Conduit is a simple, fast and reliable chat server powered by Matrix https://conduit.rs
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
975 lines
35 KiB
975 lines
35 KiB
use crate::{utils, Error, Result}; |
|
use ruma::{ |
|
api::client::{error::ErrorKind, r0::device::Device}, |
|
encryption::{CrossSigningKey, DeviceKeys, OneTimeKey}, |
|
events::{AnyToDeviceEvent, EventType}, |
|
identifiers::MxcUri, |
|
serde::Raw, |
|
DeviceId, DeviceKeyAlgorithm, DeviceKeyId, MilliSecondsSinceUnixEpoch, UInt, UserId, |
|
}; |
|
use std::{collections::BTreeMap, convert::TryFrom, mem, sync::Arc}; |
|
use tracing::warn; |
|
|
|
use super::abstraction::Tree; |
|
|
|
pub struct Users { |
|
pub(super) userid_password: Arc<dyn Tree>, |
|
pub(super) userid_displayname: Arc<dyn Tree>, |
|
pub(super) userid_avatarurl: Arc<dyn Tree>, |
|
pub(super) userid_blurhash: Arc<dyn Tree>, |
|
pub(super) userdeviceid_token: Arc<dyn Tree>, |
|
pub(super) userdeviceid_metadata: Arc<dyn Tree>, // This is also used to check if a device exists |
|
pub(super) userid_devicelistversion: Arc<dyn Tree>, // DevicelistVersion = u64 |
|
pub(super) token_userdeviceid: Arc<dyn Tree>, |
|
|
|
pub(super) onetimekeyid_onetimekeys: Arc<dyn Tree>, // OneTimeKeyId = UserId + DeviceKeyId |
|
pub(super) userid_lastonetimekeyupdate: Arc<dyn Tree>, // LastOneTimeKeyUpdate = Count |
|
pub(super) keychangeid_userid: Arc<dyn Tree>, // KeyChangeId = UserId/RoomId + Count |
|
pub(super) keyid_key: Arc<dyn Tree>, // KeyId = UserId + KeyId (depends on key type) |
|
pub(super) userid_masterkeyid: Arc<dyn Tree>, |
|
pub(super) userid_selfsigningkeyid: Arc<dyn Tree>, |
|
pub(super) userid_usersigningkeyid: Arc<dyn Tree>, |
|
|
|
pub(super) todeviceid_events: Arc<dyn Tree>, // ToDeviceId = UserId + DeviceId + Count |
|
} |
|
|
|
impl Users { |
|
/// Check if a user has an account on this homeserver. |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn exists(&self, user_id: &UserId) -> Result<bool> { |
|
Ok(self.userid_password.get(user_id.as_bytes())?.is_some()) |
|
} |
|
|
|
/// Check if account is deactivated |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn is_deactivated(&self, user_id: &UserId) -> Result<bool> { |
|
Ok(self |
|
.userid_password |
|
.get(user_id.as_bytes())? |
|
.ok_or(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"User does not exist.", |
|
))? |
|
.is_empty()) |
|
} |
|
|
|
/// Create a new user account on this homeserver. |
|
#[tracing::instrument(skip(self, user_id, password))] |
|
pub fn create(&self, user_id: &UserId, password: Option<&str>) -> Result<()> { |
|
self.set_password(user_id, password)?; |
|
Ok(()) |
|
} |
|
|
|
/// Returns the number of users registered on this server. |
|
#[tracing::instrument(skip(self))] |
|
pub fn count(&self) -> Result<usize> { |
|
Ok(self.userid_password.iter().count()) |
|
} |
|
|
|
/// Find out which user an access token belongs to. |
|
#[tracing::instrument(skip(self, token))] |
|
pub fn find_from_token(&self, token: &str) -> Result<Option<(UserId, String)>> { |
|
self.token_userdeviceid |
|
.get(token.as_bytes())? |
|
.map_or(Ok(None), |bytes| { |
|
let mut parts = bytes.split(|&b| b == 0xff); |
|
let user_bytes = parts.next().ok_or_else(|| { |
|
Error::bad_database("User ID in token_userdeviceid is invalid.") |
|
})?; |
|
let device_bytes = parts.next().ok_or_else(|| { |
|
Error::bad_database("Device ID in token_userdeviceid is invalid.") |
|
})?; |
|
|
|
Ok(Some(( |
|
UserId::try_from(utils::string_from_bytes(&user_bytes).map_err(|_| { |
|
Error::bad_database("User ID in token_userdeviceid is invalid unicode.") |
|
})?) |
|
.map_err(|_| { |
|
Error::bad_database("User ID in token_userdeviceid is invalid.") |
|
})?, |
|
utils::string_from_bytes(&device_bytes).map_err(|_| { |
|
