Conduit is a simple, fast and reliable chat server powered by Matrix https://conduit.rs
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2974 lines
97 KiB
2974 lines
97 KiB
use std::{ |
|
collections::BTreeMap, |
|
convert::{TryFrom, TryInto}, |
|
time::{Duration, SystemTime}, |
|
}; |
|
|
|
use crate::{utils, Database, MatrixResult, Ruma}; |
|
use log::{debug, warn}; |
|
use rocket::{delete, get, options, post, put, State}; |
|
use ruma::{ |
|
api::client::{ |
|
error::{Error, ErrorKind}, |
|
r0::{ |
|
account::{get_username_availability, register}, |
|
alias::{create_alias, delete_alias, get_alias}, |
|
capabilities::get_capabilities, |
|
config::{get_global_account_data, set_global_account_data}, |
|
context::get_context, |
|
device::{self, delete_device, delete_devices, get_device, get_devices, update_device}, |
|
directory::{ |
|
self, get_public_rooms, get_public_rooms_filtered, get_room_visibility, |
|
set_room_visibility, |
|
}, |
|
filter::{self, create_filter, get_filter}, |
|
keys::{self, claim_keys, get_keys, upload_keys}, |
|
media::{create_content, get_content, get_content_thumbnail, get_media_config}, |
|
membership::{ |
|
ban_user, forget_room, get_member_events, invite_user, join_room_by_id, |
|
join_room_by_id_or_alias, kick_user, leave_room, unban_user, |
|
}, |
|
message::{create_message_event, get_message_events}, |
|
presence::set_presence, |
|
profile::{ |
|
get_avatar_url, get_display_name, get_profile, set_avatar_url, set_display_name, |
|
}, |
|
push::{get_pushrules_all, set_pushrule, set_pushrule_enabled}, |
|
read_marker::set_read_marker, |
|
redact::redact_event, |
|
room::{self, create_room}, |
|
session::{get_login_types, login, logout}, |
|
state::{ |
|
create_state_event_for_empty_key, create_state_event_for_key, get_state_events, |
|
get_state_events_for_empty_key, get_state_events_for_key, |
|
}, |
|
sync::sync_events, |
|
thirdparty::get_protocols, |
|
to_device::{self, send_event_to_device}, |
|
typing::create_typing_event, |
|
uiaa::{AuthFlow, UiaaInfo, UiaaResponse}, |
|
user_directory::search_users, |
|
}, |
|
unversioned::get_supported_versions, |
|
}, |
|
events::{ |
|
collections::only::Event as EduEvent, |
|
room::{canonical_alias, guest_access, history_visibility, join_rules, member, redaction}, |
|
EventJson, EventType, |
|
}, |
|
identifiers::{DeviceId, RoomAliasId, RoomId, RoomVersionId, UserId}, |
|
}; |
|
use serde_json::{json, value::RawValue}; |
|
|
|
const GUEST_NAME_LENGTH: usize = 10; |
|
const DEVICE_ID_LENGTH: usize = 10; |
|
const TOKEN_LENGTH: usize = 256; |
|
const MXC_LENGTH: usize = 256; |
|
const SESSION_ID_LENGTH: usize = 256; |
|
|
|
#[get("/_matrix/client/versions")] |
|
pub fn get_supported_versions_route() -> MatrixResult<get_supported_versions::Response> { |
|
MatrixResult(Ok(get_supported_versions::Response { |
|
versions: vec!["r0.5.0".to_owned(), "r0.6.0".to_owned()], |
|
unstable_features: BTreeMap::new(), |
|
})) |
|
} |
|
|
|
#[get("/_matrix/client/r0/register/available", data = "<body>")] |
|
pub fn get_register_available_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_username_availability::Request>, |
|
) -> MatrixResult<get_username_availability::Response> { |
|
// Validate user id |
|
let user_id = |
|
match UserId::parse_with_server_name(body.username.clone(), db.globals.server_name()) |
|
.ok() |
|
.filter(|user_id| !user_id.is_historical()) |
|
{ |
|
None => { |
|
debug!("Username invalid"); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::InvalidUsername, |
|
message: "Username was invalid.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
Some(user_id) => user_id, |
|
}; |
|
|
|
// Check if username is creative enough |
|
if db.users.exists(&user_id).unwrap() { |
|
debug!("ID already taken"); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::UserInUse, |
|
message: "Desired user ID is already taken.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
|
|
// TODO add check for appservice namespaces |
|
|
|
// If no if check is true we have an username that's available to be used. |
|
MatrixResult(Ok(get_username_availability::Response { available: true })) |
|
} |
|
|
|
#[post("/_matrix/client/r0/register", data = "<body>")] |
|
pub fn register_route( |
|
db: State<'_, Database>, |
|
body: Ruma<register::Request>, |
|
) -> MatrixResult<register::Response, UiaaResponse> { |
|
if db.globals.registration_disabled() { |
|
return MatrixResult(Err(UiaaResponse::MatrixError(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Registration has been disabled.".to_owned(), |
|
status_code: http::StatusCode::FORBIDDEN, |
|
}))); |
|
} |
|
|
|
// Validate user id |
|
let user_id = match UserId::parse_with_server_name( |
|
body.username |
|
.clone() |
|
.unwrap_or_else(|| utils::random_string(GUEST_NAME_LENGTH)) |
|
.to_lowercase(), |
|
db.globals.server_name(), |
|
) |
|
.ok() |
|
.filter(|user_id| !user_id.is_historical()) |
|
{ |
|
None => { |
|
debug!("Username invalid"); |
|
return MatrixResult(Err(UiaaResponse::MatrixError(Error { |
|
kind: ErrorKind::InvalidUsername, |
|
message: "Username was invalid.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
}))); |
|
} |
|
Some(user_id) => user_id, |
|
}; |
|
|
|
// Check if username is creative enough |
|
if db.users.exists(&user_id).unwrap() { |
|
debug!("ID already taken"); |
|
return MatrixResult(Err(UiaaResponse::MatrixError(Error { |
|
kind: ErrorKind::UserInUse, |
|
message: "Desired user ID is already taken.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
}))); |
|
} |
|
|
|
// UIAA |
|
let uiaainfo = UiaaInfo { |
|
flows: vec![AuthFlow { |
|
stages: vec!["m.login.dummy".to_owned()], |
|
}], |
|
completed: Vec::new(), |
|
params: Default::default(), |
|
session: Some(utils::random_string(SESSION_ID_LENGTH)), |
|
auth_error: None, |
|
}; |
|
|
|
if let Some(auth) = &body.auth { |
|
let (worked, uiaainfo) = db |
|
.uiaa |
|
.try_auth(&user_id, &"".to_owned(), auth, &uiaainfo, &db.users, &db.globals) |
|
.unwrap(); |
|
if !worked { |
|
return MatrixResult(Err(UiaaResponse::AuthResponse(uiaainfo))); |
|
} |
|
// Success! |
|
} else { |
|
db.uiaa.create(&user_id, &"".to_owned(), &uiaainfo).unwrap(); |
|
|
|
return MatrixResult(Err(UiaaResponse::AuthResponse(uiaainfo))); |
|
} |
|
|
|
let password = body.password.clone().unwrap_or_default(); |
|
|
|
if let Ok(hash) = utils::calculate_hash(&password) { |
|
// Create user |
|
db.users.create(&user_id, &hash).unwrap(); |
|
} else { |
|
return MatrixResult(Err(UiaaResponse::MatrixError(Error { |
|
kind: ErrorKind::InvalidParam, |
|
message: "Password did not met requirements".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
}))); |
|
} |
|
|
|
// Generate new device id if the user didn't specify one |
|
let device_id = body |
|
.device_id |
|
.clone() |
|
.unwrap_or_else(|| utils::random_string(DEVICE_ID_LENGTH)); |
|
|
|
// Generate new token for the device |
|
let token = utils::random_string(TOKEN_LENGTH); |
|
|
|
// Add device |
|
db.users |
|
.create_device( |
|
&user_id, |
|
&device_id, |
|
&token, |
|
body.initial_device_display_name.clone(), |
|
) |
|
.unwrap(); |
|
|
|
// Initial data |
|
db.account_data |
|
.update( |
|
None, |
|
&user_id, |
|
&EventType::PushRules, |
|
serde_json::to_value(ruma::events::push_rules::PushRulesEvent { |
|
content: ruma::events::push_rules::PushRulesEventContent { |
|
global: ruma::events::push_rules::Ruleset { |
|
content: vec![], |
|
override_: vec![ruma::events::push_rules::ConditionalPushRule { |
|
actions: vec![ruma::events::push_rules::Action::DontNotify], |
|
default: true, |
|
enabled: false, |
|
rule_id: ".m.rule.master".to_owned(), |
|
conditions: vec![], |
|
}], |
|
room: vec![], |
|
sender: vec![], |
|
underride: vec![ruma::events::push_rules::ConditionalPushRule { |
|
actions: vec![ |
|
ruma::events::push_rules::Action::Notify, |
|
ruma::events::push_rules::Action::SetTweak( |
|
ruma::push::Tweak::Sound("default".to_owned()), |
|
), |
|
], |
|
default: true, |
|
enabled: true, |
|
rule_id: ".m.rule.message".to_owned(), |
|
conditions: vec![ruma::events::push_rules::PushCondition::EventMatch { |
|
key: "type".to_owned(), |
|
pattern: "m.room.message".to_owned(), |
|
}], |
|
}], |
|
}, |
|
}, |
|
}) |
|
.unwrap() |
|
.as_object_mut() |
|
.unwrap(), |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(register::Response { |
|
access_token: Some(token), |
|
user_id, |
|
device_id: Some(device_id), |
|
})) |
|
} |
|
|
|
#[get("/_matrix/client/r0/login")] |
|
pub fn get_login_route() -> MatrixResult<get_login_types::Response> { |
|
MatrixResult(Ok(get_login_types::Response { |
|
flows: vec![get_login_types::LoginType::Password], |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/login", data = "<body>")] |
|
pub fn login_route( |
|
db: State<'_, Database>, |
|
body: Ruma<login::Request>, |
|
) -> MatrixResult<login::Response> { |
|
// Validate login method |
|
let user_id = |
|
// TODO: Other login methods |
|
if let (login::UserInfo::MatrixId(username), login::LoginInfo::Password { password }) = |
|
(body.user.clone(), body.login_info.clone()) |
|
{ |
|
if let Ok(user_id) = UserId::parse_with_server_name(username, db.globals.server_name()) { |
|
if let Some(hash) = db.users.password_hash(&user_id).unwrap() { |
|
let hash_matches = |
|
argon2::verify_encoded(&hash, password.as_bytes()).unwrap_or(false); |
|
|
|
if hash_matches { |
|
// Success! |
|
user_id |
|
} else { |
|
debug!("Invalid password."); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "".to_owned(), |
|
status_code: http::StatusCode::FORBIDDEN, |
|
})); |
|
} |
|
} else { |
|
debug!("UserId does not exist (has no assigned password). Can't log in."); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "".to_owned(), |
|
status_code: http::StatusCode::FORBIDDEN, |
|
})); |
|
} |
|
} else { |
|
debug!("Invalid UserId."); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::InvalidUsername, |
|
