@@ -335,7 +335,7 @@ async def on_send_membership_event(
335
335
event .internal_metadata .send_on_behalf_of = origin
336
336
337
337
context = await self ._state_handler .compute_event_context (event )
338
- context = await self ._check_event_auth (origin , event , context )
338
+ await self ._check_event_auth (origin , event , context )
339
339
if context .rejected :
340
340
raise SynapseError (
341
341
403 , f"{ event .membership } event was rejected" , Codes .FORBIDDEN
@@ -471,7 +471,7 @@ async def process_remote_join(
471
471
partial_state = partial_state ,
472
472
)
473
473
474
- context = await self ._check_event_auth (origin , event , context )
474
+ await self ._check_event_auth (origin , event , context )
475
475
if context .rejected :
476
476
raise SynapseError (400 , "Join event was rejected" )
477
477
@@ -1098,11 +1098,7 @@ async def _process_received_pdu(
1098
1098
event ,
1099
1099
state_ids_before_event = state_ids ,
1100
1100
)
1101
- context = await self ._check_event_auth (
1102
- origin ,
1103
- event ,
1104
- context ,
1105
- )
1101
+ await self ._check_event_auth (origin , event , context )
1106
1102
except AuthError as e :
1107
1103
# FIXME richvdh 2021/10/07 I don't think this is reachable. Let's log it
1108
1104
# for now
@@ -1478,11 +1474,8 @@ async def prep(event: EventBase) -> None:
1478
1474
)
1479
1475
1480
1476
async def _check_event_auth (
1481
- self ,
1482
- origin : str ,
1483
- event : EventBase ,
1484
- context : EventContext ,
1485
- ) -> EventContext :
1477
+ self , origin : str , event : EventBase , context : EventContext
1478
+ ) -> None :
1486
1479
"""
1487
1480
Checks whether an event should be rejected (for failing auth checks).
1488
1481
@@ -1492,9 +1485,6 @@ async def _check_event_auth(
1492
1485
context:
1493
1486
The event context.
1494
1487
1495
- Returns:
1496
- The updated context object.
1497
-
1498
1488
Raises:
1499
1489
AuthError if we were unable to find copies of the event's auth events.
1500
1490
(Most other failures just cause us to set `context.rejected`.)
@@ -1509,7 +1499,7 @@ async def _check_event_auth(
1509
1499
logger .warning ("While validating received event %r: %s" , event , e )
1510
1500
# TODO: use a different rejected reason here?
1511
1501
context .rejected = RejectedReason .AUTH_ERROR
1512
- return context
1502
+ return
1513
1503
1514
1504
# next, check that we have all of the event's auth events.
1515
1505
#
@@ -1532,7 +1522,7 @@ async def _check_event_auth(
1532
1522
"While checking auth of %r against auth_events: %s" , event , e
1533
1523
)
1534
1524
context .rejected = RejectedReason .AUTH_ERROR
1535
- return context
1525
+ return
1536
1526
1537
1527
# now check the auth rules pass against the room state before the event
1538
1528
# https://spec.matrix.org/v1.3/server-server-api/#checks-performed-on-receipt-of-a-pdu:
@@ -1551,7 +1541,7 @@ async def _check_event_auth(
1551
1541
if collections .Counter (event .auth_event_ids ()) == collections .Counter (
1552
1542
calculated_auth_event_ids
1553
1543
):
1554
- return context
1544
+ return
1555
1545
1556
1546
# otherwise, re-run the auth checks based on what we calculated.
1557
1547
calculated_auth_events = await self ._store .get_events_as_list (
@@ -1591,8 +1581,6 @@ async def _check_event_auth(
1591
1581
)
1592
1582
context .rejected = RejectedReason .AUTH_ERROR
1593
1583
1594
- return context
1595
-
1596
1584
async def _maybe_kick_guest_users (self , event : EventBase ) -> None :
1597
1585
if event .type != EventTypes .GuestAccess :
1598
1586
return
0 commit comments