Redacted event retention, implement MSC2815

This commit is contained in:
dasha_uwu
2026-01-21 00:01:32 +05:00
committed by Jason Volk
parent 8000fcce9e
commit bb26b749ae
12 changed files with 244 additions and 9 deletions

View File

@@ -342,6 +342,7 @@ features = [
"ring-compat", "ring-compat",
"unstable-msc2448", "unstable-msc2448",
"unstable-msc2666", "unstable-msc2666",
"unstable-msc2815",
"unstable-msc2867", "unstable-msc2867",
"unstable-msc2870", "unstable-msc2870",
"unstable-msc3026", "unstable-msc3026",

View File

@@ -1023,3 +1023,19 @@ pub(super) async fn resync_database(&self) -> Result {
.update() .update()
.map_err(|e| err!("Failed to update from primary: {e:?}")) .map_err(|e| err!("Failed to update from primary: {e:?}"))
} }
#[admin_command]
pub(super) async fn get_retained_pdu(&self, event_id: OwnedEventId) -> Result {
let pdu = self
.services
.retention
.get_original_pdu_json(&event_id)
.await?;
let text = serde_json::to_string_pretty(&pdu)?;
self.write_str(&format!("Original PDU:\n```json\n{text}```"))
.await?;
Ok(())
}

View File

@@ -250,6 +250,11 @@ pub(super) enum DebugCommand {
/// - Synchronize database with primary (secondary only) /// - Synchronize database with primary (secondary only)
ResyncDatabase, ResyncDatabase,
/// - Retrieves the saved original PDU before it has been redacted
GetRetainedPdu {
event_id: OwnedEventId,
},
/// - Developer test stubs /// - Developer test stubs
#[command(subcommand)] #[command(subcommand)]
#[clap(hide(true))] #[clap(hide(true))]

View File

@@ -1,7 +1,11 @@
use axum::extract::State; use axum::extract::State;
use futures::{FutureExt, TryFutureExt, future::try_join}; use futures::{TryFutureExt, future::join3, pin_mut};
use ruma::api::client::room::get_room_event; use ruma::api::client::room::get_room_event;
use tuwunel_core::{Err, Event, Result, err}; use tuwunel_core::{
Err, Event, Pdu, Result, err,
result::IsErrOr,
utils::{BoolExt, FutureBoolExt, TryFutureExtExt, future::OptionFutureExt},
};
use crate::{Ruma, client::is_ignored_pdu}; use crate::{Ruma, client::is_ignored_pdu};
@@ -9,9 +13,10 @@ use crate::{Ruma, client::is_ignored_pdu};
/// ///
/// Gets a single event. /// Gets a single event.
pub(crate) async fn get_room_event_route( pub(crate) async fn get_room_event_route(
State(ref services): State<crate::State>, State(services): State<crate::State>,
ref body: Ruma<get_room_event::v3::Request>, body: Ruma<get_room_event::v3::Request>,
) -> Result<get_room_event::v3::Response> { ) -> Result<get_room_event::v3::Response> {
let sender_user = body.sender_user();
let event_id = &body.event_id; let event_id = &body.event_id;
let room_id = &body.room_id; let room_id = &body.room_id;
@@ -20,14 +25,51 @@ pub(crate) async fn get_room_event_route(
.get_pdu(event_id) .get_pdu(event_id)
.map_err(|_| err!(Request(NotFound("Event {} not found.", event_id)))); .map_err(|_| err!(Request(NotFound("Event {} not found.", event_id))));
let retained_event = body
.include_unredacted_content
.then_async(async || {
let is_admin = services
.config
.allow_room_admins_to_request_unredacted_events
.then_async(|| services.admin.user_is_admin(sender_user))
.unwrap_or(false);
let can_redact = services
.state_accessor
.get_power_levels(room_id)
.map_ok_or(false, |power_levels| {
power_levels.for_user(sender_user) >= power_levels.redact
});
pin_mut!(is_admin, can_redact);
if is_admin.or(can_redact).await {
services
.retention
.get_original_pdu(event_id)
.await
.map_err(|_| err!(Request(NotFound("Event {} not found.", event_id))))
} else {
Err!(Request(Forbidden("You are not allowed to see the original event")))
}
});
let visible = services let visible = services
.state_accessor .state_accessor
.user_can_see_event(body.sender_user(), room_id, event_id) .user_can_see_event(sender_user, room_id, event_id);
.map(Ok);
let (mut event, visible) = try_join(event, visible).await?; let (mut event, retained_event, visible): (Result<Pdu>, Option<Result<Pdu>>, _) =
join3(event, retained_event, visible).await;
if !visible || is_ignored_pdu(services, &event, body.sender_user()).await { if event.as_ref().is_err_or(Event::is_redacted)
&& let Some(retained_event) = retained_event
{
event = retained_event;
}
let mut event = event?;
if !visible || is_ignored_pdu(&services, &event, body.sender_user()).await {
return Err!(Request(Forbidden("You don't have permission to view this event."))); return Err!(Request(Forbidden("You don't have permission to view this event.")));
} }

