2020-02-21 15:54:05 +00:00
|
|
|
// Copyright 2020 Damir Jelić
|
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2020-04-03 08:42:03 +00:00
|
|
|
use std::collections::HashMap;
|
|
|
|
#[cfg(feature = "encryption")]
|
2020-04-23 08:52:47 +00:00
|
|
|
use std::collections::{BTreeMap, HashSet};
|
2020-03-31 23:34:11 +00:00
|
|
|
use std::fmt;
|
2020-05-06 11:57:58 +00:00
|
|
|
use std::sync::atomic::{AtomicBool, Ordering};
|
2020-04-01 02:00:46 +00:00
|
|
|
use std::sync::Arc;
|
2020-03-18 13:17:22 +00:00
|
|
|
|
|
|
|
#[cfg(feature = "encryption")]
|
2020-03-18 13:15:56 +00:00
|
|
|
use std::result::Result as StdResult;
|
2019-10-23 20:47:00 +00:00
|
|
|
|
|
|
|
use crate::api::r0 as api;
|
2020-03-18 13:15:56 +00:00
|
|
|
use crate::error::Result;
|
2019-10-23 21:36:57 +00:00
|
|
|
use crate::events::collections::all::{RoomEvent, StateEvent};
|
2020-03-28 12:58:02 +00:00
|
|
|
use crate::events::presence::PresenceEvent;
|
2020-03-29 19:54:26 +00:00
|
|
|
// `NonRoomEvent` is what it is aliased as
|
|
|
|
use crate::events::collections::only::Event as NonRoomEvent;
|
|
|
|
use crate::events::ignored_user_list::IgnoredUserListEvent;
|
2020-03-30 11:14:33 +00:00
|
|
|
use crate::events::push_rules::{PushRulesEvent, Ruleset};
|
2020-05-05 20:13:14 +00:00
|
|
|
use crate::events::stripped::AnyStrippedStateEvent;
|
2020-04-23 08:52:47 +00:00
|
|
|
use crate::events::EventJson;
|
2020-04-05 12:28:25 +00:00
|
|
|
use crate::identifiers::{RoomId, UserId};
|
2020-03-28 12:58:02 +00:00
|
|
|
use crate::models::Room;
|
2019-10-23 20:47:00 +00:00
|
|
|
use crate::session::Session;
|
2020-05-11 19:32:58 +00:00
|
|
|
use crate::state::{AllRooms, ClientState, StateStore};
|
2020-03-31 23:34:11 +00:00
|
|
|
use crate::EventEmitter;
|
2019-10-23 20:47:00 +00:00
|
|
|
|
2020-04-14 22:10:10 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
2020-05-08 14:12:21 +00:00
|
|
|
use matrix_sdk_common::locks::Mutex;
|
|
|
|
use matrix_sdk_common::locks::RwLock;
|
|
|
|
use std::ops::Deref;
|
2020-03-11 09:08:22 +00:00
|
|
|
|
2020-04-09 14:27:09 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
2020-04-29 08:40:27 +00:00
|
|
|
use crate::api::r0::keys::{
|
2020-04-03 08:27:30 +00:00
|
|
|
claim_keys::Response as KeysClaimResponse, get_keys::Response as KeysQueryResponse,
|
|
|
|
upload_keys::Response as KeysUploadResponse, DeviceKeys, KeyAlgorithm,
|
2020-04-01 13:37:00 +00:00
|
|
|
};
|
2020-04-03 08:27:30 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
2020-05-05 13:29:25 +00:00
|
|
|
use crate::api::r0::to_device::send_event_to_device;
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
use crate::events::room::{encrypted::EncryptedEventContent, message::MessageEventContent};
|
2020-04-09 14:27:09 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
2020-04-29 08:40:27 +00:00
|
|
|
use crate::identifiers::DeviceId;
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
use matrix_sdk_crypto::{OlmMachine, OneTimeKeys};
|
2020-03-11 09:08:22 +00:00
|
|
|
|
2019-10-23 20:47:00 +00:00
|
|
|
pub type Token = String;
|
|
|
|
|
2020-05-06 23:45:27 +00:00
|
|
|
/// Signals to the `BaseClient` which `RoomState` to send to `EventEmitter`.
|
|
|
|
pub enum RoomStateType {
|
|
|
|
/// Represents a joined room, the `joined_rooms` HashMap will be used.
|
|
|
|
Joined,
|
|
|
|
/// Represents a left room, the `left_rooms` HashMap will be used.
|
|
|
|
Left,
|
|
|
|
/// Represents an invited room, the `invited_rooms` HashMap will be used.
|
|
|
|
Invited,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// An enum that represents the state of the given `Room`.
|
|
|
|
///
|
|
|
|
/// If the event came from the `join`, `invite` or `leave` rooms map from the server
|
2020-05-11 19:32:58 +00:00
|
|
|
/// the variant that holds the corresponding room is used. `RoomState` is generic
|
|
|
|
/// so it can be used to represent a `Room` or an `Arc<RwLock<Room>>`
|
|
|
|
pub enum RoomState<R> {
|
2020-05-06 23:45:27 +00:00
|
|
|
/// A room from the `join` section of a sync response.
|
2020-05-11 19:32:58 +00:00
|
|
|
Joined(R),
|
2020-05-06 23:45:27 +00:00
|
|
|
/// A room from the `leave` section of a sync response.
|
2020-05-11 19:32:58 +00:00
|
|
|
Left(R),
|
2020-05-06 23:45:27 +00:00
|
|
|
/// A room from the `invite` section of a sync response.
|
2020-05-11 19:32:58 +00:00
|
|
|
Invited(R),
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
|
2019-10-23 20:47:00 +00:00
|
|
|
/// A no IO Client implementation.
|
|
|
|
///
|
|
|
|
/// This Client is a state machine that receives responses and events and
|
|
|
|
/// accordingly updates it's state.
|
2020-05-06 13:36:55 +00:00
|
|
|
#[derive(Clone)]
|
2020-05-11 08:43:21 +00:00
|
|
|
pub struct BaseClient {
|
2019-10-23 20:47:00 +00:00
|
|
|
/// The current client session containing our user id, device id and access
|
|
|
|
/// token.
|
2020-05-06 13:55:18 +00:00
|
|
|
session: Arc<RwLock<Option<Session>>>,
|
2019-10-23 20:47:00 +00:00
|
|
|
/// The current sync token that should be used for the next sync call.
|
2020-05-06 13:55:18 +00:00
|
|
|
pub(crate) sync_token: Arc<RwLock<Option<Token>>>,
|
2019-10-23 20:47:00 +00:00
|
|
|
/// A map of the rooms our user is joined in.
|
2020-05-06 13:55:18 +00:00
|
|
|
joined_rooms: Arc<RwLock<HashMap<RoomId, Arc<RwLock<Room>>>>>,
|
2020-05-06 23:45:27 +00:00
|
|
|
/// A map of the rooms our user is invited to.
|
2020-05-07 00:35:15 +00:00
|
|
|
invited_rooms: Arc<RwLock<HashMap<RoomId, Arc<RwLock<Room>>>>>,
|
2020-05-06 23:45:27 +00:00
|
|
|
/// A map of the rooms our user has left.
|
2020-05-07 00:35:15 +00:00
|
|
|
left_rooms: Arc<RwLock<HashMap<RoomId, Arc<RwLock<Room>>>>>,
|
2020-03-29 19:54:26 +00:00
|
|
|
/// A list of ignored users.
|
2020-05-06 13:55:18 +00:00
|
|
|
pub(crate) ignored_users: Arc<RwLock<Vec<UserId>>>,
|
2020-03-29 19:54:26 +00:00
|
|
|
/// The push ruleset for the logged in user.
|
2020-05-06 13:55:18 +00:00
|
|
|
pub(crate) push_ruleset: Arc<RwLock<Option<Ruleset>>>,
|
2020-03-31 23:34:11 +00:00
|
|
|
/// Any implementor of EventEmitter will act as the callbacks for various
|
|
|
|
/// events.
|
2020-05-06 13:55:18 +00:00
|
|
|
event_emitter: Arc<RwLock<Option<Box<dyn EventEmitter>>>>,
|
2020-04-29 11:00:14 +00:00
|
|
|
/// Any implementor of `StateStore` will be called to save `Room` and
|
2020-05-13 08:06:08 +00:00
|
|
|
/// some `BaseClient` state after receiving a sync response.
|
2020-04-18 22:06:30 +00:00
|
|
|
///
|
2020-04-29 11:00:14 +00:00
|
|
|
/// There is a default implementation `JsonStore` that saves JSON to disk.
|
2020-05-06 13:55:18 +00:00
|
|
|
state_store: Arc<RwLock<Option<Box<dyn StateStore>>>>,
|
2020-04-23 23:37:27 +00:00
|
|
|
/// Does the `Client` need to sync with the state store.
