Log when events are (unexpectedly) filtered out of responses in tests (#14213)
See https://github.com/matrix-org/synapse/pull/14095#discussion_r990335492 This is useful because when see that a relevant event is an `outlier` or `soft-failed`, then that's a good unexpected indicator explaining why it's not showing up. `filter_events_for_client` is used in `/sync`, `/messages`, `/context` which are all common end-to-end assertion touch points (also notifications, relations).
This commit is contained in:
parent
8af29155ec
commit
30a5076da8
|
@ -0,0 +1 @@
|
||||||
|
Log when events are (maybe unexpectedly) filtered out of responses in tests.
|
|
@ -73,7 +73,8 @@ The following environment variables are supported in `generate` mode:
|
||||||
will log sensitive information such as access tokens.
|
will log sensitive information such as access tokens.
|
||||||
This should not be needed unless you are a developer attempting to debug something
|
This should not be needed unless you are a developer attempting to debug something
|
||||||
particularly tricky.
|
particularly tricky.
|
||||||
|
* `SYNAPSE_LOG_TESTING`: if set, Synapse will log additional information useful
|
||||||
|
for testing.
|
||||||
|
|
||||||
## Postgres
|
## Postgres
|
||||||
|
|
||||||
|
|
|
@ -49,17 +49,35 @@ handlers:
|
||||||
class: logging.StreamHandler
|
class: logging.StreamHandler
|
||||||
formatter: precise
|
formatter: precise
|
||||||
|
|
||||||
{% if not SYNAPSE_LOG_SENSITIVE %}
|
|
||||||
{#
|
|
||||||
If SYNAPSE_LOG_SENSITIVE is unset, then override synapse.storage.SQL to INFO
|
|
||||||
so that DEBUG entries (containing sensitive information) are not emitted.
|
|
||||||
#}
|
|
||||||
loggers:
|
loggers:
|
||||||
|
# This is just here so we can leave `loggers` in the config regardless of whether
|
||||||
|
# we configure other loggers below (avoid empty yaml dict error).
|
||||||
|
_placeholder:
|
||||||
|
level: "INFO"
|
||||||
|
|
||||||
|
{% if not SYNAPSE_LOG_SENSITIVE %}
|
||||||
|
{#
|
||||||
|
If SYNAPSE_LOG_SENSITIVE is unset, then override synapse.storage.SQL to INFO
|
||||||
|
so that DEBUG entries (containing sensitive information) are not emitted.
|
||||||
|
#}
|
||||||
synapse.storage.SQL:
|
synapse.storage.SQL:
|
||||||
# beware: increasing this to DEBUG will make synapse log sensitive
|
# beware: increasing this to DEBUG will make synapse log sensitive
|
||||||
# information such as access tokens.
|
# information such as access tokens.
|
||||||
level: INFO
|
level: INFO
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% if SYNAPSE_LOG_TESTING %}
|
||||||
|
{#
|
||||||
|
If Synapse is under test, log a few more useful things for a developer
|
||||||
|
attempting to debug something particularly tricky.
|
||||||
|
|
||||||
|
With `synapse.visibility.filtered_event_debug`, it logs when events are (maybe
|
||||||
|
unexpectedly) filtered out of responses in tests. It's just nice to be able to
|
||||||
|
look at the CI log and figure out why an event isn't being returned.
|
||||||
|
#}
|
||||||
|
synapse.visibility.filtered_event_debug:
|
||||||
|
level: DEBUG
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
root:
|
root:
|
||||||
level: {{ SYNAPSE_LOG_LEVEL or "INFO" }}
|
level: {{ SYNAPSE_LOG_LEVEL or "INFO" }}
|
||||||
|
|
|
@ -40,6 +40,8 @@
|
||||||
# log level. INFO is the default.
|
# log level. INFO is the default.
|
||||||
# * SYNAPSE_LOG_SENSITIVE: If unset, SQL and SQL values won't be logged,
|
# * SYNAPSE_LOG_SENSITIVE: If unset, SQL and SQL values won't be logged,
|
||||||
# regardless of the SYNAPSE_LOG_LEVEL setting.
|
# regardless of the SYNAPSE_LOG_LEVEL setting.
|
||||||
|
# * SYNAPSE_LOG_TESTING: if set, Synapse will log additional information useful
|
||||||
|
# for testing.
|
||||||
#
|
#
|
||||||
# NOTE: According to Complement's ENTRYPOINT expectations for a homeserver image (as defined
|
# NOTE: According to Complement's ENTRYPOINT expectations for a homeserver image (as defined
|
||||||
# in the project's README), this script may be run multiple times, and functionality should
|
# in the project's README), this script may be run multiple times, and functionality should
|
||||||
|
@ -947,6 +949,7 @@ def generate_worker_log_config(
|
||||||
extra_log_template_args["SYNAPSE_LOG_SENSITIVE"] = environ.get(
|
extra_log_template_args["SYNAPSE_LOG_SENSITIVE"] = environ.get(
|
||||||
"SYNAPSE_LOG_SENSITIVE"
|
"SYNAPSE_LOG_SENSITIVE"
|
||||||
)
|
)
|
||||||
|
extra_log_template_args["SYNAPSE_LOG_TESTING"] = environ.get("SYNAPSE_LOG_TESTING")
|
||||||
|
|
||||||
# Render and write the file
|
# Render and write the file
|
||||||
log_config_filepath = f"/conf/workers/{worker_name}.log.config"
|
log_config_filepath = f"/conf/workers/{worker_name}.log.config"
|
||||||
|
|
|
@ -269,6 +269,10 @@ if [[ -n "$SYNAPSE_TEST_LOG_LEVEL" ]]; then
|
||||||
export PASS_SYNAPSE_LOG_SENSITIVE=1
|
export PASS_SYNAPSE_LOG_SENSITIVE=1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Log a few more useful things for a developer attempting to debug something
|
||||||
|
# particularly tricky.
|
||||||
|
export PASS_SYNAPSE_LOG_TESTING=1
|
||||||
|
|
||||||
# Run the tests!
|
# Run the tests!
|
||||||
echo "Images built; running complement"
|
echo "Images built; running complement"
|
||||||
cd "$COMPLEMENT_DIR"
|
cd "$COMPLEMENT_DIR"
|
||||||
|
|
|
@ -41,7 +41,7 @@ from synapse.types.state import StateFilter
|
||||||
from synapse.util import Clock
|
from synapse.util import Clock
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
logger = logging.getLogger(__name__)
|
||||||
|
filtered_event_logger = logging.getLogger("synapse.visibility.filtered_event_debug")
|
||||||
|
|
||||||
VISIBILITY_PRIORITY = (
|
VISIBILITY_PRIORITY = (
|
||||||
HistoryVisibility.WORLD_READABLE,
|
HistoryVisibility.WORLD_READABLE,
|
||||||
|
@ -97,8 +97,8 @@ async def filter_events_for_client(
|
||||||
events_before_filtering = events
|
events_before_filtering = events
|
||||||
events = [e for e in events if not e.internal_metadata.is_soft_failed()]
|
events = [e for e in events if not e.internal_metadata.is_soft_failed()]
|
||||||
if len(events_before_filtering) != len(events):
|
if len(events_before_filtering) != len(events):
|
||||||
if logger.isEnabledFor(logging.DEBUG):
|
if filtered_event_logger.isEnabledFor(logging.DEBUG):
|
||||||
logger.debug(
|
filtered_event_logger.debug(
|
||||||
"filter_events_for_client: Filtered out soft-failed events: Before=%s, After=%s",
|
"filter_events_for_client: Filtered out soft-failed events: Before=%s, After=%s",
|
||||||
[event.event_id for event in events_before_filtering],
|
[event.event_id for event in events_before_filtering],
|
||||||
[event.event_id for event in events],
|
[event.event_id for event in events],
|
||||||
|
@ -319,7 +319,7 @@ def _check_client_allowed_to_see_event(
|
||||||
_check_filter_send_to_client(event, clock, retention_policy, sender_ignored)
|