message: "Bad user id.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
} else { |
|
debug!("Bad login type"); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Bad login type.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
}; |
|
|
|
// Generate new device id if the user didn't specify one |
|
let device_id = body |
|
.body |
|
.device_id |
|
.clone() |
|
.unwrap_or_else(|| utils::random_string(DEVICE_ID_LENGTH)); |
|
|
|
// Generate a new token for the device |
|
let token = utils::random_string(TOKEN_LENGTH); |
|
|
|
// Add device |
|
db.users |
|
.create_device( |
|
&user_id, |
|
&device_id, |
|
&token, |
|
body.initial_device_display_name.clone(), |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(login::Response { |
|
user_id, |
|
access_token: token, |
|
home_server: Some(db.globals.server_name().to_owned()), |
|
device_id, |
|
well_known: None, |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/logout", data = "<body>")] |
|
pub fn logout_route( |
|
db: State<'_, Database>, |
|
body: Ruma<logout::Request>, |
|
) -> MatrixResult<logout::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let device_id = body.device_id.as_ref().expect("user is authenticated"); |
|
|
|
db.users.remove_device(&user_id, &device_id).unwrap(); |
|
|
|
MatrixResult(Ok(logout::Response)) |
|
} |
|
|
|
#[get("/_matrix/client/r0/capabilities")] |
|
pub fn get_capabilities_route() -> MatrixResult<get_capabilities::Response> { |
|
let mut available = BTreeMap::new(); |
|
available.insert( |
|
RoomVersionId::version_5(), |
|
get_capabilities::RoomVersionStability::Stable, |
|
); |
|
available.insert( |
|
RoomVersionId::version_6(), |
|
get_capabilities::RoomVersionStability::Stable, |
|
); |
|
|
|
MatrixResult(Ok(get_capabilities::Response { |
|
capabilities: get_capabilities::Capabilities { |
|
change_password: None, // None means it is possible |
|
room_versions: Some(get_capabilities::RoomVersionsCapability { |
|
default: "6".to_owned(), |
|
available, |
|
}), |
|
custom_capabilities: BTreeMap::new(), |
|
}, |
|
})) |
|
} |
|
|
|
#[get("/_matrix/client/r0/pushrules", data = "<body>")] |
|
pub fn get_pushrules_all_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_pushrules_all::Request>, |
|
) -> MatrixResult<get_pushrules_all::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if let Some(EduEvent::PushRules(pushrules)) = db |
|
.account_data |
|
.get(None, &user_id, &EventType::PushRules) |
|
.unwrap() |
|
.map(|edu| edu.deserialize().expect("PushRules event in db is valid")) |
|
{ |
|
MatrixResult(Ok(get_pushrules_all::Response { |
|
global: pushrules.content.global, |
|
})) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "PushRules event not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/pushrules/<_scope>/<_kind>/<_rule_id>", |
|
data = "<body>" |
|
)] |
|
pub fn set_pushrule_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_pushrule::Request>, |
|
_scope: String, |
|
_kind: String, |
|
_rule_id: String, |
|
) -> MatrixResult<set_pushrule::Response> { |
|
// TODO |
|
warn!("TODO: set_pushrule_route"); |
|
MatrixResult(Ok(set_pushrule::Response)) |
|
} |
|
|
|
#[put("/_matrix/client/r0/pushrules/<_scope>/<_kind>/<_rule_id>/enabled")] |
|
pub fn set_pushrule_enabled_route( |
|
_scope: String, |
|
_kind: String, |
|
_rule_id: String, |
|
) -> MatrixResult<set_pushrule_enabled::Response> { |
|
// TODO |
|
warn!("TODO: set_pushrule_enabled_route"); |
|
MatrixResult(Ok(set_pushrule_enabled::Response)) |
|
} |
|
|
|
#[get("/_matrix/client/r0/user/<_user_id>/filter/<_filter_id>")] |
|
pub fn get_filter_route( |
|
_user_id: String, |
|
_filter_id: String, |
|
) -> MatrixResult<get_filter::Response> { |
|
// TODO |
|
MatrixResult(Ok(get_filter::Response { |
|
filter: filter::FilterDefinition { |
|
event_fields: None, |
|
event_format: None, |
|
account_data: None, |
|
room: None, |
|
presence: None, |
|
}, |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/user/<_user_id>/filter")] |
|
pub fn create_filter_route(_user_id: String) -> MatrixResult<create_filter::Response> { |
|
// TODO |
|
MatrixResult(Ok(create_filter::Response { |
|
filter_id: utils::random_string(10), |
|
})) |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/user/<_user_id>/account_data/<_type>", |
|
data = "<body>" |
|
)] |
|
pub fn set_global_account_data_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_global_account_data::Request>, |
|
_user_id: String, |
|
_type: String, |
|
) -> MatrixResult<set_global_account_data::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
db.account_data |
|
.update( |
|
None, |
|
user_id, |
|
&EventType::try_from(&body.event_type).unwrap(), |
|
json!({"content": serde_json::from_str::<serde_json::Value>(body.data.get()).unwrap()}) |
|
.as_object_mut() |
|
.unwrap(), |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(set_global_account_data::Response)) |
|
} |
|
|
|
#[get( |
|
"/_matrix/client/r0/user/<_user_id>/account_data/<_type>", |
|
data = "<body>" |
|
)] |
|
pub fn get_global_account_data_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_global_account_data::Request>, |
|
_user_id: String, |
|
_type: String, |
|
) -> MatrixResult<get_global_account_data::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if let Some(data) = db |
|
.account_data |
|
.get( |
|
None, |
|
user_id, |
|
&EventType::try_from(&body.event_type).unwrap(), |
|
) |
|
.unwrap() |
|
{ |
|
MatrixResult(Ok(get_global_account_data::Response { account_data: data })) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Data not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[put("/_matrix/client/r0/profile/<_user_id>/displayname", data = "<body>")] |
|
pub fn set_displayname_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_display_name::Request>, |
|
_user_id: String, |
|
) -> MatrixResult<set_display_name::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
db.users |
|
.set_displayname(&user_id, body.displayname.clone()) |
|
.unwrap(); |
|
|
|
// Send a new membership event into all joined rooms |
|
for room_id in db.rooms.rooms_joined(&user_id) { |
|
let room_id = room_id.unwrap(); |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomMember, |
|
serde_json::to_value(ruma::events::room::member::MemberEventContent { |
|
displayname: body.displayname.clone(), |
|
..serde_json::from_value::<EventJson<_>>( |
|
db.rooms |
|
.room_state(&room_id) |
|
.unwrap() |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.expect("user is part of the room") |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
}) |
|
.unwrap(), |
|
None, |
|
Some(user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
|
|
// Presence update |
|
db.global_edus |
|
.update_presence( |
|
ruma::events::presence::PresenceEvent { |
|
content: ruma::events::presence::PresenceEventContent { |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
currently_active: None, |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
last_active_ago: Some(utils::millis_since_unix_epoch().try_into().unwrap()), |
|
presence: ruma::events::presence::PresenceState::Online, |
|
status_msg: None, |
|
}, |
|
sender: user_id.clone(), |
|
}, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(set_display_name::Response)) |
|
} |
|
|
|
#[get("/_matrix/client/r0/profile/<_user_id>/displayname", data = "<body>")] |
|
pub fn get_displayname_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_display_name::Request>, |
|
_user_id: String, |
|
) -> MatrixResult<get_display_name::Response> { |
|
let user_id = (*body).user_id.clone(); |
|
MatrixResult(Ok(get_display_name::Response { |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
})) |
|
} |
|
|
|
#[put("/_matrix/client/r0/profile/<_user_id>/avatar_url", data = "<body>")] |
|
pub fn set_avatar_url_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_avatar_url::Request>, |
|
_user_id: String, |
|
) -> MatrixResult<set_avatar_url::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if let Some(avatar_url) = &body.avatar_url { |
|
if !avatar_url.starts_with("mxc://") { |
|
debug!("Request contains an invalid avatar_url."); |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::InvalidParam, |
|
message: "avatar_url has to start with mxc://.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
|
|
// TODO in the future when we can handle media uploads make sure that this url is our own server |
|
// TODO also make sure this is valid mxc:// format (not only starting with it) |
|
} |
|
|
|
db.users |
|
.set_avatar_url(&user_id, body.avatar_url.clone()) |
|
.unwrap(); |
|
|
|
// Send a new membership event into all joined rooms |
|
for room_id in db.rooms.rooms_joined(&user_id) { |
|
let room_id = room_id.unwrap(); |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomMember, |
|
serde_json::to_value(ruma::events::room::member::MemberEventContent { |
|
avatar_url: body.avatar_url.clone(), |
|
..serde_json::from_value::<EventJson<_>>( |
|
db.rooms |
|
.room_state(&room_id) |
|
.unwrap() |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.expect("user should be part of the room") |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
}) |
|
.unwrap(), |
|
None, |
|
Some(user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
|
|
// Presence update |
|
db.global_edus |
|
.update_presence( |
|
ruma::events::presence::PresenceEvent { |
|
content: ruma::events::presence::PresenceEventContent { |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
currently_active: None, |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
last_active_ago: Some(utils::millis_since_unix_epoch().try_into().unwrap()), |
|
presence: ruma::events::presence::PresenceState::Online, |
|
status_msg: None, |
|
}, |
|
sender: user_id.clone(), |
|
}, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(set_avatar_url::Response)) |
|
} |
|
|
|
#[get("/_matrix/client/r0/profile/<_user_id>/avatar_url", data = "<body>")] |
|
