2020-07-30 16:14:47 +00:00
|
|
|
use super::State;
|
|
|
|
use crate::{ConduitResult, Database, Error, Ruma};
|
|
|
|
use ruma::{
|
|
|
|
api::client::r0::sync::sync_events,
|
2020-08-21 19:22:59 +00:00
|
|
|
events::{room::member::MembershipState, AnySyncEphemeralRoomEvent, EventType},
|
2020-12-04 23:16:17 +00:00
|
|
|
serde::Raw,
|
|
|
|
RoomId, UserId,
|
2020-07-30 16:14:47 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#[cfg(feature = "conduit_bin")]
|
|
|
|
use rocket::{get, tokio};
|
|
|
|
use std::{
|
|
|
|
collections::{hash_map, BTreeMap, HashMap, HashSet},
|
2020-08-21 19:22:59 +00:00
|
|
|
convert::TryFrom,
|
2020-07-30 16:14:47 +00:00
|
|
|
time::Duration,
|
|
|
|
};
|
|
|
|
|
2020-08-22 19:38:01 +00:00
|
|
|
/// # `GET /_matrix/client/r0/sync`
|
|
|
|
///
|
|
|
|
/// Synchronize the client's state with the latest state on the server.
|
|
|
|
///
|
|
|
|
/// - This endpoint takes a `since` parameter which should be the `next_batch` value from a
|
|
|
|
/// previous request.
|
|
|
|
/// - Calling this endpoint without a `since` parameter will return all recent events, the state
|
|
|
|
/// of all rooms and more data. This should only be called on the initial login of the device.
|
|
|
|
/// - To get incremental updates, you can call this endpoint with a `since` parameter. This will
|
|
|
|
/// return all recent events, state updates and more data that happened since the last /sync
|
|
|
|
/// request.
|
2020-07-30 16:14:47 +00:00
|
|
|
#[cfg_attr(
|
|
|
|
feature = "conduit_bin",
|
|
|
|
get("/_matrix/client/r0/sync", data = "<body>")
|
|
|
|
)]
|
|
|
|
pub async fn sync_events_route(
|
|
|
|
db: State<'_, Database>,
|
2020-09-08 15:32:03 +00:00
|
|
|
body: Ruma<sync_events::Request<'_>>,
|
2020-07-30 16:14:47 +00:00
|
|
|
) -> ConduitResult<sync_events::Response> {
|
2020-10-18 18:33:12 +00:00
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated");
|
|
|
|
let sender_device = body.sender_device.as_ref().expect("user is authenticated");
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
// TODO: match body.set_presence {
|
2020-10-18 18:33:12 +00:00
|
|
|
db.rooms.edus.ping_presence(&sender_user)?;
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
// Setup watchers, so if there's no response, we can wait for them
|
2020-10-18 18:33:12 +00:00
|
|
|
let watcher = db.watch(sender_user, sender_device);
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let next_batch = db.globals.current_count()?.to_string();
|
|
|
|
|
|
|
|
let mut joined_rooms = BTreeMap::new();
|
|
|
|
let since = body
|
|
|
|
.since
|
|
|
|
.clone()
|
|
|
|
.and_then(|string| string.parse().ok())
|
|
|
|
.unwrap_or(0);
|
|
|
|
|
|
|
|
let mut presence_updates = HashMap::new();
|
2020-08-21 19:22:59 +00:00
|
|
|
let mut left_encrypted_users = HashSet::new(); // Users that have left any encrypted rooms the sender was in
|
2020-07-30 16:14:47 +00:00
|
|
|
let mut device_list_updates = HashSet::new();
|
2020-08-21 19:22:59 +00:00
|
|
|
let mut device_list_left = HashSet::new();
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
// Look for device list updates of this account
|
|
|
|
device_list_updates.extend(
|
|
|
|
db.users
|
2020-10-18 18:33:12 +00:00
|
|
|
.keys_changed(&sender_user.to_string(), since, None)
|
2020-07-30 16:14:47 +00:00
|
|
|
.filter_map(|r| r.ok()),
|
|
|
|
);
|
|
|
|
|
2020-10-18 18:33:12 +00:00
|
|
|
for room_id in db.rooms.rooms_joined(&sender_user) {
|
2020-07-30 16:14:47 +00:00
|
|
|
let room_id = room_id?;
|
|
|
|
|
|
|
|
let mut non_timeline_pdus = db
|
|
|
|
.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.pdus_since(&sender_user, &room_id, since)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.filter_map(|r| r.ok()); // Filter out buggy events
|
|
|
|
|
|
|
|
// Take the last 10 events for the timeline
|
|
|
|
let timeline_pdus = non_timeline_pdus
|
|
|
|
.by_ref()
|
|
|
|
.rev()
|
|
|
|
.take(10)
|
|
|
|
.collect::<Vec<_>>()
|
|
|
|
.into_iter()
|
|
|
|
.rev()
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
2020-08-23 15:29:39 +00:00
|
|
|
let send_notification_counts = !timeline_pdus.is_empty()
|
|
|
|
|| db
|
|
|
|
.rooms
|
|
|
|
.edus
|
2020-10-18 18:33:12 +00:00
|
|
|
.last_privateread_update(&sender_user, &room_id)?