|
2020-05-06 11:57:58 +00:00
|
|
|
needs_state_store_sync: Arc<AtomicBool>,
|
2020-03-29 19:54:26 +00:00
|
|
|
|
2020-03-11 09:08:22 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
olm: Arc<Mutex<Option<OlmMachine>>>,
|
2019-10-23 20:47:00 +00:00
|
|
|
}
|
|
|
|
|
2020-05-11 08:43:21 +00:00
|
|
|
impl fmt::Debug for BaseClient {
|
2020-03-31 23:34:11 +00:00
|
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
|
|
f.debug_struct("Client")
|
|
|
|
.field("session", &self.session)
|
|
|
|
.field("sync_token", &self.sync_token)
|
|
|
|
.field("joined_rooms", &self.joined_rooms)
|
|
|
|
.field("ignored_users", &self.ignored_users)
|
|
|
|
.field("push_ruleset", &self.push_ruleset)
|
|
|
|
.field("event_emitter", &"EventEmitter<...>")
|
|
|
|
.finish()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-11 08:43:21 +00:00
|
|
|
impl BaseClient {
|
2019-10-23 20:47:00 +00:00
|
|
|
/// Create a new client.
|
2020-03-02 10:31:03 +00:00
|
|
|
///
|
2019-10-23 20:47:00 +00:00
|
|
|
/// # Arguments
|
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `session` - An optional session if the user already has one from a
|
2019-10-23 20:47:00 +00:00
|
|
|
/// previous login call.
|
2020-03-18 13:15:56 +00:00
|
|
|
pub fn new(session: Option<Session>) -> Result<Self> {
|
2020-05-11 08:43:21 +00:00
|
|
|
BaseClient::new_helper(session, None)
|
2020-05-06 13:20:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Create a new client.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `session` - An optional session if the user already has one from a
|
|
|
|
/// previous login call.
|
|
|
|
///
|
|
|
|
/// * `store` - An open state store implementation that will be used through
|
|
|
|
/// the lifetime of the client.
|
|
|
|
pub fn new_with_state_store(
|
|
|
|
session: Option<Session>,
|
|
|
|
store: Box<dyn StateStore>,
|
|
|
|
) -> Result<Self> {
|
2020-05-11 08:43:21 +00:00
|
|
|
BaseClient::new_helper(session, Some(store))
|
2020-05-06 13:20:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn new_helper(session: Option<Session>, store: Option<Box<dyn StateStore>>) -> Result<Self> {
|
2020-03-12 15:28:02 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
let olm = match &session {
|
2020-04-30 11:16:10 +00:00
|
|
|
Some(s) => Some(OlmMachine::new(&s.user_id, &s.device_id)),
|
2020-03-12 15:28:02 +00:00
|
|
|
None => None,
|
|
|
|
};
|
|
|
|
|
2020-05-11 08:43:21 +00:00
|
|
|
Ok(BaseClient {
|
2020-05-06 12:27:53 +00:00
|
|
|
session: Arc::new(RwLock::new(session)),
|
2020-05-06 11:57:58 +00:00
|
|
|
sync_token: Arc::new(RwLock::new(None)),
|
|
|
|
joined_rooms: Arc::new(RwLock::new(HashMap::new())),
|
2020-05-07 00:35:15 +00:00
|
|
|
invited_rooms: Arc::new(RwLock::new(HashMap::new())),
|
|
|
|
left_rooms: Arc::new(RwLock::new(HashMap::new())),
|
2020-05-06 11:57:58 +00:00
|
|
|
ignored_users: Arc::new(RwLock::new(Vec::new())),
|
|
|
|
push_ruleset: Arc::new(RwLock::new(None)),
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter: Arc::new(RwLock::new(None)),
|
2020-05-06 13:20:20 +00:00
|
|
|
state_store: Arc::new(RwLock::new(store)),
|
2020-05-06 11:57:58 +00:00
|
|
|
needs_state_store_sync: Arc::new(AtomicBool::from(true)),
|
2020-03-11 09:08:22 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
2020-03-12 15:28:02 +00:00
|
|
|
olm: Arc::new(Mutex::new(olm)),
|
2020-03-18 13:15:56 +00:00
|
|
|
})
|
2019-10-23 20:47:00 +00:00
|
|
|
}
|
|
|
|
|
2020-05-06 13:55:18 +00:00
|
|
|
/// The current client session containing our user id, device id and access
|
|
|
|
/// token.
|
|
|
|
pub fn session(&self) -> &Arc<RwLock<Option<Session>>> {
|
|
|
|
&self.session
|
|
|
|
}
|
|
|
|
|
2019-10-23 20:47:00 +00:00
|
|
|
/// Is the client logged in.
|
2020-05-06 12:27:53 +00:00
|
|
|
pub async fn logged_in(&self) -> bool {
|
|
|
|
// TODO turn this into a atomic bool so this method doesn't need to be
|
|
|
|
// async.
|
|
|
|
self.session.read().await.is_some()
|
2019-10-23 20:47:00 +00:00
|
|
|
}
|
|
|
|
|
2020-04-02 19:59:13 +00:00
|
|
|
/// Add `EventEmitter` to `Client`.
|
|
|
|
///
|
|
|
|
/// The methods of `EventEmitter` are called when the respective `RoomEvents` occur.
|
2020-05-06 12:47:58 +00:00
|
|
|
pub async fn add_event_emitter(&self, emitter: Box<dyn EventEmitter>) {
|
|
|
|
*self.event_emitter.write().await = Some(emitter);
|
2020-04-02 19:59:13 +00:00
|
|
|
}
|
|
|
|
|
2020-04-23 23:37:27 +00:00
|
|
|
/// Returns true if the state store has been loaded into the client.
|
|
|
|
pub fn is_state_store_synced(&self) -> bool {
|
2020-05-06 11:57:58 +00:00
|
|
|
!self.needs_state_store_sync.load(Ordering::Relaxed)
|
2020-04-23 23:37:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// When a client is provided the state store will load state from the `StateStore`.
|
|
|
|
///
|
2020-04-29 19:42:20 +00:00
|
|
|
/// Returns `true` when a state store sync has successfully completed.
|
2020-05-07 12:57:38 +00:00
|
|
|
pub async fn sync_with_state_store(&self) -> Result<bool> {
|
2020-05-06 13:20:20 +00:00
|
|
|
let store = self.state_store.read().await;
|
|
|
|
if let Some(store) = store.as_ref() {
|
2020-05-06 12:27:53 +00:00
|
|
|
if let Some(sess) = self.session.read().await.as_ref() {
|
2020-04-29 11:00:14 +00:00
|
|
|
if let Some(client_state) = store.load_client_state(sess).await? {
|
|
|
|
let ClientState {
|
|
|
|
sync_token,
|
|
|
|
ignored_users,
|
|
|
|
push_ruleset,
|
|
|
|
} = client_state;
|
2020-05-06 11:57:58 +00:00
|
|
|
*self.sync_token.write().await = sync_token;
|
|
|
|
*self.ignored_users.write().await = ignored_users;
|
|
|
|
*self.push_ruleset.write().await = push_ruleset;
|
2020-04-29 11:00:14 +00:00
|
|
|
} else {
|
|
|
|
// return false and continues with a sync request then save the state and create
|
|
|
|
// and populate the files during the sync
|
|
|
|
return Ok(false);
|
2020-04-24 23:57:51 +00:00
|
|
|
}
|
2020-04-23 23:37:27 +00:00
|
|
|
|
2020-05-11 19:32:58 +00:00
|
|
|
let AllRooms {
|
|
|
|
mut joined,
|
|
|
|
mut invited,
|
|
|
|
mut left,
|
|
|
|
} = store.load_all_rooms().await?;
|
|
|
|
*self.joined_rooms.write().await = joined
|
|
|
|
.drain()
|
|
|
|
.map(|(k, room)| (k, Arc::new(RwLock::new(room))))
|
|
|
|
.collect();
|
|
|
|
*self.invited_rooms.write().await = invited
|
|
|
|
.drain()
|
|
|
|
.map(|(k, room)| (k, Arc::new(RwLock::new(room))))
|
|
|
|
.collect();
|
|
|
|
*self.left_rooms.write().await = left
|
2020-04-29 11:00:14 +00:00
|
|
|
.drain()
|
|
|
|
.map(|(k, room)| (k, Arc::new(RwLock::new(room))))
|
|
|
|
.collect();
|
2020-04-23 23:37:27 +00:00
|
|
|
|
2020-05-06 11:57:58 +00:00
|
|
|
self.needs_state_store_sync.store(false, Ordering::Relaxed);
|
2020-04-29 11:00:14 +00:00
|
|
|
}
|
2020-04-23 23:37:27 +00:00
|
|
|
}
|
2020-05-06 11:57:58 +00:00
|
|
|
Ok(!self.needs_state_store_sync.load(Ordering::Relaxed))
|
2020-04-23 23:37:27 +00:00
|
|
|
}
|
|
|
|
|
2020-05-09 11:33:57 +00:00
|
|
|
/// When a client is provided the state store will load state from the `StateStore`.
|
|
|
|
///
|
|
|
|
/// Returns `true` when a state store sync has successfully completed.
