events / state-res: Use RawJsonValue over JsonValue for event content

This commit is contained in:
Jonas Platte 2021-09-15 19:46:27 +02:00
parent 1df1256a86
commit a9985d7763
No known key found for this signature in database
GPG Key ID: CC154DE0E30B7C67
11 changed files with 313 additions and 206 deletions

View File

@ -4,6 +4,7 @@ Breaking changes:
* Remove `RedactedStrippedStateEvent` * Remove `RedactedStrippedStateEvent`
* It was not used anywhere since stripped state events are never actually redacted. * It was not used anywhere since stripped state events are never actually redacted.
* Use `Box<RawJsonValue>` instead of `JsonValue` for PDU `content` field
# 0.24.5 # 0.24.5

View File

@ -10,13 +10,16 @@ use std::collections::BTreeMap;
use js_int::UInt; use js_int::UInt;
use ruma_common::MilliSecondsSinceUnixEpoch; use ruma_common::MilliSecondsSinceUnixEpoch;
use ruma_identifiers::{EventId, RoomId, ServerNameBox, ServerSigningKeyId, UserId}; use ruma_identifiers::{EventId, RoomId, ServerNameBox, ServerSigningKeyId, UserId};
use serde::{Deserialize, Serialize}; use serde::{
use serde_json::Value as JsonValue; de::{Error as _, IgnoredAny},
Deserialize, Deserializer, Serialize,
};
use serde_json::{from_str as from_json_str, value::RawValue as RawJsonValue};
use crate::EventType; use crate::EventType;
/// Enum for PDU schemas /// Enum for PDU schemas
#[derive(Clone, Debug, Deserialize, Serialize)] #[derive(Clone, Debug, Serialize)]
#[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)] #[cfg_attr(not(feature = "unstable-exhaustive-types"), non_exhaustive)]
#[serde(untagged)] #[serde(untagged)]
pub enum Pdu { pub enum Pdu {
@ -55,7 +58,7 @@ pub struct RoomV1Pdu {
pub kind: EventType, pub kind: EventType,
/// The event's content. /// The event's content.
pub content: JsonValue, pub content: Box<RawJsonValue>,
/// A key that determines which piece of room state the event represents. /// A key that determines which piece of room state the event represents.
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
@ -81,7 +84,7 @@ pub struct RoomV1Pdu {
/// Additional data added by the origin server but not covered by the /// Additional data added by the origin server but not covered by the
/// signatures. /// signatures.
#[serde(default, skip_serializing_if = "BTreeMap::is_empty")] #[serde(default, skip_serializing_if = "BTreeMap::is_empty")]
pub unsigned: BTreeMap<String, JsonValue>, pub unsigned: BTreeMap<String, Box<RawJsonValue>>,
/// Content hashes of the PDU. /// Content hashes of the PDU.
pub hashes: EventHash, pub hashes: EventHash,
@ -115,7 +118,7 @@ pub struct RoomV3Pdu {
pub kind: EventType, pub kind: EventType,
/// The event's content. /// The event's content.
pub content: JsonValue, pub content: Box<RawJsonValue>,
/// A key that determines which piece of room state the event represents. /// A key that determines which piece of room state the event represents.
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
@ -139,7 +142,7 @@ pub struct RoomV3Pdu {
/// Additional data added by the origin server but not covered by the /// Additional data added by the origin server but not covered by the
/// signatures. /// signatures.
#[serde(default, skip_serializing_if = "BTreeMap::is_empty")] #[serde(default, skip_serializing_if = "BTreeMap::is_empty")]
pub unsigned: BTreeMap<String, JsonValue>, pub unsigned: BTreeMap<String, Box<RawJsonValue>>,
/// Content hashes of the PDU. /// Content hashes of the PDU.
pub hashes: EventHash, pub hashes: EventHash,
@ -162,3 +165,22 @@ impl EventHash {
Self { sha256 } Self { sha256 }
} }
} }
impl<'de> Deserialize<'de> for Pdu {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: Deserializer<'de>,
{
#[derive(Deserialize)]
struct GetEventId {
event_id: Option<IgnoredAny>,
}
let json = Box::<RawJsonValue>::deserialize(deserializer)?;
if from_json_str::<GetEventId>(json.get()).map_err(D::Error::custom)?.event_id.is_some() {
from_json_str(json.get()).map(Self::RoomV1Pdu).map_err(D::Error::custom)
} else {
from_json_str(json.get()).map(Self::RoomV3Pdu).map_err(D::Error::custom)
}
}
}

View File

@ -8,7 +8,10 @@ use ruma_events::{
EventType, EventType,
}; };
use ruma_identifiers::{event_id, room_id, server_name, server_signing_key_id, user_id}; use ruma_identifiers::{event_id, room_id, server_name, server_signing_key_id, user_id};
use serde_json::{from_value as from_json_value, json, to_value as to_json_value}; use serde_json::{
from_value as from_json_value, json, to_value as to_json_value,
value::to_raw_value as to_raw_json_value,
};
#[test] #[test]
fn serialize_pdu_as_v1() { fn serialize_pdu_as_v1() {
@ -21,7 +24,7 @@ fn serialize_pdu_as_v1() {
signatures.insert(server_name!("example.com"), inner_signature); signatures.insert(server_name!("example.com"), inner_signature);
let mut unsigned = BTreeMap::new(); let mut unsigned = BTreeMap::new();
unsigned.insert("somekey".into(), json!({"a": 456})); unsigned.insert("somekey".into(), to_raw_json_value(&json!({ "a": 456 })).unwrap());
let v1_pdu = RoomV1Pdu { let v1_pdu = RoomV1Pdu {
room_id: room_id!("!n8f893n9:example.com"), room_id: room_id!("!n8f893n9:example.com"),
@ -30,7 +33,7 @@ fn serialize_pdu_as_v1() {
origin: "matrix.org".into(), origin: "matrix.org".into(),
origin_server_ts: MilliSecondsSinceUnixEpoch(1_592_050_773_658_u64.try_into().unwrap()), origin_server_ts: MilliSecondsSinceUnixEpoch(1_592_050_773_658_u64.try_into().unwrap()),
kind: EventType::RoomPowerLevels, kind: EventType::RoomPowerLevels,
content: json!({"testing": 123}), content: to_raw_json_value(&json!({ "testing": 123 })).unwrap(),
state_key: Some("state".into()), state_key: Some("state".into()),
prev_events: vec![( prev_events: vec![(
event_id!("$previousevent:matrix.org"), event_id!("$previousevent:matrix.org"),
@ -88,7 +91,7 @@ fn serialize_pdu_as_v3() {
signatures.insert(server_name!("example.com"), inner_signature); signatures.insert(server_name!("example.com"), inner_signature);
let mut unsigned = BTreeMap::new(); let mut unsigned = BTreeMap::new();
unsigned.insert("somekey".into(), json!({ "a": 456 })); unsigned.insert("somekey".into(), to_raw_json_value(&json!({ "a": 456 })).unwrap());
let v3_pdu = RoomV3Pdu { let v3_pdu = RoomV3Pdu {
room_id: room_id!("!n8f893n9:example.com"), room_id: room_id!("!n8f893n9:example.com"),
@ -96,7 +99,7 @@ fn serialize_pdu_as_v3() {
origin: "matrix.org".into(), origin: "matrix.org".into(),
origin_server_ts: MilliSecondsSinceUnixEpoch(1_592_050_773_658_u64.try_into().unwrap()), origin_server_ts: MilliSecondsSinceUnixEpoch(1_592_050_773_658_u64.try_into().unwrap()),
kind: EventType::RoomPowerLevels, kind: EventType::RoomPowerLevels,
content: json!({"testing": 123}), content: to_raw_json_value(&json!({ "testing": 123 })).unwrap(),
state_key: Some("state".into()), state_key: Some("state".into()),
prev_events: vec![event_id!("$previousevent:matrix.org")], prev_events: vec![event_id!("$previousevent:matrix.org")],
depth: 2_u32.into(), depth: 2_u32.into(),
@ -205,7 +208,6 @@ fn deserialize_pdu_as_v3() {
"key": "value" "key": "value"
}, },
"depth": 12, "depth": 12,
"event_id": "$a4ecee13e2accdadf56c1025:example.com",
"hashes": { "hashes": {
"sha256": "ThisHashCoversAllFieldsInCaseThisIsRedacted" "sha256": "ThisHashCoversAllFieldsInCaseThisIsRedacted"
}, },

