mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-24 07:16:43 +00:00
1271 lines
43 KiB
C
1271 lines
43 KiB
C
/*
|
|
Serval DNA MeshMS
|
|
Copyright (C) 2013 Serval Project Inc.
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#define __MESHMS_INLINE
|
|
#include <assert.h>
|
|
#include "serval.h"
|
|
#include "rhizome_types.h"
|
|
#include "meshms.h"
|
|
#include "log.h"
|
|
#include "debug.h"
|
|
#include "conf.h"
|
|
#include "crypto.h"
|
|
#include "strbuf.h"
|
|
#include "keyring.h"
|
|
#include "dataformats.h"
|
|
#include "commandline.h"
|
|
|
|
#define MESHMS_BLOCK_TYPE_ACK 0x01
|
|
#define MESHMS_BLOCK_TYPE_MESSAGE 0x02 // NUL-terminated UTF8 string
|
|
#define MESHMS_BLOCK_TYPE_TIME 0x03 // local timestamp record
|
|
|
|
static unsigned mark_read(struct meshms_conversations *conv, const sid_t *their_sid, const uint64_t offset);
|
|
|
|
void meshms_free_conversations(struct meshms_conversations *conv)
|
|
{
|
|
while(conv){
|
|
struct meshms_conversations *n = conv;
|
|
conv = conv->_next;
|
|
free(n);
|
|
}
|
|
}
|
|
|
|
static enum meshms_status get_my_conversation_bundle(const sid_t *my_sidp, rhizome_manifest *m)
|
|
{
|
|
/* Find our private key */
|
|
keyring_iterator it;
|
|
keyring_iterator_start(keyring, &it);
|
|
|
|
if (!keyring_find_sid(&it, my_sidp))
|
|
return MESHMS_STATUS_SID_LOCKED;
|
|
|
|
strbuf sb = strbuf_alloca(1024);
|
|
strbuf_puts(sb, "incorrection");
|
|
strbuf_tohex(sb, crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES * 2, it.keypair->private_key);
|
|
strbuf_puts(sb, "concentrativeness");
|
|
assert(!strbuf_overrun(sb));
|
|
if (rhizome_get_bundle_from_seed(m, strbuf_str(sb)) == -1)
|
|
return MESHMS_STATUS_ERROR;
|
|
|
|
// always consider the content encrypted, we don't need to rely on the manifest itself.
|
|
rhizome_manifest_set_crypt(m, PAYLOAD_ENCRYPTED);
|
|
assert(m->haveSecret);
|
|
if (m->haveSecret == NEW_BUNDLE_ID) {
|
|
rhizome_manifest_set_service(m, RHIZOME_SERVICE_FILE);
|
|
rhizome_manifest_set_name(m, "");
|
|
if (rhizome_fill_manifest(m, NULL, my_sidp) != NULL)
|
|
return WHY("Invalid conversation manifest");
|
|
// The 'meshms' automated test depends on this message; do not alter.
|
|
DEBUGF(meshms, "MESHMS CONVERSATION BUNDLE bid=%s secret=%s",
|
|
alloca_tohex_rhizome_bid_t(m->cryptoSignPublic),
|
|
alloca_tohex(m->cryptoSignSecret, RHIZOME_BUNDLE_KEY_BYTES)
|
|
);
|
|
} else {
|
|
if (strcmp(m->service, RHIZOME_SERVICE_FILE) != 0) {
|
|
WARNF("Invalid conversations manifest, service=%s but should be %s", m->service, RHIZOME_SERVICE_FILE);
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
}
|
|
return MESHMS_STATUS_OK;
|
|
}
|
|
|
|
static struct meshms_conversations *add_conv(struct meshms_conversations **conv, const sid_t *them)
|
|
{
|
|
struct meshms_conversations **ptr = conv;
|
|
while (*ptr) {
|
|
int cmp = cmp_sid_t(&(*ptr)->them, them);
|
|
if (cmp == 0)
|
|
return *ptr;
|
|
ptr=&(*ptr)->_next;
|
|
}
|
|
struct meshms_conversations *n = emalloc_zero(sizeof(struct meshms_conversations));
|
|
if (n){
|
|
n->them = *them;
|
|
n->_next = *conv;
|
|
*conv = n;
|
|
}
|
|
return n;
|
|
}
|
|
|
|
// find matching conversations
|
|
// if their_sid == my_sid, return all conversations with any recipient
|
|
static enum meshms_status get_database_conversations(const sid_t *my_sid, const sid_t *their_sid, struct meshms_conversations **conv)
|
|
{
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare_bind(&retry,
|
|
"SELECT id, version, filesize, tail, sender, recipient"
|
|
" FROM manifests"
|
|
" WHERE service = ?3"
|
|
" AND (sender=?1 or recipient=?1)"
|
|
" AND (sender=?2 or recipient=?2)",
|
|
SID_T, my_sid,
|
|
SID_T, their_sid ? their_sid : my_sid,
|
|
STATIC_TEXT, RHIZOME_SERVICE_MESHMS2,
|
|
END
|
|
);
|
|
if (!statement)
|
|
return MESHMS_STATUS_ERROR;
|
|
DEBUGF(meshms, "Looking for conversations for %s, %s",
|
|
alloca_tohex_sid_t(*my_sid),
|
|
alloca_tohex_sid_t(*(their_sid ? their_sid : my_sid))
|
|
);
|
|
int r;
|
|
while ((r=sqlite_step_retry(&retry, statement)) == SQLITE_ROW) {
|
|
const char *id_hex = (const char *)sqlite3_column_text(statement, 0);
|
|
uint64_t version = sqlite3_column_int64(statement, 1);
|
|
int64_t size = sqlite3_column_int64(statement, 2);
|
|
int64_t tail = sqlite3_column_int64(statement, 3);
|
|
const char *sender = (const char *)sqlite3_column_text(statement, 4);
|
|
const char *recipient = (const char *)sqlite3_column_text(statement, 5);
|
|
DEBUGF(meshms, "found id %s, sender %s, recipient %s", id_hex, sender, recipient);
|
|
rhizome_bid_t bid;
|
|
if (str_to_rhizome_bid_t(&bid, id_hex) == -1) {
|
|
WHYF("invalid Bundle ID hex: %s -- skipping", alloca_str_toprint(id_hex));
|
|
continue;
|
|
}
|
|
const char *them = recipient;
|
|
sid_t their_sid;
|
|
if (str_to_sid_t(&their_sid, them) == -1) {
|
|
WHYF("invalid SID hex: %s -- skipping", alloca_str_toprint(them));
|
|
continue;
|
|
}
|
|
if (cmp_sid_t(&their_sid, my_sid) == 0) {
|
|
them = sender;
|
|
if (str_to_sid_t(&their_sid, them) == -1) {
|
|
WHYF("invalid SID hex: %s -- skipping", alloca_str_toprint(them));
|
|
continue;
|
|
}
|
|
}
|
|
struct meshms_conversations *ptr = add_conv(conv, &their_sid);
|
|
if (!ptr)
|
|
break;
|
|
struct meshms_ply *p;
|
|
if (them==sender){
|
|
ptr->found_their_ply=1;
|
|
p=&ptr->their_ply;
|
|
}else{
|
|
ptr->found_my_ply=1;
|
|
p=&ptr->my_ply;
|
|
}
|
|
p->bundle_id = bid;
|
|
p->version = version;
|
|
p->tail = tail;
|
|
p->size = size;
|
|
}
|
|
sqlite3_finalize(statement);
|
|
if (!sqlite_code_ok(r))
|
|
