3768 lines
120 KiB
Go
3768 lines
120 KiB
Go
package protocol
|
|
|
|
import (
|
|
"context"
|
|
"crypto/ecdsa"
|
|
"database/sql"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/status-im/status-go/services/browsers"
|
|
"github.com/status-im/status-go/signal"
|
|
|
|
"github.com/pkg/errors"
|
|
"go.uber.org/zap"
|
|
|
|
"github.com/google/uuid"
|
|
|
|
"github.com/status-im/status-go/eth-node/crypto"
|
|
"github.com/status-im/status-go/eth-node/types"
|
|
"github.com/status-im/status-go/images"
|
|
"github.com/status-im/status-go/multiaccounts/accounts"
|
|
multiaccountscommon "github.com/status-im/status-go/multiaccounts/common"
|
|
"github.com/status-im/status-go/multiaccounts/settings"
|
|
walletsettings "github.com/status-im/status-go/multiaccounts/settings_wallet"
|
|
"github.com/status-im/status-go/protocol/common"
|
|
"github.com/status-im/status-go/protocol/common/shard"
|
|
"github.com/status-im/status-go/protocol/communities"
|
|
"github.com/status-im/status-go/protocol/encryption/multidevice"
|
|
"github.com/status-im/status-go/protocol/identity"
|
|
"github.com/status-im/status-go/protocol/protobuf"
|
|
"github.com/status-im/status-go/protocol/requests"
|
|
"github.com/status-im/status-go/protocol/transport"
|
|
v1protocol "github.com/status-im/status-go/protocol/v1"
|
|
"github.com/status-im/status-go/protocol/verification"
|
|
)
|
|
|
|
const (
|
|
transactionRequestDeclinedMessage = "Transaction request declined"
|
|
requestAddressForTransactionAcceptedMessage = "Request address for transaction accepted"
|
|
requestAddressForTransactionDeclinedMessage = "Request address for transaction declined"
|
|
)
|
|
|
|
var (
|
|
ErrMessageNotAllowed = errors.New("message from a non-contact")
|
|
ErrMessageForWrongChatType = errors.New("message for the wrong chat type")
|
|
ErrNotWatchOnlyAccount = errors.New("an account is not a watch only account")
|
|
ErrWalletAccountNotSupportedForMobileApp = errors.New("handling account is not supported for mobile app")
|
|
ErrTryingToApplyOldWalletAccountsOrder = errors.New("trying to apply old wallet accounts order")
|
|
ErrTryingToStoreOldWalletAccount = errors.New("trying to store an old wallet account")
|
|
ErrTryingToStoreOldKeypair = errors.New("trying to store an old keypair")
|
|
ErrSomeFieldsMissingForWalletAccount = errors.New("some fields are missing for wallet account")
|
|
ErrUnknownKeypairForWalletAccount = errors.New("keypair is not known for the wallet account")
|
|
ErrInvalidCommunityID = errors.New("invalid community id")
|
|
ErrTryingToApplyOldTokenPreferences = errors.New("trying to apply old token preferences")
|
|
)
|
|
|
|
// HandleMembershipUpdate updates a Chat instance according to the membership updates.
|
|
// It retrieves chat, if exists, and merges membership updates from the message.
|
|
// Finally, the Chat is updated with the new group events.
|
|
func (m *Messenger) HandleMembershipUpdateMessage(messageState *ReceivedMessageState, rawMembershipUpdate *protobuf.MembershipUpdateMessage, statusMessage *v1protocol.StatusMessage) error {
|
|
chat, _ := messageState.AllChats.Load(rawMembershipUpdate.ChatId)
|
|
|
|
return m.HandleMembershipUpdate(messageState, chat, rawMembershipUpdate, m.systemMessagesTranslations)
|
|
}
|
|
|
|
func (m *Messenger) HandleMembershipUpdate(messageState *ReceivedMessageState, chat *Chat, rawMembershipUpdate *protobuf.MembershipUpdateMessage, translations *systemMessageTranslationsMap) error {
|
|
|
|
var group *v1protocol.Group
|
|
var err error
|
|
|
|
if rawMembershipUpdate == nil {
|
|
return nil
|
|
}
|
|
|
|
logger := m.logger.With(zap.String("site", "HandleMembershipUpdate"))
|
|
|
|
message, err := v1protocol.MembershipUpdateMessageFromProtobuf(rawMembershipUpdate)
|
|
if err != nil {
|
|
return err
|
|
|
|
}
|
|
|
|
if err := ValidateMembershipUpdateMessage(message, messageState.Timesource.GetCurrentTime()); err != nil {
|
|
logger.Warn("failed to validate message", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
senderID := messageState.CurrentMessageState.Contact.ID
|
|
allowed, err := m.isMessageAllowedFrom(senderID, chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !allowed {
|
|
return ErrMessageNotAllowed
|
|
}
|
|
|
|
//if chat.InvitationAdmin exists means we are waiting for invitation request approvement, and in that case
|
|
//we need to create a new chat instance like we don't have a chat and just use a regular invitation flow
|
|
waitingForApproval := chat != nil && len(chat.InvitationAdmin) > 0
|
|
ourKey := contactIDFromPublicKey(&m.identity.PublicKey)
|
|
isActive := messageState.CurrentMessageState.Contact.added() || messageState.CurrentMessageState.Contact.ID == ourKey || waitingForApproval
|
|
showPushNotification := isActive && messageState.CurrentMessageState.Contact.ID != ourKey
|
|
|
|
// wasUserAdded indicates whether the user has been added to the group with this update
|
|
wasUserAdded := false
|
|
if chat == nil || waitingForApproval {
|
|
if len(message.Events) == 0 {
|
|
return errors.New("can't create new group chat without events")
|
|
}
|
|
|
|
//approve invitations
|
|
if waitingForApproval {
|
|
|
|
groupChatInvitation := &GroupChatInvitation{
|
|
GroupChatInvitation: &protobuf.GroupChatInvitation{
|
|
ChatId: message.ChatID,
|
|
},
|
|
From: types.EncodeHex(crypto.FromECDSAPub(&m.identity.PublicKey)),
|
|
}
|
|
|
|
groupChatInvitation, err = m.persistence.InvitationByID(groupChatInvitation.ID())
|
|
if err != nil && err != common.ErrRecordNotFound {
|
|
return err
|
|
}
|
|
if groupChatInvitation != nil {
|
|
groupChatInvitation.State = protobuf.GroupChatInvitation_APPROVED
|
|
|
|
err := m.persistence.SaveInvitation(groupChatInvitation)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
messageState.GroupChatInvitations[groupChatInvitation.ID()] = groupChatInvitation
|
|
}
|
|
}
|
|
|
|
group, err = v1protocol.NewGroupWithEvents(message.ChatID, message.Events)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// A new chat must have contained us at some point
|
|
wasEverMember, err := group.WasEverMember(ourKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !wasEverMember {
|
|
return errors.New("can't create a new group chat without us being a member")
|
|
}
|
|
|
|
wasUserAdded = group.IsMember(ourKey)
|
|
newChat := CreateGroupChat(messageState.Timesource)
|
|
// We set group chat inactive and create a notification instead
|
|
// unless is coming from us or a contact or were waiting for approval.
|
|
// Also, as message MEMBER_JOINED may come from member(not creator, not our contact)
|
|
// reach earlier than CHAT_CREATED from creator, we need check if creator is our contact
|
|
newChat.Active = isActive || m.checkIfCreatorIsOurContact(group)
|
|
newChat.ReceivedInvitationAdmin = senderID
|
|
chat = &newChat
|
|
|
|
chat.updateChatFromGroupMembershipChanges(group)
|
|
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to get group creator")
|
|
}
|
|
|
|
publicKeys, err := group.MemberPublicKeys()
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to get group members")
|
|
}
|
|
filters, err := m.transport.JoinGroup(publicKeys)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to join group")
|
|
}
|
|
ok, err := m.scheduleSyncFilters(filters)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to schedule sync filter")
|
|
}
|
|
m.logger.Debug("result of schedule sync filter", zap.Bool("ok", ok))
|
|
} else {
|
|
existingGroup, err := newProtocolGroupFromChat(chat)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to create a Group from Chat")
|
|
}
|
|
updateGroup, err := v1protocol.NewGroupWithEvents(message.ChatID, message.Events)
|
|
if err != nil {
|
|
return errors.Wrap(err, "invalid membership update")
|
|
}
|
|
merged := v1protocol.MergeMembershipUpdateEvents(existingGroup.Events(), updateGroup.Events())
|
|
group, err = v1protocol.NewGroupWithEvents(chat.ID, merged)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to create a group with new membership updates")
|
|
}
|
|
chat.updateChatFromGroupMembershipChanges(group)
|
|
|
|
// Reactivate deleted group chat on re-invite from contact
|
|
chat.Active = chat.Active || (isActive && group.IsMember(ourKey))
|
|
|
|
wasUserAdded = !existingGroup.IsMember(ourKey) && group.IsMember(ourKey)
|
|
|
|
// Show push notifications when our key is added to members list and chat is Active
|
|
showPushNotification = showPushNotification && wasUserAdded
|
|
}
|
|
maxClockVal := uint64(0)
|
|
for _, event := range group.Events() {
|
|
if event.ClockValue > maxClockVal {
|
|
maxClockVal = event.ClockValue
|
|
}
|
|
}
|
|
|
|
if chat.LastClockValue < maxClockVal {
|
|
chat.LastClockValue = maxClockVal
|
|
}
|
|
|
|
// Only create a message notification when the user is added, not when removed
|
|
if !chat.Active && wasUserAdded {
|
|
chat.Highlight = true
|
|
m.createMessageNotification(chat, messageState, chat.LastMessage)
|
|
}
|
|
|
|
profilePicturesVisibility, err := m.settings.GetProfilePicturesVisibility()
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to get profilePicturesVisibility setting")
|
|
}
|
|
|
|
if showPushNotification {
|
|
// chat is highlighted for new group invites or group re-invites
|
|
chat.Highlight = true
|
|
messageState.Response.AddNotification(NewPrivateGroupInviteNotification(chat.ID, chat, messageState.CurrentMessageState.Contact, profilePicturesVisibility))
|
|
}
|
|
|
|
systemMessages := buildSystemMessages(message.Events, translations)
|
|
|
|
for _, message := range systemMessages {
|
|
messageID := message.ID
|
|
exists, err := m.messageExists(messageID, messageState.ExistingMessagesMap)
|
|
if err != nil {
|
|
m.logger.Warn("failed to check message exists", zap.Error(err))
|
|
}
|
|
if exists {
|
|
continue
|
|
}
|
|
messageState.Response.AddMessage(message)
|
|
}
|
|
|
|
messageState.Response.AddChat(chat)
|
|
// Store in chats map as it might be a new one
|
|
messageState.AllChats.Store(chat.ID, chat)
|
|
|
|
// explicit join has been removed, mimic auto-join for backward compatibility
|
|
// no all cases are covered, e.g. if added to a group by non-contact
|
|
autoJoin := chat.Active && wasUserAdded
|
|
if autoJoin || waitingForApproval {
|
|
_, err = m.ConfirmJoiningGroup(context.Background(), chat.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if message.Message != nil {
|
|
return m.HandleChatMessage(messageState, message.Message, nil, false)
|
|
} else if message.EmojiReaction != nil {
|
|
return m.HandleEmojiReaction(messageState, message.EmojiReaction, nil)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) checkIfCreatorIsOurContact(group *v1protocol.Group) bool {
|
|
creator, err := group.Creator()
|
|
if err == nil {
|
|
contact, _ := m.allContacts.Load(creator)
|
|
return contact != nil && contact.mutual()
|
|
}
|
|
m.logger.Warn("failed to get creator from group", zap.String("group name", group.Name()), zap.String("group chat id", group.ChatID()), zap.Error(err))
|
|
return false
|
|
}
|
|
|
|
func (m *Messenger) createMessageNotification(chat *Chat, messageState *ReceivedMessageState, message *common.Message) {
|
|
|
|
var notificationType ActivityCenterType
|
|
if chat.OneToOne() {
|
|
notificationType = ActivityCenterNotificationTypeNewOneToOne
|
|
} else {
|
|
notificationType = ActivityCenterNotificationTypeNewPrivateGroupChat
|
|
}
|
|
notification := &ActivityCenterNotification{
|
|
ID: types.FromHex(chat.ID),
|
|
Name: chat.Name,
|
|
LastMessage: message,
|
|
Type: notificationType,
|
|
Author: messageState.CurrentMessageState.Contact.ID,
|
|
Timestamp: messageState.CurrentMessageState.WhisperTimestamp,
|
|
ChatID: chat.ID,
|
|
CommunityID: chat.CommunityID,
|
|
UpdatedAt: m.GetCurrentTimeInMillis(),
|
|
}
|
|
|
|
err := m.addActivityCenterNotification(messageState.Response, notification, nil)
|
|
if err != nil {
|
|
m.logger.Warn("failed to create activity center notification", zap.Error(err))
|
|
}
|
|
}
|
|
|
|
func (m *Messenger) PendingNotificationContactRequest(contactID string) (*ActivityCenterNotification, error) {
|
|
return m.persistence.ActiveContactRequestNotification(contactID)
|
|
}
|
|
|
|
func (m *Messenger) createContactRequestForContactUpdate(contact *Contact, messageState *ReceivedMessageState) (*common.Message, error) {
|
|
|
|
contactRequest, err := m.generateContactRequest(
|
|
contact.ContactRequestRemoteClock,
|
|
messageState.CurrentMessageState.WhisperTimestamp,
|
|
contact,
|
|
defaultContactRequestText(),
|
|
false,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
contactRequest.ID = defaultContactRequestID(contact.ID)
|
|
|
|
// save this message
|
|
messageState.Response.AddMessage(contactRequest)
|
|
err = m.persistence.SaveMessages([]*common.Message{contactRequest})
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return contactRequest, nil
|
|
}
|
|
|
|
func (m *Messenger) createIncomingContactRequestNotification(contact *Contact, messageState *ReceivedMessageState, contactRequest *common.Message, createNewNotification bool) error {
|
|
if contactRequest.ContactRequestState == common.ContactRequestStateAccepted {
|
|
// Pull one from the db if there
|
|
notification, err := m.persistence.GetActivityCenterNotificationByID(types.FromHex(contactRequest.ID))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if notification != nil {
|
|
notification.Name = contact.PrimaryName()
|
|
notification.Message = contactRequest
|
|
notification.Read = true
|
|
notification.Accepted = true
|
|
notification.Dismissed = false
|
|
notification.UpdatedAt = m.GetCurrentTimeInMillis()
|
|
_, err = m.persistence.SaveActivityCenterNotification(notification, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
messageState.Response.AddMessage(contactRequest)
|
|
messageState.Response.AddActivityCenterNotification(notification)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if !createNewNotification {
|
|
return nil
|
|
}
|
|
|
|
notification := &ActivityCenterNotification{
|
|
ID: types.FromHex(contactRequest.ID),
|
|
Name: contact.PrimaryName(),
|
|
Message: contactRequest,
|
|
Type: ActivityCenterNotificationTypeContactRequest,
|
|
Author: contactRequest.From,
|
|
Timestamp: contactRequest.WhisperTimestamp,
|
|
ChatID: contact.ID,
|
|
Read: contactRequest.ContactRequestState == common.ContactRequestStateAccepted || contactRequest.ContactRequestState == common.ContactRequestStateDismissed,
|
|
Accepted: contactRequest.ContactRequestState == common.ContactRequestStateAccepted,
|
|
Dismissed: contactRequest.ContactRequestState == common.ContactRequestStateDismissed,
|
|
UpdatedAt: m.GetCurrentTimeInMillis(),
|
|
}
|
|
|
|
return m.addActivityCenterNotification(messageState.Response, notification, nil)
|
|
}
|
|
|
|
func (m *Messenger) handleCommandMessage(state *ReceivedMessageState, message *common.Message) error {
|
|
message.ID = state.CurrentMessageState.MessageID
|
|
message.From = state.CurrentMessageState.Contact.ID
|
|
message.Alias = state.CurrentMessageState.Contact.Alias
|
|
message.SigPubKey = state.CurrentMessageState.PublicKey
|
|
message.Identicon = state.CurrentMessageState.Contact.Identicon
|
|
message.WhisperTimestamp = state.CurrentMessageState.WhisperTimestamp
|
|
|
|
if err := message.PrepareContent(common.PubkeyToHex(&m.identity.PublicKey)); err != nil {
|
|
return fmt.Errorf("failed to prepare content: %v", err)
|
|
}
|
|
chat, err := m.matchChatEntity(message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !allowed {
|
|
return ErrMessageNotAllowed
|
|
}
|
|
|
|
// If deleted-at is greater, ignore message
|
|
if chat.DeletedAtClockValue >= message.Clock {
|
|
return nil
|
|
}
|
|
|
|
// Set the LocalChatID for the message
|
|
message.LocalChatID = chat.ID
|
|
|
|
if c, ok := state.AllChats.Load(chat.ID); ok {
|
|
chat = c
|
|
}
|
|
|
|
// Set the LocalChatID for the message
|
|
message.LocalChatID = chat.ID
|
|
|
|
// Increase unviewed count
|
|
if !common.IsPubKeyEqual(message.SigPubKey, &m.identity.PublicKey) {
|
|
m.updateUnviewedCounts(chat, message)
|
|
message.OutgoingStatus = ""
|
|
} else {
|
|
// Our own message, mark as sent
|
|
message.OutgoingStatus = common.OutgoingStatusSent
|
|
}
|
|
|
|
err = chat.UpdateFromMessage(message, state.Timesource)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !chat.Active {
|
|
m.createMessageNotification(chat, state, chat.LastMessage)
|
|
}
|
|
|
|
// Add to response
|
|
state.Response.AddChat(chat)
|
|
if message != nil {
|
|
message.New = true
|
|
state.Response.AddMessage(message)
|
|
}
|
|
|
|
// Set in the modified maps chat
|
|
state.AllChats.Store(chat.ID, chat)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) syncContactRequestForInstallationContact(contact *Contact, state *ReceivedMessageState, chat *Chat, outgoing bool) error {
|
|
|
|
if chat == nil {
|
|
return fmt.Errorf("no chat restored during the contact synchronisation, contact.ID = %s", contact.ID)
|
|
}
|
|
|
|
contactRequestID, err := m.persistence.LatestPendingContactRequestIDForContact(contact.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if contactRequestID != "" {
