summaryrefslogtreecommitdiff
path: root/src/database/key_value/key_backups.rs
diff options
context:
space:
mode:
Diffstat (limited to 'src/database/key_value/key_backups.rs')
-rw-r--r--src/database/key_value/key_backups.rs371
1 files changed, 371 insertions, 0 deletions
diff --git a/src/database/key_value/key_backups.rs b/src/database/key_value/key_backups.rs
new file mode 100644
index 0000000..be1d6b1
--- /dev/null
+++ b/src/database/key_value/key_backups.rs
@@ -0,0 +1,371 @@
+use crate::{utils, Error, Result, services};
+use ruma::{
+ api::client::{
+ backup::{BackupAlgorithm, KeyBackupData, RoomKeyBackup},
+ error::ErrorKind,
+ },
+ serde::Raw,
+ RoomId, UserId,
+};
+use std::{collections::BTreeMap, sync::Arc};
+
+impl KeyBackups {
+ pub fn create_backup(
+ &self,
+ user_id: &UserId,
+ backup_metadata: &Raw<BackupAlgorithm>,
+ ) -> Result<String> {
+ let version = services().globals.next_count()?.to_string();
+
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+
+ self.backupid_algorithm.insert(
+ &key,
+ &serde_json::to_vec(backup_metadata).expect("BackupAlgorithm::to_vec always works"),
+ )?;
+ self.backupid_etag
+ .insert(&key, &services().globals.next_count()?.to_be_bytes())?;
+ Ok(version)
+ }
+
+ pub fn delete_backup(&self, user_id: &UserId, version: &str) -> Result<()> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+
+ self.backupid_algorithm.remove(&key)?;
+ self.backupid_etag.remove(&key)?;
+
+ key.push(0xff);
+
+ for (outdated_key, _) in self.backupkeyid_backup.scan_prefix(key) {
+ self.backupkeyid_backup.remove(&outdated_key)?;
+ }
+
+ Ok(())
+ }
+
+ pub fn update_backup(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ backup_metadata: &Raw<BackupAlgorithm>,
+ ) -> Result<String> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+
+ if self.backupid_algorithm.get(&key)?.is_none() {
+ return Err(Error::BadRequest(
+ ErrorKind::NotFound,
+ "Tried to update nonexistent backup.",
+ ));
+ }
+
+ self.backupid_algorithm
+ .insert(&key, backup_metadata.json().get().as_bytes())?;
+ self.backupid_etag
+ .insert(&key, &services().globals.next_count()?.to_be_bytes())?;
+ Ok(version.to_owned())
+ }
+
+ pub fn get_latest_backup_version(&self, user_id: &UserId) -> Result<Option<String>> {
+ let mut prefix = user_id.as_bytes().to_vec();
+ prefix.push(0xff);
+ let mut last_possible_key = prefix.clone();
+ last_possible_key.extend_from_slice(&u64::MAX.to_be_bytes());
+
+ self.backupid_algorithm
+ .iter_from(&last_possible_key, true)
+ .take_while(move |(k, _)| k.starts_with(&prefix))
+ .next()
+ .map(|(key, _)| {
+ utils::string_from_bytes(
+ key.rsplit(|&b| b == 0xff)
+ .next()
+ .expect("rsplit always returns an element"),
+ )
+ .map_err(|_| Error::bad_database("backupid_algorithm key is invalid."))
+ })
+ .transpose()
+ }
+
+ pub fn get_latest_backup(
+ &self,
+ user_id: &UserId,
+ ) -> Result<Option<(String, Raw<BackupAlgorithm>)>> {
+ let mut prefix = user_id.as_bytes().to_vec();
+ prefix.push(0xff);
+ let mut last_possible_key = prefix.clone();
+ last_possible_key.extend_from_slice(&u64::MAX.to_be_bytes());
+
+ self.backupid_algorithm
+ .iter_from(&last_possible_key, true)
+ .take_while(move |(k, _)| k.starts_with(&prefix))
+ .next()
+ .map(|(key, value)| {
+ let version = utils::string_from_bytes(
+ key.rsplit(|&b| b == 0xff)
+ .next()
+ .expect("rsplit always returns an element"),
+ )
+ .map_err(|_| Error::bad_database("backupid_algorithm key is invalid."))?;
+
+ Ok((
+ version,
+ serde_json::from_slice(&value).map_err(|_| {
+ Error::bad_database("Algorithm in backupid_algorithm is invalid.")
