Some checks failed
Release Docker Image / Create Max-Perf Manifest (push) Blocked by required conditions
Checks / Prek / Pre-commit & Formatting (push) Successful in 1m37s
Documentation / Build and Deploy Documentation (push) Successful in 3m30s
Release Docker Image / Build linux-amd64 (release) (push) Successful in 4m42s
Checks / Prek / Clippy and Cargo Tests (push) Failing after 11m37s
Release Docker Image / Build linux-arm64 (release) (push) Successful in 6m6s
Release Docker Image / Create Multi-arch Release Manifest (push) Successful in 13s
Release Docker Image / Build linux-amd64 (max-perf) (push) Successful in 12m48s
Release Docker Image / Build linux-arm64 (max-perf) (push) Successful in 12m53s
**Does not yet work!** Currently, state resolution does not correctly resolve conflicting states. Everything else appears to work as expected, so stateres will be fixed soon, then we should be clear for takeoff. Also: a lot of things currently accept a nullable room ID that really just don't need to. This will need tidying up before merge. Some authentication checks have also been disabled temporarily but nothing important. A lot of things are tagged with `TODO(hydra)`, those need resolving before merge. External contributors should PR to the `hydra/public` branch, *not* ` main`. --- This PR should be squash merged. Reviewed-on: #943 Co-authored-by: nexy7574 <git@nexy7574.co.uk> Co-committed-by: nexy7574 <git@nexy7574.co.uk>
62 lines
1.7 KiB
Rust
62 lines
1.7 KiB
Rust
use axum::extract::State;
|
|
use conduwuit::{Err, Result, matrix::pdu::PduBuilder};
|
|
use ruma::{
|
|
api::federation::membership::prepare_leave_event,
|
|
events::room::member::{MembershipState, RoomMemberEventContent},
|
|
};
|
|
use serde_json::value::to_raw_value;
|
|
|
|
use super::make_join::maybe_strip_event_id;
|
|
use crate::Ruma;
|
|
|
|
/// # `GET /_matrix/federation/v1/make_leave/{roomId}/{eventId}`
|
|
///
|
|
/// Creates a leave template.
|
|
pub(crate) async fn create_leave_event_template_route(
|
|
State(services): State<crate::State>,
|
|
body: Ruma<prepare_leave_event::v1::Request>,
|
|
) -> Result<prepare_leave_event::v1::Response> {
|
|
if !services.rooms.metadata.exists(&body.room_id).await {
|
|
return Err!(Request(NotFound("Room is unknown to this server.")));
|
|
}
|
|
|
|
if body.user_id.server_name() != body.origin() {
|
|
return Err!(Request(Forbidden(
|
|
"Not allowed to leave on behalf of another server/user."
|
|
)));
|
|
}
|
|
|
|
// ACL check origin
|
|
services
|
|
.rooms
|
|
.event_handler
|
|
.acl_check(body.origin(), &body.room_id)
|
|
.await?;
|
|
|
|
let room_version_id = services.rooms.state.get_room_version(&body.room_id).await?;
|
|
let state_lock = services.rooms.state.mutex.lock(&body.room_id).await;
|
|
|
|
let (_pdu, mut pdu_json) = services
|
|
.rooms
|
|
.timeline
|
|
.create_hash_and_sign_event(
|
|
PduBuilder::state(
|
|
body.user_id.to_string(),
|
|
&RoomMemberEventContent::new(MembershipState::Leave),
|
|
),
|
|
&body.user_id,
|
|
Some(&body.room_id),
|
|
&state_lock,
|
|
)
|
|
.await?;
|
|
|
|
drop(state_lock);
|
|
|
|
// room v3 and above removed the "event_id" field from remote PDU format
|
|
maybe_strip_event_id(&mut pdu_json, &room_version_id)?;
|
|
|
|
Ok(prepare_leave_event::v1::Response {
|
|
room_version: Some(room_version_id),
|
|
event: to_raw_value(&pdu_json).expect("CanonicalJson can be serialized to JSON"),
|
|
})
|
|
}
|