mirror of
https://github.com/meshtastic/Meshtastic-Apple.git
synced 2026-04-20 22:13:56 +00:00
* Bump version * Stop and resume DD Session Replay on app backgrounding and activation to prevent crashes * TAK server -> TestFlight (#1567) * Bump version * Message list performance fixes into 2.7.6 (#1475) * Remove extra want config call when adding a contact * App badge and unnecessary notification fixes (#1455) * - Fix for app badge not going to zero if a message arrives while you have that chat open - Fix for push notifications popping up when a message is received while that chat is open * Fix for cancelling notifications, works now. And scroll to bottom of conversation upon new message * Fix: Channels help grammer fix (#1452) * remove outdated TCP not available on Apple devices (#1450) * Update initial onboarding view * remove toggle gating for mac * Update crash reporting opt out in real time * Update onboarding text * Use mDNS text records for node name * TCP IP and port on the connection screen * Hide app icon chooser on mac * Infinite loop hang bugfixes and performance improvements for both `UserMessageList` and `ChannelMessageList` (#1465) * 2.7.5 Working Changes (#1460) * Remove extra want config call when adding a contact * App badge and unnecessary notification fixes (#1455) * - Fix for app badge not going to zero if a message arrives while you have that chat open - Fix for push notifications popping up when a message is received while that chat is open * Fix for cancelling notifications, works now. And scroll to bottom of conversation upon new message * Fix: Channels help grammer fix (#1452) * remove outdated TCP not available on Apple devices (#1450) * Update initial onboarding view * remove toggle gating for mac * Update crash reporting opt out in real time * Update onboarding text --------- Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> * UserEntity: add mostRecentMessage and unreadMessages with early exit when lastMessage is nil, and fetch 1 row (not N) otherwise * UserList: replace 5 slow calls to user.messageList with new fast calls * NodeList: always put the connected node at the top of list (if it matches the node filters) * ChannelEntity: add faster mostRecentPrivateMessage and unreadMessages which fetch 1 row (not N) * ChannelList: replace 5 calls to channel.allPrivateMessage with new fast calls * Fix incorrect appState.unreadDirectMessages calculations * MyInfoEntity: also fix unreadMessages count here to be fast, and use it for appState.unreadChannelMessages * UserMessageList: use @FetchRequest to prevent the N^2 behavior that was happening in calls to allPrivateMessages * Refactor ChannelEntityExtension and MyInfoEntityExtension to be more similar to UserEntityExtension * Remove SwiftUI-infinite-loop-causing `.id(redrawTapbacksTrigger)` in ChannelMessageList and UserMessageList (duplicate row ids) * MyInfoEntityExtension: exclude emoji tapbacks (which never get marked as read anyway) from unread message count * Add SaveChannelLinkData so MessageText and MeshtasticApp can use .sheet(item: ...) and avoid infinite loop hang due to Binding rebuild * ChannelMessageList and UserMessageList: switch to stable messageId for ForEach SwiftUI row identity * ChannelMessageList and UserMessageList: debouncedScrollToBottom; keyboardWillShowNotification/keyboardDidShowNotification * ChannelMessageList and UserMessageList: scroll to bottom onFirstAppear * ChannelMessageList and UserMessageList: block spurious markMessagesAsRead when this View is not active --------- Co-authored-by: Garth Vander Houwen <garth@meshtastic.com> Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> * message-list-performance: revert scrolling changes (#1472) * Reverte0f0b4a0f7(ChannelMessageList and UserMessageList: scroll to bottom onFirstAppear) * Revert "ChannelMessageList and UserMessageList: debouncedScrollToBottom; keyboardWillShowNotification/keyboardDidShowNotification" This reverts commitee1a7c4415. --------- Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> Co-authored-by: Mike Robbins <mrobbins@alum.mit.edu> * Explicitly set unmessagable, seems unnessary * Add back missing mesh map features * Fix: "Retrieving nodes" significantly slower after reconnect extracted from #1424 (#1477) * Fix: "Retrieving nodes" significantly slower after reconnect (#1424) The node database retrieval was calling context.save() for every single NodeInfo packet received (250 saves for 250 nodes). This caused severe performance degradation on reconnect when CoreData had accumulated state. Root Cause: - nodeInfoPacket() called context.save() immediately for each node - With 250 nodes, this meant 250 individual CoreData save operations - On first connection, CoreData is fresh and fast - On reconnect, CoreData has accumulated change tracking, undo management, and memory pressure, making each save progressively slower - This resulted in 10+ second retrieval times vs 1-2 seconds initially Solution: - Added deferSave parameter to nodeInfoPacket() function - During database retrieval (.retrievingDatabase state), defer all saves - Perform a single batch save when database retrieval completes (when NONCE_ONLY_DB configCompleteID is received) - This reduces 250 saves to 1 save Performance Impact: - Eliminates N individual saves during node database sync - Reduces database retrieval time back to 1-2 seconds on reconnect - Matches first-connection performance consistently Fixes #1424 * Revert *MessageListUnified files --------- Co-authored-by: Martin Bogomolni <martinbogo@gmail.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> * Hide route lines filter from mesh map * Mesh Map: fuzz imprecise locations so they're distinguishable and clickable at the highest zoom levels (#1478) Co-authored-by: Garth Vander Houwen <garth@meshtastic.com> * Fix bad merge * Update Meshtastic/Extensions/CoreData/UserEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Views/Nodes/Helpers/Map/MapContent/MeshMapContent.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Extensions/CoreData/ChannelEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Extensions/CoreData/MyInfoEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Extensions/CoreData/ChannelEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Keep list of previous manual connections (#1484) * Keep list of previous manual connections * More descriptive manual connection rows * Merge fixes and new way to show IP on Connect view --------- Co-authored-by: Jake-B <jake-b@users.noreply.github.com> * Show who relayed messages (#1486) * Add identification for node that relayed text messages and add count for ammount of relayers of your message * Ack Relays * upsertPositionPacket: don't use future timestamps to set node's lastHeard (#1488) * R1 NEO * Neo * Update Meshtastic/Views/Settings/AppSettings.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Remove bad if * Git rid of extra environment variable * Update Meshtastic/Accessory/Transports/TCP/TCPTransport.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * MeshMap performance: quick wins (#1490) * MeshMap: change onMapCameraChange frequency to .onEnd so that zooming doesn't cause continuous SwiftUI reevaluation on every frame * MeshMapContent: factor out reducedPrecisionMapCircles into a separate function * MeshMapContent: when multiple reducedPrecisionCircles have the same (lat,lon,radius), just draw one (big perf boost in dense areas) * NodeMap performance improvements for high # positions history (#1480) * NodeMapContent: move Route Lines out of ForEach * NodeMapContent: move Convex Hull out of ForEach * NodeMapContent: Replace `position.nodePosition?` with `node` * NodeMapContent: drop unnecessary LazyVStack in showNodeHistory * NodeMapContent: hoist out nodeColorSwift * Move lineCoords, loraCoords calculations within showRouteLines, showConvexHull respectively * Hoist out repeated node.metadata?.positionFlags lookups / PositionFlags creation * NodeMapContent: remove unused @State * NodeMapSwiftUI: add NodeMapContentEquatableWrapper and NodeMapContentSignature to prevent frequent NodeMapContent recomputation and infinite render loops * NodeMapSwiftUI: disable animation during SwiftUI transactions * NodeMapContent: hoist nodeBorderColor and set allowsHitTesting(false) on history point views * NodeMapContent: prerenderHistoryPointCircle and prerenderHistoryPointArrow to avoid thousands of vector draw operations * NodeMapContent: Shared coordinate list for Route Lines and Convex Hull * NodeMapContent.prerenderHistoryPointArrow: add .frame(width: 16, height: 16) * Fix wantRangeTestPackets to correctly follow rangeTestConfig.enabled (#1489) * Fix interval drop down formatter * Clean up channel qr code functionality. * perferredPeripheralId fix * Set opt in * Retry once 5 second timer. dont throw the error * Queue for peripherals * Fix: hoplimit of dms would always fallback to hops away of the node even when configured hops was higher (#1495) * fix hops setting in dms * Fix hops for exchange position * Final fix * Don't favorite client base * Update device hardware * Prevent nil environment metrics * Bump datadog sdk * fix setting device telemetry enabled (#1515) * Update Muzi R1 Neo to actively supported * fix setting device telemetry enabled --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * Don't subscribe to mqtt topic if downlink is not on (#1501) * Dont sub if no downlink * moved reload mqtt connect config * Preview enabled in connected devices (#1509) * Update Muzi R1 Neo to actively supported * Preview enabled in connected devices * Fixing indentation * Fixing indentation --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * UpdateCoreData.updateAnyPacketFrom: mirror firmware's lastHeard/snr/rssi/hopsAway update logic from NodeDB::updateFrom (#1492) * `CLIENT_BASE` add-favorite/role-change confirmation dialog (#1493) * FavoriteNodeButton: refactor task out * AccessoryManager.connectedDeviceRole helper * FavoriteNodeButton: show confirmation dialog when a CLIENT_BASE is trying to add a favorite * addContactFromURL: add comment referencing upcoming change in https://github.com/meshtastic/firmware/pull/8495 * DeviceConfig: role picker: show a warning when selecting CLIENT_BASE, similar to warning shown for ROUTER * Adjust device configuration Client Base warning text * Compass view (#1521) * Added compass view * Added Compass View * Node colors in compass * Update Muzi R1 Neo to actively supported * Update PositionPopover.