Error::bad_database("Device ID in token_userdeviceid is invalid.") |
|
})?, |
|
))) |
|
}) |
|
} |
|
|
|
/// Returns an iterator over all users on this homeserver. |
|
#[tracing::instrument(skip(self))] |
|
pub fn iter(&self) -> impl Iterator<Item = Result<UserId>> + '_ { |
|
self.userid_password.iter().map(|(bytes, _)| { |
|
UserId::try_from(utils::string_from_bytes(&bytes).map_err(|_| { |
|
Error::bad_database("User ID in userid_password is invalid unicode.") |
|
})?) |
|
.map_err(|_| Error::bad_database("User ID in userid_password is invalid.")) |
|
}) |
|
} |
|
|
|
/// Returns the password hash for the given user. |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn password_hash(&self, user_id: &UserId) -> Result<Option<String>> { |
|
self.userid_password |
|
.get(user_id.as_bytes())? |
|
.map_or(Ok(None), |bytes| { |
|
Ok(Some(utils::string_from_bytes(&bytes).map_err(|_| { |
|
Error::bad_database("Password hash in db is not valid string.") |
|
})?)) |
|
}) |
|
} |
|
|
|
/// Hash and set the user's password to the Argon2 hash |
|
#[tracing::instrument(skip(self, user_id, password))] |
|
pub fn set_password(&self, user_id: &UserId, password: Option<&str>) -> Result<()> { |
|
if let Some(password) = password { |
|
if let Ok(hash) = utils::calculate_hash(&password) { |
|
self.userid_password |
|
.insert(user_id.as_bytes(), hash.as_bytes())?; |
|
Ok(()) |
|
} else { |
|
Err(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"Password does not meet the requirements.", |
|
)) |
|
} |
|
} else { |
|
self.userid_password.insert(user_id.as_bytes(), b"")?; |
|
Ok(()) |
|
} |
|
} |
|
|
|
/// Returns the displayname of a user on this homeserver. |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn displayname(&self, user_id: &UserId) -> Result<Option<String>> { |
|
self.userid_displayname |
|
.get(user_id.as_bytes())? |
|
.map_or(Ok(None), |bytes| { |
|
Ok(Some(utils::string_from_bytes(&bytes).map_err(|_| { |
|
Error::bad_database("Displayname in db is invalid.") |
|
})?)) |
|
}) |
|
} |
|
|
|
/// Sets a new displayname or removes it if displayname is None. You still need to nofify all rooms of this change. |
|
#[tracing::instrument(skip(self, user_id, displayname))] |
|
pub fn set_displayname(&self, user_id: &UserId, displayname: Option<String>) -> Result<()> { |
|
if let Some(displayname) = displayname { |
|
self.userid_displayname |
|
.insert(user_id.as_bytes(), displayname.as_bytes())?; |
|
} else { |
|
self.userid_displayname.remove(user_id.as_bytes())?; |
|
} |
|
|
|
Ok(()) |
|
} |
|
|
|
/// Get the avatar_url of a user. |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn avatar_url(&self, user_id: &UserId) -> Result<Option<MxcUri>> { |
|
self.userid_avatarurl |
|
.get(user_id.as_bytes())? |
|
.map(|bytes| { |
|
let s = utils::string_from_bytes(&bytes) |
|
.map_err(|_| Error::bad_database("Avatar URL in db is invalid."))?; |
|
MxcUri::try_from(s).map_err(|_| Error::bad_database("Avatar URL in db is invalid.")) |
|
}) |
|
.transpose() |
|
} |
|
|
|
/// Sets a new avatar_url or removes it if avatar_url is None. |
|
#[tracing::instrument(skip(self, user_id, avatar_url))] |
|
pub fn set_avatar_url(&self, user_id: &UserId, avatar_url: Option<MxcUri>) -> Result<()> { |
|
if let Some(avatar_url) = avatar_url { |
|
self.userid_avatarurl |
|
.insert(user_id.as_bytes(), avatar_url.to_string().as_bytes())?; |
|
} else { |
|
self.userid_avatarurl.remove(user_id.as_bytes())?; |
|
} |
|
|
|
Ok(()) |
|
} |
|
|
|
/// Get the blurhash of a user. |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn blurhash(&self, user_id: &UserId) -> Result<Option<String>> { |
|
self.userid_blurhash |
|
.get(user_id.as_bytes())? |
|
.map(|bytes| { |
|
let s = utils::string_from_bytes(&bytes) |
|
