1
0
Fork 0
mirror of https://gitlab.com/famedly/conduit.git synced 2025-07-02 16:38:36 +00:00
conduit/src/database/key_value/users.rs

933 lines
32 KiB
Rust
Raw Normal View History

2022-10-05 15:33:57 +02:00
use std::{mem::size_of, collections::BTreeMap, sync::Arc};
use ruma::{api::client::{filter::IncomingFilterDefinition, error::ErrorKind, device::Device}, UserId, RoomAliasId, MxcUri, DeviceId, MilliSecondsSinceUnixEpoch, DeviceKeyId, encryption::{OneTimeKey, CrossSigningKey, DeviceKeys}, serde::Raw, events::{AnyToDeviceEvent, StateEventType}, DeviceKeyAlgorithm, UInt};
use tracing::warn;
2022-09-07 13:25:51 +02:00
use crate::{service::{self, users::clean_signatures}, database::KeyValueDatabase, Error, utils, services, Result};
2022-10-05 15:33:57 +02:00
impl service::users::Data for Arc<KeyValueDatabase> {
/// Check if a user has an account on this homeserver.
fn exists(&self, user_id: &UserId) -> Result<bool> {
2021-06-08 18:10:00 +02:00
Ok(self.userid_password.get(user_id.as_bytes())?.is_some())
}
/// Check if account is deactivated
fn is_deactivated(&self, user_id: &UserId) -> Result<bool> {
Ok(self
.userid_password
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
.ok_or(Error::BadRequest(
ErrorKind::InvalidParam,
"User does not exist.",
))?
.is_empty())
}
2020-10-05 22:19:22 +02:00
/// Returns the number of users registered on this server.
fn count(&self) -> Result<usize> {
2021-06-08 18:10:00 +02:00
Ok(self.userid_password.iter().count())
2020-10-05 22:19:22 +02:00
}
/// Find out which user an access token belongs to.
fn find_from_token(&self, token: &str) -> Result<Option<(Box<UserId>, String)>> {
self.token_userdeviceid
2021-06-08 18:10:00 +02:00
.get(token.as_bytes())?
.map_or(Ok(None), |bytes| {
let mut parts = bytes.split(|&b| b == 0xff);
let user_bytes = parts.next().ok_or_else(|| {
Error::bad_database("User ID in token_userdeviceid is invalid.")
})?;
let device_bytes = parts.next().ok_or_else(|| {
Error::bad_database("Device ID in token_userdeviceid is invalid.")
})?;
Ok(Some((
2021-11-27 00:30:28 +01:00
UserId::parse(utils::string_from_bytes(user_bytes).map_err(|_| {
Error::bad_database("User ID in token_userdeviceid is invalid unicode.")
})?)
.map_err(|_| {
Error::bad_database("User ID in token_userdeviceid is invalid.")
2020-06-09 15:13:17 +02:00
})?,
utils::string_from_bytes(device_bytes).map_err(|_| {
Error::bad_database("Device ID in token_userdeviceid is invalid.")
2020-06-09 15:13:17 +02:00
})?,
)))
})
}
/// Returns an iterator over all users on this homeserver.
2022-09-07 13:25:51 +02:00
fn iter(&self) -> Box<dyn Iterator<Item = Result<Box<UserId>>>> {
2022-10-05 12:45:54 +02:00
Box::new(self.userid_password.iter().map(|(bytes, _)| {
2021-11-27 00:30:28 +01:00
UserId::parse(utils::string_from_bytes(&bytes).map_err(|_| {
2021-06-17 20:34:14 +02:00
Error::bad_database("User ID in userid_password is invalid unicode.")
})?)
.map_err(|_| Error::bad_database("User ID in userid_password is invalid."))
2022-10-05 12:45:54 +02:00
}))
}
2022-01-15 22:37:39 +01:00
/// Returns a list of local users as list of usernames.
///
2022-01-16 20:15:53 +01:00
/// A user account is considered `local` if the length of it's password is greater then zero.
fn list_local_users(&self) -> Result<Vec<String>> {
let users: Vec<String> = self
.userid_password
2022-01-15 17:10:23 +01:00
.iter()
2022-01-16 20:15:53 +01:00
.filter_map(|(username, pw)| self.get_username_with_valid_password(&username, &pw))
.collect();
Ok(users)
}
2022-01-17 19:43:45 +01:00
/// Will only return with Some(username) if the password was not empty and the
/// username could be successfully parsed.
2022-01-16 20:15:53 +01:00
/// If utils::string_from_bytes(...) returns an error that username will be skipped
2022-01-17 19:43:45 +01:00
/// and the error will be logged.
