improvement: efficient /sync, mutex for federation transactions
This commit is contained in:
		
							parent
							
								
									1c25492a7e
								
							
						
					
					
						commit
						e15e6d4405
					
				
					 5 changed files with 359 additions and 263 deletions
				
			
		|  | @ -902,19 +902,37 @@ pub async fn invite_helper( | ||||||
|         ) |         ) | ||||||
|         .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Origin field is invalid."))?; |         .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Origin field is invalid."))?; | ||||||
| 
 | 
 | ||||||
|         let pdu_id = |         let mutex = Arc::clone( | ||||||
|             server_server::handle_incoming_pdu(&origin, &event_id, value, true, &db, &pub_key_map) |             db.globals | ||||||
|                 .await |                 .roomid_mutex | ||||||
|                 .map_err(|_| { |                 .write() | ||||||
|                     Error::BadRequest( |                 .unwrap() | ||||||
|                         ErrorKind::InvalidParam, |                 .entry(room_id.clone()) | ||||||
|                         "Error while handling incoming PDU.", |                 .or_default(), | ||||||
|                     ) |         ); | ||||||
|                 })? |         let mutex_lock = mutex.lock().await; | ||||||
|                 .ok_or(Error::BadRequest( | 
 | ||||||
|                     ErrorKind::InvalidParam, |         let pdu_id = server_server::handle_incoming_pdu( | ||||||
|                     "Could not accept incoming PDU as timeline event.", |             &origin, | ||||||
|                 ))?; |             &event_id, | ||||||
|  |             &room_id, | ||||||
|  |             value, | ||||||
|  |             true, | ||||||
|  |             &db, | ||||||
|  |             &pub_key_map, | ||||||
|  |         ) | ||||||
|  |         .await | ||||||
|  |         .map_err(|_| { | ||||||
|  |             Error::BadRequest( | ||||||
|  |                 ErrorKind::InvalidParam, | ||||||
|  |                 "Error while handling incoming PDU.", | ||||||
|  |             ) | ||||||
|  |         })? | ||||||
|  |         .ok_or(Error::BadRequest( | ||||||
|  |             ErrorKind::InvalidParam, | ||||||
|  |             "Could not accept incoming PDU as timeline event.", | ||||||
|  |         ))?; | ||||||
|  |         drop(mutex_lock); | ||||||
| 
 | 
 | ||||||
|         for server in db |         for server in db | ||||||
|             .rooms |             .rooms | ||||||
|  |  | ||||||
|  | @ -227,13 +227,16 @@ async fn sync_helper( | ||||||
| 
 | 
 | ||||||
|         // Database queries:
 |         // Database queries:
 | ||||||
| 
 | 
 | ||||||
|         let current_shortstatehash = db.rooms.current_shortstatehash(&room_id)?; |         let current_shortstatehash = db | ||||||
|  |             .rooms | ||||||
|  |             .current_shortstatehash(&room_id)? | ||||||
|  |             .expect("All rooms have state"); | ||||||
| 
 | 
 | ||||||
|         // These type is Option<Option<_>>. The outer Option is None when there is no event between
 |         let first_pdu_before_since = db | ||||||
|         // since and the current room state, meaning there should be no updates.
 |             .rooms | ||||||
|         // The inner Option is None when there is an event, but there is no state hash associated
 |             .pdus_until(&sender_user, &room_id, since) | ||||||
|         // with it. This can happen for the RoomCreate event, so all updates should arrive.
 |             .next() | ||||||
|         let first_pdu_before_since = db.rooms.pdus_until(&sender_user, &room_id, since).next(); |             .transpose()?; | ||||||
| 
 | 
 | ||||||
|         let pdus_after_since = db |         let pdus_after_since = db | ||||||
|             .rooms |             .rooms | ||||||
|  | @ -241,11 +244,78 @@ async fn sync_helper( | ||||||
|             .next() |             .next() | ||||||
|             .is_some(); |             .is_some(); | ||||||
| 
 | 
 | ||||||
|         let since_shortstatehash = first_pdu_before_since.as_ref().map(|pdu| { |         let since_shortstatehash = first_pdu_before_since | ||||||
|             db.rooms |             .as_ref() | ||||||
|                 .pdu_shortstatehash(&pdu.as_ref().ok()?.1.event_id) |             .map(|pdu| { | ||||||
|                 .ok()? |                 db.rooms | ||||||
|         }); |                     .pdu_shortstatehash(&pdu.1.event_id) | ||||||
|  |                     .transpose() | ||||||
|  |                     .expect("all pdus have state") | ||||||
|  |             }) | ||||||
|  |             .transpose()?; | ||||||
|  | 
 | ||||||
|  |         // Calculates joined_member_count, invited_member_count and heroes
 | ||||||
|  |         let calculate_counts = || { | ||||||
|  |             let joined_member_count = db.rooms.room_members(&room_id).count(); | ||||||
|  |             let invited_member_count = db.rooms.room_members_invited(&room_id).count(); | ||||||
|  | 
 | ||||||
|  |             // Recalculate heroes (first 5 members)
 | ||||||
|  |             let mut heroes = Vec::new(); | ||||||
|  | 
 | ||||||
|  |             if joined_member_count + invited_member_count <= 5 { | ||||||
|  |                 // Go through all PDUs and for each member event, check if the user is still joined or
 | ||||||
|  |                 // invited until we have 5 or we reach the end
 | ||||||
|  | 
 | ||||||
|  |                 for hero in db | ||||||
|  |                     .rooms | ||||||
|  |                     .all_pdus(&sender_user, &room_id) | ||||||
|  |                     .filter_map(|pdu| pdu.ok()) // Ignore all broken pdus
 | ||||||
|  |                     .filter(|(_, pdu)| pdu.kind == EventType::RoomMember) | ||||||
|  |                     .map(|(_, pdu)| { | ||||||
|  |                         let content = serde_json::from_value::< | ||||||
|  |                             ruma::events::room::member::MemberEventContent, | ||||||
|  |                         >(pdu.content.clone()) | ||||||
|  |                         .map_err(|_| Error::bad_database("Invalid member event in database."))?; | ||||||
|  | 
 | ||||||
|  |                         if let Some(state_key) = &pdu.state_key { | ||||||
|  |                             let user_id = UserId::try_from(state_key.clone()).map_err(|_| { | ||||||
|  |                                 Error::bad_database("Invalid UserId in member PDU.") | ||||||
|  |                             })?; | ||||||
|  | 
 | ||||||
|  |                             // The membership was and still is invite or join
