2019-10-21 07:56:42 -04:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
|
|
|
# Copyright 2018 New Vector Ltd
|
2021-01-11 16:43:58 -05:00
|
|
|
# Copyright 2019-2021 The Matrix.org Foundation C.I.C.
|
2019-10-21 07:56:42 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import logging
|
2021-03-03 08:09:39 -05:00
|
|
|
from typing import List, Optional, Tuple
|
2019-10-21 07:56:42 -04:00
|
|
|
|
|
|
|
from synapse.api.constants import PresenceState
|
2020-02-25 12:46:00 -05:00
|
|
|
from synapse.config.homeserver import HomeServerConfig
|
2020-08-05 16:38:57 -04:00
|
|
|
from synapse.storage.database import DatabasePool
|
2019-10-21 07:56:42 -04:00
|
|
|
from synapse.storage.engines import PostgresEngine
|
|
|
|
from synapse.storage.util.id_generators import (
|
|
|
|
IdGenerator,
|
2020-05-07 08:51:08 -04:00
|
|
|
MultiWriterIdGenerator,
|
2019-10-21 07:56:42 -04:00
|
|
|
StreamIdGenerator,
|
|
|
|
)
|
2021-03-03 08:09:39 -05:00
|
|
|
from synapse.types import JsonDict, get_domain_from_id
|
2019-10-21 07:56:42 -04:00
|
|
|
from synapse.util.caches.stream_change_cache import StreamChangeCache
|
|
|
|
|
|
|
|
from .account_data import AccountDataStore
|
|
|
|
from .appservice import ApplicationServiceStore, ApplicationServiceTransactionStore
|
2020-05-07 08:51:08 -04:00
|
|
|
from .cache import CacheInvalidationWorkerStore
|
2020-05-13 08:38:22 -04:00
|
|
|
from .censor_events import CensorEventsStore
|
2019-10-21 07:56:42 -04:00
|
|
|
from .client_ips import ClientIpStore
|
|
|
|
from .deviceinbox import DeviceInboxStore
|
|
|
|
from .devices import DeviceStore
|
|
|
|
from .directory import DirectoryStore
|
|
|
|
from .e2e_room_keys import EndToEndRoomKeyStore
|
|
|
|
from .end_to_end_keys import EndToEndKeyStore
|
|
|
|
from .event_federation import EventFederationStore
|
|
|
|
from .event_push_actions import EventPushActionsStore
|
|
|
|
from .events_bg_updates import EventsBackgroundUpdatesStore
|
2021-01-07 16:01:59 -05:00
|
|
|
from .events_forward_extremities import EventForwardExtremitiesStore
|
2019-10-21 07:56:42 -04:00
|
|
|
from .filtering import FilteringStore
|
|
|
|
from .group_server import GroupServerStore
|
|
|
|
from .keys import KeyStore
|
|
|
|
from .media_repository import MediaRepositoryStore
|
2020-05-13 08:38:22 -04:00
|
|
|
from .metrics import ServerMetricsStore
|
2019-10-21 07:56:42 -04:00
|
|
|
from .monthly_active_users import MonthlyActiveUsersStore
|
|
|
|
from .openid import OpenIdStore
|
|
|
|
from .presence import PresenceStore, UserPresenceState
|
|
|
|
from .profile import ProfileStore
|
2020-05-13 08:38:22 -04:00
|
|
|
from .purge_events import PurgeEventsStore
|
2019-10-21 07:56:42 -04:00
|
|
|
from .push_rule import PushRuleStore
|
|
|
|
from .pusher import PusherStore
|
|
|
|
from .receipts import ReceiptsStore
|
|
|
|
from .registration import RegistrationStore
