Skip to content
Snippets Groups Projects
membership.rs 45.2 KiB
Newer Older
  • Learn to ignore specific revisions
  • use std::{
    	collections::{hash_map::Entry, BTreeMap, HashMap, HashSet},
    	sync::{Arc, RwLock},
    	time::{Duration, Instant},
    };
    
    
    use ruma::{
    
    	api::{
    		client::{
    			error::ErrorKind,
    			membership::{
    				ban_user, forget_room, get_member_events, invite_user, join_room_by_id, join_room_by_id_or_alias,
    				joined_members, joined_rooms, kick_user, leave_room, unban_user, ThirdPartySigned,
    			},
    		},
    		federation::{self, membership::create_invite},
    	},
    	canonical_json::to_canonical_value,
    	events::{
    		room::{
    			join_rules::{AllowRule, JoinRule, RoomJoinRulesEventContent},
    			member::{MembershipState, RoomMemberEventContent},
    			power_levels::RoomPowerLevelsEventContent,
    		},
    		StateEventType, TimelineEventType,
    	},
    	serde::Base64,
    	state_res, CanonicalJsonObject, CanonicalJsonValue, EventId, OwnedEventId, OwnedRoomId, OwnedServerName,
    	OwnedUserId, RoomId, RoomVersionId, UserId,
    
    Jonas Platte's avatar
    Jonas Platte committed
    use serde_json::value::{to_raw_value, RawValue as RawJsonValue};
    
    use tracing::{debug, error, info, warn};
    
    use super::get_alias_helper;
    
    Timo Kösters's avatar
    Timo Kösters committed
    use crate::{
    
    	service::pdu::{gen_event_id_canonical_json, PduBuilder},
    	services, utils, Error, PduEvent, Result, Ruma,
    
    Timo Kösters's avatar
    Timo Kösters committed
    };
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/join`
    ///
    /// Tries to join the sender user into a room.
    ///
    
    /// - If the server knowns about this room: creates the join event and does auth
    ///   rules locally
    /// - If the server does not know about the room: asks other servers over
    ///   federation
    pub async fn join_room_by_id_route(body: Ruma<join_room_by_id::v3::Request>) -> Result<join_room_by_id::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	if services().rooms.metadata.is_banned(&body.room_id)? && !services().users.is_admin(sender_user)? {
    		return Err(Error::BadRequest(
    			ErrorKind::Forbidden,
    			"This room is banned on this homeserver.",
    		));
    	}
    
    	let mut servers = Vec::new(); // There is no body.server_name for /roomId/join
    	servers.extend(
    		services()
    			.rooms
    			.state_cache
    			.invite_state(sender_user, &body.room_id)?
    			.unwrap_or_default()
    			.iter()
    			.filter_map(|event| serde_json::from_str(event.json().get()).ok())
    			.filter_map(|event: serde_json::Value| event.get("sender").cloned())
    			.filter_map(|sender| sender.as_str().map(std::borrow::ToOwned::to_owned))
    			.filter_map(|sender| UserId::parse(sender).ok())
    			.map(|user| user.server_name().to_owned()),
    	);
    
    	// server names being permanently attached to room IDs may be potentally removed
    	// in the future (see MSC4051). for future compatibility with this, and just
    	// because it makes sense, we shouldn't fail if the room ID doesn't have a
    	// server name with it and just use at least the server name from the initial
    	// invite above
    	if let Some(server) = body.room_id.server_name() {
    		servers.push(server.into());
    	}
    
    	join_room_by_id_helper(
    		body.sender_user.as_deref(),
    		&body.room_id,
    		body.reason.clone(),
    		&servers,
    		body.third_party_signed.as_ref(),
    	)
    	.await
    
    /// # `POST /_matrix/client/r0/join/{roomIdOrAlias}`
    ///
    /// Tries to join the sender user into a room.
    ///
    
