mirror of
https://github.com/oxen-io/session-ios.git
synced 2023-12-13 21:30:14 +01:00
1819 lines
80 KiB
Objective-C
1819 lines
80 KiB
Objective-C
//
|
|
// Copyright (c) 2019 Open Whisper Systems. All rights reserved.
|
|
//
|
|
|
|
#import "OWSMessageManager.h"
|
|
#import "AppContext.h"
|
|
#import "AppReadiness.h"
|
|
#import "ContactsManagerProtocol.h"
|
|
#import "MimeTypeUtil.h"
|
|
#import "NSNotificationCenter+OWS.h"
|
|
#import "NSString+SSK.h"
|
|
#import "NotificationsProtocol.h"
|
|
#import "OWSAttachmentDownloads.h"
|
|
#import "OWSBlockingManager.h"
|
|
#import "OWSCallMessageHandler.h"
|
|
#import "OWSContact.h"
|
|
#import "OWSDevice.h"
|
|
#import "OWSDevicesService.h"
|
|
#import "OWSDisappearingConfigurationUpdateInfoMessage.h"
|
|
#import "OWSDisappearingMessagesConfiguration.h"
|
|
#import "OWSDisappearingMessagesJob.h"
|
|
#import "LKEphemeralMessage.h"
|
|
#import "OWSIdentityManager.h"
|
|
#import "OWSIncomingMessageFinder.h"
|
|
#import "OWSIncomingSentMessageTranscript.h"
|
|
#import "OWSMessageSender.h"
|
|
#import "OWSMessageUtils.h"
|
|
#import "OWSOutgoingReceiptManager.h"
|
|
#import "OWSPrimaryStorage+SessionStore.h"
|
|
#import "OWSPrimaryStorage+Loki.h"
|
|
#import "OWSPrimaryStorage.h"
|
|
#import "OWSReadReceiptManager.h"
|
|
#import "OWSRecordTranscriptJob.h"
|
|
#import "OWSSyncGroupsMessage.h"
|
|
#import "OWSSyncGroupsRequestMessage.h"
|
|
#import "ProfileManagerProtocol.h"
|
|
#import "SessionCipher+Loki.h"
|
|
#import "SSKEnvironment.h"
|
|
#import "TSAccountManager.h"
|
|
#import "TSAttachment.h"
|
|
#import "TSAttachmentPointer.h"
|
|
#import "TSAttachmentStream.h"
|
|
#import "TSContactThread.h"
|
|
#import "TSDatabaseView.h"
|
|
#import "TSGroupModel.h"
|
|
#import "TSGroupThread.h"
|
|
#import "TSIncomingMessage.h"
|
|
#import "TSInfoMessage.h"
|
|
#import "TSNetworkManager.h"
|
|
#import "TSOutgoingMessage.h"
|
|
#import "TSQuotedMessage.h"
|
|
#import <SignalCoreKit/Cryptography.h>
|
|
#import <SignalCoreKit/NSDate+OWS.h>
|
|
#import <SignalServiceKit/NSObject+Casting.h>
|
|
#import <SignalServiceKit/SignalRecipient.h>
|
|
#import <SignalServiceKit/SignalServiceKit-Swift.h>
|
|
#import <YapDatabase/YapDatabase.h>
|
|
|
|
NS_ASSUME_NONNULL_BEGIN
|
|
|
|
@interface OWSMessageManager ()
|
|
|
|
@property (nonatomic, readonly) OWSPrimaryStorage *primaryStorage;
|
|
@property (nonatomic, readonly) YapDatabaseConnection *dbConnection;
|
|
@property (nonatomic, readonly) OWSIncomingMessageFinder *incomingMessageFinder;
|
|
|
|
@end
|
|
|
|
#pragma mark -
|
|
|
|
@implementation OWSMessageManager
|
|
|
|
+ (instancetype)sharedManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.messageManager);
|
|
|
|
return SSKEnvironment.shared.messageManager;
|
|
}
|
|
|
|
- (instancetype)initWithPrimaryStorage:(OWSPrimaryStorage *)primaryStorage
|
|
{
|
|
self = [super init];
|
|
|
|
if (!self) {
|
|
return self;
|
|
}
|
|
|
|
_primaryStorage = primaryStorage;
|
|
_dbConnection = primaryStorage.newDatabaseConnection;
|
|
_incomingMessageFinder = [[OWSIncomingMessageFinder alloc] initWithPrimaryStorage:primaryStorage];
|
|
|
|
// Loki: Add observation for new session
|
|
[NSNotificationCenter.defaultCenter addObserver:self selector:@selector(handleNewSessionAdopted:) name:kNSNotificationName_SessionAdopted object:nil];
|
|
|
|
OWSSingletonAssert();
|
|
|
|
return self;
|
|
}
|
|
|
|
- (void)dealloc {
|
|
[NSNotificationCenter.defaultCenter removeObserver:self];
|
|
}
|
|
|
|
#pragma mark - Dependencies
|
|
|
|
- (id<OWSCallMessageHandler>)callMessageHandler
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.callMessageHandler);
|
|
|
|
return SSKEnvironment.shared.callMessageHandler;
|
|
}
|
|
|
|
- (id<ContactsManagerProtocol>)contactsManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.contactsManager);
|
|
|
|
return SSKEnvironment.shared.contactsManager;
|
|
}
|
|
|
|
- (SSKMessageSenderJobQueue *)messageSenderJobQueue
|
|
{
|
|
return SSKEnvironment.shared.messageSenderJobQueue;
|
|
}
|
|
|
|
- (OWSBlockingManager *)blockingManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.blockingManager);
|
|
|
|
return SSKEnvironment.shared.blockingManager;
|
|
}
|
|
|
|
- (OWSIdentityManager *)identityManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.identityManager);
|
|
|
|
return SSKEnvironment.shared.identityManager;
|
|
}
|
|
|
|
- (TSNetworkManager *)networkManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.networkManager);
|
|
|
|
return SSKEnvironment.shared.networkManager;
|
|
}
|
|
|
|
- (OWSOutgoingReceiptManager *)outgoingReceiptManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.outgoingReceiptManager);
|
|
|
|
return SSKEnvironment.shared.outgoingReceiptManager;
|
|
}
|
|
|
|
- (id<OWSSyncManagerProtocol>)syncManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.syncManager);
|
|
|
|
return SSKEnvironment.shared.syncManager;
|
|
}
|
|
|
|
- (TSAccountManager *)tsAccountManager
|
|
{
|
|
OWSAssertDebug(SSKEnvironment.shared.tsAccountManager);
|
|
|
|
return SSKEnvironment.shared.tsAccountManager;
|
|
}
|
|
|
|
- (id<ProfileManagerProtocol>)profileManager
|
|
{
|
|
return SSKEnvironment.shared.profileManager;
|
|
}
|
|
|
|
- (id<OWSTypingIndicators>)typingIndicators
|
|
{
|
|
return SSKEnvironment.shared.typingIndicators;
|
|
}
|
|
|
|
- (OWSAttachmentDownloads *)attachmentDownloads
|
|
{
|
|
return SSKEnvironment.shared.attachmentDownloads;
|
|
}
|
|
|
|
#pragma mark -
|
|
|
|
- (void)startObserving
|
|
{
|
|
[[NSNotificationCenter defaultCenter] addObserver:self
|
|
selector:@selector(yapDatabaseModified:)
|
|
name:YapDatabaseModifiedNotification
|
|
object:OWSPrimaryStorage.sharedManager.dbNotificationObject];
|
|
[[NSNotificationCenter defaultCenter] addObserver:self
|
|
selector:@selector(yapDatabaseModified:)
|
|
name:YapDatabaseModifiedExternallyNotification
|
|
object:nil];
|
|
}
|
|
|
|
- (void)yapDatabaseModified:(NSNotification *)notification
|
|
{
|
|
if (AppReadiness.isAppReady) {
|
|
[OWSMessageUtils.sharedManager updateApplicationBadgeCount];
|
|
} else {
|
|
static dispatch_once_t onceToken;
|
|
dispatch_once(&onceToken, ^{
|
|
[AppReadiness runNowOrWhenAppDidBecomeReady:^{
|
|
[OWSMessageUtils.sharedManager updateApplicationBadgeCount];
|
|
}];
|
|
});
|
|
}
|
|
}
|
|
|
|
#pragma mark - Blocking
|
|
|
|
- (BOOL)isEnvelopeSenderBlocked:(SSKProtoEnvelope *)envelope
|
|
{
|
|
OWSAssertDebug(envelope);
|
|
|
|
return [self.blockingManager isRecipientIdBlocked:envelope.source];
|
|
}
|
|
|
|
- (BOOL)isDataMessageBlocked:(SSKProtoDataMessage *)dataMessage envelope:(SSKProtoEnvelope *)envelope
|
|
{
|
|
OWSAssertDebug(dataMessage);
|
|
OWSAssertDebug(envelope);
|
|
|
|
if (dataMessage.group) {
|
|
return [self.blockingManager isGroupIdBlocked:dataMessage.group.id];
|
|
} else {
|
|
BOOL senderBlocked = [self isEnvelopeSenderBlocked:envelope];
|
|
|
|
// If the envelopeSender was blocked, we never should have gotten as far as decrypting the dataMessage.
