2017-05-25 10:08:28 -05:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-10-11 12:16:53 -05:00
|
|
|
package routing
|
2017-05-25 10:08:28 -05:00
|
|
|
|
|
|
|
import (
|
2023-04-28 10:46:01 -05:00
|
|
|
"encoding/json"
|
2017-07-07 08:11:32 -05:00
|
|
|
"net/http"
|
2020-10-07 09:29:14 -05:00
|
|
|
"time"
|
2017-07-07 08:11:32 -05:00
|
|
|
|
2023-04-03 13:19:26 -05:00
|
|
|
appserviceAPI "github.com/matrix-org/dendrite/appservice/api"
|
2017-05-25 10:08:28 -05:00
|
|
|
"github.com/matrix-org/dendrite/clientapi/httputil"
|
2023-04-28 10:46:01 -05:00
|
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
2018-07-17 09:36:04 -05:00
|
|
|
roomserverAPI "github.com/matrix-org/dendrite/roomserver/api"
|
2020-06-16 08:10:55 -05:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2023-04-28 10:46:01 -05:00
|
|
|
"github.com/matrix-org/gomatrix"
|
2023-04-19 09:50:33 -05:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2017-05-25 10:08:28 -05:00
|
|
|
"github.com/matrix-org/util"
|
|
|
|
)
|
|
|
|
|
|
|
|
func JoinRoomByIDOrAlias(
|
|
|
|
req *http.Request,
|
2020-06-16 08:10:55 -05:00
|
|
|
device *api.Device,
|
2022-05-05 07:17:38 -05:00
|
|
|
rsAPI roomserverAPI.ClientRoomserverAPI,
|
|
|
|
profileAPI api.ClientUserAPI,
|
2020-05-04 07:53:47 -05:00
|
|
|
roomIDOrAlias string,
|
2017-05-25 10:08:28 -05:00
|
|
|
) util.JSONResponse {
|
2020-05-04 07:53:47 -05:00
|
|
|
// Prepare to ask the roomserver to perform the room join.
|
|
|
|
joinReq := roomserverAPI.PerformJoinRequest{
|
|
|
|
RoomIDOrAlias: roomIDOrAlias,
|
|
|
|
UserID: device.UserID,
|
2022-12-22 06:05:59 -06:00
|
|
|
IsGuest: device.AccountType == api.AccountTypeGuest,
|
2020-06-19 07:29:27 -05:00
|
|
|
Content: map[string]interface{}{},
|
2017-09-21 11:00:48 -05:00
|
|
|
}
|
2019-01-15 12:20:46 -06:00
|
|
|
|
2020-08-26 12:23:08 -05:00
|
|
|
// Check to see if any ?server_name= query parameters were
|
|
|
|
// given in the request.
|
|
|
|
if serverNames, ok := req.URL.Query()["server_name"]; ok {
|
|
|
|
for _, serverName := range serverNames {
|
|
|
|
joinReq.ServerNames = append(
|
|
|
|
joinReq.ServerNames,
|
2023-04-19 09:50:33 -05:00
|
|
|
spec.ServerName(serverName),
|
2020-08-26 12:23:08 -05:00
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-10 08:39:18 -05:00
|
|
|
// If content was provided in the request then include that
|
2020-05-04 07:53:47 -05:00
|
|
|
// in the request. It'll get used as a part of the membership
|
|
|
|
// event content.
|
2020-06-17 11:41:45 -05:00
|
|
|
_ = httputil.UnmarshalJSONRequest(req, &joinReq.Content)
|
2019-01-15 12:20:46 -06:00
|
|
|
|
2020-05-13 08:53:25 -05:00
|
|
|
// Work out our localpart for the client profile request.
|
2022-03-24 16:45:44 -05:00
|
|
|
|
|
|
|
// Request our profile content to populate the request content with.
|
2023-04-03 13:19:26 -05:00
|
|
|
profile, err := profileAPI.QueryProfile(req.Context(), device.UserID)
|
2022-03-24 16:45:44 -05:00
|
|
|
|
2023-04-03 13:19:26 -05:00
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
joinReq.Content["displayname"] = profile.DisplayName
|
|
|
|
joinReq.Content["avatar_url"] = profile.AvatarURL
|
|
|
|
case appserviceAPI.ErrProfileNotExists:
|
|
|
|
util.GetLogger(req.Context()).Error("Unable to query user profile, no profile found.")