View File

@ -1,5 +1,10 @@
# [unreleased] # [unreleased]
Breaking changes:
* Remove some trait methods from `Event`
* Update `Event::content` signature to return `&RawJsonValue` instead of `&JsonValue`
# 0.4.1 # 0.4.1
Improvements: Improvements:

View File

@ -15,6 +15,7 @@ edition = "2018"
all-features = true all-features = true
[features] [features]
compat = []
unstable-pre-spec = ["ruma-events/unstable-pre-spec"] unstable-pre-spec = ["ruma-events/unstable-pre-spec"]
unstable-exhaustive-types = [] unstable-exhaustive-types = []

View File

@ -18,7 +18,7 @@ use std::{
use criterion::{criterion_group, criterion_main, Criterion}; use criterion::{criterion_group, criterion_main, Criterion};
use event::StateEvent; use event::StateEvent;
use js_int::uint; use js_int::{int, uint};
use maplit::{btreemap, hashmap, hashset}; use maplit::{btreemap, hashmap, hashset};
use ruma_common::MilliSecondsSinceUnixEpoch; use ruma_common::MilliSecondsSinceUnixEpoch;
use ruma_events::{ use ruma_events::{
@ -31,7 +31,10 @@ use ruma_events::{
}; };
use ruma_identifiers::{EventId, RoomId, RoomVersionId, UserId}; use ruma_identifiers::{EventId, RoomId, RoomVersionId, UserId};
use ruma_state_res::{self as state_res, Error, Event, Result, StateMap}; use ruma_state_res::{self as state_res, Error, Event, Result, StateMap};
use serde_json::{json, Value as JsonValue}; use serde_json::{
json,
value::{to_raw_value as to_raw_json_value, RawValue as RawJsonValue},
};
static SERVER_TIMESTAMP: AtomicU64 = AtomicU64::new(0); static SERVER_TIMESTAMP: AtomicU64 = AtomicU64::new(0);
@ -46,7 +49,7 @@ fn lexico_topo_sort(c: &mut Criterion) {
}; };
b.iter(|| { b.iter(|| {
let _ = state_res::lexicographical_topological_sort(&graph, |id| { let _ = state_res::lexicographical_topological_sort(&graph, |id| {
Ok((0, MilliSecondsSinceUnixEpoch(uint!(0)), id.clone())) Ok((int!(0), MilliSecondsSinceUnixEpoch(uint!(0)), id.clone()))
}); });
}) })
}); });
@ -238,7 +241,7 @@ impl TestStore<StateEvent> {
alice(), alice(),
EventType::RoomCreate, EventType::RoomCreate,
Some(""), Some(""),
json!({ "creator": alice() }), to_raw_json_value(&json!({ "creator": alice() })).unwrap(),
&[], &[],
&[], &[],
); );
@ -261,7 +264,7 @@ impl TestStore<StateEvent> {
alice(), alice(),
EventType::RoomJoinRules, EventType::RoomJoinRules,
Some(""), Some(""),
json!({ "join_rule": JoinRule::Public }), to_raw_json_value(&json!({ "join_rule": JoinRule::Public })).unwrap(),
&[cre.clone(), alice_mem.event_id().clone()], &[cre.clone(), alice_mem.event_id().clone()],
&[alice_mem.event_id().clone()], &[alice_mem.event_id().clone()],
); );
@ -335,12 +338,15 @@ fn event_id(id: &str) -> EventId {
fn alice() -> UserId { fn alice() -> UserId {
UserId::try_from("@alice:foo").unwrap() UserId::try_from("@alice:foo").unwrap()
} }
fn bob() -> UserId { fn bob() -> UserId {
UserId::try_from("@bob:foo").unwrap() UserId::try_from("@bob:foo").unwrap()
} }
fn charlie() -> UserId { fn charlie() -> UserId {
UserId::try_from("@charlie:foo").unwrap() UserId::try_from("@charlie:foo").unwrap()
} }
fn ella() -> UserId { fn ella() -> UserId {
UserId::try_from("@ella:foo").unwrap() UserId::try_from("@ella:foo").unwrap()
} }
@ -349,12 +355,12 @@ fn room_id() -> RoomId {
RoomId::try_from("!test:foo").unwrap() RoomId::try_from("!test:foo").unwrap()
} }
fn member_content_ban() -> JsonValue { fn member_content_ban() -> Box<RawJsonValue> {
serde_json::to_value(MemberEventContent::new(MembershipState::Ban)).unwrap() to_raw_json_value(&MemberEventContent::new(MembershipState::Ban)).unwrap()
} }
fn member_content_join() -> JsonValue { fn member_content_join() -> Box<RawJsonValue> {
serde_json::to_value(MemberEventContent::new(MembershipState::Join)).unwrap() to_raw_json_value(&MemberEventContent::new(MembershipState::Join)).unwrap()
} }
fn to_pdu_event<S>( fn to_pdu_event<S>(
@ -362,7 +368,7 @@ fn to_pdu_event<S>(
sender: UserId, sender: UserId,
ev_type: EventType, ev_type: EventType,
state_key: Option<&str>, state_key: Option<&str>,
content: JsonValue, content: Box<RawJsonValue>,
auth_events: &[S], auth_events: &[S],
prev_events: &[S], prev_events: &[S],
) -> Arc<StateEvent> ) -> Arc<StateEvent>
@ -408,7 +414,7 @@ fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomCreate, EventType::RoomCreate,
Some(""), Some(""),
json!({ "creator": alice() }), to_raw_json_value(&json!({ "creator": alice() })).unwrap(),
&[], &[],
&[], &[],
), ),
@ -426,7 +432,7 @@ fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice().to_string(): 100 } }), to_raw_json_value(&json!({ "users": { alice().to_string(): 100 } })).unwrap(),
&["CREATE", "IMA"], &["CREATE", "IMA"],
&["IMA"], &["IMA"],
), ),
@ -435,7 +441,7 @@ fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomJoinRules, EventType::RoomJoinRules,
Some(""), Some(""),
json!({ "join_rule": JoinRule::Public }), to_raw_json_value(&json!({ "join_rule": JoinRule::Public })).unwrap(),
&["CREATE", "IMA", "IPOWER"], &["CREATE", "IMA", "IPOWER"],
&["IPOWER"], &["IPOWER"],
), ),
@ -462,7 +468,7 @@ fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
charlie(), charlie(),
EventType::RoomTopic, EventType::RoomTopic,
Some(""), Some(""),
json!({}), to_raw_json_value(&json!({})).unwrap(),
&[], &[],
&[], &[],
), ),
@ -471,7 +477,7 @@ fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
charlie(), charlie(),
EventType::RoomTopic, EventType::RoomTopic,
Some(""), Some(""),
json!({}), to_raw_json_value(&json!({})).unwrap(),
&[], &[],
&[], &[],
), ),
@ -490,7 +496,7 @@ fn BAN_STATE_SET() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
&["CREATE", "IMA", "IPOWER"], // auth_events &["CREATE", "IMA", "IPOWER"], // auth_events
&["START"], // prev_events &["START"], // prev_events
), ),
@ -499,7 +505,7 @@ fn BAN_STATE_SET() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
&["CREATE", "IMA", "IPOWER"], &["CREATE", "IMA", "IPOWER"],
&["END"], &["END"],
), ),
@ -533,6 +539,7 @@ mod event {
use ruma_identifiers::{EventId, RoomId, UserId}; use ruma_identifiers::{EventId, RoomId, UserId};
use ruma_state_res::Event; use ruma_state_res::Event;
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use serde_json::value::RawValue as RawJsonValue;
impl Event for StateEvent { impl Event for StateEvent {
fn event_id(&self) -> &EventId { fn event_id(&self) -> &EventId {
@ -566,7 +573,7 @@ mod event {
} }
} }
fn content(&self) -> &serde_json::Value { fn content(&self) -> &RawJsonValue {
match &self.rest { match &self.rest {
Pdu::RoomV1Pdu(ev) => &ev.content, Pdu::RoomV1Pdu(ev) => &ev.content,
Pdu::RoomV3Pdu(ev) => &ev.content, Pdu::RoomV3Pdu(ev) => &ev.content,

