2021-09-20 14:56:23 +02:00
# Copyright 2016-2021 The Matrix.org Foundation C.I.C.
2014-08-12 16:10:52 +02:00
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
2014-08-13 04:14:34 +02:00
2021-11-09 14:11:47 +01:00
""" Contains functions for performing actions on rooms. """
2018-07-27 16:12:50 +02:00
import itertools
2018-07-09 08:09:20 +02:00
import logging
import math
2020-08-20 21:07:42 +02:00
import random
2018-07-09 08:09:20 +02:00
import string
from collections import OrderedDict
2022-08-31 14:10:25 +02:00
from http import HTTPStatus
2023-09-15 15:37:44 +02:00
from typing import TYPE_CHECKING , Any , Awaitable , Callable , Dict , List , Optional , Tuple
2014-08-12 16:10:52 +02:00
2022-01-26 14:27:04 +01:00
import attr
2021-11-09 14:11:47 +01:00
from typing_extensions import TypedDict
2022-05-16 15:06:04 +02:00
import synapse . events . snapshot
2020-06-10 18:44:34 +02:00
from synapse . api . constants import (
2023-02-01 22:35:24 +01:00
Direction ,
2021-09-06 13:17:16 +02:00
EventContentFields ,
2020-06-10 18:44:34 +02:00
EventTypes ,
2021-09-06 13:17:16 +02:00
GuestAccess ,
2020-12-16 14:46:37 +01:00
HistoryVisibility ,
2020-06-10 18:44:34 +02:00
JoinRules ,
2020-07-14 13:36:23 +02:00
Membership ,
2020-06-10 18:44:34 +02:00
RoomCreationPreset ,
RoomEncryptionAlgorithms ,
2021-09-10 13:30:05 +02:00
RoomTypes ,
2020-06-10 18:44:34 +02:00
)
2021-05-12 16:05:28 +02:00
from synapse . api . errors import (
AuthError ,
Codes ,
LimitExceededError ,
NotFoundError ,
2023-02-11 00:31:05 +01:00
PartialStateConflictError ,
2021-05-12 16:05:28 +02:00
StoreError ,
SynapseError ,
)
2020-08-14 15:47:53 +02:00
from synapse . api . filtering import Filter
2020-01-27 15:30:57 +01:00
from synapse . api . room_versions import KNOWN_ROOM_VERSIONS , RoomVersion
Split `event_auth.check` into two parts (#10940)
Broadly, the existing `event_auth.check` function has two parts:
* a validation section: checks that the event isn't too big, that it has the rught signatures, etc.
This bit is independent of the rest of the state in the room, and so need only be done once
for each event.
* an auth section: ensures that the event is allowed, given the rest of the state in the room.
This gets done multiple times, against various sets of room state, because it forms part of
the state res algorithm.
Currently, this is implemented with `do_sig_check` and `do_size_check` parameters, but I think
that makes everything hard to follow. Instead, we split the function in two and call each part
separately where it is needed.
2021-09-29 19:59:15 +02:00
from synapse . event_auth import validate_event_for_room_version
2020-08-14 15:47:53 +02:00
from synapse . events import EventBase
2023-02-24 22:15:29 +01:00
from synapse . events . snapshot import UnpersistedEventContext
2022-05-07 14:37:29 +02:00
from synapse . events . utils import copy_and_fixup_power_levels_contents
2022-03-18 18:49:32 +01:00
from synapse . handlers . relations import BundledAggregations
2021-01-28 12:27:30 +01:00
from synapse . rest . admin . _base import assert_user_is_admin
2021-09-21 19:34:26 +02:00
from synapse . streams import EventSource
2020-01-16 14:31:22 +01:00
from synapse . types import (
2020-08-14 15:47:53 +02:00
JsonDict ,
2023-09-15 15:37:44 +02:00
JsonMapping ,
2020-08-28 13:28:53 +02:00
MutableStateMap ,
2020-01-16 14:31:22 +01:00
Requester ,
RoomAlias ,
RoomID ,
RoomStreamToken ,
StateMap ,
2023-01-26 18:31:58 +01:00
StrCollection ,
2022-05-16 17:35:31 +02:00
StreamKeyType ,
2020-01-16 14:31:22 +01:00
StreamToken ,
UserID ,
2020-07-14 13:36:23 +02:00
create_requester ,
2020-01-16 14:31:22 +01:00
)
2022-12-12 17:19:30 +01:00
from synapse . types . state import StateFilter
2016-04-01 15:06:00 +02:00
from synapse . util import stringutils
2019-06-25 15:19:21 +02:00
from synapse . util . caches . response_cache import ResponseCache
2021-01-20 14:15:14 +01:00
from synapse . util . stringutils import parse_and_validate_server_name
2016-05-11 14:42:37 +02:00
from synapse . visibility import filter_events_for_client
2014-08-12 16:10:52 +02:00
2020-08-14 15:47:53 +02:00
if TYPE_CHECKING :
from synapse . server import HomeServer
2014-08-12 16:10:52 +02:00
logger = logging . getLogger ( __name__ )
2015-11-05 17:43:19 +01:00
id_server_scheme = " https:// "
2019-06-25 15:19:21 +02:00
FIVE_MINUTES_IN_MS = 5 * 60 * 1000
2014-08-12 16:10:52 +02:00
2022-01-26 14:27:04 +01:00
@attr.s ( slots = True , frozen = True , auto_attribs = True )
class EventContext :
events_before : List [ EventBase ]
event : EventBase
events_after : List [ EventBase ]
state : List [ EventBase ]
aggregations : Dict [ str , BundledAggregations ]
start : str
end : str
2021-10-08 13:44:43 +02:00
class RoomCreationHandler :
2020-08-14 15:47:53 +02:00
def __init__ ( self , hs : " HomeServer " ) :
2022-02-23 12:04:02 +01:00
self . store = hs . get_datastores ( ) . main
2022-06-01 17:02:53 +02:00
self . _storage_controllers = hs . get_storage_controllers ( )
2021-10-08 13:44:43 +02:00
self . auth = hs . get_auth ( )
2022-06-14 10:51:15 +02:00
self . auth_blocking = hs . get_auth_blocking ( )
2021-10-08 13:44:43 +02:00
self . clock = hs . get_clock ( )
self . hs = hs
2023-04-18 02:57:40 +02:00
self . _spam_checker_module_callbacks = hs . get_module_api_callbacks ( ) . spam_checker
2018-01-15 17:52:07 +01:00
self . event_creation_handler = hs . get_event_creation_handler ( )
2018-10-25 18:42:37 +02:00
self . room_member_handler = hs . get_room_member_handler ( )
2021-07-01 20:25:37 +02:00
self . _event_auth_handler = hs . get_event_auth_handler ( )
2019-05-23 16:00:20 +02:00
self . config = hs . config
2021-10-08 13:44:43 +02:00
self . request_ratelimiter = hs . get_request_ratelimiter ( )
2017-10-04 11:47:54 +02:00
2020-06-10 18:44:34 +02:00
# Room state based off defined presets
2021-07-16 19:22:36 +02:00
self . _presets_dict : Dict [ str , Dict [ str , Any ] ] = {
2020-06-10 18:44:34 +02:00
RoomCreationPreset . PRIVATE_CHAT : {
" join_rules " : JoinRules . INVITE ,
2020-12-16 14:46:37 +01:00
" history_visibility " : HistoryVisibility . SHARED ,
2020-06-10 18:44:34 +02:00
" original_invitees_have_ops " : False ,
" guest_can_join " : True ,
" power_level_content_override " : { " invite " : 0 } ,
} ,
RoomCreationPreset . TRUSTED_PRIVATE_CHAT : {
" join_rules " : JoinRules . INVITE ,
2020-12-16 14:46:37 +01:00
" history_visibility " : HistoryVisibility . SHARED ,
2020-06-10 18:44:34 +02:00
" original_invitees_have_ops " : True ,
" guest_can_join " : True ,
" power_level_content_override " : { " invite " : 0 } ,
} ,
RoomCreationPreset . PUBLIC_CHAT : {
" join_rules " : JoinRules . PUBLIC ,
2020-12-16 14:46:37 +01:00
" history_visibility " : HistoryVisibility . SHARED ,
2020-06-10 18:44:34 +02:00
" original_invitees_have_ops " : False ,
" guest_can_join " : False ,
" power_level_content_override " : { } ,
} ,
2021-07-16 19:22:36 +02:00
}
2020-06-10 18:44:34 +02:00
# Modify presets to selectively enable encryption by default per homeserver config
for preset_name , preset_config in self . _presets_dict . items ( ) :
encrypted = (
preset_name
2021-09-24 13:25:21 +02:00
in self . config . room . encryption_enabled_by_default_for_room_presets
2020-06-10 18:44:34 +02:00
)
preset_config [ " encrypted " ] = encrypted
2022-05-12 12:41:35 +02:00
self . _default_power_level_content_override = (
self . config . room . default_power_level_content_override
)
2020-05-22 17:11:35 +02:00
self . _replication = hs . get_replication_data_handler ( )
2019-06-25 15:19:21 +02:00
# If a user tries to update the same room multiple times in quick
# succession, only process the first attempt and return its result to
# subsequent requests
2021-07-16 19:22:36 +02:00
self . _upgrade_response_cache : ResponseCache [ Tuple [ str , str ] ] = ResponseCache (
2021-03-08 20:00:07 +01:00
hs . get_clock ( ) , " room_upgrade " , timeout_ms = FIVE_MINUTES_IN_MS
2021-07-16 19:22:36 +02:00
)
2021-09-24 13:25:21 +02:00
self . _server_notices_mxid = hs . config . servernotices . server_notices_mxid
2019-06-17 16:48:57 +02:00
2023-05-04 16:18:22 +02:00
self . _third_party_event_rules = (
hs . get_module_api_callbacks ( ) . third_party_event_rules
)
2019-06-17 16:48:57 +02:00
2020-05-04 13:43:52 +02:00
async def upgrade_room (
2020-01-27 15:30:57 +01:00
self , requester : Requester , old_room_id : str , new_version : RoomVersion
2020-07-24 16:53:25 +02:00
) - > str :
2018-08-22 11:57:54 +02:00
""" Replace a room with a new room with a different version
Args :
2020-01-27 15:30:57 +01:00
requester : the user requesting the upgrade
old_room_id : the id of the room to be replaced
new_version : the new room version to use
2018-08-22 11:57:54 +02:00
Returns :
2020-07-24 16:53:25 +02:00
the new room id
2020-08-24 19:58:56 +02:00
Raises :
ShadowBanError if the requester is shadow - banned .
2018-08-22 11:57:54 +02:00
"""
2021-10-08 13:44:43 +02:00
await self . request_ratelimiter . ratelimit ( requester )
2018-08-22 11:57:54 +02:00
user_id = requester . user . to_string ( )
2019-06-25 15:19:21 +02:00
# Check if this room is already being upgraded by another person
2021-12-20 19:12:08 +01:00
for key in self . _upgrade_response_cache . keys ( ) :
2019-06-25 15:19:21 +02:00
if key [ 0 ] == old_room_id and key [ 1 ] != user_id :
# Two different people are trying to upgrade the same room.
# Send the second an error.
#
# Note that this of course only gets caught if both users are
# on the same homeserver.
raise SynapseError (
400 , " An upgrade for this room is currently in progress "
2018-08-22 11:57:54 +02:00
)
2022-05-16 15:06:04 +02:00
# Check whether the room exists and 404 if it doesn't.
# We could go straight for the auth check, but that will raise a 403 instead.
old_room = await self . store . get_room ( old_room_id )
if old_room is None :
raise NotFoundError ( " Unknown room id %s " % ( old_room_id , ) )
new_room_id = self . _generate_room_id ( )
2022-12-15 17:04:23 +01:00
# Try several times, it could fail with PartialStateConflictError
# in _upgrade_room, cf comment in except block.
max_retries = 5
for i in range ( max_retries ) :
try :