|
|
m.logger.Warn("syncContactRequestForInstallationContact: skipping as contact request found", zap.String("contactRequestID", contactRequestID))
|
|
return nil
|
|
}
|
|
|
|
clock, timestamp := chat.NextClockAndTimestamp(m.transport)
|
|
contactRequest, err := m.generateContactRequest(clock, timestamp, contact, defaultContactRequestText(), outgoing)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
contactRequest.ID = defaultContactRequestID(contact.ID)
|
|
|
|
state.Response.AddMessage(contactRequest)
|
|
err = m.persistence.SaveMessages([]*common.Message{contactRequest})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if outgoing {
|
|
notification := m.generateOutgoingContactRequestNotification(contact, contactRequest)
|
|
err = m.addActivityCenterNotification(state.Response, notification, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
err = m.createIncomingContactRequestNotification(contact, state, contactRequest, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncInstallationAccount(state *ReceivedMessageState, message *protobuf.SyncInstallationAccount, statusMessage *v1protocol.StatusMessage) error {
|
|
// Noop
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) handleSyncChats(messageState *ReceivedMessageState, chats []*protobuf.SyncChat) error {
|
|
for _, syncChat := range chats {
|
|
oldChat, ok := m.allChats.Load(syncChat.Id)
|
|
clock := int64(syncChat.Clock)
|
|
if ok && oldChat.Timestamp > clock {
|
|
// We already know this chat and its timestamp is newer than the syncChat
|
|
continue
|
|
}
|
|
chat := &Chat{
|
|
ID: syncChat.Id,
|
|
Name: syncChat.Name,
|
|
Timestamp: clock,
|
|
ReadMessagesAtClockValue: 0,
|
|
Active: syncChat.Active,
|
|
Muted: syncChat.Muted,
|
|
Joined: clock,
|
|
ChatType: ChatType(syncChat.ChatType),
|
|
Highlight: false,
|
|
}
|
|
if chat.PrivateGroupChat() {
|
|
chat.MembershipUpdates = make([]v1protocol.MembershipUpdateEvent, len(syncChat.MembershipUpdateEvents))
|
|
for i, membershipUpdate := range syncChat.MembershipUpdateEvents {
|
|
chat.MembershipUpdates[i] = v1protocol.MembershipUpdateEvent{
|
|
ClockValue: membershipUpdate.Clock,
|
|
Type: protobuf.MembershipUpdateEvent_EventType(membershipUpdate.Type),
|
|
Members: membershipUpdate.Members,
|
|
Name: membershipUpdate.Name,
|
|
Signature: membershipUpdate.Signature,
|
|
ChatID: membershipUpdate.ChatId,
|
|
From: membershipUpdate.From,
|
|
RawPayload: membershipUpdate.RawPayload,
|
|
Color: membershipUpdate.Color,
|
|
Image: membershipUpdate.Image,
|
|
}
|
|
}
|
|
group, err := newProtocolGroupFromChat(chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
chat.updateChatFromGroupMembershipChanges(group)
|
|
}
|
|
|
|
err := m.saveChat(chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
messageState.Response.AddChat(chat)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncInstallationContactV2(state *ReceivedMessageState, message *protobuf.SyncInstallationContactV2, statusMessage *v1protocol.StatusMessage) error {
|
|
// Ignore own contact installation
|
|
|
|
if message.Id == m.myHexIdentity() {
|
|
m.logger.Warn("HandleSyncInstallationContactV2: skipping own contact")
|
|
return nil
|
|
}
|
|
|
|
removed := message.Removed && !message.Blocked
|
|
chat, ok := state.AllChats.Load(message.Id)
|
|
if !ok && (message.Added || message.HasAddedUs || message.Muted) && !removed {
|
|
pubKey, err := common.HexToPubkey(message.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
chat = OneToOneFromPublicKey(pubKey, state.Timesource)
|
|
// We don't want to show the chat to the user
|
|
chat.Active = false
|
|
}
|
|
|
|
contact, contactFound := state.AllContacts.Load(message.Id)
|
|
if !contactFound {
|
|
if message.Removed && !message.Blocked {
|
|
// Nothing to do in case if contact doesn't exist
|
|
return nil
|
|
}
|
|
|
|
var err error
|
|
contact, err = buildContactFromPkString(message.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if message.ContactRequestRemoteClock != 0 || message.ContactRequestLocalClock != 0 {
|
|
// Some local action about contact requests were performed,
|
|
// process them
|
|
contact.ProcessSyncContactRequestState(
|
|
ContactRequestState(message.ContactRequestRemoteState),
|
|
uint64(message.ContactRequestRemoteClock),
|
|
ContactRequestState(message.ContactRequestLocalState),
|
|
uint64(message.ContactRequestLocalClock))
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
|
|
err := m.syncContactRequestForInstallationContact(contact, state, chat, contact.ContactRequestLocalState == ContactRequestStateSent)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else if message.Added || message.HasAddedUs {
|
|
// NOTE(cammellos): this is for handling backward compatibility, old clients
|
|
// won't propagate ContactRequestRemoteClock or ContactRequestLocalClock
|
|
|
|
if message.Added && contact.LastUpdatedLocally < message.LastUpdatedLocally {
|
|
contact.ContactRequestSent(message.LastUpdatedLocally)
|
|
|
|
err := m.syncContactRequestForInstallationContact(contact, state, chat, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if message.HasAddedUs && contact.LastUpdated < message.LastUpdated {
|
|
contact.ContactRequestReceived(message.LastUpdated)
|
|
|
|
err := m.syncContactRequestForInstallationContact(contact, state, chat, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if message.Removed && contact.LastUpdatedLocally < message.LastUpdatedLocally {
|
|
err := m.removeContact(context.Background(), state.Response, contact.ID, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
// Sync last updated field
|
|
// We don't set `LastUpdated`, since that would cause some issues
|
|
// as `LastUpdated` tracks both display name & picture.
|
|
// The case where it would break is as follow:
|
|
// 1) User A pairs A1 with device A2.
|
|
// 2) User B publishes display name and picture with LastUpdated = 3.
|
|
// 3) Device A1 receives message from step 2.
|
|
// 4) Device A1 syncs with A2 (which has not received message from step 3).
|
|
// 5) Device A2 saves Display name and sets LastUpdated = 3,
|
|
// note that picture has not been set as it's not synced.
|
|
// 6) Device A2 receives the message from 2. because LastUpdated is 3
|
|
// it will be discarded, A2 will not have B's picture.
|
|
// The correct solution is to either sync profile image (expensive)
|
|
// or split the clock for image/display name, so they can be synced
|
|
// independently.
|
|
if !contactFound || (contact.LastUpdated < message.LastUpdated) {
|
|
if message.DisplayName != "" {
|
|
contact.DisplayName = message.DisplayName
|
|
}
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
|
|
if contact.LastUpdatedLocally < message.LastUpdatedLocally {
|
|
// NOTE(cammellos): probably is cleaner to pass a flag
|
|
// to method to tell them not to sync, or factor out in different
|
|
// methods
|
|
contact.IsSyncing = true
|
|
defer func() {
|
|
contact.IsSyncing = false
|
|
}()
|
|
|
|
if message.EnsName != "" && contact.EnsName != message.EnsName {
|
|
contact.EnsName = message.EnsName
|
|
publicKey, err := contact.PublicKey()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.ENSVerified(common.PubkeyToHex(publicKey), message.EnsName)
|
|
if err != nil {
|
|
contact.ENSVerified = false
|
|
}
|
|
contact.ENSVerified = true
|
|
}
|
|
contact.LastUpdatedLocally = message.LastUpdatedLocally
|
|
contact.LocalNickname = message.LocalNickname
|
|
contact.TrustStatus = verification.TrustStatus(message.TrustStatus)
|
|
contact.VerificationStatus = VerificationStatus(message.VerificationStatus)
|
|
|
|
_, err := m.verificationDatabase.UpsertTrustStatus(contact.ID, contact.TrustStatus, message.LastUpdatedLocally)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if message.Blocked != contact.Blocked {
|
|
if message.Blocked {
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
response, err := m.BlockContact(context.TODO(), contact.ID, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = state.Response.Merge(response)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
contact.Unblock(message.LastUpdatedLocally)
|
|
}
|
|
}
|
|
if chat != nil && message.Muted != chat.Muted {
|
|
if message.Muted {
|
|
_, err := m.muteChat(chat, contact, time.Time{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
err := m.unmuteChat(chat, contact)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
state.Response.AddChat(chat)
|
|
}
|
|
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
|
|
if chat != nil {
|
|
state.AllChats.Store(chat.ID, chat)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncProfilePictures(state *ReceivedMessageState, message *protobuf.SyncProfilePictures, statusMessage *v1protocol.StatusMessage) error {
|
|
dbImages, err := m.multiAccounts.GetIdentityImages(message.KeyUid)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
dbImageMap := make(map[string]*images.IdentityImage)
|
|
for _, img := range dbImages {
|
|
dbImageMap[img.Name] = img
|
|
}
|
|
idImages := make([]images.IdentityImage, len(message.Pictures))
|
|
i := 0
|
|
for _, message := range message.Pictures {
|
|
dbImg := dbImageMap[message.Name]
|
|
if dbImg != nil && message.Clock <= dbImg.Clock {
|
|
continue
|
|
}
|
|
image := images.IdentityImage{
|
|
Name: message.Name,
|
|
Payload: message.Payload,
|
|
Width: int(message.Width),
|
|
Height: int(message.Height),
|
|
FileSize: int(message.FileSize),
|
|
ResizeTarget: int(message.ResizeTarget),
|
|
Clock: message.Clock,
|
|
}
|
|
idImages[i] = image
|
|
i++
|
|
}
|
|
|
|
if i == 0 {
|
|
return nil
|
|
}
|
|
|
|
err = m.multiAccounts.StoreIdentityImages(message.KeyUid, idImages[:i], false)
|
|
if err == nil {
|
|
state.Response.IdentityImages = idImages[:i]
|
|
}
|
|
return err
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncChat(state *ReceivedMessageState, message *protobuf.SyncChat, statusMessage *v1protocol.StatusMessage) error {
|
|
chatID := message.Id
|
|
existingChat, ok := state.AllChats.Load(chatID)
|
|
if ok && (existingChat.Active || uint32(message.GetClock()/1000) < existingChat.SyncedTo) {
|
|
return nil
|
|
}
|
|
|
|
chat := existingChat
|
|
if !ok {
|
|
chats := make([]*protobuf.SyncChat, 1)
|
|
chats[0] = message
|
|
return m.handleSyncChats(state, chats)
|
|
}
|
|
existingChat.Joined = int64(message.Clock)
|
|
state.AllChats.Store(chat.ID, chat)
|
|
|
|
state.Response.AddChat(chat)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncChatRemoved(state *ReceivedMessageState, message *protobuf.SyncChatRemoved, statusMessage *v1protocol.StatusMessage) error {
|
|
chat, ok := m.allChats.Load(message.Id)
|
|
if !ok {
|
|
return ErrChatNotFound
|
|
}
|
|
|
|
if chat.Joined > int64(message.Clock) {
|
|
return nil
|
|
}
|
|
|
|
if chat.DeletedAtClockValue > message.Clock {
|
|
return nil
|
|
}
|
|
|
|
if chat.PrivateGroupChat() {
|
|
_, err := m.leaveGroupChat(context.Background(), state.Response, message.Id, true, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
response, err := m.deactivateChat(message.Id, message.Clock, false, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return state.Response.Merge(response)
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncChatMessagesRead(state *ReceivedMessageState, message *protobuf.SyncChatMessagesRead, statusMessage *v1protocol.StatusMessage) error {
|
|
chat, ok := m.allChats.Load(message.Id)
|
|
if !ok {
|
|
return ErrChatNotFound
|
|
}
|
|
|
|
if chat.ReadMessagesAtClockValue > message.Clock {
|
|
return nil
|
|
}
|
|
|
|
err := m.markAllRead(message.Id, message.Clock, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.Response.AddChat(chat)
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) handlePinMessage(pinner *Contact, whisperTimestamp uint64, response *MessengerResponse, message *protobuf.PinMessage, forceSeen bool) error {
|
|
logger := m.logger.With(zap.String("site", "HandlePinMessage"))
|
|
|
|
logger.Info("Handling pin message")
|
|
|
|
publicKey, err := pinner.PublicKey()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
pinMessage := &common.PinMessage{
|
|
PinMessage: message,
|
|
// MessageID: message.MessageId,
|
|
WhisperTimestamp: whisperTimestamp,
|
|
From: pinner.ID,
|
|
SigPubKey: publicKey,
|
|
Identicon: pinner.Identicon,
|
|
Alias: pinner.Alias,
|
|
}
|
|
|
|
chat, err := m.matchChatEntity(pinMessage)
|
|
if err != nil {
|
|
return err // matchChatEntity returns a descriptive error message
|
|
}
|
|
|
|
pinMessage.ID, err = generatePinMessageID(&m.identity.PublicKey, pinMessage, chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If deleted-at is greater, ignore message
|
|
if chat.DeletedAtClockValue >= pinMessage.Clock {
|
|
return nil
|
|
}
|
|
|
|
if c, ok := m.allChats.Load(chat.ID); ok {
|
|
chat = c
|
|
}
|
|
|
|
// Set the LocalChatID for the message
|
|
pinMessage.LocalChatID = chat.ID
|
|
|
|
inserted, err := m.persistence.SavePinMessage(pinMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Nothing to do, returning
|
|
if !inserted {
|
|
m.logger.Info("pin message already processed")
|
|
return nil
|
|
}
|
|
|
|
if message.Pinned {
|
|
id, err := generatePinMessageNotificationID(&m.identity.PublicKey, pinMessage, chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
systemMessage := &common.Message{
|
|
ChatMessage: &protobuf.ChatMessage{
|
|
Clock: message.Clock,
|
|
Timestamp: whisperTimestamp,
|
|
ChatId: chat.ID,
|
|
MessageType: message.MessageType,
|
|
ResponseTo: message.MessageId,
|
|
ContentType: protobuf.ChatMessage_SYSTEM_MESSAGE_PINNED_MESSAGE,
|
|
},
|
|
WhisperTimestamp: whisperTimestamp,
|
|
ID: id,
|
|
LocalChatID: chat.ID,
|
|
From: pinner.ID,
|
|
}
|
|
|
|
if forceSeen {
|
|
systemMessage.Seen = true
|
|
}
|
|
|
|
response.AddMessage(systemMessage)
|
|
chat.UnviewedMessagesCount++
|
|
}
|
|
|
|
if chat.LastClockValue < message.Clock {
|
|
chat.LastClockValue = message.Clock
|
|
}
|
|
|
|
response.AddPinMessage(pinMessage)
|
|
|
|
// Set in the modified maps chat
|
|
response.AddChat(chat)
|
|
m.allChats.Store(chat.ID, chat)
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandlePinMessage(state *ReceivedMessageState, message *protobuf.PinMessage, statusMessage *v1protocol.StatusMessage, fromArchive bool) error {
|
|
return m.handlePinMessage(state.CurrentMessageState.Contact, state.CurrentMessageState.WhisperTimestamp, state.Response, message, fromArchive)
|
|
}
|
|
|
|
func (m *Messenger) handleAcceptContactRequest(
|
|
response *MessengerResponse,
|
|
contact *Contact,
|
|
originalRequest *common.Message,
|
|
clock uint64) (ContactRequestProcessingResponse, error) {
|
|
|
|
m.logger.Debug("received contact request", zap.Uint64("clock-sent", clock), zap.Uint64("current-clock", contact.ContactRequestRemoteClock), zap.Uint64("current-state", uint64(contact.ContactRequestRemoteState)))
|
|
if contact.ContactRequestRemoteClock > clock {
|
|
m.logger.Debug("not handling accept since clock lower")
|
|
return ContactRequestProcessingResponse{}, nil
|
|
}
|
|
|
|
// The contact request accepted wasn't found, a reason for this might
|
|
// be that we sent a legacy contact request/contact-update, or another
|
|
// device has sent it, and we haven't synchronized it
|
|
if originalRequest == nil {
|
|
return contact.ContactRequestAccepted(clock), nil
|
|
}
|
|
|
|
if originalRequest.LocalChatID != contact.ID {
|
|
return ContactRequestProcessingResponse{}, errors.New("can't accept contact request not sent to user")
|
|
}
|
|
|
|
contact.ContactRequestAccepted(clock)
|
|
|
|
originalRequest.ContactRequestState = common.ContactRequestStateAccepted
|
|
|
|
err := m.persistence.SetContactRequestState(originalRequest.ID, originalRequest.ContactRequestState)
|
|
if err != nil {
|
|
return ContactRequestProcessingResponse{}, err
|
|
}
|
|
|
|
response.AddMessage(originalRequest)
|
|
return ContactRequestProcessingResponse{}, nil
|
|
}
|
|
|
|
func (m *Messenger) handleAcceptContactRequestMessage(state *ReceivedMessageState, clock uint64, contactRequestID string, isOutgoing bool) error {
|
|
request, err := m.persistence.MessageByID(contactRequestID)
|
|
if err != nil && err != common.ErrRecordNotFound {
|
|
return err
|
|
}
|
|
|
|
contact := state.CurrentMessageState.Contact
|
|
|
|
processingResponse, err := m.handleAcceptContactRequest(state.Response, contact, request, clock)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// If the state has changed from non-mutual contact, to mutual contact
|
|
// we want to notify the user
|
|
if contact.mutual() {
|
|
// We set the chat as active, this is currently the expected behavior
|
|
// for mobile, it might change as we implement further the activity
|
|
// center
|
|
chat, _, err := m.getOneToOneAndNextClock(contact)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if chat.LastClockValue < clock {
|
|
chat.LastClockValue = clock
|
|
}
|
|
|
|
// NOTE(cammellos): This will re-enable the chat if it was deleted, and only
|
|
// after we became contact, currently seems safe, but that needs
|
|
// discussing with UX.
