mirror of
https://github.com/nostrlabs-io/notepush.git
synced 2025-06-14 11:07:43 +00:00
1
.rustfmt.toml
Normal file
1
.rustfmt.toml
Normal file
@ -0,0 +1 @@
|
||||
edition = "2018"
|
11
shell.nix
11
shell.nix
@ -1,10 +1,11 @@
|
||||
{ pkgs ? import <nixpkgs> {} }:
|
||||
|
||||
pkgs.mkShell {
|
||||
buildInputs = [
|
||||
pkgs.cargo
|
||||
pkgs.openssl
|
||||
pkgs.pkg-config
|
||||
pkgs.websocat
|
||||
buildInputs = with pkgs; [
|
||||
cargo
|
||||
rustfmt
|
||||
openssl
|
||||
pkg-config
|
||||
websocat
|
||||
];
|
||||
}
|
||||
|
@ -32,7 +32,7 @@ impl APIHandler {
|
||||
base_url,
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// MARK: - HTTP handling
|
||||
|
||||
pub async fn handle_http_request(
|
||||
@ -159,36 +159,53 @@ impl APIHandler {
|
||||
authorized_pubkey,
|
||||
})
|
||||
}
|
||||
|
||||
|
||||
// MARK: - Router
|
||||
|
||||
async fn handle_parsed_http_request(
|
||||
&self,
|
||||
parsed_request: &ParsedRequest,
|
||||
) -> Result<APIResponse, Box<dyn std::error::Error>> {
|
||||
|
||||
if let Some(url_params) = route_match(&Method::PUT, "/user-info/:pubkey/:deviceToken", &parsed_request) {
|
||||
if let Some(url_params) = route_match(
|
||||
&Method::PUT,
|
||||
"/user-info/:pubkey/:deviceToken",
|
||||
&parsed_request,
|
||||
) {
|
||||
return self.handle_user_info(parsed_request, &url_params).await;
|
||||
}
|
||||
|
||||
if let Some(url_params) = route_match(&Method::DELETE, "/user-info/:pubkey/:deviceToken", &parsed_request) {
|
||||
return self.handle_user_info_remove(parsed_request, &url_params).await;
|
||||
|
||||
if let Some(url_params) = route_match(
|
||||
&Method::DELETE,
|
||||
"/user-info/:pubkey/:deviceToken",
|
||||
&parsed_request,
|
||||
) {
|
||||
return self
|
||||
.handle_user_info_remove(parsed_request, &url_params)
|
||||
.await;
|
||||
}
|
||||
|
||||
if let Some(url_params) = route_match(&Method::GET, "/user-info/:pubkey/:deviceToken/preferences", &parsed_request) {
|
||||
|
||||
if let Some(url_params) = route_match(
|
||||
&Method::GET,
|
||||
"/user-info/:pubkey/:deviceToken/preferences",
|
||||
&parsed_request,
|
||||
) {
|
||||
return self.get_user_settings(parsed_request, &url_params).await;
|
||||
}
|
||||
|
||||
if let Some(url_params) = route_match(&Method::PUT, "/user-info/:pubkey/:deviceToken/preferences", &parsed_request) {
|
||||
|
||||
if let Some(url_params) = route_match(
|
||||
&Method::PUT,
|
||||
"/user-info/:pubkey/:deviceToken/preferences",
|
||||
&parsed_request,
|
||||
) {
|
||||
return self.set_user_settings(parsed_request, &url_params).await;
|
||||
}
|
||||
|
||||
|
||||
Ok(APIResponse {
|
||||
status: StatusCode::NOT_FOUND,
|
||||
body: json!({ "error": "Not found" }),
|
||||
})
|
||||
}
|
||||
|
||||
|
||||
// MARK: - Authentication
|
||||
|
||||
async fn authenticate(
|
||||
@ -209,7 +226,7 @@ impl APIHandler {
|
||||
)
|
||||
.await)
|
||||
}
|
||||
|
||||
|
||||
// MARK: - Endpoint handlers
|
||||
|
||||
async fn handle_user_info(
|
||||
@ -220,30 +237,36 @@ impl APIHandler {
|
||||
// Early return if `deviceToken` is missing
|
||||
let device_token = match url_params.get("deviceToken") {
|
||||
Some(token) => token,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` is missing
|
||||
let pubkey = match url_params.get("pubkey") {
|
||||
Some(key) => key,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Validate the `pubkey` and prepare it for use
|
||||
let pubkey = match nostr::PublicKey::from_hex(pubkey) {
|
||||
Ok(key) => key,
|
||||
Err(_) => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
}),
|
||||
Err(_) => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` does not match `req.authorized_pubkey`
|
||||
if pubkey != req.authorized_pubkey {
|
||||
return Ok(APIResponse {
|
||||
@ -251,9 +274,11 @@ impl APIHandler {
|
||||
body: json!({ "error": "Forbidden" }),
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
// Proceed with the main logic after passing all checks
|
||||
self.notification_manager.save_user_device_info_if_not_present(pubkey, device_token).await?;
|
||||
self.notification_manager
|
||||
.save_user_device_info_if_not_present(pubkey, device_token)
|
||||
.await?;
|
||||
Ok(APIResponse {
|
||||
status: StatusCode::OK,
|
||||
body: json!({ "message": "User info saved successfully" }),
|
||||
@ -268,30 +293,36 @@ impl APIHandler {
|
||||
// Early return if `deviceToken` is missing
|
||||
let device_token = match url_params.get("deviceToken") {
|
||||
Some(token) => token,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` is missing
|
||||
let pubkey = match url_params.get("pubkey") {
|
||||
Some(key) => key,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Validate the `pubkey` and prepare it for use
|
||||
let pubkey = match nostr::PublicKey::from_hex(pubkey) {
|
||||
Ok(key) => key,
|
||||
Err(_) => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
}),
|
||||
Err(_) => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` does not match `req.authorized_pubkey`
|
||||
if pubkey != req.authorized_pubkey {
|
||||
return Ok(APIResponse {
|
||||
@ -299,16 +330,18 @@ impl APIHandler {
|
||||
body: json!({ "error": "Forbidden" }),
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
// Proceed with the main logic after passing all checks
|
||||
self.notification_manager.remove_user_device_info(pubkey, device_token).await?;
|
||||
|
||||
self.notification_manager
|
||||
.remove_user_device_info(pubkey, device_token)
|
||||
.await?;
|
||||
|
||||
Ok(APIResponse {
|
||||
status: StatusCode::OK,
|
||||
body: json!({ "message": "User info removed successfully" }),
|
||||
})
|
||||
}
|
||||
|
||||
|
||||
async fn set_user_settings(
|
||||
&self,
|
||||
req: &ParsedRequest,
|
||||
@ -317,30 +350,36 @@ impl APIHandler {
|
||||
// Early return if `deviceToken` is missing
|
||||
let device_token = match url_params.get("deviceToken") {
|
||||
Some(token) => token,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` is missing
|
||||
let pubkey = match url_params.get("pubkey") {
|
||||
Some(key) => key,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Validate the `pubkey` and prepare it for use
|
||||
let pubkey = match nostr::PublicKey::from_hex(pubkey) {
|
||||
Ok(key) => key,
|
||||
Err(_) => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
}),
|
||||
Err(_) => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` does not match `req.authorized_pubkey`
|
||||
