matrixion/src/ui/UserProfile.cpp

230 lines
7.9 KiB
C++
Raw Normal View History

2020-05-17 16:34:47 +03:00
#include "UserProfile.h"
2020-06-28 18:31:34 +03:00
#include "Cache.h"
2020-06-26 01:54:42 +03:00
#include "ChatPage.h"
2020-07-05 19:03:27 +03:00
#include "DeviceVerificationFlow.h"
2020-05-17 16:34:47 +03:00
#include "Logging.h"
#include "Utils.h"
2020-05-22 08:47:02 +03:00
#include "mtx/responses/crypto.hpp"
2020-08-09 06:05:15 +03:00
#include "timeline/TimelineModel.h"
2020-05-17 16:34:47 +03:00
2020-07-17 23:16:30 +03:00
#include <iostream> // only for debugging
2020-08-09 06:05:15 +03:00
UserProfile::UserProfile(QString roomid, QString userid, TimelineModel *parent)
2020-07-04 05:24:28 +03:00
: QObject(parent)
, roomid_(roomid)
, userid_(userid)
2020-08-09 06:05:15 +03:00
, model(parent)
2020-07-04 05:24:28 +03:00
{
fetchDeviceList(this->userid_);
}
2020-06-28 18:31:34 +03:00
2020-07-04 05:24:28 +03:00
QHash<int, QByteArray>
DeviceInfoModel::roleNames() const
{
return {
{DeviceId, "deviceId"},
{DeviceName, "deviceName"},
{VerificationStatus, "verificationStatus"},
};
}
2020-07-01 15:17:10 +03:00
2020-07-04 05:24:28 +03:00
QVariant
DeviceInfoModel::data(const QModelIndex &index, int role) const
2020-07-01 15:17:10 +03:00
{
2020-07-04 05:24:28 +03:00
if (!index.isValid() || index.row() >= (int)deviceList_.size() || index.row() < 0)
return {};
switch (role) {
case DeviceId:
return deviceList_[index.row()].device_id;
case DeviceName:
return deviceList_[index.row()].display_name;
case VerificationStatus:
return QVariant::fromValue(deviceList_[index.row()].verification_status);
default:
return {};
}
2020-07-01 15:17:10 +03:00
}
2020-05-17 16:34:47 +03:00
2020-07-04 05:24:28 +03:00
void
DeviceInfoModel::reset(const std::vector<DeviceInfo> &deviceList)
2020-05-27 11:49:26 +03:00
{
2020-07-04 05:24:28 +03:00
beginResetModel();
this->deviceList_ = std::move(deviceList);
endResetModel();
}
DeviceInfoModel *
UserProfile::deviceList()
{
return &this->deviceList_;
2020-05-17 16:34:47 +03:00
}
2020-05-22 08:47:02 +03:00
QString
2020-07-04 05:24:28 +03:00
UserProfile::userid()
2020-05-27 11:49:26 +03:00
{
2020-07-04 05:24:28 +03:00
return this->userid_;
2020-05-22 08:47:02 +03:00
}
2020-07-04 05:24:28 +03:00
QString
UserProfile::displayName()
2020-05-27 11:49:26 +03:00
{
2020-07-04 05:24:28 +03:00
return cache::displayName(roomid_, userid_);
}
QString
UserProfile::avatarUrl()
{
return cache::avatarUrl(roomid_, userid_);
2020-05-22 08:47:02 +03:00
}
2020-07-17 23:16:30 +03:00
bool
UserProfile::getUserStatus()
{
return isUserVerified;
}
2020-05-17 16:34:47 +03:00
void
2020-06-28 18:31:34 +03:00
UserProfile::callback_fn(const mtx::responses::QueryKeys &res,
mtx::http::RequestErr err,
std::string user_id)
2020-05-17 16:34:47 +03:00
{
2020-06-28 18:31:34 +03:00
if (err) {
nhlog::net()->warn("failed to query device keys: {},{}",
err->matrix_error.errcode,
static_cast<int>(err->status_code));
return;
}
if (res.device_keys.empty() || (res.device_keys.find(user_id) == res.device_keys.end())) {
nhlog::net()->warn("no devices retrieved {}", user_id);
return;
}
auto devices = res.device_keys.at(user_id);
2020-07-01 15:17:10 +03:00
std::vector<DeviceInfo> deviceInfo;
auto device_verified = cache::getVerifiedCache(user_id);
2020-06-28 18:31:34 +03:00
for (const auto &d : devices) {
auto device = d.second;
// TODO: Verify signatures and ignore those that don't pass.