|
|
if chat.DeletedAtClockValue < clock {
|
|
chat.Active = true
|
|
}
|
|
|
|
// Add mutual state update message for incoming contact request
|
|
clock, timestamp := chat.NextClockAndTimestamp(m.transport)
|
|
|
|
updateMessage, err := m.prepareMutualStateUpdateMessage(contact.ID, MutualStateUpdateTypeAdded, clock, timestamp, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
m.prepareMessage(updateMessage, m.httpServer)
|
|
err = m.persistence.SaveMessages([]*common.Message{updateMessage})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
state.Response.AddMessage(updateMessage)
|
|
|
|
err = chat.UpdateFromMessage(updateMessage, m.getTimesource())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
chat.UnviewedMessagesCount++
|
|
state.Response.AddChat(chat)
|
|
state.AllChats.Store(chat.ID, chat)
|
|
}
|
|
|
|
if request != nil {
|
|
if isOutgoing {
|
|
notification := m.generateOutgoingContactRequestNotification(contact, request)
|
|
err = m.addActivityCenterNotification(state.Response, notification, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
err = m.createIncomingContactRequestNotification(contact, state, request, processingResponse.newContactRequestReceived)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// With devices 1 and 2 paired, and userA logged in on both, while userB is on device 3:
|
|
// When userA on device 1 sends a contact request to userB, userB accepts it on device 3.
|
|
// The confirmation is sent to devices 1 and 2.
|
|
// However, the contactRequestID in `AcceptContactRequestMessage` uses keccak256(...) instead of defaultContactRequestID(contact.ID).
|
|
// Device 1 processes this, but device 2 doesn't due to an error `ErrRecordNotFound` from `m.persistence.MessageByID(contactRequestID)`.
|
|
// The correct notification ID on device 2 should be defaultContactRequestID(contact.ID).
|
|
// Thus, we must sync the accepted decision to device 2.
|
|
err = m.syncActivityCenterAcceptedByIDs(context.TODO(), []types.HexBytes{types.FromHex(defaultContactRequestID(contact.ID))}, m.GetCurrentTimeInMillis())
|
|
if err != nil {
|
|
m.logger.Warn("could not sync activity center notification as accepted", zap.Error(err))
|
|
}
|
|
}
|
|
}
|
|
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleAcceptContactRequest(state *ReceivedMessageState, message *protobuf.AcceptContactRequest, statusMessage *v1protocol.StatusMessage) error {
|
|
err := m.handleAcceptContactRequestMessage(state, message.Clock, message.Id, false)
|
|
if err != nil {
|
|
m.logger.Warn("could not accept contact request", zap.Error(err))
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) handleRetractContactRequest(state *ReceivedMessageState, contact *Contact, message *protobuf.RetractContactRequest) error {
|
|
if contact.ID == m.myHexIdentity() {
|
|
m.logger.Debug("retraction coming from us, ignoring")
|
|
return nil
|
|
}
|
|
|
|
m.logger.Debug("handling retracted contact request", zap.Uint64("clock", message.Clock))
|
|
r := contact.ContactRequestRetracted(message.Clock, false)
|
|
if !r.processed {
|
|
m.logger.Debug("not handling retract since clock lower")
|
|
return nil
|
|
}
|
|
|
|
// System message for mutual state update
|
|
chat, clock, err := m.getOneToOneAndNextClock(contact)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
timestamp := m.getTimesource().GetCurrentTime()
|
|
updateMessage, err := m.prepareMutualStateUpdateMessage(contact.ID, MutualStateUpdateTypeRemoved, clock, timestamp, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
m.prepareMessage(updateMessage, m.httpServer)
|
|
err = m.persistence.SaveMessages([]*common.Message{updateMessage})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
state.Response.AddMessage(updateMessage)
|
|
|
|
err = chat.UpdateFromMessage(updateMessage, m.getTimesource())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
chat.UnviewedMessagesCount++
|
|
state.Response.AddChat(chat)
|
|
|
|
notification := &ActivityCenterNotification{
|
|
ID: types.FromHex(uuid.New().String()),
|
|
Type: ActivityCenterNotificationTypeContactRemoved,
|
|
Name: contact.PrimaryName(),
|
|
Author: contact.ID,
|
|
Timestamp: m.getTimesource().GetCurrentTime(),
|
|
ChatID: contact.ID,
|
|
Read: false,
|
|
UpdatedAt: m.GetCurrentTimeInMillis(),
|
|
}
|
|
|
|
err = m.addActivityCenterNotification(state.Response, notification, nil)
|
|
if err != nil {
|
|
m.logger.Warn("failed to create activity center notification", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
m.allContacts.Store(contact.ID, contact)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleRetractContactRequest(state *ReceivedMessageState, message *protobuf.RetractContactRequest, statusMessage *v1protocol.StatusMessage) error {
|
|
contact := state.CurrentMessageState.Contact
|
|
err := m.handleRetractContactRequest(state, contact, message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if contact.ID != m.myHexIdentity() {
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleContactUpdate(state *ReceivedMessageState, message *protobuf.ContactUpdate, statusMessage *v1protocol.StatusMessage) error {
|
|
|
|
logger := m.logger.With(zap.String("site", "HandleContactUpdate"))
|
|
if common.IsPubKeyEqual(state.CurrentMessageState.PublicKey, &m.identity.PublicKey) {
|
|
logger.Warn("coming from us, ignoring")
|
|
return nil
|
|
}
|
|
|
|
contact := state.CurrentMessageState.Contact
|
|
chat, ok := state.AllChats.Load(contact.ID)
|
|
|
|
allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !allowed {
|
|
return ErrMessageNotAllowed
|
|
}
|
|
|
|
if err = ValidateDisplayName(&message.DisplayName); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !ok {
|
|
chat = OneToOneFromPublicKey(state.CurrentMessageState.PublicKey, state.Timesource)
|
|
// We don't want to show the chat to the user
|
|
chat.Active = false
|
|
}
|
|
|
|
logger.Debug("Handling contact update")
|
|
|
|
if message.ContactRequestPropagatedState != nil {
|
|
logger.Debug("handling contact request propagated state", zap.Any("state before update", contact.ContactRequestPropagatedState()))
|
|
result := contact.ContactRequestPropagatedStateReceived(message.ContactRequestPropagatedState)
|
|
if result.sendBackState {
|
|
logger.Debug("sending back state")
|
|
// This is a bit dangerous, since it might trigger a ping-pong of contact updates
|
|
// also it should backoff/debounce
|
|
_, err = m.sendContactUpdate(context.Background(), contact.ID, "", "", "", m.dispatchMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
}
|
|
if result.newContactRequestReceived {
|
|
contactRequest, err := m.createContactRequestForContactUpdate(contact, state)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.createIncomingContactRequestNotification(contact, state, contactRequest, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
logger.Debug("handled propagated state", zap.Any("state after update", contact.ContactRequestPropagatedState()))
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
|
|
if contact.LastUpdated < message.Clock {
|
|
if contact.EnsName != message.EnsName {
|
|
contact.EnsName = message.EnsName
|
|
contact.ENSVerified = false
|
|
}
|
|
|
|
if len(message.DisplayName) != 0 {
|
|
contact.DisplayName = message.DisplayName
|
|
}
|
|
|
|
r := contact.ContactRequestReceived(message.ContactRequestClock)
|
|
if r.newContactRequestReceived {
|
|
err = m.createIncomingContactRequestNotification(contact, state, nil, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
contact.LastUpdated = message.Clock
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
|
|
if chat.LastClockValue < message.Clock {
|
|
chat.LastClockValue = message.Clock
|
|
}
|
|
|
|
if contact.mutual() && chat.DeletedAtClockValue < message.Clock {
|
|
chat.Active = true
|
|
}
|
|
|
|
state.Response.AddChat(chat)
|
|
// TODO(samyoul) remove storing of an updated reference pointer?
|
|
state.AllChats.Store(chat.ID, chat)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncPairInstallation(state *ReceivedMessageState, message *protobuf.SyncPairInstallation, statusMessage *v1protocol.StatusMessage) error {
|
|
logger := m.logger.With(zap.String("site", "HandlePairInstallation"))
|
|
if err := ValidateReceivedPairInstallation(message, state.CurrentMessageState.WhisperTimestamp); err != nil {
|
|
logger.Warn("failed to validate message", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
installation, ok := state.AllInstallations.Load(message.InstallationId)
|
|
if !ok {
|
|
return errors.New("installation not found")
|
|
}
|
|
|
|
metadata := &multidevice.InstallationMetadata{
|
|
Name: message.Name,
|
|
DeviceType: message.DeviceType,
|
|
}
|
|
|
|
installation.InstallationMetadata = metadata
|
|
// TODO(samyoul) remove storing of an updated reference pointer?
|
|
state.AllInstallations.Store(message.InstallationId, installation)
|
|
state.ModifiedInstallations.Store(message.InstallationId, true)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleHistoryArchiveMagnetlinkMessage(state *ReceivedMessageState, communityPubKey *ecdsa.PublicKey, magnetlink string, clock uint64) error {
|
|
id := types.HexBytes(crypto.CompressPubkey(communityPubKey))
|
|
|
|
community, err := m.communitiesManager.GetByID(id)
|
|
if err != nil {
|
|
m.logger.Debug("Couldn't get community for community with id: ", zap.Any("id", id))
|
|
return err
|
|
}
|
|
if community == nil {
|
|
return nil
|
|
}
|
|
|
|
settings, err := m.communitiesManager.GetCommunitySettingsByID(id)
|
|
if err != nil {
|
|
m.logger.Debug("Couldn't get community settings for community with id: ", zap.Any("id", id))
|
|
return err
|
|
}
|
|
if settings == nil {
|
|
return nil
|
|
}
|
|
|
|
if m.torrentClientReady() && settings.HistoryArchiveSupportEnabled {
|
|
lastClock, err := m.communitiesManager.GetMagnetlinkMessageClock(id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
lastSeenMagnetlink, err := m.communitiesManager.GetLastSeenMagnetlink(id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// We are only interested in a community archive magnet link
|
|
// if it originates from a community that the current account is
|
|
// part of and doesn't own the private key at the same time
|
|
if !community.IsControlNode() && community.Joined() && clock >= lastClock {
|
|
if lastSeenMagnetlink == magnetlink {
|
|
m.communitiesManager.LogStdout("already processed this magnetlink")
|
|
return nil
|
|
}
|
|
|
|
m.communitiesManager.UnseedHistoryArchiveTorrent(id)
|
|
currentTask := m.communitiesManager.GetHistoryArchiveDownloadTask(id.String())
|
|
|
|
go func(currentTask *communities.HistoryArchiveDownloadTask, communityID types.HexBytes) {
|
|
|
|
// Cancel ongoing download/import task
|
|
if currentTask != nil && !currentTask.IsCancelled() {
|
|
currentTask.Cancel()
|
|
currentTask.Waiter.Wait()
|
|
}
|
|
|
|
// Create new task
|
|
task := &communities.HistoryArchiveDownloadTask{
|
|
CancelChan: make(chan struct{}),
|
|
Waiter: *new(sync.WaitGroup),
|
|
Cancelled: false,
|
|
}
|
|
|
|
m.communitiesManager.AddHistoryArchiveDownloadTask(communityID.String(), task)
|
|
|
|
// this wait groups tracks the ongoing task for a particular community
|
|
task.Waiter.Add(1)
|
|
defer task.Waiter.Done()
|
|
|
|
// this wait groups tracks all ongoing tasks across communities
|
|
m.shutdownWaitGroup.Add(1)
|
|
defer m.shutdownWaitGroup.Done()
|
|
m.downloadAndImportHistoryArchives(communityID, magnetlink, task.CancelChan)
|
|
}(currentTask, id)
|
|
|
|
return m.communitiesManager.UpdateMagnetlinkMessageClock(id, clock)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) downloadAndImportHistoryArchives(id types.HexBytes, magnetlink string, cancel chan struct{}) {
|
|
downloadTaskInfo, err := m.communitiesManager.DownloadHistoryArchivesByMagnetlink(id, magnetlink, cancel)
|
|
if err != nil {
|
|
logMsg := "failed to download history archive data"
|
|
if err == communities.ErrTorrentTimedout {
|
|
m.communitiesManager.LogStdout("torrent has timed out, trying once more...")
|
|
downloadTaskInfo, err = m.communitiesManager.DownloadHistoryArchivesByMagnetlink(id, magnetlink, cancel)
|
|
if err != nil {
|
|
m.communitiesManager.LogStdout(logMsg, zap.Error(err))
|
|
return
|
|
}
|
|
} else {
|
|
m.communitiesManager.LogStdout(logMsg, zap.Error(err))
|
|
return
|
|
}
|
|
}
|
|
|
|
if downloadTaskInfo.Cancelled {
|
|
if downloadTaskInfo.TotalDownloadedArchivesCount > 0 {
|
|
m.communitiesManager.LogStdout(fmt.Sprintf("downloaded %d of %d archives so far", downloadTaskInfo.TotalDownloadedArchivesCount, downloadTaskInfo.TotalArchivesCount))
|
|
}
|
|
return
|
|
}
|
|
|
|
err = m.communitiesManager.UpdateLastSeenMagnetlink(id, magnetlink)
|
|
if err != nil {
|
|
m.communitiesManager.LogStdout("couldn't update last seen magnetlink", zap.Error(err))
|
|
}
|
|
|
|
err = m.checkIfIMemberOfCommunity(id)
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
err = m.importHistoryArchives(id, cancel)
|
|
if err != nil {
|
|
m.communitiesManager.LogStdout("failed to import history archives", zap.Error(err))
|
|
m.config.messengerSignalsHandler.DownloadingHistoryArchivesFinished(types.EncodeHex(id))
|
|
return
|
|
}
|
|
|
|
m.config.messengerSignalsHandler.DownloadingHistoryArchivesFinished(types.EncodeHex(id))
|
|
}
|
|
|
|
func (m *Messenger) handleArchiveMessages(archiveMessages []*protobuf.WakuMessage) (*MessengerResponse, error) {
|
|
|
|
messagesToHandle := make(map[transport.Filter][]*types.Message)
|
|
|
|
for _, message := range archiveMessages {
|
|
filter := m.transport.FilterByTopic(message.Topic)
|
|
if filter != nil {
|
|
shhMessage := &types.Message{
|
|
Sig: message.Sig,
|
|
Timestamp: uint32(message.Timestamp),
|
|
Topic: types.BytesToTopic(message.Topic),
|
|
Payload: message.Payload,
|
|
Padding: message.Padding,
|
|
Hash: message.Hash,
|
|
ThirdPartyID: message.ThirdPartyId,
|
|
}
|
|
messagesToHandle[*filter] = append(messagesToHandle[*filter], shhMessage)
|
|
}
|
|
}
|
|
|
|
importedMessages := make(map[transport.Filter][]*types.Message, 0)
|
|
otherMessages := make(map[transport.Filter][]*types.Message, 0)
|
|
|
|
for filter, messages := range messagesToHandle {
|
|
for _, message := range messages {
|
|
if message.ThirdPartyID != "" {
|
|
importedMessages[filter] = append(importedMessages[filter], message)
|
|
} else {
|
|
otherMessages[filter] = append(otherMessages[filter], message)
|
|
}
|
|
}
|
|
}
|
|
|
|
err := m.handleImportedMessages(importedMessages)
|
|
if err != nil {
|
|
m.communitiesManager.LogStdout("failed to handle imported messages", zap.Error(err))
|
|
return nil, err
|
|
}
|
|
|
|
response, err := m.handleRetrievedMessages(otherMessages, false, true)
|
|
if err != nil {
|
|
m.communitiesManager.LogStdout("failed to write history archive messages to database", zap.Error(err))
|
|
return nil, err
|
|
}
|
|
|
|
return response, nil
|
|
}
|
|
|
|
func (m *Messenger) HandleCommunityCancelRequestToJoin(state *ReceivedMessageState, cancelRequestToJoinProto *protobuf.CommunityCancelRequestToJoin, statusMessage *v1protocol.StatusMessage) error {
|
|
signer := state.CurrentMessageState.PublicKey
|
|
if cancelRequestToJoinProto.CommunityId == nil {
|
|
return ErrInvalidCommunityID
|
|
}
|
|
|
|
requestToJoin, err := m.communitiesManager.HandleCommunityCancelRequestToJoin(signer, cancelRequestToJoinProto)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.Response.RequestsToJoinCommunity = append(state.Response.RequestsToJoinCommunity, requestToJoin)
|
|
|
|
// delete activity center notification
|
|
notification, err := m.persistence.GetActivityCenterNotificationByID(requestToJoin.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if notification != nil {
|
|
updatedAt := m.GetCurrentTimeInMillis()
|
|
notification.UpdatedAt = updatedAt
|
|
// we shouldn't sync deleted notification here,
|
|
// as the same user on different devices will receive the same message(CommunityCancelRequestToJoin) ?
