Merge remote-tracking branch 'upstream/dev' into feature/groups-rebuild

# Conflicts:
#	LibSession-Util
#	Podfile
#	Podfile.lock
#	Session.xcodeproj/project.pbxproj
#	Session.xcodeproj/xcshareddata/xcschemes/SessionSnodeKit.xcscheme
#	Session/Calls/Call Management/SessionCallManager.swift
#	Session/Closed Groups/EditClosedGroupVC.swift
#	Session/Closed Groups/NewClosedGroupVC.swift
#	Session/Conversations/ConversationVC+Interaction.swift
#	Session/Conversations/ConversationVC.swift
#	Session/Conversations/ConversationViewModel.swift
#	Session/Conversations/Settings/ThreadDisappearingMessagesSettingsViewModel.swift
#	Session/Conversations/Settings/ThreadSettingsViewModel.swift
#	Session/Home/New Conversation/NewDMVC.swift
#	Session/Media Viewing & Editing/GIFs/GiphyDownloader.swift
#	Session/Meta/AppDelegate.swift
#	Session/Meta/SessionApp.swift
#	Session/Notifications/SyncPushTokensJob.swift
#	Session/Notifications/UserNotificationsAdaptee.swift
#	Session/Onboarding/Onboarding.swift
#	Session/Path/PathStatusView.swift
#	Session/Path/PathVC.swift
#	Session/Settings/NukeDataModal.swift
#	Session/Utilities/BackgroundPoller.swift
#	Session/Utilities/IP2Country.swift
#	SessionMessagingKit/Database/Migrations/_014_GenerateInitialUserConfigDumps.swift
#	SessionMessagingKit/Database/Migrations/_015_BlockCommunityMessageRequests.swift
#	SessionMessagingKit/Database/Migrations/_018_DisappearingMessagesConfiguration.swift
#	SessionMessagingKit/Database/Models/Attachment.swift
#	SessionMessagingKit/Database/Models/ClosedGroup.swift
#	SessionMessagingKit/Database/Models/ConfigDump.swift
#	SessionMessagingKit/Database/Models/DisappearingMessageConfiguration.swift
#	SessionMessagingKit/Database/Models/Interaction.swift
#	SessionMessagingKit/Database/Models/SessionThread.swift
#	SessionMessagingKit/File Server/FileServerAPI.swift
#	SessionMessagingKit/Jobs/AttachmentDownloadJob.swift
#	SessionMessagingKit/Jobs/ConfigMessageReceiveJob.swift
#	SessionMessagingKit/Jobs/ConfigurationSyncJob.swift
#	SessionMessagingKit/Jobs/ExpirationUpdateJob.swift
#	SessionMessagingKit/Jobs/GetExpirationJob.swift
#	SessionMessagingKit/Jobs/MessageSendJob.swift
#	SessionMessagingKit/LibSession/Config Handling/LibSession+Contacts.swift
#	SessionMessagingKit/LibSession/Config Handling/LibSession+ConvoInfoVolatile.swift
#	SessionMessagingKit/LibSession/Config Handling/LibSession+Shared.swift
#	SessionMessagingKit/LibSession/Config Handling/LibSession+UserGroups.swift
#	SessionMessagingKit/LibSession/Config Handling/LibSession+UserProfile.swift
#	SessionMessagingKit/LibSession/Config Handling/SessionUtil+GroupInfo.swift
#	SessionMessagingKit/LibSession/Config Handling/SessionUtil+GroupKeys.swift
#	SessionMessagingKit/LibSession/Config Handling/SessionUtil+GroupMembers.swift
#	SessionMessagingKit/LibSession/Config Handling/SessionUtil+SharedGroup.swift
#	SessionMessagingKit/LibSession/Database/QueryInterfaceRequest+Utilities.swift
#	SessionMessagingKit/LibSession/Database/Setting+Utilities.swift
#	SessionMessagingKit/LibSession/LibSession+SessionMessagingKit.swift
#	SessionMessagingKit/Messages/Message+Origin.swift
#	SessionMessagingKit/Messages/Message.swift
#	SessionMessagingKit/Messages/Visible Messages/VisibleMessage.swift
#	SessionMessagingKit/Open Groups/Models/SOGSMessage.swift
#	SessionMessagingKit/Open Groups/OpenGroupAPI.swift
#	SessionMessagingKit/Open Groups/OpenGroupManager.swift
#	SessionMessagingKit/Open Groups/OpenGroupServerIdLookup.swift
#	SessionMessagingKit/Open Groups/Types/Request+OpenGroupAPI.swift
#	SessionMessagingKit/Open Groups/Types/SOGSEndpoint.swift
#	SessionMessagingKit/Protos/Generated/SNProto.swift
#	SessionMessagingKit/Protos/Generated/SessionProtos.pb.swift
#	SessionMessagingKit/Protos/SessionProtos.proto
#	SessionMessagingKit/Sending & Receiving/Errors/MessageSenderError.swift
#	SessionMessagingKit/Sending & Receiving/Message Handling/MessageReceiver+ExpirationTimers.swift
#	SessionMessagingKit/Sending & Receiving/Message Handling/MessageReceiver+UnsendRequests.swift
#	SessionMessagingKit/Sending & Receiving/MessageReceiver.swift
#	SessionMessagingKit/Sending & Receiving/MessageSender.swift
#	SessionMessagingKit/Sending & Receiving/Notifications/Models/PushNotificationAPIRequest.swift
#	SessionMessagingKit/Sending & Receiving/Notifications/PushNotificationAPI.swift
#	SessionMessagingKit/Sending & Receiving/Notifications/Types/Request+PushNotificationAPI.swift
#	SessionMessagingKit/Sending & Receiving/Pollers/CurrentUserPoller.swift
#	SessionMessagingKit/Sending & Receiving/Pollers/GroupPoller.swift
#	SessionMessagingKit/Sending & Receiving/Pollers/OpenGroupAPI+Poller.swift
#	SessionMessagingKit/Sending & Receiving/Pollers/Poller.swift
#	SessionMessagingKit/SessionUtil/SessionUtilError.swift
#	SessionMessagingKit/SessionUtil/Utilities/TypeConversion+Utilities.swift
#	SessionMessagingKit/Shared Models/MessageViewModel.swift
#	SessionMessagingKit/Shared Models/SessionThreadViewModel.swift
#	SessionMessagingKit/Utilities/ProfileManager.swift
#	SessionMessagingKitTests/LibSession/LibSessionSpec.swift
#	SessionMessagingKitTests/LibSession/LibSessionUtilSpec.swift
#	SessionMessagingKitTests/Open Groups/Models/SOGSMessageSpec.swift
#	SessionMessagingKitTests/Open Groups/OpenGroupAPISpec.swift
#	SessionMessagingKitTests/Open Groups/OpenGroupManagerSpec.swift
#	SessionNotificationServiceExtension/NotificationServiceExtension.swift
#	SessionShareExtension/ShareNavController.swift
#	SessionShareExtension/ThreadPickerVC.swift
#	SessionSnodeKit/Configuration.swift
#	SessionSnodeKit/Database/Migrations/_001_InitialSetupMigration.swift
#	SessionSnodeKit/Database/Models/Snode.swift
#	SessionSnodeKit/Database/Models/SnodeReceivedMessageInfo.swift
#	SessionSnodeKit/Database/Models/SnodeSet.swift
#	SessionSnodeKit/Jobs/GetSnodePoolJob.swift
#	SessionSnodeKit/Models/DeleteAllBeforeRequest.swift
#	SessionSnodeKit/Models/DeleteAllMessagesRequest.swift
#	SessionSnodeKit/Models/DeleteMessagesRequest.swift
#	SessionSnodeKit/Models/GetExpiriesRequest.swift
#	SessionSnodeKit/Models/GetMessagesRequest.swift
#	SessionSnodeKit/Models/ONSResolveResponse.swift
#	SessionSnodeKit/Models/RevokeSubkeyRequest.swift
#	SessionSnodeKit/Models/SendMessageRequest.swift
#	SessionSnodeKit/Models/SnodeAuthenticatedRequestBody.swift
#	SessionSnodeKit/Models/SnodeRequest.swift
#	SessionSnodeKit/Models/SwarmSnode.swift
#	SessionSnodeKit/Models/UpdateExpiryAllRequest.swift
#	SessionSnodeKit/Models/UpdateExpiryRequest.swift
#	SessionSnodeKit/Networking/OnionRequestAPI.swift
#	SessionSnodeKit/Networking/PreparedRequest+OnionRequest.swift
#	SessionSnodeKit/Networking/Request+SnodeAPI.swift
#	SessionSnodeKit/Networking/SnodeAPI.swift
#	SessionSnodeKit/Types/OnionRequestAPIError.swift
#	SessionSnodeKit/Types/SnodeAPIEndpoint.swift
#	SessionSnodeKit/Types/SnodeAPIError.swift
#	SessionSnodeKit/Types/SnodeAPINamespace.swift
#	SessionSnodeKit/Types/SwarmDrainBehaviour.swift
#	SessionSnodeKitTests/Models/SnodeRequestSpec.swift
#	SessionTests/Database/DatabaseSpec.swift
#	SessionUIKit/Style Guide/Values.swift
#	SessionUtilitiesKit/Database/Migrations/_005_AddJobUniqueHash.swift
#	SessionUtilitiesKit/Database/Models/Job.swift
#	SessionUtilitiesKit/Database/Types/Migration.swift
#	SessionUtilitiesKit/General/Data+Utilities.swift
#	SessionUtilitiesKit/General/Dependencies.swift
#	SessionUtilitiesKit/General/Features.swift
#	SessionUtilitiesKit/General/Logging.swift
#	SessionUtilitiesKit/JobRunner/JobRunner.swift
#	SessionUtilitiesKit/LibSession/Utilities/Crypto+SessionUtil.swift
#	SessionUtilitiesKit/LibSession/Utilities/TypeConversion+Utilities.swift
#	SessionUtilitiesKit/Networking/BatchRequest.swift
#	SessionUtilitiesKit/Networking/BatchResponse.swift
#	SessionUtilitiesKit/Networking/HTTP.swift
#	SessionUtilitiesKit/Networking/HTTPError.swift
#	SessionUtilitiesKit/Networking/PreparedRequest.swift
#	SessionUtilitiesKit/Networking/Request.swift
#	SessionUtilitiesKit/Networking/RequestTarget.swift
#	SessionUtilitiesKit/SessionUtil/Utilities/TypeConversion+Utilities.swift
#	SessionUtilitiesKit/Utilities/Bencode.swift
#	SessionUtilitiesKit/Utilities/JSONEncoder+Utilities.swift
#	SessionUtilitiesKitTests/JobRunner/JobRunnerSpec.swift
#	SessionUtilitiesKitTests/Networking/BatchRequestSpec.swift
#	SessionUtilitiesKitTests/Networking/BatchResponseSpec.swift
#	SessionUtilitiesKitTests/Networking/PreparedRequestSpec.swift
#	SessionUtilitiesKitTests/Networking/RequestSpec.swift
#	SessionUtilitiesKitTests/Utilities/BencodeResponseSpec.swift
#	SignalUtilitiesKit/Configuration.swift
#	SignalUtilitiesKit/Utilities/AppSetup.swift
#	SignalUtilitiesKit/Utilities/Bench.swift
#	SignalUtilitiesKit/Utilities/UIGestureRecognizer+OWS.swift
#	_SharedTestUtilities/CommonMockedExtensions.swift
#	_SharedTestUtilities/MockJobRunner.swift
#	_SharedTestUtilities/Mocked.swift
pull/894/head
Morgan Pretty 10 months ago
commit 8500e1f602

@ -1,38 +1,42 @@
// This build configuration requires the following to be installed:
// Git, Xcode, XCode Command-line Tools, Cocoapods, Xcbeautify, Xcresultparser, pip
// Git, Xcode, XCode Command-line Tools, Cocoapods, xcbeautify, xcresultparser, pip
// Log a bunch of version information to make it easier for debugging
local version_info = {
name: 'Version Information',
environment: { LANG: 'en_US.UTF-8' },
commands: [
'git --version',
'LANG=en_US.UTF-8 pod --version',
'pod --version',
'xcodebuild -version',
'xcbeautify --version'
]
'xcbeautify --version',
'xcresultparser --version',
'pip --version',
],
};
// Intentionally doing a depth of 2 as libSession-util has it's own submodules (and libLokinet likely will as well)
local clone_submodules = {
name: 'Clone Submodules',
commands: [ 'git submodule update --init --recursive --depth=2 --jobs=4' ]
commands: ['git submodule update --init --recursive --depth=2 --jobs=4'],
};
// cmake options for static deps mirror
local ci_dep_mirror(want_mirror) = (if want_mirror then ' -DLOCAL_MIRROR=https://oxen.rocks/deps ' else '');
// Cocoapods
//
//
// Unfortunately Cocoapods has a dumb restriction which requires you to use UTF-8 for the
// 'LANG' env var so we need to work around the with https://github.com/CocoaPods/CocoaPods/issues/6333
local install_cocoapods = {
name: 'Install CocoaPods',
environment: { LANG: 'en_US.UTF-8' },
commands: [
'LANG=en_US.UTF-8 pod install || (rm -rf ./Pods && LANG=en_US.UTF-8 pod install)'
'pod install || (rm -rf ./Pods && pod install)',
],
depends_on: [
'Load CocoaPods Cache'
]
'Load CocoaPods Cache',
],
};
// Load from the cached CocoaPods directory (to speed up the build)
@ -41,26 +45,26 @@ local load_cocoapods_cache = {
commands: [
|||
LOOP_BREAK=0
while test -e /Users/drone/.cocoapods_cache.lock; do
while test -e /Users/$USER/.cocoapods_cache.lock; do
sleep 1
LOOP_BREAK=$((LOOP_BREAK + 1))
if [[ $LOOP_BREAK -ge 600 ]]; then
rm -f /Users/drone/.cocoapods_cache.lock
rm -f /Users/$USER/.cocoapods_cache.lock
fi
done
|||,
'touch /Users/drone/.cocoapods_cache.lock',
'touch /Users/$USER/.cocoapods_cache.lock',
|||
if [[ -d /Users/drone/.cocoapods_cache ]]; then
cp -r /Users/drone/.cocoapods_cache ./Pods
if [[ -d /Users/$USER/.cocoapods_cache ]]; then
cp -r /Users/$USER/.cocoapods_cache ./Pods
fi
|||,
'rm -f /Users/drone/.cocoapods_cache.lock'
'rm -f /Users/$USER/.cocoapods_cache.lock',
],
depends_on: [
'Clone Submodules'
]
'Clone Submodules',
],
};
// Override the cached CocoaPods directory (to speed up the next build)
@ -69,26 +73,50 @@ local update_cocoapods_cache(depends_on) = {
commands: [
|||
LOOP_BREAK=0
while test -e /Users/drone/.cocoapods_cache.lock; do
while test -e /Users/$USER/.cocoapods_cache.lock; do
sleep 1
LOOP_BREAK=$((LOOP_BREAK + 1))
if [[ $LOOP_BREAK -ge 600 ]]; then
rm -f /Users/drone/.cocoapods_cache.lock
rm -f /Users/$USER/.cocoapods_cache.lock
fi
done
|||,
'touch /Users/drone/.cocoapods_cache.lock',
'touch /Users/$USER/.cocoapods_cache.lock',
|||
if [[ -d ./Pods ]]; then
rsync -a --delete ./Pods/ /Users/drone/.cocoapods_cache
rsync -a --delete ./Pods/ /Users/$USER/.cocoapods_cache
fi
|||,
'rm -f /Users/drone/.cocoapods_cache.lock'
'rm -f /Users/$USER/.cocoapods_cache.lock',
],
depends_on: depends_on,
};
local boot_simulator(device_type) = {
name: 'Boot Test Simulator',
commands: [
'devname="Test-iPhone-${DRONE_COMMIT:0:9}-${DRONE_BUILD_EVENT}"',
'xcrun simctl create "$devname" ' + device_type,
'sim_uuid=$(xcrun simctl list devices -je | jq -re \'[.devices[][] | select(.name == "\'$devname\'").udid][0]\')',
'xcrun simctl boot $sim_uuid',
'mkdir -p build/artifacts',
'echo $sim_uuid > ./build/artifacts/sim_uuid',
'echo $devname > ./build/artifacts/device_name',
'xcrun simctl list -je devices $sim_uuid | jq -r \'.devices[][0] | "\\u001b[32;1mSimulator " + .state + ": \\u001b[34m" + .name + " (\\u001b[35m" + .deviceTypeIdentifier + ", \\u001b[36m" + .udid + "\\u001b[34m)\\u001b[0m"\'',
],
};
local sim_keepalive = {
name: '(Simulator keep-alive)',
commands: [
'/Users/$USER/sim-keepalive/keepalive.sh $(<./build/artifacts/sim_uuid)',
],
depends_on: ['Boot Test Simulator'],
};
local sim_delete_cmd = 'if [ -f build/artifacts/sim_uuid ]; then rm -f /Users/$USER/sim-keepalive/$(<./build/artifacts/sim_uuid); fi';
[
// Unit tests (PRs only)
{
@ -96,42 +124,29 @@ local update_cocoapods_cache(depends_on) = {
type: 'exec',
name: 'Unit Tests',
platform: { os: 'darwin', arch: 'arm64' },
trigger: { event: { exclude: [ 'push' ] } },
trigger: { event: { exclude: ['push'] } },
steps: [
version_info,
clone_submodules,
load_cocoapods_cache,
install_cocoapods,
{
name: 'Clean Up Old Test Simulators',
commands: [
'./Scripts/clean-up-old-test-simulators.sh'
]
},
{
name: 'Pre-Boot Test Simulator',
commands: [
'mkdir -p build/artifacts',
'echo "Test-iPhone14-${DRONE_COMMIT:0:9}-${DRONE_BUILD_EVENT}" > ./build/artifacts/device_name',
'xcrun simctl create "$(<./build/artifacts/device_name)" com.apple.CoreSimulator.SimDeviceType.iPhone-14',
'echo $(xcrun simctl list devices | grep -m 1 $(<./build/artifacts/device_name) | grep -E -o -i "([0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12})") > ./build/artifacts/sim_uuid',
'xcrun simctl boot $(<./build/artifacts/sim_uuid)',
'echo "Pre-booting simulator complete: $(xcrun simctl list | sed "s/^[[:space:]]*//" | grep -o ".*$(<./build/artifacts/sim_uuid).*")"',
]
},
boot_simulator('com.apple.CoreSimulator.SimDeviceType.iPhone-15'),
sim_keepalive,
{
name: 'Build and Run Tests',
commands: [
'NSUnbufferedIO=YES set -o pipefail && xcodebuild test -workspace Session.xcworkspace -scheme Session -derivedDataPath ./build/derivedData -resultBundlePath ./build/artifacts/testResults.xcresult -parallelizeTargets -destination "platform=iOS Simulator,id=$(<./build/artifacts/sim_uuid)" -parallel-testing-enabled NO -test-timeouts-enabled YES -maximum-test-execution-time-allowance 10 -collect-test-diagnostics never 2>&1 | xcbeautify --is-ci',
],
depends_on: [
'Pre-Boot Test Simulator',
'Install CocoaPods'
'Boot Test Simulator',
'Install CocoaPods',
],
},
{
name: 'Unit Test Summary',
commands: [
sim_delete_cmd,
|||
if [[ -d ./build/artifacts/testResults.xcresult ]]; then
xcresultparser --output-format cli --failed-tests-only ./build/artifacts/testResults.xcresult
@ -142,8 +157,8 @@ local update_cocoapods_cache(depends_on) = {
],
depends_on: ['Build and Run Tests'],
when: {
status: ['failure', 'success']
}
status: ['failure', 'success'],
},
},
update_cocoapods_cache(['Build and Run Tests']),
{
@ -157,7 +172,7 @@ local update_cocoapods_cache(depends_on) = {
which codecovcli > ./build/artifacts/codecov_path
fi
|||,
'$(<./build/artifacts/codecov_path) --version'
'$(<./build/artifacts/codecov_path) --version',
],
},
{
@ -165,7 +180,7 @@ local update_cocoapods_cache(depends_on) = {
commands: [
'xcresultparser --output-format cobertura ./build/artifacts/testResults.xcresult > ./build/artifacts/coverage.xml',
],
depends_on: ['Build and Run Tests']
depends_on: ['Build and Run Tests'],
},
{
// No token needed for public repos
@ -175,8 +190,8 @@ local update_cocoapods_cache(depends_on) = {
],
depends_on: [
'Convert xcresult to xml',
'Install Codecov CLI'
]
'Install Codecov CLI',
],
},
],
},
@ -186,15 +201,15 @@ local update_cocoapods_cache(depends_on) = {
type: 'exec',
name: 'Check Build Artifact Existence',
platform: { os: 'darwin', arch: 'arm64' },
trigger: { event: { exclude: [ 'push' ] } },
trigger: { event: { exclude: ['push'] } },
steps: [
{
name: 'Poll for build artifact existence',
commands: [
'./Scripts/drone-upload-exists.sh'
]
}
]
'./Scripts/drone-upload-exists.sh',
],
},
],
},
// Simulator build (non-PRs only)
{
@ -202,7 +217,7 @@ local update_cocoapods_cache(depends_on) = {
type: 'exec',
name: 'Simulator Build',
platform: { os: 'darwin', arch: 'arm64' },
trigger: { event: { exclude: [ 'pull_request' ] } },
trigger: { event: { exclude: ['pull_request'] } },
steps: [
version_info,
clone_submodules,
@ -212,10 +227,10 @@ local update_cocoapods_cache(depends_on) = {
name: 'Build',
commands: [
'mkdir build',
'xcodebuild archive -workspace Session.xcworkspace -scheme Session -derivedDataPath ./build/derivedData -parallelizeTargets -configuration "App Store Release" -sdk iphonesimulator -archivePath ./build/Session_sim.xcarchive -destination "generic/platform=iOS Simulator" | xcbeautify --is-ci'
'NSUnbufferedIO=YES set -o pipefail && xcodebuild archive -workspace Session.xcworkspace -scheme Session -derivedDataPath ./build/derivedData -parallelizeTargets -configuration "App Store Release" -sdk iphonesimulator -archivePath ./build/Session_sim.xcarchive -destination "generic/platform=iOS Simulator" | xcbeautify --is-ci',
],
depends_on: [
'Install CocoaPods'
'Install CocoaPods',
],
},
update_cocoapods_cache(['Build']),
@ -223,11 +238,11 @@ local update_cocoapods_cache(depends_on) = {
name: 'Upload artifacts',
environment: { SSH_KEY: { from_secret: 'SSH_KEY' } },
commands: [
'./Scripts/drone-static-upload.sh'
'./Scripts/drone-static-upload.sh',
],
depends_on: [
'Build'
]
'Build',
],
},
],
},

3
.gitignore vendored

@ -30,3 +30,6 @@ Index/
# CocoaPods
Pods
# VSCode
.vscode

@ -1 +1 @@
Subproject commit 343cd41bb713cc6522b04e39e929b11b80d81f22
Subproject commit b66e54b25805a3edbf5c09fafa2c486b18766383

@ -8,15 +8,14 @@ install! 'cocoapods', :warn_for_unused_master_specs_repo => false
# Dependencies to be included in the app and all extensions/frameworks
abstract_target 'GlobalDependencies' do
pod 'GRDB.swift/SQLCipher'
# FIXME: Would be nice to migrate from CocoaPods to SwiftPackageManager (should allow us to speed up build time), haven't gone through all of the dependencies but currently unfortunately SQLCipher doesn't support SPM (for more info see: https://github.com/sqlcipher/sqlcipher/issues/371)
pod 'SQLCipher', '~> 4.5.3'
pod 'SQLCipher', '~> 4.5.7'
# FIXME: We are currently stuck at version '116.0.0' due to a linker issue described here: https://github.com/stasel/WebRTC/issues/83
pod 'WebRTC-lib', '116.0.0'
target 'Session' do
pod 'Reachability'
pod 'NVActivityIndicatorView'
pod 'YYImage/libwebp', git: 'https://github.com/signalapp/YYImage'
pod 'DifferenceKit'
@ -40,17 +39,7 @@ abstract_target 'GlobalDependencies' do
pod 'DifferenceKit'
end
target 'SignalUtilitiesKit' do
pod 'NVActivityIndicatorView'
pod 'Reachability'
pod 'SAMKeychain'
pod 'SwiftProtobuf', '~> 1.5.0'
pod 'YYImage/libwebp', git: 'https://github.com/signalapp/YYImage'
pod 'DifferenceKit'
end
target 'SessionMessagingKit' do
pod 'Reachability'
pod 'SAMKeychain'
pod 'SwiftProtobuf', '~> 1.5.0'
pod 'DifferenceKit'

@ -38,7 +38,6 @@ PODS:
- NVActivityIndicatorView/Base (5.2.0)
- OpenSSL-Universal (3.1.5004)
- Quick (7.5.0)
- Reachability (3.7.6)
- SAMKeychain (1.5.3)
- SignalCoreKit (1.0.0):
- CocoaLumberjack
@ -61,10 +60,9 @@ DEPENDENCIES:
- Nimble
- NVActivityIndicatorView
- Quick
- Reachability
- SAMKeychain
- SignalCoreKit (from `https://github.com/oxen-io/session-ios-core-kit`, commit `3acbfe5`)
- SQLCipher (~> 4.5.3)
- SQLCipher (~> 4.5.7)
- SwiftProtobuf (~> 1.5.0)
- WebRTC-lib (= 116.0.0)
- YYImage/libwebp (from `https://github.com/signalapp/YYImage`)
@ -84,7 +82,6 @@ SPEC REPOS:
- NVActivityIndicatorView
- OpenSSL-Universal
- Quick
- Reachability
- SAMKeychain
- SQLCipher
- SwiftProtobuf
@ -119,7 +116,6 @@ SPEC CHECKSUMS:
NVActivityIndicatorView: fe52a6a68664c2df8991d7d9e3d86d8d19453c53
OpenSSL-Universal: 0db2e81615ad95efc90ce13a638986858da38c0d
Quick: 2b651168441479b949ba987f3cee41a9cc53aa32
Reachability: fd0ecd23705e2599e4cceeb943222ae02296cbc6
SAMKeychain: 483e1c9f32984d50ca961e26818a534283b4cd5c
SignalCoreKit: 1fbd8732163ef76de16cd1107d1fa3684b607e5d
SQLCipher: 5e6bfb47323635c8b657b1b27d25c5f1baf63bf5
@ -127,6 +123,6 @@ SPEC CHECKSUMS:
WebRTC-lib: a7f14febc57a4bb334505ea33eb4f797ef9e3ac9
YYImage: f1ddd15ac032a58b78bbed1e012b50302d318331
PODFILE CHECKSUM: 05cf9cc64f43765bbe411901b641f1c66304993d
PODFILE CHECKSUM: b17d7f377bd712294ca1b396b8e4107048ba43cd
COCOAPODS: 1.15.2

