mirror of
https://github.com/1f349/dendrite.git
synced 2024-11-13 23:31:34 +00:00
638 lines
22 KiB
Go
638 lines
22 KiB
Go
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package shared
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/tidwall/gjson"
|
|
|
|
rstypes "github.com/matrix-org/dendrite/roomserver/types"
|
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"github.com/matrix-org/dendrite/internal/eventutil"
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
"github.com/matrix-org/dendrite/roomserver/api"
|
|
"github.com/matrix-org/dendrite/syncapi/storage/tables"
|
|
"github.com/matrix-org/dendrite/syncapi/synctypes"
|
|
"github.com/matrix-org/dendrite/syncapi/types"
|
|
)
|
|
|
|
// Database is a temporary struct until we have made syncserver.go the same for both pq/sqlite
|
|
// For now this contains the shared functions
|
|
type Database struct {
|
|
DB *sql.DB
|
|
Writer sqlutil.Writer
|
|
Invites tables.Invites
|
|
Peeks tables.Peeks
|
|
AccountData tables.AccountData
|
|
OutputEvents tables.Events
|
|
Topology tables.Topology
|
|
CurrentRoomState tables.CurrentRoomState
|
|
BackwardExtremities tables.BackwardsExtremities
|
|
SendToDevice tables.SendToDevice
|
|
Filter tables.Filter
|
|
Receipts tables.Receipts
|
|
Memberships tables.Memberships
|
|
NotificationData tables.NotificationData
|
|
Ignores tables.Ignores
|
|
Presence tables.Presence
|
|
Relations tables.Relations
|
|
}
|
|
|
|
func (d *Database) NewDatabaseSnapshot(ctx context.Context) (*DatabaseTransaction, error) {
|
|
txn, err := d.DB.BeginTx(ctx, &sql.TxOptions{
|
|
// Set the isolation level so that we see a snapshot of the database.
|
|
// In PostgreSQL repeatable read transactions will see a snapshot taken
|
|
// at the first query, and since the transaction is read-only it can't
|
|
// run into any serialisation errors.
|
|
// https://www.postgresql.org/docs/9.5/static/transaction-iso.html#XACT-REPEATABLE-READ
|
|
Isolation: sql.LevelRepeatableRead,
|
|
ReadOnly: true,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &DatabaseTransaction{
|
|
Database: d,
|
|
ctx: ctx,
|
|
txn: txn,
|
|
}, nil
|
|
}
|
|
|
|
func (d *Database) NewDatabaseTransaction(ctx context.Context) (*DatabaseTransaction, error) {
|
|
txn, err := d.DB.BeginTx(ctx, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &DatabaseTransaction{
|
|
Database: d,
|
|
ctx: ctx,
|
|
txn: txn,
|
|
}, nil
|
|
}
|
|
|
|
func (d *Database) Events(ctx context.Context, eventIDs []string) ([]*rstypes.HeaderedEvent, error) {
|
|
streamEvents, err := d.OutputEvents.SelectEvents(ctx, nil, eventIDs, nil, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// We don't include a device here as we only include transaction IDs in
|
|
// incremental syncs.
|
|
return d.StreamEventsToEvents(ctx, nil, streamEvents, nil), nil
|
|
}
|
|
|
|
func (d *Database) StreamEventsToEvents(ctx context.Context, device *userapi.Device, in []types.StreamEvent, rsAPI api.SyncRoomserverAPI) []*rstypes.HeaderedEvent {
|
|
out := make([]*rstypes.HeaderedEvent, len(in))
|
|
for i := 0; i < len(in); i++ {
|
|
out[i] = in[i].HeaderedEvent
|
|
if device != nil && in[i].TransactionID != nil {
|
|
userID, err := spec.NewUserID(device.UserID, true)
|
|
if err != nil {
|
|
logrus.WithFields(logrus.Fields{
|
|
"event_id": out[i].EventID(),
|
|
}).WithError(err).Warnf("Failed to add transaction ID to event")
|
|
continue
|
|
}
|
|
deviceSenderID, err := rsAPI.QuerySenderIDForUser(ctx, in[i].RoomID(), *userID)
|
|
if err != nil || deviceSenderID == nil {
|
|
logrus.WithFields(logrus.Fields{
|
|
"event_id": out[i].EventID(),
|
|
}).WithError(err).Warnf("Failed to add transaction ID to event")
|
|
continue
|
|
}
|
|
if *deviceSenderID == in[i].SenderID() && device.SessionID == in[i].TransactionID.SessionID {
|
|
err := out[i].SetUnsignedField(
|
|
"transaction_id", in[i].TransactionID.TransactionID,
|
|
)
|
|
if err != nil {
|
|
logrus.WithFields(logrus.Fields{
|
|
"event_id": out[i].EventID(),
|
|
}).WithError(err).Warnf("Failed to add transaction ID to event")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return out
|
|
}
|
|
|
|
// AddInviteEvent stores a new invite event for a user.
