2012-10-21 15:02:20 -04:00
|
|
|
/*
|
2016-05-05 17:10:10 -04:00
|
|
|
* session.c
|
2019-11-13 06:11:05 -05:00
|
|
|
* vim: expandtab:ts=4:sts=4:sw=4
|
2012-02-20 15:07:38 -05:00
|
|
|
*
|
2019-01-22 05:31:45 -05:00
|
|
|
* Copyright (C) 2012 - 2019 James Booth <boothj5@gmail.com>
|
2012-10-21 15:02:20 -04:00
|
|
|
*
|
2012-02-20 15:07:38 -05:00
|
|
|
* This file is part of Profanity.
|
|
|
|
*
|
|
|
|
* Profanity is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Profanity is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-07-23 20:14:49 -04:00
|
|
|
* along with Profanity. If not, see <https://www.gnu.org/licenses/>.
|
2012-02-20 15:07:38 -05:00
|
|
|
*
|
2014-08-24 15:57:39 -04:00
|
|
|
* In addition, as a special exception, the copyright holders give permission to
|
|
|
|
* link the code of portions of this program with the OpenSSL library under
|
|
|
|
* certain conditions as described in each individual source file, and
|
|
|
|
* distribute linked combinations including the two.
|
|
|
|
*
|
|
|
|
* You must obey the GNU General Public License in all respects for all of the
|
|
|
|
* code used other than OpenSSL. If you modify file(s) with this exception, you
|
|
|
|
* may extend this exception to your version of the file(s), but you are not
|
|
|
|
* obligated to do so. If you do not wish to do so, delete this exception
|
|
|
|
* statement from your version. If you delete this exception statement from all
|
|
|
|
* source files in the program, then also delete it here.
|
|
|
|
*
|
2012-02-20 15:07:38 -05:00
|
|
|
*/
|
|
|
|
|
2016-03-31 16:05:02 -04:00
|
|
|
#include "config.h"
|
2015-09-21 16:40:04 -04:00
|
|
|
|
2013-02-02 15:55:58 -05:00
|
|
|
#include <assert.h>
|
2012-02-05 18:29:09 -05:00
|
|
|
#include <string.h>
|
2020-07-07 07:53:30 -04:00
|
|
|
#include <stdlib.h>
|
2012-08-25 20:50:50 -04:00
|
|
|
|
2020-07-07 07:53:30 -04:00
|
|
|
#include "profanity.h"
|
|
|
|
#include "log.h"
|
2012-08-22 20:08:06 -04:00
|
|
|
#include "common.h"
|
2013-02-02 16:59:29 -05:00
|
|
|
#include "config/preferences.h"
|
2016-02-14 17:28:55 -05:00
|
|
|
#include "plugins/plugins.h"
|
2020-07-07 07:53:30 -04:00
|
|
|
#include "event/server_events.h"
|
|
|
|
#include "event/client_events.h"
|
2016-05-05 18:51:49 -04:00
|
|
|
#include "xmpp/bookmark.h"
|
2020-07-07 07:53:30 -04:00
|
|
|
#include "xmpp/blocking.h"
|
2016-07-24 10:43:51 -04:00
|
|
|
#include "xmpp/connection.h"
|
2020-07-07 07:53:30 -04:00
|
|
|
#include "xmpp/capabilities.h"
|
|
|
|
#include "xmpp/session.h"
|
2013-02-02 15:55:58 -05:00
|
|
|
#include "xmpp/iq.h"
|
|
|
|
#include "xmpp/message.h"
|
|
|
|
#include "xmpp/presence.h"
|
2013-05-06 16:53:59 -04:00
|
|
|
#include "xmpp/roster.h"
|
2013-02-02 15:55:58 -05:00
|
|
|
#include "xmpp/stanza.h"
|
|
|
|
#include "xmpp/xmpp.h"
|
2020-07-07 07:53:30 -04:00
|
|
|
#include "xmpp/muc.h"
|
|
|
|
#include "xmpp/chat_session.h"
|
|
|
|
#include "xmpp/jid.h"
|
2012-02-05 18:29:09 -05:00
|
|
|
|
2019-02-21 00:04:47 -05:00
|
|
|
#ifdef HAVE_OMEMO
|
2019-02-21 13:04:01 -05:00
|
|
|
#include "omemo/omemo.h"
|
2019-02-21 00:04:47 -05:00
|
|
|
#include "xmpp/omemo.h"
|
|
|
|
#endif
|
|
|
|
|
2012-11-24 21:14:38 -05:00
|
|
|
// for auto reconnect
|
2020-07-07 08:18:57 -04:00
|
|
|
static struct
|
|
|
|
{
|
|
|
|
char* name;
|
|
|
|
char* passwd;
|
2013-01-27 15:23:42 -05:00
|
|
|
} saved_account;
|
|
|
|
|
2020-07-07 08:18:57 -04:00
|
|
|
static struct
|
|
|
|
{
|
|
|
|
char* name;
|
|
|
|
char* jid;
|
|
|
|
char* passwd;
