v1.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369
  1. # Copyright 2018 New Vector Ltd
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14. import hashlib
  15. import logging
  16. from typing import (
  17. Awaitable,
  18. Callable,
  19. Collection,
  20. Dict,
  21. Iterable,
  22. List,
  23. Optional,
  24. Sequence,
  25. Set,
  26. Tuple,
  27. )
  28. from synapse import event_auth
  29. from synapse.api.constants import EventTypes
  30. from synapse.api.errors import AuthError
  31. from synapse.api.room_versions import RoomVersion
  32. from synapse.events import EventBase
  33. from synapse.types import MutableStateMap, StateMap
  34. logger = logging.getLogger(__name__)
  35. POWER_KEY = (EventTypes.PowerLevels, "")
  36. async def resolve_events_with_store(
  37. room_id: str,
  38. room_version: RoomVersion,
  39. state_sets: Sequence[StateMap[str]],
  40. event_map: Optional[Dict[str, EventBase]],
  41. state_map_factory: Callable[[Collection[str]], Awaitable[Dict[str, EventBase]]],
  42. ) -> StateMap[str]:
  43. """
  44. Args:
  45. room_id: the room we are working in
  46. state_sets: List of dicts of (type, state_key) -> event_id,
  47. which are the different state groups to resolve.
  48. event_map:
  49. a dict from event_id to event, for any events that we happen to
  50. have in flight (eg, those currently being persisted). This will be
  51. used as a starting point for finding the state we need; any missing
  52. events will be requested via state_map_factory.
  53. If None, all events will be fetched via state_map_factory.
  54. state_map_factory: will be called
  55. with a list of event_ids that are needed, and should return with
  56. an Awaitable that resolves to a dict of event_id to event.
  57. Returns:
  58. A map from (type, state_key) to event_id.
  59. """
  60. if len(state_sets) == 1:
  61. return state_sets[0]
  62. unconflicted_state, conflicted_state = _seperate(state_sets)
  63. needed_events = {
  64. event_id for event_ids in conflicted_state.values() for event_id in event_ids
  65. }
  66. needed_event_count = len(needed_events)
  67. if event_map is not None:
  68. needed_events -= set(event_map.keys())
  69. logger.info(
  70. "Asking for %d/%d conflicted events", len(needed_events), needed_event_count
  71. )
  72. # A map from state event id to event. Only includes the state events which
  73. # are in conflict (and those in event_map).
  74. state_map = await state_map_factory(needed_events)
  75. if event_map is not None:
  76. state_map.update(event_map)
  77. # everything in the state map should be in the right room
  78. for event in state_map.values():
  79. if event.room_id != room_id:
  80. raise Exception(
  81. "Attempting to state-resolve for room %s with event %s which is in %s"
  82. % (
  83. room_id,
  84. event.event_id,
  85. event.room_id,
  86. )
  87. )
  88. # get the ids of the auth events which allow us to authenticate the
  89. # conflicted state, picking only from the unconflicting state.
  90. auth_events = _create_auth_events_from_maps(
  91. room_version, unconflicted_state, conflicted_state, state_map
  92. )
  93. new_needed_events = set(auth_events.values())
  94. new_needed_event_count = len(new_needed_events)
  95. new_needed_events -= needed_events
  96. if event_map is not None:
  97. new_needed_events -= set(event_map.keys())
  98. logger.info(
  99. "Asking for %d/%d auth events", len(new_needed_events), new_needed_event_count
  100. )
  101. state_map_new = await state_map_factory(new_needed_events)
  102. for event in state_map_new.values():
  103. if event.room_id != room_id:
  104. raise Exception(
  105. "Attempting to state-resolve for room %s with event %s which is in %s"
  106. % (
  107. room_id,
  108. event.event_id,
  109. event.room_id,
  110. )
  111. )
  112. state_map.update(state_map_new)
  113. return _resolve_with_state(
  114. room_version, unconflicted_state, conflicted_state, auth_events, state_map
  115. )
  116. def _seperate(
  117. state_sets: Iterable[StateMap[str]],
  118. ) -> Tuple[MutableStateMap[str], MutableStateMap[Set[str]]]:
  119. """Takes the state_sets and figures out which keys are conflicted and
  120. which aren't. i.e., which have multiple different event_ids associated
  121. with them in different state sets.