return MESHMS_STATUS_ERROR;
|
|
return MESHMS_STATUS_OK;
|
|
}
|
|
|
|
static enum meshms_status find_or_create_conv(const sid_t *my_sid, const sid_t *their_sid, struct meshms_conversations **conv)
|
|
{
|
|
enum meshms_status status;
|
|
if (meshms_failed(status = meshms_conversations_list(my_sid, their_sid, conv)))
|
|
return status;
|
|
if (*conv == NULL) {
|
|
if ((*conv = (struct meshms_conversations *) emalloc_zero(sizeof(struct meshms_conversations))) == NULL)
|
|
return MESHMS_STATUS_ERROR;
|
|
(*conv)->them = *their_sid;
|
|
status = MESHMS_STATUS_UPDATED;
|
|
}
|
|
return status;
|
|
}
|
|
|
|
static int create_ply(const sid_t *my_sid, struct meshms_conversations *conv, rhizome_manifest *m)
|
|
{
|
|
DEBUGF(meshms, "Creating ply for my_sid=%s them=%s",
|
|
alloca_tohex_sid_t(conv->them),
|
|
alloca_tohex_sid_t(*my_sid)
|
|
);
|
|
rhizome_manifest_set_service(m, RHIZOME_SERVICE_MESHMS2);
|
|
rhizome_manifest_set_sender(m, my_sid);
|
|
rhizome_manifest_set_recipient(m, &conv->them);
|
|
rhizome_manifest_set_filesize(m, 0);
|
|
rhizome_manifest_set_tail(m, 0);
|
|
if (rhizome_fill_manifest(m, NULL, my_sid) != NULL)
|
|
return -1;
|
|
assert(m->haveSecret);
|
|
assert(m->payloadEncryption == PAYLOAD_ENCRYPTED);
|
|
conv->my_ply.bundle_id = m->cryptoSignPublic;
|
|
conv->found_my_ply = 1;
|
|
return 0;
|
|
}
|
|
|
|
static size_t append_footer(unsigned char *buffer, char type, size_t message_len)
|
|
{
|
|
assert(message_len <= MESHMS_MESSAGE_MAX_LEN);
|
|
message_len = (message_len << 4) | (type&0xF);
|
|
write_uint16(buffer, message_len);
|
|
return 2;
|
|
}
|
|
|
|
// append a timestamp as a uint32_t with 1s precision
|
|
static size_t append_timestamp(uint8_t *buffer)
|
|
{
|
|
write_uint32(buffer, gettime());
|
|
size_t ofs=4;
|
|
return ofs+append_footer(buffer+ofs, MESHMS_BLOCK_TYPE_TIME, ofs);
|
|
}
|
|
|
|
static enum meshms_status ply_read_open(struct meshms_ply_read *ply, const rhizome_bid_t *bid, rhizome_manifest *m)
|
|
{
|
|
DEBUGF(meshms, "Opening ply %s", alloca_tohex_rhizome_bid_t(*bid));
|
|
switch (rhizome_retrieve_manifest(bid, m)) {
|
|
case RHIZOME_BUNDLE_STATUS_SAME:
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_NEW: // bundle not found
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
case RHIZOME_BUNDLE_STATUS_BUSY:
|
|
// TODO
|
|
default:
|
|
return MESHMS_STATUS_ERROR;
|
|
}
|
|
enum rhizome_payload_status pstatus = rhizome_open_decrypt_read(m, &ply->read);
|
|
DEBUGF(meshms, "pstatus=%d", pstatus);
|
|
if (pstatus == RHIZOME_PAYLOAD_STATUS_NEW) {
|
|
WARNF("Payload was not found for manifest %s, %"PRIu64, alloca_tohex_rhizome_bid_t(m->cryptoSignPublic), m->version);
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
if (pstatus == RHIZOME_PAYLOAD_STATUS_CRYPTO_FAIL)
|
|
return MESHMS_STATUS_SID_LOCKED;
|
|
if (pstatus != RHIZOME_PAYLOAD_STATUS_STORED && pstatus != RHIZOME_PAYLOAD_STATUS_EMPTY)
|
|
return MESHMS_STATUS_ERROR;
|
|
assert(m->filesize != RHIZOME_SIZE_UNSET);
|
|
ply->read.offset = ply->read.length = m->filesize;
|
|
return MESHMS_STATUS_OK;
|
|
}
|
|
|
|
static void ply_read_close(struct meshms_ply_read *ply)
|
|
{
|
|
if (ply->record){
|
|
free(ply->record);
|
|
ply->record=NULL;
|
|
}
|
|
ply->record_size=0;
|
|
ply->buff.len=0;
|
|
rhizome_read_close(&ply->read);
|
|
}
|
|
|
|
// read the next record from the ply (backwards)
|
|
// returns MESHMS_STATUS_UPDATED if the read advances to a new record, MESHMS_STATUS_OK if at the
|
|
// end of records
|
|
static enum meshms_status ply_read_prev(struct meshms_ply_read *ply)
|
|
{
|
|
ply->record_end_offset = ply->read.offset;
|
|
unsigned char footer[2];
|
|
if (ply->read.offset <= sizeof footer) {
|
|
DEBUG(meshms, "EOF");
|
|
return MESHMS_STATUS_OK;
|
|
}
|
|
ply->read.offset -= sizeof footer;
|
|
ssize_t read = rhizome_read_buffered(&ply->read, &ply->buff, footer, sizeof footer);
|
|
if (read == -1) {
|
|
WHYF("rhizome_read_buffered() failed");
|
|
return MESHMS_STATUS_ERROR;
|
|
}
|
|
if ((size_t) read != sizeof footer) {
|
|
WHYF("Expected %zu bytes read, got %zu", (size_t) sizeof footer, (size_t) read);
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
// (rhizome_read automatically advances the offset by the number of bytes read)
|
|
ply->record_length=read_uint16(footer);
|
|
ply->type = ply->record_length & 0xF;
|
|
ply->record_length = ply->record_length>>4;
|
|
DEBUGF(meshms, "Found record %d, length %d @%"PRId64, ply->type, ply->record_length, ply->record_end_offset);
|
|
// need to allow for advancing the tail and cutting a message in half.
|
|
if (ply->record_length + sizeof footer > ply->read.offset){
|
|
DEBUGF(meshms, "EOF");
|
|
return MESHMS_STATUS_OK;
|
|
}
|
|
ply->read.offset -= ply->record_length + sizeof(footer);
|
|
uint64_t record_start = ply->read.offset;
|
|
if (ply->record_size < ply->record_length){
|
|
ply->record_size = ply->record_length;
|
|
unsigned char *b = erealloc(ply->record, ply->record_size);
|
|
if (!b)
|
|
return MESHMS_STATUS_ERROR;
|
|
ply->record = b;
|
|
}
|
|
read = rhizome_read_buffered(&ply->read, &ply->buff, ply->record, ply->record_length);
|
|
if (read == -1) {
|
|
return WHYF("rhizome_read_buffered() failed");
|
|
return MESHMS_STATUS_ERROR;
|
|
}
|
|
if ((size_t) read != ply->record_length) {
|
|
WHYF("Expected %u bytes read, got %zu", ply->record_length, (size_t) read);
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
ply->read.offset = record_start;
|
|
return MESHMS_STATUS_UPDATED;
|
|
}
|
|
|
|
// keep reading past messages until you find this type.
