use std::{ collections::BTreeMap, convert::{TryFrom, TryInto}, time::{Duration, SystemTime}, }; use crate::{utils, Database, MatrixResult, Ruma}; use log::{debug, warn}; use rocket::{delete, get, options, post, put, State}; use ruma_client_api::{ error::{Error, ErrorKind}, r0::{ account::{get_username_availability, register}, alias::{create_alias, delete_alias, get_alias}, capabilities::get_capabilities, config::{get_global_account_data, set_global_account_data}, context::get_context, device::{self, delete_device, delete_devices, get_device, get_devices, update_device}, directory::{ self, get_public_rooms, get_public_rooms_filtered, get_room_visibility, set_room_visibility, }, filter::{self, create_filter, get_filter}, keys::{self, claim_keys, get_keys, upload_keys}, media::{create_content, get_content, get_content_thumbnail, get_media_config}, membership::{ ban_user, forget_room, get_member_events, invite_user, join_room_by_id, join_room_by_id_or_alias, kick_user, leave_room, unban_user, }, message::{create_message_event, get_message_events}, presence::set_presence, profile::{ get_avatar_url, get_display_name, get_profile, set_avatar_url, set_display_name, }, push::{get_pushrules_all, set_pushrule, set_pushrule_enabled}, read_marker::set_read_marker, redact::redact_event, room::{self, create_room}, session::{get_login_types, login, logout}, state::{ create_state_event_for_empty_key, create_state_event_for_key, get_state_events, get_state_events_for_empty_key, get_state_events_for_key, }, sync::sync_events, thirdparty::get_protocols, to_device::{self, send_event_to_device}, typing::create_typing_event, uiaa::{AuthFlow, UiaaInfo, UiaaResponse}, user_directory::search_users, }, unversioned::get_supported_versions, }; use ruma_events::{ collections::only::Event as EduEvent, room::{canonical_alias, guest_access, history_visibility, join_rules, member, redaction}, EventJson, EventType, }; use ruma_identifiers::{DeviceId, RoomAliasId, RoomId, RoomVersionId, UserId}; use serde_json::{json, value::RawValue}; const GUEST_NAME_LENGTH: usize = 10; const DEVICE_ID_LENGTH: usize = 10; const SESSION_ID_LENGTH: usize = 256; const TOKEN_LENGTH: usize = 256; const MXC_LENGTH: usize = 256; #[get("/_matrix/client/versions")] pub fn get_supported_versions_route() -> MatrixResult<get_supported_versions::Response> { MatrixResult(Ok(get_supported_versions::Response { versions: vec!["r0.5.0".to_owned(), "r0.6.0".to_owned()], unstable_features: BTreeMap::new(), })) } #[get("/_matrix/client/r0/register/available", data = "<body>")] pub fn get_register_available_route( db: State<'_, Database>, body: Ruma<get_username_availability::Request>, ) -> MatrixResult<get_username_availability::Response> { // Validate user id let user_id = match UserId::parse_with_server_name(body.username.clone(), db.globals.server_name()) .ok() .filter(|user_id| !user_id.is_historical()) { None => { debug!("Username invalid"); return MatrixResult(Err(Error { kind: ErrorKind::InvalidUsername, message: "Username was invalid.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } Some(user_id) => user_id, }; // Check if username is creative enough if db.users.exists(&user_id).unwrap() { debug!("ID already taken"); return MatrixResult(Err(Error { kind: ErrorKind::UserInUse, message: "Desired user ID is already taken.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } // TODO add check for appservice namespaces // If no if check is true we have an username that's available to be used. MatrixResult(Ok(get_username_availability::Response { available: true })) } #[post("/_matrix/client/r0/register", data = "<body>")] pub fn register_route( db: State<'_, Database>, body: Ruma<register::Request>, ) -> MatrixResult<register::Response, UiaaResponse> { if body.auth.is_none() { return MatrixResult(Err(UiaaResponse::AuthResponse(UiaaInfo { flows: vec![AuthFlow { stages: vec!["m.login.dummy".to_owned()], }], completed: vec![], params: RawValue::from_string("{}".to_owned()).unwrap(), session: Some(utils::random_string(SESSION_ID_LENGTH)), auth_error: None, }))); } // Validate user id let user_id = match UserId::parse_with_server_name( body.username .clone() .unwrap_or_else(|| utils::random_string(GUEST_NAME_LENGTH)) .to_lowercase(), db.globals.server_name(), ) .ok() .filter(|user_id| !user_id.is_historical()) { None => { debug!("Username invalid"); return MatrixResult(Err(UiaaResponse::MatrixError(Error { kind: ErrorKind::InvalidUsername, message: "Username was invalid.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, }))); } Some(user_id) => user_id, }; // Check if username is creative enough if db.users.exists(&user_id).unwrap() { debug!("ID already taken"); return MatrixResult(Err(UiaaResponse::MatrixError(Error { kind: ErrorKind::UserInUse, message: "Desired user ID is already taken.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, }))); } let password = body.password.clone().unwrap_or_default(); if let Ok(hash) = utils::calculate_hash(&password) { // Create user db.users.create(&user_id, &hash).unwrap(); } else { return MatrixResult(Err(UiaaResponse::MatrixError(Error { kind: ErrorKind::InvalidParam, message: "Password did not met requirements".to_owned(), status_code: http::StatusCode::BAD_REQUEST, }))); } // Generate new device id if the user didn't specify one let device_id = body .device_id .clone() .unwrap_or_else(|| utils::random_string(DEVICE_ID_LENGTH)); // Generate new token for the device let token = utils::random_string(TOKEN_LENGTH); // Add device db.users .create_device( &user_id, &device_id, &token, body.initial_device_display_name.clone(), ) .unwrap(); // Initial data db.account_data .update( None, &user_id, &EventType::PushRules, serde_json::to_value(ruma_events::push_rules::PushRulesEvent { content: ruma_events::push_rules::PushRulesEventContent { global: ruma_events::push_rules::Ruleset { content: vec![], override_: vec![ruma_events::push_rules::ConditionalPushRule { actions: vec![ruma_events::push_rules::Action::DontNotify], default: true, enabled: false, rule_id: ".m.rule.master".to_owned(), conditions: vec![], }], room: vec![], sender: vec![], underride: vec![ruma_events::push_rules::ConditionalPushRule { actions: vec![ ruma_events::push_rules::Action::Notify, ruma_events::push_rules::Action::SetTweak( ruma_common::push::Tweak::Sound("default".to_owned()), ), ], default: true, enabled: true, rule_id: ".m.rule.message".to_owned(), conditions: vec![ruma_events::push_rules::PushCondition::EventMatch { key: "type".to_owned(), pattern: "m.room.message".to_owned(), }], }], }, }, }) .unwrap() .as_object_mut() .unwrap(), &db.globals, ) .unwrap(); MatrixResult(Ok(register::Response { access_token: Some(token), user_id, device_id: Some(device_id), })) } #[get("/_matrix/client/r0/login")] pub fn get_login_route() -> MatrixResult<get_login_types::Response> { MatrixResult(Ok(get_login_types::Response { flows: vec![get_login_types::LoginType::Password], })) } #[post("/_matrix/client/r0/login", data = "<body>")] pub fn login_route( db: State<'_, Database>, body: Ruma<login::Request>, ) -> MatrixResult<login::Response> { // Validate login method let user_id = // TODO: Other login methods if let (login::UserInfo::MatrixId(username), login::LoginInfo::Password { password }) = (body.user.clone(), body.login_info.clone()) { if let Ok(user_id) = UserId::parse_with_server_name(username, db.globals.server_name()) { if let Some(hash) = db.users.password_hash(&user_id).unwrap() { let hash_matches = argon2::verify_encoded(&hash, password.as_bytes()).unwrap_or(false); if hash_matches { // Success! user_id } else { debug!("Invalid password."); return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "".to_owned(), status_code: http::StatusCode::FORBIDDEN, })); } } else { debug!("UserId does not exist (has no assigned password). Can't log in."); return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "".to_owned(), status_code: http::StatusCode::FORBIDDEN, })); } } else { debug!("Invalid UserId."); return MatrixResult(Err(Error { kind: ErrorKind::InvalidUsername, message: "Bad user id.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } } else { debug!("Bad login type"); return MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Bad login type.