pub fn get_avatar_url_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_avatar_url::Request>, |
|
_user_id: String, |
|
) -> MatrixResult<get_avatar_url::Response> { |
|
let user_id = (*body).user_id.clone(); |
|
MatrixResult(Ok(get_avatar_url::Response { |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
})) |
|
} |
|
|
|
#[get("/_matrix/client/r0/profile/<_user_id>", data = "<body>")] |
|
pub fn get_profile_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_profile::Request>, |
|
_user_id: String, |
|
) -> MatrixResult<get_profile::Response> { |
|
let user_id = (*body).user_id.clone(); |
|
let avatar_url = db.users.avatar_url(&user_id).unwrap(); |
|
let displayname = db.users.displayname(&user_id).unwrap(); |
|
|
|
if avatar_url.is_some() || displayname.is_some() { |
|
return MatrixResult(Ok(get_profile::Response { |
|
avatar_url, |
|
displayname, |
|
})); |
|
} |
|
|
|
// Return 404 if we don't have a profile for this id |
|
debug!("Profile was not found."); |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Profile was not found.".to_owned(), |
|
status_code: http::StatusCode::NOT_FOUND, |
|
})) |
|
} |
|
|
|
#[put("/_matrix/client/r0/presence/<_user_id>/status", data = "<body>")] |
|
pub fn set_presence_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_presence::Request>, |
|
_user_id: String, |
|
) -> MatrixResult<set_presence::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
db.global_edus |
|
.update_presence( |
|
ruma::events::presence::PresenceEvent { |
|
content: ruma::events::presence::PresenceEventContent { |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
currently_active: None, |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
last_active_ago: Some(utils::millis_since_unix_epoch().try_into().unwrap()), |
|
presence: body.presence, |
|
status_msg: body.status_msg.clone(), |
|
}, |
|
sender: user_id.clone(), |
|
}, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(set_presence::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/keys/upload", data = "<body>")] |
|
pub fn upload_keys_route( |
|
db: State<'_, Database>, |
|
body: Ruma<upload_keys::Request>, |
|
) -> MatrixResult<upload_keys::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let device_id = body.device_id.as_ref().expect("user is authenticated"); |
|
|
|
if let Some(one_time_keys) = &body.one_time_keys { |
|
for (key_key, key_value) in one_time_keys { |
|
db.users |
|
.add_one_time_key(user_id, device_id, key_key, key_value) |
|
.unwrap(); |
|
} |
|
} |
|
|
|
if let Some(device_keys) = &body.device_keys { |
|
db.users |
|
.add_device_keys(user_id, device_id, device_keys, &db.globals) |
|
.unwrap(); |
|
} |
|
|
|
MatrixResult(Ok(upload_keys::Response { |
|
one_time_key_counts: db.users.count_one_time_keys(user_id, device_id).unwrap(), |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/keys/query", data = "<body>")] |
|
pub fn get_keys_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_keys::Request>, |
|
) -> MatrixResult<get_keys::Response> { |
|
let mut device_keys = BTreeMap::new(); |
|
|
|
for (user_id, device_ids) in &body.device_keys { |
|
if device_ids.is_empty() { |
|
let mut container = BTreeMap::new(); |
|
for (device_id, mut keys) in db |
|
.users |
|
.all_device_keys(&user_id.clone()) |
|
.map(|r| r.unwrap()) |
|
{ |
|
let metadata = db |
|
.users |
|
.get_device_metadata(user_id, &device_id) |
|
.unwrap() |
|
.expect("this device should exist"); |
|
|
|
keys.unsigned = Some(keys::UnsignedDeviceInfo { |
|
device_display_name: metadata.display_name, |
|
}); |
|
|
|
container.insert(device_id, keys); |
|
} |
|
device_keys.insert(user_id.clone(), container); |
|
} else { |
|
for device_id in device_ids { |
|
let mut container = BTreeMap::new(); |
|
for keys in db.users.get_device_keys(&user_id.clone(), &device_id) { |
|
let mut keys = keys.unwrap(); |
|
let metadata = db |
|
.users |
|
.get_device_metadata(user_id, &device_id) |
|
.unwrap() |
|
.expect("this device should exist"); |
|
|
|
keys.unsigned = Some(keys::UnsignedDeviceInfo { |
|
device_display_name: metadata.display_name, |
|
}); |
|
|
|
container.insert(device_id.clone(), keys); |
|
} |
|
device_keys.insert(user_id.clone(), container); |
|
} |
|
} |
|
} |
|
|
|
MatrixResult(Ok(get_keys::Response { |
|
failures: BTreeMap::new(), |
|
device_keys, |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/keys/claim", data = "<body>")] |
|
pub fn claim_keys_route( |
|
db: State<'_, Database>, |
|
body: Ruma<claim_keys::Request>, |
|
) -> MatrixResult<claim_keys::Response> { |
|
let mut one_time_keys = BTreeMap::new(); |
|
for (user_id, map) in &body.one_time_keys { |
|
let mut container = BTreeMap::new(); |
|
for (device_id, key_algorithm) in map { |
|
if let Some(one_time_keys) = db |
|
.users |
|
.take_one_time_key(user_id, device_id, key_algorithm) |
|
.unwrap() |
|
{ |
|
let mut c = BTreeMap::new(); |
|
c.insert(one_time_keys.0, one_time_keys.1); |
|
container.insert(device_id.clone(), c); |
|
} |
|
} |
|
one_time_keys.insert(user_id.clone(), container); |
|
} |
|
|
|
MatrixResult(Ok(claim_keys::Response { |
|
failures: BTreeMap::new(), |
|
one_time_keys, |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/read_markers", data = "<body>")] |
|
pub fn set_read_marker_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_read_marker::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<set_read_marker::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
db.account_data |
|
.update( |
|
Some(&body.room_id), |
|
&user_id, |
|
&EventType::FullyRead, |
|
serde_json::to_value(ruma::events::fully_read::FullyReadEvent { |
|
content: ruma::events::fully_read::FullyReadEventContent { |
|
event_id: body.fully_read.clone(), |
|
}, |
|
room_id: Some(body.room_id.clone()), |
|
}) |
|
.unwrap() |
|
.as_object_mut() |
|
.unwrap(), |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
if let Some(event) = &body.read_receipt { |
|
db.rooms |
|
.edus |
|
.room_read_set( |
|
&body.room_id, |
|
&user_id, |
|
db.rooms |
|
.get_pdu_count(event) |
|
.unwrap() |
|
.expect("TODO: what if a client specifies an invalid event"), |
|
) |
|
.unwrap(); |
|
|
|
let mut user_receipts = BTreeMap::new(); |
|
user_receipts.insert( |
|
user_id.clone(), |
|
ruma::events::receipt::Receipt { |
|
ts: Some(SystemTime::now()), |
|
}, |
|
); |
|
let mut receipt_content = BTreeMap::new(); |
|
receipt_content.insert( |
|
event.clone(), |
|
ruma::events::receipt::Receipts { |
|
read: Some(user_receipts), |
|
}, |
|
); |
|
|
|
db.rooms |
|
.edus |
|
.roomlatest_update( |
|
&user_id, |
|
&body.room_id, |
|
EduEvent::Receipt(ruma::events::receipt::ReceiptEvent { |
|
content: receipt_content, |
|
room_id: None, // None because it can be inferred |
|
}), |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
MatrixResult(Ok(set_read_marker::Response)) |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/rooms/<_room_id>/typing/<_user_id>", |
|
data = "<body>" |
|
)] |
|
pub fn create_typing_event_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_typing_event::Request>, |
|
_room_id: String, |
|
_user_id: String, |
|
) -> MatrixResult<create_typing_event::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if body.typing { |
|
db.rooms |
|
.edus |
|
.roomactive_add( |
|
&user_id, |
|
&body.room_id, |
|
body.timeout.map(|d| d.as_millis() as u64).unwrap_or(30000) |
|
+ utils::millis_since_unix_epoch().try_into().unwrap_or(0), |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} else { |
|
db.rooms |
|
.edus |
|
.roomactive_remove(&user_id, &body.room_id, &db.globals) |
|
.unwrap(); |
|
} |
|
|
|
MatrixResult(Ok(create_typing_event::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/createRoom", data = "<body>")] |
|
pub fn create_room_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_room::Request>, |
|
) -> MatrixResult<create_room::Response> { |
|
let room_id = RoomId::new(db.globals.server_name()).expect("host is valid"); |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
let alias = if let Some(localpart) = &body.room_alias_name { |
|
// TODO: Check for invalid characters and maximum length |
|
if let Ok(alias) = |
|
RoomAliasId::try_from(format!("#{}:{}", localpart, db.globals.server_name())) |
|
{ |
|
if db.rooms.id_from_alias(&alias).unwrap().is_some() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Alias already exists.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
|
|
Some(alias) |
|
} else { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Invalid alias.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
} else { |
|
None |
|
}; |
|
|
|
// 1. The room create event |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomCreate, |
|
serde_json::to_value(ruma::events::room::create::CreateEventContent { |
|
creator: user_id.clone(), |
|
federate: body.creation_content.as_ref().map_or(true, |c| c.federate), |
|
predecessor: body |
|
.creation_content |
|
.as_ref() |
|
.and_then(|c| c.predecessor.clone()), |
|
room_version: RoomVersionId::version_6(), |
|
}) |
|
.unwrap(), |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
// 2. Let the room creator join |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomMember, |
|
serde_json::to_value(member::MemberEventContent { |
|
membership: member::MembershipState::Join, |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
is_direct: body.is_direct, |
|
third_party_invite: None, |
|
}) |
|
.unwrap(), |
|
None, |
|
Some(user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
// Figure out preset. We need it for power levels and preset specific events |
|
let visibility = body.visibility.unwrap_or(room::Visibility::Private); |
|
let preset = body.preset.unwrap_or_else(|| match visibility { |
|
room::Visibility::Private => create_room::RoomPreset::PrivateChat, |
|
room::Visibility::Public => create_room::RoomPreset::PublicChat, |
|
}); |
|
|
|
// 3. Power levels |
|
let mut users = BTreeMap::new(); |
|
