session-ios/SessionMessagingKit/Sending & Receiving/MessageSender.swift

558 lines
22 KiB
Swift
Raw Normal View History

// Copyright © 2022 Rangeproof Pty Ltd. All rights reserved.
import Foundation
import GRDB
2020-11-06 03:46:06 +01:00
import PromiseKit
import SessionSnodeKit
2020-11-09 00:58:47 +01:00
import SessionUtilitiesKit
2020-11-05 23:17:05 +01:00
public final class MessageSender {
// MARK: - Preparation
public static func prep(
_ db: Database,
signalAttachments: [SignalAttachment],
for interactionId: Int64
) throws {
try signalAttachments.enumerated().forEach { index, signalAttachment in
let maybeAttachment: Attachment? = Attachment(
variant: (signalAttachment.isVoiceMessage ?
.voiceMessage :
.standard
),
contentType: signalAttachment.mimeType,
dataSource: signalAttachment.dataSource,
sourceFilename: signalAttachment.sourceFilename,
caption: signalAttachment.captionText
)
guard let attachment: Attachment = maybeAttachment else { return }
let interactionAttachment: InteractionAttachment = InteractionAttachment(
albumIndex: index,
interactionId: interactionId,
attachmentId: attachment.id
)
try attachment.insert(db)
try interactionAttachment.insert(db)
2020-11-30 22:35:13 +01:00
}
}
// MARK: - Convenience
public static func sendImmediate(_ db: Database, message: Message, to destination: Message.Destination, interactionId: Int64?) throws -> Promise<Void> {
2020-11-08 22:36:33 +01:00
switch destination {
case .contact(_), .closedGroup(_):
return try sendToSnodeDestination(db, message: message, to: destination, interactionId: interactionId)
case .openGroup(_, _), .openGroupV2(_, _):
return sendToOpenGroupDestination(db, message: message, to: destination, interactionId: interactionId)
2020-11-08 22:36:33 +01:00
}
}
2020-11-24 10:09:23 +01:00
// MARK: One-on-One Chats & Closed Groups
internal static func sendToSnodeDestination(
_ db: Database,
message: Message,
to destination: Message.Destination,
interactionId: Int64?,
isSyncMessage: Bool = false
) throws -> Promise<Void> {
let (promise, seal) = Promise<Void>.pending()
let userPublicKey: String = getUserHexEncodedPublicKey(db)
let isMainAppActive: Bool = (UserDefaults.sharedLokiProject?[.isMainAppActive]).defaulting(to: false)
2020-12-03 00:39:53 +01:00
// Set the timestamp, sender and recipient
message.sentTimestamp = (
message.sentTimestamp ?? // Visible messages will already have their sent timestamp set
UInt64(floor(Date().timeIntervalSince1970 * 1000))
)
2020-11-30 05:06:05 +01:00
message.sender = userPublicKey
message.recipient = {
switch destination {
case .contact(let publicKey): return publicKey
case .closedGroup(let groupPublicKey): return groupPublicKey
case .openGroup(_, _), .openGroupV2(_, _): preconditionFailure()
}
}()
2020-12-03 00:39:53 +01:00
// Set the failure handler (need it here already for precondition failure handling)
func handleFailure(_ db: Database, with error: MessageSenderError) {
MessageSender.handleFailedMessageSend(db, message: message, with: error, interactionId: interactionId)
2020-12-03 00:53:30 +01:00
seal.reject(error)
}
// Validate the message
guard message.isValid else {
handleFailure(db, with: .invalidMessage)
return promise
}
// Stop here if this is a self-send, unless it's:
