2020-05-01 07:01:50 -05:00
|
|
|
package internal
|
2020-04-29 05:34:31 -05:00
|
|
|
|
|
|
|
import (
|
2023-07-05 03:57:41 -05:00
|
|
|
"context"
|
2021-11-24 04:45:23 -06:00
|
|
|
"crypto/ed25519"
|
|
|
|
"encoding/base64"
|
2022-01-27 08:29:14 -06:00
|
|
|
"fmt"
|
2020-09-22 05:05:45 -05:00
|
|
|
"sync"
|
2020-08-20 11:03:07 -05:00
|
|
|
"time"
|
|
|
|
|
2021-11-24 04:45:23 -06:00
|
|
|
"github.com/matrix-org/dendrite/federationapi/api"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/queue"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/statistics"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/storage"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/storage/cache"
|
|
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
2020-08-20 11:03:07 -05:00
|
|
|
roomserverAPI "github.com/matrix-org/dendrite/roomserver/api"
|
2020-12-02 11:41:00 -06:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2020-08-20 11:03:07 -05:00
|
|
|
"github.com/matrix-org/gomatrix"
|
2020-04-29 09:29:39 -05:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-24 11:23:25 -05:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
2023-04-19 09:50:33 -05:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2021-11-24 04:45:23 -06:00
|
|
|
"github.com/sirupsen/logrus"
|
2020-04-29 05:34:31 -05:00
|
|
|
)
|
|
|
|
|
2021-11-24 04:45:23 -06:00
|
|
|
// FederationInternalAPI is an implementation of api.FederationInternalAPI
|
|
|
|
type FederationInternalAPI struct {
|
2020-04-29 09:29:39 -05:00
|
|
|
db storage.Database
|
2021-11-24 04:45:23 -06:00
|
|
|
cfg *config.FederationAPI
|
2020-07-22 11:01:29 -05:00
|
|
|
statistics *statistics.Statistics
|
2022-05-17 07:23:35 -05:00
|
|
|
rsAPI roomserverAPI.FederationRoomserverAPI
|
2023-04-24 11:23:25 -05:00
|
|
|
federation fclient.FederationClient
|
2020-04-29 09:29:39 -05:00
|
|
|
keyRing *gomatrixserverlib.KeyRing
|
2020-06-01 12:34:08 -05:00
|
|
|
queues *queue.OutgoingQueues
|
2020-09-22 05:05:45 -05:00
|
|
|
joins sync.Map // joins currently in progress
|
2020-04-29 09:29:39 -05:00
|
|
|
}
|
|
|
|
|
2021-11-24 04:45:23 -06:00
|
|
|
func NewFederationInternalAPI(
|
|
|
|
db storage.Database, cfg *config.FederationAPI,
|
2022-05-17 07:23:35 -05:00
|
|
|
rsAPI roomserverAPI.FederationRoomserverAPI,
|
2023-04-24 11:23:25 -05:00
|
|
|
federation fclient.FederationClient,
|
2020-07-22 11:01:29 -05:00
|
|
|
statistics *statistics.Statistics,
|
2021-11-24 04:45:23 -06:00
|
|
|
caches *caching.Caches,
|
2020-06-01 12:34:08 -05:00
|
|
|
queues *queue.OutgoingQueues,
|
2021-12-13 07:24:49 -06:00
|
|
|
keyRing *gomatrixserverlib.KeyRing,
|
2021-11-24 04:45:23 -06:00
|
|
|
) *FederationInternalAPI {
|
|
|
|
serverKeyDB, err := cache.NewKeyDatabase(db, caches)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).Panicf("failed to set up caching wrapper for server key database")
|
|
|
|
}
|
|
|
|
|
2021-12-13 07:24:49 -06:00
|
|
|
if keyRing == nil {
|
|
|
|
keyRing = &gomatrixserverlib.KeyRing{
|
|
|
|
KeyFetchers: []gomatrixserverlib.KeyFetcher{},
|
|
|
|
KeyDatabase: serverKeyDB,
|
|
|
|
}
|
2021-11-24 04:45:23 -06:00
|
|
|
|
2021-12-13 07:24:49 -06:00
|
|
|
addDirectFetcher := func() {
|
|
|
|
keyRing.KeyFetchers = append(
|
