mirror of
https://github.com/matrix-org/dendrite.git
synced 2024-11-26 16:21:55 -06:00
974 lines
32 KiB
Go
974 lines
32 KiB
Go
// Copyright 2023 The Matrix.org Foundation C.I.C.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package perform
|
|
|
|
import (
|
|
"context"
|
|
"crypto/ed25519"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"github.com/getsentry/sentry-go"
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
|
"github.com/matrix-org/dendrite/roomserver/storage"
|
|
"github.com/matrix-org/dendrite/roomserver/types"
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
|
"github.com/matrix-org/util"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
const (
|
|
historyVisibilityShared = "shared"
|
|
)
|
|
|
|
type Creator struct {
|
|
DB storage.Database
|
|
Cfg *config.RoomServer
|
|
RSAPI api.RoomserverInternalAPI
|
|
}
|
|
|
|
// PerformCreateRoomCryptoIDs handles all the steps necessary to create a new room.
|
|
// nolint: gocyclo
|
|
func (c *Creator) PerformCreateRoomCryptoIDs(ctx context.Context, userID spec.UserID, roomID spec.RoomID, createRequest *api.PerformCreateRoomRequest) ([]gomatrixserverlib.PDU, error) {
|
|
verImpl, err := gomatrixserverlib.GetRoomVersion(createRequest.RoomVersion)
|
|
if err != nil {
|
|
return nil, spec.BadJSON("unknown room version")
|
|
}
|
|
|
|
createContent := map[string]interface{}{}
|
|
if len(createRequest.CreationContent) > 0 {
|
|
if err = json.Unmarshal(createRequest.CreationContent, &createContent); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("json.Unmarshal for creation_content failed")
|
|
return nil, spec.BadJSON("invalid create content")
|
|
}
|
|
}
|
|
|
|
senderID := spec.SenderID(createRequest.SenderID)
|
|
|
|
// TODO: cryptoIDs - should we be assigning a room NID yet?
|
|
_, err = c.DB.AssignRoomNID(ctx, roomID, createRequest.RoomVersion)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("failed to assign roomNID")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
|
|
if createRequest.RoomVersion == gomatrixserverlib.RoomVersionCryptoIDs {
|
|
util.GetLogger(ctx).Infof("StoreUserRoomPublicKey - SenderID: %s UserID: %s RoomID: %s", senderID, userID.String(), roomID.String())
|
|
bytes := spec.Base64Bytes{}
|
|
err = bytes.Decode(string(senderID))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(bytes) != ed25519.PublicKeySize {
|
|
return nil, spec.BadJSON("SenderID is not a valid ed25519 public key")
|
|
}
|
|
|
|
keyErr := c.RSAPI.StoreUserRoomPublicKey(ctx, senderID, userID, roomID)
|
|
if keyErr != nil {
|
|
util.GetLogger(ctx).WithError(keyErr).Error("StoreUserRoomPublicKey failed")
|
|
return nil, spec.InternalServerError{Err: keyErr.Error()}
|
|
}
|
|
}
|
|
|
|
createContent["creator"] = senderID
|
|
createContent["room_version"] = createRequest.RoomVersion
|
|
powerLevelContent := eventutil.InitialPowerLevelsContent(string(senderID))
|
|
joinRuleContent := gomatrixserverlib.JoinRuleContent{
|
|
JoinRule: spec.Invite,
|
|
}
|
|
historyVisibilityContent := gomatrixserverlib.HistoryVisibilityContent{
|
|
HistoryVisibility: historyVisibilityShared,
|
|
}
|
|
|
|
if createRequest.PowerLevelContentOverride != nil {
|
|
// Merge powerLevelContentOverride fields by unmarshalling it atop the defaults
|
|
err = json.Unmarshal(createRequest.PowerLevelContentOverride, &powerLevelContent)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("json.Unmarshal for power_level_content_override failed")
|
|
return nil, spec.BadJSON("malformed power_level_content_override")
|
|
}
|
|
}
|
|
|
|
var guestsCanJoin bool
|
|
switch createRequest.StatePreset {
|
|
case spec.PresetPrivateChat:
|
|
joinRuleContent.JoinRule = spec.Invite
|
|
