federation_server.py 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2015, 2016 OpenMarket Ltd
  3. #
  4. # Licensed under the Apache License, Version 2.0 (the "License");
  5. # you may not use this file except in compliance with the License.
  6. # You may obtain a copy of the License at
  7. #
  8. # http://www.apache.org/licenses/LICENSE-2.0
  9. #
  10. # Unless required by applicable law or agreed to in writing, software
  11. # distributed under the License is distributed on an "AS IS" BASIS,
  12. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. # See the License for the specific language governing permissions and
  14. # limitations under the License.
  15. from twisted.internet import defer
  16. from .federation_base import FederationBase
  17. from .units import Transaction, Edu
  18. from synapse.util.logutils import log_function
  19. from synapse.events import FrozenEvent
  20. import synapse.metrics
  21. from synapse.api.errors import FederationError, SynapseError
  22. from synapse.crypto.event_signing import compute_event_signature
  23. import simplejson as json
  24. import logging
  25. logger = logging.getLogger(__name__)
  26. # synapse.federation.federation_server is a silly name
  27. metrics = synapse.metrics.get_metrics_for("synapse.federation.server")
  28. received_pdus_counter = metrics.register_counter("received_pdus")
  29. received_edus_counter = metrics.register_counter("received_edus")
  30. received_queries_counter = metrics.register_counter("received_queries", labels=["type"])
  31. class FederationServer(FederationBase):
  32. def set_handler(self, handler):
  33. """Sets the handler that the replication layer will use to communicate
  34. receipt of new PDUs from other home servers. The required methods are
  35. documented on :py:class:`.ReplicationHandler`.
  36. """
  37. self.handler = handler
  38. def register_edu_handler(self, edu_type, handler):
  39. if edu_type in self.edu_handlers:
  40. raise KeyError("Already have an EDU handler for %s" % (edu_type,))
  41. self.edu_handlers[edu_type] = handler
  42. def register_query_handler(self, query_type, handler):
  43. """Sets the handler callable that will be used to handle an incoming
  44. federation Query of the given type.
  45. Args:
  46. query_type (str): Category name of the query, which should match
  47. the string used by make_query.
  48. handler (callable): Invoked to handle incoming queries of this type
  49. handler is invoked as:
  50. result = handler(args)
  51. where 'args' is a dict mapping strings to strings of the query
  52. arguments. It should return a Deferred that will eventually yield an
  53. object to encode as JSON.
  54. """
  55. if query_type in self.query_handlers:
  56. raise KeyError(
  57. "Already have a Query handler for %s" % (query_type,)
  58. )
  59. self.query_handlers[query_type] = handler
  60. @defer.inlineCallbacks
  61. @log_function
  62. def on_backfill_request(self, origin, room_id, versions, limit):
  63. pdus = yield self.handler.on_backfill_request(
  64. origin, room_id, versions, limit
  65. )
  66. defer.returnValue((200, self._transaction_from_pdus(pdus).get_dict()))
  67. @defer.inlineCallbacks
  68. @log_function
  69. def on_incoming_transaction(self, transaction_data):
  70. transaction = Transaction(**transaction_data)
  71. received_pdus_counter.inc_by(len(transaction.pdus))
  72. for p in transaction.pdus:
  73. if "unsigned" in p:
  74. unsigned = p["unsigned"]
  75. if "age" in unsigned:
  76. p["age"] = unsigned["age"]
  77. if "age" in p:
  78. p["age_ts"] = int(self._clock.time_msec()) - int(p["age"])
  79. del p["age"]
  80. pdu_list = [
  81. self.event_from_pdu_json(p) for p in transaction.pdus
  82. ]
  83. logger.debug("[%s] Got transaction", transaction.transaction_id)
  84. response = yield self.transaction_actions.have_responded(transaction)
  85. if response:
  86. logger.debug(
  87. "[%s] We've already responed to this request",
  88. transaction.transaction_id
  89. )
  90. defer.returnValue(response)
  91. return
  92. logger.debug("[%s] Transaction is new", transaction.transaction_id)
  93. results = []
  94. for pdu in pdu_list:
  95. try:
  96. yield self._handle_new_pdu(transaction.origin, pdu)
  97. results.append({})
  98. except FederationError as e:
  99. self.send_failure(e, transaction.origin)
  100. results.append({"error": str(e)})
  101. except Exception as e:
  102. results.append({"error": str(e)})
  103. logger.exception("Failed to handle PDU")
  104. if hasattr(transaction, "edus"):
  105. for edu in (Edu(**x) for x in transaction.edus):
  106. yield self.received_edu(
  107. transaction.origin,
  108. edu.edu_type,
  109. edu.content
  110. )
  111. for failure in getattr(transaction, "pdu_failures", []):
