UNPKG

@atproto/ozone

Version:

Backend service for moderating the Bluesky network.

65 lines (56 loc) 2.09 kB
import { AuthRequiredError } from '@atproto/xrpc-server' import { AppContext } from '../../context' import { Member } from '../../db/schema/member' import { Server } from '../../lexicon' export default function (server: Server, ctx: AppContext) { server.tools.ozone.setting.removeOptions({ auth: ctx.authVerifier.modOrAdminToken, handler: async ({ input, auth }) => { const access = auth.credentials const db = ctx.db const { keys, scope } = input.body let did = ctx.cfg.service.did let managerRole: Member['role'][] = [] if (scope === 'personal') { if (access.type !== 'moderator') { throw new AuthRequiredError( 'Must use moderator auth to delete personal setting', ) } did = access.iss } // When attempting to delete an instance setting using admin_token will allow removing any setting // otherwise, admins can remove settings that are manageable by all roles // moderators can remove settings that are manageable by moderator and triage roles // triage can remove settings that are manageable by triage role if (scope === 'instance') { managerRole = [ 'tools.ozone.team.defs#roleModerator', 'tools.ozone.team.defs#roleTriage', 'tools.ozone.team.defs#roleAdmin', 'tools.ozone.team.defs#roleVerifier', ] if (access.type !== 'admin_token' && !access.isAdmin) { if (access.isModerator) { managerRole = [ 'tools.ozone.team.defs#roleModerator', 'tools.ozone.team.defs#roleTriage', ] } else if (access.isTriage) { managerRole = ['tools.ozone.team.defs#roleTriage'] } } } const settingService = ctx.settingService(db) await settingService.removeOptions(keys, { scope: scope === 'personal' ? 'personal' : 'instance', managerRole, did, }) return { encoding: 'application/json', body: {}, } }, }) }