users.insert(user_id.clone(), 100.into()); |
|
for invite_user_id in &body.invite { |
|
users.insert(invite_user_id.clone(), 100.into()); |
|
} |
|
|
|
let power_levels_content = if let Some(power_levels) = &body.power_level_content_override { |
|
serde_json::from_str(power_levels.json().get()) |
|
.expect("TODO: handle. we hope the client sends a valid power levels json") |
|
} else { |
|
serde_json::to_value(ruma::events::room::power_levels::PowerLevelsEventContent { |
|
ban: 50.into(), |
|
events: BTreeMap::new(), |
|
events_default: 0.into(), |
|
invite: 50.into(), |
|
kick: 50.into(), |
|
redact: 50.into(), |
|
state_default: 50.into(), |
|
users, |
|
users_default: 0.into(), |
|
notifications: ruma::events::room::power_levels::NotificationPowerLevels { |
|
room: 50.into(), |
|
}, |
|
}) |
|
.unwrap() |
|
}; |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomPowerLevels, |
|
power_levels_content, |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
// 4. Events set by preset |
|
// 4.1 Join Rules |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomJoinRules, |
|
match preset { |
|
create_room::RoomPreset::PublicChat => { |
|
serde_json::to_value(join_rules::JoinRulesEventContent { |
|
join_rule: join_rules::JoinRule::Public, |
|
}) |
|
.unwrap() |
|
} |
|
_ => serde_json::to_value(join_rules::JoinRulesEventContent { |
|
join_rule: join_rules::JoinRule::Invite, |
|
}) |
|
.unwrap(), |
|
}, |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
// 4.2 History Visibility |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomHistoryVisibility, |
|
serde_json::to_value(history_visibility::HistoryVisibilityEventContent { |
|
history_visibility: history_visibility::HistoryVisibility::Shared, |
|
}) |
|
.unwrap(), |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
// 4.3 Guest Access |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomGuestAccess, |
|
match preset { |
|
create_room::RoomPreset::PublicChat => { |
|
serde_json::to_value(guest_access::GuestAccessEventContent { |
|
guest_access: guest_access::GuestAccess::Forbidden, |
|
}) |
|
.unwrap() |
|
} |
|
_ => serde_json::to_value(guest_access::GuestAccessEventContent { |
|
guest_access: guest_access::GuestAccess::CanJoin, |
|
}) |
|
.unwrap(), |
|
}, |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
// 5. Events listed in initial_state |
|
for create_room::InitialStateEvent { |
|
event_type, |
|
state_key, |
|
content, |
|
} in &body.initial_state |
|
{ |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
event_type.clone(), |
|
serde_json::from_str(content.get()).unwrap(), |
|
None, |
|
state_key.clone(), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
|
|
// 6. Events implied by name and topic |
|
if let Some(name) = &body.name { |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomName, |
|
serde_json::to_value( |
|
ruma::events::room::name::NameEventContent::new(name.clone()).unwrap(), |
|
) |
|
.unwrap(), |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
|
|
if let Some(topic) = &body.topic { |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomTopic, |
|
serde_json::to_value(ruma::events::room::topic::TopicEventContent { |
|
topic: topic.clone(), |
|
}) |
|
.unwrap(), |
|
None, |
|
Some("".to_owned()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
|
|
// 7. Events implied by invite (and TODO: invite_3pid) |
|
for user in &body.invite { |
|
db.rooms |
|
.append_pdu( |
|
room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomMember, |
|
serde_json::to_value(member::MemberEventContent { |
|
membership: member::MembershipState::Invite, |
|
displayname: db.users.displayname(&user).unwrap(), |
|
avatar_url: db.users.avatar_url(&user).unwrap(), |
|
is_direct: body.is_direct, |
|
third_party_invite: None, |
|
}) |
|
.unwrap(), |
|
None, |
|
Some(user.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
|
|
// Homeserver specific stuff |
|
if let Some(alias) = alias { |
|
db.rooms |
|
.set_alias(&alias, Some(&room_id), &db.globals) |
|
.unwrap(); |
|
} |
|
|
|
if let Some(room::Visibility::Public) = body.visibility { |
|
db.rooms.set_public(&room_id, true).unwrap(); |
|
} |
|
|
|
MatrixResult(Ok(create_room::Response { room_id })) |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/rooms/<_room_id>/redact/<_event_id>/<_txn_id>", |
|
data = "<body>" |
|
)] |
|
pub fn redact_event_route( |
|
db: State<'_, Database>, |
|
body: Ruma<redact_event::Request>, |
|
_room_id: String, |
|
_event_id: String, |
|
_txn_id: String, |
|
) -> MatrixResult<redact_event::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if let Ok(event_id) = db.rooms.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomRedaction, |
|
serde_json::to_value(redaction::RedactionEventContent { |
|
reason: body.reason.clone(), |
|
}) |
|
.unwrap(), |
|
None, |
|
None, |
|
Some(body.event_id.clone()), |
|
&db.globals, |
|
) { |
|
MatrixResult(Ok(redact_event::Response { event_id })) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Failed to redact event.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[put("/_matrix/client/r0/directory/room/<_room_alias>", data = "<body>")] |
|
pub fn create_alias_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_alias::Request>, |
|
_room_alias: String, |
|
) -> MatrixResult<create_alias::Response> { |
|
if db.rooms.id_from_alias(&body.room_alias).unwrap().is_some() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Alias already exists".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
|
|
db.rooms |
|
.set_alias(&body.room_alias, Some(&body.room_id), &db.globals) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(create_alias::Response)) |
|
} |
|
|
|
#[delete("/_matrix/client/r0/directory/room/<_room_alias>", data = "<body>")] |
|
pub fn delete_alias_route( |
|
db: State<'_, Database>, |
|
body: Ruma<delete_alias::Request>, |
|
_room_alias: String, |
|
) -> MatrixResult<delete_alias::Response> { |
|
db.rooms |
|
.set_alias(&body.room_alias, None, &db.globals) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(delete_alias::Response)) |
|
} |
|
|
|
#[get("/_matrix/client/r0/directory/room/<_room_alias>", data = "<body>")] |
|
pub fn get_alias_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_alias::Request>, |
|
_room_alias: String, |
|
) -> MatrixResult<get_alias::Response> { |
|
if body.room_alias.server_name() == db.globals.server_name() { |
|
if let Some(room_id) = db.rooms.id_from_alias(&body.room_alias).unwrap() { |
|
MatrixResult(Ok(get_alias::Response { |
|
room_id, |
|
servers: vec![db.globals.server_name().to_owned()], |
|
})) |
|
} else { |
|
debug!("Room alias not found."); |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Room with alias not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} else { |
|
todo!("ask remote server"); |
|
} |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/join", data = "<body>")] |
|
pub fn join_room_by_id_route( |
|
db: State<'_, Database>, |
|
body: Ruma<join_room_by_id::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<join_room_by_id::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
// TODO: Ask a remote server if we don't have this room |
|
|
|
let event = db |
|
.rooms |
|
.room_state(&body.room_id) |
|
.unwrap() |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.map_or_else( |
|
|| { |
|
// There was no existing membership event |
|
member::MemberEventContent { |
|
membership: member::MembershipState::Join, |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
is_direct: None, |
|
third_party_invite: None, |
|
} |
|
}, |
|
|pdu| { |
|
// We change the existing membership event |
|
let mut event = serde_json::from_value::<EventJson<member::MemberEventContent>>( |
|
pdu.content.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
event.membership = member::MembershipState::Join; |
|
event.displayname = db.users.displayname(&user_id).unwrap(); |
|
event.avatar_url = db.users.avatar_url(&user_id).unwrap(); |
|
event |
|
}, |
|
); |
|
|
|
db.rooms |
|
.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomMember, |
|
serde_json::to_value(event).unwrap(), |
|
None, |
|
Some(user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(join_room_by_id::Response { |
|
room_id: body.room_id.clone(), |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/join/<_room_id_or_alias>", data = "<body>")] |
|
pub fn join_room_by_id_or_alias_route( |
|
db: State<'_, Database>, |
|
body: Ruma<join_room_by_id_or_alias::Request>, |
|
_room_id_or_alias: String, |
|
) -> MatrixResult<join_room_by_id_or_alias::Response> { |
|
let room_id = match RoomId::try_from(body.room_id_or_alias.clone()) { |
|
Ok(room_id) => room_id, |
|
Err(_) => { |
|
if let Some(room_id) = db |
|
.rooms |
|
.id_from_alias(&body.room_id_or_alias.clone().try_into().unwrap()) |
|
.unwrap() |
|
{ |
|
room_id |
|
} else { |
|
// Ask creator server of the room to join TODO ask someone else when not available |
|
//server_server::send_request(data, destination, request) |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Room alias not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
} |
|
}; |
|
|
|
let body = Ruma { |
|
user_id: body.user_id.clone(), |
|
device_id: body.device_id.clone(), |
|
json_body: None, |
|
body: join_room_by_id::Request { |
|
room_id, |
|
third_party_signed: body.third_party_signed.clone(), |
|
}, |
|
}; |
|
MatrixResult(match join_room_by_id_route(db, body, "".to_owned()).0 { |
|
Ok(response) => Ok(join_room_by_id_or_alias::Response { |
|
room_id: response.room_id, |
|
}), |
|
Err(e) => Err(e), |
|
}) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/leave", data = "<body>")] |
|
pub fn leave_room_route( |
|
db: State<'_, Database>, |
|
body: Ruma<leave_room::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<leave_room::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let state = db.rooms.room_state(&body.room_id).unwrap(); |
|
|
|
