mirror of https://github.com/oxen-io/session-ios
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1006 lines
42 KiB
Swift
1006 lines
42 KiB
Swift
// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
|
|
|
|
import Foundation
|
|
import Combine
|
|
import GRDB
|
|
import SessionUtilitiesKit
|
|
import SessionSnodeKit
|
|
|
|
// MARK: - Singleton
|
|
|
|
public extension Singleton {
|
|
static let openGroupManager: SingletonConfig<OpenGroupManager> = Dependencies.create(
|
|
identifier: "openGroupManager",
|
|
createInstance: { dependencies in OpenGroupManager(using: dependencies) }
|
|
)
|
|
}
|
|
|
|
// MARK: - Cache
|
|
|
|
public extension Cache {
|
|
static let openGroupManager: CacheConfig<OGMCacheType, OGMImmutableCacheType> = Dependencies.create(
|
|
identifier: "openGroupManager",
|
|
createInstance: { dependencies in OpenGroupManager.Cache(using: dependencies) },
|
|
mutableInstance: { $0 },
|
|
immutableInstance: { $0 }
|
|
)
|
|
}
|
|
|
|
// MARK: - Log.Category
|
|
|
|
public extension Log.Category {
|
|
static let openGroup: Log.Category = .create("OpenGroup", defaultLevel: .info)
|
|
}
|
|
|
|
// MARK: - OpenGroupManager
|
|
|
|
public final class OpenGroupManager {
|
|
public typealias DefaultRoomInfo = (room: OpenGroupAPI.Room, openGroup: OpenGroup)
|
|
|
|
private let dependencies: Dependencies
|
|
|
|
// MARK: - Initialization
|
|
|
|
init(using dependencies: Dependencies) {
|
|
self.dependencies = dependencies
|
|
}
|
|
|
|
// MARK: - Adding & Removing
|
|
|
|
// stringlint:ignore_contents
|
|
private static func port(for server: String, serverUrl: URL) -> String {
|
|
if let port: Int = serverUrl.port {
|
|
return ":\(port)"
|
|
}
|
|
|
|
let components: [String] = server.components(separatedBy: ":")
|
|
|
|
guard
|
|
let port: String = components.last,
|
|
(
|
|
port != components.first &&
|
|
!port.starts(with: "//")
|
|
)
|
|
else { return "" }
|
|
|
|
return ":\(port)"
|
|
}
|
|
|
|
public static func isSessionRunOpenGroup(server: String) -> Bool {
|
|
guard let serverUrl: URL = (URL(string: server.lowercased()) ?? URL(string: "http://\(server.lowercased())")) else {
|
|
return false
|
|
}
|
|
|
|
let serverPort: String = OpenGroupManager.port(for: server, serverUrl: serverUrl)
|
|
let serverHost: String = serverUrl.host
|
|
.defaulting(
|
|
to: server
|
|
.lowercased()
|
|
.replacingOccurrences(of: serverPort, with: "")
|
|
)
|
|
let options: Set<String> = Set([
|
|
OpenGroupAPI.legacyDefaultServerIP,
|
|
OpenGroupAPI.defaultServer
|
|
.replacingOccurrences(of: "http://", with: "")
|
|
.replacingOccurrences(of: "https://", with: "")
|
|
])
|
|
|
|
return options.contains(serverHost)
|
|
}
|
|
|
|
public func hasExistingOpenGroup(
|
|
roomToken: String,
|
|
server: String,
|
|
publicKey: String
|
|
) -> Bool? {
|
|
return dependencies[singleton: .storage].read { [weak self] db in
|
|
self?.hasExistingOpenGroup(db, roomToken: roomToken, server: server, publicKey: publicKey)
|
|
}
|
|
}
|
|
|
|
public func hasExistingOpenGroup(
|
|
_ db: Database,
|
|
roomToken: String,
|
|
server: String,
|
|
publicKey: String
|
|
) -> Bool {
|
|
guard let serverUrl: URL = URL(string: server.lowercased()) else { return false }
|
|
|
|
let serverPort: String = OpenGroupManager.port(for: server, serverUrl: serverUrl)
|
|
let serverHost: String = serverUrl.host
|
|
.defaulting(
|
|
to: server
|
|
.lowercased()
|
|
.replacingOccurrences(of: serverPort, with: "")
|
|
)
|
|
let defaultServerHost: String = OpenGroupAPI.defaultServer
|
|
.replacingOccurrences(of: "http://", with: "")
|
|
.replacingOccurrences(of: "https://", with: "")
|
|
var serverOptions: Set<String> = Set([
|
|
server.lowercased(),
|
|
"\(serverHost)\(serverPort)",
|
|
"http://\(serverHost)\(serverPort)",
|
|
"https://\(serverHost)\(serverPort)"
|
|
])
|
|
|
|
// If the server is run by Session then include all configurations in case one of the alternate configurations
|
|
// was used
|
|
if OpenGroupManager.isSessionRunOpenGroup(server: server) {
|
|
serverOptions.insert(defaultServerHost)
|
|
serverOptions.insert("http://\(defaultServerHost)")
|
|
serverOptions.insert("https://\(defaultServerHost)")
|
|
serverOptions.insert(OpenGroupAPI.legacyDefaultServerIP)
|
|
serverOptions.insert("http://\(OpenGroupAPI.legacyDefaultServerIP)")
|
|
serverOptions.insert("https://\(OpenGroupAPI.legacyDefaultServerIP)")
|
|
}
|
|
|
|
// First check if there is no poller for the specified server
|
|
if Set(dependencies[cache: .communityPollers].serversBeingPolled).intersection(serverOptions).isEmpty {
|
|
return false
|
|
}
|
|
|
|
// Then check if there is an existing open group thread
|
|