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
2023-05-09 17:46:49 -05:00
|
|
|
JSON: spec.Unknown("Unable to query user profile, no profile found."),
|
2023-04-03 13:19:26 -05:00
|
|
|
}
|
|
|
|
default:
|
2020-05-13 08:53:25 -05:00
|
|
|
}
|
|
|
|
|
2020-05-04 07:53:47 -05:00
|
|
|
// Ask the roomserver to perform the join.
|
2020-10-07 09:29:14 -05:00
|
|
|
done := make(chan util.JSONResponse, 1)
|
|
|
|
go func() {
|
|
|
|
defer close(done)
|
2023-04-28 10:46:01 -05:00
|
|
|
roomID, _, err := rsAPI.PerformJoin(req.Context(), &joinReq)
|
|
|
|
var response util.JSONResponse
|
|
|
|
|
|
|
|
switch e := err.(type) {
|
|
|
|
case nil: // success case
|
|
|
|
response = util.JSONResponse{
|
2020-10-07 09:29:14 -05:00
|
|
|
Code: http.StatusOK,
|
|
|
|
// TODO: Put the response struct somewhere internal.
|
|
|
|
JSON: struct {
|
|
|
|
RoomID string `json:"room_id"`
|
2023-04-28 10:46:01 -05:00
|
|
|
}{roomID},
|
|
|
|
}
|
|
|
|
case roomserverAPI.ErrInvalidID:
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
2023-05-09 17:46:49 -05:00
|
|
|
JSON: spec.Unknown(e.Error()),
|
2023-04-28 10:46:01 -05:00
|
|
|
}
|
|
|
|
case roomserverAPI.ErrNotAllowed:
|
2023-05-09 17:46:49 -05:00
|
|
|
jsonErr := spec.Forbidden(e.Error())
|
2023-04-28 10:46:01 -05:00
|
|
|
if device.AccountType == api.AccountTypeGuest {
|
2023-05-09 17:46:49 -05:00
|
|
|
jsonErr = spec.GuestAccessForbidden(e.Error())
|
2023-04-28 10:46:01 -05:00
|
|
|
}
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
|
|
|
JSON: jsonErr,
|
|
|
|
}
|
|
|
|
case *gomatrix.HTTPError: // this ensures we proxy responses over federation to the client
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: e.Code,
|
|
|
|
JSON: json.RawMessage(e.Message),
|
|
|
|
}
|
2023-05-16 19:33:27 -05:00
|
|
|
case eventutil.ErrRoomNoExists:
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusNotFound,
|
|
|
|
JSON: spec.NotFound(e.Error()),
|
|
|
|
}
|
2023-04-28 10:46:01 -05:00
|
|
|
default:
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
2023-05-16 19:33:27 -05:00
|
|
|
JSON: spec.InternalServerError{},
|
2020-10-07 09:29:14 -05:00
|
|
|
}
|
|
|
|
}
|
2023-04-28 10:46:01 -05:00
|
|
|
done <- response
|
2020-10-07 09:29:14 -05:00
|
|
|
}()
|
2017-05-25 10:08:28 -05:00
|
|
|
|
2020-10-07 09:29:14 -05:00
|
|
|
// Wait either for the join to finish, or for us to hit a reasonable
|
|
|
|
// timeout, at which point we'll just return a 200 to placate clients.
|
2023-04-28 10:46:01 -05:00
|
|
|
timer := time.NewTimer(time.Second * 20)
|
2020-10-07 09:29:14 -05:00
|
|
|
select {
|
2023-04-28 10:46:01 -05:00
|
|
|
case <-timer.C:
|
2020-10-07 09:29:14 -05:00
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusAccepted,
|
2023-05-09 17:46:49 -05:00
|
|
|
JSON: spec.Unknown("The room join will continue in the background."),
|
2020-10-07 09:29:14 -05:00
|
|
|
}
|
|
|
|
case result := <-done:
|
2023-04-28 10:46:01 -05:00
|
|
|
// Stop and drain the timer
|
|
|
|
if !timer.Stop() {
|
|
|
|
<-timer.C
|
|
|
|
}
|
2020-10-07 09:29:14 -05:00
|
|
|
return result
|
2020-05-04 07:53:47 -05:00
|
|
|
}
|
2017-05-25 10:08:28 -05:00
|
|
|
}
|
2023-10-12 18:41:45 -05:00
|
|
|
|
|
|
|
type joinRoomCryptoIDsResponse struct {
|
|
|
|
RoomID string `json:"room_id"`
|
|
|
|
Version string `json:"room_version"`
|
|
|
|
ViaServer string `json:"via_server"`
|
|
|
|
PDU json.RawMessage `json:"pdu"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func JoinRoomByIDOrAliasCryptoIDs(
|
|
|
|
req *http.Request,
|
|
|
|
device *api.Device,
|
|
|
|
rsAPI roomserverAPI.ClientRoomserverAPI,
|
|
|
|
profileAPI api.ClientUserAPI,
|
|
|
|
roomIDOrAlias string,
|
|
|
|
) util.JSONResponse {
|
|
|
|
// Prepare to ask the roomserver to perform the room join.
