other bots cant run botcommands
All checks were successful
ci/woodpecker/pr/cargo-checks Pipeline was successful
All checks were successful
ci/woodpecker/pr/cargo-checks Pipeline was successful
This commit is contained in:
parent
9b7650053e
commit
e22e755bf5
4 changed files with 61 additions and 2 deletions
4
.cargo/config.toml
Normal file
4
.cargo/config.toml
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
|
||||||
|
[env]
|
||||||
|
# Based on https://doc.rust-lang.org/cargo/reference/config.html
|
||||||
|
OtherBots = "Supibot,buttsbot,PotatBotat,StreamElements"
|
|
@ -14,7 +14,8 @@ futures = "0.3"
|
||||||
async-trait = "0.1.77"
|
async-trait = "0.1.77"
|
||||||
casual_logger = "0.6.5"
|
casual_logger = "0.6.5"
|
||||||
|
|
||||||
|
|
||||||
[lib]
|
[lib]
|
||||||
name = "bot_lib"
|
name = "bot_lib"
|
||||||
path = "src/lib.rs"
|
path = "src/lib.rs"
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -13,3 +13,10 @@ access_token = <oath token>
|
||||||
bot_channels = <chnl1>,<chnl2>
|
bot_channels = <chnl1>,<chnl2>
|
||||||
prefix = <prefix>
|
prefix = <prefix>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
2. If required, adjust the following additional `.cargo\config.toml` configurations :
|
||||||
|
```
|
||||||
|
[env]
|
||||||
|
OtherBots = # Other Bots for special handling (e.g., bot commands cant be ran by bots)
|
||||||
|
```
|
|
@ -12,11 +12,40 @@ use crate::core::botinstance::ChType;
|
||||||
use crate::core::botlog;
|
use crate::core::botlog;
|
||||||
use crate::core::botmodules::{BotActionTrait, BotCommand, BotModule, ModulesManager};
|
use crate::core::botmodules::{BotActionTrait, BotCommand, BotModule, ModulesManager};
|
||||||
|
|
||||||
|
use dotenv::dotenv;
|
||||||
|
use std::env;
|
||||||
|
|
||||||
fn adminvector() -> Vec<String> {
|
fn adminvector() -> Vec<String> {
|
||||||
vec![String::from("ModulatingForce")]
|
vec![String::from("ModulatingForce")]
|
||||||
//vec![]
|
//vec![]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
pub fn otherbots_vector() -> Vec<String> {
|
||||||
|
// vec![String::from("ModulatingForce")]
|
||||||
|
// //vec![]
|
||||||
|
|
||||||
|
dotenv().ok();
|
||||||
|
let mut other_bots = Vec::new();
|
||||||
|
|
||||||
|
if let Ok(value) = env::var("OtherBots") {
|
||||||
|
for bot in value.split(',') {
|
||||||
|
other_bots.push(String::from(bot).to_lowercase())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
botlog::debug(
|
||||||
|
&format!(
|
||||||
|
"OtherBots : {:?}",other_bots,
|
||||||
|
),
|
||||||
|
Some("identity.rs > otherbots_vector()".to_string()),
|
||||||
|
None,
|
||||||
|
);
|
||||||
|
|
||||||
|
other_bots
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
pub async fn init(mgr: Arc<ModulesManager>) {
|
pub async fn init(mgr: Arc<ModulesManager>) {
|
||||||
botlog::trace(
|
botlog::trace(
|
||||||
"Went into Identity Module init",
|
"Went into Identity Module init",
|
||||||
|
@ -780,6 +809,24 @@ impl IdentityManager {
|
||||||
|
|
||||||
let usr = usr.to_lowercase();
|
let usr = usr.to_lowercase();
|
||||||
|
|
||||||
|
|
||||||
|
let bot_vector = otherbots_vector() ; // result of pulling from Cargo.toml
|
||||||
|
|
||||||
|
botlog::trace(
|
||||||
|
&format!(
|
||||||
|
"Checking user is part of known bots: bot_vector.contains(&usr) : {:?}",bot_vector.contains(&usr)
|
||||||
|
),
|
||||||
|
Some("identity.rs > can_user_run()".to_string()),
|
||||||
|
None,
|
||||||
|
);
|
||||||
|
|
||||||
|
if bot_vector.contains(&usr) {
|
||||||
|
return (
|
||||||
|
Permissible::Block,
|
||||||
|
ChangeResult::NoChange("Other Bots Cannot Run Commands".to_string()),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
// if cmdreqroles.len() == 0 {
|
// if cmdreqroles.len() == 0 {
|
||||||
if cmdreqroles.is_empty() {
|
if cmdreqroles.is_empty() {
|
||||||
// return Ok(Permissible::Allow)
|
// return Ok(Permissible::Allow)
|
||||||
|
|
Loading…
Reference in a new issue