mirror of https://gitlab.com/famedly/conduit.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
502 lines
19 KiB
502 lines
19 KiB
mod data; |
|
use std::{ |
|
collections::HashMap, |
|
sync::{Arc, Mutex}, |
|
}; |
|
|
|
pub use data::Data; |
|
use lru_cache::LruCache; |
|
use ruma::{ |
|
events::{ |
|
room::{ |
|
avatar::RoomAvatarEventContent, |
|
guest_access::{GuestAccess, RoomGuestAccessEventContent}, |
|
history_visibility::{HistoryVisibility, RoomHistoryVisibilityEventContent}, |
|
join_rules::{AllowRule, JoinRule, RoomJoinRulesEventContent}, |
|
member::{MembershipState, RoomMemberEventContent}, |
|
name::RoomNameEventContent, |
|
power_levels::{RoomPowerLevels, RoomPowerLevelsEventContent}, |
|
}, |
|
StateEventType, |
|
}, |
|
room::{JoinRuleSummary, RoomMembership}, |
|
state_res::{events::RoomCreateEvent, Event}, |
|
EventId, JsOption, OwnedRoomId, OwnedServerName, OwnedUserId, RoomId, ServerName, UserId, |
|
}; |
|
use serde_json::value::to_raw_value; |
|
use tokio::sync::MutexGuard; |
|
use tracing::{error, warn}; |
|
|
|
use crate::{service::pdu::PduBuilder, services, Error, PduEvent, Result}; |
|
|
|
pub struct Service { |
|
pub db: &'static dyn Data, |
|
pub server_visibility_cache: Mutex<LruCache<(OwnedServerName, u64), bool>>, |
|
pub user_visibility_cache: Mutex<LruCache<(OwnedUserId, u64), bool>>, |
|
} |
|
|
|
impl Service { |
|
/// Builds a StateMap by iterating over all keys that start |
|
/// with state_hash, this gives the full state for the given state_hash. |
|
#[tracing::instrument(skip(self))] |
|
pub async fn state_full_ids(&self, shortstatehash: u64) -> Result<HashMap<u64, Arc<EventId>>> { |
|
self.db.state_full_ids(shortstatehash).await |
|
} |
|
|
|
pub async fn state_full( |
|
&self, |
|
shortstatehash: u64, |
|
) -> Result<HashMap<(StateEventType, String), Arc<PduEvent>>> { |
|
self.db.state_full(shortstatehash).await |
|
} |
|
|
|
/// Returns a single PDU from `room_id` with key (`event_type`, `state_key`). |
|
#[tracing::instrument(skip(self))] |
|
pub fn state_get_id( |
|
&self, |
|
shortstatehash: u64, |
|
event_type: &StateEventType, |
|
state_key: &str, |
|
) -> Result<Option<Arc<EventId>>> { |
|
self.db.state_get_id(shortstatehash, event_type, state_key) |
|
} |
|
|
|
/// Returns a single PDU from `room_id` with key (`event_type`, `state_key`). |
|
pub fn state_get( |
|
&self, |
|
shortstatehash: u64, |
|
event_type: &StateEventType, |
|
state_key: &str, |
|
) -> Result<Option<Arc<PduEvent>>> { |
|
self.db.state_get(shortstatehash, event_type, state_key) |
|
} |
|
|
|
/// Get membership for given user in state |
|
fn user_membership(&self, shortstatehash: u64, user_id: &UserId) -> Result<MembershipState> { |
|
self.state_get( |
|
shortstatehash, |
|
&StateEventType::RoomMember, |
|
user_id.as_str(), |
|
)? |
|
.map_or(Ok(MembershipState::Leave), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomMemberEventContent| c.membership) |
|
.map_err(|_| Error::bad_database("Invalid room membership event in database.")) |
|
}) |
|
} |
|
|
|
/// The user was a joined member at this state (potentially in the past) |
|
fn user_was_joined(&self, shortstatehash: u64, user_id: &UserId) -> bool { |
|
self.user_membership(shortstatehash, user_id) |
|
.map(|s| s == MembershipState::Join) |
|
.unwrap_or_default() // Return sensible default, i.e. false |
|
} |
