aboutsummaryrefslogtreecommitdiff
path: root/userapi/storage/postgres/key_backup_table.go
diff options
context:
space:
mode:
authorNeil Alexander <neilalexander@users.noreply.github.com>2022-02-18 11:31:05 +0000
committerGitHub <noreply@github.com>2022-02-18 11:31:05 +0000
commit153bfbbea579dfa10e8e804036f17c1a33b6fe80 (patch)
treee135dcefc59618d7b86cd8687c1a2a304385ce45 /userapi/storage/postgres/key_backup_table.go
parent0a7dea44505f703af1e7e069602ca95aa5a83700 (diff)
Merge both user API databases into one (#2186)
* Merge user API databases into one * Remove DeviceDatabase from config * Fix tests * Try that again * Clean up keyserver device keys when the devices no longer exist in the user API * Tweak ordering * Fix UserExists flag, device check * Allow including empty entries so we can clean them up * Remove logging
Diffstat (limited to 'userapi/storage/postgres/key_backup_table.go')
-rw-r--r--userapi/storage/postgres/key_backup_table.go164
1 files changed, 164 insertions, 0 deletions
diff --git a/userapi/storage/postgres/key_backup_table.go b/userapi/storage/postgres/key_backup_table.go
new file mode 100644
index 00000000..c1402d4d
--- /dev/null
+++ b/userapi/storage/postgres/key_backup_table.go
@@ -0,0 +1,164 @@
+// Copyright 2021 The Matrix.org Foundation C.I.C.
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package postgres
+
+import (
+ "context"
+ "database/sql"
+ "encoding/json"
+
+ "github.com/matrix-org/dendrite/internal"
+ "github.com/matrix-org/dendrite/internal/sqlutil"
+ "github.com/matrix-org/dendrite/userapi/api"
+)
+
+const keyBackupTableSchema = `
+CREATE TABLE IF NOT EXISTS account_e2e_room_keys (
+ user_id TEXT NOT NULL,
+ room_id TEXT NOT NULL,
+ session_id TEXT NOT NULL,
+
+ version TEXT NOT NULL,
+ first_message_index INTEGER NOT NULL,
+ forwarded_count INTEGER NOT NULL,
+ is_verified BOOLEAN NOT NULL,
+ session_data TEXT NOT NULL
+);
+CREATE UNIQUE INDEX IF NOT EXISTS e2e_room_keys_idx ON account_e2e_room_keys(user_id, room_id, session_id, version);
+CREATE INDEX IF NOT EXISTS e2e_room_keys_versions_idx ON account_e2e_room_keys(user_id, version);
+`
+
+const insertBackupKeySQL = "" +
+ "INSERT INTO account_e2e_room_keys(user_id, room_id, session_id, version, first_message_index, forwarded_count, is_verified, session_data) " +
+ "VALUES ($1, $2, $3, $4, $5, $6, $7, $8)"
+
+const updateBackupKeySQL = "" +
+ "UPDATE account_e2e_room_keys SET first_message_index=$1, forwarded_count=$2, is_verified=$3, session_data=$4 " +
+ "WHERE user_id=$5 AND room_id=$6 AND session_id=$7 AND version=$8"
+
+const countKeysSQL = "" +
+ "SELECT COUNT(*) FROM account_e2e_room_keys WHERE user_id = $1 AND version = $2"
+
+const selectKeysSQL = "" +
+ "SELECT room_id, session_id, first_message_index, forwarded_count, is_verified, session_data FROM account_e2e_room_keys " +
+ "WHERE user_id = $1 AND version = $2"
+
+const selectKeysByRoomIDSQL = "" +
+ "SELECT room_id, session_id, first_message_index, forwarded_count, is_verified, session_data FROM account_e2e_room_keys " +
+ "WHERE user_id = $1 AND version = $2 AND room_id = $3"
+
+const selectKeysByRoomIDAndSessionIDSQL = "" +
+ "SELECT room_id, session_id, first_message_index, forwarded_count, is_verified, session_data FROM account_e2e_room_keys " +
+ "WHERE user_id = $1 AND version = $2 AND room_id = $3 AND session_id = $4"
+
+type keyBackupStatements struct {
+ insertBackupKeyStmt *sql.Stmt
+ updateBackupKeyStmt *sql.Stmt
+ countKeysStmt *sql.Stmt
