Compare commits

..

No commits in common. "276b7fecd7d28ed370368daca7c52d58e043d70e" and "6b39b3eb74631952c348aa3ef3361d1ecbb8def9" have entirely different histories.

27 changed files with 98 additions and 792 deletions

View file

@ -48,9 +48,6 @@
"room_alias_name": {
"type": "string"
},
"room_id": {
"type": "string"
},
"preset": {
"type": "RoomCreatePreset"
}

View file

@ -77,13 +77,13 @@ SignalHandler(int signal)
return;
}
UserNotifyAll(matrixArgs.db);
for (i = 0; i < ArraySize(httpServers); i++)
{
HttpServer *server = ArrayGet(httpServers, i);
/* TODO: Notify all users, so that the server doesn't have to
* await for a sync reply. */
UserNotifyAll(matrixArgs.db);
HttpServerStop(server);
}
break;

View file

@ -34,6 +34,7 @@
#include <Cytoplasm/Base64.h>
#include <Cytoplasm/Util.h>
#include <Cytoplasm/Str.h>
#include <Cytoplasm/Log.h>
#include <Cytoplasm/Db.h>
#include <Schema/RoomCreateRequest.h>
@ -53,15 +54,13 @@
#include "Room/internal.h"
static char *
GenerateRoomId(RoomCreateRequest *req, ServerPart s)
GenerateRoomId(ServerPart s)
{
CommonID cid;
char *string;
cid.sigil = '!';
cid.local = (req && req->room_id) ?
StrDuplicate(req->room_id) :
StrRandom(32);
cid.local = StrRandom(32);
cid.server = s;
string = ParserRecomposeCommonID(cid);
Free(cid.local);
@ -92,7 +91,7 @@ RoomCreate(Db * db, User *user, RoomCreateRequest * req, ServerPart s)
room->db = db;
room->creator.hostname = s.hostname ? StrDuplicate(s.hostname) : NULL;
room->creator.port = s.port ? StrDuplicate(s.port) : NULL;
room->id = GenerateRoomId(req, s);
room->id = GenerateRoomId(s);
room->version = version_num;
room->state_ref = DbCreate(db, 3, "rooms", room->id, "state");
@ -279,38 +278,7 @@ CreateSafeID(char *unsafe_id)
return safe_id;
}
HashMap *
RoomEventFetchRaw(Room *room, char *id)
{
char *safe_id;
HashMap *ret;
DbRef *event_ref;
if (!room || !id)
{
return NULL;
}
/* Let's try to locally find that event in our junk. */
safe_id = CreateSafeID(id);
event_ref = DbLockIntent(
room->db, DB_HINT_READONLY,
4, "rooms", room->id, "events", safe_id
);
if (!event_ref)
{
/* TODO: Fetch from another homeserver if possible. */
ret = NULL;
goto finish;
}
ret = JsonDuplicate(JsonValueAsObject(HashMapGet(DbJson(event_ref), "pdu")));
DbUnlock(room->db, event_ref);
finish:
Free(safe_id);
return ret;
}
HashMap *
RoomEventFetch(Room *room, char *id, bool prev)
RoomEventFetch(Room *room, char *id)
{
char *safe_id, *redactor;
HashMap *ret, *unsign;
@ -324,10 +292,7 @@ RoomEventFetch(Room *room, char *id, bool prev)
/* Let's try to locally find that event in our junk. */
safe_id = CreateSafeID(id);
event_ref = DbLockIntent(
room->db, DB_HINT_READONLY,
4, "rooms", room->id, "events", safe_id
);
event_ref = DbLock(room->db, 4, "rooms", room->id, "events", safe_id);
if (!event_ref)
{
/* TODO: Fetch from another homeserver if possible. */
@ -337,6 +302,7 @@ RoomEventFetch(Room *room, char *id, bool prev)
ret = JsonDuplicate(JsonValueAsObject(HashMapGet(DbJson(event_ref), "pdu")));
unsign = JsonValueAsObject(HashMapGet(ret, "unsigned"));
/* Overwrite a few unsigned properties on the fly. */
JsonValueFree(HashMapSet(
unsign,
@ -355,34 +321,12 @@ RoomEventFetch(Room *room, char *id, bool prev)
JsonValueInteger(UtilTsMillis() - ts)
));
if (prev)
{
redactor =
JsonValueAsString(HashMapGet(DbJson(event_ref), "redacted_by"));
redactor = JsonValueAsString(HashMapGet(DbJson(event_ref), "redacted_by"));
JsonValueFree(HashMapSet(
unsign,
"redacted_because",
JsonValueObject(RoomEventFetch(room, redactor, false))
JsonValueObject(RoomEventFetch(room, redactor))
));
}
if (prev && HashMapGet(ret, "state_key"))
{
char *prev_ev;
HashMap *prev_obj;
JsonValue *prev_content;
prev_ev =
JsonValueAsString(HashMapGet(DbJson(event_ref), "prev_event"));
prev_obj = RoomEventFetch(room, prev_ev, false);
prev_content = HashMapGet(prev_obj, "content");
JsonValueFree(HashMapSet(
unsign,
"prev_content",
JsonValueDuplicate(prev_content)
));
JsonFree(prev_obj);
}
DbUnlock(room->db, event_ref);
finish:
@ -618,7 +562,7 @@ RoomCanJoin(Room *room, char *user)
/* Check join_rules */
joinRule = RoomEventFetch(
room,
StateGet(state, "m.room.join_rules", ""), false
StateGet(state, "m.room.join_rules", "")
);
joinRuleV = JsonValueAsString(JsonGet(joinRule, 2, "content", "join_rule"));
@ -863,7 +807,6 @@ RoomEventClientify(HashMap *pdu)
CopyField("state_key",false);
CopyField("redacts", false);
CopyField("unsigned", false);
return event;