|
|
|
|
char* altdomain;
|
2014-01-17 20:45:05 -05:00
|
|
|
int port;
|
2020-07-07 08:18:57 -04:00
|
|
|
char* tls_policy;
|
|
|
|
char* auth_policy;
|
2013-01-27 15:23:42 -05:00
|
|
|
} saved_details;
|
2013-01-12 15:53:07 -05:00
|
|
|
|
2016-07-24 11:06:19 -04:00
|
|
|
typedef enum {
|
|
|
|
ACTIVITY_ST_ACTIVE,
|
|
|
|
ACTIVITY_ST_IDLE,
|
|
|
|
ACTIVITY_ST_AWAY,
|
|
|
|
ACTIVITY_ST_XA,
|
|
|
|
} activity_state_t;
|
|
|
|
|
2020-07-07 08:18:57 -04:00
|
|
|
static GTimer* reconnect_timer;
|
2016-07-24 11:06:19 -04:00
|
|
|
static activity_state_t activity_state;
|
|
|
|
static resource_presence_t saved_presence;
|
2020-07-07 08:18:57 -04:00
|
|
|
static char* saved_status;
|
2012-11-24 21:14:38 -05:00
|
|
|
|
2022-01-27 09:48:57 -05:00
|
|
|
static void _session_free_internals(void);
|
2016-05-05 19:53:03 -04:00
|
|
|
static void _session_free_saved_details(void);
|
2013-02-27 15:46:44 -05:00
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2016-05-05 19:53:03 -04:00
|
|
|
session_init(void)
|
2012-02-26 12:59:04 -05:00
|
|
|
{
|
2012-08-25 19:54:18 -04:00
|
|
|
log_info("Initialising XMPP");
|
2016-05-05 18:51:49 -04:00
|
|
|
connection_init();
|
2013-05-05 19:33:33 -04:00
|
|
|
presence_sub_requests_init();
|
2013-02-03 17:46:32 -05:00
|
|
|
caps_init();
|
2012-02-26 12:59:04 -05:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
jabber_conn_status_t
|
2020-07-07 08:18:57 -04:00
|
|
|
session_connect_with_account(const ProfAccount* const account)
|
2013-01-27 15:23:42 -05:00
|
|
|
{
|
2013-02-03 18:46:20 -05:00
|
|
|
assert(account != NULL);
|
|
|
|
|
|
|
|
log_info("Connecting using account: %s", account->name);
|
|
|
|
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_internals();
|
2019-06-03 06:11:41 -04:00
|
|
|
|
2013-02-03 18:46:20 -05:00
|
|
|
// save account name and password for reconnect
|
2013-01-27 15:23:42 -05:00
|
|
|
saved_account.name = strdup(account->name);
|
2013-10-14 14:15:51 -04:00
|
|
|
saved_account.passwd = strdup(account->password);
|
2013-01-27 15:23:42 -05:00
|
|
|
|
2023-07-11 07:23:58 -04:00
|
|
|
auto_char char* jid = NULL;
|
2016-11-21 19:39:52 -05:00
|
|
|
if (account->resource) {
|
2023-07-13 09:11:30 -04:00
|
|
|
auto_jid Jid* jidp = jid_create_from_bare_and_resource(account->jid, account->resource);
|
2016-11-21 19:39:52 -05:00
|
|
|
jid = strdup(jidp->fulljid);
|
|
|
|
} else {
|
|
|
|
jid = strdup(account->jid);
|
|
|
|
}
|
|
|
|
|
2016-05-10 18:34:25 -04:00
|
|
|
jabber_conn_status_t result = connection_connect(
|
2016-11-21 19:39:52 -05:00
|
|
|
jid,
|
2016-05-10 18:34:25 -04:00
|
|
|
account->password,
|
|
|
|
account->server,
|
|
|
|
account->port,
|
2020-02-26 18:22:05 -05:00
|
|
|
account->tls_policy,
|
|
|
|
account->auth_policy);
|
2013-01-27 15:23:42 -05:00
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
jabber_conn_status_t
|
2020-07-07 08:18:57 -04:00
|
|
|
session_connect_with_details(const char* const jid, const char* const passwd, const char* const altdomain,
|
|
|
|
const int port, const char* const tls_policy, const char* const auth_policy)
|
2013-01-27 15:23:42 -05:00
|
|
|
{
|
2013-02-03 18:59:04 -05:00
|
|
|
assert(jid != NULL);
|
|
|
|
assert(passwd != NULL);
|
|
|
|
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_internals();
|
2019-06-03 06:11:41 -04:00
|
|
|
|
2013-02-03 18:59:04 -05:00
|
|
|
// save details for reconnect, remember name for account creating on success
|
2013-01-27 15:23:42 -05:00
|
|
|
saved_details.name = strdup(jid);
|