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Views/Helpers/CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Views/Helpers/CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --------- Co-authored-by: Benjamin Faershtein <119711889+RCGV1@users.noreply.github.com> Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Remove discovery queue * revert problematic retry functionalliy * format file * Update & improve zh-Hans translation (#1523) * Update Muzi R1 Neo to actively supported * update & improve zh-Hans translation rt --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * Update protobufs to 2.7.1 * Add long-turbo preset * Disable Range Test module when primary channel is public/unsecured (#1512) * Update Muzi R1 Neo to actively supported * Disable Range Test module when primary channel is public/unsecured Updated RangeTestConfig.swift to determine whether the primary channel (index 0) is operating without encryption or with a 1-byte minimal PSK. Disabled Range Test UI controls when on a public/default channel to prevent user interaction. Added safety enforcement in the save operation: Range Test enabled flag is automatically forced to false before sending updates to the device. Introduced a computed property isPrimaryChannelPublic following existing code patterns and security indicators (e.g., hexDescription PSK length). Matches the behavior implemented in the Android client for consistent policy across platforms. --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * Add new device images * Remove print statement, get rid of cut and paste error * Bump version * update the translations (#1540) update the translations * Don't alert (with sound: .default) when updating Live Activity (#1536) * Fix adding channels (#1532) * Full translation into Spanish (#1529) * tapback with any emoji (#1538) * Call clearStaleNodes at start of sendWantConfig (#1535) * NFC Tag contact (#1537) * Accessorymanager background discovery (#1542) * Don't add new BLE devices to the device list in the backgournd * Bump version * Update Meshtastic/MeshtasticApp.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/MeshtasticApp.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --------- Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Revert "Full translation into Spanish (#1529)" (#1543) This reverts commitf25fdfb89f. * Revert "update the translations (#1540)" (#1544) This reverts commitcb2fd8cc15. * Revert "NFC Tag contact (#1537)" (#1545) This reverts commit5c22b8b6e0. * Update Muzi R1 Neo to actively supported * Revert "Update Muzi R1 Neo to actively supported" * 2.7.6 Working Changes (#1479) * Bump version * Message list performance fixes into 2.7.6 (#1475) * Remove extra want config call when adding a contact * App badge and unnecessary notification fixes (#1455) * - Fix for app badge not going to zero if a message arrives while you have that chat open - Fix for push notifications popping up when a message is received while that chat is open * Fix for cancelling notifications, works now. And scroll to bottom of conversation upon new message * Fix: Channels help grammer fix (#1452) * remove outdated TCP not available on Apple devices (#1450) * Update initial onboarding view * remove toggle gating for mac * Update crash reporting opt out in real time * Update onboarding text * Use mDNS text records for node name * TCP IP and port on the connection screen * Hide app icon chooser on mac * Infinite loop hang bugfixes and performance improvements for both `UserMessageList` and `ChannelMessageList` (#1465) * 2.7.5 Working Changes (#1460) * Remove extra want config call when adding a contact * App badge and unnecessary notification fixes (#1455) * - Fix for app badge not going to zero if a message arrives while you have that chat open - Fix for push notifications popping up when a message is received while that chat is open * Fix for cancelling notifications, works now. And scroll to bottom of conversation upon new message * Fix: Channels help grammer fix (#1452) * remove outdated TCP not available on Apple devices (#1450) * Update initial onboarding view * remove toggle gating for mac * Update crash reporting opt out in real time * Update onboarding text --------- Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> * UserEntity: add mostRecentMessage and unreadMessages with early exit when lastMessage is nil, and fetch 1 row (not N) otherwise * UserList: replace 5 slow calls to user.messageList with new fast calls * NodeList: always put the connected node at the top of list (if it matches the node filters) * ChannelEntity: add faster mostRecentPrivateMessage and unreadMessages which fetch 1 row (not N) * ChannelList: replace 5 calls to channel.allPrivateMessage with new fast calls * Fix incorrect appState.unreadDirectMessages calculations * MyInfoEntity: also fix unreadMessages count here to be fast, and use it for appState.unreadChannelMessages * UserMessageList: use @FetchRequest to prevent the N^2 behavior that was happening in calls to allPrivateMessages * Refactor ChannelEntityExtension and MyInfoEntityExtension to be more similar to UserEntityExtension * Remove SwiftUI-infinite-loop-causing `.id(redrawTapbacksTrigger)` in ChannelMessageList and UserMessageList (duplicate row ids) * MyInfoEntityExtension: exclude emoji tapbacks (which never get marked as read anyway) from unread message count * Add SaveChannelLinkData so MessageText and MeshtasticApp can use .sheet(item: ...) and avoid infinite loop hang due to Binding rebuild * ChannelMessageList and UserMessageList: switch to stable messageId for ForEach SwiftUI row identity * ChannelMessageList and UserMessageList: debouncedScrollToBottom; keyboardWillShowNotification/keyboardDidShowNotification * ChannelMessageList and UserMessageList: scroll to bottom onFirstAppear * ChannelMessageList and UserMessageList: block spurious markMessagesAsRead when this View is not active --------- Co-authored-by: Garth Vander Houwen <garth@meshtastic.com> Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> * message-list-performance: revert scrolling changes (#1472) * Reverte0f0b4a0f7(ChannelMessageList and UserMessageList: scroll to bottom onFirstAppear) * Revert "ChannelMessageList and UserMessageList: debouncedScrollToBottom; keyboardWillShowNotification/keyboardDidShowNotification" This reverts commitee1a7c4415. --------- Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> Co-authored-by: Mike Robbins <mrobbins@alum.mit.edu> * Explicitly set unmessagable, seems unnessary * Add back missing mesh map features * Fix: "Retrieving nodes" significantly slower after reconnect extracted from #1424 (#1477) * Fix: "Retrieving nodes" significantly slower after reconnect (#1424) The node database retrieval was calling context.save() for every single NodeInfo packet received (250 saves for 250 nodes). This caused severe performance degradation on reconnect when CoreData had accumulated state. Root Cause: - nodeInfoPacket() called context.save() immediately for each node - With 250 nodes, this meant 250 individual CoreData save operations - On first connection, CoreData is fresh and fast - On reconnect, CoreData has accumulated change tracking, undo management, and memory pressure, making each save progressively slower - This resulted in 10+ second retrieval times vs 1-2 seconds initially Solution: - Added deferSave parameter to nodeInfoPacket() function - During database retrieval (.retrievingDatabase state), defer all saves - Perform a single batch save when database retrieval completes (when NONCE_ONLY_DB configCompleteID is received) - This reduces 250 saves to 1 save Performance Impact: - Eliminates N individual saves during node database sync - Reduces database retrieval time back to 1-2 seconds on reconnect - Matches first-connection performance consistently Fixes #1424 * Revert *MessageListUnified files --------- Co-authored-by: Martin Bogomolni <martinbogo@gmail.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> * Hide route lines filter from mesh map * Mesh Map: fuzz imprecise locations so they're distinguishable and clickable at the highest zoom levels (#1478) Co-authored-by: Garth Vander Houwen <garth@meshtastic.com> * Fix bad merge * Update Meshtastic/Extensions/CoreData/UserEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Views/Nodes/Helpers/Map/MapContent/MeshMapContent.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Extensions/CoreData/ChannelEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Extensions/CoreData/MyInfoEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Extensions/CoreData/ChannelEntityExtension.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Keep list of previous manual connections (#1484) * Keep list of previous manual connections * More descriptive manual connection rows * Merge fixes and new way to show IP on Connect view --------- Co-authored-by: Jake-B <jake-b@users.noreply.github.com> * Show who relayed messages (#1486) * Add identification for node that relayed text messages and add count for ammount of relayers of your message * Ack Relays * upsertPositionPacket: don't use future timestamps to set node's lastHeard (#1488) * R1 NEO * Neo * Update Meshtastic/Views/Settings/AppSettings.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Remove bad if * Git rid of extra environment variable * Update Meshtastic/Accessory/Transports/TCP/TCPTransport.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * MeshMap performance: quick wins (#1490) * MeshMap: change onMapCameraChange frequency to .onEnd so that zooming doesn't cause continuous SwiftUI reevaluation on every frame * MeshMapContent: factor out reducedPrecisionMapCircles into a separate function * MeshMapContent: when multiple reducedPrecisionCircles have the same (lat,lon,radius), just draw one (big perf boost in dense areas) * NodeMap performance improvements for high # positions history (#1480) * NodeMapContent: move Route Lines out of ForEach * NodeMapContent: move Convex Hull out of ForEach * NodeMapContent: Replace `position.nodePosition?` with `node` * NodeMapContent: drop unnecessary LazyVStack in showNodeHistory * NodeMapContent: hoist out nodeColorSwift * Move lineCoords, loraCoords calculations within showRouteLines, showConvexHull respectively * Hoist out repeated node.metadata?.positionFlags lookups / PositionFlags creation * NodeMapContent: remove unused @State * NodeMapSwiftUI: add NodeMapContentEquatableWrapper and NodeMapContentSignature to prevent frequent NodeMapContent recomputation and infinite render loops * NodeMapSwiftUI: disable animation during SwiftUI transactions * NodeMapContent: hoist nodeBorderColor and set allowsHitTesting(false) on history point views * NodeMapContent: prerenderHistoryPointCircle and prerenderHistoryPointArrow to avoid thousands of vector draw operations * NodeMapContent: Shared coordinate list for Route Lines and Convex Hull * NodeMapContent.prerenderHistoryPointArrow: add .frame(width: 16, height: 16) * Fix wantRangeTestPackets to correctly follow rangeTestConfig.enabled (#1489) * Fix interval drop down formatter * Clean up channel qr code functionality. * perferredPeripheralId fix * Set opt in * Retry once 5 second timer. dont throw the error * Queue for peripherals * Fix: hoplimit of dms would always fallback to hops away of the node even when configured hops was higher (#1495) * fix hops setting in dms * Fix hops for exchange position * Final fix * Don't favorite client base * Update device hardware * Prevent nil environment metrics * Bump datadog sdk * fix setting device telemetry enabled (#1515) * Update Muzi R1 Neo to actively supported * fix setting device telemetry enabled --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * Don't subscribe to mqtt topic if downlink is not on (#1501) * Dont sub if no downlink * moved reload mqtt connect config * Preview enabled in connected devices (#1509) * Update Muzi R1 Neo to actively supported * Preview enabled in connected devices * Fixing indentation * Fixing indentation --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * UpdateCoreData.updateAnyPacketFrom: mirror firmware's lastHeard/snr/rssi/hopsAway update logic from NodeDB::updateFrom (#1492) * `CLIENT_BASE` add-favorite/role-change confirmation dialog (#1493) * FavoriteNodeButton: refactor task out * AccessoryManager.connectedDeviceRole helper * FavoriteNodeButton: show confirmation dialog when a CLIENT_BASE is trying to add a favorite * addContactFromURL: add comment referencing upcoming change in https://github.com/meshtastic/firmware/pull/8495 * DeviceConfig: role picker: show a warning when selecting CLIENT_BASE, similar to warning shown for ROUTER * Adjust device configuration Client Base warning text * Compass view (#1521) * Added compass view * Added Compass View * Node colors in compass * Update Muzi R1 Neo to actively supported * Update PositionPopover.