1
use std::{
2
    collections::HashMap,
3
    fmt::{Debug, Display},
4
    marker::PhantomData,
5
    path::{Path, PathBuf},
6
    sync::Arc,
7
};
8

            
9
use async_lock::{Mutex, RwLock};
10
use async_trait::async_trait;
11
pub use bonsaidb_core::circulate::Relay;
12
#[cfg(feature = "password-hashing")]
13
use bonsaidb_core::connection::{Authenticated, Authentication};
14
use bonsaidb_core::{
15
    admin::{
16
        self,
17
        database::{self, ByName, Database as DatabaseRecord},
18
        Admin, ADMIN_DATABASE_NAME,
19
    },
20
    connection::{self, Connection, StorageConnection},
21
    document::KeyId,
22
    schema::{Schema, SchemaName, Schematic},
23
};
24
#[cfg(feature = "multiuser")]
25
use bonsaidb_core::{
26
    admin::{user::User, PermissionGroup, Role},
27
    document::CollectionDocument,
28
    schema::{NamedCollection, NamedReference},
29
};
30
use bonsaidb_utils::{fast_async_lock, fast_async_read, fast_async_write};
31
use futures::TryFutureExt;
32
use itertools::Itertools;
33
use nebari::{
34
    io::{
35
        any::{AnyFile, AnyFileManager},
36
        FileManager,
37
    },
38
    ChunkCache, ThreadPool,
39
};
40
use rand::{thread_rng, Rng};
41
use tokio::{
42
    fs::{self, File},
43
    io::{AsyncReadExt, AsyncWriteExt},
44
};
45

            
46
#[cfg(feature = "encryption")]
47
use crate::vault::{self, LocalVaultKeyStorage, TreeVault, Vault};
48
use crate::{
49
    config::{KeyValuePersistence, StorageConfiguration},
50
    database::Context,
51
    jobs::manager::Manager,
52
    tasks::TaskManager,
53
    Database, Error,
54
};
55

            
56
#[cfg(feature = "password-hashing")]
57
mod argon;
58

            
59
mod backup;
60
pub use backup::BackupLocation;
61

            
62
/// A file-based, multi-database, multi-user database engine.
63
///
64
/// ## Converting from `Database::open` to `Storage::open`
65
///
66
/// [`Database::open`](Database::open) is a simple method that uses `Storage` to
67
/// create a database named `default` with the schema provided. These two ways
68
/// of opening the database are the same:
69
///
70
/// ```rust
71
/// // `bonsaidb_core` is re-exported to `bonsaidb::core` or `bonsaidb_local::core`.
72
/// use bonsaidb_core::{connection::StorageConnection, schema::Schema};
73
/// // `bonsaidb_local` is re-exported to `bonsaidb::local` if using the omnibus crate.
74
/// use bonsaidb_local::{
75
///     config::{Builder, StorageConfiguration},
76
///     Database, Storage,
77
/// };
78
/// # async fn open<MySchema: Schema>() -> anyhow::Result<()> {
79
/// // This creates a Storage instance, creates a database, and returns it.
80
/// let db = Database::open::<MySchema>(StorageConfiguration::new("my-db.bonsaidb")).await?;
81
///
82
/// // This is the equivalent code being executed:
83
/// let storage =
84
///     Storage::open(StorageConfiguration::new("my-db.bonsaidb").with_schema::<MySchema>()?)
85
///         .await?;
86
/// storage.create_database::<MySchema>("default", true).await?;
87
/// let db = storage.database::<MySchema>("default").await?;
88
/// #     Ok(())
89
/// # }
90
/// ```
91
///
92
/// ## Using multiple databases
93
///
94
/// This example shows how to use `Storage` to create and use multiple databases
95
/// with multiple schemas:
96
///
97
/// ```rust
98
/// use bonsaidb_core::{
99
///     connection::StorageConnection,
100
///     schema::{Collection, Schema},
101
/// };
102
/// use bonsaidb_local::{
103
///     config::{Builder, StorageConfiguration},
104
///     Storage,
105
/// };
106
/// use serde::{Deserialize, Serialize};
107
///
108
/// #[derive(Debug, Schema)]
109
/// #[schema(name = "my-schema", collections = [BlogPost, Author])]
110
/// # #[schema(core = bonsaidb_core)]
111
/// struct MySchema;
112
///
113
/// #[derive(Debug, Serialize, Deserialize, Collection)]
114
/// #[collection(name = "blog-posts")]
115
/// # #[collection(core = bonsaidb_core)]
116
/// struct BlogPost {
117
///     pub title: String,
118
///     pub contents: String,
119
///     pub author_id: u64,
120
/// }
121
///
122
/// #[derive(Debug, Serialize, Deserialize, Collection)]
123
/// #[collection(name = "blog-posts")]
124
/// # #[collection(core = bonsaidb_core)]
125
/// struct Author {
126
///     pub name: String,
127
/// }
128
///
129
/// # async fn test_fn() -> Result<(), bonsaidb_core::Error> {
130
/// let storage = Storage::open(
131
///     StorageConfiguration::new("my-db.bonsaidb")
132
///         .with_schema::<BlogPost>()?
133
///         .with_schema::<MySchema>()?,
134
/// )
135
/// .await?;
136
///
137
/// storage
138
///     .create_database::<BlogPost>("ectons-blog", true)
139
///     .await?;
140
/// let ectons_blog = storage.database::<BlogPost>("ectons-blog").await?;
141
/// storage
142
///     .create_database::<MySchema>("another-db", true)
143
///     .await?;
144
/// let another_db = storage.database::<MySchema>("another-db").await?;
145
///
146
/// #     Ok(())
147
/// # }
148
/// ```
149
193522
#[derive(Debug, Clone)]
150
pub struct Storage {
151
    data: Arc<Data>,
152
}
153