let mut event = |
|
serde_json::from_value::<EventJson<ruma::events::room::member::MemberEventContent>>( |
|
state |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.unwrap() // TODO: error handling |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
event.membership = ruma::events::room::member::MembershipState::Leave; |
|
|
|
db.rooms |
|
.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), |
|
EventType::RoomMember, |
|
serde_json::to_value(event).unwrap(), |
|
None, |
|
Some(user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(leave_room::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/kick", data = "<body>")] |
|
pub fn kick_user_route( |
|
db: State<'_, Database>, |
|
body: Ruma<kick_user::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<kick_user::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let state = db.rooms.room_state(&body.room_id).unwrap(); |
|
|
|
let mut event = |
|
serde_json::from_value::<EventJson<ruma::events::room::member::MemberEventContent>>( |
|
state |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.unwrap() // TODO: error handling |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
event.membership = ruma::events::room::member::MembershipState::Leave; |
|
// TODO: reason |
|
|
|
db.rooms |
|
.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), // Sender |
|
EventType::RoomMember, |
|
serde_json::to_value(event).unwrap(), |
|
None, |
|
Some(body.body.user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(kick_user::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/ban", data = "<body>")] |
|
pub fn ban_user_route( |
|
db: State<'_, Database>, |
|
body: Ruma<ban_user::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<ban_user::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let state = db.rooms.room_state(&body.room_id).unwrap(); |
|
|
|
let mut event = |
|
serde_json::from_value::<EventJson<ruma::events::room::member::MemberEventContent>>( |
|
state |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.unwrap() // TODO: error handling |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
event.membership = ruma::events::room::member::MembershipState::Ban; |
|
// TODO: reason |
|
|
|
db.rooms |
|
.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), // Sender |
|
EventType::RoomMember, |
|
serde_json::to_value(event).unwrap(), |
|
None, |
|
Some(body.body.user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(ban_user::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/unban", data = "<body>")] |
|
pub fn unban_user_route( |
|
db: State<'_, Database>, |
|
body: Ruma<unban_user::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<unban_user::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let state = db.rooms.room_state(&body.room_id).unwrap(); |
|
|
|
let mut event = |
|
serde_json::from_value::<EventJson<ruma::events::room::member::MemberEventContent>>( |
|
state |
|
.get(&(EventType::RoomMember, user_id.to_string())) |
|
.unwrap() // TODO: error handling |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
event.membership = ruma::events::room::member::MembershipState::Leave; |
|
|
|
db.rooms |
|
.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), // Sender |
|
EventType::RoomMember, |
|
serde_json::to_value(event).unwrap(), |
|
None, |
|
Some(body.body.user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(unban_user::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/forget", data = "<body>")] |
|
pub fn forget_room_route( |
|
db: State<'_, Database>, |
|
body: Ruma<forget_room::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<forget_room::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
db.rooms.forget(&body.room_id, &user_id).unwrap(); |
|
|
|
MatrixResult(Ok(forget_room::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/rooms/<_room_id>/invite", data = "<body>")] |
|
pub fn invite_user_route( |
|
db: State<'_, Database>, |
|
body: Ruma<invite_user::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<invite_user::Response> { |
|
if let invite_user::InvitationRecipient::UserId { user_id } = &body.recipient { |
|
db.rooms |
|
.append_pdu( |
|
body.room_id.clone(), |
|
body.user_id.clone().expect("user is authenticated"), |
|
EventType::RoomMember, |
|
serde_json::to_value(member::MemberEventContent { |
|
membership: member::MembershipState::Invite, |
|
displayname: db.users.displayname(&user_id).unwrap(), |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
is_direct: None, |
|
third_party_invite: None, |
|
}) |
|
.unwrap(), |
|
None, |
|
Some(user_id.to_string()), |
|
None, |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(invite_user::Response)) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "User not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[put("/_matrix/client/r0/directory/list/room/<_room_id>", data = "<body>")] |
|
pub async fn set_room_visibility_route( |
|
db: State<'_, Database>, |
|
body: Ruma<set_room_visibility::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<set_room_visibility::Response> { |
|
match body.visibility { |
|
room::Visibility::Public => db.rooms.set_public(&body.room_id, true).unwrap(), |
|
room::Visibility::Private => db.rooms.set_public(&body.room_id, false).unwrap(), |
|
} |
|
|
|
MatrixResult(Ok(set_room_visibility::Response)) |
|
} |
|
|
|
#[get("/_matrix/client/r0/directory/list/room/<_room_id>", data = "<body>")] |
|
pub async fn get_room_visibility_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_room_visibility::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<get_room_visibility::Response> { |
|
MatrixResult(Ok(get_room_visibility::Response { |
|
visibility: if db.rooms.is_public_room(&body.room_id).unwrap() { |
|
room::Visibility::Public |
|
} else { |
|
room::Visibility::Private |
|
}, |
|
})) |
|
} |
|
|
|
#[get("/_matrix/client/r0/publicRooms", data = "<body>")] |
|
pub async fn get_public_rooms_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_public_rooms::Request>, |
|
) -> MatrixResult<get_public_rooms::Response> { |
|
let Ruma { |
|
body: |
|
get_public_rooms::Request { |
|
limit, |
|
server, |
|
since, |
|
}, |
|
user_id, |
|
device_id, |
|
json_body, |
|
} = body; |
|
|
|
let response = get_public_rooms_filtered_route( |
|
db, |
|
Ruma { |
|
body: get_public_rooms_filtered::Request { |
|
filter: None, |
|
limit, |
|
room_network: get_public_rooms_filtered::RoomNetwork::Matrix, |
|
server, |
|
since, |
|
}, |
|
user_id, |
|
device_id, |
|
json_body, |
|
}, |
|
) |
|
.await; |
|
|
|
MatrixResult(match response.0 { |
|
Ok(get_public_rooms_filtered::Response { |
|
chunk, |
|
prev_batch, |
|
next_batch, |
|
total_room_count_estimate, |
|
}) => Ok(get_public_rooms::Response { |
|
chunk, |
|
prev_batch, |
|
next_batch, |
|
total_room_count_estimate, |
|
}), |
|
Err(e) => Err(e), |
|
}) |
|
} |
|
|
|
#[post("/_matrix/client/r0/publicRooms", data = "<body>")] |
|
pub async fn get_public_rooms_filtered_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_public_rooms_filtered::Request>, |
|
) -> MatrixResult<get_public_rooms_filtered::Response> { |
|
let mut chunk = db |
|
.rooms |
|
.public_rooms() |
|
.map(|room_id| { |
|
let room_id = room_id.unwrap(); |
|
|
|
let state = db.rooms.room_state(&room_id).unwrap(); |
|
|
|
directory::PublicRoomsChunk { |
|
aliases: Vec::new(), |
|
canonical_alias: state.get(&(EventType::RoomCanonicalAlias, "".to_owned())).and_then(|s| { |
|
serde_json::from_value::< |
|
EventJson<ruma::events::room::canonical_alias::CanonicalAliasEventContent>, |
|
>(s.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
.alias |
|
}), |
|
name: state.get(&(EventType::RoomName, "".to_owned())).map(|s| { |
|
serde_json::from_value::<EventJson<ruma::events::room::name::NameEventContent>>( |
|
s.content.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
.name() |
|
.unwrap() |
|
.to_owned() |
|
}), |
|
num_joined_members: (db.rooms.room_members(&room_id).count() as u32).into(), |
|
room_id, |
|
topic: state.get(&(EventType::RoomTopic, "".to_owned())).map(|s| { |
|
serde_json::from_value::< |
|
EventJson<ruma::events::room::topic::TopicEventContent>, |
|
>(s.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
.topic |
|
}), |
|
world_readable: state.get(&(EventType::RoomHistoryVisibility, "".to_owned())).map_or(false, |s| { |
|
serde_json::from_value::< |
|
EventJson<ruma::events::room::history_visibility::HistoryVisibilityEventContent>, |
|
>(s.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
.history_visibility == history_visibility::HistoryVisibility::WorldReadable |
|
}), |
|
guest_can_join: state.get(&(EventType::RoomGuestAccess, "".to_owned())).map_or(false, |s| { |
|
serde_json::from_value::< |
|
EventJson<ruma::events::room::guest_access::GuestAccessEventContent>, |
|
>(s.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
.guest_access == guest_access::GuestAccess::CanJoin |
|
}), |
|
avatar_url: state.get(&(EventType::RoomAvatar, "".to_owned())).map(|s| { |
|
serde_json::from_value::< |
|
EventJson<ruma::events::room::avatar::AvatarEventContent>, |
|
>(s.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap() |
|
.url |
|
}), |
|
} |
|
}) |
|
.collect::<Vec<_>>(); |
|
|
|
chunk.sort_by(|l, r| r.num_joined_members.cmp(&l.num_joined_members)); |
|
|
|
/* |
|
chunk.extend_from_slice( |
|
&server_server::send_request( |
|
&db, |
|
"privacytools.io".to_owned(), |
|
ruma::api::federation::v1::get_public_rooms::Request { |
|
limit: Some(20_u32.into()), |
|
since: None, |
|
room_network: ruma::api::federation::v1::get_public_rooms::RoomNetwork::Matrix, |
|
}, |
|
) |
|
.await |
|
.unwrap() |
|
.chunk |
|
.into_iter() |
|
.map(|c| serde_json::from_str(&serde_json::to_string(&c).unwrap()).unwrap()) |
|
.collect::<Vec<_>>(), |
|
); |
|
*/ |
|
|
|
let total_room_count_estimate = (chunk.len() as u32).into(); |
|
|
|
MatrixResult(Ok(get_public_rooms_filtered::Response { |
|
chunk, |
|
