|
|
|
|
@ -1,9 +1,17 @@
|
|
|
|
|
mod data; |
|
|
|
|
|
|
|
|
|
pub use data::Data; |
|
|
|
|
use tracing::error; |
|
|
|
|
|
|
|
|
|
use crate::Result; |
|
|
|
|
use ruma::{OwnedRoomAliasId, OwnedRoomId, RoomAliasId, RoomId}; |
|
|
|
|
use crate::{services, Error, Result}; |
|
|
|
|
use ruma::{ |
|
|
|
|
api::client::error::ErrorKind, |
|
|
|
|
events::{ |
|
|
|
|
room::power_levels::{RoomPowerLevels, RoomPowerLevelsEventContent}, |
|
|
|
|
StateEventType, |
|
|
|
|
}, |
|
|
|
|
OwnedRoomAliasId, OwnedRoomId, RoomAliasId, RoomId, UserId, |
|
|
|
|
}; |
|
|
|
|
|
|
|
|
|
pub struct Service { |
|
|
|
|
pub db: &'static dyn Data, |
|
|
|
|
@ -11,13 +19,71 @@ pub struct Service {
|
|
|
|
|
|
|
|
|
|
impl Service { |
|
|
|
|
#[tracing::instrument(skip(self))] |
|
|
|
|
pub fn set_alias(&self, alias: &RoomAliasId, room_id: &RoomId) -> Result<()> { |
|
|
|
|
self.db.set_alias(alias, room_id) |
|
|
|
|
pub fn set_alias(&self, alias: &RoomAliasId, room_id: &RoomId, user_id: &UserId) -> Result<()> { |
|
|
|
|
if alias == services().globals.admin_alias() && user_id != services().globals.server_user() |
|
|
|
|
{ |
|
|
|
|
Err(Error::BadRequest( |
|
|
|
|
ErrorKind::forbidden(), |
|
|
|
|
"Only the server user can set this alias", |
|
|
|
|
)) |
|
|
|
|
} else { |
|
|
|
|
self.db.set_alias(alias, room_id, user_id) |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
#[tracing::instrument(skip(self))] |
|
|
|
|
pub fn remove_alias(&self, alias: &RoomAliasId) -> Result<()> { |
|
|
|
|
self.db.remove_alias(alias) |
|
|
|
|
fn user_can_remove_alias(&self, alias: &RoomAliasId, user_id: &UserId) -> Result<bool> { |
|
|
|
|
let Some(room_id) = self.resolve_local_alias(alias)? else { |
|
|
|
|
return Err(Error::BadRequest(ErrorKind::NotFound, "Alias not found.")); |
|
|
|
|
}; |
|
|
|
|
|
|
|
|
|
// The creator of an alias can remove it
|
|
|
|
|
if self |
|
|
|
|
.db |
|
|
|
|
.who_created_alias(alias)? |
|
|
|
|
.map(|user| user == user_id) |
|
|
|
|
.unwrap_or_default() |
|
|
|
|
// Server admins can remove any local alias
|
|
|
|
|
|| services().admin.user_is_admin(user_id)? |
|
|
|
|
// Always allow the Conduit user to remove the alias, since there may not be an admin room
|
|
|
|
|
|| services().globals.server_user ()== user_id |
|
|
|
|
{ |
|
|
|
|
Ok(true) |
|
|
|
|
// Checking whether the user is able to change canonical aliases of the room
|
|
|
|
|
} else if let Some(event) = services().rooms.state_accessor.room_state_get( |
|
|
|
|
&room_id, |
|
|
|
|
&StateEventType::RoomPowerLevels, |
|
|
|
|
"", |
|
|
|
|
)? { |
|
|
|
|
serde_json::from_str(event.content.get()) |
|
|
|
|
.map_err(|_| Error::bad_database("Invalid event content for m.room.power_levels")) |
|
|
|
|
.map(|content: RoomPowerLevelsEventContent| { |
|
|
|
|
RoomPowerLevels::from(content) |
|
|
|
|
.user_can_send_state(user_id, StateEventType::RoomCanonicalAlias) |
|
|
|
|
}) |
|
|
|
|
// If there is no power levels event, only the room creator can change canonical aliases
|
|
|
|
|
} else if let Some(event) = services().rooms.state_accessor.room_state_get( |
|
|
|
|
&room_id, |
|
|
|
|
&StateEventType::RoomCreate, |
|
|
|
|
"", |
|
|
|
|
)? { |
|
|
|
|
Ok(event.sender == user_id) |
|
|
|
|
} else { |
|
|
|
|
error!("Room {} has no m.room.create event (VERY BAD)!", room_id); |
|
|
|
|
Err(Error::bad_database("Room has no m.room.create event")) |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
#[tracing::instrument(skip(self))] |
|
|
|
|
pub fn remove_alias(&self, alias: &RoomAliasId, user_id: &UserId) -> Result<()> { |
|
|
|
|
if self.user_can_remove_alias(alias, user_id)? { |
|
|
|
|
self.db.remove_alias(alias) |
|
|
|
|
} else { |
|
|
|
|
Err(Error::BadRequest( |
|
|
|
|
ErrorKind::forbidden(), |
|
|
|
|
"User is not permitted to remove this alias.", |
|
|
|
|
)) |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
#[tracing::instrument(skip(self))] |
|
|
|
|
|