View File

@@ -57,6 +57,7 @@ pub(crate) async fn get_supported_versions_route(
("us.cloke.msc4175".to_owned(), true), /* Profile field for user time zone (https://github.com/matrix-org/matrix-spec-proposals/pull/4175) */ ("us.cloke.msc4175".to_owned(), true), /* Profile field for user time zone (https://github.com/matrix-org/matrix-spec-proposals/pull/4175) */
("org.matrix.msc4180".to_owned(), true), /* stable flag for 3916 (https://github.com/matrix-org/matrix-spec-proposals/pull/4180) */ ("org.matrix.msc4180".to_owned(), true), /* stable flag for 3916 (https://github.com/matrix-org/matrix-spec-proposals/pull/4180) */
("org.matrix.simplified_msc3575".to_owned(), true), /* Simplified Sliding sync (https://github.com/matrix-org/matrix-spec-proposals/pull/4186) */ ("org.matrix.simplified_msc3575".to_owned(), true), /* Simplified Sliding sync (https://github.com/matrix-org/matrix-spec-proposals/pull/4186) */
("fi.mau.msc2815".to_owned(), true), /* Allow room moderators to view redacted event content (https://github.com/matrix-org/matrix-spec-proposals/pull/2815) */
]), ]),
}; };

View File

@@ -1990,6 +1990,32 @@ pub struct Config {
#[serde(default = "true_fn")] #[serde(default = "true_fn")]
pub admin_room_notices: bool, pub admin_room_notices: bool,
/// Save original events before applying redaction to them.
///
/// They can be retrieved with `admin debug get-retained-pdu` or MSC2815.
///
/// default: true
#[serde(default)]
pub save_unredacted_events: bool,
/// Redaction retention period in seconds.
///
/// By default the unredacted events are stored forever.
///
/// default: disabled
#[serde(default)]
pub redaction_retention_seconds: u64,
/// Allows users with `redact` power level to request unredacted events with
/// MSC2815.
///
/// Server admins can request unredacted events regardless of the value of
/// this option.
///
/// default: true
#[serde(default = "true_fn")]
pub allow_room_admins_to_request_unredacted_events: bool,
/// Enable database pool affinity support. On supporting systems, block /// Enable database pool affinity support. On supporting systems, block
/// device queue topologies are detected and the request pool is optimized /// device queue topologies are detected and the request pool is optimized
/// for the hardware; db_pool_workers is determined automatically. /// for the hardware; db_pool_workers is determined automatically.

