#![allow(clippy::assign_op_pattern)]
mod call;
mod create;
mod display_name;
mod encryption;
mod knock;
mod latest_event;
mod members;
mod room_info;
mod state;
mod tags;
mod tombstone;
#[cfg(feature = "e2e-encryption")]
use std::sync::RwLock as SyncRwLock;
use std::{
collections::{BTreeMap, HashSet},
sync::Arc,
};
pub use create::*;
pub use display_name::{RoomDisplayName, RoomHero};
pub(crate) use display_name::{RoomSummary, UpdatedRoomDisplayName};
pub use encryption::EncryptionState;
use eyeball::{AsyncLock, SharedObservable};
use futures_util::{Stream, StreamExt};
#[cfg(feature = "e2e-encryption")]
use matrix_sdk_common::ring_buffer::RingBuffer;
pub use members::{RoomMember, RoomMembersUpdate, RoomMemberships};
pub(crate) use room_info::SyncInfo;
pub use room_info::{
BaseRoomInfo, InviteAcceptanceDetails, RoomInfo, RoomInfoNotableUpdate,
RoomInfoNotableUpdateReasons, RoomRecencyStamp, apply_redaction,
};
use ruma::{
EventId, OwnedEventId, OwnedMxcUri, OwnedRoomAliasId, OwnedRoomId, OwnedUserId, RoomId,
RoomVersionId, UserId,
events::{
direct::OwnedDirectUserIdentifier,
receipt::{Receipt, ReceiptThread, ReceiptType},
room::{
avatar,
guest_access::GuestAccess,
history_visibility::HistoryVisibility,
join_rules::JoinRule,
power_levels::{RoomPowerLevels, RoomPowerLevelsEventContent, RoomPowerLevelsSource},
},
},
room::RoomType,
};
#[cfg(feature = "e2e-encryption")]
use ruma::{events::AnySyncTimelineEvent, serde::Raw};
use serde::{Deserialize, Serialize};
pub use state::{RoomState, RoomStateFilter};
pub(crate) use tags::RoomNotableTags;
use tokio::sync::broadcast;
pub use tombstone::{PredecessorRoom, SuccessorRoom};
use tracing::{info, instrument, warn};
use crate::{
Error, MinimalStateEvent,
deserialized_responses::MemberEvent,
notification_settings::RoomNotificationMode,
read_receipts::RoomReadReceipts,
store::{DynStateStore, Result as StoreResult, StateStoreExt},
sync::UnreadNotificationsCount,
};
#[derive(Debug, Clone)]
pub struct Room {
pub(super) room_id: OwnedRoomId,
pub(super) own_user_id: OwnedUserId,
pub(super) info: SharedObservable<RoomInfo>,
pub(super) room_info_notable_update_sender: broadcast::Sender<RoomInfoNotableUpdate>,
pub(super) store: Arc<DynStateStore>,
#[cfg(feature = "e2e-encryption")]
pub latest_encrypted_events: Arc<SyncRwLock<RingBuffer<Raw<AnySyncTimelineEvent>>>>,
pub seen_knock_request_ids_map:
SharedObservable<Option<BTreeMap<OwnedEventId, OwnedUserId>>, AsyncLock>,
pub room_member_updates_sender: broadcast::Sender<RoomMembersUpdate>,
}
impl Room {
pub(crate) fn new(
own_user_id: &UserId,
store: Arc<DynStateStore>,
room_id: &RoomId,
room_state: RoomState,
room_info_notable_update_sender: broadcast::Sender<RoomInfoNotableUpdate>,
) -> Self {
let room_info = RoomInfo::new(room_id, room_state);
Self::restore(own_user_id, store, room_info, room_info_notable_update_sender)
}
pub(crate) fn restore(
own_user_id: &UserId,
store: Arc<DynStateStore>,
room_info: RoomInfo,
room_info_notable_update_sender: broadcast::Sender<RoomInfoNotableUpdate>,
) -> Self {
let (room_member_updates_sender, _) = broadcast::channel(10);
Self {
own_user_id: own_user_id.into(),
room_id: room_info.room_id.clone(),
store,
info: SharedObservable::new(room_info),
#[cfg(feature = "e2e-encryption")]
latest_encrypted_events: Arc::new(SyncRwLock::new(RingBuffer::new(
Self::MAX_ENCRYPTED_EVENTS,
))),
room_info_notable_update_sender,
seen_knock_request_ids_map: SharedObservable::new_async(None),
room_member_updates_sender,
}
}
pub fn room_id(&self) -> &RoomId {
