Files
realm-chat/server/src/server.rs
2024-10-16 00:06:48 -04:00

669 lines
20 KiB
Rust

use std::env;
use std::net::SocketAddr;
use std::sync::{Arc};
use std::time::Duration;
use chrono::{DateTime, Utc};
use moka::future::Cache;
use sqlx::{FromRow, Pool, query_as, Sqlite};
use sqlx::query;
use tarpc::context::Context;
use tarpc::tokio_serde::formats::Json;
use tokio::sync::Mutex;
use tracing::error;
use realm_auth::types::RealmAuthClient;
use realm_shared::types::ErrorCode::*;
use realm_shared::types::ErrorCode;
use crate::events::*;
use crate::types::{Attachment, Edit, FromRows, Message, MessageData, Reaction, RealmChat, Redaction, Reply, ReplyChain, Room, ServerInfo, User};
#[derive(Clone)]
pub struct RealmChatServer {
pub server_id: String,
pub domain: String,
pub port: u16,
pub socket: SocketAddr,
pub db_pool: Pool<Sqlite>,
pub typing_users: Vec<(String, String)>, //NOTE: user.userid, room.roomid
pub cache: Cache<String, String>,
//pub events: Arc<Mutex<Vec<(u32, Event)>>>,
}
const FETCH_MESSAGE: &str = "SELECT message.*,
room.id AS 'room_id', room.roomid AS 'room_roomid', room.admin_only_send AS 'room_admin_only_send', room.admin_only_view AS 'room_admin_only_view',
user.id AS 'user_id', user.userid AS 'user_userid', user.name AS 'user_name', user.owner AS 'user_owner', user.admin AS 'user_admin'
FROM message INNER JOIN room ON message.room = room.id INNER JOIN user ON message.user = user.id";
impl RealmChatServer {
pub fn new(server_id: String, socket: SocketAddr, db_pool: Pool<Sqlite>) -> RealmChatServer {
RealmChatServer {
server_id,
port: env::var("PORT").unwrap().parse::<u16>().unwrap(),
domain: env::var("DOMAIN").expect("DOMAIN must be set"),
socket,
db_pool,
typing_users: Vec::new(),
cache: Cache::builder()
.max_capacity(10_000)
.time_to_idle(Duration::from_secs(5*60))
.time_to_live(Duration::from_secs(60*60))
.build(),
//events: Arc::new(Mutex::new(Vec::new())),
}
}
async fn is_stoken_valid(&self, userid: &str, stoken: &str) -> bool {
match self.cache.get(stoken).await {
None => {
// if !self.is_user_in_server(userid).await {
// return false;
// }
let user_domain = &userid[userid.find(':').unwrap()+1..];
let mut auth_transport = tarpc::serde_transport::tcp::connect((user_domain, 5052), Json::default);
auth_transport.config_mut().max_frame_length(usize::MAX);
let connected = match auth_transport.await {
Ok(out) => Some(out),
Err(_) => None
};
if connected.is_none() {
return false;
}
let auth_client = RealmAuthClient::new(tarpc::client::Config::default(), connected.unwrap()).spawn();
let result = auth_client.server_token_validation(
tarpc::context::current(), stoken.to_string(), userid.to_string(), self.server_id.clone(), self.domain.clone(), self.port)
.await;
match result {
Ok(valid) => {
if valid {
self.cache.insert(stoken.to_string(), userid.to_string()).await;
return true
}
false
}
Err(_) => {
error!("Error validating server token for user, {}, with stoken {}", userid, stoken);
false
}
}
}
Some(cached_username) => cached_username.eq(userid),
}
}
pub async fn internal_is_user_admin(&self, userid: &str) -> bool {
let result = query!("SELECT admin FROM user WHERE userid = ?", userid).fetch_one(&self.db_pool).await;
match result {
Ok(record) => record.admin,
Err(_) => false
}
}
pub async fn internal_is_user_owner(&self, userid: &str) -> bool {
let result = query!("SELECT owner FROM user WHERE userid = ?", userid).fetch_one(&self.db_pool).await;
match result {
Ok(record) => record.owner,
Err(_) => false
}
}
async fn is_user_in_server(&self, userid: &str) -> bool {
let result = query!("SELECT EXISTS (SELECT 1 FROM user WHERE userid = ?) AS does_exist", userid).fetch_one(&self.db_pool).await;
match result {
Ok(record) => record.does_exist != 0,
Err(_) => false
}
}
async fn inner_get_all_direct_replies(&self, userid: &str, head: i64) -> Result<Vec<Message>, ErrorCode> {
let is_admin = self.internal_is_user_admin(userid).await;
let result = sqlx::query(&format!("{}{}", FETCH_MESSAGE, "AND message.referencing_id = ?"))
