2018-02-23 12:01:21 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright 2018 New Vector Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2018-08-30 16:19:58 +02:00
|
|
|
|
2018-07-26 14:31:59 +02:00
|
|
|
import itertools
|
2018-07-09 08:09:20 +02:00
|
|
|
import logging
|
|
|
|
from collections import namedtuple
|
|
|
|
|
|
|
|
from canonicaljson import json
|
2018-02-23 12:01:21 +01:00
|
|
|
|
2018-06-22 10:37:10 +02:00
|
|
|
from twisted.internet import defer
|
2018-02-23 12:01:21 +01:00
|
|
|
|
2019-01-28 22:09:45 +01:00
|
|
|
from synapse.api.constants import EventFormatVersions, EventTypes
|
2018-08-02 14:23:48 +02:00
|
|
|
from synapse.api.errors import NotFoundError
|
2019-01-24 12:14:07 +01:00
|
|
|
from synapse.events import FrozenEvent, event_type_from_format_version # noqa: F401
|
2018-07-09 08:09:20 +02:00
|
|
|
# these are only included to make the type annotations work
|
|
|
|
from synapse.events.snapshot import EventContext # noqa: F401
|
2018-02-23 12:01:21 +01:00
|
|
|
from synapse.events.utils import prune_event
|
2018-07-18 15:35:24 +02:00
|
|
|
from synapse.metrics.background_process_metrics import run_as_background_process
|
2019-01-28 22:09:45 +01:00
|
|
|
from synapse.types import get_domain_from_id
|
2018-02-23 12:01:21 +01:00
|
|
|
from synapse.util.logcontext import (
|
2018-06-21 07:15:03 +02:00
|
|
|
LoggingContext,
|
2018-07-09 08:09:20 +02:00
|
|
|
PreserveLoggingContext,
|
|
|
|
make_deferred_yieldable,
|
|
|
|
run_in_background,
|
2018-02-23 12:01:21 +01:00
|
|
|
)
|
|
|
|
from synapse.util.metrics import Measure
|
|
|
|
|
2018-07-09 08:09:20 +02:00
|
|
|
from ._base import SQLBaseStore
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
# These values are used in the `enqueus_event` and `_do_fetch` methods to
|
|
|
|
# control how we batch/bulk fetch events from the database.
|
|
|
|
# The values are plucked out of thing air to make initial sync run faster
|
|
|
|
# on jki.re
|
|
|
|
# TODO: Make these configurable.
|
|
|
|
EVENT_QUEUE_THREADS = 3 # Max number of threads that will fetch events
|
|
|
|
EVENT_QUEUE_ITERATIONS = 3 # No. times we block waiting for requests for events
|
|
|
|
EVENT_QUEUE_TIMEOUT_S = 0.1 # Timeout when waiting for requests for events
|
|
|
|
|
|
|
|
|
|
|
|
_EventCacheEntry = namedtuple("_EventCacheEntry", ("event", "redacted_event"))
|
|
|
|
|
|
|
|
|
|
|
|
class EventsWorkerStore(SQLBaseStore):
|
2018-04-11 12:52:19 +02:00
|
|
|
def get_received_ts(self, event_id):
|
2018-04-12 13:07:09 +02:00
|
|
|
"""Get received_ts (when it was persisted) for the event.
|
|
|
|
|
|
|
|
Raises an exception for unknown events.
|
2018-04-11 12:52:19 +02:00
|
|
|
|
|
|
|
Args:
|
|
|
|
event_id (str)
|
|
|
|
|
|
|
|
Returns:
|
2018-04-12 12:20:51 +02:00
|
|
|
Deferred[int|None]: Timestamp in milliseconds, or None for events
|
2018-04-11 12:52:19 +02:00
|
|
|
that were persisted before received_ts was implemented.
|
|
|
|
"""
|
|
|
|
return self._simple_select_one_onecol(
|
|
|
|
table="events",
|
|
|
|
keyvalues={
|
|
|
|
"event_id": event_id,
|
|
|
|
},
|
|
|
|
retcol="received_ts",
|
|
|
|
desc="get_received_ts",
|
|
|
|
)
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def get_event(self, event_id, check_redacted=True,
|
|
|
|
get_prev_content=False, allow_rejected=False,
|
2018-08-02 14:23:48 +02:00
|
|
|
allow_none=False, check_room_id=None):
|
2018-02-23 12:01:21 +01:00
|
|
|
"""Get an event from the database by event_id.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event_id (str): The event_id of the event to fetch
|
|
|
|
check_redacted (bool): If True, check if event has been redacted
|
|
|
|
and redact it.