if pubkey != req.authorized_pubkey {
|
||||
return Ok(APIResponse {
|
||||
@ -348,7 +387,7 @@ impl APIHandler {
|
||||
body: json!({ "error": "Forbidden" }),
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
// Proceed with the main logic after passing all checks
|
||||
let body = req.body_json()?;
|
||||
|
||||
@ -361,14 +400,20 @@ impl APIHandler {
|
||||
});
|
||||
}
|
||||
};
|
||||
|
||||
self.notification_manager.save_user_notification_settings(&req.authorized_pubkey, device_token.to_string(), settings).await?;
|
||||
|
||||
self.notification_manager
|
||||
.save_user_notification_settings(
|
||||
&req.authorized_pubkey,
|
||||
device_token.to_string(),
|
||||
settings,
|
||||
)
|
||||
.await?;
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::OK,
|
||||
body: json!({ "message": "User settings saved successfully" }),
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
async fn get_user_settings(
|
||||
&self,
|
||||
req: &ParsedRequest,
|
||||
@ -377,30 +422,36 @@ impl APIHandler {
|
||||
// Early return if `deviceToken` is missing
|
||||
let device_token = match url_params.get("deviceToken") {
|
||||
Some(token) => token,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "deviceToken is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` is missing
|
||||
let pubkey = match url_params.get("pubkey") {
|
||||
Some(key) => key,
|
||||
None => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
}),
|
||||
None => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "pubkey is required on the URL" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Validate the `pubkey` and prepare it for use
|
||||
let pubkey = match nostr::PublicKey::from_hex(pubkey) {
|
||||
Ok(key) => key,
|
||||
Err(_) => return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
}),
|
||||
Err(_) => {
|
||||
return Ok(APIResponse {
|
||||
status: StatusCode::BAD_REQUEST,
|
||||
body: json!({ "error": "Invalid pubkey" }),
|
||||
})
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
// Early return if `pubkey` does not match `req.authorized_pubkey`
|
||||
if pubkey != req.authorized_pubkey {
|
||||
return Ok(APIResponse {
|
||||
@ -408,10 +459,13 @@ impl APIHandler {
|
||||
body: json!({ "error": "Forbidden" }),
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
// Proceed with the main logic after passing all checks
|
||||
let settings = self.notification_manager.get_user_notification_settings(&req.authorized_pubkey, device_token.to_string()).await?;
|
||||
|
||||
let settings = self
|
||||
.notification_manager
|
||||
.get_user_notification_settings(&req.authorized_pubkey, device_token.to_string())
|
||||
.await?;
|
||||
|
||||
Ok(APIResponse {
|
||||
status: StatusCode::OK,
|
||||
body: json!(settings),
|
||||
@ -462,10 +516,14 @@ struct APIResponse {
|
||||
}
|
||||
|
||||
// MARK: - Helper functions
|
||||
|
||||
|
||||
/// Matches the request to a specified route, returning a hashmap of the route parameters
|
||||
/// e.g. GET /user/:id/info route against request GET /user/123/info matches to { "id": "123" }
|
||||
fn route_match<'a>(method: &Method, path: &'a str, req: &ParsedRequest) -> Option<HashMap<&'a str, String>> {
|
||||
fn route_match<'a>(
|
||||
method: &Method,
|
||||
path: &'a str,
|
||||
req: &ParsedRequest,
|
||||
) -> Option<HashMap<&'a str, String>> {
|
||||
if method != req.method {
|
||||
return None;
|
||||
}
|
||||
|
@ -1,10 +1,10 @@
|
||||
use super::utils::time_delta::TimeDelta;
|
||||
use base64::prelude::*;
|
||||
use nostr;
|
||||
use nostr::bitcoin::hashes::sha256::Hash as Sha256Hash;
|
||||
use nostr::bitcoin::hashes::Hash;
|
||||
use nostr::util::hex;
|
||||
use serde_json::Value;
|
||||
use super::utils::time_delta::TimeDelta;
|
||||
|
||||
pub async fn nip98_verify_auth_header(
|
||||
auth_header: String,
|
||||
|
@ -54,7 +54,9 @@ impl NotePushEnv {
|
||||
.unwrap_or(DEFAULT_NOSTR_EVENT_CACHE_MAX_AGE.to_string())
|
||||
.parse::<u64>()
|
||||
.map(|s| std::time::Duration::from_secs(s))
|
||||
.unwrap_or(std::time::Duration::from_secs(DEFAULT_NOSTR_EVENT_CACHE_MAX_AGE));
|
||||
.unwrap_or(std::time::Duration::from_secs(
|
||||
DEFAULT_NOSTR_EVENT_CACHE_MAX_AGE,
|
||||
));
|
||||
|
||||
Ok(NotePushEnv {
|
||||
apns_private_key_path,
|
||||
@ -67,7 +69,7 @@ impl NotePushEnv {
|
||||
port,
|
||||
api_base_url,
|
||||
relay_url,
|
||||
nostr_event_cache_max_age
|
||||
nostr_event_cache_max_age,
|
||||
})
|
||||
}
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
pub mod nostr_network_helper;
|
||||
mod nostr_event_extensions;
|
||||
mod nostr_event_cache;
|
||||
mod nostr_event_extensions;
|
||||
pub mod nostr_network_helper;
|
||||
pub mod notification_manager;
|
||||
pub mod utils;
|
||||
|
||||
|
@ -1,13 +1,16 @@
|
||||
use crate::{notification_manager::nostr_event_extensions::MaybeConvertibleToTimestampedMuteList, utils::time_delta::TimeDelta};
|
||||
use tokio::time::{Duration, Instant};
|
||||
use super::nostr_event_extensions::{MaybeConvertibleToRelayList, RelayList, TimestampedMuteList};
|
||||
use crate::{
|
||||
notification_manager::nostr_event_extensions::MaybeConvertibleToTimestampedMuteList,
|
||||
utils::time_delta::TimeDelta,
|
||||
};
|
||||
use log;
|
||||
use nostr_sdk::prelude::*;
|
||||
use std::collections::HashMap;
|
||||
use log;
|
||||
use std::str::FromStr;
|
||||
use super::nostr_event_extensions::{MaybeConvertibleToRelayList, RelayList, TimestampedMuteList};
|
||||
use tokio::time::{Duration, Instant};
|
||||
|
||||
struct CacheEntry<T> {
|
||||
value: Option<T>, // `None` means the event does not exist as far as we know (It does NOT mean expired)
|
||||
value: Option<T>, // `None` means the event does not exist as far as we know (It does NOT mean expired)
|
||||
added_at: Instant,
|
||||
}
|
||||
|
||||
@ -18,7 +21,10 @@ impl<T> CacheEntry<T> {
|
||||
|
||||
pub fn new(value: T) -> Self {
|
||||
let added_at = Instant::now();
|
||||
CacheEntry { value: Some(value), added_at }
|
||||
CacheEntry {
|
||||
value: Some(value),
|
||||
added_at,
|
||||
}
|
||||
}
|
||||
|
||||
pub fn maybe(value: Option<T>) -> Self {
|
||||
@ -28,7 +34,10 @@ impl<T> CacheEntry<T> {
|
||||
|
||||
pub fn empty() -> Self {
|
||||
let added_at = Instant::now();
|
||||
CacheEntry { value: None, added_at }
|
||||
CacheEntry {
|
||||
value: None,
|
||||
added_at,
|
||||
}
|
||||
}
|
||||
|
||||
pub fn value(&self) -> Option<&T> {
|
||||
@ -44,12 +53,21 @@ pub struct Cache {
