2014-08-12 10:10:52 -04:00
|
|
|
# -*- coding: utf-8 -*-
|
2015-01-06 08:21:39 -05:00
|
|
|
# Copyright 2014, 2015 OpenMarket Ltd
|
2014-08-12 10:10:52 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-08-12 22:14:34 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
"""This layer is responsible for replicating with remote home servers using
|
|
|
|
a given transport.
|
|
|
|
"""
|
|
|
|
|
|
|
|
from twisted.internet import defer
|
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
from .units import Transaction, Edu
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-10-31 10:00:14 -04:00
|
|
|
from .persistence import TransactionActions
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
from synapse.util.logutils import log_function
|
2014-11-20 11:24:00 -05:00
|
|
|
from synapse.util.logcontext import PreserveLoggingContext
|
2014-12-10 05:06:12 -05:00
|
|
|
from synapse.events import FrozenEvent
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
import logging
|
|
|
|
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class ReplicationLayer(object):
|
|
|
|
"""This layer is responsible for replicating with remote home servers over
|
|
|
|
the given transport. I.e., does the sending and receiving of PDUs to
|
|
|
|
remote home servers.
|
|
|
|
|
|
|
|
The layer communicates with the rest of the server via a registered
|
|
|
|
ReplicationHandler.
|
|
|
|
|
|
|
|
In more detail, the layer:
|
|
|
|
* Receives incoming data and processes it into transactions and pdus.
|
|
|
|
* Fetches any PDUs it thinks it might have missed.
|
|
|
|
* Keeps the current state for contexts up to date by applying the
|
|
|
|
suitable conflict resolution.
|
|
|
|
* Sends outgoing pdus wrapped in transactions.
|
|
|
|
* Fills out the references to previous pdus/transactions appropriately
|
|
|
|
for outgoing data.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, hs, transport_layer):
|
|
|
|
self.server_name = hs.hostname
|
|
|
|
|
|
|
|
self.transport_layer = transport_layer
|
|
|
|
self.transport_layer.register_received_handler(self)
|
|
|
|
self.transport_layer.register_request_handler(self)
|
|
|
|
|
|
|
|
self.store = hs.get_datastore()
|
2014-10-31 05:59:59 -04:00
|
|
|
# self.pdu_actions = PduActions(self.store)
|
2014-08-12 10:10:52 -04:00
|
|
|
self.transaction_actions = TransactionActions(self.store)
|
|
|
|
|
|
|
|
self._transaction_queue = _TransactionQueue(
|
|
|
|
hs, self.transaction_actions, transport_layer
|
|
|
|
)
|
|
|
|
|
|
|
|
self.handler = None
|
|
|
|
self.edu_handlers = {}
|
2014-08-13 11:55:53 -04:00
|
|
|
self.query_handlers = {}
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
self._order = 0
|
|
|
|
|
|
|
|
self._clock = hs.get_clock()
|
|
|
|
|
2014-12-04 10:50:01 -05:00
|
|
|
self.event_builder_factory = hs.get_event_builder_factory()
|
2014-11-14 16:25:02 -05:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
def set_handler(self, handler):
|
|
|
|
"""Sets the handler that the replication layer will use to communicate
|
|
|
|
receipt of new PDUs from other home servers. The required methods are
|
|
|
|
documented on :py:class:`.ReplicationHandler`.
|
|
|
|
"""
|
|
|
|
self.handler = handler
|
|
|
|
|
|
|
|
def register_edu_handler(self, edu_type, handler):
|
|
|
|
if edu_type in self.edu_handlers:
|
2014-11-04 10:09:34 -05:00
|
|
|
raise KeyError("Already have an EDU handler for %s" % (edu_type,))
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
self.edu_handlers[edu_type] = handler
|
|
|
|
|
2014-08-13 11:55:53 -04:00
|
|
|
def register_query_handler(self, query_type, handler):
|
|
|
|
"""Sets the handler callable that will be used to handle an incoming
|
|
|
|
federation Query of the given type.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
query_type (str): Category name of the query, which should match
|
|
|
|
the string used by make_query.
|
|
|
|
handler (callable): Invoked to handle incoming queries of this type
|
|
|
|
|
|
|
|
handler is invoked as:
|
|
|
|
result = handler(args)
|
|
|
|
|
|
|
|
where 'args' is a dict mapping strings to strings of the query
|
|
|
|
arguments. It should return a Deferred that will eventually yield an
|
|
|
|
object to encode as JSON.
|
|
|
|
"""
|
|
|
|
if query_type in self.query_handlers:
|
2014-11-04 10:09:34 -05:00
|
|
|
raise KeyError(
|
|
|
|
"Already have a Query handler for %s" % (query_type,)
|
|
|
|
)
|
2014-08-13 11:55:53 -04:00
|
|
|
|
|
|
|
self.query_handlers[query_type] = handler
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
@log_function
|
2014-12-04 06:27:59 -05:00
|
|
|
def send_pdu(self, pdu, destinations):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Informs the replication layer about a new PDU generated within the
|
|
|
|
home server that should be transmitted to others.
|
|
|
|
|
|
|
|
TODO: Figure out when we should actually resolve the deferred.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
pdu (Pdu): The new Pdu.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Completes when we have successfully processed the PDU
|
|
|
|
and replicated it to any interested remote home servers.
|
|
|
|
"""
|
|
|
|
order = self._order
|
|
|
|
self._order += 1
|
|
|
|
|
2014-11-03 08:06:58 -05:00
|
|
|
logger.debug("[%s] transaction_layer.enqueue_pdu... ", pdu.event_id)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
# TODO, add errback, etc.
|
2014-12-04 06:27:59 -05:00
|
|
|
self._transaction_queue.enqueue_pdu(pdu, destinations, order)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-04 10:09:34 -05:00
|
|
|
logger.debug(
|
|
|
|
"[%s] transaction_layer.enqueue_pdu... done",
|
|
|
|
pdu.event_id
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
@log_function
|
|
|
|
def send_edu(self, destination, edu_type, content):
|
|
|
|
edu = Edu(
|
|
|
|
origin=self.server_name,
|
|
|
|
destination=destination,
|
|
|
|
edu_type=edu_type,
|
|
|
|
content=content,
|
|
|
|
)
