2020-09-02 18:13:15 +02:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2020-09-02 14:47:31 +02:00
|
|
|
package perform
|
2020-06-24 16:06:14 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
|
2021-11-24 11:45:23 +01:00
|
|
|
federationAPI "github.com/matrix-org/dendrite/federationapi/api"
|
2020-06-24 16:06:14 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
2020-09-02 14:47:31 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/helpers"
|
2020-09-02 18:13:15 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/input"
|
2020-06-24 16:06:14 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/state"
|
|
|
|
"github.com/matrix-org/dendrite/roomserver/storage"
|
2022-03-17 18:05:21 +01:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/storage/shared"
|
2020-06-24 16:06:14 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/types"
|
2020-12-02 18:41:00 +01:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2020-06-24 16:06:14 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-19 16:50:33 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2022-02-02 14:30:48 +01:00
|
|
|
"github.com/matrix-org/util"
|
2020-06-24 16:06:14 +02:00
|
|
|
)
|
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
type QueryState struct {
|
|
|
|
storage.Database
|
2023-06-14 16:23:46 +02:00
|
|
|
querier api.QuerySenderIDAPI
|
2023-05-31 18:33:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (q *QueryState) GetAuthEvents(ctx context.Context, event gomatrixserverlib.PDU) (gomatrixserverlib.AuthEventProvider, error) {
|
|
|
|
return helpers.GetAuthEvents(ctx, q.Database, event.Version(), event, event.AuthEventIDs())
|
|
|
|
}
|
|
|
|
|
|
|
|
func (q *QueryState) GetState(ctx context.Context, roomID spec.RoomID, stateWanted []gomatrixserverlib.StateKeyTuple) ([]gomatrixserverlib.PDU, error) {
|
|
|
|
info, err := q.Database.RoomInfo(ctx, roomID.String())
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to load RoomInfo: %w", err)
|
|
|
|
}
|
|
|
|
if info != nil {
|
2023-06-14 16:23:46 +02:00
|
|
|
roomState := state.NewStateResolution(q.Database, info, q.querier)
|
2023-05-31 18:33:49 +02:00
|
|
|
stateEntries, err := roomState.LoadStateAtSnapshotForStringTuples(
|
|
|
|
ctx, info.StateSnapshotNID(), stateWanted,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
stateNIDs := []types.EventNID{}
|
|
|
|
for _, stateNID := range stateEntries {
|
|
|
|
stateNIDs = append(stateNIDs, stateNID.EventNID)
|
|
|
|
}
|
|
|
|
stateEvents, err := q.Database.Events(ctx, info.RoomVersion, stateNIDs)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to obtain required events: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
events := []gomatrixserverlib.PDU{}
|
|
|
|
for _, event := range stateEvents {
|
|
|
|
events = append(events, event.PDU)
|
|
|
|
}
|
|
|
|
return events, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2020-09-02 14:47:31 +02:00
|
|
|
type Inviter struct {
|
2020-09-02 18:13:15 +02:00
|
|
|
DB storage.Database
|
|
|
|
Cfg *config.RoomServer
|
2022-05-05 20:30:38 +02:00
|
|
|
FSAPI federationAPI.RoomserverFederationAPI
|
2023-05-31 18:33:49 +02:00
|
|
|
RSAPI api.RoomserverInternalAPI
|
2020-09-02 18:13:15 +02:00
|
|
|
Inputer *input.Inputer
|
2020-09-02 14:47:31 +02:00
|
|
|
}
|
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
func (r *Inviter) IsKnownRoom(ctx context.Context, roomID spec.RoomID) (bool, error) {
|
|
|
|
info, err := r.DB.RoomInfo(ctx, roomID.String())
|
2022-09-26 18:35:35 +02:00
|
|
|
if err != nil {
|
2023-05-31 18:33:49 +02:00
|
|
|
