response
stringlengths
1
33.1k
instruction
stringlengths
22
582k
Entry point
def main(wheel_file: str, dest_dir: str, archs: Optional[str]) -> None: """Entry point""" # Parse the wheel file name into its parts. Note that `parse_wheel_filename` # normalizes the package name (i.e. it converts matrix_synapse -> # matrix-synapse), which is not what we want. _, version, build, tags = parse_wheel_filename(os.path.basename(wheel_file)) name = os.path.basename(wheel_file).split("-")[0] if len(tags) != 1: # We expect only a wheel file with only a single tag raise Exception(f"Unexpectedly found multiple tags: {tags}") tag = next(iter(tags)) if build: # We don't use build tags in Synapse raise Exception(f"Unexpected build tag: {build}") # If the wheel is for cpython then convert it into an abi3 wheel. if tag.interpreter.startswith("cp"): wheel_file = cpython(wheel_file, name, version, tag) # Finally, repair the wheel. if archs is not None: # If we are given archs then we are on macos and need to use # `delocate-listdeps`. subprocess.run(["delocate-listdeps", wheel_file], check=True) subprocess.run( ["delocate-wheel", "--require-archs", archs, "-w", dest_dir, wheel_file], check=True, ) else: subprocess.run(["auditwheel", "repair", "-w", dest_dir, wheel_file], check=True)
Generate a dot and SVG file for a graph of events in the room based on the topological ordering by querying a homeserver.
def make_graph(pdus: List[dict], filename_prefix: str) -> None: """ Generate a dot and SVG file for a graph of events in the room based on the topological ordering by querying a homeserver. """ pdu_map = {} node_map = {} origins = set() colors = {"red", "green", "blue", "yellow", "purple"} for pdu in pdus: origins.add(pdu.get("origin")) color_map = {color: color for color in colors if color in origins} colors -= set(color_map.values()) color_map[None] = "black" for o in origins: if o in color_map: continue try: c = colors.pop() color_map[o] = c except Exception: print("Run out of colours!") color_map[o] = "black" graph = pydot.Dot(graph_name="Test") for pdu in pdus: name = make_name(pdu.get("pdu_id"), pdu.get("origin")) pdu_map[name] = pdu t = datetime.datetime.fromtimestamp(float(pdu["ts"]) / 1000).strftime( "%Y-%m-%d %H:%M:%S,%f" ) label = ( "<" "<b>%(name)s </b><br/>" "Type: <b>%(type)s </b><br/>" "State key: <b>%(state_key)s </b><br/>" "Content: <b>%(content)s </b><br/>" "Time: <b>%(time)s </b><br/>" "Depth: <b>%(depth)s </b><br/>" ">" ) % { "name": name, "type": pdu.get("pdu_type"), "state_key": pdu.get("state_key"), "content": cgi.escape(json.dumps(pdu.get("content")), quote=True), "time": t, "depth": pdu.get("depth"), } node = pydot.Node(name=name, label=label, color=color_map[pdu.get("origin")]) node_map[name] = node graph.add_node(node) for pdu in pdus: start_name = make_name(pdu.get("pdu_id"), pdu.get("origin")) for i, o in pdu.get("prev_pdus", []): end_name = make_name(i, o) if end_name not in node_map: print("%s not in nodes" % end_name) continue edge = pydot.Edge(node_map[start_name], node_map[end_name]) graph.add_edge(edge) # Add prev_state edges, if they exist if pdu.get("prev_state_id") and pdu.get("prev_state_origin"): prev_state_name = make_name( pdu.get("prev_state_id"), pdu.get("prev_state_origin") ) if prev_state_name in node_map: state_edge = pydot.Edge( node_map[start_name], node_map[prev_state_name], style="dotted" ) graph.add_edge(state_edge) graph.write("%s.dot" % filename_prefix, format="raw", prog="dot") # graph.write_png("%s.png" % filename_prefix, prog='dot') graph.write_svg("%s.svg" % filename_prefix, prog="dot")
Generate a dot and SVG file for a graph of events in the room based on the topological ordering by reading from a Synapse SQLite database.
def make_graph(db_name: str, room_id: str, file_prefix: str, limit: int) -> None: """ Generate a dot and SVG file for a graph of events in the room based on the topological ordering by reading from a Synapse SQLite database. """ conn = sqlite3.connect(db_name) sql = "SELECT room_version FROM rooms WHERE room_id = ?" c = conn.execute(sql, (room_id,)) room_version = KNOWN_ROOM_VERSIONS[c.fetchone()[0]] sql = ( "SELECT json, internal_metadata FROM event_json as j " "INNER JOIN events as e ON e.event_id = j.event_id " "WHERE j.room_id = ?" ) args = [room_id] if limit: sql += " ORDER BY topological_ordering DESC, stream_ordering DESC LIMIT ?" args.append(limit) c = conn.execute(sql, args) events = [ make_event_from_dict(json.loads(e[0]), room_version, json.loads(e[1])) for e in c.fetchall() ] events.sort(key=lambda e: e.depth) node_map = {} state_groups = {} graph = pydot.Dot(graph_name="Test") for event in events: c = conn.execute( "SELECT state_group FROM event_to_state_groups WHERE event_id = ?", (event.event_id,), ) res = c.fetchone() state_group = res[0] if res else None if state_group is not None: state_groups.setdefault(state_group, []).append(event.event_id) t = datetime.datetime.fromtimestamp( float(event.origin_server_ts) / 1000 ).strftime("%Y-%m-%d %H:%M:%S,%f") content = json.dumps(unfreeze(event.get_dict()["content"])) label = ( "<" "<b>%(name)s </b><br/>" "Type: <b>%(type)s </b><br/>" "State key: <b>%(state_key)s </b><br/>" "Content: <b>%(content)s </b><br/>" "Time: <b>%(time)s </b><br/>" "Depth: <b>%(depth)s </b><br/>" "State group: %(state_group)s<br/>" ">" ) % { "name": event.event_id, "type": event.type, "state_key": event.get("state_key", None), "content": html.escape(content, quote=True), "time": t, "depth": event.depth, "state_group": state_group, } node = pydot.Node(name=event.event_id, label=label) node_map[event.event_id] = node graph.add_node(node) for event in events: for prev_id in event.prev_event_ids(): try: end_node = node_map[prev_id] except Exception: end_node = pydot.Node(name=prev_id, label=f"<<b>{prev_id}</b>>") node_map[prev_id] = end_node graph.add_node(end_node) edge = pydot.Edge(node_map[event.event_id], end_node) graph.add_edge(edge) for group, event_ids in state_groups.items(): if len(event_ids) <= 1: continue cluster = pydot.Cluster(str(group), label=f"<State Group: {str(group)}>") for event_id in event_ids: cluster.add_node(node_map[event_id]) graph.add_subgraph(cluster) graph.write("%s.dot" % file_prefix, format="raw", prog="dot") graph.write_svg("%s.svg" % file_prefix, prog="dot")
Generate a dot and SVG file for a graph of events in the room based on the topological ordering by reading line-delimited JSON from a file.
def make_graph(file_name: str, file_prefix: str, limit: int) -> None: """ Generate a dot and SVG file for a graph of events in the room based on the topological ordering by reading line-delimited JSON from a file. """ print("Reading lines") with open(file_name) as f: lines = f.readlines() print("Read lines") # Figure out the room version, assume the first line is the create event. room_version = KNOWN_ROOM_VERSIONS[ json.loads(lines[0]).get("content", {}).get("room_version") ] events = [make_event_from_dict(json.loads(line), room_version) for line in lines] print("Loaded events.") events.sort(key=lambda e: e.depth) print("Sorted events") if limit: events = events[-int(limit) :] node_map = {} graph = pydot.Dot(graph_name="Test") for event in events: t = datetime.datetime.fromtimestamp( float(event.origin_server_ts) / 1000 ).strftime("%Y-%m-%d %H:%M:%S,%f") content = json.dumps(unfreeze(event.get_dict()["content"]), indent=4) content = content.replace("\n", "<br/>\n") print(content) content = [] for key, value in unfreeze(event.get_dict()["content"]).items(): if value is None: value = "<null>" elif isinstance(value, str): pass else: value = json.dumps(value) content.append( "<b>%s</b>: %s," % ( html.escape(key, quote=True).encode("ascii", "xmlcharrefreplace"), html.escape(value, quote=True).encode("ascii", "xmlcharrefreplace"), ) ) content = "<br/>\n".join(content) print(content) label = ( "<" "<b>%(name)s </b><br/>" "Type: <b>%(type)s </b><br/>" "State key: <b>%(state_key)s </b><br/>" "Content: <b>%(content)s </b><br/>" "Time: <b>%(time)s </b><br/>" "Depth: <b>%(depth)s </b><br/>" ">" ) % { "name": event.event_id, "type": event.type, "state_key": event.get("state_key", None), "content": content, "time": t, "depth": event.depth, } node = pydot.Node(name=event.event_id, label=label) node_map[event.event_id] = node graph.add_node(node) print("Created Nodes") for event in events: for prev_id in event.prev_event_ids(): try: end_node = node_map[prev_id] except Exception: end_node = pydot.Node(name=prev_id, label=f"<<b>{prev_id}</b>>") node_map[prev_id] = end_node graph.add_node(end_node) edge = pydot.Edge(node_map[event.event_id], end_node) graph.add_edge(edge) print("Created edges") graph.write("%s.dot" % file_prefix, format="raw", prog="dot") print("Created Dot") graph.write_svg("%s.svg" % file_prefix, prog="dot") print("Created svg")
Generate a file from a template Args: src: Path to the input file. dst: Path to write to. template_vars: The arguments to replace placeholder variables in the template with.
def convert(src: str, dst: str, **template_vars: object) -> None: """Generate a file from a template Args: src: Path to the input file. dst: Path to write to. template_vars: The arguments to replace placeholder variables in the template with. """ # Read the template file # We disable autoescape to prevent template variables from being escaped, # as we're not using HTML. env = Environment(loader=FileSystemLoader(os.path.dirname(src)), autoescape=False) template = env.get_template(os.path.basename(src)) # Generate a string from the template. rendered = template.render(**template_vars) # Write the generated contents to a file # # We use append mode in case the files have already been written to by something else # (for instance, as part of the instructions in a dockerfile). with open(dst, "a") as outfile: # In case the existing file doesn't end with a newline outfile.write("\n") outfile.write(rendered)
Given a dictionary representing a config file shared across all workers, append appropriate worker information to it for the current worker_type instance. Args: shared_config: The config dict that all worker instances share (after being converted to YAML) worker_types_set: The type of worker (one of those defined in WORKERS_CONFIG). This list can be a single worker type or multiple. worker_name: The name of the worker instance. worker_port: The HTTP replication port that the worker instance is listening on.
def add_worker_roles_to_shared_config( shared_config: dict, worker_types_set: Set[str], worker_name: str, worker_port: int, ) -> None: """Given a dictionary representing a config file shared across all workers, append appropriate worker information to it for the current worker_type instance. Args: shared_config: The config dict that all worker instances share (after being converted to YAML) worker_types_set: The type of worker (one of those defined in WORKERS_CONFIG). This list can be a single worker type or multiple. worker_name: The name of the worker instance. worker_port: The HTTP replication port that the worker instance is listening on. """ # The instance_map config field marks the workers that write to various replication # streams instance_map = shared_config.setdefault("instance_map", {}) # This is a list of the stream_writers that there can be only one of. Events can be # sharded, and therefore doesn't belong here. singular_stream_writers = [ "account_data", "presence", "receipts", "to_device", "typing", ] # Worker-type specific sharding config. Now a single worker can fulfill multiple # roles, check each. if "pusher" in worker_types_set: shared_config.setdefault("pusher_instances", []).append(worker_name) if "federation_sender" in worker_types_set: shared_config.setdefault("federation_sender_instances", []).append(worker_name) if "event_persister" in worker_types_set: # Event persisters write to the events stream, so we need to update # the list of event stream writers shared_config.setdefault("stream_writers", {}).setdefault("events", []).append( worker_name ) # Map of stream writer instance names to host/ports combos if os.environ.get("SYNAPSE_USE_UNIX_SOCKET", False): instance_map[worker_name] = { "path": f"/run/worker.{worker_port}", } else: instance_map[worker_name] = { "host": "localhost", "port": worker_port, } # Update the list of stream writers. It's convenient that the name of the worker # type is the same as the stream to write. Iterate over the whole list in case there # is more than one. for worker in worker_types_set: if worker in singular_stream_writers: shared_config.setdefault("stream_writers", {}).setdefault( worker, [] ).append(worker_name) # Map of stream writer instance names to host/ports combos # For now, all stream writers need http replication ports if os.environ.get("SYNAPSE_USE_UNIX_SOCKET", False): instance_map[worker_name] = { "path": f"/run/worker.{worker_port}", } else: instance_map[worker_name] = { "host": "localhost", "port": worker_port, }
When given an existing dict of worker template configuration consisting with both dicts and lists, merge new template data from WORKERS_CONFIG(or create) and return new dict. Args: existing_dict: Either an existing worker template or a fresh blank one. to_be_merged_dict: The template from WORKERS_CONFIGS to be merged into existing_dict. Returns: The newly merged together dict values.
def merge_worker_template_configs( existing_dict: Optional[Dict[str, Any]], to_be_merged_dict: Dict[str, Any], ) -> Dict[str, Any]: """When given an existing dict of worker template configuration consisting with both dicts and lists, merge new template data from WORKERS_CONFIG(or create) and return new dict. Args: existing_dict: Either an existing worker template or a fresh blank one. to_be_merged_dict: The template from WORKERS_CONFIGS to be merged into existing_dict. Returns: The newly merged together dict values. """ new_dict: Dict[str, Any] = {} if not existing_dict: # It doesn't exist yet, just use the new dict(but take a copy not a reference) new_dict = to_be_merged_dict.copy() else: for i in to_be_merged_dict.keys(): if (i == "endpoint_patterns") or (i == "listener_resources"): # merge the two lists, remove duplicates new_dict[i] = list(set(existing_dict[i] + to_be_merged_dict[i])) elif i == "shared_extra_conf": # merge dictionary's, the worker name will be replaced later new_dict[i] = {**existing_dict[i], **to_be_merged_dict[i]} elif i == "worker_extra_conf": # There is only one worker type that has a 'worker_extra_conf' and it is # the media_repo. Since duplicate worker types on the same worker don't # work, this is fine. new_dict[i] = existing_dict[i] + to_be_merged_dict[i] else: # Everything else should be identical, like "app", which only works # because all apps are now generic_workers. new_dict[i] = to_be_merged_dict[i] return new_dict
Insert a given worker name into the worker's configuration dict. Args: existing_dict: The worker_config dict that is imported into shared_config. worker_name: The name of the worker to insert. Returns: Copy of the dict with newly inserted worker name
def insert_worker_name_for_worker_config( existing_dict: Dict[str, Any], worker_name: str ) -> Dict[str, Any]: """Insert a given worker name into the worker's configuration dict. Args: existing_dict: The worker_config dict that is imported into shared_config. worker_name: The name of the worker to insert. Returns: Copy of the dict with newly inserted worker name """ dict_to_edit = existing_dict.copy() for k, v in dict_to_edit["shared_extra_conf"].items(): # Only proceed if it's the placeholder name string if v == WORKER_PLACEHOLDER_NAME: dict_to_edit["shared_extra_conf"][k] = worker_name return dict_to_edit
Apply multiplier(if found) by returning a new expanded list with some basic error checking. Args: worker_types: The unprocessed List of requested workers Returns: A new list with all requested workers expanded.
def apply_requested_multiplier_for_worker(worker_types: List[str]) -> List[str]: """ Apply multiplier(if found) by returning a new expanded list with some basic error checking. Args: worker_types: The unprocessed List of requested workers Returns: A new list with all requested workers expanded. """ # Checking performed: # 1. if worker:2 or more is declared, it will create additional workers up to number # 2. if worker:1, it will create a single copy of this worker as if no number was # given # 3. if worker:0 is declared, this worker will be ignored. This is to allow for # scripting and automated expansion and is intended behaviour. # 4. if worker:NaN or is a negative number, it will error and log it. new_worker_types = [] for worker_type in worker_types: if ":" in worker_type: worker_type_components = split_and_strip_string(worker_type, ":", 1) worker_count = 0 # Should only be 2 components, a type of worker(s) and an integer as a # string. Cast the number as an int then it can be used as a counter. try: worker_count = int(worker_type_components[1]) except ValueError: error( f"Bad number in worker count for '{worker_type}': " f"'{worker_type_components[1]}' is not an integer" ) # As long as there are more than 0, we add one to the list to make below. for _ in range(worker_count): new_worker_types.append(worker_type_components[0]) else: # If it's not a real worker_type, it will error out later. new_worker_types.append(worker_type) return new_worker_types
Helper to check to make sure worker types that cannot have multiples do not. Args: worker_type: The type of worker to check against. Returns: True if allowed, False if not
def is_sharding_allowed_for_worker_type(worker_type: str) -> bool: """Helper to check to make sure worker types that cannot have multiples do not. Args: worker_type: The type of worker to check against. Returns: True if allowed, False if not """ return worker_type not in [ "background_worker", "account_data", "presence", "receipts", "typing", "to_device", ]
Helper to split a string on split_char and strip whitespace from each end of each element. Args: given_string: The string to split split_char: The character to split the string on max_split: kwarg for split() to limit how many times the split() happens Returns: A List of strings
def split_and_strip_string( given_string: str, split_char: str, max_split: SupportsIndex = -1 ) -> List[str]: """ Helper to split a string on split_char and strip whitespace from each end of each element. Args: given_string: The string to split split_char: The character to split the string on max_split: kwarg for split() to limit how many times the split() happens Returns: A List of strings """ # Removes whitespace from ends of result strings before adding to list. Allow for # overriding 'maxsplit' kwarg, default being -1 to signify no maximum. return [x.strip() for x in given_string.split(split_char, maxsplit=max_split)]
Starts Synapse and generates a basic homeserver config, which will later be modified for worker support. Raises: CalledProcessError if calling start.py returned a non-zero exit code.
