0
0
Fork 1
mirror of https://mau.dev/maunium/synapse.git synced 2024-11-15 22:42:23 +01:00

Revert "POC delete stale non-e2e devices for users (#14038)" (#14582)

This commit is contained in:
David Robertson 2022-11-29 17:48:48 +00:00 committed by GitHub
parent 99d1897078
commit c29e2c6306
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 5 additions and 83 deletions

1
changelog.d/14582.bugfix Normal file
View file

@ -0,0 +1 @@
Fix a regression in Synapse 1.73.0rc1 where Synapse's main process would stop responding to HTTP requests when a user with a large number of devices logs in.

View file

@ -421,9 +421,6 @@ class DeviceHandler(DeviceWorkerHandler):
self._check_device_name_length(initial_device_display_name) self._check_device_name_length(initial_device_display_name)
# Prune the user's device list if they already have a lot of devices.
await self._prune_too_many_devices(user_id)
if device_id is not None: if device_id is not None:
new_device = await self.store.store_device( new_device = await self.store.store_device(
user_id=user_id, user_id=user_id,
@ -455,14 +452,6 @@ class DeviceHandler(DeviceWorkerHandler):
raise errors.StoreError(500, "Couldn't generate a device ID.") raise errors.StoreError(500, "Couldn't generate a device ID.")
async def _prune_too_many_devices(self, user_id: str) -> None:
"""Delete any excess old devices this user may have."""
device_ids = await self.store.check_too_many_devices_for_user(user_id)
if not device_ids:
return
await self.delete_devices(user_id, device_ids)
async def _delete_stale_devices(self) -> None: async def _delete_stale_devices(self) -> None:
"""Background task that deletes devices which haven't been accessed for more than """Background task that deletes devices which haven't been accessed for more than
a configured time period. a configured time period.
@ -492,7 +481,7 @@ class DeviceHandler(DeviceWorkerHandler):
device_ids = [d for d in device_ids if d != except_device_id] device_ids = [d for d in device_ids if d != except_device_id]
await self.delete_devices(user_id, device_ids) await self.delete_devices(user_id, device_ids)
async def delete_devices(self, user_id: str, device_ids: Collection[str]) -> None: async def delete_devices(self, user_id: str, device_ids: List[str]) -> None:
"""Delete several devices """Delete several devices
Args: Args:

View file

@ -1533,71 +1533,6 @@ class DeviceBackgroundUpdateStore(SQLBaseStore):
return rows return rows
async def check_too_many_devices_for_user(self, user_id: str) -> Collection[str]:
"""Check if the user has a lot of devices, and if so return the set of
devices we can prune.
This does *not* return hidden devices or devices with E2E keys.
"""
num_devices = await self.db_pool.simple_select_one_onecol(
table="devices",
keyvalues={"user_id": user_id, "hidden": False},
retcol="COALESCE(COUNT(*), 0)",
desc="count_devices",
)
# We let users have up to ten devices without pruning.
if num_devices <= 10:
return ()
# We prune everything older than N days.
max_last_seen = self._clock.time_msec() - 14 * 24 * 60 * 60 * 1000
if num_devices > 50:
# If the user has more than 50 devices, then we chose a last seen
# that ensures we keep at most 50 devices.
sql = """
SELECT last_seen FROM devices
LEFT JOIN e2e_device_keys_json USING (user_id, device_id)
WHERE
user_id = ?
AND NOT hidden
AND last_seen IS NOT NULL
AND key_json IS NULL
ORDER BY last_seen DESC
LIMIT 1
OFFSET 50
"""
rows = await self.db_pool.execute(
"check_too_many_devices_for_user_last_seen", None, sql, (user_id,)
)
if rows:
max_last_seen = max(rows[0][0], max_last_seen)
# Now fetch the devices to delete.
sql = """
SELECT DISTINCT device_id FROM devices
LEFT JOIN e2e_device_keys_json USING (user_id, device_id)
WHERE
user_id = ?
AND NOT hidden
AND last_seen < ?
AND key_json IS NULL
"""
def check_too_many_devices_for_user_txn(
txn: LoggingTransaction,
) -> Collection[str]:
txn.execute(sql, (user_id, max_last_seen))
return {device_id for device_id, in txn}
return await self.db_pool.runInteraction(
"check_too_many_devices_for_user",
check_too_many_devices_for_user_txn,
)
class DeviceStore(DeviceWorkerStore, DeviceBackgroundUpdateStore): class DeviceStore(DeviceWorkerStore, DeviceBackgroundUpdateStore):
# Because we have write access, this will be a StreamIdGenerator # Because we have write access, this will be a StreamIdGenerator
@ -1656,7 +1591,6 @@ class DeviceStore(DeviceWorkerStore, DeviceBackgroundUpdateStore):
values={}, values={},
insertion_values={ insertion_values={
"display_name": initial_device_display_name, "display_name": initial_device_display_name,
"last_seen": self._clock.time_msec(),
"hidden": False, "hidden": False,
}, },
desc="store_device", desc="store_device",
@ -1702,7 +1636,7 @@ class DeviceStore(DeviceWorkerStore, DeviceBackgroundUpdateStore):
) )
raise StoreError(500, "Problem storing device.") raise StoreError(500, "Problem storing device.")
async def delete_devices(self, user_id: str, device_ids: Collection[str]) -> None: async def delete_devices(self, user_id: str, device_ids: List[str]) -> None:
"""Deletes several devices. """Deletes several devices.
Args: Args:

View file

@ -115,7 +115,7 @@ class DeviceTestCase(unittest.HomeserverTestCase):
"device_id": "xyz", "device_id": "xyz",
"display_name": "display 0", "display_name": "display 0",
"last_seen_ip": None, "last_seen_ip": None,
"last_seen_ts": 1000000, "last_seen_ts": None,
}, },
device_map["xyz"], device_map["xyz"],
) )

View file

@ -169,8 +169,6 @@ class ClientIpStoreTestCase(unittest.HomeserverTestCase):
) )
) )
last_seen = self.clock.time_msec()
if after_persisting: if after_persisting:
# Trigger the storage loop # Trigger the storage loop
self.reactor.advance(10) self.reactor.advance(10)
@ -191,7 +189,7 @@ class ClientIpStoreTestCase(unittest.HomeserverTestCase):
"device_id": device_id, "device_id": device_id,
"ip": None, "ip": None,
"user_agent": None, "user_agent": None,
"last_seen": last_seen, "last_seen": None,
}, },
], ],
) )