2017-04-20 22:40:52 +00:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-02-20 15:41:29 +00:00
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
2017-04-20 16:11:53 +00:00
|
|
|
"encoding/json"
|
2017-02-20 15:41:29 +00:00
|
|
|
"net/http"
|
2017-08-18 14:33:40 +00:00
|
|
|
"strings"
|
2017-02-20 15:41:29 +00:00
|
|
|
|
|
|
|
"github.com/gorilla/mux"
|
2018-08-20 09:45:17 +00:00
|
|
|
appserviceAPI "github.com/matrix-org/dendrite/appservice/api"
|
2018-07-16 22:17:03 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth"
|
2017-05-23 16:43:05 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
2017-05-22 18:28:26 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/storage/accounts"
|
2017-05-23 16:43:05 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/storage/devices"
|
2017-06-27 11:37:25 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
2017-03-15 13:36:26 +00:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/producers"
|
2020-06-10 11:17:54 +00:00
|
|
|
eduServerAPI "github.com/matrix-org/dendrite/eduserver/api"
|
2019-10-01 16:09:47 +00:00
|
|
|
federationSenderAPI "github.com/matrix-org/dendrite/federationsender/api"
|
2020-05-21 13:40:13 +00:00
|
|
|
"github.com/matrix-org/dendrite/internal/config"
|
2020-06-12 13:55:57 +00:00
|
|
|
"github.com/matrix-org/dendrite/internal/httputil"
|
2020-05-21 13:40:13 +00:00
|
|
|
"github.com/matrix-org/dendrite/internal/transactions"
|
2018-08-08 15:17:09 +00:00
|
|
|
roomserverAPI "github.com/matrix-org/dendrite/roomserver/api"
|
2017-05-25 15:08:28 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2017-02-20 15:41:29 +00:00
|
|
|
"github.com/matrix-org/util"
|
|
|
|
)
|
|
|
|
|
2020-05-22 10:43:17 +00:00
|
|
|
const pathPrefixV1 = "/client/api/v1"
|
|
|
|
const pathPrefixR0 = "/client/r0"
|
|
|
|
const pathPrefixUnstable = "/client/unstable"
|
2017-02-20 15:41:29 +00:00
|
|
|
|
|
|
|
// Setup registers HTTP handlers with the given ServeMux. It also supplies the given http.Client
|
|
|
|
// to clients which need to make outbound HTTP requests.
|
2019-07-03 15:38:50 +00:00
|
|
|
//
|
|
|
|
// Due to Setup being used to call many other functions, a gocyclo nolint is
|
|
|
|
// applied:
|
|
|
|
// nolint: gocyclo
|
2017-05-25 15:08:28 +00:00
|
|
|
func Setup(
|
2020-05-22 10:43:17 +00:00
|
|
|
publicAPIMux *mux.Router, cfg *config.Dendrite,
|
2020-06-10 11:17:54 +00:00
|
|
|
eduAPI eduServerAPI.EDUServerInputAPI,
|
2020-05-01 09:48:17 +00:00
|
|
|
rsAPI roomserverAPI.RoomserverInternalAPI,
|
2018-08-20 09:45:17 +00:00
|
|
|
asAPI appserviceAPI.AppServiceQueryAPI,
|
2020-02-13 17:27:33 +00:00
|
|
|
accountDB accounts.Database,
|
|
|
|
deviceDB devices.Database,
|
2017-05-25 15:08:28 +00:00
|
|
|
federation *gomatrixserverlib.FederationClient,
|
2017-08-02 15:21:35 +00:00
|
|
|
syncProducer *producers.SyncAPIProducer,
|
2018-05-18 09:49:40 +00:00
|
|
|
transactionsCache *transactions.Cache,
|
2020-04-29 10:34:31 +00:00
|
|
|
federationSender federationSenderAPI.FederationSenderInternalAPI,
|
2017-05-25 15:08:28 +00:00
|
|
|
) {
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2020-05-22 10:43:17 +00:00
|
|
|
publicAPIMux.Handle("/client/versions",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("versions", func(req *http.Request) util.JSONResponse {
|
2017-06-27 11:37:25 +00:00
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-06-27 11:37:25 +00:00
|
|
|
JSON: struct {
|
|
|
|
Versions []string `json:"versions"`
|
|
|
|
}{[]string{
|
|
|
|
"r0.0.1",
|
|
|
|
"r0.1.0",
|
|
|
|
"r0.2.0",
|
2018-03-14 17:36:02 +00:00
|
|
|
"r0.3.0",
|
2017-06-27 11:37:25 +00:00
|
|
|
}},
|
|
|
|
}
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2020-05-22 10:43:17 +00:00
|
|
|
r0mux := publicAPIMux.PathPrefix(pathPrefixR0).Subrouter()
|
|
|
|
v1mux := publicAPIMux.PathPrefix(pathPrefixV1).Subrouter()
|
|
|
|
unstableMux := publicAPIMux.PathPrefix(pathPrefixUnstable).Subrouter()
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2019-05-21 20:56:55 +00:00
|
|
|
authData := auth.Data{
|
|
|
|
AccountDB: accountDB,
|
|
|
|
DeviceDB: deviceDB,
|
|
|
|
AppServices: cfg.Derived.ApplicationServices,
|
|
|
|
}
|
2018-07-16 22:17:03 +00:00
|
|
|
|
2017-05-18 12:47:23 +00:00
