forked from MirrorHub/synapse
Merge remote-tracking branch 'origin/erikj/async_federation_base_branch' into release-v1.37
This commit is contained in:
commit
c0bebd00ef
11 changed files with 717 additions and 5 deletions
1
changelog.d/10269.misc
Normal file
1
changelog.d/10269.misc
Normal file
|
@ -0,0 +1 @@
|
||||||
|
Add a distributed lock implementation.
|
1
changelog.d/10272.bugfix
Normal file
1
changelog.d/10272.bugfix
Normal file
|
@ -0,0 +1 @@
|
||||||
|
Handle inbound events from federation asynchronously.
|
|
@ -108,6 +108,7 @@ from synapse.server import HomeServer
|
||||||
from synapse.storage.databases.main.censor_events import CensorEventsStore
|
from synapse.storage.databases.main.censor_events import CensorEventsStore
|
||||||
from synapse.storage.databases.main.client_ips import ClientIpWorkerStore
|
from synapse.storage.databases.main.client_ips import ClientIpWorkerStore
|
||||||
from synapse.storage.databases.main.e2e_room_keys import EndToEndRoomKeyStore
|
from synapse.storage.databases.main.e2e_room_keys import EndToEndRoomKeyStore
|
||||||
|
from synapse.storage.databases.main.lock import LockStore
|
||||||
from synapse.storage.databases.main.media_repository import MediaRepositoryStore
|
from synapse.storage.databases.main.media_repository import MediaRepositoryStore
|
||||||
from synapse.storage.databases.main.metrics import ServerMetricsStore
|
from synapse.storage.databases.main.metrics import ServerMetricsStore
|
||||||
from synapse.storage.databases.main.monthly_active_users import (
|
from synapse.storage.databases.main.monthly_active_users import (
|
||||||
|
@ -249,6 +250,7 @@ class GenericWorkerSlavedStore(
|
||||||
ServerMetricsStore,
|
ServerMetricsStore,
|
||||||
SearchStore,
|
SearchStore,
|
||||||
TransactionWorkerStore,
|
TransactionWorkerStore,
|
||||||
|
LockStore,
|
||||||
BaseSlavedStore,
|
BaseSlavedStore,
|
||||||
):
|
):
|
||||||
pass
|
pass
|
||||||
|
|
|
@ -44,7 +44,7 @@ from synapse.api.errors import (
|
||||||
SynapseError,
|
SynapseError,
|
||||||
UnsupportedRoomVersionError,
|
UnsupportedRoomVersionError,
|
||||||
)
|
)
|
||||||
from synapse.api.room_versions import KNOWN_ROOM_VERSIONS
|
from synapse.api.room_versions import KNOWN_ROOM_VERSIONS, RoomVersion
|
||||||
from synapse.events import EventBase
|
from synapse.events import EventBase
|
||||||
from synapse.federation.federation_base import FederationBase, event_from_pdu_json
|
from synapse.federation.federation_base import FederationBase, event_from_pdu_json
|
||||||
from synapse.federation.persistence import TransactionActions
|
from synapse.federation.persistence import TransactionActions
|
||||||
|
@ -57,10 +57,12 @@ from synapse.logging.context import (
|
||||||
)
|
)
|
||||||
from synapse.logging.opentracing import log_kv, start_active_span_from_edu, trace
|
from synapse.logging.opentracing import log_kv, start_active_span_from_edu, trace
|
||||||
from synapse.logging.utils import log_function
|
from synapse.logging.utils import log_function
|
||||||
|
from synapse.metrics.background_process_metrics import wrap_as_background_process
|
||||||
from synapse.replication.http.federation import (
|
from synapse.replication.http.federation import (
|
||||||
ReplicationFederationSendEduRestServlet,
|
ReplicationFederationSendEduRestServlet,
|
||||||
ReplicationGetQueryRestServlet,
|
ReplicationGetQueryRestServlet,
|
||||||
)
|
)