    /// - If the server knowns about this room: creates the join event and does auth
    ///   rules locally
    /// - If the server does not know about the room: asks other servers over
    ///   federation
    
    pub async fn join_room_by_id_or_alias_route(
    
    	body: Ruma<join_room_by_id_or_alias::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<join_room_by_id_or_alias::v3::Response> {
    
    	let sender_user = body.sender_user.as_deref().expect("user is authenticated");
    	let body = body.body;
    
    	let (servers, room_id) = match OwnedRoomId::try_from(body.room_id_or_alias) {
    		Ok(room_id) => {
    			if services().rooms.metadata.is_banned(&room_id)? && !services().users.is_admin(sender_user)? {
    				return Err(Error::BadRequest(
    					ErrorKind::Forbidden,
    					"This room is banned on this homeserver.",
    				));
    			}
    
    			let mut servers = body.server_name.clone();
    			servers.extend(
    				services()
    					.rooms
    					.state_cache
    					.invite_state(sender_user, &room_id)?
    					.unwrap_or_default()
    					.iter()
    					.filter_map(|event| serde_json::from_str(event.json().get()).ok())
    					.filter_map(|event: serde_json::Value| event.get("sender").cloned())
    					.filter_map(|sender| sender.as_str().map(std::borrow::ToOwned::to_owned))
    					.filter_map(|sender| UserId::parse(sender).ok())
    					.map(|user| user.server_name().to_owned()),
    			);
    
    			// server names being permanently attached to room IDs may be potentally removed
    			// in the future (see MSC4051). for future compatibility with this, and just
    			// because it makes sense, we shouldn't fail if the room ID doesn't have a
    			// server name with it and just use at least the server name from the initial
    			// invite above
    			if let Some(server) = room_id.server_name() {
    				servers.push(server.into());
    			}
    
    			(servers, room_id)
    		},
    		Err(room_alias) => {
    			let response = get_alias_helper(room_alias).await?;
    
    			if services().rooms.metadata.is_banned(&response.room_id)? && !services().users.is_admin(sender_user)? {
    				return Err(Error::BadRequest(
    					ErrorKind::Forbidden,
    					"This room is banned on this homeserver.",
    				));
    			}
    
    			(response.servers, response.room_id)
    		},
    	};
    
    	let join_room_response = join_room_by_id_helper(
    		Some(sender_user),
    		&room_id,
    		body.reason.clone(),
    		&servers,
    		body.third_party_signed.as_ref(),
    	)
    	.await?;
    
    	Ok(join_room_by_id_or_alias::v3::Response {
    		room_id: join_room_response.room_id,
    	})
    
    /// # `POST /_matrix/client/v3/rooms/{roomId}/leave`
    
    ///
    /// Tries to leave the sender user from a room.
    ///
    /// - This should always work if the user is currently joined.
    
    pub async fn leave_room_route(body: Ruma<leave_room::v3::Request>) -> Result<leave_room::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	leave_room(sender_user, &body.room_id, body.reason.clone()).await?;
    
    	Ok(leave_room::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/invite`
    ///
    /// Tries to send an invite event into the room.
    
    pub async fn invite_user_route(body: Ruma<invite_user::v3::Request>) -> Result<invite_user::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	if !services().users.is_admin(sender_user)? && services().globals.block_non_admin_invites() {
    		info!(
    			"User {sender_user} is not an admin and attempted to send an invite to room {}",
    			&body.room_id
    		);
    		return Err(Error::BadRequest(
    			ErrorKind::Forbidden,
    			"Invites are not allowed on this server.",
    		));
    	}
    
    	if services().rooms.metadata.is_banned(&body.room_id)? && !services().users.is_admin(sender_user)? {
    		info!(
    			"Local user {} who is not an admin attempted to send an invite for banned room {}.",
    			&sender_user, &body.room_id
    		);
    		return Err(Error::BadRequest(
    			ErrorKind::Forbidden,
    			"This room is banned on this homeserver.",
    		));
    	}
    
    	if let invite_user::v3::InvitationRecipient::UserId {
    		user_id,
    	} = &body.recipient
    	{
    		invite_helper(sender_user, user_id, &body.room_id, body.reason.clone(), false).await?;
    		Ok(invite_user::v3::Response {})
    	} else {
    		Err(Error::BadRequest(ErrorKind::NotFound, "User not found."))
    	}
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/kick`
    ///
    /// Tries to send a kick event into the room.
    
