mirror of
https://github.com/ParadiseSS13/Paradise.git
synced 2025-12-19 06:41:37 +00:00
* tgchat day zero changes * Update code/game/verbs/ooc.dm Co-authored-by: Henri215 <77684085+Henri215@users.noreply.github.com> --------- Co-authored-by: Henri215 <77684085+Henri215@users.noreply.github.com>
175 lines
6.5 KiB
Plaintext
175 lines
6.5 KiB
Plaintext
GLOBAL_LIST_EMPTY(admin_datums)
|
|
GLOBAL_PROTECT(admin_datums) // This is protected because we dont want people making their own admin ranks, for obvious reasons
|
|
|
|
/datum/admins
|
|
var/rank = "Temporary Admin"
|
|
var/client/owner = null
|
|
var/rights = 0
|
|
var/fakekey = null
|
|
var/big_brother = 0
|
|
|
|
var/datum/marked_datum
|
|
|
|
var/admincaster_screen = 0 //See newscaster.dm under machinery for a full description
|
|
var/datum/feed_message/admincaster_feed_message = new /datum/feed_message //These two will act as holders.
|
|
var/datum/feed_channel/admincaster_feed_channel = new /datum/feed_channel
|
|
var/admincaster_signature //What you'll sign the newsfeeds as
|
|
|
|
/datum/admins/New(initial_rank = "Temporary Admin", initial_rights = 0, ckey)
|
|
if(IsAdminAdvancedProcCall())
|
|
to_chat(usr, "<span class='boldannounceooc'>Admin rank creation blocked: Advanced ProcCall detected.</span>")
|
|
message_admins("[key_name(usr)] attempted to create a new admin rank via advanced proc-call")
|
|
log_admin("[key_name(usr)] attempted to edit feedback a new admin rank via advanced proc-call")
|
|
return
|
|
if(!ckey)
|
|
error("Admin datum created without a ckey argument. Datum has been deleted")
|
|
qdel(src)
|
|
return
|
|
admincaster_signature = "Nanotrasen Officer #[rand(0,9)][rand(0,9)][rand(0,9)]"
|
|
rank = initial_rank
|
|
rights = initial_rights
|
|
GLOB.admin_datums[ckey] = src
|
|
|
|
/datum/admins/Destroy()
|
|
if(IsAdminAdvancedProcCall())
|
|
to_chat(usr, "<span class='boldannounceooc'>Admin rank deletion blocked: Advanced ProcCall detected.</span>")
|
|
message_admins("[key_name(usr)] attempted to delete an admin rank via advanced proc-call")
|
|
log_admin("[key_name(usr)] attempted to delete an admin rank via advanced proc-call")
|
|
return
|
|
..()
|
|
return QDEL_HINT_HARDDEL_NOW
|
|
|
|
/datum/admins/proc/associate(client/C)
|
|
if(IsAdminAdvancedProcCall())
|
|
to_chat(usr, "<span class='boldannounceooc'>Rank association blocked: Advanced ProcCall detected.</span>")
|
|
message_admins("[key_name(usr)] attempted to associate an admin rank to a new client via advanced proc-call")
|
|
log_admin("[key_name(usr)] attempted to associate an admin rank to a new client via advanced proc-call")
|
|
return
|
|
if(istype(C))
|
|
owner = C
|
|
owner.holder = src
|
|
owner.add_admin_verbs() //TODO
|
|
owner.verbs -= /client/proc/readmin
|
|
GLOB.admins |= C
|
|
|
|
/datum/admins/proc/disassociate()
|
|
if(IsAdminAdvancedProcCall())
|
|
to_chat(usr, "<span class='boldannounceooc'>Rank disassociation blocked: Advanced ProcCall detected.</span>")
|
|
message_admins("[key_name(usr)] attempted to disassociate an admin rank from a client via advanced proc-call")
|
|
log_admin("[key_name(usr)] attempted to disassociate an admin rank from a client via advanced proc-call")
|
|
return
|
|
if(owner)
|
|
GLOB.admins -= owner
|
|
owner.remove_admin_verbs()
|
|
owner.holder = null
|
|
owner = null
|
|
|
|
/*
|
|
checks if usr is an admin with at least ONE of the flags in rights_required. (Note, they don't need all the flags)
|
|
if rights_required == 0, then it simply checks if they are an admin.
|
|
if it doesn't return 1 and show_msg=1 it will prints a message explaining why the check has failed
|
|
generally it would be used like so:
|
|
|
|
proc/admin_proc()
|
|
if(!check_rights(R_ADMIN)) return
|
|
to_chat(world, "you have enough rights!")