.bind(is_admin)
.bind(head)
.fetch_all(&self.db_pool).await;
match result {
Ok(rows) => Ok(Message::from_rows(rows).unwrap()),
Err(_) => Err(MessageNotFound),
}
}
async fn inner_get_reply_chain(&self, userid: &str, head: Message, depth: u8) -> Result<ReplyChain, ErrorCode> {
if depth > 8 {
return Err(DepthTooLarge)
}
let direct_replies = self.inner_get_all_direct_replies(userid, head.id).await?;
let replies = if direct_replies.is_empty() || depth == 0 {
None
} else {
let mut chains = Vec::new();
for reply in direct_replies {
chains.push(Box::pin(self.inner_get_reply_chain(userid, reply, depth - 1)).await?);
}
Some(chains)
};
let chain = ReplyChain {
message: head,
replies,
};
Ok(chain)
}
async fn inner_get_room(&self, userid: &str, roomid: &str) -> Result<Room, ErrorCode> {
let is_admin = self.internal_is_user_admin(&userid).await;
let result = query_as!(
Room, "SELECT * FROM room WHERE roomid = ? AND admin_only_view = ? OR false", is_admin, roomid).fetch_one(&self.db_pool).await;
match result {
Ok(room) => Ok(room),
Err(_) => Err(RoomNotFound),
}
}
async fn inner_get_user(&self, userid: &str) -> Result<User, ErrorCode> {
let result = query_as!(User, "SELECT * FROM user WHERE userid = ?", userid).fetch_one(&self.db_pool).await;
match result {
Ok(user) => Ok(user),
Err(_) => Err(UserNotFound),
}
}
async fn inner_get_all_users(&self) -> Result<Vec<User>, ErrorCode> {
let result = query_as!(User, "SELECT * FROM user").fetch_all(&self.db_pool).await;
match result {
Ok(users) => Ok(users),
Err(_) => Err(Error),
}
}
async fn inner_get_message(&self, userid: &str, id: i64) -> Result<Message, ErrorCode> {
let is_admin = self.internal_is_user_admin(&userid).await;
let result = sqlx::query(&format!("{}{}", FETCH_MESSAGE, "AND message.id = ?"))
.bind(is_admin)
.bind(id)
.fetch_one(&self.db_pool).await;
match result {
Ok(row) => Ok(Message::from_row(&row).unwrap()),
Err(_) =>Err(MessageNotFound),
}
}
}
impl RealmChat for RealmChatServer {
async fn test(self, _: Context, name: String) -> String {
format!("Hello, {name}!")