|
|
|
|
get_prev_content (bool): If True and event is a state event,
|
|
|
|
include the previous states content in the unsigned field.
|
|
|
|
allow_rejected (bool): If True return rejected events.
|
|
|
|
allow_none (bool): If True, return None if no event found, if
|
2018-08-02 14:23:48 +02:00
|
|
|
False throw a NotFoundError
|
|
|
|
check_room_id (str|None): if not None, check the room of the found event.
|
|
|
|
If there is a mismatch, behave as per allow_none.
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred : A FrozenEvent.
|
|
|
|
"""
|
|
|
|
events = yield self._get_events(
|
|
|
|
[event_id],
|
|
|
|
check_redacted=check_redacted,
|
|
|
|
get_prev_content=get_prev_content,
|
|
|
|
allow_rejected=allow_rejected,
|
|
|
|
)
|
|
|
|
|
2018-08-02 14:23:48 +02:00
|
|
|
event = events[0] if events else None
|
2018-02-23 12:01:21 +01:00
|
|
|
|
2018-08-02 14:23:48 +02:00
|
|
|
if event is not None and check_room_id is not None:
|
|
|
|
if event.room_id != check_room_id:
|
|
|
|
event = None
|
|
|
|
|
|
|
|
if event is None and not allow_none:
|
|
|
|
raise NotFoundError("Could not find event %s" % (event_id,))
|
|
|
|
|
|
|
|
defer.returnValue(event)
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def get_events(self, event_ids, check_redacted=True,
|
|
|
|
get_prev_content=False, allow_rejected=False):
|
|
|
|
"""Get events from the database
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event_ids (list): The event_ids of the events to fetch
|
|
|
|
check_redacted (bool): If True, check if event has been redacted
|
|
|
|
and redact it.
|
|
|
|
get_prev_content (bool): If True and event is a state event,
|
|
|
|
include the previous states content in the unsigned field.
|
|
|
|
allow_rejected (bool): If True return rejected events.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred : Dict from event_id to event.
|
|
|
|
"""
|
|
|
|
events = yield self._get_events(
|
|
|
|
event_ids,
|
|
|
|
check_redacted=check_redacted,
|
|
|
|
get_prev_content=get_prev_content,
|
|
|
|
allow_rejected=allow_rejected,
|
|
|
|
)
|
|
|
|
|
|
|
|
defer.returnValue({e.event_id: e for e in events})
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def _get_events(self, event_ids, check_redacted=True,
|
|
|
|
get_prev_content=False, allow_rejected=False):
|
|
|
|
if not event_ids:
|
|
|
|
defer.returnValue([])
|
|
|
|
|
|
|
|
event_id_list = event_ids
|
|
|
|
event_ids = set(event_ids)
|
|
|
|
|
|
|
|
event_entry_map = self._get_events_from_cache(
|
|
|
|
event_ids,
|
|
|
|
allow_rejected=allow_rejected,
|
|
|
|
)
|
|
|
|
|
|
|
|
missing_events_ids = [e for e in event_ids if e not in event_entry_map]
|
|
|
|
|
|
|
|
if missing_events_ids:
|
2018-06-21 07:15:03 +02:00
|
|
|
log_ctx = LoggingContext.current_context()
|
2018-06-22 11:42:28 +02:00
|
|
|
log_ctx.record_event_fetch(len(missing_events_ids))
