|
|
|
@ -2,14 +2,15 @@ use super::State; |
|
|
|
use crate::{ConduitResult, Database, Error, Ruma}; |
|
|
|
use crate::{ConduitResult, Database, Error, Ruma}; |
|
|
|
use ruma::{ |
|
|
|
use ruma::{ |
|
|
|
api::client::r0::sync::sync_events, |
|
|
|
api::client::r0::sync::sync_events, |
|
|
|
events::{AnySyncEphemeralRoomEvent, EventType}, |
|
|
|
events::{room::member::MembershipState, AnySyncEphemeralRoomEvent, EventType}, |
|
|
|
Raw, |
|
|
|
Raw, RoomId, UserId, |
|
|
|
}; |
|
|
|
}; |
|
|
|
|
|
|
|
|
|
|
|
#[cfg(feature = "conduit_bin")] |
|
|
|
#[cfg(feature = "conduit_bin")] |
|
|
|
use rocket::{get, tokio}; |
|
|
|
use rocket::{get, tokio}; |
|
|
|
use std::{ |
|
|
|
use std::{ |
|
|
|
collections::{hash_map, BTreeMap, HashMap, HashSet}, |
|
|
|
collections::{hash_map, BTreeMap, HashMap, HashSet}, |
|
|
|
|
|
|
|
convert::TryFrom, |
|
|
|
time::Duration, |
|
|
|
time::Duration, |
|
|
|
}; |
|
|
|
}; |
|
|
|
|
|
|
|
|
|
|
|
@ -40,7 +41,9 @@ pub async fn sync_events_route( |
|
|
|
.unwrap_or(0); |
|
|
|
.unwrap_or(0); |
|
|
|
|
|
|
|
|
|
|
|
let mut presence_updates = HashMap::new(); |
|
|
|
let mut presence_updates = HashMap::new(); |
|
|
|
|
|
|
|
let mut left_encrypted_users = HashSet::new(); // Users that have left any encrypted rooms the sender was in
|
|
|
|
let mut device_list_updates = HashSet::new(); |
|
|
|
let mut device_list_updates = HashSet::new(); |
|
|
|
|
|
|
|
let mut device_list_left = HashSet::new(); |
|
|
|
|
|
|
|
|
|
|
|
// Look for device list updates of this account
|
|
|
|
// Look for device list updates of this account
|
|
|
|
device_list_updates.extend( |
|
|
|
device_list_updates.extend( |
|
|
|
@ -67,6 +70,8 @@ pub async fn sync_events_route( |
|
|
|
.rev() |
|
|
|
.rev() |
|
|
|
.collect::<Vec<_>>(); |
|
|
|
.collect::<Vec<_>>(); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let send_notification_counts = !timeline_pdus.is_empty(); |
|
|
|
|
|
|
|
|
|
|
|
// They /sync response doesn't always return all messages, so we say the output is
|
|
|
|
// They /sync response doesn't always return all messages, so we say the output is
|
|
|
|
// limited unless there are events in non_timeline_pdus
|
|
|
|
// limited unless there are events in non_timeline_pdus
|
|
|
|
let mut limited = false; |
|
|
|
let mut limited = false; |
|
|
|
@ -79,32 +84,86 @@ pub async fn sync_events_route( |
|
|
|
limited = true; |
|
|
|
limited = true; |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let encrypted_room = db |
|
|
|
|
|
|
|
.rooms |
|
|
|
|
|
|
|
.room_state_get(&room_id, &EventType::RoomEncryption, "")? |
|
|
|
|
|
|
|
.is_some(); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// TODO: optimize this?