+ })?,
+ ))
+ })
+ .transpose()
+ }
+
+ pub fn get_backup(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ ) -> Result<Option<Raw<BackupAlgorithm>>> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+
+ self.backupid_algorithm
+ .get(&key)?
+ .map_or(Ok(None), |bytes| {
+ serde_json::from_slice(&bytes)
+ .map_err(|_| Error::bad_database("Algorithm in backupid_algorithm is invalid."))
+ })
+ }
+
+ pub fn add_key(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ room_id: &RoomId,
+ session_id: &str,
+ key_data: &Raw<KeyBackupData>,
+ ) -> Result<()> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+
+ if self.backupid_algorithm.get(&key)?.is_none() {
+ return Err(Error::BadRequest(
+ ErrorKind::NotFound,
+ "Tried to update nonexistent backup.",
+ ));
+ }
+
+ self.backupid_etag
+ .insert(&key, &services().globals.next_count()?.to_be_bytes())?;
+
+ key.push(0xff);
+ key.extend_from_slice(room_id.as_bytes());
+ key.push(0xff);
+ key.extend_from_slice(session_id.as_bytes());
+
+ self.backupkeyid_backup
+ .insert(&key, key_data.json().get().as_bytes())?;
+
+ Ok(())
+ }
+
+ pub fn count_keys(&self, user_id: &UserId, version: &str) -> Result<usize> {
+ let mut prefix = user_id.as_bytes().to_vec();
+ prefix.push(0xff);
+ prefix.extend_from_slice(version.as_bytes());
+
+ Ok(self.backupkeyid_backup.scan_prefix(prefix).count())
+ }
+
+ pub fn get_etag(&self, user_id: &UserId, version: &str) -> Result<String> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+
+ Ok(utils::u64_from_bytes(
+ &self
+ .backupid_etag
+ .get(&key)?
+ .ok_or_else(|| Error::bad_database("Backup has no etag."))?,
+ )
+ .map_err(|_| Error::bad_database("etag in backupid_etag invalid."))?
+ .to_string())
+ }
+
+ pub fn get_all(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ ) -> Result<BTreeMap<Box<RoomId>, RoomKeyBackup>> {
+ let mut prefix = user_id.as_bytes().to_vec();
+ prefix.push(0xff);
+ prefix.extend_from_slice(version.as_bytes());
+ prefix.push(0xff);
+
+ let mut rooms = BTreeMap::<Box<RoomId>, RoomKeyBackup>::new();
+
+ for result in self
+ .backupkeyid_backup
+ .scan_prefix(prefix)
+ .map(|(key, value)| {
+ let mut parts = key.rsplit(|&b| b == 0xff);
+
+ let session_id =
+ utils::string_from_bytes(parts.next().ok_or_else(|| {
+ Error::bad_database("backupkeyid_backup key is invalid.")
+ })?)
+ .map_err(|_| {
+ Error::bad_database("backupkeyid_backup session_id is invalid.")
+ })?;
+
+ let room_id = RoomId::parse(
+ utils::string_from_bytes(parts.next().ok_or_else(|| {
+ Error::bad_database("backupkeyid_backup key is invalid.")
+ })?)
+ .map_err(|_| Error::bad_database("backupkeyid_backup room_id is invalid."))?,
+ )
+ .map_err(|_| {
+ Error::bad_database("backupkeyid_backup room_id is invalid room id.")
