Address review issues, fix forward extremity calc
Keep track of all prev_events since if we know that an event is a prev_event it is referenced and does not qualify as a forward extremity.next
parent
591769d5f3
commit
74d530ae0e
|
@ -93,7 +93,10 @@ pub async fn get_pushrule_route(
|
||||||
if let Some(rule) = rule {
|
if let Some(rule) = rule {
|
||||||
Ok(get_pushrule::Response { rule }.into())
|
Ok(get_pushrule::Response { rule }.into())
|
||||||
} else {
|
} else {
|
||||||
Err(Error::BadRequest(ErrorKind::NotFound, "Push rule not found.").into())
|
Err(Error::BadRequest(
|
||||||
|
ErrorKind::NotFound,
|
||||||
|
"Push rule not found.",
|
||||||
|
))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -159,7 +159,8 @@ impl Database {
|
||||||
stateid_pduid: db.open_tree("stateid_pduid")?,
|
stateid_pduid: db.open_tree("stateid_pduid")?,
|
||||||
pduid_statehash: db.open_tree("pduid_statehash")?,
|
pduid_statehash: db.open_tree("pduid_statehash")?,
|
||||||
roomid_statehash: db.open_tree("roomid_statehash")?,
|
roomid_statehash: db.open_tree("roomid_statehash")?,
|
||||||
eventid_outlierpdu: db.open_tree("eventid_outlierpdu")?,
|
roomeventid_outlierpdu: db.open_tree("roomeventid_outlierpdu")?,
|
||||||
|
prevevent_parent: db.open_tree("prevevent_parent")?,
|
||||||
},
|
},
|
||||||
account_data: account_data::AccountData {
|
account_data: account_data::AccountData {
|
||||||
roomuserdataid_accountdata: db.open_tree("roomuserdataid_accountdata")?,
|
roomuserdataid_accountdata: db.open_tree("roomuserdataid_accountdata")?,
|
||||||
|
|
|
@ -27,7 +27,11 @@ pub struct Globals {
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Globals {
|
impl Globals {
|
||||||
pub fn load(globals: sled::Tree, server_keys: sled::Tree, config: Config) -> Result<Self> {
|
pub fn load(
|
||||||
|
globals: sled::Tree,
|
||||||
|
servertimeout_signingkey: sled::Tree,
|
||||||
|
config: Config,
|
||||||
|
) -> Result<Self> {
|
||||||
let bytes = &*globals
|
let bytes = &*globals
|
||||||
.update_and_fetch("keypair", utils::generate_keypair)?
|
.update_and_fetch("keypair", utils::generate_keypair)?
|
||||||
.expect("utils::generate_keypair always returns Some");
|
.expect("utils::generate_keypair always returns Some");
|
||||||
|
@ -84,7 +88,7 @@ impl Globals {
|
||||||
})?,
|
})?,
|
||||||
actual_destination_cache: Arc::new(RwLock::new(HashMap::new())),
|
actual_destination_cache: Arc::new(RwLock::new(HashMap::new())),
|
||||||
jwt_decoding_key,
|
jwt_decoding_key,
|
||||||
servertimeout_signingkey: server_keys,
|
servertimeout_signingkey,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -68,7 +68,9 @@ pub struct Rooms {
|
||||||
|
|
||||||
/// RoomId + EventId -> outlier PDU.
|
/// RoomId + EventId -> outlier PDU.
|
||||||
/// Any pdu that has passed the steps 1-8 in the incoming event /federation/send/txn.
|
/// Any pdu that has passed the steps 1-8 in the incoming event /federation/send/txn.
|
||||||
pub(super) eventid_outlierpdu: sled::Tree,
|
pub(super) roomeventid_outlierpdu: sled::Tree,
|
||||||
|
/// RoomId + EventId -> Parent PDU EventId.
|
||||||
|
pub(super) prevevent_parent: sled::Tree,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Rooms {
|
impl Rooms {
|
||||||
|
@ -92,7 +94,7 @@ impl Rooms {
|
||||||
Some(b) => serde_json::from_slice::<PduEvent>(&b)
|
Some(b) => serde_json::from_slice::<PduEvent>(&b)
|
||||||
.map_err(|_| Error::bad_database("Invalid PDU in db.")),
|
.map_err(|_| Error::bad_database("Invalid PDU in db.")),
|
||||||
None => self
|
None => self
|
||||||
.eventid_outlierpdu
|
.roomeventid_outlierpdu
|
||||||
.get(pduid)?
|
.get(pduid)?