|
||||||
|
from synapse.storage.databases.main.lock import Lock
|
||||||
from synapse.types import JsonDict
|
from synapse.types import JsonDict
|
||||||
from synapse.util import glob_to_regex, json_decoder, unwrapFirstError
|
from synapse.util import glob_to_regex, json_decoder, unwrapFirstError
|
||||||
from synapse.util.async_helpers import Linearizer, concurrently_execute
|
from synapse.util.async_helpers import Linearizer, concurrently_execute
|
||||||
|
@ -96,6 +98,11 @@ last_pdu_ts_metric = Gauge(
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
# The name of the lock to use when process events in a room received over
|
||||||
|
# federation.
|
||||||
|
_INBOUND_EVENT_HANDLING_LOCK_NAME = "federation_inbound_pdu"
|
||||||
|
|
||||||
|
|
||||||
class FederationServer(FederationBase):
|
class FederationServer(FederationBase):
|
||||||
def __init__(self, hs: "HomeServer"):
|
def __init__(self, hs: "HomeServer"):
|
||||||
super().__init__(hs)
|
super().__init__(hs)
|
||||||
|
@ -834,7 +841,94 @@ class FederationServer(FederationBase):
|
||||||
except SynapseError as e:
|
except SynapseError as e:
|
||||||
raise FederationError("ERROR", e.code, e.msg, affected=pdu.event_id)
|
raise FederationError("ERROR", e.code, e.msg, affected=pdu.event_id)
|
||||||
|
|
||||||
await self.handler.on_receive_pdu(origin, pdu, sent_to_us_directly=True)
|
# Add the event to our staging area
|
||||||
|
await self.store.insert_received_event_to_staging(origin, pdu)
|
||||||
|
|
||||||
|
# Try and acquire the processing lock for the room, if we get it start a
|
||||||
|
# background process for handling the events in the room.
|
||||||
|
lock = await self.store.try_acquire_lock(
|
||||||
|
_INBOUND_EVENT_HANDLING_LOCK_NAME, pdu.room_id
|
||||||
|
)
|
||||||
|
if lock:
|
||||||
|
self._process_incoming_pdus_in_room_inner(
|
||||||
|
pdu.room_id, room_version, lock, origin, pdu
|
||||||
|
)
|
||||||
|
|
||||||
|
@wrap_as_background_process("_process_incoming_pdus_in_room_inner")
|
||||||
|
async def _process_incoming_pdus_in_room_inner(
|
||||||
|
self,
|
||||||
|
room_id: str,
|
||||||
|
room_version: RoomVersion,
|
||||||
|
lock: Lock,
|
||||||
|
latest_origin: str,
|
||||||
|
latest_event: EventBase,
|
||||||
|
) -> None:
|
||||||
|
"""Process events in the staging area for the given room.
|
||||||
|
|
||||||
|
The latest_origin and latest_event args are the latest origin and event
|
||||||
|
received.
|
||||||
|
"""
|
||||||
|
|
||||||
|
# The common path is for the event we just received be the only event in
|
||||||
|
# the room, so instead of pulling the event out of the DB and parsing
|
||||||
|
# the event we just pull out the next event ID and check if that matches.
|
||||||
|
next_origin, next_event_id = await self.store.get_next_staged_event_id_for_room(
|
||||||
|
room_id
|
||||||
|
)
|
||||||
|
if next_origin == latest_origin and next_event_id == latest_event.event_id:
|
||||||
|
origin = latest_origin
|
||||||
|
event = latest_event
|
||||||
|
else:
|
||||||
|
next = await self.store.get_next_staged_event_for_room(
|
||||||
|
room_id, room_version
|
||||||
|
)
|
||||||
|
if not next:
|
||||||
|
return
|
||||||
|
|
||||||
|
origin, event = next
|
||||||
|
|
||||||
|
# We loop round until there are no more events in the room in the
|
||||||
|
# staging area, or we fail to get the lock (which means another process
|
||||||
|
# has started processing).
|
||||||
|
while True:
|
||||||
|
async with lock:
|
||||||
|
try:
|
||||||
|
await self.handler.on_receive_pdu(
|
||||||
|
origin, event, sent_to_us_directly=True
|
||||||
|
)
|
||||||
|
except FederationError as e:
|
||||||
|
# XXX: Ideally we'd inform the remote we failed to process
|
||||||
|
# the event, but we can't return an error in the transaction
|
||||||
|
# response (as we've already responded).
|
||||||
|
logger.warning("Error handling PDU %s: %s", event.event_id, e)
|
||||||
|
except Exception:
|
||||||
|
f = failure.Failure()
|
||||||
|
logger.error(
|
||||||
|
"Failed to handle PDU %s",
|
||||||
|
event.event_id,
|
||||||
|
exc_info=(f.type, f.value, f.getTracebackObject()), # type: ignore
|
||||||
|
)
|
||||||
|
|
||||||
|
await self.store.remove_received_event_from_staging(
|
||||||
|
origin, event.event_id
|
||||||
|
)