@ -26,7 +26,7 @@
# request ever gets implemented: https://github.com/CocoaPods/CocoaPods/issues/8464
# Need to set the path or we won't find cmake
PATH=${PATH}:/usr/local/bin:/opt/local/bin:/opt/homebrew/bin:/sbin/md5
PATH=${PATH}:/usr/local/bin:/opt/local/bin:/opt/homebrew/bin:/opt/homebrew/opt/m4/bin:/sbin/md5
exec 3>&1 # Save original stdout
@ -103,6 +103,7 @@ echo "Checking for changes to source"
NEW_SOURCE_HASH=$(find "${SRCROOT}/LibSession-Util/src" -type f -exec md5 {} + | awk '{print $NF}' | sort | md5 | awk '{print $NF}')
NEW_HEADER_HASH=$(find "${SRCROOT}/LibSession-Util/include" -type f -exec md5 {} + | awk '{print $NF}' | sort | md5 | awk '{print $NF}')
NEW_EXTERNAL_HASH=$(find "${SRCROOT}/LibSession-Util/external" -type f -exec md5 {} + | awk '{print $NF}' | sort | md5 | awk '{print $NF}')
if [ -f "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_source_hash.log" ]; then
read -r OLD_SOURCE_HASH < "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_source_hash.log"
@ -112,19 +113,30 @@ if [ -f "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_header_hash.log" ];
read -r OLD_HEADER_HASH < "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_header_hash.log"
fi
if [ -f "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_external_hash.log" ]; then
read -r OLD_EXTERNAL_HASH < "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_external_hash.log"
fi
if [ -f "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_archs.log" ]; then
read -r OLD_ARCHS < "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_archs.log"
fi
# If all of the hashes match, the archs match and there is a library file then we can just stop here
if [ "${NEW_SOURCE_HASH}" == "${OLD_SOURCE_HASH}" ] && [ "${NEW_HEADER_HASH}" == "${OLD_HEADER_HASH}" ] && [ "${ARCHS[*]}" == "${OLD_ARCHS}" ] && [ -f "${TARGET_BUILD_DIR}/libSessionUtil/libSessionUtil.a" ]; then
echo "Build is up-to-date"
exit 0
# Check the current state of the build (comparing hashes to determine if there was a source change)
if [ "${NEW_SOURCE_HASH}" != "${OLD_SOURCE_HASH}" ]; then
echo "Build is not up-to-date (source change) - creating new build"
elif [ "${NEW_HEADER_HASH}" != "${OLD_HEADER_HASH}" ]; then
echo "Build is not up-to-date (header change) - creating new build"
elif [ "${NEW_EXTERNAL_HASH}" != "${OLD_EXTERNAL_HASH}" ]; then
echo "Build is not up-to-date (external lib change) - creating new build"
elif [ "${ARCHS[*]}" != "${OLD_ARCHS}" ]; then
echo "Build is not up-to-date (build architectures changed) - creating new build"
elif [ ! -f "${TARGET_BUILD_DIR}/libSessionUtil/libSessionUtil.a" ]; then
echo "Build is not up-to-date (no static lib) - creating new build"
else
echo "Build is up-to-date"
exit 0
fi
# If any of the above differ then we need to rebuild
echo "Build is not up-to-date - creating new build"
# Import settings from XCode (defaulting values if not present)
VALID_SIM_ARCHS=(arm64 x86_64)
VALID_DEVICE_ARCHS=(arm64)
@ -170,14 +182,21 @@ fi
# Remove any old build logs (since we are doing a new build)
rm -rf "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_output.log"
submodule_check=ON
if [ "$CONFIGURATION" == "Debug" ]; then
submodule_check=OFF
fi
# Build the individual architectures
for i in "${!TARGET_ARCHS[@]}"; do
build="${TARGET_BUILD_DIR}/libSessionUtil/${TARGET_ARCHS[$i]}"
platform="${TARGET_PLATFORMS[$i]}"
log_file="${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_output.log"
echo "Building ${TARGET_ARCHS[$i]} for $platform in $build"
# Redirect the build output to a log file and only include the progress lines in the XCode output
exec > >(tee "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_output.log" | grep --line-buffered '^\[.*%\]') 2>&1
exec > >(tee "$log_file" | grep --line-buffered '^\[.*%\]') 2>&1
cd "${SRCROOT}/LibSession-Util"
env -i PATH="$PATH" SDKROOT="$(xcrun --sdk macosx --show-sdk-path)" \
@ -187,8 +206,10 @@ for i in "${!TARGET_ARCHS[@]}"; do
-DDEPLOYMENT_TARGET=$IPHONEOS_DEPLOYMENT_TARGET \
-DENABLE_BITCODE=$ENABLE_BITCODE \
-DBUILD_TESTS=OFF \
-DBUILD_STATIC_DEPS=ON
-DBUILD_STATIC_DEPS=ON \
-DENABLE_VISIBILITY=ON \
-DSUBMODULE_CHECK=$submodule_check
# Capture the exit status of the ./utils/static-bundle.sh command
EXIT_STATUS=$?
@ -197,17 +218,36 @@ for i in "${!TARGET_ARCHS[@]}"; do
echo ""
exec 1>&3
# Retrieve and log any submodule errors/warnings
ALL_CMAKE_ERROR_LINES=($(grep -nE "CMake Error" "$log_file" | cut -d ":" -f 1))
ALL_SUBMODULE_ISSUE_LINES=($(grep -nE "\s*Submodule '([^']+)' is not up-to-date" "$log_file" | cut -d ":" -f 1))
ALL_CMAKE_ERROR_LINES_STR=" ${ALL_CMAKE_ERROR_LINES[*]} "
ALL_SUBMODULE_ISSUE_LINES_STR=" ${ALL_SUBMODULE_ISSUE_LINES[*]} "
for i in "${!ALL_SUBMODULE_ISSUE_LINES[@]}"; do
line="${ALL_SUBMODULE_ISSUE_LINES[$i]}"
prev_line=$((line - 1))
value=$(sed "${line}q;d" "$log_file" | sed -E "s/.*Submodule '([^']+)'.*/Submodule '\1' is not up-to-date./")
if [[ "$ALL_CMAKE_ERROR_LINES_STR" == *" $prev_line "* ]]; then
echo "error: $value"
else
echo "warning: $value"
fi
done
if [ $EXIT_STATUS -ne 0 ]; then
ALL_ERROR_LINES=($(grep -n "error:" "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_output.log" | cut -d ":" -f 1))
ALL_ERROR_LINES=($(grep -n "error:" "$log_file" | cut -d ":" -f 1))
# Log any other errors
for e in "${!ALL_ERROR_LINES[@]}"; do
error_line="${ALL_ERROR_LINES[$e]}"
error=$(sed "${error_line}q;d" "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_output.log")
error=$(sed "${error_line}q;d" "$log_file")
# If it was a CMake Error then the actual error will be on the next line so we want to append that info
if [[ $error == *'CMake Error'* ]]; then
actual_error_line=$((error_line + 1))
error="${error}$(sed "${actual_error_line}q;d" "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_output.log")"
error="${error}$(sed "${actual_error_line}q;d" "$log_file")"
fi
# Exclude the 'ALL_ERROR_LINES' line and the 'grep' line
@ -245,6 +285,7 @@ fi
# Save the updated hashes to disk to prevent rebuilds when there were no changes
echo "${NEW_SOURCE_HASH}" > "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_source_hash.log"
echo "${NEW_HEADER_HASH}" > "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_header_hash.log"
echo "${NEW_EXTERNAL_HASH}" > "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_external_hash.log"
echo "${ARCHS[*]}" > "${TARGET_BUILD_DIR}/libSessionUtil/libsession_util_archs.log"
echo "Build complete"

@ -0,0 +1,59 @@
# Xcode simulator keepalive/cleanup
Keep-alive directory for simulators managed by xcode that may be created during
drone CI jobs.
These scripts are placed in a /Users/$USER/sim-keepalive directory; keepalive.sh
is called from a CI job to set up a keepalive, while cleanup.py is intended to
be run once/minute via cron to deal with cleaning up old simulators from killed
CI pipelines.
The directory itself will have files created that look like a UDID and are
checked periodically (by cleanup.py); any that have a timestamp less than the
current time will be deleted.
## Simple timeout
A CI job can invoke the keepalive.sh script with a UDID value and a time
interval: the keepalive script will set up a file that will keep the simulator
alive for the given interval, then deletes it once the interval is passed. The
script exits immediately in this mode. Shortly (up to a minute) after the
timestamp is reached the simulator device will be deleted (if it still exists).
For example:
/Users/$USER/sim-keepalive/keepalive.sh $udid "5 minutes"
for a fixed 5-minute cleanup timeout.
## Indefinite timeout
For a job where the precise time required isn't known or varies significantly
there is a script in this directory that provides a simple keep-alive script
that will create and periodically update the $udid file to keep the simulator
alive.
This is moderately more complex to set up as you must add a parallel job (using
`depends_on`) to the CI pipeline that runs the script for the duration of the
steps that require the simulator:
/Users/$USER/sim-keepalive/keepalive.sh $udid
the script periodically touches the sim-keepalive/$udid to keep the simulator
alive as long as the keep alive script runs. To stop the keepalive (i.e. when
the task is done) simply run:
rm /Users/$USER/sim-keepalive/$udid
which will cause the keepalive script to immediately shut down the simulator
with the given UDID and then exits the keepalive script.
If the pipeline gets killed, the keepalive script stops updating the file and
the simulator will be killed by the periodic cleanup within the next couple
minutes.
# crontab entry
A crontab entry must be added to run the CI user's crontab to periodically run
cleanup.py:
* * * * * ~/sim-keepalive/cleanup.py

@ -0,0 +1,33 @@
#!/usr/bin/env python3
import os
import subprocess
import shutil
import time
import json
os.chdir(os.path.dirname(os.path.abspath(__file__)))
subprocess.run(["xcrun", "simctl", "delete", "unavailable"], check=True)
simctl_list = json.loads(subprocess.run(["xcrun", "simctl", "list", "devices", "-je"], check=True, stdout=subprocess.PIPE).stdout)
now = time.time()
for rt, devs in simctl_list.get("devices", {}).items():
for dev in devs:
udid = dev["udid"]
nuke_it = False
if os.path.isfile(udid):
if os.path.getmtime(udid) <= now:
nuke_it = True
os.remove(udid)
# else the keepalive file is still active
elif os.path.getmtime(dev["dataPath"]) <= now - 3600:
# no keep-alive and more than an hour old so kill it
nuke_it = True
if nuke_it:
subprocess.run(["xcrun", "simctl", "delete", udid])
if os.path.exists(dev["logPath"]):
shutil.rmtree(dev["logPath"])

@ -0,0 +1,82 @@
#!/usr/bin/env bash
set -e
if ! [[ "$1" =~ ^[0-9a-fA-F]{8}(-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}$ ]]; then
echo "Error: expected single UDID argument. Usage: $0 XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX" >&2
exit 1
fi
UDID=$1
cd $(gdirname $(greadlink -f $0))
reset="\e[0m"
red="\e[31;1m"
green="\e[32;1m"
yellow="\e[33;1m"
blue="\e[34;1m"
cyan="\e[36;1m"
if [ -n "$2" ]; then
gtouch --date "$2" $UDID
echo -e "\n${green}Started a $2 one-shot cleanup timer for device $cyan$UDID${reset}"
exit 0
fi
echo -e "\n${green}Starting keep-alive for device $cyan$UDID${reset}"
gtouch --date '30 seconds' $UDID
last_print=0
last_touch=$EPOCHSECONDS
started=$EPOCHSECONDS
function print_state() {
if ! xcrun simctl list -je devices $UDID |
jq -er '.devices[][] | "Current state: \u001b[32;1m" + .state + " \u001b[34m(" + .name + ", \u001b[35m" + .deviceTypeIdentifier + ", \u001b[36m" + .udid + "\u001b[34m)\u001b[0m"'; then
echo -e "Current state: $cyan$UDID ${red}not found$reset"
fi
}
while true; do
if [[ $EPOCHSECONDS -gt $((last_touch + 10)) ]]; then
last_touch=$EPOCHSECONDS
gtouch --no-create --date '30 seconds' $UDID
fi
if [ ! -f $UDID ]; then
echo -e "$cyan$UDID ${yellow}keep-alive file vanished${reset}"
if xcrun simctl list -je devices $UDID | jq -e "any(.devices.[][]; .)" >/dev/null; then
logdir="$(xcrun simctl list devices -je $UDID | jq '.devices[][0].logPath')"
echo -e "$blue ... shutting down device${reset}"
xcrun simctl shutdown $UDID
print_state
echo -e "$blue ... deleting device${reset}"
xcrun simctl delete $UDID
print_state
if [ "$logdir" != "null" ] && [ -d "$logdir" ]; then
echo -e "$blue ... deleting log directory $logdir${reset}"
rm -rf "$logdir"
fi
else
echo -e "\n${yellow}Device ${cyan}$UDID${yellow} no longer exists!${reset}"
fi
echo -e "\n${green}All done.${reset}"
exit 0
fi
if [[ $EPOCHSECONDS -gt $((last_print + 30)) ]]; then
last_print=$EPOCHSECONDS
print_state
fi
if [[ $EPOCHSECONDS -gt $((started + 7200)) ]]; then
echo -e "${red}2-hour timeout reached; exiting to allow cleanup${reset}"
fi
sleep 0.5
done

File diff suppressed because it is too large Load Diff

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
LastUpgradeVersion = "1520"
version = "1.8">
<BuildAction
parallelizeBuildables = "YES"
@ -34,6 +34,20 @@
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</BuildActionEntry>
<BuildActionEntry
buildForTesting = "YES"
buildForRunning = "NO"
buildForProfiling = "NO"
buildForArchiving = "NO"
buildForAnalyzing = "NO">
<BuildableReference
BuildableIdentifier = "primary"
BlueprintIdentifier = "FD7C37AD2BBB8B1D009DEEA7"
BuildableName = "SessionSnodeKitTests.xctest"
BlueprintName = "SessionSnodeKitTests"
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</BuildActionEntry>
</BuildActionEntries>
</BuildAction>
<TestAction
@ -117,6 +131,12 @@
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</CodeCoverageTargets>
<TestPlans>
<TestPlanReference
reference = "container:SessionTests/_Session.xctestplan"
default = "YES">
</TestPlanReference>
</TestPlans>
<Testables>
<TestableReference
skipped = "NO"
@ -166,6 +186,18 @@
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</TestableReference>
<TestableReference
skipped = "NO"
parallelizable = "YES"
testExecutionOrdering = "random">
<BuildableReference
BuildableIdentifier = "primary"
BlueprintIdentifier = "FD7C37AD2BBB8B1D009DEEA7"
BuildableName = "SessionSnodeKitTests.xctest"
BlueprintName = "SessionSnodeKitTests"
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</TestableReference>
</Testables>
</TestAction>
<LaunchAction

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
LastUpgradeVersion = "1520"
version = "1.3">
<BuildAction
parallelizeBuildables = "YES"

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
LastUpgradeVersion = "1520"
wasCreatedForAppExtension = "YES"
version = "2.0">
<BuildAction

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
LastUpgradeVersion = "1520"
wasCreatedForAppExtension = "YES"
version = "2.0">
<BuildAction

@ -1,7 +1,7 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
version = "1.3">
LastUpgradeVersion = "1520"
version = "1.7">
<BuildAction
parallelizeBuildables = "YES"
buildImplicitDependencies = "YES">
@ -20,20 +20,6 @@
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</BuildActionEntry>
<BuildActionEntry
buildForTesting = "YES"
buildForRunning = "NO"
buildForProfiling = "NO"
buildForArchiving = "NO"
buildForAnalyzing = "NO">
<BuildableReference
BuildableIdentifier = "primary"
BlueprintIdentifier = "FDB5DAF92A981C42002C8721"
BuildableName = "SessionSnodeKitTests.xctest"
BlueprintName = "SessionSnodeKitTests"
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</BuildActionEntry>
</BuildActionEntries>
</BuildAction>
<TestAction
@ -41,20 +27,12 @@
selectedDebuggerIdentifier = "Xcode.DebuggerFoundation.Debugger.LLDB"
selectedLauncherIdentifier = "Xcode.DebuggerFoundation.Launcher.LLDB"
shouldUseLaunchSchemeArgsEnv = "YES">
<Testables>
<TestableReference
skipped = "NO"
parallelizable = "YES"
testExecutionOrdering = "random">
<BuildableReference
BuildableIdentifier = "primary"
BlueprintIdentifier = "FDB5DAF92A981C42002C8721"
BuildableName = "SessionSnodeKitTests.xctest"
BlueprintName = "SessionSnodeKitTests"
ReferencedContainer = "container:Session.xcodeproj">
</BuildableReference>
</TestableReference>
</Testables>
<TestPlans>
<TestPlanReference
reference = "container:SessionSnodeKitTests/_SessionSnodeKit.xctestplan"
default = "YES">
</TestPlanReference>
</TestPlans>
</TestAction>
<LaunchAction
buildConfiguration = "Debug"

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
LastUpgradeVersion = "1520"
version = "1.3">
<BuildAction
parallelizeBuildables = "YES"

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<Scheme
LastUpgradeVersion = "1400"
LastUpgradeVersion = "1520"
version = "1.3">
<BuildAction
parallelizeBuildables = "YES"

@ -430,12 +430,16 @@ public final class SessionCall: CurrentCallProtocol, WebRTCSessionDelegate {
private func tryToReconnect() {
reconnectTimer?.invalidate()
guard SessionEnvironment.shared?.reachabilityManager.isReachable == true else {
reconnectTimer = Timer.scheduledTimerOnMainThread(withTimeInterval: 5, repeats: false) { _ in
self.tryToReconnect()
// Register a callback to get the current network status then remove it immediately as we only
// care about the current status
let networkStatusCallbackId: UUID = LibSession.onNetworkStatusChanged { [weak self] status in
guard status != .connected else { return }
self?.reconnectTimer = Timer.scheduledTimerOnMainThread(withTimeInterval: 5, repeats: false) { _ in
self?.tryToReconnect()
}
return
}
LibSession.removeNetworkChangedCallback(callbackId: networkStatusCallbackId)
let sessionId: String = self.sessionId
let webRTCSession: WebRTCSession = self.webRTCSession

@ -207,6 +207,7 @@ public final class SessionCallManager: NSObject, CallManagerProtocol {
// Stop all jobs except for message sending and when completed suspend the database
dependencies[singleton: .jobRunner].stopAndClearPendingJobs(exceptForVariant: .messageSend, using: dependencies) { [dependencies] in
Storage.suspendDatabaseAccess(using: dependencies)
LibSession.closeNetworkConnections()
}
}
}

@ -306,6 +306,7 @@ final class ContextMenuVC: UIViewController {
let ratio: CGFloat = (frame.width / frame.height)
// FIXME: Need to update this when an appropriate replacement is added (see https://teng.pub/technical/2021/11/9/uiapplication-key-window-replacement)
// FIXME: Still an issue in 04/2024 (see comments in https://stackoverflow.com/a/58031897 re. split screen or multi-window on iPad)
let topMargin = max((UIApplication.shared.keyWindow?.safeAreaInsets.top ?? 0), Values.mediumSpacing)
let bottomMargin = max((UIApplication.shared.keyWindow?.safeAreaInsets.bottom ?? 0), Values.mediumSpacing)
let diffY = finalFrame.height + menuHeight + Self.actionViewHeight + 2 * spacing + topMargin + bottomMargin - UIScreen.main.bounds.height

@ -176,6 +176,7 @@ extension ConversationVC:
let callVC = CallVC(for: call, using: viewModel.dependencies)
callVC.conversationVC = self
hideInputAccessoryView()
resignFirstResponder()
present(callVC, animated: true, completion: nil)
}
@ -991,7 +992,7 @@ extension ConversationVC:
) { [weak self, dependencies = viewModel.dependencies] _ in
dependencies[singleton: .storage].writeAsync { db in
try messageDisappearingConfig.save(db)
try SessionUtil
try LibSession
.update(
db,
sessionId: cellViewModel.threadId,
@ -1433,7 +1434,7 @@ extension ConversationVC:
guard cellViewModel.threadVariant == .community else { return }
viewModel.dependencies[singleton: .storage]
.readPublisher { [dependencies = viewModel.dependencies] db -> (HTTP.PreparedRequest<OpenGroupAPI.ReactionRemoveAllResponse>, OpenGroupAPI.PendingChange) in
.readPublisher { [dependencies = viewModel.dependencies] db -> (Network.PreparedRequest<OpenGroupAPI.ReactionRemoveAllResponse>, OpenGroupAPI.PendingChange) in
guard
let openGroup: OpenGroup = try? OpenGroup
.fetchOne(db, id: cellViewModel.threadId),
@ -1444,7 +1445,7 @@ extension ConversationVC:
.fetchOne(db)
else { throw StorageError.objectNotFound }
let preparedRequest: HTTP.PreparedRequest<OpenGroupAPI.ReactionRemoveAllResponse> = try OpenGroupAPI
let preparedRequest: Network.PreparedRequest<OpenGroupAPI.ReactionRemoveAllResponse> = try OpenGroupAPI
.preparedReactionDeleteAll(
db,
emoji: emoji,
@ -1529,7 +1530,7 @@ extension ConversationVC:
typealias OpenGroupInfo = (
pendingReaction: Reaction?,
pendingChange: OpenGroupAPI.PendingChange,
preparedRequest: HTTP.PreparedRequest<Int64?>
preparedRequest: Network.PreparedRequest<Int64?>
)
/// Perform the sending logic, we generate the pending reaction first in a deferred future closure to prevent the OpenGroup
@ -1621,7 +1622,7 @@ extension ConversationVC:
OpenGroupManager.doesOpenGroupSupport(db, capability: .reactions, on: openGroupServer)
else { throw MessageSenderError.invalidMessage }
let preparedRequest: HTTP.PreparedRequest<Int64?> = try {
let preparedRequest: Network.PreparedRequest<Int64?> = try {
guard !remove else {
return try OpenGroupAPI
.preparedReactionDelete(
@ -1808,7 +1809,7 @@ extension ConversationVC:
return
}
guard let (room, server, publicKey) = SessionUtil.parseCommunity(url: url) else {
guard let (room, server, publicKey) = LibSession.parseCommunity(url: url) else {
let errorModal: ConfirmationModal = ConfirmationModal(
info: ConfirmationModal.Info(
title: "COMMUNITY_ERROR_GENERIC".localized(),
@ -2119,6 +2120,20 @@ extension ConversationVC:
/// If we are just doing a local deletion then just trigger it (no need to show a loading indicator
guard !deletionBehaviours.isOnlyDeleteFromDatabase(at: selectedIndex) else {
dependencies[singleton: .storage].writeAsync { db in
/// Cancel any `messageSend` jobs related to the message we are deleting
let jobs: [Job] = (try? Job
.filter(Job.Columns.variant == Job.Variant.messageSend)
.filter(Job.Columns.interactionId == cellViewModel.id)
.fetchAll(db))
.defaulting(to: [])
jobs.forEach { JobRunner.removePendingJob($0) }
_ = try? Job
.filter(Job.Columns.variant == Job.Variant.messageSend)
.filter(Job.Columns.interactionId == cellViewModel.id)
.deleteAll(db)
_ = try Interaction
.filter(id: cellViewModel.id)
.deleteAll(db)
@ -2128,7 +2143,7 @@ extension ConversationVC:
}
return
}
/// Otherwise show the loading indicator and trigger the publisher
ModalActivityIndicatorViewController
.present(fromViewController: modal, canCancel: false) { viewController in
@ -2219,7 +2234,7 @@ extension ConversationVC:
cancelStyle: .alert_text,
onConfirm: { [weak self, dependencies = viewModel.dependencies] _ in
dependencies[singleton: .storage]
.readPublisher(using: dependencies) { db -> HTTP.PreparedRequest<NoResponse> in
.readPublisher(using: dependencies) { db -> Network.PreparedRequest<NoResponse> in
guard let openGroup: OpenGroup = try OpenGroup.fetchOne(db, id: threadId) else {
throw StorageError.objectNotFound
}
@ -2684,7 +2699,7 @@ extension ConversationVC {
return nil
}
@objc func acceptMessageRequest() {
func acceptMessageRequest() {
self.approveMessageRequestIfNeeded(
for: self.viewModel.threadData.threadId,
threadVariant: self.viewModel.threadData.threadVariant,
@ -2693,7 +2708,7 @@ extension ConversationVC {
)
}
@objc func deleteMessageRequest() {
func declineMessageRequest() {
let actions: [UIContextualAction]? = UIContextualAction.generateSwipeActions(
[.delete],
for: .trailing,
@ -2716,7 +2731,7 @@ extension ConversationVC {
})
}
@objc func blockMessageRequest() {
func blockMessageRequest() {
let actions: [UIContextualAction]? = UIContextualAction.generateSwipeActions(
[.block],
for: .trailing,