|
|
|
|
let mut send_member_count = false; |
|
|
|
let mut send_member_count = false; |
|
|
|
let mut joined_since_last_sync = false; |
|
|
|
let mut joined_since_last_sync = false; |
|
|
|
let mut send_notification_counts = false; |
|
|
|
let mut new_encrypted_room = false; |
|
|
|
for pdu in db.rooms.pdus_since(&sender_id, &room_id, since)? { |
|
|
|
for (state_key, pdu) in db |
|
|
|
let pdu = pdu?; |
|
|
|
.rooms |
|
|
|
send_notification_counts = true; |
|
|
|
.pdus_since(&sender_id, &room_id, since)? |
|
|
|
|
|
|
|
.filter_map(|r| r.ok()) |
|
|
|
|
|
|
|
.filter_map(|pdu| Some((pdu.state_key.clone()?, pdu))) |
|
|
|
|
|
|
|
{ |
|
|
|
if pdu.kind == EventType::RoomMember { |
|
|
|
if pdu.kind == EventType::RoomMember { |
|
|
|
send_member_count = true; |
|
|
|
send_member_count = true; |
|
|
|
if !joined_since_last_sync && pdu.state_key == Some(sender_id.to_string()) { |
|
|
|
|
|
|
|
let content = serde_json::from_value::< |
|
|
|
let content = serde_json::from_value::< |
|
|
|
Raw<ruma::events::room::member::MemberEventContent>, |
|
|
|
Raw<ruma::events::room::member::MemberEventContent>, |
|
|
|
>(pdu.content.clone()) |
|
|
|
>(pdu.content.clone()) |
|
|
|
.expect("Raw::from_value always works") |
|
|
|
.expect("Raw::from_value always works") |
|
|
|
.deserialize() |
|
|
|
.deserialize() |
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))?; |
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))?; |
|
|
|
if content.membership == ruma::events::room::member::MembershipState::Join { |
|
|
|
|
|
|
|
|
|
|
|
if pdu.state_key == Some(sender_id.to_string()) |
|
|
|
|
|
|
|
&& content.membership == MembershipState::Join |
|
|
|
|
|
|
|
{ |
|
|
|
joined_since_last_sync = true; |
|
|
|
joined_since_last_sync = true; |
|
|
|
// Both send_member_count and joined_since_last_sync are set. There's
|
|
|
|
} else if encrypted_room && content.membership == MembershipState::Join { |
|
|
|
// nothing more to do
|
|
|
|
// A new user joined an encrypted room
|
|
|
|
break; |
|
|
|
let user_id = UserId::try_from(state_key) |
|
|
|
|
|
|
|
.map_err(|_| Error::bad_database("Invalid UserId in member PDU."))?; |
|
|
|
|
|
|
|
// Add encryption update if we didn't share an encrypted room already
|
|
|
|
|
|
|
|
if !share_encrypted_room(&db, &sender_id, &user_id, &room_id) { |
|
|
|
|
|
|
|
device_list_updates.insert(user_id); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
} else if encrypted_room && content.membership == MembershipState::Leave { |
|
|
|
|
|
|
|
// Write down users that have left encrypted rooms we are in
|
|
|
|
|
|
|
|
left_encrypted_users.insert( |
|
|
|
|
|
|
|
UserId::try_from(state_key) |
|
|
|
|
|
|
|
.map_err(|_| Error::bad_database("Invalid UserId in member PDU."))?, |
|
|
|
|
|
|
|
); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
} else if pdu.kind == EventType::RoomEncryption { |
|
|
|
|
|
|
|
new_encrypted_room = true; |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if joined_since_last_sync && encrypted_room || new_encrypted_room { |
|
|
|
|
|
|
|
// If the user is in a new encrypted room, give them all joined users
|
|
|
|
|
|
|
|
device_list_updates.extend( |
|
|
|
|
|
|
|
db.rooms |
|
|
|
|
|
|
|
.room_members(&room_id) |
|
|
|
|
|
|
|
.filter_map(|user_id| { |
|
|
|
|
|
|
|
Some( |
|
|
|
|
|
|
|
UserId::try_from(user_id.ok()?.clone()) |
|
|
|
|
|
|
|
.map_err(|_| { |
|
|
|
|
|
|
|
Error::bad_database("Invalid member event state key in db.") |
|
|
|
|
|
|
|
}) |
|
|
|
|
|
|
|
.ok()?, |
|
|
|
|
|
|
|
) |
|
|
|
|
|
|
|
}) |
|
|
|
|
|
|
|
.filter(|user_id| { |
|
|
|
|
|
|
|
// Don't send key updates from the sender to the sender
|
|
|
|
|
|
|
|
sender_id != user_id |
|
|
|
|
|
|
|
}) |
|
|
|
|
|
|
|
.filter(|user_id| { |
|
|
|
|
|
|
|
// Only send keys if the sender doesn't share an encrypted room with the target already
|
|
|
|
|
|
|
|
!share_encrypted_room(&db, sender_id, user_id, &room_id) |
|
|
|
|
|
|
|
}), |
|
|
|
|
|
|
|
); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
let members = db.rooms.room_state_type(&room_id, &EventType::RoomMember)?; |
|
|
|
// Look for device list updates in this room
|
|
|
|
|
|
|
|
device_list_updates.extend( |
|
|
|
|
|
|
|
db.users |
|
|
|
|
|
|
|
.keys_changed(&room_id.to_string(), since, None) |
|
|
|
|
|
|
|
.filter_map(|r| r.ok()), |
|
|
|
|
|
|
|
); |
|
|
|
|
|
|
|
|
|
|
|
let (joined_member_count, invited_member_count, heroes) = if send_member_count { |
|
|
|
let (joined_member_count, invited_member_count, heroes) = if send_member_count { |
|
|
|
let joined_member_count = db.rooms.room_members(&room_id).count(); |
|
|
|
let joined_member_count = db.rooms.room_members(&room_id).count(); |
|
|
|
@ -131,35 +190,17 @@ pub async fn sync_events_route( |
|
|
|
.map_err(|_| Error::bad_database("Invalid member event in database."))?; |
|
|
|
.map_err(|_| Error::bad_database("Invalid member event in database."))?; |
|
|
|
|
|
|
|
|
|
|
|
if let Some(state_key) = &pdu.state_key { |
|
|
|
if let Some(state_key) = &pdu.state_key { |
|
|
|
let current_content = serde_json::from_value::< |
|
|
|
let user_id = UserId::try_from(state_key.clone()).map_err(|_| { |
|
|
|
Raw<ruma::events::room::member::MemberEventContent>, |
|
|
|
Error::bad_database("Invalid UserId in member PDU.") |
|
|
|
>( |
|
|
|
|
|
|
|
members |
|
|
|
|
|
|
|
.get(state_key) |
|
|
|
|
|
|
|
.ok_or_else(|| { |
|
|
|
|
|
|
|
Error::bad_database( |
|
|
|
|
|
|
|
"A user that joined once has no member event anymore.", |
|
|
|
|
|
|
|
) |
|
|
|
|
|
|
|
})? |
|
|
|
|
|
|
|
.content |
|
|
|
|
|
|
|
.clone(), |
|
|
|
|
|
|
|
) |
|
|
|
|
|
|
|
.expect("Raw::from_value always works") |
|
|
|
|
|
|
|
.deserialize() |
|
|
|
|
|
|
|
.map_err(|_| { |
|
|
|
|
|
|
|
Error::bad_database("Invalid member event in database.") |
|
|
|
|
|
|
|
})?; |
|
|
|
})?; |
|
|
|
|
|
|
|
|
|
|
|
// The membership was and still is invite or join
|
|
|
|
// The membership was and still is invite or join
|
|
|
|
if matches!( |
|
|
|
if matches!( |
|
|
|
content.membership, |
|
|
|
content.membership, |
|
|
|
ruma::events::room::member::MembershipState::Join |
|
|
|
MembershipState::Join | MembershipState::Invite |
|
|
|
| ruma::events::room::member::MembershipState::Invite |
|
|
|
) && (db.rooms.is_joined(&user_id, &room_id)? |
|
|
|
) && matches!( |
|
|
|
|| db.rooms.is_invited(&user_id, &room_id)?) |
|
|
|
current_content.membership, |
|
|
|
{ |
|
|
|
ruma::events::room::member::MembershipState::Join |
|
|
|
|
|
|
|
| ruma::events::room::member::MembershipState::Invite |
|
|
|
|
|
|
|
) { |
|
|
|
|
|
|
|
Ok::<_, Error>(Some(state_key.clone())) |
|
|
|
Ok::<_, Error>(Some(state_key.clone())) |
|
|
|
} else { |
|
|
|
} else { |
|
|
|
Ok(None) |
|
|
|
Ok(None) |
|
|
|
@ -295,13 +336,6 @@ pub async fn sync_events_route( |
|
|
|
joined_rooms.insert(room_id.clone(), joined_room); |
|
|
|
joined_rooms.insert(room_id.clone(), joined_room); |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// Look for device list updates in this room
|
|
|
|
|
|
|
|
device_list_updates.extend( |
|
|
|
|
|
|
|
db.users |
|
|
|
|
|
|
|
.keys_changed(&room_id.to_string(), since, None) |
|
|
|
|
|
|
|
.filter_map(|r| r.ok()), |
|
|
|
|
|
|
|
); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Take presence updates from this room
|
|
|
|
// Take presence updates from this room
|
|
|
|
for (user_id, presence) in |
|
|
|
for (user_id, presence) in |
|
|
|
db.rooms |
|
|
|
db.rooms |
|
|
|
@ -392,21 +426,20 @@ pub async fn sync_events_route( |
|
|
|
let mut invited_since_last_sync = false; |
|
|
|
let mut invited_since_last_sync = false; |
|
|
|
for pdu in db.rooms.pdus_since(&sender_id, &room_id, since)? { |
|
|
|
for pdu in db.rooms.pdus_since(&sender_id, &room_id, since)? { |
|
|
|
let pdu = pdu?; |
|
|
|
let pdu = pdu?; |
|
|
|
if pdu.kind == EventType::RoomMember { |
|
|
|
if pdu.kind == EventType::RoomMember && pdu.state_key == Some(sender_id.to_string()) { |