|
||||
max_age: Duration,
|
||||
}
|
||||
|
||||
fn get_cache_entry<T: Clone>(list: &mut HashMap<PublicKey, CacheEntry<T>>, pubkey: &PublicKey, max_age: Duration, name: &str) -> Result<Option<T>, CacheError> {
|
||||
fn get_cache_entry<T: Clone>(
|
||||
list: &mut HashMap<PublicKey, CacheEntry<T>>,
|
||||
pubkey: &PublicKey,
|
||||
max_age: Duration,
|
||||
name: &str,
|
||||
) -> Result<Option<T>, CacheError> {
|
||||
let res = if let Some(entry) = list.get(pubkey) {
|
||||
if !entry.is_expired(max_age) {
|
||||
Ok(entry.value().cloned())
|
||||
} else {
|
||||
log::debug!("{} list for pubkey {} is expired, removing it from the cache", name, pubkey.to_hex());
|
||||
log::debug!(
|
||||
"{} list for pubkey {} is expired, removing it from the cache",
|
||||
name,
|
||||
pubkey.to_hex()
|
||||
);
|
||||
Err(CacheError::Expired)
|
||||
}
|
||||
} else {
|
||||
@ -78,62 +96,90 @@ impl Cache {
|
||||
|
||||
// MARK: - Adding items to the cache
|
||||
|
||||
pub fn add_optional_mute_list_with_author<'a>(&'a mut self, author: &PublicKey, mute_list: Option<&Event>) {
|
||||
pub fn add_optional_mute_list_with_author<'a>(
|
||||
&'a mut self,
|
||||
author: &PublicKey,
|
||||
mute_list: Option<&Event>,
|
||||
) {
|
||||
if let Some(mute_list) = mute_list {
|
||||
self.add_event(mute_list);
|
||||
} else {
|
||||
self.mute_lists.insert(
|
||||
author.to_owned(),
|
||||
CacheEntry::empty(),
|
||||
);
|
||||
self.mute_lists
|
||||
.insert(author.to_owned(), CacheEntry::empty());
|
||||
}
|
||||
}
|
||||
|
||||
pub fn add_optional_relay_list_with_author<'a>(&'a mut self, author: &PublicKey, relay_list_event: Option<&Event>) {
|
||||
pub fn add_optional_relay_list_with_author<'a>(
|
||||
&'a mut self,
|
||||
author: &PublicKey,
|
||||
relay_list_event: Option<&Event>,
|
||||
) {
|
||||
if let Some(relay_list_event) = relay_list_event {
|
||||
self.add_event(relay_list_event);
|
||||
} else {
|
||||
self.relay_lists.insert(
|
||||
author.to_owned(),
|
||||
CacheEntry::empty(),
|
||||
);
|
||||
self.relay_lists
|
||||
.insert(author.to_owned(), CacheEntry::empty());
|
||||
}
|
||||
}
|
||||
|
||||
pub fn add_optional_contact_list_with_author<'a>(&'a mut self, author: &PublicKey, contact_list: Option<&Event>) {
|
||||
pub fn add_optional_contact_list_with_author<'a>(
|
||||
&'a mut self,
|
||||
author: &PublicKey,
|
||||
contact_list: Option<&Event>,
|
||||
) {
|
||||
if let Some(contact_list) = contact_list {
|
||||
self.add_event(contact_list);
|
||||
} else {
|
||||
self.contact_lists.insert(
|
||||
author.to_owned(),
|
||||
CacheEntry::empty(),
|
||||
);
|
||||
self.contact_lists
|
||||
.insert(author.to_owned(), CacheEntry::empty());
|
||||
}
|
||||
}
|
||||
|
||||
pub fn add_event(&mut self, event: &Event) {
|
||||
match event.kind {
|
||||
Kind::MuteList => {
|
||||
self.mute_lists.insert(event.pubkey.clone(), CacheEntry::maybe(event.to_timestamped_mute_list()));
|
||||
log::debug!("Added mute list to the cache. Event ID: {}", event.id.to_hex());
|
||||
self.mute_lists.insert(
|
||||
event.pubkey.clone(),
|
||||
CacheEntry::maybe(event.to_timestamped_mute_list()),
|
||||
);
|
||||
log::debug!(
|
||||
"Added mute list to the cache. Event ID: {}",
|
||||
event.id.to_hex()
|
||||
);
|
||||
}
|
||||
Kind::ContactList => {
|
||||
log::debug!("Added contact list to the cache. Event ID: {}", event.id.to_hex());
|
||||
self.contact_lists.insert(event.pubkey.clone(), CacheEntry::new(event.to_owned()));
|
||||
},
|
||||
log::debug!(
|
||||
"Added contact list to the cache. Event ID: {}",
|
||||
event.id.to_hex()
|
||||
);
|
||||
self.contact_lists
|
||||
.insert(event.pubkey.clone(), CacheEntry::new(event.to_owned()));
|
||||
}
|
||||
Kind::RelayList => {
|
||||
log::debug!("Added relay list to the cache. Event ID: {}", event.id.to_hex());
|
||||
self.relay_lists.insert(event.pubkey.clone(), CacheEntry::maybe(event.to_relay_list()));
|
||||
},
|
||||
log::debug!(
|
||||
"Added relay list to the cache. Event ID: {}",
|
||||
event.id.to_hex()
|
||||
);
|
||||
self.relay_lists.insert(
|
||||
event.pubkey.clone(),
|
||||
CacheEntry::maybe(event.to_relay_list()),
|
||||
);
|
||||
}
|
||||
_ => {
|
||||
log::debug!("Unknown event kind, not adding to any cache. Event ID: {}", event.id.to_hex());
|
||||
log::debug!(
|
||||
"Unknown event kind, not adding to any cache. Event ID: {}",
|
||||
event.id.to_hex()
|
||||
);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// MARK: - Fetching items from the cache
|
||||
|
||||
pub fn get_mute_list(&mut self, pubkey: &PublicKey) -> Result<Option<TimestampedMuteList>, CacheError> {
|
||||
pub fn get_mute_list(
|
||||
&mut self,
|
||||
pubkey: &PublicKey,
|
||||
) -> Result<Option<TimestampedMuteList>, CacheError> {
|
||||
get_cache_entry(&mut self.mute_lists, pubkey, self.max_age, "Mute")
|
||||
}
|
||||
|
||||
@ -163,7 +209,9 @@ mod tests {
|
||||
// Helper function to create a dummy event of a given kind for testing.
|
||||
fn create_dummy_event(pubkey: PublicKey, kind: Kind) -> Event {
|
||||
// In a real test, you might generate keys or events more dynamically.
|
||||
let id = EventId::from_hex("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa").unwrap();
|
||||
let id =
|
||||
EventId::from_hex("aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")
|
||||
.unwrap();
|
||||
let created_at = Timestamp::now();
|
||||
let content = "";
|
||||
let sig_str = "8e1a61523765a6e577e3ca0c87afe3694ed518719aea067701c35262dd2a3c7e3ca0946fe98463a3af706dd333695ceec6cb3b29254c557c8630d3db1171ea3d";
|
||||
@ -175,7 +223,8 @@ mod tests {
|
||||
// Helper function to create a dummy public key for testing.
|
||||
fn create_dummy_pubkey() -> PublicKey {
|
||||
// In a real project, you'd generate a key. For the sake of tests, just parse a known hex.
|
||||
PublicKey::from_hex("32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245").unwrap()
|
||||
PublicKey::from_hex("32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245")
|
||||
.unwrap()
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
@ -185,7 +234,10 @@ mod tests {
|
||||
let mut cache = Cache::new(max_age);
|
||||
|
||||
// Initially, no contact list should be found.
|
||||
assert!(matches!(cache.get_contact_list(&pubkey), Err(CacheError::NotFound)));
|
||||
assert!(matches!(
|
||||
cache.get_contact_list(&pubkey),
|
||||
Err(CacheError::NotFound)
|
||||
));
|
||||
|
||||
// Add a contact list event.
