Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Add a class UnpersistedEventContext to allow for the batching up of storing state groups #14675

Merged
merged 32 commits into from
Feb 9, 2023
Merged
Show file tree
Hide file tree
Changes from 24 commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
286469f
add class UnpersistedEventContext
H-Shay Dec 13, 2022
6322dac
modify create new client event to create unpersistedeventcontexts
H-Shay Dec 13, 2022
54fa7f0
persist event contexts after creation
H-Shay Dec 13, 2022
d23d1be
fix tests to persist unpersisted event contexts
H-Shay Dec 13, 2022
b483243
cleanup
H-Shay Dec 13, 2022
c008b6f
misc lints + cleanup
H-Shay Dec 13, 2022
c6ef7bb
Merge branch 'develop' into shay/rework_event_context
H-Shay Dec 13, 2022
0f07c0e
changelog + fix comments
H-Shay Dec 13, 2022
a66cc71
Merge branch 'shay/rework_event_context' of https://github.com/matrix…
H-Shay Dec 13, 2022
78a71ed
lints
H-Shay Dec 13, 2022
6321576
fix batch insertion?
H-Shay Dec 14, 2022
d6454ce
reduce redundant calculation
H-Shay Dec 14, 2022
8b99436
add unpersisted event classes
H-Shay Jan 9, 2023
1668fd2
rework compute_event_context, split into function that returns unpers…
H-Shay Jan 9, 2023
7e494fc
use calculate_context_info to create unpersisted event contexts
H-Shay Jan 9, 2023
61c8de0
update typing
H-Shay Jan 9, 2023
ed2e305
Merge branch 'develop' into shay/rework_event_context
H-Shay Jan 9, 2023
f7eafcf
$%#^&*
H-Shay Jan 10, 2023
0402917
black
H-Shay Jan 10, 2023
373e331
fix comments and consolidate classes, use attr.s for class
H-Shay Jan 12, 2023
408fa21
requested changes
H-Shay Jan 12, 2023
345d746
lint
H-Shay Jan 12, 2023
b9ee9d3
Merge branch 'develop' into shay/rework_event_context
H-Shay Jan 20, 2023
cdce9a2
requested changes
H-Shay Jan 20, 2023
b69a87c
requested changes
H-Shay Jan 23, 2023
8830c94
refactor to be stupidly explicit
H-Shay Jan 26, 2023
d4c380d
Merge branch 'develop' into shay/rework_event_context
H-Shay Jan 26, 2023
f439b23
Merge branch 'develop' into shay/rework_event_context
erikjohnston Feb 7, 2023
3614ed0
clearer renaming and flow
H-Shay Feb 8, 2023
a0bcc0a
Merge branch 'shay/rework_event_context' of https://github.com/matrix…
H-Shay Feb 8, 2023
427d007
make partial state non-optional
H-Shay Feb 8, 2023
c3bdb6e
update docstrings
H-Shay Feb 9, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions changelog.d/14675.misc
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Add a class UnpersistedEventContext to allow for the batching up of storing state groups.
180 changes: 176 additions & 4 deletions synapse/events/snapshot.py
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
from abc import ABC, abstractmethod
from typing import TYPE_CHECKING, List, Optional, Tuple

import attr
Expand All @@ -26,8 +27,51 @@
from synapse.types.state import StateFilter


class UnpersistedEventContextBase(ABC):
H-Shay marked this conversation as resolved.
Show resolved Hide resolved
"""
This is a base class for EventContext and UnpersistedEventContext, objects which
hold information relevant to storing an associated event. Note that an
UnpersistedEventContexts must be converted into an EventContext before it is
suitable to send to the db with its associated event.

