Skip to content
This repository has been archived by the owner on Apr 26, 2024. It is now read-only.

Allow capping a room's retention policy #8104

Merged
merged 11 commits into from
Aug 24, 2020
1 change: 1 addition & 0 deletions changelog.d/8104.bugfix
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Fix a bug introduced in v1.7.2 impacting message retention policies that would allow federated homeservers to dictate a retention period that's lower than the configured minimum allowed duration in the configuration file.
5 changes: 5 additions & 0 deletions docs/sample_config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -408,6 +408,11 @@ retention:
# (e.g. every 12h), but not want that purge to be performed by a job that's
# iterating over every room it knows, which could be heavy on the server.
#
# If any purge job is configured, it is strongly recommended to have at least
# a single job with neither 'shortest_max_lifetime' nor 'longest_max_lifetime'
# set, or one job without 'shortest_max_lifetime' and one job without
# 'longest_max_lifetime' set.
#
#purge_jobs:
# - shortest_max_lifetime: 1d
# longest_max_lifetime: 3d
Expand Down
5 changes: 5 additions & 0 deletions synapse/config/server.py
Original file line number Diff line number Diff line change
Expand Up @@ -979,6 +979,11 @@ def generate_config_section(
# (e.g. every 12h), but not want that purge to be performed by a job that's
# iterating over every room it knows, which could be heavy on the server.
#
# If any purge job is configured, it is strongly recommended to have at least
# a single job with neither 'shortest_max_lifetime' nor 'longest_max_lifetime'
# set, or one job without 'shortest_max_lifetime' and one job without
# 'longest_max_lifetime' set.
babolivier marked this conversation as resolved.
Show resolved Hide resolved
#
#purge_jobs:
# - shortest_max_lifetime: 1d
# longest_max_lifetime: 3d
Expand Down
59 changes: 3 additions & 56 deletions synapse/events/validator.py
Original file line number Diff line number Diff line change
Expand Up @@ -74,15 +74,14 @@ def validate_new(self, event, config):
)

if event.type == EventTypes.Retention:
self._validate_retention(event, config)
self._validate_retention(event)

def _validate_retention(self, event, config):
def _validate_retention(self, event):
"""Checks that an event that defines the retention policy for a room respects the
boundaries imposed by the server's administrator.
format enforced by the spec.

Args:
event (FrozenEvent): The event to validate.
config (Config): The homeserver's configuration.
"""
min_lifetime = event.content.get("min_lifetime")
max_lifetime = event.content.get("max_lifetime")
Expand All @@ -95,32 +94,6 @@ def _validate_retention(self, event, config):
errcode=Codes.BAD_JSON,
)

if (
config.retention_allowed_lifetime_min is not None
and min_lifetime < config.retention_allowed_lifetime_min
):
raise SynapseError(
code=400,
msg=(
"'min_lifetime' can't be lower than the minimum allowed"
" value enforced by the server's administrator"
),
errcode=Codes.BAD_JSON,
)

if (
config.retention_allowed_lifetime_max is not None
and min_lifetime > config.retention_allowed_lifetime_max
):
raise SynapseError(
code=400,
msg=(
"'min_lifetime' can't be greater than the maximum allowed"
" value enforced by the server's administrator"
),
errcode=Codes.BAD_JSON,
)

if max_lifetime is not None:
if not isinstance(max_lifetime, int):
raise SynapseError(
Expand All @@ -129,32 +102,6 @@ def _validate_retention(self, event, config):
errcode=Codes.BAD_JSON,
)

if (
config.retention_allowed_lifetime_min is not None
and max_lifetime < config.retention_allowed_lifetime_min
):
raise SynapseError(
code=400,
msg=(
"'max_lifetime' can't be lower than the minimum allowed value"
" enforced by the server's administrator"
),
errcode=Codes.BAD_JSON,
)

