message.py 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2014 - 2016 OpenMarket Ltd
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. from twisted.internet import defer
  16. from synapse.api.constants import EventTypes, Membership
  17. from synapse.api.errors import AuthError, Codes, SynapseError, LimitExceededError
  18. from synapse.crypto.event_signing import add_hashes_and_signatures
  19. from synapse.events.utils import serialize_event
  20. from synapse.events.validator import EventValidator
  21. from synapse.push.action_generator import ActionGenerator
  22. from synapse.types import (
  23. UserID, RoomAlias, RoomStreamToken, get_domain_from_id
  24. )
  25. from synapse.util.async import run_on_reactor, ReadWriteLock, Limiter
  26. from synapse.util.logcontext import preserve_fn
  27. from synapse.util.metrics import measure_func
  28. from synapse.visibility import filter_events_for_client
  29. from ._base import BaseHandler
  30. from canonicaljson import encode_canonical_json
  31. import logging
  32. import random
  33. logger = logging.getLogger(__name__)
  34. class MessageHandler(BaseHandler):
  35. def __init__(self, hs):
  36. super(MessageHandler, self).__init__(hs)
  37. self.hs = hs
  38. self.state = hs.get_state_handler()
  39. self.clock = hs.get_clock()
  40. self.validator = EventValidator()
  41. self.pagination_lock = ReadWriteLock()
  42. # We arbitrarily limit concurrent event creation for a room to 5.
  43. # This is to stop us from diverging history *too* much.
  44. self.limiter = Limiter(max_count=5)
  45. @defer.inlineCallbacks
  46. def purge_history(self, room_id, event_id):
  47. event = yield self.store.get_event(event_id)
  48. if event.room_id != room_id:
  49. raise SynapseError(400, "Event is for wrong room.")
  50. depth = event.depth
  51. with (yield self.pagination_lock.write(room_id)):
  52. yield self.store.delete_old_state(room_id, depth)
  53. @defer.inlineCallbacks
  54. def get_messages(self, requester, room_id=None, pagin_config=None,
  55. as_client_event=True, event_filter=None):
  56. """Get messages in a room.
  57. Args:
  58. requester (Requester): The user requesting messages.
  59. room_id (str): The room they want messages from.
  60. pagin_config (synapse.api.streams.PaginationConfig): The pagination
  61. config rules to apply, if any.
  62. as_client_event (bool): True to get events in client-server format.
  63. event_filter (Filter): Filter to apply to results or None
  64. Returns:
  65. dict: Pagination API results
  66. """
  67. user_id = requester.user.to_string()
  68. if pagin_config.from_token:
  69. room_token = pagin_config.from_token.room_key
  70. else:
  71. pagin_config.from_token = (
  72. yield self.hs.get_event_sources().get_current_token_for_room(
  73. room_id=room_id
  74. )
  75. )
  76. room_token = pagin_config.from_token.room_key
  77. room_token = RoomStreamToken.parse(room_token)
  78. pagin_config.from_token = pagin_config.from_token.copy_and_replace(
  79. "room_key", str(room_token)
  80. )
  81. source_config = pagin_config.get_source_config("room")
  82. with (yield self.pagination_lock.read(room_id)):
  83. membership, member_event_id = yield self._check_in_room_or_world_readable(
  84. room_id, user_id
  85. )
  86. if source_config.direction == 'b':
  87. # if we're going backwards, we might need to backfill. This
  88. # requires that we have a topo token.
  89. if room_token.topological:
  90. max_topo = room_token.topological
  91. else:
  92. max_topo = yield self.store.get_max_topological_token(
  93. room_id, room_token.stream
  94. )
  95. if membership == Membership.LEAVE:
  96. # If they have left the room then clamp the token to be before
  97. # they left the room, to save the effort of loading from the
  98. # database.