2022-01-16 20:15:53 +01:00
fn get_username_with_valid_password(&self, username: &[u8], password: &[u8]) -> Option<String> {
// A valid password is not empty
2022-01-17 19:43:45 +01:00
if password.is_empty() {
None
} else {
match utils::string_from_bytes(username) {
2022-01-17 19:43:45 +01:00
Ok(u) => Some(u),
Err(e) => {
2022-01-21 14:28:07 +01:00
warn!(
"Failed to parse username while calling get_local_users(): {}",
e.to_string()
);
None
}
}
}
}
/// Returns the password hash for the given user.
fn password_hash(&self, user_id: &UserId) -> Result<Option<String>> {
self.userid_password
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
2020-06-09 15:13:17 +02:00
.map_or(Ok(None), |bytes| {
Ok(Some(utils::string_from_bytes(&bytes).map_err(|_| {
Error::bad_database("Password hash in db is not valid string.")
2020-06-09 15:13:17 +02:00
})?))
})
}
/// Hash and set the user's password to the Argon2 hash
fn set_password(&self, user_id: &UserId, password: Option<&str>) -> Result<()> {
if let Some(password) = password {
if let Ok(hash) = utils::calculate_hash(password) {
2021-06-08 18:10:00 +02:00
self.userid_password
.insert(user_id.as_bytes(), hash.as_bytes())?;
Ok(())
} else {
Err(Error::BadRequest(
ErrorKind::InvalidParam,
"Password does not meet the requirements.",
))
}
} else {
2021-06-08 18:10:00 +02:00
self.userid_password.insert(user_id.as_bytes(), b"")?;
Ok(())
}
}
/// Returns the displayname of a user on this homeserver.
fn displayname(&self, user_id: &UserId) -> Result<Option<String>> {
self.userid_displayname
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
2020-06-09 15:13:17 +02:00
.map_or(Ok(None), |bytes| {
Ok(Some(utils::string_from_bytes(&bytes).map_err(|_| {
Error::bad_database("Displayname in db is invalid.")
2020-06-09 15:13:17 +02:00
})?))
})
}
/// Sets a new displayname or removes it if displayname is None. You still need to nofify all rooms of this change.
fn set_displayname(&self, user_id: &UserId, displayname: Option<String>) -> Result<()> {
if let Some(displayname) = displayname {
self.userid_displayname
2021-06-08 18:10:00 +02:00
.insert(user_id.as_bytes(), displayname.as_bytes())?;
} else {
2021-06-08 18:10:00 +02:00
self.userid_displayname.remove(user_id.as_bytes())?;
}
Ok(())
}
/// Get the avatar_url of a user.
fn avatar_url(&self, user_id: &UserId) -> Result<Option<Box<MxcUri>>> {
self.userid_avatarurl
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
.map(|bytes| {
let s = utils::string_from_bytes(&bytes)
.map_err(|_| Error::bad_database("Avatar URL in db is invalid."))?;
2021-11-27 00:30:28 +01:00
s.try_into()
2021-11-26 20:36:40 +01:00
.map_err(|_| Error::bad_database("Avatar URL in db is invalid."))
2020-06-09 15:13:17 +02:00
})
.transpose()
}
/// Sets a new avatar_url or removes it if avatar_url is None.
fn set_avatar_url(&self, user_id: &UserId, avatar_url: Option<Box<MxcUri>>) -> Result<()> {
if let Some(avatar_url) = avatar_url {
self.userid_avatarurl
2021-06-08 18:10:00 +02:00
.insert(user_id.as_bytes(), avatar_url.to_string().as_bytes())?;
} else {
2021-06-08 18:10:00 +02:00
self.userid_avatarurl.remove(user_id.as_bytes())?;
}
Ok(())
}
/// Get the blurhash of a user.
fn blurhash(&self, user_id: &UserId) -> Result<Option<String>> {
self.userid_blurhash
.get(user_id.as_bytes())?
.map(|bytes| {
let s = utils::string_from_bytes(&bytes)
.map_err(|_| Error::bad_database("Avatar URL in db is invalid."))?;
Ok(s)
})
.transpose()
}
/// Sets a new avatar_url or removes it if avatar_url is None.
fn set_blurhash(&self, user_id: &UserId, blurhash: Option<String>) -> Result<()> {
if let Some(blurhash) = blurhash {
self.userid_blurhash
.insert(user_id.as_bytes(), blurhash.as_bytes())?;
} else {
self.userid_blurhash.remove(user_id.as_bytes())?;
}
Ok(())
}
/// Adds a new device to a user.
fn create_device(
&self,
user_id: &UserId,
device_id: &DeviceId,
token: &str,
initial_device_display_name: Option<String>,
) -> Result<()> {
2020-06-09 15:13:17 +02:00
// This method should never be called for nonexistent users.
assert!(self.exists(user_id)?);
let mut userdeviceid = user_id.as_bytes().to_vec();
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
2021-04-21 10:51:34 +02:00
self.userid_devicelistversion
2021-06-08 18:10:00 +02:00
.increment(user_id.as_bytes())?;
2021-04-21 10:51:34 +02:00
self.userdeviceid_metadata.insert(
2021-06-08 18:10:00 +02:00
&userdeviceid,
&serde_json::to_vec(&Device {
device_id: device_id.into(),
display_name: initial_device_display_name,
last_seen_ip: None, // TODO
last_seen_ts: Some(MilliSecondsSinceUnixEpoch::now()),
2020-06-09 15:13:17 +02:00
})
2021-06-08 18:10:00 +02:00
.expect("Device::to_string never fails."),
)?;
self.set_token(user_id, device_id, token)?;
Ok(())
}
/// Removes a device from a user.