}
async fn get_info(self, _: Context) -> ServerInfo {
ServerInfo {
server_id: self.server_id.clone(),
}
}
async fn is_user_admin(self, _: Context, userid: String) -> bool {
self.internal_is_user_admin(&userid).await
}
async fn is_user_owner(self, _: Context, userid: String) -> bool {
self.internal_is_user_owner(&userid).await
}
async fn poll_events_since(self, _: Context, index: u32) -> Vec<(u32, Event)> {
//self.events.lock().await.iter().filter(|(i, _)| i > &index).map(|(i, e)| (*i, e.clone())).collect()
// let mut events_to_send = Vec::new();
//
// for (i, event) in self.events.lock().await.clone() {
// if i > index {
// events_to_send.push((i, event));
// }
// }
//
// events_to_send
Vec::new()
}
async fn join_server(self, _: Context, stoken: String, userid: String) -> Result<User, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
if self.is_user_in_server(&userid).await {
return Err(AlreadyJoinedServer)
}
let is_owner = {
let all_users = self.inner_get_all_users().await?;
all_users.is_empty()
};
//TOOD: name support
let result = query!("INSERT INTO user (userid, name, owner, admin) VALUES (?,?,?,?)", userid, "userid", is_owner, is_owner).execute(&self.db_pool).await;
match result {
Ok(_) => {
let new_user = self.inner_get_user(&userid).await?;
// let result = self.packet_manager.lock().await.broadcast(UserJoinedEvent {
// user: new_user.clone(),
// });
// if result.is_err() {
// error!("Error broadcasting UserJoinedEvent!");
// }
Ok(new_user)
},
Err(_) => Err(MalformedDBResponse),
}
}
async fn leave_server(self, _: Context, stoken: String, userid: String) -> Result<(), ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
if !self.is_user_in_server(&userid).await {
return Err(NotInServer)
}
let user = self.inner_get_user(&userid).await?;
let result = query!("DELETE FROM user WHERE userid = ?", userid).execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(UserLeftEvent {
// user,
// });
//
// if result.is_err() {
// error!("Error broadcasting UserLeftEvent!");
// }
Ok(())
},
Err(_) => Err(MalformedDBResponse),
}
}
async fn send_message(self, _: Context, stoken: String, mut message: Message) -> Result<Message, ErrorCode> {
// if !self.is_stoken_valid(&message.user.userid, &stoken).await { // Check sender userid
// return Err(Unauthorized)
// }
//
// // Assert all the data in message is correct
// message.user = self.inner_get_user(&message.user.userid).await?;
// match &message.data { // Check that the sender is the owner of the referencing msg
// MessageData::Edit(e) => {
// let ref_msg = self.inner_get_message(&message.user.userid, e.referencing_id).await?;
// if !ref_msg.user.userid.eq(&message.user.userid) {
// return Err(Unauthorized)
// }
// }
// MessageData::Redaction(r)=> {
// let ref_msg = self.inner_get_message(&message.user.userid, r.referencing_id).await?;
// if !ref_msg.user.userid.eq(&message.user.userid) || !self.internal_is_user_admin(&message.user.userid).await {
// return Err(Unauthorized)
// }
// }
// _ => {}
// }
// let is_admin = self.internal_is_user_admin(&message.user.userid).await;
// let admin_only_send = query!(
// "SELECT admin_only_send FROM room WHERE roomid = ?",
// message.room.roomid).fetch_one(&self.db_pool).await;
// if let Ok(record) = admin_only_send {
// if record.admin_only_send && !is_admin {
// return Err(Unauthorized)
// }
// } else {
// return Err(RoomNotFound)
// }
//
// message.room = self.inner_get_room(&message.user.userid, &message.room.roomid).await?;
let result = match &message.data {
MessageData::Text(text) => {
query!("INSERT INTO message (timestamp, user, room, msg_type, msg_text) VALUES (?, ?, ?, 'text', ?)",
message.timestamp, message.user.id, message.room.id, text)
.execute(&self.db_pool).await
}
MessageData::Attachment(attachment) => { todo!() }
MessageData::Reply(reply) => {
query!("INSERT INTO message (timestamp, user, room, msg_type, msg_text, referencing_id) VALUES (?, ?, ?, 'reply', ?, ?)",
message.timestamp, message.user.id, message.room.id, reply.text, reply.referencing_id)