  99. leave_token = yield self.store.get_topological_token_for_event(
  100. member_event_id
  101. )
  102. leave_token = RoomStreamToken.parse(leave_token)
  103. if leave_token.topological < max_topo:
  104. source_config.from_key = str(leave_token)
  105. yield self.hs.get_handlers().federation_handler.maybe_backfill(
  106. room_id, max_topo
  107. )
  108. events, next_key = yield self.store.paginate_room_events(
  109. room_id=room_id,
  110. from_key=source_config.from_key,
  111. to_key=source_config.to_key,
  112. direction=source_config.direction,
  113. limit=source_config.limit,
  114. event_filter=event_filter,
  115. )
  116. next_token = pagin_config.from_token.copy_and_replace(
  117. "room_key", next_key
  118. )
  119. if not events:
  120. defer.returnValue({
  121. "chunk": [],
  122. "start": pagin_config.from_token.to_string(),
  123. "end": next_token.to_string(),
  124. })
  125. if event_filter:
  126. events = event_filter.filter(events)
  127. events = yield filter_events_for_client(
  128. self.store,
  129. user_id,
  130. events,
  131. is_peeking=(member_event_id is None),
  132. )
  133. time_now = self.clock.time_msec()
  134. chunk = {
  135. "chunk": [
  136. serialize_event(e, time_now, as_client_event)
  137. for e in events
  138. ],
  139. "start": pagin_config.from_token.to_string(),
  140. "end": next_token.to_string(),
  141. }
  142. defer.returnValue(chunk)
  143. @defer.inlineCallbacks
  144. def create_event(self, event_dict, token_id=None, txn_id=None, prev_event_ids=None):
  145. """
  146. Given a dict from a client, create a new event.
  147. Creates an FrozenEvent object, filling out auth_events, prev_events,
  148. etc.
  149. Adds display names to Join membership events.
  150. Args:
  151. event_dict (dict): An entire event
  152. token_id (str)
  153. txn_id (str)
  154. prev_event_ids (list): The prev event ids to use when creating the event
  155. Returns:
  156. Tuple of created event (FrozenEvent), Context
  157. """
  158. builder = self.event_builder_factory.new(event_dict)
  159. with (yield self.limiter.queue(builder.room_id)):
  160. self.validator.validate_new(builder)
  161. if builder.type == EventTypes.Member:
  162. membership = builder.content.get("membership", None)
  163. target = UserID.from_string(builder.state_key)
  164. if membership in {Membership.JOIN, Membership.INVITE}:
  165. # If event doesn't include a display name, add one.
  166. profile = self.hs.get_handlers().profile_handler
  167. content = builder.content
  168. try:
  169. content["displayname"] = yield profile.get_displayname(target)
  170. content["avatar_url"] = yield profile.get_avatar_url(target)
  171. except Exception as e:
  172. logger.info(
  173. "Failed to get profile information for %r: %s",
  174. target, e
  175. )
  176. if token_id is not None:
  177. builder.internal_metadata.token_id = token_id
  178. if txn_id is not None:
  179. builder.internal_metadata.txn_id = txn_id
  180. event, context = yield self._create_new_client_event(
  181. builder=builder,
  182. prev_event_ids=prev_event_ids,
  183. )
  184. defer.returnValue((event, context))
  185. @defer.inlineCallbacks
  186. def send_nonmember_event(self, requester, event, context, ratelimit=True):
  187. """
  188. Persists and notifies local clients and federation of an event.
  189. Args:
  190. event (FrozenEvent) the event to send.
  191. context (Context) the context of the event.
  192. ratelimit (bool): Whether to rate limit this send.
  193. is_guest (bool): Whether the sender is a guest.
  194. """
  195. if event.type == EventTypes.Member:
  196. raise SynapseError(
  197. 500,
  198. "Tried to send member event through non-member codepath"
  199. )
  200. # We check here if we are currently being rate limited, so that we
  201. # don't do unnecessary work. We check again just before we actually
  202. # send the event.
