/
service_group.go
148 lines (114 loc) · 3.4 KB
/
service_group.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
package bertyprotocol
import (
"fmt"
"github.com/libp2p/go-libp2p-core/crypto"
"go.uber.org/zap"
"berty.tech/berty/v2/go/pkg/errcode"
"berty.tech/berty/v2/go/pkg/protocoltypes"
"berty.tech/go-orbit-db/iface"
)
func (s *service) getContactGroup(key crypto.PubKey) (*protocoltypes.Group, error) {
sk, err := s.deviceKeystore.ContactGroupPrivKey(key)
if err != nil {
return nil, errcode.ErrCryptoKeyGeneration.Wrap(err)
}
g, err := getGroupForContact(sk)
if err != nil {
return nil, errcode.ErrOrbitDBOpen.Wrap(err)
}
return g, nil
}
func (s *service) getGroupForPK(pk crypto.PubKey) (*protocoltypes.Group, error) {
g, err := s.groupDatastore.Get(pk)
if err == nil {
return g, nil
} else if !errcode.Is(err, errcode.ErrMissingMapKey) {
return nil, errcode.ErrInternal.Wrap(err)
}
if err = s.groupDatastore.reindex(s.accountGroup.metadataStore, s.deviceKeystore); err != nil {
return nil, errcode.TODO.Wrap(err)
}
g, err = s.groupDatastore.Get(pk)
if err == nil {
return g, nil
} else if errcode.Is(err, errcode.ErrMissingMapKey) {
return nil, errcode.ErrInvalidInput.Wrap(fmt.Errorf("unknown group specified"))
}
return nil, errcode.ErrInternal.Wrap(err)
}
func (s *service) deactivateGroup(pk crypto.PubKey) error {
id, err := pk.Raw()
if err != nil {
return errcode.ErrSerialization.Wrap(err)
}
cg, err := s.getContextGroupForID(id)
if err != nil || cg == nil {
return nil
}
if cg.Group().GroupType == protocoltypes.GroupTypeAccount {
return errcode.ErrInvalidInput.Wrap(fmt.Errorf("can't deactivate account group"))
}
s.lock.Lock()
defer s.lock.Unlock()
err = cg.Close()
if err != nil {
s.logger.Error("unable to close group context", zap.Error(err))
}
delete(s.openedGroups, string(id))
return nil
}
func (s *service) activateGroup(pk crypto.PubKey, localOnly bool) error {
id, err := pk.Raw()
if err != nil {
return errcode.ErrSerialization.Wrap(err)
}
cg, err := s.getContextGroupForID(id)
if err == nil && cg != nil {
return nil
}
g, err := s.getGroupForPK(pk)
if err != nil {
return errcode.TODO.Wrap(err)
}
s.lock.Lock()
defer s.lock.Unlock()
switch g.GroupType {
case protocoltypes.GroupTypeContact, protocoltypes.GroupTypeMultiMember:
dbOpts := &iface.CreateDBOptions{LocalOnly: &localOnly}
gc, err := s.odb.openGroup(s.ctx, g, dbOpts)
if err != nil {
return errcode.TODO.Wrap(err)
}
var contactPK crypto.PubKey
if g.GroupType == protocoltypes.GroupTypeContact {
contact := s.accountGroup.metadataStore.GetContactFromGroupPK(id)
if contact != nil {
contactPK, err = contact.GetPubKey()
if err != nil {
return errcode.TODO.Wrap(err)
}
}
}
if err := ActivateGroupContext(s.ctx, gc, contactPK); err != nil {
return errcode.TODO.Wrap(err)
}
s.openedGroups[string(id)] = gc
TagGroupContextPeers(s.ctx, gc, s.ipfsCoreAPI, 42)
return nil
case protocoltypes.GroupTypeAccount:
return errcode.ErrInternal.Wrap(fmt.Errorf("deviceKeystore group should already be opened"))
}
return errcode.ErrInternal.Wrap(fmt.Errorf("unknown group type"))
}
func (s *service) getContextGroupForID(id []byte) (*groupContext, error) {
if len(id) == 0 {
return nil, errcode.ErrInternal.Wrap(fmt.Errorf("no group id provided"))
}
s.lock.RLock()
defer s.lock.RUnlock()
cg, ok := s.openedGroups[string(id)]
if ok {
return cg, nil
}
return nil, errcode.ErrInternal.Wrap(fmt.Errorf("unknown group or not activated yet"))
}