2014-05-14 10:56:34 +00:00
package eu.siacs.conversations.parser ;
2014-02-19 00:35:23 +00:00
2015-05-15 03:14:15 +00:00
import android.util.Log ;
import android.util.Pair ;
2018-05-25 11:18:25 +00:00
import java.net.URL ;
2016-06-01 22:24:37 +00:00
import java.text.SimpleDateFormat ;
2015-12-01 11:22:47 +00:00
import java.util.ArrayList ;
2019-09-27 22:32:29 +00:00
import java.util.Collection ;
2018-03-22 12:26:35 +00:00
import java.util.Collections ;
2016-06-01 22:24:37 +00:00
import java.util.Date ;
2016-05-15 10:35:31 +00:00
import java.util.List ;
2017-07-01 11:41:24 +00:00
import java.util.Locale ;
2019-09-27 22:32:29 +00:00
import java.util.Map ;
2015-06-29 12:22:26 +00:00
import java.util.Set ;
2016-02-19 23:01:39 +00:00
import java.util.UUID ;
2015-06-25 14:58:24 +00:00
2015-05-15 03:14:15 +00:00
import eu.siacs.conversations.Config ;
2017-06-30 19:22:35 +00:00
import eu.siacs.conversations.R ;
2015-06-25 14:58:24 +00:00
import eu.siacs.conversations.crypto.axolotl.AxolotlService ;
2018-12-02 13:41:25 +00:00
import eu.siacs.conversations.crypto.axolotl.BrokenSessionException ;
2018-04-04 16:21:22 +00:00
import eu.siacs.conversations.crypto.axolotl.NotEncryptedForThisDeviceException ;
2015-06-25 14:58:24 +00:00
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlMessage ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.entities.Account ;
2019-09-27 22:32:29 +00:00
import eu.siacs.conversations.entities.Bookmark ;
2014-08-05 20:58:46 +00:00
import eu.siacs.conversations.entities.Contact ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.entities.Conversation ;
2019-06-18 16:40:16 +00:00
import eu.siacs.conversations.entities.Conversational ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.entities.Message ;
2015-01-07 17:34:24 +00:00
import eu.siacs.conversations.entities.MucOptions ;
2017-11-19 00:53:04 +00:00
import eu.siacs.conversations.entities.ReadByMarker ;
2018-01-20 07:54:44 +00:00
import eu.siacs.conversations.entities.ReceiptRequest ;
2015-01-11 21:18:18 +00:00
import eu.siacs.conversations.http.HttpConnectionManager ;
2018-05-25 11:18:25 +00:00
import eu.siacs.conversations.http.P1S3UrlStreamHandler ;
2014-12-13 11:25:52 +00:00
import eu.siacs.conversations.services.MessageArchiveService ;
2018-11-11 09:13:45 +00:00
import eu.siacs.conversations.services.QuickConversationsService ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.services.XmppConnectionService ;
2014-06-20 15:30:19 +00:00
import eu.siacs.conversations.utils.CryptoHelper ;
2019-09-12 08:12:47 +00:00
import eu.siacs.conversations.xml.LocalizedContent ;
2017-03-01 12:01:46 +00:00
import eu.siacs.conversations.xml.Namespace ;
2014-02-28 17:46:01 +00:00
import eu.siacs.conversations.xml.Element ;
2018-04-28 14:26:40 +00:00
import eu.siacs.conversations.xmpp.InvalidJid ;
2014-07-12 00:36:37 +00:00
import eu.siacs.conversations.xmpp.OnMessagePacketReceived ;
2015-02-21 10:06:52 +00:00
import eu.siacs.conversations.xmpp.chatstate.ChatState ;
2014-08-05 20:58:46 +00:00
import eu.siacs.conversations.xmpp.pep.Avatar ;
2014-03-10 18:22:13 +00:00
import eu.siacs.conversations.xmpp.stanzas.MessagePacket ;
2018-03-05 17:30:40 +00:00
import rocks.xmpp.addr.Jid ;
2014-02-19 00:35:23 +00:00
2016-05-15 10:35:31 +00:00
public class MessageParser extends AbstractParser implements OnMessagePacketReceived {
2018-11-09 16:47:36 +00:00
private static final SimpleDateFormat TIME_FORMAT = new SimpleDateFormat ( " HH:mm:ss " , Locale . ENGLISH ) ;
public MessageParser ( XmppConnectionService service ) {
super ( service ) ;
}
private static String extractStanzaId ( Element packet , boolean isTypeGroupChat , Conversation conversation ) {
final Jid by ;
final boolean safeToExtract ;
if ( isTypeGroupChat ) {
by = conversation . getJid ( ) . asBareJid ( ) ;
safeToExtract = conversation . getMucOptions ( ) . hasFeature ( Namespace . STANZA_IDS ) ;
} else {
Account account = conversation . getAccount ( ) ;
by = account . getJid ( ) . asBareJid ( ) ;
safeToExtract = account . getXmppConnection ( ) . getFeatures ( ) . stanzaIds ( ) ;
}
return safeToExtract ? extractStanzaId ( packet , by ) : null ;
}
private static String extractStanzaId ( Element packet , Jid by ) {
for ( Element child : packet . getChildren ( ) ) {
if ( child . getName ( ) . equals ( " stanza-id " )
& & Namespace . STANZA_IDS . equals ( child . getNamespace ( ) )
& & by . equals ( InvalidJid . getNullForInvalid ( child . getAttributeAsJid ( " by " ) ) ) ) {
return child . getAttribute ( " id " ) ;
}
}
return null ;
}
private static Jid getTrueCounterpart ( Element mucUserElement , Jid fallback ) {
final Element item = mucUserElement = = null ? null : mucUserElement . findChild ( " item " ) ;
Jid result = item = = null ? null : InvalidJid . getNullForInvalid ( item . getAttributeAsJid ( " jid " ) ) ;
return result ! = null ? result : fallback ;
}
private boolean extractChatState ( Conversation c , final boolean isTypeGroupChat , final MessagePacket packet ) {
ChatState state = ChatState . parse ( packet ) ;
if ( state ! = null & & c ! = null ) {
final Account account = c . getAccount ( ) ;
Jid from = packet . getFrom ( ) ;
if ( from . asBareJid ( ) . equals ( account . getJid ( ) . asBareJid ( ) ) ) {
c . setOutgoingChatState ( state ) ;
if ( state = = ChatState . ACTIVE | | state = = ChatState . COMPOSING ) {
mXmppConnectionService . markRead ( c ) ;
activateGracePeriod ( account ) ;
}
return false ;
} else {
if ( isTypeGroupChat ) {
MucOptions . User user = c . getMucOptions ( ) . findUserByFullJid ( from ) ;
if ( user ! = null ) {
return user . setChatState ( state ) ;
} else {
return false ;
}
} else {
return c . setIncomingChatState ( state ) ;
}
}
}
return false ;
}
2018-12-02 13:41:25 +00:00
private Message parseAxolotlChat ( Element axolotlMessage , Jid from , Conversation conversation , int status , boolean checkedForDuplicates , boolean postpone ) {
2018-11-09 16:47:36 +00:00
final AxolotlService service = conversation . getAccount ( ) . getAxolotlService ( ) ;
final XmppAxolotlMessage xmppAxolotlMessage ;
try {
xmppAxolotlMessage = XmppAxolotlMessage . fromElement ( axolotlMessage , from . asBareJid ( ) ) ;
} catch ( Exception e ) {
Log . d ( Config . LOGTAG , conversation . getAccount ( ) . getJid ( ) . asBareJid ( ) + " : invalid omemo message received " + e . getMessage ( ) ) ;
return null ;
}
if ( xmppAxolotlMessage . hasPayload ( ) ) {
final XmppAxolotlMessage . XmppAxolotlPlaintextMessage plaintextMessage ;
try {
plaintextMessage = service . processReceivingPayloadMessage ( xmppAxolotlMessage , postpone ) ;
2018-12-02 13:41:25 +00:00
} catch ( BrokenSessionException e ) {
if ( checkedForDuplicates ) {
2019-09-15 09:49:55 +00:00
if ( service . trustedOrPreviouslyResponded ( from . asBareJid ( ) ) ) {
service . reportBrokenSessionException ( e , postpone ) ;
return new Message ( conversation , " " , Message . ENCRYPTION_AXOLOTL_FAILED , status ) ;
} else {
Log . d ( Config . LOGTAG , " ignoring broken session exception because contact was not trusted " ) ;
return new Message ( conversation , " " , Message . ENCRYPTION_AXOLOTL_FAILED , status ) ;
}
2018-12-02 13:41:25 +00:00
} else {
2019-07-10 15:58:48 +00:00
Log . d ( Config . LOGTAG , " ignoring broken session exception because checkForDuplicates failed " ) ;
//TODO should be still emit a failed message?
2018-12-02 13:41:25 +00:00
return null ;
}
2018-11-09 16:47:36 +00:00
} catch ( NotEncryptedForThisDeviceException e ) {
return new Message ( conversation , " " , Message . ENCRYPTION_AXOLOTL_NOT_FOR_THIS_DEVICE , status ) ;
}
if ( plaintextMessage ! = null ) {
Message finishedMessage = new Message ( conversation , plaintextMessage . getPlaintext ( ) , Message . ENCRYPTION_AXOLOTL , status ) ;
finishedMessage . setFingerprint ( plaintextMessage . getFingerprint ( ) ) ;
Log . d ( Config . LOGTAG , AxolotlService . getLogprefix ( finishedMessage . getConversation ( ) . getAccount ( ) ) + " Received Message with session fingerprint: " + plaintextMessage . getFingerprint ( ) ) ;
return finishedMessage ;
}
} else {
Log . d ( Config . LOGTAG , conversation . getAccount ( ) . getJid ( ) . asBareJid ( ) + " : received OMEMO key transport message " ) ;
service . processReceivingKeyTransportMessage ( xmppAxolotlMessage , postpone ) ;
}
return null ;
}
2019-09-22 08:00:09 +00:00
private Invite extractInvite ( Element message ) {
final Element mucUser = message . findChild ( " x " , Namespace . MUC_USER ) ;
if ( mucUser ! = null ) {
Element invite = mucUser . findChild ( " invite " ) ;
2018-11-09 16:47:36 +00:00
if ( invite ! = null ) {
2019-09-22 08:00:09 +00:00
String password = mucUser . findChildContent ( " password " ) ;
2018-11-09 16:47:36 +00:00
Jid from = InvalidJid . getNullForInvalid ( invite . getAttributeAsJid ( " from " ) ) ;
Jid room = InvalidJid . getNullForInvalid ( message . getAttributeAsJid ( " from " ) ) ;
if ( room = = null ) {
return null ;
}
2019-09-22 08:00:09 +00:00
return new Invite ( room , password , false , from ) ;
2018-11-09 16:47:36 +00:00
}
}
2019-09-22 08:00:09 +00:00
final Element conference = message . findChild ( " x " , " jabber:x:conference " ) ;
if ( conference ! = null ) {
Jid from = InvalidJid . getNullForInvalid ( message . getAttributeAsJid ( " from " ) ) ;
Jid room = InvalidJid . getNullForInvalid ( conference . getAttributeAsJid ( " jid " ) ) ;
if ( room = = null ) {
return null ;
}
return new Invite ( room , conference . getAttribute ( " password " ) , true , from ) ;
}
2018-11-09 16:47:36 +00:00
return null ;
}
private void parseEvent ( final Element event , final Jid from , final Account account ) {
Element items = event . findChild ( " items " ) ;
String node = items = = null ? null : items . getAttribute ( " node " ) ;
if ( " urn:xmpp:avatar:metadata " . equals ( node ) ) {
Avatar avatar = Avatar . parseMetadata ( items ) ;
if ( avatar ! = null ) {
avatar . owner = from . asBareJid ( ) ;
if ( mXmppConnectionService . getFileBackend ( ) . isAvatarCached ( avatar ) ) {
if ( account . getJid ( ) . asBareJid ( ) . equals ( from ) ) {
if ( account . setAvatar ( avatar . getFilename ( ) ) ) {
mXmppConnectionService . databaseBackend . updateAccount ( account ) ;
2019-01-17 16:55:47 +00:00
mXmppConnectionService . notifyAccountAvatarHasChanged ( account ) ;
2018-11-09 16:47:36 +00:00
}
mXmppConnectionService . getAvatarService ( ) . clear ( account ) ;
mXmppConnectionService . updateConversationUi ( ) ;
mXmppConnectionService . updateAccountUi ( ) ;
} else {
Contact contact = account . getRoster ( ) . getContact ( from ) ;
if ( contact . setAvatar ( avatar ) ) {
mXmppConnectionService . syncRoster ( account ) ;
mXmppConnectionService . getAvatarService ( ) . clear ( contact ) ;
mXmppConnectionService . updateConversationUi ( ) ;
mXmppConnectionService . updateRosterUi ( ) ;
}
}
} else if ( mXmppConnectionService . isDataSaverDisabled ( ) ) {
mXmppConnectionService . fetchAvatar ( account , avatar ) ;
}
}
} else if ( Namespace . NICK . equals ( node ) ) {
final Element i = items . findChild ( " item " ) ;
final String nick = i = = null ? null : i . findChildContent ( " nick " , Namespace . NICK ) ;
if ( nick ! = null ) {
setNick ( account , from , nick ) ;
}
} else if ( AxolotlService . PEP_DEVICE_LIST . equals ( node ) ) {
Element item = items . findChild ( " item " ) ;
Set < Integer > deviceIds = mXmppConnectionService . getIqParser ( ) . deviceIds ( item ) ;
Log . d ( Config . LOGTAG , AxolotlService . getLogprefix ( account ) + " Received PEP device list " + deviceIds + " update from " + from + " , processing... " ) ;
AxolotlService axolotlService = account . getAxolotlService ( ) ;
axolotlService . registerDevices ( from , deviceIds ) ;
2018-12-08 21:35:41 +00:00
} else if ( Namespace . BOOKMARKS . equals ( node ) & & account . getJid ( ) . asBareJid ( ) . equals ( from ) ) {
if ( account . getXmppConnection ( ) . getFeatures ( ) . bookmarksConversion ( ) ) {
2018-11-09 16:47:36 +00:00
final Element i = items . findChild ( " item " ) ;
final Element storage = i = = null ? null : i . findChild ( " storage " , Namespace . BOOKMARKS ) ;
2019-09-28 00:23:15 +00:00
Map < Jid , Bookmark > bookmarks = Bookmark . parseFromStorage ( storage , account ) ;
2019-09-27 22:32:29 +00:00
mXmppConnectionService . processBookmarksInitial ( account , bookmarks , true ) ;
2019-09-28 00:23:15 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : processing bookmark PEP event " ) ;
2018-12-08 21:35:41 +00:00
} else {
2019-09-28 00:23:15 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : ignoring bookmark PEP event because bookmark conversion was not detected " ) ;
}
} else if ( Namespace . BOOKMARK . equals ( node ) & & account . getJid ( ) . asBareJid ( ) . equals ( from ) ) {
final Element item = items . findChild ( " item " ) ;
final Element retract = items . findChild ( " retract " ) ;
if ( item ! = null ) {
final Bookmark bookmark = Bookmark . parseFromItem ( item , account ) ;
if ( bookmark ! = null ) {
//TODO find conversation
account . putBookmark ( bookmark ) ;
//TODO handle autojoin
}
}
if ( retract ! = null ) {
final Jid id = InvalidJid . getNullForInvalid ( retract . getAttributeAsJid ( " id " ) ) ;
if ( id ! = null ) {
account . removeBookmark ( id ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : deleted bookmark for " + id ) ;
}
2018-11-09 16:47:36 +00:00
}
2019-09-27 22:32:29 +00:00
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " received pubsub notification for node= " + node ) ;
2018-11-09 16:47:36 +00:00
}
}
private void parseDeleteEvent ( final Element event , final Jid from , final Account account ) {
final Element delete = event . findChild ( " delete " ) ;
if ( delete = = null ) {
return ;
}
String node = delete . getAttribute ( " node " ) ;
if ( Namespace . NICK . equals ( node ) ) {
Log . d ( Config . LOGTAG , " parsing nick delete event from " + from ) ;
setNick ( account , from , null ) ;
}
}
private void setNick ( Account account , Jid user , String nick ) {
if ( user . asBareJid ( ) . equals ( account . getJid ( ) . asBareJid ( ) ) ) {
account . setDisplayName ( nick ) ;
2018-11-11 09:13:45 +00:00
if ( QuickConversationsService . isQuicksy ( ) ) {
mXmppConnectionService . getAvatarService ( ) . clear ( account ) ;
}
2018-11-09 16:47:36 +00:00
} else {
Contact contact = account . getRoster ( ) . getContact ( user ) ;
if ( contact . setPresenceName ( nick ) ) {
mXmppConnectionService . getAvatarService ( ) . clear ( contact ) ;
}
}
mXmppConnectionService . updateConversationUi ( ) ;
mXmppConnectionService . updateAccountUi ( ) ;
}
private boolean handleErrorMessage ( Account account , MessagePacket packet ) {
if ( packet . getType ( ) = = MessagePacket . TYPE_ERROR ) {
Jid from = packet . getFrom ( ) ;
if ( from ! = null ) {
mXmppConnectionService . markMessage ( account ,
from . asBareJid ( ) ,
packet . getId ( ) ,
Message . STATUS_SEND_FAILED ,
extractErrorMessage ( packet ) ) ;
2019-06-18 16:40:16 +00:00
final Element error = packet . findChild ( " error " ) ;
2019-06-30 18:08:28 +00:00
final boolean pingWorthyError = error ! = null & & ( error . hasChild ( " not-acceptable " ) | | error . hasChild ( " remote-server-timeout " ) | | error . hasChild ( " remote-server-not-found " ) ) ;
if ( pingWorthyError ) {
2019-06-18 16:40:16 +00:00
Conversation conversation = mXmppConnectionService . find ( account , from ) ;
if ( conversation ! = null & & conversation . getMode ( ) = = Conversational . MODE_MULTI ) {
if ( conversation . getMucOptions ( ) . online ( ) ) {
2019-06-30 18:08:28 +00:00
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : received ping worthy error for seemingly online muc at " + from ) ;
2019-06-18 16:40:16 +00:00
mXmppConnectionService . mucSelfPingAndRejoin ( conversation ) ;
}
}
}
2018-11-09 16:47:36 +00:00
}
return true ;
}
return false ;
}
@Override
public void onMessagePacketReceived ( Account account , MessagePacket original ) {
if ( handleErrorMessage ( account , original ) ) {
return ;
}
final MessagePacket packet ;
Long timestamp = null ;
boolean isCarbon = false ;
String serverMsgId = null ;
final Element fin = original . findChild ( " fin " , MessageArchiveService . Version . MAM_0 . namespace ) ;
if ( fin ! = null ) {
mXmppConnectionService . getMessageArchiveService ( ) . processFinLegacy ( fin , original . getFrom ( ) ) ;
return ;
}
final Element result = MessageArchiveService . Version . findResult ( original ) ;
final MessageArchiveService . Query query = result = = null ? null : mXmppConnectionService . getMessageArchiveService ( ) . findQuery ( result . getAttribute ( " queryid " ) ) ;
if ( query ! = null & & query . validFrom ( original . getFrom ( ) ) ) {
Pair < MessagePacket , Long > f = original . getForwardedMessagePacket ( " result " , query . version . namespace ) ;
if ( f = = null ) {
return ;
}
timestamp = f . second ;
packet = f . first ;
serverMsgId = result . getAttribute ( " id " ) ;
query . incrementMessageCount ( ) ;
} else if ( query ! = null ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : received mam result from invalid sender " ) ;
return ;
} else if ( original . fromServer ( account ) ) {
Pair < MessagePacket , Long > f ;
f = original . getForwardedMessagePacket ( " received " , " urn:xmpp:carbons:2 " ) ;
f = f = = null ? original . getForwardedMessagePacket ( " sent " , " urn:xmpp:carbons:2 " ) : f ;
packet = f ! = null ? f . first : original ;
if ( handleErrorMessage ( account , packet ) ) {
return ;
}
timestamp = f ! = null ? f . second : null ;
isCarbon = f ! = null ;
} else {
packet = original ;
}
if ( timestamp = = null ) {
timestamp = AbstractParser . parseTimestamp ( original , AbstractParser . parseTimestamp ( packet ) ) ;
}
2019-09-12 08:12:47 +00:00
final LocalizedContent body = packet . getBody ( ) ;
2019-09-22 08:00:09 +00:00
final Element mucUserElement = packet . findChild ( " x " , Namespace . MUC_USER ) ;
2018-11-09 16:47:36 +00:00
final String pgpEncrypted = packet . findChildContent ( " x " , " jabber:x:encrypted " ) ;
final Element replaceElement = packet . findChild ( " replace " , " urn:xmpp:message-correct:0 " ) ;
final Element oob = packet . findChild ( " x " , Namespace . OOB ) ;
final Element xP1S3 = packet . findChild ( " x " , Namespace . P1_S3_FILE_TRANSFER ) ;
final URL xP1S3url = xP1S3 = = null ? null : P1S3UrlStreamHandler . of ( xP1S3 ) ;
final String oobUrl = oob ! = null ? oob . findChildContent ( " url " ) : null ;
final String replacementId = replaceElement = = null ? null : replaceElement . getAttribute ( " id " ) ;
2019-09-12 10:43:11 +00:00
final Element axolotlEncrypted = packet . findChildEnsureSingle ( XmppAxolotlMessage . CONTAINERTAG , AxolotlService . PEP_PREFIX ) ;
2018-11-09 16:47:36 +00:00
int status ;
final Jid counterpart ;
final Jid to = packet . getTo ( ) ;
final Jid from = packet . getFrom ( ) ;
final Element originId = packet . findChild ( " origin-id " , Namespace . STANZA_IDS ) ;
final String remoteMsgId ;
if ( originId ! = null & & originId . getAttribute ( " id " ) ! = null ) {
remoteMsgId = originId . getAttribute ( " id " ) ;
} else {
remoteMsgId = packet . getId ( ) ;
}
boolean notify = false ;
if ( from = = null | | ! InvalidJid . isValid ( from ) | | ! InvalidJid . isValid ( to ) ) {
Log . e ( Config . LOGTAG , " encountered invalid message from=' " + from + " ' to=' " + to + " ' " ) ;
return ;
}
boolean isTypeGroupChat = packet . getType ( ) = = MessagePacket . TYPE_GROUPCHAT ;
if ( query ! = null & & ! query . muc ( ) & & isTypeGroupChat ) {
Log . e ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : received groupchat ( " + from + " ) message on regular MAM request. skipping " ) ;
return ;
}
boolean isMucStatusMessage = InvalidJid . hasValidFrom ( packet ) & & from . isBareJid ( ) & & mucUserElement ! = null & & mucUserElement . hasChild ( " status " ) ;
boolean selfAddressed ;
if ( packet . fromAccount ( account ) ) {
status = Message . STATUS_SEND ;
selfAddressed = to = = null | | account . getJid ( ) . asBareJid ( ) . equals ( to . asBareJid ( ) ) ;
if ( selfAddressed ) {
counterpart = from ;
} else {
counterpart = to ! = null ? to : account . getJid ( ) ;
}
} else {
status = Message . STATUS_RECEIVED ;
counterpart = from ;
selfAddressed = false ;
}
2019-09-22 08:00:09 +00:00
final Invite invite = extractInvite ( packet ) ;
if ( invite ! = null ) {
if ( isTypeGroupChat ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : ignoring invite to " + invite . jid + " because type=groupchat " ) ;
} else if ( invite . direct & & ( mucUserElement ! = null | | invite . inviter = = null | | mXmppConnectionService . isMuc ( account , invite . inviter ) ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : ignoring direct invite to " + invite . jid + " because it was received in MUC " ) ;
} else {
invite . execute ( account ) ;
return ;
}
2018-11-09 16:47:36 +00:00
}
if ( ( body ! = null | | pgpEncrypted ! = null | | ( axolotlEncrypted ! = null & & axolotlEncrypted . hasChild ( " payload " ) ) | | oobUrl ! = null | | xP1S3 ! = null ) & & ! isMucStatusMessage ) {
final boolean conversationIsProbablyMuc = isTypeGroupChat | | mucUserElement ! = null | | account . getXmppConnection ( ) . getMucServersWithholdAccount ( ) . contains ( counterpart . getDomain ( ) ) ;
final Conversation conversation = mXmppConnectionService . findOrCreateConversation ( account , counterpart . asBareJid ( ) , conversationIsProbablyMuc , false , query , false ) ;
final boolean conversationMultiMode = conversation . getMode ( ) = = Conversation . MODE_MULTI ;
if ( serverMsgId = = null ) {
serverMsgId = extractStanzaId ( packet , isTypeGroupChat , conversation ) ;
}
if ( selfAddressed ) {
if ( mXmppConnectionService . markMessage ( conversation , remoteMsgId , Message . STATUS_SEND_RECEIVED , serverMsgId ) ) {
return ;
}
status = Message . STATUS_RECEIVED ;
if ( remoteMsgId ! = null & & conversation . findMessageWithRemoteId ( remoteMsgId , counterpart ) ! = null ) {
return ;
}
}
if ( isTypeGroupChat ) {
if ( conversation . getMucOptions ( ) . isSelf ( counterpart ) ) {
status = Message . STATUS_SEND_RECEIVED ;
isCarbon = true ; //not really carbon but received from another resource
if ( mXmppConnectionService . markMessage ( conversation , remoteMsgId , status , serverMsgId ) ) {
return ;
} else if ( remoteMsgId = = null | | Config . IGNORE_ID_REWRITE_IN_MUC ) {
2019-09-12 08:12:47 +00:00
LocalizedContent localizedBody = packet . getBody ( ) ;
if ( localizedBody ! = null ) {
Message message = conversation . findSentMessageWithBody ( localizedBody . content ) ;
if ( message ! = null ) {
mXmppConnectionService . markMessage ( message , status ) ;
return ;
}
2018-11-09 16:47:36 +00:00
}
}
} else {
status = Message . STATUS_RECEIVED ;
}
}
final Message message ;
if ( xP1S3url ! = null ) {
message = new Message ( conversation , xP1S3url . toString ( ) , Message . ENCRYPTION_NONE , status ) ;
message . setOob ( true ) ;
if ( CryptoHelper . isPgpEncryptedUrl ( xP1S3url . toString ( ) ) ) {
message . setEncryption ( Message . ENCRYPTION_DECRYPTED ) ;
}
} else if ( pgpEncrypted ! = null & & Config . supportOpenPgp ( ) ) {
message = new Message ( conversation , pgpEncrypted , Message . ENCRYPTION_PGP , status ) ;
} else if ( axolotlEncrypted ! = null & & Config . supportOmemo ( ) ) {
Jid origin ;
Set < Jid > fallbacksBySourceId = Collections . emptySet ( ) ;
if ( conversationMultiMode ) {
final Jid fallback = conversation . getMucOptions ( ) . getTrueCounterpart ( counterpart ) ;
origin = getTrueCounterpart ( query ! = null ? mucUserElement : null , fallback ) ;
if ( origin = = null ) {
try {
fallbacksBySourceId = account . getAxolotlService ( ) . findCounterpartsBySourceId ( XmppAxolotlMessage . parseSourceId ( axolotlEncrypted ) ) ;
} catch ( IllegalArgumentException e ) {
//ignoring
}
}
if ( origin = = null & & fallbacksBySourceId . size ( ) = = 0 ) {
Log . d ( Config . LOGTAG , " axolotl message in anonymous conference received and no possible fallbacks " ) ;
return ;
}
} else {
fallbacksBySourceId = Collections . emptySet ( ) ;
origin = from ;
}
2018-12-02 13:41:25 +00:00
2019-07-10 15:58:48 +00:00
//TODO either or is probably fine?
2018-12-02 13:41:25 +00:00
final boolean checkedForDuplicates = serverMsgId ! = null & & remoteMsgId ! = null & & ! conversation . possibleDuplicate ( serverMsgId , remoteMsgId ) ;
2018-11-09 16:47:36 +00:00
if ( origin ! = null ) {
2018-12-02 13:41:25 +00:00
message = parseAxolotlChat ( axolotlEncrypted , origin , conversation , status , checkedForDuplicates , query ! = null ) ;
2018-11-09 16:47:36 +00:00
} else {
Message trial = null ;
for ( Jid fallback : fallbacksBySourceId ) {
2018-12-02 13:41:25 +00:00
trial = parseAxolotlChat ( axolotlEncrypted , fallback , conversation , status , checkedForDuplicates & & fallbacksBySourceId . size ( ) = = 1 , query ! = null ) ;
2018-11-09 16:47:36 +00:00
if ( trial ! = null ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : decoded muc message using fallback " ) ;
origin = fallback ;
break ;
}
}
message = trial ;
}
if ( message = = null ) {
if ( query = = null & & extractChatState ( mXmppConnectionService . find ( account , counterpart . asBareJid ( ) ) , isTypeGroupChat , packet ) ) {
mXmppConnectionService . updateConversationUi ( ) ;
}
if ( query ! = null & & status = = Message . STATUS_SEND & & remoteMsgId ! = null ) {
Message previouslySent = conversation . findSentMessageWithUuid ( remoteMsgId ) ;
if ( previouslySent ! = null & & previouslySent . getServerMsgId ( ) = = null & & serverMsgId ! = null ) {
previouslySent . setServerMsgId ( serverMsgId ) ;
mXmppConnectionService . databaseBackend . updateMessage ( previouslySent , false ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : encountered previously sent OMEMO message without serverId. updating... " ) ;
}
}
return ;
}
if ( conversationMultiMode ) {
message . setTrueCounterpart ( origin ) ;
}
} else if ( body = = null & & oobUrl ! = null ) {
message = new Message ( conversation , oobUrl , Message . ENCRYPTION_NONE , status ) ;
message . setOob ( true ) ;
if ( CryptoHelper . isPgpEncryptedUrl ( oobUrl ) ) {
message . setEncryption ( Message . ENCRYPTION_DECRYPTED ) ;
}
} else {
2019-09-12 08:12:47 +00:00
message = new Message ( conversation , body . content , Message . ENCRYPTION_NONE , status ) ;
if ( body . count > 1 ) {
message . setBodyLanguage ( body . language ) ;
}
2018-11-09 16:47:36 +00:00
}
message . setCounterpart ( counterpart ) ;
message . setRemoteMsgId ( remoteMsgId ) ;
message . setServerMsgId ( serverMsgId ) ;
message . setCarbon ( isCarbon ) ;
message . setTime ( timestamp ) ;
2019-09-12 08:12:47 +00:00
if ( body ! = null & & body . content ! = null & & body . content . equals ( oobUrl ) ) {
2018-11-09 16:47:36 +00:00
message . setOob ( true ) ;
if ( CryptoHelper . isPgpEncryptedUrl ( oobUrl ) ) {
message . setEncryption ( Message . ENCRYPTION_DECRYPTED ) ;
}
}
message . markable = packet . hasChild ( " markable " , " urn:xmpp:chat-markers:0 " ) ;
if ( conversationMultiMode ) {
message . setMucUser ( conversation . getMucOptions ( ) . findUserByFullJid ( counterpart ) ) ;
final Jid fallback = conversation . getMucOptions ( ) . getTrueCounterpart ( counterpart ) ;
Jid trueCounterpart ;
if ( message . getEncryption ( ) = = Message . ENCRYPTION_AXOLOTL ) {
trueCounterpart = message . getTrueCounterpart ( ) ;
} else if ( query ! = null & & query . safeToExtractTrueCounterpart ( ) ) {
trueCounterpart = getTrueCounterpart ( mucUserElement , fallback ) ;
} else {
trueCounterpart = fallback ;
}
2019-03-15 11:46:27 +00:00
if ( trueCounterpart ! = null & & isTypeGroupChat ) {
2019-03-02 07:36:36 +00:00
if ( trueCounterpart . asBareJid ( ) . equals ( account . getJid ( ) . asBareJid ( ) ) ) {
status = isTypeGroupChat ? Message . STATUS_SEND_RECEIVED : Message . STATUS_SEND ;
} else {
status = Message . STATUS_RECEIVED ;
message . setCarbon ( false ) ;
}
2018-11-09 16:47:36 +00:00
}
message . setStatus ( status ) ;
message . setTrueCounterpart ( trueCounterpart ) ;
if ( ! isTypeGroupChat ) {
message . setType ( Message . TYPE_PRIVATE ) ;
}
} else {
updateLastseen ( account , from ) ;
}
if ( replacementId ! = null & & mXmppConnectionService . allowMessageCorrection ( ) ) {
final Message replacedMessage = conversation . findMessageWithRemoteIdAndCounterpart ( replacementId ,
counterpart ,
message . getStatus ( ) = = Message . STATUS_RECEIVED ,
message . isCarbon ( ) ) ;
if ( replacedMessage ! = null ) {
final boolean fingerprintsMatch = replacedMessage . getFingerprint ( ) = = null
| | replacedMessage . getFingerprint ( ) . equals ( message . getFingerprint ( ) ) ;
final boolean trueCountersMatch = replacedMessage . getTrueCounterpart ( ) ! = null
2019-07-14 15:58:28 +00:00
& & message . getTrueCounterpart ( ) ! = null
& & replacedMessage . getTrueCounterpart ( ) . asBareJid ( ) . equals ( message . getTrueCounterpart ( ) . asBareJid ( ) ) ;
2018-11-09 16:47:36 +00:00
final boolean mucUserMatches = query = = null & & replacedMessage . sameMucUser ( message ) ; //can not be checked when using mam
final boolean duplicate = conversation . hasDuplicateMessage ( message ) ;
if ( fingerprintsMatch & & ( trueCountersMatch | | ! conversationMultiMode | | mucUserMatches ) & & ! duplicate ) {
Log . d ( Config . LOGTAG , " replaced message ' " + replacedMessage . getBody ( ) + " ' with ' " + message . getBody ( ) + " ' " ) ;
synchronized ( replacedMessage ) {
final String uuid = replacedMessage . getUuid ( ) ;
replacedMessage . setUuid ( UUID . randomUUID ( ) . toString ( ) ) ;
replacedMessage . setBody ( message . getBody ( ) ) ;
2018-12-01 14:52:44 +00:00
replacedMessage . putEdited ( replacedMessage . getRemoteMsgId ( ) , replacedMessage . getServerMsgId ( ) ) ;
2018-11-09 16:47:36 +00:00
replacedMessage . setRemoteMsgId ( remoteMsgId ) ;
if ( replacedMessage . getServerMsgId ( ) = = null | | message . getServerMsgId ( ) ! = null ) {
replacedMessage . setServerMsgId ( message . getServerMsgId ( ) ) ;
}
replacedMessage . setEncryption ( message . getEncryption ( ) ) ;
if ( replacedMessage . getStatus ( ) = = Message . STATUS_RECEIVED ) {
replacedMessage . markUnread ( ) ;
}
extractChatState ( mXmppConnectionService . find ( account , counterpart . asBareJid ( ) ) , isTypeGroupChat , packet ) ;
mXmppConnectionService . updateMessage ( replacedMessage , uuid ) ;
if ( mXmppConnectionService . confirmMessages ( )
& & replacedMessage . getStatus ( ) = = Message . STATUS_RECEIVED
2019-04-27 09:46:43 +00:00
& & ( replacedMessage . trusted ( ) | | replacedMessage . isPrivateMessage ( ) ) //TODO do we really want to send receipts for all PMs?
2018-11-09 16:47:36 +00:00
& & remoteMsgId ! = null
& & ! selfAddressed
& & ! isTypeGroupChat ) {
processMessageReceipts ( account , packet , query ) ;
}
if ( replacedMessage . getEncryption ( ) = = Message . ENCRYPTION_PGP ) {
conversation . getAccount ( ) . getPgpDecryptionService ( ) . discard ( replacedMessage ) ;
conversation . getAccount ( ) . getPgpDecryptionService ( ) . decrypt ( replacedMessage , false ) ;
}
}
2019-01-12 07:55:46 +00:00
mXmppConnectionService . getNotificationService ( ) . updateNotification ( ) ;
2018-11-09 16:47:36 +00:00
return ;
} else {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : received message correction but verification didn't check out " ) ;
}
}
}
long deletionDate = mXmppConnectionService . getAutomaticMessageDeletionDate ( ) ;
if ( deletionDate ! = 0 & & message . getTimeSent ( ) < deletionDate ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : skipping message from " + message . getCounterpart ( ) . toString ( ) + " because it was sent prior to our deletion date " ) ;
return ;
}
boolean checkForDuplicates = ( isTypeGroupChat & & packet . hasChild ( " delay " , " urn:xmpp:delay " ) )
2019-04-27 09:46:43 +00:00
| | message . isPrivateMessage ( )
2018-11-09 16:47:36 +00:00
| | message . getServerMsgId ( ) ! = null
| | ( query = = null & & mXmppConnectionService . getMessageArchiveService ( ) . isCatchupInProgress ( conversation ) ) ;
if ( checkForDuplicates ) {
final Message duplicate = conversation . findDuplicateMessage ( message ) ;
if ( duplicate ! = null ) {
final boolean serverMsgIdUpdated ;
if ( duplicate . getStatus ( ) ! = Message . STATUS_RECEIVED
& & duplicate . getUuid ( ) . equals ( message . getRemoteMsgId ( ) )
& & duplicate . getServerMsgId ( ) = = null
& & message . getServerMsgId ( ) ! = null ) {
duplicate . setServerMsgId ( message . getServerMsgId ( ) ) ;
if ( mXmppConnectionService . databaseBackend . updateMessage ( duplicate , false ) ) {
serverMsgIdUpdated = true ;
} else {
serverMsgIdUpdated = false ;
Log . e ( Config . LOGTAG , " failed to update message " ) ;
}
} else {
serverMsgIdUpdated = false ;
}
2019-07-04 08:12:08 +00:00
Log . d ( Config . LOGTAG , " skipping duplicate message with " + message . getCounterpart ( ) + " . serverMsgIdUpdated= " + serverMsgIdUpdated ) ;
2018-11-09 16:47:36 +00:00
return ;
}
}
if ( query ! = null & & query . getPagingOrder ( ) = = MessageArchiveService . PagingOrder . REVERSE ) {
conversation . prepend ( query . getActualInThisQuery ( ) , message ) ;
} else {
conversation . add ( message ) ;
}
if ( query ! = null ) {
query . incrementActualMessageCount ( ) ;
}
if ( query = = null | | query . isCatchup ( ) ) { //either no mam or catchup
if ( status = = Message . STATUS_SEND | | status = = Message . STATUS_SEND_RECEIVED ) {
mXmppConnectionService . markRead ( conversation ) ;
if ( query = = null ) {
activateGracePeriod ( account ) ;
}
} else {
message . markUnread ( ) ;
notify = true ;
}
}
if ( message . getEncryption ( ) = = Message . ENCRYPTION_PGP ) {
notify = conversation . getAccount ( ) . getPgpDecryptionService ( ) . decrypt ( message , notify ) ;
2018-12-02 13:41:25 +00:00
} else if ( message . getEncryption ( ) = = Message . ENCRYPTION_AXOLOTL_NOT_FOR_THIS_DEVICE | | message . getEncryption ( ) = = Message . ENCRYPTION_AXOLOTL_FAILED ) {
2018-11-09 16:47:36 +00:00
notify = false ;
}
if ( query = = null ) {
extractChatState ( mXmppConnectionService . find ( account , counterpart . asBareJid ( ) ) , isTypeGroupChat , packet ) ;
mXmppConnectionService . updateConversationUi ( ) ;
}
if ( mXmppConnectionService . confirmMessages ( )
& & message . getStatus ( ) = = Message . STATUS_RECEIVED
2019-04-27 09:46:43 +00:00
& & ( message . trusted ( ) | | message . isPrivateMessage ( ) )
2018-11-09 16:47:36 +00:00
& & remoteMsgId ! = null
& & ! selfAddressed
& & ! isTypeGroupChat ) {
processMessageReceipts ( account , packet , query ) ;
}
mXmppConnectionService . databaseBackend . createMessage ( message ) ;
final HttpConnectionManager manager = this . mXmppConnectionService . getHttpConnectionManager ( ) ;
if ( message . trusted ( ) & & message . treatAsDownloadable ( ) & & manager . getAutoAcceptFileSize ( ) > 0 ) {
manager . createNewDownloadConnection ( message ) ;
} else if ( notify ) {
if ( query ! = null & & query . isCatchup ( ) ) {
mXmppConnectionService . getNotificationService ( ) . pushFromBacklog ( message ) ;
} else {
mXmppConnectionService . getNotificationService ( ) . push ( message ) ;
}
}
} else if ( ! packet . hasChild ( " body " ) ) { //no body
final Conversation conversation = mXmppConnectionService . find ( account , from . asBareJid ( ) ) ;
if ( axolotlEncrypted ! = null ) {
Jid origin ;
if ( conversation ! = null & & conversation . getMode ( ) = = Conversation . MODE_MULTI ) {
final Jid fallback = conversation . getMucOptions ( ) . getTrueCounterpart ( counterpart ) ;
origin = getTrueCounterpart ( query ! = null ? mucUserElement : null , fallback ) ;
if ( origin = = null ) {
Log . d ( Config . LOGTAG , " omemo key transport message in anonymous conference received " ) ;
return ;
}
} else if ( isTypeGroupChat ) {
return ;
} else {
origin = from ;
}
try {
final XmppAxolotlMessage xmppAxolotlMessage = XmppAxolotlMessage . fromElement ( axolotlEncrypted , origin . asBareJid ( ) ) ;
account . getAxolotlService ( ) . processReceivingKeyTransportMessage ( xmppAxolotlMessage , query ! = null ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : omemo key transport message received from " + origin ) ;
} catch ( Exception e ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : invalid omemo key transport message received " + e . getMessage ( ) ) ;
return ;
}
}
if ( query = = null & & extractChatState ( mXmppConnectionService . find ( account , counterpart . asBareJid ( ) ) , isTypeGroupChat , packet ) ) {
mXmppConnectionService . updateConversationUi ( ) ;
}
if ( isTypeGroupChat ) {
2019-09-12 08:12:47 +00:00
if ( packet . hasChild ( " subject " ) ) { //TODO usually we would want to check for lack of body; however some servers do set a body :(
2018-11-09 16:47:36 +00:00
if ( conversation ! = null & & conversation . getMode ( ) = = Conversation . MODE_MULTI ) {
conversation . setHasMessagesLeftOnServer ( conversation . countMessages ( ) > 0 ) ;
2019-09-12 08:12:47 +00:00
final LocalizedContent subject = packet . findInternationalizedChildContentInDefaultNamespace ( " subject " ) ;
if ( subject ! = null & & conversation . getMucOptions ( ) . setSubject ( subject . content ) ) {
2018-11-09 16:47:36 +00:00
mXmppConnectionService . updateConversation ( conversation ) ;
}
mXmppConnectionService . updateConversationUi ( ) ;
return ;
}
}
}
if ( conversation ! = null & & mucUserElement ! = null & & InvalidJid . hasValidFrom ( packet ) & & from . isBareJid ( ) ) {
for ( Element child : mucUserElement . getChildren ( ) ) {
if ( " status " . equals ( child . getName ( ) ) ) {
try {
int code = Integer . parseInt ( child . getAttribute ( " code " ) ) ;
if ( ( code > = 170 & & code < = 174 ) | | ( code > = 102 & & code < = 104 ) ) {
mXmppConnectionService . fetchConferenceConfiguration ( conversation ) ;
break ;
}
} catch ( Exception e ) {
//ignored
}
} else if ( " item " . equals ( child . getName ( ) ) ) {
MucOptions . User user = AbstractParser . parseItem ( conversation , child ) ;
Log . d ( Config . LOGTAG , account . getJid ( ) + " : changing affiliation for "
+ user . getRealJid ( ) + " to " + user . getAffiliation ( ) + " in "
+ conversation . getJid ( ) . asBareJid ( ) ) ;
if ( ! user . realJidMatchesAccount ( ) ) {
boolean isNew = conversation . getMucOptions ( ) . updateUser ( user ) ;
mXmppConnectionService . getAvatarService ( ) . clear ( conversation ) ;
mXmppConnectionService . updateMucRosterUi ( ) ;
mXmppConnectionService . updateConversationUi ( ) ;
Contact contact = user . getContact ( ) ;
if ( ! user . getAffiliation ( ) . ranks ( MucOptions . Affiliation . MEMBER ) ) {
Jid jid = user . getRealJid ( ) ;
List < Jid > cryptoTargets = conversation . getAcceptedCryptoTargets ( ) ;
if ( cryptoTargets . remove ( user . getRealJid ( ) ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : removed " + jid + " from crypto targets of " + conversation . getName ( ) ) ;
conversation . setAcceptedCryptoTargets ( cryptoTargets ) ;
mXmppConnectionService . updateConversation ( conversation ) ;
}
} else if ( isNew
& & user . getRealJid ( ) ! = null
& & conversation . getMucOptions ( ) . isPrivateAndNonAnonymous ( )
& & ( contact = = null | | ! contact . mutualPresenceSubscription ( ) )
& & account . getAxolotlService ( ) . hasEmptyDeviceList ( user . getRealJid ( ) ) ) {
account . getAxolotlService ( ) . fetchDeviceIds ( user . getRealJid ( ) ) ;
}
}
}
}
}
}
Element received = packet . findChild ( " received " , " urn:xmpp:chat-markers:0 " ) ;
if ( received = = null ) {
received = packet . findChild ( " received " , " urn:xmpp:receipts " ) ;
}
if ( received ! = null ) {
String id = received . getAttribute ( " id " ) ;
if ( packet . fromAccount ( account ) ) {
if ( query ! = null & & id ! = null & & packet . getTo ( ) ! = null ) {
query . removePendingReceiptRequest ( new ReceiptRequest ( packet . getTo ( ) , id ) ) ;
}
} else {
mXmppConnectionService . markMessage ( account , from . asBareJid ( ) , received . getAttribute ( " id " ) , Message . STATUS_SEND_RECEIVED ) ;
}
}
Element displayed = packet . findChild ( " displayed " , " urn:xmpp:chat-markers:0 " ) ;
if ( displayed ! = null ) {
final String id = displayed . getAttribute ( " id " ) ;
final Jid sender = InvalidJid . getNullForInvalid ( displayed . getAttributeAsJid ( " sender " ) ) ;
if ( packet . fromAccount ( account ) & & ! selfAddressed ) {
dismissNotification ( account , counterpart , query ) ;
} else if ( isTypeGroupChat ) {
Conversation conversation = mXmppConnectionService . find ( account , counterpart . asBareJid ( ) ) ;
if ( conversation ! = null & & id ! = null & & sender ! = null ) {
Message message = conversation . findMessageWithRemoteId ( id , sender ) ;
if ( message ! = null ) {
final Jid fallback = conversation . getMucOptions ( ) . getTrueCounterpart ( counterpart ) ;
final Jid trueJid = getTrueCounterpart ( ( query ! = null & & query . safeToExtractTrueCounterpart ( ) ) ? mucUserElement : null , fallback ) ;
final boolean trueJidMatchesAccount = account . getJid ( ) . asBareJid ( ) . equals ( trueJid = = null ? null : trueJid . asBareJid ( ) ) ;
if ( trueJidMatchesAccount | | conversation . getMucOptions ( ) . isSelf ( counterpart ) ) {
if ( ! message . isRead ( ) & & ( query = = null | | query . isCatchup ( ) ) ) { //checking if message is unread fixes race conditions with reflections
mXmppConnectionService . markRead ( conversation ) ;
}
} else if ( ! counterpart . isBareJid ( ) & & trueJid ! = null ) {
2019-09-19 08:00:50 +00:00
final ReadByMarker readByMarker = ReadByMarker . from ( counterpart , trueJid ) ;
2018-11-09 16:47:36 +00:00
if ( message . addReadByMarker ( readByMarker ) ) {
mXmppConnectionService . updateMessage ( message , false ) ;
}
}
}
}
} else {
final Message displayedMessage = mXmppConnectionService . markMessage ( account , from . asBareJid ( ) , id , Message . STATUS_SEND_DISPLAYED ) ;
Message message = displayedMessage = = null ? null : displayedMessage . prev ( ) ;
while ( message ! = null
& & message . getStatus ( ) = = Message . STATUS_SEND_RECEIVED
& & message . getTimeSent ( ) < displayedMessage . getTimeSent ( ) ) {
mXmppConnectionService . markMessage ( message , Message . STATUS_SEND_DISPLAYED ) ;
message = message . prev ( ) ;
}
if ( displayedMessage ! = null & & selfAddressed ) {
dismissNotification ( account , counterpart , query ) ;
}
}
}
final Element event = original . findChild ( " event " , " http://jabber.org/protocol/pubsub#event " ) ;
if ( event ! = null & & InvalidJid . hasValidFrom ( original ) ) {
if ( event . hasChild ( " items " ) ) {
parseEvent ( event , original . getFrom ( ) , account ) ;
} else if ( event . hasChild ( " delete " ) ) {
parseDeleteEvent ( event , original . getFrom ( ) , account ) ;
}
}
final String nick = packet . findChildContent ( " nick " , Namespace . NICK ) ;
if ( nick ! = null & & InvalidJid . hasValidFrom ( original ) ) {
Contact contact = account . getRoster ( ) . getContact ( from ) ;
if ( contact . setPresenceName ( nick ) ) {
mXmppConnectionService . getAvatarService ( ) . clear ( contact ) ;
}
}
}
private void dismissNotification ( Account account , Jid counterpart , MessageArchiveService . Query query ) {
Conversation conversation = mXmppConnectionService . find ( account , counterpart . asBareJid ( ) ) ;
if ( conversation ! = null & & ( query = = null | | query . isCatchup ( ) ) ) {
mXmppConnectionService . markRead ( conversation ) ; //TODO only mark messages read that are older than timestamp
}
}
private void processMessageReceipts ( Account account , MessagePacket packet , MessageArchiveService . Query query ) {
final boolean markable = packet . hasChild ( " markable " , " urn:xmpp:chat-markers:0 " ) ;
final boolean request = packet . hasChild ( " request " , " urn:xmpp:receipts " ) ;
if ( query = = null ) {
final ArrayList < String > receiptsNamespaces = new ArrayList < > ( ) ;
if ( markable ) {
receiptsNamespaces . add ( " urn:xmpp:chat-markers:0 " ) ;
}
if ( request ) {
receiptsNamespaces . add ( " urn:xmpp:receipts " ) ;
}
if ( receiptsNamespaces . size ( ) > 0 ) {
MessagePacket receipt = mXmppConnectionService . getMessageGenerator ( ) . received ( account ,
packet ,
receiptsNamespaces ,
packet . getType ( ) ) ;
mXmppConnectionService . sendMessagePacket ( account , receipt ) ;
}
} else if ( query . isCatchup ( ) ) {
if ( request ) {
query . addPendingReceiptRequest ( new ReceiptRequest ( packet . getFrom ( ) , packet . getId ( ) ) ) ;
}
}
}
private void activateGracePeriod ( Account account ) {
long duration = mXmppConnectionService . getLongPreference ( " grace_period_length " , R . integer . grace_period ) * 1000 ;
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : activating grace period till " + TIME_FORMAT . format ( new Date ( System . currentTimeMillis ( ) + duration ) ) ) ;
account . activateGracePeriod ( duration ) ;
}
private class Invite {
final Jid jid ;
final String password ;
2019-09-22 08:00:09 +00:00
final boolean direct ;
final Jid inviter ;
2018-11-09 16:47:36 +00:00
2019-09-22 08:00:09 +00:00
Invite ( Jid jid , String password , boolean direct , Jid inviter ) {
2018-11-09 16:47:36 +00:00
this . jid = jid ;
this . password = password ;
2019-09-22 08:00:09 +00:00
this . direct = direct ;
2018-11-09 16:47:36 +00:00
this . inviter = inviter ;
}
public boolean execute ( Account account ) {
if ( jid ! = null ) {
Conversation conversation = mXmppConnectionService . findOrCreateConversation ( account , jid , true , false ) ;
2019-06-18 11:20:24 +00:00
if ( conversation . getMucOptions ( ) . online ( ) ) {
Log . d ( Config . LOGTAG , account . getJid ( ) . asBareJid ( ) + " : received invite to " + jid + " but muc is considered to be online " ) ;
mXmppConnectionService . mucSelfPingAndRejoin ( conversation ) ;
} else {
2018-11-09 16:47:36 +00:00
conversation . getMucOptions ( ) . setPassword ( password ) ;
mXmppConnectionService . databaseBackend . updateConversation ( conversation ) ;
2019-09-22 08:00:09 +00:00
final Contact contact = inviter ! = null ? account . getRoster ( ) . getContactFromContactList ( inviter ) : null ;
mXmppConnectionService . joinMuc ( conversation , contact ! = null & & contact . mutualPresenceSubscription ( ) ) ;
2018-11-09 16:47:36 +00:00
mXmppConnectionService . updateConversationUi ( ) ;
}
return true ;
}
return false ;
}
}
2015-08-15 12:26:37 +00:00
}