2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2015-04-14 15:50:29 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2020-01-28 14:44:21 +01:00
|
|
|
import logging
|
2022-01-25 15:14:46 +01:00
|
|
|
from typing import Mapping, Optional
|
2020-01-28 14:44:21 +01:00
|
|
|
|
2022-01-25 15:14:46 +01:00
|
|
|
from synapse.storage.engines._base import (
|
|
|
|
BaseDatabaseEngine,
|
|
|
|
IncorrectDatabaseSetup,
|
|
|
|
IsolationLevel,
|
|
|
|
)
|
2020-10-07 16:15:57 +02:00
|
|
|
from synapse.storage.types import Connection
|
2015-04-29 12:42:28 +02:00
|
|
|
|
2020-01-28 14:44:21 +01:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2015-04-14 15:50:29 +02:00
|
|
|
|
2020-02-27 12:53:40 +01:00
|
|
|
class PostgresEngine(BaseDatabaseEngine):
|
2016-06-20 18:53:38 +02:00
|
|
|
def __init__(self, database_module, database_config):
|
2020-02-27 12:53:40 +01:00
|
|
|
super().__init__(database_module, database_config)
|
2015-04-14 15:50:29 +02:00
|
|
|
self.module.extensions.register_type(self.module.extensions.UNICODE)
|
2019-10-08 17:21:17 +02:00
|
|
|
|
|
|
|
# Disables passing `bytes` to txn.execute, c.f. #6186. If you do
|
|
|
|
# actually want to use bytes than wrap it in `bytearray`.
|
|
|
|
def _disable_bytes_adapter(_):
|
|
|
|
raise Exception("Passing bytes to DB is disabled.")
|
|
|
|
|
|
|
|
self.module.extensions.register_adapter(bytes, _disable_bytes_adapter)
|
2016-06-20 18:53:38 +02:00
|
|
|
self.synchronous_commit = database_config.get("synchronous_commit", True)
|
2019-04-03 11:07:29 +02:00
|
|
|
self._version = None # unknown as yet
|
2015-04-14 15:50:29 +02:00
|
|
|
|
2022-01-25 15:14:46 +01:00
|
|
|
self.isolation_level_map: Mapping[int, int] = {
|
|
|
|
IsolationLevel.READ_COMMITTED: self.module.extensions.ISOLATION_LEVEL_READ_COMMITTED,
|
|
|
|
IsolationLevel.REPEATABLE_READ: self.module.extensions.ISOLATION_LEVEL_REPEATABLE_READ,
|
|
|
|
IsolationLevel.SERIALIZABLE: self.module.extensions.ISOLATION_LEVEL_SERIALIZABLE,
|
|
|
|
}
|
|
|
|
self.default_isolation_level = (
|
|
|
|
self.module.extensions.ISOLATION_LEVEL_REPEATABLE_READ
|
|
|
|
)
|
2022-03-23 18:23:05 +01:00
|
|
|
self.config = database_config
|
2022-01-25 15:14:46 +01:00
|
|
|
|
2020-02-27 12:53:40 +01:00
|
|
|
@property
|
|
|
|
def single_threaded(self) -> bool:
|
|
|
|
return False
|
|
|
|
|
2022-03-23 18:23:05 +01:00
|
|
|
def get_db_locale(self, txn):
|
|
|
|
txn.execute(
|
|
|
|
"SELECT datcollate, datctype FROM pg_database WHERE datname = current_database()"
|
|
|
|
)
|
|
|
|
collation, ctype = txn.fetchone()
|
|
|
|
return collation, ctype
|
|
|
|
|
2020-01-09 18:46:52 +01:00
|
|
|
def check_database(self, db_conn, allow_outdated_version: bool = False):
|
2020-01-09 18:33:41 +01:00
|
|
|
# Get the version of PostgreSQL that we're using. As per the psycopg2
|
|
|
|
# docs: The number is formed by converting the major, minor, and
|
|
|
|
# revision numbers into two-decimal-digit numbers and appending them
|
|
|
|
# together. For example, version 8.1.5 will be returned as 80105
|
|
|
|
self._version = db_conn.server_version
|
2022-03-23 18:23:05 +01:00
|
|
|
allow_unsafe_locale = self.config.get("allow_unsafe_locale", False)
|
2020-01-09 18:33:41 +01:00
|
|
|
|
|
|
|
# Are we on a supported PostgreSQL version?
|
2022-01-21 23:23:26 +01:00
|
|
|
if not allow_outdated_version and self._version < 100000:
|
|
|
|
raise RuntimeError("Synapse requires PostgreSQL 10 or above.")