Attributes:
_storage: storage controllers for interfacing with the database
app_service: If the associated event is being sent by a (local) application service, that
app service.
"""

def __init__(self, storage_controller: "StorageControllers"):
self._storage: "StorageControllers" = storage_controller
self.app_service: Optional[ApplicationService] = None

@abstractmethod
async def persist(
self,
event: EventBase,
) -> "EventContext":
"""
A method to convert an UnpersistedEventContext to an EventContext, suitable for
sending to the database with the associated event.
"""
pass

@abstractmethod
async def get_prev_state_ids(
self, state_filter: Optional["StateFilter"] = None
) -> StateMap[str]:
"""
Gets the room state at the event (ie not including the event if the event is a
state event).

Args:
state_filter: specifies the type of state event to fetch from DB, example:
EventTypes.JoinRules
"""
pass


@attr.s(slots=True, auto_attribs=True)
class EventContext:
class EventContext(UnpersistedEventContextBase):
"""
Holds information relevant to persisting an event

Expand Down Expand Up @@ -77,9 +121,6 @@ class EventContext:
delta_ids: If ``prev_group`` is not None, the state delta between ``prev_group``
and ``state_group``.

app_service: If this event is being sent by a (local) application service, that
app service.

partial_state: if True, we may be storing this event with a temporary,
incomplete state.
"""
Expand Down Expand Up @@ -122,6 +163,9 @@ def for_outlier(
"""Return an EventContext instance suitable for persisting an outlier event"""
return EventContext(storage=storage)

async def persist(self, event: EventBase) -> "EventContext":
return self

async def serialize(self, event: EventBase, store: "DataStore") -> JsonDict:
"""Converts self to a type that can be serialized as JSON, and then
deserialized by `deserialize`
Expand Down Expand Up @@ -254,6 +298,134 @@ async def get_prev_state_ids(
)


@attr.s(slots=True, auto_attribs=True)
class UnpersistedEventContext(UnpersistedEventContextBase):
H-Shay marked this conversation as resolved.
Show resolved Hide resolved
"""
This is a version of an EventContext before the new state group (if any) has been
computed and stored. It contains information about the state before the event (which
also may be the information after the event, if the event is not a state event). The
UnpersistedEventContext must be converted into an EventContext by calling the method
'persist' on it before it is suitable to be sent to the DB for processing.

state_group_before_event:
the state group at/before the event. This is required if `for_batch` is True.
state_group:
this will always be None until it is persisted

state_group_before_event: The ID of the state group representing the state
of the room before this event.

state_delta_due_to_event: If the event is a state event, then this is the
delta of the state between `state_group` and `state_group_before_event`

prev_group: If it is known, ``state_group``'s prev_group.

If the event is a state event, this is normally the same as
``state_group_before_event``.

delta_ids: If ``prev_group`` is not None, the state delta between ``prev_group``
and ``state_group``.

partial_state: Whether the event has partial state.

state_map_before_event: A map of the state before the event, i.e. the state at `state_group_before_event`
"""

_storage: "StorageControllers"
state_group_before_event: Optional[int]
state_group: Optional[int]
state_delta_due_to_event: Optional[dict]
prev_group: Optional[int]
delta_ids: Optional[StateMap[str]]
H-Shay marked this conversation as resolved.
Show resolved Hide resolved
partial_state: Optional[bool]
state_map_before_event: Optional[StateMap[str]] = None

async def get_prev_state_ids(
self, state_filter: Optional["StateFilter"] = None
) -> StateMap[str]:
"""
Gets the room state map, excluding this event.

Args:
state_filter: specifies the type of state event to fetch from DB

Returns:
Maps a (type, state_key) to the event ID of the state event matching
this tuple.
"""
if self.state_map_before_event:
return self.state_map_before_event

assert self.state_group_before_event is not None
return await self._storage.state.get_state_ids_for_group(
self.state_group_before_event, state_filter
)

async def persist(self, event: EventBase) -> EventContext:
"""
Creates a full `EventContext` for the event, persisting any referenced state that
has not yet been persisted.

Args:
event: event that the EventContext is associated with.