|
||||||
.map(|b| {
|
.map(|b| {
|
||||||
serde_json::from_slice::<PduEvent>(&b)
|
serde_json::from_slice::<PduEvent>(&b)
|
||||||
|
@ -120,8 +122,6 @@ impl Rooms {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns a single PDU from `room_id` with key (`event_type`, `state_key`).
|
/// Returns a single PDU from `room_id` with key (`event_type`, `state_key`).
|
||||||
///
|
|
||||||
/// TODO: Should this check for outliers, it does now.
|
|
||||||
pub fn state_get(
|
pub fn state_get(
|
||||||
&self,
|
&self,
|
||||||
room_id: &RoomId,
|
room_id: &RoomId,
|
||||||
|
@ -153,7 +153,7 @@ impl Rooms {
|
||||||
Some(b) => serde_json::from_slice::<PduEvent>(&b)
|
Some(b) => serde_json::from_slice::<PduEvent>(&b)
|
||||||
.map_err(|_| Error::bad_database("Invalid PDU in db."))?,
|
.map_err(|_| Error::bad_database("Invalid PDU in db."))?,
|
||||||
None => self
|
None => self
|
||||||
.eventid_outlierpdu
|
.roomeventid_outlierpdu
|
||||||
.get(pdu_id)?
|
.get(pdu_id)?
|
||||||
.map(|b| {
|
.map(|b| {
|
||||||
serde_json::from_slice::<PduEvent>(&b)
|
serde_json::from_slice::<PduEvent>(&b)
|
||||||
|
@ -203,7 +203,7 @@ impl Rooms {
|
||||||
&event_type,
|
&event_type,
|
||||||
&state_key
|
&state_key
|
||||||
.as_deref()
|
.as_deref()
|
||||||
.expect("found a non state event in auth events"),
|
.ok_or_else(|| Error::bad_database("Saved auth event with no state key."))?,
|
||||||
)? {
|
)? {
|
||||||
events.insert((event_type, state_key), pdu);
|
events.insert((event_type, state_key), pdu);
|
||||||
}
|
}
|
||||||
|
@ -248,7 +248,7 @@ impl Rooms {
|
||||||
let mut prefix = state_hash.to_vec();
|
let mut prefix = state_hash.to_vec();
|
||||||
prefix.push(0xff);
|
prefix.push(0xff);
|
||||||
|
|
||||||
for ((event_type, state_key), pdu_id) in state {
|
for ((event_type, state_key), id_long) in state {
|
||||||
let mut statekey = event_type.as_ref().as_bytes().to_vec();
|
let mut statekey = event_type.as_ref().as_bytes().to_vec();
|
||||||
statekey.push(0xff);
|
statekey.push(0xff);
|
||||||
statekey.extend_from_slice(&state_key.as_bytes());
|
statekey.extend_from_slice(&state_key.as_bytes());
|
||||||
|
@ -266,7 +266,7 @@ impl Rooms {
|
||||||
|
|
||||||
// Because of outliers this could also be an eventID but that
|
// Because of outliers this could also be an eventID but that
|
||||||
// is handled by `state_full`
|
// is handled by `state_full`
|
||||||
let pdu_id_short = pdu_id
|
let pdu_id_short = id_long
|
||||||
.splitn(2, |&b| b == 0xff)
|
.splitn(2, |&b| b == 0xff)
|
||||||
.nth(1)
|
.nth(1)
|
||||||
.ok_or_else(|| Error::bad_database("Invalid pduid in state."))?;
|
.ok_or_else(|| Error::bad_database("Invalid pduid in state."))?;
|
||||||
|
@ -332,7 +332,7 @@ impl Rooms {
|
||||||
serde_json::from_slice(&match self.pduid_pdu.get(&pdu_id)? {
|
serde_json::from_slice(&match self.pduid_pdu.get(&pdu_id)? {
|
||||||
Some(b) => b,
|
Some(b) => b,
|
||||||
None => self
|
None => self
|
||||||
.eventid_outlierpdu
|
.roomeventid_outlierpdu
|
||||||
.get(event_id.as_bytes())?
|
.get(event_id.as_bytes())?
|
||||||
.ok_or_else(|| {
|
.ok_or_else(|| {
|
||||||
Error::bad_database("Event is not in pdu tree or outliers.")
|
Error::bad_database("Event is not in pdu tree or outliers.")
