1
0
Fork 0
mirror of https://gitlab.com/famedly/conduit.git synced 2024-06-17 01:28:17 +02:00
conduit/src/api/client_server/context.rs

204 lines
5.9 KiB
Rust
Raw Normal View History

2022-10-05 20:34:31 +02:00
use crate::{services, Error, Result, Ruma};
2022-01-04 14:30:13 +01:00
use ruma::{
2022-02-18 15:33:14 +01:00
api::client::{context::get_context, error::ErrorKind, filter::LazyLoadOptions},
2022-04-07 13:22:10 +02:00
events::StateEventType,
2022-01-04 14:30:13 +01:00
};
2022-02-04 13:30:42 +01:00
use std::{collections::HashSet, convert::TryFrom};
use tracing::error;
2020-07-30 18:14:47 +02:00
2021-08-31 19:14:37 +02:00
/// # `GET /_matrix/client/r0/rooms/{roomId}/context`
///
/// Allows loading room history around an event.
///
/// - Only works if the user is joined (TODO: always allow, but only show events if the user was
/// joined, depending on history_visibility)
pub async fn get_context_route(
2022-12-14 13:09:10 +01:00
body: Ruma<get_context::v3::Request>,
2022-02-18 15:33:14 +01:00
) -> Result<get_context::v3::Response> {
let sender_user = body.sender_user.as_ref().expect("user is authenticated");
2022-01-04 14:30:13 +01:00
let sender_device = body.sender_device.as_ref().expect("user is authenticated");
2020-07-30 18:14:47 +02:00
2022-02-12 02:06:30 +01:00
let (lazy_load_enabled, lazy_load_send_redundant) = match &body.filter.lazy_load_options {
2022-02-04 13:30:42 +01:00
LazyLoadOptions::Enabled {
2022-02-12 02:06:30 +01:00
include_redundant_members,
} => (true, *include_redundant_members),
2022-02-04 13:30:42 +01:00
_ => (false, false),
};
2020-07-30 18:14:47 +02:00
2022-01-04 14:30:13 +01:00
let mut lazy_loaded = HashSet::new();
let base_pdu_id = services()
2021-03-23 12:59:27 +01:00
.rooms
2022-09-07 13:25:51 +02:00
.timeline
2021-03-23 12:59:27 +01:00
.get_pdu_id(&body.event_id)?
.ok_or(Error::BadRequest(
ErrorKind::NotFound,
"Base event id not found.",
))?;
2022-09-07 13:25:51 +02:00
let base_token = services().rooms.timeline.pdu_count(&base_pdu_id)?;
2021-03-23 12:59:27 +01:00
let base_event = services()
2020-07-30 18:14:47 +02:00
.rooms
2022-09-07 13:25:51 +02:00
.timeline
2021-03-23 12:59:27 +01:00
.get_pdu_from_id(&base_pdu_id)?
2020-07-30 18:14:47 +02:00
.ok_or(Error::BadRequest(
ErrorKind::NotFound,
"Base event not found.",
2022-01-04 14:30:13 +01:00
))?;
2022-02-04 13:30:42 +01:00
let room_id = base_event.room_id.clone();
2022-10-05 20:34:31 +02:00
if !services()
.rooms
.state_cache
.is_joined(sender_user, &room_id)?
{
2022-02-04 13:30:42 +01:00
return Err(Error::BadRequest(
ErrorKind::Forbidden,
"You don't have permission to view this room.",
));
}
2022-09-07 13:25:51 +02:00
if !services().rooms.lazy_loading.lazy_load_was_sent_before(
2022-01-20 00:10:39 +01:00
sender_user,
sender_device,
2022-02-04 13:30:42 +01:00
&room_id,
2022-01-04 14:30:13 +01:00
&base_event.sender,
2022-02-04 13:30:42 +01:00
)? || lazy_load_send_redundant
{
lazy_loaded.insert(base_event.sender.as_str().to_owned());
2022-01-04 14:30:13 +01:00
}
let base_event = base_event.to_room_event();
2020-07-30 18:14:47 +02:00
let events_before: Vec<_> = services()
2020-07-30 18:14:47 +02:00
.rooms
2022-09-07 13:25:51 +02:00
.timeline
2022-02-04 13:30:42 +01:00
.pdus_until(sender_user, &room_id, base_token)?
2020-07-30 18:14:47 +02:00
.take(
u32::try_from(body.limit).map_err(|_| {
Error::BadRequest(ErrorKind::InvalidParam, "Limit value is invalid.")
