2015-01-26 11:45:24 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2015, 2016 OpenMarket Ltd
|
2015-01-26 11:45:24 +01:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
|
2017-12-30 19:40:19 +01:00
|
|
|
import copy
|
|
|
|
import itertools
|
|
|
|
import logging
|
|
|
|
import random
|
|
|
|
|
2018-04-28 13:57:00 +02:00
|
|
|
from six.moves import range
|
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
from twisted.internet import defer
|
|
|
|
|
2015-10-20 12:58:58 +02:00
|
|
|
from synapse.api.constants import Membership
|
2015-03-05 17:08:02 +01:00
|
|
|
from synapse.api.errors import (
|
2018-01-22 19:11:18 +01:00
|
|
|
CodeMessageException, HttpResponseException, SynapseError, FederationDeniedError
|
2015-03-05 17:08:02 +01:00
|
|
|
)
|
2017-12-30 19:40:19 +01:00
|
|
|
from synapse.events import builder
|
|
|
|
from synapse.federation.federation_base import (
|
|
|
|
FederationBase,
|
|
|
|
event_from_pdu_json,
|
|
|
|
)
|
2017-12-30 19:40:19 +01:00
|
|
|
from synapse.util import logcontext, unwrapFirstError
|
|
|
|
from synapse.util.caches.expiringcache import ExpiringCache
|
2018-04-27 12:29:27 +02:00
|
|
|
from synapse.util.logcontext import make_deferred_yieldable, run_in_background
|
2017-12-30 19:40:19 +01:00
|
|
|
from synapse.util.logutils import log_function
|
2017-03-23 01:12:21 +01:00
|
|
|
from synapse.util.retryutils import NotRetryingDestination
|
2015-02-17 18:20:56 +01:00
|
|
|
|
2018-05-22 02:47:37 +02:00
|
|
|
from prometheus_client import Counter
|
2015-03-10 16:29:22 +01:00
|
|
|
|
2018-05-22 02:47:37 +02:00
|
|
|
logger = logging.getLogger(__name__)
|
2015-03-10 16:29:22 +01:00
|
|
|
|
2018-05-22 02:47:37 +02:00
|
|
|
sent_queries_counter = Counter("synapse_federation_client_sent_queries", "", ["type"])
|
2015-02-24 19:10:44 +01:00
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2016-08-10 12:31:46 +02:00
|
|
|
PDU_RETRY_TIME_MS = 1 * 60 * 1000
|
|
|
|
|
|
|
|
|
2015-02-03 15:58:30 +01:00
|
|
|
class FederationClient(FederationBase):
|
2016-06-15 16:12:59 +02:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(FederationClient, self).__init__(hs)
|
2015-02-16 19:02:39 +01:00
|
|
|
|
2016-08-10 12:31:46 +02:00
|
|
|
self.pdu_destination_tried = {}
|
|
|
|
self._clock.looping_call(
|
|
|
|
self._clear_tried_cache, 60 * 1000,
|
|
|
|
)
|
2016-08-26 15:54:30 +02:00
|
|
|
self.state = hs.get_state_handler()
|
2018-03-12 15:07:39 +01:00
|
|
|
self.transport_layer = hs.get_federation_transport_client()
|
2016-08-10 12:31:46 +02:00
|
|
|
|
|
|
|
def _clear_tried_cache(self):
|
|
|
|
"""Clear pdu_destination_tried cache"""
|
|
|
|
now = self._clock.time_msec()
|
|
|
|
|
|
|
|
old_dict = self.pdu_destination_tried
|
|
|
|
self.pdu_destination_tried = {}
|
|
|
|
|
|
|
|
for event_id, destination_dict in old_dict.items():
|
|
|
|
destination_dict = {
|
|
|
|
dest: time
|
|
|
|
for dest, time in destination_dict.items()
|
|
|
|
if time + PDU_RETRY_TIME_MS > now
|
|
|
|
}
|
|
|
|
if destination_dict:
|
|
|
|
self.pdu_destination_tried[event_id] = destination_dict
|
|
|
|
|
2015-02-18 11:14:10 +01:00
|
|
|
def start_get_pdu_cache(self):
|
|
|
|
self._get_pdu_cache = ExpiringCache(
|
2015-02-16 19:02:39 +01:00
|
|
|
cache_name="get_pdu_cache",
|
|
|
|
clock=self._clock,
|
|
|
|
max_len=1000,
|
2016-02-02 18:18:50 +01:00
|
|
|
expiry_ms=120 * 1000,
|
2015-02-16 19:02:39 +01:00
|
|
|
reset_expiry_on_get=False,
|
|
|
|
)
|
|
|
|
|
2015-02-18 11:14:10 +01:00
|
|
|
self._get_pdu_cache.start()
|
2015-02-16 19:02:39 +01:00
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
@log_function
|
|
|
|
def make_query(self, destination, query_type, args,
|
2017-03-23 12:10:36 +01:00
|
|
|
retry_on_dns_fail=False, ignore_backoff=False):
|
2015-01-26 11:45:24 +01:00
|
|
|
"""Sends a federation Query to a remote homeserver of the given type
|
|
|
|
and arguments.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): Domain name of the remote homeserver
|
|
|
|
query_type (str): Category of the query type; should match the
|
|
|
|
handler name used in register_query_handler().
|
|
|
|
args (dict): Mapping of strings to strings containing the details
|
|
|
|
of the query request.