def generate_base_homeserver_config() -> None: """Starts Synapse and generates a basic homeserver config, which will later be modified for worker support. Raises: CalledProcessError if calling start.py returned a non-zero exit code. """ # start.py already does this for us, so just call that. # note that this script is copied in in the official, monolith dockerfile os.environ["SYNAPSE_HTTP_PORT"] = str(MAIN_PROCESS_HTTP_LISTENER_PORT) subprocess.run(["/usr/local/bin/python", "/start.py", "migrate_config"], check=True)
Read the desired list of requested workers and prepare the data for use in generating worker config files while also checking for potential gotchas. Args: requested_worker_types: The list formed from the split environment variable containing the unprocessed requests for workers. Returns: A dict of worker names to set of worker types. Format: {'worker_name': {'worker_type', 'worker_type2'} }
def parse_worker_types( requested_worker_types: List[str], ) -> Dict[str, Set[str]]: """Read the desired list of requested workers and prepare the data for use in generating worker config files while also checking for potential gotchas. Args: requested_worker_types: The list formed from the split environment variable containing the unprocessed requests for workers. Returns: A dict of worker names to set of worker types. Format: {'worker_name': {'worker_type', 'worker_type2'} } """ # A counter of worker_base_name -> int. Used for determining the name for a given # worker when generating its config file, as each worker's name is just # worker_base_name followed by instance number worker_base_name_counter: Dict[str, int] = defaultdict(int) # Similar to above, but more finely grained. This is used to determine we don't have # more than a single worker for cases where multiples would be bad(e.g. presence). worker_type_shard_counter: Dict[str, int] = defaultdict(int) # The final result of all this processing dict_to_return: Dict[str, Set[str]] = {} # Handle any multipliers requested for given workers. multiple_processed_worker_types = apply_requested_multiplier_for_worker( requested_worker_types ) # Process each worker_type_string # Examples of expected formats: # - requested_name=type1+type2+type3 # - synchrotron # - event_creator+event_persister for worker_type_string in multiple_processed_worker_types: # First, if a name is requested, use that — otherwise generate one. worker_base_name: str = "" if "=" in worker_type_string: # Split on "=", remove extra whitespace from ends then make list worker_type_split = split_and_strip_string(worker_type_string, "=") if len(worker_type_split) > 2: error( "There should only be one '=' in the worker type string. " f"Please fix: {worker_type_string}" ) # Assign the name worker_base_name = worker_type_split[0] if not re.match(r"^[a-zA-Z0-9_+-]*[a-zA-Z_+-]$", worker_base_name): # Apply a fairly narrow regex to the worker names. Some characters # aren't safe for use in file paths or nginx configurations. # Don't allow to end with a number because we'll add a number # ourselves in a moment. error( "Invalid worker name; please choose a name consisting of " "alphanumeric letters, _ + -, but not ending with a digit: " f"{worker_base_name!r}" ) # Continue processing the remainder of the worker_type string # with the name override removed. worker_type_string = worker_type_split[1] # Split the worker_type_string on "+", remove whitespace from ends then make # the list a set so it's deduplicated. worker_types_set: Set[str] = set( split_and_strip_string(worker_type_string, "+") ) if not worker_base_name: # No base name specified: generate one deterministically from set of # types worker_base_name = "+".join(sorted(worker_types_set)) # At this point, we have: # worker_base_name which is the name for the worker, without counter. # worker_types_set which is the set of worker types for this worker. # Validate worker_type and make sure we don't allow sharding for a worker type # that doesn't support it. Will error and stop if it is a problem, # e.g. 'background_worker'. for worker_type in worker_types_set: # Verify this is a real defined worker type. If it's not, stop everything so # it can be fixed. if worker_type not in WORKERS_CONFIG: error( f"{worker_type} is an unknown worker type! Was found in " f"'{worker_type_string}'. Please fix!" ) if worker_type in worker_type_shard_counter: if not is_sharding_allowed_for_worker_type(worker_type): error( f"There can be only a single worker with {worker_type} " "type. Please recount and remove." ) # Not in shard counter, must not have seen it yet, add it. worker_type_shard_counter[worker_type] += 1 # Generate the number for the worker using incrementing counter worker_base_name_counter[worker_base_name] += 1 worker_number = worker_base_name_counter[worker_base_name] worker_name = f"{worker_base_name}{worker_number}" if worker_number > 1: # If this isn't the first worker, check that we don't have a confusing # mixture of worker types with the same base name. first_worker_with_base_name = dict_to_return[f"{worker_base_name}1"] if first_worker_with_base_name != worker_types_set: error( f"Can not use worker_name: '{worker_name}' for worker_type(s): " f"{worker_types_set!r}. It is already in use by " f"worker_type(s): {first_worker_with_base_name!r}" ) dict_to_return[worker_name] = worker_types_set return dict_to_return
Read the desired workers(if any) that is passed in and generate shared homeserver, nginx and supervisord configs. Args: environ: os.environ instance. config_path: The location of the generated Synapse main worker config file. data_dir: The location of the synapse data directory. Where log and user-facing config files live. requested_worker_types: A Dict containing requested workers in the format of {'worker_name1': {'worker_type', ...}}
def generate_worker_files( environ: Mapping[str, str], config_path: str, data_dir: str, requested_worker_types: Dict[str, Set[str]], ) -> None: """Read the desired workers(if any) that is passed in and generate shared homeserver, nginx and supervisord configs. Args: environ: os.environ instance. config_path: The location of the generated Synapse main worker config file. data_dir: The location of the synapse data directory. Where log and user-facing config files live. requested_worker_types: A Dict containing requested workers in the format of {'worker_name1': {'worker_type', ...}} """ # Note that yaml cares about indentation, so care should be taken to insert lines # into files at the correct indentation below. # Convenience helper for if using unix sockets instead of host:port using_unix_sockets = environ.get("SYNAPSE_USE_UNIX_SOCKET", False) # First read the original config file and extract the listeners block. Then we'll # add another listener for replication. Later we'll write out the result to the # shared config file. listeners: List[Any] if using_unix_sockets: listeners = [ { "path": MAIN_PROCESS_UNIX_SOCKET_PRIVATE_PATH, "type": "http", "resources": [{"names": ["replication"]}], } ] else: listeners = [ { "port": MAIN_PROCESS_REPLICATION_PORT, "bind_address": MAIN_PROCESS_LOCALHOST_ADDRESS, "type": "http", "resources": [{"names": ["replication"]}], } ] with open(config_path) as file_stream: original_config = yaml.safe_load(file_stream) original_listeners = original_config.get("listeners") if original_listeners: listeners += original_listeners # The shared homeserver config. The contents of which will be inserted into the # base shared worker jinja2 template. This config file will be passed to all # workers, included Synapse's main process. It is intended mainly for disabling # functionality when certain workers are spun up, and adding a replication listener. shared_config: Dict[str, Any] = {"listeners": listeners} # List of dicts that describe workers. # We pass this to the Supervisor template later to generate the appropriate # program blocks. worker_descriptors: List[Dict[str, Any]] = [] # Upstreams for load-balancing purposes. This dict takes the form of the worker # type to the ports of each worker. For example: # { # worker_type: {1234, 1235, ...}} # } # and will be used to construct 'upstream' nginx directives. nginx_upstreams: Dict[str, Set[int]] = {} # A map of: {"endpoint": "upstream"}, where "upstream" is a str representing what # will be placed after the proxy_pass directive. The main benefit to representing # this data as a dict over a str is that we can easily deduplicate endpoints # across multiple instances of the same worker. The final rendering will be combined # with nginx_upstreams and placed in /etc/nginx/conf.d. nginx_locations: Dict[str, str] = {} # Create the worker configuration directory if it doesn't already exist os.makedirs("/conf/workers", exist_ok=True) # Start worker ports from this arbitrary port worker_port = 18009 # A list of internal endpoints to healthcheck, starting with the main process # which exists even if no workers do. # This list ends up being part of the command line to curl, (curl added support for # Unix sockets in version 7.40). if using_unix_sockets: healthcheck_urls = [ f"--unix-socket {MAIN_PROCESS_UNIX_SOCKET_PUBLIC_PATH} " # The scheme and hostname from the following URL are ignored. # The only thing that matters is the path `/health` "http://localhost/health" ] else: healthcheck_urls = ["http://localhost:8080/health"] # Get the set of all worker types that we have configured all_worker_types_in_use = set(chain(*requested_worker_types.values())) # Map locations to upstreams (corresponding to worker types) in Nginx # but only if we use the appropriate worker type for worker_type in all_worker_types_in_use: for endpoint_pattern in WORKERS_CONFIG[worker_type]["endpoint_patterns"]: nginx_locations[endpoint_pattern] = f"http://{worker_type}" # For each worker type specified by the user, create config values and write it's # yaml config file for worker_name, worker_types_set in requested_worker_types.items(): # The collected and processed data will live here. worker_config: Dict[str, Any] = {} # Merge all worker config templates for this worker into a single config for worker_type in worker_types_set: copy_of_template_config = WORKERS_CONFIG[worker_type].copy() # Merge worker type template configuration data. It's a combination of lists # and dicts, so use this helper. worker_config = merge_worker_template_configs( worker_config, copy_of_template_config ) # Replace placeholder names in the config template with the actual worker name. worker_config = insert_worker_name_for_worker_config(worker_config, worker_name) worker_config.update( {"name": worker_name, "port": str(worker_port), "config_path": config_path} ) # Update the shared config with any worker_type specific options. The first of a # given worker_type needs to stay assigned and not be replaced. worker_config["shared_extra_conf"].update(shared_config) shared_config = worker_config["shared_extra_conf"] if using_unix_sockets: healthcheck_urls.append( f"--unix-socket /run/worker.{worker_port} http://localhost/health" ) else: healthcheck_urls.append("http://localhost:%d/health" % (worker_port,)) # Update the shared config with sharding-related options if necessary add_worker_roles_to_shared_config( shared_config, worker_types_set, worker_name, worker_port ) # Enable the worker in supervisord worker_descriptors.append(worker_config) # Write out the worker's logging config file log_config_filepath = generate_worker_log_config(environ, worker_name, data_dir) # Then a worker config file convert( "/conf/worker.yaml.j2", f"/conf/workers/{worker_name}.yaml", **worker_config, worker_log_config_filepath=log_config_filepath, using_unix_sockets=using_unix_sockets, ) # Save this worker's port number to the correct nginx upstreams for worker_type in worker_types_set: nginx_upstreams.setdefault(worker_type, set()).add(worker_port) worker_port += 1 # Build the nginx location config blocks nginx_location_config = "" for endpoint, upstream in nginx_locations.items(): nginx_location_config += NGINX_LOCATION_CONFIG_BLOCK.format( endpoint=endpoint, upstream=upstream, ) # Determine the load-balancing upstreams to configure nginx_upstream_config = "" for upstream_worker_base_name, upstream_worker_ports in nginx_upstreams.items(): body = "" if using_unix_sockets: for port in upstream_worker_ports: body += f" server unix:/run/worker.{port};\n" else: for port in upstream_worker_ports: body += f" server localhost:{port};\n" # Add to the list of configured upstreams nginx_upstream_config += NGINX_UPSTREAM_CONFIG_BLOCK.format( upstream_worker_base_name=upstream_worker_base_name, body=body, ) # Finally, we'll write out the config files. # log config for the master process master_log_config = generate_worker_log_config(environ, "master", data_dir) shared_config["log_config"] = master_log_config # Find application service registrations appservice_registrations = None appservice_registration_dir = os.environ.get("SYNAPSE_AS_REGISTRATION_DIR") if appservice_registration_dir: # Scan for all YAML files that should be application service registrations. appservice_registrations = [ str(reg_path.resolve()) for reg_path in Path(appservice_registration_dir).iterdir() if reg_path.suffix.lower() in (".yaml", ".yml") ] workers_in_use = len(requested_worker_types) > 0 # If there are workers, add the main process to the instance_map too. if workers_in_use: instance_map = shared_config.setdefault("instance_map", {}) if using_unix_sockets: instance_map[MAIN_PROCESS_INSTANCE_NAME] = { "path": MAIN_PROCESS_UNIX_SOCKET_PRIVATE_PATH, } else: instance_map[MAIN_PROCESS_INSTANCE_NAME] = { "host": MAIN_PROCESS_LOCALHOST_ADDRESS, "port": MAIN_PROCESS_REPLICATION_PORT, } # Shared homeserver config convert( "/conf/shared.yaml.j2", "/conf/workers/shared.yaml", shared_worker_config=yaml.dump(shared_config), appservice_registrations=appservice_registrations, enable_redis=workers_in_use, workers_in_use=workers_in_use, using_unix_sockets=using_unix_sockets, ) # Nginx config convert( "/conf/nginx.conf.j2", "/etc/nginx/conf.d/matrix-synapse.conf", worker_locations=nginx_location_config, upstream_directives=nginx_upstream_config, tls_cert_path=os.environ.get("SYNAPSE_TLS_CERT"), tls_key_path=os.environ.get("SYNAPSE_TLS_KEY"), using_unix_sockets=using_unix_sockets, ) # Supervisord config os.makedirs("/etc/supervisor", exist_ok=True) convert( "/conf/supervisord.conf.j2", "/etc/supervisor/supervisord.conf", main_config_path=config_path, enable_redis=workers_in_use, using_unix_sockets=using_unix_sockets, ) convert( "/conf/synapse.supervisord.conf.j2", "/etc/supervisor/conf.d/synapse.conf", workers=worker_descriptors, main_config_path=config_path, use_forking_launcher=environ.get("SYNAPSE_USE_EXPERIMENTAL_FORKING_LAUNCHER"), ) # healthcheck config convert( "/conf/healthcheck.sh.j2", "/healthcheck.sh", healthcheck_urls=healthcheck_urls, ) # Ensure the logging directory exists log_dir = data_dir + "/logs" if not os.path.exists(log_dir): os.mkdir(log_dir)
Generate a log.config file for the given worker. Returns: the path to the generated file
def generate_worker_log_config( environ: Mapping[str, str], worker_name: str, data_dir: str ) -> str: """Generate a log.config file for the given worker. Returns: the path to the generated file """ # Check whether we should write worker logs to disk, in addition to the console extra_log_template_args: Dict[str, Optional[str]] = {} if environ.get("SYNAPSE_WORKERS_WRITE_LOGS_TO_DISK"): extra_log_template_args["LOG_FILE_PATH"] = f"{data_dir}/logs/{worker_name}.log" extra_log_template_args["SYNAPSE_LOG_LEVEL"] = environ.get("SYNAPSE_LOG_LEVEL") extra_log_template_args["SYNAPSE_LOG_SENSITIVE"] = environ.get( "SYNAPSE_LOG_SENSITIVE" ) extra_log_template_args["SYNAPSE_LOG_TESTING"] = environ.get("SYNAPSE_LOG_TESTING") # Render and write the file log_config_filepath = f"/conf/workers/{worker_name}.log.config" convert( "/conf/log.config", log_config_filepath, worker_name=worker_name, **extra_log_template_args, include_worker_name_in_log_line=environ.get( "SYNAPSE_USE_EXPERIMENTAL_FORKING_LAUNCHER" ), ) return log_config_filepath
Generate a file from a template Args: src: path to input file dst: path to file to write environ: environment dictionary, for replacement mappings.
def convert(src: str, dst: str, environ: Mapping[str, object]) -> None: """Generate a file from a template Args: src: path to input file dst: path to file to write environ: environment dictionary, for replacement mappings. """ with open(src) as infile: template = infile.read() rendered = jinja2.Template(template).render(**environ) with open(dst, "w") as outfile: outfile.write(rendered)
Generate a homeserver.yaml from environment variables Args: config_dir: where to put generated config files config_path: where to put the main config file os_environ: environment mapping ownership: "<user>:<group>" string which will be used to set ownership of the generated configs. If None, ownership will not change.
def generate_config_from_template( config_dir: str, config_path: str, os_environ: Mapping[str, str], ownership: Optional[str], ) -> None: """Generate a homeserver.yaml from environment variables Args: config_dir: where to put generated config files config_path: where to put the main config file os_environ: environment mapping ownership: "<user>:<group>" string which will be used to set ownership of the generated configs. If None, ownership will not change. """ for v in ("SYNAPSE_SERVER_NAME", "SYNAPSE_REPORT_STATS"): if v not in os_environ: error( "Environment variable '%s' is mandatory when generating a config file." % (v,) ) # populate some params from data files (if they exist, else create new ones) environ: Dict[str, Any] = dict(os_environ) secrets = { "registration": "SYNAPSE_REGISTRATION_SHARED_SECRET", "macaroon": "SYNAPSE_MACAROON_SECRET_KEY", } for name, secret in secrets.items(): if secret not in environ: filename = "/data/%s.%s.key" % (environ["SYNAPSE_SERVER_NAME"], name) # if the file already exists, load in the existing value; otherwise, # generate a new secret and write it to a file if os.path.exists(filename): log("Reading %s from %s" % (secret, filename)) with open(filename) as handle: value = handle.read() else: log(f"Generating a random secret for {secret}") value = codecs.encode(os.urandom(32), "hex").decode() with open(filename, "w") as handle: handle.write(value) environ[secret] = value environ["SYNAPSE_APPSERVICES"] = glob.glob("/data/appservices/*.yaml") if not os.path.exists(config_dir): os.mkdir(config_dir) # Convert SYNAPSE_NO_TLS to boolean if exists if "SYNAPSE_NO_TLS" in environ: tlsanswerstring = str.lower(environ["SYNAPSE_NO_TLS"]) if tlsanswerstring in ("true", "on", "1", "yes"): environ["SYNAPSE_NO_TLS"] = True else: if tlsanswerstring in ("false", "off", "0", "no"): environ["SYNAPSE_NO_TLS"] = False else: error( 'Environment variable "SYNAPSE_NO_TLS" found but value "' + tlsanswerstring + '" unrecognized; exiting.' ) if "SYNAPSE_LOG_CONFIG" not in environ: environ["SYNAPSE_LOG_CONFIG"] = config_dir + "/log.config" log("Generating synapse config file " + config_path) convert("/conf/homeserver.yaml", config_path, environ) log_config_file = environ["SYNAPSE_LOG_CONFIG"] log("Generating log config file " + log_config_file) convert( "/conf/log.config", log_config_file, {**environ, "include_worker_name_in_log_line": False}, ) # Hopefully we already have a signing key, but generate one if not. args = [ sys.executable, "-m", "synapse.app.homeserver", "--config-path", config_path, # tell synapse to put generated keys in /data rather than /compiled "--keys-directory", config_dir, "--generate-keys", ] if ownership is not None: log(f"Setting ownership on /data to {ownership}") subprocess.run(["chown", "-R", ownership, "/data"], check=True) args = ["gosu", ownership] + args subprocess.run(args, check=True)
Run synapse with a --generate-config param to generate a template config file Args: environ: env vars from `os.enrivon`. ownership: "userid:groupid" arg for chmod. If None, ownership will not change. Never returns.
