PluralKit/PluralKit.Bot/Commands/SystemEdit.cs

409 lines
19 KiB
C#
Raw Normal View History

2020-04-24 19:50:28 +00:00
using System;
2019-04-26 15:14:20 +00:00
using System.Linq;
2019-04-19 18:48:37 +00:00
using System.Threading.Tasks;
2020-02-01 12:03:02 +00:00
using Dapper;
2020-04-24 19:50:28 +00:00
using DSharpPlus;
using DSharpPlus.Entities;
2020-02-01 12:03:02 +00:00
2019-06-13 18:33:17 +00:00
using NodaTime;
using NodaTime.Text;
using NodaTime.TimeZones;
2019-10-05 05:41:00 +00:00
2019-07-09 22:19:18 +00:00
using PluralKit.Core;
2019-04-19 18:48:37 +00:00
using Sentry.Protocol;
namespace PluralKit.Bot
2019-04-19 18:48:37 +00:00
{
2020-02-01 12:03:02 +00:00
public class SystemEdit
2019-04-19 18:48:37 +00:00
{
private IDataStore _data;
2020-06-13 17:36:43 +00:00
private IDatabase _db;
2019-10-05 05:41:00 +00:00
private EmbedService _embeds;
2020-06-13 17:36:43 +00:00
public SystemEdit(IDataStore data, EmbedService embeds, IDatabase db)
2019-10-05 05:41:00 +00:00
{
2020-02-01 12:03:02 +00:00
_data = data;
2019-10-05 05:41:00 +00:00
_embeds = embeds;
_db = db;
}
2019-10-05 05:41:00 +00:00
public async Task Name(Context ctx)
{
ctx.CheckSystem();
2019-04-19 18:48:37 +00:00
2020-07-07 22:00:23 +00:00
if (ctx.MatchClear())
2020-03-04 17:13:36 +00:00
{
var clearPatch = new SystemPatch {Name = null};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, clearPatch));
2020-03-04 17:13:36 +00:00
await ctx.Reply($"{Emojis.Success} System name cleared.");
return;
}
2019-10-05 05:41:00 +00:00
var newSystemName = ctx.RemainderOrNull();
2020-03-04 17:13:36 +00:00
if (newSystemName == null)
{
if (ctx.System.Name != null)
await ctx.Reply($"Your system's name is currently **{ctx.System.Name}**. Type `pk;system name -clear` to clear it.");
2020-03-04 17:13:36 +00:00
else
await ctx.Reply("Your system currently does not have a name. Type `pk;system name <name>` to set one.");
return;
}
if (newSystemName != null && newSystemName.Length > Limits.MaxSystemNameLength)
throw Errors.SystemNameTooLongError(newSystemName.Length);
var patch = new SystemPatch {Name = newSystemName};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2020-03-04 17:13:36 +00:00
await ctx.Reply($"{Emojis.Success} System name changed.");
2019-04-19 18:48:37 +00:00
}
2019-10-05 05:41:00 +00:00
public async Task Description(Context ctx) {
ctx.CheckSystem();
2019-04-19 18:48:37 +00:00
2020-07-07 22:00:23 +00:00
if (ctx.MatchClear())
2020-02-23 11:45:05 +00:00
{
var patch = new SystemPatch {Description = null};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2020-02-23 11:45:05 +00:00
await ctx.Reply($"{Emojis.Success} System description cleared.");
return;
}
2020-02-20 21:57:37 +00:00
var newDescription = ctx.RemainderOrNull()?.NormalizeLineEndSpacing();
2020-02-23 11:45:05 +00:00
if (newDescription == null)
{
if (ctx.System.Description == null)
await ctx.Reply("Your system does not have a description set. To set one, type `pk;s description <description>`.");
else if (ctx.MatchFlag("r", "raw"))
await ctx.Reply($"```\n{ctx.System.Description}\n```");
2020-02-23 11:45:05 +00:00
else
2020-04-24 19:50:28 +00:00
await ctx.Reply(embed: new DiscordEmbedBuilder()
2020-02-23 11:45:05 +00:00
.WithTitle("System description")
.WithDescription(ctx.System.Description)
.WithFooter("To print the description with formatting, type `pk;s description -raw`. To clear it, type `pk;s description -clear`. To change it, type `pk;s description <new description>`.")