            
154
#[derive(Debug)]
155
struct Data {
156
    id: StorageId,
157
    path: PathBuf,
158
    threadpool: ThreadPool<AnyFile>,
159
    file_manager: AnyFileManager,
160
    pub(crate) tasks: TaskManager,
161
    schemas: RwLock<HashMap<SchemaName, Box<dyn DatabaseOpener>>>,
162
    available_databases: RwLock<HashMap<String, SchemaName>>,
163
    open_roots: Mutex<HashMap<String, Context>>,
164
    #[cfg(feature = "password-hashing")]
165
    argon: argon::Hasher,
166
    #[cfg(feature = "encryption")]
167
    pub(crate) vault: Arc<Vault>,
168
    #[cfg(feature = "encryption")]
169
    default_encryption_key: Option<KeyId>,
170
    pub(crate) key_value_persistence: KeyValuePersistence,
171
    chunk_cache: ChunkCache,
172
    pub(crate) check_view_integrity_on_database_open: bool,
173
    relay: Relay,
174
}
175

            
176
impl Storage {
177
    /// Creates or opens a multi-database [`Storage`] with its data stored in `directory`.
178
2277
    pub async fn open(configuration: StorageConfiguration) -> Result<Self, Error> {
179
161
        let owned_path = configuration
180
161
            .path
181
161
            .clone()
182
161
            .unwrap_or_else(|| PathBuf::from("db.bonsaidb"));
183
161
        let file_manager = if configuration.memory_only {
184
30
            AnyFileManager::memory()
185
        } else {
186
131
            AnyFileManager::std()
187
        };
188

            
189
161
        let manager = Manager::default();
190
644
        for _ in 0..configuration.workers.worker_count {
191
644
            manager.spawn_worker();
192
644
        }
193
161
        let tasks = TaskManager::new(manager);
194
161

            
195
161
        fs::create_dir_all(&owned_path).await?;
196

            
197
328
        let id = Self::lookup_or_create_id(&configuration, &owned_path).await?;
198

            
199
        #[cfg(feature = "encryption")]
200
159
        let vault = {
201
161
            let vault_key_storage = match configuration.vault_key_storage {
202
3
                Some(storage) => storage,
203
                None => Box::new(
204
158
                    LocalVaultKeyStorage::new(owned_path.join("vault-keys"))
205
148
                        .await
206
158
                        .map_err(|err| Error::Vault(vault::Error::Initializing(err.to_string())))?,
207
                ),
208
            };
209

            
210
1255
            Arc::new(Vault::initialize(id, &owned_path, vault_key_storage).await?)
211
        };
212