|
2020-08-23 15:29:39 +00:00
|
|
|
> since;
|
2020-08-21 19:22:59 +00:00
|
|
|
|
2020-07-30 16:14:47 +00:00
|
|
|
// They /sync response doesn't always return all messages, so we say the output is
|
|
|
|
// limited unless there are events in non_timeline_pdus
|
2020-08-19 16:26:39 +00:00
|
|
|
let mut limited = false;
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let mut state_pdus = Vec::new();
|
2020-09-16 19:11:38 +00:00
|
|
|
for (_, pdu) in non_timeline_pdus {
|
2020-07-30 16:14:47 +00:00
|
|
|
if pdu.state_key.is_some() {
|
|
|
|
state_pdus.push(pdu);
|
|
|
|
}
|
2020-08-19 16:26:39 +00:00
|
|
|
limited = true;
|
2020-07-30 16:14:47 +00:00
|
|
|
}
|
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
// Database queries:
|
2020-08-21 19:22:59 +00:00
|
|
|
let encrypted_room = db
|
|
|
|
.rooms
|
|
|
|
.room_state_get(&room_id, &EventType::RoomEncryption, "")?
|
|
|
|
.is_some();
|
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
// These type is Option<Option<_>>. The outer Option is None when there is no event between
|
|
|
|
// since and the current room state, meaning there should be no updates.
|
|
|
|
// The inner Option is None when there is an event, but there is no state hash associated
|
|
|
|
// with it. This can happen for the RoomCreate event, so all updates should arrive.
|
2020-10-18 18:33:12 +00:00
|
|
|
let first_pdu_after_since = db.rooms.pdus_after(sender_user, &room_id, since).next();
|
2020-10-18 06:56:21 +00:00
|
|
|
|
|
|
|
let since_state_hash = first_pdu_after_since
|
|
|
|
.as_ref()
|
|
|
|
.map(|pdu| db.rooms.pdu_state_hash(&pdu.as_ref().ok()?.0).ok()?);
|
2020-09-17 12:44:47 +00:00
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
let since_members = since_state_hash.as_ref().map(|state_hash| {
|
|
|
|
state_hash.as_ref().and_then(|state_hash| {
|
|
|
|
db.rooms
|
|
|
|
.state_type(&state_hash, &EventType::RoomMember)
|
|
|
|
.ok()
|
|
|
|
})
|
|
|
|
});
|
2020-09-17 12:44:47 +00:00
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
let since_encryption = since_state_hash.as_ref().map(|state_hash| {
|
|
|
|
state_hash.as_ref().and_then(|state_hash| {
|
|
|
|
db.rooms
|
|
|
|
.state_get(&state_hash, &EventType::RoomEncryption, "")
|
|
|
|
.ok()
|
|
|
|
})
|
2020-09-17 12:44:47 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
let current_members = db.rooms.room_state_type(&room_id, &EventType::RoomMember)?;
|
|
|
|
|
|
|
|
// Calculations:
|
2020-09-17 20:41:43 +00:00
|
|
|
let new_encrypted_room =
|
|
|
|
encrypted_room && since_encryption.map_or(false, |encryption| encryption.is_none());
|
2020-08-21 19:22:59 +00:00
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
let send_member_count = since_members.as_ref().map_or(false, |since_members| {
|
|
|
|
since_members.as_ref().map_or(true, |since_members| {
|
|
|
|
current_members.len() != since_members.len()
|
|
|
|
})
|
2020-09-17 12:44:47 +00:00
|
|
|
});
|
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
let since_sender_member = since_members.as_ref().map(|since_members| {
|
|
|
|
since_members.as_ref().and_then(|members| {
|
2020-10-18 18:33:12 +00:00
|
|
|
members.get(sender_user.as_str()).and_then(|pdu| {
|
2020-09-17 20:41:43 +00:00
|
|
|
serde_json::from_value::<Raw<ruma::events::room::member::MemberEventContent>>(
|
|
|
|
pdu.content.clone(),
|
|
|
|
)
|
|
|
|
.expect("Raw::from_value always works")
|
|
|
|
.deserialize()
|
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))
|
|
|
|
.ok()
|
|
|
|
})
|
2020-09-17 12:44:47 +00:00
|
|
|
})
|
|
|
|
});
|
|
|
|
|
|
|
|
if encrypted_room {
|
|
|
|
for (user_id, current_member) in current_members {
|
|
|
|
let current_membership = serde_json::from_value::<
|
2020-08-21 19:22:59 +00:00
|
|
|
Raw<ruma::events::room::member::MemberEventContent>,
|
2020-09-17 12:44:47 +00:00
|
|
|
>(current_member.content.clone())
|
2020-08-21 19:22:59 +00:00
|
|
|
.expect("Raw::from_value always works")
|
|
|
|
.deserialize()
|
2020-09-17 12:44:47 +00:00
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))?