fn remove_device(&self, user_id: &UserId, device_id: &DeviceId) -> Result<()> {
let mut userdeviceid = user_id.as_bytes().to_vec();
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
// Remove tokens
2021-06-08 18:10:00 +02:00
if let Some(old_token) = self.userdeviceid_token.get(&userdeviceid)? {
self.userdeviceid_token.remove(&userdeviceid)?;
self.token_userdeviceid.remove(&old_token)?;
}
// Remove todevice events
let mut prefix = userdeviceid.clone();
prefix.push(0xff);
2021-06-08 18:10:00 +02:00
for (key, _) in self.todeviceid_events.scan_prefix(prefix) {
self.todeviceid_events.remove(&key)?;
}
// TODO: Remove onetimekeys
2021-04-21 10:51:34 +02:00
self.userid_devicelistversion
2021-06-08 18:10:00 +02:00
.increment(user_id.as_bytes())?;
2021-04-21 10:51:34 +02:00
self.userdeviceid_metadata.remove(&userdeviceid)?;
Ok(())
}
2020-05-17 19:56:40 +02:00
/// Returns an iterator over all device ids of this user.
fn all_device_ids<'a>(
2021-06-08 18:10:00 +02:00
&'a self,
user_id: &UserId,
2022-09-07 13:25:51 +02:00
) -> Box<dyn Iterator<Item = Result<Box<DeviceId>>>> {
let mut prefix = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
prefix.push(0xff);
// All devices have metadata
2022-10-05 12:45:54 +02:00
Box::new(self.userdeviceid_metadata
.scan_prefix(prefix)
2021-06-08 18:10:00 +02:00
.map(|(bytes, _)| {
Ok(utils::string_from_bytes(
bytes
.rsplit(|&b| b == 0xff)
.next()
.ok_or_else(|| Error::bad_database("UserDevice ID in db is invalid."))?,
2020-06-09 15:13:17 +02:00
)
2020-07-25 14:25:24 -04:00
.map_err(|_| Error::bad_database("Device ID in userdeviceid_metadata is invalid."))?
.into())
2022-10-05 12:45:54 +02:00
}))
2020-05-17 19:56:40 +02:00
}
/// Replaces the access token of one device.
fn set_token(&self, user_id: &UserId, device_id: &DeviceId, token: &str) -> Result<()> {
let mut userdeviceid = user_id.as_bytes().to_vec();
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
// All devices have metadata
2020-06-09 15:13:17 +02:00
assert!(self.userdeviceid_metadata.get(&userdeviceid)?.is_some());
// Remove old token
if let Some(old_token) = self.userdeviceid_token.get(&userdeviceid)? {
2021-06-08 18:10:00 +02:00
self.token_userdeviceid.remove(&old_token)?;
// It will be removed from userdeviceid_token by the insert later
}
// Assign token to user device combination
2021-06-08 18:10:00 +02:00
self.userdeviceid_token
.insert(&userdeviceid, token.as_bytes())?;
self.token_userdeviceid
.insert(token.as_bytes(), &userdeviceid)?;
Ok(())
}
2020-05-17 19:56:40 +02:00
fn add_one_time_key(
2020-05-17 19:56:40 +02:00
&self,
user_id: &UserId,
2020-07-25 14:25:24 -04:00
device_id: &DeviceId,
2020-08-12 23:32:39 +02:00
one_time_key_key: &DeviceKeyId,
2021-12-22 19:41:33 +01:00
one_time_key_value: &Raw<OneTimeKey>,
2020-05-17 19:56:40 +02:00
) -> Result<()> {
let mut key = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
key.push(0xff);
2020-07-26 15:41:28 +02:00
key.extend_from_slice(device_id.as_bytes());
2020-05-17 19:56:40 +02:00
// All devices have metadata
2020-06-09 15:13:17 +02:00
// Only existing devices should be able to call this.
assert!(self.userdeviceid_metadata.get(&key)?.is_some());
2020-05-17 19:56:40 +02:00
key.push(0xff);
2020-08-12 23:32:39 +02:00
// TODO: Use DeviceKeyId::to_string when it's available (and update everything,
2020-05-17 19:56:40 +02:00
// because there are no wrapping quotation marks anymore)
2020-06-09 15:13:17 +02:00
key.extend_from_slice(
serde_json::to_string(one_time_key_key)
2020-08-12 23:32:39 +02:00
.expect("DeviceKeyId::to_string always works")
2020-06-09 15:13:17 +02:00
.as_bytes(),
);
self.onetimekeyid_onetimekeys.insert(
&key,
2021-06-08 18:10:00 +02:00
&serde_json::to_vec(&one_time_key_value).expect("OneTimeKey::to_vec always works"),
2020-06-09 15:13:17 +02:00
)?;
2020-05-17 19:56:40 +02:00
self.userid_lastonetimekeyupdate
.insert(user_id.as_bytes(), &services().globals.next_count()?.to_be_bytes())?;
2020-05-17 19:56:40 +02:00
Ok(())
}
fn last_one_time_keys_update(&self, user_id: &UserId) -> Result<u64> {
self.userid_lastonetimekeyupdate
.get(user_id.as_bytes())?
