room.py 52 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419
  1. # Copyright 2014 - 2016 OpenMarket Ltd
  2. # Copyright 2018-2019 New Vector Ltd
  3. # Copyright 2019 The Matrix.org Foundation C.I.C.
  4. #
  5. # Licensed under the Apache License, Version 2.0 (the "License");
  6. # you may not use this file except in compliance with the License.
  7. # You may obtain a copy of the License at
  8. #
  9. # http://www.apache.org/licenses/LICENSE-2.0
  10. #
  11. # Unless required by applicable law or agreed to in writing, software
  12. # distributed under the License is distributed on an "AS IS" BASIS,
  13. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. # See the License for the specific language governing permissions and
  15. # limitations under the License.
  16. """Contains functions for performing events on rooms."""
  17. import itertools
  18. import logging
  19. import math
  20. import random
  21. import string
  22. from collections import OrderedDict
  23. from typing import TYPE_CHECKING, Any, Awaitable, Dict, List, Optional, Tuple
  24. from synapse.api.constants import (
  25. EventTypes,
  26. HistoryVisibility,
  27. JoinRules,
  28. Membership,
  29. RoomCreationPreset,
  30. RoomEncryptionAlgorithms,
  31. )
  32. from synapse.api.errors import (
  33. AuthError,
  34. Codes,
  35. LimitExceededError,
  36. NotFoundError,
  37. StoreError,
  38. SynapseError,
  39. )
  40. from synapse.api.filtering import Filter
  41. from synapse.api.room_versions import KNOWN_ROOM_VERSIONS, RoomVersion
  42. from synapse.events import EventBase
  43. from synapse.events.utils import copy_power_levels_contents
  44. from synapse.rest.admin._base import assert_user_is_admin
  45. from synapse.storage.state import StateFilter
  46. from synapse.types import (
  47. JsonDict,
  48. MutableStateMap,
  49. Requester,
  50. RoomAlias,
  51. RoomID,
  52. RoomStreamToken,
  53. StateMap,
  54. StreamToken,
  55. UserID,
  56. create_requester,
  57. )
  58. from synapse.util import stringutils
  59. from synapse.util.async_helpers import Linearizer
  60. from synapse.util.caches.response_cache import ResponseCache
  61. from synapse.util.stringutils import parse_and_validate_server_name
  62. from synapse.visibility import filter_events_for_client
  63. from ._base import BaseHandler
  64. if TYPE_CHECKING:
  65. from synapse.server import HomeServer
  66. logger = logging.getLogger(__name__)
  67. id_server_scheme = "https://"
  68. FIVE_MINUTES_IN_MS = 5 * 60 * 1000
  69. class RoomCreationHandler(BaseHandler):
  70. def __init__(self, hs: "HomeServer"):
  71. super().__init__(hs)
  72. self.spam_checker = hs.get_spam_checker()
  73. self.event_creation_handler = hs.get_event_creation_handler()
  74. self.room_member_handler = hs.get_room_member_handler()
  75. self._event_auth_handler = hs.get_event_auth_handler()
  76. self.config = hs.config
  77. # Room state based off defined presets
  78. self._presets_dict: Dict[str, Dict[str, Any]] = {
  79. RoomCreationPreset.PRIVATE_CHAT: {
  80. "join_rules": JoinRules.INVITE,
  81. "history_visibility": HistoryVisibility.SHARED,
  82. "original_invitees_have_ops": False,
  83. "guest_can_join": True,
  84. "power_level_content_override": {"invite": 0},
  85. },
  86. RoomCreationPreset.TRUSTED_PRIVATE_CHAT: {
  87. "join_rules": JoinRules.INVITE,
  88. "history_visibility": HistoryVisibility.SHARED,
  89. "original_invitees_have_ops": True,
  90. "guest_can_join": True,
  91. "power_level_content_override": {"invite": 0},
  92. },
  93. RoomCreationPreset.PUBLIC_CHAT: {
  94. "join_rules": JoinRules.PUBLIC,
  95. "history_visibility": HistoryVisibility.SHARED,
  96. "original_invitees_have_ops": False,
  97. "guest_can_join": False,
  98. "power_level_content_override": {},
  99. },
  100. }
  101. # Modify presets to selectively enable encryption by default per homeserver config
  102. for preset_name, preset_config in self._presets_dict.items():
  103. encrypted = (
  104. preset_name
  105. in self.config.encryption_enabled_by_default_for_room_presets
  106. )
  107. preset_config["encrypted"] = encrypted
  108. self._replication = hs.get_replication_data_handler()
  109. # linearizer to stop two upgrades happening at once
  110. self._upgrade_linearizer = Linearizer("room_upgrade_linearizer")
  111. # If a user tries to update the same room multiple times in quick
  112. # succession, only process the first attempt and return its result to
  113. # subsequent requests
  114. self._upgrade_response_cache: ResponseCache[Tuple[str, str]] = ResponseCache(
  115. hs.get_clock(), "room_upgrade", timeout_ms=FIVE_MINUTES_IN_MS
  116. )
  117. self._server_notices_mxid = hs.config.server_notices_mxid
  118. self.third_party_event_rules = hs.get_third_party_event_rules()
  119. async def upgrade_room(
  120. self, requester: Requester, old_room_id: str, new_version: RoomVersion
  121. ) -> str:
  122. """Replace a room with a new room with a different version
  123. Args:
  124. requester: the user requesting the upgrade
  125. old_room_id: the id of the room to be replaced
  126. new_version: the new room version to use
  127. Returns:
  128. the new room id
  129. Raises:
  130. ShadowBanError if the requester is shadow-banned.
  131. """
  132. await self.ratelimit(requester)
  133. user_id = requester.user.to_string()
  134. # Check if this room is already being upgraded by another person
  135. for key in self._upgrade_response_cache.pending_result_cache:
  136. if key[0] == old_room_id and key[1] != user_id:
  137. # Two different people are trying to upgrade the same room.
  138. # Send the second an error.
  139. #
  140. # Note that this of course only gets caught if both users are
  141. # on the same homeserver.
