package protocol import ( "context" "crypto/ecdsa" "database/sql" "encoding/hex" "fmt" "sync" "time" "github.com/status-im/status-go/services/browsers" "github.com/status-im/status-go/signal" "github.com/pkg/errors" "go.uber.org/zap" "github.com/google/uuid" "github.com/status-im/status-go/eth-node/crypto" "github.com/status-im/status-go/eth-node/types" "github.com/status-im/status-go/images" "github.com/status-im/status-go/multiaccounts/accounts" multiaccountscommon "github.com/status-im/status-go/multiaccounts/common" "github.com/status-im/status-go/multiaccounts/settings" walletsettings "github.com/status-im/status-go/multiaccounts/settings_wallet" "github.com/status-im/status-go/protocol/common" "github.com/status-im/status-go/protocol/common/shard" "github.com/status-im/status-go/protocol/communities" "github.com/status-im/status-go/protocol/encryption/multidevice" "github.com/status-im/status-go/protocol/identity" "github.com/status-im/status-go/protocol/protobuf" "github.com/status-im/status-go/protocol/requests" "github.com/status-im/status-go/protocol/transport" v1protocol "github.com/status-im/status-go/protocol/v1" "github.com/status-im/status-go/protocol/verification" ) const ( transactionRequestDeclinedMessage = "Transaction request declined" requestAddressForTransactionAcceptedMessage = "Request address for transaction accepted" requestAddressForTransactionDeclinedMessage = "Request address for transaction declined" ) var ( ErrMessageNotAllowed = errors.New("message from a non-contact") ErrMessageForWrongChatType = errors.New("message for the wrong chat type") ErrNotWatchOnlyAccount = errors.New("an account is not a watch only account") ErrWalletAccountNotSupportedForMobileApp = errors.New("handling account is not supported for mobile app") ErrTryingToApplyOldWalletAccountsOrder = errors.New("trying to apply old wallet accounts order") ErrTryingToStoreOldWalletAccount = errors.New("trying to store an old wallet account") ErrTryingToStoreOldKeypair = errors.New("trying to store an old keypair") ErrSomeFieldsMissingForWalletAccount = errors.New("some fields are missing for wallet account") ErrUnknownKeypairForWalletAccount = errors.New("keypair is not known for the wallet account") ErrInvalidCommunityID = errors.New("invalid community id") ErrTryingToApplyOldTokenPreferences = errors.New("trying to apply old token preferences") ) // HandleMembershipUpdate updates a Chat instance according to the membership updates. // It retrieves chat, if exists, and merges membership updates from the message. // Finally, the Chat is updated with the new group events. func (m *Messenger) HandleMembershipUpdateMessage(messageState *ReceivedMessageState, rawMembershipUpdate *protobuf.MembershipUpdateMessage, statusMessage *v1protocol.StatusMessage) error { chat, _ := messageState.AllChats.Load(rawMembershipUpdate.ChatId) return m.HandleMembershipUpdate(messageState, chat, rawMembershipUpdate, m.systemMessagesTranslations) } func (m *Messenger) HandleMembershipUpdate(messageState *ReceivedMessageState, chat *Chat, rawMembershipUpdate *protobuf.MembershipUpdateMessage, translations *systemMessageTranslationsMap) error { var group *v1protocol.Group var err error if rawMembershipUpdate == nil { return nil } logger := m.logger.With(zap.String("site", "HandleMembershipUpdate")) message, err := v1protocol.MembershipUpdateMessageFromProtobuf(rawMembershipUpdate) if err != nil { return err } if err := ValidateMembershipUpdateMessage(message, messageState.Timesource.GetCurrentTime()); err != nil { logger.Warn("failed to validate message", zap.Error(err)) return err } senderID := messageState.CurrentMessageState.Contact.ID allowed, err := m.isMessageAllowedFrom(senderID, chat) if err != nil { return err } if !allowed { return ErrMessageNotAllowed } //if chat.InvitationAdmin exists means we are waiting for invitation request approvement, and in that case //we need to create a new chat instance like we don't have a chat and just use a regular invitation flow waitingForApproval := chat != nil && len(chat.InvitationAdmin) > 0 ourKey := contactIDFromPublicKey(&m.identity.PublicKey) isActive := messageState.CurrentMessageState.Contact.added() || messageState.CurrentMessageState.Contact.ID == ourKey || waitingForApproval showPushNotification := isActive && messageState.CurrentMessageState.Contact.ID != ourKey // wasUserAdded indicates whether the user has been added to the group with this update wasUserAdded := false if chat == nil || waitingForApproval { if len(message.Events) == 0 { return errors.New("can't create new group chat without events") } //approve invitations if waitingForApproval { groupChatInvitation := &GroupChatInvitation{ GroupChatInvitation: &protobuf.GroupChatInvitation{ ChatId: message.ChatID, }, From: types.EncodeHex(crypto.FromECDSAPub(&m.identity.PublicKey)), } groupChatInvitation, err = m.persistence.InvitationByID(groupChatInvitation.ID()) if err != nil && err != common.ErrRecordNotFound { return err } if groupChatInvitation != nil { groupChatInvitation.State = protobuf.GroupChatInvitation_APPROVED err := m.persistence.SaveInvitation(groupChatInvitation) if err != nil { return err } messageState.GroupChatInvitations[groupChatInvitation.ID()] = groupChatInvitation } } group, err = v1protocol.NewGroupWithEvents(message.ChatID, message.Events) if err != nil { return err } // A new chat must have contained us at some point wasEverMember, err := group.WasEverMember(ourKey) if err != nil { return err } if !wasEverMember { return errors.New("can't create a new group chat without us being a member") } wasUserAdded = group.IsMember(ourKey) newChat := CreateGroupChat(messageState.Timesource) // We set group chat inactive and create a notification instead // unless is coming from us or a contact or were waiting for approval. // Also, as message MEMBER_JOINED may come from member(not creator, not our contact) // reach earlier than CHAT_CREATED from creator, we need check if creator is our contact newChat.Active = isActive || m.checkIfCreatorIsOurContact(group) newChat.ReceivedInvitationAdmin = senderID chat = &newChat chat.updateChatFromGroupMembershipChanges(group) if err != nil { return errors.Wrap(err, "failed to get group creator") } publicKeys, err := group.MemberPublicKeys() if err != nil { return errors.Wrap(err, "failed to get group members") } filters, err := m.transport.JoinGroup(publicKeys) if err != nil { return errors.Wrap(err, "failed to join group") } ok, err := m.scheduleSyncFilters(filters) if err != nil { return errors.Wrap(err, "failed to schedule sync filter") } m.logger.Debug("result of schedule sync filter", zap.Bool("ok", ok)) } else { existingGroup, err := newProtocolGroupFromChat(chat) if err != nil { return errors.Wrap(err, "failed to create a Group from Chat") } updateGroup, err := v1protocol.NewGroupWithEvents(message.ChatID, message.Events) if err != nil { return errors.Wrap(err, "invalid membership update") } merged := v1protocol.MergeMembershipUpdateEvents(existingGroup.Events(), updateGroup.Events()) group, err = v1protocol.NewGroupWithEvents(chat.ID, merged) if err != nil { return errors.Wrap(err, "failed to create a group with new membership updates") } chat.updateChatFromGroupMembershipChanges(group) // Reactivate deleted group chat on re-invite from contact chat.Active = chat.Active || (isActive && group.IsMember(ourKey)) wasUserAdded = !existingGroup.IsMember(ourKey) && group.IsMember(ourKey) // Show push notifications when our key is added to members list and chat is Active showPushNotification = showPushNotification && wasUserAdded } maxClockVal := uint64(0) for _, event := range group.Events() { if event.ClockValue > maxClockVal { maxClockVal = event.ClockValue } } if chat.LastClockValue < maxClockVal { chat.LastClockValue = maxClockVal } // Only create a message notification when the user is added, not when removed if !chat.Active && wasUserAdded { chat.Highlight = true m.createMessageNotification(chat, messageState, chat.LastMessage) } profilePicturesVisibility, err := m.settings.GetProfilePicturesVisibility() if err != nil { return errors.Wrap(err, "failed to get profilePicturesVisibility setting") } if showPushNotification { // chat is highlighted for new group invites or group re-invites chat.Highlight = true messageState.Response.AddNotification(NewPrivateGroupInviteNotification(chat.ID, chat, messageState.CurrentMessageState.Contact, profilePicturesVisibility)) } systemMessages := buildSystemMessages(message.Events, translations) for _, message := range systemMessages { messageID := message.ID exists, err := m.messageExists(messageID, messageState.ExistingMessagesMap) if err != nil { m.logger.Warn("failed to check message exists", zap.Error(err)) } if exists { continue } messageState.Response.AddMessage(message) } messageState.Response.AddChat(chat) // Store in chats map as it might be a new one messageState.AllChats.Store(chat.ID, chat) // explicit join has been removed, mimic auto-join for backward compatibility // no all cases are covered, e.g. if added to a group by non-contact autoJoin := chat.Active && wasUserAdded if autoJoin || waitingForApproval { _, err = m.ConfirmJoiningGroup(context.Background(), chat.ID) if err != nil { return err } } if message.Message != nil { return m.HandleChatMessage(messageState, message.Message, nil, false) } else if message.EmojiReaction != nil { return m.HandleEmojiReaction(messageState, message.EmojiReaction, nil) } return nil } func (m *Messenger) checkIfCreatorIsOurContact(group *v1protocol.Group) bool { creator, err := group.Creator() if err == nil { contact, _ := m.allContacts.Load(creator) return contact != nil && contact.mutual() } m.logger.Warn("failed to get creator from group", zap.String("group name", group.Name()), zap.String("group chat id", group.ChatID()), zap.Error(err)) return false } func (m *Messenger) createMessageNotification(chat *Chat, messageState *ReceivedMessageState, message *common.Message) { var notificationType ActivityCenterType if chat.OneToOne() { notificationType = ActivityCenterNotificationTypeNewOneToOne } else { notificationType = ActivityCenterNotificationTypeNewPrivateGroupChat } notification := &ActivityCenterNotification{ ID: types.FromHex(chat.ID), Name: chat.Name, LastMessage: message, Type: notificationType, Author: messageState.CurrentMessageState.Contact.ID, Timestamp: messageState.CurrentMessageState.WhisperTimestamp, ChatID: chat.ID, CommunityID: chat.CommunityID, UpdatedAt: m.GetCurrentTimeInMillis(), } err := m.addActivityCenterNotification(messageState.Response, notification, nil) if err != nil { m.logger.Warn("failed to create activity center notification", zap.Error(err)) } } func (m *Messenger) PendingNotificationContactRequest(contactID string) (*ActivityCenterNotification, error) { return m.persistence.ActiveContactRequestNotification(contactID) } func (m *Messenger) createContactRequestForContactUpdate(contact *Contact, messageState *ReceivedMessageState) (*common.Message, error) { contactRequest, err := m.generateContactRequest( contact.ContactRequestRemoteClock, messageState.CurrentMessageState.WhisperTimestamp, contact, defaultContactRequestText(), false, ) if err != nil { return nil, err } contactRequest.ID = defaultContactRequestID(contact.ID) // save this message messageState.Response.AddMessage(contactRequest) err = m.persistence.SaveMessages([]*common.Message{contactRequest}) if err != nil { return nil, err } return contactRequest, nil } func (m *Messenger) createIncomingContactRequestNotification(contact *Contact, messageState *ReceivedMessageState, contactRequest *common.Message, createNewNotification bool) error { if contactRequest.ContactRequestState == common.ContactRequestStateAccepted { // Pull one from the db if there notification, err := m.persistence.GetActivityCenterNotificationByID(types.FromHex(contactRequest.ID)) if err != nil { return err } if notification != nil { notification.Name = contact.PrimaryName() notification.Message = contactRequest notification.Read = true notification.Accepted = true notification.Dismissed = false notification.UpdatedAt = m.GetCurrentTimeInMillis() _, err = m.persistence.SaveActivityCenterNotification(notification, true) if err != nil { return err } messageState.Response.AddMessage(contactRequest) messageState.Response.AddActivityCenterNotification(notification) } return nil } if !createNewNotification { return nil } notification := &ActivityCenterNotification{ ID: types.FromHex(contactRequest.ID), Name: contact.PrimaryName(), Message: contactRequest, Type: ActivityCenterNotificationTypeContactRequest, Author: contactRequest.From, Timestamp: contactRequest.WhisperTimestamp, ChatID: contact.ID, Read: contactRequest.ContactRequestState == common.ContactRequestStateAccepted || contactRequest.ContactRequestState == common.ContactRequestStateDismissed, Accepted: contactRequest.ContactRequestState == common.ContactRequestStateAccepted, Dismissed: contactRequest.ContactRequestState == common.ContactRequestStateDismissed, UpdatedAt: m.GetCurrentTimeInMillis(), } return m.addActivityCenterNotification(messageState.Response, notification, nil) } func (m *Messenger) handleCommandMessage(state *ReceivedMessageState, message *common.Message) error { message.ID = state.CurrentMessageState.MessageID message.From = state.CurrentMessageState.Contact.ID message.Alias = state.CurrentMessageState.Contact.Alias message.SigPubKey = state.CurrentMessageState.PublicKey message.Identicon = state.CurrentMessageState.Contact.Identicon message.WhisperTimestamp = state.CurrentMessageState.WhisperTimestamp if err := message.PrepareContent(common.PubkeyToHex(&m.identity.PublicKey)); err != nil { return fmt.Errorf("failed to prepare content: %v", err) } chat, err := m.matchChatEntity(message) if err != nil { return err } allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, chat) if err != nil { return err } if !allowed { return ErrMessageNotAllowed } // If deleted-at is greater, ignore message if chat.DeletedAtClockValue >= message.Clock { return nil } // Set the LocalChatID for the message message.LocalChatID = chat.ID if c, ok := state.AllChats.Load(chat.ID); ok { chat = c } // Set the LocalChatID for the message message.LocalChatID = chat.ID // Increase unviewed count if !common.IsPubKeyEqual(message.SigPubKey, &m.identity.PublicKey) { m.updateUnviewedCounts(chat, message) message.OutgoingStatus = "" } else { // Our own message, mark as sent message.OutgoingStatus = common.OutgoingStatusSent } err = chat.UpdateFromMessage(message, state.Timesource) if err != nil { return err } if !chat.Active { m.createMessageNotification(chat, state, chat.LastMessage) } // Add to response state.Response.AddChat(chat) if message != nil { message.New = true state.Response.AddMessage(message) } // Set in the modified maps chat state.AllChats.Store(chat.ID, chat) return nil } func (m *Messenger) syncContactRequestForInstallationContact(contact *Contact, state *ReceivedMessageState, chat *Chat, outgoing bool) error { if chat == nil { return fmt.Errorf("no chat restored during the contact synchronisation, contact.ID = %s", contact.ID) } contactRequestID, err := m.persistence.LatestPendingContactRequestIDForContact(contact.ID) if err != nil { return err } if contactRequestID != "" { m.logger.Warn("syncContactRequestForInstallationContact: skipping as contact request found", zap.String("contactRequestID", contactRequestID)) return nil } clock, timestamp := chat.NextClockAndTimestamp(m.transport) contactRequest, err := m.generateContactRequest(clock, timestamp, contact, defaultContactRequestText(), outgoing) if err != nil { return err } contactRequest.ID = defaultContactRequestID(contact.ID) state.Response.AddMessage(contactRequest) err = m.persistence.SaveMessages([]*common.Message{contactRequest}) if err != nil { return err } if outgoing { notification := m.generateOutgoingContactRequestNotification(contact, contactRequest) err = m.addActivityCenterNotification(state.Response, notification, nil) if err != nil { return err } } else { err = m.createIncomingContactRequestNotification(contact, state, contactRequest, true) if err != nil { return err } } return nil } func (m *Messenger) HandleSyncInstallationAccount(state *ReceivedMessageState, message *protobuf.SyncInstallationAccount, statusMessage *v1protocol.StatusMessage) error { // Noop return nil } func (m *Messenger) handleSyncChats(messageState *ReceivedMessageState, chats []*protobuf.SyncChat) error { for _, syncChat := range chats { oldChat, ok := m.allChats.Load(syncChat.Id) clock := int64(syncChat.Clock) if ok && oldChat.Timestamp > clock { // We already know this chat and its timestamp is newer than the syncChat continue } chat := &Chat{ ID: syncChat.Id, Name: syncChat.Name, Timestamp: clock, ReadMessagesAtClockValue: 0, Active: syncChat.Active, Muted: syncChat.Muted, Joined: clock, ChatType: ChatType(syncChat.ChatType), Highlight: false, } if chat.PrivateGroupChat() { chat.MembershipUpdates = make([]v1protocol.MembershipUpdateEvent, len(syncChat.MembershipUpdateEvents)) for i, membershipUpdate := range syncChat.MembershipUpdateEvents { chat.MembershipUpdates[i] = v1protocol.MembershipUpdateEvent{ ClockValue: membershipUpdate.Clock, Type: protobuf.MembershipUpdateEvent_EventType(membershipUpdate.Type), Members: membershipUpdate.Members, Name: membershipUpdate.Name, Signature: membershipUpdate.Signature, ChatID: membershipUpdate.ChatId, From: membershipUpdate.From, RawPayload: membershipUpdate.RawPayload, Color: membershipUpdate.Color, Image: membershipUpdate.Image, } } group, err := newProtocolGroupFromChat(chat) if err != nil { return err } chat.updateChatFromGroupMembershipChanges(group) } err := m.saveChat(chat) if err != nil { return err } messageState.Response.AddChat(chat) } return nil } func (m *Messenger) HandleSyncInstallationContactV2(state *ReceivedMessageState, message *protobuf.SyncInstallationContactV2, statusMessage *v1protocol.StatusMessage) error { // Ignore own contact installation if message.Id == m.myHexIdentity() { m.logger.Warn("HandleSyncInstallationContactV2: skipping own contact") return nil } removed := message.Removed && !message.Blocked chat, ok := state.AllChats.Load(message.Id) if !ok && (message.Added || message.HasAddedUs || message.Muted) && !removed { pubKey, err := common.HexToPubkey(message.Id) if err != nil { return err } chat = OneToOneFromPublicKey(pubKey, state.Timesource) // We don't want to show the chat to the user chat.Active = false } contact, contactFound := state.AllContacts.Load(message.Id) if !contactFound { if message.Removed && !message.Blocked { // Nothing to do in case if contact doesn't exist return nil } var err error contact, err = buildContactFromPkString(message.Id) if err != nil { return err } } if message.ContactRequestRemoteClock != 0 || message.ContactRequestLocalClock != 0 { // Some local action about contact requests were performed, // process them contact.ProcessSyncContactRequestState( ContactRequestState(message.ContactRequestRemoteState), uint64(message.ContactRequestRemoteClock), ContactRequestState(message.ContactRequestLocalState), uint64(message.ContactRequestLocalClock)) state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) err := m.syncContactRequestForInstallationContact(contact, state, chat, contact.ContactRequestLocalState == ContactRequestStateSent) if err != nil { return err } } else if message.Added || message.HasAddedUs { // NOTE(cammellos): this is for handling backward compatibility, old clients // won't propagate ContactRequestRemoteClock or ContactRequestLocalClock if message.Added && contact.LastUpdatedLocally < message.LastUpdatedLocally { contact.ContactRequestSent(message.LastUpdatedLocally) err := m.syncContactRequestForInstallationContact(contact, state, chat, true) if err != nil { return err } } if message.HasAddedUs && contact.LastUpdated < message.LastUpdated { contact.ContactRequestReceived(message.LastUpdated) err := m.syncContactRequestForInstallationContact(contact, state, chat, false) if err != nil { return err } } if message.Removed && contact.LastUpdatedLocally < message.LastUpdatedLocally { err := m.removeContact(context.Background(), state.Response, contact.ID, false) if err != nil { return err } } } // Sync last updated field // We don't set `LastUpdated`, since that would cause some issues // as `LastUpdated` tracks both display name & picture. // The case where it would break is as follow: // 1) User A pairs A1 with device A2. // 2) User B publishes display name and picture with LastUpdated = 3. // 3) Device A1 receives message from step 2. // 4) Device A1 syncs with A2 (which has not received message from step 3). // 5) Device A2 saves Display name and sets LastUpdated = 3, // note that picture has not been set as it's not synced. // 6) Device A2 receives the message from 2. because LastUpdated is 3 // it will be discarded, A2 will not have B's picture. // The correct solution is to either sync profile image (expensive) // or split the clock for image/display name, so they can be synced // independently. if !contactFound || (contact.LastUpdated < message.LastUpdated) { if message.DisplayName != "" { contact.DisplayName = message.DisplayName } state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } if contact.LastUpdatedLocally < message.LastUpdatedLocally { // NOTE(cammellos): probably is cleaner to pass a flag // to method to tell them not to sync, or factor out in different // methods contact.IsSyncing = true defer func() { contact.IsSyncing = false }() if message.EnsName != "" && contact.EnsName != message.EnsName { contact.EnsName = message.EnsName publicKey, err := contact.PublicKey() if err != nil { return err } err = m.ENSVerified(common.PubkeyToHex(publicKey), message.EnsName) if err != nil { contact.ENSVerified = false } contact.ENSVerified = true } contact.LastUpdatedLocally = message.LastUpdatedLocally contact.LocalNickname = message.LocalNickname contact.TrustStatus = verification.TrustStatus(message.TrustStatus) contact.VerificationStatus = VerificationStatus(message.VerificationStatus) _, err := m.verificationDatabase.UpsertTrustStatus(contact.ID, contact.TrustStatus, message.LastUpdatedLocally) if err != nil { return err } if message.Blocked != contact.Blocked { if message.Blocked { state.AllContacts.Store(contact.ID, contact) response, err := m.BlockContact(context.TODO(), contact.ID, true) if err != nil { return err } err = state.Response.Merge(response) if err != nil { return err } } else { contact.Unblock(message.LastUpdatedLocally) } } if chat != nil && message.Muted != chat.Muted { if message.Muted { _, err := m.muteChat(chat, contact, time.Time{}) if err != nil { return err } } else { err := m.unmuteChat(chat, contact) if err != nil { return err } } state.Response.AddChat(chat) } state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } if chat != nil { state.AllChats.Store(chat.ID, chat) } return nil } func (m *Messenger) HandleSyncProfilePictures(state *ReceivedMessageState, message *protobuf.SyncProfilePictures, statusMessage *v1protocol.StatusMessage) error { dbImages, err := m.multiAccounts.GetIdentityImages(message.KeyUid) if err != nil { return err } dbImageMap := make(map[string]*images.IdentityImage) for _, img := range dbImages { dbImageMap[img.Name] = img } idImages := make([]images.IdentityImage, len(message.Pictures)) i := 0 for _, message := range message.Pictures { dbImg := dbImageMap[message.Name] if dbImg != nil && message.Clock <= dbImg.Clock { continue } image := images.IdentityImage{ Name: message.Name, Payload: message.Payload, Width: int(message.Width), Height: int(message.Height), FileSize: int(message.FileSize), ResizeTarget: int(message.ResizeTarget), Clock: message.Clock, } idImages[i] = image i++ } if i == 0 { return nil } err = m.multiAccounts.StoreIdentityImages(message.KeyUid, idImages[:i], false) if err == nil { state.Response.IdentityImages = idImages[:i] } return err } func (m *Messenger) HandleSyncChat(state *ReceivedMessageState, message *protobuf.SyncChat, statusMessage *v1protocol.StatusMessage) error { chatID := message.Id existingChat, ok := state.AllChats.Load(chatID) if ok && (existingChat.Active || uint32(message.GetClock()/1000) < existingChat.SyncedTo) { return nil } chat := existingChat if !ok { chats := make([]*protobuf.SyncChat, 1) chats[0] = message return m.handleSyncChats(state, chats) } existingChat.Joined = int64(message.Clock) state.AllChats.Store(chat.ID, chat) state.Response.AddChat(chat) return nil } func (m *Messenger) HandleSyncChatRemoved(state *ReceivedMessageState, message *protobuf.SyncChatRemoved, statusMessage *v1protocol.StatusMessage) error { chat, ok := m.allChats.Load(message.Id) if !ok { return ErrChatNotFound } if chat.Joined > int64(message.Clock) { return nil } if chat.DeletedAtClockValue > message.Clock { return nil } if chat.PrivateGroupChat() { _, err := m.leaveGroupChat(context.Background(), state.Response, message.Id, true, false) if err != nil { return err } } response, err := m.deactivateChat(message.Id, message.Clock, false, true) if err != nil { return err } return state.Response.Merge(response) } func (m *Messenger) HandleSyncChatMessagesRead(state *ReceivedMessageState, message *protobuf.SyncChatMessagesRead, statusMessage *v1protocol.StatusMessage) error { chat, ok := m.allChats.Load(message.Id) if !ok { return ErrChatNotFound } if chat.ReadMessagesAtClockValue > message.Clock { return nil } err := m.markAllRead(message.Id, message.Clock, false) if err != nil { return err } state.Response.AddChat(chat) return nil } func (m *Messenger) handlePinMessage(pinner *Contact, whisperTimestamp uint64, response *MessengerResponse, message *protobuf.PinMessage, forceSeen bool) error { logger := m.logger.With(zap.String("site", "HandlePinMessage")) logger.Info("Handling pin message") publicKey, err := pinner.PublicKey() if err != nil { return err } pinMessage := &common.PinMessage{ PinMessage: message, // MessageID: message.MessageId, WhisperTimestamp: whisperTimestamp, From: pinner.ID, SigPubKey: publicKey, Identicon: pinner.Identicon, Alias: pinner.Alias, } chat, err := m.matchChatEntity(pinMessage) if err != nil { return err // matchChatEntity returns a descriptive error message } pinMessage.ID, err = generatePinMessageID(&m.identity.PublicKey, pinMessage, chat) if err != nil { return err } // If deleted-at is greater, ignore message if chat.DeletedAtClockValue >= pinMessage.Clock { return nil } if c, ok := m.allChats.Load(chat.ID); ok { chat = c } // Set the LocalChatID for the message pinMessage.LocalChatID = chat.ID inserted, err := m.persistence.SavePinMessage(pinMessage) if err != nil { return err } // Nothing to do, returning if !inserted { m.logger.Info("pin message already processed") return nil } if message.Pinned { id, err := generatePinMessageNotificationID(&m.identity.PublicKey, pinMessage, chat) if err != nil { return err } systemMessage := &common.Message{ ChatMessage: &protobuf.ChatMessage{ Clock: message.Clock, Timestamp: whisperTimestamp, ChatId: chat.ID, MessageType: message.MessageType, ResponseTo: message.MessageId, ContentType: protobuf.ChatMessage_SYSTEM_MESSAGE_PINNED_MESSAGE, }, WhisperTimestamp: whisperTimestamp, ID: id, LocalChatID: chat.ID, From: pinner.ID, } if forceSeen { systemMessage.Seen = true } response.AddMessage(systemMessage) chat.UnviewedMessagesCount++ } if chat.LastClockValue < message.Clock { chat.LastClockValue = message.Clock } response.AddPinMessage(pinMessage) // Set in the modified maps chat response.AddChat(chat) m.allChats.Store(chat.ID, chat) return nil } func (m *Messenger) HandlePinMessage(state *ReceivedMessageState, message *protobuf.PinMessage, statusMessage *v1protocol.StatusMessage, fromArchive bool) error { return m.handlePinMessage(state.CurrentMessageState.Contact, state.CurrentMessageState.WhisperTimestamp, state.Response, message, fromArchive) } func (m *Messenger) handleAcceptContactRequest( response *MessengerResponse, contact *Contact, originalRequest *common.Message, clock uint64) (ContactRequestProcessingResponse, error) { m.logger.Debug("received contact request", zap.Uint64("clock-sent", clock), zap.Uint64("current-clock", contact.ContactRequestRemoteClock), zap.Uint64("current-state", uint64(contact.ContactRequestRemoteState))) if contact.ContactRequestRemoteClock > clock { m.logger.Debug("not handling accept since clock lower") return ContactRequestProcessingResponse{}, nil } // The contact request accepted wasn't found, a reason for this might // be that we sent a legacy contact request/contact-update, or another // device has sent it, and we haven't synchronized it if originalRequest == nil { return contact.ContactRequestAccepted(clock), nil } if originalRequest.LocalChatID != contact.ID { return