|
|
|
saved_details.passwd = strdup(passwd);
|
2015-05-04 18:16:44 -04:00
|
|
|
if (altdomain) {
|
2013-01-27 15:23:42 -05:00
|
|
|
saved_details.altdomain = strdup(altdomain);
|
|
|
|
} else {
|
|
|
|
saved_details.altdomain = NULL;
|
|
|
|
}
|
2014-01-17 20:45:05 -05:00
|
|
|
if (port != 0) {
|
|
|
|
saved_details.port = port;
|
|
|
|
} else {
|
|
|
|
saved_details.port = 0;
|
|
|
|
}
|
2015-10-17 22:06:23 -04:00
|
|
|
if (tls_policy) {
|
|
|
|
saved_details.tls_policy = strdup(tls_policy);
|
|
|
|
} else {
|
|
|
|
saved_details.tls_policy = NULL;
|
|
|
|
}
|
2020-02-26 18:22:05 -05:00
|
|
|
if (auth_policy) {
|
|
|
|
saved_details.auth_policy = strdup(auth_policy);
|
|
|
|
} else {
|
|
|
|
saved_details.auth_policy = NULL;
|
|
|
|
}
|
2013-01-27 15:23:42 -05:00
|
|
|
|
2013-02-03 18:59:04 -05:00
|
|
|
// use 'profanity' when no resourcepart in provided jid
|
2023-07-13 09:11:30 -04:00
|
|
|
auto_jid Jid* jidp = jid_create(jid);
|
2013-01-27 15:23:42 -05:00
|
|
|
if (jidp->resourcepart == NULL) {
|
2023-07-13 11:04:59 -04:00
|
|
|
auto_gchar gchar* resource = jid_random_resource();
|
2023-07-13 09:11:30 -04:00
|
|
|
jid_destroy(jidp);
|
2019-04-12 05:46:01 -04:00
|
|
|
jidp = jid_create_from_bare_and_resource(jid, resource);
|
2013-01-27 15:23:42 -05:00
|
|
|
saved_details.jid = strdup(jidp->fulljid);
|
|
|
|
} else {
|
|
|
|
saved_details.jid = strdup(jid);
|
|
|
|
}
|
|
|
|
|
2013-02-03 18:59:04 -05:00
|
|
|
// connect with fulljid
|
2013-01-27 15:23:42 -05:00
|
|
|
log_info("Connecting without account, JID: %s", saved_details.jid);
|
2015-11-10 20:25:10 -05:00
|
|
|
|
2016-05-05 21:08:10 -04:00
|
|
|
return connection_connect(
|
2015-10-17 22:06:23 -04:00
|
|
|
saved_details.jid,
|
|
|
|
passwd,
|
|
|
|
saved_details.altdomain,
|
|
|
|
saved_details.port,
|
2020-02-26 18:22:05 -05:00
|
|
|
saved_details.tls_policy,
|
|
|
|
saved_details.auth_policy);
|
2013-01-27 15:23:42 -05:00
|
|
|
}
|
|
|
|
|
2015-12-30 20:48:04 -05:00
|
|
|
void
|
2016-05-05 19:53:03 -04:00
|
|
|
session_autoping_fail(void)
|
2015-12-30 20:48:04 -05:00
|
|
|
{
|
2016-05-05 19:53:03 -04:00
|
|
|
session_lost_connection();
|
2015-12-30 20:48:04 -05:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2016-05-05 19:53:03 -04:00
|
|
|
session_disconnect(void)
|
2012-02-06 19:08:59 -05:00
|
|
|
{
|
2012-09-11 17:55:59 -04:00
|
|
|
// if connected, send end stream and wait for response
|
2016-05-05 18:51:49 -04:00
|
|
|
if (connection_get_status() == JABBER_CONNECTED) {
|
2016-05-10 18:18:11 -04:00
|
|
|
log_info("Closing connection");
|
2016-05-10 19:02:39 -04:00
|
|
|
|
2023-11-14 08:55:29 -05:00
|
|
|
plugins_on_disconnect(session_get_account_name(), connection_get_fulljid());
|
2016-05-10 19:02:39 -04:00
|
|
|
|
2016-05-05 19:53:03 -04:00
|
|
|
accounts_set_last_activity(session_get_account_name());
|
2016-05-10 19:02:39 -04:00
|
|
|
|
2018-02-05 15:30:20 -05:00
|
|
|
iq_rooms_cache_clear();
|
2019-06-19 17:37:54 -04:00
|
|
|
iq_handlers_clear();
|
2018-02-05 15:30:20 -05:00
|
|
|
|
2016-05-10 18:18:11 -04:00
|
|
|
connection_disconnect();
|
2019-06-19 17:49:04 -04:00
|
|
|
message_handlers_clear();
|
2016-05-10 19:02:39 -04:00
|
|
|
|
2016-05-10 18:53:44 -04:00
|
|
|
connection_clear_data();
|
2016-05-10 17:49:58 -04:00
|
|
|
chat_sessions_clear();
|
|
|
|
presence_clear_sub_requests();
|
2012-02-19 20:42:29 -05:00
|
|
|
}
|
2013-02-03 18:46:20 -05:00
|
|
|
|
2016-05-10 19:02:39 -04:00
|
|
|
connection_set_disconnected();
|