|
|
|
|
|
|
|
|
# TODO, add errback, etc.
|
|
|
|
self._transaction_queue.enqueue_edu(edu)
|
2014-08-19 09:24:53 -04:00
|
|
|
return defer.succeed(None)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-04 09:17:55 -05:00
|
|
|
@log_function
|
|
|
|
def send_failure(self, failure, destination):
|
|
|
|
self._transaction_queue.enqueue_failure(failure, destination)
|
|
|
|
return defer.succeed(None)
|
|
|
|
|
2014-08-13 11:55:53 -04:00
|
|
|
@log_function
|
2014-10-02 09:09:15 -04:00
|
|
|
def make_query(self, destination, query_type, args,
|
|
|
|
retry_on_dns_fail=True):
|
2014-08-13 11:55:53 -04:00
|
|
|
"""Sends a federation Query to a remote homeserver of the given type
|
|
|
|
and arguments.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): Domain name of the remote homeserver
|
|
|
|
query_type (str): Category of the query type; should match the
|
|
|
|
handler name used in register_query_handler().
|
|
|
|
args (dict): Mapping of strings to strings containing the details
|
|
|
|
of the query request.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
a Deferred which will eventually yield a JSON object from the
|
|
|
|
response
|
|
|
|
"""
|
2014-10-02 09:09:15 -04:00
|
|
|
return self.transport_layer.make_query(
|
|
|
|
destination, query_type, args, retry_on_dns_fail=retry_on_dns_fail
|
|
|
|
)
|
2014-08-13 11:55:53 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-10-31 05:59:02 -04:00
|
|
|
def backfill(self, dest, context, limit, extremities):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Requests some more historic PDUs for the given context from the
|
|
|
|
given destination server.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
dest (str): The remote home server to ask.
|
2014-08-13 13:14:37 -04:00
|
|
|
context (str): The context to backfill.
|
2014-08-12 10:10:52 -04:00
|
|
|
limit (int): The maximum number of PDUs to return.
|
2014-10-31 05:59:02 -04:00
|
|
|
extremities (list): List of PDU id and origins of the first pdus
|
|
|
|
we have seen from the context
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in the received PDUs.
|
|
|
|
"""
|
2014-08-13 13:14:37 -04:00
|
|
|
logger.debug("backfill extrem=%s", extremities)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
# If there are no extremeties then we've (probably) reached the start.
|
|
|
|
if not extremities:
|
|
|
|
return
|
|
|
|
|
2014-08-13 13:14:37 -04:00
|
|
|
transaction_data = yield self.transport_layer.backfill(
|
2014-08-12 10:10:52 -04:00
|
|
|
dest, context, extremities, limit)
|
|
|
|
|
2014-08-13 13:14:37 -04:00
|
|
|
logger.debug("backfill transaction_data=%s", repr(transaction_data))
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
transaction = Transaction(**transaction_data)
|
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
pdus = [
|
|
|
|
self.event_from_pdu_json(p, outlier=False)
|
|
|
|
for p in transaction.pdus
|
|
|
|
]
|
2014-08-12 10:10:52 -04:00
|
|
|
for pdu in pdus:
|
2014-11-10 06:59:51 -05:00
|
|
|
yield self._handle_new_pdu(dest, pdu, backfilled=True)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
defer.returnValue(pdus)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-11-03 08:06:58 -05:00
|
|
|
def get_pdu(self, destination, event_id, outlier=False):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Requests the PDU with given origin and ID from the remote home
|
|
|
|
server.
|
|
|
|
|
|
|
|
This will persist the PDU locally upon receipt.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): Which home server to query
|
|
|
|
pdu_origin (str): The home server that originally sent the pdu.
|
2014-11-03 08:06:58 -05:00
|
|
|
event_id (str)
|
2014-08-12 10:10:52 -04:00
|
|
|
outlier (bool): Indicates whether the PDU is an `outlier`, i.e. if
|
|
|
|
it's from an arbitary point in the context as opposed to part
|
|
|
|
of the current block of PDUs. Defaults to `False`
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in the requested PDU.
|
|
|
|
"""
|
|
|
|
|
2014-11-03 08:06:58 -05:00
|
|
|
transaction_data = yield self.transport_layer.get_event(
|
|
|
|
destination, event_id
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
transaction = Transaction(**transaction_data)
|
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
pdu_list = [
|
|
|
|
self.event_from_pdu_json(p, outlier=outlier)
|
|
|
|
for p in transaction.pdus
|
|
|
|
]
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
pdu = None
|
|
|
|
if pdu_list:
|
|
|
|
pdu = pdu_list[0]
|
2014-10-17 10:04:17 -04:00
|
|
|
yield self._handle_new_pdu(destination, pdu)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
defer.returnValue(pdu)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-12-18 13:47:13 -05:00
|
|
|
def get_state_for_context(self, destination, context, event_id):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Requests all of the `current` state PDUs for a given context from
|
|
|
|
a remote home server.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): The remote homeserver to query for the state.
|
|
|
|
context (str): The context we're interested in.
|
2014-12-18 13:47:13 -05:00
|
|
|
event_id (str): The id of the event we want the state at.
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in a list of PDUs.
