2021-05-24 19:13:31 +00:00
|
|
|
package soju
|
|
|
|
|
|
|
|
import (
|
2021-10-14 14:13:24 +00:00
|
|
|
"context"
|
2021-05-24 19:13:31 +00:00
|
|
|
"database/sql"
|
|
|
|
"fmt"
|
|
|
|
"math"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
_ "github.com/mattn/go-sqlite3"
|
|
|
|
)
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
const sqliteQueryTimeout = 5 * time.Second
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
const sqliteSchema = `
|
|
|
|
CREATE TABLE User (
|
|
|
|
id INTEGER PRIMARY KEY,
|
2021-11-02 21:58:50 +00:00
|
|
|
username TEXT NOT NULL UNIQUE,
|
|
|
|
password TEXT,
|
2021-06-25 18:33:13 +00:00
|
|
|
admin INTEGER NOT NULL DEFAULT 0,
|
2021-11-02 21:58:50 +00:00
|
|
|
realname TEXT
|
2021-05-24 19:13:31 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
CREATE TABLE Network (
|
|
|
|
id INTEGER PRIMARY KEY,
|
2021-11-02 21:58:50 +00:00
|
|
|
name TEXT,
|
2021-05-24 19:13:31 +00:00
|
|
|
user INTEGER NOT NULL,
|
2021-11-02 21:58:50 +00:00
|
|
|
addr TEXT NOT NULL,
|
2021-11-02 22:33:17 +00:00
|
|
|
nick TEXT,
|
2021-11-02 21:58:50 +00:00
|
|
|
username TEXT,
|
|
|
|
realname TEXT,
|
|
|
|
pass TEXT,
|
|
|
|
connect_commands TEXT,
|
|
|
|
sasl_mechanism TEXT,
|
|
|
|
sasl_plain_username TEXT,
|
|
|
|
sasl_plain_password TEXT,
|
|
|
|
sasl_external_cert BLOB,
|
|
|
|
sasl_external_key BLOB,
|
2021-05-26 08:49:52 +00:00
|
|
|
enabled INTEGER NOT NULL DEFAULT 1,
|
2021-05-24 19:13:31 +00:00
|
|
|
FOREIGN KEY(user) REFERENCES User(id),
|
|
|
|
UNIQUE(user, addr, nick),
|
|
|
|
UNIQUE(user, name)
|
|
|
|
);
|
|
|
|
|
|
|
|
CREATE TABLE Channel (
|
|
|
|
id INTEGER PRIMARY KEY,
|
|
|
|
network INTEGER NOT NULL,
|
2021-11-02 21:58:50 +00:00
|
|
|
name TEXT NOT NULL,
|
|
|
|
key TEXT,
|
2021-05-24 19:13:31 +00:00
|
|
|
detached INTEGER NOT NULL DEFAULT 0,
|
2021-11-02 21:58:50 +00:00
|
|
|
detached_internal_msgid TEXT,
|
2021-05-24 19:13:31 +00:00
|
|
|
relay_detached INTEGER NOT NULL DEFAULT 0,
|
|
|
|
reattach_on INTEGER NOT NULL DEFAULT 0,
|
|
|
|
detach_after INTEGER NOT NULL DEFAULT 0,
|
|
|
|
detach_on INTEGER NOT NULL DEFAULT 0,
|
|
|
|
FOREIGN KEY(network) REFERENCES Network(id),
|
|
|
|
UNIQUE(network, name)
|
|
|
|
);
|
|
|
|
|
|
|
|
CREATE TABLE DeliveryReceipt (
|
|
|
|
id INTEGER PRIMARY KEY,
|
|
|
|
network INTEGER NOT NULL,
|
2021-11-02 21:58:50 +00:00
|
|
|
target TEXT NOT NULL,
|
|
|
|
client TEXT,
|
|
|
|
internal_msgid TEXT NOT NULL,
|
2021-05-24 19:13:31 +00:00
|
|
|
FOREIGN KEY(network) REFERENCES Network(id),
|
|
|
|
UNIQUE(network, target, client)
|
|
|
|
);
|
|
|
|
`
|
|
|
|
|
|
|
|
var sqliteMigrations = []string{
|
|
|
|
"", // migration #0 is reserved for schema initialization
|
|
|
|
"ALTER TABLE Network ADD COLUMN connect_commands VARCHAR(1023)",
|
|
|
|
"ALTER TABLE Channel ADD COLUMN detached INTEGER NOT NULL DEFAULT 0",
|
|
|
|
"ALTER TABLE Network ADD COLUMN sasl_external_cert BLOB DEFAULT NULL",
|
|
|
|
"ALTER TABLE Network ADD COLUMN sasl_external_key BLOB DEFAULT NULL",
|
|
|
|