|
||||
let event = create_dummy_event(pubkey, Kind::ContactList);
|
||||
@ -205,7 +257,10 @@ mod tests {
|
||||
let mut cache = Cache::new(max_age);
|
||||
|
||||
// No mute list initially
|
||||
assert!(matches!(cache.get_mute_list(&pubkey), Err(CacheError::NotFound)));
|
||||
assert!(matches!(
|
||||
cache.get_mute_list(&pubkey),
|
||||
Err(CacheError::NotFound)
|
||||
));
|
||||
|
||||
// Add a mute list event.
|
||||
let mutelist_event = {
|
||||
@ -225,7 +280,10 @@ mod tests {
|
||||
let mut cache = Cache::new(max_age);
|
||||
|
||||
// No relay list initially
|
||||
assert!(matches!(cache.get_relay_list(&pubkey), Err(CacheError::NotFound)));
|
||||
assert!(matches!(
|
||||
cache.get_relay_list(&pubkey),
|
||||
Err(CacheError::NotFound)
|
||||
));
|
||||
|
||||
// Add a relay list event.
|
||||
let relaylist_event = create_dummy_event(pubkey, Kind::RelayList);
|
||||
|
@ -1,4 +1,10 @@
|
||||
use nostr::{self, key::PublicKey, nips::{nip51::MuteList, nip65}, Alphabet, SingleLetterTag, TagKind::SingleLetter};
|
||||
use nostr::{
|
||||
self,
|
||||
key::PublicKey,
|
||||
nips::{nip51::MuteList, nip65},
|
||||
Alphabet, SingleLetterTag,
|
||||
TagKind::SingleLetter,
|
||||
};
|
||||
use nostr_sdk::{EventId, Kind, TagKind};
|
||||
|
||||
/// Temporary scaffolding of old methods that have not been ported to use native Event methods
|
||||
@ -104,10 +110,26 @@ impl MaybeConvertibleToMuteList for nostr::Event {
|
||||
return None;
|
||||
}
|
||||
Some(MuteList {
|
||||
public_keys: self.referenced_pubkeys().iter().map(|pk| pk.clone()).collect(),
|
||||
hashtags: self.referenced_hashtags().iter().map(|tag| tag.clone()).collect(),
|
||||
event_ids: self.referenced_event_ids().iter().map(|id| id.clone()).collect(),
|
||||
words: self.get_tags_content(TagKind::Word).iter().map(|tag| tag.to_string()).collect(),
|
||||
public_keys: self
|
||||
.referenced_pubkeys()
|
||||
.iter()
|
||||
.map(|pk| pk.clone())
|
||||
.collect(),
|
||||
hashtags: self
|
||||
.referenced_hashtags()
|
||||
.iter()
|
||||
.map(|tag| tag.clone())
|
||||
.collect(),
|
||||
event_ids: self
|
||||
.referenced_event_ids()
|
||||
.iter()
|
||||
.map(|id| id.clone())
|
||||
.collect(),
|
||||
words: self
|
||||
.get_tags_content(TagKind::Word)
|
||||
.iter()
|
||||
.map(|tag| tag.to_string())
|
||||
.collect(),
|
||||
})
|
||||
}
|
||||
}
|
||||
@ -138,7 +160,8 @@ impl MaybeConvertibleToRelayList for nostr::Event {
|
||||
}
|
||||
let extracted_relay_list = nip65::extract_relay_list(&self);
|
||||
// Convert the extracted relay list data fully into owned data that can be returned
|
||||
let extracted_relay_list_owned = extracted_relay_list.into_iter()
|
||||
let extracted_relay_list_owned = extracted_relay_list
|
||||
.into_iter()
|
||||
.map(|(url, metadata)| (url.clone(), metadata.as_ref().map(|m| m.clone())))
|
||||
.collect();
|
||||
|
||||
@ -167,45 +190,60 @@ impl Codable for MuteList {
|
||||
|
||||
fn from_json(json: serde_json::Value) -> Result<Self, Box<dyn std::error::Error>>
|
||||
where
|
||||
Self: Sized {
|
||||
let public_keys = json.get("public_keys")
|
||||
.ok_or_else(|| "Missing 'public_keys' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'public_keys' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|pk| PublicKey::from_hex(pk.as_str().unwrap_or_default()).map_err(|e| e.to_string()))
|
||||
.collect::<Result<Vec<PublicKey>, String>>()?;
|
||||
|
||||
let hashtags = json.get("hashtags")
|
||||
.ok_or_else(|| "Missing 'hashtags' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'hashtags' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|tag| tag.as_str().map(|s| s.to_string()).ok_or_else(|| "Invalid hashtag".to_string()))
|
||||
.collect::<Result<Vec<String>, String>>()?;
|
||||
|
||||
let event_ids = json.get("event_ids")
|
||||
.ok_or_else(|| "Missing 'event_ids' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'event_ids' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|id| EventId::from_hex(id.as_str().unwrap_or_default()).map_err(|e| e.to_string()))
|
||||
.collect::<Result<Vec<EventId>, String>>()?;
|
||||
|
||||
let words = json.get("words")
|
||||
.ok_or_else(|| "Missing 'words' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'words' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|word| word.as_str().map(|s| s.to_string()).ok_or_else(|| "Invalid word".to_string()))
|
||||
.collect::<Result<Vec<String>, String>>()?;
|
||||
|
||||
Ok(MuteList {
|
||||
public_keys,
|
||||
hashtags,
|
||||
event_ids,
|
||||
words,
|
||||
Self: Sized,
|
||||
{
|
||||
let public_keys = json
|
||||
.get("public_keys")
|
||||
.ok_or_else(|| "Missing 'public_keys' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'public_keys' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|pk| {
|
||||
PublicKey::from_hex(pk.as_str().unwrap_or_default()).map_err(|e| e.to_string())
|
||||
})
|
||||
.collect::<Result<Vec<PublicKey>, String>>()?;
|
||||
|
||||
let hashtags = json
|
||||
.get("hashtags")
|
||||
.ok_or_else(|| "Missing 'hashtags' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'hashtags' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|tag| {
|
||||
tag.as_str()
|
||||
.map(|s| s.to_string())
|
||||
.ok_or_else(|| "Invalid hashtag".to_string())
|
||||
})
|
||||
.collect::<Result<Vec<String>, String>>()?;
|
||||
|
||||
let event_ids = json
|
||||
.get("event_ids")
|
||||
.ok_or_else(|| "Missing 'event_ids' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'event_ids' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|id| EventId::from_hex(id.as_str().unwrap_or_default()).map_err(|e| e.to_string()))
|
||||
.collect::<Result<Vec<EventId>, String>>()?;
|
||||
|
||||
let words = json
|
||||
.get("words")
|
||||
.ok_or_else(|| "Missing 'words' field".to_string())?
|
||||
.as_array()
|
||||
.ok_or_else(|| "'words' must be an array".to_string())?