|
|
OWSAssertDebug(!senderBlocked);
|
|
|
|
return senderBlocked;
|
|
}
|
|
}
|
|
|
|
#pragma mark - message handling
|
|
|
|
- (void)throws_processEnvelope:(SSKProtoEnvelope *)envelope
|
|
plaintextData:(NSData *_Nullable)plaintextData
|
|
wasReceivedByUD:(BOOL)wasReceivedByUD
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
if (!self.tsAccountManager.isRegistered) {
|
|
OWSFailDebug(@"Not registered.");
|
|
return;
|
|
}
|
|
if (!CurrentAppContext().isMainApp) {
|
|
OWSFail(@"Not main app.");
|
|
return;
|
|
}
|
|
|
|
OWSLogInfo(@"handling decrypted envelope: %@", [self descriptionForEnvelope:envelope]);
|
|
|
|
if (!envelope.hasSource || envelope.source.length < 1) {
|
|
OWSFailDebug(@"incoming envelope has invalid source");
|
|
return;
|
|
}
|
|
if (!envelope.hasSourceDevice || envelope.sourceDevice < 1) {
|
|
OWSFailDebug(@"incoming envelope has invalid source device");
|
|
return;
|
|
}
|
|
|
|
OWSAssertDebug(![self isEnvelopeSenderBlocked:envelope]);
|
|
|
|
[self checkForUnknownLinkedDevice:envelope transaction:transaction];
|
|
|
|
switch (envelope.type) {
|
|
case SSKProtoEnvelopeTypeFriendRequest:
|
|
case SSKProtoEnvelopeTypeCiphertext:
|
|
case SSKProtoEnvelopeTypePrekeyBundle:
|
|
case SSKProtoEnvelopeTypeUnidentifiedSender:
|
|
if (!plaintextData) {
|
|
OWSFailDebug(@"missing decrypted data for envelope: %@", [self descriptionForEnvelope:envelope]);
|
|
return;
|
|
}
|
|
[self throws_handleEnvelope:envelope
|
|
plaintextData:plaintextData
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
break;
|
|
case SSKProtoEnvelopeTypeReceipt:
|
|
OWSAssertDebug(!plaintextData);
|
|
[self handleDeliveryReceipt:envelope transaction:transaction];
|
|
break;
|
|
// Other messages are just dismissed for now.
|
|
case SSKProtoEnvelopeTypeKeyExchange:
|
|
OWSLogWarn(@"Received Key Exchange Message, not supported");
|
|
break;
|
|
case SSKProtoEnvelopeTypeUnknown:
|
|
OWSLogWarn(@"Received an unknown message type");
|
|
break;
|
|
default:
|
|
OWSLogWarn(@"Received unhandled envelope type: %d", (int)envelope.type);
|
|
break;
|
|
}
|
|
}
|
|
|
|
- (void)handleDeliveryReceipt:(SSKProtoEnvelope *)envelope transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
// Old-style delivery notices don't include a "delivery timestamp".
|
|
[self processDeliveryReceiptsFromRecipientId:envelope.source
|
|
sentTimestamps:@[
|
|
@(envelope.timestamp),
|
|
]
|
|
deliveryTimestamp:nil
|
|
transaction:transaction];
|
|
}
|
|
|
|
// deliveryTimestamp is an optional parameter, since legacy
|
|
// delivery receipts don't have a "delivery timestamp". Those
|
|
// messages repurpose the "timestamp" field to indicate when the
|
|
// corresponding message was originally sent.
|
|
- (void)processDeliveryReceiptsFromRecipientId:(NSString *)recipientId
|
|
sentTimestamps:(NSArray<NSNumber *> *)sentTimestamps
|
|
deliveryTimestamp:(NSNumber *_Nullable)deliveryTimestamp
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (recipientId.length < 1) {
|
|
OWSFailDebug(@"Empty recipientId.");
|
|
return;
|
|
}
|
|
if (sentTimestamps.count < 1) {
|
|
OWSFailDebug(@"Missing sentTimestamps.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
for (NSNumber *nsTimestamp in sentTimestamps) {
|
|
uint64_t timestamp = [nsTimestamp unsignedLongLongValue];
|
|
|
|
NSArray<TSOutgoingMessage *> *messages
|
|
= (NSArray<TSOutgoingMessage *> *)[TSInteraction interactionsWithTimestamp:timestamp
|
|
ofClass:[TSOutgoingMessage class]
|
|
withTransaction:transaction];
|
|
if (messages.count < 1) {
|
|
// The service sends delivery receipts for "unpersisted" messages
|
|
// like group updates, so these errors are expected to a certain extent.
|
|
//
|
|
// TODO: persist "early" delivery receipts.
|
|
OWSLogInfo(@"Missing message for delivery receipt: %llu", timestamp);
|
|
} else {
|
|
if (messages.count > 1) {
|
|
OWSLogInfo(@"More than one message (%lu) for delivery receipt: %llu",
|
|
(unsigned long)messages.count,
|
|
timestamp);
|
|
}
|
|
for (TSOutgoingMessage *outgoingMessage in messages) {
|
|
[outgoingMessage updateWithDeliveredRecipient:recipientId
|
|
deliveryTimestamp:deliveryTimestamp
|
|
transaction:transaction];
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
- (void)throws_handleEnvelope:(SSKProtoEnvelope *)envelope
|
|
plaintextData:(NSData *)plaintextData
|
|
wasReceivedByUD:(BOOL)wasReceivedByUD
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!plaintextData) {
|
|
OWSFailDebug(@"Missing plaintextData.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
if (envelope.timestamp < 1) {
|
|
OWSFailDebug(@"Invalid timestamp.");
|
|
return;
|
|
}
|
|
if (envelope.source.length < 1) {
|
|
OWSFailDebug(@"Missing source.");
|
|
return;
|
|
}
|
|
if (envelope.sourceDevice < 1) {
|
|
OWSFailDebug(@"Invaid source device.");
|
|
return;
|
|
}
|
|
|
|
BOOL duplicateEnvelope = [self.incomingMessageFinder existsMessageWithTimestamp:envelope.timestamp
|
|
sourceId:envelope.source
|
|
sourceDeviceId:envelope.sourceDevice
|
|
transaction:transaction];
|
|
if (duplicateEnvelope) {
|
|
OWSLogInfo(@"Ignoring previously received envelope from %@ with timestamp: %llu",
|
|
envelopeAddress(envelope),
|
|
envelope.timestamp);
|
|
return;
|
|
}
|
|
|
|
// Loki: Handle any friend request accepts if we need to
|
|
// TODO: We'll need to fix this up if we ever start using Sync messages
|
|
[self handleFriendRequestAcceptIfNeededWithEnvelope:envelope transaction:transaction];
|
|
|
|
if (envelope.content != nil) {
|
|
NSError *error;
|
|
SSKProtoContent *_Nullable contentProto = [SSKProtoContent parseData:plaintextData error:&error];
|
|
if (error || !contentProto) {
|
|
OWSFailDebug(@"could not parse proto: %@", error);
|
|
return;
|
|
}
|
|
OWSLogInfo(@"handling content: <Content: %@>", [self descriptionForContent:contentProto]);
|
|
|
|
// Loki: Handle pre key bundle message
|
|
if (contentProto.prekeyBundleMessage) {
|
|
OWSLogInfo(@"Received a pre key bundle message from: %@.", envelope.source);
|
|
PreKeyBundle *_Nullable bundle = [contentProto.prekeyBundleMessage createPreKeyBundleWithTransaction:transaction];
|
|
if (!bundle) {
|
|
OWSFailDebug(@"Failed to create PreKeyBundle from message.");
|
|
}
|
|
[self.primaryStorage setPreKeyBundle:bundle forContact:envelope.source transaction:transaction];
|
|
}
|
|
|
|
// Loki: Check if we got p2p address
|
|
if (contentProto.lokiAddressMessage) {
|
|
NSString *address = contentProto.lokiAddressMessage.ptpAddress;
|
|
uint32_t port = contentProto.lokiAddressMessage.ptpPort;
|
|
[LKP2PAPI didReceiveLokiAddressMessageForContact:envelope.source address:address port:port receivedThroughP2P:envelope.isPtpMessage];
|
|
}
|
|
|
|
if (contentProto.syncMessage) {
|
|
[self throws_handleIncomingEnvelope:envelope
|
|
withSyncMessage:contentProto.syncMessage
|
|
transaction:transaction];
|
|
|
|
[[OWSDeviceManager sharedManager] setHasReceivedSyncMessage];
|
|
} else if (contentProto.dataMessage) {
|
|
[self handleIncomingEnvelope:envelope
|
|
withDataMessage:contentProto.dataMessage
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
} else if (contentProto.callMessage) {
|
|
[self handleIncomingEnvelope:envelope withCallMessage:contentProto.callMessage];
|
|
} else if (contentProto.typingMessage) {
|
|
[self handleIncomingEnvelope:envelope withTypingMessage:contentProto.typingMessage transaction:transaction];
|
|
} else if (contentProto.nullMessage) {
|
|
OWSLogInfo(@"Received null message.");
|
|
} else if (contentProto.receiptMessage) {
|
|
[self handleIncomingEnvelope:envelope
|
|
withReceiptMessage:contentProto.receiptMessage
|
|
transaction:transaction];
|
|
} else {
|
|
OWSLogWarn(@"Ignoring envelope. Content with no known payload");
|
|
}
|
|
} else if (envelope.legacyMessage != nil) { // DEPRECATED - Remove after all clients have been upgraded.
|
|
NSError *error;
|
|
SSKProtoDataMessage *_Nullable dataMessageProto = [SSKProtoDataMessage parseData:plaintextData error:&error];
|
|
if (error || !dataMessageProto) {
|
|
OWSFailDebug(@"could not parse proto: %@", error);
|
|
return;
|
|
}
|
|
OWSLogInfo(@"handling message: <DataMessage: %@ />", [self descriptionForDataMessage:dataMessageProto]);
|
|
|
|
[self handleIncomingEnvelope:envelope
|
|
withDataMessage:dataMessageProto
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
} else {
|
|
OWSProdInfoWEnvelope([OWSAnalyticsEvents messageManagerErrorEnvelopeNoActionablePayload], envelope);
|
|
}
|
|
}
|
|
|
|
- (void)handleIncomingEnvelope:(SSKProtoEnvelope *)envelope
|
|
withDataMessage:(SSKProtoDataMessage *)dataMessage
|
|
wasReceivedByUD:(BOOL)wasReceivedByUD
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
if ([self isDataMessageBlocked:dataMessage envelope:envelope]) {
|
|
NSString *logMessage = [NSString stringWithFormat:@"Ignoring blocked message from sender: %@", envelope.source];
|
|
if (dataMessage.group) {
|
|
logMessage = [logMessage stringByAppendingFormat:@" in group: %@", dataMessage.group.id];
|
|
}
|
|
OWSLogError(@"%@", logMessage);
|
|
return;
|
|
}
|
|
|
|
if (dataMessage.hasTimestamp) {
|
|
if (dataMessage.timestamp <= 0) {
|
|
OWSFailDebug(@"Ignoring message with invalid data message timestamp: %@", envelope.source);
|
|
// TODO: Add analytics.