historyVisibilityContent.HistoryVisibility = historyVisibilityShared
|
|
guestsCanJoin = true
|
|
case spec.PresetTrustedPrivateChat:
|
|
joinRuleContent.JoinRule = spec.Invite
|
|
historyVisibilityContent.HistoryVisibility = historyVisibilityShared
|
|
for _, invitee := range createRequest.InvitedUsers {
|
|
powerLevelContent.Users[invitee] = 100
|
|
}
|
|
guestsCanJoin = true
|
|
case spec.PresetPublicChat:
|
|
joinRuleContent.JoinRule = spec.Public
|
|
historyVisibilityContent.HistoryVisibility = historyVisibilityShared
|
|
}
|
|
|
|
createEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomCreate,
|
|
Content: createContent,
|
|
}
|
|
powerLevelEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomPowerLevels,
|
|
Content: powerLevelContent,
|
|
}
|
|
joinRuleEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomJoinRules,
|
|
Content: joinRuleContent,
|
|
}
|
|
historyVisibilityEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomHistoryVisibility,
|
|
Content: historyVisibilityContent,
|
|
}
|
|
membershipEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomMember,
|
|
StateKey: string(senderID),
|
|
}
|
|
|
|
memberContent := gomatrixserverlib.MemberContent{
|
|
Membership: spec.Join,
|
|
DisplayName: createRequest.UserDisplayName,
|
|
AvatarURL: createRequest.UserAvatarURL,
|
|
}
|
|
|
|
// If we are creating a room with pseudo IDs, create and sign the MXIDMapping
|
|
if createRequest.RoomVersion == gomatrixserverlib.RoomVersionCryptoIDs {
|
|
mapping := &gomatrixserverlib.MXIDMapping{
|
|
UserRoomKey: senderID,
|
|
UserID: userID.String(),
|
|
}
|
|
|
|
identity, idErr := c.Cfg.Matrix.SigningIdentityFor(userID.Domain()) // we MUST use the server signing mxid_mapping
|
|
if idErr != nil {
|
|
logrus.WithError(idErr).WithField("domain", userID.Domain()).Error("unable to find signing identity for domain")
|
|
return nil, spec.InternalServerError{Err: idErr.Error()}
|
|
}
|
|
|
|
// Sign the mapping with the server identity
|
|
if err = mapping.Sign(identity.ServerName, identity.KeyID, identity.PrivateKey); err != nil {
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
memberContent.MXIDMapping = mapping
|
|
}
|
|
membershipEvent.Content = memberContent
|
|
|
|
var nameEvent *gomatrixserverlib.FledglingEvent
|
|
var topicEvent *gomatrixserverlib.FledglingEvent
|
|
var guestAccessEvent *gomatrixserverlib.FledglingEvent
|
|
var aliasEvent *gomatrixserverlib.FledglingEvent
|
|
|
|
if createRequest.RoomName != "" {
|
|
nameEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomName,
|
|
Content: eventutil.NameContent{
|
|
Name: createRequest.RoomName,
|
|
},
|
|
}
|
|
}
|
|
|
|
if createRequest.Topic != "" {
|
|
topicEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomTopic,
|
|
Content: eventutil.TopicContent{
|
|
Topic: createRequest.Topic,
|
|
},
|
|
}
|
|
}
|
|
|
|
if guestsCanJoin {
|
|
guestAccessEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomGuestAccess,
|
|
Content: eventutil.GuestAccessContent{
|
|
GuestAccess: "can_join",
|
|
},
|
|
}
|
|
}
|
|
|
|
var roomAlias string
|
|
if createRequest.RoomAliasName != "" {
|
|
roomAlias = fmt.Sprintf("#%s:%s", createRequest.RoomAliasName, userID.Domain())
|
|
// check it's free
|
|
// TODO: This races but is better than nothing
|
|
hasAliasReq := api.GetRoomIDForAliasRequest{
|
|
Alias: roomAlias,
|
|
IncludeAppservices: false,
|
|
}
|
|
|
|
var aliasResp api.GetRoomIDForAliasResponse
|
|
err = c.RSAPI.GetRoomIDForAlias(ctx, &hasAliasReq, &aliasResp)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("aliasAPI.GetRoomIDForAlias failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
if aliasResp.RoomID != "" {
|
|
return nil, spec.RoomInUse("Room ID already exists.")
