PluralKit/PluralKit.Core/Database/Functions/functions.sql

179 lines
6.3 KiB
MySQL
Raw Normal View History

create function message_context(account_id bigint, guild_id bigint, channel_id bigint, thread_id bigint)
returns table (
allow_autoproxy bool,
system_id int,
system_tag text,
2020-11-20 18:34:08 -05:00
system_avatar text,
latch_timeout integer,
case_sensitive_proxy_tags bool,
2024-10-23 10:08:25 +13:00
proxy_error_message_enabled bool,
proxy_switch bool,
name_format text,
tag_enabled bool,
proxy_enabled bool,
system_guild_tag text,
system_guild_avatar text,
last_switch int,
last_switch_members int[],
last_switch_timestamp timestamp,
log_channel bigint,
in_blacklist bool,
in_log_blacklist bool,
log_cleanup_enabled bool,
2024-10-23 10:08:25 +13:00
deny_bot_usage bool
)
as $$
select
-- accounts table
accounts.allow_autoproxy as allow_autoproxy,
-- systems table
systems.id as system_id,
systems.tag as system_tag,
systems.avatar_url as system_avatar,
-- system_config table
system_config.latch_timeout as latch_timeout,
system_config.case_sensitive_proxy_tags as case_sensitive_proxy_tags,
2024-11-07 09:20:15 +09:00
system_config.proxy_error_message_enabled as proxy_error_message_enabled,
system_config.proxy_switch as proxy_switch,
system_config.name_format as name_format,
-- system_guild table
coalesce(system_guild.tag_enabled, true) as tag_enabled,
coalesce(system_guild.proxy_enabled, true) as proxy_enabled,
system_guild.tag as system_guild_tag,
system_guild.avatar_url as system_guild_avatar,
-- system_last_switch view
system_last_switch.switch as last_switch,
system_last_switch.members as last_switch_members,
system_last_switch.timestamp as last_switch_timestamp,
-- servers table
servers.log_channel as log_channel,
((channel_id = any (servers.blacklist))
or (thread_id = any (servers.blacklist))) as in_blacklist,
((channel_id = any (servers.log_blacklist))
or (thread_id = any (servers.log_blacklist))) as in_log_blacklist,
coalesce(servers.log_cleanup_enabled, false) as log_cleanup_enabled,
-- abuse_logs table
coalesce(abuse_logs.deny_bot_usage, false) as deny_bot_usage
-- We need a "from" clause, so we just use some bogus data that's always present
-- This ensure we always have exactly one row going forward, so we can left join afterwards and still get data
from (select 1) as _placeholder
left join accounts on accounts.uid = account_id
left join servers on servers.id = guild_id
left join systems on systems.id = accounts.system
left join system_config on system_config.system = accounts.system
left join system_guild on system_guild.system = accounts.system
and system_guild.guild = guild_id
left join system_last_switch on system_last_switch.system = accounts.system
2024-10-23 10:08:25 +13:00
left join abuse_logs on abuse_logs.id = accounts.abuse_log
$$ language sql stable rows 1;
-- Fetches info about proxying related to a given account/guild
-- Returns one row per member in system, should be used in conjuction with `message_context` too
create function proxy_members(account_id bigint, guild_id bigint)
returns table (
id int,
proxy_tags proxy_tag[],
keep_proxy bool,
tts bool,
server_keep_proxy bool,
server_name text,
display_name text,
name text,
2021-05-01 19:20:00 +01:00
server_avatar text,
webhook_avatar text,
avatar text,
2021-05-01 19:20:00 +01:00
color char(6),
allow_autoproxy bool
)
as $$
select
-- Basic data
members.id as id,
members.proxy_tags as proxy_tags,
members.keep_proxy as keep_proxy,
members.tts as tts,
member_guild.keep_proxy as server_keep_proxy,
-- Name info
member_guild.display_name as server_name,
members.display_name as display_name,
members.name as name,
-- Avatar info
member_guild.avatar_url as server_avatar,
members.webhook_avatar_url as webhook_avatar,
members.avatar_url as avatar,
members.color as color,
2021-05-01 19:20:00 +01:00
members.allow_autoproxy as allow_autoproxy
from accounts
inner join systems on systems.id = accounts.system
inner join members on members.system = systems.id
left join member_guild on member_guild.member = members.id and member_guild.guild = guild_id
where accounts.uid = account_id
$$ language sql stable rows 10;
create function has_private_members(system_hid int) returns bool as $$
declare m int;
begin
m := count(id) from members where system = system_hid and member_visibility = 2;
if m > 0 then return true;
else return false;
end if;
end
$$ language plpgsql;
2024-04-28 15:46:06 +12:00
create function generate_hid() returns char(6) as $$
select string_agg(substr('abcefghjknoprstuvwxyz', ceil(random() * 21)::integer, 1), '') from generate_series(1, 6)
$$ language sql volatile;
2024-04-28 15:46:06 +12:00
create function find_free_system_hid() returns char(6) as $$
declare new_hid char(6);
begin
loop
new_hid := generate_hid();
if not exists (select 1 from systems where hid = new_hid) then return new_hid; end if;
end loop;
end
$$ language plpgsql volatile;
2024-04-28 15:46:06 +12:00
create function find_free_member_hid() returns char(6) as $$
declare new_hid char(6);
begin
loop
new_hid := generate_hid();
if not exists (select 1 from members where hid = new_hid) then return new_hid; end if;
end loop;
end
2020-06-29 23:51:12 +02:00
$$ language plpgsql volatile;
2024-04-28 15:46:06 +12:00
create function find_free_group_hid() returns char(6) as $$
declare new_hid char(6);
2020-06-29 23:51:12 +02:00
begin
loop
new_hid := generate_hid();
if not exists (select 1 from groups where hid = new_hid) then return new_hid; end if;
end loop;
end
$$ language plpgsql volatile;