feat: add option to disable invites
This commit is contained in:
parent
0901530130
commit
6d34d4b10a
|
@ -0,0 +1,13 @@
|
||||||
|
use std::sync::Arc;
|
||||||
|
|
||||||
|
use tokio::sync::RwLock;
|
||||||
|
|
||||||
|
use crate::{ClientState, State, util, WsStream};
|
||||||
|
use crate::types::protocol::{AllowInvitesRequest, AllowInvitesResponse};
|
||||||
|
|
||||||
|
pub async fn allow_invites(_state: Arc<RwLock<State>>, client_state: Arc<RwLock<ClientState>>, conn: &mut WsStream, number: u32, req: AllowInvitesRequest) -> anyhow::Result<()> {
|
||||||
|
client_state.write().await.allow_invites = req.allowed;
|
||||||
|
util::send(conn, number, AllowInvitesResponse {
|
||||||
|
allowed: req.allowed,
|
||||||
|
}).await
|
||||||
|
}
|
|
@ -69,6 +69,7 @@ pub async fn authenticate(state: Arc<RwLock<State>>, client_state: Arc<RwLock<Cl
|
||||||
});
|
});
|
||||||
|
|
||||||
c_state.pk = req.pk.into_inner();
|
c_state.pk = req.pk.into_inner();
|
||||||
|
c_state.allow_invites = req.allow_invites;
|
||||||
|
|
||||||
// release lock asap
|
// release lock asap
|
||||||
drop(c_state);
|
drop(c_state);
|
||||||
|
|
|
@ -23,12 +23,19 @@ pub async fn invite(state: Arc<RwLock<State>>, client_state: Arc<RwLock<ClientSt
|
||||||
return crate::util::send(conn, number, ErrorResponse::new(req.channel, "not enough permissions to invite")).await;
|
return crate::util::send(conn, number, ErrorResponse::new(req.channel, "not enough permissions to invite")).await;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const NOT_ONLINE: &str = "user not online";
|
||||||
let target_id = match state.read().await.ids.get(&(req.name.clone(), req.world)) {
|
let target_id = match state.read().await.ids.get(&(req.name.clone(), req.world)) {
|
||||||
Some(id) => *id,
|
Some(id) => *id,
|
||||||
None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, "user not online")).await,
|
None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, NOT_ONLINE)).await,
|
||||||
};
|
};
|
||||||
let target_id_i = target_id as i64;
|
let target_id_i = target_id as i64;
|
||||||
|
|
||||||
|
if let Some(client) = state.read().await.clients.get(&target_id) {
|
||||||
|
if !client.read().await.allow_invites {
|
||||||
|
return crate::util::send(conn, number, ErrorResponse::new(req.channel, NOT_ONLINE)).await;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if target_id_i == lodestone_id {
|
if target_id_i == lodestone_id {
|
||||||
return crate::util::send(conn, number, ErrorResponse::new(req.channel, "cannot invite self")).await;
|
return crate::util::send(conn, number, ErrorResponse::new(req.channel, "cannot invite self")).await;
|
||||||
}
|
}
|
||||||
|
@ -110,7 +117,7 @@ pub async fn invite(state: Arc<RwLock<State>>, client_state: Arc<RwLock<ClientSt
|
||||||
}),
|
}),
|
||||||
}).await?;
|
}).await?;
|
||||||
}
|
}
|
||||||
None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, "user not online")).await,
|
None => return crate::util::send(conn, number, ErrorResponse::new(req.channel, NOT_ONLINE)).await,
|
||||||
}
|
}
|
||||||
|
|
||||||
crate::util::send(conn, number, InviteResponse {
|
crate::util::send(conn, number, InviteResponse {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
pub use self::{
|
pub use self::{
|
||||||
|
allow_invites::*,
|
||||||
authenticate::*,
|
authenticate::*,
|
||||||
create::*,
|
create::*,
|
||||||
disband::*,
|
disband::*,
|
||||||
|
@ -18,6 +19,7 @@ pub use self::{
|
||||||
version::*,
|
version::*,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
pub mod allow_invites;
|
||||||
pub mod authenticate;
|
pub mod authenticate;
|
||||||
pub mod create;
|
pub mod create;
|
||||||
pub mod disband;