|
|
|
|
.membership;
|
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
let since_membership =
|
|
|
|
since_members
|
|
|
|
.as_ref()
|
|
|
|
.map_or(MembershipState::Join, |members| {
|
|
|
|
members
|
|
|
|
.as_ref()
|
|
|
|
.and_then(|members| {
|
|
|
|
members.get(&user_id).and_then(|since_member| {
|
|
|
|
serde_json::from_value::<
|
|
|
|
Raw<ruma::events::room::member::MemberEventContent>,
|
|
|
|
>(
|
|
|
|
since_member.content.clone()
|
|
|
|
)
|
|
|
|
.expect("Raw::from_value always works")
|
|
|
|
.deserialize()
|
|
|
|
.map_err(|_| {
|
|
|
|
Error::bad_database("Invalid PDU in database.")
|
|
|
|
})
|
|
|
|
.ok()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
.map_or(MembershipState::Leave, |member| member.membership)
|
|
|
|
});
|
2020-08-21 19:22:59 +00:00
|
|
|
|
2020-09-17 12:44:47 +00:00
|
|
|
let user_id = UserId::try_from(user_id)
|
|
|
|
.map_err(|_| Error::bad_database("Invalid UserId in member PDU."))?;
|
|
|
|
|
|
|
|
match (since_membership, current_membership) {
|
|
|
|
(MembershipState::Leave, MembershipState::Join) => {
|
|
|
|
// A new user joined an encrypted room
|
2020-10-18 18:33:12 +00:00
|
|
|
if !share_encrypted_room(&db, &sender_user, &user_id, &room_id) {
|
2020-09-17 12:44:47 +00:00
|
|
|
device_list_updates.insert(user_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
(MembershipState::Join, MembershipState::Leave) => {
|
|
|
|
// Write down users that have left encrypted rooms we are in
|
|
|
|
left_encrypted_users.insert(user_id);
|
2020-07-30 16:14:47 +00:00
|
|
|
}
|
2020-09-17 12:44:47 +00:00
|
|
|
_ => {}
|
2020-07-30 16:14:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-17 20:41:43 +00:00
|
|
|
let joined_since_last_sync = since_sender_member.map_or(false, |member| {
|
|
|
|
member.map_or(true, |member| member.membership != MembershipState::Join)
|
|
|
|
});
|
2020-09-17 12:44:47 +00:00
|
|
|
|
2020-08-21 19:22:59 +00:00
|
|
|
if joined_since_last_sync && encrypted_room || new_encrypted_room {
|
|
|
|
// If the user is in a new encrypted room, give them all joined users
|
|
|
|
device_list_updates.extend(
|
|
|
|
db.rooms
|
|
|
|
.room_members(&room_id)
|
2020-08-21 19:22:59 +00:00
|
|
|
.filter_map(|user_id| Some(user_id.ok()?))
