2020-09-02 18:13:15 +02:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2020-09-02 14:47:31 +02:00
|
|
|
package perform
|
2020-05-04 19:34:09 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-02-18 16:05:03 +01:00
|
|
|
"encoding/json"
|
2020-05-04 19:34:09 +02:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
2023-04-14 17:03:07 +02:00
|
|
|
"time"
|
2020-05-04 19:34:09 +02:00
|
|
|
|
2023-04-14 17:03:07 +02:00
|
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
2022-02-18 16:05:03 +01:00
|
|
|
"github.com/matrix-org/gomatrix"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-19 16:50:33 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2022-02-18 16:05:03 +01:00
|
|
|
"github.com/matrix-org/util"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
|
2021-11-24 11:45:23 +01:00
|
|
|
fsAPI "github.com/matrix-org/dendrite/federationapi/api"
|
2020-05-04 19:34:09 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
2023-04-14 17:03:07 +02:00
|
|
|
rsAPI "github.com/matrix-org/dendrite/roomserver/api"
|
2020-09-02 14:47:31 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/helpers"
|
2020-09-02 18:13:15 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/input"
|
2020-09-02 14:47:31 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/storage"
|
2020-12-02 18:41:00 +01:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2022-02-18 16:05:03 +01:00
|
|
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
2020-05-04 19:34:09 +02:00
|
|
|
)
|
|
|
|
|
2020-09-02 14:47:31 +02:00
|
|
|
type Leaver struct {
|
2022-02-18 16:05:03 +01:00
|
|
|
Cfg *config.RoomServer
|
|
|
|
DB storage.Database
|
2022-05-05 20:30:38 +02:00
|
|
|
FSAPI fsAPI.RoomserverFederationAPI
|
2023-04-14 17:03:07 +02:00
|
|
|
RSAPI rsAPI.RoomserverInternalAPI
|
2022-05-06 13:39:26 +02:00
|
|
|
UserAPI userapi.RoomserverUserAPI
|
2020-09-02 18:13:15 +02:00
|
|
|
Inputer *input.Inputer
|
2020-09-02 14:47:31 +02:00
|
|
|
}
|
|
|
|
|
2020-05-04 19:34:09 +02:00
|
|
|
// WriteOutputEvents implements OutputRoomEventWriter
|
2020-09-02 14:47:31 +02:00
|
|
|
func (r *Leaver) PerformLeave(
|
2020-05-04 19:34:09 +02:00
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformLeaveRequest,
|
|
|
|
res *api.PerformLeaveResponse,
|
2020-09-02 14:47:31 +02:00
|
|
|
) ([]api.OutputEvent, error) {
|
2020-05-04 19:34:09 +02:00
|
|
|
_, domain, err := gomatrixserverlib.SplitID('@', req.UserID)
|
|
|
|
if err != nil {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("supplied user ID %q in incorrect format", req.UserID)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
2022-10-26 13:59:19 +02:00
|
|
|
if !r.Cfg.Matrix.IsLocalServerName(domain) {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("user %q does not belong to this homeserver", req.UserID)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
2022-01-31 17:01:54 +01:00
|
|
|
logger := logrus.WithContext(ctx).WithFields(logrus.Fields{
|
|
|
|
"room_id": req.RoomID,
|
|
|
|
"user_id": req.UserID,
|
|
|
|
})
|
|
|
|
logger.Info("User requested to leave join")
|
2020-05-04 19:34:09 +02:00
|
|
|
if strings.HasPrefix(req.RoomID, "!") {
|
2022-01-31 15:36:59 +01:00
|
|
|
output, err := r.performLeaveRoomByID(context.Background(), req, res)
|
2022-01-31 11:48:28 +01:00
|
|
|
if err != nil {
|
2022-01-31 17:01:54 +01:00
|
|
|
logger.WithError(err).Error("Failed to leave room")
|
|
|
|
} else {
|
|
|
|
logger.Info("User left room successfully")
|
2022-01-31 11:48:28 +01:00
|
|
|
}
|
|
|
|
return output, err
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("room ID %q is invalid", req.RoomID)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
2020-09-02 14:47:31 +02:00
|
|
|
func (r *Leaver) performLeaveRoomByID(
|
2020-05-04 19:34:09 +02:00
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformLeaveRequest,
|
|
|
|
res *api.PerformLeaveResponse, // nolint:unparam
|
2020-09-02 14:47:31 +02:00
|
|
|
) ([]api.OutputEvent, error) {
|
2020-05-04 19:34:09 +02:00
|
|
|
// If there's an invite outstanding for the room then respond to
|
|
|
|
// that.