|
pub mod disband;
|
||||||
|
|
|
@ -10,25 +10,20 @@ use crate::util::redacted::Redacted;
|
||||||
pub async fn public_key(state: Arc<RwLock<State>>, conn: &mut WsStream, number: u32, req: PublicKeyRequest) -> Result<()> {
|
pub async fn public_key(state: Arc<RwLock<State>>, conn: &mut WsStream, number: u32, req: PublicKeyRequest) -> Result<()> {
|
||||||
let id = match state.read().await.ids.get(&(req.name.clone(), req.world)) {
|
let id = match state.read().await.ids.get(&(req.name.clone(), req.world)) {
|
||||||
Some(id) => *id,
|
Some(id) => *id,
|
||||||
None => {
|
None => return crate::util::send(conn, number, PublicKeyResponse {
|
||||||
crate::util::send(conn, number, PublicKeyResponse {
|
name: req.name,
|
||||||
name: req.name,
|
world: req.world,
|
||||||
world: req.world,
|
pk: None,
|
||||||
pk: None,
|
}).await,
|
||||||
}).await?;
|
|
||||||
return Ok(());
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
|
|
||||||
let pk = match state.read().await.clients.get(&id) {
|
let pk = match state.read().await.clients.get(&id) {
|
||||||
Some(client) => Some(client.read().await.pk.clone()),
|
Some(client) if client.read().await.allow_invites => Some(client.read().await.pk.clone()),
|
||||||
None => None,
|
_ => None,
|
||||||
};
|
};
|
||||||
crate::util::send(conn, number, PublicKeyResponse {
|
crate::util::send(conn, number, PublicKeyResponse {
|
||||||
name: req.name,
|
name: req.name,
|
||||||
world: req.world,
|
world: req.world,
|
||||||
pk: pk.map(Redacted),
|
pk: pk.map(Redacted),
|
||||||
}).await?;
|
}).await
|
||||||
|
|
||||||
Ok(())
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -257,6 +257,7 @@ pub struct ClientState {
|
||||||
user: Option<User>,
|
user: Option<User>,
|
||||||
tx: Sender<ResponseContainer>,
|
tx: Sender<ResponseContainer>,
|
||||||
pk: Vec<u8>,
|
pk: Vec<u8>,
|
||||||
|
allow_invites: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl ClientState {
|
impl ClientState {
|
||||||
|
@ -344,6 +345,7 @@ async fn client_loop(state: Arc<RwLock<State>>, mut conn: WsStream) -> Result<()
|
||||||
user: None,
|
user: None,
|
||||||
tx,
|
tx,
|
||||||
pk: Default::default(),
|
pk: Default::default(),
|
||||||
|
allow_invites: false,
|
||||||
}));
|
}));
|
||||||
|
|
||||||
loop {
|
loop {
|
||||||
|
@ -422,6 +424,9 @@ async fn client_loop(state: Arc<RwLock<State>>, mut conn: WsStream) -> Result<()
|
||||||
RequestKind::SendSecrets(req) if logged_in => {
|
RequestKind::SendSecrets(req) if logged_in => {
|
||||||
crate::handlers::send_secrets(Arc::clone(&state), Arc::clone(&client_state), &mut conn, msg.number, req).await?;
|
crate::handlers::send_secrets(Arc::clone(&state), Arc::clone(&client_state), &mut conn, msg.number, req).await?;
|
||||||
}
|
}
|
||||||
|
RequestKind::AllowInvites(req) if logged_in => {
|
||||||
|
crate::handlers::allow_invites(Arc::clone(&state), Arc::clone(&client_state), &mut conn, msg.number, req).await?;
|
||||||
|
}
|
||||||
_ if !logged_in => {
|
_ if !logged_in => {
|
||||||
util::send(&mut conn, msg.number, ErrorResponse::new(None, "not logged in")).await?;
|
util::send(&mut conn, msg.number, ErrorResponse::new(None, "not logged in")).await?;
|
||||||
}
|
}
|
||||||
|
@ -446,10 +451,14 @@ async fn client_loop(state: Arc<RwLock<State>>, mut conn: WsStream) -> Result<()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
debug!("ending client thread");
|
||||||
|
|
||||||
if let Some(user) = &client_state.read().await.user {
|
if let Some(user) = &client_state.read().await.user {
|
||||||
state.write().await.clients.remove(&user.lodestone_id);
|
state.write().await.clients.remove(&user.lodestone_id);
|
||||||
