2019-10-21 13:56:42 +02:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
|
|
|
# Copyright 2018 New Vector Ltd
|
2021-01-11 22:43:58 +01:00
|
|
|
# Copyright 2019-2021 The Matrix.org Foundation C.I.C.
|
2019-10-21 13:56:42 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import logging
|
2022-04-27 14:05:00 +02:00
|
|
|
from typing import TYPE_CHECKING, List, Optional, Tuple, cast
|
2019-10-21 13:56:42 +02:00
|
|
|
|
2023-02-01 22:35:24 +01:00
|
|
|
from synapse.api.constants import Direction
|
2020-02-25 18:46:00 +01:00
|
|
|
from synapse.config.homeserver import HomeServerConfig
|
2023-07-05 00:03:20 +02:00
|
|
|
from synapse.storage._base import make_in_list_sql_clause
|
2022-04-27 14:05:00 +02:00
|
|
|
from synapse.storage.database import (
|
|
|
|
DatabasePool,
|
|
|
|
LoggingDatabaseConnection,
|
|
|
|
LoggingTransaction,
|
|
|
|
)
|
2021-04-01 12:28:53 +02:00
|
|
|
from synapse.storage.databases.main.stats import UserSortOrder
|
2022-07-21 12:51:30 +02:00
|
|
|
from synapse.storage.engines import BaseDatabaseEngine
|
2022-04-27 14:05:00 +02:00
|
|
|
from synapse.storage.types import Cursor
|
2021-03-03 14:09:39 +01:00
|
|
|
from synapse.types import JsonDict, get_domain_from_id
|
2019-10-21 13:56:42 +02:00
|
|
|
|
|
|
|
from .account_data import AccountDataStore
|
|
|
|
from .appservice import ApplicationServiceStore, ApplicationServiceTransactionStore
|
2020-05-07 14:51:08 +02:00
|
|
|
from .cache import CacheInvalidationWorkerStore
|
2020-05-13 14:38:22 +02:00
|
|
|
from .censor_events import CensorEventsStore
|
2022-04-01 14:08:55 +02:00
|
|
|
from .client_ips import ClientIpWorkerStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .deviceinbox import DeviceInboxStore
|
|
|
|
from .devices import DeviceStore
|
|
|
|
from .directory import DirectoryStore
|
|
|
|
from .e2e_room_keys import EndToEndRoomKeyStore
|
|
|
|
from .end_to_end_keys import EndToEndKeyStore
|
|
|
|
from .event_federation import EventFederationStore
|
|
|
|
from .event_push_actions import EventPushActionsStore
|
|
|
|
from .events_bg_updates import EventsBackgroundUpdatesStore
|
2021-01-07 22:01:59 +01:00
|
|
|
from .events_forward_extremities import EventForwardExtremitiesStore
|
2023-04-28 20:33:45 +02:00
|
|
|
from .experimental_features import ExperimentalFeaturesStore
|
2023-02-28 17:37:19 +01:00
|
|
|
from .filtering import FilteringWorkerStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .keys import KeyStore
|
2021-06-29 20:15:47 +02:00
|
|
|
from .lock import LockStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .media_repository import MediaRepositoryStore
|
2020-05-13 14:38:22 +02:00
|
|
|
from .metrics import ServerMetricsStore
|
2022-04-01 14:08:55 +02:00
|
|
|
from .monthly_active_users import MonthlyActiveUsersWorkerStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .openid import OpenIdStore
|
2021-04-23 13:21:55 +02:00
|
|
|
from .presence import PresenceStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .profile import ProfileStore
|
2020-05-13 14:38:22 +02:00
|
|
|
from .purge_events import PurgeEventsStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .push_rule import PushRuleStore
|
|
|
|
from .pusher import PusherStore
|
|
|
|
from .receipts import ReceiptsStore
|
|
|
|
from .registration import RegistrationStore
|
|
|
|
from .rejections import RejectionsStore
|
|
|
|
from .relations import RelationsStore
|
|
|
|
from .room import RoomStore
|
|
|
|
from .roommember import RoomMemberStore
|
|
|
|
