mirror of
https://forgejo.ellis.link/continuwuation/continuwuity/
synced 2026-04-25 16:02:08 +00:00
refactor: Add function to state_accessor to get create event
This commit is contained in:
@@ -732,40 +732,33 @@ pub(super) async fn force_demote(&self, user_id: String, room_id: OwnedRoomOrAli
|
||||
|
||||
let state_lock = self.services.rooms.state.mutex.lock(&room_id).await;
|
||||
|
||||
let room_power_levels: Option<RoomPowerLevelsEventContent> = self
|
||||
let mut room_power_levels = self
|
||||
.services
|
||||
.rooms
|
||||
.state_accessor
|
||||
.room_state_get_content(&room_id, &StateEventType::RoomPowerLevels, "")
|
||||
.await
|
||||
.ok();
|
||||
.get_room_power_levels(&room_id)
|
||||
.await;
|
||||
|
||||
let user_can_demote_self = room_power_levels
|
||||
.as_ref()
|
||||
.is_some_and(|power_levels_content| {
|
||||
RoomPowerLevels::from(power_levels_content.clone())
|
||||
.user_can_change_user_power_level(&user_id, &user_id)
|
||||
}) || self
|
||||
.services
|
||||
.rooms
|
||||
.state_accessor
|
||||
.room_state_get(&room_id, &StateEventType::RoomCreate, "")
|
||||
.await
|
||||
.is_ok_and(|event| event.sender() == user_id);
|
||||
let user_can_demote_self =
|
||||
room_power_levels.user_can_change_user_power_level(&user_id, &user_id);
|
||||
|
||||
if !user_can_demote_self {
|
||||
return Err!("User is not allowed to modify their own power levels in the room.",);
|
||||
}
|
||||
|
||||
let mut power_levels_content = room_power_levels.unwrap_or_default();
|
||||
power_levels_content.users.remove(&user_id);
|
||||
room_power_levels.users.remove(&user_id);
|
||||
|
||||
let event_id = self
|
||||
.services
|
||||
.rooms
|
||||
.timeline
|
||||
.build_and_append_pdu(
|
||||
PduBuilder::state(String::new(), &power_levels_content),
|
||||
PduBuilder::state(
|
||||
String::new(),
|
||||
room_power_levels
|
||||
.try_into()
|
||||
.expect("PLs should be valid for room version"),
|
||||
),
|
||||
&user_id,
|
||||
Some(&room_id),
|
||||
&state_lock,
|
||||
|
||||
@@ -147,7 +147,13 @@ pub(crate) async fn set_room_visibility_route(
|
||||
return Err!(Request(Forbidden("Guests cannot publish to room directories")));
|
||||
}
|
||||
|
||||
if !user_can_publish_room(&services, sender_user, &body.room_id).await? {
|
||||
let room_power_levels = services
|
||||
.rooms
|
||||
.state_accessor
|
||||
.get_room_power_levels(&body.room_id)
|
||||
.await;
|
||||
|
||||
if !room_power_levels.user_can_send_state(user_id, StateEventType::RoomHistoryVisibility) {
|
||||
return Err!(Request(Forbidden("User is not allowed to publish this room")));
|
||||
}
|
||||
|
||||
|
||||
@@ -209,11 +209,11 @@ pub async fn handle_incoming_pdu<'a>(
|
||||
}
|
||||
|
||||
// Fetch create event
|
||||
let create_event = &(self
|
||||
let ref create_event = self
|
||||
.services
|
||||
.state_accessor
|
||||
.room_state_get(room_id, &StateEventType::RoomCreate, "")
|
||||
.await?);
|
||||
.get_room_create_event(room_id)
|
||||
.await;
|
||||
|
||||
let (incoming_pdu, val) = self
|
||||
.handle_outlier_pdu(origin, create_event, event_id, room_id, value, false)
|
||||
|
||||
@@ -6,7 +6,7 @@
|
||||
use std::{collections::HashSet, sync::Arc};
|
||||
|
||||
use async_trait::async_trait;
|
||||
use conduwuit::{Event, Result, err};
|
||||
use conduwuit::{Event, Pdu, Result, err};
|
||||
use database::Map;
|
||||
use ruma::{
|
||||
EventEncryptionAlgorithm, JsOption, OwnedRoomAliasId, OwnedUserId, RoomId, UserId,
|
||||
@@ -164,6 +164,13 @@ pub async fn is_encrypted_room(&self, room_id: &RoomId) -> bool {
|
||||
.is_ok()
|
||||
}
|
||||
|
||||
/// Get a room's create event.
|
||||
pub async fn get_room_create_event(&self, room_id: &RoomId) -> Pdu {
|
||||
self.room_state_get(room_id, &StateEventType::RoomCreate, "")
|
||||
.await
|
||||
.expect("room should have a create event")
|
||||
}
|
||||
|
||||
/// Get a set of the room's creators. This will always contain a single user
|
||||
/// for room versions 11 and earlier.
|
||||
pub async fn get_room_creators(&self, room_id: &RoomId) -> HashSet<OwnedUserId> {
|
||||
@@ -176,10 +183,8 @@ pub async fn get_room_creators(&self, room_id: &RoomId) -> HashSet<OwnedUserId>
|
||||
.rules()
|
||||
.expect("room version should be known");
|
||||
|
||||
let create_event = self
|
||||
.room_state_get(room_id, &StateEventType::RoomCreate, "")
|
||||
.await
|
||||
.expect("room should have a create event");
|
||||
let create_event = self.get_room_create_event(room_id).await;
|
||||
|
||||
let create_content: RoomCreateEventContent = create_event
|
||||
.get_content()
|
||||
.expect("create event content should be valid");
|
||||
|
||||
@@ -44,31 +44,6 @@ pub async fn user_can_redact(
|
||||
)));
|
||||
}
|
||||
|
||||
let create_event = self
|
||||
.room_state_get(room_id, &StateEventType::RoomCreate, "")
|
||||
.await?;
|
||||
let create_event_content: RoomCreateEventContent = create_event.get_content().unwrap();
|
||||
let room_version_rules = create_event_content
|
||||
.room_version
|
||||
.rules()
|
||||
.expect("room version should have defined rules");
|
||||
if room_version_rules
|
||||
.authorization
|
||||
.explicitly_privilege_room_creators
|
||||
{
|
||||
let sender_owned = sender.to_owned();
|
||||
// NOTE: we don't check the pre-v11 `creator` field because no room version has
|
||||
// `explicitly_privilege_room_creators` and `use_room_create_sender` set at the
|
||||
// same time
|
||||
if sender == create_event.sender()
|
||||
|| create_event_content
|
||||
.additional_creators
|
||||
.contains(&sender_owned)
|
||||
{
|
||||
return Ok(true);
|
||||
}
|
||||
}
|
||||
|
||||
let power_levels = self.get_room_power_levels(room_id).await;
|
||||
|
||||
if power_levels.user_can_redact_event_of_other(sender) {
|
||||
|
||||
Reference in New Issue
Block a user