|
|
|
/// The user was an invited or joined room member at this state (potentially |
|
/// in the past) |
|
fn user_was_invited(&self, shortstatehash: u64, user_id: &UserId) -> bool { |
|
self.user_membership(shortstatehash, user_id) |
|
.map(|s| s == MembershipState::Join || s == MembershipState::Invite) |
|
.unwrap_or_default() // Return sensible default, i.e. false |
|
} |
|
|
|
/// Whether a server is allowed to see an event through federation, based on |
|
/// the room's history_visibility at that event's state. |
|
#[tracing::instrument(skip(self, origin, room_id, event_id))] |
|
pub fn server_can_see_event( |
|
&self, |
|
origin: &ServerName, |
|
room_id: &RoomId, |
|
event_id: &EventId, |
|
) -> Result<bool> { |
|
let shortstatehash = match self.pdu_shortstatehash(event_id)? { |
|
Some(shortstatehash) => shortstatehash, |
|
None => return Ok(true), |
|
}; |
|
|
|
if let Some(visibility) = self |
|
.server_visibility_cache |
|
.lock() |
|
.unwrap() |
|
.get_mut(&(origin.to_owned(), shortstatehash)) |
|
{ |
|
return Ok(*visibility); |
|
} |
|
|
|
let history_visibility = self |
|
.state_get(shortstatehash, &StateEventType::RoomHistoryVisibility, "")? |
|
.map_or(Ok(HistoryVisibility::Shared), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomHistoryVisibilityEventContent| c.history_visibility) |
|
.map_err(|_| { |
|
Error::bad_database("Invalid history visibility event in database.") |
|
}) |
|
})?; |
|
|
|
let mut current_server_members = services() |
|
.rooms |
|
.state_cache |
|
.room_members(room_id) |
|
.filter_map(|r| r.ok()) |
|
.filter(|member| member.server_name() == origin); |
|
|
|
let visibility = match history_visibility { |
|
HistoryVisibility::WorldReadable | HistoryVisibility::Shared => true, |
|
HistoryVisibility::Invited => { |
|
// Allow if any member on requesting server was AT LEAST invited, else deny |
|
current_server_members.any(|member| self.user_was_invited(shortstatehash, &member)) |
|
} |
|
HistoryVisibility::Joined => { |
|
// Allow if any member on requested server was joined, else deny |
|
current_server_members.any(|member| self.user_was_joined(shortstatehash, &member)) |
|
} |
|
_ => { |
|
error!("Unknown history visibility {history_visibility}"); |
|
false |
|
} |
|
}; |
|
|
|
self.server_visibility_cache |
|
.lock() |
|
.unwrap() |
|
.insert((origin.to_owned(), shortstatehash), visibility); |
|
|
|
Ok(visibility) |
|
} |
|
|
|
/// Whether a user is allowed to see an event, based on |
|
/// the room's history_visibility at that event's state. |
|
#[tracing::instrument(skip(self, user_id, room_id, event_id))] |
|
pub fn user_can_see_event( |
|
&self, |
|
user_id: &UserId, |
|
room_id: &RoomId, |
|
event_id: &EventId, |
|
) -> Result<bool> { |
|
let shortstatehash = match self.pdu_shortstatehash(event_id)? { |
|
Some(shortstatehash) => shortstatehash, |
|
None => return Ok(true), |
|
}; |
|
|
|
if let Some(visibility) = self |
|
.user_visibility_cache |
|
.lock() |
|
.unwrap() |
|
.get_mut(&(user_id.to_owned(), shortstatehash)) |
|
{ |
|
return Ok(*visibility); |
|
} |
|
|
|
let currently_member = services().rooms.state_cache.is_joined(user_id, room_id)?; |
|
|
|
let history_visibility = self |
|
.state_get(shortstatehash, &StateEventType::RoomHistoryVisibility, "")? |
|
.map_or(Ok(HistoryVisibility::Shared), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomHistoryVisibilityEventContent| c.history_visibility) |