|
2020-01-09 18:33:41 +01:00
|
|
|
|
2020-01-09 18:21:30 +01:00
|
|
|
with db_conn.cursor() as txn:
|
|
|
|
txn.execute("SHOW SERVER_ENCODING")
|
|
|
|
rows = txn.fetchall()
|
|
|
|
if rows and rows[0][0] != "UTF8":
|
|
|
|
raise IncorrectDatabaseSetup(
|
|
|
|
"Database has incorrect encoding: '%s' instead of 'UTF8'\n"
|
2020-02-26 16:17:03 +01:00
|
|
|
"See docs/postgres.md for more information." % (rows[0][0],)
|
2020-01-09 18:21:30 +01:00
|
|
|
)
|
2015-04-29 12:42:28 +02:00
|
|
|
|
2022-03-23 18:23:05 +01:00
|
|
|
collation, ctype = self.get_db_locale(txn)
|
2020-01-28 14:44:21 +01:00
|
|
|
if collation != "C":
|
|
|
|
logger.warning(
|
2022-03-23 18:23:05 +01:00
|
|
|
"Database has incorrect collation of %r. Should be 'C'",
|
2020-02-26 16:17:03 +01:00
|
|
|
collation,
|
2020-01-28 14:44:21 +01:00
|
|
|
)
|
2022-03-23 18:23:05 +01:00
|
|
|
if not allow_unsafe_locale:
|
|
|
|
raise IncorrectDatabaseSetup(
|
|
|
|
"Database has incorrect collation of %r. Should be 'C'\n"
|
|
|
|
"See docs/postgres.md for more information. You can override this check by"
|
|
|
|
"setting 'allow_unsafe_locale' to true in the database config.",
|
|
|
|
collation,
|
|
|
|
)
|
2020-01-28 14:44:21 +01:00
|
|
|
|
|
|
|
if ctype != "C":
|
2022-03-23 18:23:05 +01:00
|
|
|
if not allow_unsafe_locale:
|
|
|
|
logger.warning(
|
|
|
|
"Database has incorrect ctype of %r. Should be 'C'",
|
|
|
|
ctype,
|
|
|
|
)
|
|
|
|
raise IncorrectDatabaseSetup(
|
|
|
|
"Database has incorrect ctype of %r. Should be 'C'\n"
|
|
|
|
"See docs/postgres.md for more information. You can override this check by"
|
|
|
|
"setting 'allow_unsafe_locale' to true in the database config.",
|
|
|
|
ctype,
|
|
|
|
)
|
2020-01-28 14:44:21 +01:00
|
|
|
|
|
|
|
def check_new_database(self, txn):
|
|
|
|
"""Gets called when setting up a brand new database. This allows us to
|
|
|
|
apply stricter checks on new databases versus existing database.
|
|
|
|
"""
|
|
|
|
|
2022-03-23 18:23:05 +01:00
|
|
|
collation, ctype = self.get_db_locale(txn)
|
2020-01-28 14:44:21 +01:00
|
|
|
|
|
|
|
errors = []
|
|
|
|
|
|
|
|
if collation != "C":
|
|
|
|
errors.append(" - 'COLLATE' is set to %r. Should be 'C'" % (collation,))
|
|
|
|
|
|
|
|
if ctype != "C":
|
2020-07-01 14:56:16 +02:00
|
|
|
errors.append(" - 'CTYPE' is set to %r. Should be 'C'" % (ctype,))
|
2020-01-28 14:44:21 +01:00
|
|
|
|
|
|
|
if errors:
|
|
|
|
raise IncorrectDatabaseSetup(
|
|
|
|
"Database is incorrectly configured:\n\n%s\n\n"
|
|
|
|
"See docs/postgres.md for more information." % ("\n".join(errors))
|
|
|
|
)
|
|
|
|
|
2015-04-14 15:50:29 +02:00
|
|
|
def convert_param_style(self, sql):
|
|
|
|
return sql.replace("?", "%s")
|
|
|
|
|
|
|
|
def on_new_connection(self, db_conn):
|
2022-01-25 15:14:46 +01:00
|
|
|
db_conn.set_isolation_level(self.default_isolation_level)
|
2018-08-30 16:19:58 +02:00
|
|
|
|
|
|
|
# Set the bytea output to escape, vs the default of hex
|
|
|
|
cursor = db_conn.cursor()
|
|
|
|
cursor.execute("SET bytea_output TO escape")
|
|
|
|
|
2016-06-20 18:53:38 +02:00
|
|
|
# Asynchronous commit, don't wait for the server to call fsync before
|
|
|
|
# ending the transaction.
|
|
|
|
# https://www.postgresql.org/docs/current/static/wal-async-commit.html
|
|
|
|
if not self.synchronous_commit:
|
|
|
|
cursor.execute("SET synchronous_commit TO OFF")
|
2018-08-30 16:19:58 +02:00
|
|
|
|
|
|
|
cursor.close()
|
2020-10-07 16:15:57 +02:00
|
|
|
db_conn.commit()
|
2015-04-14 15:50:29 +02:00
|
|
|
|
2019-01-24 11:31:54 +01:00
|
|
|
@property
|
|
|
|
def can_native_upsert(self):
|
|
|
|
"""
|
2019-06-17 16:59:00 +02:00
|
|
|
Can we use native UPSERTs?
