2020-07-10 00:15:22 +03:00
|
|
|
#include "EventStore.h"
|
|
|
|
|
|
|
|
#include <QThread>
|
2020-07-18 18:43:49 +03:00
|
|
|
#include <QTimer>
|
2020-07-10 00:15:22 +03:00
|
|
|
|
2020-07-19 13:22:54 +03:00
|
|
|
#include "Cache.h"
|
2020-07-10 00:15:22 +03:00
|
|
|
#include "Cache_p.h"
|
2020-08-09 06:05:15 +03:00
|
|
|
#include "ChatPage.h"
|
2020-07-10 00:15:22 +03:00
|
|
|
#include "EventAccessors.h"
|
|
|
|
#include "Logging.h"
|
2020-07-10 02:37:55 +03:00
|
|
|
#include "MatrixClient.h"
|
2020-07-10 00:15:22 +03:00
|
|
|
#include "Olm.h"
|
|
|
|
|
2020-07-19 13:22:54 +03:00
|
|
|
Q_DECLARE_METATYPE(Reaction)
|
|
|
|
|
2020-07-10 00:15:22 +03:00
|
|
|
QCache<EventStore::IdIndex, mtx::events::collections::TimelineEvents> EventStore::decryptedEvents_{
|
|
|
|
1000};
|
|
|
|
QCache<EventStore::IdIndex, mtx::events::collections::TimelineEvents> EventStore::events_by_id_{
|
|
|
|
1000};
|
|
|
|
QCache<EventStore::Index, mtx::events::collections::TimelineEvents> EventStore::events_{1000};
|
|
|
|
|
|
|
|
EventStore::EventStore(std::string room_id, QObject *)
|
|
|
|
: room_id_(std::move(room_id))
|
|
|
|
{
|
2020-07-19 13:22:54 +03:00
|
|
|
static auto reactionType = qRegisterMetaType<Reaction>();
|
|
|
|
(void)reactionType;
|
|
|
|
|
2020-07-10 00:15:22 +03:00
|
|
|
auto range = cache::client()->getTimelineRange(room_id_);
|
|
|
|
|
|
|
|
if (range) {
|
|
|
|
this->first = range->first;
|
|
|
|
this->last = range->last;
|
|
|
|
}
|
2020-07-10 02:37:55 +03:00
|
|
|
|
2020-09-04 09:32:24 +03:00
|
|
|
connect(
|
|
|
|
this,
|
|
|
|
&EventStore::eventFetched,
|
|
|
|
this,
|
|
|
|
[this](std::string id,
|
|
|
|
std::string relatedTo,
|
|
|
|
mtx::events::collections::TimelineEvents timeline) {
|
|
|
|
cache::client()->storeEvent(room_id_, id, {timeline});
|
|
|
|
|
|
|
|
if (!relatedTo.empty()) {
|
|
|
|
auto idx = idToIndex(relatedTo);
|
|
|
|
if (idx)
|
|
|
|
emit dataChanged(*idx, *idx);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
Qt::QueuedConnection);
|
|
|
|
|
|
|
|
connect(
|
|
|
|
this,
|
|
|
|
&EventStore::oldMessagesRetrieved,
|
|
|
|
this,
|
|
|
|
[this](const mtx::responses::Messages &res) {
|
|
|
|
uint64_t newFirst = cache::client()->saveOldMessages(room_id_, res);
|
|
|
|
if (newFirst == first)
|
|
|
|
fetchMore();
|
|
|
|
else {
|
|
|
|
emit beginInsertRows(toExternalIdx(newFirst),
|
|
|
|
toExternalIdx(this->first - 1));
|
|
|
|
this->first = newFirst;
|
|
|
|
emit endInsertRows();
|
|
|
|
emit fetchedMore();
|
|
|
|
}
|
|
|
|
},
|
|
|
|
Qt::QueuedConnection);
|
2020-07-18 18:43:49 +03:00
|
|
|
|
|
|
|
connect(this, &EventStore::processPending, this, [this]() {
|
|
|
|
if (!current_txn.empty()) {
|
|
|
|
nhlog::ui()->debug("Already processing {}", current_txn);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto event = cache::client()->firstPendingMessage(room_id_);
|
|
|
|
|
|
|
|
if (!event) {
|
|
|
|
nhlog::ui()->debug("No event to send");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::visit(
|
|
|
|
[this](auto e) {
|
|
|
|
auto txn_id = e.event_id;
|
|
|
|
this->current_txn = txn_id;
|
|
|
|
|
|
|
|
if (txn_id.empty() || txn_id[0] != 'm') {
|
|
|
|
nhlog::ui()->debug("Invalid txn id '{}'", txn_id);
|
|
|
|
cache::client()->removePendingStatus(room_id_, txn_id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if constexpr (mtx::events::message_content_to_type<decltype(e.content)> !=
|
|
|
|
mtx::events::EventType::Unsupported)
|
|
|
|
http::client()->send_room_message(
|
|
|
|
room_id_,
|
|
|
|
txn_id,
|
|
|
|
e.content,
|
