master
CH Chethan Reddy 4 years ago
parent 8a4bd37fea
commit 1d299951b6
  1. 46
      src/Cache.cpp
  2. 5
      src/CacheCryptoStructs.h
  3. 2
      src/Cache_p.h
  4. 35
      src/ChatPage.cpp
  5. 3
      src/ChatPage.h
  6. 177
      src/ui/UserProfile.cpp

@ -111,6 +111,24 @@ Cache::Cache(const QString &userId, QObject *parent)
, localUserId_{userId} , localUserId_{userId}
{ {
setup(); setup();
connect(this,
&Cache::updateUserCacheFlag,
this,
[this](const std::string &user_id) {
std::optional<UserCache> cache_ = getUserCache(user_id);
if (cache_.has_value()) {
cache_.value().isUpdated = false;
setUserCache(user_id, cache_.value());
} else {
setUserCache(user_id, UserCache{});
}
},
Qt::QueuedConnection);
connect(this,
&Cache::deleteLeftUsers,
this,
[this](const std::string &user_id) { deleteUserCache(user_id); },
Qt::QueuedConnection);
} }
void void
@ -1011,7 +1029,7 @@ Cache::saveState(const mtx::responses::Sync &res)
savePresence(txn, res.presence); savePresence(txn, res.presence);
// updateUserCache(res.device_lists); updateUserCache(res.device_lists);
removeLeftRooms(txn, res.rooms.leave); removeLeftRooms(txn, res.rooms.leave);
@ -2889,13 +2907,15 @@ Cache::statusMessage(const std::string &user_id)
void void
to_json(json &j, const UserCache &info) to_json(json &j, const UserCache &info)
{ {
j["keys"] = info.keys; j["keys"] = info.keys;
j["isUpdated"] = info.isUpdated;
} }
void void
from_json(const json &j, UserCache &info) from_json(const json &j, UserCache &info)
{ {
info.keys = j.at("keys").get<mtx::responses::QueryKeys>(); info.keys = j.at("keys").get<mtx::responses::QueryKeys>();
info.isUpdated = j.at("isUpdated").get<bool>();
} }
std::optional<UserCache> std::optional<UserCache>
@ -2935,26 +2955,12 @@ Cache::setUserCache(const std::string &user_id, const UserCache &body)
void void
Cache::updateUserCache(const mtx::responses::DeviceLists body) Cache::updateUserCache(const mtx::responses::DeviceLists body)
{ {
for (auto user_id : body.changed) { for (std::string user_id : body.changed) {
mtx::requests::QueryKeys req; emit updateUserCacheFlag(user_id);
req.device_keys[user_id] = {};
http::client()->query_keys(
req,
[user_id, this](const mtx::responses::QueryKeys res, mtx::http::RequestErr err) {
if (err) {
nhlog::net()->warn("failed to query device keys: {},{}",
err->matrix_error.errcode,
static_cast<int>(err->status_code));
return;
}
setUserCache(user_id, UserCache{std::move(res)});
});
} }
for (std::string user_id : body.left) { for (std::string user_id : body.left) {
deleteUserCache(user_id); emit deleteLeftUsers(user_id);
} }
} }

@ -71,9 +71,12 @@ struct UserCache
{ {
//! map of public key key_ids and their public_key //! map of public key key_ids and their public_key
mtx::responses::QueryKeys keys; mtx::responses::QueryKeys keys;
//! if the current cache is updated or not
bool isUpdated = false;
UserCache(mtx::responses::QueryKeys res) UserCache(mtx::responses::QueryKeys res, bool isUpdated_ = false)
: keys(res) : keys(res)
, isUpdated(isUpdated_)
{} {}
UserCache() {} UserCache() {}
}; };

@ -269,6 +269,8 @@ signals:
void newReadReceipts(const QString &room_id, const std::vector<QString> &event_ids); void newReadReceipts(const QString &room_id, const std::vector<QString> &event_ids);
void roomReadStatus(const std::map<QString, bool> &status); void roomReadStatus(const std::map<QString, bool> &status);
void removeNotification(const QString &room_id, const QString &event_id); void removeNotification(const QString &room_id, const QString &event_id);
void updateUserCacheFlag(const std::string &user_id);
void deleteLeftUsers(const std::string &user_id);
private: private:
//! Save an invited room. //! Save an invited room.