|
|
err = m.persistence.DeleteActivityCenterNotificationByID(types.FromHex(requestToJoin.ID.String()), updatedAt)
|
|
if err != nil {
|
|
m.logger.Error("failed to delete notification from Activity Center", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
// sending signal to client to remove the activity center notification from UI
|
|
response := &MessengerResponse{}
|
|
response.AddActivityCenterNotification(notification)
|
|
|
|
signal.SendNewMessages(response)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// HandleCommunityRequestToJoin handles an community request to join
|
|
func (m *Messenger) HandleCommunityRequestToJoin(state *ReceivedMessageState, requestToJoinProto *protobuf.CommunityRequestToJoin, statusMessage *v1protocol.StatusMessage) error {
|
|
signer := state.CurrentMessageState.PublicKey
|
|
community, requestToJoin, err := m.communitiesManager.HandleCommunityRequestToJoin(signer, statusMessage.TransportLayer.Dst, requestToJoinProto)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
switch requestToJoin.State {
|
|
case communities.RequestToJoinStatePending:
|
|
contact, _ := state.AllContacts.Load(contactIDFromPublicKey(signer))
|
|
if len(requestToJoinProto.DisplayName) != 0 {
|
|
contact.DisplayName = requestToJoinProto.DisplayName
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
}
|
|
|
|
if state.Response.RequestsToJoinCommunity == nil {
|
|
state.Response.RequestsToJoinCommunity = make([]*communities.RequestToJoin, 0)
|
|
}
|
|
state.Response.RequestsToJoinCommunity = append(state.Response.RequestsToJoinCommunity, requestToJoin)
|
|
|
|
state.Response.AddNotification(NewCommunityRequestToJoinNotification(requestToJoin.ID.String(), community, contact))
|
|
|
|
// Activity Center notification, new for pending state
|
|
notification := &ActivityCenterNotification{
|
|
ID: types.FromHex(requestToJoin.ID.String()),
|
|
Type: ActivityCenterNotificationTypeCommunityMembershipRequest,
|
|
Timestamp: m.getTimesource().GetCurrentTime(),
|
|
Author: contact.ID,
|
|
CommunityID: community.IDString(),
|
|
MembershipStatus: ActivityCenterMembershipStatusPending,
|
|
Deleted: false,
|
|
UpdatedAt: m.GetCurrentTimeInMillis(),
|
|
}
|
|
err = m.addActivityCenterNotification(state.Response, notification, nil)
|
|
if err != nil {
|
|
m.logger.Error("failed to save notification", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
case communities.RequestToJoinStateDeclined:
|
|
response, err := m.declineRequestToJoinCommunity(requestToJoin)
|
|
if err == nil {
|
|
err := state.Response.Merge(response)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
return err
|
|
}
|
|
|
|
case communities.RequestToJoinStateAccepted:
|
|
response, err := m.acceptRequestToJoinCommunity(requestToJoin)
|
|
if err == nil {
|
|
err := state.Response.Merge(response) // new member has been added
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else if err == communities.ErrNoPermissionToJoin {
|
|
// only control node will end up here as it's the only one that
|
|
// performed token permission checks
|
|
response, err = m.declineRequestToJoinCommunity(requestToJoin)
|
|
if err == nil {
|
|
err := state.Response.Merge(response)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
return err
|
|
}
|
|
} else {
|
|
return err
|
|
}
|
|
|
|
case communities.RequestToJoinStateCanceled:
|
|
// cancellation is handled by separate message
|
|
fallthrough
|
|
case communities.RequestToJoinStateAwaitingAddresses:
|
|
// ownership changed request is handled only if owner kicked members and saved
|
|
// temporary RequestToJoinStateAwaitingAddresses request
|
|
fallthrough
|
|
case communities.RequestToJoinStateAcceptedPending, communities.RequestToJoinStateDeclinedPending:
|
|
// request can be marked as pending only manually
|
|
return errors.New("invalid request state")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// HandleCommunityEditSharedAddresses handles an edit a user has made to their shared addresses
|
|
func (m *Messenger) HandleCommunityEditSharedAddresses(state *ReceivedMessageState, editRevealedAddressesProto *protobuf.CommunityEditSharedAddresses, statusMessage *v1protocol.StatusMessage) error {
|
|
signer := state.CurrentMessageState.PublicKey
|
|
if editRevealedAddressesProto.CommunityId == nil {
|
|
return ErrInvalidCommunityID
|
|
}
|
|
|
|
err := m.communitiesManager.HandleCommunityEditSharedAddresses(signer, editRevealedAddressesProto)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
community, err := m.communitiesManager.GetByIDString(string(editRevealedAddressesProto.GetCommunityId()))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.Response.AddCommunity(community)
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleCommunityRequestToJoinResponse(state *ReceivedMessageState, requestToJoinResponseProto *protobuf.CommunityRequestToJoinResponse, statusMessage *v1protocol.StatusMessage) error {
|
|
signer := state.CurrentMessageState.PublicKey
|
|
if requestToJoinResponseProto.CommunityId == nil {
|
|
return ErrInvalidCommunityID
|
|
}
|
|
|
|
myCancelledRequestToJoin, err := m.MyCanceledRequestToJoinForCommunityID(requestToJoinResponseProto.CommunityId)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if myCancelledRequestToJoin != nil {
|
|
return nil
|
|
}
|
|
|
|
updatedRequest, err := m.communitiesManager.HandleCommunityRequestToJoinResponse(signer, requestToJoinResponseProto)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if updatedRequest != nil {
|
|
state.Response.RequestsToJoinCommunity = append(state.Response.RequestsToJoinCommunity, updatedRequest)
|
|
}
|
|
|
|
if requestToJoinResponseProto.Accepted {
|
|
community, err := m.communitiesManager.GetByID(requestToJoinResponseProto.CommunityId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.handleCommunityShardAndFiltersFromProto(community, shard.FromProtobuff(requestToJoinResponseProto.Shard), requestToJoinResponseProto.ProtectedTopicPrivateKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
response, err := m.JoinCommunity(context.Background(), requestToJoinResponseProto.CommunityId, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// we merge to include chats in response signal to joining a community
|
|
err = state.Response.Merge(response)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(response.Communities()) > 0 {
|
|
communitySettings := response.CommunitiesSettings()[0]
|
|
community := response.Communities()[0]
|
|
|
|
magnetlink := requestToJoinResponseProto.MagnetUri
|
|
if m.torrentClientReady() && communitySettings != nil && communitySettings.HistoryArchiveSupportEnabled && magnetlink != "" {
|
|
|
|
currentTask := m.communitiesManager.GetHistoryArchiveDownloadTask(community.IDString())
|
|
go func(currentTask *communities.HistoryArchiveDownloadTask) {
|
|
|
|
// Cancel ongoing download/import task
|
|
if currentTask != nil && !currentTask.IsCancelled() {
|
|
currentTask.Cancel()
|
|
currentTask.Waiter.Wait()
|
|
}
|
|
|
|
task := &communities.HistoryArchiveDownloadTask{
|
|
CancelChan: make(chan struct{}),
|
|
Waiter: *new(sync.WaitGroup),
|
|
Cancelled: false,
|
|
}
|
|
m.communitiesManager.AddHistoryArchiveDownloadTask(community.IDString(), task)
|
|
|
|
task.Waiter.Add(1)
|
|
defer task.Waiter.Done()
|
|
|
|
m.shutdownWaitGroup.Add(1)
|
|
defer m.shutdownWaitGroup.Done()
|
|
|
|
m.downloadAndImportHistoryArchives(community.ID(), magnetlink, task.CancelChan)
|
|
}(currentTask)
|
|
|
|
clock := requestToJoinResponseProto.Community.ArchiveMagnetlinkClock
|
|
return m.communitiesManager.UpdateMagnetlinkMessageClock(community.ID(), clock)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Activity Center notification
|
|
requestID := communities.CalculateRequestID(common.PubkeyToHex(&m.identity.PublicKey), requestToJoinResponseProto.CommunityId)
|
|
notification, err := m.persistence.GetActivityCenterNotificationByID(requestID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if notification != nil {
|
|
if requestToJoinResponseProto.Accepted {
|
|
notification.MembershipStatus = ActivityCenterMembershipStatusAccepted
|
|
notification.Read = false
|
|
notification.Deleted = false
|
|
} else {
|
|
notification.MembershipStatus = ActivityCenterMembershipStatusDeclined
|
|
}
|
|
notification.UpdatedAt = m.GetCurrentTimeInMillis()
|
|
err = m.addActivityCenterNotification(state.Response, notification, nil)
|
|
if err != nil {
|
|
m.logger.Error("failed to update notification", zap.Error(err))
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleCommunityRequestToLeave(state *ReceivedMessageState, requestToLeaveProto *protobuf.CommunityRequestToLeave, statusMessage *v1protocol.StatusMessage) error {
|
|
signer := state.CurrentMessageState.PublicKey
|
|
if requestToLeaveProto.CommunityId == nil {
|
|
return ErrInvalidCommunityID
|
|
}
|
|
|
|
err := m.communitiesManager.HandleCommunityRequestToLeave(signer, requestToLeaveProto)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
response, err := m.RemoveUserFromCommunity(requestToLeaveProto.CommunityId, common.PubkeyToHex(signer))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(response.Communities()) > 0 {
|
|
state.Response.AddCommunity(response.Communities()[0])
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) handleEditMessage(state *ReceivedMessageState, editMessage EditMessage) error {
|
|
if err := ValidateEditMessage(editMessage.EditMessage); err != nil {
|
|
return err
|
|
}
|
|
messageID := editMessage.MessageId
|
|
|
|
originalMessage, err := m.getMessageFromResponseOrDatabase(state.Response, messageID)
|
|
|
|
if err == common.ErrRecordNotFound {
|
|
return m.persistence.SaveEdit(&editMessage)
|
|
} else if err != nil {
|
|
return err
|
|
}
|
|
|
|
originalMessageMentioned := originalMessage.Mentioned
|
|
|
|
chat, ok := m.allChats.Load(originalMessage.LocalChatID)
|
|
if !ok {
|
|
return errors.New("chat not found")
|
|
}
|
|
|
|
// Check edit is valid
|
|
if originalMessage.From != editMessage.From {
|
|
return errors.New("invalid edit, not the right author")
|
|
}
|
|
|
|
// Check that edit should be applied
|
|
if originalMessage.EditedAt >= editMessage.Clock {
|
|
return m.persistence.SaveEdit(&editMessage)
|
|
}
|
|
|
|
// applyEditMessage modifies the message. Changing the variable name to make it clearer
|
|
editedMessage := originalMessage
|
|
// Update message and return it
|
|
err = m.applyEditMessage(editMessage.EditMessage, editedMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
needToSaveChat := false
|
|
if chat.LastMessage != nil && chat.LastMessage.ID == editedMessage.ID {
|
|
chat.LastMessage = editedMessage
|
|
needToSaveChat = true
|
|
}
|
|
responseTo, err := m.persistence.MessageByID(editedMessage.ResponseTo)
|
|
|
|
if err != nil && err != common.ErrRecordNotFound {
|
|
return err
|
|
}
|
|
|
|
err = state.updateExistingActivityCenterNotification(m.identity.PublicKey, m, editedMessage, responseTo)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
editedMessageHasMentions := editedMessage.Mentioned
|
|
|
|
// Messages in OneToOne chats increase the UnviewedMentionsCount whether or not they include a Mention
|
|
if !chat.OneToOne() {
|
|
if editedMessageHasMentions && !originalMessageMentioned && !editedMessage.Seen {
|
|
// Increase unviewed count when the edited message has a mention and didn't have one before
|
|
chat.UnviewedMentionsCount++
|
|
needToSaveChat = true
|
|
} else if !editedMessageHasMentions && originalMessageMentioned && !editedMessage.Seen {
|
|
// Opposite of above, the message had a mention, but no longer does, so we reduce the count
|
|
chat.UnviewedMentionsCount--
|
|
needToSaveChat = true
|
|
}
|
|
}
|
|
|
|
if needToSaveChat {
|
|
err := m.saveChat(chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
state.Response.AddMessage(editedMessage)
|
|
|
|
// pull updated messages
|
|
updatedMessages, err := m.persistence.MessagesByResponseTo(messageID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
state.Response.AddMessages(updatedMessages)
|
|
|
|
state.Response.AddChat(chat)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleEditMessage(state *ReceivedMessageState, editProto *protobuf.EditMessage, statusMessage *v1protocol.StatusMessage) error {
|
|
return m.handleEditMessage(state, EditMessage{
|
|
EditMessage: editProto,
|
|
From: state.CurrentMessageState.Contact.ID,
|
|
ID: state.CurrentMessageState.MessageID,
|
|
SigPubKey: state.CurrentMessageState.PublicKey,
|
|
})
|
|
}
|
|
|
|
func (m *Messenger) handleDeleteMessage(state *ReceivedMessageState, deleteMessage *DeleteMessage) error {
|
|
if deleteMessage == nil {
|
|
return nil
|
|
}
|
|
if err := ValidateDeleteMessage(deleteMessage.DeleteMessage); err != nil {
|
|
return err
|
|
}
|
|
|
|
messageID := deleteMessage.MessageId
|
|
// Check if it's already in the response
|
|
originalMessage := state.Response.GetMessage(messageID)
|
|
// otherwise pull from database
|
|
if originalMessage == nil {
|
|
var err error
|
|
originalMessage, err = m.persistence.MessageByID(messageID)
|
|
|
|
if err != nil && err != common.ErrRecordNotFound {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if originalMessage == nil {
|
|
return m.persistence.SaveDelete(deleteMessage)
|
|
}
|
|
|
|
chat, ok := m.allChats.Load(originalMessage.LocalChatID)
|
|
if !ok {
|
|
return errors.New("chat not found")
|
|
}
|
|
|
|
var canDeleteMessageForEveryone = false
|
|
if originalMessage.From != deleteMessage.From {
|
|
fromPublicKey, err := common.HexToPubkey(deleteMessage.From)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if chat.ChatType == ChatTypeCommunityChat {
|
|
canDeleteMessageForEveryone = m.CanDeleteMessageForEveryoneInCommunity(chat.CommunityID, fromPublicKey)
|
|
if !canDeleteMessageForEveryone {
|
|
return ErrInvalidDeletePermission
|
|
}
|
|
} else if chat.ChatType == ChatTypePrivateGroupChat {
|
|
canDeleteMessageForEveryone = m.CanDeleteMessageForEveryoneInPrivateGroupChat(chat, fromPublicKey)
|
|
if !canDeleteMessageForEveryone {
|
|
return ErrInvalidDeletePermission
|
|
}
|
|
}
|
|
|
|
// Check edit is valid
|
|
if !canDeleteMessageForEveryone {
|
|
return errors.New("invalid delete, not the right author")
|
|
}
|
|
}
|
|
|
|
messagesToDelete, err := m.getOtherMessagesInAlbum(originalMessage, originalMessage.LocalChatID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
unreadCountDecreased := false
|
|
for _, messageToDelete := range messagesToDelete {
|
|
messageToDelete.Deleted = true
|
|
messageToDelete.DeletedBy = deleteMessage.DeleteMessage.DeletedBy
|
|
err := m.persistence.SaveMessages([]*common.Message{messageToDelete})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// we shouldn't sync deleted notification here,
|
|
// as the same user on different devices will receive the same message(DeleteMessage) ?