Returns: An EventContext suitable for sending to the database with the event
for persisting
"""
assert self.partial_state is not None
# If we have a full set of state for at/before the event but don't have a state
# group for that state, we need to get one
if self.state_map_before_event and self.state_group_before_event is None:
state_group_before_event = await self._storage.state.store_state_group(
event.event_id,
event.room_id,
prev_group=self.prev_group,
delta_ids=self.delta_ids,
current_state_ids=self.state_map_before_event,
)
self.state_group_before_event = state_group_before_event
self.prev_group = state_group_before_event
H-Shay marked this conversation as resolved.
Show resolved Hide resolved
if not event.is_state():
return EventContext.with_state(
storage=self._storage,
state_group=self.state_group_before_event,
state_group_before_event=self.state_group_before_event,
state_delta_due_to_event=self.state_delta_due_to_event,
partial_state=self.partial_state,
prev_group=self.prev_group,
delta_ids=self.delta_ids,
)
else:
if not self.prev_group and not self.delta_ids:
# if we don't have a prev_group and the delta from the prev_group we need
# to store the state group with the full state
state_group_after_event = await self._storage.state.store_state_group(
event.event_id,
event.room_id,
prev_group=self.state_group_before_event,
delta_ids=self.state_delta_due_to_event,
current_state_ids=self.state_map_before_event,
)
else:
state_group_after_event = await self._storage.state.store_state_group(
event.event_id,
event.room_id,
prev_group=self.prev_group,
delta_ids=self.delta_ids,
current_state_ids=None,
)

return EventContext.with_state(
storage=self._storage,
state_group=state_group_after_event,
state_group_before_event=self.state_group_before_event,
state_delta_due_to_event=self.state_delta_due_to_event,
partial_state=self.partial_state,
prev_group=self.prev_group,
delta_ids=self.delta_ids,
)
H-Shay marked this conversation as resolved.
Show resolved Hide resolved


def _encode_state_dict(
state_dict: Optional[StateMap[str]],
) -> Optional[List[Tuple[str, str, str]]]:
Expand Down
6 changes: 4 additions & 2 deletions synapse/events/third_party_rules.py
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@

from synapse.api.errors import ModuleFailedException, SynapseError
from synapse.events import EventBase
from synapse.events.snapshot import EventContext
from synapse.events.snapshot import UnpersistedEventContextBase
from synapse.storage.roommember import ProfileInfo
from synapse.types import Requester, StateMap
from synapse.util.async_helpers import delay_cancellation, maybe_awaitable
Expand Down Expand Up @@ -231,7 +231,9 @@ def register_third_party_rules_callbacks(
self._on_threepid_bind_callbacks.append(on_threepid_bind)

async def check_event_allowed(
self, event: EventBase, context: EventContext
self,
event: EventBase,
context: UnpersistedEventContextBase,
) -> Tuple[bool, Optional[dict]]:
"""Check if a provided event should be allowed in the given context.

Expand Down
59 changes: 39 additions & 20 deletions synapse/handlers/federation.py
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@
from synapse.crypto.event_signing import compute_event_signature
from synapse.event_auth import validate_event_for_room_version
from synapse.events import EventBase
from synapse.events.snapshot import EventContext
from synapse.events.snapshot import EventContext, UnpersistedEventContextBase
from synapse.events.validator import EventValidator
from synapse.federation.federation_client import InvalidResponseError
from synapse.http.servlet import assert_params_in_dict
Expand Down Expand Up @@ -935,15 +935,20 @@ async def on_make_join_request(
)

try:
event, context = await self.event_creation_handler.create_new_client_event(
(
event,
unpersisted_context,
) = await self.event_creation_handler.create_new_client_event(
builder=builder
)
except SynapseError as e:
logger.warning("Failed to create join to %s because %s", room_id, e)
raise

# Ensure the user can even join the room.
await self._federation_event_handler.check_join_restrictions(context, event)
await self._federation_event_handler.check_join_restrictions(
unpersisted_context, event
)