|
|
}
|
|
|
|
aliasEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomCanonicalAlias,
|
|
Content: eventutil.CanonicalAlias{
|
|
Alias: roomAlias,
|
|
},
|
|
}
|
|
}
|
|
|
|
var initialStateEvents []gomatrixserverlib.FledglingEvent
|
|
for i := range createRequest.InitialState {
|
|
if createRequest.InitialState[i].StateKey != "" {
|
|
initialStateEvents = append(initialStateEvents, createRequest.InitialState[i])
|
|
continue
|
|
}
|
|
|
|
switch createRequest.InitialState[i].Type {
|
|
case spec.MRoomCreate:
|
|
continue
|
|
|
|
case spec.MRoomPowerLevels:
|
|
powerLevelEvent = createRequest.InitialState[i]
|
|
|
|
case spec.MRoomJoinRules:
|
|
joinRuleEvent = createRequest.InitialState[i]
|
|
|
|
case spec.MRoomHistoryVisibility:
|
|
historyVisibilityEvent = createRequest.InitialState[i]
|
|
|
|
case spec.MRoomGuestAccess:
|
|
guestAccessEvent = &createRequest.InitialState[i]
|
|
|
|
case spec.MRoomName:
|
|
nameEvent = &createRequest.InitialState[i]
|
|
|
|
case spec.MRoomTopic:
|
|
topicEvent = &createRequest.InitialState[i]
|
|
|
|
default:
|
|
initialStateEvents = append(initialStateEvents, createRequest.InitialState[i])
|
|
}
|
|
}
|
|
|
|
// send events into the room in order of:
|
|
// 1- m.room.create
|
|
// 2- room creator join member
|
|
// 3- m.room.power_levels
|
|
// 4- m.room.join_rules
|
|
// 5- m.room.history_visibility
|
|
// 6- m.room.canonical_alias (opt)
|
|
// 7- m.room.guest_access (opt)
|
|
// 8- other initial state items
|
|
// 9- m.room.name (opt)
|
|
// 10- m.room.topic (opt)
|
|
// 11- invite events (opt) - with is_direct flag if applicable TODO
|
|
// 12- 3pid invite events (opt) TODO
|
|
// This differs from Synapse slightly. Synapse would vary the ordering of 3-7
|
|
// depending on if those events were in "initial_state" or not. This made it
|
|
// harder to reason about, hence sticking to a strict static ordering.
|
|
eventsToMake := []gomatrixserverlib.FledglingEvent{
|
|
createEvent, membershipEvent, powerLevelEvent, joinRuleEvent, historyVisibilityEvent,
|
|
}
|
|
if guestAccessEvent != nil {
|
|
eventsToMake = append(eventsToMake, *guestAccessEvent)
|
|
}
|
|
eventsToMake = append(eventsToMake, initialStateEvents...)
|
|
if nameEvent != nil {
|
|
eventsToMake = append(eventsToMake, *nameEvent)
|
|
}
|
|
if topicEvent != nil {
|
|
eventsToMake = append(eventsToMake, *topicEvent)
|
|
}
|
|
if aliasEvent != nil {
|
|
// TODO: bit of a chicken and egg problem here as the alias doesn't exist and cannot until we have made the room.
|
|
// This means we might fail creating the alias but say the canonical alias is something that doesn't exist.
|
|
eventsToMake = append(eventsToMake, *aliasEvent)
|
|
}
|
|
|
|
var builtEvents []gomatrixserverlib.PDU
|
|
authEvents := gomatrixserverlib.NewAuthEvents(nil)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("rsapi.QuerySenderIDForUser failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
for i, e := range eventsToMake {
|
|
depth := i + 1 // depth starts at 1
|
|
|
|
builder := verImpl.NewEventBuilderFromProtoEvent(&gomatrixserverlib.ProtoEvent{
|
|
SenderID: string(senderID),
|
|
RoomID: roomID.String(),
|
|
Type: e.Type,
|
|
StateKey: &e.StateKey,
|
|
Depth: int64(depth),
|
|
})
|
|
err = builder.SetContent(e.Content)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("builder.SetContent failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
if i > 0 {
|
|
builder.PrevEvents = []string{builtEvents[i-1].EventID()}
|
|
}
|
|
var ev gomatrixserverlib.PDU
|
|
if err = builder.AddAuthEvents(&authEvents); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("AddAuthEvents failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
|
|
ev, err = builder.BuildWithoutSigning(createRequest.EventTime, userID.Domain())
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("buildEvent failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
|
|
if err = gomatrixserverlib.Allowed(ev, &authEvents, func(roomID spec.RoomID, senderID spec.SenderID) (*spec.UserID, error) {
|
|
return c.RSAPI.QueryUserIDForSender(ctx, roomID, senderID)
|
|
}); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("gomatrixserverlib.Allowed failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
|
|
// Add the event to the list of auth events
|
|
builtEvents = append(builtEvents, ev)
|
|
err = authEvents.AddEvent(ev)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("authEvents.AddEvent failed")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
}
|
|
|
|
// TODO(#269): Reserve room alias while we create the room. This stops us
|
|
// from creating the room but still failing due to the alias having already
|
|
// been taken.