|
||||||
|
@ -360,12 +360,10 @@ impl Rooms {
|
||||||
Ok(Some(
|
Ok(Some(
|
||||||
serde_json::from_slice(&match self.pduid_pdu.get(&pdu_id)? {
|
serde_json::from_slice(&match self.pduid_pdu.get(&pdu_id)? {
|
||||||
Some(b) => b,
|
Some(b) => b,
|
||||||
None => self
|
None => match self.roomeventid_outlierpdu.get(event_id.as_bytes())? {
|
||||||
.eventid_outlierpdu
|
Some(b) => b,
|
||||||
.get(event_id.as_bytes())?
|
None => return Ok(None),
|
||||||
.ok_or_else(|| {
|
},
|
||||||
Error::bad_database("Event is not in pdu tree or outliers.")
|
|
||||||
})?,
|
|
||||||
})
|
})
|
||||||
.map_err(|_| Error::bad_database("Invalid PDU in db."))?,
|
.map_err(|_| Error::bad_database("Invalid PDU in db."))?,
|
||||||
))
|
))
|
||||||
|
@ -373,6 +371,8 @@ impl Rooms {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns the pdu.
|
/// Returns the pdu.
|
||||||
|
///
|
||||||
|
/// This does __NOT__ check the outliers `Tree`.
|
||||||
pub fn get_pdu_from_id(&self, pdu_id: &IVec) -> Result<Option<PduEvent>> {
|
pub fn get_pdu_from_id(&self, pdu_id: &IVec) -> Result<Option<PduEvent>> {
|
||||||
self.pduid_pdu.get(pdu_id)?.map_or(Ok(None), |pdu| {
|
self.pduid_pdu.get(pdu_id)?.map_or(Ok(None), |pdu| {
|
||||||
Ok(Some(
|
Ok(Some(
|
||||||
|
@ -436,7 +436,7 @@ impl Rooms {
|
||||||
|
|
||||||
/// Replace the leaves of a room.
|
/// Replace the leaves of a room.
|
||||||
///
|
///
|
||||||
/// The provided `event_ids` become the new leaves, this enables an event having multiple
|
/// The provided `event_ids` become the new leaves, this allows a room to have multiple
|
||||||
/// `prev_events`.
|
/// `prev_events`.
|
||||||
pub fn replace_pdu_leaves(&self, room_id: &RoomId, event_ids: &[EventId]) -> Result<()> {
|
pub fn replace_pdu_leaves(&self, room_id: &RoomId, event_ids: &[EventId]) -> Result<()> {
|
||||||
let mut prefix = room_id.as_bytes().to_vec();
|
let mut prefix = room_id.as_bytes().to_vec();
|
||||||
|
@ -455,31 +455,42 @@ impl Rooms {
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn is_pdu_referenced(&self, pdu: &PduEvent) -> Result<bool> {
|
||||||
|
let mut key = pdu.room_id().as_bytes().to_vec();
|
||||||
|
key.extend_from_slice(pdu.event_id().as_bytes());
|
||||||
|
self.prevevent_parent.contains_key(key).map_err(Into::into)
|
||||||
|
}
|
||||||
|
|
||||||
/// Returns the pdu from the outlier tree.
|
/// Returns the pdu from the outlier tree.
|
||||||
pub fn get_pdu_outlier(&self, event_id: &EventId) -> Result<Option<PduEvent>> {
|
pub fn get_pdu_outlier(&self, event_id: &EventId) -> Result<Option<PduEvent>> {
|
||||||
self.eventid_outlierpdu
|
self.roomeventid_outlierpdu
|
||||||
.get(event_id.as_bytes())?
|
.get(event_id.as_bytes())?
|
||||||
.map_or(Ok(None), |pdu| {
|
.map_or(Ok(None), |pdu| {
|
||||||
serde_json::from_slice(&pdu).map_err(|_| Error::bad_database("Invalid PDU in db."))
|
serde_json::from_slice(&pdu).map_err(|_| Error::bad_database("Invalid PDU in db."))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns true if the event_id was previously inserted.
|
/// Append the PDU as an outlier.
|
||||||
pub fn append_pdu_outlier(&self, pdu: &PduEvent) -> Result<bool> {
|
///
|
||||||
log::info!("Number of outlier pdu's {}", self.eventid_outlierpdu.len());
|
/// Any event given to this will be processed (state-res) on another thread.