|
2018-06-21 07:15:03 +02:00
|
|
|
|
2019-01-31 16:34:17 +01:00
|
|
|
# Note that _enqueue_events is also responsible for turning db rows
|
|
|
|
# into FrozenEvents (via _get_event_from_row), which involves seeing if
|
|
|
|
# the events have been redacted, and if so pulling the redaction event out
|
|
|
|
# of the database to check it.
|
|
|
|
#
|
|
|
|
# _enqueue_events is a bit of a rubbish name but naming is hard.
|
2018-02-23 12:01:21 +01:00
|
|
|
missing_events = yield self._enqueue_events(
|
|
|
|
missing_events_ids,
|
|
|
|
allow_rejected=allow_rejected,
|
|
|
|
)
|
|
|
|
|
|
|
|
event_entry_map.update(missing_events)
|
|
|
|
|
|
|
|
events = []
|
|
|
|
for event_id in event_id_list:
|
|
|
|
entry = event_entry_map.get(event_id, None)
|
|
|
|
if not entry:
|
|
|
|
continue
|
|
|
|
|
2019-01-29 22:14:39 +01:00
|
|
|
# Starting in room version v3, some redactions need to be rechecked if we
|
2019-01-28 22:09:45 +01:00
|
|
|
# didn't have the redacted event at the time, so we recheck on read
|
|
|
|
# instead.
|
|
|
|
if not allow_rejected and entry.event.type == EventTypes.Redaction:
|
|
|
|
if entry.event.internal_metadata.need_to_check_redaction():
|
2019-01-31 16:34:17 +01:00
|
|
|
# XXX: we need to avoid calling get_event here.
|
|
|
|
#
|
|
|
|
# The problem is that we end up at this point when an event
|
|
|
|
# which has been redacted is pulled out of the database by
|
|
|
|
# _enqueue_events, because _enqueue_events needs to check the
|
|
|
|
# redaction before it can cache the redacted event. So obviously,
|
|
|
|
# calling get_event to get the redacted event out of the database
|
|
|
|
# gives us an infinite loop.
|
|
|
|
#
|
|
|
|
# For now (quick hack to fix during 0.99 release cycle), we just
|
|
|
|
# go and fetch the relevant row from the db, but it would be nice
|
|
|
|
# to think about how we can cache this rather than hit the db
|
|
|
|
# every time we access a redaction event.
|
|
|
|
#
|
|
|
|
# One thought on how to do this:
|
|
|
|
# 1. split _get_events up so that it is divided into (a) get the
|
|
|
|
# rawish event from the db/cache, (b) do the redaction/rejection
|
|
|
|
# filtering
|
|
|
|
# 2. have _get_event_from_row just call the first half of that
|
|
|
|
|
|
|
|
orig_sender = yield self._simple_select_one_onecol(
|
|
|
|
table="events",
|
|
|
|
keyvalues={"event_id": entry.event.redacts},
|
|
|
|
retcol="sender",
|
2019-01-28 22:09:45 +01:00
|
|
|
allow_none=True,
|
|
|
|
)
|
2019-01-31 16:34:17 +01:00
|
|
|
|
2019-01-28 22:09:45 +01:00
|
|
|
expected_domain = get_domain_from_id(entry.event.sender)
|
2019-01-31 16:34:17 +01:00
|
|
|
if orig_sender and get_domain_from_id(orig_sender) == expected_domain:
|
2019-01-28 22:09:45 +01:00
|
|
|
# This redaction event is allowed. Mark as not needing a
|
|
|
|
# recheck.
|
2019-01-29 22:45:53 +01:00
|
|
|
entry.event.internal_metadata.recheck_redaction = False
|
2019-01-28 22:09:45 +01:00
|
|
|
else:
|
|
|
|
# We don't have the event that is being redacted, so we
|
|
|
|
# assume that the event isn't authorized for now. (If we
|
|
|
|
# later receive the event, then we will always redact
|
|
|
|