"ALTER TABLE User ADD COLUMN admin INTEGER NOT NULL DEFAULT 0",
|
|
|
|
`
|
|
|
|
CREATE TABLE UserNew (
|
|
|
|
id INTEGER PRIMARY KEY,
|
|
|
|
username VARCHAR(255) NOT NULL UNIQUE,
|
|
|
|
password VARCHAR(255),
|
|
|
|
admin INTEGER NOT NULL DEFAULT 0
|
|
|
|
);
|
|
|
|
INSERT INTO UserNew SELECT rowid, username, password, admin FROM User;
|
|
|
|
DROP TABLE User;
|
|
|
|
ALTER TABLE UserNew RENAME TO User;
|
|
|
|
`,
|
|
|
|
`
|
|
|
|
CREATE TABLE NetworkNew (
|
|
|
|
id INTEGER PRIMARY KEY,
|
|
|
|
name VARCHAR(255),
|
|
|
|
user INTEGER NOT NULL,
|
|
|
|
addr VARCHAR(255) NOT NULL,
|
|
|
|
nick VARCHAR(255) NOT NULL,
|
|
|
|
username VARCHAR(255),
|
|
|
|
realname VARCHAR(255),
|
|
|
|
pass VARCHAR(255),
|
|
|
|
connect_commands VARCHAR(1023),
|
|
|
|
sasl_mechanism VARCHAR(255),
|
|
|
|
sasl_plain_username VARCHAR(255),
|
|
|
|
sasl_plain_password VARCHAR(255),
|
|
|
|
sasl_external_cert BLOB DEFAULT NULL,
|
|
|
|
sasl_external_key BLOB DEFAULT NULL,
|
|
|
|
FOREIGN KEY(user) REFERENCES User(id),
|
|
|
|
UNIQUE(user, addr, nick),
|
|
|
|
UNIQUE(user, name)
|
|
|
|
);
|
|
|
|
INSERT INTO NetworkNew
|
|
|
|
SELECT Network.id, name, User.id as user, addr, nick,
|
|
|
|
Network.username, realname, pass, connect_commands,
|
|
|
|
sasl_mechanism, sasl_plain_username, sasl_plain_password,
|
|
|
|
sasl_external_cert, sasl_external_key
|
|
|
|
FROM Network
|
|
|
|
JOIN User ON Network.user = User.username;
|
|
|
|
DROP TABLE Network;
|
|
|
|
ALTER TABLE NetworkNew RENAME TO Network;
|
|
|
|
`,
|
|
|
|
`
|
|
|
|
ALTER TABLE Channel ADD COLUMN relay_detached INTEGER NOT NULL DEFAULT 0;
|
|
|
|
ALTER TABLE Channel ADD COLUMN reattach_on INTEGER NOT NULL DEFAULT 0;
|
|
|
|
ALTER TABLE Channel ADD COLUMN detach_after INTEGER NOT NULL DEFAULT 0;
|
|
|
|
ALTER TABLE Channel ADD COLUMN detach_on INTEGER NOT NULL DEFAULT 0;
|
|
|
|
`,
|
|
|
|
`
|
|
|
|
CREATE TABLE DeliveryReceipt (
|
|
|
|
id INTEGER PRIMARY KEY,
|
|
|
|
network INTEGER NOT NULL,
|
|
|
|
target VARCHAR(255) NOT NULL,
|
|
|
|
client VARCHAR(255),
|
|
|
|
internal_msgid VARCHAR(255) NOT NULL,
|
|
|
|
FOREIGN KEY(network) REFERENCES Network(id),
|
|
|
|
UNIQUE(network, target, client)
|
|
|
|
);
|
|
|
|
`,
|
|
|
|
"ALTER TABLE Channel ADD COLUMN detached_internal_msgid VARCHAR(255)",
|
2021-05-26 08:49:52 +00:00
|
|
|
"ALTER TABLE Network ADD COLUMN enabled INTEGER NOT NULL DEFAULT 1",
|
2021-06-25 18:33:13 +00:00
|
|
|
"ALTER TABLE User ADD COLUMN realname VARCHAR(255)",
|
2021-11-02 22:33:17 +00:00
|
|
|
`
|
|
|
|
CREATE TABLE NetworkNew (
|
|
|
|
id INTEGER PRIMARY KEY,
|
|
|
|
name TEXT,
|
|
|
|
user INTEGER NOT NULL,
|
|
|
|
addr TEXT NOT NULL,
|
|
|
|
nick TEXT,
|
|
|
|
username TEXT,
|
|
|
|
realname TEXT,
|
|
|
|
pass TEXT,
|
|
|
|
connect_commands TEXT,
|
|
|
|
sasl_mechanism TEXT,
|
|
|
|
sasl_plain_username TEXT,
|
|
|
|
sasl_plain_password TEXT,
|
|
|
|
sasl_external_cert BLOB,
|
|
|
|
sasl_external_key BLOB,
|
|
|
|
enabled INTEGER NOT NULL DEFAULT 1,
|
|
|
|
FOREIGN KEY(user) REFERENCES User(id),
|
|
|
|