    pub async fn kick_user_route(body: Ruma<kick_user::v3::Request>) -> Result<kick_user::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	let mut event: RoomMemberEventContent = serde_json::from_str(
    		services()
    			.rooms
    			.state_accessor
    			.room_state_get(&body.room_id, &StateEventType::RoomMember, body.user_id.as_ref())?
    			.ok_or(Error::BadRequest(
    				ErrorKind::BadState,
    				"Cannot kick member that's not in the room.",
    			))?
    			.content
    			.get(),
    	)
    	.map_err(|_| Error::bad_database("Invalid member event in database."))?;
    
    	event.membership = MembershipState::Leave;
    	event.reason = body.reason.clone();
    
    	let mutex_state =
    		Arc::clone(services().globals.roomid_mutex_state.write().unwrap().entry(body.room_id.clone()).or_default());
    	let state_lock = mutex_state.lock().await;
    
    	services()
    		.rooms
    		.timeline
    		.build_and_append_pdu(
    			PduBuilder {
    				event_type: TimelineEventType::RoomMember,
    				content: to_raw_value(&event).expect("event is valid, we just created it"),
    				unsigned: None,
    				state_key: Some(body.user_id.to_string()),
    				redacts: None,
    			},
    			sender_user,
    			&body.room_id,
    			&state_lock,
    		)
    		.await?;
    
    	drop(state_lock);
    
    	Ok(kick_user::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/ban`
    ///
    /// Tries to send a ban event into the room.
    
    Jonas Platte's avatar
    Jonas Platte committed
    pub async fn ban_user_route(body: Ruma<ban_user::v3::Request>) -> Result<ban_user::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	let event = services()
    		.rooms
    		.state_accessor
    		.room_state_get(&body.room_id, &StateEventType::RoomMember, body.user_id.as_ref())?
    		.map_or(
    			Ok(RoomMemberEventContent {
    				membership: MembershipState::Ban,
    				displayname: services().users.displayname(&body.user_id)?,
    				avatar_url: services().users.avatar_url(&body.user_id)?,
    				is_direct: None,
    				third_party_invite: None,
    				blurhash: services().users.blurhash(&body.user_id)?,
    				reason: body.reason.clone(),
    				join_authorized_via_users_server: None,
    			}),
    			|event| {
    				serde_json::from_str(event.content.get())
    					.map(|event: RoomMemberEventContent| RoomMemberEventContent {
    						membership: MembershipState::Ban,
    						displayname: services().users.displayname(&body.user_id).unwrap_or_default(),
    						avatar_url: services().users.avatar_url(&body.user_id).unwrap_or_default(),
    						blurhash: services().users.blurhash(&body.user_id).unwrap_or_default(),
    						reason: body.reason.clone(),
    						..event
    					})
    					.map_err(|_| Error::bad_database("Invalid member event in database."))
    			},
    		)?;
    
    	let mutex_state =
    		Arc::clone(services().globals.roomid_mutex_state.write().unwrap().entry(body.room_id.clone()).or_default());
    	let state_lock = mutex_state.lock().await;
    
    	services()
    		.rooms
    		.timeline
    		.build_and_append_pdu(
    			PduBuilder {
    				event_type: TimelineEventType::RoomMember,
    				content: to_raw_value(&event).expect("event is valid, we just created it"),
    				unsigned: None,
    				state_key: Some(body.user_id.to_string()),
    				redacts: None,
    			},
    			sender_user,
    			&body.room_id,
    			&state_lock,
    		)
    		.await?;
    
    	drop(state_lock);
    
    	Ok(ban_user::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/unban`
    ///
    /// Tries to send an unban event into the room.
    
    pub async fn unban_user_route(body: Ruma<unban_user::v3::Request>) -> Result<unban_user::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	let mut event: RoomMemberEventContent = serde_json::from_str(
    		services()
    			.rooms
    			.state_accessor
    			.room_state_get(&body.room_id, &StateEventType::RoomMember, body.user_id.as_ref())?
    			.ok_or(Error::BadRequest(ErrorKind::BadState, "Cannot unban a user who is not banned."))?
    			.content
    			.get(),
    	)
    	.map_err(|_| Error::bad_database("Invalid member event in database."))?;
    
    	event.membership = MembershipState::Leave;
    	event.reason = body.reason.clone();
    
    	let mutex_state =
    		Arc::clone(services().globals.roomid_mutex_state.write().unwrap().entry(body.room_id.clone()).or_default());
    	let state_lock = mutex_state.lock().await;
    
    	services()
    		.rooms
    		.timeline
    		.build_and_append_pdu(
    			PduBuilder {
    				event_type: TimelineEventType::RoomMember,
    				content: to_raw_value(&event).expect("event is valid, we just created it"),
    				unsigned: None,
    				state_key: Some(body.user_id.to_string()),
    				redacts: None,
    			},
    			sender_user,
    			&body.room_id,
    			&state_lock,
    		)
    		.await?;
    
    	drop(state_lock);
    