|
|
if roomAlias != "" {
|
|
aliasAlreadyExists, aliasErr := c.RSAPI.SetRoomAlias(ctx, senderID, roomID, roomAlias)
|
|
if aliasErr != nil {
|
|
util.GetLogger(ctx).WithError(aliasErr).Error("aliasAPI.SetRoomAlias failed")
|
|
return nil, spec.InternalServerError{Err: aliasErr.Error()}
|
|
}
|
|
|
|
if aliasAlreadyExists {
|
|
return nil, spec.RoomInUse("Room alias already exists.")
|
|
}
|
|
}
|
|
|
|
// TODO: cryptoIDs - this shouldn't really be done until the client calls /sendPDUs with these events
|
|
// But that would require the visibility setting also being passed along
|
|
if createRequest.Visibility == spec.Public {
|
|
// expose this room in the published room list
|
|
if err = c.RSAPI.PerformPublish(ctx, &api.PerformPublishRequest{
|
|
RoomID: roomID.String(),
|
|
Visibility: spec.Public,
|
|
}); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("failed to publish room")
|
|
return nil, spec.InternalServerError{Err: err.Error()}
|
|
}
|
|
}
|
|
|
|
// If this is a direct message then we should invite the participants.
|
|
//if len(createRequest.InvitedUsers) > 0 {
|
|
// Build some stripped state for the invite.
|
|
//var globalStrippedState []gomatrixserverlib.InviteStrippedState
|
|
//for _, event := range builtEvents {
|
|
// // Chosen events from the spec:
|
|
// // https://spec.matrix.org/v1.3/client-server-api/#stripped-state
|
|
// switch event.Type() {
|
|
// case spec.MRoomCreate:
|
|
// fallthrough
|
|
// case spec.MRoomName:
|
|
// fallthrough
|
|
// case spec.MRoomAvatar:
|
|
// fallthrough
|
|
// case spec.MRoomTopic:
|
|
// fallthrough
|
|
// case spec.MRoomCanonicalAlias:
|
|
// fallthrough
|
|
// case spec.MRoomEncryption:
|
|
// fallthrough
|
|
// case spec.MRoomMember:
|
|
// fallthrough
|
|
// case spec.MRoomJoinRules:
|
|
// ev := event
|
|
// globalStrippedState = append(
|
|
// globalStrippedState,
|
|
// gomatrixserverlib.NewInviteStrippedState(ev),
|
|
// )
|
|
// }
|
|
//}
|
|
|
|
// Process the invites.
|
|
//for _, invitee := range createRequest.InvitedUsers {
|
|
//inviteeUserID, userIDErr := spec.NewUserID(invitee, true)
|
|
//if userIDErr != nil {
|
|
// util.GetLogger(ctx).WithError(userIDErr).Error("invalid UserID")
|
|
// return nil, spec.InternalServerError{}
|
|
//}
|
|
|
|
// TODO: cryptoIDs - these shouldn't be here
|
|
// instead we should return proto invite events?
|
|
//err = c.RSAPI.PerformInvite(ctx, &api.PerformInviteRequest{
|
|
// InviteInput: api.InviteInput{
|
|
// RoomID: roomID,
|
|
// Inviter: userID,
|
|
// Invitee: *inviteeUserID,
|
|
// DisplayName: createRequest.UserDisplayName,
|
|
// AvatarURL: createRequest.UserAvatarURL,
|
|
// Reason: "",
|
|
// IsDirect: createRequest.IsDirect,
|
|
// KeyID: createRequest.KeyID,
|
|
// PrivateKey: createRequest.PrivateKey,
|
|
// EventTime: createRequest.EventTime,
|
|
// },
|
|
// InviteRoomState: globalStrippedState,
|
|
// SendAsServer: string(userID.Domain()),
|
|
//})
|
|
//switch e := err.(type) {
|
|
//case api.ErrInvalidID:
|
|
// return nil, spec.Unknown(e.Error())
|
|
//case api.ErrNotAllowed:
|
|
// return nil, spec.Forbidden(e.Error())
|
|
//case nil:
|
|
//default:
|
|
// util.GetLogger(ctx).WithError(err).Error("PerformInvite failed")
|
|
// sentry.CaptureException(err)
|
|
// return nil, spec.InternalServerError{}
|
|
//}
|
|
//}
|
|
//}
|
|
|
|
return builtEvents, nil
|
|
}
|
|
|
|
// PerformCreateRoom handles all the steps necessary to create a new room.