View file

@ -15,7 +15,7 @@ RoomStateGetID(Room * room, char *event_id)
return NULL;
}
event = RoomEventFetch(room, event_id, false);
event = RoomEventFetch(room, event_id);
if (!event)
{
return NULL;
@ -53,7 +53,7 @@ GetCurrentMembership(Room *room, State *s, char *mxid)
}
event_id = StateGet(state, "m.room.member", mxid);
event = RoomEventFetchRaw(room, event_id);
event = RoomEventFetch(room, event_id);
if (!s)
{
@ -94,7 +94,7 @@ RoomIsEventVisible(Room *room, User *user, char *eventId)
state = RoomStateGetID(room, eventId);
entryV = RoomEventFetchRaw(room,
entryV = RoomEventFetch(room,
StateGet(state, "m.room.history_visibility", "")
);
if (!(visibility = JsonValueAsString(
@ -148,7 +148,7 @@ RoomIsEventVisible(Room *room, User *user, char *eventId)
{ \
goto finish; \
} \
n = RoomEventFetchRaw(room, id_##n); \
n = RoomEventFetch(room, id_##n); \
if (!n) \
{ \
goto finish; \

View file

@ -48,14 +48,12 @@ RoomAuthoriseEventV1(Room * room, PduV1 pdu, State *state, char **errp)
int64_t pdu_pl = RoomUserPL(room, state, pdu.sender);
int64_t event_pl = RoomMinPL(room,state, "events", pdu.type);
/* Step 1: If m.room.create */
if (StrEquals(pdu.type, "m.room.create"))
{
return AuthoriseCreateV1(pdu, errp);
}
/* Step 2: Considering the event's auth_events.
* TODO: This is slow. */
/* Step 2: Considering the event's auth_events. */
if (!ConsiderAuthEventsV1(room, pdu, errp))
{
return false;
@ -65,7 +63,6 @@ RoomAuthoriseEventV1(Room * room, PduV1 pdu, State *state, char **errp)
* has the property m.federate set to false, and the sender domain of
* the event does not match the sender domain of the create event,
* reject.
* TODO: This is slow.
*/
create_event_id = StateGet(state, "m.room.create", "");
if (!state || !create_event_id)
@ -78,7 +75,7 @@ RoomAuthoriseEventV1(Room * room, PduV1 pdu, State *state, char **errp)
}
return false;
}
create_event = RoomEventFetchRaw(room, create_event_id);
create_event = RoomEventFetch(room, create_event_id);
federate = JsonGet(create_event, 2, "content", "m.federate");
if (JsonValueType(federate) == JSON_BOOLEAN)
{
@ -160,20 +157,6 @@ RoomAuthoriseEventV1(Room * room, PduV1 pdu, State *state, char **errp)
return true;
}
if (StrEquals(create_event_id, pdu.redacts))
{
/* This is _not_ spec behaviour. As such, I _need_ to document
* this oddity. Apparently, up until v11 came along, a user could
* redact a creation event. Freely. Without complaining. Of course,
* this breaks the room.
*
* As such, I have made the room to NOT redact creation events.
* Diverges that could be caused by this is, in my opinion low,
* and all other servers that completely listen to the spec will
* be broken. */
return false;
}
/* Step 11.2: If the domain of the event_id of the event being
* redacted is the same as the domain of the event_id of the
* m.room.redaction, allow. */

View file

@ -94,7 +94,7 @@ ConsiderAuthEventsV1(Room * room, PduV1 pdu, char **errp)
for (i = 0; i < ArraySize(pdu.auth_events); i++)
{
char *event_id = JsonValueAsString(ArrayGet(pdu.auth_events, i));
HashMap *event = RoomEventFetchRaw(room, event_id);
HashMap *event = RoomEventFetch(room, event_id);
PduV1 auth_pdu = { 0 };
char *key_type_id;

View file

@ -79,7 +79,7 @@ AuthorizeInviteMembershipV1(Room * room, PduV1 pdu, State *state, char **errp)
}
return false;
}
third_pi_event = RoomEventFetchRaw(room, third_pi_id);
third_pi_event = RoomEventFetch(room, third_pi_id);
/* Step 5.3.1.6: If sender does not match sender of the
* m.room.third_party_invite, reject. */
@ -256,7 +256,7 @@ AuthorizeJoinMembershipV1(Room * room, PduV1 pdu, State *state, char **errp)
{
/* Interperet prev properly, as a list of JsonObjects. */
char *prev_id = JsonValueAsString(ArrayGet(prev, 0));
HashMap *prev_event = RoomEventFetchRaw(room, prev_id);
HashMap *prev_event = RoomEventFetch(room, prev_id);
bool flag = false;
if (prev_event)