2020-08-18 08:59:02 +03:00
|
|
|
[this, txn_id, e](const mtx::responses::EventId &event_id,
|
|
|
|
mtx::http::RequestErr err) {
|
2020-07-18 18:43:49 +03:00
|
|
|
if (err) {
|
|
|
|
const int status_code =
|
|
|
|
static_cast<int>(err->status_code);
|
|
|
|
nhlog::net()->warn(
|
|
|
|
"[{}] failed to send message: {} {}",
|
|
|
|
txn_id,
|
|
|
|
err->matrix_error.error,
|
|
|
|
status_code);
|
|
|
|
emit messageFailed(txn_id);
|
|
|
|
return;
|
|
|
|
}
|
2020-08-18 08:59:02 +03:00
|
|
|
|
2020-07-18 21:39:31 +03:00
|
|
|
emit messageSent(txn_id, event_id.event_id.to_string());
|
2020-08-18 08:59:02 +03:00
|
|
|
if constexpr (mtx::events::message_content_to_type<
|
|
|
|
decltype(e.content)> ==
|
|
|
|
mtx::events::EventType::RoomEncrypted) {
|
|
|
|
auto event =
|
|
|
|
decryptEvent({room_id_, e.event_id}, e);
|
|
|
|
if (auto dec =
|
|
|
|
std::get_if<mtx::events::RoomEvent<
|
|
|
|
mtx::events::msg::
|
|
|
|
KeyVerificationRequest>>(event)) {
|
|
|
|
emit updateFlowEventId(
|
|
|
|
event_id.event_id.to_string());
|
|
|
|
}
|
|
|
|
}
|
2020-07-18 18:43:49 +03:00
|
|
|
});
|
|
|
|
},
|
|
|
|
event->data);
|
|
|
|
});
|
|
|
|
|
2020-09-04 09:32:24 +03:00
|
|
|
connect(
|
|
|
|
this,
|
|
|
|
&EventStore::messageFailed,
|
|
|
|
this,
|
|
|
|
[this](std::string txn_id) {
|
|
|
|
if (current_txn == txn_id) {
|
|
|
|
current_txn_error_count++;
|
|
|
|
if (current_txn_error_count > 10) {
|
|
|
|
nhlog::ui()->debug("failing txn id '{}'", txn_id);
|
|
|
|
cache::client()->removePendingStatus(room_id_, txn_id);
|
|
|
|
current_txn_error_count = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
QTimer::singleShot(1000, this, [this]() {
|
|
|
|
nhlog::ui()->debug("timeout");
|
|
|
|
this->current_txn = "";
|
|
|
|
emit processPending();
|
|
|
|
});
|
|
|
|
},
|
|
|
|
Qt::QueuedConnection);
|
|
|
|
|
|
|
|
connect(
|
|
|
|
this,
|
|
|
|
&EventStore::messageSent,
|
|
|
|
this,
|
|
|
|
[this](std::string txn_id, std::string event_id) {
|
|
|
|
nhlog::ui()->debug("sent {}", txn_id);
|
|
|
|
|
|
|
|
http::client()->read_event(
|
|
|
|
room_id_, event_id, [this, event_id](mtx::http::RequestErr err) {
|
|
|
|
if (err) {
|
|
|
|
nhlog::net()->warn(
|
|
|
|
"failed to read_event ({}, {})", room_id_, event_id);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
cache::client()->removePendingStatus(room_id_, txn_id);
|
|
|
|
this->current_txn = "";
|
|
|
|
this->current_txn_error_count = 0;
|
|
|
|
emit processPending();
|
|
|
|
},
|
|
|
|
Qt::QueuedConnection);
|
2020-07-18 18:43:49 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
EventStore::addPending(mtx::events::collections::TimelineEvents event)
|
|
|
|
{
|
|
|
|
if (this->thread() != QThread::currentThread())
|
|
|
|
nhlog::db()->warn("{} called from a different thread!", __func__);
|
|
|
|
|
|
|
|
cache::client()->savePendingMessage(this->room_id_, {event});
|
|
|
|
mtx::responses::Timeline events;
|
|
|
|
events.limited = false;
|
|
|
|
events.events.emplace_back(event);
|
|
|
|
handleSync(events);
|
|
|
|
|
|
|
|
emit processPending();
|
2020-07-10 00:15:22 +03:00
|
|
|
}
|
|
|
|
|
2020-08-10 00:36:47 +03:00
|
|
|
void
|
|
|
|
EventStore::clearTimeline()
|
|
|
|
{
|
|
|
|
emit beginResetModel();
|
|
|
|
|
|
|
|
cache::client()->clearTimeline(room_id_);
|
|
|
|
auto range = cache::client()->getTimelineRange(room_id_);
|
|
|
|
if (range) {
|
|
|
|
nhlog::db()->info("Range {} {}", range->last, range->first);
|
|
|
|
this->last = range->last;
|
|
|
|
this->first = range->first;
|
|
|
|
} else {
|
|
|
|
this->first = std::numeric_limits<uint64_t>::max();