|
||||
.iter()
|
||||
.map(|word| {
|
||||
word.as_str()
|
||||
.map(|s| s.to_string())
|
||||
.ok_or_else(|| "Invalid word".to_string())
|
||||
})
|
||||
.collect::<Result<Vec<String>, String>>()?;
|
||||
|
||||
Ok(MuteList {
|
||||
public_keys,
|
||||
hashtags,
|
||||
event_ids,
|
||||
words,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1,9 +1,9 @@
|
||||
use tokio::sync::Mutex;
|
||||
use super::nostr_event_cache::Cache;
|
||||
use super::nostr_event_extensions::{RelayList, TimestampedMuteList};
|
||||
use super::notification_manager::EventSaver;
|
||||
use super::ExtendedEvent;
|
||||
use nostr_sdk::prelude::*;
|
||||
use super::nostr_event_cache::Cache;
|
||||
use tokio::sync::Mutex;
|
||||
use tokio::time::{timeout, Duration};
|
||||
|
||||
const NOTE_FETCH_TIMEOUT: Duration = Duration::from_secs(5);
|
||||
@ -11,13 +11,17 @@ const NOTE_FETCH_TIMEOUT: Duration = Duration::from_secs(5);
|
||||
pub struct NostrNetworkHelper {
|
||||
bootstrap_client: Client,
|
||||
cache: Mutex<Cache>,
|
||||
event_saver: EventSaver
|
||||
event_saver: EventSaver,
|
||||
}
|
||||
|
||||
impl NostrNetworkHelper {
|
||||
// MARK: - Initialization
|
||||
|
||||
pub async fn new(relay_url: String, cache_max_age: Duration, event_saver: EventSaver) -> Result<Self, Box<dyn std::error::Error>> {
|
||||
pub async fn new(
|
||||
relay_url: String,
|
||||
cache_max_age: Duration,
|
||||
event_saver: EventSaver,
|
||||
) -> Result<Self, Box<dyn std::error::Error>> {
|
||||
let client = Client::new(&Keys::generate());
|
||||
client.add_relay(relay_url.clone()).await?;
|
||||
client.connect().await;
|
||||
@ -54,7 +58,7 @@ impl NostrNetworkHelper {
|
||||
if let Ok(optional_mute_list) = cache_mutex_guard.get_mute_list(pubkey) {
|
||||
return optional_mute_list;
|
||||
}
|
||||
} // Release the lock here for improved performance
|
||||
} // Release the lock here for improved performance
|
||||
|
||||
// We don't have an answer from the cache, so we need to fetch it
|
||||
let mute_list_event = self.fetch_single_event(pubkey, Kind::MuteList).await;
|
||||
@ -69,10 +73,15 @@ impl NostrNetworkHelper {
|
||||
if let Ok(optional_relay_list) = cache_mutex_guard.get_relay_list(pubkey) {
|
||||
return optional_relay_list;
|
||||
}
|
||||
} // Release the lock here for improved performance
|
||||
} // Release the lock here for improved performance
|
||||
|
||||
// We don't have an answer from the cache, so we need to fetch it
|
||||
let relay_list_event = NostrNetworkHelper::fetch_single_event_from_client(pubkey, Kind::RelayList, &self.bootstrap_client).await;
|
||||
let relay_list_event = NostrNetworkHelper::fetch_single_event_from_client(
|
||||
pubkey,
|
||||
Kind::RelayList,
|
||||
&self.bootstrap_client,
|
||||
)
|
||||
.await;
|
||||
let mut cache_mutex_guard = self.cache.lock().await;
|
||||
cache_mutex_guard.add_optional_relay_list_with_author(pubkey, relay_list_event.as_ref());
|
||||
cache_mutex_guard.get_relay_list(pubkey).ok()?
|
||||
@ -84,12 +93,13 @@ impl NostrNetworkHelper {
|
||||
if let Ok(optional_contact_list) = cache_mutex_guard.get_contact_list(pubkey) {
|
||||
return optional_contact_list;
|
||||
}
|
||||
} // Release the lock here for improved performance
|
||||
} // Release the lock here for improved performance
|
||||
|
||||
// We don't have an answer from the cache, so we need to fetch it
|
||||
let contact_list_event = self.fetch_single_event(pubkey, Kind::ContactList).await;
|
||||
let mut cache_mutex_guard = self.cache.lock().await;
|
||||
cache_mutex_guard.add_optional_contact_list_with_author(pubkey, contact_list_event.as_ref());
|
||||
cache_mutex_guard
|
||||
.add_optional_contact_list_with_author(pubkey, contact_list_event.as_ref());
|
||||
cache_mutex_guard.get_contact_list(pubkey).ok()?
|
||||
}
|
||||
|
||||
@ -99,15 +109,24 @@ impl NostrNetworkHelper {
|
||||
let event = match self.make_client_for(author).await {
|
||||
Some(client) => {
|
||||
NostrNetworkHelper::fetch_single_event_from_client(author, kind, &client).await
|
||||
},
|
||||
}
|
||||
None => {
|
||||
NostrNetworkHelper::fetch_single_event_from_client(author, kind, &self.bootstrap_client).await
|
||||
},
|
||||
NostrNetworkHelper::fetch_single_event_from_client(
|
||||
author,
|
||||
kind,
|
||||
&self.bootstrap_client,
|
||||
)
|
||||
.await
|
||||
}
|
||||
};
|
||||
// Save event to our database if needed
|
||||
if let Some(event) = event.clone() {
|
||||
if let Err(error) = self.event_saver.save_if_needed(&event).await {
|
||||
log::warn!("Failed to save event '{:?}'. Error: {:?}", event.id.to_hex(), error)
|
||||
log::warn!(
|
||||
"Failed to save event '{:?}'. Error: {:?}",
|
||||
event.id.to_hex(),
|
||||
error
|
||||
)
|
||||
}
|
||||
}
|
||||
event
|
||||
@ -118,7 +137,8 @@ impl NostrNetworkHelper {
|
||||
|
||||
let relay_list = self.get_relay_list(author).await?;
|
||||
for (url, metadata) in relay_list {
|
||||
if metadata.map_or(true, |m| m == RelayMetadata::Write) { // Only add "write" relays, as per NIP-65 spec on reading data FROM user
|
||||
if metadata.map_or(true, |m| m == RelayMetadata::Write) {
|
||||
// Only add "write" relays, as per NIP-65 spec on reading data FROM user
|
||||
if let Err(e) = client.add_relay(url.clone()).await {
|
||||
log::warn!("Failed to add relay URL: {:?}, error: {:?}", url, e);
|
||||
}
|
||||
@ -130,7 +150,11 @@ impl NostrNetworkHelper {
|
||||
Some(client)
|
||||
}
|
||||
|
||||
async fn fetch_single_event_from_client(author: &PublicKey, kind: Kind, client: &Client) -> Option<Event> {
|
||||
async fn fetch_single_event_from_client(
|
||||
author: &PublicKey,
|
||||
kind: Kind,
|
||||
client: &Client,
|
||||
) -> Option<Event> {
|
||||
let subscription_filter = Filter::new()
|
||||
.kinds(vec![kind])
|
||||
.authors(vec![author.clone()])
|
||||
|
@ -10,10 +10,10 @@ use rusqlite;
|
||||
use rusqlite::params;
|
||||
use serde::Deserialize;
|
||||
use serde::Serialize;
|
||||
use tokio::sync::Mutex;
|
||||
use std::collections::HashSet;
|
||||
use std::sync::Arc;
|
||||
use tokio;
|
||||
use tokio::sync::Mutex;
|
||||
|
||||
