2017-04-21 00:40:52 +02:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
2020-02-05 19:06:39 +01:00
|
|
|
// Copyright 2018 New Vector Ltd
|
|
|
|
// Copyright 2019-2020 The Matrix.org Foundation C.I.C.
|
2017-04-21 00:40:52 +02:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2020-09-02 18:13:15 +02:00
|
|
|
package input
|
2017-02-07 18:20:05 +01:00
|
|
|
|
|
|
|
import (
|
2020-10-20 12:42:54 +02:00
|
|
|
"bytes"
|
2017-09-13 17:30:19 +02:00
|
|
|
"context"
|
2020-07-21 16:48:21 +02:00
|
|
|
"fmt"
|
2021-01-13 18:31:46 +01:00
|
|
|
"time"
|
2017-08-21 17:37:11 +02:00
|
|
|
|
2020-07-07 13:51:55 +02:00
|
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
2017-02-07 18:20:05 +01:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
2020-09-02 14:47:31 +02:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/internal/helpers"
|
2017-03-08 16:10:26 +01:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/state"
|
2017-02-09 17:48:14 +01:00
|
|
|
"github.com/matrix-org/dendrite/roomserver/types"
|
2017-02-07 18:20:05 +01:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2020-10-20 12:42:54 +02:00
|
|
|
"github.com/matrix-org/util"
|
2021-01-13 18:31:46 +01:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
2020-04-28 12:46:47 +02:00
|
|
|
"github.com/sirupsen/logrus"
|
2017-02-07 18:20:05 +01:00
|
|
|
)
|
|
|
|
|
2021-01-13 18:31:46 +01:00
|
|
|
func init() {
|
|
|
|
prometheus.MustRegister(processRoomEventDuration)
|
|
|
|
}
|
|
|
|
|
|
|
|
var processRoomEventDuration = prometheus.NewHistogramVec(
|
|
|
|
prometheus.HistogramOpts{
|
|
|
|
Namespace: "dendrite",
|
|
|
|
Subsystem: "roomserver",
|
|
|
|
Name: "processroomevent_duration_millis",
|
|
|
|
Help: "How long it takes the roomserver to process an event",
|
|
|
|
Buckets: []float64{ // milliseconds
|
|
|
|
5, 10, 25, 50, 75, 100, 250, 500,
|
|
|
|
1000, 2000, 3000, 4000, 5000, 6000,
|
|
|
|
7000, 8000, 9000, 10000, 15000, 20000,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
[]string{"room_id"},
|
|
|
|
)
|
|
|
|
|
2017-12-15 16:22:06 +01:00
|
|
|
// processRoomEvent can only be called once at a time
|
|
|
|
//
|
|
|
|
// TODO(#375): This should be rewritten to allow concurrent calls. The
|
|
|
|
// difficulty is in ensuring that we correctly annotate events with the correct
|
|
|
|
// state deltas when sending to kafka streams
|
2020-07-07 13:51:55 +02:00
|
|
|
// TODO: Break up function - we should probably do transaction ID checks before calling this.
|
|
|
|
// nolint:gocyclo
|
2020-09-02 18:13:15 +02:00
|
|
|
func (r *Inputer) processRoomEvent(
|
2017-09-13 17:30:19 +02:00
|
|
|
ctx context.Context,
|
2020-09-03 16:22:16 +02:00
|
|
|
input *api.InputRoomEvent,
|
2022-01-05 18:44:49 +01:00
|
|
|
) (err error) {
|
2021-01-13 18:31:46 +01:00
|
|
|
// Measure how long it takes to process this event.
|
|
|
|
started := time.Now()
|
|
|
|
defer func() {
|
|
|
|
timetaken := time.Since(started)
|
|
|
|
processRoomEventDuration.With(prometheus.Labels{
|
|
|
|
"room_id": input.Event.RoomID(),
|
|
|
|
}).Observe(float64(timetaken.Milliseconds()))
|
|
|
|
}()
|
|
|
|
|
2017-02-07 18:20:05 +01:00
|
|
|
// Parse and validate the event JSON
|
2020-03-27 17:28:22 +01:00
|
|
|
headered := input.Event
|
|
|
|
event := headered.Unwrap()
|
2017-02-07 18:20:05 +01:00
|
|
|
|
2020-10-20 12:42:54 +02:00
|
|
|
// if we have already got this event then do not process it again, if the input kind is an outlier.
|
|
|
|
// Outliers contain no extra information which may warrant a re-processing.