# Check whether the user has the power level to carry out the upgrade.
# `check_auth_rules_from_context` will check that they are in the room and have
# the required power level to send the tombstone event.
(
tombstone_event ,
2023-02-24 22:15:29 +01:00
tombstone_unpersisted_context ,
2022-12-15 17:04:23 +01:00
) = await self . event_creation_handler . create_event (
requester ,
{
" type " : EventTypes . Tombstone ,
" state_key " : " " ,
" room_id " : old_room_id ,
" sender " : user_id ,
" content " : {
" body " : " This room has been replaced " ,
" replacement_room " : new_room_id ,
} ,
} ,
)
2023-02-24 22:15:29 +01:00
tombstone_context = await tombstone_unpersisted_context . persist (
tombstone_event
)
2022-12-15 17:04:23 +01:00
validate_event_for_room_version ( tombstone_event )
await self . _event_auth_handler . check_auth_rules_from_context (
tombstone_event
)
2022-05-16 15:06:04 +02:00
2022-12-15 17:04:23 +01:00
# Upgrade the room
#
# If this user has sent multiple upgrade requests for the same room
# and one of them is not complete yet, cache the response and
# return it to all subsequent requests
ret = await self . _upgrade_response_cache . wrap (
( old_room_id , user_id ) ,
self . _upgrade_room ,
requester ,
old_room_id ,
old_room , # args for _upgrade_room
new_room_id ,
new_version ,
tombstone_event ,
tombstone_context ,
)
return ret
except PartialStateConflictError as e :
# Clean up the cache so we can retry properly
self . _upgrade_response_cache . unset ( ( old_room_id , user_id ) )
# Persisting couldn't happen because the room got un-partial stated
# in the meantime and context needs to be recomputed, so let's do so.
if i == max_retries - 1 :
raise e
2019-11-01 11:28:09 +01:00
2022-12-15 17:04:23 +01:00
# This is to satisfy mypy and should never happen
raise PartialStateConflictError ( )
2018-08-22 11:57:54 +02:00
2020-05-01 16:15:36 +02:00
async def _upgrade_room (
2022-05-16 15:06:04 +02:00
self ,
requester : Requester ,
old_room_id : str ,
2023-11-09 17:13:31 +01:00
old_room : Tuple [ bool , str , bool ] ,
2022-05-16 15:06:04 +02:00
new_room_id : str ,
new_version : RoomVersion ,
tombstone_event : EventBase ,
tombstone_context : synapse . events . snapshot . EventContext ,
2021-09-20 14:56:23 +02:00
) - > str :
2020-08-24 19:58:56 +02:00
"""
Args :
requester : the user requesting the upgrade
old_room_id : the id of the room to be replaced
2023-11-09 17:13:31 +01:00
old_room : a tuple containing room information for the room to be replaced ,
2022-05-16 15:06:04 +02:00
as returned by ` RoomWorkerStore . get_room ` .
new_room_id : the id of the replacement room
new_version : the version to upgrade the room to
tombstone_event : the tombstone event to send to the old room
tombstone_context : the context for the tombstone event
2020-08-24 19:58:56 +02:00
Raises :
ShadowBanError if the requester is shadow - banned .
"""
2019-06-25 15:19:21 +02:00
user_id = requester . user . to_string ( )
2020-10-05 20:00:50 +02:00
assert self . hs . is_mine_id ( user_id ) , " User must be our own: %s " % ( user_id , )
2018-08-22 11:57:54 +02:00
2019-06-25 15:19:21 +02:00
logger . info ( " Creating new room %s to replace %s " , new_room_id , old_room_id )
2018-10-26 16:11:35 +02:00
2022-05-16 15:06:04 +02:00
# create the new room. may raise a `StoreError` in the exceedingly unlikely
# event of a room ID collision.
await self . store . store_room (
room_id = new_room_id ,
room_creator_user_id = user_id ,
2023-11-09 17:13:31 +01:00
is_public = old_room [ 0 ] ,
2022-05-16 15:06:04 +02:00
room_version = new_version ,
2019-06-25 15:19:21 +02:00
)
2020-05-01 16:15:36 +02:00
await self . clone_existing_room (
2019-06-25 15:19:21 +02:00
requester ,
old_room_id = old_room_id ,
new_room_id = new_room_id ,
new_room_version = new_version ,
tombstone_event_id = tombstone_event . event_id ,
)
# now send the tombstone
2020-10-02 19:10:55 +02:00
await self . event_creation_handler . handle_new_client_event (
2021-02-16 23:32:34 +01:00
requester = requester ,
2022-09-28 12:11:48 +02:00
events_and_context = [ ( tombstone_event , tombstone_context ) ] ,
2019-06-25 15:19:21 +02:00
)
2022-05-20 10:54:12 +02:00
state_filter = StateFilter . from_types (
[ ( EventTypes . CanonicalAlias , " " ) , ( EventTypes . PowerLevels , " " ) ]
)
old_room_state = await tombstone_context . get_current_state_ids ( state_filter )
2019-06-25 15:19:21 +02:00
2020-08-14 15:47:53 +02:00
# We know the tombstone event isn't an outlier so it has current state.
assert old_room_state is not None
2019-06-25 15:19:21 +02:00
# update any aliases
2020-05-01 16:15:36 +02:00
await self . _move_aliases_to_new_room (
2019-06-25 15:19:21 +02:00
requester , old_room_id , new_room_id , old_room_state
)
2019-11-01 11:28:09 +01:00
# Copy over user push rules, tags and migrate room directory state
2020-05-01 16:15:36 +02:00
await self . room_member_handler . transfer_room_state_on_room_upgrade (
2019-11-01 11:28:09 +01:00
old_room_id , new_room_id
)
# finally, shut down the PLs in the old room, and update them in the new
2019-06-25 15:19:21 +02:00
# room.
2020-05-01 16:15:36 +02:00
await self . _update_upgraded_room_pls (
2021-02-16 23:32:34 +01:00
requester ,
old_room_id ,
new_room_id ,
old_room_state ,
2019-06-25 15:19:21 +02:00
)
2019-07-23 15:00:55 +02:00
return new_room_id
2018-10-27 00:47:37 +02:00
2020-05-01 16:15:36 +02:00
async def _update_upgraded_room_pls (
2020-01-16 14:31:22 +01:00
self ,
requester : Requester ,
old_room_id : str ,
new_room_id : str ,
old_room_state : StateMap [ str ] ,
2020-07-24 16:53:25 +02:00
) - > None :
2018-10-27 00:47:37 +02:00
""" Send updated power levels in both rooms after an upgrade
Args :
2020-01-16 14:31:22 +01:00
requester : the user requesting the upgrade
old_room_id : the id of the room to be replaced
new_room_id : the id of the replacement room
old_room_state : the state map for the old room
2020-08-24 19:58:56 +02:00
Raises :
ShadowBanError if the requester is shadow - banned .
2018-10-27 00:47:37 +02:00
"""
old_room_pl_event_id = old_room_state . get ( ( EventTypes . PowerLevels , " " ) )
if old_room_pl_event_id is None :
logger . warning (
" Not supported: upgrading a room with no PL event. Not setting PLs "
2019-06-20 11:32:02 +02:00
" in old room. "
2018-10-27 00:47:37 +02:00
)
return
2020-05-01 16:15:36 +02:00
old_room_pl_state = await self . store . get_event ( old_room_pl_event_id )
2018-10-27 00:47:37 +02:00
# we try to stop regular users from speaking by setting the PL required
# to send regular events and invites to 'Moderator' level. That's normally
# 50, but if the default PL in a room is 50 or more, then we set the
# required PL above that.
2022-05-07 14:37:29 +02:00
pl_content = copy_and_fixup_power_levels_contents ( old_room_pl_state . content )
users_default : int = pl_content . get ( " users_default " , 0 ) # type: ignore[assignment]
2018-10-27 00:47:37 +02:00
restricted_level = max ( users_default + 1 , 50 )
updated = False
for v in ( " invite " , " events_default " ) :
2022-05-07 14:37:29 +02:00
current : int = pl_content . get ( v , 0 ) # type: ignore[assignment]
2018-10-27 00:47:37 +02:00
if current < restricted_level :
2020-02-06 14:31:05 +01:00
logger . debug (
2018-10-27 00:47:37 +02:00
" Setting level for %s in %s to %i (was %i ) " ,
2019-06-20 11:32:02 +02:00
v ,
old_room_id ,
restricted_level ,
current ,
2018-10-25 00:14:36 +02:00
)
2018-10-27 00:47:37 +02:00
pl_content [ v ] = restricted_level
updated = True
2018-10-25 00:14:36 +02:00
else :
2020-02-06 14:31:05 +01:00
logger . debug ( " Not setting level for %s (already %i ) " , v , current )
2018-10-27 00:47:37 +02:00
if updated :
try :
2020-05-01 16:15:36 +02:00
await self . event_creation_handler . create_and_send_nonmember_event (
2019-06-20 11:32:02 +02:00
requester ,
{
2018-10-27 00:47:37 +02:00
" type " : EventTypes . PowerLevels ,
2019-06-20 11:32:02 +02:00
" state_key " : " " ,
2018-10-27 00:47:37 +02:00
" room_id " : old_room_id ,
" sender " : requester . user . to_string ( ) ,
" content " : pl_content ,
2019-06-20 11:32:02 +02:00
} ,
ratelimit = False ,
2018-10-27 00:47:37 +02:00
)
except AuthError as e :
logger . warning ( " Unable to update PLs in old room: %s " , e )
2020-05-01 16:15:36 +02:00
await self . event_creation_handler . create_and_send_nonmember_event (
2019-06-20 11:32:02 +02:00
requester ,
{
2018-10-27 00:47:37 +02:00
" type " : EventTypes . PowerLevels ,
2019-06-20 11:32:02 +02:00
" state_key " : " " ,
2018-10-27 00:47:37 +02:00
" room_id " : new_room_id ,
" sender " : requester . user . to_string ( ) ,
2022-05-07 14:37:29 +02:00
" content " : copy_and_fixup_power_levels_contents (
old_room_pl_state . content
) ,
2019-06-20 11:32:02 +02:00
} ,
ratelimit = False ,
2018-10-27 00:47:37 +02:00
)
2018-08-22 11:57:54 +02:00
2020-05-01 16:15:36 +02:00
async def clone_existing_room (
2020-01-27 15:30:57 +01:00
self ,
requester : Requester ,
old_room_id : str ,
new_room_id : str ,
new_room_version : RoomVersion ,
tombstone_event_id : str ,
2020-07-24 16:53:25 +02:00
) - > None :
2018-08-22 11:57:54 +02:00
""" Populate a new room based on an old room
Args :
2020-01-27 15:30:57 +01:00
requester : the user requesting the upgrade
old_room_id : the id of the room to be replaced
new_room_id : the id to give the new room ( should already have been
2022-05-19 19:32:48 +02:00
created with _generate_room_id ( ) )
2020-01-27 15:30:57 +01:00
new_room_version : the new room version to use
tombstone_event_id : the ID of the tombstone event in the old room .
2018-08-22 11:57:54 +02:00
"""
user_id = requester . user . to_string ( )
2023-04-18 02:57:40 +02:00
spam_check = await self . _spam_checker_module_callbacks . user_may_create_room (
user_id
)
2023-09-15 15:37:44 +02:00
if spam_check != self . _spam_checker_module_callbacks . NOT_SPAM :
2022-07-11 18:52:10 +02:00
raise SynapseError (
403 ,
" You are not permitted to create rooms " ,
errcode = spam_check [ 0 ] ,
additional_fields = spam_check [ 1 ] ,
)
2018-08-22 11:57:54 +02:00
2021-07-16 19:22:36 +02:00
creation_content : JsonDict = {
2020-01-27 15:30:57 +01:00
" room_version " : new_room_version . identifier ,
2019-06-20 11:32:02 +02:00
" predecessor " : { " room_id " : old_room_id , " event_id " : tombstone_event_id } ,
2021-07-16 19:22:36 +02:00
}
2018-08-22 11:57:54 +02:00
2019-01-30 17:33:51 +01:00
# Check if old room was non-federatable
# Get old room's create event
2020-05-01 16:15:36 +02:00
old_room_create_event = await self . store . get_create_event_for_room ( old_room_id )
2019-01-30 17:33:51 +01:00
# Check if the create event specified a non-federatable room
2021-09-08 16:00:43 +02:00
if not old_room_create_event . content . get ( EventContentFields . FEDERATE , True ) :
2019-01-30 17:33:51 +01:00
# If so, mark the new room as non-federatable as well
2021-09-08 16:00:43 +02:00
creation_content [ EventContentFields . FEDERATE ] = False
2019-01-30 17:33:51 +01:00
2020-02-21 13:15:07 +01:00
initial_state = { }
2018-10-12 13:05:18 +02:00
2019-01-17 16:22:03 +01:00
# Replicate relevant room events
2021-09-10 13:30:05 +02:00
types_to_copy : List [ Tuple [ str , Optional [ str ] ] ] = [
2018-10-12 18:05:48 +02:00
( EventTypes . JoinRules , " " ) ,
( EventTypes . Name , " " ) ,
( EventTypes . Topic , " " ) ,
( EventTypes . RoomHistoryVisibility , " " ) ,
2018-10-27 00:56:40 +02:00
( EventTypes . GuestAccess , " " ) ,
( EventTypes . RoomAvatar , " " ) ,
2020-02-04 18:25:54 +01:00
( EventTypes . RoomEncryption , " " ) ,
2019-02-11 12:30:37 +01:00
( EventTypes . ServerACL , " " ) ,
2019-12-02 16:11:32 +01:00
( EventTypes . PowerLevels , " " ) ,
2021-09-10 13:30:05 +02:00
]