|
|
|
|
"""
|
|
|
|
|
2014-12-18 13:47:13 -05:00
|
|
|
result = yield self.transport_layer.get_context_state(
|
2014-11-03 08:06:58 -05:00
|
|
|
destination,
|
|
|
|
context,
|
|
|
|
event_id=event_id,
|
2014-10-17 10:04:17 -04:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
pdus = [
|
2014-12-18 13:47:13 -05:00
|
|
|
self.event_from_pdu_json(p, outlier=True) for p in result["pdus"]
|
|
|
|
]
|
|
|
|
|
|
|
|
auth_chain = [
|
2014-11-14 16:25:02 -05:00
|
|
|
self.event_from_pdu_json(p, outlier=True)
|
2014-12-18 13:47:13 -05:00
|
|
|
for p in result.get("auth_chain", [])
|
2014-11-14 16:25:02 -05:00
|
|
|
]
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-12-18 13:47:13 -05:00
|
|
|
defer.returnValue((pdus, auth_chain))
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-27 09:31:43 -05:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def get_event_auth(self, destination, context, event_id):
|
|
|
|
res = yield self.transport_layer.get_event_auth(
|
|
|
|
destination, context, event_id,
|
|
|
|
)
|
|
|
|
|
|
|
|
auth_chain = [
|
|
|
|
self.event_from_pdu_json(p, outlier=True)
|
|
|
|
for p in res["auth_chain"]
|
|
|
|
]
|
|
|
|
|
|
|
|
auth_chain.sort(key=lambda e: e.depth)
|
|
|
|
|
|
|
|
defer.returnValue(auth_chain)
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-11-10 06:59:51 -05:00
|
|
|
def on_backfill_request(self, origin, context, versions, limit):
|
2014-10-31 05:59:59 -04:00
|
|
|
pdus = yield self.handler.on_backfill_request(
|
2014-11-10 06:59:51 -05:00
|
|
|
origin, context, versions, limit
|
2014-10-31 05:59:59 -04:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
defer.returnValue((200, self._transaction_from_pdus(pdus).get_dict()))
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def on_incoming_transaction(self, transaction_data):
|
|
|
|
transaction = Transaction(**transaction_data)
|
|
|
|
|
2014-09-15 08:26:05 -04:00
|
|
|
for p in transaction.pdus:
|
2014-10-17 11:50:04 -04:00
|
|
|
if "unsigned" in p:
|
|
|
|
unsigned = p["unsigned"]
|
|
|
|
if "age" in unsigned:
|
|
|
|
p["age"] = unsigned["age"]
|
2014-09-15 11:55:39 -04:00
|
|
|
if "age" in p:
|
|
|
|
p["age_ts"] = int(self._clock.time_msec()) - int(p["age"])
|
|
|
|
del p["age"]
|
2014-09-15 08:26:05 -04:00
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
pdu_list = [
|
|
|
|
self.event_from_pdu_json(p) for p in transaction.pdus
|
|
|
|
]
|
2014-09-15 08:26:05 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
logger.debug("[%s] Got transaction", transaction.transaction_id)
|
|
|
|
|
|
|
|
response = yield self.transaction_actions.have_responded(transaction)
|
|
|
|
|
|
|
|
if response:
|
|
|
|
logger.debug("[%s] We've already responed to this request",
|
|
|
|
transaction.transaction_id)
|
|
|
|
defer.returnValue(response)
|
|
|
|
return
|
|
|
|
|
2014-12-09 19:12:51 -05:00
|
|
|
logger.debug("[%s] Transaction is new", transaction.transaction_id)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-20 11:24:00 -05:00
|
|
|
with PreserveLoggingContext():
|
|
|
|
dl = []
|
|
|
|
for pdu in pdu_list:
|
|
|
|
dl.append(self._handle_new_pdu(transaction.origin, pdu))
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-20 11:24:00 -05:00
|
|
|
if hasattr(transaction, "edus"):
|
|
|
|
for edu in [Edu(**x) for x in transaction.edus]:
|
|
|
|
self.received_edu(
|
|
|
|
transaction.origin,
|
|
|
|
edu.edu_type,
|
|
|
|
edu.content
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-20 11:24:00 -05:00
|
|
|
results = yield defer.DeferredList(dl)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
ret = []
|
|
|
|
for r in results:
|
|
|
|
if r[0]:
|
|
|
|
ret.append({})
|
|
|
|
else:
|
|
|
|
logger.exception(r[1])
|
|
|
|
ret.append({"error": str(r[1])})
|
|
|
|
|
|
|
|
logger.debug("Returning: %s", str(ret))
|
|
|
|
|
|
|
|
yield self.transaction_actions.set_response(
|
|
|
|
transaction,
|
|
|
|
200, response
|
|
|
|
)
|
|
|
|
defer.returnValue((200, response))
|
|
|
|
|
|
|
|
def received_edu(self, origin, edu_type, content):
|
|
|
|
if edu_type in self.edu_handlers:
|
|
|
|
self.edu_handlers[edu_type](origin, content)
|
|
|
|
else:
|
|
|
|
logger.warn("Received EDU of type %s with no handler", edu_type)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-11-10 08:37:24 -05:00
|
|
|
def on_context_state_request(self, origin, context, event_id):
|
2014-11-03 08:06:58 -05:00
|
|
|
if event_id:
|
2014-10-17 10:04:17 -04:00
|
|
|
pdus = yield self.handler.get_state_for_pdu(
|
2014-11-10 08:37:24 -05:00
|
|
|
origin,
|
|
|
|
context,
|
|
|
|
event_id,
|
2014-10-17 10:04:17 -04:00
|
|
|
)
|
2014-12-18 13:47:13 -05:00
|
|
|
auth_chain = yield self.store.get_auth_chain(
|
|
|
|
[pdu.event_id for pdu in pdus]
|
|
|
|
)
|
2014-10-17 10:04:17 -04:00
|
|
|
else:
|
2014-10-31 06:47:34 -04:00
|
|
|
raise NotImplementedError("Specify an event")
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-12-18 13:47:13 -05:00