    	Ok(unban_user::v3::Response::new())
    
    /// # `POST /_matrix/client/v3/rooms/{roomId}/forget`
    
    ///
    /// Forgets about a room.
    ///
    
    /// - If the sender user currently left the room: Stops sender user from
    ///   receiving information about the room
    
    /// Note: Other devices of the user have no way of knowing the room was
    /// forgotten, so this has to be called from every device
    pub async fn forget_room_route(body: Ruma<forget_room::v3::Request>) -> Result<forget_room::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	services().rooms.state_cache.forget(&body.room_id, sender_user)?;
    
    	Ok(forget_room::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/joined_rooms`
    ///
    /// Lists all rooms the user has joined.
    
    pub async fn joined_rooms_route(body: Ruma<joined_rooms::v3::Request>) -> Result<joined_rooms::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	Ok(joined_rooms::v3::Response {
    		joined_rooms: services()
    			.rooms
    			.state_cache
    			.rooms_joined(sender_user)
    			.filter_map(std::result::Result::ok)
    			.collect(),
    	})
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/members`
    ///
    
    /// Lists all joined users in a room (TODO: at a specific point in time, with a
    /// specific membership).
    
    ///
    /// - Only works if the user is currently joined
    
    pub async fn get_member_events_route(
    
    	body: Ruma<get_member_events::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<get_member_events::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	if !services().rooms.state_accessor.user_can_see_state_events(sender_user, &body.room_id)? {
    		return Err(Error::BadRequest(
    			ErrorKind::Forbidden,
    			"You don't have permission to view this room.",
    		));
    	}
    
    	Ok(get_member_events::v3::Response {
    		chunk: services()
    			.rooms
    			.state_accessor
    			.room_state_full(&body.room_id)
    			.await?
    			.iter()
    			.filter(|(key, _)| key.0 == StateEventType::RoomMember)
    			.map(|(_, pdu)| pdu.to_member_event())
    			.collect(),
    	})
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/joined_members`
    ///
    /// Lists all members of a room.
    ///
    /// - The sender user must be in the room
    /// - TODO: An appservice just needs a puppet joined
    
    pub async fn joined_members_route(body: Ruma<joined_members::v3::Request>) -> Result<joined_members::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	if !services().rooms.state_accessor.user_can_see_state_events(sender_user, &body.room_id)? {
    		return Err(Error::BadRequest(
    			ErrorKind::Forbidden,
    			"You don't have permission to view this room.",
    		));
    	}
    
    	let mut joined = BTreeMap::new();
    	for user_id in services().rooms.state_cache.room_members(&body.room_id).filter_map(std::result::Result::ok) {
    		let display_name = services().users.displayname(&user_id)?;
    		let avatar_url = services().users.avatar_url(&user_id)?;
    
    		joined.insert(
    			user_id,
    			joined_members::v3::RoomMember {
    				display_name,
    				avatar_url,
    			},
    		);
    	}
    
    	Ok(joined_members::v3::Response {
    		joined,
    	})
    
    	sender_user: Option<&UserId>, room_id: &RoomId, reason: Option<String>, servers: &[OwnedServerName],
    	_third_party_signed: Option<&ThirdPartySigned>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<join_room_by_id::v3::Response> {
    
    480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000
    	let sender_user = sender_user.expect("user is authenticated");
    
    	let mutex_state =
    		Arc::clone(services().globals.roomid_mutex_state.write().unwrap().entry(room_id.to_owned()).or_default());
    	let state_lock = mutex_state.lock().await;
    
    	// Ask a remote server if we are not participating in this room
    	if !services().rooms.state_cache.server_in_room(services().globals.server_name(), room_id)? {
    		info!("Joining {room_id} over federation.");
    
    		let (make_join_response, remote_server) = make_join_request(sender_user, room_id, servers).await?;
    
    		info!("make_join finished");
    
    		let room_version_id = match make_join_response.room_version {
    			Some(room_version) if services().globals.supported_room_versions().contains(&room_version) => room_version,
    			_ => return Err(Error::BadServerResponse("Room version is not supported")),
    		};
    
    		let mut join_event_stub: CanonicalJsonObject = serde_json::from_str(make_join_response.event.get())
    			.map_err(|_| Error::BadServerResponse("Invalid make_join event json received from server."))?;
    
    		let join_authorized_via_users_server = join_event_stub
    			.get("content")
    			.map(|s| s.as_object()?.get("join_authorised_via_users_server")?.as_str())
    			.and_then(|s| OwnedUserId::try_from(s.unwrap_or_default()).ok());
    