def run_generate_config(environ: Mapping[str, str], ownership: Optional[str]) -> None: """Run synapse with a --generate-config param to generate a template config file Args: environ: env vars from `os.enrivon`. ownership: "userid:groupid" arg for chmod. If None, ownership will not change. Never returns. """ for v in ("SYNAPSE_SERVER_NAME", "SYNAPSE_REPORT_STATS"): if v not in environ: error("Environment variable '%s' is mandatory in `generate` mode." % (v,)) server_name = environ["SYNAPSE_SERVER_NAME"] config_dir = environ.get("SYNAPSE_CONFIG_DIR", "/data") config_path = environ.get("SYNAPSE_CONFIG_PATH", config_dir + "/homeserver.yaml") data_dir = environ.get("SYNAPSE_DATA_DIR", "/data") if ownership is not None: # make sure that synapse has perms to write to the data dir. log(f"Setting ownership on {data_dir} to {ownership}") subprocess.run(["chown", ownership, data_dir], check=True) # create a suitable log config from our template log_config_file = "%s/%s.log.config" % (config_dir, server_name) if not os.path.exists(log_config_file): log("Creating log config %s" % (log_config_file,)) convert("/conf/log.config", log_config_file, environ) # generate the main config file, and a signing key. args = [ sys.executable, "-m", "synapse.app.homeserver", "--server-name", server_name, "--report-stats", environ["SYNAPSE_REPORT_STATS"], "--config-path", config_path, "--config-directory", config_dir, "--data-directory", data_dir, "--generate-config", "--open-private-ports", ] # log("running %s" % (args, )) flush_buffers() os.execv(sys.executable, args)
We patch `constr` and friends with wrappers that enforce strict=True.
def make_wrapper(factory: Callable[P, R]) -> Callable[P, R]: """We patch `constr` and friends with wrappers that enforce strict=True.""" @functools.wraps(factory) def wrapper(*args: P.args, **kwargs: P.kwargs) -> R: if "strict" not in kwargs: raise MissingStrictInConstrainedTypeException(factory.__name__) if not kwargs["strict"]: raise MissingStrictInConstrainedTypeException(factory.__name__) return factory(*args, **kwargs) return wrapper
Very rough attempt to detect if a type is unwanted as a Pydantic annotation. At present, we exclude types which will coerce, or any generic type involving types which will coerce.
def field_type_unwanted(type_: Any) -> bool: """Very rough attempt to detect if a type is unwanted as a Pydantic annotation. At present, we exclude types which will coerce, or any generic type involving types which will coerce.""" logger.debug("Is %s unwanted?") if type_ in TYPES_THAT_PYDANTIC_WILL_COERCE_TO: logger.debug("yes") return True logger.debug("Maybe. Subargs are %s", get_args(type_)) rv = any(field_type_unwanted(t) for t in get_args(type_)) logger.debug("Conclusion: %s %s unwanted", type_, "is" if rv else "is not") return rv
Patch pydantic with our snooping versions of BaseModel and the con* functions. If the snooping functions see something they don't like, they'll raise a ModelCheckingException instance.
def monkeypatch_pydantic() -> Generator[None, None, None]: """Patch pydantic with our snooping versions of BaseModel and the con* functions. If the snooping functions see something they don't like, they'll raise a ModelCheckingException instance. """ with contextlib.ExitStack() as patches: # Most Synapse code ought to import the patched objects directly from # `pydantic`. But we also patch their containing modules `pydantic.main` and # `pydantic.types` for completeness. patch_basemodel1 = unittest.mock.patch( "pydantic.BaseModel", new=PatchedBaseModel ) patch_basemodel2 = unittest.mock.patch( "pydantic.main.BaseModel", new=PatchedBaseModel ) patches.enter_context(patch_basemodel1) patches.enter_context(patch_basemodel2) for factory in CONSTRAINED_TYPE_FACTORIES_WITH_STRICT_FLAG: wrapper: Callable = make_wrapper(factory) patch1 = unittest.mock.patch(f"pydantic.{factory.__name__}", new=wrapper) patch2 = unittest.mock.patch( f"pydantic.types.{factory.__name__}", new=wrapper ) patches.enter_context(patch1) patches.enter_context(patch2) yield
Work out which line of code caused e. Format the line in a human-friendly way.
def format_model_checker_exception(e: ModelCheckerException) -> str: """Work out which line of code caused e. Format the line in a human-friendly way.""" # TODO. FieldHasUnwantedTypeException gives better error messages. Can we ditch the # patches of constr() etc, and instead inspect fields to look for ConstrainedStr # with strict=False? There is some difficulty with the inheritance hierarchy # because StrictStr < ConstrainedStr < str. if isinstance(e, FieldHasUnwantedTypeException): return e.message elif isinstance(e, MissingStrictInConstrainedTypeException): frame_summary = traceback.extract_tb(e.__traceback__)[-2] return ( f"Missing `strict=True` from {e.factory_name}() call \n" + traceback.format_list([frame_summary])[0].lstrip() ) else: raise ValueError(f"Unknown exception {e}") from e
Try to import all of Synapse and see if we spot any Pydantic type coercions. Print any problems, then return a status code suitable for sys.exit.
def lint() -> int: """Try to import all of Synapse and see if we spot any Pydantic type coercions. Print any problems, then return a status code suitable for sys.exit.""" failures = do_lint() if failures: print(f"Found {len(failures)} problem(s)") for failure in sorted(failures): print(failure) return os.EX_DATAERR if failures else os.EX_OK
Try to import all of Synapse and see if we spot any Pydantic type coercions.
def do_lint() -> Set[str]: """Try to import all of Synapse and see if we spot any Pydantic type coercions.""" failures = set() with monkeypatch_pydantic(): logger.debug("Importing synapse") try: # TODO: make "synapse" an argument so we can target this script at # a subpackage module = importlib.import_module("synapse") except ModelCheckerException as e: logger.warning("Bad annotation found when importing synapse") failures.add(format_model_checker_exception(e)) return failures try: logger.debug("Fetching subpackages") module_infos = list( pkgutil.walk_packages(module.__path__, f"{module.__name__}.") ) except ModelCheckerException as e: logger.warning("Bad annotation found when looking for modules to import") failures.add(format_model_checker_exception(e)) return failures for module_info in module_infos: logger.debug("Importing %s", module_info.name) try: importlib.import_module(module_info.name) except ModelCheckerException as e: logger.warning( f"Bad annotation found when importing {module_info.name}" ) failures.add(format_model_checker_exception(e)) return failures
Exec a snippet of source code in an isolated environment.
def run_test_snippet(source: str) -> None: """Exec a snippet of source code in an isolated environment.""" # To emulate `source` being called at the top level of the module, # the globals and locals we provide apparently have to be the same mapping. # # > Remember that at the module level, globals and locals are the same dictionary. # > If exec gets two separate objects as globals and locals, the code will be # > executed as if it were embedded in a class definition. globals_: Dict[str, object] locals_: Dict[str, object] globals_ = locals_ = {} exec(textwrap.dedent(source), globals_, locals_)
Encode bytes as a base64 string without any padding.
def encode_base64(input_bytes: bytes) -> str: """Encode bytes as a base64 string without any padding.""" input_len = len(input_bytes) output_len = 4 * ((input_len + 2) // 3) + (input_len + 2) % 3 - 2 output_bytes = base64.b64encode(input_bytes) output_string = output_bytes[:output_len].decode("ascii") return output_string
Get the "final" return type of a callable which might return an Awaitable/Deferred.
def _get_true_return_type(signature: CallableType) -> mypy.types.Type: """ Get the "final" return type of a callable which might return an Awaitable/Deferred. """ if isinstance(signature.ret_type, Instance): # If a coroutine, unwrap the coroutine's return type. if signature.ret_type.type.fullname == "typing.Coroutine": return signature.ret_type.args[2] # If an awaitable, unwrap the awaitable's final value. elif signature.ret_type.type.fullname == "typing.Awaitable": return signature.ret_type.args[0] # If a Deferred, unwrap the Deferred's final value. elif signature.ret_type.type.fullname == "twisted.internet.defer.Deferred": return signature.ret_type.args[0] # Otherwise, return the raw value of the function. return signature.ret_type
Fixes the `CachedFunction.__call__` signature to be correct. It already has *almost* the correct signature, except: 1. the `self` argument needs to be marked as "bound"; 2. any `cache_context` argument should be removed; 3. an optional keyword argument `on_invalidated` should be added. 4. Wrap the return type to always be a Deferred.
def cached_function_method_signature(ctx: MethodSigContext) -> CallableType: """Fixes the `CachedFunction.__call__` signature to be correct. It already has *almost* the correct signature, except: 1. the `self` argument needs to be marked as "bound"; 2. any `cache_context` argument should be removed; 3. an optional keyword argument `on_invalidated` should be added. 4. Wrap the return type to always be a Deferred. """ # 1. Mark this as a bound function signature. signature: CallableType = bind_self(ctx.default_signature) # 2. Remove any "cache_context" args. # # Note: We should be only doing this if `cache_context=True` is set, but if # it isn't then the code will raise an exception when its called anyway, so # it's not the end of the world. context_arg_index = None for idx, name in enumerate(signature.arg_names): if name == "cache_context": context_arg_index = idx break arg_types = list(signature.arg_types) arg_names = list(signature.arg_names) arg_kinds = list(signature.arg_kinds) if context_arg_index: arg_types.pop(context_arg_index) arg_names.pop(context_arg_index) arg_kinds.pop(context_arg_index) # 3. Add an optional "on_invalidate" argument. # # This is a either # - a callable which accepts no input and returns nothing, or # - None. calltyp = UnionType( [ NoneType(), CallableType( arg_types=[], arg_kinds=[], arg_names=[], ret_type=NoneType(), fallback=ctx.api.named_generic_type("builtins.function", []), ), ] ) arg_types.append(calltyp) arg_names.append("on_invalidate") arg_kinds.append(ARG_NAMED_OPT) # Arg is an optional kwarg. # 4. Ensure the return type is a Deferred. ret_arg = _get_true_return_type(signature) # This should be able to use ctx.api.named_generic_type, but that doesn't seem # to find the correct symbol for anything more than 1 module deep. # # modules is not part of CheckerPluginInterface. The following is a combination # of TypeChecker.named_generic_type and TypeChecker.lookup_typeinfo. sym = ctx.api.modules["twisted.internet.defer"].names.get("Deferred") # type: ignore[attr-defined] ret_type = Instance(sym.node, [remove_instance_last_known_values(ret_arg)]) signature = signature.copy_modified( arg_types=arg_types, arg_names=arg_names, arg_kinds=arg_kinds, ret_type=ret_type, ) return signature
Asserts that the signature of a method returns a value which can be cached. Makes no changes to the provided method signature.
def check_is_cacheable_wrapper(ctx: MethodSigContext) -> CallableType: """Asserts that the signature of a method returns a value which can be cached. Makes no changes to the provided method signature. """ # The true signature, this isn't being modified so this is what will be returned. signature: CallableType = ctx.default_signature if not isinstance(ctx.args[0][0], TempNode): ctx.api.note("Cached function is not a TempNode?!", ctx.context) # type: ignore[attr-defined] return signature orig_sig = ctx.args[0][0].type if not isinstance(orig_sig, CallableType): ctx.api.fail("Cached 'function' is not a callable", ctx.context) return signature check_is_cacheable(orig_sig, ctx) return signature
Check if a callable returns a type which can be cached. Args: signature: The callable to check. ctx: The signature context, used for error reporting.
def check_is_cacheable( signature: CallableType, ctx: Union[MethodSigContext, FunctionSigContext], ) -> None: """ Check if a callable returns a type which can be cached. Args: signature: The callable to check. ctx: The signature context, used for error reporting. """ # Unwrap the true return type from the cached function. return_type = _get_true_return_type(signature) verbose = ctx.api.options.verbosity >= 1 # TODO Technically a cachedList only needs immutable values, but forcing them # to return Mapping instead of Dict is fine. ok, note = is_cacheable(return_type, signature, verbose) if ok: message = f"function {signature.name} is @cached, returning {return_type}" else: message = f"function {signature.name} is @cached, but has mutable return value {return_type}" if note: message += f" ({note})" message = message.replace("builtins.", "").replace("typing.", "") if ok and note: ctx.api.note(message, ctx.context) # type: ignore[attr-defined] elif not ok: ctx.api.fail(message, ctx.context, code=AT_CACHED_MUTABLE_RETURN)
Check if a particular type is cachable. A type is cachable if it is immutable; for complex types this recurses to check each type parameter. Returns: a 2-tuple (cacheable, message). - cachable: False means the type is definitely not cacheable; true means anything else. - Optional message.
def is_cacheable( rt: mypy.types.Type, signature: CallableType, verbose: bool ) -> Tuple[bool, Optional[str]]: """ Check if a particular type is cachable. A type is cachable if it is immutable; for complex types this recurses to check each type parameter. Returns: a 2-tuple (cacheable, message). - cachable: False means the type is definitely not cacheable; true means anything else. - Optional message. """ # This should probably be done via a TypeVisitor. Apologies to the reader! if isinstance(rt, AnyType): return True, ("may be mutable" if verbose else None) elif isinstance(rt, Instance): if ( rt.type.fullname in IMMUTABLE_VALUE_TYPES or rt.type.fullname in IMMUTABLE_CUSTOM_TYPES ): # "Simple" types are generally immutable. return True, None elif rt.type.fullname == "typing.Mapping": # Generally mapping keys are immutable, but they only *have* to be # hashable, which doesn't imply immutability. E.g. Mapping[K, V] # is cachable iff K and V are cachable. return is_cacheable(rt.args[0], signature, verbose) and is_cacheable( rt.args[1], signature, verbose ) elif rt.type.fullname in IMMUTABLE_CONTAINER_TYPES_REQUIRING_IMMUTABLE_ELEMENTS: # E.g. Collection[T] is cachable iff T is cachable. return is_cacheable(rt.args[0], signature, verbose) elif rt.type.fullname in MUTABLE_CONTAINER_TYPES: # Mutable containers are mutable regardless of their underlying type. return False, None elif "attrs" in rt.type.metadata: # attrs classes are only cachable iff it is frozen (immutable itself) # and all attributes are cachable. frozen = rt.type.metadata["attrs"]["frozen"] if frozen: for attribute in rt.type.metadata["attrs"]["attributes"]: attribute_name = attribute["name"] symbol_node = rt.type.names[attribute_name].node assert isinstance(symbol_node, Var) assert symbol_node.type is not None ok, note = is_cacheable(symbol_node.type, signature, verbose) if not ok: return False, f"non-frozen attrs property: {attribute_name}" # All attributes were frozen. return True, None else: return False, "non-frozen attrs class" else: # Ensure we fail for unknown types, these generally means that the # above code is not complete. return ( False, f"Don't know how to handle {rt.type.fullname} return type instance", ) elif isinstance(rt, NoneType): # None is cachable. return True, None elif isinstance(rt, (TupleType, UnionType)): # Tuples and unions are cachable iff all their items are cachable. for item in rt.items: ok, note = is_cacheable(item, signature, verbose) if not ok: return False, note # This discards notes but that's probably fine return True, None elif isinstance(rt, TypeAliasType): # For a type alias, check if the underlying real type is cachable. return is_cacheable(mypy.types.get_proper_type(rt), signature, verbose) elif isinstance(rt, UninhabitedType) and rt.is_noreturn: # There is no return value, just consider it cachable. This is only used # in tests. return True, None else: # Ensure we fail for unknown types, these generally means that the # above code is not complete. return False, f"Don't know how to handle {type(rt).__qualname__} return type"
An interactive script to walk through the parts of creating a release. Requirements: - The dev dependencies be installed, which can be done via: pip install -e .[dev] - A checkout of the sytest repository at ../sytest Then to use: ./scripts-dev/release.py prepare # ... ask others to look at the changelog ... ./scripts-dev/release.py tag # wait for assets to build, either manually or with: ./scripts-dev/release.py wait-for-actions ./scripts-dev/release.py publish ./scripts-dev/release.py upload ./scripts-dev/release.py merge-back # Optional: generate some nice links for the announcement ./scripts-dev/release.py announce Alternatively, `./scripts-dev/release.py full` will do all the above as well as guiding you through the manual steps. If the env var GH_TOKEN (or GITHUB_TOKEN) is set, or passed into the `tag`/`publish` command, then a new draft release will be created/published.
def cli() -> None: """An interactive script to walk through the parts of creating a release. Requirements: - The dev dependencies be installed, which can be done via: pip install -e .[dev] - A checkout of the sytest repository at ../sytest Then to use: ./scripts-dev/release.py prepare # ... ask others to look at the changelog ... ./scripts-dev/release.py tag # wait for assets to build, either manually or with: ./scripts-dev/release.py wait-for-actions ./scripts-dev/release.py publish ./scripts-dev/release.py upload ./scripts-dev/release.py merge-back # Optional: generate some nice links for the announcement ./scripts-dev/release.py announce Alternatively, `./scripts-dev/release.py full` will do all the above as well as guiding you through the manual steps. If the env var GH_TOKEN (or GITHUB_TOKEN) is set, or passed into the `tag`/`publish` command, then a new draft release will be created/published. """
Do the initial stages of creating a release, including creating release branch, updating changelog and pushing to GitHub.