|
||||||
|
|
||||||
|
# We need to do this check outside the lock to avoid a race between
|
||||||
|
# a new event being inserted by another instance and it attempting
|
||||||
|
# to acquire the lock.
|
||||||
|
next = await self.store.get_next_staged_event_for_room(
|
||||||
|
room_id, room_version
|
||||||
|
)
|
||||||
|
if not next:
|
||||||
|
break
|
||||||
|
|
||||||
|
origin, event = next
|
||||||
|
|
||||||
|
lock = await self.store.try_acquire_lock(
|
||||||
|
_INBOUND_EVENT_HANDLING_LOCK_NAME, room_id
|
||||||
|
)
|
||||||
|
if not lock:
|
||||||
|
return
|
||||||
|
|
||||||
def __str__(self) -> str:
|
def __str__(self) -> str:
|
||||||
return "<ReplicationLayer(%s)>" % self.server_name
|
return "<ReplicationLayer(%s)>" % self.server_name
|
||||||
|
|
|
@ -46,6 +46,7 @@ from .events_forward_extremities import EventForwardExtremitiesStore
|
||||||
from .filtering import FilteringStore
|
from .filtering import FilteringStore
|
||||||
from .group_server import GroupServerStore
|
from .group_server import GroupServerStore
|
||||||
from .keys import KeyStore
|
from .keys import KeyStore
|
||||||
|
from .lock import LockStore
|
||||||
from .media_repository import MediaRepositoryStore
|
from .media_repository import MediaRepositoryStore
|
||||||
from .metrics import ServerMetricsStore
|
from .metrics import ServerMetricsStore
|
||||||
from .monthly_active_users import MonthlyActiveUsersStore
|
from .monthly_active_users import MonthlyActiveUsersStore
|
||||||
|
@ -119,6 +120,7 @@ class DataStore(
|
||||||
CacheInvalidationWorkerStore,
|
CacheInvalidationWorkerStore,
|
||||||
ServerMetricsStore,
|
ServerMetricsStore,
|
||||||
EventForwardExtremitiesStore,
|
EventForwardExtremitiesStore,
|
||||||
|
LockStore,
|
||||||
):
|
):
|
||||||
def __init__(self, database: DatabasePool, db_conn, hs):
|
def __init__(self, database: DatabasePool, db_conn, hs):
|
||||||
self.hs = hs
|
self.hs = hs
|
||||||
|
|
|
@ -14,18 +14,20 @@
|
||||||
import itertools
|
import itertools
|
||||||
import logging
|
import logging
|
||||||
from queue import Empty, PriorityQueue
|
from queue import Empty, PriorityQueue
|
||||||
from typing import Collection, Dict, Iterable, List, Set, Tuple
|
from typing import Collection, Dict, Iterable, List, Optional, Set, Tuple
|
||||||
|
|
||||||
from synapse.api.constants import MAX_DEPTH
|
from synapse.api.constants import MAX_DEPTH
|
||||||
from synapse.api.errors import StoreError
|
from synapse.api.errors import StoreError
|
||||||
from synapse.events import EventBase
|
from synapse.api.room_versions import RoomVersion
|
||||||
|
from synapse.events import EventBase, make_event_from_dict
|
||||||
from synapse.metrics.background_process_metrics import wrap_as_background_process
|
from synapse.metrics.background_process_metrics import wrap_as_background_process
|
||||||
from synapse.storage._base import SQLBaseStore, make_in_list_sql_clause
|
from synapse.storage._base import SQLBaseStore, db_to_json, make_in_list_sql_clause
|
||||||
from synapse.storage.database import DatabasePool, LoggingTransaction
|
from synapse.storage.database import DatabasePool, LoggingTransaction
|
||||||
from synapse.storage.databases.main.events_worker import EventsWorkerStore
|
from synapse.storage.databases.main.events_worker import EventsWorkerStore
|
||||||
from synapse.storage.databases.main.signatures import SignatureWorkerStore
|
from synapse.storage.databases.main.signatures import SignatureWorkerStore
|
||||||
from synapse.storage.engines import PostgresEngine
|
from synapse.storage.engines import PostgresEngine
|
||||||
from synapse.storage.types import Cursor
|
from synapse.storage.types import Cursor
|
||||||
|
from synapse.util import json_encoder
|
||||||
from synapse.util.caches.descriptors import cached
|
from synapse.util.caches.descriptors import cached
|
||||||
from synapse.util.caches.lrucache import LruCache
|
from synapse.util.caches.lrucache import LruCache
|
||||||
from synapse.util.iterutils import batch_iter
|
from synapse.util.iterutils import batch_iter
|
||||||
|
@ -1044,6 +1046,107 @@ class EventFederationWorkerStore(EventsWorkerStore, SignatureWorkerStore, SQLBas
|
||||||
_delete_old_forward_extrem_cache_txn,
|
_delete_old_forward_extrem_cache_txn,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
async def insert_received_event_to_staging(
|
||||||
|
self, origin: str, event: EventBase
|
||||||
|
) -> None:
|
||||||
|
"""Insert a newly received event from federation into the staging area."""
|
||||||
|
|
||||||
|
# We use an upsert here to handle the case where we see the same event
|
||||||
|
# from the same server multiple times.
|
||||||
|
await self.db_pool.simple_upsert(
|
||||||
|
table="federation_inbound_events_staging",
|
||||||
|
keyvalues={
|
||||||
|
"origin": origin,
|
||||||
|
"event_id": event.event_id,
|
||||||
|
},
|
||||||
|
values={},
|
||||||
|
insertion_values={
|
||||||
|
"room_id": event.room_id,
|
||||||
|
"received_ts": self._clock.time_msec(),
|
||||||
|
"event_json": json_encoder.encode(event.get_dict()),
|
||||||
|
"internal_metadata": json_encoder.encode(
|
||||||
|
event.internal_metadata.get_dict()
|
||||||
|
),
|
||||||
|
},
|
||||||
|
desc="insert_received_event_to_staging",
|
||||||
|
)
|
||||||
|
|
||||||
|
async def remove_received_event_from_staging(
|
||||||
|
self,
|
||||||
|
origin: str,
|
||||||
|
event_id: str,
|
||||||
|
) -> None:
|
||||||
|
"""Remove the given event from the staging area"""
|
||||||
|
await self.db_pool.simple_delete(
|
||||||
|
table="federation_inbound_events_staging",
|
||||||
|
keyvalues={
|
||||||
|
"origin": origin,
|
||||||
|
"event_id": event_id,
|
||||||
|
},
|
||||||
|
desc="remove_received_event_from_staging",
|
||||||
|
)
|
||||||
|
|
||||||
|
async def get_next_staged_event_id_for_room(
|
||||||
|
self,
|
||||||
|
room_id: str,
|
||||||
|
) -> Optional[Tuple[str, str]]:
|
||||||
|
"""Get the next event ID in the staging area for the given room."""