    		// TODO: Is origin needed?
    		join_event_stub.insert(
    			"origin".to_owned(),
    			CanonicalJsonValue::String(services().globals.server_name().as_str().to_owned()),
    		);
    		join_event_stub.insert(
    			"origin_server_ts".to_owned(),
    			CanonicalJsonValue::Integer(
    				utils::millis_since_unix_epoch().try_into().expect("Timestamp is valid js_int value"),
    			),
    		);
    		join_event_stub.insert(
    			"content".to_owned(),
    			to_canonical_value(RoomMemberEventContent {
    				membership: MembershipState::Join,
    				displayname: services().users.displayname(sender_user)?,
    				avatar_url: services().users.avatar_url(sender_user)?,
    				is_direct: None,
    				third_party_invite: None,
    				blurhash: services().users.blurhash(sender_user)?,
    				reason,
    				join_authorized_via_users_server: join_authorized_via_users_server.clone(),
    			})
    			.expect("event is valid, we just created it"),
    		);
    
    		// We don't leave the event id in the pdu because that's only allowed in v1 or
    		// v2 rooms
    		join_event_stub.remove("event_id");
    
    		// In order to create a compatible ref hash (EventID) the `hashes` field needs
    		// to be present
    		ruma::signatures::hash_and_sign_event(
    			services().globals.server_name().as_str(),
    			services().globals.keypair(),
    			&mut join_event_stub,
    			&room_version_id,
    		)
    		.expect("event is valid, we just created it");
    
    		// Generate event id
    		let event_id = format!(
    			"${}",
    			ruma::signatures::reference_hash(&join_event_stub, &room_version_id)
    				.expect("ruma can calculate reference hashes")
    		);
    		let event_id = <&EventId>::try_from(event_id.as_str()).expect("ruma's reference hashes are valid event ids");
    
    		// Add event_id back
    		join_event_stub.insert("event_id".to_owned(), CanonicalJsonValue::String(event_id.as_str().to_owned()));
    
    		// It has enough fields to be called a proper event now
    		let mut join_event = join_event_stub;
    
    		info!("Asking {remote_server} for send_join in room {room_id}");
    		let send_join_response = services()
    			.sending
    			.send_federation_request(
    				&remote_server,
    				federation::membership::create_join_event::v2::Request {
    					room_id: room_id.to_owned(),
    					event_id: event_id.to_owned(),
    					pdu: PduEvent::convert_to_outgoing_federation_event(join_event.clone()),
    					omit_members: false,
    				},
    			)
    			.await?;
    
    		info!("send_join finished");
    
    		if join_authorized_via_users_server.is_some() {
    			match &room_version_id {
    				RoomVersionId::V1
    				| RoomVersionId::V2
    				| RoomVersionId::V3
    				| RoomVersionId::V4
    				| RoomVersionId::V5
    				| RoomVersionId::V6
    				| RoomVersionId::V7 => {
    					warn!(
    						"Found `join_authorised_via_users_server` but room {} is version {}. Ignoring.",
    						room_id, &room_version_id
    					);
    				},
    				// only room versions 8 and above using `join_authorized_via_users_server` (restricted joins) need to
    				// validate and send signatures
    				RoomVersionId::V8 | RoomVersionId::V9 | RoomVersionId::V10 | RoomVersionId::V11 => {
    					if let Some(signed_raw) = &send_join_response.room_state.event {
    						info!(
    							"There is a signed event. This room is probably using restricted joins. Adding signature \
    							 to our event"
    						);
    						let (signed_event_id, signed_value) =
    							match gen_event_id_canonical_json(signed_raw, &room_version_id) {
    								Ok(t) => t,
    								Err(_) => {
    									// Event could not be converted to canonical json
    									return Err(Error::BadRequest(
    										ErrorKind::InvalidParam,
    										"Could not convert event to canonical json.",
    									));
    								},
    							};
    
    						if signed_event_id != event_id {
    							return Err(Error::BadRequest(
    								ErrorKind::InvalidParam,
    								"Server sent event with wrong event id",
    							));
    						}
    
