2020-06-09 13:13:17 +00:00
|
|
|
use crate::{Error, Result};
|
2020-04-04 09:53:37 +00:00
|
|
|
use js_int::UInt;
|
2020-06-05 16:19:26 +00:00
|
|
|
use ruma::{
|
|
|
|
events::{
|
2020-07-17 20:00:39 +00:00
|
|
|
pdu::EventHash, room::member::MemberEventContent, AnyRoomEvent, AnyStateEvent,
|
|
|
|
AnyStrippedStateEvent, AnySyncRoomEvent, AnySyncStateEvent, EventJson, EventType,
|
2020-06-26 22:34:11 +00:00
|
|
|
StateEvent,
|
2020-06-05 16:19:26 +00:00
|
|
|
},
|
|
|
|
identifiers::{EventId, RoomId, UserId},
|
2020-04-14 11:54:32 +00:00
|
|
|
};
|
2020-04-04 09:53:37 +00:00
|
|
|
use serde::{Deserialize, Serialize};
|
2020-06-01 18:58:49 +00:00
|
|
|
use serde_json::json;
|
2020-04-04 09:53:37 +00:00
|
|
|
use std::collections::HashMap;
|
|
|
|
|
|
|
|
#[derive(Deserialize, Serialize)]
|
|
|
|
pub struct PduEvent {
|
|
|
|
pub event_id: EventId,
|
|
|
|
pub room_id: RoomId,
|
|
|
|
pub sender: UserId,
|
|
|
|
pub origin: String,
|
|
|
|
pub origin_server_ts: UInt,
|
|
|
|
#[serde(rename = "type")]
|
|
|
|
pub kind: EventType,
|
|
|
|
pub content: serde_json::Value,
|
|
|
|
#[serde(skip_serializing_if = "Option::is_none")]
|
|
|
|
pub state_key: Option<String>,
|
|
|
|
pub prev_events: Vec<EventId>,
|
|
|
|
pub depth: UInt,
|
|
|
|
pub auth_events: Vec<EventId>,
|
|
|
|
#[serde(skip_serializing_if = "Option::is_none")]
|
|
|
|
pub redacts: Option<EventId>,
|
|
|
|
#[serde(default, skip_serializing_if = "serde_json::Map::is_empty")]
|
|
|
|
pub unsigned: serde_json::Map<String, serde_json::Value>,
|
|
|
|
pub hashes: EventHash,
|
|
|
|
pub signatures: HashMap<String, HashMap<String, String>>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PduEvent {
|
2020-06-09 13:13:17 +00:00
|
|
|
pub fn redact(&mut self) -> Result<()> {
|
2020-05-26 08:27:51 +00:00
|
|
|
self.unsigned.clear();
|
|
|
|
let allowed = match self.kind {
|
|
|
|
EventType::RoomMember => vec!["membership"],
|
|
|
|
EventType::RoomCreate => vec!["creator"],
|
|
|
|
EventType::RoomJoinRules => vec!["join_rule"],
|
|
|
|
EventType::RoomPowerLevels => vec![
|
|
|
|
"ban",
|
|
|
|
"events",
|
|
|
|
"events_default",
|
|
|
|
"kick",
|
|
|
|
"redact",
|
|
|
|
"state_default",
|
|
|
|
"users",
|
|
|
|
"users_default",
|
|
|
|
],
|
|
|
|
EventType::RoomHistoryVisibility => vec!["history_visibility"],
|
|
|
|
_ => vec![],
|
|
|
|
};
|
|
|
|
|
2020-06-09 13:13:17 +00:00
|
|
|
let old_content = self
|
|
|
|
.content
|
|
|
|
.as_object_mut()
|
2020-06-11 08:03:08 +00:00
|
|
|
.ok_or_else(|| Error::bad_database("PDU in db has invalid content."))?;
|
2020-06-09 13:13:17 +00:00
|
|
|
|
2020-05-26 08:27:51 +00:00
|
|
|
let mut new_content = serde_json::Map::new();
|
|
|
|
|
|
|
|
for key in allowed {
|
|
|
|
if let Some(value) = old_content.remove(key) {
|
|
|
|
new_content.insert(key.to_owned(), value);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-01 18:58:49 +00:00