|
|
|
|
if input.Kind == api.KindOutlier {
|
2020-10-20 13:29:53 +02:00
|
|
|
evs, err2 := r.DB.EventsFromIDs(ctx, []string{event.EventID()})
|
|
|
|
if err2 == nil && len(evs) == 1 {
|
2020-10-20 12:42:54 +02:00
|
|
|
// check hash matches if we're on early room versions where the event ID was a random string
|
2020-10-20 13:29:53 +02:00
|
|
|
idFormat, err2 := headered.RoomVersion.EventIDFormat()
|
|
|
|
if err2 == nil {
|
2020-10-20 12:42:54 +02:00
|
|
|
switch idFormat {
|
|
|
|
case gomatrixserverlib.EventIDFormatV1:
|
|
|
|
if bytes.Equal(event.EventReference().EventSHA256, evs[0].EventReference().EventSHA256) {
|
|
|
|
util.GetLogger(ctx).WithField("event_id", event.EventID()).Infof("Already processed event; ignoring")
|
2022-01-05 18:44:49 +01:00
|
|
|
return nil
|
2020-10-20 12:42:54 +02:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
util.GetLogger(ctx).WithField("event_id", event.EventID()).Infof("Already processed event; ignoring")
|
2022-01-05 18:44:49 +01:00
|
|
|
return nil
|
2020-10-20 12:42:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-18 18:49:24 +02:00
|
|
|
// Check that the event passes authentication checks and work out
|
|
|
|
// the numeric IDs for the auth events.
|
2020-09-16 14:00:52 +02:00
|
|
|
isRejected := false
|
|
|
|
authEventNIDs, rejectionErr := helpers.CheckAuthEvents(ctx, r.DB, headered, input.AuthEventIDs)
|
|
|
|
if rejectionErr != nil {
|
2020-09-29 14:40:29 +02:00
|
|
|
logrus.WithError(rejectionErr).WithField("event_id", event.EventID()).WithField("auth_event_ids", input.AuthEventIDs).Error("helpers.CheckAuthEvents failed for event, rejecting event")
|
2020-09-16 14:00:52 +02:00
|
|
|
isRejected = true
|
2018-05-26 13:03:35 +02:00
|
|
|
}
|
|
|
|
|
2020-09-21 15:55:46 +02:00
|
|
|
var softfail bool
|
2020-10-07 15:05:33 +02:00
|
|
|
if input.Kind == api.KindNew {
|
2020-09-21 15:55:46 +02:00
|
|
|
// Check that the event passes authentication checks based on the
|
|
|
|
// current room state.
|
|
|
|
softfail, err = helpers.CheckForSoftFail(ctx, r.DB, headered, input.StateEventIDs)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithFields(logrus.Fields{
|
|
|
|
"event_id": event.EventID(),
|
|
|
|
"type": event.Type(),
|
|
|
|
"room": event.RoomID(),
|
|
|
|
}).WithError(err).Info("Error authing soft-failed event")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-18 18:49:24 +02:00
|
|
|
// Store the event.
|
2021-12-09 16:03:26 +01:00
|
|
|
_, _, stateAtEvent, redactionEvent, redactedEventID, err := r.DB.StoreEvent(ctx, event, authEventNIDs, isRejected)
|
2017-02-15 12:05:45 +01:00
|
|
|
if err != nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.DB.StoreEvent: %w", err)
|
2017-02-09 17:48:14 +01:00
|
|
|
}
|
2020-09-16 14:00:52 +02:00
|
|
|
|
2020-07-07 13:51:55 +02:00
|
|
|
// if storing this event results in it being redacted then do so.
|
2020-09-16 14:00:52 +02:00
|
|
|
if !isRejected && redactedEventID == event.EventID() {
|
2020-11-16 16:44:53 +01:00
|
|
|
r, rerr := eventutil.RedactEvent(redactionEvent, event)
|
2020-07-07 13:51:55 +02:00
|
|
|
if rerr != nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("eventutil.RedactEvent: %w", rerr)
|
2020-07-07 13:51:55 +02:00
|
|
|
}
|
2020-11-16 16:44:53 +01:00
|
|
|
event = r
|
2020-07-07 13:51:55 +02:00
|
|
|
}
|
2017-02-07 18:20:05 +01:00
|
|
|
|
2020-05-18 18:49:24 +02:00
|
|
|
// For outliers we can stop after we've stored the event itself as it
|
|
|
|
// doesn't have any associated state to store and we don't need to
|
|
|
|
// notify anyone about it.
