mirror of
https://github.com/element-hq/synapse.git
synced 2024-11-26 03:25:53 +03:00
23740eaa3d
During the migration the automated script to update the copyright headers accidentally got rid of some of the existing copyright lines. Reinstate them.
761 lines
31 KiB
Python
761 lines
31 KiB
Python
#
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
#
|
|
# Copyright 2017 Vector Creations Ltd
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# See the GNU Affero General Public License for more details:
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
#
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
#
|
|
# [This file includes modifications made by New Vector Limited]
|
|
#
|
|
#
|
|
|
|
import logging
|
|
from http import HTTPStatus
|
|
from typing import TYPE_CHECKING, List, Optional, Set, Tuple
|
|
|
|
from twisted.internet.interfaces import IDelayedCall
|
|
|
|
import synapse.metrics
|
|
from synapse.api.constants import EventTypes, HistoryVisibility, JoinRules, Membership
|
|
from synapse.api.errors import Codes, SynapseError
|
|
from synapse.handlers.state_deltas import MatchChange, StateDeltasHandler
|
|
from synapse.metrics.background_process_metrics import run_as_background_process
|
|
from synapse.storage.databases.main.state_deltas import StateDelta
|
|
from synapse.storage.databases.main.user_directory import SearchResult
|
|
from synapse.storage.roommember import ProfileInfo
|
|
from synapse.types import UserID
|
|
from synapse.util.metrics import Measure
|
|
from synapse.util.retryutils import NotRetryingDestination
|
|
from synapse.util.stringutils import non_null_str_or_none
|
|
|
|
if TYPE_CHECKING:
|
|
from synapse.server import HomeServer
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
# Don't refresh a stale user directory entry, using a Federation /profile request,
|
|
# for 60 seconds. This gives time for other state events to arrive (which will
|
|
# then be coalesced such that only one /profile request is made).
|
|
USER_DIRECTORY_STALE_REFRESH_TIME_MS = 60 * 1000
|
|
|
|
# Maximum number of remote servers that we will attempt to refresh profiles for
|
|
# in one go.
|
|
MAX_SERVERS_TO_REFRESH_PROFILES_FOR_IN_ONE_GO = 5
|
|
|
|
# As long as we have servers to refresh (without backoff), keep adding more
|
|
# every 15 seconds.
|
|
INTERVAL_TO_ADD_MORE_SERVERS_TO_REFRESH_PROFILES = 15
|
|
|
|
|
|
def calculate_time_of_next_retry(now_ts: int, retry_count: int) -> int:
|
|
"""
|
|
Calculates the time of a next retry given `now_ts` in ms and the number
|
|
of failures encountered thus far.
|
|
|
|
Currently the sequence goes:
|
|
1 min, 5 min, 25 min, 2 hour, 10 hour, 52 hour, 10 day, 7.75 week
|
|
"""
|
|
return now_ts + 60_000 * (5 ** min(retry_count, 7))
|
|
|
|
|
|
class UserDirectoryHandler(StateDeltasHandler):
|
|
"""Handles queries and updates for the user_directory.
|
|
|
|
N.B.: ASSUMES IT IS THE ONLY THING THAT MODIFIES THE USER DIRECTORY
|
|
|
|
When a local user searches the user_directory, we report two kinds of users:
|
|
|
|
- users this server can see are joined to a world_readable or publicly
|
|
joinable room, and
|
|
- users belonging to a private room shared by that local user.
|
|
|
|
The two cases are tracked separately in the `users_in_public_rooms` and
|
|
`users_who_share_private_rooms` tables. Both kinds of users have their
|
|
username and avatar tracked in a `user_directory` table.
|
|
|
|
This handler has three responsibilities:
|
|
1. Forwarding requests to `/user_directory/search` to the UserDirectoryStore.
|
|
2. Providing hooks for the application to call when local users are added,
|
|
removed, or have their profile changed.