# it anyway, since we have this redaction)
|
|
|
|
continue
|
|
|
|
|
2018-02-23 12:01:21 +01:00
|
|
|
if allow_rejected or not entry.event.rejected_reason:
|
|
|
|
if check_redacted and entry.redacted_event:
|
|
|
|
event = entry.redacted_event
|
|
|
|
else:
|
|
|
|
event = entry.event
|
|
|
|
|
|
|
|
events.append(event)
|
|
|
|
|
|
|
|
if get_prev_content:
|
|
|
|
if "replaces_state" in event.unsigned:
|
|
|
|
prev = yield self.get_event(
|
|
|
|
event.unsigned["replaces_state"],
|
|
|
|
get_prev_content=False,
|
|
|
|
allow_none=True,
|
|
|
|
)
|
|
|
|
if prev:
|
|
|
|
event.unsigned = dict(event.unsigned)
|
|
|
|
event.unsigned["prev_content"] = prev.content
|
|
|
|
event.unsigned["prev_sender"] = prev.sender
|
|
|
|
|
|
|
|
defer.returnValue(events)
|
|
|
|
|
|
|
|
def _invalidate_get_event_cache(self, event_id):
|
2019-01-30 11:53:17 +01:00
|
|
|
self._get_event_cache.invalidate((event_id,))
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
def _get_events_from_cache(self, events, allow_rejected, update_metrics=True):
|
|
|
|
"""Fetch events from the caches
|
|
|
|
|
|
|
|
Args:
|
|
|
|
events (list(str)): list of event_ids to fetch
|
|
|
|
allow_rejected (bool): Whether to teturn events that were rejected
|
|
|
|
update_metrics (bool): Whether to update the cache hit ratio metrics
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
dict of event_id -> _EventCacheEntry for each event_id in cache. If
|
|
|
|
allow_rejected is `False` then there will still be an entry but it
|
|
|
|
will be `None`
|
|
|
|
"""
|
|
|
|
event_map = {}
|
|
|
|
|
|
|
|
for event_id in events:
|
|
|
|
ret = self._get_event_cache.get(
|
|
|
|
(event_id,), None,
|
|
|
|
update_metrics=update_metrics,
|
|
|
|
)
|
|
|
|
if not ret:
|
|
|
|
continue
|
|
|
|
|
|
|
|
if allow_rejected or not ret.event.rejected_reason:
|
|
|
|
event_map[event_id] = ret
|
|
|
|
else:
|
|
|
|
event_map[event_id] = None
|
|
|
|
|
|
|
|
return event_map
|
|
|
|
|
|
|
|
def _do_fetch(self, conn):
|
|
|
|
"""Takes a database connection and waits for requests for events from
|
|
|
|
the _event_fetch_list queue.
|
|
|
|
"""
|
|
|
|
i = 0
|
|
|
|
while True:
|
2018-07-09 19:06:03 +02:00
|
|
|
with self._event_fetch_lock:
|
|
|
|
event_list = self._event_fetch_list
|
|
|
|
self._event_fetch_list = []
|
|
|
|
|
|
|
|
if not event_list:
|
|
|
|
single_threaded = self.database_engine.single_threaded
|
|
|
|
if single_threaded or i > EVENT_QUEUE_ITERATIONS:
|
|
|
|
self._event_fetch_ongoing -= 1
|
|
|
|
return
|
|
|
|
else:
|
|
|
|
self._event_fetch_lock.wait(EVENT_QUEUE_TIMEOUT_S)
|
|
|
|
i += 1
|
|
|
|
continue
|
|
|
|
i = 0
|
|
|
|
|
|
|
|
self._fetch_event_list(conn, event_list)
|
|
|
|
|
|
|
|
def _fetch_event_list(self, conn, event_list):
|
|
|
|
"""Handle a load of requests from the _event_fetch_list queue
|
|
|
|
|
|
|
|
Args:
|
|
|
|
conn (twisted.enterprise.adbapi.Connection): database connection
|
|
|
|
|
|
|
|
event_list (list[Tuple[list[str], Deferred]]):
|
|
|
|
The fetch requests. Each entry consists of a list of event
|
|
|
|
ids to be fetched, and a deferred to be completed once the
|
|
|
|
events have been fetched.