&self.room_id
}
pub fn creators(&self) -> Option<Vec<OwnedUserId>> {
self.info.read().creators()
}
pub fn own_user_id(&self) -> &UserId {
&self.own_user_id
}
pub fn is_space(&self) -> bool {
self.info.read().room_type().is_some_and(|t| *t == RoomType::Space)
}
pub fn room_type(&self) -> Option<RoomType> {
self.info.read().room_type().map(ToOwned::to_owned)
}
pub fn unread_notification_counts(&self) -> UnreadNotificationsCount {
self.info.read().notification_counts
}
pub fn num_unread_messages(&self) -> u64 {
self.info.read().read_receipts.num_unread
}
pub fn read_receipts(&self) -> RoomReadReceipts {
self.info.read().read_receipts.clone()
}
pub fn num_unread_notifications(&self) -> u64 {
self.info.read().read_receipts.num_notifications
}
pub fn num_unread_mentions(&self) -> u64 {
self.info.read().read_receipts.num_mentions
}
pub fn is_state_fully_synced(&self) -> bool {
self.info.read().sync_info == SyncInfo::FullySynced
}
pub fn is_state_partially_or_fully_synced(&self) -> bool {
self.info.read().sync_info != SyncInfo::NoState
}
pub fn last_prev_batch(&self) -> Option<String> {
self.info.read().last_prev_batch.clone()
}
pub fn avatar_url(&self) -> Option<OwnedMxcUri> {
self.info.read().avatar_url().map(ToOwned::to_owned)
}
pub fn avatar_info(&self) -> Option<avatar::ImageInfo> {
self.info.read().avatar_info().map(ToOwned::to_owned)
}
pub fn canonical_alias(&self) -> Option<OwnedRoomAliasId> {
self.info.read().canonical_alias().map(ToOwned::to_owned)
}
pub fn alt_aliases(&self) -> Vec<OwnedRoomAliasId> {
self.info.read().alt_aliases().to_owned()
}
pub fn create_content(&self) -> Option<RoomCreateWithCreatorEventContent> {
match self.info.read().base_info.create.as_ref()? {
MinimalStateEvent::Original(ev) => Some(ev.content.clone()),
MinimalStateEvent::Redacted(ev) => Some(ev.content.clone()),
}
}
#[instrument(skip_all, fields(room_id = ?self.room_id))]
pub async fn is_direct(&self) -> StoreResult<bool> {
match self.state() {
RoomState::Joined | RoomState::Left | RoomState::Banned => {
Ok(!self.info.read().base_info.dm_targets.is_empty())
}
RoomState::Invited => {
let member = self.get_member(self.own_user_id()).await?;
match member {
None => {
info!("RoomMember not found for the user's own id");
Ok(false)
}
Some(member) => match member.event.as_ref() {
MemberEvent::Sync(_) => {
warn!("Got MemberEvent::Sync in an invited room");
Ok(false)
}
MemberEvent::Stripped(event) => {
Ok(event.content.is_direct.unwrap_or(false))
}
},
}
}
RoomState::Knocked => Ok(false),
}
}
pub fn direct_targets(&self) -> HashSet<OwnedDirectUserIdentifier> {
self.info.read().base_info.dm_targets.clone()
}
pub fn direct_targets_length(&self) -> usize {
self.info.read().base_info.dm_targets.len()
}
pub fn guest_access(&self) -> GuestAccess {
self.info.read().guest_access().clone()
}
pub fn history_visibility(&self) -> Option<HistoryVisibility> {
self.info.read().history_visibility().cloned()
}
pub fn history_visibility_or_default(&self) -> HistoryVisibility {
self.info.read().history_visibility_or_default().clone()
}
pub fn is_public(&self) -> Option<bool> {
self.info.read().join_rule().map(|join_rule| matches!(join_rule, JoinRule::Public))
}
pub fn join_rule(&self) -> Option<JoinRule> {
self.info.read().join_rule().cloned()
}
pub fn max_power_level(&self) -> i64 {
self.info.read().base_info.max_power_level
}
pub async fn power_levels(&self) -> Result<RoomPowerLevels, Error> {
let power_levels_content = self
.store
.get_state_event_static::<RoomPowerLevelsEventContent>(self.room_id())
.await?
