@ -40,6 +40,7 @@ internal extension SessionUtil {
var groups : [ GroupInfo ] = [ ]
var community : ugroups_community_info = ugroups_community_info ( )
var legacyGroup : ugroups_legacy_group_info = ugroups_legacy_group_info ( )
var group : ugroups_group_info = ugroups_group_info ( )
let groupsIterator : OpaquePointer = user_groups_iterator_new ( conf )
while ! user_groups_iterator_done ( groupsIterator ) {
@ -76,13 +77,13 @@ internal extension SessionUtil {
threadId : groupId ,
publicKey : Data (
libSessionVal : legacyGroup . enc_pubkey ,
count : ClosedGroup . pub keyByteLength
count : ClosedGroup . pub KeyByteLength( for : . legacyGroup )
) ,
secretKey : Data (
libSessionVal : legacyGroup . enc_seckey ,
count : ClosedGroup . secretKeyByteLength
count : ClosedGroup . secretKeyByteLength ( for : . legacyGroup )
) ,
receivedTimestamp : ( TimeInterval ( SnodeAPI . currentOffsetTimestampMs ( ) ) / 1000 )
receivedTimestamp : ( TimeInterval ( SnodeAPI . currentOffsetTimestampMs ( using : dependencies ) ) / 1000 )
) ,
disappearingConfig : DisappearingMessagesConfiguration
. defaultWith ( groupId )
@ -116,6 +117,31 @@ internal extension SessionUtil {
)
)
}
else if user_groups_it_is_group ( groupsIterator , & group ) {
let groupId : String = String ( libSessionVal : group . id )
groups . append (
GroupInfo (
groupIdentityPublicKey : groupId ,
groupIdentityPrivateKey : ( ! group . have_secretkey ? nil :
Data (
libSessionVal : group . secretkey ,
count : ClosedGroup . secretKeyByteLength ( for : . group ) ,
nullIfEmpty : true
)
) ,
authData : ( ! group . have_auth_data ? nil :
Data (
libSessionVal : group . auth_data ,
count : ClosedGroup . authDataByteLength ( for : . group ) ,
nullIfEmpty : true
)
) ,
priority : group . priority ,
joinedAt : group . joined_at
)
)
}
else {
SNLog ( " Ignoring unknown conversation type when iterating through volatile conversation info update " )
}
@ -388,6 +414,89 @@ internal extension SessionUtil {
// MARK: - - H a n d l e G r o u p C h a n g e s
let existingGroupIds : Set < String > = Set ( existingThreadInfo
. filter { $0 . value . variant = = . group }
. keys )
let existingGroups : [ String : ClosedGroup ] = ( try ? ClosedGroup
. fetchAll ( db , ids : existingGroupIds ) )
. defaulting ( to : [ ] )
. reduce ( into : [ : ] ) { result , next in result [ next . id ] = next }
try groups . forEach { group in
guard
let name : String = group . name ,
let joinedAt : Int64 = group . joinedAt
else { return }
if ! existingGroupIds . contains ( group . groupIdentityPublicKey ) {
// A d d a n e w g r o u p i f i t d o e s n ' t a l r e a d y e x i s t
try MessageReceiver . handleNewGroup (
db ,
groupIdentityPublicKey : group . groupIdentityPublicKey ,
groupIdentityPrivateKey : group . groupIdentityPrivateKey ,
name : name ,
authData : group . authData ,
created : Int64 ( ( group . joinedAt ? ? ( latestConfigSentTimestampMs / 1000 ) ) ) ,
approved : true , // TODO: W h a t t o d o h e r e ? ? ? ? < # T # # B o o l # > ,
calledFromConfigHandling : true ,
using : dependencies
)
}
else {
// O t h e r w i s e u p d a t e t h e e x i s t i n g g r o u p
let groupChanges : [ ConfigColumnAssignment ] = [
( existingGroups [ group . groupIdentityPublicKey ] ? . name = = name ? nil :
ClosedGroup . Columns . name . set ( to : name )
) ,