.map_err(|_| Error::bad_database("Avatar URL in db is invalid."))?; |
|
|
|
Ok(s) |
|
}) |
|
.transpose() |
|
} |
|
|
|
/// Sets a new avatar_url or removes it if avatar_url is None. |
|
#[tracing::instrument(skip(self, user_id, blurhash))] |
|
pub fn set_blurhash(&self, user_id: &UserId, blurhash: Option<String>) -> Result<()> { |
|
if let Some(blurhash) = blurhash { |
|
self.userid_blurhash |
|
.insert(user_id.as_bytes(), blurhash.as_bytes())?; |
|
} else { |
|
self.userid_blurhash.remove(user_id.as_bytes())?; |
|
} |
|
|
|
Ok(()) |
|
} |
|
|
|
/// Adds a new device to a user. |
|
#[tracing::instrument(skip(self, user_id, device_id, token, initial_device_display_name))] |
|
pub fn create_device( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
token: &str, |
|
initial_device_display_name: Option<String>, |
|
) -> Result<()> { |
|
// This method should never be called for nonexistent users. |
|
assert!(self.exists(user_id)?); |
|
|
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
self.userid_devicelistversion |
|
.increment(user_id.as_bytes())?; |
|
|
|
self.userdeviceid_metadata.insert( |
|
&userdeviceid, |
|
&serde_json::to_vec(&Device { |
|
device_id: device_id.into(), |
|
display_name: initial_device_display_name, |
|
last_seen_ip: None, // TODO |
|
last_seen_ts: Some(MilliSecondsSinceUnixEpoch::now()), |
|
}) |
|
.expect("Device::to_string never fails."), |
|
)?; |
|
|
|
self.set_token(user_id, &device_id, token)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
/// Removes a device from a user. |
|
#[tracing::instrument(skip(self, user_id, device_id))] |
|
pub fn remove_device(&self, user_id: &UserId, device_id: &DeviceId) -> Result<()> { |
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
// Remove tokens |
|
if let Some(old_token) = self.userdeviceid_token.get(&userdeviceid)? { |
|
self.userdeviceid_token.remove(&userdeviceid)?; |
|
self.token_userdeviceid.remove(&old_token)?; |
|
} |
|
|
|
// Remove todevice events |
|
let mut prefix = userdeviceid.clone(); |
|
prefix.push(0xff); |
|
|
|
for (key, _) in self.todeviceid_events.scan_prefix(prefix) { |
|
self.todeviceid_events.remove(&key)?; |
|
} |
|
|
|
// TODO: Remove onetimekeys |
|
|
|
self.userid_devicelistversion |
|
.increment(user_id.as_bytes())?; |
|
|
|
self.userdeviceid_metadata.remove(&userdeviceid)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
/// Returns an iterator over all device ids of this user. |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn all_device_ids<'a>( |
|
&'a self, |
|
user_id: &UserId, |
|
) -> impl Iterator<Item = Result<Box<DeviceId>>> + 'a { |
|
let mut prefix = user_id.as_bytes().to_vec(); |
|
prefix.push(0xff); |
|
// All devices have metadata |
|
self.userdeviceid_metadata |
|
.scan_prefix(prefix) |
|
.map(|(bytes, _)| { |
|
Ok(utils::string_from_bytes( |
|
&bytes |
|
.rsplit(|&b| b == 0xff) |
|
.next() |
|
.ok_or_else(|| Error::bad_database("UserDevice ID in db is invalid."))?, |
|
) |
|
.map_err(|_| Error::bad_database("Device ID in userdeviceid_metadata is invalid."))? |
|
.into()) |
|
}) |
|
} |
|
|
|
/// Replaces the access token of one device. |
|
#[tracing::instrument(skip(self, user_id, device_id, token))] |
|
pub fn set_token(&self, user_id: &UserId, device_id: &DeviceId, token: &str) -> Result<()> { |
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
// All devices have metadata |
|
assert!(self.userdeviceid_metadata.get(&userdeviceid)?.is_some()); |
|
|
|
// Remove old token |
|
if let Some(old_token) = self.userdeviceid_token.get(&userdeviceid)? { |
|
self.token_userdeviceid.remove(&old_token)?; |
|
// It will be removed from userdeviceid_token by the insert later |
|
} |
|
|
|
// Assign token to user device combination |
|
self.userdeviceid_token |
|
.insert(&userdeviceid, token.as_bytes())?; |