|
|
|
|
from .rejections import RejectionsStore
|
|
|
|
from .relations import RelationsStore
|
|
|
|
from .room import RoomStore
|
|
|
|
from .roommember import RoomMemberStore
|
|
|
|
from .search import SearchStore
|
|
|
|
from .signatures import SignatureStore
|
|
|
|
from .state import StateStore
|
|
|
|
from .stats import StatsStore
|
|
|
|
from .stream import StreamStore
|
|
|
|
from .tags import TagsStore
|
|
|
|
from .transactions import TransactionStore
|
2020-04-30 13:47:49 -04:00
|
|
|
from .ui_auth import UIAuthStore
|
2019-10-21 07:56:42 -04:00
|
|
|
from .user_directory import UserDirectoryStore
|
|
|
|
from .user_erasure_store import UserErasureStore
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class DataStore(
|
|
|
|
EventsBackgroundUpdatesStore,
|
|
|
|
RoomMemberStore,
|
|
|
|
RoomStore,
|
|
|
|
RegistrationStore,
|
|
|
|
StreamStore,
|
|
|
|
ProfileStore,
|
|
|
|
PresenceStore,
|
|
|
|
TransactionStore,
|
|
|
|
DirectoryStore,
|
|
|
|
KeyStore,
|
|
|
|
StateStore,
|
|
|
|
SignatureStore,
|
|
|
|
ApplicationServiceStore,
|
2020-05-13 08:38:22 -04:00
|
|
|
PurgeEventsStore,
|
2019-10-21 07:56:42 -04:00
|
|
|
EventFederationStore,
|
|
|
|
MediaRepositoryStore,
|
|
|
|
RejectionsStore,
|
|
|
|
FilteringStore,
|
|
|
|
PusherStore,
|
|
|
|
PushRuleStore,
|
|
|
|
ApplicationServiceTransactionStore,
|
|
|
|
ReceiptsStore,
|
|
|
|
EndToEndKeyStore,
|
|
|
|
EndToEndRoomKeyStore,
|
|
|
|
SearchStore,
|
|
|
|
TagsStore,
|
|
|
|
AccountDataStore,
|
|
|
|
EventPushActionsStore,
|
|
|
|
OpenIdStore,
|
|
|
|
ClientIpStore,
|
|
|
|
DeviceStore,
|
|
|
|
DeviceInboxStore,
|
|
|
|
UserDirectoryStore,
|
|
|
|
GroupServerStore,
|
|
|
|
UserErasureStore,
|
|
|
|
MonthlyActiveUsersStore,
|
|
|
|
StatsStore,
|
|
|
|
RelationsStore,
|
2020-05-13 08:38:22 -04:00
|
|
|
CensorEventsStore,
|
2020-04-30 13:47:49 -04:00
|
|
|
UIAuthStore,
|
2020-05-07 08:51:08 -04:00
|
|
|
CacheInvalidationWorkerStore,
|
2020-05-13 08:38:22 -04:00
|
|
|
ServerMetricsStore,
|
2021-01-07 16:01:59 -05:00
|
|
|
EventForwardExtremitiesStore,
|
2019-10-21 07:56:42 -04:00
|
|
|
):
|
2020-08-05 16:38:57 -04:00
|
|
|
def __init__(self, database: DatabasePool, db_conn, hs):
|
2019-10-21 07:56:42 -04:00
|
|
|
self.hs = hs
|
|
|
|
self._clock = hs.get_clock()
|
2019-12-06 08:09:40 -05:00
|
|
|
self.database_engine = database.engine
|
|
|
|
|
2019-10-21 07:56:42 -04:00
|
|
|
self._presence_id_gen = StreamIdGenerator(
|
|
|
|
db_conn, "presence_stream", "stream_id"
|
|
|
|
)
|
|
|
|
self._public_room_id_gen = StreamIdGenerator(
|
|
|
|
db_conn, "public_room_list_stream", "stream_id"
|
|
|
|
)
|
|
|
|
self._device_list_id_gen = StreamIdGenerator(
|
2019-10-24 22:14:58 -04:00
|
|
|
db_conn,
|
|
|
|
"device_lists_stream",
|
|
|
|
"stream_id",
|
2020-02-28 06:15:11 -05:00
|
|
|
extra_tables=[
|
|
|
|