            
213
159
        let check_view_integrity_on_database_open = configuration.views.check_integrity_on_open;
214
159
        let key_value_persistence = configuration.key_value_persistence;
215
159
        #[cfg(feature = "password-hashing")]
216
159
        let argon = argon::Hasher::new(configuration.argon);
217
159
        #[cfg(feature = "encryption")]
218
159
        let default_encryption_key = configuration.default_encryption_key;
219
160
        let storage = tokio::task::spawn_blocking::<_, Result<Self, Error>>(move || {
220
160
            Ok(Self {
221
160
                data: Arc::new(Data {
222
160
                    id,
223
160
                    tasks,
224
160
                    #[cfg(feature = "password-hashing")]
225
160
                    argon,
226
160
                    #[cfg(feature = "encryption")]
227
160
                    vault,
228
160
                    #[cfg(feature = "encryption")]
229
160
                    default_encryption_key,
230
160
                    path: owned_path,
231
160
                    file_manager,
232
160
                    chunk_cache: ChunkCache::new(2000, 160_384),
233
160
                    threadpool: ThreadPool::default(),
234
160
                    schemas: RwLock::new(configuration.initial_schemas),
235
160
                    available_databases: RwLock::default(),
236
160
                    open_roots: Mutex::default(),
237
160
                    key_value_persistence,
238
160
                    check_view_integrity_on_database_open,
239
160
                    relay: Relay::default(),
240
160
                }),
241
160
            })
242
160
        })
243
117
        .await??;
244

            
245
331
        storage.cache_available_databases().await?;
246

            
247
160
        storage.create_admin_database_if_needed().await?;
248

            
249
160
        Ok(storage)
250
161
    }
251

            
252
    /// Returns the path of the database storage.
253
    #[must_use]
254
15508
    pub fn path(&self) -> &Path {
255
15508
        &self.data.path
256
15508
    }
257

            
258
2277
    async fn lookup_or_create_id(
259
2277
        configuration: &StorageConfiguration,
260
2277
        path: &Path,
261
2277
    ) -> Result<StorageId, Error> {
262
161
        Ok(StorageId(if let Some(id) = configuration.unique_id {
263
            // The configuraiton id override is not persisted to disk. This is
264
            // mostly to prevent someone from accidentally adding this
265
            // configuration, realizing it breaks things, and then wanting to
266
            // revert. This makes reverting to the old value easier.
267
            id
268
        } else {
269
            // Load/Store a randomly generated id into a file. While the value
270
            // is numerical, the file contents are the ascii decimal, making it
271
            // easier for a human to view, and if needed, edit.
272
161
            let id_path = path.join("server-id");
273
161

            
274
161
            if id_path.exists() {
275
                // This value is important enought to not allow launching the
276
                // server if the file can't be read or contains unexpected data.
277
12
                let existing_id = String::from_utf8(
278
12
                    File::open(id_path)
279
12
                        .and_then(|mut f| async move {
280
12
                            let mut bytes = Vec::new();
281
24
                            f.read_to_end(&mut bytes).await.map(|_| bytes)
282
36
                        })
283
36
                        .await
284
12
                        .expect("error reading server-id file"),
285
12
                )
286
12
                .expect("server-id contains invalid data");
287
12

            
288
12
                existing_id.parse().expect("server-id isn't numeric")
289
            } else {
290
149
                let id = { thread_rng().gen::<u64>() };
291
149
                File::create(id_path)
292
149
                    .and_then(|mut file| async move {
293
149
                        let id = id.to_string();
294
149
                        file.write_all(id.as_bytes()).await?;
295
149
                        file.shutdown().await
296
292
                    })
297
292
                    .await
298
149
                    .map_err(|err| {
299
                        Error::Core(bonsaidb_core::Error::Configuration(format!(
300
                            "Error writing server-id file: {}",
301
                            err
302
                        )))
303
149
                    })?;
304
149
                id
305
            }
306
        }))
307
161
    }
308

            
309
2253
    async fn cache_available_databases(&self) -> Result<(), Error> {
310
160
        let available_databases = self
311
160
            .admin()
312
159
            .await
313
160
            .view::<ByName>()
314
172
            .query()
315
172
            .await?
316
160
            .into_iter()
317
168
            .map(|map| (map.key, map.value))
318
160
            .collect();
319
159
        let mut storage_databases = fast_async_write!(self.data.available_databases);
320
159
        *storage_databases = available_databases;
321
159
        Ok(())
322
159
    }
323

