2020-06-30 11:37:21 +02:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package internal
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-08-11 19:19:11 +02:00
|
|
|
"errors"
|
2020-06-30 11:37:21 +02:00
|
|
|
|
2020-07-28 11:53:17 +02:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
2020-08-11 19:19:11 +02:00
|
|
|
"github.com/matrix-org/dendrite/currentstateserver/acls"
|
2020-06-30 11:37:21 +02:00
|
|
|
"github.com/matrix-org/dendrite/currentstateserver/api"
|
|
|
|
"github.com/matrix-org/dendrite/currentstateserver/storage"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
)
|
|
|
|
|
|
|
|
type CurrentStateInternalAPI struct {
|
2020-08-11 19:19:11 +02:00
|
|
|
DB storage.Database
|
|
|
|
ServerACLs *acls.ServerACLs
|
2020-06-30 11:37:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a *CurrentStateInternalAPI) QueryCurrentState(ctx context.Context, req *api.QueryCurrentStateRequest, res *api.QueryCurrentStateResponse) error {
|
2020-06-30 14:34:59 +02:00
|
|
|
res.StateEvents = make(map[gomatrixserverlib.StateKeyTuple]*gomatrixserverlib.HeaderedEvent)
|
2020-06-30 11:37:21 +02:00
|
|
|
for _, tuple := range req.StateTuples {
|
|
|
|
ev, err := a.DB.GetStateEvent(ctx, req.RoomID, tuple.EventType, tuple.StateKey)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if ev != nil {
|
2020-06-30 14:34:59 +02:00
|
|
|
res.StateEvents[tuple] = ev
|
2020-06-30 11:37:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-06-30 14:34:59 +02:00
|
|
|
|
|
|
|
func (a *CurrentStateInternalAPI) QueryRoomsForUser(ctx context.Context, req *api.QueryRoomsForUserRequest, res *api.QueryRoomsForUserResponse) error {
|
|
|
|
roomIDs, err := a.DB.GetRoomsByMembership(ctx, req.UserID, req.WantMembership)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
res.RoomIDs = roomIDs
|
|
|
|
return nil
|
|
|
|
}
|
2020-07-02 16:41:18 +02:00
|
|
|
|
2020-07-28 11:53:17 +02:00
|
|
|
func (a *CurrentStateInternalAPI) QueryKnownUsers(ctx context.Context, req *api.QueryKnownUsersRequest, res *api.QueryKnownUsersResponse) error {
|
|
|
|
users, err := a.DB.GetKnownUsers(ctx, req.UserID, req.SearchString, req.Limit)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, user := range users {
|
|
|
|
res.Users = append(res.Users, authtypes.FullyQualifiedProfile{
|
|
|
|
UserID: user,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-07-02 16:41:18 +02:00
|
|
|
func (a *CurrentStateInternalAPI) QueryBulkStateContent(ctx context.Context, req *api.QueryBulkStateContentRequest, res *api.QueryBulkStateContentResponse) error {
|
|
|
|
events, err := a.DB.GetBulkStateContent(ctx, req.RoomIDs, req.StateTuples, req.AllowWildcards)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
res.Rooms = make(map[string]map[gomatrixserverlib.StateKeyTuple]string)
|
|
|
|
for _, ev := range events {
|
|
|
|
if res.Rooms[ev.RoomID] == nil {
|
|
|
|
res.Rooms[ev.RoomID] = make(map[gomatrixserverlib.StateKeyTuple]string)
|
|
|
|
}
|
|
|
|
room := res.Rooms[ev.RoomID]
|
|
|
|
room[gomatrixserverlib.StateKeyTuple{
|
|
|
|
EventType: ev.EventType,
|
|
|
|
StateKey: ev.StateKey,
|
|
|
|
}] = ev.ContentValue
|
|
|
|
res.Rooms[ev.RoomID] = room
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-07-23 13:26:31 +02:00
|
|
|
|
|
|
|
func (a *CurrentStateInternalAPI) QuerySharedUsers(ctx context.Context, req *api.QuerySharedUsersRequest, res *api.QuerySharedUsersResponse) error {
|
|
|
|
roomIDs, err := a.DB.GetRoomsByMembership(ctx, req.UserID, "join")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-07-24 11:33:41 +02:00
|
|
|
roomIDs = append(roomIDs, req.IncludeRoomIDs...)
|
|
|
|
excludeMap := make(map[string]bool)
|
|
|
|
for _, roomID := range req.ExcludeRoomIDs {
|
|
|
|
excludeMap[roomID] = true
|
|
|
|
}
|
|
|
|
// filter out excluded rooms
|
|
|
|
j := 0
|
|
|
|
for i := range roomIDs {
|
|
|
|
// move elements to include to the beginning of the slice
|
|
|
|
// then trim elements on the right
|
|
|
|
if !excludeMap[roomIDs[i]] {
|
|
|
|
roomIDs[j] = roomIDs[i]
|
|
|
|
j++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
roomIDs = roomIDs[:j]
|
|
|
|
|
2020-07-23 13:26:31 +02:00
|
|
|
users, err := a.DB.JoinedUsersSetInRooms(ctx, roomIDs)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-07-24 11:33:41 +02:00
|
|
|
res.UserIDsToCount = users
|
2020-07-23 13:26:31 +02:00
|
|
|
return nil
|
|
|
|
}
|
2020-08-11 19:19:11 +02:00
|
|
|
|
|
|
|
func (a *CurrentStateInternalAPI) QueryServerBannedFromRoom(ctx context.Context, req *api.QueryServerBannedFromRoomRequest, res *api.QueryServerBannedFromRoomResponse) error {
|
|
|
|
if a.ServerACLs == nil {
|
|
|
|
return errors.New("no server ACL tracking")
|
|
|
|
}
|
|
|
|
res.Banned = a.ServerACLs.IsServerBannedFromRoom(req.ServerName, req.RoomID)
|
|
|
|
return nil
|
|
|
|
}
|