2023-01-23 17:55:12 +00:00
|
|
|
// Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package internal
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/getsentry/sentry-go"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/producers"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/types"
|
|
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
2023-04-27 12:54:20 +01:00
|
|
|
rstypes "github.com/matrix-org/dendrite/roomserver/types"
|
2023-01-23 17:55:12 +00:00
|
|
|
syncTypes "github.com/matrix-org/dendrite/syncapi/types"
|
2023-02-20 13:58:03 +00:00
|
|
|
userAPI "github.com/matrix-org/dendrite/userapi/api"
|
2023-01-23 17:55:12 +00:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-06 09:55:01 +01:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
2023-04-19 15:50:33 +01:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2023-01-23 17:55:12 +00:00
|
|
|
"github.com/matrix-org/util"
|
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
PDUCountTotal = prometheus.NewCounterVec(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Namespace: "dendrite",
|
|
|
|
Subsystem: "federationapi",
|
|
|
|
Name: "recv_pdus",
|
|
|
|
Help: "Number of incoming PDUs from remote servers with labels for success",
|
|
|
|
},
|
|
|
|
[]string{"status"}, // 'success' or 'total'
|
|
|
|
)
|
|
|
|
EDUCountTotal = prometheus.NewCounter(
|
|
|
|
prometheus.CounterOpts{
|
|
|
|
Namespace: "dendrite",
|
|
|
|
Subsystem: "federationapi",
|
|
|
|
Name: "recv_edus",
|
|
|
|
Help: "Number of incoming EDUs from remote servers",
|
|
|
|
},
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
type TxnReq struct {
|
|
|
|
gomatrixserverlib.Transaction
|
|
|
|
rsAPI api.FederationRoomserverAPI
|
2023-02-20 13:58:03 +00:00
|
|
|
userAPI userAPI.FederationUserAPI
|
2023-04-19 15:50:33 +01:00
|
|
|
ourServerName spec.ServerName
|
2023-01-23 17:55:12 +00:00
|
|
|
keys gomatrixserverlib.JSONVerifier
|
|
|
|
roomsMu *MutexByRoom
|
|
|
|
producer *producers.SyncAPIProducer
|
|
|
|
inboundPresenceEnabled bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewTxnReq(
|
|
|
|
rsAPI api.FederationRoomserverAPI,
|
2023-02-20 13:58:03 +00:00
|
|
|
userAPI userAPI.FederationUserAPI,
|
2023-04-19 15:50:33 +01:00
|
|
|
ourServerName spec.ServerName,
|
2023-01-23 17:55:12 +00:00
|
|
|
keys gomatrixserverlib.JSONVerifier,
|
|
|
|
roomsMu *MutexByRoom,
|
|
|
|
producer *producers.SyncAPIProducer,
|
|
|
|
inboundPresenceEnabled bool,
|
|
|
|
pdus []json.RawMessage,
|
|
|
|
edus []gomatrixserverlib.EDU,
|
2023-04-19 15:50:33 +01:00
|
|
|
origin spec.ServerName,
|
2023-01-23 17:55:12 +00:00
|
|
|
transactionID gomatrixserverlib.TransactionID,
|
2023-04-19 15:50:33 +01:00
|
|
|
destination spec.ServerName,
|
2023-01-23 17:55:12 +00:00
|
|
|
) TxnReq {
|
|
|
|
t := TxnReq{
|
|
|
|
rsAPI: rsAPI,
|
2023-02-20 13:58:03 +00:00
|
|
|
userAPI: userAPI,
|
2023-01-23 17:55:12 +00:00
|
|
|
ourServerName: ourServerName,
|
|
|
|
keys: keys,
|
|
|
|
roomsMu: roomsMu,
|
|
|
|
producer: producer,
|
|
|
|
inboundPresenceEnabled: inboundPresenceEnabled,
|
|
|
|
}
|
|
|
|
|
|
|
|
t.PDUs = pdus
|
|
|
|
t.EDUs = edus
|
|
|
|
t.Origin = origin
|
|
|
|
t.TransactionID = transactionID
|
|
|
|
t.Destination = destination
|
|
|
|
|
|
|
|
return t
|
|
|
|
}
|
|
|
|
|
2023-04-06 09:55:01 +01:00
|
|
|
func (t *TxnReq) ProcessTransaction(ctx context.Context) (*fclient.RespSend, *util.JSONResponse) {
|
2023-01-23 17:55:12 +00:00
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
if t.producer != nil {
|
|
|
|
t.processEDUs(ctx)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2023-04-06 09:55:01 +01:00
|
|
|
results := make(map[string]fclient.PDUResult)
|
2023-01-23 17:55:12 +00:00
|
|
|