@ -9,7 +9,7 @@ import SessionMessagingKit
import SessionUtilitiesKit
import SignalUtilitiesKit
final class ConversationVC: BaseVC, SessionUtilRespondingViewController, ConversationSearchControllerDelegate, UITableViewDataSource, UITableViewDelegate {
final class ConversationVC: BaseVC, LibSessionRespondingViewController, ConversationSearchControllerDelegate, UITableViewDataSource, UITableViewDelegate {
private static let loadingHeaderHeight: CGFloat = 40
internal let viewModel: ConversationViewModel
@ -57,6 +57,7 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
/// from trying to animate (as the animations can cause buggy transitions)
var viewIsDisappearing = false
var viewIsAppearing = false
var lastPresentedViewController: UIViewController?
// Reaction
var currentReactionListSheet: ReactionListSheet?
@ -118,10 +119,11 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
// MARK: - UI
var lastKnownKeyboardFrame: CGRect?
var scrollButtonBottomConstraint: NSLayoutConstraint?
var scrollButtonMessageRequestsBottomConstraint: NSLayoutConstraint?
var messageRequestsViewBotomConstraint: NSLayoutConstraint?
var messageRequestDescriptionLabelBottomConstraint: NSLayoutConstraint?
lazy var titleView: ConversationTitleView = {
let result: ConversationTitleView = ConversationTitleView(using: viewModel.dependencies)
@ -161,6 +163,7 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
result.sectionFooterHeight = 0
result.dataSource = self
result.delegate = self
result.contentInsetAdjustmentBehavior = .never // We custom handle it to prevent bugs
return result
}()
@ -332,107 +335,21 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
self?.scrollToBottom(isAnimated: true)
}
result.alpha = 0
return result
}()
lazy var messageRequestBackgroundView: UIView = {
let result: UIView = UIView()
result.translatesAutoresizingMaskIntoConstraints = false
result.themeBackgroundColor = .backgroundPrimary
result.isHidden = messageRequestStackView.isHidden
return result
}()
lazy var messageRequestStackView: UIStackView = {
let result: UIStackView = UIStackView()
result.translatesAutoresizingMaskIntoConstraints = false
result.axis = .vertical
result.alignment = .fill
result.distribution = .fill
result.isHidden = (
self.viewModel.threadData.threadIsMessageRequest == false ||
self.viewModel.threadData.threadRequiresApproval == true
)
return result
}()
private lazy var messageRequestDescriptionContainerView: UIView = {
let result: UIView = UIView()
result.translatesAutoresizingMaskIntoConstraints = false
return result
}()
private lazy var messageRequestDescriptionLabel: UILabel = {
let result: UILabel = UILabel()
result.translatesAutoresizingMaskIntoConstraints = false
result.setContentCompressionResistancePriority(.required, for: .vertical)
result.font = UIFont.systemFont(ofSize: 12)
result.text = {
switch (self.viewModel.threadData.threadVariant, self.viewModel.threadData.threadRequiresApproval) {
case (.contact, false): return "MESSAGE_REQUESTS_INFO".localized()
case (.contact, true): return "MESSAGE_REQUEST_PENDING_APPROVAL_INFO".localized()
case (.group, _): return "GROUP_MESSAGE_REQUEST_INFO".localized()
default: return nil
}
}()
result.themeTextColor = .textSecondary
result.textAlignment = .center
result.numberOfLines = 0
return result
}()
private lazy var messageRequestActionStackView: UIStackView = {
let result: UIStackView = UIStackView()
result.translatesAutoresizingMaskIntoConstraints = false
result.axis = .horizontal
result.alignment = .fill
result.distribution = .fill
result.spacing = (UIDevice.current.isIPad ? Values.iPadButtonSpacing : 20)
return result
}()
private lazy var messageRequestAcceptButton: UIButton = {
let result: SessionButton = SessionButton(style: .bordered, size: .medium)
result.accessibilityLabel = "Accept message request"
result.accessibilityIdentifier = "Scroll button"
result.isAccessibilityElement = true
result.translatesAutoresizingMaskIntoConstraints = false
result.setTitle("TXT_DELETE_ACCEPT".localized(), for: .normal)
result.addTarget(self, action: #selector(acceptMessageRequest), for: .touchUpInside)
return result
}()
private lazy var messageRequestDeleteButton: UIButton = {
let result: SessionButton = SessionButton(style: .destructive, size: .medium)
result.accessibilityLabel = "Delete message request"
result.isAccessibilityElement = true
result.translatesAutoresizingMaskIntoConstraints = false
result.setTitle("TXT_DELETE_TITLE".localized(), for: .normal)
result.addTarget(self, action: #selector(deleteMessageRequest), for: .touchUpInside)
return result
}()
private lazy var messageRequestBlockButton: UIButton = {
let result: UIButton = UIButton()
result.accessibilityIdentifier = "Block"
result.accessibilityLabel = "Block message request"
result.translatesAutoresizingMaskIntoConstraints = false
result.clipsToBounds = true
result.titleLabel?.font = UIFont.boldSystemFont(ofSize: 16)
result.setTitle("TXT_BLOCK_USER_TITLE".localized(), for: .normal)
result.setThemeTitleColor(.danger, for: .normal)
result.addTarget(self, action: #selector(blockMessageRequest), for: .touchUpInside)
result.isHidden = (self.viewModel.threadData.threadVariant != .contact)
return result
}()
lazy var messageRequestFooterView: MessageRequestFooterView = MessageRequestFooterView(
threadVariant: self.viewModel.threadData.threadVariant,
canWrite: self.viewModel.threadData.canWrite,
threadIsMessageRequest: (self.viewModel.threadData.threadIsMessageRequest == true),
threadRequiresApproval: (self.viewModel.threadData.threadRequiresApproval == true),
onBlock: { [weak self] in self?.blockMessageRequest() },
onAccept: { [weak self] in self?.acceptMessageRequest() },
onDecline: { [weak self] in self?.declineMessageRequest() }
)
// MARK: - Settings
@ -506,39 +423,19 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
// Message requests view & scroll to bottom
view.addSubview(scrollButton)
view.addSubview(stateStackView)
view.addSubview(messageRequestBackgroundView)
view.addSubview(messageRequestStackView)
view.addSubview(messageRequestFooterView)
stateStackView.pin(.top, to: .top, of: view, withInset: 0)
stateStackView.pin(.leading, to: .leading, of: view, withInset: 0)
stateStackView.pin(.trailing, to: .trailing, of: view, withInset: 0)
messageRequestStackView.addArrangedSubview(messageRequestBlockButton)
messageRequestStackView.addArrangedSubview(messageRequestDescriptionContainerView)
messageRequestStackView.addArrangedSubview(messageRequestActionStackView)
messageRequestDescriptionContainerView.addSubview(messageRequestDescriptionLabel)
messageRequestActionStackView.addArrangedSubview(messageRequestAcceptButton)
messageRequestActionStackView.addArrangedSubview(messageRequestDeleteButton)
scrollButton.pin(.trailing, to: .trailing, of: view, withInset: -20)
messageRequestStackView.pin(.leading, to: .leading, of: view, withInset: 16)
messageRequestStackView.pin(.trailing, to: .trailing, of: view, withInset: -16)
self.messageRequestsViewBotomConstraint = messageRequestStackView.pin(.bottom, to: .bottom, of: view, withInset: -16)
messageRequestFooterView.pin(.leading, to: .leading, of: view, withInset: 16)
messageRequestFooterView.pin(.trailing, to: .trailing, of: view, withInset: -16)
self.messageRequestsViewBotomConstraint = messageRequestFooterView.pin(.bottom, to: .bottom, of: view, withInset: -16)
self.scrollButtonBottomConstraint = scrollButton.pin(.bottom, to: .bottom, of: view, withInset: -16)
self.scrollButtonBottomConstraint?.isActive = false // Note: Need to disable this to avoid a conflict with the other bottom constraint
self.scrollButtonMessageRequestsBottomConstraint = scrollButton.pin(.bottom, to: .top, of: messageRequestStackView, withInset: -4)
messageRequestDescriptionLabel.pin(.top, to: .top, of: messageRequestDescriptionContainerView, withInset: 4)
messageRequestDescriptionLabel.pin(.leading, to: .leading, of: messageRequestDescriptionContainerView, withInset: 20)
messageRequestDescriptionLabel.pin(.trailing, to: .trailing, of: messageRequestDescriptionContainerView, withInset: -20)
self.messageRequestDescriptionLabelBottomConstraint = messageRequestDescriptionLabel.pin(.bottom, to: .bottom, of: messageRequestDescriptionContainerView, withInset: -20)
messageRequestActionStackView.pin(.top, to: .bottom, of: messageRequestDescriptionContainerView)
messageRequestDeleteButton.set(.width, to: .width, of: messageRequestAcceptButton)
messageRequestBackgroundView.pin(.top, to: .top, of: messageRequestStackView)
messageRequestBackgroundView.pin(.leading, to: .leading, of: view)
messageRequestBackgroundView.pin(.trailing, to: .trailing, of: view)
messageRequestBackgroundView.pin(.bottom, to: .bottom, of: view)
self.scrollButtonMessageRequestsBottomConstraint = scrollButton.pin(.bottom, to: .top, of: messageRequestFooterView, withInset: -4)
// Unread count view
view.addSubview(unreadCountView)
@ -562,18 +459,6 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
selector: #selector(applicationDidResignActive(_:)),
name: UIApplication.didEnterBackgroundNotification, object: nil
)
NotificationCenter.default.addObserver(
self,
selector: #selector(handleKeyboardWillChangeFrameNotification(_:)),
name: UIResponder.keyboardWillChangeFrameNotification,
object: nil
)
NotificationCenter.default.addObserver(
self,
selector: #selector(handleKeyboardWillHideNotification(_:)),
name: UIResponder.keyboardWillHideNotification,
object: nil
)
NotificationCenter.default.addObserver(
self,
selector: #selector(sendScreenshotNotification),
@ -581,6 +466,24 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
object: nil
)
// Observe keyboard notifications
let keyboardNotifications: [Notification.Name] = [
UIResponder.keyboardWillShowNotification,
UIResponder.keyboardDidShowNotification,
UIResponder.keyboardWillChangeFrameNotification,
UIResponder.keyboardDidChangeFrameNotification,
UIResponder.keyboardWillHideNotification,
UIResponder.keyboardDidHideNotification
]
keyboardNotifications.forEach { notification in
NotificationCenter.default.addObserver(
self,
selector: #selector(handleKeyboardNotification(_:)),
name: notification,
object: nil
)
}
// The first time the view loads we should mark the thread as read (in case it was manually
// marked as unread) - doing this here means if we add a "mark as unread" action within the
// conversation settings then we don't need to worry about the conversation getting marked as
@ -622,12 +525,20 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
)?.becomeFirstResponder()
}
}
else if !self.isFirstResponder && hasLoadedInitialThreadData && lastPresentedViewController == nil {
// After we have loaded the initial data if the user starts and cancels the interactive pop
// gesture the input view will disappear (but if we are returning from a presented view controller
// the keyboard will automatically reappear and calling this will break the first responder state
// so don't do it in that case)
self.becomeFirstResponder()
}
recoverInputView { [weak self] in
// Flag that the initial layout has been completed (the flag blocks and unblocks a number
// of different behaviours)
self?.didFinishInitialLayout = true
self?.viewIsAppearing = false
self?.lastPresentedViewController = nil
}
}
@ -645,6 +556,7 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
}
viewIsDisappearing = true
lastPresentedViewController = self.presentedViewController
// Don't set the draft or resign the first responder if we are replacing the thread (want the keyboard
// to appear to remain focussed)
@ -674,7 +586,7 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
) &&
viewModel.threadData.threadIsNoteToSelf == false &&
viewModel.threadData.threadShouldBeVisible == false &&
!SessionUtil.conversationInConfig(
!LibSession.conversationInConfig(
threadId: threadId,
threadVariant: viewModel.threadData.threadVariant,
visibleOnly: false,
@ -740,7 +652,7 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
// nearest conversation list
let maybeTargetViewController: UIViewController? = self?.navigationController?
.viewControllers
.last(where: { ($0 as? SessionUtilRespondingViewController)?.isConversationList == true })
.last(where: { ($0 as? LibSessionRespondingViewController)?.isConversationList == true })
if let targetViewController: UIViewController = maybeTargetViewController {
self?.navigationController?.popToViewController(targetViewController, animated: true)
@ -849,9 +761,8 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
if
initialLoad ||
viewModel.threadData.threadVariant != updatedThreadData.threadVariant ||
viewModel.threadData.threadIsNoteToSelf != updatedThreadData.threadIsNoteToSelf ||
viewModel.threadData.threadIsBlocked != updatedThreadData.threadIsBlocked ||
viewModel.threadData.threadRequiresApproval != updatedThreadData.threadRequiresApproval ||
viewModel.threadData.threadIsMessageRequest != updatedThreadData.threadIsMessageRequest ||
viewModel.threadData.profile != updatedThreadData.profile
{
updateNavBarButtons(
@ -860,42 +771,26 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
initialIsNoteToSelf: viewModel.threadData.threadIsNoteToSelf,
initialIsBlocked: (viewModel.threadData.threadIsBlocked == true)
)
messageRequestDescriptionLabel.text = {
switch (updatedThreadData.threadVariant, updatedThreadData.threadRequiresApproval) {
case (.contact, false): return "MESSAGE_REQUESTS_INFO".localized()
case (.contact, true): return "MESSAGE_REQUEST_PENDING_APPROVAL_INFO".localized()
case (.group, _): return "GROUP_MESSAGE_REQUEST_INFO".localized()
default: return nil
}
}()
let messageRequestsViewWasVisible: Bool = (
messageRequestStackView.isHidden == false
)
}
if
initialLoad ||
viewModel.threadData.canWrite != updatedThreadData.canWrite ||
viewModel.threadData.threadVariant != updatedThreadData.threadVariant ||
viewModel.threadData.threadIsMessageRequest != updatedThreadData.threadIsMessageRequest ||
viewModel.threadData.threadRequiresApproval != updatedThreadData.threadRequiresApproval
{
let messageRequestsViewWasVisible: Bool = (self.messageRequestFooterView.isHidden == false)
UIView.animate(withDuration: 0.3) { [weak self] in
self?.messageRequestBlockButton.isHidden = (
(
self?.viewModel.threadData.threadVariant != .contact &&
self?.viewModel.threadData.threadVariant != .group
) ||
updatedThreadData.threadRequiresApproval == true
)
self?.messageRequestActionStackView.isHidden = (
updatedThreadData.threadRequiresApproval == true
self?.messageRequestFooterView.update(
threadVariant: updatedThreadData.threadVariant,
canWrite: updatedThreadData.canWrite,
threadIsMessageRequest: (updatedThreadData.threadIsMessageRequest == true),
threadRequiresApproval: (updatedThreadData.threadRequiresApproval == true)
)
self?.messageRequestStackView.isHidden = (
!updatedThreadData.canWrite || (
updatedThreadData.threadIsMessageRequest == false &&
updatedThreadData.threadRequiresApproval == false
)
)
self?.messageRequestBackgroundView.isHidden = (self?.messageRequestStackView.isHidden == true)
self?.messageRequestDescriptionLabelBottomConstraint?.constant = (updatedThreadData.threadRequiresApproval == true ? -4 : -20)
self?.scrollButtonMessageRequestsBottomConstraint?.isActive = (
self?.messageRequestStackView.isHidden == false
self?.messageRequestFooterView.isHidden == false
)
self?.scrollButtonBottomConstraint?.isActive = (
self?.scrollButtonMessageRequestsBottomConstraint?.isActive == false
@ -903,8 +798,8 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
// Update the table content inset and offset to account for
// the dissapearance of the messageRequestsView
if messageRequestsViewWasVisible != (self?.messageRequestStackView.isHidden == false) {
let messageRequestsOffset: CGFloat = ((self?.messageRequestStackView.bounds.height ?? 0) + 12)
if messageRequestsViewWasVisible != (self?.messageRequestFooterView.isHidden == false) {
let messageRequestsOffset: CGFloat = (self?.messageRequestFooterView.bounds.height ?? 0)
let oldContentInset: UIEdgeInsets = (self?.tableView.contentInset ?? UIEdgeInsets.zero)
self?.tableView.contentInset = UIEdgeInsets(
top: 0,
@ -1481,97 +1376,94 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
}
}
// MARK: - Notifications
// MARK: - Keyboard Avoidance
@objc func handleKeyboardWillChangeFrameNotification(_ notification: Notification) {
@objc func handleKeyboardNotification(_ notification: Notification) {
guard !viewIsDisappearing else { return }
guard
!viewIsDisappearing,
let userInfo: [AnyHashable: Any] = notification.userInfo,
var keyboardEndFrame: CGRect = userInfo[UIResponder.keyboardFrameEndUserInfoKey] as? CGRect
else { return }
// If reduce motion+crossfade transitions is on, in iOS 14 UIKit vends out a keyboard end frame
// of CGRect zero. This breaks the math below.
//
// If our keyboard end frame is CGRectZero, build a fake rect that's translated off the bottom edge.
if keyboardEndFrame == .zero {
keyboardEndFrame = CGRect(
x: UIScreen.main.bounds.minX,
y: UIScreen.main.bounds.maxY,
width: UIScreen.main.bounds.width,
height: 0
)
}
// No nothing if there was no change
let keyboardEndFrameConverted: CGRect = self.view.convert(keyboardEndFrame, from: nil)
guard keyboardEndFrameConverted != lastKnownKeyboardFrame else { return }
self.lastKnownKeyboardFrame = keyboardEndFrameConverted
// Please refer to https://github.com/mapbox/mapbox-navigation-ios/issues/1600
// and https://stackoverflow.com/a/25260930 to better understand what we are
// doing with the UIViewAnimationOptions
let userInfo: [AnyHashable: Any] = (notification.userInfo ?? [:])
let duration = ((userInfo[UIResponder.keyboardAnimationDurationUserInfoKey] as? TimeInterval) ?? 0)
let curveValue: Int = ((userInfo[UIResponder.keyboardAnimationCurveUserInfoKey] as? Int) ?? Int(UIView.AnimationOptions.curveEaseInOut.rawValue))
let options: UIView.AnimationOptions = UIView.AnimationOptions(rawValue: UInt(curveValue << 16))
let keyboardRect: CGRect = ((userInfo[UIResponder.keyboardFrameEndUserInfoKey] as? CGRect) ?? CGRect.zero)
// Calculate new positions (Need the ensure the 'messageRequestView' has been layed out as it's
// needed for proper calculations, so force an initial layout if it doesn't have a size)
var hasDoneLayout: Bool = true
if messageRequestStackView.bounds.height <= CGFloat.leastNonzeroMagnitude {
hasDoneLayout = false
UIView.performWithoutAnimation {
self.view.layoutIfNeeded()
}
}
let duration = ((userInfo[UIResponder.keyboardAnimationDurationUserInfoKey] as? TimeInterval) ?? 0)
let keyboardTop = (UIScreen.main.bounds.height - keyboardRect.minY)
let messageRequestsOffset: CGFloat = (messageRequestStackView.isHidden ? 0 : messageRequestStackView.bounds.height + 12)
let oldContentInset: UIEdgeInsets = tableView.contentInset
let newContentInset: UIEdgeInsets = UIEdgeInsets(
top: 0,
leading: 0,
bottom: (Values.mediumSpacing + keyboardTop + messageRequestsOffset),
trailing: 0
)
let newContentOffsetY: CGFloat = (tableView.contentOffset.y + (newContentInset.bottom - oldContentInset.bottom))
let changes = { [weak self] in
self?.scrollButtonBottomConstraint?.constant = -(keyboardTop + 12)
self?.messageRequestsViewBotomConstraint?.constant = -(keyboardTop + 12)
self?.tableView.contentInset = newContentInset
self?.tableView.contentOffset.y = newContentOffsetY
self?.updateScrollToBottom()
self?.view.setNeedsLayout()
self?.view.layoutIfNeeded()
}
// Perform the changes (don't animate if the initial layout hasn't been completed)
guard hasDoneLayout && didFinishInitialLayout && !viewIsAppearing else {
guard didFinishInitialLayout && !viewIsAppearing, duration > 0, !UIAccessibility.isReduceMotionEnabled else {
// UIKit by default (sometimes? never?) animates all changes in response to keyboard events.
// We want to suppress those animations if the view isn't visible,
// otherwise presentation animations don't work properly.
UIView.performWithoutAnimation {
changes()
self.updateKeyboardAvoidance()
}
return
}
UIView.animate(
withDuration: duration,
delay: 0,
options: options,
animations: changes,
completion: nil
)
}
@objc func handleKeyboardWillHideNotification(_ notification: Notification) {
// Please refer to https://github.com/mapbox/mapbox-navigation-ios/issues/1600
// and https://stackoverflow.com/a/25260930 to better understand what we are
// doing with the UIViewAnimationOptions
let userInfo: [AnyHashable: Any] = (notification.userInfo ?? [:])
let duration = ((userInfo[UIResponder.keyboardAnimationDurationUserInfoKey] as? TimeInterval) ?? 0)
let curveValue: Int = ((userInfo[UIResponder.keyboardAnimationCurveUserInfoKey] as? Int) ?? Int(UIView.AnimationOptions.curveEaseInOut.rawValue))
let options: UIView.AnimationOptions = UIView.AnimationOptions(rawValue: UInt(curveValue << 16))
let keyboardRect: CGRect = ((userInfo[UIResponder.keyboardFrameEndUserInfoKey] as? CGRect) ?? CGRect.zero)
let keyboardTop = (UIScreen.main.bounds.height - keyboardRect.minY)
UIView.animate(
withDuration: duration,
delay: 0,
options: options,
animations: { [weak self] in
self?.scrollButtonBottomConstraint?.constant = -(keyboardTop + 12)
self?.messageRequestsViewBotomConstraint?.constant = -(keyboardTop + 12)
self?.updateScrollToBottom()
self?.view.setNeedsLayout()
self?.updateKeyboardAvoidance()
self?.view.layoutIfNeeded()
},
completion: nil
)
}
private func updateKeyboardAvoidance() {
guard let lastKnownKeyboardFrame: CGRect = self.lastKnownKeyboardFrame else { return }
let messageRequestsOffset: CGFloat = (messageRequestFooterView.isHidden ? 0 :
messageRequestFooterView.bounds.height)
let viewIntersection = view.bounds.intersection(lastKnownKeyboardFrame)
let bottomOffset: CGFloat = (viewIntersection.isEmpty ? 0 : view.bounds.maxY - viewIntersection.minY)
let contentInsets = UIEdgeInsets(
top: 0,
left: 0,
bottom: bottomOffset + Values.mediumSpacing + messageRequestsOffset,
right: 0
)
let insetDifference: CGFloat = (contentInsets.bottom - tableView.contentInset.bottom)
scrollButtonBottomConstraint?.constant = -(bottomOffset + 12)
messageRequestsViewBotomConstraint?.constant = -bottomOffset
tableView.contentInset = contentInsets
tableView.scrollIndicatorInsets = contentInsets
// Only modify the contentOffset if we aren't at the bottom of the tableView, with a little
// buffer (if we are at the bottom then it'll automatically scroll for us and modifying the
// value will break things)
let tableViewBottom: CGFloat = (tableView.contentSize.height - tableView.bounds.height + tableView.contentInset.bottom)
if tableView.contentOffset.y < (tableViewBottom - 5) {
tableView.contentOffset.y += insetDifference
}
updateScrollToBottom()
}
// MARK: - General
@ -2240,7 +2132,7 @@ final class ConversationVC: BaseVC, SessionUtilRespondingViewController, Convers
}
}
// MARK: - SessionUtilRespondingViewController
// MARK: - LibSessionRespondingViewController
func isConversation(in threadIds: [String]) -> Bool {
return threadIds.contains(self.viewModel.threadData.threadId)

@ -89,6 +89,7 @@ public class ConversationViewModel: OWSAudioPlayerDelegate {
threadIsBlocked: Bool,
threadIsMessageRequest: Bool,
currentUserIsClosedGroupMember: Bool?,
currentUserIsClosedGroupAdmin: Bool?,
openGroupPermissions: OpenGroup.Permissions?,
blinded15SessionId: SessionId?,
blinded25SessionId: SessionId?
@ -141,13 +142,23 @@ public class ConversationViewModel: OWSAudioPlayerDelegate {
default: return false
}
}()
let currentUserIsClosedGroupMember: Bool? = (![.legacyGroup, .group].contains(threadVariant) ? nil :
let currentUserIsClosedGroupAdmin: Bool? = (![.legacyGroup, .group].contains(threadVariant) ? nil :
GroupMember
.filter(groupMember[.groupId] == threadId)
.filter(groupMember[.profileId] == userSessionId.hexString)
.filter(groupMember[.role] == GroupMember.Role.standard)
.filter(groupMember[.role] == GroupMember.Role.admin)
.isNotEmpty(db)
)
let currentUserIsClosedGroupMember: Bool? = {
guard [.legacyGroup, .group].contains(threadVariant) else { return nil }
guard currentUserIsClosedGroupAdmin != true else { return true }
return GroupMember
.filter(groupMember[.groupId] == threadId)
.filter(groupMember[.profileId] == currentUserPublicKey)
.filter(groupMember[.role] == GroupMember.Role.standard)
.isNotEmpty(db)
}()
let openGroupPermissions: OpenGroup.Permissions? = (threadVariant != .community ? nil :
try OpenGroup
.filter(id: threadId)
@ -174,6 +185,7 @@ public class ConversationViewModel: OWSAudioPlayerDelegate {
threadIsBlocked,
threadIsMessageRequest,
currentUserIsClosedGroupMember,
currentUserIsClosedGroupAdmin,
openGroupPermissions,
blinded15SessionId,
blinded25SessionId
@ -193,6 +205,7 @@ public class ConversationViewModel: OWSAudioPlayerDelegate {
threadIsMessageRequest: initialData?.threadIsMessageRequest,
threadIsBlocked: initialData?.threadIsBlocked,
currentUserIsClosedGroupMember: initialData?.currentUserIsClosedGroupMember,
currentUserIsClosedGroupAdmin: initialData?.currentUserIsClosedGroupAdmin,
openGroupPermissions: initialData?.openGroupPermissions
).populatingCurrentUserBlindedIds(
currentUserBlinded15SessionIdForThisThread: initialData?.blinded15SessionId?.hexString,

@ -140,8 +140,7 @@ class EmojiPickerCollectionView: UICollectionView {
func nameForSection(_ section: Int) -> String? {
guard section > 0 || !hasRecentEmoji else {
return NSLocalizedString("EMOJI_CATEGORY_RECENTS_NAME",
comment: "The name for the emoji category 'Recents'")
return "EMOJI_CATEGORY_RECENTS_NAME".localized()
}
guard let category = Emoji.Category.allCases[safe: section - categoryIndexOffset] else {
@ -301,7 +300,7 @@ extension EmojiPickerCollectionView: UICollectionViewDelegateFlowLayout {
}
private class EmojiCell: UICollectionViewCell {
static let reuseIdentifier = "EmojiCell"
static let reuseIdentifier = "EmojiCell" // stringlint:disable
let emojiLabel = UILabel()
@ -331,7 +330,7 @@ private class EmojiCell: UICollectionViewCell {
}
private class EmojiSectionHeader: UICollectionReusableView {
static let reuseIdentifier = "EmojiSectionHeader"
static let reuseIdentifier = "EmojiSectionHeader" // stringlint:disable
let label = UILabel()

@ -54,7 +54,7 @@ class DisappearingMessageTimerView: UIView {
}
private func updateIcon() {
let imageName: String = "disappearing_message_\(String(format: "%02d", 5 * self.progress))"
let imageName: String = "disappearing_message_\(String(format: "%02d", 5 * self.progress))" // stringlint:disable
self.iconImageView.image = UIImage(named: imageName)?.withRenderingMode(.alwaysTemplate)
}

@ -602,11 +602,11 @@ class ThreadDisappearingMessagesSettingsViewModel: SessionTableViewModel, Naviga
}
}
// Contacts & legacy closed groups need to update the SessionUtil
// Contacts & legacy closed groups need to update the LibSession
dependencies[singleton: .storage].writeAsync(using: dependencies) { [threadId, threadVariant, dependencies] db in
switch threadVariant {
case .contact:
try SessionUtil
try LibSession
.update(
db,
sessionId: threadId,
@ -615,7 +615,7 @@ class ThreadDisappearingMessagesSettingsViewModel: SessionTableViewModel, Naviga
)
case .legacyGroup:
try SessionUtil
try LibSession
.update(
db,
legacyGroupSessionId: threadId,

@ -785,7 +785,7 @@ class ThreadSettingsViewModel: SessionTableViewModel, NavigationItemSource, Navi
let publicKey: String = threadViewModel.openGroupPublicKey
else { return }
let communityUrl: String = SessionUtil.communityUrlFor(
let communityUrl: String = LibSession.communityUrlFor(
server: server,
roomToken: roomToken,
publicKey: publicKey
@ -826,7 +826,7 @@ class ThreadSettingsViewModel: SessionTableViewModel, NavigationItemSource, Navi
threadId: thread.id,
authorId: userInfo.profileId,
variant: .standardOutgoing,
timestampMs: SnodeAPI.currentOffsetTimestampMs(),
timestampMs: SnodeAPI.currentOffsetTimestampMs(using: dependencies),
expiresInSeconds: try? DisappearingMessagesConfiguration
.select(.durationSeconds)
.filter(id: userInfo.profileId)

@ -0,0 +1,178 @@
// Copyright © 2024 Rangeproof Pty Ltd. All rights reserved.
import UIKit
import SessionUIKit
class MessageRequestFooterView: UIView {
private var onBlock: (() -> ())?
private var onAccept: (() -> ())?
private var onDecline: (() -> ())?
// MARK: - UI
var messageRequestDescriptionLabelBottomConstraint: NSLayoutConstraint?
lazy var stackView: UIStackView = {
let result: UIStackView = UIStackView()
result.translatesAutoresizingMaskIntoConstraints = false
result.axis = .vertical
result.alignment = .fill
result.distribution = .fill
return result
}()
private lazy var descriptionContainerView: UIView = {
let result: UIView = UIView()
result.translatesAutoresizingMaskIntoConstraints = false
return result
}()
private lazy var descriptionLabel: UILabel = {
let result: UILabel = UILabel()
result.translatesAutoresizingMaskIntoConstraints = false
result.setContentCompressionResistancePriority(.required, for: .vertical)
result.font = UIFont.systemFont(ofSize: 12)
result.themeTextColor = .textSecondary
result.textAlignment = .center
result.numberOfLines = 0
result.accessibilityIdentifier = "Control message"
result.isAccessibilityElement = true
return result
}()
private lazy var actionStackView: UIStackView = {
let result: UIStackView = UIStackView()
result.translatesAutoresizingMaskIntoConstraints = false
result.axis = .horizontal
result.alignment = .fill
result.distribution = .fill
result.spacing = (UIDevice.current.isIPad ? Values.iPadButtonSpacing : 20)
return result
}()
private lazy var blockButton: UIButton = {
let result: UIButton = UIButton()
result.setCompressionResistanceHigh()
result.accessibilityLabel = "Block message request"
result.translatesAutoresizingMaskIntoConstraints = false
result.clipsToBounds = true
result.titleLabel?.font = UIFont.boldSystemFont(ofSize: 16)
result.setTitle("TXT_BLOCK_USER_TITLE".localized(), for: .normal)
result.setThemeTitleColor(.danger, for: .normal)
result.addTarget(self, action: #selector(block), for: .touchUpInside)
return result
}()
private lazy var acceptButton: UIButton = {
let result: SessionButton = SessionButton(style: .bordered, size: .medium)
result.accessibilityLabel = "Accept message request"
result.isAccessibilityElement = true
result.translatesAutoresizingMaskIntoConstraints = false
result.setTitle("TXT_DELETE_ACCEPT".localized(), for: .normal)
result.addTarget(self, action: #selector(accept), for: .touchUpInside)
return result
}()
private lazy var declineButton: UIButton = {
let result: SessionButton = SessionButton(style: .destructive, size: .medium)
result.accessibilityLabel = "Delete message request"
result.isAccessibilityElement = true
result.translatesAutoresizingMaskIntoConstraints = false
result.setTitle("TXT_DELETE_TITLE".localized(), for: .normal)
result.addTarget(self, action: #selector(decline), for: .touchUpInside)
return result
}()
// MARK: - Initialization
init(
threadVariant: SessionThread.Variant,
canWrite: Bool,
threadIsMessageRequest: Bool,
threadRequiresApproval: Bool,
onBlock: @escaping () -> (),
onAccept: @escaping () -> (),
onDecline: @escaping () -> ()
) {
super.init(frame: .zero)
self.onBlock = onBlock
self.onAccept = onAccept
self.onDecline = onDecline
self.themeBackgroundColor = .backgroundPrimary
update(
threadVariant: threadVariant,
canWrite: canWrite,
threadIsMessageRequest: threadIsMessageRequest,
threadRequiresApproval: threadRequiresApproval
)
setupLayout()
}
required init?(coder: NSCoder) {
fatalError("init(coder:) has not been implemented")
}
// MARK: - Layout
private func setupLayout() {
addSubview(stackView)
stackView.addArrangedSubview(blockButton)
stackView.addArrangedSubview(descriptionContainerView)
stackView.addArrangedSubview(actionStackView)
descriptionContainerView.addSubview(descriptionLabel)
actionStackView.addArrangedSubview(acceptButton)
actionStackView.addArrangedSubview(declineButton)
stackView.pin(.top, to: .top, of: self, withInset: 16)
stackView.pin(.leading, to: .leading, of: self, withInset: 16)
stackView.pin(.trailing, to: .trailing, of: self, withInset: -16)
stackView.pin(.bottom, to: .bottom, of: self, withInset: -16)
descriptionLabel.pin(.top, to: .top, of: descriptionContainerView, withInset: 4)
descriptionLabel.pin(.leading, to: .leading, of: descriptionContainerView, withInset: 20)
descriptionLabel.pin(.trailing, to: .trailing, of: descriptionContainerView, withInset: -20)
messageRequestDescriptionLabelBottomConstraint = descriptionLabel.pin(.bottom, to: .bottom, of: descriptionContainerView, withInset: -20)
actionStackView.pin(.top, to: .bottom, of: descriptionContainerView)
declineButton.set(.width, to: .width, of: acceptButton)
}
// MARK: - Content
func update(
threadVariant: SessionThread.Variant,
canWrite: Bool,
threadIsMessageRequest: Bool,
threadRequiresApproval: Bool
) {
self.isHidden = (!canWrite || (!threadIsMessageRequest && !threadRequiresApproval))
self.blockButton.isHidden = (
threadVariant != .contact ||
threadRequiresApproval
)
switch (threadVariant, threadRequiresApproval) {
case (.contact, false): self.descriptionLabel.text = "MESSAGE_REQUESTS_INFO".localized()
case (.contact, true): self.descriptionLabel.text = "MESSAGE_REQUEST_PENDING_APPROVAL_INFO".localized()
case (.group, _): self.descriptionLabel.text = "GROUP_MESSAGE_REQUEST_INFO".localized()
default: break
}
self.actionStackView.isHidden = threadRequiresApproval
self.messageRequestDescriptionLabelBottomConstraint?.constant = (threadRequiresApproval ? -4 : -20)
}
// MARK: - Actions
@objc private func block() { onBlock?() }
@objc private func accept() { onAccept?() }
@objc private func decline() { onDecline?() }
}

