05cafbd197
* Add possibility to set history_visibility and user AccountType * Add new DB queries * Add actual history_visibility changes for /messages * Add passing tests * Extract check function * Cleanup * Cleanup * Fix build on 386 * Move ApplyHistoryVisibilityFilter to internal * Move queries to topology table * Add filtering to /sync and /context Some cleanup * Add passing tests; Remove failing tests :( * Re-add passing tests * Move filtering to own function to avoid duplication * Re-add passing test * Use newly added GMSL HistoryVisibility * Update gomatrixserverlib * Set the visibility when creating events * Default to shared history visibility * Remove unused query * Update history visibility checks to use gmsl Update tests * Remove unused statement * Update migrations to set "correct" history visibility * Add method to fetch the membership at a given event * Tweaks and logging * Use actual internal rsAPI, default to shared visibility in tests * Revert "Move queries to topology table" This reverts commit 4f0d41be9c194a46379796435ce73e79203edbd6. * Remove noise/unneeded code * More cleanup * Try to optimize database requests * Fix imports * PR peview fixes/changes * Move setting history visibility to own migration, be more restrictive * Fix unit tests * Lint * Fix missing entries * Tweaks for incremental syncs * Adapt generic changes Co-authored-by: Neil Alexander <neilalexander@users.noreply.github.com> Co-authored-by: kegsay <kegan@matrix.org>
145 lines
3.9 KiB
Go
145 lines
3.9 KiB
Go
// Copyright 2017-2018 New Vector Ltd
|
|
// Copyright 2019-2020 The Matrix.org Foundation C.I.C.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package sqlite3
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
"github.com/matrix-org/dendrite/setup/base"
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
"github.com/matrix-org/dendrite/syncapi/storage/shared"
|
|
"github.com/matrix-org/dendrite/syncapi/storage/sqlite3/deltas"
|
|
)
|
|
|
|
// SyncServerDatasource represents a sync server datasource which manages
|
|
// both the database for PDUs and caches for EDUs.
|
|
type SyncServerDatasource struct {
|
|
shared.Database
|
|
db *sql.DB
|
|
writer sqlutil.Writer
|
|
streamID StreamIDStatements
|
|
}
|
|
|
|
// NewDatabase creates a new sync server database
|
|
// nolint: gocyclo
|
|
func NewDatabase(base *base.BaseDendrite, dbProperties *config.DatabaseOptions) (*SyncServerDatasource, error) {
|
|
var d SyncServerDatasource
|
|
var err error
|
|
if d.db, d.writer, err = base.DatabaseConnection(dbProperties, sqlutil.NewExclusiveWriter()); err != nil {
|
|
return nil, err
|
|
}
|
|
if err = d.prepare(base.Context()); err != nil {
|
|
return nil, err
|
|
}
|
|
return &d, nil
|
|
}
|
|
|
|
func (d *SyncServerDatasource) prepare(ctx context.Context) (err error) {
|
|
if err = d.streamID.Prepare(d.db); err != nil {
|
|
return err
|
|
}
|
|
accountData, err := NewSqliteAccountDataTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
events, err := NewSqliteEventsTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
roomState, err := NewSqliteCurrentRoomStateTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
invites, err := NewSqliteInvitesTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
peeks, err := NewSqlitePeeksTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
topology, err := NewSqliteTopologyTable(d.db)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
bwExtrem, err := NewSqliteBackwardsExtremitiesTable(d.db)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
sendToDevice, err := NewSqliteSendToDeviceTable(d.db)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
filter, err := NewSqliteFilterTable(d.db)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
receipts, err := NewSqliteReceiptsTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
memberships, err := NewSqliteMembershipsTable(d.db)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
notificationData, err := NewSqliteNotificationDataTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ignores, err := NewSqliteIgnoresTable(d.db)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
presence, err := NewSqlitePresenceTable(d.db, &d.streamID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// apply migrations which need multiple tables
|
|
m := sqlutil.NewMigrator(d.db)
|
|
m.AddMigrations(
|
|
sqlutil.Migration{
|
|
Version: "syncapi: set history visibility for existing events",
|
|
Up: deltas.UpSetHistoryVisibility, // Requires current_room_state and output_room_events to be created.
|
|
},
|
|
)
|
|
err = m.Up(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
d.Database = shared.Database{
|
|
DB: d.db,
|
|
Writer: d.writer,
|
|
Invites: invites,
|
|
Peeks: peeks,
|
|
AccountData: accountData,
|
|
OutputEvents: events,
|
|
BackwardExtremities: bwExtrem,
|
|
CurrentRoomState: roomState,
|
|
Topology: topology,
|
|
Filter: filter,
|
|
SendToDevice: sendToDevice,
|
|
Receipts: receipts,
|
|
Memberships: memberships,
|
|
NotificationData: notificationData,
|
|
Ignores: ignores,
|
|
Presence: presence,
|
|
}
|
|
return nil
|
|
}
|