 | ||||||
|  |                             if matches!( | ||||||
|  |                                 content.membership, | ||||||
|  |                                 MembershipState::Join | MembershipState::Invite | ||||||
|  |                             ) && (db.rooms.is_joined(&user_id, &room_id)? | ||||||
|  |                                 || db.rooms.is_invited(&user_id, &room_id)?) | ||||||
|  |                             { | ||||||
|  |                                 Ok::<_, Error>(Some(state_key.clone())) | ||||||
|  |                             } else { | ||||||
|  |                                 Ok(None) | ||||||
|  |                             } | ||||||
|  |                         } else { | ||||||
|  |                             Ok(None) | ||||||
|  |                         } | ||||||
|  |                     }) | ||||||
|  |                     // Filter out buggy users
 | ||||||
|  |                     .filter_map(|u| u.ok()) | ||||||
|  |                     // Filter for possible heroes
 | ||||||
|  |                     .flatten() | ||||||
|  |                 { | ||||||
|  |                     if heroes.contains(&hero) || hero == sender_user.as_str() { | ||||||
|  |                         continue; | ||||||
|  |                     } | ||||||
|  | 
 | ||||||
|  |                     heroes.push(hero); | ||||||
|  |                 } | ||||||
|  |             } | ||||||
|  | 
 | ||||||
|  |             ( | ||||||
|  |                 Some(joined_member_count), | ||||||
|  |                 Some(invited_member_count), | ||||||
|  |                 heroes, | ||||||
|  |             ) | ||||||
|  |         }; | ||||||
| 
 | 
 | ||||||
|         let ( |         let ( | ||||||
|             heroes, |             heroes, | ||||||
|  | @ -253,63 +323,107 @@ async fn sync_helper( | ||||||
|             invited_member_count, |             invited_member_count, | ||||||
|             joined_since_last_sync, |             joined_since_last_sync, | ||||||
|             state_events, |             state_events, | ||||||
|         ) = if pdus_after_since && Some(current_shortstatehash) != since_shortstatehash { |         ) = if since_shortstatehash.is_none() { | ||||||
|             let current_state = db.rooms.room_state_full(&room_id)?; |             // Probably since = 0, we will do an initial sync
 | ||||||
|             let current_members = current_state |             let (joined_member_count, invited_member_count, heroes) = calculate_counts(); | ||||||
|                 .iter() |  | ||||||
|                 .filter(|(key, _)| key.0 == EventType::RoomMember) |  | ||||||
|                 .map(|(key, value)| (&key.1, value)) // Only keep state key
 |  | ||||||
|                 .collect::<Vec<_>>(); |  | ||||||
|             let encrypted_room = current_state |  | ||||||
|                 .get(&(EventType::RoomEncryption, "".to_owned())) |  | ||||||
|                 .is_some(); |  | ||||||
|             let since_state = since_shortstatehash |  | ||||||
|                 .as_ref() |  | ||||||
|                 .map(|since_shortstatehash| { |  | ||||||
|                     since_shortstatehash |  | ||||||
|                         .map(|since_shortstatehash| db.rooms.state_full(since_shortstatehash)) |  | ||||||
|                         .transpose() |  | ||||||
|                 }) |  | ||||||
|                 .transpose()?; |  | ||||||
| 
 | 
 | ||||||
|             let since_encryption = since_state.as_ref().map(|state| { |             let current_state_ids = db.rooms.state_full_ids(current_shortstatehash)?; | ||||||
|                 state |             let state_events = current_state_ids | ||||||
|                     .as_ref() |                 .iter() | ||||||
|                     .map(|state| state.get(&(EventType::RoomEncryption, "".to_owned()))) |                 .map(|id| db.rooms.get_pdu(id)) | ||||||
|             }); |                 .filter_map(|r| r.ok().flatten()) | ||||||
|  |                 .collect::<Vec<_>>(); | ||||||
|  | 
 | ||||||
|  |             ( | ||||||
|  |                 heroes, | ||||||
|  |                 joined_member_count, | ||||||
|  |                 invited_member_count, | ||||||
|  |                 true, | ||||||
|  |                 state_events, | ||||||
|  |             ) | ||||||
|  |         } else if !pdus_after_since || since_shortstatehash == Some(current_shortstatehash) { | ||||||
|  |             // No state changes
 | ||||||
|  |             (Vec::new(), None, None, false, Vec::new()) | ||||||
|  |         } else { | ||||||
|  |             // Incremental /sync
 | ||||||
|  |             let since_shortstatehash = since_shortstatehash.unwrap(); | ||||||
|  | 
 | ||||||
|  |             let since_sender_member = db | ||||||
|  |                 .rooms | ||||||
|  |                 .state_get( | ||||||
|  |                     since_shortstatehash, | ||||||
|  |                     &EventType::RoomMember, | ||||||
|  |                     sender_user.as_str(), | ||||||
|  |                 )? | ||||||
|  |                 .and_then(|pdu| { | ||||||
|  |                     serde_json::from_value::<Raw<ruma::events::room::member::MemberEventContent>>( | ||||||
|  |                         pdu.content.clone(), | ||||||
|  |                     ) | ||||||
|  |                     .expect("Raw::from_value always works") | ||||||
|  |                     .deserialize() | ||||||
|  |                     .map_err(|_| Error::bad_database("Invalid PDU in database.")) | ||||||
|  |                     .ok() | ||||||
|  |                 }); | ||||||
|  | 
 | ||||||
|  |             let joined_since_last_sync = since_sender_member | ||||||
|  |                 .map_or(true, |member| member.membership != MembershipState::Join); | ||||||
|  | 
 | ||||||
|  |             let current_state_ids = db.rooms.state_full_ids(current_shortstatehash)?; | ||||||
|  | 
 | ||||||
|  |             let since_state_ids = db.rooms.state_full_ids(since_shortstatehash)?; | ||||||
|  | 
 | ||||||
|  |             let state_events = if joined_since_last_sync { | ||||||
|  |                 current_state_ids | ||||||
|  |                     .iter() | ||||||
|  |                     .map(|id| db.rooms.get_pdu(id)) | ||||||
|  |                     .filter_map(|r| r.ok().flatten()) | ||||||
|  |                     .collect::<Vec<_>>() | ||||||
|  |             } else { | ||||||
|  |                 current_state_ids | ||||||
|  |                     .difference(&since_state_ids) | ||||||
|  |                     .filter(|id| { | ||||||
|  |                         !timeline_pdus | ||||||
