2020-09-02 16:13:15 +00:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2020-09-02 12:47:31 +00:00
|
|
|
package perform
|
2020-05-04 17:34:09 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2021-11-24 10:45:23 +00:00
|
|
|
fsAPI "github.com/matrix-org/dendrite/federationapi/api"
|
2020-05-04 17:34:09 +00:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
2020-09-02 12:47:31 +00:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/helpers"
|
2020-09-02 16:13:15 +00:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/input"
|
2020-09-02 12:47:31 +00:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/storage"
|
2020-12-02 17:41:00 +00:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2020-05-04 17:34:09 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2021-07-14 09:39:17 +00:00
|
|
|
"github.com/matrix-org/util"
|
2022-01-31 10:48:28 +00:00
|
|
|
"github.com/sirupsen/logrus"
|
2020-05-04 17:34:09 +00:00
|
|
|
)
|
|
|
|
|
2020-09-02 12:47:31 +00:00
|
|
|
type Leaver struct {
|
|
|
|
Cfg *config.RoomServer
|
|
|
|
DB storage.Database
|
2021-11-24 10:45:23 +00:00
|
|
|
FSAPI fsAPI.FederationInternalAPI
|
2020-09-02 12:47:31 +00:00
|
|
|
|
2020-09-02 16:13:15 +00:00
|
|
|
Inputer *input.Inputer
|
2020-09-02 12:47:31 +00:00
|
|
|
}
|
|
|
|
|
2020-05-04 17:34:09 +00:00
|
|
|
// WriteOutputEvents implements OutputRoomEventWriter
|
2020-09-02 12:47:31 +00:00
|
|
|
func (r *Leaver) PerformLeave(
|
2020-05-04 17:34:09 +00:00
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformLeaveRequest,
|
|
|
|
res *api.PerformLeaveResponse,
|
2020-09-02 12:47:31 +00:00
|
|
|
) ([]api.OutputEvent, error) {
|
2020-05-04 17:34:09 +00:00
|
|
|
_, domain, err := gomatrixserverlib.SplitID('@', req.UserID)
|
|
|
|
if err != nil {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("supplied user ID %q in incorrect format", req.UserID)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
if domain != r.Cfg.Matrix.ServerName {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("user %q does not belong to this homeserver", req.UserID)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
if strings.HasPrefix(req.RoomID, "!") {
|
2022-01-31 14:36:59 +00:00
|
|
|
output, err := r.performLeaveRoomByID(context.Background(), req, res)
|
2022-01-31 10:48:28 +00:00
|
|
|
if err != nil {
|
|
|
|
logrus.WithContext(ctx).WithFields(logrus.Fields{
|
|
|
|
"room_id": req.RoomID,
|
|
|
|
"user_id": req.UserID,
|
|
|
|
}).WithError(err).Error("Failed to leave room")
|
|
|
|
}
|
|
|
|
return output, err
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("room ID %q is invalid", req.RoomID)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
2020-09-02 12:47:31 +00:00
|
|
|
func (r *Leaver) performLeaveRoomByID(
|
2020-05-04 17:34:09 +00:00
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformLeaveRequest,
|
|
|
|
res *api.PerformLeaveResponse, // nolint:unparam
|
2020-09-02 12:47:31 +00:00
|
|
|
) ([]api.OutputEvent, error) {
|
2020-05-04 17:34:09 +00:00
|
|
|
// If there's an invite outstanding for the room then respond to
|
|
|
|
// that.
|
2020-09-02 12:47:31 +00:00
|
|
|
isInvitePending, senderUser, eventID, err := helpers.IsInvitePending(ctx, r.DB, req.RoomID, req.UserID)
|
2020-05-04 17:34:09 +00:00
|
|
|
if err == nil && isInvitePending {
|
2021-07-08 13:54:03 +00:00
|
|
|
var host gomatrixserverlib.ServerName
|
|
|
|
_, host, err = gomatrixserverlib.SplitID('@', senderUser)
|
|
|
|
if err != nil {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("sender %q is invalid", senderUser)
|
2021-07-08 13:54:03 +00:00
|
|
|
}
|
|
|
|
if host != r.Cfg.Matrix.ServerName {
|
|
|
|
return r.performFederatedRejectInvite(ctx, req, res, senderUser, eventID)
|
|
|
|
}
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// There's no invite pending, so first of all we want to find out
|
|
|
|
// if the room exists and if the user is actually in it.
|
|
|
|
latestReq := api.QueryLatestEventsAndStateRequest{
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
StateToFetch: []gomatrixserverlib.StateKeyTuple{
|
|
|
|
{
|
|
|
|
EventType: gomatrixserverlib.MRoomMember,
|
|
|
|
StateKey: req.UserID,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
latestRes := api.QueryLatestEventsAndStateResponse{}
|
2020-09-02 16:13:15 +00:00
|
|
|
if err = helpers.QueryLatestEventsAndState(ctx, r.DB, &latestReq, &latestRes); err != nil {
|
2020-09-02 12:47:31 +00:00
|
|
|
return nil, err
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
if !latestRes.RoomExists {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("room %q does not exist", req.RoomID)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Now let's see if the user is in the room.
|
|
|
|
if len(latestRes.StateEvents) == 0 {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("user %q is not a member of room %q", req.UserID, req.RoomID)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
membership, err := latestRes.StateEvents[0].Membership()
|
|
|
|
if err != nil {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("error getting membership: %w", err)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
2021-07-08 13:54:03 +00:00
|
|
|
if membership != gomatrixserverlib.Join && membership != gomatrixserverlib.Invite {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("user %q is not joined to the room (membership is %q)", req.UserID, membership)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare the template for the leave event.
