-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Add a new third party callback check_event_allowed_v2
that is compatible with new batch persisting mechanisms.
#15131
Changes from 1 commit
aab5fb6
2e14bc3
5cebb37
b564f29
7b610fc
9b702df
a9b0093
2ab6cec
7fc4874
13676fb
d4ed0a4
ad32583
4809a0c
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -32,6 +32,10 @@ | |
CHECK_EVENT_ALLOWED_CALLBACK = Callable[ | ||
[EventBase, StateMap[EventBase]], Awaitable[Tuple[bool, Optional[dict]]] | ||
] | ||
CHECK_EVENT_ALLOWED_V2_CALLBACK = Callable[ | ||
[EventBase, StateMap[EventBase]], | ||
Awaitable[Tuple[bool, Optional[dict], Optional[dict]]], | ||
] | ||
ON_CREATE_ROOM_CALLBACK = Callable[[Requester, dict, bool], Awaitable] | ||
CHECK_THREEPID_CAN_BE_INVITED_CALLBACK = Callable[ | ||
[str, str, StateMap[EventBase]], Awaitable[bool] | ||
|
@@ -155,6 +159,9 @@ def __init__(self, hs: "HomeServer"): | |
self._storage_controllers = hs.get_storage_controllers() | ||
|
||
self._check_event_allowed_callbacks: List[CHECK_EVENT_ALLOWED_CALLBACK] = [] | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. (just as a note if it interests you, particularly relevant when combined with 'why not both v1 and v2?'): To illustrate (but I'd put proper variable names and type annotations on, just a tad fiddly to do from within GitHub without having it all fresh in mind): def check_event_allowed_v1_v2_adapter(v1: CHECK_EVENT_ALLOWED_CALLBACK) -> CHECK_EVENT_ALLOWED_V2_CALLBACK:
async def adapter(x, y):
a, b = await v1(x, y)
return a, b, None
return adapter |
||
self._check_event_allowed_v2_callbacks: List[ | ||
H-Shay marked this conversation as resolved.
Show resolved
Hide resolved
|
||
CHECK_EVENT_ALLOWED_V2_CALLBACK | ||
] = [] | ||
self._on_create_room_callbacks: List[ON_CREATE_ROOM_CALLBACK] = [] | ||
self._check_threepid_can_be_invited_callbacks: List[ | ||
CHECK_THREEPID_CAN_BE_INVITED_CALLBACK | ||
|
@@ -234,15 +241,16 @@ async def check_event_allowed( | |
self, | ||
event: EventBase, | ||
context: UnpersistedEventContextBase, | ||
) -> Tuple[bool, Optional[dict]]: | ||
) -> Tuple[bool, Optional[dict], Optional[dict]]: | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. bikeshed risk: should we allow the creation of multiple events so we don't wind up having to introduce a v3 for that later? :-) There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I can't tell if I am being a curmudgeon here but my instinct would be to say no, as honestly in a perfect world one would not be able to inject events here at all - but since it's already been done this is a way to gracefully work around it. I feel like adding multiple events creates needless complexity, but again, I might just be being a curmudgeon. |
||
"""Check if a provided event should be allowed in the given context. | ||
|
||
The module can return: | ||
* True: the event is allowed. | ||
* False: the event is not allowed, and should be rejected with M_FORBIDDEN. | ||
|
||
If the event is allowed, the module can also return a dictionary to use as a | ||
replacement for the event. | ||
replacement for the event, and/or return a dictionary to use as the basis for | ||
another event to be sent into the room. | ||
|
||
Args: | ||
event: The event to be checked. | ||
|
@@ -252,8 +260,11 @@ async def check_event_allowed( | |
The result from the ThirdPartyRules module, as above. | ||
""" | ||
# Bail out early without hitting the store if we don't have any callbacks to run. | ||
if len(self._check_event_allowed_callbacks) == 0: | ||
return True, None | ||
if ( | ||
len(self._check_event_allowed_callbacks) == 0 | ||
and len(self._check_event_allowed_v2_callbacks) == 0 | ||
): | ||
return True, None, None | ||
|
||
prev_state_ids = await context.get_prev_state_ids() | ||
|
||
|
@@ -266,35 +277,63 @@ async def check_event_allowed( | |
# the hashes and signatures. | ||
event.freeze() | ||
|
||
for callback in self._check_event_allowed_callbacks: | ||
try: | ||
res, replacement_data = await delay_cancellation( | ||
callback(event, state_events) | ||
) | ||
except CancelledError: | ||
raise | ||
except SynapseError as e: | ||
# FIXME: Being able to throw SynapseErrors is relied upon by | ||
# some modules. PR #10386 accidentally broke this ability. | ||
# That said, we aren't keen on exposing this implementation detail | ||
# to modules and we should one day have a proper way to do what | ||
# is wanted. | ||
# This module callback needs a rework so that hacks such as | ||
# this one are not necessary. | ||
raise e | ||
except Exception: | ||
raise ModuleFailedException( | ||
"Failed to run `check_event_allowed` module API callback" | ||
) | ||
if len(self._check_event_allowed_callbacks) != 0: | ||
for callback in self._check_event_allowed_callbacks: | ||
try: | ||
res, replacement_data = await delay_cancellation( | ||
callback(event, state_events) | ||
) | ||
except CancelledError: | ||
raise | ||
except SynapseError as e: | ||
# FIXME: Being able to throw SynapseErrors is relied upon by | ||
# some modules. PR #10386 accidentally broke this ability. | ||
# That said, we aren't keen on exposing this implementation detail | ||
# to modules and we should one day have a proper way to do what | ||
# is wanted. | ||
# This module callback needs a rework so that hacks such as | ||
# this one are not necessary. | ||
raise e | ||
except Exception: | ||
raise ModuleFailedException( | ||
"Failed to run `check_event_allowed` module API callback" | ||
) | ||
|
||
# Return if the event shouldn't be allowed or if the module came up with a | ||
# replacement dict for the event. | ||
if res is False: | ||