|
2017-02-07 18:20:05 +01:00
|
|
|
if input.Kind == api.KindOutlier {
|
2020-05-18 18:49:24 +02:00
|
|
|
logrus.WithFields(logrus.Fields{
|
|
|
|
"event_id": event.EventID(),
|
|
|
|
"type": event.Type(),
|
|
|
|
"room": event.RoomID(),
|
2020-09-21 15:55:46 +02:00
|
|
|
"sender": event.Sender(),
|
2020-09-15 12:17:46 +02:00
|
|
|
}).Debug("Stored outlier")
|
2022-01-05 18:44:49 +01:00
|
|
|
return nil
|
2017-02-07 18:20:05 +01:00
|
|
|
}
|
|
|
|
|
2020-09-02 11:02:48 +02:00
|
|
|
roomInfo, err := r.DB.RoomInfo(ctx, event.RoomID())
|
|
|
|
if err != nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.DB.RoomInfo: %w", err)
|
2020-09-02 11:02:48 +02:00
|
|
|
}
|
|
|
|
if roomInfo == nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.DB.RoomInfo missing for room %s", event.RoomID())
|
2020-09-02 11:02:48 +02:00
|
|
|
}
|
|
|
|
|
2017-02-15 12:05:45 +01:00
|
|
|
if stateAtEvent.BeforeStateSnapshotNID == 0 {
|
|
|
|
// We haven't calculated a state for this event yet.
|
|
|
|
// Lets calculate one.
|
2020-09-16 14:00:52 +02:00
|
|
|
err = r.calculateAndSetState(ctx, input, *roomInfo, &stateAtEvent, event, isRejected)
|
2020-10-19 15:59:13 +02:00
|
|
|
if err != nil && input.Kind != api.KindOld {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.calculateAndSetState: %w", err)
|
2017-09-20 11:59:19 +02:00
|
|
|
}
|
2017-02-15 12:05:45 +01:00
|
|
|
}
|
|
|
|
|
2020-09-16 14:00:52 +02:00
|
|
|
// We stop here if the event is rejected: We've stored it but won't update forward extremities or notify anyone about it.
|
2020-09-21 15:55:46 +02:00
|
|
|
if isRejected || softfail {
|
2020-09-16 14:00:52 +02:00
|
|
|
logrus.WithFields(logrus.Fields{
|
2020-09-21 15:55:46 +02:00
|
|
|
"event_id": event.EventID(),
|
|
|
|
"type": event.Type(),
|
|
|
|
"room": event.RoomID(),
|
|
|
|
"soft_fail": softfail,
|
|
|
|
"sender": event.Sender(),
|
2020-09-16 14:00:52 +02:00
|
|
|
}).Debug("Stored rejected event")
|
2022-01-05 18:44:49 +01:00
|
|
|
return rejectionErr
|
2020-09-16 14:00:52 +02:00
|
|
|
}
|
|
|
|
|
2020-10-19 15:59:13 +02:00
|
|
|
switch input.Kind {
|
|
|
|
case api.KindNew:
|
|
|
|
if err = r.updateLatestEvents(
|
|
|
|
ctx, // context
|
|
|
|
roomInfo, // room info for the room being updated
|
|
|
|
stateAtEvent, // state at event (below)
|
|
|
|
event, // event
|
|
|
|
input.SendAsServer, // send as server
|
|
|
|
input.TransactionID, // transaction ID
|
|
|
|
input.HasState, // rewrites state?
|
|
|
|
); err != nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.updateLatestEvents: %w", err)
|
2020-10-19 15:59:13 +02:00
|
|
|
}
|
|
|
|
case api.KindOld:
|
|
|
|
err = r.WriteOutputEvents(event.RoomID(), []api.OutputEvent{
|
|
|
|
{
|
|
|
|
Type: api.OutputTypeOldRoomEvent,
|
|
|
|
OldRoomEvent: &api.OutputOldRoomEvent{
|
|
|
|
Event: headered,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.WriteOutputEvents (old): %w", err)
|
2020-10-19 15:59:13 +02:00
|
|
|
}
|
2020-05-18 18:49:24 +02:00
|
|
|
}
|
|
|
|
|
2020-07-07 13:51:55 +02:00
|
|
|
// processing this event resulted in an event (which may not be the one we're processing)
|
|
|
|
// being redacted. We are guaranteed to have both sides (the redaction/redacted event),
|
|
|
|
// so notify downstream components to redact this event - they should have it if they've
|
|
|
|
// been tracking our output log.
