conduit/src/data.rs

363 lines
11 KiB
Rust
Raw Normal View History

2020-04-04 09:53:37 +00:00
use crate::{utils, Database, PduEvent};
2020-04-06 12:33:02 +00:00
use ruma_events::EventType;
use ruma_federation_api::RoomV3Pdu;
2020-03-29 22:10:15 +00:00
use ruma_identifiers::{EventId, RoomId, UserId};
2020-04-04 09:53:37 +00:00
use std::{
collections::HashMap,
convert::{TryFrom, TryInto},
};
2020-03-29 19:05:20 +00:00
pub struct Data {
hostname: String,
db: Database,
}
2020-03-28 17:50:02 +00:00
impl Data {
2020-03-29 19:05:20 +00:00
/// Load an existing database or create a new one.
pub fn load_or_create(hostname: &str) -> Self {
Self {
hostname: hostname.to_owned(),
db: Database::load_or_create(hostname),
}
2020-03-29 19:05:20 +00:00
}
/// Get the hostname of the server.
pub fn hostname(&self) -> &str {
&self.hostname
2020-03-29 19:05:20 +00:00
}
/// Check if a user has an account by looking for an assigned password.
2020-03-28 17:50:02 +00:00
pub fn user_exists(&self, user_id: &UserId) -> bool {
self.db
.userid_password
2020-03-28 17:50:02 +00:00
.contains_key(user_id.to_string())
.unwrap()
}
2020-03-29 19:05:20 +00:00
/// Create a new user account by assigning them a password.
pub fn user_add(&self, user_id: &UserId, password: Option<String>) {
self.db
.userid_password
2020-03-28 17:50:02 +00:00
.insert(user_id.to_string(), &*password.unwrap_or_default())
.unwrap();
}
2020-03-29 11:48:44 +00:00
2020-03-29 19:05:20 +00:00
/// Find out which user an access token belongs to.
pub fn user_from_token(&self, token: &str) -> Option<UserId> {
self.db
.token_userid
2020-03-29 19:05:20 +00:00
.get(token)
.unwrap()
.and_then(|bytes| (*utils::string_from_bytes(&bytes)).try_into().ok())
2020-03-29 19:05:20 +00:00
}
/// Checks if the given password is equal to the one in the database.
pub fn password_get(&self, user_id: &UserId) -> Option<String> {
self.db
.userid_password
2020-03-29 19:05:20 +00:00
.get(user_id.to_string())
.unwrap()
.map(|bytes| utils::string_from_bytes(&bytes))
2020-03-29 19:05:20 +00:00
}
/// Add a new device to a user.
pub fn device_add(&self, user_id: &UserId, device_id: &str) {
if self
.db
.userid_deviceids
.get_iter(&user_id.to_string().as_bytes())
.filter_map(|item| item.ok())
.map(|(_key, value)| value)
.all(|device| device != device_id)
{
self.db
.userid_deviceids
.add(user_id.to_string().as_bytes(), device_id.into());
}
2020-03-29 19:05:20 +00:00
}
/// Replace the access token of one device.
pub fn token_replace(&self, user_id: &UserId, device_id: &String, token: String) {
// Make sure the device id belongs to the user
debug_assert!(self
.db
.userid_deviceids
.get_iter(&user_id.to_string().as_bytes())
.filter_map(|item| item.ok())
.map(|(_key, value)| value)
.any(|device| device == device_id.as_bytes())); // Does the user have that device?
2020-03-29 19:05:20 +00:00
// Remove old token
if let Some(old_token) = self.db.deviceid_token.get(device_id).unwrap() {
self.db.token_userid.remove(old_token).unwrap();
// It will be removed from deviceid_token by the insert later
2020-03-29 19:05:20 +00:00
}
// Assign token to device_id
self.db.deviceid_token.insert(device_id, &*token).unwrap();
2020-03-29 19:05:20 +00:00
// Assign token to user
self.db
.token_userid
2020-03-29 19:05:20 +00:00
.insert(token, &*user_id.to_string())
.unwrap();
}
2020-04-08 13:05:00 +00:00
pub fn room_join(&self, room_id: &RoomId, user_id: &UserId) -> bool {
if !self.room_exists(room_id) {
return false;
}
self.db.userid_roomids.add(
user_id.to_string().as_bytes(),
room_id.to_string().as_bytes().into(),
);
self.db.roomid_userids.add(
room_id.to_string().as_bytes(),
user_id.to_string().as_bytes().into(),
);
2020-04-08 13:05:00 +00:00
true
}
pub fn rooms_joined(&self, user_id: &UserId) -> Vec<RoomId> {
self.db
.userid_roomids
.get_iter(user_id.to_string().as_bytes())
.values()
.map(|room_id| {
RoomId::try_from(&*utils::string_from_bytes(&room_id.unwrap()))
.expect("user joined valid room ids")
})
.collect()
}
2020-04-08 13:05:00 +00:00
/// Check if a room exists by looking for PDUs in that room.
