2018-06-03 04:26:37 +02:00
|
|
|
// Matrix Construct
|
|
|
|
//
|
|
|
|
// Copyright (C) Matrix Construct Developers, Authors & Contributors
|
|
|
|
// Copyright (C) 2016-2018 Jason Volk <jason@zemos.net>
|
|
|
|
//
|
|
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
|
|
// copyright notice and this permission notice is present in all copies. The
|
|
|
|
// full license for this software is available in the LICENSE file.
|
|
|
|
|
|
|
|
using namespace ircd;
|
|
|
|
|
|
|
|
mapi::header
|
|
|
|
IRCD_MODULE
|
|
|
|
{
|
|
|
|
"federation event_auth (undocumented)"
|
|
|
|
};
|
|
|
|
|
2019-09-29 01:12:07 +02:00
|
|
|
m::resource
|
2018-06-03 04:26:37 +02:00
|
|
|
event_auth_resource
|
|
|
|
{
|
|
|
|
"/_matrix/federation/v1/event_auth/",
|
|
|
|
{
|
|
|
|
"federation event_auth",
|
|
|
|
resource::DIRECTORY,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
conf::item<size_t>
|
|
|
|
event_auth_flush_hiwat
|
|
|
|
{
|
|
|
|
{ "name", "ircd.federation.event_auth.flush.hiwat" },
|
|
|
|
{ "default", 16384L },
|
|
|
|
};
|
|
|
|
|
2019-09-29 01:12:07 +02:00
|
|
|
m::resource::response
|
2018-06-03 04:26:37 +02:00
|
|
|
get__event_auth(client &client,
|
2019-09-29 01:12:07 +02:00
|
|
|
const m::resource::request &request)
|
2018-06-03 04:26:37 +02:00
|
|
|
{
|
|
|
|
if(request.parv.size() < 1)
|
|
|
|
throw m::NEED_MORE_PARAMS
|
|
|
|
{
|
|
|
|
"room_id path parameter required"
|
|
|
|
};
|
|
|
|
|
|
|
|
m::room::id::buf room_id
|
|
|
|
{
|
2018-12-07 01:41:47 +01:00
|
|
|
url::decode(room_id, request.parv[0])
|
2018-06-03 04:26:37 +02:00
|
|
|
};
|
|
|
|
|
2019-05-27 05:36:26 +02:00
|
|
|
if(m::room::server_acl::enable_read && !m::room::server_acl::check(room_id, request.node_id))
|
|
|
|
throw m::ACCESS_DENIED
|
|
|
|
{
|
|
|
|
"You are not permitted by the room's server access control list."
|
|
|
|
};
|
|
|
|
|
2018-06-03 04:26:37 +02:00
|
|
|
if(request.parv.size() < 2)
|
|
|
|
throw m::NEED_MORE_PARAMS
|
|
|
|
{
|
|
|
|
"event_id path parameter required"
|
|
|
|
};
|
|
|
|
|
|
|
|
m::event::id::buf event_id
|
|
|
|
{
|
2018-12-07 01:41:47 +01:00
|
|
|
url::decode(event_id, request.parv[1])
|
2018-06-03 04:26:37 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
const m::room room
|
|
|
|
{
|
|
|
|
room_id, event_id
|
|
|
|
};
|
|
|
|
|
2019-04-24 04:42:48 +02:00
|
|
|
bool visible
|
|
|
|
{
|
2019-08-14 10:01:46 +02:00
|
|
|
m::visible(room, request.node_id)
|
2019-04-24 04:42:48 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
// make an exception to the visibility for invitee cases.