|
|
static enum meshms_status ply_find_prev(struct meshms_ply_read *ply, char type)
|
|
{
|
|
enum meshms_status status;
|
|
while ((status = ply_read_prev(ply)) == MESHMS_STATUS_UPDATED && ply->type != type)
|
|
;
|
|
return status;
|
|
}
|
|
|
|
static enum meshms_status append_meshms_buffer(const sid_t *my_sid, struct meshms_conversations *conv, unsigned char *buffer, int len)
|
|
{
|
|
enum meshms_status status = MESHMS_STATUS_ERROR;
|
|
rhizome_manifest *mout = NULL;
|
|
rhizome_manifest *m = rhizome_new_manifest();
|
|
if (!m)
|
|
goto end;
|
|
if (conv->found_my_ply){
|
|
switch (rhizome_retrieve_manifest(&conv->my_ply.bundle_id, m)) {
|
|
case RHIZOME_BUNDLE_STATUS_SAME:
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_NEW: // bundle not found
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
goto end;
|
|
case RHIZOME_BUNDLE_STATUS_BUSY:
|
|
// TODO
|
|
default:
|
|
status = MESHMS_STATUS_ERROR;
|
|
goto end;
|
|
}
|
|
rhizome_authenticate_author(m);
|
|
if (!m->haveSecret || m->authorship != AUTHOR_AUTHENTIC) {
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
goto end;
|
|
}
|
|
} else if (create_ply(my_sid, conv, m) == -1) {
|
|
goto end;
|
|
}
|
|
assert(m->haveSecret);
|
|
assert(m->authorship == AUTHOR_AUTHENTIC);
|
|
enum rhizome_payload_status pstatus = rhizome_append_journal_buffer(m, 0, buffer, len);
|
|
if (pstatus != RHIZOME_PAYLOAD_STATUS_NEW)
|
|
goto end;
|
|
|
|
enum rhizome_bundle_status bstatus = rhizome_manifest_finalise(m, &mout, 1);
|
|
DEBUGF(meshms, "bstatus=%d", bstatus);
|
|
switch (bstatus) {
|
|
case RHIZOME_BUNDLE_STATUS_ERROR:
|
|
// error has already been logged
|
|
status = MESHMS_STATUS_ERROR;
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_NEW:
|
|
status = MESHMS_STATUS_UPDATED;
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_SAME:
|
|
case RHIZOME_BUNDLE_STATUS_DUPLICATE:
|
|
case RHIZOME_BUNDLE_STATUS_OLD:
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
WHYF("MeshMS ply manifest (version=%"PRIu64") gazumped by Rhizome store (version=%"PRIu64")",
|
|
m->version, mout->version);
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_INCONSISTENT:
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
WHYF("MeshMS ply manifest not consistent with payload");
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_FAKE:
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
WHYF("MeshMS ply manifest is not signed");
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_INVALID:
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
WHYF("MeshMS ply manifest is invalid");
|
|
break;
|
|
default:
|
|
FATALF("bstatus=%d", bstatus);
|
|
}
|
|
end:
|
|
if (mout && mout!=m)
|
|
rhizome_manifest_free(mout);
|
|
if (m)
|
|
rhizome_manifest_free(m);
|
|
return status;
|
|
}
|
|
|
|
// update if any conversations are unread or need to be acked.
|
|
// return MESHMS_STATUS_UPDATED if the conversation index needs to be saved.
|
|
static enum meshms_status update_conversation(const sid_t *my_sid, struct meshms_conversations *conv)
|
|
{
|
|
DEBUG(meshms, "Checking if conversation needs to be acked");
|
|
|
|
// Nothing to be done if they have never sent us anything
|
|
if (!conv->found_their_ply)
|
|
return MESHMS_STATUS_OK;
|
|
|
|
rhizome_manifest *m_ours = NULL;
|
|
rhizome_manifest *m_theirs = rhizome_new_manifest();
|
|
if (!m_theirs)
|
|
return MESHMS_STATUS_ERROR;
|
|
|
|
struct meshms_ply_read ply;
|
|
bzero(&ply, sizeof(ply));
|
|
enum meshms_status status = MESHMS_STATUS_ERROR;
|
|
DEBUG(meshms, "Locating their last message");
|
|
if (meshms_failed(status = ply_read_open(&ply, &conv->their_ply.bundle_id, m_theirs)))
|
|
goto end;
|
|
if (meshms_failed(status = ply_find_prev(&ply, MESHMS_BLOCK_TYPE_MESSAGE)))
|
|
goto end;
|
|
if (conv->their_last_message == ply.record_end_offset){
|
|
// nothing has changed since last time
|
|
status = MESHMS_STATUS_OK;
|
|
goto end;
|
|
}
|
|
|
|
conv->their_last_message = ply.record_end_offset;
|
|
DEBUGF(meshms, "Found last message @%"PRId64, conv->their_last_message);
|
|
ply_read_close(&ply);
|
|
|
|
// find our previous ack
|
|
uint64_t previous_ack = 0;
|
|
|
|
if (conv->found_my_ply){
|
|
DEBUG(meshms, "Locating our previous ack");
|
|
|
|
m_ours = rhizome_new_manifest();
|
|
if (!m_ours) {
|
|
status = MESHMS_STATUS_ERROR;
|
|
goto end;
|
|
}
|
|
if (meshms_failed(status = ply_read_open(&ply, &conv->my_ply.bundle_id, m_ours)))
|
|
goto end;
|
|
if (meshms_failed(status = ply_find_prev(&ply, MESHMS_BLOCK_TYPE_ACK)))
|
|
goto end;
|
|
if (status == MESHMS_STATUS_UPDATED) {
|
|
if (unpack_uint(ply.record, ply.record_length, &previous_ack) == -1)
|
|
previous_ack=0;
|
|
status = MESHMS_STATUS_OK;
|
|
}
|
|
DEBUGF(meshms, "Previous ack is %"PRId64, previous_ack);
|
|
ply_read_close(&ply);
|
|
}else{
|
|
DEBUGF(meshms, "No outgoing ply");
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
if (previous_ack >= conv->their_last_message){
|
|
// their last message has already been acked
|
|
status = MESHMS_STATUS_UPDATED;
|
|
goto end;
|
|
}
|
|
|
|
// append an ack for their message
|
|
DEBUGF(meshms, "Creating ACK for %"PRId64" - %"PRId64, previous_ack, conv->their_last_message);
|
|
unsigned char buffer[30];
|
|
int ofs=0;
|
|
ofs+=pack_uint(&buffer[ofs], conv->their_last_message);
|
|
if (previous_ack)
|
|
ofs+=pack_uint(&buffer[ofs], conv->their_last_message - previous_ack);
|
|
ofs+=append_footer(buffer+ofs, MESHMS_BLOCK_TYPE_ACK, ofs);
|
|
ofs+=append_timestamp(buffer+ofs);
|
|
status = append_meshms_buffer(my_sid, conv, buffer, ofs);
|
|
DEBUGF(meshms, "status=%d", status);
|
|
end:
|
|
ply_read_close(&ply);
|
|
if (m_ours)
|
|
rhizome_manifest_free(m_ours);
|
|
if (m_theirs)
|
|
rhizome_manifest_free(m_theirs);
|
|
// if it's all good, remember the size of their ply at the time we examined it.