|
|
return;
|
|
}
|
|
// This prevents replay attacks by the service.
|
|
if (dataMessage.timestamp != envelope.timestamp) {
|
|
OWSFailDebug(@"Ignoring message with non-matching data message timestamp: %@", envelope.source);
|
|
// TODO: Add analytics.
|
|
return;
|
|
}
|
|
}
|
|
|
|
if ([dataMessage hasProfileKey]) {
|
|
NSData *profileKey = [dataMessage profileKey];
|
|
NSString *recipientId = envelope.source;
|
|
if (profileKey.length == kAES256_KeyByteLength) {
|
|
[self.profileManager setProfileKeyData:profileKey forRecipientId:recipientId];
|
|
} else {
|
|
OWSFailDebug(
|
|
@"Unexpected profile key length:%lu on message from:%@", (unsigned long)profileKey.length, recipientId);
|
|
}
|
|
}
|
|
|
|
if (dataMessage.group) {
|
|
TSGroupThread *_Nullable groupThread =
|
|
[TSGroupThread threadWithGroupId:dataMessage.group.id transaction:transaction];
|
|
|
|
if (groupThread) {
|
|
if (dataMessage.group.type != SSKProtoGroupContextTypeUpdate) {
|
|
if (!groupThread.isLocalUserInGroup) {
|
|
OWSLogInfo(@"Ignoring messages for left group.");
|
|
return;
|
|
}
|
|
}
|
|
} else {
|
|
// Unknown group.
|
|
if (dataMessage.group.type == SSKProtoGroupContextTypeUpdate) {
|
|
// Accept group updates for unknown groups.
|
|
} else if (dataMessage.group.type == SSKProtoGroupContextTypeDeliver) {
|
|
[self sendGroupInfoRequest:dataMessage.group.id envelope:envelope transaction:transaction];
|
|
return;
|
|
} else {
|
|
OWSLogInfo(@"Ignoring group message for unknown group from: %@", envelope.source);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
if ((dataMessage.flags & SSKProtoDataMessageFlagsEndSession) != 0) {
|
|
[self handleEndSessionMessageWithEnvelope:envelope dataMessage:dataMessage transaction:transaction];
|
|
} else if ((dataMessage.flags & SSKProtoDataMessageFlagsExpirationTimerUpdate) != 0) {
|
|
[self handleExpirationTimerUpdateMessageWithEnvelope:envelope dataMessage:dataMessage transaction:transaction];
|
|
} else if ((dataMessage.flags & SSKProtoDataMessageFlagsProfileKeyUpdate) != 0) {
|
|
[self handleProfileKeyMessageWithEnvelope:envelope dataMessage:dataMessage];
|
|
} else if (dataMessage.attachments.count > 0) {
|
|
[self handleReceivedMediaWithEnvelope:envelope
|
|
dataMessage:dataMessage
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
} else {
|
|
[self handleReceivedTextMessageWithEnvelope:envelope
|
|
dataMessage:dataMessage
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
|
|
if ([self isDataMessageGroupAvatarUpdate:dataMessage]) {
|
|
OWSLogVerbose(@"Data message had group avatar attachment");
|
|
[self handleReceivedGroupAvatarUpdateWithEnvelope:envelope dataMessage:dataMessage transaction:transaction];
|
|
}
|
|
}
|
|
|
|
// Send delivery receipts for "valid data" messages received via UD.
|
|
if (wasReceivedByUD) {
|
|
[self.outgoingReceiptManager enqueueDeliveryReceiptForEnvelope:envelope];
|
|
}
|
|
}
|
|
|
|
- (void)sendGroupInfoRequest:(NSData *)groupId
|
|
envelope:(SSKProtoEnvelope *)envelope
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
if (groupId.length < 1) {
|
|
OWSFailDebug(@"Invalid groupId.");
|
|
return;
|
|
}
|
|
|
|
// FIXME: https://github.com/signalapp/Signal-iOS/issues/1340
|
|
OWSLogInfo(@"Sending group info request: %@", envelopeAddress(envelope));
|
|
|
|
NSString *recipientId = envelope.source;
|
|
|
|
TSThread *thread = [TSContactThread getOrCreateThreadWithContactId:recipientId transaction:transaction];
|
|
|
|
OWSSyncGroupsRequestMessage *syncGroupsRequestMessage =
|
|
[[OWSSyncGroupsRequestMessage alloc] initWithThread:thread groupId:groupId];
|
|
|
|
[self.messageSenderJobQueue addMessage:syncGroupsRequestMessage transaction:transaction];
|
|
}
|
|
|
|
- (void)handleIncomingEnvelope:(SSKProtoEnvelope *)envelope
|
|
withReceiptMessage:(SSKProtoReceiptMessage *)receiptMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!receiptMessage) {
|
|
OWSFailDebug(@"Missing receiptMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
NSArray<NSNumber *> *sentTimestamps = receiptMessage.timestamp;
|
|
|
|
switch (receiptMessage.type) {
|
|
case SSKProtoReceiptMessageTypeDelivery:
|
|
OWSLogVerbose(@"Processing receipt message with delivery receipts.");
|
|
[self processDeliveryReceiptsFromRecipientId:envelope.source
|
|
sentTimestamps:sentTimestamps
|
|
deliveryTimestamp:@(envelope.timestamp)
|
|
transaction:transaction];
|
|
return;
|
|
case SSKProtoReceiptMessageTypeRead:
|
|
OWSLogVerbose(@"Processing receipt message with read receipts.");
|
|
[OWSReadReceiptManager.sharedManager processReadReceiptsFromRecipientId:envelope.source
|
|
sentTimestamps:sentTimestamps
|
|
readTimestamp:envelope.timestamp];
|
|
break;
|
|
default:
|
|
OWSLogInfo(@"Ignoring receipt message of unknown type: %d.", (int)receiptMessage.type);
|
|
return;
|
|
}
|
|
}
|
|
|
|
- (void)handleIncomingEnvelope:(SSKProtoEnvelope *)envelope
|
|
withCallMessage:(SSKProtoCallMessage *)callMessage
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!callMessage) {
|
|
OWSFailDebug(@"Missing callMessage.");
|
|
return;
|
|
}
|
|
|
|
if ([callMessage hasProfileKey]) {
|
|
NSData *profileKey = [callMessage profileKey];
|
|
NSString *recipientId = envelope.source;
|
|
[self.profileManager setProfileKeyData:profileKey forRecipientId:recipientId];
|
|
}
|
|
|
|
// By dispatching async, we introduce the possibility that these messages might be lost
|
|
// if the app exits before this block is executed. This is fine, since the call by
|
|
// definition will end if the app exits.
|
|
dispatch_async(dispatch_get_main_queue(), ^{
|
|
if (callMessage.offer) {
|
|
[self.callMessageHandler receivedOffer:callMessage.offer fromCallerId:envelope.source];
|
|
} else if (callMessage.answer) {
|
|
[self.callMessageHandler receivedAnswer:callMessage.answer fromCallerId:envelope.source];
|
|
} else if (callMessage.iceUpdate.count > 0) {
|
|
for (SSKProtoCallMessageIceUpdate *iceUpdate in callMessage.iceUpdate) {
|
|
[self.callMessageHandler receivedIceUpdate:iceUpdate fromCallerId:envelope.source];
|
|
}
|
|
} else if (callMessage.hangup) {
|
|
OWSLogVerbose(@"Received CallMessage with Hangup.");
|
|
[self.callMessageHandler receivedHangup:callMessage.hangup fromCallerId:envelope.source];
|
|
} else if (callMessage.busy) {
|
|
[self.callMessageHandler receivedBusy:callMessage.busy fromCallerId:envelope.source];
|
|
} else {
|
|
OWSProdInfoWEnvelope([OWSAnalyticsEvents messageManagerErrorCallMessageNoActionablePayload], envelope);
|
|
}
|
|
});
|
|
}
|
|
|
|
- (void)handleIncomingEnvelope:(SSKProtoEnvelope *)envelope
|
|
withTypingMessage:(SSKProtoTypingMessage *)typingMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
OWSAssertDebug(transaction);
|
|
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!typingMessage) {
|
|
OWSFailDebug(@"Missing typingMessage.");
|
|
return;
|
|
}
|
|
if (typingMessage.timestamp != envelope.timestamp) {
|
|
OWSFailDebug(@"typingMessage has invalid timestamp.");
|
|
return;
|
|
}
|
|
NSString *localNumber = self.tsAccountManager.localNumber;
|
|
if ([localNumber isEqualToString:envelope.source]) {
|
|
OWSLogVerbose(@"Ignoring typing indicators from self or linked device.");
|
|
return;
|
|
} else if ([self.blockingManager isRecipientIdBlocked:envelope.source]
|
|
|| (typingMessage.hasGroupID && [self.blockingManager isGroupIdBlocked:typingMessage.groupID])) {
|
|
NSString *logMessage = [NSString stringWithFormat:@"Ignoring blocked message from sender: %@", envelope.source];
|
|
if (typingMessage.hasGroupID) {
|
|
logMessage = [logMessage stringByAppendingFormat:@" in group: %@", typingMessage.groupID];
|
|
}
|
|
OWSLogError(@"%@", logMessage);
|
|
return;
|
|
}
|
|
|
|
TSThread *_Nullable thread;
|
|
if (typingMessage.hasGroupID) {
|
|
TSGroupThread *groupThread = [TSGroupThread threadWithGroupId:typingMessage.groupID transaction:transaction];
|
|
|
|
if (!groupThread.isLocalUserInGroup) {
|
|
OWSLogInfo(@"Ignoring messages for left group.");
|
|
return;
|
|
}
|
|
|
|
thread = groupThread;
|
|
} else {
|
|
thread = [TSContactThread getThreadWithContactId:envelope.source transaction:transaction];
|
|
}
|
|
|
|
if (!thread) {
|
|
// This isn't neccesarily an error. We might not yet know about the thread,
|
|
// in which case we don't need to display the typing indicators.