|
2020-08-21 19:22:59 +00:00
|
|
|
.filter(|user_id| {
|
|
|
|
// Don't send key updates from the sender to the sender
|
2020-10-18 18:33:12 +00:00
|
|
|
sender_user != user_id
|
2020-08-21 19:22:59 +00:00
|
|
|
})
|
|
|
|
.filter(|user_id| {
|
|
|
|
// Only send keys if the sender doesn't share an encrypted room with the target already
|
2020-10-18 18:33:12 +00:00
|
|
|
!share_encrypted_room(&db, sender_user, user_id, &room_id)
|
2020-08-21 19:22:59 +00:00
|
|
|
}),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for device list updates in this room
|
|
|
|
device_list_updates.extend(
|
|
|
|
db.users
|
|
|
|
.keys_changed(&room_id.to_string(), since, None)
|
|
|
|
.filter_map(|r| r.ok()),
|
|
|
|
);
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let (joined_member_count, invited_member_count, heroes) = if send_member_count {
|
|
|
|
let joined_member_count = db.rooms.room_members(&room_id).count();
|
|
|
|
let invited_member_count = db.rooms.room_members_invited(&room_id).count();
|
|
|
|
|
|
|
|
// Recalculate heroes (first 5 members)
|
|
|
|
let mut heroes = Vec::new();
|
|
|
|
|
|
|
|
if joined_member_count + invited_member_count <= 5 {
|
|
|
|
// Go through all PDUs and for each member event, check if the user is still joined or
|
|
|
|
// invited until we have 5 or we reach the end
|
|
|
|
|
|
|
|
for hero in db
|
|
|
|
.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.all_pdus(&sender_user, &room_id)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.filter_map(|pdu| pdu.ok()) // Ignore all broken pdus
|
2020-09-16 19:11:38 +00:00
|
|
|
.filter(|(_, pdu)| pdu.kind == EventType::RoomMember)
|
|
|
|
.map(|(_, pdu)| {
|
2020-07-30 16:14:47 +00:00
|
|
|
let content = serde_json::from_value::<
|
|
|
|
Raw<ruma::events::room::member::MemberEventContent>,
|
|
|
|
>(pdu.content.clone())
|
|
|
|
.expect("Raw::from_value always works")
|
|
|
|
.deserialize()
|
|
|
|
.map_err(|_| Error::bad_database("Invalid member event in database."))?;
|
|
|
|
|
|
|
|
if let Some(state_key) = &pdu.state_key {
|
2020-08-21 19:22:59 +00:00
|
|
|
let user_id = UserId::try_from(state_key.clone()).map_err(|_| {
|
|
|
|
Error::bad_database("Invalid UserId in member PDU.")
|
2020-07-30 16:14:47 +00:00
|
|
|
})?;
|
|
|
|
|
|
|
|
// The membership was and still is invite or join
|
|
|
|
if matches!(
|
|
|
|
content.membership,
|
2020-08-21 19:22:59 +00:00
|
|
|
MembershipState::Join | MembershipState::Invite
|
|
|
|
) && (db.rooms.is_joined(&user_id, &room_id)?
|
|
|
|
|| db.rooms.is_invited(&user_id, &room_id)?)
|
|
|
|
{
|
2020-07-30 16:14:47 +00:00
|
|
|
Ok::<_, Error>(Some(state_key.clone()))
|
|
|
|
} else {
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.filter_map(|u| u.ok()) // Filter out buggy users
|
|
|
|
// Filter for possible heroes
|
|
|
|
.filter_map(|u| u)
|
|
|
|
{
|
2020-10-18 18:33:12 +00:00
|
|
|
if heroes.contains(&hero) || hero == sender_user.as_str() {
|
2020-07-30 16:14:47 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
heroes.push(hero);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
(
|
|
|
|
Some(joined_member_count),
|
|
|
|
Some(invited_member_count),
|
|
|
|
heroes,
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
(None, None, Vec::new())
|
|
|
|
};
|
|
|
|
|
|
|
|
let notification_count = if send_notification_counts {
|
2020-10-18 18:33:12 +00:00
|
|
|
if let Some(last_read) = db.rooms.edus.private_read_get(&room_id, &sender_user)? {
|
2020-07-30 16:14:47 +00:00
|
|
|
Some(
|
|
|
|
(db.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.pdus_since(&sender_user, &room_id, last_read)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.filter_map(|pdu| pdu.ok()) // Filter out buggy events
|
2020-09-16 19:11:38 +00:00
|
|
|
.filter(|(_, pdu)| {
|
2020-07-30 16:14:47 +00:00
|
|
|
matches!(
|
|
|
|
pdu.kind.clone(),
|
|
|
|
EventType::RoomMessage | EventType::RoomEncrypted
|
|
|
|
)
|
|
|
|
})
|
|
|
|
.count() as u32)
|
|
|
|
.into(),
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2020-09-16 19:11:38 +00:00
|
|
|
let prev_batch = timeline_pdus
|
|
|
|
.first()
|
|
|
|
.map_or(Ok::<_, Error>(None), |(pdu_id, _)| {
|
|
|
|
Ok(Some(db.rooms.pdu_count(pdu_id)?.to_string()))
|
|
|
|
})?;
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let room_events = timeline_pdus
|
|
|
|
.into_iter()
|
2020-09-16 19:11:38 +00:00
|
|