View File

@ -12,20 +12,27 @@ use ruma_events::{
EventType, EventType,
}; };
use ruma_identifiers::{RoomVersionId, UserId}; use ruma_identifiers::{RoomVersionId, UserId};
use ruma_serde::Raw;
use serde::{de::IgnoredAny, Deserialize};
use serde_json::{from_str as from_json_str, value::RawValue as RawJsonValue};
use tracing::{debug, error, info, warn}; use tracing::{debug, error, info, warn};
use crate::{room_version::RoomVersion, Error, Event, Result}; use crate::{room_version::RoomVersion, Error, Event, PowerLevelsContentFields, Result};
/// For the given event `kind` what are the relevant auth events that are needed to authenticate /// For the given event `kind` what are the relevant auth events that are needed to authenticate
/// this `content`. /// this `content`.
///
/// # Errors
///
/// This function will return an error if the supplied `content` is not a JSON object.
pub fn auth_types_for_event( pub fn auth_types_for_event(
kind: &EventType, kind: &EventType,
sender: &UserId, sender: &UserId,
state_key: Option<&str>, state_key: Option<&str>,
content: &serde_json::Value, content: &RawJsonValue,
) -> Vec<(EventType, String)> { ) -> serde_json::Result<Vec<(EventType, String)>> {
if kind == &EventType::RoomCreate { if kind == &EventType::RoomCreate {
return vec![]; return Ok(vec![]);
} }
let mut auth_types = vec![ let mut auth_types = vec![
@ -35,11 +42,16 @@ pub fn auth_types_for_event(
]; ];
if kind == &EventType::RoomMember { if kind == &EventType::RoomMember {
#[derive(Deserialize)]
struct RoomMemberContentFields {
membership: Option<Raw<MembershipState>>,
third_party_invite: Option<Raw<ThirdPartyInvite>>,
}
if let Some(state_key) = state_key { if let Some(state_key) = state_key {
if let Some(Ok(membership)) = content let content: RoomMemberContentFields = from_json_str(content.get())?;
.get("membership")
.map(|m| serde_json::from_value::<MembershipState>(m.clone())) if let Some(Ok(membership)) = content.membership.map(|m| m.deserialize()) {
{
if [MembershipState::Join, MembershipState::Invite].contains(&membership) { if [MembershipState::Join, MembershipState::Invite].contains(&membership) {
let key = (EventType::RoomJoinRules, "".to_owned()); let key = (EventType::RoomJoinRules, "".to_owned());
if !auth_types.contains(&key) { if !auth_types.contains(&key) {
@ -53,10 +65,7 @@ pub fn auth_types_for_event(
} }
if membership == MembershipState::Invite { if membership == MembershipState::Invite {
if let Some(Ok(t_id)) = content if let Some(Ok(t_id)) = content.third_party_invite.map(|t| t.deserialize()) {
.get("third_party_invite")
.map(|t| serde_json::from_value::<ThirdPartyInvite>(t.clone()))
{
let key = (EventType::RoomThirdPartyInvite, t_id.signed.token); let key = (EventType::RoomThirdPartyInvite, t_id.signed.token);
if !auth_types.contains(&key) { if !auth_types.contains(&key) {
auth_types.push(key); auth_types.push(key);
@ -67,7 +76,7 @@ pub fn auth_types_for_event(
} }
} }
auth_types Ok(auth_types)
} }
/// Authenticate the incoming `event`. /// Authenticate the incoming `event`.
@ -75,15 +84,10 @@ pub fn auth_types_for_event(
/// The steps of authentication are: /// The steps of authentication are:
/// ///
/// * check that the event is being authenticated for the correct room /// * check that the event is being authenticated for the correct room
/// * check that the events signatures are valid
/// * then there are checks for specific event types /// * then there are checks for specific event types
/// ///
/// The `fetch_state` closure should gather state from a state snapshot. We need to know if the /// The `fetch_state` closure should gather state from a state snapshot. We need to know if the
/// event passes auth against some state not a recursive collection of auth_events fields. /// event passes auth against some state not a recursive collection of auth_events fields.
///
/// ## Returns
///
/// This returns an `Error` only when serialization fails or some other fatal outcome.
pub fn auth_check<E: Event>( pub fn auth_check<E: Event>(
room_version: &RoomVersion, room_version: &RoomVersion,
incoming_event: impl Event, incoming_event: impl Event,
@ -91,6 +95,11 @@ pub fn auth_check<E: Event>(
current_third_party_invite: Option<impl Event>, current_third_party_invite: Option<impl Event>,
fetch_state: impl Fn(&EventType, &str) -> Option<E>, fetch_state: impl Fn(&EventType, &str) -> Option<E>,
) -> Result<bool> { ) -> Result<bool> {
#[derive(Deserialize)]
struct RoomMemberContentFields {
membership: Option<Raw<MembershipState>>,
}
info!( info!(
"auth_check beginning for {} ({})", "auth_check beginning for {} ({})",
incoming_event.event_id(), incoming_event.event_id(),
@ -111,6 +120,12 @@ pub fn auth_check<E: Event>(
// //
// 1. If type is m.room.create: // 1. If type is m.room.create:
if *incoming_event.event_type() == EventType::RoomCreate { if *incoming_event.event_type() == EventType::RoomCreate {
#[derive(Deserialize)]
struct RoomCreateContentFields {
room_version: Option<Raw<RoomVersionId>>,
creator: Option<Raw<IgnoredAny>>,
}
info!("start m.room.create check"); info!("start m.room.create check");
// If it has any previous events, reject // If it has any previous events, reject
@ -125,24 +140,17 @@ pub fn auth_check<E: Event>(
return Ok(false); // creation events room id does not match senders return Ok(false); // creation events room id does not match senders
} }
let content: RoomCreateContentFields = from_json_str(incoming_event.content().get())?;
// If content.room_version is present and is not a recognized version, reject // If content.room_version is present and is not a recognized version, reject
if serde_json::from_value::<RoomVersionId>( if content.room_version.map(|v| v.deserialize().is_err()).unwrap_or(false) {
incoming_event
.content()
.get("room_version")
.cloned()
// TODO synapse defaults to version 1
.unwrap_or_else(|| serde_json::json!("1")),
)
.is_err()
{
warn!("invalid room version found in m.room.create event"); warn!("invalid room version found in m.room.create event");
return Ok(false); return Ok(false);
} }
// If content has no creator field, reject // If content has no creator field, reject
if incoming_event.content().get("creator").is_none() { if content.creator.is_none() {
warn!("no creator field found in room create content"); warn!("no creator field found in m.room.create content");
return Ok(false); return Ok(false);
} }
@ -212,12 +220,8 @@ pub fn auth_check<E: Event>(
Some(s) => s, Some(s) => s,
}; };
let membership = incoming_event let content: RoomMemberContentFields = from_json_str(incoming_event.content().get())?;
.content() if content.membership.and_then(|m| m.deserialize().ok()).is_none() {
.get("membership")
.map(|m| serde_json::from_value::<MembershipState>(m.clone()));
if !matches!(membership, Some(Ok(_))) {
warn!("no valid membership field found for m.room.member event content"); warn!("no valid membership field found for m.room.member event content");
return Ok(false); return Ok(false);
} }
@ -244,7 +248,7 @@ pub fn auth_check<E: Event>(
} }
// If the sender's current membership state is not join, reject // If the sender's current membership state is not join, reject
let mem = match sender_member_event { let sender_member_event = match sender_member_event {
Some(mem) => mem, Some(mem) => mem,
None => { None => {
warn!("sender not found in room"); warn!("sender not found in room");
@ -252,12 +256,12 @@ pub fn auth_check<E: Event>(
} }
}; };
let membership_state = serde_json::from_value::<MembershipState>( let sender_membership_event_content: RoomMemberContentFields =
mem.content() from_json_str(sender_member_event.content().get())?;
.get("membership") let membership_state = sender_membership_event_content
.expect("we should test before that this field exists") .membership
.clone(), .expect("we should test before that this field exists")
)?; .deserialize()?;
if !matches!(membership_state, MembershipState::Join) { if !matches!(membership_state, MembershipState::Join) {
warn!("sender's membership is not join"); warn!("sender's membership is not join");
@ -265,9 +269,7 @@ pub fn auth_check<E: Event>(
} }
let sender_power_level = if let Some(pl) = &power_levels_event { let sender_power_level = if let Some(pl) = &power_levels_event {
if let Ok(content) = if let Ok(content) = from_json_str::<PowerLevelsContentFields>(pl.content().get()) {
serde_json::from_value::<PowerLevelsEventContent>(pl.content().to_owned())
{
if let Some(level) = content.users.get(sender) { if let Some(level) = content.users.get(sender) {
