feat: add option to disable invites

This commit is contained in:
Anna 2022-07-19 18:09:23 -04:00
parent 0901530130
commit 6d34d4b10a
10 changed files with 66 additions and 15 deletions

View File

@ -0,0 +1,13 @@
use std::sync::Arc;
use tokio::sync::RwLock;
use crate::{ClientState, State, util, WsStream};
use crate::types::protocol::{AllowInvitesRequest, AllowInvitesResponse};
pub async fn allow_invites(_state: Arc<RwLock<State>>, client_state: Arc<RwLock<ClientState>>, conn: &mut WsStream, number: u32, req: AllowInvitesRequest) -> anyhow::Result<()> {
client_state.write().await.allow_invites = req.allowed;
util::send(conn, number, AllowInvitesResponse {
allowed: req.allowed,
}).await
}

View File

@ -69,6 +69,7 @@ pub async fn authenticate(state: Arc<RwLock<State>>, client_state: Arc<RwLock<Cl
}); });
c_state.pk = req.pk.into_inner(); c_state.pk = req.pk.into_inner();
c_state.allow_invites = req.allow_invites;
// release lock asap // release lock asap
drop(c_state); drop(c_state);

View File

@ -23,12 +23,19 @@ pub async fn invite(state: Arc<RwLock<State>>, client_state: Arc<RwLock<ClientSt
return crate::util::send(conn, number, ErrorResponse::new(req.channel, "not enough permissions to invite")).await; return crate::util::send(conn, number, ErrorResponse::new(req.channel, "not enough permissions to invite")).await;
} }
const NOT_ONLINE: &str = "user not online";
let target_id = match state.read().await.ids.get(&(req.name.clone(), req.world)) { let target_id = match state.read().await.ids.get(&(req.name.clone(), req.world)) {
Some(id) => *id, Some(id) => *id,
None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, "user not online")).await, None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, NOT_ONLINE)).await,
}; };
let target_id_i = target_id as i64; let target_id_i = target_id as i64;
if let Some(client) = state.read().await.clients.get(&target_id) {
if !client.read().await.allow_invites {
return crate::util::send(conn, number, ErrorResponse::new(req.channel, NOT_ONLINE)).await;
}
}
if target_id_i == lodestone_id { if target_id_i == lodestone_id {
return crate::util::send(conn, number, ErrorResponse::new(req.channel, "cannot invite self")).await; return crate::util::send(conn, number, ErrorResponse::new(req.channel, "cannot invite self")).await;
} }
@ -110,7 +117,7 @@ pub async fn invite(state: Arc<RwLock<State>>, client_state: Arc<RwLock<ClientSt
}), }),
}).await?; }).await?;
} }
None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, "user not online")).await, None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, NOT_ONLINE)).await,
} }
crate::util::send(conn, number, InviteResponse { crate::util::send(conn, number, InviteResponse {

View File

@ -1,4 +1,5 @@
pub use self::{ pub use self::{
allow_invites::*,
authenticate::*, authenticate::*,
create::*, create::*,
disband::*, disband::*,
@ -18,6 +19,7 @@ pub use self::{
version::*, version::*,
}; };
pub mod allow_invites;
pub mod authenticate; pub mod authenticate;
pub mod create; pub mod create;
pub mod disband; pub mod disband;

View File

@ -10,25 +10,20 @@ use crate::util::redacted::Redacted;
pub async fn public_key(state: Arc<RwLock<State>>, conn: &mut WsStream, number: u32, req: PublicKeyRequest) -> Result<()> { pub async fn public_key(state: Arc<RwLock<State>>, conn: &mut WsStream, number: u32, req: PublicKeyRequest) -> Result<()> {
let id = match state.read().await.ids.get(&(req.name.clone(), req.world)) { let id = match state.read().await.ids.get(&(req.name.clone(), req.world)) {
Some(id) => *id, Some(id) => *id,
None => { None => return crate::util::send(conn, number, PublicKeyResponse {
crate::util::send(conn, number, PublicKeyResponse { name: req.name,
name: req.name, world: req.world,
world: req.world, pk: None,
pk: None, }).await,
}).await?;
return Ok(());
}
}; };
let pk = match state.read().await.clients.get(&id) { let pk = match state.read().await.clients.get(&id) {
Some(client) => Some(client.read().await.pk.clone()), Some(client) if client.read().await.allow_invites => Some(client.read().await.pk.clone()),
None => None, _ => None,
}; };
crate::util::send(conn, number, PublicKeyResponse { crate::util::send(conn, number, PublicKeyResponse {
name: req.name, name: req.name,
world: req.world, world: req.world,
pk: pk.map(Redacted), pk: pk.map(Redacted),
}).await?; }).await
Ok(())
} }

