use crate::{database::DatabaseGuard, Database, Error, Result, Ruma, RumaResponse}; use ruma::{ api::client::{ filter::{IncomingFilterDefinition, LazyLoadOptions}, sync::sync_events, uiaa::UiaaResponse, }, events::{ room::member::{MembershipState, RoomMemberEventContent}, EventType, }, serde::Raw, DeviceId, RoomId, UserId, }; use std::{ collections::{hash_map::Entry, BTreeMap, HashMap, HashSet}, sync::Arc, time::Duration, }; use tokio::sync::watch::Sender; use tracing::error; /// # `GET /_matrix/client/r0/sync` /// /// Synchronize the client's state with the latest state on the server. /// /// - This endpoint takes a `since` parameter which should be the `next_batch` value from a /// previous request for incremental syncs. /// /// Calling this endpoint without a `since` parameter returns: /// - Some of the most recent events of each timeline /// - Notification counts for each room /// - Joined and invited member counts, heroes /// - All state events /// /// Calling this endpoint with a `since` parameter from a previous `next_batch` returns: /// For joined rooms: /// - Some of the most recent events of each timeline that happened after since /// - If user joined the room after since: All state events (unless lazy loading is activated) and /// all device list updates in that room /// - If the user was already in the room: A list of all events that are in the state now, but were /// not in the state at `since` /// - If the state we send contains a member event: Joined and invited member counts, heroes /// - Device list updates that happened after `since` /// - If there are events in the timeline we send or the user send updated his read mark: Notification counts /// - EDUs that are active now (read receipts, typing updates, presence) /// - TODO: Allow multiple sync streams to support Pantalaimon /// /// For invited rooms: /// - If the user was invited after `since`: A subset of the state of the room at the point of the invite /// /// For left rooms: /// - If the user left after `since`: prev_batch token, empty state (TODO: subset of the state at the point of the leave) /// /// - Sync is handled in an async task, multiple requests from the same device with the same /// `since` will be cached pub async fn sync_events_route( db: DatabaseGuard, body: Ruma>, ) -> Result> { let sender_user = body.sender_user.expect("user is authenticated"); let sender_device = body.sender_device.expect("user is authenticated"); let body = body.body; let arc_db = Arc::new(db); let mut rx = match arc_db .globals .sync_receivers .write() .unwrap() .entry((sender_user.clone(), sender_device.clone())) { Entry::Vacant(v) => { let (tx, rx) = tokio::sync::watch::channel(None); v.insert((body.since.clone(), rx.clone())); tokio::spawn(sync_helper_wrapper( Arc::clone(&arc_db), sender_user.clone(), sender_device.clone(), body, tx, )); rx } Entry::Occupied(mut o) => { if o.get().0 != body.since { let (tx, rx) = tokio::sync::watch::channel(None); o.insert((body.since.clone(), rx.clone())); tokio::spawn(sync_helper_wrapper( Arc::clone(&arc_db), sender_user.clone(), sender_device.clone(), body, tx, )); rx } else { o.get().1.clone() } } }; let we_have_to_wait = rx.borrow().is_none(); if we_have_to_wait { if let Err(e) = rx.changed().await { error!("Error waiting for sync: {}", e); } } let result = match rx .borrow() .as_ref() .expect("When sync channel changes it's always set to some") { Ok(response) => Ok(response.clone()), Err(error) => Err(error.to_response()), }; result } async fn sync_helper_wrapper( db: Arc, sender_user: Box, sender_device: Box, body: sync_events::v3::IncomingRequest, tx: Sender>>, ) { let since = body.since.clone(); let r = sync_helper( Arc::clone(&db), sender_user.clone(), sender_device.clone(), body, ) .await; if let Ok((_, caching_allowed)) = r { if !caching_allowed { match db .globals .sync_receivers .write() .unwrap() .entry((sender_user, sender_device)) { Entry::Occupied(o) => { // Only remove if the device didn't start a different /sync already if o.get().0 == since { o.remove(); } } Entry::Vacant(_) => {} } } } drop(db); let _ = tx.send(Some(r.map(|(r, _)| r))); } async fn sync_helper( db: Arc, sender_user: Box, sender_device: Box, body: sync_events::v3::IncomingRequest, // bool = caching allowed ) -> Result<(sync_events::v3::Response, bool), Error> { use sync_events::v3::{ DeviceLists, Ephemeral, GlobalAccountData, IncomingFilter, InviteState, InvitedRoom, JoinedRoom, LeftRoom, Presence, RoomAccountData, RoomSummary, Rooms, State, Timeline, ToDevice, UnreadNotificationsCount, }; // TODO: match body.set_presence { db.rooms.edus.ping_presence(&sender_user)?; // Setup watchers, so if there's no response, we can wait for them let watcher = db.watch(&sender_user, &sender_device); let next_batch = db.globals.current_count()?; let next_batch_string = next_batch.to_string(); // Load filter let filter = match body.filter { None => IncomingFilterDefinition::default(), Some(IncomingFilter::FilterDefinition(filter)) => filter, Some(IncomingFilter::FilterId(filter_id)) => db .users .get_filter(&sender_user, &filter_id)? .unwrap_or_default(), }; let (lazy_load_enabled, lazy_load_send_redundant) = match filter.room.state.lazy_load_options { LazyLoadOptions::Enabled { include_redundant_members: redundant, } => (true, redundant), _ => (false, false), }; let mut joined_rooms = BTreeMap::new(); let since = body .since .clone() .and_then(|string| string.parse().ok()) .unwrap_or(0); let mut presence_updates = HashMap::new(); let mut left_encrypted_users = HashSet::new(); // Users that have left any encrypted rooms the sender was in let mut device_list_updates = HashSet::new(); let mut device_list_left = HashSet::new(); // Look for device list updates of this account device_list_updates.extend( db.users .keys_changed(&sender_user.to_string(), since, None) .filter_map(|r| r.ok()), ); let all_joined_rooms = db.rooms.rooms_joined(&sender_user).collect::>(); for room_id in all_joined_rooms { let room_id = room_id?; // Get and drop the lock to wait for remaining operations to finish // This will make sure the we have all events until next_batch let mutex_insert = Arc::clone( db.globals .roomid_mutex_insert .write() .unwrap() .entry(room_id.clone()) .or_default(), ); let insert_lock = mutex_insert.lock().unwrap(); drop(insert_lock); let timeline_pdus; let limited; if db.rooms.last_timeline_count(&sender_user, &room_id)? > since { let mut non_timeline_pdus = db .rooms .pdus_until(&sender_user, &room_id, u64::MAX)? .filter_map(|r| { // Filter out buggy events if r.is_err() { error!("Bad pdu in pdus_since: {:?}", r); } r.ok() }) .take_while(|(pduid, _)| { db.rooms .pdu_count(pduid) .map_or(false, |count| count > since) }); // Take the last 10 events for the timeline timeline_pdus = non_timeline_pdus .by_ref() .take(10) .collect::>() .into_iter() .rev() .collect::>(); // They /sync response doesn't always return all messages, so we say the output is // limited unless there are events in non_timeline_pdus limited = non_timeline_pdus.next().is_some(); } else { timeline_pdus = Vec::new(); limited = false; } let send_notification_counts = !timeline_pdus.is_empty() || db .rooms .edus .last_privateread_update(&sender_user, &room_id)? > since; let mut timeline_users = HashSet::new(); for (_, event) in &timeline_pdus { timeline_users.insert(event.sender.as_str().to_owned()); } db.rooms .lazy_load_confirm_delivery(&sender_user, &sender_device, &room_id, since)?; // Database queries: let current_shortstatehash = db .rooms .current_shortstatehash(&room_id)? .expect("All rooms have state"); let since_shortstatehash = db.rooms.get_token_shortstatehash(&room_id, since)?; // Calculates joined_member_count, invited_member_count and heroes let calculate_counts = || { let joined_member_count = db.rooms.room_joined_count(&room_id)?.unwrap_or(0); let invited_member_count = db.rooms.room_invited_count(&room_id)?.unwrap_or(0); // Recalculate heroes (first 5 members) let mut heroes = Vec::new(); if joined_member_count + invited_member_count <= 5 { // Go through all PDUs and for each member event, check if the user is still joined or // invited until we have 5 or we reach the end for hero in db .rooms .all_pdus(&sender_user, &room_id)? .filter_map(|pdu| pdu.ok()) // Ignore all broken pdus .filter(|(_, pdu)| pdu.kind == EventType::RoomMember) .map(|(_, pdu)| { let content: RoomMemberEventContent = serde_json::from_str(pdu.content.get()).map_err(|_| { Error::bad_database("Invalid member event in database.") })?; if let Some(state_key) = &pdu.state_key { let user_id = UserId::parse(state_key.clone()).map_err(|_| { Error::bad_database("Invalid UserId in member PDU.") })?; // The membership was and still is invite or join if matches!