|
|
3. Listening for room state changes that indicate remote users have
|
|
joined or left a room, or that their profile has changed.
|
|
"""
|
|
|
|
def __init__(self, hs: "HomeServer"):
|
|
super().__init__(hs)
|
|
|
|
self.store = hs.get_datastores().main
|
|
self._storage_controllers = hs.get_storage_controllers()
|
|
self.server_name = hs.hostname
|
|
self.clock = hs.get_clock()
|
|
self.notifier = hs.get_notifier()
|
|
self.is_mine_id = hs.is_mine_id
|
|
self.update_user_directory = hs.config.worker.should_update_user_directory
|
|
self.search_all_users = hs.config.userdirectory.user_directory_search_all_users
|
|
self.show_locked_users = hs.config.userdirectory.show_locked_users
|
|
self._spam_checker_module_callbacks = hs.get_module_api_callbacks().spam_checker
|
|
self._hs = hs
|
|
|
|
# The current position in the current_state_delta stream
|
|
self.pos: Optional[int] = None
|
|
|
|
# Guard to ensure we only process deltas one at a time
|
|
self._is_processing = False
|
|
|
|
# Guard to ensure we only have one process for refreshing remote profiles
|
|
self._is_refreshing_remote_profiles = False
|
|
# Handle to cancel the `call_later` of `kick_off_remote_profile_refresh_process`
|
|
self._refresh_remote_profiles_call_later: Optional[IDelayedCall] = None
|
|
|
|
# Guard to ensure we only have one process for refreshing remote profiles
|
|
# for the given servers.
|
|
# Set of server names.
|
|
self._is_refreshing_remote_profiles_for_servers: Set[str] = set()
|
|
|
|
if self.update_user_directory:
|
|
self.notifier.add_replication_callback(self.notify_new_event)
|
|
|
|
# We kick this off so that we don't have to wait for a change before
|
|
# we start populating the user directory
|
|
self.clock.call_later(0, self.notify_new_event)
|
|
|
|
# Kick off the profile refresh process on startup
|
|
self._refresh_remote_profiles_call_later = self.clock.call_later(
|
|
10, self.kick_off_remote_profile_refresh_process
|
|
)
|
|
|
|
async def search_users(
|
|
self, user_id: str, search_term: str, limit: int
|
|
) -> SearchResult:
|
|
"""Searches for users in directory
|
|
|
|
Returns:
|
|
dict of the form::
|
|
|
|
{
|
|
"limited": <bool>, # whether there were more results or not
|
|
"results": [ # Ordered by best match first
|
|
{
|
|
"user_id": <user_id>,
|
|
"display_name": <display_name>,
|
|
"avatar_url": <avatar_url>
|
|
}
|
|
]
|
|
}
|
|
"""
|
|
results = await self.store.search_user_dir(
|
|
user_id, search_term, limit, self.show_locked_users
|
|
)
|
|
|
|
# Remove any spammy users from the results.
|
|
non_spammy_users = []
|
|
for user in results["results"]:
|
|
if not await self._spam_checker_module_callbacks.check_username_for_spam(
|
|
user
|
|
):
|
|
non_spammy_users.append(user)
|
|
results["results"] = non_spammy_users
|
|
|
|
return results
|
|
|
|
def notify_new_event(self) -> None:
|
|
"""Called when there may be more deltas to process"""
|
|
if not self.update_user_directory:
|
|
return
|
|
|
|
if self._is_processing:
|
|
return
|
|
|
|
async def process() -> None:
|
|
try:
|
|
await self._unsafe_process()
|
|
finally:
|
|
self._is_processing = False
|
|
|
|
self._is_processing = True
|
|
run_as_background_process("user_directory.notify_new_event", process)
|
|
|
|
async def handle_local_profile_change(
|
|
self, user_id: str, profile: ProfileInfo
|
|
) -> None:
|
|
"""Called to update index of our local user profiles when they change
|
|
irrespective of any rooms the user may be in.