|
|
|
|
NOTE: it checks usr! not src! So if you're checking somebody's rank in a proc which they did not call
|
|
you will have to do something like if(client.holder.rights & R_ADMIN) yourself.
|
|
*/
|
|
/proc/check_rights(rights_required, show_msg = TRUE, mob/user = usr)
|
|
if(user && user.client)
|
|
if(rights_required)
|
|
if(user.client.holder)
|
|
if(rights_required & user.client.holder.rights)
|
|
return 1
|
|
else
|
|
if(show_msg)
|
|
to_chat(user, "<font color='red'>Error: You do not have sufficient rights to do that. You require one of the following flags:[rights2text(rights_required," ")].</font>")
|
|
else
|
|
if(user.client.holder)
|
|
return 1
|
|
else
|
|
if(show_msg)
|
|
to_chat(user, "<font color='red'>Error: You are not an admin.</font>")
|
|
return 0
|
|
|
|
// Basically the above proc but checks at a /client level
|
|
/proc/check_rights_client(rights_required, show_msg = TRUE, client/C)
|
|
if(C)
|
|
if(rights_required)
|
|
if(C.holder)
|
|
if(rights_required & C.holder.rights)
|
|
return TRUE
|
|
else
|
|
if(show_msg)
|
|
to_chat(C, "<font color='red'>Error: You do not have sufficient rights to do that. You require one of the following flags:[rights2text(rights_required," ")].</font>")
|
|
else
|
|
if(C.holder)
|
|
return TRUE
|
|
else
|
|
if(show_msg)
|
|
to_chat(C, "<font color='red'>Error: You are not an admin.</font>")
|
|
return FALSE
|
|
|
|
//probably a bit iffy - will hopefully figure out a better solution
|
|
/proc/check_if_greater_rights_than(client/other)
|
|
if(usr && usr.client)
|
|
if(usr.client.holder)
|
|
if(!other || !other.holder)
|
|
return 1
|
|
if(usr.client.holder.rights != other.holder.rights)
|
|
if((usr.client.holder.rights & other.holder.rights) == other.holder.rights)
|
|
return 1 //we have all the rights they have and more
|
|
to_chat(usr, "<font color='red'>Error: Cannot proceed. They have more or equal rights to us.</font>")
|
|
return 0
|
|
|
|
/client/proc/deadmin()
|
|
if(IsAdminAdvancedProcCall())
|
|
to_chat(usr, "<span class='boldannounceooc'>Deadmin blocked: Advanced ProcCall detected.</span>")
|
|
message_admins("[key_name(usr)] attempted to de-admin a client via advanced proc-call")
|
|
log_admin("[key_name(usr)] attempted to de-admin a client via advanced proc-call")
|
|
return
|
|
GLOB.admin_datums -= ckey
|
|
if(holder)
|
|
holder.disassociate()
|
|
qdel(holder)
|
|
return 1
|
|
|
|
//This proc checks whether subject has at least ONE of the rights specified in rights_required.
|
|
/proc/check_rights_for(client/subject, rights_required)
|
|
if(subject && subject.holder)
|
|
if(rights_required && !(rights_required & subject.holder.rights))
|
|
return 0
|
|
return 1
|
|
return 0
|
|
|
|
/**
|
|
* Requires the holder to have all the rights specified
|
|
*
|
|
* rights_required = R_ADMIN|R_EVENT means they must have both flags, or it will return false
|
|
*/
|
|
/proc/check_rights_all(rights_required, show_msg = TRUE, mob/user = usr)
|
|
if(!user?.client)
|
|
return FALSE
|
|
if(!rights_required)
|
|
if(user.client.holder)
|
|
return TRUE
|
|
if(show_msg)
|
|
to_chat(user, "<font color='red'>Error: You are not an admin.</font>")
|
|
return FALSE
|
|
|
|
if(!user.client.holder)
|
|
return FALSE
|
|
if((user.client.holder.rights & rights_required) == rights_required)
|
|
return TRUE
|
|
if(show_msg)
|
|
to_chat(user, "<font color='red'>Error: You do not have sufficient rights to do that. You require all of the following flags:[rights2text(rights_required, " ")].</font>")
|
|
return FALSE
|
|
|
|
/datum/admins/vv_edit_var(var_name, var_value)
|
|
return FALSE // no admin abuse
|
|
|
|
/datum/admins/can_vv_delete()
|
|
return FALSE // don't break shit either
|