|
.map(|(_, pdu)| pdu.to_sync_room_event())
|
2020-07-30 16:14:47 +00:00
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
|
|
|
let mut edus = db
|
|
|
|
.rooms
|
|
|
|
.edus
|
2020-08-23 15:29:39 +00:00
|
|
|
.readreceipts_since(&room_id, since)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.filter_map(|r| r.ok()) // Filter out buggy events
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
|
2020-08-23 15:29:39 +00:00
|
|
|
if db.rooms.edus.last_typing_update(&room_id, &db.globals)? > since {
|
2020-07-30 16:14:47 +00:00
|
|
|
edus.push(
|
|
|
|
serde_json::from_str(
|
|
|
|
&serde_json::to_string(&AnySyncEphemeralRoomEvent::Typing(
|
2020-08-23 15:29:39 +00:00
|
|
|
db.rooms.edus.typings_all(&room_id)?,
|
2020-07-30 16:14:47 +00:00
|
|
|
))
|
|
|
|
.expect("event is valid, we just created it"),
|
|
|
|
)
|
|
|
|
.expect("event is valid, we just created it"),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
let joined_room = sync_events::JoinedRoom {
|
|
|
|
account_data: sync_events::AccountData {
|
|
|
|
events: db
|
|
|
|
.account_data
|
2020-10-18 18:33:12 +00:00
|
|
|
.changes_since(Some(&room_id), &sender_user, since)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.into_iter()
|
|
|
|
.filter_map(|(_, v)| {
|
|
|
|
serde_json::from_str(v.json().get())
|
|
|
|
.map_err(|_| Error::bad_database("Invalid account event in database."))
|
|
|
|
.ok()
|
|
|
|
})
|
|
|
|
.collect::<Vec<_>>(),
|
|
|
|
},
|
|
|
|
summary: sync_events::RoomSummary {
|
|
|
|
heroes,
|
|
|
|
joined_member_count: joined_member_count.map(|n| (n as u32).into()),
|
|
|
|
invited_member_count: invited_member_count.map(|n| (n as u32).into()),
|
|
|
|
},
|
|
|
|
unread_notifications: sync_events::UnreadNotificationsCount {
|
|
|
|
highlight_count: None,
|
|
|
|
notification_count,
|
|
|
|
},
|
|
|
|
timeline: sync_events::Timeline {
|
2020-08-19 16:26:39 +00:00
|
|
|
limited: limited || joined_since_last_sync,
|
2020-07-30 16:14:47 +00:00
|
|
|
prev_batch,
|
|
|
|
events: room_events,
|
|
|
|
},
|
|
|
|
// TODO: state before timeline
|
|
|
|
state: sync_events::State {
|
|
|
|
events: if joined_since_last_sync {
|
|
|
|
db.rooms
|
|
|
|
.room_state_full(&room_id)?
|
|
|
|
.into_iter()
|
|
|
|
.map(|(_, pdu)| pdu.to_sync_state_event())
|
|
|
|
.collect()
|
|
|
|
} else {
|
|
|
|
Vec::new()
|
|
|
|
},
|
|
|
|
},
|
|
|
|
ephemeral: sync_events::Ephemeral { events: edus },
|
|
|
|
};
|
|
|
|
|
|
|
|
if !joined_room.is_empty() {
|
|
|
|
joined_rooms.insert(room_id.clone(), joined_room);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Take presence updates from this room
|
|
|
|
for (user_id, presence) in
|
|
|
|
db.rooms
|
|
|
|
.edus
|
|
|
|
.presence_since(&room_id, since, &db.rooms, &db.globals)?
|
|
|
|
{
|
|
|
|
match presence_updates.entry(user_id) {
|
|
|
|
hash_map::Entry::Vacant(v) => {
|
|
|
|
v.insert(presence);
|
|
|
|
}
|
|
|
|
hash_map::Entry::Occupied(mut o) => {
|
|
|
|
let p = o.get_mut();
|
|
|
|
|
|
|
|
// Update existing presence event with more info
|
|
|
|
p.content.presence = presence.content.presence;
|
|
|
|
if let Some(status_msg) = presence.content.status_msg {
|
|
|
|
p.content.status_msg = Some(status_msg);
|
|
|
|
}
|
|
|
|
if let Some(last_active_ago) = presence.content.last_active_ago {
|
|
|
|
p.content.last_active_ago = Some(last_active_ago);
|
|
|
|
}
|
|
|
|
if let Some(displayname) = presence.content.displayname {
|
|
|
|
p.content.displayname = Some(displayname);
|
|
|
|
}
|
|
|
|
if let Some(avatar_url) = presence.content.avatar_url {
|
|
|
|
p.content.avatar_url = Some(avatar_url);
|
|
|
|
}
|
|
|
|
if let Some(currently_active) = presence.content.currently_active {
|
|
|
|
p.content.currently_active = Some(currently_active);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut left_rooms = BTreeMap::new();
|
2020-10-18 18:33:12 +00:00
|
|
|
for room_id in db.rooms.rooms_left(&sender_user) {
|
2020-07-30 16:14:47 +00:00
|
|
|
let room_id = room_id?;
|
|
|
|
|
2020-10-27 19:25:43 +00:00
|
|
|
let since_member = if let Some(since_member) = db
|
2020-09-17 12:44:47 +00:00
|
|
|
.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.pdus_after(sender_user, &room_id, since)
|
2020-09-17 12:44:47 +00:00
|
|
|
.next()
|
|
|
|
.and_then(|pdu| pdu.ok())
|
|
|
|
.and_then(|pdu| {
|
|
|
|
db.rooms
|
|
|
|
.pdu_state_hash(&pdu.0)
|
|
|
|
.ok()?
