1
use std::{
2
    collections::HashMap,
3
    fmt::{Debug, Display},
4
    marker::PhantomData,
5
    path::{Path, PathBuf},
6
    sync::Arc,
7
};
8

            
9
use async_lock::{Mutex, RwLock};
10
use async_trait::async_trait;
11
pub use bonsaidb_core::circulate::Relay;
12
#[cfg(feature = "password-hashing")]
13
use bonsaidb_core::connection::{Authenticated, Authentication};
14
use bonsaidb_core::{
15
    admin::{
16
        self,
17
        database::{self, ByName, Database as DatabaseRecord},
18
        Admin, ADMIN_DATABASE_NAME,
19
    },
20
    connection::{self, Connection, StorageConnection},
21
    document::KeyId,
22
    schema::{Schema, SchemaName, Schematic},
23
};
24
#[cfg(feature = "multiuser")]
25
use bonsaidb_core::{
26
    admin::{user::User, PermissionGroup, Role},
27
    document::CollectionDocument,
28
    schema::{NamedCollection, NamedReference},
29
};
30
use bonsaidb_utils::{fast_async_lock, fast_async_read, fast_async_write};
31
use futures::TryFutureExt;
32
use itertools::Itertools;
33
use nebari::{
34
    io::{
35
        fs::{StdFile, StdFileManager},
36
        FileManager,
37
    },
38
    ChunkCache, ThreadPool,
39
};
40
use rand::{thread_rng, Rng};
41
use tokio::{
42
    fs::{self, File},
43
    io::{AsyncReadExt, AsyncWriteExt},
44
};
45

            
46
#[cfg(feature = "encryption")]
47
use crate::vault::{self, LocalVaultKeyStorage, TreeVault, Vault};
48
use crate::{
49
    config::{KeyValuePersistence, StorageConfiguration},
50
    database::Context,
51
    jobs::manager::Manager,
52
    tasks::TaskManager,
53
    Database, Error,
54
};
55

            
56
#[cfg(feature = "password-hashing")]
57
mod argon;
58

            
59
mod backup;
60
pub use backup::BackupLocation;
61

            
62
/// A file-based, multi-database, multi-user database engine.
63
184210
#[derive(Debug, Clone)]
64
pub struct Storage {
65
    data: Arc<Data>,
66
}
67

            
68
#[derive(Debug)]
69
struct Data {
70
    id: StorageId,
71
    path: PathBuf,
72
    threadpool: ThreadPool<StdFile>,
73
    file_manager: StdFileManager,
74
    pub(crate) tasks: TaskManager,
75
    schemas: RwLock<HashMap<SchemaName, Box<dyn DatabaseOpener>>>,
76
    available_databases: RwLock<HashMap<String, SchemaName>>,
77
    open_roots: Mutex<HashMap<String, Context>>,
78
    #[cfg(feature = "password-hashing")]
79
    argon: argon::Hasher,
80
    #[cfg(feature = "encryption")]
81
    pub(crate) vault: Arc<Vault>,
82
    #[cfg(feature = "encryption")]
83
    default_encryption_key: Option<KeyId>,
84
    pub(crate) key_value_persistence: KeyValuePersistence,
85
    chunk_cache: ChunkCache,
86
    pub(crate) check_view_integrity_on_database_open: bool,
87
    relay: Relay,
88
}
89

            
90
impl Storage {
91
    /// Creates or opens a multi-database [`Storage`] with its data stored in `directory`.
92
2041
    pub async fn open(configuration: StorageConfiguration) -> Result<Self, Error> {
93
131
        let owned_path = configuration
94
131
            .path
95
131
            .clone()
96
131
            .unwrap_or_else(|| PathBuf::from("db.bonsaidb"));
97
131

            
98
131
        let manager = Manager::default();
99
524
        for _ in 0..configuration.workers.worker_count {
100
524
            manager.spawn_worker();
101
524
        }
102
131
        let tasks = TaskManager::new(manager);
103
131

            
104
131
        fs::create_dir_all(&owned_path).await?;
105

            
106
274
        let id = Self::lookup_or_create_id(&configuration, &owned_path).await?;
107

            
108
        #[cfg(feature = "encryption")]
109
130
        let vault = {
110
131
            let vault_key_storage = match configuration.vault_key_storage {
111
3
                Some(storage) => storage,
112
                None => Box::new(
113
128
                    LocalVaultKeyStorage::new(owned_path.join("vault-keys"))
114
117
                        .await
115
128
                        .map_err(|err| Error::Vault(vault::Error::Initializing(err.to_string())))?,
116
                ),
117
            };
118