|
|
|
|
if(!visible)
|
|
|
|
{
|
|
|
|
static const m::event::fetch::opts fopts
|
|
|
|
{
|
2019-04-28 01:00:56 +02:00
|
|
|
m::event::keys::include {"room_id", "sender", "type", "state_key", "content"}
|
2019-04-24 04:42:48 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
const m::event::fetch event
|
|
|
|
{
|
|
|
|
event_id, fopts
|
|
|
|
};
|
|
|
|
|
2019-04-28 01:00:56 +02:00
|
|
|
visible = m::visible(event, request.node_id);
|
2019-04-24 04:42:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if(!visible)
|
2018-06-03 04:26:37 +02:00
|
|
|
throw m::ACCESS_DENIED
|
|
|
|
{
|
|
|
|
"You are not permitted to view the room at this event"
|
|
|
|
};
|
|
|
|
|
2020-12-10 14:23:19 +01:00
|
|
|
const m::room::auth::chain chain
|
|
|
|
{
|
|
|
|
m::index(event_id)
|
|
|
|
};
|
|
|
|
|
2019-09-29 01:12:07 +02:00
|
|
|
m::resource::response::chunked response
|
2018-06-03 04:26:37 +02:00
|
|
|
{
|
|
|
|
client, http::OK
|
|
|
|
};
|
|
|
|
|
|
|
|
json::stack out
|
|
|
|
{
|
2018-09-05 07:48:23 +02:00
|
|
|
response.buf, response.flusher(), size_t(event_auth_flush_hiwat)
|
2018-06-03 04:26:37 +02:00
|
|
|
};
|
|
|
|
|
2020-12-10 14:23:19 +01:00
|
|
|
json::stack::object top
|
2018-06-03 04:26:37 +02:00
|
|
|
{
|
2020-12-10 14:23:19 +01:00
|
|
|
out
|
2018-06-03 04:26:37 +02:00
|
|
|
};
|
|
|
|
|
2020-12-10 14:23:19 +01:00
|
|
|
if(request.query.get<bool>("auth_chain", true))
|
2019-02-16 23:44:03 +01:00
|
|
|
{
|
2020-12-10 14:23:19 +01:00
|
|
|
json::stack::array auth_chain
|
|
|
|
{
|
|
|
|
top, "auth_chain"
|
|
|
|
};
|
|
|
|
|
|
|
|
m::event::fetch event;
|
|
|
|
chain.for_each([&auth_chain, &event]
|
|
|
|
(const m::event::idx &event_idx)
|
|
|
|
{
|
|
|
|
if(likely(seek(std::nothrow, event, event_idx)))
|
|
|
|
auth_chain.append(event);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
2019-02-16 23:44:03 +01:00
|
|
|
|
2020-12-10 14:23:19 +01:00
|
|
|
if(request.query.get<bool>("auth_chain_ids", false))
|
2018-06-03 04:26:37 +02:00
|
|
|
{
|
2020-12-10 14:23:19 +01:00
|
|
|
json::stack::array auth_chain_ids
|
|
|
|
{
|
|
|
|
top, "auth_chain_ids"
|
|
|
|
};
|
2019-08-18 14:38:44 +02:00
|
|
|
|
2020-12-10 14:23:19 +01:00
|
|
|
chain.for_each([&auth_chain_ids]
|
|
|
|
(const m::event::idx &event_idx)
|
|
|
|
{
|
|
|
|
m::event_id(std::nothrow, event_idx, [&auth_chain_ids]
|
|
|
|
(const m::event::id &event_id)
|
|
|
|
{
|
|
|
|
auth_chain_ids.append(event_id);
|
|
|
|
});
|
|
|
|
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
2018-06-03 04:26:37 +02:00
|
|
|
|
2022-06-25 22:47:43 +02:00
|
|
|
return response;
|
2018-06-03 04:26:37 +02:00
|
|
|
}
|
|
|
|
|
2019-09-29 01:12:07 +02:00
|
|
|
m::resource::method
|
2018-06-03 04:26:37 +02:00
|
|
|
method_get
|
|
|
|
{
|
|
|
|
event_auth_resource, "GET", get__event_auth,
|
|
|
|
{
|
|
|
|
method_get.VERIFY_ORIGIN
|
|
|
|
}
|
|
|
|
};
|