|
||||||
|
|
||||||
|
def _get_next_staged_event_id_for_room_txn(txn):
|
||||||
|
sql = """
|
||||||
|
SELECT origin, event_id
|
||||||
|
FROM federation_inbound_events_staging
|
||||||
|
WHERE room_id = ?
|
||||||
|
ORDER BY received_ts ASC
|
||||||
|
LIMIT 1
|
||||||
|
"""
|
||||||
|
|
||||||
|
txn.execute(sql, (room_id,))
|
||||||
|
|
||||||
|
return txn.fetchone()
|
||||||
|
|
||||||
|
return await self.db_pool.runInteraction(
|
||||||
|
"get_next_staged_event_id_for_room", _get_next_staged_event_id_for_room_txn
|
||||||
|
)
|
||||||
|
|
||||||
|
async def get_next_staged_event_for_room(
|
||||||
|
self,
|
||||||
|
room_id: str,
|
||||||
|
room_version: RoomVersion,
|
||||||
|
) -> Optional[Tuple[str, EventBase]]:
|
||||||
|
"""Get the next event in the staging area for the given room."""
|
||||||
|
|
||||||
|
def _get_next_staged_event_for_room_txn(txn):
|
||||||
|
sql = """
|
||||||
|
SELECT event_json, internal_metadata, origin
|
||||||
|
FROM federation_inbound_events_staging
|
||||||
|
WHERE room_id = ?
|
||||||
|
ORDER BY received_ts ASC
|
||||||
|
LIMIT 1
|
||||||
|
"""
|
||||||
|
txn.execute(sql, (room_id,))
|
||||||
|
|
||||||
|
return txn.fetchone()
|
||||||
|
|
||||||
|
row = await self.db_pool.runInteraction(
|
||||||
|
"get_next_staged_event_for_room", _get_next_staged_event_for_room_txn
|
||||||
|
)
|
||||||
|
|
||||||
|
if not row:
|
||||||
|
return None
|
||||||
|
|
||||||
|
event_d = db_to_json(row[0])
|
||||||
|
internal_metadata_d = db_to_json(row[1])
|
||||||
|
origin = row[2]
|
||||||
|
|
||||||
|
event = make_event_from_dict(
|
||||||
|
event_dict=event_d,
|
||||||
|
room_version=room_version,
|
||||||
|
internal_metadata_dict=internal_metadata_d,
|
||||||
|
)
|
||||||
|
|
||||||
|
return origin, event
|
||||||
|
|
||||||
|
|
||||||
class EventFederationStore(EventFederationWorkerStore):
|
class EventFederationStore(EventFederationWorkerStore):
|
||||||
"""Responsible for storing and serving up the various graphs associated
|
"""Responsible for storing and serving up the various graphs associated
|
||||||
|
|
334
synapse/storage/databases/main/lock.py
Normal file
334
synapse/storage/databases/main/lock.py
Normal file
|
@ -0,0 +1,334 @@
|
||||||
|
# Copyright 2021 Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
import logging
|
||||||
|
from types import TracebackType
|
||||||
|
from typing import TYPE_CHECKING, Dict, Optional, Tuple, Type
|
||||||
|
|
||||||
|
from twisted.internet.interfaces import IReactorCore
|
||||||
|
|
||||||
|
from synapse.metrics.background_process_metrics import wrap_as_background_process
|
||||||
|
from synapse.storage._base import SQLBaseStore
|
||||||
|
from synapse.storage.database import DatabasePool, LoggingTransaction
|
||||||
|
from synapse.storage.types import Connection
|
||||||
|
from synapse.util import Clock
|
||||||
|
from synapse.util.stringutils import random_string
|
||||||
|
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
from synapse.server import HomeServer
|
||||||
|
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
# How often to renew an acquired lock by updating the `last_renewed_ts` time in
|
||||||
|
# the lock table.
|
||||||
|
_RENEWAL_INTERVAL_MS = 30 * 1000
|
||||||
|
|
||||||
|
# How long before an acquired lock times out.
|
||||||
|
_LOCK_TIMEOUT_MS = 2 * 60 * 1000
|
||||||
|
|
||||||
|
|
||||||
|
class LockStore(SQLBaseStore):
|
||||||
|
"""Provides a best effort distributed lock between worker instances.
|
||||||
|
|
||||||
|
Locks are identified by a name and key. A lock is acquired by inserting into
|
||||||
|
the `worker_locks` table if a) there is no existing row for the name/key or
|
||||||
|
b) the existing row has a `last_renewed_ts` older than `_LOCK_TIMEOUT_MS`.
|
||||||
|
|
||||||
|
When a lock is taken out the instance inserts a random `token`, the instance
|
||||||
|
that holds that token holds the lock until it drops (or times out).
|
||||||
|
|
||||||
|
The instance that holds the lock should regularly update the
|
||||||
|
`last_renewed_ts` column with the current time.