|
|
if (!meshms_failed(status))
|
|
conv->their_size = conv->their_ply.size;
|
|
return status;
|
|
}
|
|
|
|
// update conversations, and return MESHMS_STATUS_UPDATED if the conversation index should be saved
|
|
static enum meshms_status update_conversations(const sid_t *my_sid, struct meshms_conversations **conv)
|
|
{
|
|
enum meshms_status rstatus = MESHMS_STATUS_OK;
|
|
struct meshms_conversations **ptr = conv;
|
|
while (*ptr) {
|
|
struct meshms_conversations *n = *ptr;
|
|
if (n->their_size != n->their_ply.size) {
|
|
enum meshms_status status;
|
|
if (meshms_failed(status = update_conversation(my_sid, n)))
|
|
return status;
|
|
if (status == MESHMS_STATUS_UPDATED){
|
|
rstatus = MESHMS_STATUS_UPDATED;
|
|
DEBUGF(meshms, "Bumping conversation from %s", alloca_tohex_sid_t(n->them));
|
|
// bump to head of list
|
|
*ptr = n->_next;
|
|
n->_next = *conv;
|
|
*conv = n;
|
|
continue;
|
|
}
|
|
}
|
|
ptr = &(*ptr)->_next;
|
|
}
|
|
return rstatus;
|
|
}
|
|
|
|
// read our cached conversation list from our rhizome payload
|
|
// if we can't load the existing data correctly, just ignore it.
|
|
static enum meshms_status read_known_conversations(rhizome_manifest *m, const sid_t *their_sid, struct meshms_conversations **conv)
|
|
{
|
|
if (m->haveSecret==NEW_BUNDLE_ID)
|
|
return MESHMS_STATUS_OK;
|
|
|
|
struct meshms_conversations **ptr = conv;
|
|
struct rhizome_read read;
|
|
bzero(&read, sizeof(read));
|
|
struct rhizome_read_buffer buff;
|
|
bzero(&buff, sizeof(buff));
|
|
|
|
enum meshms_status status = MESHMS_STATUS_ERROR;
|
|
enum rhizome_payload_status pstatus = rhizome_open_decrypt_read(m, &read);
|
|
if (pstatus == RHIZOME_PAYLOAD_STATUS_NEW) {
|
|
WARNF("Payload was not found for manifest %s, %"PRIu64, alloca_tohex_rhizome_bid_t(m->cryptoSignPublic), m->version);
|
|
goto fault;
|
|
}
|
|
if (pstatus != RHIZOME_PAYLOAD_STATUS_STORED && pstatus != RHIZOME_PAYLOAD_STATUS_EMPTY)
|
|
goto end;
|
|
|
|
unsigned char version=0xFF;
|
|
ssize_t r = rhizome_read_buffered(&read, &buff, &version, 1);
|
|
if (r == -1)
|
|
goto end;
|
|
if (version != 1) {
|
|
WARNF("Expected version 1 (got 0x%02x)", version);
|
|
goto fault;
|
|
}
|
|
|
|
while (1) {
|
|
sid_t sid;
|
|
r = rhizome_read_buffered(&read, &buff, sid.binary, sizeof sid.binary);
|
|
if (r == 0) {
|
|
status = MESHMS_STATUS_OK;
|
|
goto end;
|
|
}
|
|
if (r != sizeof sid.binary)
|
|
break;
|
|
DEBUGF(meshms, "Reading existing conversation for %s", alloca_tohex_sid_t(sid));
|
|
|
|
// unpack the stored details first so we know where the next record is
|
|
unsigned char details[12*3];
|
|
r = rhizome_read_buffered(&read, &buff, details, sizeof details);
|
|
if (r == -1)
|
|
break;
|
|
int bytes = r;
|
|
|
|
uint64_t last_message=0;
|
|
uint64_t read_offset=0;
|
|
uint64_t their_size=0;
|
|
|
|
int ofs = 0;
|
|
int unpacked = unpack_uint(details, bytes, &last_message);
|
|
if (unpacked == -1)
|
|
break;
|
|
ofs += unpacked;
|
|
unpacked = unpack_uint(details+ofs, bytes-ofs, &read_offset);
|
|
if (unpacked == -1)
|
|
break;
|
|
ofs += unpacked;
|
|
unpacked = unpack_uint(details+ofs, bytes-ofs, &their_size);
|
|
if (unpacked == -1)
|
|
break;
|
|
ofs += unpacked;
|
|
read.offset += ofs - bytes;
|
|
|
|
// skip uninteresting records
|
|
if (their_sid && cmp_sid_t(&sid, their_sid) != 0)
|
|
continue;
|
|
|
|
struct meshms_conversations *n = emalloc_zero(sizeof(struct meshms_conversations));
|
|
if (!n)
|
|
goto end;
|
|
|
|
*ptr = n;
|
|
ptr = &n->_next;
|
|
|
|
n->them = sid;
|
|
n->their_last_message = last_message;
|
|
n->read_offset = read_offset;
|
|
n->their_size = their_size;
|
|
}
|
|
fault:
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
end:
|
|
rhizome_read_close(&read);
|
|
return status;
|
|
}
|
|
|
|
static ssize_t write_conversation(struct rhizome_write *write, struct meshms_conversations *conv)
|
|
{
|
|
size_t len=0;
|
|
unsigned char buffer[sizeof(conv->them) + (8*3)];
|
|
if (write)
|
|
bcopy(conv->them.binary, buffer, sizeof(conv->them));
|
|
len+=sizeof(conv->them);
|
|
if (write){
|
|
len+=pack_uint(&buffer[len], conv->their_last_message);
|
|
len+=pack_uint(&buffer[len], conv->read_offset);
|
|
len+=pack_uint(&buffer[len], conv->their_size);
|
|
int ret=rhizome_write_buffer(write, buffer, len);
|
|
if (ret == -1)
|
|
return ret;
|
|
}else{
|
|
len+=measure_packed_uint(conv->their_last_message);
|
|
len+=measure_packed_uint(conv->read_offset);
|
|
len+=measure_packed_uint(conv->their_size);
|
|
}
|
|
DEBUGF(meshms, "len %s, %"PRId64", %"PRId64", %"PRId64" = %zu",
|
|
alloca_tohex_sid_t(conv->them),
|
|
conv->their_last_message,
|
|
conv->read_offset,
|
|
conv->their_size,
|
|
len
|
|
);
|
|
return len;
|
|
}
|
|
|
|
static ssize_t write_conversations(struct rhizome_write *write, struct meshms_conversations *conv)
|
|
{
|
|
ssize_t len=0;
|
|
while(conv){
|
|
ssize_t this_len = write_conversation(write, conv);
|
|
if (this_len==-1)
|
|
return this_len;
|
|
len+=this_len;
|
|
conv = conv->_next;
|
|
}
|
|
return len;
|
|
}
|
|
|
|
static enum meshms_status write_known_conversations(rhizome_manifest *m, struct meshms_conversations *conv)
|
|
{
|
|
rhizome_manifest *mout=NULL;
|
|
|
|
struct rhizome_write write;
|
|
bzero(&write, sizeof(write));
|
|
enum meshms_status status = MESHMS_STATUS_ERROR;
|
|
|
|
// TODO rebalance tree...