from .search import SearchStore
|
2021-08-24 14:14:03 +02:00
|
|
|
from .session import SessionStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .signatures import SignatureStore
|
|
|
|
from .state import StateStore
|
|
|
|
from .stats import StatsStore
|
2022-01-04 17:10:27 +01:00
|
|
|
from .stream import StreamWorkerStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .tags import TagsStore
|
2021-05-21 18:57:08 +02:00
|
|
|
from .transactions import TransactionWorkerStore
|
2020-04-30 19:47:49 +02:00
|
|
|
from .ui_auth import UIAuthStore
|
2019-10-21 13:56:42 +02:00
|
|
|
from .user_directory import UserDirectoryStore
|
|
|
|
from .user_erasure_store import UserErasureStore
|
|
|
|
|
2021-10-22 19:15:41 +02:00
|
|
|
if TYPE_CHECKING:
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
|
2019-10-21 13:56:42 +02:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class DataStore(
|
|
|
|
EventsBackgroundUpdatesStore,
|
2023-04-28 20:33:45 +02:00
|
|
|
ExperimentalFeaturesStore,
|
2022-09-27 14:01:08 +02:00
|
|
|
DeviceStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
RoomMemberStore,
|
|
|
|
RoomStore,
|
|
|
|
RegistrationStore,
|
|
|
|
ProfileStore,
|
|
|
|
PresenceStore,
|
2021-05-21 18:57:08 +02:00
|
|
|
TransactionWorkerStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
DirectoryStore,
|
|
|
|
KeyStore,
|
|
|
|
StateStore,
|
|
|
|
SignatureStore,
|
|
|
|
ApplicationServiceStore,
|
2020-05-13 14:38:22 +02:00
|
|
|
PurgeEventsStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
EventFederationStore,
|
|
|
|
MediaRepositoryStore,
|
|
|
|
RejectionsStore,
|
2023-02-28 17:37:19 +01:00
|
|
|
FilteringWorkerStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
PusherStore,
|
|
|
|
PushRuleStore,
|
|
|
|
ApplicationServiceTransactionStore,
|
2022-06-15 17:17:14 +02:00
|
|
|
EventPushActionsStore,
|
|
|
|
ServerMetricsStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
ReceiptsStore,
|
|
|
|
EndToEndKeyStore,
|
|
|
|
EndToEndRoomKeyStore,
|
|
|
|
SearchStore,
|
|
|
|
TagsStore,
|
|
|
|
AccountDataStore,
|
2022-06-29 12:32:38 +02:00
|
|
|
StreamWorkerStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
OpenIdStore,
|
2022-04-01 14:08:55 +02:00
|
|
|
ClientIpWorkerStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
DeviceInboxStore,
|
|
|
|
UserDirectoryStore,
|
|
|
|
UserErasureStore,
|
2022-04-01 14:08:55 +02:00
|
|
|
MonthlyActiveUsersWorkerStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
StatsStore,
|
|
|
|
RelationsStore,
|
2020-05-13 14:38:22 +02:00
|
|
|
CensorEventsStore,
|
2020-04-30 19:47:49 +02:00
|
|
|
UIAuthStore,
|
2021-11-12 16:58:17 +01:00
|
|
|
EventForwardExtremitiesStore,
|
2020-05-07 14:51:08 +02:00
|
|
|
CacheInvalidationWorkerStore,
|
2021-06-29 20:15:47 +02:00
|
|
|
LockStore,
|
2021-08-24 14:14:03 +02:00
|
|
|
SessionStore,
|
2019-10-21 13:56:42 +02:00
|
|
|
):
|
2021-12-13 18:05:00 +01:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
database: DatabasePool,
|
|
|
|
db_conn: LoggingDatabaseConnection,
|
|
|
|
hs: "HomeServer",
|
|
|
|
):
|
2019-10-21 13:56:42 +02:00
|
|
|
self.hs = hs
|
|
|
|
self._clock = hs.get_clock()
|
2019-12-06 14:09:40 +01:00
|
|
|
self.database_engine = database.engine
|
|
|
|
|
2020-09-18 15:56:44 +02:00
|
|
|
super().__init__(database, db_conn, hs)
|
2019-12-04 14:52:46 +01:00
|
|
|
|
2021-03-03 14:09:39 +01:00
|
|
|
async def get_users(self) -> List[JsonDict]:
|
2019-12-05 19:12:23 +01:00
|
|
|
"""Function to retrieve a list of users in users table.