( existingGroups [ group . groupIdentityPublicKey ] ? . formationTimestamp = = TimeInterval ( joinedAt ) ? nil :
ClosedGroup . Columns . formationTimestamp . set ( to : TimeInterval ( joinedAt ) )
) ,
( existingGroups [ group . groupIdentityPublicKey ] ? . authData = = group . authData ? nil :
ClosedGroup . Columns . authData . set ( to : group . authData )
) ,
( existingGroups [ group . groupIdentityPublicKey ] ? . groupIdentityPrivateKey = = group . groupIdentityPrivateKey ? nil :
ClosedGroup . Columns . groupIdentityPrivateKey . set ( to : group . groupIdentityPrivateKey )
)
] . compactMap { $0 }
// A p p l y a n y g r o u p c h a n g e s
if ! groupChanges . isEmpty {
_ = try ? ClosedGroup
. filter ( id : group . groupIdentityPublicKey )
. updateAll ( // H a n d l i n g a c o n f i g u p d a t e s o d o n ' t u s e ` u p d a t e A l l A n d C o n f i g `
db ,
groupChanges
)
}
}
// M a k e a n y t h r e a d - s p e c i f i c c h a n g e s i f n e e d e d
if existingThreadInfo [ group . groupIdentityPublicKey ] ? . pinnedPriority != group . priority {
_ = try ? SessionThread
. filter ( id : group . groupIdentityPublicKey )
. updateAll ( // H a n d l i n g a c o n f i g u p d a t e s o d o n ' t u s e ` u p d a t e A l l A n d C o n f i g `
db ,
SessionThread . Columns . pinnedPriority . set ( to : group . priority )
)
}
}
// R e m o v e a n y l e g a c y g r o u p s w h i c h a r e n o l o n g e r i n t h e c o n f i g
let groupIdsToRemove : Set < String > = existingGroupIds
. subtracting ( legacyGroups . map { $0 . id } )
if ! groupIdsToRemove . isEmpty {
SessionUtil . kickFromConversationUIIfNeeded ( removedThreadIds : Array ( groupIdsToRemove ) )
try SessionThread
. deleteOrLeave (
db ,
threadIds : Array ( groupIdsToRemove ) ,
threadVariant : . group ,
groupLeaveType : . forced ,
calledFromConfigHandling : true
)
}
}
fileprivate static func memberInfo ( in legacyGroup : UnsafeMutablePointer < ugroups_legacy_group_info > ) -> [ String : Bool ] {
@ -523,6 +632,41 @@ internal extension SessionUtil {
guard case . object ( let conf ) = config else { throw SessionUtilError . invalidConfigObject }
guard ! groups . isEmpty else { return }
try groups
. forEach { group in
var cGroupId : [ CChar ] = group . groupIdentityPublicKey . cArray . nullTerminated ( )
var userGroup : ugroups_group_info = ugroups_group_info ( )
guard user_groups_get_or_construct_group ( conf , & userGroup , & cGroupId ) else {
// / I t l o o k s l i k e t h e r e a r e s o m e s i t u a t i o n s w h e r e t h i s o b j e c t m i g h t n o t g e t c r e a t e d c o r r e c t l y ( a n d
// / w i l l t h r o w d u e t o t h e i m p l i c i t u n w r a p p i n g ) a s a r e s u l t w e p u t i t i n a g u a r d a n d t h r o w i n s t e a d
SNLog ( " Unable to upsert group conversation to SessionUtil: \( config . lastError ) " )
throw SessionUtilError . getOrConstructFailedUnexpectedly
}
// / A s s i g n t h e n o n - a d m i n a u t h d a t a ( i f i t e x i s t s )
if let authData : Data = group . authData {
userGroup . auth_data = authData . toLibSession ( )
userGroup . have_auth_data = true
}
// / A s s i g n t h e a d m i n k e y ( i f i t e x i s t s )
// /
// / * * N o t e : * * W e d o t h i s a f t e r a s s i g n i n g t h e ` a u t h _ d a t a ` a s g e n e r a l l y t h e v a l u e s a r e m u t u a l l y