|
|
// If the invite was successfully stored this returns the stream ID it was stored at.
|
|
// Returns an error if there was a problem communicating with the database.
|
|
func (d *Database) AddInviteEvent(
|
|
ctx context.Context, inviteEvent *rstypes.HeaderedEvent,
|
|
) (sp types.StreamPosition, err error) {
|
|
_ = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
sp, err = d.Invites.InsertInviteEvent(ctx, txn, inviteEvent)
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
// RetireInviteEvent removes an old invite event from the database.
|
|
// Returns an error if there was a problem communicating with the database.
|
|
func (d *Database) RetireInviteEvent(
|
|
ctx context.Context, inviteEventID string,
|
|
) (sp types.StreamPosition, err error) {
|
|
_ = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
sp, err = d.Invites.DeleteInviteEvent(ctx, txn, inviteEventID)
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
// AddPeek tracks the fact that a user has started peeking.
|
|
// If the peek was successfully stored this returns the stream ID it was stored at.
|
|
// Returns an error if there was a problem communicating with the database.
|
|
func (d *Database) AddPeek(
|
|
ctx context.Context, roomID, userID, deviceID string,
|
|
) (sp types.StreamPosition, err error) {
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
sp, err = d.Peeks.InsertPeek(ctx, txn, roomID, userID, deviceID)
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
// DeletePeek tracks the fact that a user has stopped peeking from the specified
|
|
// device. If the peeks was successfully deleted this returns the stream ID it was
|
|
// stored at. Returns an error if there was a problem communicating with the database.
|
|
func (d *Database) DeletePeek(
|
|
ctx context.Context, roomID, userID, deviceID string,
|
|
) (sp types.StreamPosition, err error) {
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
sp, err = d.Peeks.DeletePeek(ctx, txn, roomID, userID, deviceID)
|
|
return err
|
|
})
|
|
if err == sql.ErrNoRows {
|
|
sp = 0
|
|
err = nil
|
|
}
|
|
return
|
|
}
|
|
|
|
// DeletePeeks tracks the fact that a user has stopped peeking from all devices
|
|
// If the peeks was successfully deleted this returns the stream ID it was stored at.
|
|
// Returns an error if there was a problem communicating with the database.
|
|
func (d *Database) DeletePeeks(
|
|
ctx context.Context, roomID, userID string,
|
|
) (sp types.StreamPosition, err error) {
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
sp, err = d.Peeks.DeletePeeks(ctx, txn, roomID, userID)
|
|
return err
|
|
})
|
|
if err == sql.ErrNoRows {
|
|
sp = 0
|
|
err = nil
|
|
}
|
|
return
|
|
}
|
|
|
|
// UpsertAccountData keeps track of new or updated account data, by saving the type
|
|
// of the new/updated data, and the user ID and room ID the data is related to (empty)
|
|
// room ID means the data isn't specific to any room)
|
|
// If no data with the given type, user ID and room ID exists in the database,
|
|
// creates a new row, else update the existing one
|
|
// Returns an error if there was an issue with the upsert
|
|
func (d *Database) UpsertAccountData(
|
|
ctx context.Context, userID, roomID, dataType string,
|
|
) (sp types.StreamPosition, err error) {
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
sp, err = d.AccountData.InsertAccountData(ctx, txn, userID, roomID, dataType)
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
// handleBackwardExtremities adds this event as a backwards extremity if and only if we do not have all of
|
|
// the events listed in the event's 'prev_events'. This function also updates the backwards extremities table
|
|
// to account for the fact that the given event is no longer a backwards extremity, but may be marked as such.
|
|
// This function should always be called within a sqlutil.Writer for safety in SQLite.