("user_signature_stream", "stream_id"),
|
|
|
|
("device_lists_outbound_pokes", "stream_id"),
|
|
|
|
],
|
2019-10-21 07:56:42 -04:00
|
|
|
)
|
2019-10-22 05:41:18 -04:00
|
|
|
self._cross_signing_id_gen = StreamIdGenerator(
|
|
|
|
db_conn, "e2e_cross_signing_keys", "stream_id"
|
|
|
|
)
|
2019-10-21 07:56:42 -04:00
|
|
|
|
|
|
|
self._event_reports_id_gen = IdGenerator(db_conn, "event_reports", "id")
|
|
|
|
self._push_rule_id_gen = IdGenerator(db_conn, "push_rules", "id")
|
|
|
|
self._push_rules_enable_id_gen = IdGenerator(db_conn, "push_rules_enable", "id")
|
|
|
|
self._group_updates_id_gen = StreamIdGenerator(
|
|
|
|
db_conn, "local_group_updates", "stream_id"
|
|
|
|
)
|
|
|
|
|
|
|
|
if isinstance(self.database_engine, PostgresEngine):
|
2020-09-24 11:53:51 -04:00
|
|
|
# We set the `writers` to an empty list here as we don't care about
|
|
|
|
# missing updates over restarts, as we'll not have anything in our
|
|
|
|
# caches to invalidate. (This reduces the amount of writes to the DB
|
|
|
|
# that happen).
|
2020-05-07 08:51:08 -04:00
|
|
|
self._cache_id_gen = MultiWriterIdGenerator(
|
|
|
|
db_conn,
|
|
|
|
database,
|
2020-09-24 11:53:51 -04:00
|
|
|
stream_name="caches",
|
|
|
|
instance_name=hs.get_instance_name(),
|
2021-01-18 10:47:59 -05:00
|
|
|
tables=[
|
|
|
|
(
|
|
|
|
"cache_invalidation_stream_by_instance",
|
|
|
|
"instance_name",
|
|
|
|
"stream_id",
|
|
|
|
)
|
|
|
|
],
|
2020-05-07 08:51:08 -04:00
|
|
|
sequence_name="cache_invalidation_stream_seq",
|
2020-09-24 11:53:51 -04:00
|
|
|
writers=[],
|
2019-10-21 07:56:42 -04:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
self._cache_id_gen = None
|
|
|
|
|
2020-09-18 09:56:44 -04:00
|
|
|
super().__init__(database, db_conn, hs)
|
2019-12-04 08:52:46 -05:00
|
|
|
|
2019-10-21 07:56:42 -04:00
|
|
|
self._presence_on_startup = self._get_active_presence(db_conn)
|
|
|
|
|
2020-08-05 16:38:57 -04:00
|
|
|
presence_cache_prefill, min_presence_val = self.db_pool.get_cache_dict(
|
2019-10-21 07:56:42 -04:00
|
|
|
db_conn,
|
|
|
|
"presence_stream",
|
|
|
|
entity_column="user_id",
|
|
|
|
stream_column="stream_id",
|
|
|
|
max_value=self._presence_id_gen.get_current_token(),
|
|
|
|
)
|
|
|
|
self.presence_stream_cache = StreamChangeCache(
|
|
|
|
"PresenceStreamChangeCache",
|
|
|
|
min_presence_val,
|
|
|
|
prefilled_cache=presence_cache_prefill,
|
|
|
|
)
|
|
|
|
|
|
|
|
device_list_max = self._device_list_id_gen.get_current_token()
|
|
|
|
self._device_list_stream_cache = StreamChangeCache(
|
|
|
|
"DeviceListStreamChangeCache", device_list_max
|
|
|
|
)
|
2019-10-22 05:41:18 -04:00
|
|
|
self._user_signature_stream_cache = StreamChangeCache(
|
|
|
|
"UserSignatureStreamChangeCache", device_list_max
|
|
|
|
)
|
2019-10-21 07:56:42 -04:00
|
|
|
self._device_list_federation_stream_cache = StreamChangeCache(
|
|
|
|