_check_filter_send_to_client(event, clock, retention_policy, sender_ignored)
|
||||||
== _CheckFilter.DENIED
|
== _CheckFilter.DENIED
|
||||||
):
|
):
|
||||||
logger.debug(
|
filtered_event_logger.debug(
|
||||||
"_check_client_allowed_to_see_event(event=%s): Filtered out event because `_check_filter_send_to_client` returned `_CheckFilter.DENIED`",
|
"_check_client_allowed_to_see_event(event=%s): Filtered out event because `_check_filter_send_to_client` returned `_CheckFilter.DENIED`",
|
||||||
event.event_id,
|
event.event_id,
|
||||||
)
|
)
|
||||||
|
@ -341,7 +341,7 @@ def _check_client_allowed_to_see_event(
|
||||||
)
|
)
|
||||||
return event
|
return event
|
||||||
|
|
||||||
logger.debug(
|
filtered_event_logger.debug(
|
||||||
"_check_client_allowed_to_see_event(event=%s): Filtered out event because it's an outlier",
|
"_check_client_allowed_to_see_event(event=%s): Filtered out event because it's an outlier",
|
||||||
event.event_id,
|
event.event_id,
|
||||||
)
|
)
|
||||||
|
@ -367,7 +367,7 @@ def _check_client_allowed_to_see_event(
|
||||||
|
|
||||||
membership_result = _check_membership(user_id, event, visibility, state, is_peeking)
|
membership_result = _check_membership(user_id, event, visibility, state, is_peeking)
|
||||||
if not membership_result.allowed:
|
if not membership_result.allowed:
|
||||||
logger.debug(
|
filtered_event_logger.debug(
|
||||||
"_check_client_allowed_to_see_event(event=%s): Filtered out event because the user can't see the event because of their membership, membership_result.allowed=%s membership_result.joined=%s",
|
"_check_client_allowed_to_see_event(event=%s): Filtered out event because the user can't see the event because of their membership, membership_result.allowed=%s membership_result.joined=%s",
|
||||||
event.event_id,
|
event.event_id,
|
||||||
membership_result.allowed,
|
membership_result.allowed,
|
||||||
|
@ -378,7 +378,7 @@ def _check_client_allowed_to_see_event(
|
||||||
# If the sender has been erased and the user was not joined at the time, we
|
# If the sender has been erased and the user was not joined at the time, we
|
||||||
# must only return the redacted form.
|
# must only return the redacted form.
|
||||||
if sender_erased and not membership_result.joined:
|
if sender_erased and not membership_result.joined:
|
||||||
logger.debug(
|
filtered_event_logger.debug(
|
||||||
"_check_client_allowed_to_see_event(event=%s): Returning pruned event because `sender_erased` and the user was not joined at the time",
|
"_check_client_allowed_to_see_event(event=%s): Returning pruned event because `sender_erased` and the user was not joined at the time",
|
||||||
event.event_id,
|
event.event_id,
|
||||||
)
|
)
|
||||||
|
|
|
@ -53,4 +53,16 @@ def setup_logging() -> None:
|
||||||
log_level = os.environ.get("SYNAPSE_TEST_LOG_LEVEL", "ERROR")
|
log_level = os.environ.get("SYNAPSE_TEST_LOG_LEVEL", "ERROR")
|
||||||
root_logger.setLevel(log_level)
|
root_logger.setLevel(log_level)
|
||||||
|
|
||||||
|
# In order to not add noise by default (since we only log ERROR messages for trial
|
||||||
|
# tests as configured above), we only enable this for developers for looking for
|
||||||
|
# more INFO or DEBUG.
|
||||||
|
if root_logger.isEnabledFor(logging.INFO):
|
||||||
|
# Log when events are (maybe unexpectedly) filtered out of responses in tests. It's
|
||||||
|
# just nice to be able to look at the CI log and figure out why an event isn't being
|
||||||
|
# returned.
|
||||||
|
logging.getLogger("synapse.visibility.filtered_event_debug").setLevel(
|
||||||
|
logging.DEBUG
|
||||||
|
)
|
||||||
|
|
||||||
|
# Blow away the pyo3-log cache so that it reloads the configuration.
|
||||||
reset_logging_config()
|
reset_logging_config()
|
||||||
|
|
Loading…
Reference in New Issue