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); }; // Generate new device id if the user didn't specify one let device_id = body .body .device_id .clone() .unwrap_or_else(|| utils::random_string(DEVICE_ID_LENGTH)); // Generate a new token for the device let token = utils::random_string(TOKEN_LENGTH); // Add device db.users .create_device( &user_id, &device_id, &token, body.initial_device_display_name.clone(), ) .unwrap(); MatrixResult(Ok(login::Response { user_id, access_token: token, home_server: Some(db.globals.server_name().to_owned()), device_id, well_known: None, })) } #[post("/_matrix/client/r0/logout", data = "<body>")] pub fn logout_route( db: State<'_, Database>, body: Ruma<logout::Request>, ) -> MatrixResult<logout::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let device_id = body.device_id.as_ref().expect("user is authenticated"); db.users.remove_device(&user_id, &device_id).unwrap(); MatrixResult(Ok(logout::Response)) } #[get("/_matrix/client/r0/capabilities")] pub fn get_capabilities_route() -> MatrixResult<get_capabilities::Response> { let mut available = BTreeMap::new(); available.insert( RoomVersionId::version_5(), get_capabilities::RoomVersionStability::Stable, ); available.insert( RoomVersionId::version_6(), get_capabilities::RoomVersionStability::Stable, ); MatrixResult(Ok(get_capabilities::Response { capabilities: get_capabilities::Capabilities { change_password: None, // None means it is possible room_versions: Some(get_capabilities::RoomVersionsCapability { default: "6".to_owned(), available, }), custom_capabilities: BTreeMap::new(), }, })) } #[get("/_matrix/client/r0/pushrules", data = "<body>")] pub fn get_pushrules_all_route( db: State<'_, Database>, body: Ruma<get_pushrules_all::Request>, ) -> MatrixResult<get_pushrules_all::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if let Some(EduEvent::PushRules(pushrules)) = db .account_data .get(None, &user_id, &EventType::PushRules) .unwrap() .map(|edu| edu.deserialize().expect("PushRules event in db is valid")) { MatrixResult(Ok(get_pushrules_all::Response { global: pushrules.content.global, })) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "PushRules event not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[put( "/_matrix/client/r0/pushrules/<_scope>/<_kind>/<_rule_id>", data = "<body>" )] pub fn set_pushrule_route( db: State<'_, Database>, body: Ruma<set_pushrule::Request>, _scope: String, _kind: String, _rule_id: String, ) -> MatrixResult<set_pushrule::Response> { // TODO warn!("TODO: set_pushrule_route"); MatrixResult(Ok(set_pushrule::Response)) } #[put("/_matrix/client/r0/pushrules/<_scope>/<_kind>/<_rule_id>/enabled")] pub fn set_pushrule_enabled_route( _scope: String, _kind: String, _rule_id: String, ) -> MatrixResult<set_pushrule_enabled::Response> { // TODO warn!("TODO: set_pushrule_enabled_route"); MatrixResult(Ok(set_pushrule_enabled::Response)) } #[get("/_matrix/client/r0/user/<_user_id>/filter/<_filter_id>")] pub fn get_filter_route( _user_id: String, _filter_id: String, ) -> MatrixResult<get_filter::Response> { // TODO MatrixResult(Ok(get_filter::Response { filter: filter::FilterDefinition { event_fields: None, event_format: None, account_data: None, room: None, presence: None, }, })) } #[post("/_matrix/client/r0/user/<_user_id>/filter")] pub fn create_filter_route(_user_id: String) -> MatrixResult<create_filter::Response> { // TODO MatrixResult(Ok(create_filter::Response { filter_id: utils::random_string(10), })) } #[put( "/_matrix/client/r0/user/<_user_id>/account_data/<_type>", data = "<body>" )] pub fn set_global_account_data_route( db: State<'_, Database>, body: Ruma<set_global_account_data::Request>, _user_id: String, _type: String, ) -> MatrixResult<set_global_account_data::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); db.account_data .update( None, user_id, &EventType::try_from(&body.event_type).unwrap(), json!({"content": serde_json::from_str::<serde_json::Value>(body.data.get()).unwrap()}) .as_object_mut() .unwrap(), &db.globals, ) .unwrap(); MatrixResult(Ok(set_global_account_data::Response)) } #[get( "/_matrix/client/r0/user/<_user_id>/account_data/<_type>", data = "<body>" )] pub fn get_global_account_data_route( db: State<'_, Database>, body: Ruma<get_global_account_data::Request>, _user_id: String, _type: String, ) -> MatrixResult<get_global_account_data::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if let Some(data) = db .account_data .get( None, user_id, &EventType::try_from(&body.event_type).unwrap(), ) .unwrap() { MatrixResult(Ok(get_global_account_data::Response { account_data: data })) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Data not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[put("/_matrix/client/r0/profile/<_user_id>/displayname", data = "<body>")] pub fn set_displayname_route( db: State<'_, Database>, body: Ruma<set_display_name::Request>, _user_id: String, ) -> MatrixResult<set_display_name::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); db.users .set_displayname(&user_id, body.displayname.clone()) .unwrap(); // Send a new membership event into all joined rooms for room_id in db.rooms.rooms_joined(&user_id) { let room_id = room_id.unwrap(); db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomMember, serde_json::to_value(ruma_events::room::member::MemberEventContent { displayname: body.displayname.clone(), ..serde_json::from_value::<EventJson<_>>( db.rooms .room_state(&room_id) .unwrap() .get(&(EventType::RoomMember, user_id.to_string())) .expect("user is part of the room") .content .clone(), ) .unwrap() .deserialize() .unwrap() }) .unwrap(), None, Some(user_id.to_string()), None, &db.globals, ) .unwrap(); } // Presence update db.global_edus .update_presence( ruma_events::presence::PresenceEvent { content: ruma_events::presence::PresenceEventContent { avatar_url: db.users.avatar_url(&user_id).unwrap(), currently_active: None, displayname: db.users.displayname(&user_id).unwrap(), last_active_ago: Some(utils::millis_since_unix_epoch().try_into().unwrap()), presence: ruma_events::presence::PresenceState::Online, status_msg: None, }, sender: user_id.clone(), }, &db.globals, ) .unwrap(); MatrixResult(Ok(set_display_name::Response)) } #[get("/_matrix/client/r0/profile/<_user_id>/displayname", data = "<body>")] pub fn get_displayname_route( db: State<'_, Database>, body: Ruma<get_display_name::Request>, _user_id: String, ) -> MatrixResult<get_display_name::Response> { let user_id = (*body).user_id.clone(); MatrixResult(Ok(get_display_name::Response { displayname: db.users.displayname(&user_id).unwrap(), })) } #[put("/_matrix/client/r0/profile/<_user_id>/avatar_url", data = "<body>")] pub fn set_avatar_url_route( db: State<'_, Database>, body: Ruma<set_avatar_url::Request>, _user_id: String, ) -> MatrixResult<set_avatar_url::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if let Some(avatar_url) = &body.avatar_url { if !avatar_url.starts_with("mxc://") { debug!("Request contains an invalid avatar_url."); return MatrixResult(Err(Error { kind: ErrorKind::InvalidParam, message: "avatar_url has to start with mxc://.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } // TODO in the future when we can handle media uploads make sure that this url is our own server // TODO also make sure this is valid mxc:// format (not only starting with it) } db.users .set_avatar_url(&user_id, body.avatar_url.clone()) .unwrap(); // Send a new membership event into all joined rooms for room_id in db.rooms.rooms_joined(&user_id) { let room_id = room_id.unwrap(); db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomMember, serde_json::to_value(ruma_events::room::member::MemberEventContent { avatar_url: body.avatar_url.clone(), ..serde_json::from_value::<EventJson<_>>( db.rooms .room_state(&room_id) .unwrap() .get(&(EventType::RoomMember, user_id.to_string())) .expect("user should be part of the room") .content .clone(), ) .unwrap() .deserialize() .unwrap() }) .unwrap(), None, Some(user_id.to_string()), None, &db.globals, ) .unwrap(); } // Presence update db.global_edus .update_presence( ruma_events::presence::PresenceEvent { content: ruma_events::presence::PresenceEventContent { avatar_url: db.users.avatar_url(&user_id).unwrap(), currently_active: None, displayname: db.users.displayname(&user_id).unwrap(), last_active_ago: Some(utils::millis_since_unix_epoch().try_into().unwrap()), presence: ruma_events::presence::PresenceState::Online, status_msg: None, }, sender: user_id.clone(), }, &db.globals, ) .unwrap(); MatrixResult(Ok(set_avatar_url::Response)) } #[get("/_matrix/client/r0/profile/<_user_id>/avatar_url", data = "<body>")] pub fn get_avatar_url_route( db: State<'_, Database>, body: Ruma<get_avatar_url::Request>, _user_id: String, ) -> MatrixResult<get_avatar_url::Response> { let user_id = (*body).user_id.clone(); MatrixResult(Ok(get_avatar_url::Response { avatar_url: db.users.avatar_url(&user_id).unwrap(), })) } #[get("/_matrix/client/r0/profile/<_user_id>", data = "<body>")] pub fn get_profile_route( db: State<'_, Database>, body: Ruma<get_profile::Request>, _user_id: String, ) -> MatrixResult<get_profile::Response> { let user_id = (*body).user_id.clone(); let avatar_url = db.users.avatar_url(&user_id).unwrap(); let displayname = db.users.displayname(&user_id).unwrap(); if avatar_url.is_some() || displayname.is_some() { return MatrixResult(Ok(get_profile::Response { avatar_url, displayname, })); } // Return 404 if we don't have a profile for this id debug!