2020-07-04 05:24:28 +03:00
verification::Status verified = verification::Status::UNVERIFIED;
2020-07-17 23:16:30 +03:00
isUserVerified = device_verified->is_user_verified;
if (device_verified.has_value()) {
if (std::find(device_verified->cross_verified.begin(),
device_verified->cross_verified.end(),
d.first) != device_verified->cross_verified.end())
2020-07-04 05:24:28 +03:00
verified = verification::Status::VERIFIED;
2020-07-01 15:17:10 +03:00
if (std::find(device_verified->device_verified.begin(),
device_verified->device_verified.end(),
d.first) != device_verified->device_verified.end())
2020-07-04 05:24:28 +03:00
verified = verification::Status::VERIFIED;
2020-07-01 15:17:10 +03:00
if (std::find(device_verified->device_blocked.begin(),
device_verified->device_blocked.end(),
d.first) != device_verified->device_blocked.end())
2020-07-04 05:24:28 +03:00
verified = verification::Status::BLOCKED;
2020-07-01 15:17:10 +03:00
}
2020-07-04 05:24:28 +03:00
deviceInfo.push_back(
{QString::fromStdString(d.first),
QString::fromStdString(device.unsigned_info.device_display_name),
verified});
2020-06-28 18:31:34 +03:00
}
2020-07-05 19:03:27 +03:00
std::sort(
deviceInfo.begin(), deviceInfo.end(), [](const DeviceInfo &a, const DeviceInfo &b) {
return a.device_id > b.device_id;
});
2020-06-28 18:31:34 +03:00
2020-07-04 05:24:28 +03:00
this->deviceList_.queueReset(std::move(deviceInfo));
2020-06-28 18:31:34 +03:00
}
void
UserProfile::fetchDeviceList(const QString &userID)
{
auto localUser = utils::localUser();
auto user_cache = cache::getUserCache(userID.toStdString());
2020-07-01 15:17:10 +03:00
if (user_cache.has_value()) {
this->callback_fn(user_cache->keys, {}, userID.toStdString());
2020-06-28 18:31:34 +03:00
} else {
mtx::requests::QueryKeys req;
req.device_keys[userID.toStdString()] = {};
http::client()->query_keys(
req,
[user_id = userID.toStdString(), this](const mtx::responses::QueryKeys &res,
mtx::http::RequestErr err) {
this->callback_fn(res, err, user_id);
2020-06-28 18:31:34 +03:00
});
}
2020-05-17 16:34:47 +03:00
}
2020-05-27 11:49:26 +03:00
2020-06-26 01:54:42 +03:00
void
UserProfile::banUser()
{
2020-07-04 05:24:28 +03:00
ChatPage::instance()->banUser(this->userid_, "");
2020-06-26 01:54:42 +03:00
}
// void ignoreUser(){
// }
void
UserProfile::kickUser()
{
2020-07-04 05:24:28 +03:00
ChatPage::instance()->kickUser(this->userid_, "");
2020-06-26 01:54:42 +03:00
}
void
UserProfile::startChat()
{
mtx::requests::CreateRoom req;
req.preset = mtx::requests::Preset::PrivateChat;
req.visibility = mtx::requests::Visibility::Private;
2020-07-04 05:24:28 +03:00
if (utils::localUser() != this->userid_)
req.invite = {this->userid_.toStdString()};
2020-06-26 01:54:42 +03:00
emit ChatPage::instance()->createRoom(req);
2020-07-17 23:16:30 +03:00
}
2020-08-09 06:05:15 +03:00
DeviceVerificationFlow *
UserProfile::createFlow(bool isVerifyUser)
2020-07-17 23:16:30 +03:00
{
2020-08-09 06:05:15 +03:00
if (!isVerifyUser)
return (new DeviceVerificationFlow(this, DeviceVerificationFlow::Type::ToDevice));
else {
std::cout << "CHECKING IF IT TO START ROOM_VERIFICATION OR TO_DEVICE VERIFICATION"
<< std::endl;
auto joined_rooms = cache::joinedRooms();
auto room_infos = cache::getRoomInfo(joined_rooms);
for (std::string room_id : joined_rooms) {
if ((room_infos[QString::fromStdString(room_id)].member_count == 2) &&
cache::isRoomEncrypted(room_id)) {
auto room_members = cache::roomMembers(room_id);
if (std::find(room_members.begin(),
room_members.end(),
(this->userid()).toStdString()) !=
room_members.end()) {
std::cout
<< "FOUND A ENCRYPTED ROOM WITH THIS USER : " << room_id
2020-07-17 23:16:30 +03:00
<< std::endl;
2020-08-09 06:05:15 +03:00
if (this->roomid_.toStdString() == room_id) {
auto newflow = new DeviceVerificationFlow(
2020-08-18 08:59:02 +03:00
this,
DeviceVerificationFlow::Type::RoomMsg,
this->model);
2020-08-09 06:05:15 +03:00
return (std::move(newflow));
} else {
std::cout << "FOUND A ENCRYPTED ROOM BUT CURRENTLY "
"NOT IN THAT ROOM : "
<< room_id << std::endl;
}
}
2020-07-17 23:16:30 +03:00
}
}
2020-08-09 06:05:15 +03:00
std::cout << "DIDN'T FIND A ENCRYPTED ROOM WITH THIS USER" << std::endl;
return (new DeviceVerificationFlow(this, DeviceVerificationFlow::Type::ToDevice));
}
2020-07-05 19:03:27 +03:00
}