  112. logger.info("Got failure %r", failure)
  113. logger.debug("Returning: %s", str(results))
  114. response = {
  115. "pdus": dict(zip(
  116. (p.event_id for p in pdu_list), results
  117. )),
  118. }
  119. yield self.transaction_actions.set_response(
  120. transaction,
  121. 200, response
  122. )
  123. defer.returnValue((200, response))
  124. @defer.inlineCallbacks
  125. def received_edu(self, origin, edu_type, content):
  126. received_edus_counter.inc()
  127. if edu_type in self.edu_handlers:
  128. try:
  129. yield self.edu_handlers[edu_type](origin, content)
  130. except SynapseError as e:
  131. logger.info("Failed to handle edu %r: %r", edu_type, e)
  132. except Exception as e:
  133. logger.exception("Failed to handle edu %r", edu_type, e)
  134. else:
  135. logger.warn("Received EDU of type %s with no handler", edu_type)
  136. @defer.inlineCallbacks
  137. @log_function
  138. def on_context_state_request(self, origin, room_id, event_id):
  139. if event_id:
  140. pdus = yield self.handler.get_state_for_pdu(
  141. origin, room_id, event_id,
  142. )
  143. auth_chain = yield self.store.get_auth_chain(
  144. [pdu.event_id for pdu in pdus]
  145. )
  146. for event in auth_chain:
  147. event.signatures.update(
  148. compute_event_signature(
  149. event,
  150. self.hs.hostname,
  151. self.hs.config.signing_key[0]
  152. )
  153. )
  154. else:
  155. raise NotImplementedError("Specify an event")
  156. defer.returnValue((200, {
  157. "pdus": [pdu.get_pdu_json() for pdu in pdus],
  158. "auth_chain": [pdu.get_pdu_json() for pdu in auth_chain],
  159. }))
  160. @defer.inlineCallbacks
  161. @log_function
  162. def on_pdu_request(self, origin, event_id):
  163. pdu = yield self._get_persisted_pdu(origin, event_id)
  164. if pdu:
  165. defer.returnValue(
  166. (200, self._transaction_from_pdus([pdu]).get_dict())
  167. )
  168. else:
  169. defer.returnValue((404, ""))
  170. @defer.inlineCallbacks
  171. @log_function
  172. def on_pull_request(self, origin, versions):
  173. raise NotImplementedError("Pull transactions not implemented")
  174. @defer.inlineCallbacks
  175. def on_query_request(self, query_type, args):
  176. received_queries_counter.inc(query_type)
  177. if query_type in self.query_handlers:
  178. response = yield self.query_handlers[query_type](args)
  179. defer.returnValue((200, response))
  180. else:
  181. defer.returnValue(
  182. (404, "No handler for Query type '%s'" % (query_type,))
  183. )
  184. @defer.inlineCallbacks
  185. def on_make_join_request(self, room_id, user_id):
  186. pdu = yield self.handler.on_make_join_request(room_id, user_id)
  187. time_now = self._clock.time_msec()
  188. defer.returnValue({"event": pdu.get_pdu_json(time_now)})
  189. @defer.inlineCallbacks
  190. def on_invite_request(self, origin, content):
  191. pdu = self.event_from_pdu_json(content)
  192. ret_pdu = yield self.handler.on_invite_request(origin, pdu)
  193. time_now = self._clock.time_msec()
  194. defer.returnValue((200, {"event": ret_pdu.get_pdu_json(time_now)}))
  195. @defer.inlineCallbacks
  196. def on_send_join_request(self, origin, content):
  197. logger.debug("on_send_join_request: content: %s", content)
  198. pdu = self.event_from_pdu_json(content)
  199. logger.debug("on_send_join_request: pdu sigs: %s", pdu.signatures)
  200. res_pdus = yield self.handler.on_send_join_request(origin, pdu)
  201. time_now = self._clock.time_msec()
  202. defer.returnValue((200, {
  203. "state": [p.get_pdu_json(time_now) for p in res_pdus["state"]],
  204. "auth_chain": [
  205. p.get_pdu_json(time_now) for p in res_pdus["auth_chain"]
  206. ],
  207. }))
  208. @defer.inlineCallbacks
  209. def on_make_leave_request(self, room_id, user_id):
  210. pdu = yield self.handler.on_make_leave_request(room_id, user_id)
  211. time_now = self._clock.time_msec()
  212. defer.returnValue({"event": pdu.get_pdu_json(time_now)})
  213. @defer.inlineCallbacks
  214. def on_send_leave_request(self, origin, content):
  215. logger.debug("on_send_leave_request: content: %s", content)
  216. pdu = self.event_from_pdu_json(content)
  217. logger.debug("on_send_leave_request: pdu sigs: %s", pdu.signatures)
  218. yield self.handler.on_send_leave_request(origin, pdu)
  219. defer.returnValue((200, {}))
  220. @defer.inlineCallbacks
  221. def on_event_auth(self, origin, room_id, event_id):
  222. time_now = self._clock.time_msec()
  223. auth_pdus = yield self.handler.on_event_auth(event_id)
  224. defer.returnValue((200, {
  225. "auth_chain": [a.get_pdu_json(time_now) for a in auth_pdus],
  226. }))
  227. @defer.inlineCallbacks
  228. def on_query_auth_request(self, origin, content, event_id):
  229. """
  230. Content is a dict with keys::
  231. auth_chain (list): A list of events that give the auth chain.