// a configuration message
// a sync message
// a closed group control message of type `new`
2021-08-02 02:32:47 +02:00
// an unsend request
let isSelfSend: Bool = (message.recipient == userPublicKey)
let isNewClosedGroupControlMessage: Bool = {
switch (message as? ClosedGroupControlMessage)?.kind {
case .new: return true
default: return false
}
}()
guard
!isSelfSend ||
message is ConfigurationMessage ||
isSyncMessage ||
isNewClosedGroupControlMessage ||
message is UnsendRequest
else {
try MessageSender.handleSuccessfulMessageSend(db, message: message, to: destination, interactionId: interactionId)
seal.fulfill(())
2020-11-30 05:06:05 +01:00
return promise
}
2020-11-26 05:16:35 +01:00
// Attach the user's profile if needed
if let message: VisibleMessage = message as? VisibleMessage {
let profile: Profile = Profile.fetchOrCreateCurrentUser(db)
if let profileKey: Data = profile.profileEncryptionKey?.keyData, let profilePictureUrl: String = profile.profilePictureUrl {
message.profile = VisibleMessage.VMProfile(
displayName: profile.name,
profileKey: profileKey,
profilePictureUrl: profilePictureUrl
)
}
else {
message.profile = VisibleMessage.VMProfile(displayName: profile.name)
2020-11-26 05:16:35 +01:00
}
}
// Convert it to protobuf
guard let proto = message.toProto(db) else {
handleFailure(db, with: .protoConversionFailed)
return promise
}
// Serialize the protobuf
2020-11-06 06:28:06 +01:00
let plaintext: Data
2020-11-06 03:46:06 +01:00
do {
2021-01-14 04:08:44 +01:00
plaintext = (try proto.serializedData() as NSData).paddedMessageBody()
}
catch {
2020-11-06 03:46:06 +01:00
SNLog("Couldn't serialize proto due to error: \(error).")
handleFailure(db, with: .other(error))
return promise
}
// Encrypt the serialized protobuf
let ciphertext: Data
do {
switch destination {
case .contact(let publicKey):
ciphertext = try encryptWithSessionProtocol(plaintext, for: publicKey)
case .closedGroup(let groupPublicKey):
guard let encryptionKeyPair: ClosedGroupKeyPair = try? ClosedGroupKeyPair.fetchLatestKeyPair(db, threadId: groupPublicKey) else {
throw MessageSenderError.noKeyPair
}
ciphertext = try encryptWithSessionProtocol(
plaintext,
for: "05\(encryptionKeyPair.publicKey.toHexString())"
)
case .openGroup(_, _), .openGroupV2(_, _): preconditionFailure()
}
}
catch {
SNLog("Couldn't encrypt message for destination: \(destination) due to error: \(error).")
handleFailure(db, with: .other(error))
return promise
2020-11-06 03:46:06 +01:00
}
2020-11-08 22:36:33 +01:00
// Wrap the result
let kind: SNProtoEnvelope.SNProtoEnvelopeType
let senderPublicKey: String
2020-11-08 22:36:33 +01:00
switch destination {
case .contact(_):
kind = .sessionMessage
senderPublicKey = ""
case .closedGroup(let groupPublicKey):
kind = .closedGroupMessage
senderPublicKey = groupPublicKey
case .openGroup(_, _), .openGroupV2(_, _): preconditionFailure()
2020-11-08 22:36:33 +01:00
}
2020-11-08 22:36:33 +01:00
let wrappedMessage: Data
do {
wrappedMessage = try MessageWrapper.wrap(type: kind, timestamp: message.sentTimestamp!,
senderPublicKey: senderPublicKey, base64EncodedContent: ciphertext.base64EncodedString())
}
catch {
2020-11-08 22:36:33 +01:00
SNLog("Couldn't wrap message due to error: \(error).")