2012-02-06 19:08:59 -05:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2016-05-05 19:53:03 -04:00
|
|
|
session_shutdown(void)
|
2013-02-27 18:14:41 -05:00
|
|
|
{
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_internals();
|
2016-05-10 19:02:39 -04:00
|
|
|
|
2016-05-10 17:49:58 -04:00
|
|
|
chat_sessions_clear();
|
|
|
|
presence_clear_sub_requests();
|
2016-05-10 19:02:39 -04:00
|
|
|
|
2016-05-10 18:27:16 -04:00
|
|
|
connection_shutdown();
|
2016-07-24 11:06:19 -04:00
|
|
|
if (saved_status) {
|
|
|
|
free(saved_status);
|
|
|
|
}
|
2013-02-27 18:14:41 -05:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2016-07-24 09:08:30 -04:00
|
|
|
session_process_events(void)
|
2012-02-06 19:08:59 -05:00
|
|
|
{
|
2014-04-23 15:51:57 -04:00
|
|
|
int reconnect_sec;
|
|
|
|
|
2016-05-05 18:51:49 -04:00
|
|
|
jabber_conn_status_t conn_status = connection_get_status();
|
2020-07-07 08:18:57 -04:00
|
|
|
switch (conn_status) {
|
2016-05-10 17:49:58 -04:00
|
|
|
case JABBER_CONNECTED:
|
|
|
|
case JABBER_CONNECTING:
|
2021-07-04 19:02:38 -04:00
|
|
|
case JABBER_RAW_CONNECTED:
|
|
|
|
case JABBER_RAW_CONNECTING:
|
2016-05-10 17:49:58 -04:00
|
|
|
case JABBER_DISCONNECTING:
|
2016-07-24 09:08:30 -04:00
|
|
|
connection_check_events();
|
2016-05-10 17:49:58 -04:00
|
|
|
break;
|
|
|
|
case JABBER_DISCONNECTED:
|
|
|
|
reconnect_sec = prefs_get_reconnect();
|
|
|
|
if ((reconnect_sec != 0) && reconnect_timer) {
|
|
|
|
int elapsed_sec = g_timer_elapsed(reconnect_timer, NULL);
|
|
|
|
if (elapsed_sec > reconnect_sec) {
|
2022-12-27 16:53:18 -05:00
|
|
|
session_reconnect_now();
|
2012-11-26 17:00:57 -05:00
|
|
|
}
|
2016-05-10 17:49:58 -04:00
|
|
|
}
|
|
|
|
break;
|
2022-01-28 10:40:18 -05:00
|
|
|
case JABBER_RECONNECT:
|
2022-12-27 16:53:18 -05:00
|
|
|
session_reconnect_now();
|
2022-01-28 10:40:18 -05:00
|
|
|
break;
|
2016-05-10 17:49:58 -04:00
|
|
|
default:
|
|
|
|
break;
|
2012-11-24 21:14:38 -05:00
|
|
|
}
|
2012-02-06 19:08:59 -05:00
|
|
|
}
|
|
|
|
|
2015-10-25 20:14:23 -04:00
|
|
|
char*
|
2016-05-05 19:53:03 -04:00
|
|
|
session_get_account_name(void)
|
2013-01-28 17:55:26 -05:00
|
|
|
{
|
|
|
|
return saved_account.name;
|
|
|
|
}
|
|
|
|
|
2022-06-22 04:02:42 -04:00
|
|
|
static gboolean
|
2021-10-16 02:43:55 -04:00
|
|
|
_receive_mood(xmpp_stanza_t* const stanza, void* const userdata)
|
|
|
|
{
|
2022-06-22 04:02:42 -04:00
|
|
|
if (!prefs_get_boolean(PREF_MOOD)) {
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2021-10-16 02:43:55 -04:00
|
|
|
const char* from = xmpp_stanza_get_from(stanza);
|
2021-10-17 14:41:11 -04:00
|
|
|
xmpp_stanza_t* event = xmpp_stanza_get_child_by_name_and_ns(stanza, STANZA_NAME_EVENT, STANZA_NS_PUBSUB_EVENT);
|
2021-10-16 02:43:55 -04:00
|
|
|
if (event) {
|
2021-10-17 14:41:11 -04:00
|
|
|
xmpp_stanza_t* items = xmpp_stanza_get_child_by_name(event, STANZA_NAME_ITEMS);
|
2021-10-16 02:43:55 -04:00
|
|
|
if (items) {
|
2021-10-17 14:41:11 -04:00
|
|
|
xmpp_stanza_t* item = xmpp_stanza_get_child_by_name(items, STANZA_NAME_ITEM);
|
2021-10-16 02:43:55 -04:00
|
|
|
if (item) {
|
2021-10-17 14:41:11 -04:00
|
|
|
xmpp_stanza_t* mood = xmpp_stanza_get_child_by_name_and_ns(item, STANZA_NAME_MOOD, STANZA_NS_MOOD);
|
2021-10-16 02:43:55 -04:00
|
|
|
if (mood) {
|
|
|
|
xmpp_stanza_t* c = xmpp_stanza_get_children(mood);
|
|
|
|
if (c) {
|
|
|
|
const char* m = xmpp_stanza_get_name(c);
|
2021-10-17 14:41:11 -04:00
|
|
|
xmpp_stanza_t* t = xmpp_stanza_get_child_by_name(mood, STANZA_NAME_TEXT);
|
2021-10-16 02:43:55 -04:00