View File

@@ -63,6 +63,14 @@ pub(super) static MAPS: &[Descriptor] = &[
name: "disabledroomids", name: "disabledroomids",
..descriptor::RANDOM_SMALL ..descriptor::RANDOM_SMALL
}, },
Descriptor {
name: "eventid_originalpdu",
key_size_hint: Some(48),
val_size_hint: Some(1520),
block_size: 2048,
index_size: 512,
..descriptor::RANDOM
},
Descriptor { Descriptor {
name: "eventid_outlierpdu", name: "eventid_outlierpdu",
cache_disp: CacheDisp::SharedWith("pduid_pdu"), cache_disp: CacheDisp::SharedWith("pduid_pdu"),
@@ -343,6 +351,11 @@ pub(super) static MAPS: &[Descriptor] = &[
name: "threadid_userids", name: "threadid_userids",
..descriptor::SEQUENTIAL_SMALL ..descriptor::SEQUENTIAL_SMALL
}, },
Descriptor {
name: "timeredacted_eventid",
key_size_hint: Some(57),
..descriptor::SEQUENTIAL_SMALL
},
Descriptor { Descriptor {
name: "todeviceid_events", name: "todeviceid_events",
..descriptor::RANDOM ..descriptor::RANDOM

View File

@@ -7,6 +7,7 @@ pub mod lazy_loading;
pub mod metadata; pub mod metadata;
pub mod pdu_metadata; pub mod pdu_metadata;
pub mod read_receipt; pub mod read_receipt;
pub mod retention;
pub mod search; pub mod search;
pub mod short; pub mod short;
pub mod spaces; pub mod spaces;

View File

@@ -0,0 +1,101 @@
use std::{
sync::Arc,
time::{Duration, SystemTime, UNIX_EPOCH},
};
use async_trait::async_trait;
use ruma::{CanonicalJsonObject, EventId};
use tuwunel_core::{
Result, debug_info, expected, implement, matrix::pdu::PduEvent, utils::TryReadyExt,
};
use tuwunel_database::{Deserialized, Json, Map};
pub struct Service {
services: Arc<crate::services::OnceServices>,
eventid_originalpdu: Arc<Map>,
timeredacted_eventid: Arc<Map>,
}
#[async_trait]
impl crate::Service for Service {
fn build(args: &crate::Args<'_>) -> Result<Arc<Self>> {
Ok(Arc::new(Self {
services: args.services.clone(),
eventid_originalpdu: args.db["eventid_originalpdu"].clone(),
timeredacted_eventid: args.db["timeredacted_eventid"].clone(),
}))
}
async fn worker(self: Arc<Self>) -> Result {
loop {
let retention_seconds = self.services.config.redaction_retention_seconds;
if retention_seconds != 0 {
debug_info!("Cleaning up retained events");
let now = SystemTime::now()
.duration_since(UNIX_EPOCH)
.unwrap()
.as_secs();
let count = self
.timeredacted_eventid
.keys::<(u64, &EventId)>()
.ready_try_take_while(|(time_redacted, _)| {
let time_redacted = *time_redacted;
Ok(expected!(time_redacted + retention_seconds) < now)
})
.ready_try_fold_default(|count: usize, (time_redacted, event_id)| {
self.eventid_originalpdu.remove(event_id);
self.timeredacted_eventid
.del((time_redacted, event_id));
Ok(count.saturating_add(1))
})
.await?;
debug_info!(?count, "Finished cleaning up retained events");
}
tokio::select! {
() = tokio::time::sleep(Duration::from_secs(60 * 60)) => {},
() = self.services.server.until_shutdown() => return Ok(())
};
}
}
fn name(&self) -> &str { crate::service::make_name(std::module_path!()) }
}
#[implement(Service)]
pub async fn get_original_pdu(&self, event_id: &EventId) -> Result<PduEvent> {
self.eventid_originalpdu
.get(event_id)
.await?
.deserialized()
}
#[implement(Service)]
pub async fn get_original_pdu_json(&self, event_id: &EventId) -> Result<CanonicalJsonObject> {
self.eventid_originalpdu
.get(event_id)
.await?
.deserialized()
}
#[implement(Service)]
pub fn save_original_pdu(&self, event_id: &EventId, pdu: &CanonicalJsonObject) {
if !self.services.config.save_unredacted_events {
return;
}
let now = SystemTime::now()
.duration_since(UNIX_EPOCH)
.unwrap()
.as_secs();
self.eventid_originalpdu
.raw_put(event_id, Json(pdu));
self.timeredacted_eventid
.put_raw((now, event_id), []);
}

