Skip to content
Snippets Groups Projects
membership.rs 50.7 KiB
Newer Older
  • Learn to ignore specific revisions
  • use std::{
    	collections::{hash_map::Entry, BTreeMap, HashMap, HashSet},
    
    	time::{Duration, Instant},
    };
    
    
    use ruma::{
    
    	api::{
    		client::{
    			error::ErrorKind,
    			membership::{
    				ban_user, forget_room, get_member_events, invite_user, join_room_by_id, join_room_by_id_or_alias,
    				joined_members, joined_rooms, kick_user, leave_room, unban_user, ThirdPartySigned,
    			},
    		},
    		federation::{self, membership::create_invite},
    	},
    	canonical_json::to_canonical_value,
    	events::{
    		room::{
    			join_rules::{AllowRule, JoinRule, RoomJoinRulesEventContent},
    			member::{MembershipState, RoomMemberEventContent},
    		},
    		StateEventType, TimelineEventType,
    	},
    	serde::Base64,
    	state_res, CanonicalJsonObject, CanonicalJsonValue, EventId, OwnedEventId, OwnedRoomId, OwnedServerName,
    	OwnedUserId, RoomId, RoomVersionId, UserId,
    
    Jonas Platte's avatar
    Jonas Platte committed
    use serde_json::value::{to_raw_value, RawValue as RawJsonValue};
    
    use tracing::{debug, error, info, trace, warn};
    
    use super::get_alias_helper;
    
    Timo Kösters's avatar
    Timo Kösters committed
    use crate::{
    
    	service::pdu::{gen_event_id_canonical_json, PduBuilder},
    	services, utils, Error, PduEvent, Result, Ruma,
    
    Timo Kösters's avatar
    Timo Kösters committed
    };
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/join`
    ///
    /// Tries to join the sender user into a room.
    ///
    
    /// - If the server knowns about this room: creates the join event and does auth
    ///   rules locally
    /// - If the server does not know about the room: asks other servers over
    ///   federation
    pub async fn join_room_by_id_route(body: Ruma<join_room_by_id::v3::Request>) -> Result<join_room_by_id::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	if services().rooms.metadata.is_banned(&body.room_id)? && !services().users.is_admin(sender_user)? {
    		return Err(Error::BadRequest(
    
    			"This room is banned on this homeserver.",
    		));
    	}
    
    
    	if let Some(server) = body.room_id.server_name() {
    		if services()
    			.globals
    			.config
    			.forbidden_remote_server_names
    			.contains(&server.to_owned())
    			&& !services().users.is_admin(sender_user)?
    		{
    			warn!(
    				"User {sender_user} tried joining room ID {} which has a server name that is globally forbidden. \
    				 Rejecting.",
    				body.room_id
    			);
    			return Err(Error::BadRequest(
    				ErrorKind::forbidden(),
    				"This remote server is banned on this homeserver.",
    			));
    		}
    	}
    
    
    🥺's avatar
    🥺 committed
    	// There is no body.server_name for /roomId/join
    	let mut servers = services()
    		.rooms
    		.state_cache
    
    🥺's avatar
    🥺 committed
    		.servers_invite_via(&body.room_id)?
    		.unwrap_or(
    			services()
    				.rooms
    				.state_cache
    				.invite_state(sender_user, &body.room_id)?
    				.unwrap_or_default()
    				.iter()
    				.filter_map(|event| serde_json::from_str(event.json().get()).ok())
    				.filter_map(|event: serde_json::Value| event.get("sender").cloned())
    				.filter_map(|sender| sender.as_str().map(ToOwned::to_owned))
    				.filter_map(|sender| UserId::parse(sender).ok())
    				.map(|user| user.server_name().to_owned())
    				.collect::<Vec<_>>(),
    		);
    
    
    	if let Some(server) = body.room_id.server_name() {
    		servers.push(server.into());
    	}
    
    	join_room_by_id_helper(
    		body.sender_user.as_deref(),
    		&body.room_id,
    		body.reason.clone(),
    		&servers,
    		body.third_party_signed.as_ref(),
    	)
    	.await
    