.Build());
}
else
{
if (newDescription.Length > Limits.MaxDescriptionLength) throw Errors.DescriptionTooLongError(newDescription.Length);
var patch = new SystemPatch {Description = newDescription};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2020-02-23 11:45:05 +00:00
await ctx.Reply($"{Emojis.Success} System description changed.");
}
2019-04-19 18:48:37 +00:00
}
2019-10-05 05:41:00 +00:00
public async Task Tag(Context ctx)
{
ctx.CheckSystem();
2019-04-19 18:48:37 +00:00
2020-07-07 22:00:23 +00:00
if (ctx.MatchClear())
2020-02-22 23:52:28 +00:00
{
var patch = new SystemPatch {Tag = null};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2020-02-22 23:52:28 +00:00
await ctx.Reply($"{Emojis.Success} System tag cleared.");
} else if (!ctx.HasNext(skipFlags: false))
{
if (ctx.System.Tag == null)
await ctx.Reply($"You currently have no system tag. To set one, type `pk;s tag <tag>`.");
else
await ctx.Reply($"Your current system tag is `{ctx.System.Tag}`. To change it, type `pk;s tag <tag>`. To clear it, type `pk;s tag -clear`.");
2020-02-22 23:52:28 +00:00
}
else
{
var newTag = ctx.RemainderOrNull(skipFlags: false);
if (newTag != null)
if (newTag.Length > Limits.MaxSystemTagLength)
throw Errors.SystemNameTooLongError(newTag.Length);
var patch = new SystemPatch {Tag = newTag};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
await ctx.Reply($"{Emojis.Success} System tag changed. Member names will now end with `{newTag}` when proxied.");
2020-02-22 23:52:28 +00:00
}
2019-04-19 18:48:37 +00:00
}
2020-02-01 12:03:02 +00:00
public async Task Avatar(Context ctx)
2019-07-19 12:21:16 +00:00
{
2019-10-05 05:41:00 +00:00
ctx.CheckSystem();
2020-07-07 21:41:51 +00:00
async Task ClearIcon()
2020-03-04 17:13:36 +00:00
{
2020-07-07 21:41:51 +00:00
await _db.Execute(c => c.UpdateSystem(ctx.System.Id, new SystemPatch {AvatarUrl = null}));
await ctx.Reply($"{Emojis.Success} System icon cleared.");
2020-03-04 17:13:36 +00:00
}
2020-07-07 21:41:51 +00:00
async Task SetIcon(ParsedImage img)
{
if (img.Url.Length > Limits.MaxUriLength)
throw Errors.InvalidUrl(img.Url);
await AvatarUtils.VerifyAvatarOrThrow(img.Url);
await _db.Execute(c => c.UpdateSystem(ctx.System.Id, new SystemPatch {AvatarUrl = img.Url}));
var msg = img.Source switch
{
AvatarSource.User => $"{Emojis.Success} System icon changed to {img.SourceUser?.Username}'s avatar!\n{Emojis.Warn} If {img.SourceUser?.Username} changes their avatar, the system icon will need to be re-set.",
AvatarSource.Url => $"{Emojis.Success} System icon changed to the image at the given URL.",
AvatarSource.Attachment => $"{Emojis.Success} System icon changed to attached image.\n{Emojis.Warn} If you delete the message containing the attachment, the system icon will stop working.",
_ => throw new ArgumentOutOfRangeException()
};
// The attachment's already right there, no need to preview it.