View file

@ -71,7 +71,7 @@ AuthorisePowerLevelsV1(Room * room, PduV1 pdu, State *state)
/* Step 10.3: For the properties users_default, events_default,
* state_default, ban, redact, kick, invite, check if they were
* added, changed or removed. For each found alteration: */
prev_plevent = RoomEventFetchRaw(room, prev_pl_id);
prev_plevent = RoomEventFetch(room, prev_pl_id);
#define CheckChange(prop) do \
{ \
JsonValue *old = \

View file

@ -122,7 +122,7 @@ RedactPDU1(HashMap *obj)
if (!StrEquals(key, "event_id") && !StrEquals(key, "type") &&
!StrEquals(key, "room_id") && !StrEquals(key, "sender") &&
!StrEquals(key, "state_key")&& !StrEquals(key, "content") &&
!StrEquals(key, "hashes") && !StrEquals(key, "signatures") &&
!StrEquals(key, "hashes") && !StrEquals(key, "signature") &&
!StrEquals(key, "depth") && !StrEquals(key, "prev_events") &&
!StrEquals(key, "auth_events")&& !StrEquals(key, "origin") &&
!StrEquals(key, "unsigned") &&
@ -204,9 +204,8 @@ RoomAddEventV1(Room *room, PduV1 pdu, PduV1Status status)
DbRef *event_ref;
Array *prev_events = NULL, *leaves = NULL;
HashMap *leaves_json = NULL, *pdu_json = NULL;
State *prev_state = NULL;
JsonValue *leaves_val;
char *safe_id, *prev_id;
char *safe_id;
size_t i;
if (!room || room->version >= 3 ||
@ -219,9 +218,6 @@ RoomAddEventV1(Room *room, PduV1 pdu, PduV1Status status)
safe_id = CreateSafeID(pdu.event_id);
event_ref = DbCreate(room->db, 4, "rooms", room->id, "events", safe_id);
pdu_json = PduV1ToJson(&pdu);
prev_state = StateResolve(room, pdu_json);
prev_id = StrDuplicate(StateGet(prev_state, pdu.type, pdu.state_key));
StateFree(prev_state);
/* TODO: Use those values concretely. */
pdu._unsigned.pdu_status = status;
@ -232,11 +228,6 @@ RoomAddEventV1(Room *room, PduV1 pdu, PduV1Status status)
JsonValueString(PduV1StatusToStr(status)),
1, "status"
);
JsonSet(
DbJson(event_ref),
JsonValueString(prev_id),
1, "prev_event"
);
JsonSet(
DbJson(event_ref),
JsonValueArray(ArrayCreate()),
@ -245,7 +236,6 @@ RoomAddEventV1(Room *room, PduV1 pdu, PduV1Status status)
DbUnlock(room->db, event_ref);
Free(safe_id);
Free(prev_id);
/* Only accepted PDUs get to do the news */
if (status == PDUV1_STATUS_ACCEPTED)
@ -327,20 +317,13 @@ RoomAddEventV1(Room *room, PduV1 pdu, PduV1Status status)
JsonValueAsObject(HashMapGet(pdu.content, "m.relates_to"));
Relation rel = { 0 };
State *state;
char *type, *state_key, *event_id, *errp = NULL;
char *type, *state_key, *event_id;
pdu_json = PduV1ToJson(&pdu);
/* If we have a membership change, then add it to the
* proper table. */
{
CommonID *id = UserIdParse(pdu.sender, NULL);
User *user = UserLockID(room->db, id);
UserPushEvent(user, pdu_json);
UserUnlock(user);
UserIdFree(id);
}
if (relates_to && RelationFromJson(relates_to, &rel, &errp))
if (relates_to && RelationFromJson(relates_to, &rel, NULL))
{
DbRef *relate = DbLock(
room->db,
@ -409,7 +392,7 @@ RoomAddEventV1(Room *room, PduV1 pdu, PduV1Status status)
);
JsonValueFree(HashMapSet(
DbJson(eventRef),
"redacted_by", JsonValueString(pdu.event_id)
"redacted_by", JsonValueString(pdu.redacts)
));
DbUnlock(room->db, eventRef);
}