    /// # `POST /_matrix/client/r0/join/{roomIdOrAlias}`
    ///
    /// Tries to join the sender user into a room.
    ///
    
    /// - If the server knowns about this room: creates the join event and does auth
    ///   rules locally
    
    /// - If the server does not know about the room: use the server name query
    ///   param if specified. if not specified, asks other servers over federation
    ///   via room alias server name and room ID server name
    
    pub async fn join_room_by_id_or_alias_route(
    
    	body: Ruma<join_room_by_id_or_alias::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<join_room_by_id_or_alias::v3::Response> {
    
    	let sender_user = body.sender_user.as_deref().expect("user is authenticated");
    	let body = body.body;
    
    	let (servers, room_id) = match OwnedRoomId::try_from(body.room_id_or_alias) {
    		Ok(room_id) => {
    			if services().rooms.metadata.is_banned(&room_id)? && !services().users.is_admin(sender_user)? {
    				return Err(Error::BadRequest(
    
    					"This room is banned on this homeserver.",
    				));
    			}
    
    
    			if let Some(server) = room_id.server_name() {
    				if services()
    					.globals
    					.config
    					.forbidden_remote_server_names
    					.contains(&server.to_owned())
    					&& !services().users.is_admin(sender_user)?
    				{
    					warn!(
    						"User {sender_user} tried joining room ID {room_id} which has a server name that is globally \
    						 forbidden. Rejecting.",
    					);
    					return Err(Error::BadRequest(
    						ErrorKind::forbidden(),
    						"This remote server is banned on this homeserver.",
    					));
    				}
    			}
    
    
    			let mut servers = body.server_name.clone();
    			servers.extend(
    				services()
    					.rooms
    					.state_cache
    
    🥺's avatar
    🥺 committed
    					.servers_invite_via(&room_id)?
    					.unwrap_or(
    						services()
    							.rooms
    							.state_cache
    							.invite_state(sender_user, &room_id)?
    							.unwrap_or_default()
    							.iter()
    							.filter_map(|event| serde_json::from_str(event.json().get()).ok())
    							.filter_map(|event: serde_json::Value| event.get("sender").cloned())
    							.filter_map(|sender| sender.as_str().map(ToOwned::to_owned))
    							.filter_map(|sender| UserId::parse(sender).ok())
    							.map(|user| user.server_name().to_owned())
    							.collect(),
    					),
    
    			);
    
    			if let Some(server) = room_id.server_name() {
    
    				servers.push(server.to_owned());
    
    			}
    
    			(servers, room_id)
    		},
    		Err(room_alias) => {
    
    			if services()
    				.globals
    				.config
    				.forbidden_remote_server_names
    				.contains(&room_alias.server_name().to_owned())
    				&& !services().users.is_admin(sender_user)?
    			{
    				warn!(
    					"User {sender_user} tried joining room alias {room_alias} which has a server name that is \
    					 globally forbidden. Rejecting.",
    				);
    				return Err(Error::BadRequest(
    					ErrorKind::forbidden(),
    					"This remote server is banned on this homeserver.",
    				));
    			}
    
    
    			let response = get_alias_helper(room_alias.clone()).await?;
    
    
    			if services().rooms.metadata.is_banned(&response.room_id)? && !services().users.is_admin(sender_user)? {
    				return Err(Error::BadRequest(
    
    					"This room is banned on this homeserver.",
    				));
    			}
    
    
    			if services()
    				.globals
    				.config
    				.forbidden_remote_server_names
    				.contains(&room_alias.server_name().to_owned())
    				&& !services().users.is_admin(sender_user)?
    			{
    				warn!(
    
    					"User {sender_user} tried joining room alias {room_alias} with room ID {}, which the alias has a \
    					 server name that is globally forbidden. Rejecting.",
    					&response.room_id
    
    				);
    				return Err(Error::BadRequest(
    					ErrorKind::forbidden(),
    					"This remote server is banned on this homeserver.",
    				));
    			}
    
    			if let Some(server) = response.room_id.server_name() {
    				if services()
    					.globals
    					.config
    					.forbidden_remote_server_names
    					.contains(&server.to_owned())
    					&& !services().users.is_admin(sender_user)?
    				{
    					warn!(
    