  122. Args:
  123. state_sets:
  124. List of dicts of (type, state_key) -> event_id, which are the
  125. different state groups to resolve.
  126. Returns:
  127. A tuple of (unconflicted_state, conflicted_state), where:
  128. unconflicted_state is a dict mapping (type, state_key)->event_id
  129. for unconflicted state keys.
  130. conflicted_state is a dict mapping (type, state_key) to a set of
  131. event ids for conflicted state keys.
  132. """
  133. state_set_iterator = iter(state_sets)
  134. unconflicted_state = dict(next(state_set_iterator))
  135. conflicted_state: MutableStateMap[Set[str]] = {}
  136. for state_set in state_set_iterator:
  137. for key, value in state_set.items():
  138. # Check if there is an unconflicted entry for the state key.
  139. unconflicted_value = unconflicted_state.get(key)
  140. if unconflicted_value is None:
  141. # There isn't an unconflicted entry so check if there is a
  142. # conflicted entry.
  143. ls = conflicted_state.get(key)
  144. if ls is None:
  145. # There wasn't a conflicted entry so haven't seen this key before.
  146. # Therefore it isn't conflicted yet.
  147. unconflicted_state[key] = value
  148. else:
  149. # This key is already conflicted, add our value to the conflict set.
  150. ls.add(value)
  151. elif unconflicted_value != value:
  152. # If the unconflicted value is not the same as our value then we
  153. # have a new conflict. So move the key from the unconflicted_state
  154. # to the conflicted state.
  155. conflicted_state[key] = {value, unconflicted_value}
  156. unconflicted_state.pop(key, None)
  157. return unconflicted_state, conflicted_state
  158. def _create_auth_events_from_maps(
  159. room_version: RoomVersion,
  160. unconflicted_state: StateMap[str],
  161. conflicted_state: StateMap[Set[str]],
  162. state_map: Dict[str, EventBase],
  163. ) -> StateMap[str]:
  164. """
  165. Args:
  166. room_version: The room version.
  167. unconflicted_state: The unconflicted state map.
  168. conflicted_state: The conflicted state map.
  169. state_map:
  170. Returns:
  171. A map from state key to event id.
  172. """
  173. auth_events = {}
  174. for event_ids in conflicted_state.values():
  175. for event_id in event_ids:
  176. if event_id in state_map:
  177. keys = event_auth.auth_types_for_event(
  178. room_version, state_map[event_id]
  179. )
  180. for key in keys:
  181. if key not in auth_events:
  182. auth_event_id = unconflicted_state.get(key, None)
  183. if auth_event_id:
  184. auth_events[key] = auth_event_id
  185. return auth_events
  186. def _resolve_with_state(
  187. room_version: RoomVersion,
  188. unconflicted_state_ids: MutableStateMap[str],
  189. conflicted_state_ids: StateMap[Set[str]],
  190. auth_event_ids: StateMap[str],
  191. state_map: Dict[str, EventBase],
  192. ) -> MutableStateMap[str]:
  193. conflicted_state = {}
  194. for key, event_ids in conflicted_state_ids.items():
  195. events = [state_map[ev_id] for ev_id in event_ids if ev_id in state_map]
  196. if len(events) > 1:
  197. conflicted_state[key] = events
  198. elif len(events) == 1:
  199. unconflicted_state_ids[key] = events[0].event_id
  200. auth_events = {
  201. key: state_map[ev_id]
  202. for key, ev_id in auth_event_ids.items()
  203. if ev_id in state_map
  204. }
  205. try:
  206. resolved_state = _resolve_state_events(
  207. room_version, conflicted_state, auth_events
  208. )
  209. except Exception:
  210. logger.exception("Failed to resolve state")
  211. raise
  212. new_state = unconflicted_state_ids
  213. for key, event in resolved_state.items():
  214. new_state[key] = event.event_id
  215. return new_state
  216. def _resolve_state_events(
  217. room_version: RoomVersion,
  218. conflicted_state: StateMap[List[EventBase]],
  219. auth_events: MutableStateMap[EventBase],
  220. ) -> StateMap[EventBase]:
  221. """This is where we actually decide which of the conflicted state to
  222. use.