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Views/Helpers/CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Views/Helpers/CompassView.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --------- Co-authored-by: Benjamin Faershtein <119711889+RCGV1@users.noreply.github.com> Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Remove discovery queue * revert problematic retry functionalliy * format file * Update & improve zh-Hans translation (#1523) * Update Muzi R1 Neo to actively supported * update & improve zh-Hans translation rt --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * Update protobufs to 2.7.1 * Add long-turbo preset * Disable Range Test module when primary channel is public/unsecured (#1512) * Update Muzi R1 Neo to actively supported * Disable Range Test module when primary channel is public/unsecured Updated RangeTestConfig.swift to determine whether the primary channel (index 0) is operating without encryption or with a 1-byte minimal PSK. Disabled Range Test UI controls when on a public/default channel to prevent user interaction. Added safety enforcement in the save operation: Range Test enabled flag is automatically forced to false before sending updates to the device. Introduced a computed property isPrimaryChannelPublic following existing code patterns and security indicators (e.g., hexDescription PSK length). Matches the behavior implemented in the Android client for consistent policy across platforms. --------- Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> * Add new device images * Remove print statement, get rid of cut and paste error --------- Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> Co-authored-by: Mike Robbins <mrobbins@alum.mit.edu> Co-authored-by: Martin Bogomolni <martinbogo@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: jake-b <1012393+jake-b@users.noreply.github.com> Co-authored-by: Benjamin Faershtein <119711889+RCGV1@users.noreply.github.com> Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> Co-authored-by: Charles Pinesky <25388414+Vaidios@users.noreply.github.com> Co-authored-by: Radio <35003866+radiolee@users.noreply.github.com> Co-authored-by: Jason Houk <dubsectordevelopment@gmail.com> * Initial TAK Server implementation for IOS based TAK clients This is my initial implementation for a TAK Server running inside Meshtastic-Apple. * Update marketing version to 2.7.7 * Update MessageText.swift * Update Meshtastic/Helpers/TAK/CoTMessage.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Helpers/TAK/TAKCertificateManager.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Refactor TAKServerConfig file importer to conditionally allow p12 or pem types; update CoTMessage parsing method name for clarity; enhance mTLS logging in TAKServerManager. --------- Co-authored-by: Garth Vander Houwen <garthvh@yahoo.com> Co-authored-by: Garth Vander Houwen <garth@meshtastic.com> Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> Co-authored-by: Mike Robbins <mrobbins@alum.mit.edu> Co-authored-by: Martin Bogomolni <martinbogo@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: jake-b <1012393+jake-b@users.noreply.github.com> Co-authored-by: Benjamin Faershtein <119711889+RCGV1@users.noreply.github.com> Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Charles Pinesky <25388414+Vaidios@users.noreply.github.com> Co-authored-by: Radio <35003866+radiolee@users.noreply.github.com> Co-authored-by: Jason Houk <dubsectordevelopment@gmail.com> Co-authored-by: MGJ <62177301+MGJ520@users.noreply.github.com> Co-authored-by: Alvaro Samudio <alvarosamudio@protonmail.com> Co-authored-by: Mathew Kamkar <578302+matkam@users.noreply.github.com> Co-authored-by: niccellular <79813408+niccellular@users.noreply.github.com> * Fix * Add localization strings * CoreData Writes wrapped in an Actor (#1569) * MeshPackets.swift into an actor and make async * Move upserts in UpdateCoreData to the MeshPackets actor * Update Meshtastic/Views/Settings/AppSettings.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Update Meshtastic/Persistence/UpdateCoreData.swift Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --------- Co-authored-by: Jake-B <jake-b@users.noreply.github.com> Co-authored-by: Ben Meadors <benmmeadors@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> * Refactor channel packet sending to use async/await pattern * Fix call * `// swiftlint:disable` overrides for TAK * Revert "Fix call" This reverts commit097ddbd43f. * Move CoreData operations onto background actor * Fix for discovery reconnect issues (#1574) Co-authored-by: Jake-B <jake-b@users.noreply.github.com> * Remove specific TAK client references Be TAK client neutral. * Update TAKDataPackageGenerator.swift Add client cert to datapackage generation for TAK clients who require it. (TAK Aware afaik) * Ble improvements (#1583) * Fix for discovery reconnect issues * Allow disconnect earlier in the connection process --------- Co-authored-by: Jake-B <jake-b@users.noreply.github.com> * Update linker flag for ios 17 crash * Update protobufs * Ru/translation (#1571) * Russian localization is 50% * Russian localization is 100% * fix Taiwan language Co-authored-by: Sergei K <svk@svk.su> Co-authored-by: Dmitriy Petrov <kenzot.fpv@gmail.com> * Fix connectToPreferredDevice parameter type to resolve compilation error (#1590) * Initial plan * Fix connectToPreferredDevice signature to accept optional device parameter Co-authored-by: garthvh <1795163+garthvh@users.noreply.github.com> --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: garthvh <1795163+garthvh@users.noreply.github.com> * Fix TAK certificate security and storage consistency Address multiple certificate management issues identified in code review: - Fix server P12 storage/retrieval inconsistency: getActiveServerP12Data() now reads from Keychain instead of UserDefaults, matching where importServerIdentity() stores the data - Improve client P12 security: migrate storage from UserDefaults to Keychain to protect certificate data from unauthorized access and backups - Fix Keychain cleanup: clearCustomCertificateData() now properly deletes both server and client P12 data from Keychain during reset - Add force-unwrap safety: replace sec_identity_create() force-unwrap with guard statement to prevent crashes, throwing TAKServerError.tlsConfigurationFailed instead - Remove unused backup certificates: delete Resources/Certificates/backup/ folder to reduce app bundle size and avoid confusion about which certificates are active All certificate data (both server and client P12 files and passwords) now consistently use Keychain storage for improved security and proper cleanup during resets. * Update TAKDataPackageGenerator.swift Fix TAKAware's data package ingestion error. This was due to us generating a DP with certs in a cert subdirectory. However TAKAware's parser did not check subdirectories. 3 areas changed in TAKDataPackageGenerator.swift: 1. Removed certs/ subdirectory creation (old lines 50-52) — the pref file and certificates are now written directly to tempDir instead of certsDir 2. Files written to tempDir instead of certsDir — the pref file (line 72), truststore (line 80), and client cert (line 89) all go to the package root 3. Manifest zipEntry values flattened (lines 216-218) — changed from certs\filename to just filename Pref file cert/ paths left unchanged (lines 170, 172) — these are ATAK convention for the client's internal cert store path, not zip-relative paths. SwiftTAK strips them to just the filename anyway, and ATAK/iTAK interpret them the same way. The resulting zip structure will now be: Meshtastic_TAK_Server/ ├── manifest.xml ├── meshtastic-server.pref ├── truststore.p12 └── DeviceName.p12 This matches the flat structure used by all passing SwiftTAK test packages (tak-all-top.zip, tak-subfolder-all-top.zip, etc.). * Fix copilot identified issues #10 — manifest.xml: Removed certs\ prefix from zip entry paths so they match the actual flat file structure. #11 — taky-server.pref: Fixed cert/ path prefixes to match the flat structure, and replaced hardcoded atakatak passwords with YOURPASSWORD placeholders. #12 — TAKServerConfig.swift:41: Replaced force-unwraps (UTType(filenameExtension: "p12")!) with nil-coalescing fallbacks (?? .pkcs12 and ?? .plainText). #13 — TAKConnection.swift:26: Removed the unused bufferTrimSize constant. --------- Co-authored-by: Ben Meadors <benmmeadors@gmail.com> Co-authored-by: Gnome Adrift <646322+gnomeadrift@users.noreply.github.com> Co-authored-by: Zain Kergaye <62440012+ZainKergaye@users.noreply.github.com> Co-authored-by: NillRudd <102033730+NillRudd@users.noreply.github.com> Co-authored-by: Jake-B <jake-b@users.noreply.github.com> Co-authored-by: Mike Robbins <mrobbins@alum.mit.edu> Co-authored-by: Martin Bogomolni <martinbogo@gmail.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: jake-b <1012393+jake-b@users.noreply.github.com> Co-authored-by: Benjamin Faershtein <119711889+RCGV1@users.noreply.github.com> Co-authored-by: Jonathan Bennett <jbennett@incomsystems.biz> Co-authored-by: Charles Pinesky <25388414+Vaidios@users.noreply.github.com> Co-authored-by: Radio <35003866+radiolee@users.noreply.github.com> Co-authored-by: Jason Houk <dubsectordevelopment@gmail.com> Co-authored-by: MGJ <62177301+MGJ520@users.noreply.github.com> Co-authored-by: Alvaro Samudio <alvarosamudio@protonmail.com> Co-authored-by: Mathew Kamkar <578302+matkam@users.noreply.github.com> Co-authored-by: niccellular <79813408+niccellular@users.noreply.github.com> Co-authored-by: Dmitriy Q <40627944+krotesk@users.noreply.github.com> Co-authored-by: Sergei K <svk@svk.su> Co-authored-by: Dmitriy Petrov <kenzot.fpv@gmail.com> Co-authored-by: Copilot <198982749+Copilot@users.noreply.github.com> Co-authored-by: garthvh <1795163+garthvh@users.noreply.github.com>
1788 lines
83 KiB
Swift
1788 lines
83 KiB
Swift
//
|
|
// UpdateCoreData.swift
|
|
// Meshtastic
|
|
//
|
|
// Copyright(c) Garth Vander Houwen 10/3/22.