|
2019-10-21 13:56:42 +02:00
|
|
|
|
|
|
|
Returns:
|
2020-08-27 13:08:38 +02:00
|
|
|
A list of dictionaries representing users.
|
2019-10-21 13:56:42 +02:00
|
|
|
"""
|
2020-08-27 13:08:38 +02:00
|
|
|
return await self.db_pool.simple_select_list(
|
2019-10-21 13:56:42 +02:00
|
|
|
table="users",
|
|
|
|
keyvalues={},
|
2019-12-05 19:12:23 +01:00
|
|
|
retcols=[
|
|
|
|
"name",
|
|
|
|
"password_hash",
|
|
|
|
"is_guest",
|
|
|
|
"admin",
|
|
|
|
"user_type",
|
|
|
|
"deactivated",
|
|
|
|
],
|
2019-10-21 13:56:42 +02:00
|
|
|
desc="get_users",
|
|
|
|
)
|
|
|
|
|
2020-09-01 15:21:48 +02:00
|
|
|
async def get_users_paginate(
|
|
|
|
self,
|
|
|
|
start: int,
|
|
|
|
limit: int,
|
|
|
|
user_id: Optional[str] = None,
|
|
|
|
name: Optional[str] = None,
|
|
|
|
guests: bool = True,
|
|
|
|
deactivated: bool = False,
|
2022-10-21 14:52:44 +02:00
|
|
|
order_by: str = UserSortOrder.NAME.value,
|
2023-02-01 22:35:24 +01:00
|
|
|
direction: Direction = Direction.FORWARDS,
|
2022-09-29 15:23:24 +02:00
|
|
|
approved: bool = True,
|
2023-07-05 00:03:20 +02:00
|
|
|
not_user_types: Optional[List[str]] = None,
|
2021-03-03 14:09:39 +01:00
|
|
|
) -> Tuple[List[JsonDict], int]:
|
2019-12-05 19:12:23 +01:00
|
|
|
"""Function to retrieve a paginated list of users from
|
2020-04-28 19:19:36 +02:00
|
|
|
users list. This will return a json list of users and the
|
|
|
|
total number of users matching the filter criteria.
|
2019-10-21 13:56:42 +02:00
|
|
|
|
|
|
|
Args:
|
2020-09-01 15:21:48 +02:00
|
|
|
start: start number to begin the query from
|
|
|
|
limit: number of rows to retrieve
|
|
|
|
user_id: search for user_id. ignored if name is not None
|
|
|
|
name: search for local part of user_id or display name
|
|
|
|
guests: whether to in include guest users
|
|
|
|
deactivated: whether to include deactivated users
|
2021-04-01 12:28:53 +02:00
|
|
|
order_by: the sort order of the returned list
|
|
|
|
direction: sort ascending or descending
|
2022-09-29 15:23:24 +02:00
|
|
|
approved: whether to include approved users
|
2023-07-05 00:03:20 +02:00
|
|
|
not_user_types: list of user types to exclude
|
2019-10-21 13:56:42 +02:00
|
|
|
Returns:
|
2020-09-01 15:21:48 +02:00
|
|
|
A tuple of a list of mappings from user to information and a count of total users.
|
2019-10-21 13:56:42 +02:00
|
|
|
"""
|
2020-04-28 19:19:36 +02:00
|
|
|
|
2022-04-27 14:05:00 +02:00
|
|
|
def get_users_paginate_txn(
|
|
|
|
txn: LoggingTransaction,
|
|
|
|
) -> Tuple[List[JsonDict], int]:
|
2020-04-28 19:19:36 +02:00
|
|
|
filters = []
|
2021-09-13 19:07:12 +02:00
|
|
|
args = [self.hs.config.server.server_name]
|
2020-04-28 19:19:36 +02:00
|
|
|
|
2021-04-01 12:28:53 +02:00
|
|
|
# Set ordering
|
|
|
|
order_by_column = UserSortOrder(order_by).value
|
|
|
|
|
2023-02-01 22:35:24 +01:00
|
|
|
if direction == Direction.BACKWARDS:
|
2021-04-01 12:28:53 +02:00
|
|
|
order = "DESC"
|
|
|
|
else:
|
|
|
|
order = "ASC"
|
|
|
|
|
2020-12-17 11:43:37 +01:00
|
|
|
# `name` is in database already in lower case
|
2020-04-28 19:19:36 +02:00
|
|
|
if name:
|
2020-12-17 11:43:37 +01:00
|
|
|
filters.append("(name LIKE ? OR LOWER(displayname) LIKE ?)")