|
|
"""
|
|
# FIXME(https://github.com/matrix-org/synapse/issues/3714): We should
|
|
# probably do this in the same worker as all the other changes.
|
|
|
|
if await self.store.should_include_local_user_in_dir(user_id):
|
|
await self.store.update_profile_in_user_dir(
|
|
user_id, profile.display_name, profile.avatar_url
|
|
)
|
|
|
|
async def handle_local_user_deactivated(self, user_id: str) -> None:
|
|
"""Called when a user ID is deactivated"""
|
|
# FIXME(https://github.com/matrix-org/synapse/issues/3714): We should
|
|
# probably do this in the same worker as all the other changes.
|
|
await self.store.remove_from_user_dir(user_id)
|
|
|
|
async def _unsafe_process(self) -> None:
|
|
# If self.pos is None then means we haven't fetched it from DB
|
|
if self.pos is None:
|
|
self.pos = await self.store.get_user_directory_stream_pos()
|
|
|
|
# If still None then the initial background update hasn't happened yet.
|
|
if self.pos is None:
|
|
return None
|
|
|
|
room_max_stream_ordering = self.store.get_room_max_stream_ordering()
|
|
if self.pos > room_max_stream_ordering:
|
|
# apparently, we've processed more events than exist in the database!
|
|
# this can happen if events are removed with history purge or similar.
|
|
logger.warning(
|
|
"Event stream ordering appears to have gone backwards (%i -> %i): "
|
|
"rewinding user directory processor",
|
|
self.pos,
|
|
room_max_stream_ordering,
|
|
)
|
|
self.pos = room_max_stream_ordering
|
|
|
|
# Loop round handling deltas until we're up to date
|
|
while True:
|
|
with Measure(self.clock, "user_dir_delta"):
|
|
room_max_stream_ordering = self.store.get_room_max_stream_ordering()
|
|
if self.pos == room_max_stream_ordering:
|
|
return
|
|
|
|
logger.debug(
|
|
"Processing user stats %s->%s", self.pos, room_max_stream_ordering
|
|
)
|
|
(
|
|
max_pos,
|
|
deltas,
|
|
) = await self._storage_controllers.state.get_current_state_deltas(
|
|
self.pos, room_max_stream_ordering
|
|
)
|
|
|
|
logger.debug("Handling %d state deltas", len(deltas))
|
|
await self._handle_deltas(deltas)
|
|
|
|
self.pos = max_pos
|
|
|
|
# Expose current event processing position to prometheus
|
|
synapse.metrics.event_processing_positions.labels("user_dir").set(
|
|
max_pos
|
|
)
|
|
|
|
await self.store.update_user_directory_stream_pos(max_pos)
|
|
|
|
async def _handle_deltas(self, deltas: List[StateDelta]) -> None:
|
|
"""Called with the state deltas to process"""
|
|
for delta in deltas:
|
|
logger.debug(
|
|
"Handling: %r %r, %s", delta.event_type, delta.state_key, delta.event_id
|
|
)
|
|
|
|
# For join rule and visibility changes we need to check if the room
|
|
# may have become public or not and add/remove the users in said room
|
|
if delta.event_type in (
|
|
EventTypes.RoomHistoryVisibility,
|
|
EventTypes.JoinRules,
|
|
):
|
|
await self._handle_room_publicity_change(
|
|
delta.room_id, delta.prev_event_id, delta.event_id, delta.event_type
|
|
)
|
|
elif delta.event_type == EventTypes.Member:
|
|
await self._handle_room_membership_event(
|
|
delta.room_id,
|
|
delta.prev_event_id,
|
|
delta.event_id,
|
|
delta.state_key,
|
|
)
|
|
else:
|
|
logger.debug("Ignoring irrelevant type: %r", delta.event_type)
|
|
|
|
async def _handle_room_publicity_change(
|
|
self,
|
|
room_id: str,
|
|
prev_event_id: Optional[str],
|
|
event_id: Optional[str],
|
|
typ: str,
|
|
) -> None:
|
|
"""Handle a room having potentially changed from/to world_readable/publicly
|
|
joinable.