            
324
2253
    async fn create_admin_database_if_needed(&self) -> Result<(), Error> {
325
160
        self.register_schema::<Admin>().await?;
326
160
        match self.database::<Admin>(ADMIN_DATABASE_NAME).await {
327
11
            Ok(_) => {}
328
            Err(bonsaidb_core::Error::DatabaseNotFound(_)) => {
329
149
                self.create_database::<Admin>(ADMIN_DATABASE_NAME, true)
330
149
                    .await?;
331
            }
332
            Err(err) => return Err(Error::Core(err)),
333
        }
334
159
        Ok(())
335
159
    }
336

            
337
    /// Returns the unique id of the server.
338
    ///
339
    /// This value is set from the [`StorageConfiguration`] or randomly
340
    /// generated when creating a server. It shouldn't be changed after a server
341
    /// is in use, as doing can cause issues. For example, the vault that
342
    /// manages encrypted storage uses the server ID to store the vault key. If
343
    /// the server ID changes, the vault key storage will need to be updated
344
    /// with the new server ID.
345
    #[must_use]
346
    pub fn unique_id(&self) -> StorageId {
347
        self.data.id
348
    }
349

            
350
    #[must_use]
351
    #[cfg(feature = "encryption")]
352
514966
    pub(crate) fn vault(&self) -> &Arc<Vault> {
353
514966
        &self.data.vault
354
514966
    }
355

            
356
    #[must_use]
357
    #[cfg(feature = "encryption")]
358
1899574
    pub(crate) fn default_encryption_key(&self) -> Option<&KeyId> {
359
1899574
        self.data.default_encryption_key.as_ref()
360
1899574
    }
361

            
362
    #[must_use]
363
    #[cfg(not(feature = "encryption"))]
364
    #[allow(clippy::unused_self)]
365
    pub(crate) fn default_encryption_key(&self) -> Option<&KeyId> {
366
        None
367
    }
368

            
369
    /// Registers a schema for use within the server.
370
160
    pub async fn register_schema<DB: Schema>(&self) -> Result<(), Error> {
371
159
        let mut schemas = fast_async_write!(self.data.schemas);
372
        if schemas
373
            .insert(
374
159
                DB::schema_name(),
375
159
                Box::new(StorageSchemaOpener::<DB>::new()?),
376
            )
377
159
            .is_none()
378
        {
379
160
            Ok(())
380
        } else {
381
            Err(Error::Core(bonsaidb_core::Error::SchemaAlreadyRegistered(
382
                DB::schema_name(),
383
            )))
384
        }
385
160
    }
386

            
387
    #[cfg_attr(not(feature = "encryption"), allow(unused_mut))]
388
1269241
    pub(crate) async fn open_roots(&self, name: &str) -> Result<Context, Error> {
389
1269265
        let mut open_roots = fast_async_lock!(self.data.open_roots);
390
1269265
        if let Some(roots) = open_roots.get(name) {
391
1249831
            Ok(roots.clone())
392
        } else {
393
19434
            let task_self = self.clone();
394
19434
            let task_name = name.to_string();
395
19434
            let roots = tokio::task::spawn_blocking(move || {
396
19434
                let mut config = nebari::Config::new(task_self.data.path.join(task_name))
397
19434
                    .file_manager(task_self.data.file_manager.clone())
398
19434
                    .cache(task_self.data.chunk_cache.clone())
399
19434
                    .shared_thread_pool(&task_self.data.threadpool);
400
                #[cfg(feature = "encryption")]
401
19434
                if let Some(key) = task_self.default_encryption_key() {
402
96
                    config = config.vault(TreeVault {
403
96
                        key: key.clone(),
404
96
                        vault: task_self.vault().clone(),
405
96
                    });
406
19338
                }
407
19434
                config.open().map_err(Error::from)
408
19434
            })
409
19386
            .await
410
19434
            .unwrap()?;
411
19434
            let context = Context::new(roots, self.data.key_value_persistence.clone());
412
19434

            
413
19434
            open_roots.insert(name.to_owned(), context.clone());
414
19434

            
415
19434
            Ok(context)
416
        }
417
1269265
    }
418

            
419
1618459
    pub(crate) fn tasks(&self) -> &'_ TaskManager {
420
1618459
        &self.data.tasks
421
1618459
    }
422

            
423
1269265
    pub(crate) fn check_view_integrity_on_database_open(&self) -> bool {
424
1269265
        self.data.check_view_integrity_on_database_open
425
1269265
    }
426