|
|
|
|
if redactedEventID != "" {
|
|
|
|
err = r.WriteOutputEvents(event.RoomID(), []api.OutputEvent{
|
|
|
|
{
|
|
|
|
Type: api.OutputTypeRedactedEvent,
|
|
|
|
RedactedEvent: &api.OutputRedactedEvent{
|
|
|
|
RedactedEventID: redactedEventID,
|
|
|
|
RedactedBecause: redactionEvent.Headered(headered.RoomVersion),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2022-01-05 18:44:49 +01:00
|
|
|
return fmt.Errorf("r.WriteOutputEvents (redactions): %w", err)
|
2020-07-07 13:51:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-21 15:50:30 +01:00
|
|
|
// Update the extremities of the event graph for the room
|
2022-01-05 18:44:49 +01:00
|
|
|
return nil
|
2018-05-26 13:03:35 +02:00
|
|
|
}
|
|
|
|
|
2020-09-02 18:13:15 +02:00
|
|
|
func (r *Inputer) calculateAndSetState(
|
2018-05-26 13:03:35 +02:00
|
|
|
ctx context.Context,
|
2020-09-03 16:22:16 +02:00
|
|
|
input *api.InputRoomEvent,
|
2020-09-02 11:02:48 +02:00
|
|
|
roomInfo types.RoomInfo,
|
2018-05-26 13:03:35 +02:00
|
|
|
stateAtEvent *types.StateAtEvent,
|
2020-11-16 16:44:53 +01:00
|
|
|
event *gomatrixserverlib.Event,
|
2020-09-16 14:00:52 +02:00
|
|
|
isRejected bool,
|
2018-05-26 13:03:35 +02:00
|
|
|
) error {
|
2020-03-19 19:33:04 +01:00
|
|
|
var err error
|
2020-09-02 11:02:48 +02:00
|
|
|
roomState := state.NewStateResolution(r.DB, roomInfo)
|
2020-02-05 17:25:58 +01:00
|
|
|
|
2020-09-16 14:00:52 +02:00
|
|
|
if input.HasState && !isRejected {
|
2020-05-20 19:03:06 +02:00
|
|
|
// Check here if we think we're in the room already.
|
2020-05-18 18:49:24 +02:00
|
|
|
stateAtEvent.Overwrite = true
|
2020-05-20 19:03:06 +02:00
|
|
|
var joinEventNIDs []types.EventNID
|
|
|
|
// Request join memberships only for local users only.
|
2020-09-02 11:02:48 +02:00
|
|
|
if joinEventNIDs, err = r.DB.GetMembershipEventNIDsForRoom(ctx, roomInfo.RoomNID, true, true); err == nil {
|
2020-05-20 19:03:06 +02:00
|
|
|
// If we have no local users that are joined to the room then any state about
|
|
|
|
// the room that we have is quite possibly out of date. Therefore in that case
|
|
|
|
// we should overwrite it rather than merge it.
|
|
|
|
stateAtEvent.Overwrite = len(joinEventNIDs) == 0
|
|
|
|
}
|
2020-05-18 18:49:24 +02:00
|
|
|
|
2018-05-26 13:03:35 +02:00
|
|
|
// We've been told what the state at the event is so we don't need to calculate it.
|
|
|
|
// Check that those state events are in the database and store the state.
|
|
|
|
var entries []types.StateEntry
|
2020-05-20 19:03:06 +02:00
|
|
|
if entries, err = r.DB.StateEntriesForEventIDs(ctx, input.StateEventIDs); err != nil {
|
2020-09-15 12:17:46 +02:00
|
|
|
return fmt.Errorf("r.DB.StateEntriesForEventIDs: %w", err)
|
2018-05-26 13:03:35 +02:00
|
|
|
}
|
2020-09-15 12:17:46 +02:00
|
|
|
entries = types.DeduplicateStateEntries(entries)
|
2018-05-26 13:03:35 +02:00
|
|
|
|
2020-09-02 11:02:48 +02:00
|
|
|
if stateAtEvent.BeforeStateSnapshotNID, err = r.DB.AddState(ctx, roomInfo.RoomNID, nil, entries); err != nil {
|
2020-09-15 12:17:46 +02:00
|
|
|
return fmt.Errorf("r.DB.AddState: %w", err)
|
2018-05-26 13:03:35 +02:00
|
|
|
}
|
|
|
|
} else {
|
2020-05-18 18:49:24 +02:00
|
|
|
stateAtEvent.Overwrite = false
|
|
|
|
|
2018-05-26 13:03:35 +02:00
|
|
|
// We haven't been told what the state at the event is so we need to calculate it from the prev_events
|
2020-09-16 14:00:52 +02:00
|
|
|
if stateAtEvent.BeforeStateSnapshotNID, err = roomState.CalculateAndStoreStateBeforeEvent(ctx, event, isRejected); err != nil {
|
2020-09-15 12:17:46 +02:00
|
|
|
return fmt.Errorf("roomState.CalculateAndStoreStateBeforeEvent: %w", err)
|
2018-05-26 13:03:35 +02:00
|
|
|
}
|
|
|
|
}
|
2020-09-15 12:17:46 +02:00
|
|
|
|
|
|
|
err = r.DB.SetState(ctx, stateAtEvent.EventNID, stateAtEvent.BeforeStateSnapshotNID)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("r.DB.SetState: %w", err)
|
|
|
|
}
|
|
|
|
return nil
|
2017-08-21 17:37:11 +02:00
|
|
|
}
|