if (
config.retention_allowed_lifetime_max is not None
and max_lifetime > config.retention_allowed_lifetime_max
):
raise SynapseError(
code=400,
msg=(
"'max_lifetime' can't be greater than the maximum allowed"
" value enforced by the server's administrator"
),
errcode=Codes.BAD_JSON,
)

if (
min_lifetime is not None
and max_lifetime is not None
Expand Down
34 changes: 28 additions & 6 deletions synapse/handlers/pagination.py
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,9 @@ def __init__(self, hs):

self._retention_default_max_lifetime = hs.config.retention_default_max_lifetime

self._retention_allowed_lifetime_min = hs.config.retention_allowed_lifetime_min
self._retention_allowed_lifetime_max = hs.config.retention_allowed_lifetime_max

if hs.config.retention_enabled:
# Run the purge jobs described in the configuration file.
for job in hs.config.retention_purge_jobs:
Expand Down Expand Up @@ -152,13 +155,32 @@ async def purge_history_for_rooms_in_range(self, min_ms, max_ms):
)
continue

max_lifetime = retention_policy["max_lifetime"]
# If max_lifetime is None, it means that the room has no retention policy.
# Given we only retrieve such rooms when there's a default retention policy
# defined in the server's configuration, we can safely assume that's the
# case and use it for this room.
max_lifetime = (
retention_policy["max_lifetime"] or self._retention_default_max_lifetime
)

if max_lifetime is None:
# If max_lifetime is None, it means that include_null equals True,
# therefore we can safely assume that there is a default policy defined
# in the server's configuration.
max_lifetime = self._retention_default_max_lifetime
# Cap the effective max_lifetime to be within the range allowed in the
# config.
# We do this in two steps:
# 1. Make sure it's higher or equal to the minimum allowed value, and if
# it's not replace it with that value. This is because the server
# operator can be required to not delete information before a given
# time, e.g. to comply with freedom of information laws.
# 2. Make sure the resulting value is lower or equal to the maximum allowed
# value, and if it's not replace it with that value. This is because the
# server operator can be required to delete any data after a specific
# amount of time.
if self._retention_allowed_lifetime_min is not None:
max_lifetime = max(self._retention_allowed_lifetime_min, max_lifetime)

if self._retention_allowed_lifetime_max is not None:
max_lifetime = min(max_lifetime, self._retention_allowed_lifetime_max)

logger.debug("[purge] max_lifetime for room %s: %s", room_id, max_lifetime)

# Figure out what token we should start purging at.
ts = self.clock.time_msec() - max_lifetime
Expand Down
72 changes: 46 additions & 26 deletions tests/rest/client/test_retention.py
Original file line number Diff line number Diff line change
Expand Up @@ -45,50 +45,66 @@ def make_homeserver(self, reactor, clock):
}

self.hs = self.setup_test_homeserver(config=config)

return self.hs

def prepare(self, reactor, clock, homeserver):
self.user_id = self.register_user("user", "password")
self.token = self.login("user", "password")

def test_retention_state_event(self):
"""Tests that the server configuration can limit the values a user can set to the
room's retention policy.
self.store = self.hs.get_datastore()
self.serializer = self.hs.get_event_client_serializer()
self.clock = self.hs.get_clock()

def test_retention_event_purged_with_state_event(self):
"""Tests that expired events are correctly purged when the room's retention policy
is defined by a state event.
"""
room_id = self.helper.create_room_as(self.user_id, tok=self.token)

# Set the room's retention period to 2 days.
lifetime = one_day_ms * 2
self.helper.send_state(
room_id=room_id,
event_type=EventTypes.Retention,
body={"max_lifetime": one_day_ms * 4},
body={"max_lifetime": lifetime},
tok=self.token,
expect_code=400,
)

self._test_retention_event_purged(room_id, one_day_ms * 1.5)
babolivier marked this conversation as resolved.
Show resolved Hide resolved

def test_retention_event_purged_with_state_event_outside_allowed(self):
"""Tests that the server configuration can override the policy for a room when
running the purge jobs.
"""
room_id = self.helper.create_room_as(self.user_id, tok=self.token)