return res, None | ||
elif isinstance(replacement_data, dict): | ||
return True, replacement_data | ||
# Return if the event shouldn't be allowed or if the module came up with a | ||
# replacement dict for the event. | ||
if res is False: | ||
return res, None, None | ||
elif isinstance(replacement_data, dict): | ||
return True, replacement_data, None | ||
else: | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm curious as to why we don't support a mix of v1 and v2 callbacks. Pedantically this could make it hard to upgrade as you'd need to upgrade all relevant modules at once, rather than doing it bit by bit. Realistically, this may not be an issue as I don't know if anyone runs with more than one such module anyway? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The main reason is that we'd like to phase out the v1 callbacks - they are not compatible with the batching mechanism, which is why the v2 callback which is compatible with the batching mechanism was proposed. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I thought it was just the sending of additional events that was not compatible when done in v1 callbacks and with batching? I think it would be OK to support v1+v2 as a transitional period with the caveat that v1 can't send additional events. I think this would be good practice but I don't know if it's truly warranted here given the relatively low use of modules, so I'm tempted to actually just accept use of either v1 or v2 if that prevents having to think harder about this. |
||
for v2_callback in self._check_event_allowed_v2_callbacks: | ||
try: | ||
res, replacement_data, new_event = await delay_cancellation( | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Instead of introducing a v2, I wonder if we could just widen the return type to accept either doubles or triples, with doubles being interpreted the same as before and triples being interpreted the same as what you're doing for v2. I'm not sure how that sounds to you? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think since we don't want to mix v1 and v2 callbacks (ie we want to eventually deprecate the v1 callbacks) it makes sense to not do this. I also have a distaste for |
||
v2_callback(event, state_events) | ||
) | ||
except CancelledError: | ||
raise | ||
except SynapseError as e: | ||
# FIXME: Being able to throw SynapseErrors is relied upon by | ||
# some modules. PR #10386 accidentally broke this ability. | ||
# That said, we aren't keen on exposing this implementation detail | ||
# to modules and we should one day have a proper way to do what | ||
# is wanted. | ||
# This module callback needs a rework so that hacks such as | ||
# this one are not necessary. | ||
Comment on lines
+343
to
+349
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. bikeshed risk: is this a good time to address this? If it looks like more than a tiny amount of work I'm happy to leave it, but if the only reason we haven't done this was 'it's not pressing enough to introduce a breaking change' then now might be a good opportunity. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Fascinatingly you were the one to add this todo: https://github.com/matrix-org/synapse/pull/11042/files Do you remember what the discussion was at time/why it wasn't fixed then? I don't see an issue for the regression so I am a little unclear on what the original problem was. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. the vague problem is that some modules would reject events by We don't like the latter — it's not explicitly supported but makes use of the fact that There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hmm well it seems to me given the context that fixing this might be outside the purview of this particular PR? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. well OK, it's just that this needs a new version of the callback so it would have been possibly better to do the changes together for the same version |
||
raise e | ||
except Exception: | ||
raise ModuleFailedException( | ||
"Failed to run `check_event_allowed_v2` module API callback" | ||
) | ||
|
||
return True, None | ||
# Return if the event shouldn't be allowed, if the module came up with a | ||
# replacement dict for the event, or if the module wants to send a new event | ||
if res is False: | ||
return res, None, None | ||
else: | ||
return True, replacement_data, new_event | ||
return True, None, None | ||
|
||
async def on_create_room( | ||
self, requester: Requester, config: dict, is_requester_admin: bool | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is merely a suggestion, but I'd be tempted to replace this tuple with an
attrs
ordataclass
class. That buys you:Optional[dict]
s; also means we can document the individual pieces more easily IMO)At this stage it's not really critical, but if this tuple grew any larger I'd start to think it was getting a bit unwieldy.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm on the fence about this, here's my thinking: I agree that a class might be cleaner (although only slightly, my hope is that the tuple does not grow any larger!) but I wonder about the utility for module-writers. It seems easier to say "just give us a dict" rather than describing a class and expecting them to match their data to the class, but I may be wrong here. I'm open to being convinced otherwise.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
under this hypothetical situation, we would provide the dataclass and they would just instantiate it, e.g. they'd return something like