|
|
|
@ -11,10 +11,7 @@ use { |
|
|
|
crate::{server_server, utils}, |
|
|
|
crate::{server_server, utils}, |
|
|
|
log::{debug, warn}, |
|
|
|
log::{debug, warn}, |
|
|
|
rocket::{ |
|
|
|
rocket::{ |
|
|
|
data::{ |
|
|
|
data::{self, ByteUnit, Data, FromData}, |
|
|
|
ByteUnit, Data, FromDataFuture, FromTransformedData, Transform, TransformFuture, |
|
|
|
|
|
|
|
Transformed, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
http::Status, |
|
|
|
http::Status, |
|
|
|
outcome::Outcome::*, |
|
|
|
outcome::Outcome::*, |
|
|
|
response::{self, Responder}, |
|
|
|
response::{self, Responder}, |
|
|
|
@ -42,29 +39,15 @@ pub struct Ruma<T: Outgoing> { |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
#[cfg(feature = "conduit_bin")] |
|
|
|
#[cfg(feature = "conduit_bin")] |
|
|
|
impl<'a, T: Outgoing> FromTransformedData<'a> for Ruma<T> |
|
|
|
#[rocket::async_trait] |
|
|
|
|
|
|
|
impl<'a, T: Outgoing> FromData<'a> for Ruma<T> |
|
|
|
where |
|
|
|
where |
|
|
|
T::Incoming: IncomingRequest, |
|
|
|
T::Incoming: IncomingRequest, |
|
|
|
{ |
|
|
|
{ |
|
|
|
type Error = (); |
|
|
|
type Error = (); |
|
|
|
type Owned = Data; |
|
|
|
|
|
|
|
type Borrowed = Self::Owned; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fn transform<'r>( |
|
|
|
|
|
|
|
_req: &'r Request<'_>, |
|
|
|
|
|
|
|
data: Data, |
|
|
|
|
|
|
|
) -> TransformFuture<'r, Self::Owned, Self::Error> { |
|
|
|
|
|
|
|
Box::pin(async move { Transform::Owned(Success(data)) }) |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fn from_data( |
|
|
|
async fn from_data(request: &'a Request<'_>, data: Data) -> data::Outcome<Self, Self::Error> { |
|
|
|
request: &'a Request<'_>, |
|
|
|
|
|
|
|
outcome: Transformed<'a, Self>, |
|
|
|
|
|
|
|
) -> FromDataFuture<'a, Self, Self::Error> { |
|
|
|
|
|
|
|
let metadata = T::Incoming::METADATA; |
|
|
|
let metadata = T::Incoming::METADATA; |
|
|
|
|
|
|
|
|
|
|
|
Box::pin(async move { |
|
|
|
|
|
|
|
let data = rocket::try_outcome!(outcome.owned()); |
|
|
|
|
|
|
|
let db = request |
|
|
|
let db = request |
|
|
|
.guard::<State<'_, crate::Database>>() |
|
|
|
.guard::<State<'_, crate::Database>>() |
|
|
|
.await |
|
|
|
.await |
|
|
|
@ -75,15 +58,15 @@ where |
|
|
|
.headers() |
|
|
|
.headers() |
|
|
|
.get_one("Authorization") |
|
|
|
.get_one("Authorization") |
|
|
|
.map(|s| s[7..].to_owned()) // Split off "Bearer "
|
|
|
|
.map(|s| s[7..].to_owned()) // Split off "Bearer "
|
|
|
|
.or_else(|| request.get_query_value("access_token").and_then(|r| r.ok())); |
|
|
|
.or_else(|| request.query_value("access_token").and_then(|r| r.ok())); |
|
|
|
|
|
|
|
|
|
|
|
let limit = db.globals.max_request_size(); |
|
|
|
let limit = db.globals.max_request_size(); |
|
|
|
let mut handle = data.open(ByteUnit::Byte(limit.into())); |
|
|
|
let mut handle = data.open(ByteUnit::Byte(limit.into())); |
|
|
|
let mut body = Vec::new(); |
|
|
|
let mut body = Vec::new(); |
|
|
|
handle.read_to_end(&mut body).await.unwrap(); |
|
|
|
handle.read_to_end(&mut body).await.unwrap(); |