|
|
|
|
.ok_or_else(|| Error::bad_database("Pdu in db doesn't have a state hash."))
|
|
|
|
.ok()
|
|
|
|
})
|
|
|
|
.and_then(|state_hash| {
|
|
|
|
db.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.state_get(&state_hash, &EventType::RoomMember, sender_user.as_str())
|
2020-09-17 12:44:47 +00:00
|
|
|
.ok()?
|
|
|
|
.ok_or_else(|| Error::bad_database("State hash in db doesn't have a state."))
|
|
|
|
.ok()
|
|
|
|
})
|
2020-10-27 19:25:43 +00:00
|
|
|
.and_then(|(pdu_id, pdu)| {
|
2020-09-17 12:44:47 +00:00
|
|
|
serde_json::from_value::<Raw<ruma::events::room::member::MemberEventContent>>(
|
2020-10-27 19:25:43 +00:00
|
|
|
pdu.content.clone(),
|
2020-09-17 12:44:47 +00:00
|
|
|
)
|
2020-08-22 19:00:38 +00:00
|
|
|
.expect("Raw::from_value always works")
|
|
|
|
.deserialize()
|
2020-09-17 12:44:47 +00:00
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))
|
2020-10-27 19:25:43 +00:00
|
|
|
.map(|content| (pdu_id, pdu, content))
|
2020-09-17 12:44:47 +00:00
|
|
|
.ok()
|
2020-10-27 19:25:43 +00:00
|
|
|
}) {
|
|
|
|
since_member
|
|
|
|
} else {
|
|
|
|
// We couldn't find the since_member event. This is very weird - we better abort
|
|
|
|
continue;
|
|
|
|
};
|
2020-08-22 19:00:38 +00:00
|
|
|
|
2020-10-27 19:25:43 +00:00
|
|
|
let left_since_last_sync = since_member.2.membership == MembershipState::Join;
|
2020-08-22 19:00:38 +00:00
|
|
|
|
2020-10-27 19:25:43 +00:00
|
|
|
let left_room = if left_since_last_sync {
|
2020-08-22 19:00:38 +00:00
|
|
|
device_list_left.extend(
|
|
|
|
db.rooms
|
|
|
|
.room_members(&room_id)
|
2020-08-23 12:32:43 +00:00
|
|
|
.filter_map(|user_id| Some(user_id.ok()?))
