* encryption keys * . * . * move nip4e to device crate * . * . * use i18n for device crate * refactor * refactor * . * add reset button * send message with encryption keys * clean up * . * choose signer * fix * update i18n * fix sending
724 lines
23 KiB
Rust
724 lines
23 KiB
Rust
use std::cmp::Ordering;
|
|
use std::collections::{HashMap, HashSet};
|
|
use std::hash::{Hash, Hasher};
|
|
use std::time::Duration;
|
|
|
|
use anyhow::{anyhow, Error};
|
|
use common::display::RenderedProfile;
|
|
use common::event::EventUtils;
|
|
use gpui::{App, AppContext, Context, EventEmitter, SharedString, SharedUri, Task};
|
|
use nostr_sdk::prelude::*;
|
|
use serde::{Deserialize, Serialize};
|
|
use states::app_state;
|
|
use states::constants::SEND_RETRY;
|
|
|
|
use crate::Registry;
|
|
|
|
#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Default, Deserialize, Serialize)]
|
|
pub enum SignerKind {
|
|
Encryption,
|
|
User,
|
|
#[default]
|
|
Auto,
|
|
}
|
|
|
|
#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord)]
|
|
pub struct SendOptions {
|
|
pub backup: bool,
|
|
pub signer_kind: SignerKind,
|
|
}
|
|
|
|
impl SendOptions {
|
|
pub fn new() -> Self {
|
|
Self {
|
|
backup: true,
|
|
signer_kind: SignerKind::default(),
|
|
}
|
|
}
|
|
|
|
pub fn backup(&self) -> bool {
|
|
self.backup
|
|
}
|
|
}
|
|
|
|
impl Default for SendOptions {
|
|
fn default() -> Self {
|
|
Self::new()
|
|
}
|
|
}
|
|
|
|
#[derive(Debug, Clone)]
|
|
pub struct SendReport {
|
|
pub receiver: PublicKey,
|
|
|
|
pub status: Option<Output<EventId>>,
|
|
pub error: Option<SharedString>,
|
|
|
|
pub relays_not_found: bool,
|
|
pub device_not_found: bool,
|
|
|
|
pub on_hold: Option<Event>,
|
|
}
|
|
|
|
impl SendReport {
|
|
pub fn new(receiver: PublicKey) -> Self {
|
|
Self {
|
|
receiver,
|
|
status: None,
|
|
error: None,
|
|
on_hold: None,
|
|
relays_not_found: false,
|
|
device_not_found: false,
|
|
}
|
|
}
|
|
|
|
pub fn status(mut self, output: Output<EventId>) -> Self {
|
|
self.status = Some(output);
|
|
self
|
|
}
|
|
|
|
pub fn error(mut self, error: impl Into<SharedString>) -> Self {
|
|
self.error = Some(error.into());
|
|
self
|
|
}
|
|
|
|
pub fn on_hold(mut self, event: Event) -> Self {
|
|
self.on_hold = Some(event);
|
|
self
|
|
}
|
|
|
|
pub fn relays_not_found(mut self) -> Self {
|
|
self.relays_not_found = true;
|
|
self
|
|
}
|
|
|
|
pub fn device_not_found(mut self) -> Self {
|
|
self.device_not_found = true;
|
|
self
|
|
}
|
|
|
|
pub fn is_relay_error(&self) -> bool {
|
|
self.error.is_some() || self.relays_not_found
|
|
}
|
|
|
|
pub fn is_sent_success(&self) -> bool {
|
|
if let Some(output) = self.status.as_ref() {
|
|
!output.success.is_empty()
|
|
} else {
|
|
false
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Debug, Clone)]
|
|
pub enum RoomSignal {
|
|
NewMessage((EventId, UnsignedEvent)),
|
|
Refresh,
|
|
}
|
|
|
|
#[derive(Clone, Copy, Hash, Debug, PartialEq, Eq, PartialOrd, Ord, Default)]
|
|
pub enum RoomKind {
|
|
Ongoing,
|
|
#[default]
|
|
Request,
|
|
}
|
|
|
|
type DevicePublicKey = PublicKey;
|
|
|
|