|
|
func (d *Database) handleBackwardExtremities(ctx context.Context, txn *sql.Tx, ev *rstypes.HeaderedEvent) error {
|
|
if err := d.BackwardExtremities.DeleteBackwardExtremity(ctx, txn, ev.RoomID().String(), ev.EventID()); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Check if we have all of the event's previous events. If an event is
|
|
// missing, add it to the room's backward extremities.
|
|
prevEvents, err := d.OutputEvents.SelectEvents(ctx, txn, ev.PrevEventIDs(), nil, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var found bool
|
|
for _, eID := range ev.PrevEventIDs() {
|
|
found = false
|
|
for _, prevEv := range prevEvents {
|
|
if eID == prevEv.EventID() {
|
|
found = true
|
|
}
|
|
}
|
|
|
|
// If the event is missing, consider it a backward extremity.
|
|
if !found {
|
|
if err = d.BackwardExtremities.InsertsBackwardExtremity(ctx, txn, ev.RoomID().String(), ev.EventID(), eID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (d *Database) WriteEvent(
|
|
ctx context.Context,
|
|
ev *rstypes.HeaderedEvent,
|
|
addStateEvents []*rstypes.HeaderedEvent,
|
|
addStateEventIDs, removeStateEventIDs []string,
|
|
transactionID *api.TransactionID, excludeFromSync bool,
|
|
historyVisibility gomatrixserverlib.HistoryVisibility,
|
|
) (pduPosition types.StreamPosition, returnErr error) {
|
|
returnErr = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
var err error
|
|
ev.Visibility = historyVisibility
|
|
pos, err := d.OutputEvents.InsertEvent(
|
|
ctx, txn, ev, addStateEventIDs, removeStateEventIDs, transactionID, excludeFromSync, historyVisibility,
|
|
)
|
|
if err != nil {
|
|
return fmt.Errorf("d.OutputEvents.InsertEvent: %w", err)
|
|
}
|
|
pduPosition = pos
|
|
var topoPosition types.StreamPosition
|
|
if topoPosition, err = d.Topology.InsertEventInTopology(ctx, txn, ev, pos); err != nil {
|
|
return fmt.Errorf("d.Topology.InsertEventInTopology: %w", err)
|
|
}
|
|
|
|
if err = d.handleBackwardExtremities(ctx, txn, ev); err != nil {
|
|
return fmt.Errorf("d.handleBackwardExtremities: %w", err)
|
|
}
|
|
|
|
if len(addStateEvents) == 0 && len(removeStateEventIDs) == 0 {
|
|
// Nothing to do, the event may have just been a message event.
|
|
return nil
|
|
}
|
|
for i := range addStateEvents {
|
|
addStateEvents[i].Visibility = historyVisibility
|
|
}
|
|
return d.updateRoomState(ctx, txn, removeStateEventIDs, addStateEvents, pduPosition, topoPosition)
|
|
})
|
|
|
|
return pduPosition, returnErr
|
|
}
|
|
|
|
// This function should always be called within a sqlutil.Writer for safety in SQLite.
|
|
func (d *Database) updateRoomState(
|
|
ctx context.Context, txn *sql.Tx,
|
|
removedEventIDs []string,
|
|
addedEvents []*rstypes.HeaderedEvent,
|
|
pduPosition types.StreamPosition,
|
|
topoPosition types.StreamPosition,
|
|
) error {
|
|
// remove first, then add, as we do not ever delete state, but do replace state which is a remove followed by an add.