2022-05-19 13:28:10 +02:00
# Copy the room type as per MSC3818.
room_type = old_room_create_event . content . get ( EventContentFields . ROOM_TYPE )
if room_type is not None :
creation_content [ EventContentFields . ROOM_TYPE ] = room_type
# If the old room was a space, copy over the rooms in the space.
if room_type == RoomTypes . SPACE :
types_to_copy . append ( ( EventTypes . SpaceChild , None ) )
2018-10-12 18:05:48 +02:00
2022-06-01 17:02:53 +02:00
old_room_state_ids = (
await self . _storage_controllers . state . get_current_state_ids (
old_room_id , StateFilter . from_types ( types_to_copy )
)
2018-10-12 18:05:48 +02:00
)
# map from event_id to BaseEvent
2020-05-01 16:15:36 +02:00
old_room_state_events = await self . store . get_events ( old_room_state_ids . values ( ) )
2018-10-12 18:05:48 +02:00
2020-06-15 13:03:36 +02:00
for k , old_event_id in old_room_state_ids . items ( ) :
2018-10-26 23:51:34 +02:00
old_event = old_room_state_events . get ( old_event_id )
if old_event :
2021-09-10 13:30:05 +02:00
# If the event is an space child event with empty content, it was
# removed from the space and should be ignored.
if k [ 0 ] == EventTypes . SpaceChild and not old_event . content :
continue
2018-10-26 23:51:34 +02:00
initial_state [ k ] = old_event . content
2018-08-22 11:57:54 +02:00
2020-01-28 12:02:55 +01:00
# deep-copy the power-levels event before we start modifying it
# note that if frozen_dicts are enabled, `power_levels` will be a frozen
# dict so we can't just copy.deepcopy it.
initial_state [
( EventTypes . PowerLevels , " " )
2022-05-07 14:37:29 +02:00
] = power_levels = copy_and_fixup_power_levels_contents (
2020-01-28 12:02:55 +01:00
initial_state [ ( EventTypes . PowerLevels , " " ) ]
)
2019-12-02 16:11:32 +01:00
# Resolve the minimum power level required to send any state event
# We will give the upgrading user this power level temporarily (if necessary) such that
# they are able to copy all of the state events over, then revert them back to their
# original power level afterwards in _update_upgraded_room_pls
# Copy over user power levels now as this will not be possible with >100PL users once
# the room has been created
# Calculate the minimum power level needed to clone the room
event_power_levels = power_levels . get ( " events " , { } )
2021-10-13 13:24:07 +02:00
if not isinstance ( event_power_levels , dict ) :
event_power_levels = { }
2021-02-16 14:31:39 +01:00
state_default = power_levels . get ( " state_default " , 50 )
2021-10-13 13:24:07 +02:00
try :
state_default_int = int ( state_default ) # type: ignore[arg-type]
except ( TypeError , ValueError ) :
state_default_int = 50
2021-02-16 14:31:39 +01:00
ban = power_levels . get ( " ban " , 50 )
2021-10-13 13:24:07 +02:00
try :
ban = int ( ban ) # type: ignore[arg-type]
except ( TypeError , ValueError ) :
ban = 50
needed_power_level = max (
state_default_int , ban , max ( event_power_levels . values ( ) )
)
2019-12-02 16:11:32 +01:00
2021-02-16 14:31:39 +01:00
# Get the user's current power level, this matches the logic in get_user_power_level,
# but without the entire state map.
user_power_levels = power_levels . setdefault ( " users " , { } )
2021-10-13 13:24:07 +02:00
if not isinstance ( user_power_levels , dict ) :
user_power_levels = { }
2021-02-16 14:31:39 +01:00
users_default = power_levels . get ( " users_default " , 0 )
current_power_level = user_power_levels . get ( user_id , users_default )
2021-10-13 13:24:07 +02:00
try :
current_power_level_int = int ( current_power_level ) # type: ignore[arg-type]
except ( TypeError , ValueError ) :
current_power_level_int = 0
2019-12-02 16:11:32 +01:00
# Raise the requester's power level in the new room if necessary
2021-10-13 13:24:07 +02:00
if current_power_level_int < needed_power_level :
2021-02-16 14:31:39 +01:00
user_power_levels [ user_id ] = needed_power_level
2019-12-02 16:11:32 +01:00
2020-05-01 16:15:36 +02:00
await self . _send_events_for_new_room (
2018-08-22 11:57:54 +02:00
requester ,
new_room_id ,
2023-04-06 22:26:28 +02:00
new_room_version ,
2018-10-12 18:05:48 +02:00
# we expect to override all the presets with initial_state, so this is
# somewhat arbitrary.
2023-03-09 04:27:20 +01:00
room_config = { " preset " : RoomCreationPreset . PRIVATE_CHAT } ,
2018-08-22 11:57:54 +02:00
invite_list = [ ] ,
initial_state = initial_state ,
creation_content = creation_content ,
)
2019-02-18 15:02:09 +01:00
# Transfer membership events
2022-06-01 17:02:53 +02:00
old_room_member_state_ids = (
await self . _storage_controllers . state . get_current_state_ids (
old_room_id , StateFilter . from_types ( [ ( EventTypes . Member , None ) ] )
)
2019-02-18 17:56:34 +01:00
)
# map from event_id to BaseEvent
2020-05-01 16:15:36 +02:00
old_room_member_state_events = await self . store . get_events (
2019-06-20 11:32:02 +02:00
old_room_member_state_ids . values ( )
2019-02-18 19:23:37 +01:00
)
2020-08-28 15:37:55 +02:00
for old_event in old_room_member_state_events . values ( ) :
2019-02-18 15:02:09 +01:00
# Only transfer ban events
2019-06-20 11:32:02 +02:00
if (
" membership " in old_event . content
and old_event . content [ " membership " ] == " ban "
) :
2020-05-01 16:15:36 +02:00
await self . room_member_handler . update_membership (
2019-02-18 15:02:09 +01:00
requester ,
2021-11-02 14:55:52 +01:00
UserID . from_string ( old_event . state_key ) ,
2019-02-18 15:02:09 +01:00
new_room_id ,
" ban " ,
ratelimit = False ,
content = old_event . content ,
)
2018-08-22 11:57:54 +02:00
# XXX invites/joins
# XXX 3pid invites
2018-10-26 16:11:35 +02:00
2020-05-01 16:15:36 +02:00
async def _move_aliases_to_new_room (
2020-02-20 22:24:04 +01:00
self ,
requester : Requester ,
old_room_id : str ,
new_room_id : str ,
old_room_state : StateMap [ str ] ,
2021-09-20 14:56:23 +02:00
) - > None :
2018-10-26 16:11:35 +02:00
# check to see if we have a canonical alias.
2020-02-20 22:24:04 +01:00
canonical_alias_event = None
2018-10-26 16:11:35 +02:00
canonical_alias_event_id = old_room_state . get ( ( EventTypes . CanonicalAlias , " " ) )
if canonical_alias_event_id :
2020-05-01 16:15:36 +02:00
canonical_alias_event = await self . store . get_event ( canonical_alias_event_id )
2018-10-26 16:11:35 +02:00
2020-05-22 12:41:41 +02:00
await self . store . update_aliases_for_room ( old_room_id , new_room_id )
if not canonical_alias_event :
2018-10-26 16:11:35 +02:00
return
2020-05-22 12:41:41 +02:00
# If there is a canonical alias we need to update the one in the old
# room and set one in the new one.
old_canonical_alias_content = dict ( canonical_alias_event . content )
new_canonical_alias_content = { }
canonical = canonical_alias_event . content . get ( " alias " )
if canonical and self . hs . is_mine_id ( canonical ) :
new_canonical_alias_content [ " alias " ] = canonical
old_canonical_alias_content . pop ( " alias " , None )
# We convert to a list as it will be a Tuple.
old_alt_aliases = list ( old_canonical_alias_content . get ( " alt_aliases " , [ ] ) )
if old_alt_aliases :
old_canonical_alias_content [ " alt_aliases " ] = old_alt_aliases
new_alt_aliases = new_canonical_alias_content . setdefault ( " alt_aliases " , [ ] )
for alias in canonical_alias_event . content . get ( " alt_aliases " , [ ] ) :
try :
if self . hs . is_mine_id ( alias ) :
new_alt_aliases . append ( alias )
old_alt_aliases . remove ( alias )
except Exception :
logger . info (
" Invalid alias %s in canonical alias event %s " ,
alias ,
canonical_alias_event_id ,
)
if not old_alt_aliases :
old_canonical_alias_content . pop ( " alt_aliases " )
2018-10-26 16:11:35 +02:00
2020-02-20 22:24:04 +01:00
# If a canonical alias event existed for the old room, fire a canonical
# alias event for the new room with a copy of the information.
2018-10-26 16:11:35 +02:00
try :
2020-05-22 12:41:41 +02:00
await self . event_creation_handler . create_and_send_nonmember_event (
requester ,
{
" type " : EventTypes . CanonicalAlias ,
" state_key " : " " ,
" room_id " : old_room_id ,
" sender " : requester . user . to_string ( ) ,
" content " : old_canonical_alias_content ,
} ,
ratelimit = False ,
)
except SynapseError as e :
# again I'm not really expecting this to fail, but if it does, I'd rather
# we returned the new room to the client at this point.
logger . error ( " Unable to send updated alias events in old room: %s " , e )
try :
await self . event_creation_handler . create_and_send_nonmember_event (
requester ,
{
" type " : EventTypes . CanonicalAlias ,
" state_key " : " " ,
" room_id " : new_room_id ,
" sender " : requester . user . to_string ( ) ,
" content " : new_canonical_alias_content ,
} ,
ratelimit = False ,
)
2018-10-26 16:11:35 +02:00
except SynapseError as e :
# again I'm not really expecting this to fail, but if it does, I'd rather
# we returned the new room to the client at this point.
2019-06-20 11:32:02 +02:00
logger . error ( " Unable to send updated alias events in new room: %s " , e )
2018-08-22 11:57:54 +02:00
2020-05-01 16:15:36 +02:00
async def create_room (
2020-08-14 15:47:53 +02:00
self ,
requester : Requester ,
config : JsonDict ,
ratelimit : bool = True ,
creator_join_profile : Optional [ JsonDict ] = None ,
2023-02-22 12:07:28 +01:00
) - > Tuple [ str , Optional [ RoomAlias ] , int ] :
2021-02-16 23:32:34 +01:00
""" Creates a new room.
2014-08-12 16:10:52 +02:00
Args :
2023-02-22 12:07:28 +01:00
requester : The user who requested the room creation .
config : A dict of configuration options . This will be the body of
a / createRoom request ; see
https : / / spec . matrix . org / latest / client - server - api / #post_matrixclientv3createroom
2020-08-14 15:47:53 +02:00
ratelimit : set to False to disable the rate limiter
2018-05-17 12:34:28 +02:00
2020-08-14 15:47:53 +02:00
creator_join_profile :
2018-05-17 12:34:28 +02:00
Set to override the displayname and avatar for the creating
user in this room . If unset , displayname and avatar will be
derived from the user ' s profile. If set, should contain the
values to go in the body of the ' join ' event ( typically
` avatar_url ` and / or ` displayname ` .
2014-08-12 16:10:52 +02:00
Returns :
2023-02-22 12:07:28 +01:00
A 3 - tuple containing :
- the room ID ;
- if requested , the room alias , otherwise None ; and
- the ` stream_id ` of the last persisted event .
2014-08-12 16:10:52 +02:00
Raises :
2023-02-22 12:07:28 +01:00
SynapseError :
if the room ID couldn ' t be stored, 3pid invitation config
validation failed , or something went horribly wrong .