    						match signed_value["signatures"]
    							.as_object()
    							.ok_or(Error::BadRequest(
    								ErrorKind::InvalidParam,
    								"Server sent invalid signatures type",
    							))
    							.and_then(|e| {
    								e.get(remote_server.as_str()).ok_or(Error::BadRequest(
    									ErrorKind::InvalidParam,
    									"Server did not send its signature",
    								))
    							}) {
    							Ok(signature) => {
    								join_event
    									.get_mut("signatures")
    									.expect("we created a valid pdu")
    									.as_object_mut()
    									.expect("we created a valid pdu")
    									.insert(remote_server.to_string(), signature.clone());
    							},
    							Err(e) => {
    								warn!(
    									"Server {remote_server} sent invalid signature in sendjoin signatures for event \
    									 {signed_value:?}: {e:?}",
    								);
    							},
    						}
    					}
    				},
    				_ => {
    					warn!(
    						"Unexpected or unsupported room version {} for room {}",
    						&room_version_id, room_id
    					);
    					return Err(Error::BadRequest(
    						ErrorKind::BadJson,
    						"Unexpected or unsupported room version found",
    					));
    				},
    			}
    		}
    
    		services().rooms.short.get_or_create_shortroomid(room_id)?;
    
    		info!("Parsing join event");
    		let parsed_join_pdu = PduEvent::from_id_val(event_id, join_event.clone())
    			.map_err(|_| Error::BadServerResponse("Invalid join event PDU."))?;
    
    		let mut state = HashMap::new();
    		let pub_key_map = RwLock::new(BTreeMap::new());
    
    		info!("Fetching join signing keys");
    		services()
    			.rooms
    			.event_handler
    			.fetch_join_signing_keys(&send_join_response, &room_version_id, &pub_key_map)
    			.await?;
    
    		info!("Going through send_join response room_state");
    		for result in send_join_response
    			.room_state
    			.state
    			.iter()
    			.map(|pdu| validate_and_add_event_id(pdu, &room_version_id, &pub_key_map))
    		{
    			let (event_id, value) = match result {
    				Ok(t) => t,
    				Err(_) => continue,
    			};
    
    			let pdu = PduEvent::from_id_val(&event_id, value.clone()).map_err(|e| {
    				warn!("Invalid PDU in send_join response: {} {:?}", e, value);
    				Error::BadServerResponse("Invalid PDU in send_join response.")
    			})?;
    
    			services().rooms.outlier.add_pdu_outlier(&event_id, &value)?;
    			if let Some(state_key) = &pdu.state_key {
    				let shortstatekey =
    					services().rooms.short.get_or_create_shortstatekey(&pdu.kind.to_string().into(), state_key)?;
    				state.insert(shortstatekey, pdu.event_id.clone());
    			}
    		}
    
    		info!("Going through send_join response auth_chain");
    		for result in send_join_response
    			.room_state
    			.auth_chain
    			.iter()
    			.map(|pdu| validate_and_add_event_id(pdu, &room_version_id, &pub_key_map))
    		{
    			let (event_id, value) = match result {
    				Ok(t) => t,
    				Err(_) => continue,
    			};
    
    			services().rooms.outlier.add_pdu_outlier(&event_id, &value)?;
    		}
    
    		info!("Running send_join auth check");
    
    		let auth_check = state_res::event_auth::auth_check(
    			&state_res::RoomVersion::new(&room_version_id).expect("room version is supported"),
    			&parsed_join_pdu,
    			None::<PduEvent>, // TODO: third party invite
    			|k, s| {
    				services()
    					.rooms
    					.timeline
    					.get_pdu(
    						state
    							.get(&services().rooms.short.get_or_create_shortstatekey(&k.to_string().into(), s).ok()?)?,
    					)
    					.ok()?
    			},
    		)
    		.map_err(|e| {
    			warn!("Auth check failed: {e}");
    			Error::BadRequest(ErrorKind::InvalidParam, "Auth check failed")
    		})?;
    
    		if !auth_check {
    			return Err(Error::BadRequest(ErrorKind::InvalidParam, "Auth check failed"));
    		}
    
    		info!("Saving state from send_join");
    		let (statehash_before_join, new, removed) = services().rooms.state_compressor.save_state(
    			room_id,
    			Arc::new(
    				state
    					.into_iter()
    					.map(|(k, id)| services().rooms.state_compressor.compress_state_event(k, &id))
    					.collect::<Result<_>>()?,
    			),
    		)?;
    
    		services().rooms.state.force_state(room_id, statehash_before_join, new, removed, &state_lock).await?;
    
    		info!("Updating joined counts for new room");
    		services().rooms.state_cache.update_joined_count(room_id)?;
    