|
|
// nolint: gocyclo
|
|
func (c *Creator) PerformCreateRoom(ctx context.Context, userID spec.UserID, roomID spec.RoomID, createRequest *api.PerformCreateRoomRequest) (string, *util.JSONResponse) {
|
|
verImpl, err := gomatrixserverlib.GetRoomVersion(createRequest.RoomVersion)
|
|
if err != nil {
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: spec.BadJSON("unknown room version"),
|
|
}
|
|
}
|
|
|
|
createContent := map[string]interface{}{}
|
|
if len(createRequest.CreationContent) > 0 {
|
|
if err = json.Unmarshal(createRequest.CreationContent, &createContent); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("json.Unmarshal for creation_content failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: spec.BadJSON("invalid create content"),
|
|
}
|
|
}
|
|
}
|
|
|
|
_, err = c.DB.AssignRoomNID(ctx, roomID, createRequest.RoomVersion)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("failed to assign roomNID")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
var senderID spec.SenderID
|
|
if createRequest.RoomVersion == gomatrixserverlib.RoomVersionPseudoIDs {
|
|
// create user room key if needed
|
|
key, keyErr := c.RSAPI.GetOrCreateUserRoomPrivateKey(ctx, userID, roomID)
|
|
if keyErr != nil {
|
|
util.GetLogger(ctx).WithError(keyErr).Error("GetOrCreateUserRoomPrivateKey failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
senderID = spec.SenderIDFromPseudoIDKey(key)
|
|
} else {
|
|
senderID = spec.SenderID(userID.String())
|
|
}
|
|
|
|
// TODO: Maybe, at some point, GMSL should return the events to create, so we can define the version
|
|
// entirely there.
|
|
switch createRequest.RoomVersion {
|
|
case gomatrixserverlib.RoomVersionV11:
|
|
// RoomVersionV11 removed the creator field from the create content: https://github.com/matrix-org/matrix-spec-proposals/pull/2175
|
|
default:
|
|
createContent["creator"] = senderID
|
|
}
|
|
|
|
createContent["room_version"] = createRequest.RoomVersion
|
|
powerLevelContent := eventutil.InitialPowerLevelsContent(string(senderID))
|
|
joinRuleContent := gomatrixserverlib.JoinRuleContent{
|
|
JoinRule: spec.Invite,
|
|
}
|
|
historyVisibilityContent := gomatrixserverlib.HistoryVisibilityContent{
|
|
HistoryVisibility: historyVisibilityShared,
|
|
}
|
|
|
|
if createRequest.PowerLevelContentOverride != nil {
|
|
// Merge powerLevelContentOverride fields by unmarshalling it atop the defaults
|
|
err = json.Unmarshal(createRequest.PowerLevelContentOverride, &powerLevelContent)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("json.Unmarshal for power_level_content_override failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: spec.BadJSON("malformed power_level_content_override"),
|
|
}
|
|
}
|
|
}
|
|
|
|
var guestsCanJoin bool
|
|
switch createRequest.StatePreset {
|
|
case spec.PresetPrivateChat:
|
|
joinRuleContent.JoinRule = spec.Invite
|
|
historyVisibilityContent.HistoryVisibility = historyVisibilityShared
|
|
guestsCanJoin = true
|
|
case spec.PresetTrustedPrivateChat:
|
|
joinRuleContent.JoinRule = spec.Invite
|
|
historyVisibilityContent.HistoryVisibility = historyVisibilityShared
|
|
for _, invitee := range createRequest.InvitedUsers {
|
|
powerLevelContent.Users[invitee] = 100
|
|
}
|
|
guestsCanJoin = true
|
|
case spec.PresetPublicChat:
|
|
joinRuleContent.JoinRule = spec.Public
|
|
historyVisibilityContent.HistoryVisibility = historyVisibilityShared
|
|
}
|
|
|
|
createEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomCreate,
|
|
Content: createContent,
|
|
}
|
|
powerLevelEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomPowerLevels,
|
|
Content: powerLevelContent,
|
|
}
|
|
joinRuleEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomJoinRules,
|
|
Content: joinRuleContent,
|
|
}
|
|
historyVisibilityEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomHistoryVisibility,
|
|
Content: historyVisibilityContent,
|
|
}
|
|
membershipEvent := gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomMember,
|
|
StateKey: string(senderID),
|
|
}
|
|
|
|
memberContent := gomatrixserverlib.MemberContent{
|
|
Membership: spec.Join,
|
|
DisplayName: createRequest.UserDisplayName,
|
|
AvatarURL: createRequest.UserAvatarURL,