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data
|
|
|
|
and try the request anyway.
|
2015-01-26 11:45:24 +01:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
a Deferred which will eventually yield a JSON object from the
|
|
|
|
response
|
|
|
|
"""
|
2018-05-22 02:47:37 +02:00
|
|
|
sent_queries_counter.labels(query_type).inc()
|
2015-03-10 16:29:22 +01:00
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
return self.transport_layer.make_query(
|
2017-03-23 12:10:36 +01:00
|
|
|
destination, query_type, args, retry_on_dns_fail=retry_on_dns_fail,
|
|
|
|
ignore_backoff=ignore_backoff,
|
2015-01-26 11:45:24 +01:00
|
|
|
)
|
|
|
|
|
2015-07-23 17:03:38 +02:00
|
|
|
@log_function
|
2016-09-12 19:17:09 +02:00
|
|
|
def query_client_keys(self, destination, content, timeout):
|
2015-07-23 17:03:38 +02:00
|
|
|
"""Query device keys for a device hosted on a remote server.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): Domain name of the remote homeserver
|
|
|
|
content (dict): The query content.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
a Deferred which will eventually yield a JSON object from the
|
|
|
|
response
|
|
|
|
"""
|
2018-05-22 02:47:37 +02:00
|
|
|
sent_queries_counter.labels("client_device_keys").inc()
|
2016-09-12 19:17:09 +02:00
|
|
|
return self.transport_layer.query_client_keys(
|
|
|
|
destination, content, timeout
|
|
|
|
)
|
2015-07-23 17:03:38 +02:00
|
|
|
|
2017-01-26 17:06:54 +01:00
|
|
|
@log_function
|
|
|
|
def query_user_devices(self, destination, user_id, timeout=30000):
|
|
|
|
"""Query the device keys for a list of user ids hosted on a remote
|
|
|
|
server.
|
|
|
|
"""
|
2018-05-22 02:47:37 +02:00
|
|
|
sent_queries_counter.labels("user_devices").inc()
|
2017-01-26 17:06:54 +01:00
|
|
|
return self.transport_layer.query_user_devices(
|
|
|
|
destination, user_id, timeout
|
|
|
|
)
|
|
|
|
|
2015-07-23 17:03:38 +02:00
|
|
|
@log_function
|
2016-09-12 19:17:09 +02:00
|
|
|
def claim_client_keys(self, destination, content, timeout):
|
2015-07-23 17:03:38 +02:00
|
|
|
"""Claims one-time keys for a device hosted on a remote server.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): Domain name of the remote homeserver
|
|
|
|
content (dict): The query content.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
a Deferred which will eventually yield a JSON object from the
|
|
|
|
response
|
|
|
|
"""
|
2018-05-22 02:47:37 +02:00
|
|
|
sent_queries_counter.labels("client_one_time_keys").inc()
|
2016-09-12 19:17:09 +02:00
|
|
|
return self.transport_layer.claim_client_keys(
|
|
|
|
destination, content, timeout
|
|
|
|
)
|
2015-07-23 17:03:38 +02:00
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def backfill(self, dest, context, limit, extremities):
|
|
|
|
"""Requests some more historic PDUs for the given context from the
|
|
|
|
given destination server.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
dest (str): The remote home server to ask.
|
|
|
|
context (str): The context to backfill.
|
|
|
|
limit (int): The maximum number of PDUs to return.
|
|
|
|
extremities (list): List of PDU id and origins of the first pdus
|
|
|
|
we have seen from the context
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in the received PDUs.
|
|
|
|
"""
|
|
|
|
logger.debug("backfill extrem=%s", extremities)
|
|
|
|
|
|
|
|
# If there are no extremeties then we've (probably) reached the start.
|
|
|
|
if not extremities:
|
|
|
|
return
|
|
|
|
|
|
|
|
transaction_data = yield self.transport_layer.backfill(
|
|
|
|
dest, context, extremities, limit)
|
|
|
|
|
|
|
|
logger.debug("backfill transaction_data=%s", repr(transaction_data))
|
|
|
|
|
|
|
|
pdus = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=False)
|
2015-01-26 11:45:24 +01:00
|
|
|
for p in transaction_data["pdus"]
|
|
|
|
]
|
|
|
|
|
2015-05-20 12:59:02 +02:00
|
|
|
# FIXME: We should handle signature failures more gracefully.
|
2017-09-20 02:32:42 +02:00
|
|
|
pdus[:] = yield logcontext.make_deferred_yieldable(defer.gatherResults(
|
2015-06-26 10:52:24 +02:00
|
|
|
self._check_sigs_and_hashes(pdus),
|
2015-05-20 12:59:02 +02:00
|
|
|
consumeErrors=True,
|
2017-09-20 02:32:42 +02:00
|
|
|
).addErrback(unwrapFirstError))
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
defer.returnValue(pdus)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2015-05-19 15:53:32 +02:00
|
|
|
def get_pdu(self, destinations, event_id, outlier=False, timeout=None):
|
2015-01-26 11:45:24 +01:00
|
|
|
"""Requests the PDU with given origin and ID from the remote home
|
|
|
|
servers.
|
|
|
|
|
|
|
|
Will attempt to get the PDU from each destination in the list until
|
|
|
|
one succeeds.
