|
|
|
|
@ -21,10 +21,10 @@ pub fn create_backup_route(
@@ -21,10 +21,10 @@ pub fn create_backup_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<create_backup::Request>, |
|
|
|
|
) -> ConduitResult<create_backup::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
let version = db |
|
|
|
|
.key_backups |
|
|
|
|
.create_backup(&sender_id, &body.algorithm, &db.globals)?; |
|
|
|
|
.create_backup(&sender_user, &body.algorithm, &db.globals)?; |
|
|
|
|
|
|
|
|
|
Ok(create_backup::Response { version }.into()) |
|
|
|
|
} |
|
|
|
|
@ -37,9 +37,9 @@ pub fn update_backup_route(
@@ -37,9 +37,9 @@ pub fn update_backup_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<update_backup::Request<'_>>, |
|
|
|
|
) -> ConduitResult<update_backup::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
db.key_backups |
|
|
|
|
.update_backup(&sender_id, &body.version, &body.algorithm, &db.globals)?; |
|
|
|
|
.update_backup(&sender_user, &body.version, &body.algorithm, &db.globals)?; |
|
|
|
|
|
|
|
|
|
Ok(update_backup::Response.into()) |
|
|
|
|
} |
|
|
|
|
@ -52,11 +52,11 @@ pub fn get_latest_backup_route(
@@ -52,11 +52,11 @@ pub fn get_latest_backup_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<get_latest_backup::Request>, |
|
|
|
|
) -> ConduitResult<get_latest_backup::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
let (version, algorithm) = |
|
|
|
|
db.key_backups |
|
|
|
|
.get_latest_backup(&sender_id)? |
|
|
|
|
.get_latest_backup(&sender_user)? |
|
|
|
|
.ok_or(Error::BadRequest( |
|
|
|
|
ErrorKind::NotFound, |
|
|
|
|
"Key backup does not exist.", |
|
|
|
|
@ -64,8 +64,8 @@ pub fn get_latest_backup_route(
@@ -64,8 +64,8 @@ pub fn get_latest_backup_route(
|
|
|
|
|
|
|
|
|
|
Ok(get_latest_backup::Response { |
|
|
|
|
algorithm, |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &version)?, |
|
|
|
|
version, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
@ -79,10 +79,10 @@ pub fn get_backup_route(
@@ -79,10 +79,10 @@ pub fn get_backup_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<get_backup::Request<'_>>, |
|
|
|
|
) -> ConduitResult<get_backup::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
let algorithm = db |
|
|
|
|
.key_backups |
|
|
|
|
.get_backup(&sender_id, &body.version)? |
|
|
|
|
.get_backup(&sender_user, &body.version)? |
|
|
|
|
.ok_or(Error::BadRequest( |
|
|
|
|
ErrorKind::NotFound, |
|
|
|
|
"Key backup does not exist.", |
|
|
|
|
@ -90,8 +90,8 @@ pub fn get_backup_route(
@@ -90,8 +90,8 @@ pub fn get_backup_route(
|
|
|
|
|
|
|
|
|
|
Ok(get_backup::Response { |
|
|
|
|
algorithm, |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
version: body.version.to_owned(), |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
@ -105,9 +105,9 @@ pub fn delete_backup_route(
@@ -105,9 +105,9 @@ pub fn delete_backup_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<delete_backup::Request>, |
|
|
|
|
) -> ConduitResult<delete_backup::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
db.key_backups.delete_backup(&sender_id, &body.version)?; |
|
|
|
|
db.key_backups.delete_backup(&sender_user, &body.version)?; |
|
|
|
|
|
|
|
|
|
Ok(delete_backup::Response.into()) |
|
|
|
|
} |
|
|
|
|
@ -121,12 +121,12 @@ pub fn add_backup_keys_route(
@@ -121,12 +121,12 @@ pub fn add_backup_keys_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<add_backup_keys::Request<'_>>, |
|
|
|
|
) -> ConduitResult<add_backup_keys::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
for (room_id, room) in &body.rooms { |
|
|
|
|
for (session_id, key_data) in &room.sessions { |
|
|
|
|
db.key_backups.add_key( |
|
|
|
|
&sender_id, |
|
|
|
|
&sender_user, |
|
|
|
|
&body.version, |
|
|
|
|
&room_id, |
|
|
|
|
&session_id, |
|
|
|
|
@ -137,8 +137,8 @@ pub fn add_backup_keys_route(
@@ -137,8 +137,8 @@ pub fn add_backup_keys_route(
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
Ok(add_backup_keys::Response { |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
} |
|
|
|
|
@ -152,11 +152,11 @@ pub fn add_backup_key_sessions_route(
@@ -152,11 +152,11 @@ pub fn add_backup_key_sessions_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<add_backup_key_sessions::Request>, |
|
|
|
|
) -> ConduitResult<add_backup_key_sessions::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
for (session_id, key_data) in &body.sessions { |
|
|
|
|
db.key_backups.add_key( |
|
|
|
|
&sender_id, |
|
|
|
|
&sender_user, |
|
|
|
|
&body.version, |
|
|
|
|
&body.room_id, |
|
|
|
|
&session_id, |
|
|
|
|
@ -166,8 +166,8 @@ pub fn add_backup_key_sessions_route(
@@ -166,8 +166,8 @@ pub fn add_backup_key_sessions_route(
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