|
|
|
|
Args:
|
|
room_id: The ID of the room which changed.
|
|
prev_event_id: The previous event before the state change
|
|
event_id: The new event after the state change
|
|
typ: Type of the event
|
|
"""
|
|
logger.debug("Handling change for %s: %s", typ, room_id)
|
|
|
|
if typ == EventTypes.RoomHistoryVisibility:
|
|
publicness = await self._get_key_change(
|
|
prev_event_id,
|
|
event_id,
|
|
key_name="history_visibility",
|
|
public_value=HistoryVisibility.WORLD_READABLE,
|
|
)
|
|
elif typ == EventTypes.JoinRules:
|
|
publicness = await self._get_key_change(
|
|
prev_event_id,
|
|
event_id,
|
|
key_name="join_rule",
|
|
public_value=JoinRules.PUBLIC,
|
|
)
|
|
else:
|
|
raise Exception("Invalid event type")
|
|
if publicness is MatchChange.no_change:
|
|
logger.debug("No change")
|
|
return
|
|
|
|
# There's been a change to or from being world readable.
|
|
|
|
is_public = await self.store.is_room_world_readable_or_publicly_joinable(
|
|
room_id
|
|
)
|
|
|
|
logger.debug("Publicness change: %r, is_public: %r", publicness, is_public)
|
|
|
|
if publicness is MatchChange.now_true and not is_public:
|
|
# If we became world readable but room isn't currently public then
|
|
# we ignore the change
|
|
return
|
|
elif publicness is MatchChange.now_false and is_public:
|
|
# If we stopped being world readable but are still public,
|
|
# ignore the change
|
|
return
|
|
|
|
users_in_room = await self.store.get_users_in_room(room_id)
|
|
|
|
# Remove every user from the sharing tables for that room.
|
|
for user_id in users_in_room:
|
|
await self.store.remove_user_who_share_room(user_id, room_id)
|
|
|
|
# Then, re-add all remote users and some local users to the tables.
|
|
# NOTE: this is not the most efficient method, as _track_user_joined_room sets
|
|
# up local_user -> other_user and other_user_whos_local -> local_user,
|
|
# which when ran over an entire room, will result in the same values
|
|
# being added multiple times. The batching upserts shouldn't make this
|
|
# too bad, though.
|
|
for user_id in users_in_room:
|
|
if not self.is_mine_id(
|
|
user_id
|
|
) or await self.store.should_include_local_user_in_dir(user_id):
|
|
await self._track_user_joined_room(room_id, user_id)
|
|
|
|
async def _handle_room_membership_event(
|
|
self,
|
|
room_id: str,
|
|
prev_event_id: Optional[str],
|
|
event_id: Optional[str],
|
|
state_key: str,
|
|
) -> None:
|
|
"""Process a single room membershp event.
|
|
|
|
We have to do two things:
|
|
|
|
1. Update the room-sharing tables.
|
|
This applies to remote users and non-excluded local users.
|
|
2. Update the user_directory and user_directory_search tables.
|
|
This applies to remote users only, because we only become aware of
|
|
the (and any profile changes) by listening to these events.
|
|
The rest of the application knows exactly when local users are
|
|
created or their profile changed---it will directly call methods
|
|
on this class.