    		// We append to state before appending the pdu, so we don't have a moment in
    		// time with the pdu without it's state. This is okay because append_pdu can't
    		// fail.
    		let statehash_after_join = services().rooms.state.append_to_state(&parsed_join_pdu)?;
    
    		info!("Appending new room join event");
    		services()
    			.rooms
    			.timeline
    			.append_pdu(
    				&parsed_join_pdu,
    				join_event,
    				vec![(*parsed_join_pdu.event_id).to_owned()],
    				&state_lock,
    			)
    			.await?;
    
    		info!("Setting final room state for new room");
    		// We set the room state after inserting the pdu, so that we never have a moment
    		// in time where events in the current room state do not exist
    		services().rooms.state.set_room_state(room_id, statehash_after_join, &state_lock)?;
    	} else {
    		info!("We can join locally");
    
    		let join_rules_event =
    			services().rooms.state_accessor.room_state_get(room_id, &StateEventType::RoomJoinRules, "")?;
    		let power_levels_event =
    			services().rooms.state_accessor.room_state_get(room_id, &StateEventType::RoomPowerLevels, "")?;
    
    		let join_rules_event_content: Option<RoomJoinRulesEventContent> = join_rules_event
    			.as_ref()
    			.map(|join_rules_event| {
    				serde_json::from_str(join_rules_event.content.get()).map_err(|e| {
    					warn!("Invalid join rules event: {}", e);
    					Error::bad_database("Invalid join rules event in db.")
    				})
    			})
    			.transpose()?;
    		let power_levels_event_content: Option<RoomPowerLevelsEventContent> = power_levels_event
    			.as_ref()
    			.map(|power_levels_event| {
    				serde_json::from_str(power_levels_event.content.get()).map_err(|e| {
    					warn!("Invalid power levels event: {}", e);
    					Error::bad_database("Invalid power levels event in db.")
    				})
    			})
    			.transpose()?;
    
    		let restriction_rooms = match join_rules_event_content {
    			Some(RoomJoinRulesEventContent {
    				join_rule: JoinRule::Restricted(restricted),
    			})
    			| Some(RoomJoinRulesEventContent {
    				join_rule: JoinRule::KnockRestricted(restricted),
    			}) => restricted
    				.allow
    				.into_iter()
    				.filter_map(|a| match a {
    					AllowRule::RoomMembership(r) => Some(r.room_id),
    					_ => None,
    				})
    				.collect(),
    			_ => Vec::new(),
    		};
    
    		let authorized_user = restriction_rooms
    			.iter()
    			.find_map(|restriction_room_id| {
    				if !services().rooms.state_cache.is_joined(sender_user, restriction_room_id).ok()? {
    					return None;
    				}
    				let authorized_user = power_levels_event_content
    					.as_ref()
    					.and_then(|c| {
    						c.users
    							.iter()
    							.filter(|(uid, i)| {
    								uid.server_name() == services().globals.server_name()
    									&& **i > ruma::int!(0) && services()
    									.rooms
    									.state_cache
    									.is_joined(uid, restriction_room_id)
    									.unwrap_or(false)
    							})
    							.max_by_key(|(_, i)| *i)
    							.map(|(u, _)| u.to_owned())
    					})
    					.or_else(|| {
    						// TODO: Check here if user is actually allowed to invite. Currently the auth
    						// check will just fail in this case.
    						services()
    							.rooms
    							.state_cache
    							.room_members(restriction_room_id)
    							.filter_map(std::result::Result::ok)
    							.find(|uid| uid.server_name() == services().globals.server_name())
    					});
    				Some(authorized_user)
    			})
    			.flatten();
    
    		let event = RoomMemberEventContent {
    			membership: MembershipState::Join,
    			displayname: services().users.displayname(sender_user)?,
    			avatar_url: services().users.avatar_url(sender_user)?,
    			is_direct: None,
    			third_party_invite: None,
    			blurhash: services().users.blurhash(sender_user)?,
    			reason: reason.clone(),
    			join_authorized_via_users_server: authorized_user,
    		};
    
