// Copyright © 2023 OpenIM. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package msg import ( "context" "encoding/json" "time" "github.com/OpenIMSDK/Open-IM-Server/pkg/authverify" "github.com/OpenIMSDK/protocol/constant" "github.com/OpenIMSDK/protocol/msg" "github.com/OpenIMSDK/protocol/sdkws" "github.com/OpenIMSDK/tools/errs" "github.com/OpenIMSDK/tools/log" "github.com/OpenIMSDK/tools/utils" unRelationTb "github.com/OpenIMSDK/Open-IM-Server/pkg/common/db/table/unrelation" ) func (m *msgServer) RevokeMsg(ctx context.Context, req *msg.RevokeMsgReq) (*msg.RevokeMsgResp, error) { defer log.ZDebug(ctx, "RevokeMsg return line") if req.UserID == "" { return nil, errs.ErrArgs.Wrap("user_id is empty") } if req.ConversationID == "" { return nil, errs.ErrArgs.Wrap("conversation_id is empty") } if req.Seq < 0 { return nil, errs.ErrArgs.Wrap("seq is invalid") } if err := authverify.CheckAccessV3(ctx, req.UserID); err != nil { return nil, err } user, err := m.User.GetUserInfo(ctx, req.UserID) if err != nil { return nil, err } _, _, msgs, err := m.MsgDatabase.GetMsgBySeqs(ctx, req.UserID, req.ConversationID, []int64{req.Seq}) if err != nil { return nil, err } if len(msgs) == 0 || msgs[0] == nil { return nil, errs.ErrRecordNotFound.Wrap("msg not found") } if msgs[0].ContentType == constant.MsgRevokeNotification { return nil, errs.ErrMsgAlreadyRevoke.Wrap("msg already revoke") } data, _ := json.Marshal(msgs[0]) log.ZInfo(ctx, "GetMsgBySeqs", "conversationID", req.ConversationID, "seq", req.Seq, "msg", string(data)) var role int32 if !authverify.IsAppManagerUid(ctx) { switch msgs[0].SessionType { case constant.SingleChatType: if err := authverify.CheckAccessV3(ctx, msgs[0].SendID); err != nil { return nil, err } role = user.AppMangerLevel case constant.SuperGroupChatType: members, err := m.Group.GetGroupMemberInfoMap( ctx, msgs[0].GroupID, utils.Distinct([]string{req.UserID, msgs[0].SendID}), true, ) if err != nil { return nil, err } if req.UserID != msgs[0].SendID { switch members[req.UserID].RoleLevel { case constant.GroupOwner: case constant.GroupAdmin: if members[msgs[0].SendID].RoleLevel != constant.GroupOrdinaryUsers { return nil, errs.ErrNoPermission.Wrap("no permission") } default: return nil, errs.ErrNoPermission.Wrap("no permission") } } if member := members[req.UserID]; member != nil { role = member.RoleLevel } default: return nil, errs.ErrInternalServer.Wrap("msg sessionType not supported") } } now := time.Now().UnixMilli() err = m.MsgDatabase.RevokeMsg(ctx, req.ConversationID, req.Seq, &unRelationTb.RevokeModel{ Role: role, UserID: req.UserID, Nickname: user.Nickname, Time: now, }) if err != nil { return nil, err } tips := sdkws.RevokeMsgTips{ RevokerUserID: req.UserID, ClientMsgID: msgs[0].ClientMsgID, RevokeTime: now, Seq: req.Seq, SesstionType: msgs[0].SessionType, ConversationID: req.ConversationID, } var recvID string if msgs[0].SessionType == constant.SuperGroupChatType { recvID = msgs[0].GroupID } else { recvID = msgs[0].RecvID } if err := m.notificationSender.NotificationWithSesstionType(ctx, req.UserID, recvID, constant.MsgRevokeNotification, msgs[0].SessionType, &tips); err != nil { return nil, err } return &msg.RevokeMsgResp{}, nil }