aboutsummaryrefslogtreecommitdiff
path: root/roomserver
diff options
context:
space:
mode:
authorSam Wedgwood <28223854+swedgwood@users.noreply.github.com>2023-07-20 15:06:05 +0100
committerGitHub <noreply@github.com>2023-07-20 15:06:05 +0100
commit958282749391a13dc6f03c1dd13a9554fb5db3ae (patch)
tree1f370ac9cf956667923756bf851b9329c2c67b98 /roomserver
parent297479ea4993f00a60600232485275d2c57462fe (diff)
de-MSC-ifying space summaries (MSC2946) (#3134)helm-dendrite-0.13.1
- This PR moves and refactors the [code](https://github.com/matrix-org/dendrite/blob/main/setup/mscs/msc2946/msc2946.go) for [MSC2946](https://github.com/matrix-org/matrix-spec-proposals/pull/2946) ('Space Summaries') to integrate it into the rest of the codebase. - Means space summaries are no longer hidden behind an MSC flag - Solves #3096 Signed-off-by: Sam Wedgwood <sam@wedgwood.dev>
Diffstat (limited to 'roomserver')
-rw-r--r--roomserver/api/api.go24
-rw-r--r--roomserver/api/query.go76
-rw-r--r--roomserver/internal/api.go20
-rw-r--r--roomserver/internal/query/query.go2
-rw-r--r--roomserver/internal/query/query_room_hierarchy.go530
-rw-r--r--roomserver/roomserver.go3
-rw-r--r--roomserver/roomserver_test.go7
-rw-r--r--roomserver/types/types.go35
8 files changed, 685 insertions, 12 deletions
diff --git a/roomserver/api/api.go b/roomserver/api/api.go
index c29406a1..28b381d3 100644
--- a/roomserver/api/api.go
+++ b/roomserver/api/api.go
@@ -34,6 +34,17 @@ func (e ErrNotAllowed) Error() string {
return e.Err.Error()
}
+// ErrRoomUnknownOrNotAllowed is an error return if either the provided
+// room ID does not exist, or points to a room that the requester does
+// not have access to.
+type ErrRoomUnknownOrNotAllowed struct {
+ Err error
+}
+
+func (e ErrRoomUnknownOrNotAllowed) Error() string {
+ return e.Err.Error()
+}
+
type RestrictedJoinAPI interface {
CurrentStateEvent(ctx context.Context, roomID spec.RoomID, eventType string, stateKey string) (gomatrixserverlib.PDU, error)
InvitePending(ctx context.Context, roomID spec.RoomID, senderID spec.SenderID) (bool, error)
@@ -113,6 +124,17 @@ type QueryEventsAPI interface {
QueryCurrentState(ctx context.Context, req *QueryCurrentStateRequest, res *QueryCurrentStateResponse) error
}
+type QueryRoomHierarchyAPI interface {
+ // Traverse the room hierarchy using the provided walker up to the provided limit,
+ // returning a new walker which can be used to fetch the next page.
+ //
+ // If limit is -1, this is treated as no limit, and the entire hierarchy will be traversed.
+ //
+ // If returned walker is nil, then there are no more rooms left to traverse. This method does not modify the provided walker, so it
+ // can be cached.
+ QueryNextRoomHierarchyPage(ctx context.Context, walker RoomHierarchyWalker, limit int) ([]fclient.RoomHierarchyRoom, *RoomHierarchyWalker, error)
+}
+
// API functions required by the syncapi
type SyncRoomserverAPI interface {
QueryLatestEventsAndStateAPI
@@ -187,6 +209,7 @@ type ClientRoomserverAPI interface {
QueryEventsAPI
QuerySenderIDAPI
UserRoomPrivateKeyCreator
+ QueryRoomHierarchyAPI
QueryMembershipForUser(ctx context.Context, req *QueryMembershipForUserRequest, res *QueryMembershipForUserResponse) error
QueryMembershipsForRoom(ctx context.Context, req *QueryMembershipsForRoomRequest, res *QueryMembershipsForRoomResponse) error
QueryRoomsForUser(ctx context.Context, req *QueryRoomsForUserRequest, res *QueryRoomsForUserResponse) error
@@ -236,6 +259,7 @@ type FederationRoomserverAPI interface {
QueryLatestEventsAndStateAPI
QueryBulkStateContentAPI
QuerySenderIDAPI
+ QueryRoomHierarchyAPI
UserRoomPrivateKeyCreator
AssignRoomNID(ctx context.Context, roomID spec.RoomID, roomVersion gomatrixserverlib.RoomVersion) (roomNID types.RoomNID, err error)
SigningIdentityFor(ctx context.Context, roomID spec.RoomID, senderID spec.UserID) (fclient.SigningIdentity, error)
diff --git a/roomserver/api/query.go b/roomserver/api/query.go
index b6140afd..57bac2df 100644
--- a/roomserver/api/query.go
+++ b/roomserver/api/query.go
@@ -503,3 +503,79 @@ func (mq *MembershipQuerier) CurrentMembership(ctx context.Context, roomID spec.