  223. We resolve conflicts in the following order:
  224. 1. power levels
  225. 2. join rules
  226. 3. memberships
  227. 4. other events.
  228. """
  229. resolved_state = {}
  230. if POWER_KEY in conflicted_state:
  231. events = conflicted_state[POWER_KEY]
  232. logger.debug("Resolving conflicted power levels %r", events)
  233. resolved_state[POWER_KEY] = _resolve_auth_events(
  234. room_version, events, auth_events
  235. )
  236. auth_events.update(resolved_state)
  237. for key, events in conflicted_state.items():
  238. if key[0] == EventTypes.JoinRules:
  239. logger.debug("Resolving conflicted join rules %r", events)
  240. resolved_state[key] = _resolve_auth_events(
  241. room_version, events, auth_events
  242. )
  243. auth_events.update(resolved_state)
  244. for key, events in conflicted_state.items():
  245. if key[0] == EventTypes.Member:
  246. logger.debug("Resolving conflicted member lists %r", events)
  247. resolved_state[key] = _resolve_auth_events(
  248. room_version, events, auth_events
  249. )
  250. auth_events.update(resolved_state)
  251. for key, events in conflicted_state.items():
  252. if key not in resolved_state:
  253. logger.debug("Resolving conflicted state %r:%r", key, events)
  254. resolved_state[key] = _resolve_normal_events(events, auth_events)
  255. return resolved_state
  256. def _resolve_auth_events(
  257. room_version: RoomVersion, events: List[EventBase], auth_events: StateMap[EventBase]
  258. ) -> EventBase:
  259. reverse = list(reversed(_ordered_events(events)))
  260. auth_keys = {
  261. key
  262. for event in events
  263. for key in event_auth.auth_types_for_event(room_version, event)
  264. }
  265. new_auth_events = {}
  266. for key in auth_keys:
  267. auth_event = auth_events.get(key, None)
  268. if auth_event:
  269. new_auth_events[key] = auth_event
  270. auth_events = new_auth_events
  271. prev_event = reverse[0]
  272. for event in reverse[1:]:
  273. auth_events[(prev_event.type, prev_event.state_key)] = prev_event
  274. try:
  275. # The signatures have already been checked at this point
  276. event_auth.check_state_dependent_auth_rules(
  277. event,
  278. auth_events.values(),
  279. )
  280. prev_event = event
  281. except AuthError:
  282. return prev_event
  283. return event
  284. def _resolve_normal_events(
  285. events: List[EventBase], auth_events: StateMap[EventBase]
  286. ) -> EventBase:
  287. for event in _ordered_events(events):
  288. try:
  289. # The signatures have already been checked at this point
  290. event_auth.check_state_dependent_auth_rules(
  291. event,
  292. auth_events.values(),
  293. )
  294. return event
  295. except AuthError:
  296. pass
  297. # Use the last event (the one with the least depth) if they all fail
  298. # the auth check.
  299. return event
  300. def _ordered_events(events: Iterable[EventBase]) -> List[EventBase]:
  301. def key_func(e: EventBase) -> Tuple[int, str]:
  302. # we have to use utf-8 rather than ascii here because it turns out we allow
  303. # people to send us events with non-ascii event IDs :/
  304. return -int(e.depth), hashlib.sha1(e.event_id.encode("utf-8")).hexdigest()
  305. return sorted(events, key=key_func)