|
|
|
|
userID := req.UserID
|
|
|
|
eb := gomatrixserverlib.EventBuilder{
|
|
|
|
Type: gomatrixserverlib.MRoomMember,
|
|
|
|
Sender: userID,
|
|
|
|
StateKey: &userID,
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
Redacts: "",
|
|
|
|
}
|
|
|
|
if err = eb.SetContent(map[string]interface{}{"membership": "leave"}); err != nil {
|
2020-09-02 12:47:31 +00:00
|
|
|
return nil, fmt.Errorf("eb.SetContent: %w", err)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
if err = eb.SetUnsigned(struct{}{}); err != nil {
|
2020-09-02 12:47:31 +00:00
|
|
|
return nil, fmt.Errorf("eb.SetUnsigned: %w", err)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// We know that the user is in the room at this point so let's build
|
|
|
|
// a leave event.
|
|
|
|
// TODO: Check what happens if the room exists on the server
|
|
|
|
// but everyone has since left. I suspect it does the wrong thing.
|
2020-09-02 16:13:15 +00:00
|
|
|
event, buildRes, err := buildEvent(ctx, r.DB, r.Cfg.Matrix, &eb)
|
2020-05-04 17:34:09 +00:00
|
|
|
if err != nil {
|
2020-09-02 12:47:31 +00:00
|
|
|
return nil, fmt.Errorf("eventutil.BuildEvent: %w", err)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Give our leave event to the roomserver input stream. The
|
|
|
|
// roomserver will process the membership change and notify
|
|
|
|
// downstream automatically.
|
|
|
|
inputReq := api.InputRoomEventsRequest{
|
|
|
|
InputRoomEvents: []api.InputRoomEvent{
|
|
|
|
{
|
|
|
|
Kind: api.KindNew,
|
|
|
|
Event: event.Headered(buildRes.RoomVersion),
|
2022-01-27 14:29:14 +00:00
|
|
|
Origin: event.Origin(),
|
2020-05-04 17:34:09 +00:00
|
|
|
SendAsServer: string(r.Cfg.Matrix.ServerName),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
inputRes := api.InputRoomEventsResponse{}
|
2020-09-16 12:00:52 +00:00
|
|
|
r.Inputer.InputRoomEvents(ctx, &inputReq, &inputRes)
|
|
|
|
if err = inputRes.Err(); err != nil {
|
2020-09-02 12:47:31 +00:00
|
|
|
return nil, fmt.Errorf("r.InputRoomEvents: %w", err)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
2020-09-02 12:47:31 +00:00
|
|
|
return nil, nil
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
2021-07-08 13:54:03 +00:00
|
|
|
func (r *Leaver) performFederatedRejectInvite(
|
2020-05-04 17:34:09 +00:00
|
|
|
ctx context.Context,
|
|
|
|
req *api.PerformLeaveRequest,
|
|
|
|
res *api.PerformLeaveResponse, // nolint:unparam
|
2020-06-26 10:07:52 +00:00
|
|
|
senderUser, eventID string,
|
2020-09-02 12:47:31 +00:00
|
|
|
) ([]api.OutputEvent, error) {
|
2020-05-04 17:34:09 +00:00
|
|
|
_, domain, err := gomatrixserverlib.SplitID('@', senderUser)
|
|
|
|
if err != nil {
|
2021-09-08 16:31:03 +00:00
|
|
|
return nil, fmt.Errorf("user ID %q invalid: %w", senderUser, err)
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ask the federation sender to perform a federated leave for us.
|
|
|
|
leaveReq := fsAPI.PerformLeaveRequest{
|
|
|
|
RoomID: req.RoomID,
|
|
|
|
UserID: req.UserID,
|
|
|
|
ServerNames: []gomatrixserverlib.ServerName{domain},
|
|
|
|
}
|
|
|
|
leaveRes := fsAPI.PerformLeaveResponse{}
|
2020-09-02 12:47:31 +00:00
|
|
|
if err := r.FSAPI.PerformLeave(ctx, &leaveReq, &leaveRes); err != nil {
|
2021-07-14 09:39:17 +00:00
|
|
|
// failures in PerformLeave should NEVER stop us from telling other components like the
|
|
|
|
// sync API that the invite was withdrawn. Otherwise we can end up with stuck invites.
|
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("failed to PerformLeave, still retiring invite event")
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|
|
|
|
|
2020-06-26 10:07:52 +00:00
|
|
|
// Withdraw the invite, so that the sync API etc are
|
2020-05-04 17:34:09 +00:00
|
|
|
// notified that we rejected it.
|
2020-09-02 12:47:31 +00:00
|
|
|
return []api.OutputEvent{
|
2020-06-26 10:07:52 +00:00
|
|
|
{
|
|
|
|
Type: api.OutputTypeRetireInviteEvent,
|
|
|
|
RetireInviteEvent: &api.OutputRetireInviteEvent{
|
|
|
|
EventID: eventID,
|
|
|
|
Membership: "leave",
|
|
|
|
TargetUserID: req.UserID,
|
|
|
|
},
|
|
|
|
},
|
2020-09-02 12:47:31 +00:00
|
|
|
}, nil
|
2020-05-04 17:34:09 +00:00
|
|
|
}
|