|
|
for _, eventID := range removedEventIDs {
|
|
if err := d.CurrentRoomState.DeleteRoomStateByEventID(ctx, txn, eventID); err != nil {
|
|
return fmt.Errorf("d.CurrentRoomState.DeleteRoomStateByEventID: %w", err)
|
|
}
|
|
}
|
|
|
|
for _, event := range addedEvents {
|
|
if event.StateKey() == nil {
|
|
// ignore non state events
|
|
continue
|
|
}
|
|
var membership *string
|
|
if event.Type() == "m.room.member" {
|
|
value, err := event.Membership()
|
|
if err != nil {
|
|
return fmt.Errorf("event.Membership: %w", err)
|
|
}
|
|
membership = &value
|
|
if err = d.Memberships.UpsertMembership(ctx, txn, event, pduPosition, topoPosition); err != nil {
|
|
return fmt.Errorf("d.Memberships.UpsertMembership: %w", err)
|
|
}
|
|
}
|
|
|
|
if err := d.CurrentRoomState.UpsertRoomState(ctx, txn, event, membership, pduPosition); err != nil {
|
|
return fmt.Errorf("d.CurrentRoomState.UpsertRoomState: %w", err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (d *Database) GetFilter(
|
|
ctx context.Context, target *synctypes.Filter, localpart string, filterID string,
|
|
) error {
|
|
return d.Filter.SelectFilter(ctx, nil, target, localpart, filterID)
|
|
}
|
|
|
|
func (d *Database) PutFilter(
|
|
ctx context.Context, localpart string, filter *synctypes.Filter,
|
|
) (string, error) {
|
|
var filterID string
|
|
var err error
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
filterID, err = d.Filter.InsertFilter(ctx, txn, filter, localpart)
|
|
return err
|
|
})
|
|
return filterID, err
|
|
}
|
|
|
|
func (d *Database) RedactEvent(ctx context.Context, redactedEventID string, redactedBecause *rstypes.HeaderedEvent, querier api.QuerySenderIDAPI) error {
|
|
redactedEvents, err := d.Events(ctx, []string{redactedEventID})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(redactedEvents) == 0 {
|
|
logrus.WithField("event_id", redactedEventID).WithField("redaction_event", redactedBecause.EventID()).Warnf("missing redacted event for redaction")
|
|
return nil
|
|
}
|
|
eventToRedact := redactedEvents[0].PDU
|
|
redactionEvent := redactedBecause.PDU
|
|
if err = eventutil.RedactEvent(ctx, redactionEvent, eventToRedact, querier); err != nil {
|
|
return err
|
|
}
|
|
|
|
newEvent := &rstypes.HeaderedEvent{PDU: eventToRedact}
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
return d.OutputEvents.UpdateEventJSON(ctx, txn, newEvent)
|
|
})
|
|
return err
|
|
}
|
|
|
|
// fetchStateEvents converts the set of event IDs into a set of events. It will fetch any which are missing from the database.
|
|
// Returns a map of room ID to list of events.
|
|
func (d *Database) fetchStateEvents(
|
|
ctx context.Context, txn *sql.Tx,
|
|
roomIDToEventIDSet map[string]map[string]bool,
|
|
eventIDToEvent map[string]types.StreamEvent,
|
|
) (map[string][]types.StreamEvent, error) {
|
|
stateBetween := make(map[string][]types.StreamEvent)
|
|
missingEvents := make(map[string][]string)
|
|
for roomID, ids := range roomIDToEventIDSet {
|
|
events := stateBetween[roomID]
|
|
for id, need := range ids {
|
|
if !need {
|
|
continue // deleted state
|
|
}
|
|
e, ok := eventIDToEvent[id]
|
|
if ok {
|
|
events = append(events, e)
|
|
} else {
|
|
m := missingEvents[roomID]
|
|
m = append(m, id)
|
|
missingEvents[roomID] = m
|
|
}
|
|
}
|
|
stateBetween[roomID] = events
|
|
}
|
|
|
|
if len(missingEvents) > 0 {
|
|
// This happens when add_state_ids has an event ID which is not in the provided range.
|
|
// We need to explicitly fetch them.
|
|
allMissingEventIDs := []string{}
|
|
for _, missingEvIDs := range missingEvents {
|
|
allMissingEventIDs = append(allMissingEventIDs, missingEvIDs...)
|
|
}
|
|
evs, err := d.fetchMissingStateEvents(ctx, txn, allMissingEventIDs)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// we know we got them all otherwise an error would've been returned, so just loop the events
|
|
for _, ev := range evs {
|
|
roomID := ev.RoomID().String()
|
|
stateBetween[roomID] = append(stateBetween[roomID], ev)
|
|
}
|
|
}
|
|
return stateBetween, nil
|
|
}
|
|
|
|
func (d *Database) fetchMissingStateEvents(
|
|
ctx context.Context, txn *sql.Tx, eventIDs []string,
|
|
) ([]types.StreamEvent, error) {
|
|
// Fetch from the events table first so we pick up the stream ID for the
|
|
// event.
|
|
events, err := d.OutputEvents.SelectEvents(ctx, txn, eventIDs, nil, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
have := map[string]bool{}
|
|
for _, event := range events {
|
|
have[event.EventID()] = true
|
|
}
|
|
var missing []string
|
|
for _, eventID := range eventIDs {
|
|
if !have[eventID] {
|
|
missing = append(missing, eventID)
|
|
}
|
|
}
|
|
if len(missing) == 0 {
|
|
return events, nil
|
|
}
|
|
|
|
// If they are missing from the events table then they should be state
|
|
// events that we received from outside the main event stream.