|
|
|
defer.returnValue((200, {
|
|
|
|
"pdus": [pdu.get_pdu_json() for pdu in pdus],
|
|
|
|
"auth_chain": [pdu.get_pdu_json() for pdu in auth_chain],
|
|
|
|
}))
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-11-10 08:37:24 -05:00
|
|
|
def on_pdu_request(self, origin, event_id):
|
|
|
|
pdu = yield self._get_persisted_pdu(origin, event_id)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
if pdu:
|
|
|
|
defer.returnValue(
|
|
|
|
(200, self._transaction_from_pdus([pdu]).get_dict())
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
defer.returnValue((404, ""))
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def on_pull_request(self, origin, versions):
|
2014-10-31 05:59:59 -04:00
|
|
|
raise NotImplementedError("Pull transacions not implemented")
|
|
|
|
|
2014-08-13 11:55:53 -04:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def on_query_request(self, query_type, args):
|
|
|
|
if query_type in self.query_handlers:
|
|
|
|
response = yield self.query_handlers[query_type](args)
|
|
|
|
defer.returnValue((200, response))
|
|
|
|
else:
|
2014-10-16 11:56:51 -04:00
|
|
|
defer.returnValue(
|
|
|
|
(404, "No handler for Query type '%s'" % (query_type, ))
|
|
|
|
)
|
2014-10-17 13:56:42 -04:00
|
|
|
|
2014-10-17 10:04:17 -04:00
|
|
|
@defer.inlineCallbacks
|
2014-10-16 11:56:51 -04:00
|
|
|
def on_make_join_request(self, context, user_id):
|
2014-10-17 10:04:17 -04:00
|
|
|
pdu = yield self.handler.on_make_join_request(context, user_id)
|
2014-11-18 14:18:36 -05:00
|
|
|
time_now = self._clock.time_msec()
|
2014-11-10 06:59:51 -05:00
|
|
|
defer.returnValue({
|
2014-11-18 14:18:36 -05:00
|
|
|
"event": pdu.get_pdu_json(time_now),
|
2014-11-10 06:59:51 -05:00
|
|
|
})
|
2014-10-16 11:56:51 -04:00
|
|
|
|
2014-10-17 13:56:42 -04:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def on_invite_request(self, origin, content):
|
2014-11-14 16:25:02 -05:00
|
|
|
pdu = self.event_from_pdu_json(content)
|
2014-11-07 08:41:00 -05:00
|
|
|
ret_pdu = yield self.handler.on_invite_request(origin, pdu)
|
2014-11-18 14:18:36 -05:00
|
|
|
time_now = self._clock.time_msec()
|
2014-11-10 06:59:51 -05:00
|
|
|
defer.returnValue(
|
|
|
|
(
|
|
|
|
200,
|
|
|
|
{
|
2014-11-18 14:18:36 -05:00
|
|
|
"event": ret_pdu.get_pdu_json(time_now),
|
2014-11-10 06:59:51 -05:00
|
|
|
}
|
|
|
|
)
|
|
|
|
)
|
2014-10-17 13:56:42 -04:00
|
|
|
|
2014-10-16 11:56:51 -04:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def on_send_join_request(self, origin, content):
|
2014-12-10 05:06:12 -05:00
|
|
|
logger.debug("on_send_join_request: content: %s", content)
|
2014-11-14 16:25:02 -05:00
|
|
|
pdu = self.event_from_pdu_json(content)
|
2014-12-10 05:06:12 -05:00
|
|
|
logger.debug("on_send_join_request: pdu sigs: %s", pdu.signatures)
|
2014-11-07 06:22:12 -05:00
|
|
|
res_pdus = yield self.handler.on_send_join_request(origin, pdu)
|
2014-11-18 14:18:36 -05:00
|
|
|
time_now = self._clock.time_msec()
|
2014-11-07 06:22:12 -05:00
|
|
|
defer.returnValue((200, {
|
2014-11-18 14:18:36 -05:00
|
|
|
"state": [p.get_pdu_json(time_now) for p in res_pdus["state"]],
|
2014-11-20 12:26:36 -05:00
|
|
|
"auth_chain": [
|
|
|
|
p.get_pdu_json(time_now) for p in res_pdus["auth_chain"]
|
|
|
|
],
|
2014-11-07 06:22:12 -05:00
|
|
|
}))
|
2014-10-16 11:56:51 -04:00
|
|
|
|
2014-11-07 10:35:53 -05:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def on_event_auth(self, origin, context, event_id):
|
2014-11-18 14:18:36 -05:00
|
|
|
time_now = self._clock.time_msec()
|
2014-11-07 10:35:53 -05:00
|
|
|
auth_pdus = yield self.handler.on_event_auth(event_id)
|
2014-11-10 06:59:51 -05:00
|
|
|
defer.returnValue(
|
|
|
|
(
|
|
|
|
200,
|
|
|
|
{
|
2014-11-20 12:26:36 -05:00
|
|
|
"auth_chain": [
|
|
|
|
a.get_pdu_json(time_now) for a in auth_pdus
|
|
|
|
],
|
2014-11-10 06:59:51 -05:00
|
|
|
}
|
|
|
|
)
|
|
|
|
)
|
2014-11-07 10:35:53 -05:00
|
|
|
|
2014-10-17 10:04:17 -04:00
|
|
|
@defer.inlineCallbacks
|
2014-10-16 11:56:51 -04:00
|
|
|
def make_join(self, destination, context, user_id):
|
2014-11-10 06:59:51 -05:00
|
|
|
ret = yield self.transport_layer.make_join(
|
2014-10-16 11:56:51 -04:00
|
|
|
destination=destination,
|
|
|
|
context=context,
|
|
|
|
user_id=user_id,
|
|
|
|
)
|
2014-08-13 11:55:53 -04:00
|
|
|
|
2014-11-10 06:59:51 -05:00
|
|
|
pdu_dict = ret["event"]
|
|
|
|
|
2014-10-17 10:04:17 -04:00
|
|
|
logger.debug("Got response to make_join: %s", pdu_dict)
|
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
defer.returnValue(self.event_from_pdu_json(pdu_dict))
|
2014-10-17 10:04:17 -04:00
|
|
|
|
2014-10-17 13:56:42 -04:00
|
|
|
@defer.inlineCallbacks
|
2014-10-17 10:04:17 -04:00
|
|
|
def send_join(self, destination, pdu):
|
2014-11-20 12:26:36 -05:00
|
|
|
time_now = self._clock.time_msec()
|
2014-10-17 13:56:42 -04:00
|
|
|
_, content = yield self.transport_layer.send_join(
|