.map(|bytes| {
utils::u64_from_bytes(&bytes).map_err(|_| {
Error::bad_database("Count in roomid_lastroomactiveupdate is invalid.")
})
})
.unwrap_or(Ok(0))
}
fn take_one_time_key(
2020-05-17 19:56:40 +02:00
&self,
user_id: &UserId,
2020-07-25 14:25:24 -04:00
device_id: &DeviceId,
2020-08-12 23:32:39 +02:00
key_algorithm: &DeviceKeyAlgorithm,
2021-12-22 19:41:33 +01:00
) -> Result<Option<(Box<DeviceKeyId>, Raw<OneTimeKey>)>> {
let mut prefix = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
prefix.push(0xff);
2020-07-26 15:41:28 +02:00
prefix.extend_from_slice(device_id.as_bytes());
2020-05-17 19:56:40 +02:00
prefix.push(0xff);
prefix.push(b'"'); // Annoying quotation mark
prefix.extend_from_slice(key_algorithm.as_ref().as_bytes());
2020-05-17 19:56:40 +02:00
prefix.push(b':');
self.userid_lastonetimekeyupdate
.insert(user_id.as_bytes(), &services().globals.next_count()?.to_be_bytes())?;
2020-05-17 19:56:40 +02:00
self.onetimekeyid_onetimekeys
2021-06-08 18:10:00 +02:00
.scan_prefix(prefix)
2020-05-17 19:56:40 +02:00
.next()
2021-06-08 18:10:00 +02:00
.map(|(key, value)| {
2020-05-23 19:17:08 +02:00
self.onetimekeyid_onetimekeys.remove(&key)?;
2020-05-17 19:56:40 +02:00
Ok((
serde_json::from_slice(
&*key
.rsplit(|&b| b == 0xff)
.next()
.ok_or_else(|| Error::bad_database("OneTimeKeyId in db is invalid."))?,
2020-06-09 15:13:17 +02:00
)
.map_err(|_| Error::bad_database("OneTimeKeyId in db is invalid."))?,
2020-06-09 15:13:17 +02:00
serde_json::from_slice(&*value)
.map_err(|_| Error::bad_database("OneTimeKeys in db are invalid."))?,
2020-05-17 19:56:40 +02:00
))
})
.transpose()
}
fn count_one_time_keys(
2020-05-17 19:56:40 +02:00
&self,
user_id: &UserId,
2020-07-25 14:25:24 -04:00
device_id: &DeviceId,
2020-08-12 23:32:39 +02:00
) -> Result<BTreeMap<DeviceKeyAlgorithm, UInt>> {
let mut userdeviceid = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
2020-05-17 19:56:40 +02:00
let mut counts = BTreeMap::new();
2021-06-08 18:10:00 +02:00
for algorithm in
self.onetimekeyid_onetimekeys
.scan_prefix(userdeviceid)
.map(|(bytes, _)| {
Ok::<_, Error>(
2021-11-26 20:36:40 +01:00
serde_json::from_slice::<Box<DeviceKeyId>>(
2021-06-08 18:10:00 +02:00
&*bytes.rsplit(|&b| b == 0xff).next().ok_or_else(|| {
Error::bad_database("OneTimeKey ID in db is invalid.")
})?,
)
.map_err(|_| Error::bad_database("DeviceKeyId in db is invalid."))?
.algorithm(),
2020-06-09 15:13:17 +02:00
)
2021-06-08 18:10:00 +02:00
})
2020-05-17 19:56:40 +02:00
{
*counts.entry(algorithm?).or_default() += UInt::from(1_u32);
}
Ok(counts)
}
fn add_device_keys(
2020-05-17 19:56:40 +02:00
&self,
user_id: &UserId,
2020-07-25 14:25:24 -04:00
device_id: &DeviceId,
2021-12-22 19:41:33 +01:00
device_keys: &Raw<DeviceKeys>,
2020-05-17 19:56:40 +02:00
) -> Result<()> {
let mut userdeviceid = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
2020-05-17 19:56:40 +02:00
2020-06-16 12:11:38 +02:00
self.keyid_key.insert(
2020-06-09 15:13:17 +02:00
&userdeviceid,
2021-06-08 18:10:00 +02:00
&serde_json::to_vec(&device_keys).expect("DeviceKeys::to_vec always works"),
2020-06-09 15:13:17 +02:00
)?;
2020-05-17 19:56:40 +02:00
self.mark_device_key_update(user_id)?;
2020-05-17 19:56:40 +02:00
Ok(())
}
fn add_cross_signing_keys(
2020-05-17 19:56:40 +02:00
&self,
user_id: &UserId,
2021-12-22 19:41:33 +01:00
master_key: &Raw<CrossSigningKey>,
self_signing_key: &Option<Raw<CrossSigningKey>>,
user_signing_key: &Option<Raw<CrossSigningKey>>,
2020-06-16 12:11:38 +02:00
) -> Result<()> {
// TODO: Check signatures
let mut prefix = user_id.as_bytes().to_vec();
2020-06-16 12:11:38 +02:00
prefix.push(0xff);
// Master key
let mut master_key_ids = master_key
2021-12-22 19:41:33 +01:00
.deserialize()
.map_err(|_| Error::BadRequest(ErrorKind::InvalidParam, "Invalid master key"))?
