mirror of
https://github.com/moparisthebest/Conversations
synced 2024-12-25 08:58:55 -05:00
remove own fetch errors from device announcement
This commit is contained in:
parent
da914ba09c
commit
87746ca2ba
@ -395,7 +395,7 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
|||||||
XmppAxolotlSession session = sessions.get(address);
|
XmppAxolotlSession session = sessions.get(address);
|
||||||
if (session != null && session.getFingerprint() != null) {
|
if (session != null && session.getFingerprint() != null) {
|
||||||
if (!session.getTrust().isActive()) {
|
if (!session.getTrust().isActive()) {
|
||||||
Log.d(Config.LOGTAG,"reactivating device with fingprint "+session.getFingerprint());
|
Log.d(Config.LOGTAG,"reactivating device with fingerprint "+session.getFingerprint());
|
||||||
session.setTrust(session.getTrust().toActive());
|
session.setTrust(session.getTrust().toActive());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -407,7 +407,11 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
|||||||
for (Integer deviceId : deviceIds) {
|
for (Integer deviceId : deviceIds) {
|
||||||
AxolotlAddress ownDeviceAddress = new AxolotlAddress(jid.toBareJid().toPreppedString(), deviceId);
|
AxolotlAddress ownDeviceAddress = new AxolotlAddress(jid.toBareJid().toPreppedString(), deviceId);
|
||||||
if (sessions.get(ownDeviceAddress) == null) {
|
if (sessions.get(ownDeviceAddress) == null) {
|
||||||
buildSessionFromPEP(ownDeviceAddress);
|
FetchStatus status = fetchStatusMap.get(ownDeviceAddress);
|
||||||
|
if (status == null || status == FetchStatus.TIMEOUT) {
|
||||||
|
fetchStatusMap.put(ownDeviceAddress, FetchStatus.PENDING);
|
||||||
|
this.buildSessionFromPEP(ownDeviceAddress);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (needsPublishing) {
|
if (needsPublishing) {
|
||||||
@ -462,10 +466,13 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
|||||||
long diff = System.currentTimeMillis() - session.getTrust().getLastActivation();
|
long diff = System.currentTimeMillis() - session.getTrust().getLastActivation();
|
||||||
if (diff > Config.OMEMO_AUTO_EXPIRY) {
|
if (diff > Config.OMEMO_AUTO_EXPIRY) {
|
||||||
long lastMessageDiff = System.currentTimeMillis() - mXmppConnectionService.databaseBackend.getLastTimeFingerprintUsed(account,session.getFingerprint());
|
long lastMessageDiff = System.currentTimeMillis() - mXmppConnectionService.databaseBackend.getLastTimeFingerprintUsed(account,session.getFingerprint());
|
||||||
|
long hours = Math.round(lastMessageDiff/(1000*60.0*60.0));
|
||||||
if (lastMessageDiff > Config.OMEMO_AUTO_EXPIRY) {
|
if (lastMessageDiff > Config.OMEMO_AUTO_EXPIRY) {
|
||||||
devices.add(session.getRemoteAddress().getDeviceId());
|
devices.add(session.getRemoteAddress().getDeviceId());
|
||||||
session.setTrust(session.getTrust().toInactive());
|
session.setTrust(session.getTrust().toInactive());
|
||||||
Log.d(Config.LOGTAG, "added own device " + session.getFingerprint() + " to list of expired devices. Last message received "+(lastMessageDiff/1000)+"s ago");
|
Log.d(Config.LOGTAG,account.getJid().toBareJid()+": added own device " + session.getFingerprint() + " to list of expired devices. Last message received "+hours+" hours ago");
|
||||||
|
} else {
|
||||||
|
Log.d(Config.LOGTAG,account.getJid().toBareJid()+": own device "+session.getFingerprint()+" was active "+hours+" hours ago");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -475,34 +482,32 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
|||||||
|
|
||||||
public void publishOwnDeviceId(Set<Integer> deviceIds) {
|
public void publishOwnDeviceId(Set<Integer> deviceIds) {
|
||||||
Set<Integer> deviceIdsCopy = new HashSet<>(deviceIds);
|
Set<Integer> deviceIdsCopy = new HashSet<>(deviceIds);
|
||||||
if (!deviceIdsCopy.contains(getOwnDeviceId())) {
|
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account) + "publishing own device ids");