2014-10-17 10:04:17 -04:00
|
|
|
destination,
|
2014-11-03 08:06:58 -05:00
|
|
|
pdu.room_id,
|
|
|
|
pdu.event_id,
|
2014-11-18 14:18:36 -05:00
|
|
|
pdu.get_pdu_json(time_now),
|
2014-10-17 10:04:17 -04:00
|
|
|
)
|
|
|
|
|
2014-10-17 13:56:42 -04:00
|
|
|
logger.debug("Got content: %s", content)
|
2014-11-12 06:22:51 -05:00
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
state = [
|
|
|
|
self.event_from_pdu_json(p, outlier=True)
|
|
|
|
for p in content.get("state", [])
|
|
|
|
]
|
2014-10-17 13:56:42 -04:00
|
|
|
|
2014-11-12 06:27:02 -05:00
|
|
|
# FIXME: We probably want to do something with the auth_chain given
|
|
|
|
# to us
|
|
|
|
|
2014-11-25 06:31:18 -05:00
|
|
|
auth_chain = [
|
|
|
|
self.event_from_pdu_json(p, outlier=True)
|
|
|
|
for p in content.get("auth_chain", [])
|
|
|
|
]
|
|
|
|
|
|
|
|
auth_chain.sort(key=lambda e: e.depth)
|
2014-11-07 06:22:12 -05:00
|
|
|
|
2014-11-25 06:31:18 -05:00
|
|
|
defer.returnValue({
|
|
|
|
"state": state,
|
|
|
|
"auth_chain": auth_chain,
|
|
|
|
})
|
2014-10-17 13:56:42 -04:00
|
|
|
|
2014-11-07 08:41:00 -05:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def send_invite(self, destination, context, event_id, pdu):
|
2014-11-18 14:18:36 -05:00
|
|
|
time_now = self._clock.time_msec()
|
2014-11-10 06:59:51 -05:00
|
|
|
code, content = yield self.transport_layer.send_invite(
|
2014-11-07 08:41:00 -05:00
|
|
|
destination=destination,
|
|
|
|
context=context,
|
|
|
|
event_id=event_id,
|
2014-11-18 14:18:36 -05:00
|
|
|
content=pdu.get_pdu_json(time_now),
|
2014-11-07 08:41:00 -05:00
|
|
|
)
|
|
|
|
|
2014-11-10 06:59:51 -05:00
|
|
|
pdu_dict = content["event"]
|
|
|
|
|
2014-11-07 08:41:00 -05:00
|
|
|
logger.debug("Got response to send_invite: %s", pdu_dict)
|
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
defer.returnValue(self.event_from_pdu_json(pdu_dict))
|
2014-11-07 08:41:00 -05:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
@log_function
|
2014-11-24 07:56:17 -05:00
|
|
|
def _get_persisted_pdu(self, origin, event_id, do_auth=True):
|
2014-08-12 10:10:52 -04:00
|
|
|
""" Get a PDU from the database with given origin and id.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Results in a `Pdu`.
|
|
|
|
"""
|
2014-11-24 07:56:17 -05:00
|
|
|
return self.handler.get_persisted_pdu(
|
|
|
|
origin, event_id, do_auth=do_auth
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
def _transaction_from_pdus(self, pdu_list):
|
|
|
|
"""Returns a new Transaction containing the given PDUs suitable for
|
|
|
|
transmission.
|
|
|
|
"""
|
2014-10-17 10:27:11 -04:00
|
|
|
time_now = self._clock.time_msec()
|
2014-11-18 14:18:36 -05:00
|
|
|
pdus = [p.get_pdu_json(time_now) for p in pdu_list]
|
2014-08-12 10:10:52 -04:00
|
|
|
return Transaction(
|
|
|
|
origin=self.server_name,
|
2014-09-15 08:26:05 -04:00
|
|
|
pdus=pdus,
|
2014-10-17 12:33:58 -04:00
|
|
|
origin_server_ts=int(time_now),
|
2014-08-12 10:10:52 -04:00
|
|
|
destination=None,
|
|
|
|
)
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-10-17 10:04:17 -04:00
|
|
|
def _handle_new_pdu(self, origin, pdu, backfilled=False):
|
2014-08-12 10:10:52 -04:00
|
|
|
# We reprocess pdus when we have seen them only as outliers
|
2014-11-24 07:56:17 -05:00
|
|
|
existing = yield self._get_persisted_pdu(
|
|
|
|
origin, pdu.event_id, do_auth=False
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-12-08 04:08:26 -05:00
|
|
|
already_seen = (
|
|
|
|
existing and (
|
2014-12-16 13:33:50 -05:00
|
|
|
not existing.internal_metadata.is_outlier()
|
|
|
|
or pdu.internal_metadata.is_outlier()
|
2014-12-08 04:08:26 -05:00
|
|
|
)
|
|
|
|
)
|
|
|
|
if already_seen:
|
2014-11-03 08:06:58 -05:00
|
|
|
logger.debug("Already seen pdu %s", pdu.event_id)
|
2014-08-12 10:10:52 -04:00
|
|
|
defer.returnValue({})
|
|
|
|
return
|
|
|
|
|
2014-10-17 10:04:17 -04:00
|
|
|
state = None
|
|
|
|
|
2014-12-18 13:47:13 -05:00
|
|
|
auth_chain = []
|
|
|
|
|
2014-11-24 08:46:41 -05:00
|
|
|
# We need to make sure we have all the auth events.
|
2014-11-27 09:31:43 -05:00
|
|
|
# for e_id, _ in pdu.auth_events:
|
|
|
|
# exists = yield self._get_persisted_pdu(
|
|
|
|
# origin,
|
|
|
|
# e_id,
|
|
|
|
# do_auth=False
|
|
|
|
# )
|
|
|
|
#
|
|
|
|
# if not exists:
|
|
|
|
# try:
|
|
|
|
# logger.debug(
|
|
|
|
# "_handle_new_pdu fetch missing auth event %s from %s",
|
|
|
|
# e_id,
|
|
|
|
# origin,
|
|
|
|
# )
|
|
|
|
#
|
|
|
|
# yield self.get_pdu(
|
|
|
|
# origin,
|
|
|
|
# event_id=e_id,
|
|
|
|
# outlier=True,
|
|
|
|
# )
|
|
|
|
#
|
|
|
|
# logger.debug("Processed pdu %s", e_id)
|
|
|
|
# except:
|
|
|
|
# logger.warn(
|
|
|
|
# "Failed to get auth event %s from %s",
|
|
|
|
# e_id,
|
|
|
|
# origin
|
|
|
|
# )
|
2014-11-24 08:46:41 -05:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
# Get missing pdus if necessary.
|
2014-12-16 13:33:50 -05:00
|
|
|
if not pdu.internal_metadata.is_outlier():