|
|
|
self.unsigned.insert(
|
|
|
|
"redacted_because".to_owned(),
|
|
|
|
json!({"content": {}, "type": "m.room.redaction"}),
|
|
|
|
);
|
|
|
|
|
2020-05-26 08:27:51 +00:00
|
|
|
self.content = new_content.into();
|
2020-06-09 13:13:17 +00:00
|
|
|
|
|
|
|
Ok(())
|
2020-05-26 08:27:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-17 20:00:39 +00:00
|
|
|
pub fn to_room_event_stub(&self) -> EventJson<AnySyncRoomEvent> {
|
2020-06-22 11:26:09 +00:00
|
|
|
let json = serde_json::to_string(&self).expect("PDUs are always valid");
|
2020-07-17 20:00:39 +00:00
|
|
|
serde_json::from_str::<EventJson<AnySyncRoomEvent>>(&json)
|
2020-06-22 11:26:09 +00:00
|
|
|
.expect("EventJson::from_str always works")
|
|
|
|
}
|
2020-06-21 19:58:42 +00:00
|
|
|
pub fn to_room_event(&self) -> EventJson<AnyRoomEvent> {
|
2020-06-09 13:13:17 +00:00
|
|
|
let json = serde_json::to_string(&self).expect("PDUs are always valid");
|
2020-06-21 19:58:42 +00:00
|
|
|
serde_json::from_str::<EventJson<AnyRoomEvent>>(&json)
|
2020-06-09 13:13:17 +00:00
|
|
|
.expect("EventJson::from_str always works")
|
2020-04-04 09:53:37 +00:00
|
|
|
}
|
2020-06-21 19:58:42 +00:00
|
|
|
pub fn to_state_event(&self) -> EventJson<AnyStateEvent> {
|
2020-06-09 13:13:17 +00:00
|
|
|
let json = serde_json::to_string(&self).expect("PDUs are always valid");
|
2020-06-21 19:58:42 +00:00
|
|
|
serde_json::from_str::<EventJson<AnyStateEvent>>(&json)
|
2020-06-09 13:13:17 +00:00
|
|
|
.expect("EventJson::from_str always works")
|
2020-04-29 10:18:45 +00:00
|
|
|
}
|
2020-07-17 20:00:39 +00:00
|
|
|
pub fn to_state_event_stub(&self) -> EventJson<AnySyncStateEvent> {
|
2020-06-22 11:26:09 +00:00
|
|
|
let json = serde_json::to_string(&self).expect("PDUs are always valid");
|
2020-07-17 20:00:39 +00:00
|
|
|
serde_json::from_str::<EventJson<AnySyncStateEvent>>(&json)
|
2020-06-22 11:26:09 +00:00
|
|
|
.expect("EventJson::from_str always works")
|
|
|
|
}
|
2020-07-17 20:00:39 +00:00
|
|
|
pub fn to_stripped_state_event(&self) -> EventJson<AnyStrippedStateEvent> {
|
2020-06-09 13:13:17 +00:00
|
|
|
let json = serde_json::to_string(&self).expect("PDUs are always valid");
|
2020-07-17 20:00:39 +00:00
|
|
|
serde_json::from_str::<EventJson<AnyStrippedStateEvent>>(&json)
|
2020-06-09 13:13:17 +00:00
|
|
|
.expect("EventJson::from_str always works")
|
2020-04-14 11:54:32 +00:00
|
|
|
}
|
2020-06-26 22:34:11 +00:00
|
|
|
pub fn to_member_event(&self) -> EventJson<StateEvent<MemberEventContent>> {
|
2020-06-12 11:18:25 +00:00
|
|
|
let json = serde_json::to_string(&self).expect("PDUs are always valid");
|
2020-06-26 22:34:11 +00:00
|
|
|
serde_json::from_str::<EventJson<StateEvent<MemberEventContent>>>(&json)
|
2020-06-12 11:18:25 +00:00
|
|
|
.expect("EventJson::from_str always works")
|
|
|
|
}
|
2020-04-04 09:53:37 +00:00
|
|
|
}
|