|
||||||
Log.d(Config.LOGTAG, AxolotlService.getLogprefix(account) + "Own device " + getOwnDeviceId() + " not in PEP devicelist.");
|
if (deviceIdsCopy.isEmpty()) {
|
||||||
if (deviceIdsCopy.isEmpty()) {
|
if (numPublishTriesOnEmptyPep >= publishTriesThreshold) {
|
||||||
if (numPublishTriesOnEmptyPep >= publishTriesThreshold) {
|
Log.w(Config.LOGTAG, getLogprefix(account) + "Own device publish attempt threshold exceeded, aborting...");
|
||||||
Log.w(Config.LOGTAG, getLogprefix(account) + "Own device publish attempt threshold exceeded, aborting...");
|
pepBroken = true;
|
||||||
pepBroken = true;
|
return;
|
||||||
return;
|
|
||||||
} else {
|
|
||||||
numPublishTriesOnEmptyPep++;
|
|
||||||
Log.w(Config.LOGTAG, getLogprefix(account) + "Own device list empty, attempting to publish (try " + numPublishTriesOnEmptyPep + ")");
|
|
||||||
}
|
|
||||||
} else {
|
} else {
|
||||||
numPublishTriesOnEmptyPep = 0;
|
numPublishTriesOnEmptyPep++;
|
||||||
|
Log.w(Config.LOGTAG, getLogprefix(account) + "Own device list empty, attempting to publish (try " + numPublishTriesOnEmptyPep + ")");
|
||||||
}
|
}
|
||||||
deviceIdsCopy.add(getOwnDeviceId());
|
} else {
|
||||||
IqPacket publish = mXmppConnectionService.getIqGenerator().publishDeviceIds(deviceIdsCopy);
|
numPublishTriesOnEmptyPep = 0;
|
||||||
ownPushPending.set(true);
|
|
||||||
mXmppConnectionService.sendIqPacket(account, publish, new OnIqPacketReceived() {
|
|
||||||
@Override
|
|
||||||
public void onIqPacketReceived(Account account, IqPacket packet) {
|
|
||||||
ownPushPending.set(false);
|
|
||||||
if (packet.getType() == IqPacket.TYPE.ERROR) {
|
|
||||||
pepBroken = true;
|
|
||||||
Log.d(Config.LOGTAG, getLogprefix(account) + "Error received while publishing own device id" + packet.findChild("error"));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
deviceIdsCopy.add(getOwnDeviceId());
|
||||||
|
IqPacket publish = mXmppConnectionService.getIqGenerator().publishDeviceIds(deviceIdsCopy);
|
||||||
|
ownPushPending.set(true);
|
||||||
|
mXmppConnectionService.sendIqPacket(account, publish, new OnIqPacketReceived() {
|
||||||
|
@Override
|
||||||
|
public void onIqPacketReceived(Account account, IqPacket packet) {
|
||||||
|
ownPushPending.set(false);
|
||||||
|
if (packet.getType() == IqPacket.TYPE.ERROR) {
|
||||||
|
pepBroken = true;
|
||||||
|
Log.d(Config.LOGTAG, getLogprefix(account) + "Error received while publishing own device id" + packet.findChild("error"));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
public void publishDeviceVerificationAndBundle(final SignedPreKeyRecord signedPreKeyRecord,
|
public void publishDeviceVerificationAndBundle(final SignedPreKeyRecord signedPreKeyRecord,
|
||||||
@ -797,10 +802,21 @@ public class AxolotlService implements OnAdvancedStreamFeaturesLoaded {
|
|||||||
}
|
}
|
||||||
mXmppConnectionService.keyStatusUpdated(report);
|
mXmppConnectionService.keyStatusUpdated(report);
|
||||||
}
|
}
|
||||||
|
Set<Integer> ownDeviceIds = new HashSet<>(getOwnDeviceIds());
|
||||||
|
boolean publish = false;
|
||||||
|
for(Map.Entry<Integer,FetchStatus> entry : own.entrySet()) {
|
||||||
|
if (entry.getValue() == FetchStatus.ERROR && ownDeviceIds.remove(entry.getKey())) {
|
||||||
|
publish = true;
|
||||||
|
Log.d(Config.LOGTAG,account.getJid().toBareJid()+": error fetching own device with id "+entry.getKey()+". removing from annoucement");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (publish) {
|
||||||
|
publishOwnDeviceId(ownDeviceIds);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void buildSessionFromPEP(final AxolotlAddress address) {
|
private void buildSessionFromPEP(final AxolotlAddress address) {
|
||||||
Log.i(Config.LOGTAG, AxolotlService.getLogprefix(account) + "Building new sesstion for " + address.toString());
|
Log.i(Config.LOGTAG, AxolotlService.getLogprefix(account) + "Building new session for " + address.toString());