|
||||||
|
pub fn append_pdu_outlier(&self, pdu: &PduEvent) -> Result<()> {
|
||||||
|
log::info!(
|
||||||
|
"Number of outlier pdu's {}",
|
||||||
|
self.roomeventid_outlierpdu.len()
|
||||||
|
);
|
||||||
|
|
||||||
let mut key = pdu.room_id().as_bytes().to_vec();
|
let mut key = pdu.room_id().as_bytes().to_vec();
|
||||||
key.push(0xff);
|
key.push(0xff);
|
||||||
key.extend_from_slice(pdu.event_id().as_bytes());
|
key.extend_from_slice(pdu.event_id().as_bytes());
|
||||||
|
|
||||||
let res = self
|
self.eventid_pduid
|
||||||
.eventid_outlierpdu
|
.insert(pdu.event_id().as_bytes(), key.as_slice())?;
|
||||||
.insert(
|
|
||||||
|
self.roomeventid_outlierpdu.insert(
|
||||||
&key,
|
&key,
|
||||||
&*serde_json::to_string(&pdu).expect("PduEvent is always a valid String"),
|
&*serde_json::to_string(&pdu).expect("PduEvent is always a valid String"),
|
||||||
)
|
)?;
|
||||||
.map(|op| op.is_some())?;
|
Ok(())
|
||||||
Ok(res)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Creates a new persisted data unit and adds it to a room.
|
/// Creates a new persisted data unit and adds it to a room.
|
||||||
|
@ -526,7 +537,15 @@ impl Rooms {
|
||||||
let mut key = pdu.room_id().as_bytes().to_vec();
|
let mut key = pdu.room_id().as_bytes().to_vec();
|
||||||
key.push(0xff);
|
key.push(0xff);
|
||||||
key.extend_from_slice(pdu.event_id().as_bytes());
|
key.extend_from_slice(pdu.event_id().as_bytes());
|
||||||
self.eventid_outlierpdu.remove(key)?;
|
self.roomeventid_outlierpdu.remove(key)?;
|
||||||
|
|
||||||
|
// We must keep track of all events that have been referenced.
|
||||||
|
for leaf in leaves {
|
||||||
|
let mut key = pdu.room_id().as_bytes().to_vec();
|
||||||
|
key.extend_from_slice(leaf.as_bytes());
|
||||||
|
self.prevevent_parent
|
||||||
|
.insert(key, pdu.event_id().as_bytes())?;
|
||||||
|
}
|
||||||
|
|
||||||
self.replace_pdu_leaves(&pdu.room_id, leaves)?;
|
self.replace_pdu_leaves(&pdu.room_id, leaves)?;
|
||||||
|
|
||||||
|
@ -541,6 +560,8 @@ impl Rooms {
|
||||||
.expect("CanonicalJsonObject is always a valid String"),
|
.expect("CanonicalJsonObject is always a valid String"),
|
||||||
)?;
|
)?;
|
||||||
|
|
||||||
|
// This also replaces the eventid of any outliers with the correct
|
||||||
|
// pduid, removing the place holder.
|
||||||
self.eventid_pduid
|
self.eventid_pduid
|
||||||
.insert(pdu.event_id.as_bytes(), &*pdu_id)?;
|
.insert(pdu.event_id.as_bytes(), &*pdu_id)?;
|
||||||
|
|
||||||
|
|
|
@ -571,8 +571,6 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
}
|
}
|
||||||
|
|
||||||
// If we know of this pdu we don't need to continue processing it
|
// If we know of this pdu we don't need to continue processing it
|
||||||
//
|
|
||||||
// This check is essentially
|
|
||||||
if let Ok(Some(_)) = db.rooms.get_pdu_id(&event_id) {
|
if let Ok(Some(_)) = db.rooms.get_pdu_id(&event_id) {
|
||||||
return None;
|
return None;
|
||||||
}
|
}
|
||||||
|
@ -664,10 +662,11 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
// the checks in this list starting at 1. These are not timeline events.
|
// the checks in this list starting at 1. These are not timeline events.