#[derive(Debug)]
|
|
pub struct Room {
|
|
pub id: u64,
|
|
pub created_at: Timestamp,
|
|
/// Subject of the room
|
|
pub subject: Option<String>,
|
|
/// All members of the room
|
|
pub members: HashMap<PublicKey, Option<DevicePublicKey>>,
|
|
/// Kind
|
|
pub kind: RoomKind,
|
|
}
|
|
|
|
impl Ord for Room {
|
|
fn cmp(&self, other: &Self) -> Ordering {
|
|
self.created_at.cmp(&other.created_at)
|
|
}
|
|
}
|
|
|
|
impl PartialOrd for Room {
|
|
fn partial_cmp(&self, other: &Self) -> Option<Ordering> {
|
|
Some(self.cmp(other))
|
|
}
|
|
}
|
|
|
|
impl PartialEq for Room {
|
|
fn eq(&self, other: &Self) -> bool {
|
|
self.id == other.id
|
|
}
|
|
}
|
|
|
|
impl Hash for Room {
|
|
fn hash<H: Hasher>(&self, state: &mut H) {
|
|
self.id.hash(state);
|
|
}
|
|
}
|
|
|
|
impl Eq for Room {}
|
|
|
|
impl EventEmitter<RoomSignal> for Room {}
|
|
|
|
impl From<&Event> for Room {
|
|
fn from(val: &Event) -> Self {
|
|
let id = val.uniq_id();
|
|
let created_at = val.created_at;
|
|
|
|
// Get the members from the event's tags and event's pubkey
|
|
let members: HashMap<PublicKey, Option<DevicePublicKey>> = val
|
|
.all_pubkeys()
|
|
.into_iter()
|
|
.map(|public_key| (public_key, None))
|
|
.collect();
|
|
|
|
// Get subject from tags
|
|
let subject = val
|
|
.tags
|
|
.find(TagKind::Subject)
|
|
.and_then(|tag| tag.content().map(|s| s.to_owned()));
|
|
|
|
Room {
|
|
id,
|
|
created_at,
|
|
subject,
|
|
members,
|
|
kind: RoomKind::default(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl From<&UnsignedEvent> for Room {
|
|
fn from(val: &UnsignedEvent) -> Self {
|
|
let id = val.uniq_id();
|
|
let created_at = val.created_at;
|
|
|
|
// Get the members from the event's tags and event's pubkey
|
|
let members: HashMap<PublicKey, Option<DevicePublicKey>> = val
|
|
.all_pubkeys()
|
|
.into_iter()
|
|
.map(|public_key| (public_key, None))
|
|
.collect();
|
|
|
|
// Get subject from tags
|
|
let subject = val
|
|
.tags
|
|
.find(TagKind::Subject)
|
|
.and_then(|tag| tag.content().map(|s| s.to_owned()));
|
|
|
|
Room {
|
|
id,
|
|
created_at,
|
|
subject,
|
|
members,
|
|
kind: RoomKind::default(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Room {
|
|
/// Constructs a new room with the given receiver and tags.
|
|
pub async fn new(subject: Option<String>, receivers: Vec<PublicKey>) -> Result<Self, Error> {
|
|
let client = app_state().client();
|
|
let signer = client.signer().await?;
|
|
let public_key = signer.get_public_key().await?;
|
|
|
|
if receivers.is_empty() {
|
|
return Err(anyhow!("You need to add at least one receiver"));
|
|
};
|
|
|
|
// Convert receiver's public keys into tags
|
|
let mut tags: Tags = Tags::from_list(
|
|
receivers
|
|
.iter()
|
|
.map(|pubkey| Tag::public_key(pubkey.to_owned()))
|
|
.collect(),
|
|
);
|
|
|
|
// Add subject if it is present
|
|
if let Some(subject) = subject {
|
|
tags.push(Tag::from_standardized_without_cell(TagStandard::Subject(
|
|
subject,
|
|
)));
|
|
}
|
|
|
|
let mut event = EventBuilder::new(Kind::PrivateDirectMessage, "")
|
|
.tags(tags)
|
|
.build(public_key);
|
|
|
|
