2014-08-12 08:10:52 -06:00
|
|
|
# -*- coding: utf-8 -*-
|
2014-09-03 10:29:13 -06:00
|
|
|
# Copyright 2014 OpenMarket Ltd
|
2014-08-12 08:10:52 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-12 20:14:34 -06:00
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
"""Contains handlers for federation events."""
|
|
|
|
|
|
|
|
from ._base import BaseHandler
|
|
|
|
|
|
|
|
from synapse.api.events.room import InviteJoinEvent, RoomMemberEvent
|
|
|
|
from synapse.api.constants import Membership
|
|
|
|
from synapse.util.logutils import log_function
|
2014-08-26 12:49:42 -06:00
|
|
|
from synapse.federation.pdu_codec import PduCodec
|
2014-09-03 12:15:55 -06:00
|
|
|
from synapse.api.errors import SynapseError
|
2014-08-26 12:49:42 -06:00
|
|
|
|
2014-09-03 12:07:19 -06:00
|
|
|
from twisted.internet import defer, reactor
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
import logging
|
|
|
|
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class FederationHandler(BaseHandler):
|
2014-08-26 12:49:42 -06:00
|
|
|
"""Handles events that originated from federation.
|
|
|
|
Responsible for:
|
|
|
|
a) handling received Pdus before handing them on as Events to the rest
|
|
|
|
of the home server (including auth and state conflict resoultion)
|
|
|
|
b) converting events that were produced by local clients that may need
|
|
|
|
to be sent to remote home servers.
|
|
|
|
"""
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-21 07:38:22 -06:00
|
|
|
def __init__(self, hs):
|
|
|
|
super(FederationHandler, self).__init__(hs)
|
|
|
|
|
|
|
|
self.distributor.observe(
|
|
|
|
"user_joined_room",
|
|
|
|
self._on_user_joined
|
|
|
|
)
|
|
|
|
|
|
|
|
self.waiting_for_join_list = {}
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-26 12:49:42 -06:00
|
|
|
self.store = hs.get_datastore()
|
|
|
|
self.replication_layer = hs.get_replication_layer()
|
|
|
|
self.state_handler = hs.get_state_handler()
|
|
|
|
# self.auth_handler = gs.get_auth_handler()
|
|
|
|
self.server_name = hs.hostname
|
|
|
|
|
|
|
|
self.lock_manager = hs.get_room_lock_manager()
|
|
|
|
|
|
|
|
self.replication_layer.set_handler(self)
|
|
|
|
|
|
|
|
self.pdu_codec = PduCodec(hs)
|
|
|
|
|
|
|
|
@log_function
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def handle_new_event(self, event, snapshot):
|
|
|
|
""" Takes in an event from the client to server side, that has already
|
|
|
|
been authed and handled by the state module, and sends it to any
|
|
|
|
remote home servers that may be interested.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
event
|
|
|
|
snapshot (.storage.Snapshot): THe snapshot the event happened after
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Resolved when it has successfully been queued for
|
|
|
|
processing.
|
|
|
|
"""
|
|
|
|
|
|
|
|
pdu = self.pdu_codec.pdu_from_event(event)
|
|
|
|
|
|
|
|
if not hasattr(pdu, "destinations") or not pdu.destinations:
|
|
|
|
pdu.destinations = []
|
|
|
|
|
|
|
|
yield self.replication_layer.send_pdu(pdu)
|
|
|
|
|
|
|
|
@log_function
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def on_receive_pdu(self, pdu, backfilled):
|
|
|
|
""" Called by the ReplicationLayer when we have a new pdu. We need to
|
|
|
|
do auth checks and put it throught the StateHandler.
|
|
|
|
"""
|
|
|
|
event = self.pdu_codec.event_from_pdu(pdu)
|
|
|
|
|
2014-08-27 06:34:28 -06:00
|
|
|
with (yield self.lock_manager.lock(pdu.context)):
|
|
|
|
if event.is_state and not backfilled:
|
|
|
|
is_new_state = yield self.state_handler.handle_new_state(
|
|
|
|
pdu
|
|
|
|
)
|
|
|
|
if not is_new_state:
|
|
|
|
return
|
|
|
|
else:
|
|
|
|
is_new_state = False
|
|
|
|
# TODO: Implement something in federation that allows us to
|
|
|
|
# respond to PDU.
|
2014-08-26 12:49:42 -06:00
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
if hasattr(event, "state_key") and not is_new_state:
|
|
|
|
logger.debug("Ignoring old state.")