}
return membership, err
}
+
+type QueryRoomHierarchyRequest struct {
+ SuggestedOnly bool `json:"suggested_only"`
+ Limit int `json:"limit"`
+ MaxDepth int `json:"max_depth"`
+ From int `json:"json"`
+}
+
+// A struct storing the intermediate state of a room hierarchy query for pagination purposes.
+//
+// Used for implementing space summaries / room hierarchies
+//
+// Use NewRoomHierarchyWalker to construct this, and QueryNextRoomHierarchyPage on the roomserver API
+// to traverse the room hierarchy.
+type RoomHierarchyWalker struct {
+ RootRoomID spec.RoomID
+ Caller types.DeviceOrServerName
+ SuggestedOnly bool
+ MaxDepth int
+ Processed RoomSet
+ Unvisited []RoomHierarchyWalkerQueuedRoom
+}
+
+type RoomHierarchyWalkerQueuedRoom struct {
+ RoomID spec.RoomID
+ ParentRoomID *spec.RoomID
+ Depth int
+ Vias []string // vias to query this room by
+}
+
+// Create a new room hierarchy walker, starting from the provided root room ID.
+//
+// Use the resulting struct with QueryNextRoomHierarchyPage on the roomserver API to traverse the room hierarchy.
+func NewRoomHierarchyWalker(caller types.DeviceOrServerName, roomID spec.RoomID, suggestedOnly bool, maxDepth int) RoomHierarchyWalker {
+ walker := RoomHierarchyWalker{
+ RootRoomID: roomID,
+ Caller: caller,
+ SuggestedOnly: suggestedOnly,
+ MaxDepth: maxDepth,
+ Unvisited: []RoomHierarchyWalkerQueuedRoom{{
+ RoomID: roomID,
+ ParentRoomID: nil,
+ Depth: 0,
+ }},
+ Processed: NewRoomSet(),
+ }
+
+ return walker
+}
+
+// A set of room IDs.
+type RoomSet map[spec.RoomID]struct{}
+
+// Create a new empty room set.
+func NewRoomSet() RoomSet {
+ return RoomSet{}
+}
+
+// Check if a room ID is in a room set.
+func (s RoomSet) Contains(val spec.RoomID) bool {
+ _, ok := s[val]
+ return ok
+}
+
+// Add a room ID to a room set.
+func (s RoomSet) Add(val spec.RoomID) {
+ s[val] = struct{}{}
+}
+
+func (s RoomSet) Copy() RoomSet {
+ copied := make(RoomSet, len(s))
+ for k := range s {
+ copied.Add(k)
+ }
+ return copied
+}
diff --git a/roomserver/internal/api.go b/roomserver/internal/api.go
index 712c365a..3673f0b9 100644
--- a/roomserver/internal/api.go
+++ b/roomserver/internal/api.go
@@ -91,15 +91,8 @@ func NewRoomserverAPI(
NATSClient: nc,
Durable: dendriteCfg.Global.JetStream.Durable("RoomserverInputConsumer"),
ServerACLs: serverACLs,
- Queryer: &query.Queryer{
- DB: roomserverDB,
- Cache: caches,
- IsLocalServerName: dendriteCfg.Global.IsLocalServerName,
- ServerACLs: serverACLs,
- Cfg: dendriteCfg,
- },
- enableMetrics: enableMetrics,
- // perform-er structs get initialised when we have a federation sender to use
+ enableMetrics: enableMetrics,
+ // perform-er structs + queryer struct get initialised when we have a federation sender to use
}
return a
}
@@ -111,6 +104,15 @@ func (r *RoomserverInternalAPI) SetFederationAPI(fsAPI fsAPI.RoomserverFederatio
r.fsAPI = fsAPI
r.KeyRing = keyRing
+ r.Queryer = &query.Queryer{
+ DB: r.DB,
+ Cache: r.Cache,
+ IsLocalServerName: r.Cfg.Global.IsLocalServerName,
+ ServerACLs: r.ServerACLs,
+ Cfg: r.Cfg,
+ FSAPI: fsAPI,
+ }
+
r.Inputer = &input.Inputer{
Cfg: &r.Cfg.RoomServer,
ProcessContext: r.ProcessContext,
diff --git a/roomserver/internal/query/query.go b/roomserver/internal/query/query.go
index 39e3bd0e..11e5564d 100644
--- a/roomserver/internal/query/query.go