( content.membership, MembershipState::Join | MembershipState::Invite ) && (db.rooms.is_joined(&user_id, &room_id)? || db.rooms.is_invited(&user_id, &room_id)?) { Ok::<_, Error>(Some(state_key.clone())) } else { Ok(None) } } else { Ok(None) } }) // Filter out buggy users .filter_map(|u| u.ok()) // Filter for possible heroes .flatten() { if heroes.contains(&hero) || hero == sender_user.as_str() { continue; } heroes.push(hero); } } Ok::<_, Error>(( Some(joined_member_count), Some(invited_member_count), heroes, )) }; let ( heroes, joined_member_count, invited_member_count, joined_since_last_sync, state_events, ) = if since_shortstatehash.is_none() { // Probably since = 0, we will do an initial sync let (joined_member_count, invited_member_count, heroes) = calculate_counts()?; let current_state_ids = db.rooms.state_full_ids(current_shortstatehash)?; let mut state_events = Vec::new(); let mut lazy_loaded = HashSet::new(); for (shortstatekey, id) in current_state_ids { let (event_type, state_key) = db.rooms.get_statekey_from_short(shortstatekey)?; if event_type != EventType::RoomMember { let pdu = match db.rooms.get_pdu(&id)? { Some(pdu) => pdu, None => { error!("Pdu in state not found: {}", id); continue; } }; state_events.push(pdu); } else if !lazy_load_enabled || body.full_state || timeline_users.contains(&state_key) { let pdu = match db.rooms.get_pdu(&id)? { Some(pdu) => pdu, None => { error!("Pdu in state not found: {}", id); continue; } }; // This check is in case a bad user ID made it into the database if let Ok(uid) = UserId::parse(state_key.as_ref()) { lazy_loaded.insert(uid); } state_events.push(pdu); } } // Reset lazy loading because this is an initial sync db.rooms .lazy_load_reset(&sender_user, &sender_device, &room_id)?; // The state_events above should contain all timeline_users, let's mark them as lazy // loaded. db.rooms.lazy_load_mark_sent( &sender_user, &sender_device, &room_id, lazy_loaded, next_batch, ); ( heroes, joined_member_count, invited_member_count, true, state_events, ) } else if timeline_pdus.is_empty() && since_shortstatehash == Some(current_shortstatehash) { // No state changes (Vec::new(), None, None, false, Vec::new()) } else { // Incremental /sync let since_shortstatehash = since_shortstatehash.unwrap(); let since_sender_member: Option = db .rooms .state_get( since_shortstatehash, &EventType::RoomMember, sender_user.as_str(), )? .and_then(|pdu| { serde_json::from_str(pdu.content.get()) .map_err(|_| Error::bad_database("Invalid PDU in database.")) .ok() }); let joined_since_last_sync = since_sender_member .map_or(true, |member| member.membership != MembershipState::Join); let mut state_events = Vec::new(); let mut lazy_loaded = HashSet::new(); if since_shortstatehash != current_shortstatehash { let current_state_ids = db.rooms.state_full_ids(current_shortstatehash)?; let since_state_ids = db.rooms.state_full_ids(since_shortstatehash)?; for (key, id) in current_state_ids { if body.full_state || since_state_ids.get(&key) != Some(&id) { let pdu = match db.rooms.get_pdu(&id)? { Some(pdu) => pdu, None => { error!("Pdu in state not found: {}", id); continue; } }; if pdu.kind == EventType::RoomMember { match UserId::parse( pdu.state_key .as_ref() .expect("State event has state key") .clone(), ) { Ok(state_key_userid) => { lazy_loaded.insert(state_key_userid); } Err(e) => error!("Invalid state key for member event: {}", e), } } state_events.push(pdu); } } } for (_, event) in &timeline_pdus { if lazy_loaded.contains(&event.sender) { continue; } if !db.rooms.lazy_load_was_sent_before( &sender_user, &sender_device, &room_id, &event.sender, )? || lazy_load_send_redundant { if let Some(member_event) = db.rooms.room_state_get( &room_id, &EventType::RoomMember, event.sender.as_str(), )? { lazy_loaded.insert(event.sender.clone()); state_events.push(member_event); } } } db.rooms.lazy_load_mark_sent( &sender_user, &sender_device, &room_id, lazy_loaded, next_batch, ); let encrypted_room = db .rooms .state_get(current_shortstatehash, &EventType::RoomEncryption, "")? .is_some(); let since_encryption = db.rooms .state_get(since_shortstatehash, &EventType::RoomEncryption, "")?; // Calculations: let new_encrypted_room = encrypted_room && since_encryption.is_none(); let send_member_count = state_events .iter() .any(|event| event.kind == EventType::RoomMember); if encrypted_room { for state_event in &state_events { if state_event.kind != EventType::RoomMember { continue; } if let Some(state_key) = &state_event.state_key { let user_id = UserId::parse(state_key.clone()) .map_err(|_| Error::bad_database("Invalid UserId in member PDU."))