|
|
|
r0mux.Handle("/createRoom",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("createRoom", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2020-06-10 11:17:54 +00:00
|
|
|
return CreateRoom(req, device, cfg, accountDB, rsAPI, asAPI)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-05-25 15:08:28 +00:00
|
|
|
r0mux.Handle("/join/{roomIDOrAlias}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI(gomatrixserverlib.Join, authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-10-11 17:16:53 +00:00
|
|
|
return JoinRoomByIDOrAlias(
|
2020-05-13 13:53:25 +00:00
|
|
|
req, device, rsAPI, accountDB, vars["roomIDOrAlias"],
|
2017-05-25 15:08:28 +00:00
|
|
|
)
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2020-03-19 10:25:36 +00:00
|
|
|
r0mux.Handle("/joined_rooms",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("joined_rooms", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2020-03-19 10:25:36 +00:00
|
|
|
return GetJoinedRooms(req, device, accountDB)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2020-05-04 17:34:09 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/leave",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("membership", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-05-04 17:34:09 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return LeaveRoomByID(
|
|
|
|
req, device, rsAPI, vars["roomID"],
|
|
|
|
)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
|
|
|
r0mux.Handle("/rooms/{roomID}/{membership:(?:join|kick|ban|unban|invite)}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("membership", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendMembership(req, accountDB, device, vars["roomID"], vars["membership"], cfg, rsAPI, asAPI)
|
2017-08-04 15:32:10 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-09-26 11:55:48 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/send/{eventType}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("send_message", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendEvent(req, device, vars["roomID"], vars["eventType"], nil, nil, cfg, rsAPI, nil)
|
2017-09-26 11:55:48 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-03-15 11:22:40 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/send/{eventType}/{txnID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("send_message", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-09-26 11:55:48 +00:00
|
|
|
txnID := vars["txnID"]
|
2018-05-18 09:49:40 +00:00
|
|
|
return SendEvent(req, device, vars["roomID"], vars["eventType"], &txnID,
|
2020-06-10 11:17:54 +00:00
|
|
|
nil, cfg, rsAPI, transactionsCache)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2019-08-09 09:45:54 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/event/{eventID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("rooms_get_event", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-08-09 09:45:54 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-06-15 09:13:57 +00:00
|
|
|
return GetEvent(req, device, vars["roomID"], vars["eventID"], cfg, rsAPI, federation)
|
2019-08-09 09:45:54 +00:00
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2020-04-14 17:36:08 +00:00
|
|
|
|
2020-06-12 13:55:57 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/state", httputil.MakeAuthAPI("room_state", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-04-14 17:36:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return OnIncomingStateRequest(req.Context(), rsAPI, vars["roomID"])
|
2020-04-14 17:36:08 +00:00
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
2020-06-12 13:55:57 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/state/{type}", httputil.MakeAuthAPI("room_state", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-04-14 17:36:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return OnIncomingStateTypeRequest(req.Context(), rsAPI, vars["roomID"], vars["type"], "")
|
2020-04-14 17:36:08 +00:00
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
2020-06-12 13:55:57 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/state/{type}/{stateKey}", httputil.MakeAuthAPI("room_state", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-04-14 17:36:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return OnIncomingStateTypeRequest(req.Context(), rsAPI, vars["roomID"], vars["type"], vars["stateKey"])