|
|
|
keyRing.KeyFetchers,
|
|
|
|
&gomatrixserverlib.DirectKeyFetcher{
|
|
|
|
Client: federation,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
2021-11-24 04:45:23 -06:00
|
|
|
|
2021-12-13 07:24:49 -06:00
|
|
|
if cfg.PreferDirectFetch {
|
|
|
|
addDirectFetcher()
|
|
|
|
} else {
|
|
|
|
defer addDirectFetcher()
|
2021-11-24 04:45:23 -06:00
|
|
|
}
|
|
|
|
|
2021-12-13 07:24:49 -06:00
|
|
|
var b64e = base64.StdEncoding.WithPadding(base64.NoPadding)
|
|
|
|
for _, ps := range cfg.KeyPerspectives {
|
|
|
|
perspective := &gomatrixserverlib.PerspectiveKeyFetcher{
|
|
|
|
PerspectiveServerName: ps.ServerName,
|
|
|
|
PerspectiveServerKeys: map[gomatrixserverlib.KeyID]ed25519.PublicKey{},
|
|
|
|
Client: federation,
|
2021-11-24 04:45:23 -06:00
|
|
|
}
|
|
|
|
|
2021-12-13 07:24:49 -06:00
|
|
|
for _, key := range ps.Keys {
|
|
|
|
rawkey, err := b64e.DecodeString(key.PublicKey)
|
|
|
|
if err != nil {
|
|
|
|
logrus.WithError(err).WithFields(logrus.Fields{
|
|
|
|
"server_name": ps.ServerName,
|
|
|
|
"public_key": key.PublicKey,
|
|
|
|
}).Warn("Couldn't parse perspective key")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
perspective.PerspectiveServerKeys[key.KeyID] = rawkey
|
|
|
|
}
|
2021-11-24 04:45:23 -06:00
|
|
|
|
2021-12-13 07:24:49 -06:00
|
|
|
keyRing.KeyFetchers = append(keyRing.KeyFetchers, perspective)
|
|
|
|
|
|
|
|
logrus.WithFields(logrus.Fields{
|
|
|
|
"server_name": ps.ServerName,
|
|
|
|
"num_public_keys": len(ps.Keys),
|
|
|
|
}).Info("Enabled perspective key fetcher")
|
|
|
|
}
|
2021-11-24 04:45:23 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
return &FederationInternalAPI{
|
2020-04-29 09:29:39 -05:00
|
|
|
db: db,
|
|
|
|
cfg: cfg,
|
2020-06-10 10:54:43 -05:00
|
|
|
rsAPI: rsAPI,
|
2020-04-29 09:29:39 -05:00
|
|
|
keyRing: keyRing,
|
2021-11-24 04:45:23 -06:00
|
|
|
federation: federation,
|
Improve federation sender performance, implement backoff and blacklisting, fix up invites a bit (#1007)
* Improve federation sender performance and behaviour, add backoff
* Tweaks
* Tweaks
* Tweaks
* Take copies of events before passing to destination queues
* Don't accidentally drop queued messages
* Don't take copies again
* Tidy up a bit
* Break out statistics (tracked component-wide), report success and failures from Perform actions
* Fix comment, use atomic add
* Improve logic a bit, don't block on wakeup, move idle check
* Don't retry sucessful invites, don't dispatch sendEvent, sendInvite etc
* Dedupe destinations, fix other bug hopefully
* Dispatch sends again
* Federation sender to ignore invites that are destined locally
* Loopback invite events
* Remodel a bit with channels
* Linter
* Only loopback invite event if we know the room
* We should tell other resident servers about the invite if we know about the room
* Correct invite signing
* Fix invite loopback
* Check HTTP response codes, push new invites to front of queue
* Review comments
2020-05-07 06:42:06 -05:00
|
|
|
statistics: statistics,
|
2020-06-01 12:34:08 -05:00
|
|
|
queues: queues,
|
2020-04-29 09:29:39 -05:00
|
|
|
}
|
2020-04-29 05:34:31 -05:00
|
|
|
}
|
2020-08-20 11:03:07 -05:00
|
|
|
|
2023-04-19 09:50:33 -05:00
|
|
|