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, database: DatabasePool, db_conn: Connection, hs: "HomeServer"):
|
||||||
|
super().__init__(database, db_conn, hs)
|
||||||
|
|
||||||
|
self._reactor = hs.get_reactor()
|
||||||
|
self._instance_name = hs.get_instance_id()
|
||||||
|
|
||||||
|
# A map from `(lock_name, lock_key)` to the token of any locks that we
|
||||||
|
# think we currently hold.
|
||||||
|
self._live_tokens: Dict[Tuple[str, str], str] = {}
|
||||||
|
|
||||||
|
# When we shut down we want to remove the locks. Technically this can
|
||||||
|
# lead to a race, as we may drop the lock while we are still processing.
|
||||||
|
# However, a) it should be a small window, b) the lock is best effort
|
||||||
|
# anyway and c) we want to really avoid leaking locks when we restart.
|
||||||
|
hs.get_reactor().addSystemEventTrigger(
|
||||||
|
"before",
|
||||||
|
"shutdown",
|
||||||
|
self._on_shutdown,
|
||||||
|
)
|
||||||
|
|
||||||
|
@wrap_as_background_process("LockStore._on_shutdown")
|
||||||
|
async def _on_shutdown(self) -> None:
|
||||||
|
"""Called when the server is shutting down"""
|
||||||
|
logger.info("Dropping held locks due to shutdown")
|
||||||
|
|
||||||
|
for (lock_name, lock_key), token in self._live_tokens.items():
|
||||||
|
await self._drop_lock(lock_name, lock_key, token)
|
||||||
|
|
||||||
|
logger.info("Dropped locks due to shutdown")
|
||||||
|
|
||||||
|
async def try_acquire_lock(self, lock_name: str, lock_key: str) -> Optional["Lock"]:
|
||||||
|
"""Try to acquire a lock for the given name/key. Will return an async
|
||||||
|
context manager if the lock is successfully acquired, which *must* be
|
||||||
|
used (otherwise the lock will leak).
|
||||||
|
"""
|
||||||
|
|
||||||
|
now = self._clock.time_msec()
|
||||||
|
token = random_string(6)
|
||||||
|
|
||||||
|
if self.db_pool.engine.can_native_upsert:
|
||||||
|
|
||||||
|
def _try_acquire_lock_txn(txn: LoggingTransaction) -> bool:
|
||||||
|
# We take out the lock if either a) there is no row for the lock
|
||||||
|
# already or b) the existing row has timed out.
|
||||||
|
sql = """
|
||||||
|
INSERT INTO worker_locks (lock_name, lock_key, instance_name, token, last_renewed_ts)
|
||||||
|
VALUES (?, ?, ?, ?, ?)
|
||||||
|
ON CONFLICT (lock_name, lock_key)
|
||||||
|
DO UPDATE
|
||||||
|
SET
|
||||||
|
token = EXCLUDED.token,
|
||||||
|
instance_name = EXCLUDED.instance_name,
|
||||||
|
last_renewed_ts = EXCLUDED.last_renewed_ts
|
||||||
|
WHERE
|
||||||
|
worker_locks.last_renewed_ts < ?
|
||||||
|
"""
|
||||||
|
txn.execute(
|
||||||
|
sql,
|
||||||
|
(
|
||||||
|
lock_name,
|
||||||
|
lock_key,
|
||||||
|
self._instance_name,
|
||||||
|
token,
|
||||||
|
now,
|
||||||
|
now - _LOCK_TIMEOUT_MS,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
# We only acquired the lock if we inserted or updated the table.
|
||||||
|
return bool(txn.rowcount)
|
||||||
|
|
||||||
|
did_lock = await self.db_pool.runInteraction(
|
||||||
|
"try_acquire_lock",
|
||||||
|
_try_acquire_lock_txn,
|
||||||
|
# We can autocommit here as we're executing a single query, this
|
||||||
|
# will avoid serialization errors.
|
||||||
|
db_autocommit=True,
|
||||||
|
)
|
||||||
|
if not did_lock:
|
||||||
|
return None
|
||||||
|
|
||||||
|
else:
|
||||||
|
# If we're on an old SQLite we emulate the above logic by first
|
||||||
|
# clearing out any existing stale locks and then upserting.
|
||||||
|
|
||||||
|
def _try_acquire_lock_emulated_txn(txn: LoggingTransaction) -> bool:
|
||||||
|
sql = """
|
||||||
|
DELETE FROM worker_locks
|
||||||
|
WHERE
|
||||||
|
lock_name = ?
|
||||||
|
AND lock_key = ?
|
||||||
|
AND last_renewed_ts < ?