// Generate event ID
|
|
event.ensure_id();
|
|
|
|
Ok(Room::from(&event))
|
|
}
|
|
|
|
/// Sets the kind of the room and returns the modified room
|
|
pub fn kind(mut self, kind: RoomKind) -> Self {
|
|
self.kind = kind;
|
|
self
|
|
}
|
|
|
|
/// Sets this room is ongoing conversation
|
|
pub fn set_ongoing(&mut self, cx: &mut Context<Self>) {
|
|
if self.kind != RoomKind::Ongoing {
|
|
self.kind = RoomKind::Ongoing;
|
|
cx.notify();
|
|
}
|
|
}
|
|
|
|
/// Updates the creation timestamp of the room
|
|
pub fn set_created_at(&mut self, created_at: impl Into<Timestamp>, cx: &mut Context<Self>) {
|
|
self.created_at = created_at.into();
|
|
cx.notify();
|
|
}
|
|
|
|
/// Updates the subject of the room
|
|
pub fn set_subject(&mut self, subject: String, cx: &mut Context<Self>) {
|
|
self.subject = Some(subject);
|
|
cx.notify();
|
|
}
|
|
|
|
/// Returns the members of the room
|
|
pub fn members(&self) -> Vec<PublicKey> {
|
|
self.members.keys().cloned().collect()
|
|
}
|
|
|
|
/// Checks if the room has more than two members (group)
|
|
pub fn is_group(&self) -> bool {
|
|
self.members.len() > 2
|
|
}
|
|
|
|
/// Gets the display name for the room
|
|
pub fn display_name(&self, cx: &App) -> SharedString {
|
|
if let Some(subject) = self.subject.clone() {
|
|
SharedString::from(subject)
|
|
} else {
|
|
self.merged_name(cx)
|
|
}
|
|
}
|
|
|
|
/// Gets the display image for the room
|
|
pub fn display_image(&self, proxy: bool, cx: &App) -> SharedUri {
|
|
if !self.is_group() {
|
|
self.display_member(cx).avatar(proxy)
|
|
} else {
|
|
SharedUri::from("brand/group.png")
|
|
}
|
|
}
|
|
|
|
/// Get a single member to represent the room
|
|
///
|
|
/// This member is always different from the current user.
|
|
fn display_member(&self, cx: &App) -> Profile {
|
|
let registry = Registry::global(cx);
|
|
let signer_pubkey = registry.read(cx).signer_pubkey();
|
|
|
|
let target_member = self
|
|
.members
|
|
.keys()
|
|
.find(|&member| Some(member) != signer_pubkey.as_ref())
|
|
.or_else(|| self.members.keys().next())
|
|
.expect("Room should have at least one member");
|
|
|
|
registry.read(cx).get_person(target_member, cx)
|
|
}
|
|
|
|
/// Merge the names of the first two members of the room.
|
|
fn merged_name(&self, cx: &App) -> SharedString {
|
|
let registry = Registry::read_global(cx);
|
|
|
|
if self.is_group() {
|
|
let profiles: Vec<Profile> = self
|
|
.members
|
|
.keys()
|
|
.map(|public_key| registry.get_person(public_key, cx))
|
|
.collect();
|
|
|
|
let mut name = profiles
|
|
.iter()
|
|
.take(2)
|
|
.map(|p| p.name())
|
|
.collect::<Vec<_>>()
|
|
.join(", ");
|
|
|
|
if profiles.len() > 2 {
|
|
name = format!("{}, +{}", name, profiles.len() - 2);
|
|
}
|
|
|
|
SharedString::from(name)
|
|
} else {
|
|
self.display_member(cx).display_name()
|
|
}
|
|
}
|
|
|
|
/// Emits a new message signal to the current room
|
|
pub fn emit_message(&self, id: EventId, event: UnsignedEvent, cx: &mut Context<Self>) {
|
|
cx.emit(RoomSignal::NewMessage((id, event)));
|
|
}
|
|
|
|
/// Emits a signal to refresh the current room's messages.
