forked from Telodendria/Telodendria

I'll need to be able to "propagate" a user ref as much as possible/be able to lock a user for read-only operations(as DB intents now allow)
237 lines
7.8 KiB
C
237 lines
7.8 KiB
C
/*
|
|
* Copyright (C) 2022-2024 Jordan Bancino <@jordan:bancino.net> with
|
|
* other valuable contributors. See CONTRIBUTORS.txt for the full list.
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person
|
|
* obtaining a copy of this software and associated documentation files
|
|
* (the "Software"), to deal in the Software without restriction,
|
|
* including without limitation the rights to use, copy, modify, merge,
|
|
* publish, distribute, sublicense, and/or sell copies of the Software,
|
|
* and to permit persons to whom the Software is furnished to do so,
|
|
* subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be
|
|
* included in all copies or portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
* SOFTWARE.
|
|
*/
|
|
#include <Routes.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <Cytoplasm/HashMap.h>
|
|
#include <Cytoplasm/Memory.h>
|
|
#include <Cytoplasm/Json.h>
|
|
#include <Cytoplasm/Str.h>
|
|
|
|
#include <Config.h>
|
|
#include <User.h>
|
|
#include <Room.h>
|
|
|
|
static void
|
|
SendMembership(Db *db, User *user)
|
|
{
|
|
char *displayname = UserGetProfile(user, "displayname");
|
|
char *avatar_url = UserGetProfile(user, "avatar_url");
|
|
Array *joins = UserListJoins(user);
|
|
size_t i;
|
|
|
|
char *server_name = ConfigGetServerName(db);
|
|
|
|
CommonID *user_id = UserIdParse(UserGetName(user), server_name);
|
|
char *sender = ParserRecomposeCommonID(*user_id);
|
|
Free(server_name);
|
|
|
|
for (i = 0; i < ArraySize(joins); i++)
|
|
{
|
|
char *room_id = ArrayGet(joins, i);
|
|
Room *room = RoomLock(db, room_id);
|
|
HashMap *content = HashMapCreate();
|
|
HashMap *membership = RoomEventCreate(
|
|
sender, "m.room.member", sender,
|
|
content
|
|
);
|
|
|
|
HashMapSet(content, "membership", JsonValueString("join"));
|
|
HashMapSet(content, "displayname", JsonValueString(displayname));
|
|
HashMapSet(content, "avatar_url", JsonValueString(avatar_url));
|
|
|
|
JsonFree(RoomEventSend(room, membership, NULL));
|
|
JsonFree(membership);
|
|
|
|
RoomUnlock(room);
|
|
}
|
|
|
|
UserFreeList(joins);
|
|
UserIdFree(user_id);
|
|
Free(sender);
|
|
}
|
|
|
|
ROUTE_IMPL(RouteUserProfile, path, argp)
|
|
{
|
|
RouteArgs *args = argp;
|
|
Db *db = args->matrixArgs->db;
|
|
|
|
HashMap *request = NULL;
|
|
HashMap *response = NULL;
|
|
|
|
CommonID *userId = NULL;
|
|
User *user = NULL;
|
|
|
|
char *serverName;
|
|
char *username = NULL;
|
|
char *entry = NULL;
|
|
char *token = NULL;
|
|
char *value = NULL;
|
|
|
|
char *msg;
|
|
|
|
Config config;
|
|
|
|
ConfigLock(db, &config);
|
|
|
|
if (!config.ok)
|
|
{
|
|
Log(LOG_ERR, "%s", config.err);
|
|
HttpResponseStatus(args->context, HTTP_INTERNAL_SERVER_ERROR);
|
|
return MatrixErrorCreate(M_UNKNOWN, config.err);
|
|
}
|
|
|
|
serverName = config.serverName;
|
|
|
|
username = ArrayGet(path, 0);
|
|
userId = UserIdParse(username, serverName);
|
|
if (!userId)
|
|
{
|
|
msg = "Invalid user ID.";