|
self.token_userdeviceid |
|
.insert(token.as_bytes(), &userdeviceid)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip( |
|
self, |
|
user_id, |
|
device_id, |
|
one_time_key_key, |
|
one_time_key_value, |
|
globals |
|
))] |
|
pub fn add_one_time_key( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
one_time_key_key: &DeviceKeyId, |
|
one_time_key_value: &OneTimeKey, |
|
globals: &super::globals::Globals, |
|
) -> Result<()> { |
|
let mut key = user_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
key.extend_from_slice(device_id.as_bytes()); |
|
|
|
// All devices have metadata |
|
// Only existing devices should be able to call this. |
|
assert!(self.userdeviceid_metadata.get(&key)?.is_some()); |
|
|
|
key.push(0xff); |
|
// TODO: Use DeviceKeyId::to_string when it's available (and update everything, |
|
// because there are no wrapping quotation marks anymore) |
|
key.extend_from_slice( |
|
&serde_json::to_string(one_time_key_key) |
|
.expect("DeviceKeyId::to_string always works") |
|
.as_bytes(), |
|
); |
|
|
|
self.onetimekeyid_onetimekeys.insert( |
|
&key, |
|
&serde_json::to_vec(&one_time_key_value).expect("OneTimeKey::to_vec always works"), |
|
)?; |
|
|
|
self.userid_lastonetimekeyupdate |
|
.insert(&user_id.as_bytes(), &globals.next_count()?.to_be_bytes())?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn last_one_time_keys_update(&self, user_id: &UserId) -> Result<u64> { |
|
self.userid_lastonetimekeyupdate |
|
.get(&user_id.as_bytes())? |
|
.map(|bytes| { |
|
utils::u64_from_bytes(&bytes).map_err(|_| { |
|
Error::bad_database("Count in roomid_lastroomactiveupdate is invalid.") |
|
}) |
|
}) |
|
.unwrap_or(Ok(0)) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id, key_algorithm, globals))] |
|
pub fn take_one_time_key( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
key_algorithm: &DeviceKeyAlgorithm, |
|
globals: &super::globals::Globals, |
|
) -> Result<Option<(DeviceKeyId, OneTimeKey)>> { |
|
let mut prefix = user_id.as_bytes().to_vec(); |
|
prefix.push(0xff); |
|
prefix.extend_from_slice(device_id.as_bytes()); |
|
prefix.push(0xff); |
|
prefix.push(b'"'); // Annoying quotation mark |
|
prefix.extend_from_slice(key_algorithm.as_ref().as_bytes()); |
|
prefix.push(b':'); |
|
|
|
self.userid_lastonetimekeyupdate |
|
.insert(&user_id.as_bytes(), &globals.next_count()?.to_be_bytes())?; |
|
|
|
self.onetimekeyid_onetimekeys |
|
.scan_prefix(prefix) |
|
.next() |
|
.map(|(key, value)| { |
|
self.onetimekeyid_onetimekeys.remove(&key)?; |
|
|
|
Ok(( |
|
serde_json::from_slice( |
|
&*key |
|
.rsplit(|&b| b == 0xff) |
|
.next() |
|
.ok_or_else(|| Error::bad_database("OneTimeKeyId in db is invalid."))?, |
|
) |
|
.map_err(|_| Error::bad_database("OneTimeKeyId in db is invalid."))?, |
|
serde_json::from_slice(&*value) |
|
.map_err(|_| Error::bad_database("OneTimeKeys in db are invalid."))?, |
|
)) |
|
}) |
|
.transpose() |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id))] |
|
pub fn count_one_time_keys( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
) -> Result<BTreeMap<DeviceKeyAlgorithm, UInt>> { |
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
let mut counts = BTreeMap::new(); |
|
|
|
for algorithm in |
|
self.onetimekeyid_onetimekeys |
|
.scan_prefix(userdeviceid) |
|
.map(|(bytes, _)| { |
|
Ok::<_, Error>( |
|
serde_json::from_slice::<DeviceKeyId>( |
|
&*bytes.rsplit(|&b| b == 0xff).next().ok_or_else(|| { |
|
Error::bad_database("OneTimeKey ID in db is invalid.") |
|
})?, |
|
) |
|
.map_err(|_| Error::bad_database("DeviceKeyId in db is invalid."))? |
|
.algorithm(), |
|
) |
|
}) |
|
{ |
|
*counts.entry(algorithm?).or_default() += UInt::from(1_u32); |
|
} |
|
|
|
Ok(counts) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id, device_keys, rooms, globals))] |