UNIQUE(user, addr, nick),
|
|
|
|
UNIQUE(user, name)
|
|
|
|
);
|
|
|
|
INSERT INTO NetworkNew
|
|
|
|
SELECT id, name, user, addr, nick, username, realname, pass,
|
|
|
|
connect_commands, sasl_mechanism, sasl_plain_username,
|
|
|
|
sasl_plain_password, sasl_external_cert, sasl_external_key,
|
|
|
|
enabled
|
|
|
|
FROM Network;
|
|
|
|
DROP TABLE Network;
|
|
|
|
ALTER TABLE NetworkNew RENAME TO Network;
|
|
|
|
`,
|
2021-05-24 19:13:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type SqliteDB struct {
|
|
|
|
lock sync.RWMutex
|
|
|
|
db *sql.DB
|
|
|
|
}
|
|
|
|
|
2021-10-08 17:15:56 +00:00
|
|
|
func OpenSqliteDB(source string) (Database, error) {
|
|
|
|
sqlSqliteDB, err := sql.Open("sqlite3", source)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
db := &SqliteDB{db: sqlSqliteDB}
|
|
|
|
if err := db.upgrade(); err != nil {
|
2021-09-13 14:59:41 +00:00
|
|
|
sqlSqliteDB.Close()
|
2021-05-24 19:13:31 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return db, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (db *SqliteDB) Close() error {
|
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
return db.db.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (db *SqliteDB) upgrade() error {
|
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
|
|
|
var version int
|
|
|
|
if err := db.db.QueryRow("PRAGMA user_version").Scan(&version); err != nil {
|
|
|
|
return fmt.Errorf("failed to query schema version: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if version == len(sqliteMigrations) {
|
|
|
|
return nil
|
|
|
|
} else if version > len(sqliteMigrations) {
|
|
|
|
return fmt.Errorf("soju (version %d) older than schema (version %d)", len(sqliteMigrations), version)
|
|
|
|
}
|
|
|
|
|
|
|
|
tx, err := db.db.Begin()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer tx.Rollback()
|
|
|
|
|
|
|
|
if version == 0 {
|
|
|
|
if _, err := tx.Exec(sqliteSchema); err != nil {
|
|
|
|
return fmt.Errorf("failed to initialize schema: %v", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
for i := version; i < len(sqliteMigrations); i++ {
|
|
|
|
if _, err := tx.Exec(sqliteMigrations[i]); err != nil {
|
|
|
|
return fmt.Errorf("failed to execute migration #%v: %v", i, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// For some reason prepared statements don't work here
|
|
|
|
_, err = tx.Exec(fmt.Sprintf("PRAGMA user_version = %d", len(sqliteMigrations)))
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to bump schema version: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tx.Commit()
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) Stats(ctx context.Context) (*DatabaseStats, error) {
|
2021-10-05 17:31:06 +00:00
|
|
|
db.lock.RLock()
|
|
|
|
defer db.lock.RUnlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-10-05 17:31:06 +00:00
|
|
|
var stats DatabaseStats
|
2021-10-14 14:13:24 +00:00
|
|
|
row := db.db.QueryRowContext(ctx, `SELECT
|
2021-10-05 17:31:06 +00:00
|
|
|
(SELECT COUNT(*) FROM User) AS users,
|
|
|
|
