2024-07-16 08:05:25 +00:00
|
|
|
use axum::extract::State;
|
2025-04-05 20:09:22 -04:00
|
|
|
use conduwuit::{
|
|
|
|
Result,
|
|
|
|
utils::{future::BoolExt, stream::BroadbandExt},
|
|
|
|
};
|
|
|
|
use futures::{FutureExt, StreamExt, pin_mut};
|
2022-06-18 11:17:09 +00:00
|
|
|
use ruma::{
|
2025-04-05 20:09:22 -04:00
|
|
|
api::client::user_directory::search_users::{self},
|
|
|
|
events::room::join_rules::JoinRule,
|
2022-06-18 11:17:09 +00:00
|
|
|
};
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2025-04-04 03:30:13 +00:00
|
|
|
use crate::Ruma;
|
2024-03-05 19:48:54 -05:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
// conduwuit can handle a lot more results than synapse
|
|
|
|
const LIMIT_MAX: usize = 500;
|
|
|
|
const LIMIT_DEFAULT: usize = 10;
|
|
|
|
|
2021-08-31 19:14:37 +02:00
|
|
|
/// # `POST /_matrix/client/r0/user_directory/search`
|
|
|
|
///
|
|
|
|
/// Searches all known users for a match.
|
|
|
|
///
|
2024-03-05 19:48:54 -05:00
|
|
|
/// - Hides any local users that aren't in any public rooms (i.e. those that
|
2024-06-16 00:36:49 +00:00
|
|
|
/// have the join rule set to public) and don't share a room with the sender
|
2024-07-16 08:05:25 +00:00
|
|
|
pub(crate) async fn search_users_route(
|
2024-12-15 00:05:47 -05:00
|
|
|
State(services): State<crate::State>,
|
|
|
|
body: Ruma<search_users::v3::Request>,
|
2024-07-16 08:05:25 +00:00
|
|
|
) -> Result<search_users::v3::Response> {
|
2025-04-05 20:09:22 -04:00
|
|
|
let sender_user = body.sender_user();
|
|
|
|
let limit = usize::try_from(body.limit)
|
|
|
|
.map_or(LIMIT_DEFAULT, usize::from)
|
|
|
|
.min(LIMIT_MAX);
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
let mut users = services
|
|
|
|
.users
|
|
|
|
.stream()
|
|
|
|
.map(ToOwned::to_owned)
|
|
|
|
.broad_filter_map(async |user_id| {
|
|
|
|
let user = search_users::v3::User {
|
|
|
|
user_id: user_id.clone(),
|
|
|
|
display_name: services.users.displayname(&user_id).await.ok(),
|
|
|
|
avatar_url: services.users.avatar_url(&user_id).await.ok(),
|
|
|
|
};
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
let user_id_matches = user
|
|
|
|
.user_id
|
|
|
|
.as_str()
|
|
|
|
.to_lowercase()
|
|
|
|
.contains(&body.search_term.to_lowercase());
|
2021-07-14 12:31:38 +02:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
let user_displayname_matches = user.display_name.as_ref().is_some_and(|name| {
|
2024-03-25 17:05:11 -04:00
|
|
|
name.to_lowercase()
|
|
|
|
.contains(&body.search_term.to_lowercase())
|
2025-04-05 20:09:22 -04:00
|
|
|
});
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
if !user_id_matches && !user_displayname_matches {
|
|
|
|
return None;
|
|
|
|
}
|
2022-06-18 11:17:09 +00:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
let user_in_public_room = services
|
2024-03-25 17:05:11 -04:00
|
|
|
.rooms
|
2024-11-20 20:21:31 +00:00
|
|
|
.state_cache
|
2025-04-05 20:09:22 -04:00
|
|
|
.rooms_joined(&user_id)
|
|
|
|
.map(ToOwned::to_owned)
|
|
|
|
.any(|room| async move {
|
|
|
|
services
|
|
|
|
.rooms
|
|
|
|
.state_accessor
|
|
|
|
.get_join_rules(&room)
|
|
|
|
.map(|rule| matches!(rule, JoinRule::Public))
|
|
|
|
.await
|
|
|
|
});
|
2022-06-18 11:17:09 +00:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
let user_sees_user = services
|
|
|
|
.rooms
|
|
|
|
.state_cache
|
|
|
|
.user_sees_user(sender_user, &user_id);
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
pin_mut!(user_in_public_room, user_sees_user);
|
2024-08-08 17:18:30 +00:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
user_in_public_room.or(user_sees_user).await.then_some(user)
|
|
|
|
});
|
2024-08-08 17:18:30 +00:00
|
|
|
|
2025-04-05 20:09:22 -04:00
|
|
|
let results = users.by_ref().take(limit).collect().await;
|
|
|
|
let limited = users.next().await.is_some();
|
2020-07-30 18:14:47 +02:00
|
|
|
|
2024-12-15 00:05:47 -05:00
|
|
|
Ok(search_users::v3::Response { results, limited })
|
2020-07-30 18:14:47 +02:00
|
|
|
}
|