use super::nostr_event_extensions::Codable;
|
||||
use super::nostr_event_extensions::MaybeConvertibleToMuteList;
|
||||
@ -34,12 +34,12 @@ pub struct NotificationManager {
|
||||
apns_topic: String,
|
||||
apns_client: Mutex<Client>,
|
||||
nostr_network_helper: NostrNetworkHelper,
|
||||
pub event_saver: EventSaver
|
||||
pub event_saver: EventSaver,
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct EventSaver {
|
||||
db: Arc<Mutex<r2d2::Pool<SqliteConnectionManager>>>
|
||||
db: Arc<Mutex<r2d2::Pool<SqliteConnectionManager>>>,
|
||||
}
|
||||
|
||||
impl EventSaver {
|
||||
@ -47,32 +47,46 @@ impl EventSaver {
|
||||
Self { db }
|
||||
}
|
||||
|
||||
pub async fn save_if_needed(&self, event: &nostr::Event) -> Result<bool, Box<dyn std::error::Error>> {
|
||||
pub async fn save_if_needed(
|
||||
&self,
|
||||
event: &nostr::Event,
|
||||
) -> Result<bool, Box<dyn std::error::Error>> {
|
||||
match event.to_mute_list() {
|
||||
Some(mute_list) => {
|
||||
match self.get_saved_mute_list_for(event.author()).await.ok().flatten() {
|
||||
match self
|
||||
.get_saved_mute_list_for(event.author())
|
||||
.await
|
||||
.ok()
|
||||
.flatten()
|
||||
{
|
||||
Some(saved_timestamped_mute_list) => {
|
||||
let saved_mute_list_timestamp = saved_timestamped_mute_list.timestamp;
|
||||
if saved_mute_list_timestamp < event.created_at() {
|
||||
self.save_mute_list(event.author(), mute_list, event.created_at).await?;
|
||||
self.save_mute_list(event.author(), mute_list, event.created_at)
|
||||
.await?;
|
||||
} else {
|
||||
return Ok(false);
|
||||
}
|
||||
else {
|
||||
return Ok(false)
|
||||
}
|
||||
},
|
||||
}
|
||||
None => {
|
||||
self.save_mute_list(event.author(), mute_list, event.created_at).await?;
|
||||
self.save_mute_list(event.author(), mute_list, event.created_at)
|
||||
.await?;
|
||||
}
|
||||
}
|
||||
Ok(true)
|
||||
},
|
||||
}
|
||||
None => Ok(false),
|
||||
}
|
||||
}
|
||||
|
||||
// MARK: - Muting preferences
|
||||
|
||||
pub async fn save_mute_list(&self, pubkey: PublicKey, mute_list: MuteList, created_at: Timestamp) -> Result<(), Box<dyn std::error::Error>> {
|
||||
pub async fn save_mute_list(
|
||||
&self,
|
||||
pubkey: PublicKey,
|
||||
mute_list: MuteList,
|
||||
created_at: Timestamp,
|
||||
) -> Result<(), Box<dyn std::error::Error>> {
|
||||
let mute_list_json = mute_list.to_json()?;
|
||||
let db_mutex_guard = self.db.lock().await;
|
||||
let connection = db_mutex_guard.get()?;
|
||||
@ -92,7 +106,10 @@ impl EventSaver {
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub async fn get_saved_mute_list_for(&self, pubkey: PublicKey) -> Result<Option<TimestampedMuteList>, Box<dyn std::error::Error>> {
|
||||
pub async fn get_saved_mute_list_for(
|
||||
&self,
|
||||
pubkey: PublicKey,
|
||||
) -> Result<Option<TimestampedMuteList>, Box<dyn std::error::Error>> {
|
||||
let db_mutex_guard = self.db.lock().await;
|
||||
let connection = db_mutex_guard.get()?;
|
||||
|
||||
@ -100,7 +117,10 @@ impl EventSaver {
|
||||
"SELECT mute_list, created_at FROM muting_preferences WHERE user_pubkey = ?",
|
||||
)?;
|
||||
|
||||
let mute_list_info: (serde_json::Value, nostr::Timestamp) = match stmt.query_row([pubkey.to_sql_string()], |row| { Ok((row.get(0)?, row.get(1)?)) }) {
|
||||
let mute_list_info: (serde_json::Value, nostr::Timestamp) = match stmt
|
||||
.query_row([pubkey.to_sql_string()], |row| {
|
||||
Ok((row.get(0)?, row.get(1)?))
|
||||
}) {
|
||||
Ok(info) => (info.0, nostr::Timestamp::from_sql_string(info.1)?),
|
||||
Err(rusqlite::Error::QueryReturnedNoRows) => return Ok(None),
|
||||
Err(e) => return Err(e.into()),
|
||||
@ -109,7 +129,7 @@ impl EventSaver {
|
||||
let mute_list = MuteList::from_json(mute_list_info.0)?;
|
||||
let timestamped_mute_list = TimestampedMuteList {
|
||||
mute_list,
|
||||
timestamp: mute_list_info.1
|
||||
timestamp: mute_list_info.1,
|
||||
};
|
||||
|
||||
Ok(Some(timestamped_mute_list))
|
||||
@ -148,7 +168,12 @@ impl NotificationManager {
|
||||
db,
|
||||
apns_topic,
|
||||
apns_client: Mutex::new(client),
|
||||
nostr_network_helper: NostrNetworkHelper::new(relay_url.clone(), cache_max_age, event_saver.clone()).await?,
|
||||
nostr_network_helper: NostrNetworkHelper::new(
|
||||
relay_url.clone(),
|
||||
cache_max_age,
|
||||
event_saver.clone(),
|
||||
)
|
||||
.await?,
|
||||
event_saver,
|
||||
};
|
||||
|
||||
@ -194,12 +219,48 @@ impl NotificationManager {
|
||||
|
||||
// Notification settings migration (https://github.com/damus-io/damus/issues/2360)
|
||||
|
||||
Self::add_column_if_not_exists(&db, "user_info", "zap_notifications_enabled", "BOOLEAN", Some("true"))?;
|
||||
Self::add_column_if_not_exists(&db, "user_info", "mention_notifications_enabled", "BOOLEAN", Some("true"))?;
|
||||
Self::add_column_if_not_exists(&db, "user_info", "repost_notifications_enabled", "BOOLEAN", Some("true"))?;
|
||||
Self::add_column_if_not_exists(&db, "user_info", "reaction_notifications_enabled", "BOOLEAN", Some("true"))?;
|
||||
Self::add_column_if_not_exists(&db, "user_info", "dm_notifications_enabled", "BOOLEAN", Some("true"))?;
|
||||
Self::add_column_if_not_exists(&db, "user_info", "only_notifications_from_following_enabled", "BOOLEAN", Some("false"))?;
|
||||
Self::add_column_if_not_exists(
|
||||
&db,
|
||||
"user_info",
|
||||
"zap_notifications_enabled",
|
||||
"BOOLEAN",
|
||||
Some("true"),
|
||||
)?;
|
||||
Self::add_column_if_not_exists(
|
||||
&db,
|
||||
"user_info",
|
||||
"mention_notifications_enabled",
|
||||
"BOOLEAN",
|
||||
Some("true"),
|
||||
)?;
|
||||
Self::add_column_if_not_exists(
|
||||
&db,
|
||||
"user_info",
|
||||
"repost_notifications_enabled",
|
||||
"BOOLEAN",
|
||||
Some("true"),
|
||||
)?;
|
||||
Self::add_column_if_not_exists(
|
||||
&db,
|
||||
"user_info",
|
||||
"reaction_notifications_enabled",
|
||||
"BOOLEAN",
|
||||
Some("true"),
|
||||
)?;
|
||||
Self::add_column_if_not_exists(
|
||||
&db,
|
||||
"user_info",
|
||||
"dm_notifications_enabled",
|
||||
"BOOLEAN",
|
||||
Some("true"),
|
||||
)?;
|
||||
Self::add_column_if_not_exists(
|
||||
&db,
|
||||
"user_info",