let hasExistingThread: Bool = serverOptions.contains(where: { serverName in
|
|
(try? SessionThread
|
|
.exists(
|
|
db,
|
|
id: OpenGroup.idFor(roomToken: roomToken, server: serverName)
|
|
))
|
|
.defaulting(to: false)
|
|
})
|
|
|
|
return hasExistingThread
|
|
}
|
|
|
|
public func add(
|
|
_ db: Database,
|
|
roomToken: String,
|
|
server: String,
|
|
publicKey: String,
|
|
forceVisible: Bool
|
|
) -> Bool {
|
|
// If we are currently polling for this server and already have a TSGroupThread for this room the do nothing
|
|
if hasExistingOpenGroup(db, roomToken: roomToken, server: server, publicKey: publicKey) {
|
|
Log.info(.openGroup, "Ignoring join open group attempt (already joined)")
|
|
return false
|
|
}
|
|
|
|
// Store the open group information
|
|
let targetServer: String = {
|
|
guard OpenGroupManager.isSessionRunOpenGroup(server: server) else {
|
|
return server.lowercased()
|
|
}
|
|
|
|
return OpenGroupAPI.defaultServer
|
|
}()
|
|
let threadId: String = OpenGroup.idFor(roomToken: roomToken, server: targetServer)
|
|
|
|
// Optionally try to insert a new version of the OpenGroup (it will fail if there is already an
|
|
// inactive one but that won't matter as we then activate it)
|
|
_ = try? SessionThread.upsert(
|
|
db,
|
|
id: threadId,
|
|
variant: .community,
|
|
values: SessionThread.TargetValues(
|
|
/// When adding an open group via config handling then we want to force it to be visible (if it did come via config
|
|
/// handling then we want to wait until it actually has messages before making it visible)
|
|
shouldBeVisible: (forceVisible ? .setTo(true) : .useExisting)
|
|
),
|
|
using: dependencies
|
|
)
|
|
|
|
if (try? OpenGroup.exists(db, id: threadId)) == false {
|
|
try? OpenGroup
|
|
.fetchOrCreate(db, server: targetServer, roomToken: roomToken, publicKey: publicKey)
|
|
.upsert(db)
|
|
}
|
|
|
|
// Set the group to active and reset the sequenceNumber (handle groups which have
|
|
// been deactivated)
|
|
_ = try? OpenGroup
|
|
.filter(id: OpenGroup.idFor(roomToken: roomToken, server: targetServer))
|
|
.updateAllAndConfig(
|
|
db,
|
|
OpenGroup.Columns.isActive.set(to: true),
|
|
OpenGroup.Columns.sequenceNumber.set(to: 0),
|
|
using: dependencies
|
|
)
|
|
|
|
return true
|
|
}
|
|
|
|
public func performInitialRequestsAfterAdd(
|
|
queue: DispatchQueue,
|
|
successfullyAddedGroup: Bool,
|
|
roomToken: String,
|
|
server: String,
|
|
publicKey: String
|
|
) -> AnyPublisher<Void, Error> {
|
|
// Only bother performing the initial request if the network isn't suspended
|
|
guard
|
|
successfullyAddedGroup,
|
|
!dependencies[singleton: .storage].isSuspended,
|
|
!dependencies[cache: .libSessionNetwork].isSuspended
|
|
else {
|
|
return Just(())
|
|
.setFailureType(to: Error.self)
|
|
.eraseToAnyPublisher()
|
|
}
|
|
|
|
// Store the open group information
|
|
let targetServer: String = {
|
|
guard OpenGroupManager.isSessionRunOpenGroup(server: server) else {
|
|
return server.lowercased()
|
|
}
|
|
|
|
return OpenGroupAPI.defaultServer
|
|
}()
|
|
|
|
return dependencies[singleton: .storage]
|
|
.readPublisher { [dependencies] db in
|
|
try OpenGroupAPI.preparedCapabilitiesAndRoom(
|
|
db,
|
|
for: roomToken,
|
|
on: targetServer,
|
|
using: dependencies
|
|
)
|
|
}
|
|
.flatMap { [dependencies] request in request.send(using: dependencies) }
|
|
.flatMapStorageWritePublisher(using: dependencies) { [dependencies] (db: Database, response: (info: ResponseInfoType, value: OpenGroupAPI.CapabilitiesAndRoomResponse)) -> Void in
|
|
// Add the new open group to libSession
|
|
try LibSession.add(
|
|
db,
|
|
server: server,
|
|
rootToken: roomToken,
|
|
publicKey: publicKey,
|
|
using: dependencies
|
|
)
|
|
|
|
// Store the capabilities first
|
|
OpenGroupManager.handleCapabilities(
|
|
db,
|
|
capabilities: response.value.capabilities.data,
|
|
on: targetServer
|
|
)
|
|
|
|
// Then the room
|
|
try OpenGroupManager.handlePollInfo(
|
|
db,
|
|
pollInfo: OpenGroupAPI.RoomPollInfo(room: response.value.room.data),
|
|
publicKey: publicKey,
|
|
for: roomToken,
|
|
on: targetServer,
|
|
using: dependencies
|
|
)
|
|
}
|
|
.handleEvents(
|
|
receiveCompletion: { [dependencies] result in
|
|
switch result {
|
|
case .finished:
|
|
// (Re)start the poller if needed (want to force it to poll immediately in the next
|
|
// run loop to avoid a big delay before the next poll)
|
|
dependencies.mutate(cache: .communityPollers) { cache in
|
|
let poller: CommunityPollerType = cache.getOrCreatePoller(for: server.lowercased())
|
|
poller.stop()
|
|
poller.startIfNeeded()
|
|
}
|
|
|
|
case .failure(let error): Log.error(.openGroup, "Failed to join open group with error: \(error).")
