2017-04-20 23:40:52 +01:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-04-12 16:06:26 +01:00
|
|
|
package routing
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
|
|
|
|
"github.com/gorilla/mux"
|
2022-09-27 17:06:49 +01:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"github.com/matrix-org/util"
|
|
|
|
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
2022-04-22 10:38:29 +01:00
|
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
2022-09-27 17:06:49 +01:00
|
|
|
"github.com/matrix-org/dendrite/internal/fulltext"
|
2020-06-12 14:55:57 +01:00
|
|
|
"github.com/matrix-org/dendrite/internal/httputil"
|
2020-01-23 17:51:10 +00:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
2020-12-02 17:41:00 +00:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2017-11-15 15:42:39 +00:00
|
|
|
"github.com/matrix-org/dendrite/syncapi/storage"
|
2017-04-20 17:22:44 +01:00
|
|
|
"github.com/matrix-org/dendrite/syncapi/sync"
|
2020-06-16 14:10:55 +01:00
|
|
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
2017-04-12 16:06:26 +01:00
|
|
|
)
|
|
|
|
|
2017-08-03 15:10:39 +01:00
|
|
|
// Setup configures the given mux with sync-server listeners
|
2019-07-03 16:38:50 +01:00
|
|
|
//
|
|
|
|
// Due to Setup being used to call many other functions, a gocyclo nolint is
|
|
|
|
// applied:
|
|
|
|
// nolint: gocyclo
|
2020-01-23 17:51:10 +00:00
|
|
|
func Setup(
|
2020-08-13 12:16:37 +01:00
|
|
|
csMux *mux.Router, srp *sync.RequestPool, syncDB storage.Database,
|
2022-05-05 09:56:03 +01:00
|
|
|
userAPI userapi.SyncUserAPI,
|
|
|
|
rsAPI api.SyncRoomserverAPI,
|
2020-08-10 14:18:04 +01:00
|
|
|
cfg *config.SyncAPI,
|
2022-05-06 14:33:34 +01:00
|
|
|
lazyLoadCache caching.LazyLoadCache,
|
2022-09-27 17:06:49 +01:00
|
|
|
fts *fulltext.Search,
|
2020-01-23 17:51:10 +00:00
|
|
|
) {
|
2022-10-13 14:50:52 +01:00
|
|
|
v1unstablemux := csMux.PathPrefix("/{apiversion:(?:v1|unstable)}/").Subrouter()
|
2022-02-18 14:14:16 +00:00
|
|
|
v3mux := csMux.PathPrefix("/{apiversion:(?:r0|v3)}/").Subrouter()
|
2017-09-22 11:34:54 +01:00
|
|
|
|
2018-07-16 23:17:03 +01:00
|
|
|
// TODO: Add AS support for all handlers below.
|
2022-02-18 14:14:16 +00:00
|
|
|
v3mux.Handle("/sync", httputil.MakeAuthAPI("sync", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
2017-05-23 17:43:05 +01:00
|
|
|
return srp.OnIncomingSyncRequest(req, device)
|
2018-03-13 15:55:45 +00:00
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
2017-09-22 11:34:54 +01:00
|
|
|
|
2022-02-18 14:14:16 +00:00
|
|
|
v3mux.Handle("/rooms/{roomID}/messages", httputil.MakeAuthAPI("room_messages", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
2020-06-12 14:55:57 +01:00
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
2020-01-23 17:51:10 +00:00
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
2022-05-05 09:56:03 +01:00
|
|
|
return OnIncomingMessagesRequest(req, syncDB, vars["roomID"], device, rsAPI, cfg, srp, lazyLoadCache)
|
2020-01-23 17:51:10 +00:00
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
2020-06-26 15:34:41 +01:00
|
|
|
|
2022-10-10 11:19:16 +01:00
|
|
|
v3mux.Handle("/rooms/{roomID}/event/{eventID}",
|
|
|
|
httputil.MakeAuthAPI("rooms_get_event", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return GetEvent(req, device, vars["roomID"], vars["eventID"], cfg, syncDB, rsAPI)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
2022-02-18 14:14:16 +00:00
|
|
|
v3mux.Handle("/user/{userId}/filter",
|
2020-06-26 15:34:41 +01:00