|
||||||
|
"""
|
||||||
|
txn.execute(
|
||||||
|
sql,
|
||||||
|
(lock_name, lock_key, now - _LOCK_TIMEOUT_MS),
|
||||||
|
)
|
||||||
|
|
||||||
|
inserted = self.db_pool.simple_upsert_txn_emulated(
|
||||||
|
txn,
|
||||||
|
table="worker_locks",
|
||||||
|
keyvalues={
|
||||||
|
"lock_name": lock_name,
|
||||||
|
"lock_key": lock_key,
|
||||||
|
},
|
||||||
|
values={},
|
||||||
|
insertion_values={
|
||||||
|
"token": token,
|
||||||
|
"last_renewed_ts": self._clock.time_msec(),
|
||||||
|
"instance_name": self._instance_name,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
return inserted
|
||||||
|
|
||||||
|
did_lock = await self.db_pool.runInteraction(
|
||||||
|
"try_acquire_lock_emulated", _try_acquire_lock_emulated_txn
|
||||||
|
)
|
||||||
|
|
||||||
|
if not did_lock:
|
||||||
|
return None
|
||||||
|
|
||||||
|
self._live_tokens[(lock_name, lock_key)] = token
|
||||||
|
|
||||||
|
return Lock(
|
||||||
|
self._reactor,
|
||||||
|
self._clock,
|
||||||
|
self,
|
||||||
|
lock_name=lock_name,
|
||||||
|
lock_key=lock_key,
|
||||||
|
token=token,
|
||||||
|
)
|
||||||
|
|
||||||
|
async def _is_lock_still_valid(
|
||||||
|
self, lock_name: str, lock_key: str, token: str
|
||||||
|
) -> bool:
|
||||||
|
"""Checks whether this instance still holds the lock."""
|
||||||
|
last_renewed_ts = await self.db_pool.simple_select_one_onecol(
|
||||||
|
table="worker_locks",
|
||||||
|
keyvalues={
|
||||||
|
"lock_name": lock_name,
|
||||||
|
"lock_key": lock_key,
|
||||||
|
"token": token,
|
||||||
|
},
|
||||||
|
retcol="last_renewed_ts",
|
||||||
|
allow_none=True,
|
||||||
|
desc="is_lock_still_valid",
|
||||||
|
)
|
||||||
|
return (
|
||||||
|
last_renewed_ts is not None
|
||||||
|
and self._clock.time_msec() - _LOCK_TIMEOUT_MS < last_renewed_ts
|
||||||
|
)
|
||||||
|
|
||||||
|
async def _renew_lock(self, lock_name: str, lock_key: str, token: str) -> None:
|
||||||
|
"""Attempt to renew the lock if we still hold it."""
|
||||||
|
await self.db_pool.simple_update(
|
||||||
|
table="worker_locks",
|
||||||
|
keyvalues={
|
||||||
|
"lock_name": lock_name,
|
||||||
|
"lock_key": lock_key,
|
||||||
|
"token": token,
|
||||||
|
},
|
||||||
|
updatevalues={"last_renewed_ts": self._clock.time_msec()},
|
||||||
|
desc="renew_lock",
|
||||||
|
)
|
||||||
|
|
||||||
|
async def _drop_lock(self, lock_name: str, lock_key: str, token: str) -> None:
|
||||||
|
"""Attempt to drop the lock, if we still hold it"""
|
||||||
|
await self.db_pool.simple_delete(
|
||||||
|
table="worker_locks",
|
||||||
|
keyvalues={
|
||||||
|
"lock_name": lock_name,
|
||||||
|
"lock_key": lock_key,
|
||||||
|
"token": token,
|
||||||
|
},
|
||||||
|
desc="drop_lock",
|
||||||
|
)
|
||||||
|
|
||||||
|
self._live_tokens.pop((lock_name, lock_key), None)
|
||||||
|
|
||||||
|
|
||||||
|
class Lock:
|
||||||
|
"""An async context manager that manages an acquired lock, ensuring it is
|
||||||
|
regularly renewed and dropping it when the context manager exits.
|
||||||
|
|
||||||
|
The lock object has an `is_still_valid` method which can be used to
|
||||||
|
double-check the lock is still valid, if e.g. processing work in a loop.
|
||||||
|
|
||||||
|
For example:
|
||||||
|
|
||||||
|
lock = await self.store.try_acquire_lock(...)
|
||||||
|
if not lock:
|
||||||
|
return
|
||||||
|
|
||||||
|
async with lock:
|
||||||
|
for item in work:
|
||||||
|
await process(item)
|
||||||
|
|
||||||
|
if not await lock.is_still_valid():
|
||||||
|
break
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
reactor: IReactorCore,
|
||||||
|
clock: Clock,
|
||||||
|
store: LockStore,
|
||||||
|
lock_name: str,
|
||||||
|
lock_key: str,
|
||||||
|
token: str,
|
||||||
|
) -> None:
|
||||||
|
self._reactor = reactor
|
||||||
|
self._clock = clock
|
||||||
|
self._store = store
|
||||||
|
self._lock_name = lock_name
|
||||||
|
self._lock_key = lock_key
|
||||||
|
|
||||||
|
self._token = token
|
||||||
|
|
||||||
|
self._looping_call = clock.looping_call(
|
||||||
|
self._renew, _RENEWAL_INTERVAL_MS, store, lock_name, lock_key, token
|
||||||
|
)
|
||||||
|
|
||||||
|
self._dropped = False
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
@wrap_as_background_process("Lock._renew")
|
||||||
|
async def _renew(
|
||||||
|
store: LockStore,
|
||||||
|
lock_name: str,
|
||||||
|
lock_key: str,
|
||||||
|
token: str,
|
||||||
|
) -> None:
|
||||||
|
"""Renew the lock.