})? as usize
/ 2,
)
.filter_map(|r| r.ok()) // Remove buggy events
.collect();
2020-07-30 18:14:47 +02:00
2022-01-04 14:30:13 +01:00
for (_, event) in &events_before {
2022-09-07 13:25:51 +02:00
if !services().rooms.lazy_loading.lazy_load_was_sent_before(
2022-01-20 00:10:39 +01:00
sender_user,
sender_device,
2022-02-04 13:30:42 +01:00
&room_id,
2022-01-04 14:30:13 +01:00
&event.sender,
2022-02-04 13:30:42 +01:00
)? || lazy_load_send_redundant
{
lazy_loaded.insert(event.sender.as_str().to_owned());
2022-01-04 14:30:13 +01:00
}
}
let start_token = events_before
.last()
2022-09-07 13:25:51 +02:00
.and_then(|(pdu_id, _)| services().rooms.timeline.pdu_count(pdu_id).ok())
.map(|count| count.to_string());
2020-07-30 18:14:47 +02:00
let events_before: Vec<_> = events_before
2020-07-30 18:14:47 +02:00
.into_iter()
.map(|(_, pdu)| pdu.to_room_event())
.collect();
2020-07-30 18:14:47 +02:00
let events_after: Vec<_> = services()
2020-07-30 18:14:47 +02:00
.rooms
2022-09-07 13:25:51 +02:00
.timeline
2022-02-04 13:30:42 +01:00
.pdus_after(sender_user, &room_id, base_token)?
2020-07-30 18:14:47 +02:00
.take(
u32::try_from(body.limit).map_err(|_| {
Error::BadRequest(ErrorKind::InvalidParam, "Limit value is invalid.")
})? as usize
/ 2,
)
.filter_map(|r| r.ok()) // Remove buggy events
.collect();
2020-07-30 18:14:47 +02:00
2022-01-04 14:30:13 +01:00
for (_, event) in &events_after {
2022-09-07 13:25:51 +02:00
if !services().rooms.lazy_loading.lazy_load_was_sent_before(
2022-01-20 00:10:39 +01:00
sender_user,
sender_device,
2022-02-04 13:30:42 +01:00
&room_id,
2022-01-04 14:30:13 +01:00
&event.sender,
2022-02-04 13:30:42 +01:00
)? || lazy_load_send_redundant
{
lazy_loaded.insert(event.sender.as_str().to_owned());
2022-01-04 14:30:13 +01:00
}
}
2022-09-07 13:25:51 +02:00
let shortstatehash = match services().rooms.state_accessor.pdu_shortstatehash(
2022-02-04 13:30:42 +01:00
events_after
.last()
.map_or(&*body.event_id, |(_, e)| &*e.event_id),
)? {
Some(s) => s,
None => services()
2022-02-04 13:30:42 +01:00
.rooms
2022-09-07 13:25:51 +02:00
.state
.get_room_shortstatehash(&room_id)?
2022-02-04 13:30:42 +01:00
.expect("All rooms have state"),
};
2022-10-05 20:34:31 +02:00
let state_ids = services()
.rooms
.state_accessor
.state_full_ids(shortstatehash)
.await?;
2022-02-04 13:30:42 +01:00
let end_token = events_after
.last()
2022-09-07 13:25:51 +02:00
.and_then(|(pdu_id, _)| services().rooms.timeline.pdu_count(pdu_id).ok())
.map(|count| count.to_string());
2020-07-30 18:14:47 +02:00
let events_after: Vec<_> = events_after
2020-07-30 18:14:47 +02:00
.into_iter()
.map(|(_, pdu)| pdu.to_room_event())
.collect();
2020-07-30 18:14:47 +02:00
2022-01-04 14:30:13 +01:00
let mut state = Vec::new();
2022-02-04 13:30:42 +01:00
for (shortstatekey, id) in state_ids {
2022-10-05 20:34:31 +02:00
let (event_type, state_key) = services()
.rooms
.short
.get_statekey_from_short(shortstatekey)?;
2022-02-04 13:30:42 +01:00
2022-04-06 21:31:29 +02:00
if event_type != StateEventType::RoomMember {
2022-09-07 13:25:51 +02:00
let pdu = match services().rooms.timeline.get_pdu(&id)? {
2022-02-04 13:30:42 +01:00
Some(pdu) => pdu,
None => {
error!("Pdu in state not found: {}", id);
continue;
}
};
state.push(pdu.to_state_event());
} else if !lazy_load_enabled || lazy_loaded.contains(&state_key) {
2022-09-07 13:25:51 +02:00
let pdu = match services().rooms.timeline.get_pdu(&id)? {
2022-02-04 13:30:42 +01:00
Some(pdu) => pdu,
None => {
error!("Pdu in state not found: {}", id);
continue;
}
};
state.push(pdu.to_state_event());
2022-01-04 14:30:13 +01:00
}
}
2022-02-18 15:33:14 +01:00
let resp = get_context::v3::Response {
2022-01-13 11:48:18 +01:00
start: start_token,
end: end_token,
events_before,
event: Some(base_event),
events_after,
2022-01-04 14:30:13 +01:00
state,
2022-01-13 11:48:18 +01:00
};
Ok(resp)
2020-07-30 18:14:47 +02:00
}