    						"User {sender_user} tried joining room alias {room_alias} with room ID {}, which has a server \
    						 name that is globally forbidden. Rejecting.",
    						&response.room_id
    
    					);
    					return Err(Error::BadRequest(
    						ErrorKind::forbidden(),
    						"This remote server is banned on this homeserver.",
    					));
    				}
    			}
    
    
    			let mut servers = body.server_name;
    			servers.extend(response.servers);
    			servers.extend(
    				services()
    					.rooms
    					.state_cache
    					.servers_invite_via(&response.room_id)?
    					.unwrap_or(
    						services()
    							.rooms
    							.state_cache
    							.invite_state(sender_user, &response.room_id)?
    							.unwrap_or_default()
    							.iter()
    							.filter_map(|event| serde_json::from_str(event.json().get()).ok())
    							.filter_map(|event: serde_json::Value| event.get("sender").cloned())
    							.filter_map(|sender| sender.as_str().map(ToOwned::to_owned))
    							.filter_map(|sender| UserId::parse(sender).ok())
    							.map(|user| user.server_name().to_owned())
    							.collect(),
    					),
    			);
    
    			(servers, response.room_id)
    
    		},
    	};
    
    	let join_room_response = join_room_by_id_helper(
    		Some(sender_user),
    		&room_id,
    		body.reason.clone(),
    		&servers,
    		body.third_party_signed.as_ref(),
    	)
    	.await?;
    
    	Ok(join_room_by_id_or_alias::v3::Response {
    		room_id: join_room_response.room_id,
    	})
    
    /// # `POST /_matrix/client/v3/rooms/{roomId}/leave`
    
    ///
    /// Tries to leave the sender user from a room.
    ///
    /// - This should always work if the user is currently joined.
    
    pub async fn leave_room_route(body: Ruma<leave_room::v3::Request>) -> Result<leave_room::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	leave_room(sender_user, &body.room_id, body.reason.clone()).await?;
    
    	Ok(leave_room::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/invite`
    ///
    /// Tries to send an invite event into the room.
    
    pub async fn invite_user_route(body: Ruma<invite_user::v3::Request>) -> Result<invite_user::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	if !services().users.is_admin(sender_user)? && services().globals.block_non_admin_invites() {
    		info!(
    			"User {sender_user} is not an admin and attempted to send an invite to room {}",
    			&body.room_id
    		);
    		return Err(Error::BadRequest(
    
    			"Invites are not allowed on this server.",
    		));
    	}
    
    	if services().rooms.metadata.is_banned(&body.room_id)? && !services().users.is_admin(sender_user)? {
    		info!(
    			"Local user {} who is not an admin attempted to send an invite for banned room {}.",
    			&sender_user, &body.room_id
    		);
    		return Err(Error::BadRequest(
    
    			"This room is banned on this homeserver.",
    		));
    	}
    
    
    	if let Some(server) = body.room_id.server_name() {
    		if services()
    			.globals
    			.config
    			.forbidden_remote_server_names
    			.contains(&server.to_owned())
    		{
    			return Err(Error::BadRequest(
    				ErrorKind::forbidden(),
    				"Server is banned on this homeserver.",
    			));
    		}
    	}
    
    
    	if let invite_user::v3::InvitationRecipient::UserId {
    		user_id,
    	} = &body.recipient
    	{
    		invite_helper(sender_user, user_id, &body.room_id, body.reason.clone(), false).await?;
    		Ok(invite_user::v3::Response {})
    	} else {
    		Err(Error::BadRequest(ErrorKind::NotFound, "User not found."))
    	}
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/kick`
    ///
    /// Tries to send a kick event into the room.
    
    pub async fn kick_user_route(body: Ruma<kick_user::v3::Request>) -> Result<kick_user::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
    	if let Ok(true) = services()
    		.rooms
    		.state_cache
    		.is_left(sender_user, &body.room_id)
    	{
    		info!("{} is not in room {}", &body.user_id, &body.room_id);
    		return Ok(kick_user::v3::Response {});
    	}
    
    
    	let mut event: RoomMemberEventContent = serde_json::from_str(
    		services()
    			.rooms
    			.state_accessor
    			.room_state_get(&body.room_id, &StateEventType::RoomMember, body.user_id.as_ref())?
    			.ok_or(Error::BadRequest(
    				ErrorKind::BadState,
    				"Cannot kick member that's not in the room.",
    			))?
    			.content
    			.get(),
    	)
    	.map_err(|_| Error::bad_database("Invalid member event in database."))?;
    
    	event.membership = MembershipState::Leave;
    
    	event.reason.clone_from(&body.reason);
    