@ -52,6 +52,8 @@
#include "blurhash.hpp" #include "blurhash.hpp"
#include <iostream> // only for debugging
// TODO: Needs to be updated with an actual secret. // TODO: Needs to be updated with an actual secret.
static const std::string STORAGE_SECRET_KEY("secret"); static const std::string STORAGE_SECRET_KEY("secret");
@ -1446,3 +1448,36 @@ ChatPage::initiateLogout()
emit showOverlayProgressBar(); emit showOverlayProgressBar();
} }
void
ChatPage::query_keys(
const mtx::requests::QueryKeys &req,
std::function<void(const mtx::responses::QueryKeys &, mtx::http::RequestErr)> cb)
{
std::string user_id = req.device_keys.begin()->first;
auto cache_ = cache::getUserCache(user_id);
if (cache_.has_value()) {
if (cache_.value().isUpdated) {
cb(cache_.value().keys, {});
} else {
http::client()->query_keys(
req,
[cb, user_id](const mtx::responses::QueryKeys &res,
mtx::http::RequestErr err) {
if (err) {
nhlog::net()->warn("failed to query device keys: {},{}",
err->matrix_error.errcode,
static_cast<int>(err->status_code));
return;
}
std::cout << "Over here " << user_id << std::endl;
cache::setUserCache(std::move(user_id),
std::move(UserCache{res, true}));
cb(res, err);
});
}
} else {
http::client()->query_keys(req, cb);
}
}

@ -89,6 +89,9 @@ public:
//! Show the room/group list (if it was visible). //! Show the room/group list (if it was visible).
void showSideBars(); void showSideBars();
void initiateLogout(); void initiateLogout();
void query_keys(
const mtx::requests::QueryKeys &req,
std::function<void(const mtx::responses::QueryKeys &, mtx::http::RequestErr)> cb);
void focusMessageInput(); void focusMessageInput();
QString status() const; QString status() const;