|
|
|
|
|
|
|
|
This will persist the PDU locally upon receipt.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destinations (list): Which home servers to query
|
2017-03-09 14:15:12 +01:00
|
|
|
event_id (str): event to fetch
|
2015-01-26 11:45:24 +01:00
|
|
|
outlier (bool): Indicates whether the PDU is an `outlier`, i.e. if
|
|
|
|
it's from an arbitary point in the context as opposed to part
|
|
|
|
of the current block of PDUs. Defaults to `False`
|
2015-05-22 16:18:04 +02:00
|
|
|
timeout (int): How long to try (in ms) each destination for before
|
|
|
|
moving to the next destination. None indicates no timeout.
|
2015-01-26 11:45:24 +01:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in the requested PDU.
|
|
|
|
"""
|
|
|
|
|
|
|
|
# TODO: Rate limit the number of times we try and get the same event.
|
|
|
|
|
2015-02-18 11:14:10 +01:00
|
|
|
if self._get_pdu_cache:
|
2016-08-05 19:08:32 +02:00
|
|
|
ev = self._get_pdu_cache.get(event_id)
|
|
|
|
if ev:
|
|
|
|
defer.returnValue(ev)
|
2015-02-16 19:02:39 +01:00
|
|
|
|
2016-08-10 12:31:46 +02:00
|
|
|
pdu_attempts = self.pdu_destination_tried.setdefault(event_id, {})
|
|
|
|
|
2016-09-01 11:55:02 +02:00
|
|
|
signed_pdu = None
|
2015-01-26 11:45:24 +01:00
|
|
|
for destination in destinations:
|
2016-08-10 12:31:46 +02:00
|
|
|
now = self._clock.time_msec()
|
|
|
|
last_attempt = pdu_attempts.get(destination, 0)
|
|
|
|
if last_attempt + PDU_RETRY_TIME_MS > now:
|
|
|
|
continue
|
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
try:
|
2017-03-23 01:12:21 +01:00
|
|
|
transaction_data = yield self.transport_layer.get_event(
|
|
|
|
destination, event_id, timeout=timeout,
|
2015-01-26 11:45:24 +01:00
|
|
|
)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
logger.debug("transaction_data %r", transaction_data)
|
2015-02-17 18:20:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
pdu_list = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=outlier)
|
2017-03-23 01:12:21 +01:00
|
|
|
for p in transaction_data["pdus"]
|
|
|
|
]
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
if pdu_list and pdu_list[0]:
|
|
|
|
pdu = pdu_list[0]
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
# Check signatures are correct.
|
2017-09-20 02:32:42 +02:00
|
|
|
signed_pdu = yield self._check_sigs_and_hash(pdu)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
break
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2016-08-10 12:31:46 +02:00
|
|
|
pdu_attempts[destination] = now
|
|
|
|
|
2016-08-10 14:39:12 +02:00
|
|
|
except SynapseError as e:
|
2015-02-16 19:02:39 +01:00
|
|
|
logger.info(
|
|
|
|
"Failed to get PDU %s from %s because %s",
|
|
|
|
event_id, destination, e,
|
|
|
|
)
|
2015-02-17 18:20:56 +01:00
|
|
|
except NotRetryingDestination as e:
|
|
|
|
logger.info(e.message)
|
|
|
|
continue
|
2018-01-22 19:11:18 +01:00
|
|
|
except FederationDeniedError as e:
|
|
|
|
logger.info(e.message)
|
|
|
|
continue
|
2015-01-26 11:45:24 +01:00
|
|
|
except Exception as e:
|
2016-08-10 12:31:46 +02:00
|
|
|
pdu_attempts[destination] = now
|
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
logger.info(
|
|
|
|
"Failed to get PDU %s from %s because %s",
|
|
|
|
event_id, destination, e,
|
|
|
|
)
|
|
|
|
continue
|
|
|
|
|
2016-09-01 11:55:02 +02:00
|
|
|
if self._get_pdu_cache is not None and signed_pdu:
|
|
|
|
self._get_pdu_cache[event_id] = signed_pdu
|
2015-02-16 19:02:39 +01:00
|
|
|
|
2016-09-01 11:55:02 +02:00
|
|
|
defer.returnValue(signed_pdu)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def get_state_for_room(self, destination, room_id, event_id):
|
|
|
|
"""Requests all of the `current` state PDUs for a given room from
|
|
|
|
a remote home server.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): The remote homeserver to query for the state.
|
|
|
|
room_id (str): The id of the room we're interested in.
|
|
|
|
event_id (str): The id of the event we want the state at.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in a list of PDUs.