    🥺's avatar
    🥺 committed
    	let mutex_state = Arc::clone(
    		services()
    			.globals
    			.roomid_mutex_state
    			.write()
    			.await
    			.entry(body.room_id.clone())
    			.or_default(),
    	);
    
    	let state_lock = mutex_state.lock().await;
    
    	services()
    		.rooms
    		.timeline
    		.build_and_append_pdu(
    			PduBuilder {
    				event_type: TimelineEventType::RoomMember,
    				content: to_raw_value(&event).expect("event is valid, we just created it"),
    				unsigned: None,
    				state_key: Some(body.user_id.to_string()),
    				redacts: None,
    			},
    			sender_user,
    			&body.room_id,
    			&state_lock,
    		)
    		.await?;
    
    	drop(state_lock);
    
    	Ok(kick_user::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/ban`
    ///
    /// Tries to send a ban event into the room.
    
    Jonas Platte's avatar
    Jonas Platte committed
    pub async fn ban_user_route(body: Ruma<ban_user::v3::Request>) -> Result<ban_user::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
    	if let Ok(Some(membership_event)) = services()
    		.rooms
    		.state_accessor
    		.get_member(&body.room_id, sender_user)
    	{
    		if membership_event.membership == MembershipState::Ban {
    			info!("{} is already banned in {}", &body.user_id, &body.room_id);
    			return Ok(ban_user::v3::Response {});
    		}
    	}
    
    
    	let event = services()
    		.rooms
    		.state_accessor
    		.room_state_get(&body.room_id, &StateEventType::RoomMember, body.user_id.as_ref())?
    		.map_or(
    			Ok(RoomMemberEventContent {
    				membership: MembershipState::Ban,
    				displayname: services().users.displayname(&body.user_id)?,
    				avatar_url: services().users.avatar_url(&body.user_id)?,
    				is_direct: None,
    				third_party_invite: None,
    				blurhash: services().users.blurhash(&body.user_id)?,
    				reason: body.reason.clone(),
    				join_authorized_via_users_server: None,
    			}),
    			|event| {
    				serde_json::from_str(event.content.get())
    					.map(|event: RoomMemberEventContent| RoomMemberEventContent {
    						membership: MembershipState::Ban,
    
    🥺's avatar
    🥺 committed
    						displayname: services()
    							.users
    							.displayname(&body.user_id)
    							.unwrap_or_default(),
    						avatar_url: services()
    							.users
    							.avatar_url(&body.user_id)
    							.unwrap_or_default(),
    
    						blurhash: services().users.blurhash(&body.user_id).unwrap_or_default(),
    						reason: body.reason.clone(),
    
    						..event
    					})
    					.map_err(|_| Error::bad_database("Invalid member event in database."))
    			},
    		)?;
    
    
    🥺's avatar
    🥺 committed
    	let mutex_state = Arc::clone(
    		services()
    			.globals
    			.roomid_mutex_state
    			.write()
    			.await
    			.entry(body.room_id.clone())
    			.or_default(),
    	);
    
    	let state_lock = mutex_state.lock().await;
    
    	services()
    		.rooms
    		.timeline
    		.build_and_append_pdu(
    			PduBuilder {
    				event_type: TimelineEventType::RoomMember,
    				content: to_raw_value(&event).expect("event is valid, we just created it"),
    				unsigned: None,
    				state_key: Some(body.user_id.to_string()),
    				redacts: None,
    			},
    			sender_user,
    			&body.room_id,
    			&state_lock,
    		)
    		.await?;
    
    	drop(state_lock);
    
    	Ok(ban_user::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/unban`
    ///
    /// Tries to send an unban event into the room.
    
