anonymousland-synapse/synapse/storage/monthly_active_users.py

214 lines
8.1 KiB
Python
Raw Normal View History

2018-08-03 08:49:53 -04:00
# -*- coding: utf-8 -*-
# Copyright 2018 New Vector
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import logging
2018-08-03 08:49:53 -04:00
2018-07-31 11:36:24 -04:00
from twisted.internet import defer
2018-08-03 08:49:53 -04:00
from synapse.util.caches.descriptors import cached
2018-07-31 11:36:24 -04:00
from ._base import SQLBaseStore
logger = logging.getLogger(__name__)
2018-08-06 18:25:25 -04:00
2018-08-03 12:55:50 -04:00
# Number of msec of granularity to store the monthly_active_user timestamp
# This means it is not necessary to update the table on every request
LAST_SEEN_GRANULARITY = 60 * 60 * 1000
2018-07-31 11:36:24 -04:00
class MonthlyActiveUsersStore(SQLBaseStore):
2018-08-02 08:47:19 -04:00
def __init__(self, dbconn, hs):
2018-07-31 11:36:24 -04:00
super(MonthlyActiveUsersStore, self).__init__(None, hs)
self._clock = hs.get_clock()
2018-08-03 08:49:53 -04:00
self.hs = hs
self.reserved_users = ()
@defer.inlineCallbacks
def initialise_reserved_users(self, threepids):
# TODO Why can't I do this in init?
store = self.hs.get_datastore()
reserved_user_list = []
# Do not add more reserved users than the total allowable number
for tp in threepids[:self.hs.config.max_mau_value]:
user_id = yield store.get_user_id_by_threepid(
2018-08-06 18:25:25 -04:00
tp["medium"], tp["address"]
)
if user_id:
2018-08-14 11:55:28 -04:00
yield self.upsert_monthly_active_user(user_id)
reserved_user_list.append(user_id)
2018-08-06 18:25:25 -04:00
else:
logger.warning(
"mau limit reserved threepid %s not found in db" % tp
)
self.reserved_users = tuple(reserved_user_list)
2018-07-31 11:36:24 -04:00
@defer.inlineCallbacks
2018-07-31 11:36:24 -04:00
def reap_monthly_active_users(self):
"""
Cleans out monthly active user table to ensure that no stale
entries exist.
2018-08-03 12:55:50 -04:00
Returns:
Deferred[]
2018-07-31 11:36:24 -04:00
"""
def _reap_users(txn):
# Purge stale users
2018-08-03 08:49:53 -04:00
2018-07-31 11:36:24 -04:00
thirty_days_ago = (
int(self._clock.time_msec()) - (1000 * 60 * 60 * 24 * 30)
)
query_args = [thirty_days_ago]
base_sql = "DELETE FROM monthly_active_users WHERE timestamp < ?"
# Need if/else since 'AND user_id NOT IN ({})' fails on Postgres
# when len(reserved_users) == 0. Works fine on sqlite.
if len(self.reserved_users) > 0:
# questionmarks is a hack to overcome sqlite not supporting
# tuples in 'WHERE IN %s'
questionmarks = '?' * len(self.reserved_users)
query_args.extend(self.reserved_users)
sql = base_sql + """ AND user_id NOT IN ({})""".format(
','.join(questionmarks)
)
else:
sql = base_sql
txn.execute(sql, query_args)
2018-08-06 16:55:54 -04:00
# If MAU user count still exceeds the MAU threshold, then delete on
# a least recently active basis.
# Note it is not possible to write this query using OFFSET due to
2018-08-08 08:33:16 -04:00
# incompatibilities in how sqlite and postgres support the feature.
2018-08-06 16:55:54 -04:00
# sqlite requires 'LIMIT -1 OFFSET ?', the LIMIT must be present
# While Postgres does not require 'LIMIT', but also does not support
# negative LIMIT values. So there is no way to write it that both can
# support
query_args = [self.hs.config.max_mau_value]
base_sql = """
2018-08-03 08:49:53 -04:00
DELETE FROM monthly_active_users
2018-08-06 16:55:54 -04:00
WHERE user_id NOT IN (
SELECT user_id FROM monthly_active_users
ORDER BY timestamp DESC
LIMIT ?