|
|
|
|
// measure the final payload first
|
|
ssize_t len=write_conversations(NULL, conv);
|
|
if (len == -1)
|
|
goto end;
|
|
|
|
// then write it
|
|
rhizome_manifest_set_version(m, m->version + 1);
|
|
rhizome_manifest_set_filesize(m, (size_t)len + 1);
|
|
rhizome_manifest_set_filehash(m, NULL);
|
|
|
|
enum rhizome_payload_status pstatus = rhizome_write_open_manifest(&write, m);
|
|
if (pstatus!=RHIZOME_PAYLOAD_STATUS_NEW)
|
|
// TODO log something?
|
|
goto end;
|
|
|
|
unsigned char version=1;
|
|
if (rhizome_write_buffer(&write, &version, 1) == -1)
|
|
goto end;
|
|
if (write_conversations(&write, conv) == -1)
|
|
goto end;
|
|
pstatus = rhizome_finish_write(&write);
|
|
if (pstatus != RHIZOME_PAYLOAD_STATUS_NEW)
|
|
goto end;
|
|
rhizome_manifest_set_filehash(m, &write.id);
|
|
|
|
enum rhizome_bundle_status bstatus = rhizome_manifest_finalise(m, &mout, 1);
|
|
switch (bstatus) {
|
|
case RHIZOME_BUNDLE_STATUS_ERROR:
|
|
// error is already logged
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_NEW:
|
|
status = MESHMS_STATUS_UPDATED;
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_SAME:
|
|
case RHIZOME_BUNDLE_STATUS_DUPLICATE:
|
|
case RHIZOME_BUNDLE_STATUS_OLD:
|
|
WHYF("MeshMS conversation manifest (version=%"PRIu64") gazumped by Rhizome store (version=%"PRIu64")",
|
|
m->version, mout->version);
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_INCONSISTENT:
|
|
WHY("MeshMS conversation manifest not consistent with payload");
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_FAKE:
|
|
WHY("MeshMS conversation manifest is not signed");
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
break;
|
|
case RHIZOME_BUNDLE_STATUS_INVALID:
|
|
WHY("MeshMS conversation manifest is invalid");
|
|
status = MESHMS_STATUS_PROTOCOL_FAULT;
|
|
break;
|
|
default:
|
|
FATALF("bstatus=%d", bstatus);
|
|
}
|
|
end:
|
|
if (meshms_failed(status))
|
|
rhizome_fail_write(&write);
|
|
if (mout && m!=mout)
|
|
rhizome_manifest_free(mout);
|
|
return status;
|
|
}
|
|
|
|
// read information about existing conversations from a rhizome payload
|
|
enum meshms_status meshms_conversations_list(const sid_t *my_sid, const sid_t *their_sid, struct meshms_conversations **conv)
|
|
{
|
|
enum meshms_status status = MESHMS_STATUS_ERROR;
|
|
rhizome_manifest *m = rhizome_new_manifest();
|
|
if (!m)
|
|
goto end;
|
|
if (meshms_failed(status = get_my_conversation_bundle(my_sid, m)))
|
|
goto end;
|
|
// read conversations payload
|
|
if (meshms_failed(status = read_known_conversations(m, their_sid, conv)))
|
|
goto end;
|
|
if (meshms_failed(status = get_database_conversations(my_sid, their_sid, conv)))
|
|
goto end;
|
|
if ((status = update_conversations(my_sid, conv)) == MESHMS_STATUS_UPDATED && their_sid == NULL)
|
|
status = write_known_conversations(m, *conv);
|
|
end:
|
|
rhizome_manifest_free(m);
|
|
DEBUGF(meshms, "status=%d", status);
|
|
return status;
|
|
}
|
|
|
|
/* Start traversing the given conversation binary tree in infix order.
|
|
*
|
|
* @author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
void meshms_conversation_iterator_start(struct meshms_conversation_iterator *it, struct meshms_conversations *conv)
|
|
{
|
|
it->current = conv;
|
|
}
|
|
|
|
/* Advance to the next conversation in the tree.
|
|
*
|
|
* @author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
void meshms_conversation_iterator_advance(struct meshms_conversation_iterator *it)
|
|
{
|
|
assert(it->current != NULL); // do not call on a finished iterator
|
|
it->current = it->current->_next;
|
|
}
|
|
|
|
enum meshms_status meshms_message_iterator_open(struct meshms_message_iterator *iter, const sid_t *me, const sid_t *them)
|
|
{
|
|
DEBUGF(meshms, "iter=%p me=%s them=%s", iter,
|
|
me ? alloca_tohex_sid_t(*me) : "NULL",
|
|
them ? alloca_tohex_sid_t(*them) : "NULL"
|
|
);
|
|
enum meshms_status status;
|
|
bzero(iter, sizeof *iter);
|
|
if (meshms_failed(status = find_or_create_conv(me, them, &iter->_conv)))
|
|
goto fail;
|
|
assert(iter->_conv != NULL);
|
|
iter->_my_sid = *me;
|
|
iter->my_sid = &iter->_my_sid;
|
|
iter->their_sid = &iter->_conv->them;
|
|
iter->my_ply_bid = &iter->_conv->my_ply.bundle_id;
|
|
iter->their_ply_bid = &iter->_conv->their_ply.bundle_id;
|
|
iter->read_offset = iter->_conv->read_offset;
|
|
iter->timestamp = 0;
|
|
// If I have never sent a message (or acked any of theirs), there are no messages in the thread.
|
|
if (iter->_conv->found_my_ply) {
|
|
if ((iter->_my_manifest = rhizome_new_manifest()) == NULL)
|
|
goto error;
|
|
if (meshms_failed(status = ply_read_open(&iter->_my_reader, &iter->_conv->my_ply.bundle_id, iter->_my_manifest)))
|
|
goto fail;
|
|
if (iter->_conv->found_their_ply) {
|
|
if ((iter->_their_manifest = rhizome_new_manifest()) == NULL)
|
|
goto error;
|
|
if (meshms_failed(status = ply_read_open(&iter->_their_reader, &iter->_conv->their_ply.bundle_id, iter->_their_manifest)))
|
|
goto fail;
|
|
// Find their latest ACK so we know which of my messages have been delivered.
|
|
if (meshms_failed(status = ply_find_prev(&iter->_their_reader, MESHMS_BLOCK_TYPE_ACK)))
|
|
goto fail;
|
|
if (status == MESHMS_STATUS_UPDATED) {
|
|
if (unpack_uint(iter->_their_reader.record, iter->_their_reader.record_length, &iter->latest_ack_my_offset) == -1)
|
|
iter->latest_ack_my_offset = 0;
|
|
else
|
|
iter->latest_ack_offset = iter->_their_reader.record_end_offset;
|
|
DEBUGF(meshms, "Found their last ack @%"PRId64, iter->latest_ack_my_offset);
|
|
}
|
|
// Re-seek to end of their ply.