|
|
|
|
import CoreData
|
|
import MeshtasticProtobufs
|
|
import OSLog
|
|
|
|
extension MeshPackets {
|
|
public func clearStaleNodes(nodeExpireDays: Int) async -> Bool {
|
|
let context = self.backgroundContext
|
|
return await context.perform {
|
|
return self.clearStaleNodes(nodeExpireDays: nodeExpireDays, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated public func clearStaleNodes(nodeExpireDays: Int, context: NSManagedObjectContext) -> Bool {
|
|
var nodeExpireTime: TimeInterval {
|
|
return TimeInterval(-nodeExpireDays * 86400)
|
|
}
|
|
var nodePKIExpireTime: TimeInterval {
|
|
return TimeInterval((nodeExpireDays < 7 ? -7 : -nodeExpireDays) * 86400)
|
|
}
|
|
|
|
if nodeExpireDays == 0 {
|
|
// Purge Disabled
|
|
Logger.data.info("💾 [NodeInfoEntity] Skip clearing stale nodes")
|
|
return false
|
|
}
|
|
let fetchRequest = NSFetchRequest<NSFetchRequestResult>(entityName: "NodeInfoEntity")
|
|
fetchRequest.predicate = NSPredicate(format: "favorite == false AND ignored == false AND ((user.pkiEncrypted == NO AND lastHeard < %@) OR (user.pkiEncrypted == YES AND lastHeard < %@))",
|
|
NSDate(timeIntervalSinceNow: nodeExpireTime), NSDate(timeIntervalSinceNow: nodePKIExpireTime))
|
|
let batchDeleteRequest = NSBatchDeleteRequest(fetchRequest: fetchRequest)
|
|
batchDeleteRequest.resultType = .resultTypeCount
|
|
|
|
do {
|
|
Logger.data.info("💾 [NodeInfoEntity] Clearing nodes older than \(nodeExpireDays) days")
|
|
if let batchDeleteResult = try context.execute(batchDeleteRequest) as? NSBatchDeleteResult {
|
|
try context.save()
|
|
let deletedNodes = batchDeleteResult.result as? Int ?? 0
|
|
Logger.data.info("💾 [NodeInfoEntity] Cleared \(deletedNodes) stale nodes")
|
|
if deletedNodes > 0 {
|
|
return true
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [NodeInfoEntity] bad delete results")
|
|
}
|
|
} catch {
|
|
context.rollback()
|
|
Logger.data.error("💥 [NodeInfoEntity] Error deleting stale nodes")
|
|
}
|
|
return false
|
|
}
|
|
|
|
func clearPax(destNum: Int64) async -> Bool {
|
|
let context = self.backgroundContext
|
|
return await context.perform {
|
|
return self.clearPax(destNum: destNum, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated public func clearPax(destNum: Int64, context: NSManagedObjectContext) -> Bool {
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(destNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
let newPax = [PaxCounterLog]()
|
|
fetchedNode[0].pax? = NSOrderedSet(array: newPax)
|
|
do {
|
|
try context.save()
|
|
return true
|
|
|
|
} catch {
|
|
context.rollback()
|
|
return false
|
|
}
|
|
} catch {
|
|
Logger.data.error("💥 [NodeInfoEntity] fetch data error")
|
|
return false
|
|
}
|
|
}
|
|
|
|
public func clearPositions(destNum: Int64) async -> Bool {
|
|
let context = self.backgroundContext
|
|
return await context.perform {
|
|
return self.clearPositions(destNum: destNum, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated public func clearPositions(destNum: Int64, context: NSManagedObjectContext) -> Bool {
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(destNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
let newPostions = [PositionEntity]()
|
|
fetchedNode[0].positions? = NSOrderedSet(array: newPostions)
|
|
do {
|
|
try context.save()
|
|
return true
|
|
|
|
} catch {
|
|
context.rollback()
|
|
return false
|
|
}
|
|
} catch {
|
|
Logger.data.error("💥 [NodeInfoEntity] fetch data error")
|
|
return false
|
|
}
|
|
}
|
|
|
|
public func clearTelemetry(destNum: Int64, metricsType: Int32) async -> Bool {
|
|
let context = self.backgroundContext
|
|
return await context.perform {
|
|
return self.clearTelemetry(destNum: destNum, metricsType: metricsType, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated public func clearTelemetry(destNum: Int64, metricsType: Int32, context: NSManagedObjectContext) -> Bool {
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(destNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
let emptyTelemetry = [TelemetryEntity]()
|
|
fetchedNode[0].telemetries? = NSOrderedSet(array: emptyTelemetry)
|
|
do {
|
|
try context.save()
|
|
return true
|
|
|
|
} catch {
|
|
context.rollback()
|
|
return false
|
|
}
|
|
} catch {
|
|
Logger.data.error("💥 [NodeInfoEntity] fetch data error")
|
|
return false
|
|
}
|
|
}
|
|
|
|
public func deleteChannelMessages(channel: ChannelEntity) async {
|
|
let context = self.backgroundContext
|
|
let objectId = channel.objectID
|
|
await context.perform {
|
|
if let channelObject = context.object(with: objectId) as? ChannelEntity {
|
|
self.deleteChannelMessages(channel: channelObject, context: context)
|
|
}
|
|
}
|
|
}
|
|
|
|
nonisolated public func deleteChannelMessages(channel: ChannelEntity, context: NSManagedObjectContext) {
|
|
do {
|
|
let objects = channel.allPrivateMessages
|
|
for object in objects {
|
|
context.delete(object)
|
|
}
|
|
try context.save()
|
|
} catch let error as NSError {
|
|
Logger.data.error("\(error.localizedDescription, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
public func deleteUserMessages(user: UserEntity) async {
|
|
let context = self.backgroundContext
|
|
let objectId = user.objectID
|
|
await context.perform {
|
|
if let userObject = context.object(with: objectId) as? UserEntity {
|
|
self.deleteUserMessages(user: userObject, context: context)
|
|
}
|
|
}
|
|
}
|
|
|
|
nonisolated public func deleteUserMessages(user: UserEntity, context: NSManagedObjectContext) {
|
|
do {
|
|
let objects = user.messageList
|
|
for object in objects {
|
|
context.delete(object)
|
|
}
|
|
try context.save()
|
|
} catch let error as NSError {
|
|
Logger.data.error("\(error.localizedDescription, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
public func clearCoreDataDatabase(includeRoutes: Bool) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.clearCoreDataDatabase(context: context, includeRoutes: includeRoutes)
|
|
}
|
|
}
|
|
|
|
nonisolated public func clearCoreDataDatabase(context: NSManagedObjectContext, includeRoutes: Bool) {
|
|
let persistenceController = PersistenceController.shared.container
|
|
for i in 0...persistenceController.managedObjectModel.entities.count-1 {
|
|
|
|
let entity = persistenceController.managedObjectModel.entities[i]
|
|
let query = NSFetchRequest<NSFetchRequestResult>(entityName: entity.name!)