|
|
pub fn emit_refresh(&mut self, cx: &mut Context<Self>) {
|
|
cx.emit(RoomSignal::Refresh);
|
|
}
|
|
|
|
/// Get messaging relays and encryption keys announcement for each member
|
|
pub fn connect(&self, cx: &App) -> Task<Result<(), Error>> {
|
|
let members = self.members();
|
|
|
|
cx.background_spawn(async move {
|
|
let client = app_state().client();
|
|
let signer = client.signer().await?;
|
|
let public_key = signer.get_public_key().await?;
|
|
let opts = SubscribeAutoCloseOptions::default().exit_policy(ReqExitPolicy::ExitOnEOSE);
|
|
|
|
for member in members.into_iter() {
|
|
if member == public_key {
|
|
continue;
|
|
};
|
|
|
|
let filter = Filter::new()
|
|
.kind(Kind::InboxRelays)
|
|
.author(member)
|
|
.limit(1);
|
|
|
|
// Subscribe to get members messaging relays
|
|
client.subscribe(filter, Some(opts)).await?;
|
|
|
|
let filter = Filter::new()
|
|
.kind(Kind::Custom(10044))
|
|
.author(member)
|
|
.limit(1);
|
|
|
|
// Subscribe to get members encryption keys announcement
|
|
client.subscribe(filter, Some(opts)).await?;
|
|
}
|
|
|
|
Ok(())
|
|
})
|
|
}
|
|
|
|
/// Get all messages belonging to the room
|
|
pub fn get_messages(&self, cx: &App) -> Task<Result<Vec<UnsignedEvent>, Error>> {
|
|
let conversation_id = self.id.to_string();
|
|
|
|
cx.background_spawn(async move {
|
|
let client = app_state().client();
|
|
let filter = Filter::new()
|
|
.kind(Kind::ApplicationSpecificData)
|
|
.custom_tag(SingleLetterTag::lowercase(Alphabet::C), conversation_id);
|
|
|
|
let stored = client.database().query(filter).await?;
|
|
|
|
let mut messages: Vec<UnsignedEvent> = stored
|
|
.into_iter()
|
|
.filter_map(|event| UnsignedEvent::from_json(&event.content).ok())
|
|
.collect();
|
|
|
|
messages.sort_by_key(|message| message.created_at);
|
|
|
|
Ok(messages)
|
|
})
|
|
}
|
|
|
|
/// Create a new message event (unsigned)
|
|
pub fn create_message(&self, content: &str, replies: &[EventId], cx: &App) -> UnsignedEvent {
|
|
let registry = Registry::global(cx);
|
|
let public_key = registry.read(cx).signer_pubkey().unwrap();
|
|
let subject = self.subject.clone();
|
|
|
|
let mut tags = vec![];
|
|
|
|
// Add receivers
|
|
//
|
|
// NOTE: current user will be removed from the list of receivers
|
|
for (member, _) in self.members.iter() {
|
|
tags.push(Tag::public_key(member.to_owned()));
|
|
}
|
|
|
|
// Add subject tag if it's present
|
|
if let Some(subject) = subject {
|
|
tags.push(Tag::from_standardized_without_cell(TagStandard::Subject(
|
|
subject,
|
|
)));
|
|
}
|
|
|
|
// Add reply/quote tag
|
|
if replies.len() == 1 {
|
|
tags.push(Tag::event(replies[0]))
|
|
} else {
|
|
for id in replies {
|
|
tags.push(Tag::from_standardized_without_cell(TagStandard::Quote {
|
|
event_id: id.to_owned(),
|
|
relay_url: None,
|
|
public_key: None,
|
|
}))
|
|
}
|
|
}
|
|
|
|
// Construct a direct message event
|
|
//
|
|
// WARNING: never send this event to relays
|
|
let mut event = EventBuilder::new(Kind::PrivateDirectMessage, content)
|
|
.tags(tags)
|
|
.build(public_key);
|
|
|
|
// Generate event ID
|
|
event.ensure_id();
|
|
|
|
event
|
|
}
|
|
|
|
/// Create a task to send a message to all room members
|
|
pub fn send_message(
|
|
&self,
|
|
rumor: &UnsignedEvent,
|
|
opts: &SendOptions,
|
|
cx: &App,
|
|
) -> Task<Result<Vec<SendReport>, Error>> {
|
|
let mut members = self.members.clone();
|
|
let rumor = rumor.to_owned();
|
|
let opts = opts.to_owned();
|
|
|
|
cx.background_spawn(async move {
|
|
let states = app_state();
|
|
let client = states.client();
|
|
let device = states.device.read().await.encryption_keys.clone();
|
|
|
|
let user_signer = client.signer().await?;
|
|
let user_pubkey = user_signer.get_public_key().await?;
|
|
|
|
// Collect relay hints for all participants (including current user)
|
|
let mut participants: Vec<PublicKey> = members.keys().cloned().collect();
|
|
|
|
if !participants.contains(&user_pubkey) {
|
|
participants.push(user_pubkey);
|
|
}
|
|
|
|
// Initialize relay cache
|
|
let mut relay_cache: HashMap<PublicKey, Vec<RelayUrl>> = HashMap::new();
|
|
|
|
for participant in participants.iter().cloned() {
|
|
let urls = states.messaging_relays(participant).await;
|
|
relay_cache.insert(participant, urls);
|
|
}
|
|
|
|
// Update rumor with relay hints for each receiver
|
|
let mut rumor = rumor;
|
|
let mut tags_with_hints = Vec::new();
|
|
|
|
for tag in rumor.tags.into_iter() {
|
|
if let Some(standard) = tag.as_standardized().cloned() {
|
|
match standard {
|
|
TagStandard::PublicKey {
|
|
public_key,
|
|
alias,
|
|
uppercase,
|
|
..