def _prepare() -> None: """Do the initial stages of creating a release, including creating release branch, updating changelog and pushing to GitHub. """ # Make sure we're in a git repo. synapse_repo = get_repo_and_check_clean_checkout() sytest_repo = get_repo_and_check_clean_checkout("../sytest", "sytest") click.secho("Updating Synapse and Sytest git repos...") synapse_repo.remote().fetch() sytest_repo.remote().fetch() # Get the current version and AST from root Synapse module. current_version = get_package_version() # Figure out what sort of release we're doing and calcuate the new version. rc = click.confirm("RC", default=True) if current_version.pre: # If the current version is an RC we don't need to bump any of the # version numbers (other than the RC number). if rc: new_version = "{}.{}.{}rc{}".format( current_version.major, current_version.minor, current_version.micro, current_version.pre[1] + 1, ) else: new_version = "{}.{}.{}".format( current_version.major, current_version.minor, current_version.micro, ) else: # If this is a new release cycle then we need to know if it's a minor # or a patch version bump. release_type = click.prompt( "Release type", type=click.Choice(("minor", "patch")), show_choices=True, default="minor", ) if release_type == "minor": if rc: new_version = "{}.{}.{}rc1".format( current_version.major, current_version.minor + 1, 0, ) else: new_version = "{}.{}.{}".format( current_version.major, current_version.minor + 1, 0, ) else: if rc: new_version = "{}.{}.{}rc1".format( current_version.major, current_version.minor, current_version.micro + 1, ) else: new_version = "{}.{}.{}".format( current_version.major, current_version.minor, current_version.micro + 1, ) # Confirm the calculated version is OK. if not click.confirm(f"Create new version: {new_version}?", default=True): click.get_current_context().abort() # Switch to the release branch. parsed_new_version = version.parse(new_version) # We assume for debian changelogs that we only do RCs or full releases. assert not parsed_new_version.is_devrelease assert not parsed_new_version.is_postrelease release_branch_name = get_release_branch_name(parsed_new_version) release_branch = find_ref(synapse_repo, release_branch_name) if release_branch: if release_branch.is_remote(): # If the release branch only exists on the remote we check it out # locally. synapse_repo.git.checkout(release_branch_name) else: # If a branch doesn't exist we create one. We ask which one branch it # should be based off, defaulting to sensible values depending on the # release type. if current_version.is_prerelease: default = release_branch_name elif release_type == "minor": default = "develop" else: default = "master" branch_name = click.prompt( "Which branch should the release be based on?", default=default ) for repo_name, repo in {"synapse": synapse_repo, "sytest": sytest_repo}.items(): base_branch = find_ref(repo, branch_name) if not base_branch: print(f"Could not find base branch {branch_name} for {repo_name}!") click.get_current_context().abort() # Check out the base branch and ensure it's up to date repo.head.set_reference( base_branch, f"check out the base branch for {repo_name}" ) repo.head.reset(index=True, working_tree=True) if not base_branch.is_remote(): update_branch(repo) # Create the new release branch repo.create_head(release_branch_name, commit=base_branch) # Special-case SyTest: we don't actually prepare any files so we may # as well push it now (and only when we create a release branch; # not on subsequent RCs or full releases). if click.confirm("Push new SyTest branch?", default=True): sytest_repo.git.push("-u", sytest_repo.remote().name, release_branch_name) # Switch to the release branch and ensure it's up to date. synapse_repo.git.checkout(release_branch_name) update_branch(synapse_repo) # Update the version specified in pyproject.toml. subprocess.check_output(["poetry", "version", new_version]) # Generate changelogs. generate_and_write_changelog(synapse_repo, current_version, new_version) # Generate debian changelogs if parsed_new_version.pre is not None: # If this is an RC then we need to coerce the version string to match # Debian norms, e.g. 1.39.0rc2 gets converted to 1.39.0~rc2. base_ver = parsed_new_version.base_version pre_type, pre_num = parsed_new_version.pre debian_version = f"{base_ver}~{pre_type}{pre_num}" else: debian_version = new_version if sys.platform == "darwin": run_until_successful( f"docker run --rm -v .:/synapse ubuntu:latest /synapse/scripts-dev/docker_update_debian_changelog.sh {new_version}", shell=True, ) else: run_until_successful( f'dch -M -v {debian_version} "New Synapse release {new_version}."', shell=True, ) run_until_successful('dch -M -r -D stable ""', shell=True) # Show the user the changes and ask if they want to edit the change log. synapse_repo.git.add("-u") subprocess.run("git diff --cached", shell=True) if click.confirm("Edit changelog?", default=False): click.edit(filename="CHANGES.md") # Commit the changes. synapse_repo.git.add("-u") synapse_repo.git.commit("-m", new_version) # We give the option to bail here in case the user wants to make sure things # are OK before pushing. if not click.confirm("Push branch to github?", default=True): print("") print("Run when ready to push:") print("") print( f"\tgit push -u {synapse_repo.remote().name} {synapse_repo.active_branch.name}" ) print("") sys.exit(0) # Otherwise, push and open the changelog in the browser. synapse_repo.git.push( "-u", synapse_repo.remote().name, synapse_repo.active_branch.name ) print("Opening the changelog in your browser...") print("Please ask #synapse-dev to give it a check.") click.launch( f"https://github.com/matrix-org/synapse/blob/{synapse_repo.active_branch.name}/CHANGES.md" )
Tags the release and generates a draft GitHub release
def _tag(gh_token: Optional[str]) -> None: """Tags the release and generates a draft GitHub release""" # Make sure we're in a git repo. repo = get_repo_and_check_clean_checkout() click.secho("Updating git repo...") repo.remote().fetch() # Find out the version and tag name. current_version = get_package_version() tag_name = f"v{current_version}" # Check we haven't released this version. if tag_name in repo.tags: raise click.ClickException(f"Tag {tag_name} already exists!\n") # Check we're on the right release branch release_branch = get_release_branch_name(current_version) if repo.active_branch.name != release_branch: click.echo( f"Need to be on the release branch ({release_branch}) before tagging. " f"Currently on ({repo.active_branch.name})." ) click.get_current_context().abort() # Get the appropriate changelogs and tag. changes = get_changes_for_version(current_version) click.echo_via_pager(changes) if click.confirm("Edit text?", default=False): edited_changes = click.edit(changes, require_save=False) # This assert is for mypy's benefit. click's docs are a little unclear, but # when `require_save=False`, not saving the temp file in the editor returns # the original string. assert edited_changes is not None changes = edited_changes repo.create_tag(tag_name, message=changes, sign=True) if not click.confirm("Push tag to GitHub?", default=True): print("") print("Run when ready to push:") print("") print(f"\tgit push {repo.remote().name} tag {current_version}") print("") return repo.git.push(repo.remote().name, "tag", tag_name) # If no token was given, we bail here if not gh_token: print("Launching the GitHub release page in your browser.") print("Please correct the title and create a draft.") if current_version.is_prerelease: print("As this is an RC, remember to mark it as a pre-release!") print("(by the way, this step can be automated by passing --gh-token,") print("or one of the GH_TOKEN or GITHUB_TOKEN env vars.)") click.launch(f"https://github.com/matrix-org/synapse/releases/edit/{tag_name}") print("Once done, you need to wait for the release assets to build.") if click.confirm("Launch the release assets actions page?", default=True): click.launch( f"https://github.com/matrix-org/synapse/actions?query=branch%3A{tag_name}" ) return # Create a new draft release gh = Github(gh_token) gh_repo = gh.get_repo("matrix-org/synapse") release = gh_repo.create_git_release( tag=tag_name, name=tag_name, message=changes, draft=True, prerelease=current_version.is_prerelease, ) # Open the release and the actions where we are building the assets. print("Launching the release page and the actions page.") click.launch(release.html_url) click.launch( f"https://github.com/matrix-org/synapse/actions?query=branch%3A{tag_name}" ) click.echo("Wait for release assets to be built")
Publish release on GitHub.
def _publish(gh_token: str) -> None: """Publish release on GitHub.""" # Make sure we're in a git repo. get_repo_and_check_clean_checkout() current_version = get_package_version() tag_name = f"v{current_version}" if not click.confirm(f"Publish release {tag_name} on GitHub?", default=True): return # Publish the draft release gh = Github(gh_token) gh_repo = gh.get_repo("matrix-org/synapse") for release in gh_repo.get_releases(): if release.title == tag_name: break else: raise ClickException(f"Failed to find GitHub release for {tag_name}") assert release.title == tag_name if not release.draft: click.echo("Release already published.") return release = release.update_release( name=release.title, message=release.body, tag_name=release.tag_name, prerelease=release.prerelease, draft=False, )
Upload release to pypi.
def _upload(gh_token: Optional[str]) -> None: """Upload release to pypi.""" current_version = get_package_version() tag_name = f"v{current_version}" # Check we have the right tag checked out. repo = get_repo_and_check_clean_checkout() tag = repo.tag(f"refs/tags/{tag_name}") if repo.head.commit != tag.commit: click.echo(f"Tag {tag_name} ({tag.commit}) is not currently checked out!") click.get_current_context().abort() # Query all the assets corresponding to this release. gh = Github(gh_token) gh_repo = gh.get_repo("matrix-org/synapse") gh_release = gh_repo.get_release(tag_name) all_assets = set(gh_release.get_assets()) # Only accept the wheels and sdist. # Notably: we don't care about debs.tar.xz. asset_names_and_urls = sorted( (asset.name, asset.browser_download_url) for asset in all_assets if asset.name.endswith((".whl", ".tar.gz")) ) # Print out what we've determined. print("Found relevant assets:") for asset_name, _ in asset_names_and_urls: print(f" - {asset_name}") ignored_asset_names = sorted( {asset.name for asset in all_assets} - {asset_name for asset_name, _ in asset_names_and_urls} ) print("\nIgnoring irrelevant assets:") for asset_name in ignored_asset_names: print(f" - {asset_name}") with TemporaryDirectory(prefix=f"synapse_upload_{tag_name}_") as tmpdir: for name, asset_download_url in asset_names_and_urls: filename = path.join(tmpdir, name) click.echo(f"Downloading {name} into {filename}") urllib.request.urlretrieve(asset_download_url, filename=filename) if click.confirm("Upload to PyPI?", default=True): subprocess.run("twine upload *", shell=True, cwd=tmpdir) click.echo( f"Done! Remember to merge the tag {tag_name} into the appropriate branches" )
Merges branch `source` into branch `target`. Pulls both before merging and pushes the result.
def _merge_into(repo: Repo, source: str, target: str) -> None: """ Merges branch `source` into branch `target`. Pulls both before merging and pushes the result. """ # Update our branches and switch to the target branch for branch in [source, target]: click.echo(f"Switching to {branch} and pulling...") repo.heads[branch].checkout() # Pull so we're up to date repo.remote().pull() assert repo.active_branch.name == target try: # TODO This seemed easier than using GitPython directly click.echo(f"Merging {source}...") repo.git.merge(source) except GitCommandError as exc: # If a merge conflict occurs, give some context and try to # make it easy to abort if necessary. click.echo(exc) if not click.confirm( f"Likely merge conflict whilst merging ({source} → {target}). " f"Have you resolved it?" ): repo.git.merge("--abort") return # Push result. click.echo("Pushing...") repo.remote().push()
Merge the release branch back into the appropriate branches. All branches will be automatically pulled from the remote and the results will be pushed to the remote.
def _merge_back() -> None: """Merge the release branch back into the appropriate branches. All branches will be automatically pulled from the remote and the results will be pushed to the remote.""" synapse_repo = get_repo_and_check_clean_checkout() branch_name = synapse_repo.active_branch.name if not branch_name.startswith("release-v"): raise RuntimeError("Not on a release branch. This does not seem sensible.") # Pull so we're up to date synapse_repo.remote().pull() current_version = get_package_version() if current_version.is_prerelease: # Release candidate if click.confirm(f"Merge {branch_name} → develop?", default=True): _merge_into(synapse_repo, branch_name, "develop") else: # Full release sytest_repo = get_repo_and_check_clean_checkout("../sytest", "sytest") if click.confirm(f"Merge {branch_name} → master?", default=True): _merge_into(synapse_repo, branch_name, "master") if click.confirm("Merge master → develop?", default=True): _merge_into(synapse_repo, "master", "develop") if click.confirm(f"On SyTest, merge {branch_name} → master?", default=True): _merge_into(sytest_repo, branch_name, "master") if click.confirm("On SyTest, merge master → develop?", default=True): _merge_into(sytest_repo, "master", "develop")
Generate markdown to announce the release.
def _announce() -> None: """Generate markdown to announce the release.""" current_version = get_package_version() tag_name = f"v{current_version}" click.echo( f""" Hi everyone. Synapse {current_version} has just been released. [notes](https://github.com/matrix-org/synapse/releases/tag/{tag_name}) | \ [docker](https://hub.docker.com/r/matrixdotorg/synapse/tags?name={tag_name}) | \ [debs](https://packages.matrix.org/debian/) | \ [pypi](https://pypi.org/project/matrix-synapse/{current_version}/)""" ) if "rc" in tag_name: click.echo( """ Announce the RC in - #homeowners:matrix.org (Synapse Announcements) - #synapse-dev:matrix.org""" ) else: click.echo( """ Announce the release in - #homeowners:matrix.org (Synapse Announcements), bumping the version in the topic - #synapse:matrix.org (Synapse Admins), bumping the version in the topic - #synapse-dev:matrix.org - #synapse-package-maintainers:matrix.org Ask the designated people to do the blog and tweets.""" )
Get the project repo and check it's not got any uncommitted changes.
def get_repo_and_check_clean_checkout( path: str = ".", name: str = "synapse" ) -> git.Repo: """Get the project repo and check it's not got any uncommitted changes.""" try: repo = git.Repo(path=path) except git.InvalidGitRepositoryError: raise click.ClickException( f"{path} is not a git repository (expecting a {name} repository)." ) if repo.is_dirty(): raise click.ClickException(f"Uncommitted changes exist in {path}.") return repo
Find the branch/ref, looking first locally then in the remote.
def find_ref(repo: git.Repo, ref_name: str) -> Optional[git.HEAD]: """Find the branch/ref, looking first locally then in the remote.""" if ref_name in repo.references: return repo.references[ref_name] elif ref_name in repo.remote().refs: return repo.remote().refs[ref_name] else: return None
Ensure branch is up to date if it has a remote
def update_branch(repo: git.Repo) -> None: """Ensure branch is up to date if it has a remote""" tracking_branch = repo.active_branch.tracking_branch() if tracking_branch: repo.git.merge(tracking_branch.name)
Get the changelogs for the given version. If an RC then will only get the changelog for that RC version, otherwise if its a full release will get the changelog for the release and all its RCs.
def get_changes_for_version(wanted_version: version.Version) -> str: """Get the changelogs for the given version. If an RC then will only get the changelog for that RC version, otherwise if its a full release will get the changelog for the release and all its RCs. """ with open("CHANGES.md") as f: changes = f.read() # First we parse the changelog so that we can split it into sections based # on the release headings. ast = commonmark.Parser().parse(changes) @attr.s(auto_attribs=True) class VersionSection: title: str # These are 0-based. start_line: int end_line: Optional[int] = None # Is none if its the last entry headings: List[VersionSection] = [] for node, _ in ast.walker(): # We look for all text nodes that are in a level 1 heading. if node.t != "text": continue if node.parent.t != "heading" or node.parent.level != 1: continue # If we have a previous heading then we update its `end_line`. if headings: headings[-1].end_line = node.parent.sourcepos[0][0] - 1 headings.append(VersionSection(node.literal, node.parent.sourcepos[0][0] - 1)) changes_by_line = changes.split("\n") version_changelog = [] # The lines we want to include in the changelog # Go through each section and find any that match the requested version. regex = re.compile(r"^Synapse v?(\S+)") for section in headings: groups = regex.match(section.title) if not groups: continue heading_version = version.parse(groups.group(1)) heading_base_version = version.parse(heading_version.base_version) # Check if heading version matches the requested version, or if its an # RC of the requested version. if wanted_version not in (heading_version, heading_base_version): continue version_changelog.extend(changes_by_line[section.start_line : section.end_line]) return "\n".join(version_changelog)
Summarise dependabot commits between `current_version` and `release_branch`. Returns an empty string if there have been no such commits; otherwise outputs a third-level markdown header followed by an unordered list.
def build_dependabot_changelog(repo: Repo, current_version: version.Version) -> str: """Summarise dependabot commits between `current_version` and `release_branch`. Returns an empty string if there have been no such commits; otherwise outputs a third-level markdown header followed by an unordered list.""" last_release_commit = repo.tag("v" + str(current_version)).commit rev_spec = f"{last_release_commit.hexsha}.." commits = list(git.objects.Commit.iter_items(repo, rev_spec)) messages = [] for commit in reversed(commits): if commit.author.name == "dependabot[bot]": message: Union[str, bytes] = commit.message if isinstance(message, bytes): message = message.decode("utf-8") messages.append(message.split("\n", maxsplit=1)[0]) if not messages: print(f"No dependabot commits in range {rev_spec}", file=sys.stderr) return "" messages.sort() def replacer(match: Match[str]) -> str: desc = match.group(1) number = match.group(2) return f"* {desc}. ([\\#{number}](https://github.com/matrix-org/synapse/issues/{number}))" for i, message in enumerate(messages): messages[i] = re.sub(r"(.*) \(#(\d+)\)$", replacer, message) messages.insert(0, "### Updates to locked dependencies\n") # Add an extra blank line to the bottom of the section messages.append("") return "\n".join(messages)
Test building the dependabot changelog. Summarises all dependabot commits between the SINCE tag and the current git HEAD.
def test_dependabot_changelog(since: str) -> None: """Test building the dependabot changelog. Summarises all dependabot commits between the SINCE tag and the current git HEAD.""" print(build_dependabot_changelog(git.Repo("."), version.Version(since)))
Get the schema and schema compat versions for a tag.
def get_schema_versions(tag: git.Tag) -> Tuple[Optional[int], Optional[int]]: """Get the schema and schema compat versions for a tag.""" schema_version = None schema_compat_version = None for file in SCHEMA_VERSION_FILES: try: schema_file = tag.commit.tree / file except KeyError: continue # We (usually) can't execute the code since it might have unknown imports. if file != "synapse/storage/schema/__init__.py": with io.BytesIO(schema_file.data_stream.read()) as f: for line in f.readlines(): if line.startswith(b"SCHEMA_VERSION"): schema_version = int(line.split()[2]) # Bail early. break else: # SCHEMA_COMPAT_VERSION is sometimes across multiple lines, the easist # thing to do is exec the code. Luckily it has only ever existed in # a file which imports nothing else from Synapse. locals: Dict[str, Any] = {} exec(schema_file.data_stream.read().decode("utf-8"), {}, locals) schema_version = locals["SCHEMA_VERSION"] schema_compat_version = locals.get("SCHEMA_COMPAT_VERSION") return schema_version, schema_compat_version
Return an iterator of tags sorted by version.