|
|
var deleteRequest = NSBatchDeleteRequest(fetchRequest: query)
|
|
let entityName = entity.name ?? "UNK"
|
|
|
|
if includeRoutes {
|
|
deleteRequest = NSBatchDeleteRequest(fetchRequest: query)
|
|
} else if !includeRoutes {
|
|
if !(entityName.contains("RouteEntity") || entityName.contains("LocationEntity")) {
|
|
deleteRequest = NSBatchDeleteRequest(fetchRequest: query)
|
|
}
|
|
}
|
|
do {
|
|
try context.executeAndMergeChanges(using: deleteRequest)
|
|
} catch {
|
|
Logger.data.error("\(error.localizedDescription, privacy: .public)")
|
|
}
|
|
}
|
|
}
|
|
|
|
func updateAnyPacketFrom (packet: MeshPacket, activeDeviceNum: Int64) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.updateAnyPacketFrom(packet: packet, activeDeviceNum: activeDeviceNum, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func updateAnyPacketFrom (packet: MeshPacket, activeDeviceNum: Int64, context: NSManagedObjectContext) {
|
|
// Update NodeInfoEntity for any packet received. This mirrors the firmware's NodeDB::updateFrom, which sniffs ALL received packets and updates the radio's nodeDB with packet.from's:
|
|
// - last_heard (from rxTime)
|
|
// - snr
|
|
// - via_mqtt
|
|
// - hops_away
|
|
|
|
// However, unlike the firmware, this function will NOT create a new NodeInfoEntity if we don't have it already. We'll leave that to the existing code paths.
|
|
|
|
// We do NOT update fetchedNode[0].channel, because we may hear a node over multiple channels, and only some packet types should update what we consider the node's channel to be. (Example: primary private channel, secondary public channel. A text message on the secondary public channel should NOT change fetchedNode[0].channel.)
|
|
|
|
guard packet.from > 0 else { return }
|
|
guard packet.from != activeDeviceNum else { return } // Ignore if packet is from our own node
|
|
|
|
let fetchNodeInfoAppRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoAppRequest.predicate = NSPredicate(format: "num == %lld", Int64(packet.from))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoAppRequest)
|
|
if fetchedNode.count >= 1 {
|
|
fetchedNode[0].id = Int64(packet.from)
|
|
fetchedNode[0].num = Int64(packet.from)
|
|
|
|
if packet.rxTime > 0 {
|
|
fetchedNode[0].lastHeard = Date(timeIntervalSince1970: TimeInterval(Int64(packet.rxTime)))
|
|
Logger.data.info("💾 [updateAnyPacketFrom] Updating node \(packet.from.toHex(), privacy: .public) lastHeard from rxTime=\(packet.rxTime)")
|
|
} else {
|
|
fetchedNode[0].lastHeard = Date()
|
|
Logger.data.info("💾 [updateAnyPacketFrom] Updating node \(packet.from.toHex(), privacy: .public) lastHeard to now (rxTime==0)")
|
|
}
|
|
|
|
fetchedNode[0].snr = packet.rxSnr
|
|
fetchedNode[0].rssi = packet.rxRssi
|
|
fetchedNode[0].viaMqtt = packet.viaMqtt
|
|
|
|
if packet.hopStart != 0 && packet.hopLimit <= packet.hopStart {
|
|
fetchedNode[0].hopsAway = Int32(packet.hopStart - packet.hopLimit)
|
|
Logger.data.info("💾 [updateAnyPacketFrom] Updating node \(packet.from.toHex(), privacy: .public) hopsAway=\(fetchedNode[0].hopsAway)")
|
|
}
|
|
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [updateAnyPacketFrom] Updating node \(fetchedNode[0].num.toHex(), privacy: .public) snr=\(fetchedNode[0].snr), rssi=\(fetchedNode[0].rssi) from packet \(packet.id.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [updateAnyPacketFrom] Error Saving node \(fetchedNode[0].num.toHex(), privacy: .public) from packet \(packet.id.toHex(), privacy: .public) \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
} catch {
|
|
Logger.data.error("💥 [updateAnyPacketFrom] fetch data error")
|
|
}
|
|
}
|
|
|
|
func upsertNodeInfoPacket (packet: MeshPacket, favorite: Bool = false) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertNodeInfoPacket(packet: packet, favorite: favorite, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertNodeInfoPacket (packet: MeshPacket, favorite: Bool = false, context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("[NodeInfo] received for: %@".localized, packet.from.toHex())
|
|
Logger.mesh.info("📟 \(logString, privacy: .public)")
|
|
|
|
guard packet.from > 0 else { return }
|
|
|
|
let fetchNodeInfoAppRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoAppRequest.predicate = NSPredicate(format: "num == %lld", Int64(packet.from))
|
|
|
|
do {
|
|
|
|
let fetchedNode = try context.fetch(fetchNodeInfoAppRequest)
|
|
if fetchedNode.count == 0 {
|
|
// Not Found Insert
|
|
let newNode = NodeInfoEntity(context: context)
|
|
newNode.id = Int64(packet.from)
|
|
newNode.num = Int64(packet.from)
|
|
newNode.favorite = favorite
|
|
if packet.rxTime > 0 {
|
|
newNode.firstHeard = Date(timeIntervalSince1970: TimeInterval(Int64(packet.rxTime)))
|
|
newNode.lastHeard = Date(timeIntervalSince1970: TimeInterval(Int64(packet.rxTime)))
|
|
} else {
|
|
newNode.firstHeard = Date()
|
|
newNode.lastHeard = Date()
|
|
}
|
|
newNode.snr = packet.rxSnr
|
|
newNode.rssi = packet.rxRssi
|
|
newNode.viaMqtt = packet.viaMqtt
|
|
|
|
if packet.to == Constants.maximumNodeNum || packet.to == UserDefaults.preferredPeripheralNum {
|
|
newNode.channel = Int32(packet.channel)
|
|
}
|
|
if let nodeInfoMessage = try? NodeInfo(serializedBytes: packet.decoded.payload) {
|
|
if nodeInfoMessage.hasHopsAway {
|
|
newNode.hopsAway = Int32(nodeInfoMessage.hopsAway)
|
|
}
|
|
newNode.favorite = nodeInfoMessage.isFavorite
|
|
}
|
|
|
|
if let newUserMessage = try? User(serializedBytes: packet.decoded.payload) {
|
|
|
|
if newUserMessage.id.isEmpty {
|
|
if packet.from > Constants.minimumNodeNum {
|
|
do {
|
|
let newUser = try createUser(num: Int64(truncatingIfNeeded: packet.from), context: context)
|
|
newNode.user = newUser
|
|
} catch CoreDataError.invalidInput(let message) {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity (Invalid Input) from node number: \(packet.from, privacy: .public) Error: \(message, privacy: .public)")
|
|
} catch {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity from node number: \(packet.from, privacy: .public) Error: \(error.localizedDescription, privacy: .public)")
|
|
}
|
|
}
|
|
} else {
|
|
|
|
let newUser = UserEntity(context: context)
|
|
newUser.userId = newNode.num.toHex()
|
|
newUser.num = Int64(packet.from)
|
|
newUser.longName = newUserMessage.longName
|
|
newUser.shortName = newUserMessage.shortName
|
|
newUser.role = Int32(newUserMessage.role.rawValue)
|
|
newUser.hwModel = String(describing: newUserMessage.hwModel).uppercased()
|
|
newUser.hwModelId = Int32(newUserMessage.hwModel.rawValue)
|
|
/// For nodes that have the optional isUnmessagable boolean use that, otherwise excluded roles that are unmessagable by default
|
|
if newUserMessage.hasIsUnmessagable {
|
|
newUser.unmessagable = newUserMessage.isUnmessagable
|
|
} else {
|
|
let roles = [2, 4, 5, 6, 7, 10, 11]
|
|
let containsRole = roles.contains(Int(newUser.role))
|
|
if containsRole {
|
|
newUser.unmessagable = true
|
|
} else {
|
|
newUser.unmessagable = false
|
|
}
|
|
}
|
|
if !newUserMessage.publicKey.isEmpty {
|
|
newUser.pkiEncrypted = true
|
|
newUser.publicKey = newUserMessage.publicKey
|
|
}
|
|
|
|
Task {
|
|
Api().loadDeviceHardwareData { (hw) in
|
|
let dh = hw.first(where: { $0.hwModel == newUser.hwModelId })
|
|
newUser.hwDisplayName = dh?.displayName
|
|
}
|
|
}
|
|
newNode.user = newUser
|
|
|
|
if UserDefaults.newNodeNotifications {
|
|
Task { @MainActor in
|
|
let manager = LocalNotificationManager()
|
|
manager.notifications = [
|
|
Notification(
|
|
id: (UUID().uuidString),
|
|
title: "New Node".localized,
|
|
subtitle: "\(newUser.longName ?? "Unknown".localized)",
|
|
content: "New Node has been discovered".localized,
|
|
target: "nodes",
|
|
path: "meshtastic:///nodes?nodenum=\(newUser.num)"
|
|
)
|
|
]
|
|
manager.schedule()
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
if packet.from > Constants.minimumNodeNum {
|
|
do {
|
|
let newUser = try createUser(num: Int64(truncatingIfNeeded: packet.from), context: context)
|
|
if !packet.publicKey.isEmpty {
|
|
newNode.user?.pkiEncrypted = true
|
|
newNode.user?.publicKey = packet.publicKey