|
|
OWSLogWarn(@"Could not locate thread for typingMessage.");
|
|
return;
|
|
}
|
|
|
|
dispatch_async(dispatch_get_main_queue(), ^{
|
|
switch (typingMessage.action) {
|
|
case SSKProtoTypingMessageActionStarted:
|
|
[self.typingIndicators didReceiveTypingStartedMessageInThread:thread
|
|
recipientId:envelope.source
|
|
deviceId:envelope.sourceDevice];
|
|
break;
|
|
case SSKProtoTypingMessageActionStopped:
|
|
[self.typingIndicators didReceiveTypingStoppedMessageInThread:thread
|
|
recipientId:envelope.source
|
|
deviceId:envelope.sourceDevice];
|
|
break;
|
|
default:
|
|
OWSFailDebug(@"Typing message has unexpected action.");
|
|
break;
|
|
}
|
|
});
|
|
}
|
|
|
|
- (void)handleReceivedGroupAvatarUpdateWithEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
TSGroupThread *_Nullable groupThread =
|
|
[TSGroupThread threadWithGroupId:dataMessage.group.id transaction:transaction];
|
|
if (!groupThread) {
|
|
OWSFailDebug(@"Missing group for group avatar update");
|
|
return;
|
|
}
|
|
|
|
TSAttachmentPointer *_Nullable avatarPointer =
|
|
[TSAttachmentPointer attachmentPointerFromProto:dataMessage.group.avatar albumMessage:nil];
|
|
|
|
if (!avatarPointer) {
|
|
OWSLogWarn(@"received unsupported group avatar envelope");
|
|
return;
|
|
}
|
|
[self.attachmentDownloads downloadAttachmentPointer:avatarPointer
|
|
success:^(NSArray<TSAttachmentStream *> *attachmentStreams) {
|
|
OWSAssertDebug(attachmentStreams.count == 1);
|
|
TSAttachmentStream *attachmentStream = attachmentStreams.firstObject;
|
|
[groupThread updateAvatarWithAttachmentStream:attachmentStream];
|
|
}
|
|
failure:^(NSError *error) {
|
|
OWSLogError(@"failed to fetch attachments for group avatar sent at: %llu. with error: %@",
|
|
envelope.timestamp,
|
|
error);
|
|
}];
|
|
}
|
|
|
|
- (void)handleReceivedMediaWithEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
wasReceivedByUD:(BOOL)wasReceivedByUD
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
TSThread *_Nullable thread = [self threadForEnvelope:envelope dataMessage:dataMessage transaction:transaction];
|
|
if (!thread) {
|
|
OWSFailDebug(@"ignoring media message for unknown group.");
|
|
return;
|
|
}
|
|
|
|
TSIncomingMessage *_Nullable message = [self handleReceivedEnvelope:envelope
|
|
withDataMessage:dataMessage
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
|
|
if (!message) {
|
|
return;
|
|
}
|
|
|
|
[message saveWithTransaction:transaction];
|
|
|
|
OWSLogDebug(@"incoming attachment message: %@", message.debugDescription);
|
|
|
|
[self.attachmentDownloads downloadAttachmentsForMessage:message
|
|
transaction:transaction
|
|
success:^(NSArray<TSAttachmentStream *> *attachmentStreams) {
|
|
OWSLogDebug(@"successfully fetched attachments: %lu for message: %@",
|
|
(unsigned long)attachmentStreams.count,
|
|
message);
|
|
}
|
|
failure:^(NSError *error) {
|
|
OWSLogError(@"failed to fetch attachments for message: %@ with error: %@", message, error);
|
|
}];
|
|
}
|
|
|
|
- (void)throws_handleIncomingEnvelope:(SSKProtoEnvelope *)envelope
|
|
withSyncMessage:(SSKProtoSyncMessage *)syncMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!syncMessage) {
|
|
OWSFailDebug(@"Missing syncMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
NSString *localNumber = self.tsAccountManager.localNumber;
|
|
if (![localNumber isEqualToString:envelope.source]) {
|
|
// Sync messages should only come from linked devices.
|
|
OWSProdErrorWEnvelope([OWSAnalyticsEvents messageManagerErrorSyncMessageFromUnknownSource], envelope);
|
|
return;
|
|
}
|
|
|
|
if (syncMessage.sent) {
|
|
OWSIncomingSentMessageTranscript *transcript =
|
|
[[OWSIncomingSentMessageTranscript alloc] initWithProto:syncMessage.sent transaction:transaction];
|
|
|
|
SSKProtoDataMessage *_Nullable dataMessage = syncMessage.sent.message;
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
NSString *destination = syncMessage.sent.destination;
|
|
if (dataMessage && destination.length > 0 && dataMessage.hasProfileKey) {
|
|
// If we observe a linked device sending our profile key to another
|
|
// user, we can infer that that user belongs in our profile whitelist.
|
|
if (dataMessage.group) {
|
|
[self.profileManager addGroupIdToProfileWhitelist:dataMessage.group.id];
|
|
} else {
|
|
[self.profileManager addUserToProfileWhitelist:destination];
|
|
}
|
|
}
|
|
|
|
if ([self isDataMessageGroupAvatarUpdate:syncMessage.sent.message] && !syncMessage.sent.isRecipientUpdate) {
|
|
[OWSRecordTranscriptJob
|
|
processIncomingSentMessageTranscript:transcript
|
|
attachmentHandler:^(NSArray<TSAttachmentStream *> *attachmentStreams) {
|
|
OWSAssertDebug(attachmentStreams.count == 1);
|
|
TSAttachmentStream *attachmentStream = attachmentStreams.firstObject;
|
|
[self.dbConnection readWriteWithBlock:^(
|
|
YapDatabaseReadWriteTransaction *transaction) {
|
|
TSGroupThread *_Nullable groupThread =
|
|
[TSGroupThread threadWithGroupId:dataMessage.group.id
|
|
transaction:transaction];
|
|
if (!groupThread) {
|
|
OWSFailDebug(@"ignoring sync group avatar update for unknown group.");
|
|
return;
|
|
}
|
|
|
|
[groupThread updateAvatarWithAttachmentStream:attachmentStream
|
|
transaction:transaction];
|
|
}];
|
|
}
|
|
transaction:transaction];
|
|
} else {
|
|
[OWSRecordTranscriptJob
|
|
processIncomingSentMessageTranscript:transcript
|
|
attachmentHandler:^(NSArray<TSAttachmentStream *> *attachmentStreams) {
|
|
OWSLogDebug(@"successfully fetched transcript attachments: %lu",
|
|
(unsigned long)attachmentStreams.count);
|
|
}
|
|
transaction:transaction];
|
|
}
|
|
} else if (syncMessage.request) {
|
|
if (syncMessage.request.type == SSKProtoSyncMessageRequestTypeContacts) {
|
|
// We respond asynchronously because populating the sync message will
|
|
// create transactions and it's not practical (due to locking in the OWSIdentityManager)
|
|
// to plumb our transaction through.
|
|
//
|
|
// In rare cases this means we won't respond to the sync request, but that's
|
|
// acceptable.