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_INVALID_PARAM, msg);
|
|
goto finish;
|
|
}
|
|
if (!ParserServerNameEquals(userId->server, serverName))
|
|
{
|
|
/* TODO: Implement lookup over federation. */
|
|
msg = "User profile endpoint currently doesn't support lookup over "
|
|
"federation.";
|
|
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
|
|
response = MatrixErrorCreate(M_FORBIDDEN, msg);
|
|
goto finish;
|
|
}
|
|
|
|
/* TODO: Actually implement user data */
|
|
switch (HttpRequestMethodGet(args->context))
|
|
{
|
|
case HTTP_GET:
|
|
user = UserLock(db, userId->local);
|
|
if (!user)
|
|
{
|
|
msg = "Couldn't lock user.";
|
|
HttpResponseStatus(args->context, HTTP_NOT_FOUND);
|
|
response = MatrixErrorCreate(M_NOT_FOUND, msg);
|
|
goto finish;
|
|
}
|
|
|
|
if (ArraySize(path) > 1)
|
|
{
|
|
entry = ArrayGet(path, 1);
|
|
response = HashMapCreate();
|
|
|
|
value = UserGetProfile(user, entry);
|
|
if (value)
|
|
{
|
|
HashMapSet(response, entry, JsonValueString(value));
|
|
}
|
|
goto finish;
|
|
}
|
|
response = HashMapCreate();
|
|
value = UserGetProfile(user, "avatar_url");
|
|
if (value)
|
|
{
|
|
HashMapSet(response, "avatar_url", JsonValueString(value));
|
|
}
|
|
value = UserGetProfile(user, "displayname");
|
|
if (value)
|
|
{
|
|
HashMapSet(response, "displayname", JsonValueString(value));
|
|
}
|
|
goto finish;
|
|
case HTTP_PUT:
|
|
if (ArraySize(path) > 1)
|
|
{
|
|
request = JsonDecode(HttpServerStream(args->context));
|
|
if (!request)
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_NOT_JSON, NULL);
|
|
goto finish;
|
|
}
|
|
response = MatrixGetAccessToken(args->context, &token);
|
|
if (response)
|
|
{
|
|
goto finish;
|
|
}
|
|
user = UserAuthenticate(db, token);
|
|
if (!user)
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_UNKNOWN_TOKEN, NULL);
|
|
goto finish;
|
|
}
|
|
|
|
/* TODO: This may change in the future. */
|
|
entry = ArrayGet(path, 1);
|
|
if (StrEquals(entry, "displayname") ||
|
|
StrEquals(entry, "avatar_url"))
|
|
{
|
|
/* Check if user has privilege to do that action. */
|
|
if (StrEquals(userId->local, UserGetName(user)))
|
|
{
|
|
value = JsonValueAsString(HashMapGet(request, entry));
|
|
/* TODO: Make UserSetProfile notify other parties of
|
|
* the change */
|
|
UserSetProfile(user, entry, value);
|
|
SendMembership(db, user);
|
|
response = HashMapCreate();
|
|
goto finish;
|
|
}
|
|
/* User is not allowed to carry-on the action */
|
|
msg = "Cannot change another user's profile.";
|
|
HttpResponseStatus(args->context, HTTP_FORBIDDEN);
|
|
response = MatrixErrorCreate(M_FORBIDDEN, msg);
|
|
goto finish;
|
|
}
|
|
else
|
|
{
|
|
msg = "Invalid property being changed.";
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_UNRECOGNIZED, msg);
|
|
goto finish;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_MISSING_PARAM, NULL);
|
|
goto finish;
|
|
}
|
|
default:
|
|
msg = "Route only accepts GET and PUT.";
|
|
HttpResponseStatus(args->context, HTTP_BAD_REQUEST);
|
|
response = MatrixErrorCreate(M_UNKNOWN, msg);
|
|
break;
|
|
}
|
|
finish:
|
|
ConfigUnlock(&config);
|
|
|
|
UserIdFree(userId);
|
|
UserUnlock(user);
|
|
JsonFree(request);
|
|
return response;
|
|
}
|