"DeviceListFederationStreamChangeCache", device_list_max
|
|
|
|
)
|
|
|
|
|
|
|
|
events_max = self._stream_id_gen.get_current_token()
|
2020-08-05 16:38:57 -04:00
|
|
|
curr_state_delta_prefill, min_curr_state_delta_id = self.db_pool.get_cache_dict(
|
2019-10-21 07:56:42 -04:00
|
|
|
db_conn,
|
|
|
|
"current_state_delta_stream",
|
|
|
|
entity_column="room_id",
|
|
|
|
stream_column="stream_id",
|
|
|
|
max_value=events_max, # As we share the stream id with events token
|
|
|
|
limit=1000,
|
|
|
|
)
|
|
|
|
self._curr_state_delta_stream_cache = StreamChangeCache(
|
|
|
|
"_curr_state_delta_stream_cache",
|
|
|
|
min_curr_state_delta_id,
|
|
|
|
prefilled_cache=curr_state_delta_prefill,
|
|
|
|
)
|
|
|
|
|
2020-08-05 16:38:57 -04:00
|
|
|
_group_updates_prefill, min_group_updates_id = self.db_pool.get_cache_dict(
|
2019-10-21 07:56:42 -04:00
|
|
|
db_conn,
|
|
|
|
"local_group_updates",
|
|
|
|
entity_column="user_id",
|
|
|
|
stream_column="stream_id",
|
|
|
|
max_value=self._group_updates_id_gen.get_current_token(),
|
|
|
|
limit=1000,
|
|
|
|
)
|
|
|
|
self._group_updates_stream_cache = StreamChangeCache(
|
|
|
|
"_group_updates_stream_cache",
|
|
|
|
min_group_updates_id,
|
|
|
|
prefilled_cache=_group_updates_prefill,
|
|
|
|
)
|
|
|
|
|
|
|
|
self._stream_order_on_start = self.get_room_max_stream_ordering()
|
|
|
|
self._min_stream_order_on_start = self.get_room_min_stream_ordering()
|
|
|
|
|
2020-09-01 07:41:21 -04:00
|
|
|
def get_device_stream_token(self) -> int:
|
|
|
|
return self._device_list_id_gen.get_current_token()
|
|
|
|
|
2019-10-21 07:56:42 -04:00
|
|
|
def take_presence_startup_info(self):
|
|
|
|
active_on_startup = self._presence_on_startup
|
|
|
|
self._presence_on_startup = None
|
|
|
|
return active_on_startup
|
|
|
|
|
|
|
|
def _get_active_presence(self, db_conn):
|
|
|
|
"""Fetch non-offline presence from the database so that we can register
|
|
|
|
the appropriate time outs.
|
|
|
|
"""
|
|
|
|
|
|
|
|
sql = (
|
|
|
|
"SELECT user_id, state, last_active_ts, last_federation_update_ts,"
|
|
|
|
" last_user_sync_ts, status_msg, currently_active FROM presence_stream"
|
|
|
|
" WHERE state != ?"
|
|
|
|
)
|
|
|
|
|
|
|
|
txn = db_conn.cursor()
|
|
|
|
txn.execute(sql, (PresenceState.OFFLINE,))
|
2020-08-05 16:38:57 -04:00
|
|
|
rows = self.db_pool.cursor_to_dict(txn)
|
2019-10-21 07:56:42 -04:00
|
|
|
txn.close()
|
|
|
|
|
|
|
|
for row in rows:
|
|
|
|
row["currently_active"] = bool(row["currently_active"])
|
|
|
|
|
|
|
|
return [UserPresenceState(**row) for row in rows]
|
|
|
|
|
2021-03-03 08:09:39 -05:00
|
|
|
async def get_users(self) -> List[JsonDict]:
|
2019-12-05 13:12:23 -05:00
|
|
|
"""Function to retrieve a list of users in users table.
|
2019-10-21 07:56:42 -04:00
|
|
|
|
|
|
|
Returns:
|
2020-08-27 07:08:38 -04:00
|
|
|
A list of dictionaries representing users.
