Files
open-im-server/internal/rpc/msg/revoke.go
T

134 lines
4.3 KiB
Go
Raw Normal View History

2023-07-04 11:15:20 +08:00
// Copyright © 2023 OpenIM. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2023-06-30 09:45:02 +08:00
package msg
import (
"context"
"encoding/json"
"time"
"github.com/openimsdk/open-im-server/v3/pkg/common/storage/model"
2024-03-06 15:58:05 +08:00
"github.com/openimsdk/open-im-server/v3/pkg/authverify"
2024-04-19 22:23:08 +08:00
"github.com/openimsdk/open-im-server/v3/pkg/common/servererrs"
"github.com/openimsdk/protocol/constant"
"github.com/openimsdk/protocol/msg"
"github.com/openimsdk/protocol/sdkws"
"github.com/openimsdk/tools/errs"
"github.com/openimsdk/tools/log"
"github.com/openimsdk/tools/mcontext"
"github.com/openimsdk/tools/utils/datautil"
2023-06-30 09:45:02 +08:00
)
func (m *msgServer) RevokeMsg(ctx context.Context, req *msg.RevokeMsgReq) (*msg.RevokeMsgResp, error) {
if req.UserID == "" {
2024-04-19 22:23:08 +08:00
return nil, errs.ErrArgs.WrapMsg("user_id is empty")
2023-06-30 09:45:02 +08:00
}
if req.ConversationID == "" {
2024-04-19 22:23:08 +08:00
return nil, errs.ErrArgs.WrapMsg("conversation_id is empty")
2023-06-30 09:45:02 +08:00
}
if req.Seq < 0 {
2024-04-19 22:23:08 +08:00
return nil, errs.ErrArgs.WrapMsg("seq is invalid")
2023-06-30 09:45:02 +08:00
}
if err := authverify.CheckAccess(ctx, req.UserID); err != nil {
2023-06-30 09:45:02 +08:00
return nil, err
}
user, err := m.UserLocalCache.GetUserInfo(ctx, req.UserID)
2023-06-30 09:45:02 +08:00
if err != nil {
return nil, err
}
_, _, msgs, err := m.MsgDatabase.GetMsgBySeqs(ctx, req.UserID, req.ConversationID, []int64{req.Seq})
if err != nil {
return nil, err
}
if len(msgs) == 0 || msgs[0] == nil {
2024-04-19 22:23:08 +08:00
return nil, errs.ErrRecordNotFound.WrapMsg("msg not found")
2023-06-30 09:45:02 +08:00
}
if msgs[0].ContentType == constant.MsgRevokeNotification {
2024-04-19 22:23:08 +08:00
return nil, servererrs.ErrMsgAlreadyRevoke.WrapMsg("msg already revoke")
2023-06-30 09:45:02 +08:00
}
2023-11-30 10:10:48 +08:00
2023-06-30 09:45:02 +08:00
data, _ := json.Marshal(msgs[0])
2024-04-19 22:23:08 +08:00
log.ZDebug(ctx, "GetMsgBySeqs", "conversationID", req.ConversationID, "seq", req.Seq, "msg", string(data))
2023-06-30 09:45:02 +08:00
var role int32
if !authverify.IsAdmin(ctx) {
2024-12-26 17:49:05 +08:00
sessionType := msgs[0].SessionType
switch sessionType {
2023-06-30 09:45:02 +08:00
case constant.SingleChatType:
if err := authverify.CheckAccess(ctx, msgs[0].SendID); err != nil {
2023-06-30 09:45:02 +08:00
return nil, err
}
role = user.AppMangerLevel
2024-04-19 22:23:08 +08:00
case constant.ReadGroupChatType:
members, err := m.GroupLocalCache.GetGroupMemberInfoMap(ctx, msgs[0].GroupID, datautil.Distinct([]string{req.UserID, msgs[0].SendID}))
2023-06-30 09:45:02 +08:00
if err != nil {
return nil, err
}
if req.UserID != msgs[0].SendID {
switch members[req.UserID].RoleLevel {
case constant.GroupOwner:
case constant.GroupAdmin:
if sendMember, ok := members[msgs[0].SendID]; ok {
if sendMember.RoleLevel != constant.GroupOrdinaryUsers {
return nil, errs.ErrNoPermission.WrapMsg("no permission")
}
2023-06-30 09:45:02 +08:00
}
default:
2024-04-19 22:23:08 +08:00
return nil, errs.ErrNoPermission.WrapMsg("no permission")
2023-06-30 09:45:02 +08:00
}
}
if member := members[req.UserID]; member != nil {
role = member.RoleLevel
}
default:
2024-12-26 17:49:05 +08:00
return nil, errs.ErrInternalServer.WrapMsg("msg sessionType not supported", "sessionType", sessionType)
2023-06-30 09:45:02 +08:00
}
}
now := time.Now().UnixMilli()
err = m.MsgDatabase.RevokeMsg(ctx, req.ConversationID, req.Seq, &model.RevokeModel{
2023-06-30 09:45:02 +08:00
Role: role,
UserID: req.UserID,
Nickname: user.Nickname,
Time: now,
})
if err != nil {
return nil, err
}
2023-08-22 18:46:08 +08:00
revokerUserID := mcontext.GetOpUserID(ctx)
var flag bool
2024-04-19 22:23:08 +08:00
if len(m.config.Share.IMAdminUserID) > 0 {
flag = datautil.Contain(revokerUserID, m.config.Share.IMAdminUserID...)
}
2023-06-30 09:45:02 +08:00
tips := sdkws.RevokeMsgTips{
2023-08-22 18:46:08 +08:00
RevokerUserID: revokerUserID,
2023-06-30 09:45:02 +08:00
ClientMsgID: msgs[0].ClientMsgID,
RevokeTime: now,
Seq: req.Seq,
SesstionType: msgs[0].SessionType,
ConversationID: req.ConversationID,
IsAdminRevoke: flag,
2023-06-30 09:45:02 +08:00
}
var recvID string
2024-04-19 22:23:08 +08:00
if msgs[0].SessionType == constant.ReadGroupChatType {
2023-06-30 09:45:02 +08:00
recvID = msgs[0].GroupID
} else {
recvID = msgs[0].RecvID
}
2024-04-19 22:23:08 +08:00
m.notificationSender.NotificationWithSessionType(ctx, req.UserID, recvID, constant.MsgRevokeNotification, msgs[0].SessionType, &tips)
m.webhookAfterRevokeMsg(ctx, &m.config.WebhooksConfig.AfterRevokeMsg, req)
2023-06-30 09:45:02 +08:00
return &msg.RevokeMsgResp{}, nil
}