|
||||||
//
|
//
|
||||||
// Step 10. check the auth of the event passes based on the calculated state of the event
|
// Step 10. check the auth of the event passes based on the calculated state of the event
|
||||||
let (mut state_at_event, incoming_auth_events): (
|
//
|
||||||
StateMap<Arc<PduEvent>>,
|
// TODO: if we know the prev_events of the incoming event we can avoid the request and build
|
||||||
Vec<Arc<PduEvent>>,
|
// the state from a known point and resolve if > 1 prev_event
|
||||||
) = match db
|
let (state_at_event, incoming_auth_events): (StateMap<Arc<PduEvent>>, Vec<Arc<PduEvent>>) =
|
||||||
|
match db
|
||||||
.sending
|
.sending
|
||||||
.send_federation_request(
|
.send_federation_request(
|
||||||
&db.globals,
|
&db.globals,
|
||||||
|
@ -693,7 +692,8 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
for ev in &state {
|
for ev in &state {
|
||||||
// If the key is already present
|
// If the key is already present
|
||||||
if !seen.insert((&ev.kind, &ev.state_key)) {
|
if !seen.insert((&ev.kind, &ev.state_key)) {
|
||||||
todo!("Server sent us an invalid state")
|
error!("Server sent us an invalid state");
|
||||||
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -764,6 +764,7 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
pdu.event_id().clone(),
|
pdu.event_id().clone(),
|
||||||
Err("Event has been soft failed".into()),
|
Err("Event has been soft failed".into()),
|
||||||
);
|
);
|
||||||
|
continue;
|
||||||
};
|
};
|
||||||
|
|
||||||
// Step 11. Ensure that the state is derived from the previous current state (i.e. we calculated by doing state res
|
// Step 11. Ensure that the state is derived from the previous current state (i.e. we calculated by doing state res
|
||||||
|
@ -779,10 +780,6 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
// Now that the event has passed all auth it is added into the timeline, we do have to
|
|
||||||
// find the leaves otherwise we would do this sooner
|
|
||||||
append_incoming_pdu(&db, &pdu, &extremities, &state_at_event)?;
|
|
||||||
|
|
||||||
// This will create the state after any state snapshot it builds
|
// This will create the state after any state snapshot it builds
|
||||||
// So current_state will have the incoming event inserted to it
|
// So current_state will have the incoming event inserted to it
|
||||||
let mut fork_states = match build_forward_extremity_snapshots(
|
let mut fork_states = match build_forward_extremity_snapshots(
|
||||||
|
@ -805,10 +802,11 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
|
|
||||||
// Make this the state after (since we appended_incoming_pdu this should agree with our servers
|
// Make this the state after (since we appended_incoming_pdu this should agree with our servers
|
||||||
// current state).
|
// current state).
|
||||||
state_at_event.insert((pdu.kind(), pdu.state_key()), pdu.clone());
|
let mut state_after = state_at_event.clone();
|
||||||
// add the incoming events to the mix of state snapshots
|
state_after.insert((pdu.kind(), pdu.state_key()), pdu.clone());
|
||||||
|
// Add the incoming event to the mix of state snapshots
|
||||||
// Since we are using a BTreeSet (yea this may be overkill) we guarantee unique state sets
|
// Since we are using a BTreeSet (yea this may be overkill) we guarantee unique state sets
|
||||||
fork_states.insert(state_at_event.clone());
|
fork_states.insert(state_after.clone());
|
||||||
|
|
||||||
let fork_states = fork_states.into_iter().collect::<Vec<_>>();
|
let fork_states = fork_states.into_iter().collect::<Vec<_>>();
|
||||||
|
|
||||||
|
@ -826,39 +824,27 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
update_state = true;
|
update_state = true;
|
||||||
|
|
||||||
// TODO: remove this is for current debugging Jan, 15 2021
|
// TODO: remove this is for current debugging Jan, 15 2021
|
||||||
let mut number_fetches = 0_u32;
|
|
||||||
let mut auth_events = vec![];
|
let mut auth_events = vec![];
|
||||||
for map in &fork_states {
|
for map in &fork_states {
|
||||||
let mut state_auth = vec![];
|
let mut state_auth = vec![];
|
||||||
for auth_id in map.values().flat_map(|pdu| &pdu.auth_events) {
|
for auth_id in map.values().flat_map(|pdu| &pdu.auth_events) {
|
||||||
let event = match auth_cache.get(auth_id) {
|
let event = match auth_cache.get(auth_id) {
|
||||||
Some(aev) => aev.clone(),
|
Some(aev) => aev.clone(),
|
||||||
// We should know about every event at this point but just incase...