|
.map_err(|_| { |
|
Error::bad_database("Invalid history visibility event in database.") |
|
}) |
|
})?; |
|
|
|
let visibility = match history_visibility { |
|
HistoryVisibility::WorldReadable => true, |
|
HistoryVisibility::Shared => currently_member, |
|
HistoryVisibility::Invited => { |
|
// Allow if any member on requesting server was AT LEAST invited, else deny |
|
self.user_was_invited(shortstatehash, user_id) |
|
} |
|
HistoryVisibility::Joined => { |
|
// Allow if any member on requested server was joined, else deny |
|
self.user_was_joined(shortstatehash, user_id) |
|
} |
|
_ => { |
|
error!("Unknown history visibility {history_visibility}"); |
|
false |
|
} |
|
}; |
|
|
|
self.user_visibility_cache |
|
.lock() |
|
.unwrap() |
|
.insert((user_id.to_owned(), shortstatehash), visibility); |
|
|
|
Ok(visibility) |
|
} |
|
|
|
/// Whether a user is allowed to see an event, based on |
|
/// the room's history_visibility at that event's state. |
|
#[tracing::instrument(skip(self, user_id, room_id))] |
|
pub fn user_can_see_state_events(&self, user_id: &UserId, room_id: &RoomId) -> Result<bool> { |
|
let currently_member = services().rooms.state_cache.is_joined(user_id, room_id)?; |
|
|
|
let history_visibility = self |
|
.room_state_get(room_id, &StateEventType::RoomHistoryVisibility, "")? |
|
.map_or(Ok(HistoryVisibility::Shared), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomHistoryVisibilityEventContent| c.history_visibility) |
|
.map_err(|_| { |
|
Error::bad_database("Invalid history visibility event in database.") |
|
}) |
|
})?; |
|
|
|
Ok(currently_member || history_visibility == HistoryVisibility::WorldReadable) |
|
} |
|
|
|
/// Returns the state hash for this pdu. |
|
pub fn pdu_shortstatehash(&self, event_id: &EventId) -> Result<Option<u64>> { |
|
self.db.pdu_shortstatehash(event_id) |
|
} |
|
|
|
/// Returns the full room state. |
|
#[tracing::instrument(skip(self))] |
|
pub async fn room_state_full( |
|
&self, |
|
room_id: &RoomId, |
|
) -> Result<HashMap<(StateEventType, String), Arc<PduEvent>>> { |
|
self.db.room_state_full(room_id).await |
|
} |
|
|
|
/// Returns a single PDU from `room_id` with key (`event_type`, `state_key`). |
|
#[tracing::instrument(skip(self))] |
|
pub fn room_state_get_id( |
|
&self, |
|
room_id: &RoomId, |
|
event_type: &StateEventType, |
|
state_key: &str, |
|
) -> Result<Option<Arc<EventId>>> { |
|
self.db.room_state_get_id(room_id, event_type, state_key) |
|
} |
|
|
|
/// Returns a single PDU from `room_id` with key (`event_type`, `state_key`). |
|
#[tracing::instrument(skip(self))] |
|
pub fn room_state_get( |
|
&self, |
|
room_id: &RoomId, |
|
event_type: &StateEventType, |
|
state_key: &str, |
|
) -> Result<Option<Arc<PduEvent>>> { |
|
self.db.room_state_get(room_id, event_type, state_key) |
|
} |
|
|
|
pub fn get_name(&self, room_id: &RoomId) -> Result<Option<String>> { |
|
services() |
|
.rooms |
|
.state_accessor |
|
.room_state_get(room_id, &StateEventType::RoomName, "")? |
|
.map_or(Ok(None), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomNameEventContent| Some(c.name)) |
|
.map_err(|e| { |
|
error!( |
|
"Invalid room name event in database for room {}. {}", |
|
room_id, e |
|
); |
|
Error::bad_database("Invalid room name event in database.") |
|