@ -1,3 +1,7 @@
// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
//
// stringlint:disable
import Foundation
import SignalCoreKit
import SessionUtilitiesKit

@ -9,7 +9,7 @@ import SessionUtilitiesKit
import SignalUtilitiesKit
import SignalCoreKit
class GlobalSearchViewController: BaseVC, SessionUtilRespondingViewController, UITableViewDelegate, UITableViewDataSource {
class GlobalSearchViewController: BaseVC, LibSessionRespondingViewController, UITableViewDelegate, UITableViewDataSource {
fileprivate typealias SectionModel = ArraySection<SearchSection, SessionThreadViewModel>
// MARK: - SearchSection
@ -20,7 +20,7 @@ class GlobalSearchViewController: BaseVC, SessionUtilRespondingViewController, U
case messages
}
// MARK: - SessionUtilRespondingViewController
// MARK: - LibSessionRespondingViewController
let isConversationList: Bool = true

@ -8,7 +8,7 @@ import SessionMessagingKit
import SessionUtilitiesKit
import SignalUtilitiesKit
final class HomeVC: BaseVC, SessionUtilRespondingViewController, UITableViewDataSource, UITableViewDelegate, SeedReminderViewDelegate {
final class HomeVC: BaseVC, LibSessionRespondingViewController, UITableViewDataSource, UITableViewDelegate, SeedReminderViewDelegate {
private static let loadingHeaderHeight: CGFloat = 40
public static let newConversationButtonSize: CGFloat = 60
@ -23,7 +23,7 @@ final class HomeVC: BaseVC, SessionUtilRespondingViewController, UITableViewData
private var isAutoLoadingNextPage: Bool = false
private var viewHasAppeared: Bool = false
// MARK: - SessionUtilRespondingViewController
// MARK: - LibSessionRespondingViewController
let isConversationList: Bool = true
@ -289,7 +289,7 @@ final class HomeVC: BaseVC, SessionUtilRespondingViewController, UITableViewData
}
// Onion request path countries cache
IP2Country.shared.populateCacheIfNeededAsync()
IP2Country.populateCacheIfNeededAsync()
}
override func viewWillAppear(_ animated: Bool) {

@ -214,7 +214,8 @@ final class NewDMVC: BaseVC, UIPageViewControllerDataSource, UIPageViewControlle
modalActivityIndicator.dismiss {
var message: String = {
switch error as? SnodeAPIError {
case .decryptionFailed, .hashingFailed, .validationFailed: return "\(error)"
case .onsDecryptionFailed, .onsHashingFailed, .onsValidationFailed:
return "\(error)"
default: return "DM_ERROR_INVALID".localized()
}
}()

@ -2,7 +2,6 @@
import UIKit
import Combine
import Reachability
import SignalUtilitiesKit
import SessionUIKit
import SignalCoreKit
@ -39,11 +38,12 @@ class GifPickerViewController: OWSViewController, UISearchBarDelegate, UICollect
var hasSelectedCell: Bool = false
var imageInfos = [GiphyImageInfo]()
private let kCellReuseIdentifier = "kCellReuseIdentifier"
private let kCellReuseIdentifier = "kCellReuseIdentifier" // stringlint:disable
var progressiveSearchTimer: Timer?
private var disposables: Set<AnyCancellable> = Set()
private var networkStatusCallbackId: UUID?
// MARK: - Initialization
@ -64,6 +64,7 @@ class GifPickerViewController: OWSViewController, UISearchBarDelegate, UICollect
}
deinit {
LibSession.removeNetworkChangedCallback(callbackId: networkStatusCallbackId)
NotificationCenter.default.removeObserver(self)
progressiveSearchTimer?.invalidate()
@ -78,15 +79,6 @@ class GifPickerViewController: OWSViewController, UISearchBarDelegate, UICollect
ensureCellState()
}
@objc func reachabilityChanged() {
AssertIsOnMainThread()
Logger.info("")
// Prod cells to try to load when connectivity changes.
ensureCellState()
}
func ensureCellState() {
for cell in self.collectionView.visibleCells {
guard let cell = cell as? GifPickerCell else {
@ -116,13 +108,14 @@ class GifPickerViewController: OWSViewController, UISearchBarDelegate, UICollect
navigationItem.titleView = titleLabel
createViews()
networkStatusCallbackId = LibSession.onNetworkStatusChanged { [weak self] _ in
DispatchQueue.main.async {
// Prod cells to try to load when connectivity changes.
self?.ensureCellState()
}
}
NotificationCenter.default.addObserver(
self,
selector: #selector(reachabilityChanged),
name: .reachabilityChanged,
object: nil
)
NotificationCenter.default.addObserver(
self,
selector: #selector(didBecomeActive),

@ -296,7 +296,7 @@ enum GiphyAPI {
let urlString = "/v1/gifs/trending?api_key=\(kGiphyApiKey)&limit=\(kGiphyPageSize)" // stringlint:disable
guard let url: URL = URL(string: "\(kGiphyBaseURL)\(urlString)") else {
return Fail(error: HTTPError.invalidURL)
return Fail(error: NetworkError.invalidURL)
.eraseToAnyPublisher()
}
@ -306,7 +306,7 @@ enum GiphyAPI {
Logger.error("search request failed: \(urlError)")
// URLError codes are negative values
return HTTPError.generic
return NetworkError.unknown
}
.map { data, _ in
Logger.debug("search request succeeded")
@ -336,15 +336,15 @@ enum GiphyAPI {
].joined()
)
else {
return Fail(error: HTTPError.invalidURL)
return Fail(error: NetworkError.invalidURL)
.eraseToAnyPublisher()
}
var request: URLRequest = URLRequest(url: url)
guard ContentProxy.configureProxiedRequest(request: &request) else {
owsFailDebug("Could not configure query: \(query).")
return Fail(error: HTTPError.generic)
SNLog("Could not configure query: \(query).")
return Fail(error: NetworkError.invalidPreparedRequest)
.eraseToAnyPublisher()
}
@ -354,13 +354,13 @@ enum GiphyAPI {
Logger.error("search request failed: \(urlError)")
// URLError codes are negative values
return HTTPError.generic
return NetworkError.unknown
}
.tryMap { data, _ -> [GiphyImageInfo] in
Logger.debug("search request succeeded")
guard let imageInfos = self.parseGiphyImages(responseData: data) else {
throw HTTPError.invalidResponse
throw NetworkError.invalidResponse
}
return imageInfos

@ -55,6 +55,8 @@ class AppDelegate: UIResponder, UIApplicationDelegate, UNUserNotificationCenterD
// Create AppEnvironment
AppEnvironment.shared.setup()
LibSession.addLogger()
LibSession.createNetworkIfNeeded()
// Update state of current call
if dependencies[singleton: .callManager].currentCall == nil {
@ -207,10 +209,14 @@ class AppDelegate: UIResponder, UIApplicationDelegate, UNUserNotificationCenterD
// but answers the call on another device
stopPollers(shouldStopUserPoller: !self.hasCallOngoing())
// FIXME: Move this to be initialised as part of `AppDelegate`
let dependencies: Dependencies = Dependencies()
// Stop all jobs except for message sending and when completed suspend the database
dependencies[singleton: .jobRunner].stopAndClearPendingJobs(exceptForVariant: .messageSend, using: dependencies) { [dependencies] in
if !self.hasCallOngoing() {
Storage.suspendDatabaseAccess(using: dependencies)
LibSession.closeNetworkConnections()
}
}
}
@ -291,6 +297,7 @@ class AppDelegate: UIResponder, UIApplicationDelegate, UNUserNotificationCenterD
if dependencies.hasInitialised(singleton: .appContext) && dependencies[singleton: .appContext].isInBackground {
Storage.suspendDatabaseAccess(using: dependencies)
LibSession.closeNetworkConnections()
}
SNLog("Background poll failed due to manual timeout")
@ -320,6 +327,7 @@ class AppDelegate: UIResponder, UIApplicationDelegate, UNUserNotificationCenterD
if dependencies.hasInitialised(singleton: .appContext) && dependencies[singleton: .appContext].isInBackground {
Storage.suspendDatabaseAccess(using: dependencies)
LibSession.closeNetworkConnections()
}
cancelTimer.invalidate()
@ -411,7 +419,6 @@ class AppDelegate: UIResponder, UIApplicationDelegate, UNUserNotificationCenterD
// May as well run these on the background thread
SessionEnvironment.shared?.audioSession.setup()
SessionEnvironment.shared?.reachabilityManager.setup()
}
private func showFailedStartupAlert(
@ -536,18 +543,24 @@ class AppDelegate: UIResponder, UIApplicationDelegate, UNUserNotificationCenterD
/// There is a _fun_ behaviour here where if the user launches the app, sends it to the background at the right time and then
/// opens it again the `AppReadiness` closures can be triggered before `applicationDidBecomeActive` has been
/// called again - this can result in odd behaviours so hold off on running this logic until it's properly called again
guard
Identity.userExists(using: dependencies) &&
dependencies[defaults: .appGroup, key: .isMainAppActive] == true
else { return }
guard dependencies[defaults: .appGroup, key: .isMainAppActive] == true else { return }
enableBackgroundRefreshIfNecessary()
dependencies[singleton: .jobRunner].appDidBecomeActive(using: dependencies)
startPollersIfNeeded()
if dependencies.hasInitialised(singleton: .appContext) && dependencies[singleton: .appContext].isMainApp {
handleAppActivatedWithOngoingCallIfNeeded()
/// There is a warning which can happen on launch because the Database read can be blocked by another database operation
/// which could result in this blocking the main thread, as a result we want to check the identity exists on a background thread
/// and then return to the main thread only when required
DispatchQueue.global(qos: .default).async { [weak self] in
guard Identity.userExists(using: dependencies) else { return }
self?.enableBackgroundRefreshIfNecessary()
dependencies[singleton: .jobRunner].appDidBecomeActive(using: dependencies)
self?.startPollersIfNeeded()
if dependencies.hasInitialised(singleton: .appContext) && dependencies[singleton: .appContext].isMainApp {
DispatchQueue.main.async {
self?.handleAppActivatedWithOngoingCallIfNeeded()
}
}
}
}
@ -898,9 +911,9 @@ private enum LifecycleMethod: Equatable {
var timingName: String {
switch self {
case .finishLaunching: return "Launch"
case .enterForeground: return "EnterForeground"
case .didBecomeActive: return "BecomeActive"
case .finishLaunching: return "Launch" // stringlint:disable
case .enterForeground: return "EnterForeground" // stringlint:disable
case .didBecomeActive: return "BecomeActive" // stringlint:disable
}
}

@ -1,4 +1,6 @@
// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
//
// stringlint:disable
import Foundation
import SessionUtilitiesKit
@ -7,6 +9,18 @@ import SignalCoreKit
import SessionMessagingKit
public class AppEnvironment {
enum ExtensionType {
case share
case notification
var name: String {
switch self {
case .share: return "ShareExtension"
case .notification: return "NotificationExtension"
}
}
}
private static var _shared: AppEnvironment = AppEnvironment()
@ -40,5 +54,80 @@ public class AppEnvironment {
fileLogger.rollingFrequency = kDayInterval // Refresh everyday
fileLogger.logFileManager.maximumNumberOfLogFiles = 3 // Save 3 days' log files
DDLog.add(fileLogger)
// The extensions write their logs to the app shared directory but the main app writes
// to a local directory (so they can be exported via XCode) - the below code reads any
// logs from the shared directly and attempts to add them to the main app logs to make
// debugging user issues in extensions easier
DispatchQueue.global(qos: .utility).async { [fileLogger] in
guard let currentLogFileInfo: DDLogFileInfo = fileLogger.currentLogFileInfo else {
return SNLog("Unable to retrieve current log file.")
}
DDLog.loggingQueue.async {
let extensionInfo: [(dir: String, type: ExtensionType)] = [
("\(OWSFileSystem.appSharedDataDirectoryPath())/Logs/NotificationExtension", .notification),
("\(OWSFileSystem.appSharedDataDirectoryPath())/Logs/ShareExtension", .share)
]
let extensionLogs: [(path: String, type: ExtensionType)] = extensionInfo.flatMap { dir, type -> [(path: String, type: ExtensionType)] in
guard let files: [String] = try? FileManager.default.contentsOfDirectory(atPath: dir) else { return [] }
return files.map { ("\(dir)/\($0)", type) }
}
do {
guard let fileHandle: FileHandle = FileHandle(forWritingAtPath: currentLogFileInfo.filePath) else {
throw StorageError.objectNotFound
}
// Ensure we close the file handle
defer { fileHandle.closeFile() }
// Move to the end of the file to insert the logs
if #available(iOS 13.4, *) { try fileHandle.seekToEnd() }
else { fileHandle.seekToEndOfFile() }
try extensionLogs
.grouped(by: \.type)
.forEach { type, value in
guard !value.isEmpty else { return } // Ignore if there are no logs
guard
let typeNameStartData: Data = "🧩 \(type.name) -- Start\n".data(using: .utf8),
let typeNameEndData: Data = "🧩 \(type.name) -- End\n".data(using: .utf8)
else { throw StorageError.invalidData }
var hasWrittenStartLog: Bool = false
// Write the logs
try value.forEach { path, _ in
let logData: Data = try Data(contentsOf: URL(fileURLWithPath: path))
guard !logData.isEmpty else { return } // Ignore empty files
// Write the type start separator if needed
if !hasWrittenStartLog {
if #available(iOS 13.4, *) { try fileHandle.write(contentsOf: typeNameStartData) }
else { fileHandle.write(typeNameStartData) }
hasWrittenStartLog = true
}
// Write the log data to the log file
if #available(iOS 13.4, *) { try fileHandle.write(contentsOf: logData) }
else { fileHandle.write(logData) }
// Extension logs have been writen to the app logs, remove them now
try? FileManager.default.removeItem(atPath: path)
}
// Write the type end separator if needed
if hasWrittenStartLog {
if #available(iOS 13.4, *) { try fileHandle.write(contentsOf: typeNameEndData) }
else { fileHandle.write(typeNameEndData) }
}
}
}
catch { SNLog("Unable to write extension logs to current log file") }
}
}
}
}

@ -1,24 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

@ -1,24 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIEDTCCAvWgAwIBAgIUaPiMYcZh7cZZfacCni2NwT5DKh4wDQYJKoZIhvcNAQEL
BQAwejELMAkGA1UEBhMCQVUxETAPBgNVBAgMCFZpY3RvcmlhMRIwEAYDVQQHDAlN
ZWxib3VybmUxJTAjBgNVBAoMHE94ZW4gUHJpdmFjeSBUZWNoIEZvdW5kYXRpb24x
HTAbBgNVBAMMFHNlZWQyLmdldHNlc3Npb24ub3JnMB4XDTIzMDQxMjEyNTY0NVoX
DTI1MDQxMTEyNTY0NVowejELMAkGA1UEBhMCQVUxETAPBgNVBAgMCFZpY3Rvcmlh
MRIwEAYDVQQHDAlNZWxib3VybmUxJTAjBgNVBAoMHE94ZW4gUHJpdmFjeSBUZWNo
IEZvdW5kYXRpb24xHTAbBgNVBAMMFHNlZWQyLmdldHNlc3Npb24ub3JnMIIBIjAN
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAh2UcfW0I+1QWRa3cj7RnMGelYkGK
7l4V6q7je1IkudXBNretkvVF1NCpfZ8dz72JmdGPJ5/uIEW15HDD2L63OmSDVPhA
2JCb/NqmXfeO91lyxgb0sDnN1UH0wzuS75aBjaQ0nXQV3ffmqKnNNv0HK+LTMFD+
Dv2yGDtZTWH6H3VzPLCvHHYXVdyuQHwchAcNQar5k4dbdEIcYIV+ANccPg7iQ81a
ITZ9bCeACdMqbB9gILq21KWdkxCu1fwSXs/B6n+U4UpJyv87fprvAyU3HqQhqlU7
dHnzA1dPn8D4a/3CMYZogVm8USNjv4HmWIwKbYDX+VahvuZwEi6+pwEurQIDAQAB
o4GKMIGHMB0GA1UdDgQWBBRxVM4+gFFipZFAg+Fs4x580js+2TAfBgNVHSMEGDAW
gBRxVM4+gFFipZFAg+Fs4x580js+2TAPBgNVHRMBAf8EBTADAQH/MB8GA1UdEQQY
MBaCFHNlZWQyLmdldHNlc3Npb24ub3JnMBMGA1UdJQQMMAoGCCsGAQUFBwMBMA0G
CSqGSIb3DQEBCwUAA4IBAQBIFj6hsOgNVr2kZufimTxoT1TE8uvycIWyt04q6/nP
8h33u/sHuNPdnr2UewqRyDRFefxrGlqBUQAQJVyzJGIlju/HTZaBnVB0H2smCRtK
ZRHAJ/cwcnAp+STjqgPqt1ZZ6JcfFwJZID4pPmrW8WaQNAtQPi2Ly2JLQ+Ym5wus
aGxGjbDRQSWGmUpg5TE+XdDsHeJtCl6HAEjvtXfq1uzKedRzmqYfIa8Rd7b2tmuy
dN27swR4DRJOK4rAxHnI8jt7GKVtPXnYfRuk2+0dVZ4CD6qHw+CO5mcdCabnflgT
XS8BYlOvkAyVbtmZNAacoUZvPRx3o186BMJoK2coQyFN
-----END CERTIFICATE-----

@ -1,24 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

@ -57,7 +57,7 @@
<true/>
<key>NSAppTransportSecurity</key>
<dict>
<key>NSAllowsArbitraryLoads</key>
<key>NSAllowsLocalNetworking</key>
<true/>
<key>NSExceptionDomains</key>
<dict>
@ -87,7 +87,7 @@
<key>NSCameraUsageDescription</key>
<string>Session needs camera access to take pictures and scan QR codes.</string>
<key>NSFaceIDUsageDescription</key>
<string>Session&apos;s Screen Lock feature uses Face ID.</string>
<string>Session's Screen Lock feature uses Face ID.</string>
<key>NSHumanReadableCopyright</key>
<string>com.loki-project.loki-messenger</string>
<key>NSMicrophoneUsageDescription</key>

@ -28,7 +28,7 @@ public struct SessionApp {
let versionInfo: [String] = [
"iOS \(UIDevice.current.systemVersion)",
appVersion,
"libSession: \(SessionUtil.libSessionVersion)",
"libSession: \(LibSession.libSessionVersion)",
commitInfo
].compactMap { $0 }
@ -122,7 +122,7 @@ public struct SessionApp {
Logger.error("")
DDLog.flushLog()
SessionUtil.clearMemoryState(using: dependencies)
LibSession.clearMemoryState(using: dependencies)
Storage.resetAllStorage(using: dependencies)
DisplayPictureManager.resetStorage(using: dependencies)
Attachment.resetAttachmentStorage()

@ -404,24 +404,6 @@ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLI
<key>Type</key>
<string>PSGroupSpecifier</string>
</dict>
<dict>
<key>FooterText</key>
<string>Copyright (c) 2011, Tony Million.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</string>
<key>Title</key>
<string>Reachability</string>
<key>Type</key>
<string>PSGroupSpecifier</string>
</dict>
<dict>
<key>FooterText</key>
<string>The MIT License (MIT)

@ -1,9 +1,6 @@
# See https://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html#runtime-suppressions
# for details.
# YapDatabase
bool:YapDatabaseAutoViewTransaction.m
# SocketRocket
bool:SRWebSocket.m

@ -38,8 +38,7 @@ public class NotificationActionHandler {
case .finished: break
case .failure(let error):
completionHandler()
owsFailDebug("error: \(error)")
Logger.error("error: \(error)")
SNLog(.error, "error: \(error)")
}
},
receiveValue: { _ in completionHandler() }
@ -58,14 +57,14 @@ public class NotificationActionHandler {
switch response.actionIdentifier {
case UNNotificationDefaultActionIdentifier:
Logger.debug("default action")
SNLog(.debug, "default action")
return showThread(userInfo: userInfo, using: dependencies)
.setFailureType(to: Error.self)
.eraseToAnyPublisher()
case UNNotificationDismissActionIdentifier:
// TODO - mark as read?
Logger.debug("dismissed notification")
SNLog(.debug, "dismissed notification")
return Just(())
.setFailureType(to: Error.self)
.eraseToAnyPublisher()

@ -109,13 +109,13 @@ public enum PushRegistrationError: Error {
*/
private var isSusceptibleToFailedPushRegistration: Bool {
// Only affects users who have disabled both: background refresh *and* notifications
guard DispatchQueue.main.sync(execute: { UIApplication.shared.backgroundRefreshStatus }) == .denied else {
return false
}
guard let notificationSettings = UIApplication.shared.currentUserNotificationSettings else {
return false
}
guard
let notificationSettings: UIUserNotificationSettings = DispatchQueue.main.sync(execute: {
guard UIApplication.shared.backgroundRefreshStatus == .denied else { return nil }
return UIApplication.shared.currentUserNotificationSettings
})
else { return false }
guard notificationSettings.types == [] else {
return false

@ -108,9 +108,25 @@ public enum SyncPushTokensJob: JobExecutor {
/// https://developer.apple.com/library/archive/documentation/NetworkingInternet/Conceptual/RemoteNotificationsPG/HandlingRemoteNotifications.html#//apple_ref/doc/uid/TP40008194-CH6-SW1
SNLog("[SyncPushTokensJob] Re-registering for remote notifications")
PushRegistrationManager.shared.requestPushTokens(using: dependencies)
.flatMap { (pushToken: String, voipToken: String) -> AnyPublisher<Void, Error> in
guard !dependencies[cache: .onionRequestAPI].paths.isEmpty else {
SNLog("[SyncPushTokensJob] OS subscription completed, skipping server subscription due to lack of paths")
.flatMap { (pushToken: String, voipToken: String) -> AnyPublisher<(String, String)?, Error> in
Deferred {
Future<(String, String)?, Error> { resolver in
_ = LibSession.onPathsChanged(skipInitialCallbackIfEmpty: true) { paths, pathsChangedId in
// Only listen for the first callback
LibSession.removePathsChangedCallback(callbackId: pathsChangedId)
guard !paths.isEmpty else {
SNLog("[SyncPushTokensJob] OS subscription completed, skipping server subscription due to lack of paths")
return resolver(Result.success(nil))
}
resolver(Result.success((pushToken, voipToken)))
}
}
}.eraseToAnyPublisher()
}
.flatMap { (tokenInfo: (String, String)?) -> AnyPublisher<Void, Error> in
guard let (pushToken, voipToken): (String, String) = tokenInfo else {
return Just(())
.setFailureType(to: Error.self)
.eraseToAnyPublisher()
@ -210,7 +226,7 @@ extension SyncPushTokensJob {
private func redact(_ string: String) -> String {
#if DEBUG
return string
return "[ DEBUG_NOT_REDACTED \(string) ]" // stringlint:disable
#else
return "[ READACTED \(string.prefix(2))...\(string.suffix(2)) ]" // stringlint:disable
#endif

@ -89,8 +89,8 @@ enum Onboarding {
/// If the user returns to an earlier screen during Onboarding we might need to clear out a partially created
/// account (eg. returning from the PN setting screen to the seed entry screen when linking a device)
func unregister(using dependencies: Dependencies) {
// Clear the in-memory state from SessionUtil
SessionUtil.clearMemoryState(using: dependencies)
// Clear the in-memory state from LibSession
LibSession.clearMemoryState(using: dependencies)
// Clear any data which gets set during Onboarding
dependencies[singleton: .storage].write { db in
@ -132,9 +132,13 @@ enum Onboarding {
x25519KeyPair: x25519KeyPair
)
// Create the initial shared util state (won't have been created on
// Create the initial libSession state (won't have been created on
// launch due to lack of ed25519 key)
SessionUtil.loadState(db, using: dependencies)
LibSession.loadState(
db,
userPublicKey: x25519KeyPair.publicKey,
ed25519SecretKey: ed25519KeyPair.secretKey
)
// No need to show the seed again if the user is restoring or linking
db[.hasViewedSeed] = (self == .recover || self == .link)
@ -187,7 +191,7 @@ enum Onboarding {
// Only continue if this isn't a new account
guard self != .register else { return }
// Fetch the profile name
// Fetch any existing profile name
Onboarding.profileNamePublisher
.subscribe(on: DispatchQueue.global(qos: .userInitiated), using: dependencies)
.sinkUntilComplete()
@ -217,10 +221,6 @@ enum Onboarding {
if !suppressDidRegisterNotification {
Identity.didRegister()
}
// Now that we have registered get the Snode pool (just in case) - other non-blocking
// launch jobs will automatically be run because the app activation was triggered
GetSnodePoolJob.run(onComplete: onComplete, using: dependencies)
}
}
}

@ -171,7 +171,7 @@ final class PNModeVC: BaseVC, OptionViewDelegate {
ModalActivityIndicatorViewController.present(fromViewController: self) { [weak self, flow = self.flow] viewController in
Onboarding.profileNamePublisher
.subscribe(on: DispatchQueue.global(qos: .userInitiated))
.timeout(.seconds(15), scheduler: DispatchQueue.main, customError: { HTTPError.timeout })
.timeout(.seconds(15), scheduler: DispatchQueue.main, customError: { NetworkError.timeout })
.catch { _ -> AnyPublisher<String?, Error> in
SNLog("Onboarding failed to retrieve existing profile information")
return Just(nil)

@ -164,7 +164,7 @@ final class JoinOpenGroupVC: BaseVC, UIPageViewControllerDataSource, UIPageViewC
fileprivate func joinOpenGroup(with urlString: String, onError: (() -> ())?) {
// A V2 open group URL will look like: <optional scheme> + <host> + <optional port> + <room> + <public key>
// The host doesn't parse if no explicit scheme is provided
guard let (room, server, publicKey) = SessionUtil.parseCommunity(url: urlString) else {
guard let (room, server, publicKey) = LibSession.parseCommunity(url: urlString) else {
showError(
title: "invalid_url".localized(),
message: "COMMUNITY_ERROR_INVALID_URL".localized(),