|
|
dispatch_async(dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{
|
|
[[self.syncManager syncAllContacts] retainUntilComplete];
|
|
});
|
|
} else if (syncMessage.request.type == SSKProtoSyncMessageRequestTypeGroups) {
|
|
OWSSyncGroupsMessage *syncGroupsMessage = [[OWSSyncGroupsMessage alloc] init];
|
|
NSData *_Nullable syncData = [syncGroupsMessage buildPlainTextAttachmentDataWithTransaction:transaction];
|
|
if (!syncData) {
|
|
OWSFailDebug(@"Failed to serialize groups sync message.");
|
|
return;
|
|
}
|
|
DataSource *dataSource = [DataSourceValue dataSourceWithSyncMessageData:syncData];
|
|
[self.messageSenderJobQueue addMediaMessage:syncGroupsMessage
|
|
dataSource:dataSource
|
|
contentType:OWSMimeTypeApplicationOctetStream
|
|
sourceFilename:nil
|
|
caption:nil
|
|
albumMessageId:nil
|
|
isTemporaryAttachment:YES];
|
|
} else if (syncMessage.request.type == SSKProtoSyncMessageRequestTypeBlocked) {
|
|
OWSLogInfo(@"Received request for block list");
|
|
[self.blockingManager syncBlockList];
|
|
} else if (syncMessage.request.type == SSKProtoSyncMessageRequestTypeConfiguration) {
|
|
[SSKEnvironment.shared.syncManager sendConfigurationSyncMessage];
|
|
} else {
|
|
OWSLogWarn(@"ignoring unsupported sync request message");
|
|
}
|
|
} else if (syncMessage.blocked) {
|
|
NSArray<NSString *> *blockedPhoneNumbers = [syncMessage.blocked.numbers copy];
|
|
dispatch_async(dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{
|
|
[self.blockingManager setBlockedPhoneNumbers:blockedPhoneNumbers sendSyncMessage:NO];
|
|
});
|
|
} else if (syncMessage.read.count > 0) {
|
|
OWSLogInfo(@"Received %lu read receipt(s)", (unsigned long)syncMessage.read.count);
|
|
[OWSReadReceiptManager.sharedManager processReadReceiptsFromLinkedDevice:syncMessage.read
|
|
readTimestamp:envelope.timestamp
|
|
transaction:transaction];
|
|
} else if (syncMessage.verified) {
|
|
OWSLogInfo(@"Received verification state for %@", syncMessage.verified.destination);
|
|
[self.identityManager throws_processIncomingSyncMessage:syncMessage.verified transaction:transaction];
|
|
} else {
|
|
OWSLogWarn(@"Ignoring unsupported sync message.");
|
|
}
|
|
}
|
|
|
|
- (void)handleEndSessionMessageWithEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
TSContactThread *thread = [TSContactThread getOrCreateThreadWithContactId:envelope.source transaction:transaction];
|
|
|
|
// MJK TODO - safe to remove senderTimestamp
|
|
[[[TSInfoMessage alloc] initWithTimestamp:NSDate.ows_millisecondTimeStamp
|
|
inThread:thread
|
|
messageType:TSInfoMessageTypeLokiSessionResetInProgress] saveWithTransaction:transaction];
|
|
/* Loki: Original code
|
|
* ================
|
|
[[[TSInfoMessage alloc] initWithTimestamp:[NSDate ows_millisecondTimeStamp]
|
|
inThread:thread
|
|
messageType:TSInfoMessageTypeSessionDidEnd] saveWithTransaction:transaction];
|
|
* ================
|
|
*/
|
|
|
|
// Loki: Archive all our sessions
|
|
// Ref: SignalServiceKit/Loki/Docs/SessionReset.md
|
|
[self.primaryStorage archiveAllSessionsForContact:envelope.source protocolContext:transaction];
|
|
|
|
// Loki: Set our session reset state
|
|
thread.sessionResetState = TSContactThreadSessionResetStateRequestReceived;
|
|
[thread saveWithTransaction:transaction];
|
|
|
|
// Loki: Send an empty message to trigger the session reset code for both parties
|
|
LKEphemeralMessage *emptyMessage = [[LKEphemeralMessage alloc] initInThread:thread];
|
|
[self.messageSenderJobQueue addMessage:emptyMessage transaction:transaction];
|
|
|
|
NSLog(@"[Loki] Session reset received from %@.", envelope.source);
|
|
|
|
/* Loki: Original code
|
|
* ================
|
|
[self.primaryStorage deleteAllSessionsForContact:envelope.source protocolContext:transaction];
|
|
* ================
|
|
*/
|
|
}
|
|
|
|
- (void)handleExpirationTimerUpdateMessageWithEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
TSThread *_Nullable thread = [self threadForEnvelope:envelope dataMessage:dataMessage transaction:transaction];
|
|
if (!thread) {
|
|
OWSFailDebug(@"ignoring expiring messages update for unknown group.");
|
|
return;
|
|
}
|
|
|
|
OWSDisappearingMessagesConfiguration *disappearingMessagesConfiguration;
|
|
if (dataMessage.hasExpireTimer && dataMessage.expireTimer > 0) {
|
|
OWSLogInfo(
|
|
@"Expiring messages duration turned to %u for thread %@", (unsigned int)dataMessage.expireTimer, thread);
|
|
disappearingMessagesConfiguration =
|
|
[[OWSDisappearingMessagesConfiguration alloc] initWithThreadId:thread.uniqueId
|
|
enabled:YES
|
|
durationSeconds:dataMessage.expireTimer];
|
|
} else {
|
|
OWSLogInfo(@"Expiring messages have been turned off for thread %@", thread);
|
|
disappearingMessagesConfiguration = [[OWSDisappearingMessagesConfiguration alloc]
|
|
initWithThreadId:thread.uniqueId
|
|
enabled:NO
|
|
durationSeconds:OWSDisappearingMessagesConfigurationDefaultExpirationDuration];
|
|
}
|
|
OWSAssertDebug(disappearingMessagesConfiguration);
|
|
[disappearingMessagesConfiguration saveWithTransaction:transaction];
|
|
NSString *name = [self.contactsManager displayNameForPhoneIdentifier:envelope.source transaction:transaction];
|
|
|
|
// MJK TODO - safe to remove senderTimestamp
|
|
OWSDisappearingConfigurationUpdateInfoMessage *message =
|
|
[[OWSDisappearingConfigurationUpdateInfoMessage alloc] initWithTimestamp:[NSDate ows_millisecondTimeStamp]
|
|
thread:thread
|
|
configuration:disappearingMessagesConfiguration
|
|
createdByRemoteName:name
|
|
createdInExistingGroup:NO];
|
|
[message saveWithTransaction:transaction];
|
|
}
|
|
|
|
- (void)handleProfileKeyMessageWithEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
|
|
NSString *recipientId = envelope.source;
|
|
if (!dataMessage.hasProfileKey) {
|
|
OWSFailDebug(@"received profile key message without profile key from: %@", envelopeAddress(envelope));
|
|
return;
|
|
}
|
|
NSData *profileKey = dataMessage.profileKey;
|
|
if (profileKey.length != kAES256_KeyByteLength) {
|
|
OWSFailDebug(@"received profile key of unexpected length: %lu, from: %@",
|
|
(unsigned long)profileKey.length,
|
|
envelopeAddress(envelope));
|
|
return;
|
|
}
|
|
|
|
id<ProfileManagerProtocol> profileManager = SSKEnvironment.shared.profileManager;
|
|
[profileManager setProfileKeyData:profileKey forRecipientId:recipientId];
|
|
}
|
|
|
|
- (void)handleReceivedTextMessageWithEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
wasReceivedByUD:(BOOL)wasReceivedByUD
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
[self handleReceivedEnvelope:envelope
|
|
withDataMessage:dataMessage
|
|
wasReceivedByUD:wasReceivedByUD
|
|
transaction:transaction];
|
|
}
|
|
|
|
- (void)handleGroupInfoRequest:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
if (dataMessage.group.type != SSKProtoGroupContextTypeRequestInfo) {
|
|
OWSFailDebug(@"Unexpected group message type.");
|
|
return;
|
|
}
|
|
|
|
NSData *groupId = dataMessage.group ? dataMessage.group.id : nil;
|
|
if (!groupId) {
|
|
OWSFailDebug(@"Group info request is missing group id.");
|
|
return;
|
|
}
|
|
|
|
OWSLogInfo(@"Received 'Request Group Info' message for group: %@ from: %@", groupId, envelope.source);
|
|
|
|
TSGroupThread *_Nullable gThread = [TSGroupThread threadWithGroupId:dataMessage.group.id transaction:transaction];
|
|
if (!gThread) {
|
|
OWSLogWarn(@"Unknown group: %@", groupId);
|
|
return;
|
|
}
|
|
|
|
// Ensure sender is in the group.
|
|
if (![gThread.groupModel.groupMemberIds containsObject:envelope.source]) {
|
|
OWSLogWarn(@"Ignoring 'Request Group Info' message for non-member of group. %@ not in %@",
|
|
envelope.source,
|
|
gThread.groupModel.groupMemberIds);
|
|
return;
|
|
}
|
|
|
|
// Ensure we are in the group.
|
|
if (!gThread.isLocalUserInGroup) {
|
|
OWSLogWarn(@"Ignoring 'Request Group Info' message for group we no longer belong to.");
|
|
return;
|
|
}
|
|
|
|
NSString *updateGroupInfo =
|
|
[gThread.groupModel getInfoStringAboutUpdateTo:gThread.groupModel contactsManager:self.contactsManager];
|
|
|
|
uint32_t expiresInSeconds = [gThread disappearingMessagesDurationWithTransaction:transaction];
|
|
TSOutgoingMessage *message = [TSOutgoingMessage outgoingMessageInThread:gThread
|
|
groupMetaMessage:TSGroupMetaMessageUpdate
|
|
expiresInSeconds:expiresInSeconds];
|
|
|
|
[message updateWithCustomMessage:updateGroupInfo transaction:transaction];
|
|
// Only send this group update to the requester.
|
|
[message updateWithSendingToSingleGroupRecipient:envelope.source transaction:transaction];
|
|
|
|
if (gThread.groupModel.groupImage) {
|
|
NSData *_Nullable data = UIImagePNGRepresentation(gThread.groupModel.groupImage);
|
|
OWSAssertDebug(data);
|
|
if (data) {
|
|
DataSource *_Nullable dataSource = [DataSourceValue dataSourceWithData:data fileExtension:@"png"];
|
|
[self.messageSenderJobQueue addMediaMessage:message
|
|
dataSource:dataSource
|
|
contentType:OWSMimeTypeImagePng
|
|
sourceFilename:nil
|
|
caption:nil
|
|
albumMessageId:nil
|
|
isTemporaryAttachment:YES];
|
|
}
|
|
} else {
|
|
[self.messageSenderJobQueue addMessage:message transaction:transaction];
|
|
}
|
|
}
|
|
|
|
- (TSIncomingMessage *_Nullable)handleReceivedEnvelope:(SSKProtoEnvelope *)envelope
|
|
withDataMessage:(SSKProtoDataMessage *)dataMessage
|
|
wasReceivedByUD:(BOOL)wasReceivedByUD
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return nil;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return nil;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return nil;
|
|
}
|
|
|
|
uint64_t timestamp = envelope.timestamp;
|
|
NSString *body = dataMessage.body;
|
|
NSData *groupId = dataMessage.group ? dataMessage.group.id : nil;
|
|
OWSContact *_Nullable contact = [OWSContacts contactForDataMessage:dataMessage transaction:transaction];
|
|
NSNumber *_Nullable serverTimestamp = (envelope.hasServerTimestamp ? @(envelope.serverTimestamp) : nil);
|
|
|
|
if (dataMessage.group.type == SSKProtoGroupContextTypeRequestInfo) {
|
|
[self handleGroupInfoRequest:envelope dataMessage:dataMessage transaction:transaction];
|
|
return nil;
|
|
}
|
|
|
|
if (groupId.length > 0) {
|
|
NSMutableSet *newMemberIds = [NSMutableSet setWithArray:dataMessage.group.members];
|
|
for (NSString *recipientId in newMemberIds) {
|
|
if (!recipientId.isValidE164) {
|
|
OWSLogVerbose(
|
|
@"incoming group update has invalid group member: %@", [self descriptionForEnvelope:envelope]);
|
|
OWSFailDebug(@"incoming group update has invalid group member");
|
|
return nil;
|
|
}
|
|
}
|
|
|
|
// Group messages create the group if it doesn't already exist.