|
||||||
if (address.getDeviceId() == getOwnDeviceId()) {
|
if (address.getDeviceId() == getOwnDeviceId()) {
|
||||||
throw new AssertionError("We should NEVER build a session with ourselves. What happened here?!");
|
throw new AssertionError("We should NEVER build a session with ourselves. What happened here?!");
|
||||||
}
|
}
|
||||||
|
@ -32,15 +32,12 @@ import com.wefika.flowlayout.FlowLayout;
|
|||||||
|
|
||||||
import org.openintents.openpgp.util.OpenPgpUtils;
|
import org.openintents.openpgp.util.OpenPgpUtils;
|
||||||
|
|
||||||
import java.security.cert.X509Certificate;
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.OmemoActivity;
|
|
||||||
import eu.siacs.conversations.R;
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.crypto.PgpEngine;
|
import eu.siacs.conversations.crypto.PgpEngine;
|
||||||
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
||||||
import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
|
|
||||||
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlSession;
|
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlSession;
|
||||||
import eu.siacs.conversations.entities.Account;
|
import eu.siacs.conversations.entities.Account;
|
||||||
import eu.siacs.conversations.entities.Contact;
|
import eu.siacs.conversations.entities.Contact;
|
||||||
|
@ -41,7 +41,6 @@ import java.util.Set;
|
|||||||
import java.util.concurrent.atomic.AtomicInteger;
|
import java.util.concurrent.atomic.AtomicInteger;
|
||||||
|
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.OmemoActivity;
|
|
||||||
import eu.siacs.conversations.R;
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
||||||
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlSession;
|
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlSession;
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
package eu.siacs.conversations;
|
package eu.siacs.conversations.ui;
|
||||||
|
|
||||||
import android.app.AlertDialog;
|
import android.app.AlertDialog;
|
||||||
import android.content.DialogInterface;
|
import android.content.DialogInterface;
|
||||||
@ -19,6 +19,8 @@ import com.google.zxing.integration.android.IntentResult;
|
|||||||
import java.security.cert.X509Certificate;
|
import java.security.cert.X509Certificate;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
|
|
||||||
|
import eu.siacs.conversations.Config;
|
||||||
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
|
import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
|
||||||
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlSession;
|
import eu.siacs.conversations.crypto.axolotl.XmppAxolotlSession;
|
||||||
import eu.siacs.conversations.entities.Account;
|
import eu.siacs.conversations.entities.Account;
|
@ -16,7 +16,6 @@ import android.widget.TextView;
|
|||||||
import android.widget.Toast;
|
import android.widget.Toast;
|
||||||
|
|
||||||
import com.google.zxing.integration.android.IntentIntegrator;
|
import com.google.zxing.integration.android.IntentIntegrator;
|
||||||
import com.google.zxing.integration.android.IntentResult;
|
|
||||||
|
|
||||||
import org.whispersystems.libaxolotl.IdentityKey;
|
import org.whispersystems.libaxolotl.IdentityKey;
|
||||||
|
|
||||||
@ -28,7 +27,6 @@ import java.util.Map;
|
|||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
import eu.siacs.conversations.Config;
|
import eu.siacs.conversations.Config;
|
||||||
import eu.siacs.conversations.OmemoActivity;
|
|
||||||
import eu.siacs.conversations.R;
|
import eu.siacs.conversations.R;
|
||||||
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
import eu.siacs.conversations.crypto.axolotl.AxolotlService;
|
||||||
import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
|
import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
|
||||||
|
Loading…
Reference in New Issue
Block a user