|
|
}
|
|
}
|
|
)
|
|
.eraseToAnyPublisher()
|
|
}
|
|
|
|
public func delete(
|
|
_ db: Database,
|
|
openGroupId: String,
|
|
skipLibSessionUpdate: Bool
|
|
) throws {
|
|
let server: String? = try? OpenGroup
|
|
.select(.server)
|
|
.filter(id: openGroupId)
|
|
.asRequest(of: String.self)
|
|
.fetchOne(db)
|
|
let roomToken: String? = try? OpenGroup
|
|
.select(.roomToken)
|
|
.filter(id: openGroupId)
|
|
.asRequest(of: String.self)
|
|
.fetchOne(db)
|
|
|
|
// Stop the poller if needed
|
|
//
|
|
// Note: The default room promise creates an OpenGroup with an empty `roomToken` value,
|
|
// we don't want to start a poller for this as the user hasn't actually joined a room
|
|
let numActiveRooms: Int = (try? OpenGroup
|
|
.filter(OpenGroup.Columns.server == server?.lowercased())
|
|
.filter(OpenGroup.Columns.roomToken != "")
|
|
.filter(OpenGroup.Columns.isActive)
|
|
.fetchCount(db))
|
|
.defaulting(to: 1)
|
|
|
|
if numActiveRooms == 1, let server: String = server?.lowercased() {
|
|
dependencies.mutate(cache: .communityPollers) {
|
|
$0.stopAndRemovePoller(for: server)
|
|
}
|
|
}
|
|
|
|
// Remove all the data (everything should cascade delete)
|
|
_ = try? SessionThread
|
|
.filter(id: openGroupId)
|
|
.deleteAll(db)
|
|
|
|
// Remove any MessageProcessRecord entries (we will want to reprocess all OpenGroup messages
|
|
// if they get re-added)
|
|
_ = try? ControlMessageProcessRecord
|
|
.filter(ControlMessageProcessRecord.Columns.threadId == openGroupId)
|
|
.deleteAll(db)
|
|
|
|
// Remove the open group (no foreign key to the thread so it won't auto-delete)
|
|
if server?.lowercased() != OpenGroupAPI.defaultServer.lowercased() {
|
|
_ = try? OpenGroup
|
|
.filter(id: openGroupId)
|
|
.deleteAll(db)
|
|
}
|
|
else {
|
|
// If it's a session-run room then just set it to inactive
|
|
_ = try? OpenGroup
|
|
.filter(id: openGroupId)
|
|
.updateAllAndConfig(
|
|
db,
|
|
OpenGroup.Columns.isActive.set(to: false),
|
|
using: dependencies
|
|
)
|
|
}
|
|
|
|
if !skipLibSessionUpdate, let server: String = server, let roomToken: String = roomToken {
|
|
try LibSession.remove(db, server: server, roomToken: roomToken, using: dependencies)
|
|
}
|
|
}
|
|
|
|
// MARK: - Response Processing
|
|
|
|
internal static func handleCapabilities(
|
|
_ db: Database,
|
|
capabilities: OpenGroupAPI.Capabilities,
|
|
on server: String
|
|
) {
|
|
// Remove old capabilities first
|
|
_ = try? Capability
|
|
.filter(Capability.Columns.openGroupServer == server.lowercased())
|
|
.deleteAll(db)
|
|
|
|
// Then insert the new capabilities (both present and missing)
|
|
capabilities.capabilities.forEach { capability in
|
|
try? Capability(
|
|
openGroupServer: server.lowercased(),
|
|
variant: capability,
|
|
isMissing: false
|
|
)
|
|
.upsert(db)
|
|
}
|
|
capabilities.missing?.forEach { capability in
|
|
try? Capability(
|
|
openGroupServer: server.lowercased(),
|
|
variant: capability,
|
|
isMissing: true
|
|
)
|
|
.upsert(db)
|
|
}
|
|
}
|
|
|
|
internal static func handlePollInfo(
|
|
_ db: Database,
|
|
pollInfo: OpenGroupAPI.RoomPollInfo,
|
|
publicKey maybePublicKey: String?,
|
|
for roomToken: String,
|
|
on server: String,
|
|
using dependencies: Dependencies
|
|
) throws {
|
|
// Create the open group model and get or create the thread
|
|
let threadId: String = OpenGroup.idFor(roomToken: roomToken, server: server)
|
|
|
|
guard let openGroup: OpenGroup = try OpenGroup.fetchOne(db, id: threadId) else { return }
|
|
|
|
// Only update the database columns which have changed (this is to prevent the UI from triggering
|
|
// updates due to changing database columns to the existing value)
|
|
let hasDetails: Bool = (pollInfo.details != nil)
|
|