// / e x c l u s i v e a n d i f w e h a v e a ` g r o u p I d e n t i t y P r i v a t e K e y ` w e w a n t t h a t t o t a k e p r i o r i t y
if let privateKey : Data = group . groupIdentityPrivateKey {
userGroup . secretkey = privateKey . toLibSession ( )
userGroup . have_secretkey = true
// S t o r e t h e u p d a t e d g r o u p ( n e e d s t o h a p p e n b e f o r e v a r i a b l e s g o o u t o f s c o p e )
user_groups_set_group ( conf , & userGroup )
}
// S t o r e t h e u p d a t e d g r o u p ( c a n ' t b e s u r e i f w e m a d e a n y c h a n g e s a b o v e )
userGroup . joined_at = ( group . joinedAt ? ? userGroup . joined_at )
userGroup . priority = ( group . priority ? ? userGroup . priority )
user_groups_set_group ( conf , & userGroup )
}
}
static func upsert (
@ -799,9 +943,8 @@ public extension SessionUtil {
_ db : Database ,
groupIdentityPublicKey : String ,
groupIdentityPrivateKey : Data ? ,
name : String ,
tag : Data ? ,
subkey : Data ? ,
name : String ? ,
authData : Data ? ,
joinedAt : Int64 ,
using dependencies : Dependencies
) throws {
@ -811,7 +954,18 @@ public extension SessionUtil {
publicKey : getUserHexEncodedPublicKey ( db , using : dependencies ) ,
using : dependencies
) { config in
guard case . object ( let conf ) = config else { throw SessionUtilError . invalidConfigObject }
try SessionUtil . upsert (
groups : [
GroupInfo (
groupIdentityPublicKey : groupIdentityPublicKey ,
groupIdentityPrivateKey : groupIdentityPrivateKey ,
name : name ,
authData : authData ,
joinedAt : joinedAt
)
] ,
in : config
)
}
}
@ -820,8 +974,7 @@ public extension SessionUtil {
groupIdentityPublicKey : String ,
groupIdentityPrivateKey : Data ? = nil ,
name : String ? = nil ,
tag : Data ? = nil ,
subkey : Data ? = nil ,
authData : Data ? = nil ,
using dependencies : Dependencies
) throws {
try SessionUtil . performAndPushChange (
@ -836,8 +989,7 @@ public extension SessionUtil {
groupIdentityPublicKey : groupIdentityPublicKey ,
groupIdentityPrivateKey : groupIdentityPrivateKey ,
name : name ,
tag : tag ,
subkey : subkey
authData : authData
)
] ,
in : config
@ -858,6 +1010,14 @@ public extension SessionUtil {
publicKey : getUserHexEncodedPublicKey ( db , using : dependencies ) ,
using : dependencies
) { config in
guard case . object ( let conf ) = config else { throw SessionUtilError . invalidConfigObject }
groupIds . forEach { threadId in
var cGroupId : [ CChar ] = threadId . cArray . nullTerminated ( )
// D o n ' t c a r e i f t h e g r o u p d o e s n ' t e x i s t
user_groups_erase_group ( conf , & cGroupId )
}
}
// R e m o v e t h e v o l a t i l e i n f o a s w e l l
@ -997,8 +1157,7 @@ extension SessionUtil {
let groupIdentityPublicKey : String
let groupIdentityPrivateKey : Data ?
let name : String ?
let tag : Data ?
let subkey : Data ?
let authData : Data ?
let priority : Int32 ?
let joinedAt : Int64 ?
@ -1006,16 +1165,14 @@ extension SessionUtil {
groupIdentityPublicKey : String ,
groupIdentityPrivateKey : Data ? = nil ,
name : String ? = nil ,
tag : Data ? = nil ,
subkey : Data ? = nil ,
authData : Data ? = nil ,
priority : Int32 ? = nil ,
joinedAt : Int64 ? = nil
) {
self . groupIdentityPublicKey = groupIdentityPublicKey
self . groupIdentityPrivateKey = groupIdentityPrivateKey
self . name = name
self . tag = tag
self . subkey = subkey
self . authData = authData
self . priority = priority
self . joinedAt = joinedAt
}