# The remote hasn't signed it yet, obviously. We'll do the full checks
# when we get the event back in `on_send_join_request`
Expand Down Expand Up @@ -1123,7 +1128,7 @@ async def on_make_leave_request(
},
)

event, context = await self.event_creation_handler.create_new_client_event(
event, _ = await self.event_creation_handler.create_new_client_event(
DMRobertson marked this conversation as resolved.
Show resolved Hide resolved
builder=builder
)

Expand Down Expand Up @@ -1173,12 +1178,13 @@ async def on_make_knock_request(
},
)

event, context = await self.event_creation_handler.create_new_client_event(
builder=builder
)
(
event,
unpersisted_context,
) = await self.event_creation_handler.create_new_client_event(builder=builder)

event_allowed, _ = await self.third_party_event_rules.check_event_allowed(
event, context
event, unpersisted_context
)
if not event_allowed:
logger.warning("Creation of knock %s forbidden by third-party rules", event)
Expand Down Expand Up @@ -1351,15 +1357,20 @@ async def exchange_third_party_invite(
try:
(
event,
context,
unpersisted_context,
) = await self.event_creation_handler.create_new_client_event(
builder=builder
)

event, context = await self.add_display_name_to_third_party_invite(
room_version_obj, event_dict, event, context
(
event,
unpersisted_context,
) = await self.add_display_name_to_third_party_invite(
room_version_obj, event_dict, event, unpersisted_context
)

context = await unpersisted_context.persist(event)

EventValidator().validate_new(event, self.config)

# We need to tell the transaction queue to send this out, even
Expand Down Expand Up @@ -1428,14 +1439,19 @@ async def on_exchange_third_party_invite_request(
try:
(
event,
context,
unpersisted_context,
) = await self.event_creation_handler.create_new_client_event(
builder=builder
)
event, context = await self.add_display_name_to_third_party_invite(
room_version_obj, event_dict, event, context
(
event,
unpersisted_context,
) = await self.add_display_name_to_third_party_invite(
room_version_obj, event_dict, event, unpersisted_context
)

context = await unpersisted_context.persist(event)

try:
validate_event_for_room_version(event)
await self._event_auth_handler.check_auth_rules_from_context(event)
Expand Down Expand Up @@ -1467,8 +1483,8 @@ async def add_display_name_to_third_party_invite(
room_version_obj: RoomVersion,
event_dict: JsonDict,
event: EventBase,
context: EventContext,
) -> Tuple[EventBase, EventContext]:
context: UnpersistedEventContextBase,
) -> Tuple[EventBase, UnpersistedEventContextBase]:
key = (
EventTypes.ThirdPartyInvite,
event.content["third_party_invite"]["signed"]["token"],
Expand Down Expand Up @@ -1502,11 +1518,14 @@ async def add_display_name_to_third_party_invite(
room_version_obj, event_dict
)
EventValidator().validate_builder(builder)
event, context = await self.event_creation_handler.create_new_client_event(
builder=builder
)

(
event,
unpersisted_context,
) = await self.event_creation_handler.create_new_client_event(builder=builder)

EventValidator().validate_new(event, self.config)
return event, context
return event, unpersisted_context

async def _check_signature(self, event: EventBase, context: EventContext) -> None:
"""
Expand Down
6 changes: 4 additions & 2 deletions synapse/handlers/federation_event.py
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@
validate_event_for_room_version,
)
from synapse.events import EventBase
from synapse.events.snapshot import EventContext
from synapse.events.snapshot import EventContext, UnpersistedEventContextBase
from synapse.federation.federation_client import InvalidResponseError, PulledPduInfo
from synapse.logging.context import nested_logging_context
from synapse.logging.opentracing import (
Expand Down Expand Up @@ -425,7 +425,9 @@ async def on_send_membership_event(
return event, context

async def check_join_restrictions(
self, context: EventContext, event: EventBase
self,
context: UnpersistedEventContextBase,
event: EventBase,
) -> None:
"""Check that restrictions in restricted join rules are matched

Expand Down
Loading