|
|
|
if (t) {
|
2022-12-30 13:36:53 -05:00
|
|
|
auto_char char* text = xmpp_stanza_get_text(t);
|
2021-10-16 02:43:55 -04:00
|
|
|
cons_show("Mood from %s %s (%s)", from, m, text);
|
|
|
|
} else {
|
|
|
|
cons_show("Mood from %s %s", from, m);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2016-05-05 18:51:49 -04:00
|
|
|
void
|
2016-05-05 21:18:31 -04:00
|
|
|
session_login_success(gboolean secured)
|
2015-09-22 15:55:41 -04:00
|
|
|
{
|
2019-03-14 14:03:14 -04:00
|
|
|
chat_sessions_init();
|
|
|
|
|
|
|
|
message_handlers_init();
|
|
|
|
presence_handlers_init();
|
|
|
|
iq_handlers_init();
|
|
|
|
|
2016-05-05 18:51:49 -04:00
|
|
|
// logged in with account
|
|
|
|
if (saved_account.name) {
|
|
|
|
log_debug("Connection handler: logged in with account name: %s", saved_account.name);
|
|
|
|
sv_ev_login_account_success(saved_account.name, secured);
|
2015-11-09 20:20:40 -05:00
|
|
|
|
2020-07-07 08:18:57 -04:00
|
|
|
// logged in without account, use details to create new account
|
2016-05-05 18:51:49 -04:00
|
|
|
} else {
|
|
|
|
log_debug("Connection handler: logged in with jid: %s", saved_details.name);
|
2020-02-26 18:22:05 -05:00
|
|
|
accounts_add(saved_details.name, saved_details.altdomain, saved_details.port, saved_details.tls_policy, saved_details.auth_policy);
|
2016-05-05 18:51:49 -04:00
|
|
|
accounts_set_jid(saved_details.name, saved_details.jid);
|
|
|
|
|
|
|
|
saved_account.name = strdup(saved_details.name);
|
|
|
|
saved_account.passwd = strdup(saved_details.passwd);
|
2015-11-09 20:20:40 -05:00
|
|
|
|
2016-05-05 19:53:03 -04:00
|
|
|
_session_free_saved_details();
|
2019-03-15 17:58:25 -04:00
|
|
|
sv_ev_login_account_success(saved_account.name, secured);
|
2016-05-05 18:51:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
roster_request();
|
|
|
|
bookmark_request();
|
|
|
|
blocking_request();
|
|
|
|
|
|
|
|
// items discovery
|
2019-04-08 13:09:25 -04:00
|
|
|
connection_request_features();
|
2020-07-07 08:18:57 -04:00
|
|
|
char* domain = connection_get_domain();
|
2016-05-08 16:47:52 -04:00
|
|
|
iq_disco_items_request_onconnect(domain);
|
2016-05-05 18:51:49 -04:00
|
|
|
|
2020-07-07 08:18:57 -04:00
|
|
|
if (prefs_get_boolean(PREF_CARBONS)) {
|
2016-05-05 18:51:49 -04:00
|
|
|
iq_enable_carbons();
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((prefs_get_reconnect() != 0) && reconnect_timer) {
|
|
|
|
g_timer_destroy(reconnect_timer);
|
|
|
|
reconnect_timer = NULL;
|
|
|
|
}
|
2021-10-16 02:43:55 -04:00
|
|
|
|
2021-10-17 14:41:11 -04:00
|
|
|
message_pubsub_event_handler_add(STANZA_NS_MOOD, _receive_mood, NULL, NULL);
|
2022-06-22 04:02:42 -04:00
|
|
|
if (prefs_get_boolean(PREF_MOOD)) {
|
|
|
|
caps_add_feature(STANZA_NS_MOOD_NOTIFY);
|
|
|
|
}
|
2016-05-05 18:51:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2016-05-05 19:53:03 -04:00
|
|
|
session_login_failed(void)
|
2016-05-05 18:51:49 -04:00
|
|
|
{
|
|
|
|
if (reconnect_timer == NULL) {
|
|
|
|
log_debug("Connection handler: No reconnect timer");
|
|
|
|
sv_ev_failed_login();
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_internals();
|
2016-05-05 18:51:49 -04:00
|
|
|
} else {
|
|
|
|
log_debug("Connection handler: Restarting reconnect timer");
|
|
|
|
if (prefs_get_reconnect() != 0) {
|
|
|
|
g_timer_start(reconnect_timer);
|
|
|
|
}
|
|
|
|
}
|
2016-05-10 18:53:44 -04:00
|
|
|
|
|
|
|
connection_clear_data();
|
|
|
|
chat_sessions_clear();
|
|
|
|
presence_clear_sub_requests();
|
2015-09-22 15:55:41 -04:00