+++ b/roomserver/internal/query/query.go
@@ -32,6 +32,7 @@ import (
"github.com/matrix-org/dendrite/syncapi/synctypes"
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
+ fsAPI "github.com/matrix-org/dendrite/federationapi/api"
"github.com/matrix-org/dendrite/internal/caching"
"github.com/matrix-org/dendrite/roomserver/acls"
"github.com/matrix-org/dendrite/roomserver/api"
@@ -47,6 +48,7 @@ type Queryer struct {
IsLocalServerName func(spec.ServerName) bool
ServerACLs *acls.ServerACLs
Cfg *config.Dendrite
+ FSAPI fsAPI.RoomserverFederationAPI
}
func (r *Queryer) RestrictedRoomJoinInfo(ctx context.Context, roomID spec.RoomID, senderID spec.SenderID, localServerName spec.ServerName) (*gomatrixserverlib.RestrictedRoomJoinInfo, error) {
diff --git a/roomserver/internal/query/query_room_hierarchy.go b/roomserver/internal/query/query_room_hierarchy.go
new file mode 100644
index 00000000..7274be52
--- /dev/null
+++ b/roomserver/internal/query/query_room_hierarchy.go
@@ -0,0 +1,530 @@
+// Copyright 2023 The Matrix.org Foundation C.I.C.
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package query
+
+import (
+ "context"
+ "encoding/json"
+ "fmt"
+ "sort"
+
+ fs "github.com/matrix-org/dendrite/federationapi/api"
+ roomserver "github.com/matrix-org/dendrite/roomserver/api"
+ "github.com/matrix-org/dendrite/roomserver/types"
+ userapi "github.com/matrix-org/dendrite/userapi/api"
+ "github.com/matrix-org/gomatrixserverlib"
+ "github.com/matrix-org/gomatrixserverlib/fclient"
+ "github.com/matrix-org/gomatrixserverlib/spec"
+ "github.com/matrix-org/util"
+ "github.com/tidwall/gjson"
+)
+
+// Traverse the room hierarchy using the provided walker up to the provided limit,
+// returning a new walker which can be used to fetch the next page.
+//
+// If limit is -1, this is treated as no limit, and the entire hierarchy will be traversed.
+//
+// If returned walker is nil, then there are no more rooms left to traverse. This method does not modify the provided walker, so it
+// can be cached.
+func (querier *Queryer) QueryNextRoomHierarchyPage(ctx context.Context, walker roomserver.RoomHierarchyWalker, limit int) ([]fclient.RoomHierarchyRoom, *roomserver.RoomHierarchyWalker, error) {
+ if authorised, _ := authorised(ctx, querier, walker.Caller, walker.RootRoomID, nil); !authorised {
+ return nil, nil, roomserver.ErrRoomUnknownOrNotAllowed{Err: fmt.Errorf("room is unknown/forbidden")}
+ }
+
+ discoveredRooms := []fclient.RoomHierarchyRoom{}
+
+ // Copy unvisited and processed to avoid modifying original walker (which is typically in cache)
+ unvisited := make([]roomserver.RoomHierarchyWalkerQueuedRoom, len(walker.Unvisited))
+ copy(unvisited, walker.Unvisited)
+ processed := walker.Processed.Copy()
+
+ // Depth first -> stack data structure
+ for len(unvisited) > 0 {
+ if len(discoveredRooms) >= limit && limit != -1 {
+ break
+ }
+
+ // pop the stack
+ queuedRoom := unvisited[len(unvisited)-1]
+ unvisited = unvisited[:len(unvisited)-1]
+ // If this room has already been processed, skip.
+ // If this room exceeds the specified depth, skip.
+ if processed.Contains(queuedRoom.RoomID) || (walker.MaxDepth > 0 && queuedRoom.Depth > walker.MaxDepth) {
+ continue
+ }
+
+ // Mark this room as processed.
+ processed.Add(queuedRoom.RoomID)
+
+ // if this room is not a space room, skip.