|
|
"""
|
|
joined = await self._get_key_change(
|
|
prev_event_id,
|
|
event_id,
|
|
key_name="membership",
|
|
public_value=Membership.JOIN,
|
|
)
|
|
|
|
# Both cases ignore excluded local users, so start by discarding them.
|
|
is_remote = not self.is_mine_id(state_key)
|
|
if not is_remote and not await self.store.should_include_local_user_in_dir(
|
|
state_key
|
|
):
|
|
return
|
|
|
|
if joined is MatchChange.now_false:
|
|
# Need to check if the server left the room entirely, if so
|
|
# we might need to remove all the users in that room
|
|
is_in_room = await self.store.is_host_joined(room_id, self.server_name)
|
|
if not is_in_room:
|
|
logger.debug("Server left room: %r", room_id)
|
|
# Fetch all the users that we marked as being in user
|
|
# directory due to being in the room and then check if
|
|
# need to remove those users or not
|
|
user_ids = await self.store.get_users_in_dir_due_to_room(room_id)
|
|
|
|
for user_id in user_ids:
|
|
await self._handle_remove_user(room_id, user_id)
|
|
else:
|
|
logger.debug("Server is still in room: %r", room_id)
|
|
await self._handle_remove_user(room_id, state_key)
|
|
elif joined is MatchChange.no_change:
|
|
# Handle any profile changes for remote users.
|
|
# (For local users the rest of the application calls
|
|
# `handle_local_profile_change`.)
|
|
# Only process if there is an event_id.
|
|
if is_remote and event_id is not None:
|
|
await self._handle_possible_remote_profile_change(
|
|
state_key, room_id, prev_event_id, event_id
|
|
)
|
|
elif joined is MatchChange.now_true: # The user joined
|
|
# This may be the first time we've seen a remote user. If
|
|
# so, ensure we have a directory entry for them. (For local users,
|
|
# the rest of the application calls `handle_local_profile_change`.)
|
|
# Only process if there is an event_id.
|
|
if is_remote and event_id is not None:
|
|
await self._handle_possible_remote_profile_change(
|
|
state_key, room_id, None, event_id
|
|
)
|
|
await self._track_user_joined_room(room_id, state_key)
|
|
|
|
async def _track_user_joined_room(self, room_id: str, joining_user_id: str) -> None:
|
|
"""Someone's just joined a room. Update `users_in_public_rooms` or
|
|
`users_who_share_private_rooms` as appropriate.
|
|
|
|
The caller is responsible for ensuring that the given user should be
|
|
included in the user directory.
|
|
"""
|
|
is_public = await self.store.is_room_world_readable_or_publicly_joinable(
|
|
room_id
|
|
)
|
|
if is_public:
|
|
await self.store.add_users_in_public_rooms(room_id, (joining_user_id,))
|
|
else:
|
|
users_in_room = await self.store.get_users_in_room(room_id)
|
|
other_users_in_room = [
|
|
other
|
|
for other in users_in_room
|
|
if other != joining_user_id
|
|
and (
|
|
# We can't apply any special rules to remote users so
|
|
# they're always included
|
|
not self.is_mine_id(other)
|
|
# Check the special rules whether the local user should be
|
|
# included in the user directory
|
|
or await self.store.should_include_local_user_in_dir(other)
|
|
)
|
|
]
|
|
updates_to_users_who_share_rooms: Set[Tuple[str, str]] = set()
|
|
|
|
# First, if the joining user is our local user then we need an
|
|
# update for every other user in the room.
|
|
if self.is_mine_id(joining_user_id):
|
|
for other_user_id in other_users_in_room:
|
|
updates_to_users_who_share_rooms.add(
|
|
(joining_user_id, other_user_id)
|
|
)
|
|
|
|
# Next, we need an update for every other local user in the room
|
|
# that they now share a room with the joining user.
|
|
for other_user_id in other_users_in_room:
|
|
if self.is_mine_id(other_user_id):
|
|
updates_to_users_who_share_rooms.add(
|
|
(other_user_id, joining_user_id)
|
|
)
|
|
|
|
if updates_to_users_who_share_rooms:
|
|
await self.store.add_users_who_share_private_room(
|
|
room_id, updates_to_users_who_share_rooms
|
|
)
|
|
|
|
async def _handle_remove_user(self, room_id: str, user_id: str) -> None:
|
|
"""Called when when someone leaves a room. The user may be local or remote.