}) |
|
}) |
|
} |
|
|
|
pub fn get_avatar(&self, room_id: &RoomId) -> Result<JsOption<RoomAvatarEventContent>> { |
|
services() |
|
.rooms |
|
.state_accessor |
|
.room_state_get(room_id, &StateEventType::RoomAvatar, "")? |
|
.map_or(Ok(JsOption::Undefined), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map_err(|_| Error::bad_database("Invalid room avatar event in database.")) |
|
}) |
|
} |
|
|
|
pub fn user_can_invite( |
|
&self, |
|
room_id: &RoomId, |
|
sender: &UserId, |
|
target_user: &UserId, |
|
state_lock: &MutexGuard<'_, ()>, |
|
) -> Result<bool> { |
|
let content = to_raw_value(&RoomMemberEventContent::new(MembershipState::Invite)) |
|
.expect("Event content always serializes"); |
|
|
|
let new_event = PduBuilder { |
|
event_type: ruma::events::TimelineEventType::RoomMember, |
|
content, |
|
unsigned: None, |
|
state_key: Some(target_user.into()), |
|
redacts: None, |
|
timestamp: None, |
|
}; |
|
|
|
Ok(services() |
|
.rooms |
|
.timeline |
|
.create_hash_and_sign_event(new_event, sender, room_id, state_lock) |
|
.is_ok()) |
|
} |
|
|
|
pub fn get_member( |
|
&self, |
|
room_id: &RoomId, |
|
user_id: &UserId, |
|
) -> Result<Option<RoomMemberEventContent>> { |
|
services() |
|
.rooms |
|
.state_accessor |
|
.room_state_get(room_id, &StateEventType::RoomMember, user_id.as_str())? |
|
.map_or(Ok(None), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map_err(|_| Error::bad_database("Invalid room member event in database.")) |
|
}) |
|
} |
|
|
|
/// Checks if a given user can redact a given event |
|
/// |
|
/// If `federation` is `true`, it allows redaction events from any user of the same server |
|
/// as the original event sender, [as required by room versions >= |
|
/// v3](https://spec.matrix.org/v1.10/rooms/v11/#handling-redactions) |
|
pub fn user_can_redact( |
|
&self, |
|
redacts: &EventId, |
|
sender: &UserId, |
|
room_id: &RoomId, |
|
federation: bool, |
|
) -> Result<bool> { |
|
self.power_levels(room_id).map(|power_levels| { |
|
power_levels.user_can_redact_event_of_other(sender) |
|
|| power_levels.user_can_redact_own_event(sender) |
|
&& if let Ok(Some(pdu)) = services().rooms.timeline.get_pdu(redacts) { |
|
if federation { |
|
pdu.sender().server_name() == sender.server_name() |
|
} else { |
|
pdu.sender == sender |
|
} |
|
} else { |
|
false |
|
} |
|
}) |
|
} |
|
|
|
/// Checks if guests are able to join a given room |
|
pub fn guest_can_join(&self, room_id: &RoomId) -> Result<bool, Error> { |
|
self.room_state_get(room_id, &StateEventType::RoomGuestAccess, "")? |
|
.map_or(Ok(false), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomGuestAccessEventContent| c.guest_access == GuestAccess::CanJoin) |
|
.map_err(|_| { |
|
Error::bad_database("Invalid room guest access event in database.") |
|
}) |
|
}) |
|
} |
|
|
|
/// Checks if guests are able to view room content without joining |
|
pub fn world_readable(&self, room_id: &RoomId) -> Result<bool, Error> { |
|
self.room_state_get(room_id, &StateEventType::RoomHistoryVisibility, "")? |
|
.map_or(Ok(false), |s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomHistoryVisibilityEventContent| { |
|
c.history_visibility == HistoryVisibility::WorldReadable |
|
}) |
|
.map_err(|_| { |
|
Error::bad_database("Invalid room history visibility event in database.") |
|
}) |
|
}) |
|
} |
|
|
|