let permissions: OpenGroup.Permissions = OpenGroup.Permissions(roomInfo: pollInfo)
|
|
let changes: [ConfigColumnAssignment] = []
|
|
.appending(openGroup.publicKey == maybePublicKey ? nil :
|
|
maybePublicKey.map { OpenGroup.Columns.publicKey.set(to: $0) }
|
|
)
|
|
.appending(openGroup.userCount == pollInfo.activeUsers ? nil :
|
|
OpenGroup.Columns.userCount.set(to: pollInfo.activeUsers)
|
|
)
|
|
.appending(openGroup.permissions == permissions ? nil :
|
|
OpenGroup.Columns.permissions.set(to: permissions)
|
|
)
|
|
.appending(!hasDetails || openGroup.name == pollInfo.details?.name ? nil :
|
|
OpenGroup.Columns.name.set(to: pollInfo.details?.name)
|
|
)
|
|
.appending(!hasDetails || openGroup.roomDescription == pollInfo.details?.roomDescription ? nil :
|
|
OpenGroup.Columns.roomDescription.set(to: pollInfo.details?.roomDescription)
|
|
)
|
|
.appending(!hasDetails || openGroup.imageId == pollInfo.details?.imageId ? nil :
|
|
OpenGroup.Columns.imageId.set(to: pollInfo.details?.imageId)
|
|
)
|
|
.appending(!hasDetails || openGroup.infoUpdates == pollInfo.details?.infoUpdates ? nil :
|
|
OpenGroup.Columns.infoUpdates.set(to: pollInfo.details?.infoUpdates)
|
|
)
|
|
|
|
try OpenGroup
|
|
.filter(id: openGroup.id)
|
|
.updateAllAndConfig(db, changes, using: dependencies)
|
|
|
|
// Update the admin/moderator group members
|
|
if let roomDetails: OpenGroupAPI.Room = pollInfo.details {
|
|
_ = try? GroupMember
|
|
.filter(GroupMember.Columns.groupId == threadId)
|
|
.deleteAll(db)
|
|
|
|
try roomDetails.admins.forEach { adminId in
|
|
try GroupMember(
|
|
groupId: threadId,
|
|
profileId: adminId,
|
|
role: .admin,
|
|
roleStatus: .accepted, // Community members don't have role statuses
|
|
isHidden: false
|
|
).upsert(db)
|
|
}
|
|
|
|
try roomDetails.hiddenAdmins
|
|
.defaulting(to: [])
|
|
.forEach { adminId in
|
|
try GroupMember(
|
|
groupId: threadId,
|
|
profileId: adminId,
|
|
role: .admin,
|
|
roleStatus: .accepted, // Community members don't have role statuses
|
|
isHidden: true
|
|
).upsert(db)
|
|
}
|
|
|
|
try roomDetails.moderators.forEach { moderatorId in
|
|
try GroupMember(
|
|
groupId: threadId,
|
|
profileId: moderatorId,
|
|
role: .moderator,
|
|
roleStatus: .accepted, // Community members don't have role statuses
|
|
isHidden: false
|
|
).upsert(db)
|
|
}
|
|
|
|
try roomDetails.hiddenModerators
|
|
.defaulting(to: [])
|
|
.forEach { moderatorId in
|
|
try GroupMember(
|
|
groupId: threadId,
|
|
profileId: moderatorId,
|
|
role: .moderator,
|
|
roleStatus: .accepted, // Community members don't have role statuses
|
|
isHidden: true
|
|
).upsert(db)
|
|
}
|
|
}
|
|
|
|
/// Schedule the room image download (if we don't have one or it's been updated)
|
|
if
|
|
let imageId: String = (pollInfo.details?.imageId ?? openGroup.imageId),
|
|
(
|
|
openGroup.displayPictureFilename == nil ||
|
|
openGroup.imageId != imageId
|
|
)
|
|
{
|
|
dependencies[singleton: .jobRunner].add(
|
|
db,
|
|
job: Job(
|
|
variant: .displayPictureDownload,
|
|
shouldBeUnique: true,
|
|
details: DisplayPictureDownloadJob.Details(
|
|
target: .community(
|
|
imageId: imageId,
|
|
roomToken: openGroup.roomToken,
|
|
server: openGroup.server
|
|
),
|
|
timestamp: (dependencies[cache: .snodeAPI].currentOffsetTimestampMs() / 1000)
|
|
)
|
|
),
|
|
canStartJob: true
|
|
)
|
|
}
|
|
}
|
|
|
|
internal static func handleMessages(
|
|
_ db: Database,
|
|
messages: [OpenGroupAPI.Message],
|
|
for roomToken: String,
|
|
on server: String,
|
|
using dependencies: Dependencies
|
|
) {
|
|
guard let openGroup: OpenGroup = try? OpenGroup.fetchOne(db, id: OpenGroup.idFor(roomToken: roomToken, server: server)) else {
|
|
Log.error(.openGroup, "Couldn't handle open group messages due to missing group.")
