2021-07-14 07:07:08 +00:00
|
|
|
use crate::{database::DatabaseGuard, ConduitResult, Error, Ruma};
|
2020-07-30 16:14:47 +00:00
|
|
|
use ruma::api::client::{error::ErrorKind, r0::context::get_context};
|
2021-07-14 07:07:08 +00:00
|
|
|
use std::convert::TryFrom;
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
#[cfg(feature = "conduit_bin")]
|
|
|
|
use rocket::get;
|
|
|
|
|
|
|
|
#[cfg_attr(
|
|
|
|
feature = "conduit_bin",
|
|
|
|
get("/_matrix/client/r0/rooms/<_>/context/<_>", data = "<body>")
|
|
|
|
)]
|
2021-02-28 11:41:03 +00:00
|
|
|
#[tracing::instrument(skip(db, body))]
|
2020-10-21 19:28:02 +00:00
|
|
|
pub async fn get_context_route(
|
2021-07-14 07:07:08 +00:00
|
|
|
db: DatabaseGuard,
|
2020-09-08 15:32:03 +00:00
|
|
|
body: Ruma<get_context::Request<'_>>,
|
2020-07-30 16:14:47 +00:00
|
|
|
) -> ConduitResult<get_context::Response> {
|
2020-10-18 18:33:12 +00:00
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated");
|
2020-07-30 16:14:47 +00:00
|
|
|
|
2020-10-18 18:33:12 +00:00
|
|
|
if !db.rooms.is_joined(sender_user, &body.room_id)? {
|
2020-07-30 16:14:47 +00:00
|
|
|
return Err(Error::BadRequest(
|
|
|
|
ErrorKind::Forbidden,
|
|
|
|
"You don't have permission to view this room.",
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
2021-03-23 11:59:27 +00:00
|
|
|
let base_pdu_id = db
|
|
|
|
.rooms
|
|
|
|
.get_pdu_id(&body.event_id)?
|
|
|
|
.ok_or(Error::BadRequest(
|
|
|
|
ErrorKind::NotFound,
|
|
|
|
"Base event id not found.",
|
|
|
|
))?;
|
|
|
|
|
|
|
|
let base_token = db.rooms.pdu_count(&base_pdu_id)?;
|
|
|
|
|
2020-07-30 16:14:47 +00:00
|
|
|
let base_event = db
|
|
|
|
.rooms
|
2021-03-23 11:59:27 +00:00
|
|
|
.get_pdu_from_id(&base_pdu_id)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.ok_or(Error::BadRequest(
|
|
|
|
ErrorKind::NotFound,
|
|
|
|
"Base event not found.",
|
|
|
|
))?
|
|
|
|
.to_room_event();
|
|
|
|
|
|
|
|
let events_before = db
|
|
|
|
.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.pdus_until(&sender_user, &body.room_id, base_token)
|
2020-07-30 16:14:47 +00:00
|
|
|
.take(
|
|
|
|
u32::try_from(body.limit).map_err(|_| {
|
|
|
|
Error::BadRequest(ErrorKind::InvalidParam, "Limit value is invalid.")
|
|
|
|
})? as usize
|
|
|
|
/ 2,
|
|
|
|
)
|
|
|
|
.filter_map(|r| r.ok()) // Remove buggy events
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
2020-09-17 12:44:47 +00:00
|
|
|
let start_token = events_before
|
|
|
|
.last()
|
|
|
|
.and_then(|(pdu_id, _)| db.rooms.pdu_count(pdu_id).ok())
|
|
|
|
.map(|count| count.to_string());
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let events_before = events_before
|
|
|
|
.into_iter()
|
|
|
|
.map(|(_, pdu)| pdu.to_room_event())
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
|
|
|
let events_after = db
|
|
|
|
.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.pdus_after(&sender_user, &body.room_id, base_token)
|
2020-07-30 16:14:47 +00:00
|
|
|
.take(
|
|
|
|
u32::try_from(body.limit).map_err(|_| {
|
|
|
|
Error::BadRequest(ErrorKind::InvalidParam, "Limit value is invalid.")
|
|
|
|
})? as usize
|
|
|
|
/ 2,
|
|
|
|
)
|
|
|
|
.filter_map(|r| r.ok()) // Remove buggy events
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
2020-09-17 12:44:47 +00:00
|
|
|
let end_token = events_after
|
|
|
|
.last()
|
|
|
|
.and_then(|(pdu_id, _)| db.rooms.pdu_count(pdu_id).ok())
|
|
|
|
.map(|count| count.to_string());
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let events_after = events_after
|
|
|
|
.into_iter()
|
|
|
|
.map(|(_, pdu)| pdu.to_room_event())
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
2020-08-06 12:29:59 +00:00
|
|
|
let mut resp = get_context::Response::new();
|
|
|
|
resp.start = start_token;
|
|
|
|
resp.end = end_token;
|
|
|
|
resp.events_before = events_before;
|
|
|
|
resp.event = Some(base_event);
|
|
|
|
resp.events_after = events_after;
|
|
|
|
resp.state = db // TODO: State at event
|
|
|
|
.rooms
|
|
|
|
.room_state_full(&body.room_id)?
|
|
|
|
.values()
|
|
|
|
.map(|pdu| pdu.to_state_event())
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
Ok(resp.into())
|
2020-07-30 16:14:47 +00:00
|
|
|
}
|