ResourceLimitError :
if server is blocked to some resource being
exceeded
2014-08-12 16:10:52 +02:00
"""
2016-02-15 19:13:10 +01:00
user_id = requester . user . to_string ( )
2022-06-14 10:51:15 +02:00
await self . auth_blocking . check_auth_blocking ( requester = requester )
2018-08-16 22:25:16 +02:00
2019-06-20 11:32:02 +02:00
if (
self . _server_notices_mxid is not None
2022-09-28 11:39:03 +02:00
and user_id == self . _server_notices_mxid
2019-06-20 11:32:02 +02:00
) :
2019-06-17 16:48:57 +02:00
# allow the server notices mxid to create rooms
is_requester_admin = True
else :
2022-08-22 15:17:59 +02:00
is_requester_admin = await self . auth . is_server_admin ( requester )
2019-06-17 16:48:57 +02:00
2021-07-20 12:39:46 +02:00
# Let the third party rules modify the room creation config if needed, or abort
# the room creation entirely with an exception.
2023-05-04 16:18:22 +02:00
await self . _third_party_event_rules . on_create_room (
2019-06-20 11:32:02 +02:00
requester , config , is_requester_admin = is_requester_admin
2019-06-17 16:48:57 +02:00
)
2021-09-24 16:38:23 +02:00
invite_3pid_list = config . get ( " invite_3pid " , [ ] )
invite_list = config . get ( " invite " , [ ] )
2022-08-31 14:10:25 +02:00
# validate each entry for correctness
for invite_3pid in invite_3pid_list :
if not all (
key in invite_3pid
for key in ( " medium " , " address " , " id_server " , " id_access_token " )
) :
raise SynapseError (
HTTPStatus . BAD_REQUEST ,
" all of `medium`, `address`, `id_server` and `id_access_token` "
" are required when making a 3pid invite " ,
Codes . MISSING_PARAM ,
)
2022-06-13 20:16:16 +02:00
if not is_requester_admin :
2023-04-18 02:57:40 +02:00
spam_check = await self . _spam_checker_module_callbacks . user_may_create_room (
user_id
)
2023-09-15 15:37:44 +02:00
if spam_check != self . _spam_checker_module_callbacks . NOT_SPAM :
2022-06-13 20:16:16 +02:00
raise SynapseError (
2022-07-11 18:52:10 +02:00
403 ,
" You are not permitted to create rooms " ,
errcode = spam_check [ 0 ] ,
additional_fields = spam_check [ 1 ] ,
2022-06-13 20:16:16 +02:00
)
2017-10-04 11:47:54 +02:00
2017-06-19 15:10:13 +02:00
if ratelimit :
2022-10-28 12:53:34 +02:00
# Rate limit once in advance, but don't rate limit the individual
# events in the room — room creation isn't atomic and it's very
# janky if half the events in the initial state don't make it because
# of rate limiting.
2021-10-08 13:44:43 +02:00
await self . request_ratelimiter . ratelimit ( requester )
2014-08-12 16:10:52 +02:00
2020-01-27 15:30:57 +01:00
room_version_id = config . get (
2021-09-29 12:44:15 +02:00
" room_version " , self . config . server . default_room_version . identifier
2019-05-23 16:00:20 +02:00
)
2020-06-16 14:51:47 +02:00
if not isinstance ( room_version_id , str ) :
2019-06-20 11:32:02 +02:00
raise SynapseError ( 400 , " room_version must be a string " , Codes . BAD_JSON )
2018-07-25 23:10:39 +02:00
2020-01-27 15:30:57 +01:00
room_version = KNOWN_ROOM_VERSIONS . get ( room_version_id )
if room_version is None :
2018-07-25 23:10:39 +02:00
raise SynapseError (
400 ,
" Your homeserver does not support this room version " ,
Codes . UNSUPPORTED_ROOM_VERSION ,
)
2020-08-14 15:47:53 +02:00
room_alias = None
2014-08-12 16:10:52 +02:00
if " room_alias_name " in config :
2015-05-14 14:11:28 +02:00
for wchar in string . whitespace :
if wchar in config [ " room_alias_name " ] :
raise SynapseError ( 400 , " Invalid characters in room alias " )
2022-05-18 13:46:06 +02:00
if " : " in config [ " room_alias_name " ] :
# Prevent someone from trying to pass in a full alias here.
# Note that it's permissible for a room alias to have multiple
# hash symbols at the start (notably bridged over from IRC, too),
# but the first colon in the alias is defined to separate the local
# part from the server name.
# (remember server names can contain port numbers, also separated
# by a colon. But under no circumstances should the local part be
# allowed to contain a colon!)
raise SynapseError (
400 ,
" ' : ' is not permitted in the room alias name. "
" Please note this expects a local part — ' wombat ' , not ' #wombat:example.com ' . " ,
)
2019-06-20 11:32:02 +02:00
room_alias = RoomAlias ( config [ " room_alias_name " ] , self . hs . hostname )
2020-05-01 16:15:36 +02:00
mapping = await self . store . get_association_from_room_alias ( room_alias )
2014-08-12 16:10:52 +02:00
if mapping :
2019-06-20 11:32:02 +02:00
raise SynapseError ( 400 , " Room alias already taken " , Codes . ROOM_IN_USE )
2014-08-12 16:10:52 +02:00
2014-09-06 02:10:07 +02:00
for i in invite_list :
try :
2019-10-10 14:05:48 +02:00
uid = UserID . from_string ( i )
parse_and_validate_server_name ( uid . domain )
2017-10-23 16:52:32 +02:00
except Exception :
2014-09-06 02:10:07 +02:00
raise SynapseError ( 400 , " Invalid user_id: %s " % ( i , ) )
2020-08-20 21:07:42 +02:00
if ( invite_list or invite_3pid_list ) and requester . shadow_banned :
# We randomly sleep a bit just to annoy the requester.
await self . clock . sleep ( random . randint ( 1 , 10 ) )
# Allow the request to go through, but remove any associated invites.
invite_3pid_list = [ ]
invite_list = [ ]
2021-05-12 16:05:28 +02:00
if invite_list or invite_3pid_list :
try :
# If there are invites in the request, see if the ratelimiting settings
# allow that number of invites to be sent from the current user.
await self . room_member_handler . ratelimit_multiple_invites (
requester ,
room_id = None ,
n_invites = len ( invite_list ) + len ( invite_3pid_list ) ,
update = False ,
)
except LimitExceededError :
raise SynapseError ( 400 , " Cannot invite so many users at once " )
2021-01-29 17:38:29 +01:00
2020-05-01 16:15:36 +02:00
await self . event_creation_handler . assert_accepted_privacy_policy ( requester )
2018-05-22 09:56:52 +02:00
2019-08-15 10:45:57 +02:00
power_level_content_override = config . get ( " power_level_content_override " )
if (
power_level_content_override
and " users " in power_level_content_override
and user_id not in power_level_content_override [ " users " ]
) :
raise SynapseError (
400 ,
" Not a valid power_level_content_override: ' users ' did not contain %s "
% ( user_id , ) ,
)
2022-04-01 16:55:09 +02:00
# The spec says rooms should default to private visibility if
# `visibility` is not specified.
visibility = config . get ( " visibility " , " private " )
2016-03-23 14:49:10 +01:00
is_public = visibility == " public "
2014-08-28 11:59:15 +02:00
2023-06-07 17:21:25 +02:00
self . _validate_room_config ( config , visibility )
2022-05-16 15:06:04 +02:00
room_id = await self . _generate_and_create_room_id (
2021-02-16 23:32:34 +01:00
creator_id = user_id ,
is_public = is_public ,
room_version = room_version ,
2020-01-27 15:30:57 +01:00
)
2014-08-12 16:10:52 +02:00
2020-10-05 15:57:46 +02:00
# Check whether this visibility value is blocked by a third party module
2023-02-22 21:29:09 +01:00
allowed_by_third_party_rules = (
await (
2023-05-04 16:18:22 +02:00
self . _third_party_event_rules . check_visibility_can_be_modified (
2023-02-22 21:29:09 +01:00
room_id , visibility
)
2020-10-05 15:57:46 +02:00
)
)
if not allowed_by_third_party_rules :
raise SynapseError ( 403 , " Room visibility value not allowed. " )
2021-10-25 16:24:49 +02:00
if is_public :
2021-11-19 16:19:32 +01:00
room_aliases = [ ]
if room_alias :
room_aliases . append ( room_alias . to_string ( ) )
2021-10-25 16:24:49 +02:00
if not self . config . roomdirectory . is_publishing_room_allowed (
2021-11-19 16:19:32 +01:00
user_id , room_id , room_aliases
2021-10-25 16:24:49 +02:00
) :
# Let's just return a generic message, as there may be all sorts of
# reasons why we said no. TODO: Allow configurable error messages
# per alias creation rule?
raise SynapseError ( 403 , " Not allowed to publish room " )
2020-10-09 13:24:34 +02:00
directory_handler = self . hs . get_directory_handler ( )
2014-11-18 16:03:01 +01:00
if room_alias :
2020-05-01 16:15:36 +02:00
await directory_handler . create_association (
2018-10-18 17:14:24 +02:00
requester = requester ,
2014-11-18 16:03:01 +01:00
room_id = room_id ,
room_alias = room_alias ,
servers = [ self . hs . hostname ] ,
2019-05-02 10:21:29 +02:00
check_membership = False ,
2014-11-18 16:03:01 +01:00
)
2015-07-16 16:25:29 +02:00
raw_initial_state = config . get ( " initial_state " , [ ] )
initial_state = OrderedDict ( )
for val in raw_initial_state :
initial_state [ ( val [ " type " ] , val . get ( " state_key " , " " ) ) ] = val [ " content " ]
2015-09-01 16:09:23 +02:00
creation_content = config . get ( " creation_content " , { } )
2018-07-25 23:10:39 +02:00
# override any attempt to set room versions via the creation_content
2020-01-27 15:30:57 +01:00
creation_content [ " room_version " ] = room_version . identifier
2018-07-25 23:10:39 +02:00
2022-07-13 20:32:46 +02:00
(
last_stream_id ,
last_sent_event_id ,
depth ,
) = await self . _send_events_for_new_room (
2016-02-16 13:00:50 +01:00
requester ,
room_id ,
2023-04-06 22:26:28 +02:00
room_version ,
2023-03-09 04:27:20 +01:00
room_config = config ,
2015-07-13 17:48:06 +02:00
invite_list = invite_list ,
2015-07-16 16:25:29 +02:00
initial_state = initial_state ,
2015-09-01 16:09:23 +02:00
creation_content = creation_content ,
2015-09-23 11:07:31 +02:00
room_alias = room_alias ,
2019-08-15 10:45:57 +02:00
power_level_content_override = power_level_content_override ,
2018-05-17 12:34:28 +02:00
creator_join_profile = creator_join_profile ,
2014-08-27 16:11:51 +02:00
)
2020-10-29 12:48:39 +01:00
# we avoid dropping the lock between invites, as otherwise joins can
# start coming in and making the createRoom slow.
#
# we also don't need to check the requester's shadow-ban here, as we
# have already done so above (and potentially emptied invite_list).
2022-04-05 16:43:52 +02:00
async with self . room_member_handler . member_linearizer . queue ( ( room_id , ) ) :
2017-11-28 16:19:15 +01:00
content = { }
is_direct = config . get ( " is_direct " , None )
if is_direct :
content [ " is_direct " ] = is_direct
2017-11-28 16:23:26 +01:00
2020-10-29 12:48:39 +01:00
for invitee in invite_list :
(
2022-07-13 20:32:46 +02:00
member_event_id ,
2020-10-29 12:48:39 +01:00
last_stream_id ,
) = await self . room_member_handler . update_membership_locked (
requester ,
UserID . from_string ( invitee ) ,
room_id ,
" invite " ,
ratelimit = False ,
content = content ,
2021-10-06 16:32:16 +02:00
new_room = True ,
2022-07-13 20:32:46 +02:00
prev_event_ids = [ last_sent_event_id ] ,
depth = depth ,
2020-10-29 12:48:39 +01:00
)
2022-07-13 20:32:46 +02:00
last_sent_event_id = member_event_id
depth + = 1
2014-11-17 17:37:33 +01:00
2016-01-05 12:56:21 +01:00
for invite_3pid in invite_3pid_list :
id_server = invite_3pid [ " id_server " ]
2022-08-31 14:10:25 +02:00
id_access_token = invite_3pid [ " id_access_token " ]
2016-01-05 12:56:21 +01:00
address = invite_3pid [ " address " ]
medium = invite_3pid [ " medium " ]