|
pub fn add_device_keys( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
device_keys: &DeviceKeys, |
|
rooms: &super::rooms::Rooms, |
|
globals: &super::globals::Globals, |
|
) -> Result<()> { |
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
self.keyid_key.insert( |
|
&userdeviceid, |
|
&serde_json::to_vec(&device_keys).expect("DeviceKeys::to_vec always works"), |
|
)?; |
|
|
|
self.mark_device_key_update(user_id, rooms, globals)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip( |
|
self, |
|
master_key, |
|
self_signing_key, |
|
user_signing_key, |
|
rooms, |
|
globals |
|
))] |
|
pub fn add_cross_signing_keys( |
|
&self, |
|
user_id: &UserId, |
|
master_key: &CrossSigningKey, |
|
self_signing_key: &Option<CrossSigningKey>, |
|
user_signing_key: &Option<CrossSigningKey>, |
|
rooms: &super::rooms::Rooms, |
|
globals: &super::globals::Globals, |
|
) -> Result<()> { |
|
// TODO: Check signatures |
|
|
|
let mut prefix = user_id.as_bytes().to_vec(); |
|
prefix.push(0xff); |
|
|
|
// Master key |
|
let mut master_key_ids = master_key.keys.values(); |
|
let master_key_id = master_key_ids.next().ok_or(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"Master key contained no key.", |
|
))?; |
|
|
|
if master_key_ids.next().is_some() { |
|
return Err(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"Master key contained more than one key.", |
|
)); |
|
} |
|
|
|
let mut master_key_key = prefix.clone(); |
|
master_key_key.extend_from_slice(master_key_id.as_bytes()); |
|
|
|
self.keyid_key.insert( |
|
&master_key_key, |
|
&serde_json::to_vec(&master_key).expect("CrossSigningKey::to_vec always works"), |
|
)?; |
|
|
|
self.userid_masterkeyid |
|
.insert(user_id.as_bytes(), &master_key_key)?; |
|
|
|
// Self-signing key |
|
if let Some(self_signing_key) = self_signing_key { |
|
let mut self_signing_key_ids = self_signing_key.keys.values(); |
|
let self_signing_key_id = self_signing_key_ids.next().ok_or(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"Self signing key contained no key.", |
|
))?; |
|
|
|
if self_signing_key_ids.next().is_some() { |
|
return Err(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"Self signing key contained more than one key.", |
|
)); |
|
} |
|
|
|
let mut self_signing_key_key = prefix.clone(); |
|
self_signing_key_key.extend_from_slice(self_signing_key_id.as_bytes()); |
|
|
|
self.keyid_key.insert( |
|
&self_signing_key_key, |
|
&serde_json::to_vec(&self_signing_key) |
|
.expect("CrossSigningKey::to_vec always works"), |
|
)?; |
|
|
|
self.userid_selfsigningkeyid |
|
.insert(user_id.as_bytes(), &self_signing_key_key)?; |
|
} |
|
|
|
// User-signing key |
|
if let Some(user_signing_key) = user_signing_key { |
|
let mut user_signing_key_ids = user_signing_key.keys.values(); |
|
let user_signing_key_id = user_signing_key_ids.next().ok_or(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"User signing key contained no key.", |
|
))?; |
|
|
|
if user_signing_key_ids.next().is_some() { |
|
return Err(Error::BadRequest( |
|
ErrorKind::InvalidParam, |
|
"User signing key contained more than one key.", |
|
)); |
|
} |
|
|
|
let mut user_signing_key_key = prefix; |
|
user_signing_key_key.extend_from_slice(user_signing_key_id.as_bytes()); |
|
|
|
self.keyid_key.insert( |
|
&user_signing_key_key, |
|
&serde_json::to_vec(&user_signing_key) |
|
.expect("CrossSigningKey::to_vec always works"), |
|
)?; |
|
|
|
self.userid_usersigningkeyid |
|
.insert(user_id.as_bytes(), &user_signing_key_key)?; |
|
} |
|
|
|
self.mark_device_key_update(user_id, rooms, globals)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip(self, target_id, key_id, signature, sender_id, rooms, globals))] |
|
pub fn sign_key( |
|
&self, |
|
target_id: &UserId, |
|
key_id: &str, |