/// Returns the space-room join rule for a given room |
|
pub fn get_space_room_join_rule( |
|
&self, |
|
current_room: &RoomId, |
|
) -> Result<(JoinRuleSummary, Vec<OwnedRoomId>), Error> { |
|
Ok(self |
|
.room_state_get(current_room, &StateEventType::RoomJoinRules, "")? |
|
.map(|s| { |
|
serde_json::from_str(s.content.get()) |
|
.map(|c: RoomJoinRulesEventContent| { |
|
( |
|
c.join_rule.clone().into(), |
|
self.allowed_room_ids(c.join_rule), |
|
) |
|
}) |
|
.map_err(|e| { |
|
error!("Invalid room join rule event in database: {}", e); |
|
Error::BadDatabase("Invalid room join rule event in database.") |
|
}) |
|
}) |
|
.transpose()? |
|
.unwrap_or((JoinRuleSummary::Invite, vec![]))) |
|
} |
|
|
|
/// Returns the join rules event content of a room, if there are any and we are aware of it locally |
|
#[tracing::instrument(skip(self))] |
|
pub fn get_join_rules( |
|
&self, |
|
room_id: &RoomId, |
|
) -> Result<Option<RoomJoinRulesEventContent>, Error> { |
|
let join_rules_event = self.room_state_get(room_id, &StateEventType::RoomJoinRules, "")?; |
|
|
|
join_rules_event |
|
.as_ref() |
|
.map(|join_rules_event| { |
|
serde_json::from_str::<RoomJoinRulesEventContent>(join_rules_event.content.get()) |
|
.map_err(|e| { |
|
warn!("Invalid join rules event: {}", e); |
|
Error::bad_database("Invalid join rules event in db.") |
|
}) |
|
}) |
|
.transpose() |
|
} |
|
|
|
/// Returns an empty vec if not a restricted room |
|
pub fn allowed_room_ids(&self, join_rule: JoinRule) -> Vec<OwnedRoomId> { |
|
let mut room_ids = vec![]; |
|
if let JoinRule::Restricted(r) | JoinRule::KnockRestricted(r) = join_rule { |
|
for rule in r.allow { |
|
if let AllowRule::RoomMembership(RoomMembership { |
|
room_id: membership, |
|
}) = rule |
|
{ |
|
room_ids.push(membership.to_owned()); |
|
} |
|
} |
|
} |
|
room_ids |
|
} |
|
|
|
/// Gets the effective power levels of a room, regardless of if there is an |
|
/// `m.rooms.power_levels` state. |
|
pub fn power_levels(&self, room_id: &RoomId) -> Result<RoomPowerLevels> { |
|
let power_levels: Option<RoomPowerLevelsEventContent> = self |
|
.room_state_get(room_id, &StateEventType::RoomPowerLevels, "")? |
|
.map(|ev| { |
|
serde_json::from_str(ev.content.get()) |
|
.map_err(|_| Error::bad_database("invalid m.room.power_levels event.")) |
|
}) |
|
.transpose()?; |
|
|
|
let room_create = self |
|
.room_state_get(room_id, &StateEventType::RoomCreate, "")? |
|
.map(RoomCreateEvent::new) |
|
.ok_or_else(|| Error::bad_database("Found room without m.room.create event."))?; |
|
|
|
let room_version = room_create.room_version().map_err(|e| { |
|
error!("Invalid room version in room create content for room {room_id}: {e}"); |
|
Error::BadDatabase("Room Create content had invalid room version") |
|
})?; |
|
let rules = room_version |
|
.rules() |
|
.expect("Supported room version must have rules.") |
|
.authorization; |
|
|
|
room_create |
|
// NOTE: This is because project hydra's client-side was made public before the server |
|
// side. This will be fixed by using `creators` instead in part 2/2. |
|
.creator(&rules) |
|
.map_err(|e| { |
|
error!("Failed to get creators of room id {}: {e}", room_id); |
|
Error::BadDatabase("RoomCreateEvent has invalid creators") |
|
}) |
|
.map(|creator| { |
|
RoomPowerLevels::new(power_levels.into(), &rules, [creator.into_owned()]) |
|
}) |
|
} |
|
}
|
|
|