|
|
|
|
args.extend(["@%" + name.lower() + "%:%", "%" + name.lower() + "%"])
|
2020-08-25 15:18:14 +02:00
|
|
|
elif user_id:
|
2020-04-28 19:19:36 +02:00
|
|
|
filters.append("name LIKE ?")
|
2020-12-17 11:43:37 +01:00
|
|
|
args.extend(["%" + user_id.lower() + "%"])
|
2020-04-28 19:19:36 +02:00
|
|
|
|
|
|
|
if not guests:
|
|
|
|
filters.append("is_guest = 0")
|
|
|
|
|
|
|
|
if not deactivated:
|
|
|
|
filters.append("deactivated = 0")
|
|
|
|
|
2022-09-29 15:23:24 +02:00
|
|
|
if not approved:
|
|
|
|
# We ignore NULL values for the approved flag because these should only
|
|
|
|
# be already existing users that we consider as already approved.
|
|
|
|
filters.append("approved IS FALSE")
|
|
|
|
|
2023-07-05 00:03:20 +02:00
|
|
|
if not_user_types:
|
|
|
|
if len(not_user_types) == 1 and not_user_types[0] == "":
|
|
|
|
# Only exclude NULL type users
|
|
|
|
filters.append("user_type IS NOT NULL")
|
|
|
|
else:
|
|
|
|
not_user_types_has_empty = False
|
|
|
|
not_user_types_without_empty = []
|
|
|
|
|
|
|
|
for not_user_type in not_user_types:
|
|
|
|
if not_user_type == "":
|
|
|
|
not_user_types_has_empty = True
|
|
|
|
else:
|
|
|
|
not_user_types_without_empty.append(not_user_type)
|
|
|
|
|
|
|
|
not_user_type_clause, not_user_type_args = make_in_list_sql_clause(
|
|
|
|
self.database_engine,
|
|
|
|
"u.user_type",
|
|
|
|
not_user_types_without_empty,
|
|
|
|
)
|
|
|
|
|
|
|
|
if not_user_types_has_empty:
|
|
|
|
# NULL values should be excluded.
|
|
|
|
# They evaluate to false > nothing to do here.
|
|
|
|
filters.append("NOT %s" % (not_user_type_clause))
|
|
|
|
else:
|
|
|
|
# NULL values should *not* be excluded.
|
|
|
|
# Add a special predicate to the query.
|
|
|
|
filters.append(
|
|
|
|
"(NOT %s OR %s IS NULL)"
|
|
|
|
% (not_user_type_clause, "u.user_type")
|
|
|
|
)
|
|
|
|
|
|
|
|
args.extend(not_user_type_args)
|
|
|
|
|
2020-04-28 19:19:36 +02:00
|
|
|
where_clause = "WHERE " + " AND ".join(filters) if len(filters) > 0 else ""
|
|
|
|
|
2021-07-22 16:05:16 +02:00
|
|
|
sql_base = f"""
|
2020-04-28 19:19:36 +02:00
|
|
|
FROM users as u
|
|
|
|
LEFT JOIN profiles AS p ON u.name = '@' || p.user_id || ':' || ?
|
2022-10-21 14:52:44 +02:00
|
|
|
LEFT JOIN erased_users AS eu ON u.name = eu.user_id
|
2021-07-22 16:05:16 +02:00
|
|
|
{where_clause}
|
|
|
|
"""
|
2020-08-25 15:18:14 +02:00
|
|
|
sql = "SELECT COUNT(*) as total_users " + sql_base
|
|
|
|
txn.execute(sql, args)
|
2022-04-27 14:05:00 +02:00
|
|
|
count = cast(Tuple[int], txn.fetchone())[0]
|
2020-08-25 15:18:14 +02:00
|
|
|
|
2021-07-22 16:05:16 +02:00
|
|
|
sql = f"""
|
|
|
|
SELECT name, user_type, is_guest, admin, deactivated, shadow_banned,
|
2022-10-21 14:52:44 +02:00
|
|
|
displayname, avatar_url, creation_ts * 1000 as creation_ts, approved,
|
|
|
|
eu.user_id is not null as erased
|
2021-04-01 12:28:53 +02:00
|
|
|
{sql_base}
|
|
|
|
ORDER BY {order_by_column} {order}, u.name ASC
|
|
|
|
LIMIT ? OFFSET ?