|
|
|
}
|
2015-11-09 18:31:21 -05:00
|
|
|
|
2016-05-05 20:10:12 -04:00
|
|
|
void
|
|
|
|
session_lost_connection(void)
|
|
|
|
{
|
2019-06-03 06:11:41 -04:00
|
|
|
/* this callback also clears all cached data */
|
2016-05-05 20:10:12 -04:00
|
|
|
sv_ev_lost_connection();
|
|
|
|
if (prefs_get_reconnect() != 0) {
|
|
|
|
assert(reconnect_timer == NULL);
|
|
|
|
reconnect_timer = g_timer_new();
|
|
|
|
} else {
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_internals();
|
2016-05-05 20:10:12 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-24 11:06:19 -04:00
|
|
|
void
|
|
|
|
session_init_activity(void)
|
|
|
|
{
|
|
|
|
activity_state = ACTIVITY_ST_ACTIVE;
|
|
|
|
saved_status = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
session_check_autoaway(void)
|
|
|
|
{
|
|
|
|
jabber_conn_status_t conn_status = connection_get_status();
|
|
|
|
if (conn_status != JABBER_CONNECTED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-06-13 16:01:08 -04:00
|
|
|
auto_gchar gchar* mode = prefs_get_string(PREF_AUTOAWAY_MODE);
|
2016-07-24 11:06:19 -04:00
|
|
|
gboolean check = prefs_get_boolean(PREF_AUTOAWAY_CHECK);
|
|
|
|
gint away_time = prefs_get_autoaway_time();
|
|
|
|
gint xa_time = prefs_get_autoxa_time();
|
|
|
|
int away_time_ms = away_time * 60000;
|
|
|
|
int xa_time_ms = xa_time * 60000;
|
|
|
|
|
2020-07-07 08:18:57 -04:00
|
|
|
char* account = session_get_account_name();
|
2016-07-24 11:06:19 -04:00
|
|
|
resource_presence_t curr_presence = accounts_get_last_presence(account);
|
2023-06-13 16:01:08 -04:00
|
|
|
auto_char char* curr_status = accounts_get_last_status(account);
|
2016-07-24 11:06:19 -04:00
|
|
|
|
|
|
|
unsigned long idle_ms = ui_get_idle_time();
|
|
|
|
|
|
|
|
switch (activity_state) {
|
|
|
|
case ACTIVITY_ST_ACTIVE:
|
|
|
|
if (idle_ms >= away_time_ms) {
|
|
|
|
if (g_strcmp0(mode, "away") == 0) {
|
|
|
|
if ((curr_presence == RESOURCE_ONLINE) || (curr_presence == RESOURCE_CHAT) || (curr_presence == RESOURCE_DND)) {
|
|
|
|
activity_state = ACTIVITY_ST_AWAY;
|
|
|
|
|
|
|
|
// save current presence
|
|
|
|
saved_presence = curr_presence;
|
|
|
|
if (saved_status) {
|
|
|
|
free(saved_status);
|
|
|
|
}
|
2016-07-27 18:35:49 -04:00
|
|
|
if (curr_status) {
|
|
|
|
saved_status = strdup(curr_status);
|
|
|
|
} else {
|
|
|
|
saved_status = NULL;
|
|
|
|
}
|
2016-07-24 11:06:19 -04:00
|
|
|
|
|
|
|
// send away presence with last activity
|
2023-06-13 16:01:08 -04:00
|
|
|
auto_gchar gchar* message = prefs_get_string(PREF_AUTOAWAY_MESSAGE);
|
2017-01-15 18:59:31 -05:00
|
|
|
connection_set_presence_msg(message);
|
2016-07-24 11:06:19 -04:00
|
|
|
if (prefs_get_boolean(PREF_LASTACTIVITY)) {
|
2017-01-15 18:59:31 -05:00
|
|
|
cl_ev_presence_send(RESOURCE_AWAY, idle_ms / 1000);
|
2016-07-24 11:06:19 -04:00
|
|
|
} else {
|
2017-01-15 18:59:31 -05:00
|
|
|
cl_ev_presence_send(RESOURCE_AWAY, 0);
|
2016-07-24 11:06:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
int pri = accounts_get_priority_for_presence_type(account, RESOURCE_AWAY);
|
|
|
|
if (message) {
|
|
|
|
cons_show("Idle for %d minutes, status set to away (priority %d), \"%s\".", away_time, pri, message);
|
|
|
|
} else {
|
|
|
|
cons_show("Idle for %d minutes, status set to away (priority %d).", away_time, pri);
|
|
|
|
}
|
|
|
|
|
|
|
|
title_bar_set_presence(CONTACT_AWAY);
|
|
|
|
}
|
|
|
|
} else if (g_strcmp0(mode, "idle") == 0) {
|
|
|
|
activity_state = ACTIVITY_ST_IDLE;
|
|
|
|
|
|
|
|
// send current presence with last activity