View file

@ -54,7 +54,6 @@ RouterBuild(void)
R("/_matrix/client/v3/auth/(.*)/fallback/web", RouteUiaFallback);
R("/_matrix/client/v3/capabilities", RouteCapabilities);
R("/_matrix/client/v3/devices", RouteDevices);
R("/_matrix/client/v3/login", RouteLogin);
R("/_matrix/client/v3/logout", RouteLogout);
R("/_matrix/client/v3/logout/(all)", RouteLogout);
@ -77,7 +76,6 @@ RouterBuild(void)
R("/_matrix/client/v3/user/(.*)/filter", RouteFilter);
R("/_matrix/client/v3/user/(.*)/filter/(.*)", RouteFilter);
R("/_matrix/client/v3/user/(.*)/account_data/(.*)", RouteLocalData);
R("/_matrix/client/v3/rooms/(.*)/send/(.*)/(.*)", RouteSendEvent);
R("/_matrix/client/v3/rooms/(.*)/redact/(.*)/(.*)", RouteRedact);
@ -103,7 +101,6 @@ RouterBuild(void)
/* Spoofed endpoints, to be TODO'd */
R("/_matrix/client/v3/keys/(query|upload)", RouteKeyQuery);
R("/_matrix/client/v3/pushrules", RoutePushrules);
R("/_matrix/federation/v1/hierarchy/(.*)", RouteHierarchy);
/* Telodendria Admin API Routes */

View file

@ -84,12 +84,12 @@ ROUTE_IMPL(RouteAliasDirectory, path, argp)
switch (HttpRequestMethodGet(args->context))
{
case HTTP_GET:
val = JsonGet(aliases, 2, "aliases", alias);
val = JsonGet(aliases, 2, "alias", alias);
if (val)
{
response = HashMapCreate();
HashMapSet(response, "room_id", JsonValueDuplicate(HashMapGet(JsonValueAsObject(val), "id")));
HashMapSet(response, "servers", JsonValueDuplicate(JsonGet(aliases, 3, "aliases", alias, "servers")));
HashMapSet(response, "servers", JsonValueDuplicate(JsonGet(aliases, 3, "alias", alias, "servers")));
}
else
{

View file

@ -99,13 +99,6 @@ ROUTE_IMPL(RouteCreateRoom, path, argp)
response = MatrixErrorCreate(M_BAD_JSON, err);
goto finish;
}
if (parsed.room_id && !(UserGetPrivileges(user) & USER_ALIAS))
{
err = "Custom room ID used without ALIAS privileges.";
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_UNAUTHORIZED, err);
goto finish;
}
/* No longer need this now that it is parsed */
JsonFree(request);

View file

@ -1,105 +0,0 @@
/*
* Copyright (C) 2022-2024 Jordan Bancino <@jordan:bancino.net> with
* other valuable contributors. See CONTRIBUTORS.txt for the full list.
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation files
* (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <Routes.h>
#include <string.h>
#include <Cytoplasm/Json.h>
#include <Cytoplasm/HashMap.h>
#include <Cytoplasm/Str.h>
#include <Cytoplasm/Memory.h>
#include <User.h>
ROUTE_IMPL(RouteDevices, path, argp)
{
RouteArgs *args = argp;
HashMap *response = NULL;
HashMap *devices;
char *tokenstr, *deviceID;
JsonValue *deviceVal;
char *msg;
size_t i = 0;
Array *responseDevices;
Db *db = args->matrixArgs->db;
User *user;
if (HttpRequestMethodGet(args->context) != HTTP_GET)
{
msg = "This route only accepts GET.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
return MatrixErrorCreate(M_UNRECOGNIZED, msg);
}
response = MatrixGetAccessToken(args->context, &tokenstr);
if (response)
{
return response;
}
user = UserAuthenticate(db, tokenstr);
if (!user)
{
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
return MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
}
if (!(devices = UserGetDevices(user)))
{
msg = "Couldn't get user's devices. This is not right.";
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
response = MatrixErrorCreate(M_UNKNOWN, NULL);
goto finish;
}
response = HashMapCreate();
HashMapSet(response,
"devices", JsonValueArray((responseDevices = ArrayCreate()))
);
i = 0;
while (HashMapIterateReentrant(devices, &deviceID, (void **) &deviceVal, &i))
{
HashMap *deviceInfo = HashMapCreate();
HashMap *deviceObj = JsonValueAsObject(deviceVal);
JsonValue *potentialDisplay = HashMapGet(deviceObj, "displayName");
HashMapSet(deviceInfo, "device_id", JsonValueString(deviceID));
HashMapSet(deviceInfo, "display_name", JsonValueDuplicate(potentialDisplay));
/* TODO: As of now, Telodendria does not store enough information to figure out
* last timestamp and IP address. */
ArrayAdd(responseDevices, JsonValueObject(deviceInfo));
}
/* We do not need to free the device object as it lives with the user */
finish:
UserUnlock(user);
(void) path;
return response;
}

View file

@ -106,7 +106,7 @@ ROUTE_IMPL(RouteFetchEvent, path, argp)
response = MatrixErrorCreate(M_FORBIDDEN, err);
goto finish;
}
event = RoomEventFetch(room, eventId, true);
event = RoomEventFetch(room, eventId);
response = RoomEventClientify(event);
JsonFree(event);