|
2018-02-23 12:01:21 +01:00
|
|
|
|
2018-07-09 19:06:03 +02:00
|
|
|
"""
|
|
|
|
with Measure(self._clock, "_fetch_event_list"):
|
|
|
|
try:
|
2018-08-30 16:19:58 +02:00
|
|
|
event_id_lists = list(zip(*event_list))[0]
|
2018-02-23 12:01:21 +01:00
|
|
|
event_ids = [
|
|
|
|
item for sublist in event_id_lists for item in sublist
|
|
|
|
]
|
|
|
|
|
|
|
|
rows = self._new_transaction(
|
2018-07-10 17:12:36 +02:00
|
|
|
conn, "do_fetch", [], [],
|
|
|
|
self._fetch_event_rows, event_ids,
|
2018-02-23 12:01:21 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
row_dict = {
|
|
|
|
r["event_id"]: r
|
|
|
|
for r in rows
|
|
|
|
}
|
|
|
|
|
|
|
|
# We only want to resolve deferreds from the main thread
|
|
|
|
def fire(lst, res):
|
|
|
|
for ids, d in lst:
|
|
|
|
if not d.called:
|
|
|
|
try:
|
|
|
|
with PreserveLoggingContext():
|
|
|
|
d.callback([
|
|
|
|
res[i]
|
|
|
|
for i in ids
|
|
|
|
if i in res
|
|
|
|
])
|
|
|
|
except Exception:
|
|
|
|
logger.exception("Failed to callback")
|
|
|
|
with PreserveLoggingContext():
|
2018-06-22 10:37:10 +02:00
|
|
|
self.hs.get_reactor().callFromThread(fire, event_list, row_dict)
|
2018-02-23 12:01:21 +01:00
|
|
|
except Exception as e:
|
|
|
|
logger.exception("do_fetch")
|
|
|
|
|
|
|
|
# We only want to resolve deferreds from the main thread
|
2018-08-30 16:19:58 +02:00
|
|
|
def fire(evs, exc):
|
2018-02-23 12:01:21 +01:00
|
|
|
for _, d in evs:
|
|
|
|
if not d.called:
|
|
|
|
with PreserveLoggingContext():
|
2018-08-30 16:19:58 +02:00
|
|
|
d.errback(exc)
|
2018-02-23 12:01:21 +01:00
|
|
|
|
2018-07-09 19:06:03 +02:00
|
|
|
with PreserveLoggingContext():
|
2018-08-30 16:19:58 +02:00
|
|
|
self.hs.get_reactor().callFromThread(fire, event_list, e)
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2019-01-29 22:45:28 +01:00
|
|
|
def _enqueue_events(self, events, allow_rejected=False):
|
2018-02-23 12:01:21 +01:00
|
|
|
"""Fetches events from the database using the _event_fetch_list. This
|
|
|
|
allows batch and bulk fetching of events - it allows us to fetch events
|
|
|
|
without having to create a new transaction for each request for events.
|
|
|
|
"""
|
|
|
|
if not events:
|
|
|
|
defer.returnValue({})
|
|
|
|
|
|
|
|
events_d = defer.Deferred()
|
|
|
|
with self._event_fetch_lock:
|
|
|
|
self._event_fetch_list.append(
|
|
|
|
(events, events_d)
|
|
|
|
)
|
|
|
|
|
|
|
|
self._event_fetch_lock.notify()
|
|
|
|
|
|
|
|
if self._event_fetch_ongoing < EVENT_QUEUE_THREADS:
|
|
|
|
self._event_fetch_ongoing += 1
|
|
|
|
should_start = True
|
|
|
|
else:
|
|
|
|
should_start = False
|
|
|
|
|
|
|
|
if should_start:
|
2018-07-18 15:35:24 +02:00
|
|
|
run_as_background_process(
|
|
|
|
"fetch_events",
|
|
|
|
self.runWithConnection,
|
|
|
|
self._do_fetch,
|
|
|
|
)
|
2018-02-23 12:01:21 +01:00
|
|
|
|
|
|
|
logger.debug("Loading %d events", len(events))
|
|
|
|
with PreserveLoggingContext():
|
|
|
|
rows = yield events_d
|
|
|
|
logger.debug("Loaded %d events (%d rows)", len(events), len(rows))
|
|
|
|
|
|
|
|
if not allow_rejected:
|
|
|
|
rows[:] = [r for r in rows if not r["rejects"]]
|
|
|
|
|
|
|
|
res = yield make_deferred_yieldable(defer.gatherResults(
|
|
|
|
[
|