|
|
|
|
pub async fn store_room_state(&self, room_id: &RoomId) -> Result<()> {
|
|
|
|
if let Some(store) = self.state_store.read().await.as_ref() {
|
|
|
|
if let Some(room) = self.get_joined_room(room_id).await {
|
|
|
|
let room = room.read().await;
|
2020-05-11 19:32:58 +00:00
|
|
|
store
|
|
|
|
.store_room_state(RoomState::Joined(room.deref()))
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
if let Some(room) = self.get_invited_room(room_id).await {
|
|
|
|
let room = room.read().await;
|
|
|
|
store
|
|
|
|
.store_room_state(RoomState::Invited(room.deref()))
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
if let Some(room) = self.get_left_room(room_id).await {
|
|
|
|
let room = room.read().await;
|
|
|
|
store
|
|
|
|
.store_room_state(RoomState::Left(room.deref()))
|
|
|
|
.await?;
|
2020-05-09 11:33:57 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-10-23 20:47:00 +00:00
|
|
|
/// Receive a login response and update the session of the client.
|
2020-03-02 10:31:03 +00:00
|
|
|
///
|
2019-10-23 20:47:00 +00:00
|
|
|
/// # Arguments
|
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `response` - A successful login response that contains our access token
|
2019-10-23 20:47:00 +00:00
|
|
|
/// and device id.
|
2020-03-18 13:15:56 +00:00
|
|
|
pub async fn receive_login_response(
|
2020-05-06 13:36:55 +00:00
|
|
|
&self,
|
2020-03-18 13:15:56 +00:00
|
|
|
response: &api::session::login::Response,
|
|
|
|
) -> Result<()> {
|
2019-10-23 20:47:00 +00:00
|
|
|
let session = Session {
|
|
|
|
access_token: response.access_token.clone(),
|
|
|
|
device_id: response.device_id.clone(),
|
|
|
|
user_id: response.user_id.clone(),
|
|
|
|
};
|
2020-05-06 12:27:53 +00:00
|
|
|
*self.session.write().await = Some(session);
|
2020-03-11 09:08:22 +00:00
|
|
|
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
{
|
|
|
|
let mut olm = self.olm.lock().await;
|
2020-04-30 11:16:10 +00:00
|
|
|
*olm = Some(OlmMachine::new(&response.user_id, &response.device_id));
|
2020-03-11 09:08:22 +00:00
|
|
|
}
|
2020-03-18 13:15:56 +00:00
|
|
|
|
|
|
|
Ok(())
|
2019-10-23 20:47:00 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
pub(crate) async fn get_or_create_joined_room(&self, room_id: &RoomId) -> Arc<RwLock<Room>> {
|
2020-05-06 11:57:58 +00:00
|
|
|
let mut rooms = self.joined_rooms.write().await;
|
2020-05-08 09:07:08 +00:00
|
|
|
#[allow(clippy::or_fun_call)]
|
2020-05-06 11:57:58 +00:00
|
|
|
rooms
|
2020-04-03 13:07:40 +00:00
|
|
|
.entry(room_id.clone())
|
2020-04-14 22:10:10 +00:00
|
|
|
.or_insert(Arc::new(RwLock::new(Room::new(
|
2019-11-10 17:33:06 +00:00
|
|
|
room_id,
|
|
|
|
&self
|
|
|
|
.session
|
2020-05-06 12:27:53 +00:00
|
|
|
.read()
|
|
|
|
.await
|
2019-11-10 17:33:06 +00:00
|
|
|
.as_ref()
|
|
|
|
.expect("Receiving events while not being logged in")
|
2020-04-03 13:07:40 +00:00
|
|
|
.user_id,
|
2019-10-30 22:26:26 +00:00
|
|
|
))))
|
2020-05-06 11:57:58 +00:00
|
|
|
.clone()
|
2019-10-23 21:36:57 +00:00
|
|
|
}
|
2019-10-23 20:47:00 +00:00
|
|
|
|
2020-05-06 13:55:18 +00:00
|
|
|
/// Get a joined room with the given room id.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// `room_id` - The unique id of the room that should be fetched.
|
2020-05-07 12:57:38 +00:00
|
|
|
pub async fn get_joined_room(&self, room_id: &RoomId) -> Option<Arc<RwLock<Room>>> {
|
2020-05-06 11:57:58 +00:00
|
|
|
self.joined_rooms.read().await.get(room_id).cloned()
|
2020-03-31 10:57:29 +00:00
|
|
|
}
|
|
|
|
|
2020-05-06 13:55:18 +00:00
|
|
|
/// Returns the joined rooms this client knows about.
|
|
|
|
///
|
|
|
|
/// A `HashMap` of room id to `matrix::models::Room`
|
2020-05-08 14:12:21 +00:00
|
|
|
pub fn joined_rooms(&self) -> Arc<RwLock<HashMap<RoomId, Arc<RwLock<Room>>>>> {
|
2020-05-06 13:55:18 +00:00
|
|
|
self.joined_rooms.clone()
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
pub(crate) async fn get_or_create_invited_room(&self, room_id: &RoomId) -> Arc<RwLock<Room>> {
|
|
|
|
let mut rooms = self.invited_rooms.write().await;
|
2020-05-08 10:39:36 +00:00
|
|
|
#[allow(clippy::or_fun_call)]
|
2020-05-07 00:35:15 +00:00
|
|
|
rooms
|
2020-05-06 23:45:27 +00:00
|
|
|
.entry(room_id.clone())
|
|
|
|
.or_insert(Arc::new(RwLock::new(Room::new(
|
|
|
|
room_id,
|
|
|
|
&self
|
|
|
|
.session
|
2020-05-07 00:35:15 +00:00
|
|
|
.read()
|
|
|
|
.await
|
2020-05-06 23:45:27 +00:00
|
|
|
.as_ref()
|
|
|
|
.expect("Receiving events while not being logged in")
|
|
|
|
.user_id,
|
|
|
|
))))
|
2020-05-07 00:35:15 +00:00
|
|
|
.clone()
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
/// Get an invited room with the given room id.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// `room_id` - The unique id of the room that should be fetched.
|
2020-05-07 12:57:38 +00:00
|
|
|
pub async fn get_invited_room(&self, room_id: &RoomId) -> Option<Arc<RwLock<Room>>> {
|
2020-05-07 00:35:15 +00:00
|
|
|
self.invited_rooms.read().await.get(room_id).cloned()
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
/// Returns the invited rooms this client knows about.
|
|
|
|
///
|
|
|
|
/// A `HashMap` of room id to `matrix::models::Room`
|
2020-05-08 14:12:21 +00:00
|
|
|
pub fn invited_rooms(&self) -> Arc<RwLock<HashMap<RoomId, Arc<RwLock<Room>>>>> {
|
2020-05-07 00:35:15 +00:00
|
|
|
self.invited_rooms.clone()
|
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) async fn get_or_create_left_room(&self, room_id: &RoomId) -> Arc<RwLock<Room>> {
|
|
|
|
let mut rooms = self.left_rooms.write().await;
|
2020-05-08 10:39:36 +00:00
|
|
|
#[allow(clippy::or_fun_call)]
|
2020-05-07 00:35:15 +00:00
|
|
|
rooms
|
2020-05-06 23:45:27 +00:00
|
|
|
.entry(room_id.clone())
|
|
|
|
.or_insert(Arc::new(RwLock::new(Room::new(
|
|
|
|
room_id,
|
|
|
|
&self
|
|
|
|
.session
|
2020-05-07 00:35:15 +00:00
|
|
|
.read()
|
|
|
|
.await
|
2020-05-06 23:45:27 +00:00
|
|
|
.as_ref()
|
|
|
|
.expect("Receiving events while not being logged in")
|
|
|
|
.user_id,
|
|
|
|
))))
|
2020-05-07 00:35:15 +00:00
|
|
|
.clone()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Get an left room with the given room id.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// `room_id` - The unique id of the room that should be fetched.
|
2020-05-07 12:57:38 +00:00
|
|
|
pub async fn get_left_room(&self, room_id: &RoomId) -> Option<Arc<RwLock<Room>>> {
|
2020-05-07 00:35:15 +00:00
|
|
|
self.left_rooms.read().await.get(room_id).cloned()
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
/// Returns the left rooms this client knows about.
|
|
|
|
///
|
|
|
|
/// A `HashMap` of room id to `matrix::models::Room`
|
2020-05-08 14:12:21 +00:00
|
|
|
pub fn left_rooms(&self) -> Arc<RwLock<HashMap<RoomId, Arc<RwLock<Room>>>>> {
|
2020-05-07 00:35:15 +00:00
|
|
|
self.left_rooms.clone()
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
|
2020-03-29 19:54:26 +00:00
|
|
|
/// Handle a m.ignored_user_list event, updating the room state if necessary.
|
|
|
|
///
|
|
|
|
/// Returns true if the room name changed, false otherwise.