|
|
|
|
"""
|
|
|
|
|
2016-08-03 15:47:37 +02:00
|
|
|
try:
|
|
|
|
# First we try and ask for just the IDs, as thats far quicker if
|
|
|
|
# we have most of the state and auth_chain already.
|
|
|
|
# However, this may 404 if the other side has an old synapse.
|
|
|
|
result = yield self.transport_layer.get_room_state_ids(
|
|
|
|
destination, room_id, event_id=event_id,
|
|
|
|
)
|
|
|
|
|
2016-08-03 18:19:15 +02:00
|
|
|
state_event_ids = result["pdu_ids"]
|
|
|
|
auth_event_ids = result.get("auth_chain_ids", [])
|
2016-08-03 15:47:37 +02:00
|
|
|
|
2016-08-03 16:03:15 +02:00
|
|
|
fetched_events, failed_to_fetch = yield self.get_events(
|
2016-08-03 15:47:37 +02:00
|
|
|
[destination], room_id, set(state_event_ids + auth_event_ids)
|
|
|
|
)
|
|
|
|
|
2016-08-03 16:03:15 +02:00
|
|
|
if failed_to_fetch:
|
|
|
|
logger.warn("Failed to get %r", failed_to_fetch)
|
|
|
|
|
|
|
|
event_map = {
|
|
|
|
ev.event_id: ev for ev in fetched_events
|
|
|
|
}
|
|
|
|
|
2016-08-05 19:08:32 +02:00
|
|
|
pdus = [event_map[e_id] for e_id in state_event_ids if e_id in event_map]
|
|
|
|
auth_chain = [
|
|
|
|
event_map[e_id] for e_id in auth_event_ids if e_id in event_map
|
|
|
|
]
|
2016-08-03 15:47:37 +02:00
|
|
|
|
|
|
|
auth_chain.sort(key=lambda e: e.depth)
|
|
|
|
|
|
|
|
defer.returnValue((pdus, auth_chain))
|
|
|
|
except HttpResponseException as e:
|
2016-08-05 11:24:23 +02:00
|
|
|
if e.code == 400 or e.code == 404:
|
2016-08-03 15:47:37 +02:00
|
|
|
logger.info("Failed to use get_room_state_ids API, falling back")
|
|
|
|
else:
|
|
|
|
raise e
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2016-08-03 16:04:29 +02:00
|
|
|
result = yield self.transport_layer.get_room_state(
|
|
|
|
destination, room_id, event_id=event_id,
|
|
|
|
)
|
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
pdus = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=True) for p in result["pdus"]
|
2015-01-26 11:45:24 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
auth_chain = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=True)
|
2015-01-26 11:45:24 +01:00
|
|
|
for p in result.get("auth_chain", [])
|
|
|
|
]
|
|
|
|
|
2016-08-05 11:43:47 +02:00
|
|
|
seen_events = yield self.store.get_events([
|
|
|
|
ev.event_id for ev in itertools.chain(pdus, auth_chain)
|
|
|
|
])
|
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
signed_pdus = yield self._check_sigs_and_hash_and_fetch(
|
2016-08-05 11:43:47 +02:00
|
|
|
destination,
|
|
|
|
[p for p in pdus if p.event_id not in seen_events],
|
|
|
|
outlier=True
|
|
|
|
)
|
|
|
|
signed_pdus.extend(
|
|
|
|
seen_events[p.event_id] for p in pdus if p.event_id in seen_events
|
2015-02-02 17:56:01 +01:00
|
|
|
)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
signed_auth = yield self._check_sigs_and_hash_and_fetch(
|
2016-08-05 11:43:47 +02:00
|
|
|
destination,
|
2016-08-05 11:48:56 +02:00
|
|
|
[p for p in auth_chain if p.event_id not in seen_events],
|
2016-08-05 11:43:47 +02:00
|
|
|
outlier=True
|
|
|
|
)
|
|
|
|
signed_auth.extend(
|
|
|
|
seen_events[p.event_id] for p in auth_chain if p.event_id in seen_events
|
2015-02-02 17:56:01 +01:00
|
|
|
)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
signed_auth.sort(key=lambda e: e.depth)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
defer.returnValue((signed_pdus, signed_auth))
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2016-08-03 15:47:37 +02:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def get_events(self, destinations, room_id, event_ids, return_local=True):
|
2016-08-03 15:52:43 +02:00
|
|
|
"""Fetch events from some remote destinations, checking if we already
|
|
|
|
have them.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destinations (list)
|
|
|
|
room_id (str)
|
|
|
|
event_ids (list)
|
|
|
|
return_local (bool): Whether to include events we already have in
|
|
|
|
the DB in the returned list of events
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: A deferred resolving to a 2-tuple where the first is a list of
|
|
|
|
events and the second is a list of event ids that we failed to fetch.