  142. raise SynapseError(
  143. 400, "An upgrade for this room is currently in progress"
  144. )
  145. # Upgrade the room
  146. #
  147. # If this user has sent multiple upgrade requests for the same room
  148. # and one of them is not complete yet, cache the response and
  149. # return it to all subsequent requests
  150. ret = await self._upgrade_response_cache.wrap(
  151. (old_room_id, user_id),
  152. self._upgrade_room,
  153. requester,
  154. old_room_id,
  155. new_version, # args for _upgrade_room
  156. )
  157. return ret
  158. async def _upgrade_room(
  159. self, requester: Requester, old_room_id: str, new_version: RoomVersion
  160. ):
  161. """
  162. Args:
  163. requester: the user requesting the upgrade
  164. old_room_id: the id of the room to be replaced
  165. new_versions: the version to upgrade the room to
  166. Raises:
  167. ShadowBanError if the requester is shadow-banned.
  168. """
  169. user_id = requester.user.to_string()
  170. assert self.hs.is_mine_id(user_id), "User must be our own: %s" % (user_id,)
  171. # start by allocating a new room id
  172. r = await self.store.get_room(old_room_id)
  173. if r is None:
  174. raise NotFoundError("Unknown room id %s" % (old_room_id,))
  175. new_room_id = await self._generate_room_id(
  176. creator_id=user_id,
  177. is_public=r["is_public"],
  178. room_version=new_version,
  179. )
  180. logger.info("Creating new room %s to replace %s", new_room_id, old_room_id)
  181. # we create and auth the tombstone event before properly creating the new
  182. # room, to check our user has perms in the old room.
  183. (
  184. tombstone_event,
  185. tombstone_context,
  186. ) = await self.event_creation_handler.create_event(
  187. requester,
  188. {
  189. "type": EventTypes.Tombstone,
  190. "state_key": "",
  191. "room_id": old_room_id,
  192. "sender": user_id,
  193. "content": {
  194. "body": "This room has been replaced",
  195. "replacement_room": new_room_id,
  196. },
  197. },
  198. )
  199. old_room_version = await self.store.get_room_version_id(old_room_id)
  200. await self._event_auth_handler.check_from_context(
  201. old_room_version, tombstone_event, tombstone_context
  202. )
  203. await self.clone_existing_room(
  204. requester,
  205. old_room_id=old_room_id,
  206. new_room_id=new_room_id,
  207. new_room_version=new_version,
  208. tombstone_event_id=tombstone_event.event_id,
  209. )
  210. # now send the tombstone
  211. await self.event_creation_handler.handle_new_client_event(
  212. requester=requester,
  213. event=tombstone_event,
  214. context=tombstone_context,
  215. )
  216. old_room_state = await tombstone_context.get_current_state_ids()
  217. # We know the tombstone event isn't an outlier so it has current state.
  218. assert old_room_state is not None
  219. # update any aliases
  220. await self._move_aliases_to_new_room(
  221. requester, old_room_id, new_room_id, old_room_state
  222. )
  223. # Copy over user push rules, tags and migrate room directory state
  224. await self.room_member_handler.transfer_room_state_on_room_upgrade(
  225. old_room_id, new_room_id
  226. )
  227. # finally, shut down the PLs in the old room, and update them in the new
  228. # room.
  229. await self._update_upgraded_room_pls(
  230. requester,
  231. old_room_id,
  232. new_room_id,
  233. old_room_state,
  234. )
  235. return new_room_id
  236. async def _update_upgraded_room_pls(
  237. self,
  238. requester: Requester,
  239. old_room_id: str,
  240. new_room_id: str,
  241. old_room_state: StateMap[str],
  242. ) -> None:
  243. """Send updated power levels in both rooms after an upgrade
  244. Args:
  245. requester: the user requesting the upgrade
  246. old_room_id: the id of the room to be replaced
  247. new_room_id: the id of the replacement room
  248. old_room_state: the state map for the old room
  249. Raises:
  250. ShadowBanError if the requester is shadow-banned.
  251. """
  252. old_room_pl_event_id = old_room_state.get((EventTypes.PowerLevels, ""))
  253. if old_room_pl_event_id is None:
  254. logger.warning(
  255. "Not supported: upgrading a room with no PL event. Not setting PLs "
  256. "in old room."
  257. )
  258. return
  259. old_room_pl_state = await self.store.get_event(old_room_pl_event_id)
  260. # we try to stop regular users from speaking by setting the PL required
  261. # to send regular events and invites to 'Moderator' level. That's normally
  262. # 50, but if the default PL in a room is 50 or more, then we set the
  263. # required PL above that.
  264. pl_content = dict(old_room_pl_state.content)
  265. users_default = int(pl_content.get("users_default", 0))
  266. restricted_level = max(users_default + 1, 50)
  267. updated = False
  268. for v in ("invite", "events_default"):
  269. current = int(pl_content.get(v, 0))
  270. if current < restricted_level:
  271. logger.debug(
  272. "Setting level for %s in %s to %i (was %i)",
  273. v,
  274. old_room_id,
  275. restricted_level,
  276. current,
  277. )
  278. pl_content[v] = restricted_level
  279. updated = True
  280. else:
  281. logger.debug("Not setting level for %s (already %i)", v, current)
  282. if updated:
  283. try:
  284. await self.event_creation_handler.create_and_send_nonmember_event(
  285. requester,
  286. {
  287. "type": EventTypes.PowerLevels,
  288. "state_key": "",
  289. "room_id": old_room_id,
  290. "sender": requester.user.to_string(),
  291. "content": pl_content,
  292. },
  293. ratelimit=False,
  294. )
  295. except AuthError as e:
  296. logger.warning("Unable to update PLs in old room: %s", e)
  297. await self.event_creation_handler.create_and_send_nonmember_event(
  298. requester,
  299. {
  300. "type": EventTypes.PowerLevels,
  301. "state_key": "",
  302. "room_id": new_room_id,
  303. "sender": requester.user.to_string(),
  304. "content": old_room_pl_state.content,
  305. },
  306. ratelimit=False,
  307. )
  308. async def clone_existing_room(
  309. self,
  310. requester: Requester,
  311. old_room_id: str,
  312. new_room_id: str,
  313. new_room_version: RoomVersion,
  314. tombstone_event_id: str,
  315. ) -> None:
  316. """Populate a new room based on an old room
  317. Args:
  318. requester: the user requesting the upgrade
  319. old_room_id : the id of the room to be replaced
  320. new_room_id: the id to give the new room (should already have been
  321. created with _gemerate_room_id())
  322. new_room_version: the new room version to use
  323. tombstone_event_id: the ID of the tombstone event in the old room.