|
|
|
|
(If the person who left was the last local user in this room, the server
|
|
is no longer in the room. We call this function to forget that the remaining
|
|
remote users are in the room, even though they haven't left. So the name is
|
|
a little misleading!)
|
|
|
|
Args:
|
|
room_id: The room ID that user left or stopped being public that
|
|
user_id
|
|
"""
|
|
logger.debug("Removing user %r from room %r", user_id, room_id)
|
|
|
|
# Remove user from sharing tables
|
|
await self.store.remove_user_who_share_room(user_id, room_id)
|
|
|
|
# Additionally, if they're a remote user and we're no longer joined
|
|
# to any rooms they're in, remove them from the user directory.
|
|
if not self.is_mine_id(user_id):
|
|
rooms_user_is_in = await self.store.get_user_dir_rooms_user_is_in(user_id)
|
|
|
|
if len(rooms_user_is_in) == 0:
|
|
logger.debug("Removing user %r from directory", user_id)
|
|
await self.store.remove_from_user_dir(user_id)
|
|
|
|
async def _handle_possible_remote_profile_change(
|
|
self,
|
|
user_id: str,
|
|
room_id: str,
|
|
prev_event_id: Optional[str],
|
|
event_id: str,
|
|
) -> None:
|
|
"""Check member event changes for any profile changes and update the
|
|
database if there are. This is intended for remote users only. The caller
|
|
is responsible for checking that the given user is remote.
|
|
"""
|
|
|
|
if not prev_event_id:
|
|
# If we don't have an older event to fall back on, just fetch the same
|
|
# event itself.
|
|
prev_event_id = event_id
|
|
|
|
prev_event = await self.store.get_event(prev_event_id, allow_none=True)
|
|
event = await self.store.get_event(event_id, allow_none=True)
|
|
|
|
if not prev_event or not event:
|
|
return
|
|
|
|
if event.membership != Membership.JOIN:
|
|
return
|
|
|
|
is_public = await self.store.is_room_world_readable_or_publicly_joinable(
|
|
room_id
|
|
)
|
|
if not is_public:
|
|
# Don't collect user profiles from private rooms as they are not guaranteed
|
|
# to be the same as the user's global profile.
|
|
now_ts = self.clock.time_msec()
|
|
await self.store.set_remote_user_profile_in_user_dir_stale(
|
|
user_id,
|
|
next_try_at_ms=now_ts + USER_DIRECTORY_STALE_REFRESH_TIME_MS,
|
|
retry_counter=0,
|
|
)
|
|
# Schedule a wake-up to refresh the user directory for this server.
|
|
# We intentionally wake up this server directly because we don't want
|
|
# other servers ahead of it in the queue to get in the way of updating
|
|
# the profile if the server only just sent us an event.
|
|
self.clock.call_later(
|
|
USER_DIRECTORY_STALE_REFRESH_TIME_MS // 1000 + 1,
|
|
self.kick_off_remote_profile_refresh_process_for_remote_server,
|
|
UserID.from_string(user_id).domain,
|
|
)
|
|
# Schedule a wake-up to handle any backoffs that may occur in the future.
|
|
self.clock.call_later(
|
|
2 * USER_DIRECTORY_STALE_REFRESH_TIME_MS // 1000 + 1,
|
|
self.kick_off_remote_profile_refresh_process,
|
|
)
|
|
return
|
|
|
|
prev_name = prev_event.content.get("displayname")
|
|
new_name = event.content.get("displayname")
|
|
# If the new name is an unexpected form, replace with None.
|
|
if not isinstance(new_name, str):
|
|
new_name = None
|
|
|
|
prev_avatar = prev_event.content.get("avatar_url")
|
|
new_avatar = event.content.get("avatar_url")