roomVersions := make(map[string]gomatrixserverlib.RoomVersion)
|
|
|
|
getRoomVersion := func(roomID string) gomatrixserverlib.RoomVersion {
|
|
|
|
if v, ok := roomVersions[roomID]; ok {
|
|
|
|
return v
|
|
|
|
}
|
2023-04-27 07:07:13 +01:00
|
|
|
roomVersion, err := t.rsAPI.QueryRoomVersionForRoom(ctx, roomID)
|
|
|
|
if err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Debug("Transaction: Failed to query room version for room", roomID)
|
2023-01-23 17:55:12 +00:00
|
|
|
return ""
|
|
|
|
}
|
2023-04-27 07:07:13 +01:00
|
|
|
roomVersions[roomID] = roomVersion
|
|
|
|
return roomVersion
|
2023-01-23 17:55:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, pdu := range t.PDUs {
|
|
|
|
PDUCountTotal.WithLabelValues("total").Inc()
|
|
|
|
var header struct {
|
|
|
|
RoomID string `json:"room_id"`
|
|
|
|
}
|
|
|
|
if err := json.Unmarshal(pdu, &header); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Debug("Transaction: Failed to extract room ID from event")
|
|
|
|
// We don't know the event ID at this point so we can't return the
|
|
|
|
// failure in the PDU results
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
roomVersion := getRoomVersion(header.RoomID)
|
2023-04-21 17:06:29 +01:00
|
|
|
verImpl, err := gomatrixserverlib.GetRoomVersion(roomVersion)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
event, err := verImpl.NewEventFromUntrustedJSON(pdu)
|
2023-01-23 17:55:12 +00:00
|
|
|
if err != nil {
|
|
|
|
if _, ok := err.(gomatrixserverlib.BadJSONError); ok {
|
|
|
|
// Room version 6 states that homeservers should strictly enforce canonical JSON
|
|
|
|
// on PDUs.
|
|
|
|
//
|
|
|
|
// This enforces that the entire transaction is rejected if a single bad PDU is
|
|
|
|
// sent. It is unclear if this is the correct behaviour or not.
|
|
|
|
//
|
|
|
|
// See https://github.com/matrix-org/synapse/issues/7543
|
|
|
|
return nil, &util.JSONResponse{
|
|
|
|
Code: 400,
|
2023-05-09 23:46:49 +01:00
|
|
|
JSON: spec.BadJSON("PDU contains bad JSON"),
|
2023-01-23 17:55:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
util.GetLogger(ctx).WithError(err).Debugf("Transaction: Failed to parse event JSON of event %s", string(pdu))
|
|
|
|
continue
|
|
|
|
}
|
2023-04-19 15:50:33 +01:00
|
|
|
if event.Type() == spec.MRoomCreate && event.StateKeyEquals("") {
|
2023-01-23 17:55:12 +00:00
|
|
|
continue
|
|
|
|
}
|
2023-09-15 15:39:06 +01:00
|
|
|
if api.IsServerBannedFromRoom(ctx, t.rsAPI, event.RoomID().String(), t.Origin) {
|
2023-04-06 09:55:01 +01:00
|
|
|
results[event.EventID()] = fclient.PDUResult{
|
2023-01-23 17:55:12 +00:00
|
|
|
Error: "Forbidden by server ACLs",
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2023-06-14 15:23:46 +01:00
|
|
|
if err = gomatrixserverlib.VerifyEventSignatures(ctx, event, t.keys, func(roomID spec.RoomID, senderID spec.SenderID) (*spec.UserID, error) {
|
2023-06-06 21:55:18 +01:00
|
|
|
return t.rsAPI.QueryUserIDForSender(ctx, roomID, senderID)
|
|
|
|
}); err != nil {
|
2023-01-23 17:55:12 +00:00
|
|
|
util.GetLogger(ctx).WithError(err).Debugf("Transaction: Couldn't validate signature of event %q", event.EventID())
|
2023-04-06 09:55:01 +01:00
|
|
|
results[event.EventID()] = fclient.PDUResult{
|
2023-01-23 17:55:12 +00:00
|
|
|
Error: err.Error(),
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// pass the event to the roomserver which will do auth checks
|
|
|
|
// If the event fail auth checks, gmsl.NotAllowed error will be returned which we be silently
|
|
|
|
// discarded by the caller of this function
|
|
|
|
if err = api.SendEvents(
|
|
|
|
ctx,
|
|
|
|
t.rsAPI,
|
|
|
|
api.KindNew,
|
2023-04-27 12:54:20 +01:00
|
|
|
[]*rstypes.HeaderedEvent{
|
2023-05-02 15:03:16 +01:00
|