|
|
|
if pdu.state_key == Some(sender_id.to_string()) { |
|
|
|
|
|
|
|
let content = serde_json::from_value::< |
|
|
|
let content = serde_json::from_value::< |
|
|
|
Raw<ruma::events::room::member::MemberEventContent>, |
|
|
|
Raw<ruma::events::room::member::MemberEventContent>, |
|
|
|
>(pdu.content.clone()) |
|
|
|
>(pdu.content.clone()) |
|
|
|
.expect("Raw::from_value always works") |
|
|
|
.expect("Raw::from_value always works") |
|
|
|
.deserialize() |
|
|
|
.deserialize() |
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))?; |
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))?; |
|
|
|
if content.membership == ruma::events::room::member::MembershipState::Invite { |
|
|
|
|
|
|
|
|
|
|
|
if content.membership == MembershipState::Invite { |
|
|
|
invited_since_last_sync = true; |
|
|
|
invited_since_last_sync = true; |
|
|
|
break; |
|
|
|
break; |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if !invited_since_last_sync { |
|
|
|
if !invited_since_last_sync { |
|
|
|
continue; |
|
|
|
continue; |
|
|
|
@ -428,6 +461,28 @@ pub async fn sync_events_route( |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// TODO: mark users as left when WE left an encrypted room they were in
|
|
|
|
|
|
|
|
for user_id in left_encrypted_users { |
|
|
|
|
|
|
|
// If the user doesn't share an encrypted room with the target anymore, we need to tell
|
|
|
|
|
|
|
|
// them
|
|
|
|
|
|
|
|
if db |
|
|
|
|
|
|
|
.rooms |
|
|
|
|
|
|
|
.get_shared_rooms(vec![sender_id.clone(), user_id.clone()]) |
|
|
|
|
|
|
|
.filter_map(|r| r.ok()) |
|
|
|
|
|
|
|
.filter_map(|other_room_id| { |
|
|
|
|
|
|
|
Some( |
|
|
|
|
|
|
|
db.rooms |
|
|
|
|
|
|
|
.room_state_get(&other_room_id, &EventType::RoomEncryption, "") |
|
|
|
|
|
|
|
.ok()? |
|
|
|
|
|
|
|
.is_some(), |
|
|
|
|
|
|
|
) |
|
|
|
|
|
|
|
}) |
|
|
|
|
|
|
|
.all(|encrypted| !encrypted) |
|
|
|
|
|
|
|
{ |
|
|
|
|
|
|
|
device_list_left.insert(user_id); |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// Remove all to-device events the device received *last time*
|
|
|
|
// Remove all to-device events the device received *last time*
|
|
|
|
db.users |
|
|
|
db.users |
|
|
|
.remove_to_device_events(sender_id, device_id, since)?; |
|
|
|
.remove_to_device_events(sender_id, device_id, since)?; |
|
|
|
@ -459,7 +514,7 @@ pub async fn sync_events_route( |
|
|
|
}, |
|
|
|
}, |
|
|
|
device_lists: sync_events::DeviceLists { |
|
|
|
device_lists: sync_events::DeviceLists { |
|
|
|
changed: device_list_updates.into_iter().collect(), |
|
|
|
changed: device_list_updates.into_iter().collect(), |
|
|
|
left: Vec::new(), // TODO
|
|
|
|
left: device_list_left.into_iter().collect(), |
|
|
|
}, |
|
|
|
}, |
|
|
|
device_one_time_keys_count: if db.users.last_one_time_keys_update(sender_id)? > since { |
|
|
|
device_one_time_keys_count: if db.users.last_one_time_keys_update(sender_id)? > since { |
|
|
|
db.users.count_one_time_keys(sender_id, device_id)? |
|
|
|
db.users.count_one_time_keys(sender_id, device_id)? |
|
|
|
@ -495,3 +550,24 @@ pub async fn sync_events_route( |
|
|
|
|
|
|
|
|
|
|
|
Ok(response.into()) |
|
|
|
Ok(response.into()) |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fn share_encrypted_room( |
|
|
|
|
|
|
|
db: &Database, |
|
|
|
|
|
|
|
sender_id: &UserId, |
|
|
|
|
|
|
|
user_id: &UserId, |
|
|
|
|
|
|
|
ignore_room: &RoomId, |
|
|
|
|
|
|
|
) -> bool { |
|
|
|
|
|
|
|
db.rooms |
|
|
|
|
|
|
|
.get_shared_rooms(vec![sender_id.clone(), user_id.clone()]) |
|
|
|
|
|
|
|
.filter_map(|r| r.ok()) |
|
|
|
|
|
|
|
.filter(|room_id| room_id != ignore_room) |
|
|
|
|
|
|
|
.filter_map(|other_room_id| { |
|
|
|
|
|
|
|
Some( |
|
|
|
|
|
|
|
db.rooms |
|
|
|
|
|
|
|
.room_state_get(&other_room_id, &EventType::RoomEncryption, "") |
|
|
|
|
|
|
|
.ok()? |
|
|
|
|
|
|
|
.is_some(), |
|
|
|
|
|
|
|
) |
|
|
|
|
|
|
|
}) |
|
|
|
|
|
|
|
.any(|encrypted| encrypted) |
|
|
|
|
|
|
|
} |
|
|
|
|