|
|
}
|
|
newNode.user = newUser
|
|
} catch CoreDataError.invalidInput(let message) {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity (Invalid Input) from node number: \(packet.from, privacy: .public) Error: \(message, privacy: .public)")
|
|
} catch {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity from node number: \(packet.from, privacy: .public) Error: \(error.localizedDescription, privacy: .public)")
|
|
}
|
|
}
|
|
}
|
|
// User is messed up and has failed to create at least once, if this fails bail out
|
|
if newNode.user == nil && packet.from > Constants.minimumNodeNum {
|
|
do {
|
|
let newUser = try createUser(num: Int64(packet.from), context: context)
|
|
newNode.user = newUser
|
|
} catch CoreDataError.invalidInput(let message) {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity (Invalid Input) from node number: \(packet.from, privacy: .public) Error: \(message, privacy: .public)")
|
|
context.rollback()
|
|
return
|
|
} catch {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity from node number: \(packet.from, privacy: .public) Error: \(error.localizedDescription, privacy: .public)")
|
|
context.rollback()
|
|
return
|
|
}
|
|
}
|
|
|
|
let myInfoEntity = MyInfoEntity(context: context)
|
|
myInfoEntity.myNodeNum = Int64(packet.from)
|
|
myInfoEntity.rebootCount = 0
|
|
newNode.myInfo = myInfoEntity
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [NodeInfo] Saved a NodeInfo for node number: \(packet.from.toHex(), privacy: .public)")
|
|
Logger.data.info("💾 [MyInfoEntity] Saved a new myInfo for node number: \(packet.from.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [MyInfoEntity] Error Inserting New Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
|
|
} else {
|
|
// Update an existing node
|
|
if packet.to == Constants.maximumNodeNum || packet.to == UserDefaults.preferredPeripheralNum {
|
|
fetchedNode[0].channel = Int32(packet.channel)
|
|
}
|
|
|
|
if let nodeInfoMessage = try? NodeInfo(serializedBytes: packet.decoded.payload) {
|
|
|
|
fetchedNode[0].hopsAway = Int32(nodeInfoMessage.hopsAway)
|
|
fetchedNode[0].favorite = nodeInfoMessage.isFavorite
|
|
if nodeInfoMessage.hasDeviceMetrics {
|
|
let telemetry = TelemetryEntity(context: context)
|
|
telemetry.batteryLevel = Int32(nodeInfoMessage.deviceMetrics.batteryLevel)
|
|
telemetry.voltage = nodeInfoMessage.deviceMetrics.voltage
|
|
telemetry.channelUtilization = nodeInfoMessage.deviceMetrics.channelUtilization
|
|
telemetry.airUtilTx = nodeInfoMessage.deviceMetrics.airUtilTx
|
|
var newTelemetries = [TelemetryEntity]()
|
|
newTelemetries.append(telemetry)
|
|
fetchedNode[0].telemetries? = NSOrderedSet(array: newTelemetries)
|
|
}
|
|
if nodeInfoMessage.hasUser {
|
|
fetchedNode[0].user?.userId = nodeInfoMessage.num.toHex()
|
|
fetchedNode[0].user?.num = Int64(nodeInfoMessage.num)
|
|
fetchedNode[0].user?.longName = nodeInfoMessage.user.longName
|
|
fetchedNode[0].user?.shortName = nodeInfoMessage.user.shortName
|
|
fetchedNode[0].user?.role = Int32(nodeInfoMessage.user.role.rawValue)
|
|
fetchedNode[0].user?.hwModel = String(describing: nodeInfoMessage.user.hwModel).uppercased()
|
|
fetchedNode[0].user?.hwModelId = Int32(nodeInfoMessage.user.hwModel.rawValue)
|
|
/// For nodes that have the optional isUnmessagable boolean use that, otherwise excluded roles that are unmessagable by default
|
|
if nodeInfoMessage.user.hasIsUnmessagable {
|
|
fetchedNode[0].user?.unmessagable = nodeInfoMessage.user.isUnmessagable
|
|
} else {
|
|
let roles = [-1, 2, 4, 5, 6, 7, 10, 11]
|
|
let containsRole = roles.contains(Int(fetchedNode[0].user?.role ?? -1))
|
|
if containsRole {
|
|
fetchedNode[0].user?.unmessagable = true
|
|
} else {
|
|
fetchedNode[0].user?.unmessagable = false
|
|
}
|
|
}
|
|
if !nodeInfoMessage.user.publicKey.isEmpty {
|
|
fetchedNode[0].user?.pkiEncrypted = true
|
|
fetchedNode[0].user?.publicKey = nodeInfoMessage.user.publicKey
|
|
}
|
|
Task {
|
|
Api().loadDeviceHardwareData { (hw) in
|
|
let dh = hw.first(where: { $0.hwModel == fetchedNode[0].user?.hwModelId ?? 0 })
|
|
fetchedNode[0].user?.hwDisplayName = dh?.displayName
|
|
}
|
|
}
|
|
}
|
|
} else if packet.hopStart != 0 && packet.hopLimit <= packet.hopStart {
|
|
fetchedNode[0].hopsAway = Int32(packet.hopStart - packet.hopLimit)
|
|
}
|
|
if fetchedNode[0].user == nil {
|
|
do {
|
|
let newUser = try createUser(num: Int64(truncatingIfNeeded: packet.from), context: context)
|
|
fetchedNode[0].user = newUser
|
|
} catch CoreDataError.invalidInput(let message) {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity on an existing node (Invalid Input) from node number: \(packet.from, privacy: .public) Error: \(message, privacy: .public)")
|
|
} catch {
|
|
Logger.data.error("Error Creating a new Core Data UserEntity on an existing node from node number: \(packet.from, privacy: .public) Error: \(error.localizedDescription, privacy: .public)")
|
|
}
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [NodeInfoEntity] Updated from Node Info App Packet For: \(fetchedNode[0].num.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [NodeInfoEntity] Error Saving from NODEINFO_APP \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
} catch {
|
|
Logger.data.error("💥 [NodeInfoEntity] fetch data error for NODEINFO_APP")
|
|
}
|
|
}
|
|
|
|
func upsertPositionPacket (packet: MeshPacket) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertPositionPacket(packet: packet, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertPositionPacket (packet: MeshPacket, context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("[Position] received from node: %@".localized, String(packet.from))
|
|
Logger.mesh.info("📍 \(logString, privacy: .public)")
|
|
|
|
let fetchNodePositionRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodePositionRequest.predicate = NSPredicate(format: "num == %lld", Int64(packet.from))
|
|
|
|
do {
|
|
|
|
if let positionMessage = try? Position(serializedBytes: packet.decoded.payload) {
|
|
|
|
/// Don't save empty position packets from null island or apple park
|
|
if (positionMessage.longitudeI != 0 && positionMessage.latitudeI != 0) && (positionMessage.latitudeI != 373346000 && positionMessage.longitudeI != -1220090000) {
|
|
let fetchedNode = try context.fetch(fetchNodePositionRequest)
|
|
if fetchedNode.count == 1 {
|
|
|
|
// Unset the current latest position for this node
|
|
let fetchCurrentLatestPositionsRequest = PositionEntity.fetchRequest()
|
|
fetchCurrentLatestPositionsRequest.predicate = NSPredicate(format: "nodePosition.num == %lld && latest = true", Int64(packet.from))
|
|
|
|
let fetchedPositions = try context.fetch(fetchCurrentLatestPositionsRequest)
|
|
if fetchedPositions.count > 0 {
|
|
for position in fetchedPositions {
|
|
position.latest = false
|
|
}
|
|
}
|
|
let position = PositionEntity(context: context)
|
|
position.latest = true
|
|
position.snr = packet.rxSnr
|
|
position.rssi = packet.rxRssi
|
|
position.seqNo = Int32(positionMessage.seqNumber)
|
|
position.latitudeI = positionMessage.latitudeI
|
|
position.longitudeI = positionMessage.longitudeI
|
|
position.altitude = positionMessage.altitude
|
|
position.satsInView = Int32(positionMessage.satsInView)
|
|
position.speed = Int32(positionMessage.groundSpeed)
|
|
let heading = Int32(positionMessage.groundTrack)
|
|
// Throw out bad haeadings from the device
|
|
if heading >= 0 && heading <= 360 {
|
|
position.heading = Int32(positionMessage.groundTrack)
|
|
}
|
|
position.precisionBits = Int32(positionMessage.precisionBits)
|
|
if positionMessage.timestamp != 0 {
|
|
position.time = Date(timeIntervalSince1970: TimeInterval(Int64(positionMessage.timestamp)))
|
|
} else {
|
|
position.time = Date(timeIntervalSince1970: TimeInterval(Int64(positionMessage.time)))
|
|
}
|
|
guard let mutablePositions = fetchedNode[0].positions?.mutableCopy() as? NSMutableOrderedSet else {
|
|
return
|
|
}
|
|
/// Don't save nearly the same position over and over. If the next position is less than 10 meters from the new position, delete the previous position and save the new one.