pub fn room_exists(&self, room_id: &RoomId) -> bool {
// Create the first part of the full pdu id
let mut prefix = vec![b'd'];
prefix.extend_from_slice(room_id.to_string().as_bytes());
prefix.push(b'#'); // Add delimiter so we don't find rooms starting with the same id
if let Some((key, _)) = self.db.pduid_pdus.get_gt(&prefix).unwrap() {
if key.starts_with(&prefix) {
true
} else {
false
}
} else {
false
}
}
2020-04-09 10:22:39 +00:00
pub fn rooms_all(&self) -> Vec<RoomId> {
let mut room_ids = self
.db
.roomid_pduleaves
.iter_all()
.keys()
.map(|key| {
2020-04-09 12:39:50 +00:00
RoomId::try_from(&*utils::string_from_bytes(
2020-04-09 10:22:39 +00:00
&key.unwrap()
.iter()
2020-04-09 12:39:50 +00:00
.skip(1) // skip "d"
2020-04-09 10:22:39 +00:00
.copied()
2020-04-09 12:39:50 +00:00
.take_while(|&x| x != 0xff) // until delimiter
2020-04-09 10:22:39 +00:00
.collect::<Vec<_>>(),
2020-04-09 12:39:50 +00:00
))
2020-04-09 10:22:39 +00:00
.unwrap()
})
.collect::<Vec<_>>();
room_ids.dedup();
room_ids
}
pub fn room_users(&self, room_id: &RoomId) -> u32 {
self.db
.roomid_userids
.get_iter(room_id.to_string().as_bytes())
.count() as u32
}
pub fn pdu_get(&self, event_id: &EventId) -> Option<RoomV3Pdu> {
self.db
.eventid_pduid
.get(event_id.to_string().as_bytes())
.unwrap()
.map(|pdu_id| {
serde_json::from_slice(
&self
.db
.pduid_pdus
.get(pdu_id)
.unwrap()
.expect("eventid_pduid in db is valid"),
)
.expect("pdu is valid")
})
}
2020-04-05 21:06:43 +00:00
pub fn pdu_leaves_get(&self, room_id: &RoomId) -> Vec<EventId> {
let event_ids = self
.db
.roomid_pduleaves
.get_iter(room_id.to_string().as_bytes())
.values()
.map(|pdu_id| {
EventId::try_from(&*utils::string_from_bytes(&pdu_id.unwrap()))
.expect("pdu leaves are valid event ids")
})
.collect();
2020-04-05 21:06:43 +00:00
event_ids
}
pub fn pdu_leaves_replace(&self, room_id: &RoomId, event_id: &EventId) {
self.db
.roomid_pduleaves
.clear(room_id.to_string().as_bytes());
self.db.roomid_pduleaves.add(
&room_id.to_string().as_bytes(),
(*event_id.to_string()).into(),
);
}
/// Add a persisted data unit from this homeserver
2020-04-05 21:06:43 +00:00
pub fn pdu_append(
&self,
room_id: RoomId,
sender: UserId,
event_type: EventType,
content: serde_json::Value,
2020-04-08 13:05:00 +00:00
unsigned: Option<serde_json::Map<String, serde_json::Value>>,
2020-04-06 12:33:02 +00:00
state_key: Option<String>,
2020-04-05 21:06:43 +00:00
) -> EventId {
// prev_events are the leaves of the current graph. This method removes all leaves from the
// room and replaces them with our event
2020-04-05 21:06:43 +00:00
// TODO: Make sure this isn't called twice in parallel
let prev_events = self.pdu_leaves_get(&room_id);
// Our depth is the maximum depth of prev_events + 1
let depth = prev_events
.iter()
.map(|event_id| {
self.pdu_get(event_id)
.expect("pdu in prev_events is valid")
.depth
.into()
})
.max()
.unwrap_or(0_u64)
+ 1;
2020-04-05 21:06:43 +00:00
let mut pdu = PduEvent {
event_id: EventId::try_from("$thiswillbefilledinlater").unwrap(),
2020-04-04 09:53:37 +00:00
room_id: room_id.clone(),