*level *level
} else { } else {
@ -279,9 +281,7 @@ pub fn auth_check<E: Event>(
} else { } else {
// If no power level event found the creator gets 100 everyone else gets 0 // If no power level event found the creator gets 100 everyone else gets 0
room_create_event room_create_event
.and_then(|create| { .and_then(|create| from_json_str::<CreateEventContent>(create.content().get()).ok())
serde_json::from_value::<CreateEventContent>(create.content().to_owned()).ok()
})
.and_then(|create| (create.creator == *sender).then(|| int!(100))) .and_then(|create| (create.creator == *sender).then(|| int!(100)))
.unwrap_or_default() .unwrap_or_default()
}; };
@ -289,12 +289,14 @@ pub fn auth_check<E: Event>(
// Allow if and only if sender's current power level is greater than // Allow if and only if sender's current power level is greater than
// or equal to the invite level // or equal to the invite level
if *incoming_event.event_type() == EventType::RoomThirdPartyInvite { if *incoming_event.event_type() == EventType::RoomThirdPartyInvite {
#[derive(Deserialize)]
struct PowerLevelsContentInvite {
invite: Int,
}
let invite_level = match &power_levels_event { let invite_level = match &power_levels_event {
Some(power_levels) => { Some(power_levels) => {
serde_json::from_value::<PowerLevelsEventContent>( from_json_str::<PowerLevelsContentInvite>(power_levels.content().get())?.invite
power_levels.content().to_owned(),
)?
.invite
} }
None => int!(50), None => int!(50),
}; };
@ -342,17 +344,15 @@ pub fn auth_check<E: Event>(
if room_version.extra_redaction_checks if room_version.extra_redaction_checks
&& *incoming_event.event_type() == EventType::RoomRedaction && *incoming_event.event_type() == EventType::RoomRedaction
{ {
let default = int!(50); #[derive(Deserialize)]
let redact_level = if let Some(pl) = power_levels_event { struct PowerLevelsContentRedact {
// TODO do this the right way and deserialize redact: Int,
if let Some(level) = pl.content().get("redact") { }
level.to_string().parse().unwrap_or(default)
} else { let redact_level = power_levels_event
int!(0) .and_then(|pl| from_json_str::<PowerLevelsContentRedact>(pl.content().get()).ok())
} .map(|c| c.redact)
} else { .unwrap_or_else(|| int!(50));
default
};
if !check_redaction(room_version, incoming_event, sender_power_level, redact_level)? { if !check_redaction(room_version, incoming_event, sender_power_level, redact_level)? {
return Ok(false); return Ok(false);
@ -379,28 +379,30 @@ fn valid_membership_change(
target_user_membership_event: Option<impl Event>, target_user_membership_event: Option<impl Event>,
sender: &UserId, sender: &UserId,
sender_membership_event: Option<impl Event>, sender_membership_event: Option<impl Event>,
content: &serde_json::Value, content: &RawJsonValue,
prev_event: Option<impl Event>, prev_event: Option<impl Event>,
current_third_party_invite: Option<impl Event>, current_third_party_invite: Option<impl Event>,
power_levels_event: Option<impl Event>, power_levels_event: Option<impl Event>,
join_rules_event: Option<impl Event>, join_rules_event: Option<impl Event>,
) -> Result<bool> { ) -> Result<bool> {
let target_membership = serde_json::from_value::<MembershipState>( // FIXME: field extracting could be bundled for `content`
content.get("membership").expect("we test before that this field exists").clone(), #[derive(Deserialize)]
)?; struct GetMembership {
membership: MembershipState,
}
let third_party_invite = content #[derive(Deserialize)]
.get("third_party_invite") struct GetThirdPartyInvite {
.map(|t| serde_json::from_value::<ThirdPartyInvite>(t.clone())); third_party_invite: Option<Raw<ThirdPartyInvite>>,
}
let target_membership = from_json_str::<GetMembership>(content.get())?.membership;
let third_party_invite =
from_json_str::<GetThirdPartyInvite>(content.get())?.third_party_invite;
let sender_is_joined = { let sender_is_joined = {
let sender_membership = match &sender_membership_event { let sender_membership = match &sender_membership_event {
Some(pdu) => serde_json::from_value( Some(pdu) => from_json_str::<GetMembership>(pdu.content().get())?.membership,
pdu.content()
.get("membership")
.expect("we assume existing events are valid")
.clone(),
)?,
None => MembershipState::Leave, None => MembershipState::Leave,
}; };
@ -408,14 +410,12 @@ fn valid_membership_change(
}; };
let target_user_current_membership = match &target_user_membership_event { let target_user_current_membership = match &target_user_membership_event {
Some(pdu) => serde_json::from_value( Some(pdu) => from_json_str::<GetMembership>(pdu.content().get())?.membership,
pdu.content().get("membership").expect("we assume existing events are valid").clone(),
)?,
None => MembershipState::Leave, None => MembershipState::Leave,
}; };
let power_levels: PowerLevelsEventContent = match &power_levels_event { let power_levels: PowerLevelsEventContent = match &power_levels_event {
Some(ev) => serde_json::from_value(ev.content().to_owned())?, Some(ev) => from_json_str(ev.content().get())?,
None => PowerLevelsEventContent::default(), None => PowerLevelsEventContent::default(),
}; };
@ -430,8 +430,7 @@ fn valid_membership_change(
let mut join_rules = JoinRule::Invite; let mut join_rules = JoinRule::Invite;
if let Some(jr) = &join_rules_event { if let Some(jr) = &join_rules_event {
join_rules = join_rules = from_json_str::<JoinRulesEventContent>(jr.content().get())?.join_rule;
serde_json::from_value::<JoinRulesEventContent>(jr.content().to_owned())?.join_rule;
} }
if let Some(prev) = prev_event { if let Some(prev) = prev_event {
@ -471,7 +470,7 @@ fn valid_membership_change(
} }
MembershipState::Invite => { MembershipState::Invite => {
// If content has third_party_invite key // If content has third_party_invite key
if let Some(Ok(tp_id)) = third_party_invite { if let Some(tp_id) = third_party_invite.and_then(|i| i.deserialize().ok()) {
if target_user_current_membership == MembershipState::Ban { if target_user_current_membership == MembershipState::Ban {
warn!(?target_user_membership_event_id, "Can't invite banned user"); warn!(?target_user_membership_event_id, "Can't invite banned user");
false false
@ -614,12 +613,10 @@ fn check_power_levels(
// If users key in content is not a dictionary with keys that are valid user IDs // If users key in content is not a dictionary with keys that are valid user IDs
// with values that are integers (or a string that is an integer), reject. // with values that are integers (or a string that is an integer), reject.
let user_content = let user_content =
serde_json::from_value::<PowerLevelsEventContent>(power_event.content().to_owned()) from_json_str::<PowerLevelsEventContent>(power_event.content().get()).unwrap();
.unwrap();
let current_content = let current_content =
serde_json::from_value::<PowerLevelsEventContent>(current_state.content().to_owned()) from_json_str::<PowerLevelsEventContent>(current_state.content().get()).unwrap();
.unwrap();
// Validation of users is done in Ruma, synapse for loops validating user_ids and integers here // Validation of users is done in Ruma, synapse for loops validating user_ids and integers here
info!("validation of power event finished"); info!("validation of power event finished");
@ -771,7 +768,7 @@ fn get_send_level(
) -> Int { ) -> Int {
power_lvl power_lvl
.and_then(|ple| { .and_then(|ple| {
serde_json::from_value::<PowerLevelsEventContent>(ple.content().to_owned()) from_json_str::<PowerLevelsEventContent>(ple.content().get())
.map(|content| { .map(|content| {
content.events.get(e_type).copied().unwrap_or_else(|| { content.events.get(e_type).copied().unwrap_or_else(|| {
if state_key.is_some() { if state_key.is_some() {
@ -813,9 +810,9 @@ fn verify_third_party_invite(
// If any signature in signed matches any public key in the m.room.third_party_invite event, // If any signature in signed matches any public key in the m.room.third_party_invite event,
// allow // allow
if let Ok(tpid_ev) = serde_json::from_value::<ThirdPartyInviteEventContent>( if let Ok(tpid_ev) =
current_tpid.content().to_owned(), from_json_str::<ThirdPartyInviteEventContent>(current_tpid.content().get())
) { {
// A list of public keys in the public_keys field // A list of public keys in the public_keys field
for key in tpid_ev.public_keys.unwrap_or_default() { for key in tpid_ev.public_keys.unwrap_or_default() {
if key.public_key == tp_id.signed.token { if key.public_key == tp_id.signed.token {