|
|
iter->_their_reader.read.offset = iter->_their_reader.read.length;
|
|
}
|
|
} else {
|
|
DEBUGF(meshms, "Did not find sender's ply; no messages in thread");
|
|
}
|
|
iter->_in_ack = 0;
|
|
return MESHMS_STATUS_OK;
|
|
error:
|
|
status = MESHMS_STATUS_ERROR;
|
|
fail:
|
|
meshms_message_iterator_close(iter);
|
|
return status;
|
|
}
|
|
|
|
int meshms_message_iterator_is_open(const struct meshms_message_iterator *iter)
|
|
{
|
|
return iter->_conv != NULL;
|
|
}
|
|
|
|
void meshms_message_iterator_close(struct meshms_message_iterator *iter)
|
|
{
|
|
DEBUGF(meshms, "iter=%p", iter);
|
|
if (iter->_my_manifest) {
|
|
ply_read_close(&iter->_my_reader);
|
|
rhizome_manifest_free(iter->_my_manifest);
|
|
iter->_my_manifest = NULL;
|
|
}
|
|
if (iter->_their_manifest){
|
|
ply_read_close(&iter->_their_reader);
|
|
rhizome_manifest_free(iter->_their_manifest);
|
|
iter->_their_manifest = NULL;
|
|
}
|
|
meshms_free_conversations(iter->_conv);
|
|
iter->_conv = NULL;
|
|
}
|
|
|
|
enum meshms_status meshms_message_iterator_prev(struct meshms_message_iterator *iter)
|
|
{
|
|
assert(iter->_conv != NULL);
|
|
if (iter->_conv->found_my_ply) {
|
|
assert(iter->_my_manifest != NULL);
|
|
if (iter->_conv->found_their_ply)
|
|
assert(iter->_their_manifest != NULL);
|
|
}
|
|
enum meshms_status status = MESHMS_STATUS_UPDATED;
|
|
while (status == MESHMS_STATUS_UPDATED) {
|
|
if (iter->_in_ack) {
|
|
DEBUGF(meshms, "Reading other log from %"PRId64", to %"PRId64, iter->_their_reader.read.offset, iter->_end_range);
|
|
if (meshms_failed(status = ply_read_prev(&iter->_their_reader)))
|
|
break;
|
|
iter->which_ply = THEIR_PLY;
|
|
if (status == MESHMS_STATUS_UPDATED && iter->_their_reader.read.offset >= iter->_end_range) {
|
|
switch (iter->_their_reader.type) {
|
|
case MESHMS_BLOCK_TYPE_ACK:
|
|
iter->type = ACK_RECEIVED;
|
|
iter->offset = iter->_their_reader.record_end_offset;
|
|
iter->text = NULL;
|
|
iter->text_length = 0;
|
|
if (unpack_uint(iter->_their_reader.record, iter->_their_reader.record_length, &iter->ack_offset) == -1)
|
|
iter->ack_offset = 0;
|
|
iter->read = 0;
|
|
return status;
|
|
case MESHMS_BLOCK_TYPE_MESSAGE:
|
|
iter->type = MESSAGE_RECEIVED;
|
|
iter->offset = iter->_their_reader.record_end_offset;
|
|
iter->text = (const char *)iter->_their_reader.record;
|
|
iter->text_length = iter->_their_reader.record_length;
|
|
if ( iter->_their_reader.record_length != 0
|
|
&& iter->_their_reader.record[iter->_their_reader.record_length - 1] == '\0'
|
|
) {
|
|
iter->read = iter->_their_reader.record_end_offset <= iter->_conv->read_offset;
|
|
return status;
|
|
}
|
|
WARN("Malformed MeshMS2 ply journal, missing NUL terminator");
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
continue;
|
|
}
|
|
iter->_in_ack = 0;
|
|
status = MESHMS_STATUS_UPDATED;
|
|
}
|
|
else if ((status = ply_read_prev(&iter->_my_reader)) == MESHMS_STATUS_UPDATED) {
|
|
DEBUGF(meshms, "Offset %"PRId64", type %d, read_offset %"PRId64, iter->_my_reader.read.offset, iter->_my_reader.type, iter->read_offset);
|
|
iter->which_ply = MY_PLY;
|
|
switch (iter->_my_reader.type) {
|
|
case MESHMS_BLOCK_TYPE_TIME:
|
|
if (iter->_my_reader.record_length<4){
|
|
WARN("Malformed MeshMS2 ply journal, expected 4 byte timestamp");
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
iter->timestamp = read_uint32(iter->_my_reader.record);
|
|
DEBUGF(meshms, "Parsed timestamp %ds old", gettime() - iter->timestamp);
|
|
break;
|
|
case MESHMS_BLOCK_TYPE_ACK:
|
|
// Read the received messages up to the ack'ed offset
|
|
if (iter->_conv->found_their_ply) {
|
|
int ofs = unpack_uint(iter->_my_reader.record, iter->_my_reader.record_length, (uint64_t*)&iter->_their_reader.read.offset);
|
|
if (ofs == -1) {
|
|
WHYF("Malformed ACK");
|
|
return MESHMS_STATUS_PROTOCOL_FAULT;
|
|
}
|
|
uint64_t end_range;
|
|
int x = unpack_uint(iter->_my_reader.record + ofs, iter->_my_reader.record_length - ofs, &end_range);
|
|
if (x == -1)
|
|
iter->_end_range = 0;
|
|
else
|
|
iter->_end_range = iter->_their_reader.read.offset - end_range;
|
|
// TODO tail
|
|
// just in case we don't have the full bundle anymore
|
|
if (iter->_their_reader.read.offset > iter->_their_reader.read.length)
|
|
iter->_their_reader.read.offset = iter->_their_reader.read.length;
|
|
iter->_in_ack = 1;
|
|
}
|
|
break;
|
|
case MESHMS_BLOCK_TYPE_MESSAGE:
|
|
iter->type = MESSAGE_SENT;
|
|
iter->offset = iter->_my_reader.record_end_offset;
|
|
iter->text = (const char *)iter->_my_reader.record;
|
|
iter->text_length = iter->_my_reader.record_length;
|
|
iter->delivered = iter->latest_ack_my_offset && iter->_my_reader.record_end_offset <= iter->latest_ack_my_offset;
|
|
return status;
|
|
}
|
|
}
|
|
}
|
|
return status;
|
|
}
|
|
|
|
enum meshms_status meshms_send_message(const sid_t *sender, const sid_t *recipient, const char *message, size_t message_len)
|
|
{
|
|
assert(message_len != 0);
|
|
if (message_len > MESHMS_MESSAGE_MAX_LEN) {
|
|
WHY("message too long");
|
|
return MESHMS_STATUS_ERROR;
|
|
}
|
|
struct meshms_conversations *conv = NULL;
|
|
enum meshms_status status;
|
|
if (!meshms_failed(status = find_or_create_conv(sender, recipient, &conv))) {
|
|
assert(conv != NULL);
|
|
// construct a message payload
|
|
// TODO, new format here.