|
|
// These should be in the room state table.
|
|
stateEvents, err := d.CurrentRoomState.SelectEventsWithEventIDs(ctx, txn, missing)
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(stateEvents) != len(missing) {
|
|
logrus.WithContext(ctx).Warnf("Failed to map all event IDs to events (got %d, wanted %d)", len(stateEvents), len(missing))
|
|
|
|
// TODO: Why is this happening? It's probably the roomserver. Uncomment
|
|
// this error again when we work out what it is and fix it, otherwise we
|
|
// just end up returning lots of 500s to the client and that breaks
|
|
// pretty much everything, rather than just sending what we have.
|
|
//return nil, fmt.Errorf("failed to map all event IDs to events: (got %d, wanted %d)", len(stateEvents), len(missing))
|
|
}
|
|
events = append(events, stateEvents...)
|
|
return events, nil
|
|
}
|
|
|
|
func (d *Database) StoreNewSendForDeviceMessage(
|
|
ctx context.Context, userID, deviceID string, event gomatrixserverlib.SendToDeviceEvent,
|
|
) (newPos types.StreamPosition, err error) {
|
|
j, err := json.Marshal(event)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
// Delegate the database write task to the SendToDeviceWriter. It'll guarantee
|
|
// that we don't lock the table for writes in more than one place.
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
newPos, err = d.SendToDevice.InsertSendToDeviceMessage(
|
|
ctx, txn, userID, deviceID, string(j),
|
|
)
|
|
return err
|
|
})
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
return newPos, nil
|
|
}
|
|
|
|
func (d *Database) CleanSendToDeviceUpdates(
|
|
ctx context.Context,
|
|
userID, deviceID string, before types.StreamPosition,
|
|
) (err error) {
|
|
if err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
return d.SendToDevice.DeleteSendToDeviceMessages(ctx, txn, userID, deviceID, before)
|
|
}); err != nil {
|
|
logrus.WithError(err).Errorf("Failed to clean up old send-to-device messages for user %q device %q", userID, deviceID)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getMembershipFromEvent returns the value of content.membership iff the event is a state event
|
|
// with type 'm.room.member' and state_key of userID. Otherwise, an empty string is returned.
|
|
func getMembershipFromEvent(ctx context.Context, ev gomatrixserverlib.PDU, userID string, rsAPI api.SyncRoomserverAPI) (string, string) {
|
|
if ev.StateKey() == nil || *ev.StateKey() == "" {
|
|
return "", ""
|
|
}
|
|
fullUser, err := spec.NewUserID(userID, true)
|
|
if err != nil {
|
|
return "", ""
|
|
}
|
|
senderID, err := rsAPI.QuerySenderIDForUser(ctx, ev.RoomID(), *fullUser)
|
|
if err != nil || senderID == nil {
|
|
return "", ""
|
|
}
|
|
|
|
if ev.Type() != "m.room.member" || !ev.StateKeyEquals(string(*senderID)) {
|
|
return "", ""
|
|
}
|
|
membership, err := ev.Membership()
|
|
if err != nil {
|
|
return "", ""
|
|
}
|
|
prevMembership := gjson.GetBytes(ev.Unsigned(), "prev_content.membership").Str
|
|
return membership, prevMembership
|
|
}
|
|
|
|
// StoreReceipt stores user receipts
|
|
func (d *Database) StoreReceipt(ctx context.Context, roomId, receiptType, userId, eventId string, timestamp spec.Timestamp) (pos types.StreamPosition, err error) {
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
pos, err = d.Receipts.UpsertReceipt(ctx, txn, roomId, receiptType, userId, eventId, timestamp)
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
func (d *Database) UpsertRoomUnreadNotificationCounts(ctx context.Context, userID, roomID string, notificationCount, highlightCount int) (pos types.StreamPosition, err error) {
|
|
err = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
pos, err = d.NotificationData.UpsertRoomUnreadCounts(ctx, txn, userID, roomID, notificationCount, highlightCount)