|
2014-08-13 13:14:37 -04:00
|
|
|
# We only backfill backwards to the min depth.
|
2014-10-31 06:47:34 -04:00
|
|
|
min_depth = yield self.handler.get_min_depth_for_context(
|
2014-11-03 08:06:58 -05:00
|
|
|
pdu.room_id
|
2014-10-31 06:47:34 -04:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-26 05:41:08 -05:00
|
|
|
logger.debug(
|
|
|
|
"_handle_new_pdu min_depth for %s: %d",
|
|
|
|
pdu.room_id, min_depth
|
|
|
|
)
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
if min_depth and pdu.depth > min_depth:
|
2014-11-03 08:06:58 -05:00
|
|
|
for event_id, hashes in pdu.prev_events:
|
2014-11-24 07:56:17 -05:00
|
|
|
exists = yield self._get_persisted_pdu(
|
|
|
|
origin,
|
|
|
|
event_id,
|
|
|
|
do_auth=False
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
if not exists:
|
2014-11-26 05:41:08 -05:00
|
|
|
logger.debug(
|
|
|
|
"_handle_new_pdu requesting pdu %s",
|
|
|
|
event_id
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
try:
|
|
|
|
yield self.get_pdu(
|
2014-11-25 06:31:18 -05:00
|
|
|
origin,
|
2014-11-03 08:06:58 -05:00
|
|
|
event_id=event_id,
|
2014-08-12 10:10:52 -04:00
|
|
|
)
|
2014-11-03 08:06:58 -05:00
|
|
|
logger.debug("Processed pdu %s", event_id)
|
2014-08-12 10:10:52 -04:00
|
|
|
except:
|
|
|
|
# TODO(erikj): Do some more intelligent retries.
|
|
|
|
logger.exception("Failed to get PDU")
|
2014-10-17 10:04:17 -04:00
|
|
|
else:
|
|
|
|
# We need to get the state at this event, since we have reached
|
|
|
|
# a backward extremity edge.
|
2014-11-26 05:41:08 -05:00
|
|
|
logger.debug(
|
|
|
|
"_handle_new_pdu getting state for %s",
|
|
|
|
pdu.room_id
|
|
|
|
)
|
2014-12-18 13:47:13 -05:00
|
|
|
state, auth_chain = yield self.get_state_for_context(
|
2014-11-03 08:06:58 -05:00
|
|
|
origin, pdu.room_id, pdu.event_id,
|
2014-10-17 10:04:17 -04:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-08-19 09:20:03 -04:00
|
|
|
if not backfilled:
|
2014-10-17 10:04:17 -04:00
|
|
|
ret = yield self.handler.on_receive_pdu(
|
2014-11-27 09:31:43 -05:00
|
|
|
origin,
|
2014-10-17 10:04:17 -04:00
|
|
|
pdu,
|
|
|
|
backfilled=backfilled,
|
|
|
|
state=state,
|
2014-12-18 13:47:13 -05:00
|
|
|
auth_chain=auth_chain,
|
2014-10-17 10:04:17 -04:00
|
|
|
)
|
2014-08-19 09:20:03 -04:00
|
|
|
else:
|
|
|
|
ret = None
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-10-31 05:59:59 -04:00
|
|
|
# yield self.pdu_actions.mark_as_processed(pdu)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
defer.returnValue(ret)
|
|
|
|
|
|
|
|
def __str__(self):
|
|
|
|
return "<ReplicationLayer(%s)>" % self.server_name
|
|
|
|
|
2014-11-14 16:25:02 -05:00
|
|
|
def event_from_pdu_json(self, pdu_json, outlier=False):
|
2014-12-10 05:06:12 -05:00
|
|
|
event = FrozenEvent(
|
2014-12-04 10:50:01 -05:00
|
|
|
pdu_json
|
2014-11-14 16:25:02 -05:00
|
|
|
)
|
|
|
|
|
2014-12-10 05:06:12 -05:00
|
|
|
event.internal_metadata.outlier = outlier
|
2014-12-04 10:50:01 -05:00
|
|
|
|
2014-12-10 05:06:12 -05:00
|
|
|
return event
|
2014-12-04 10:50:01 -05:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
class _TransactionQueue(object):
|
|
|
|
"""This class makes sure we only have one transaction in flight at
|
|
|
|
a time for a given destination.
|
|
|
|
|
|
|
|
It batches pending PDUs into single transactions.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, hs, transaction_actions, transport_layer):
|
|
|
|
self.server_name = hs.hostname
|
|
|
|
self.transaction_actions = transaction_actions
|
|
|
|
self.transport_layer = transport_layer
|
|
|
|
|
|
|
|
self._clock = hs.get_clock()
|
2014-12-08 14:34:51 -05:00
|
|
|
self.store = hs.get_datastore()
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
# Is a mapping from destinations -> deferreds. Used to keep track
|
|
|
|
# of which destinations have transactions in flight and when they are
|
|
|
|
# done
|
|
|
|
self.pending_transactions = {}
|
|
|
|
|
|
|
|
# Is a mapping from destination -> list of
|
|
|
|
# tuple(pending pdus, deferred, order)
|
|
|
|
self.pending_pdus_by_dest = {}
|
|
|
|
# destination -> list of tuple(edu, deferred)
|
|
|
|
self.pending_edus_by_dest = {}
|
|
|
|
|
2014-11-04 09:17:55 -05:00
|
|
|
# destination -> list of tuple(failure, deferred)
|
|
|
|
self.pending_failures_by_dest = {}
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
# HACK to get unique tx id
|
|
|
|
self._next_txn_id = int(self._clock.time_msec())
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
2014-12-04 06:27:59 -05:00
|
|
|
def enqueue_pdu(self, pdu, destinations, order):