.execute(&self.db_pool).await
}
MessageData::Edit(edit) => {
query!("INSERT INTO message (timestamp, user, room, msg_type, msg_text, referencing_id) VALUES (?, ?, ?, 'edit', ?, ?)",
message.timestamp, message.user.id, message.room.id, edit.text, edit.referencing_id)
.execute(&self.db_pool).await
}
MessageData::Reaction(reaction) => {
query!("INSERT INTO message (timestamp, user, room, msg_type, emoji, referencing_id) VALUES (?, ?, ?, 'reaction', ?, ?)",
message.timestamp, message.user.id, message.room.id, reaction.emoji, reaction.referencing_id)
.execute(&self.db_pool).await
}
MessageData::Redaction(redaction) => {
query!("INSERT INTO message (timestamp, user, room, msg_type, referencing_id) VALUES (?, ?, ?, 'redaction', ?)",
message.timestamp, message.user.id, message.room.id, redaction.referencing_id)
.execute(&self.db_pool).await
}
};
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(NewMessageEvent {
// message: message.clone(),
// });
//
// if result.is_err() {
// error!("Error broadcasting NewMessageEvent!");
// }
// self.events.lock().await.push(
// (self.events.lock().await.len() as u32 + 1,
// Event::NewMessage(message.clone())));
Ok(message)
},
Err(_) => Err(Error),
}
}
async fn start_typing(self, _: Context, stoken: String, userid: String, roomid: String) -> ErrorCode {
todo!()
}
async fn stop_typing(self, _: Context, stoken: String, userid: String, roomid: String) -> ErrorCode {
todo!()
}
async fn keep_typing(self, _: Context, stoken: String, userid: String, roomid: String) -> ErrorCode {
todo!()
}
async fn get_message(self, _: Context, stoken: String, userid: String, id: i64) -> Result<Message, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
let is_admin = self.internal_is_user_admin(&userid).await;
let result = sqlx::query(&format!("{}{}", FETCH_MESSAGE, "AND message.id = ?"))
.bind(is_admin)
.bind(id)
.fetch_one(&self.db_pool).await;
match result {
Ok(row) => {
Ok(Message::from_row(&row).unwrap())
},
Err(_) => {
Err(MessageNotFound)
},
}
}
async fn get_messages_since(self, _: Context, stoken: String, userid: String, id: i64) -> Result<Vec<Message>, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
let is_admin = self.internal_is_user_admin(&userid).await;
let result = sqlx::query(&format!("{}{}", FETCH_MESSAGE, " AND message.id > ?"))
//.bind(is_admin)
.bind(id)
.fetch_all(&self.db_pool).await;
match result {
Ok(rows) => Ok(Message::from_rows(rows).unwrap()),
Err(_) => Err(MalformedDBResponse)
}
}
async fn get_all_direct_replies(self, _: Context, stoken: String, userid: String, head: i64) -> Result<Vec<Message>, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
self.inner_get_all_direct_replies(&userid, head).await
}
async fn get_reply_chain(self, _: Context, stoken: String, userid: String, head: Message, depth: u8) -> Result<ReplyChain, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
self.inner_get_reply_chain(&stoken, head, depth).await
}
async fn get_rooms(self, _: Context, stoken: String, userid: String) -> Result<Vec<Room>, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
let is_admin = self.internal_is_user_admin(&userid).await;
let result = query_as!(
Room, "SELECT * FROM room WHERE admin_only_view LIKE false or ?", is_admin).fetch_all(&self.db_pool).await;
match result {
Ok(rooms) => Ok(rooms),
Err(_) => Err(Error),
}
}
async fn get_room(self, _: Context, stoken: String, userid: String, roomid: String) -> Result<Room, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
self.inner_get_room(&userid, &roomid).await
}
async fn get_user(self, _: Context, userid: String) -> Result<User, ErrorCode> {
self.inner_get_user(&userid).await
}
async fn get_users(self, _: Context) -> Result<Vec<User>, ErrorCode> {
self.inner_get_all_users().await
}
async fn create_room(self, _: Context, stoken: String, userid: String, room: Room) -> Result<Room, ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
if !self.internal_is_user_admin(&userid).await {
return Err(Unauthorized)
}