  232. missing (list): A list of event_ids indicating what the other
  233. side (`origin`) think we're missing.
  234. rejects (dict): A mapping from event_id to a 2-tuple of reason
  235. string and a proof (or None) of why the event was rejected.
  236. The keys of this dict give the list of events the `origin` has
  237. rejected.
  238. Args:
  239. origin (str)
  240. content (dict)
  241. event_id (str)
  242. Returns:
  243. Deferred: Results in `dict` with the same format as `content`
  244. """
  245. auth_chain = [
  246. self.event_from_pdu_json(e)
  247. for e in content["auth_chain"]
  248. ]
  249. signed_auth = yield self._check_sigs_and_hash_and_fetch(
  250. origin, auth_chain, outlier=True
  251. )
  252. ret = yield self.handler.on_query_auth(
  253. origin,
  254. event_id,
  255. signed_auth,
  256. content.get("rejects", []),
  257. content.get("missing", []),
  258. )
  259. time_now = self._clock.time_msec()
  260. send_content = {
  261. "auth_chain": [
  262. e.get_pdu_json(time_now)
  263. for e in ret["auth_chain"]
  264. ],
  265. "rejects": ret.get("rejects", []),
  266. "missing": ret.get("missing", []),
  267. }
  268. defer.returnValue(
  269. (200, send_content)
  270. )
  271. @defer.inlineCallbacks
  272. @log_function
  273. def on_query_client_keys(self, origin, content):
  274. query = []
  275. for user_id, device_ids in content.get("device_keys", {}).items():
  276. if not device_ids:
  277. query.append((user_id, None))
  278. else:
  279. for device_id in device_ids:
  280. query.append((user_id, device_id))
  281. results = yield self.store.get_e2e_device_keys(query)
  282. json_result = {}
  283. for user_id, device_keys in results.items():
  284. for device_id, json_bytes in device_keys.items():
  285. json_result.setdefault(user_id, {})[device_id] = json.loads(
  286. json_bytes
  287. )
  288. defer.returnValue({"device_keys": json_result})
  289. @defer.inlineCallbacks
  290. @log_function
  291. def on_claim_client_keys(self, origin, content):
  292. query = []
  293. for user_id, device_keys in content.get("one_time_keys", {}).items():
  294. for device_id, algorithm in device_keys.items():
  295. query.append((user_id, device_id, algorithm))
  296. results = yield self.store.claim_e2e_one_time_keys(query)
  297. json_result = {}
  298. for user_id, device_keys in results.items():
  299. for device_id, keys in device_keys.items():
  300. for key_id, json_bytes in keys.items():
  301. json_result.setdefault(user_id, {})[device_id] = {
  302. key_id: json.loads(json_bytes)
  303. }
  304. defer.returnValue({"one_time_keys": json_result})
  305. @defer.inlineCallbacks
  306. @log_function
  307. def on_get_missing_events(self, origin, room_id, earliest_events,
  308. latest_events, limit, min_depth):
  309. missing_events = yield self.handler.on_get_missing_events(
  310. origin, room_id, earliest_events, latest_events, limit, min_depth
  311. )
  312. time_now = self._clock.time_msec()
  313. defer.returnValue({
  314. "events": [ev.get_pdu_json(time_now) for ev in missing_events],
  315. })
  316. @log_function
  317. def on_openid_userinfo(self, token):
  318. ts_now_ms = self._clock.time_msec()
  319. return self.store.get_user_id_for_open_id_token(token, ts_now_ms)
  320. @log_function
  321. def _get_persisted_pdu(self, origin, event_id, do_auth=True):
  322. """ Get a PDU from the database with given origin and id.
  323. Returns:
  324. Deferred: Results in a `Pdu`.
  325. """
  326. return self.handler.get_persisted_pdu(
  327. origin, event_id, do_auth=do_auth
  328. )
  329. def _transaction_from_pdus(self, pdu_list):
  330. """Returns a new Transaction containing the given PDUs suitable for
  331. transmission.