|
||||||
|
|
||||||
|
Note: this is a static method, rather than using self.*, so that we
|
||||||
|
don't end up with a reference to `self` in the reactor, which would stop
|
||||||
|
this from being cleaned up if we dropped the context manager.
|
||||||
|
"""
|
||||||
|
await store._renew_lock(lock_name, lock_key, token)
|
||||||
|
|
||||||
|
async def is_still_valid(self) -> bool:
|
||||||
|
"""Check if the lock is still held by us"""
|
||||||
|
return await self._store._is_lock_still_valid(
|
||||||
|
self._lock_name, self._lock_key, self._token
|
||||||
|
)
|
||||||
|
|
||||||
|
async def __aenter__(self) -> None:
|
||||||
|
if self._dropped:
|
||||||
|
raise Exception("Cannot reuse a Lock object")
|
||||||
|
|
||||||
|
async def __aexit__(
|
||||||
|
self,
|
||||||
|
_exctype: Optional[Type[BaseException]],
|
||||||
|
_excinst: Optional[BaseException],
|
||||||
|
_exctb: Optional[TracebackType],
|
||||||
|
) -> bool:
|
||||||
|
if self._looping_call.running:
|
||||||
|
self._looping_call.stop()
|
||||||
|
|
||||||
|
await self._store._drop_lock(self._lock_name, self._lock_key, self._token)
|
||||||
|
self._dropped = True
|
||||||
|
|
||||||
|
return False
|
||||||
|
|
||||||
|
def __del__(self) -> None:
|
||||||
|
if not self._dropped:
|
||||||
|
# We should not be dropped without the lock being released (unless
|
||||||
|
# we're shutting down), but if we are then let's at least stop
|
||||||
|
# renewing the lock.
|
||||||
|
if self._looping_call.running:
|
||||||
|
self._looping_call.stop()
|
||||||
|
|
||||||
|
if self._reactor.running:
|
||||||
|
logger.error(
|
||||||
|
"Lock for (%s, %s) dropped without being released",
|
||||||
|
self._lock_name,
|
||||||
|
self._lock_key,
|
||||||
|
)
|
37
synapse/storage/schema/main/delta/59/15locks.sql
Normal file
37
synapse/storage/schema/main/delta/59/15locks.sql
Normal file
|
@ -0,0 +1,37 @@
|
||||||
|
/* Copyright 2021 The Matrix.org Foundation C.I.C
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
-- A noddy implementation of a distributed lock across workers. While a worker
|
||||||
|
-- has taken a lock out they should regularly update the `last_renewed_ts`
|
||||||
|
-- column, a lock will be considered dropped if `last_renewed_ts` is from ages
|
||||||
|
-- ago.
|
||||||
|
CREATE TABLE worker_locks (
|
||||||
|
lock_name TEXT NOT NULL,
|
||||||
|
lock_key TEXT NOT NULL,
|
||||||
|
-- We write the instance name to ease manual debugging, we don't ever read
|
||||||
|
-- from it.
|
||||||
|
-- Note: instance names aren't guarenteed to be unique.
|
||||||
|
instance_name TEXT NOT NULL,
|
||||||
|
-- A random string generated each time an instance takes out a lock. Used by
|
||||||
|
-- the instance to tell whether the lock is still held by it (e.g. in the
|
||||||
|
-- case where the process stalls for a long time the lock may time out and
|
||||||
|
-- be taken out by another instance, at which point the original instance
|
||||||
|
-- can tell it no longer holds the lock as the tokens no longer match).
|
||||||
|
token TEXT NOT NULL,
|
||||||
|
last_renewed_ts BIGINT NOT NULL
|
||||||
|
);
|
||||||
|
|
||||||
|
CREATE UNIQUE INDEX worker_locks_key ON worker_locks (lock_name, lock_key);
|
|
@ -0,0 +1,32 @@
|
||||||
|
/* Copyright 2021 The Matrix.org Foundation C.I.C
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
-- A staging area for newly received events over federation.
|
||||||
|
--
|
||||||
|
-- Note we may store the same event multiple times if it comes from different
|
||||||
|
-- servers; this is to handle the case if we get a redacted and non-redacted
|
||||||
|
-- versions of the event.