.keys
.into_values();
2021-12-22 19:41:33 +01:00
2020-06-16 12:11:38 +02:00
let master_key_id = master_key_ids.next().ok_or(Error::BadRequest(
ErrorKind::InvalidParam,
"Master key contained no key.",
))?;
if master_key_ids.next().is_some() {
return Err(Error::BadRequest(
ErrorKind::InvalidParam,
"Master key contained more than one key.",
));
}
let mut master_key_key = prefix.clone();
master_key_key.extend_from_slice(master_key_id.as_bytes());
2021-12-22 19:41:33 +01:00
self.keyid_key
.insert(&master_key_key, master_key.json().get().as_bytes())?;
2020-06-16 12:11:38 +02:00
self.userid_masterkeyid
2021-06-08 18:10:00 +02:00
.insert(user_id.as_bytes(), &master_key_key)?;
2020-06-16 12:11:38 +02:00
// Self-signing key
if let Some(self_signing_key) = self_signing_key {
let mut self_signing_key_ids = self_signing_key
2021-12-22 19:41:33 +01:00
.deserialize()
.map_err(|_| {
Error::BadRequest(ErrorKind::InvalidParam, "Invalid self signing key")
})?
.keys
.into_values();
2020-06-16 12:11:38 +02:00
let self_signing_key_id = self_signing_key_ids.next().ok_or(Error::BadRequest(
ErrorKind::InvalidParam,
"Self signing key contained no key.",
))?;
if self_signing_key_ids.next().is_some() {
return Err(Error::BadRequest(
ErrorKind::InvalidParam,
"Self signing key contained more than one key.",
));
}
let mut self_signing_key_key = prefix.clone();
self_signing_key_key.extend_from_slice(self_signing_key_id.as_bytes());
self.keyid_key.insert(
&self_signing_key_key,
2021-12-22 19:41:33 +01:00
self_signing_key.json().get().as_bytes(),
2020-06-16 12:11:38 +02:00
)?;
self.userid_selfsigningkeyid
2021-06-08 18:10:00 +02:00
.insert(user_id.as_bytes(), &self_signing_key_key)?;
2020-06-16 12:11:38 +02:00
}
// User-signing key
if let Some(user_signing_key) = user_signing_key {
let mut user_signing_key_ids = user_signing_key
2021-12-22 19:41:33 +01:00
.deserialize()
.map_err(|_| {
Error::BadRequest(ErrorKind::InvalidParam, "Invalid user signing key")
})?
.keys
.into_values();
2020-06-16 12:11:38 +02:00
let user_signing_key_id = user_signing_key_ids.next().ok_or(Error::BadRequest(
ErrorKind::InvalidParam,
"User signing key contained no key.",
))?;
if user_signing_key_ids.next().is_some() {
return Err(Error::BadRequest(
ErrorKind::InvalidParam,
"User signing key contained more than one key.",
));
}
let mut user_signing_key_key = prefix;
2020-06-16 12:11:38 +02:00
user_signing_key_key.extend_from_slice(user_signing_key_id.as_bytes());
self.keyid_key.insert(
&user_signing_key_key,
2021-12-22 19:41:33 +01:00
user_signing_key.json().get().as_bytes(),
2020-06-16 12:11:38 +02:00
)?;
self.userid_usersigningkeyid
2021-06-08 18:10:00 +02:00
.insert(user_id.as_bytes(), &user_signing_key_key)?;
2020-06-16 12:11:38 +02:00
}
self.mark_device_key_update(user_id)?;
2020-06-16 12:11:38 +02:00
Ok(())
}
fn sign_key(
2020-06-16 12:11:38 +02:00
&self,
target_id: &UserId,
key_id: &str,
signature: (String, String),
sender_id: &UserId,
) -> Result<()> {
let mut key = target_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
key.push(0xff);
key.extend_from_slice(key_id.as_bytes());
2020-06-16 12:11:38 +02:00
let mut cross_signing_key: serde_json::Value =
serde_json::from_slice(&self.keyid_key.get(&key)?.ok_or(Error::BadRequest(
ErrorKind::InvalidParam,
"Tried to sign nonexistent key.",
))?)
2020-06-16 12:11:38 +02:00
.map_err(|_| Error::bad_database("key in keyid_key is invalid."))?;
let signatures = cross_signing_key
.get_mut("signatures")
.ok_or_else(|| Error::bad_database("key in keyid_key has no signatures field."))?