@ -1,7 +1,6 @@
// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
import UIKit
import Reachability
import SessionUIKit
import SessionSnodeKit
import SessionMessagingKit
@ -27,34 +26,13 @@ final class PathStatusView: UIView {
}
}
enum Status {
case unknown
case connecting
case connected
case error
var themeColor: ThemeValue {
switch self {
case .unknown: return .path_unknown
case .connecting: return .path_connecting
case .connected: return .path_connected
case .error: return .path_error
}
}
}
// MARK: - Initialization
private let size: Size
private let dependencies: Dependencies
private let reachability: Reachability? = SessionEnvironment.shared?.reachabilityManager.reachability
private var networkStatusCallbackId: UUID?
init(
size: Size = .small,
using dependencies: Dependencies = Dependencies()
) {
init(size: Size = .small) {
self.size = size
self.dependencies = dependencies
super.init(frame: .zero)
@ -64,7 +42,6 @@ final class PathStatusView: UIView {
required init?(coder: NSCoder) {
self.size = .small
self.dependencies = Dependencies()
super.init(coder: coder)
@ -73,8 +50,7 @@ final class PathStatusView: UIView {
}
deinit {
NotificationCenter.default.removeObserver(self)
dependencies.removeFeatureObserver(self)
LibSession.removeNetworkChangedCallback(callbackId: networkStatusCallbackId)
}
// MARK: - Layout
@ -84,35 +60,20 @@ final class PathStatusView: UIView {
layer.masksToBounds = false
self.set(.width, to: self.size.pointSize)
self.set(.height, to: self.size.pointSize)
switch (reachability?.isReachable(), dependencies[cache: .onionRequestAPI].paths.isEmpty) {
case (.some(false), _), (nil, _): setStatus(to: .error)
case (.some(true), true): setStatus(to: .connecting)
case (.some(true), false): setStatus(to: .connected)
}
}
// MARK: - Functions
private func registerObservers() {
NotificationCenter.default.addObserver(
self,
selector: #selector(reachabilityChanged),
name: .reachabilityChanged,
object: nil
)
dependencies.addFeatureObserver(self, for: .networkLayers, events: [.resetPaths, .buildingPaths, .pathsBuilt]) { [weak self] _, event in
switch event {
case .resetPaths: self?.setStatus(to: .unknown)
case .buildingPaths: self?.handleBuildingPathsNotification()
case .pathsBuilt: self?.handlePathsBuiltNotification()
default: break
// Register for status updates (will be called immediately with current status)
networkStatusCallbackId = LibSession.onNetworkStatusChanged { [weak self] status in
DispatchQueue.main.async {
self?.setStatus(to: status)
}
}
}
private func setStatus(to status: Status) {
private func setStatus(to status: LibSession.NetworkStatus) {
themeBackgroundColor = status.themeColor
layer.themeShadowColor = status.themeColor
layer.shadowOffset = CGSize(width: 0, height: 0.8)
@ -128,36 +89,15 @@ final class PathStatusView: UIView {
self?.layer.shadowRadius = (self?.size.offset(for: theme.interfaceStyle) ?? 0)
}
}
}
private func handleBuildingPathsNotification() {
guard reachability?.isReachable() == true else {
setStatus(to: .error)
return
}
setStatus(to: .connecting)
}
private func handlePathsBuiltNotification() {
guard reachability?.isReachable() == true else {
setStatus(to: .error)
return
}
setStatus(to: .connected)
}
@objc private func reachabilityChanged() {
guard Thread.isMainThread else {
DispatchQueue.main.async { [weak self] in self?.reachabilityChanged() }
return
public extension LibSession.NetworkStatus {
var themeColor: ThemeValue {
switch self {
case .unknown: return .path_unknown
case .connecting: return .path_connecting
case .connected: return .path_connected
case .disconnected: return .path_error
}
guard reachability?.isReachable() == true else {
setStatus(to: .error)
return
}
setStatus(to: (!dependencies[cache: .onionRequestAPI].paths.isEmpty ? .connected : .connecting))
}
}

@ -1,7 +1,6 @@
// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
import UIKit
import Reachability
import NVActivityIndicatorView
import SessionMessagingKit
import SessionUIKit
@ -13,24 +12,10 @@ final class PathVC: BaseVC {
public static let expandedDotSize: CGFloat = 16
private static let rowHeight: CGFloat = (isIPhone5OrSmaller ? 52 : 75)
// MARK: - Initialization
private let dependencies: Dependencies
init(using dependencies: Dependencies) {
self.dependencies = dependencies
super.init(nibName: nil, bundle: nil)
}
required init?(coder: NSCoder) {
fatalError("init(coder:) has not been implemented")
}
deinit {
dependencies.removeFeatureObserver(self)
}
private var pathUpdateId: UUID?
private var cacheUpdateId: UUID?
private var lastPath: Set<LibSession.Snode> = []
// MARK: - Components
private lazy var pathStackView: UIStackView = {
@ -69,12 +54,16 @@ final class PathVC: BaseVC {
// MARK: - Lifecycle
deinit {
LibSession.removeNetworkChangedCallback(callbackId: pathUpdateId)
IP2Country.removeCacheLoadedCallback(id: cacheUpdateId)
}
override func viewDidLoad() {
super.viewDidLoad()
setUpNavBar()
setUpViewHierarchy()
registerObservers()
}
private func setUpNavBar() {
@ -130,22 +119,26 @@ final class PathVC: BaseVC {
// Set up spacer constraints
topSpacer.heightAnchor.constraint(equalTo: bottomSpacer.heightAnchor).isActive = true
// Perform initial update
update()
}
private func registerObservers() {
dependencies.addFeatureObserver(self, for: .networkLayers) { [weak self] _, _ in
self?.update()
// Register for status updates (will be called immediately with current paths)
pathUpdateId = LibSession.onPathsChanged { [weak self] paths, _ in
DispatchQueue.main.async {
self?.update(paths: paths, force: false)
}
}
// Register for path country updates
cacheUpdateId = IP2Country.onCacheLoaded { [weak self] in
DispatchQueue.main.async {
self?.update(paths: (self?.lastPath.map { [$0] } ?? []), force: true)
}
}
}
// MARK: - Updating
private func update() {
pathStackView.arrangedSubviews.forEach { $0.removeFromSuperview() }
guard let pathToDisplay: [Snode] = Dependencies()[cache: .onionRequestAPI].paths.first else {
private func update(paths: [Set<LibSession.Snode>], force: Bool) {
guard let pathToDisplay: Set<LibSession.Snode> = paths.first else {
pathStackView.arrangedSubviews.forEach { $0.removeFromSuperview() }
spinner.startAnimating()
UIView.animate(withDuration: 0.25) {
@ -153,6 +146,11 @@ final class PathVC: BaseVC {
}
return
}
guard force || lastPath != pathToDisplay else { return }
// Cache the path that was used to avoid recreating the UI if not needed
lastPath = pathToDisplay
pathStackView.arrangedSubviews.forEach { $0.removeFromSuperview() }
let dotAnimationRepeatInterval = Double(pathToDisplay.count) + 2
let snodeRows: [UIStackView] = pathToDisplay.enumerated().map { index, snode in
@ -228,9 +226,9 @@ final class PathVC: BaseVC {
return stackView
}
private func getPathRow(snode: Snode, location: LineView.Location, dotAnimationStartDelay: Double, dotAnimationRepeatInterval: Double, isGuardSnode: Bool) -> UIStackView {
let country: String = (IP2Country.isInitialized ?
IP2Country.shared.countryNamesCache.wrappedValue[snode.ip].defaulting(to: "Resolving...") :
private func getPathRow(snode: LibSession.Snode, location: LineView.Location, dotAnimationStartDelay: Double, dotAnimationRepeatInterval: Double, isGuardSnode: Bool) -> UIStackView {
let country: String = (IP2Country.isInitialized.wrappedValue ?
IP2Country.countryNamesCache.wrappedValue[snode.ip].defaulting(to: "Resolving...") :
"Resolving..."
)
@ -264,7 +262,7 @@ private final class LineView: UIView {
private var dotViewWidthConstraint: NSLayoutConstraint!
private var dotViewHeightConstraint: NSLayoutConstraint!
private var dotViewAnimationTimer: Timer!
private let reachability: Reachability? = SessionEnvironment.shared?.reachabilityManager.reachability
private var networkStatusCallbackId: UUID?
enum Location {
case top, middle, bottom
@ -272,18 +270,10 @@ private final class LineView: UIView {
// MARK: - Initialization
private let dependencies: Dependencies
init(
location: Location,
dotAnimationStartDelay: Double,
dotAnimationRepeatInterval: Double,
using dependencies: Dependencies
) {
init(location: Location, dotAnimationStartDelay: Double, dotAnimationRepeatInterval: Double) {
self.location = location
self.dotAnimationStartDelay = dotAnimationStartDelay
self.dotAnimationRepeatInterval = dotAnimationRepeatInterval
self.dependencies = dependencies
super.init(frame: CGRect.zero)
@ -300,8 +290,7 @@ private final class LineView: UIView {
}
deinit {
NotificationCenter.default.removeObserver(self)
dependencies.removeFeatureObserver(self)
LibSession.removeNetworkChangedCallback(callbackId: networkStatusCallbackId)
dotViewAnimationTimer?.invalidate()
}
@ -362,27 +351,13 @@ private final class LineView: UIView {
self?.animate()
}
}
switch (reachability?.isReachable(), Dependencies()[cache: .onionRequestAPI].paths.isEmpty) {
case (.some(false), _), (nil, _): setStatus(to: .error)
case (.some(true), true): setStatus(to: .connecting)
case (.some(true), false): setStatus(to: .connected)
}
}
private func registerObservers() {
NotificationCenter.default.addObserver(
self,
selector: #selector(reachabilityChanged),
name: .reachabilityChanged,
object: nil
)
dependencies.addFeatureObserver(self, for: .networkLayers) { [weak self] _, event in
switch event {
case .buildingPaths: self?.handleBuildingPathsNotification()
case .pathsBuilt: self?.handlePathsBuiltNotification()
default: break
// Register for status updates (will be called immediately with current status)
networkStatusCallbackId = LibSession.onNetworkStatusChanged { [weak self] status in
DispatchQueue.main.async {
self?.setStatus(to: status)
}
}
}
@ -410,40 +385,8 @@ private final class LineView: UIView {
}
}
private func setStatus(to status: PathStatusView.Status) {
private func setStatus(to status: LibSession.NetworkStatus) {
dotView.themeBackgroundColor = status.themeColor
dotView.layer.themeShadowColor = status.themeColor
}
private func handleBuildingPathsNotification() {
guard reachability?.isReachable() == true else {
setStatus(to: .error)
return
}
setStatus(to: .connecting)
}
private func handlePathsBuiltNotification() {
guard reachability?.isReachable() == true else {
setStatus(to: .error)
return
}
setStatus(to: .connected)
}
@objc private func reachabilityChanged() {
guard Thread.isMainThread else {
DispatchQueue.main.async { [weak self] in self?.reachabilityChanged() }
return
}
guard reachability?.isReachable() == true else {
setStatus(to: .error)
return
}
setStatus(to: (!Dependencies()[cache: .onionRequestAPI].paths.isEmpty ? .connected : .connecting))
}
}

@ -170,8 +170,8 @@ final class NukeDataModal: Modal {
private func clearEntireAccount(presentedViewController: UIViewController) {
typealias PreparedClearRequests = (
deleteAll: HTTP.PreparedRequest<[String: Bool]>,
inboxRequestInfo: [HTTP.PreparedRequest<String>]
deleteAll: Network.PreparedRequest<[String: Bool]>,
inboxRequestInfo: [Network.PreparedRequest<String>]
)
ModalActivityIndicatorViewController
@ -201,7 +201,7 @@ final class NukeDataModal: Modal {
)
}
.subscribe(on: DispatchQueue.global(qos: .userInitiated), using: dependencies)
.flatMap { preparedRequests -> AnyPublisher<(HTTP.PreparedRequest<[String: Bool]>, [String]), Error> in
.flatMap { preparedRequests -> AnyPublisher<(Network.PreparedRequest<[String: Bool]>, [String]), Error> in
Publishers
.MergeMany(preparedRequests.inboxRequestInfo.map { $0.send(using: dependencies) })
.collect()
@ -301,7 +301,7 @@ final class NukeDataModal: Modal {
}
// Clear the Snode pool
SnodeAPI.clearSnodePool(using: dependencies)
LibSession.clearSnodeCache()
// Stop any pollers
(UIApplication.shared.delegate as? AppDelegate)?.stopPollers()

@ -27,6 +27,7 @@ final class SessionTableViewTitleView: UIView {
private lazy var titleLabel: UILabel = {
let result: UILabel = UILabel()
result.setContentCompressionResistancePriority(.required, for: .vertical)
result.font = .boldSystemFont(ofSize: Values.mediumFontSize)
result.themeTextColor = .textPrimary
result.lineBreakMode = .byTruncatingTail
@ -63,8 +64,12 @@ final class SessionTableViewTitleView: UIView {
addSubview(stackView)
stackView.pin([ UIView.HorizontalEdge.trailing, UIView.VerticalEdge.top, UIView.VerticalEdge.bottom ], to: self)
stackView.pin(.leading, to: .leading, of: self, withInset: 0)
// Note: We are intentionally letting the stackView go out of bounds because the title will clip
// in some cases when the subtitle wraps over 2 lines (this provides the extra space we need)
stackView.pin(.top, to: .top, of: self, withInset: -2)
stackView.pin(.leading, to: .leading, of: self)
stackView.pin(.trailing, to: .trailing, of: self)
stackView.pin(.bottom, to: .bottom, of: self, withInset: 2)
}
deinit {

@ -1,15 +1,17 @@
// Copyright © 2024 Rangeproof Pty Ltd. All rights reserved.
//
// stringlint:disable
import Foundation
import GRDB
import SessionSnodeKit
import SessionUtilitiesKit
final class IP2Country: Hashable {
static var isInitialized: Bool = false
static let shared: IP2Country = IP2Country()
private let instanceIdentifier: UUID = UUID()
private let dependencies: Dependencies
public var countryNamesCache: Atomic<[String: String]> = Atomic([:])
public enum IP2Country {
public static var isInitialized: Atomic<Bool> = Atomic(false)
public static var countryNamesCache: Atomic<[String: String]> = Atomic([:])
private static var cacheLoadedCallbacks: Atomic<[UUID: () -> ()]> = Atomic([:])
private static var pathsChangedCallbackId: Atomic<UUID?> = Atomic(nil)
// MARK: - Tables
/// This table has two columns: the "network" column and the "registered_country_geoname_id" column. The network column contains
@ -33,29 +35,53 @@ final class IP2Country: Hashable {
let data = try! Data(contentsOf: url)
return try! NSKeyedUnarchiver.unarchiveTopLevelObjectWithData(data) as! [String: [String]]
}()
// MARK: - Initialization
private init(using dependencies: Dependencies = Dependencies()) {
self.dependencies = dependencies
// MARK: - Implementation
static func onCacheLoaded(callback: @escaping () -> ()) -> UUID {
let id: UUID = UUID()
cacheLoadedCallbacks.mutate { $0[id] = callback }
return id
}
static func removeCacheLoadedCallback(id: UUID?) {
guard let id: UUID = id else { return }
dependencies.addFeatureObserver(self, for: .networkLayers, events: [.pathsBuilt]) { [weak self] _, _ in
self?.populateCacheIfNeededAsync()
cacheLoadedCallbacks.mutate { $0.removeValue(forKey: id) }
}
static func populateCacheIfNeededAsync() {
DispatchQueue.global(qos: .utility).async {
pathsChangedCallbackId.mutate { pathsChangedCallbackId in
guard pathsChangedCallbackId == nil else { return }
pathsChangedCallbackId = LibSession.onPathsChanged(callback: { paths, _ in
self.populateCacheIfNeeded(paths: paths)
})
}
}
}
deinit {
dependencies.removeFeatureObserver(self)
private static func populateCacheIfNeeded(paths: [Set<LibSession.Snode>]) {
guard !paths.isEmpty else { return }
countryNamesCache.mutate { cache in
paths.forEach { path in
path.forEach { snode in
self.cacheCountry(for: snode.ip, inCache: &cache)
}
}
}
isInitialized.mutate { $0 = true }
SNLog("Updated onion request path countries.")
}
// MARK: - Implementation
@discardableResult private func cacheCountry(for ip: String, inCache cache: inout [String: String]) -> String {
if let result: String = cache[ip] { return result }
let ipAsInt: Int = IPv4.toInt(ip)
private static func cacheCountry(for ip: String, inCache cache: inout [String: String]) {
guard cache[ip] == nil || cache[ip] == "Unknown Country" else { return }
guard
let ipAsInt: Int = IPv4.toInt(ip),
let ipv4TableIndex: Int = ipv4Table["network"]? // stringlint:disable
.firstIndex(where: { $0 > ipAsInt })
.map({ $0 - 1 }),
@ -64,34 +90,11 @@ final class IP2Country: Hashable {
.firstIndex(of: String(countryID)),
let result: String = countryNamesTable["country_name"]?[countryNamesTableIndex] // stringlint:disable
else {
return "Unknown Country" // Relies on the array being sorted
cache[ip] = "Unknown Country" // Relies on the array being sorted
return
}
cache[ip] = result
return result
}
@objc func populateCacheIfNeededAsync() {
DispatchQueue.global(qos: .utility).async { [weak self] in
self?.populateCacheIfNeeded()
}
}
@discardableResult func populateCacheIfNeeded(using dependencies: Dependencies = Dependencies()) -> Bool {
guard let pathToDisplay: [Snode] = dependencies[cache: .onionRequestAPI].paths.first else { return false }
countryNamesCache.mutate { [weak self] cache in
pathToDisplay.forEach { snode in
self?.cacheCountry(for: snode.ip, inCache: &cache) // Preload if needed
}
}
DispatchQueue.main.async {
IP2Country.isInitialized = true
dependencies.notifyObservers(for: .networkLayers, with: .onionRequestPathCountriesLoaded)
}
SNLog("Finished preloading onion request path countries.")
return true
}
// MARK: - Conformance

@ -17,6 +17,7 @@ enum _001_InitialSetupMigration: Migration {
InteractionAttachment.self, Quote.self, LinkPreview.self, ControlMessageProcessRecord.self,
ThreadTypingIndicator.self
]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
public static let fullTextSearchTokenizer: FTS5TokenizerDescriptor = {
// Define the tokenizer to be used in all the FTS tables

@ -14,6 +14,7 @@ enum _002_SetupStandardJobs: Migration {
static let minExpectedRunDuration: TimeInterval = 0.1
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
// Start by adding the jobs that don't have collections (in the jobs like these

@ -11,6 +11,7 @@ enum _003_YDBToGRDBMigration: Migration {
static let minExpectedRunDuration: TimeInterval = 0.1
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = [Identity.self]
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
guard

@ -13,6 +13,7 @@ enum _004_RemoveLegacyYDB: Migration {
static let minExpectedRunDuration: TimeInterval = 0.1
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
Storage.update(progress: 1, for: self, in: target, using: dependencies)

@ -12,6 +12,7 @@ enum _005_FixDeletedMessageReadState: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
_ = try Interaction

@ -13,6 +13,7 @@ enum _006_FixHiddenModAdminSupport: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [GroupMember.self]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
try db.alter(table: GroupMember.self) { t in

@ -12,6 +12,7 @@ enum _007_HomeQueryOptimisationIndexes: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
try db.create(

@ -12,6 +12,7 @@ enum _008_EmojiReacts: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [Reaction.self]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
try db.create(table: Reaction.self) { t in

@ -11,6 +11,7 @@ enum _009_OpenGroupPermission: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [OpenGroup.self]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
try db.alter(table: OpenGroup.self) { t in

@ -13,6 +13,7 @@ enum _010_AddThreadIdToFTS: Migration {
static let minExpectedRunDuration: TimeInterval = 3
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
// Can't actually alter a virtual table in SQLite so we need to drop and recreate it,

@ -13,6 +13,7 @@ enum _011_AddPendingReadReceipts: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [PendingReadReceipt.self]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
try db.create(table: PendingReadReceipt.self) { t in

@ -12,6 +12,7 @@ enum _012_AddFTSIfNeeded: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
// Fix an issue that the fullTextSearchTable was dropped unintentionally and global search won't work.

@ -20,6 +20,7 @@ enum _013_SessionUtilChanges: Migration {
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [
SessionThread.self, Profile.self, GroupMember.self, ClosedGroupKeyPair.self, ConfigDump.self
]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
// Add `markedAsUnread` to the thread table

@ -16,6 +16,7 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
OpenGroup.self, DisappearingMessagesConfiguration.self, GroupMember.self, ConfigDump.self
]
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
// If we have no ed25519 key then there is no need to create cached dump data
@ -28,7 +29,7 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
let userSessionId: SessionId = getUserSessionId(db, using: dependencies)
let timestampMs: Int64 = Int64(Date().timeIntervalSince1970 * 1000)
SessionUtil.loadState(db, using: dependencies)
LibSession.loadState(db, using: dependencies)
// Retrieve all threads (we are going to base the config dump data on the active
// threads rather than anything else in the database)
@ -41,14 +42,14 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
try dependencies[cache: .sessionUtil]
.config(for: .userProfile, sessionId: userSessionId)
.mutate { config in
try SessionUtil.update(
try LibSession.update(
profile: Profile.fetchOrCreateCurrentUser(db),
in: config
)
try SessionUtil.updateNoteToSelf(
try LibSession.updateNoteToSelf(
priority: {
guard allThreads[userSessionId.hexString]?.shouldBeVisible == true else { return SessionUtil.hiddenPriority }
guard allThreads[userSessionId.hexString]?.shouldBeVisible == true else { return LibSession.hiddenPriority }
return Int32(allThreads[userSessionId.hexString]?.pinnedPriority ?? 0)
}(),
@ -56,7 +57,7 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
)
if config.needsDump(using: dependencies) {
try SessionUtil
try LibSession
.createDump(
config: config,
for: .userProfile,
@ -93,7 +94,7 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
let threadIdsNeedingContacts: [String] = validContactIds
.filter { contactId in !contactsData.contains(where: { $0.contact.id == contactId }) }
try SessionUtil.upsert(
try LibSession.upsert(
contactData: contactsData
.appending(
contentsOf: threadIdsNeedingContacts
@ -105,13 +106,13 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
}
)
.map { data in
SessionUtil.SyncedContactInfo(
LibSession.SyncedContactInfo(
id: data.contact.id,
contact: data.contact,
profile: data.profile,
priority: {
guard allThreads[data.contact.id]?.shouldBeVisible == true else {
return SessionUtil.hiddenPriority
return LibSession.hiddenPriority
}
return Int32(allThreads[data.contact.id]?.pinnedPriority ?? 0)
@ -124,7 +125,7 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
)
if config.needsDump(using: dependencies) {
try SessionUtil
try LibSession
.createDump(
config: config,
for: .contacts,
@ -141,17 +142,17 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
try dependencies[cache: .sessionUtil]
.config(for: .convoInfoVolatile, sessionId: userSessionId)
.mutate { config in
let volatileThreadInfo: [SessionUtil.VolatileThreadInfo] = SessionUtil.VolatileThreadInfo
let volatileThreadInfo: [LibSession.VolatileThreadInfo] = LibSession.VolatileThreadInfo
.fetchAll(db, ids: Array(allThreads.keys))
try SessionUtil.upsert(
try LibSession.upsert(
convoInfoVolatileChanges: volatileThreadInfo,
in: config,
using: dependencies
)
if config.needsDump(using: dependencies) {
try SessionUtil
try LibSession
.createDump(
config: config,
for: .convoInfoVolatile,
@ -168,19 +169,19 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
try dependencies[cache: .sessionUtil]
.config(for: .userGroups, sessionId: userSessionId)
.mutate { config in
let legacyGroupData: [SessionUtil.LegacyGroupInfo] = try SessionUtil.LegacyGroupInfo.fetchAll(db)
let communityData: [SessionUtil.OpenGroupUrlInfo] = try SessionUtil.OpenGroupUrlInfo
let legacyGroupData: [LibSession.LegacyGroupInfo] = try LibSession.LegacyGroupInfo.fetchAll(db)
let communityData: [LibSession.OpenGroupUrlInfo] = try LibSession.OpenGroupUrlInfo
.fetchAll(db, ids: Array(allThreads.keys))
try SessionUtil.upsert(
try LibSession.upsert(
legacyGroups: legacyGroupData,
in: config,
using: dependencies
)
try SessionUtil.upsert(
try LibSession.upsert(
communities: communityData
.map { urlInfo in
SessionUtil.CommunityInfo(
LibSession.CommunityInfo(
urlInfo: urlInfo,
priority: Int32(allThreads[urlInfo.threadId]?.pinnedPriority ?? 0)
)
@ -190,7 +191,7 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
)
if config.needsDump(using: dependencies) {
try SessionUtil
try LibSession
.createDump(
config: config,
for: .userGroups,
@ -204,12 +205,12 @@ enum _014_GenerateInitialUserConfigDumps: Migration {
// MARK: - Threads
try SessionUtil.updatingThreads(db, Array(allThreads.values), using: dependencies)
try LibSession.updatingThreads(db, Array(allThreads.values), using: dependencies)
// MARK: - Syncing
// Enqueue a config sync job to ensure the generated configs get synced
db.afterNextTransactionNestedOnce(dedupeId: SessionUtil.syncDedupeId(userSessionId.hexString)) { db in
db.afterNextTransactionNestedOnce(dedupeId: LibSession.syncDedupeId(userSessionId.hexString)) { db in
ConfigurationSyncJob.enqueue(db, sessionIdHexString: userSessionId.hexString)
}

@ -10,11 +10,12 @@ enum _015_BlockCommunityMessageRequests: Migration {
static let identifier: String = "BlockCommunityMessageRequests" // stringlint:disable
static let needsConfigSync: Bool = false
static let minExpectedRunDuration: TimeInterval = 0.01
static var requirements: [MigrationRequirement] = [.sessionUtilStateLoaded]
static var requirements: [MigrationRequirement] = [.libSessionStateLoaded]
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = [
Identity.self, Setting.self
]
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [Profile.self]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
// Add the new 'Profile' properties
@ -31,7 +32,7 @@ enum _015_BlockCommunityMessageRequests: Migration {
let rawBlindedMessageRequestValue: Int32 = try dependencies[cache: .sessionUtil]
.config(for: .userProfile, sessionId: getUserSessionId(db, using: dependencies))
.wrappedValue
.map { config -> Int32 in try SessionUtil.rawBlindedMessageRequestValue(in: config) }
.map { config -> Int32 in try LibSession.rawBlindedMessageRequestValue(in: config) }
.defaulting(to: -1)
// Use the value in the config if we happen to have one, otherwise use the default

@ -11,9 +11,10 @@ enum _016_MakeBrokenProfileTimestampsNullable: Migration {
static let identifier: String = "MakeBrokenProfileTimestampsNullable" // stringlint:disable
static let needsConfigSync: Bool = false
static let minExpectedRunDuration: TimeInterval = 0.1
static var requirements: [MigrationRequirement] = [.sessionUtilStateLoaded]
static var requirements: [MigrationRequirement] = [.libSessionStateLoaded]
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [Profile.self]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
/// SQLite doesn't support altering columns after creation so we need to create a new table with the setup we

@ -14,6 +14,7 @@ enum _017_RebuildFTSIfNeeded_2_4_5: Migration {
static let minExpectedRunDuration: TimeInterval = 0.01
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = []
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = []
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
func ftsIsValid(_ db: Database, _ tableName: String) -> Bool {

@ -9,13 +9,14 @@ enum _018_DisappearingMessagesConfiguration: Migration {
static let identifier: String = "DisappearingMessagesWithTypes" // stringlint:disable
static let needsConfigSync: Bool = false
static let minExpectedRunDuration: TimeInterval = 0.1
static var requirements: [MigrationRequirement] = [.sessionUtilStateLoaded]
static var requirements: [MigrationRequirement] = [.libSessionStateLoaded]
static let fetchedTables: [(TableRecord & FetchableRecord).Type] = [
Identity.self, DisappearingMessagesConfiguration.self
]
static let createdOrAlteredTables: [(TableRecord & FetchableRecord).Type] = [
DisappearingMessagesConfiguration.self, Contact.self
]
static let droppedTables: [(TableRecord & FetchableRecord).Type] = []
static func migrate(_ db: Database, using dependencies: Dependencies) throws {
try db.alter(table: DisappearingMessagesConfiguration.self) { t in
@ -79,8 +80,8 @@ enum _018_DisappearingMessagesConfiguration: Migration {
}
// Update the configs so the settings are synced
_ = try SessionUtil.updatingDisappearingConfigsOneToOne(db, contactUpdate, using: dependencies)
_ = try SessionUtil.batchUpdate(db, disappearingConfigs: legacyGroupUpdate, using: dependencies)
_ = try LibSession.updatingDisappearingConfigsOneToOne(db, contactUpdate, using: dependencies)
_ = try LibSession.batchUpdate(db, disappearingConfigs: legacyGroupUpdate, using: dependencies)
Storage.update(progress: 1, for: self, in: target, using: dependencies)
}

@ -1064,7 +1064,7 @@ extension Attachment {
if state == .uploaded, let fileId: String = Attachment.fileId(for: downloadUrl) {
return (
self,
HTTP.PreparedRequest.cached(
Network.PreparedRequest<FileUploadResponse>.cached(
FileUploadResponse(id: fileId),
endpoint: FileServerAPI.Endpoint.file
),
@ -1092,7 +1092,7 @@ extension Attachment {
{
return (
self,
HTTP.PreparedRequest.cached(
Network.PreparedRequest.cached(
FileUploadResponse(id: fileId),
endpoint: FileServerAPI.Endpoint.file
),
@ -1130,7 +1130,7 @@ extension Attachment {
// Ensure the file size is smaller than our upload limit
SNLog("File size: \(finalData.count) bytes.")
guard finalData.count <= FileSystem.maxFileSize else { throw HTTPError.maxFileSizeExceeded }
guard finalData.count <= FileSystem.maxFileSize else { throw NetworkError.maxFileSizeExceeded }
// Generate the request
switch destination {