|
2020-04-14 17:36:08 +00:00
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
2017-08-18 14:33:40 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/state/{eventType:[^/]+/?}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("send_message", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-03-17 11:21:52 +00:00
|
|
|
emptyString := ""
|
2017-08-18 14:33:40 +00:00
|
|
|
eventType := vars["eventType"]
|
|
|
|
// If there's a trailing slash, remove it
|
|
|
|
if strings.HasSuffix(eventType, "/") {
|
|
|
|
eventType = eventType[:len(eventType)-1]
|
|
|
|
}
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendEvent(req, device, vars["roomID"], eventType, nil, &emptyString, cfg, rsAPI, nil)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2020-04-14 17:36:08 +00:00
|
|
|
|
2017-03-17 11:21:52 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/state/{eventType}/{stateKey}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("send_message", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-03-17 11:21:52 +00:00
|
|
|
stateKey := vars["stateKey"]
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendEvent(req, device, vars["roomID"], vars["eventType"], nil, &stateKey, cfg, rsAPI, nil)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-02-20 15:41:29 +00:00
|
|
|
|
2020-06-12 13:55:57 +00:00
|
|
|
r0mux.Handle("/register", httputil.MakeExternalAPI("register", func(req *http.Request) util.JSONResponse {
|
2020-02-11 11:18:12 +00:00
|
|
|
return Register(req, accountDB, deviceDB, cfg)
|
2018-03-13 15:55:45 +00:00
|
|
|
})).Methods(http.MethodPost, http.MethodOptions)
|
2017-09-22 15:13:19 +00:00
|
|
|
|
2020-06-12 13:55:57 +00:00
|
|
|
v1mux.Handle("/register", httputil.MakeExternalAPI("register", func(req *http.Request) util.JSONResponse {
|
2020-02-11 11:18:12 +00:00
|
|
|
return LegacyRegister(req, accountDB, deviceDB, cfg)
|
2018-03-13 15:55:45 +00:00
|
|
|
})).Methods(http.MethodPost, http.MethodOptions)
|
2017-05-22 14:55:39 +00:00
|
|
|
|
2020-06-12 13:55:57 +00:00
|
|
|
r0mux.Handle("/register/available", httputil.MakeExternalAPI("registerAvailable", func(req *http.Request) util.JSONResponse {
|
2018-08-20 09:23:01 +00:00
|
|
|
return RegisterAvailable(req, cfg, accountDB)
|
2018-03-13 15:55:45 +00:00
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
2017-10-09 14:24:38 +00:00
|
|
|
|
2017-06-27 11:37:25 +00:00
|
|
|
r0mux.Handle("/directory/room/{roomAlias}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("directory_room", func(req *http.Request) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return DirectoryRoom(req, vars["roomAlias"], federation, cfg, rsAPI, federationSender)
|
2017-06-27 11:37:25 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-07-28 10:31:43 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/directory/room/{roomAlias}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("directory_room", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return SetLocalAlias(req, device, vars["roomAlias"], cfg, rsAPI)
|
2017-07-28 10:31:43 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-07-28 10:31:43 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/directory/room/{roomAlias}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("directory_room", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return RemoveLocalAlias(req, device, vars["roomAlias"], rsAPI)
|
2017-07-28 10:31:43 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodDelete, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2017-07-11 15:04:34 +00:00
|
|
|
r0mux.Handle("/logout",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("logout", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-10-11 17:16:53 +00:00
|
|
|
return Logout(req, deviceDB, device)
|
2017-07-11 15:04:34 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-07-11 15:04:34 +00:00
|
|
|
|
2017-10-15 10:29:47 +00:00
|
|
|
r0mux.Handle("/logout/all",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("logout", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-10-15 10:29:47 +00:00