    pub async fn unban_user_route(body: Ruma<unban_user::v3::Request>) -> Result<unban_user::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
    	if let Ok(Some(membership_event)) = services()
    		.rooms
    		.state_accessor
    		.get_member(&body.room_id, sender_user)
    	{
    		if membership_event.membership != MembershipState::Ban {
    			info!("{} is already unbanned in {}", &body.user_id, &body.room_id);
    			return Ok(unban_user::v3::Response {});
    		}
    	}
    
    
    	let mut event: RoomMemberEventContent = serde_json::from_str(
    		services()
    			.rooms
    			.state_accessor
    			.room_state_get(&body.room_id, &StateEventType::RoomMember, body.user_id.as_ref())?
    			.ok_or(Error::BadRequest(ErrorKind::BadState, "Cannot unban a user who is not banned."))?
    			.content
    			.get(),
    	)
    	.map_err(|_| Error::bad_database("Invalid member event in database."))?;
    
    	event.membership = MembershipState::Leave;
    
    	event.reason.clone_from(&body.reason);
    
    	event.join_authorized_via_users_server = None;
    
    🥺's avatar
    🥺 committed
    	let mutex_state = Arc::clone(
    		services()
    			.globals
    			.roomid_mutex_state
    			.write()
    			.await
    			.entry(body.room_id.clone())
    			.or_default(),
    	);
    
    	let state_lock = mutex_state.lock().await;
    
    	services()
    		.rooms
    		.timeline
    		.build_and_append_pdu(
    			PduBuilder {
    				event_type: TimelineEventType::RoomMember,
    				content: to_raw_value(&event).expect("event is valid, we just created it"),
    				unsigned: None,
    				state_key: Some(body.user_id.to_string()),
    				redacts: None,
    			},
    			sender_user,
    			&body.room_id,
    			&state_lock,
    		)
    		.await?;
    
    	drop(state_lock);
    
    	Ok(unban_user::v3::Response::new())
    
    /// # `POST /_matrix/client/v3/rooms/{roomId}/forget`
    
    ///
    /// Forgets about a room.
    ///
    
    /// - If the sender user currently left the room: Stops sender user from
    ///   receiving information about the room
    
    /// Note: Other devices of the user have no way of knowing the room was
    /// forgotten, so this has to be called from every device
    pub async fn forget_room_route(body: Ruma<forget_room::v3::Request>) -> Result<forget_room::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
    🥺's avatar
    🥺 committed
    	services()
    		.rooms
    		.state_cache
    		.forget(&body.room_id, sender_user)?;
    
    
    	Ok(forget_room::v3::Response::new())
    
    /// # `POST /_matrix/client/r0/joined_rooms`
    ///
    /// Lists all rooms the user has joined.
    
    pub async fn joined_rooms_route(body: Ruma<joined_rooms::v3::Request>) -> Result<joined_rooms::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    	Ok(joined_rooms::v3::Response {
    
    🥺's avatar
    🥺 committed
    		joined_rooms: services()
    			.rooms
    			.state_cache
    			.rooms_joined(sender_user)
    			.filter_map(Result::ok)
    			.collect(),
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/members`
    ///
    
    /// Lists all joined users in a room (TODO: at a specific point in time, with a
    /// specific membership).
    
    ///
    /// - Only works if the user is currently joined
    
    pub async fn get_member_events_route(
    
    	body: Ruma<get_member_events::v3::Request>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<get_member_events::v3::Response> {
    
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
    🥺's avatar
    🥺 committed
    	if !services()
    		.rooms
    		.state_accessor
    		.user_can_see_state_events(sender_user, &body.room_id)?
    	{
    
    		return Err(Error::BadRequest(
    
    			"You don't have permission to view this room.",
    		));
    	}
    
    	Ok(get_member_events::v3::Response {
    		chunk: services()
    			.rooms
    			.state_accessor
    			.room_state_full(&body.room_id)
    			.await?
    			.iter()
    			.filter(|(key, _)| key.0 == StateEventType::RoomMember)
    			.map(|(_, pdu)| pdu.to_member_event())
    			.collect(),
    	})
    