|
|
return
|
|
}
|
|
|
|
// Sorting the messages by server ID before importing them fixes an issue where messages
|
|
// that quote older messages can't find those older messages
|
|
let sortedMessages: [OpenGroupAPI.Message] = messages
|
|
.filter { $0.deleted != true }
|
|
.sorted { lhs, rhs in lhs.id < rhs.id }
|
|
var messageServerInfoToRemove: [(id: Int64, seqNo: Int64)] = messages
|
|
.filter { $0.deleted == true }
|
|
.map { ($0.id, $0.seqNo) }
|
|
var largestValidSeqNo: Int64 = openGroup.sequenceNumber
|
|
|
|
// Process the messages
|
|
sortedMessages.forEach { message in
|
|
if message.base64EncodedData == nil && message.reactions == nil {
|
|
messageServerInfoToRemove.append((message.id, message.seqNo))
|
|
return
|
|
}
|
|
|
|
// Handle messages
|
|
if let base64EncodedString: String = message.base64EncodedData,
|
|
let data = Data(base64Encoded: base64EncodedString)
|
|
{
|
|
do {
|
|
let processedMessage: ProcessedMessage? = try Message.processReceivedOpenGroupMessage(
|
|
db,
|
|
openGroupId: openGroup.id,
|
|
openGroupServerPublicKey: openGroup.publicKey,
|
|
message: message,
|
|
data: data,
|
|
using: dependencies
|
|
)
|
|
|
|
switch processedMessage {
|
|
case .config, .none: break
|
|
case .standard(_, _, _, let messageInfo):
|
|
try MessageReceiver.handle(
|
|
db,
|
|
threadId: openGroup.id,
|
|
threadVariant: .community,
|
|
message: messageInfo.message,
|
|
serverExpirationTimestamp: messageInfo.serverExpirationTimestamp,
|
|
associatedWithProto: try SNProtoContent.parseData(messageInfo.serializedProtoData),
|
|
using: dependencies
|
|
)
|
|
largestValidSeqNo = max(largestValidSeqNo, message.seqNo)
|
|
}
|
|
}
|
|
catch {
|
|
switch error {
|
|
// Ignore duplicate & selfSend message errors (and don't bother logging
|
|
// them as there will be a lot since we each service node duplicates messages)
|
|
case DatabaseError.SQLITE_CONSTRAINT_UNIQUE,
|
|
DatabaseError.SQLITE_CONSTRAINT, // Sometimes thrown for UNIQUE
|
|
MessageReceiverError.duplicateMessage,
|
|
MessageReceiverError.duplicateControlMessage,
|
|
MessageReceiverError.selfSend:
|
|
break
|
|
|
|
default: Log.error(.openGroup, "Couldn't receive open group message due to error: \(error).")
|
|
}
|
|
}
|
|
}
|
|
|
|
// Handle reactions
|
|
if message.reactions != nil {
|
|
do {
|
|
let reactions: [Reaction] = Message.processRawReceivedReactions(
|
|
db,
|
|
openGroupId: openGroup.id,
|
|
message: message,
|
|
associatedPendingChanges: dependencies[cache: .openGroupManager].pendingChanges
|
|
.filter {
|
|
guard $0.server == server && $0.room == roomToken && $0.changeType == .reaction else {
|
|
return false
|
|
}
|
|
|
|
if case .reaction(let messageId, _, _) = $0.metadata {
|
|
return messageId == message.id
|
|
}
|
|
return false
|
|
},
|
|
using: dependencies
|
|
)
|
|
|
|
try MessageReceiver.handleOpenGroupReactions(
|
|
db,
|
|
threadId: openGroup.threadId,
|
|
openGroupMessageServerId: message.id,
|
|
openGroupReactions: reactions
|
|
)
|
|
largestValidSeqNo = max(largestValidSeqNo, message.seqNo)
|
|
}
|
|
catch {
|
|
Log.error(.openGroup, "Couldn't handle open group reactions due to error: \(error).")
|
|
}
|
|
}
|
|
}
|
|
|
|
// Handle any deletions that are needed
|
|
if !messageServerInfoToRemove.isEmpty {
|
|
let messageServerIdsToRemove: [Int64] = messageServerInfoToRemove.map { $0.id }
|
|
_ = try? Interaction
|
|
.filter(Interaction.Columns.threadId == openGroup.threadId)
|
|
.filter(messageServerIdsToRemove.contains(Interaction.Columns.openGroupServerMessageId))
|
|
.deleteAll(db)
|
|
|
|
// Update the seqNo for deletions
|
|
largestValidSeqNo = max(largestValidSeqNo, (messageServerInfoToRemove.map({ $0.seqNo }).max() ?? 0))
|
|
}
|
|
|
|
// Now that we've finished processing all valid message changes we can update the `sequenceNumber` to
|
|
// the `largestValidSeqNo` value
|
|
_ = try? OpenGroup
|
|
.filter(id: openGroup.id)
|
|
.updateAll(db, OpenGroup.Columns.sequenceNumber.set(to: largestValidSeqNo))
|
|
|
|
// Update pendingChange cache based on the `largestValidSeqNo` value
|
|
dependencies.mutate(cache: .openGroupManager) {
|
|
$0.pendingChanges = $0.pendingChanges
|
|
.filter { $0.seqNo == nil || $0.seqNo! > largestValidSeqNo }
|
|
}
|
|
}
|
|
|
|
internal static func handleDirectMessages(
|
|
_ db: Database,
|
|
messages: [OpenGroupAPI.DirectMessage],
|
|
fromOutbox: Bool,
|
|
on server: String,
|
|
using dependencies: Dependencies
|
|
) {
|
|
// Don't need to do anything if we have no messages (it's a valid case)
|
|
guard !messages.isEmpty else { return }
|
|
guard let openGroup: OpenGroup = try? OpenGroup.filter(OpenGroup.Columns.server == server.lowercased()).fetchOne(db) else {
|
|
Log.error(.openGroup, "Couldn't receive inbox message due to missing group.")