|
2021-07-22 16:05:16 +02:00
|
|
|
"""
|
2020-08-25 15:18:14 +02:00
|
|
|
args += [limit, start]
|
2020-04-28 19:19:36 +02:00
|
|
|
txn.execute(sql, args)
|
2020-08-05 22:38:57 +02:00
|
|
|
users = self.db_pool.cursor_to_dict(txn)
|
2022-10-21 14:52:44 +02:00
|
|
|
|
|
|
|
# some of those boolean values are returned as integers when we're on SQLite
|
|
|
|
columns_to_boolify = ["erased"]
|
|
|
|
for user in users:
|
|
|
|
for column in columns_to_boolify:
|
|
|
|
user[column] = bool(user[column])
|
|
|
|
|
2020-04-28 19:19:36 +02:00
|
|
|
return users, count
|
|
|
|
|
2020-09-01 15:21:48 +02:00
|
|
|
return await self.db_pool.runInteraction(
|
2020-08-05 22:38:57 +02:00
|
|
|
"get_users_paginate_txn", get_users_paginate_txn
|
|
|
|
)
|
2019-10-21 13:56:42 +02:00
|
|
|
|
2021-03-03 14:09:39 +01:00
|
|
|
async def search_users(self, term: str) -> Optional[List[JsonDict]]:
|
2019-10-21 13:56:42 +02:00
|
|
|
"""Function to search users list for one or more users with
|
|
|
|
the matched term.
|
|
|
|
|
|
|
|
Args:
|
2020-08-27 13:41:01 +02:00
|
|
|
term: search term
|
|
|
|
|
2019-10-21 13:56:42 +02:00
|
|
|
Returns:
|
2020-08-27 13:41:01 +02:00
|
|
|
A list of dictionaries or None.
|
2019-10-21 13:56:42 +02:00
|
|
|
"""
|
2020-08-27 13:41:01 +02:00
|
|
|
return await self.db_pool.simple_search_list(
|
2019-10-21 13:56:42 +02:00
|
|
|
table="users",
|
|
|
|
term=term,
|
|
|
|
col="name",
|
|
|
|
retcols=["name", "password_hash", "is_guest", "admin", "user_type"],
|
|
|
|
desc="search_users",
|
|
|
|
)
|
2019-12-06 14:09:40 +01:00
|
|
|
|
|
|
|
|
2022-04-27 14:05:00 +02:00
|
|
|
def check_database_before_upgrade(
|
|
|
|
cur: Cursor, database_engine: BaseDatabaseEngine, config: HomeServerConfig
|
|
|
|
) -> None:
|
2020-02-25 18:46:00 +01:00
|
|
|
"""Called before upgrading an existing database to check that it is broadly sane
|
|
|
|
compared with the configuration.
|
|
|
|
"""
|
2020-09-07 17:48:52 +02:00
|
|
|
logger.info("Checking database for consistency with configuration...")
|
2020-02-25 18:46:00 +01:00
|
|
|
|
2020-09-07 17:48:52 +02:00
|
|
|
# if there are any users in the database, check that the username matches our
|
|
|
|
# configured server name.
|
|
|
|
|
|
|
|
cur.execute("SELECT name FROM users LIMIT 1")
|
|
|
|
rows = cur.fetchall()
|
|
|
|
if not rows:
|
|
|
|
return
|
|
|
|
|
|
|
|
user_domain = get_domain_from_id(rows[0][0])
|
2021-09-13 19:07:12 +02:00
|
|
|
if user_domain == config.server.server_name:
|
2020-02-25 18:46:00 +01:00
|
|
|
return
|
|
|
|
|
|
|
|
raise Exception(
|
|
|
|
"Found users in database not native to %s!\n"
|
2020-09-07 17:48:52 +02:00
|
|
|
"You cannot change a synapse server_name after it's been configured"
|
2021-09-13 19:07:12 +02:00
|
|
|
% (config.server.server_name,)
|
2020-02-25 18:46:00 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
__all__ = ["DataStore", "check_database_before_upgrade"]
|