    		// Try normal join first
    		let error = match services()
    			.rooms
    			.timeline
    			.build_and_append_pdu(
    				PduBuilder {
    					event_type: TimelineEventType::RoomMember,
    					content: to_raw_value(&event).expect("event is valid, we just created it"),
    					unsigned: None,
    					state_key: Some(sender_user.to_string()),
    					redacts: None,
    				},
    				sender_user,
    				room_id,
    				&state_lock,
    			)
    			.await
    		{
    			Ok(_event_id) => return Ok(join_room_by_id::v3::Response::new(room_id.to_owned())),
    			Err(e) => e,
    		};
    
    		if !restriction_rooms.is_empty()
    			&& servers.iter().filter(|s| *s != services().globals.server_name()).count() > 0
    		{
    			info!(
    				"We couldn't do the join locally, maybe federation can help to satisfy the restricted join \
    				 requirements"
    			);
    			let (make_join_response, remote_server) = make_join_request(sender_user, room_id, servers).await?;
    
    			let room_version_id = match make_join_response.room_version {
    				Some(room_version_id) if services().globals.supported_room_versions().contains(&room_version_id) => {
    					room_version_id
    				},
    				_ => return Err(Error::BadServerResponse("Room version is not supported")),
    			};
    			let mut join_event_stub: CanonicalJsonObject = serde_json::from_str(make_join_response.event.get())
    				.map_err(|_| Error::BadServerResponse("Invalid make_join event json received from server."))?;
    			let join_authorized_via_users_server = join_event_stub
    				.get("content")
    				.map(|s| s.as_object()?.get("join_authorised_via_users_server")?.as_str())
    				.and_then(|s| OwnedUserId::try_from(s.unwrap_or_default()).ok());
    			// TODO: Is origin needed?
    			join_event_stub.insert(
    				"origin".to_owned(),
    				CanonicalJsonValue::String(services().globals.server_name().as_str().to_owned()),
    			);
    			join_event_stub.insert(
    				"origin_server_ts".to_owned(),
    				CanonicalJsonValue::Integer(
    					utils::millis_since_unix_epoch().try_into().expect("Timestamp is valid js_int value"),
    				),
    			);
    			join_event_stub.insert(
    				"content".to_owned(),
    				to_canonical_value(RoomMemberEventContent {
    					membership: MembershipState::Join,
    					displayname: services().users.displayname(sender_user)?,
    					avatar_url: services().users.avatar_url(sender_user)?,
    					is_direct: None,
    					third_party_invite: None,
    					blurhash: services().users.blurhash(sender_user)?,
    					reason,
    					join_authorized_via_users_server,
    				})
    				.expect("event is valid, we just created it"),
    			);
    
    			// We don't leave the event id in the pdu because that's only allowed in v1 or
    			// v2 rooms
    			join_event_stub.remove("event_id");
    
    			// In order to create a compatible ref hash (EventID) the `hashes` field needs
    			// to be present
    			ruma::signatures::hash_and_sign_event(
    				services().globals.server_name().as_str(),
    				services().globals.keypair(),
    				&mut join_event_stub,
    				&room_version_id,
    			)
    			.expect("event is valid, we just created it");
    
    			// Generate event id
    			let event_id = format!(
    				"${}",
    				ruma::signatures::reference_hash(&join_event_stub, &room_version_id)
    					.expect("ruma can calculate reference hashes")
    			);
    			let event_id =
    				<&EventId>::try_from(event_id.as_str()).expect("ruma's reference hashes are valid event ids");
    
    			// Add event_id back
    			join_event_stub.insert("event_id".to_owned(), CanonicalJsonValue::String(event_id.as_str().to_owned()));
    
    			// It has enough fields to be called a proper event now
    			let join_event = join_event_stub;
    
    			let send_join_response = services()
    				.sending
    				.send_federation_request(
    					&remote_server,
    					federation::membership::create_join_event::v2::Request {
    						room_id: room_id.to_owned(),
    						event_id: event_id.to_owned(),
    						pdu: PduEvent::convert_to_outgoing_federation_event(join_event.clone()),
    						omit_members: false,
    					},
    				)
    				.await?;
    
    			if let Some(signed_raw) = send_join_response.room_state.event {
    				let (signed_event_id, signed_value) = match gen_event_id_canonical_json(&signed_raw, &room_version_id) {
    					Ok(t) => t,
    					Err(_) => {
    						// Event could not be converted to canonical json
    						return Err(Error::BadRequest(
    							ErrorKind::InvalidParam,
    							"Could not convert event to canonical json.",
    						));
    					},
    				};
    
    				if signed_event_id != event_id {
    					return Err(Error::BadRequest(
    						ErrorKind::InvalidParam,
    						"Server sent event with wrong event id",
    					));
    				}
    
    				drop(state_lock);