View File

@ -1,18 +1,18 @@
use std::{ use std::{
cmp::Reverse, cmp::Reverse,
collections::{BinaryHeap, HashMap, HashSet}, collections::{BTreeMap, BinaryHeap, HashMap, HashSet},
}; };
use itertools::Itertools; use itertools::Itertools;
use js_int::{int, Int};
use ruma_common::MilliSecondsSinceUnixEpoch; use ruma_common::MilliSecondsSinceUnixEpoch;
use ruma_events::{ use ruma_events::{
room::{ room::member::{MemberEventContent, MembershipState},
member::{MemberEventContent, MembershipState},
power_levels::PowerLevelsEventContent,
},
EventType, EventType,
}; };
use ruma_identifiers::{EventId, RoomVersionId}; use ruma_identifiers::{EventId, RoomVersionId, UserId};
use serde::Deserialize;
use serde_json::from_str as from_json_str;
use tracing::{debug, info, trace, warn}; use tracing::{debug, info, trace, warn};
mod error; mod error;
@ -221,7 +221,7 @@ fn reverse_topological_power_sort<E: Event>(
// This is used in the `key_fn` passed to the lexico_topo_sort fn // This is used in the `key_fn` passed to the lexico_topo_sort fn
let mut event_to_pl = HashMap::new(); let mut event_to_pl = HashMap::new();
for event_id in graph.keys() { for event_id in graph.keys() {
let pl = get_power_level_for_sender(event_id, &fetch_event); let pl = get_power_level_for_sender(event_id, &fetch_event)?;
info!("{} power level {}", event_id, pl); info!("{} power level {}", event_id, pl);
event_to_pl.insert(event_id.clone(), pl); event_to_pl.insert(event_id.clone(), pl);
@ -253,7 +253,7 @@ pub fn lexicographical_topological_sort<F>(
key_fn: F, key_fn: F,
) -> Result<Vec<EventId>> ) -> Result<Vec<EventId>>
where where
F: Fn(&EventId) -> Result<(i64, MilliSecondsSinceUnixEpoch, EventId)>, F: Fn(&EventId) -> Result<(Int, MilliSecondsSinceUnixEpoch, EventId)>,
{ {
info!("starting lexicographical topological sort"); info!("starting lexicographical topological sort");
// NOTE: an event that has no incoming edges happened most recently, // NOTE: an event that has no incoming edges happened most recently,
@ -314,11 +314,25 @@ where
Ok(sorted) Ok(sorted)
} }
#[derive(Deserialize)]
struct PowerLevelsContentFields {
#[cfg_attr(
feature = "compat",
serde(deserialize_with = "ruma_serde::btreemap_int_or_string_to_int_values")
)]
#[serde(default, skip_serializing_if = "BTreeMap::is_empty")]
users: BTreeMap<UserId, Int>,
#[cfg_attr(feature = "compat", serde(deserialize_with = "ruma_serde::int_or_string_to_int"))]
#[serde(default, skip_serializing_if = "ruma_serde::is_default")]
users_default: Int,
}
/// Find the power level for the sender of `event_id` or return a default value of zero. /// Find the power level for the sender of `event_id` or return a default value of zero.
fn get_power_level_for_sender<E: Event>( fn get_power_level_for_sender<E: Event>(
event_id: &EventId, event_id: &EventId,
fetch_event: impl Fn(&EventId) -> Option<E>, fetch_event: impl Fn(&EventId) -> Option<E>,
) -> i64 { ) -> serde_json::Result<Int> {
info!("fetch event ({}) senders power level", event_id); info!("fetch event ({}) senders power level", event_id);
let event = fetch_event(event_id); let event = fetch_event(event_id);
@ -333,23 +347,19 @@ fn get_power_level_for_sender<E: Event>(
} }
} }
if pl.is_none() { let content: PowerLevelsContentFields = match pl {
return 0; None => return Ok(int!(0)),
Some(ev) => from_json_str(ev.content().get())?,
};
if let Some(ev) = event {
if let Some(&user_level) = content.users.get(ev.sender()) {
debug!("found {} at power_level {}", ev.sender(), user_level);
return Ok(user_level);
}
} }
if let Some(content) = pl.and_then(|pl| { Ok(content.users_default)
serde_json::from_value::<PowerLevelsEventContent>(pl.content().to_owned()).ok()
}) {
if let Some(ev) = event {
if let Some(user) = content.users.get(ev.sender()) {
debug!("found {} at power_level {}", ev.sender(), user);
return (*user).into();
}
}
content.users_default.into()
} else {
0
}
} }
/// Check the that each event is authenticated based on the events before it. /// Check the that each event is authenticated based on the events before it.
@ -406,7 +416,7 @@ fn iterative_auth_check<E: Event + Clone>(
event.sender(), event.sender(),
Some(state_key), Some(state_key),
event.content(), event.content(),
) { )? {
if let Some(ev_id) = resolved_state.get(&key) { if let Some(ev_id) = resolved_state.get(&key) {
if let Some(event) = fetch_event(ev_id) { if let Some(event) = fetch_event(ev_id) {
// TODO synapse checks `rejected_reason` is None here // TODO synapse checks `rejected_reason` is None here
@ -590,9 +600,7 @@ fn is_power_event(event: impl Event) -> bool {
event.state_key() == Some("") event.state_key() == Some("")
} }
EventType::RoomMember => { EventType::RoomMember => {
if let Ok(content) = if let Ok(content) = from_json_str::<MemberEventContent>(event.content().get()) {
serde_json::from_value::<MemberEventContent>(event.content().to_owned())
{
if [MembershipState::Leave, MembershipState::Ban].contains(&content.membership) { if [MembershipState::Leave, MembershipState::Ban].contains(&content.membership) {
return Some(event.sender().as_str()) != event.state_key(); return Some(event.sender().as_str()) != event.state_key();
} }
@ -611,13 +619,13 @@ mod tests {
sync::Arc, sync::Arc,
}; };
use js_int::uint; use js_int::{int, uint};
use maplit::{hashmap, hashset}; use maplit::{hashmap, hashset};
use rand::seq::SliceRandom; use rand::seq::SliceRandom;
use ruma_common::MilliSecondsSinceUnixEpoch; use ruma_common::MilliSecondsSinceUnixEpoch;
use ruma_events::{room::join_rules::JoinRule, EventType}; use ruma_events::{room::join_rules::JoinRule, EventType};
use ruma_identifiers::{EventId, RoomVersionId}; use ruma_identifiers::{EventId, RoomVersionId};
use serde_json::json; use serde_json::{json, value::to_raw_value as to_raw_json_value};