            
119
1046
            Arc::new(Vault::initialize(id, &owned_path, vault_key_storage).await?)
120
        };
121

            
122
130
        let check_view_integrity_on_database_open = configuration.views.check_integrity_on_open;
123
130
        let key_value_persistence = configuration.key_value_persistence;
124
130
        #[cfg(feature = "password-hashing")]
125
130
        let argon = argon::Hasher::new(configuration.argon);
126
130
        #[cfg(feature = "encryption")]
127
130
        let default_encryption_key = configuration.default_encryption_key;
128
130
        let storage = tokio::task::spawn_blocking::<_, Result<Self, Error>>(move || {
129
130
            Ok(Self {
130
130
                data: Arc::new(Data {
131
130
                    id,
132
130
                    tasks,
133
130
                    #[cfg(feature = "password-hashing")]
134
130
                    argon,
135
130
                    #[cfg(feature = "encryption")]
136
130
                    vault,
137
130
                    #[cfg(feature = "encryption")]
138
130
                    default_encryption_key,
139
130
                    path: owned_path,
140
130
                    file_manager: StdFileManager::default(),
141
130
                    chunk_cache: ChunkCache::new(2000, 160_384),
142
130
                    threadpool: ThreadPool::default(),
143
130
                    schemas: RwLock::new(configuration.initial_schemas),
144
130
                    available_databases: RwLock::default(),
145
130
                    open_roots: Mutex::default(),
146
130
                    key_value_persistence,
147
130
                    check_view_integrity_on_database_open,
148
130
                    relay: Relay::default(),
149
130
                }),
150
130
            })
151
130
        })
152
100
        .await??;
153

            
154
271
        storage.cache_available_databases().await?;
155

            
156
130
        storage.create_admin_database_if_needed().await?;
157

            
158
130
        Ok(storage)
159
131
    }
160

            
161
    /// Returns the path of the database storage.
162
    #[must_use]
163
14148
    pub fn path(&self) -> &Path {
164
14148
        &self.data.path
165
14148
    }
166

            
167
2063
    async fn lookup_or_create_id(
168
2063
        configuration: &StorageConfiguration,
169
2063
        path: &Path,
170
2063
    ) -> Result<StorageId, Error> {
171
131
        Ok(StorageId(if let Some(id) = configuration.unique_id {
172
            // The configuraiton id override is not persisted to disk. This is
173
            // mostly to prevent someone from accidentally adding this
174
            // configuration, realizing it breaks things, and then wanting to
175
            // revert. This makes reverting to the old value easier.
176
            id
177
        } else {
178
            // Load/Store a randomly generated id into a file. While the value
179
            // is numerical, the file contents are the ascii decimal, making it
180
            // easier for a human to view, and if needed, edit.
181
131
            let id_path = path.join("server-id");
182
131

            
183
131
            if id_path.exists() {
184
                // This value is important enought to not allow launching the
185
                // server if the file can't be read or contains unexpected data.
186
13
                let existing_id = String::from_utf8(
187
13
                    File::open(id_path)
188
13
                        .and_then(|mut f| async move {
189
13
                            let mut bytes = Vec::new();
190
26
                            f.read_to_end(&mut bytes).await.map(|_| bytes)
191
39
                        })
192
39
                        .await
193
13
                        .expect("error reading server-id file"),
194
13
                )
195
13
                .expect("server-id contains invalid data");
196
13

            
197
13
                existing_id.parse().expect("server-id isn't numeric")
198
            } else {
199
118
                let id = { thread_rng().gen::<u64>() };
200
118
                File::create(id_path)
201
118
                    .and_then(|mut file| async move {
202
118
                        let id = id.to_string();
203
118
                        file.write_all(id.as_bytes()).await?;
204
118
                        file.shutdown().await
205
235
                    })
206
235
                    .await
207
118
                    .map_err(|err| {
208
                        Error::Core(bonsaidb_core::Error::Configuration(format!(
209
                            "Error writing server-id file: {}",
210
                            err
211
                        )))
212
118
                    })?;
213
118
                id
214
            }
215
        }))
216
131
    }
217