def get_tags(repo: git.Repo) -> Iterator[git.Tag]: """Return an iterator of tags sorted by version.""" tags = [] for tag in repo.tags: # All "real" Synapse tags are of the form vX.Y.Z. if not tag.name.startswith("v"): continue # There's a weird tag from the initial react UI. if tag.name == "v0.1": continue try: tag_version = version.parse(tag.name) except version.InvalidVersion: # Skip invalid versions. continue # Skip pre- and post-release versions. if tag_version.is_prerelease or tag_version.is_postrelease or tag_version.local: continue # Skip old versions. if tag_version < OLDEST_SHOWN_VERSION: continue tags.append((tag_version, tag)) # Sort based on the version number (not lexically). return (tag for _, tag in sorted(tags, key=lambda t: t[0]))
Ensure that the event complies with the limits, and has the right signatures NB: does not *validate* the signatures - it assumes that any signatures present have already been checked. NB: it does not check that the event satisfies the auth rules (that is done in check_auth_rules_for_event) - these tests are independent of the rest of the state in the room. NB: This is used to check events that have been received over federation. As such, it can only enforce the checks specified in the relevant room version, to avoid a split-brain situation where some servers accept such events, and others reject them. See also EventValidator, which contains extra checks which are applied only to locally-generated events. Args: event: the event to be checked Raises: SynapseError if there is a problem with the event
def validate_event_for_room_version(event: "EventBase") -> None: """Ensure that the event complies with the limits, and has the right signatures NB: does not *validate* the signatures - it assumes that any signatures present have already been checked. NB: it does not check that the event satisfies the auth rules (that is done in check_auth_rules_for_event) - these tests are independent of the rest of the state in the room. NB: This is used to check events that have been received over federation. As such, it can only enforce the checks specified in the relevant room version, to avoid a split-brain situation where some servers accept such events, and others reject them. See also EventValidator, which contains extra checks which are applied only to locally-generated events. Args: event: the event to be checked Raises: SynapseError if there is a problem with the event """ _check_size_limits(event) if not hasattr(event, "room_id"): raise AuthError(500, "Event has no room_id: %s" % event) # check that the event has the correct signatures sender_domain = get_domain_from_id(event.sender) is_invite_via_3pid = ( event.type == EventTypes.Member and event.membership == Membership.INVITE and "third_party_invite" in event.content ) # Check the sender's domain has signed the event if not event.signatures.get(sender_domain): # We allow invites via 3pid to have a sender from a different # HS, as the sender must match the sender of the original # 3pid invite. This is checked further down with the # other dedicated membership checks. if not is_invite_via_3pid: raise AuthError(403, "Event not signed by sender's server") if event.format_version in (EventFormatVersions.ROOM_V1_V2,): # Only older room versions have event IDs to check. event_id_domain = get_domain_from_id(event.event_id) # Check the origin domain has signed the event if not event.signatures.get(event_id_domain): raise AuthError(403, "Event not signed by sending server") is_invite_via_allow_rule = ( event.room_version.restricted_join_rule and event.type == EventTypes.Member and event.membership == Membership.JOIN and EventContentFields.AUTHORISING_USER in event.content ) if is_invite_via_allow_rule: authoriser_domain = get_domain_from_id( event.content[EventContentFields.AUTHORISING_USER] ) if not event.signatures.get(authoriser_domain): raise AuthError(403, "Event not signed by authorising server")
Check that an event complies with auth rules that depend on room state Runs through the parts of the auth rules that check an event against bits of room state. Note: - it's fine for use in state resolution, when we have already decided whether to accept the event or not, and are now trying to decide whether it should make it into the room state - when we're doing the initial event auth, it is only suitable in combination with a bunch of other tests (including, but not limited to, check_state_independent_auth_rules). Args: event: the event being checked. auth_events: the room state to check the events against. Raises: AuthError if the checks fail
def check_state_dependent_auth_rules( event: "EventBase", auth_events: Iterable["EventBase"], ) -> None: """Check that an event complies with auth rules that depend on room state Runs through the parts of the auth rules that check an event against bits of room state. Note: - it's fine for use in state resolution, when we have already decided whether to accept the event or not, and are now trying to decide whether it should make it into the room state - when we're doing the initial event auth, it is only suitable in combination with a bunch of other tests (including, but not limited to, check_state_independent_auth_rules). Args: event: the event being checked. auth_events: the room state to check the events against. Raises: AuthError if the checks fail """ # there are no state-dependent auth rules for create events. if event.type == EventTypes.Create: logger.debug("Allowing! %s", event) return auth_dict = {(e.type, e.state_key): e for e in auth_events} # additional check for m.federate creating_domain = get_domain_from_id(event.room_id) originating_domain = get_domain_from_id(event.sender) if creating_domain != originating_domain: if not _can_federate(event, auth_dict): raise AuthError(403, "This room has been marked as unfederatable.") # 4. If type is m.room.aliases if ( event.type == EventTypes.Aliases and event.room_version.special_case_aliases_auth ): # 4a. If event has no state_key, reject if not event.is_state(): raise AuthError(403, "Alias event must be a state event") if not event.state_key: raise AuthError(403, "Alias event must have non-empty state_key") # 4b. If sender's domain doesn't matches [sic] state_key, reject sender_domain = get_domain_from_id(event.sender) if event.state_key != sender_domain: raise AuthError( 403, "Alias event's state_key does not match sender's domain" ) # 4c. Otherwise, allow. logger.debug("Allowing! %s", event) return # 5. If type is m.room.membership if event.type == EventTypes.Member: _is_membership_change_allowed(event.room_version, event, auth_dict) logger.debug("Allowing! %s", event) return _check_event_sender_in_room(event, auth_dict) # Special case to allow m.room.third_party_invite events wherever # a user is allowed to issue invites. Fixes # https://github.com/vector-im/vector-web/issues/1208 hopefully if event.type == EventTypes.ThirdPartyInvite: user_level = get_user_power_level(event.user_id, auth_dict) invite_level = get_named_level(auth_dict, "invite", 0) if user_level < invite_level: raise UnstableSpecAuthError( 403, "You don't have permission to invite users", errcode=Codes.INSUFFICIENT_POWER, ) else: logger.debug("Allowing! %s", event) return _can_send_event(event, auth_dict) if event.type == EventTypes.PowerLevels: _check_power_levels(event.room_version, event, auth_dict) if event.type == EventTypes.Redaction: check_redaction(event.room_version, event, auth_dict) logger.debug("Allowing! %s", event)
Checks the size limits in a PDU. The entire size limit of the PDU is checked first. Then the size of fields is checked, first in codepoints and then in bytes. The codepoint size limits are only for Synapse compatibility. Raises: EventSizeError: when a size limit has been violated. unpersistable=True if Synapse never would have accepted the event and the PDU must NOT be persisted. unpersistable=False if a prior version of Synapse would have accepted the event and so the PDU must be persisted as rejected to avoid breaking the room.
def _check_size_limits(event: "EventBase") -> None: """ Checks the size limits in a PDU. The entire size limit of the PDU is checked first. Then the size of fields is checked, first in codepoints and then in bytes. The codepoint size limits are only for Synapse compatibility. Raises: EventSizeError: when a size limit has been violated. unpersistable=True if Synapse never would have accepted the event and the PDU must NOT be persisted. unpersistable=False if a prior version of Synapse would have accepted the event and so the PDU must be persisted as rejected to avoid breaking the room. """ # Whole PDU check if len(encode_canonical_json(event.get_pdu_json())) > MAX_PDU_SIZE: raise EventSizeError("event too large", unpersistable=True) # Codepoint size check: Synapse always enforced these limits, so apply # them strictly. if len(event.user_id) > 255: raise EventSizeError("'user_id' too large", unpersistable=True) if len(event.room_id) > 255: raise EventSizeError("'room_id' too large", unpersistable=True) if event.is_state() and len(event.state_key) > 255: raise EventSizeError("'state_key' too large", unpersistable=True) if len(event.type) > 255: raise EventSizeError("'type' too large", unpersistable=True) if len(event.event_id) > 255: raise EventSizeError("'event_id' too large", unpersistable=True) strict_byte_limits = ( event.room_version not in LENIENT_EVENT_BYTE_LIMITS_ROOM_VERSIONS ) # Byte size check: if these fail, then be lenient to avoid breaking rooms. if len(event.user_id.encode("utf-8")) > 255: raise EventSizeError("'user_id' too large", unpersistable=strict_byte_limits) if len(event.room_id.encode("utf-8")) > 255: raise EventSizeError("'room_id' too large", unpersistable=strict_byte_limits) if event.is_state() and len(event.state_key.encode("utf-8")) > 255: raise EventSizeError("'state_key' too large", unpersistable=strict_byte_limits) if len(event.type.encode("utf-8")) > 255: raise EventSizeError("'type' too large", unpersistable=strict_byte_limits) if len(event.event_id.encode("utf-8")) > 255: raise EventSizeError("'event_id' too large", unpersistable=strict_byte_limits)
Implementation of the auth rules for m.room.create events Args: event: The `m.room.create` event to be checked Raises: AuthError if the event does not pass the auth rules
def _check_create(event: "EventBase") -> None: """Implementation of the auth rules for m.room.create events Args: event: The `m.room.create` event to be checked Raises: AuthError if the event does not pass the auth rules """ assert event.type == EventTypes.Create # 1.1 If it has any previous events, reject. if event.prev_event_ids(): raise AuthError(403, "Create event has prev events") # 1.2 If the domain of the room_id does not match the domain of the sender, # reject. sender_domain = get_domain_from_id(event.sender) room_id_domain = get_domain_from_id(event.room_id) if room_id_domain != sender_domain: raise AuthError(403, "Creation event's room_id domain does not match sender's") # 1.3 If content.room_version is present and is not a recognised version, reject room_version_prop = event.content.get("room_version", "1") if room_version_prop not in KNOWN_ROOM_VERSIONS: raise AuthError( 403, "room appears to have unsupported version %s" % (room_version_prop,), ) # 1.4 If content has no creator field, reject if the room version requires it. if ( not event.room_version.implicit_room_creator and EventContentFields.ROOM_CREATOR not in event.content ): raise AuthError(403, "Create event lacks a 'creator' property")
Confirms that the event which changes membership is an allowed change. Args: room_version: The version of the room. event: The event to check. auth_events: The current auth events of the room. Raises: AuthError if the event is not allowed.
def _is_membership_change_allowed( room_version: RoomVersion, event: "EventBase", auth_events: StateMap["EventBase"] ) -> None: """ Confirms that the event which changes membership is an allowed change. Args: room_version: The version of the room. event: The event to check. auth_events: The current auth events of the room. Raises: AuthError if the event is not allowed. """ membership = event.content["membership"] # Check if this is the room creator joining: if len(event.prev_event_ids()) == 1 and Membership.JOIN == membership: # Get room creation event: key = (EventTypes.Create, "") create = auth_events.get(key) if create and event.prev_event_ids()[0] == create.event_id: if room_version.implicit_room_creator: creator = create.sender else: creator = create.content[EventContentFields.ROOM_CREATOR] if creator == event.state_key: return target_user_id = event.state_key creating_domain = get_domain_from_id(event.room_id) target_domain = get_domain_from_id(target_user_id) if creating_domain != target_domain: if not _can_federate(event, auth_events): raise AuthError(403, "This room has been marked as unfederatable.") # get info about the caller key = (EventTypes.Member, event.user_id) caller = auth_events.get(key) caller_in_room = caller and caller.membership == Membership.JOIN caller_invited = caller and caller.membership == Membership.INVITE caller_knocked = ( caller and room_version.knock_join_rule and caller.membership == Membership.KNOCK ) # get info about the target key = (EventTypes.Member, target_user_id) target = auth_events.get(key) target_in_room = target and target.membership == Membership.JOIN target_banned = target and target.membership == Membership.BAN key = (EventTypes.JoinRules, "") join_rule_event = auth_events.get(key) if join_rule_event: join_rule = join_rule_event.content.get("join_rule", JoinRules.INVITE) else: join_rule = JoinRules.INVITE user_level = get_user_power_level(event.user_id, auth_events) target_level = get_user_power_level(target_user_id, auth_events) invite_level = get_named_level(auth_events, "invite", 0) ban_level = get_named_level(auth_events, "ban", 50) logger.debug( "_is_membership_change_allowed: %s", { "caller_in_room": caller_in_room, "caller_invited": caller_invited, "caller_knocked": caller_knocked, "target_banned": target_banned, "target_in_room": target_in_room, "membership": membership, "join_rule": join_rule, "target_user_id": target_user_id, "event.user_id": event.user_id, }, ) if Membership.INVITE == membership and "third_party_invite" in event.content: if not _verify_third_party_invite(event, auth_events): raise AuthError(403, "You are not invited to this room.") if target_banned: raise AuthError(403, "%s is banned from the room" % (target_user_id,)) return # Require the user to be in the room for membership changes other than join/knock. # Note that the room version check for knocking is done implicitly by `caller_knocked` # and the ability to set a membership of `knock` in the first place. if Membership.JOIN != membership and Membership.KNOCK != membership: # If the user has been invited or has knocked, they are allowed to change their # membership event to leave if ( (caller_invited or caller_knocked) and Membership.LEAVE == membership and target_user_id == event.user_id ): return if not caller_in_room: # caller isn't joined raise UnstableSpecAuthError( 403, "%s not in room %s." % (event.user_id, event.room_id), errcode=Codes.NOT_JOINED, ) if Membership.INVITE == membership: # TODO (erikj): We should probably handle this more intelligently # PRIVATE join rules. # Invites are valid iff caller is in the room and target isn't. if target_banned: raise AuthError(403, "%s is banned from the room" % (target_user_id,)) elif target_in_room: # the target is already in the room. raise UnstableSpecAuthError( 403, "%s is already in the room." % target_user_id, errcode=Codes.ALREADY_JOINED, ) else: if user_level < invite_level: raise UnstableSpecAuthError( 403, "You don't have permission to invite users", errcode=Codes.INSUFFICIENT_POWER, ) elif Membership.JOIN == membership: # Joins are valid iff caller == target and: # * They are not banned. # * They are accepting a previously sent invitation. # * They are already joined (it's a NOOP). # * The room is public. # * The room is restricted and the user meets the allows rules. if event.user_id != target_user_id: raise AuthError(403, "Cannot force another user to join.") elif target_banned: raise AuthError(403, "You are banned from this room") elif join_rule == JoinRules.PUBLIC: pass elif ( room_version.restricted_join_rule and join_rule == JoinRules.RESTRICTED ) or ( room_version.knock_restricted_join_rule and join_rule == JoinRules.KNOCK_RESTRICTED ): # This is the same as public, but the event must contain a reference # to the server who authorised the join. If the event does not contain # the proper content it is rejected. # # Note that if the caller is in the room or invited, then they do # not need to meet the allow rules. if not caller_in_room and not caller_invited: authorising_user = event.content.get( EventContentFields.AUTHORISING_USER ) if authorising_user is None: raise AuthError(403, "Join event is missing authorising user.") # The authorising user must be in the room. key = (EventTypes.Member, authorising_user) member_event = auth_events.get(key) _check_joined_room(member_event, authorising_user, event.room_id) authorising_user_level = get_user_power_level( authorising_user, auth_events ) if authorising_user_level < invite_level: raise AuthError(403, "Join event authorised by invalid server.") elif ( join_rule == JoinRules.INVITE or (room_version.knock_join_rule and join_rule == JoinRules.KNOCK) or ( room_version.knock_restricted_join_rule and join_rule == JoinRules.KNOCK_RESTRICTED ) ): if not caller_in_room and not caller_invited: raise AuthError(403, "You are not invited to this room.") else: # TODO (erikj): may_join list # TODO (erikj): private rooms raise AuthError(403, "You are not allowed to join this room") elif Membership.LEAVE == membership: # TODO (erikj): Implement kicks. if target_banned and user_level < ban_level: raise UnstableSpecAuthError( 403, "You cannot unban user %s." % (target_user_id,), errcode=Codes.INSUFFICIENT_POWER, ) elif target_user_id != event.user_id: kick_level = get_named_level(auth_events, "kick", 50) if user_level < kick_level or user_level <= target_level: raise UnstableSpecAuthError( 403, "You cannot kick user %s." % target_user_id, errcode=Codes.INSUFFICIENT_POWER, ) elif Membership.BAN == membership: if user_level < ban_level: raise UnstableSpecAuthError( 403, "You don't have permission to ban", errcode=Codes.INSUFFICIENT_POWER, ) elif user_level <= target_level: raise UnstableSpecAuthError( 403, "You don't have permission to ban this user", errcode=Codes.INSUFFICIENT_POWER, ) elif room_version.knock_join_rule and Membership.KNOCK == membership: if join_rule != JoinRules.KNOCK and ( not room_version.knock_restricted_join_rule or join_rule != JoinRules.KNOCK_RESTRICTED ): raise AuthError(403, "You don't have permission to knock") elif target_user_id != event.user_id: raise AuthError(403, "You cannot knock for other users") elif target_in_room: raise UnstableSpecAuthError( 403, "You cannot knock on a room you are already in", errcode=Codes.ALREADY_JOINED, ) elif caller_invited: raise AuthError(403, "You are already invited to this room") elif target_banned: raise AuthError(403, "You are banned from this room") else: raise AuthError(500, "Unknown membership %s" % membership)
Get the power level required to send an event of a given type The federation spec [1] refers to this as "Required Power Level". https://matrix.org/docs/spec/server_server/unstable.html#definitions Args: etype: type of event state_key: state_key of state event, or None if it is not a state event. power_levels_event: power levels event in force at this point in the room Returns: power level required to send this event.
def get_send_level( etype: str, state_key: Optional[str], power_levels_event: Optional["EventBase"] ) -> int: """Get the power level required to send an event of a given type The federation spec [1] refers to this as "Required Power Level". https://matrix.org/docs/spec/server_server/unstable.html#definitions Args: etype: type of event state_key: state_key of state event, or None if it is not a state event. power_levels_event: power levels event in force at this point in the room Returns: power level required to send this event. """ if power_levels_event: power_levels_content = power_levels_event.content else: power_levels_content = {} # see if we have a custom level for this event type send_level = power_levels_content.get("events", {}).get(etype) # otherwise, fall back to the state_default/events_default. if send_level is None: if state_key is not None: send_level = power_levels_content.get("state_default", 50) else: send_level = power_levels_content.get("events_default", 0) return int(send_level)
Check whether the event sender is allowed to redact the target event. Returns: True if the sender is allowed to redact the target event if the target event was created by them. False if the sender is allowed to redact the target event with no further checks. Raises: AuthError if the event sender is definitely not allowed to redact the target event.
def check_redaction( room_version_obj: RoomVersion, event: "EventBase", auth_events: StateMap["EventBase"], ) -> bool: """Check whether the event sender is allowed to redact the target event. Returns: True if the sender is allowed to redact the target event if the target event was created by them. False if the sender is allowed to redact the target event with no further checks. Raises: AuthError if the event sender is definitely not allowed to redact the target event. """ user_level = get_user_power_level(event.user_id, auth_events) redact_level = get_named_level(auth_events, "redact", 50) if user_level >= redact_level: return False if room_version_obj.event_format == EventFormatVersions.ROOM_V1_V2: redacter_domain = get_domain_from_id(event.event_id) if not isinstance(event.redacts, str): return False redactee_domain = get_domain_from_id(event.redacts) if redacter_domain == redactee_domain: return True else: event.internal_metadata.recheck_redaction = True return True raise AuthError(403, "You don't have permission to redact events")
Get a user's power level Args: user_id: user's id to look up in power_levels auth_events: state in force at this point in the room (or rather, a subset of it including at least the create event and power levels event. Returns: the user's power level in this room.
def get_user_power_level(user_id: str, auth_events: StateMap["EventBase"]) -> int: """Get a user's power level Args: user_id: user's id to look up in power_levels auth_events: state in force at this point in the room (or rather, a subset of it including at least the create event and power levels event. Returns: the user's power level in this room. """ power_level_event = get_power_level_event(auth_events) if power_level_event: level = power_level_event.content.get("users", {}).get(user_id) if level is None: level = power_level_event.content.get("users_default", 0) if level is None: return 0 else: return int(level) else: # if there is no power levels event, the creator gets 100 and everyone # else gets 0. # some things which call this don't pass the create event: hack around # that. key = (EventTypes.Create, "") create_event = auth_events.get(key) if create_event is not None: if create_event.room_version.implicit_room_creator: creator = create_event.sender else: creator = create_event.content[EventContentFields.ROOM_CREATOR] if creator == user_id: return 100 return 0
Validates that the invite event is authorized by a previous third-party invite. Checks that the public key, and keyserver, match those in the third party invite, and that the invite event has a signature issued using that public key. Args: event: The m.room.member join event being validated. auth_events: All relevant previous context events which may be used for authorization decisions. Return: True if the event fulfills the expectations of a previous third party invite event.