let result = query!("INSERT INTO room (roomid, admin_only_send, admin_only_view) VALUES (?,?,?)",
room.roomid, room.admin_only_send, room.admin_only_view)
.execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(NewRoomEvent {
// room: room.clone(),
// });
//
// if result.is_err() {
// error!("Error broadcasting NewRoomEvent!");
// }
// self.events.lock().await.push(
// (self.events.lock().await.len() as u32 + 1,
// Event::NewRoom(room.clone())));
Ok(room)
}
Err(_) => Err(MalformedDBResponse)
}
}
async fn delete_room(self, _: Context, stoken: String, userid: String, roomid: String) -> Result<(), ErrorCode> {
if !self.is_stoken_valid(&userid, &stoken).await {
return Err(Unauthorized)
}
if !self.internal_is_user_admin(&userid).await {
return Err(Unauthorized)
}
let result = query!("DELETE FROM room WHERE roomid = ?", roomid).execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(DeleteRoomEvent {
// roomid,
// });
//
// if result.is_err() {
// error!("Error broadcasting DeleteRoomEvent!");
// }
// self.events.lock().await.push(
// (self.events.lock().await.len() as u32 + 1,
// Event::DeleteRoom(roomid.clone())));
Ok(())
}
Err(_) => Err(MalformedDBResponse)
}
}
async fn promote_user(self, _: Context, stoken: String, admin_userid: String, userid: String) -> Result<(), ErrorCode> {
if !self.is_stoken_valid(&admin_userid, &stoken).await {
return Err(Unauthorized)
}
if !self.internal_is_user_owner(&admin_userid).await {
return Err(Unauthorized)
}
let result = query!("UPDATE user SET admin = true WHERE userid = ?", userid).execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(PromotedUserEvent {
// userid,
// });
//
// if result.is_err() {
// error!("Error broadcasting PromotedUserEvent!");
// }
Ok(())
}
Err(_) => Err(MalformedDBResponse)
}
}
async fn demote_user(self, _: Context, stoken: String, owner_userid: String, userid: String) -> Result<(), ErrorCode> {
if !self.is_stoken_valid(&owner_userid, &stoken).await {
return Err(Unauthorized)
}
if !self.internal_is_user_owner(&owner_userid).await {
return Err(Unauthorized)
}
let result = query!("UPDATE user SET admin = false WHERE userid = ?", userid).execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(DemotedUserEvent {
// userid,
// });
//
// if result.is_err() {
// error!("Error broadcasting DemotedUserEvent!");
// }
Ok(())
}
Err(_) => Err(MalformedDBResponse)
}
}
async fn kick_user(self, _: Context, stoken: String, admin_userid: String, userid: String) -> Result<(), ErrorCode> {
if !self.is_stoken_valid(&admin_userid, &stoken).await {
return Err(Unauthorized)
}
if !self.internal_is_user_admin(&admin_userid).await {
return Err(Unauthorized)
}
let result = query!("DELETE FROM user WHERE userid = ?", userid).execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(KickedUserEvent {
// userid,
// });
//
// if result.is_err() {
// error!("Error broadcasting KickedUserEvent!");
// }
Ok(())
}
Err(_) => Err(MalformedDBResponse)
}
}
async fn ban_user(self, _: Context, stoken: String, admin_userid: String, userid: String) -> Result<(), ErrorCode> {
if !self.is_stoken_valid(&admin_userid, &stoken).await {
return Err(Unauthorized)
}
if !self.internal_is_user_admin(&admin_userid).await {
return Err(Unauthorized)
}
query!("DELETE FROM user WHERE userid = ?", userid).execute(&self.db_pool).await.unwrap();
let result = query!("INSERT INTO banned (userid) VALUES (?)", userid).execute(&self.db_pool).await;
match result {
Ok(_) => {
// let result = self.packet_manager.lock().await.broadcast(BannedUserEvent {
// userid,
// });
//
// if result.is_err() {
// error!("Error broadcasting BannedUserEvent!");
// }
Ok(())
}
Err(_) => Err(MalformedDBResponse)
}
}
async fn pardon_user(self, _: Context, stoken: String, admin_userid: String, userid: String) -> Result<(), ErrorCode> {
if !self.internal_is_user_admin(&admin_userid).await {
return Err(Unauthorized)
}
let result = query!("DELETE FROM banned WHERE userid = ?", userid).execute(&self.db_pool).await;
match result {
Ok(_) => Ok(()),
Err(_) => Err(MalformedDBResponse)
}
}
}