use tracing::debug; use tracing::debug;
use crate::{ use crate::{
@ -710,7 +718,7 @@ mod tests {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
), ),
to_init_pdu_event( to_init_pdu_event(
"MA", "MA",
@ -731,7 +739,7 @@ mod tests {
bob(), bob(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
), ),
]; ];
@ -752,30 +760,48 @@ mod tests {
tracing::subscriber::set_default(tracing_subscriber::fmt().with_test_writer().finish()); tracing::subscriber::set_default(tracing_subscriber::fmt().with_test_writer().finish());
let events = &[ let events = &[
to_init_pdu_event("T1", alice(), EventType::RoomTopic, Some(""), json!({})), to_init_pdu_event(
"T1",
alice(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
),
to_init_pdu_event( to_init_pdu_event(
"PA1", "PA1",
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
),
to_init_pdu_event(
"T2",
alice(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
), ),
to_init_pdu_event("T2", alice(), EventType::RoomTopic, Some(""), json!({})),
to_init_pdu_event( to_init_pdu_event(
"PA2", "PA2",
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 0 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 0 } })).unwrap(),
), ),
to_init_pdu_event( to_init_pdu_event(
"PB", "PB",
bob(), bob(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
),
to_init_pdu_event(
"T3",
bob(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
), ),
to_init_pdu_event("T3", bob(), EventType::RoomTopic, Some(""), json!({})),
]; ];
let edges = let edges =
@ -795,15 +821,27 @@ mod tests {
tracing::subscriber::set_default(tracing_subscriber::fmt().with_test_writer().finish()); tracing::subscriber::set_default(tracing_subscriber::fmt().with_test_writer().finish());
let events = &[ let events = &[
to_init_pdu_event("T1", alice(), EventType::RoomTopic, Some(""), json!({})), to_init_pdu_event(
"T1",
alice(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
),
to_init_pdu_event( to_init_pdu_event(
"PA", "PA",
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
),
to_init_pdu_event(
"T2",
bob(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
), ),
to_init_pdu_event("T2", bob(), EventType::RoomTopic, Some(""), json!({})),
to_init_pdu_event( to_init_pdu_event(
"MB", "MB",
alice(), alice(),
@ -835,7 +873,7 @@ mod tests {
alice(), alice(),
EventType::RoomJoinRules, EventType::RoomJoinRules,
Some(""), Some(""),
json!({ "join_rule": JoinRule::Private }), to_raw_json_value(&json!({ "join_rule": JoinRule::Private })).unwrap(),
), ),
to_init_pdu_event( to_init_pdu_event(
"ME", "ME",
@ -867,21 +905,23 @@ mod tests {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
), ),
to_init_pdu_event( to_init_pdu_event(
"PB", "PB",
bob(), bob(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50, charlie(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50, charlie(): 50 } }))
.unwrap(),
), ),
to_init_pdu_event( to_init_pdu_event(
"PC", "PC",
charlie(), charlie(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50, charlie(): 0 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50, charlie(): 0 } }))
.unwrap(),
), ),
]; ];
@ -901,32 +941,62 @@ mod tests {
tracing::subscriber::set_default(tracing_subscriber::fmt().with_test_writer().finish()); tracing::subscriber::set_default(tracing_subscriber::fmt().with_test_writer().finish());
let events = &[ let events = &[
to_init_pdu_event("T1", alice(), EventType::RoomTopic, Some(""), json!({})), to_init_pdu_event(
"T1",
alice(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
),
to_init_pdu_event( to_init_pdu_event(
"PA1", "PA1",
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
),
to_init_pdu_event(
"T2",
alice(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
), ),
to_init_pdu_event("T2", alice(), EventType::RoomTopic, Some(""), json!({})),
to_init_pdu_event( to_init_pdu_event(
"PA2", "PA2",
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 0 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 0 } })).unwrap(),
), ),
to_init_pdu_event( to_init_pdu_event(
"PB", "PB",
bob(), bob(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
),
to_init_pdu_event(
"T3",
bob(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
),
to_init_pdu_event(
"MZ1",
zara(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
),
to_init_pdu_event(
"T4",
alice(),
EventType::RoomTopic,
Some(""),
to_raw_json_value(&json!({})).unwrap(),
), ),
to_init_pdu_event("T3", bob(), EventType::RoomTopic, Some(""), json!({})),
to_init_pdu_event("MZ1", zara(), EventType::RoomTopic, Some(""), json!({})),
to_init_pdu_event("T4", alice(), EventType::RoomTopic, Some(""), json!({})),
]; ];
let edges = vec![ let edges = vec![
@ -986,7 +1056,7 @@ mod tests {
}; };
let res = crate::lexicographical_topological_sort(&graph, |id| { let res = crate::lexicographical_topological_sort(&graph, |id| {
Ok((0, MilliSecondsSinceUnixEpoch(uint!(0)), id.clone())) Ok((int!(0), MilliSecondsSinceUnixEpoch(uint!(0)), id.clone()))
}) })
.unwrap(); .unwrap();
@ -1120,7 +1190,7 @@ mod tests {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
&["CREATE", "IMA", "IPOWER"], // auth_events &["CREATE", "IMA", "IPOWER"], // auth_events
&["START"], // prev_events &["START"], // prev_events
), ),
@ -1129,7 +1199,7 @@ mod tests {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice(): 100, bob(): 50 } }), to_raw_json_value(&json!({ "users": { alice(): 100, bob(): 50 } })).unwrap(),
&["CREATE", "IMA", "IPOWER"], &["CREATE", "IMA", "IPOWER"],
&["END"], &["END"],
), ),
@ -1165,7 +1235,7 @@ mod tests {
alice(), alice(),
EventType::RoomJoinRules, EventType::RoomJoinRules,
Some(""), Some(""),
json!({ "join_rule": "invite" }), to_raw_json_value(&json!({ "join_rule": "invite" })).unwrap(),
&["CREATE", "IMA", "IPOWER"], &["CREATE", "IMA", "IPOWER"],
&["START"], &["START"],
), ),