View File

@ -257,6 +257,7 @@ pub struct ClientState {
user: Option<User>, user: Option<User>,
tx: Sender<ResponseContainer>, tx: Sender<ResponseContainer>,
pk: Vec<u8>, pk: Vec<u8>,
allow_invites: bool,
} }
impl ClientState { impl ClientState {
@ -344,6 +345,7 @@ async fn client_loop(state: Arc<RwLock<State>>, mut conn: WsStream) -> Result<()
user: None, user: None,
tx, tx,
pk: Default::default(), pk: Default::default(),
allow_invites: false,
})); }));
loop { loop {
@ -422,6 +424,9 @@ async fn client_loop(state: Arc<RwLock<State>>, mut conn: WsStream) -> Result<()
RequestKind::SendSecrets(req) if logged_in => { RequestKind::SendSecrets(req) if logged_in => {
crate::handlers::send_secrets(Arc::clone(&state), Arc::clone(&client_state), &mut conn, msg.number, req).await?; crate::handlers::send_secrets(Arc::clone(&state), Arc::clone(&client_state), &mut conn, msg.number, req).await?;
} }
RequestKind::AllowInvites(req) if logged_in => {
crate::handlers::allow_invites(Arc::clone(&state), Arc::clone(&client_state), &mut conn, msg.number, req).await?;
}
_ if !logged_in => { _ if !logged_in => {
util::send(&mut conn, msg.number, ErrorResponse::new(None, "not logged in")).await?; util::send(&mut conn, msg.number, ErrorResponse::new(None, "not logged in")).await?;
} }
@ -446,10 +451,14 @@ async fn client_loop(state: Arc<RwLock<State>>, mut conn: WsStream) -> Result<()
} }
} }
debug!("ending client thread");
if let Some(user) = &client_state.read().await.user { if let Some(user) = &client_state.read().await.user {
state.write().await.clients.remove(&user.lodestone_id); state.write().await.clients.remove(&user.lodestone_id);
state.write().await.ids.remove(&(user.name.clone(), util::id_from_world(user.world))); state.write().await.ids.remove(&(user.name.clone(), util::id_from_world(user.world)));
} }
debug!("client thread ended");
Ok(()) Ok(())
} }

View File

@ -0,0 +1,11 @@
use serde::{Deserialize, Serialize};
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct AllowInvitesRequest {
pub allowed: bool,
}
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct AllowInvitesResponse {
pub allowed: bool,
}

View File

@ -1,4 +1,5 @@
use serde::{Deserialize, Serialize}; use serde::{Deserialize, Serialize};
use crate::util::redacted::Redacted; use crate::util::redacted::Redacted;
#[derive(Debug, Clone, Serialize, Deserialize)] #[derive(Debug, Clone, Serialize, Deserialize)]
@ -6,6 +7,8 @@ pub struct AuthenticateRequest {
pub key: Redacted<String>, pub key: Redacted<String>,
#[serde(with = "serde_bytes")] #[serde(with = "serde_bytes")]
pub pk: Redacted<Vec<u8>>, pub pk: Redacted<Vec<u8>>,
#[serde(default = "default_true")]
pub allow_invites: bool,
} }
#[derive(Debug, Clone, Serialize, Deserialize)] #[derive(Debug, Clone, Serialize, Deserialize)]
@ -26,3 +29,7 @@ impl AuthenticateResponse {
} }
} }
} }
fn default_true() -> bool {
true
}

View File

@ -28,6 +28,7 @@ pub enum RequestKind {
PublicKey(PublicKeyRequest), PublicKey(PublicKeyRequest),
Secrets(SecretsRequest), Secrets(SecretsRequest),
SendSecrets(SendSecretsRequest), SendSecrets(SendSecretsRequest),
AllowInvites(AllowInvitesRequest),
} }
#[derive(Debug, Clone, Serialize, Deserialize)] #[derive(Debug, Clone, Serialize, Deserialize)]
@ -61,6 +62,7 @@ pub enum ResponseKind {
Secrets(SecretsResponse), Secrets(SecretsResponse),
SendSecrets(SendSecretsResponse), SendSecrets(SendSecretsResponse),
Announce(AnnounceResponse), Announce(AnnounceResponse),
AllowInvites(AllowInvitesResponse),
} }
macro_rules! request_container { macro_rules! request_container {
@ -90,6 +92,7 @@ request_container!(Update, UpdateRequest);
request_container!(PublicKey, PublicKeyRequest); request_container!(PublicKey, PublicKeyRequest);
request_container!(Secrets, SecretsRequest); request_container!(Secrets, SecretsRequest);
request_container!(SendSecrets, SendSecretsRequest); request_container!(SendSecrets, SendSecretsRequest);
request_container!(AllowInvites, AllowInvitesRequest);
macro_rules! response_container { macro_rules! response_container {
($name:ident, $response:ty) => { ($name:ident, $response:ty) => {
@ -123,3 +126,4 @@ response_container!(MemberChange, MemberChangeResponse);
response_container!(Secrets, SecretsResponse); response_container!(Secrets, SecretsResponse);
response_container!(SendSecrets, SendSecretsResponse); response_container!(SendSecrets, SendSecretsResponse);
response_container!(Announce, AnnounceResponse); response_container!(Announce, AnnounceResponse);
response_container!(AllowInvites, AllowInvitesResponse);

View File

@ -1,3 +1,4 @@
pub mod allow_invites;
pub mod announce; pub mod announce;
pub mod authenticate; pub mod authenticate;
pub mod container; pub mod container;
@ -22,6 +23,7 @@ pub mod version;
pub mod channel; pub mod channel;
pub use self::{ pub use self::{
allow_invites::*,
announce::*, announce::*,
authenticate::*, authenticate::*,
container::*, container::*,