def _verify_third_party_invite( event: "EventBase", auth_events: StateMap["EventBase"] ) -> bool: """ Validates that the invite event is authorized by a previous third-party invite. Checks that the public key, and keyserver, match those in the third party invite, and that the invite event has a signature issued using that public key. Args: event: The m.room.member join event being validated. auth_events: All relevant previous context events which may be used for authorization decisions. Return: True if the event fulfills the expectations of a previous third party invite event. """ if "third_party_invite" not in event.content: return False third_party_invite = event.content["third_party_invite"] if not isinstance(third_party_invite, collections.abc.Mapping): return False if "signed" not in third_party_invite: return False signed = third_party_invite["signed"] if not isinstance(signed, collections.abc.Mapping): return False for key in {"mxid", "token", "signatures"}: if key not in signed: return False token = signed["token"] invite_event = auth_events.get((EventTypes.ThirdPartyInvite, token)) if not invite_event: return False if invite_event.sender != event.sender: return False if event.user_id != invite_event.user_id: return False if signed["mxid"] != event.state_key: return False for public_key_object in get_public_keys(invite_event): public_key = public_key_object["public_key"] try: for server, signature_block in signed["signatures"].items(): for key_name in signature_block.keys(): if not key_name.startswith("ed25519:"): continue verify_key = decode_verify_key_bytes( key_name, decode_base64(public_key) ) # verify_signed_json incorrectly states it wants a dict, it # just needs a mapping. verify_signed_json(signed, server, verify_key) # type: ignore[arg-type] # We got the public key from the invite, so we know that the # correct server signed the signed bundle. # The caller is responsible for checking that the signing # server has not revoked that public key. return True except (KeyError, SignatureVerifyException): continue return False
Given an event, return a list of (EventType, StateKey) that may be needed to auth the event. The returned list may be a superset of what would actually be required depending on the full state of the room. Used to limit the number of events to fetch from the database to actually auth the event.
def auth_types_for_event( room_version: RoomVersion, event: Union["EventBase", "EventBuilder"] ) -> Set[Tuple[str, str]]: """Given an event, return a list of (EventType, StateKey) that may be needed to auth the event. The returned list may be a superset of what would actually be required depending on the full state of the room. Used to limit the number of events to fetch from the database to actually auth the event. """ if event.type == EventTypes.Create: return set() auth_types = { (EventTypes.PowerLevels, ""), (EventTypes.Member, event.sender), (EventTypes.Create, ""), } if event.type == EventTypes.Member: membership = event.content["membership"] if membership in [Membership.JOIN, Membership.INVITE, Membership.KNOCK]: auth_types.add((EventTypes.JoinRules, "")) auth_types.add((EventTypes.Member, event.state_key)) if membership == Membership.INVITE: if "third_party_invite" in event.content: key = ( EventTypes.ThirdPartyInvite, event.content["third_party_invite"]["signed"]["token"], ) auth_types.add(key) if room_version.restricted_join_rule and membership == Membership.JOIN: if EventContentFields.AUTHORISING_USER in event.content: key = ( EventTypes.Member, event.content[EventContentFields.AUTHORISING_USER], ) auth_types.add(key) return auth_types
Return the number of items in it for which func returns true.
def count(func: Callable[[T], bool], it: Iterable[T]) -> int: """Return the number of items in it for which func returns true.""" n = 0 for x in it: if func(x): n += 1 return n
Wraps a function called e.g. `get_foo`, checking if `self.foo` exists and returning if so. If not, calls the given function and sets `self.foo` to it. Also ensures that dependency cycles throw an exception correctly, rather than overflowing the stack.
def cache_in_self(builder: F) -> F: """Wraps a function called e.g. `get_foo`, checking if `self.foo` exists and returning if so. If not, calls the given function and sets `self.foo` to it. Also ensures that dependency cycles throw an exception correctly, rather than overflowing the stack. """ if not builder.__name__.startswith("get_"): raise Exception( "@cache_in_self can only be used on functions starting with `get_`" ) # get_attr -> _attr depname = builder.__name__[len("get") :] building = [False] @functools.wraps(builder) def _get(self: "HomeServer") -> T: try: return getattr(self, depname) except AttributeError: pass # Prevent cyclic dependencies from deadlocking if building[0]: raise ValueError("Cyclic dependency while building %s" % (depname,)) building[0] = True try: dep = builder(self) setattr(self, depname, dep) finally: building[0] = False return dep return cast(F, _get)
Check with the given user is allowed to see the given event See `filter_events_for_client` for details about args Args: user_id event clock filter_send_to_client is_peeking always_include_ids sender_ignored: Whether the user is ignoring the event sender retention_policy: The retention policy of the room state: The state at the event, unless its an outlier sender_erased: Whether the event sender has been marked as "erased" Returns: None if the user cannot see this event at all a redacted copy of the event if they can only see a redacted version the original event if they can see it as normal.
def _check_client_allowed_to_see_event( user_id: str, event: EventBase, clock: Clock, filter_send_to_client: bool, is_peeking: bool, always_include_ids: FrozenSet[str], sender_ignored: bool, retention_policy: RetentionPolicy, state: Optional[StateMap[EventBase]], sender_erased: bool, ) -> Optional[EventBase]: """Check with the given user is allowed to see the given event See `filter_events_for_client` for details about args Args: user_id event clock filter_send_to_client is_peeking always_include_ids sender_ignored: Whether the user is ignoring the event sender retention_policy: The retention policy of the room state: The state at the event, unless its an outlier sender_erased: Whether the event sender has been marked as "erased" Returns: None if the user cannot see this event at all a redacted copy of the event if they can only see a redacted version the original event if they can see it as normal. """ # Only run some checks if these events aren't about to be sent to clients. This is # because, if this is not the case, we're probably only checking if the users can # see events in the room at that point in the DAG, and that shouldn't be decided # on those checks. if filter_send_to_client: if ( _check_filter_send_to_client(event, clock, retention_policy, sender_ignored) == _CheckFilter.DENIED ): filtered_event_logger.debug( "_check_client_allowed_to_see_event(event=%s): Filtered out event because `_check_filter_send_to_client` returned `_CheckFilter.DENIED`", event.event_id, ) return None if event.event_id in always_include_ids: return event # we need to handle outliers separately, since we don't have the room state. if event.internal_metadata.outlier: # Normally these can't be seen by clients, but we make an exception for # for out-of-band membership events (eg, incoming invites, or rejections of # said invite) for the user themselves. if event.type == EventTypes.Member and event.state_key == user_id: logger.debug( "_check_client_allowed_to_see_event(event=%s): Returning out-of-band-membership event %s", event.event_id, event, ) return event filtered_event_logger.debug( "_check_client_allowed_to_see_event(event=%s): Filtered out event because it's an outlier", event.event_id, ) return None if state is None: raise Exception("Missing state for non-outlier event") # get the room_visibility at the time of the event. visibility = get_effective_room_visibility_from_state(state) # Check if the room has lax history visibility, allowing us to skip # membership checks. # # We can only do this check if the sender has *not* been erased, as if they # have we need to check the user's membership. if ( not sender_erased and _check_history_visibility(event, visibility, is_peeking) == _CheckVisibility.ALLOWED ): return event membership_result = _check_membership(user_id, event, visibility, state, is_peeking) if not membership_result.allowed: filtered_event_logger.debug( "_check_client_allowed_to_see_event(event=%s): Filtered out event because the user can't see the event because of their membership, membership_result.allowed=%s membership_result.joined=%s", event.event_id, membership_result.allowed, membership_result.joined, ) return None # If the sender has been erased and the user was not joined at the time, we # must only return the redacted form. if sender_erased and not membership_result.joined: filtered_event_logger.debug( "_check_client_allowed_to_see_event(event=%s): Returning pruned event because `sender_erased` and the user was not joined at the time", event.event_id, ) event = prune_event(event) return event
Check whether the user can see the event due to their membership Returns: True if they can, False if they can't, plus the membership of the user at the event.
def _check_membership( user_id: str, event: EventBase, visibility: str, state: StateMap[EventBase], is_peeking: bool, ) -> _CheckMembershipReturn: """Check whether the user can see the event due to their membership Returns: True if they can, False if they can't, plus the membership of the user at the event. """ # If the event is the user's own membership event, use the 'most joined' # membership membership = None if event.type == EventTypes.Member and event.state_key == user_id: membership = event.content.get("membership", None) if membership not in MEMBERSHIP_PRIORITY: membership = "leave" prev_content = event.unsigned.get("prev_content", {}) prev_membership = prev_content.get("membership", None) if prev_membership not in MEMBERSHIP_PRIORITY: prev_membership = "leave" # Always allow the user to see their own leave events, otherwise # they won't see the room disappear if they reject the invite # # (Note this doesn't work for out-of-band invite rejections, which don't # have prev_state populated. They are handled above in the outlier code.) if membership == "leave" and ( prev_membership == "join" or prev_membership == "invite" ): return _CheckMembershipReturn(True, membership == Membership.JOIN) new_priority = MEMBERSHIP_PRIORITY.index(membership) old_priority = MEMBERSHIP_PRIORITY.index(prev_membership) if old_priority < new_priority: membership = prev_membership # otherwise, get the user's membership at the time of the event. if membership is None: membership_event = state.get((EventTypes.Member, user_id), None) if membership_event: membership = membership_event.membership # if the user was a member of the room at the time of the event, # they can see it. if membership == Membership.JOIN: return _CheckMembershipReturn(True, True) # otherwise, it depends on the room visibility. if visibility == HistoryVisibility.JOINED: # we weren't a member at the time of the event, so we can't # see this event. return _CheckMembershipReturn(False, False) elif visibility == HistoryVisibility.INVITED: # user can also see the event if they were *invited* at the time # of the event. return _CheckMembershipReturn(membership == Membership.INVITE, False) elif visibility == HistoryVisibility.SHARED and is_peeking: # if the visibility is shared, users cannot see the event unless # they have *subsequently* joined the room (or were members at the # time, of course) # # XXX: if the user has subsequently joined and then left again, # ideally we would share history up to the point they left. But # we don't know when they left. We just treat it as though they # never joined, and restrict access. return _CheckMembershipReturn(False, False) # The visibility is either shared or world_readable, and the user was # not a member at the time. We allow it. return _CheckMembershipReturn(True, False)
Apply checks for sending events to client Returns: True if might be allowed to be sent to clients, False if definitely not.
def _check_filter_send_to_client( event: EventBase, clock: Clock, retention_policy: RetentionPolicy, sender_ignored: bool, ) -> _CheckFilter: """Apply checks for sending events to client Returns: True if might be allowed to be sent to clients, False if definitely not. """ if event.type == EventTypes.Dummy: return _CheckFilter.DENIED if not event.is_state() and sender_ignored: return _CheckFilter.DENIED # Until MSC2261 has landed we can't redact malicious alias events, so for # now we temporarily filter out m.room.aliases entirely to mitigate # abuse, while we spec a better solution to advertising aliases # on rooms. if event.type == EventTypes.Aliases: return _CheckFilter.DENIED # Don't try to apply the room's retention policy if the event is a state # event, as MSC1763 states that retention is only considered for non-state # events. if not event.is_state(): max_lifetime = retention_policy.max_lifetime if max_lifetime is not None: oldest_allowed_ts = clock.time_msec() - max_lifetime if event.origin_server_ts < oldest_allowed_ts: return _CheckFilter.DENIED return _CheckFilter.MAYBE_ALLOWED
Check if event is allowed to be seen due to lax history visibility. Returns: True if user can definitely see the event, False if maybe not.
def _check_history_visibility( event: EventBase, visibility: str, is_peeking: bool ) -> _CheckVisibility: """Check if event is allowed to be seen due to lax history visibility. Returns: True if user can definitely see the event, False if maybe not. """ # Always allow history visibility events on boundaries. This is done # by setting the effective visibility to the least restrictive # of the old vs new. if event.type == EventTypes.RoomHistoryVisibility: prev_content = event.unsigned.get("prev_content", {}) prev_visibility = prev_content.get("history_visibility", None) if prev_visibility not in VISIBILITY_PRIORITY: prev_visibility = HistoryVisibility.SHARED new_priority = VISIBILITY_PRIORITY.index(visibility) old_priority = VISIBILITY_PRIORITY.index(prev_visibility) if old_priority < new_priority: visibility = prev_visibility if visibility == HistoryVisibility.SHARED and not is_peeking: return _CheckVisibility.ALLOWED elif visibility == HistoryVisibility.WORLD_READABLE: return _CheckVisibility.ALLOWED return _CheckVisibility.MAYBE_DENIED
Get the actual history vis, from a state map including the history_visibility event Handles missing and invalid history visibility events.
def get_effective_room_visibility_from_state(state: StateMap[EventBase]) -> str: """Get the actual history vis, from a state map including the history_visibility event Handles missing and invalid history visibility events. """ visibility_event = state.get(_HISTORY_VIS_KEY, None) if not visibility_event: return HistoryVisibility.SHARED visibility = visibility_event.content.get( "history_visibility", HistoryVisibility.SHARED ) if visibility not in VISIBILITY_PRIORITY: visibility = HistoryVisibility.SHARED return visibility
Utility method for constructing an error response for client-server interactions. Args: msg: The error message. code: The error code. kwargs: Additional keys to add to the response. Returns: A dict representing the error response JSON.
def cs_error(msg: str, code: str = Codes.UNKNOWN, **kwargs: Any) -> "JsonDict": """Utility method for constructing an error response for client-server interactions. Args: msg: The error message. code: The error code. kwargs: Additional keys to add to the response. Returns: A dict representing the error response JSON. """ err = {"error": msg, "errcode": code} for key, value in kwargs.items(): err[key] = value return err
Convert a scope string to a list of scope tokens
def scope_to_list(scope: str) -> List[str]: """Convert a scope string to a list of scope tokens""" return scope.strip().split(" ")
Entrypoint for a forked worker process. We just need to set up the command-line arguments, create our real reactor and then kick off the worker's main() function.
def _worker_entrypoint( func: Callable[[], None], proxy_reactor: ProxiedReactor, args: List[str] ) -> None: """ Entrypoint for a forked worker process. We just need to set up the command-line arguments, create our real reactor and then kick off the worker's main() function. """ from synapse.util.stringutils import strtobool sys.argv = args # reset the custom signal handlers that we installed, so that the children start # from a clean slate. for sig, handler in _original_signal_handlers.items(): signal.signal(sig, handler) # Install the asyncio reactor if the # SYNAPSE_COMPLEMENT_FORKING_LAUNCHER_ASYNC_IO_REACTOR is set to 1. The # SYNAPSE_ASYNC_IO_REACTOR variable would be used, but then causes # synapse/__init__.py to also try to install an asyncio reactor. if strtobool( os.environ.get("SYNAPSE_COMPLEMENT_FORKING_LAUNCHER_ASYNC_IO_REACTOR", "0") ): import asyncio from twisted.internet.asyncioreactor import AsyncioSelectorReactor reactor = AsyncioSelectorReactor(asyncio.get_event_loop()) proxy_reactor._install_real_reactor(reactor) else: from twisted.internet.epollreactor import EPollReactor proxy_reactor._install_real_reactor(EPollReactor()) func()
Entrypoint for the forking launcher.
def main() -> None: """ Entrypoint for the forking launcher. """ parser = argparse.ArgumentParser() parser.add_argument("db_config", help="Path to database config file") parser.add_argument( "args", nargs="...", help="Argument groups separated by `--`. " "The first argument of each group is a Synapse app name. " "Subsequent arguments are passed through.", ) ns = parser.parse_args() # Split up the subsequent arguments into each workers' arguments; # `--` is our delimiter of choice. args_by_worker: List[List[str]] = [ list(args) for cond, args in itertools.groupby(ns.args, lambda ele: ele != "--") if cond and args ] # Prevent Twisted from installing a shared reactor that all the workers will # inherit when we fork(), by installing our own beforehand. proxy_reactor = ProxiedReactor() installReactor(proxy_reactor) # Import the entrypoints for all the workers. worker_functions = [] for worker_args in args_by_worker: worker_module = importlib.import_module(worker_args[0]) worker_functions.append(worker_module.main) # We need to prepare the database first as otherwise all the workers will # try to create a schema version table and some will crash out. from synapse._scripts import update_synapse_database update_proc = multiprocessing.Process( target=_worker_entrypoint, args=( update_synapse_database.main, proxy_reactor, [ "update_synapse_database", "--database-config", ns.db_config, "--run-background-updates", ], ), ) print("===== PREPARING DATABASE =====", file=sys.stderr) update_proc.start() update_proc.join() print("===== PREPARED DATABASE =====", file=sys.stderr) processes: List[multiprocessing.Process] = [] # Install signal handlers to propagate signals to all our children, so that they # shut down cleanly. This also inhibits our own exit, but that's good: we want to # wait until the children have exited. def handle_signal(signum: int, frame: Optional[FrameType]) -> None: print( f"complement_fork_starter: Caught signal {signum}. Stopping children.", file=sys.stderr, ) for p in processes: if p.pid: os.kill(p.pid, signum) for sig in (signal.SIGINT, signal.SIGTERM): _original_signal_handlers[sig] = signal.signal(sig, handle_signal) # At this point, we've imported all the main entrypoints for all the workers. # Now we basically just fork() out to create the workers we need. # Because we're using fork(), all the workers get a clone of this launcher's # memory space and don't need to repeat the work of loading the code! # Instead of using fork() directly, we use the multiprocessing library, # which uses fork() on Unix platforms. for func, worker_args in zip(worker_functions, args_by_worker): process = multiprocessing.Process( target=_worker_entrypoint, args=(func, proxy_reactor, worker_args) ) process.start() processes.append(process) # Be a good parent and wait for our children to die before exiting. for process in processes: process.join()
Args: config_options_options: The options passed to Synapse. Usually `sys.argv[1:]`. Returns: A homeserver instance.