(SELECT COUNT(*) FROM Network) AS networks,
|
|
|
|
(SELECT COUNT(*) FROM Channel) AS channels`)
|
|
|
|
if err := row.Scan(&stats.Users, &stats.Networks, &stats.Channels); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &stats, nil
|
|
|
|
}
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
func toNullString(s string) sql.NullString {
|
|
|
|
return sql.NullString{
|
|
|
|
String: s,
|
|
|
|
Valid: s != "",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) ListUsers(ctx context.Context) ([]User, error) {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.RLock()
|
|
|
|
defer db.lock.RUnlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
rows, err := db.db.QueryContext(ctx,
|
|
|
|
"SELECT id, username, password, admin, realname FROM User")
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer rows.Close()
|
|
|
|
|
|
|
|
var users []User
|
|
|
|
for rows.Next() {
|
|
|
|
var user User
|
2021-10-05 09:10:48 +00:00
|
|
|
var password, realname sql.NullString
|
|
|
|
if err := rows.Scan(&user.ID, &user.Username, &password, &user.Admin, &realname); err != nil {
|
2021-05-24 19:13:31 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
user.Password = password.String
|
2021-10-05 09:10:48 +00:00
|
|
|
user.Realname = realname.String
|
2021-05-24 19:13:31 +00:00
|
|
|
users = append(users, user)
|
|
|
|
}
|
|
|
|
if err := rows.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return users, nil
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) GetUser(ctx context.Context, username string) (*User, error) {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.RLock()
|
|
|
|
defer db.lock.RUnlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
user := &User{Username: username}
|
|
|
|
|
2021-06-25 18:33:13 +00:00
|
|
|
var password, realname sql.NullString
|
2021-10-14 14:13:24 +00:00
|
|
|
row := db.db.QueryRowContext(ctx,
|
|
|
|
"SELECT id, password, admin, realname FROM User WHERE username = ?",
|
|
|
|
username)
|
2021-06-25 18:33:13 +00:00
|
|
|
if err := row.Scan(&user.ID, &password, &user.Admin, &realname); err != nil {
|
2021-05-24 19:13:31 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
user.Password = password.String
|
2021-06-25 18:33:13 +00:00
|
|
|
user.Realname = realname.String
|
2021-05-24 19:13:31 +00:00
|
|
|
return user, nil
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) StoreUser(ctx context.Context, user *User) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-09-27 14:54:06 +00:00
|
|
|
args := []interface{}{
|
|
|
|
sql.Named("username", user.Username),
|
|
|
|
sql.Named("password", toNullString(user.Password)),
|
|
|
|
sql.Named("admin", user.Admin),
|
|
|
|
sql.Named("realname", toNullString(user.Realname)),
|
|
|
|
}
|
2021-05-24 19:13:31 +00:00
|
|
|
|
|
|
|
var err error
|
|
|
|
if user.ID != 0 {
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = db.db.ExecContext(ctx, `
|
|
|
|
UPDATE User SET password = :password, admin = :admin,
|
|
|
|
realname = :realname WHERE username = :username`,
|
|
|
|
args...)