|
2014-08-12 10:10:52 -04:00
|
|
|
# We loop through all destinations to see whether we already have
|
|
|
|
# a transaction in progress. If we do, stick it in the pending_pdus
|
|
|
|
# table and we'll get back to it later.
|
|
|
|
|
2014-12-04 06:27:59 -05:00
|
|
|
destinations = set(destinations)
|
2014-12-08 09:50:48 -05:00
|
|
|
destinations.discard(self.server_name)
|
2015-01-06 09:06:25 -05:00
|
|
|
destinations.discard("localhost")
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
logger.debug("Sending to: %s", str(destinations))
|
|
|
|
|
|
|
|
if not destinations:
|
|
|
|
return
|
|
|
|
|
|
|
|
deferreds = []
|
|
|
|
|
|
|
|
for destination in destinations:
|
|
|
|
deferred = defer.Deferred()
|
|
|
|
self.pending_pdus_by_dest.setdefault(destination, []).append(
|
|
|
|
(pdu, deferred, order)
|
|
|
|
)
|
|
|
|
|
2014-12-09 19:12:51 -05:00
|
|
|
def eb(failure):
|
|
|
|
if not deferred.called:
|
|
|
|
deferred.errback(failure)
|
|
|
|
else:
|
|
|
|
logger.warn("Failed to send pdu", failure)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-11-20 11:24:00 -05:00
|
|
|
with PreserveLoggingContext():
|
2014-12-09 19:12:51 -05:00
|
|
|
self._attempt_new_transaction(destination).addErrback(eb)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
deferreds.append(deferred)
|
|
|
|
|
|
|
|
yield defer.DeferredList(deferreds)
|
|
|
|
|
|
|
|
# NO inlineCallbacks
|
|
|
|
def enqueue_edu(self, edu):
|
|
|
|
destination = edu.destination
|
|
|
|
|
2014-12-06 21:26:07 -05:00
|
|
|
if destination == self.server_name:
|
|
|
|
return
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
deferred = defer.Deferred()
|
|
|
|
self.pending_edus_by_dest.setdefault(destination, []).append(
|
|
|
|
(edu, deferred)
|
|
|
|
)
|
|
|
|
|
|
|
|
def eb(failure):
|
2014-08-28 11:19:16 -04:00
|
|
|
if not deferred.called:
|
|
|
|
deferred.errback(failure)
|
2014-08-29 07:08:33 -04:00
|
|
|
else:
|
2014-12-09 19:12:51 -05:00
|
|
|
logger.warn("Failed to send edu", failure)
|
2014-11-20 11:24:00 -05:00
|
|
|
|
|
|
|
with PreserveLoggingContext():
|
|
|
|
self._attempt_new_transaction(destination).addErrback(eb)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
return deferred
|
|
|
|
|
2014-11-04 09:17:55 -05:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def enqueue_failure(self, failure, destination):
|
|
|
|
deferred = defer.Deferred()
|
|
|
|
|
|
|
|
self.pending_failures_by_dest.setdefault(
|
|
|
|
destination, []
|
|
|
|
).append(
|
|
|
|
(failure, deferred)
|
|
|
|
)
|
|
|
|
|
|
|
|
yield deferred
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
@log_function
|
|
|
|
def _attempt_new_transaction(self, destination):
|
2014-12-08 14:34:51 -05:00
|
|
|
|
|
|
|
(retry_last_ts, retry_interval) = (0, 0)
|
2014-12-09 19:03:55 -05:00
|
|
|
retry_timings = yield self.store.get_destination_retry_timings(
|
|
|
|
destination
|
|
|
|
)
|
2014-12-08 14:34:51 -05:00
|
|
|
if retry_timings:
|
|
|
|
(retry_last_ts, retry_interval) = (
|
|
|
|
retry_timings.retry_last_ts, retry_timings.retry_interval
|
|
|
|
)
|
|
|
|
if retry_last_ts + retry_interval > int(self._clock.time_msec()):
|
2014-12-10 05:16:09 -05:00
|
|
|
logger.info(
|
|
|
|
"TX [%s] not ready for retry yet - "
|
|
|
|
"dropping transaction for now",
|
|
|
|
destination,
|
|
|
|
)
|
2014-12-08 14:34:51 -05:00
|
|
|
return
|
|
|
|
else:
|
|
|
|
logger.info("TX [%s] is ready for retry", destination)
|
2014-12-10 05:16:09 -05:00
|
|
|
|
2015-01-06 09:06:25 -05:00
|
|
|
logger.info("TX [%s] _attempt_new_transaction", destination)
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
if destination in self.pending_transactions:
|
2014-12-09 19:03:55 -05:00
|
|
|
# XXX: pending_transactions can get stuck on by a never-ending
|
|
|
|
# request at which point pending_pdus_by_dest just keeps growing.
|
|
|
|
# we need application-layer timeouts of some flavour of these
|
|
|
|
# requests
|
2014-08-12 10:10:52 -04:00
|
|
|
return
|
|
|
|
|
2014-12-06 21:26:07 -05:00
|
|
|
# list of (pending_pdu, deferred, order)
|
2014-08-12 10:10:52 -04:00
|
|
|
pending_pdus = self.pending_pdus_by_dest.pop(destination, [])
|
|
|
|
pending_edus = self.pending_edus_by_dest.pop(destination, [])
|
2014-11-04 10:16:43 -05:00
|
|
|
pending_failures = self.pending_failures_by_dest.pop(destination, [])
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2015-01-06 09:06:25 -05:00
|
|
|
if pending_pdus:
|
|
|
|
logger.info("TX [%s] len(pending_pdus_by_dest[dest]) = %d", destination, len(pending_pdus))
|
|
|
|
|
2014-11-04 09:17:55 -05:00
|
|
|
if not pending_pdus and not pending_edus and not pending_failures:
|
2014-08-12 10:10:52 -04:00
|
|
|
return
|
|
|
|
|
2014-12-10 05:16:09 -05:00
|
|
|
logger.debug(
|
|
|
|
"TX [%s] Attempting new transaction "
|
|
|
|
"(pdus: %d, edus: %d, failures: %d)",
|
2014-12-09 19:03:55 -05:00
|
|
|
destination,
|
2014-12-10 05:16:09 -05:00
|
|
|
len(pending_pdus),
|
|
|
|
len(pending_edus),
|
|
|
|
len(pending_failures)
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
# Sort based on the order field
|
|
|
|
pending_pdus.sort(key=lambda t: t[2])
|
|
|
|
|
|
|
|
pdus = [x[0] for x in pending_pdus]
|
|
|
|
edus = [x[0] for x in pending_edus]
|
2014-11-04 09:17:55 -05:00
|
|
|
failures = [x[0].get_dict() for x in pending_failures]