|
signature: (String, String), |
|
sender_id: &UserId, |
|
rooms: &super::rooms::Rooms, |
|
globals: &super::globals::Globals, |
|
) -> Result<()> { |
|
let mut key = target_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
key.extend_from_slice(key_id.as_bytes()); |
|
|
|
let mut cross_signing_key = |
|
serde_json::from_slice::<serde_json::Value>(&self.keyid_key.get(&key)?.ok_or( |
|
Error::BadRequest(ErrorKind::InvalidParam, "Tried to sign nonexistent key."), |
|
)?) |
|
.map_err(|_| Error::bad_database("key in keyid_key is invalid."))?; |
|
|
|
let signatures = cross_signing_key |
|
.get_mut("signatures") |
|
.ok_or_else(|| Error::bad_database("key in keyid_key has no signatures field."))? |
|
.as_object_mut() |
|
.ok_or_else(|| Error::bad_database("key in keyid_key has invalid signatures field."))? |
|
.entry(sender_id.clone()) |
|
.or_insert_with(|| serde_json::Map::new().into()); |
|
|
|
signatures |
|
.as_object_mut() |
|
.ok_or_else(|| Error::bad_database("signatures in keyid_key for a user is invalid."))? |
|
.insert(signature.0, signature.1.into()); |
|
|
|
self.keyid_key.insert( |
|
&key, |
|
&serde_json::to_vec(&cross_signing_key).expect("CrossSigningKey::to_vec always works"), |
|
)?; |
|
|
|
// TODO: Should we notify about this change? |
|
self.mark_device_key_update(target_id, rooms, globals)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_or_room_id, from, to))] |
|
pub fn keys_changed<'a>( |
|
&'a self, |
|
user_or_room_id: &str, |
|
from: u64, |
|
to: Option<u64>, |
|
) -> impl Iterator<Item = Result<UserId>> + 'a { |
|
let mut prefix = user_or_room_id.as_bytes().to_vec(); |
|
prefix.push(0xff); |
|
|
|
let mut start = prefix.clone(); |
|
start.extend_from_slice(&(from + 1).to_be_bytes()); |
|
|
|
let to = to.unwrap_or(u64::MAX); |
|
|
|
self.keychangeid_userid |
|
.iter_from(&start, false) |
|
.take_while(move |(k, _)| { |
|
k.starts_with(&prefix) |
|
&& if let Some(current) = k.splitn(2, |&b| b == 0xff).nth(1) { |
|
if let Ok(c) = utils::u64_from_bytes(current) { |
|
c <= to |
|
} else { |
|
warn!("BadDatabase: Could not parse keychangeid_userid bytes"); |
|
false |
|
} |
|
} else { |
|
warn!("BadDatabase: Could not parse keychangeid_userid"); |
|
false |
|
} |
|
}) |
|
.map(|(_, bytes)| { |
|
UserId::try_from(utils::string_from_bytes(&bytes).map_err(|_| { |
|
Error::bad_database("User ID in devicekeychangeid_userid is invalid unicode.") |
|
})?) |
|
.map_err(|_| Error::bad_database("User ID in devicekeychangeid_userid is invalid.")) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, rooms, globals))] |
|
pub fn mark_device_key_update( |
|
&self, |
|
user_id: &UserId, |
|
rooms: &super::rooms::Rooms, |
|
globals: &super::globals::Globals, |
|
) -> Result<()> { |
|
let count = globals.next_count()?.to_be_bytes(); |
|
for room_id in rooms.rooms_joined(&user_id).filter_map(|r| r.ok()) { |
|
// Don't send key updates to unencrypted rooms |
|
if rooms |
|
.room_state_get(&room_id, &EventType::RoomEncryption, "")? |
|
.is_none() |
|
{ |
|
continue; |
|
} |
|
|
|
let mut key = room_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
key.extend_from_slice(&count); |
|
|
|
self.keychangeid_userid.insert(&key, user_id.as_bytes())?; |
|
} |
|
|
|
let mut key = user_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
key.extend_from_slice(&count); |
|
self.keychangeid_userid.insert(&key, user_id.as_bytes())?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id))] |
|
pub fn get_device_keys( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
) -> Result<Option<DeviceKeys>> { |
|
let mut key = user_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
key.extend_from_slice(device_id.as_bytes()); |
|
|
|
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| { |
|