|
|
} => {
|
|
let relay_url = relay_cache
|
|
.get(&public_key)
|
|
.and_then(|urls| urls.first().cloned());
|
|
|
|
let updated = TagStandard::PublicKey {
|
|
public_key,
|
|
relay_url,
|
|
alias,
|
|
uppercase,
|
|
};
|
|
|
|
tags_with_hints.push(Tag::from_standardized_without_cell(updated));
|
|
}
|
|
_ => tags_with_hints.push(tag),
|
|
}
|
|
} else {
|
|
tags_with_hints.push(tag);
|
|
}
|
|
}
|
|
rumor.tags = Tags::from_list(tags_with_hints);
|
|
|
|
// Remove the current user's public key from the list of receivers
|
|
// Current user will be handled separately
|
|
let (public_key, device_pubkey) = members.remove_entry(&user_pubkey).unwrap();
|
|
|
|
// Determine the signer will be used based on the provided options
|
|
let signer = Self::select_signer(&opts.signer_kind, device, user_signer)?;
|
|
|
|
// Collect the send reports
|
|
let mut reports: Vec<SendReport> = vec![];
|
|
|
|
for (receiver, device_pubkey) in members.into_iter() {
|
|
let urls = relay_cache.get(&receiver).cloned().unwrap_or_default();
|
|
|
|
// Check if there are any relays to send the message to
|
|
if urls.is_empty() {
|
|
reports.push(SendReport::new(receiver).relays_not_found());
|
|
continue;
|
|
}
|
|
|
|
// Skip sending if using encryption keys but device not found
|
|
if device_pubkey.is_none() && matches!(opts.signer_kind, SignerKind::Encryption) {
|
|
reports.push(SendReport::new(receiver).device_not_found());
|
|
continue;
|
|
}
|
|
|
|
// Determine the receiver based on the signer kind
|
|
let rumor = rumor.clone();
|
|
let target = Self::select_receiver(&opts.signer_kind, receiver, device_pubkey);
|
|
let event = EventBuilder::gift_wrap(&signer, &target, rumor, vec![]).await?;
|
|
|
|
// Send the event to the messaging relays
|
|
match client.send_event_to(urls, &event).await {
|
|
Ok(output) => {
|
|
let id = output.id().to_owned();
|
|
let auth = output.failed.iter().any(|(_, s)| s.starts_with("auth-"));
|
|
let report = SendReport::new(receiver).status(output);
|
|
|
|
if auth {
|
|
// Wait for authenticated and resent event successfully
|
|
for attempt in 0..=SEND_RETRY {
|
|
let retry_manager = states.tracker().read().await;
|
|
let ids = retry_manager.resent_ids();
|
|
|
|
// Check if event was successfully resent
|
|
if let Some(output) = ids.iter().find(|e| e.id() == &id).cloned() {
|
|
let output = SendReport::new(receiver).status(output);
|
|
reports.push(output);
|
|
break;
|
|
}
|
|
|
|
// Check if retry limit exceeded
|
|
if attempt == SEND_RETRY {
|
|
reports.push(report);
|
|
break;
|
|
}
|
|
|
|
smol::Timer::after(Duration::from_millis(1200)).await;
|
|
}
|
|
} else {
|
|
reports.push(report);
|
|
}
|
|
}
|
|
Err(e) => {
|
|
reports.push(SendReport::new(receiver).error(e.to_string()));
|
|
}
|
|
}
|
|
}
|
|
|
|
// Construct a gift wrap to back up to current user's owned messaging relays
|
|
let rumor = rumor.clone();
|
|
let target = Self::select_receiver(&opts.signer_kind, public_key, device_pubkey);
|
|
let event = EventBuilder::gift_wrap(&signer, &target, rumor, vec![]).await?;
|
|
|
|