View File

@ -3,6 +3,7 @@ use std::sync::Arc;
use ruma_common::MilliSecondsSinceUnixEpoch; use ruma_common::MilliSecondsSinceUnixEpoch;
use ruma_events::EventType; use ruma_events::EventType;
use ruma_identifiers::{EventId, RoomId, UserId}; use ruma_identifiers::{EventId, RoomId, UserId};
use serde_json::value::RawValue as RawJsonValue;
/// Abstraction of a PDU so users can have their own PDU types. /// Abstraction of a PDU so users can have their own PDU types.
pub trait Event { pub trait Event {
@ -22,11 +23,7 @@ pub trait Event {
fn event_type(&self) -> &EventType; fn event_type(&self) -> &EventType;
/// The event's content. /// The event's content.
// FIXME: This forces a serde_json::Value to be stored, which the previous solution of returning fn content(&self) -> &RawJsonValue;
// an owned one did not. However, the previous signature was even less efficient and also
// heavily encouraged storing `serde_json::Value`. We should likely force usage of `RawValue`
// instead, or somehow allow different storage without pessimizing all but one.
fn content(&self) -> &serde_json::Value;
/// The state key for this event. /// The state key for this event.
fn state_key(&self) -> Option<&str>; fn state_key(&self) -> Option<&str>;
@ -64,7 +61,7 @@ impl<T: Event> Event for &T {
(*self).event_type() (*self).event_type()
} }
fn content(&self) -> &serde_json::Value { fn content(&self) -> &RawJsonValue {
(*self).content() (*self).content()
} }
@ -106,7 +103,7 @@ impl<T: Event> Event for Arc<T> {
(&**self).event_type() (&**self).event_type()
} }
fn content(&self) -> &serde_json::Value { fn content(&self) -> &RawJsonValue {
(&**self).content() (&**self).content()
} }