|
2022-10-07 16:00:12 +02:00
|
|
|
isInvitePending, senderUser, eventID, _, err := helpers.IsInvitePending(ctx, r.DB, req.RoomID, req.UserID)
|
2020-05-04 19:34:09 +02:00
|
|
|
if err == nil && isInvitePending {
|
2022-09-26 18:35:35 +02:00
|
|
|
_, senderDomain, serr := gomatrixserverlib.SplitID('@', senderUser)
|
|
|
|
if serr != nil {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("sender %q is invalid", senderUser)
|
2021-07-08 15:54:03 +02:00
|
|
|
}
|
2022-10-26 13:59:19 +02:00
|
|
|
if !r.Cfg.Matrix.IsLocalServerName(senderDomain) {
|
2021-07-08 15:54:03 +02:00
|
|
|
return r.performFederatedRejectInvite(ctx, req, res, senderUser, eventID)
|
|
|
|
}
|
2022-02-18 16:05:03 +01:00
|
|
|
// check that this is not a "server notice room"
|
|
|
|
accData := &userapi.QueryAccountDataResponse{}
|
2022-03-17 18:05:21 +01:00
|
|
|
if err = r.UserAPI.QueryAccountData(ctx, &userapi.QueryAccountDataRequest{
|
2022-02-18 16:05:03 +01:00
|
|
|
UserID: req.UserID,
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
DataType: "m.tag",
|
|
|
|
}, accData); err != nil {
|
2022-03-17 18:05:21 +01:00
|
|
|
return nil, fmt.Errorf("unable to query account data: %w", err)
|
2022-02-18 16:05:03 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if roomData, ok := accData.RoomAccountData[req.RoomID]; ok {
|
|
|
|
tagData, ok := roomData["m.tag"]
|
|
|
|
if ok {
|
|
|
|
tags := gomatrix.TagContent{}
|
|
|
|
if err = json.Unmarshal(tagData, &tags); err != nil {
|
|
|
|
return nil, fmt.Errorf("unable to unmarshal tag content")
|
|
|
|
}
|
|
|
|
if _, ok = tags.Tags["m.server_notice"]; ok {
|
|
|
|
// mimic the returned values from Synapse
|
|
|
|
res.Message = "You cannot reject this invite"
|
|
|
|
res.Code = 403
|
2023-05-10 00:46:49 +02:00
|
|
|
return nil, spec.LeaveServerNoticeError()
|
2022-02-18 16:05:03 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// There's no invite pending, so first of all we want to find out
|
|
|
|
// if the room exists and if the user is actually in it.
|
|
|
|
latestReq := api.QueryLatestEventsAndStateRequest{
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
StateToFetch: []gomatrixserverlib.StateKeyTuple{
|
|
|
|
{
|
2023-04-19 16:50:33 +02:00
|
|
|
EventType: spec.MRoomMember,
|
2020-05-04 19:34:09 +02:00
|
|
|
StateKey: req.UserID,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
latestRes := api.QueryLatestEventsAndStateResponse{}
|
2020-09-02 18:13:15 +02:00
|
|
|
if err = helpers.QueryLatestEventsAndState(ctx, r.DB, &latestReq, &latestRes); err != nil {
|
2020-09-02 14:47:31 +02:00
|
|
|
return nil, err
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
if !latestRes.RoomExists {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("room %q does not exist", req.RoomID)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now let's see if the user is in the room.