// Only send a backup message to current user if sent successfully to others
|
|
if opts.backup() && reports.iter().all(|r| r.is_sent_success()) {
|
|
let urls = relay_cache.get(&public_key).cloned().unwrap_or_default();
|
|
|
|
// Check if there are any relays to send the event to
|
|
if urls.is_empty() {
|
|
reports.push(SendReport::new(public_key).relays_not_found());
|
|
} else {
|
|
// Send the event to the messaging relays
|
|
match client.send_event_to(urls, &event).await {
|
|
Ok(output) => {
|
|
reports.push(SendReport::new(public_key).status(output));
|
|
}
|
|
Err(e) => {
|
|
reports.push(SendReport::new(public_key).error(e.to_string()));
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
reports.push(SendReport::new(public_key).on_hold(event));
|
|
}
|
|
|
|
Ok(reports)
|
|
})
|
|
}
|
|
|
|
/// Create a task to resend a failed message
|
|
pub fn resend_message(
|
|
&self,
|
|
reports: Vec<SendReport>,
|
|
cx: &App,
|
|
) -> Task<Result<Vec<SendReport>, Error>> {
|
|
cx.background_spawn(async move {
|
|
let states = app_state();
|
|
let client = states.client();
|
|
let mut resend_reports = vec![];
|
|
|
|
for report in reports.into_iter() {
|
|
let receiver = report.receiver;
|
|
|
|
// Process failed events
|
|
if let Some(output) = report.status {
|
|
let id = output.id();
|
|
let urls: Vec<&RelayUrl> = output.failed.keys().collect();
|
|
|
|
if let Some(event) = client.database().event_by_id(id).await? {
|
|
for url in urls.into_iter() {
|
|
let relay = client.pool().relay(url).await?;
|
|
let id = relay.send_event(&event).await?;
|
|
|
|
let resent: Output<EventId> = Output {
|
|
val: id,
|
|
success: HashSet::from([url.to_owned()]),
|
|
failed: HashMap::new(),
|
|
};
|
|
|
|
resend_reports.push(SendReport::new(receiver).status(resent));
|
|
}
|
|
}
|
|
}
|
|
|
|
// Process the on hold event if it exists
|
|
if let Some(event) = report.on_hold {
|
|
let urls = states.messaging_relays(receiver).await;
|
|
|
|
// Check if there are any relays to send the event to
|
|
if urls.is_empty() {
|
|
resend_reports.push(SendReport::new(receiver).relays_not_found());
|
|
} else {
|
|
// Send the event to the messaging relays
|
|
match client.send_event_to(urls, &event).await {
|
|
Ok(output) => {
|
|
resend_reports.push(SendReport::new(receiver).status(output));
|
|
}
|
|
Err(e) => {
|
|
resend_reports.push(SendReport::new(receiver).error(e.to_string()));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
Ok(resend_reports)
|
|
})
|
|
}
|
|
|
|
fn select_signer<T>(kind: &SignerKind, device: Option<T>, user: T) -> Result<T, Error>
|
|
where
|
|
T: NostrSigner,
|
|
{
|
|
match kind {
|
|
SignerKind::Encryption => {
|
|
Ok(device.ok_or_else(|| anyhow!("No encryption keys found"))?)
|
|
}
|
|
SignerKind::User => Ok(user),
|
|
SignerKind::Auto => Ok(device.unwrap_or(user)),
|
|
}
|
|
}
|
|
|
|
fn select_receiver(kind: &SignerKind, user: PublicKey, device: Option<PublicKey>) -> PublicKey {
|
|
match kind {
|
|
SignerKind::Encryption => device.unwrap(),
|
|
SignerKind::User => user,
|
|
SignerKind::Auto => device.unwrap_or(user),
|
|
}
|
|
}
|
|
}
|