|
|
//
|
|
// We distinguish between the old group state (if any) and the new group state.
|
|
TSGroupThread *_Nullable oldGroupThread = [TSGroupThread threadWithGroupId:groupId transaction:transaction];
|
|
if (oldGroupThread) {
|
|
// Don't trust other clients; ensure all known group members remain in the
|
|
// group unless it is a "quit" message in which case we should only remove
|
|
// the quiting member below.
|
|
[newMemberIds addObjectsFromArray:oldGroupThread.groupModel.groupMemberIds];
|
|
}
|
|
|
|
switch (dataMessage.group.type) {
|
|
case SSKProtoGroupContextTypeUpdate: {
|
|
// Ensures that the thread exists but doesn't update it.
|
|
TSGroupThread *newGroupThread =
|
|
[TSGroupThread getOrCreateThreadWithGroupId:groupId transaction:transaction];
|
|
|
|
TSGroupModel *newGroupModel = [[TSGroupModel alloc] initWithTitle:dataMessage.group.name
|
|
memberIds:newMemberIds.allObjects
|
|
image:oldGroupThread.groupModel.groupImage
|
|
groupId:dataMessage.group.id];
|
|
NSString *updateGroupInfo = [newGroupThread.groupModel getInfoStringAboutUpdateTo:newGroupModel
|
|
contactsManager:self.contactsManager];
|
|
newGroupThread.groupModel = newGroupModel;
|
|
[newGroupThread saveWithTransaction:transaction];
|
|
|
|
[[OWSDisappearingMessagesJob sharedJob] becomeConsistentWithDisappearingDuration:dataMessage.expireTimer
|
|
thread:newGroupThread
|
|
createdByRemoteRecipientId:nil
|
|
createdInExistingGroup:YES
|
|
transaction:transaction];
|
|
|
|
// MJK TODO - should be safe to remove senderTimestamp
|
|
TSInfoMessage *infoMessage = [[TSInfoMessage alloc] initWithTimestamp:[NSDate ows_millisecondTimeStamp]
|
|
inThread:newGroupThread
|
|
messageType:TSInfoMessageTypeGroupUpdate
|
|
customMessage:updateGroupInfo];
|
|
[infoMessage saveWithTransaction:transaction];
|
|
|
|
return nil;
|
|
}
|
|
case SSKProtoGroupContextTypeQuit: {
|
|
if (!oldGroupThread) {
|
|
OWSLogWarn(@"ignoring quit group message from unknown group.");
|
|
return nil;
|
|
}
|
|
[newMemberIds removeObject:envelope.source];
|
|
oldGroupThread.groupModel.groupMemberIds = [newMemberIds.allObjects mutableCopy];
|
|
[oldGroupThread saveWithTransaction:transaction];
|
|
|
|
NSString *nameString =
|
|
[self.contactsManager displayNameForPhoneIdentifier:envelope.source transaction:transaction];
|
|
NSString *updateGroupInfo =
|
|
[NSString stringWithFormat:NSLocalizedString(@"GROUP_MEMBER_LEFT", @""), nameString];
|
|
// MJK TODO - should be safe to remove senderTimestamp
|
|
[[[TSInfoMessage alloc] initWithTimestamp:[NSDate ows_millisecondTimeStamp]
|
|
inThread:oldGroupThread
|
|
messageType:TSInfoMessageTypeGroupUpdate
|
|
customMessage:updateGroupInfo] saveWithTransaction:transaction];
|
|
return nil;
|
|
}
|
|
case SSKProtoGroupContextTypeDeliver: {
|
|
if (!oldGroupThread) {
|
|
OWSFailDebug(@"ignoring deliver group message from unknown group.");
|
|
return nil;
|
|
}
|
|
|
|
[[OWSDisappearingMessagesJob sharedJob] becomeConsistentWithDisappearingDuration:dataMessage.expireTimer
|
|
thread:oldGroupThread
|
|
createdByRemoteRecipientId:envelope.source
|
|
createdInExistingGroup:NO
|
|
transaction:transaction];
|
|
|
|
TSQuotedMessage *_Nullable quotedMessage = [TSQuotedMessage quotedMessageForDataMessage:dataMessage
|
|
thread:oldGroupThread
|
|
transaction:transaction];
|
|
|
|
NSError *linkPreviewError;
|
|
OWSLinkPreview *_Nullable linkPreview =
|
|
[OWSLinkPreview buildValidatedLinkPreviewWithDataMessage:dataMessage
|
|
body:body
|
|
transaction:transaction
|
|
error:&linkPreviewError];
|
|
if (linkPreviewError && ![OWSLinkPreview isNoPreviewError:linkPreviewError]) {
|
|
OWSLogError(@"linkPreviewError: %@", linkPreviewError);
|
|
}
|
|
|
|
OWSLogDebug(@"incoming message from: %@ for group: %@ with timestamp: %lu",
|
|
envelopeAddress(envelope),
|
|
groupId,
|
|
(unsigned long)timestamp);
|
|
|
|
// Legit usage of senderTimestamp when creating an incoming group message record
|
|
TSIncomingMessage *incomingMessage =
|
|
[[TSIncomingMessage alloc] initIncomingMessageWithTimestamp:timestamp
|
|
inThread:oldGroupThread
|
|
authorId:envelope.source
|
|
sourceDeviceId:envelope.sourceDevice
|
|
messageBody:body
|
|
attachmentIds:@[]
|
|
expiresInSeconds:dataMessage.expireTimer
|
|
quotedMessage:quotedMessage
|
|
contactShare:contact
|
|
linkPreview:linkPreview
|
|
serverTimestamp:serverTimestamp
|
|
wasReceivedByUD:wasReceivedByUD];
|
|
|
|
if (envelope.isPtpMessage) { incomingMessage.isP2P = YES; }
|
|
if (dataMessage.publicChatInfo && dataMessage.publicChatInfo.hasServerID) { incomingMessage.groupChatMessageID = dataMessage.publicChatInfo.serverID; }
|
|
|
|
NSArray<TSAttachmentPointer *> *attachmentPointers =
|
|
[TSAttachmentPointer attachmentPointersFromProtos:dataMessage.attachments
|
|
albumMessage:incomingMessage];
|
|
for (TSAttachmentPointer *pointer in attachmentPointers) {
|
|
[pointer saveWithTransaction:transaction];
|
|
[incomingMessage.attachmentIds addObject:pointer.uniqueId];
|
|
}
|
|
|
|
// Loki: Don't process friend requests in group chats
|
|
|
|
if (body.length == 0 && attachmentPointers.count < 1 && !contact) {
|
|
OWSLogWarn(@"ignoring empty incoming message from: %@ for group: %@ with timestamp: %lu",
|
|
envelopeAddress(envelope),
|
|
groupId,
|
|
(unsigned long)timestamp);
|
|
return nil;
|
|
}
|
|
|
|
[self finalizeIncomingMessage:incomingMessage
|
|
thread:oldGroupThread
|
|
envelope:envelope
|
|
transaction:transaction];
|
|
|
|
if (dataMessage.publicChatInfo != nil && dataMessage.publicChatInfo.hasServerID) {
|
|
[self.primaryStorage setIDForMessageWithServerID:dataMessage.publicChatInfo.serverID to:incomingMessage.uniqueId in:transaction];
|
|
}
|
|
|
|
dispatch_async(dispatch_get_main_queue(), ^{
|
|
NSString *url = [OWSLinkPreview previewURLForRawBodyText:incomingMessage.body];
|
|
if (url != nil) {
|
|
[OWSLinkPreview tryToBuildPreviewInfoObjcWithPreviewUrl:url]
|
|
.thenOn(dispatch_get_main_queue(), ^(OWSLinkPreviewDraft *linkPreviewDraft) {
|
|
[OWSPrimaryStorage.sharedManager.dbReadWriteConnection readWriteWithBlock:^(YapDatabaseReadWriteTransaction *transaction) {
|
|
OWSLinkPreview *linkPreview = [OWSLinkPreview buildValidatedLinkPreviewFromInfo:linkPreviewDraft transaction:transaction error:nil];
|
|
incomingMessage.linkPreview = linkPreview;
|
|
[incomingMessage saveWithTransaction:transaction];
|
|
}];
|
|
});
|
|
}
|
|
});
|
|
|
|
return incomingMessage;
|
|
}
|
|
default: {
|
|
OWSLogWarn(@"Ignoring unknown group message type: %d", (int)dataMessage.group.type);
|
|
return nil;
|
|
}
|
|
}
|
|
} else {
|
|
OWSLogDebug(
|
|
@"incoming message from: %@ with timestamp: %lu", envelopeAddress(envelope), (unsigned long)timestamp);
|
|
TSContactThread *thread =
|
|
[TSContactThread getOrCreateThreadWithContactId:envelope.source transaction:transaction];
|
|
|
|
[[OWSDisappearingMessagesJob sharedJob] becomeConsistentWithDisappearingDuration:dataMessage.expireTimer
|
|
thread:thread
|
|
createdByRemoteRecipientId:envelope.source
|
|
createdInExistingGroup:NO
|
|
transaction:transaction];
|
|
|
|
TSQuotedMessage *_Nullable quotedMessage = [TSQuotedMessage quotedMessageForDataMessage:dataMessage
|
|
thread:thread
|
|
transaction:transaction];
|
|
|
|
NSError *linkPreviewError;
|
|
OWSLinkPreview *_Nullable linkPreview =
|
|
[OWSLinkPreview buildValidatedLinkPreviewWithDataMessage:dataMessage
|
|
body:body
|
|
transaction:transaction
|
|
error:&linkPreviewError];
|
|
if (linkPreviewError && ![OWSLinkPreview isNoPreviewError:linkPreviewError]) {
|
|
OWSLogError(@"linkPreviewError: %@", linkPreviewError);
|
|
}
|
|
|
|
// Legit usage of senderTimestamp when creating incoming message from received envelope
|
|
TSIncomingMessage *incomingMessage =
|
|
[[TSIncomingMessage alloc] initIncomingMessageWithTimestamp:timestamp
|
|
inThread:thread
|
|
authorId:[thread contactIdentifier]
|
|
sourceDeviceId:envelope.sourceDevice
|
|
messageBody:body
|
|
attachmentIds:@[]
|
|
expiresInSeconds:dataMessage.expireTimer
|
|
quotedMessage:quotedMessage
|
|
contactShare:contact
|
|
linkPreview:linkPreview
|
|
serverTimestamp:serverTimestamp
|
|
wasReceivedByUD:wasReceivedByUD];
|
|
|
|
NSString *displayName = dataMessage.profile.displayName;
|
|
[self.profileManager setDisplayNameForContactWithID:thread.contactIdentifier to:displayName with:transaction];
|
|
|
|
if (envelope.isPtpMessage) { incomingMessage.isP2P = YES; }
|
|
|
|
NSArray<TSAttachmentPointer *> *attachmentPointers =
|
|
[TSAttachmentPointer attachmentPointersFromProtos:dataMessage.attachments albumMessage:incomingMessage];
|
|
for (TSAttachmentPointer *pointer in attachmentPointers) {
|
|
[pointer saveWithTransaction:transaction];
|
|
[incomingMessage.attachmentIds addObject:pointer.uniqueId];
|
|
}
|
|
|
|
// Loki: Do this before the check below
|
|
[self handleFriendRequestMessageIfNeededWithEnvelope:envelope message:incomingMessage thread:thread transaction:transaction];
|
|
|
|
if (body.length == 0 && attachmentPointers.count < 1 && !contact) {
|
|
OWSLogWarn(@"ignoring empty incoming message from: %@ with timestamp: %lu",
|
|
envelopeAddress(envelope),
|
|
(unsigned long)timestamp);
|
|
return nil;
|
|
}
|
|
|
|
// Loki
|
|
// If we received a message from a contact in the last 2 minues that was not p2p, then we need to ping them.
