use axum::extract::State; use axum_client_ip::InsecureClientIp; use base64::{Engine as _, engine::general_purpose}; use conduwuit::{ Err, Error, PduEvent, Result, err, pdu::gen_event_id, utils, utils::hash::sha256, warn, }; use ruma::{ CanonicalJsonValue, OwnedUserId, UserId, api::{client::error::ErrorKind, federation::membership::create_invite}, events::room::member::{MembershipState, RoomMemberEventContent}, serde::JsonObject, }; use crate::Ruma; /// # `PUT /_matrix/federation/v2/invite/{roomId}/{eventId}` /// /// Invites a remote user to a room. #[tracing::instrument(skip_all, fields(%client), name = "invite")] pub(crate) async fn create_invite_route( State(services): State, InsecureClientIp(client): InsecureClientIp, body: Ruma, ) -> Result { // ACL check origin services .rooms .event_handler .acl_check(body.origin(), &body.room_id) .await?; if !services.server.supported_room_version(&body.room_version) { return Err(Error::BadRequest( ErrorKind::IncompatibleRoomVersion { room_version: body.room_version.clone() }, "Server does not support this room version.", )); } if let Some(server) = body.room_id.server_name() { if services .config .forbidden_remote_server_names .is_match(server.host()) { return Err!(Request(Forbidden("Server is banned on this homeserver."))); } } if services .config .forbidden_remote_server_names .is_match(body.origin().host()) { warn!( "Received federated/remote invite from banned server {} for room ID {}. Rejecting.", body.origin(), body.room_id ); return Err!(Request(Forbidden("Server is banned on this homeserver."))); } let mut signed_event = utils::to_canonical_object(&body.event) .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invite event is invalid."))?; let invited_user: OwnedUserId = signed_event .get("state_key") .try_into() .map(UserId::to_owned) .map_err(|e| err!(Request(InvalidParam("Invalid state_key property: {e}"))))?; if !services.globals.server_is_ours(invited_user.server_name()) { return Err!(Request(InvalidParam("User does not belong to this homeserver."))); } // Make sure we're not ACL'ed from their room. services .rooms .event_handler .acl_check(invited_user.server_name(), &body.room_id) .await?; services .server_keys .hash_and_sign_event(&mut signed_event, &body.room_version) .map_err(|e| err!(Request(InvalidParam("Failed to sign event: {e}"))))?; // Generate event id let event_id = gen_event_id(&signed_event, &body.room_version)?; // Add event_id back signed_event.insert("event_id".to_owned(), CanonicalJsonValue::String(event_id.to_string())); let sender: &UserId = signed_event .get("sender") .try_into() .map_err(|e| err!(Request(InvalidParam("Invalid sender property: {e}"))))?; if services.rooms.metadata.is_banned(&body.room_id).await && !services.users.is_admin(&invited_user).await { return Err!(Request(Forbidden("This room is banned on this homeserver."))); } if services.config.block_non_admin_invites && !services.users.is_admin(&invited_user).await { return Err!(Request(Forbidden("This server does not allow room invites."))); } let mut invite_state = body.invite_room_state.clone(); let mut event: JsonObject = serde_json::from_str(body.event.get()) .map_err(|e| err!(Request(BadJson("Invalid invite event PDU: {e}"))))?; event.insert("event_id".to_owned(), "$placeholder".into()); let pdu: PduEvent = serde_json::from_value(event.into()) .map_err(|e| err!(Request(BadJson("Invalid invite event PDU: {e}"))))?; invite_state.push(pdu.to_stripped_state_event()); // If we are active in the room, the remote server will notify us about the // join/invite through /send. If we are not in the room, we need to manually // record the invited state for client /sync through update_membership(), and // send the invite PDU to the relevant appservices. if !services .rooms .state_cache .server_in_room(services.globals.server_name(), &body.room_id) .await { services .rooms .state_cache .update_membership( &body.room_id, &invited_user, RoomMemberEventContent::new(MembershipState::Invite), sender, Some(invite_state), body.via.clone(), true, ) .await?; for appservice in services.appservice.read().await.values() { if appservice.is_user_match(&invited_user) { services .sending .send_appservice_request( appservice.registration.clone(), ruma::api::appservice::event::push_events::v1::Request { events: vec![pdu.to_room_event()], txn_id: general_purpose::URL_SAFE_NO_PAD .encode(sha256::hash(pdu.event_id.as_bytes())) .into(), ephemeral: Vec::new(), to_device: Vec::new(), }, ) .await?; } } } Ok(create_invite::v2::Response { event: services .sending .convert_to_outgoing_federation_event(signed_event) .await, }) }