2022-01-22 16:58:32 +01:00
|
|
|
use crate::{database::DatabaseGuard, Error, Result, Ruma};
|
2022-01-04 14:30:13 +01:00
|
|
|
use ruma::{
|
2022-02-04 13:30:42 +01:00
|
|
|
api::client::{
|
|
|
|
error::ErrorKind,
|
|
|
|
r0::{context::get_context, filter::LazyLoadOptions},
|
|
|
|
},
|
2022-01-04 14:30:13 +01:00
|
|
|
events::EventType,
|
|
|
|
};
|
2022-02-04 13:30:42 +01:00
|
|
|
use std::{collections::HashSet, convert::TryFrom};
|
|
|
|
use tracing::error;
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2021-08-31 19:14:37 +02:00
|
|
|
/// # `GET /_matrix/client/r0/rooms/{roomId}/context`
|
|
|
|
///
|
|
|
|
/// Allows loading room history around an event.
|
|
|
|
///
|
|
|
|
/// - Only works if the user is joined (TODO: always allow, but only show events if the user was
|
|
|
|
/// joined, depending on history_visibility)
|
2021-02-28 12:41:03 +01:00
|
|
|
#[tracing::instrument(skip(db, body))]
|
2020-10-21 21:28:02 +02:00
|
|
|
pub async fn get_context_route(
|
2021-07-14 09:07:08 +02:00
|
|
|
db: DatabaseGuard,
|
2020-09-08 17:32:03 +02:00
|
|
|
body: Ruma<get_context::Request<'_>>,
|
2022-01-22 16:58:32 +01:00
|
|
|
) -> Result<get_context::Response> {
|
2020-10-18 20:33:12 +02:00
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated");
|
2022-01-04 14:30:13 +01:00
|
|
|
let sender_device = body.sender_device.as_ref().expect("user is authenticated");
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2022-02-04 13:30:42 +01:00
|
|
|
// Load filter
|
|
|
|
let filter = body.filter.clone().unwrap_or_default();
|
|
|
|
|
|
|
|
let (lazy_load_enabled, lazy_load_send_redundant) = match filter.lazy_load_options {
|
|
|
|
LazyLoadOptions::Enabled {
|
|
|
|
include_redundant_members: redundant,
|
|
|
|
} => (true, redundant),
|
|
|
|
_ => (false, false),
|
|
|
|
};
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2022-01-04 14:30:13 +01:00
|
|
|
let mut lazy_loaded = HashSet::new();
|
|
|
|
|
2021-03-23 12:59:27 +01:00
|
|
|
let base_pdu_id = db
|
|
|
|
.rooms
|
|
|
|
.get_pdu_id(&body.event_id)?
|
|
|
|
.ok_or(Error::BadRequest(
|
|
|
|
ErrorKind::NotFound,
|
|
|
|
"Base event id not found.",
|
|
|
|
))?;
|
|
|
|
|
|
|
|
let base_token = db.rooms.pdu_count(&base_pdu_id)?;
|
|
|
|
|
2020-07-30 18:14:47 +02:00
|
|
|
let base_event = db
|
|
|
|
.rooms
|
2021-03-23 12:59:27 +01:00
|
|
|
.get_pdu_from_id(&base_pdu_id)?
|
2020-07-30 18:14:47 +02:00
|
|
|
.ok_or(Error::BadRequest(
|
|
|
|
ErrorKind::NotFound,
|
|
|
|
"Base event not found.",
|
2022-01-04 14:30:13 +01:00
|
|
|
))?;
|
|
|
|
|
2022-02-04 13:30:42 +01:00
|
|
|
let room_id = base_event.room_id.clone();
|
|
|
|
|
|
|
|
if !db.rooms.is_joined(sender_user, &room_id)? {
|
|
|
|
return Err(Error::BadRequest(
|
|
|
|
ErrorKind::Forbidden,
|
|
|
|
"You don't have permission to view this room.",
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
2022-01-04 14:30:13 +01:00
|
|
|
if !db.rooms.lazy_load_was_sent_before(
|
2022-01-20 00:10:39 +01:00
|
|
|
sender_user,
|
|
|
|
sender_device,
|
2022-02-04 13:30:42 +01:00
|
|
|
&room_id,
|
2022-01-04 14:30:13 +01:00
|
|
|
&base_event.sender,
|
2022-02-04 13:30:42 +01:00
|
|
|
)? || lazy_load_send_redundant
|
|
|
|
{
|
|
|
|
lazy_loaded.insert(base_event.sender.as_str().to_owned());
|
2022-01-04 14:30:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
let base_event = base_event.to_room_event();
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2021-10-13 11:51:30 +02:00
|
|
|
let events_before: Vec<_> = db
|
2020-07-30 18:14:47 +02:00
|
|
|
.rooms
|
2022-02-04 13:30:42 +01:00
|
|
|
.pdus_until(sender_user, &room_id, base_token)?
|
2020-07-30 18:14:47 +02:00
|
|
|
.take(
|
|
|
|
u32::try_from(body.limit).map_err(|_| {
|
|
|
|
Error::BadRequest(ErrorKind::InvalidParam, "Limit value is invalid.")