|
|
|
|
this->last = std::numeric_limits<uint64_t>::max();
|
|
|
|
}
|
|
|
|
nhlog::ui()->info("Range {} {}", this->last, this->first);
|
|
|
|
|
|
|
|
emit endResetModel();
|
|
|
|
}
|
|
|
|
|
2020-07-10 00:15:22 +03:00
|
|
|
void
|
|
|
|
EventStore::handleSync(const mtx::responses::Timeline &events)
|
|
|
|
{
|
|
|
|
if (this->thread() != QThread::currentThread())
|
|
|
|
nhlog::db()->warn("{} called from a different thread!", __func__);
|
|
|
|
|
|
|
|
auto range = cache::client()->getTimelineRange(room_id_);
|
2020-07-13 01:08:58 +03:00
|
|
|
if (!range)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (events.limited) {
|
|
|
|
emit beginResetModel();
|
|
|
|
this->last = range->last;
|
|
|
|
this->first = range->first;
|
|
|
|
emit endResetModel();
|
2020-07-10 00:15:22 +03:00
|
|
|
|
2020-07-13 01:08:58 +03:00
|
|
|
} else if (range->last > this->last) {
|
2020-07-10 00:15:22 +03:00
|
|
|
emit beginInsertRows(toExternalIdx(this->last + 1), toExternalIdx(range->last));
|
|
|
|
this->last = range->last;
|
|
|
|
emit endInsertRows();
|
|
|
|
}
|
|
|
|
|
|
|
|
for (const auto &event : events.events) {
|
|
|
|
std::string relates_to;
|
|
|
|
if (auto redaction =
|
|
|
|
std::get_if<mtx::events::RedactionEvent<mtx::events::msg::Redaction>>(
|
|
|
|
&event)) {
|
2020-07-20 01:42:48 +03:00
|
|
|
// fixup reactions
|
|
|
|
auto redacted = events_by_id_.object({room_id_, redaction->redacts});
|
|
|
|
if (redacted) {
|
|
|
|
auto id = mtx::accessors::relates_to_event_id(*redacted);
|
|
|
|
if (!id.empty()) {
|
|
|
|
auto idx = idToIndex(id);
|
|
|
|
if (idx) {
|
|
|
|
events_by_id_.remove(
|
|
|
|
{room_id_, redaction->redacts});
|
2020-07-25 15:08:13 +03:00
|
|
|
events_.remove({room_id_, toInternalIdx(*idx)});
|
2020-07-20 01:42:48 +03:00
|
|
|
emit dataChanged(*idx, *idx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-10 00:15:22 +03:00
|
|
|
relates_to = redaction->redacts;
|
|
|
|
} else if (auto reaction =
|
|
|
|
std::get_if<mtx::events::RoomEvent<mtx::events::msg::Reaction>>(
|
|
|
|
&event)) {
|
|
|
|
relates_to = reaction->content.relates_to.event_id;
|
|
|
|
} else {
|
|
|
|
relates_to = mtx::accessors::in_reply_to_event(event);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!relates_to.empty()) {
|
|
|
|
auto idx = cache::client()->getTimelineIndex(room_id_, relates_to);
|
2020-07-25 15:08:13 +03:00
|
|
|
if (idx) {
|
|
|
|
events_by_id_.remove({room_id_, relates_to});
|
|
|
|
decryptedEvents_.remove({room_id_, relates_to});
|
|
|
|
events_.remove({room_id_, *idx});
|
2020-07-10 00:15:22 +03:00
|
|
|
emit dataChanged(toExternalIdx(*idx), toExternalIdx(*idx));
|
2020-07-25 15:08:13 +03:00
|
|
|
}
|
2020-07-10 00:15:22 +03:00
|
|
|
}
|
2020-07-18 18:43:49 +03:00
|
|
|
|
|
|
|
if (auto txn_id = mtx::accessors::transaction_id(event); !txn_id.empty()) {
|
|
|
|
auto idx = cache::client()->getTimelineIndex(
|
|
|
|
room_id_, mtx::accessors::event_id(event));
|
|
|
|
if (idx) {
|
|
|
|
Index index{room_id_, *idx};
|
|
|
|
events_.remove(index);
|
|
|
|
emit dataChanged(toExternalIdx(*idx), toExternalIdx(*idx));
|
|
|
|
}
|
|
|
|
}
|
2020-08-09 06:05:15 +03:00
|
|
|
|
2020-09-08 18:09:31 +03:00
|
|
|
handle_room_verification(event);
|
|
|
|
|
2020-08-09 06:05:15 +03:00
|
|
|
// decrypting and checking some encrypted messages
|
|
|
|
if (auto encrypted =
|
|
|
|
std::get_if<mtx::events::EncryptedEvent<mtx::events::msg::Encrypted>>(
|
|
|
|
&event)) {
|
2020-09-08 18:09:31 +03:00
|
|
|
mtx::events::collections::TimelineEvents *d_event =
|
|