2020-08-20 21:07:42 +02:00
# Note that do_3pid_invite can raise a ShadowBanError, but this was
# handled above by emptying invite_3pid_list.
2022-07-13 20:32:46 +02:00
(
member_event_id ,
last_stream_id ,
) = await self . hs . get_room_member_handler ( ) . do_3pid_invite (
2016-01-05 12:56:21 +01:00
room_id ,
2016-02-16 13:00:50 +01:00
requester . user ,
2016-01-05 12:56:21 +01:00
medium ,
address ,
id_server ,
2016-02-15 19:21:30 +01:00
requester ,
2016-01-05 13:57:45 +01:00
txn_id = None ,
2019-09-11 17:02:42 +02:00
id_access_token = id_access_token ,
2022-07-13 20:32:46 +02:00
prev_event_ids = [ last_sent_event_id ] ,
depth = depth ,
2016-01-05 12:56:21 +01:00
)
2022-07-13 20:32:46 +02:00
last_sent_event_id = member_event_id
depth + = 1
2016-01-05 12:56:21 +01:00
2021-02-12 17:01:48 +01:00
# Always wait for room creation to propagate before returning
2020-05-22 17:11:35 +02:00
await self . _replication . wait_for_stream_position (
2020-09-14 11:16:41 +02:00
self . hs . config . worker . events_shard_config . get_instance ( room_id ) ,
" events " ,
last_stream_id ,
2020-05-22 17:11:35 +02:00
)
2023-02-22 12:07:28 +01:00
return room_id , room_alias , last_stream_id
2014-08-12 16:10:52 +02:00
2020-05-01 16:15:36 +02:00
async def _send_events_for_new_room (
2019-06-20 11:32:02 +02:00
self ,
2020-08-14 15:47:53 +02:00
creator : Requester ,
room_id : str ,
2023-04-06 22:26:28 +02:00
room_version : RoomVersion ,
2023-03-09 04:27:20 +01:00
room_config : JsonDict ,
2020-08-14 15:47:53 +02:00
invite_list : List [ str ] ,
2020-08-28 13:28:53 +02:00
initial_state : MutableStateMap ,
2020-08-14 15:47:53 +02:00
creation_content : JsonDict ,
room_alias : Optional [ RoomAlias ] = None ,
power_level_content_override : Optional [ JsonDict ] = None ,
creator_join_profile : Optional [ JsonDict ] = None ,
2022-07-13 20:32:46 +02:00
) - > Tuple [ int , str , int ] :
2022-09-28 11:39:03 +02:00
""" Sends the initial events into a new room. Sends the room creation, membership,
and power level events into the room sequentially , then creates and batches up the
rest of the events to persist as a batch to the DB .
2020-05-22 15:21:54 +02:00
2020-08-14 15:47:53 +02:00
` power_level_content_override ` doesn ' t apply when initial state has
power level state event content .
2022-10-28 12:53:34 +02:00
Rate limiting should already have been applied by this point .
2023-03-09 04:27:20 +01:00
Args :
creator :
the user requesting the room creation
room_id :
room id for the room being created
2023-04-06 22:26:28 +02:00
room_version :
The room version of the new room .
2023-03-09 04:27:20 +01:00
room_config :
A dict of configuration options . This will be the body of
a / createRoom request ; see
https : / / spec . matrix . org / latest / client - server - api / #post_matrixclientv3createroom
invite_list :
a list of user ids to invite to the room
initial_state :
A list of state events to set in the new room .
creation_content :
Extra keys , such as m . federate , to be added to the content of the m . room . create event .
room_alias :
alias for the room
power_level_content_override :
The power level content to override in the default power level event .
creator_join_profile :
Set to override the displayname and avatar for the creating
user in this room .
2020-05-22 15:21:54 +02:00
Returns :
2022-07-13 20:32:46 +02:00
A tuple containing the stream ID , event ID and depth of the last
event sent to the room .
2020-05-22 15:21:54 +02:00
"""
2020-08-14 15:47:53 +02:00
creator_id = creator . user . to_string ( )
event_keys = { " room_id " : room_id , " sender " : creator_id , " state_key " : " " }
2022-07-13 20:32:46 +02:00
depth = 1
2022-09-28 12:11:48 +02:00
2022-09-28 11:39:03 +02:00
# the most recently created event
prev_event : List [ str ] = [ ]
# a map of event types, state keys -> event_ids. We collect these mappings this as events are
# created (but not persisted to the db) to determine state for future created events
# (as this info can't be pulled from the db)
state_map : MutableStateMap [ str ] = { }
async def create_event (
etype : str ,
content : JsonDict ,
for_batch : bool ,
* * kwargs : Any ,
2023-02-24 22:15:29 +01:00
) - > Tuple [ EventBase , synapse . events . snapshot . UnpersistedEventContextBase ] :
2022-11-07 22:38:50 +01:00
"""
Creates an event and associated event context .
Args :
etype : the type of event to be created
content : content of the event
for_batch : whether the event is being created for batch persisting . If
bool for_batch is true , this will create an event using the prev_event_ids ,
and will create an event context for the event using the parameters state_map
and current_state_group , thus these parameters must be provided in this
case if for_batch is True . The subsequently created event and context
are suitable for being batched up and bulk persisted to the database
with other similarly created events .
"""
2022-07-13 20:32:46 +02:00
nonlocal depth
2022-09-28 11:39:03 +02:00
nonlocal prev_event
2022-07-11 19:00:12 +02:00
2023-04-06 22:26:28 +02:00
# Create the event dictionary.
event_dict = { " type " : etype , " content " : content }
event_dict . update ( event_keys )
event_dict . update ( kwargs )
2022-09-28 11:39:03 +02:00
2023-02-24 22:15:29 +01:00
(
new_event ,
new_unpersisted_context ,
) = await self . event_creation_handler . create_event (
2021-02-16 23:32:34 +01:00
creator ,
2022-09-28 11:39:03 +02:00
event_dict ,
prev_event_ids = prev_event ,
depth = depth ,
2023-03-07 22:54:39 +01:00
# Take a copy to ensure each event gets a unique copy of
# state_map since it is modified below.
state_map = dict ( state_map ) ,
2022-09-28 11:39:03 +02:00
for_batch = for_batch ,
)
2023-02-24 22:15:29 +01:00
2022-09-28 11:39:03 +02:00
depth + = 1
prev_event = [ new_event . event_id ]
state_map [ ( new_event . type , new_event . state_key ) ] = new_event . event_id
2023-02-24 22:15:29 +01:00
return new_event , new_unpersisted_context
2022-09-28 11:39:03 +02:00
2023-06-07 17:21:25 +02:00
preset_config , config = self . _room_preset_config ( room_config )
2016-02-16 13:00:50 +01:00
2023-04-06 22:26:28 +02:00
# MSC2175 removes the creator field from the create event.
2023-07-18 14:44:59 +02:00
if not room_version . implicit_room_creator :
2023-04-06 22:26:28 +02:00
creation_content [ " creator " ] = creator_id
2023-02-24 22:15:29 +01:00
creation_event , unpersisted_creation_context = await create_event (
2022-09-28 11:39:03 +02:00
EventTypes . Create , creation_content , False
)
2023-02-24 22:15:29 +01:00
creation_context = await unpersisted_creation_context . persist ( creation_event )
2020-02-06 14:31:05 +01:00
logger . debug ( " Sending %s in new room " , EventTypes . Member )
2022-10-21 19:46:22 +02:00
ev = await self . event_creation_handler . handle_new_client_event (
requester = creator ,
events_and_context = [ ( creation_event , creation_context ) ] ,
ratelimit = False ,
ignore_shadow_ban = True ,
)
last_sent_event_id = ev . event_id
2022-09-28 11:39:03 +02:00
2022-07-11 19:00:12 +02:00
member_event_id , _ = await self . room_member_handler . update_membership (
2016-02-16 13:00:50 +01:00
creator ,
creator . user ,
room_id ,
" join " ,
2022-10-28 12:53:34 +02:00
ratelimit = False ,
2018-05-17 12:34:28 +02:00
content = creator_join_profile ,
2021-10-06 16:32:16 +02:00
new_room = True ,
2022-07-11 19:00:12 +02:00
prev_event_ids = [ last_sent_event_id ] ,
2022-07-13 20:32:46 +02:00
depth = depth ,
2014-11-18 16:29:48 +01:00
)
2022-09-28 11:39:03 +02:00
prev_event = [ member_event_id ]
# update the depth and state map here as the membership event has been created
# through a different code path
depth + = 1
state_map [ ( EventTypes . Member , creator . user . to_string ( ) ) ] = member_event_id
2014-11-18 16:29:48 +01:00
2022-11-07 22:38:50 +01:00
# we need the state group of the membership event as it is the current state group
event_to_state = (
await self . _storage_controllers . state . get_state_group_for_events (
[ member_event_id ]
)
)
current_state_group = event_to_state [ member_event_id ]
2022-10-21 19:46:22 +02:00
events_to_send = [ ]
2017-06-19 15:10:13 +02:00
# We treat the power levels override specially as this needs to be one
# of the first events that get sent into a room.
2019-06-20 11:32:02 +02:00
pl_content = initial_state . pop ( ( EventTypes . PowerLevels , " " ) , None )
2017-06-19 15:10:13 +02:00
if pl_content is not None :
2022-09-28 11:39:03 +02:00
power_event , power_context = await create_event (
2022-11-07 22:38:50 +01:00
EventTypes . PowerLevels , pl_content , True
2020-05-22 15:21:54 +02:00
)
2022-10-21 19:46:22 +02:00
events_to_send . append ( ( power_event , power_context ) )
2017-06-19 15:10:13 +02:00
else :
2021-07-16 19:22:36 +02:00
power_level_content : JsonDict = {
2019-06-20 11:32:02 +02:00
" users " : { creator_id : 100 } ,
2015-07-16 16:25:29 +02:00
" users_default " : 0 ,
" events " : {
2015-08-20 15:35:40 +02:00
EventTypes . Name : 50 ,
2015-07-16 16:25:29 +02:00
EventTypes . PowerLevels : 100 ,
EventTypes . RoomHistoryVisibility : 100 ,
2015-08-20 15:35:40 +02:00
EventTypes . CanonicalAlias : 50 ,
EventTypes . RoomAvatar : 50 ,
2020-02-17 14:23:37 +01:00
EventTypes . Tombstone : 100 ,
EventTypes . ServerACL : 100 ,
2020-04-09 19:45:38 +02:00
EventTypes . RoomEncryption : 100 ,
2015-07-16 16:25:29 +02:00
} ,
" events_default " : 0 ,
" state_default " : 50 ,
" ban " : 50 ,
" kick " : 50 ,
" redact " : 50 ,
2020-02-17 14:23:37 +01:00
" invite " : 50 ,
2021-07-28 17:46:37 +02:00
" historical " : 100 ,
2021-07-16 19:22:36 +02:00
}
2015-07-13 17:48:06 +02:00
2015-07-16 16:25:29 +02:00
if config [ " original_invitees_have_ops " ] :
for invitee in invite_list :
power_level_content [ " users " ] [ invitee ] = 100
2015-07-13 17:48:06 +02:00
2022-05-12 12:41:35 +02:00
# If the user supplied a preset name e.g. "private_chat",
# we apply that preset
2020-02-17 14:23:37 +01:00
power_level_content . update ( config [ " power_level_content_override " ] )
2022-05-12 12:41:35 +02:00
# If the server config contains default_power_level_content_override,
# and that contains information for this room preset, apply it.
if self . _default_power_level_content_override :
override = self . _default_power_level_content_override . get ( preset_config )
if override is not None :
power_level_content . update ( override )