var hasEmbed = img.Source != AvatarSource.Attachment;
await (hasEmbed
? ctx.Reply(msg, embed: new DiscordEmbedBuilder().WithImageUrl(img.Url).Build())
: ctx.Reply(msg));
}
async Task ShowIcon()
2019-12-28 11:47:31 +00:00
{
if ((ctx.System.AvatarUrl?.Trim() ?? "").Length > 0)
{
2020-04-24 19:50:28 +00:00
var eb = new DiscordEmbedBuilder()
2020-07-07 21:41:51 +00:00
.WithTitle("System icon")
2019-12-28 11:47:31 +00:00
.WithImageUrl(ctx.System.AvatarUrl)
2020-07-07 21:41:51 +00:00
.WithDescription("To clear, use `pk;system icon clear`.");
2019-12-28 11:47:31 +00:00
await ctx.Reply(embed: eb.Build());
}
else
2020-07-07 21:41:51 +00:00
throw new PKSyntaxError("This system does not have an icon set. Set one by attaching an image to this command, or by passing an image URL or @mention.");
2019-12-28 11:47:31 +00:00
}
2019-10-05 05:41:00 +00:00
2020-07-07 21:41:51 +00:00
if (ctx.MatchClear())
await ClearIcon();
else if (await ctx.MatchImage() is {} img)
await SetIcon(img);
2019-10-05 05:41:00 +00:00
else
2020-07-07 21:41:51 +00:00
await ShowIcon();
2019-07-19 12:21:16 +00:00
}
2019-10-05 05:41:00 +00:00
public async Task Delete(Context ctx) {
ctx.CheckSystem();
2020-05-05 14:03:46 +00:00
await ctx.Reply($"{Emojis.Warn} Are you sure you want to delete your system? If so, reply to this message with your system's ID (`{ctx.System.Hid}`).\n**Note: this action is permanent.**");
if (!await ctx.ConfirmWithReply(ctx.System.Hid))
throw new PKError($"System deletion cancelled. Note that you must reply with your system ID (`{ctx.System.Hid}`) *verbatim*.");
await _db.Execute(conn => conn.DeleteSystem(ctx.System.Id));
2019-10-05 05:41:00 +00:00
await ctx.Reply($"{Emojis.Success} System deleted.");
}
2019-10-05 05:41:00 +00:00
public async Task SystemProxy(Context ctx)
{
ctx.CheckSystem().CheckGuildContext();
var gs = await _db.Execute(c => c.QueryOrInsertSystemGuildConfig(ctx.Guild.Id, ctx.System.Id));
bool newValue;
if (ctx.Match("on", "enabled", "true", "yes")) newValue = true;
else if (ctx.Match("off", "disabled", "false", "no")) newValue = false;
else if (ctx.HasNext()) throw new PKSyntaxError("You must pass either \"on\" or \"off\".");
2020-02-27 17:06:13 +00:00
else
{
if (gs.ProxyEnabled)
await ctx.Reply("Proxying in this server is currently **enabled** for your system. To disable it, type `pk;system proxy off`.");
else
await ctx.Reply("Proxying in this server is currently **disabled** for your system. To enable it, type `pk;system proxy on`.");
return;
}
var patch = new SystemGuildPatch {ProxyEnabled = newValue};
await _db.Execute(conn => conn.UpsertSystemGuild(ctx.System.Id, ctx.Guild.Id, patch));
if (newValue)
await ctx.Reply($"Message proxying in this server ({ctx.Guild.Name.EscapeMarkdown()}) is now **enabled** for your system.");
else
await ctx.Reply($"Message proxying in this server ({ctx.Guild.Name.EscapeMarkdown()}) is now **disabled** for your system.");
}
2019-10-05 05:41:00 +00:00
2020-02-01 12:03:02 +00:00
public async Task SystemTimezone(Context ctx)
2019-06-13 18:33:17 +00:00
{
2019-10-05 05:41:00 +00:00
if (ctx.System == null) throw Errors.NoSystemError;
2020-07-07 22:00:23 +00:00
if (ctx.MatchClear())
2019-06-13 18:33:17 +00:00
{
var clearPatch = new SystemPatch {UiTz = "UTC"};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, clearPatch));
2020-03-04 17:13:36 +00:00
await ctx.Reply($"{Emojis.Success} System time zone cleared (set to UTC).");
2019-06-13 18:33:17 +00:00
return;
}
2020-02-22 23:57:46 +00:00
var zoneStr = ctx.RemainderOrNull();
if (zoneStr == null)
{
await ctx.Reply(
$"Your current system time zone is set to **{ctx.System.UiTz}**. It is currently **{SystemClock.Instance.GetCurrentInstant().FormatZoned(ctx.System)}** in that time zone. To change your system time zone, type `pk;s tz <zone>`.");
2020-02-22 23:57:46 +00:00
return;
}
2019-06-13 18:33:17 +00:00
2019-10-05 05:41:00 +00:00
var zone = await FindTimeZone(ctx, zoneStr);
2019-06-13 18:33:17 +00:00
if (zone == null) throw Errors.InvalidTimeZone(zoneStr);
var currentTime = SystemClock.Instance.GetCurrentInstant().InZone(zone);
2020-07-21 00:10:26 +00:00
var msg = $"This will change the system time zone to **{zone.Id}**. The current time is **{currentTime.FormatZoned()}**. Is this correct?";
2019-10-05 05:41:00 +00:00
if (!await ctx.PromptYesNo(msg)) throw Errors.TimezoneChangeCancelled;
var patch = new SystemPatch {UiTz = zone.Id};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2019-06-13 18:33:17 +00:00
2020-02-22 23:57:46 +00:00