|
|
// We assume this occurred because they don't have our p2p details.
|
|
if (!envelope.isPtpMessage && envelope.source != nil) {
|
|
uint64_t timestamp = envelope.timestamp;
|
|
uint64_t now = NSDate.ows_millisecondTimeStamp;
|
|
uint64_t ageInSeconds = (now - timestamp) / 1000;
|
|
if (ageInSeconds <= 120) { [LKP2PAPI pingContact:envelope.source]; }
|
|
}
|
|
|
|
[self finalizeIncomingMessage:incomingMessage
|
|
thread:thread
|
|
envelope:envelope
|
|
transaction:transaction];
|
|
|
|
dispatch_async(dispatch_get_main_queue(), ^{
|
|
NSString *linkPreviewURL;
|
|
if (linkPreview != nil) {
|
|
linkPreviewURL = linkPreview.urlString;
|
|
} else {
|
|
linkPreviewURL = [OWSLinkPreview previewURLForRawBodyText:incomingMessage.body];
|
|
}
|
|
if (linkPreviewURL != nil) {
|
|
[OWSLinkPreview tryToBuildPreviewInfoObjcWithPreviewUrl:linkPreviewURL]
|
|
.thenOn(dispatch_get_main_queue(), ^(OWSLinkPreviewDraft *linkPreviewDraft) {
|
|
[OWSPrimaryStorage.sharedManager.dbReadWriteConnection readWriteWithBlock:^(YapDatabaseReadWriteTransaction *transaction) {
|
|
OWSLinkPreview *linkPreview = [OWSLinkPreview buildValidatedLinkPreviewFromInfo:linkPreviewDraft transaction:transaction error:nil];
|
|
incomingMessage.linkPreview = linkPreview;
|
|
[incomingMessage saveWithTransaction:transaction];
|
|
}];
|
|
});
|
|
}
|
|
});
|
|
|
|
return incomingMessage;
|
|
}
|
|
}
|
|
|
|
// The difference between this function and `handleFriendRequestAcceptIfNeededWithEnvelope:` is that this will setup the incoming message for display to the user
|
|
// While `handleFriendRequestAcceptIfNeededWithEnvelope:` handles friend request accepting logic and doesn't need a message
|
|
- (void)handleFriendRequestMessageIfNeededWithEnvelope:(SSKProtoEnvelope *)envelope message:(TSIncomingMessage *)message thread:(TSThread *)thread transaction:(YapDatabaseReadWriteTransaction *)transaction {
|
|
// Check if it's a friend request message and make sure it's not a group message
|
|
if (envelope.isGroupChatMessage || envelope.type != SSKProtoEnvelopeTypeFriendRequest) return;
|
|
|
|
if (thread.hasCurrentUserSentFriendRequest) {
|
|
// This can happen if Alice sent Bob a friend request, Bob declined, but then Bob changed his
|
|
// mind and sent a friend request to Alice. In this case we want Alice to auto-accept the request
|
|
// and send a friend request accepted message back to Bob. We don't check that sending the
|
|
// friend request accepted message succeeded. Even if it doesn't, the thread's current friend
|
|
// request status will be set to LKThreadFriendRequestStatusFriends for Alice making it possible
|
|
// for Alice to send messages to Bob. When Bob receives a message, his thread's friend request status
|
|
// will then be set to LKThreadFriendRequestStatusFriends. If we do check for a successful send
|
|
// before updating Alice's thread's friend request status to LKThreadFriendRequestStatusFriends,
|
|
// we can end up in a deadlock where both users' threads' friend request statuses are
|
|
// LKThreadFriendRequestStatusRequestSent.
|
|
[thread saveFriendRequestStatus:LKThreadFriendRequestStatusFriends withTransaction:transaction];
|
|
TSOutgoingMessage *existingFriendRequestMessage = (TSOutgoingMessage *)[thread.lastInteraction as:TSOutgoingMessage.class];
|
|
if (existingFriendRequestMessage != nil && existingFriendRequestMessage.isFriendRequest) {
|
|
[existingFriendRequestMessage saveFriendRequestStatus:LKMessageFriendRequestStatusAccepted withTransaction:transaction];
|
|
}
|
|
// The two lines below are equivalent to calling [ThreadUtil enqueueAcceptFriendRequestMessageInThread:thread]
|
|
LKEphemeralMessage *backgroundMessage = [[LKEphemeralMessage alloc] initInThread:thread];
|
|
[self.messageSenderJobQueue addMessage:backgroundMessage transaction:transaction];
|
|
} else if (!thread.isContactFriend) {
|
|
// Checking that the sender of the message isn't already a friend is necessary because otherwise
|
|
// the following situation can occur: Alice and Bob are friends. Bob loses his database and his
|
|
// friend request status is reset to LKThreadFriendRequestStatusNone. Bob now sends Alice a friend
|
|
// request. Alice's thread's friend request status is reset to
|
|
// LKThreadFriendRequestStatusRequestReceived.
|
|
[thread saveFriendRequestStatus:LKThreadFriendRequestStatusRequestReceived withTransaction:transaction];
|
|
message.friendRequestStatus = LKMessageFriendRequestStatusPending; // Don't save yet. This is done in finalizeIncomingMessage:thread:envelope:transaction.
|
|
}
|
|
}
|
|
|
|
- (void)handleFriendRequestAcceptIfNeededWithEnvelope:(SSKProtoEnvelope *)envelope transaction:(YapDatabaseReadWriteTransaction *)transaction {
|
|
// If we get any other envelope type then we can assume that we had to use signal cipher decryption
|
|
// and that means we must have a session with the other person.
|
|
// We also need to ensure that we're contacting the person directly and not through a public chat
|
|
if (envelope.isGroupChatMessage || envelope.type == SSKProtoEnvelopeTypeFriendRequest) return;
|
|
|
|
// If we're already friends then there's no point in continuing
|
|
// TODO: We'll need to fix this up if we ever start using Sync messages
|
|
// Currently it'll use `envelope.source` but with sync messages we need to use the message sender id
|
|
TSContactThread *thread = [TSContactThread getOrCreateThreadWithContactId:envelope.source transaction:transaction];
|
|
if (thread.isContactFriend) return;
|
|
|
|
// Become happy friends and go on great adventures
|
|
[thread saveFriendRequestStatus:LKThreadFriendRequestStatusFriends withTransaction:transaction];
|
|
TSOutgoingMessage *existingFriendRequestMessage = (TSOutgoingMessage *)[thread.lastInteraction as:TSOutgoingMessage.class];
|
|
if (existingFriendRequestMessage != nil && existingFriendRequestMessage.isFriendRequest) {
|
|
[existingFriendRequestMessage saveFriendRequestStatus:LKMessageFriendRequestStatusAccepted withTransaction:transaction];
|
|
}
|
|
// Send our P2P details
|
|
LKAddressMessage *_Nullable onlineMessage = [LKP2PAPI onlineBroadcastMessageForThread:thread];
|
|
if (onlineMessage != nil) {
|
|
[self.messageSenderJobQueue addMessage:onlineMessage transaction:transaction];
|
|
}
|
|
}
|
|
|
|
- (void)finalizeIncomingMessage:(TSIncomingMessage *)incomingMessage
|
|
thread:(TSThread *)thread
|
|
envelope:(SSKProtoEnvelope *)envelope
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return;
|
|
}
|
|
if (!thread) {
|
|
OWSFailDebug(@"Missing thread.");
|
|
return;
|
|
}
|
|
if (!incomingMessage) {
|
|
OWSFailDebug(@"Missing incomingMessage.");
|
|
return;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return;
|
|
}
|
|
|
|
[incomingMessage saveWithTransaction:transaction];
|
|
|
|
// Remove any old incoming messages
|
|
if (incomingMessage.isFriendRequest) {
|
|
[thread removeOldIncomingFriendRequestMessagesIfNeededWithTransaction:transaction];
|
|
}
|
|
|
|
// Any messages sent from the current user - from this device or another - should be automatically marked as read.