+ var roomType string
+ create := stateEvent(ctx, querier, queuedRoom.RoomID, spec.MRoomCreate, "")
+ if create != nil {
+ var createContent gomatrixserverlib.CreateContent
+ err := json.Unmarshal(create.Content(), &createContent)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).WithField("create_content", create.Content()).Warn("failed to unmarshal m.room.create event")
+ }
+ roomType = createContent.RoomType
+ }
+
+ // Collect rooms/events to send back (either locally or fetched via federation)
+ var discoveredChildEvents []fclient.RoomHierarchyStrippedEvent
+
+ // If we know about this room and the caller is authorised (joined/world_readable) then pull
+ // events locally
+ roomExists := roomExists(ctx, querier, queuedRoom.RoomID)
+ if !roomExists {
+ // attempt to query this room over federation, as either we've never heard of it before
+ // or we've left it and hence are not authorised (but info may be exposed regardless)
+ fedRes := federatedRoomInfo(ctx, querier, walker.Caller, walker.SuggestedOnly, queuedRoom.RoomID, queuedRoom.Vias)
+ if fedRes != nil {
+ discoveredChildEvents = fedRes.Room.ChildrenState
+ discoveredRooms = append(discoveredRooms, fedRes.Room)
+ if len(fedRes.Children) > 0 {
+ discoveredRooms = append(discoveredRooms, fedRes.Children...)
+ }
+ // mark this room as a space room as the federated server responded.
+ // we need to do this so we add the children of this room to the unvisited stack
+ // as these children may be rooms we do know about.
+ roomType = spec.MSpace
+ }
+ } else if authorised, isJoinedOrInvited := authorised(ctx, querier, walker.Caller, queuedRoom.RoomID, queuedRoom.ParentRoomID); authorised {
+ // Get all `m.space.child` state events for this room
+ events, err := childReferences(ctx, querier, walker.SuggestedOnly, queuedRoom.RoomID)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).WithField("room_id", queuedRoom.RoomID).Error("failed to extract references for room")
+ continue
+ }
+ discoveredChildEvents = events
+
+ pubRoom := publicRoomsChunk(ctx, querier, queuedRoom.RoomID)
+
+ discoveredRooms = append(discoveredRooms, fclient.RoomHierarchyRoom{
+ PublicRoom: *pubRoom,
+ RoomType: roomType,
+ ChildrenState: events,
+ })
+ // don't walk children if the user is not joined/invited to the space
+ if !isJoinedOrInvited {
+ continue
+ }
+ } else {
+ // room exists but user is not authorised
+ continue
+ }
+
+ // don't walk the children
+ // if the parent is not a space room
+ if roomType != spec.MSpace {
+ continue
+ }
+
+ // For each referenced room ID in the child events being returned to the caller
+ // add the room ID to the queue of unvisited rooms. Loop from the beginning.
+ // We need to invert the order here because the child events are lo->hi on the timestamp,
+ // so we need to ensure we pop in the same lo->hi order, which won't be the case if we
+ // insert the highest timestamp last in a stack.
+ for i := len(discoveredChildEvents) - 1; i >= 0; i-- {
+ spaceContent := struct {
+ Via []string `json:"via"`
+ }{}
+ ev := discoveredChildEvents[i]
+ _ = json.Unmarshal(ev.Content, &spaceContent)
+
+ childRoomID, err := spec.NewRoomID(ev.StateKey)
+
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).WithField("invalid_room_id", ev.StateKey).WithField("parent_room_id", queuedRoom.RoomID).Warn("Invalid room ID in m.space.child state event")
+ } else {
+ unvisited = append(unvisited, roomserver.RoomHierarchyWalkerQueuedRoom{
+ RoomID: *childRoomID,
+ ParentRoomID: &queuedRoom.RoomID,
+ Depth: queuedRoom.Depth + 1,
+ Vias: spaceContent.Via,
+ })
+ }
+ }
+ }
+
+ if len(unvisited) == 0 {