|
|
m.logger.Debug("deleting activity center notification for message", zap.String("chatID", chat.ID), zap.String("messageID", messageToDelete.ID))
|
|
_, err = m.persistence.DeleteActivityCenterNotificationForMessage(chat.ID, messageToDelete.ID, m.GetCurrentTimeInMillis())
|
|
|
|
if err != nil {
|
|
m.logger.Warn("failed to delete notifications for deleted message", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
// Reduce chat mention count and unread count if unread
|
|
if !messageToDelete.Seen && !unreadCountDecreased {
|
|
unreadCountDecreased = true
|
|
if chat.UnviewedMessagesCount > 0 {
|
|
chat.UnviewedMessagesCount--
|
|
}
|
|
if chat.UnviewedMentionsCount > 0 && (messageToDelete.Mentioned || messageToDelete.Replied) {
|
|
chat.UnviewedMentionsCount--
|
|
}
|
|
err := m.saveChat(chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
state.Response.AddRemovedMessage(&RemovedMessage{MessageID: messageToDelete.ID, ChatID: chat.ID, DeletedBy: deleteMessage.DeleteMessage.DeletedBy})
|
|
state.Response.AddNotification(DeletedMessageNotification(messageToDelete.ID, chat))
|
|
state.Response.AddActivityCenterNotification(&ActivityCenterNotification{
|
|
ID: types.FromHex(messageToDelete.ID),
|
|
Deleted: true,
|
|
})
|
|
|
|
if chat.LastMessage != nil && chat.LastMessage.ID == messageToDelete.ID {
|
|
chat.LastMessage = messageToDelete
|
|
err = m.saveChat(chat)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
messages, err := m.persistence.LatestMessageByChatID(chat.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(messages) > 0 {
|
|
previousNotDeletedMessage := messages[0]
|
|
if previousNotDeletedMessage != nil && !previousNotDeletedMessage.Seen && chat.OneToOne() && !chat.Active {
|
|
m.createMessageNotification(chat, state, previousNotDeletedMessage)
|
|
}
|
|
}
|
|
|
|
// pull updated messages
|
|
updatedMessages, err := m.persistence.MessagesByResponseTo(messageToDelete.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
state.Response.AddMessages(updatedMessages)
|
|
}
|
|
|
|
state.Response.AddChat(chat)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleDeleteMessage(state *ReceivedMessageState, deleteProto *protobuf.DeleteMessage, statusMessage *v1protocol.StatusMessage) error {
|
|
return m.handleDeleteMessage(state, &DeleteMessage{
|
|
DeleteMessage: deleteProto,
|
|
From: state.CurrentMessageState.Contact.ID,
|
|
ID: state.CurrentMessageState.MessageID,
|
|
SigPubKey: state.CurrentMessageState.PublicKey,
|
|
})
|
|
}
|
|
|
|
func (m *Messenger) getMessageFromResponseOrDatabase(response *MessengerResponse, messageID string) (*common.Message, error) {
|
|
originalMessage := response.GetMessage(messageID)
|
|
// otherwise pull from database
|
|
if originalMessage != nil {
|
|
return originalMessage, nil
|
|
}
|
|
|
|
return m.persistence.MessageByID(messageID)
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncDeleteForMeMessage(state *ReceivedMessageState, deleteForMeMessage *protobuf.SyncDeleteForMeMessage, statusMessage *v1protocol.StatusMessage) error {
|
|
if err := ValidateDeleteForMeMessage(deleteForMeMessage); err != nil {
|
|
return err
|
|
}
|
|
|
|
messageID := deleteForMeMessage.MessageId
|
|
// Check if it's already in the response
|
|
originalMessage, err := m.getMessageFromResponseOrDatabase(state.Response, messageID)
|
|
|
|
if err == common.ErrRecordNotFound {
|
|
return m.persistence.SaveOrUpdateDeleteForMeMessage(deleteForMeMessage)
|
|
} else if err != nil {
|
|
return err
|
|
}
|
|
|
|
chat, ok := m.allChats.Load(originalMessage.LocalChatID)
|
|
if !ok {
|
|
return errors.New("chat not found")
|
|
}
|
|
|
|
messagesToDelete, err := m.getOtherMessagesInAlbum(originalMessage, originalMessage.LocalChatID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, messageToDelete := range messagesToDelete {
|
|
messageToDelete.DeletedForMe = true
|
|
|
|
err := m.persistence.SaveMessages([]*common.Message{messageToDelete})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// we shouldn't sync deleted notification here,
|
|
// as the same user on different devices will receive the same message(DeleteForMeMessage) ?
|
|
m.logger.Debug("deleting activity center notification for message", zap.String("chatID", chat.ID), zap.String("messageID", messageToDelete.ID))
|
|
_, err = m.persistence.DeleteActivityCenterNotificationForMessage(chat.ID, messageToDelete.ID, m.GetCurrentTimeInMillis())
|
|
if err != nil {
|
|
m.logger.Warn("failed to delete notifications for deleted message", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
if chat.LastMessage != nil && chat.LastMessage.ID == messageToDelete.ID {
|
|
chat.LastMessage = messageToDelete
|
|
err = m.saveChat(chat)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
}
|
|
|
|
state.Response.AddMessage(messageToDelete)
|
|
}
|
|
state.Response.AddChat(chat)
|
|
|
|
return nil
|
|
}
|
|
|
|
func handleContactRequestChatMessage(receivedMessage *common.Message, contact *Contact, outgoing bool, logger *zap.Logger) (bool, error) {
|
|
receivedMessage.ContactRequestState = common.ContactRequestStatePending
|
|
|
|
var response ContactRequestProcessingResponse
|
|
|
|
if outgoing {
|
|
response = contact.ContactRequestSent(receivedMessage.Clock)
|
|
} else {
|
|
response = contact.ContactRequestReceived(receivedMessage.Clock)
|
|
}
|
|
if !response.processed {
|
|
logger.Info("not handling contact message since clock lower")
|
|
return false, nil
|
|
|
|
}
|
|
|
|
if contact.mutual() {
|
|
receivedMessage.ContactRequestState = common.ContactRequestStateAccepted
|
|
}
|
|
|
|
return response.newContactRequestReceived, nil
|
|
}
|
|
|
|
func (m *Messenger) handleChatMessage(state *ReceivedMessageState, forceSeen bool) error {
|
|
logger := m.logger.With(zap.String("site", "handleChatMessage"))
|
|
logger.Info("state", zap.Any("state", state))
|
|
if err := ValidateReceivedChatMessage(state.CurrentMessageState.Message, state.CurrentMessageState.WhisperTimestamp); err != nil {
|
|
logger.Warn("failed to validate message", zap.Error(err))
|
|
return err
|
|
}
|
|
receivedMessage := &common.Message{
|
|
ID: state.CurrentMessageState.MessageID,
|
|
ChatMessage: state.CurrentMessageState.Message,
|
|
From: state.CurrentMessageState.Contact.ID,
|
|
Alias: state.CurrentMessageState.Contact.Alias,
|
|
SigPubKey: state.CurrentMessageState.PublicKey,
|
|
Identicon: state.CurrentMessageState.Contact.Identicon,
|
|
WhisperTimestamp: state.CurrentMessageState.WhisperTimestamp,
|
|
}
|
|
|
|
// is the message coming from us?
|
|
isSyncMessage := common.IsPubKeyEqual(receivedMessage.SigPubKey, &m.identity.PublicKey)
|
|
|
|
if forceSeen || isSyncMessage {
|
|
receivedMessage.Seen = true
|
|
}
|
|
|
|
err := receivedMessage.PrepareContent(m.myHexIdentity())
|
|
if err != nil {
|
|
return fmt.Errorf("failed to prepare message content: %v", err)
|
|
}
|
|
|
|
// If the message is a reply, we check if it's a reply to one of own own messages
|
|
if receivedMessage.ResponseTo != "" {
|
|
repliedTo, err := m.persistence.MessageByID(receivedMessage.ResponseTo)
|
|
if err != nil && (err == sql.ErrNoRows || err == common.ErrRecordNotFound) {
|
|
logger.Error("failed to get quoted message", zap.Error(err))
|
|
} else if err != nil {
|
|
return err
|
|
} else if repliedTo.From == m.myHexIdentity() {
|
|
receivedMessage.Replied = true
|
|
}
|
|
}
|
|
|
|
chat, err := m.matchChatEntity(receivedMessage)
|
|
if err != nil {
|
|
return err // matchChatEntity returns a descriptive error message
|
|
}
|
|
|
|
if chat.ReadMessagesAtClockValue >= receivedMessage.Clock {
|
|
receivedMessage.Seen = true
|
|
}
|
|
|
|
allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, chat)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !allowed {
|
|
return ErrMessageNotAllowed
|
|
}
|
|
|
|
// It looks like status-mobile created profile chats as public chats
|
|
// so for now we need to check for the presence of "@" in their chatID
|
|
if chat.Public() && !chat.ProfileUpdates() {
|
|
switch receivedMessage.ContentType {
|
|
case protobuf.ChatMessage_IMAGE:
|
|
return errors.New("images are not allowed in public chats")
|
|
case protobuf.ChatMessage_AUDIO:
|
|
return errors.New("audio messages are not allowed in public chats")
|
|
}
|
|
}
|
|
|
|
// If profile updates check if author is the same as chat profile public key
|
|
if chat.ProfileUpdates() && receivedMessage.From != chat.Profile {
|
|
return nil
|
|
}
|
|
|
|
// If deleted-at is greater, ignore message
|
|
if chat.DeletedAtClockValue >= receivedMessage.Clock {
|
|
return nil
|
|
}
|
|
|
|
// Set the LocalChatID for the message
|
|
receivedMessage.LocalChatID = chat.ID
|
|
|
|
if err := m.updateChatFirstMessageTimestamp(chat, whisperToUnixTimestamp(receivedMessage.WhisperTimestamp), state.Response); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Our own message, mark as sent
|
|
if isSyncMessage {
|
|
receivedMessage.OutgoingStatus = common.OutgoingStatusSent
|
|
} else if !receivedMessage.Seen {
|
|
// Increase unviewed count
|
|
skipUpdateUnviewedCountForAlbums := false
|
|
if receivedMessage.ContentType == protobuf.ChatMessage_IMAGE {
|
|
image := receivedMessage.GetImage()
|
|
|
|
if image != nil && image.AlbumId != "" {
|
|
// Skip unviewed counts increasing for other messages from album if we have it in memory
|
|
for _, message := range state.Response.Messages() {
|
|
if receivedMessage.ContentType == protobuf.ChatMessage_IMAGE {
|
|
img := message.GetImage()
|
|
if img != nil && img.AlbumId != "" && img.AlbumId == image.AlbumId {
|
|
skipUpdateUnviewedCountForAlbums = true
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
if !skipUpdateUnviewedCountForAlbums {
|
|
messages, err := m.persistence.AlbumMessages(chat.ID, image.AlbumId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Skip unviewed counts increasing for other messages from album if we have it in db
|
|
skipUpdateUnviewedCountForAlbums = len(messages) > 0
|
|
}
|
|
}
|
|
}
|
|
if !skipUpdateUnviewedCountForAlbums {
|
|
m.updateUnviewedCounts(chat, receivedMessage)
|
|
}
|
|
}
|
|
|
|
contact := state.CurrentMessageState.Contact
|
|
|
|
// If we receive some propagated state from someone who's not
|
|
// our paired device, we handle it
|
|
if receivedMessage.ContactRequestPropagatedState != nil && !isSyncMessage {
|
|
result := contact.ContactRequestPropagatedStateReceived(receivedMessage.ContactRequestPropagatedState)
|
|
if result.sendBackState {
|
|
_, err = m.sendContactUpdate(context.Background(), contact.ID, "", "", "", m.dispatchMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if result.newContactRequestReceived {
|
|
|
|
if contact.hasAddedUs() && !contact.mutual() {
|
|
receivedMessage.ContactRequestState = common.ContactRequestStatePending
|
|
}
|
|
|
|
// Add mutual state update message for outgoing contact request
|
|
clock := receivedMessage.Clock - 1
|
|
updateMessage, err := m.prepareMutualStateUpdateMessage(contact.ID, MutualStateUpdateTypeSent, clock, receivedMessage.Timestamp, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
m.prepareMessage(updateMessage, m.httpServer)
|
|
err = m.persistence.SaveMessages([]*common.Message{updateMessage})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
state.Response.AddMessage(updateMessage)
|
|
|
|
err = m.createIncomingContactRequestNotification(contact, state, receivedMessage, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
|
|
if receivedMessage.ContentType == protobuf.ChatMessage_CONTACT_REQUEST && chat.OneToOne() {
|
|
chatContact := contact
|
|
if isSyncMessage {
|
|
chatContact, err = m.BuildContact(&requests.BuildContact{PublicKey: chat.ID})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if chatContact.mutual() || chatContact.dismissed() {
|
|
m.logger.Info("ignoring contact request message for a mutual or dismissed contact")
|
|
return nil
|
|
}
|
|
|
|
sendNotification, err := handleContactRequestChatMessage(receivedMessage, chatContact, isSyncMessage, m.logger)
|
|
if err != nil {
|
|
m.logger.Error("failed to handle contact request message", zap.Error(err))
|
|
return err
|
|
}
|
|
state.ModifiedContacts.Store(chatContact.ID, true)
|
|
state.AllContacts.Store(chatContact.ID, chatContact)
|
|
|
|
if sendNotification {
|
|
err = m.createIncomingContactRequestNotification(chatContact, state, receivedMessage, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
} else if receivedMessage.ContentType == protobuf.ChatMessage_COMMUNITY {
|
|
chat.Highlight = true
|
|
}
|
|
|
|
if receivedMessage.ContentType == protobuf.ChatMessage_DISCORD_MESSAGE {
|
|
discordMessage := receivedMessage.GetDiscordMessage()
|
|
discordMessageAuthor := discordMessage.GetAuthor()
|
|
discordMessageAttachments := discordMessage.GetAttachments()
|
|
|
|
state.Response.AddDiscordMessage(discordMessage)
|
|
state.Response.AddDiscordMessageAuthor(discordMessageAuthor)
|
|
|
|
if len(discordMessageAttachments) > 0 {
|
|
state.Response.AddDiscordMessageAttachments(discordMessageAttachments)
|
|
}
|
|
}
|
|
|
|
err = m.checkForEdits(receivedMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.checkForDeletes(receivedMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.checkForDeleteForMes(receivedMessage)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !receivedMessage.Deleted && !receivedMessage.DeletedForMe {
|
|
err = chat.UpdateFromMessage(receivedMessage, m.getTimesource())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
// Set in the modified maps chat
|
|
state.Response.AddChat(chat)
|
|
// TODO(samyoul) remove storing of an updated reference pointer?