View file

@ -1,84 +0,0 @@
/*
* Copyright (C) 2022-2024 Jordan Bancino <@jordan:bancino.net> with
* other valuable contributors. See CONTRIBUTORS.txt for the full list.
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation files
* (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <Cytoplasm/HttpServer.h>
#include <Routes.h>
#include <Cytoplasm/HashMap.h>
#include <Cytoplasm/Memory.h>
#include <Cytoplasm/Json.h>
#include <Cytoplasm/Str.h>
#include <User.h>
#include <Room.h>
#include <string.h>
#include <Schema/Filter.h>
ROUTE_IMPL(RouteHierarchy, path, argp)
{
RouteArgs *args = argp;
Db *db = args->matrixArgs->db;
HashMap *request = NULL;
HashMap *response = NULL;
User *user = NULL;
char *token = NULL;
char *err;
if (HttpRequestMethodGet(args->context) != HTTP_GET)
{
err = "Unknown request method.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_UNRECOGNIZED, err);
goto finish;
}
response = MatrixGetAccessToken(args->context, &token);
if (response)
{
goto finish;
}
user = UserAuthenticate(db, token);
if (!user)
{
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
goto finish;
}
response = HashMapCreate();
HashMapSet(response, "children", JsonValueArray(ArrayCreate()));
HashMapSet(response, "inaccessible_children", JsonValueArray(ArrayCreate()));
HashMapSet(response, "room", JsonValueObject(HashMapCreate()));
(void) path;
finish:
JsonFree(request);
UserUnlock(user);
return response;
}

View file

@ -1,88 +0,0 @@
/*
* Copyright (C) 2022-2024 Jordan Bancino <@jordan:bancino.net> with
* other valuable contributors. See CONTRIBUTORS.txt for the full list.
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation files
* (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <Cytoplasm/HttpServer.h>
#include <Routes.h>
#include <Cytoplasm/HashMap.h>
#include <Cytoplasm/Memory.h>
#include <Cytoplasm/Json.h>
#include <Cytoplasm/Str.h>
#include <User.h>
#include <Room.h>
#include <string.h>
#include <Schema/Filter.h>
ROUTE_IMPL(RouteKeyQuery, path, argp)
{
RouteArgs *args = argp;
Db *db = args->matrixArgs->db;
HashMap *request = NULL;
HashMap *response = NULL;
User *user = NULL;
char *token = NULL;
char *err;
if (HttpRequestMethodGet(args->context) != HTTP_POST)
{
err = "Unknown request method.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_UNRECOGNIZED, err);
goto finish;
}
response = MatrixGetAccessToken(args->context, &token);
if (response)
{
goto finish;
}
user = UserAuthenticate(db, token);
if (!user)
{
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
goto finish;
}
request = JsonDecode(HttpServerStream(args->context));
if (!request)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_NOT_JSON, NULL);
goto finish;
}
response = HashMapCreate();
(void) path;
finish:
JsonFree(request);
UserUnlock(user);
return response;
}

View file

@ -1,158 +0,0 @@
/*
* Copyright (C) 2022-2024 Jordan Bancino <@jordan:bancino.net> with
* other valuable contributors. See CONTRIBUTORS.txt for the full list.
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation files
* (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#include <Routes.h>
#include <Cytoplasm/HashMap.h>
#include <Cytoplasm/Memory.h>
#include <Cytoplasm/Json.h>
#include <Cytoplasm/Str.h>
#include <string.h>
#include <Config.h>
#include <User.h>
#include <Schema/Filter.h>
ROUTE_IMPL(RouteLocalData, path, argp)
{
RouteArgs *args = argp;
Db *db = args->matrixArgs->db;
HashMap *request = NULL;
HashMap *response = NULL;
User *user = NULL;
CommonID *id = NULL;
char *token = NULL;
char *serverName = NULL;
char *userParam = ArrayGet(path, 0);
char *dataKey = ArrayGet(path, 1);
char *msg;
if (!userParam || !dataKey)
{
/* Should be impossible */
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
return MatrixErrorCreate(M_UNKNOWN, NULL);
}
serverName = ConfigGetServerName(db);
if (!serverName)
{
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
response = MatrixErrorCreate(M_UNKNOWN, NULL);
goto finish;
}
id = UserIdParse(userParam, serverName);
if (!id)
{
msg = "Invalid user ID.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_INVALID_PARAM, msg);
goto finish;
}
if (!ParserServerNameEquals(id->server, serverName))
{
msg = "Cannot use /filter for non-local users.";
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_UNAUTHORIZED, msg);
goto finish;
}
response = MatrixGetAccessToken(args->context, &token);
if (response)
{
goto finish;
}
user = UserAuthenticate(db, token);
if (!user)
{
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
goto finish;
}
if (!StrEquals(id->local, UserGetName(user)))
{
msg = "Unauthorized to use /account_data.";
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_INVALID_PARAM, msg);
goto finish;
}
switch (HttpRequestMethodGet(args->context))
{
case HTTP_GET:
{
HashMap *accountData = UserGetAccountData(user, dataKey);
if (!accountData)
{
msg = "Couldn't find account data.";
HttpResponseStatus(args->context, HTTP_NOT_FOUND);
response = MatrixErrorCreate(M_NOT_FOUND, msg);
goto finish;
}
response = accountData;
}; break;
case HTTP_PUT:
{
if (StrEquals(dataKey, "m.fully_read"))
{
msg = "Cannot use protected data key.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_BAD_JSON, msg);
goto finish;
}
request = JsonDecode(HttpServerStream(args->context));
if (!request)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_NOT_JSON, NULL);
goto finish;
}
UserSetAccountData(user, dataKey, request);
response = HashMapCreate();
}; break;
default:
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_UNRECOGNIZED, NULL);
break;
}
finish:
Free(serverName);
UserIdFree(id);
UserUnlock(user);
JsonFree(request);
return response;
}