|
|
unsigned char buffer[message_len + 4 + 6];
|
|
strncpy((char*)buffer, message, message_len);
|
|
// ensure message is NUL terminated
|
|
if (message[message_len - 1] != '\0')
|
|
buffer[message_len++] = '\0';
|
|
message_len += append_footer(buffer + message_len, MESHMS_BLOCK_TYPE_MESSAGE, message_len);
|
|
message_len+=append_timestamp(buffer + message_len);
|
|
status = append_meshms_buffer(sender, conv, buffer, message_len);
|
|
}
|
|
meshms_free_conversations(conv);
|
|
return status;
|
|
}
|
|
|
|
enum meshms_status meshms_mark_read(const sid_t *sender, const sid_t *recipient, uint64_t offset)
|
|
{
|
|
DEBUGF(meshms, "sender=%s recipient=%s offset=%"PRIu64,
|
|
alloca_tohex_sid_t(*sender),
|
|
recipient ? alloca_tohex_sid_t(*recipient) : "NULL",
|
|
offset
|
|
);
|
|
enum meshms_status status = MESHMS_STATUS_ERROR;
|
|
struct meshms_conversations *conv = NULL;
|
|
rhizome_manifest *m = rhizome_new_manifest();
|
|
if (!m)
|
|
goto end;
|
|
if (meshms_failed(status = get_my_conversation_bundle(sender, m)))
|
|
goto end;
|
|
// read all conversations, so we can write them again
|
|
if (meshms_failed(status = read_known_conversations(m, NULL, &conv)))
|
|
goto end;
|
|
// read the full list of conversations from the database too
|
|
if (meshms_failed(status = get_database_conversations(sender, NULL, &conv)))
|
|
goto end;
|
|
// check if any incoming conversations need to be acked or have new messages and update the read offset
|
|
unsigned changed = 0;
|
|
if (meshms_failed(status = update_conversations(sender, &conv)))
|
|
goto end;
|
|
if (status == MESHMS_STATUS_UPDATED)
|
|
changed = 1;
|
|
changed += mark_read(conv, recipient, offset);
|
|
DEBUGF(meshms, "changed=%u", changed);
|
|
if (changed) {
|
|
if (meshms_failed(status = write_known_conversations(m, conv)))
|
|
goto end;
|
|
if (status != MESHMS_STATUS_UPDATED) {
|
|
WHYF("expecting %d (MESHMS_STATUS_UPDATED), got %s", MESHMS_STATUS_UPDATED, status);
|
|
status = MESHMS_STATUS_ERROR;
|
|
}
|
|
}
|
|
end:
|
|
if (m)
|
|
rhizome_manifest_free(m);
|
|
meshms_free_conversations(conv);
|
|
return status;
|
|
}
|
|
|
|
// output the list of existing conversations for a given local identity
|
|
DEFINE_CMD(app_meshms_conversations, 0,
|
|
"List MeshMS threads that include <sid>",
|
|
"meshms","list","conversations" KEYRING_PIN_OPTIONS, "<sid>","[<offset>]","[<count>]");
|
|
static int app_meshms_conversations(const struct cli_parsed *parsed, struct cli_context *context)
|
|
{
|
|
const char *sidhex, *offset_str, *count_str;
|
|
if (cli_arg(parsed, "sid", &sidhex, str_is_subscriber_id, "") == -1
|
|
|| cli_arg(parsed, "offset", &offset_str, NULL, "0")==-1
|
|
|| cli_arg(parsed, "count", &count_str, NULL, "-1")==-1)
|
|
return -1;
|
|
|
|
sid_t sid;
|
|
fromhex(sid.binary, sidhex, sizeof(sid.binary));
|
|
|
|
int offset=atoi(offset_str);
|
|
int count=atoi(count_str);
|
|
|
|
if (create_serval_instance_dir() == -1)
|
|
return -1;
|
|
if (!(keyring = keyring_open_instance_cli(parsed)))
|
|
return -1;
|
|
if (rhizome_opendb() == -1){
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return -1;
|
|
}
|
|
|
|
struct meshms_conversations *conv=NULL;
|
|
enum meshms_status status;
|
|
if (meshms_failed(status = meshms_conversations_list(&sid, NULL, &conv))) {
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return status;
|
|
}
|
|
const char *names[]={
|
|
"_id","recipient","read", "last_message", "read_offset"
|
|
};
|
|
|
|
cli_columns(context, 5, names);
|
|
int rows = 0;
|
|
if (conv) {
|
|
struct meshms_conversation_iterator it;
|
|
for (meshms_conversation_iterator_start(&it, conv);
|
|
it.current && (count < 0 || rows < offset + count);
|
|
meshms_conversation_iterator_advance(&it), ++rows
|
|
) {
|
|
if (rows >= offset) {
|
|
cli_put_long(context, rows, ":");
|
|
cli_put_hexvalue(context, it.current->them.binary, sizeof(it.current->them), ":");
|
|
cli_put_string(context, it.current->read_offset < it.current->their_last_message ? "unread":"", ":");
|
|
cli_put_long(context, it.current->their_last_message, ":");
|
|
cli_put_long(context, it.current->read_offset, "\n");
|
|
}
|
|
}
|
|
}
|
|
cli_row_count(context, rows);
|
|
|
|
meshms_free_conversations(conv);
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return 0;
|
|
}
|
|
|
|
DEFINE_CMD(app_meshms_send_message, 0,
|
|
"Send a MeshMS message from <sender_sid> to <recipient_sid>",
|
|
"meshms","send","message" KEYRING_PIN_OPTIONS, "<sender_sid>", "<recipient_sid>", "<payload>");
|
|
static int app_meshms_send_message(const struct cli_parsed *parsed, struct cli_context *UNUSED(context))
|
|
{
|
|
const char *my_sidhex, *their_sidhex, *message;
|
|
if (cli_arg(parsed, "sender_sid", &my_sidhex, str_is_subscriber_id, "") == -1
|
|
|| cli_arg(parsed, "recipient_sid", &their_sidhex, str_is_subscriber_id, "") == -1
|
|
|| cli_arg(parsed, "payload", &message, NULL, "") == -1)
|
|
return -1;
|
|
|
|
if (create_serval_instance_dir() == -1)
|
|
return -1;
|
|
if (!(keyring = keyring_open_instance_cli(parsed)))
|
|
return -1;
|
|
if (rhizome_opendb() == -1){
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return -1;
|
|
}
|
|
|
|
sid_t my_sid, their_sid;
|
|
if (str_to_sid_t(&my_sid, my_sidhex) == -1)
|
|
return WHY("invalid sender SID");
|
|
if (str_to_sid_t(&their_sid, their_sidhex) == -1)
|
|
return WHY("invalid recipient SID");
|
|
// include terminating NUL
|
|
enum meshms_status status = meshms_send_message(&my_sid, &their_sid, message, strlen(message) + 1);
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return meshms_failed(status) ? status : 0;
|
|
}
|
|
|
|
DEFINE_CMD(app_meshms_list_messages, 0,
|
|
"List MeshMS messages between <sender_sid> and <recipient_sid>",
|
|
"meshms","list","messages" KEYRING_PIN_OPTIONS, "<sender_sid>","<recipient_sid>");
|
|
static int app_meshms_list_messages(const struct cli_parsed *parsed, struct cli_context *context)
|
|
{
|
|
const char *my_sidhex, *their_sidhex;
|
|
if (cli_arg(parsed, "sender_sid", &my_sidhex, str_is_subscriber_id, "") == -1
|
|
|| cli_arg(parsed, "recipient_sid", &their_sidhex, str_is_subscriber_id, "") == -1)
|
|
return -1;
|
|
if (create_serval_instance_dir() == -1)
|
|
return -1;
|
|
if (!(keyring = keyring_open_instance_cli(parsed)))
|
|
return -1;
|
|
if (rhizome_opendb() == -1){
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return -1;
|
|
}
|
|
sid_t my_sid, their_sid;
|
|
if (str_to_sid_t(&my_sid, my_sidhex) == -1){
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return WHY("invalid sender SID");
|
|
}
|
|
if (str_to_sid_t(&their_sid, their_sidhex) == -1){
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return WHY("invalid recipient SID");
|
|
}
|
|
struct meshms_message_iterator iter;
|
|
enum meshms_status status;
|
|
if (meshms_failed(status = meshms_message_iterator_open(&iter, &my_sid, &their_sid))) {
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return status;
|
|
}
|
|
const char *names[]={
|
|
"_id","offset","age","type","message"
|
|
};
|
|
cli_columns(context, 5, names);
|
|
bool_t marked_delivered = 0;
|
|
bool_t marked_read = 0;
|
|
time_s_t now = gettime();
|
|
int id = 0;
|
|
while ((status = meshms_message_iterator_prev(&iter)) == MESHMS_STATUS_UPDATED) {
|
|
switch (iter.type) {
|
|
case MESSAGE_SENT:
|
|
if (iter.delivered && !marked_delivered){
|
|
cli_put_long(context, id++, ":");
|
|
cli_put_long(context, iter.latest_ack_offset, ":");
|
|
cli_put_long(context, iter.timestamp?(int)(now - iter.timestamp):-1, ":");
|
|
cli_put_string(context, "ACK", ":");
|
|
cli_put_string(context, "delivered", "\n");
|
|
marked_delivered = 1;
|
|
}
|
|
// TODO new message format here
|
|
cli_put_long(context, id++, ":");
|
|
cli_put_long(context, iter.offset, ":");
|
|
cli_put_long(context, iter.timestamp?(int)(now - iter.timestamp):-1, ":");
|
|
cli_put_string(context, ">", ":");
|
|
cli_put_string(context, iter.text, "\n");
|
|
break;
|
|
case ACK_RECEIVED:
|
|
break;
|
|
case MESSAGE_RECEIVED:
|
|
if (iter.read && !marked_read) {
|
|
cli_put_long(context, id++, ":");
|
|
cli_put_long(context, iter.read_offset, ":");
|
|
cli_put_long(context, iter.timestamp?(int)(now - iter.timestamp):-1, ":");
|
|
cli_put_string(context, "MARK", ":");
|
|
cli_put_string(context, "read", "\n");
|
|
marked_read = 1;
|
|
}
|
|
// TODO new message format here
|
|
cli_put_long(context, id++, ":");
|
|
cli_put_long(context, iter.offset, ":");
|
|
cli_put_long(context, iter.timestamp?(int)(now - iter.timestamp):-1, ":");
|
|
cli_put_string(context, "<", ":");
|
|
cli_put_string(context, iter.text, "\n");
|
|
break;
|
|
}
|
|
}
|
|
if (!meshms_failed(status))
|
|
cli_row_count(context, id);
|
|
meshms_message_iterator_close(&iter);
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return status;
|
|
}
|
|
|
|
// Returns the number of read markers moved.
|
|
static unsigned mark_read(struct meshms_conversations *conv, const sid_t *their_sid, const uint64_t offset)
|
|
{
|
|
unsigned ret=0;
|
|
while (conv){
|
|
int cmp = their_sid ? cmp_sid_t(&conv->them, their_sid) : 0;
|
|
if (!their_sid || cmp==0){
|
|
// update read offset
|
|
// - never past their last message
|
|
// - never rewind, only advance
|
|
uint64_t new_offset = offset;
|
|
if (new_offset > conv->their_last_message)
|
|
new_offset = conv->their_last_message;
|
|
if (new_offset > conv->read_offset) {
|
|
DEBUGF(meshms, "Moving read marker for %s, from %"PRId64" to %"PRId64,
|
|
alloca_tohex_sid_t(conv->them), conv->read_offset, new_offset
|
|
);
|
|
conv->read_offset = new_offset;
|
|
ret++;
|
|
}
|
|
if (their_sid)
|
|
break;
|
|
}
|
|
conv = conv->_next;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
DEFINE_CMD(app_meshms_mark_read, 0,
|
|
"Mark incoming messages from this recipient as read.",
|
|
"meshms","read","messages" KEYRING_PIN_OPTIONS, "<sender_sid>", "[<recipient_sid>]", "[<offset>]");
|
|
static int app_meshms_mark_read(const struct cli_parsed *parsed, struct cli_context *UNUSED(context))
|
|
{
|
|
const char *my_sidhex, *their_sidhex, *offset_str;
|
|
if (cli_arg(parsed, "sender_sid", &my_sidhex, str_is_subscriber_id, "") == -1
|
|
|| cli_arg(parsed, "recipient_sid", &their_sidhex, str_is_subscriber_id, NULL) == -1
|
|
|| cli_arg(parsed, "offset", &offset_str, str_is_uint64_decimal, NULL)==-1)
|
|
return -1;
|
|
|
|
if (create_serval_instance_dir() == -1)
|
|
return -1;
|
|
if (!(keyring = keyring_open_instance_cli(parsed)))
|
|
return -1;
|
|
int ret = -1;
|
|
if (rhizome_opendb() == -1)
|
|
goto done;
|
|
sid_t my_sid, their_sid;
|
|
if (str_to_sid_t(&my_sid, my_sidhex) == -1) {
|
|
ret = WHYF("my_sidhex=%s", my_sidhex);
|
|
goto done;
|
|
}
|
|
if (their_sidhex && str_to_sid_t(&their_sid, their_sidhex) == -1) {
|
|
ret = WHYF("their_sidhex=%s", their_sidhex);
|
|
goto done;
|
|
}
|
|
uint64_t offset = UINT64_MAX;
|
|
if (offset_str) {
|
|
if (!their_sidhex) {
|
|
ret = WHY("missing recipient_sid");
|
|
goto done;
|
|
}
|
|
if (!str_to_uint64(offset_str, 10, &offset, NULL)) {
|
|
ret = WHYF("offset_str=%s", offset_str);
|
|
goto done;
|
|
}
|
|
}
|
|
enum meshms_status status = meshms_mark_read(&my_sid, their_sidhex ? &their_sid : NULL, offset);
|
|
ret = (status == MESHMS_STATUS_UPDATED) ? MESHMS_STATUS_OK : status;
|
|
done:
|
|
keyring_free(keyring);
|
|
keyring = NULL;
|
|
return ret;
|
|
}
|
|
|
|
const char *meshms_status_message(enum meshms_status status)
|
|
{
|
|
switch (status) {
|
|
case MESHMS_STATUS_OK: return "OK";
|
|
case MESHMS_STATUS_UPDATED: return "Updated";
|
|
case MESHMS_STATUS_SID_LOCKED: return "Identity unknown";
|
|
case MESHMS_STATUS_PROTOCOL_FAULT: return "MeshMS protocol fault";
|
|
case MESHMS_STATUS_ERROR: return "Internal error";
|
|
}
|
|
return NULL;
|
|
}
|