|
2019-10-21 07:56:42 -04:00
|
|
|
"""
|
2020-08-27 07:08:38 -04:00
|
|
|
return await self.db_pool.simple_select_list(
|
2019-10-21 07:56:42 -04:00
|
|
|
table="users",
|
|
|
|
keyvalues={},
|
2019-12-05 13:12:23 -05:00
|
|
|
retcols=[
|
|
|
|
"name",
|
|
|
|
"password_hash",
|
|
|
|
"is_guest",
|
|
|
|
"admin",
|
|
|
|
"user_type",
|
|
|
|
"deactivated",
|
|
|
|
],
|
2019-10-21 07:56:42 -04:00
|
|
|
desc="get_users",
|
|
|
|
)
|
|
|
|
|
2020-09-01 09:21:48 -04:00
|
|
|
async def get_users_paginate(
|
|
|
|
self,
|
|
|
|
start: int,
|
|
|
|
limit: int,
|
|
|
|
user_id: Optional[str] = None,
|
|
|
|
name: Optional[str] = None,
|
|
|
|
guests: bool = True,
|
|
|
|
deactivated: bool = False,
|
2021-03-03 08:09:39 -05:00
|
|
|
) -> Tuple[List[JsonDict], int]:
|
2019-12-05 13:12:23 -05:00
|
|
|
"""Function to retrieve a paginated list of users from
|
2020-04-28 13:19:36 -04:00
|
|
|
users list. This will return a json list of users and the
|
|
|
|
total number of users matching the filter criteria.
|
2019-10-21 07:56:42 -04:00
|
|
|
|
|
|
|
Args:
|
2020-09-01 09:21:48 -04:00
|
|
|
start: start number to begin the query from
|
|
|
|
limit: number of rows to retrieve
|
|
|
|
user_id: search for user_id. ignored if name is not None
|
|
|
|
name: search for local part of user_id or display name
|
|
|
|
guests: whether to in include guest users
|
|
|
|
deactivated: whether to include deactivated users
|
2019-10-21 07:56:42 -04:00
|
|
|
Returns:
|
2020-09-01 09:21:48 -04:00
|
|
|
A tuple of a list of mappings from user to information and a count of total users.
|
2019-10-21 07:56:42 -04:00
|
|
|
"""
|
2020-04-28 13:19:36 -04:00
|
|
|
|
|
|
|
def get_users_paginate_txn(txn):
|
|
|
|
filters = []
|
2020-08-25 09:18:14 -04:00
|
|
|
args = [self.hs.config.server_name]
|
2020-04-28 13:19:36 -04:00
|
|
|
|
2020-12-17 05:43:37 -05:00
|
|
|
# `name` is in database already in lower case
|
2020-04-28 13:19:36 -04:00
|
|
|
if name:
|
2020-12-17 05:43:37 -05:00
|
|
|
filters.append("(name LIKE ? OR LOWER(displayname) LIKE ?)")
|
|
|
|
args.extend(["@%" + name.lower() + "%:%", "%" + name.lower() + "%"])
|
2020-08-25 09:18:14 -04:00
|
|
|
elif user_id:
|
2020-04-28 13:19:36 -04:00
|
|
|
filters.append("name LIKE ?")
|
2020-12-17 05:43:37 -05:00
|
|
|
args.extend(["%" + user_id.lower() + "%"])
|
2020-04-28 13:19:36 -04:00
|
|
|
|
|
|
|
if not guests:
|
|
|
|
filters.append("is_guest = 0")
|
|
|
|
|
|
|
|
if not deactivated:
|
|
|
|
filters.append("deactivated = 0")
|
|
|
|
|
|
|
|
where_clause = "WHERE " + " AND ".join(filters) if len(filters) > 0 else ""
|
|
|
|
|
2020-08-25 09:18:14 -04:00
|
|
|
sql_base = """
|
2020-04-28 13:19:36 -04:00
|
|
|
FROM users as u
|
|
|
|
LEFT JOIN profiles AS p ON u.name = '@' || p.user_id || ':' || ?