|
|
|
|
return
|
|
|
|
|
|
|
|
target_is_mine = False
|
|
|
|
if hasattr(event, "target_host"):
|
|
|
|
target_is_mine = event.target_host == self.hs.hostname
|
|
|
|
|
|
|
|
if event.type == InviteJoinEvent.TYPE:
|
|
|
|
if not target_is_mine:
|
|
|
|
logger.debug("Ignoring invite/join event %s", event)
|
|
|
|
return
|
|
|
|
|
|
|
|
# If we receive an invite/join event then we need to join the
|
|
|
|
# sender to the given room.
|
|
|
|
# TODO: We should probably auth this or some such
|
|
|
|
content = event.content
|
|
|
|
content.update({"membership": Membership.JOIN})
|
|
|
|
new_event = self.event_factory.create_event(
|
|
|
|
etype=RoomMemberEvent.TYPE,
|
2014-08-26 02:26:07 -06:00
|
|
|
state_key=event.user_id,
|
2014-08-12 08:10:52 -06:00
|
|
|
room_id=event.room_id,
|
|
|
|
user_id=event.user_id,
|
|
|
|
membership=Membership.JOIN,
|
|
|
|
content=content
|
|
|
|
)
|
|
|
|
|
|
|
|
yield self.hs.get_handlers().room_member_handler.change_membership(
|
|
|
|
new_event,
|
2014-09-03 12:07:19 -06:00
|
|
|
do_auth=False,
|
2014-08-12 08:10:52 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
else:
|
|
|
|
with (yield self.room_lock.lock(event.room_id)):
|
2014-08-28 06:51:50 -06:00
|
|
|
yield self.store.persist_event(event, backfilled)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-08-20 07:42:36 -06:00
|
|
|
room = yield self.store.get_room(event.room_id)
|
|
|
|
|
|
|
|
if not room:
|
|
|
|
# Huh, let's try and get the current state
|
|
|
|
try:
|
2014-08-28 08:32:30 -06:00
|
|
|
yield self.replication_layer.get_state_for_context(
|
2014-08-28 11:32:39 -06:00
|
|
|
event.origin, event.room_id
|
2014-08-20 07:42:36 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
hosts = yield self.store.get_joined_hosts_for_room(
|
|
|
|
event.room_id
|
|
|
|
)
|
|
|
|
if self.hs.hostname in hosts:
|
|
|
|
try:
|
|
|
|
yield self.store.store_room(
|
2014-08-28 08:32:30 -06:00
|
|
|
room_id=event.room_id,
|
|
|
|
room_creator_user_id="",
|
|
|
|
is_public=False,
|
2014-08-20 07:42:36 -06:00
|
|
|
)
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
except:
|
|
|
|
logger.exception(
|
|
|
|
"Failed to get current state for room %s",
|
|
|
|
event.room_id
|
|
|
|
)
|
|
|
|
|
2014-08-19 07:20:03 -06:00
|
|
|
if not backfilled:
|
2014-08-27 09:23:33 -06:00
|
|
|
yield self.notifier.on_new_room_event(event)
|
2014-08-19 07:20:03 -06:00
|
|
|
|
2014-08-21 07:38:22 -06:00
|
|
|
if event.type == RoomMemberEvent.TYPE:
|
|
|
|
if event.membership == Membership.JOIN:
|
2014-08-26 09:13:26 -06:00
|
|
|
user = self.hs.parse_userid(event.state_key)
|
2014-08-21 07:38:22 -06:00
|
|
|
self.distributor.fire(
|
|
|
|
"user_joined_room", user=user, room_id=event.room_id
|
|
|
|
)
|
|
|
|
|
2014-08-19 07:20:03 -06:00
|
|
|
@log_function
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def backfill(self, dest, room_id, limit):
|
2014-08-26 12:49:42 -06:00
|
|
|
pdus = yield self.replication_layer.backfill(dest, room_id, limit)
|
|
|
|
|
2014-08-28 06:44:32 -06:00
|
|
|
events = []
|
2014-08-26 12:49:42 -06:00
|
|
|
|
2014-08-28 06:44:32 -06:00
|
|
|
for pdu in pdus:
|
|
|
|
event = self.pdu_codec.event_from_pdu(pdu)
|
|
|
|
events.append(event)
|
|
|
|
yield self.store.persist_event(event, backfilled=True)
|
2014-08-26 12:49:42 -06:00
|
|
|
|
|
|
|
defer.returnValue(events)
|
|
|
|
|
2014-08-20 07:42:36 -06:00
|
|
|
@log_function
|
|
|
|
@defer.inlineCallbacks
|
2014-08-27 08:31:04 -06:00
|
|
|
def do_invite_join(self, target_host, room_id, joinee, content, snapshot):
|
2014-08-20 07:42:36 -06:00
|
|
|
|
|
|
|
hosts = yield self.store.get_joined_hosts_for_room(room_id)
|
|
|
|
if self.hs.hostname in hosts:
|
|
|
|
# We are already in the room.
|
|
|
|
logger.debug("We're already in the room apparently")
|
|
|
|
defer.returnValue(False)
|
|
|
|
|
|
|
|
# First get current state to see if we are already joined.
|
|
|
|
try:
|
2014-08-28 08:32:30 -06:00
|
|
|
yield self.replication_layer.get_state_for_context(
|
|
|
|
target_host, room_id
|
|
|
|
)
|
2014-08-20 07:42:36 -06:00
|
|
|
|
|
|
|
hosts = yield self.store.get_joined_hosts_for_room(room_id)
|
|
|
|
if self.hs.hostname in hosts:
|
|
|
|
# Oh, we were actually in the room already.
|
|
|
|
logger.debug("We're already in the room apparently")
|
|
|
|
defer.returnValue(False)
|
|
|
|
except Exception:
|
|
|
|
logger.exception("Failed to get current state")
|
|
|
|
|
|
|
|
new_event = self.event_factory.create_event(
|
|
|
|
etype=InviteJoinEvent.TYPE,
|
|
|
|
target_host=target_host,
|
|
|
|
room_id=room_id,
|
|
|
|
user_id=joinee,
|
|
|
|
content=content
|
|
|
|
)
|
|
|
|
|
|
|
|
new_event.destinations = [target_host]
|
|
|
|
|
2014-08-27 08:31:04 -06:00
|
|
|
snapshot.fill_out_prev_events(new_event)
|
|
|
|
yield self.handle_new_event(new_event, snapshot)
|
2014-08-20 07:42:36 -06:00
|
|
|
|
2014-08-21 07:38:22 -06:00
|
|
|
# TODO (erikj): Time out here.
|
|
|
|
d = defer.Deferred()
|
|
|
|
self.waiting_for_join_list.setdefault((joinee, room_id), []).append(d)
|
2014-09-03 12:07:19 -06:00
|
|
|
reactor.callLater(10, d.cancel)
|
2014-09-03 12:13:41 -06:00
|
|
|
|
|
|
|
try:
|
|
|
|
yield d
|
|
|
|
except defer.CancelledError:
|
2014-09-03 12:19:24 -06:00
|
|
|
raise SynapseError(500, "Unable to join remote room")
|
2014-08-20 07:42:36 -06:00
|
|
|
|
|
|
|
try:
|
|
|
|
yield self.store.store_room(
|
2014-08-28 08:32:30 -06:00
|
|
|
room_id=room_id,
|
|
|
|
room_creator_user_id="",
|
2014-08-20 07:42:36 -06:00
|
|
|
is_public=False
|
|
|
|
)
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
defer.returnValue(True)
|
2014-08-21 07:38:22 -06:00
|
|
|
|
|
|
|
|
|
|
|
@log_function
|
|
|
|
def _on_user_joined(self, user, room_id):
|
|
|
|
waiters = self.waiting_for_join_list.get((user.to_string(), room_id), [])
|
|
|
|
while waiters:
|
|
|
|
waiters.pop().callback(None)
|