handleFailure(db, with: .other(error))
return promise
2020-11-08 22:36:33 +01:00
}
// Send the result
2021-04-14 06:05:26 +02:00
let base64EncodedData = wrappedMessage.base64EncodedString()
2021-07-23 05:42:13 +02:00
let timestamp = UInt64(Int64(message.sentTimestamp!) + SnodeAPI.clockOffset)
let snodeMessage = SnodeMessage(
recipient: message.recipient!,
data: base64EncodedData,
ttl: message.ttl,
timestampMs: timestamp
)
SnodeAPI.sendMessage(snodeMessage)
.done(on: DispatchQueue.global(qos: .userInitiated)) { promises in
let promiseCount = promises.count
var isSuccess = false
var errorCount = 0
promises.forEach {
let _ = $0.done(on: DispatchQueue.global(qos: .userInitiated)) { rawResponse in
guard !isSuccess else { return } // Succeed as soon as the first promise succeeds
isSuccess = true
GRDBStorage.shared.write { db in
let json = rawResponse as? JSON
let hash = json?["hash"] as? String
message.serverHash = hash
try MessageSender.handleSuccessfulMessageSend(
db,
message: message,
to: destination,
interactionId: interactionId,
isSyncMessage: isSyncMessage
)
let shouldNotify = (
(message is VisibleMessage || message is UnsendRequest) &&
!isSyncMessage
)
/*
if let closedGroupControlMessage = message as? ClosedGroupControlMessage, case .new = closedGroupControlMessage.kind {
shouldNotify = true
}
*/
guard shouldNotify else {
seal.fulfill(())
return
}
let job: Job? = Job(
variant: .notifyPushServer,
behaviour: .runOnce,
details: NotifyPushServerJob.Details(message: snodeMessage)
)
if isMainAppActive {
JobRunner.add(db, job: job)
seal.fulfill(())
}
else if let job: Job = job {
NotifyPushServerJob.run(
job,
success: { _, _ in seal.fulfill(()) },
failure: { _, _, _ in
// Always fulfill because the notify PN server job isn't critical.
seal.fulfill(())
},
deferred: { _ in
// Always fulfill because the notify PN server job isn't critical.
seal.fulfill(())
}
)
}
else {
// Always fulfill because the notify PN server job isn't critical.
2020-12-07 00:04:38 +01:00
seal.fulfill(())
}
2020-12-03 00:12:29 +01:00
}
}
$0.catch(on: DispatchQueue.global(qos: .userInitiated)) { error in
errorCount += 1
guard errorCount == promiseCount else { return } // Only error out if all promises failed
GRDBStorage.shared.write { db in
handleFailure(db, with: .other(error))
}
}
2020-11-06 09:44:02 +01:00
}
}
.catch(on: DispatchQueue.global(qos: .userInitiated)) { error in
SNLog("Couldn't send message due to error: \(error).")
GRDBStorage.shared.write { db in
handleFailure(db, with: .other(error))
2020-11-06 09:44:02 +01:00
}
}
2020-11-06 09:44:02 +01:00
return promise
2020-11-06 03:46:06 +01:00
}
2020-11-24 10:09:23 +01:00
// MARK: Open Groups
internal static func sendToOpenGroupDestination(
_ db: Database,
message: Message,
to destination: Message.Destination,
interactionId: Int64?