            
218
2041
    async fn cache_available_databases(&self) -> Result<(), Error> {
219
130
        let available_databases = self
220
130
            .admin()
221
130
            .await
222
130
            .view::<ByName>()
223
141
            .query()
224
141
            .await?
225
130
            .into_iter()
226
140
            .map(|map| (map.key, map.value))
227
130
            .collect();
228
130
        let mut storage_databases = fast_async_write!(self.data.available_databases);
229
130
        *storage_databases = available_databases;
230
130
        Ok(())
231
130
    }
232

            
233
2041
    async fn create_admin_database_if_needed(&self) -> Result<(), Error> {
234
130
        self.register_schema::<Admin>().await?;
235
130
        match self.database::<Admin>(ADMIN_DATABASE_NAME).await {
236
12
            Ok(_) => {}
237
            Err(bonsaidb_core::Error::DatabaseNotFound(_)) => {
238
118
                self.create_database::<Admin>(ADMIN_DATABASE_NAME, true)
239
117
                    .await?;
240
            }
241
            Err(err) => return Err(Error::Core(err)),
242
        }
243
130
        Ok(())
244
130
    }
245

            
246
    /// Returns the unique id of the server.
247
    ///
248
    /// This value is set from the [`StorageConfiguration`] or randomly
249
    /// generated when creating a server. It shouldn't be changed after a server
250
    /// is in use, as doing can cause issues. For example, the vault that
251
    /// manages encrypted storage uses the server ID to store the vault key. If
252
    /// the server ID changes, the vault key storage will need to be updated
253
    /// with the new server ID.
254
    #[must_use]
255
    pub fn unique_id(&self) -> StorageId {
256
        self.data.id
257
    }
258

            
259
    #[must_use]
260
    #[cfg(feature = "encryption")]
261
537082
    pub(crate) fn vault(&self) -> &Arc<Vault> {
262
537082
        &self.data.vault
263
537082
    }
264

            
265
    #[must_use]
266
    #[cfg(feature = "encryption")]
267
1766785
    pub(crate) fn default_encryption_key(&self) -> Option<&KeyId> {
268
1766785
        self.data.default_encryption_key.as_ref()
269
1766785
    }
270

            
271
    #[must_use]
272
    #[cfg(not(feature = "encryption"))]
273
    #[allow(clippy::unused_self)]
274
    pub(crate) fn default_encryption_key(&self) -> Option<&KeyId> {
275
        None
276
    }
277

            
278
    /// Registers a schema for use within the server.
279
130
    pub async fn register_schema<DB: Schema>(&self) -> Result<(), Error> {
280
130
        let mut schemas = fast_async_write!(self.data.schemas);
281
        if schemas
282
            .insert(
283
130
                DB::schema_name(),
284
130
                Box::new(StorageSchemaOpener::<DB>::new()?),
285
            )
286
130
            .is_none()
287
        {
288
130
            Ok(())
289
        } else {
290
            Err(Error::Core(bonsaidb_core::Error::SchemaAlreadyRegistered(
291
                DB::schema_name(),
292
            )))
293
        }
294
130
    }
295

            
296
    #[cfg_attr(not(feature = "encryption"), allow(unused_mut))]
297
1147522
    pub(crate) async fn open_roots(&self, name: &str) -> Result<Context, Error> {
298
1147500
        let mut open_roots = fast_async_lock!(self.data.open_roots);
299
1147500
        if let Some(roots) = open_roots.get(name) {
300
1129734
            Ok(roots.clone())
301
        } else {
302
17766
            let task_self = self.clone();
303
17766
            let task_name = name.to_string();
304
17766
            let roots = tokio::task::spawn_blocking(move || {
305
17744
                let mut config = nebari::Config::new(task_self.data.path.join(task_name))
306
17744
                    .cache(task_self.data.chunk_cache.clone())
307
17744
                    .shared_thread_pool(&task_self.data.threadpool)
308
17744
                    .file_manager(task_self.data.file_manager.clone());
309
                #[cfg(feature = "encryption")]
310
17744
                if let Some(key) = task_self.default_encryption_key() {
311
198
                    config = config.vault(TreeVault {
312
198
                        key: key.clone(),
313
198
                        vault: task_self.vault().clone(),
314
198
                    });
315
17546
                }
316
17744
                config.open().map_err(Error::from)
317
17766
            })
318
17678
            .await
319
17766
            .unwrap()?;
320
17766
            let context = Context::new(roots, self.data.key_value_persistence.clone());
321
17766

            
322
17766
            open_roots.insert(name.to_owned(), context.clone());
323
17766