|
|
|
|
"""
|
2016-08-03 15:47:37 +02:00
|
|
|
if return_local:
|
2016-08-10 14:26:13 +02:00
|
|
|
seen_events = yield self.store.get_events(event_ids, allow_rejected=True)
|
2018-05-31 11:03:47 +02:00
|
|
|
signed_events = list(seen_events.values())
|
2016-08-03 15:47:37 +02:00
|
|
|
else:
|
2018-04-17 19:30:53 +02:00
|
|
|
seen_events = yield self.store.have_seen_events(event_ids)
|
2016-08-03 15:47:37 +02:00
|
|
|
signed_events = []
|
|
|
|
|
2016-08-04 15:05:45 +02:00
|
|
|
failed_to_fetch = set()
|
2016-08-03 15:47:37 +02:00
|
|
|
|
|
|
|
missing_events = set(event_ids)
|
|
|
|
for k in seen_events:
|
|
|
|
missing_events.discard(k)
|
|
|
|
|
|
|
|
if not missing_events:
|
|
|
|
defer.returnValue((signed_events, failed_to_fetch))
|
|
|
|
|
|
|
|
def random_server_list():
|
|
|
|
srvs = list(destinations)
|
|
|
|
random.shuffle(srvs)
|
|
|
|
return srvs
|
|
|
|
|
|
|
|
batch_size = 20
|
2016-08-04 15:05:45 +02:00
|
|
|
missing_events = list(missing_events)
|
2018-04-28 13:57:00 +02:00
|
|
|
for i in range(0, len(missing_events), batch_size):
|
2016-08-04 15:01:18 +02:00
|
|
|
batch = set(missing_events[i:i + batch_size])
|
2016-08-03 15:47:37 +02:00
|
|
|
|
|
|
|
deferreds = [
|
2018-04-27 12:29:27 +02:00
|
|
|
run_in_background(
|
|
|
|
self.get_pdu,
|
2016-08-03 15:47:37 +02:00
|
|
|
destinations=random_server_list(),
|
|
|
|
event_id=e_id,
|
2016-08-04 15:01:18 +02:00
|
|
|
)
|
2016-08-03 15:47:37 +02:00
|
|
|
for e_id in batch
|
|
|
|
]
|
|
|
|
|
2017-11-14 12:22:42 +01:00
|
|
|
res = yield make_deferred_yieldable(
|
2016-08-23 16:23:39 +02:00
|
|
|
defer.DeferredList(deferreds, consumeErrors=True)
|
|
|
|
)
|
2016-08-04 15:01:18 +02:00
|
|
|
for success, result in res:
|
2016-09-12 15:59:43 +02:00
|
|
|
if success and result:
|
2016-08-03 18:17:26 +02:00
|
|
|
signed_events.append(result)
|
2016-08-04 15:01:18 +02:00
|
|
|
batch.discard(result.event_id)
|
|
|
|
|
|
|
|
# We removed all events we successfully fetched from `batch`
|
|
|
|
failed_to_fetch.update(batch)
|
2016-08-03 15:47:37 +02:00
|
|
|
|
|
|
|
defer.returnValue((signed_events, failed_to_fetch))
|
|
|
|
|
2015-01-26 11:45:24 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def get_event_auth(self, destination, room_id, event_id):
|
|
|
|
res = yield self.transport_layer.get_event_auth(
|
|
|
|
destination, room_id, event_id,
|
|
|
|
)
|
|
|
|
|
|
|
|
auth_chain = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=True)
|
2015-01-26 11:45:24 +01:00
|
|
|
for p in res["auth_chain"]
|
|
|
|
]
|
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
signed_auth = yield self._check_sigs_and_hash_and_fetch(
|
2015-02-02 18:06:37 +01:00
|
|
|
destination, auth_chain, outlier=True
|
2015-02-02 17:56:01 +01:00
|
|
|
)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
signed_auth.sort(key=lambda e: e.depth)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
defer.returnValue(signed_auth)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2015-11-12 17:19:55 +01:00
|
|
|
def make_membership_event(self, destinations, room_id, user_id, membership,
|
|
|
|
content={},):
|
2015-10-20 12:58:58 +02:00
|
|
|
"""
|
|
|
|
Creates an m.room.member event, with context, without participating in the room.
|
|
|
|
|
|
|
|
Does so by asking one of the already participating servers to create an
|
|
|
|
event with proper context.
|
|
|
|
|
|
|
|
Note that this does not append any events to any graphs.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destinations (str): Candidate homeservers which are probably
|
|
|
|
participating in the room.
|
|
|
|
room_id (str): The room in which the event will happen.
|
|
|
|
user_id (str): The user whose membership is being evented.
|
|
|
|
membership (str): The "membership" property of the event. Must be
|
|
|
|
one of "join" or "leave".
|
|
|
|
content (object): Any additional data to put into the content field
|
|
|
|
of the event.
|
|
|
|
Return:
|
2017-04-21 01:46:54 +02:00
|
|
|
Deferred: resolves to a tuple of (origin (str), event (object))
|
|
|
|
where origin is the remote homeserver which generated the event.
|
|
|
|
|
|
|
|
Fails with a ``CodeMessageException`` if the chosen remote server
|
|
|
|
returns a 300/400 code.
|
|
|
|
|
|
|
|
Fails with a ``RuntimeError`` if no servers were reachable.