|
|
|
|
if len(latestRes.StateEvents) == 0 {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("user %q is not a member of room %q", req.UserID, req.RoomID)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
membership, err := latestRes.StateEvents[0].Membership()
|
|
|
|
if err != nil {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("error getting membership: %w", err)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
2023-04-19 16:50:33 +02:00
|
|
|
if membership != spec.Join && membership != spec.Invite {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("user %q is not joined to the room (membership is %q)", req.UserID, membership)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare the template for the leave event.
|
|
|
|
userID := req.UserID
|
2023-05-04 12:17:42 +02:00
|
|
|
proto := gomatrixserverlib.ProtoEvent{
|
2023-04-19 16:50:33 +02:00
|
|
|
Type: spec.MRoomMember,
|
2020-05-04 19:34:09 +02:00
|
|
|
Sender: userID,
|
|
|
|
StateKey: &userID,
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
Redacts: "",
|
|
|
|
}
|
2023-05-04 12:17:42 +02:00
|
|
|
if err = proto.SetContent(map[string]interface{}{"membership": "leave"}); err != nil {
|
2020-09-02 14:47:31 +02:00
|
|
|
return nil, fmt.Errorf("eb.SetContent: %w", err)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
2023-05-04 12:17:42 +02:00
|
|
|
if err = proto.SetUnsigned(struct{}{}); err != nil {
|
2020-09-02 14:47:31 +02:00
|
|
|
return nil, fmt.Errorf("eb.SetUnsigned: %w", err)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
2022-11-15 16:05:23 +01:00
|
|
|
// Get the sender domain.
|
2023-05-04 12:17:42 +02:00
|
|
|
_, senderDomain, serr := r.Cfg.Matrix.SplitLocalID('@', proto.Sender)
|
2022-11-15 16:05:23 +01:00
|
|
|
if serr != nil {
|
2023-05-04 12:17:42 +02:00
|
|
|
return nil, fmt.Errorf("sender %q is invalid", proto.Sender)
|
2022-11-15 16:05:23 +01:00
|
|
|
}
|
|
|
|
|
2020-05-04 19:34:09 +02:00
|
|
|
// We know that the user is in the room at this point so let's build
|
|
|
|
// a leave event.
|
|
|
|
// TODO: Check what happens if the room exists on the server
|
|
|
|
// but everyone has since left. I suspect it does the wrong thing.
|
2023-04-14 17:03:07 +02:00
|
|
|
|
|
|
|
var buildRes rsAPI.QueryLatestEventsAndStateResponse
|
|
|
|
identity, err := r.Cfg.Matrix.SigningIdentityFor(senderDomain)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("SigningIdentityFor: %w", err)
|
|
|
|
}
|
2023-05-04 12:17:42 +02:00
|
|
|
event, err := eventutil.QueryAndBuildEvent(ctx, &proto, r.Cfg.Matrix, identity, time.Now(), r.RSAPI, &buildRes)
|
2020-05-04 19:34:09 +02:00
|
|
|
if err != nil {
|
2023-04-14 17:03:07 +02:00
|
|
|
return nil, fmt.Errorf("eventutil.QueryAndBuildEvent: %w", err)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Give our leave event to the roomserver input stream. The
|
|
|
|
// roomserver will process the membership change and notify
|
|
|
|
// downstream automatically.