|
2020-05-06 11:57:58 +00:00
|
|
|
pub(crate) async fn handle_ignored_users(&self, event: &IgnoredUserListEvent) -> bool {
|
2020-04-03 13:07:40 +00:00
|
|
|
// this avoids cloning every UserId for the eq check
|
2020-05-06 11:57:58 +00:00
|
|
|
if self.ignored_users.read().await.iter().collect::<Vec<_>>()
|
2020-04-03 13:14:46 +00:00
|
|
|
== event.content.ignored_users.iter().collect::<Vec<_>>()
|
2020-03-30 11:14:33 +00:00
|
|
|
{
|
2020-03-29 19:54:26 +00:00
|
|
|
false
|
|
|
|
} else {
|
2020-05-06 11:57:58 +00:00
|
|
|
*self.ignored_users.write().await = event.content.ignored_users.to_vec();
|
2020-03-29 19:54:26 +00:00
|
|
|
true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Handle a m.ignored_user_list event, updating the room state if necessary.
|
|
|
|
///
|
|
|
|
/// Returns true if the room name changed, false otherwise.
|
2020-05-06 11:57:58 +00:00
|
|
|
pub(crate) async fn handle_push_rules(&self, event: &PushRulesEvent) -> bool {
|
2020-03-29 19:54:26 +00:00
|
|
|
// TODO this is basically a stub
|
2020-05-04 12:22:10 +00:00
|
|
|
// TODO ruma removed PartialEq for evens, so this doesn't work anymore.
|
|
|
|
// Returning always true for now should be ok here since those don't
|
|
|
|
// change often.
|
|
|
|
// if self.push_ruleset.as_ref() == Some(&event.content.global) {
|
|
|
|
// false
|
|
|
|
// } else {
|
2020-05-06 11:57:58 +00:00
|
|
|
*self.push_ruleset.write().await = Some(event.content.global.clone());
|
2020-05-04 12:22:10 +00:00
|
|
|
true
|
|
|
|
// }
|
2020-03-29 19:54:26 +00:00
|
|
|
}
|
|
|
|
|
2019-10-23 21:36:57 +00:00
|
|
|
/// Receive a timeline event for a joined room and update the client state.
|
2020-02-21 13:29:25 +00:00
|
|
|
///
|
2020-04-29 11:00:14 +00:00
|
|
|
/// Returns a tuple of the successfully decrypted event, or None on failure and
|
|
|
|
/// a bool, true when the `Room` state has been updated.
|
2020-03-02 10:31:03 +00:00
|
|
|
///
|
2019-10-23 21:36:57 +00:00
|
|
|
/// # Arguments
|
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
2019-10-23 21:36:57 +00:00
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `event` - The event that should be handled by the client.
|
2020-03-25 14:03:10 +00:00
|
|
|
pub async fn receive_joined_timeline_event(
|
2020-05-06 11:57:58 +00:00
|
|
|
&self,
|
2020-03-25 14:03:10 +00:00
|
|
|
room_id: &RoomId,
|
2020-04-23 08:52:47 +00:00
|
|
|
event: &mut EventJson<RoomEvent>,
|
2020-04-29 11:00:14 +00:00
|
|
|
) -> (Option<EventJson<RoomEvent>>, bool) {
|
2020-04-23 08:52:47 +00:00
|
|
|
match event.deserialize() {
|
2020-04-23 09:37:47 +00:00
|
|
|
#[allow(unused_mut)]
|
2020-04-23 08:52:47 +00:00
|
|
|
Ok(mut e) => {
|
2020-03-25 14:03:10 +00:00
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
let mut decrypted_event = None;
|
|
|
|
#[cfg(not(feature = "encryption"))]
|
|
|
|
let decrypted_event = None;
|
|
|
|
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
{
|
2020-04-30 12:07:49 +00:00
|
|
|
if let RoomEvent::RoomEncrypted(ref mut e) = e {
|
|
|
|
e.room_id = Some(room_id.to_owned());
|
|
|
|
let mut olm = self.olm.lock().await;
|
2020-03-25 14:03:10 +00:00
|
|
|
|
2020-04-30 12:07:49 +00:00
|
|
|
if let Some(o) = &mut *olm {
|
|
|
|
decrypted_event = o.decrypt_room_event(&e).await.ok();
|
2020-03-25 14:03:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
let room_lock = self.get_or_create_joined_room(&room_id).await;
|
2020-05-06 11:57:58 +00:00
|
|
|
let mut room = room_lock.write().await;
|
2020-04-29 11:00:14 +00:00
|
|
|
(decrypted_event, room.receive_timeline_event(&e))
|
2019-11-26 19:47:02 +00:00
|
|
|
}
|
2020-04-29 11:00:14 +00:00
|
|
|
_ => (None, false),
|
2019-11-26 19:47:02 +00:00
|
|
|
}
|
2019-10-23 21:36:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Receive a state event for a joined room and update the client state.
|
2020-02-21 13:29:25 +00:00
|
|
|
///
|
2020-05-06 23:45:27 +00:00
|
|
|
/// Returns true if the state of the room changed, false
|
2020-03-02 10:31:03 +00:00
|
|
|
/// otherwise.
|
|
|
|
///
|
2019-10-23 21:36:57 +00:00
|
|
|
/// # Arguments
|
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
2019-10-23 21:36:57 +00:00
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `event` - The event that should be handled by the client.
|
2020-05-06 11:57:58 +00:00
|
|
|
pub async fn receive_joined_state_event(&self, room_id: &RoomId, event: &StateEvent) -> bool {
|
2020-05-07 00:35:15 +00:00
|
|
|
let room_lock = self.get_or_create_joined_room(room_id).await;
|
|
|
|
let mut room = room_lock.write().await;
|
2019-10-23 21:36:57 +00:00
|
|
|
room.receive_state_event(event)
|
2019-10-23 20:47:00 +00:00
|
|
|
}
|
2019-11-24 21:40:52 +00:00
|
|
|
|
2020-05-05 20:13:14 +00:00
|
|
|
/// Receive a state event for a room the user has been invited to.
|
|
|
|
///
|
|
|
|
/// Returns true if the state of the room changed, false
|
|
|
|
/// otherwise.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
|
|
|
///
|
|
|
|
/// * `event` - A `AnyStrippedStateEvent` that should be handled by the client.
|
|
|
|
pub async fn receive_invite_state_event(
|
2020-05-07 00:35:15 +00:00
|
|
|
&self,
|
2020-05-05 20:13:14 +00:00
|
|
|
room_id: &RoomId,
|
|
|
|
event: &AnyStrippedStateEvent,
|
|
|
|
) -> bool {
|
2020-05-07 00:35:15 +00:00
|
|
|
let room_lock = self.get_or_create_invited_room(room_id).await;
|
|
|
|
let mut room = room_lock.write().await;
|
2020-05-05 20:13:14 +00:00
|
|
|
room.receive_stripped_state_event(event)
|
|
|
|
}
|
|
|
|
|
2020-05-06 23:45:27 +00:00
|
|
|
/// Receive a timeline event for a room the user has left and update the client state.
|
|
|
|
///
|
|
|
|
/// Returns a tuple of the successfully decrypted event, or None on failure and
|
|
|
|
/// a bool, true when the `Room` state has been updated.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
|
|
|
///
|
|
|
|
/// * `event` - The event that should be handled by the client.
|
|
|
|
pub async fn receive_left_timeline_event(
|
2020-05-07 00:35:15 +00:00
|
|
|
&self,
|
2020-05-06 23:45:27 +00:00
|
|
|
room_id: &RoomId,
|
2020-05-07 11:09:22 +00:00
|
|
|
event: &EventJson<RoomEvent>,
|
|
|
|
) -> bool {
|
2020-05-06 23:45:27 +00:00
|
|
|
match event.deserialize() {
|
2020-05-07 11:09:22 +00:00
|
|
|
Ok(e) => {
|
2020-05-07 00:35:15 +00:00
|
|
|
let room_lock = self.get_or_create_left_room(room_id).await;
|
|
|
|
let mut room = room_lock.write().await;
|
2020-05-07 11:09:22 +00:00
|
|
|
room.receive_timeline_event(&e)
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
2020-05-07 11:09:22 +00:00
|
|
|
_ => false,
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Receive a state event for a room the user has left and update the client state.
|
|
|
|
///
|
|
|
|
/// Returns true if the state of the room changed, false
|
|
|
|
/// otherwise.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
|
|
|
///
|
|
|
|
/// * `event` - The event that should be handled by the client.
|
2020-05-07 00:35:15 +00:00
|
|
|
pub async fn receive_left_state_event(&self, room_id: &RoomId, event: &StateEvent) -> bool {
|
|
|
|
let room_lock = self.get_or_create_left_room(room_id).await;
|
2020-05-06 11:57:58 +00:00
|
|
|
let mut room = room_lock.write().await;
|
2020-05-06 23:45:27 +00:00
|
|
|
room.receive_state_event(event)
|
|
|
|
}
|
|
|
|
|
2020-03-31 10:57:29 +00:00
|
|
|
/// Receive a presence event from a sync response and updates the client state.
|
2020-03-28 10:58:30 +00:00
|
|
|
///
|
2020-05-06 23:45:27 +00:00
|
|
|
/// Returns true if the state of the room changed, false
|
2020-03-28 10:58:30 +00:00
|
|
|
/// otherwise.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
|
|
|
///
|
|
|
|
/// * `event` - The event that should be handled by the client.