@ -85,79 +85,124 @@ UserProfile::getUserStatus()
} }
void void
UserProfile::callback_fn(const mtx::responses::QueryKeys &res, UserProfile::fetchDeviceList(const QString &userID)
mtx::http::RequestErr err,
std::string user_id)
{ {
if (err) { auto localUser = utils::localUser();
nhlog::net()->warn("failed to query device keys: {},{}",
err->matrix_error.errcode,
static_cast<int>(err->status_code));
return;
}
if (res.device_keys.empty() || (res.device_keys.find(user_id) == res.device_keys.end())) { mtx::requests::QueryKeys req;
nhlog::net()->warn("no devices retrieved {}", user_id); req.device_keys[userID.toStdString()] = {};
return; ChatPage::instance()->query_keys(
} req,
[user_id = userID.toStdString(), local_user_id = localUser.toStdString(), this](
const mtx::responses::QueryKeys &res, mtx::http::RequestErr err) {
if (err) {
nhlog::net()->warn("failed to query device keys: {},{}",
err->matrix_error.errcode,
static_cast<int>(err->status_code));
return;
}
auto devices = res.device_keys.at(user_id); if (res.device_keys.empty() ||
std::vector<DeviceInfo> deviceInfo; (res.device_keys.find(user_id) == res.device_keys.end())) {
auto device_verified = cache::getVerifiedCache(user_id); nhlog::net()->warn("no devices retrieved {}", user_id);
return;
for (const auto &d : devices) { }
auto device = d.second;
// TODO: Verify signatures and ignore those that don't pass.
verification::Status verified = verification::Status::UNVERIFIED;
isUserVerified = device_verified->is_user_verified;
if (device_verified.has_value()) {
if (std::find(device_verified->cross_verified.begin(),
device_verified->cross_verified.end(),
d.first) != device_verified->cross_verified.end())
verified = verification::Status::VERIFIED;
if (std::find(device_verified->device_verified.begin(),
device_verified->device_verified.end(),
d.first) != device_verified->device_verified.end())
verified = verification::Status::VERIFIED;
if (std::find(device_verified->device_blocked.begin(),
device_verified->device_blocked.end(),
d.first) != device_verified->device_blocked.end())
verified = verification::Status::BLOCKED;
}
deviceInfo.push_back( auto devices = res.device_keys.at(user_id);
{QString::fromStdString(d.first), std::vector<DeviceInfo> deviceInfo;
QString::fromStdString(device.unsigned_info.device_display_name), auto device_verified = cache::getVerifiedCache(user_id);
verified});
}
std::sort( for (const auto &d : devices) {
deviceInfo.begin(), deviceInfo.end(), [](const DeviceInfo &a, const DeviceInfo &b) { auto device = d.second;
return a.device_id > b.device_id;
});
this->deviceList_.queueReset(std::move(deviceInfo)); // TODO: Verify signatures and ignore those that don't pass.
} verification::Status verified = verification::Status::UNVERIFIED;
isUserVerified = device_verified->is_user_verified;
if (device_verified.has_value()) {
if (std::find(device_verified->cross_verified.begin(),
device_verified->cross_verified.end(),
d.first) != device_verified->cross_verified.end())
verified = verification::Status::VERIFIED;
if (std::find(device_verified->device_verified.begin(),
device_verified->device_verified.end(),
d.first) != device_verified->device_verified.end())
verified = verification::Status::VERIFIED;
if (std::find(device_verified->device_blocked.begin(),
device_verified->device_blocked.end(),
d.first) != device_verified->device_blocked.end())
verified = verification::Status::BLOCKED;
}
void deviceInfo.push_back(
UserProfile::fetchDeviceList(const QString &userID) {QString::fromStdString(d.first),
{ QString::fromStdString(device.unsigned_info.device_display_name),
auto localUser = utils::localUser(); verified});
auto user_cache = cache::getUserCache(userID.toStdString()); }
if (user_cache.has_value()) { // Finding if the User is Verified or not based on the Signatures
this->callback_fn(user_cache->keys, {}, userID.toStdString()); mtx::requests::QueryKeys req;
} else { req.device_keys[local_user_id] = {};
mtx::requests::QueryKeys req;
req.device_keys[userID.toStdString()] = {}; ChatPage::instance()->query_keys(
http::client()->query_keys( req,
req, [&local_user_id, &user_id, other_res = res, this](
[user_id = userID.toStdString(), this](const mtx::responses::QueryKeys &res, const mtx::responses::QueryKeys &res, mtx::http::RequestErr err) {
mtx::http::RequestErr err) { using namespace mtx;
this->callback_fn(res, err, user_id);
}); if (err) {
} nhlog::net()->warn("failed to query device keys: {},{}",
err->matrix_error.errcode,
static_cast<int>(err->status_code));
return;
}
std::optional<crypto::CrossSigningKeys> lmk, lsk, luk, mk, sk, uk;
if (res.master_keys.find(local_user_id) != res.master_keys.end())
lmk = res.master_keys.at(local_user_id);
if (res.user_signing_keys.find(local_user_id) !=
res.user_signing_keys.end())
luk = res.user_signing_keys.at(local_user_id);
if (res.self_signing_keys.find(local_user_id) !=
res.self_signing_keys.end())
lsk = res.self_signing_keys.at(local_user_id);
if (other_res.master_keys.find(user_id) != other_res.master_keys.end())
mk = other_res.master_keys.at(user_id);
if (other_res.user_signing_keys.find(user_id) !=
other_res.user_signing_keys.end())
uk = other_res.user_signing_keys.at(user_id);
if (other_res.self_signing_keys.find(user_id) !=
other_res.self_signing_keys.end())
sk = other_res.self_signing_keys.at(user_id);
// First checking if the user is verified
if (lmk.has_value() && luk.has_value()) {
bool is_user_verified = false;
for (auto sign_key : lmk.value().keys) {
if (!luk.value().signatures.empty()) {
for (auto signature :
luk.value().signatures.at(local_user_id)) {
is_user_verified =
is_user_verified ||
(olm::client()->ed25519_verify_sig(
sign_key.second,
json(luk.value()),
signature.second));
}
}
}
std::cout << (isUserVerified ? "Yes" : "No") << std::endl;
}
});
std::sort(deviceInfo.begin(),
deviceInfo.end(),
[](const DeviceInfo &a, const DeviceInfo &b) {
return a.device_id > b.device_id;
});
this->deviceList_.queueReset(std::move(deviceInfo));
});
} }
void void

Loading…
Cancel
Save