service.py 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. import logging
  2. from sqlalchemy.exc import IntegrityError
  3. from sqlalchemy.ext.asyncio import AsyncSession
  4. from anonflow.constants import SYSTEM_USER_ID
  5. from anonflow.database import BanRepository, Database, ModeratorRepository
  6. from .exceptions import ModeratorPermissionError, SelfActionError
  7. from .permissions import ModeratorPermission, ModeratorPermissions
  8. class ModeratorService:
  9. def __init__(
  10. self,
  11. database: Database,
  12. ban_repository: BanRepository,
  13. moderator_repository: ModeratorRepository
  14. ):
  15. self._logger = logging.getLogger(__name__)
  16. self._database = database
  17. self._ban_repository = ban_repository
  18. self._moderator_repository = moderator_repository
  19. @staticmethod
  20. def _assert_not_self(actor_user_id: int, user_id: int):
  21. if actor_user_id == user_id:
  22. raise SelfActionError(
  23. f"Moderator user_id={actor_user_id} cannot perform this action on themselves. Target user_id={user_id}."
  24. )
  25. async def add(self, actor_user_id: int, user_id: int):
  26. try:
  27. async with self._database.begin_session() as session:
  28. if await self._can(session, actor_user_id, ModeratorPermission.MANAGE_MODERATORS):
  29. self._assert_not_self(actor_user_id, user_id)
  30. await self._moderator_repository.add(session, user_id)
  31. else:
  32. raise ModeratorPermissionError(
  33. f"Moderator user_id={actor_user_id} does not have permission to perform 'add'."
  34. )
  35. except IntegrityError:
  36. self._logger.warning("Failed to add moderator user_id=%s", user_id)
  37. async def ban(self, actor_user_id: int, user_id: int):
  38. async with self._database.begin_session() as session:
  39. if await self._can(session, actor_user_id, ModeratorPermission.MANAGE_BANS):
  40. self._assert_not_self(actor_user_id, user_id)
  41. await self._ban_repository.ban(session, actor_user_id, user_id)
  42. else:
  43. raise ModeratorPermissionError(
  44. f"Moderator user_id={actor_user_id} does not have permission to perform 'ban'."
  45. )
  46. async def _can(self, session: AsyncSession, actor_user_id: int, permission: ModeratorPermission) -> bool:
  47. moderator = await self._moderator_repository.get(session, actor_user_id)
  48. if moderator:
  49. if moderator.is_root.value:
  50. return True
  51. return getattr(moderator, permission, False)
  52. return False
  53. async def can(self, actor_user_id: int, permission: ModeratorPermission):
  54. async with self._database.get_session() as session:
  55. return self._can(session, actor_user_id, permission)
  56. async def get(self, user_id: int):
  57. async with self._database.get_session() as session:
  58. return await self._moderator_repository.get(session, user_id)
  59. async def get_permissions(self, user_id: int):
  60. async with self._database.get_session() as session:
  61. result = await self._moderator_repository.get(session, user_id)
  62. if not result:
  63. return ModeratorPermissions()
  64. return ModeratorPermissions(
  65. **{
  66. key: value
  67. for key, value in result.__dict__.items()
  68. if key.startswith("can_")
  69. }
  70. )
  71. async def has(self, user_id: int):
  72. async with self._database.get_session() as session:
  73. return await self._moderator_repository.has(session, user_id)
  74. async def init(self):
  75. async with self._database.begin_session() as session:
  76. if not await self._moderator_repository.has(session, SYSTEM_USER_ID):
  77. await self._moderator_repository.add(session, SYSTEM_USER_ID, is_root=True)
  78. async def is_banned(self, user_id: int):
  79. async with self._database.get_session() as session:
  80. return await self._ban_repository.is_banned(session, user_id)
  81. async def remove(self, actor_user_id: int, user_id: int):
  82. try:
  83. async with self._database.begin_session() as session:
  84. if await self._can(session, actor_user_id, ModeratorPermission.MANAGE_MODERATORS):
  85. self._assert_not_self(actor_user_id, user_id)
  86. await self._moderator_repository.remove(session, user_id)
  87. else:
  88. raise ModeratorPermissionError(
  89. f"Moderator user_id={actor_user_id} does not have permission to perform 'remove'."
  90. )
  91. except IntegrityError:
  92. self._logger.warning("Failed to remove moderator user_id=%s", user_id)
  93. async def unban(self, actor_user_id: int, user_id: int):
  94. async with self._database.begin_session() as session:
  95. if await self._can(session, actor_user_id, ModeratorPermission.MANAGE_BANS):
  96. self._assert_not_self(actor_user_id, user_id)
  97. await self._ban_repository.unban(session, actor_user_id, user_id)
  98. else:
  99. raise ModeratorPermissionError(
  100. f"Moderator user_id={actor_user_id} does not have permission to perform 'unban'."
  101. )
  102. async def update(self, actor_user_id: int, user_id: int, **fields):
  103. try:
  104. async with self._database.begin_session() as session:
  105. if await self._can(session, actor_user_id, ModeratorPermission.MANAGE_MODERATORS):
  106. self._assert_not_self(actor_user_id, user_id)
  107. await self._moderator_repository.update(session, user_id, **fields)
  108. else:
  109. raise ModeratorPermissionError(
  110. f"Moderator user_id={actor_user_id} does not have permission to perform 'update'."
  111. )
  112. except IntegrityError:
  113. self._logger.warning("Failed to update moderator user_id=%s", user_id)
  114. async def update_permissions(
  115. self,
  116. actor_user_id: int,
  117. user_id: int,
  118. permissions: ModeratorPermissions
  119. ):
  120. try:
  121. async with self._database.begin_session() as session:
  122. if await self._can(session, actor_user_id, ModeratorPermission.MANAGE_MODERATORS):
  123. self._assert_not_self(actor_user_id, user_id)
  124. await self._moderator_repository.update(
  125. session,
  126. user_id,
  127. **permissions.to_dict()
  128. )
  129. else:
  130. raise ModeratorPermissionError(
  131. f"Moderator user_id={actor_user_id} does not have permission to perform 'update_permissions'."
  132. )
  133. except IntegrityError:
  134. self._logger.warning("Failed to update moderator user_id=%s", user_id)