|  |                             .iter() | ||||||
|  |                             .any(|(_, timeline_pdu)| timeline_pdu.event_id == **id) | ||||||
|  |                     }) | ||||||
|  |                     .map(|id| db.rooms.get_pdu(id)) | ||||||
|  |                     .filter_map(|r| r.ok().flatten()) | ||||||
|  |                     .collect() | ||||||
|  |             }; | ||||||
|  | 
 | ||||||
|  |             let encrypted_room = db | ||||||
|  |                 .rooms | ||||||
|  |                 .state_get(current_shortstatehash, &EventType::RoomEncryption, "")? | ||||||
|  |                 .is_some(); | ||||||
|  | 
 | ||||||
|  |             let since_encryption = | ||||||
|  |                 db.rooms | ||||||
|  |                     .state_get(since_shortstatehash, &EventType::RoomEncryption, "")?; | ||||||
| 
 | 
 | ||||||
|             // Calculations:
 |             // Calculations:
 | ||||||
|             let new_encrypted_room = |             let new_encrypted_room = encrypted_room && since_encryption.is_none(); | ||||||
|                 encrypted_room && since_encryption.map_or(true, |encryption| encryption.is_none()); |  | ||||||
| 
 | 
 | ||||||
|             let send_member_count = since_state.as_ref().map_or(true, |since_state| { |             let send_member_count = state_events | ||||||
|                 since_state.as_ref().map_or(true, |since_state| { |                 .iter() | ||||||
|                     current_members.len() |                 .any(|event| event.kind == EventType::RoomMember); | ||||||
|                         != since_state |  | ||||||
|                             .iter() |  | ||||||
|                             .filter(|(key, _)| key.0 == EventType::RoomMember) |  | ||||||
|                             .count() |  | ||||||
|                 }) |  | ||||||
|             }); |  | ||||||
| 
 |  | ||||||
|             let since_sender_member = since_state.as_ref().map(|since_state| { |  | ||||||
|                 since_state.as_ref().and_then(|state| { |  | ||||||
|                     state |  | ||||||
|                         .get(&(EventType::RoomMember, sender_user.as_str().to_owned())) |  | ||||||
|                         .and_then(|pdu| { |  | ||||||
|                             serde_json::from_value::< |  | ||||||
|                                 Raw<ruma::events::room::member::MemberEventContent>, |  | ||||||
|                             >(pdu.content.clone()) |  | ||||||
|                             .expect("Raw::from_value always works") |  | ||||||
|                             .deserialize() |  | ||||||
|                             .map_err(|_| Error::bad_database("Invalid PDU in database.")) |  | ||||||
|                             .ok() |  | ||||||
|                         }) |  | ||||||
|                 }) |  | ||||||
|             }); |  | ||||||
| 
 | 
 | ||||||
|             if encrypted_room { |             if encrypted_room { | ||||||
|                 for (user_id, current_member) in current_members { |                 for (user_id, current_member) in db | ||||||
|  |                     .rooms | ||||||
|  |                     .room_members(&room_id) | ||||||
|  |                     .filter_map(|r| r.ok()) | ||||||
|  |                     .filter_map(|user_id| { | ||||||
|  |                         db.rooms | ||||||
|  |                             .state_get( | ||||||
|  |                                 current_shortstatehash, | ||||||
|  |                                 &EventType::RoomMember, | ||||||
|  |                                 user_id.as_str(), | ||||||
|  |                             ) | ||||||
|  |                             .ok() | ||||||
|  |                             .flatten() | ||||||
|  |                             .map(|current_member| (user_id, current_member)) | ||||||
|  |                     }) | ||||||
|  |                 { | ||||||
|                     let current_membership = serde_json::from_value::< |                     let current_membership = serde_json::from_value::< | ||||||
|                         Raw<ruma::events::room::member::MemberEventContent>, |                         Raw<ruma::events::room::member::MemberEventContent>, | ||||||
|                     >(current_member.content.clone()) |                     >(current_member.content.clone()) | ||||||
|  | @ -318,31 +432,23 @@ async fn sync_helper( | ||||||
|                     .map_err(|_| Error::bad_database("Invalid PDU in database."))? |                     .map_err(|_| Error::bad_database("Invalid PDU in database."))? | ||||||
|                     .membership; |                     .membership; | ||||||
| 
 | 
 | ||||||
|                     let since_membership = |                     let since_membership = db | ||||||
|                         since_state |                         .rooms | ||||||
|                             .as_ref() |                         .state_get( | ||||||
|                             .map_or(MembershipState::Leave, |since_state| { |                             since_shortstatehash, | ||||||
|                                 since_state |                             &EventType::RoomMember, | ||||||
|                                     .as_ref() |                             user_id.as_str(), | ||||||
|                                     .and_then(|since_state| { |                         )? | ||||||
|                                         since_state |                         .and_then(|since_member| { | ||||||
|                                             .get(&(EventType::RoomMember, user_id.clone())) |                             serde_json::from_value::< | ||||||
|                                             .and_then(|since_member| { |                                 Raw<ruma::events::room::member::MemberEventContent>, | ||||||
|                                                 serde_json::from_value::< |                             >(since_member.content.clone()) | ||||||
|                                                 Raw<ruma::events::room::member::MemberEventContent>, |                             .expect("Raw::from_value always works") | ||||||
|                                             >( |                             .deserialize() | ||||||
|                                                 since_member.content.clone() |                             .map_err(|_| Error::bad_database("Invalid PDU in database.")) | ||||||
|                                             ) |                             .ok() | ||||||
|                                             .expect("Raw::from_value always works") |                         }) | ||||||