?; if user_id == sender_user { continue; } let new_membership = serde_json::from_str::( state_event.content.get(), ) .map_err(|_| Error::bad_database("Invalid PDU in database."))? .membership; match new_membership { MembershipState::Join => { // A new user joined an encrypted room if !share_encrypted_room(&db, &sender_user, &user_id, &room_id)? { device_list_updates.insert(user_id); } } MembershipState::Leave => { // Write down users that have left encrypted rooms we are in left_encrypted_users.insert(user_id); } _ => {} } } } } if joined_since_last_sync && encrypted_room || new_encrypted_room { // If the user is in a new encrypted room, give them all joined users device_list_updates.extend( db.rooms .room_members(&room_id) .flatten() .filter(|user_id| { // Don't send key updates from the sender to the sender &sender_user != user_id }) .filter(|user_id| { // Only send keys if the sender doesn't share an encrypted room with the target already !share_encrypted_room(&db, &sender_user, user_id, &room_id) .unwrap_or(false) }), ); } let (joined_member_count, invited_member_count, heroes) = if send_member_count { calculate_counts()? } else { (None, None, Vec::new()) }; ( heroes, joined_member_count, invited_member_count, joined_since_last_sync, state_events, ) }; // Look for device list updates in this room device_list_updates.extend( db.users .keys_changed(&room_id.to_string(), since, None) .filter_map(|r| r.ok()), ); let notification_count = if send_notification_counts { Some( db.rooms .notification_count(&sender_user, &room_id)? .try_into() .expect("notification count can't go that high"), ) } else { None }; let highlight_count = if send_notification_counts { Some( db.rooms .highlight_count(&sender_user, &room_id)? .try_into() .expect("highlight count can't go that high"), ) } else { None }; let prev_batch = timeline_pdus .first() .map_or(Ok::<_, Error>(None), |(pdu_id, _)| { Ok(Some(db.rooms.pdu_count(pdu_id)?.to_string())) })?; let room_events: Vec<_> = timeline_pdus .iter() .map(|(_, pdu)| pdu.to_sync_room_event()) .collect(); let mut edus: Vec<_> = db .rooms .edus .readreceipts_since(&room_id, since) .filter_map(|r| r.ok()) // Filter out buggy events .map(|(_, _, v)| v) .collect(); if db.rooms.edus.last_typing_update(&room_id, &db.globals)? > since { edus.push( serde_json::from_str( &serde_json::to_string(&db.rooms.edus.typings_all(&room_id)?) .expect("event is valid, we just created it"), ) .expect("event is valid, we just created it"), ); } // Save the state after this sync so we can send the correct state diff next sync db.rooms .associate_token_shortstatehash(&room_id, next_batch, current_shortstatehash)?; let joined_room = JoinedRoom { account_data: RoomAccountData { events: db .account_data .changes_since(Some(&room_id), &sender_user, since)? .into_iter() .filter_map(|(_, v)| { serde_json::from_str(v.json().get()) .map_err(|_| Error::bad_database("Invalid account event in database.")) .ok() }) .collect(), }, summary: RoomSummary { heroes, joined_member_count: joined_member_count.map(|n| (n as u32).into()), invited_member_count: invited_member_count.map(|n| (n as u32).into()), }, unread_notifications: UnreadNotificationsCount { highlight_count, notification_count, }, timeline: Timeline { limited: limited || joined_since_last_sync, prev_batch, events: room_events, }, state: State { events: state_events .iter() .map(|pdu| pdu.to_sync_state_event()) .collect(), }, ephemeral: Ephemeral { events: edus }, }; if !joined_room.is_empty() { joined_rooms.insert(room_id.clone(), joined_room); } // Take presence updates from this room for (user_id, presence) in db.rooms .edus .presence_since(&room_id, since, &db.rooms, &db.globals)? { match presence_updates.entry(user_id) { Entry::Vacant(v) => { v.insert(presence); } Entry::Occupied(mut o) => { let p = o.get_mut(); // Update existing presence event with more info p.content.presence = presence.content.presence; if let Some(status_msg) = presence.content.status_msg { p.content.status_msg = Some(status_msg); } if let Some(last_active_ago) = presence.content.last_active_ago { p.content.last_active_ago = Some(last_active_ago); } if let Some(displayname) = presence.content.displayname { p.content.displayname = Some(displayname); } if let Some(avatar_url) = presence.content.avatar_url { p.content.avatar_url = Some(avatar_url); } if