@ -1,4 +1,6 @@
// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
//
// stringlint:disable
import Foundation
import GRDB

@ -428,7 +428,7 @@ public extension ClosedGroup {
// Ignore if called from the config handling
if dataToRemove.contains(.userGroup) && configTriggeringChange != .userGroups {
try SessionUtil.remove(
try LibSession.remove(
db,
legacyGroupIds: threadVariants
.filter { $0.variant == .legacyGroup }
@ -436,7 +436,7 @@ public extension ClosedGroup {
using: dependencies
)
try SessionUtil.remove(
try LibSession.remove(
db,
groupSessionIds: threadVariants
.filter { $0.variant == .group }

@ -95,7 +95,7 @@ public extension ConfigDump.Variant {
case .configGroupInfo: self = .groupInfo
case .configGroupMembers: self = .groupMembers
case .configGroupKeys: self = .groupKeys
default: self = .invalid
}
}
@ -147,11 +147,11 @@ extension ConfigDump.Variant: CustomStringConvertible {
case .contacts: return "contacts"
case .convoInfoVolatile: return "convoInfoVolatile"
case .userGroups: return "userGroups"
case .groupInfo: return "groupInfo"
case .groupMembers: return "groupMembers"
case .groupKeys: return "groupKeys"
case .invalid: return "invalid"
}
}

@ -4,7 +4,7 @@ import Foundation
import GRDB
import SessionUtilitiesKit
/// This type is duplicate in both the database and within the SessionUtil config so should only ever have it's data changes via the
/// This type is duplicate in both the database and within the LibSession config so should only ever have it's data changes via the
/// `updateAllAndConfig` function. Updating it elsewhere could result in issues with syncing data between devices
public struct Contact: Codable, Identifiable, Equatable, FetchableRecord, PersistableRecord, TableRecord, ColumnExpressible {
public static var databaseTableName: String { "contact" }

@ -50,8 +50,8 @@ public struct DisappearingMessagesConfiguration: Codable, Identifiable, Equatabl
}
}
init(sessionUtilType: CONVO_EXPIRATION_MODE) {
switch sessionUtilType {
init(libSessionType: CONVO_EXPIRATION_MODE) {
switch libSessionType {
case CONVO_EXPIRATION_AFTER_READ: self = .disappearAfterRead
case CONVO_EXPIRATION_AFTER_SEND: self = .disappearAfterSend
default: self = .unknown
@ -310,7 +310,7 @@ public extension DisappearingMessagesConfiguration {
let userSessionId: SessionId = getUserSessionId(db, using: dependencies)
let wasRead: Bool = (
authorId == userSessionId.hexString ||
SessionUtil.timestampAlreadyRead(
LibSession.timestampAlreadyRead(
threadId: threadId,
threadVariant: threadVariant,
timestampMs: timestampMs,

@ -737,7 +737,7 @@ public extension Interaction {
// Update the last read timestamp if needed
if configTriggeringChange != .convoInfoVolatile {
try SessionUtil.syncThreadLastReadIfNeeded(
try LibSession.syncThreadLastReadIfNeeded(
db,
threadId: threadId,
threadVariant: threadVariant,

@ -364,7 +364,7 @@ public extension LinkPreview {
return session
.dataTaskPublisher(for: request)
.mapError { _ -> Error in HTTPError.generic } // URLError codes are negative values
.mapError { _ -> Error in NetworkError.unknown } // URLError codes are negative values
.tryMap { data, response -> (Data, URLResponse) in
guard let urlResponse: HTTPURLResponse = response as? HTTPURLResponse else {
throw LinkPreviewError.assertionFailure

@ -6,7 +6,7 @@ import DifferenceKit
import SessionUIKit
import SessionUtilitiesKit
/// This type is duplicate in both the database and within the SessionUtil config so should only ever have it's data changes via the
/// This type is duplicate in both the database and within the LibSession config so should only ever have it's data changes via the
/// `updateAllAndConfig` function. Updating it elsewhere could result in issues with syncing data between devices
public struct Profile: Codable, Identifiable, Equatable, Hashable, FetchableRecord, PersistableRecord, TableRecord, ColumnExpressible, Differentiable {
public static var databaseTableName: String { "profile" }
@ -142,14 +142,14 @@ public extension Profile {
self = Profile(
id: try container.decode(String.self, forKey: .id),
name: try container.decode(String.self, forKey: .name),
lastNameUpdate: try? container.decode(TimeInterval.self, forKey: .lastNameUpdate),
nickname: try? container.decode(String.self, forKey: .nickname),
lastNameUpdate: try? container.decode(TimeInterval?.self, forKey: .lastNameUpdate),
nickname: try? container.decode(String?.self, forKey: .nickname),
profilePictureUrl: profilePictureUrl,
profilePictureFileName: try? container.decode(String.self, forKey: .profilePictureFileName),
profilePictureFileName: try? container.decode(String?.self, forKey: .profilePictureFileName),
profileEncryptionKey: profileKey,
lastProfilePictureUpdate: try? container.decode(TimeInterval.self, forKey: .lastProfilePictureUpdate),
blocksCommunityMessageRequests: try? container.decode(Bool.self, forKey: .blocksCommunityMessageRequests),
lastBlocksCommunityMessageRequests: try? container.decode(TimeInterval.self, forKey: .lastBlocksCommunityMessageRequests)
lastProfilePictureUpdate: try? container.decode(TimeInterval?.self, forKey: .lastProfilePictureUpdate),
blocksCommunityMessageRequests: try? container.decode(Bool?.self, forKey: .blocksCommunityMessageRequests),
lastBlocksCommunityMessageRequests: try? container.decode(TimeInterval?.self, forKey: .lastBlocksCommunityMessageRequests)
)
}
@ -363,7 +363,7 @@ public extension Profile {
/// The name to display in the UI for a given thread variant
func displayName(for threadVariant: SessionThread.Variant = .contact) -> String {
return Profile.displayName(for: threadVariant, id: id, name: name, nickname: nickname)
return Profile.displayName(for: threadVariant, id: id, name: name, nickname: nickname, suppressId: false)
}
static func displayName(
@ -371,6 +371,7 @@ public extension Profile {
id: String,
name: String?,
nickname: String?,
suppressId: Bool,
customFallback: String? = nil
) -> String {
if let nickname: String = nickname, !nickname.isEmpty { return nickname }
@ -379,10 +380,10 @@ public extension Profile {
return (customFallback ?? Profile.truncated(id: id, threadVariant: threadVariant))
}
switch threadVariant {
case .contact, .legacyGroup, .group: return name
switch (threadVariant, suppressId) {
case (.contact, _), (.legacyGroup, _), (.group, _), (.community, true): return name
case .community:
case (.community, false):
// In open groups, where it's more likely that multiple users have the same name,
// we display a bit of the Session ID after a user's display name for added context
return "\(name) (\(Profile.truncated(id: id, truncating: .middle)))"

@ -340,7 +340,7 @@ public extension SessionThread {
.filter(ids: remainingThreadIds)
.updateAllAndConfig(
db,
SessionThread.Columns.pinnedPriority.set(to: SessionUtil.hiddenPriority),
SessionThread.Columns.pinnedPriority.set(to: LibSession.hiddenPriority),
SessionThread.Columns.shouldBeVisible.set(to: false),
calledFromConfig: configTriggeringChange,
using: dependencies
@ -349,7 +349,7 @@ public extension SessionThread {
case (.contact, .forced):
// If this wasn't called from config handling then we need to hide the conversation
if configTriggeringChange != .contacts {
try SessionUtil
try LibSession
.hide(db, contactIds: threadIds, using: dependencies)
}

@ -23,8 +23,8 @@ public enum FileServerAPI {
public static func preparedUpload(
_ file: Data,
using dependencies: Dependencies = Dependencies()
) throws -> HTTP.PreparedRequest<FileUploadResponse> {
using dependencies: Dependencies
) throws -> Network.PreparedRequest<FileUploadResponse> {
return try prepareRequest(
request: Request(
method: .post,
@ -46,8 +46,8 @@ public enum FileServerAPI {
public static func preparedDownload(
fileId: String,
useOldServer: Bool,
using dependencies: Dependencies = Dependencies()
) throws -> HTTP.PreparedRequest<Data> {
using dependencies: Dependencies
) throws -> Network.PreparedRequest<Data> {
return try prepareRequest(
request: Request<NoBody, Endpoint>(
server: (useOldServer ? oldServer : server),
@ -62,8 +62,8 @@ public enum FileServerAPI {
public static func preparedGetVersion(
_ platform: String,
using dependencies: Dependencies = Dependencies()
) throws -> HTTP.PreparedRequest<String> {
using dependencies: Dependencies
) throws -> Network.PreparedRequest<String> {
return try prepareRequest(
request: Request<NoBody, Endpoint>(
server: server,
@ -74,7 +74,7 @@ public enum FileServerAPI {
x25519PublicKey: serverPublicKey
),
responseType: VersionResponse.self,
timeout: HTTP.defaultTimeout,
timeout: Network.defaultTimeout,
using: dependencies
)
.map { _, response in response.version }
@ -88,8 +88,8 @@ public enum FileServerAPI {
retryCount: Int = 0,
timeout: TimeInterval,
using dependencies: Dependencies
) throws -> HTTP.PreparedRequest<R> {
return HTTP.PreparedRequest<R>(
) throws -> Network.PreparedRequest<R> {
return Network.PreparedRequest<R>(
request: request,
urlRequest: try request.generateUrlRequest(using: dependencies),
responseType: responseType,

@ -96,7 +96,7 @@ public enum AttachmentDownloadJob: JobExecutor {
else { throw AttachmentDownloadError.invalidUrl }
return dependencies[singleton: .storage]
.readPublisher { db -> HTTP.PreparedRequest<Data> in
.readPublisher { db -> Network.PreparedRequest<Data> in
switch try OpenGroup.fetchOne(db, id: threadId) {
case .some(let openGroup):
return try OpenGroupAPI
@ -188,13 +188,14 @@ public enum AttachmentDownloadJob: JobExecutor {
/// If we get a 404 then we got a successful response from the server but the attachment doesn't
/// exist, in this case update the attachment to an "invalid" state so the user doesn't get stuck in
/// a retry download loop
case OnionRequestAPIError.httpRequestFailedAtDestination(let statusCode, _, _) where statusCode == 404:
case NetworkError.notFound:
targetState = .invalid
permanentFailure = true
case OnionRequestAPIError.httpRequestFailedAtDestination(let statusCode, _, _) where statusCode == 400 || statusCode == 401:
/// If we got a 400 or a 401 then we want to fail the download in a way that has to be manually retried as it's
/// likely something else is going on that caused the failure
/// If we got a 400 or a 401 then we want to fail the download in a way that has to be manually retried as it's
/// likely something else is going on that caused the failure
case NetworkError.badRequest, NetworkError.unauthorised,
SnodeAPIError.signatureVerificationFailed:
targetState = .failedDownload
permanentFailure = true

@ -49,8 +49,9 @@ public enum ConfigMessageReceiveJob: JobExecutor {
var lastError: Error?
dependencies[singleton: .storage].write { db in
// Send any SharedConfigMessages to the LibSession to handle it
do {
try SessionUtil.handleConfigMessages(
try LibSession.handleConfigMessages(
db,
sessionIdHexString: sessionIdHexString,
messages: details.messages,

@ -54,11 +54,9 @@ public enum ConfigurationSyncJob: JobExecutor {
// as the user doesn't exist yet (this will get triggered on the first launch of a
// fresh install due to the migrations getting run)
guard
let sessionIdHexString: String = job.threadId,
let pendingConfigChanges: [SessionUtil.PushData] = dependencies[singleton: .storage]
.read(using: dependencies, { db in
try SessionUtil.pendingChanges(db, sessionIdHexString: sessionIdHexString, using: dependencies)
})
let swarmPublicKey: String = job.threadId,
let pendingChanges: LibSession.PendingChanges = dependencies[singleton: .storage]
.read(using: dependencies, { db in try LibSession.pendingChanges(db, publicKey: publicKey) })
else {
SNLog("[ConfigurationSyncJob] For \(job.threadId ?? "UnknownId") failed due to invalid data")
return failure(job, StorageError.generic, false, dependencies)
@ -66,20 +64,15 @@ public enum ConfigurationSyncJob: JobExecutor {
// If there are no pending changes then the job can just complete (next time something
// is updated we want to try and run immediately so don't scuedule another run in this case)
guard !pendingConfigChanges.isEmpty else {
SNLog("[ConfigurationSyncJob] For \(sessionIdHexString) completed with no pending changes")
guard !pendingChanges.pushData.isEmpty || !pendingChanges.obsoleteHashes.isEmpty else {
SNLog("[ConfigurationSyncJob] For \(swarmPublicKey) completed with no pending changes")
return success(job, true, dependencies)
}
// Merge all obsolete hashes into a single set
let allObsoleteHashes: Set<String>? = pendingConfigChanges
.map { $0.obsoleteHashes }
.reduce([], +)
.nullIfEmpty()?
.asSet()
let jobStartTimestamp: TimeInterval = dependencies.dateNow.timeIntervalSince1970
let messageSendTimestamp: Int64 = SnodeAPI.currentOffsetTimestampMs(using: dependencies)
SNLog("[ConfigurationSyncJob] For \(sessionIdHexString) started with \(pendingConfigChanges.count) change\(plural: pendingConfigChanges.count)")
let messageSendTimestamp: Int64 = SnodeAPI.currentOffsetTimestampMs()
SNLog("[ConfigurationSyncJob] For \(swarmPublicKey) started with \(pendingChanges.pushData.count) change\( plural: pendingChanges.pushData.count), \(pendingChanges.obsoleteHashes.count) old hash\(pluralES: pendingChanges.obsoleteHashes.count)")
// TODO: Seems like the conversatino list will randomly not get the last message (Lokinet updates???)
dependencies[singleton: .storage]
.readPublisher { db -> HTTP.PreparedRequest<HTTP.BatchResponse> in
@ -89,7 +82,7 @@ public enum ConfigurationSyncJob: JobExecutor {
try SnodeAPI
.preparedSendMessage(
message: SnodeMessage(
recipient: sessionIdHexString,
recipient: swarmPublicKey,
data: pushData.data.base64EncodedString(),
ttl: pushData.variant.ttl,
timestampMs: UInt64(messageSendTimestamp)
@ -97,44 +90,44 @@ public enum ConfigurationSyncJob: JobExecutor {
in: pushData.variant.namespace,
authMethod: try Authentication.with(
db,
sessionIdHexString: sessionIdHexString,
swarmPublicKey: swarmPublicKey,
using: dependencies
),
using: dependencies
)
}
.appending(
try allObsoleteHashes.map { serverHashes -> ErasedPreparedRequest in
try SnodeAPI.preparedDeleteMessages(
serverHashes: Array(serverHashes),
requireSuccessfulDeletion: false,
authMethod: try Authentication.with(
db,
sessionIdHexString: sessionIdHexString,
using: dependencies
),
.appending(try {
guard !pendingChanges.obsoleteHashes.isEmpty else { return nil }
return try SnodeAPI.preparedDeleteMessages(
serverHashes: Array(pendingChanges.obsoleteHashes),
requireSuccessfulDeletion: false,
authMethod: try Authentication.with(
db,
swarmPublicKey: swarmPublicKey,
using: dependencies
)
}
),
),
using: dependencies
)
}()),
requireAllBatchResponses: false,
associatedWith: sessionIdHexString,
swarmPublicKey: swarmPublicKey,
using: dependencies
)
}
.flatMap { $0.send(using: dependencies) }
.subscribe(on: queue, using: dependencies)
.receive(on: queue, using: dependencies)
.map { (_: ResponseInfoType, response: HTTP.BatchResponse) -> [ConfigDump] in
.map { (_: ResponseInfoType, response: Network.BatchResponse) -> [ConfigDump] in
/// The number of responses returned might not match the number of changes sent but they will be returned
/// in the same order, this means we can just `zip` the two arrays as it will take the smaller of the two and
/// correctly align the response to the change
zip(response, pendingConfigChanges)
.compactMap { (subResponse: Any, pushData: SessionUtil.PushData) -> ConfigDump? in
zip(response, pendingChanges.pushData)
.compactMap { (subResponse: Any, pushData: LibSession.PendingChanges.PushData) in
/// If the request wasn't successful then just ignore it (the next time we sync this config we will try
/// to send the changes again)
guard
let typedResponse: HTTP.BatchSubResponse<SendMessagesResponse> = (subResponse as? HTTP.BatchSubResponse<SendMessagesResponse>),
let typedResponse: Network.BatchSubResponse<SendMessagesResponse> = (subResponse as? Network.BatchSubResponse<SendMessagesResponse>),
200...299 ~= typedResponse.code,
!typedResponse.failedToParseBody,
let sendMessageResponse: SendMessagesResponse = typedResponse.body
@ -142,12 +135,12 @@ public enum ConfigurationSyncJob: JobExecutor {
/// Since this change was successful we need to mark it as pushed and generate any config dumps
/// which need to be stored
return SessionUtil.markingAsPushed(
return LibSession.markingAsPushed(
seqNo: pushData.seqNo,
serverHash: sendMessageResponse.hash,
sentTimestamp: messageSendTimestamp,
variant: pushData.variant,
sessionIdHexString: sessionIdHexString,
swarmPublicKey: swarmPublicKey,
using: dependencies
)
}
@ -155,9 +148,9 @@ public enum ConfigurationSyncJob: JobExecutor {
.sinkUntilComplete(
receiveCompletion: { result in
switch result {
case .finished: SNLog("[ConfigurationSyncJob] For \(sessionIdHexString) completed")
case .finished: SNLog("[ConfigurationSyncJob] For \(swarmPublicKey) completed")
case .failure(let error):
SNLog("[ConfigurationSyncJob] For \(sessionIdHexString) failed due to error: \(error)")
SNLog("[ConfigurationSyncJob] For \(swarmPublicKey) failed due to error: \(error)")
failure(job, error, false, dependencies)
}
},
@ -181,7 +174,7 @@ public enum ConfigurationSyncJob: JobExecutor {
let existingJob: Job = try? Job
.filter(Job.Columns.id != job.id)
.filter(Job.Columns.variant == Job.Variant.configurationSync)
.filter(Job.Columns.threadId == sessionIdHexString)
.filter(Job.Columns.threadId == swarmPublicKey)
.order(Job.Columns.nextRunTimestamp.asc)
.fetchOne(db)
{
@ -233,13 +226,13 @@ extension ConfigurationSyncJob {
public extension ConfigurationSyncJob {
static func enqueue(
_ db: Database,
sessionIdHexString: String,
using dependencies: Dependencies = Dependencies()
swarmPublicKey: String,
using dependencies: Dependencies
) {
// Upsert a config sync job if needed
dependencies[singleton: .jobRunner].upsert(
db,
job: ConfigurationSyncJob.createIfNeeded(db, sessionIdHexString: sessionIdHexString, using: dependencies),
job: ConfigurationSyncJob.createIfNeeded(db, swarmPublicKey: swarmPublicKey, using: dependencies),
canStartJob: true,
using: dependencies
)
@ -247,8 +240,8 @@ public extension ConfigurationSyncJob {
@discardableResult static func createIfNeeded(
_ db: Database,
sessionIdHexString: String,
using dependencies: Dependencies = Dependencies()
swarmPublicKey: String,
using dependencies: Dependencies
) -> Job? {
/// The ConfigurationSyncJob will automatically reschedule itself to run again after 3 seconds so if there is an existing
/// job then there is no need to create another instance
@ -257,11 +250,11 @@ public extension ConfigurationSyncJob {
guard
dependencies[singleton: .jobRunner]
.jobInfoFor(state: .running, variant: .configurationSync)
.filter({ _, info in info.threadId == sessionIdHexString })
.filter({ _, info in info.threadId == swarmPublicKey })
.isEmpty,
(try? Job
.filter(Job.Columns.variant == Job.Variant.configurationSync)
.filter(Job.Columns.threadId == sessionIdHexString)
.filter(Job.Columns.threadId == swarmPublicKey)
.isEmpty(db))
.defaulting(to: false)
else { return nil }
@ -270,7 +263,7 @@ public extension ConfigurationSyncJob {
return Job(
variant: .configurationSync,
behaviour: .recurring,
threadId: sessionIdHexString
threadId: swarmPublicKey
)
}
@ -279,31 +272,31 @@ public extension ConfigurationSyncJob {
/// **Note:** The `ConfigurationSyncJob` can only have a single instance running at a time, as a result this call may not
/// resolve until after the current job has completed
static func run(
sessionIdHexString: String,
using dependencies: Dependencies = Dependencies()
swarmPublicKey: String,
using dependencies: Dependencies
) -> AnyPublisher<Void, Error> {
return Deferred {
Future { resolver in
guard
let job: Job = Job(
variant: .configurationSync,
threadId: sessionIdHexString,
threadId: swarmPublicKey,
details: OptionalDetails(wasManualTrigger: true)
)
else { return resolver(Result.failure(HTTPError.invalidJSON)) }
else { return resolver(Result.failure(NetworkError.invalidJSON)) }
ConfigurationSyncJob.run(
job,
queue: .global(qos: .userInitiated),
success: { _, _, _ in resolver(Result.success(())) },
failure: { _, error, _, _ in resolver(Result.failure(error ?? HTTPError.generic)) },
failure: { _, error, _, _ in resolver(Result.failure(error ?? NetworkError.generic)) },
deferred: { job, _ in
dependencies[singleton: .jobRunner].afterJob(job) { result in
switch result {
/// If it gets deferred a second time then we should probably just fail - no use waiting on something
/// that may never run (also means we can avoid another potential defer loop)
case .notFound, .deferred: resolver(Result.failure(HTTPError.generic))
case .failed(let error, _): resolver(Result.failure(error ?? HTTPError.generic))
case .notFound, .deferred: resolver(Result.failure(NetworkError.generic))
case .failed(let error, _): resolver(Result.failure(error ?? NetworkError.generic))
case .succeeded: resolver(Result.success(()))
}
}

@ -37,7 +37,7 @@ public enum ExpirationUpdateJob: JobExecutor {
shortenOnly: true,
authMethod: try Authentication.with(
db,
sessionIdHexString: getUserSessionId(db, using: dependencies).hexString,
swarmPublicKey: getUserSessionId(db, using: dependencies).hexString,
using: dependencies
),
using: dependencies

@ -425,8 +425,8 @@ public enum GarbageCollectionJob: JobExecutor {
// directory which contains content to keep as well as delete (directories which end up empty after
// this clean up will be removed during the next run)
let directoryNamesContainingContent: [String] = allAttachmentFilePaths
.filter { path -> Bool in path.contains("/") }
.compactMap { path -> String? in path.components(separatedBy: "/").first }
.filter { path -> Bool in path.contains("/") } // stringlint:disable
.compactMap { path -> String? in path.components(separatedBy: "/").first } // stringlint:disable
let orphanedAttachmentFiles: Set<String> = allAttachmentFilePaths
.subtracting(fileInfo.attachmentLocalRelativePaths)
.subtracting(directoryNamesContainingContent)

@ -42,8 +42,6 @@ public enum GetExpirationJob: JobExecutor {
return
}
let userSessionId: SessionId = getUserSessionId(using: dependencies)
return dependencies[singleton: .storage]
.readPublisher(using: dependencies) { db in
try SnodeAPI
@ -51,7 +49,7 @@ public enum GetExpirationJob: JobExecutor {
of: expirationInfo.map { $0.key },
authMethod: try Authentication.with(
db,
sessionIdHexString: userSessionId.hexString,
swarmPublicKey: getUserSessionId(db, using: dependencies).hexString,
using: dependencies
),
using: dependencies

@ -65,6 +65,7 @@ public enum MessageReceiveJob: JobExecutor {
// for open group messages) we also don't bother logging as it results in
// excessive logging which isn't useful)
case DatabaseError.SQLITE_CONSTRAINT_UNIQUE,
DatabaseError.SQLITE_CONSTRAINT, // Sometimes thrown for UNIQUE
MessageReceiverError.duplicateMessage,
MessageReceiverError.duplicateControlMessage,
MessageReceiverError.selfSend:

@ -184,7 +184,7 @@ public enum MessageSendJob: JobExecutor {
.flatMap { $0.send(using: dependencies) }
.subscribe(on: queue, using: dependencies)
.receive(on: queue, using: dependencies)
.timeout(.milliseconds(Int(HTTP.defaultTimeout * 2 * 1000)), scheduler: queue, customError: {
.timeout(.milliseconds(Int(Network.defaultTimeout * 2 * 1000)), scheduler: queue, customError: {
MessageSenderError.sendJobTimeout
})
.sinkUntilComplete(
@ -194,7 +194,7 @@ public enum MessageSendJob: JobExecutor {
case .failure(let error):
switch error {
case MessageSenderError.sendJobTimeout:
SNLog("[MessageSendJob] Couldn't send message due to error: \(error) (paths: \(dependencies[cache: .onionRequestAPI].paths.prettifiedDescription)).")
SNLog("[MessageSendJob] Couldn't send message due to error: \(error) (paths: \(LibSession.pathsDescription)).")
// In this case the `MessageSender` process gets cancelled so we need to
// call `handleFailedMessageSend` to update the statuses correctly
@ -214,17 +214,23 @@ public enum MessageSendJob: JobExecutor {
}
// Actual error handling
switch error {
case let senderError as MessageSenderError where !senderError.isRetryable:
switch (error, details.message) {
case (let senderError as MessageSenderError, _) where !senderError.isRetryable:
failure(job, error, true, dependencies)
case OnionRequestAPIError.httpRequestFailedAtDestination(let statusCode, _, _) where statusCode == 429: // Rate limited
case (SnodeAPIError.rateLimited, _):
failure(job, error, true, dependencies)
case SnodeAPIError.clockOutOfSync:
case (SnodeAPIError.clockOutOfSync, _):
SNLog("[MessageSendJob] \(originalSentTimestamp != nil ? "Permanently Failing" : "Failing") to send \(type(of: details.message)) due to clock out of sync issue.")
failure(job, error, (originalSentTimestamp != nil), dependencies)
// Don't bother retrying (it can just send a new one later but allowing retries
// can result in a large number of `MessageSendJobs` backing up)
case (_, is TypingIndicator):
SNLog("[MessageSendJob] Failed to send \(type(of: details.message)).")
failure(job, error, true, dependencies)
default:
if details.message is VisibleMessage {
guard
@ -280,42 +286,9 @@ extension MessageSendJob {
throw StorageError.decodingFailed
}
let message: Message = try variant.decode(from: container, forKey: .message)
var destination: Message.Destination = try container.decode(Message.Destination.self, forKey: .destination)
/// Handle the legacy 'isSyncMessage' flag - this flag was deprecated in `2.5.2` (April 2024) and can be removed in a
/// subsequent release after May 2024
if ((try? container.decode(Bool.self, forKey: .isSyncMessage)) ?? false) {
switch (destination, message) {
case (.contact, let message as VisibleMessage):
guard let targetPublicKey: String = message.syncTarget else {
SNLog("Unable to decode messageSend job due to missing syncTarget")
throw StorageError.decodingFailed
}
destination = .syncMessage(originalRecipientPublicKey: targetPublicKey)
case (.contact, let message as ExpirationTimerUpdate):
guard let targetPublicKey: String = message.syncTarget else {
SNLog("Unable to decode messageSend job due to missing syncTarget")
throw StorageError.decodingFailed
}
destination = .syncMessage(originalRecipientPublicKey: targetPublicKey)
case (.contact(let publicKey), _):
SNLog("Sync message in messageSend job was missing explicit syncTarget (falling back to specified value)")
destination = .syncMessage(originalRecipientPublicKey: publicKey)
default:
SNLog("Unable to decode messageSend job due to invalid sync message state")
throw StorageError.decodingFailed
}
}
self = Details(
destination: destination,
message: message
destination: try container.decode(Message.Destination.self, forKey: .destination),
message: try variant.decode(from: container, forKey: .message)
)
}