|
|
return
|
|
}
|
|
|
|
// Sorting the messages by server ID before importing them fixes an issue where messages
|
|
// that quote older messages can't find those older messages
|
|
let sortedMessages: [OpenGroupAPI.DirectMessage] = messages
|
|
.sorted { lhs, rhs in lhs.id < rhs.id }
|
|
let latestMessageId: Int64 = sortedMessages[sortedMessages.count - 1].id
|
|
var lookupCache: [String: BlindedIdLookup] = [:] // Only want this cache to exist for the current loop
|
|
|
|
// Update the 'latestMessageId' value
|
|
if fromOutbox {
|
|
_ = try? OpenGroup
|
|
.filter(OpenGroup.Columns.server == server.lowercased())
|
|
.updateAll(db, OpenGroup.Columns.outboxLatestMessageId.set(to: latestMessageId))
|
|
}
|
|
else {
|
|
_ = try? OpenGroup
|
|
.filter(OpenGroup.Columns.server == server.lowercased())
|
|
.updateAll(db, OpenGroup.Columns.inboxLatestMessageId.set(to: latestMessageId))
|
|
}
|
|
|
|
// Process the messages
|
|
sortedMessages.forEach { message in
|
|
guard let messageData = Data(base64Encoded: message.base64EncodedMessage) else {
|
|
Log.error(.openGroup, "Couldn't receive inbox message.")
|
|
return
|
|
}
|
|
|
|
do {
|
|
let processedMessage: ProcessedMessage? = try Message.processReceivedOpenGroupDirectMessage(
|
|
db,
|
|
openGroupServerPublicKey: openGroup.publicKey,
|
|
message: message,
|
|
data: messageData,
|
|
using: dependencies
|
|
)
|
|
|
|
switch processedMessage {
|
|
case .config, .none: break
|
|
case .standard(let threadId, _, let proto, let messageInfo):
|
|
// We want to update the BlindedIdLookup cache with the message info so we can avoid using the
|
|
// "expensive" lookup when possible
|
|
let lookup: BlindedIdLookup = try {
|
|
// Minor optimisation to avoid processing the same sender multiple times in the same
|
|
// 'handleMessages' call (since the 'mapping' call is done within a transaction we
|
|
// will never have a mapping come through part-way through processing these messages)
|
|
if let result: BlindedIdLookup = lookupCache[message.recipient] {
|
|
return result
|
|
}
|
|
|
|
return try BlindedIdLookup.fetchOrCreate(
|
|
db,
|
|
blindedId: (fromOutbox ?
|
|
message.recipient :
|
|
message.sender
|
|
),
|
|
sessionId: (fromOutbox ?
|
|
nil :
|
|
threadId
|
|
),
|
|
openGroupServer: server.lowercased(),
|
|
openGroupPublicKey: openGroup.publicKey,
|
|
isCheckingForOutbox: fromOutbox,
|
|
using: dependencies
|
|
)
|
|
}()
|
|
lookupCache[message.recipient] = lookup
|
|
|
|
// We also need to set the 'syncTarget' for outgoing messages so the behaviour
|
|
// to determine the threadId is consistent with standard messages
|
|
if fromOutbox {
|
|
let syncTarget: String = (lookup.sessionId ?? message.recipient)
|
|
|
|
switch messageInfo.variant {
|
|
case .visibleMessage:
|
|
(messageInfo.message as? VisibleMessage)?.syncTarget = syncTarget
|
|
|
|
case .expirationTimerUpdate:
|
|
(messageInfo.message as? ExpirationTimerUpdate)?.syncTarget = syncTarget
|
|
|
|
default: break
|
|
}
|
|
}
|
|
|
|
try MessageReceiver.handle(
|
|
db,
|
|
threadId: (lookup.sessionId ?? lookup.blindedId),
|
|
threadVariant: .contact, // Technically not open group messages
|
|
message: messageInfo.message,
|
|
serverExpirationTimestamp: messageInfo.serverExpirationTimestamp,
|
|
associatedWithProto: proto,
|
|
using: dependencies
|
|
)
|
|
}
|
|
}
|
|
catch {
|
|
switch error {
|
|
// Ignore duplicate and self-send errors (we will always receive a duplicate message back
|
|
// whenever we send a message so this ends up being spam otherwise)
|
|
case DatabaseError.SQLITE_CONSTRAINT_UNIQUE,
|
|
DatabaseError.SQLITE_CONSTRAINT, // Sometimes thrown for UNIQUE
|
|
MessageReceiverError.duplicateMessage,
|
|
MessageReceiverError.duplicateControlMessage,
|
|
MessageReceiverError.selfSend:
|
|
break
|
|
|
|
default:
|
|
Log.error(.openGroup, "Couldn't receive inbox message due to error: \(error).")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// MARK: - Convenience
|
|
|
|
public func addPendingReaction(
|
|
emoji: String,
|
|
id: Int64,
|
|
in roomToken: String,
|
|
on server: String,
|
|
type: OpenGroupAPI.PendingChange.ReactAction
|
|
) -> OpenGroupAPI.PendingChange {
|
|
let pendingChange = OpenGroupAPI.PendingChange(
|
|
server: server,
|
|
room: roomToken,
|
|
changeType: .reaction,
|
|
metadata: .reaction(
|
|
messageId: id,
|
|
emoji: emoji,
|
|
action: type
|
|
)
|
|
)
|
|
|
|
dependencies.mutate(cache: .openGroupManager) {
|
|
$0.pendingChanges.append(pendingChange)
|
|
}
|
|
|
|
return pendingChange
|
|
}
|
|
|
|
public func updatePendingChange(_ pendingChange: OpenGroupAPI.PendingChange, seqNo: Int64?) {
|
|
dependencies.mutate(cache: .openGroupManager) {
|
|
if let index = $0.pendingChanges.firstIndex(of: pendingChange) {
|
|
$0.pendingChanges[index].seqNo = seqNo
|
|
}
|
|
}
|
|
}
|
|
|
|
public func removePendingChange(_ pendingChange: OpenGroupAPI.PendingChange) {
|
|
dependencies.mutate(cache: .openGroupManager) {
|
|
if let index = $0.pendingChanges.firstIndex(of: pendingChange) {
|
|
$0.pendingChanges.remove(at: index)
|
|
}
|
|
}
|
|
}
|
|
|
|
/// This method specifies if the given capability is supported on a specified Open Group
|
|
public func doesOpenGroupSupport(
|
|
_ db: Database? = nil,
|
|
capability: Capability.Variant,
|
|
on server: String?