|
|
|
|
|
|
|
|
|
|
|
let (sender_user, sender_device, from_appservice) = if let Some((_id, registration)) = |
|
|
|
let (sender_user, sender_device, from_appservice) = if let Some((_id, registration)) = db |
|
|
|
db.appservice |
|
|
|
.appservice |
|
|
|
.iter_all() |
|
|
|
.iter_all() |
|
|
|
.filter_map(|r| r.ok()) |
|
|
|
.filter_map(|r| r.ok()) |
|
|
|
.find(|(_id, registration)| { |
|
|
|
.find(|(_id, registration)| { |
|
|
|
@ -94,7 +77,7 @@ where |
|
|
|
}) { |
|
|
|
}) { |
|
|
|
match metadata.authentication { |
|
|
|
match metadata.authentication { |
|
|
|
AuthScheme::AccessToken | AuthScheme::QueryOnlyAccessToken => { |
|
|
|
AuthScheme::AccessToken | AuthScheme::QueryOnlyAccessToken => { |
|
|
|
let user_id = request.get_query_value::<String>("user_id").map_or_else( |
|
|
|
let user_id = request.query_value::<String>("user_id").map_or_else( |
|
|
|
|| { |
|
|
|
|| { |
|
|
|
UserId::parse_with_server_name( |
|
|
|
UserId::parse_with_server_name( |
|
|
|
registration |
|
|
|
registration |
|
|
|
@ -217,15 +200,16 @@ where |
|
|
|
"uri".to_owned(), |
|
|
|
"uri".to_owned(), |
|
|
|
CanonicalJsonValue::String(request.uri().to_string()), |
|
|
|
CanonicalJsonValue::String(request.uri().to_string()), |
|
|
|
); |
|
|
|
); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
println!("{}: {:?}", origin, request.uri().to_string()); |
|
|
|
|
|
|
|
|
|
|
|
request_map.insert( |
|
|
|
request_map.insert( |
|
|
|
"origin".to_owned(), |
|
|
|
"origin".to_owned(), |
|
|
|
CanonicalJsonValue::String(origin.as_str().to_owned()), |
|
|
|
CanonicalJsonValue::String(origin.as_str().to_owned()), |
|
|
|
); |
|
|
|
); |
|
|
|
request_map.insert( |
|
|
|
request_map.insert( |
|
|
|
"destination".to_owned(), |
|
|
|
"destination".to_owned(), |
|
|
|
CanonicalJsonValue::String( |
|
|
|
CanonicalJsonValue::String(db.globals.server_name().as_str().to_owned()), |
|
|
|
db.globals.server_name().as_str().to_owned(), |
|
|
|
|
|
|
|
), |
|
|
|
|
|
|
|
); |
|
|
|
); |
|
|
|
|
|
|
|
|
|
|
|
let mut origin_signatures = BTreeMap::new(); |
|
|
|
let mut origin_signatures = BTreeMap::new(); |
|
|
|
@ -265,10 +249,7 @@ where |
|
|
|
match ruma::signatures::verify_json(&pub_key_map, &request_map) { |
|
|
|
match ruma::signatures::verify_json(&pub_key_map, &request_map) { |
|
|
|
Ok(()) => (None, None, false), |
|
|
|
Ok(()) => (None, None, false), |
|
|
|
Err(e) => { |
|
|
|
Err(e) => { |
|
|
|
warn!( |
|
|
|
warn!("Failed to verify json request from {}: {}", origin, e,); |
|
|
|
"Failed to verify json request: {}: {:?} {:?}", |
|
|
|
|
|
|
|
e, pub_key_map, request_map |
|
|
|
|
|
|
|
); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Forbidden
|
|
|
|
// Forbidden
|
|
|
|
return Failure((Status::raw(580), ())); |
|
|
|
return Failure((Status::raw(580), ())); |
|
|
|
@ -304,7 +285,6 @@ where |
|
|
|
Failure((Status::raw(583), ())) |
|
|
|
Failure((Status::raw(583), ())) |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
}) |
|
|
|
|
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|