            
427
344
    pub(crate) fn relay(&self) -> &'_ Relay {
428
344
        &self.data.relay
429
344
    }
430

            
431
19950
    fn validate_name(name: &str) -> Result<(), Error> {
432
19950
        if name.chars().enumerate().all(|(index, c)| {
433
138146
            c.is_ascii_alphanumeric()
434
6399
                || (index == 0 && c == '_')
435
2492
                || (index > 0 && (c == '.' || c == '-'))
436
138218
        }) {
437
19850
            Ok(())
438
        } else {
439
100
            Err(Error::Core(bonsaidb_core::Error::InvalidDatabaseName(
440
100
                name.to_owned(),
441
100
            )))
442
        }
443
19950
    }
444

            
445
    /// Returns the administration database.
446
    #[allow(clippy::missing_panics_doc)]
447
35561
    pub async fn admin(&self) -> Database {
448
        Database::new::<Admin, _>(
449
            ADMIN_DATABASE_NAME,
450
35537
            self.open_roots(ADMIN_DATABASE_NAME).await.unwrap(),
451
35537
            self.clone(),
452
        )
453
        .await
454
35561
        .unwrap()
455
35561
    }
456

            
457
    /// Opens a database through a generic-free trait.
458
1235761
    pub(crate) async fn database_without_schema(&self, name: &str) -> Result<Database, Error> {
459
51481
        let schema = {
460
51630
            let available_databases = fast_async_read!(self.data.available_databases);
461
51630
            available_databases
462
51630
                .get(name)
463
51630
                .ok_or_else(|| {
464
149
                    Error::Core(bonsaidb_core::Error::DatabaseNotFound(name.to_string()))
465
51630
                })?
466
51481
                .clone()
467
        };
468

            
469
51481
        let mut schemas = fast_async_write!(self.data.schemas);
470
51481
        if let Some(schema) = schemas.get_mut(&schema) {
471
51481
            let db = schema.open(name.to_string(), self.clone()).await?;
472
51481
            Ok(db)
473
        } else {
474
            Err(Error::Core(bonsaidb_core::Error::SchemaNotRegistered(
475
                schema,
476
            )))
477
        }
478
51630
    }
479

            
480
    #[cfg(feature = "internal-apis")]
481
    #[doc(hidden)]
482
    /// Opens a database through a generic-free trait.
483
1225104
    pub async fn database_without_schema_internal(&self, name: &str) -> Result<Database, Error> {
484
100055
        self.database_without_schema(name).await
485
51046
    }
486

            
487
    #[cfg(feature = "multiuser")]
488
34
    async fn update_user_with_named_id<
489
34
        'user,
490
34
        'other,
491
34
        Col: NamedCollection,
492
34
        U: Into<NamedReference<'user>> + Send + Sync,
493
34
        O: Into<NamedReference<'other>> + Send + Sync,
494
34
        F: FnOnce(&mut CollectionDocument<User>, u64) -> bool,
495
34
    >(
496
34
        &self,
497
34
        user: U,
498
34
        other: O,
499
34
        callback: F,
500
34
    ) -> Result<(), bonsaidb_core::Error> {
501
34
        let user = user.into();
502
34
        let other = other.into();
503
34
        let admin = self.admin().await;
504
34
        let (user, other) =
505
34
            futures::try_join!(User::load(user, &admin), other.id::<Col, _>(&admin),)?;
506
34
        match (user, other) {
507
34
            (Some(mut user), Some(other)) => {
508
34
                if callback(&mut user, other) {
509
17
                    user.update(&admin).await?;
510
17
                }
511
34
                Ok(())
512
            }
513
            // TODO make this a generic not found with a name parameter.
514
            _ => Err(bonsaidb_core::Error::UserNotFound),
515
        }
516
34
    }
517
}
518

            
519
#[async_trait]
520
pub trait DatabaseOpener: Send + Sync + Debug {
521
    fn schematic(&self) -> &'_ Schematic;
522
    async fn open(&self, name: String, storage: Storage) -> Result<Database, Error>;
523
}
524

            
525
#[derive(Debug)]
526
pub struct StorageSchemaOpener<DB: Schema> {
527
    schematic: Schematic,
528
    _phantom: PhantomData<DB>,
529
}
530