|
2017-01-15 18:59:31 -05:00
|
|
|
connection_set_presence_msg(curr_status);
|
|
|
|
cl_ev_presence_send(curr_presence, idle_ms / 1000);
|
2016-07-24 11:06:19 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ACTIVITY_ST_IDLE:
|
|
|
|
if (check && (idle_ms < away_time_ms)) {
|
|
|
|
activity_state = ACTIVITY_ST_ACTIVE;
|
|
|
|
|
|
|
|
cons_show("No longer idle.");
|
|
|
|
|
|
|
|
// send current presence without last activity
|
2017-01-15 18:59:31 -05:00
|
|
|
connection_set_presence_msg(curr_status);
|
|
|
|
cl_ev_presence_send(curr_presence, 0);
|
2016-07-24 11:06:19 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ACTIVITY_ST_AWAY:
|
|
|
|
if (xa_time_ms > 0 && (idle_ms >= xa_time_ms)) {
|
|
|
|
activity_state = ACTIVITY_ST_XA;
|
|
|
|
|
|
|
|
// send extended away presence with last activity
|
2023-06-13 16:01:08 -04:00
|
|
|
auto_gchar gchar* message = prefs_get_string(PREF_AUTOXA_MESSAGE);
|
2017-01-15 18:59:31 -05:00
|
|
|
connection_set_presence_msg(message);
|
2016-07-24 11:06:19 -04:00
|
|
|
if (prefs_get_boolean(PREF_LASTACTIVITY)) {
|
2017-01-15 18:59:31 -05:00
|
|
|
cl_ev_presence_send(RESOURCE_XA, idle_ms / 1000);
|
2016-07-24 11:06:19 -04:00
|
|
|
} else {
|
2017-01-15 18:59:31 -05:00
|
|
|
cl_ev_presence_send(RESOURCE_XA, 0);
|
2016-07-24 11:06:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
int pri = accounts_get_priority_for_presence_type(account, RESOURCE_XA);
|
|
|
|
if (message) {
|
|
|
|
cons_show("Idle for %d minutes, status set to xa (priority %d), \"%s\".", xa_time, pri, message);
|
|
|
|
} else {
|
|
|
|
cons_show("Idle for %d minutes, status set to xa (priority %d).", xa_time, pri);
|
|
|
|
}
|
|
|
|
|
|
|
|
title_bar_set_presence(CONTACT_XA);
|
|
|
|
} else if (check && (idle_ms < away_time_ms)) {
|
|
|
|
activity_state = ACTIVITY_ST_ACTIVE;
|
|
|
|
|
|
|
|
cons_show("No longer idle.");
|
|
|
|
|
|
|
|
// send saved presence without last activity
|
2017-01-15 18:59:31 -05:00
|
|
|
connection_set_presence_msg(saved_status);
|
|
|
|
cl_ev_presence_send(saved_presence, 0);
|
2016-07-24 11:06:19 -04:00
|
|
|
contact_presence_t contact_pres = contact_presence_from_resource_presence(saved_presence);
|
|
|
|
title_bar_set_presence(contact_pres);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ACTIVITY_ST_XA:
|
|
|
|
if (check && (idle_ms < away_time_ms)) {
|
|
|
|
activity_state = ACTIVITY_ST_ACTIVE;
|
|
|
|
|
|
|
|
cons_show("No longer idle.");
|
|
|
|
|
|
|
|
// send saved presence without last activity
|
2017-01-15 18:59:31 -05:00
|
|
|
connection_set_presence_msg(saved_status);
|
|
|
|
cl_ev_presence_send(saved_presence, 0);
|
2016-07-24 11:06:19 -04:00
|
|
|
contact_presence_t contact_pres = contact_presence_from_resource_presence(saved_presence);
|
|
|
|
title_bar_set_presence(contact_pres);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-28 10:40:18 -05:00
|
|
|
static struct
|
|
|
|
{
|
|
|
|
gchar* altdomain;
|
|
|
|
unsigned short altport;
|
|
|
|
} reconnect;
|
|
|
|
|
|
|
|
/* This takes ownership of `altdomain`, i.e. the caller must not
|
|
|
|
* free the value after calling this function.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
session_reconnect(gchar* altdomain, unsigned short altport)
|
|
|
|
{
|
|
|
|
reconnect.altdomain = altdomain;
|
|
|
|
reconnect.altport = altport;
|
|
|
|
}
|
|
|
|
|
2022-12-27 16:53:18 -05:00
|
|
|
void
|
|
|
|
session_reconnect_now(void)
|
2013-01-28 20:02:40 -05:00
|
|
|
{
|
|
|
|
// reconnect with account.