    /// # `POST /_matrix/client/r0/rooms/{roomId}/joined_members`
    ///
    /// Lists all members of a room.
    ///
    /// - The sender user must be in the room
    /// - TODO: An appservice just needs a puppet joined
    
    pub async fn joined_members_route(body: Ruma<joined_members::v3::Request>) -> Result<joined_members::v3::Response> {
    	let sender_user = body.sender_user.as_ref().expect("user is authenticated");
    
    
    🥺's avatar
    🥺 committed
    	if !services()
    		.rooms
    		.state_accessor
    		.user_can_see_state_events(sender_user, &body.room_id)?
    	{
    
    		return Err(Error::BadRequest(
    
    			"You don't have permission to view this room.",
    		));
    	}
    
    	let mut joined = BTreeMap::new();
    
    🥺's avatar
    🥺 committed
    	for user_id in services()
    		.rooms
    		.state_cache
    		.room_members(&body.room_id)
    		.filter_map(Result::ok)
    	{
    
    		let display_name = services().users.displayname(&user_id)?;
    		let avatar_url = services().users.avatar_url(&user_id)?;
    
    		joined.insert(
    			user_id,
    			joined_members::v3::RoomMember {
    				display_name,
    				avatar_url,
    			},
    		);
    	}
    
    	Ok(joined_members::v3::Response {
    		joined,
    	})
    
    pub(crate) async fn join_room_by_id_helper(
    
    	sender_user: Option<&UserId>, room_id: &RoomId, reason: Option<String>, servers: &[OwnedServerName],
    	_third_party_signed: Option<&ThirdPartySigned>,
    
    Jonathan de Jong's avatar
    Jonathan de Jong committed
    ) -> Result<join_room_by_id::v3::Response> {
    
    	let sender_user = sender_user.expect("user is authenticated");
    
    
    	if let Ok(true) = services().rooms.state_cache.is_joined(sender_user, room_id) {
    		info!("{sender_user} is already joined in {room_id}");
    		return Ok(join_room_by_id::v3::Response {
    			room_id: room_id.into(),
    		});
    	}
    
    
    🥺's avatar
    🥺 committed
    	let mutex_state = Arc::clone(
    		services()
    			.globals
    			.roomid_mutex_state
    			.write()
    			.await
    			.entry(room_id.to_owned())
    			.or_default(),
    	);
    
    	let state_lock = mutex_state.lock().await;
    
    	// Ask a remote server if we are not participating in this room
    
    🥺's avatar
    🥺 committed
    	if !services()
    		.rooms
    		.state_cache
    		.server_in_room(services().globals.server_name(), room_id)?
    	{
    
    		info!("Joining {room_id} over federation.");
    
    		let (make_join_response, remote_server) = make_join_request(sender_user, room_id, servers).await?;
    
    		info!("make_join finished");
    
    		let room_version_id = match make_join_response.room_version {
    
    🥺's avatar
    🥺 committed
    			Some(room_version)
    				if services()
    					.globals
    					.supported_room_versions()
    					.contains(&room_version) =>
    			{
    				room_version
    			},
    
    			_ => return Err(Error::BadServerResponse("Room version is not supported")),
    		};
    
    		let mut join_event_stub: CanonicalJsonObject = serde_json::from_str(make_join_response.event.get())
    			.map_err(|_| Error::BadServerResponse("Invalid make_join event json received from server."))?;
    
    		let join_authorized_via_users_server = join_event_stub
    			.get("content")
    
    🥺's avatar
    🥺 committed
    			.map(|s| {
    				s.as_object()?
    					.get("join_authorised_via_users_server")?
    					.as_str()
    			})
    
    			.and_then(|s| OwnedUserId::try_from(s.unwrap_or_default()).ok());
    
    		// TODO: Is origin needed?
    		join_event_stub.insert(
    			"origin".to_owned(),
    			CanonicalJsonValue::String(services().globals.server_name().as_str().to_owned()),
    		);
    		join_event_stub.insert(
    			"origin_server_ts".to_owned(),
    			CanonicalJsonValue::Integer(
    
    🥺's avatar
    🥺 committed
    				utils::millis_since_unix_epoch()
    					.try_into()
    					.expect("Timestamp is valid js_int value"),
    