.ok_or(Error::InsufficientData)?
.deserialize()?;
let creators = self.creators().ok_or(Error::InsufficientData)?;
let rules = self.info.read().room_version_rules_or_default();
Ok(power_levels_content.power_levels(&rules.authorization, creators))
}
pub async fn power_levels_or_default(&self) -> RoomPowerLevels {
if let Ok(power_levels) = self.power_levels().await {
return power_levels;
}
let rules = self.info.read().room_version_rules_or_default();
RoomPowerLevels::new(
RoomPowerLevelsSource::None,
&rules.authorization,
self.creators().into_iter().flatten(),
)
}
pub fn name(&self) -> Option<String> {
self.info.read().name().map(ToOwned::to_owned)
}
pub fn topic(&self) -> Option<String> {
self.info.read().topic().map(ToOwned::to_owned)
}
pub fn update_cached_user_defined_notification_mode(&self, mode: RoomNotificationMode) {
self.info.update_if(|info| {
if info.cached_user_defined_notification_mode.as_ref() != Some(&mode) {
info.cached_user_defined_notification_mode = Some(mode);
true
} else {
false
}
});
}
pub fn cached_user_defined_notification_mode(&self) -> Option<RoomNotificationMode> {
self.info.read().cached_user_defined_notification_mode
}
pub fn clear_user_defined_notification_mode(&self) {
self.info.update_if(|info| {
if info.cached_user_defined_notification_mode.is_some() {
info.cached_user_defined_notification_mode = None;
true
} else {
false
}
})
}
pub async fn joined_user_ids(&self) -> StoreResult<Vec<OwnedUserId>> {
self.store.get_user_ids(self.room_id(), RoomMemberships::JOIN).await
}
pub fn heroes(&self) -> Vec<RoomHero> {
self.info.read().heroes().to_vec()
}
pub async fn load_user_receipt(
&self,
receipt_type: ReceiptType,
thread: ReceiptThread,
user_id: &UserId,
) -> StoreResult<Option<(OwnedEventId, Receipt)>> {
self.store.get_user_room_receipt_event(self.room_id(), receipt_type, thread, user_id).await
}
pub async fn load_event_receipts(
&self,
receipt_type: ReceiptType,
thread: ReceiptThread,
event_id: &EventId,
) -> StoreResult<Vec<(OwnedUserId, Receipt)>> {
self.store
.get_event_room_receipt_events(self.room_id(), receipt_type, thread, event_id)
.await
}
pub fn is_marked_unread(&self) -> bool {
self.info.read().base_info.is_marked_unread
}
pub fn version(&self) -> Option<RoomVersionId> {
self.info.read().room_version().cloned()
}
pub fn recency_stamp(&self) -> Option<RoomRecencyStamp> {
self.info.read().recency_stamp
}
pub fn invite_acceptance_details(&self) -> Option<InviteAcceptanceDetails> {
self.info.read().invite_acceptance_details.clone()
}
pub fn pinned_event_ids_stream(&self) -> impl Stream<Item = Vec<OwnedEventId>> + use<> {
self.info
.subscribe()
.map(|i| i.base_info.pinned_events.map(|c| c.pinned).unwrap_or_default())
}
pub fn pinned_event_ids(&self) -> Option<Vec<OwnedEventId>> {
self.info.read().pinned_event_ids()
}
}
#[cfg(not(feature = "test-send-sync"))]
unsafe impl Send for Room {}
#[cfg(not(feature = "test-send-sync"))]
unsafe impl Sync for Room {}
#[cfg(feature = "test-send-sync")]
#[test]
fn test_send_sync_for_room() {
fn assert_send_sync<
T: matrix_sdk_common::SendOutsideWasm + matrix_sdk_common::SyncOutsideWasm,
>() {
}
assert_send_sync::<Room>();
}
#[derive(Debug, Clone, Copy, Default, PartialEq, Eq, Serialize, Deserialize)]
pub(crate) enum AccountDataSource {
Stable,
#[default]
Unstable,
}