return false, fmt.Errorf("failed to load RoomInfo: %w", err)
|
2022-09-26 18:35:35 +02:00
|
|
|
}
|
2023-05-31 18:33:49 +02:00
|
|
|
return (info != nil && !info.IsStub()), nil
|
|
|
|
}
|
2020-06-24 16:06:14 +02:00
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
func (r *Inviter) StateQuerier() gomatrixserverlib.StateQuerier {
|
|
|
|
return &QueryState{Database: r.DB}
|
|
|
|
}
|
2020-06-24 16:06:14 +02:00
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
func (r *Inviter) ProcessInviteMembership(
|
|
|
|
ctx context.Context, inviteEvent *types.HeaderedEvent,
|
|
|
|
) ([]api.OutputEvent, error) {
|
|
|
|
var outputUpdates []api.OutputEvent
|
|
|
|
var updater *shared.MembershipUpdater
|
2023-06-06 22:55:18 +02:00
|
|
|
|
2023-06-14 16:23:46 +02:00
|
|
|
validRoomID, err := spec.NewRoomID(inviteEvent.RoomID())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
userID, err := r.RSAPI.QueryUserIDForSender(ctx, *validRoomID, spec.SenderID(*inviteEvent.StateKey()))
|
2022-06-29 13:32:24 +02:00
|
|
|
if err != nil {
|
2023-05-31 18:33:49 +02:00
|
|
|
return nil, api.ErrInvalidID{Err: fmt.Errorf("the user ID %s is invalid", *inviteEvent.StateKey())}
|
2022-06-29 13:32:24 +02:00
|
|
|
}
|
2023-06-06 22:55:18 +02:00
|
|
|
isTargetLocal := r.Cfg.Matrix.IsLocalServerName(userID.Domain())
|
2023-05-31 18:33:49 +02:00
|
|
|
if updater, err = r.DB.MembershipUpdater(ctx, inviteEvent.RoomID(), *inviteEvent.StateKey(), isTargetLocal, inviteEvent.Version()); err != nil {
|
|
|
|
return nil, fmt.Errorf("r.DB.MembershipUpdater: %w", err)
|
2022-07-22 15:44:04 +02:00
|
|
|
}
|
2023-05-31 18:33:49 +02:00
|
|
|
outputUpdates, err = helpers.UpdateToInviteMembership(updater, &types.Event{
|
|
|
|
EventNID: 0,
|
|
|
|
PDU: inviteEvent.PDU,
|
|
|
|
}, outputUpdates, inviteEvent.Version())
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("updateToInviteMembership: %w", err)
|
2020-08-17 12:40:49 +02:00
|
|
|
}
|
2023-05-31 18:33:49 +02:00
|
|
|
if err = updater.Commit(); err != nil {
|
|
|
|
return nil, fmt.Errorf("updater.Commit: %w", err)
|
2020-08-17 12:40:49 +02:00
|
|
|
}
|
2023-05-31 18:33:49 +02:00
|
|
|
return outputUpdates, nil
|
|
|
|
}
|
2020-08-17 12:40:49 +02:00
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
// nolint:gocyclo
|
|
|
|
func (r *Inviter) PerformInvite(
|
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformInviteRequest,
|
|
|
|
) error {
|
|
|
|
event := req.Event
|
2022-07-22 15:44:04 +02:00
|
|
|
|
2023-06-14 16:23:46 +02:00
|
|
|
validRoomID, err := spec.NewRoomID(event.RoomID())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
sender, err := r.RSAPI.QueryUserIDForSender(ctx, *validRoomID, event.SenderID())
|
2023-05-31 18:33:49 +02:00
|
|
|
if err != nil {
|
2023-06-06 22:55:18 +02:00
|
|
|
return spec.InvalidParam("The sender user ID is invalid")
|
2023-05-31 18:33:49 +02:00
|
|
|
}
|
|
|
|
if !r.Cfg.Matrix.IsLocalServerName(sender.Domain()) {
|
|
|
|
return api.ErrInvalidID{Err: fmt.Errorf("the invite must be from a local user")}
|
2022-07-22 15:44:04 +02:00
|
|
|
}
|
|
|
|
|
2023-06-12 13:19:25 +02:00
|
|
|
if event.StateKey() == nil || *event.StateKey() == "" {
|
2023-05-31 18:33:49 +02:00
|
|
|
return fmt.Errorf("invite must be a state event")
|
2020-08-17 18:33:19 +02:00
|
|
|
}
|
2023-06-14 16:23:46 +02:00
|
|
|
invitedUser, err := r.RSAPI.QueryUserIDForSender(ctx, *validRoomID, spec.SenderID(*event.StateKey()))
|
2023-06-12 13:19:25 +02:00
|
|
|
if err != nil || invitedUser == nil {
|
|
|
|
return spec.InvalidParam("Could not find the matching senderID for this user")
|
