using System.Security.Cryptography; using System.Text.Json.Serialization; using ArcaneLibs.Attributes; using ArcaneLibs.Extensions; namespace LibMatrix.EventTypes.Spec.State.Policy; //spec [MatrixEvent(EventName = EventId)] //spec [MatrixEvent(EventName = "m.room.rule.server", Legacy = true)] //??? [MatrixEvent(EventName = "org.matrix.mjolnir.rule.server", Legacy = true)] //legacy [FriendlyName(Name = "Server policy", NamePlural = "Server policies")] public class ServerPolicyRuleEventContent : PolicyRuleEventContent { public const string EventId = "m.policy.rule.server"; } [MatrixEvent(EventName = EventId)] //spec [MatrixEvent(EventName = "m.room.rule.user", Legacy = true)] //??? [MatrixEvent(EventName = "org.matrix.mjolnir.rule.user", Legacy = true)] //legacy [FriendlyName(Name = "User policy", NamePlural = "User policies")] public class UserPolicyRuleEventContent : PolicyRuleEventContent { public const string EventId = "m.policy.rule.user"; } [MatrixEvent(EventName = EventId)] //spec [MatrixEvent(EventName = "m.room.rule.room", Legacy = true)] //??? [MatrixEvent(EventName = "org.matrix.mjolnir.rule.room", Legacy = true)] //legacy [FriendlyName(Name = "Room policy", NamePlural = "Room policies")] public class RoomPolicyRuleEventContent : PolicyRuleEventContent { public const string EventId = "m.policy.rule.room"; } public abstract class PolicyRuleEventContent : EventContent { public PolicyRuleEventContent() => Console.WriteLine($"init policy {GetType().Name}"); private string? _reason; /// /// Entity this ban applies to, can use * and ? as globs. /// Policy is invalid if entity is null /// [JsonPropertyName("entity")] [FriendlyName(Name = "Entity")] public string? Entity { get; set; } private bool init; /// /// Reason this user is banned /// [JsonPropertyName("reason")] [FriendlyName(Name = "Reason")] public virtual string? Reason { get => // Console.WriteLine($"Read policy reason: {_reason}"); _reason; set => // Console.WriteLine($"Set policy reason: {value}"); // if(init) // Console.WriteLine(string.Join('\n', Environment.StackTrace.Split('\n')[..5])); // init = true; _reason = value; } /// /// Suggested action to take /// [JsonPropertyName("recommendation")] [FriendlyName(Name = "Recommendation")] public string? Recommendation { get; set; } /// /// Expiry time in milliseconds since the unix epoch, or null if the ban has no expiry. /// [JsonPropertyName("support.feline.policy.expiry.rev.2")] //stable prefix: expiry, msc pending [TableHide] public long? Expiry { get; set; } //utils /// /// Readable expiry time, provided for easy interaction /// [JsonPropertyName("gay.rory.matrix_room_utils.readable_expiry_time_utc")] [FriendlyName(Name = "Expires at")] [TableHide] public DateTime? ExpiryDateTime { get => Expiry == null ? null : DateTimeOffset.FromUnixTimeMilliseconds(Expiry.Value).DateTime; set { if (value is not null) Expiry = ((DateTimeOffset)value).ToUnixTimeMilliseconds(); } } public string GetDraupnir2StateKey() => Convert.ToBase64String(SHA256.HashData($"{Entity}{Recommendation}".AsBytes().ToArray())); } public static class PolicyRecommendationTypes { /// /// Ban this user /// public static string Ban = "m.ban"; /// /// Mute this user /// public static string Mute = "support.feline.policy.recommendation_mute"; //stable prefix: m.mute, msc pending } // public class PolicySchemaDefinition { // public required string Name { get; set; } // public required bool Optional { get; set; } // // }