|
|
m.allChats.Store(chat.ID, chat)
|
|
|
|
if !isSyncMessage && receivedMessage.EnsName != "" {
|
|
oldRecord, err := m.ensVerifier.Add(contact.ID, receivedMessage.EnsName, receivedMessage.Clock)
|
|
if err != nil {
|
|
m.logger.Warn("failed to verify ENS name", zap.Error(err))
|
|
} else if oldRecord == nil {
|
|
// If oldRecord is nil, a new verification process will take place
|
|
// so we reset the record
|
|
contact.ENSVerified = false
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
}
|
|
|
|
if !isSyncMessage && contact.DisplayName != receivedMessage.DisplayName && len(receivedMessage.DisplayName) != 0 {
|
|
contact.DisplayName = receivedMessage.DisplayName
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
}
|
|
|
|
if receivedMessage.ContentType == protobuf.ChatMessage_COMMUNITY {
|
|
m.logger.Debug("Handling community content type")
|
|
|
|
signer, description, err := communities.UnwrapCommunityDescriptionMessage(receivedMessage.GetCommunity())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = m.handleCommunityDescription(state, signer, description, receivedMessage.GetCommunity(), receivedMessage.GetShard())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(description.ID) != 0 {
|
|
receivedMessage.CommunityID = description.ID
|
|
} else {
|
|
// Backward compatibility
|
|
receivedMessage.CommunityID = types.EncodeHex(crypto.CompressPubkey(signer))
|
|
}
|
|
}
|
|
|
|
receivedMessage.New = true
|
|
state.Response.AddMessage(receivedMessage)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleChatMessage(state *ReceivedMessageState, message *protobuf.ChatMessage, statusMessage *v1protocol.StatusMessage, fromArchive bool) error {
|
|
state.CurrentMessageState.Message = message
|
|
return m.handleChatMessage(state, fromArchive)
|
|
}
|
|
|
|
func (m *Messenger) HandleRequestAddressForTransaction(messageState *ReceivedMessageState, command *protobuf.RequestAddressForTransaction, statusMessage *v1protocol.StatusMessage) error {
|
|
err := ValidateReceivedRequestAddressForTransaction(command, messageState.CurrentMessageState.WhisperTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
message := &common.Message{
|
|
ChatMessage: &protobuf.ChatMessage{
|
|
Clock: command.Clock,
|
|
Timestamp: messageState.CurrentMessageState.WhisperTimestamp,
|
|
Text: "Request address for transaction",
|
|
// ChatId is only used as-is for messages sent to oneself (i.e: mostly sync) so no need to check it here
|
|
ChatId: command.GetChatId(),
|
|
MessageType: protobuf.MessageType_ONE_TO_ONE,
|
|
ContentType: protobuf.ChatMessage_TRANSACTION_COMMAND,
|
|
},
|
|
CommandParameters: &common.CommandParameters{
|
|
ID: messageState.CurrentMessageState.MessageID,
|
|
Value: command.Value,
|
|
Contract: command.Contract,
|
|
CommandState: common.CommandStateRequestAddressForTransaction,
|
|
},
|
|
}
|
|
return m.handleCommandMessage(messageState, message)
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncSetting(messageState *ReceivedMessageState, message *protobuf.SyncSetting, statusMessage *v1protocol.StatusMessage) error {
|
|
settingField, err := m.extractAndSaveSyncSetting(message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if settingField == nil {
|
|
return nil
|
|
}
|
|
|
|
switch message.GetType() {
|
|
case protobuf.SyncSetting_DISPLAY_NAME:
|
|
if newName := message.GetValueString(); newName != "" && m.account.Name != newName {
|
|
m.account.Name = newName
|
|
if err := m.multiAccounts.SaveAccount(*m.account); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
case protobuf.SyncSetting_MNEMONIC_REMOVED:
|
|
if message.GetValueBool() {
|
|
if err := m.settings.DeleteMnemonic(); err != nil {
|
|
return err
|
|
}
|
|
messageState.Response.AddSetting(&settings.SyncSettingField{SettingField: settings.Mnemonic})
|
|
}
|
|
return nil
|
|
}
|
|
messageState.Response.AddSetting(settingField)
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncAccountCustomizationColor(state *ReceivedMessageState, message *protobuf.SyncAccountCustomizationColor, statusMessage *v1protocol.StatusMessage) error {
|
|
err := m.multiAccounts.UpdateAccountCustomizationColor(message.GetKeyUid(), message.GetCustomizationColor(), message.GetUpdatedAt())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.Response.CustomizationColor = message.GetCustomizationColor()
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleRequestTransaction(messageState *ReceivedMessageState, command *protobuf.RequestTransaction, statusMessage *v1protocol.StatusMessage) error {
|
|
err := ValidateReceivedRequestTransaction(command, messageState.CurrentMessageState.WhisperTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
message := &common.Message{
|
|
ChatMessage: &protobuf.ChatMessage{
|
|
Clock: command.Clock,
|
|
Timestamp: messageState.CurrentMessageState.WhisperTimestamp,
|
|
Text: "Request transaction",
|
|
// ChatId is only used for messages sent to oneself (i.e: mostly sync) so no need to check it here
|
|
ChatId: command.GetChatId(),
|
|
MessageType: protobuf.MessageType_ONE_TO_ONE,
|
|
ContentType: protobuf.ChatMessage_TRANSACTION_COMMAND,
|
|
},
|
|
CommandParameters: &common.CommandParameters{
|
|
ID: messageState.CurrentMessageState.MessageID,
|
|
Value: command.Value,
|
|
Contract: command.Contract,
|
|
CommandState: common.CommandStateRequestTransaction,
|
|
Address: command.Address,
|
|
},
|
|
}
|
|
return m.handleCommandMessage(messageState, message)
|
|
}
|
|
|
|
func (m *Messenger) HandleAcceptRequestAddressForTransaction(messageState *ReceivedMessageState, command *protobuf.AcceptRequestAddressForTransaction, statusMessage *v1protocol.StatusMessage) error {
|
|
err := ValidateReceivedAcceptRequestAddressForTransaction(command, messageState.CurrentMessageState.WhisperTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
initialMessage, err := m.persistence.MessageByID(command.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if initialMessage == nil {
|
|
return errors.New("message not found")
|
|
}
|
|
|
|
if initialMessage.LocalChatID != messageState.CurrentMessageState.Contact.ID {
|
|
return errors.New("From must match")
|
|
}
|
|
|
|
if initialMessage.OutgoingStatus == "" {
|
|
return errors.New("Initial message must originate from us")
|
|
}
|
|
|
|
if initialMessage.CommandParameters.CommandState != common.CommandStateRequestAddressForTransaction {
|
|
return errors.New("Wrong state for command")
|
|
}
|
|
|
|
initialMessage.Clock = command.Clock
|
|
initialMessage.Timestamp = messageState.CurrentMessageState.WhisperTimestamp
|
|
initialMessage.Text = requestAddressForTransactionAcceptedMessage
|
|
initialMessage.CommandParameters.Address = command.Address
|
|
initialMessage.Seen = false
|
|
initialMessage.CommandParameters.CommandState = common.CommandStateRequestAddressForTransactionAccepted
|
|
initialMessage.ChatId = command.GetChatId()
|
|
|
|
// Hide previous message
|
|
previousMessage, err := m.persistence.MessageByCommandID(messageState.CurrentMessageState.Contact.ID, command.Id)
|
|
if err != nil && err != common.ErrRecordNotFound {
|
|
return err
|
|
}
|
|
|
|
if previousMessage != nil {
|
|
err = m.persistence.HideMessage(previousMessage.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
initialMessage.Replace = previousMessage.ID
|
|
}
|
|
|
|
return m.handleCommandMessage(messageState, initialMessage)
|
|
}
|
|
|
|
func (m *Messenger) HandleSendTransaction(messageState *ReceivedMessageState, command *protobuf.SendTransaction, statusMessage *v1protocol.StatusMessage) error {
|
|
err := ValidateReceivedSendTransaction(command, messageState.CurrentMessageState.WhisperTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
transactionToValidate := &TransactionToValidate{
|
|
MessageID: messageState.CurrentMessageState.MessageID,
|
|
CommandID: command.Id,
|
|
TransactionHash: command.TransactionHash,
|
|
FirstSeen: messageState.CurrentMessageState.WhisperTimestamp,
|
|
Signature: command.Signature,
|
|
Validate: true,
|
|
From: messageState.CurrentMessageState.PublicKey,
|
|
RetryCount: 0,
|
|
}
|
|
m.logger.Info("Saving transction to validate", zap.Any("transaction", transactionToValidate))
|
|
|
|
return m.persistence.SaveTransactionToValidate(transactionToValidate)
|
|
}
|
|
|
|
func (m *Messenger) HandleDeclineRequestAddressForTransaction(messageState *ReceivedMessageState, command *protobuf.DeclineRequestAddressForTransaction, statusMessage *v1protocol.StatusMessage) error {
|
|
err := ValidateReceivedDeclineRequestAddressForTransaction(command, messageState.CurrentMessageState.WhisperTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
oldMessage, err := m.persistence.MessageByID(command.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if oldMessage == nil {
|
|
return errors.New("message not found")
|
|
}
|
|
|
|
if oldMessage.LocalChatID != messageState.CurrentMessageState.Contact.ID {
|
|
return errors.New("From must match")
|
|
}
|
|
|
|
if oldMessage.OutgoingStatus == "" {
|
|
return errors.New("Initial message must originate from us")
|
|
}
|
|
|
|
if oldMessage.CommandParameters.CommandState != common.CommandStateRequestAddressForTransaction {
|
|
return errors.New("Wrong state for command")
|
|
}
|
|
|
|
oldMessage.Clock = command.Clock
|
|
oldMessage.Timestamp = messageState.CurrentMessageState.WhisperTimestamp
|
|
oldMessage.Text = requestAddressForTransactionDeclinedMessage
|
|
oldMessage.Seen = false
|
|
oldMessage.CommandParameters.CommandState = common.CommandStateRequestAddressForTransactionDeclined
|
|
oldMessage.ChatId = command.GetChatId()
|
|
|
|
// Hide previous message
|
|
err = m.persistence.HideMessage(command.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
oldMessage.Replace = command.Id
|
|
|
|
return m.handleCommandMessage(messageState, oldMessage)
|
|
}
|
|
|
|
func (m *Messenger) HandleDeclineRequestTransaction(messageState *ReceivedMessageState, command *protobuf.DeclineRequestTransaction, statusMessage *v1protocol.StatusMessage) error {
|
|
err := ValidateReceivedDeclineRequestTransaction(command, messageState.CurrentMessageState.WhisperTimestamp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
oldMessage, err := m.persistence.MessageByID(command.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if oldMessage == nil {
|
|
return errors.New("message not found")
|
|
}
|
|
|
|
if oldMessage.LocalChatID != messageState.CurrentMessageState.Contact.ID {
|
|
return errors.New("From must match")
|
|
}
|
|
|
|
if oldMessage.OutgoingStatus == "" {
|
|
return errors.New("Initial message must originate from us")
|
|
}
|
|
|
|
if oldMessage.CommandParameters.CommandState != common.CommandStateRequestTransaction {
|
|
return errors.New("Wrong state for command")
|
|
}
|
|
|
|
oldMessage.Clock = command.Clock
|
|
oldMessage.Timestamp = messageState.CurrentMessageState.WhisperTimestamp
|
|
oldMessage.Text = transactionRequestDeclinedMessage
|
|
oldMessage.Seen = false
|
|
oldMessage.CommandParameters.CommandState = common.CommandStateRequestTransactionDeclined
|
|
oldMessage.ChatId = command.GetChatId()
|
|
|
|
// Hide previous message
|
|
err = m.persistence.HideMessage(command.Id)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
oldMessage.Replace = command.Id
|
|
|
|
return m.handleCommandMessage(messageState, oldMessage)
|
|
}
|
|
|
|
func (m *Messenger) matchChatEntity(chatEntity common.ChatEntity) (*Chat, error) {
|
|
if chatEntity.GetSigPubKey() == nil {
|
|
m.logger.Error("public key can't be empty")
|
|
return nil, errors.New("received a chatEntity with empty public key")
|
|
}
|
|
|
|
switch {
|
|
case chatEntity.GetMessageType() == protobuf.MessageType_PUBLIC_GROUP:
|
|
// For public messages, all outgoing and incoming messages have the same chatID
|
|
// equal to a public chat name.
|
|
chatID := chatEntity.GetChatId()
|
|
chat, ok := m.allChats.Load(chatID)
|
|
if !ok {
|
|
return nil, errors.New("received a public chatEntity from non-existing chat")
|
|
}
|
|
if !chat.Public() && !chat.ProfileUpdates() && !chat.Timeline() {
|
|
return nil, ErrMessageForWrongChatType
|
|
}
|
|
return chat, nil
|
|
case chatEntity.GetMessageType() == protobuf.MessageType_ONE_TO_ONE && common.IsPubKeyEqual(chatEntity.GetSigPubKey(), &m.identity.PublicKey):
|
|
// It's a private message coming from us so we rely on Message.ChatID
|
|
// If chat does not exist, it should be created to support multidevice synchronization.
|
|
chatID := chatEntity.GetChatId()
|
|
chat, ok := m.allChats.Load(chatID)
|
|
if !ok {
|
|
if len(chatID) != PubKeyStringLength {
|
|
return nil, errors.New("invalid pubkey length")
|
|
}
|
|
bytePubKey, err := hex.DecodeString(chatID[2:])
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to decode hex chatID")
|
|
}
|
|
|
|
pubKey, err := crypto.UnmarshalPubkey(bytePubKey)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to decode pubkey")
|
|
}
|
|
|
|
chat = CreateOneToOneChat(chatID[:8], pubKey, m.getTimesource())
|
|
}
|
|
// if we are the sender, the chat must be active
|
|
chat.Active = true
|
|
return chat, nil
|
|
case chatEntity.GetMessageType() == protobuf.MessageType_ONE_TO_ONE:
|
|
// It's an incoming private chatEntity. ChatID is calculated from the signature.
|
|
// If a chat does not exist, a new one is created and saved.
|
|
chatID := contactIDFromPublicKey(chatEntity.GetSigPubKey())
|
|
chat, ok := m.allChats.Load(chatID)
|
|
if !ok {
|
|
// TODO: this should be a three-word name used in the mobile client
|
|
chat = CreateOneToOneChat(chatID[:8], chatEntity.GetSigPubKey(), m.getTimesource())
|
|
chat.Active = false
|
|
}
|
|
// We set the chat as inactive and will create a notification
|
|
// if it's not coming from a contact
|
|
contact, ok := m.allContacts.Load(chatID)
|
|
chat.Active = chat.Active || (ok && contact.added())
|
|
return chat, nil
|
|
case chatEntity.GetMessageType() == protobuf.MessageType_COMMUNITY_CHAT:
|
|
chatID := chatEntity.GetChatId()
|
|
chat, ok := m.allChats.Load(chatID)
|
|
if !ok {
|
|
return nil, errors.New("received community chat chatEntity for non-existing chat")
|
|
}
|
|
|
|
if chat.CommunityID == "" || chat.ChatType != ChatTypeCommunityChat {
|
|
return nil, errors.New("not an community chat")
|
|
}
|
|
|
|
canPost, err := m.communitiesManager.CanPost(chatEntity.GetSigPubKey(), chat.CommunityID, chat.CommunityChatID(), chatEntity.GetGrant())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if !canPost {
|
|
return nil, errors.New("user can't post in community")
|
|
}
|
|
|
|
_, isPinMessage := chatEntity.(*common.PinMessage)
|
|
if isPinMessage {
|
|
community, err := m.communitiesManager.GetByIDString(chat.CommunityID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
hasPermission := community.IsPrivilegedMember(chatEntity.GetSigPubKey())
|
|
pinMessageAllowed := community.AllowsAllMembersToPinMessage()
|
|
if !hasPermission && !pinMessageAllowed {
|
|
return nil, errors.New("user can't pin message")
|
|
}
|
|
}
|
|
|
|
return chat, nil
|
|
case chatEntity.GetMessageType() == protobuf.MessageType_PRIVATE_GROUP:
|
|
// In the case of a group chatEntity, ChatID is the same for all messages belonging to a group.
|
|
// It needs to be verified if the signature public key belongs to the chat.
|
|
chatID := chatEntity.GetChatId()
|
|
chat, ok := m.allChats.Load(chatID)
|
|
if !ok {
|
|
return nil, errors.New("received group chat chatEntity for non-existing chat")
|
|
}
|
|
|
|
senderKeyHex := contactIDFromPublicKey(chatEntity.GetSigPubKey())
|
|
myKeyHex := contactIDFromPublicKey(&m.identity.PublicKey)
|
|
senderIsMember := false
|
|
iAmMember := false
|
|
for _, member := range chat.Members {
|
|
if member.ID == senderKeyHex {
|
|
senderIsMember = true
|
|
}
|
|
if member.ID == myKeyHex {
|
|
iAmMember = true
|
|
}
|
|
}
|
|
|
|
if senderIsMember && iAmMember {
|
|
return chat, nil
|
|
}
|
|
|
|
return nil, errors.New("did not find a matching group chat")
|
|
default:
|
|
return nil, errors.New("can not match a chat because there is no valid case")
|
|
}
|
|
}
|
|
|
|
func (m *Messenger) messageExists(messageID string, existingMessagesMap map[string]bool) (bool, error) {
|
|
if _, ok := existingMessagesMap[messageID]; ok {
|
|
return true, nil
|
|
}
|
|
|
|
existingMessagesMap[messageID] = true
|
|
|
|
// Check against the database, this is probably a bit slow for
|
|
// each message, but for now might do, we'll make it faster later
|
|
existingMessage, err := m.persistence.MessageByID(messageID)
|
|
if err != nil && err != common.ErrRecordNotFound {
|
|
return false, err
|
|
}
|
|
if existingMessage != nil {
|
|
return true, nil
|
|
}
|
|
return false, nil
|
|
}
|
|
|
|
func (m *Messenger) HandleEmojiReaction(state *ReceivedMessageState, pbEmojiR *protobuf.EmojiReaction, statusMessage *v1protocol.StatusMessage) error {
|
|
logger := m.logger.With(zap.String("site", "HandleEmojiReaction"))
|
|
if err := ValidateReceivedEmojiReaction(pbEmojiR, state.Timesource.GetCurrentTime()); err != nil {
|
|
logger.Error("invalid emoji reaction", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
from := state.CurrentMessageState.Contact.ID
|
|
|
|
emojiReaction := &EmojiReaction{
|
|
EmojiReaction: pbEmojiR,
|
|
From: from,
|
|
SigPubKey: state.CurrentMessageState.PublicKey,
|
|
}
|
|
|
|
existingEmoji, err := m.persistence.EmojiReactionByID(emojiReaction.ID())
|
|
if err != common.ErrRecordNotFound && err != nil {
|
|
return err
|
|
}
|
|
|
|
if existingEmoji != nil && existingEmoji.Clock >= pbEmojiR.Clock {
|
|
// this is not a valid emoji, ignoring
|
|
return nil
|
|
}
|
|
|
|
chat, err := m.matchChatEntity(emojiReaction)
|
|
if err != nil {
|
|
return err // matchChatEntity returns a descriptive error message
|
|
}
|
|
|
|
// Set local chat id
|
|
emojiReaction.LocalChatID = chat.ID
|
|
|
|
logger.Debug("Handling emoji reaction")
|
|
|
|
if chat.LastClockValue < pbEmojiR.Clock {
|
|
chat.LastClockValue = pbEmojiR.Clock
|
|
}
|
|
|
|
state.Response.AddChat(chat)
|
|
// TODO(samyoul) remove storing of an updated reference pointer?