|
|
decryptEvent({room_id_, encrypted->event_id}, *encrypted);
|
2020-08-09 06:05:15 +03:00
|
|
|
if (std::visit(
|
|
|
|
[](auto e) { return (e.sender != utils::localUser().toStdString()); },
|
2020-09-04 09:32:24 +03:00
|
|
|
*d_event)) {
|
2020-09-08 18:09:31 +03:00
|
|
|
handle_room_verification(*d_event);
|
2020-09-04 09:32:24 +03:00
|
|
|
} else {
|
|
|
|
// only the key.verification.ready sent by localuser's other device
|
|
|
|
// is of significance as it is used for detecting accepted request
|
|
|
|
if (std::get_if<mtx::events::RoomEvent<
|
|
|
|
mtx::events::msg::KeyVerificationReady>>(d_event)) {
|
|
|
|
auto msg = std::get_if<mtx::events::RoomEvent<
|
|
|
|
mtx::events::msg::KeyVerificationReady>>(d_event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationReady(
|
|
|
|
msg->content);
|
2020-08-09 06:05:15 +03:00
|
|
|
}
|
2020-08-29 11:07:51 +03:00
|
|
|
}
|
2020-08-09 06:05:15 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (last_verification_request_event.has_value()) {
|
|
|
|
if (last_verification_request_event.value().origin_server_ts >
|
|
|
|
last_verification_cancel_event.origin_server_ts) {
|
|
|
|
emit startDMVerification(last_verification_request_event.value());
|
|
|
|
last_verification_request_event = {};
|
|
|
|
}
|
2020-07-10 00:15:22 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-08 18:09:31 +03:00
|
|
|
void
|
|
|
|
EventStore::handle_room_verification(mtx::events::collections::TimelineEvents event)
|
|
|
|
{
|
|
|
|
if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationRequest>>(&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationRequest>>(event);
|
|
|
|
last_verification_request_event = msg;
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationCancel>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationCancel>>(event);
|
|
|
|
last_verification_cancel_event = msg;
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationCancel(msg.content);
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationAccept>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationAccept>>(event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationAccept(msg.content);
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationKey>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationKey>>(event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationKey(msg.content);
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationMac>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationMac>>(event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationMac(msg.content);
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationReady>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationReady>>(event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationReady(msg.content);
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationDone>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationDone>>(event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationDone(msg.content);
|
|
|
|
return;
|
|
|
|
} else if (std::get_if<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationStart>>(
|
|
|
|
&event)) {
|
|
|
|
auto msg =
|
|
|
|
std::get<mtx::events::RoomEvent<mtx::events::msg::KeyVerificationStart>>(event);
|
|
|
|
ChatPage::instance()->recievedDeviceVerificationStart(msg.content, msg.sender);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-19 13:22:54 +03:00
|
|
|
QVariantList
|
|
|
|
EventStore::reactions(const std::string &event_id)
|
|
|
|
{
|
|
|
|
auto event_ids = cache::client()->relatedEvents(room_id_, event_id);
