feat: Synchronize encrypted groups creation across devices (#7001)

Unencrypted groups don't have grpid since key-contacts were merged, so we don't sync them for now.
This commit is contained in:
iequidoo
2025-09-14 00:25:49 -03:00
committed by iequidoo
parent 59fac54f7b
commit 04c2585c27
3 changed files with 100 additions and 29 deletions

View File

@@ -30,6 +30,7 @@ use crate::debug_logging::maybe_set_logging_xdc;
use crate::download::DownloadState; use crate::download::DownloadState;
use crate::ephemeral::{Timer as EphemeralTimer, start_chat_ephemeral_timers}; use crate::ephemeral::{Timer as EphemeralTimer, start_chat_ephemeral_timers};
use crate::events::EventType; use crate::events::EventType;
use crate::key::self_fingerprint;
use crate::location; use crate::location;
use crate::log::{LogExt, error, info, warn}; use crate::log::{LogExt, error, info, warn};
use crate::logged_debug_assert; use crate::logged_debug_assert;
@@ -2006,17 +2007,21 @@ impl Chat {
/// Sends a `SyncAction` synchronising chat contacts to other devices. /// Sends a `SyncAction` synchronising chat contacts to other devices.
pub(crate) async fn sync_contacts(&self, context: &Context) -> Result<()> { pub(crate) async fn sync_contacts(&self, context: &Context) -> Result<()> {
if self.is_encrypted(context).await? { if self.is_encrypted(context).await? {
let self_fp = self_fingerprint(context).await?;
let fingerprint_addrs = context let fingerprint_addrs = context
.sql .sql
.query_map( .query_map(
"SELECT c.fingerprint, c.addr "SELECT c.id, c.fingerprint, c.addr
FROM contacts c INNER JOIN chats_contacts cc FROM contacts c INNER JOIN chats_contacts cc
ON c.id=cc.contact_id ON c.id=cc.contact_id
WHERE cc.chat_id=? AND cc.add_timestamp >= cc.remove_timestamp", WHERE cc.chat_id=? AND cc.add_timestamp >= cc.remove_timestamp",
(self.id,), (self.id,),
|row| { |row| {
let fingerprint = row.get(0)?; if row.get::<_, ContactId>(0)? == ContactId::SELF {
let addr = row.get(1)?; return Ok((self_fp.to_string(), String::new()));
}
let fingerprint = row.get(1)?;
let addr = row.get(2)?;
Ok((fingerprint, addr)) Ok((fingerprint, addr))
}, },
|addrs| addrs.collect::<Result<Vec<_>, _>>().map_err(Into::into), |addrs| addrs.collect::<Result<Vec<_>, _>>().map_err(Into::into),
@@ -3395,25 +3400,26 @@ pub async fn get_past_chat_contacts(context: &Context, chat_id: ChatId) -> Resul
Ok(list) Ok(list)
} }
/// Creates a group chat with a given `name`. /// Creates an encrypted group chat.
pub async fn create_group_chat(context: &Context, name: &str) -> Result<ChatId> { pub async fn create_group_chat(context: &Context, name: &str) -> Result<ChatId> {
let is_encrypted = true; create_group_ex(context, Sync, create_id(), name).await
create_group_ex(context, is_encrypted, name).await
} }
/// Creates a new unencrypted group chat. /// Creates an unencrypted group chat.
pub async fn create_group_chat_unencrypted(context: &Context, name: &str) -> Result<ChatId> { pub async fn create_group_chat_unencrypted(context: &Context, name: &str) -> Result<ChatId> {
let is_encrypted = false; create_group_ex(context, Sync, String::new(), name).await
create_group_ex(context, is_encrypted, name).await
} }
/// Creates a group chat. /// Creates a group chat.
/// ///
/// * `is_encrypted` - If true, the chat is encrypted (with key-contacts). /// * `sync` - Whether a multi-device synchronization message should be sent. Ignored for
/// unencrypted chats currently.
/// * `grpid` - Group ID. Iff nonempty, the chat is encrypted (with key-contacts).
/// * `name` - Chat name. /// * `name` - Chat name.
pub(crate) async fn create_group_ex( pub(crate) async fn create_group_ex(
context: &Context, context: &Context,
is_encrypted: bool, sync: sync::Sync,
grpid: String,
name: &str, name: &str,
) -> Result<ChatId> { ) -> Result<ChatId> {
let mut chat_name = sanitize_single_line(name); let mut chat_name = sanitize_single_line(name);
@@ -3424,12 +3430,6 @@ pub(crate) async fn create_group_ex(
chat_name = "".to_string(); chat_name = "".to_string();
} }
let grpid = if is_encrypted {
create_id()
} else {
String::new()
};
let timestamp = create_smeared_timestamp(context); let timestamp = create_smeared_timestamp(context);
let row_id = context let row_id = context
.sql .sql
@@ -3437,7 +3437,7 @@ pub(crate) async fn create_group_ex(
"INSERT INTO chats "INSERT INTO chats
(type, name, grpid, param, created_timestamp) (type, name, grpid, param, created_timestamp)
VALUES(?, ?, ?, \'U=1\', ?);", VALUES(?, ?, ?, \'U=1\', ?);",