await ctx.Reply($"System time zone changed to **{zone.Id}**.");
2019-06-13 18:33:17 +00:00
}
2020-01-11 15:49:20 +00:00
public async Task SystemPrivacy(Context ctx)
{
ctx.CheckSystem();
Task PrintEmbed()
2020-01-11 15:49:20 +00:00
{
2020-04-24 19:50:28 +00:00
var eb = new DiscordEmbedBuilder()
2020-01-11 15:49:20 +00:00
.WithTitle("Current privacy settings for your system")
.AddField("Description", ctx.System.DescriptionPrivacy.Explanation())
.AddField("Member list", ctx.System.MemberListPrivacy.Explanation())
.AddField("Group list", ctx.System.GroupListPrivacy.Explanation())
.AddField("Current fronter(s)", ctx.System.FrontPrivacy.Explanation())
.AddField("Front/switch history", ctx.System.FrontHistoryPrivacy.Explanation())
.WithDescription("To edit privacy settings, use the command:\n`pk;system privacy <subject> <level>`\n\n- `subject` is one of `description`, `list`, `front`, `fronthistory`, `groups`, or `all` \n- `level` is either `public` or `private`.");
return ctx.Reply(embed: eb.Build());
2020-01-11 15:49:20 +00:00
}
async Task SetLevel(SystemPrivacySubject subject, PrivacyLevel level)
2020-01-11 15:49:20 +00:00
{
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, new SystemPatch().WithPrivacy(subject, level)));
var levelExplanation = level switch
2020-01-11 15:49:20 +00:00
{
PrivacyLevel.Public => "be able to query",
PrivacyLevel.Private => "*not* be able to query",
_ => ""
};
2020-01-11 15:49:20 +00:00
var subjectStr = subject switch
2020-01-11 15:49:20 +00:00
{
SystemPrivacySubject.Description => "description",
SystemPrivacySubject.Front => "front",
SystemPrivacySubject.FrontHistory => "front history",
SystemPrivacySubject.MemberList => "member list",
SystemPrivacySubject.GroupList => "group list",
_ => ""
};
2020-01-11 15:49:20 +00:00
var msg = $"System {subjectStr} privacy has been set to **{level.LevelName()}**. Other accounts will now {levelExplanation} your system {subjectStr}.";
await ctx.Reply($"{Emojis.Success} {msg}");
2020-01-11 15:49:20 +00:00
}
async Task SetAll(PrivacyLevel level)
2020-01-11 15:49:20 +00:00
{
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, new SystemPatch().WithAllPrivacy(level)));
Feature/granular member privacy (#174) * Some reasons this needs to exist for it to run on my machine? I don't think it would hurt to have it in other machines so * Add options to member model * Add Privacy to member embed * Added member privacy display list * Update database settings * apparetnly this is nolonger needed? * Fix sql call * Fix more sql errors * Added in settings control * Add all subject to system privacy * Basic API Privacy * Name privacy in logs * update todo * remove CheckReadMemberPermission * Added name privacy to log embed * update todo * Update todo * Update api to handle privacy * update todo * Update systemlist full to respect privacy (as well as system list) * include colour as option for member privacy subject * move todo file (why was it there?) * Update TODO.md * Update TODO.md * Update TODO.md * Deleted to create pr * Update command usage and add to the command tree * Make api respect created privacy * Add editing privacy through the api * Fix pronoun privacy field in api * Fix info leak of display name in api * deprecate privacy field in api * Deprecate privacy diffrently * Update API * Update documentation * Update documentation * Remove comment in yml * Update userguide * Update migration (fix typo in 5.sql too) * Sanatize names * some full stops * Fix after merge * update migration * update schema version * update edit command * update privacy filter * fix a dumb mistake * clarify on what name privacy does * make it easier on someone else * Update docs * Comment out unused code * Add aliases for `member privacy all public` and `member privacy all private`
2020-06-17 19:31:39 +00:00
var msg = level switch
{
PrivacyLevel.Private => $"All system privacy settings have been set to **{level.LevelName()}**. Other accounts will now not be able to view your member list, group list, front history, or system description.",
PrivacyLevel.Public => $"All system privacy settings have been set to **{level.LevelName()}**. Other accounts will now be able to view everything.",
_ => ""
};
await ctx.Reply($"{Emojis.Success} {msg}");