+ // If no more rooms to walk, then don't return a walker for future pages
+ return discoveredRooms, nil, nil
+ } else {
+ // If there are more rooms to walk, then return a new walker to resume walking from (for querying more pages)
+ newWalker := roomserver.RoomHierarchyWalker{
+ RootRoomID: walker.RootRoomID,
+ Caller: walker.Caller,
+ SuggestedOnly: walker.SuggestedOnly,
+ MaxDepth: walker.MaxDepth,
+ Unvisited: unvisited,
+ Processed: processed,
+ }
+
+ return discoveredRooms, &newWalker, nil
+ }
+
+}
+
+// authorised returns true iff the user is joined this room or the room is world_readable
+func authorised(ctx context.Context, querier *Queryer, caller types.DeviceOrServerName, roomID spec.RoomID, parentRoomID *spec.RoomID) (authed, isJoinedOrInvited bool) {
+ if clientCaller := caller.Device(); clientCaller != nil {
+ return authorisedUser(ctx, querier, clientCaller, roomID, parentRoomID)
+ } else {
+ return authorisedServer(ctx, querier, roomID, *caller.ServerName()), false
+ }
+}
+
+// authorisedServer returns true iff the server is joined this room or the room is world_readable, public, or knockable
+func authorisedServer(ctx context.Context, querier *Queryer, roomID spec.RoomID, callerServerName spec.ServerName) bool {
+ // Check history visibility / join rules first
+ hisVisTuple := gomatrixserverlib.StateKeyTuple{
+ EventType: spec.MRoomHistoryVisibility,
+ StateKey: "",
+ }
+ joinRuleTuple := gomatrixserverlib.StateKeyTuple{
+ EventType: spec.MRoomJoinRules,
+ StateKey: "",
+ }
+ var queryRoomRes roomserver.QueryCurrentStateResponse
+ err := querier.QueryCurrentState(ctx, &roomserver.QueryCurrentStateRequest{
+ RoomID: roomID.String(),
+ StateTuples: []gomatrixserverlib.StateKeyTuple{
+ hisVisTuple, joinRuleTuple,
+ },
+ }, &queryRoomRes)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).Error("failed to QueryCurrentState")
+ return false
+ }
+ hisVisEv := queryRoomRes.StateEvents[hisVisTuple]
+ if hisVisEv != nil {
+ hisVis, _ := hisVisEv.HistoryVisibility()
+ if hisVis == "world_readable" {
+ return true
+ }
+ }
+
+ // check if this room is a restricted room and if so, we need to check if the server is joined to an allowed room ID
+ // in addition to the actual room ID (but always do the actual one first as it's quicker in the common case)
+ allowJoinedToRoomIDs := []spec.RoomID{roomID}
+ joinRuleEv := queryRoomRes.StateEvents[joinRuleTuple]
+
+ if joinRuleEv != nil {
+ rule, ruleErr := joinRuleEv.JoinRule()
+ if ruleErr != nil {
+ util.GetLogger(ctx).WithError(ruleErr).WithField("parent_room_id", roomID).Warn("failed to get join rule")
+ return false
+ }
+
+ if rule == spec.Public || rule == spec.Knock {
+ return true
+ }
+
+ if rule == spec.Restricted {
+ allowJoinedToRoomIDs = append(allowJoinedToRoomIDs, restrictedJoinRuleAllowedRooms(ctx, joinRuleEv)...)
+ }
+ }
+
+ // check if server is joined to any allowed room
+ for _, allowedRoomID := range allowJoinedToRoomIDs {
+ var queryRes fs.QueryJoinedHostServerNamesInRoomResponse
+ err = querier.FSAPI.QueryJoinedHostServerNamesInRoom(ctx, &fs.QueryJoinedHostServerNamesInRoomRequest{
+ RoomID: allowedRoomID.String(),
+ }, &queryRes)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).Error("failed to QueryJoinedHostServerNamesInRoom")
+ continue
+ }
+ for _, srv := range queryRes.ServerNames {
+ if srv == callerServerName {
+ return true
+ }
+ }
+ }
+
+ return false
+}
+
+// authorisedUser returns true iff the user is invited/joined this room or the room is world_readable
+// or if the room has a public or knock join rule.
+// Failing that, if the room has a restricted join rule and belongs to the space parent listed, it will return true.