|
2019-01-24 11:31:54 +01:00
|
|
|
"""
|
2019-06-17 16:59:00 +02:00
|
|
|
return True
|
2019-01-24 11:31:54 +01:00
|
|
|
|
2019-10-10 16:35:46 +02:00
|
|
|
@property
|
|
|
|
def supports_using_any_list(self):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Do we support using `a = ANY(?)` and passing a list"""
|
2019-10-10 16:35:46 +02:00
|
|
|
return True
|
|
|
|
|
2021-06-30 13:07:16 +02:00
|
|
|
@property
|
|
|
|
def supports_returning(self) -> bool:
|
|
|
|
"""Do we support the `RETURNING` clause in insert/update/delete?"""
|
|
|
|
return True
|
|
|
|
|
2015-04-14 15:50:29 +02:00
|
|
|
def is_deadlock(self, error):
|
|
|
|
if isinstance(error, self.module.DatabaseError):
|
2016-06-20 18:53:38 +02:00
|
|
|
# https://www.postgresql.org/docs/current/static/errcodes-appendix.html
|
|
|
|
# "40001" serialization_failure
|
|
|
|
# "40P01" deadlock_detected
|
2015-04-15 11:23:42 +02:00
|
|
|
return error.pgcode in ["40001", "40P01"]
|
2015-04-14 15:50:29 +02:00
|
|
|
return False
|
2015-04-27 13:40:49 +02:00
|
|
|
|
|
|
|
def is_connection_closed(self, conn):
|
2015-05-01 11:24:24 +02:00
|
|
|
return bool(conn.closed)
|
2015-04-27 14:22:30 +02:00
|
|
|
|
|
|
|
def lock_table(self, txn, table):
|
|
|
|
txn.execute("LOCK TABLE %s in EXCLUSIVE MODE" % (table,))
|
2018-02-06 15:31:24 +01:00
|
|
|
|
2019-02-27 11:21:49 +01:00
|
|
|
@property
|
|
|
|
def server_version(self):
|
|
|
|
"""Returns a string giving the server version. For example: '8.1.5'
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
string
|
|
|
|
"""
|
2020-01-09 18:33:41 +01:00
|
|
|
# note that this is a bit of a hack because it relies on check_database
|
|
|
|
# having been called. Still, that should be a safe bet here.
|
2019-02-27 11:21:49 +01:00
|
|
|
numver = self._version
|
|
|
|
assert numver is not None
|
|
|
|
|
|
|
|
# https://www.postgresql.org/docs/current/libpq-status.html#LIBPQ-PQSERVERVERSION
|
|
|
|
if numver >= 100000:
|
2019-04-03 11:07:29 +02:00
|
|
|
return "%i.%i" % (numver / 10000, numver % 10000)
|
2019-02-27 11:21:49 +01:00
|
|
|
else:
|
2019-04-03 11:07:29 +02:00
|
|
|
return "%i.%i.%i" % (numver / 10000, (numver % 10000) / 100, numver % 100)
|
2020-10-07 16:15:57 +02:00
|
|
|
|
|
|
|
def in_transaction(self, conn: Connection) -> bool:
|
|
|
|
return conn.status != self.module.extensions.STATUS_READY # type: ignore
|
|
|
|
|
|
|
|
def attempt_to_set_autocommit(self, conn: Connection, autocommit: bool):
|
|
|
|
return conn.set_session(autocommit=autocommit) # type: ignore
|
2022-01-25 15:14:46 +01:00
|
|
|
|
|
|
|
def attempt_to_set_isolation_level(
|
|
|
|
self, conn: Connection, isolation_level: Optional[int]
|
|
|
|
):
|
|
|
|
if isolation_level is None:
|
|
|
|
isolation_level = self.default_isolation_level
|
|
|
|
else:
|
|
|
|
isolation_level = self.isolation_level_map[isolation_level]
|
|
|
|
return conn.set_isolation_level(isolation_level) # type: ignore
|