|
|
{PDU: event},
|
2023-01-23 17:55:12 +00:00
|
|
|
},
|
|
|
|
t.Destination,
|
|
|
|
t.Origin,
|
|
|
|
api.DoNotSendToOtherServers,
|
|
|
|
nil,
|
|
|
|
true,
|
|
|
|
); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Errorf("Transaction: Couldn't submit event %q to input queue: %s", event.EventID(), err)
|
2023-04-06 09:55:01 +01:00
|
|
|
results[event.EventID()] = fclient.PDUResult{
|
2023-01-23 17:55:12 +00:00
|
|
|
Error: err.Error(),
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-04-06 09:55:01 +01:00
|
|
|
results[event.EventID()] = fclient.PDUResult{}
|
2023-01-23 17:55:12 +00:00
|
|
|
PDUCountTotal.WithLabelValues("success").Inc()
|
|
|
|
}
|
|
|
|
|
|
|
|
wg.Wait()
|
2023-04-06 09:55:01 +01:00
|
|
|
return &fclient.RespSend{PDUs: results}, nil
|
2023-01-23 17:55:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// nolint:gocyclo
|
|
|
|
func (t *TxnReq) processEDUs(ctx context.Context) {
|
|
|
|
for _, e := range t.EDUs {
|
|
|
|
EDUCountTotal.Inc()
|
|
|
|
switch e.Type {
|
2023-04-19 15:50:33 +01:00
|
|
|
case spec.MTyping:
|
2023-01-23 17:55:12 +00:00
|
|
|
// https://matrix.org/docs/spec/server_server/latest#typing-notifications
|
|
|
|
var typingPayload struct {
|
|
|
|
RoomID string `json:"room_id"`
|
|
|
|
UserID string `json:"user_id"`
|
|
|
|
Typing bool `json:"typing"`
|
|
|
|
}
|
|
|
|
if err := json.Unmarshal(e.Content, &typingPayload); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Debug("Failed to unmarshal typing event")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if _, serverName, err := gomatrixserverlib.SplitID('@', typingPayload.UserID); err != nil {
|
|
|
|
continue
|
|
|
|
} else if serverName == t.ourServerName {
|
|
|
|
continue
|
|
|
|
} else if serverName != t.Origin {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := t.producer.SendTyping(ctx, typingPayload.UserID, typingPayload.RoomID, typingPayload.Typing, 30*1000); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("Failed to send typing event to JetStream")
|
|
|
|
}
|
2023-04-19 15:50:33 +01:00
|
|
|
case spec.MDirectToDevice:
|
2023-01-23 17:55:12 +00:00
|
|
|
// https://matrix.org/docs/spec/server_server/r0.1.3#m-direct-to-device-schema
|
|
|
|
var directPayload gomatrixserverlib.ToDeviceMessage
|
|
|
|
if err := json.Unmarshal(e.Content, &directPayload); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Debug("Failed to unmarshal send-to-device events")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if _, serverName, err := gomatrixserverlib.SplitID('@', directPayload.Sender); err != nil {
|
|
|
|
continue
|
|
|
|
} else if serverName == t.ourServerName {
|
|
|
|
continue
|
|
|
|
} else if serverName != t.Origin {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for userID, byUser := range directPayload.Messages {
|
|
|
|
for deviceID, message := range byUser {
|
|
|
|
// TODO: check that the user and the device actually exist here
|
|
|
|
if err := t.producer.SendToDevice(ctx, directPayload.Sender, userID, deviceID, directPayload.Type, message); err != nil {
|
|
|
|
sentry.CaptureException(err)
|
|
|
|
util.GetLogger(ctx).WithError(err).WithFields(logrus.Fields{
|
|
|
|
"sender": directPayload.Sender,
|
|
|
|
"user_id": userID,
|
|
|
|
"device_id": deviceID,
|
|
|
|
}).Error("Failed to send send-to-device event to JetStream")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-04-19 15:50:33 +01:00
|
|
|
case spec.MDeviceListUpdate:
|
2023-01-23 17:55:12 +00:00
|
|
|
if err := t.producer.SendDeviceListUpdate(ctx, e.Content, t.Origin); err != nil {
|
|
|
|
sentry.CaptureException(err)
|
|
|
|
util.GetLogger(ctx).WithError(err).Error("failed to InputDeviceListUpdate")
|
|
|
|
}
|
2023-04-19 15:50:33 +01:00
|