  324. """
  325. user_id = requester.user.to_string()
  326. if not await self.spam_checker.user_may_create_room(user_id):
  327. raise SynapseError(403, "You are not permitted to create rooms")
  328. creation_content: JsonDict = {
  329. "room_version": new_room_version.identifier,
  330. "predecessor": {"room_id": old_room_id, "event_id": tombstone_event_id},
  331. }
  332. # Check if old room was non-federatable
  333. # Get old room's create event
  334. old_room_create_event = await self.store.get_create_event_for_room(old_room_id)
  335. # Check if the create event specified a non-federatable room
  336. if not old_room_create_event.content.get("m.federate", True):
  337. # If so, mark the new room as non-federatable as well
  338. creation_content["m.federate"] = False
  339. initial_state = {}
  340. # Replicate relevant room events
  341. types_to_copy = (
  342. (EventTypes.JoinRules, ""),
  343. (EventTypes.Name, ""),
  344. (EventTypes.Topic, ""),
  345. (EventTypes.RoomHistoryVisibility, ""),
  346. (EventTypes.GuestAccess, ""),
  347. (EventTypes.RoomAvatar, ""),
  348. (EventTypes.RoomEncryption, ""),
  349. (EventTypes.ServerACL, ""),
  350. (EventTypes.RelatedGroups, ""),
  351. (EventTypes.PowerLevels, ""),
  352. )
  353. old_room_state_ids = await self.store.get_filtered_current_state_ids(
  354. old_room_id, StateFilter.from_types(types_to_copy)
  355. )
  356. # map from event_id to BaseEvent
  357. old_room_state_events = await self.store.get_events(old_room_state_ids.values())
  358. for k, old_event_id in old_room_state_ids.items():
  359. old_event = old_room_state_events.get(old_event_id)
  360. if old_event:
  361. initial_state[k] = old_event.content
  362. # deep-copy the power-levels event before we start modifying it
  363. # note that if frozen_dicts are enabled, `power_levels` will be a frozen
  364. # dict so we can't just copy.deepcopy it.
  365. initial_state[
  366. (EventTypes.PowerLevels, "")
  367. ] = power_levels = copy_power_levels_contents(
  368. initial_state[(EventTypes.PowerLevels, "")]
  369. )
  370. # Resolve the minimum power level required to send any state event
  371. # We will give the upgrading user this power level temporarily (if necessary) such that
  372. # they are able to copy all of the state events over, then revert them back to their
  373. # original power level afterwards in _update_upgraded_room_pls
  374. # Copy over user power levels now as this will not be possible with >100PL users once
  375. # the room has been created
  376. # Calculate the minimum power level needed to clone the room
  377. event_power_levels = power_levels.get("events", {})
  378. state_default = power_levels.get("state_default", 50)
  379. ban = power_levels.get("ban", 50)
  380. needed_power_level = max(state_default, ban, max(event_power_levels.values()))
  381. # Get the user's current power level, this matches the logic in get_user_power_level,
  382. # but without the entire state map.
  383. user_power_levels = power_levels.setdefault("users", {})
  384. users_default = power_levels.get("users_default", 0)
  385. current_power_level = user_power_levels.get(user_id, users_default)
  386. # Raise the requester's power level in the new room if necessary
  387. if current_power_level < needed_power_level:
  388. user_power_levels[user_id] = needed_power_level
  389. await self._send_events_for_new_room(
  390. requester,
  391. new_room_id,
  392. # we expect to override all the presets with initial_state, so this is
  393. # somewhat arbitrary.
  394. preset_config=RoomCreationPreset.PRIVATE_CHAT,
  395. invite_list=[],
  396. initial_state=initial_state,
  397. creation_content=creation_content,
  398. ratelimit=False,
  399. )
  400. # Transfer membership events
  401. old_room_member_state_ids = await self.store.get_filtered_current_state_ids(
  402. old_room_id, StateFilter.from_types([(EventTypes.Member, None)])
  403. )
  404. # map from event_id to BaseEvent
  405. old_room_member_state_events = await self.store.get_events(
  406. old_room_member_state_ids.values()
  407. )
  408. for old_event in old_room_member_state_events.values():
  409. # Only transfer ban events
  410. if (
  411. "membership" in old_event.content
  412. and old_event.content["membership"] == "ban"
  413. ):
  414. await self.room_member_handler.update_membership(
  415. requester,
  416. UserID.from_string(old_event["state_key"]),
  417. new_room_id,
  418. "ban",
  419. ratelimit=False,
  420. content=old_event.content,
  421. )
  422. # XXX invites/joins
  423. # XXX 3pid invites
  424. async def _move_aliases_to_new_room(
  425. self,
  426. requester: Requester,
  427. old_room_id: str,
  428. new_room_id: str,
  429. old_room_state: StateMap[str],
  430. ):
  431. # check to see if we have a canonical alias.
  432. canonical_alias_event = None
  433. canonical_alias_event_id = old_room_state.get((EventTypes.CanonicalAlias, ""))
  434. if canonical_alias_event_id:
  435. canonical_alias_event = await self.store.get_event(canonical_alias_event_id)
  436. await self.store.update_aliases_for_room(old_room_id, new_room_id)
  437. if not canonical_alias_event:
  438. return
  439. # If there is a canonical alias we need to update the one in the old
  440. # room and set one in the new one.
  441. old_canonical_alias_content = dict(canonical_alias_event.content)
  442. new_canonical_alias_content = {}
  443. canonical = canonical_alias_event.content.get("alias")
  444. if canonical and self.hs.is_mine_id(canonical):
  445. new_canonical_alias_content["alias"] = canonical
  446. old_canonical_alias_content.pop("alias", None)
  447. # We convert to a list as it will be a Tuple.
