@@ -718,8 +718,8 @@ async def on_make_join_request(
718
718
state_ids ,
719
719
)
720
720
721
- builder = self .event_builder_factory .new (
722
- room_version . identifier ,
721
+ builder = self .event_builder_factory .for_room_version (
722
+ room_version ,
723
723
{
724
724
"type" : EventTypes .Member ,
725
725
"content" : event_content ,
@@ -897,9 +897,9 @@ async def on_make_leave_request(
897
897
)
898
898
raise SynapseError (403 , "User not from origin" , Codes .FORBIDDEN )
899
899
900
- room_version = await self .store .get_room_version_id (room_id )
901
- builder = self .event_builder_factory .new (
902
- room_version ,
900
+ room_version_obj = await self .store .get_room_version (room_id )
901
+ builder = self .event_builder_factory .for_room_version (
902
+ room_version_obj ,
903
903
{
904
904
"type" : EventTypes .Member ,
905
905
"content" : {"membership" : Membership .LEAVE },
@@ -917,7 +917,7 @@ async def on_make_leave_request(
917
917
# The remote hasn't signed it yet, obviously. We'll do the full checks
918
918
# when we get the event back in `on_send_leave_request`
919
919
await self ._event_auth_handler .check_from_context (
920
- room_version , event , context , do_sig_check = False
920
+ room_version_obj . identifier , event , context , do_sig_check = False
921
921
)
922
922
except AuthError as e :
923
923
logger .warning ("Failed to create new leave %r because %s" , event , e )
@@ -949,10 +949,10 @@ async def on_make_knock_request(
949
949
)
950
950
raise SynapseError (403 , "User not from origin" , Codes .FORBIDDEN )
951
951
952
- room_version = await self .store .get_room_version_id (room_id )
952
+ room_version_obj = await self .store .get_room_version (room_id )
953
953
954
- builder = self .event_builder_factory .new (
955
- room_version ,
954
+ builder = self .event_builder_factory .for_room_version (
955
+ room_version_obj ,
956
956
{
957
957
"type" : EventTypes .Member ,
958
958
"content" : {"membership" : Membership .KNOCK },
@@ -979,7 +979,7 @@ async def on_make_knock_request(
979
979
# The remote hasn't signed it yet, obviously. We'll do the full checks
980
980
# when we get the event back in `on_send_knock_request`
981
981
await self ._event_auth_handler .check_from_context (
982
- room_version , event , context , do_sig_check = False
982
+ room_version_obj . identifier , event , context , do_sig_check = False
983
983
)
984
984
except AuthError as e :
985
985
logger .warning ("Failed to create new knock %r because %s" , event , e )
@@ -1245,16 +1245,18 @@ async def exchange_third_party_invite(
1245
1245
}
1246
1246
1247
1247
if await self ._event_auth_handler .check_host_in_room (room_id , self .hs .hostname ):
1248
- room_version = await self .store .get_room_version_id (room_id )
1249
- builder = self .event_builder_factory .new (room_version , event_dict )
1248
+ room_version_obj = await self .store .get_room_version (room_id )
1249
+ builder = self .event_builder_factory .for_room_version (
1250
+ room_version_obj , event_dict
1251
+ )
1250
1252
1251
1253
EventValidator ().validate_builder (builder )
1252
1254
event , context = await self .event_creation_handler .create_new_client_event (
1253
1255
builder = builder
1254
1256
)
1255
1257
1256
1258
event , context = await self .add_display_name_to_third_party_invite (
1257
- room_version , event_dict , event , context
1259
+ room_version_obj , event_dict , event , context
1258
1260
)
1259
1261
1260
1262
EventValidator ().validate_new (event , self .config )
@@ -1265,7 +1267,7 @@ async def exchange_third_party_invite(
1265
1267
1266
1268
try :
1267
1269
await self ._event_auth_handler .check_from_context (
1268
- room_version , event , context
1270
+ room_version_obj . identifier , event , context
1269
1271
)
1270
1272
except AuthError as e :
1271
1273
logger .warning ("Denying new third party invite %r because %s" , event , e )
@@ -1299,22 +1301,24 @@ async def on_exchange_third_party_invite_request(
1299
1301
1300
1302
"""
1301
1303
assert_params_in_dict (event_dict , ["room_id" ])
1302
- room_version = await self .store .get_room_version_id (event_dict ["room_id" ])
1304
+ room_version_obj = await self .store .get_room_version (event_dict ["room_id" ])
1303
1305
1304
1306
# NB: event_dict has a particular specced format we might need to fudge
1305
1307
# if we change event formats too much.
1306
- builder = self .event_builder_factory .new (room_version , event_dict )
1308
+ builder = self .event_builder_factory .for_room_version (
1309
+ room_version_obj , event_dict
1310
+ )
1307
1311
1308
1312
event , context = await self .event_creation_handler .create_new_client_event (
1309
1313
builder = builder
1310
1314
)
1311
1315
event , context = await self .add_display_name_to_third_party_invite (
1312
- room_version , event_dict , event , context
1316
+ room_version_obj , event_dict , event , context
1313
1317
)
1314
1318
1315
1319
try :
1316
1320
await self ._event_auth_handler .check_from_context (
1317
- room_version , event , context
1321
+ room_version_obj . identifier , event , context
1318
1322
)
1319
1323
except AuthError as e :
1320
1324
logger .warning ("Denying third party invite %r because %s" , event , e )
@@ -1331,7 +1335,7 @@ async def on_exchange_third_party_invite_request(
1331
1335
1332
1336
async def add_display_name_to_third_party_invite (
1333
1337
self ,
1334
- room_version : str ,
1338
+ room_version_obj : RoomVersion ,
1335
1339
event_dict : JsonDict ,
1336
1340
event : EventBase ,
1337
1341
context : EventContext ,
@@ -1363,7 +1367,9 @@ async def add_display_name_to_third_party_invite(
1363
1367
# auth checks. If we need the invite and don't have it then the
1364
1368
# auth check code will explode appropriately.
1365
1369
1366
- builder = self .event_builder_factory .new (room_version , event_dict )
1370
+ builder = self .event_builder_factory .for_room_version (
1371
+ room_version_obj , event_dict
1372
+ )
1367
1373
EventValidator ().validate_builder (builder )
1368
1374
event , context = await self .event_creation_handler .create_new_client_event (
1369
1375
builder = builder
0 commit comments