            
324
17766
            Ok(context)
325
        }
326
1147500
    }
327

            
328
1459791
    pub(crate) fn tasks(&self) -> &'_ TaskManager {
329
1459791
        &self.data.tasks
330
1459791
    }
331

            
332
1147522
    pub(crate) fn check_view_integrity_on_database_open(&self) -> bool {
333
1147522
        self.data.check_view_integrity_on_database_open
334
1147522
    }
335

            
336
280
    pub(crate) fn relay(&self) -> &'_ Relay {
337
280
        &self.data.relay
338
280
    }
339

            
340
18213
    fn validate_name(name: &str) -> Result<(), Error> {
341
18213
        if name.chars().enumerate().all(|(index, c)| {
342
126215
            c.is_ascii_alphanumeric()
343
5792
                || (index == 0 && c == '_')
344
2279
                || (index > 0 && (c == '.' || c == '-'))
345
126281
        }) {
346
18144
            Ok(())
347
        } else {
348
69
            Err(Error::Core(bonsaidb_core::Error::InvalidDatabaseName(
349
69
                name.to_owned(),
350
69
            )))
351
        }
352
18213
    }
353

            
354
    /// Returns the administration database.
355
    #[allow(clippy::missing_panics_doc)]
356
32491
    pub async fn admin(&self) -> Database {
357
        Database::new::<Admin, _>(
358
            ADMIN_DATABASE_NAME,
359
32491
            self.open_roots(ADMIN_DATABASE_NAME).await.unwrap(),
360
32491
            self.clone(),
361
        )
362
        .await
363
32491
        .unwrap()
364
32491
    }
365

            
366
    /// Opens a database through a generic-free trait.
367
1116892
    pub(crate) async fn database_without_schema(&self, name: &str) -> Result<Database, Error> {
368
50731
        let schema = {
369
50848
            let available_databases = fast_async_read!(self.data.available_databases);
370
50848
            available_databases
371
50848
                .get(name)
372
50848
                .ok_or_else(|| {
373
117
                    Error::Core(bonsaidb_core::Error::DatabaseNotFound(name.to_string()))
374
50848
                })?
375
50731
                .clone()
376
        };
377

            
378
50731
        let mut schemas = fast_async_write!(self.data.schemas);
379
50731
        if let Some(schema) = schemas.get_mut(&schema) {
380
50731
            let db = schema.open(name.to_string(), self.clone()).await?;
381
50729
            Ok(db)
382
        } else {
383
            Err(Error::Core(bonsaidb_core::Error::SchemaNotRegistered(
384
                schema,
385
            )))
386
        }
387
50846
    }
388

            
389
    #[cfg(feature = "internal-apis")]
390
    #[doc(hidden)]
391
    /// Opens a database through a generic-free trait.
392
1107084
    pub async fn database_without_schema_internal(&self, name: &str) -> Result<Database, Error> {
393
95541
        self.database_without_schema(name).await
394
50328
    }
395

            
396
    #[cfg(feature = "multiuser")]
397
26
    async fn update_user_with_named_id<
398
26
        'user,
399
26
        'other,
400
26
        Col: NamedCollection,
401
26
        U: Into<NamedReference<'user>> + Send + Sync,
402
26
        O: Into<NamedReference<'other>> + Send + Sync,
403
26
        F: FnOnce(&mut CollectionDocument<User>, u64) -> bool,
404
26
    >(
405
26
        &self,
406
26
        user: U,
407
26
        other: O,
408
26
        callback: F,
409
26
    ) -> Result<(), bonsaidb_core::Error> {
410
26
        let user = user.into();
411
26
        let other = other.into();
412
26
        let admin = self.admin().await;
413
26
        let (user, other) =
414
26
            futures::try_join!(User::load(user, &admin), other.id::<Col, _>(&admin),)?;
415
26
        match (user, other) {
416
26
            (Some(mut user), Some(other)) => {
417
26
                if callback(&mut user, other) {
418
13
                    user.update(&admin).await?;
419
13
                }
420
26
                Ok(())
421
            }
422
            // TODO make this a generic not found with a name parameter.
423
            _ => Err(bonsaidb_core::Error::UserNotFound),
424
        }
425
26
    }
426
}
427

            
428
#[async_trait]
429
pub trait DatabaseOpener: Send + Sync + Debug {
430
    fn schematic(&self) -> &'_ Schematic;
431
    async fn open(&self, name: String, storage: Storage) -> Result<Database, Error>;
432
}
433