|
// The only events that haven't been added to the auth cache are
|
||||||
None => match fetch_events(
|
// events we have knowledge of previously
|
||||||
&db,
|
None => {
|
||||||
server_name,
|
error!("Event was not present in auth_cache {}", auth_id);
|
||||||
&pub_key_map,
|
resolved_map.insert(
|
||||||
&[auth_id.clone()],
|
event_id.clone(),
|
||||||
&mut auth_cache,
|
Err("Event was not present in auth cache".into()),
|
||||||
)
|
);
|
||||||
.await
|
|
||||||
.map(|mut vec| {
|
|
||||||
number_fetches += 1;
|
|
||||||
vec.pop()
|
|
||||||
}) {
|
|
||||||
Ok(Some(aev)) => aev,
|
|
||||||
_ => {
|
|
||||||
resolved_map
|
|
||||||
.insert(event_id.clone(), Err("Failed to fetch event".into()));
|
|
||||||
continue 'main_pdu_loop;
|
continue 'main_pdu_loop;
|
||||||
}
|
}
|
||||||
},
|
|
||||||
};
|
};
|
||||||
state_auth.push(event);
|
state_auth.push(event);
|
||||||
}
|
}
|
||||||
auth_events.push(state_auth);
|
auth_events.push(state_auth);
|
||||||
}
|
}
|
||||||
info!("{} event's were not in the auth_cache", number_fetches);
|
|
||||||
|
|
||||||
// Add everything we will need to event_map
|
// Add everything we will need to event_map
|
||||||
auth_cache.extend(
|
auth_cache.extend(
|
||||||
|
@ -873,7 +859,7 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
.map(|pdu| (pdu.event_id().clone(), pdu)),
|
.map(|pdu| (pdu.event_id().clone(), pdu)),
|
||||||
);
|
);
|
||||||
auth_cache.extend(
|
auth_cache.extend(
|
||||||
state_at_event
|
state_after
|
||||||
.into_iter()
|
.into_iter()
|
||||||
.map(|(_, pdu)| (pdu.event_id().clone(), pdu)),
|
.map(|(_, pdu)| (pdu.event_id().clone(), pdu)),
|
||||||
);
|
);
|
||||||
|
@ -911,25 +897,25 @@ pub async fn send_transaction_message_route<'a>(
|
||||||
let pdu = match auth_cache.get(&id) {
|
let pdu = match auth_cache.get(&id) {
|
||||||
Some(pdu) => pdu.clone(),
|
Some(pdu) => pdu.clone(),
|
||||||
None => {
|
None => {
|
||||||
match fetch_events(&db, server_name, &pub_key_map, &[id], &mut auth_cache)
|
error!("Event was not present in auth_cache {}", id);
|
||||||
.await
|
resolved_map.insert(
|
||||||
.map(|mut vec| vec.pop())
|
event_id.clone(),
|
||||||
{
|
Err("Event was not present in auth cache".into()),
|
||||||
Ok(Some(aev)) => aev,
|
);
|
||||||
_ => {
|
|
||||||
resolved_map
|
|
||||||
.insert(event_id.clone(), Err("Failed to fetch event".into()));
|
|
||||||
continue 'main_pdu_loop;
|
continue 'main_pdu_loop;
|
||||||
}
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
resolved.insert(k, pdu);
|
resolved.insert(k, pdu);
|
||||||
}
|
}
|
||||||
resolved
|
resolved
|
||||||
};
|
};
|
||||||
|
|
||||||
// Add the event to the DB and update the forward extremities (via roomid_pduleaves).
|
// Now that the event has passed all auth it is added into the timeline.
|
||||||
|
// We use the `state_at_event` instead of `state_after` so we accurately
|
||||||
|
// represent the state for this event.
|
||||||
|
append_incoming_pdu(&db, &pdu, &extremities, &state_at_event)?;
|
||||||
|
|
||||||
|
// Set the new room state to the resolved state
|
||||||
update_resolved_state(
|
update_resolved_state(
|
||||||
&db,
|
&db,
|
||||||
pdu.room_id(),
|
pdu.room_id(),
|
||||||
|
@ -1046,8 +1032,6 @@ fn validate_event<'a>(
|
||||||
/// TODO: don't add as outlier if event is fetched as a result of gathering auth_events
|
/// TODO: don't add as outlier if event is fetched as a result of gathering auth_events
|
||||||
/// The check in `fetch_check_auth_events` is that a complete chain is found for the
|
/// The check in `fetch_check_auth_events` is that a complete chain is found for the
|
||||||
/// events `auth_events`. If the chain is found to have any missing events it fails.
|
/// events `auth_events`. If the chain is found to have any missing events it fails.
|
||||||
///
|
|
||||||
/// The `auth_cache` is filled instead of returning a `Vec`.
|
|
||||||
async fn fetch_check_auth_events(
|
async fn fetch_check_auth_events(
|
||||||
db: &Database,
|
db: &Database,
|
||||||
origin: &ServerName,
|
origin: &ServerName,
|
||||||
|
@ -1073,7 +1057,6 @@ async fn fetch_check_auth_events(
|
||||||
})??;
|
})??;
|
||||||
|
|
||||||
stack.extend(ev.auth_events());
|
stack.extend(ev.auth_events());
|
||||||
auth_cache.insert(ev.event_id().clone(), ev);
|
|
||||||
}
|
}
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
@ -1085,6 +1068,9 @@ async fn fetch_check_auth_events(
|
||||||
/// 2. Look at outlier pdu tree
|
/// 2. Look at outlier pdu tree
|
||||||
/// 3. Ask origin server over federation
|
/// 3. Ask origin server over federation
|
||||||
/// 4. TODO: Ask other servers over federation?