.as_object_mut()
.ok_or_else(|| Error::bad_database("key in keyid_key has invalid signatures field."))?
2021-11-26 20:36:40 +01:00
.entry(sender_id.to_owned())
2020-06-16 12:11:38 +02:00
.or_insert_with(|| serde_json::Map::new().into());
signatures
.as_object_mut()
.ok_or_else(|| Error::bad_database("signatures in keyid_key for a user is invalid."))?
.insert(signature.0, signature.1.into());
self.keyid_key.insert(
&key,
2021-06-08 18:10:00 +02:00
&serde_json::to_vec(&cross_signing_key).expect("CrossSigningKey::to_vec always works"),
2020-06-16 12:11:38 +02:00
)?;
2020-05-17 19:56:40 +02:00
// TODO: Should we notify about this change?
self.mark_device_key_update(target_id)?;
2020-06-16 12:11:38 +02:00
Ok(())
2020-05-17 19:56:40 +02:00
}
fn keys_changed<'a>(
2021-06-08 18:10:00 +02:00
&'a self,
user_or_room_id: &str,
2020-07-29 17:37:26 +02:00
from: u64,
to: Option<u64>,
2022-09-07 13:25:51 +02:00
) -> Box<dyn Iterator<Item = Result<Box<UserId>>>> {
let mut prefix = user_or_room_id.as_bytes().to_vec();
prefix.push(0xff);
2020-07-29 17:37:26 +02:00
let mut start = prefix.clone();
2020-07-29 17:37:26 +02:00
start.extend_from_slice(&(from + 1).to_be_bytes());
let to = to.unwrap_or(u64::MAX);
2022-10-05 12:45:54 +02:00
Box::new(self.keychangeid_userid
2021-06-08 18:10:00 +02:00
.iter_from(&start, false)
.take_while(move |(k, _)| {
k.starts_with(&prefix)
&& if let Some(current) = k.splitn(2, |&b| b == 0xff).nth(1) {
if let Ok(c) = utils::u64_from_bytes(current) {
c <= to
} else {
warn!("BadDatabase: Could not parse keychangeid_userid bytes");
false
}
} else {
warn!("BadDatabase: Could not parse keychangeid_userid");
false
}
})
.map(|(_, bytes)| {
2021-11-27 00:30:28 +01:00
UserId::parse(utils::string_from_bytes(&bytes).map_err(|_| {
2021-06-17 20:34:14 +02:00
Error::bad_database("User ID in devicekeychangeid_userid is invalid unicode.")
})?)
.map_err(|_| Error::bad_database("User ID in devicekeychangeid_userid is invalid."))
2022-10-05 12:45:54 +02:00
}))
}
fn mark_device_key_update(
&self,
user_id: &UserId,
) -> Result<()> {
let count = services().globals.next_count()?.to_be_bytes();
2022-10-05 12:45:54 +02:00
for room_id in services().rooms.state_cache.rooms_joined(user_id).filter_map(|r| r.ok()) {
// Don't send key updates to unencrypted rooms
if services().rooms
2022-10-05 12:45:54 +02:00
.state_accessor
2022-04-06 21:31:29 +02:00
.room_state_get(&room_id, &StateEventType::RoomEncryption, "")?
.is_none()
{
2020-09-17 22:41:43 +02:00
continue;
}
let mut key = room_id.as_bytes().to_vec();
key.push(0xff);
key.extend_from_slice(&count);
2021-06-08 18:10:00 +02:00
self.keychangeid_userid.insert(&key, user_id.as_bytes())?;
}
let mut key = user_id.as_bytes().to_vec();
key.push(0xff);
key.extend_from_slice(&count);
2021-06-08 18:10:00 +02:00
self.keychangeid_userid.insert(&key, user_id.as_bytes())?;
Ok(())
}
fn get_device_keys(
2020-07-25 14:25:24 -04:00
&self,
user_id: &UserId,
device_id: &DeviceId,
2021-12-22 19:41:33 +01:00
) -> Result<Option<Raw<DeviceKeys>>> {
let mut key = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
key.push(0xff);
2020-07-26 15:41:28 +02:00
key.extend_from_slice(device_id.as_bytes());
2020-05-17 19:56:40 +02:00
2021-06-08 18:10:00 +02:00
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| {
2020-06-16 12:11:38 +02:00
Ok(Some(serde_json::from_slice(&bytes).map_err(|_| {
Error::bad_database("DeviceKeys in db are invalid.")
})?))