|
|
|
return LogoutAll(req, deviceDB, device)
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-10-15 10:29:47 +00:00
|
|
|
|
2018-07-24 14:49:49 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/typing/{userID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("rooms_typing", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendTyping(req, device, vars["roomID"], vars["userID"], accountDB, eduAPI)
|
2018-07-24 14:49:49 +00:00
|
|
|
}),
|
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
|
|
|
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 16:50:19 +00:00
|
|
|
r0mux.Handle("/sendToDevice/{eventType}/{txnID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("send_to_device", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 16:50:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
txnID := vars["txnID"]
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendToDevice(req, device, eduAPI, transactionsCache, vars["eventType"], &txnID)
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 16:50:19 +00:00
|
|
|
}),
|
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
|
|
|
|
|
|
|
// This is only here because sytest refers to /unstable for this endpoint
|
|
|
|
// rather than r0. It's an exact duplicate of the above handler.
|
|
|
|
// TODO: Remove this if/when sytest is fixed!
|
|
|
|
unstableMux.Handle("/sendToDevice/{eventType}/{txnID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("send_to_device", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 16:50:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
txnID := vars["txnID"]
|
2020-06-10 11:17:54 +00:00
|
|
|
return SendToDevice(req, device, eduAPI, transactionsCache, vars["eventType"], &txnID)
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 16:50:19 +00:00
|
|
|
}),
|
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
|
|
|
|
2018-08-04 09:32:02 +00:00
|
|
|
r0mux.Handle("/account/whoami",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("whoami", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2018-08-04 09:32:02 +00:00
|
|
|
return Whoami(req, device)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
2017-04-20 16:11:53 +00:00
|
|
|
// Stub endpoints required by Riot
|
|
|
|
|
|
|
|
r0mux.Handle("/login",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("login", func(req *http.Request) util.JSONResponse {
|
2017-10-11 17:16:53 +00:00
|
|
|
return Login(req, accountDB, deviceDB, cfg)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodPost, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
2019-08-14 17:34:49 +00:00
|
|
|
r0mux.Handle("/auth/{authType}/fallback/web",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeHTMLAPI("auth_fallback", func(w http.ResponseWriter, req *http.Request) *util.JSONResponse {
|
2019-08-14 17:34:49 +00:00
|
|
|
vars := mux.Vars(req)
|
|
|
|
return AuthFallback(w, req, vars["authType"], cfg)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodPost, http.MethodOptions)
|
|
|
|
|
2017-04-20 16:11:53 +00:00
|
|
|
r0mux.Handle("/pushrules/",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("push_rules", func(req *http.Request) util.JSONResponse {
|
2017-04-20 16:11:53 +00:00
|
|
|
// TODO: Implement push rules API
|
|
|
|
res := json.RawMessage(`{
|
|
|
|
"global": {
|
|
|
|
"content": [],
|
|
|
|
"override": [],
|
|
|
|
"room": [],
|
|
|
|
"sender": [],
|
|
|
|
"underride": []
|
|
|
|
}
|
|
|
|
}`)
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-04-20 16:11:53 +00:00
|
|
|
JSON: &res,
|
|
|
|
}
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
2017-10-10 13:28:49 +00:00
|
|
|
r0mux.Handle("/user/{userId}/filter",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("put_filter", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-10-11 17:16:53 +00:00
|
|
|
return PutFilter(req, device, accountDB, vars["userId"])
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
2017-10-10 13:28:49 +00:00
|
|
|
r0mux.Handle("/user/{userId}/filter/{filterId}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("get_filter", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-10-11 17:16:53 +00:00
|
|
|