2018-04-27 12:29:27 +02:00
|
|
|
run_in_background(
|
|
|
|
self._get_event_from_row,
|
2018-02-23 12:01:21 +01:00
|
|
|
row["internal_metadata"], row["json"], row["redacts"],
|
|
|
|
rejected_reason=row["rejects"],
|
2019-01-23 12:11:52 +01:00
|
|
|
format_version=row["format_version"],
|
2018-02-23 12:01:21 +01:00
|
|
|
)
|
|
|
|
for row in rows
|
|
|
|
],
|
|
|
|
consumeErrors=True
|
|
|
|
))
|
|
|
|
|
|
|
|
defer.returnValue({
|
|
|
|
e.event.event_id: e
|
|
|
|
for e in res if e
|
|
|
|
})
|
|
|
|
|
|
|
|
def _fetch_event_rows(self, txn, events):
|
|
|
|
rows = []
|
|
|
|
N = 200
|
2018-05-05 22:47:18 +02:00
|
|
|
for i in range(1 + len(events) // N):
|
2018-02-23 12:01:21 +01:00
|
|
|
evs = events[i * N:(i + 1) * N]
|
|
|
|
if not evs:
|
|
|
|
break
|
|
|
|
|
|
|
|
sql = (
|
|
|
|
"SELECT "
|
|
|
|
" e.event_id as event_id, "
|
|
|
|
" e.internal_metadata,"
|
|
|
|
" e.json,"
|
2019-01-23 12:11:52 +01:00
|
|
|
" e.format_version, "
|
2018-02-23 12:01:21 +01:00
|
|
|
" r.redacts as redacts,"
|
|
|
|
" rej.event_id as rejects "
|
|
|
|
" FROM event_json as e"
|
|
|
|
" LEFT JOIN rejections as rej USING (event_id)"
|
|
|
|
" LEFT JOIN redactions as r ON e.event_id = r.redacts"
|
|
|
|
" WHERE e.event_id IN (%s)"
|
|
|
|
) % (",".join(["?"] * len(evs)),)
|
|
|
|
|
|
|
|
txn.execute(sql, evs)
|
|
|
|
rows.extend(self.cursor_to_dict(txn))
|
|
|
|
|
|
|
|
return rows
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def _get_event_from_row(self, internal_metadata, js, redacted,
|
2019-01-23 12:11:52 +01:00
|
|
|
format_version, rejected_reason=None):
|
2018-02-23 12:01:21 +01:00
|
|
|
with Measure(self._clock, "_get_event_from_row"):
|
|
|
|
d = json.loads(js)
|
|
|
|
internal_metadata = json.loads(internal_metadata)
|
|
|
|
|
|
|
|
if rejected_reason:
|
|
|
|
rejected_reason = yield self._simple_select_one_onecol(
|
|
|
|
table="rejections",
|
|
|
|
keyvalues={"event_id": rejected_reason},
|
|
|
|
retcol="reason",
|
|
|
|
desc="_get_event_from_row_rejected_reason",
|
|
|
|
)
|
|
|
|
|
2019-01-23 12:11:52 +01:00
|
|
|
if format_version is None:
|
|
|
|
# This means that we stored the event before we had the concept
|
|
|
|
# of a event format version, so it must be a V1 event.
|
|
|
|
format_version = EventFormatVersions.V1
|
|
|
|
|
2019-01-24 12:14:07 +01:00
|
|
|
original_ev = event_type_from_format_version(format_version)(
|
2019-01-23 12:11:52 +01:00
|
|
|
event_dict=d,
|
2018-02-23 12:01:21 +01:00
|
|
|
internal_metadata_dict=internal_metadata,
|
|
|
|
rejected_reason=rejected_reason,
|
|
|
|
)
|
|
|
|
|
|
|
|
redacted_event = None
|
|
|
|
if redacted:
|
|
|
|
redacted_event = prune_event(original_ev)
|
|
|
|
|
|
|
|
redaction_id = yield self._simple_select_one_onecol(
|
|
|
|
table="redactions",
|
|
|
|
keyvalues={"redacts": redacted_event.event_id},
|
|
|
|
retcol="event_id",
|
|
|
|
desc="_get_event_from_row_redactions",
|
|
|
|
)
|
|
|
|
|
|
|
|
redacted_event.unsigned["redacted_by"] = redaction_id
|
|
|
|
# Get the redaction event.
|
|
|
|
|
|
|
|
because = yield self.get_event(
|
|
|
|
redaction_id,
|
|
|
|
check_redacted=False,
|
|
|
|
allow_none=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
if because:
|
|
|
|
# It's fine to do add the event directly, since get_pdu_json
|
|
|
|
# will serialise this field correctly
|
|
|
|
redacted_event.unsigned["redacted_because"] = because
|
|
|
|
|
2019-01-29 22:46:17 +01:00
|
|
|
# Starting in room version v3, some redactions need to be
|
|
|
|
# rechecked if we didn't have the redacted event at the
|
|
|
|
# time, so we recheck on read instead.
|
|
|
|
if because.internal_metadata.need_to_check_redaction():
|
|
|
|
expected_domain = get_domain_from_id(original_ev.sender)
|
|
|
|
if get_domain_from_id(because.sender) == expected_domain:
|
|
|
|
# This redaction event is allowed. Mark as not needing a
|
|
|
|
# recheck.
|
|
|
|
because.internal_metadata.recheck_redaction = False
|
|
|
|
else:
|
2019-01-29 22:53:48 +01:00
|
|
|
# Senders don't match, so the event isn't actually redacted
|
2019-01-29 22:46:17 +01:00
|
|
|
redacted_event = None
|
|
|
|
|
2018-02-23 12:01:21 +01:00
|
|
|
cache_entry = _EventCacheEntry(
|
|
|
|
event=original_ev,
|
|
|
|
redacted_event=redacted_event,
|
|
|
|
)
|
|
|
|
|
|
|
|
self._get_event_cache.prefill((original_ev.event_id,), cache_entry)
|
|
|
|
|
|
|
|
defer.returnValue(cache_entry)
|
2018-07-26 14:31:59 +02:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def have_events_in_timeline(self, event_ids):
|
|
|
|
"""Given a list of event ids, check if we have already processed and
|
|
|
|
stored them as non outliers.
|
|
|
|
"""
|
|
|
|
rows = yield self._simple_select_many_batch(
|
|
|
|
table="events",
|
|
|
|
retcols=("event_id",),
|
|
|
|
column="event_id",
|
|
|
|
iterable=list(event_ids),
|
|
|
|
keyvalues={"outlier": False},
|
|
|
|
desc="have_events_in_timeline",
|
|
|
|
)
|
|
|
|
|
|
|
|
defer.returnValue(set(r["event_id"] for r in rows))
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def have_seen_events(self, event_ids):
|
|
|
|
"""Given a list of event ids, check if we have already processed them.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event_ids (iterable[str]):
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred[set[str]]: The events we have already seen.
|
|
|
|
"""
|
|
|
|
results = set()
|
|
|
|
|
|
|
|
def have_seen_events_txn(txn, chunk):
|
|
|
|
sql = (
|
|
|
|
"SELECT event_id FROM events as e WHERE e.event_id IN (%s)"
|
|
|
|
% (",".join("?" * len(chunk)), )
|
|
|
|
)
|
|
|
|
txn.execute(sql, chunk)
|
|
|
|
for (event_id, ) in txn:
|
|
|
|
results.add(event_id)
|
|
|
|
|
|
|
|
# break the input up into chunks of 100
|
|
|
|
input_iterator = iter(event_ids)
|
|
|
|
for chunk in iter(lambda: list(itertools.islice(input_iterator, 100)),
|
|
|
|
[]):
|
|
|
|
yield self.runInteraction(
|
|
|
|
"have_seen_events",
|
|
|
|
have_seen_events_txn,
|
|
|
|
chunk,
|
|
|
|
)
|
|
|
|
defer.returnValue(results)
|
|
|
|
|
|
|
|
def get_seen_events_with_rejections(self, event_ids):
|
|
|
|
"""Given a list of event ids, check if we rejected them.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event_ids (list[str])
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred[dict[str, str|None):
|
|
|
|
Has an entry for each event id we already have seen. Maps to
|
|
|
|
the rejected reason string if we rejected the event, else maps
|
|
|
|
to None.
|
|
|
|
"""
|
|
|
|
if not event_ids:
|
|
|
|
return defer.succeed({})
|
|
|
|
|
|
|
|
def f(txn):
|
|
|
|
sql = (
|
|
|
|
"SELECT e.event_id, reason FROM events as e "
|
|
|
|
"LEFT JOIN rejections as r ON e.event_id = r.event_id "
|
|
|
|
"WHERE e.event_id = ?"
|
|
|
|
)
|
|
|
|
|
|
|
|
res = {}
|
|
|
|
for event_id in event_ids:
|
|
|
|
txn.execute(sql, (event_id,))
|
|
|
|
row = txn.fetchone()
|
|
|
|
if row:
|
|
|
|
_, rejected = row
|
|
|
|
res[event_id] = rejected
|
|
|
|
|
|
|
|
return res
|
|
|
|
|
|
|
|
return self.runInteraction("get_rejection_reasons", f)
|