|
||||
"only_notifications_from_following_enabled",
|
||||
"BOOLEAN",
|
||||
Some("false"),
|
||||
)?;
|
||||
|
||||
// Migration related to mute list improvements (https://github.com/damus-io/damus/issues/2118)
|
||||
|
||||
@ -232,7 +293,10 @@ impl NotificationManager {
|
||||
if !column_names.contains(&column_name.to_string()) {
|
||||
let query = format!(
|
||||
"ALTER TABLE {} ADD COLUMN {} {} {}",
|
||||
table_name, column_name, column_type, match default_value {
|
||||
table_name,
|
||||
column_name,
|
||||
column_type,
|
||||
match default_value {
|
||||
Some(value) => format!("DEFAULT {}", value),
|
||||
None => "".to_string(),
|
||||
},
|
||||
@ -319,12 +383,12 @@ impl NotificationManager {
|
||||
}
|
||||
let pubkeys_that_received_notification =
|
||||
notification_status.pubkeys_that_received_notification();
|
||||
let relevant_pubkeys_yet_to_receive: HashSet<PublicKey> = relevant_pubkeys_that_are_registered
|
||||
.difference(&pubkeys_that_received_notification)
|
||||
.filter(|&x| *x != event.pubkey)
|
||||
.cloned()
|
||||
.collect();
|
||||
|
||||
let relevant_pubkeys_yet_to_receive: HashSet<PublicKey> =
|
||||
relevant_pubkeys_that_are_registered
|
||||
.difference(&pubkeys_that_received_notification)
|
||||
.filter(|&x| *x != event.pubkey)
|
||||
.cloned()
|
||||
.collect();
|
||||
|
||||
let mut pubkeys_to_notify = HashSet::new();
|
||||
for pubkey in relevant_pubkeys_yet_to_receive {
|
||||
@ -340,39 +404,49 @@ impl NotificationManager {
|
||||
}
|
||||
|
||||
async fn should_mute_notification_for_pubkey(&self, event: &Event, pubkey: &PublicKey) -> bool {
|
||||
let latest_mute_list = self.get_newest_mute_list_available(pubkey).await.ok().flatten();
|
||||
let latest_mute_list = self
|
||||
.get_newest_mute_list_available(pubkey)
|
||||
.await
|
||||
.ok()
|
||||
.flatten();
|
||||
if let Some(latest_mute_list) = latest_mute_list {
|
||||
return should_mute_notification_for_mutelist(event, &latest_mute_list)
|
||||
return should_mute_notification_for_mutelist(event, &latest_mute_list);
|
||||
}
|
||||
return false
|
||||
return false;
|
||||
}
|
||||
|
||||
async fn get_newest_mute_list_available(&self, pubkey: &PublicKey) -> Result<Option<MuteList>, Box<dyn std::error::Error>> {
|
||||
async fn get_newest_mute_list_available(
|
||||
&self,
|
||||
pubkey: &PublicKey,
|
||||
) -> Result<Option<MuteList>, Box<dyn std::error::Error>> {
|
||||
let timestamped_saved_mute_list = self.event_saver.get_saved_mute_list_for(*pubkey).await?;
|
||||
let timestamped_network_mute_list = self.nostr_network_helper.get_public_mute_list(pubkey).await;
|
||||
Ok(match (timestamped_saved_mute_list, timestamped_network_mute_list) {
|
||||
(Some(local_mute), Some(network_mute)) => {
|
||||
if local_mute.timestamp > network_mute.timestamp {
|
||||
log::debug!("Mute lists available in both database and from the network for pubkey {}. Using local mute list since it's newer.", pubkey.to_hex());
|
||||
let timestamped_network_mute_list =
|
||||
self.nostr_network_helper.get_public_mute_list(pubkey).await;
|
||||
Ok(
|
||||
match (timestamped_saved_mute_list, timestamped_network_mute_list) {
|
||||
(Some(local_mute), Some(network_mute)) => {
|
||||
if local_mute.timestamp > network_mute.timestamp {
|
||||
log::debug!("Mute lists available in both database and from the network for pubkey {}. Using local mute list since it's newer.", pubkey.to_hex());
|
||||
Some(local_mute.mute_list)
|
||||
} else {
|
||||
log::debug!("Mute lists available in both database and from the network for pubkey {}. Using network mute list since it's newer.", pubkey.to_hex());
|
||||
Some(network_mute.mute_list)
|
||||
}
|
||||
}
|
||||
(Some(local_mute), None) => {
|
||||
log::debug!("Mute list available in database for pubkey {}, but not from the network. Using local mute list.", pubkey.to_hex());
|
||||
Some(local_mute.mute_list)
|
||||
} else {
|
||||
log::debug!("Mute lists available in both database and from the network for pubkey {}. Using network mute list since it's newer.", pubkey.to_hex());
|
||||
}
|
||||
(None, Some(network_mute)) => {
|
||||
log::debug!("Mute list for pubkey {} available from the network, but not in the database. Using network mute list.", pubkey.to_hex());
|
||||
Some(network_mute.mute_list)
|
||||
}
|
||||
(None, None) => {
|
||||
log::debug!("No mute list available for pubkey {}", pubkey.to_hex());
|
||||
None
|
||||
}
|
||||
},
|
||||
(Some(local_mute), None) => {
|
||||
log::debug!("Mute list available in database for pubkey {}, but not from the network. Using local mute list.", pubkey.to_hex());
|
||||
Some(local_mute.mute_list)
|
||||
},
|
||||
(None, Some(network_mute)) => {
|
||||
log::debug!("Mute list for pubkey {} available from the network, but not in the database. Using network mute list.", pubkey.to_hex());
|
||||
Some(network_mute.mute_list)
|
||||
},
|
||||
(None, None) => {
|
||||
log::debug!("No mute list available for pubkey {}", pubkey.to_hex());
|
||||
None
|
||||
},
|
||||
})
|
||||
)
|
||||
}
|
||||
|
||||
async fn pubkeys_relevant_to_event(
|
||||
@ -382,8 +456,9 @@ impl NotificationManager {
|
||||
let mut relevant_pubkeys = event.relevant_pubkeys();
|
||||
let referenced_event_ids = event.referenced_event_ids();
|
||||
for referenced_event_id in referenced_event_ids {
|
||||
let pubkeys_relevant_to_referenced_event =
|
||||
self.pubkeys_subscribed_to_event_id(&referenced_event_id).await?;
|
||||
let pubkeys_relevant_to_referenced_event = self
|
||||
.pubkeys_subscribed_to_event_id(&referenced_event_id)
|
||||
.await?;
|
||||
relevant_pubkeys.extend(pubkeys_relevant_to_referenced_event);
|
||||
}
|
||||
Ok(relevant_pubkeys)
|
||||
@ -411,7 +486,10 @@ impl NotificationManager {
|
||||
) -> Result<(), Box<dyn std::error::Error>> {
|
||||
let user_device_tokens = self.get_user_device_tokens(pubkey).await?;
|
||||
for device_token in user_device_tokens {
|
||||
if !self.user_wants_notification(pubkey, device_token.clone(), event).await? {
|
||||
if !self
|
||||
.user_wants_notification(pubkey, device_token.clone(), event)
|
||||
.await?