View File

@ -7,7 +7,7 @@ use std::{
}, },
}; };
use js_int::uint; use js_int::{int, uint};
use ruma_common::MilliSecondsSinceUnixEpoch; use ruma_common::MilliSecondsSinceUnixEpoch;
use ruma_events::{ use ruma_events::{
pdu::{EventHash, Pdu, RoomV3Pdu}, pdu::{EventHash, Pdu, RoomV3Pdu},
@ -18,7 +18,10 @@ use ruma_events::{
EventType, EventType,
}; };
use ruma_identifiers::{EventId, RoomId, RoomVersionId, UserId}; use ruma_identifiers::{EventId, RoomId, RoomVersionId, UserId};
use serde_json::{json, Value as JsonValue}; use serde_json::{
json,
value::{to_raw_value as to_raw_json_value, RawValue as RawJsonValue},
};
use tracing::info; use tracing::info;
use crate::{auth_types_for_event, Error, Event, Result, StateMap}; use crate::{auth_types_for_event, Error, Event, Result, StateMap};
@ -75,7 +78,7 @@ pub fn do_check(
// Resolve the current state and add it to the state_at_event map then continue // Resolve the current state and add it to the state_at_event map then continue
// on in "time" // on in "time"
for node in crate::lexicographical_topological_sort(&graph, |id| { for node in crate::lexicographical_topological_sort(&graph, |id| {
Ok((0, MilliSecondsSinceUnixEpoch(uint!(0)), id.clone())) Ok((int!(0), MilliSecondsSinceUnixEpoch(uint!(0)), id.clone()))
}) })
.unwrap() .unwrap()
{ {
@ -131,7 +134,8 @@ pub fn do_check(
fake_event.sender(), fake_event.sender(),
fake_event.state_key(), fake_event.state_key(),
fake_event.content(), fake_event.content(),
); )
.unwrap();
let mut auth_events = vec![]; let mut auth_events = vec![];
for key in auth_types { for key in auth_types {
@ -242,7 +246,7 @@ impl TestStore<StateEvent> {
alice(), alice(),
EventType::RoomCreate, EventType::RoomCreate,
Some(""), Some(""),
json!({ "creator": alice() }), to_raw_json_value(&json!({ "creator": alice() })).unwrap(),
&[], &[],
&[], &[],
); );
@ -265,7 +269,7 @@ impl TestStore<StateEvent> {
alice(), alice(),
EventType::RoomJoinRules, EventType::RoomJoinRules,
Some(""), Some(""),
json!({ "join_rule": JoinRule::Public }), to_raw_json_value(&json!({ "join_rule": JoinRule::Public })).unwrap(),
&[cre.clone(), alice_mem.event_id().clone()], &[cre.clone(), alice_mem.event_id().clone()],
&[alice_mem.event_id().clone()], &[alice_mem.event_id().clone()],
); );
@ -356,12 +360,12 @@ pub fn room_id() -> RoomId {
RoomId::try_from("!test:foo").unwrap() RoomId::try_from("!test:foo").unwrap()
} }
pub fn member_content_ban() -> JsonValue { pub fn member_content_ban() -> Box<RawJsonValue> {
serde_json::to_value(MemberEventContent::new(MembershipState::Ban)).unwrap() to_raw_json_value(&MemberEventContent::new(MembershipState::Ban)).unwrap()
} }
pub fn member_content_join() -> JsonValue { pub fn member_content_join() -> Box<RawJsonValue> {
serde_json::to_value(MemberEventContent::new(MembershipState::Join)).unwrap() to_raw_json_value(&MemberEventContent::new(MembershipState::Join)).unwrap()
} }
pub fn to_init_pdu_event( pub fn to_init_pdu_event(
@ -369,7 +373,7 @@ pub fn to_init_pdu_event(
sender: UserId, sender: UserId,
ev_type: EventType, ev_type: EventType,
state_key: Option<&str>, state_key: Option<&str>,
content: JsonValue, content: Box<RawJsonValue>,
) -> Arc<StateEvent> { ) -> Arc<StateEvent> {
let ts = SERVER_TIMESTAMP.fetch_add(1, SeqCst); let ts = SERVER_TIMESTAMP.fetch_add(1, SeqCst);
let id = if id.contains('$') { id.to_owned() } else { format!("${}:foo", id) }; let id = if id.contains('$') { id.to_owned() } else { format!("${}:foo", id) };
@ -402,7 +406,7 @@ pub fn to_pdu_event<S>(
sender: UserId, sender: UserId,
ev_type: EventType, ev_type: EventType,
state_key: Option<&str>, state_key: Option<&str>,
content: JsonValue, content: Box<RawJsonValue>,
auth_events: &[S], auth_events: &[S],
prev_events: &[S], prev_events: &[S],
) -> Arc<StateEvent> ) -> Arc<StateEvent>
@ -446,7 +450,7 @@ pub fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomCreate, EventType::RoomCreate,
Some(""), Some(""),
json!({ "creator": alice() }), to_raw_json_value(&json!({ "creator": alice() })).unwrap(),
&[], &[],
&[], &[],
), ),
@ -464,7 +468,7 @@ pub fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomPowerLevels, EventType::RoomPowerLevels,
Some(""), Some(""),
json!({ "users": { alice().to_string(): 100 } }), to_raw_json_value(&json!({ "users": { alice().to_string(): 100 } })).unwrap(),
&["CREATE", "IMA"], &["CREATE", "IMA"],
&["IMA"], &["IMA"],
), ),
@ -473,7 +477,7 @@ pub fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
alice(), alice(),
EventType::RoomJoinRules, EventType::RoomJoinRules,
Some(""), Some(""),
json!({ "join_rule": JoinRule::Public }), to_raw_json_value(&json!({ "join_rule": JoinRule::Public })).unwrap(),
&["CREATE", "IMA", "IPOWER"], &["CREATE", "IMA", "IPOWER"],
&["IPOWER"], &["IPOWER"],
), ),
@ -500,7 +504,7 @@ pub fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
charlie(), charlie(),
EventType::RoomMessage, EventType::RoomMessage,
Some("dummy"), Some("dummy"),
json!({}), to_raw_json_value(&json!({})).unwrap(),
&[], &[],
&[], &[],
), ),
@ -509,7 +513,7 @@ pub fn INITIAL_EVENTS() -> HashMap<EventId, Arc<StateEvent>> {
charlie(), charlie(),
EventType::RoomMessage, EventType::RoomMessage,
Some("dummy"), Some("dummy"),
json!({}), to_raw_json_value(&json!({})).unwrap(),
&[], &[],
&[], &[],
), ),
@ -530,8 +534,8 @@ pub fn INITIAL_EDGES() -> Vec<EventId> {
pub mod event { pub mod event {
use ruma_events::{exports::ruma_common::MilliSecondsSinceUnixEpoch, pdu::Pdu, EventType}; use ruma_events::{exports::ruma_common::MilliSecondsSinceUnixEpoch, pdu::Pdu, EventType};
use ruma_identifiers::{EventId, RoomId, UserId}; use ruma_identifiers::{EventId, RoomId, UserId};
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use serde_json::value::RawValue as RawJsonValue;
use crate::Event; use crate::Event;
@ -567,7 +571,7 @@ pub mod event {
} }
} }
fn content(&self) -> &serde_json::Value { fn content(&self) -> &RawJsonValue {
match &self.rest { match &self.rest {
Pdu::RoomV1Pdu(ev) => &ev.content, Pdu::RoomV1Pdu(ev) => &ev.content,
Pdu::RoomV3Pdu(ev) => &ev.content, Pdu::RoomV3Pdu(ev) => &ev.content,

View File

@ -87,6 +87,7 @@ compat = [
"ruma-identifiers/compat", "ruma-identifiers/compat",
"ruma-client-api/compat", "ruma-client-api/compat",
"ruma-signatures/compat", "ruma-signatures/compat",
"ruma-state-res/compat",
] ]
# Helper features that aren't exactly part of the spec but could be helpful # Helper features that aren't exactly part of the spec but could be helpful