+func authorisedUser(ctx context.Context, querier *Queryer, clientCaller *userapi.Device, roomID spec.RoomID, parentRoomID *spec.RoomID) (authed bool, isJoinedOrInvited bool) {
+ hisVisTuple := gomatrixserverlib.StateKeyTuple{
+ EventType: spec.MRoomHistoryVisibility,
+ StateKey: "",
+ }
+ joinRuleTuple := gomatrixserverlib.StateKeyTuple{
+ EventType: spec.MRoomJoinRules,
+ StateKey: "",
+ }
+ roomMemberTuple := gomatrixserverlib.StateKeyTuple{
+ EventType: spec.MRoomMember,
+ StateKey: clientCaller.UserID,
+ }
+ var queryRes roomserver.QueryCurrentStateResponse
+ err := querier.QueryCurrentState(ctx, &roomserver.QueryCurrentStateRequest{
+ RoomID: roomID.String(),
+ StateTuples: []gomatrixserverlib.StateKeyTuple{
+ hisVisTuple, joinRuleTuple, roomMemberTuple,
+ },
+ }, &queryRes)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).Error("failed to QueryCurrentState")
+ return false, false
+ }
+ memberEv := queryRes.StateEvents[roomMemberTuple]
+ if memberEv != nil {
+ membership, _ := memberEv.Membership()
+ if membership == spec.Join || membership == spec.Invite {
+ return true, true
+ }
+ }
+ hisVisEv := queryRes.StateEvents[hisVisTuple]
+ if hisVisEv != nil {
+ hisVis, _ := hisVisEv.HistoryVisibility()
+ if hisVis == "world_readable" {
+ return true, false
+ }
+ }
+ joinRuleEv := queryRes.StateEvents[joinRuleTuple]
+ if parentRoomID != nil && joinRuleEv != nil {
+ var allowed bool
+ rule, ruleErr := joinRuleEv.JoinRule()
+ if ruleErr != nil {
+ util.GetLogger(ctx).WithError(ruleErr).WithField("parent_room_id", parentRoomID).Warn("failed to get join rule")
+ } else if rule == spec.Public || rule == spec.Knock {
+ allowed = true
+ } else if rule == spec.Restricted {
+ allowedRoomIDs := restrictedJoinRuleAllowedRooms(ctx, joinRuleEv)
+ // check parent is in the allowed set
+ for _, a := range allowedRoomIDs {
+ if *parentRoomID == a {
+ allowed = true
+ break
+ }
+ }
+ }
+ if allowed {
+ // ensure caller is joined to the parent room
+ var queryRes2 roomserver.QueryCurrentStateResponse
+ err = querier.QueryCurrentState(ctx, &roomserver.QueryCurrentStateRequest{
+ RoomID: parentRoomID.String(),
+ StateTuples: []gomatrixserverlib.StateKeyTuple{
+ roomMemberTuple,
+ },
+ }, &queryRes2)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).WithField("parent_room_id", parentRoomID).Warn("failed to check user is joined to parent room")
+ } else {
+ memberEv = queryRes2.StateEvents[roomMemberTuple]
+ if memberEv != nil {
+ membership, _ := memberEv.Membership()
+ if membership == spec.Join {
+ return true, false
+ }
+ }
+ }
+ }
+ }
+ return false, false
+}
+
+// helper function to fetch a state event
+func stateEvent(ctx context.Context, querier *Queryer, roomID spec.RoomID, evType, stateKey string) *types.HeaderedEvent {
+ var queryRes roomserver.QueryCurrentStateResponse
+ tuple := gomatrixserverlib.StateKeyTuple{
+ EventType: evType,
+ StateKey: stateKey,
+ }
+ err := querier.QueryCurrentState(ctx, &roomserver.QueryCurrentStateRequest{
+ RoomID: roomID.String(),
+ StateTuples: []gomatrixserverlib.StateKeyTuple{tuple},
+ }, &queryRes)
+ if err != nil {
+ return nil
+ }
+ return queryRes.StateEvents[tuple]
+}
+
+// returns true if the current server is participating in the provided room
+func roomExists(ctx context.Context, querier *Queryer, roomID spec.RoomID) bool {
+ var queryRes roomserver.QueryServerJoinedToRoomResponse
+ err := querier.QueryServerJoinedToRoom(ctx, &roomserver.QueryServerJoinedToRoomRequest{
+ RoomID: roomID.String(),
+ ServerName: querier.Cfg.Global.ServerName,
+ }, &queryRes)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).Error("failed to QueryServerJoinedToRoom")
+ return false
+ }
+ // if the room exists but we aren't in the room then we might have stale data so we want to fetch
+ // it fresh via federation
+ return queryRes.RoomExists && queryRes.IsInRoom
+}
+
+// federatedRoomInfo returns more of the spaces graph from another server. Returns nil if this was
+// unsuccessful.
+func federatedRoomInfo(ctx context.Context, querier *Queryer, caller types.DeviceOrServerName, suggestedOnly bool, roomID spec.RoomID, vias []string) *fclient.RoomHierarchyResponse {
+ // only do federated requests for client requests
+ if caller.Device() == nil {
+ return nil
+ }
+ resp, ok := querier.Cache.GetRoomHierarchy(roomID.String())
+ if ok {
+ util.GetLogger(ctx).Debugf("Returning cached response for %s", roomID)
+ return &resp
+ }
+ util.GetLogger(ctx).Debugf("Querying %s via %+v", roomID, vias)
+ innerCtx := context.Background()
+ // query more of the spaces graph using these servers
+ for _, serverName := range vias {
+ if serverName == string(querier.Cfg.Global.ServerName) {
+ continue
+ }
+ res, err := querier.FSAPI.RoomHierarchies(innerCtx, querier.Cfg.Global.ServerName, spec.ServerName(serverName), roomID.String(), suggestedOnly)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).Warnf("failed to call RoomHierarchies on server %s", serverName)
+ continue
+ }
+ // ensure nil slices are empty as we send this to the client sometimes
+ if res.Room.ChildrenState == nil {
+ res.Room.ChildrenState = []fclient.RoomHierarchyStrippedEvent{}
+ }
+ for i := 0; i < len(res.Children); i++ {
+ child := res.Children[i]
+ if child.ChildrenState == nil {
+ child.ChildrenState = []fclient.RoomHierarchyStrippedEvent{}
+ }
+ res.Children[i] = child
+ }
+ querier.Cache.StoreRoomHierarchy(roomID.String(), res)
+
+ return &res
+ }
+ return nil
+}
+
+// references returns all child references pointing to or from this room.