|
2020-08-22 19:00:38 +00:00
|
|
|
.filter(|user_id| {
|
|
|
|
// Don't send key updates from the sender to the sender
|
2020-10-18 18:33:12 +00:00
|
|
|
sender_user != user_id
|
2020-08-22 19:00:38 +00:00
|
|
|
})
|
|
|
|
.filter(|user_id| {
|
|
|
|
// Only send if the sender doesn't share any encrypted room with the target
|
|
|
|
// anymore
|
2020-10-18 18:33:12 +00:00
|
|
|
!share_encrypted_room(&db, sender_user, user_id, &room_id)
|
2020-08-22 19:00:38 +00:00
|
|
|
}),
|
|
|
|
);
|
2020-10-27 19:25:43 +00:00
|
|
|
|
|
|
|
let pdus = db.rooms.pdus_since(&sender_user, &room_id, since)?;
|
|
|
|
let mut room_events = pdus
|
|
|
|
.filter_map(|pdu| pdu.ok()) // Filter out buggy events
|
|
|
|
.take_while(|(pdu_id, _)| since_member.0 != pdu_id)
|
|
|
|
.map(|(_, pdu)| pdu.to_sync_room_event())
|
|
|
|
.collect::<Vec<_>>();
|
|
|
|
room_events.push(since_member.1.to_sync_room_event());
|
|
|
|
|
|
|
|
sync_events::LeftRoom {
|
|
|
|
account_data: sync_events::AccountData { events: Vec::new() },
|
|
|
|
timeline: sync_events::Timeline {
|
|
|
|
limited: false,
|
|
|
|
prev_batch: Some(next_batch.clone()),
|
|
|
|
events: room_events,
|
|
|
|
},
|
|
|
|
state: sync_events::State { events: Vec::new() },
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
sync_events::LeftRoom {
|
|
|
|
account_data: sync_events::AccountData { events: Vec::new() },
|
|
|
|
timeline: sync_events::Timeline {
|
|
|
|
limited: false,
|
|
|
|
prev_batch: Some(next_batch.clone()),
|
|
|
|
events: Vec::new(),
|
|
|
|
},
|
|
|
|
state: sync_events::State { events: Vec::new() },
|
|
|
|
}
|
|
|
|
};
|
2020-08-22 19:00:38 +00:00
|
|
|
|
2020-07-30 16:14:47 +00:00
|
|
|
if !left_room.is_empty() {
|
|
|
|
left_rooms.insert(room_id.clone(), left_room);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut invited_rooms = BTreeMap::new();
|
2020-10-18 18:33:12 +00:00
|
|
|
for room_id in db.rooms.rooms_invited(&sender_user) {
|
2020-07-30 16:14:47 +00:00
|
|
|
let room_id = room_id?;
|
2020-08-02 07:24:47 +00:00
|
|
|
let mut invited_since_last_sync = false;
|
2020-10-18 18:33:12 +00:00
|
|
|
for pdu in db.rooms.pdus_since(&sender_user, &room_id, since)? {
|
2020-09-16 19:11:38 +00:00
|
|
|
let (_, pdu) = pdu?;
|
2020-10-18 18:33:12 +00:00
|
|
|
if pdu.kind == EventType::RoomMember && pdu.state_key == Some(sender_user.to_string()) {
|
2020-08-21 19:22:59 +00:00
|
|
|
let content = serde_json::from_value::<
|
|
|
|
Raw<ruma::events::room::member::MemberEventContent>,
|
|
|
|
>(pdu.content.clone())
|
|
|
|
.expect("Raw::from_value always works")
|
|
|
|
.deserialize()
|
|
|
|
.map_err(|_| Error::bad_database("Invalid PDU in database."))?;
|
|
|
|
|
|
|
|
if content.membership == MembershipState::Invite {
|
|
|
|
invited_since_last_sync = true;
|
|
|
|
break;
|
2020-08-02 07:24:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !invited_since_last_sync {
|
|
|
|
continue;
|
|
|
|
}
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let invited_room = sync_events::InvitedRoom {
|
|
|
|
invite_state: sync_events::InviteState {
|
|
|
|
events: db
|
|
|
|
.rooms
|
|
|
|
.room_state_full(&room_id)?
|
|
|
|
.into_iter()
|
|
|
|
.map(|(_, pdu)| pdu.to_stripped_state_event())
|
|
|
|
.collect(),
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
if !invited_room.is_empty() {
|
|
|
|
invited_rooms.insert(room_id.clone(), invited_room);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-21 19:22:59 +00:00
|
|
|
for user_id in left_encrypted_users {
|
2020-08-26 15:15:52 +00:00
|
|
|
let still_share_encrypted_room = db
|
2020-08-21 19:22:59 +00:00
|
|
|
.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.get_shared_rooms(vec![sender_user.clone(), user_id.clone()])
|
2020-08-21 19:22:59 +00:00
|
|
|
.filter_map(|r| r.ok())
|
|
|
|
.filter_map(|other_room_id| {
|
|
|
|
Some(
|
|
|
|
db.rooms
|
|
|
|
.room_state_get(&other_room_id, &EventType::RoomEncryption, "")
|
|
|
|
.ok()?