)
"""
# Need if/else since 'AND user_id NOT IN ({})' fails on Postgres
# when len(reserved_users) == 0. Works fine on sqlite.
if len(self.reserved_users) > 0:
query_args.extend(self.reserved_users)
sql = base_sql + """ AND user_id NOT IN ({})""".format(
','.join(questionmarks)
)
else:
sql = base_sql
txn.execute(sql, query_args)
2018-08-02 17:41:05 -04:00
2018-08-03 17:29:03 -04:00
yield self.runInteraction("reap_monthly_active_users", _reap_users)
2018-08-03 08:49:53 -04:00
# It seems poor to invalidate the whole cache, Postgres supports
# 'Returning' which would allow me to invalidate only the
# specific users, but sqlite has no way to do this and instead
# I would need to SELECT and the DELETE which without locking
# is racy.
# Have resolved to invalidate the whole cache for now and do
# something about it if and when the perf becomes significant
2018-08-09 13:02:12 -04:00
self.user_last_seen_monthly_active.invalidate_all()
2018-08-03 08:49:53 -04:00
self.get_monthly_active_count.invalidate_all()
2018-08-02 17:41:05 -04:00
2018-08-03 08:49:53 -04:00
@cached(num_args=0)
2018-07-31 11:36:24 -04:00
def get_monthly_active_count(self):
2018-08-06 18:25:25 -04:00
"""Generates current count of monthly active users
2018-08-03 12:55:50 -04:00
Returns:
Defered[int]: Number of current monthly active users
2018-07-31 11:36:24 -04:00
"""
2018-08-03 08:49:53 -04:00
2018-07-31 11:36:24 -04:00
def _count_users(txn):
2018-08-01 07:03:57 -04:00
sql = "SELECT COALESCE(count(*), 0) FROM monthly_active_users"
2018-07-31 11:36:24 -04:00
txn.execute(sql)
count, = txn.fetchone()
return count
return self.runInteraction("count_users", _count_users)
def upsert_monthly_active_user(self, user_id):
2018-07-31 11:36:24 -04:00
"""
Updates or inserts monthly active user member
Arguments:
user_id (str): user to add/update
2018-08-03 12:55:50 -04:00
Deferred[bool]: True if a new entry was created, False if an
2018-08-02 08:47:19 -04:00
existing one was updated.
2018-07-31 11:36:24 -04:00
"""
2018-08-03 12:55:50 -04:00
is_insert = self._simple_upsert(
2018-07-31 11:36:24 -04:00
desc="upsert_monthly_active_user",
table="monthly_active_users",
keyvalues={
"user_id": user_id,
2018-07-31 11:36:24 -04:00
},
values={
"timestamp": int(self._clock.time_msec()),
},
lock=False,
2018-07-31 11:36:24 -04:00
)
2018-08-03 12:55:50 -04:00
if is_insert:
2018-08-09 13:02:12 -04:00
self.user_last_seen_monthly_active.invalidate((user_id,))
2018-08-03 12:55:50 -04:00
self.get_monthly_active_count.invalidate(())
2018-07-31 11:36:24 -04:00
@cached(num_args=1)
2018-08-09 13:02:12 -04:00
def user_last_seen_monthly_active(self, user_id):
2018-07-31 11:36:24 -04:00
"""
Checks if a given user is part of the monthly active user group
Arguments:
user_id (str): user to add/update
Return:
Deferred[int] : timestamp since last seen, None if never seen
2018-08-03 12:55:50 -04:00
2018-07-31 11:36:24 -04:00
"""
return(self._simple_select_one_onecol(
2018-07-31 11:36:24 -04:00
table="monthly_active_users",
keyvalues={
"user_id": user_id,
},
2018-08-03 12:55:50 -04:00
retcol="timestamp",
allow_none=True,
2018-08-09 13:02:12 -04:00
desc="user_last_seen_monthly_active",
))
2018-08-03 12:55:50 -04:00
@defer.inlineCallbacks
def populate_monthly_active_users(self, user_id):
"""Checks on the state of monthly active user limits and optionally
add the user to the monthly active tables
Args:
user_id(str): the user_id to query
"""
if self.hs.config.limit_usage_by_mau:
2018-08-09 13:02:12 -04:00
last_seen_timestamp = yield self.user_last_seen_monthly_active(user_id)
2018-08-03 12:55:50 -04:00
now = self.hs.get_clock().time_msec()
# We want to reduce to the total number of db writes, and are happy
# to trade accuracy of timestamp in order to lighten load. This means
# We always insert new users (where MAU threshold has not been reached),
# but only update if we have not previously seen the user for
# LAST_SEEN_GRANULARITY ms
2018-08-03 12:55:50 -04:00
if last_seen_timestamp is None:
count = yield self.get_monthly_active_count()
if count < self.hs.config.max_mau_value:
yield self.upsert_monthly_active_user(user_id)
elif now - last_seen_timestamp > LAST_SEEN_GRANULARITY:
yield self.upsert_monthly_active_user(user_id)