|
2020-05-06 11:57:58 +00:00
|
|
|
pub async fn receive_presence_event(&self, room_id: &RoomId, event: &PresenceEvent) -> bool {
|
2020-03-31 10:57:29 +00:00
|
|
|
// this should be the room that was just created in the `Client::sync` loop.
|
2020-05-06 13:55:18 +00:00
|
|
|
if let Some(room) = self.get_joined_room(room_id).await {
|
2020-04-14 22:10:10 +00:00
|
|
|
let mut room = room.write().await;
|
2020-03-31 10:57:29 +00:00
|
|
|
room.receive_presence_event(event)
|
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
2020-03-28 10:58:30 +00:00
|
|
|
}
|
|
|
|
|
2020-04-07 12:55:42 +00:00
|
|
|
/// Receive an account data event from a sync response and updates the client state.
|
|
|
|
///
|
|
|
|
/// Returns true if the state of the `Room` has changed, false otherwise.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
|
|
|
///
|
|
|
|
/// * `event` - The presence event for a specified room member.
|
2020-05-06 11:57:58 +00:00
|
|
|
pub async fn receive_account_data_event(&self, room_id: &RoomId, event: &NonRoomEvent) -> bool {
|
2020-04-07 12:55:42 +00:00
|
|
|
match event {
|
2020-05-06 11:57:58 +00:00
|
|
|
NonRoomEvent::IgnoredUserList(iu) => self.handle_ignored_users(iu).await,
|
2020-04-07 12:55:42 +00:00
|
|
|
NonRoomEvent::Presence(p) => self.receive_presence_event(room_id, p).await,
|
2020-05-06 11:57:58 +00:00
|
|
|
NonRoomEvent::PushRules(pr) => self.handle_push_rules(pr).await,
|
2020-04-07 12:55:42 +00:00
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Receive an ephemeral event from a sync response and updates the client state.
|
2020-03-29 19:54:26 +00:00
|
|
|
///
|
2020-04-07 12:55:42 +00:00
|
|
|
/// Returns true if the state of the `Room` has changed, false otherwise.
|
2020-03-29 19:54:26 +00:00
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
2020-04-02 19:59:13 +00:00
|
|
|
/// * `room_id` - The unique id of the room the event belongs to.
|
|
|
|
///
|
2020-03-29 19:54:26 +00:00
|
|
|
/// * `event` - The presence event for a specified room member.
|
2020-05-06 11:57:58 +00:00
|
|
|
pub async fn receive_ephemeral_event(&self, room_id: &RoomId, event: &NonRoomEvent) -> bool {
|
2020-03-29 19:54:26 +00:00
|
|
|
match event {
|
2020-05-06 11:57:58 +00:00
|
|
|
NonRoomEvent::IgnoredUserList(iu) => self.handle_ignored_users(iu).await,
|
2020-04-01 01:08:25 +00:00
|
|
|
NonRoomEvent::Presence(p) => self.receive_presence_event(room_id, p).await,
|
2020-05-06 11:57:58 +00:00
|
|
|
NonRoomEvent::PushRules(pr) => self.handle_push_rules(pr).await,
|
2020-03-29 19:54:26 +00:00
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-06 11:57:58 +00:00
|
|
|
/// Get the current, if any, sync token of the client.
|
|
|
|
/// This will be None if the client didn't sync at least once.
|
|
|
|
pub async fn sync_token(&self) -> Option<String> {
|
|
|
|
self.sync_token.read().await.clone()
|
|
|
|
}
|
|
|
|
|
2020-02-21 13:29:25 +00:00
|
|
|
/// Receive a response from a sync call.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
2020-03-02 10:31:03 +00:00
|
|
|
/// * `response` - The response that we received after a successful sync.
|
2020-04-29 11:00:14 +00:00
|
|
|
///
|
|
|
|
/// * `did_update` - Signals to the `StateStore` if the client state needs updating.
|
|
|
|
pub async fn receive_sync_response(
|
2020-05-06 11:57:58 +00:00
|
|
|
&self,
|
2020-04-29 11:00:14 +00:00
|
|
|
response: &mut api::sync::sync_events::Response,
|
|
|
|
) -> Result<()> {
|
2020-05-06 11:57:58 +00:00
|
|
|
*self.sync_token.write().await = Some(response.next_batch.clone());
|
2020-03-12 14:41:11 +00:00
|
|
|
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
{
|
2020-03-12 15:14:43 +00:00
|
|
|
let mut olm = self.olm.lock().await;
|
2020-03-12 14:41:11 +00:00
|
|
|
|
2020-03-12 15:14:43 +00:00
|
|
|
if let Some(o) = &mut *olm {
|
2020-03-23 15:14:10 +00:00
|
|
|
o.receive_sync_response(response).await;
|
2020-04-01 13:37:00 +00:00
|
|
|
|
|
|
|
// TODO once the base client deals with callbacks move this into the
|
|
|
|
// part where we already iterate through the rooms to avoid yet
|
|
|
|
// another room loop.
|
2020-05-06 11:57:58 +00:00
|
|
|
for room in self.joined_rooms.read().await.values() {
|
|
|
|
let room = room.read().await;
|
2020-04-01 13:37:00 +00:00
|
|
|
if !room.is_encrypted() {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
o.update_tracked_users(room.members.keys()).await;
|
|
|
|
}
|
2020-03-12 14:41:11 +00:00
|
|
|
}
|
|
|
|
}
|
2020-04-29 11:00:14 +00:00
|
|
|
|
2020-05-07 19:24:55 +00:00
|
|
|
// TODO do we want to move the rooms to the appropriate HashMaps when the corresponding
|
|
|
|
// event comes in e.g. move a joined room to a left room when leave event comes?
|
|
|
|
|
2020-05-09 11:33:57 +00:00
|
|
|
// when events change state, updated_* signals to StateStore to update database
|
2020-05-08 10:39:36 +00:00
|
|
|
let updated_joined = self.iter_joined_rooms(response).await?;
|
|
|
|
let updated_invited = self.iter_invited_rooms(&response).await?;
|
|
|
|
let updated_left = self.iter_left_rooms(response).await?;
|
2020-05-07 00:35:15 +00:00
|
|
|
|
2020-05-08 10:39:36 +00:00
|
|
|
if updated_joined || updated_invited || updated_left {
|
2020-05-07 00:35:15 +00:00
|
|
|
let store = self.state_store.read().await;
|
|
|
|
|
|
|
|
if let Some(store) = store.as_ref() {
|
|
|
|
let state = ClientState::from_base_client(&self).await;
|
2020-04-29 11:00:14 +00:00
|
|
|
store.store_client_state(state).await?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
2019-11-24 21:40:52 +00:00
|
|
|
}
|
2020-03-11 09:10:43 +00:00
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
async fn iter_joined_rooms(
|
|
|
|
&self,
|
|
|
|
response: &mut api::sync::sync_events::Response,
|
|
|
|
) -> Result<bool> {
|
2020-05-06 11:57:58 +00:00
|
|
|
let mut updated = false;
|
2020-05-07 00:35:15 +00:00
|
|
|
for (room_id, joined_room) in &mut response.rooms.join {
|
2020-05-06 11:57:58 +00:00
|
|
|
let matrix_room = {
|
2020-05-07 00:35:15 +00:00
|
|
|
for event in &joined_room.state.events {
|
2020-05-06 11:57:58 +00:00
|
|
|
if let Ok(e) = event.deserialize() {
|
|
|
|
if self.receive_joined_state_event(&room_id, &e).await {
|
|
|
|
updated = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
self.get_or_create_joined_room(&room_id).await.clone()
|
2020-05-06 11:57:58 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
// RoomSummary contains information for calculating room name
|
2020-05-07 00:35:15 +00:00
|
|
|
matrix_room
|
|
|
|
.write()
|
|
|
|
.await
|
|
|
|
.set_room_summary(&joined_room.summary);
|
2020-05-06 11:57:58 +00:00
|
|
|
|
2020-05-07 19:21:06 +00:00
|
|
|
// set unread notification count
|
|
|
|
matrix_room
|
|
|
|
.write()
|
|
|
|
.await
|
|
|
|
.set_unread_notice_count(&joined_room.unread_notifications);
|
|
|
|
|
2020-05-06 11:57:58 +00:00
|
|
|
// re looping is not ideal here
|
2020-05-07 00:35:15 +00:00
|
|
|
for event in &mut joined_room.state.events {
|
2020-05-06 11:57:58 +00:00
|
|
|
if let Ok(e) = event.deserialize() {
|
2020-05-07 00:35:15 +00:00
|
|
|
self.emit_state_event(&room_id, &e, RoomStateType::Joined)
|
|
|
|
.await;
|
2020-05-06 11:57:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
for mut event in &mut joined_room.timeline.events {
|
2020-05-06 11:57:58 +00:00
|
|
|
let decrypted_event = {
|
|
|
|
let (decrypt_ev, timeline_update) = self
|
|
|
|
.receive_joined_timeline_event(room_id, &mut event)
|
|
|
|
.await;
|
|
|
|
if timeline_update {
|
|
|
|
updated = true;
|
|
|
|
};
|
|
|
|
decrypt_ev
|
|
|
|
};
|
|
|
|
|
|
|
|
if let Some(e) = decrypted_event {
|
|
|
|
*event = e;
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Ok(e) = event.deserialize() {
|
2020-05-07 00:35:15 +00:00
|
|
|
self.emit_timeline_event(&room_id, &e, RoomStateType::Joined)
|
|
|
|
.await;
|
2020-05-06 11:57:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// look at AccountData to further cut down users by collecting ignored users
|
2020-05-07 00:35:15 +00:00
|
|
|
if let Some(account_data) = &joined_room.account_data {
|
2020-05-06 11:57:58 +00:00
|
|
|
for account_data in &account_data.events {
|
|
|
|
{
|
|
|
|
if let Ok(e) = account_data.deserialize() {
|
|
|
|
if self.receive_account_data_event(&room_id, &e).await {
|
|
|
|
updated = true;
|
|
|
|
}
|
2020-05-07 00:35:15 +00:00
|
|
|
self.emit_account_data_event(room_id, &e, RoomStateType::Joined)
|
|
|
|
.await;
|
2020-05-06 11:57:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// After the room has been created and state/timeline events accounted for we use the room_id of the newly created
|
|
|
|
// room to add any presence events that relate to a user in the current room. This is not super
|
|
|
|
// efficient but we need a room_id so we would loop through now or later.