|
|
|
|
})? as usize
|
|
|
|
/ 2,
|
|
|
|
)
|
|
|
|
.filter_map(|r| r.ok()) // Remove buggy events
|
2021-10-13 11:51:30 +02:00
|
|
|
.collect();
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2022-01-04 14:30:13 +01:00
|
|
|
for (_, event) in &events_before {
|
|
|
|
if !db.rooms.lazy_load_was_sent_before(
|
2022-01-20 00:10:39 +01:00
|
|
|
sender_user,
|
|
|
|
sender_device,
|
2022-02-04 13:30:42 +01:00
|
|
|
&room_id,
|
2022-01-04 14:30:13 +01:00
|
|
|
&event.sender,
|
2022-02-04 13:30:42 +01:00
|
|
|
)? || lazy_load_send_redundant
|
|
|
|
{
|
|
|
|
lazy_loaded.insert(event.sender.as_str().to_owned());
|
2022-01-04 14:30:13 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-17 14:44:47 +02:00
|
|
|
let start_token = events_before
|
|
|
|
.last()
|
|
|
|
.and_then(|(pdu_id, _)| db.rooms.pdu_count(pdu_id).ok())
|
|
|
|
.map(|count| count.to_string());
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2021-10-13 11:51:30 +02:00
|
|
|
let events_before: Vec<_> = events_before
|
2020-07-30 18:14:47 +02:00
|
|
|
.into_iter()
|
|
|
|
.map(|(_, pdu)| pdu.to_room_event())
|
2021-10-13 11:51:30 +02:00
|
|
|
.collect();
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2021-10-13 11:51:30 +02:00
|
|
|
let events_after: Vec<_> = db
|
2020-07-30 18:14:47 +02:00
|
|
|
.rooms
|
2022-02-04 13:30:42 +01:00
|
|
|
.pdus_after(sender_user, &room_id, base_token)?
|
2020-07-30 18:14:47 +02:00
|
|
|
.take(
|
|
|
|
u32::try_from(body.limit).map_err(|_| {
|
|
|
|
Error::BadRequest(ErrorKind::InvalidParam, "Limit value is invalid.")
|
|
|
|
})? as usize
|
|
|
|
/ 2,
|
|
|
|
)
|
|
|
|
.filter_map(|r| r.ok()) // Remove buggy events
|
2021-10-13 11:51:30 +02:00
|
|
|
.collect();
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2022-01-04 14:30:13 +01:00
|
|
|
for (_, event) in &events_after {
|
|
|
|
if !db.rooms.lazy_load_was_sent_before(
|
2022-01-20 00:10:39 +01:00
|
|
|
sender_user,
|
|
|
|
sender_device,
|
2022-02-04 13:30:42 +01:00
|
|
|
&room_id,
|
2022-01-04 14:30:13 +01:00
|
|
|
&event.sender,
|
2022-02-04 13:30:42 +01:00
|
|
|
)? || lazy_load_send_redundant
|
|
|
|
{
|
|
|
|
lazy_loaded.insert(event.sender.as_str().to_owned());
|
2022-01-04 14:30:13 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-04 13:30:42 +01:00
|
|
|
let shortstatehash = match db.rooms.pdu_shortstatehash(
|
|
|
|
events_after
|
|
|
|
.last()
|
|
|
|
.map_or(&*body.event_id, |(_, e)| &*e.event_id),
|
|
|
|
)? {
|
|
|
|
Some(s) => s,
|
|
|
|
None => db
|
|
|
|
.rooms
|
|
|
|
.current_shortstatehash(&room_id)?
|
|
|
|
.expect("All rooms have state"),
|
|
|
|
};
|
|
|
|
|
|
|
|
let state_ids = db.rooms.state_full_ids(shortstatehash)?;
|
|
|
|
|
2020-09-17 14:44:47 +02:00
|
|
|
let end_token = events_after
|
|
|
|
.last()
|
|
|
|
.and_then(|(pdu_id, _)| db.rooms.pdu_count(pdu_id).ok())
|
|
|
|
.map(|count| count.to_string());
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2021-10-13 11:51:30 +02:00
|
|
|
let events_after: Vec<_> = events_after
|
2020-07-30 18:14:47 +02:00
|
|
|
.into_iter()
|
|
|
|
.map(|(_, pdu)| pdu.to_room_event())
|
2021-10-13 11:51:30 +02:00
|
|
|
.collect();
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2022-01-04 14:30:13 +01:00
|
|
|
let mut state = Vec::new();
|
2022-02-04 13:30:42 +01:00
|
|
|
|
|
|
|
for (shortstatekey, id) in state_ids {
|
|
|
|
let (event_type, state_key) = db.rooms.get_statekey_from_short(shortstatekey)?;
|
|
|
|
|
|
|
|
if event_type != EventType::RoomMember {
|
|
|
|
let pdu = match db.rooms.get_pdu(&id)? {
|
|
|
|
Some(pdu) => pdu,
|
|
|
|
None => {
|
|
|
|
error!("Pdu in state not found: {}", id);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
state.push(pdu.to_state_event());
|
|
|
|
} else if !lazy_load_enabled || lazy_loaded.contains(&state_key) {
|
|
|
|
let pdu = match db.rooms.get_pdu(&id)? {
|
|
|
|
Some(pdu) => pdu,
|
|
|
|
None => {
|
|
|
|
error!("Pdu in state not found: {}", id);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
state.push(pdu.to_state_event());
|
2022-01-04 14:30:13 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-13 11:48:18 +01:00
|
|
|
let resp = get_context::Response {
|
|
|
|
start: start_token,
|
|
|
|
end: end_token,
|
|
|
|
events_before,
|
|
|
|
event: Some(base_event),
|
|
|
|
events_after,
|
2022-01-04 14:30:13 +01:00
|
|
|
state,
|
2022-01-13 11:48:18 +01:00
|
|
|
};
|
2020-08-06 14:29:59 +02:00
|
|
|
|
2022-01-22 16:58:32 +01:00
|
|
|
Ok(resp)
|
2020-07-30 18:14:47 +02:00
|
|
|
}
|