+ selectKeysStmt *sql.Stmt
+ selectKeysByRoomIDStmt *sql.Stmt
+ selectKeysByRoomIDAndSessionIDStmt *sql.Stmt
+}
+
+func (s *keyBackupStatements) prepare(db *sql.DB) (err error) {
+ _, err = db.Exec(keyBackupTableSchema)
+ if err != nil {
+ return
+ }
+ return sqlutil.StatementList{
+ {&s.insertBackupKeyStmt, insertBackupKeySQL},
+ {&s.updateBackupKeyStmt, updateBackupKeySQL},
+ {&s.countKeysStmt, countKeysSQL},
+ {&s.selectKeysStmt, selectKeysSQL},
+ {&s.selectKeysByRoomIDStmt, selectKeysByRoomIDSQL},
+ {&s.selectKeysByRoomIDAndSessionIDStmt, selectKeysByRoomIDAndSessionIDSQL},
+ }.Prepare(db)
+}
+
+func (s keyBackupStatements) countKeys(
+ ctx context.Context, txn *sql.Tx, userID, version string,
+) (count int64, err error) {
+ err = txn.Stmt(s.countKeysStmt).QueryRowContext(ctx, userID, version).Scan(&count)
+ return
+}
+
+func (s *keyBackupStatements) insertBackupKey(
+ ctx context.Context, txn *sql.Tx, userID, version string, key api.InternalKeyBackupSession,
+) (err error) {
+ _, err = txn.Stmt(s.insertBackupKeyStmt).ExecContext(
+ ctx, userID, key.RoomID, key.SessionID, version, key.FirstMessageIndex, key.ForwardedCount, key.IsVerified, string(key.SessionData),
+ )
+ return
+}
+
+func (s *keyBackupStatements) updateBackupKey(
+ ctx context.Context, txn *sql.Tx, userID, version string, key api.InternalKeyBackupSession,
+) (err error) {
+ _, err = txn.Stmt(s.updateBackupKeyStmt).ExecContext(
+ ctx, key.FirstMessageIndex, key.ForwardedCount, key.IsVerified, string(key.SessionData), userID, key.RoomID, key.SessionID, version,
+ )
+ return
+}
+
+func (s *keyBackupStatements) selectKeys(
+ ctx context.Context, txn *sql.Tx, userID, version string,
+) (map[string]map[string]api.KeyBackupSession, error) {
+ rows, err := txn.Stmt(s.selectKeysStmt).QueryContext(ctx, userID, version)
+ if err != nil {
+ return nil, err
+ }
+ return unpackKeys(ctx, rows)
+}
+
+func (s *keyBackupStatements) selectKeysByRoomID(
+ ctx context.Context, txn *sql.Tx, userID, version, roomID string,
+) (map[string]map[string]api.KeyBackupSession, error) {
+ rows, err := txn.Stmt(s.selectKeysByRoomIDStmt).QueryContext(ctx, userID, version, roomID)
+ if err != nil {
+ return nil, err
+ }
+ return unpackKeys(ctx, rows)
+}
+
+func (s *keyBackupStatements) selectKeysByRoomIDAndSessionID(
+ ctx context.Context, txn *sql.Tx, userID, version, roomID, sessionID string,
+) (map[string]map[string]api.KeyBackupSession, error) {
+ rows, err := txn.Stmt(s.selectKeysByRoomIDAndSessionIDStmt).QueryContext(ctx, userID, version, roomID, sessionID)
+ if err != nil {
+ return nil, err
+ }
+ return unpackKeys(ctx, rows)
+}
+
+func unpackKeys(ctx context.Context, rows *sql.Rows) (map[string]map[string]api.KeyBackupSession, error) {
+ result := make(map[string]map[string]api.KeyBackupSession)
+ defer internal.CloseAndLogIfError(ctx, rows, "selectKeysStmt.Close failed")
+ for rows.Next() {
+ var key api.InternalKeyBackupSession
+ // room_id, session_id, first_message_index, forwarded_count, is_verified, session_data
+ var sessionDataStr string
+ if err := rows.Scan(&key.RoomID, &key.SessionID, &key.FirstMessageIndex, &key.ForwardedCount, &key.IsVerified, &sessionDataStr); err != nil {
+ return nil, err
+ }
+ key.SessionData = json.RawMessage(sessionDataStr)
+ roomData := result[key.RoomID]
+ if roomData == nil {
+ roomData = make(map[string]api.KeyBackupSession)
+ }
+ roomData[key.SessionID] = key.KeyBackupSession
+ result[key.RoomID] = roomData
+ }
+ return result, nil
+}