|
2021-05-24 19:13:31 +00:00
|
|
|
} else {
|
|
|
|
var res sql.Result
|
2021-10-14 14:13:24 +00:00
|
|
|
res, err = db.db.ExecContext(ctx, `
|
|
|
|
INSERT INTO
|
|
|
|
User(username, password, admin, realname)
|
|
|
|
VALUES (:username, :password, :admin, :realname)`,
|
|
|
|
args...)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
user.ID, err = res.LastInsertId()
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) DeleteUser(ctx context.Context, id int64) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
tx, err := db.db.Begin()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer tx.Rollback()
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, `DELETE FROM DeliveryReceipt
|
2021-09-13 16:24:01 +00:00
|
|
|
WHERE id IN (
|
|
|
|
SELECT DeliveryReceipt.id
|
|
|
|
FROM DeliveryReceipt
|
|
|
|
JOIN Network ON DeliveryReceipt.network = Network.id
|
|
|
|
WHERE Network.user = ?
|
|
|
|
)`, id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, `DELETE FROM Channel
|
2021-05-24 19:13:31 +00:00
|
|
|
WHERE id IN (
|
|
|
|
SELECT Channel.id
|
|
|
|
FROM Channel
|
|
|
|
JOIN Network ON Channel.network = Network.id
|
|
|
|
WHERE Network.user = ?
|
|
|
|
)`, id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, "DELETE FROM Network WHERE user = ?", id)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, "DELETE FROM User WHERE id = ?", id)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tx.Commit()
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) ListNetworks(ctx context.Context, userID int64) ([]Network, error) {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.RLock()
|
|
|
|
defer db.lock.RUnlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
rows, err := db.db.QueryContext(ctx, `
|
|
|
|
SELECT id, name, addr, nick, username, realname, pass,
|
2021-05-24 19:13:31 +00:00
|
|
|
connect_commands, sasl_mechanism, sasl_plain_username, sasl_plain_password,
|
2021-05-26 08:49:52 +00:00
|
|
|
sasl_external_cert, sasl_external_key, enabled
|
2021-05-24 19:13:31 +00:00
|
|
|
FROM Network
|
|
|
|
WHERE user = ?`,
|
|
|
|
userID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer rows.Close()
|
|
|
|
|
|
|
|
var networks []Network
|
|
|
|
for rows.Next() {
|
|
|
|
var net Network
|
2021-11-02 22:33:17 +00:00
|
|
|
var name, nick, username, realname, pass, connectCommands sql.NullString
|
2021-05-24 19:13:31 +00:00
|
|
|
var saslMechanism, saslPlainUsername, saslPlainPassword sql.NullString
|
2021-11-02 22:33:17 +00:00
|
|
|
err := rows.Scan(&net.ID, &name, &net.Addr, &nick, &username, &realname,
|
2021-05-24 19:13:31 +00:00
|
|
|
&pass, &connectCommands, &saslMechanism, &saslPlainUsername, &saslPlainPassword,
|
2021-05-26 08:49:52 +00:00
|
|
|
&net.SASL.External.CertBlob, &net.SASL.External.PrivKeyBlob, &net.Enabled)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
net.Name = name.String
|
2021-11-02 22:33:17 +00:00
|
|
|
net.Nick = nick.String
|
2021-05-24 19:13:31 +00:00
|
|
|
net.Username = username.String
|
|
|
|
net.Realname = realname.String
|
|
|
|