|
||||||
|
CREATE TABLE federation_inbound_events_staging (
|
||||||
|
origin TEXT NOT NULL,
|
||||||
|
room_id TEXT NOT NULL,
|
||||||
|
event_id TEXT NOT NULL,
|
||||||
|
received_ts BIGINT NOT NULL,
|
||||||
|
event_json TEXT NOT NULL,
|
||||||
|
internal_metadata TEXT NOT NULL
|
||||||
|
);
|
||||||
|
|
||||||
|
CREATE INDEX federation_inbound_events_staging_room ON federation_inbound_events_staging(room_id, received_ts);
|
||||||
|
CREATE UNIQUE INDEX federation_inbound_events_staging_instance_event ON federation_inbound_events_staging(origin, event_id);
|
|
@ -41,3 +41,9 @@ We can't peek into rooms with invited history_visibility
|
||||||
We can't peek into rooms with joined history_visibility
|
We can't peek into rooms with joined history_visibility
|
||||||
Local users can peek by room alias
|
Local users can peek by room alias
|
||||||
Peeked rooms only turn up in the sync for the device who peeked them
|
Peeked rooms only turn up in the sync for the device who peeked them
|
||||||
|
|
||||||
|
|
||||||
|
# Blacklisted due to changes made in #10272
|
||||||
|
Outbound federation will ignore a missing event with bad JSON for room version 6
|
||||||
|
Backfilled events whose prev_events are in a different room do not allow cross-room back-pagination
|
||||||
|
Federation rejects inbound events where the prev_events cannot be found
|
||||||
|
|
100
tests/storage/databases/main/test_lock.py
Normal file
100
tests/storage/databases/main/test_lock.py
Normal file
|
@ -0,0 +1,100 @@
|
||||||
|
# Copyright 2021 The Matrix.org Foundation C.I.C.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from synapse.server import HomeServer
|
||||||
|
from synapse.storage.databases.main.lock import _LOCK_TIMEOUT_MS
|
||||||
|
|
||||||
|
from tests import unittest
|
||||||
|
|
||||||
|
|
||||||
|
class LockTestCase(unittest.HomeserverTestCase):
|
||||||
|
def prepare(self, reactor, clock, hs: HomeServer):
|
||||||
|
self.store = hs.get_datastore()
|
||||||
|
|
||||||
|
def test_simple_lock(self):
|
||||||
|
"""Test that we can take out a lock and that while we hold it nobody
|
||||||
|
else can take it out.
|
||||||
|
"""
|
||||||
|
# First to acquire this lock, so it should complete
|
||||||
|
lock = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock)
|
||||||
|
|
||||||
|
# Enter the context manager
|
||||||
|
self.get_success(lock.__aenter__())
|
||||||
|
|
||||||
|
# Attempting to acquire the lock again fails.
|
||||||
|
lock2 = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNone(lock2)
|
||||||
|
|
||||||
|
# Calling `is_still_valid` reports true.
|
||||||
|
self.assertTrue(self.get_success(lock.is_still_valid()))
|
||||||
|
|
||||||
|
# Drop the lock
|
||||||
|
self.get_success(lock.__aexit__(None, None, None))
|
||||||
|
|
||||||
|
# We can now acquire the lock again.
|
||||||
|
lock3 = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock3)
|
||||||
|
self.get_success(lock3.__aenter__())
|
||||||
|
self.get_success(lock3.__aexit__(None, None, None))
|
||||||
|
|
||||||
|
def test_maintain_lock(self):
|
||||||
|
"""Test that we don't time out locks while they're still active"""
|
||||||
|
|
||||||
|
lock = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock)
|
||||||
|
|
||||||
|
self.get_success(lock.__aenter__())
|
||||||
|
|
||||||
|
# Wait for ages with the lock, we should not be able to get the lock.
|
||||||
|
self.reactor.advance(5 * _LOCK_TIMEOUT_MS / 1000)
|
||||||
|
|
||||||
|
lock2 = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNone(lock2)
|
||||||
|
|
||||||
|
self.get_success(lock.__aexit__(None, None, None))
|
||||||
|
|
||||||
|
def test_timeout_lock(self):
|
||||||
|
"""Test that we time out locks if they're not updated for ages"""
|
||||||
|
|
||||||
|
lock = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock)
|
||||||
|
|
||||||
|
self.get_success(lock.__aenter__())
|
||||||
|
|
||||||
|
# We simulate the process getting stuck by cancelling the looping call
|
||||||
|
# that keeps the lock active.
|
||||||
|
lock._looping_call.stop()
|
||||||
|
|
||||||
|
# Wait for the lock to timeout.
|
||||||
|
self.reactor.advance(2 * _LOCK_TIMEOUT_MS / 1000)
|
||||||
|
|
||||||
|
lock2 = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock2)
|
||||||
|
|
||||||
|
self.assertFalse(self.get_success(lock.is_still_valid()))
|
||||||
|
|
||||||
|
def test_drop(self):
|
||||||
|
"""Test that dropping the context manager means we stop renewing the lock"""
|
||||||
|
|
||||||
|
lock = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock)
|
||||||
|
|
||||||
|
del lock
|
||||||
|
|
||||||
|
# Wait for the lock to timeout.
|
||||||
|
self.reactor.advance(2 * _LOCK_TIMEOUT_MS / 1000)
|
||||||
|
|
||||||
|
lock2 = self.get_success(self.store.try_acquire_lock("name", "key"))
|
||||||
|
self.assertIsNotNone(lock2)
|
Loading…
Reference in a new issue