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
func (d *Database) SelectContextEvent(ctx context.Context, roomID, eventID string) (int, rstypes.HeaderedEvent, error) {
|
|
return d.OutputEvents.SelectContextEvent(ctx, nil, roomID, eventID)
|
|
}
|
|
|
|
func (d *Database) SelectContextBeforeEvent(ctx context.Context, id int, roomID string, filter *synctypes.RoomEventFilter) ([]*rstypes.HeaderedEvent, error) {
|
|
return d.OutputEvents.SelectContextBeforeEvent(ctx, nil, id, roomID, filter)
|
|
}
|
|
func (d *Database) SelectContextAfterEvent(ctx context.Context, id int, roomID string, filter *synctypes.RoomEventFilter) (int, []*rstypes.HeaderedEvent, error) {
|
|
return d.OutputEvents.SelectContextAfterEvent(ctx, nil, id, roomID, filter)
|
|
}
|
|
|
|
func (d *Database) IgnoresForUser(ctx context.Context, userID string) (*types.IgnoredUsers, error) {
|
|
return d.Ignores.SelectIgnores(ctx, nil, userID)
|
|
}
|
|
|
|
func (d *Database) UpdateIgnoresForUser(ctx context.Context, userID string, ignores *types.IgnoredUsers) error {
|
|
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
return d.Ignores.UpsertIgnores(ctx, txn, userID, ignores)
|
|
})
|
|
}
|
|
|
|
func (d *Database) UpdatePresence(ctx context.Context, userID string, presence types.Presence, statusMsg *string, lastActiveTS spec.Timestamp, fromSync bool) (types.StreamPosition, error) {
|
|
var pos types.StreamPosition
|
|
var err error
|
|
_ = d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
pos, err = d.Presence.UpsertPresence(ctx, txn, userID, statusMsg, presence, lastActiveTS, fromSync)
|
|
return nil
|
|
})
|
|
return pos, err
|
|
}
|
|
|
|
func (d *Database) GetPresences(ctx context.Context, userIDs []string) ([]*types.PresenceInternal, error) {
|
|
return d.Presence.GetPresenceForUsers(ctx, nil, userIDs)
|
|
}
|
|
|
|
func (d *Database) SelectMembershipForUser(ctx context.Context, roomID, userID string, pos int64) (membership string, topologicalPos int64, err error) {
|
|
return d.Memberships.SelectMembershipForUser(ctx, nil, roomID, userID, pos)
|
|
}
|
|
|
|
func (d *Database) ReIndex(ctx context.Context, limit, afterID int64) (map[int64]rstypes.HeaderedEvent, error) {
|
|
return d.OutputEvents.ReIndex(ctx, nil, limit, afterID, []string{
|
|
spec.MRoomName,
|
|
spec.MRoomTopic,
|
|
"m.room.message",
|
|
})
|
|
}
|
|
|
|
func (d *Database) UpdateRelations(ctx context.Context, event *rstypes.HeaderedEvent) error {
|
|
// No need to unmarshal if the event is a redaction
|
|
if event.Type() == spec.MRoomRedaction {
|
|
return nil
|
|
}
|
|
var content gomatrixserverlib.RelationContent
|
|
if err := json.Unmarshal(event.Content(), &content); err != nil {
|
|
logrus.WithError(err).Error("unable to unmarshal relation content")
|
|
return nil
|
|
}
|
|
switch {
|
|
case content.Relations == nil:
|
|
return nil
|
|
case content.Relations.EventID == "":
|
|
return nil
|
|
case content.Relations.RelationType == "":
|
|
return nil
|
|
default:
|
|
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
return d.Relations.InsertRelation(
|
|
ctx, txn, event.RoomID().String(), content.Relations.EventID,
|
|
event.EventID(), event.Type(), content.Relations.RelationType,
|
|
)
|
|
})
|
|
}
|
|
}
|
|
|
|
func (d *Database) RedactRelations(ctx context.Context, roomID, redactedEventID string) error {
|
|
return d.Writer.Do(d.DB, nil, func(txn *sql.Tx) error {
|
|
return d.Relations.DeleteRelation(ctx, txn, roomID, redactedEventID)
|
|
})
|
|
}
|
|
|
|
func (d *Database) SelectMemberships(
|
|
ctx context.Context,
|
|
roomID string, pos types.TopologyToken,
|
|
membership, notMembership *string,
|
|
) (eventIDs []string, err error) {
|
|
return d.Memberships.SelectMemberships(ctx, nil, roomID, pos, membership, notMembership)
|
|
}
|