|
|
|
|
for presence in &mut response.presence.events {
|
|
|
|
{
|
|
|
|
if let Ok(e) = presence.deserialize() {
|
|
|
|
if self.receive_presence_event(&room_id, &e).await {
|
|
|
|
updated = true;
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
self.emit_presence_event(&room_id, &e, RoomStateType::Joined)
|
|
|
|
.await;
|
2020-05-06 11:57:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
for ephemeral in &mut joined_room.ephemeral.events {
|
2020-05-06 11:57:58 +00:00
|
|
|
{
|
|
|
|
if let Ok(e) = ephemeral.deserialize() {
|
|
|
|
if self.receive_ephemeral_event(&room_id, &e).await {
|
|
|
|
updated = true;
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
self.emit_ephemeral_event(&room_id, &e, RoomStateType::Joined)
|
|
|
|
.await;
|
2020-05-06 11:57:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if updated {
|
2020-05-07 00:35:15 +00:00
|
|
|
if let Some(store) = self.state_store.read().await.as_ref() {
|
|
|
|
store
|
2020-05-11 19:32:58 +00:00
|
|
|
.store_room_state(RoomState::Joined(matrix_room.read().await.deref()))
|
2020-05-07 00:35:15 +00:00
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(updated)
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn iter_left_rooms(
|
|
|
|
&self,
|
|
|
|
response: &mut api::sync::sync_events::Response,
|
|
|
|
) -> Result<bool> {
|
|
|
|
let mut updated = false;
|
|
|
|
for (room_id, left_room) in &mut response.rooms.leave {
|
|
|
|
let matrix_room = {
|
|
|
|
for event in &left_room.state.events {
|
|
|
|
if let Ok(e) = event.deserialize() {
|
|
|
|
if self.receive_left_state_event(&room_id, &e).await {
|
|
|
|
updated = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
self.get_or_create_left_room(&room_id).await.clone()
|
|
|
|
};
|
|
|
|
|
|
|
|
for event in &mut left_room.state.events {
|
|
|
|
if let Ok(e) = event.deserialize() {
|
|
|
|
self.emit_state_event(&room_id, &e, RoomStateType::Left)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
}
|
2020-05-06 13:20:20 +00:00
|
|
|
|
2020-05-08 10:39:36 +00:00
|
|
|
for event in &mut left_room.timeline.events {
|
|
|
|
if self.receive_left_timeline_event(room_id, &event).await {
|
2020-05-07 11:09:22 +00:00
|
|
|
updated = true;
|
2020-05-07 00:35:15 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
if let Ok(e) = event.deserialize() {
|
|
|
|
self.emit_timeline_event(&room_id, &e, RoomStateType::Left)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if updated {
|
|
|
|
if let Some(store) = self.state_store.read().await.as_ref() {
|
2020-05-06 11:57:58 +00:00
|
|
|
store
|
2020-05-11 19:32:58 +00:00
|
|
|
.store_room_state(RoomState::Left(matrix_room.read().await.deref()))
|
2020-05-06 11:57:58 +00:00
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-05-07 00:35:15 +00:00
|
|
|
Ok(updated)
|
|
|
|
}
|
2020-05-06 11:57:58 +00:00
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
async fn iter_invited_rooms(
|
|
|
|
&self,
|
|
|
|
response: &api::sync::sync_events::Response,
|
|
|
|
) -> Result<bool> {
|
|
|
|
let mut updated = false;
|
|
|
|
for (room_id, invited_room) in &response.rooms.invite {
|
|
|
|
let matrix_room = {
|
|
|
|
for event in &invited_room.invite_state.events {
|
|
|
|
if let Ok(e) = event.deserialize() {
|
|
|
|
if self.receive_invite_state_event(&room_id, &e).await {
|
|
|
|
updated = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-05-06 13:20:20 +00:00
|
|
|
|
2020-05-07 11:09:22 +00:00
|
|
|
self.get_or_create_invited_room(&room_id).await.clone()
|
2020-05-07 00:35:15 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
for event in &invited_room.invite_state.events {
|
|
|
|
if let Ok(e) = event.deserialize() {
|
|
|
|
self.emit_stripped_state_event(&room_id, &e, RoomStateType::Invited)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if updated {
|
|
|
|
if let Some(store) = self.state_store.read().await.as_ref() {
|
|
|
|
store
|
2020-05-11 19:32:58 +00:00
|
|
|
.store_room_state(RoomState::Invited(matrix_room.read().await.deref()))
|
2020-05-07 00:35:15 +00:00
|
|
|
.await?;
|
|
|
|
}
|
2020-04-29 11:00:14 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-07 00:35:15 +00:00
|
|
|
Ok(updated)
|
2019-11-24 21:40:52 +00:00
|
|
|
}
|
2020-03-11 09:10:43 +00:00
|
|
|
|
|
|
|
/// Should account or one-time keys be uploaded to the server.
|
|
|
|
#[cfg(feature = "encryption")]
|
2020-03-19 12:55:04 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
2020-03-11 09:10:43 +00:00
|
|
|
pub async fn should_upload_keys(&self) -> bool {
|
|
|
|
let olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &*olm {
|
2020-03-18 14:50:32 +00:00
|
|
|
Some(o) => o.should_upload_keys().await,
|
2020-03-11 09:10:43 +00:00
|
|
|
None => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-10 09:47:01 +00:00
|
|
|
/// Should the client share a group session for the given room.
|
|
|
|
///
|
|
|
|
/// Returns true if a session needs to be shared before room messages can be
|
|
|
|
/// encrypted, false if one is already shared and ready to encrypt room
|
|
|
|
/// messages.
|
|
|
|
///
|
|
|
|
/// This should be called every time a new room message wants to be sent out
|
|
|
|
/// since group sessions can expire at any time.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn should_share_group_session(&self, room_id: &RoomId) -> bool {
|
|
|
|
let olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &*olm {
|
|
|
|
Some(o) => o.should_share_group_session(room_id),
|
|
|
|
None => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-01 13:37:00 +00:00
|
|
|
/// Should users be queried for their device keys.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn should_query_keys(&self) -> bool {
|
|
|
|
let olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &*olm {
|
|
|
|
Some(o) => o.should_query_keys(),
|
|
|
|
None => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-03 08:27:30 +00:00
|
|
|
/// Get a tuple of device and one-time keys that need to be uploaded.
|
|
|
|
///
|
|
|
|
/// Returns an empty error if no keys need to be uploaded.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn get_missing_sessions(
|
|
|
|
&self,
|
2020-04-03 15:00:37 +00:00
|
|
|
users: impl Iterator<Item = &UserId>,
|
2020-04-27 14:26:03 +00:00
|
|
|
) -> Result<BTreeMap<UserId, BTreeMap<DeviceId, KeyAlgorithm>>> {
|
2020-04-03 08:27:30 +00:00
|
|
|
let mut olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &mut *olm {
|
2020-04-27 14:26:03 +00:00
|
|
|
Some(o) => Ok(o.get_missing_sessions(users).await?),
|
|
|
|
None => Ok(BTreeMap::new()),
|
2020-04-03 08:27:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-09 14:27:09 +00:00
|
|
|
/// Get a to-device request that will share a group session for a room.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn share_group_session(
|
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
|
|
|
) -> Result<Vec<send_event_to_device::Request>> {
|
2020-05-06 13:55:18 +00:00
|
|
|
let room = self.get_joined_room(room_id).await.expect("No room found");
|
2020-04-09 14:27:09 +00:00
|
|
|
let mut olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &mut *olm {
|
|
|
|
Some(o) => {
|
2020-04-14 22:10:10 +00:00
|
|
|
let room = room.write().await;
|
2020-04-09 14:27:09 +00:00
|
|
|
let members = room.members.keys();
|
2020-04-10 09:45:50 +00:00
|
|
|
Ok(o.share_group_session(room_id, members).await?)