|
|
|
|
inputReq := api.InputRoomEventsRequest{
|
|
|
|
InputRoomEvents: []api.InputRoomEvent{
|
|
|
|
{
|
|
|
|
Kind: api.KindNew,
|
2023-04-27 13:54:20 +02:00
|
|
|
Event: event,
|
2022-09-26 18:35:35 +02:00
|
|
|
Origin: senderDomain,
|
2022-10-26 13:59:19 +02:00
|
|
|
SendAsServer: string(senderDomain),
|
2020-05-04 19:34:09 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
inputRes := api.InputRoomEventsResponse{}
|
2023-05-10 00:46:49 +02:00
|
|
|
r.Inputer.InputRoomEvents(ctx, &inputReq, &inputRes)
|
2020-09-16 14:00:52 +02:00
|
|
|
if err = inputRes.Err(); err != nil {
|
2020-09-02 14:47:31 +02:00
|
|
|
return nil, fmt.Errorf("r.InputRoomEvents: %w", err)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
2020-09-02 14:47:31 +02:00
|
|
|
return nil, nil
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
2021-07-08 15:54:03 +02:00
|
|
|
func (r *Leaver) performFederatedRejectInvite(
|
2020-05-04 19:34:09 +02:00
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformLeaveRequest,
|
|
|
|
res *api.PerformLeaveResponse, // nolint:unparam
|
2020-06-26 12:07:52 +02:00
|
|
|
senderUser, eventID string,
|
2020-09-02 14:47:31 +02:00
|
|
|
) ([]api.OutputEvent, error) {
|
2020-05-04 19:34:09 +02:00
|
|
|
_, domain, err := gomatrixserverlib.SplitID('@', senderUser)
|
|
|
|
if err != nil {
|
2021-09-08 18:31:03 +02:00
|
|
|
return nil, fmt.Errorf("user ID %q invalid: %w", senderUser, err)
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ask the federation sender to perform a federated leave for us.
|
|
|
|
leaveReq := fsAPI.PerformLeaveRequest{
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
UserID: req.UserID,
|
2023-04-19 16:50:33 +02:00
|
|
|
ServerNames: []spec.ServerName{domain},
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
leaveRes := fsAPI.PerformLeaveResponse{}
|
2022-03-24 22:13:19 +01:00
|
|
|
if err = r.FSAPI.PerformLeave(ctx, &leaveReq, &leaveRes); err != nil {
|
2021-07-14 11:39:17 +02:00
|
|
|
// failures in PerformLeave should NEVER stop us from telling other components like the
|
|
|
|
// sync API that the invite was withdrawn. Otherwise we can end up with stuck invites.
|
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to PerformLeave, still retiring invite event")
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|
|
|
|
|
2022-03-24 22:13:19 +01:00
|
|
|
info, err := r.DB.RoomInfo(ctx, req.RoomID)
|
|
|
|
if err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to get RoomInfo, still retiring invite event")
|
|
|
|
}
|
|
|
|
|
|
|
|
updater, err := r.DB.MembershipUpdater(ctx, req.RoomID, req.UserID, true, info.RoomVersion)
|
|
|
|
if err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to get MembershipUpdater, still retiring invite event")
|
|
|
|
}
|
|
|
|
if updater != nil {
|
2022-07-22 15:44:04 +02:00
|
|
|
if err = updater.Delete(); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to delete membership, still retiring invite event")
|
2022-03-24 22:13:19 +01:00
|
|
|
if err = updater.Rollback(); err != nil {
|
2022-07-22 15:44:04 +02:00
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to rollback deleting membership, still retiring invite event")
|
2022-03-24 22:13:19 +01:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if err = updater.Commit(); err != nil {
|
2022-07-22 15:44:04 +02:00
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to commit deleting membership, still retiring invite event")
|
2022-03-24 22:13:19 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-26 12:07:52 +02:00
|
|
|
// Withdraw the invite, so that the sync API etc are
|
2020-05-04 19:34:09 +02:00
|
|
|
// notified that we rejected it.
|
2020-09-02 14:47:31 +02:00
|
|
|
return []api.OutputEvent{
|
2020-06-26 12:07:52 +02:00
|
|
|
{
|
|
|
|
Type: api.OutputTypeRetireInviteEvent,
|
|
|
|
RetireInviteEvent: &api.OutputRetireInviteEvent{
|
|
|
|
EventID: eventID,
|
|
|
|
Membership: "leave",
|
|
|
|
TargetUserID: req.UserID,
|
|
|
|
},
|
|
|
|
},
|
2020-09-02 14:47:31 +02:00
|
|
|
}, nil
|
2020-05-04 19:34:09 +02:00
|
|
|
}
|