|
2020-07-07 08:18:57 -04:00
|
|
|
ProfAccount* account = accounts_get_account(saved_account.name);
|
2013-01-28 20:02:40 -05:00
|
|
|
if (account == NULL) {
|
|
|
|
log_error("Unable to reconnect, account no longer exists: %s", saved_account.name);
|
2016-05-10 17:49:58 -04:00
|
|
|
return;
|
2013-01-28 20:02:40 -05:00
|
|
|
}
|
2016-05-10 17:49:58 -04:00
|
|
|
|
2023-07-11 07:23:58 -04:00
|
|
|
auto_char char* jid = NULL;
|
2016-11-21 19:39:52 -05:00
|
|
|
if (account->resource) {
|
|
|
|
jid = create_fulljid(account->jid, account->resource);
|
|
|
|
} else {
|
|
|
|
jid = strdup(account->jid);
|
|
|
|
}
|
2022-01-28 10:40:18 -05:00
|
|
|
const char* server;
|
|
|
|
unsigned short port;
|
|
|
|
if (reconnect.altdomain) {
|
|
|
|
server = reconnect.altdomain;
|
|
|
|
port = reconnect.altport;
|
|
|
|
} else {
|
|
|
|
server = account->server;
|
|
|
|
port = account->port;
|
|
|
|
}
|
2016-11-21 19:39:52 -05:00
|
|
|
|
2016-05-10 17:49:58 -04:00
|
|
|
log_debug("Attempting reconnect with account %s", account->name);
|
2022-01-28 10:40:18 -05:00
|
|
|
connection_connect(jid, saved_account.passwd, server, port, account->tls_policy, account->auth_policy);
|
2016-07-25 17:38:23 -04:00
|
|
|
account_free(account);
|
2022-02-08 13:50:06 -05:00
|
|
|
if (reconnect_timer)
|
|
|
|
g_timer_start(reconnect_timer);
|
2013-01-28 20:02:40 -05:00
|
|
|
}
|
|
|
|
|
2016-05-05 20:10:12 -04:00
|
|
|
static void
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_internals(void)
|
2015-12-30 20:48:04 -05:00
|
|
|
{
|
2016-05-05 20:10:12 -04:00
|
|
|
FREE_SET_NULL(saved_account.name);
|
|
|
|
FREE_SET_NULL(saved_account.passwd);
|
2022-01-28 10:40:18 -05:00
|
|
|
GFREE_SET_NULL(reconnect.altdomain);
|
2022-01-27 09:48:57 -05:00
|
|
|
_session_free_saved_details();
|
2015-12-30 20:48:04 -05:00
|
|
|
}
|
2016-05-05 20:10:12 -04:00
|
|
|
|
|
|
|
static void
|
|
|
|
_session_free_saved_details(void)
|
|
|
|
{
|
|
|
|
FREE_SET_NULL(saved_details.name);
|
|
|
|
FREE_SET_NULL(saved_details.jid);
|
|
|
|
FREE_SET_NULL(saved_details.passwd);
|
|
|
|
FREE_SET_NULL(saved_details.altdomain);
|
|
|
|
FREE_SET_NULL(saved_details.tls_policy);
|
2020-02-26 18:22:05 -05:00
|
|
|
FREE_SET_NULL(saved_details.auth_policy);
|
2016-05-05 20:10:12 -04:00
|
|
|
}
|