|
2015-10-20 12:58:58 +02:00
|
|
|
"""
|
|
|
|
valid_memberships = {Membership.JOIN, Membership.LEAVE}
|
|
|
|
if membership not in valid_memberships:
|
|
|
|
raise RuntimeError(
|
|
|
|
"make_membership_event called with membership='%s', must be one of %s" %
|
|
|
|
(membership, ",".join(valid_memberships))
|
|
|
|
)
|
2015-02-04 14:55:10 +01:00
|
|
|
for destination in destinations:
|
2015-06-26 10:52:24 +02:00
|
|
|
if destination == self.server_name:
|
|
|
|
continue
|
|
|
|
|
2015-02-04 14:55:10 +01:00
|
|
|
try:
|
2015-10-20 12:58:58 +02:00
|
|
|
ret = yield self.transport_layer.make_membership_event(
|
2015-11-05 17:43:19 +01:00
|
|
|
destination, room_id, user_id, membership
|
2015-02-04 14:55:10 +01:00
|
|
|
)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-02-04 14:55:10 +01:00
|
|
|
pdu_dict = ret["event"]
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-10-20 12:58:58 +02:00
|
|
|
logger.debug("Got response to make_%s: %s", membership, pdu_dict)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-11-12 17:19:55 +01:00
|
|
|
pdu_dict["content"].update(content)
|
|
|
|
|
2015-11-13 18:27:25 +01:00
|
|
|
# The protoevent received over the JSON wire may not have all
|
|
|
|
# the required fields. Lets just gloss over that because
|
|
|
|
# there's some we never care about
|
|
|
|
if "prev_state" not in pdu_dict:
|
|
|
|
pdu_dict["prev_state"] = []
|
|
|
|
|
2017-01-13 14:21:04 +01:00
|
|
|
ev = builder.EventBuilder(pdu_dict)
|
|
|
|
|
2015-02-05 14:43:28 +01:00
|
|
|
defer.returnValue(
|
2017-01-13 14:21:04 +01:00
|
|
|
(destination, ev)
|
2015-02-05 14:43:28 +01:00
|
|
|
)
|
2015-02-04 14:55:10 +01:00
|
|
|
break
|
2016-08-05 19:02:03 +02:00
|
|
|
except CodeMessageException as e:
|
|
|
|
if not 500 <= e.code < 600:
|
|
|
|
raise
|
|
|
|
else:
|
|
|
|
logger.warn(
|
|
|
|
"Failed to make_%s via %s: %s",
|
|
|
|
membership, destination, e.message
|
|
|
|
)
|
2015-02-05 14:50:15 +01:00
|
|
|
except Exception as e:
|
2015-02-04 17:28:12 +01:00
|
|
|
logger.warn(
|
2015-10-20 12:58:58 +02:00
|
|
|
"Failed to make_%s via %s: %s",
|
|
|
|
membership, destination, e.message
|
2015-02-04 17:28:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
raise RuntimeError("Failed to send to any server.")
|
2015-01-26 11:45:24 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2015-02-04 17:28:12 +01:00
|
|
|
def send_join(self, destinations, pdu):
|
2017-04-21 01:46:54 +02:00
|
|
|
"""Sends a join event to one of a list of homeservers.
|
|
|
|
|
|
|
|
Doing so will cause the remote server to add the event to the graph,
|
|
|
|
and send the event out to the rest of the federation.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destinations (str): Candidate homeservers which are probably
|
|
|
|
participating in the room.
|
|
|
|
pdu (BaseEvent): event to be sent
|
|
|
|
|
|
|
|
Return:
|
|
|
|
Deferred: resolves to a dict with members ``origin`` (a string
|
|
|
|
giving the serer the event was sent to, ``state`` (?) and
|
|
|
|
``auth_chain``.
|
|
|
|
|
|
|
|
Fails with a ``CodeMessageException`` if the chosen remote server
|
|
|
|
returns a 300/400 code.
|
|
|
|
|
|
|
|
Fails with a ``RuntimeError`` if no servers were reachable.
|
|
|
|
"""
|
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
for destination in destinations:
|
2015-06-26 10:52:24 +02:00
|
|
|
if destination == self.server_name:
|
|
|
|
continue
|
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
try:
|
|
|
|
time_now = self._clock.time_msec()
|
|
|
|
_, content = yield self.transport_layer.send_join(
|
|
|
|
destination=destination,
|
|
|
|
room_id=pdu.room_id,
|
|
|
|
event_id=pdu.event_id,
|
|
|
|
content=pdu.get_pdu_json(time_now),
|
|
|
|
)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
logger.debug("Got content: %s", content)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
state = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=True)
|
2015-02-04 17:28:12 +01:00
|
|
|
for p in content.get("state", [])
|
|
|
|
]
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
auth_chain = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(p, outlier=True)
|
2015-02-04 17:28:12 +01:00
|
|
|
for p in content.get("auth_chain", [])
|
|
|
|
]
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-06-26 10:52:24 +02:00
|
|
|
pdus = {
|
|
|
|
p.event_id: p
|
|
|
|
for p in itertools.chain(state, auth_chain)
|
|
|
|
}
|
|
|
|
|
|
|
|
valid_pdus = yield self._check_sigs_and_hash_and_fetch(
|
2018-05-31 11:03:47 +02:00
|
|
|
destination, list(pdus.values()),
|
2015-06-26 10:52:24 +02:00
|
|
|
outlier=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
valid_pdus_map = {
|
|
|
|
p.event_id: p
|
|
|
|
for p in valid_pdus
|
|
|
|
}
|
|
|
|
|
|
|
|
# NB: We *need* to copy to ensure that we don't have multiple
|
|
|
|
# references being passed on, as that causes... issues.
|
|
|
|
signed_state = [
|
|
|
|
copy.copy(valid_pdus_map[p.event_id])
|
|
|
|
for p in state
|
|
|
|
if p.event_id in valid_pdus_map
|
|
|
|
]
|
|
|
|
|
|
|
|
signed_auth = [
|
|
|
|
valid_pdus_map[p.event_id]
|
|
|
|
for p in auth_chain
|
|
|
|
if p.event_id in valid_pdus_map
|
|
|
|
]