|
|
|
|
|
|
|
|
struct TempReaction
|
|
|
|
{
|
|
|
|
int count = 0;
|
|
|
|
std::vector<std::string> users;
|
|
|
|
std::string reactedBySelf;
|
|
|
|
};
|
|
|
|
std::map<std::string, TempReaction> aggregation;
|
|
|
|
std::vector<Reaction> reactions;
|
|
|
|
|
|
|
|
auto self = http::client()->user_id().to_string();
|
|
|
|
for (const auto &id : event_ids) {
|
2020-07-26 13:33:30 +03:00
|
|
|
auto related_event = get(id, event_id);
|
2020-07-19 13:22:54 +03:00
|
|
|
if (!related_event)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (auto reaction = std::get_if<mtx::events::RoomEvent<mtx::events::msg::Reaction>>(
|
|
|
|
related_event)) {
|
2020-08-18 08:59:02 +03:00
|
|
|
auto &agg = aggregation[reaction->content.relates_to.key.value()];
|
2020-07-19 13:22:54 +03:00
|
|
|
|
|
|
|
if (agg.count == 0) {
|
|
|
|
Reaction temp{};
|
|
|
|
temp.key_ =
|
2020-08-18 08:59:02 +03:00
|
|
|
QString::fromStdString(reaction->content.relates_to.key.value());
|
2020-07-19 13:22:54 +03:00
|
|
|
reactions.push_back(temp);
|
|
|
|
}
|
|
|
|
|
|
|
|
agg.count++;
|
|
|
|
agg.users.push_back(cache::displayName(room_id_, reaction->sender));
|
|
|
|
if (reaction->sender == self)
|
|
|
|
agg.reactedBySelf = reaction->event_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
QVariantList temp;
|
|
|
|
for (auto &reaction : reactions) {
|
|
|
|
const auto &agg = aggregation[reaction.key_.toStdString()];
|
|
|
|
reaction.count_ = agg.count;
|
|
|
|
reaction.selfReactedEvent_ = QString::fromStdString(agg.reactedBySelf);
|
|
|
|
|
2020-07-26 14:07:36 +03:00
|
|
|
bool firstReaction = true;
|
2020-07-19 13:22:54 +03:00
|
|
|
for (const auto &user : agg.users) {
|
2020-07-26 14:07:36 +03:00
|
|
|
if (firstReaction)
|
|
|
|
firstReaction = false;
|
2020-07-19 13:22:54 +03:00
|
|
|
else
|
|
|
|
reaction.users_ += ", ";
|
|
|
|
|
|
|
|
reaction.users_ += QString::fromStdString(user);
|
|
|
|
}
|
|
|
|
|
|
|
|
nhlog::db()->debug("key: {}, count: {}, users: {}",
|
|
|
|
reaction.key_.toStdString(),
|
|
|
|
reaction.count_,
|
|
|
|
reaction.users_.toStdString());
|
|
|
|
temp.append(QVariant::fromValue(reaction));
|
|
|
|
}
|
|
|
|
|
|
|
|
return temp;
|
|
|
|
}
|
|
|
|
|
2020-07-10 00:15:22 +03:00
|
|
|
mtx::events::collections::TimelineEvents *
|
2020-07-26 13:33:30 +03:00
|
|
|
EventStore::get(int idx, bool decrypt)
|
2020-07-10 00:15:22 +03:00
|
|
|
{
|
|
|
|
if (this->thread() != QThread::currentThread())
|
|
|
|
nhlog::db()->warn("{} called from a different thread!", __func__);
|
|
|
|
|
|
|
|
Index index{room_id_, toInternalIdx(idx)};
|
|
|
|
if (index.idx > last || index.idx < first)
|
|
|
|
return nullptr;
|
|
|
|
|
|
|
|
auto event_ptr = events_.object(index);
|
|
|
|
if (!event_ptr) {
|
|
|
|
auto event_id = cache::client()->getTimelineEventId(room_id_, index.idx);
|
|
|
|
if (!event_id)
|
|
|
|
return nullptr;
|
|
|
|
|
|
|
|
auto event = cache::client()->getEvent(room_id_, *event_id);
|
|
|
|
if (!event)
|
|
|
|
return nullptr;
|
|
|
|
else
|
|
|
|
event_ptr =
|
|
|
|
new mtx::events::collections::TimelineEvents(std::move(event->data));
|
|
|
|
events_.insert(index, event_ptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (decrypt)
|
|
|
|
if (auto encrypted =
|
|
|
|
std::get_if<mtx::events::EncryptedEvent<mtx::events::msg::Encrypted>>(
|
|
|
|
event_ptr))
|
|
|
|
return decryptEvent({room_id_, encrypted->event_id}, *encrypted);
|
|
|
|
|
|
|
|
return event_ptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::optional<int>
|
|
|
|