|                                             .deserialize() |                         .map_or(MembershipState::Leave, |member| member.membership); | ||||||
|                                             .map_err(|_| { |  | ||||||
|                                                 Error::bad_database("Invalid PDU in database.") |  | ||||||
|                                             }) |  | ||||||
|                                             .ok() |  | ||||||
|                                             }) |  | ||||||
|                                     }) |  | ||||||
|                                     .map_or(MembershipState::Leave, |member| member.membership) |  | ||||||
|                             }); |  | ||||||
| 
 | 
 | ||||||
|                     let user_id = UserId::try_from(user_id.clone()) |                     let user_id = UserId::try_from(user_id.clone()) | ||||||
|                         .map_err(|_| Error::bad_database("Invalid UserId in member PDU."))?; |                         .map_err(|_| Error::bad_database("Invalid UserId in member PDU."))?; | ||||||
|  | @ -364,10 +470,6 @@ async fn sync_helper( | ||||||
|                 } |                 } | ||||||
|             } |             } | ||||||
| 
 | 
 | ||||||
|             let joined_since_last_sync = since_sender_member.map_or(true, |member| { |  | ||||||
|                 member.map_or(true, |member| member.membership != MembershipState::Join) |  | ||||||
|             }); |  | ||||||
| 
 |  | ||||||
|             if joined_since_last_sync && encrypted_room || new_encrypted_room { |             if joined_since_last_sync && encrypted_room || new_encrypted_room { | ||||||
|                 // If the user is in a new encrypted room, give them all joined users
 |                 // If the user is in a new encrypted room, give them all joined users
 | ||||||
|                 device_list_updates.extend( |                 device_list_updates.extend( | ||||||
|  | @ -387,100 +489,11 @@ async fn sync_helper( | ||||||
|             } |             } | ||||||
| 
 | 
 | ||||||
|             let (joined_member_count, invited_member_count, heroes) = if send_member_count { |             let (joined_member_count, invited_member_count, heroes) = if send_member_count { | ||||||
|                 let joined_member_count = db.rooms.room_members(&room_id).count(); |                 calculate_counts() | ||||||
|                 let invited_member_count = db.rooms.room_members_invited(&room_id).count(); |  | ||||||
| 
 |  | ||||||
|                 // Recalculate heroes (first 5 members)
 |  | ||||||
|                 let mut heroes = Vec::new(); |  | ||||||
| 
 |  | ||||||
|                 if joined_member_count + invited_member_count <= 5 { |  | ||||||
|                     // Go through all PDUs and for each member event, check if the user is still joined or
 |  | ||||||
|                     // invited until we have 5 or we reach the end
 |  | ||||||
| 
 |  | ||||||
|                     for hero in db |  | ||||||
|                         .rooms |  | ||||||
|                         .all_pdus(&sender_user, &room_id) |  | ||||||
|                         .filter_map(|pdu| pdu.ok()) // Ignore all broken pdus
 |  | ||||||
|                         .filter(|(_, pdu)| pdu.kind == EventType::RoomMember) |  | ||||||
|                         .map(|(_, pdu)| { |  | ||||||
|                             let content = serde_json::from_value::< |  | ||||||
|                                 ruma::events::room::member::MemberEventContent, |  | ||||||
|                             >(pdu.content.clone()) |  | ||||||
|                             .map_err(|_| { |  | ||||||
|                                 Error::bad_database("Invalid member event in database.") |  | ||||||
|                             })?; |  | ||||||
| 
 |  | ||||||
|                             if let Some(state_key) = &pdu.state_key { |  | ||||||
|                                 let user_id = |  | ||||||
|                                     UserId::try_from(state_key.clone()).map_err(|_| { |  | ||||||
|                                         Error::bad_database("Invalid UserId in member PDU.") |  | ||||||
|                                     })?; |  | ||||||
| 
 |  | ||||||
|                                 // The membership was and still is invite or join
 |  | ||||||
|                                 if matches!( |  | ||||||
|                                     content.membership, |  | ||||||
|                                     MembershipState::Join | MembershipState::Invite |  | ||||||
|                                 ) && (db.rooms.is_joined(&user_id, &room_id)? |  | ||||||
|                                     || db.rooms.is_invited(&user_id, &room_id)?) |  | ||||||
|                                 { |  | ||||||
|                                     Ok::<_, Error>(Some(state_key.clone())) |  | ||||||
|                                 } else { |  | ||||||
|                                     Ok(None) |  | ||||||
|                                 } |  | ||||||
|                             } else { |  | ||||||
|                                 Ok(None) |  | ||||||
|                             } |  | ||||||
|                         }) |  | ||||||
|                         // Filter out buggy users
 |  | ||||||
|                         .filter_map(|u| u.ok()) |  | ||||||
|                         // Filter for possible heroes
 |  | ||||||
|                         .flatten() |  | ||||||
|                     { |  | ||||||
|                         if heroes.contains(&hero) || hero == sender_user.as_str() { |  | ||||||
|                             continue; |  | ||||||
|                         } |  | ||||||
| 
 |  | ||||||
|                         heroes.push(hero); |  | ||||||
|                     } |  | ||||||
|                 } |  | ||||||
| 
 |  | ||||||
|                 ( |  | ||||||
|                     Some(joined_member_count), |  | ||||||
|                     Some(invited_member_count), |  | ||||||
|                     heroes, |  | ||||||
|                 ) |  | ||||||
|             } else { |             } else { | ||||||
|                 (None, None, Vec::new()) |                 (None, None, Vec::new()) | ||||||
|             }; |             }; | ||||||
| 
 | 
 | ||||||
|             let state_events = if joined_since_last_sync { |  | ||||||
|                 current_state |  | ||||||
|                     .iter() |  | ||||||
|                     .map(|(_, pdu)| pdu.to_sync_state_event()) |  | ||||||
|                     .collect() |  | ||||||
