#![allow(deprecated)] use std::{borrow::Borrow, collections::HashMap}; use axum::extract::State; use conduit::{ err, pdu::gen_event_id_canonical_json, utils::stream::{IterStream, TryBroadbandExt}, warn, Err, Result, }; use futures::{FutureExt, StreamExt, TryStreamExt}; use ruma::{ api::federation::membership::create_join_event, events::{ room::member::{MembershipState, RoomMemberEventContent}, StateEventType, }, CanonicalJsonValue, OwnedEventId, OwnedRoomId, OwnedServerName, OwnedUserId, RoomId, ServerName, }; use serde_json::value::{to_raw_value, RawValue as RawJsonValue}; use service::Services; use crate::Ruma; /// helper method for /send_join v1 and v2 async fn create_join_event( services: &Services, origin: &ServerName, room_id: &RoomId, pdu: &RawJsonValue, ) -> Result { if !services.rooms.metadata.exists(room_id).await { return Err!(Request(NotFound("Room is unknown to this server."))); } // ACL check origin server services .rooms .event_handler .acl_check(origin, room_id) .await?; // We need to return the state prior to joining, let's keep a reference to that // here let shortstatehash = services .rooms .state .get_room_shortstatehash(room_id) .await .map_err(|e| err!(Request(NotFound(error!("Room has no state: {e}")))))?; // We do not add the event_id field to the pdu here because of signature and // hashes checks let room_version_id = services.rooms.state.get_room_version(room_id).await?; let Ok((event_id, mut value)) = gen_event_id_canonical_json(pdu, &room_version_id) else { // Event could not be converted to canonical json return Err!(Request(BadJson("Could not convert event to canonical json."))); }; let event_room_id: OwnedRoomId = serde_json::from_value( serde_json::to_value( value .get("room_id") .ok_or_else(|| err!(Request(BadJson("Event missing room_id property."))))?, ) .expect("CanonicalJson is valid json value"), ) .map_err(|e| err!(Request(BadJson(warn!("room_id field is not a valid room ID: {e}")))))?; if event_room_id != room_id { return Err!(Request(BadJson("Event room_id does not match request path room ID."))); } let event_type: StateEventType = serde_json::from_value( value .get("type") .ok_or_else(|| err!(Request(BadJson("Event missing type property."))))? .clone() .into(), ) .map_err(|e| err!(Request(BadJson(warn!("Event has invalid state event type: {e}")))))?; if event_type != StateEventType::RoomMember { return Err!(Request(BadJson( "Not allowed to send non-membership state event to join endpoint." ))); } let content: RoomMemberEventContent = serde_json::from_value( value .get("content") .ok_or_else(|| err!(Request(BadJson("Event missing content property"))))? .clone() .into(), ) .map_err(|e| err!(Request(BadJson(warn!("Event content is empty or invalid: {e}")))))?; if content.membership != MembershipState::Join { return Err!(Request(BadJson( "Not allowed to send a non-join membership event to join endpoint." ))); } // ACL check sender user server name let sender: OwnedUserId = serde_json::from_value( value .get("sender") .ok_or_else(|| err!(Request(BadJson("Event missing sender property."))))? .clone() .into(), ) .map_err(|e| err!(Request(BadJson(warn!("sender property is not a valid user ID: {e}")))))?; services .rooms .event_handler .acl_check(sender.server_name(), room_id) .await?; // check if origin server is trying to send for another server if sender.server_name() != origin { return Err!(Request(Forbidden("Not allowed to join on behalf of another server."))); } let state_key: OwnedUserId = serde_json::from_value( value .get("state_key") .ok_or_else(|| err!(Request(BadJson("Event missing state_key property."))))? .clone() .into(), ) .map_err(|e| err!(Request(BadJson(warn!("State key is not a valid user ID: {e}")))))?; if state_key != sender { return Err!(Request(BadJson("State key does not match sender user."))); }; if let Some(authorising_user) = content.join_authorized_via_users_server { use ruma::RoomVersionId::*; if !matches!(room_version_id, V1 | V2 | V3 | V4 | V5 | V6 | V7) { return Err!(Request(InvalidParam( "Room version {room_version_id} does not support restricted rooms but \ join_authorised_via_users_server ({authorising_user}) was found in the event." ))); } if !services.globals.user_is_local(&authorising_user) { return Err!(Request(InvalidParam( "Cannot authorise membership event through {authorising_user} as they do not belong to this homeserver" ))); } if !services .rooms .state_cache .is_joined(&authorising_user, room_id) .await { return Err!