View File

@@ -28,6 +28,10 @@ pub async fn redact_pdu<Pdu: Event + Send + Sync>(
err!(Database(error!(?pdu_id, ?event_id, ?e, "PDU ID points to invalid PDU."))) err!(Database(error!(?pdu_id, ?event_id, ?e, "PDU ID points to invalid PDU.")))
})?; })?;
self.services
.retention
.save_original_pdu(event_id, &pdu);
let body = pdu["content"] let body = pdu["content"]
.as_object() .as_object()
.unwrap() .unwrap()

View File

@@ -12,7 +12,9 @@ use crate::{
account_data, admin, appservice, client, config, deactivate, emergency, federation, globals, account_data, admin, appservice, client, config, deactivate, emergency, federation, globals,
key_backups, key_backups,
manager::Manager, manager::Manager,
media, membership, oauth, presence, pusher, resolver, rooms, sending, server_keys, media, membership, oauth, presence, pusher, resolver,
rooms::{self, retention},
sending, server_keys,
service::{Args, Service}, service::{Args, Service},
sync, transaction_ids, uiaa, users, sync, transaction_ids, uiaa, users,
}; };
@@ -59,6 +61,7 @@ pub struct Services {
pub membership: Arc<membership::Service>, pub membership: Arc<membership::Service>,
pub deactivate: Arc<deactivate::Service>, pub deactivate: Arc<deactivate::Service>,
pub oauth: Arc<oauth::Service>, pub oauth: Arc<oauth::Service>,
pub retention: Arc<retention::Service>,
manager: Mutex<Option<Arc<Manager>>>, manager: Mutex<Option<Arc<Manager>>>,
pub server: Arc<Server>, pub server: Arc<Server>,
@@ -117,6 +120,7 @@ pub async fn build(server: Arc<Server>) -> Result<Arc<Self>> {
membership: membership::Service::build(&args)?, membership: membership::Service::build(&args)?,
deactivate: deactivate::Service::build(&args)?, deactivate: deactivate::Service::build(&args)?,
oauth: oauth::Service::build(&args)?, oauth: oauth::Service::build(&args)?,
retention: retention::Service::build(&args)?,
manager: Mutex::new(None), manager: Mutex::new(None),
server, server,
@@ -176,6 +180,7 @@ pub(crate) fn services(&self) -> impl Iterator<Item = Arc<dyn Service>> + Send {
cast!(self.membership), cast!(self.membership),
cast!(self.deactivate), cast!(self.deactivate),
cast!(self.oauth), cast!(self.oauth),
cast!(self.retention),
] ]
.into_iter() .into_iter()
} }

View File

@@ -1713,6 +1713,26 @@
# #
#admin_room_notices = true #admin_room_notices = true
# Save original events before applying redaction to them.
#
# They can be retrieved with `admin debug get-retained-pdu` or MSC2815.
#
#save_unredacted_events = true
# Redaction retention period in seconds.
#
# By default the unredacted events are stored forever.
#
#redaction_retention_seconds = disabled
# Allows users with `redact` power level to request unredacted events with
# MSC2815.
#
# Server admins can request unredacted events regardless of the value of
# this option.
#
#allow_room_admins_to_request_unredacted_events = true
# Enable database pool affinity support. On supporting systems, block # Enable database pool affinity support. On supporting systems, block
# device queue topologies are detected and the request pool is optimized # device queue topologies are detected and the request pool is optimized
# for the hardware; db_pool_workers is determined automatically. # for the hardware; db_pool_workers is determined automatically.