2017-07-26 13:53:11 +00:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-10-11 17:16:53 +00:00
|
|
|
package routing
|
2017-07-26 13:53:11 +00:00
|
|
|
|
|
|
|
import (
|
2020-04-11 16:47:05 +00:00
|
|
|
"encoding/json"
|
2020-06-18 17:36:03 +00:00
|
|
|
"fmt"
|
2017-07-26 13:53:11 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
|
2020-10-09 08:15:35 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
2017-07-26 13:53:11 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
2017-08-02 15:21:35 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/producers"
|
2022-03-03 11:40:53 +00:00
|
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
2020-10-09 08:15:35 +00:00
|
|
|
roomserverAPI "github.com/matrix-org/dendrite/roomserver/api"
|
2022-04-07 14:08:19 +00:00
|
|
|
"github.com/matrix-org/dendrite/syncapi/types"
|
2020-06-16 13:10:55 +00:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2017-07-26 13:53:11 +00:00
|
|
|
|
|
|
|
"github.com/matrix-org/util"
|
|
|
|
)
|
|
|
|
|
2020-01-29 17:53:05 +00:00
|
|
|
// GetAccountData implements GET /user/{userId}/[rooms/{roomid}/]account_data/{type}
|
|
|
|
func GetAccountData(
|
2020-06-18 17:36:03 +00:00
|
|
|
req *http.Request, userAPI api.UserInternalAPI, device *api.Device,
|
2020-01-29 17:53:05 +00:00
|
|
|
userID string, roomID string, dataType string,
|
|
|
|
) util.JSONResponse {
|
|
|
|
if userID != device.UserID {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
|
|
|
JSON: jsonerror.Forbidden("userID does not match the current user"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-18 17:36:03 +00:00
|
|
|
dataReq := api.QueryAccountDataRequest{
|
|
|
|
UserID: userID,
|
|
|
|
DataType: dataType,
|
|
|
|
RoomID: roomID,
|
|
|
|
}
|
|
|
|
dataRes := api.QueryAccountDataResponse{}
|
|
|
|
if err := userAPI.QueryAccountData(req.Context(), &dataReq, &dataRes); err != nil {
|
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("userAPI.QueryAccountData failed")
|
|
|
|
return util.ErrorResponse(fmt.Errorf("userAPI.QueryAccountData: %w", err))
|
2020-01-29 17:53:05 +00:00
|
|
|
}
|
|
|
|
|
2020-06-18 17:36:03 +00:00
|
|
|
var data json.RawMessage
|
|
|
|
var ok bool
|
|
|
|
if roomID != "" {
|
|
|
|
data, ok = dataRes.RoomAccountData[roomID][dataType]
|
|
|
|
} else {
|
|
|
|
data, ok = dataRes.GlobalAccountData[dataType]
|
|
|
|
}
|
|
|
|
if ok {
|
2020-01-29 17:53:05 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
2020-06-18 17:36:03 +00:00
|
|
|
JSON: data,
|
2020-01-29 17:53:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusNotFound,
|
2021-06-14 13:06:14 +00:00
|
|
|
JSON: jsonerror.NotFound("data not found"),
|
2020-01-29 17:53:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-26 13:53:11 +00:00
|
|
|
// SaveAccountData implements PUT /user/{userId}/[rooms/{roomId}/]account_data/{type}
|
|
|
|
func SaveAccountData(
|
2020-06-18 17:36:03 +00:00
|
|
|
req *http.Request, userAPI api.UserInternalAPI, device *api.Device,
|
2017-08-02 15:21:35 +00:00
|
|
|
userID string, roomID string, dataType string, syncProducer *producers.SyncAPIProducer,
|
2017-07-26 13:53:11 +00:00
|
|
|
) util.JSONResponse {
|
|
|
|
if userID != device.UserID {
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusForbidden,
|
2017-07-26 13:53:11 +00:00
|
|
|
JSON: jsonerror.Forbidden("userID does not match the current user"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-20 09:59:19 +00:00
|
|
|
defer req.Body.Close() // nolint: errcheck
|
2017-07-26 13:53:11 +00:00
|
|
|
|
2020-04-11 16:47:05 +00:00
|
|
|
if req.Body == http.NoBody {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
|
|
|
JSON: jsonerror.NotJSON("Content not JSON"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-08 09:46:23 +00:00
|
|
|
if dataType == "m.fully_read" || dataType == "m.push_rules" {
|
2020-10-09 08:15:35 +00:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
2022-04-08 09:46:23 +00:00
|
|
|
JSON: jsonerror.Forbidden(fmt.Sprintf("Unable to modify %q using this API", dataType)),
|
2020-10-09 08:15:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-26 13:53:11 +00:00
|
|
|
body, err := ioutil.ReadAll(req.Body)
|
|
|
|
if err != nil {
|