|
|
state.AllChats.Store(chat.ID, chat)
|
|
|
|
// save emoji reaction
|
|
err = m.persistence.SaveEmojiReaction(emojiReaction)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.EmojiReactions[emojiReaction.ID()] = emojiReaction
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleGroupChatInvitation(state *ReceivedMessageState, pbGHInvitations *protobuf.GroupChatInvitation, statusMessage *v1protocol.StatusMessage) error {
|
|
allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !allowed {
|
|
return ErrMessageNotAllowed
|
|
}
|
|
logger := m.logger.With(zap.String("site", "HandleGroupChatInvitation"))
|
|
if err := ValidateReceivedGroupChatInvitation(pbGHInvitations); err != nil {
|
|
logger.Error("invalid group chat invitation", zap.Error(err))
|
|
return err
|
|
}
|
|
|
|
groupChatInvitation := &GroupChatInvitation{
|
|
GroupChatInvitation: pbGHInvitations,
|
|
SigPubKey: state.CurrentMessageState.PublicKey,
|
|
}
|
|
|
|
//From is the PK of author of invitation request
|
|
if groupChatInvitation.State == protobuf.GroupChatInvitation_REJECTED {
|
|
//rejected so From is the current user who received this rejection
|
|
groupChatInvitation.From = types.EncodeHex(crypto.FromECDSAPub(&m.identity.PublicKey))
|
|
} else {
|
|
//invitation request, so From is the author of message
|
|
groupChatInvitation.From = state.CurrentMessageState.Contact.ID
|
|
}
|
|
|
|
existingInvitation, err := m.persistence.InvitationByID(groupChatInvitation.ID())
|
|
if err != common.ErrRecordNotFound && err != nil {
|
|
return err
|
|
}
|
|
|
|
if existingInvitation != nil && existingInvitation.Clock >= pbGHInvitations.Clock {
|
|
// this is not a valid invitation, ignoring
|
|
return nil
|
|
}
|
|
|
|
// save invitation
|
|
err = m.persistence.SaveInvitation(groupChatInvitation)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.GroupChatInvitations[groupChatInvitation.ID()] = groupChatInvitation
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleContactCodeAdvertisement(state *ReceivedMessageState, cca *protobuf.ContactCodeAdvertisement, statusMessage *v1protocol.StatusMessage) error {
|
|
if cca.ChatIdentity == nil {
|
|
return nil
|
|
}
|
|
return m.HandleChatIdentity(state, cca.ChatIdentity, nil)
|
|
}
|
|
|
|
// HandleChatIdentity handles an incoming protobuf.ChatIdentity
|
|
// extracts contact information stored in the protobuf and adds it to the user's contact for update.
|
|
func (m *Messenger) HandleChatIdentity(state *ReceivedMessageState, ci *protobuf.ChatIdentity, statusMessage *v1protocol.StatusMessage) error {
|
|
s, err := m.settings.GetSettings()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
contact := state.CurrentMessageState.Contact
|
|
viewFromContacts := s.ProfilePicturesVisibility == settings.ProfilePicturesVisibilityContactsOnly
|
|
viewFromNoOne := s.ProfilePicturesVisibility == settings.ProfilePicturesVisibilityNone
|
|
|
|
m.logger.Debug("settings found",
|
|
zap.Bool("viewFromContacts", viewFromContacts),
|
|
zap.Bool("viewFromNoOne", viewFromNoOne),
|
|
)
|
|
|
|
// If we don't want to view profile images from anyone, don't process identity images.
|
|
// We don't want to store the profile images of other users, even if we don't display images.
|
|
inOurContacts, ok := m.allContacts.Load(state.CurrentMessageState.Contact.ID)
|
|
|
|
isContact := ok && inOurContacts.added()
|
|
if viewFromNoOne && !isContact {
|
|
return nil
|
|
}
|
|
|
|
// If there are no images attached to a ChatIdentity, check if message is allowed
|
|
// Or if there are images and visibility is set to from contacts only, check if message is allowed
|
|
// otherwise process the images without checking if the message is allowed
|
|
if len(ci.Images) == 0 || (len(ci.Images) > 0 && (viewFromContacts)) {
|
|
allowed, err := m.isMessageAllowedFrom(state.CurrentMessageState.Contact.ID, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !allowed {
|
|
return ErrMessageNotAllowed
|
|
}
|
|
}
|
|
|
|
err = DecryptIdentityImagesWithIdentityPrivateKey(ci.Images, m.identity, state.CurrentMessageState.PublicKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remove any images still encrypted after the decryption process
|
|
for name, image := range ci.Images {
|
|
if image.Encrypted {
|
|
delete(ci.Images, name)
|
|
}
|
|
}
|
|
|
|
clockChanged, imagesChanged, err := m.persistence.SaveContactChatIdentity(contact.ID, ci)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
contactModified := false
|
|
|
|
if imagesChanged {
|
|
for imageType, image := range ci.Images {
|
|
if contact.Images == nil {
|
|
contact.Images = make(map[string]images.IdentityImage)
|
|
}
|
|
contact.Images[imageType] = images.IdentityImage{Name: imageType, Payload: image.Payload, Clock: ci.Clock}
|
|
|
|
}
|
|
if err = m.updateContactImagesURL(contact); err != nil {
|
|
return err
|
|
}
|
|
|
|
contactModified = true
|
|
}
|
|
|
|
if clockChanged {
|
|
if err = ValidateDisplayName(&ci.DisplayName); err != nil {
|
|
return err
|
|
}
|
|
|
|
if contact.DisplayName != ci.DisplayName && len(ci.DisplayName) != 0 {
|
|
contact.DisplayName = ci.DisplayName
|
|
contactModified = true
|
|
}
|
|
|
|
if err = ValidateBio(&ci.Description); err != nil {
|
|
return err
|
|
}
|
|
|
|
if contact.Bio != ci.Description {
|
|
contact.Bio = ci.Description
|
|
contactModified = true
|
|
}
|
|
|
|
socialLinks := identity.NewSocialLinks(ci.SocialLinks)
|
|
if err = ValidateSocialLinks(socialLinks); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !contact.SocialLinks.Equal(socialLinks) {
|
|
contact.SocialLinks = socialLinks
|
|
contactModified = true
|
|
}
|
|
|
|
if ci.ProfileShowcase != nil {
|
|
err := m.BuildProfileShowcaseFromIdentity(state, ci.ProfileShowcase)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
if contactModified {
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
state.AllContacts.Store(contact.ID, contact)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleAnonymousMetricBatch(state *ReceivedMessageState, amb *protobuf.AnonymousMetricBatch, statusMessage *v1protocol.StatusMessage) error {
|
|
|
|
// TODO
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) checkForEdits(message *common.Message) error {
|
|
// Check for any pending edit
|
|
// If any pending edits are available and valid, apply them
|
|
edits, err := m.persistence.GetEdits(message.ID, message.From)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(edits) == 0 {
|
|
return nil
|
|
}
|
|
|
|
// Apply the first edit that is valid
|
|
for _, e := range edits {
|
|
if e.Clock >= message.Clock {
|
|
// Update message and return it
|
|
err := m.applyEditMessage(e.EditMessage, message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) getMessagesToCheckForDelete(message *common.Message) ([]*common.Message, error) {
|
|
var messagesToCheck []*common.Message
|
|
if message.ContentType == protobuf.ChatMessage_IMAGE {
|
|
image := message.GetImage()
|
|
if image != nil && image.AlbumId != "" {
|
|
messagesInTheAlbum, err := m.persistence.albumMessages(message.ChatId, image.GetAlbumId())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
messagesToCheck = append(messagesToCheck, messagesInTheAlbum...)
|
|
}
|
|
}
|
|
messagesToCheck = append(messagesToCheck, message)
|
|
return messagesToCheck, nil
|
|
}
|
|
|
|
func (m *Messenger) checkForDeletes(message *common.Message) error {
|
|
// Get all messages part of the album
|
|
messagesToCheck, err := m.getMessagesToCheckForDelete(message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var messageDeletes []*DeleteMessage
|
|
applyDelete := false
|
|
// Loop all messages part of the album, if one of them is marked as deleted, we delete them all
|
|
for _, messageToCheck := range messagesToCheck {
|
|
// Check for any pending deletes
|
|
// If any pending deletes are available and valid, apply them
|
|
messageDeletes, err = m.persistence.GetDeletes(messageToCheck.ID, messageToCheck.From)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(messageDeletes) == 0 {
|
|
continue
|
|
}
|
|
// Once one messageDelete has been found, we apply it to all the images in the album
|
|
applyDelete = true
|
|
break
|
|
}
|
|
if applyDelete {
|
|
for _, messageToCheck := range messagesToCheck {
|
|
err := m.applyDeleteMessage(messageDeletes, messageToCheck)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) checkForDeleteForMes(message *common.Message) error {
|
|
messagesToCheck, err := m.getMessagesToCheckForDelete(message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var messageDeleteForMes []*protobuf.SyncDeleteForMeMessage
|
|
applyDelete := false
|
|
for _, messageToCheck := range messagesToCheck {
|
|
if !applyDelete {
|
|
// Check for any pending delete for mes
|
|
// If any pending deletes are available and valid, apply them
|
|
messageDeleteForMes, err = m.persistence.GetDeleteForMeMessagesByMessageID(messageToCheck.ID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(messageDeleteForMes) == 0 {
|
|
continue
|
|
}
|
|
}
|
|
// Once one messageDeleteForMes has been found, we apply it to all the images in the album
|
|
applyDelete = true
|
|
|
|
err := m.applyDeleteForMeMessage(messageToCheck)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) isMessageAllowedFrom(publicKey string, chat *Chat) (bool, error) {
|
|
onlyFromContacts, err := m.settings.GetMessagesFromContactsOnly()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
if !onlyFromContacts {
|
|
return true, nil
|
|
}
|
|
|
|
// if it's from us, it's allowed
|
|
if m.myHexIdentity() == publicKey {
|
|
return true, nil
|
|
}
|
|
|
|
// If the chat is active, we allow it
|
|
if chat != nil && chat.Active {
|
|
return true, nil
|
|
}
|
|
|
|
// If the chat is public, we allow it
|
|
if chat != nil && chat.Public() {
|
|
return true, nil
|
|
}
|
|
|
|
contact, ok := m.allContacts.Load(publicKey)
|
|
if !ok {
|
|
// If it's not in contacts, we don't allow it
|
|
return false, nil
|
|
}
|
|
|
|
// Otherwise we check if we added it
|
|
return contact.added(), nil
|
|
}
|
|
|
|
func (m *Messenger) updateUnviewedCounts(chat *Chat, message *common.Message) {
|
|
chat.UnviewedMessagesCount++
|
|
if message.Mentioned || message.Replied || chat.OneToOne() {
|
|
chat.UnviewedMentionsCount++
|
|
}
|
|
}
|
|
|
|
func mapSyncAccountToAccount(message *protobuf.SyncAccount, accountOperability accounts.AccountOperable, accType accounts.AccountType) *accounts.Account {
|
|
return &accounts.Account{
|
|
Address: types.BytesToAddress(message.Address),
|
|
KeyUID: message.KeyUid,
|
|
PublicKey: types.HexBytes(message.PublicKey),
|
|
Type: accType,
|
|
Path: message.Path,
|
|
Name: message.Name,
|
|
ColorID: multiaccountscommon.CustomizationColor(message.ColorId),
|
|
Emoji: message.Emoji,
|
|
Wallet: message.Wallet,
|
|
Chat: message.Chat,
|
|
Hidden: message.Hidden,
|
|
Clock: message.Clock,
|
|
Operable: accountOperability,
|
|
Removed: message.Removed,
|
|
Position: message.Position,
|
|
ProdPreferredChainIDs: message.ProdPreferredChainIDs,
|
|
TestPreferredChainIDs: message.TestPreferredChainIDs,
|
|
}
|
|
}
|
|
|
|
func (m *Messenger) resolveAccountOperability(syncAcc *protobuf.SyncAccount, syncKpMigratedToKeycard bool,
|
|
dbKpMigratedToKeycard bool, accountReceivedFromLocalPairing bool) (accounts.AccountOperable, error) {
|
|
if accountReceivedFromLocalPairing {
|
|
return accounts.AccountOperable(syncAcc.Operable), nil
|
|
}
|
|
|
|
if syncKpMigratedToKeycard || m.account.KeyUID == syncAcc.KeyUid {
|
|
return accounts.AccountFullyOperable, nil
|
|
}
|
|
|
|
accountsOperability := accounts.AccountNonOperable
|
|
dbAccount, err := m.settings.GetAccountByAddress(types.BytesToAddress(syncAcc.Address))
|
|
if err != nil && err != accounts.ErrDbAccountNotFound {
|
|
return accountsOperability, err
|
|
}
|
|
if dbAccount != nil {
|
|
// We're here when we receive a keypair from the paired device which has just migrated from keycard to app.
|
|
if !syncKpMigratedToKeycard && dbKpMigratedToKeycard {
|
|
return accounts.AccountNonOperable, nil
|
|
}
|
|
return dbAccount.Operable, nil
|
|
}
|
|
|
|
if !syncKpMigratedToKeycard {
|
|
// We're here when we receive a keypair from the paired device which is either:
|
|
// 1. regular keypair or
|
|
// 2. was just converted from keycard to a regular keypair.
|
|
dbKeycardsForKeyUID, err := m.settings.GetKeycardsWithSameKeyUID(syncAcc.KeyUid)
|
|
if err != nil {
|
|
return accounts.AccountNonOperable, err
|
|
}
|
|
|
|
if len(dbKeycardsForKeyUID) > 0 {
|
|
// We're here in case 2. from above and in this case we need to mark all accounts for this keypair non operable
|
|
return accounts.AccountNonOperable, nil
|
|
}
|
|
}
|
|
|
|
if syncAcc.Chat || syncAcc.Wallet {
|
|
accountsOperability = accounts.AccountFullyOperable
|
|
} else {
|
|
partiallyOrFullyOperable, err := m.settings.IsAnyAccountPartiallyOrFullyOperableForKeyUID(syncAcc.KeyUid)
|
|
if err != nil {
|
|
if err == accounts.ErrDbKeypairNotFound {
|
|
return accounts.AccountNonOperable, nil
|
|
}
|
|
return accounts.AccountNonOperable, err
|
|
}
|
|
if partiallyOrFullyOperable {
|
|
accountsOperability = accounts.AccountPartiallyOperable
|
|
}
|
|
}
|
|
|
|
return accountsOperability, nil
|
|
}
|
|
|
|
func (m *Messenger) handleSyncWatchOnlyAccount(message *protobuf.SyncAccount, fromBackup bool) (*accounts.Account, error) {
|
|
if message.KeyUid != "" {
|
|
return nil, ErrNotWatchOnlyAccount
|
|
}
|
|
|
|
accountOperability := accounts.AccountFullyOperable
|
|
|
|
accAddress := types.BytesToAddress(message.Address)
|
|
dbAccount, err := m.settings.GetAccountByAddress(accAddress)
|
|
if err != nil && err != accounts.ErrDbAccountNotFound {
|
|
return nil, err
|
|
}
|
|
|
|
if dbAccount != nil {
|
|
if message.Clock <= dbAccount.Clock {
|
|
return nil, ErrTryingToStoreOldWalletAccount
|
|
}
|
|
|
|
if message.Removed {
|
|
err = m.settings.RemoveAccount(accAddress, message.Clock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// if keypair is retrieved from backed up data, no need for resolving accounts positions
|
|
if !fromBackup {
|
|
err = m.settings.ResolveAccountsPositions(message.Clock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
dbAccount.Removed = true
|
|
return dbAccount, nil
|
|
}
|
|
}
|
|
|
|
acc := mapSyncAccountToAccount(message, accountOperability, accounts.AccountTypeWatch)
|
|
|
|
err = m.settings.SaveOrUpdateAccounts([]*accounts.Account{acc}, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return acc, nil
|
|
}
|
|
|
|
func (m *Messenger) handleSyncTokenPreferences(message *protobuf.SyncTokenPreferences) ([]walletsettings.TokenPreferences, error) {
|
|
if len(message.Preferences) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
dbLastUpdate, err := m.settings.GetClockOfLastTokenPreferencesChange()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
groupByCommunity, err := m.settings.GetTokenGroupByCommunity()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Since adding new token preferences updates `ClockOfLastTokenPreferencesChange` we should handle token preferences changes
|
|
// even they are with the same clock, that ensures the correct order in case of syncing devices.
|
|
if message.Clock < dbLastUpdate {
|
|
return nil, ErrTryingToApplyOldTokenPreferences
|
|
}
|
|
|
|
var tokenPreferences []walletsettings.TokenPreferences
|
|
for _, pref := range message.Preferences {
|
|
tokenPref := walletsettings.TokenPreferences{
|
|
Key: pref.Key,
|
|
Position: int(pref.Position),
|
|
GroupPosition: int(pref.GroupPosition),
|
|
Visible: pref.Visible,
|
|
CommunityID: pref.CommunityId,
|
|
}
|
|
tokenPreferences = append(tokenPreferences, tokenPref)
|
|
}
|
|
|
|
err = m.settings.UpdateTokenPreferences(tokenPreferences, groupByCommunity, message.Testnet, message.Clock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return tokenPreferences, nil
|
|
}
|
|
|
|
func (m *Messenger) handleSyncAccountsPositions(message *protobuf.SyncAccountsPositions) ([]*accounts.Account, error) {
|
|
if len(message.Accounts) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
dbLastUpdate, err := m.settings.GetClockOfLastAccountsPositionChange()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Since adding new account updates `ClockOfLastAccountsPositionChange` we should handle account order changes
|
|
// even they are with the same clock, that ensures the correct order in case of syncing devices.