  448. old_alt_aliases = list(old_canonical_alias_content.get("alt_aliases", []))
  449. if old_alt_aliases:
  450. old_canonical_alias_content["alt_aliases"] = old_alt_aliases
  451. new_alt_aliases = new_canonical_alias_content.setdefault("alt_aliases", [])
  452. for alias in canonical_alias_event.content.get("alt_aliases", []):
  453. try:
  454. if self.hs.is_mine_id(alias):
  455. new_alt_aliases.append(alias)
  456. old_alt_aliases.remove(alias)
  457. except Exception:
  458. logger.info(
  459. "Invalid alias %s in canonical alias event %s",
  460. alias,
  461. canonical_alias_event_id,
  462. )
  463. if not old_alt_aliases:
  464. old_canonical_alias_content.pop("alt_aliases")
  465. # If a canonical alias event existed for the old room, fire a canonical
  466. # alias event for the new room with a copy of the information.
  467. try:
  468. await self.event_creation_handler.create_and_send_nonmember_event(
  469. requester,
  470. {
  471. "type": EventTypes.CanonicalAlias,
  472. "state_key": "",
  473. "room_id": old_room_id,
  474. "sender": requester.user.to_string(),
  475. "content": old_canonical_alias_content,
  476. },
  477. ratelimit=False,
  478. )
  479. except SynapseError as e:
  480. # again I'm not really expecting this to fail, but if it does, I'd rather
  481. # we returned the new room to the client at this point.
  482. logger.error("Unable to send updated alias events in old room: %s", e)
  483. try:
  484. await self.event_creation_handler.create_and_send_nonmember_event(
  485. requester,
  486. {
  487. "type": EventTypes.CanonicalAlias,
  488. "state_key": "",
  489. "room_id": new_room_id,
  490. "sender": requester.user.to_string(),
  491. "content": new_canonical_alias_content,
  492. },
  493. ratelimit=False,
  494. )
  495. except SynapseError as e:
  496. # again I'm not really expecting this to fail, but if it does, I'd rather
  497. # we returned the new room to the client at this point.
  498. logger.error("Unable to send updated alias events in new room: %s", e)
  499. async def create_room(
  500. self,
  501. requester: Requester,
  502. config: JsonDict,
  503. ratelimit: bool = True,
  504. creator_join_profile: Optional[JsonDict] = None,
  505. ) -> Tuple[dict, int]:
  506. """Creates a new room.
  507. Args:
  508. requester:
  509. The user who requested the room creation.
  510. config : A dict of configuration options.
  511. ratelimit: set to False to disable the rate limiter
  512. creator_join_profile:
  513. Set to override the displayname and avatar for the creating
  514. user in this room. If unset, displayname and avatar will be
  515. derived from the user's profile. If set, should contain the
  516. values to go in the body of the 'join' event (typically
  517. `avatar_url` and/or `displayname`.
  518. Returns:
  519. First, a dict containing the keys `room_id` and, if an alias
  520. was, requested, `room_alias`. Secondly, the stream_id of the
  521. last persisted event.
  522. Raises:
  523. SynapseError if the room ID couldn't be stored, or something went
  524. horribly wrong.
  525. ResourceLimitError if server is blocked to some resource being
  526. exceeded
  527. """
  528. user_id = requester.user.to_string()
  529. await self.auth.check_auth_blocking(requester=requester)
  530. if (
  531. self._server_notices_mxid is not None
  532. and requester.user.to_string() == self._server_notices_mxid
  533. ):
  534. # allow the server notices mxid to create rooms
  535. is_requester_admin = True
  536. else:
  537. is_requester_admin = await self.auth.is_server_admin(requester.user)
  538. # Let the third party rules modify the room creation config if needed, or abort
  539. # the room creation entirely with an exception.
  540. await self.third_party_event_rules.on_create_room(
  541. requester, config, is_requester_admin=is_requester_admin
  542. )
  543. if not is_requester_admin and not await self.spam_checker.user_may_create_room(
  544. user_id
  545. ):
  546. raise SynapseError(403, "You are not permitted to create rooms")
  547. if ratelimit:
  548. await self.ratelimit(requester)
  549. room_version_id = config.get(
  550. "room_version", self.config.default_room_version.identifier
  551. )
  552. if not isinstance(room_version_id, str):
  553. raise SynapseError(400, "room_version must be a string", Codes.BAD_JSON)
  554. room_version = KNOWN_ROOM_VERSIONS.get(room_version_id)
  555. if room_version is None:
  556. raise SynapseError(
  557. 400,
  558. "Your homeserver does not support this room version",
  559. Codes.UNSUPPORTED_ROOM_VERSION,
  560. )
  561. room_alias = None
  562. if "room_alias_name" in config:
  563. for wchar in string.whitespace:
  564. if wchar in config["room_alias_name"]:
  565. raise SynapseError(400, "Invalid characters in room alias")
  566. room_alias = RoomAlias(config["room_alias_name"], self.hs.hostname)
  567. mapping = await self.store.get_association_from_room_alias(room_alias)
  568. if mapping:
  569. raise SynapseError(400, "Room alias already taken", Codes.ROOM_IN_USE)
  570. invite_3pid_list = config.get("invite_3pid", [])
  571. invite_list = config.get("invite", [])
  572. for i in invite_list:
  573. try:
  574. uid = UserID.from_string(i)
  575. parse_and_validate_server_name(uid.domain)
  576. except Exception:
  577. raise SynapseError(400, "Invalid user_id: %s" % (i,))
  578. if (invite_list or invite_3pid_list) and requester.shadow_banned:
  579. # We randomly sleep a bit just to annoy the requester.
  580. await self.clock.sleep(random.randint(1, 10))
  581. # Allow the request to go through, but remove any associated invites.
  582. invite_3pid_list = []
  583. invite_list = []
  584. if invite_list or invite_3pid_list:
  585. try:
  586. # If there are invites in the request, see if the ratelimiting settings
  587. # allow that number of invites to be sent from the current user.