net.Pass = pass.String
|
|
|
|
if connectCommands.Valid {
|
|
|
|
net.ConnectCommands = strings.Split(connectCommands.String, "\r\n")
|
|
|
|
}
|
|
|
|
net.SASL.Mechanism = saslMechanism.String
|
|
|
|
net.SASL.Plain.Username = saslPlainUsername.String
|
|
|
|
net.SASL.Plain.Password = saslPlainPassword.String
|
|
|
|
networks = append(networks, net)
|
|
|
|
}
|
|
|
|
if err := rows.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return networks, nil
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) StoreNetwork(ctx context.Context, userID int64, network *Network) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
var saslMechanism, saslPlainUsername, saslPlainPassword sql.NullString
|
|
|
|
if network.SASL.Mechanism != "" {
|
|
|
|
saslMechanism = toNullString(network.SASL.Mechanism)
|
|
|
|
switch network.SASL.Mechanism {
|
|
|
|
case "PLAIN":
|
|
|
|
saslPlainUsername = toNullString(network.SASL.Plain.Username)
|
|
|
|
saslPlainPassword = toNullString(network.SASL.Plain.Password)
|
|
|
|
network.SASL.External.CertBlob = nil
|
|
|
|
network.SASL.External.PrivKeyBlob = nil
|
|
|
|
case "EXTERNAL":
|
|
|
|
// keep saslPlain* nil
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("soju: cannot store network: unsupported SASL mechanism %q", network.SASL.Mechanism)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-27 14:54:06 +00:00
|
|
|
args := []interface{}{
|
|
|
|
sql.Named("name", toNullString(network.Name)),
|
|
|
|
sql.Named("addr", network.Addr),
|
2021-11-02 22:33:17 +00:00
|
|
|
sql.Named("nick", toNullString(network.Nick)),
|
2021-09-27 14:54:06 +00:00
|
|
|
sql.Named("username", toNullString(network.Username)),
|
|
|
|
sql.Named("realname", toNullString(network.Realname)),
|
|
|
|
sql.Named("pass", toNullString(network.Pass)),
|
|
|
|
sql.Named("connect_commands", toNullString(strings.Join(network.ConnectCommands, "\r\n"))),
|
|
|
|
sql.Named("sasl_mechanism", saslMechanism),
|
|
|
|
sql.Named("sasl_plain_username", saslPlainUsername),
|
|
|
|
sql.Named("sasl_plain_password", saslPlainPassword),
|
|
|
|
sql.Named("sasl_external_cert", network.SASL.External.CertBlob),
|
|
|
|
sql.Named("sasl_external_key", network.SASL.External.PrivKeyBlob),
|
|
|
|
sql.Named("enabled", network.Enabled),
|
|
|
|
|
|
|
|
sql.Named("id", network.ID), // only for UPDATE
|
|
|
|
sql.Named("user", userID), // only for INSERT
|
|
|
|
}
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
var err error
|
|
|
|
if network.ID != 0 {
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = db.db.ExecContext(ctx, `
|
2021-09-27 14:54:06 +00:00
|
|
|
UPDATE Network
|
|
|
|
SET name = :name, addr = :addr, nick = :nick, username = :username,
|
|
|
|
realname = :realname, pass = :pass, connect_commands = :connect_commands,
|
|
|
|
sasl_mechanism = :sasl_mechanism, sasl_plain_username = :sasl_plain_username, sasl_plain_password = :sasl_plain_password,
|
|
|
|
sasl_external_cert = :sasl_external_cert, sasl_external_key = :sasl_external_key,
|
|
|
|
enabled = :enabled
|
|
|
|
WHERE id = :id`, args...)