|
/// 4. TODO: Ask other servers over federation?
|
||||||
|
///
|
||||||
|
/// If the event is unknown to the `auth_cache` it is added. This guarantees that any
|
||||||
|
/// event we need to know of will be present.
|
||||||
pub(crate) async fn fetch_events(
|
pub(crate) async fn fetch_events(
|
||||||
db: &Database,
|
db: &Database,
|
||||||
origin: &ServerName,
|
origin: &ServerName,
|
||||||
|
@ -1118,6 +1104,7 @@ pub(crate) async fn fetch_events(
|
||||||
Err(_) => return Err(Error::BadServerResponse("Failed to fetch event")),
|
Err(_) => return Err(Error::BadServerResponse("Failed to fetch event")),
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
|
auth_cache.entry(id.clone()).or_insert_with(|| pdu.clone());
|
||||||
pdus.push(pdu);
|
pdus.push(pdu);
|
||||||
}
|
}
|
||||||
Ok(pdus)
|
Ok(pdus)
|
||||||
|
@ -1167,13 +1154,9 @@ pub(crate) async fn calculate_forward_extremities(
|
||||||
// If the incoming event is already referenced by an existing event
|
// If the incoming event is already referenced by an existing event
|
||||||
// then do nothing - it's not a candidate to be a new extremity if
|
// then do nothing - it's not a candidate to be a new extremity if
|
||||||
// it has been referenced.
|
// it has been referenced.
|
||||||
//
|
if db.rooms.is_pdu_referenced(pdu)? {
|
||||||
// We check this in the filter just before the main incoming PDU for loop
|
is_incoming_leaf = false;
|
||||||
// so no already known event can make it this far.
|
}
|
||||||
//
|
|
||||||
// if db.rooms.get_pdu_id(pdu.event_id())?.is_some() {
|
|
||||||
// is_incoming_leaf = db.rooms.get_pdu_outlier(pdu.event_id())?.is_some();
|
|
||||||
// }
|
|
||||||
|
|
||||||
// TODO:
|
// TODO:
|
||||||
// [dendrite] Checks if any other leaves have been referenced and removes them
|
// [dendrite] Checks if any other leaves have been referenced and removes them
|
||||||
|
@ -1217,10 +1200,16 @@ pub(crate) async fn build_forward_extremity_snapshots(
|
||||||
let mut includes_current_state = false;
|
let mut includes_current_state = false;
|
||||||
let mut fork_states = BTreeSet::new();
|
let mut fork_states = BTreeSet::new();
|
||||||
for id in current_leaves {
|
for id in current_leaves {
|
||||||
if let Some(id) = db.rooms.get_pdu_id(id)? {
|
match db.rooms.get_pdu_id(id)? {
|
||||||
|
// We can skip this because it is handled outside of this function
|
||||||
|
// The current server state and incoming event state are built to be
|
||||||
|
// the state after.
|
||||||
|
// This would be the incoming state from the server.
|
||||||
|
Some(_) if id == pdu.event_id() => {}
|
||||||
|
Some(pduid) if db.rooms.get_pdu_from_id(&pduid)?.is_some() => {
|
||||||
let state_hash = db
|
let state_hash = db
|
||||||
.rooms
|
.rooms
|
||||||
.pdu_state_hash(&id)?
|
.pdu_state_hash(&pduid)?
|
||||||
.expect("found pdu with no statehash");
|
.expect("found pdu with no statehash");
|
||||||
|
|
||||||
if current_hash.as_ref() == Some(&state_hash) {
|
if current_hash.as_ref() == Some(&state_hash) {
|
||||||
|
@ -1235,16 +1224,14 @@ pub(crate) async fn build_forward_extremity_snapshots(
|
||||||
.collect::<StateMap<_>>();
|
.collect::<StateMap<_>>();
|
||||||
|
|
||||||
// Now it's the state after
|
// Now it's the state after
|
||||||
if let Some(pdu) = db.rooms.get_pdu_from_id(&id)? {
|
if let Some(pdu) = db.rooms.get_pdu_from_id(&pduid)? {
|
||||||
let key = (pdu.kind.clone(), pdu.state_key());
|
let key = (pdu.kind.clone(), pdu.state_key());
|
||||||
state_before.insert(key, Arc::new(pdu));
|
state_before.insert(key, Arc::new(pdu));
|
||||||
}
|
}
|
||||||
|
|
||||||
fork_states.insert(state_before);
|
fork_states.insert(state_before);
|
||||||
} else if id == pdu.event_id() {
|
}
|
||||||
// We add this snapshot after `build_forward_extremity_snapshots` is
|
_ => {
|
||||||
// called which we requested from the sending server
|
|
||||||
} else {
|
|
||||||
error!("Missing state snapshot for {:?} - {:?}", id, pdu.kind());
|
error!("Missing state snapshot for {:?} - {:?}", id, pdu.kind());
|
||||||
|
|
||||||
let res = db
|
let res = db
|
||||||
|
@ -1263,7 +1250,8 @@ pub(crate) async fn build_forward_extremity_snapshots(
|
||||||
// do this...