  588. await self.room_member_handler.ratelimit_multiple_invites(
  589. requester,
  590. room_id=None,
  591. n_invites=len(invite_list) + len(invite_3pid_list),
  592. update=False,
  593. )
  594. except LimitExceededError:
  595. raise SynapseError(400, "Cannot invite so many users at once")
  596. await self.event_creation_handler.assert_accepted_privacy_policy(requester)
  597. power_level_content_override = config.get("power_level_content_override")
  598. if (
  599. power_level_content_override
  600. and "users" in power_level_content_override
  601. and user_id not in power_level_content_override["users"]
  602. ):
  603. raise SynapseError(
  604. 400,
  605. "Not a valid power_level_content_override: 'users' did not contain %s"
  606. % (user_id,),
  607. )
  608. visibility = config.get("visibility", None)
  609. is_public = visibility == "public"
  610. room_id = await self._generate_room_id(
  611. creator_id=user_id,
  612. is_public=is_public,
  613. room_version=room_version,
  614. )
  615. # Check whether this visibility value is blocked by a third party module
  616. allowed_by_third_party_rules = await (
  617. self.third_party_event_rules.check_visibility_can_be_modified(
  618. room_id, visibility
  619. )
  620. )
  621. if not allowed_by_third_party_rules:
  622. raise SynapseError(403, "Room visibility value not allowed.")
  623. directory_handler = self.hs.get_directory_handler()
  624. if room_alias:
  625. await directory_handler.create_association(
  626. requester=requester,
  627. room_id=room_id,
  628. room_alias=room_alias,
  629. servers=[self.hs.hostname],
  630. check_membership=False,
  631. )
  632. if is_public:
  633. if not self.config.is_publishing_room_allowed(user_id, room_id, room_alias):
  634. # Lets just return a generic message, as there may be all sorts of
  635. # reasons why we said no. TODO: Allow configurable error messages
  636. # per alias creation rule?
  637. raise SynapseError(403, "Not allowed to publish room")
  638. preset_config = config.get(
  639. "preset",
  640. RoomCreationPreset.PRIVATE_CHAT
  641. if visibility == "private"
  642. else RoomCreationPreset.PUBLIC_CHAT,
  643. )
  644. raw_initial_state = config.get("initial_state", [])
  645. initial_state = OrderedDict()
  646. for val in raw_initial_state:
  647. initial_state[(val["type"], val.get("state_key", ""))] = val["content"]
  648. creation_content = config.get("creation_content", {})
  649. # override any attempt to set room versions via the creation_content
  650. creation_content["room_version"] = room_version.identifier
  651. last_stream_id = await self._send_events_for_new_room(
  652. requester,
  653. room_id,
  654. preset_config=preset_config,
  655. invite_list=invite_list,
  656. initial_state=initial_state,
  657. creation_content=creation_content,
  658. room_alias=room_alias,
  659. power_level_content_override=power_level_content_override,
  660. creator_join_profile=creator_join_profile,
  661. ratelimit=ratelimit,
  662. )
  663. if "name" in config:
  664. name = config["name"]
  665. (
  666. _,
  667. last_stream_id,
  668. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  669. requester,
  670. {
  671. "type": EventTypes.Name,
  672. "room_id": room_id,
  673. "sender": user_id,
  674. "state_key": "",
  675. "content": {"name": name},
  676. },
  677. ratelimit=False,
  678. )
  679. if "topic" in config:
  680. topic = config["topic"]
  681. (
  682. _,
  683. last_stream_id,
  684. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  685. requester,
  686. {
  687. "type": EventTypes.Topic,
  688. "room_id": room_id,
  689. "sender": user_id,
  690. "state_key": "",
  691. "content": {"topic": topic},
  692. },
  693. ratelimit=False,
  694. )
  695. # we avoid dropping the lock between invites, as otherwise joins can
  696. # start coming in and making the createRoom slow.
  697. #
  698. # we also don't need to check the requester's shadow-ban here, as we
  699. # have already done so above (and potentially emptied invite_list).
  700. with (await self.room_member_handler.member_linearizer.queue((room_id,))):
  701. content = {}
  702. is_direct = config.get("is_direct", None)
  703. if is_direct:
  704. content["is_direct"] = is_direct
  705. for invitee in invite_list:
  706. (
  707. _,
  708. last_stream_id,
  709. ) = await self.room_member_handler.update_membership_locked(
  710. requester,
  711. UserID.from_string(invitee),
  712. room_id,
  713. "invite",
  714. ratelimit=False,
  715. content=content,
  716. )
  717. for invite_3pid in invite_3pid_list:
  718. id_server = invite_3pid["id_server"]
  719. id_access_token = invite_3pid.get("id_access_token") # optional
  720. address = invite_3pid["address"]
  721. medium = invite_3pid["medium"]
  722. # Note that do_3pid_invite can raise a ShadowBanError, but this was
  723. # handled above by emptying invite_3pid_list.
  724. last_stream_id = await self.hs.get_room_member_handler().do_3pid_invite(
  725. room_id,
  726. requester.user,
  727. medium,
  728. address,
  729. id_server,
  730. requester,
  731. txn_id=None,
  732. id_access_token=id_access_token,
  733. )
  734. result = {"room_id": room_id}
  735. if room_alias:
  736. result["room_alias"] = room_alias.to_string()
  737. # Always wait for room creation to propagate before returning
  738. await self._replication.wait_for_stream_position(
  739. self.hs.config.worker.events_shard_config.get_instance(room_id),
  740. "events",
  741. last_stream_id,
  742. )
  743. return result, last_stream_id
  744. async def _send_events_for_new_room(
  745. self,
  746. creator: Requester,
  747. room_id: str,
  748. preset_config: str,
  749. invite_list: List[str],
  750. initial_state: MutableStateMap,
  751. creation_content: JsonDict,
  752. room_alias: Optional[RoomAlias] = None,
  753. power_level_content_override: Optional[JsonDict] = None,
  754. creator_join_profile: Optional[JsonDict] = None,
  755. ratelimit: bool = True,
  756. ) -> int:
  757. """Sends the initial events into a new room.
  758. `power_level_content_override` doesn't apply when initial state has
  759. power level state event content.