            
531
impl<DB> StorageSchemaOpener<DB>
532
where
533
    DB: Schema,
534
{
535
395
    pub fn new() -> Result<Self, Error> {
536
395
        let schematic = DB::schematic()?;
537
395
        Ok(Self {
538
395
            schematic,
539
395
            _phantom: PhantomData::default(),
540
395
        })
541
395
    }
542
}
543

            
544
#[async_trait]
545
impl<DB> DatabaseOpener for StorageSchemaOpener<DB>
546
where
547
    DB: Schema,
548
{
549
    fn schematic(&self) -> &'_ Schematic {
550
        &self.schematic
551
    }
552

            
553
51481
    async fn open(&self, name: String, storage: Storage) -> Result<Database, Error> {
554
51481
        let roots = storage.open_roots(&name).await?;
555
51481
        let db = Database::new::<DB, _>(name, roots, storage).await?;
556
51481
        Ok(db)
557
102962
    }
558
}
559

            
560
#[async_trait]
561
impl StorageConnection for Storage {
562
    type Database = Database;
563

            
564
    #[cfg_attr(
565
        feature = "tracing",
566
59790
        tracing::instrument(skip(name, schema, only_if_needed))
567
    )]
568
    async fn create_database_with_schema(
569
        &self,
570
        name: &str,
571
        schema: SchemaName,
572
        only_if_needed: bool,
573
19946
    ) -> Result<(), bonsaidb_core::Error> {
574
19946
        Self::validate_name(name)?;
575

            
576
        {
577
19872
            let schemas = fast_async_read!(self.data.schemas);
578
19872
            if !schemas.contains_key(&schema) {
579
74
                return Err(bonsaidb_core::Error::SchemaNotRegistered(schema));
580
19798
            }
581
        }
582

            
583
19798
        let mut available_databases = fast_async_write!(self.data.available_databases);
584
19798
        let admin = self.admin().await;
585
19798
        if !admin
586
19798
            .view::<database::ByName>()
587
19798
            .with_key(name.to_ascii_lowercase())
588
19798
            .query()
589
17255
            .await?
590
19798
            .is_empty()
591
        {
592
466
            if only_if_needed {
593
392
                return Ok(());
594
74
            }
595
74

            
596
74
            return Err(bonsaidb_core::Error::DatabaseNameAlreadyTaken(
597
74
                name.to_string(),
598
74
            ));
599
19332
        }
600
19332

            
601
19332
        admin
602
19332
            .collection::<DatabaseRecord>()
603
19332
            .push(&admin::Database {
604
19332
                name: name.to_string(),
605
19332
                schema: schema.clone(),
606
19332
            })
607
18612
            .await?;
608
19332
        available_databases.insert(name.to_string(), schema);
609
19332

            
610
19332
        Ok(())
611
39892
    }
612

            
613
573
    async fn database<DB: Schema>(
614
573
        &self,
615
573
        name: &str,
616
573
    ) -> Result<Self::Database, bonsaidb_core::Error> {
617
573
        let db = self.database_without_schema(name).await?;
618
424
        if db.data.schema.name == DB::schema_name() {
619
424
            Ok(db)
620
        } else {
621
            Err(bonsaidb_core::Error::SchemaMismatch {
622
                database_name: name.to_owned(),
623
                schema: DB::schema_name(),
624
                stored_schema: db.data.schema.name.clone(),
625
            })
626
        }
627
1146
    }
628

            
629
36444
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(name)))]
630
12148
    async fn delete_database(&self, name: &str) -> Result<(), bonsaidb_core::Error> {
631
12148
        let admin = self.admin().await;
632
12148
        let mut available_databases = fast_async_write!(self.data.available_databases);
633
12148
        available_databases.remove(name);
634

            
635
12148
        let mut open_roots = fast_async_lock!(self.data.open_roots);
636
12148
        open_roots.remove(name);
637
12148

            
638
12148
        let database_folder = self.path().join(name);
639
12148
        if database_folder.exists() {
640
12000
            let file_manager = self.data.file_manager.clone();
641
12000
            tokio::task::spawn_blocking(move || file_manager.delete_directory(&database_folder))
642
9528
                .await
643
12000
                .unwrap()
644
12000
                .map_err(Error::Nebari)?;
645
148
        }
646

            
647
12148
        if let Some(entry) = admin
648
12148
            .view::<database::ByName>()
649
12148
            .with_key(name.to_ascii_lowercase())
650
12148
            .query()
651
12148
            .await?
652
12148
            .first()
653
        {
654
12074
            admin.delete::<DatabaseRecord, _>(&entry.source).await?;
655

            
656
12074
            Ok(())
657
        } else {
658
74
            return Err(bonsaidb_core::Error::DatabaseNotFound(name.to_string()));
659
        }
660
24296
    }
661

            
662
222
    #[cfg_attr(feature = "tracing", tracing::instrument)]
663
74
    async fn list_databases(&self) -> Result<Vec<connection::Database>, bonsaidb_core::Error> {
664
74
        let available_databases = fast_async_read!(self.data.available_databases);
665
74
        Ok(available_databases
666
74
            .iter()
667
1852
            .map(|(name, schema)| connection::Database {
668
1852
                name: name.to_string(),
669
1852
                schema: schema.clone(),
670
1852
            })
671
74
            .collect())
672
148
    }
673

            
674
222
    #[cfg_attr(feature = "tracing", tracing::instrument)]
675
74
    async fn list_available_schemas(&self) -> Result<Vec<SchemaName>, bonsaidb_core::Error> {
676
74
        let available_databases = fast_async_read!(self.data.available_databases);
677
74
        Ok(available_databases.values().unique().cloned().collect())
678
148
    }
679

            
680
510
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(username)))]
681
    #[cfg(feature = "multiuser")]
682
170
    async fn create_user(&self, username: &str) -> Result<u64, bonsaidb_core::Error> {
683
170
        let result = self
684
170
            .admin()
685
            .await
686
170
            .collection::<User>()
687
244
            .push(&User::default_with_username(username))
688
244
            .await?;
689
146
        Ok(result.id)
690
340
    }
691

            
692
    #[cfg(feature = "password-hashing")]
693
9
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, password)))]
694
    async fn set_user_password<'user, U: Into<NamedReference<'user>> + Send + Sync>(
695
        &self,
696
        user: U,
697
        password: bonsaidb_core::connection::SensitiveString,
698
3
    ) -> Result<(), bonsaidb_core::Error> {
699
3
        let admin = self.admin().await;
700
5
        let mut user = User::load(user, &admin)
701
5
            .await?
702
3
            .ok_or(bonsaidb_core::Error::UserNotFound)?;
703
3
        user.contents.argon_hash = Some(self.data.argon.hash(user.id, password).await?);
704
3
        user.update(&admin).await
705
6
    }
706

            
707
    #[cfg(all(feature = "multiuser", feature = "password-hashing"))]
708
15
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user)))]
709
    async fn authenticate<'user, U: Into<NamedReference<'user>> + Send + Sync>(
710
        &self,
711
        user: U,
712
        authentication: Authentication,
713
5
    ) -> Result<Authenticated, bonsaidb_core::Error> {
714
5
        let admin = self.admin().await;
715
5
        let user = User::load(user, &admin)
716
1
            .await?
717
5
            .ok_or(bonsaidb_core::Error::InvalidCredentials)?;
718
5
        match authentication {
719
5
            Authentication::Password(password) => {
720
5
                let saved_hash = user
721
5
                    .contents
722
5
                    .argon_hash
723
5
                    .clone()
724
5
                    .ok_or(bonsaidb_core::Error::InvalidCredentials)?;
725

            
726
5
                self.data
727
5
                    .argon
728
5
                    .verify(user.id, password, saved_hash)
729
5
                    .await?;
730
5
                let permissions = user.contents.effective_permissions(&admin).await?;
731
5
                Ok(Authenticated {
732
5
                    user_id: user.id,
733
5
                    permissions,
734
5
                })
735
            }
736
        }
737
10
    }
738

            
739
30
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, permission_group)))]
740
    #[cfg(feature = "multiuser")]
741
    async fn add_permission_group_to_user<
742
        'user,
743
        'group,
744
        U: Into<NamedReference<'user>> + Send + Sync,
745
        G: Into<NamedReference<'group>> + Send + Sync,
746
    >(
747
        &self,
748
        user: U,
749
        permission_group: G,
750
10
    ) -> Result<(), bonsaidb_core::Error> {
751
10
        self.update_user_with_named_id::<PermissionGroup, _, _, _>(
752
10
            user,
753
10
            permission_group,
754
10
            |user, permission_group_id| {
755
10
                if user.contents.groups.contains(&permission_group_id) {
756
5
                    false
757
                } else {
758
5
                    user.contents.groups.push(permission_group_id);
759
5
                    true
760
                }
761
10
            },
762
13
        )
763
11
        .await
764
20
    }
765

            
766
24
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, permission_group)))]
767
    #[cfg(feature = "multiuser")]
768
    async fn remove_permission_group_from_user<
769
        'user,
770
        'group,
771
        U: Into<NamedReference<'user>> + Send + Sync,
772
        G: Into<NamedReference<'group>> + Send + Sync,
773
    >(
774
        &self,
775
        user: U,
776
        permission_group: G,
777
8
    ) -> Result<(), bonsaidb_core::Error> {
778
8
        self.update_user_with_named_id::<PermissionGroup, _, _, _>(
779
8
            user,
780
8
            permission_group,
781
8
            |user, permission_group_id| {
782
8
                let old_len = user.contents.groups.len();
783
8
                user.contents.groups.retain(|id| id != &permission_group_id);
784
8
                old_len != user.contents.groups.len()
785
8
            },
786
8
        )
787
6
        .await
788
16
    }
789

            
790
24
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, role)))]
791
    #[cfg(feature = "multiuser")]
792
    async fn add_role_to_user<
793
        'user,
794
        'group,
795
        U: Into<NamedReference<'user>> + Send + Sync,
796
        G: Into<NamedReference<'group>> + Send + Sync,
797
    >(
798
        &self,
799
        user: U,
800
        role: G,
801
8
    ) -> Result<(), bonsaidb_core::Error> {
802
8
        self.update_user_with_named_id::<PermissionGroup, _, _, _>(user, role, |user, role_id| {
803
8
            if user.contents.roles.contains(&role_id) {
804
4
                false
805
            } else {
806
4
                user.contents.roles.push(role_id);
807
4
                true
808
            }
809
8
        })
810
5
        .await
811
16
    }
812

            
813
24
    #[cfg_attr(feature = "tracing", tracing::instrument(skip(user, role)))]
814
    #[cfg(feature = "multiuser")]
815
    async fn remove_role_from_user<
816
        'user,
817
        'group,
818
        U: Into<NamedReference<'user>> + Send + Sync,
819
        G: Into<NamedReference<'group>> + Send + Sync,
820
    >(
821
        &self,
822
        user: U,
823
        role: G,
824
8
    ) -> Result<(), bonsaidb_core::Error> {
825
8
        self.update_user_with_named_id::<Role, _, _, _>(user, role, |user, role_id| {
826
8
            let old_len = user.contents.roles.len();
827
8
            user.contents.roles.retain(|id| id != &role_id);
828
8
            old_len != user.contents.roles.len()
829
8
        })
830
7
        .await
831
16
    }
832
}
833

            
834
1
#[test]
835
1
fn name_validation_tests() {
836
1
    assert!(matches!(Storage::validate_name("azAZ09.-"), Ok(())));
837
1
    assert!(matches!(
838
1
        Storage::validate_name("_internal-names-work"),
839
        Ok(())
840
    ));
841
1
    assert!(matches!(
842
1
        Storage::validate_name("-alphaunmericfirstrequired"),
843
        Err(Error::Core(bonsaidb_core::Error::InvalidDatabaseName(_)))
844
    ));
845
1
    assert!(matches!(
846
1
        Storage::validate_name("\u{2661}"),
847
        Err(Error::Core(bonsaidb_core::Error::InvalidDatabaseName(_)))
848
    ));
849
1
}
850

            
851
/// The unique id of a [`Storage`] instance.
852
#[derive(Clone, Copy, Eq, PartialEq, Hash)]
853
pub struct StorageId(u64);
854

            
855
impl StorageId {
856
    /// Returns the id as a u64.
857
    #[must_use]
858
    pub const fn as_u64(self) -> u64 {
859
        self.0
860
    }
861
}
862

            
863
impl Debug for StorageId {
864
4359
    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
865
4359
        // let formatted_length = format!();
866
4359
        write!(f, "{:016x}", self.0)
867
4359
    }
868
}
869

            
870
impl Display for StorageId {
871
4359
    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
872
4359
        Debug::fmt(self, f)
873
4359
    }
874
}