|
2020-04-09 14:27:09 +00:00
|
|
|
}
|
|
|
|
None => panic!("Olm machine wasn't started"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Encrypt a message event content.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn encrypt(
|
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
|
|
|
content: MessageEventContent,
|
2020-05-05 13:29:25 +00:00
|
|
|
) -> Result<EncryptedEventContent> {
|
2020-04-09 14:27:09 +00:00
|
|
|
let mut olm = self.olm.lock().await;
|
|
|
|
|
2020-05-05 13:29:25 +00:00
|
|
|
match &mut *olm {
|
|
|
|
Some(o) => Ok(o.encrypt(room_id, content).await?),
|
|
|
|
None => panic!("Olm machine wasn't started"),
|
|
|
|
}
|
2020-04-09 14:27:09 +00:00
|
|
|
}
|
|
|
|
|
2020-03-11 09:10:43 +00:00
|
|
|
/// Get a tuple of device and one-time keys that need to be uploaded.
|
|
|
|
///
|
|
|
|
/// Returns an empty error if no keys need to be uploaded.
|
|
|
|
#[cfg(feature = "encryption")]
|
2020-03-19 12:55:04 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
2020-03-18 13:15:56 +00:00
|
|
|
pub async fn keys_for_upload(
|
|
|
|
&self,
|
|
|
|
) -> StdResult<(Option<DeviceKeys>, Option<OneTimeKeys>), ()> {
|
2020-03-11 09:10:43 +00:00
|
|
|
let olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &*olm {
|
2020-03-18 14:50:32 +00:00
|
|
|
Some(o) => o.keys_for_upload().await,
|
2020-03-11 09:10:43 +00:00
|
|
|
None => Err(()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-01 13:37:00 +00:00
|
|
|
/// Get the users that we need to query keys for.
|
|
|
|
///
|
|
|
|
/// Returns an empty error if no keys need to be queried.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
2020-04-03 15:00:37 +00:00
|
|
|
pub async fn users_for_key_query(&self) -> StdResult<HashSet<UserId>, ()> {
|
2020-04-01 13:37:00 +00:00
|
|
|
let olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
match &*olm {
|
|
|
|
Some(o) => Ok(o.users_for_key_query()),
|
|
|
|
None => Err(()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-11 09:10:43 +00:00
|
|
|
/// Receive a successful keys upload response.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `response` - The keys upload response of the request that the client
|
|
|
|
/// performed.
|
|
|
|
///
|
|
|
|
/// # Panics
|
|
|
|
/// Panics if the client hasn't been logged in.
|
|
|
|
#[cfg(feature = "encryption")]
|
2020-03-19 12:55:04 +00:00
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
2020-03-18 14:50:32 +00:00
|
|
|
pub async fn receive_keys_upload_response(&self, response: &KeysUploadResponse) -> Result<()> {
|
2020-03-11 09:10:43 +00:00
|
|
|
let mut olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
let o = olm.as_mut().expect("Client isn't logged in.");
|
2020-03-18 14:50:32 +00:00
|
|
|
o.receive_keys_upload_response(response).await?;
|
|
|
|
Ok(())
|
2020-03-11 09:10:43 +00:00
|
|
|
}
|
2020-04-01 13:37:00 +00:00
|
|
|
|
2020-04-03 08:27:30 +00:00
|
|
|
/// Receive a successful keys claim response.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `response` - The keys claim response of the request that the client
|
|
|
|
/// performed.
|
|
|
|
///
|
|
|
|
/// # Panics
|
|
|
|
/// Panics if the client hasn't been logged in.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn receive_keys_claim_response(&self, response: &KeysClaimResponse) -> Result<()> {
|
|
|
|
let mut olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
let o = olm.as_mut().expect("Client isn't logged in.");
|
|
|
|
o.receive_keys_claim_response(response).await?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-04-01 13:37:00 +00:00
|
|
|
/// Receive a successful keys query response.
|
|
|
|
///
|
|
|
|
/// # Arguments
|
|
|
|
///
|
|
|
|
/// * `response` - The keys query response of the request that the client
|
|
|
|
/// performed.
|
|
|
|
///
|
|
|
|
/// # Panics
|
|
|
|
/// Panics if the client hasn't been logged in.
|
|
|
|
#[cfg(feature = "encryption")]
|
|
|
|
#[cfg_attr(docsrs, doc(cfg(feature = "encryption")))]
|
|
|
|
pub async fn receive_keys_query_response(&self, response: &KeysQueryResponse) -> Result<()> {
|
|
|
|
let mut olm = self.olm.lock().await;
|
|
|
|
|
|
|
|
let o = olm.as_mut().expect("Client isn't logged in.");
|
|
|
|
o.receive_keys_query_response(response).await?;
|
|
|
|
// TODO notify our callers of new devices via some callback.
|
|
|
|
Ok(())
|
|
|
|
}
|
2020-04-02 11:06:21 +00:00
|
|
|
|
2020-05-06 23:45:27 +00:00
|
|
|
pub(crate) async fn emit_timeline_event(
|
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
|
|
|
event: &RoomEvent,
|
|
|
|
room_state: RoomStateType,
|
|
|
|
) {
|
2020-05-06 12:47:58 +00:00
|
|
|
let lock = self.event_emitter.read().await;
|
|
|
|
let event_emitter = if let Some(ee) = lock.as_ref() {
|
|
|
|
ee
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
};
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
let room = match room_state {
|
|
|
|
RoomStateType::Invited => {
|
|
|
|
if let Some(room) = self.get_invited_room(&room_id).await {
|
|
|
|
RoomState::Invited(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Joined => {
|
|
|
|
if let Some(room) = self.get_joined_room(&room_id).await {
|
|
|
|
RoomState::Joined(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Left => {
|
|
|
|
if let Some(room) = self.get_left_room(&room_id).await {
|
|
|
|
RoomState::Left(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
};
|
|
|
|
|
2020-03-31 23:34:11 +00:00
|
|
|
match event {
|
2020-05-06 12:47:58 +00:00
|
|
|
RoomEvent::RoomMember(mem) => event_emitter.on_room_member(room, &mem).await,
|
|
|
|
RoomEvent::RoomName(name) => event_emitter.on_room_name(room, &name).await,
|
2020-04-01 13:19:14 +00:00
|
|
|
RoomEvent::RoomCanonicalAlias(canonical) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter
|
|
|
|
.on_room_canonical_alias(room, &canonical)
|
|
|
|
.await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
RoomEvent::RoomAliases(aliases) => event_emitter.on_room_aliases(room, &aliases).await,
|
|
|
|
RoomEvent::RoomAvatar(avatar) => event_emitter.on_room_avatar(room, &avatar).await,
|
|
|
|
RoomEvent::RoomMessage(msg) => event_emitter.on_room_message(room, &msg).await,
|
2020-04-01 13:19:14 +00:00
|
|
|
RoomEvent::RoomMessageFeedback(msg_feedback) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter
|
|
|
|
.on_room_message_feedback(room, &msg_feedback)
|
|
|
|
.await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
RoomEvent::RoomRedaction(redaction) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_room_redaction(room, &redaction).await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
RoomEvent::RoomPowerLevels(power) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_room_power_levels(room, &power).await
|
2020-04-23 11:05:59 +00:00
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
RoomEvent::RoomTombstone(tomb) => event_emitter.on_room_tombstone(room, &tomb).await,
|
2020-03-31 23:34:11 +00:00
|
|
|
_ => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
pub(crate) async fn emit_state_event(
|
2020-05-05 20:13:14 +00:00
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
2020-05-07 00:35:15 +00:00
|
|
|
event: &StateEvent,
|
2020-05-06 23:45:27 +00:00
|
|
|
room_state: RoomStateType,
|
2020-05-05 20:13:14 +00:00
|
|
|
) {
|
2020-05-06 12:47:58 +00:00
|
|
|
let lock = self.event_emitter.read().await;
|
|
|
|
let event_emitter = if let Some(ee) = lock.as_ref() {
|
|
|
|
ee
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
};
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
let room = match room_state {
|
|
|
|
RoomStateType::Invited => {
|
|
|
|
if let Some(room) = self.get_invited_room(&room_id).await {
|
|
|
|
RoomState::Invited(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Joined => {
|
|
|
|
if let Some(room) = self.get_joined_room(&room_id).await {
|
|
|
|
RoomState::Joined(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Left => {
|
|
|
|
if let Some(room) = self.get_left_room(&room_id).await {
|
|
|
|
RoomState::Left(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
};
|
|
|
|
|
2020-03-31 23:34:11 +00:00
|
|
|
match event {
|
2020-05-06 12:47:58 +00:00
|
|
|
StateEvent::RoomMember(member) => event_emitter.on_state_member(room, &member).await,
|
|
|
|
StateEvent::RoomName(name) => event_emitter.on_state_name(room, &name).await,
|
2020-04-01 13:19:14 +00:00