            
434
#[derive(Debug)]
435
pub struct StorageSchemaOpener<DB: Schema> {
436
    schematic: Schematic,
437
    _phantom: PhantomData<DB>,
438
}
439

            
440
impl<DB> StorageSchemaOpener<DB>
441
where
442
    DB: Schema,
443
{
444
334
    pub fn new() -> Result<Self, Error> {
445
334
        let schematic = DB::schematic()?;
446
334
        Ok(Self {
447
334
            schematic,
448
334
            _phantom: PhantomData::default(),
449
334
        })
450
334
    }
451
}
452

            
453
#[async_trait]
454
impl<DB> DatabaseOpener for StorageSchemaOpener<DB>
455
where
456
    DB: Schema,
457
{
458
    fn schematic(&self) -> &'_ Schematic {
459
        &self.schematic
460
    }
461

            
462
50730
    async fn open(&self, name: String, storage: Storage) -> Result<Database, Error> {
463
50730
        let roots = storage.open_roots(&name).await?;
464
50730
        let db = Database::new::<DB, _>(name, roots, storage).await?;
465
50728
        Ok(db)
466
101458
    }
467
}
468

            
469
#[async_trait]
470
impl StorageConnection for Storage {
471
    type Database = Database;
472

            
473
    #[cfg_attr(
474
        feature = "tracing",
475
54627
        tracing::instrument(skip(name, schema, only_if_needed))
476
    )]
477
    async fn create_database_with_schema(
478
        &self,
479
        name: &str,
480
        schema: SchemaName,
481
        only_if_needed: bool,
482
18209
    ) -> Result<(), bonsaidb_core::Error> {
483
18209
        Self::validate_name(name)?;
484

            
485
        {
486
18142
            let schemas = fast_async_read!(self.data.schemas);
487
18142
            if !schemas.contains_key(&schema) {
488
67
                return Err(bonsaidb_core::Error::SchemaNotRegistered(schema));
489
18075
            }
490
        }
491

            
492
18075
        let mut available_databases = fast_async_write!(self.data.available_databases);
493
18075
        let admin = self.admin().await;
494
18075
        if !admin
495
18075
            .view::<database::ByName>()
496
18075
            .with_key(name.to_ascii_lowercase())
497
18075
            .query()
498
15837
            .await?
499
18053
            .is_empty()
500
        {
501
448
            if only_if_needed {
502
381
                return Ok(());
503
67
            }
504
67

            
505
67
            return Err(bonsaidb_core::Error::DatabaseNameAlreadyTaken(
506
67
                name.to_string(),
507
67
            ));
508
17605
        }
509
17605

            
510
17605
        admin
511
17605
            .collection::<DatabaseRecord>()
512
17605
            .push(&admin::Database {
513
17605
                name: name.to_string(),
514
17605
                schema: schema.clone(),
515
17605
            })
516
16989
            .await?;
517
17627
        available_databases.insert(name.to_string(), schema);
518
17627

            
519
17627
        Ok(())
520
36418
    }
521

            
522
509
    async fn database<DB: Schema>(
523
509
        &self,
524
509
        name: &str,
525
509
    ) -> Result<Self::Database, bonsaidb_core::Error> {
526
509
        let db = self.database_without_schema(name).await?;
527
391
        if db.data.schema.name == DB::schema_name() {
528
391
            Ok(db)
529
        } else {
530
            Err(bonsaidb_core::Error::SchemaMismatch {
531
                database_name: name.to_owned(),
532
                schema: DB::schema_name(),
533
                stored_schema: db.data.schema.name.clone(),
534
            })
535
        }
536
1018
    }
537

            
538
33402
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(name)))]
539
11134
    async fn delete_database(&self, name: &str) -> Result<(), bonsaidb_core::Error> {
540
11134
        let admin = self.admin().await;
541
11134
        let mut available_databases = fast_async_write!(self.data.available_databases);
542
11134
        available_databases.remove(name);
543

            
544
11134
        let mut open_roots = fast_async_lock!(self.data.open_roots);
545
11134
        open_roots.remove(name);
546
11134

            
547
11134
        let database_folder = self.path().join(name);
548
11134
        if database_folder.exists() {
549
11000
            let file_manager = self.data.file_manager.clone();
550
11000
            tokio::task::spawn_blocking(move || file_manager.delete_directory(&database_folder))
551
8580
                .await
552
11000
                .unwrap()
553
11000
                .map_err(Error::Nebari)?;
554
134
        }
555