  203. time_now = self.clock.time()
  204. allowed, time_allowed = self.ratelimiter.send_message(
  205. event.sender, time_now,
  206. msg_rate_hz=self.hs.config.rc_messages_per_second,
  207. burst_count=self.hs.config.rc_message_burst_count,
  208. update=False,
  209. )
  210. if not allowed:
  211. raise LimitExceededError(
  212. retry_after_ms=int(1000 * (time_allowed - time_now)),
  213. )
  214. user = UserID.from_string(event.sender)
  215. assert self.hs.is_mine(user), "User must be our own: %s" % (user,)
  216. if event.is_state():
  217. prev_state = yield self.deduplicate_state_event(event, context)
  218. if prev_state is not None:
  219. defer.returnValue(prev_state)
  220. yield self.handle_new_client_event(
  221. requester=requester,
  222. event=event,
  223. context=context,
  224. ratelimit=ratelimit,
  225. )
  226. if event.type == EventTypes.Message:
  227. presence = self.hs.get_presence_handler()
  228. yield presence.bump_presence_active_time(user)
  229. @defer.inlineCallbacks
  230. def deduplicate_state_event(self, event, context):
  231. """
  232. Checks whether event is in the latest resolved state in context.
  233. If so, returns the version of the event in context.
  234. Otherwise, returns None.
  235. """
  236. prev_event_id = context.prev_state_ids.get((event.type, event.state_key))
  237. prev_event = yield self.store.get_event(prev_event_id, allow_none=True)
  238. if not prev_event:
  239. return
  240. if prev_event and event.user_id == prev_event.user_id:
  241. prev_content = encode_canonical_json(prev_event.content)
  242. next_content = encode_canonical_json(event.content)
  243. if prev_content == next_content:
  244. defer.returnValue(prev_event)
  245. return
  246. @defer.inlineCallbacks
  247. def create_and_send_nonmember_event(
  248. self,
  249. requester,
  250. event_dict,
  251. ratelimit=True,
  252. txn_id=None
  253. ):
  254. """
  255. Creates an event, then sends it.
  256. See self.create_event and self.send_nonmember_event.
  257. """
  258. event, context = yield self.create_event(
  259. event_dict,
  260. token_id=requester.access_token_id,
  261. txn_id=txn_id
  262. )
  263. yield self.send_nonmember_event(
  264. requester,
  265. event,
  266. context,
  267. ratelimit=ratelimit,
  268. )
  269. defer.returnValue(event)
  270. @defer.inlineCallbacks
  271. def get_room_data(self, user_id=None, room_id=None,
  272. event_type=None, state_key="", is_guest=False):
  273. """ Get data from a room.
  274. Args:
  275. event : The room path event
  276. Returns:
  277. The path data content.
  278. Raises:
  279. SynapseError if something went wrong.
  280. """
  281. membership, membership_event_id = yield self._check_in_room_or_world_readable(
  282. room_id, user_id
  283. )
  284. if membership == Membership.JOIN:
  285. data = yield self.state_handler.get_current_state(
  286. room_id, event_type, state_key
  287. )
  288. elif membership == Membership.LEAVE:
  289. key = (event_type, state_key)
  290. room_state = yield self.store.get_state_for_events(
  291. [membership_event_id], [key]
  292. )
  293. data = room_state[membership_event_id].get(key)
  294. defer.returnValue(data)
  295. @defer.inlineCallbacks
  296. def _check_in_room_or_world_readable(self, room_id, user_id):
  297. try:
  298. # check_user_was_in_room will return the most recent membership
  299. # event for the user if:
  300. # * The user is a non-guest user, and was ever in the room
  301. # * The user is a guest user, and has joined the room
  302. # else it will throw.
  303. member_event = yield self.auth.check_user_was_in_room(room_id, user_id)
  304. defer.returnValue((member_event.membership, member_event.event_id))
  305. return
  306. except AuthError:
  307. visibility = yield self.state_handler.get_current_state(
  308. room_id, EventTypes.RoomHistoryVisibility, ""
  309. )
  310. if (
  311. visibility and
  312. visibility.content["history_visibility"] == "world_readable"
  313. ):
  314. defer.returnValue((Membership.JOIN, None))
  315. return
  316. raise AuthError(
  317. 403, "Guest access not allowed", errcode=Codes.GUEST_ACCESS_FORBIDDEN
  318. )
  319. @defer.inlineCallbacks
  320. def get_state_events(self, user_id, room_id, is_guest=False):
  321. """Retrieve all state events for a given room. If the user is
  322. joined to the room then return the current state. If the user has
  323. left the room return the state events from when they left.