    			),
    		);
    		join_event_stub.insert(
    			"content".to_owned(),
    			to_canonical_value(RoomMemberEventContent {
    				membership: MembershipState::Join,
    				displayname: services().users.displayname(sender_user)?,
    				avatar_url: services().users.avatar_url(sender_user)?,
    				is_direct: None,
    				third_party_invite: None,
    				blurhash: services().users.blurhash(sender_user)?,
    				reason,
    				join_authorized_via_users_server: join_authorized_via_users_server.clone(),
    			})
    			.expect("event is valid, we just created it"),
    		);
    
    
    		// We keep the "event_id" in the pdu only in v1 or
    
    		// v2 rooms
    
    		match room_version_id {
    			RoomVersionId::V1 | RoomVersionId::V2 => {},
    			_ => {
    				join_event_stub.remove("event_id");
    			},
    		};
    
    
    		// In order to create a compatible ref hash (EventID) the `hashes` field needs
    		// to be present
    		ruma::signatures::hash_and_sign_event(
    			services().globals.server_name().as_str(),
    			services().globals.keypair(),
    			&mut join_event_stub,
    			&room_version_id,
    		)
    		.expect("event is valid, we just created it");
    
    		// Generate event id
    		let event_id = format!(
    			"${}",
    			ruma::signatures::reference_hash(&join_event_stub, &room_version_id)
    				.expect("ruma can calculate reference hashes")
    		);
    		let event_id = <&EventId>::try_from(event_id.as_str()).expect("ruma's reference hashes are valid event ids");
    
    		// Add event_id back
    		join_event_stub.insert("event_id".to_owned(), CanonicalJsonValue::String(event_id.as_str().to_owned()));
    
    		// It has enough fields to be called a proper event now
    		let mut join_event = join_event_stub;
    
    		info!("Asking {remote_server} for send_join in room {room_id}");
    		let send_join_response = services()
    			.sending
    			.send_federation_request(
    				&remote_server,
    				federation::membership::create_join_event::v2::Request {
    					room_id: room_id.to_owned(),
    					event_id: event_id.to_owned(),
    					pdu: PduEvent::convert_to_outgoing_federation_event(join_event.clone()),
    					omit_members: false,
    				},
    			)
    			.await?;
    
    		info!("send_join finished");
    
    		if join_authorized_via_users_server.is_some() {
    			match &room_version_id {
    				RoomVersionId::V1
    				| RoomVersionId::V2
    				| RoomVersionId::V3
    				| RoomVersionId::V4
    				| RoomVersionId::V5
    				| RoomVersionId::V6
    				| RoomVersionId::V7 => {
    					warn!(
    						"Found `join_authorised_via_users_server` but room {} is version {}. Ignoring.",
    						room_id, &room_version_id
    					);
    				},
    				// only room versions 8 and above using `join_authorized_via_users_server` (restricted joins) need to
    				// validate and send signatures
    				RoomVersionId::V8 | RoomVersionId::V9 | RoomVersionId::V10 | RoomVersionId::V11 => {
    					if let Some(signed_raw) = &send_join_response.room_state.event {
    						info!(
    							"There is a signed event. This room is probably using restricted joins. Adding signature \
    							 to our event"
    						);
    
    						let Ok((signed_event_id, signed_value)) =
    							gen_event_id_canonical_json(signed_raw, &room_version_id)
    						else {
    							// Event could not be converted to canonical json
    							return Err(Error::BadRequest(
    								ErrorKind::InvalidParam,
    								"Could not convert event to canonical json.",
    							));
    						};
    
    
    						if signed_event_id != event_id {
    							return Err(Error::BadRequest(
    								ErrorKind::InvalidParam,
    								"Server sent event with wrong event id",
    							));
    						}
    