return GetFilter(req, device, accountDB, vars["userId"], vars["filterId"])
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
|
|
|
// Riot user settings
|
|
|
|
|
|
|
|
r0mux.Handle("/profile/{userID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("profile", func(req *http.Request) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-02-11 11:18:12 +00:00
|
|
|
return GetProfile(req, accountDB, cfg, vars["userID"], asAPI, federation)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
2017-07-10 13:52:41 +00:00
|
|
|
r0mux.Handle("/profile/{userID}/avatar_url",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("profile_avatar_url", func(req *http.Request) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-02-11 11:18:12 +00:00
|
|
|
return GetAvatarURL(req, accountDB, cfg, vars["userID"], asAPI, federation)
|
2017-07-10 13:52:41 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-07-10 13:52:41 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/profile/{userID}/avatar_url",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("profile_avatar_url", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-06-10 11:17:54 +00:00
|
|
|
return SetAvatarURL(req, accountDB, device, vars["userID"], cfg, rsAPI)
|
2017-07-10 13:52:41 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-07-10 13:52:41 +00:00
|
|
|
// Browsers use the OPTIONS HTTP method to check if the CORS policy allows
|
|
|
|
// PUT requests, so we need to allow this method
|
|
|
|
|
|
|
|
r0mux.Handle("/profile/{userID}/displayname",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("profile_displayname", func(req *http.Request) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-02-11 11:18:12 +00:00
|
|
|
return GetDisplayName(req, accountDB, cfg, vars["userID"], asAPI, federation)
|
2017-07-10 13:52:41 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-07-10 13:52:41 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/profile/{userID}/displayname",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("profile_displayname", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-06-10 11:17:54 +00:00
|
|
|
return SetDisplayName(req, accountDB, device, vars["userID"], cfg, rsAPI)
|
2017-07-10 13:52:41 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-07-10 13:52:41 +00:00
|
|
|
// Browsers use the OPTIONS HTTP method to check if the CORS policy allows
|
|
|
|
// PUT requests, so we need to allow this method
|
|
|
|
|
2017-04-20 16:11:53 +00:00
|
|
|
r0mux.Handle("/account/3pid",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("account_3pid", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-10-11 17:16:53 +00:00
|
|
|
return GetAssociated3PIDs(req, accountDB, device)
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-09-01 09:13:10 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/account/3pid",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("account_3pid", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-10-11 17:16:53 +00:00
|
|
|
return CheckAndSave3PIDAssociation(req, accountDB, device, cfg)
|
2017-09-01 09:13:10 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-09-01 09:13:10 +00:00
|
|
|
|
|
|
|
unstableMux.Handle("/account/3pid/delete",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("account_3pid", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-10-11 17:16:53 +00:00
|
|
|
return Forget3PID(req, accountDB)
|
2017-09-01 09:13:10 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-09-01 09:13:10 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/{path:(?:account/3pid|register)}/email/requestToken",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("account_3pid_request_token", func(req *http.Request) util.JSONResponse {
|
2017-10-11 17:16:53 +00:00
|
|
|
return RequestEmailToken(req, accountDB, cfg)
|
2017-09-01 09:13:10 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
|
|
|
// Riot logs get flooded unless this is handled
|
|
|
|
r0mux.Handle("/presence/{userID}/status",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("presence", func(req *http.Request) util.JSONResponse {
|
2017-04-20 16:11:53 +00:00
|
|
|
// TODO: Set presence (probably the responsibility of a presence server not clientapi)