|
|
if mutablePositions.count > 0 && (position.precisionBits == 32 || position.precisionBits == 0) {
|
|
if let mostRecent = mutablePositions.lastObject as? PositionEntity, mostRecent.coordinate.distance(from: position.coordinate) < 9.0 {
|
|
mutablePositions.remove(mostRecent)
|
|
}
|
|
} else if mutablePositions.count > 0 {
|
|
/// Don't store any history for reduced accuracy positions, we will just show a circle
|
|
mutablePositions.removeAllObjects()
|
|
}
|
|
mutablePositions.add(position)
|
|
|
|
fetchedNode[0].channel = Int32(packet.channel)
|
|
fetchedNode[0].positions = mutablePositions.copy() as? NSOrderedSet
|
|
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [Position] Saved from Position App Packet For: \(fetchedNode[0].num.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 Error Saving NodeInfoEntity from POSITION_APP \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 Empty POSITION_APP Packet: \((try? packet.jsonString()) ?? "JSON Decode Failure", privacy: .public)")
|
|
}
|
|
}
|
|
} catch {
|
|
Logger.data.error("💥 Error Deserializing POSITION_APP packet.")
|
|
}
|
|
}
|
|
|
|
func upsertBluetoothConfigPacket(config: Config.BluetoothConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertBluetoothConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertBluetoothConfigPacket(config: Config.BluetoothConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Bluetooth config received: %@".localized, String(nodeNum))
|
|
Logger.mesh.info("📶 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Device Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].bluetoothConfig == nil {
|
|
let newBluetoothConfig = BluetoothConfigEntity(context: context)
|
|
newBluetoothConfig.enabled = config.enabled
|
|
newBluetoothConfig.mode = Int32(config.mode.rawValue)
|
|
newBluetoothConfig.fixedPin = Int32(config.fixedPin)
|
|
fetchedNode[0].bluetoothConfig = newBluetoothConfig
|
|
} else {
|
|
fetchedNode[0].bluetoothConfig?.enabled = config.enabled
|
|
fetchedNode[0].bluetoothConfig?.mode = Int32(config.mode.rawValue)
|
|
fetchedNode[0].bluetoothConfig?.fixedPin = Int32(config.fixedPin)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [BluetoothConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [BluetoothConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [BluetoothConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Bluetooth Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [BluetoothConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertDeviceConfigPacket(config: Config.DeviceConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertDeviceConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertDeviceConfigPacket(config: Config.DeviceConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Device config received: %@".localized, String(nodeNum))
|
|
Logger.mesh.info("📟 \(logString, privacy: .public)")
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Device Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].deviceConfig == nil {
|
|
let newDeviceConfig = DeviceConfigEntity(context: context)
|
|
newDeviceConfig.role = Int32(config.role.rawValue)
|
|
newDeviceConfig.buttonGpio = Int32(config.buttonGpio)
|
|
newDeviceConfig.buzzerGpio = Int32(config.buzzerGpio)
|
|
newDeviceConfig.rebroadcastMode = Int32(config.rebroadcastMode.rawValue)
|
|
newDeviceConfig.nodeInfoBroadcastSecs = Int32(truncating: config.nodeInfoBroadcastSecs as NSNumber)
|
|
newDeviceConfig.doubleTapAsButtonPress = config.doubleTapAsButtonPress
|
|
newDeviceConfig.tripleClickAsAdHocPing = !config.disableTripleClick
|
|
newDeviceConfig.ledHeartbeatEnabled = !config.ledHeartbeatDisabled
|
|
newDeviceConfig.isManaged = config.isManaged
|
|
newDeviceConfig.tzdef = config.tzdef
|
|
fetchedNode[0].deviceConfig = newDeviceConfig
|
|
} else {
|
|
fetchedNode[0].deviceConfig?.role = Int32(config.role.rawValue)
|
|
fetchedNode[0].deviceConfig?.buttonGpio = Int32(config.buttonGpio)
|
|
fetchedNode[0].deviceConfig?.buzzerGpio = Int32(config.buzzerGpio)
|
|
fetchedNode[0].deviceConfig?.rebroadcastMode = Int32(config.rebroadcastMode.rawValue)
|
|
fetchedNode[0].deviceConfig?.nodeInfoBroadcastSecs = Int32(truncating: config.nodeInfoBroadcastSecs as NSNumber)
|
|
fetchedNode[0].deviceConfig?.doubleTapAsButtonPress = config.doubleTapAsButtonPress
|
|
fetchedNode[0].deviceConfig?.tripleClickAsAdHocPing = !config.disableTripleClick
|
|
fetchedNode[0].deviceConfig?.ledHeartbeatEnabled = !config.ledHeartbeatDisabled
|
|
fetchedNode[0].deviceConfig?.isManaged = config.isManaged
|
|
fetchedNode[0].deviceConfig?.tzdef = config.tzdef
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [DeviceConfigEntity] Updated Device Config for node number: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [DeviceConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [DeviceConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertDisplayConfigPacket(config: Config.DisplayConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertDisplayConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertDisplayConfigPacket(config: Config.DisplayConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Display config received: %@".localized, nodeNum.toHex())
|
|
Logger.data.info("🖥️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Device Config
|
|
if !fetchedNode.isEmpty {
|
|
|
|
if fetchedNode[0].displayConfig == nil {
|
|
|
|
let newDisplayConfig = DisplayConfigEntity(context: context)
|
|
newDisplayConfig.screenOnSeconds = Int32(truncatingIfNeeded: config.screenOnSecs)
|
|
newDisplayConfig.screenCarouselInterval = Int32(truncatingIfNeeded: config.autoScreenCarouselSecs)
|
|
newDisplayConfig.compassNorthTop = config.compassNorthTop
|
|
newDisplayConfig.flipScreen = config.flipScreen
|
|
newDisplayConfig.oledType = Int32(config.oled.rawValue)
|
|
newDisplayConfig.displayMode = Int32(config.displaymode.rawValue)
|
|
newDisplayConfig.units = Int32(config.units.rawValue)
|
|
newDisplayConfig.headingBold = config.headingBold
|
|
newDisplayConfig.use12HClock = config.use12HClock
|
|
fetchedNode[0].displayConfig = newDisplayConfig
|
|
} else {
|
|
fetchedNode[0].displayConfig?.screenOnSeconds = Int32(truncatingIfNeeded: config.screenOnSecs)
|
|
fetchedNode[0].displayConfig?.screenCarouselInterval = Int32(truncatingIfNeeded: config.autoScreenCarouselSecs)
|
|
fetchedNode[0].displayConfig?.compassNorthTop = config.compassNorthTop
|
|
fetchedNode[0].displayConfig?.flipScreen = config.flipScreen
|
|
fetchedNode[0].displayConfig?.oledType = Int32(config.oled.rawValue)
|
|
fetchedNode[0].displayConfig?.displayMode = Int32(config.displaymode.rawValue)
|
|
fetchedNode[0].displayConfig?.units = Int32(config.units.rawValue)
|
|
fetchedNode[0].displayConfig?.headingBold = config.headingBold
|
|
fetchedNode[0].displayConfig?.use12HClock = config.use12HClock
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
|
|
try context.save()
|
|
Logger.data.info("💾 [DisplayConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [DisplayConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [DisplayConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Display Config")
|
|
}
|
|
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [DisplayConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertLoRaConfigPacket(config: Config.LoRaConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertLoRaConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertLoRaConfigPacket(config: Config.LoRaConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("LoRa config received: %@".localized, nodeNum.toHex())
|
|
Logger.data.info("📻 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", nodeNum)
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save LoRa Config
|
|
if fetchedNode.count > 0 {
|
|
if fetchedNode[0].loRaConfig == nil {
|
|
// No lora config for node, save a new lora config
|
|
let newLoRaConfig = LoRaConfigEntity(context: context)
|
|
newLoRaConfig.regionCode = Int32(config.region.rawValue)
|
|
newLoRaConfig.usePreset = config.usePreset
|
|
newLoRaConfig.modemPreset = Int32(config.modemPreset.rawValue)
|
|
newLoRaConfig.bandwidth = Int32(config.bandwidth)
|
|
newLoRaConfig.spreadFactor = Int32(config.spreadFactor)
|
|
newLoRaConfig.codingRate = Int32(config.codingRate)
|
|
newLoRaConfig.frequencyOffset = config.frequencyOffset
|
|
newLoRaConfig.overrideFrequency = config.overrideFrequency
|
|
newLoRaConfig.overrideDutyCycle = config.overrideDutyCycle
|
|
newLoRaConfig.hopLimit = Int32(config.hopLimit)
|
|
newLoRaConfig.txPower = Int32(config.txPower)
|
|
newLoRaConfig.txEnabled = config.txEnabled
|
|
newLoRaConfig.channelNum = Int32(config.channelNum)
|
|
newLoRaConfig.sx126xRxBoostedGain = config.sx126XRxBoostedGain
|
|
newLoRaConfig.ignoreMqtt = config.ignoreMqtt
|
|
newLoRaConfig.okToMqtt = config.configOkToMqtt
|
|
fetchedNode[0].loRaConfig = newLoRaConfig
|
|
} else {
|
|
fetchedNode[0].loRaConfig?.regionCode = Int32(config.region.rawValue)
|
|
fetchedNode[0].loRaConfig?.usePreset = config.usePreset
|
|
fetchedNode[0].loRaConfig?.modemPreset = Int32(config.modemPreset.rawValue)
|
|
fetchedNode[0].loRaConfig?.bandwidth = Int32(config.bandwidth)
|
|
fetchedNode[0].loRaConfig?.spreadFactor = Int32(config.spreadFactor)
|
|
fetchedNode[0].loRaConfig?.codingRate = Int32(config.codingRate)
|
|