Ok(add_backup_key_sessions::Response { |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
} |
|
|
|
|
@ -181,10 +181,10 @@ pub fn add_backup_key_session_route(
@@ -181,10 +181,10 @@ pub fn add_backup_key_session_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<add_backup_key_session::Request>, |
|
|
|
|
) -> ConduitResult<add_backup_key_session::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
db.key_backups.add_key( |
|
|
|
|
&sender_id, |
|
|
|
|
&sender_user, |
|
|
|
|
&body.version, |
|
|
|
|
&body.room_id, |
|
|
|
|
&body.session_id, |
|
|
|
|
@ -193,8 +193,8 @@ pub fn add_backup_key_session_route(
@@ -193,8 +193,8 @@ pub fn add_backup_key_session_route(
|
|
|
|
|
)?; |
|
|
|
|
|
|
|
|
|
Ok(add_backup_key_session::Response { |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
} |
|
|
|
|
@ -207,9 +207,9 @@ pub fn get_backup_keys_route(
@@ -207,9 +207,9 @@ pub fn get_backup_keys_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<get_backup_keys::Request<'_>>, |
|
|
|
|
) -> ConduitResult<get_backup_keys::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
let rooms = db.key_backups.get_all(&sender_id, &body.version)?; |
|
|
|
|
let rooms = db.key_backups.get_all(&sender_user, &body.version)?; |
|
|
|
|
|
|
|
|
|
Ok(get_backup_keys::Response { rooms }.into()) |
|
|
|
|
} |
|
|
|
|
@ -222,11 +222,11 @@ pub fn get_backup_key_sessions_route(
@@ -222,11 +222,11 @@ pub fn get_backup_key_sessions_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<get_backup_key_sessions::Request>, |
|
|
|
|
) -> ConduitResult<get_backup_key_sessions::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
let sessions = db |
|
|
|
|
.key_backups |
|
|
|
|
.get_room(&sender_id, &body.version, &body.room_id); |
|
|
|
|
.get_room(&sender_user, &body.version, &body.room_id); |
|
|
|
|
|
|
|
|
|
Ok(get_backup_key_sessions::Response { sessions }.into()) |
|
|
|
|
} |
|
|
|
|
@ -239,11 +239,11 @@ pub fn get_backup_key_session_route(
@@ -239,11 +239,11 @@ pub fn get_backup_key_session_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<get_backup_key_session::Request>, |
|
|
|
|
) -> ConduitResult<get_backup_key_session::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
let key_data = |
|
|
|
|
db.key_backups |
|
|
|
|
.get_session(&sender_id, &body.version, &body.room_id, &body.session_id)?; |
|
|
|
|
.get_session(&sender_user, &body.version, &body.room_id, &body.session_id)?; |
|
|
|
|
|
|
|
|
|
Ok(get_backup_key_session::Response { key_data }.into()) |
|
|
|
|
} |
|
|
|
|
@ -256,13 +256,14 @@ pub fn delete_backup_keys_route(
@@ -256,13 +256,14 @@ pub fn delete_backup_keys_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<delete_backup_keys::Request>, |
|
|
|
|
) -> ConduitResult<delete_backup_keys::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
db.key_backups.delete_all_keys(&sender_id, &body.version)?; |
|
|
|
|
db.key_backups |
|
|
|
|
.delete_all_keys(&sender_user, &body.version)?; |
|
|
|
|
|
|
|
|
|
Ok(delete_backup_keys::Response { |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
} |
|
|
|
|
@ -275,14 +276,14 @@ pub fn delete_backup_key_sessions_route(
@@ -275,14 +276,14 @@ pub fn delete_backup_key_sessions_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<delete_backup_key_sessions::Request>, |
|
|
|
|
) -> ConduitResult<delete_backup_key_sessions::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
db.key_backups |
|
|
|
|
.delete_room_keys(&sender_id, &body.version, &body.room_id)?; |
|
|
|
|
.delete_room_keys(&sender_user, &body.version, &body.room_id)?; |
|
|
|
|
|
|
|
|
|
Ok(delete_backup_key_sessions::Response { |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
} |
|
|
|
|
@ -295,14 +296,14 @@ pub fn delete_backup_key_session_route(
@@ -295,14 +296,14 @@ pub fn delete_backup_key_session_route(
|
|
|
|
|
db: State<'_, Database>, |
|
|
|
|
body: Ruma<delete_backup_key_session::Request>, |
|
|
|
|
) -> ConduitResult<delete_backup_key_session::Response> { |
|
|
|
|
let sender_id = body.sender_id.as_ref().expect("user is authenticated"); |
|
|
|
|
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); |
|
|
|
|
|
|
|
|
|
db.key_backups |
|
|
|
|
.delete_room_key(&sender_id, &body.version, &body.room_id, &body.session_id)?; |
|
|
|
|
.delete_room_key(&sender_user, &body.version, &body.room_id, &body.session_id)?; |
|
|
|
|
|
|
|
|
|
Ok(delete_backup_key_session::Response { |
|
|
|
|
count: (db.key_backups.count_keys(sender_id, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_id, &body.version)?, |
|
|
|
|
count: (db.key_backups.count_keys(sender_user, &body.version)? as u32).into(), |
|
|
|
|
etag: db.key_backups.get_etag(sender_user, &body.version)?, |
|
|
|
|
} |
|
|
|
|
.into()) |
|
|
|
|
} |
|
|
|
|
|