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-04-20 16:11:53 +00:00
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
2017-05-18 12:47:23 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-04-20 16:11:53 +00:00
|
|
|
|
2017-06-27 11:37:25 +00:00
|
|
|
r0mux.Handle("/voip/turnServer",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("turn_server", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-11-09 09:58:45 +00:00
|
|
|
return RequestTurnServer(req, device, cfg)
|
2017-06-27 11:37:25 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2020-03-19 11:04:08 +00:00
|
|
|
r0mux.Handle("/thirdparty/protocols",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("thirdparty_protocols", func(req *http.Request) util.JSONResponse {
|
2017-06-27 11:37:25 +00:00
|
|
|
// TODO: Return the third party protcols
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusOK,
|
2017-06-27 11:37:25 +00:00
|
|
|
JSON: struct{}{},
|
|
|
|
}
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/rooms/{roomID}/initialSync",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("rooms_initial_sync", func(req *http.Request) util.JSONResponse {
|
2017-06-27 11:37:25 +00:00
|
|
|
// TODO: Allow people to peek into rooms.
|
|
|
|
return util.JSONResponse{
|
2018-03-13 15:55:45 +00:00
|
|
|
Code: http.StatusForbidden,
|
2017-06-27 11:37:25 +00:00
|
|
|
JSON: jsonerror.GuestAccessForbidden("Guest access not implemented"),
|
|
|
|
}
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/user/{userID}/account_data/{type}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("user_account_data", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-10-11 17:16:53 +00:00
|
|
|
return SaveAccountData(req, accountDB, device, vars["userID"], "", vars["type"], syncProducer)
|
2017-07-26 13:53:11 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-07-26 13:53:11 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/user/{userID}/rooms/{roomID}/account_data/{type}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("user_account_data", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-10-11 17:16:53 +00:00
|
|
|
return SaveAccountData(req, accountDB, device, vars["userID"], vars["roomID"], vars["type"], syncProducer)
|
2017-06-27 11:37:25 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2020-01-29 17:53:05 +00:00
|
|
|
r0mux.Handle("/user/{userID}/account_data/{type}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("user_account_data", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-01-29 17:53:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return GetAccountData(req, accountDB, device, vars["userID"], "", vars["type"])
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet)
|
|
|
|
|
|
|
|
r0mux.Handle("/user/{userID}/rooms/{roomID}/account_data/{type}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("user_account_data", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-01-29 17:53:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return GetAccountData(req, accountDB, device, vars["userID"], vars["roomID"], vars["type"])
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet)
|
|
|
|
|
2017-08-21 15:34:26 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/members",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("rooms_members", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return GetMemberships(req, device, vars["roomID"], false, cfg, rsAPI)
|
2017-08-24 15:00:14 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-08-24 15:00:14 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/rooms/{roomID}/joined_members",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("rooms_members", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2020-05-01 09:48:17 +00:00
|
|
|
return GetMemberships(req, device, vars["roomID"], true, cfg, rsAPI)
|
2017-08-21 15:34:26 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-08-21 15:34:26 +00:00
|
|
|
|
2017-06-27 11:37:25 +00:00
|
|
|
r0mux.Handle("/rooms/{roomID}/read_markers",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("rooms_read_markers", func(req *http.Request) util.JSONResponse {
|
2017-06-27 11:37:25 +00:00
|
|
|
// TODO: return the read_markers.