EventStore::idToIndex(std::string_view id) const
|
|
|
|
{
|
|
|
|
if (this->thread() != QThread::currentThread())
|
|
|
|
nhlog::db()->warn("{} called from a different thread!", __func__);
|
|
|
|
|
|
|
|
auto idx = cache::client()->getTimelineIndex(room_id_, id);
|
|
|
|
if (idx)
|
|
|
|
return toExternalIdx(*idx);
|
|
|
|
else
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
std::optional<std::string>
|
|
|
|
EventStore::indexToId(int idx) const
|
|
|
|
{
|
|
|
|
if (this->thread() != QThread::currentThread())
|
|
|
|
nhlog::db()->warn("{} called from a different thread!", __func__);
|
|
|
|
|
|
|
|
return cache::client()->getTimelineEventId(room_id_, toInternalIdx(idx));
|
|
|
|
}
|
|
|
|
|
|
|
|
mtx::events::collections::TimelineEvents *
|
|
|
|
EventStore::decryptEvent(const IdIndex &idx,
|
|
|
|
const mtx::events::EncryptedEvent<mtx::events::msg::Encrypted> &e)
|
|
|
|
{
|
|
|
|
if (auto cachedEvent = decryptedEvents_.object(idx))
|
|
|
|
return cachedEvent;
|
|
|
|
|
|
|
|
MegolmSessionIndex index;
|
|
|
|
index.room_id = room_id_;
|
|
|
|
index.session_id = e.content.session_id;
|
|
|
|
index.sender_key = e.content.sender_key;
|
|
|
|
|
|
|
|
auto asCacheEntry = [&idx](mtx::events::collections::TimelineEvents &&event) {
|
|
|
|
auto event_ptr = new mtx::events::collections::TimelineEvents(std::move(event));
|
|
|
|
decryptedEvents_.insert(idx, event_ptr);
|
|
|
|
return event_ptr;
|
|
|
|
};
|
|
|
|
|
2020-08-06 22:46:16 +03:00
|
|
|
auto decryptionResult = olm::decryptEvent(index, e);
|
|
|
|
|
2020-08-30 19:57:14 +03:00
|
|
|
mtx::events::RoomEvent<mtx::events::msg::Notice> dummy;
|
|
|
|
dummy.origin_server_ts = e.origin_server_ts;
|
|
|
|
dummy.event_id = e.event_id;
|
|
|
|
dummy.sender = e.sender;
|
|
|
|
|
2020-08-06 22:46:16 +03:00
|
|
|
if (decryptionResult.error) {
|
|
|
|
switch (*decryptionResult.error) {
|
|
|
|
case olm::DecryptionErrorCode::MissingSession:
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Encrypted Event (No keys found for decryption) --",
|
|
|
|
"Placeholder, when the message was not decrypted yet or can't be "
|
|
|
|
"decrypted.")
|
|
|
|
.toStdString();
|
2020-07-10 00:15:22 +03:00
|
|
|
nhlog::crypto()->info("Could not find inbound megolm session ({}, {}, {})",
|
|
|
|
index.room_id,
|
|
|
|
index.session_id,
|
|
|
|
e.sender);
|
2020-08-06 22:46:16 +03:00
|
|
|
// TODO: Check if this actually works and look in key backup
|
|
|
|
olm::send_key_request_for(room_id_, e);
|
|
|
|
break;
|
|
|
|
case olm::DecryptionErrorCode::DbError:
|
|
|
|
nhlog::db()->critical(
|
|
|
|
"failed to retrieve megolm session with index ({}, {}, {})",
|
|
|
|
index.room_id,
|
|
|
|
index.session_id,
|
|
|
|
index.sender_key,
|
|
|
|
decryptionResult.error_message.value_or(""));
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Decryption Error (failed to retrieve megolm keys from db) --",
|
|
|
|
"Placeholder, when the message can't be decrypted, because the DB "
|
|
|
|
"access "
|
|
|
|
"failed.")
|
|
|
|
.toStdString();
|
|
|
|
break;
|
|
|
|
case olm::DecryptionErrorCode::DecryptionFailed:
|
|
|
|
nhlog::crypto()->critical(
|
|
|
|
"failed to decrypt message with index ({}, {}, {}): {}",
|
|
|
|
index.room_id,
|
|
|
|
index.session_id,
|
|
|
|
index.sender_key,
|
|
|
|
decryptionResult.error_message.value_or(""));
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Decryption Error (%1) --",
|
|
|
|
"Placeholder, when the message can't be decrypted. In this case, the "
|
|
|
|
"Olm "
|
|
|
|
"decrytion returned an error, which is passed as %1.")