(Chattype::Group, chat_name, grpid, timestamp), (Chattype::Group, &chat_name, &grpid, timestamp),
) )
.await?; .await?;
@@ -3448,7 +3448,7 @@ pub(crate) async fn create_group_ex(
chatlist_events::emit_chatlist_changed(context); chatlist_events::emit_chatlist_changed(context);
chatlist_events::emit_chatlist_item_changed(context, chat_id); chatlist_events::emit_chatlist_item_changed(context, chat_id);
if is_encrypted { if !grpid.is_empty() {
// Add "Messages are end-to-end encrypted." message. // Add "Messages are end-to-end encrypted." message.
chat_id.add_encrypted_msg(context, timestamp).await?; chat_id.add_encrypted_msg(context, timestamp).await?;
} }
@@ -3459,7 +3459,11 @@ pub(crate) async fn create_group_ex(
let text = stock_str::new_group_send_first_message(context).await; let text = stock_str::new_group_send_first_message(context).await;
add_info_msg(context, chat_id, &text, create_smeared_timestamp(context)).await?; add_info_msg(context, chat_id, &text, create_smeared_timestamp(context)).await?;
} }
if let (true, true) = (sync.into(), !grpid.is_empty()) {
let id = SyncId::Grpid(grpid);
let action = SyncAction::CreateGroupEncrypted(chat_name);
self::sync(context, id, action).await.log_err(context).ok();
}
Ok(chat_id) Ok(chat_id)
} }
@@ -4675,16 +4679,14 @@ async fn set_contacts_by_fingerprints(
"Cannot add key-contacts to unencrypted chat {id}" "Cannot add key-contacts to unencrypted chat {id}"
); );
ensure!( ensure!(
chat.typ == Chattype::OutBroadcast, matches!(chat.typ, Chattype::Group | Chattype::OutBroadcast),
"{id} is not a broadcast list", "{id} is not a group or broadcast",
); );
let mut contacts = HashSet::new(); let mut contacts = HashSet::new();
for (fingerprint, addr) in fingerprint_addrs { for (fingerprint, addr) in fingerprint_addrs {
let contact_addr = ContactAddress::new(addr)?; let contact = Contact::add_or_lookup_ex(context, "", addr, fingerprint, Origin::Hidden)
let contact = .await?
Contact::add_or_lookup_ex(context, "", &contact_addr, fingerprint, Origin::Hidden) .0;
.await?
.0;
contacts.insert(contact); contacts.insert(contact);
} }
let contacts_old = HashSet::<ContactId>::from_iter(get_chat_contacts(context, id).await?); let contacts_old = HashSet::<ContactId>::from_iter(get_chat_contacts(context, id).await?);
@@ -4723,7 +4725,7 @@ pub(crate) enum SyncId {
/// "Message-ID"-s, from oldest to latest. Used for ad-hoc groups. /// "Message-ID"-s, from oldest to latest. Used for ad-hoc groups.
Msgids(Vec<String>), Msgids(Vec<String>),
// Special id for device chat. /// Special id for device chat.
Device, Device,
} }
@@ -4737,6 +4739,8 @@ pub(crate) enum SyncAction {
SetMuted(MuteDuration), SetMuted(MuteDuration),
/// Create broadcast channel with the given name. /// Create broadcast channel with the given name.
CreateBroadcast(String), CreateBroadcast(String),
/// Create encrypted group chat with the given name.
CreateGroupEncrypted(String),
Rename(String), Rename(String),
/// Set chat contacts by their addresses. /// Set chat contacts by their addresses.
SetContacts(Vec<String>), SetContacts(Vec<String>),
@@ -4802,6 +4806,9 @@ impl Context {
if let SyncAction::CreateBroadcast(name) = action { if let SyncAction::CreateBroadcast(name) = action {
create_broadcast_ex(self, Nosync, grpid.clone(), name.clone()).await?; create_broadcast_ex(self, Nosync, grpid.clone(), name.clone()).await?;
return Ok(()); return Ok(());
} else if let SyncAction::CreateGroupEncrypted(name) = action {
create_group_ex(self, Nosync, grpid.clone(), name).await?;
return Ok(());
} }
get_chat_id_by_grpid(self, grpid) get_chat_id_by_grpid(self, grpid)
.await? .await?
@@ -4823,7 +4830,7 @@ impl Context {
SyncAction::Accept => chat_id.accept_ex(self, Nosync).await, SyncAction::Accept => chat_id.accept_ex(self, Nosync).await,
SyncAction::SetVisibility(v) => chat_id.set_visibility_ex(self, Nosync, *v).await, SyncAction::SetVisibility(v) => chat_id.set_visibility_ex(self, Nosync, *v).await,
SyncAction::SetMuted(duration) => set_muted_ex(self, Nosync, chat_id, *duration).await, SyncAction::SetMuted(duration) => set_muted_ex(self, Nosync, chat_id, *duration).await,
SyncAction::CreateBroadcast(_) => { SyncAction::CreateBroadcast(_) | SyncAction::CreateGroupEncrypted(..) => {
Err(anyhow!("sync_alter_chat({id:?}, {action:?}): Bad request.")) Err(anyhow!("sync_alter_chat({id:?}, {action:?}): Bad request."))
} }
SyncAction::Rename(to) => rename_ex(self, Nosync, chat_id, to).await, SyncAction::Rename(to) => rename_ex(self, Nosync, chat_id, to).await,

View File

@@ -3833,6 +3833,61 @@ async fn test_sync_name() -> Result<()> {
Ok(()) Ok(())
} }
#[tokio::test(flavor = "multi_thread", worker_threads = 2)]
async fn test_sync_create_group() -> Result<()> {
let mut tcm = TestContextManager::new();
let alice0 = &tcm.alice().await;
let alice1 = &tcm.alice().await;
for a in [alice0, alice1] {
a.set_config_bool(Config::SyncMsgs, true).await?;
}
let bob = &tcm.bob().await;
let a0_bob_contact_id = alice0.add_or_lookup_contact_id(bob).await;
let a1_bob_contact_id = alice1.add_or_lookup_contact_id(bob).await;
let a0_chat_id = create_group_chat(alice0, "grp").await?;
sync(alice0, alice1).await;
let a0_chat = Chat::load_from_db(alice0, a0_chat_id).await?;
let a1_chat_id = get_chat_id_by_grpid(alice1, &a0_chat.grpid)
.await?
.unwrap()
.0;
let a1_chat = Chat::load_from_db(alice1, a1_chat_id).await?;
assert_eq!(a1_chat.get_type(), Chattype::Group);
assert_eq!(a1_chat.is_promoted(), false);
assert_eq!(a1_chat.get_name(), "grp");
set_chat_name(alice0, a0_chat_id, "renamed").await?;
sync(alice0, alice1).await;
let a1_chat = Chat::load_from_db(alice1, a1_chat_id).await?;
assert_eq!(a1_chat.is_promoted(), false);
assert_eq!(a1_chat.get_name(), "renamed");
add_contact_to_chat(alice0, a0_chat_id, a0_bob_contact_id).await?;
sync(alice0, alice1).await;
let a1_chat = Chat::load_from_db(alice1, a1_chat_id).await?;
assert_eq!(a1_chat.is_promoted(), false);
assert_eq!(
get_chat_contacts(alice1, a1_chat_id).await?,
[a1_bob_contact_id, ContactId::SELF]
);
// Let's test a contact removal from another device.
remove_contact_from_chat(alice1, a1_chat_id, a1_bob_contact_id).await?;
sync(alice1, alice0).await;
let a0_chat = Chat::load_from_db(alice0, a0_chat_id).await?;
assert_eq!(a0_chat.is_promoted(), false);
assert_eq!(
get_chat_contacts(alice0, a0_chat_id).await?,
[ContactId::SELF]
);
let sent_msg = alice0.send_text(a0_chat_id, "hi").await;
let msg = alice1.recv_msg(&sent_msg).await;
assert_eq!(msg.chat_id, a1_chat_id);
assert_eq!(a1_chat_id.is_promoted(alice1).await?, true);
Ok(())
}
/// Tests sending JPEG image with .png extension. /// Tests sending JPEG image with .png extension.
/// ///
/// This is a regression test, previously sending failed /// This is a regression test, previously sending failed

View File

@@ -2164,6 +2164,7 @@ RETURNING id
if !chat_id.is_trash() && !hidden { if !chat_id.is_trash() && !hidden {
let mut chat = Chat::load_from_db(context, chat_id).await?; let mut chat = Chat::load_from_db(context, chat_id).await?;
let mut update_param = false;
// In contrast to most other update-timestamps, // In contrast to most other update-timestamps,
// use `sort_timestamp` instead of `sent_timestamp` for the subject-timestamp comparison. // use `sort_timestamp` instead of `sent_timestamp` for the subject-timestamp comparison.
@@ -2177,6 +2178,14 @@ RETURNING id
let subject = mime_parser.get_subject().unwrap_or_default(); let subject = mime_parser.get_subject().unwrap_or_default();
chat.param.set(Param::LastSubject, subject); chat.param.set(Param::LastSubject, subject);
update_param = true;
}
if chat.is_unpromoted() {
chat.param.remove(Param::Unpromoted);
update_param = true;
}
if update_param {
chat.update_param(context).await?; chat.update_param(context).await?;
} }
} }