|             } else { |  | ||||||
|                 match since_state { |  | ||||||
|                     None => Vec::new(), |  | ||||||
|                     Some(Some(since_state)) => current_state |  | ||||||
|                         .iter() |  | ||||||
|                         .filter(|(key, value)| { |  | ||||||
|                             since_state.get(key).map(|e| &e.event_id) != Some(&value.event_id) |  | ||||||
|                         }) |  | ||||||
|                         .filter(|(_, value)| { |  | ||||||
|                             !timeline_pdus.iter().any(|(_, timeline_pdu)| { |  | ||||||
|                                 timeline_pdu.kind == value.kind |  | ||||||
|                                     && timeline_pdu.state_key == value.state_key |  | ||||||
|                             }) |  | ||||||
|                         }) |  | ||||||
|                         .map(|(_, pdu)| pdu.to_sync_state_event()) |  | ||||||
|                         .collect(), |  | ||||||
|                     Some(None) => current_state |  | ||||||
|                         .iter() |  | ||||||
|                         .map(|(_, pdu)| pdu.to_sync_state_event()) |  | ||||||
|                         .collect(), |  | ||||||
|                 } |  | ||||||
|             }; |  | ||||||
| 
 |  | ||||||
|             ( |             ( | ||||||
|                 heroes, |                 heroes, | ||||||
|                 joined_member_count, |                 joined_member_count, | ||||||
|  | @ -488,8 +501,6 @@ async fn sync_helper( | ||||||
|                 joined_since_last_sync, |                 joined_since_last_sync, | ||||||
|                 state_events, |                 state_events, | ||||||
|             ) |             ) | ||||||
|         } else { |  | ||||||
|             (Vec::new(), None, None, false, Vec::new()) |  | ||||||
|         }; |         }; | ||||||
| 
 | 
 | ||||||
|         // Look for device list updates in this room
 |         // Look for device list updates in this room
 | ||||||
|  | @ -580,7 +591,10 @@ async fn sync_helper( | ||||||
|                 events: room_events, |                 events: room_events, | ||||||
|             }, |             }, | ||||||
|             state: sync_events::State { |             state: sync_events::State { | ||||||
|                 events: state_events, |                 events: state_events | ||||||
|  |                     .iter() | ||||||
|  |                     .map(|pdu| pdu.to_sync_state_event()) | ||||||
|  |                     .collect(), | ||||||
|             }, |             }, | ||||||
|             ephemeral: sync_events::Ephemeral { events: edus }, |             ephemeral: sync_events::Ephemeral { events: edus }, | ||||||
|         }; |         }; | ||||||
|  |  | ||||||
|  | @ -5,7 +5,7 @@ use ruma::{ | ||||||
|         client::r0::sync::sync_events, |         client::r0::sync::sync_events, | ||||||
|         federation::discovery::{ServerSigningKeys, VerifyKey}, |         federation::discovery::{ServerSigningKeys, VerifyKey}, | ||||||
|     }, |     }, | ||||||
|     DeviceId, EventId, MilliSecondsSinceUnixEpoch, ServerName, ServerSigningKeyId, UserId, |     DeviceId, EventId, MilliSecondsSinceUnixEpoch, RoomId, ServerName, ServerSigningKeyId, UserId, | ||||||
| }; | }; | ||||||
| use rustls::{ServerCertVerifier, WebPKIVerifier}; | use rustls::{ServerCertVerifier, WebPKIVerifier}; | ||||||
| use std::{ | use std::{ | ||||||
|  | @ -16,7 +16,7 @@ use std::{ | ||||||
|     sync::{Arc, RwLock}, |     sync::{Arc, RwLock}, | ||||||
|     time::{Duration, Instant}, |     time::{Duration, Instant}, | ||||||
| }; | }; | ||||||
| use tokio::sync::{broadcast, watch::Receiver, Semaphore}; | use tokio::sync::{broadcast, watch::Receiver, Mutex, Semaphore}; | ||||||
| use trust_dns_resolver::TokioAsyncResolver; | use trust_dns_resolver::TokioAsyncResolver; | ||||||
| 
 | 
 | ||||||
| use super::abstraction::Tree; | use super::abstraction::Tree; | ||||||
|  | @ -45,6 +45,7 @@ pub struct Globals { | ||||||
|     pub bad_signature_ratelimiter: Arc<RwLock<BTreeMap<Vec<String>, RateLimitState>>>, |     pub bad_signature_ratelimiter: Arc<RwLock<BTreeMap<Vec<String>, RateLimitState>>>, | ||||||
|     pub servername_ratelimiter: Arc<RwLock<BTreeMap<Box<ServerName>, Arc<Semaphore>>>>, |     pub servername_ratelimiter: Arc<RwLock<BTreeMap<Box<ServerName>, Arc<Semaphore>>>>, | ||||||
|     pub sync_receivers: RwLock<BTreeMap<(UserId, Box<DeviceId>), SyncHandle>>, |     pub sync_receivers: RwLock<BTreeMap<(UserId, Box<DeviceId>), SyncHandle>>, | ||||||
|  |     pub roomid_mutex: RwLock<BTreeMap<RoomId, Arc<Mutex<()>>>>, | ||||||
|     pub rotate: RotationHandler, |     pub rotate: RotationHandler, | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  | @ -197,6 +198,7 @@ impl Globals { | ||||||
|             bad_event_ratelimiter: Arc::new(RwLock::new(BTreeMap::new())), |             bad_event_ratelimiter: Arc::new(RwLock::new(BTreeMap::new())), | ||||||
|             bad_signature_ratelimiter: Arc::new(RwLock::new(BTreeMap::new())), |             bad_signature_ratelimiter: Arc::new(RwLock::new(BTreeMap::new())), | ||||||
|             servername_ratelimiter: Arc::new(RwLock::new(BTreeMap::new())), |             servername_ratelimiter: Arc::new(RwLock::new(BTreeMap::new())), | ||||||
|  |             roomid_mutex: RwLock::new(BTreeMap::new()), | ||||||
|             sync_receivers: RwLock::new(BTreeMap::new()), |             sync_receivers: RwLock::new(BTreeMap::new()), | ||||||
|             rotate: RotationHandler::new(), |             rotate: RotationHandler::new(), | ||||||
|         }; |         }; | ||||||
|  |  | ||||||
|  | @ -21,7 +21,7 @@ use ruma::{ | ||||||
|     uint, EventId, RoomAliasId, RoomId, RoomVersionId, ServerName, UserId, |     uint, EventId, RoomAliasId, RoomId, RoomVersionId, ServerName, UserId, | ||||||
| }; | }; | ||||||
| use std::{ | use std::{ | ||||||
|     collections::{BTreeMap, HashMap, HashSet}, |     collections::{BTreeMap, BTreeSet, HashMap, HashSet}, | ||||||
|     convert::{TryFrom, TryInto}, |     convert::{TryFrom, TryInto}, | ||||||
|     mem, |     mem, | ||||||
|     sync::{Arc, RwLock}, |     sync::{Arc, RwLock}, | ||||||
|  | @ -89,7 +89,7 @@ pub struct Rooms { | ||||||
| impl Rooms { | impl Rooms { | ||||||
|     /// Builds a StateMap by iterating over all keys that start
 |     /// Builds a StateMap by iterating over all keys that start
 | ||||||
|     /// with state_hash, this gives the full state for the given state_hash.
 |     /// with state_hash, this gives the full state for the given state_hash.