|
|
}
|
|
|
|
// get the signing identity
|
|
identity, err := c.Cfg.Matrix.SigningIdentityFor(userID.Domain()) // we MUST use the server signing mxid_mapping
|
|
if err != nil {
|
|
logrus.WithError(err).WithField("domain", userID.Domain()).Error("unable to find signing identity for domain")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
// If we are creating a room with pseudo IDs, create and sign the MXIDMapping
|
|
if createRequest.RoomVersion == gomatrixserverlib.RoomVersionPseudoIDs {
|
|
var pseudoIDKey ed25519.PrivateKey
|
|
pseudoIDKey, err = c.RSAPI.GetOrCreateUserRoomPrivateKey(ctx, userID, roomID)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("GetOrCreateUserRoomPrivateKey failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
mapping := &gomatrixserverlib.MXIDMapping{
|
|
UserRoomKey: spec.SenderIDFromPseudoIDKey(pseudoIDKey),
|
|
UserID: userID.String(),
|
|
}
|
|
|
|
// Sign the mapping with the server identity
|
|
if err = mapping.Sign(identity.ServerName, identity.KeyID, identity.PrivateKey); err != nil {
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
memberContent.MXIDMapping = mapping
|
|
|
|
// sign all events with the pseudo ID key
|
|
identity = &fclient.SigningIdentity{
|
|
ServerName: spec.ServerName(spec.SenderIDFromPseudoIDKey(pseudoIDKey)),
|
|
KeyID: "ed25519:1",
|
|
PrivateKey: pseudoIDKey,
|
|
}
|
|
}
|
|
membershipEvent.Content = memberContent
|
|
|
|
var nameEvent *gomatrixserverlib.FledglingEvent
|
|
var topicEvent *gomatrixserverlib.FledglingEvent
|
|
var guestAccessEvent *gomatrixserverlib.FledglingEvent
|
|
var aliasEvent *gomatrixserverlib.FledglingEvent
|
|
|
|
if createRequest.RoomName != "" {
|
|
nameEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomName,
|
|
Content: eventutil.NameContent{
|
|
Name: createRequest.RoomName,
|
|
},
|
|
}
|
|
}
|
|
|
|
if createRequest.Topic != "" {
|
|
topicEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomTopic,
|
|
Content: eventutil.TopicContent{
|
|
Topic: createRequest.Topic,
|
|
},
|
|
}
|
|
}
|
|
|
|
if guestsCanJoin {
|
|
guestAccessEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomGuestAccess,
|
|
Content: eventutil.GuestAccessContent{
|
|
GuestAccess: "can_join",
|
|
},
|
|
}
|
|
}
|
|
|
|
var roomAlias string
|
|
if createRequest.RoomAliasName != "" {
|
|
roomAlias = fmt.Sprintf("#%s:%s", createRequest.RoomAliasName, userID.Domain())
|
|
// check it's free
|
|
// TODO: This races but is better than nothing
|
|
hasAliasReq := api.GetRoomIDForAliasRequest{
|
|
Alias: roomAlias,
|
|
IncludeAppservices: false,
|
|
}
|
|
|
|
var aliasResp api.GetRoomIDForAliasResponse
|
|
err = c.RSAPI.GetRoomIDForAlias(ctx, &hasAliasReq, &aliasResp)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("aliasAPI.GetRoomIDForAlias failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
if aliasResp.RoomID != "" {
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: spec.RoomInUse("Room ID already exists."),
|
|
}
|
|
}
|
|
|
|
aliasEvent = &gomatrixserverlib.FledglingEvent{
|
|
Type: spec.MRoomCanonicalAlias,
|
|
Content: eventutil.CanonicalAlias{
|
|
Alias: roomAlias,
|
|
},
|
|
}
|
|
}
|
|
|
|
var initialStateEvents []gomatrixserverlib.FledglingEvent
|
|
for i := range createRequest.InitialState {
|
|
if createRequest.InitialState[i].StateKey != "" {
|
|
initialStateEvents = append(initialStateEvents, createRequest.InitialState[i])
|
|
continue
|
|
}
|
|
|
|
switch createRequest.InitialState[i].Type {
|
|
case spec.MRoomCreate:
|
|
continue
|
|
|
|
case spec.MRoomPowerLevels:
|
|
powerLevelEvent = createRequest.InitialState[i]
|
|
|
|
case spec.MRoomJoinRules:
|
|
joinRuleEvent = createRequest.InitialState[i]
|
|
|
|
case spec.MRoomHistoryVisibility:
|
|
historyVisibilityEvent = createRequest.InitialState[i]
|
|
|
|
case spec.MRoomGuestAccess:
|
|
guestAccessEvent = &createRequest.InitialState[i]
|
|
|
|
case spec.MRoomName:
|
|
nameEvent = &createRequest.InitialState[i]
|
|
|
|
case spec.MRoomTopic:
|
|
topicEvent = &createRequest.InitialState[i]
|
|
|
|
default:
|
|
initialStateEvents = append(initialStateEvents, createRequest.InitialState[i])
|
|
}
|
|
}
|
|
|
|
// send events into the room in order of:
|
|