@ -7,7 +7,7 @@ import SessionUtilitiesKit
// MARK: - Size Restrictions
public extension SessionUtil {
public extension LibSession {
static var sizeMaxNameBytes: Int { CONTACT_MAX_NAME_LENGTH }
static var sizeMaxNicknameBytes: Int { CONTACT_MAX_NAME_LENGTH }
static var sizeMaxProfileUrlBytes: Int { PROFILE_PIC_MAX_URL_LENGTH }
@ -15,7 +15,7 @@ public extension SessionUtil {
// MARK: - Contacts Handling
internal extension SessionUtil {
internal extension LibSession {
static let columnsRelatedToContacts: [ColumnExpression] = [
Contact.Columns.isApproved,
Contact.Columns.isBlocked,
@ -38,7 +38,7 @@ internal extension SessionUtil {
using dependencies: Dependencies
) throws {
guard config.needsDump(using: dependencies) else { return }
guard case .object(let conf) = config else { throw SessionUtilError.invalidConfigObject }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// The current users contact data is handled separately so exclude it if it's present (as that's
// actually a bug)
@ -143,11 +143,11 @@ internal extension SessionUtil {
.asRequest(of: PriorityVisibilityInfo.self)
.fetchOne(db)
let threadExists: Bool = (threadInfo != nil)
let updatedShouldBeVisible: Bool = SessionUtil.shouldBeVisible(priority: data.priority)
let updatedShouldBeVisible: Bool = LibSession.shouldBeVisible(priority: data.priority)
/// If we are hiding the conversation then kick the user from it if it's currently open
if !updatedShouldBeVisible {
SessionUtil.kickFromConversationUIIfNeeded(removedThreadIds: [sessionId], using: dependencies)
LibSession.kickFromConversationUIIfNeeded(removedThreadIds: [sessionId], using: dependencies)
}
/// Create the thread if it doesn't exist, otherwise just update it's state
@ -241,7 +241,7 @@ internal extension SessionUtil {
.filter { !draftConversationIds.contains($0) }
if !combinedIds.isEmpty {
SessionUtil.kickFromConversationUIIfNeeded(removedThreadIds: combinedIds, using: dependencies)
LibSession.kickFromConversationUIIfNeeded(removedThreadIds: combinedIds, using: dependencies)
try Contact
.filter(ids: combinedIds)
@ -268,7 +268,7 @@ internal extension SessionUtil {
using: dependencies
)
try SessionUtil.remove(db, volatileContactIds: combinedIds, using: dependencies)
try LibSession.remove(db, volatileContactIds: combinedIds, using: dependencies)
}
}
@ -279,7 +279,7 @@ internal extension SessionUtil {
in config: Config?,
using dependencies: Dependencies
) throws {
guard case .object(let conf) = config else { throw SessionUtilError.invalidConfigObject }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// The current users contact data doesn't need to sync so exclude it, we also don't want to sync
// blinded message requests so exclude those as well
@ -301,8 +301,8 @@ internal extension SessionUtil {
guard contacts_get_or_construct(conf, &contact, &sessionId) else {
/// It looks like there are some situations where this object might not get created correctly (and
/// will throw due to the implicit unwrapping) as a result we put it in a guard and throw instead
SNLog("Unable to upsert contact to SessionUtil: \(config.lastError)")
throw SessionUtilError.getOrConstructFailedUnexpectedly
SNLog("Unable to upsert contact to LibSession: \(config.lastError)")
throw LibSessionError.getOrConstructFailedUnexpectedly
}
// Assign all properties to match the updated contact (if there is one)
@ -366,7 +366,7 @@ internal extension SessionUtil {
// MARK: - Outgoing Changes
internal extension SessionUtil {
internal extension LibSession {
static func updatingContacts<T>(
_ db: Database,
_ updated: [T],
@ -386,13 +386,13 @@ internal extension SessionUtil {
// If we only updated the current user contact then no need to continue
guard !targetContacts.isEmpty else { return updated }
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: userSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw SessionUtilError.invalidConfigObject }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// When inserting new contacts (or contacts with invalid profile data) we want
// to add any valid profile information we have so identify if any of the updated
@ -414,7 +414,7 @@ internal extension SessionUtil {
.reduce(into: [:]) { result, next in result[next.id] = next }
// Upsert the updated contact data
try SessionUtil
try LibSession
.upsert(
contactData: targetContacts
.map { contact in
@ -464,26 +464,26 @@ internal extension SessionUtil {
// Update the user profile first (if needed)
if let updatedUserProfile: Profile = updatedProfiles.first(where: { $0.id == userSessionId.hexString }) {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userProfile,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.update(
try LibSession.update(
profile: updatedUserProfile,
in: config
)
}
}
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil
try LibSession
.upsert(
contactData: targetProfiles
.map { SyncedContactInfo(id: $0.id, profile: $0) },
@ -531,26 +531,26 @@ internal extension SessionUtil {
// Update the note to self disappearing messages config first (if needed)
if let updatedUserDisappearingConfig: DisappearingMessagesConfiguration = targetUpdatedConfigs.first(where: { $0.id == userSessionId.hexString }) {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userProfile,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.updateNoteToSelf(
try LibSession.updateNoteToSelf(
disappearingMessagesConfig: updatedUserDisappearingConfig,
in: config
)
}
}
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil
try LibSession
.upsert(
contactData: targetDisappearingConfigs
.map { SyncedContactInfo(id: $0.id, disappearingMessagesConfig: $0) },
@ -565,25 +565,25 @@ internal extension SessionUtil {
// MARK: - External Outgoing Changes
public extension SessionUtil {
public extension LibSession {
static func hide(
_ db: Database,
contactIds: [String],
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: getUserSessionId(db, using: dependencies),
using: dependencies
) { config in
// Mark the contacts as hidden
try SessionUtil.upsert(
try LibSession.upsert(
contactData: contactIds
.map {
SyncedContactInfo(
id: $0,
priority: SessionUtil.hiddenPriority
priority: LibSession.hiddenPriority
)
},
in: config,
@ -599,7 +599,7 @@ public extension SessionUtil {
) throws {
guard !contactIds.isEmpty else { return }
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: getUserSessionId(db, using: dependencies),
@ -626,26 +626,26 @@ public extension SessionUtil {
switch sessionId {
case userSessionId.hexString:
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userProfile,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.updateNoteToSelf(
try LibSession.updateNoteToSelf(
disappearingMessagesConfig: disappearingMessagesConfig,
in: config
)
}
default:
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil
try LibSession
.upsert(
contactData: [
SyncedContactInfo(
@ -663,7 +663,7 @@ public extension SessionUtil {
// MARK: - SyncedContactInfo
extension SessionUtil {
extension LibSession {
struct SyncedContactInfo {
let id: String
let contact: Contact?
@ -709,7 +709,7 @@ private struct ThreadCount: Codable, FetchableRecord {
// MARK: - Convenience
private extension SessionUtil {
private extension LibSession {
static func extractContacts(
from conf: UnsafeMutablePointer<config_object>?,
serverTimestampMs: Int64
@ -720,7 +720,7 @@ private extension SessionUtil {
let contactIterator: UnsafeMutablePointer<contacts_iterator> = contacts_iterator_new(conf)
while !contacts_iterator_done(contactIterator, &contact) {
try SessionUtil.checkLoopLimitReached(&infiniteLoopGuard, for: .contacts)
try LibSession.checkLoopLimitReached(&infiniteLoopGuard, for: .contacts)
let contactId: String = String(cString: withUnsafeBytes(of: contact.session_id) { [UInt8]($0) }
.map { CChar($0) }
@ -751,7 +751,7 @@ private extension SessionUtil {
threadId: contactId,
isEnabled: contact.exp_seconds > 0,
durationSeconds: TimeInterval(contact.exp_seconds),
type: DisappearingMessagesConfiguration.DisappearingMessageType(sessionUtilType: contact.exp_mode)
type: DisappearingMessagesConfiguration.DisappearingMessageType(libSessionType: contact.exp_mode)
)
result[contactId] = ContactData(

@ -5,7 +5,7 @@ import GRDB
import SessionUtil
import SessionUtilitiesKit
internal extension SessionUtil {
internal extension LibSession {
static let columnsRelatedToConvoInfoVolatile: [ColumnExpression] = [
// Note: We intentionally exclude 'Interaction.Columns.wasRead' from here as we want to
// manually manage triggering config updates from marking as read
@ -20,7 +20,7 @@ internal extension SessionUtil {
using dependencies: Dependencies
) throws {
guard config.needsDump(using: dependencies) else { return }
guard case .object(let conf) = config else { throw SessionUtilError.invalidConfigObject }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Get the volatile thread info from the conf and local conversations
let volatileThreadInfo: [VolatileThreadInfo] = try extractConvoVolatileInfo(from: conf)
@ -122,7 +122,7 @@ internal extension SessionUtil {
in config: Config?,
using dependencies: Dependencies
) throws {
guard case .object(let conf) = config else { throw SessionUtilError.invalidConfigObject }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Exclude any invalid thread info
let validChanges: [VolatileThreadInfo] = convoInfoVolatileChanges
@ -148,8 +148,7 @@ internal extension SessionUtil {
guard convo_info_volatile_get_or_construct_1to1(conf, &oneToOne, &cThreadId) else {
/// It looks like there are some situations where this object might not get created correctly (and
/// will throw due to the implicit unwrapping) as a result we put it in a guard and throw instead
SNLog("Unable to upsert contact volatile info to SessionUtil: \(config.lastError)")
throw SessionUtilError.getOrConstructFailedUnexpectedly
SNLog("Unable to upsert contact volatile info to LibSession: \(config.lastError)")
}
threadInfo.changes.forEach { change in
@ -169,8 +168,8 @@ internal extension SessionUtil {
guard convo_info_volatile_get_or_construct_legacy_group(conf, &legacyGroup, &cThreadId) else {
/// It looks like there are some situations where this object might not get created correctly (and
/// will throw due to the implicit unwrapping) as a result we put it in a guard and throw instead
SNLog("Unable to upsert legacy group volatile info to SessionUtil: \(config.lastError)")
throw SessionUtilError.getOrConstructFailedUnexpectedly
SNLog("Unable to upsert legacy group volatile info to LibSession: \(config.lastError)")
throw LibSessionError.getOrConstructFailedUnexpectedly
}
threadInfo.changes.forEach { change in
@ -199,8 +198,8 @@ internal extension SessionUtil {
guard convo_info_volatile_get_or_construct_community(conf, &community, &cBaseUrl, &cRoomToken, &cPubkey) else {
/// It looks like there are some situations where this object might not get created correctly (and
/// will throw due to the implicit unwrapping) as a result we put it in a guard and throw instead
SNLog("Unable to upsert community volatile info to SessionUtil: \(config.lastError)")
throw SessionUtilError.getOrConstructFailedUnexpectedly
SNLog("Unable to upsert community volatile info to LibSessionError: \(config.lastError)")
throw LibSessionError.getOrConstructFailedUnexpectedly
}
threadInfo.changes.forEach { change in
@ -266,7 +265,7 @@ internal extension SessionUtil {
)
}
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .convoInfoVolatile,
sessionId: getUserSessionId(db, using: dependencies),
@ -285,7 +284,7 @@ internal extension SessionUtil {
volatileContactIds: [String],
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .convoInfoVolatile,
sessionId: getUserSessionId(db, using: dependencies),
@ -307,7 +306,7 @@ internal extension SessionUtil {
volatileLegacyGroupIds: [String],
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .convoInfoVolatile,
sessionId: getUserSessionId(db, using: dependencies),
@ -329,7 +328,7 @@ internal extension SessionUtil {
volatileGroupSessionIds: [String],
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .convoInfoVolatile,
sessionId: getUserSessionId(db, using: dependencies),
@ -372,7 +371,7 @@ internal extension SessionUtil {
// MARK: - External Outgoing Changes
public extension SessionUtil {
public extension LibSession {
static func syncThreadLastReadIfNeeded(
_ db: Database,
threadId: String,
@ -380,7 +379,7 @@ public extension SessionUtil {
lastReadTimestampMs: Int64,
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .convoInfoVolatile,
sessionId: getUserSessionId(db, using: dependencies),
@ -467,7 +466,7 @@ public extension SessionUtil {
// MARK: - VolatileThreadInfo
public extension SessionUtil {
public extension LibSession {
internal struct OpenGroupUrlInfo: FetchableRecord, Codable, Hashable {
let threadId: String
let server: String
@ -621,7 +620,7 @@ public extension SessionUtil {
let convoIterator: OpaquePointer = convo_info_volatile_iterator_new(conf)
while !convo_info_volatile_iterator_done(convoIterator) {
try SessionUtil.checkLoopLimitReached(&infiniteLoopGuard, for: .convoInfoVolatile)
try LibSession.checkLoopLimitReached(&infiniteLoopGuard, for: .convoInfoVolatile)
if convo_info_volatile_it_is_1to1(convoIterator, &oneToOne) {
result.append(
@ -696,7 +695,7 @@ public extension SessionUtil {
}
}
fileprivate extension [SessionUtil.VolatileThreadInfo.Change] {
fileprivate extension [LibSession.VolatileThreadInfo.Change] {
var markedAsUnread: Bool? {
for change in self {
switch change {

@ -0,0 +1,453 @@
// Copyright © 2023 Rangeproof Pty Ltd. All rights reserved.
import Foundation
import GRDB
import SessionUtil
import SessionSnodeKit
import SessionUtilitiesKit
// MARK: - Size Restrictions
public extension LibSession {
static var sizeMaxGroupDescriptionBytes: Int { GROUP_INFO_DESCRIPTION_MAX_LENGTH }
static func isTooLong(groupDescription: String) -> Bool {
return (groupDescription.utf8CString.count > LibSession.sizeMaxGroupDescriptionBytes)
}
}
// MARK: - Group Info Handling
internal extension LibSession {
static let columnsRelatedToGroupInfo: [ColumnExpression] = [
ClosedGroup.Columns.name,
ClosedGroup.Columns.groupDescription,
ClosedGroup.Columns.displayPictureUrl,
ClosedGroup.Columns.displayPictureEncryptionKey,
DisappearingMessagesConfiguration.Columns.isEnabled,
DisappearingMessagesConfiguration.Columns.type,
DisappearingMessagesConfiguration.Columns.durationSeconds
]
// MARK: - Incoming Changes
static func handleGroupInfoUpdate(
_ db: Database,
in config: Config?,
groupSessionId: SessionId,
serverTimestampMs: Int64,
using dependencies: Dependencies
) throws {
guard config.needsDump(using: dependencies) else { return }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// If the group is destroyed then remove the group date (want to keep the group itself around because
// the UX of conversations randomly disappearing isn't great) - no other changes matter and this
// can't be reversed
guard !groups_info_is_destroyed(conf) else {
try ClosedGroup.removeData(
db,
threadIds: [groupSessionId.hexString],
dataToRemove: [
.poller, .pushNotifications, .messages, .members,
.encryptionKeys, .authDetails, .libSessionState
],
calledFromConfig: .groupInfo,
using: dependencies
)
return
}
// A group must have a name so if this is null then it's invalid and can be ignored
guard let groupNamePtr: UnsafePointer<CChar> = groups_info_get_name(conf) else { return }
let groupDescPtr: UnsafePointer<CChar>? = groups_info_get_description(conf)
let groupName: String = String(cString: groupNamePtr)
let groupDesc: String? = groupDescPtr.map { String(cString: $0) }
let formationTimestamp: TimeInterval = TimeInterval(groups_info_get_created(conf))
// The `displayPic.key` can contain junk data so if the `displayPictureUrl` is null then just
// set the `displayPictureKey` to null as well
let displayPic: user_profile_pic = groups_info_get_pic(conf)
let displayPictureUrl: String? = String(libSessionVal: displayPic.url, nullIfEmpty: true)
let displayPictureKey: Data? = (displayPictureUrl == nil ? nil :
Data(
libSessionVal: displayPic.key,
count: DisplayPictureManager.aes256KeyByteLength
)
)
// Update the group name
let existingGroup: ClosedGroup? = try? ClosedGroup
.filter(id: groupSessionId.hexString)
.fetchOne(db)
let needsDisplayPictureUpdate: Bool = (
existingGroup?.displayPictureUrl != displayPictureUrl ||
existingGroup?.displayPictureEncryptionKey != displayPictureKey
)
let groupChanges: [ConfigColumnAssignment] = [
((existingGroup?.name == groupName) ? nil :
ClosedGroup.Columns.name.set(to: groupName)
),
((existingGroup?.groupDescription == groupDesc) ? nil :
ClosedGroup.Columns.groupDescription.set(to: groupDesc)
),
// Only update the 'formationTimestamp' if we don't have one (don't want to override the 'joinedAt'
// timestamp with the groups creation timestamp
(formationTimestamp < (existingGroup?.formationTimestamp ?? 0) ? nil :
ClosedGroup.Columns.formationTimestamp.set(to: formationTimestamp)
),
// If we are removing the display picture do so here
(!needsDisplayPictureUpdate || displayPictureUrl != nil ? nil :
ClosedGroup.Columns.displayPictureUrl.set(to: nil)
),
(!needsDisplayPictureUpdate || displayPictureUrl != nil ? nil :
ClosedGroup.Columns.displayPictureFilename.set(to: nil)
),
(!needsDisplayPictureUpdate || displayPictureUrl != nil ? nil :
ClosedGroup.Columns.displayPictureEncryptionKey.set(to: nil)
),
(!needsDisplayPictureUpdate || displayPictureUrl != nil ? nil :
ClosedGroup.Columns.lastDisplayPictureUpdate.set(to: (serverTimestampMs / 1000))
)
].compactMap { $0 }
if !groupChanges.isEmpty {
try ClosedGroup
.filter(id: groupSessionId.hexString)
.updateAllAndConfig(
db,
groupChanges,
calledFromConfig: .groupInfo,
using: dependencies
)
}
// If we have a display picture then start downloading it
if needsDisplayPictureUpdate, let url: String = displayPictureUrl, let key: Data = displayPictureKey {
dependencies[singleton: .jobRunner].add(
db,
job: Job(
variant: .displayPictureDownload,
shouldBeUnique: true,
details: DisplayPictureDownloadJob.Details(
target: .group(id: groupSessionId.hexString, url: url, encryptionKey: key),
timestamp: TimeInterval(Double(serverTimestampMs) / 1000)
)
),
canStartJob: true,
using: dependencies
)
}
// Update the disappearing messages configuration
let targetExpiry: Int32 = groups_info_get_expiry_timer(conf)
let localConfig: DisappearingMessagesConfiguration = try DisappearingMessagesConfiguration
.fetchOne(db, id: groupSessionId.hexString)
.defaulting(to: DisappearingMessagesConfiguration.defaultWith(groupSessionId.hexString))
let updatedConfig: DisappearingMessagesConfiguration = DisappearingMessagesConfiguration
.defaultWith(groupSessionId.hexString)
.with(
isEnabled: (targetExpiry > 0),
durationSeconds: TimeInterval(targetExpiry),
type: .disappearAfterSend
)
if localConfig != updatedConfig {
try updatedConfig
.saved(db)
.clearUnrelatedControlMessages(
db,
threadVariant: .group,
using: dependencies
)
}
// Check if the user is an admin in the group
var messageHashesToDelete: Set<String> = []
let isAdmin: Bool = ((try? ClosedGroup
.filter(id: groupSessionId.hexString)
.select(.groupIdentityPrivateKey)
.asRequest(of: Data.self)
.fetchOne(db)) != nil)
// If there is a `delete_before` setting then delete all messages before the provided timestamp
let deleteBeforeTimestamp: Int64 = groups_info_get_delete_before(conf)
if deleteBeforeTimestamp > 0 {
if isAdmin {
let hashesToDelete: Set<String>? = try? Interaction
.filter(Interaction.Columns.threadId == groupSessionId.hexString)
.filter(Interaction.Columns.timestampMs < (TimeInterval(deleteBeforeTimestamp) * 1000))
.filter(Interaction.Columns.serverHash != nil)
.select(.serverHash)
.asRequest(of: String.self)
.fetchSet(db)
messageHashesToDelete.insert(contentsOf: hashesToDelete)
}
let deletionCount: Int = try Interaction
.filter(Interaction.Columns.threadId == groupSessionId.hexString)
.filter(Interaction.Columns.timestampMs < (TimeInterval(deleteBeforeTimestamp) * 1000))
.deleteAll(db)
if deletionCount > 0 {
SNLog("[LibSession] Deleted \(deletionCount) message\(plural: deletionCount) from \(groupSessionId.hexString) due to 'delete_before' value.")
}
}
// If there is a `attach_delete_before` setting then delete all messages that have attachments before
// the provided timestamp and schedule a garbage collection job
let attachDeleteBeforeTimestamp: Int64 = groups_info_get_attach_delete_before(conf)
if attachDeleteBeforeTimestamp > 0 {
if isAdmin {
let hashesToDelete: Set<String>? = try? Interaction
.filter(Interaction.Columns.threadId == groupSessionId.hexString)
.filter(Interaction.Columns.timestampMs < (TimeInterval(attachDeleteBeforeTimestamp) * 1000))
.filter(Interaction.Columns.serverHash != nil)
.joining(required: Interaction.interactionAttachments)
.select(.serverHash)
.asRequest(of: String.self)
.fetchSet(db)
messageHashesToDelete.insert(contentsOf: hashesToDelete)
}
let deletionCount: Int = try Interaction
.filter(Interaction.Columns.threadId == groupSessionId.hexString)
.filter(Interaction.Columns.timestampMs < (TimeInterval(attachDeleteBeforeTimestamp) * 1000))
.joining(required: Interaction.interactionAttachments)
.deleteAll(db)
if deletionCount > 0 {
SNLog("[LibSession] Deleted \(deletionCount) message\(plural: deletionCount) with attachments from \(groupSessionId.hexString) due to 'attach_delete_before' value.")
// Schedule a grabage collection job to clean up any now-orphaned attachment files
dependencies[singleton: .jobRunner].add(
db,
job: Job(
variant: .garbageCollection,
details: GarbageCollectionJob.Details(
typesToCollect: [.orphanedAttachments, .orphanedAttachmentFiles]
)
),
canStartJob: true,
using: dependencies
)
}
}
// If the current user is a group admin and there are message hashes which should be deleted then
// send a fire-and-forget API call to delete the messages from the swarm
if isAdmin && !messageHashesToDelete.isEmpty {
(try? Authentication.with(
db,
sessionIdHexString: groupSessionId.hexString,
using: dependencies
)).map { authMethod in
try? SnodeAPI
.preparedDeleteMessages(
serverHashes: Array(messageHashesToDelete),
requireSuccessfulDeletion: false,
authMethod: authMethod,
using: dependencies
)
.send(using: dependencies)
.subscribe(on: DispatchQueue.global(qos: .background), using: dependencies)
.sinkUntilComplete()
}
}
}
}
// MARK: - Outgoing Changes
internal extension LibSession {
static func updatingGroupInfo<T>(
_ db: Database,
_ updated: [T],
using dependencies: Dependencies
) throws -> [T] {
guard let updatedGroups: [ClosedGroup] = updated as? [ClosedGroup] else { throw StorageError.generic }
// Exclude legacy groups as they aren't managed via LibSession
let targetGroups: [ClosedGroup] = updatedGroups
.filter { (try? SessionId(from: $0.id))?.prefix == .group }
// If we only updated the current user contact then no need to continue
guard !targetGroups.isEmpty else { return updated }
// Loop through each of the groups and update their settings
try targetGroups.forEach { group in
try LibSession.performAndPushChange(
db,
for: .groupInfo,
sessionId: SessionId(.group, hex: group.threadId),
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
/// Update the name
///
/// **Note:** We indentionally only update the `GROUP_INFO` and not the `USER_GROUPS` as once the
/// group is synced between devices we want to rely on the proper group config to get display info
var updatedName: [CChar] = group.name.cArray.nullTerminated()
groups_info_set_name(conf, &updatedName)
var updatedDescription: [CChar] = (group.groupDescription ?? "").cArray.nullTerminated()
groups_info_set_description(conf, &updatedDescription)
// Either assign the updated display pic, or sent a blank pic (to remove the current one)
var displayPic: user_profile_pic = user_profile_pic()
displayPic.url = group.displayPictureUrl.toLibSession()
displayPic.key = group.displayPictureEncryptionKey.toLibSession()
groups_info_set_pic(conf, displayPic)
}
}
return updated
}
static func updatingDisappearingConfigsGroups<T>(
_ db: Database,
_ updated: [T],
using dependencies: Dependencies
) throws -> [T] {
guard let updatedDisappearingConfigs: [DisappearingMessagesConfiguration] = updated as? [DisappearingMessagesConfiguration] else { throw StorageError.generic }
// Filter out any disappearing config changes not related to updated groups
let targetUpdatedConfigs: [DisappearingMessagesConfiguration] = updatedDisappearingConfigs
.filter { (try? SessionId.Prefix(from: $0.id)) == .group }
guard !targetUpdatedConfigs.isEmpty else { return updated }
// We should only sync disappearing messages configs which are associated to existing groups
let existingGroupIds: [String] = (try? ClosedGroup
.filter(ids: targetUpdatedConfigs.map { $0.id })
.select(.threadId)
.asRequest(of: String.self)
.fetchAll(db))
.defaulting(to: [])
// If none of the disappearing messages configs are associated with existing groups then ignore
// the changes (no need to do a config sync)
guard !existingGroupIds.isEmpty else { return updated }
// Loop through each of the groups and update their settings
try existingGroupIds
.compactMap { groupId in targetUpdatedConfigs.first(where: { $0.id == groupId }).map { (groupId, $0) } }
.forEach { groupId, updatedConfig in
try LibSession.performAndPushChange(
db,
for: .groupInfo,
sessionId: SessionId(.group, hex: groupId),
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
groups_info_set_expiry_timer(conf, Int32(updatedConfig.durationSeconds))
}
}
return updated
}
}
// MARK: - External Outgoing Changes
public extension LibSession {
static func update(
_ db: Database,
groupSessionId: SessionId,
disappearingConfig: DisappearingMessagesConfiguration?,
using dependencies: Dependencies
) throws {
try LibSession.performAndPushChange(
db,
for: .groupInfo,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
if let config: DisappearingMessagesConfiguration = disappearingConfig {
groups_info_set_expiry_timer(conf, Int32(config.durationSeconds))
}
}
}
static func deleteMessagesBefore(
_ db: Database,
groupSessionId: SessionId,
timestamp: TimeInterval,
using dependencies: Dependencies
) throws {
try LibSession.performAndPushChange(
db,
for: .groupInfo,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Do nothing if the timestamp isn't newer than the current value
guard Int64(timestamp) > groups_info_get_delete_before(conf) else { return }
groups_info_set_delete_before(conf, Int64(timestamp))
}
}
static func deleteAttachmentsBefore(
_ db: Database,
groupSessionId: SessionId,
timestamp: TimeInterval,
using dependencies: Dependencies
) throws {
try LibSession.performAndPushChange(
db,
for: .groupInfo,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Do nothing if the timestamp isn't newer than the current value
guard Int64(timestamp) > groups_info_get_attach_delete_before(conf) else { return }
groups_info_set_attach_delete_before(conf, Int64(timestamp))
}
}
static func deleteGroupForEveryone(
_ db: Database,
groupSessionId: SessionId,
using dependencies: Dependencies
) throws {
try LibSession.performAndPushChange(
db,
for: .groupInfo,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
groups_info_destroy_group(conf)
}
}
static func groupIsDestroyed(
groupSessionId: SessionId,
using dependencies: Dependencies
) -> Bool {
return dependencies[cache: .LibSession]
.config(for: .groupInfo, sessionId: groupSessionId)
.wrappedValue
.map { config in
guard case .object(let conf) = config else { return false }
return groups_info_is_destroyed(conf)
}
.defaulting(to: false)
}
}