2020-04-05 21:06:43 +00:00
sender: sender.clone(),
2020-04-04 09:53:37 +00:00
origin: self.hostname.clone(),
2020-04-05 21:06:43 +00:00
origin_server_ts: utils::millis_since_unix_epoch(),
kind: event_type,
content,
2020-04-06 12:33:02 +00:00
state_key,
2020-04-04 09:53:37 +00:00
prev_events,
depth: depth.try_into().unwrap(),
auth_events: Vec::new(),
redacts: None,
2020-04-08 13:05:00 +00:00
unsigned: unsigned.unwrap_or_default(),
2020-04-04 09:53:37 +00:00
hashes: ruma_federation_api::EventHash {
sha256: "aaa".to_owned(),
},
signatures: HashMap::new(),
};
2020-04-05 21:06:43 +00:00
// Generate event id
pdu.event_id = EventId::try_from(&*format!(
"${}",
ruma_signatures::reference_hash(&serde_json::to_value(&pdu).unwrap())
.expect("ruma can calculate reference hashes")
))
.expect("ruma's reference hashes are correct");
self.pdu_leaves_replace(&room_id, &pdu.event_id);
// The new value will need a new index. We store the last used index in 'n'
// The count will go up regardless of the room_id
// This is also the next_batch/since value
let count_key: Vec<u8> = vec![b'n'];
// Increment the last index and use that
let index = utils::u64_from_bytes(
&self
.db
.pduid_pdus
.update_and_fetch(&count_key, utils::increment)
.unwrap()
.unwrap(),
);
let mut pdu_id = vec![b'd'];
pdu_id.extend_from_slice(room_id.to_string().as_bytes());
pdu_id.push(b'#'); // Add delimiter so we don't find rooms starting with the same id
pdu_id.extend_from_slice(&index.to_be_bytes());
self.db
.pduid_pdus
2020-04-04 09:53:37 +00:00
.insert(&pdu_id, &*serde_json::to_string(&pdu).unwrap())
.unwrap();
self.db
.eventid_pduid
2020-04-05 21:06:43 +00:00
.insert(pdu.event_id.to_string(), pdu_id.clone())
.unwrap();
2020-04-05 21:06:43 +00:00
pdu.event_id
}
/// Returns a vector of all PDUs in a room.
pub fn pdus_all(&self, room_id: &RoomId) -> Vec<PduEvent> {
2020-04-08 13:05:00 +00:00
self.pdus_since(room_id, 0)
}
pub fn last_pdu_index(&self) -> u64 {
let count_key: Vec<u8> = vec![b'n'];
utils::u64_from_bytes(
&self
.db
.pduid_pdus
.get(&count_key)
.unwrap()
.unwrap_or_else(|| (&0_u64.to_be_bytes()).into()),
)
}
/// Returns a vector of all events in a room that happened after the event with id `since`.
2020-04-08 13:05:00 +00:00
pub fn pdus_since(&self, room_id: &RoomId, since: u64) -> Vec<PduEvent> {
let mut pdus = Vec::new();
// Create the first part of the full pdu id
2020-04-08 13:05:00 +00:00
let mut prefix = vec![b'd'];
prefix.extend_from_slice(room_id.to_string().as_bytes());
prefix.push(b'#'); // Add delimiter so we don't find rooms starting with the same id
2020-04-08 13:05:00 +00:00
let mut current = prefix.clone();
current.extend_from_slice(&since.to_be_bytes());
while let Some((key, value)) = self.db.pduid_pdus.get_gt(&current).unwrap() {
2020-04-08 13:05:00 +00:00
if key.starts_with(&prefix) {
current = key.to_vec();
pdus.push(serde_json::from_slice(&value).expect("pdu in db is valid"));
} else {
break;
}
}
2020-04-08 13:05:00 +00:00
pdus
}
pub fn debug(&self) {
self.db.debug();
2020-03-29 19:05:20 +00:00
}
2020-03-28 17:50:02 +00:00
}