|
|
|
|
|
|
|
|
# NB: We *need* to copy to ensure that we don't have multiple
|
|
|
|
# references being passed on, as that causes... issues.
|
|
|
|
for s in signed_state:
|
|
|
|
s.internal_metadata = copy.deepcopy(s.internal_metadata)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
auth_chain.sort(key=lambda e: e.depth)
|
|
|
|
|
|
|
|
defer.returnValue({
|
|
|
|
"state": signed_state,
|
|
|
|
"auth_chain": signed_auth,
|
2015-02-05 14:43:28 +01:00
|
|
|
"origin": destination,
|
2015-02-04 17:28:12 +01:00
|
|
|
})
|
2016-08-05 19:02:03 +02:00
|
|
|
except CodeMessageException as e:
|
|
|
|
if not 500 <= e.code < 600:
|
|
|
|
raise
|
|
|
|
else:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to send_join via %s: %s",
|
|
|
|
destination, e.message
|
|
|
|
)
|
2015-02-05 14:50:15 +01:00
|
|
|
except Exception as e:
|
2015-06-26 10:52:24 +02:00
|
|
|
logger.exception(
|
2015-02-04 17:28:12 +01:00
|
|
|
"Failed to send_join via %s: %s",
|
|
|
|
destination, e.message
|
|
|
|
)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
raise RuntimeError("Failed to send to any server.")
|
2015-01-26 11:45:24 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def send_invite(self, destination, room_id, event_id, pdu):
|
|
|
|
time_now = self._clock.time_msec()
|
|
|
|
code, content = yield self.transport_layer.send_invite(
|
|
|
|
destination=destination,
|
|
|
|
room_id=room_id,
|
|
|
|
event_id=event_id,
|
|
|
|
content=pdu.get_pdu_json(time_now),
|
|
|
|
)
|
|
|
|
|
|
|
|
pdu_dict = content["event"]
|
|
|
|
|
|
|
|
logger.debug("Got response to send_invite: %s", pdu_dict)
|
|
|
|
|
2017-12-30 19:40:19 +01:00
|
|
|
pdu = event_from_pdu_json(pdu_dict)
|
2015-01-26 15:33:11 +01:00
|
|
|
|
|
|
|
# Check signatures are correct.
|
|
|
|
pdu = yield self._check_sigs_and_hash(pdu)
|
|
|
|
|
|
|
|
# FIXME: We should handle signature failures more gracefully.
|
|
|
|
|
|
|
|
defer.returnValue(pdu)
|
2015-01-26 11:45:24 +01:00
|
|
|
|
2015-10-20 12:58:58 +02:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def send_leave(self, destinations, pdu):
|
2017-04-21 01:46:54 +02:00
|
|
|
"""Sends a leave event to one of a list of homeservers.
|
|
|
|
|
|
|
|
Doing so will cause the remote server to add the event to the graph,
|
|
|
|
and send the event out to the rest of the federation.
|
|
|
|
|
|
|
|
This is mostly useful to reject received invites.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destinations (str): Candidate homeservers which are probably
|
|
|
|
participating in the room.
|
|
|
|
pdu (BaseEvent): event to be sent
|
|
|
|
|
|
|
|
Return:
|
|
|
|
Deferred: resolves to None.
|
|
|
|
|
|
|
|
Fails with a ``CodeMessageException`` if the chosen remote server
|
|
|
|
returns a non-200 code.
|
|
|
|
|
|
|
|
Fails with a ``RuntimeError`` if no servers were reachable.
|
|
|
|
"""
|
2015-10-20 12:58:58 +02:00
|
|
|
for destination in destinations:
|
|
|
|
if destination == self.server_name:
|
|
|
|
continue
|
|
|
|
|
|
|
|
try:
|
|
|
|
time_now = self._clock.time_msec()
|
|
|
|
_, content = yield self.transport_layer.send_leave(
|
|
|
|
destination=destination,
|
|
|
|
room_id=pdu.room_id,
|
|
|
|
event_id=pdu.event_id,
|
|
|
|
content=pdu.get_pdu_json(time_now),
|
|
|
|
)
|
|
|
|
|
|
|
|
logger.debug("Got content: %s", content)
|
|
|
|
defer.returnValue(None)
|
|
|
|
except CodeMessageException:
|
|
|
|
raise
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to send_leave via %s: %s",
|
|
|
|
destination, e.message
|
|
|
|
)
|
|
|
|
|
|
|
|
raise RuntimeError("Failed to send to any server.")