View file

@ -146,7 +146,7 @@ ROUTE_IMPL(RouteMembers, path, argp)
continue;
}
if (IsAllowed((event = RoomEventFetch(room, entry, true)), params))
if (IsAllowed((event = RoomEventFetch(room, entry)), params))
{
ArrayAdd(batch, JsonValueObject(event));
event = NULL;

View file

@ -77,3 +77,53 @@ finish:
UserUnlock(user);
return response;
}
ROUTE_IMPL(RouteKeyQuery, path, argp)
{
RouteArgs *args = argp;
Db *db = args->matrixArgs->db;
HashMap *request = NULL;
HashMap *response = NULL;
User *user = NULL;
char *token = NULL;
char *err;
if (HttpRequestMethodGet(args->context) != HTTP_POST)
{
err = "Unknown request method.";
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_UNRECOGNIZED, err);
goto finish;
}
response = MatrixGetAccessToken(args->context, &token);
if (response)
{
goto finish;
}
user = UserAuthenticate(db, token);
if (!user)
{
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
goto finish;
}
request = JsonDecode(HttpServerStream(args->context));
if (!request)
{
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
response = MatrixErrorCreate(M_NOT_JSON, NULL);
goto finish;
}
response = HashMapCreate();
(void) path;
finish:
JsonFree(request);
UserUnlock(user);
return response;
}

View file

@ -225,9 +225,7 @@ ROUTE_IMPL(RouteSendState, path, argp)
}
state = StateCurrent(room);
event = RoomEventFetch(
room, StateGet(state, eventType, stateKey), true
);
event = RoomEventFetch(room, StateGet(state, eventType, stateKey));
if (!event)
{
err = "Event could not be found.";
@ -273,7 +271,6 @@ ROUTE_IMPL(RouteSendState, path, argp)
if (!filled)
{
Log(LOG_ERR, "%s", err);
HttpResponseStatus(args->context, HTTP_UNAUTHORIZED);
response = MatrixErrorCreate(M_FORBIDDEN, err);
goto finish;

View file

@ -70,7 +70,6 @@ ROUTE_IMPL(RouteSync, path, argp)
SyncResponse sync = { 0 };
Filter *filterData = NULL;
Array *accountData;
Array *invites;
Array *joins;
size_t i;
@ -150,20 +149,6 @@ ROUTE_IMPL(RouteSync, path, argp)
* a hashmap of unknown keys pointing to a known type. */
sync.rooms.invite = HashMapCreate();
sync.rooms.join = HashMapCreate();
sync.account_data.events = ArrayCreate();
/* account data */
accountData = UserGetAccountDataSync(user, currBatch);
for (i = 0; i < ArraySize(accountData); i++)
{
char *key = ArrayGet(accountData, i);
Event *event = Malloc(sizeof(*event));
event->type = StrDuplicate(key);
event->content = UserGetAccountData(user, key);
ArrayAdd(sync.account_data.events, event);
}
UserFreeList(accountData);
/* invites */
invites = UserGetInvites(user, currBatch);
@ -216,7 +201,7 @@ ROUTE_IMPL(RouteSync, path, argp)
for (j = 0; j < ArraySize(el); j++)
{
char *event = ArrayGet(el, j);
HashMap *eventObj = RoomEventFetch(r, event, true);
HashMap *eventObj = RoomEventFetch(r, event);
HashMap *filteredObj = FilterApply(filterData, eventObj);
if (filteredObj)
@ -244,7 +229,7 @@ ROUTE_IMPL(RouteSync, path, argp)
joined->state.events = ArrayCreate();
while (StateIterate(state, &type, &key, (void **) &id))
{
HashMap *e = RoomEventFetch(r, id, true);
HashMap *e = RoomEventFetch(r, id);
StrippedStateEvent rs = StripStateEventSync(e);
StrippedStateEvent *s = Malloc(sizeof(*s));
memcpy(s, &rs, sizeof(*s));
@ -266,9 +251,9 @@ ROUTE_IMPL(RouteSync, path, argp)
if (prevBatch)
{
/* TODO: Should we be dropping syncs? */
UserDropSync(user, prevBatch);
nextBatch = UserInitSyncDiff(user);
UserFillSyncDiff(user, nextBatch);
}
sync.next_batch = nextBatch;
response = SyncResponseToJson(&sync);