|
|
|
httputil.MakeAuthAPI("put_filter", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return PutFilter(req, device, syncDB, vars["userId"])
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
|
|
|
|
2022-02-18 14:14:16 +00:00
|
|
|
v3mux.Handle("/user/{userId}/filter/{filterId}",
|
2020-06-26 15:34:41 +01:00
|
|
|
httputil.MakeAuthAPI("get_filter", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
return GetFilter(req, device, syncDB, vars["userId"], vars["filterId"])
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2020-07-30 14:52:21 +01:00
|
|
|
|
2022-02-18 14:14:16 +00:00
|
|
|
v3mux.Handle("/keys/changes", httputil.MakeAuthAPI("keys_changes", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
2020-07-30 14:52:21 +01:00
|
|
|
return srp.OnIncomingKeyChangeRequest(req, device)
|
|
|
|
})).Methods(http.MethodGet, http.MethodOptions)
|
2022-02-21 16:12:22 +00:00
|
|
|
|
|
|
|
v3mux.Handle("/rooms/{roomId}/context/{eventId}",
|
|
|
|
httputil.MakeAuthAPI(gomatrixserverlib.Join, userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return Context(
|
|
|
|
req, device,
|
|
|
|
rsAPI, syncDB,
|
|
|
|
vars["roomId"], vars["eventId"],
|
2022-04-22 10:38:29 +01:00
|
|
|
lazyLoadCache,
|
2022-02-21 16:12:22 +00:00
|
|
|
)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
2022-09-27 17:06:49 +01:00
|
|
|
|
2022-10-13 14:50:52 +01:00
|
|
|
v1unstablemux.Handle("/rooms/{roomId}/relations/{eventId}",
|
|
|
|
httputil.MakeAuthAPI(gomatrixserverlib.Join, userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return Relations(
|
|
|
|
req, device, syncDB, rsAPI,
|
|
|
|
vars["roomId"], vars["eventId"], "", "",
|
|
|
|
)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
|
|
|
v1unstablemux.Handle("/rooms/{roomId}/relations/{eventId}/{relType}",
|
|
|
|
httputil.MakeAuthAPI(gomatrixserverlib.Join, userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return Relations(
|
|
|
|
req, device, syncDB, rsAPI,
|
|
|
|
vars["roomId"], vars["eventId"], vars["relType"], "",
|
|
|
|
)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
|
|
|
v1unstablemux.Handle("/rooms/{roomId}/relations/{eventId}/{relType}/{eventType}",
|
|
|
|
httputil.MakeAuthAPI(gomatrixserverlib.Join, userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
vars, err := httputil.URLDecodeMapValues(mux.Vars(req))
|
|
|
|
if err != nil {
|
|
|
|
return util.ErrorResponse(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return Relations(
|
|
|
|
req, device, syncDB, rsAPI,
|
|
|
|
vars["roomId"], vars["eventId"], vars["relType"], vars["eventType"],
|
|
|
|
)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodGet, http.MethodOptions)
|
|
|
|
|
2022-09-27 17:06:49 +01:00
|
|
|
v3mux.Handle("/search",
|
|
|
|
httputil.MakeAuthAPI("search", userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {
|
|
|
|
if !cfg.Fulltext.Enabled {
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusNotImplemented,
|
|
|
|
JSON: jsonerror.Unknown("Search has been disabled by the server administrator."),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var nextBatch *string
|
|
|
|
if err := req.ParseForm(); err != nil {
|
|
|
|
return jsonerror.InternalServerError()
|
|
|
|
}
|
|
|
|
if req.Form.Has("next_batch") {
|
|
|
|
nb := req.FormValue("next_batch")
|
|
|
|
nextBatch = &nb
|
|
|
|
}
|
|
|
|
return Search(req, device, syncDB, fts, nextBatch)
|
|
|
|
}),
|
|
|
|
).Methods(http.MethodPost, http.MethodOptions)
|
2017-04-12 16:06:26 +01:00
|
|
|
}
|