  760. Returns:
  761. The stream_id of the last event persisted.
  762. """
  763. creator_id = creator.user.to_string()
  764. event_keys = {"room_id": room_id, "sender": creator_id, "state_key": ""}
  765. def create(etype: str, content: JsonDict, **kwargs) -> JsonDict:
  766. e = {"type": etype, "content": content}
  767. e.update(event_keys)
  768. e.update(kwargs)
  769. return e
  770. async def send(etype: str, content: JsonDict, **kwargs) -> int:
  771. event = create(etype, content, **kwargs)
  772. logger.debug("Sending %s in new room", etype)
  773. # Allow these events to be sent even if the user is shadow-banned to
  774. # allow the room creation to complete.
  775. (
  776. _,
  777. last_stream_id,
  778. ) = await self.event_creation_handler.create_and_send_nonmember_event(
  779. creator,
  780. event,
  781. ratelimit=False,
  782. ignore_shadow_ban=True,
  783. )
  784. return last_stream_id
  785. config = self._presets_dict[preset_config]
  786. creation_content.update({"creator": creator_id})
  787. await send(etype=EventTypes.Create, content=creation_content)
  788. logger.debug("Sending %s in new room", EventTypes.Member)
  789. await self.room_member_handler.update_membership(
  790. creator,
  791. creator.user,
  792. room_id,
  793. "join",
  794. ratelimit=ratelimit,
  795. content=creator_join_profile,
  796. )
  797. # We treat the power levels override specially as this needs to be one
  798. # of the first events that get sent into a room.
  799. pl_content = initial_state.pop((EventTypes.PowerLevels, ""), None)
  800. if pl_content is not None:
  801. last_sent_stream_id = await send(
  802. etype=EventTypes.PowerLevels, content=pl_content
  803. )
  804. else:
  805. power_level_content: JsonDict = {
  806. "users": {creator_id: 100},
  807. "users_default": 0,
  808. "events": {
  809. EventTypes.Name: 50,
  810. EventTypes.PowerLevels: 100,
  811. EventTypes.RoomHistoryVisibility: 100,
  812. EventTypes.CanonicalAlias: 50,
  813. EventTypes.RoomAvatar: 50,
  814. EventTypes.Tombstone: 100,
  815. EventTypes.ServerACL: 100,
  816. EventTypes.RoomEncryption: 100,
  817. },
  818. "events_default": 0,
  819. "state_default": 50,
  820. "ban": 50,
  821. "kick": 50,
  822. "redact": 50,
  823. "invite": 50,
  824. "historical": 100,
  825. }
  826. if config["original_invitees_have_ops"]:
  827. for invitee in invite_list:
  828. power_level_content["users"][invitee] = 100
  829. # Power levels overrides are defined per chat preset
  830. power_level_content.update(config["power_level_content_override"])
  831. if power_level_content_override:
  832. power_level_content.update(power_level_content_override)
  833. last_sent_stream_id = await send(
  834. etype=EventTypes.PowerLevels, content=power_level_content
  835. )
  836. if room_alias and (EventTypes.CanonicalAlias, "") not in initial_state:
  837. last_sent_stream_id = await send(
  838. etype=EventTypes.CanonicalAlias,
  839. content={"alias": room_alias.to_string()},
  840. )
  841. if (EventTypes.JoinRules, "") not in initial_state:
  842. last_sent_stream_id = await send(
  843. etype=EventTypes.JoinRules, content={"join_rule": config["join_rules"]}
  844. )
  845. if (EventTypes.RoomHistoryVisibility, "") not in initial_state:
  846. last_sent_stream_id = await send(
  847. etype=EventTypes.RoomHistoryVisibility,
  848. content={"history_visibility": config["history_visibility"]},
  849. )
  850. if config["guest_can_join"]:
  851. if (EventTypes.GuestAccess, "") not in initial_state:
  852. last_sent_stream_id = await send(
  853. etype=EventTypes.GuestAccess, content={"guest_access": "can_join"}
  854. )
  855. for (etype, state_key), content in initial_state.items():
  856. last_sent_stream_id = await send(
  857. etype=etype, state_key=state_key, content=content
  858. )
  859. if config["encrypted"]:
  860. last_sent_stream_id = await send(
  861. etype=EventTypes.RoomEncryption,
  862. state_key="",
  863. content={"algorithm": RoomEncryptionAlgorithms.DEFAULT},
  864. )
  865. return last_sent_stream_id
  866. async def _generate_room_id(
  867. self,
  868. creator_id: str,
  869. is_public: bool,
  870. room_version: RoomVersion,
  871. ):
  872. # autogen room IDs and try to create it. We may clash, so just
  873. # try a few times till one goes through, giving up eventually.
  874. attempts = 0
  875. while attempts < 5:
  876. try:
  877. random_string = stringutils.random_string(18)
  878. gen_room_id = RoomID(random_string, self.hs.hostname).to_string()
  879. await self.store.store_room(
  880. room_id=gen_room_id,
  881. room_creator_user_id=creator_id,
  882. is_public=is_public,
  883. room_version=room_version,
  884. )
  885. return gen_room_id
  886. except StoreError:
  887. attempts += 1
  888. raise StoreError(500, "Couldn't generate a room ID.")
  889. class RoomContextHandler:
  890. def __init__(self, hs: "HomeServer"):
  891. self.hs = hs
  892. self.auth = hs.get_auth()
  893. self.store = hs.get_datastore()
  894. self.storage = hs.get_storage()
  895. self.state_store = self.storage.state
  896. async def get_event_context(
  897. self,
  898. requester: Requester,
  899. room_id: str,
  900. event_id: str,
  901. limit: int,
  902. event_filter: Optional[Filter],
  903. use_admin_priviledge: bool = False,
  904. ) -> Optional[JsonDict]:
  905. """Retrieves events, pagination tokens and state around a given event
  906. in a room.
  907. Args:
  908. requester
  909. room_id
  910. event_id
  911. limit: The maximum number of events to return in total
  912. (excluding state).
  913. event_filter: the filter to apply to the events returned
  914. (excluding the target event_id)
  915. use_admin_priviledge: if `True`, return all events, regardless
  916. of whether `user` has access to them. To be used **ONLY**
  917. from the admin API.