2020-06-24 16:06:14 +02:00
|
|
|
}
|
2023-05-31 18:33:49 +02:00
|
|
|
isTargetLocal := r.Cfg.Matrix.IsLocalServerName(invitedUser.Domain())
|
2020-06-24 16:06:14 +02:00
|
|
|
|
2023-06-14 16:23:46 +02:00
|
|
|
invitedSenderID, err := r.RSAPI.QuerySenderIDForUser(ctx, *validRoomID, *invitedUser)
|
2023-06-07 19:14:35 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed looking up senderID for invited user")
|
|
|
|
}
|
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
input := gomatrixserverlib.PerformInviteInput{
|
|
|
|
RoomID: *validRoomID,
|
|
|
|
InviteEvent: event.PDU,
|
|
|
|
InvitedUser: *invitedUser,
|
2023-06-07 19:14:35 +02:00
|
|
|
InvitedSenderID: invitedSenderID,
|
2023-05-31 18:33:49 +02:00
|
|
|
IsTargetLocal: isTargetLocal,
|
|
|
|
StrippedState: req.InviteRoomState,
|
|
|
|
MembershipQuerier: &api.MembershipQuerier{Roomserver: r.RSAPI},
|
2023-06-14 16:23:46 +02:00
|
|
|
StateQuerier: &QueryState{r.DB, r.RSAPI},
|
|
|
|
UserIDQuerier: func(roomID spec.RoomID, senderID spec.SenderID) (*spec.UserID, error) {
|
|
|
|
return r.RSAPI.QueryUserIDForSender(ctx, roomID, senderID)
|
2023-06-06 22:55:18 +02:00
|
|
|
},
|
2023-05-31 18:33:49 +02:00
|
|
|
}
|
|
|
|
inviteEvent, err := gomatrixserverlib.PerformInvite(ctx, input, r.FSAPI)
|
2022-02-02 14:30:48 +01:00
|
|
|
if err != nil {
|
2023-05-31 18:33:49 +02:00
|
|
|
switch e := err.(type) {
|
|
|
|
case spec.MatrixError:
|
|
|
|
if e.ErrCode == spec.ErrorForbidden {
|
|
|
|
return api.ErrNotAllowed{Err: fmt.Errorf("%s", e.Err)}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err
|
2022-02-02 14:30:48 +01:00
|
|
|
}
|
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
// Use the returned event if there was one (due to federation), otherwise
|
|
|
|
// send the original invite event to the roomserver.
|
|
|
|
if inviteEvent == nil {
|
|
|
|
inviteEvent = event
|
2022-02-02 14:30:48 +01:00
|
|
|
}
|
|
|
|
|
2023-06-13 14:19:31 +02:00
|
|
|
// if we invited a local user, we can also create a user room key, if it doesn't exist yet.
|
|
|
|
if isTargetLocal && event.Version() == gomatrixserverlib.RoomVersionPseudoIDs {
|
|
|
|
_, err = r.RSAPI.GetOrCreateUserRoomPrivateKey(ctx, *invitedUser, *validRoomID)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to get user room private key: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-02 14:30:48 +01:00
|
|
|
// Send the invite event to the roomserver input stream. This will
|
|
|
|
// notify existing users in the room about the invite, update the
|
|
|
|
// membership table and ensure that the event is ready and available
|
|
|
|
// to use as an auth event when accepting the invite.
|
|
|
|
// It will NOT notify the invitee of this invite.
|
|
|
|
inputReq := &api.InputRoomEventsRequest{
|
|
|
|
InputRoomEvents: []api.InputRoomEvent{
|
|
|
|
{
|
|
|
|
Kind: api.KindNew,
|
2023-05-31 18:33:49 +02:00
|
|
|
Event: &types.HeaderedEvent{PDU: inviteEvent},
|
|
|
|
Origin: sender.Domain(),
|
2022-02-02 14:30:48 +01:00
|
|
|
SendAsServer: req.SendAsServer,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
inputRes := &api.InputRoomEventsResponse{}
|
2023-05-10 00:46:49 +02:00
|
|
|
r.Inputer.InputRoomEvents(context.Background(), inputReq, inputRes)
|
2023-05-31 18:33:49 +02:00
|
|
|
if err := inputRes.Err(); err != nil {
|
|
|
|
util.GetLogger(ctx).WithField("event_id", event.EventID()).Error("r.InputRoomEvents failed")
|
|
|
|
return api.ErrNotAllowed{Err: err}
|
2022-02-02 14:30:48 +01:00
|
|
|
}
|
|
|
|
|
2023-05-31 18:33:49 +02:00
|
|
|
return nil
|
2020-06-24 16:06:14 +02:00
|
|
|
}
|