|
|
|
|
|
2016-09-16 11:24:15 +02:00
|
|
|
def get_public_rooms(self, destination, limit=None, since_token=None,
|
2016-12-06 11:43:48 +01:00
|
|
|
search_filter=None, include_all_networks=False,
|
|
|
|
third_party_instance_id=None):
|
2016-09-15 11:36:19 +02:00
|
|
|
if destination == self.server_name:
|
|
|
|
return
|
2016-05-31 18:20:07 +02:00
|
|
|
|
2016-09-16 11:24:15 +02:00
|
|
|
return self.transport_layer.get_public_rooms(
|
2016-12-06 11:43:48 +01:00
|
|
|
destination, limit, since_token, search_filter,
|
|
|
|
include_all_networks=include_all_networks,
|
|
|
|
third_party_instance_id=third_party_instance_id,
|
2016-09-16 11:24:15 +02:00
|
|
|
)
|
2016-05-31 18:20:07 +02:00
|
|
|
|
2015-01-28 17:16:53 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def query_auth(self, destination, room_id, event_id, local_auth):
|
|
|
|
"""
|
|
|
|
Params:
|
|
|
|
destination (str)
|
|
|
|
event_it (str)
|
|
|
|
local_auth (list)
|
|
|
|
"""
|
|
|
|
time_now = self._clock.time_msec()
|
|
|
|
|
|
|
|
send_content = {
|
|
|
|
"auth_chain": [e.get_pdu_json(time_now) for e in local_auth],
|
|
|
|
}
|
|
|
|
|
2015-01-29 17:50:23 +01:00
|
|
|
code, content = yield self.transport_layer.send_query_auth(
|
2015-01-28 17:16:53 +01:00
|
|
|
destination=destination,
|
|
|
|
room_id=room_id,
|
|
|
|
event_id=event_id,
|
|
|
|
content=send_content,
|
|
|
|
)
|
|
|
|
|
|
|
|
auth_chain = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(e)
|
2015-01-28 17:16:53 +01:00
|
|
|
for e in content["auth_chain"]
|
|
|
|
]
|
|
|
|
|
2015-02-02 17:56:01 +01:00
|
|
|
signed_auth = yield self._check_sigs_and_hash_and_fetch(
|
2015-02-02 18:06:37 +01:00
|
|
|
destination, auth_chain, outlier=True
|
2015-02-02 17:56:01 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
signed_auth.sort(key=lambda e: e.depth)
|
|
|
|
|
2015-01-28 17:16:53 +01:00
|
|
|
ret = {
|
2015-02-02 17:56:01 +01:00
|
|
|
"auth_chain": signed_auth,
|
2015-01-28 17:16:53 +01:00
|
|
|
"rejects": content.get("rejects", []),
|
2015-01-30 14:34:01 +01:00
|
|
|
"missing": content.get("missing", []),
|
2015-01-28 17:16:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
defer.returnValue(ret)
|
|
|
|
|
2015-02-23 14:58:02 +01:00
|
|
|
@defer.inlineCallbacks
|
2015-03-05 17:08:02 +01:00
|
|
|
def get_missing_events(self, destination, room_id, earliest_events_ids,
|
2016-12-31 16:21:37 +01:00
|
|
|
latest_events, limit, min_depth, timeout):
|
2015-03-05 17:31:13 +01:00
|
|
|
"""Tries to fetch events we are missing. This is called when we receive
|
|
|
|
an event without having received all of its ancestors.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str)
|
|
|
|
room_id (str)
|
|
|
|
earliest_events_ids (list): List of event ids. Effectively the
|
|
|
|
events we expected to receive, but haven't. `get_missing_events`
|
|
|
|
should only return events that didn't happen before these.
|
|
|
|
latest_events (list): List of events we have received that we don't
|
|
|
|
have all previous events for.
|
|
|
|
limit (int): Maximum number of events to return.
|
|
|
|
min_depth (int): Minimum depth of events tor return.
|
2016-12-31 16:21:37 +01:00
|
|
|
timeout (int): Max time to wait in ms
|
2015-03-05 17:31:13 +01:00
|
|
|
"""
|
2015-03-05 17:08:02 +01:00
|
|
|
try:
|
|
|
|
content = yield self.transport_layer.get_missing_events(
|
|
|
|
destination=destination,
|
|
|
|
room_id=room_id,
|
|
|
|
earliest_events=earliest_events_ids,
|
|
|
|
latest_events=[e.event_id for e in latest_events],
|
|
|
|
limit=limit,
|
|
|
|
min_depth=min_depth,
|
2016-12-31 16:21:37 +01:00
|
|
|
timeout=timeout,
|
2015-03-05 17:08:02 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
events = [
|
2017-12-30 19:40:19 +01:00
|
|
|
event_from_pdu_json(e)
|
2015-03-05 17:08:02 +01:00
|
|
|
for e in content.get("events", [])
|
|
|
|
]
|
|
|
|
|
|
|
|
signed_events = yield self._check_sigs_and_hash_and_fetch(
|
2015-05-05 18:36:57 +02:00
|
|
|
destination, events, outlier=False
|
2015-03-05 17:08:02 +01:00
|
|
|
)
|
|
|
|
except HttpResponseException as e:
|
|
|
|
if not e.code == 400:
|
|
|
|
raise
|
2015-02-23 14:58:02 +01:00
|
|
|
|
2015-03-05 17:31:13 +01:00
|
|
|
# We are probably hitting an old server that doesn't support
|
|
|
|
# get_missing_events
|
2015-03-05 17:08:02 +01:00
|
|
|
signed_events = []
|
|
|
|
|
2015-02-23 14:58:02 +01:00
|
|
|
defer.returnValue(signed_events)
|
|
|
|
|
2015-11-05 17:43:19 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def forward_third_party_invite(self, destinations, room_id, event_dict):
|
|
|
|
for destination in destinations:
|
|
|
|
if destination == self.server_name:
|
|
|
|
continue
|
|
|
|
|
|
|
|
try:
|
|
|
|
yield self.transport_layer.exchange_third_party_invite(
|
|
|
|
destination=destination,
|
|
|
|
room_id=room_id,
|
|
|
|
event_dict=event_dict,
|
|
|
|
)
|
|
|
|
defer.returnValue(None)
|
|
|
|
except CodeMessageException:
|
|
|
|
raise
|
|
|
|
except Exception as e:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to send_third_party_invite via %s: %s",
|
|
|
|
destination, e.message
|
|
|
|
)
|
|
|
|
|
|
|
|
raise RuntimeError("Failed to send to any server.")
|