|
2021-05-24 19:13:31 +00:00
|
|
|
} else {
|
|
|
|
var res sql.Result
|
2021-10-14 14:13:24 +00:00
|
|
|
res, err = db.db.ExecContext(ctx, `
|
2021-09-27 14:54:06 +00:00
|
|
|
INSERT INTO Network(user, name, addr, nick, username, realname, pass,
|
|
|
|
connect_commands, sasl_mechanism, sasl_plain_username,
|
2021-05-26 08:49:52 +00:00
|
|
|
sasl_plain_password, sasl_external_cert, sasl_external_key, enabled)
|
2021-09-27 14:54:06 +00:00
|
|
|
VALUES (:user, :name, :addr, :nick, :username, :realname, :pass,
|
|
|
|
:connect_commands, :sasl_mechanism, :sasl_plain_username,
|
|
|
|
:sasl_plain_password, :sasl_external_cert, :sasl_external_key, :enabled)`,
|
|
|
|
args...)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
network.ID, err = res.LastInsertId()
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) DeleteNetwork(ctx context.Context, id int64) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
tx, err := db.db.Begin()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer tx.Rollback()
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, "DELETE FROM DeliveryReceipt WHERE network = ?", id)
|
2021-09-13 16:24:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, "DELETE FROM Channel WHERE network = ?", id)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, "DELETE FROM Network WHERE id = ?", id)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return tx.Commit()
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) ListChannels(ctx context.Context, networkID int64) ([]Channel, error) {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.RLock()
|
|
|
|
defer db.lock.RUnlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
rows, err := db.db.QueryContext(ctx, `SELECT
|
2021-05-24 19:13:31 +00:00
|
|
|
id, name, key, detached, detached_internal_msgid,
|
|
|
|
relay_detached, reattach_on, detach_after, detach_on
|
|
|
|
FROM Channel
|
|
|
|
WHERE network = ?`, networkID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer rows.Close()
|
|
|
|
|
|
|
|
var channels []Channel
|
|
|
|
for rows.Next() {
|
|
|
|
var ch Channel
|
|
|
|
var key, detachedInternalMsgID sql.NullString
|
|
|
|
var detachAfter int64
|
|
|
|
if err := rows.Scan(&ch.ID, &ch.Name, &key, &ch.Detached, &detachedInternalMsgID, &ch.RelayDetached, &ch.ReattachOn, &detachAfter, &ch.DetachOn); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ch.Key = key.String
|
|
|
|
ch.DetachedInternalMsgID = detachedInternalMsgID.String
|
|
|
|
ch.DetachAfter = time.Duration(detachAfter) * time.Second
|
|
|
|
channels = append(channels, ch)
|
|
|
|
}
|
|
|
|
if err := rows.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return channels, nil
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) StoreChannel(ctx context.Context, networkID int64, ch *Channel) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-09-27 14:54:06 +00:00
|
|
|
args := []interface{}{
|
|
|
|
sql.Named("network", networkID),
|
|
|
|
sql.Named("name", ch.Name),
|
|
|
|
sql.Named("key", toNullString(ch.Key)),
|
|
|
|
sql.Named("detached", ch.Detached),
|
|
|
|
sql.Named("detached_internal_msgid", toNullString(ch.DetachedInternalMsgID)),
|
|
|
|
sql.Named("relay_detached", ch.RelayDetached),
|
|
|
|
sql.Named("reattach_on", ch.ReattachOn),
|
|
|
|
sql.Named("detach_after", int64(math.Ceil(ch.DetachAfter.Seconds()))),
|
|
|
|
sql.Named("detach_on", ch.DetachOn),
|
|
|
|
|
|
|
|
sql.Named("id", ch.ID), // only for UPDATE
|
|
|
|
}
|
2021-05-24 19:13:31 +00:00
|
|
|
|
|
|
|
var err error
|
|
|
|
if ch.ID != 0 {
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = db.db.ExecContext(ctx, `UPDATE Channel
|
2021-09-27 14:54:06 +00:00
|
|
|
SET network = :network, name = :name, key = :key, detached = :detached,
|
|
|
|
detached_internal_msgid = :detached_internal_msgid, relay_detached = :relay_detached,
|
|
|
|
reattach_on = :reattach_on, detach_after = :detach_after, detach_on = :detach_on
|
|
|
|
WHERE id = :id`, args...)