  332. """
  333. time_now = self._clock.time_msec()
  334. pdus = [p.get_pdu_json(time_now) for p in pdu_list]
  335. return Transaction(
  336. origin=self.server_name,
  337. pdus=pdus,
  338. origin_server_ts=int(time_now),
  339. destination=None,
  340. )
  341. @defer.inlineCallbacks
  342. @log_function
  343. def _handle_new_pdu(self, origin, pdu, get_missing=True):
  344. # We reprocess pdus when we have seen them only as outliers
  345. existing = yield self._get_persisted_pdu(
  346. origin, pdu.event_id, do_auth=False
  347. )
  348. # FIXME: Currently we fetch an event again when we already have it
  349. # if it has been marked as an outlier.
  350. already_seen = (
  351. existing and (
  352. not existing.internal_metadata.is_outlier()
  353. or pdu.internal_metadata.is_outlier()
  354. )
  355. )
  356. if already_seen:
  357. logger.debug("Already seen pdu %s", pdu.event_id)
  358. return
  359. # Check signature.
  360. try:
  361. pdu = yield self._check_sigs_and_hash(pdu)
  362. except SynapseError as e:
  363. raise FederationError(
  364. "ERROR",
  365. e.code,
  366. e.msg,
  367. affected=pdu.event_id,
  368. )
  369. state = None
  370. auth_chain = []
  371. have_seen = yield self.store.have_events(
  372. [ev for ev, _ in pdu.prev_events]
  373. )
  374. fetch_state = False
  375. # Get missing pdus if necessary.
  376. if not pdu.internal_metadata.is_outlier():
  377. # We only backfill backwards to the min depth.
  378. min_depth = yield self.handler.get_min_depth_for_context(
  379. pdu.room_id
  380. )
  381. logger.debug(
  382. "_handle_new_pdu min_depth for %s: %d",
  383. pdu.room_id, min_depth
  384. )
  385. prevs = {e_id for e_id, _ in pdu.prev_events}
  386. seen = set(have_seen.keys())
  387. if min_depth and pdu.depth < min_depth:
  388. # This is so that we don't notify the user about this
  389. # message, to work around the fact that some events will
  390. # reference really really old events we really don't want to
  391. # send to the clients.
  392. pdu.internal_metadata.outlier = True
  393. elif min_depth and pdu.depth > min_depth:
  394. if get_missing and prevs - seen:
  395. latest = yield self.store.get_latest_event_ids_in_room(
  396. pdu.room_id
  397. )
  398. # We add the prev events that we have seen to the latest
  399. # list to ensure the remote server doesn't give them to us
  400. latest = set(latest)
  401. latest |= seen
  402. missing_events = yield self.get_missing_events(
  403. origin,
  404. pdu.room_id,
  405. earliest_events_ids=list(latest),
  406. latest_events=[pdu],
  407. limit=10,
  408. min_depth=min_depth,
  409. )
  410. # We want to sort these by depth so we process them and
  411. # tell clients about them in order.
  412. missing_events.sort(key=lambda x: x.depth)
  413. for e in missing_events:
  414. yield self._handle_new_pdu(
  415. origin,
  416. e,
  417. get_missing=False
  418. )
  419. have_seen = yield self.store.have_events(
  420. [ev for ev, _ in pdu.prev_events]
  421. )
  422. prevs = {e_id for e_id, _ in pdu.prev_events}
  423. seen = set(have_seen.keys())
  424. if prevs - seen:
  425. fetch_state = True
  426. if fetch_state:
  427. # We need to get the state at this event, since we haven't
  428. # processed all the prev events.
  429. logger.debug(
  430. "_handle_new_pdu getting state for %s",
  431. pdu.room_id
  432. )
  433. try:
  434. state, auth_chain = yield self.get_state_for_room(
  435. origin, pdu.room_id, pdu.event_id,
  436. )
  437. except:
  438. logger.warn("Failed to get state for event: %s", pdu.event_id)
  439. yield self.handler.on_receive_pdu(
  440. origin,
  441. pdu,
  442. state=state,
  443. auth_chain=auth_chain,
  444. )
  445. def __str__(self):
  446. return "<ReplicationLayer(%s)>" % self.server_name
  447. def event_from_pdu_json(self, pdu_json, outlier=False):
  448. event = FrozenEvent(
  449. pdu_json
  450. )
  451. event.internal_metadata.outlier = outlier
  452. return event
  453. @defer.inlineCallbacks
  454. def exchange_third_party_invite(
  455. self,
  456. sender_user_id,
  457. target_user_id,
  458. room_id,
  459. signed,
  460. ):
  461. ret = yield self.handler.exchange_third_party_invite(
  462. sender_user_id,
  463. target_user_id,
  464. room_id,
  465. signed,
  466. )
  467. defer.returnValue(ret)
  468. @defer.inlineCallbacks
  469. def on_exchange_third_party_invite_request(self, origin, room_id, event_dict):
  470. ret = yield self.handler.on_exchange_third_party_invite_request(
  471. origin, room_id, event_dict
  472. )
  473. defer.returnValue(ret)