Ok(Some(serde_json::from_slice(&bytes).map_err(|_| { |
|
Error::bad_database("DeviceKeys in db are invalid.") |
|
})?)) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, allowed_signatures))] |
|
pub fn get_master_key<F: Fn(&UserId) -> bool>( |
|
&self, |
|
user_id: &UserId, |
|
allowed_signatures: F, |
|
) -> Result<Option<CrossSigningKey>> { |
|
self.userid_masterkeyid |
|
.get(user_id.as_bytes())? |
|
.map_or(Ok(None), |key| { |
|
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| { |
|
let mut cross_signing_key = serde_json::from_slice::<CrossSigningKey>(&bytes) |
|
.map_err(|_| { |
|
Error::bad_database("CrossSigningKey in db is invalid.") |
|
})?; |
|
|
|
// A user is not allowed to see signatures from users other than himself and |
|
// the target user |
|
cross_signing_key.signatures = cross_signing_key |
|
.signatures |
|
.into_iter() |
|
.filter(|(user, _)| allowed_signatures(user)) |
|
.collect(); |
|
|
|
Ok(Some(cross_signing_key)) |
|
}) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, allowed_signatures))] |
|
pub fn get_self_signing_key<F: Fn(&UserId) -> bool>( |
|
&self, |
|
user_id: &UserId, |
|
allowed_signatures: F, |
|
) -> Result<Option<CrossSigningKey>> { |
|
self.userid_selfsigningkeyid |
|
.get(user_id.as_bytes())? |
|
.map_or(Ok(None), |key| { |
|
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| { |
|
let mut cross_signing_key = serde_json::from_slice::<CrossSigningKey>(&bytes) |
|
.map_err(|_| { |
|
Error::bad_database("CrossSigningKey in db is invalid.") |
|
})?; |
|
|
|
// A user is not allowed to see signatures from users other than himself and |
|
// the target user |
|
cross_signing_key.signatures = cross_signing_key |
|
.signatures |
|
.into_iter() |
|
.filter(|(user, _)| user == user_id || allowed_signatures(user)) |
|
.collect(); |
|
|
|
Ok(Some(cross_signing_key)) |
|
}) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn get_user_signing_key(&self, user_id: &UserId) -> Result<Option<CrossSigningKey>> { |
|
self.userid_usersigningkeyid |
|
.get(user_id.as_bytes())? |
|
.map_or(Ok(None), |key| { |
|
self.keyid_key.get(&key)?.map_or(Ok(None), |bytes| { |
|
Ok(Some(serde_json::from_slice(&bytes).map_err(|_| { |
|
Error::bad_database("CrossSigningKey in db is invalid.") |
|
})?)) |
|
}) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip( |
|
self, |
|
sender, |
|
target_user_id, |
|
target_device_id, |
|
event_type, |
|
content, |
|
globals |
|
))] |
|
pub fn add_to_device_event( |
|
&self, |
|
sender: &UserId, |
|
target_user_id: &UserId, |
|
target_device_id: &DeviceId, |
|
event_type: &str, |
|
content: serde_json::Value, |
|
globals: &super::globals::Globals, |
|
) -> Result<()> { |
|
let mut key = target_user_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
key.extend_from_slice(target_device_id.as_bytes()); |
|
key.push(0xff); |
|
key.extend_from_slice(&globals.next_count()?.to_be_bytes()); |
|
|
|
let mut json = serde_json::Map::new(); |
|
json.insert("type".to_owned(), event_type.to_owned().into()); |
|
json.insert("sender".to_owned(), sender.to_string().into()); |
|
json.insert("content".to_owned(), content); |
|
|
|
let value = serde_json::to_vec(&json).expect("Map::to_vec always works"); |
|
|
|
self.todeviceid_events.insert(&key, &value)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id))] |
|
pub fn get_to_device_events( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
) -> Result<Vec<Raw<AnyToDeviceEvent>>> { |
|
let mut events = Vec::new(); |
|
|
|
let mut prefix = user_id.as_bytes().to_vec(); |
|
prefix.push(0xff); |
|
prefix.extend_from_slice(device_id.as_bytes()); |
|
prefix.push(0xff); |
|
|
|
for (_, value) in self.todeviceid_events.scan_prefix(prefix) { |
|
events.push( |
|
serde_json::from_slice(&value) |
|