def setup(config_options: List[str]) -> SynapseHomeServer: """ Args: config_options_options: The options passed to Synapse. Usually `sys.argv[1:]`. Returns: A homeserver instance. """ try: config = HomeServerConfig.load_or_generate_config( "Synapse Homeserver", config_options ) except ConfigError as e: sys.stderr.write("\n") for f in format_config_error(e): sys.stderr.write(f) sys.stderr.write("\n") sys.exit(1) if not config: # If a config isn't returned, and an exception isn't raised, we're just # generating config files and shouldn't try to continue. sys.exit(0) if config.worker.worker_app: raise ConfigError( "You have specified `worker_app` in the config but are attempting to start a non-worker " "instance. Please use `python -m synapse.app.generic_worker` instead (or remove the option if this is the main process)." ) sys.exit(1) events.USE_FROZEN_DICTS = config.server.use_frozen_dicts synapse.util.caches.TRACK_MEMORY_USAGE = config.caches.track_memory_usage if config.server.gc_seconds: synapse.metrics.MIN_TIME_BETWEEN_GCS = config.server.gc_seconds if ( config.registration.enable_registration and not config.registration.enable_registration_without_verification ): if ( not config.captcha.enable_registration_captcha and not config.registration.registrations_require_3pid and not config.registration.registration_requires_token ): raise ConfigError( "You have enabled open registration without any verification. This is a known vector for " "spam and abuse. If you would like to allow public registration, please consider adding email, " "captcha, or token-based verification. Otherwise this check can be removed by setting the " "`enable_registration_without_verification` config option to `true`." ) hs = SynapseHomeServer( config.server.server_name, config=config, version_string=f"Synapse/{VERSION}", ) synapse.config.logger.setup_logging(hs, config, use_worker_options=False) logger.info("Setting up server") try: hs.setup() except Exception as e: handle_startup_exception(e) async def start() -> None: # Load the OIDC provider metadatas, if OIDC is enabled. if hs.config.oidc.oidc_enabled: oidc = hs.get_oidc_handler() # Loading the provider metadata also ensures the provider config is valid. await oidc.load_metadata() await _base.start(hs) hs.get_datastores().main.db_pool.updates.start_doing_background_updates() register_start(start) return hs
Start the background tasks which report phone home stats.
def start_phone_stats_home(hs: "HomeServer") -> None: """ Start the background tasks which report phone home stats. """ clock = hs.get_clock() stats: JsonDict = {} def performance_stats_init() -> None: _stats_process.clear() _stats_process.append( (int(hs.get_clock().time()), resource.getrusage(resource.RUSAGE_SELF)) ) # Rather than update on per session basis, batch up the requests. # If you increase the loop period, the accuracy of user_daily_visits # table will decrease clock.looping_call( hs.get_datastores().main.generate_user_daily_visits, 5 * 60 * 1000 ) # monthly active user limiting functionality clock.looping_call( hs.get_datastores().main.reap_monthly_active_users, 1000 * 60 * 60 ) hs.get_datastores().main.reap_monthly_active_users() @wrap_as_background_process("generate_monthly_active_users") async def generate_monthly_active_users() -> None: current_mau_count = 0 current_mau_count_by_service: Mapping[str, int] = {} reserved_users: Sized = () store = hs.get_datastores().main if hs.config.server.limit_usage_by_mau or hs.config.server.mau_stats_only: current_mau_count = await store.get_monthly_active_count() current_mau_count_by_service = ( await store.get_monthly_active_count_by_service() ) reserved_users = await store.get_registered_reserved_users() current_mau_gauge.set(float(current_mau_count)) for app_service, count in current_mau_count_by_service.items(): current_mau_by_service_gauge.labels(app_service).set(float(count)) registered_reserved_users_mau_gauge.set(float(len(reserved_users))) max_mau_gauge.set(float(hs.config.server.max_mau_value)) if hs.config.server.limit_usage_by_mau or hs.config.server.mau_stats_only: generate_monthly_active_users() clock.looping_call(generate_monthly_active_users, 5 * 60 * 1000) # End of monthly active user settings if hs.config.metrics.report_stats: logger.info("Scheduling stats reporting for 3 hour intervals") clock.looping_call(phone_stats_home, 3 * 60 * 60 * 1000, hs, stats) # We need to defer this init for the cases that we daemonize # otherwise the process ID we get is that of the non-daemon process clock.call_later(0, performance_stats_init) # We wait 5 minutes to send the first set of stats as the server can # be quite busy the first few minutes clock.call_later(5 * 60, phone_stats_home, hs, stats)
Register a function to be called when a SIGHUP occurs. Args: func: Function to be called when sent a SIGHUP signal. *args, **kwargs: args and kwargs to be passed to the target function.
def register_sighup(func: Callable[P, None], *args: P.args, **kwargs: P.kwargs) -> None: """ Register a function to be called when a SIGHUP occurs. Args: func: Function to be called when sent a SIGHUP signal. *args, **kwargs: args and kwargs to be passed to the target function. """ _sighup_callbacks.append((func, args, kwargs))
Run the reactor in the main process Daemonizes if necessary, and then configures some resources, before starting the reactor. Pulls configuration from the 'worker' settings in 'config'. Args: appname: application name which will be sent to syslog config: config object run_command: callable that actually runs the reactor
def start_worker_reactor( appname: str, config: HomeServerConfig, # Use a lambda to avoid binding to a given reactor at import time. # (needed when synapse.app.complement_fork_starter is being used) run_command: Callable[[], None] = lambda: reactor.run(), ) -> None: """Run the reactor in the main process Daemonizes if necessary, and then configures some resources, before starting the reactor. Pulls configuration from the 'worker' settings in 'config'. Args: appname: application name which will be sent to syslog config: config object run_command: callable that actually runs the reactor """ logger = logging.getLogger(config.worker.worker_app) start_reactor( appname, soft_file_limit=config.server.soft_file_limit, gc_thresholds=config.server.gc_thresholds, pid_file=config.worker.worker_pid_file, daemonize=config.worker.worker_daemonize, print_pidfile=config.server.print_pidfile, logger=logger, run_command=run_command, )
Run the reactor in the main process Daemonizes if necessary, and then configures some resources, before starting the reactor Args: appname: application name which will be sent to syslog soft_file_limit: gc_thresholds: pid_file: name of pid file to write to if daemonize is True daemonize: true to run the reactor in a background process print_pidfile: whether to print the pid file, if daemonize is True logger: logger instance to pass to Daemonize run_command: callable that actually runs the reactor
def start_reactor( appname: str, soft_file_limit: int, gc_thresholds: Optional[Tuple[int, int, int]], pid_file: Optional[str], daemonize: bool, print_pidfile: bool, logger: logging.Logger, # Use a lambda to avoid binding to a given reactor at import time. # (needed when synapse.app.complement_fork_starter is being used) run_command: Callable[[], None] = lambda: reactor.run(), ) -> None: """Run the reactor in the main process Daemonizes if necessary, and then configures some resources, before starting the reactor Args: appname: application name which will be sent to syslog soft_file_limit: gc_thresholds: pid_file: name of pid file to write to if daemonize is True daemonize: true to run the reactor in a background process print_pidfile: whether to print the pid file, if daemonize is True logger: logger instance to pass to Daemonize run_command: callable that actually runs the reactor """ def run() -> None: logger.info("Running") setup_jemalloc_stats() change_resource_limit(soft_file_limit) if gc_thresholds: gc.set_threshold(*gc_thresholds) install_gc_manager() run_command() # make sure that we run the reactor with the sentinel log context, # otherwise other PreserveLoggingContext instances will get confused # and complain when they see the logcontext arbitrarily swapping # between the sentinel and `run` logcontexts. # # We also need to drop the logcontext before forking if we're daemonizing, # otherwise the cputime metrics get confused about the per-thread resource usage # appearing to go backwards. with PreserveLoggingContext(): if daemonize: assert pid_file is not None if print_pidfile: print(pid_file) daemonize_process(pid_file, logger) run()
Register a callback with the reactor, to be called once it is running This can be used to initialise parts of the system which require an asynchronous setup. Any exception raised by the callback will be printed and logged, and the process will exit.
def register_start( cb: Callable[P, Awaitable], *args: P.args, **kwargs: P.kwargs ) -> None: """Register a callback with the reactor, to be called once it is running This can be used to initialise parts of the system which require an asynchronous setup. Any exception raised by the callback will be printed and logged, and the process will exit. """ async def wrapper() -> None: try: await cb(*args, **kwargs) except Exception: # previously, we used Failure().printTraceback() here, in the hope that # would give better tracebacks than traceback.print_exc(). However, that # doesn't handle chained exceptions (with a __cause__ or __context__) well, # and I *think* the need for Failure() is reduced now that we mostly use # async/await. # Write the exception to both the logs *and* the unredirected stderr, # because people tend to get confused if it only goes to one or the other. # # One problem with this is that if people are using a logging config that # logs to the console (as is common eg under docker), they will get two # copies of the exception. We could maybe try to detect that, but it's # probably a cost we can bear. logger.fatal("Error during startup", exc_info=True) print("Error during startup:", file=sys.__stderr__) traceback.print_exc(file=sys.__stderr__) # it's no use calling sys.exit here, since that just raises a SystemExit # exception which is then caught by the reactor, and everything carries # on as normal. os._exit(1) reactor.callWhenRunning(lambda: defer.ensureDeferred(wrapper()))
Start Prometheus metrics server.
def listen_metrics(bind_addresses: StrCollection, port: int) -> None: """ Start Prometheus metrics server. """ from prometheus_client import start_http_server as start_http_server_prometheus from synapse.metrics import RegistryProxy for host in bind_addresses: logger.info("Starting metrics listener on %s:%d", host, port) _set_prometheus_client_use_created_metrics(False) start_http_server_prometheus(port, addr=host, registry=RegistryProxy)
Sets whether prometheus_client should expose `_created`-suffixed metrics for all gauges, histograms and summaries. There is no programmatic way to disable this without poking at internals; the proper way is to use an environment variable which prometheus_client loads at import time. The motivation for disabling these `_created` metrics is that they're a waste of space as they're not useful but they take up space in Prometheus.
def _set_prometheus_client_use_created_metrics(new_value: bool) -> None: """ Sets whether prometheus_client should expose `_created`-suffixed metrics for all gauges, histograms and summaries. There is no programmatic way to disable this without poking at internals; the proper way is to use an environment variable which prometheus_client loads at import time. The motivation for disabling these `_created` metrics is that they're a waste of space as they're not useful but they take up space in Prometheus. """ import prometheus_client.metrics if hasattr(prometheus_client.metrics, "_use_created"): prometheus_client.metrics._use_created = new_value else: logger.error( "Can't disable `_created` metrics in prometheus_client (brittle hack broken?)" )
Create a TCP socket for a port and several addresses Returns: list of twisted.internet.tcp.Port listening for TCP connections
def listen_tcp( bind_addresses: StrCollection, port: int, factory: ServerFactory, reactor: IReactorTCP = reactor, backlog: int = 50, ) -> List[Port]: """ Create a TCP socket for a port and several addresses Returns: list of twisted.internet.tcp.Port listening for TCP connections """ r = [] for address in bind_addresses: try: r.append(reactor.listenTCP(port, factory, backlog, address)) except error.CannotListenError as e: check_bind_error(e, address, bind_addresses) # IReactorTCP returns an object implementing IListeningPort from listenTCP, # but we know it will be a Port instance. return r
Create a UNIX socket for a given path and 'mode' permission Returns: list of twisted.internet.tcp.Port listening for TCP connections
def listen_unix( path: str, mode: int, factory: ServerFactory, reactor: IReactorUNIX = reactor, backlog: int = 50, ) -> List[Port]: """ Create a UNIX socket for a given path and 'mode' permission Returns: list of twisted.internet.tcp.Port listening for TCP connections """ wantPID = True return [ # IReactorUNIX returns an object implementing IListeningPort from listenUNIX, # but we know it will be a Port instance. cast(Port, reactor.listenUNIX(path, factory, backlog, mode, wantPID)) ]
Create an TLS-over-TCP socket for a port and several addresses Returns: list of twisted.internet.tcp.Port listening for TLS connections
def listen_ssl( bind_addresses: StrCollection, port: int, factory: ServerFactory, context_factory: IOpenSSLContextFactory, reactor: IReactorSSL = reactor, backlog: int = 50, ) -> List[Port]: """ Create an TLS-over-TCP socket for a port and several addresses Returns: list of twisted.internet.tcp.Port listening for TLS connections """ r = [] for address in bind_addresses: try: r.append( reactor.listenSSL(port, factory, context_factory, backlog, address) ) except error.CannotListenError as e: check_bind_error(e, address, bind_addresses) # IReactorSSL incorrectly declares that an int is returned from listenSSL, # it actually returns an object implementing IListeningPort, but we know it # will be a Port instance. return r
Refresh the TLS certificates that Synapse is using by re-reading them from disk and updating the TLS context factories to use them.
def refresh_certificate(hs: "HomeServer") -> None: """ Refresh the TLS certificates that Synapse is using by re-reading them from disk and updating the TLS context factories to use them. """ if not hs.config.server.has_tls_listener(): return hs.config.tls.read_certificate_from_disk() hs.tls_server_context_factory = context_factory.ServerContextFactory(hs.config) if hs._listening_services: logger.info("Updating context factories...") for i in hs._listening_services: # When you listenSSL, it doesn't make an SSL port but a TCP one with # a TLS wrapping factory around the factory you actually want to get # requests. This factory attribute is public but missing from # Twisted's documentation. if isinstance(i.factory, TLSMemoryBIOFactory): addr = i.getHost() logger.info( "Replacing TLS context factory on [%s]:%i", addr.host, addr.port ) # We want to replace TLS factories with a new one, with the new # TLS configuration. We do this by reaching in and pulling out # the wrappedFactory, and then re-wrapping it. i.factory = TLSMemoryBIOFactory( hs.tls_server_context_factory, False, i.factory.wrappedFactory ) logger.info("Context factories updated.")
Reload cache config from disk and immediately apply it.resize caches accordingly. If the config is invalid, a `ConfigError` is logged and no changes are made. Otherwise, this: - replaces the `caches` section on the given `config` object, - resizes all caches according to the new cache factors, and Note that the following cache config keys are read, but not applied: - event_cache_size: used to set a max_size and _original_max_size on EventsWorkerStore._get_event_cache when it is created. We'd have to update the _original_max_size (and maybe - sync_response_cache_duration: would have to update the timeout_sec attribute on HomeServer -> SyncHandler -> ResponseCache. - track_memory_usage. This affects synapse.util.caches.TRACK_MEMORY_USAGE which influences Synapse's self-reported metrics. Also, the HTTPConnectionPool in SimpleHTTPClient sets its maxPersistentPerHost parameter based on the global_factor. This won't be applied on a config reload.
def reload_cache_config(config: HomeServerConfig) -> None: """Reload cache config from disk and immediately apply it.resize caches accordingly. If the config is invalid, a `ConfigError` is logged and no changes are made. Otherwise, this: - replaces the `caches` section on the given `config` object, - resizes all caches according to the new cache factors, and Note that the following cache config keys are read, but not applied: - event_cache_size: used to set a max_size and _original_max_size on EventsWorkerStore._get_event_cache when it is created. We'd have to update the _original_max_size (and maybe - sync_response_cache_duration: would have to update the timeout_sec attribute on HomeServer -> SyncHandler -> ResponseCache. - track_memory_usage. This affects synapse.util.caches.TRACK_MEMORY_USAGE which influences Synapse's self-reported metrics. Also, the HTTPConnectionPool in SimpleHTTPClient sets its maxPersistentPerHost parameter based on the global_factor. This won't be applied on a config reload. """ try: previous_cache_config = config.reload_config_section("caches") except ConfigError as e: logger.warning("Failed to reload cache config") for f in format_config_error(e): logger.warning(f) else: logger.debug( "New cache config. Was:\n %s\nNow:\n %s", previous_cache_config.__dict__, config.caches.__dict__, ) synapse.util.caches.TRACK_MEMORY_USAGE = config.caches.track_memory_usage config.caches.resize_all_caches()
Enable sentry integration, if enabled in configuration
def setup_sentry(hs: "HomeServer") -> None: """Enable sentry integration, if enabled in configuration""" if not hs.config.metrics.sentry_enabled: return import sentry_sdk sentry_sdk.init( dsn=hs.config.metrics.sentry_dsn, release=SYNAPSE_VERSION, environment=hs.config.metrics.sentry_environment, ) # We set some default tags that give some context to this instance with sentry_sdk.configure_scope() as scope: scope.set_tag("matrix_server_name", hs.config.server.server_name) app = ( hs.config.worker.worker_app if hs.config.worker.worker_app else "synapse.app.homeserver" ) name = hs.get_instance_name() scope.set_tag("worker_app", app) scope.set_tag("worker_name", name)
Adds process state hooks to tell systemd what we are up to.
def setup_sdnotify(hs: "HomeServer") -> None: """Adds process state hooks to tell systemd what we are up to.""" # Tell systemd our state, if we're using it. This will silently fail if # we're not using systemd. sdnotify(b"READY=1\nMAINPID=%i" % (os.getpid(),)) hs.get_reactor().addSystemEventTrigger( "before", "shutdown", sdnotify, b"STOPPING=1" )
Send a notification to systemd, if the NOTIFY_SOCKET env var is set. This function is based on the sdnotify python package, but since it's only a few lines of code, it's easier to duplicate it here than to add a dependency on a package which many OSes don't include as a matter of principle. Args: state: notification to send
def sdnotify(state: bytes) -> None: """ Send a notification to systemd, if the NOTIFY_SOCKET env var is set. This function is based on the sdnotify python package, but since it's only a few lines of code, it's easier to duplicate it here than to add a dependency on a package which many OSes don't include as a matter of principle. Args: state: notification to send """ if not isinstance(state, bytes): raise TypeError("sdnotify should be called with a bytes") if not sdnotify_sockaddr: return addr = sdnotify_sockaddr if addr[0] == "@": addr = "\0" + addr[1:] try: with socket.socket(socket.AF_UNIX, socket.SOCK_DGRAM) as sock: sock.connect(addr) sock.sendall(state) except Exception as e: # this is a bit surprising, since we don't expect to have a NOTIFY_SOCKET # unless systemd is expecting us to notify it. logger.warning("Unable to send notification to systemd: %s", e)
Get a suitable maximum size for incoming HTTP requests
def max_request_body_size(config: HomeServerConfig) -> int: """Get a suitable maximum size for incoming HTTP requests""" # Other than media uploads, the biggest request we expect to see is a fully-loaded # /federation/v1/send request. # # The main thing in such a request is up to 50 PDUs, and up to 100 EDUs. PDUs are # limited to 65536 bytes (possibly slightly more if the sender didn't use canonical # json encoding); there is no specced limit to EDUs (see # https://github.com/matrix-org/matrix-doc/issues/3121). # # in short, we somewhat arbitrarily limit requests to 200 * 64K (about 12.5M) # max_request_size = 200 * MAX_PDU_SIZE # if we have a media repo enabled, we may need to allow larger uploads than that if config.media.can_load_media_repo: max_request_size = max(max_request_size, config.media.max_upload_size) return max_request_size
This method checks an exception occurred while binding on 0.0.0.0. If :: is specified in the bind addresses a warning is shown. The exception is still raised otherwise. Binding on both 0.0.0.0 and :: causes an exception on Linux and macOS because :: binds on both IPv4 and IPv6 (as per RFC 3493). When binding on 0.0.0.0 after :: this can safely be ignored. Args: e: Exception that was caught. address: Address on which binding was attempted. bind_addresses: Addresses on which the service listens.