|
2021-05-24 19:13:31 +00:00
|
|
|
} else {
|
|
|
|
var res sql.Result
|
2021-10-14 14:13:24 +00:00
|
|
|
res, err = db.db.ExecContext(ctx, `INSERT INTO Channel(network, name, key, detached, detached_internal_msgid, relay_detached, reattach_on, detach_after, detach_on)
|
2021-09-27 14:54:06 +00:00
|
|
|
VALUES (:network, :name, :key, :detached, :detached_internal_msgid, :relay_detached, :reattach_on, :detach_after, :detach_on)`, args...)
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
ch.ID, err = res.LastInsertId()
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) DeleteChannel(ctx context.Context, id int64) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
_, err := db.db.ExecContext(ctx, "DELETE FROM Channel WHERE id = ?", id)
|
2021-05-24 19:13:31 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) ListDeliveryReceipts(ctx context.Context, networkID int64) ([]DeliveryReceipt, error) {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.RLock()
|
|
|
|
defer db.lock.RUnlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
rows, err := db.db.QueryContext(ctx, `
|
|
|
|
SELECT id, target, client, internal_msgid
|
2021-05-24 19:13:31 +00:00
|
|
|
FROM DeliveryReceipt
|
|
|
|
WHERE network = ?`, networkID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer rows.Close()
|
|
|
|
|
|
|
|
var receipts []DeliveryReceipt
|
|
|
|
for rows.Next() {
|
|
|
|
var rcpt DeliveryReceipt
|
|
|
|
var client sql.NullString
|
|
|
|
if err := rows.Scan(&rcpt.ID, &rcpt.Target, &client, &rcpt.InternalMsgID); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
rcpt.Client = client.String
|
|
|
|
receipts = append(receipts, rcpt)
|
|
|
|
}
|
|
|
|
if err := rows.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return receipts, nil
|
|
|
|
}
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
func (db *SqliteDB) StoreClientDeliveryReceipts(ctx context.Context, networkID int64, client string, receipts []DeliveryReceipt) error {
|
2021-05-24 19:13:31 +00:00
|
|
|
db.lock.Lock()
|
|
|
|
defer db.lock.Unlock()
|
|
|
|
|
2021-10-18 17:15:15 +00:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, sqliteQueryTimeout)
|
2021-10-14 14:13:24 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2021-05-24 19:13:31 +00:00
|
|
|
tx, err := db.db.Begin()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer tx.Rollback()
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
_, err = tx.ExecContext(ctx, "DELETE FROM DeliveryReceipt WHERE network = ? AND client IS ?",
|
2021-05-24 19:13:31 +00:00
|
|
|
networkID, toNullString(client))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range receipts {
|
|
|
|
rcpt := &receipts[i]
|
|
|
|
|
2021-10-14 14:13:24 +00:00
|
|
|
res, err := tx.ExecContext(ctx, `
|
|
|
|
INSERT INTO DeliveryReceipt(network, target, client, internal_msgid)
|
2021-09-27 14:54:06 +00:00
|
|
|
VALUES (:network, :target, :client, :internal_msgid)`,
|
|
|
|
sql.Named("network", networkID),
|
|
|
|
sql.Named("target", rcpt.Target),
|
|
|
|
sql.Named("client", toNullString(client)),
|
|
|
|
sql.Named("internal_msgid", rcpt.InternalMsgID))
|
2021-05-24 19:13:31 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
rcpt.ID, err = res.LastInsertId()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return tx.Commit()
|
|
|
|
}
|