|
|
|
|
.arg(
|
|
|
|
QString::fromStdString(decryptionResult.error_message.value_or("")))
|
|
|
|
.toStdString();
|
|
|
|
break;
|
|
|
|
case olm::DecryptionErrorCode::ParsingFailed:
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Encrypted Event (Unknown event type) --",
|
|
|
|
"Placeholder, when the message was decrypted, but we couldn't parse "
|
|
|
|
"it, because "
|
|
|
|
"Nheko/mtxclient don't support that event type yet.")
|
|
|
|
.toStdString();
|
|
|
|
break;
|
|
|
|
case olm::DecryptionErrorCode::ReplayAttack:
|
|
|
|
nhlog::crypto()->critical(
|
|
|
|
"Reply attack while decryptiong event {} in room {} from {}!",
|
|
|
|
e.event_id,
|
|
|
|
room_id_,
|
|
|
|
index.sender_key);
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Reply attack! This message index was reused! --").toStdString();
|
|
|
|
break;
|
|
|
|
case olm::DecryptionErrorCode::UnknownFingerprint:
|
|
|
|
// TODO: don't fail, just show in UI.
|
|
|
|
nhlog::crypto()->critical("Message by unverified fingerprint {}",
|
|
|
|
index.sender_key);
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Message by unverified device! --").toStdString();
|
|
|
|
break;
|
2020-07-10 00:15:22 +03:00
|
|
|
}
|
|
|
|
return asCacheEntry(std::move(dummy));
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string msg_str;
|
|
|
|
try {
|
|
|
|
auto session = cache::client()->getInboundMegolmSession(index);
|
|
|
|
auto res = olm::client()->decrypt_group_message(session, e.content.ciphertext);
|
|
|
|
msg_str = std::string((char *)res.data.data(), res.data.size());
|
|
|
|
} catch (const lmdb::error &e) {
|
|
|
|
nhlog::db()->critical("failed to retrieve megolm session with index ({}, {}, {})",
|
|
|
|
index.room_id,
|
|
|
|
index.session_id,
|
|
|
|
index.sender_key,
|
|
|
|
e.what());
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Decryption Error (failed to retrieve megolm keys from db) --",
|
2020-08-09 06:05:15 +03:00
|
|
|
"Placeholder, when the message can't be decrypted, because the DB "
|
|
|
|
"access "
|
2020-07-10 00:15:22 +03:00
|
|
|
"failed.")
|
|
|
|
.toStdString();
|
|
|
|
return asCacheEntry(std::move(dummy));
|
|
|
|
} catch (const mtx::crypto::olm_exception &e) {
|
|
|
|
nhlog::crypto()->critical("failed to decrypt message with index ({}, {}, {}): {}",
|
|
|
|
index.room_id,
|
|
|
|
index.session_id,
|
|
|
|
index.sender_key,
|
|
|
|
e.what());
|
|
|
|
dummy.content.body =
|
|
|
|
tr("-- Decryption Error (%1) --",
|
2020-08-09 06:05:15 +03:00
|
|
|
"Placeholder, when the message can't be decrypted. In this case, the "
|
|
|
|
"Olm "
|
2020-07-10 00:15:22 +03:00
|
|
|
"decrytion returned an error, which is passed as %1.")
|
|
|
|
.arg(e.what())
|
|
|
|
.toStdString();
|
|
|
|
return asCacheEntry(std::move(dummy));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add missing fields for the event.
|
|
|
|
json body = json::parse(msg_str);
|
|
|
|
body["event_id"] = e.event_id;
|
|
|
|
body["sender"] = e.sender;
|
|
|
|
body["origin_server_ts"] = e.origin_server_ts;
|
|
|
|
body["unsigned"] = e.unsigned_data;
|
|
|
|
|
|
|
|
// relations are unencrypted in content...