|
|
# If the new avatar is an unexpected form, replace with None.
|
|
if not isinstance(new_avatar, str):
|
|
new_avatar = None
|
|
|
|
if (
|
|
prev_name != new_name
|
|
or prev_avatar != new_avatar
|
|
or prev_event_id == event_id
|
|
):
|
|
# Only update if something has changed, or we didn't have a previous event
|
|
# in the first place.
|
|
await self.store.update_profile_in_user_dir(user_id, new_name, new_avatar)
|
|
|
|
def kick_off_remote_profile_refresh_process(self) -> None:
|
|
"""Called when there may be remote users with stale profiles to be refreshed"""
|
|
if not self.update_user_directory:
|
|
return
|
|
|
|
if self._is_refreshing_remote_profiles:
|
|
return
|
|
|
|
if self._refresh_remote_profiles_call_later:
|
|
if self._refresh_remote_profiles_call_later.active():
|
|
self._refresh_remote_profiles_call_later.cancel()
|
|
self._refresh_remote_profiles_call_later = None
|
|
|
|
async def process() -> None:
|
|
try:
|
|
await self._unsafe_refresh_remote_profiles()
|
|
finally:
|
|
self._is_refreshing_remote_profiles = False
|
|
|
|
self._is_refreshing_remote_profiles = True
|
|
run_as_background_process("user_directory.refresh_remote_profiles", process)
|
|
|
|
async def _unsafe_refresh_remote_profiles(self) -> None:
|
|
limit = MAX_SERVERS_TO_REFRESH_PROFILES_FOR_IN_ONE_GO - len(
|
|
self._is_refreshing_remote_profiles_for_servers
|
|
)
|
|
if limit <= 0:
|
|
# nothing to do: already refreshing the maximum number of servers
|
|
# at once.
|
|
# Come back later.
|
|
self._refresh_remote_profiles_call_later = self.clock.call_later(
|
|
INTERVAL_TO_ADD_MORE_SERVERS_TO_REFRESH_PROFILES,
|
|
self.kick_off_remote_profile_refresh_process,
|
|
)
|
|
return
|
|
|
|
servers_to_refresh = (
|
|
await self.store.get_remote_servers_with_profiles_to_refresh(
|
|
now_ts=self.clock.time_msec(), limit=limit
|
|
)
|
|
)
|
|
|
|
if not servers_to_refresh:
|
|
# Do we have any backing-off servers that we should try again
|
|
# for eventually?
|
|
# By setting `now` is a point in the far future, we can ask for
|
|
# which server/user is next to be refreshed, even though it is
|
|
# not actually refreshable *now*.
|
|
end_of_time = 1 << 62
|
|
backing_off_servers = (
|
|
await self.store.get_remote_servers_with_profiles_to_refresh(
|
|
now_ts=end_of_time, limit=1
|
|
)
|
|
)
|
|
if backing_off_servers:
|
|
# Find out when the next user is refreshable and schedule a
|
|
# refresh then.
|
|
backing_off_server_name = backing_off_servers[0]
|
|
users = await self.store.get_remote_users_to_refresh_on_server(
|
|
backing_off_server_name, now_ts=end_of_time, limit=1
|
|
)
|
|
if not users:
|
|
return
|
|
_, _, next_try_at_ts = users[0]
|
|
self._refresh_remote_profiles_call_later = self.clock.call_later(
|
|
((next_try_at_ts - self.clock.time_msec()) // 1000) + 2,
|
|
self.kick_off_remote_profile_refresh_process,
|
|
)
|
|
|
|
return
|
|
|
|
for server_to_refresh in servers_to_refresh:
|
|
self.kick_off_remote_profile_refresh_process_for_remote_server(
|
|
server_to_refresh
|
|
)
|
|
|
|
self._refresh_remote_profiles_call_later = self.clock.call_later(
|
|
INTERVAL_TO_ADD_MORE_SERVERS_TO_REFRESH_PROFILES,
|
|
self.kick_off_remote_profile_refresh_process,
|
|
)
|
|
|
|
def kick_off_remote_profile_refresh_process_for_remote_server(
|
|
self, server_name: str
|
|
) -> None:
|
|
"""Called when there may be remote users with stale profiles to be refreshed
|
|
on the given server."""