  324. Args:
  325. user_id(str): The user requesting state events.
  326. room_id(str): The room ID to get all state events from.
  327. Returns:
  328. A list of dicts representing state events. [{}, {}, {}]
  329. """
  330. membership, membership_event_id = yield self._check_in_room_or_world_readable(
  331. room_id, user_id
  332. )
  333. if membership == Membership.JOIN:
  334. room_state = yield self.state_handler.get_current_state(room_id)
  335. elif membership == Membership.LEAVE:
  336. room_state = yield self.store.get_state_for_events(
  337. [membership_event_id], None
  338. )
  339. room_state = room_state[membership_event_id]
  340. now = self.clock.time_msec()
  341. defer.returnValue(
  342. [serialize_event(c, now) for c in room_state.values()]
  343. )
  344. @measure_func("_create_new_client_event")
  345. @defer.inlineCallbacks
  346. def _create_new_client_event(self, builder, prev_event_ids=None):
  347. if prev_event_ids:
  348. prev_events = yield self.store.add_event_hashes(prev_event_ids)
  349. prev_max_depth = yield self.store.get_max_depth_of_events(prev_event_ids)
  350. depth = prev_max_depth + 1
  351. else:
  352. latest_ret = yield self.store.get_latest_event_ids_and_hashes_in_room(
  353. builder.room_id,
  354. )
  355. # We want to limit the max number of prev events we point to in our
  356. # new event
  357. if len(latest_ret) > 10:
  358. # Sort by reverse depth, so we point to the most recent.
  359. latest_ret.sort(key=lambda a: -a[2])
  360. new_latest_ret = latest_ret[:5]
  361. # We also randomly point to some of the older events, to make
  362. # sure that we don't completely ignore the older events.
  363. if latest_ret[5:]:
  364. sample_size = min(5, len(latest_ret[5:]))
  365. new_latest_ret.extend(random.sample(latest_ret[5:], sample_size))
  366. latest_ret = new_latest_ret
  367. if latest_ret:
  368. depth = max([d for _, _, d in latest_ret]) + 1
  369. else:
  370. depth = 1
  371. prev_events = [
  372. (event_id, prev_hashes)
  373. for event_id, prev_hashes, _ in latest_ret
  374. ]
  375. builder.prev_events = prev_events
  376. builder.depth = depth
  377. state_handler = self.state_handler
  378. context = yield state_handler.compute_event_context(builder)
  379. if builder.is_state():
  380. builder.prev_state = yield self.store.add_event_hashes(
  381. context.prev_state_events
  382. )
  383. yield self.auth.add_auth_events(builder, context)
  384. signing_key = self.hs.config.signing_key[0]
  385. add_hashes_and_signatures(
  386. builder, self.server_name, signing_key
  387. )
  388. event = builder.build()
  389. logger.debug(
  390. "Created event %s with state: %s",
  391. event.event_id, context.prev_state_ids,
  392. )
  393. defer.returnValue(
  394. (event, context,)
  395. )
  396. @measure_func("handle_new_client_event")
  397. @defer.inlineCallbacks
  398. def handle_new_client_event(
  399. self,
  400. requester,
  401. event,
  402. context,
  403. ratelimit=True,
  404. extra_users=[]
  405. ):
  406. # We now need to go and hit out to wherever we need to hit out to.