def check_bind_error( e: Exception, address: str, bind_addresses: Container[str] ) -> None: """ This method checks an exception occurred while binding on 0.0.0.0. If :: is specified in the bind addresses a warning is shown. The exception is still raised otherwise. Binding on both 0.0.0.0 and :: causes an exception on Linux and macOS because :: binds on both IPv4 and IPv6 (as per RFC 3493). When binding on 0.0.0.0 after :: this can safely be ignored. Args: e: Exception that was caught. address: Address on which binding was attempted. bind_addresses: Addresses on which the service listens. """ if address == "0.0.0.0" and "::" in bind_addresses: logger.warning( "Failed to listen on 0.0.0.0, continuing because listening on [::]" ) else: raise e
Returns a list of Application Services from the config files.
def load_appservices( hostname: str, config_files: List[str] ) -> List[ApplicationService]: """Returns a list of Application Services from the config files.""" # Dicts of value -> filename seen_as_tokens: Dict[str, str] = {} seen_ids: Dict[str, str] = {} appservices = [] for config_file in config_files: try: with open(config_file) as f: appservice = _load_appservice(hostname, yaml.safe_load(f), config_file) if appservice.id in seen_ids: raise ConfigError( "Cannot reuse ID across application services: " "%s (files: %s, %s)" % (appservice.id, config_file, seen_ids[appservice.id]) ) seen_ids[appservice.id] = config_file if appservice.token in seen_as_tokens: raise ConfigError( "Cannot reuse as_token across application services: " "%s (files: %s, %s)" % ( appservice.token, config_file, seen_as_tokens[appservice.token], ) ) seen_as_tokens[appservice.token] = config_file logger.info("Loaded application service: %s", appservice) appservices.append(appservice) except Exception as e: logger.error("Failed to load appservice from '%s'", config_file) logger.exception(e) raise return appservices
Gets the canonical form of the cache name. Since we specify cache names in config and environment variables we need to ignore case and special characters. For example, some caches have asterisks in their name to denote that they're not attached to a particular database function, and these asterisks need to be stripped out
def _canonicalise_cache_name(cache_name: str) -> str: """Gets the canonical form of the cache name. Since we specify cache names in config and environment variables we need to ignore case and special characters. For example, some caches have asterisks in their name to denote that they're not attached to a particular database function, and these asterisks need to be stripped out """ cache_name = re.sub(r"[^A-Za-z_1-9]", "", cache_name) return cache_name.lower()
Register a cache whose size can dynamically change Args: cache_name: A reference to the cache cache_resize_callback: A callback function that will run whenever the cache needs to be resized
def add_resizable_cache( cache_name: str, cache_resize_callback: Callable[[float], None] ) -> None: """Register a cache whose size can dynamically change Args: cache_name: A reference to the cache cache_resize_callback: A callback function that will run whenever the cache needs to be resized """ # Some caches have '*' in them which we strip out. cache_name = _canonicalise_cache_name(cache_name) # sometimes caches are initialised from background threads, so we need to make # sure we don't conflict with another thread running a resize operation with _CACHES_LOCK: _CACHES[cache_name] = cache_resize_callback # Ensure all loaded caches are sized appropriately # # This method should only run once the config has been read, # as it uses values read from it if properties.resize_all_caches_func: properties.resize_all_caches_func()
A helper function to parse a JWK dict into a JsonWebKey.
def _parse_jwks(jwks: Optional[JsonDict]) -> Optional["JsonWebKey"]: """A helper function to parse a JWK dict into a JsonWebKey.""" if jwks is None: return None from authlib.jose.rfc7517 import JsonWebKey return JsonWebKey.import_key(jwks)
Convert old-style 'perspectives' configs into new-style 'trusted_key_servers' Returns an iterable of entries to add to trusted_key_servers.
def _perspectives_to_key_servers(config: JsonDict) -> Iterator[JsonDict]: """Convert old-style 'perspectives' configs into new-style 'trusted_key_servers' Returns an iterable of entries to add to trusted_key_servers. """ # 'perspectives' looks like: # # { # "servers": { # "matrix.org": { # "verify_keys": { # "ed25519:auto": { # "key": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw" # } # } # } # } # } # # 'trusted_keys' looks like: # # [ # { # "server_name": "matrix.org", # "verify_keys": { # "ed25519:auto": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw", # } # } # ] perspectives_servers = config.get("perspectives", {}).get("servers", {}) for server_name, server_opts in perspectives_servers.items(): trusted_key_server_entry = {"server_name": server_name} verify_keys = server_opts.get("verify_keys") if verify_keys is not None: trusted_key_server_entry["verify_keys"] = { key_id: key_data["key"] for key_id, key_data in verify_keys.items() } yield trusted_key_server_entry
Set up Python standard library logging.
def _setup_stdlib_logging( config: "HomeServerConfig", log_config_path: Optional[str], logBeginner: LogBeginner ) -> None: """ Set up Python standard library logging. """ # We add a log record factory that runs all messages through the # LoggingContextFilter so that we get the context *at the time we log* # rather than when we write to a handler. This can be done in config using # filter options, but care must when using e.g. MemoryHandler to buffer # writes. log_context_filter = LoggingContextFilter() log_metadata_filter = MetadataFilter({"server_name": config.server.server_name}) old_factory = logging.getLogRecordFactory() def factory(*args: Any, **kwargs: Any) -> logging.LogRecord: record = old_factory(*args, **kwargs) log_context_filter.filter(record) log_metadata_filter.filter(record) return record logging.setLogRecordFactory(factory) # Configure the logger with the initial configuration. if log_config_path is None: log_format = ( "%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s" " - %(message)s" ) logger = logging.getLogger("") logger.setLevel(logging.INFO) logging.getLogger("synapse.storage.SQL").setLevel(logging.INFO) formatter = logging.Formatter(log_format) handler = logging.StreamHandler() handler.setFormatter(formatter) logger.addHandler(handler) else: # Load the logging configuration. _load_logging_config(log_config_path) # Route Twisted's native logging through to the standard library logging # system. observer = STDLibLogObserver() threadlocal = threading.local() @implementer(ILogObserver) def _log(event: dict) -> None: if "log_text" in event: if event["log_text"].startswith("DNSDatagramProtocol starting on "): return if event["log_text"].startswith("(UDP Port "): return if event["log_text"].startswith("Timing out client"): return # this is a workaround to make sure we don't get stack overflows when the # logging system raises an error which is written to stderr which is redirected # to the logging system, etc. if getattr(threadlocal, "active", False): # write the text of the event, if any, to the *real* stderr (which may # be redirected to /dev/null, but there's not much we can do) try: event_text = eventAsText(event) print("logging during logging: %s" % event_text, file=sys.__stderr__) except Exception: # gah. pass return try: threadlocal.active = True return observer(event) finally: threadlocal.active = False logBeginner.beginLoggingTo([_log], redirectStandardIO=False)
Configure logging from a log config path.
def _load_logging_config(log_config_path: str) -> None: """ Configure logging from a log config path. """ with open(log_config_path, "rb") as f: log_config = yaml.safe_load(f.read()) if not log_config: logging.warning("Loaded a blank logging config?") # If the old structured logging configuration is being used, raise an error. if "structured" in log_config and log_config.get("structured"): raise ConfigError(STRUCTURED_ERROR) logging.config.dictConfig(log_config) # Blow away the pyo3-log cache so that it reloads the configuration. reset_logging_config()
Reload the log configuration from the file and apply it.
def _reload_logging_config(log_config_path: Optional[str]) -> None: """ Reload the log configuration from the file and apply it. """ # If no log config path was given, it cannot be reloaded. if log_config_path is None: return _load_logging_config(log_config_path) logging.info("Reloaded log config from %s due to SIGHUP", log_config_path)
Set up the logging subsystem. Args: config: configuration data use_worker_options: True to use the 'worker_log_config' option instead of 'log_config'. logBeginner: The Twisted logBeginner to use.
def setup_logging( hs: "HomeServer", config: "HomeServerConfig", use_worker_options: bool = False, logBeginner: LogBeginner = globalLogBeginner, ) -> None: """ Set up the logging subsystem. Args: config: configuration data use_worker_options: True to use the 'worker_log_config' option instead of 'log_config'. logBeginner: The Twisted logBeginner to use. """ from twisted.internet import reactor log_config_path = ( config.worker.worker_log_config if use_worker_options else config.logging.log_config ) # Perform one-time logging configuration. _setup_stdlib_logging(config, log_config_path, logBeginner=logBeginner) # Add a SIGHUP handler to reload the logging configuration, if one is available. from synapse.app import _base as appbase appbase.register_sighup(_reload_logging_config, log_config_path) # Log immediately so we can grep backwards. logging.warning("***** STARTING SERVER *****") logging.warning( "Server %s version %s", sys.argv[0], SYNAPSE_VERSION, ) logging.info("Server hostname: %s", config.server.server_name) logging.info("Instance name: %s", hs.get_instance_name()) logging.info("Twisted reactor: %s", type(reactor).__name__)
extract and parse the OIDC provider configs from the config dict The configuration may contain either a single `oidc_config` object with an `enabled: True` property, or a list of provider configurations under `oidc_providers`, *or both*. Returns a generator which yields the OidcProviderConfig objects
def _parse_oidc_provider_configs(config: JsonDict) -> Iterable["OidcProviderConfig"]: """extract and parse the OIDC provider configs from the config dict The configuration may contain either a single `oidc_config` object with an `enabled: True` property, or a list of provider configurations under `oidc_providers`, *or both*. Returns a generator which yields the OidcProviderConfig objects """ validate_config(MAIN_CONFIG_SCHEMA, config, ()) for i, p in enumerate(config.get("oidc_providers") or []): yield _parse_oidc_config_dict(p, ("oidc_providers", "<item %i>" % (i,))) # for backwards-compatibility, it is also possible to provide a single "oidc_config" # object with an "enabled: True" property. oidc_config = config.get("oidc_config") if oidc_config and oidc_config.get("enabled", False): # MAIN_CONFIG_SCHEMA checks that `oidc_config` is an object, but not that # it matches OIDC_PROVIDER_CONFIG_SCHEMA (see the comments on OIDC_CONFIG_SCHEMA # above), so now we need to validate it. validate_config(OIDC_PROVIDER_CONFIG_SCHEMA, oidc_config, ("oidc_config",)) yield _parse_oidc_config_dict(oidc_config, ("oidc_config",))
Take the configuration dict and parse it into an OidcProviderConfig Raises: ConfigError if the configuration is malformed.
def _parse_oidc_config_dict( oidc_config: JsonDict, config_path: Tuple[str, ...] ) -> "OidcProviderConfig": """Take the configuration dict and parse it into an OidcProviderConfig Raises: ConfigError if the configuration is malformed. """ ump_config = oidc_config.get("user_mapping_provider", {}) ump_config.setdefault("module", DEFAULT_USER_MAPPING_PROVIDER) if ump_config.get("module") == LEGACY_USER_MAPPING_PROVIDER: ump_config["module"] = DEFAULT_USER_MAPPING_PROVIDER ump_config.setdefault("config", {}) ( user_mapping_provider_class, user_mapping_provider_config, ) = load_module(ump_config, config_path + ("user_mapping_provider",)) # Ensure loaded user mapping module has defined all necessary methods required_methods = [ "get_remote_user_id", "map_user_attributes", ] missing_methods = [ method for method in required_methods if not hasattr(user_mapping_provider_class, method) ] if missing_methods: raise ConfigError( "Class %s is missing required " "methods: %s" % ( user_mapping_provider_class, ", ".join(missing_methods), ), config_path + ("user_mapping_provider", "module"), ) idp_id = oidc_config.get("idp_id", "oidc") # prefix the given IDP with a prefix specific to the SSO mechanism, to avoid # clashes with other mechs (such as SAML, CAS). # # We allow "oidc" as an exception so that people migrating from old-style # "oidc_config" format (which has long used "oidc" as its idp_id) can migrate to # a new-style "oidc_providers" entry without changing the idp_id for their provider # (and thereby invalidating their user_external_ids data). if idp_id != "oidc": idp_id = "oidc-" + idp_id # MSC2858 also specifies that the idp_icon must be a valid MXC uri idp_icon = oidc_config.get("idp_icon") if idp_icon is not None: try: parse_and_validate_mxc_uri(idp_icon) except ValueError as e: raise ConfigError( "idp_icon must be a valid MXC URI", config_path + ("idp_icon",) ) from e client_secret_jwt_key_config = oidc_config.get("client_secret_jwt_key") client_secret_jwt_key: Optional[OidcProviderClientSecretJwtKey] = None if client_secret_jwt_key_config is not None: keyfile = client_secret_jwt_key_config.get("key_file") if keyfile: key = read_file(keyfile, config_path + ("client_secret_jwt_key",)) else: key = client_secret_jwt_key_config["key"] client_secret_jwt_key = OidcProviderClientSecretJwtKey( key=key, jwt_header=client_secret_jwt_key_config["jwt_header"], jwt_payload=client_secret_jwt_key_config.get("jwt_payload", {}), ) # parse attribute_requirements from config (list of dicts) into a list of SsoAttributeRequirement attribute_requirements = [ SsoAttributeRequirement(**x) for x in oidc_config.get("attribute_requirements", []) ] # Read from either `client_secret_path` or `client_secret`. If both exist, error. client_secret = oidc_config.get("client_secret") client_secret_path = oidc_config.get("client_secret_path") if client_secret_path is not None: if client_secret is None: client_secret = read_file( client_secret_path, config_path + ("client_secret_path",) ).rstrip("\n") else: raise ConfigError( "Cannot specify both client_secret and client_secret_path", config_path + ("client_secret",), ) return OidcProviderConfig( idp_id=idp_id, idp_name=oidc_config.get("idp_name", "OIDC"), idp_icon=idp_icon, idp_brand=oidc_config.get("idp_brand"), discover=oidc_config.get("discover", True), issuer=oidc_config["issuer"], client_id=oidc_config["client_id"], client_secret=client_secret, client_secret_jwt_key=client_secret_jwt_key, client_auth_method=oidc_config.get("client_auth_method", "client_secret_basic"), pkce_method=oidc_config.get("pkce_method", "auto"), scopes=oidc_config.get("scopes", ["openid"]), authorization_endpoint=oidc_config.get("authorization_endpoint"), token_endpoint=oidc_config.get("token_endpoint"), userinfo_endpoint=oidc_config.get("userinfo_endpoint"), jwks_uri=oidc_config.get("jwks_uri"), backchannel_logout_enabled=oidc_config.get("backchannel_logout_enabled", False), backchannel_logout_ignore_sub=oidc_config.get( "backchannel_logout_ignore_sub", False ), skip_verification=oidc_config.get("skip_verification", False), user_profile_method=oidc_config.get("user_profile_method", "auto"), allow_existing_users=oidc_config.get("allow_existing_users", False), user_mapping_provider_class=user_mapping_provider_class, user_mapping_provider_config=user_mapping_provider_config, attribute_requirements=attribute_requirements, enable_registration=oidc_config.get("enable_registration", True), )
Takes a list of dictionaries with "width", "height", and "method" keys and creates a map from image media types to the thumbnail size, thumbnailing method, and thumbnail media type to precalculate Args: thumbnail_sizes: List of dicts with "width", "height", and "method" keys Returns: Dictionary mapping from media type string to list of ThumbnailRequirement.
def parse_thumbnail_requirements( thumbnail_sizes: List[JsonDict], ) -> Dict[str, Tuple[ThumbnailRequirement, ...]]: """Takes a list of dictionaries with "width", "height", and "method" keys and creates a map from image media types to the thumbnail size, thumbnailing method, and thumbnail media type to precalculate Args: thumbnail_sizes: List of dicts with "width", "height", and "method" keys Returns: Dictionary mapping from media type string to list of ThumbnailRequirement. """ requirements: Dict[str, List[ThumbnailRequirement]] = {} for size in thumbnail_sizes: width = size["width"] height = size["height"] method = size["method"] for format, thumbnail_format in THUMBNAIL_SUPPORTED_MEDIA_FORMAT_MAP.items(): requirement = requirements.setdefault(format, []) if thumbnail_format == "jpeg": requirement.append( ThumbnailRequirement(width, height, method, "image/jpeg") ) elif thumbnail_format == "png": requirement.append( ThumbnailRequirement(width, height, method, "image/png") ) else: raise Exception( "Unknown thumbnail mapping from %s to %s. This is a Synapse problem, please report!" % (format, thumbnail_format) ) return { media_type: tuple(thumbnails) for media_type, thumbnails in requirements.items() }
Do a deep merge of two dicts Recursively merges `merge_dict` into `into_dict`: * For keys where both `merge_dict` and `into_dict` have a dict value, the values are recursively merged * For all other keys, the values in `into_dict` (if any) are overwritten with the value from `merge_dict`. Args: merge_dict: dict to merge into_dict: target dict to be modified
def _dict_merge(merge_dict: dict, into_dict: dict) -> None: """Do a deep merge of two dicts Recursively merges `merge_dict` into `into_dict`: * For keys where both `merge_dict` and `into_dict` have a dict value, the values are recursively merged * For all other keys, the values in `into_dict` (if any) are overwritten with the value from `merge_dict`. Args: merge_dict: dict to merge into_dict: target dict to be modified """ for k, v in merge_dict.items(): if k not in into_dict: into_dict[k] = v continue current_val = into_dict[k] if isinstance(v, dict) and isinstance(current_val, dict): _dict_merge(v, current_val) continue # otherwise we just overwrite into_dict[k] = v
Convert an IPv4 network into a 6to4 IPv6 network per RFC 3056.
def _6to4(network: IPNetwork) -> IPNetwork: """Convert an IPv4 network into a 6to4 IPv6 network per RFC 3056.""" # 6to4 networks consist of: # * 2002 as the first 16 bits # * The first IPv4 address in the network hex-encoded as the next 32 bits # * The new prefix length needs to include the bits from the 2002 prefix. hex_network = hex(network.first)[2:] hex_network = ("0" * (8 - len(hex_network))) + hex_network return IPNetwork( "2002:%s:%s::/%d" % ( hex_network[:4], hex_network[4:], 16 + network.prefixlen, ) )