2020-05-17 19:56:40 +02:00
})
}
2022-10-05 15:33:57 +02:00
fn get_master_key(
2020-06-16 12:11:38 +02:00
&self,
user_id: &UserId,
2022-10-05 15:33:57 +02:00
allowed_signatures: &dyn Fn(&UserId) -> bool,
2021-12-22 19:41:33 +01:00
) -> Result<Option<Raw<CrossSigningKey>>> {
2020-06-16 12:11:38 +02:00
self.userid_masterkeyid
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
2020-06-16 12:11:38 +02:00
.map_or(Ok(None), |key| {
2021-06-08 18:10:00 +02:00
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| {
2021-12-22 19:41:33 +01:00
let mut cross_signing_key = serde_json::from_slice::<serde_json::Value>(&bytes)
.map_err(|_| Error::bad_database("CrossSigningKey in db is invalid."))?;
clean_signatures(&mut cross_signing_key, user_id, allowed_signatures)?;
Ok(Some(Raw::from_json(
serde_json::value::to_raw_value(&cross_signing_key)
.expect("Value to RawValue serialization"),
)))
2020-06-16 12:11:38 +02:00
})
})
}
2022-10-05 15:33:57 +02:00
fn get_self_signing_key(
2020-06-16 12:11:38 +02:00
&self,
user_id: &UserId,
2022-10-05 15:33:57 +02:00
allowed_signatures: &dyn Fn(&UserId) -> bool,
2021-12-22 19:41:33 +01:00
) -> Result<Option<Raw<CrossSigningKey>>> {
2020-06-16 12:11:38 +02:00
self.userid_selfsigningkeyid
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
2020-06-16 12:11:38 +02:00
.map_or(Ok(None), |key| {
2021-06-08 18:10:00 +02:00
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| {
2021-12-22 19:41:33 +01:00
let mut cross_signing_key = serde_json::from_slice::<serde_json::Value>(&bytes)
.map_err(|_| Error::bad_database("CrossSigningKey in db is invalid."))?;
clean_signatures(&mut cross_signing_key, user_id, allowed_signatures)?;
Ok(Some(Raw::from_json(
serde_json::value::to_raw_value(&cross_signing_key)
.expect("Value to RawValue serialization"),
)))
2020-06-16 12:11:38 +02:00
})
})
}
fn get_user_signing_key(&self, user_id: &UserId) -> Result<Option<Raw<CrossSigningKey>>> {
2020-06-16 12:11:38 +02:00
self.userid_usersigningkeyid
2021-06-08 18:10:00 +02:00
.get(user_id.as_bytes())?
2020-06-16 12:11:38 +02:00
.map_or(Ok(None), |key| {
2021-06-08 18:10:00 +02:00
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| {
2020-06-16 12:11:38 +02:00
Ok(Some(serde_json::from_slice(&bytes).map_err(|_| {
Error::bad_database("CrossSigningKey in db is invalid.")
})?))
})
})
}
fn add_to_device_event(
2020-05-17 19:56:40 +02:00
&self,
sender: &UserId,
target_user_id: &UserId,
2020-07-25 14:25:24 -04:00
target_device_id: &DeviceId,
2021-06-17 20:12:36 +02:00
event_type: &str,
2020-05-17 19:56:40 +02:00
content: serde_json::Value,
) -> Result<()> {
let mut key = target_user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
key.push(0xff);
2020-07-26 15:41:28 +02:00
key.extend_from_slice(target_device_id.as_bytes());
2020-05-17 19:56:40 +02:00
key.push(0xff);
key.extend_from_slice(&services().globals.next_count()?.to_be_bytes());
2020-05-17 19:56:40 +02:00
let mut json = serde_json::Map::new();
2021-06-17 20:12:36 +02:00
json.insert("type".to_owned(), event_type.to_owned().into());
2020-05-17 19:56:40 +02:00
json.insert("sender".to_owned(), sender.to_string().into());
json.insert("content".to_owned(), content);
2021-06-30 20:31:51 +02:00
let value = serde_json::to_vec(&json).expect("Map::to_vec always works");
self.todeviceid_events.insert(&key, &value)?;
2020-05-17 19:56:40 +02:00
Ok(())
}
fn get_to_device_events(
2020-05-17 19:56:40 +02:00
&self,
user_id: &UserId,
2020-07-25 14:25:24 -04:00
device_id: &DeviceId,
2020-07-26 15:41:28 +02:00
) -> Result<Vec<Raw<AnyToDeviceEvent>>> {
2020-05-17 19:56:40 +02:00
let mut events = Vec::new();
let mut prefix = user_id.as_bytes().to_vec();
2020-05-17 19:56:40 +02:00
prefix.push(0xff);
2020-07-26 15:41:28 +02:00
prefix.extend_from_slice(device_id.as_bytes());
2020-05-17 19:56:40 +02:00
prefix.push(0xff);
2021-06-08 18:10:00 +02:00
for (_, value) in self.todeviceid_events.scan_prefix(prefix) {
2020-06-09 15:13:17 +02:00
events.push(
2021-06-08 18:10:00 +02:00
serde_json::from_slice(&value)
.map_err(|_| Error::bad_database("Event in todeviceid_events is invalid."))?,
2020-06-09 15:13:17 +02:00
);
2020-05-17 19:56:40 +02:00
}
Ok(events)
}
fn remove_to_device_events(
&self,
user_id: &UserId,
device_id: &DeviceId,
until: u64,
) -> Result<()> {
let mut prefix = user_id.as_bytes().to_vec();
prefix.push(0xff);
2020-07-26 15:41:28 +02:00
prefix.extend_from_slice(device_id.as_bytes());
prefix.push(0xff);
let mut last = prefix.clone();
last.extend_from_slice(&until.to_be_bytes());
for (key, _) in self
.todeviceid_events
2021-06-30 20:31:51 +02:00
.iter_from(&last, true) // this includes last
2021-06-08 18:10:00 +02:00
.take_while(move |(k, _)| k.starts_with(&prefix))
.map(|(key, _)| {
Ok::<_, Error>((
key.clone(),
utils::u64_from_bytes(&key[key.len() - size_of::<u64>()..key.len()])
.map_err(|_| Error::bad_database("ToDeviceId has invalid count bytes."))?,
))
})
.filter_map(|r| r.ok())
.take_while(|&(_, count)| count <= until)
{
2021-06-08 18:10:00 +02:00
self.todeviceid_events.remove(&key)?;
}
Ok(())
}
fn update_device_metadata(
&self,
user_id: &UserId,
2020-07-25 14:25:24 -04:00
device_id: &DeviceId,
device: &Device,
) -> Result<()> {
let mut userdeviceid = user_id.as_bytes().to_vec();
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
2020-06-09 15:13:17 +02:00
// Only existing devices should be able to call this.