|
|
case spec.MReceipt:
|
2023-01-23 17:55:12 +00:00
|
|
|
// https://matrix.org/docs/spec/server_server/r0.1.4#receipts
|
|
|
|
payload := map[string]types.FederationReceiptMRead{}
|
|
|
|
|
|
|
|
if err := json.Unmarshal(e.Content, &payload); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Debug("Failed to unmarshal receipt event")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for roomID, receipt := range payload {
|
|
|
|
for userID, mread := range receipt.User {
|
|
|
|
_, domain, err := gomatrixserverlib.SplitID('@', userID)
|
|
|
|
if err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).Debug("Failed to split domain from receipt event sender")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if t.Origin != domain {
|
|
|
|
util.GetLogger(ctx).Debugf("Dropping receipt event where sender domain (%q) doesn't match origin (%q)", domain, t.Origin)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := t.processReceiptEvent(ctx, userID, roomID, "m.read", mread.Data.TS, mread.EventIDs); err != nil {
|
|
|
|
util.GetLogger(ctx).WithError(err).WithFields(logrus.Fields{
|
|
|
|
"sender": t.Origin,
|
|
|
|
"user_id": userID,
|
|
|
|
"room_id": roomID,
|
|
|
|
"events": mread.EventIDs,
|
|
|
|
}).Error("Failed to send receipt event to JetStream")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case types.MSigningKeyUpdate:
|
|
|
|
if err := t.producer.SendSigningKeyUpdate(ctx, e.Content, t.Origin); err != nil {
|
|
|
|
sentry.CaptureException(err)
|
|
|
|
logrus.WithError(err).Errorf("Failed to process signing key update")
|
|
|
|
}
|
2023-04-19 15:50:33 +01:00
|
|
|
case spec.MPresence:
|
2023-01-23 17:55:12 +00:00
|
|
|
if t.inboundPresenceEnabled {
|
|
|
|
if err := t.processPresence(ctx, e); err != nil {
|
|
|
|
logrus.WithError(err).Errorf("Failed to process presence update")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
util.GetLogger(ctx).WithField("type", e.Type).Debug("Unhandled EDU")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// processPresence handles m.receipt events
|
|
|
|
func (t *TxnReq) processPresence(ctx context.Context, e gomatrixserverlib.EDU) error {
|
|
|
|
payload := types.Presence{}
|
|
|
|
if err := json.Unmarshal(e.Content, &payload); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, content := range payload.Push {
|
|
|
|
if _, serverName, err := gomatrixserverlib.SplitID('@', content.UserID); err != nil {
|
|
|
|
continue
|
|
|
|
} else if serverName == t.ourServerName {
|
|
|
|
continue
|
|
|
|
} else if serverName != t.Origin {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
presence, ok := syncTypes.PresenceFromString(content.Presence)
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := t.producer.SendPresence(ctx, content.UserID, presence, content.StatusMsg, content.LastActiveAgo); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// processReceiptEvent sends receipt events to JetStream
|
|
|
|
func (t *TxnReq) processReceiptEvent(ctx context.Context,
|
|
|
|
userID, roomID, receiptType string,
|
2023-04-19 15:50:33 +01:00
|
|
|
timestamp spec.Timestamp,
|
2023-01-23 17:55:12 +00:00
|
|
|
eventIDs []string,
|
|
|
|
) error {
|
|
|
|
if _, serverName, err := gomatrixserverlib.SplitID('@', userID); err != nil {
|
|
|
|
return nil
|
|
|
|
} else if serverName == t.ourServerName {
|
|
|
|
return nil
|
|
|
|
} else if serverName != t.Origin {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// store every event
|
|
|
|
for _, eventID := range eventIDs {
|
|
|
|
if err := t.producer.SendReceipt(ctx, userID, roomID, eventID, receiptType, timestamp); err != nil {
|
|
|
|
return fmt.Errorf("unable to set receipt event: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|