|
// do this...
|
||||||
fetch_events(&db, origin, pub_key_map, &res.auth_chain_ids, auth_cache).await?;
|
fetch_events(&db, origin, pub_key_map, &res.auth_chain_ids, auth_cache).await?;
|
||||||
|
|
||||||
let mut state_before = fetch_events(&db, origin, pub_key_map, &res.pdu_ids, auth_cache)
|
let mut state_before =
|
||||||
|
fetch_events(&db, origin, pub_key_map, &res.pdu_ids, auth_cache)
|
||||||
.await?
|
.await?
|
||||||
.into_iter()
|
.into_iter()
|
||||||
.map(|pdu| ((pdu.kind.clone(), pdu.state_key.clone()), pdu))
|
.map(|pdu| ((pdu.kind.clone(), pdu.state_key.clone()), pdu))
|
||||||
|
@ -1281,10 +1269,10 @@ pub(crate) async fn build_forward_extremity_snapshots(
|
||||||
fork_states.insert(state_before);
|
fork_states.insert(state_before);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// This guarantees that our current room state is included
|
// This guarantees that our current room state is included
|
||||||
if !includes_current_state && current_hash.is_some() {
|
if !includes_current_state {
|
||||||
error!("Did not include current state");
|
|
||||||
current_state.insert((pdu.kind(), pdu.state_key()), pdu);
|
current_state.insert((pdu.kind(), pdu.state_key()), pdu);
|
||||||
|
|
||||||
fork_states.insert(current_state);
|
fork_states.insert(current_state);
|
||||||
|
@ -1316,18 +1304,7 @@ pub(crate) fn update_resolved_state(
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
None => {
|
None => {
|
||||||
let mut pduid = pdu.room_id().as_bytes().to_vec();
|
error!("We are missing a state event for the current room state.");
|
||||||
pduid.push(0xff);
|
|
||||||
pduid.extend_from_slice(pdu.event_id().as_bytes());
|
|
||||||
new_state.insert(
|
|
||||||
(
|
|
||||||
ev_type,
|
|
||||||
state_k.ok_or_else(|| {
|
|
||||||
Error::Conflict("State contained non state event")
|
|
||||||
})?,
|
|
||||||
),
|
|
||||||
pduid,
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1349,9 +1326,9 @@ pub(crate) fn append_incoming_pdu(
|
||||||
// Update the state of the room if needed
|
// Update the state of the room if needed
|
||||||
// We can tell if we need to do this based on wether state resolution took place or not
|
// We can tell if we need to do this based on wether state resolution took place or not
|
||||||
let mut new_state = HashMap::new();
|
let mut new_state = HashMap::new();
|
||||||
for ((ev_type, state_k), pdu) in state {
|
for ((ev_type, state_k), state_pdu) in state {
|
||||||
match db.rooms.get_pdu_id(pdu.event_id())? {
|
match db.rooms.get_pdu_id(state_pdu.event_id())? {
|
||||||
Some(pduid) => {
|
Some(state_pduid) => {
|
||||||
new_state.insert(
|
new_state.insert(
|
||||||
(
|
(
|
||||||
ev_type.clone(),
|
ev_type.clone(),
|
||||||
|
@ -1359,12 +1336,10 @@ pub(crate) fn append_incoming_pdu(
|
||||||
.clone()
|
.clone()
|
||||||
.ok_or_else(|| Error::Conflict("State contained non state event"))?,
|
.ok_or_else(|| Error::Conflict("State contained non state event"))?,
|
||||||
),
|
),
|
||||||
pduid.to_vec(),
|
state_pduid.to_vec(),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
None => {
|
None => error!("We are missing a state event for the incoming event snapshot"),
|
||||||
error!("We didn't append an event as an outlier\n{:?}", pdu);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue