summaryrefslogtreecommitdiffstats
path: root/store
diff options
context:
space:
mode:
Diffstat (limited to 'store')
-rw-r--r--store/sql_channel_store.go12
-rw-r--r--store/sql_post_store.go16
-rw-r--r--store/sql_store.go38
3 files changed, 57 insertions, 9 deletions
diff --git a/store/sql_channel_store.go b/store/sql_channel_store.go
index 592657c1c..463fce16f 100644
--- a/store/sql_channel_store.go
+++ b/store/sql_channel_store.go
@@ -37,6 +37,7 @@ func NewSqlChannelStore(sqlStore *SqlStore) ChannelStore {
}
func (s SqlChannelStore) UpgradeSchemaIfNeeded() {
+ s.CreateColumnIfNotExists("ChannelMembers", "LastUpdateAt", "NotifyLevel", "bigint(20)", "0") // Remove after 6/7/2015 prod push
}
func (s SqlChannelStore) CreateIndexesIfNotExists() {
@@ -273,6 +274,7 @@ func (s SqlChannelStore) SaveMember(member *model.ChannelMember) StoreChannel {
go func() {
result := StoreResult{}
+ member.PreSave()
if result.Err = member.IsValid(); result.Err != nil {
storeChannel <- result
return
@@ -484,7 +486,8 @@ func (s SqlChannelStore) UpdateLastViewedAt(channelId string, userId string) Sto
SET
ChannelMembers.MentionCount = 0,
ChannelMembers.MsgCount = Channels.TotalMsgCount,
- ChannelMembers.LastViewedAt = Channels.LastPostAt
+ ChannelMembers.LastViewedAt = Channels.LastPostAt,
+ ChannelMembers.LastUpdateAt = Channels.LastPostAt
WHERE
Channels.Id = ChannelMembers.ChannelId
AND UserId = ?
@@ -533,15 +536,18 @@ func (s SqlChannelStore) UpdateNotifyLevel(channelId, userId, notifyLevel string
go func() {
result := StoreResult{}
+ updateAt := model.GetMillis()
+
_, err := s.GetMaster().Exec(
`UPDATE
ChannelMembers
SET
- NotifyLevel = ?
+ NotifyLevel = ?,
+ LastUpdateAt = ?
WHERE
UserId = ?
AND ChannelId = ?`,
- notifyLevel, userId, channelId)
+ notifyLevel, updateAt, userId, channelId)
if err != nil {
result.Err = model.NewAppError("SqlChannelStore.UpdateNotifyLevel", "We couldn't update the notify level", "channel_id="+channelId+", user_id="+userId+", "+err.Error())
}
diff --git a/store/sql_post_store.go b/store/sql_post_store.go
index 0ceebc02f..01900023f 100644
--- a/store/sql_post_store.go
+++ b/store/sql_post_store.go
@@ -356,9 +356,14 @@ func (s SqlPostStore) Search(teamId string, userId string, terms string, isHasht
go func() {
result := StoreResult{}
+ termMap := map[string]bool{}
+
searchType := "Message"
if isHashtagSearch {
searchType = "Hashtags"
+ for _,term := range strings.Split(terms, " ") {
+ termMap[term] = true;
+ }
}
// @ has a speical meaning in INNODB FULLTEXT indexes and
@@ -394,6 +399,17 @@ func (s SqlPostStore) Search(teamId string, userId string, terms string, isHasht
list := &model.PostList{Order: make([]string, 0, len(posts))}
for _, p := range posts {
+ if searchType == "Hashtags" {
+ exactMatch := false
+ for _, tag := range strings.Split(p.Hashtags, " ") {
+ if termMap[tag] {
+ exactMatch = true
+ }
+ }
+ if !exactMatch {
+ continue
+ }
+ }
list.AddPost(p)
list.AddOrder(p.Id)
}
diff --git a/store/sql_store.go b/store/sql_store.go
index a2deea6ba..bef8b4867 100644
--- a/store/sql_store.go
+++ b/store/sql_store.go
@@ -7,6 +7,9 @@ import (
l4g "code.google.com/p/log4go"
"crypto/aes"
"crypto/cipher"
+ "crypto/hmac"
+ "crypto/sha256"
+ "crypto/sha512"
crand "crypto/rand"
dbsql "database/sql"
"encoding/base64"
@@ -327,20 +330,26 @@ func encrypt(key []byte, text string) (string, error) {
}
plaintext := []byte(text)
+ skey := sha512.Sum512(key)
+ ekey, akey := skey[:32], skey[32:]
- block, err := aes.NewCipher(key)
+ block, err := aes.NewCipher(ekey)
if err != nil {
return "", err
}
- ciphertext := make([]byte, aes.BlockSize+len(plaintext))
+ macfn := hmac.New(sha256.New, akey)
+ ciphertext := make([]byte, aes.BlockSize+macfn.Size()+len(plaintext))
iv := ciphertext[:aes.BlockSize]
if _, err := io.ReadFull(crand.Reader, iv); err != nil {
return "", err
}
stream := cipher.NewCFBEncrypter(block, iv)
- stream.XORKeyStream(ciphertext[aes.BlockSize:], plaintext)
+ stream.XORKeyStream(ciphertext[aes.BlockSize+macfn.Size():], plaintext)
+ macfn.Write(ciphertext[aes.BlockSize+macfn.Size():])
+ mac := macfn.Sum(nil)
+ copy(ciphertext[aes.BlockSize:aes.BlockSize+macfn.Size()], mac)
return base64.URLEncoding.EncodeToString(ciphertext), nil
}
@@ -351,9 +360,26 @@ func decrypt(key []byte, cryptoText string) (string, error) {
return "{}", nil
}
- ciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)
+ ciphertext, err := base64.URLEncoding.DecodeString(cryptoText)
+ if err != nil {
+ return "", err
+ }
+
+ skey := sha512.Sum512(key)
+ ekey, akey := skey[:32], skey[32:]
+ macfn := hmac.New(sha256.New, akey)
+ if len(ciphertext) < aes.BlockSize+macfn.Size() {
+ return "", errors.New("short ciphertext")
+ }
+
+ macfn.Write(ciphertext[aes.BlockSize+macfn.Size():])
+ expectedMac := macfn.Sum(nil)
+ mac := ciphertext[aes.BlockSize:aes.BlockSize+macfn.Size()]
+ if hmac.Equal(expectedMac, mac) != true {
+ return "", errors.New("Incorrect MAC for the given ciphertext")
+ }
- block, err := aes.NewCipher(key)
+ block, err := aes.NewCipher(ekey)
if err != nil {
return "", err
}
@@ -362,7 +388,7 @@ func decrypt(key []byte, cryptoText string) (string, error) {
return "", errors.New("ciphertext too short")
}
iv := ciphertext[:aes.BlockSize]
- ciphertext = ciphertext[aes.BlockSize:]
+ ciphertext = ciphertext[aes.BlockSize+macfn.Size():]
stream := cipher.NewCFBDecrypter(block, iv)