|
2018-03-13 15:55:45 +00:00
|
|
|
return util.JSONResponse{Code: http.StatusOK, JSON: struct{}{}}
|
2017-06-27 11:37:25 +00:00
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-06-27 11:37:25 +00:00
|
|
|
|
2017-10-17 18:12:54 +00:00
|
|
|
r0mux.Handle("/devices",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("get_devices", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2017-10-17 18:12:54 +00:00
|
|
|
return GetDevicesByLocalpart(req, deviceDB, device)
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-10-17 18:12:54 +00:00
|
|
|
|
2018-05-24 12:53:22 +00:00
|
|
|
r0mux.Handle("/devices/{deviceID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("get_device", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-10-17 18:12:54 +00:00
|
|
|
return GetDeviceByID(req, deviceDB, device, vars["deviceID"])
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-10-17 18:12:54 +00:00
|
|
|
|
2017-11-14 09:59:02 +00:00
|
|
|
r0mux.Handle("/devices/{deviceID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("device_data", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-07-03 15:38:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2017-11-14 09:59:02 +00:00
|
|
|
return UpdateDeviceByID(req, deviceDB, device, vars["deviceID"])
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
2017-11-14 09:59:02 +00:00
|
|
|
|
2020-02-11 12:13:38 +00:00
|
|
|
r0mux.Handle("/devices/{deviceID}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("delete_device", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-02-11 12:13:38 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return DeleteDeviceById(req, deviceDB, device, vars["deviceID"])
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodDelete, http.MethodOptions)
|
|
|
|
|
|
|
|
r0mux.Handle("/delete_devices",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("delete_devices", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2020-02-11 12:13:38 +00:00
|
|
|
return DeleteDevices(req, deviceDB, device)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
|
|
|
|
2017-09-22 16:28:29 +00:00
|
|
|
// Stub implementations for sytest
|
|
|
|
r0mux.Handle("/events",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("events", func(req *http.Request) util.JSONResponse {
|
2018-03-13 15:55:45 +00:00
|
|
|
return util.JSONResponse{Code: http.StatusOK, JSON: map[string]interface{}{
|
2017-09-22 16:28:29 +00:00
|
|
|
"chunk": []interface{}{},
|
|
|
|
"start": "",
|
|
|
|
"end": "",
|
|
|
|
}}
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2017-09-22 16:28:29 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/initialSync",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeExternalAPI("initial_sync", func(req *http.Request) util.JSONResponse {
|
2018-03-13 15:55:45 +00:00
|
|
|
return util.JSONResponse{Code: http.StatusOK, JSON: map[string]interface{}{
|
2017-09-22 16:28:29 +00:00
|
|
|
"end": "",
|
|
|
|
}}
|
|
|
|
}),
|
2018-03-13 15:55:45 +00:00
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2019-08-02 11:17:51 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/user/{userId}/rooms/{roomId}/tags",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("get_tags", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-08-02 11:17:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return GetTags(req, accountDB, device, vars["userId"], vars["roomId"], syncProducer)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
|
|
|
r0mux.Handle("/user/{userId}/rooms/{roomId}/tags/{tag}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("put_tag", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-08-02 11:17:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return PutTag(req, accountDB, device, vars["userId"], vars["roomId"], vars["tag"], syncProducer)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodPut, http.MethodOptions)
|
|
|
|
|
|
|
|
r0mux.Handle("/user/{userId}/rooms/{roomId}/tags/{tag}",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("delete_tag", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2019-08-02 11:17:51 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return DeleteTag(req, accountDB, device, vars["userId"], vars["roomId"], vars["tag"], syncProducer)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodDelete, http.MethodOptions)
|
2020-02-05 18:06:39 +00:00
|
|
|
|
|
|
|
r0mux.Handle("/capabilities",
|
2020-06-12 13:55:57 +00:00
|
|
|
httputil.MakeAuthAPI("capabilities", authData, func(req *http.Request, device *authtypes.Device) util.JSONResponse {
|
2020-05-01 09:48:17 +00:00
|
|
|
return GetCapabilities(req, rsAPI)
|
2020-02-05 18:06:39 +00:00
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet)
|
2017-02-20 15:41:29 +00:00
|
|
|
}
|