+func childReferences(ctx context.Context, querier *Queryer, suggestedOnly bool, roomID spec.RoomID) ([]fclient.RoomHierarchyStrippedEvent, error) {
+ createTuple := gomatrixserverlib.StateKeyTuple{
+ EventType: spec.MRoomCreate,
+ StateKey: "",
+ }
+ var res roomserver.QueryCurrentStateResponse
+ err := querier.QueryCurrentState(context.Background(), &roomserver.QueryCurrentStateRequest{
+ RoomID: roomID.String(),
+ AllowWildcards: true,
+ StateTuples: []gomatrixserverlib.StateKeyTuple{
+ createTuple, {
+ EventType: spec.MSpaceChild,
+ StateKey: "*",
+ },
+ },
+ }, &res)
+ if err != nil {
+ return nil, err
+ }
+
+ // don't return any child refs if the room is not a space room
+ if create := res.StateEvents[createTuple]; create != nil {
+ var createContent gomatrixserverlib.CreateContent
+ err := json.Unmarshal(create.Content(), &createContent)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).WithField("create_content", create.Content()).Warn("failed to unmarshal m.room.create event")
+ }
+ roomType := createContent.RoomType
+ if roomType != spec.MSpace {
+ return []fclient.RoomHierarchyStrippedEvent{}, nil
+ }
+ }
+ delete(res.StateEvents, createTuple)
+
+ el := make([]fclient.RoomHierarchyStrippedEvent, 0, len(res.StateEvents))
+ for _, ev := range res.StateEvents {
+ content := gjson.ParseBytes(ev.Content())
+ // only return events that have a `via` key as per MSC1772
+ // else we'll incorrectly walk redacted events (as the link
+ // is in the state_key)
+ if content.Get("via").Exists() {
+ strip := stripped(ev.PDU)
+ if strip == nil {
+ continue
+ }
+ // if suggested only and this child isn't suggested, skip it.
+ // if suggested only = false we include everything so don't need to check the content.
+ if suggestedOnly && !content.Get("suggested").Bool() {
+ continue
+ }
+ el = append(el, *strip)
+ }
+ }
+ // sort by origin_server_ts as per MSC2946
+ sort.Slice(el, func(i, j int) bool {
+ return el[i].OriginServerTS < el[j].OriginServerTS
+ })
+
+ return el, nil
+}
+
+// fetch public room information for provided room
+func publicRoomsChunk(ctx context.Context, querier *Queryer, roomID spec.RoomID) *fclient.PublicRoom {
+ pubRooms, err := roomserver.PopulatePublicRooms(ctx, []string{roomID.String()}, querier)
+ if err != nil {
+ util.GetLogger(ctx).WithError(err).Error("failed to PopulatePublicRooms")
+ return nil
+ }
+ if len(pubRooms) == 0 {
+ return nil
+ }
+ return &pubRooms[0]
+}
+
+func stripped(ev gomatrixserverlib.PDU) *fclient.RoomHierarchyStrippedEvent {
+ if ev.StateKey() == nil {
+ return nil
+ }
+ return &fclient.RoomHierarchyStrippedEvent{
+ Type: ev.Type(),
+ StateKey: *ev.StateKey(),
+ Content: ev.Content(),
+ Sender: string(ev.SenderID()),
+ OriginServerTS: ev.OriginServerTS(),
+ }
+}
+
+// given join_rule event, return list of rooms where membership of that room allows joining.