) -> Promise<Void> {
let (promise, seal) = Promise<Void>.pending()
2020-12-03 00:39:53 +01:00
// Set the timestamp, sender and recipient
if message.sentTimestamp == nil { // Visible messages will already have their sent timestamp set
message.sentTimestamp = UInt64(floor(Date().timeIntervalSince1970 * 1000))
}
message.sender = getUserHexEncodedPublicKey()
2020-11-12 06:02:21 +01:00
switch destination {
case .contact(_): preconditionFailure()
case .closedGroup(_): preconditionFailure()
case .openGroup(let channel, let server): message.recipient = "\(server).\(channel)"
case .openGroupV2(let room, let server): message.recipient = "\(server).\(room)"
2020-11-12 06:02:21 +01:00
}
2020-12-03 00:39:53 +01:00
// Set the failure handler (need it here already for precondition failure handling)
func handleFailure(_ db: Database, with error: MessageSenderError) {
MessageSender.handleFailedMessageSend(db, message: message, with: error, interactionId: interactionId)
2020-12-03 00:53:30 +01:00
seal.reject(error)
}
2020-11-24 10:09:23 +01:00
// Validate the message
2020-11-30 03:18:26 +01:00
guard let message = message as? VisibleMessage else {
2020-11-30 01:00:28 +01:00
#if DEBUG
preconditionFailure()
2020-12-01 05:44:33 +01:00
#else
handleFailure(db, with: MessageSenderError.invalidMessage)
2020-11-30 03:18:26 +01:00
return promise
2020-12-01 05:44:33 +01:00
#endif
2020-11-30 01:00:28 +01:00
}
guard message.isValid else {
handleFailure(db, with: .invalidMessage)
return promise
2021-05-04 07:46:48 +02:00
}
// Attach the user's profile
message.profile = VisibleMessage.VMProfile(
profile: Profile.fetchOrCreateCurrentUser()
)
if (message.profile?.displayName ?? "").isEmpty {
handleFailure(db, with: .noUsername)
return promise
}
2021-05-04 07:46:48 +02:00
// Convert it to protobuf
guard let proto = message.toProto(db) else {
handleFailure(db, with: .protoConversionFailed)
return promise
}
2021-05-04 07:46:48 +02:00
// Serialize the protobuf
let plaintext: Data
do {
plaintext = (try proto.serializedData() as NSData).paddedMessageBody()
}
catch {
2021-05-04 07:46:48 +02:00
SNLog("Couldn't serialize proto due to error: \(error).")
handleFailure(db, with: .other(error))
2021-05-04 07:46:48 +02:00
return promise
}
2021-05-04 07:46:48 +02:00
// Send the result
guard case .openGroupV2(let room, let server) = destination else { preconditionFailure() }
let openGroupMessage = OpenGroupMessageV2(
serverID: nil,
sender: nil,
sentTimestamp: message.sentTimestamp!,
base64EncodedData: plaintext.base64EncodedString(),
base64EncodedSignature: nil
)
OpenGroupAPIV2
.send(
openGroupMessage,
to: room,
on: server
)
.done(on: DispatchQueue.global(qos: .userInitiated)) { openGroupMessage in
message.openGroupServerMessageId = given(openGroupMessage.serverID) { UInt64($0) }
GRDBStorage.shared.write { db in
try MessageSender.handleSuccessfulMessageSend(
db,
message: message,
to: destination,
interactionId: interactionId,
serverTimestampMs: openGroupMessage.sentTimestamp
)
seal.fulfill(())
}
}
.catch(on: DispatchQueue.global(qos: .userInitiated)) { error in
GRDBStorage.shared.write { db in
handleFailure(db, with: .other(error))
}
}
2021-05-04 07:46:48 +02:00
return promise
}
2020-11-30 22:35:13 +01:00
// MARK: Success & Failure Handling
private static func handleSuccessfulMessageSend(
_ db: Database,
message: Message,
to destination: Message.Destination,
interactionId: Int64?,
serverTimestampMs: UInt64? = nil,
isSyncMessage: Bool = false
) throws {
let interaction: Interaction? = try interaction(db, for: message, interactionId: interactionId)
2021-02-24 05:19:50 +01:00
// Get the visible message if possible
if let interaction: Interaction = interaction {
2021-08-04 06:53:16 +02:00
// When the sync message is successfully sent, the hash value of this TSOutgoingMessage
// will be replaced by the hash value of the sync message. Since the hash value of the
// real message has no use when we delete a message. It is OK to let it be.
try interaction.with(
serverHash: message.serverHash,
// Track the open group server message ID and update server timestamp (use server
// timestamp for open group messages otherwise the quote messages may not be able
// to be found by the timestamp on other devices
timestampMs: (message.openGroupServerMessageId == nil ?