|
|
|
|
{}
|
|
|
|
""".format(
|
|
|
|
where_clause
|
|
|
|
)
|
2020-08-25 09:18:14 -04:00
|
|
|
sql = "SELECT COUNT(*) as total_users " + sql_base
|
|
|
|
txn.execute(sql, args)
|
|
|
|
count = txn.fetchone()[0]
|
|
|
|
|
|
|
|
sql = (
|
2021-02-17 15:19:23 -05:00
|
|
|
"SELECT name, user_type, is_guest, admin, deactivated, shadow_banned, displayname, avatar_url "
|
2020-08-25 09:18:14 -04:00
|
|
|
+ sql_base
|
|
|
|
+ " ORDER BY u.name LIMIT ? OFFSET ?"
|
|
|
|
)
|
|
|
|
args += [limit, start]
|
2020-04-28 13:19:36 -04:00
|
|
|
txn.execute(sql, args)
|
2020-08-05 16:38:57 -04:00
|
|
|
users = self.db_pool.cursor_to_dict(txn)
|
2020-04-28 13:19:36 -04:00
|
|
|
return users, count
|
|
|
|
|
2020-09-01 09:21:48 -04:00
|
|
|
return await self.db_pool.runInteraction(
|
2020-08-05 16:38:57 -04:00
|
|
|
"get_users_paginate_txn", get_users_paginate_txn
|
|
|
|
)
|
2019-10-21 07:56:42 -04:00
|
|
|
|
2021-03-03 08:09:39 -05:00
|
|
|
async def search_users(self, term: str) -> Optional[List[JsonDict]]:
|
2019-10-21 07:56:42 -04:00
|
|
|
"""Function to search users list for one or more users with
|
|
|
|
the matched term.
|
|
|
|
|
|
|
|
Args:
|
2020-08-27 07:41:01 -04:00
|
|
|
term: search term
|
|
|
|
|
2019-10-21 07:56:42 -04:00
|
|
|
Returns:
|
2020-08-27 07:41:01 -04:00
|
|
|
A list of dictionaries or None.
|
2019-10-21 07:56:42 -04:00
|
|
|
"""
|
2020-08-27 07:41:01 -04:00
|
|
|
return await self.db_pool.simple_search_list(
|
2019-10-21 07:56:42 -04:00
|
|
|
table="users",
|
|
|
|
term=term,
|
|
|
|
col="name",
|
|
|
|
retcols=["name", "password_hash", "is_guest", "admin", "user_type"],
|
|
|
|
desc="search_users",
|
|
|
|
)
|
2019-12-06 08:09:40 -05:00
|
|
|
|
|
|
|
|
2020-02-25 12:46:00 -05:00
|
|
|
def check_database_before_upgrade(cur, database_engine, config: HomeServerConfig):
|
|
|
|
"""Called before upgrading an existing database to check that it is broadly sane
|
|
|
|
compared with the configuration.
|
|
|
|
"""
|
2020-09-07 11:48:52 -04:00
|
|
|
logger.info("Checking database for consistency with configuration...")
|
2020-02-25 12:46:00 -05:00
|
|
|
|
2020-09-07 11:48:52 -04:00
|
|
|
# if there are any users in the database, check that the username matches our
|
|
|
|
# configured server name.
|
|
|
|
|
|
|
|
cur.execute("SELECT name FROM users LIMIT 1")
|
|
|
|
rows = cur.fetchall()
|
|
|
|
if not rows:
|
|
|
|
return
|
|
|
|
|
|
|
|
user_domain = get_domain_from_id(rows[0][0])
|
|
|
|
if user_domain == config.server_name:
|
2020-02-25 12:46:00 -05:00
|
|
|
return
|
|
|
|
|
|
|
|
raise Exception(
|
|
|
|
"Found users in database not native to %s!\n"
|
2020-09-07 11:48:52 -04:00
|
|
|
"You cannot change a synapse server_name after it's been configured"
|
|
|
|
% (config.server_name,)
|
2020-02-25 12:46:00 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
__all__ = ["DataStore", "check_database_before_upgrade"]
|