.map_err(|_| Error::bad_database("Event in todeviceid_events is invalid."))?, |
|
); |
|
} |
|
|
|
Ok(events) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id, until))] |
|
pub fn remove_to_device_events( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
until: u64, |
|
) -> Result<()> { |
|
let mut prefix = user_id.as_bytes().to_vec(); |
|
prefix.push(0xff); |
|
prefix.extend_from_slice(device_id.as_bytes()); |
|
prefix.push(0xff); |
|
|
|
let mut last = prefix.clone(); |
|
last.extend_from_slice(&until.to_be_bytes()); |
|
|
|
for (key, _) in self |
|
.todeviceid_events |
|
.iter_from(&last, true) // this includes last |
|
.take_while(move |(k, _)| k.starts_with(&prefix)) |
|
.map(|(key, _)| { |
|
Ok::<_, Error>(( |
|
key.clone(), |
|
utils::u64_from_bytes(&key[key.len() - mem::size_of::<u64>()..key.len()]) |
|
.map_err(|_| Error::bad_database("ToDeviceId has invalid count bytes."))?, |
|
)) |
|
}) |
|
.filter_map(|r| r.ok()) |
|
.take_while(|&(_, count)| count <= until) |
|
{ |
|
self.todeviceid_events.remove(&key)?; |
|
} |
|
|
|
Ok(()) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id, device_id, device))] |
|
pub fn update_device_metadata( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
device: &Device, |
|
) -> Result<()> { |
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
// Only existing devices should be able to call this. |
|
assert!(self.userdeviceid_metadata.get(&userdeviceid)?.is_some()); |
|
|
|
self.userid_devicelistversion |
|
.increment(user_id.as_bytes())?; |
|
|
|
self.userdeviceid_metadata.insert( |
|
&userdeviceid, |
|
&serde_json::to_vec(device).expect("Device::to_string always works"), |
|
)?; |
|
|
|
Ok(()) |
|
} |
|
|
|
/// Get device metadata. |
|
#[tracing::instrument(skip(self, user_id, device_id))] |
|
pub fn get_device_metadata( |
|
&self, |
|
user_id: &UserId, |
|
device_id: &DeviceId, |
|
) -> Result<Option<Device>> { |
|
let mut userdeviceid = user_id.as_bytes().to_vec(); |
|
userdeviceid.push(0xff); |
|
userdeviceid.extend_from_slice(device_id.as_bytes()); |
|
|
|
self.userdeviceid_metadata |
|
.get(&userdeviceid)? |
|
.map_or(Ok(None), |bytes| { |
|
Ok(Some(serde_json::from_slice(&bytes).map_err(|_| { |
|
Error::bad_database("Metadata in userdeviceid_metadata is invalid.") |
|
})?)) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn get_devicelist_version(&self, user_id: &UserId) -> Result<Option<u64>> { |
|
self.userid_devicelistversion |
|
.get(user_id.as_bytes())? |
|
.map_or(Ok(None), |bytes| { |
|
utils::u64_from_bytes(&bytes) |
|
.map_err(|_| Error::bad_database("Invalid devicelistversion in db.")) |
|
.map(Some) |
|
}) |
|
} |
|
|
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn all_devices_metadata<'a>( |
|
&'a self, |
|
user_id: &UserId, |
|
) -> impl Iterator<Item = Result<Device>> + 'a { |
|
let mut key = user_id.as_bytes().to_vec(); |
|
key.push(0xff); |
|
|
|
self.userdeviceid_metadata |
|
.scan_prefix(key) |
|
.map(|(_, bytes)| { |
|
serde_json::from_slice::<Device>(&bytes) |
|
.map_err(|_| Error::bad_database("Device in userdeviceid_metadata is invalid.")) |
|
}) |
|
} |
|
|
|
/// Deactivate account |
|
#[tracing::instrument(skip(self, user_id))] |
|
pub fn deactivate_account(&self, user_id: &UserId) -> Result<()> { |
|
// Remove all associated devices |
|
for device_id in self.all_device_ids(user_id) { |
|
self.remove_device(&user_id, &device_id?)?; |
|
} |
|
|
|
// Set the password to "" to indicate a deactivated account. Hashes will never result in an |
|
// empty string, so the user will not be able to log in again. Systems like changing the |
|
// password without logging in should check if the account is deactivated. |
|
self.userid_password.insert(user_id.as_bytes(), &[])?; |
|
|
|
// TODO: Unhook 3PID |
|
Ok(()) |
|
} |
|
}
|
|
|