("Profile was not found."); MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Profile was not found.".to_owned(), status_code: http::StatusCode::NOT_FOUND, })) } #[put("/_matrix/client/r0/presence/<_user_id>/status", data = "<body>")] pub fn set_presence_route( db: State<'_, Database>, body: Ruma<set_presence::Request>, _user_id: String, ) -> MatrixResult<set_presence::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); db.global_edus .update_presence( ruma_events::presence::PresenceEvent { content: ruma_events::presence::PresenceEventContent { avatar_url: db.users.avatar_url(&user_id).unwrap(), currently_active: None, displayname: db.users.displayname(&user_id).unwrap(), last_active_ago: Some(utils::millis_since_unix_epoch().try_into().unwrap()), presence: body.presence, status_msg: body.status_msg.clone(), }, sender: user_id.clone(), }, &db.globals, ) .unwrap(); MatrixResult(Ok(set_presence::Response)) } #[post("/_matrix/client/r0/keys/upload", data = "<body>")] pub fn upload_keys_route( db: State<'_, Database>, body: Ruma<upload_keys::Request>, ) -> MatrixResult<upload_keys::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let device_id = body.device_id.as_ref().expect("user is authenticated"); if let Some(one_time_keys) = &body.one_time_keys { for (key_key, key_value) in one_time_keys { db.users .add_one_time_key(user_id, device_id, key_key, key_value) .unwrap(); } } if let Some(device_keys) = &body.device_keys { db.users .add_device_keys(user_id, device_id, device_keys, &db.globals) .unwrap(); } MatrixResult(Ok(upload_keys::Response { one_time_key_counts: db.users.count_one_time_keys(user_id, device_id).unwrap(), })) } #[post("/_matrix/client/r0/keys/query", data = "<body>")] pub fn get_keys_route( db: State<'_, Database>, body: Ruma<get_keys::Request>, ) -> MatrixResult<get_keys::Response> { let mut device_keys = BTreeMap::new(); for (user_id, device_ids) in &body.device_keys { if device_ids.is_empty() { let mut container = BTreeMap::new(); for (device_id, mut keys) in db .users .all_device_keys(&user_id.clone()) .map(|r| r.unwrap()) { let metadata = db .users .get_device_metadata(user_id, &device_id) .unwrap() .expect("this device should exist"); keys.unsigned = Some(keys::UnsignedDeviceInfo { device_display_name: metadata.display_name, }); container.insert(device_id, keys); } device_keys.insert(user_id.clone(), container); } else { for device_id in device_ids { let mut container = BTreeMap::new(); for keys in db.users.get_device_keys(&user_id.clone(), &device_id) { let mut keys = keys.unwrap(); let metadata = db .users .get_device_metadata(user_id, &device_id) .unwrap() .expect("this device should exist"); keys.unsigned = Some(keys::UnsignedDeviceInfo { device_display_name: metadata.display_name, }); container.insert(device_id.clone(), keys); } device_keys.insert(user_id.clone(), container); } } } MatrixResult(Ok(get_keys::Response { failures: BTreeMap::new(), device_keys, })) } #[post("/_matrix/client/r0/keys/claim", data = "<body>")] pub fn claim_keys_route( db: State<'_, Database>, body: Ruma<claim_keys::Request>, ) -> MatrixResult<claim_keys::Response> { let mut one_time_keys = BTreeMap::new(); for (user_id, map) in &body.one_time_keys { let mut container = BTreeMap::new(); for (device_id, key_algorithm) in map { if let Some(one_time_keys) = db .users .take_one_time_key(user_id, device_id, key_algorithm) .unwrap() { let mut c = BTreeMap::new(); c.insert(one_time_keys.0, one_time_keys.1); container.insert(device_id.clone(), c); } } one_time_keys.insert(user_id.clone(), container); } MatrixResult(Ok(claim_keys::Response { failures: BTreeMap::new(), one_time_keys, })) } #[post("/_matrix/client/r0/rooms/<_room_id>/read_markers", data = "<body>")] pub fn set_read_marker_route( db: State<'_, Database>, body: Ruma<set_read_marker::Request>, _room_id: String, ) -> MatrixResult<set_read_marker::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); db.account_data .update( Some(&body.room_id), &user_id, &EventType::FullyRead, serde_json::to_value(ruma_events::fully_read::FullyReadEvent { content: ruma_events::fully_read::FullyReadEventContent { event_id: body.fully_read.clone(), }, room_id: Some(body.room_id.clone()), }) .unwrap() .as_object_mut() .unwrap(), &db.globals, ) .unwrap(); if let Some(event) = &body.read_receipt { db.rooms .edus .room_read_set( &body.room_id, &user_id, db.rooms .get_pdu_count(event) .unwrap() .expect("TODO: what if a client specifies an invalid event"), ) .unwrap(); let mut user_receipts = BTreeMap::new(); user_receipts.insert( user_id.clone(), ruma_events::receipt::Receipt { ts: Some(SystemTime::now()), }, ); let mut receipt_content = BTreeMap::new(); receipt_content.insert( event.clone(), ruma_events::receipt::Receipts { read: Some(user_receipts), }, ); db.rooms .edus .roomlatest_update( &user_id, &body.room_id, EduEvent::Receipt(ruma_events::receipt::ReceiptEvent { content: receipt_content, room_id: None, // None because it can be inferred }), &db.globals, ) .unwrap(); } MatrixResult(Ok(set_read_marker::Response)) } #[put( "/_matrix/client/r0/rooms/<_room_id>/typing/<_user_id>", data = "<body>" )] pub fn create_typing_event_route( db: State<'_, Database>, body: Ruma<create_typing_event::Request>, _room_id: String, _user_id: String, ) -> MatrixResult<create_typing_event::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if body.typing { db.rooms .edus .roomactive_add( &user_id, &body.room_id, body.timeout.map(|d| d.as_millis() as u64).unwrap_or(30000) + utils::millis_since_unix_epoch().try_into().unwrap_or(0), &db.globals, ) .unwrap(); } else { db.rooms .edus .roomactive_remove(&user_id, &body.room_id, &db.globals) .unwrap(); } MatrixResult(Ok(create_typing_event::Response)) } #[post("/_matrix/client/r0/createRoom", data = "<body>")] pub fn create_room_route( db: State<'_, Database>, body: Ruma<create_room::Request>, ) -> MatrixResult<create_room::Response> { let room_id = RoomId::new(db.globals.server_name()).expect("host is valid"); let user_id = body.user_id.as_ref().expect("user is authenticated"); let alias = if let Some(localpart) = &body.room_alias_name { // TODO: Check for invalid characters and maximum length if let Ok(alias) = RoomAliasId::try_from(format!("#{}:{}", localpart, db.globals.server_name())) { if db.rooms.id_from_alias(&alias).unwrap().is_some() { return MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Alias already exists.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } Some(alias) } else { return MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Invalid alias.