  918. Returns:
  919. dict, or None if the event isn't found
  920. """
  921. user = requester.user
  922. if use_admin_priviledge:
  923. await assert_user_is_admin(self.auth, requester.user)
  924. before_limit = math.floor(limit / 2.0)
  925. after_limit = limit - before_limit
  926. users = await self.store.get_users_in_room(room_id)
  927. is_peeking = user.to_string() not in users
  928. async def filter_evts(events):
  929. if use_admin_priviledge:
  930. return events
  931. return await filter_events_for_client(
  932. self.storage, user.to_string(), events, is_peeking=is_peeking
  933. )
  934. event = await self.store.get_event(
  935. event_id, get_prev_content=True, allow_none=True
  936. )
  937. if not event:
  938. return None
  939. filtered = await filter_evts([event])
  940. if not filtered:
  941. raise AuthError(403, "You don't have permission to access that event.")
  942. results = await self.store.get_events_around(
  943. room_id, event_id, before_limit, after_limit, event_filter
  944. )
  945. if event_filter:
  946. results["events_before"] = event_filter.filter(results["events_before"])
  947. results["events_after"] = event_filter.filter(results["events_after"])
  948. results["events_before"] = await filter_evts(results["events_before"])
  949. results["events_after"] = await filter_evts(results["events_after"])
  950. # filter_evts can return a pruned event in case the user is allowed to see that
  951. # there's something there but not see the content, so use the event that's in
  952. # `filtered` rather than the event we retrieved from the datastore.
  953. results["event"] = filtered[0]
  954. if results["events_after"]:
  955. last_event_id = results["events_after"][-1].event_id
  956. else:
  957. last_event_id = event_id
  958. if event_filter and event_filter.lazy_load_members():
  959. state_filter = StateFilter.from_lazy_load_member_list(
  960. ev.sender
  961. for ev in itertools.chain(
  962. results["events_before"],
  963. (results["event"],),
  964. results["events_after"],
  965. )
  966. )
  967. else:
  968. state_filter = StateFilter.all()
  969. # XXX: why do we return the state as of the last event rather than the
  970. # first? Shouldn't we be consistent with /sync?
  971. # https://github.com/matrix-org/matrix-doc/issues/687
  972. state = await self.state_store.get_state_for_events(
  973. [last_event_id], state_filter=state_filter
  974. )
  975. state_events = list(state[last_event_id].values())
  976. if event_filter:
  977. state_events = event_filter.filter(state_events)
  978. results["state"] = await filter_evts(state_events)
  979. # We use a dummy token here as we only care about the room portion of
  980. # the token, which we replace.
  981. token = StreamToken.START
  982. results["start"] = await token.copy_and_replace(
  983. "room_key", results["start"]
  984. ).to_string(self.store)
  985. results["end"] = await token.copy_and_replace(
  986. "room_key", results["end"]
  987. ).to_string(self.store)
  988. return results
  989. class RoomEventSource:
  990. def __init__(self, hs: "HomeServer"):
  991. self.store = hs.get_datastore()
  992. async def get_new_events(
  993. self,
  994. user: UserID,
  995. from_key: RoomStreamToken,
  996. limit: int,
  997. room_ids: List[str],
  998. is_guest: bool,
  999. explicit_room_id: Optional[str] = None,
  1000. ) -> Tuple[List[EventBase], RoomStreamToken]:
  1001. # We just ignore the key for now.
  1002. to_key = self.get_current_key()
  1003. if from_key.topological:
  1004. logger.warning("Stream has topological part!!!! %r", from_key)
  1005. from_key = RoomStreamToken(None, from_key.stream)
  1006. app_service = self.store.get_app_service_by_user_id(user.to_string())
  1007. if app_service:
  1008. # We no longer support AS users using /sync directly.
  1009. # See https://github.com/matrix-org/matrix-doc/issues/1144
  1010. raise NotImplementedError()
  1011. else:
  1012. room_events = await self.store.get_membership_changes_for_user(
  1013. user.to_string(), from_key, to_key
  1014. )
  1015. room_to_events = await self.store.get_room_events_stream_for_rooms(
  1016. room_ids=room_ids,
  1017. from_key=from_key,
  1018. to_key=to_key,
  1019. limit=limit or 10,
  1020. order="ASC",
  1021. )
  1022. events = list(room_events)
  1023. events.extend(e for evs, _ in room_to_events.values() for e in evs)
  1024. events.sort(key=lambda e: e.internal_metadata.order)
  1025. if limit:
  1026. events[:] = events[:limit]
  1027. if events:
  1028. end_key = events[-1].internal_metadata.after
  1029. else:
  1030. end_key = to_key
  1031. return (events, end_key)
  1032. def get_current_key(self) -> RoomStreamToken:
  1033. return self.store.get_room_max_token()
  1034. def get_current_key_for_room(self, room_id: str) -> Awaitable[str]:
  1035. return self.store.get_room_events_max_id(room_id)
  1036. class RoomShutdownHandler:
  1037. DEFAULT_MESSAGE = (
  1038. "Sharing illegal content on this server is not permitted and rooms in"
  1039. " violation will be blocked."
  1040. )
  1041. DEFAULT_ROOM_NAME = "Content Violation Notification"
  1042. def __init__(self, hs: "HomeServer"):
  1043. self.hs = hs
  1044. self.room_member_handler = hs.get_room_member_handler()
  1045. self._room_creation_handler = hs.get_room_creation_handler()
  1046. self._replication = hs.get_replication_data_handler()
  1047. self.event_creation_handler = hs.get_event_creation_handler()
  1048. self.state = hs.get_state_handler()
  1049. self.store = hs.get_datastore()
  1050. async def shutdown_room(
  1051. self,
  1052. room_id: str,
  1053. requester_user_id: str,
  1054. new_room_user_id: Optional[str] = None,
  1055. new_room_name: Optional[str] = None,
  1056. message: Optional[str] = None,
  1057. block: bool = False,
  1058. ) -> dict:
  1059. """
  1060. Shuts down a room. Moves all local users and room aliases automatically
  1061. to a new room if `new_room_user_id` is set. Otherwise local users only
  1062. leave the room without any information.
  1063. The new room will be created with the user specified by the
  1064. `new_room_user_id` parameter as room administrator and will contain a
  1065. message explaining what happened. Users invited to the new room will
  1066. have power level `-10` by default, and thus be unable to speak.