+func restrictedJoinRuleAllowedRooms(ctx context.Context, joinRuleEv *types.HeaderedEvent) (allows []spec.RoomID) {
+ rule, _ := joinRuleEv.JoinRule()
+ if rule != spec.Restricted {
+ return nil
+ }
+ var jrContent gomatrixserverlib.JoinRuleContent
+ if err := json.Unmarshal(joinRuleEv.Content(), &jrContent); err != nil {
+ util.GetLogger(ctx).Warnf("failed to check join_rule on room %s: %s", joinRuleEv.RoomID(), err)
+ return nil
+ }
+ for _, allow := range jrContent.Allow {
+ if allow.Type == spec.MRoomMembership {
+ allowedRoomID, err := spec.NewRoomID(allow.RoomID)
+ if err != nil {
+ util.GetLogger(ctx).Warnf("invalid room ID '%s' found in join_rule on room %s: %s", allow.RoomID, joinRuleEv.RoomID(), err)
+ } else {
+ allows = append(allows, *allowedRoomID)
+ }
+ }
+ }
+ return
+}
diff --git a/roomserver/roomserver.go b/roomserver/roomserver.go
index 1d6824f1..07c5d656 100644
--- a/roomserver/roomserver.go
+++ b/roomserver/roomserver.go
@@ -28,6 +28,9 @@ import (
)
// NewInternalAPI returns a concrete implementation of the internal API.
+//
+// Many of the methods provided by this API depend on access to a federation API, and so
+// you may wish to call `SetFederationAPI` on the returned struct to avoid nil-dereference errors.
func NewInternalAPI(
processContext *process.ProcessContext,
cfg *config.Dendrite,
diff --git a/roomserver/roomserver_test.go b/roomserver/roomserver_test.go
index 76b21ad2..ce0721be 100644
--- a/roomserver/roomserver_test.go
+++ b/roomserver/roomserver_test.go
@@ -249,13 +249,14 @@ func TestPurgeRoom(t *testing.T) {
defer jetstream.DeleteAllStreams(jsCtx, &cfg.Global.JetStream)
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
- userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
// this starts the JetStream consumers
- syncapi.AddPublicRoutes(processCtx, routers, cfg, cm, &natsInstance, userAPI, rsAPI, caches, caching.DisableMetrics)
fsAPI := federationapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, nil, rsAPI, caches, nil, true)
rsAPI.SetFederationAPI(fsAPI, nil)
+ userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
+ syncapi.AddPublicRoutes(processCtx, routers, cfg, cm, &natsInstance, userAPI, rsAPI, caches, caching.DisableMetrics)
+
// Create the room
if err = api.SendEvents(ctx, rsAPI, api.KindNew, room.Events(), "test", "test", "test", nil, false); err != nil {
t.Fatalf("failed to send events: %v", err)
@@ -1035,8 +1036,8 @@ func TestUpgrade(t *testing.T) {
caches := caching.NewRistrettoCache(128*1024*1024, time.Hour, caching.DisableMetrics)
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
- userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
rsAPI.SetFederationAPI(nil, nil)
+ userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
rsAPI.SetUserAPI(userAPI)
for _, tc := range testCases {
diff --git a/roomserver/types/types.go b/roomserver/types/types.go
index 45a3e25f..fbff2cda 100644
--- a/roomserver/types/types.go
+++ b/roomserver/types/types.go
@@ -22,7 +22,9 @@ import (
"strings"
"sync"
+ userapi "github.com/matrix-org/dendrite/userapi/api"
"github.com/matrix-org/gomatrixserverlib"
+ "github.com/matrix-org/gomatrixserverlib/spec"
"github.com/matrix-org/util"
"golang.org/x/crypto/blake2b"
)
@@ -336,3 +338,36 @@ func (r *RoomInfo) CopyFrom(r2 *RoomInfo) {
}
var ErrorInvalidRoomInfo = fmt.Errorf("room info is invalid")
+
+// Struct to represent a device or a server name.
+//
+// May be used to designate a caller for functions that can be called
+// by a client (device) or by a server (server name).
+//
+// Exactly 1 of Device() and ServerName() will return a non-nil result.
+type DeviceOrServerName struct {
+ device *userapi.Device
+ serverName *spec.ServerName
+}
+
+func NewDeviceNotServerName(device userapi.Device) DeviceOrServerName {
+ return DeviceOrServerName{
+ device: &device,
+ serverName: nil,
+ }
+}
+
+func NewServerNameNotDevice(serverName spec.ServerName) DeviceOrServerName {
+ return DeviceOrServerName{
+ device: nil,
+ serverName: &serverName,
+ }
+}
+
+func (s *DeviceOrServerName) Device() *userapi.Device {
+ return s.device
+}
+
+func (s *DeviceOrServerName) ServerName() *spec.ServerName {
+ return s.serverName
+}