prev_batch: None, |
|
next_batch: None, |
|
total_room_count_estimate: Some(total_room_count_estimate), |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/user_directory/search", data = "<body>")] |
|
pub fn search_users_route( |
|
db: State<'_, Database>, |
|
body: Ruma<search_users::Request>, |
|
) -> MatrixResult<search_users::Response> { |
|
MatrixResult(Ok(search_users::Response { |
|
results: db |
|
.users |
|
.iter() |
|
.map(Result::unwrap) |
|
.map(|user_id| search_users::User { |
|
user_id: user_id.clone(), |
|
display_name: db.users.displayname(&user_id).unwrap(), |
|
avatar_url: db.users.avatar_url(&user_id).unwrap(), |
|
}) |
|
.filter(|user| { |
|
user.user_id.to_string().contains(&body.search_term) |
|
|| user |
|
.display_name |
|
.as_ref() |
|
.filter(|name| name.contains(&body.search_term)) |
|
.is_some() |
|
}) |
|
.collect(), |
|
limited: false, |
|
})) |
|
} |
|
|
|
#[get("/_matrix/client/r0/rooms/<_room_id>/members")] |
|
pub fn get_member_events_route(_room_id: String) -> MatrixResult<get_member_events::Response> { |
|
warn!("TODO: get_member_events_route"); |
|
MatrixResult(Ok(get_member_events::Response { chunk: Vec::new() })) |
|
} |
|
|
|
#[get("/_matrix/client/r0/thirdparty/protocols")] |
|
pub fn get_protocols_route() -> MatrixResult<get_protocols::Response> { |
|
warn!("TODO: get_protocols_route"); |
|
MatrixResult(Ok(get_protocols::Response { |
|
protocols: BTreeMap::new(), |
|
})) |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/rooms/<_room_id>/send/<_event_type>/<_txn_id>", |
|
data = "<body>" |
|
)] |
|
pub fn create_message_event_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_message_event::Request>, |
|
_room_id: String, |
|
_event_type: String, |
|
_txn_id: String, |
|
) -> MatrixResult<create_message_event::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
let mut unsigned = serde_json::Map::new(); |
|
unsigned.insert("transaction_id".to_owned(), body.txn_id.clone().into()); |
|
|
|
if let Ok(event_id) = db.rooms.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), |
|
body.event_type.clone(), |
|
serde_json::from_str(body.json_body.unwrap().get()).unwrap(), |
|
Some(unsigned), |
|
None, |
|
None, |
|
&db.globals, |
|
) { |
|
MatrixResult(Ok(create_message_event::Response { event_id })) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Failed to send message.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>/<_state_key>", |
|
data = "<body>" |
|
)] |
|
pub fn create_state_event_for_key_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_state_event_for_key::Request>, |
|
_room_id: String, |
|
_event_type: String, |
|
_state_key: String, |
|
) -> MatrixResult<create_state_event_for_key::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
let content = |
|
serde_json::from_str::<serde_json::Value>(body.json_body.clone().unwrap().get()).unwrap(); |
|
|
|
if body.event_type == EventType::RoomCanonicalAlias { |
|
let canonical_alias = serde_json::from_value::< |
|
EventJson<canonical_alias::CanonicalAliasEventContent>, |
|
>(content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
let mut aliases = canonical_alias.alt_aliases; |
|
|
|
if let Some(alias) = canonical_alias.alias { |
|
aliases.push(alias); |
|
} |
|
|
|
for alias in aliases { |
|
if alias.server_name() != db.globals.server_name() |
|
|| db |
|
.rooms |
|
.id_from_alias(&alias) |
|
.unwrap() |
|
.filter(|room| room == &body.room_id) // Make sure it's the right room |
|
.is_none() |
|
{ |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "You are only allowed to send canonical_alias events when it's aliases already exists".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
} |
|
} |
|
|
|
if let Ok(event_id) = db.rooms.append_pdu( |
|
body.room_id.clone(), |
|
user_id.clone(), |
|
body.event_type.clone(), |
|
content, |
|
None, |
|
Some(body.state_key.clone()), |
|
None, |
|
&db.globals, |
|
) { |
|
MatrixResult(Ok(create_state_event_for_key::Response { event_id })) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Failed to send event.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>", |
|
data = "<body>" |
|
)] |
|
pub fn create_state_event_for_empty_key_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_state_event_for_empty_key::Request>, |
|
_room_id: String, |
|
_event_type: String, |
|
) -> MatrixResult<create_state_event_for_empty_key::Response> { |
|
// This just calls create_state_event_for_key_route |
|
let Ruma { |
|
body: |
|
create_state_event_for_empty_key::Request { |
|
room_id, |
|
event_type, |
|
data, |
|
}, |
|
user_id, |
|
device_id, |
|
json_body, |
|
} = body; |
|
|
|
let response = create_state_event_for_key_route( |
|
db, |
|
Ruma { |
|
body: create_state_event_for_key::Request { |
|
room_id, |
|
event_type, |
|
data, |
|
state_key: "".to_owned(), |
|
}, |
|
user_id, |
|
device_id, |
|
json_body, |
|
}, |
|
_room_id, |
|
_event_type, |
|
"".to_owned(), |
|
); |
|
|
|
MatrixResult(match response.0 { |
|
Ok(create_state_event_for_key::Response { event_id }) => { |
|
Ok(create_state_event_for_empty_key::Response { event_id }) |
|
} |
|
Err(e) => Err(e), |
|
}) |
|
} |
|
|
|
#[get("/_matrix/client/r0/rooms/<_room_id>/state", data = "<body>")] |
|
pub fn get_state_events_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_state_events::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<get_state_events::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "You don't have permission to view the room state.".to_owned(), |
|
status_code: http::StatusCode::FORBIDDEN, |
|
})); |
|
} |
|
|
|
MatrixResult(Ok(get_state_events::Response { |
|
room_state: db |
|
.rooms |
|
.room_state(&body.room_id) |
|
.unwrap() |
|
.values() |
|
.map(|pdu| pdu.to_state_event()) |
|
.collect(), |
|
})) |
|
} |
|
|
|
#[get( |
|
"/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>/<_state_key>", |
|
data = "<body>" |
|
)] |
|
pub fn get_state_events_for_key_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_state_events_for_key::Request>, |
|
_room_id: String, |
|
_event_type: String, |
|
_state_key: String, |
|
) -> MatrixResult<get_state_events_for_key::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "You don't have permission to view the room state.".to_owned(), |
|
status_code: http::StatusCode::FORBIDDEN, |
|
})); |
|
} |
|
|
|
if let Some(event) = db |
|
.rooms |
|
.room_state(&body.room_id) |
|
.unwrap() |
|
.get(&(body.event_type.clone(), body.state_key.clone())) |
|
{ |
|
MatrixResult(Ok(get_state_events_for_key::Response { |
|
content: serde_json::value::to_raw_value(&event.content).unwrap(), |
|
})) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "State event not found.".to_owned(), |
|
status_code: http::StatusCode::NOT_FOUND, |
|
})) |
|
} |
|
} |
|
|
|
#[get( |
|
"/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>", |
|
data = "<body>" |
|
)] |
|
pub fn get_state_events_for_empty_key_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_state_events_for_empty_key::Request>, |
|
_room_id: String, |
|
_event_type: String, |
|
) -> MatrixResult<get_state_events_for_key::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "You don't have permission to view the room state.".to_owned(), |
|
status_code: http::StatusCode::FORBIDDEN, |
|
})); |
|
} |
|
|
|
if let Some(event) = db |
|
.rooms |
|
.room_state(&body.room_id) |
|
.unwrap() |
|
.get(&(body.event_type.clone(), "".to_owned())) |
|
{ |
|
MatrixResult(Ok(get_state_events_for_key::Response { |
|
content: serde_json::value::to_raw_value(event).unwrap(), |
|
})) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "State event not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[get("/_matrix/client/r0/sync", data = "<body>")] |
|
pub fn sync_route( |
|
db: State<'_, Database>, |
|
body: Ruma<sync_events::Request>, |
|
) -> MatrixResult<sync_events::Response> { |
|
std::thread::sleep(Duration::from_millis(1000)); |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let device_id = body.device_id.as_ref().expect("user is authenticated"); |
|
|
|
let next_batch = db.globals.current_count().unwrap().to_string(); |
|
|
|
let mut joined_rooms = BTreeMap::new(); |
|
let since = body |
|
.since |
|
.clone() |
|
.and_then(|string| string.parse().ok()) |
|
.unwrap_or(0); |
|
|
|
for room_id in db.rooms.rooms_joined(&user_id) { |
|
let room_id = room_id.unwrap(); |
|
|
|
let mut pdus = db |
|
.rooms |
|
.pdus_since(&room_id, since) |
|
.unwrap() |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
let mut send_member_count = false; |
|
let mut joined_since_last_sync = false; |
|
let mut send_notification_counts = false; |
|
for pdu in &pdus { |
|
send_notification_counts = true; |
|
if pdu.kind == EventType::RoomMember { |
|
send_member_count = true; |
|
if !joined_since_last_sync && pdu.state_key == Some(user_id.to_string()) { |
|
let content = serde_json::from_value::< |
|
EventJson<ruma::events::room::member::MemberEventContent>, |
|
>(pdu.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
if content.membership == ruma::events::room::member::MembershipState::Join { |
|
joined_since_last_sync = true; |
|
// Both send_member_count and joined_since_last_sync are set. There's nothing more |
|
// to do |
|
break; |
|
} |
|
} |
|
} |
|
} |
|
|
|
let state = db.rooms.room_state(&room_id).unwrap(); |
|
|
|
let (joined_member_count, invited_member_count, heroes) = if send_member_count { |
|
let joined_member_count = db.rooms.room_members(&room_id).count(); |
|
let invited_member_count = db.rooms.room_members_invited(&room_id).count(); |
|
|
|
// Recalculate heroes (first 5 members) |
|
let mut heroes = Vec::new(); |
|
|
|
if joined_member_count + invited_member_count <= 5 { |
|
// Go through all PDUs and for each member event, check if the user is still joined or |
|
// invited until we have 5 or we reach the end |
|
|
|
for hero in db |
|
.rooms |
|
.all_pdus(&room_id) |
|
.unwrap() |
|