ContactRequestProcessingResponse{}, errors.New("can't accept contact request not sent to user") } contact.ContactRequestAccepted(clock) originalRequest.ContactRequestState = common.ContactRequestStateAccepted err := m.persistence.SetContactRequestState(originalRequest.ID, originalRequest.ContactRequestState) if err != nil { return ContactRequestProcessingResponse{}, err } response.AddMessage(originalRequest) return ContactRequestProcessingResponse{}, nil } func (m *Messenger) handleAcceptContactRequestMessage(state *ReceivedMessageState, clock uint64, contactRequestID string, isOutgoing bool) error { request, err := m.persistence.MessageByID(contactRequestID) if err != nil && err != common.ErrRecordNotFound { return err } // We still want to handle acceptance of the CR even it was already accepted previouslyAccepted := request != nil && request.ContactRequestState == common.ContactRequestStateAccepted contact := state.CurrentMessageState.Contact // The request message will be added to the response here processingResponse, err := m.handleAcceptContactRequest(state.Response, contact, request, clock) if err != nil { return err } // If the state has changed from non-mutual contact, to mutual contact // we want to notify the user if contact.mutual() { // We set the chat as active, this is currently the expected behavior // for mobile, it might change as we implement further the activity // center chat, _, err := m.getOneToOneAndNextClock(contact) if err != nil { return err } if chat.LastClockValue < clock { chat.LastClockValue = clock } // NOTE(cammellos): This will re-enable the chat if it was deleted, and only // after we became contact, currently seems safe, but that needs // discussing with UX. if chat.DeletedAtClockValue < clock { chat.Active = true } // Add mutual state update message for incoming contact request if !previouslyAccepted { clock, timestamp := chat.NextClockAndTimestamp(m.transport) updateMessage, err := m.prepareMutualStateUpdateMessage(contact.ID, MutualStateUpdateTypeAdded, clock, timestamp, false) if err != nil { return err } m.prepareMessage(updateMessage, m.httpServer) err = m.persistence.SaveMessages([]*common.Message{updateMessage}) if err != nil { return err } state.Response.AddMessage(updateMessage) err = chat.UpdateFromMessage(updateMessage, m.getTimesource()) if err != nil { return err } chat.UnviewedMessagesCount++ } state.Response.AddChat(chat) state.AllChats.Store(chat.ID, chat) } if request != nil { if isOutgoing { notification := m.generateOutgoingContactRequestNotification(contact, request) err = m.addActivityCenterNotification(state.Response, notification, nil) if err != nil { return err } } else { err = m.createIncomingContactRequestNotification(contact, state, request, processingResponse.newContactRequestReceived) if err != nil { return err } // With devices 1 and 2 paired, and userA logged in on both, while userB is on device 3: // When userA on device 1 sends a contact request to userB, userB accepts it on device 3. // The confirmation is sent to devices 1 and 2. // However, the contactRequestID in `AcceptContactRequestMessage` uses keccak256(...) instead of defaultContactRequestID(contact.ID). // Device 1 processes this, but device 2 doesn't due to an error `ErrRecordNotFound` from `m.persistence.MessageByID(contactRequestID)`. // The correct notification ID on device 2 should be defaultContactRequestID(contact.ID). // Thus, we must sync the accepted decision to device 2. err = m.syncActivityCenterAcceptedByIDs(context.TODO(), []types.HexBytes{types.FromHex(defaultContactRequestID(contact.ID))}, m.GetCurrentTimeInMillis()) if err != nil { m.logger.Warn("could not sync activity center notification as accepted", zap.Error(err)) } } } state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) return nil } func (m *Messenger) HandleAcceptContactRequest(state *ReceivedMessageState, message *protobuf.AcceptContactRequest, statusMessage *v1protocol.StatusMessage) error { err := m.handleAcceptContactRequestMessage(state, message.Clock, message.Id, false) if err != nil { m.logger.Warn("could not accept contact request", zap.Error(err)) } return nil } func (m *Messenger) handleRetractContactRequest(state *ReceivedMessageState, contact *Contact, message *protobuf.RetractContactRequest) error { if contact.ID == m.myHexIdentity() { m.logger.Debug("retraction coming from us, ignoring") return nil } m.logger.Debug("handling retracted contact request", zap.Uint64("clock", message.Clock)) r := contact.ContactRequestRetracted(message.Clock, false) if !r.processed { m.logger.Debug("not handling retract since clock lower") return nil } // System message for mutual state update chat, clock, err := m.getOneToOneAndNextClock(contact) if err != nil { return err } timestamp := m.getTimesource().GetCurrentTime() updateMessage, err := m.prepareMutualStateUpdateMessage(contact.ID, MutualStateUpdateTypeRemoved, clock, timestamp, false) if err != nil { return err } m.prepareMessage(updateMessage, m.httpServer) err = m.persistence.SaveMessages([]*common.Message{updateMessage}) if err != nil { return err } state.Response.AddMessage(updateMessage) err = chat.UpdateFromMessage(updateMessage, m.getTimesource()) if err != nil { return err } chat.UnviewedMessagesCount++ state.Response.AddChat(chat) notification := &ActivityCenterNotification{ ID: types.FromHex(uuid.New().String()), Type: ActivityCenterNotificationTypeContactRemoved, Name: contact.PrimaryName(), Author: contact.ID, Timestamp: m.getTimesource().GetCurrentTime(), ChatID: contact.ID, Read: false, UpdatedAt: m.GetCurrentTimeInMillis(), } err = m.addActivityCenterNotification(state.Response, notification, nil) if err != nil { m.logger.Warn("failed to create activity center notification", zap.Error(err)) return err } m.allContacts.Store(contact.ID, contact) return nil } func (m *Messenger) HandleRetractContactRequest(state *ReceivedMessageState, message *protobuf.RetractContactRequest, statusMessage *v1protocol.StatusMessage) error { contact := state.CurrentMessageState.Contact err := m.handleRetractContactRequest(state, contact, message) if err != nil { return err } if contact.ID != m.myHexIdentity() { state.ModifiedContacts.Store(contact.ID, true) } return nil } func (m *Messenger) HandleContactUpdate(state *ReceivedMessageState, message *protobuf.ContactUpdate, statusMessage *v1protocol.StatusMessage) error { logger := m.logger.With(zap.String("site", "HandleContactUpdate")) if common.IsPubKeyEqual(state.CurrentMessageState.PublicKey, &m.identity.PublicKey) { logger.Warn("coming from us, ignoring") return nil } contact := state.CurrentMessageState.Contact chat, ok := state.AllChats.Load(contact.ID) allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, chat) if err != nil { return err } if !allowed { return ErrMessageNotAllowed } if err = ValidateDisplayName(&message.DisplayName); err != nil { return err } if !ok { chat = OneToOneFromPublicKey(state.CurrentMessageState.PublicKey, state.Timesource) // We don't want to show the chat to the user chat.Active = false } logger.Debug("Handling contact update") if message.ContactRequestPropagatedState != nil { logger.Debug("handling contact request propagated state", zap.Any("state before update", contact.ContactRequestPropagatedState())) result := contact.ContactRequestPropagatedStateReceived(message.ContactRequestPropagatedState) if result.sendBackState { logger.Debug("sending back state") // This is a bit dangerous, since it might trigger a ping-pong of contact updates // also it should backoff/debounce _, err = m.sendContactUpdate(context.Background(), contact.ID, "", "", "", m.dispatchMessage) if err != nil { return err } } if result.newContactRequestReceived { contactRequest, err := m.createContactRequestForContactUpdate(contact, state) if err != nil { return err } err = m.createIncomingContactRequestNotification(contact, state, contactRequest, true) if err != nil { return err } } logger.Debug("handled propagated state", zap.Any("state after update", contact.ContactRequestPropagatedState())) state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } if contact.LastUpdated < message.Clock { if contact.EnsName != message.EnsName { contact.EnsName = message.EnsName contact.ENSVerified = false } if len(message.DisplayName) != 0 { contact.DisplayName = message.DisplayName } r := contact.ContactRequestReceived(message.ContactRequestClock) if r.newContactRequestReceived { err = m.createIncomingContactRequestNotification(contact, state, nil, true) if err != nil { return err } } contact.LastUpdated = message.Clock state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } if chat.LastClockValue < message.Clock { chat.LastClockValue = message.Clock } if contact.mutual() && chat.DeletedAtClockValue < message.Clock { chat.Active = true } state.Response.AddChat(chat) // TODO(samyoul) remove storing of an updated reference pointer? state.AllChats.Store(chat.ID, chat) return nil } func (m *Messenger) HandleSyncPairInstallation(state *ReceivedMessageState, message *protobuf.SyncPairInstallation, statusMessage *v1protocol.StatusMessage) error { logger := m.logger.With(zap.String("site", "HandlePairInstallation")) if err := ValidateReceivedPairInstallation(message, state.CurrentMessageState.WhisperTimestamp); err != nil { logger.Warn("failed to validate message", zap.Error(err)) return err } installation, ok := state.AllInstallations.Load(message.InstallationId) if !ok { return errors.New("installation not found") } metadata := &multidevice.InstallationMetadata{ Name: message.Name, DeviceType: message.DeviceType, } installation.InstallationMetadata = metadata // TODO(samyoul) remove storing of an updated reference pointer? state.AllInstallations.Store(message.InstallationId, installation) state.ModifiedInstallations.Store(message.InstallationId, true) return nil } func (m *Messenger) HandleHistoryArchiveMagnetlinkMessage(state *ReceivedMessageState, communityPubKey *ecdsa.PublicKey, magnetlink string, clock uint64) error { id := types.HexBytes(crypto.CompressPubkey(communityPubKey)) community, err := m.communitiesManager.GetByID(id) if err != nil { m.logger.Debug("Couldn't get community for community with id: ", zap.Any("id", id)) return err } if community == nil { return nil } settings, err := m.communitiesManager.GetCommunitySettingsByID(id) if err != nil { m.logger.Debug("Couldn't get community settings for community with id: ", zap.Any("id", id)) return err } if settings == nil { return nil } if m.torrentClientReady() && settings.HistoryArchiveSupportEnabled { lastClock, err := m.communitiesManager.GetMagnetlinkMessageClock(id) if err != nil { return err } lastSeenMagnetlink, err := m.communitiesManager.GetLastSeenMagnetlink(id) if err != nil { return err } // We are only interested in a community archive magnet link // if it originates from a community that the current account is // part of and doesn't own the private key at the same time if !community.IsControlNode() && community.Joined() && clock >= lastClock { if lastSeenMagnetlink == magnetlink { m.communitiesManager.LogStdout("already processed this magnetlink") return nil } m.communitiesManager.UnseedHistoryArchiveTorrent(id) currentTask := m.communitiesManager.GetHistoryArchiveDownloadTask(id.String()) go func(currentTask *communities.HistoryArchiveDownloadTask, communityID types.HexBytes) { // Cancel ongoing download/import task if currentTask != nil && !currentTask.IsCancelled() { currentTask.Cancel() currentTask.Waiter.Wait() } // Create new task task := &communities.HistoryArchiveDownloadTask{ CancelChan: make(chan struct{}), Waiter: *new(sync.WaitGroup), Cancelled: false, } m.communitiesManager.AddHistoryArchiveDownloadTask(communityID.String(), task) // this wait groups tracks the ongoing task for a particular community task.Waiter.Add(1) defer task.Waiter.Done() // this wait groups tracks all ongoing tasks across communities m.shutdownWaitGroup.Add(1) defer m.shutdownWaitGroup.Done() m.downloadAndImportHistoryArchives(communityID, magnetlink, task.CancelChan) }(currentTask, id) return m.communitiesManager.UpdateMagnetlinkMessageClock(id, clock) } } return nil } func (m *Messenger) downloadAndImportHistoryArchives(id types.HexBytes, magnetlink string, cancel chan struct{}) { downloadTaskInfo, err := m.communitiesManager.DownloadHistoryArchivesByMagnetlink(id, magnetlink, cancel) if err != nil { logMsg := "failed to download history archive data" if err == communities.ErrTorrentTimedout { m.communitiesManager.LogStdout("torrent has timed out, trying once more...") downloadTaskInfo, err = m.communitiesManager.DownloadHistoryArchivesByMagnetlink(id, magnetlink, cancel) if err != nil { m.communitiesManager.LogStdout(logMsg, zap.Error(err)) return } } else { m.communitiesManager.LogStdout(logMsg, zap.Error(err)) return } } if downloadTaskInfo.Cancelled { if downloadTaskInfo.TotalDownloadedArchivesCount > 0 { m.communitiesManager.LogStdout(fmt.Sprintf("downloaded %d of %d archives so far", downloadTaskInfo.TotalDownloadedArchivesCount, downloadTaskInfo.TotalArchivesCount)) } return } err = m.communitiesManager.UpdateLastSeenMagnetlink(id, magnetlink) if err != nil { m.communitiesManager.LogStdout("couldn't update last seen magnetlink", zap.Error(err)) } err = m.checkIfIMemberOfCommunity(id) if err != nil { return } err = m.importHistoryArchives(id, cancel) if err != nil { m.communitiesManager.LogStdout("failed to import history archives", zap.Error(err)) m.config.messengerSignalsHandler.DownloadingHistoryArchivesFinished(types.EncodeHex(id)) return } m.config.messengerSignalsHandler.DownloadingHistoryArchivesFinished(types.EncodeHex(id)) } func (m *Messenger) handleArchiveMessages(archiveMessages []*protobuf.WakuMessage) (*MessengerResponse, error) { messagesToHandle := make(map[transport.Filter][]*types.Message) for _, message := range archiveMessages { filter := m.transport.FilterByTopic(message.Topic) if filter != nil { shhMessage := &types.Message{ Sig: message.Sig, Timestamp: uint32(message.Timestamp), Topic: types.BytesToTopic(message.Topic), Payload: message.Payload, Padding: message.Padding, Hash: message.Hash, ThirdPartyID: message.ThirdPartyId, } messagesToHandle[*filter] = append(messagesToHandle[*filter], shhMessage) } } importedMessages := make(map[transport.Filter][]*types.Message, 0) otherMessages := make(map[transport.Filter][]*types.Message, 0) for