View file

@ -153,7 +153,7 @@ BuildBaseAndConflictV1(Room *room, Array *states, State *R, HashMap *conflicts)
{
arr = ArrayCreate();
}
hm = RoomEventFetch(room, event_id, false);
hm = RoomEventFetch(room, event_id);
ArrayAdd(arr, hm);
HashMapSet(conflicts, tuple, arr);
}
@ -367,10 +367,6 @@ StateResolve(Room * room, HashMap * event)
db = RoomGetDB(room);
room_id = JsonValueAsString(HashMapGet(event, "room_id"));
event_id = JsonValueAsString(HashMapGet(event, "event_id"));
if (!room_id || !event_id)
{
return NULL;
}
if (DbExists(db, 4, "rooms", room_id, "state", event_id))
{
DbRef *ref = DbLock(db, 4,
@ -397,10 +393,8 @@ StateResolve(Room * room, HashMap * event)
for (i = 0; i < ArraySize(prevEvents); i++)
{
HashMap *prevEvent = RoomEventFetch(
room, JsonValueAsString(ArrayGet(prevEvents, i)),
false
);
HashMap *prevEvent =
RoomEventFetch(room, JsonValueAsString(ArrayGet(prevEvents, i)));
State *state = StateResolve(room, prevEvent);
if (HashMapGet(prevEvent, "state_key") && !IsRejected(prevEvent))

View file

@ -1249,7 +1249,6 @@ UserInitSyncDiff(User *user)
HashMapSet(data, "nextBatch", JsonValueString(nextBatch));
HashMapSet(data, "invites", JsonValueArray(ArrayCreate()));
HashMapSet(data, "account_data", JsonValueObject(HashMapCreate()));
HashMapSet(data, "leaves", JsonValueArray(ArrayCreate()));
HashMapSet(data, "joins", JsonValueObject(HashMapCreate()));
@ -1289,45 +1288,6 @@ UserPushInviteSync(User *user, char *roomId)
UserNotifyUser(user->name);
}
void
UserPushAccountData(User *user, char *key)
{
DbRef *syncRef;
HashMap *data;
Array *entries;
HashMap *join;
size_t i;
if (!user || !key)
{
return;
}
entries = DbList(user->db, 3, "users", user->name, "sync");
for (i = 0; i < ArraySize(entries); i++)
{
char *entry = ArrayGet(entries, i);
HashMap *accountEntry;
syncRef = DbLock(user->db, 4, "users", user->name, "sync", entry);
data = DbJson(syncRef);
join = JsonValueAsObject(HashMapGet(data, "account_data"));
/* TODO */
if (!HashMapGet(join, key))
{
accountEntry = HashMapCreate();
JsonValueFree(HashMapSet(join,
key, JsonValueObject(accountEntry)
));
Log(LOG_INFO, "user=%s's batch=%s", user->name, entry);
}
DbUnlock(user->db, syncRef);
}
DbListFree(entries);
Log(LOG_INFO, "You have notified the '%s' about key=%s", user->name, key);
UserNotifyUser(user->name);
}
void
UserPushJoinSync(User *user, char *roomId)
{
DbRef *syncRef;
@ -1453,7 +1413,7 @@ UserGetInvites(User *user, char *batch)
void
UserFillSyncDiff(User *user, char *batch)
{
Array *joins, *data;
Array *joins;
size_t i;
DbRef *syncRef;
if (!user || !batch)
@ -1461,8 +1421,6 @@ UserFillSyncDiff(User *user, char *batch)
return;
}
Log(LOG_WARNING, "This is an initial sync.");
joins = UserListJoins(user);
syncRef = DbLock(
user->db, 4, "users", user->name, "sync", batch
@ -1501,58 +1459,9 @@ UserFillSyncDiff(User *user, char *batch)
}
}
UserFreeList(joins);
data = DbList(user->db, 3, "users", user->name, "data");
for (i = 0; i < ArraySize(data); i++)
{
char *id = ArrayGet(data, i);
DbRef *ref = DbLock(user->db, 4, "users", user->name, "data", id);
char *key = JsonValueAsString(HashMapGet(DbJson(ref), "key"));
HashMap *obj = DbJson(syncRef);
HashMap *aData = JsonValueAsObject(HashMapGet(obj, "account_data"));
JsonValueFree(HashMapSet(aData,
key, JsonValueObject(HashMapCreate())
));
DbUnlock(user->db, ref);
}
DbListFree(data);
DbUnlock(user->db, syncRef);
}
Array *
UserGetAccountDataSync(User *user, char *batch)
{
Db *db;
DbRef *syncRef;
HashMap *data;
Array *keys;
size_t i;
if (!user || !batch)
{
return NULL;
}
db = user->db;
syncRef = DbLock(db, 4, "users", user->name, "sync", batch);
if (!syncRef)
{
return NULL;
}
data = DbJson(syncRef);
keys = HashMapKeys(JsonValueAsObject(HashMapGet(data, "account_data")));
for (i = 0; i < ArraySize(keys); i++)
{
char *str = ArrayGet(keys, i);
ArraySet(keys, i, StrDuplicate(str));
}
DbUnlock(db, syncRef);
return keys;
}
Array *
UserGetJoins(User *user, char *batch)
{
Db *db;
@ -1738,7 +1647,7 @@ UserFetchMessages(User *user, int n, char *token, char **next)
for (i = 0; i < (size_t) n && ArraySize(nexts); i++)
{
char *curr = ArrayDelete(nexts, ArraySize(nexts) - 1);
HashMap *event = RoomEventFetch(room, curr, true);
HashMap *event = RoomEventFetch(room, curr);
Array *prevEvents;
size_t j;
bool toFree = true;
@ -1863,7 +1772,7 @@ UserIsSyncOld(User *user, char *token)
dt = UtilTsMillis() - JsonValueAsInteger(HashMapGet(map, "creation"));
DbUnlock(user->db, ref);
return dt > (3 * 24 * 60 * 60 * 1000); /* Three days of timeout. */
return dt > (5 * 60 * 1000); /* 5-minutes of timeout. */
}
bool
UserSyncExists(User *user, char *sync)
@ -2105,56 +2014,3 @@ UserNotifyAll(Db *db)
}
DbListFree(list);
}
HashMap *
UserGetAccountData(User *user, char *key)
{
DbRef *ref;
HashMap *ret;
if (!user || !key)
{
return NULL;
}
ref = DbLockIntent(user->db, DB_HINT_READONLY,
4, "users", user->name, "data", key
);
if (!ref)
{
return NULL;
}
ret = JsonDuplicate(JsonValueAsObject(HashMapGet(DbJson(ref), "content")));
DbUnlock(user->db, ref);
return ret;
}
void
UserSetAccountData(User *user, char *key, HashMap *obj)
{
DbRef *ref;
if (!user || !key || !obj)
{
return;
}
ref = DbLock(user->db,
4, "users", user->name, "data", key
);
if (!ref)
{
ref = DbCreate(user->db,
4, "users", user->name, "data", key
);
}
if (!ref)
{
return;
}
JsonValueFree(HashMapSet(DbJson(ref), "content", JsonValueObject(JsonDuplicate(obj))));
JsonValueFree(HashMapSet(DbJson(ref), "key", JsonValueString(key)));
DbUnlock(user->db, ref);
UserPushAccountData(user, key);
}