// 1- m.room.create
|
|
// 2- room creator join member
|
|
// 3- m.room.power_levels
|
|
// 4- m.room.join_rules
|
|
// 5- m.room.history_visibility
|
|
// 6- m.room.canonical_alias (opt)
|
|
// 7- m.room.guest_access (opt)
|
|
// 8- other initial state items
|
|
// 9- m.room.name (opt)
|
|
// 10- m.room.topic (opt)
|
|
// 11- invite events (opt) - with is_direct flag if applicable TODO
|
|
// 12- 3pid invite events (opt) TODO
|
|
// This differs from Synapse slightly. Synapse would vary the ordering of 3-7
|
|
// depending on if those events were in "initial_state" or not. This made it
|
|
// harder to reason about, hence sticking to a strict static ordering.
|
|
// TODO: Synapse has txn/token ID on each event. Do we need to do this here?
|
|
eventsToMake := []gomatrixserverlib.FledglingEvent{
|
|
createEvent, membershipEvent, powerLevelEvent, joinRuleEvent, historyVisibilityEvent,
|
|
}
|
|
if guestAccessEvent != nil {
|
|
eventsToMake = append(eventsToMake, *guestAccessEvent)
|
|
}
|
|
eventsToMake = append(eventsToMake, initialStateEvents...)
|
|
if nameEvent != nil {
|
|
eventsToMake = append(eventsToMake, *nameEvent)
|
|
}
|
|
if topicEvent != nil {
|
|
eventsToMake = append(eventsToMake, *topicEvent)
|
|
}
|
|
if aliasEvent != nil {
|
|
// TODO: bit of a chicken and egg problem here as the alias doesn't exist and cannot until we have made the room.
|
|
// This means we might fail creating the alias but say the canonical alias is something that doesn't exist.
|
|
eventsToMake = append(eventsToMake, *aliasEvent)
|
|
}
|
|
|
|
// TODO: invite events
|
|
// TODO: 3pid invite events
|
|
|
|
var builtEvents []*types.HeaderedEvent
|
|
authEvents := gomatrixserverlib.NewAuthEvents(nil)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("rsapi.QuerySenderIDForUser failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
for i, e := range eventsToMake {
|
|
depth := i + 1 // depth starts at 1
|
|
|
|
builder := verImpl.NewEventBuilderFromProtoEvent(&gomatrixserverlib.ProtoEvent{
|
|
SenderID: string(senderID),
|
|
RoomID: roomID.String(),
|
|
Type: e.Type,
|
|
StateKey: &e.StateKey,
|
|
Depth: int64(depth),
|
|
})
|
|
err = builder.SetContent(e.Content)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("builder.SetContent failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
if i > 0 {
|
|
builder.PrevEvents = []string{builtEvents[i-1].EventID()}
|
|
}
|
|
var ev gomatrixserverlib.PDU
|
|
if err = builder.AddAuthEvents(&authEvents); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("AddAuthEvents failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
ev, err = builder.Build(createRequest.EventTime, identity.ServerName, identity.KeyID, identity.PrivateKey)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("buildEvent failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
if err = gomatrixserverlib.Allowed(ev, &authEvents, func(roomID spec.RoomID, senderID spec.SenderID) (*spec.UserID, error) {
|
|
return c.RSAPI.QueryUserIDForSender(ctx, roomID, senderID)
|
|
}); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("gomatrixserverlib.Allowed failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
// Add the event to the list of auth events
|
|
builtEvents = append(builtEvents, &types.HeaderedEvent{PDU: ev})
|
|
err = authEvents.AddEvent(ev)
|
|
if err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("authEvents.AddEvent failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
}
|
|
|
|
inputs := make([]api.InputRoomEvent, 0, len(builtEvents))
|
|
for _, event := range builtEvents {
|
|
inputs = append(inputs, api.InputRoomEvent{
|
|
Kind: api.KindNew,
|
|
Event: event,
|
|
Origin: userID.Domain(),
|
|
SendAsServer: api.DoNotSendToOtherServers,
|
|
})
|
|
}
|
|
|
|
// send the events to the roomserver
|
|
if err = api.SendInputRoomEvents(ctx, c.RSAPI, userID.Domain(), inputs, false); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("roomserverAPI.SendInputRoomEvents failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
// TODO(#269): Reserve room alias while we create the room. This stops us
|
|
// from creating the room but still failing due to the alias having already
|
|
// been taken.