|
|
) -> Bool {
|
|
guard let server: String = server else { return false }
|
|
guard let db: Database = db else {
|
|
return dependencies[singleton: .storage]
|
|
.read { [weak self] db in self?.doesOpenGroupSupport(db, capability: capability, on: server) }
|
|
.defaulting(to: false)
|
|
}
|
|
|
|
let capabilities: [Capability.Variant] = (try? Capability
|
|
.select(.variant)
|
|
.filter(Capability.Columns.openGroupServer == server)
|
|
.filter(Capability.Columns.isMissing == false)
|
|
.asRequest(of: Capability.Variant.self)
|
|
.fetchAll(db))
|
|
.defaulting(to: [])
|
|
|
|
return capabilities.contains(capability)
|
|
}
|
|
|
|
/// This method specifies if the given publicKey is a moderator or an admin within a specified Open Group
|
|
public func isUserModeratorOrAdmin(
|
|
_ db: Database? = nil,
|
|
publicKey: String,
|
|
for roomToken: String?,
|
|
on server: String?
|
|
) -> Bool {
|
|
guard let roomToken: String = roomToken, let server: String = server else { return false }
|
|
guard let db: Database = db else {
|
|
return dependencies[singleton: .storage]
|
|
.read { [weak self] db in self?.isUserModeratorOrAdmin(db, publicKey: publicKey, for: roomToken, on: server) }
|
|
.defaulting(to: false)
|
|
}
|
|
|
|
let groupId: String = OpenGroup.idFor(roomToken: roomToken, server: server)
|
|
let targetRoles: [GroupMember.Role] = [.moderator, .admin]
|
|
let isDirectModOrAdmin: Bool = GroupMember
|
|
.filter(GroupMember.Columns.groupId == groupId)
|
|
.filter(GroupMember.Columns.profileId == publicKey)
|
|
.filter(targetRoles.contains(GroupMember.Columns.role))
|
|
.isNotEmpty(db)
|
|
|
|
// If the publicKey provided matches a mod or admin directly then just return immediately
|
|
if isDirectModOrAdmin { return true }
|
|
|
|
// Otherwise we need to check if it's a variant of the current users key and if so we want
|
|
// to check if any of those have mod/admin entries
|
|
guard let sessionId: SessionId = try? SessionId(from: publicKey) else { return false }
|
|
|
|
// Conveniently the logic for these different cases works in order so we can fallthrough each
|
|
// case with only minor efficiency losses
|
|
let userSessionId: SessionId = dependencies[cache: .general].sessionId
|
|
|
|
switch sessionId.prefix {
|
|
case .standard:
|
|
guard publicKey == userSessionId.hexString else { return false }
|
|
fallthrough
|
|
|
|
case .unblinded:
|
|
guard let userEdKeyPair: KeyPair = Identity.fetchUserEd25519KeyPair(db) else {
|
|
return false
|
|
}
|
|
guard sessionId.prefix != .unblinded || publicKey == SessionId(.unblinded, publicKey: userEdKeyPair.publicKey).hexString else {
|
|
return false
|
|
}
|
|
fallthrough
|
|
|
|
case .blinded15, .blinded25:
|
|
guard
|
|
let userEdKeyPair: KeyPair = Identity.fetchUserEd25519KeyPair(db),
|
|
let openGroupPublicKey: String = try? OpenGroup
|
|
.select(.publicKey)
|
|
.filter(id: groupId)
|
|
.asRequest(of: String.self)
|
|
.fetchOne(db),
|
|
let blinded15KeyPair: KeyPair = dependencies[singleton: .crypto].generate(
|
|
.blinded15KeyPair(serverPublicKey: openGroupPublicKey, ed25519SecretKey: userEdKeyPair.secretKey)
|
|
),
|
|
let blinded25KeyPair: KeyPair = dependencies[singleton: .crypto].generate(
|
|
.blinded25KeyPair(serverPublicKey: openGroupPublicKey, ed25519SecretKey: userEdKeyPair.secretKey)
|
|
)
|
|
else { return false }
|
|
guard
|
|
(
|
|
sessionId.prefix != .blinded15 &&
|
|
sessionId.prefix != .blinded25
|
|
) ||
|
|
publicKey == SessionId(.blinded15, publicKey: blinded15KeyPair.publicKey).hexString ||
|
|
publicKey == SessionId(.blinded25, publicKey: blinded25KeyPair.publicKey).hexString
|
|