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } } else { None }; // 1. The room create event db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomCreate, serde_json::to_value(ruma_events::room::create::CreateEventContent { creator: user_id.clone(), federate: body.creation_content.as_ref().map_or(true, |c| c.federate), predecessor: body .creation_content .as_ref() .and_then(|c| c.predecessor.clone()), room_version: RoomVersionId::version_6(), }) .unwrap(), None, Some("".to_owned()), None, &db.globals, ) .unwrap(); // 2. Let the room creator join db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomMember, serde_json::to_value(member::MemberEventContent { membership: member::MembershipState::Join, displayname: db.users.displayname(&user_id).unwrap(), avatar_url: db.users.avatar_url(&user_id).unwrap(), is_direct: body.is_direct, third_party_invite: None, }) .unwrap(), None, Some(user_id.to_string()), None, &db.globals, ) .unwrap(); // Figure out preset. We need it for power levels and preset specific events let visibility = body.visibility.unwrap_or(room::Visibility::Private); let preset = body.preset.unwrap_or_else(|| match visibility { room::Visibility::Private => create_room::RoomPreset::PrivateChat, room::Visibility::Public => create_room::RoomPreset::PublicChat, }); // 3. Power levels let mut users = BTreeMap::new(); users.insert(user_id.clone(), 100.into()); for invite_user_id in &body.invite { users.insert(invite_user_id.clone(), 100.into()); } let power_levels_content = if let Some(power_levels) = &body.power_level_content_override { serde_json::from_str(power_levels.json().get()) .expect("TODO: handle. we hope the client sends a valid power levels json") } else { serde_json::to_value(ruma_events::room::power_levels::PowerLevelsEventContent { ban: 50.into(), events: BTreeMap::new(), events_default: 0.into(), invite: 50.into(), kick: 50.into(), redact: 50.into(), state_default: 50.into(), users, users_default: 0.into(), notifications: ruma_events::room::power_levels::NotificationPowerLevels { room: 50.into(), }, }) .unwrap() }; db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomPowerLevels, power_levels_content, None, Some("".to_owned()), None, &db.globals, ) .unwrap(); // 4. Events set by preset // 4.1 Join Rules db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomJoinRules, match preset { create_room::RoomPreset::PublicChat => { serde_json::to_value(join_rules::JoinRulesEventContent { join_rule: join_rules::JoinRule::Public, }) .unwrap() } _ => serde_json::to_value(join_rules::JoinRulesEventContent { join_rule: join_rules::JoinRule::Invite, }) .unwrap(), }, None, Some("".to_owned()), None, &db.globals, ) .unwrap(); // 4.2 History Visibility db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomHistoryVisibility, serde_json::to_value(history_visibility::HistoryVisibilityEventContent { history_visibility: history_visibility::HistoryVisibility::Shared, }) .unwrap(), None, Some("".to_owned()), None, &db.globals, ) .unwrap(); // 4.3 Guest Access db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomGuestAccess, match preset { create_room::RoomPreset::PublicChat => { serde_json::to_value(guest_access::GuestAccessEventContent { guest_access: guest_access::GuestAccess::Forbidden, }) .unwrap() } _ => serde_json::to_value(guest_access::GuestAccessEventContent { guest_access: guest_access::GuestAccess::CanJoin, }) .unwrap(), }, None, Some("".to_owned()), None, &db.globals, ) .unwrap(); // 5. Events listed in initial_state for create_room::InitialStateEvent { event_type, state_key, content, } in &body.initial_state { db.rooms .append_pdu( room_id.clone(), user_id.clone(), event_type.clone(), serde_json::from_str(content.get()).unwrap(), None, state_key.clone(), None, &db.globals, ) .unwrap(); } // 6. Events implied by name and topic if let Some(name) = &body.name { db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomName, serde_json::to_value( ruma_events::room::name::NameEventContent::new(name.clone()).unwrap(), ) .unwrap(), None, Some("".to_owned()), None, &db.globals, ) .unwrap(); } if let Some(topic) = &body.topic { db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomTopic, serde_json::to_value(ruma_events::room::topic::TopicEventContent { topic: topic.clone(), }) .unwrap(), None, Some("".to_owned()), None, &db.globals, ) .unwrap(); } // 7. Events implied by invite (and TODO: invite_3pid) for user in &body.invite { db.rooms .append_pdu( room_id.clone(), user_id.clone(), EventType::RoomMember, serde_json::to_value(member::MemberEventContent { membership: member::MembershipState::Invite, displayname: db.users.displayname(&user).unwrap(), avatar_url: db.users.avatar_url(&user).unwrap(), is_direct: body.is_direct, third_party_invite: None, }) .unwrap(), None, Some(user.to_string()), None, &db.globals, ) .unwrap(); } // Homeserver specific stuff if let Some(alias) = alias { db.rooms .set_alias(&alias, Some(&room_id), &db.globals) .unwrap(); } if let Some(room::Visibility::Public) = body.visibility { db.rooms.set_public(&room_id, true).unwrap(); } MatrixResult(Ok(create_room::Response { room_id })) } #[put( "/_matrix/client/r0/rooms/<_room_id>/redact/<_event_id>/<_txn_id>", data = "<body>" )] pub fn redact_event_route( db: State<'_, Database>, body: Ruma<redact_event::Request>, _room_id: String, _event_id: String, _txn_id: String, ) -> MatrixResult<redact_event::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if let Ok(event_id) = db.rooms.append_pdu( body.room_id.clone(), user_id.clone(), EventType::RoomRedaction, serde_json::to_value(redaction::RedactionEventContent { reason: body.reason.clone(), }) .unwrap(), None, None, Some(body.event_id.clone()), &db.globals, ) { MatrixResult(Ok(redact_event::Response { event_id })) } else { MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Failed to redact event.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[put("/_matrix/client/r0/directory/room/<_room_alias>", data = "<body>")] pub fn create_alias_route( db: State<'_, Database>, body: Ruma<create_alias::Request>, _room_alias: String, ) -> MatrixResult<create_alias::Response> { if db.rooms.id_from_alias(&body.room_alias).unwrap().is_some() { return MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Alias already exists".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } db.rooms .set_alias(&body.room_alias, Some(&body.room_id), &db.globals) .unwrap(); MatrixResult(Ok(create_alias::Response)) } #[delete("/_matrix/client/r0/directory/room/<_room_alias>", data = "<body>")] pub fn delete_alias_route( db: State<'_, Database>, body: Ruma<delete_alias::Request>, _room_alias: String, ) -> MatrixResult<delete_alias::Response> { db.rooms .set_alias(&body.room_alias, None, &db.globals) .unwrap(); MatrixResult(Ok(delete_alias::Response)) } #[get("/_matrix/client/r0/directory/room/<_room_alias>", data = "<body>")] pub fn get_alias_route( db: State<'_, Database>, body: Ruma<get_alias::Request>, _room_alias: String, ) -> MatrixResult<get_alias::Response> { if body.room_alias.server_name() == db.globals.server_name() { if let Some(room_id) = db.rooms.id_from_alias(&body.room_alias).unwrap() { MatrixResult(Ok(get_alias::Response { room_id, servers: vec![db.globals.server_name().to_owned()], })) } else { debug!("Room alias not found."); MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Room with alias not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } else { todo!("ask remote server"); } } #[post("/_matrix/client/r0/rooms/<_room_id>/join", data = "<body>")] pub fn join_room_by_id_route( db: State<'_, Database>, body: Ruma<join_room_by_id::Request>, _room_id: String, ) -> MatrixResult<join_room_by_id::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); // TODO: Ask a remote server if we don't have this room let event = db .rooms .room_state(&body.room_id) .unwrap() .get(&(EventType::RoomMember, user_id.to_string())) .map_or_else( || { // There was no existing membership event member::MemberEventContent { membership: member::MembershipState::Join, displayname: db.users.displayname(&user_id).unwrap(), avatar_url: db.users.avatar_url(&user_id).unwrap(), is_direct: None, third_party_invite: None, } }, |pdu| { // We change the existing membership event let mut event = serde_json::from_value::<EventJson<member::MemberEventContent>>( pdu.content.clone(), ) .unwrap() .deserialize() .unwrap(); event.membership = member::MembershipState::Join; event.displayname = db.users.displayname(&user_id).unwrap(); event.avatar_url = db.users.avatar_url(&user_id).unwrap(); event }, ); db.rooms .append_pdu( body.room_id.clone(), user_id.clone(), EventType::RoomMember, serde_json::to_value(event).unwrap(), None, Some(user_id.to_string()), None, &db.globals, ) .unwrap(); MatrixResult(Ok(join_room_by_id::Response { room_id: body.room_id.clone(), })) } #[post("/_matrix/client/r0/join/<_room_id_or_alias>", data = "<body>")] pub fn join_room_by_id_or_alias_route( db: State<'_, Database>, body: Ruma<join_room_by_id_or_alias::Request>, _room_id_or_alias: String, ) -> MatrixResult<join_room_by_id_or_alias::Response> { let room_id = match RoomId::try_from(body.room_id_or_alias.clone()) { Ok(room_id) => room_id, Err(_) => { if let Some(room_id) = db .rooms .id_from_alias(&body.room_id_or_alias.clone().try_into().unwrap()) .unwrap() { room_id } else { // Ask creator server of the room to join TODO ask someone else when not available //server_server::send_request(data, destination, request) return MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Room alias not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } } }; let body = Ruma { user_id: body.user_id.clone(), device_id: body.device_id.clone(), json_body: None, body: join_room_by_id::Request { room_id, third_party_signed: body.third_party_signed.clone(), }, }; MatrixResult(match join_room_by_id_route(db, body, "".to_owned()).0 { Ok(response) => Ok(join_room_by_id_or_alias::Response { room_id: response.room_id, }), Err(e) => Err(e), }) } #[post("/_matrix/client/r0/rooms/<_room_id>/leave", data = "<body>")] pub fn leave_room_route( db: State<'_, Database>, body: Ruma<leave_room::Request>, _room_id: String, ) -> MatrixResult<leave_room::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let state = db.rooms.room_state(&body.room_id).unwrap(); let mut event = serde_json::from_value::<EventJson<ruma_events::room::member::MemberEventContent>>( state .get(&(EventType::RoomMember, user_id.to_string())) .unwrap() // TODO: error handling .content .clone(), ) .unwrap() .deserialize() .unwrap(); event.membership = ruma_events::room::member::MembershipState::Leave; db.rooms .append_pdu( body.room_id.clone(), user_id.clone(), EventType::RoomMember, serde_json::to_value(event).unwrap(), None, Some(user_id.to_string()), None, &db.globals, ) .unwrap(); MatrixResult(Ok(leave_room::Response)) } #[post("/_matrix/client/r0/rooms/<_room_id>/kick", data = "<body>")] pub fn kick_user_route( db: State<'_, Database>, body: Ruma<kick_user::Request>, _room_id: String, ) -> MatrixResult<kick_user::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let state = db.rooms.room_state(&body.room_id).unwrap(); let mut event = serde_json::from_value::<EventJson<ruma_events::room::member::MemberEventContent>>( state .get(&(EventType::RoomMember, user_id.to_string())) .unwrap() // TODO: error handling .content .clone(), ) .unwrap() .deserialize() .unwrap(); event.membership = ruma_events::room::member::MembershipState::Leave; // TODO: reason db.rooms .append_pdu( body.room_id.clone(), user_id.clone(), // Sender EventType::RoomMember, serde_json::to_value(event).unwrap(), None, Some(body.body.user_id.to_string()), None, &db.globals, ) .unwrap(); MatrixResult(Ok(kick_user::Response)) } #[post("/_matrix/client/r0/rooms/<_room_id>/ban", data = "<body>")] pub fn ban_user_route( db: State<'_, Database>, body: Ruma<ban_user::Request>, _room_id: String, ) -> MatrixResult<ban_user::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let state = db.rooms.room_state(&body.room_id).unwrap(); let mut event = serde_json::from_value::<EventJson<ruma_events::room::member::MemberEventContent>>( state .get(&(EventType::RoomMember, user_id.to_string())) .unwrap() // TODO: error handling .content .clone(), ) .unwrap() .deserialize() .unwrap(); event.membership = ruma_events::room::member::MembershipState::Ban; // TODO: reason db.rooms .append_pdu( body.room_id.clone(), user_id.clone(), // Sender EventType::RoomMember, serde_json::to_value(event).unwrap(), None, Some(body.body.user_id.to_string()), None, &db.globals, ) .unwrap(); MatrixResult(Ok(ban_user::Response)) } #[post("/_matrix/client/r0/rooms/<_room_id>/unban", data = "<body>")] pub fn unban_user_route( db: State<'_, Database>, body: Ruma<unban_user::Request>, _room_id: String, ) -> MatrixResult<unban_user::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let state = db.rooms.room_state(&body.room_id).unwrap(); let mut event = serde_json::from_value::<EventJson<ruma_events::room::member::MemberEventContent>>( state .get(&(EventType::RoomMember, user_id.to_string())) .unwrap() // TODO: error handling .content .clone(), ) .unwrap() .deserialize() .unwrap(); event.membership = ruma_events::room::member::MembershipState::Leave; db.rooms .append_pdu( body.room_id.clone(), user_id.clone(), // Sender EventType::RoomMember, serde_json::to_value(event).unwrap(), None, Some(body.body.user_id.to_string()), None, &db.globals, ) .unwrap(); MatrixResult(Ok(unban_user::Response)) } #[post("/_matrix/client/r0/rooms/<_room_id>/forget", data = "<body>")] pub fn forget_room_route( db: State<'_, Database>, body: Ruma<forget_room::Request>, _room_id: String, ) -> MatrixResult<forget_room::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); db.rooms.forget(&body.room_id, &user_id).unwrap(); MatrixResult(Ok(forget_room::Response)) } #[post("/_matrix/client/r0/rooms/<_room_id>/invite", data = "<body>")] pub fn invite_user_route( db: State<'_, Database>, body: Ruma<invite_user::Request>, _room_id: String, ) -> MatrixResult<invite_user::Response> { if let invite_user::InvitationRecipient::UserId { user_id } = &body.recipient { db.rooms .append_pdu( body.room_id.clone(), body.user_id.clone().expect("user is authenticated"), EventType::RoomMember, serde_json::to_value(member::MemberEventContent { membership: member::MembershipState::Invite, displayname: db.users.displayname(&user_id).unwrap(), avatar_url: db.users.avatar_url(&user_id).unwrap(), is_direct: None, third_party_invite: None, }) .unwrap(), None, Some(user_id.to_string()), None, &db.globals, ) .unwrap(); MatrixResult(Ok(invite_user::Response)) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "User not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[put("/_matrix/client/r0/directory/list/room/<_room_id>", data = "<body>")] pub async fn set_room_visibility_route( db: State<'_, Database>, body: Ruma<set_room_visibility::Request>, _room_id: String, ) -> MatrixResult<set_room_visibility::Response> { match body.visibility { room::Visibility::Public => db.rooms.set_public(&body.room_id, true).unwrap(), room::Visibility::Private => db.rooms.set_public(&body.room_id, false).unwrap(), } MatrixResult(Ok(set_room_visibility::Response)) } #[get("/_matrix/client/r0/directory/list/room/<_room_id>", data = "<body>")] pub async fn get_room_visibility_route( db: State<'_, Database>, body: Ruma<get_room_visibility::Request>, _room_id: String, ) -> MatrixResult<get_room_visibility::Response> { MatrixResult(Ok(get_room_visibility::Response { visibility: if db.rooms.is_public_room(&body.room_id).unwrap() { room::Visibility::Public } else { room::Visibility::Private }, })) } #[get("/_matrix/client/r0/publicRooms", data = "<body>")] pub async fn get_public_rooms_route( db: State<'_, Database>, body: Ruma<get_public_rooms::Request>, ) -> MatrixResult<get_public_rooms::Response> { let Ruma { body: get_public_rooms::Request { limit, server, since, }, user_id, device_id, json_body, } = body; let response = get_public_rooms_filtered_route( db, Ruma { body: get_public_rooms_filtered::Request { filter: None, limit, room_network: get_public_rooms_filtered::RoomNetwork::Matrix, server, since, }, user_id, device_id, json_body, }, ) .await; MatrixResult(match response.0 { Ok(get_public_rooms_filtered::Response { chunk, prev_batch, next_batch, total_room_count_estimate, }) => Ok(get_public_rooms::Response { chunk, prev_batch, next_batch, total_room_count_estimate, }), Err(e) => Err(e), }) } #[post("/_matrix/client/r0/publicRooms", data = "<body>")] pub async fn get_public_rooms_filtered_route( db: State<'_, Database>, body: Ruma<get_public_rooms_filtered::Request>, ) -> MatrixResult<get_public_rooms_filtered::Response> { let mut chunk = db .rooms .public_rooms() .map(|room_id| { let room_id = room_id.unwrap(); let state = db.rooms.room_state(&room_id).unwrap(); directory::PublicRoomsChunk { aliases: Vec::new(), canonical_alias: state.get(&(EventType::RoomCanonicalAlias, "".to_owned())).and_then(|s| { serde_json::from_value::< EventJson<ruma_events::room::canonical_alias::CanonicalAliasEventContent>, >(s.content.clone()) .unwrap() .deserialize() .unwrap() .alias }), name: state.get(&(EventType::RoomName, "".to_owned())).map(|s| { serde_json::from_value::<EventJson<ruma_events::room::name::NameEventContent>>( s.content.clone(), ) .unwrap() .deserialize() .unwrap() .name() .unwrap() .to_owned() }), num_joined_members: (db.rooms.room_members(&room_id).count() as u32).into(), room_id, topic: state.get(&(EventType::RoomTopic, "".to_owned())).map(|s| { serde_json::from_value::< EventJson<ruma_events::room::topic::TopicEventContent>, >(s.content.clone()) .unwrap() .deserialize() .unwrap() .topic }), world_readable: state.get(&(EventType::RoomHistoryVisibility, "".to_owned())).map_or(false, |s| { serde_json::from_value::< EventJson<ruma_events::room::history_visibility::HistoryVisibilityEventContent>, >(s.content.clone()) .unwrap() .deserialize() .unwrap() .history_visibility == history_visibility::HistoryVisibility::WorldReadable }), guest_can_join: state.get(&(EventType::RoomGuestAccess, "".to_owned())).map_or(false, |s| { serde_json::from_value::< EventJson<ruma_events::room::guest_access::GuestAccessEventContent>, >(s.content.clone()) .unwrap() .deserialize() .unwrap() .guest_access == guest_access::GuestAccess::CanJoin }), avatar_url: state.get(&(EventType::RoomAvatar, "".to_owned())).map(|s| { serde_json::from_value::< EventJson<ruma_events::room::avatar::AvatarEventContent>, >(s.content.clone()) .unwrap() .deserialize() .unwrap() .url }), } }) .collect::<Vec<_>>(); chunk.sort_by(|l, r| r.num_joined_members.cmp(&l.num_joined_members)); /* chunk.extend_from_slice( &server_server::send_request( &db, "privacytools.io".to_owned(), ruma_federation_api::v1::get_public_rooms::Request { limit: Some(20_u32.into()), since: None, room_network: ruma_federation_api::v1::get_public_rooms::RoomNetwork::Matrix, }, ) .await .unwrap() .chunk .into_iter() .map(|c| serde_json::from_str(&serde_json::to_string(&c).unwrap()).unwrap()) .collect::<Vec<_>>(), ); */ let total_room_count_estimate = (chunk.len() as u32).into(); MatrixResult(Ok(get_public_rooms_filtered::Response { chunk, prev_batch: None, next_batch: None, total_room_count_estimate: Some(total_room_count_estimate), })) } #[post("/_matrix/client/r0/user_directory/search", data = "<body>")] pub fn search_users_route( db: State<'_, Database>, body: Ruma<search_users::Request>, ) -> MatrixResult<search_users::Response> { MatrixResult(Ok(search_users::Response { results: db .users .iter() .map(Result::unwrap) .map(|user_id| search_users::User { user_id: user_id.clone(), display_name: db.users.displayname(&user_id).unwrap(), avatar_url: db.users.avatar_url(&user_id).unwrap(), }) .filter(|user| { user.user_id.to_string().contains(&body.search_term) || user .display_name .as_ref() .filter(|name| name.contains(&body.search_term)) .is_some() }) .collect(), limited: false, })) } #[get("/_matrix/client/r0/rooms/<_room_id>/members")] pub fn get_member_events_route(_room_id: String) -> MatrixResult<get_member_events::Response> { warn!("TODO: get_member_events_route"); MatrixResult(Ok(get_member_events::Response { chunk: Vec::new() })) } #[get("/_matrix/client/r0/thirdparty/protocols")] pub fn get_protocols_route() -> MatrixResult<get_protocols::Response> { warn!("TODO: get_protocols_route"); MatrixResult(Ok(get_protocols::Response { protocols: BTreeMap::new(), })) } #[put( "/_matrix/client/r0/rooms/<_room_id>/send/<_event_type>/<_txn_id>", data = "<body>" )] pub fn create_message_event_route( db: State<'_, Database>, body: Ruma<create_message_event::Request>, _room_id: String, _event_type: String, _txn_id: String, ) -> MatrixResult<create_message_event::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let mut unsigned = serde_json::Map::new(); unsigned.insert("transaction_id".to_owned(), body.txn_id.clone().into()); if let Ok(event_id) = db.rooms.append_pdu( body.room_id.clone(), user_id.clone(), body.event_type.clone(), serde_json::from_str(body.json_body.unwrap().get()).unwrap(), Some(unsigned), None, None, &db.globals, ) { MatrixResult(Ok(create_message_event::Response { event_id })) } else { MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Failed to send message.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[put( "/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>/<_state_key>", data = "<body>" )] pub fn create_state_event_for_key_route( db: State<'_, Database>, body: Ruma<create_state_event_for_key::Request>, _room_id: String, _event_type: String, _state_key: String, ) -> MatrixResult<create_state_event_for_key::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let content = serde_json::from_str::<serde_json::Value>(body.json_body.clone().unwrap().get()).unwrap(); if body.event_type == EventType::RoomCanonicalAlias { let canonical_alias = serde_json::from_value::< EventJson<canonical_alias::CanonicalAliasEventContent>, >(content.clone()) .unwrap() .deserialize() .unwrap(); let mut aliases = canonical_alias.alt_aliases; if let Some(alias) = canonical_alias.alias { aliases.push(alias); } for alias in aliases { if alias.server_name() != db.globals.server_name() || db .rooms .id_from_alias(&alias) .unwrap() .filter(|room| room == &body.room_id) // Make sure it's the right room .is_none() { return MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "You are only allowed to send canonical_alias events when it's aliases already exists".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } } } if let Ok(event_id) = db.rooms.append_pdu( body.room_id.clone(), user_id.clone(), body.event_type.clone(), content, None, Some(body.state_key.clone()), None, &db.globals, ) { MatrixResult(Ok(create_state_event_for_key::Response { event_id })) } else { MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Failed to send event.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[put( "/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>", data = "<body>" )] pub fn create_state_event_for_empty_key_route( db: State<'_, Database>, body: Ruma<create_state_event_for_empty_key::Request>, _room_id: String, _event_type: String, ) -> MatrixResult<create_state_event_for_empty_key::Response> { // This just calls create_state_event_for_key_route let Ruma { body: create_state_event_for_empty_key::Request { room_id, event_type, data, }, user_id, device_id, json_body, } = body; let response = create_state_event_for_key_route( db, Ruma { body: create_state_event_for_key::Request { room_id, event_type, data, state_key: "".to_owned(), }, user_id, device_id, json_body, }, _room_id, _event_type, "".to_owned(), ); MatrixResult(match response.0 { Ok(create_state_event_for_key::Response { event_id }) => { Ok(create_state_event_for_empty_key::Response { event_id }) } Err(e) => Err(e), }) } #[get("/_matrix/client/r0/rooms/<_room_id>/state", data = "<body>")] pub fn get_state_events_route( db: State<'_, Database>, body: Ruma<get_state_events::Request>, _room_id: String, ) -> MatrixResult<get_state_events::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "You don't have permission to view the room state.".to_owned(), status_code: http::StatusCode::FORBIDDEN, })); } MatrixResult(Ok(get_state_events::Response { room_state: db .rooms .room_state(&body.room_id) .unwrap() .values() .map(|pdu| pdu.to_state_event()) .collect(), })) } #[get( "/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>/<_state_key>", data = "<body>" )] pub fn get_state_events_for_key_route( db: State<'_, Database>, body: Ruma<get_state_events_for_key::Request>, _room_id: String, _event_type: String, _state_key: String, ) -> MatrixResult<get_state_events_for_key::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "You don't have permission to view the room state.".to_owned(), status_code: http::StatusCode::FORBIDDEN, })); } if let Some(event) = db .rooms .room_state(&body.room_id) .unwrap() .get(&(body.event_type.clone(), body.state_key.clone())) { MatrixResult(Ok(get_state_events_for_key::Response { content: serde_json::value::to_raw_value(&event.content).unwrap(), })) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "State event not found.".to_owned(), status_code: http::StatusCode::NOT_FOUND, })) } } #[get( "/_matrix/client/r0/rooms/<_room_id>/state/<_event_type>", data = "<body>" )] pub fn get_state_events_for_empty_key_route( db: State<'_, Database>, body: Ruma<get_state_events_for_empty_key::Request>, _room_id: String, _event_type: String, ) -> MatrixResult<get_state_events_for_key::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "You don't have permission to view the room state.".to_owned(), status_code: http::StatusCode::FORBIDDEN, })); } if let Some(event) = db .rooms .room_state(&body.room_id) .unwrap() .get(&(body.event_type.clone(), "".to_owned())) { MatrixResult(Ok(get_state_events_for_key::Response { content: serde_json::value::to_raw_value(event).unwrap(), })) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "State event not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[get("/_matrix/client/r0/sync", data = "<body>")] pub fn sync_route( db: State<'_, Database>, body: Ruma<sync_events::Request>, ) -> MatrixResult<sync_events::Response> { std::thread::sleep(Duration::from_millis(1000)); let user_id = body.user_id.as_ref().expect("user is authenticated"); let device_id = body.device_id.as_ref().expect("user is authenticated"); let next_batch = db.globals.current_count().unwrap().to_string(); let mut joined_rooms = BTreeMap::new(); let since = body .since .clone() .and_then(|string| string.parse().ok()) .unwrap_or(0); for room_id in db.rooms.rooms_joined(&user_id) { let