|
|
|
|
if (json old_ev = e; old_ev["content"].count("m.relates_to") != 0)
|
|
|
|
body["content"]["m.relates_to"] = old_ev["content"]["m.relates_to"];
|
|
|
|
|
|
|
|
json event_array = json::array();
|
|
|
|
event_array.push_back(body);
|
|
|
|
|
|
|
|
std::vector<mtx::events::collections::TimelineEvents> temp_events;
|
|
|
|
mtx::responses::utils::parse_timeline_events(event_array, temp_events);
|
|
|
|
|
|
|
|
if (temp_events.size() == 1) {
|
|
|
|
auto encInfo = mtx::accessors::file(temp_events[0]);
|
|
|
|
|
|
|
|
if (encInfo)
|
|
|
|
emit newEncryptedImage(encInfo.value());
|
|
|
|
|
|
|
|
return asCacheEntry(std::move(temp_events[0]));
|
|
|
|
}
|
|
|
|
|
2020-08-06 22:46:16 +03:00
|
|
|
auto encInfo = mtx::accessors::file(decryptionResult.event.value());
|
|
|
|
if (encInfo)
|
|
|
|
emit newEncryptedImage(encInfo.value());
|
2020-07-10 00:15:22 +03:00
|
|
|
|
2020-08-06 22:46:16 +03:00
|
|
|
return asCacheEntry(std::move(decryptionResult.event.value()));
|
2020-07-10 00:15:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
mtx::events::collections::TimelineEvents *
|
2020-07-26 13:33:30 +03:00
|
|
|
EventStore::get(std::string_view id, std::string_view related_to, bool decrypt)
|
2020-07-10 00:15:22 +03:00
|
|
|
{
|
|
|
|
if (this->thread() != QThread::currentThread())
|
|
|
|
nhlog::db()->warn("{} called from a different thread!", __func__);
|
|
|
|
|
|
|
|
if (id.empty())
|
|
|
|
return nullptr;
|
|
|
|
|
|
|
|
IdIndex index{room_id_, std::string(id.data(), id.size())};
|
|
|
|
|
|
|
|
auto event_ptr = events_by_id_.object(index);
|
|
|
|
if (!event_ptr) {
|
|
|
|
auto event = cache::client()->getEvent(room_id_, index.id);
|
|
|
|
if (!event) {
|
2020-07-10 02:37:55 +03:00
|
|
|
http::client()->get_event(
|
|
|
|
room_id_,
|
|
|
|
index.id,
|
|
|
|
[this,
|
|
|
|
relatedTo = std::string(related_to.data(), related_to.size()),
|
|
|
|
id = index.id](const mtx::events::collections::TimelineEvents &timeline,
|
|
|
|
mtx::http::RequestErr err) {
|
|
|
|
if (err) {
|
|
|
|
nhlog::net()->error(
|
2020-08-09 06:05:15 +03:00
|
|
|
"Failed to retrieve event with id {}, which "
|
|
|
|
"was "
|
2020-07-10 02:37:55 +03:00
|
|
|
"requested to show the replyTo for event {}",
|
|
|
|
relatedTo,
|
|
|
|
id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
emit eventFetched(id, relatedTo, timeline);
|
|
|
|
});
|
2020-07-10 00:15:22 +03:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
event_ptr = new mtx::events::collections::TimelineEvents(std::move(event->data));
|
|
|
|
events_by_id_.insert(index, event_ptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (decrypt)
|
|
|
|
if (auto encrypted =
|
|
|
|
std::get_if<mtx::events::EncryptedEvent<mtx::events::msg::Encrypted>>(
|
|
|
|
event_ptr))
|
|
|
|
return decryptEvent(index, *encrypted);
|
|
|
|
|
|
|
|
return event_ptr;
|
|
|
|
}
|
2020-07-13 01:08:58 +03:00
|
|
|
|
|
|
|
void
|
|
|
|
EventStore::fetchMore()
|
|
|
|
{
|
|
|
|
mtx::http::MessagesOpts opts;
|
|
|
|
opts.room_id = room_id_;
|
|
|
|
opts.from = cache::client()->previousBatchToken(room_id_);
|
|
|
|
|
|
|
|
nhlog::ui()->debug("Paginating room {}, token {}", opts.room_id, opts.from);
|
|
|
|
|
|
|
|
http::client()->messages(
|
|
|
|
opts, [this, opts](const mtx::responses::Messages &res, mtx::http::RequestErr err) {
|
2020-08-07 14:12:45 +03:00
|
|
|
if (cache::client()->previousBatchToken(room_id_) != opts.from) {
|
|
|
|
nhlog::net()->warn("Cache cleared while fetching more messages, dropping "
|
|
|
|
"/messages response");
|
|
|
|
emit fetchedMore();
|
|
|
|
return;
|
|
|
|
}
|
2020-07-13 01:08:58 +03:00
|
|
|
if (err) {
|
|
|
|
nhlog::net()->error("failed to call /messages ({}): {} - {} - {}",
|
|
|
|
opts.room_id,
|
|
|
|
mtx::errors::to_string(err->matrix_error.errcode),
|
|
|
|
err->matrix_error.error,
|
|
|
|
err->parse_error);
|
2020-07-25 20:38:56 +03:00
|
|
|
emit fetchedMore();
|
2020-07-13 01:08:58 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
emit oldMessagesRetrieved(std::move(res));
|
|
|
|
});
|
|
|
|
}
|