@@ -65,7 +65,7 @@ type FederatedStateProvider struct {
6565
6666// StateIDsBeforeEvent implements StateProvider
6767func (p * FederatedStateProvider ) StateIDsBeforeEvent (ctx context.Context , event PDU ) ([]string , error ) {
68- res , err := p .FedClient .LookupStateIDs (ctx , p .Origin , p .Server , event .RoomID (), event .EventID ())
68+ res , err := p .FedClient .LookupStateIDs (ctx , p .Origin , p .Server , event .RoomID (). String () , event .EventID ())
6969 if err != nil {
7070 return nil , err
7171 }
@@ -77,7 +77,7 @@ func (p *FederatedStateProvider) StateIDsBeforeEvent(ctx context.Context, event
7777
7878// StateBeforeEvent implements StateProvider
7979func (p * FederatedStateProvider ) StateBeforeEvent (ctx context.Context , roomVer RoomVersion , event PDU , eventIDs []string ) (map [string ]PDU , error ) {
80- res , err := p .FedClient .LookupState (ctx , p .Origin , p .Server , event .RoomID (), event .EventID (), roomVer )
80+ res , err := p .FedClient .LookupState (ctx , p .Origin , p .Server , event .RoomID (). String () , event .EventID (), roomVer )
8181 if err != nil {
8282 return nil , err
8383 }
@@ -165,7 +165,7 @@ func checkAllowedByAuthEvents(
165165 event PDU , eventsByID map [string ]PDU ,
166166 missingAuth EventProvider , userIDForSender spec.UserIDForSender ,
167167) error {
168- authEvents := NewAuthEvents (nil )
168+ authEvents , _ := NewAuthEvents (nil )
169169
170170 for _ , ae := range event .AuthEventIDs () {
171171 retryEvent:
@@ -214,7 +214,7 @@ func checkAllowedByAuthEvents(
214214
215215 // If we made it this far then we've successfully got as many of the auth events as
216216 // as described by AuthEventIDs(). Check if they allow the event.
217- if err := Allowed (event , & authEvents , userIDForSender ); err != nil {
217+ if err := Allowed (event , authEvents , userIDForSender ); err != nil {
218218 return fmt .Errorf (
219219 "gomatrixserverlib: event with ID %q is not allowed by its auth_events: %s" ,
220220 event .EventID (), err .Error (),
@@ -335,7 +335,7 @@ func CheckSendJoinResponse(
335335 }
336336
337337 eventsByID := map [string ]PDU {}
338- authEventProvider := NewAuthEvents (nil )
338+ authEventProvider , _ := NewAuthEvents (nil )
339339
340340 // Since checkAllowedByAuthEvents needs to be able to look up any of the
341341 // auth events by ID only, we will build a map which contains references
@@ -369,7 +369,7 @@ func CheckSendJoinResponse(
369369 }
370370
371371 // Now check that the join event is valid against the supplied state.
372- if err := Allowed (joinEvent , & authEventProvider , userIDForSender ); err != nil {
372+ if err := Allowed (joinEvent , authEventProvider , userIDForSender ); err != nil {
373373 return nil , fmt .Errorf (
374374 "gomatrixserverlib: event with ID %q is not allowed by the current room state: %w" ,
375375 joinEvent .EventID (), err ,
0 commit comments