|
|
if not self.update_user_directory:
|
|
return
|
|
|
|
if server_name in self._is_refreshing_remote_profiles_for_servers:
|
|
return
|
|
|
|
async def process() -> None:
|
|
try:
|
|
await self._unsafe_refresh_remote_profiles_for_remote_server(
|
|
server_name
|
|
)
|
|
finally:
|
|
self._is_refreshing_remote_profiles_for_servers.remove(server_name)
|
|
|
|
self._is_refreshing_remote_profiles_for_servers.add(server_name)
|
|
run_as_background_process(
|
|
"user_directory.refresh_remote_profiles_for_remote_server", process
|
|
)
|
|
|
|
async def _unsafe_refresh_remote_profiles_for_remote_server(
|
|
self, server_name: str
|
|
) -> None:
|
|
logger.info("Refreshing profiles in user directory for %s", server_name)
|
|
|
|
while True:
|
|
# Get a handful of users to process.
|
|
next_batch = await self.store.get_remote_users_to_refresh_on_server(
|
|
server_name, now_ts=self.clock.time_msec(), limit=10
|
|
)
|
|
if not next_batch:
|
|
# Finished for now
|
|
return
|
|
|
|
for user_id, retry_counter, _ in next_batch:
|
|
# Request the profile of the user.
|
|
try:
|
|
profile = await self._hs.get_profile_handler().get_profile(
|
|
user_id, ignore_backoff=False
|
|
)
|
|
except NotRetryingDestination as e:
|
|
logger.info(
|
|
"Failed to refresh profile for %r because the destination is undergoing backoff",
|
|
user_id,
|
|
)
|
|
# As a special-case, we back off until the destination is no longer
|
|
# backed off from.
|
|
await self.store.set_remote_user_profile_in_user_dir_stale(
|
|
user_id,
|
|
e.retry_last_ts + e.retry_interval,
|
|
retry_counter=retry_counter + 1,
|
|
)
|
|
continue
|
|
except SynapseError as e:
|
|
if e.code == HTTPStatus.NOT_FOUND and e.errcode == Codes.NOT_FOUND:
|
|
# The profile doesn't exist.
|
|
# TODO Does this mean we should clear it from our user
|
|
# directory?
|
|
await self.store.clear_remote_user_profile_in_user_dir_stale(
|
|
user_id
|
|
)
|
|
logger.warning(
|
|
"Refresh of remote profile %r: not found (%r)",
|
|
user_id,
|
|
e.msg,
|
|
)
|
|
continue
|
|
|
|
logger.warning(
|
|
"Failed to refresh profile for %r because %r", user_id, e
|
|
)
|
|
await self.store.set_remote_user_profile_in_user_dir_stale(
|
|
user_id,
|
|
calculate_time_of_next_retry(
|
|
self.clock.time_msec(), retry_counter + 1
|
|
),
|
|
retry_counter=retry_counter + 1,
|
|
)
|
|
continue
|
|
except Exception:
|
|
logger.error(
|
|
"Failed to refresh profile for %r due to unhandled exception",
|
|
user_id,
|
|
exc_info=True,
|
|
)
|
|
await self.store.set_remote_user_profile_in_user_dir_stale(
|
|
user_id,
|
|
calculate_time_of_next_retry(
|
|
self.clock.time_msec(), retry_counter + 1
|
|
),
|
|
retry_counter=retry_counter + 1,
|
|
)
|
|
continue
|
|
|
|
await self.store.update_profile_in_user_dir(
|
|
user_id,
|
|
display_name=non_null_str_or_none(profile.get("displayname")),
|
|
avatar_url=non_null_str_or_none(profile.get("avatar_url")),
|
|
)
|