# Set a max_lifetime higher than the maximum allowed value.
self.helper.send_state(
room_id=room_id,
event_type=EventTypes.Retention,
body={"max_lifetime": one_hour_ms},
body={"max_lifetime": one_day_ms * 4},
tok=self.token,
expect_code=400,
)

def test_retention_event_purged_with_state_event(self):
"""Tests that expired events are correctly purged when the room's retention policy
is defined by a state event.
"""
room_id = self.helper.create_room_as(self.user_id, tok=self.token)
# Check that the event is purged after waiting for the maximum allowed duration
# instead of the one specified in the room's policy.
self._test_retention_event_purged(room_id, one_day_ms * 3)

# Set the room's retention period to 2 days.
lifetime = one_day_ms * 2
# Set a max_lifetime lower than the minimum allowed value.
self.helper.send_state(
room_id=room_id,
event_type=EventTypes.Retention,
body={"max_lifetime": lifetime},
body={"max_lifetime": one_hour_ms},
tok=self.token,
)

self._test_retention_event_purged(room_id, one_day_ms * 1.5)
# Check that the event hasn't been purged yet.
self._test_retention_event_purged(room_id, one_hour_ms, expect_purged=False)

# Check that the event is purged after waiting for the minimum allowed duration
# instead of the one specified in the room's policy.
self._test_retention_event_purged(room_id, one_day_ms)

def test_retention_event_purged_without_state_event(self):
"""Tests that expired events are correctly purged when the room's retention policy
Expand Down Expand Up @@ -140,7 +156,7 @@ def test_visibility(self):
# That event should be the second, not outdated event.
self.assertEqual(filtered_events[0].event_id, valid_event_id, filtered_events)

def _test_retention_event_purged(self, room_id, increment):
def _test_retention_event_purged(self, room_id, increment, expect_purged=True):
# Get the create event to, later, check that we can still access it.
message_handler = self.hs.get_message_handler()
create_event = self.get_success(
Expand All @@ -154,7 +170,7 @@ def _test_retention_event_purged(self, room_id, increment):
expired_event_id = resp.get("event_id")

# Check that we can retrieve the event.
expired_event = self.get_event(room_id, expired_event_id)
expired_event = self.get_event(expired_event_id)
self.assertEqual(
expired_event.get("content", {}).get("body"), "1", expired_event
)
Expand All @@ -173,25 +189,29 @@ def _test_retention_event_purged(self, room_id, increment):
self.reactor.advance(increment / 1000)

# Check that the event has been purged from the database.
babolivier marked this conversation as resolved.
Show resolved Hide resolved
self.get_event(room_id, expired_event_id, expected_code=404)
self.get_event(expired_event_id, expect_none=expect_purged)

# Check that the event that hasn't been purged can still be retrieved.
valid_event = self.get_event(room_id, valid_event_id)
valid_event = self.get_event(valid_event_id)
self.assertEqual(valid_event.get("content", {}).get("body"), "2", valid_event)

# Check that we can still access state events that were sent before the event that
# has been purged.
self.get_event(room_id, create_event.event_id)

def get_event(self, room_id, event_id, expected_code=200):
url = "/_matrix/client/r0/rooms/%s/event/%s" % (room_id, event_id)
def get_event(self, event_id, expect_none=False):
event = self.get_success(self.store.get_event(event_id, allow_none=True))

request, channel = self.make_request("GET", url, access_token=self.token)
self.render(request)
if expect_none:
self.assertIsNone(event)
return {}

self.assertEqual(channel.code, expected_code, channel.result)
self.assertIsNotNone(event)

return channel.json_body
time_now = self.clock.time_msec()
serialized = self.get_success(self.serializer.serialize_event(event, time_now))

return serialized


class RetentionNoDefaultPolicyTestCase(unittest.HomeserverTestCase):
Expand Down