2019-07-21 09:43:14 +00:00
|
|
|
package memory
|
|
|
|
|
|
|
|
import (
|
2019-08-03 07:54:32 +00:00
|
|
|
"fmt"
|
|
|
|
"regexp"
|
2019-08-02 17:55:35 +00:00
|
|
|
"sort"
|
2019-08-03 14:47:33 +00:00
|
|
|
"strings"
|
2019-07-21 09:43:14 +00:00
|
|
|
"sync"
|
|
|
|
|
2019-08-03 14:19:18 +00:00
|
|
|
"github.com/signaller-matrix/signaller/internal"
|
|
|
|
"github.com/signaller-matrix/signaller/internal/models"
|
|
|
|
"github.com/signaller-matrix/signaller/internal/models/createroom"
|
2019-08-05 14:39:28 +00:00
|
|
|
"github.com/signaller-matrix/signaller/internal/models/filter"
|
2019-08-03 14:19:18 +00:00
|
|
|
mSync "github.com/signaller-matrix/signaller/internal/models/sync"
|
2019-07-21 09:43:14 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type Backend struct {
|
2019-08-03 07:54:32 +00:00
|
|
|
data map[string]internal.User
|
|
|
|
rooms map[string]internal.Room
|
|
|
|
hostname string
|
|
|
|
validateUsernameFunc func(string) error // TODO: create ability to redefine validation func
|
2019-08-03 17:45:08 +00:00
|
|
|
mutex sync.RWMutex
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type Token struct {
|
|
|
|
Device string
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewBackend(hostname string) *Backend {
|
|
|
|
return &Backend{
|
2019-08-03 07:54:32 +00:00
|
|
|
hostname: hostname,
|
|
|
|
validateUsernameFunc: defaultValidationUsernameFunc,
|
|
|
|
rooms: make(map[string]internal.Room),
|
|
|
|
data: make(map[string]internal.User)}
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
2019-08-03 06:46:57 +00:00
|
|
|
func (backend *Backend) Register(username, password, device string) (user internal.User, token string, err models.ApiError) {
|
2019-07-21 09:43:14 +00:00
|
|
|
backend.mutex.Lock()
|
|
|
|
|
2019-08-03 07:54:32 +00:00
|
|
|
if backend.validateUsernameFunc != nil {
|
|
|
|
err := backend.validateUsernameFunc(username)
|
|
|
|
if err != nil {
|
|
|
|
return nil, "", models.NewError(models.M_INVALID_USERNAME, err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-21 09:43:14 +00:00
|
|
|
if _, ok := backend.data[username]; ok {
|
2019-07-31 15:53:36 +00:00
|
|
|
backend.mutex.Unlock()
|
2019-08-03 06:46:57 +00:00
|
|
|
return nil, "", models.NewError(models.M_USER_IN_USE, "trying to register a user ID which has been taken")
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
user = &User{
|
|
|
|
name: username,
|
|
|
|
password: password,
|
2019-07-31 15:53:36 +00:00
|
|
|
Tokens: make(map[string]Token),
|
2019-08-05 10:12:48 +00:00
|
|
|
backend: backend,
|
2019-08-05 14:39:28 +00:00
|
|
|
filters: make(map[string]filter.Request)}
|
2019-07-21 09:43:14 +00:00
|
|
|
|
|
|
|
backend.data[username] = user
|
|
|
|
|
2019-07-31 15:53:36 +00:00
|
|
|
backend.mutex.Unlock()
|
|
|
|
return backend.Login(username, password, device)
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
2019-08-03 06:46:57 +00:00
|
|
|
func (backend *Backend) Login(username, password, device string) (user internal.User, token string, err models.ApiError) {
|
2019-07-21 09:43:14 +00:00
|
|
|
backend.mutex.Lock()
|
|
|
|
defer backend.mutex.Unlock()
|
|
|
|
|
|
|
|
user, ok := backend.data[username]
|
|
|
|
if !ok {
|
2019-08-03 06:46:57 +00:00
|
|
|
return nil, "", models.NewError(models.M_FORBIDDEN, "wrong username")
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if user.Password() != password {