@ -0,0 +1,209 @@
// Copyright © 2023 Rangeproof Pty Ltd. All rights reserved.
import Foundation
import GRDB
import SessionUtil
import SessionUtilitiesKit
// MARK: - Size Restrictions
public extension LibSession {
static var sizeAuthDataBytes: Int { 100 }
static var sizeSubaccountBytes: Int { 36 }
static var sizeSubaccountSigBytes: Int { 64 }
static var sizeSubaccountSignatureBytes: Int { 64 }
}
// MARK: - Group Keys Handling
internal extension LibSession {
/// `libSession` manages keys entirely so there is no need for a DB presence
static let columnsRelatedToGroupKeys: [ColumnExpression] = []
// MARK: - Incoming Changes
static func handleGroupKeysUpdate(
_ db: Database,
in config: Config?,
groupSessionId: SessionId,
using dependencies: Dependencies
) throws {
guard case .groupKeys(let conf, let infoConf, let membersConf) = config else {
throw LibSessionError.invalidConfigObject
}
/// If two admins rekeyed for different member changes at the same time then there is a "key collision" and the "needs rekey" function
/// will return true to indicate that a 3rd `rekey` needs to be made to have a final set of keys which includes all members
///
/// **Note:** We don't check `needsDump` in this case because the local state _could_ be persisted yet still require a `rekey`
/// so we should rely solely on `groups_keys_needs_rekey`
guard groups_keys_needs_rekey(conf) else { return }
// Performing a `rekey` returns the updated key data which we don't use directly, this updated
// key will now be returned by `groups_keys_pending_config` which the `ConfigurationSyncJob` uses
// when generating pending changes for group keys so we don't need to push it directly
var pushResult: UnsafePointer<UInt8>? = nil
var pushResultLen: Int = 0
guard groups_keys_rekey(conf, infoConf, membersConf, &pushResult, &pushResultLen) else {
throw LibSessionError.failedToRekeyGroup
}
}
}
// MARK: - Outgoing Changes
internal extension LibSession {
static func rekey(
_ db: Database,
groupSessionId: SessionId,
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
db,
for: .groupKeys,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .groupKeys(let conf, let infoConf, let membersConf) = config else {
throw LibSessionError.invalidConfigObject
}
// Performing a `rekey` returns the updated key data which we don't use directly, this updated
// key will now be returned by `groups_keys_pending_config` which the `ConfigurationSyncJob` uses
// when generating pending changes for group keys so we don't need to push it directly
var pushResult: UnsafePointer<UInt8>? = nil
var pushResultLen: Int = 0
guard groups_keys_rekey(conf, infoConf, membersConf, &pushResult, &pushResultLen) else {
throw LibSessionError.failedToRekeyGroup
}
}
}
static func keySupplement(
_ db: Database,
groupSessionId: SessionId,
memberIds: Set<String>,
using dependencies: Dependencies
) throws -> Data {
try dependencies[cache: .sessionUtil]
.config(for: .groupKeys, sessionId: groupSessionId)
.wrappedValue
.map { config -> Data in
guard case .groupKeys(let conf, _, _) = config else { throw LibSessionError.invalidConfigObject }
var cMemberIds: [UnsafePointer<CChar>?] = memberIds
.map { id in id.cArray.nullTerminated() }
.unsafeCopy()
defer { cMemberIds.forEach { $0?.deallocate() } }
// Performing a `key_supplement` returns the supplemental key changes, since our state doesn't care
// about the `GROUP_KEYS` needed for other members this change won't result in the `GROUP_KEYS` config
// going into a pending state or the `ConfigurationSyncJob` getting triggered so return the data so that
// the caller can push it directly
var cSupplementData: UnsafeMutablePointer<UInt8>!
var cSupplementDataLen: Int = 0
guard
groups_keys_key_supplement(conf, &cMemberIds, cMemberIds.count, &cSupplementData, &cSupplementDataLen),
let cSupplementData: UnsafeMutablePointer<UInt8> = cSupplementData
else { throw LibSessionError.failedToKeySupplementGroup }
// Must deallocate on success
let supplementData: Data = Data(
bytes: cSupplementData,
count: cSupplementDataLen
)
cSupplementData.deallocate()
return supplementData
} ?? { throw LibSessionError.invalidConfigObject }()
}
static func loadAdminKey(
_ db: Database,
groupIdentitySeed: Data,
groupSessionId: SessionId,
using dependencies: Dependencies
) throws {
try SessionUtil
.performAndPushChange(
db,
for: .groupKeys,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .groupKeys(let conf, let infoConf, let membersConf) = config else {
throw LibSessionError.invalidConfigObject
}
var identitySeed: [UInt8] = Array(groupIdentitySeed)
try CExceptionHelper.performSafely {
groups_keys_load_admin_key(conf, &identitySeed, infoConf, membersConf)
}
}
}
static func currentGeneration(
groupSessionId: SessionId,
using dependencies: Dependencies
) throws -> Int {
try dependencies[cache: .sessionUtil]
.config(for: .groupKeys, sessionId: groupSessionId)
.wrappedValue
.map { config -> Int in
guard case .groupKeys(let conf, _, _) = config else { throw LibSessionError.invalidConfigObject }
return Int(groups_keys_current_generation(conf))
} ?? { throw LibSessionError.invalidConfigObject }()
}
static func generateSubaccountToken(
groupSessionId: SessionId,
memberId: String,
using dependencies: Dependencies
) throws -> [UInt8] {
try dependencies[singleton: .crypto].tryGenerate(
.tokenSubaccount(
config: dependencies[cache: .sessionUtil]
.config(for: .groupKeys, sessionId: groupSessionId)
.wrappedValue,
groupSessionId: groupSessionId,
memberId: memberId
)
)
}
static func generateAuthData(
groupSessionId: SessionId,
memberId: String,
using dependencies: Dependencies
) throws -> Authentication.Info {
try dependencies[singleton: .crypto].tryGenerate(
.memberAuthData(
config: dependencies[cache: .sessionUtil]
.config(for: .groupKeys, sessionId: groupSessionId)
.wrappedValue,
groupSessionId: groupSessionId,
memberId: memberId
)
)
}
static func generateSubaccountSignature(
groupSessionId: SessionId,
verificationBytes: [UInt8],
memberAuthData: Data,
using dependencies: Dependencies
) throws -> Authentication.Signature {
try dependencies[singleton: .crypto].tryGenerate(
.signatureSubaccount(
config: dependencies[cache: .sessionUtil]
.config(for: .groupKeys, sessionId: groupSessionId)
.wrappedValue,
verificationBytes: verificationBytes,
memberAuthData: memberAuthData
)
)
}
}

@ -0,0 +1,494 @@
// Copyright © 2023 Rangeproof Pty Ltd. All rights reserved.
import Foundation
import GRDB
import SessionUtil
import SessionSnodeKit
import SessionUtilitiesKit
// MARK: - Size Restrictions
public extension LibSession {
static var sizeMaxGroupMemberCount: Int { 100 }
}
// MARK: - Group Members Handling
internal extension LibSession {
static let columnsRelatedToGroupMembers: [ColumnExpression] = [
GroupMember.Columns.role,
GroupMember.Columns.roleStatus
]
// MARK: - Incoming Changes
static func handleGroupMembersUpdate(
_ db: Database,
in config: Config?,
groupSessionId: SessionId,
serverTimestampMs: Int64,
using dependencies: Dependencies
) throws {
guard config.needsDump(using: dependencies) else { return }
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Get the two member sets
let updatedMembers: Set<GroupMember> = try extractMembers(from: conf, groupSessionId: groupSessionId)
let existingMembers: Set<GroupMember> = (try? GroupMember
.filter(GroupMember.Columns.groupId == groupSessionId.hexString)
.fetchSet(db))
.defaulting(to: [])
let updatedStandardMemberIds: Set<String> = updatedMembers
.filter { $0.role == .standard }
.map { $0.profileId }
.asSet()
let updatedAdminMemberIds: Set<String> = updatedMembers
.filter { $0.role == .admin }
.map { $0.profileId }
.asSet()
// Add in any new members and remove any removed members
try updatedMembers
.subtracting(existingMembers)
.forEach { try $0.upsert(db) }
try GroupMember
.filter(GroupMember.Columns.groupId == groupSessionId.hexString)
.filter(
(
GroupMember.Columns.role == GroupMember.Role.standard &&
!updatedStandardMemberIds.contains(GroupMember.Columns.profileId)
) || (
GroupMember.Columns.role == GroupMember.Role.admin &&
!updatedAdminMemberIds.contains(GroupMember.Columns.profileId)
)
)
.deleteAll(db)
// Schedule a job to process the removals
if (try? extractPendingRemovals(from: conf, groupSessionId: groupSessionId))?.isEmpty == false {
dependencies[singleton: .jobRunner].add(
db,
job: Job(
variant: .processPendingGroupMemberRemovals,
threadId: groupSessionId.hexString,
details: ProcessPendingGroupMemberRemovalsJob.Details(
changeTimestampMs: serverTimestampMs
)
),
canStartJob: true,
using: dependencies
)
}
// If there were members then also extract and update the profile information for the members
// if we don't have newer data locally
guard !updatedMembers.isEmpty else { return }
let groupProfiles: Set<Profile>? = try? extractProfiles(
from: conf,
groupSessionId: groupSessionId,
serverTimestampMs: serverTimestampMs
)
groupProfiles?.forEach { profile in
try? Profile.updateIfNeeded(
db,
publicKey: profile.id,
name: profile.name,
displayPictureUpdate: {
guard
let profilePictureUrl: String = profile.profilePictureUrl,
let profileKey: Data = profile.profileEncryptionKey
else { return .none }
return .updateTo(
url: profilePictureUrl,
key: profileKey,
fileName: nil
)
}(),
sentTimestamp: TimeInterval(Double(serverTimestampMs) * 1000),
calledFromConfig: .groupMembers,
using: dependencies
)
}
}
}
// MARK: - Outgoing Changes
internal extension LibSession {
static func getMembers(
groupSessionId: SessionId,
using dependencies: Dependencies
) throws -> Set<GroupMember> {
return try dependencies[cache: .sessionUtil]
.config(for: .groupMembers, sessionId: groupSessionId)
.wrappedValue
.map { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
return try extractMembers(
from: conf,
groupSessionId: groupSessionId
)
} ?? { throw LibSessionError.failedToRetrieveConfigData }()
}
static func getPendingMemberRemovals(
groupSessionId: SessionId,
using dependencies: Dependencies
) throws -> [String: Bool] {
return try dependencies[cache: .sessionUtil]
.config(for: .groupMembers, sessionId: groupSessionId)
.wrappedValue
.map { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
return try extractPendingRemovals(
from: conf,
groupSessionId: groupSessionId
)
} ?? { throw LibSessionError.failedToRetrieveConfigData }()
}
static func addMembers(
_ db: Database,
groupSessionId: SessionId,
members: [(id: String, profile: Profile?)],
allowAccessToHistoricMessages: Bool,
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
db,
for: .groupMembers,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
try members.forEach { memberId, profile in
var profilePic: user_profile_pic = user_profile_pic()
if
let picUrl: String = profile?.profilePictureUrl,
let picKey: Data = profile?.profileEncryptionKey,
!picUrl.isEmpty,
picKey.count == DisplayPictureManager.aes256KeyByteLength
{
profilePic.url = picUrl.toLibSession()
profilePic.key = picKey.toLibSession()
}
var error: LibSessionError?
try CExceptionHelper.performSafely {
var cMemberId: [CChar] = memberId.cArray
var member: config_group_member = config_group_member()
guard groups_members_get_or_construct(conf, &member, &cMemberId) else {
error = .getOrConstructFailedUnexpectedly
return
}
// Don't override the existing name with an empty one
if let memberName: String = profile?.name, !memberName.isEmpty {
member.name = memberName.toLibSession()
}
member.profile_pic = profilePic
member.invited = 1
member.supplement = allowAccessToHistoricMessages
groups_members_set(conf, &member)
}
if let error: LibSessionError = error {
SNLog("[LibSession] Failed to add member to group: \(groupSessionId)")
throw error
}
}
}
}
static func updateMemberStatus(
_ db: Database,
groupSessionId: SessionId,
memberId: String,
role: GroupMember.Role,
status: GroupMember.RoleStatus,
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
db,
for: .groupMembers,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Only update members if they already exist in the group
var cMemberId: [CChar] = memberId.cArray
var groupMember: config_group_member = config_group_member()
// If the member doesn't exist or the role status is already "accepted" then do nothing
guard
groups_members_get(conf, &groupMember, &cMemberId) && (
(role == .standard && groupMember.invited != Int32(GroupMember.RoleStatus.accepted.rawValue)) ||
(role == .admin && (
!groupMember.admin ||
groupMember.promoted != Int32(GroupMember.RoleStatus.accepted.rawValue)
))
)
else { return }
switch role {
case .standard: groupMember.invited = Int32(status.rawValue)
case .admin:
groupMember.admin = (status == .accepted)
groupMember.promoted = Int32(status.rawValue)
default: break
}
groups_members_set(conf, &groupMember)
}
}
static func flagMembersForRemoval(
_ db: Database,
groupSessionId: SessionId,
memberIds: Set<String>,
removeMessages: Bool,
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
db,
for: .groupMembers,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
memberIds.forEach { memberId in
// Only update members if they already exist in the group
var cMemberId: [CChar] = memberId.cArray
var groupMember: config_group_member = config_group_member()
guard groups_members_get(conf, &groupMember, &cMemberId) else { return }
groupMember.removed = (removeMessages ? 2 : 1)
groups_members_set(conf, &groupMember)
}
}
}
static func removeMembers(
_ db: Database,
groupSessionId: SessionId,
memberIds: Set<String>,
using dependencies: Dependencies
) throws {
try SessionUtil.performAndPushChange(
db,
for: .groupMembers,
sessionId: groupSessionId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
memberIds.forEach { memberId in
var cMemberId: [CChar] = memberId.cArray
groups_members_erase(conf, &cMemberId)
}
}
}
static func updatingGroupMembers<T>(
_ db: Database,
_ updated: [T],
using dependencies: Dependencies
) throws -> [T] {
guard let updatedMembers: [GroupMember] = updated as? [GroupMember] else { throw StorageError.generic }
// Exclude legacy groups as they aren't managed via SessionUtil
let targetMembers: [GroupMember] = updatedMembers
.filter { (try? SessionId(from: $0.groupId))?.prefix == .group }
// If we only updated the current user contact then no need to continue
guard
!targetMembers.isEmpty,
let groupId: SessionId = targetMembers.first.map({ try? SessionId(from: $0.groupId) }),
groupId.prefix == .group
else { return updated }
// Loop through each of the groups and update their settings
try targetMembers.forEach { member in
try SessionUtil.performAndPushChange(
db,
for: .groupMembers,
sessionId: groupId,
using: dependencies
) { config in
guard case .object(let conf) = config else { throw LibSessionError.invalidConfigObject }
// Only update members if they already exist in the group
var cMemberId: [CChar] = member.profileId.cArray
var groupMember: config_group_member = config_group_member()
guard groups_members_get(conf, &groupMember, &cMemberId) else {
return
}
// Update the role and status to match
switch member.role {
case .admin:
groupMember.admin = true
groupMember.invited = 0
groupMember.promoted = member.roleStatus.libSessionValue
default:
groupMember.admin = false
groupMember.invited = member.roleStatus.libSessionValue
groupMember.promoted = 0
}
groups_members_set(conf, &groupMember)
}
}
return updated
}
}
// MARK: - MemberData
private struct MemberData {
let memberId: String
let profile: Profile?
let admin: Bool
let invited: Int32
let promoted: Int32
}
// MARK: - Convenience
internal extension LibSession {
static func extractMembers(
from conf: UnsafeMutablePointer<config_object>?,
groupSessionId: SessionId
) throws -> Set<GroupMember> {
var infiniteLoopGuard: Int = 0
var result: [GroupMember] = []
var member: config_group_member = config_group_member()
let membersIterator: UnsafeMutablePointer<groups_members_iterator> = groups_members_iterator_new(conf)
while !groups_members_iterator_done(membersIterator, &member) {
try SessionUtil.checkLoopLimitReached(&infiniteLoopGuard, for: .groupMembers)
// Ignore members pending removal
guard member.removed == 0 else { continue }
let memberId: String = String(cString: withUnsafeBytes(of: member.session_id) { [UInt8]($0) }
.map { CChar($0) }
.nullTerminated()
)
result.append(
GroupMember(
groupId: groupSessionId.hexString,
profileId: memberId,
role: (member.admin || (member.promoted > 0) ? .admin : .standard),
roleStatus: {
switch (member.invited, member.promoted, member.admin) {
case (2, _, _), (_, 2, false): return .failed // Explicitly failed
case (1..., _, _), (_, 1..., false): return .pending // Pending if not accepted
default: return .accepted // Otherwise it's accepted
}
}(),
isHidden: false
)
)
groups_members_iterator_advance(membersIterator)
}
groups_members_iterator_free(membersIterator) // Need to free the iterator
return result.asSet()
}
static func extractPendingRemovals(
from conf: UnsafeMutablePointer<config_object>?,
groupSessionId: SessionId
) throws -> [String: Bool] {
var infiniteLoopGuard: Int = 0
var result: [String: Bool] = [:]
var member: config_group_member = config_group_member()
let membersIterator: UnsafeMutablePointer<groups_members_iterator> = groups_members_iterator_new(conf)
while !groups_members_iterator_done(membersIterator, &member) {
try SessionUtil.checkLoopLimitReached(&infiniteLoopGuard, for: .groupMembers)
guard member.removed > 0 else {
groups_members_iterator_advance(membersIterator)
continue
}
let memberId: String = String(cString: withUnsafeBytes(of: member.session_id) { [UInt8]($0) }
.map { CChar($0) }
.nullTerminated()
)
result[memberId] = (member.removed == 2)
groups_members_iterator_advance(membersIterator)
}
groups_members_iterator_free(membersIterator) // Need to free the iterator
return result
}
static func extractProfiles(
from conf: UnsafeMutablePointer<config_object>?,
groupSessionId: SessionId,
serverTimestampMs: Int64
) throws -> Set<Profile> {
var infiniteLoopGuard: Int = 0
var result: [Profile] = []
var member: config_group_member = config_group_member()
let membersIterator: UnsafeMutablePointer<groups_members_iterator> = groups_members_iterator_new(conf)
while !groups_members_iterator_done(membersIterator, &member) {
try SessionUtil.checkLoopLimitReached(&infiniteLoopGuard, for: .groupMembers)
// Ignore members pending removal
guard member.removed == 0 else { continue }
let memberId: String = String(cString: withUnsafeBytes(of: member.session_id) { [UInt8]($0) }
.map { CChar($0) }
.nullTerminated()
)
let profilePictureUrl: String? = String(libSessionVal: member.profile_pic.url, nullIfEmpty: true)
result.append(
Profile(
id: memberId,
name: String(libSessionVal: member.name),
lastNameUpdate: TimeInterval(Double(serverTimestampMs) / 1000),
nickname: nil,
profilePictureUrl: profilePictureUrl,
profileEncryptionKey: (profilePictureUrl == nil ? nil :
Data(
libSessionVal: member.profile_pic.key,
count: DisplayPictureManager.aes256KeyByteLength
)
),
lastProfilePictureUpdate: TimeInterval(Double(serverTimestampMs) / 1000),
lastBlocksCommunityMessageRequests: nil
)
)
groups_members_iterator_advance(membersIterator)
}
groups_members_iterator_free(membersIterator) // Need to free the iterator
return result.asSet()
}
}

@ -9,13 +9,13 @@ import SessionUtilitiesKit
// MARK: - Convenience
public extension SessionUtil {
public extension LibSession {
enum Crypto {
public typealias Domain = String
}
}
internal extension SessionUtil {
internal extension LibSession {
/// This is a buffer period within which we will process messages which would result in a config change, any message which would normally
/// result in a config change which was sent before `lastConfigMessage.timestamp - configChangeBufferPeriod` will not
/// actually have it's changes applied (info messages would still be inserted though)
@ -50,7 +50,7 @@ internal extension SessionUtil {
static let hiddenPriority: Int32 = -1
static func shouldBeVisible(priority: Int32) -> Bool {
return (priority >= SessionUtil.visiblePriority)
return (priority >= LibSession.visiblePriority)
}
static func pushChangesIfNeeded(
@ -87,7 +87,7 @@ internal extension SessionUtil {
// If we don't need to dump the data the we can finish early
guard config.needsDump(using: dependencies) else { return config.needsPush }
try SessionUtil.createDump(
try LibSession.createDump(
config: config,
for: variant,
sessionId: sessionId,
@ -99,7 +99,7 @@ internal extension SessionUtil {
}
}
catch {
SNLog("[SessionUtil] Failed to update/dump updated \(variant) config data due to error: \(error)")
SNLog("[LibSession] Failed to update/dump updated \(variant) config data due to error: \(error)")
throw error
}
@ -107,7 +107,7 @@ internal extension SessionUtil {
guard needsPush else { return }
db.afterNextTransactionNestedOnce(dedupeId: SessionUtil.syncDedupeId(sessionId.hexString)) { db in
ConfigurationSyncJob.enqueue(db, sessionIdHexString: sessionId.hexString)
ConfigurationSyncJob.enqueue(db, swarmPublicKey: sessionId.hexString, using: dependencies)
}
}
@ -140,19 +140,19 @@ internal extension SessionUtil {
// If the 'Note to Self' conversation is pinned then we need to custom handle it
// first as it's part of the UserProfile config
if let noteToSelf: SessionThread = threads.first(where: { $0.id == userSessionId.hexString }) {
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userProfile,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.updateNoteToSelf(
try LibSession.updateNoteToSelf(
priority: {
guard noteToSelf.shouldBeVisible else { return SessionUtil.hiddenPriority }
guard noteToSelf.shouldBeVisible else { return LibSession.hiddenPriority }
return noteToSelf.pinnedPriority
.map { Int32($0 == 0 ? SessionUtil.visiblePriority : max($0, 1)) }
.defaulting(to: SessionUtil.visiblePriority)
.map { Int32($0 == 0 ? LibSession.visiblePriority : max($0, 1)) }
.defaulting(to: LibSession.visiblePriority)
}(),
in: config
)
@ -164,23 +164,23 @@ internal extension SessionUtil {
guard !remainingThreads.isEmpty else { return }
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .contacts,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.upsert(
try LibSession.upsert(
contactData: remainingThreads
.map { thread in
SyncedContactInfo(
id: thread.id,
priority: {
guard thread.shouldBeVisible else { return SessionUtil.hiddenPriority }
guard thread.shouldBeVisible else { return LibSession.hiddenPriority }
return thread.pinnedPriority
.map { Int32($0 == 0 ? SessionUtil.visiblePriority : max($0, 1)) }
.defaulting(to: SessionUtil.visiblePriority)
.map { Int32($0 == 0 ? LibSession.visiblePriority : max($0, 1)) }
.defaulting(to: LibSession.visiblePriority)
}()
)
},
@ -190,21 +190,21 @@ internal extension SessionUtil {
}
case .community:
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userGroups,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.upsert(
try LibSession.upsert(
communities: threads
.compactMap { thread -> CommunityInfo? in
urlInfo[thread.id].map { urlInfo in
CommunityInfo(
urlInfo: urlInfo,
priority: thread.pinnedPriority
.map { Int32($0 == 0 ? SessionUtil.visiblePriority : max($0, 1)) }
.defaulting(to: SessionUtil.visiblePriority)
.map { Int32($0 == 0 ? LibSession.visiblePriority : max($0, 1)) }
.defaulting(to: LibSession.visiblePriority)
)
}
},
@ -214,20 +214,20 @@ internal extension SessionUtil {
}
case .legacyGroup:
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userGroups,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.upsert(
try LibSession.upsert(
legacyGroups: threads
.map { thread in
LegacyGroupInfo(
id: thread.id,
priority: thread.pinnedPriority
.map { Int32($0 == 0 ? SessionUtil.visiblePriority : max($0, 1)) }
.defaulting(to: SessionUtil.visiblePriority)
.map { Int32($0 == 0 ? LibSession.visiblePriority : max($0, 1)) }
.defaulting(to: LibSession.visiblePriority)
)
},
in: config,
@ -275,7 +275,7 @@ internal extension SessionUtil {
return try dependencies[cache: .sessionUtil]
.config(for: .userProfile, sessionId: userSessionId)
.wrappedValue
.map { config -> Bool in (try SessionUtil.rawBlindedMessageRequestValue(in: config) >= 0) }
.map { config -> Bool in (try LibSession.rawBlindedMessageRequestValue(in: config) >= 0) }
.defaulting(to: false)
default: return false
@ -295,13 +295,13 @@ internal extension SessionUtil {
// Currently the only synced setting is 'checkForCommunityMessageRequests'
switch updatedSetting.id {
case Setting.BoolKey.checkForCommunityMessageRequests.rawValue:
try SessionUtil.performAndPushChange(
try LibSession.performAndPushChange(
db,
for: .userProfile,
sessionId: userSessionId,
using: dependencies
) { config in
try SessionUtil.updateSettings(
try LibSession.updateSettings(
checkForCommunityMessageRequests: updatedSetting.unsafeValue(as: Bool.self),
in: config
)
@ -325,14 +325,14 @@ internal extension SessionUtil {
let navController: UINavigationController = topBannerController.children[0] as? UINavigationController
else { return }
// Extract the ones which will respond to SessionUtil changes
let targetViewControllers: [any SessionUtilRespondingViewController] = navController
// Extract the ones which will respond to LibSession changes
let targetViewControllers: [any LibSessionRespondingViewController] = navController
.viewControllers
.compactMap { $0 as? SessionUtilRespondingViewController }
.compactMap { $0 as? LibSessionRespondingViewController }
let presentedNavController: UINavigationController? = (navController.presentedViewController as? UINavigationController)
let presentedTargetViewControllers: [any SessionUtilRespondingViewController] = (presentedNavController?
let presentedTargetViewControllers: [any LibSessionRespondingViewController] = (presentedNavController?
.viewControllers
.compactMap { $0 as? SessionUtilRespondingViewController })
.compactMap { $0 as? LibSessionRespondingViewController })
.defaulting(to: [])
// Make sure we have a conversation list and that one of the removed conversations are
@ -361,7 +361,7 @@ internal extension SessionUtil {
guard
let targetViewController: UIViewController = navController.viewControllers
.last(where: { viewController in
((viewController as? SessionUtilRespondingViewController)?.isConversationList)
((viewController as? LibSessionRespondingViewController)?.isConversationList)
.defaulting(to: false)
})
else { return }
@ -381,7 +381,7 @@ internal extension SessionUtil {
let targetViewController: UIViewController = presentedNavController?
.viewControllers
.last(where: { viewController in
((viewController as? SessionUtilRespondingViewController)?.isConversationList)
((viewController as? LibSessionRespondingViewController)?.isConversationList)
.defaulting(to: false)
})
else { return }
@ -428,22 +428,22 @@ internal extension SessionUtil {
.defaulting(to: 0)
// Ensure the change occurred after the last config message was handled (minus the buffer period)
return (changeTimestampMs >= (configDumpTimestampMs - Int64(SessionUtil.configChangeBufferPeriod * 1000)))
return (changeTimestampMs >= (configDumpTimestampMs - Int64(LibSession.configChangeBufferPeriod * 1000)))
}
static func checkLoopLimitReached(_ loopCounter: inout Int, for variant: ConfigDump.Variant, maxLoopCount: Int = 50000) throws {
loopCounter += 1
guard loopCounter < maxLoopCount else {
SNLog("[SessionUtil] Got stuck in infinite loop processing '\(variant.description)' data")
throw SessionUtilError.processingLoopLimitReached
SNLog("[LibSession] Got stuck in infinite loop processing '\(variant)' data")
throw LibSessionError.processingLoopLimitReached
}
}
}
// MARK: - Encryption
public extension SessionUtil {
public extension LibSession {
static func encrypt(
messages: [Data],
toRecipients recipients: [SessionId],
@ -520,7 +520,7 @@ public extension SessionUtil {
// MARK: - External Outgoing Changes
public extension SessionUtil {
public extension LibSession {
static func conversationInConfig(
_ db: Database? = nil,
threadId: String,
@ -550,7 +550,7 @@ public extension SessionUtil {
guard threadId != userSessionId.hexString else {
return (
!visibleOnly ||
SessionUtil.shouldBeVisible(priority: user_profile_get_nts_priority(conf))
LibSession.shouldBeVisible(priority: user_profile_get_nts_priority(conf))
)
}
@ -561,7 +561,7 @@ public extension SessionUtil {
/// If the user opens a conversation with an existing contact but doesn't send them a message
/// then the one-to-one conversation should remain hidden so we want to delete the `SessionThread`
/// when leaving the conversation
return (!visibleOnly || SessionUtil.shouldBeVisible(priority: contact.priority))
return (!visibleOnly || LibSession.shouldBeVisible(priority: contact.priority))
case .community:
let maybeUrlInfo: OpenGroupUrlInfo? = dependencies[singleton: .storage]
@ -601,7 +601,7 @@ public extension SessionUtil {
// MARK: - ColumnKey
internal extension SessionUtil {
internal extension LibSession {
struct ColumnKey: Equatable, Hashable {
let sourceType: Any.Type
let columnName: String
@ -627,7 +627,7 @@ internal extension SessionUtil {
// MARK: - PriorityVisibilityInfo
extension SessionUtil {
extension LibSession {
struct PriorityVisibilityInfo: Codable, FetchableRecord, Identifiable {
let id: String
let variant: SessionThread.Variant
@ -636,16 +636,16 @@ extension SessionUtil {
}
}
// MARK: - SessionUtilRespondingViewController
// MARK: - LibSessionRespondingViewController
public protocol SessionUtilRespondingViewController {
public protocol LibSessionRespondingViewController {
var isConversationList: Bool { get }
func isConversation(in threadIds: [String]) -> Bool
func forceRefreshIfNeeded()
}
public extension SessionUtilRespondingViewController {
public extension LibSessionRespondingViewController {
var isConversationList: Bool { false }
func isConversation(in threadIds: [String]) -> Bool { return false }

Some files were not shown because too many files have changed in this diff Show More

Loading…
Cancel
Save