 | ||||||
|     pub fn state_full_ids(&self, shortstatehash: u64) -> Result<Vec<EventId>> { |     pub fn state_full_ids(&self, shortstatehash: u64) -> Result<BTreeSet<EventId>> { | ||||||
|         Ok(self |         Ok(self | ||||||
|             .stateid_shorteventid |             .stateid_shorteventid | ||||||
|             .scan_prefix(shortstatehash.to_be_bytes().to_vec()) |             .scan_prefix(shortstatehash.to_be_bytes().to_vec()) | ||||||
|  | @ -1215,6 +1215,7 @@ impl Rooms { | ||||||
|             state_key, |             state_key, | ||||||
|             redacts, |             redacts, | ||||||
|         } = pdu_builder; |         } = pdu_builder; | ||||||
|  | 
 | ||||||
|         // TODO: Make sure this isn't called twice in parallel
 |         // TODO: Make sure this isn't called twice in parallel
 | ||||||
|         let prev_events = self |         let prev_events = self | ||||||
|             .get_pdu_leaves(&room_id)? |             .get_pdu_leaves(&room_id)? | ||||||
|  |  | ||||||
|  | @ -625,13 +625,44 @@ pub async fn send_transaction_message_route( | ||||||
|             } |             } | ||||||
|         }; |         }; | ||||||
| 
 | 
 | ||||||
|  |         // 0. Check the server is in the room
 | ||||||
|  |         let room_id = match value | ||||||
|  |             .get("room_id") | ||||||
|  |             .and_then(|id| RoomId::try_from(id.as_str()?).ok()) | ||||||
|  |         { | ||||||
|  |             Some(id) => id, | ||||||
|  |             None => { | ||||||
|  |                 // Event is invalid
 | ||||||
|  |                 resolved_map.insert(event_id, Err("Event needs a valid RoomId.".to_string())); | ||||||
|  |                 continue; | ||||||
|  |             } | ||||||
|  |         }; | ||||||
|  | 
 | ||||||
|  |         let mutex = Arc::clone( | ||||||
|  |             db.globals | ||||||
|  |                 .roomid_mutex | ||||||
|  |                 .write() | ||||||
|  |                 .unwrap() | ||||||
|  |                 .entry(room_id.clone()) | ||||||
|  |                 .or_default(), | ||||||
|  |         ); | ||||||
|  |         let mutex_lock = mutex.lock().await; | ||||||
|         let start_time = Instant::now(); |         let start_time = Instant::now(); | ||||||
|         resolved_map.insert( |         resolved_map.insert( | ||||||
|             event_id.clone(), |             event_id.clone(), | ||||||
|             handle_incoming_pdu(&body.origin, &event_id, value, true, &db, &pub_key_map) |             handle_incoming_pdu( | ||||||
|                 .await |                 &body.origin, | ||||||
|                 .map(|_| ()), |                 &event_id, | ||||||
|  |                 &room_id, | ||||||
|  |                 value, | ||||||
|  |                 true, | ||||||
|  |                 &db, | ||||||
|  |                 &pub_key_map, | ||||||
|  |             ) | ||||||
|  |             .await | ||||||
|  |             .map(|_| ()), | ||||||
|         ); |         ); | ||||||
|  |         drop(mutex_lock); | ||||||
| 
 | 
 | ||||||
|         let elapsed = start_time.elapsed(); |         let elapsed = start_time.elapsed(); | ||||||
|         if elapsed > Duration::from_secs(1) { |         if elapsed > Duration::from_secs(1) { | ||||||
|  | @ -784,8 +815,8 @@ pub async fn send_transaction_message_route( | ||||||
| type AsyncRecursiveResult<'a, T, E> = Pin<Box<dyn Future<Output = StdResult<T, E>> + 'a + Send>>; | type AsyncRecursiveResult<'a, T, E> = Pin<Box<dyn Future<Output = StdResult<T, E>> + 'a + Send>>; | ||||||
| 
 | 
 | ||||||
| /// When receiving an event one needs to:
 | /// When receiving an event one needs to:
 | ||||||
| /// 0. Skip the PDU if we already know about it
 | /// 0. Check the server is in the room
 | ||||||
| /// 1. Check the server is in the room
 | /// 1. Skip the PDU if we already know about it
 | ||||||
| /// 2. Check signatures, otherwise drop
 | /// 2. Check signatures, otherwise drop
 | ||||||
| /// 3. Check content hash, redact if doesn't match
 | /// 3. Check content hash, redact if doesn't match
 | ||||||
| /// 4. Fetch any missing auth events doing all checks listed here starting at 1. These are not
 | /// 4. Fetch any missing auth events doing all checks listed here starting at 1. These are not
 | ||||||
|  | @ -810,6 +841,7 @@ type AsyncRecursiveResult<'a, T, E> = Pin<Box<dyn Future<Output = StdResult<T, E | ||||||
| pub fn handle_incoming_pdu<'a>( | pub fn handle_incoming_pdu<'a>( | ||||||
|     origin: &'a ServerName, |     origin: &'a ServerName, | ||||||
|     event_id: &'a EventId, |     event_id: &'a EventId, | ||||||
|  |     room_id: &'a RoomId, | ||||||
|     value: BTreeMap<String, CanonicalJsonValue>, |     value: BTreeMap<String, CanonicalJsonValue>, | ||||||
|     is_timeline_event: bool, |     is_timeline_event: bool, | ||||||
|     db: &'a Database, |     db: &'a Database, | ||||||
|  | @ -817,24 +849,6 @@ pub fn handle_incoming_pdu<'a>( | ||||||
| ) -> AsyncRecursiveResult<'a, Option<Vec<u8>>, String> { | ) -> AsyncRecursiveResult<'a, Option<Vec<u8>>, String> { | ||||||
|     Box::pin(async move { |     Box::pin(async move { | ||||||
|         // TODO: For RoomVersion6 we must check that Raw<..> is canonical do we anywhere?: https://matrix.org/docs/spec/rooms/v6#canonical-json
 |         // TODO: For RoomVersion6 we must check that Raw<..> is canonical do we anywhere?: https://matrix.org/docs/spec/rooms/v6#canonical-json
 | ||||||
| 
 |  | ||||||
|         // 0. Skip the PDU if we already have it as a timeline event
 |  | ||||||
|         if let Ok(Some(pdu_id)) = db.rooms.get_pdu_id(&event_id) { |  | ||||||
|             return Ok(Some(pdu_id.to_vec())); |  | ||||||
|         } |  | ||||||
| 
 |  | ||||||
|         // 1. Check the server is in the room
 |  | ||||||
|         let room_id = match value |  | ||||||
|             .get("room_id") |  | ||||||
|             .and_then(|id| RoomId::try_from(id.as_str()?).ok()) |  | ||||||
|         { |  | ||||||
|             Some(id) => id, |  | ||||||
|             None => { |  | ||||||
|                 // Event is invalid
 |  | ||||||