|
|
|
|
.is_some(),
|
|
|
|
)
|
|
|
|
})
|
2020-08-21 19:22:59 +00:00
|
|
|
.all(|encrypted| !encrypted);
|
|
|
|
// If the user doesn't share an encrypted room with the target anymore, we need to tell
|
|
|
|
// them
|
2020-08-26 15:15:52 +00:00
|
|
|
if still_share_encrypted_room {
|
2020-08-21 19:22:59 +00:00
|
|
|
device_list_left.insert(user_id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-30 16:14:47 +00:00
|
|
|
// Remove all to-device events the device received *last time*
|
|
|
|
db.users
|
2020-10-18 18:33:12 +00:00
|
|
|
.remove_to_device_events(sender_user, sender_device, since)?;
|
2020-07-30 16:14:47 +00:00
|
|
|
|
|
|
|
let response = sync_events::Response {
|
|
|
|
next_batch,
|
|
|
|
rooms: sync_events::Rooms {
|
|
|
|
leave: left_rooms,
|
|
|
|
join: joined_rooms,
|
|
|
|
invite: invited_rooms,
|
|
|
|
},
|
|
|
|
presence: sync_events::Presence {
|
|
|
|
events: presence_updates
|
|
|
|
.into_iter()
|
|
|
|
.map(|(_, v)| Raw::from(v))
|
|
|
|
.collect(),
|
|
|
|
},
|
|
|
|
account_data: sync_events::AccountData {
|
|
|
|
events: db
|
|
|
|
.account_data
|
2020-10-18 18:33:12 +00:00
|
|
|
.changes_since(None, &sender_user, since)?
|
2020-07-30 16:14:47 +00:00
|
|
|
.into_iter()
|
|
|
|
.filter_map(|(_, v)| {
|
|
|
|
serde_json::from_str(v.json().get())
|
|
|
|
.map_err(|_| Error::bad_database("Invalid account event in database."))
|
|
|
|
.ok()
|
|
|
|
})
|
|
|
|
.collect::<Vec<_>>(),
|
|
|
|
},
|
|
|
|
device_lists: sync_events::DeviceLists {
|
|
|
|
changed: device_list_updates.into_iter().collect(),
|
2020-08-21 19:22:59 +00:00
|
|
|
left: device_list_left.into_iter().collect(),
|
2020-07-30 16:14:47 +00:00
|
|
|
},
|
2020-10-18 18:33:12 +00:00
|
|
|
device_one_time_keys_count: if db.users.last_one_time_keys_update(sender_user)? > since
|
2020-09-23 10:03:08 +00:00
|
|
|
|| since == 0
|
|
|
|
{
|
2020-10-18 18:33:12 +00:00
|
|
|
db.users.count_one_time_keys(sender_user, sender_device)?
|
2020-07-30 16:14:47 +00:00
|
|
|
} else {
|
|
|
|
BTreeMap::new()
|
|
|
|
},
|
|
|
|
to_device: sync_events::ToDevice {
|
2020-10-18 18:33:12 +00:00
|
|
|
events: db.users.get_to_device_events(sender_user, sender_device)?,
|
2020-07-30 16:14:47 +00:00
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
// TODO: Retry the endpoint instead of returning (waiting for #118)
|
|
|
|
if !body.full_state
|
|
|
|
&& response.rooms.is_empty()
|
|
|
|
&& response.presence.is_empty()
|
|
|
|
&& response.account_data.is_empty()
|
|
|
|
&& response.device_lists.is_empty()
|
|
|
|
&& response.device_one_time_keys_count.is_empty()
|
|
|
|
&& response.to_device.is_empty()
|
|
|
|
{
|
|
|
|
// Hang a few seconds so requests are not spammed
|
|
|
|
// Stop hanging if new info arrives
|
|
|
|
let mut duration = body.timeout.unwrap_or_default();
|
|
|
|
if duration.as_secs() > 30 {
|
|
|
|
duration = Duration::from_secs(30);
|
|
|
|
}
|
|
|
|
let mut delay = tokio::time::delay_for(duration);
|
|
|
|
tokio::select! {
|
|
|
|
_ = &mut delay => {}
|
|
|
|
_ = watcher => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(response.into())
|
|
|
|
}
|
2020-08-21 19:22:59 +00:00
|
|
|
|
|
|
|
fn share_encrypted_room(
|
|
|
|
db: &Database,
|
2020-10-18 18:33:12 +00:00
|
|
|
sender_user: &UserId,
|
2020-08-21 19:22:59 +00:00
|
|
|
user_id: &UserId,
|
|
|
|
ignore_room: &RoomId,
|
|
|
|
) -> bool {
|
|
|
|
db.rooms
|
2020-10-18 18:33:12 +00:00
|
|
|
.get_shared_rooms(vec![sender_user.clone(), user_id.clone()])
|
2020-08-21 19:22:59 +00:00
|
|
|
.filter_map(|r| r.ok())
|
|
|
|
.filter(|room_id| room_id != ignore_room)
|
|
|
|
.filter_map(|other_room_id| {
|
|
|
|
Some(
|
|
|
|
db.rooms
|
|
|
|
.room_state_get(&other_room_id, &EventType::RoomEncryption, "")
|
|
|
|
.ok()?
|
|
|
|
.is_some(),
|
|
|
|
)
|
|
|
|
})
|
|
|
|
.any(|encrypted| encrypted)
|
|
|
|
}
|