+ })?;
+
+ let key_data = serde_json::from_slice(&value).map_err(|_| {
+ Error::bad_database("KeyBackupData in backupkeyid_backup is invalid.")
+ })?;
+
+ Ok::<_, Error>((room_id, session_id, key_data))
+ })
+ {
+ let (room_id, session_id, key_data) = result?;
+ rooms
+ .entry(room_id)
+ .or_insert_with(|| RoomKeyBackup {
+ sessions: BTreeMap::new(),
+ })
+ .sessions
+ .insert(session_id, key_data);
+ }
+
+ Ok(rooms)
+ }
+
+ pub fn get_room(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ room_id: &RoomId,
+ ) -> Result<BTreeMap<String, Raw<KeyBackupData>>> {
+ let mut prefix = user_id.as_bytes().to_vec();
+ prefix.push(0xff);
+ prefix.extend_from_slice(version.as_bytes());
+ prefix.push(0xff);
+ prefix.extend_from_slice(room_id.as_bytes());
+ prefix.push(0xff);
+
+ Ok(self
+ .backupkeyid_backup
+ .scan_prefix(prefix)
+ .map(|(key, value)| {
+ let mut parts = key.rsplit(|&b| b == 0xff);
+
+ let session_id =
+ utils::string_from_bytes(parts.next().ok_or_else(|| {
+ Error::bad_database("backupkeyid_backup key is invalid.")
+ })?)
+ .map_err(|_| {
+ Error::bad_database("backupkeyid_backup session_id is invalid.")
+ })?;
+
+ let key_data = serde_json::from_slice(&value).map_err(|_| {
+ Error::bad_database("KeyBackupData in backupkeyid_backup is invalid.")
+ })?;
+
+ Ok::<_, Error>((session_id, key_data))
+ })
+ .filter_map(|r| r.ok())
+ .collect())
+ }
+
+ pub fn get_session(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ room_id: &RoomId,
+ session_id: &str,
+ ) -> Result<Option<Raw<KeyBackupData>>> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+ key.push(0xff);
+ key.extend_from_slice(room_id.as_bytes());
+ key.push(0xff);
+ key.extend_from_slice(session_id.as_bytes());
+
+ self.backupkeyid_backup
+ .get(&key)?
+ .map(|value| {
+ serde_json::from_slice(&value).map_err(|_| {
+ Error::bad_database("KeyBackupData in backupkeyid_backup is invalid.")
+ })
+ })
+ .transpose()
+ }
+
+ pub fn delete_all_keys(&self, user_id: &UserId, version: &str) -> Result<()> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+ key.push(0xff);
+
+ for (outdated_key, _) in self.backupkeyid_backup.scan_prefix(key) {
+ self.backupkeyid_backup.remove(&outdated_key)?;
+ }
+
+ Ok(())
+ }
+
+ pub fn delete_room_keys(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ room_id: &RoomId,
+ ) -> Result<()> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+ key.push(0xff);
+ key.extend_from_slice(room_id.as_bytes());
+ key.push(0xff);
+
+ for (outdated_key, _) in self.backupkeyid_backup.scan_prefix(key) {
+ self.backupkeyid_backup.remove(&outdated_key)?;
+ }
+
+ Ok(())
+ }
+
+ pub fn delete_room_key(
+ &self,
+ user_id: &UserId,
+ version: &str,
+ room_id: &RoomId,
+ session_id: &str,
+ ) -> Result<()> {
+ let mut key = user_id.as_bytes().to_vec();
+ key.push(0xff);
+ key.extend_from_slice(version.as_bytes());
+ key.push(0xff);
+ key.extend_from_slice(room_id.as_bytes());
+ key.push(0xff);
+ key.extend_from_slice(session_id.as_bytes());
+
+ for (outdated_key, _) in self.backupkeyid_backup.scan_prefix(key) {
+ self.backupkeyid_backup.remove(&outdated_key)?;
+ }
+
+ Ok(())
+ }
+}