View file

@ -154,18 +154,9 @@ extern bool RoomIsEventVisible(Room *, User *, char *);
* Fetch a single event's PDU in a room into an
* hashmap, given an event ID, from the database
* if possible, or otherwise fetched from a remote
* homeserver participating in the room. If the boolean
* value is set, then the prev_content is set.
* homeserver participating in the room.
*/
extern HashMap * RoomEventFetch(Room *, char *, bool);
/**
* Behaves like
* .Fn RoomEventFetch ,
* but avoids doing any postprocessing.
*/
extern HashMap * RoomEventFetchRaw(Room *, char *);
extern HashMap * RoomEventFetch(Room *, char *);
/**
* Strips all the fields not required in a

View file

@ -77,7 +77,6 @@ ROUTE(RouteVersions);
ROUTE(RouteWellKnown);
ROUTE(RouteCapabilities);
ROUTE(RouteDevices);
ROUTE(RouteLogin);
ROUTE(RouteLogout);
ROUTE(RouteRegister);
@ -96,7 +95,6 @@ ROUTE(RouteStaticLogin);
ROUTE(RouteStaticResources);
ROUTE(RouteFilter);
ROUTE(RouteLocalData);
ROUTE(RouteProcControl);
ROUTE(RouteConfig);
@ -124,7 +122,6 @@ ROUTE(RouteAdminTokens);
ROUTE(RouteKeyQuery);
ROUTE(RoutePushrules);
ROUTE(RouteHierarchy);
#undef ROUTE
#endif

View file

@ -67,7 +67,7 @@ typedef enum UserPrivileges
USER_PROC_CONTROL = (1 << 4),
USER_ALIAS = (1 << 5),
USER_APPSERVICE = (1 << 6),
USER_ALL = ((1 << 7) - 1),
USER_ALL = ((1 << 7) - 1)
} UserPrivileges;
/**
@ -397,12 +397,6 @@ extern void UserPushJoinSync(User *, char *);
*/
extern void UserPushEvent(User *, HashMap *);
/**
* Pushes a global account data key into every diff table
* of a user.
*/
extern void UserPushAccountData(User *, char *);
/**
* Shows the invite list(as a room ID table) for an user
* and a specified diff table, to be freed by
@ -410,13 +404,6 @@ extern void UserPushAccountData(User *, char *);
*/
extern Array * UserGetInvites(User *, char *);
/**
* Shows the global account data list for an user
* and a specified diff table, to be freed by
* .Fn UserFreeList .
*/
extern Array * UserGetAccountDataSync(User *, char *);
/**
* Shows a list of rooms for an user and a specified diff
@ -425,7 +412,6 @@ extern Array * UserGetAccountDataSync(User *, char *);
*/
extern Array * UserGetJoins(User *, char *);
/**
* Get a list of event IDs for a diff table(and room ID),
* to be freed by
@ -511,15 +497,4 @@ extern bool UserAwaitNotification(char *, int);
* .Fn UserInitialisePushTable .
*/
extern void UserDestroyPushTable(void);
/**
* Returns a user's account data by key into a JSON object living
* on the heap.
*/
extern HashMap * UserGetAccountData(User *, char *);
/**
* Replaces an account data entry.
*/
extern void UserSetAccountData(User *, char *, HashMap *);
#endif /* TELODENDRIA_USER_H */