Feature/granular member privacy (#174) * Some reasons this needs to exist for it to run on my machine? I don't think it would hurt to have it in other machines so * Add options to member model * Add Privacy to member embed * Added member privacy display list * Update database settings * apparetnly this is nolonger needed? * Fix sql call * Fix more sql errors * Added in settings control * Add all subject to system privacy * Basic API Privacy * Name privacy in logs * update todo * remove CheckReadMemberPermission * Added name privacy to log embed * update todo * Update todo * Update api to handle privacy * update todo * Update systemlist full to respect privacy (as well as system list) * include colour as option for member privacy subject * move todo file (why was it there?) * Update TODO.md * Update TODO.md * Update TODO.md * Deleted to create pr * Update command usage and add to the command tree * Make api respect created privacy * Add editing privacy through the api * Fix pronoun privacy field in api * Fix info leak of display name in api * deprecate privacy field in api * Deprecate privacy diffrently * Update API * Update documentation * Update documentation * Remove comment in yml * Update userguide * Update migration (fix typo in 5.sql too) * Sanatize names * some full stops * Fix after merge * update migration * update schema version * update edit command * update privacy filter * fix a dumb mistake * clarify on what name privacy does * make it easier on someone else * Update docs * Comment out unused code * Add aliases for `member privacy all public` and `member privacy all private`
2020-06-17 19:31:39 +00:00
}
2020-01-11 15:49:20 +00:00
if (!ctx.HasNext())
await PrintEmbed();
else if (ctx.Match("all"))
await SetAll(ctx.PopPrivacyLevel());
Feature/granular member privacy (#174) * Some reasons this needs to exist for it to run on my machine? I don't think it would hurt to have it in other machines so * Add options to member model * Add Privacy to member embed * Added member privacy display list * Update database settings * apparetnly this is nolonger needed? * Fix sql call * Fix more sql errors * Added in settings control * Add all subject to system privacy * Basic API Privacy * Name privacy in logs * update todo * remove CheckReadMemberPermission * Added name privacy to log embed * update todo * Update todo * Update api to handle privacy * update todo * Update systemlist full to respect privacy (as well as system list) * include colour as option for member privacy subject * move todo file (why was it there?) * Update TODO.md * Update TODO.md * Update TODO.md * Deleted to create pr * Update command usage and add to the command tree * Make api respect created privacy * Add editing privacy through the api * Fix pronoun privacy field in api * Fix info leak of display name in api * deprecate privacy field in api * Deprecate privacy diffrently * Update API * Update documentation * Update documentation * Remove comment in yml * Update userguide * Update migration (fix typo in 5.sql too) * Sanatize names * some full stops * Fix after merge * update migration * update schema version * update edit command * update privacy filter * fix a dumb mistake * clarify on what name privacy does * make it easier on someone else * Update docs * Comment out unused code * Add aliases for `member privacy all public` and `member privacy all private`
2020-06-17 19:31:39 +00:00
else
await SetLevel(ctx.PopSystemPrivacySubject(), ctx.PopPrivacyLevel());
2020-01-11 15:49:20 +00:00
}
2020-03-21 13:04:41 +00:00
public async Task SystemPing(Context ctx)
{
2020-06-11 19:32:04 +00:00
ctx.CheckSystem();
if (!ctx.HasNext())
{
if (ctx.System.PingsEnabled) {await ctx.Reply("Reaction pings are currently **enabled** for your system. To disable reaction pings, type `pk;s ping disable`.");}
else {await ctx.Reply("Reaction pings are currently **disabled** for your system. To enable reaction pings, type `pk;s ping enable`.");}
}
else {
if (ctx.Match("on", "enable")) {
var patch = new SystemPatch {PingsEnabled = true};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2020-06-11 19:32:04 +00:00
await ctx.Reply("Reaction pings have now been enabled.");
}
if (ctx.Match("off", "disable")) {
var patch = new SystemPatch {PingsEnabled = false};
await _db.Execute(conn => conn.UpdateSystem(ctx.System.Id, patch));
2020-06-11 19:32:04 +00:00
await ctx.Reply("Reaction pings have now been disabled.");
}
2020-03-21 13:04:41 +00:00
}
2020-06-11 19:32:04 +00:00
}
2020-03-21 13:04:41 +00:00
2019-10-05 05:41:00 +00:00
public async Task<DateTimeZone> FindTimeZone(Context ctx, string zoneStr) {
2019-06-13 21:42:39 +00:00
// First, if we're given a flag emoji, we extract the flag emoji code from it.