|                 return Err("Event needs a valid RoomId.".to_string()); |  | ||||||
|             } |  | ||||||
|         }; |  | ||||||
| 
 |  | ||||||
|         match db.rooms.exists(&room_id) { |         match db.rooms.exists(&room_id) { | ||||||
|             Ok(true) => {} |             Ok(true) => {} | ||||||
|             _ => { |             _ => { | ||||||
|  | @ -842,6 +856,11 @@ pub fn handle_incoming_pdu<'a>( | ||||||
|             } |             } | ||||||
|         } |         } | ||||||
| 
 | 
 | ||||||
|  |         // 1. Skip the PDU if we already have it as a timeline event
 | ||||||
|  |         if let Ok(Some(pdu_id)) = db.rooms.get_pdu_id(&event_id) { | ||||||
|  |             return Ok(Some(pdu_id.to_vec())); | ||||||
|  |         } | ||||||
|  | 
 | ||||||
|         // We go through all the signatures we see on the value and fetch the corresponding signing
 |         // We go through all the signatures we see on the value and fetch the corresponding signing
 | ||||||
|         // keys
 |         // keys
 | ||||||
|         fetch_required_signing_keys(&value, &pub_key_map, db) |         fetch_required_signing_keys(&value, &pub_key_map, db) | ||||||
|  | @ -901,7 +920,7 @@ pub fn handle_incoming_pdu<'a>( | ||||||
|         // 5. Reject "due to auth events" if can't get all the auth events or some of the auth events are also rejected "due to auth events"
 |         // 5. Reject "due to auth events" if can't get all the auth events or some of the auth events are also rejected "due to auth events"
 | ||||||
|         // EDIT: Step 5 is not applied anymore because it failed too often
 |         // EDIT: Step 5 is not applied anymore because it failed too often
 | ||||||
|         debug!("Fetching auth events for {}", incoming_pdu.event_id); |         debug!("Fetching auth events for {}", incoming_pdu.event_id); | ||||||
|         fetch_and_handle_events(db, origin, &incoming_pdu.auth_events, pub_key_map) |         fetch_and_handle_events(db, origin, &incoming_pdu.auth_events, &room_id, pub_key_map) | ||||||
|             .await |             .await | ||||||
|             .map_err(|e| e.to_string())?; |             .map_err(|e| e.to_string())?; | ||||||
| 
 | 
 | ||||||
|  | @ -1002,13 +1021,13 @@ pub fn handle_incoming_pdu<'a>( | ||||||
| 
 | 
 | ||||||
|         if incoming_pdu.prev_events.len() == 1 { |         if incoming_pdu.prev_events.len() == 1 { | ||||||
|             let prev_event = &incoming_pdu.prev_events[0]; |             let prev_event = &incoming_pdu.prev_events[0]; | ||||||
|             let state_vec = db |             let state = db | ||||||
|                 .rooms |                 .rooms | ||||||
|                 .pdu_shortstatehash(prev_event) |                 .pdu_shortstatehash(prev_event) | ||||||
|                 .map_err(|_| "Failed talking to db".to_owned())? |                 .map_err(|_| "Failed talking to db".to_owned())? | ||||||
|                 .map(|shortstatehash| db.rooms.state_full_ids(shortstatehash).ok()) |                 .map(|shortstatehash| db.rooms.state_full_ids(shortstatehash).ok()) | ||||||
|                 .flatten(); |                 .flatten(); | ||||||
|             if let Some(mut state_vec) = state_vec { |             if let Some(mut state) = state { | ||||||
|                 if db |                 if db | ||||||
|                     .rooms |                     .rooms | ||||||
|                     .get_pdu(prev_event) |                     .get_pdu(prev_event) | ||||||
|  | @ -1018,25 +1037,31 @@ pub fn handle_incoming_pdu<'a>( | ||||||
|                     .state_key |                     .state_key | ||||||
|                     .is_some() |                     .is_some() | ||||||
|                 { |                 { | ||||||
|                     state_vec.push(prev_event.clone()); |                     state.insert(prev_event.clone()); | ||||||
|                 } |                 } | ||||||
|                 state_at_incoming_event = Some( |                 state_at_incoming_event = Some( | ||||||
|                     fetch_and_handle_events(db, origin, &state_vec, pub_key_map) |                     fetch_and_handle_events( | ||||||
|                         .await |                         db, | ||||||
|                         .map_err(|_| "Failed to fetch state events locally".to_owned())? |                         origin, | ||||||
|                         .into_iter() |                         &state.into_iter().collect::<Vec<_>>(), | ||||||
|                         .map(|pdu| { |                         &room_id, | ||||||
|  |                         pub_key_map, | ||||||
|  |                     ) | ||||||
|  |                     .await | ||||||
|  |                     .map_err(|_| "Failed to fetch state events locally".to_owned())? | ||||||
|  |                     .into_iter() | ||||||
|  |                     .map(|pdu| { | ||||||
|  |                         ( | ||||||
|                             ( |                             ( | ||||||
|                                 ( |                                 pdu.kind.clone(), | ||||||
|                                     pdu.kind.clone(), |                                 pdu.state_key | ||||||
|                                     pdu.state_key |                                     .clone() | ||||||
|                                         .clone() |                                     .expect("events from state_full_ids are state events"), | ||||||
|                                         .expect("events from state_full_ids are state events"), |                             ), | ||||||
|                                 ), |                             pdu, | ||||||
|                                 pdu, |                         ) | ||||||
|                             ) |                     }) | ||||||
|                         }) |                     .collect(), | ||||||
|                         .collect(), |  | ||||||
|                 ); |                 ); | ||||||
|             } |             } | ||||||
|             // TODO: set incoming_auth_events?
 |             // TODO: set incoming_auth_events?