func (a *FederationInternalAPI) isBlacklistedOrBackingOff(s spec.ServerName) (*statistics.ServerStatistics, error) {
|
2020-08-20 11:03:07 -05:00
|
|
|
stats := a.statistics.ForServer(s)
|
2023-01-23 11:55:12 -06:00
|
|
|
if stats.Blacklisted() {
|
2020-08-20 11:03:07 -05:00
|
|
|
return stats, &api.FederationClientError{
|
|
|
|
Blacklisted: true,
|
|
|
|
}
|
|
|
|
}
|
2023-01-23 11:55:12 -06:00
|
|
|
|
2020-08-20 11:03:07 -05:00
|
|
|
now := time.Now()
|
2023-01-23 11:55:12 -06:00
|
|
|
until := stats.BackoffInfo()
|
2020-08-20 11:03:07 -05:00
|
|
|
if until != nil && now.Before(*until) {
|
|
|
|
return stats, &api.FederationClientError{
|
|
|
|
RetryAfter: time.Until(*until),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return stats, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func failBlacklistableError(err error, stats *statistics.ServerStatistics) (until time.Time, blacklisted bool) {
|
|
|
|
if err == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
mxerr, ok := err.(gomatrix.HTTPError)
|
|
|
|
if !ok {
|
|
|
|
return stats.Failure()
|
|
|
|
}
|
2020-09-08 07:41:08 -05:00
|
|
|
if mxerr.Code == 401 { // invalid signature in X-Matrix header
|
|
|
|
return stats.Failure()
|
|
|
|
}
|
|
|
|
if mxerr.Code >= 500 && mxerr.Code < 600 { // internal server errors
|
2020-08-20 11:03:07 -05:00
|
|
|
return stats.Failure()
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-01-27 08:29:14 -06:00
|
|
|
func (a *FederationInternalAPI) doRequestIfNotBackingOffOrBlacklisted(
|
2023-04-19 09:50:33 -05:00
|
|
|
s spec.ServerName, request func() (interface{}, error),
|
2020-08-20 11:03:07 -05:00
|
|
|
) (interface{}, error) {
|
|
|
|
stats, err := a.isBlacklistedOrBackingOff(s)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
res, err := request()
|
|
|
|
if err != nil {
|
|
|
|
until, blacklisted := failBlacklistableError(err, stats)
|
|
|
|
now := time.Now()
|
|
|
|
var retryAfter time.Duration
|
|
|
|
if until.After(now) {
|
|
|
|
retryAfter = time.Until(until)
|
|
|
|
}
|
|
|
|
return res, &api.FederationClientError{
|
|
|
|
Err: err.Error(),
|
|
|
|
Blacklisted: blacklisted,
|
|
|
|
RetryAfter: retryAfter,
|
|
|
|
}
|
|
|
|
}
|
2023-01-23 11:55:12 -06:00
|
|
|
stats.Success(statistics.SendDirect)
|
2020-08-20 11:03:07 -05:00
|
|
|
return res, nil
|
|
|
|
}
|
|
|
|
|
2022-01-27 08:29:14 -06:00
|
|
|
func (a *FederationInternalAPI) doRequestIfNotBlacklisted(
|
2023-04-19 09:50:33 -05:00
|
|
|
s spec.ServerName, request func() (interface{}, error),
|
2022-01-27 08:29:14 -06:00
|
|
|
) (interface{}, error) {
|
|
|
|
stats := a.statistics.ForServer(s)
|
2023-01-23 11:55:12 -06:00
|
|
|
if blacklisted := stats.Blacklisted(); blacklisted {
|
2022-01-27 08:29:14 -06:00
|
|
|
return stats, &api.FederationClientError{
|
|
|
|
Err: fmt.Sprintf("server %q is blacklisted", s),
|
|
|
|
Blacklisted: true,
|
|
|
|
}
|
2021-01-19 11:14:25 -06:00
|
|
|
}
|
2022-01-27 08:29:14 -06:00
|
|
|
return request()
|
2021-01-19 11:14:25 -06:00
|
|
|
}
|
2023-07-05 03:57:41 -05:00
|
|
|
|
|
|
|
func (a *FederationInternalAPI) CurrentMembership(ctx context.Context, roomID spec.RoomID, senderID spec.SenderID) (string, error) {
|
|
|
|
return a.rsAPI.CurrentMembership(ctx, roomID, senderID)
|
|
|
|
}
|