2020-03-02 16:20:44 +00:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("ioutil.ReadAll failed")
|
|
|
|
return jsonerror.InternalServerError()
|
2017-07-26 13:53:11 +00:00
|
|
|
}
|
|
|
|
|
2020-04-11 16:47:05 +00:00
|
|
|
if !json.Valid(body) {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
|
|
|
JSON: jsonerror.BadJSON("Bad JSON content"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-18 17:36:03 +00:00
|
|
|
dataReq := api.InputAccountDataRequest{
|
|
|
|
UserID: userID,
|
|
|
|
DataType: dataType,
|
|
|
|
RoomID: roomID,
|
|
|
|
AccountData: json.RawMessage(body),
|
|
|
|
}
|
|
|
|
dataRes := api.InputAccountDataResponse{}
|
|
|
|
if err := userAPI.InputAccountData(req.Context(), &dataReq, &dataRes); err != nil {
|
2020-10-09 08:15:35 +00:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("userAPI.InputAccountData failed")
|
2020-06-18 17:36:03 +00:00
|
|
|
return util.ErrorResponse(err)
|
2017-07-26 13:53:11 +00:00
|
|
|
}
|
|
|
|
|
2022-04-07 14:08:19 +00:00
|
|
|
var ignoredUsers *types.IgnoredUsers
|
|
|
|
if dataType == "m.ignored_user_list" {
|
|
|
|
ignoredUsers = &types.IgnoredUsers{}
|
|
|
|
_ = json.Unmarshal(body, ignoredUsers)
|
|
|
|
}
|
|
|
|
|
2020-06-18 17:36:03 +00:00
|
|
|
// TODO: user API should do this since it's account data
|
2022-04-07 14:08:19 +00:00
|
|
|
if err := syncProducer.SendData(userID, roomID, dataType, nil, ignoredUsers); err != nil {
|
2020-03-02 16:20:44 +00:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("syncProducer.SendData failed")
|
|
|
|
return jsonerror.InternalServerError()
|
2017-08-02 15:21:35 +00:00
|
|
|
}
|
|
|
|
|
2017-07-26 13:53:11 +00:00
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-07-26 13:53:11 +00:00
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|
2020-10-09 08:15:35 +00:00
|
|
|
|
|
|
|
type fullyReadEvent struct {
|
|
|
|
EventID string `json:"event_id"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// SaveReadMarker implements POST /rooms/{roomId}/read_markers
|
|
|
|
func SaveReadMarker(
|
2020-11-09 18:46:11 +00:00
|
|
|
req *http.Request,
|
2022-03-29 12:14:35 +00:00
|
|
|
userAPI api.UserInternalAPI, rsAPI roomserverAPI.RoomserverInternalAPI,
|
2020-10-09 08:15:35 +00:00
|
|
|
syncProducer *producers.SyncAPIProducer, device *api.Device, roomID string,
|
|
|
|
) util.JSONResponse {
|
|
|
|
// Verify that the user is a member of this room
|
|
|
|
resErr := checkMemberInRoom(req.Context(), rsAPI, device.UserID, roomID)
|
|
|
|
if resErr != nil {
|
|
|
|
return *resErr
|
|
|
|
}
|
|
|
|
|
2022-03-03 11:40:53 +00:00
|
|
|
var r eventutil.ReadMarkerJSON
|
2020-10-09 08:15:35 +00:00
|
|
|
resErr = httputil.UnmarshalJSONRequest(req, &r)
|
|
|
|
if resErr != nil {
|
|
|
|
return *resErr
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.FullyRead == "" {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
|
|
|
JSON: jsonerror.BadJSON("Missing m.fully_read mandatory field"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := json.Marshal(fullyReadEvent{EventID: r.FullyRead})
|
|
|
|
if err != nil {
|
|
|
|
return jsonerror.InternalServerError()
|
|
|
|
}
|
|
|
|
|
|
|
|
dataReq := api.InputAccountDataRequest{
|
|
|
|
UserID: device.UserID,
|
|
|
|
DataType: "m.fully_read",
|
|
|
|
RoomID: roomID,
|
|
|
|
AccountData: data,
|
|
|
|
}
|
|
|
|
dataRes := api.InputAccountDataResponse{}
|
|
|
|
if err := userAPI.InputAccountData(req.Context(), &dataReq, &dataRes); err != nil {
|
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("userAPI.InputAccountData failed")
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
|
2022-04-07 14:08:19 +00:00
|
|
|
if err := syncProducer.SendData(device.UserID, roomID, "m.fully_read", &r, nil); err != nil {
|
2020-10-09 08:15:35 +00:00
|
|
|
util.GetLogger(req.Context()).WithError(err).Error("syncProducer.SendData failed")
|
|
|
|
return jsonerror.InternalServerError()
|
|
|
|
}
|
|
|
|
|
2020-11-09 18:46:11 +00:00
|
|
|
// Handle the read receipt that may be included in the read marker
|
|
|
|
if r.Read != "" {
|
2022-03-29 12:14:35 +00:00
|
|
|
return SetReceipt(req, syncProducer, device, roomID, "m.read", r.Read)
|
2020-11-09 18:46:11 +00:00
|
|
|
}
|
2020-10-09 08:15:35 +00:00
|
|
|
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}
|