            
556
11134
        if let Some(entry) = admin
557
11134
            .view::<database::ByName>()
558
11134
            .with_key(name.to_ascii_lowercase())
559
11134
            .query()
560
11134
            .await?
561
11134
            .first()
562
        {
563
11067
            admin.delete::<DatabaseRecord, _>(&entry.source).await?;
564

            
565
11067
            Ok(())
566
        } else {
567
67
            return Err(bonsaidb_core::Error::DatabaseNotFound(name.to_string()));
568
        }
569
22268
    }
570

            
571
201
    #[cfg_attr(feature = "tracing", tracing::instrument)]
572
67
    async fn list_databases(&self) -> Result<Vec<connection::Database>, bonsaidb_core::Error> {
573
67
        let available_databases = fast_async_read!(self.data.available_databases);
574
67
        Ok(available_databases
575
67
            .iter()
576
1696
            .map(|(name, schema)| connection::Database {
577
1696
                name: name.to_string(),
578
1696
                schema: schema.clone(),
579
1696
            })
580
67
            .collect())
581
134
    }
582

            
583
201
    #[cfg_attr(feature = "tracing", tracing::instrument)]
584
67
    async fn list_available_schemas(&self) -> Result<Vec<SchemaName>, bonsaidb_core::Error> {
585
67
        let available_databases = fast_async_read!(self.data.available_databases);
586
67
        Ok(available_databases.values().unique().cloned().collect())
587
134
    }
588

            
589
465
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(username)))]
590
    #[cfg(feature = "multiuser")]
591
155
    async fn create_user(&self, username: &str) -> Result<u64, bonsaidb_core::Error> {
592
155
        let result = self
593
155
            .admin()
594
22
            .await
595
155
            .collection::<User>()
596
222
            .push(&User::default_with_username(username))
597
222
            .await?;
598
133
        Ok(result.id)
599
310
    }
600

            
601
    #[cfg(feature = "password-hashing")]
602
9
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, password)))]
603
    async fn set_user_password<'user, U: Into<NamedReference<'user>> + Send + Sync>(
604
        &self,
605
        user: U,
606
        password: bonsaidb_core::connection::SensitiveString,
607
3
    ) -> Result<(), bonsaidb_core::Error> {
608
3
        let admin = self.admin().await;
609
4
        let mut user = User::load(user, &admin)
610
4
            .await?
611
3
            .ok_or(bonsaidb_core::Error::UserNotFound)?;
612
3
        user.contents.argon_hash = Some(self.data.argon.hash(user.id, password).await?);
613
3
        user.update(&admin).await
614
6
    }
615

            
616
    #[cfg(all(feature = "multiuser", feature = "password-hashing"))]
617
15
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user)))]
618
    async fn authenticate<'user, U: Into<NamedReference<'user>> + Send + Sync>(
619
        &self,
620
        user: U,
621
        authentication: Authentication,
622
5
    ) -> Result<Authenticated, bonsaidb_core::Error> {
623
5
        let admin = self.admin().await;
624
5
        let user = User::load(user, &admin)
625
1
            .await?
626
5
            .ok_or(bonsaidb_core::Error::InvalidCredentials)?;
627
5
        match authentication {
628
5
            Authentication::Password(password) => {
629
5
                let saved_hash = user
630
5
                    .contents
631
5
                    .argon_hash
632
5
                    .clone()
633
5
                    .ok_or(bonsaidb_core::Error::InvalidCredentials)?;
634

            
635
5
                self.data
636
5
                    .argon
637
5
                    .verify(user.id, password, saved_hash)
638
5
                    .await?;
639
5
                let permissions = user.contents.effective_permissions(&admin).await?;
640
5
                Ok(Authenticated {
641
5
                    user_id: user.id,
642
5
                    permissions,
643
5
                })
644
            }
645
        }
646
10
    }
647