room_id = room_id.unwrap(); let mut pdus = db .rooms .pdus_since(&room_id, since) .unwrap() .map(|r| r.unwrap()) .collect::<Vec<_>>(); let mut send_member_count = false; let mut send_full_state = false; let mut send_notification_counts = false; for pdu in &pdus { send_notification_counts = true; if pdu.kind == EventType::RoomMember { send_member_count = true; if !send_full_state && pdu.state_key == Some(user_id.to_string()) { let content = serde_json::from_value::< EventJson<ruma_events::room::member::MemberEventContent>, >(pdu.content.clone()) .unwrap() .deserialize() .unwrap(); if content.membership == ruma_events::room::member::MembershipState::Join { send_full_state = true; // Both send_member_count and send_full_state are set. There's nothing more // to do break; } } } } let state = db.rooms.room_state(&room_id).unwrap(); let (joined_member_count, invited_member_count, heroes) = if send_member_count { let joined_member_count = db.rooms.room_members(&room_id).count(); let invited_member_count = db.rooms.room_members_invited(&room_id).count(); // Recalculate heroes (first 5 members) let mut heroes = Vec::new(); if joined_member_count + invited_member_count <= 5 { // Go through all PDUs and for each member event, check if the user is still joined or // invited until we have 5 or we reach the end for hero in db .rooms .all_pdus(&room_id) .unwrap() .filter_map(|pdu| pdu.ok()) // Ignore all broken pdus .filter(|pdu| pdu.kind == EventType::RoomMember) .filter_map(|pdu| { let content = serde_json::from_value::< EventJson<ruma_events::room::member::MemberEventContent>, >(pdu.content.clone()) .unwrap() .deserialize() .unwrap(); let current_content = serde_json::from_value::< EventJson<ruma_events::room::member::MemberEventContent>, >( state .get(&( EventType::RoomMember, pdu.state_key.clone().expect( "TODO: error handling. Is it really a state event?", ), )) .expect("a user that joined once will always have a member event") .content .clone(), ) .unwrap() .deserialize() .unwrap(); // The membership was and still is invite or join if matches!( content.membership, ruma_events::room::member::MembershipState::Join | ruma_events::room::member::MembershipState::Invite ) && matches!( current_content.membership, ruma_events::room::member::MembershipState::Join | ruma_events::room::member::MembershipState::Invite ) { Some(pdu.state_key.unwrap()) } else { None } }) { if heroes.contains(&hero) || hero == user_id.to_string() { continue; } heroes.push(hero); } } ( Some(joined_member_count), Some(invited_member_count), heroes, ) } else { (None, None, Vec::new()) }; let notification_count = if send_notification_counts { if let Some(last_read) = db.rooms.edus.room_read_get(&room_id, &user_id).unwrap() { Some( (db.rooms .pdus_since(&room_id, last_read) .unwrap() .filter(|pdu| { matches!( pdu.as_ref().unwrap().kind.clone(), EventType::RoomMessage | EventType::RoomEncrypted ) }) .count() as u32) .into(), ) } else { None } } else { None }; // They /sync response doesn't always return all messages, so we say the output is // limited unless there are enough events let mut limited = true; pdus = pdus.split_off(pdus.len().checked_sub(10).unwrap_or_else(|| { limited = false; 0 })); let prev_batch = pdus .first() .and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) .map(|c| c.to_string()); let room_events = pdus .into_iter() .map(|pdu| pdu.to_room_event()) .collect::<Vec<_>>(); let mut edus = db .rooms .edus .roomlatests_since(&room_id, since) .unwrap() .map(|r| r.unwrap()) .collect::<Vec<_>>(); if db .rooms .edus .last_roomactive_update(&room_id, &db.globals) .unwrap() > since { edus.push( serde_json::from_str( &serde_json::to_string(&EduEvent::Typing( db.rooms.edus.roomactives_all(&room_id).unwrap(), )) .unwrap(), ) .unwrap(), ); } joined_rooms.insert( room_id.clone().try_into().unwrap(), sync_events::JoinedRoom { account_data: Some(sync_events::AccountData { events: db .account_data .changes_since(Some(&room_id), &user_id, since) .unwrap() .into_iter() .map(|(_, v)| v) .collect(), }), summary: sync_events::RoomSummary { heroes, joined_member_count: joined_member_count.map(|n| (n as u32).into()), invited_member_count: invited_member_count.map(|n| (n as u32).into()), }, unread_notifications: sync_events::UnreadNotificationsCount { highlight_count: None, notification_count, }, timeline: sync_events::Timeline { limited: if limited { Some(limited) } else { None }, prev_batch, events: room_events, }, // TODO: state before timeline state: sync_events::State { events: if send_full_state { state .into_iter() .map(|(_, pdu)| pdu.to_state_event()) .collect() } else { Vec::new() }, }, ephemeral: sync_events::Ephemeral { events: edus }, }, ); } let mut left_rooms = BTreeMap::new(); for room_id in db.rooms.rooms_left(&user_id) { let room_id = room_id.unwrap(); let pdus = db.rooms.pdus_since(&room_id, since).unwrap(); let room_events = pdus.map(|pdu| pdu.unwrap().to_room_event()).collect(); let mut edus = db .rooms .edus .roomlatests_since(&room_id, since) .unwrap() .map(|r| r.unwrap()) .collect::<Vec<_>>(); if db .rooms .edus .last_roomactive_update(&room_id, &db.globals) .unwrap() > since { edus.push( serde_json::from_str( &serde_json::to_string(&EduEvent::Typing( db.rooms.edus.roomactives_all(&room_id).unwrap(), )) .unwrap(), ) .unwrap(), ); } left_rooms.insert( room_id.clone().try_into().unwrap(), sync_events::LeftRoom { account_data: Some(sync_events::AccountData { events: Vec::new() }), timeline: sync_events::Timeline { limited: Some(false), prev_batch: Some(next_batch.clone()), events: room_events, }, state: sync_events::State { events: Vec::new() }, }, ); } let mut invited_rooms = BTreeMap::new(); for room_id in db.rooms.rooms_invited(&user_id) { let room_id = room_id.unwrap(); invited_rooms.insert( room_id.clone(), sync_events::InvitedRoom { invite_state: sync_events::InviteState { events: db .rooms .room_state(&room_id) .unwrap() .into_iter() .map(|(_, pdu)| pdu.to_stripped_state_event()) .collect(), }, }, ); } MatrixResult(Ok(sync_events::Response { next_batch, rooms: sync_events::Rooms { leave: left_rooms, join: joined_rooms, invite: invited_rooms, }, presence: sync_events::Presence { events: db .global_edus .presence_since(since) .unwrap() .map(|edu| { let mut edu = edu.unwrap().deserialize().unwrap(); let timestamp = edu.content.last_active_ago.unwrap(); let last_active_ago = js_int::UInt::try_from(utils::millis_since_unix_epoch()) .unwrap() - timestamp; edu.content.last_active_ago = Some(last_active_ago); edu.into() }) .collect(), }, account_data: sync_events::AccountData { events: db .account_data .changes_since(None, &user_id, since) .unwrap() .into_iter() .map(|(_, v)| v) .collect(), }, device_lists: if since != 0 { Some(sync_events::DeviceLists { changed: db .users .device_keys_changed(since) .map(|u| u.unwrap()) .collect(), left: Vec::new(), // TODO }) } else { None // TODO: left }, device_one_time_keys_count: Default::default(), // TODO to_device: sync_events::ToDevice { events: db .users .take_to_device_events(user_id, device_id, 100) .unwrap(), }, })) } #[get( "/_matrix/client/r0/rooms/<_room_id>/context/<_event_id>", data = "<body>" )] pub fn get_context_route( db: State<'_, Database>, body: Ruma<get_context::Request>, _room_id: String, _event_id: String, ) -> MatrixResult<get_context::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "You don't have permission to view this room.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } if let Some(base_event) = db.rooms.get_pdu(&body.event_id).unwrap() { let base_event = base_event.to_room_event(); let base_token = db .rooms .get_pdu_count(&body.event_id) .unwrap() .expect("event exists, so count should exist too"); let events_before = db .rooms .pdus_until(&body.room_id, base_token) .take(u32::try_from(body.limit).unwrap() as usize / 2) .map(|r| r.unwrap()) .collect::<Vec<_>>(); let start_token = events_before .last() .and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) .map(|c| c.to_string()); let events_before = events_before .into_iter() .map(|pdu| pdu.to_room_event()) .collect::<Vec<_>>(); let events_after = db .rooms .pdus_after(&body.room_id, base_token) .take(u32::try_from(body.limit).unwrap() as usize / 2) .map(|r| r.unwrap()) .collect::<Vec<_>>(); let end_token = events_after .last() .and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) .map(|c| c.to_string()); let events_after = events_after .into_iter() .map(|pdu| pdu.to_room_event()) .collect::<Vec<_>>(); MatrixResult(Ok(get_context::Response { start: start_token, end: end_token, events_before, event: Some(base_event), events_after, state: db // TODO: State at event .rooms .room_state(&body.room_id) .unwrap() .values() .map(|pdu| pdu.to_state_event()) .collect(), })) } else { MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Invalid base event.