@@ -335,7 +335,7 @@ async def on_send_membership_event(
335335 event .internal_metadata .send_on_behalf_of = origin
336336
337337 context = await self ._state_handler .compute_event_context (event )
338- context = await self ._check_event_auth (origin , event , context )
338+ await self ._check_event_auth (origin , event , context )
339339 if context .rejected :
340340 raise SynapseError (
341341 403 , f"{ event .membership } event was rejected" , Codes .FORBIDDEN
@@ -471,7 +471,7 @@ async def process_remote_join(
471471 partial_state = partial_state ,
472472 )
473473
474- context = await self ._check_event_auth (origin , event , context )
474+ await self ._check_event_auth (origin , event , context )
475475 if context .rejected :
476476 raise SynapseError (400 , "Join event was rejected" )
477477
@@ -1098,11 +1098,7 @@ async def _process_received_pdu(
10981098 event ,
10991099 state_ids_before_event = state_ids ,
11001100 )
1101- context = await self ._check_event_auth (
1102- origin ,
1103- event ,
1104- context ,
1105- )
1101+ await self ._check_event_auth (origin , event , context )
11061102 except AuthError as e :
11071103 # FIXME richvdh 2021/10/07 I don't think this is reachable. Let's log it
11081104 # for now
@@ -1478,11 +1474,8 @@ async def prep(event: EventBase) -> None:
14781474 )
14791475
14801476 async def _check_event_auth (
1481- self ,
1482- origin : str ,
1483- event : EventBase ,
1484- context : EventContext ,
1485- ) -> EventContext :
1477+ self , origin : str , event : EventBase , context : EventContext
1478+ ) -> None :
14861479 """
14871480 Checks whether an event should be rejected (for failing auth checks).
14881481
@@ -1492,9 +1485,6 @@ async def _check_event_auth(
14921485 context:
14931486 The event context.
14941487
1495- Returns:
1496- The updated context object.
1497-
14981488 Raises:
14991489 AuthError if we were unable to find copies of the event's auth events.
15001490 (Most other failures just cause us to set `context.rejected`.)
@@ -1509,7 +1499,7 @@ async def _check_event_auth(
15091499 logger .warning ("While validating received event %r: %s" , event , e )
15101500 # TODO: use a different rejected reason here?
15111501 context .rejected = RejectedReason .AUTH_ERROR
1512- return context
1502+ return
15131503
15141504 # next, check that we have all of the event's auth events.
15151505 #
@@ -1532,7 +1522,7 @@ async def _check_event_auth(
15321522 "While checking auth of %r against auth_events: %s" , event , e
15331523 )
15341524 context .rejected = RejectedReason .AUTH_ERROR
1535- return context
1525+ return
15361526
15371527 # now check the auth rules pass against the room state before the event
15381528 # https://spec.matrix.org/v1.3/server-server-api/#checks-performed-on-receipt-of-a-pdu:
@@ -1551,7 +1541,7 @@ async def _check_event_auth(
15511541 if collections .Counter (event .auth_event_ids ()) == collections .Counter (
15521542 calculated_auth_event_ids
15531543 ):
1554- return context
1544+ return
15551545
15561546 # otherwise, re-run the auth checks based on what we calculated.
15571547 calculated_auth_events = await self ._store .get_events_as_list (
@@ -1591,8 +1581,6 @@ async def _check_event_auth(
15911581 )
15921582 context .rejected = RejectedReason .AUTH_ERROR
15931583
1594- return context
1595-
15961584 async def _maybe_kick_guest_users (self , event : EventBase ) -> None :
15971585 if event .type != EventTypes .GuestAccess :
15981586 return
0 commit comments