.filter_map(|pdu| pdu.ok()) // Ignore all broken pdus |
|
.filter(|pdu| pdu.kind == EventType::RoomMember) |
|
.filter_map(|pdu| { |
|
let content = serde_json::from_value::< |
|
EventJson<ruma::events::room::member::MemberEventContent>, |
|
>(pdu.content.clone()) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
let current_content = serde_json::from_value::< |
|
EventJson<ruma::events::room::member::MemberEventContent>, |
|
>( |
|
state |
|
.get(&( |
|
EventType::RoomMember, |
|
pdu.state_key.clone().expect( |
|
"TODO: error handling. Is it really a state event?", |
|
), |
|
)) |
|
.expect("a user that joined once will always have a member event") |
|
.content |
|
.clone(), |
|
) |
|
.unwrap() |
|
.deserialize() |
|
.unwrap(); |
|
|
|
// The membership was and still is invite or join |
|
if matches!( |
|
content.membership, |
|
ruma::events::room::member::MembershipState::Join |
|
| ruma::events::room::member::MembershipState::Invite |
|
) && matches!( |
|
current_content.membership, |
|
ruma::events::room::member::MembershipState::Join |
|
| ruma::events::room::member::MembershipState::Invite |
|
) { |
|
Some(pdu.state_key.unwrap()) |
|
} else { |
|
None |
|
} |
|
}) |
|
{ |
|
if heroes.contains(&hero) || hero == user_id.to_string() { |
|
continue; |
|
} |
|
|
|
heroes.push(hero); |
|
} |
|
} |
|
|
|
( |
|
Some(joined_member_count), |
|
Some(invited_member_count), |
|
heroes, |
|
) |
|
} else { |
|
(None, None, Vec::new()) |
|
}; |
|
|
|
let notification_count = if send_notification_counts { |
|
if let Some(last_read) = db.rooms.edus.room_read_get(&room_id, &user_id).unwrap() { |
|
Some( |
|
(db.rooms |
|
.pdus_since(&room_id, last_read) |
|
.unwrap() |
|
.filter(|pdu| { |
|
matches!( |
|
pdu.as_ref().unwrap().kind.clone(), |
|
EventType::RoomMessage | EventType::RoomEncrypted |
|
) |
|
}) |
|
.count() as u32) |
|
.into(), |
|
) |
|
} else { |
|
None |
|
} |
|
} else { |
|
None |
|
}; |
|
|
|
// They /sync response doesn't always return all messages, so we say the output is |
|
// limited unless there are enough events |
|
let mut limited = true; |
|
pdus = pdus.split_off(pdus.len().checked_sub(10).unwrap_or_else(|| { |
|
limited = false; |
|
0 |
|
})); |
|
|
|
let prev_batch = pdus |
|
.first() |
|
.and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) |
|
.map(|c| c.to_string()); |
|
|
|
let room_events = pdus |
|
.into_iter() |
|
.map(|pdu| pdu.to_room_event()) |
|
.collect::<Vec<_>>(); |
|
|
|
let mut edus = db |
|
.rooms |
|
.edus |
|
.roomlatests_since(&room_id, since) |
|
.unwrap() |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
if db |
|
.rooms |
|
.edus |
|
.last_roomactive_update(&room_id, &db.globals) |
|
.unwrap() |
|
> since |
|
{ |
|
edus.push( |
|
serde_json::from_str( |
|
&serde_json::to_string(&EduEvent::Typing( |
|
db.rooms.edus.roomactives_all(&room_id).unwrap(), |
|
)) |
|
.unwrap(), |
|
) |
|
.unwrap(), |
|
); |
|
} |
|
|
|
let joined_room = sync_events::JoinedRoom { |
|
account_data: sync_events::AccountData { |
|
events: db |
|
.account_data |
|
.changes_since(Some(&room_id), &user_id, since) |
|
.unwrap() |
|
.into_iter() |
|
.map(|(_, v)| v) |
|
.collect(), |
|
}, |
|
summary: sync_events::RoomSummary { |
|
heroes, |
|
joined_member_count: joined_member_count.map(|n| (n as u32).into()), |
|
invited_member_count: invited_member_count.map(|n| (n as u32).into()), |
|
}, |
|
unread_notifications: sync_events::UnreadNotificationsCount { |
|
highlight_count: None, |
|
notification_count, |
|
}, |
|
timeline: sync_events::Timeline { |
|
limited: if limited || joined_since_last_sync { |
|
Some(true) |
|
} else { |
|
None |
|
}, |
|
prev_batch, |
|
events: room_events, |
|
}, |
|
// TODO: state before timeline |
|
state: sync_events::State { |
|
events: if joined_since_last_sync { |
|
state |
|
.into_iter() |
|
.map(|(_, pdu)| pdu.to_state_event()) |
|
.collect() |
|
} else { |
|
Vec::new() |
|
}, |
|
}, |
|
ephemeral: sync_events::Ephemeral { events: edus }, |
|
}; |
|
|
|
if !joined_room.is_empty() { |
|
joined_rooms.insert(room_id.clone().try_into().unwrap(), joined_room); |
|
} |
|
} |
|
|
|
let mut left_rooms = BTreeMap::new(); |
|
for room_id in db.rooms.rooms_left(&user_id) { |
|
let room_id = room_id.unwrap(); |
|
let pdus = db.rooms.pdus_since(&room_id, since).unwrap(); |
|
let room_events = pdus.map(|pdu| pdu.unwrap().to_room_event()).collect(); |
|
|
|
// TODO: Only until leave point |
|
let mut edus = db |
|
.rooms |
|
.edus |
|
.roomlatests_since(&room_id, since) |
|
.unwrap() |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
if db |
|
.rooms |
|
.edus |
|
.last_roomactive_update(&room_id, &db.globals) |
|
.unwrap() |
|
> since |
|
{ |
|
edus.push( |
|
serde_json::from_str( |
|
&serde_json::to_string(&EduEvent::Typing( |
|
db.rooms.edus.roomactives_all(&room_id).unwrap(), |
|
)) |
|
.unwrap(), |
|
) |
|
.unwrap(), |
|
); |
|
} |
|
|
|
let left_room = sync_events::LeftRoom { |
|
account_data: sync_events::AccountData { events: Vec::new() }, |
|
timeline: sync_events::Timeline { |
|
limited: Some(false), |
|
prev_batch: Some(next_batch.clone()), |
|
events: room_events, |
|
}, |
|
state: sync_events::State { events: Vec::new() }, |
|
}; |
|
|
|
if !left_room.is_empty() { |
|
left_rooms.insert(room_id.clone().try_into().unwrap(), left_room); |
|
} |
|
} |
|
|
|
let mut invited_rooms = BTreeMap::new(); |
|
for room_id in db.rooms.rooms_invited(&user_id) { |
|
let room_id = room_id.unwrap(); |
|
|
|
let invited_room = sync_events::InvitedRoom { |
|
invite_state: sync_events::InviteState { |
|
events: db |
|
.rooms |
|
.room_state(&room_id) |
|
.unwrap() |
|
.into_iter() |
|
.map(|(_, pdu)| pdu.to_stripped_state_event()) |
|
.collect(), |
|
}, |
|
}; |
|
|
|
if !invited_room.is_empty() { |
|
invited_rooms.insert(room_id.clone(), invited_room); |
|
} |
|
} |
|
|
|
MatrixResult(Ok(sync_events::Response { |
|
next_batch, |
|
rooms: sync_events::Rooms { |
|
leave: left_rooms, |
|
join: joined_rooms, |
|
invite: invited_rooms, |
|
}, |
|
presence: sync_events::Presence { |
|
events: db |
|
.global_edus |
|
.presence_since(since) |
|
.unwrap() |
|
.map(|edu| { |
|
let mut edu = edu.unwrap().deserialize().unwrap(); |
|
let timestamp = edu.content.last_active_ago.unwrap(); |
|
let last_active_ago = js_int::UInt::try_from(utils::millis_since_unix_epoch()) |
|
.unwrap() |
|
- timestamp; |
|
edu.content.last_active_ago = Some(last_active_ago); |
|
edu.into() |
|
}) |
|
.collect(), |
|
}, |
|
account_data: sync_events::AccountData { |
|
events: db |
|
.account_data |
|
.changes_since(None, &user_id, since) |
|
.unwrap() |
|
.into_iter() |
|
.map(|(_, v)| v) |
|
.collect(), |
|
}, |
|
device_lists: sync_events::DeviceLists { |
|
changed: if since != 0 { |
|
db.users |
|
.device_keys_changed(since) |
|
.map(|u| u.unwrap()) |
|
.collect() |
|
} else { |
|
Vec::new() |
|
}, |
|
left: Vec::new(), // TODO |
|
}, |
|
device_one_time_keys_count: Default::default(), // TODO |
|
to_device: sync_events::ToDevice { |
|
events: db |
|
.users |
|
.take_to_device_events(user_id, device_id, 100) |
|
.unwrap(), |
|
}, |
|
})) |
|
} |
|
|
|
#[get( |
|
"/_matrix/client/r0/rooms/<_room_id>/context/<_event_id>", |
|
data = "<body>" |
|
)] |
|
pub fn get_context_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_context::Request>, |
|
_room_id: String, |
|
_event_id: String, |
|
) -> MatrixResult<get_context::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "You don't have permission to view this room.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
|
|
if let Some(base_event) = db.rooms.get_pdu(&body.event_id).unwrap() { |
|
let base_event = base_event.to_room_event(); |
|
|
|
let base_token = db |
|
.rooms |
|
.get_pdu_count(&body.event_id) |
|
.unwrap() |
|
.expect("event exists, so count should exist too"); |
|
|
|
let events_before = db |
|
.rooms |
|
.pdus_until(&body.room_id, base_token) |
|
.take(u32::try_from(body.limit).unwrap() as usize / 2) |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
let start_token = events_before |
|
.last() |
|
.and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) |
|
.map(|c| c.to_string()); |
|
|
|
let events_before = events_before |
|
.into_iter() |
|
.map(|pdu| pdu.to_room_event()) |
|
.collect::<Vec<_>>(); |
|
|
|
let events_after = db |
|
.rooms |
|
.pdus_after(&body.room_id, base_token) |
|
.take(u32::try_from(body.limit).unwrap() as usize / 2) |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
let end_token = events_after |
|
.last() |
|
.and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) |
|
.map(|c| c.to_string()); |
|
|
|
let events_after = events_after |
|
.into_iter() |
|
.map(|pdu| pdu.to_room_event()) |
|
.collect::<Vec<_>>(); |
|
|
|
MatrixResult(Ok(get_context::Response { |
|
start: start_token, |
|
end: end_token, |
|
events_before, |
|
event: Some(base_event), |
|
events_after, |
|
state: db // TODO: State at event |
|
.rooms |
|
.room_state(&body.room_id) |
|
.unwrap() |
|
.values() |
|
.map(|pdu| pdu.to_state_event()) |
|
.collect(), |
|
})) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Invalid base event.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[get("/_matrix/client/r0/rooms/<_room_id>/messages", data = "<body>")] |
|
pub fn get_message_events_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_message_events::Request>, |
|
_room_id: String, |
|
) -> MatrixResult<get_message_events::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { |
|
return MatrixResult(Err(Error { |
|
kind: ErrorKind::Forbidden, |
|
message: "You don't have permission to view this room.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})); |
|
} |
|
|
|
if let Ok(from) = body.from.clone().parse() { |
|
match body.dir { |
|
get_message_events::Direction::Forward => { |
|
let events_after = db |
|
.rooms |
|
.pdus_after(&body.room_id, from) |
|
.take(body.limit.map(|l| l.try_into().unwrap()).unwrap_or(10_u32) as usize) |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