|
|
|
|
deferreds = [
|
|
|
|
x[1]
|
|
|
|
for x in pending_pdus + pending_edus + pending_failures
|
|
|
|
]
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
try:
|
|
|
|
self.pending_transactions[destination] = 1
|
|
|
|
|
|
|
|
logger.debug("TX [%s] Persisting transaction...", destination)
|
|
|
|
|
|
|
|
transaction = Transaction.create_new(
|
2014-10-17 12:33:58 -04:00
|
|
|
origin_server_ts=int(self._clock.time_msec()),
|
2014-09-30 10:15:10 -04:00
|
|
|
transaction_id=str(self._next_txn_id),
|
2014-08-12 10:10:52 -04:00
|
|
|
origin=self.server_name,
|
|
|
|
destination=destination,
|
|
|
|
pdus=pdus,
|
|
|
|
edus=edus,
|
2014-11-04 09:17:55 -05:00
|
|
|
pdu_failures=failures,
|
2014-08-12 10:10:52 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
self._next_txn_id += 1
|
|
|
|
|
|
|
|
yield self.transaction_actions.prepare_to_send(transaction)
|
|
|
|
|
|
|
|
logger.debug("TX [%s] Persisted transaction", destination)
|
2014-12-10 05:16:09 -05:00
|
|
|
logger.info(
|
|
|
|
"TX [%s] Sending transaction [%s]",
|
|
|
|
destination,
|
|
|
|
transaction.transaction_id,
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
# Actually send the transaction
|
2014-09-15 09:54:25 -04:00
|
|
|
|
|
|
|
# FIXME (erikj): This is a bit of a hack to make the Pdu age
|
|
|
|
# keys work
|
2014-09-30 10:15:10 -04:00
|
|
|
def json_data_cb():
|
|
|
|
data = transaction.get_dict()
|
2014-09-15 09:54:25 -04:00
|
|
|
now = int(self._clock.time_msec())
|
2014-09-30 10:15:10 -04:00
|
|
|
if "pdus" in data:
|
|
|
|
for p in data["pdus"]:
|
2014-09-15 09:54:25 -04:00
|
|
|
if "age_ts" in p:
|
2014-10-17 11:50:04 -04:00
|
|
|
unsigned = p.setdefault("unsigned", {})
|
|
|
|
unsigned["age"] = now - int(p["age_ts"])
|
2014-10-17 10:27:11 -04:00
|
|
|
del p["age_ts"]
|
2014-09-30 10:15:10 -04:00
|
|
|
return data
|
2014-09-15 09:54:25 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
code, response = yield self.transport_layer.send_transaction(
|
2014-09-30 10:15:10 -04:00
|
|
|
transaction, json_data_cb
|
2014-08-12 10:10:52 -04:00
|
|
|
)
|
|
|
|
|
2014-12-06 21:26:07 -05:00
|
|
|
logger.info("TX [%s] got %d response", destination, code)
|
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
logger.debug("TX [%s] Sent transaction", destination)
|
|
|
|
logger.debug("TX [%s] Marking as delivered...", destination)
|
|
|
|
|
|
|
|
yield self.transaction_actions.delivered(
|
|
|
|
transaction, code, response
|
|
|
|
)
|
|
|
|
|
|
|
|
logger.debug("TX [%s] Marked as delivered", destination)
|
|
|
|
logger.debug("TX [%s] Yielding to callbacks...", destination)
|
|
|
|
|
|
|
|
for deferred in deferreds:
|
|
|
|
if code == 200:
|
2014-12-07 19:17:12 -05:00
|
|
|
if retry_last_ts:
|
|
|
|
# this host is alive! reset retry schedule
|
2014-12-09 19:03:55 -05:00
|
|
|
yield self.store.set_destination_retry_timings(
|
|
|
|
destination, 0, 0
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
deferred.callback(None)
|
|
|
|
else:
|
2014-12-09 19:18:44 -05:00
|
|
|
self.set_retrying(destination, retry_interval)
|
2014-08-12 10:10:52 -04:00
|
|
|
deferred.errback(RuntimeError("Got status %d" % code))
|
|
|
|
|
|
|
|
# Ensures we don't continue until all callbacks on that
|
|
|
|
# deferred have fired
|
2014-12-03 06:50:23 -05:00
|
|
|
try:
|
|
|
|
yield deferred
|
|
|
|
except:
|
|
|
|
pass
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
logger.debug("TX [%s] Yielded to callbacks", destination)
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
# We capture this here as there as nothing actually listens
|
|
|
|
# for this finishing functions deferred.
|
2014-12-10 05:16:09 -05:00
|
|
|
logger.warn(
|
|
|
|
"TX [%s] Problem in _attempt_transaction: %s",
|
|
|
|
destination,
|
|
|
|
e,
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2014-12-09 19:18:44 -05:00
|
|
|
self.set_retrying(destination, retry_interval)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
for deferred in deferreds:
|
2014-12-03 06:50:23 -05:00
|
|
|
if not deferred.called:
|
|
|
|
deferred.errback(e)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
finally:
|
|
|
|
# We want to be *very* sure we delete this after we stop processing
|
|
|
|
self.pending_transactions.pop(destination, None)
|
|
|
|
|
|
|
|
# Check to see if there is anything else to send.
|
|
|
|
self._attempt_new_transaction(destination)
|
2014-12-06 21:26:07 -05:00
|
|
|
|
2014-12-08 14:34:51 -05:00
|
|
|
@defer.inlineCallbacks
|
2014-12-09 19:18:44 -05:00
|
|
|
def set_retrying(self, destination, retry_interval):
|
2014-12-07 18:44:16 -05:00
|
|
|
# track that this destination is having problems and we should
|
|
|
|
# give it a chance to recover before trying it again
|
2014-12-10 05:16:09 -05:00
|
|
|
|
2014-12-07 18:44:16 -05:00
|
|
|
if retry_interval:
|
|
|
|
retry_interval *= 2
|
2014-12-09 19:18:44 -05:00
|
|
|
# plateau at hourly retries for now
|
|
|
|
if retry_interval >= 60 * 60 * 1000:
|
|
|
|
retry_interval = 60 * 60 * 1000
|
2014-12-07 18:44:16 -05:00
|
|
|
else:
|
2014-12-10 05:16:09 -05:00
|
|
|
retry_interval = 2000 # try again at first after 2 seconds
|
|
|
|
|
|
|
|
yield self.store.set_destination_retry_timings(
|
|
|
|
destination,
|
|
|
|
int(self._clock.time_msec()),
|
|
|
|
retry_interval
|
|
|
|
)
|