|
|
|
StateEvent::RoomCanonicalAlias(canonical) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter
|
|
|
|
.on_state_canonical_alias(room, &canonical)
|
|
|
|
.await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
StateEvent::RoomAliases(aliases) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_state_aliases(room, &aliases).await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
StateEvent::RoomAvatar(avatar) => event_emitter.on_state_avatar(room, &avatar).await,
|
2020-04-01 13:19:14 +00:00
|
|
|
StateEvent::RoomPowerLevels(power) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_state_power_levels(room, &power).await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
StateEvent::RoomJoinRules(rules) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_state_join_rules(room, &rules).await
|
2020-04-23 11:05:59 +00:00
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
StateEvent::RoomTombstone(tomb) => event_emitter.on_room_tombstone(room, &tomb).await,
|
2020-03-31 23:34:11 +00:00
|
|
|
_ => {}
|
|
|
|
}
|
2020-05-05 20:13:14 +00:00
|
|
|
}
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
pub(crate) async fn emit_stripped_state_event(
|
2020-05-06 23:45:27 +00:00
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
2020-05-07 00:35:15 +00:00
|
|
|
event: &AnyStrippedStateEvent,
|
2020-05-06 23:45:27 +00:00
|
|
|
room_state: RoomStateType,
|
|
|
|
) {
|
2020-05-06 12:47:58 +00:00
|
|
|
let lock = self.event_emitter.read().await;
|
|
|
|
let event_emitter = if let Some(ee) = lock.as_ref() {
|
|
|
|
ee
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
};
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
let room = match room_state {
|
|
|
|
RoomStateType::Invited => {
|
|
|
|
if let Some(room) = self.get_invited_room(&room_id).await {
|
|
|
|
RoomState::Invited(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Joined => {
|
|
|
|
if let Some(room) = self.get_joined_room(&room_id).await {
|
|
|
|
RoomState::Joined(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Left => {
|
|
|
|
if let Some(room) = self.get_left_room(&room_id).await {
|
|
|
|
RoomState::Left(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
match event {
|
|
|
|
AnyStrippedStateEvent::RoomMember(member) => {
|
|
|
|
event_emitter.on_stripped_state_member(room, &member).await
|
|
|
|
}
|
|
|
|
AnyStrippedStateEvent::RoomName(name) => {
|
|
|
|
event_emitter.on_stripped_state_name(room, &name).await
|
|
|
|
}
|
|
|
|
AnyStrippedStateEvent::RoomCanonicalAlias(canonical) => {
|
|
|
|
event_emitter
|
|
|
|
.on_stripped_state_canonical_alias(room, &canonical)
|
|
|
|
.await
|
|
|
|
}
|
|
|
|
AnyStrippedStateEvent::RoomAliases(aliases) => {
|
|
|
|
event_emitter
|
|
|
|
.on_stripped_state_aliases(room, &aliases)
|
|
|
|
.await
|
|
|
|
}
|
|
|
|
AnyStrippedStateEvent::RoomAvatar(avatar) => {
|
|
|
|
event_emitter.on_stripped_state_avatar(room, &avatar).await
|
|
|
|
}
|
|
|
|
AnyStrippedStateEvent::RoomPowerLevels(power) => {
|
|
|
|
event_emitter
|
|
|
|
.on_stripped_state_power_levels(room, &power)
|
|
|
|
.await
|
|
|
|
}
|
|
|
|
AnyStrippedStateEvent::RoomJoinRules(rules) => {
|
|
|
|
event_emitter
|
|
|
|
.on_stripped_state_join_rules(room, &rules)
|
|
|
|
.await
|
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
2020-05-06 23:45:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub(crate) async fn emit_account_data_event(
|
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
|
|
|
event: &NonRoomEvent,
|
|
|
|
room_state: RoomStateType,
|
|
|
|
) {
|
2020-05-07 00:35:15 +00:00
|
|
|
let lock = self.event_emitter.read().await;
|
|
|
|
let event_emitter = if let Some(ee) = lock.as_ref() {
|
|
|
|
ee
|
2020-05-06 12:47:58 +00:00
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
};
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
let room = match room_state {
|
|
|
|
RoomStateType::Invited => {
|
|
|
|
if let Some(room) = self.get_invited_room(&room_id).await {
|
|
|
|
RoomState::Invited(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Joined => {
|
|
|
|
if let Some(room) = self.get_joined_room(&room_id).await {
|
|
|
|
RoomState::Joined(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Left => {
|
|
|
|
if let Some(room) = self.get_left_room(&room_id).await {
|
|
|
|
RoomState::Left(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-04-07 12:55:42 +00:00
|
|
|
match event {
|
|
|
|
NonRoomEvent::Presence(presence) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_account_presence(room, &presence).await
|
2020-04-07 12:55:42 +00:00
|
|
|
}
|
|
|
|
NonRoomEvent::IgnoredUserList(ignored) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_account_ignored_users(room, &ignored).await
|
2020-04-07 12:55:42 +00:00
|
|
|
}
|
|
|
|
NonRoomEvent::PushRules(rules) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_account_push_rules(room, &rules).await
|
2020-04-07 12:55:42 +00:00
|
|
|
}
|
|
|
|
NonRoomEvent::FullyRead(full_read) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter
|
|
|
|
.on_account_data_fully_read(room, &full_read)
|
|
|
|
.await
|
2020-04-07 12:55:42 +00:00
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
|
|
|
|
2020-05-06 23:45:27 +00:00
|
|
|
pub(crate) async fn emit_ephemeral_event(
|
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
|
|
|
event: &NonRoomEvent,
|
|
|
|
room_state: RoomStateType,
|
|
|
|
) {
|
2020-05-06 12:47:58 +00:00
|
|
|
let lock = self.event_emitter.read().await;
|
|
|
|
let event_emitter = if let Some(ee) = lock.as_ref() {
|
|
|
|
ee
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
};
|
|
|
|
|
2020-05-07 00:35:15 +00:00
|
|
|
let room = match room_state {
|
|
|
|
RoomStateType::Invited => {
|
|
|
|
if let Some(room) = self.get_invited_room(&room_id).await {
|
|
|
|
RoomState::Invited(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Joined => {
|
|
|
|
if let Some(room) = self.get_joined_room(&room_id).await {
|
|
|
|
RoomState::Joined(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RoomStateType::Left => {
|
|
|
|
if let Some(room) = self.get_left_room(&room_id).await {
|
|
|
|
RoomState::Left(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2020-05-06 12:47:58 +00:00
|
|
|
};
|
|
|
|
|
2020-03-31 23:34:11 +00:00
|
|
|
match event {
|
2020-04-01 13:19:14 +00:00
|
|
|
NonRoomEvent::Presence(presence) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_account_presence(room, &presence).await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
NonRoomEvent::IgnoredUserList(ignored) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_account_ignored_users(room, &ignored).await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
NonRoomEvent::PushRules(rules) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter.on_account_push_rules(room, &rules).await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-04-01 13:19:14 +00:00
|
|
|
NonRoomEvent::FullyRead(full_read) => {
|
2020-05-06 12:47:58 +00:00
|
|
|
event_emitter
|
|
|
|
.on_account_data_fully_read(room, &full_read)
|
|
|
|
.await
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
|
|
|
_ => {}
|
|
|
|
}
|
2020-04-07 12:55:42 +00:00
|
|
|
}
|
|
|
|
|
2020-05-06 23:45:27 +00:00
|
|
|
pub(crate) async fn emit_presence_event(
|
|
|
|
&self,
|
|
|
|
room_id: &RoomId,
|
|
|
|
event: &PresenceEvent,
|
|
|
|
room_state: RoomStateType,
|
|
|
|
) {
|
2020-05-07 00:35:15 +00:00
|
|
|
let room = match room_state {
|
|
|
|
RoomStateType::Invited => {
|
|
|
|
if let Some(room) = self.get_invited_room(&room_id).await {
|
|
|
|
RoomState::Invited(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-07 00:35:15 +00:00
|
|
|
RoomStateType::Joined => {
|
|
|
|
if let Some(room) = self.get_joined_room(&room_id).await {
|
|
|
|
RoomState::Joined(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
2020-05-07 00:35:15 +00:00
|
|
|
}
|
|
|
|
RoomStateType::Left => {
|
|
|
|
if let Some(room) = self.get_left_room(&room_id).await {
|
|
|
|
RoomState::Left(Arc::clone(&room))
|
|
|
|
} else {
|
|
|
|
return;
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-07 00:35:15 +00:00
|
|
|
};
|
|
|
|
if let Some(ee) = &self.event_emitter.read().await.as_ref() {
|
|
|
|
ee.on_presence_event(room, &event).await;
|
2020-03-31 23:34:11 +00:00
|
|
|
}
|
|
|
|
}
|
2019-10-23 20:47:00 +00:00
|
|
|
}
|