            
648
24
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, permission_group)))]
649
    #[cfg(feature = "multiuser")]
650
    async fn add_permission_group_to_user<
651
        'user,
652
        'group,
653
        U: Into<NamedReference<'user>> + Send + Sync,
654
        G: Into<NamedReference<'group>> + Send + Sync,
655
    >(
656
        &self,
657
        user: U,
658
        permission_group: G,
659
8
    ) -> Result<(), bonsaidb_core::Error> {
660
8
        self.update_user_with_named_id::<PermissionGroup, _, _, _>(
661
8
            user,
662
8
            permission_group,
663
8
            |user, permission_group_id| {
664
8
                if user.contents.groups.contains(&permission_group_id) {
665
4
                    false
666
                } else {
667
4
                    user.contents.groups.push(permission_group_id);
668
4
                    true
669
                }
670
8
            },
671
11
        )
672
11
        .await
673
16
    }
674

            
675
18
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, permission_group)))]
676
    #[cfg(feature = "multiuser")]
677
    async fn remove_permission_group_from_user<
678
        'user,
679
        'group,
680
        U: Into<NamedReference<'user>> + Send + Sync,
681
        G: Into<NamedReference<'group>> + Send + Sync,
682
    >(
683
        &self,
684
        user: U,
685
        permission_group: G,
686
6
    ) -> Result<(), bonsaidb_core::Error> {
687
6
        self.update_user_with_named_id::<PermissionGroup, _, _, _>(
688
6
            user,
689
6
            permission_group,
690
6
            |user, permission_group_id| {
691
6
                let old_len = user.contents.groups.len();
692
6
                user.contents.groups.retain(|id| id != &permission_group_id);
693
6
                old_len != user.contents.groups.len()
694
6
            },
695
9
        )
696
9
        .await
697
12
    }
698

            
699
18
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, role)))]
700
    #[cfg(feature = "multiuser")]
701
    async fn add_role_to_user<
702
        'user,
703
        'group,
704
        U: Into<NamedReference<'user>> + Send + Sync,
705
        G: Into<NamedReference<'group>> + Send + Sync,
706
    >(
707
        &self,
708
        user: U,
709
        role: G,
710
6
    ) -> Result<(), bonsaidb_core::Error> {
711
6
        self.update_user_with_named_id::<PermissionGroup, _, _, _>(user, role, |user, role_id| {
712
6
            if user.contents.roles.contains(&role_id) {
713
3
                false
714
            } else {
715
3
                user.contents.roles.push(role_id);
716
3
                true
717
            }
718
8
        })
719
8
        .await
720
12
    }
721

            
722
18
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, role)))]
723
    #[cfg(feature = "multiuser")]
724
    async fn remove_role_from_user<
725
        'user,
726
        'group,
727
        U: Into<NamedReference<'user>> + Send + Sync,
728
        G: Into<NamedReference<'group>> + Send + Sync,
729
    >(
730
        &self,
731
        user: U,
732
        role: G,
733
6
    ) -> Result<(), bonsaidb_core::Error> {
734
6
        self.update_user_with_named_id::<Role, _, _, _>(user, role, |user, role_id| {
735
6
            let old_len = user.contents.roles.len();
736
6
            user.contents.roles.retain(|id| id != &role_id);
737
6
            old_len != user.contents.roles.len()
738
9
        })
739
9
        .await
740
12
    }
741
}
742

            
743
1
#[test]
744
1
fn name_validation_tests() {
745
1
    assert!(matches!(Storage::validate_name("azAZ09.-"), Ok(())));
746
1
    assert!(matches!(
747
1
        Storage::validate_name("_internal-names-work"),
748
        Ok(())
749
    ));
750
1
    assert!(matches!(
751
1
        Storage::validate_name("-alphaunmericfirstrequired"),
752
        Err(Error::Core(bonsaidb_core::Error::InvalidDatabaseName(_)))
753
    ));
754
1
    assert!(matches!(
755
1
        Storage::validate_name("\u{2661}"),
756
        Err(Error::Core(bonsaidb_core::Error::InvalidDatabaseName(_)))
757
    ));
758
1
}
759

            
760
/// The unique id of a [`Storage`] instance.
761
#[derive(Clone, Copy, Eq, PartialEq, Hash)]
762
pub struct StorageId(u64);
763

            
764
impl StorageId {
765
    /// Returns the id as a u64.
766
    #[must_use]
767
    pub const fn as_u64(self) -> u64 {
768
        self.0
769
    }
770
}
771

            
772
impl Debug for StorageId {
773
3925
    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
774
3925
        // let formatted_length = format!();
775
3925
        write!(f, "{:016x}", self.0)
776
3925
    }
777
}
778

            
779
impl Display for StorageId {
780
3925
    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
781
3925
        Debug::fmt(self, f)
782
3925
    }
783
}