mirror of
https://github.com/1f349/dendrite.git
synced 2024-12-23 16:54:08 +00:00
ed4097825b
It helps with the boilerplate.
160 lines
5.4 KiB
Go
160 lines
5.4 KiB
Go
// Copyright 2021 The Matrix.org Foundation C.I.C.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package sqlite3
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"encoding/json"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
)
|
|
|
|
const keyBackupVersionTableSchema = `
|
|
-- the metadata for each generation of encrypted e2e session backups
|
|
CREATE TABLE IF NOT EXISTS account_e2e_room_keys_versions (
|
|
user_id TEXT NOT NULL,
|
|
-- this means no 2 users will ever have the same version of e2e session backups which strictly
|
|
-- isn't necessary, but this is easy to do rather than SELECT MAX(version)+1.
|
|
version INTEGER PRIMARY KEY AUTOINCREMENT,
|
|
algorithm TEXT NOT NULL,
|
|
auth_data TEXT NOT NULL,
|
|
etag TEXT NOT NULL,
|
|
deleted INTEGER DEFAULT 0 NOT NULL
|
|
);
|
|
|
|
CREATE UNIQUE INDEX IF NOT EXISTS account_e2e_room_keys_versions_idx ON account_e2e_room_keys_versions(user_id, version);
|
|
`
|
|
|
|
const insertKeyBackupSQL = "" +
|
|
"INSERT INTO account_e2e_room_keys_versions(user_id, algorithm, auth_data, etag) VALUES ($1, $2, $3, $4) RETURNING version"
|
|
|
|
const updateKeyBackupAuthDataSQL = "" +
|
|
"UPDATE account_e2e_room_keys_versions SET auth_data = $1 WHERE user_id = $2 AND version = $3"
|
|
|
|
const updateKeyBackupETagSQL = "" +
|
|
"UPDATE account_e2e_room_keys_versions SET etag = $1 WHERE user_id = $2 AND version = $3"
|
|
|
|
const deleteKeyBackupSQL = "" +
|
|
"UPDATE account_e2e_room_keys_versions SET deleted=1 WHERE user_id = $1 AND version = $2"
|
|
|
|
const selectKeyBackupSQL = "" +
|
|
"SELECT algorithm, auth_data, etag, deleted FROM account_e2e_room_keys_versions WHERE user_id = $1 AND version = $2"
|
|
|
|
const selectLatestVersionSQL = "" +
|
|
"SELECT MAX(version) FROM account_e2e_room_keys_versions WHERE user_id = $1"
|
|
|
|
type keyBackupVersionStatements struct {
|
|
insertKeyBackupStmt *sql.Stmt
|
|
updateKeyBackupAuthDataStmt *sql.Stmt
|
|
deleteKeyBackupStmt *sql.Stmt
|
|
selectKeyBackupStmt *sql.Stmt
|
|
selectLatestVersionStmt *sql.Stmt
|
|
updateKeyBackupETagStmt *sql.Stmt
|
|
}
|
|
|
|
func (s *keyBackupVersionStatements) prepare(db *sql.DB) (err error) {
|
|
_, err = db.Exec(keyBackupVersionTableSchema)
|
|
if err != nil {
|
|
return
|
|
}
|
|
return sqlutil.StatementList{
|
|
{&s.insertKeyBackupStmt, insertKeyBackupSQL},
|
|
{&s.updateKeyBackupAuthDataStmt, updateKeyBackupAuthDataSQL},
|
|
{&s.deleteKeyBackupStmt, deleteKeyBackupSQL},
|
|
{&s.selectKeyBackupStmt, selectKeyBackupSQL},
|
|
{&s.selectLatestVersionStmt, selectLatestVersionSQL},
|
|
{&s.updateKeyBackupETagStmt, updateKeyBackupETagSQL},
|
|
}.Prepare(db)
|
|
}
|
|
|
|
func (s *keyBackupVersionStatements) insertKeyBackup(
|
|
ctx context.Context, txn *sql.Tx, userID, algorithm string, authData json.RawMessage, etag string,
|
|
) (version string, err error) {
|
|
var versionInt int64
|
|
err = txn.Stmt(s.insertKeyBackupStmt).QueryRowContext(ctx, userID, algorithm, string(authData), etag).Scan(&versionInt)
|
|
return strconv.FormatInt(versionInt, 10), err
|
|
}
|
|
|
|
func (s *keyBackupVersionStatements) updateKeyBackupAuthData(
|
|
ctx context.Context, txn *sql.Tx, userID, version string, authData json.RawMessage,
|
|
) error {
|
|
versionInt, err := strconv.ParseInt(version, 10, 64)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid version")
|
|
}
|
|
_, err = txn.Stmt(s.updateKeyBackupAuthDataStmt).ExecContext(ctx, string(authData), userID, versionInt)
|
|
return err
|
|
}
|
|
|
|
func (s *keyBackupVersionStatements) updateKeyBackupETag(
|
|
ctx context.Context, txn *sql.Tx, userID, version, etag string,
|
|
) error {
|
|
versionInt, err := strconv.ParseInt(version, 10, 64)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid version")
|
|
}
|
|
_, err = txn.Stmt(s.updateKeyBackupETagStmt).ExecContext(ctx, etag, userID, versionInt)
|
|
return err
|
|
}
|
|
|
|
func (s *keyBackupVersionStatements) deleteKeyBackup(
|
|
ctx context.Context, txn *sql.Tx, userID, version string,
|
|
) (bool, error) {
|
|
versionInt, err := strconv.ParseInt(version, 10, 64)
|
|
if err != nil {
|
|
return false, fmt.Errorf("invalid version")
|
|
}
|
|
result, err := txn.Stmt(s.deleteKeyBackupStmt).ExecContext(ctx, userID, versionInt)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
ra, err := result.RowsAffected()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
return ra == 1, nil
|
|
}
|
|
|
|
func (s *keyBackupVersionStatements) selectKeyBackup(
|
|
ctx context.Context, txn *sql.Tx, userID, version string,
|
|
) (versionResult, algorithm string, authData json.RawMessage, etag string, deleted bool, err error) {
|
|
var versionInt int64
|
|
if version == "" {
|
|
var v *int64 // allows nulls
|
|
if err = txn.Stmt(s.selectLatestVersionStmt).QueryRowContext(ctx, userID).Scan(&v); err != nil {
|
|
return
|
|
}
|
|
if v == nil {
|
|
err = sql.ErrNoRows
|
|
return
|
|
}
|
|
versionInt = *v
|
|
} else {
|
|
if versionInt, err = strconv.ParseInt(version, 10, 64); err != nil {
|
|
return
|
|
}
|
|
}
|
|
versionResult = strconv.FormatInt(versionInt, 10)
|
|
var deletedInt int
|
|
var authDataStr string
|
|
err = txn.Stmt(s.selectKeyBackupStmt).QueryRowContext(ctx, userID, versionInt).Scan(&algorithm, &authDataStr, &etag, &deletedInt)
|
|
deleted = deletedInt == 1
|
|
authData = json.RawMessage(authDataStr)
|
|
return
|
|
}
|