|
2019-08-03 06:46:57 +00:00
|
|
|
return nil, "", models.NewError(models.M_FORBIDDEN, "wrong password")
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
2019-08-04 16:46:31 +00:00
|
|
|
token = internal.RandomString(defaultTokenSize)
|
2019-07-21 09:43:14 +00:00
|
|
|
|
|
|
|
backend.data[username].(*User).Tokens[token] = Token{Device: device}
|
|
|
|
|
2019-07-31 15:53:36 +00:00
|
|
|
return user, token, nil
|
2019-07-21 09:43:14 +00:00
|
|
|
}
|
|
|
|
|
2019-08-03 06:46:57 +00:00
|
|
|
func (backend *Backend) Sync(token string, request mSync.SyncRequest) (response *mSync.SyncReply, err models.ApiError) {
|
2019-07-21 09:43:14 +00:00
|
|
|
backend.mutex.Lock()
|
|
|
|
defer backend.mutex.Unlock()
|
|
|
|
|
|
|
|
return nil, nil // TODO: implement
|
|
|
|
}
|
2019-07-23 14:37:02 +00:00
|
|
|
|
|
|
|
func (backend *Backend) GetUserByToken(token string) internal.User {
|
2019-08-03 17:45:08 +00:00
|
|
|
backend.mutex.RLock()
|
|
|
|
defer backend.mutex.RUnlock()
|
2019-07-23 14:37:02 +00:00
|
|
|
|
|
|
|
for _, user := range backend.data {
|
|
|
|
for userToken := range user.(*User).Tokens {
|
|
|
|
if userToken == token {
|
|
|
|
return user
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2019-07-31 15:01:20 +00:00
|
|
|
|
|
|
|
func (backend *Backend) GetRoomByID(id string) internal.Room {
|
2019-08-03 17:45:08 +00:00
|
|
|
backend.mutex.RLock()
|
|
|
|
defer backend.mutex.RUnlock()
|
2019-07-31 15:01:20 +00:00
|
|
|
|
|
|
|
for roomID, room := range backend.rooms {
|
|
|
|
if roomID == id {
|
|
|
|
return room
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2019-08-02 13:17:18 +00:00
|
|
|
|
|
|
|
func (backend *Backend) GetUserByName(userName string) internal.User {
|
2019-08-03 17:45:08 +00:00
|
|
|
backend.mutex.RLock()
|
|
|
|
defer backend.mutex.RUnlock()
|
2019-08-02 13:17:18 +00:00
|
|
|
|
|
|
|
if user, exists := backend.data[userName]; exists {
|
|
|
|
return user
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2019-08-02 17:55:35 +00:00
|
|
|
|
2019-08-03 14:47:33 +00:00
|
|
|
func (backend *Backend) PublicRooms(filter string) []internal.Room {
|
2019-08-03 17:45:08 +00:00
|
|
|
backend.mutex.RLock()
|
|
|
|
defer backend.mutex.RUnlock()
|
2019-08-02 17:55:35 +00:00
|
|
|
|
|
|
|
var rooms []internal.Room
|
|
|
|
|
|
|
|
for _, room := range backend.rooms {
|
2019-08-03 14:47:33 +00:00
|
|
|
if room.State() == createroom.PublicChat &&
|
|
|
|
(strings.Contains(room.Name(), filter) ||
|
|
|
|
strings.Contains(room.Topic(), filter) ||
|
|
|
|
strings.Contains(room.AliasName(), filter)) {
|
2019-08-02 17:55:35 +00:00
|
|
|
rooms = append(rooms, room)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sort.Sort(BySize(rooms))
|
|
|
|
|
|
|
|
return rooms
|
|
|
|
}
|
2019-08-03 07:54:32 +00:00
|
|
|
|
|
|
|
func (backend *Backend) ValidateUsernameFunc() func(string) error {
|
2019-08-03 17:45:08 +00:00
|
|
|
backend.mutex.RLock()
|
|
|
|
defer backend.mutex.RUnlock()
|
2019-08-03 07:54:32 +00:00
|
|
|
|
|
|
|
return backend.validateUsernameFunc
|
|
|
|
}
|
|
|
|
|
|
|
|
func defaultValidationUsernameFunc(userName string) error {
|
2019-08-03 13:54:58 +00:00
|
|
|
const re = `^\w{5,}$`
|
2019-08-03 07:54:32 +00:00
|
|
|
|
|
|
|
if !regexp.MustCompile(re).MatchString(userName) {
|
|
|
|
return fmt.Errorf("username does not match %s", re)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|