# Finally, if the user supplied specific permissions for this room,
# apply those.
2018-10-25 18:50:06 +02:00
if power_level_content_override :
power_level_content . update ( power_level_content_override )
2022-09-28 11:39:03 +02:00
pl_event , pl_context = await create_event (
EventTypes . PowerLevels ,
power_level_content ,
2022-11-07 22:38:50 +01:00
True ,
2020-05-22 15:21:54 +02:00
)
2022-10-21 19:46:22 +02:00
events_to_send . append ( ( pl_event , pl_context ) )
2014-08-28 11:59:15 +02:00
2019-06-20 11:32:02 +02:00
if room_alias and ( EventTypes . CanonicalAlias , " " ) not in initial_state :
2022-09-28 11:39:03 +02:00
room_alias_event , room_alias_context = await create_event (
EventTypes . CanonicalAlias , { " alias " : room_alias . to_string ( ) } , True
2015-09-30 17:46:24 +02:00
)
2022-09-28 11:39:03 +02:00
events_to_send . append ( ( room_alias_event , room_alias_context ) )
2015-09-23 11:07:31 +02:00
2019-06-20 11:32:02 +02:00
if ( EventTypes . JoinRules , " " ) not in initial_state :
2022-09-28 11:39:03 +02:00
join_rules_event , join_rules_context = await create_event (
EventTypes . JoinRules ,
{ " join_rule " : config [ " join_rules " ] } ,
True ,
2015-07-16 16:25:29 +02:00
)
2022-09-28 11:39:03 +02:00
events_to_send . append ( ( join_rules_event , join_rules_context ) )
2015-07-16 16:25:29 +02:00
2019-06-20 11:32:02 +02:00
if ( EventTypes . RoomHistoryVisibility , " " ) not in initial_state :
2022-09-28 11:39:03 +02:00
visibility_event , visibility_context = await create_event (
EventTypes . RoomHistoryVisibility ,
{ " history_visibility " : config [ " history_visibility " ] } ,
True ,
2015-07-16 16:25:29 +02:00
)
2022-09-28 11:39:03 +02:00
events_to_send . append ( ( visibility_event , visibility_context ) )
2015-07-16 16:25:29 +02:00
2016-03-17 17:07:35 +01:00
if config [ " guest_can_join " ] :
2019-06-20 11:32:02 +02:00
if ( EventTypes . GuestAccess , " " ) not in initial_state :
2022-09-28 11:39:03 +02:00
guest_access_event , guest_access_context = await create_event (
EventTypes . GuestAccess ,
{ EventContentFields . GUEST_ACCESS : GuestAccess . CAN_JOIN } ,
True ,
2016-03-17 17:07:35 +01:00
)
2022-09-28 11:39:03 +02:00
events_to_send . append ( ( guest_access_event , guest_access_context ) )
2016-03-17 17:07:35 +01:00
2015-07-16 16:25:29 +02:00
for ( etype , state_key ) , content in initial_state . items ( ) :
2022-09-28 11:39:03 +02:00
event , context = await create_event (
etype , content , True , state_key = state_key
2020-05-22 15:21:54 +02:00
)
2022-09-28 11:39:03 +02:00
events_to_send . append ( ( event , context ) )
2020-05-22 15:21:54 +02:00
2020-06-10 18:44:34 +02:00
if config [ " encrypted " ] :
2022-09-28 11:39:03 +02:00
encryption_event , encryption_context = await create_event (
EventTypes . RoomEncryption ,
{ " algorithm " : RoomEncryptionAlgorithms . DEFAULT } ,
True ,
2020-06-10 18:44:34 +02:00
state_key = " " ,
)
2022-09-28 11:39:03 +02:00
events_to_send . append ( ( encryption_event , encryption_context ) )
2020-06-10 18:44:34 +02:00
2023-03-09 04:27:20 +01:00
if " name " in room_config :
name = room_config [ " name " ]
name_event , name_context = await create_event (
EventTypes . Name ,
{ " name " : name } ,
True ,
)
events_to_send . append ( ( name_event , name_context ) )
if " topic " in room_config :
topic = room_config [ " topic " ]
topic_event , topic_context = await create_event (
EventTypes . Topic ,
{ " topic " : topic } ,
True ,
)
events_to_send . append ( ( topic_event , topic_context ) )
2023-02-24 22:15:29 +01:00
datastore = self . hs . get_datastores ( ) . state
events_and_context = (
await UnpersistedEventContext . batch_persist_unpersisted_contexts (
events_to_send , room_id , current_state_group , datastore
)
)
2022-09-28 12:11:48 +02:00
last_event = await self . event_creation_handler . handle_new_client_event (
2022-10-28 12:53:34 +02:00
creator ,
2023-02-24 22:15:29 +01:00
events_and_context ,
2022-10-28 12:53:34 +02:00
ignore_shadow_ban = True ,
ratelimit = False ,
2022-09-28 12:11:48 +02:00
)
assert last_event . internal_metadata . stream_ordering is not None
return last_event . internal_metadata . stream_ordering , last_event . event_id , depth
2014-08-28 11:59:15 +02:00
2023-06-07 17:21:25 +02:00
def _validate_room_config (
self ,
config : JsonDict ,
visibility : str ,
) - > None :
""" Checks configuration parameters for a /createRoom request.
If validation detects invalid parameters an exception may be raised to
cause room creation to be aborted and an error response to be returned
to the client .
Args :
config : A dict of configuration options . Originally from the body of
the / createRoom request
visibility : One of " public " or " private "
"""
# Validate the requested preset, raise a 400 error if not valid
preset_name , preset_config = self . _room_preset_config ( config )
# If the user is trying to create an encrypted room and this is forbidden
# by the configured default_power_level_content_override, then reject the
# request before the room is created.
raw_initial_state = config . get ( " initial_state " , [ ] )
room_encryption_event = any (
s . get ( " type " , " " ) == EventTypes . RoomEncryption for s in raw_initial_state
)
if preset_config [ " encrypted " ] or room_encryption_event :
if self . _default_power_level_content_override :
override = self . _default_power_level_content_override . get ( preset_name )
if override is not None :
event_levels = override . get ( " events " , { } )
room_admin_level = event_levels . get ( EventTypes . PowerLevels , 100 )
encryption_level = event_levels . get ( EventTypes . RoomEncryption , 100 )
if encryption_level > room_admin_level :
raise SynapseError (
403 ,
f " You cannot create an encrypted room. user_level ( { room_admin_level } ) < send_level ( { encryption_level } ) " ,
)
def _room_preset_config ( self , room_config : JsonDict ) - > Tuple [ str , dict ] :
# The spec says rooms should default to private visibility if
# `visibility` is not specified.
visibility = room_config . get ( " visibility " , " private " )
preset_name = room_config . get (
" preset " ,
RoomCreationPreset . PRIVATE_CHAT
if visibility == " private "
else RoomCreationPreset . PUBLIC_CHAT ,
)
try :
preset_config = self . _presets_dict [ preset_name ]
except KeyError :
raise SynapseError (
400 , f " ' { preset_name } ' is not a valid preset " , errcode = Codes . BAD_JSON
)
return preset_name , preset_config
2022-05-16 15:06:04 +02:00
def _generate_room_id ( self ) - > str :
""" Generates a random room ID.
Room IDs look like " !opaque_id:domain " and are case - sensitive as per the spec
at https : / / spec . matrix . org / v1 .2 / appendices / #room-ids-and-event-ids.
Does not check for collisions with existing rooms or prevent future calls from
returning the same room ID . To ensure the uniqueness of a new room ID , use
` _generate_and_create_room_id ` instead .
Synapse ' s room IDs are 18 [a-zA-Z] characters long, which comes out to around
102 bits .
Returns :
A random room ID of the form " !opaque_id:domain " .
"""
random_string = stringutils . random_string ( 18 )
return RoomID ( random_string , self . hs . hostname ) . to_string ( )
async def _generate_and_create_room_id (
2021-02-16 23:32:34 +01:00
self ,
creator_id : str ,
is_public : bool ,
room_version : RoomVersion ,
2021-09-20 14:56:23 +02:00
) - > str :
2018-10-25 18:40:41 +02:00
# autogen room IDs and try to create it. We may clash, so just
# try a few times till one goes through, giving up eventually.
attempts = 0
while attempts < 5 :
try :
2022-05-16 15:06:04 +02:00
gen_room_id = self . _generate_room_id ( )
2020-05-04 13:43:52 +02:00
await self . store . store_room (
2018-10-25 18:40:41 +02:00
room_id = gen_room_id ,
room_creator_user_id = creator_id ,
is_public = is_public ,
2020-01-27 15:30:57 +01:00
room_version = room_version ,
2018-10-25 18:40:41 +02:00
)
2019-07-23 15:00:55 +02:00
return gen_room_id
2018-10-25 18:40:41 +02:00
except StoreError :
attempts + = 1
raise StoreError ( 500 , " Couldn ' t generate a room ID. " )
2014-08-12 16:10:52 +02:00
2020-09-04 12:54:56 +02:00
class RoomContextHandler :
2020-08-14 15:47:53 +02:00
def __init__ ( self , hs : " HomeServer " ) :
2018-07-18 16:29:45 +02:00
self . hs = hs
2021-01-28 12:27:30 +01:00
self . auth = hs . get_auth ( )
2022-02-23 12:04:02 +01:00
self . store = hs . get_datastores ( ) . main
2022-05-31 14:17:50 +02:00
self . _storage_controllers = hs . get_storage_controllers ( )
self . _state_storage_controller = self . _storage_controllers . state
2022-03-18 18:49:32 +01:00
self . _relations_handler = hs . get_relations_handler ( )
2018-07-18 16:29:45 +02:00
2020-08-14 15:47:53 +02:00
async def get_event_context (
self ,
2021-01-28 12:27:30 +01:00
requester : Requester ,
2020-08-14 15:47:53 +02:00
room_id : str ,
event_id : str ,
limit : int ,
event_filter : Optional [ Filter ] ,
2021-01-18 15:02:22 +01:00
use_admin_priviledge : bool = False ,
2022-01-26 14:27:04 +01:00
) - > Optional [ EventContext ] :
2015-10-28 15:05:50 +01:00
""" Retrieves events, pagination tokens and state around a given event
in a room .
Args :
2021-01-28 12:27:30 +01:00
requester
2020-08-14 15:47:53 +02:00
room_id
event_id
limit : The maximum number of events to return in total
2015-10-28 15:05:50 +01:00
( excluding state ) .
2020-08-14 15:47:53 +02:00
event_filter : the filter to apply to the events returned
2018-07-27 16:12:50 +02:00
( excluding the target event_id )
2021-01-18 15:02:22 +01:00
use_admin_priviledge : if ` True ` , return all events , regardless
of whether ` user ` has access to them . To be used * * ONLY * *
from the admin API .
2015-10-28 15:05:50 +01:00
Returns :
2016-01-13 15:19:22 +01:00
dict , or None if the event isn ' t found
2015-10-28 15:05:50 +01:00
"""
2021-01-28 12:27:30 +01:00
user = requester . user
if use_admin_priviledge :
2022-08-22 15:17:59 +02:00
await assert_user_is_admin ( self . auth , requester )
2021-01-28 12:27:30 +01:00
2019-06-20 11:32:02 +02:00
before_limit = math . floor ( limit / 2.0 )
2015-10-28 14:45:56 +01:00
after_limit = limit - before_limit
2022-08-24 21:13:12 +02:00
is_user_in_room = await self . store . check_local_user_in_room (
user_id = user . to_string ( ) , room_id = room_id
)
# The user is peeking if they aren't in the room already
is_peeking = not is_user_in_room
2017-02-20 15:54:50 +01:00
2021-09-20 14:56:23 +02:00
async def filter_evts ( events : List [ EventBase ] ) - > List [ EventBase ] :
2021-01-25 18:02:35 +01:00
if use_admin_priviledge :
2021-01-28 12:23:19 +01:00
return events
return await filter_events_for_client (
2022-05-31 14:17:50 +02:00
self . _storage_controllers ,
user . to_string ( ) ,
events ,
is_peeking = is_peeking ,
2016-05-11 14:42:37 +02:00
)
2016-01-13 15:19:22 +01:00
2020-05-04 13:43:52 +02:00
event = await self . store . get_event (
2019-06-20 11:32:02 +02:00
event_id , get_prev_content = True , allow_none = True
)
2016-01-13 15:19:22 +01:00
if not event :
2019-07-23 15:00:55 +02:00
return None
2016-01-13 15:19:22 +01:00
2020-05-04 13:43:52 +02:00
filtered = await filter_evts ( [ event ] )
2016-01-13 15:19:22 +01:00
if not filtered :
2019-06-20 11:32:02 +02:00
raise AuthError ( 403 , " You don ' t have permission to access that event. " )
2016-01-13 15:19:22 +01:00
2020-05-04 13:43:52 +02:00
results = await self . store . get_events_around (
2018-07-27 16:12:50 +02:00
room_id , event_id , before_limit , after_limit , event_filter
2015-10-28 14:45:56 +01:00
)
2022-01-26 14:27:04 +01:00
events_before = results . events_before
events_after = results . events_after
2015-10-28 14:45:56 +01:00
2019-11-05 16:27:38 +01:00
if event_filter :
2022-01-26 14:27:04 +01:00
events_before = await event_filter . filter ( events_before )
events_after = await event_filter . filter ( events_after )
2019-11-05 16:27:38 +01:00
2022-01-26 14:27:04 +01:00
events_before = await filter_evts ( events_before )
events_after = await filter_evts ( events_after )