  1067. The local server will only have the power to move local user and room
  1068. aliases to the new room. Users on other servers will be unaffected.
  1069. Args:
  1070. room_id: The ID of the room to shut down.
  1071. requester_user_id:
  1072. User who requested the action and put the room on the
  1073. blocking list.
  1074. new_room_user_id:
  1075. If set, a new room will be created with this user ID
  1076. as the creator and admin, and all users in the old room will be
  1077. moved into that room. If not set, no new room will be created
  1078. and the users will just be removed from the old room.
  1079. new_room_name:
  1080. A string representing the name of the room that new users will
  1081. be invited to. Defaults to `Content Violation Notification`
  1082. message:
  1083. A string containing the first message that will be sent as
  1084. `new_room_user_id` in the new room. Ideally this will clearly
  1085. convey why the original room was shut down.
  1086. Defaults to `Sharing illegal content on this server is not
  1087. permitted and rooms in violation will be blocked.`
  1088. block:
  1089. If set to `true`, this room will be added to a blocking list,
  1090. preventing future attempts to join the room. Defaults to `false`.
  1091. Returns: a dict containing the following keys:
  1092. kicked_users: An array of users (`user_id`) that were kicked.
  1093. failed_to_kick_users:
  1094. An array of users (`user_id`) that that were not kicked.
  1095. local_aliases:
  1096. An array of strings representing the local aliases that were
  1097. migrated from the old room to the new.
  1098. new_room_id: A string representing the room ID of the new room.
  1099. """
  1100. if not new_room_name:
  1101. new_room_name = self.DEFAULT_ROOM_NAME
  1102. if not message:
  1103. message = self.DEFAULT_MESSAGE
  1104. if not RoomID.is_valid(room_id):
  1105. raise SynapseError(400, "%s is not a legal room ID" % (room_id,))
  1106. if not await self.store.get_room(room_id):
  1107. raise NotFoundError("Unknown room id %s" % (room_id,))
  1108. # This will work even if the room is already blocked, but that is
  1109. # desirable in case the first attempt at blocking the room failed below.
  1110. if block:
  1111. await self.store.block_room(room_id, requester_user_id)
  1112. if new_room_user_id is not None:
  1113. if not self.hs.is_mine_id(new_room_user_id):
  1114. raise SynapseError(
  1115. 400, "User must be our own: %s" % (new_room_user_id,)
  1116. )
  1117. room_creator_requester = create_requester(
  1118. new_room_user_id, authenticated_entity=requester_user_id
  1119. )
  1120. info, stream_id = await self._room_creation_handler.create_room(
  1121. room_creator_requester,
  1122. config={
  1123. "preset": RoomCreationPreset.PUBLIC_CHAT,
  1124. "name": new_room_name,
  1125. "power_level_content_override": {"users_default": -10},
  1126. },
  1127. ratelimit=False,
  1128. )
  1129. new_room_id = info["room_id"]
  1130. logger.info(
  1131. "Shutting down room %r, joining to new room: %r", room_id, new_room_id
  1132. )
  1133. # We now wait for the create room to come back in via replication so
  1134. # that we can assume that all the joins/invites have propagated before
  1135. # we try and auto join below.
  1136. await self._replication.wait_for_stream_position(
  1137. self.hs.config.worker.events_shard_config.get_instance(new_room_id),
  1138. "events",
  1139. stream_id,
  1140. )
  1141. else:
  1142. new_room_id = None
  1143. logger.info("Shutting down room %r", room_id)
  1144. users = await self.store.get_users_in_room(room_id)
  1145. kicked_users = []
  1146. failed_to_kick_users = []
  1147. for user_id in users:
  1148. if not self.hs.is_mine_id(user_id):
  1149. continue
  1150. logger.info("Kicking %r from %r...", user_id, room_id)
  1151. try:
  1152. # Kick users from room
  1153. target_requester = create_requester(
  1154. user_id, authenticated_entity=requester_user_id
  1155. )
  1156. _, stream_id = await self.room_member_handler.update_membership(
  1157. requester=target_requester,
  1158. target=target_requester.user,
  1159. room_id=room_id,
  1160. action=Membership.LEAVE,
  1161. content={},
  1162. ratelimit=False,
  1163. require_consent=False,
  1164. )
  1165. # Wait for leave to come in over replication before trying to forget.
  1166. await self._replication.wait_for_stream_position(
  1167. self.hs.config.worker.events_shard_config.get_instance(room_id),
  1168. "events",
  1169. stream_id,
  1170. )
  1171. await self.room_member_handler.forget(target_requester.user, room_id)
  1172. # Join users to new room
  1173. if new_room_user_id:
  1174. await self.room_member_handler.update_membership(
  1175. requester=target_requester,
  1176. target=target_requester.user,
  1177. room_id=new_room_id,
  1178. action=Membership.JOIN,
  1179. content={},
  1180. ratelimit=False,
  1181. require_consent=False,
  1182. )
  1183. kicked_users.append(user_id)
  1184. except Exception:
  1185. logger.exception(
  1186. "Failed to leave old room and join new room for %r", user_id
  1187. )
  1188. failed_to_kick_users.append(user_id)
  1189. # Send message in new room and move aliases
  1190. if new_room_user_id:
  1191. await self.event_creation_handler.create_and_send_nonmember_event(
  1192. room_creator_requester,
  1193. {
  1194. "type": "m.room.message",
  1195. "content": {"body": message, "msgtype": "m.text"},
  1196. "room_id": new_room_id,
  1197. "sender": new_room_user_id,
  1198. },
  1199. ratelimit=False,
  1200. )
  1201. aliases_for_room = await self.store.get_aliases_for_room(room_id)
  1202. await self.store.update_aliases_for_room(
  1203. room_id, new_room_id, requester_user_id
  1204. )
  1205. else:
  1206. aliases_for_room = []
  1207. return {
  1208. "kicked_users": kicked_users,
  1209. "failed_to_kick_users": failed_to_kick_users,
  1210. "local_aliases": aliases_for_room,
  1211. "new_room_id": new_room_id,
  1212. }