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[get("/_matrix/client/r0/rooms/<_room_id>/messages", data = "<body>")] pub fn get_message_events_route( db: State<'_, Database>, body: Ruma<get_message_events::Request>, _room_id: String, ) -> MatrixResult<get_message_events::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); if !db.rooms.is_joined(user_id, &body.room_id).unwrap() { return MatrixResult(Err(Error { kind: ErrorKind::Forbidden, message: "You don't have permission to view this room.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })); } if let Ok(from) = body.from.clone().parse() { match body.dir { get_message_events::Direction::Forward => { let events_after = db .rooms .pdus_after(&body.room_id, from) .take(body.limit.map(|l| l.try_into().unwrap()).unwrap_or(10_u32) as usize) .map(|r| r.unwrap()) .collect::<Vec<_>>(); let end_token = events_after .last() .and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) .map(|c| c.to_string()); let events_after = events_after .into_iter() .map(|pdu| pdu.to_room_event()) .collect::<Vec<_>>(); MatrixResult(Ok(get_message_events::Response { start: Some(body.from.clone()), end: end_token, chunk: events_after, state: Vec::new(), })) } get_message_events::Direction::Backward => { let events_before = db .rooms .pdus_until(&body.room_id, from) .take(body.limit.map(|l| l.try_into().unwrap()).unwrap_or(10_u32) as usize) .map(|r| r.unwrap()) .collect::<Vec<_>>(); let start_token = events_before .last() .and_then(|e| db.rooms.get_pdu_count(&e.event_id).unwrap()) .map(|c| c.to_string()); let events_before = events_before .into_iter() .map(|pdu| pdu.to_room_event()) .collect::<Vec<_>>(); MatrixResult(Ok(get_message_events::Response { start: Some(body.from.clone()), end: start_token, chunk: events_before, state: Vec::new(), })) } } } else { MatrixResult(Err(Error { kind: ErrorKind::Unknown, message: "Invalid from.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[get("/_matrix/client/r0/voip/turnServer")] pub fn turn_server_route() -> MatrixResult<create_message_event::Response> { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "There is no turn server yet.".to_owned(), status_code: http::StatusCode::NOT_FOUND, })) } #[post("/_matrix/client/r0/publicised_groups")] pub fn publicised_groups_route() -> MatrixResult<create_message_event::Response> { warn!("TODO: publicised_groups_route"); MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "There are no publicised groups yet.".to_owned(), status_code: http::StatusCode::NOT_FOUND, })) } #[put( "/_matrix/client/r0/sendToDevice/<_event_type>/<_txn_id>", data = "<body>" )] pub fn send_event_to_device_route( db: State<'_, Database>, body: Ruma<send_event_to_device::Request>, _event_type: String, _txn_id: String, ) -> MatrixResult<send_event_to_device::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); for (target_user_id, map) in &body.messages { for (target_device_id_maybe, event) in map { match target_device_id_maybe { to_device::DeviceIdOrAllDevices::DeviceId(target_device_id) => db .users .add_to_device_event( user_id, &target_user_id, &target_device_id, &body.event_type, serde_json::from_str(event.get()).unwrap(), &db.globals, ) .unwrap(), to_device::DeviceIdOrAllDevices::AllDevices => { for target_device_id in db.users.all_device_ids(&target_user_id) { db.users .add_to_device_event( user_id, &target_user_id, &target_device_id.unwrap(), &body.event_type, serde_json::from_str(event.get()).unwrap(), &db.globals, ) .unwrap(); } } } } } MatrixResult(Ok(send_event_to_device::Response)) } #[get("/_matrix/media/r0/config")] pub fn get_media_config_route() -> MatrixResult<get_media_config::Response> { MatrixResult(Ok(get_media_config::Response { upload_size: (20_u32 * 1024 * 1024).into(), // 20 MB })) } #[post("/_matrix/media/r0/upload", data = "<body>")] pub fn create_content_route( db: State<'_, Database>, body: Ruma<create_content::Request>, ) -> MatrixResult<create_content::Response> { let mxc = format!( "mxc://{}/{}", db.globals.server_name(), utils::random_string(MXC_LENGTH) ); db.media .create( mxc.clone(), body.filename.as_ref(), &body.content_type, &body.file, ) .unwrap(); MatrixResult(Ok(create_content::Response { content_uri: mxc })) } #[get( "/_matrix/media/r0/download/<_server_name>/<_media_id>", data = "<body>" )] pub fn get_content_route( db: State<'_, Database>, body: Ruma<get_content::Request>, _server_name: String, _media_id: String, ) -> MatrixResult<get_content::Response> { if let Some((filename, content_type, file)) = db .media .get(format!("mxc://{}/{}", body.server_name, body.media_id)) .unwrap() { MatrixResult(Ok(get_content::Response { file, content_type, content_disposition: filename.unwrap_or_default(), // TODO: Spec says this should be optional })) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Media not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[get( "/_matrix/media/r0/thumbnail/<_server_name>/<_media_id>", data = "<body>" )] pub fn get_content_thumbnail_route( db: State<'_, Database>, body: Ruma<get_content_thumbnail::Request>, _server_name: String, _media_id: String, ) -> MatrixResult<get_content_thumbnail::Response> { if let Some((_, content_type, file)) = db .media .get_thumbnail( format!("mxc://{}/{}", body.server_name, body.media_id), body.width.try_into().unwrap(), body.height.try_into().unwrap(), ) .unwrap() { MatrixResult(Ok(get_content_thumbnail::Response { file, content_type })) } else { MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Media not found.".to_owned(), status_code: http::StatusCode::BAD_REQUEST, })) } } #[get("/_matrix/client/r0/devices", data = "<body>")] pub fn get_devices_route( db: State<'_, Database>, body: Ruma<get_devices::Request>, ) -> MatrixResult<get_devices::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let devices = db .users .all_devices_metadata(user_id) .map(|r| r.unwrap()) .collect::<Vec<device::Device>>(); MatrixResult(Ok(get_devices::Response { devices })) } #[get("/_matrix/client/r0/devices/<device_id>", data = "<body>")] pub fn get_device_route( db: State<'_, Database>, body: Ruma<get_device::Request>, device_id: DeviceId, ) -> MatrixResult<get_device::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let device = db.users.get_device_metadata(&user_id, &device_id).unwrap(); match device { None => MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Device not found".to_string(), status_code: http::StatusCode::NOT_FOUND, })), Some(device) => MatrixResult(Ok(get_device::Response { device })), } } #[put("/_matrix/client/r0/devices/<device_id>", data = "<body>")] pub fn update_device_route( db: State<'_, Database>, body: Ruma<update_device::Request>, device_id: DeviceId, ) -> MatrixResult<update_device::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); let device = db.users.get_device_metadata(&user_id, &device_id).unwrap(); match device { None => MatrixResult(Err(Error { kind: ErrorKind::NotFound, message: "Device not found".to_string(), status_code: http::StatusCode::NOT_FOUND, })), Some(mut device) => { device.display_name = body.display_name.clone(); db.users .update_device_metadata(&user_id, &device_id, &device) .unwrap(); MatrixResult(Ok(update_device::Response)) } } } #[delete("/_matrix/client/r0/devices/<device_id>", data = "<body>")] pub fn delete_device_route( db: State<'_, Database>, body: Ruma<delete_device::Request>, device_id: DeviceId, ) -> MatrixResult<delete_device::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); db.users.remove_device(&user_id, &device_id).unwrap(); MatrixResult(Ok(delete_device::Response)) } #[post("/_matrix/client/r0/delete_devices", data = "<body>")] pub fn delete_devices_route( db: State<'_, Database>, body: Ruma<delete_devices::Request>, ) -> MatrixResult<delete_devices::Response> { let user_id = body.user_id.as_ref().expect("user is authenticated"); for device_id in &body.devices { db.users.remove_device(&user_id, &device_id).unwrap() } MatrixResult(Ok(delete_devices::Response)) } #[options("/<_segments..>")] pub fn options_route( _segments: rocket::http::uri::Segments<'_>, ) -> MatrixResult<send_event_to_device::Response> { MatrixResult(Ok(send_event_to_device::Response)) }