|
|
if ([envelope.source isEqualToString:self.tsAccountManager.localNumber]) {
|
|
// Don't send a read receipt for messages sent by ourselves.
|
|
[incomingMessage markAsReadAtTimestamp:envelope.timestamp sendReadReceipt:NO transaction:transaction];
|
|
}
|
|
|
|
// Download the "non-message body" attachments.
|
|
NSMutableArray<NSString *> *otherAttachmentIds = [incomingMessage.allAttachmentIds mutableCopy];
|
|
if (incomingMessage.attachmentIds) {
|
|
[otherAttachmentIds removeObjectsInArray:incomingMessage.attachmentIds];
|
|
}
|
|
for (NSString *attachmentId in otherAttachmentIds) {
|
|
TSAttachment *_Nullable attachment =
|
|
[TSAttachment fetchObjectWithUniqueID:attachmentId transaction:transaction];
|
|
if (![attachment isKindOfClass:[TSAttachmentPointer class]]) {
|
|
OWSLogInfo(@"Skipping attachment stream.");
|
|
continue;
|
|
}
|
|
TSAttachmentPointer *_Nullable attachmentPointer = (TSAttachmentPointer *)attachment;
|
|
|
|
OWSLogDebug(@"Downloading attachment for message: %lu", (unsigned long)incomingMessage.timestamp);
|
|
|
|
// Use a separate download for each attachment so that:
|
|
//
|
|
// * We update the message as each comes in.
|
|
// * Failures don't interfere with successes.
|
|
[self.attachmentDownloads downloadAttachmentPointer:attachmentPointer
|
|
success:^(NSArray<TSAttachmentStream *> *attachmentStreams) {
|
|
[self.dbConnection readWriteWithBlock:^(YapDatabaseReadWriteTransaction *transaction) {
|
|
TSAttachmentStream *_Nullable attachmentStream = attachmentStreams.firstObject;
|
|
OWSAssertDebug(attachmentStream);
|
|
if (attachmentStream && incomingMessage.quotedMessage.thumbnailAttachmentPointerId.length > 0 &&
|
|
[attachmentStream.uniqueId
|
|
isEqualToString:incomingMessage.quotedMessage.thumbnailAttachmentPointerId]) {
|
|
[incomingMessage setQuotedMessageThumbnailAttachmentStream:attachmentStream];
|
|
[incomingMessage saveWithTransaction:transaction];
|
|
} else {
|
|
// We touch the message to trigger redraw of any views displaying it,
|
|
// since the attachment might be a contact avatar, etc.
|
|
[incomingMessage touchWithTransaction:transaction];
|
|
}
|
|
}];
|
|
}
|
|
failure:^(NSError *error) {
|
|
OWSLogWarn(@"failed to download attachment for message: %lu with error: %@",
|
|
(unsigned long)incomingMessage.timestamp,
|
|
error);
|
|
}];
|
|
}
|
|
|
|
// In case we already have a read receipt for this new message (this happens sometimes).
|
|
[OWSReadReceiptManager.sharedManager applyEarlyReadReceiptsForIncomingMessage:incomingMessage
|
|
transaction:transaction];
|
|
|
|
// Update thread preview in inbox
|
|
[thread touchWithTransaction:transaction];
|
|
|
|
[SSKEnvironment.shared.notificationsManager notifyUserForIncomingMessage:incomingMessage
|
|
inThread:thread
|
|
transaction:transaction];
|
|
|
|
dispatch_async(dispatch_get_main_queue(), ^{
|
|
[self.typingIndicators didReceiveIncomingMessageInThread:thread
|
|
recipientId:envelope.source
|
|
deviceId:envelope.sourceDevice];
|
|
});
|
|
}
|
|
|
|
#pragma mark - helpers
|
|
|
|
- (BOOL)isDataMessageGroupAvatarUpdate:(SSKProtoDataMessage *)dataMessage
|
|
{
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return NO;
|
|
}
|
|
|
|
return (dataMessage.group != nil && dataMessage.group.type == SSKProtoGroupContextTypeUpdate
|
|
&& dataMessage.group.avatar != nil);
|
|
}
|
|
|
|
/**
|
|
* @returns
|
|
* Group or Contact thread for message, creating a new contact thread if necessary,
|
|
* but never creating a new group thread.
|
|
*/
|
|
- (nullable TSThread *)threadForEnvelope:(SSKProtoEnvelope *)envelope
|
|
dataMessage:(SSKProtoDataMessage *)dataMessage
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
if (!envelope) {
|
|
OWSFailDebug(@"Missing envelope.");
|
|
return nil;
|
|
}
|
|
if (!dataMessage) {
|
|
OWSFailDebug(@"Missing dataMessage.");
|
|
return nil;
|
|
}
|
|
if (!transaction) {
|
|
OWSFail(@"Missing transaction.");
|
|
return nil;
|
|
}
|
|
|
|
if (dataMessage.group) {
|
|
NSData *groupId = dataMessage.group.id;
|
|
OWSAssertDebug(groupId.length > 0);
|
|
TSGroupThread *_Nullable groupThread = [TSGroupThread threadWithGroupId:groupId transaction:transaction];
|
|
// This method should only be called from a code path that has already verified
|
|
// that this is a "known" group.
|
|
OWSAssertDebug(groupThread);
|
|
return groupThread;
|
|
} else {
|
|
return [TSContactThread getOrCreateThreadWithContactId:envelope.source transaction:transaction];
|
|
}
|
|
}
|
|
|
|
#pragma mark -
|
|
|
|
- (void)checkForUnknownLinkedDevice:(SSKProtoEnvelope *)envelope
|
|
transaction:(YapDatabaseReadWriteTransaction *)transaction
|
|
{
|
|
OWSAssertDebug(envelope);
|
|
OWSAssertDebug(transaction);
|
|
|
|
NSString *localNumber = self.tsAccountManager.localNumber;
|
|
if (![localNumber isEqualToString:envelope.source]) {
|
|
return;
|
|
}
|
|
|
|
// Consult the device list cache we use for message sending
|
|
// whether or not we know about this linked device.
|
|
SignalRecipient *_Nullable recipient =
|
|
[SignalRecipient registeredRecipientForRecipientId:localNumber mustHaveDevices:NO transaction:transaction];
|
|
if (!recipient) {
|
|
OWSFailDebug(@"No local SignalRecipient.");
|
|
} else {
|
|
BOOL isRecipientDevice = [recipient.devices containsObject:@(envelope.sourceDevice)];
|
|
if (!isRecipientDevice) {
|
|
OWSLogInfo(@"Message received from unknown linked device; adding to local SignalRecipient: %lu.",
|
|
(unsigned long) envelope.sourceDevice);
|
|
|
|
[recipient updateRegisteredRecipientWithDevicesToAdd:@[ @(envelope.sourceDevice) ]
|
|
devicesToRemove:nil
|
|
transaction:transaction];
|
|
}
|
|
}
|
|
|
|
// Consult the device list cache we use for the "linked device" UI
|
|
// whether or not we know about this linked device.
|
|
NSMutableSet<NSNumber *> *deviceIdSet = [NSMutableSet new];
|
|
for (OWSDevice *device in [OWSDevice currentDevicesWithTransaction:transaction]) {
|
|
[deviceIdSet addObject:@(device.deviceId)];
|
|
}
|
|
BOOL isInDeviceList = [deviceIdSet containsObject:@(envelope.sourceDevice)];
|
|
if (!isInDeviceList) {
|
|
OWSLogInfo(@"Message received from unknown linked device; refreshing device list: %lu.",
|
|
(unsigned long) envelope.sourceDevice);
|
|
|
|
[OWSDevicesService refreshDevices];
|
|
dispatch_async(dispatch_get_main_queue(), ^{
|
|
[self.profileManager fetchLocalUsersProfile];
|
|
});
|
|
}
|
|
}
|
|
|
|
# pragma mark - Loki Session
|
|
|
|
- (void)handleNewSessionAdopted:(NSNotification *)notification {
|
|
NSString *pubKey = notification.userInfo[kNSNotificationKey_ContactPubKey];
|
|
if (pubKey.length == 0) { return; }
|
|
|
|
[self.dbConnection readWriteWithBlock:^(YapDatabaseReadWriteTransaction *transaction) {
|
|
|
|
TSContactThread *_Nullable thread = [TSContactThread getThreadWithContactId:pubKey transaction:transaction];
|
|
if (!thread) {
|
|
NSLog(@"[Loki] A new session was adopted but we failed to get the thread for %@.", pubKey);
|
|
return;
|
|
}
|
|
|
|
// If we were the ones to initiate the reset then we need to send back an empty message
|
|
if (thread.sessionResetState == TSContactThreadSessionResetStateInitiated) {
|
|
LKEphemeralMessage *emptyMessage = [[LKEphemeralMessage alloc] initInThread:thread];
|
|
[self.messageSenderJobQueue addMessage:emptyMessage transaction:transaction];
|
|
}
|
|
|
|
// Show session reset done message
|
|
[[[TSInfoMessage alloc] initWithTimestamp:NSDate.ows_millisecondTimeStamp
|
|
inThread:thread
|
|
messageType:TSInfoMessageTypeLokiSessionResetDone] saveWithTransaction:transaction];
|
|
|
|
/// Loki: Set our session reset state to none
|
|
thread.sessionResetState = TSContactThreadSessionResetStateNone;
|
|
[thread saveWithTransaction:transaction];
|
|
}];
|
|
}
|
|
|
|
@end
|
|
|
|
NS_ASSUME_NONNULL_END
|