filter, messages := range messagesToHandle { for _, message := range messages { if message.ThirdPartyID != "" { importedMessages[filter] = append(importedMessages[filter], message) } else { otherMessages[filter] = append(otherMessages[filter], message) } } } err := m.handleImportedMessages(importedMessages) if err != nil { m.communitiesManager.LogStdout("failed to handle imported messages", zap.Error(err)) return nil, err } response, err := m.handleRetrievedMessages(otherMessages, false, true) if err != nil { m.communitiesManager.LogStdout("failed to write history archive messages to database", zap.Error(err)) return nil, err } return response, nil } func (m *Messenger) HandleCommunityCancelRequestToJoin(state *ReceivedMessageState, cancelRequestToJoinProto *protobuf.CommunityCancelRequestToJoin, statusMessage *v1protocol.StatusMessage) error { signer := state.CurrentMessageState.PublicKey if cancelRequestToJoinProto.CommunityId == nil { return ErrInvalidCommunityID } requestToJoin, err := m.communitiesManager.HandleCommunityCancelRequestToJoin(signer, cancelRequestToJoinProto) if err != nil { return err } state.Response.RequestsToJoinCommunity = append(state.Response.RequestsToJoinCommunity, requestToJoin) // delete activity center notification notification, err := m.persistence.GetActivityCenterNotificationByID(requestToJoin.ID) if err != nil { return err } if notification != nil { updatedAt := m.GetCurrentTimeInMillis() notification.UpdatedAt = updatedAt // we shouldn't sync deleted notification here, // as the same user on different devices will receive the same message(CommunityCancelRequestToJoin) ? err = m.persistence.DeleteActivityCenterNotificationByID(types.FromHex(requestToJoin.ID.String()), updatedAt) if err != nil { m.logger.Error("failed to delete notification from Activity Center", zap.Error(err)) return err } // sending signal to client to remove the activity center notification from UI response := &MessengerResponse{} response.AddActivityCenterNotification(notification) signal.SendNewMessages(response) } return nil } // HandleCommunityRequestToJoin handles an community request to join func (m *Messenger) HandleCommunityRequestToJoin(state *ReceivedMessageState, requestToJoinProto *protobuf.CommunityRequestToJoin, statusMessage *v1protocol.StatusMessage) error { signer := state.CurrentMessageState.PublicKey community, requestToJoin, err := m.communitiesManager.HandleCommunityRequestToJoin(signer, statusMessage.TransportLayer.Dst, requestToJoinProto) if err != nil { return err } switch requestToJoin.State { case communities.RequestToJoinStatePending: contact, _ := state.AllContacts.Load(contactIDFromPublicKey(signer)) if len(requestToJoinProto.DisplayName) != 0 { contact.DisplayName = requestToJoinProto.DisplayName state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) state.ModifiedContacts.Store(contact.ID, true) } if state.Response.RequestsToJoinCommunity == nil { state.Response.RequestsToJoinCommunity = make([]*communities.RequestToJoin, 0) } state.Response.RequestsToJoinCommunity = append(state.Response.RequestsToJoinCommunity, requestToJoin) state.Response.AddNotification(NewCommunityRequestToJoinNotification(requestToJoin.ID.String(), community, contact)) // Activity Center notification, new for pending state notification := &ActivityCenterNotification{ ID: types.FromHex(requestToJoin.ID.String()), Type: ActivityCenterNotificationTypeCommunityMembershipRequest, Timestamp: m.getTimesource().GetCurrentTime(), Author: contact.ID, CommunityID: community.IDString(), MembershipStatus: ActivityCenterMembershipStatusPending, Deleted: false, UpdatedAt: m.GetCurrentTimeInMillis(), } err = m.addActivityCenterNotification(state.Response, notification, nil) if err != nil { m.logger.Error("failed to save notification", zap.Error(err)) return err } case communities.RequestToJoinStateDeclined: response, err := m.declineRequestToJoinCommunity(requestToJoin) if err == nil { err := state.Response.Merge(response) if err != nil { return err } } else { return err } case communities.RequestToJoinStateAccepted: response, err := m.acceptRequestToJoinCommunity(requestToJoin) if err == nil { err := state.Response.Merge(response) // new member has been added if err != nil { return err } } else if err == communities.ErrNoPermissionToJoin { // only control node will end up here as it's the only one that // performed token permission checks response, err = m.declineRequestToJoinCommunity(requestToJoin) if err == nil { err := state.Response.Merge(response) if err != nil { return err } } else { return err } } else { return err } case communities.RequestToJoinStateCanceled: // cancellation is handled by separate message fallthrough case communities.RequestToJoinStateAwaitingAddresses: // ownership changed request is handled only if owner kicked members and saved // temporary RequestToJoinStateAwaitingAddresses request fallthrough case communities.RequestToJoinStateAcceptedPending, communities.RequestToJoinStateDeclinedPending: // request can be marked as pending only manually return errors.New("invalid request state") } return nil } // HandleCommunityEditSharedAddresses handles an edit a user has made to their shared addresses func (m *Messenger) HandleCommunityEditSharedAddresses(state *ReceivedMessageState, editRevealedAddressesProto *protobuf.CommunityEditSharedAddresses, statusMessage *v1protocol.StatusMessage) error { signer := state.CurrentMessageState.PublicKey if editRevealedAddressesProto.CommunityId == nil { return ErrInvalidCommunityID } err := m.communitiesManager.HandleCommunityEditSharedAddresses(signer, editRevealedAddressesProto) if err != nil { return err } community, err := m.communitiesManager.GetByIDString(string(editRevealedAddressesProto.GetCommunityId())) if err != nil { return err } state.Response.AddCommunity(community) return nil } func (m *Messenger) HandleCommunityRequestToJoinResponse(state *ReceivedMessageState, requestToJoinResponseProto *protobuf.CommunityRequestToJoinResponse, statusMessage *v1protocol.StatusMessage) error { signer := state.CurrentMessageState.PublicKey if requestToJoinResponseProto.CommunityId == nil { return ErrInvalidCommunityID } myCancelledRequestToJoin, err := m.MyCanceledRequestToJoinForCommunityID(requestToJoinResponseProto.CommunityId) if err != nil { return err } if myCancelledRequestToJoin != nil { return nil } updatedRequest, err := m.communitiesManager.HandleCommunityRequestToJoinResponse(signer, requestToJoinResponseProto) if err != nil { return err } if updatedRequest != nil { state.Response.RequestsToJoinCommunity = append(state.Response.RequestsToJoinCommunity, updatedRequest) } if requestToJoinResponseProto.Accepted { community, err := m.communitiesManager.GetByID(requestToJoinResponseProto.CommunityId) if err != nil { return err } err = m.handleCommunityShardAndFiltersFromProto(community, shard.FromProtobuff(requestToJoinResponseProto.Shard), requestToJoinResponseProto.ProtectedTopicPrivateKey) if err != nil { return err } response, err := m.JoinCommunity(context.Background(), requestToJoinResponseProto.CommunityId, false) if err != nil { return err } // we merge to include chats in response signal to joining a community err = state.Response.Merge(response) if err != nil { return err } if len(response.Communities()) > 0 { communitySettings := response.CommunitiesSettings()[0] community := response.Communities()[0] magnetlink := requestToJoinResponseProto.MagnetUri if m.torrentClientReady() && communitySettings != nil && communitySettings.HistoryArchiveSupportEnabled && magnetlink != "" { currentTask := m.communitiesManager.GetHistoryArchiveDownloadTask(community.IDString()) go func(currentTask *communities.HistoryArchiveDownloadTask) { // Cancel ongoing download/import task if currentTask != nil && !currentTask.IsCancelled() { currentTask.Cancel() currentTask.Waiter.Wait() } task := &communities.HistoryArchiveDownloadTask{ CancelChan: make(chan struct{}), Waiter: *new(sync.WaitGroup), Cancelled: false, } m.communitiesManager.AddHistoryArchiveDownloadTask(community.IDString(), task) task.Waiter.Add(1) defer task.Waiter.Done() m.shutdownWaitGroup.Add(1) defer m.shutdownWaitGroup.Done() m.downloadAndImportHistoryArchives(community.ID(), magnetlink, task.CancelChan) }(currentTask) clock := requestToJoinResponseProto.Community.ArchiveMagnetlinkClock return m.communitiesManager.UpdateMagnetlinkMessageClock(community.ID(), clock) } } } // Activity Center notification requestID := communities.CalculateRequestID(common.PubkeyToHex(&m.identity.PublicKey), requestToJoinResponseProto.CommunityId) notification, err := m.persistence.GetActivityCenterNotificationByID(requestID) if err != nil { return err } if notification != nil { if requestToJoinResponseProto.Accepted { notification.MembershipStatus = ActivityCenterMembershipStatusAccepted notification.Read = false notification.Deleted = false } else { notification.MembershipStatus = ActivityCenterMembershipStatusDeclined } notification.UpdatedAt = m.GetCurrentTimeInMillis() err = m.addActivityCenterNotification(state.Response, notification, nil) if err != nil { m.logger.Error("failed to update notification", zap.Error(err)) return err } } return nil } func (m *Messenger) HandleCommunityRequestToLeave(state *ReceivedMessageState, requestToLeaveProto *protobuf.CommunityRequestToLeave, statusMessage *v1protocol.StatusMessage) error { signer := state.CurrentMessageState.PublicKey if requestToLeaveProto.CommunityId == nil { return ErrInvalidCommunityID } err := m.communitiesManager.HandleCommunityRequestToLeave(signer, requestToLeaveProto) if err != nil { return err } response, err := m.RemoveUserFromCommunity(requestToLeaveProto.CommunityId, common.PubkeyToHex(signer)) if err != nil { return err } if len(response.Communities()) > 0 { state.Response.AddCommunity(response.Communities()[0]) } return nil } func (m *Messenger) handleEditMessage(state *ReceivedMessageState, editMessage EditMessage) error { if err := ValidateEditMessage(editMessage.EditMessage); err != nil { return err } messageID := editMessage.MessageId originalMessage, err := m.getMessageFromResponseOrDatabase(state.Response, messageID) if err == common.ErrRecordNotFound { return m.persistence.SaveEdit(&editMessage) } else if err != nil { return err } originalMessageMentioned := originalMessage.Mentioned chat, ok := m.allChats.Load(originalMessage.LocalChatID) if !ok { return errors.New("chat not found") } // Check edit is valid if originalMessage.From != editMessage.From { return errors.New("invalid edit, not the right author") } // Check that edit should be applied if originalMessage.EditedAt >= editMessage.Clock { return m.persistence.SaveEdit(&editMessage) } // applyEditMessage modifies the message. Changing the variable name to make it clearer editedMessage := originalMessage // Update message and return it err = m.applyEditMessage(editMessage.EditMessage, editedMessage) if err != nil { return err } needToSaveChat := false if chat.LastMessage != nil && chat.LastMessage.ID == editedMessage.ID { chat.LastMessage = editedMessage needToSaveChat = true } responseTo, err := m.persistence.MessageByID(editedMessage.ResponseTo) if err != nil && err != common.ErrRecordNotFound { return err } err = state.updateExistingActivityCenterNotification(m.identity.PublicKey, m, editedMessage, responseTo) if err != nil { return err } editedMessageHasMentions := editedMessage.Mentioned // Messages in OneToOne chats increase the UnviewedMentionsCount whether or not they include a Mention if !chat.OneToOne() { if editedMessageHasMentions && !originalMessageMentioned && !editedMessage.Seen { // Increase unviewed count when the edited message has a mention and didn't have one before chat.UnviewedMentionsCount++ needToSaveChat = true } else if !editedMessageHasMentions && originalMessageMentioned && !editedMessage.Seen { // Opposite of above, the message had a mention, but no longer does, so we reduce the count chat.UnviewedMentionsCount-- needToSaveChat = true } } if needToSaveChat { err := m.saveChat(chat) if err != nil { return err } } state.Response.AddMessage(editedMessage) // pull updated messages updatedMessages, err := m.persistence.MessagesByResponseTo(messageID) if err != nil { return err } state.Response.AddMessages(updatedMessages) state.Response.AddChat(chat) return nil } func (m *Messenger) HandleEditMessage(state *ReceivedMessageState, editProto *protobuf.EditMessage, statusMessage *v1protocol.StatusMessage) error { return m.handleEditMessage(state, EditMessage{ EditMessage: editProto, From: state.CurrentMessageState.Contact.ID, ID: state.CurrentMessageState.MessageID, SigPubKey: state.CurrentMessageState.PublicKey, }) } func (m *Messenger) handleDeleteMessage(state *ReceivedMessageState, deleteMessage *DeleteMessage) error { if deleteMessage == nil { return nil } if err := ValidateDeleteMessage(deleteMessage.DeleteMessage); err != nil { return err } messageID := deleteMessage.MessageId // Check if it's already in the response originalMessage := state.Response.GetMessage(messageID) // otherwise pull from database if originalMessage == nil { var err error originalMessage, err = m.persistence.MessageByID(messageID) if err != nil && err != common.ErrRecordNotFound { return err } } if originalMessage == nil { return m.persistence.SaveDelete(deleteMessage) } chat, ok := m.allChats.Load(originalMessage.LocalChatID) if !ok { return errors.New("chat not found") } var canDeleteMessageForEveryone = false if originalMessage.From != deleteMessage.From { fromPublicKey, err := common.HexToPubkey(deleteMessage.From) if err != nil { return err } if chat.ChatType == ChatTypeCommunityChat { canDeleteMessageForEveryone = m.CanDeleteMessageForEveryoneInCommunity(chat.CommunityID, fromPublicKey) if !canDeleteMessageForEveryone { return ErrInvalidDeletePermission } } else if chat.ChatType == ChatTypePrivateGroupChat { canDeleteMessageForEveryone = m.CanDeleteMessageForEveryoneInPrivateGroupChat(chat, fromPublicKey) if !canDeleteMessageForEveryone { return ErrInvalidDeletePermission } } // Check edit is valid if !canDeleteMessageForEveryone { return errors.New("invalid delete, not the right author") } } messagesToDelete, err := m.getOtherMessagesInAlbum(originalMessage, originalMessage.LocalChatID) if err != nil { return err } unreadCountDecreased := false for _, messageToDelete := range messagesToDelete { messageToDelete.Deleted = true messageToDelete.DeletedBy = deleteMessage.DeleteMessage.DeletedBy err := m.persistence.SaveMessages([]*common.Message{messageToDelete}) if err != nil { return err } // we shouldn't sync deleted notification here, // as the same user on different devices will receive the same message(DeleteMessage) ? m.logger.Debug("deleting activity center notification for message", zap.String("chatID", chat.ID), zap.String("messageID", messageToDelete.ID)) _, err = m.persistence.DeleteActivityCenterNotificationForMessage(chat.ID, messageToDelete.ID, m.GetCurrentTimeInMillis()) if err != nil { m.logger.Warn("failed to delete notifications for deleted message", zap.Error(err)) return err } // Reduce chat mention count and unread count if unread if !messageToDelete.Seen && !unreadCountDecreased { unreadCountDecreased = true if chat.UnviewedMessagesCount > 0 { chat.UnviewedMessagesCount-- } if chat.UnviewedMentionsCount > 0 && (messageToDelete.Mentioned || messageToDelete.Replied) { chat.UnviewedMentionsCount-- } err := m.saveChat(chat) if err != nil { return err } } state.Response.AddRemovedMessage(&RemovedMessage{MessageID: messageToDelete.ID, ChatID: chat.ID, DeletedBy: deleteMessage.DeleteMessage.DeletedBy}) state.Response.AddNotification(DeletedMessageNotification(messageToDelete.ID, chat)) state.Response.AddActivityCenterNotification(&ActivityCenterNotification{ ID: types.FromHex(messageToDelete.ID), Deleted: true, }) if chat.LastMessage != nil && chat.LastMessage.ID == messageToDelete.ID { chat.LastMessage = messageToDelete err = m.saveChat(chat) if err != nil { return nil } } messages, err := m.persistence.LatestMessageByChatID(chat.ID) if err != nil { return err } if len(messages) > 0 { previousNotDeletedMessage := messages[0] if previousNotDeletedMessage != nil && !previousNotDeletedMessage.Seen && chat.OneToOne() && !chat.Active { m.createMessageNotification(chat, state, previousNotDeletedMessage) } } // pull updated messages updatedMessages, err := m.persistence.MessagesByResponseTo(messageToDelete.ID) if err != nil { return err } state.Response.AddMessages(updatedMessages) } state.Response.AddChat(chat) return nil } func (m *Messenger) HandleDeleteMessage(state *ReceivedMessageState, deleteProto *protobuf.DeleteMessage, statusMessage *v1protocol.StatusMessage) error { return m.handleDeleteMessage(state, &DeleteMessage{ DeleteMessage: deleteProto, From: state.CurrentMessageState.Contact.ID, ID: state.CurrentMessageState.MessageID, SigPubKey: state.CurrentMessageState.PublicKey, }) } func (m *Messenger) getMessageFromResponseOrDatabase(response *MessengerResponse, messageID string) (*common.Message, error) { originalMessage := response.GetMessage(messageID) // otherwise pull from database if originalMessage != nil { return originalMessage, nil } return m.persistence.MessageByID(messageID) } func (m *Messenger) HandleSyncDeleteForMeMessage(state *ReceivedMessageState, deleteForMeMessage *protobuf.SyncDeleteForMeMessage, statusMessage *v1protocol.StatusMessage) error { if err := ValidateDeleteForMeMessage(deleteForMeMessage); err != nil { return err } messageID := deleteForMeMessage.MessageId // Check if it's already in the response originalMessage, err := m.getMessageFromResponseOrDatabase(state.Response, messageID) if err == common.ErrRecordNotFound { return m.persistence.SaveOrUpdateDeleteForMeMessage(deleteForMeMessage) } else if err != nil { return err } chat, ok := m.allChats.Load(originalMessage.LocalChatID) if !ok { return errors.New("chat not found") } messagesToDelete, err := m.getOtherMessagesInAlbum(originalMessage, originalMessage.LocalChatID) if err != nil { return err } for _, messageToDelete := range messagesToDelete { messageToDelete.DeletedForMe = true err := m.persistence.SaveMessages([]*common.Message{messageToDelete}) if err != nil { return err } // we shouldn't sync deleted notification here, // as the same user on different devices will receive the same message(DeleteForMeMessage) ? m.logger.Debug("deleting activity center notification for message", zap.String("chatID", chat.ID), zap.String("messageID", messageToDelete.ID)) _, err = m.persistence.DeleteActivityCenterNotificationForMessage(chat.ID, messageToDelete.ID, m.GetCurrentTimeInMillis()) if err != nil { m.logger.Warn("failed to delete notifications for deleted message", zap.Error(err)) return err } if chat.LastMessage != nil && chat.LastMessage.ID == messageToDelete.ID { chat.LastMessage = messageToDelete err = m.saveChat(chat) if err != nil { return nil } } state.Response.AddMessage(messageToDelete) } state.Response.AddChat(chat) return nil } func handleContactRequestChatMessage(receivedMessage *common.Message, contact *Contact, outgoing bool, logger *zap.Logger) (bool, error) { receivedMessage.ContactRequestState = common.ContactRequestStatePending var response ContactRequestProcessingResponse if outgoing { response = contact.ContactRequestSent(receivedMessage.Clock) } else { response = contact.ContactRequestReceived(receivedMessage.Clock) } if !response.processed { logger.Info("not handling contact message since clock lower") return false, nil } if contact.mutual() { receivedMessage.ContactRequestState = common.ContactRequestStateAccepted } return response.newContactRequestReceived, nil } func (m *Messenger) handleChatMessage(state *ReceivedMessageState, forceSeen bool) error { logger := m.logger.With(zap.String("site", "handleChatMessage")) logger.Info("state", zap.Any("state", state)) if err := ValidateReceivedChatMessage(state.CurrentMessageState.Message, state.CurrentMessageState.WhisperTimestamp); err != nil { logger.Warn("failed to validate message", zap.Error(err)) return err } receivedMessage := &common.Message{ ID: state.CurrentMessageState.MessageID, ChatMessage: state.CurrentMessageState.Message, From: state.CurrentMessageState.Contact.ID, Alias: state.CurrentMessageState.Contact.Alias, SigPubKey: state.CurrentMessageState.PublicKey, Identicon: state.CurrentMessageState.Contact.Identicon, WhisperTimestamp: state.CurrentMessageState.WhisperTimestamp, } // is the message coming from us? isSyncMessage := common.IsPubKeyEqual(receivedMessage.SigPubKey, &m.identity.PublicKey) if forceSeen || isSyncMessage { receivedMessage.Seen = true } err := receivedMessage.PrepareContent(m.myHexIdentity()) if err != nil { return fmt.Errorf("failed to prepare message content: %v", err) } // If the message is a reply, we check if it's a reply to one of own own messages if receivedMessage.ResponseTo != "" { repliedTo, err := m.persistence.MessageByID(receivedMessage.ResponseTo) if err != nil && (err == sql.ErrNoRows || err == common.ErrRecordNotFound) { logger.Error("failed to get quoted message", zap.Error(err)) } else if err != nil { return err } else if repliedTo.From == m.myHexIdentity() { receivedMessage.Replied = true } } chat, err := m.matchChatEntity(receivedMessage) if err != nil { return err // matchChatEntity returns a descriptive error message } if chat.ReadMessagesAtClockValue >= receivedMessage.Clock { receivedMessage.Seen = true } allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, chat) if err != nil { return err } if !allowed { return ErrMessageNotAllowed } // It looks like status-mobile created profile chats as public chats // so for now we need to check for the presence of "@" in their chatID if chat.Public() && !chat.ProfileUpdates() { switch receivedMessage.ContentType { case protobuf.ChatMessage_IMAGE: return errors.New("images are not allowed in public chats") case protobuf.ChatMessage_AUDIO: return errors.New("audio messages are not allowed in public chats") } } // If profile updates check if author is the same as chat profile public key if chat.ProfileUpdates() && receivedMessage.From != chat.Profile { return nil } // If deleted-at is greater, ignore message if chat.DeletedAtClockValue >= receivedMessage.Clock { return nil } // Set the LocalChatID for the message receivedMessage.LocalChatID = chat.ID if err := m.updateChatFirstMessageTimestamp(chat, whisperToUnixTimestamp(receivedMessage.WhisperTimestamp), state.Response); err != nil { return err } // Our own message, mark as sent if isSyncMessage { receivedMessage.OutgoingStatus = common.OutgoingStatusSent } else if !receivedMessage.Seen { // Increase unviewed count skipUpdateUnviewedCountForAlbums := false if receivedMessage.ContentType == protobuf.ChatMessage_IMAGE { image := receivedMessage.GetImage() if image != nil && image.AlbumId != "" { // Skip unviewed counts increasing for other messages from album if we have it in memory for _, message := range state.Response.Messages() { if receivedMessage.ContentType == protobuf.ChatMessage_IMAGE { img := message.GetImage() if img != nil && img.AlbumId != "" && img.AlbumId == image.AlbumId { skipUpdateUnviewedCountForAlbums = true break } } } if !skipUpdateUnviewedCountForAlbums { messages, err := m.persistence.AlbumMessages(chat.ID, image.AlbumId) if err != nil { return err } // Skip unviewed counts increasing for other messages from album if we have it in db skipUpdateUnviewedCountForAlbums = len(messages) > 0 } } } if !skipUpdateUnviewedCountForAlbums { m.updateUnviewedCounts(chat, receivedMessage) } } contact := state.CurrentMessageState.Contact // If we receive some propagated state from someone who's not // our paired device, we handle it if receivedMessage.ContactRequestPropagatedState != nil && !isSyncMessage { result := contact.ContactRequestPropagatedStateReceived(receivedMessage.ContactRequestPropagatedState) if result.sendBackState { _, err = m.sendContactUpdate(context.Background(), contact.ID, "", "", "", m.dispatchMessage) if err != nil { return err } } if result.newContactRequestReceived { if contact.hasAddedUs() && !contact.mutual() { receivedMessage.ContactRequestState = common.ContactRequestStatePending } // Add mutual state update message for outgoing contact request clock := receivedMessage.Clock - 1 updateMessage, err := m.prepareMutualStateUpdateMessage(contact.ID, MutualStateUpdateTypeSent, clock, receivedMessage.Timestamp, false) if err != nil { return err } m.prepareMessage(updateMessage, m.httpServer) err = m.persistence.SaveMessages([]*common.Message{updateMessage}) if err != nil { return err } state.Response.AddMessage(updateMessage) err = m.createIncomingContactRequestNotification(contact, state, receivedMessage, true) if err != nil { return err } } state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } if receivedMessage.ContentType == protobuf.ChatMessage_CONTACT_REQUEST && chat.OneToOne() { chatContact := contact if isSyncMessage { chatContact, err = m.BuildContact(&requests.BuildContact{PublicKey: chat.ID}) if err != nil { return err } } if chatContact.mutual() || chatContact.dismissed() { m.logger.Info("ignoring contact request message for a mutual or dismissed contact") return nil } sendNotification, err := handleContactRequestChatMessage(receivedMessage, chatContact, isSyncMessage, m.logger) if err != nil { m.logger.Error("failed to handle contact request message", zap.Error(err)) return err } state.ModifiedContacts.Store(chatContact.ID, true) state.AllContacts.Store(chatContact.ID, chatContact) if sendNotification { err = m.createIncomingContactRequestNotification(chatContact, state, receivedMessage, true) if err != nil { return err } } } else if receivedMessage.ContentType == protobuf.ChatMessage_COMMUNITY { chat.Highlight = true } if receivedMessage.ContentType == protobuf.ChatMessage_DISCORD_MESSAGE { discordMessage := receivedMessage.GetDiscordMessage() discordMessageAuthor := discordMessage.GetAuthor() discordMessageAttachments := discordMessage.GetAttachments() state.Response.AddDiscordMessage(discordMessage) state.Response.AddDiscordMessageAuthor(discordMessageAuthor) if len(discordMessageAttachments) > 0 { state.Response.AddDiscordMessageAttachments(discordMessageAttachments) } } err = m.checkForEdits(receivedMessage) if err != nil { return err } err = m.checkForDeletes(receivedMessage) if err != nil { return err } err = m.checkForDeleteForMes(receivedMessage) if err != nil { return err } if !receivedMessage.Deleted && !receivedMessage.DeletedForMe { err = chat.UpdateFromMessage(receivedMessage, m.getTimesource()) if err != nil { return err } } // Set in the modified maps chat state.Response.AddChat(chat) // TODO(samyoul) remove storing of an updated reference pointer? m.allChats.Store(chat.ID, chat) if !isSyncMessage && receivedMessage.EnsName != "" { oldRecord, err := m.ensVerifier.Add(contact.ID, receivedMessage.EnsName, receivedMessage.Clock) if err != nil { m.logger.Warn("failed to verify ENS name", zap.Error(err)) } else if oldRecord == nil { // If oldRecord is nil, a new verification process will take place // so we reset the record contact.ENSVerified = false state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } } if !isSyncMessage && contact.DisplayName != receivedMessage.DisplayName && len(receivedMessage.DisplayName) != 0 { contact.DisplayName = receivedMessage.DisplayName state.ModifiedContacts.Store(contact.ID, true) } if receivedMessage.ContentType == protobuf.ChatMessage_COMMUNITY { m.logger.Debug("Handling community content type") signer, description, err := communities.UnwrapCommunityDescriptionMessage(receivedMessage.GetCommunity()) if err != nil { return err } err = m.handleCommunityDescription(state, signer, description, receivedMessage.GetCommunity(), receivedMessage.GetShard()) if err != nil { return err } if len(description.ID) != 0 { receivedMessage.CommunityID = description.ID } else { // Backward compatibility receivedMessage.CommunityID = types.EncodeHex(crypto.CompressPubkey(signer)) } } receivedMessage.New = true state.Response.AddMessage(receivedMessage) return nil } func (m *Messenger) HandleChatMessage(state *ReceivedMessageState, message *protobuf.ChatMessage, statusMessage *v1protocol.StatusMessage, fromArchive bool) error { state.CurrentMessageState.Message = message return m.handleChatMessage(state, fromArchive) } func (m *Messenger) HandleRequestAddressForTransaction(messageState *ReceivedMessageState, command *protobuf.RequestAddressForTransaction, statusMessage *v1protocol.StatusMessage) error { err := ValidateReceivedRequestAddressForTransaction(command, messageState.CurrentMessageState.WhisperTimestamp) if err != nil { return err } message := &common.Message{ ChatMessage: &protobuf.ChatMessage{ Clock: command.Clock, Timestamp: messageState.CurrentMessageState.WhisperTimestamp, Text: "Request address for transaction", // ChatId is only used as-is for messages sent to oneself (i.e: mostly sync) so no need to check it here ChatId: command.GetChatId(), MessageType: protobuf.MessageType_ONE_TO_ONE, ContentType: protobuf.ChatMessage_TRANSACTION_COMMAND, }, CommandParameters: &common.CommandParameters{ ID: messageState.CurrentMessageState.MessageID, Value: command.Value, Contract: command.Contract, CommandState: common.CommandStateRequestAddressForTransaction, }, } return m.handleCommandMessage(messageState, message) } func (m *Messenger) HandleSyncSetting(messageState *ReceivedMessageState, message *protobuf.SyncSetting, statusMessage *v1protocol.StatusMessage) error { settingField, err := m.extractAndSaveSyncSetting(message) if err != nil { return err } if settingField == nil { return nil } switch message.GetType() { case protobuf.SyncSetting_DISPLAY_NAME: if newName := message.GetValueString(); newName != "" && m.account.Name != newName { m.account.Name = newName if err := m.multiAccounts.SaveAccount(*m.account); err != nil { return err } } case protobuf.SyncSetting_MNEMONIC_REMOVED: if message.GetValueBool() { if err := m.settings.DeleteMnemonic(); err != nil { return err } messageState.Response.AddSetting(&settings.SyncSettingField{SettingField: settings.Mnemonic}) } return nil } messageState.Response.AddSetting(settingField) return nil } func (m *Messenger) HandleSyncAccountCustomizationColor(state *ReceivedMessageState, message *protobuf.SyncAccountCustomizationColor, statusMessage *v1protocol.StatusMessage) error { err := m.multiAccounts.UpdateAccountCustomizationColor(message.GetKeyUid(), message.GetCustomizationColor(), message.GetUpdatedAt()) if err != nil { return err } state.Response.CustomizationColor = message.GetCustomizationColor() return nil } func (m *Messenger) HandleRequestTransaction(messageState *ReceivedMessageState, command *protobuf.RequestTransaction, statusMessage *v1protocol.StatusMessage) error { err := ValidateReceivedRequestTransaction(command, messageState.CurrentMessageState.WhisperTimestamp) if err != nil { return err } message := &common.Message{ ChatMessage: &protobuf.ChatMessage{ Clock: command.Clock, Timestamp: messageState.CurrentMessageState.WhisperTimestamp, Text: "Request transaction", // ChatId is only used for messages sent to oneself (i.e: mostly sync) so no need to check it here ChatId: command.GetChatId(), MessageType: protobuf.MessageType_ONE_TO_ONE, ContentType: protobuf.ChatMessage_TRANSACTION_COMMAND, }, CommandParameters: &common.CommandParameters{ ID: messageState.CurrentMessageState.MessageID, Value: command.Value, Contract: command.Contract, CommandState: common.CommandStateRequestTransaction, Address: command.Address, }, } return m.handleCommandMessage(messageState, message) } func (m *Messenger) HandleAcceptRequestAddressForTransaction(messageState *ReceivedMessageState, command *protobuf.AcceptRequestAddressForTransaction, statusMessage *v1protocol.StatusMessage) error { err := ValidateReceivedAcceptRequestAddressForTransaction(command, messageState.CurrentMessageState.WhisperTimestamp) if err != nil { return err } initialMessage, err := m.persistence.MessageByID(command.Id) if err != nil { return err } if initialMessage == nil { return errors.New("message not found") } if initialMessage.LocalChatID != messageState.CurrentMessageState.Contact.ID { return errors.New("From must match") } if initialMessage.OutgoingStatus == "" { return errors.New("Initial message must originate from us") } if initialMessage.CommandParameters.CommandState != common.CommandStateRequestAddressForTransaction { return errors.New("Wrong state for command") } initialMessage.Clock = command.Clock initialMessage.Timestamp = messageState.CurrentMessageState.WhisperTimestamp initialMessage.Text = requestAddressForTransactionAcceptedMessage initialMessage.CommandParameters.Address = command.Address initialMessage.Seen = false initialMessage.CommandParameters.CommandState = common.CommandStateRequestAddressForTransactionAccepted initialMessage.ChatId = command.GetChatId() // Hide previous message previousMessage, err := m.persistence.MessageByCommandID(messageState.CurrentMessageState.Contact.ID, command.Id) if err != nil && err != common.ErrRecordNotFound { return err } if previousMessage != nil { err = m.persistence.HideMessage(previousMessage.ID) if err != nil { return err } initialMessage.Replace = previousMessage.ID } return m.handleCommandMessage(messageState, initialMessage) } func (m *Messenger) HandleSendTransaction(messageState *ReceivedMessageState, command *protobuf.SendTransaction, statusMessage *v1protocol.StatusMessage) error { err := ValidateReceivedSendTransaction(command, messageState.CurrentMessageState.WhisperTimestamp) if err != nil { return err } transactionToValidate := &TransactionToValidate{ MessageID: messageState.CurrentMessageState.MessageID, CommandID: command.Id, TransactionHash: command.TransactionHash, FirstSeen: messageState.CurrentMessageState.WhisperTimestamp, Signature: command.Signature, Validate: true, From: messageState.CurrentMessageState.PublicKey, RetryCount: 0, } m.logger.Info("Saving transction to validate", zap.Any("transaction", transactionToValidate)) return m.persistence.SaveTransactionToValidate(transactionToValidate) } func (m *Messenger) HandleDeclineRequestAddressForTransaction(messageState *ReceivedMessageState, command *protobuf.DeclineRequestAddressForTransaction, statusMessage *v1protocol.StatusMessage) error { err := ValidateReceivedDeclineRequestAddressForTransaction(command, messageState.CurrentMessageState.WhisperTimestamp) if err != nil { return err } oldMessage, err := m.persistence.MessageByID(command.Id) if err != nil { return err } if oldMessage == nil { return errors.New("message not found") } if oldMessage.LocalChatID != messageState.CurrentMessageState.Contact.ID { return errors.New("From must match") } if oldMessage.OutgoingStatus == "" { return errors.New("Initial message must originate from us") } if oldMessage.CommandParameters.CommandState != common.CommandStateRequestAddressForTransaction { return errors.New("Wrong state for command") } oldMessage.Clock = command.Clock oldMessage.Timestamp = messageState.CurrentMessageState.WhisperTimestamp oldMessage.Text = requestAddressForTransactionDeclinedMessage oldMessage.Seen = false oldMessage.CommandParameters.CommandState = common.CommandStateRequestAddressForTransactionDeclined oldMessage.ChatId = command.GetChatId() // Hide previous message err = m.persistence.HideMessage(command.Id) if err != nil { return err } oldMessage.Replace = command.Id return m.handleCommandMessage(messageState, oldMessage) } func (m *Messenger) HandleDeclineRequestTransaction(messageState *ReceivedMessageState, command *protobuf.DeclineRequestTransaction, statusMessage *v1protocol.StatusMessage) error { err := ValidateReceivedDeclineRequestTransaction(command, messageState.CurrentMessageState.WhisperTimestamp) if err != nil { return err } oldMessage, err := m.persistence.MessageByID(command.Id) if err != nil { return err } if oldMessage == nil { return errors.New("message not found") } if oldMessage.LocalChatID != messageState.CurrentMessageState.Contact.ID { return errors.New("From must match") } if oldMessage.OutgoingStatus == "" { return errors.New("Initial message must originate from us") } if oldMessage.CommandParameters.CommandState != common.CommandStateRequestTransaction { return errors.New("Wrong state for command") } oldMessage.Clock = command.Clock oldMessage.Timestamp = messageState.CurrentMessageState.WhisperTimestamp oldMessage.Text = transactionRequestDeclinedMessage oldMessage.Seen = false oldMessage.CommandParameters.CommandState = common.CommandStateRequestTransactionDeclined oldMessage.ChatId = command.GetChatId() // Hide previous message err = m.persistence.HideMessage(command.Id) if err != nil { return err } oldMessage.Replace = command.Id return m.handleCommandMessage(messageState, oldMessage) } func (m *Messenger) matchChatEntity(chatEntity common.ChatEntity) (*Chat, error) { if chatEntity.GetSigPubKey() == nil { m.logger.Error("public key can't be empty") return nil, errors.New("received a chatEntity with empty public key") } switch { case chatEntity.GetMessageType() == protobuf.MessageType_PUBLIC_GROUP: // For public messages, all outgoing and incoming messages have the same chatID // equal to a public chat name. chatID := chatEntity.GetChatId() chat, ok := m.allChats.Load(chatID) if !ok { return nil, errors.New("received a public chatEntity from non-existing chat") } if !chat.Public() && !chat.ProfileUpdates() && !chat.Timeline() { return nil, ErrMessageForWrongChatType } return chat, nil case chatEntity.GetMessageType() == protobuf.MessageType_ONE_TO_ONE && common.IsPubKeyEqual(chatEntity.GetSigPubKey(), &m.identity.PublicKey): // It's a private message coming from us so we rely on Message.ChatID // If chat does not exist, it should be created to support multidevice synchronization. chatID := chatEntity.GetChatId() chat, ok := m.allChats.Load(chatID) if !ok { if len(chatID) != PubKeyStringLength { return nil, errors.New("invalid pubkey length") } bytePubKey, err := hex.DecodeString(chatID[2:]) if err != nil { return nil, errors.Wrap(err, "failed to decode hex chatID") } pubKey, err := crypto.UnmarshalPubkey(bytePubKey) if err != nil { return nil, errors.Wrap(err, "failed to decode pubkey") } chat = CreateOneToOneChat(chatID[:8], pubKey, m.getTimesource()) } // if we are the sender, the chat must be active chat.Active = true return chat, nil case chatEntity.GetMessageType() == protobuf.MessageType_ONE_TO_ONE: // It's an incoming private chatEntity. ChatID is calculated from the signature. // If a chat does not exist, a new one is created and saved. chatID := contactIDFromPublicKey(chatEntity.GetSigPubKey()) chat, ok := m.allChats.Load(chatID) if !ok { // TODO: this should be a three-word name used in the mobile client chat = CreateOneToOneChat(chatID[:8], chatEntity.GetSigPubKey(), m.getTimesource()) chat.Active = false } // We set the chat as inactive and will create a notification // if it's not coming from a contact contact, ok := m.allContacts.Load(chatID) chat.Active = chat.Active || (ok && contact.added()) return chat, nil case chatEntity.GetMessageType() == protobuf.MessageType_COMMUNITY_CHAT: chatID := chatEntity.GetChatId() chat, ok := m.allChats.Load(chatID) if !ok { return nil, errors.New("received community chat chatEntity for non-existing chat") } if chat.CommunityID == "" || chat.ChatType != ChatTypeCommunityChat { return nil, errors.New("not an community chat") } canPost, err := m.communitiesManager.CanPost(chatEntity.GetSigPubKey(), chat.CommunityID, chat.CommunityChatID(), chatEntity.GetGrant()) if err != nil { return nil, err } if !canPost { return nil, errors.New("user can't post in community") } _, isPinMessage := chatEntity.(*common.PinMessage) if isPinMessage { community, err := m.communitiesManager.GetByIDString(chat.CommunityID) if err != nil { return nil, err } hasPermission := community.IsPrivilegedMember(chatEntity.GetSigPubKey()) pinMessageAllowed := community.AllowsAllMembersToPinMessage() if !hasPermission && !pinMessageAllowed { return nil, errors.New("user can't pin message") } } return chat, nil case chatEntity.GetMessageType() == protobuf.MessageType_PRIVATE_GROUP: // In the case of a group chatEntity, ChatID is the same for all messages belonging to a group. // It needs to be verified if the signature public key belongs to the chat. chatID := chatEntity.GetChatId() chat, ok := m.allChats.Load(chatID) if !ok { return nil, errors.New("received group chat chatEntity for non-existing chat") } senderKeyHex := contactIDFromPublicKey(chatEntity.GetSigPubKey()) myKeyHex := contactIDFromPublicKey(&m.identity.PublicKey) senderIsMember := false iAmMember := false for _, member := range chat.Members { if member.ID == senderKeyHex { senderIsMember = true } if member.ID == myKeyHex { iAmMember = true } } if senderIsMember && iAmMember { return chat, nil } return nil, errors.New("did not find a matching group chat") default: return nil, errors.New("can not match a chat because there is no valid case") } } func (m *Messenger) messageExists(messageID string, existingMessagesMap map[string]bool) (bool, error) { if _, ok := existingMessagesMap[messageID]; ok { return true, nil } existingMessagesMap[messageID] = true // Check against the database, this is probably a bit slow for // each message, but for now might do, we'll make it faster later existingMessage, err := m.persistence.MessageByID(messageID) if err != nil && err != common.ErrRecordNotFound { return false, err } if existingMessage != nil { return true, nil } return false, nil } func (m *Messenger) HandleEmojiReaction(state *ReceivedMessageState, pbEmojiR *protobuf.EmojiReaction, statusMessage *v1protocol.StatusMessage) error { logger := m.logger.With(zap.String("site", "HandleEmojiReaction")) if err := ValidateReceivedEmojiReaction(pbEmojiR, state.Timesource.GetCurrentTime()); err != nil { logger.Error("invalid emoji reaction", zap.Error(err)) return err } from := state.CurrentMessageState.Contact.ID emojiReaction := &EmojiReaction{ EmojiReaction: pbEmojiR, From: from, SigPubKey: state.CurrentMessageState.PublicKey, } existingEmoji, err := m.persistence.EmojiReactionByID(emojiReaction.ID()) if err != common.ErrRecordNotFound && err != nil { return err } if existingEmoji != nil && existingEmoji.Clock >= pbEmojiR.Clock { // this is not a valid emoji, ignoring return nil } chat, err := m.matchChatEntity(emojiReaction) if err != nil { return err // matchChatEntity returns a descriptive error message } // Set local chat id emojiReaction.LocalChatID = chat.ID logger.Debug("Handling emoji reaction") if chat.LastClockValue < pbEmojiR.Clock { chat.LastClockValue = pbEmojiR.Clock } state.Response.AddChat(chat) // TODO(samyoul) remove storing of an updated reference pointer? state.AllChats.Store(chat.ID, chat) // save emoji reaction err = m.persistence.SaveEmojiReaction(emojiReaction) if err != nil { return err } state.EmojiReactions[emojiReaction.ID()] = emojiReaction return nil } func (m *Messenger) HandleGroupChatInvitation(state *ReceivedMessageState, pbGHInvitations *protobuf.GroupChatInvitation, statusMessage *v1protocol.StatusMessage) error { allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, nil) if err != nil { return err } if !allowed { return ErrMessageNotAllowed } logger := m.logger.With(zap.String("site", "HandleGroupChatInvitation")) if err := ValidateReceivedGroupChatInvitation(pbGHInvitations); err != nil { logger.Error("invalid group chat invitation", zap.Error(err)) return err } groupChatInvitation := &GroupChatInvitation{ GroupChatInvitation: pbGHInvitations, SigPubKey: state.CurrentMessageState.PublicKey, } //From is the PK of author of invitation request if groupChatInvitation.State == protobuf.GroupChatInvitation_REJECTED { //rejected so From is the current user who received this rejection groupChatInvitation.From = types.EncodeHex(crypto.FromECDSAPub(&m.identity.PublicKey)) } else { //invitation request, so From is the author of message groupChatInvitation.From = state.CurrentMessageState.Contact.ID } existingInvitation, err := m.persistence.InvitationByID(groupChatInvitation.ID()) if err != common.ErrRecordNotFound && err != nil { return err } if existingInvitation != nil && existingInvitation.Clock >= pbGHInvitations.Clock { // this is not a valid invitation, ignoring return nil } // save invitation err = m.persistence.SaveInvitation(groupChatInvitation) if err != nil { return err } state.GroupChatInvitations[groupChatInvitation.ID()] = groupChatInvitation return nil } func (m *Messenger) HandleContactCodeAdvertisement(state *ReceivedMessageState, cca *protobuf.ContactCodeAdvertisement, statusMessage *v1protocol.StatusMessage) error { if cca.ChatIdentity == nil { return nil } return m.HandleChatIdentity(state, cca.ChatIdentity, nil) } // HandleChatIdentity handles an incoming protobuf.ChatIdentity // extracts contact information stored in the protobuf and adds it to the user's contact for update. func (m *Messenger) HandleChatIdentity(state *ReceivedMessageState, ci *protobuf.ChatIdentity, statusMessage *v1protocol.StatusMessage) error { s, err := m.settings.GetSettings() if err != nil { return err } contact := state.CurrentMessageState.Contact viewFromContacts := s.ProfilePicturesVisibility == settings.ProfilePicturesVisibilityContactsOnly viewFromNoOne := s.ProfilePicturesVisibility == settings.ProfilePicturesVisibilityNone m.logger.Debug("settings found", zap.Bool("viewFromContacts", viewFromContacts), zap.Bool("viewFromNoOne", viewFromNoOne), ) // If we don't want to view profile images from anyone, don't process identity images. // We don't want to store the profile images of other users, even if we don't display images. inOurContacts, ok := m.allContacts.Load(state.CurrentMessageState.Contact.ID) isContact := ok && inOurContacts.added() if viewFromNoOne && !isContact { return nil } // If there are no images attached to a ChatIdentity, check if message is allowed // Or if there are images and visibility is set to from contacts only, check if message is allowed // otherwise process the images without checking if the message is allowed if len(ci.Images) == 0 || (len(ci.Images) > 0 && (viewFromContacts)) { allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, nil) if err != nil { return err } if !allowed { return ErrMessageNotAllowed } } err = DecryptIdentityImagesWithIdentityPrivateKey(ci.Images, m.identity, state.CurrentMessageState.PublicKey) if err != nil { return err } // Remove any images still encrypted after the decryption process for name, image := range ci.Images { if image.Encrypted { delete(ci.Images, name) } } clockChanged, imagesChanged, err := m.persistence.SaveContactChatIdentity(contact.ID, ci) if err != nil { return err } contactModified := false if imagesChanged { for imageType, image := range ci.Images { if contact.Images == nil { contact.Images = make(map[string]images.IdentityImage) } contact.Images[imageType] = images.IdentityImage{Name: imageType, Payload: image.Payload, Clock: ci.Clock} } if err = m.updateContactImagesURL(contact); err != nil { return err } contactModified = true } if clockChanged { if err = ValidateDisplayName(&ci.DisplayName); err != nil { return err } if contact.DisplayName != ci.DisplayName && len(ci.DisplayName) != 0 { contact.DisplayName = ci.DisplayName contactModified = true } if err = ValidateBio(&ci.Description); err != nil { return err } if contact.Bio != ci.Description { contact.Bio = ci.Description contactModified = true } socialLinks := identity.NewSocialLinks(ci.SocialLinks) if err = ValidateSocialLinks(socialLinks); err != nil { return err } if !contact.SocialLinks.Equal(socialLinks) { contact.SocialLinks = socialLinks contactModified = true } if ci.ProfileShowcase != nil { err := m.BuildProfileShowcaseFromIdentity(state, ci.ProfileShowcase) if err != nil { return err } } } if contactModified { state.ModifiedContacts.Store(contact.ID, true) state.AllContacts.Store(contact.ID, contact) } return nil } func (m *Messenger) HandleAnonymousMetricBatch(state *ReceivedMessageState, amb *protobuf.AnonymousMetricBatch, statusMessage *v1protocol.StatusMessage) error { // TODO return nil } func (m *Messenger) checkForEdits(message *common.Message) error { // Check for any pending edit // If any pending edits are available and valid, apply them edits, err := m.persistence.GetEdits(message.ID, message.From) if err != nil { return err } if len(edits) == 0 { return nil } // Apply the first edit that is valid for _, e := range edits { if e.Clock >= message.Clock { // Update message and return it err := m.applyEditMessage(e.EditMessage, message) if err != nil { return err } return nil } } return nil } func (m *Messenger) getMessagesToCheckForDelete(message *common.Message) ([]*common.Message, error) { var messagesToCheck []*common.Message if message.ContentType == protobuf.ChatMessage_IMAGE { image := message.GetImage() if image != nil && image.AlbumId != "" { messagesInTheAlbum, err := m.persistence.albumMessages(message.ChatId, image.GetAlbumId()) if err != nil { return nil, err } messagesToCheck = append(messagesToCheck, messagesInTheAlbum...) } } messagesToCheck = append(messagesToCheck, message) return messagesToCheck, nil } func (m *Messenger) checkForDeletes(message *common.Message) error { // Get all messages part of the album messagesToCheck, err := m.getMessagesToCheckForDelete(message) if err != nil { return err } var messageDeletes []*DeleteMessage applyDelete := false // Loop all messages part of the album, if one of them is marked as deleted, we delete them all for _, messageToCheck := range messagesToCheck { // Check for any pending deletes // If any pending deletes are available and valid, apply them messageDeletes, err = m.persistence.GetDeletes(messageToCheck.ID, messageToCheck.From) if err != nil { return err } if len(messageDeletes) == 0 { continue } // Once one messageDelete has been found, we apply it to all the images in the album applyDelete = true break } if applyDelete { for _, messageToCheck := range messagesToCheck { err := m.applyDeleteMessage(messageDeletes, messageToCheck) if err != nil { return err } } } return nil } func (m *Messenger) checkForDeleteForMes(message *common.Message) error { messagesToCheck, err := m.getMessagesToCheckForDelete(message) if err != nil { return err } var messageDeleteForMes []*protobuf.SyncDeleteForMeMessage applyDelete := false for _, messageToCheck := range messagesToCheck { if !applyDelete { // Check for any pending delete for mes // If any pending deletes are available and valid, apply them messageDeleteForMes, err = m.persistence.GetDeleteForMeMessagesByMessageID(messageToCheck.ID) if err != nil { return err } if len(messageDeleteForMes) == 0 { continue } } // Once one messageDeleteForMes has been found, we apply it to all the images in the album applyDelete = true err := m.applyDeleteForMeMessage(messageToCheck) if err != nil { return err } } return nil } func (m *Messenger) isMessageAllowedFrom(publicKey string, chat *Chat) (bool, error) { onlyFromContacts, err := m.settings.GetMessagesFromContactsOnly() if err != nil { return false, err } if !onlyFromContacts { return true, nil } // if it's from us, it's allowed if m.myHexIdentity() == publicKey { return true, nil } // If the chat is active, we allow it if chat != nil && chat.Active { return true, nil } // If the chat is public, we allow it if chat != nil && chat.Public() { return true, nil } contact, ok := m.allContacts.Load(publicKey) if !ok { // If it's not in contacts, we don't allow it return false, nil } // Otherwise we check if we added it return contact.added(), nil } func (m *Messenger) updateUnviewedCounts(chat *Chat, message *common.Message) { chat.UnviewedMessagesCount++ if message.Mentioned || message.Replied || chat.OneToOne() { chat.UnviewedMentionsCount++ } } func mapSyncAccountToAccount(message *protobuf.SyncAccount, accountOperability accounts.AccountOperable, accType accounts.AccountType) *accounts.Account { return &accounts.Account{ Address: types.BytesToAddress(message.Address), KeyUID: message.KeyUid, PublicKey: types.HexBytes(message.PublicKey), Type: accType, Path: message.Path, Name: message.Name, ColorID: multiaccountscommon.CustomizationColor(message.ColorId), Emoji: message.Emoji, Wallet: message.Wallet, Chat: message.Chat, Hidden: message.Hidden, Clock: message.Clock, Operable: accountOperability, Removed: message.Removed, Position: message.Position, ProdPreferredChainIDs: message.ProdPreferredChainIDs, TestPreferredChainIDs: message.TestPreferredChainIDs, } } func (m *Messenger) resolveAccountOperability(syncAcc *protobuf.SyncAccount, syncKpMigratedToKeycard bool, dbKpMigratedToKeycard bool, accountReceivedFromLocalPairing bool) (accounts.AccountOperable, error) { if accountReceivedFromLocalPairing { return accounts.AccountOperable(syncAcc.Operable), nil } if syncKpMigratedToKeycard || m.account.KeyUID == syncAcc.KeyUid { return accounts.AccountFullyOperable, nil } accountsOperability := accounts.AccountNonOperable dbAccount, err := m.settings.GetAccountByAddress(types.BytesToAddress(syncAcc.Address)) if err != nil && err != accounts.ErrDbAccountNotFound { return accountsOperability, err } if dbAccount != nil { // We're here when we receive a keypair from the paired device which has just migrated from keycard to app. if !syncKpMigratedToKeycard && dbKpMigratedToKeycard { return accounts.AccountNonOperable, nil } return dbAccount.Operable, nil } if !syncKpMigratedToKeycard { // We're here when we receive a keypair from the paired device which is either: // 1. regular keypair or // 2. was just converted from keycard to a regular keypair. dbKeycardsForKeyUID, err := m.settings.GetKeycardsWithSameKeyUID(syncAcc.KeyUid) if err != nil { return accounts.AccountNonOperable, err } if len(dbKeycardsForKeyUID) > 0 { // We're here in case 2. from above and in this case we need to mark all accounts for this keypair non operable return accounts.AccountNonOperable, nil } } if syncAcc.Chat || syncAcc.Wallet { accountsOperability = accounts.AccountFullyOperable } else { partiallyOrFullyOperable, err := m.settings.IsAnyAccountPartiallyOrFullyOperableForKeyUID(syncAcc.KeyUid) if err != nil { if err == accounts.ErrDbKeypairNotFound { return accounts.AccountNonOperable, nil } return accounts.AccountNonOperable, err } if partiallyOrFullyOperable { accountsOperability = accounts.AccountPartiallyOperable } } return accountsOperability, nil } func (m *Messenger) handleSyncWatchOnlyAccount(message *protobuf.SyncAccount, fromBackup bool) (*accounts.Account, error) { if message.KeyUid != "" { return nil, ErrNotWatchOnlyAccount } accountOperability := accounts.AccountFullyOperable accAddress := types.BytesToAddress(message.Address) dbAccount, err := m.settings.GetAccountByAddress(accAddress) if err != nil && err != accounts.ErrDbAccountNotFound { return nil, err } if dbAccount != nil { if message.Clock <= dbAccount.Clock { return nil, ErrTryingToStoreOldWalletAccount } if message.Removed { err = m.settings.RemoveAccount(accAddress, message.Clock) if err != nil { return nil, err } // if keypair is retrieved from backed up data, no need for resolving accounts positions if !fromBackup { err = m.settings.ResolveAccountsPositions(message.Clock) if err != nil { return nil, err } } dbAccount.Removed = true return dbAccount, nil } } acc := mapSyncAccountToAccount(message, accountOperability, accounts.AccountTypeWatch) err = m.settings.SaveOrUpdateAccounts([]*accounts.Account{acc}, false) if err != nil { return nil, err } return acc, nil } func (m *Messenger) handleSyncTokenPreferences(message *protobuf.SyncTokenPreferences) ([]walletsettings.TokenPreferences, error) { if len(message.Preferences) == 0 { return nil, nil } dbLastUpdate, err := m.settings.GetClockOfLastTokenPreferencesChange() if err != nil { return nil, err } groupByCommunity, err := m.settings.GetTokenGroupByCommunity() if err != nil { return nil, err } // Since adding new token preferences updates `ClockOfLastTokenPreferencesChange` we should handle token preferences changes // even they are with the same clock, that ensures the correct order in case of syncing devices. if message.Clock < dbLastUpdate { return nil, ErrTryingToApplyOldTokenPreferences } var tokenPreferences []walletsettings.TokenPreferences for _, pref := range message.Preferences { tokenPref := walletsettings.TokenPreferences{ Key: pref.Key, Position: int(pref.Position), GroupPosition: int(pref.GroupPosition), Visible: pref.Visible, CommunityID: pref.CommunityId, } tokenPreferences = append(tokenPreferences, tokenPref) } err = m.settings.UpdateTokenPreferences(tokenPreferences, groupByCommunity, message.Testnet, message.Clock) if err != nil { return nil, err } return tokenPreferences, nil } func (m *Messenger) handleSyncAccountsPositions(message *protobuf.SyncAccountsPositions) ([]*accounts.Account, error) { if len(message.Accounts) == 0 { return nil, nil } dbLastUpdate, err := m.settings.GetClockOfLastAccountsPositionChange() if err != nil { return nil, err } // Since adding new account updates `ClockOfLastAccountsPositionChange` we should handle account order changes // even they are with the same clock, that ensures the correct order in case of syncing devices. if message.Clock < dbLastUpdate { return nil, ErrTryingToApplyOldWalletAccountsOrder } var accs []*accounts.Account for _, sAcc := range message.Accounts { acc := &accounts.Account{ Address: types.BytesToAddress(sAcc.Address), KeyUID: sAcc.KeyUid, Position: sAcc.Position, } accs = append(accs, acc) } err = m.settings.SetWalletAccountsPositions(accs, message.Clock) if err != nil { return nil, err } return accs, nil } func (m *Messenger) handleProfileKeypairMigration(state *ReceivedMessageState, fromLocalPairing bool, message *protobuf.SyncKeypair) (handled bool, err error) { if message == nil { return false, errors.New("handleProfileKeypairMigration receive a nil message") } if fromLocalPairing { return false, nil } if m.account.KeyUID != message.KeyUid { return false, nil } dbKeypair, err := m.settings.GetKeypairByKeyUID(message.KeyUid) if err != nil { return false, err } if dbKeypair.Clock >= message.Clock { return false, nil } migrationNeeded := dbKeypair.MigratedToKeycard() && len(message.Keycards) == 0 || // `true` if profile keypair was migrated to the app on one of paired devices !dbKeypair.MigratedToKeycard() && len(message.Keycards) > 0 // `true` if profile keypair was migrated to a Keycard on one of paired devices err = m.settings.SaveSettingField(settings.ProfileMigrationNeeded, migrationNeeded) if err != nil { return false, err } state.Response.AddSetting(&settings.SyncSettingField{SettingField: settings.ProfileMigrationNeeded, Value: migrationNeeded}) return migrationNeeded, nil } func (m *Messenger) handleSyncKeypair(message *protobuf.SyncKeypair, fromLocalPairing bool, acNofificationCallback func() error) (*accounts.Keypair, error) { if message == nil { return nil, errors.New("handleSyncKeypair receive a nil message") } dbKeypair, err := m.settings.GetKeypairByKeyUID(message.KeyUid) if err != nil && err != accounts.ErrDbKeypairNotFound { return nil, err } kp := &accounts.Keypair{ KeyUID: message.KeyUid, Name: message.Name, Type: accounts.KeypairType(message.Type), DerivedFrom: message.DerivedFrom, LastUsedDerivationIndex: message.LastUsedDerivationIndex, SyncedFrom: message.SyncedFrom, Clock: message.Clock, Removed: message.Removed, } if dbKeypair != nil { if dbKeypair.Clock >= kp.Clock { return nil, ErrTryingToStoreOldKeypair } // in case of keypair update, we need to keep `synced_from` field as it was when keypair was introduced to this device for the first time // but in case if keypair on this device came from the backup (e.g. device A recovered from waku, then device B paired with the device A // via local pairing, before device A made its keypairs fully operable) we need to update syncedFrom when user on this device when that // keypair becomes operable on any of other paired devices if dbKeypair.SyncedFrom != accounts.SyncedFromBackup { kp.SyncedFrom = dbKeypair.SyncedFrom } } syncKpMigratedToKeycard := len(message.Keycards) > 0 for _, sAcc := range message.Accounts { if message.SyncedFrom == accounts.SyncedFromBackup && kp.Type == accounts.KeypairTypeProfile { // if a profile keypair is coming from backup, we're handling within this block the case when a recovering // was inititiated via keycard, while backed up profile keypair data refers to a regular profile multiAcc, err := m.multiAccounts.GetAccount(kp.KeyUID) if err != nil { return nil, err } syncKpMigratedToKeycard = multiAcc != nil && multiAcc.KeycardPairing != "" } accountOperability, err := m.resolveAccountOperability(sAcc, syncKpMigratedToKeycard, dbKeypair != nil && dbKeypair.MigratedToKeycard(), fromLocalPairing) if err != nil { return nil, err } acc := mapSyncAccountToAccount(sAcc, accountOperability, accounts.GetAccountTypeForKeypairType(kp.Type)) kp.Accounts = append(kp.Accounts, acc) } if !fromLocalPairing { if kp.Removed || dbKeypair != nil && !dbKeypair.MigratedToKeycard() && syncKpMigratedToKeycard { // delete all keystore files err = m.deleteKeystoreFilesForKeypair(dbKeypair) if err != nil { return nil, err } if syncKpMigratedToKeycard { err = m.settings.MarkKeypairFullyOperable(dbKeypair.KeyUID, 0, false) if err != nil { return nil, err } } } else if dbKeypair != nil { for _, dbAcc := range dbKeypair.Accounts { removeAcc := false for _, acc := range kp.Accounts { if dbAcc.Address == acc.Address && acc.Removed && !dbAcc.Removed { removeAcc = true break } } if removeAcc { err = m.deleteKeystoreFileForAddress(dbAcc.Address) if err != nil { return nil, err } } } } } // deleting keypair will delete related keycards as well err = m.settings.RemoveKeypair(message.KeyUid, message.Clock) if err != nil && err != accounts.ErrDbKeypairNotFound { return nil, err } // if entire keypair was removed and keypair is already in db, there is no point to continue if kp.Removed && dbKeypair != nil { // if keypair is retrieved from backed up data, no need for resolving accounts positions if message.SyncedFrom != accounts.SyncedFromBackup { err = m.settings.ResolveAccountsPositions(message.Clock) if err != nil { return nil, err } } return kp, nil } // save keypair first err = m.settings.SaveOrUpdateKeypair(kp) if err != nil { return nil, err } // if keypair is retrieved from backed up data, no need for resolving accounts positions if message.SyncedFrom != accounts.SyncedFromBackup { // then resolve accounts positions, cause some accounts might be removed err = m.settings.ResolveAccountsPositions(message.Clock) if err != nil { return nil, err } // if keypair is coming from paired device (means not from backup) and it's not among known, active keypairs, // we need to add an activity center notification if !kp.Removed && dbKeypair == nil { defer func() { err = acNofificationCallback() }() } } for _, sKc := range message.Keycards { kc := accounts.Keycard{} kc.FromSyncKeycard(sKc) err = m.settings.SaveOrUpdateKeycard(kc, message.Clock, false) if err != nil { return nil, err } kp.Keycards = append(kp.Keycards, &kc) } // getting keypair form the db, cause keypair related accounts positions might be changed dbKeypair, err = m.settings.GetKeypairByKeyUID(message.KeyUid) if err != nil { return nil, err } return dbKeypair, nil } func (m *Messenger) HandleSyncAccountsPositions(state *ReceivedMessageState, message *protobuf.SyncAccountsPositions, statusMessage *v1protocol.StatusMessage) error { accs, err := m.handleSyncAccountsPositions(message) if err != nil { if err == ErrTryingToApplyOldWalletAccountsOrder || err == accounts.ErrAccountWrongPosition || err == accounts.ErrNotTheSameNumberOdAccountsToApplyReordering || err == accounts.ErrNotTheSameAccountsToApplyReordering { m.logger.Warn("syncing accounts order issue", zap.Error(err)) return nil } return err } state.Response.AccountsPositions = append(state.Response.AccountsPositions, accs...) return nil } func (m *Messenger) HandleSyncTokenPreferences(state *ReceivedMessageState, message *protobuf.SyncTokenPreferences, statusMessage *v1protocol.StatusMessage) error { tokenPreferences, err := m.handleSyncTokenPreferences(message) if err != nil { if err == ErrTryingToApplyOldTokenPreferences { m.logger.Warn("syncing token preferences issue", zap.Error(err)) return nil } return err } state.Response.TokenPreferences = append(state.Response.TokenPreferences, tokenPreferences...) return nil } func (m *Messenger) HandleSyncAccount(state *ReceivedMessageState, message *protobuf.SyncAccount, statusMessage *v1protocol.StatusMessage) error { acc, err := m.handleSyncWatchOnlyAccount(message, false) if err != nil { if err == ErrTryingToStoreOldWalletAccount { return nil } return err } state.Response.WatchOnlyAccounts = append(state.Response.WatchOnlyAccounts, acc) return nil } func (m *Messenger) HandleSyncKeypair(state *ReceivedMessageState, message *protobuf.SyncKeypair, statusMessage *v1protocol.StatusMessage) error { return m.handleSyncKeypairInternal(state, message, false) } func (m *Messenger) handleSyncKeypairInternal(state *ReceivedMessageState, message *protobuf.SyncKeypair, fromLocalPairing bool) error { if message == nil { return errors.New("handleSyncKeypairInternal receive a nil message") } if m.walletAPI != nil { err := m.walletAPI.SetPairingsJSONFileContent(message.KeycardPairings) if err != nil { return err } } // check for the profile keypair migration first on paired device handled, err := m.handleProfileKeypairMigration(state, fromLocalPairing, message) if err != nil { return err } if handled { return nil } kp, err := m.handleSyncKeypair(message, fromLocalPairing, func() error { return m.addNewKeypairAddedOnPairedDeviceACNotification(message.KeyUid, state.Response) }) if err != nil { if err == ErrTryingToStoreOldKeypair { return nil } return err } state.Response.Keypairs = append(state.Response.Keypairs, kp) return nil } func (m *Messenger) HandleSyncContactRequestDecision(state *ReceivedMessageState, message *protobuf.SyncContactRequestDecision, statusMessage *v1protocol.StatusMessage) error { var err error var response *MessengerResponse if message.DecisionStatus == protobuf.SyncContactRequestDecision_ACCEPTED { response, err = m.updateAcceptedContactRequest(nil, message.RequestId, true) } else { response, err = m.declineContactRequest(message.RequestId, true) } if err != nil { return err } state.Response = response return nil } func (m *Messenger) HandlePushNotificationRegistration(state *ReceivedMessageState, encryptedRegistration []byte, statusMessage *v1protocol.StatusMessage) error { if m.pushNotificationServer == nil { return nil } publicKey := state.CurrentMessageState.PublicKey return m.pushNotificationServer.HandlePushNotificationRegistration(publicKey, encryptedRegistration) } func (m *Messenger) HandlePushNotificationResponse(state *ReceivedMessageState, message *protobuf.PushNotificationResponse, statusMessage *v1protocol.StatusMessage) error { if m.pushNotificationClient == nil { return nil } publicKey := state.CurrentMessageState.PublicKey return m.pushNotificationClient.HandlePushNotificationResponse(publicKey, message) } func (m *Messenger) HandlePushNotificationRegistrationResponse(state *ReceivedMessageState, message *protobuf.PushNotificationRegistrationResponse, statusMessage *v1protocol.StatusMessage) error { if m.pushNotificationClient == nil { return nil } publicKey := state.CurrentMessageState.PublicKey return m.pushNotificationClient.HandlePushNotificationRegistrationResponse(publicKey, message) } func (m *Messenger) HandlePushNotificationQuery(state *ReceivedMessageState, message *protobuf.PushNotificationQuery, statusMessage *v1protocol.StatusMessage) error { if m.pushNotificationServer == nil { return nil } publicKey := state.CurrentMessageState.PublicKey return m.pushNotificationServer.HandlePushNotificationQuery(publicKey, statusMessage.ApplicationLayer.ID, message) } func (m *Messenger) HandlePushNotificationQueryResponse(state *ReceivedMessageState, message *protobuf.PushNotificationQueryResponse, statusMessage *v1protocol.StatusMessage) error { if m.pushNotificationClient == nil { return nil } publicKey := state.CurrentMessageState.PublicKey return m.pushNotificationClient.HandlePushNotificationQueryResponse(publicKey, message) } func (m *Messenger) HandlePushNotificationRequest(state *ReceivedMessageState, message *protobuf.PushNotificationRequest, statusMessage *v1protocol.StatusMessage) error { if m.pushNotificationServer == nil { return nil } publicKey := state.CurrentMessageState.PublicKey return m.pushNotificationServer.HandlePushNotificationRequest(publicKey, statusMessage.ApplicationLayer.ID, message) } func (m *Messenger) HandleCommunityDescription(state *ReceivedMessageState, message *protobuf.CommunityDescription, statusMessage *v1protocol.StatusMessage) error { // TODO: handle shard err := m.handleCommunityDescription(state, state.CurrentMessageState.PublicKey, message, statusMessage.EncryptionLayer.Payload, nil) if err != nil { m.logger.Warn("failed to handle CommunityDescription", zap.Error(err)) return err } return nil } func (m *Messenger) HandleSyncBookmark(state *ReceivedMessageState, message *protobuf.SyncBookmark, statusMessage *v1protocol.StatusMessage) error { bookmark := &browsers.Bookmark{ URL: message.Url, Name: message.Name, ImageURL: message.ImageUrl, Removed: message.Removed, Clock: message.Clock, } state.AllBookmarks[message.Url] = bookmark return nil } func (m *Messenger) HandleSyncClearHistory(state *ReceivedMessageState, message *protobuf.SyncClearHistory, statusMessage *v1protocol.StatusMessage) error { chatID := message.ChatId existingChat, ok := state.AllChats.Load(chatID) if !ok { return ErrChatNotFound } if existingChat.DeletedAtClockValue >= message.ClearedAt { return nil } err := m.persistence.ClearHistoryFromSyncMessage(existingChat, message.ClearedAt) if err != nil { return err } if existingChat.Public() { err = m.transport.ClearProcessedMessageIDsCache() if err != nil { return err } } state.AllChats.Store(chatID, existingChat) state.Response.AddChat(existingChat) state.Response.AddClearedHistory(&ClearedHistory{ ClearedAt: message.ClearedAt, ChatID: chatID, }) return nil } func (m *Messenger) HandleSyncTrustedUser(state *ReceivedMessageState, message *protobuf.SyncTrustedUser, statusMessage *v1protocol.StatusMessage) error { updated, err := m.verificationDatabase.UpsertTrustStatus(message.Id, verification.TrustStatus(message.Status), message.Clock) if err != nil { return err } if updated { state.AllTrustStatus[message.Id] = verification.TrustStatus(message.Status) contact, ok := m.allContacts.Load(message.Id) if !ok { m.logger.Info("contact not found") return nil } contact.TrustStatus = verification.TrustStatus(message.Status) m.allContacts.Store(contact.ID, contact) state.ModifiedContacts.Store(contact.ID, true) } return nil } func (m *Messenger) HandleCommunityMessageArchiveMagnetlink(state *ReceivedMessageState, message *protobuf.CommunityMessageArchiveMagnetlink, statusMessage *v1protocol.StatusMessage) error { return m.HandleHistoryArchiveMagnetlinkMessage(state, state.CurrentMessageState.PublicKey, message.MagnetUri, message.Clock) } func (m *Messenger) addNewKeypairAddedOnPairedDeviceACNotification(keyUID string, response *MessengerResponse) error { kp, err := m.settings.GetKeypairByKeyUID(keyUID) if err != nil { return err } notification := &ActivityCenterNotification{ ID: types.FromHex(uuid.New().String()), Type: ActivityCenterNotificationTypeNewKeypairAddedToPairedDevice, Timestamp: m.getTimesource().GetCurrentTime(), Read: false, UpdatedAt: m.GetCurrentTimeInMillis(), Message: &common.Message{ ChatMessage: &protobuf.ChatMessage{ Text: kp.Name, }, ID: kp.KeyUID, }, } err = m.addActivityCenterNotification(response, notification, nil) if err != nil { m.logger.Warn("failed to create activity center notification", zap.Error(err)) return err } return nil }