|
|
|
|
joinReq := roomserverAPI.PerformJoinRequest{
|
|
|
|
RoomIDOrAlias: roomIDOrAlias,
|
|
|
|
UserID: device.UserID,
|
|
|
|
IsGuest: device.AccountType == api.AccountTypeGuest,
|
|
|
|
Content: map[string]interface{}{},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check to see if any ?server_name= query parameters were
|
|
|
|
// given in the request.
|
|
|
|
if serverNames, ok := req.URL.Query()["server_name"]; ok {
|
|
|
|
for _, serverName := range serverNames {
|
|
|
|
joinReq.ServerNames = append(
|
|
|
|
joinReq.ServerNames,
|
|
|
|
spec.ServerName(serverName),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If content was provided in the request then include that
|
|
|
|
// in the request. It'll get used as a part of the membership
|
|
|
|
// event content.
|
|
|
|
_ = httputil.UnmarshalJSONRequest(req, &joinReq.Content)
|
|
|
|
|
|
|
|
// Work out our localpart for the client profile request.
|
|
|
|
|
|
|
|
// Request our profile content to populate the request content with.
|
|
|
|
profile, err := profileAPI.QueryProfile(req.Context(), device.UserID)
|
|
|
|
|
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
joinReq.Content["displayname"] = profile.DisplayName
|
|
|
|
joinReq.Content["avatar_url"] = profile.AvatarURL
|
|
|
|
case appserviceAPI.ErrProfileNotExists:
|
|
|
|
util.GetLogger(req.Context()).Error("Unable to query user profile, no profile found.")
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.Unknown("Unable to query user profile, no profile found."),
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ask the roomserver to perform the join.
|
|
|
|
done := make(chan util.JSONResponse, 1)
|
|
|
|
go func() {
|
|
|
|
defer close(done)
|
|
|
|
joinEvent, roomID, version, serverName, err := rsAPI.PerformJoinCryptoIDs(req.Context(), &joinReq)
|
|
|
|
var response util.JSONResponse
|
|
|
|
|
|
|
|
switch e := err.(type) {
|
|
|
|
case nil: // success case
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusOK,
|
|
|
|
JSON: joinRoomCryptoIDsResponse{
|
|
|
|
RoomID: roomID,
|
|
|
|
Version: string(version),
|
|
|
|
ViaServer: string(serverName),
|
|
|
|
PDU: json.RawMessage(joinEvent.JSON()),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
case roomserverAPI.ErrInvalidID:
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusBadRequest,
|
|
|
|
JSON: spec.Unknown(e.Error()),
|
|
|
|
}
|
|
|
|
case roomserverAPI.ErrNotAllowed:
|
|
|
|
jsonErr := spec.Forbidden(e.Error())
|
|
|
|
if device.AccountType == api.AccountTypeGuest {
|
|
|
|
jsonErr = spec.GuestAccessForbidden(e.Error())
|
|
|
|
}
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusForbidden,
|
|
|
|
JSON: jsonErr,
|
|
|
|
}
|
|
|
|
case *gomatrix.HTTPError: // this ensures we proxy responses over federation to the client
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: e.Code,
|
|
|
|
JSON: json.RawMessage(e.Message),
|
|
|
|
}
|
|
|
|
case eventutil.ErrRoomNoExists:
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusNotFound,
|
|
|
|
JSON: spec.NotFound(e.Error()),
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
response = util.JSONResponse{
|
|
|
|
Code: http.StatusInternalServerError,
|
|
|
|
JSON: spec.InternalServerError{},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
done <- response
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Wait either for the join to finish, or for us to hit a reasonable
|
|
|
|
// timeout, at which point we'll just return a 200 to placate clients.
|
|
|
|
timer := time.NewTimer(time.Second * 20)
|
|
|
|
select {
|
|
|
|
case <-timer.C:
|
|
|
|
return util.JSONResponse{
|
|
|
|
Code: http.StatusRequestTimeout,
|
|
|
|
JSON: spec.Unknown("Failed creating join event with the remote server."),
|
|
|
|
}
|
|
|
|
case result := <-done:
|
|
|
|
// Stop and drain the timer
|
|
|
|
if !timer.Stop() {
|
|
|
|
<-timer.C
|
|
|
|
}
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
}
|