assert!(self.userdeviceid_metadata.get(&userdeviceid)?.is_some());
2021-04-21 10:51:34 +02:00
self.userid_devicelistversion
2021-06-08 18:10:00 +02:00
.increment(user_id.as_bytes())?;
2021-04-21 10:51:34 +02:00
2020-06-09 15:13:17 +02:00
self.userdeviceid_metadata.insert(
2021-06-08 18:10:00 +02:00
&userdeviceid,
&serde_json::to_vec(device).expect("Device::to_string always works"),
2020-06-09 15:13:17 +02:00
)?;
Ok(())
}
/// Get device metadata.
fn get_device_metadata(
2020-07-25 14:25:24 -04:00
&self,
user_id: &UserId,
device_id: &DeviceId,
) -> Result<Option<Device>> {
let mut userdeviceid = user_id.as_bytes().to_vec();
userdeviceid.push(0xff);
2020-07-26 15:41:28 +02:00
userdeviceid.extend_from_slice(device_id.as_bytes());
self.userdeviceid_metadata
.get(&userdeviceid)?
2020-06-09 15:13:17 +02:00
.map_or(Ok(None), |bytes| {
Ok(Some(serde_json::from_slice(&bytes).map_err(|_| {
Error::bad_database("Metadata in userdeviceid_metadata is invalid.")
2020-06-09 15:13:17 +02:00
})?))
})
}
fn get_devicelist_version(&self, user_id: &UserId) -> Result<Option<u64>> {
2021-04-21 10:51:34 +02:00
self.userid_devicelistversion
.get(user_id.as_bytes())?
.map_or(Ok(None), |bytes| {
utils::u64_from_bytes(&bytes)
.map_err(|_| Error::bad_database("Invalid devicelistversion in db."))
.map(Some)
})
}
fn all_devices_metadata<'a>(
2021-06-08 18:10:00 +02:00
&'a self,
user_id: &UserId,
2022-09-07 13:25:51 +02:00
) -> Box<dyn Iterator<Item = Result<Device>>> {
let mut key = user_id.as_bytes().to_vec();
key.push(0xff);
2022-10-05 12:45:54 +02:00
Box::new(self.userdeviceid_metadata
.scan_prefix(key)
2021-06-08 18:10:00 +02:00
.map(|(_, bytes)| {
2021-06-17 20:34:14 +02:00
serde_json::from_slice::<Device>(&bytes)
.map_err(|_| Error::bad_database("Device in userdeviceid_metadata is invalid."))
2022-10-05 12:45:54 +02:00
}))
}
2022-01-05 18:15:00 +01:00
/// Creates a new sync filter. Returns the filter id.
fn create_filter(
2022-01-05 18:15:00 +01:00
&self,
user_id: &UserId,
filter: &IncomingFilterDefinition,
) -> Result<String> {
let filter_id = utils::random_string(4);
let mut key = user_id.as_bytes().to_vec();
key.push(0xff);
key.extend_from_slice(filter_id.as_bytes());
self.userfilterid_filter.insert(
&key,
&serde_json::to_vec(&filter).expect("filter is valid json"),
)?;
Ok(filter_id)
}
fn get_filter(
2022-01-05 18:15:00 +01:00
&self,
user_id: &UserId,
filter_id: &str,
) -> Result<Option<IncomingFilterDefinition>> {
let mut key = user_id.as_bytes().to_vec();
key.push(0xff);
key.extend_from_slice(filter_id.as_bytes());
let raw = self.userfilterid_filter.get(&key)?;
if let Some(raw) = raw {
serde_json::from_slice(&raw)
.map_err(|_| Error::bad_database("Invalid filter event in db."))
} else {
Ok(None)
}
}
}