|
|
if roomAlias != "" {
|
|
aliasAlreadyExists, aliasErr := c.RSAPI.SetRoomAlias(ctx, senderID, roomID, roomAlias)
|
|
if aliasErr != nil {
|
|
util.GetLogger(ctx).WithError(aliasErr).Error("aliasAPI.SetRoomAlias failed")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
if aliasAlreadyExists {
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: spec.RoomInUse("Room alias already exists."),
|
|
}
|
|
}
|
|
}
|
|
|
|
// If this is a direct message then we should invite the participants.
|
|
if len(createRequest.InvitedUsers) > 0 {
|
|
// Build some stripped state for the invite.
|
|
var globalStrippedState []gomatrixserverlib.InviteStrippedState
|
|
for _, event := range builtEvents {
|
|
// Chosen events from the spec:
|
|
// https://spec.matrix.org/v1.3/client-server-api/#stripped-state
|
|
switch event.Type() {
|
|
case spec.MRoomCreate:
|
|
fallthrough
|
|
case spec.MRoomName:
|
|
fallthrough
|
|
case spec.MRoomAvatar:
|
|
fallthrough
|
|
case spec.MRoomTopic:
|
|
fallthrough
|
|
case spec.MRoomCanonicalAlias:
|
|
fallthrough
|
|
case spec.MRoomEncryption:
|
|
fallthrough
|
|
case spec.MRoomMember:
|
|
fallthrough
|
|
case spec.MRoomJoinRules:
|
|
ev := event.PDU
|
|
globalStrippedState = append(
|
|
globalStrippedState,
|
|
gomatrixserverlib.NewInviteStrippedState(ev),
|
|
)
|
|
}
|
|
}
|
|
|
|
// Process the invites.
|
|
for _, invitee := range createRequest.InvitedUsers {
|
|
inviteeUserID, userIDErr := spec.NewUserID(invitee, true)
|
|
if userIDErr != nil {
|
|
util.GetLogger(ctx).WithError(userIDErr).Error("invalid UserID")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
|
|
_, err = c.RSAPI.PerformInvite(ctx, &api.PerformInviteRequest{
|
|
InviteInput: api.InviteInput{
|
|
RoomID: roomID,
|
|
Inviter: userID,
|
|
Invitee: *inviteeUserID,
|
|
DisplayName: createRequest.UserDisplayName,
|
|
AvatarURL: createRequest.UserAvatarURL,
|
|
Reason: "",
|
|
IsDirect: createRequest.IsDirect,
|
|
KeyID: createRequest.KeyID,
|
|
PrivateKey: createRequest.PrivateKey,
|
|
EventTime: createRequest.EventTime,
|
|
},
|
|
InviteRoomState: globalStrippedState,
|
|
SendAsServer: string(userID.Domain()),
|
|
}, false)
|
|
switch e := err.(type) {
|
|
case api.ErrInvalidID:
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: spec.Unknown(e.Error()),
|
|
}
|
|
case api.ErrNotAllowed:
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: spec.Forbidden(e.Error()),
|
|
}
|
|
case nil:
|
|
default:
|
|
util.GetLogger(ctx).WithError(err).Error("PerformInvite failed")
|
|
sentry.CaptureException(err)
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if createRequest.Visibility == spec.Public {
|
|
// expose this room in the published room list
|
|
if err = c.RSAPI.PerformPublish(ctx, &api.PerformPublishRequest{
|
|
RoomID: roomID.String(),
|
|
Visibility: spec.Public,
|
|
}); err != nil {
|
|
util.GetLogger(ctx).WithError(err).Error("failed to publish room")
|
|
return "", &util.JSONResponse{
|
|
Code: http.StatusInternalServerError,
|
|
JSON: spec.InternalServerError{},
|
|
}
|
|
}
|
|
}
|
|
|
|
// TODO: visibility/presets/raw initial state
|
|
// TODO: Create room alias association
|
|
// Make sure this doesn't fall into an application service's namespace though!
|
|
|
|
return roomAlias, nil
|
|
}
|