2019-12-16 13:14:12 +01:00
# filter_evts can return a pruned event in case the user is allowed to see that
# there's something there but not see the content, so use the event that's in
# `filtered` rather than the event we retrieved from the datastore.
2022-01-26 14:27:04 +01:00
event = filtered [ 0 ]
2015-10-28 14:45:56 +01:00
2022-01-07 15:10:46 +01:00
# Fetch the aggregations.
2022-03-18 18:49:32 +01:00
aggregations = await self . _relations_handler . get_bundled_aggregations (
2022-01-26 14:27:04 +01:00
itertools . chain ( events_before , ( event , ) , events_after ) ,
user . to_string ( ) ,
2022-01-18 17:38:57 +01:00
)
2022-01-07 15:10:46 +01:00
2022-01-26 14:27:04 +01:00
if events_after :
last_event_id = events_after [ - 1 ] . event_id
2015-10-28 14:45:56 +01:00
else :
last_event_id = event_id
2021-10-27 17:26:30 +02:00
if event_filter and event_filter . lazy_load_members :
2018-10-25 18:49:55 +02:00
state_filter = StateFilter . from_lazy_load_member_list (
ev . sender
for ev in itertools . chain (
2022-01-26 14:27:04 +01:00
events_before ,
( event , ) ,
events_after ,
2018-10-25 18:49:55 +02:00
)
)
else :
state_filter = StateFilter . all ( )
2018-07-27 16:12:50 +02:00
# XXX: why do we return the state as of the last event rather than the
# first? Shouldn't we be consistent with /sync?
# https://github.com/matrix-org/matrix-doc/issues/687
2022-05-31 14:17:50 +02:00
state = await self . _state_storage_controller . get_state_for_events (
2019-06-20 11:32:02 +02:00
[ last_event_id ] , state_filter = state_filter
2015-10-28 14:45:56 +01:00
)
2019-11-06 19:14:03 +01:00
state_events = list ( state [ last_event_id ] . values ( ) )
if event_filter :
2021-11-09 14:10:58 +01:00
state_events = await event_filter . filter ( state_events )
2019-11-06 19:14:03 +01:00
2018-07-24 17:46:30 +02:00
# We use a dummy token here as we only care about the room portion of
# the token, which we replace.
token = StreamToken . START
2022-01-26 14:27:04 +01:00
return EventContext (
events_before = events_before ,
event = event ,
events_after = events_after ,
2022-11-16 13:09:33 +01:00
state = state_events ,
2022-01-26 14:27:04 +01:00
aggregations = aggregations ,
2022-05-16 17:35:31 +02:00
start = await token . copy_and_replace (
StreamKeyType . ROOM , results . start
) . to_string ( self . store ) ,
end = await token . copy_and_replace ( StreamKeyType . ROOM , results . end ) . to_string (
2022-01-26 14:27:04 +01:00
self . store
) ,
)
2015-10-28 14:45:56 +01:00
2021-12-02 08:02:20 +01:00
class TimestampLookupHandler :
def __init__ ( self , hs : " HomeServer " ) :
2022-02-23 12:04:02 +01:00
self . store = hs . get_datastores ( ) . main
2021-12-02 08:02:20 +01:00
self . state_handler = hs . get_state_handler ( )
self . federation_client = hs . get_federation_client ( )
2022-07-22 23:00:11 +02:00
self . federation_event_handler = hs . get_federation_event_handler ( )
2022-06-06 10:24:12 +02:00
self . _storage_controllers = hs . get_storage_controllers ( )
2021-12-02 08:02:20 +01:00
async def get_event_for_timestamp (
self ,
requester : Requester ,
room_id : str ,
timestamp : int ,
2023-02-01 22:35:24 +01:00
direction : Direction ,
2021-12-02 08:02:20 +01:00
) - > Tuple [ str , int ] :
""" Find the closest event to the given timestamp in the given direction.
If we can ' t find an event locally or the event we have locally is next to a gap,
it will ask other federated homeservers for an event .
Args :
requester : The user making the request according to the access token
room_id : Room to fetch the event from
timestamp : The point in time ( inclusive ) we should navigate from in
the given direction to find the closest event .
2023-02-01 22:35:24 +01:00
direction : indicates whether we should navigate forward
2021-12-02 08:02:20 +01:00
or backward from the given timestamp to find the closest event .
Returns :
A tuple containing the ` event_id ` closest to the given timestamp in
the given direction and the ` origin_server_ts ` .
Raises :
SynapseError if unable to find any event locally in the given direction
"""
2022-10-26 23:10:55 +02:00
logger . debug (
" get_event_for_timestamp(room_id= %s , timestamp= %s , direction= %s ) Finding closest event... " ,
room_id ,
timestamp ,
direction ,
)
2021-12-02 08:02:20 +01:00
local_event_id = await self . store . get_event_id_for_timestamp (
room_id , timestamp , direction
)
logger . debug (
" get_event_for_timestamp: locally, we found event_id= %s closest to timestamp= %s " ,
local_event_id ,
timestamp ,
)
# Check for gaps in the history where events could be hiding in between
# the timestamp given and the event we were able to find locally
is_event_next_to_backward_gap = False
is_event_next_to_forward_gap = False
2022-07-07 18:52:45 +02:00
local_event = None
2021-12-02 08:02:20 +01:00
if local_event_id :
local_event = await self . store . get_event (
local_event_id , allow_none = False , allow_rejected = False
)
2023-02-01 22:35:24 +01:00
if direction == Direction . FORWARDS :
2021-12-02 08:02:20 +01:00
# We only need to check for a backward gap if we're looking forwards
# to ensure there is nothing in between.
is_event_next_to_backward_gap = (
await self . store . is_event_next_to_backward_gap ( local_event )
)
2023-02-01 22:35:24 +01:00
elif direction == Direction . BACKWARDS :
2021-12-02 08:02:20 +01:00
# We only need to check for a forward gap if we're looking backwards
# to ensure there is nothing in between
is_event_next_to_forward_gap = (
await self . store . is_event_next_to_forward_gap ( local_event )
)
# If we found a gap, we should probably ask another homeserver first
# about more history in between
if (
not local_event_id
or is_event_next_to_backward_gap
or is_event_next_to_forward_gap
) :
logger . debug (
" get_event_for_timestamp: locally, we found event_id= %s closest to timestamp= %s which is next to a gap in event history so we ' re asking other homeservers first " ,
local_event_id ,
timestamp ,
)
2022-08-30 08:38:14 +02:00
likely_domains = (
2022-09-30 14:15:32 +02:00
await self . _storage_controllers . state . get_current_hosts_in_room_ordered (
room_id
)
2022-06-06 10:24:12 +02:00
)
2021-12-02 08:02:20 +01:00
2022-10-26 23:10:55 +02:00
remote_response = await self . federation_client . timestamp_to_event (
destinations = likely_domains ,
room_id = room_id ,
timestamp = timestamp ,
direction = direction ,
)
if remote_response is not None :
logger . debug (
" get_event_for_timestamp: remote_response= %s " ,
remote_response ,
)
2022-08-30 08:38:14 +02:00
2022-10-26 23:10:55 +02:00
remote_event_id = remote_response . event_id
remote_origin_server_ts = remote_response . origin_server_ts
2021-12-02 08:02:20 +01:00
2022-10-26 23:10:55 +02:00
# Backfill this event so we can get a pagination token for
# it with `/context` and paginate `/messages` from this
# point.
pulled_pdu_info = await self . federation_event_handler . backfill_event_id (
likely_domains , room_id , remote_event_id
)
remote_event = pulled_pdu_info . pdu
2022-07-22 23:00:11 +02:00
2022-10-26 23:10:55 +02:00
# XXX: When we see that the remote server is not trustworthy,
# maybe we should not ask them first in the future.
if remote_origin_server_ts != remote_event . origin_server_ts :
logger . info (
" get_event_for_timestamp: Remote server ( %s ) claimed that remote_event_id= %s occured at remote_origin_server_ts= %s but that isn ' t true (actually occured at %s ). Their claims are dubious and we should consider not trusting them. " ,
pulled_pdu_info . pull_origin ,
remote_event_id ,
remote_origin_server_ts ,
remote_event . origin_server_ts ,
2021-12-02 08:02:20 +01:00
)
2022-10-26 23:10:55 +02:00
# Only return the remote event if it's closer than the local event
if not local_event or (
abs ( remote_event . origin_server_ts - timestamp )
< abs ( local_event . origin_server_ts - timestamp )
) :
logger . info (
" get_event_for_timestamp: returning remote_event_id= %s ( %s ) since it ' s closer to timestamp= %s than local_event= %s ( %s ) " ,
remote_event_id ,
remote_event . origin_server_ts ,
timestamp ,
local_event . event_id if local_event else None ,
local_event . origin_server_ts if local_event else None ,
2021-12-02 08:02:20 +01:00
)
2022-10-26 23:10:55 +02:00
return remote_event_id , remote_origin_server_ts
2021-12-02 08:02:20 +01:00
2022-07-07 18:52:45 +02:00
# To appease mypy, we have to add both of these conditions to check for
# `None`. We only expect `local_event` to be `None` when
# `local_event_id` is `None` but mypy isn't as smart and assuming as us.
if not local_event_id or not local_event :
2021-12-02 08:02:20 +01:00
raise SynapseError (
404 ,
" Unable to find event from %s in direction %s " % ( timestamp , direction ) ,
errcode = Codes . NOT_FOUND ,
)
return local_event_id , local_event . origin_server_ts
2021-09-21 19:34:26 +02:00
class RoomEventSource ( EventSource [ RoomStreamToken , EventBase ] ) :
2020-08-14 15:47:53 +02:00
def __init__ ( self , hs : " HomeServer " ) :
2022-02-23 12:04:02 +01:00
self . store = hs . get_datastores ( ) . main
2014-08-29 18:09:15 +02:00
2020-05-04 13:43:52 +02:00
async def get_new_events (
2020-08-14 15:47:53 +02:00
self ,
user : UserID ,
2020-09-11 13:22:55 +02:00
from_key : RoomStreamToken ,
2022-10-14 14:30:05 +02:00
limit : int ,
2023-01-26 18:31:58 +01:00
room_ids : StrCollection ,
2020-08-14 15:47:53 +02:00
is_guest : bool ,
explicit_room_id : Optional [ str ] = None ,
2020-09-11 13:22:55 +02:00
) - > Tuple [ List [ EventBase ] , RoomStreamToken ] :
2014-08-29 18:09:15 +02:00
# We just ignore the key for now.
2020-08-04 13:21:47 +02:00
to_key = self . get_current_key ( )
2014-08-29 18:09:15 +02:00
2020-09-11 13:22:55 +02:00
if from_key . topological :
2019-10-31 11:23:24 +01:00
logger . warning ( " Stream has topological part!!!! %r " , from_key )
2023-10-05 11:46:28 +02:00
from_key = RoomStreamToken ( stream = from_key . stream )
2016-02-02 15:11:14 +01:00
2019-06-20 11:32:02 +02:00
app_service = self . store . get_app_service_by_user_id ( user . to_string ( ) )
2015-02-25 16:00:59 +01:00
if app_service :
2018-03-05 16:42:57 +01:00
# We no longer support AS users using /sync directly.
# See https://github.com/matrix-org/matrix-doc/issues/1144
raise NotImplementedError ( )
2015-02-25 16:00:59 +01:00
else :
2020-05-04 13:43:52 +02:00
room_events = await self . store . get_membership_changes_for_user (
2016-02-01 17:26:51 +01:00
user . to_string ( ) , from_key , to_key
)
2020-05-04 13:43:52 +02:00
room_to_events = await self . store . get_room_events_stream_for_rooms (
2016-02-01 17:26:51 +01:00
room_ids = room_ids ,
2015-02-25 16:00:59 +01:00
from_key = from_key ,
to_key = to_key ,
2016-02-01 17:26:51 +01:00
limit = limit or 10 ,
2019-06-20 11:32:02 +02:00
order = " ASC " ,
2015-02-25 16:00:59 +01:00
)
2014-08-29 18:09:15 +02:00
2016-02-01 17:26:51 +01:00
events = list ( room_events )
events . extend ( e for evs , _ in room_to_events . values ( ) for e in evs )
2016-02-01 17:32:46 +01:00
events . sort ( key = lambda e : e . internal_metadata . order )
2016-02-01 17:26:51 +01:00
if limit :
events [ : ] = events [ : limit ]
if events :
2020-09-29 22:48:33 +02:00
end_key = events [ - 1 ] . internal_metadata . after
2016-02-01 17:26:51 +01:00
else :
end_key = to_key
2021-09-23 12:59:07 +02:00
return events , end_key
2014-08-29 18:09:15 +02:00
2020-09-11 13:22:55 +02:00
def get_current_key ( self ) - > RoomStreamToken :
2020-09-29 22:48:33 +02:00
return self . store . get_room_max_token ( )
2016-10-24 14:35:51 +02:00
2022-04-06 12:40:28 +02:00
def get_current_key_for_room ( self , room_id : str ) - > Awaitable [ RoomStreamToken ] :
return self . store . get_current_room_stream_token_for_room_id ( room_id )
2020-07-14 13:36:23 +02:00
2023-09-15 15:37:44 +02:00
class ShutdownRoomParams ( TypedDict ) :
"""
Attributes :
requester_user_id :
User who requested the action . Will be recorded as putting the room on the
blocking list .