    						match signed_value["signatures"]
    							.as_object()
    							.ok_or(Error::BadRequest(
    								ErrorKind::InvalidParam,
    								"Server sent invalid signatures type",
    							))
    							.and_then(|e| {
    								e.get(remote_server.as_str()).ok_or(Error::BadRequest(
    									ErrorKind::InvalidParam,
    									"Server did not send its signature",
    								))
    							}) {
    							Ok(signature) => {
    								join_event
    									.get_mut("signatures")
    									.expect("we created a valid pdu")
    									.as_object_mut()
    									.expect("we created a valid pdu")
    									.insert(remote_server.to_string(), signature.clone());
    							},
    							Err(e) => {
    								warn!(
    									"Server {remote_server} sent invalid signature in sendjoin signatures for event \
    									 {signed_value:?}: {e:?}",
    								);
    							},
    						}
    					}
    				},
    				_ => {
    					warn!(
    						"Unexpected or unsupported room version {} for room {}",
    						&room_version_id, room_id
    					);
    					return Err(Error::BadRequest(
    						ErrorKind::BadJson,
    						"Unexpected or unsupported room version found",
    					));
    				},
    			}
    		}
    
    		services().rooms.short.get_or_create_shortroomid(room_id)?;
    
    		info!("Parsing join event");
    		let parsed_join_pdu = PduEvent::from_id_val(event_id, join_event.clone())
    			.map_err(|_| Error::BadServerResponse("Invalid join event PDU."))?;
    
    		let mut state = HashMap::new();
    		let pub_key_map = RwLock::new(BTreeMap::new());
    
    		info!("Fetching join signing keys");
    		services()
    			.rooms
    			.event_handler
    			.fetch_join_signing_keys(&send_join_response, &room_version_id, &pub_key_map)
    			.await?;
    
    		info!("Going through send_join response room_state");
    		for result in send_join_response
    			.room_state
    			.state
    			.iter()
    			.map(|pdu| validate_and_add_event_id(pdu, &room_version_id, &pub_key_map))
    		{
    
    			let Ok((event_id, value)) = result.await else {
    				continue;
    
    			};
    
    			let pdu = PduEvent::from_id_val(&event_id, value.clone()).map_err(|e| {
    				warn!("Invalid PDU in send_join response: {} {:?}", e, value);
    				Error::BadServerResponse("Invalid PDU in send_join response.")
    			})?;
    
    
    🥺's avatar
    🥺 committed
    			services()
    				.rooms
    				.outlier
    				.add_pdu_outlier(&event_id, &value)?;
    
    			if let Some(state_key) = &pdu.state_key {
    
    🥺's avatar
    🥺 committed
    				let shortstatekey = services()
    					.rooms
    					.short
    					.get_or_create_shortstatekey(&pdu.kind.to_string().into(), state_key)?;
    
    				state.insert(shortstatekey, pdu.event_id.clone());
    			}
    		}
    
    		info!("Going through send_join response auth_chain");
    		for result in send_join_response
    			.room_state
    			.auth_chain
    			.iter()
    			.map(|pdu| validate_and_add_event_id(pdu, &room_version_id, &pub_key_map))
    		{
    
    			let Ok((event_id, value)) = result.await else {
    				continue;
    
    🥺's avatar
    🥺 committed
    			services()
    				.rooms
    				.outlier
    				.add_pdu_outlier(&event_id, &value)?;
    
    		}
    
    		info!("Running send_join auth check");
    
    		let auth_check = state_res::event_auth::auth_check(
    			&state_res::RoomVersion::new(&room_version_id).expect("room version is supported"),
    			&parsed_join_pdu,
    			None::<PduEvent>, // TODO: third party invite
    			|k, s| {
    				services()
    					.rooms
    					.timeline
    					.get_pdu(
    
    🥺's avatar
    🥺 committed
    						state.get(
    							&services()
    								.rooms
    								.short
    								.get_or_create_shortstatekey(&k.to_string().into(), s)
    								.ok()?,
    						)?,
    
    					)
    					.ok()?
    			},
    		)
    		.map_err(|e| {
    			warn!("Auth check failed: {e}");
    			Error::BadRequest(ErrorKind::InvalidParam, "Auth check failed")
    		})?;
    
    		if !auth_check {
    			return Err(Error::BadRequest(ErrorKind::InvalidParam, "Auth check failed"));
    		}
    
    		info!("Saving state from send_join");
    		let (statehash_before_join, new, removed) = services().rooms.state_compressor.save_state(
    			room_id,
    			Arc::new(