state.write().await.ids.remove(&(user.name.clone(), util::id_from_world(user.world)));
|
state.write().await.ids.remove(&(user.name.clone(), util::id_from_world(user.world)));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
debug!("client thread ended");
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
pub struct AllowInvitesRequest {
|
||||||
|
pub allowed: bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
pub struct AllowInvitesResponse {
|
||||||
|
pub allowed: bool,
|
||||||
|
}
|
|
@ -1,4 +1,5 @@
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
use crate::util::redacted::Redacted;
|
use crate::util::redacted::Redacted;
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
@ -6,6 +7,8 @@ pub struct AuthenticateRequest {
|
||||||
pub key: Redacted<String>,
|
pub key: Redacted<String>,
|
||||||
#[serde(with = "serde_bytes")]
|
#[serde(with = "serde_bytes")]
|
||||||
pub pk: Redacted<Vec<u8>>,
|
pub pk: Redacted<Vec<u8>>,
|
||||||
|
#[serde(default = "default_true")]
|
||||||
|
pub allow_invites: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
@ -26,3 +29,7 @@ impl AuthenticateResponse {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn default_true() -> bool {
|
||||||
|
true
|
||||||
|
}
|
||||||
|
|
|
@ -28,6 +28,7 @@ pub enum RequestKind {
|
||||||
PublicKey(PublicKeyRequest),
|
PublicKey(PublicKeyRequest),
|
||||||
Secrets(SecretsRequest),
|
Secrets(SecretsRequest),
|
||||||
SendSecrets(SendSecretsRequest),
|
SendSecrets(SendSecretsRequest),
|
||||||
|
AllowInvites(AllowInvitesRequest),
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
@ -61,6 +62,7 @@ pub enum ResponseKind {
|
||||||
Secrets(SecretsResponse),
|
Secrets(SecretsResponse),
|
||||||
SendSecrets(SendSecretsResponse),
|
SendSecrets(SendSecretsResponse),
|
||||||
Announce(AnnounceResponse),
|
Announce(AnnounceResponse),
|
||||||
|
AllowInvites(AllowInvitesResponse),
|
||||||
}
|
}
|
||||||
|
|
||||||
macro_rules! request_container {
|
macro_rules! request_container {
|
||||||
|
@ -90,6 +92,7 @@ request_container!(Update, UpdateRequest);
|
||||||
request_container!(PublicKey, PublicKeyRequest);
|
request_container!(PublicKey, PublicKeyRequest);
|
||||||
request_container!(Secrets, SecretsRequest);
|
request_container!(Secrets, SecretsRequest);
|
||||||
request_container!(SendSecrets, SendSecretsRequest);
|
request_container!(SendSecrets, SendSecretsRequest);
|
||||||
|
request_container!(AllowInvites, AllowInvitesRequest);
|
||||||
|
|
||||||
macro_rules! response_container {
|
macro_rules! response_container {
|
||||||
($name:ident, $response:ty) => {
|
($name:ident, $response:ty) => {
|
||||||
|
@ -123,3 +126,4 @@ response_container!(MemberChange, MemberChangeResponse);
|
||||||
response_container!(Secrets, SecretsResponse);
|
response_container!(Secrets, SecretsResponse);
|
||||||
response_container!(SendSecrets, SendSecretsResponse);
|
response_container!(SendSecrets, SendSecretsResponse);
|
||||||
response_container!(Announce, AnnounceResponse);
|
response_container!(Announce, AnnounceResponse);
|
||||||
|
response_container!(AllowInvites, AllowInvitesResponse);
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
pub mod allow_invites;
|
||||||
pub mod announce;
|
pub mod announce;
|
||||||
pub mod authenticate;
|
pub mod authenticate;
|
||||||
pub mod container;
|
pub mod container;
|
||||||
|
@ -22,6 +23,7 @@ pub mod version;
|
||||||
pub mod channel;
|
pub mod channel;
|
||||||
|
|
||||||
pub use self::{
|
pub use self::{
|
||||||
|
allow_invites::*,
|
||||||
announce::*,
|
announce::*,
|
||||||
authenticate::*,
|
authenticate::*,
|
||||||
container::*,
|
container::*,
|
||||||
|
|
Loading…
Reference in New Issue