(Request(InvalidParam( "Authorising user {authorising_user} is not in the room you are trying to join, they cannot authorise \ your join." ))); } if !super::user_can_perform_restricted_join(services, &state_key, room_id, &room_version_id).await? { return Err!(Request(UnableToAuthorizeJoin( "Joining user did not pass restricted room's rules." ))); } } services .server_keys .hash_and_sign_event(&mut value, &room_version_id) .map_err(|e| err!(Request(InvalidParam(warn!("Failed to sign send_join event: {e}")))))?; let origin: OwnedServerName = serde_json::from_value( serde_json::to_value( value .get("origin") .ok_or_else(|| err!(Request(BadJson("Event missing origin property."))))?, ) .expect("CanonicalJson is valid json value"), ) .map_err(|e| err!(Request(BadJson(warn!("origin field is not a valid server name: {e}")))))?; let mutex_lock = services .rooms .event_handler .mutex_federation .lock(room_id) .await; let pdu_id = services .rooms .event_handler .handle_incoming_pdu(&origin, room_id, &event_id, value.clone(), true) .boxed() .await? .ok_or_else(|| err!(Request(InvalidParam("Could not accept as timeline event."))))?; drop(mutex_lock); let state_ids: HashMap<_, OwnedEventId> = services .rooms .state_accessor .state_full_ids(shortstatehash) .await?; let state = state_ids .values() .try_stream() .broad_and_then(|event_id| services.rooms.timeline.get_pdu_json(event_id)) .broad_and_then(|pdu| { services .sending .convert_to_outgoing_federation_event(pdu) .map(Ok) }) .try_collect() .boxed() .await?; let starting_events = state_ids.values().map(Borrow::borrow); let auth_chain = services .rooms .auth_chain .event_ids_iter(room_id, starting_events) .await? .map(Ok) .broad_and_then(|event_id| async move { services.rooms.timeline.get_pdu_json(&event_id).await }) .broad_and_then(|pdu| { services .sending .convert_to_outgoing_federation_event(pdu) .map(Ok) }) .try_collect() .boxed() .await?; services.sending.send_pdu_room(room_id, &pdu_id).await?; Ok(create_join_event::v1::RoomState { auth_chain, state, event: to_raw_value(&CanonicalJsonValue::Object(value)).ok(), }) } /// # `PUT /_matrix/federation/v1/send_join/{roomId}/{eventId}` /// /// Submits a signed join event. pub(crate) async fn create_join_event_v1_route( State(services): State, body: Ruma, ) -> Result { if services .globals .config .forbidden_remote_server_names .contains(body.origin()) { warn!( "Server {} tried joining room ID {} through us who has a server name that is globally forbidden. \ Rejecting.", body.origin(), &body.room_id, ); return Err!(Request(Forbidden("Server is banned on this homeserver."))); } if let Some(server) = body.room_id.server_name() { if services .globals .config .forbidden_remote_server_names .contains(&server.to_owned()) { warn!( "Server {} tried joining room ID {} through us which has a server name that is globally forbidden. \ Rejecting.", body.origin(), &body.room_id, ); return Err!(Request(Forbidden(warn!( "Room ID server name {server} is banned on this homeserver." )))); } } let room_state = create_join_event(&services, body.origin(), &body.room_id, &body.pdu) .boxed() .await?; Ok(create_join_event::v1::Response { room_state, }) } /// # `PUT /_matrix/federation/v2/send_join/{roomId}/{eventId}` /// /// Submits a signed join event. pub(crate) async fn create_join_event_v2_route( State(services): State, body: Ruma, ) -> Result { if services .globals .config .forbidden_remote_server_names .contains(body.origin()) { return Err!(Request(Forbidden("Server is banned on this homeserver."))); } if let Some(server) = body.room_id.server_name() { if services .globals .config .forbidden_remote_server_names .contains(&server.to_owned()) { warn!( "Server {} tried joining room ID {} through us which has a server name that is globally forbidden. \ Rejecting.", body.origin(), &body.room_id, ); return Err!(Request(Forbidden(warn!( "Room ID server name {server} is banned on this homeserver." )))); } } let create_join_event::v1::RoomState { auth_chain, state, event, } = create_join_event(&services, body.origin(), &body.room_id, &body.pdu) .boxed() .await?; let room_state = create_join_event::v2::RoomState { members_omitted: false, auth_chain, state, event, servers_in_room: None, }; Ok(create_join_event::v2::Response { room_state, }) }