 | ||||||
|  | @ -1059,12 +1084,18 @@ pub fn handle_incoming_pdu<'a>( | ||||||
|             { |             { | ||||||
|                 Ok(res) => { |                 Ok(res) => { | ||||||
|                     debug!("Fetching state events at event."); |                     debug!("Fetching state events at event."); | ||||||
|                     let state_vec = |                     let state_vec = match fetch_and_handle_events( | ||||||
|                         match fetch_and_handle_events(&db, origin, &res.pdu_ids, pub_key_map).await |                         &db, | ||||||
|                         { |                         origin, | ||||||
|                             Ok(state) => state, |                         &res.pdu_ids, | ||||||
|                             Err(_) => return Err("Failed to fetch state events.".to_owned()), |                         &room_id, | ||||||
|                         }; |                         pub_key_map, | ||||||
|  |                     ) | ||||||
|  |                     .await | ||||||
|  |                     { | ||||||
|  |                         Ok(state) => state, | ||||||
|  |                         Err(_) => return Err("Failed to fetch state events.".to_owned()), | ||||||
|  |                     }; | ||||||
| 
 | 
 | ||||||
|                     let mut state = BTreeMap::new(); |                     let mut state = BTreeMap::new(); | ||||||
|                     for pdu in state_vec { |                     for pdu in state_vec { | ||||||
|  | @ -1090,8 +1121,14 @@ pub fn handle_incoming_pdu<'a>( | ||||||
|                     } |                     } | ||||||
| 
 | 
 | ||||||
|                     debug!("Fetching auth chain events at event."); |                     debug!("Fetching auth chain events at event."); | ||||||
|                     match fetch_and_handle_events(&db, origin, &res.auth_chain_ids, pub_key_map) |                     match fetch_and_handle_events( | ||||||
|                         .await |                         &db, | ||||||
|  |                         origin, | ||||||
|  |                         &res.auth_chain_ids, | ||||||
|  |                         &room_id, | ||||||
|  |                         pub_key_map, | ||||||
|  |                     ) | ||||||
|  |                     .await | ||||||
|                     { |                     { | ||||||
|                         Ok(state) => state, |                         Ok(state) => state, | ||||||
|                         Err(_) => return Err("Failed to fetch auth chain.".to_owned()), |                         Err(_) => return Err("Failed to fetch auth chain.".to_owned()), | ||||||
|  | @ -1313,6 +1350,7 @@ pub(crate) fn fetch_and_handle_events<'a>( | ||||||
|     db: &'a Database, |     db: &'a Database, | ||||||
|     origin: &'a ServerName, |     origin: &'a ServerName, | ||||||
|     events: &'a [EventId], |     events: &'a [EventId], | ||||||
|  |     room_id: &'a RoomId, | ||||||
|     pub_key_map: &'a RwLock<BTreeMap<String, BTreeMap<String, String>>>, |     pub_key_map: &'a RwLock<BTreeMap<String, BTreeMap<String, String>>>, | ||||||
| ) -> AsyncRecursiveResult<'a, Vec<Arc<PduEvent>>, Error> { | ) -> AsyncRecursiveResult<'a, Vec<Arc<PduEvent>>, Error> { | ||||||
|     Box::pin(async move { |     Box::pin(async move { | ||||||
|  | @ -1366,6 +1404,7 @@ pub(crate) fn fetch_and_handle_events<'a>( | ||||||
|                             match handle_incoming_pdu( |                             match handle_incoming_pdu( | ||||||
|                                 origin, |                                 origin, | ||||||
|                                 &event_id, |                                 &event_id, | ||||||
|  |                                 &room_id, | ||||||
|                                 value.clone(), |                                 value.clone(), | ||||||
|                                 false, |                                 false, | ||||||
|                                 db, |                                 db, | ||||||
|  | @ -1854,7 +1893,11 @@ pub fn get_room_state_ids_route( | ||||||
|             "Pdu state not found.", |             "Pdu state not found.", | ||||||
|         ))?; |         ))?; | ||||||
| 
 | 
 | ||||||
|     let pdu_ids = db.rooms.state_full_ids(shortstatehash)?; |     let pdu_ids = db | ||||||
|  |         .rooms | ||||||
|  |         .state_full_ids(shortstatehash)? | ||||||
|  |         .into_iter() | ||||||
|  |         .collect(); | ||||||
| 
 | 
 | ||||||
|     let mut auth_chain_ids = BTreeSet::<EventId>::new(); |     let mut auth_chain_ids = BTreeSet::<EventId>::new(); | ||||||
|     let mut todo = BTreeSet::new(); |     let mut todo = BTreeSet::new(); | ||||||
|  | @ -2100,18 +2143,36 @@ pub async fn create_join_event_route( | ||||||
|     ) |     ) | ||||||
|     .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Origin field is invalid."))?; |     .map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Origin field is invalid."))?; | ||||||
| 
 | 
 | ||||||
|     let pdu_id = handle_incoming_pdu(&origin, &event_id, value, true, &db, &pub_key_map) |     let mutex = Arc::clone( | ||||||
|         .await |         db.globals | ||||||
|         .map_err(|_| { |             .roomid_mutex | ||||||
|             Error::BadRequest( |             .write() | ||||||
|                 ErrorKind::InvalidParam, |             .unwrap() | ||||||
|                 "Error while handling incoming PDU.", |             .entry(body.room_id.clone()) | ||||||
|             ) |             .or_default(), | ||||||
|         })? |     ); | ||||||
|         .ok_or(Error::BadRequest( |     let mutex_lock = mutex.lock().await; | ||||||
|  |     let pdu_id = handle_incoming_pdu( | ||||||
|  |         &origin, | ||||||
|  |         &event_id, | ||||||
|  |         &body.room_id, | ||||||
|  |         value, | ||||||
|  |         true, | ||||||
|  |         &db, | ||||||
|  |         &pub_key_map, | ||||||
|  |     ) | ||||||
|  |     .await | ||||||
|  |     .map_err(|_| { | ||||||
|  |         Error::BadRequest( | ||||||
|             ErrorKind::InvalidParam, |             ErrorKind::InvalidParam, | ||||||
|             "Could not accept incoming PDU as timeline event.", |             "Error while handling incoming PDU.", | ||||||
|         ))?; |         ) | ||||||
|  |     })? | ||||||
|  |     .ok_or(Error::BadRequest( | ||||||
|  |         ErrorKind::InvalidParam, | ||||||
|  |         "Could not accept incoming PDU as timeline event.", | ||||||
|  |     ))?; | ||||||
|  |     drop(mutex_lock); | ||||||
| 
 | 
 | ||||||
|     let state_ids = db.rooms.state_full_ids(shortstatehash)?; |     let state_ids = db.rooms.state_full_ids(shortstatehash)?; | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
		Loading…
	
		Reference in a new issue