|
||||
{
|
||||
continue;
|
||||
}
|
||||
self.send_event_notification_to_device_token(event, &device_token)
|
||||
@ -426,14 +504,20 @@ impl NotificationManager {
|
||||
device_token: String,
|
||||
event: &Event,
|
||||
) -> Result<bool, Box<dyn std::error::Error>> {
|
||||
let notification_preferences = self.get_user_notification_settings(pubkey, device_token).await?;
|
||||
let notification_preferences = self
|
||||
.get_user_notification_settings(pubkey, device_token)
|
||||
.await?;
|
||||
if notification_preferences.only_notifications_from_following_enabled {
|
||||
if !self.nostr_network_helper.does_pubkey_follow_pubkey(pubkey, &event.author()).await {
|
||||
if !self
|
||||
.nostr_network_helper
|
||||
.does_pubkey_follow_pubkey(pubkey, &event.author())
|
||||
.await
|
||||
{
|
||||
return Ok(false);
|
||||
}
|
||||
}
|
||||
match event.kind {
|
||||
Kind::TextNote => Ok(notification_preferences.mention_notifications_enabled), // TODO: Not 100% accurate
|
||||
Kind::TextNote => Ok(notification_preferences.mention_notifications_enabled), // TODO: Not 100% accurate
|
||||
Kind::EncryptedDirectMessage => Ok(notification_preferences.dm_notifications_enabled),
|
||||
Kind::Repost => Ok(notification_preferences.repost_notifications_enabled),
|
||||
Kind::GenericRepost => Ok(notification_preferences.repost_notifications_enabled),
|
||||
@ -523,14 +607,20 @@ impl NotificationManager {
|
||||
.build(device_token, Default::default());
|
||||
|
||||
payload.options.apns_topic = Some(self.apns_topic.as_str());
|
||||
payload.data.insert("nostr_event", serde_json::Value::String(event.try_as_json()?));
|
||||
|
||||
payload.data.insert(
|
||||
"nostr_event",
|
||||
serde_json::Value::String(event.try_as_json()?),
|
||||
);
|
||||
|
||||
let apns_client_mutex_guard = self.apns_client.lock().await;
|
||||
|
||||
match apns_client_mutex_guard.send(payload).await {
|
||||
Ok(_response) => {},
|
||||
Err(e) => log::error!("Failed to send notification to device token '{}': {}", device_token, e),
|
||||
Ok(_response) => {}
|
||||
Err(e) => log::error!(
|
||||
"Failed to send notification to device token '{}': {}",
|
||||
device_token,
|
||||
e
|
||||
),
|
||||
}
|
||||
|
||||
log::info!("Notification sent to device token: {}", device_token);
|
||||
@ -542,7 +632,10 @@ impl NotificationManager {
|
||||
// NOTE: This is simple because the client will handle formatting. These are just fallbacks.
|
||||
let (title, body) = match event.kind {
|
||||
nostr_sdk::Kind::TextNote => ("New activity".to_string(), event.content.clone()),
|
||||
nostr_sdk::Kind::EncryptedDirectMessage => ("New direct message".to_string(), "Contents are encrypted".to_string()),
|
||||
nostr_sdk::Kind::EncryptedDirectMessage => (
|
||||
"New direct message".to_string(),
|
||||
"Contents are encrypted".to_string(),
|
||||
),
|
||||
nostr_sdk::Kind::Repost => ("Someone reposted".to_string(), event.content.clone()),
|
||||
nostr_sdk::Kind::Reaction => {
|
||||
let content_text = event.content.clone();
|
||||
@ -553,8 +646,11 @@ impl NotificationManager {
|
||||
_ => content_text.as_str(),
|
||||
};
|
||||
("New reaction".to_string(), formatted_text.to_string())
|
||||
},
|
||||
nostr_sdk::Kind::ZapPrivateMessage => ("New zap private message".to_string(), "Contents are encrypted".to_string()),
|
||||
}
|
||||
nostr_sdk::Kind::ZapPrivateMessage => (
|
||||
"New zap private message".to_string(),
|
||||
"Contents are encrypted".to_string(),
|
||||
),
|
||||
nostr_sdk::Kind::ZapReceipt => ("Someone zapped you".to_string(), "".to_string()),
|
||||
_ => ("New activity".to_string(), "".to_string()),
|
||||
};
|
||||
@ -568,7 +664,10 @@ impl NotificationManager {
|
||||
pubkey: nostr::PublicKey,
|
||||
device_token: &str,
|
||||
) -> Result<(), Box<dyn std::error::Error>> {
|
||||
if self.is_pubkey_token_pair_registered(&pubkey, &device_token).await? {
|
||||
if self
|
||||
.is_pubkey_token_pair_registered(&pubkey, &device_token)
|
||||
.await?
|
||||
{
|
||||
return Ok(());
|
||||
}
|
||||
self.save_user_device_info(pubkey, device_token).await
|
||||
@ -616,17 +715,16 @@ impl NotificationManager {
|
||||
let mut stmt = connection.prepare(
|
||||
"SELECT zap_notifications_enabled, mention_notifications_enabled, repost_notifications_enabled, reaction_notifications_enabled, dm_notifications_enabled, only_notifications_from_following_enabled FROM user_info WHERE pubkey = ? AND device_token = ?",
|
||||
)?;
|
||||
let settings = stmt
|
||||
.query_row([pubkey.to_sql_string(), device_token], |row| {
|
||||
Ok(UserNotificationSettings {
|
||||
zap_notifications_enabled: row.get(0)?,
|
||||
mention_notifications_enabled: row.get(1)?,
|
||||
repost_notifications_enabled: row.get(2)?,
|
||||
reaction_notifications_enabled: row.get(3)?,
|
||||
dm_notifications_enabled: row.get(4)?,
|
||||
only_notifications_from_following_enabled: row.get(5)?,
|
||||
})
|
||||
})?;
|
||||
let settings = stmt.query_row([pubkey.to_sql_string(), device_token], |row| {
|
||||
Ok(UserNotificationSettings {
|
||||
zap_notifications_enabled: row.get(0)?,
|
||||
mention_notifications_enabled: row.get(1)?,
|
||||
repost_notifications_enabled: row.get(2)?,
|
||||
reaction_notifications_enabled: row.get(3)?,
|
||||
dm_notifications_enabled: row.get(4)?,
|
||||
only_notifications_from_following_enabled: row.get(5)?,
|
||||
})
|
||||
})?;
|
||||
|
||||
Ok(settings)
|
||||
}
|
||||
@ -663,7 +761,7 @@ pub struct UserNotificationSettings {
|
||||
repost_notifications_enabled: bool,
|
||||
reaction_notifications_enabled: bool,
|
||||
dm_notifications_enabled: bool,
|
||||
only_notifications_from_following_enabled: bool
|
||||
only_notifications_from_following_enabled: bool,
|
||||
}
|
||||
|
||||
struct NotificationStatus {
|
||||
|
@ -1,21 +1,15 @@
|
||||
use super::nostr_event_extensions::ExtendedEvent;
|
||||
use nostr::nips::nip51::MuteList;
|
||||
use nostr_sdk::Event;
|
||||
use super::nostr_event_extensions::ExtendedEvent;
|
||||
|
||||
|
||||
pub fn should_mute_notification_for_mutelist(
|
||||
event: &Event,
|
||||
mute_list: &MuteList,
|
||||
) -> bool {
|
||||
pub fn should_mute_notification_for_mutelist(event: &Event, mute_list: &MuteList) -> bool {
|
||||
for muted_public_key in &mute_list.public_keys {
|
||||
if event.pubkey == *muted_public_key {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
for muted_event_id in &mute_list.event_ids {
|
||||
if event.id == *muted_event_id
|
||||
|| event.referenced_event_ids().contains(&muted_event_id)
|
||||
{
|
||||
if event.id == *muted_event_id || event.referenced_event_ids().contains(&muted_event_id) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
@ -104,8 +104,13 @@ impl RelayConnection {
|
||||
ClientMessage::Event(event) => {
|
||||
log::info!("Received event with id: {:?}", event.id.to_hex());
|
||||
log::debug!("Event received: {:?}", event);
|
||||
self.notification_manager.event_saver.save_if_needed(&event).await?;
|
||||
self.notification_manager.send_notifications_if_needed(&event).await?;
|
||||
self.notification_manager
|
||||
.event_saver
|
||||
.save_if_needed(&event)
|
||||
.await?;
|
||||
self.notification_manager
|
||||
.send_notifications_if_needed(&event)
|
||||
.await?;
|
||||
let notice_message = format!("blocked: This relay does not store events");
|
||||
let response = RelayMessage::Ok {
|
||||
event_id: event.id,
|
||||
|
Reference in New Issue
Block a user