else { return false }
|
|
|
|
// If we got to here that means that the 'publicKey' value matches one of the current
|
|
// users 'standard', 'unblinded' or 'blinded' keys and as such we should check if any
|
|
// of them exist in the `modsAndAminKeys` Set
|
|
let possibleKeys: Set<String> = Set([
|
|
userSessionId.hexString,
|
|
SessionId(.unblinded, publicKey: userEdKeyPair.publicKey).hexString,
|
|
SessionId(.blinded15, publicKey: blinded15KeyPair.publicKey).hexString,
|
|
SessionId(.blinded25, publicKey: blinded25KeyPair.publicKey).hexString
|
|
])
|
|
|
|
return GroupMember
|
|
.filter(GroupMember.Columns.groupId == groupId)
|
|
.filter(possibleKeys.contains(GroupMember.Columns.profileId))
|
|
.filter(targetRoles.contains(GroupMember.Columns.role))
|
|
.isNotEmpty(db)
|
|
|
|
case .group: return false
|
|
}
|
|
}
|
|
}
|
|
|
|
// MARK: - OpenGroupManager Cache
|
|
|
|
public extension OpenGroupManager {
|
|
class Cache: OGMCacheType {
|
|
private let dependencies: Dependencies
|
|
private let defaultRoomsSubject: CurrentValueSubject<[DefaultRoomInfo], Error> = CurrentValueSubject([])
|
|
private var _lastSuccessfulCommunityPollTimestamp: TimeInterval?
|
|
public var pendingChanges: [OpenGroupAPI.PendingChange] = []
|
|
|
|
public var defaultRoomsPublisher: AnyPublisher<[DefaultRoomInfo], Error> {
|
|
defaultRoomsSubject
|
|
.handleEvents(
|
|
receiveSubscription: { [weak defaultRoomsSubject, dependencies] _ in
|
|
/// If we don't have any default rooms in memory then we haven't fetched this launch so schedule
|
|
/// the `RetrieveDefaultOpenGroupRoomsJob` if one isn't already running
|
|
if defaultRoomsSubject?.value.isEmpty == true {
|
|
RetrieveDefaultOpenGroupRoomsJob.run(using: dependencies)
|
|
}
|
|
}
|
|
)
|
|
.filter { !$0.isEmpty }
|
|
.eraseToAnyPublisher()
|
|
}
|
|
|
|
// MARK: - Initialization
|
|
|
|
init(using dependencies: Dependencies) {
|
|
self.dependencies = dependencies
|
|
}
|
|
|
|
// MARK: - Functions
|
|
|
|
public func getLastSuccessfulCommunityPollTimestamp() -> TimeInterval {
|
|
if let storedTime: TimeInterval = _lastSuccessfulCommunityPollTimestamp {
|
|
return storedTime
|
|
}
|
|
|
|
guard let lastPoll: Date = dependencies[defaults: .standard, key: .lastOpen] else {
|
|
return 0
|
|
}
|
|
|
|
_lastSuccessfulCommunityPollTimestamp = lastPoll.timeIntervalSince1970
|
|
return lastPoll.timeIntervalSince1970
|
|
}
|
|
|
|
public func setLastSuccessfulCommunityPollTimestamp(_ timestamp: TimeInterval) {
|
|
dependencies[defaults: .standard, key: .lastOpen] = Date(timeIntervalSince1970: timestamp)
|
|
_lastSuccessfulCommunityPollTimestamp = timestamp
|
|
}
|
|
|
|
public func setDefaultRoomInfo(_ info: [DefaultRoomInfo]) {
|
|
defaultRoomsSubject.send(info)
|
|
}
|
|
}
|
|
}
|
|
|
|
// MARK: - OGMCacheType
|
|
|
|
/// This is a read-only version of the Cache designed to avoid unintentionally mutating the instance in a non-thread-safe way
|
|
public protocol OGMImmutableCacheType: ImmutableCacheType {
|
|
var defaultRoomsPublisher: AnyPublisher<[OpenGroupManager.DefaultRoomInfo], Error> { get }
|
|
|
|
var pendingChanges: [OpenGroupAPI.PendingChange] { get }
|
|
}
|
|
|
|
public protocol OGMCacheType: OGMImmutableCacheType, MutableCacheType {
|
|
var defaultRoomsPublisher: AnyPublisher<[OpenGroupManager.DefaultRoomInfo], Error> { get }
|
|
|
|
var pendingChanges: [OpenGroupAPI.PendingChange] { get set }
|
|
|
|
func getLastSuccessfulCommunityPollTimestamp() -> TimeInterval
|
|
func setLastSuccessfulCommunityPollTimestamp(_ timestamp: TimeInterval)
|
|
func setDefaultRoomInfo(_ info: [OpenGroupManager.DefaultRoomInfo])
|
|
}
|