  407. if ratelimit:
  408. self.ratelimit(requester)
  409. try:
  410. yield self.auth.check_from_context(event, context)
  411. except AuthError as err:
  412. logger.warn("Denying new event %r because %s", event, err)
  413. raise err
  414. yield self.maybe_kick_guest_users(event, context)
  415. if event.type == EventTypes.CanonicalAlias:
  416. # Check the alias is acually valid (at this time at least)
  417. room_alias_str = event.content.get("alias", None)
  418. if room_alias_str:
  419. room_alias = RoomAlias.from_string(room_alias_str)
  420. directory_handler = self.hs.get_handlers().directory_handler
  421. mapping = yield directory_handler.get_association(room_alias)
  422. if mapping["room_id"] != event.room_id:
  423. raise SynapseError(
  424. 400,
  425. "Room alias %s does not point to the room" % (
  426. room_alias_str,
  427. )
  428. )
  429. federation_handler = self.hs.get_handlers().federation_handler
  430. if event.type == EventTypes.Member:
  431. if event.content["membership"] == Membership.INVITE:
  432. def is_inviter_member_event(e):
  433. return (
  434. e.type == EventTypes.Member and
  435. e.sender == event.sender
  436. )
  437. state_to_include_ids = [
  438. e_id
  439. for k, e_id in context.current_state_ids.items()
  440. if k[0] in self.hs.config.room_invite_state_types
  441. or k[0] == EventTypes.Member and k[1] == event.sender
  442. ]
  443. state_to_include = yield self.store.get_events(state_to_include_ids)
  444. event.unsigned["invite_room_state"] = [
  445. {
  446. "type": e.type,
  447. "state_key": e.state_key,
  448. "content": e.content,
  449. "sender": e.sender,
  450. }
  451. for e in state_to_include.values()
  452. ]
  453. invitee = UserID.from_string(event.state_key)
  454. if not self.hs.is_mine(invitee):
  455. # TODO: Can we add signature from remote server in a nicer
  456. # way? If we have been invited by a remote server, we need
  457. # to get them to sign the event.
  458. returned_invite = yield federation_handler.send_invite(
  459. invitee.domain,
  460. event,
  461. )
  462. event.unsigned.pop("room_state", None)
  463. # TODO: Make sure the signatures actually are correct.
  464. event.signatures.update(
  465. returned_invite.signatures
  466. )
  467. if event.type == EventTypes.Redaction:
  468. auth_events_ids = yield self.auth.compute_auth_events(
  469. event, context.prev_state_ids, for_verification=True,
  470. )
  471. auth_events = yield self.store.get_events(auth_events_ids)
  472. auth_events = {
  473. (e.type, e.state_key): e for e in auth_events.values()
  474. }
  475. if self.auth.check_redaction(event, auth_events=auth_events):
  476. original_event = yield self.store.get_event(
  477. event.redacts,
  478. check_redacted=False,
  479. get_prev_content=False,
  480. allow_rejected=False,
  481. allow_none=False
  482. )
  483. if event.user_id != original_event.user_id:
  484. raise AuthError(
  485. 403,
  486. "You don't have permission to redact events"
  487. )
  488. if event.type == EventTypes.Create and context.prev_state_ids:
  489. raise AuthError(
  490. 403,
  491. "Changing the room create event is forbidden",
  492. )
  493. action_generator = ActionGenerator(self.hs)
  494. yield action_generator.handle_push_actions_for_event(
  495. event, context
  496. )
  497. (event_stream_id, max_stream_id) = yield self.store.persist_event(
  498. event, context=context
  499. )
  500. # this intentionally does not yield: we don't care about the result
  501. # and don't need to wait for it.
  502. preserve_fn(self.hs.get_pusherpool().on_new_notifications)(
  503. event_stream_id, max_stream_id
  504. )
  505. users_in_room = yield self.store.get_joined_users_from_context(event, context)
  506. destinations = [
  507. get_domain_from_id(user_id) for user_id in users_in_room
  508. if not self.hs.is_mine_id(user_id)
  509. ]
  510. @defer.inlineCallbacks
  511. def _notify():
  512. yield run_on_reactor()
  513. yield self.notifier.on_new_room_event(
  514. event, event_stream_id, max_stream_id,
  515. extra_users=extra_users
  516. )
  517. preserve_fn(_notify)()
  518. # If invite, remove room_state from unsigned before sending.
  519. event.unsigned.pop("invite_room_state", None)
  520. preserve_fn(federation_handler.handle_new_event)(
  521. event, destinations=destinations,
  522. )