|
|
if message.Clock < dbLastUpdate {
|
|
return nil, ErrTryingToApplyOldWalletAccountsOrder
|
|
}
|
|
|
|
var accs []*accounts.Account
|
|
for _, sAcc := range message.Accounts {
|
|
acc := &accounts.Account{
|
|
Address: types.BytesToAddress(sAcc.Address),
|
|
KeyUID: sAcc.KeyUid,
|
|
Position: sAcc.Position,
|
|
}
|
|
accs = append(accs, acc)
|
|
}
|
|
|
|
err = m.settings.SetWalletAccountsPositions(accs, message.Clock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return accs, nil
|
|
}
|
|
|
|
func (m *Messenger) handleProfileKeypairMigration(state *ReceivedMessageState, fromLocalPairing bool, message *protobuf.SyncKeypair) (handled bool, err error) {
|
|
if message == nil {
|
|
return false, errors.New("handleProfileKeypairMigration receive a nil message")
|
|
}
|
|
|
|
if fromLocalPairing {
|
|
return false, nil
|
|
}
|
|
|
|
if m.account.KeyUID != message.KeyUid {
|
|
return false, nil
|
|
}
|
|
|
|
dbKeypair, err := m.settings.GetKeypairByKeyUID(message.KeyUid)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
if dbKeypair.Clock >= message.Clock {
|
|
return false, nil
|
|
}
|
|
|
|
migrationNeeded := dbKeypair.MigratedToKeycard() && len(message.Keycards) == 0 || // `true` if profile keypair was migrated to the app on one of paired devices
|
|
!dbKeypair.MigratedToKeycard() && len(message.Keycards) > 0 // `true` if profile keypair was migrated to a Keycard on one of paired devices
|
|
err = m.settings.SaveSettingField(settings.ProfileMigrationNeeded, migrationNeeded)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
state.Response.AddSetting(&settings.SyncSettingField{SettingField: settings.ProfileMigrationNeeded, Value: migrationNeeded})
|
|
|
|
return migrationNeeded, nil
|
|
}
|
|
|
|
func (m *Messenger) handleSyncKeypair(message *protobuf.SyncKeypair, fromLocalPairing bool, acNofificationCallback func() error) (*accounts.Keypair, error) {
|
|
if message == nil {
|
|
return nil, errors.New("handleSyncKeypair receive a nil message")
|
|
}
|
|
dbKeypair, err := m.settings.GetKeypairByKeyUID(message.KeyUid)
|
|
if err != nil && err != accounts.ErrDbKeypairNotFound {
|
|
return nil, err
|
|
}
|
|
|
|
kp := &accounts.Keypair{
|
|
KeyUID: message.KeyUid,
|
|
Name: message.Name,
|
|
Type: accounts.KeypairType(message.Type),
|
|
DerivedFrom: message.DerivedFrom,
|
|
LastUsedDerivationIndex: message.LastUsedDerivationIndex,
|
|
SyncedFrom: message.SyncedFrom,
|
|
Clock: message.Clock,
|
|
Removed: message.Removed,
|
|
}
|
|
|
|
if dbKeypair != nil {
|
|
if dbKeypair.Clock >= kp.Clock {
|
|
return nil, ErrTryingToStoreOldKeypair
|
|
}
|
|
// in case of keypair update, we need to keep `synced_from` field as it was when keypair was introduced to this device for the first time
|
|
// but in case if keypair on this device came from the backup (e.g. device A recovered from waku, then device B paired with the device A
|
|
// via local pairing, before device A made its keypairs fully operable) we need to update syncedFrom when user on this device when that
|
|
// keypair becomes operable on any of other paired devices
|
|
if dbKeypair.SyncedFrom != accounts.SyncedFromBackup {
|
|
kp.SyncedFrom = dbKeypair.SyncedFrom
|
|
}
|
|
}
|
|
|
|
syncKpMigratedToKeycard := len(message.Keycards) > 0
|
|
for _, sAcc := range message.Accounts {
|
|
if message.SyncedFrom == accounts.SyncedFromBackup && kp.Type == accounts.KeypairTypeProfile {
|
|
// if a profile keypair is coming from backup, we're handling within this block the case when a recovering
|
|
// was inititiated via keycard, while backed up profile keypair data refers to a regular profile
|
|
multiAcc, err := m.multiAccounts.GetAccount(kp.KeyUID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
syncKpMigratedToKeycard = multiAcc != nil && multiAcc.KeycardPairing != ""
|
|
}
|
|
accountOperability, err := m.resolveAccountOperability(sAcc, syncKpMigratedToKeycard,
|
|
dbKeypair != nil && dbKeypair.MigratedToKeycard(), fromLocalPairing)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
acc := mapSyncAccountToAccount(sAcc, accountOperability, accounts.GetAccountTypeForKeypairType(kp.Type))
|
|
|
|
kp.Accounts = append(kp.Accounts, acc)
|
|
}
|
|
|
|
if !fromLocalPairing {
|
|
if kp.Removed ||
|
|
dbKeypair != nil && !dbKeypair.MigratedToKeycard() && syncKpMigratedToKeycard {
|
|
// delete all keystore files
|
|
err = m.deleteKeystoreFilesForKeypair(dbKeypair)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if syncKpMigratedToKeycard {
|
|
err = m.settings.MarkKeypairFullyOperable(dbKeypair.KeyUID, 0, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
} else if dbKeypair != nil {
|
|
for _, dbAcc := range dbKeypair.Accounts {
|
|
removeAcc := false
|
|
for _, acc := range kp.Accounts {
|
|
if dbAcc.Address == acc.Address && acc.Removed && !dbAcc.Removed {
|
|
removeAcc = true
|
|
break
|
|
}
|
|
}
|
|
if removeAcc {
|
|
err = m.deleteKeystoreFileForAddress(dbAcc.Address)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// deleting keypair will delete related keycards as well
|
|
err = m.settings.RemoveKeypair(message.KeyUid, message.Clock)
|
|
if err != nil && err != accounts.ErrDbKeypairNotFound {
|
|
return nil, err
|
|
}
|
|
|
|
// if entire keypair was removed and keypair is already in db, there is no point to continue
|
|
if kp.Removed && dbKeypair != nil {
|
|
// if keypair is retrieved from backed up data, no need for resolving accounts positions
|
|
if message.SyncedFrom != accounts.SyncedFromBackup {
|
|
err = m.settings.ResolveAccountsPositions(message.Clock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
return kp, nil
|
|
}
|
|
|
|
// save keypair first
|
|
err = m.settings.SaveOrUpdateKeypair(kp)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// if keypair is retrieved from backed up data, no need for resolving accounts positions
|
|
if message.SyncedFrom != accounts.SyncedFromBackup {
|
|
// then resolve accounts positions, cause some accounts might be removed
|
|
err = m.settings.ResolveAccountsPositions(message.Clock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// if keypair is coming from paired device (means not from backup) and it's not among known, active keypairs,
|
|
// we need to add an activity center notification
|
|
if !kp.Removed && dbKeypair == nil {
|
|
defer func() {
|
|
err = acNofificationCallback()
|
|
}()
|
|
}
|
|
}
|
|
|
|
for _, sKc := range message.Keycards {
|
|
kc := accounts.Keycard{}
|
|
kc.FromSyncKeycard(sKc)
|
|
err = m.settings.SaveOrUpdateKeycard(kc, message.Clock, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
kp.Keycards = append(kp.Keycards, &kc)
|
|
}
|
|
|
|
// getting keypair form the db, cause keypair related accounts positions might be changed
|
|
dbKeypair, err = m.settings.GetKeypairByKeyUID(message.KeyUid)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return dbKeypair, nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncAccountsPositions(state *ReceivedMessageState, message *protobuf.SyncAccountsPositions, statusMessage *v1protocol.StatusMessage) error {
|
|
accs, err := m.handleSyncAccountsPositions(message)
|
|
if err != nil {
|
|
if err == ErrTryingToApplyOldWalletAccountsOrder ||
|
|
err == accounts.ErrAccountWrongPosition ||
|
|
err == accounts.ErrNotTheSameNumberOdAccountsToApplyReordering ||
|
|
err == accounts.ErrNotTheSameAccountsToApplyReordering {
|
|
m.logger.Warn("syncing accounts order issue", zap.Error(err))
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
state.Response.AccountsPositions = append(state.Response.AccountsPositions, accs...)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncTokenPreferences(state *ReceivedMessageState, message *protobuf.SyncTokenPreferences, statusMessage *v1protocol.StatusMessage) error {
|
|
tokenPreferences, err := m.handleSyncTokenPreferences(message)
|
|
if err != nil {
|
|
if err == ErrTryingToApplyOldTokenPreferences {
|
|
m.logger.Warn("syncing token preferences issue", zap.Error(err))
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
state.Response.TokenPreferences = append(state.Response.TokenPreferences, tokenPreferences...)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncAccount(state *ReceivedMessageState, message *protobuf.SyncAccount, statusMessage *v1protocol.StatusMessage) error {
|
|
acc, err := m.handleSyncWatchOnlyAccount(message, false)
|
|
if err != nil {
|
|
if err == ErrTryingToStoreOldWalletAccount {
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
state.Response.WatchOnlyAccounts = append(state.Response.WatchOnlyAccounts, acc)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncKeypair(state *ReceivedMessageState, message *protobuf.SyncKeypair, statusMessage *v1protocol.StatusMessage) error {
|
|
return m.handleSyncKeypairInternal(state, message, false)
|
|
}
|
|
|
|
func (m *Messenger) handleSyncKeypairInternal(state *ReceivedMessageState, message *protobuf.SyncKeypair, fromLocalPairing bool) error {
|
|
if message == nil {
|
|
return errors.New("handleSyncKeypairInternal receive a nil message")
|
|
}
|
|
|
|
if m.walletAPI != nil {
|
|
err := m.walletAPI.SetPairingsJSONFileContent(message.KeycardPairings)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// check for the profile keypair migration first on paired device
|
|
handled, err := m.handleProfileKeypairMigration(state, fromLocalPairing, message)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if handled {
|
|
return nil
|
|
}
|
|
|
|
kp, err := m.handleSyncKeypair(message, fromLocalPairing, func() error {
|
|
return m.addNewKeypairAddedOnPairedDeviceACNotification(message.KeyUid, state.Response)
|
|
})
|
|
if err != nil {
|
|
if err == ErrTryingToStoreOldKeypair {
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
state.Response.Keypairs = append(state.Response.Keypairs, kp)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncContactRequestDecision(state *ReceivedMessageState, message *protobuf.SyncContactRequestDecision, statusMessage *v1protocol.StatusMessage) error {
|
|
var err error
|
|
var response *MessengerResponse
|
|
|
|
if message.DecisionStatus == protobuf.SyncContactRequestDecision_ACCEPTED {
|
|
response, err = m.updateAcceptedContactRequest(nil, message.RequestId, true)
|
|
} else {
|
|
response, err = m.declineContactRequest(message.RequestId, true)
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
state.Response = response
|
|
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandlePushNotificationRegistration(state *ReceivedMessageState, encryptedRegistration []byte, statusMessage *v1protocol.StatusMessage) error {
|
|
if m.pushNotificationServer == nil {
|
|
return nil
|
|
}
|
|
publicKey := state.CurrentMessageState.PublicKey
|
|
|
|
return m.pushNotificationServer.HandlePushNotificationRegistration(publicKey, encryptedRegistration)
|
|
}
|
|
|
|
func (m *Messenger) HandlePushNotificationResponse(state *ReceivedMessageState, message *protobuf.PushNotificationResponse, statusMessage *v1protocol.StatusMessage) error {
|
|
if m.pushNotificationClient == nil {
|
|
return nil
|
|
}
|
|
publicKey := state.CurrentMessageState.PublicKey
|
|
|
|
return m.pushNotificationClient.HandlePushNotificationResponse(publicKey, message)
|
|
}
|
|
|
|
func (m *Messenger) HandlePushNotificationRegistrationResponse(state *ReceivedMessageState, message *protobuf.PushNotificationRegistrationResponse, statusMessage *v1protocol.StatusMessage) error {
|
|
if m.pushNotificationClient == nil {
|
|
return nil
|
|
}
|
|
publicKey := state.CurrentMessageState.PublicKey
|
|
|
|
return m.pushNotificationClient.HandlePushNotificationRegistrationResponse(publicKey, message)
|
|
}
|
|
|
|
func (m *Messenger) HandlePushNotificationQuery(state *ReceivedMessageState, message *protobuf.PushNotificationQuery, statusMessage *v1protocol.StatusMessage) error {
|
|
if m.pushNotificationServer == nil {
|
|
return nil
|
|
}
|
|
publicKey := state.CurrentMessageState.PublicKey
|
|
|
|
return m.pushNotificationServer.HandlePushNotificationQuery(publicKey, statusMessage.ApplicationLayer.ID, message)
|
|
}
|
|
|
|
func (m *Messenger) HandlePushNotificationQueryResponse(state *ReceivedMessageState, message *protobuf.PushNotificationQueryResponse, statusMessage *v1protocol.StatusMessage) error {
|
|
if m.pushNotificationClient == nil {
|
|
return nil
|
|
}
|
|
publicKey := state.CurrentMessageState.PublicKey
|
|
|
|
return m.pushNotificationClient.HandlePushNotificationQueryResponse(publicKey, message)
|
|
}
|
|
|
|
func (m *Messenger) HandlePushNotificationRequest(state *ReceivedMessageState, message *protobuf.PushNotificationRequest, statusMessage *v1protocol.StatusMessage) error {
|
|
if m.pushNotificationServer == nil {
|
|
return nil
|
|
}
|
|
publicKey := state.CurrentMessageState.PublicKey
|
|
|
|
return m.pushNotificationServer.HandlePushNotificationRequest(publicKey, statusMessage.ApplicationLayer.ID, message)
|
|
}
|
|
|
|
func (m *Messenger) HandleCommunityDescription(state *ReceivedMessageState, message *protobuf.CommunityDescription, statusMessage *v1protocol.StatusMessage) error {
|
|
// TODO: handle shard
|
|
err := m.handleCommunityDescription(state, state.CurrentMessageState.PublicKey, message, statusMessage.EncryptionLayer.Payload, nil)
|
|
if err != nil {
|
|
m.logger.Warn("failed to handle CommunityDescription", zap.Error(err))
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncBookmark(state *ReceivedMessageState, message *protobuf.SyncBookmark, statusMessage *v1protocol.StatusMessage) error {
|
|
bookmark := &browsers.Bookmark{
|
|
URL: message.Url,
|
|
Name: message.Name,
|
|
ImageURL: message.ImageUrl,
|
|
Removed: message.Removed,
|
|
Clock: message.Clock,
|
|
}
|
|
state.AllBookmarks[message.Url] = bookmark
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncClearHistory(state *ReceivedMessageState, message *protobuf.SyncClearHistory, statusMessage *v1protocol.StatusMessage) error {
|
|
chatID := message.ChatId
|
|
existingChat, ok := state.AllChats.Load(chatID)
|
|
if !ok {
|
|
return ErrChatNotFound
|
|
}
|
|
|
|
if existingChat.DeletedAtClockValue >= message.ClearedAt {
|
|
return nil
|
|
}
|
|
|
|
err := m.persistence.ClearHistoryFromSyncMessage(existingChat, message.ClearedAt)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if existingChat.Public() {
|
|
err = m.transport.ClearProcessedMessageIDsCache()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
state.AllChats.Store(chatID, existingChat)
|
|
state.Response.AddChat(existingChat)
|
|
state.Response.AddClearedHistory(&ClearedHistory{
|
|
ClearedAt: message.ClearedAt,
|
|
ChatID: chatID,
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (m *Messenger) HandleSyncTrustedUser(state *ReceivedMessageState, message *protobuf.SyncTrustedUser, statusMessage *v1protocol.StatusMessage) error {
|
|
updated, err := m.verificationDatabase.UpsertTrustStatus(message.Id, verification.TrustStatus(message.Status), message.Clock)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if updated {
|
|
state.AllTrustStatus[message.Id] = verification.TrustStatus(message.Status)
|
|
|
|
contact, ok := m.allContacts.Load(message.Id)
|
|
if !ok {
|
|
m.logger.Info("contact not found")
|
|
return nil
|
|
}
|
|
|
|
contact.TrustStatus = verification.TrustStatus(message.Status)
|
|
m.allContacts.Store(contact.ID, contact)
|
|
state.ModifiedContacts.Store(contact.ID, true)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
func (m *Messenger) HandleCommunityMessageArchiveMagnetlink(state *ReceivedMessageState, message *protobuf.CommunityMessageArchiveMagnetlink, statusMessage *v1protocol.StatusMessage) error {
|
|
return m.HandleHistoryArchiveMagnetlinkMessage(state, state.CurrentMessageState.PublicKey, message.MagnetUri, message.Clock)
|
|
}
|
|
|
|
func (m *Messenger) addNewKeypairAddedOnPairedDeviceACNotification(keyUID string, response *MessengerResponse) error {
|
|
kp, err := m.settings.GetKeypairByKeyUID(keyUID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
notification := &ActivityCenterNotification{
|
|
ID: types.FromHex(uuid.New().String()),
|
|
Type: ActivityCenterNotificationTypeNewKeypairAddedToPairedDevice,
|
|
Timestamp: m.getTimesource().GetCurrentTime(),
|
|
Read: false,
|
|
UpdatedAt: m.GetCurrentTimeInMillis(),
|
|
Message: &common.Message{
|
|
ChatMessage: &protobuf.ChatMessage{
|
|
Text: kp.Name,
|
|
},
|
|
ID: kp.KeyUID,
|
|
},
|
|
}
|
|
|
|
err = m.addActivityCenterNotification(response, notification, nil)
|
|
if err != nil {
|
|
m.logger.Warn("failed to create activity center notification", zap.Error(err))
|
|
return err
|
|
}
|
|
return nil
|
|
}
|