zoneStr = Core.StringUtils.ExtractCountryFlag(zoneStr) ?? zoneStr;
2019-06-13 21:42:39 +00:00
// Then, we find all *locations* matching either the given country code or the country name.
var locations = TzdbDateTimeZoneSource.Default.Zone1970Locations;
var matchingLocations = locations.Where(l => l.Countries.Any(c =>
string.Equals(c.Code, zoneStr, StringComparison.InvariantCultureIgnoreCase) ||
string.Equals(c.Name, zoneStr, StringComparison.InvariantCultureIgnoreCase)));
// Then, we find all (unique) time zone IDs that match.
var matchingZones = matchingLocations.Select(l => DateTimeZoneProviders.Tzdb.GetZoneOrNull(l.ZoneId))
.Distinct().ToList();
// If the set of matching zones is empty (ie. we didn't find anything), we try a few other things.
if (matchingZones.Count == 0)
{
// First, we try to just find the time zone given directly and return that.
var givenZone = DateTimeZoneProviders.Tzdb.GetZoneOrNull(zoneStr);
if (givenZone != null) return givenZone;
// If we didn't find anything there either, we try parsing the string as an offset, then
// find all possible zones that match that offset. For an offset like UTC+2, this doesn't *quite*
// work, since there are 57(!) matching zones (as of 2019-06-13) - but for less populated time zones
// this could work nicely.
var inputWithoutUtc = zoneStr.Replace("UTC", "").Replace("GMT", "");
var res = OffsetPattern.CreateWithInvariantCulture("+H").Parse(inputWithoutUtc);
if (!res.Success) res = OffsetPattern.CreateWithInvariantCulture("+H:mm").Parse(inputWithoutUtc);
// If *this* didn't parse correctly, fuck it, bail.
if (!res.Success) return null;
var offset = res.Value;
// To try to reduce the count, we go by locations from the 1970+ database instead of just the full database
// This elides regions that have been identical since 1970, omitting small distinctions due to Ancient History(tm).
var allZones = TzdbDateTimeZoneSource.Default.Zone1970Locations.Select(l => l.ZoneId).Distinct();
matchingZones = allZones.Select(z => DateTimeZoneProviders.Tzdb.GetZoneOrNull(z))
.Where(z => z.GetUtcOffset(SystemClock.Instance.GetCurrentInstant()) == offset).ToList();
}
// If we have a list of viable time zones, we ask the user which is correct.
// If we only have one, return that one.
if (matchingZones.Count == 1)
return matchingZones.First();
// Otherwise, prompt and return!
2019-10-05 05:41:00 +00:00
return await ctx.Choose("There were multiple matches for your time zone query. Please select the region that matches you the closest:", matchingZones,
2019-06-13 21:42:39 +00:00
z =>
{
if (TzdbDateTimeZoneSource.Default.Aliases.Contains(z.Id))
return $"**{z.Id}**, {string.Join(", ", TzdbDateTimeZoneSource.Default.Aliases[z.Id])}";
return $"**{z.Id}**";
});
2019-04-19 18:48:37 +00:00
}
}
2020-03-21 13:04:41 +00:00
}