nil :
serverTimestampMs.map { Int64($0) }
),
openGroupServerMessageId: message.openGroupServerMessageId.map { Int64($0) }
).update(db)
2021-02-24 05:19:50 +01:00
// Mark the message as sent
try interaction.recipientStates
.updateAll(db, RecipientState.Columns.state.set(to: RecipientState.State.sent))
2021-02-24 05:19:50 +01:00
// Start the disappearing messages timer if needed
JobRunner.upsert(
db,
job: DisappearingMessagesJob.updateNextRunIfNeeded(
db,
interaction: interaction,
startedAtMs: (Date().timeIntervalSince1970 * 1000)
)
)
2020-11-30 22:35:13 +01:00
}
// Prevent ControlMessages from being handled multiple times if not supported
try? ControlMessageProcessRecord(
threadId: {
switch destination {
case .contact(let publicKey): return publicKey
case .closedGroup(let groupPublicKey): return groupPublicKey
case .openGroupV2(let room, let server):
return OpenGroup.idFor(room: room, server: server)
case .openGroup(_, _): return "" // TODO: Remove this after merge
}
}(),
message: message,
serverExpirationTimestamp: (Date().timeIntervalSince1970 + ControlMessageProcessRecord.defaultExpirationSeconds)
)?.insert(db)
2021-01-25 05:50:30 +01:00
// Sync the message if:
2021-02-24 05:19:50 +01:00
// it's a visible message or an expiration timer update
// the destination was a contact
2021-01-25 05:50:30 +01:00
// we didn't sync it already
2021-01-14 04:57:32 +01:00
let userPublicKey = getUserHexEncodedPublicKey()
2021-02-24 05:19:50 +01:00
if case .contact(let publicKey) = destination, !isSyncMessage {
if let message = message as? VisibleMessage { message.syncTarget = publicKey }
if let message = message as? ExpirationTimerUpdate { message.syncTarget = publicKey }
2021-01-14 04:57:32 +01:00
// FIXME: Make this a job
try sendToSnodeDestination(
db,
message: message,
to: .contact(publicKey: userPublicKey),
interactionId: interactionId,
isSyncMessage: true
).retainUntilComplete()
2021-01-14 04:57:32 +01:00
}
2020-11-30 22:35:13 +01:00
}
public static func handleFailedMessageSend(
_ db: Database,
message: Message,
with error: MessageSenderError,
interactionId: Int64?
) {
guard let interaction: Interaction = try? interaction(db, for: message, interactionId: interactionId) else {
return
}
// Mark any "sending" recipients as "failed"
try? interaction.recipientStates
.fetchAll(db)
.forEach { oldState in
guard oldState.state == .sending else { return }
try? oldState.with(
state: .failed,
mostRecentFailureText: error.localizedDescription
).save(db)
}
// Remove the message timestamps if it fails
}
// MARK: - Convenience
private static func interaction(_ db: Database, for message: Message, interactionId: Int64?) throws -> Interaction? {
if let interactionId: Int64 = interactionId {
return try Interaction.fetchOne(db, id: interactionId)
}
if let sentTimestamp: Double = message.sentTimestamp.map({ Double($0) }) {
return try Interaction
.filter(Interaction.Columns.timestampMs == sentTimestamp)
.fetchOne(db)
}
return nil
2020-11-30 22:35:13 +01:00
}
2020-11-05 23:17:05 +01:00
}
// MARK: - Objective-C Support
// FIXME: Remove when possible
@objc(SMKMessageSender)
public class SMKMessageSender: NSObject {
@objc(leaveClosedGroupWithPublicKey:)
public static func objc_leave(_ groupPublicKey: String) -> AnyPromise {
let promise = GRDBStorage.shared.write { db in
try MessageSender.leave(db, groupPublicKey: groupPublicKey)
}
return AnyPromise.from(promise)
}
@objc(forceSyncConfigurationNow)
public static func objc_forceSyncConfigurationNow() {
GRDBStorage.shared.write { db in
try MessageSender.syncConfiguration(db, forceSyncNow: true).retainUntilComplete()
}
}
}