let Some(currently_active) = presence.content.currently_active { p.content.currently_active = Some(currently_active); } } } } } let mut left_rooms = BTreeMap::new(); let all_left_rooms: Vec<_> = db.rooms.rooms_left(&sender_user).collect(); for result in all_left_rooms { let (room_id, left_state_events) = result?; // Get and drop the lock to wait for remaining operations to finish let mutex_insert = Arc::clone( db.globals .roomid_mutex_insert .write() .unwrap() .entry(room_id.clone()) .or_default(), ); let insert_lock = mutex_insert.lock().unwrap(); drop(insert_lock); let left_count = db.rooms.get_left_count(&room_id, &sender_user)?; // Left before last sync if Some(since) >= left_count { continue; } left_rooms.insert( room_id.clone(), LeftRoom { account_data: RoomAccountData { events: Vec::new() }, timeline: Timeline { limited: false, prev_batch: Some(next_batch_string.clone()), events: Vec::new(), }, state: State { events: left_state_events, }, }, ); } let mut invited_rooms = BTreeMap::new(); let all_invited_rooms: Vec<_> = db.rooms.rooms_invited(&sender_user).collect(); for result in all_invited_rooms { let (room_id, invite_state_events) = result?; // Get and drop the lock to wait for remaining operations to finish let mutex_insert = Arc::clone( db.globals .roomid_mutex_insert .write() .unwrap() .entry(room_id.clone()) .or_default(), ); let insert_lock = mutex_insert.lock().unwrap(); drop(insert_lock); let invite_count = db.rooms.get_invite_count(&room_id, &sender_user)?; // Invited before last sync if Some(since) >= invite_count { continue; } invited_rooms.insert( room_id.clone(), InvitedRoom { invite_state: InviteState { events: invite_state_events, }, }, ); } for user_id in left_encrypted_users { let still_share_encrypted_room = db .rooms .get_shared_rooms(vec![sender_user.clone(), user_id.clone()])? .filter_map(|r| r.ok()) .filter_map(|other_room_id| { Some( db.rooms .room_state_get(&other_room_id, &EventType::RoomEncryption, "") .ok()? .is_some(), ) }) .all(|encrypted| !encrypted); // If the user doesn't share an encrypted room with the target anymore, we need to tell // them if still_share_encrypted_room { device_list_left.insert(user_id); } } // Remove all to-device events the device received *last time* db.users .remove_to_device_events(&sender_user, &sender_device, since)?; let response = sync_events::v3::Response { next_batch: next_batch_string, rooms: Rooms { leave: left_rooms, join: joined_rooms, invite: invited_rooms, knock: BTreeMap::new(), // TODO }, presence: Presence { events: presence_updates .into_iter() .map(|(_, v)| Raw::new(&v).expect("PresenceEvent always serializes successfully")) .collect(), }, account_data: GlobalAccountData { events: db .account_data .changes_since(None, &sender_user, since)? .into_iter() .filter_map(|(_, v)| { serde_json::from_str(v.json().get()) .map_err(|_| Error::bad_database("Invalid account event in database.")) .ok() }) .collect(), }, device_lists: DeviceLists { changed: device_list_updates.into_iter().collect(), left: device_list_left.into_iter().collect(), }, device_one_time_keys_count: db.users.count_one_time_keys(&sender_user, &sender_device)?, to_device: ToDevice { events: db .users .get_to_device_events(&sender_user, &sender_device)?, }, // Fallback keys are not yet supported device_unused_fallback_key_types: None, }; // TODO: Retry the endpoint instead of returning (waiting for #118) if !body.full_state && response.rooms.is_empty() && response.presence.is_empty() && response.account_data.is_empty() && response.device_lists.is_empty() && response.to_device.is_empty() { // Hang a few seconds so requests are not spammed // Stop hanging if new info arrives let mut duration = body.timeout.unwrap_or_default(); if duration.as_secs() > 30 { duration = Duration::from_secs(30); } let _ = tokio::time::timeout(duration, watcher).await; Ok((response, false)) } else { Ok((response, since != next_batch)) // Only cache if we made progress } } #[tracing::instrument(skip(db))] fn share_encrypted_room( db: &Database, sender_user: &UserId, user_id: &UserId, ignore_room: &RoomId, ) -> Result { Ok(db .rooms .get_shared_rooms(vec![sender_user.to_owned(), user_id.to_owned()])? .filter_map(|r| r.ok()) .filter(|room_id| room_id != ignore_room) .filter_map(|other_room_id| { Some( db.rooms .room_state_get(&other_room_id, &EventType::RoomEncryption, "") .ok()? .is_some(), ) }) .any(|encrypted| encrypted)) }