let end_token = events_after |
|
.last() |
|
.and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) |
|
.map(|c| c.to_string()); |
|
|
|
let events_after = events_after |
|
.into_iter() |
|
.map(|pdu| pdu.to_room_event()) |
|
.collect::<Vec<_>>(); |
|
|
|
MatrixResult(Ok(get_message_events::Response { |
|
start: Some(body.from.clone()), |
|
end: end_token, |
|
chunk: events_after, |
|
state: Vec::new(), |
|
})) |
|
} |
|
get_message_events::Direction::Backward => { |
|
let events_before = db |
|
.rooms |
|
.pdus_until(&body.room_id, from) |
|
.take(body.limit.map(|l| l.try_into().unwrap()).unwrap_or(10_u32) as usize) |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<_>>(); |
|
|
|
let start_token = events_before |
|
.last() |
|
.and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) |
|
.map(|c| c.to_string()); |
|
|
|
let events_before = events_before |
|
.into_iter() |
|
.map(|pdu| pdu.to_room_event()) |
|
.collect::<Vec<_>>(); |
|
|
|
MatrixResult(Ok(get_message_events::Response { |
|
start: Some(body.from.clone()), |
|
end: start_token, |
|
chunk: events_before, |
|
state: Vec::new(), |
|
})) |
|
} |
|
} |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::Unknown, |
|
message: "Invalid from.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[get("/_matrix/client/r0/voip/turnServer")] |
|
pub fn turn_server_route() -> MatrixResult<create_message_event::Response> { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "There is no turn server yet.".to_owned(), |
|
status_code: http::StatusCode::NOT_FOUND, |
|
})) |
|
} |
|
|
|
#[post("/_matrix/client/r0/publicised_groups")] |
|
pub fn publicised_groups_route() -> MatrixResult<create_message_event::Response> { |
|
warn!("TODO: publicised_groups_route"); |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "There are no publicised groups yet.".to_owned(), |
|
status_code: http::StatusCode::NOT_FOUND, |
|
})) |
|
} |
|
|
|
#[put( |
|
"/_matrix/client/r0/sendToDevice/<_event_type>/<_txn_id>", |
|
data = "<body>" |
|
)] |
|
pub fn send_event_to_device_route( |
|
db: State<'_, Database>, |
|
body: Ruma<send_event_to_device::Request>, |
|
_event_type: String, |
|
_txn_id: String, |
|
) -> MatrixResult<send_event_to_device::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
for (target_user_id, map) in &body.messages { |
|
for (target_device_id_maybe, event) in map { |
|
match target_device_id_maybe { |
|
to_device::DeviceIdOrAllDevices::DeviceId(target_device_id) => db |
|
.users |
|
.add_to_device_event( |
|
user_id, |
|
&target_user_id, |
|
&target_device_id, |
|
&body.event_type, |
|
serde_json::from_str(event.get()).unwrap(), |
|
&db.globals, |
|
) |
|
.unwrap(), |
|
|
|
to_device::DeviceIdOrAllDevices::AllDevices => { |
|
for target_device_id in db.users.all_device_ids(&target_user_id) { |
|
db.users |
|
.add_to_device_event( |
|
user_id, |
|
&target_user_id, |
|
&target_device_id.unwrap(), |
|
&body.event_type, |
|
serde_json::from_str(event.get()).unwrap(), |
|
&db.globals, |
|
) |
|
.unwrap(); |
|
} |
|
} |
|
} |
|
} |
|
} |
|
|
|
MatrixResult(Ok(send_event_to_device::Response)) |
|
} |
|
|
|
#[get("/_matrix/media/r0/config")] |
|
pub fn get_media_config_route() -> MatrixResult<get_media_config::Response> { |
|
MatrixResult(Ok(get_media_config::Response { |
|
upload_size: (20_u32 * 1024 * 1024).into(), // 20 MB |
|
})) |
|
} |
|
|
|
#[post("/_matrix/media/r0/upload", data = "<body>")] |
|
pub fn create_content_route( |
|
db: State<'_, Database>, |
|
body: Ruma<create_content::Request>, |
|
) -> MatrixResult<create_content::Response> { |
|
let mxc = format!( |
|
"mxc://{}/{}", |
|
db.globals.server_name(), |
|
utils::random_string(MXC_LENGTH) |
|
); |
|
db.media |
|
.create( |
|
mxc.clone(), |
|
body.filename.as_ref(), |
|
&body.content_type, |
|
&body.file, |
|
) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(create_content::Response { content_uri: mxc })) |
|
} |
|
|
|
#[get( |
|
"/_matrix/media/r0/download/<_server_name>/<_media_id>", |
|
data = "<body>" |
|
)] |
|
pub fn get_content_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_content::Request>, |
|
_server_name: String, |
|
_media_id: String, |
|
) -> MatrixResult<get_content::Response> { |
|
if let Some((filename, content_type, file)) = db |
|
.media |
|
.get(format!("mxc://{}/{}", body.server_name, body.media_id)) |
|
.unwrap() |
|
{ |
|
MatrixResult(Ok(get_content::Response { |
|
file, |
|
content_type, |
|
content_disposition: filename.unwrap_or_default(), // TODO: Spec says this should be optional |
|
})) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Media not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[get( |
|
"/_matrix/media/r0/thumbnail/<_server_name>/<_media_id>", |
|
data = "<body>" |
|
)] |
|
pub fn get_content_thumbnail_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_content_thumbnail::Request>, |
|
_server_name: String, |
|
_media_id: String, |
|
) -> MatrixResult<get_content_thumbnail::Response> { |
|
if let Some((_, content_type, file)) = db |
|
.media |
|
.get_thumbnail( |
|
format!("mxc://{}/{}", body.server_name, body.media_id), |
|
body.width.try_into().unwrap(), |
|
body.height.try_into().unwrap(), |
|
) |
|
.unwrap() |
|
{ |
|
MatrixResult(Ok(get_content_thumbnail::Response { file, content_type })) |
|
} else { |
|
MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Media not found.".to_owned(), |
|
status_code: http::StatusCode::BAD_REQUEST, |
|
})) |
|
} |
|
} |
|
|
|
#[get("/_matrix/client/r0/devices", data = "<body>")] |
|
pub fn get_devices_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_devices::Request>, |
|
) -> MatrixResult<get_devices::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
let devices = db |
|
.users |
|
.all_devices_metadata(user_id) |
|
.map(|r| r.unwrap()) |
|
.collect::<Vec<device::Device>>(); |
|
|
|
MatrixResult(Ok(get_devices::Response { devices })) |
|
} |
|
|
|
#[get("/_matrix/client/r0/devices/<device_id>", data = "<body>")] |
|
pub fn get_device_route( |
|
db: State<'_, Database>, |
|
body: Ruma<get_device::Request>, |
|
device_id: DeviceId, |
|
) -> MatrixResult<get_device::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let device = db.users.get_device_metadata(&user_id, &device_id).unwrap(); |
|
|
|
match device { |
|
None => MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Device not found".to_string(), |
|
status_code: http::StatusCode::NOT_FOUND, |
|
})), |
|
Some(device) => MatrixResult(Ok(get_device::Response { device })), |
|
} |
|
} |
|
|
|
#[put("/_matrix/client/r0/devices/<device_id>", data = "<body>")] |
|
pub fn update_device_route( |
|
db: State<'_, Database>, |
|
body: Ruma<update_device::Request>, |
|
device_id: DeviceId, |
|
) -> MatrixResult<update_device::Response> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
let device = db.users.get_device_metadata(&user_id, &device_id).unwrap(); |
|
|
|
match device { |
|
None => MatrixResult(Err(Error { |
|
kind: ErrorKind::NotFound, |
|
message: "Device not found".to_string(), |
|
status_code: http::StatusCode::NOT_FOUND, |
|
})), |
|
Some(mut device) => { |
|
device.display_name = body.display_name.clone(); |
|
|
|
db.users |
|
.update_device_metadata(&user_id, &device_id, &device) |
|
.unwrap(); |
|
|
|
MatrixResult(Ok(update_device::Response)) |
|
} |
|
} |
|
} |
|
|
|
#[delete("/_matrix/client/r0/devices/<device_id>", data = "<body>")] |
|
pub fn delete_device_route( |
|
db: State<'_, Database>, |
|
body: Ruma<delete_device::Request>, |
|
device_id: DeviceId, |
|
) -> MatrixResult<delete_device::Response, UiaaResponse> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
// UIAA |
|
let uiaainfo = UiaaInfo { |
|
flows: vec![AuthFlow { |
|
stages: vec!["m.login.password".to_owned()], |
|
}], |
|
completed: Vec::new(), |
|
params: Default::default(), |
|
session: Some(utils::random_string(SESSION_ID_LENGTH)), |
|
auth_error: None, |
|
}; |
|
|
|
if let Some(auth) = &body.auth { |
|
let (worked, uiaainfo) = db |
|
.uiaa |
|
.try_auth(&user_id, &"".to_owned(), auth, &uiaainfo, &db.users, &db.globals) |
|
.unwrap(); |
|
if !worked { |
|
return MatrixResult(Err(UiaaResponse::AuthResponse(uiaainfo))); |
|
} |
|
// Success! |
|
} else { |
|
db.uiaa.create(&user_id, &"".to_owned(), &uiaainfo).unwrap(); |
|
|
|
return MatrixResult(Err(UiaaResponse::AuthResponse(uiaainfo))); |
|
} |
|
|
|
db.users.remove_device(&user_id, &device_id).unwrap(); |
|
|
|
MatrixResult(Ok(delete_device::Response)) |
|
} |
|
|
|
#[post("/_matrix/client/r0/delete_devices", data = "<body>")] |
|
pub fn delete_devices_route( |
|
db: State<'_, Database>, |
|
body: Ruma<delete_devices::Request>, |
|
) -> MatrixResult<delete_devices::Response, UiaaResponse> { |
|
let user_id = body.user_id.as_ref().expect("user is authenticated"); |
|
|
|
// UIAA |
|
let uiaainfo = UiaaInfo { |
|
flows: vec![AuthFlow { |
|
stages: vec!["m.login.password".to_owned()], |
|
}], |
|
completed: Vec::new(), |
|
params: Default::default(), |
|
session: Some(utils::random_string(SESSION_ID_LENGTH)), |
|
auth_error: None, |
|
}; |
|
|
|
if let Some(auth) = &body.auth { |
|
let (worked, uiaainfo) = db |
|
.uiaa |
|
.try_auth(&user_id, &"".to_owned(), auth, &uiaainfo, &db.users, &db.globals) |
|
.unwrap(); |
|
if !worked { |
|
return MatrixResult(Err(UiaaResponse::AuthResponse(uiaainfo))); |
|
} |
|
// Success! |
|
} else { |
|
db.uiaa.create(&user_id, &"".to_owned(), &uiaainfo).unwrap(); |
|
|
|
return MatrixResult(Err(UiaaResponse::AuthResponse(uiaainfo))); |
|
} |
|
|
|
for device_id in &body.devices { |
|
db.users.remove_device(&user_id, &device_id).unwrap() |
|
} |
|
|
|
MatrixResult(Ok(delete_devices::Response)) |
|
} |
|
|
|
#[options("/<_segments..>")] |
|
pub fn options_route( |
|
_segments: rocket::http::uri::Segments<'_>, |
|
) -> MatrixResult<send_event_to_device::Response> { |
|
MatrixResult(Ok(send_event_to_device::Response)) |
|
}
|
|
|