTRATOR` permission or else the
693 // calculator will (correctly) return all permissions.
694 let mut everyone = PERMISSIONS_ROOT_ONLY;
695 everyone.remove(Permissions::ADMINISTRATOR);
696
697 for kind in CHANNEL_TYPES {
698 let calc = PermissionCalculator::new(Id::new(1), Id::new(2), everyone, &[]);
699 let calculated = calc.in_channel(*kind, &[]);
700
701 assert!(!calculated.intersects(PERMISSIONS_ROOT_ONLY));
702 }
703 }
704}