new_room_user_id :
If set , a new room will be created with this user ID
as the creator and admin , and all users in the old room will be
moved into that room . If not set , no new room will be created
and the users will just be removed from the old room .
new_room_name :
A string representing the name of the room that new users will
be invited to . Defaults to ` Content Violation Notification `
message :
A string containing the first message that will be sent as
` new_room_user_id ` in the new room . Ideally this will clearly
convey why the original room was shut down .
Defaults to ` Sharing illegal content on this server is not
permitted and rooms in violation will be blocked . `
block :
If set to ` true ` , this room will be added to a blocking list ,
preventing future attempts to join the room . Defaults to ` false ` .
purge :
If set to ` true ` , purge the given room from the database .
force_purge :
If set to ` true ` , the room will be purged from database
even if there are still users joined to the room .
"""
requester_user_id : Optional [ str ]
new_room_user_id : Optional [ str ]
new_room_name : Optional [ str ]
message : Optional [ str ]
block : bool
purge : bool
force_purge : bool
2021-11-09 14:11:47 +01:00
class ShutdownRoomResponse ( TypedDict ) :
2021-11-12 13:35:31 +01:00
"""
Attributes :
kicked_users : An array of users ( ` user_id ` ) that were kicked .
failed_to_kick_users :
An array of users ( ` user_id ` ) that that were not kicked .
local_aliases :
An array of strings representing the local aliases that were
migrated from the old room to the new .
new_room_id : A string representing the room ID of the new room .
"""
2021-11-09 14:11:47 +01:00
kicked_users : List [ str ]
failed_to_kick_users : List [ str ]
local_aliases : List [ str ]
new_room_id : Optional [ str ]
2020-09-04 12:54:56 +02:00
class RoomShutdownHandler :
2020-07-14 13:36:23 +02:00
DEFAULT_MESSAGE = (
" Sharing illegal content on this server is not permitted and rooms in "
" violation will be blocked. "
)
DEFAULT_ROOM_NAME = " Content Violation Notification "
2020-08-14 15:47:53 +02:00
def __init__ ( self , hs : " HomeServer " ) :
2020-07-14 13:36:23 +02:00
self . hs = hs
self . room_member_handler = hs . get_room_member_handler ( )
self . _room_creation_handler = hs . get_room_creation_handler ( )
self . _replication = hs . get_replication_data_handler ( )
2023-05-04 16:18:22 +02:00
self . _third_party_rules = hs . get_module_api_callbacks ( ) . third_party_event_rules
2020-07-14 13:36:23 +02:00
self . event_creation_handler = hs . get_event_creation_handler ( )
2022-02-23 12:04:02 +01:00
self . store = hs . get_datastores ( ) . main
2020-07-14 13:36:23 +02:00
async def shutdown_room (
self ,
room_id : str ,
2023-09-15 15:37:44 +02:00
params : ShutdownRoomParams ,
result : Optional [ ShutdownRoomResponse ] = None ,
update_result_fct : Optional [
Callable [ [ Optional [ JsonMapping ] ] , Awaitable [ None ] ]
] = None ,
) - > Optional [ ShutdownRoomResponse ] :
2020-07-14 13:36:23 +02:00
"""
Shuts down a room . Moves all local users and room aliases automatically
to a new room if ` new_room_user_id ` is set . Otherwise local users only
leave the room without any information .
The new room will be created with the user specified by the
` new_room_user_id ` parameter as room administrator and will contain a
message explaining what happened . Users invited to the new room will
have power level ` - 10 ` by default , and thus be unable to speak .
The local server will only have the power to move local user and room
aliases to the new room . Users on other servers will be unaffected .
Args :
room_id : The ID of the room to shut down .
2023-09-15 15:37:44 +02:00
delete_id : The delete ID identifying this delete request
params : parameters for the shutdown , cf ` ShutdownRoomParams `
result : current status of the shutdown , if it was interrupted
update_result_fct : function called when ` result ` is updated locally
2020-07-14 13:36:23 +02:00
2023-09-15 15:37:44 +02:00
Returns : a dict matching ` ShutdownRoomResponse ` .
"""
requester_user_id = params [ " requester_user_id " ]
new_room_user_id = params [ " new_room_user_id " ]
block = params [ " block " ]
new_room_name = (
params [ " new_room_name " ]
if params [ " new_room_name " ]
else self . DEFAULT_ROOM_NAME
)
message = params [ " message " ] if params [ " message " ] else self . DEFAULT_MESSAGE
2020-07-14 13:36:23 +02:00
if not RoomID . is_valid ( room_id ) :
raise SynapseError ( 400 , " %s is not a legal room ID " % ( room_id , ) )
2022-03-09 19:23:57 +01:00
if not await self . _third_party_rules . check_can_shutdown_room (
requester_user_id , room_id
) :
raise SynapseError (
403 , " Shutdown of this room is forbidden " , Codes . FORBIDDEN
)
2023-09-15 15:37:44 +02:00
result = (
result
if result
else {
" kicked_users " : [ ] ,
" failed_to_kick_users " : [ ] ,
" local_aliases " : [ ] ,
" new_room_id " : None ,
}
)
2021-11-09 14:11:47 +01:00
# Action the block first (even if the room doesn't exist yet)
2020-07-14 13:36:23 +02:00
if block :
2023-09-06 12:50:07 +02:00
if requester_user_id is None :
raise ValueError (
" shutdown_room: block=True not allowed when requester_user_id is None. "
)
2021-11-09 14:11:47 +01:00
# This will work even if the room is already blocked, but that is
# desirable in case the first attempt at blocking the room failed below.
2020-07-14 13:36:23 +02:00
await self . store . block_room ( room_id , requester_user_id )
2021-11-09 14:11:47 +01:00
if not await self . store . get_room ( room_id ) :
2021-12-07 12:37:54 +01:00
# if we don't know about the room, there is nothing left to do.
2023-09-15 15:37:44 +02:00
return result
2021-11-09 14:11:47 +01:00
2023-09-15 15:37:44 +02:00
new_room_id = result . get ( " new_room_id " )
if new_room_user_id is not None and new_room_id is None :
2020-07-14 13:36:23 +02:00
if not self . hs . is_mine_id ( new_room_user_id ) :
raise SynapseError (
400 , " User must be our own: %s " % ( new_room_user_id , )
)
2020-11-17 11:51:25 +01:00
room_creator_requester = create_requester (
new_room_user_id , authenticated_entity = requester_user_id
)
2020-07-14 13:36:23 +02:00
2023-02-22 12:07:28 +01:00
new_room_id , _ , stream_id = await self . _room_creation_handler . create_room (
2020-07-14 13:36:23 +02:00
room_creator_requester ,
config = {
" preset " : RoomCreationPreset . PUBLIC_CHAT ,
" name " : new_room_name ,
" power_level_content_override " : { " users_default " : - 10 } ,
} ,
ratelimit = False ,
)
2023-09-15 15:37:44 +02:00
result [ " new_room_id " ] = new_room_id
if update_result_fct :
await update_result_fct ( result )
2020-07-14 13:36:23 +02:00
logger . info (
" Shutting down room %r , joining to new room: %r " , room_id , new_room_id
)
# We now wait for the create room to come back in via replication so
2020-10-23 18:38:40 +02:00
# that we can assume that all the joins/invites have propagated before
2020-07-14 13:36:23 +02:00
# we try and auto join below.
await self . _replication . wait_for_stream_position (
2020-09-14 11:16:41 +02:00
self . hs . config . worker . events_shard_config . get_instance ( new_room_id ) ,
" events " ,
stream_id ,
2020-07-14 13:36:23 +02:00
)
else :
logger . info ( " Shutting down room %r " , room_id )
2023-10-27 18:50:50 +02:00
users = await self . store . get_local_users_related_to_room ( room_id )
for user_id , membership in users :
# If the user is not in the room (or is banned), nothing to do.
if membership not in ( Membership . JOIN , Membership . INVITE , Membership . KNOCK ) :
2020-07-14 13:36:23 +02:00
continue
logger . info ( " Kicking %r from %r ... " , user_id , room_id )
try :
# Kick users from room
2020-11-17 11:51:25 +01:00
target_requester = create_requester (
user_id , authenticated_entity = requester_user_id
)
2020-07-14 13:36:23 +02:00
_ , stream_id = await self . room_member_handler . update_membership (
requester = target_requester ,
target = target_requester . user ,
room_id = room_id ,
action = Membership . LEAVE ,
content = { } ,
ratelimit = False ,
require_consent = False ,
)
# Wait for leave to come in over replication before trying to forget.
await self . _replication . wait_for_stream_position (
2020-09-14 11:16:41 +02:00
self . hs . config . worker . events_shard_config . get_instance ( room_id ) ,
" events " ,
stream_id ,
2020-07-14 13:36:23 +02:00
)
2023-09-15 15:37:44 +02:00
await self . room_member_handler . forget (
target_requester . user , room_id , do_not_schedule_purge = True
)
2020-07-14 13:36:23 +02:00
# Join users to new room
if new_room_user_id :
2023-02-22 12:07:28 +01:00
assert new_room_id is not None
2020-07-14 13:36:23 +02:00
await self . room_member_handler . update_membership (
requester = target_requester ,
target = target_requester . user ,
room_id = new_room_id ,
action = Membership . JOIN ,
content = { } ,
ratelimit = False ,
require_consent = False ,
)
2023-09-15 15:37:44 +02:00
result [ " kicked_users " ] . append ( user_id )
if update_result_fct :
await update_result_fct ( result )
2020-07-14 13:36:23 +02:00
except Exception :
logger . exception (
" Failed to leave old room and join new room for %r " , user_id
)
2023-09-15 15:37:44 +02:00
result [ " failed_to_kick_users " ] . append ( user_id )
if update_result_fct :
await update_result_fct ( result )
2020-07-14 13:36:23 +02:00
# Send message in new room and move aliases
if new_room_user_id :
2023-09-15 15:37:44 +02:00
room_creator_requester = create_requester (
new_room_user_id , authenticated_entity = requester_user_id
)
2020-07-14 13:36:23 +02:00
await self . event_creation_handler . create_and_send_nonmember_event (
room_creator_requester ,
{
" type " : " m.room.message " ,
" content " : { " body " : message , " msgtype " : " m.text " } ,
" room_id " : new_room_id ,
" sender " : new_room_user_id ,
} ,
ratelimit = False ,
)
2023-09-15 15:37:44 +02:00
result [ " local_aliases " ] = list (
await self . store . get_aliases_for_room ( room_id )
)
2020-07-14 13:36:23 +02:00
2023-02-22 12:07:28 +01:00
assert new_room_id is not None
2020-07-14 13:36:23 +02:00
await self . store . update_aliases_for_room (
room_id , new_room_id , requester_user_id
)
else :
2023-09-15 15:37:44 +02:00
result [ " local_aliases " ] = [ ]
2020-07-14 13:36:23 +02:00
2023-09-15 15:37:44 +02:00
return result