fetchedNode[0].loRaConfig?.frequencyOffset = config.frequencyOffset
|
|
fetchedNode[0].loRaConfig?.overrideFrequency = config.overrideFrequency
|
|
fetchedNode[0].loRaConfig?.overrideDutyCycle = config.overrideDutyCycle
|
|
fetchedNode[0].loRaConfig?.hopLimit = Int32(config.hopLimit)
|
|
fetchedNode[0].loRaConfig?.txPower = Int32(config.txPower)
|
|
fetchedNode[0].loRaConfig?.txEnabled = config.txEnabled
|
|
fetchedNode[0].loRaConfig?.channelNum = Int32(config.channelNum)
|
|
fetchedNode[0].loRaConfig?.sx126xRxBoostedGain = config.sx126XRxBoostedGain
|
|
fetchedNode[0].loRaConfig?.ignoreMqtt = config.ignoreMqtt
|
|
fetchedNode[0].loRaConfig?.okToMqtt = config.configOkToMqtt
|
|
fetchedNode[0].loRaConfig?.sx126xRxBoostedGain = config.sx126XRxBoostedGain
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [LoRaConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [LoRaConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [LoRaConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Lora Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [LoRaConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertNetworkConfigPacket(config: Config.NetworkConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertNetworkConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertNetworkConfigPacket(config: Config.NetworkConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Network config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🌐 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save WiFi Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].networkConfig == nil {
|
|
let newNetworkConfig = NetworkConfigEntity(context: context)
|
|
newNetworkConfig.wifiEnabled = config.wifiEnabled
|
|
newNetworkConfig.wifiSsid = config.wifiSsid
|
|
newNetworkConfig.wifiPsk = config.wifiPsk
|
|
newNetworkConfig.ethEnabled = config.ethEnabled
|
|
newNetworkConfig.enabledProtocols = Int32(config.enabledProtocols)
|
|
fetchedNode[0].networkConfig = newNetworkConfig
|
|
} else {
|
|
fetchedNode[0].networkConfig?.ethEnabled = config.ethEnabled
|
|
fetchedNode[0].networkConfig?.wifiEnabled = config.wifiEnabled
|
|
fetchedNode[0].networkConfig?.wifiSsid = config.wifiSsid
|
|
fetchedNode[0].networkConfig?.wifiPsk = config.wifiPsk
|
|
fetchedNode[0].networkConfig?.enabledProtocols = Int32(config.enabledProtocols)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [NetworkConfigEntity] Updated Network Config for node: \(nodeNum.toHex(), privacy: .public)")
|
|
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [NetworkConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [NetworkConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Network Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [NetworkConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertPositionConfigPacket(config: Config.PositionConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertPositionConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertPositionConfigPacket(config: Config.PositionConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Position config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🗺️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save LoRa Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].positionConfig == nil {
|
|
let newPositionConfig = PositionConfigEntity(context: context)
|
|
newPositionConfig.smartPositionEnabled = config.positionBroadcastSmartEnabled
|
|
newPositionConfig.deviceGpsEnabled = config.gpsEnabled
|
|
newPositionConfig.gpsMode = Int32(truncatingIfNeeded: config.gpsMode.rawValue)
|
|
newPositionConfig.rxGpio = Int32(truncatingIfNeeded: config.rxGpio)
|
|
newPositionConfig.txGpio = Int32(truncatingIfNeeded: config.txGpio)
|
|
newPositionConfig.gpsEnGpio = Int32(truncatingIfNeeded: config.gpsEnGpio)
|
|
newPositionConfig.fixedPosition = config.fixedPosition
|
|
newPositionConfig.positionBroadcastSeconds = Int32(truncatingIfNeeded: config.positionBroadcastSecs)
|
|
newPositionConfig.broadcastSmartMinimumIntervalSecs = Int32(truncatingIfNeeded: config.broadcastSmartMinimumIntervalSecs)
|
|
newPositionConfig.broadcastSmartMinimumDistance = Int32(truncatingIfNeeded: config.broadcastSmartMinimumDistance)
|
|
newPositionConfig.positionFlags = Int32(truncatingIfNeeded: config.positionFlags)
|
|
newPositionConfig.gpsAttemptTime = 900
|
|
newPositionConfig.gpsUpdateInterval = Int32(truncatingIfNeeded: config.gpsUpdateInterval)
|
|
fetchedNode[0].positionConfig = newPositionConfig
|
|
} else {
|
|
fetchedNode[0].positionConfig?.smartPositionEnabled = config.positionBroadcastSmartEnabled
|
|
fetchedNode[0].positionConfig?.deviceGpsEnabled = config.gpsEnabled
|
|
fetchedNode[0].positionConfig?.gpsMode = Int32(truncatingIfNeeded: config.gpsMode.rawValue)
|
|
fetchedNode[0].positionConfig?.rxGpio = Int32(truncatingIfNeeded: config.rxGpio)
|
|
fetchedNode[0].positionConfig?.txGpio = Int32(truncatingIfNeeded: config.txGpio)
|
|
fetchedNode[0].positionConfig?.gpsEnGpio = Int32(truncatingIfNeeded: config.gpsEnGpio)
|
|
fetchedNode[0].positionConfig?.fixedPosition = config.fixedPosition
|
|
fetchedNode[0].positionConfig?.positionBroadcastSeconds = Int32(truncatingIfNeeded: config.positionBroadcastSecs)
|
|
fetchedNode[0].positionConfig?.broadcastSmartMinimumIntervalSecs = Int32(truncatingIfNeeded: config.broadcastSmartMinimumIntervalSecs)
|
|
fetchedNode[0].positionConfig?.broadcastSmartMinimumDistance = Int32(truncatingIfNeeded: config.broadcastSmartMinimumDistance)
|
|
fetchedNode[0].positionConfig?.gpsAttemptTime = 900
|
|
fetchedNode[0].positionConfig?.gpsUpdateInterval = Int32(truncatingIfNeeded: config.gpsUpdateInterval)
|
|
fetchedNode[0].positionConfig?.positionFlags = Int32(truncatingIfNeeded: config.positionFlags)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [PositionConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [PositionConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [PositionConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Position Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [PositionConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertPowerConfigPacket(config: Config.PowerConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertPowerConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertPowerConfigPacket(config: Config.PowerConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
let logString = String.localizedStringWithFormat("Power config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🗺️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Power Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].powerConfig == nil {
|
|
let newPowerConfig = PowerConfigEntity(context: context)
|
|
newPowerConfig.adcMultiplierOverride = config.adcMultiplierOverride
|
|
newPowerConfig.deviceBatteryInaAddress = Int32(config.deviceBatteryInaAddress)
|
|
newPowerConfig.isPowerSaving = config.isPowerSaving
|
|
newPowerConfig.lsSecs = Int32(truncatingIfNeeded: config.lsSecs)
|
|
newPowerConfig.minWakeSecs = Int32(truncatingIfNeeded: config.minWakeSecs)
|
|
newPowerConfig.onBatteryShutdownAfterSecs = Int32(truncatingIfNeeded: config.onBatteryShutdownAfterSecs)
|
|
newPowerConfig.waitBluetoothSecs = Int32(truncatingIfNeeded: config.waitBluetoothSecs)
|
|
fetchedNode[0].powerConfig = newPowerConfig
|
|
} else {
|
|
fetchedNode[0].powerConfig?.adcMultiplierOverride = config.adcMultiplierOverride
|
|
fetchedNode[0].powerConfig?.deviceBatteryInaAddress = Int32(config.deviceBatteryInaAddress)
|
|
fetchedNode[0].powerConfig?.isPowerSaving = config.isPowerSaving
|
|
fetchedNode[0].powerConfig?.lsSecs = Int32(truncatingIfNeeded: config.lsSecs)
|
|
fetchedNode[0].powerConfig?.minWakeSecs = Int32(truncatingIfNeeded: config.minWakeSecs)
|
|
fetchedNode[0].powerConfig?.onBatteryShutdownAfterSecs = Int32(truncatingIfNeeded: config.onBatteryShutdownAfterSecs)
|
|
fetchedNode[0].powerConfig?.waitBluetoothSecs = Int32(truncatingIfNeeded: config.waitBluetoothSecs)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [PowerConfigEntity] Updated Power Config for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [PowerConfigEntity] Error Updating Core Data PowerConfigEntity: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [PowerConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Power Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [PowerConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertSecurityConfigPacket(config: Config.SecurityConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertSecurityConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertSecurityConfigPacket(config: Config.SecurityConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("mesh.log.security.config %@".localized, String(nodeNum))
|
|
Logger.data.info("🛡️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Security Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].securityConfig == nil {
|
|
let newSecurityConfig = SecurityConfigEntity(context: context)
|
|
newSecurityConfig.publicKey = config.publicKey
|
|
newSecurityConfig.privateKey = config.privateKey
|
|
if config.adminKey.count > 0 {
|
|
newSecurityConfig.adminKey = config.adminKey[0]
|
|
}
|
|
newSecurityConfig.isManaged = config.isManaged
|
|
newSecurityConfig.serialEnabled = config.serialEnabled
|
|
newSecurityConfig.debugLogApiEnabled = config.debugLogApiEnabled
|
|
newSecurityConfig.adminChannelEnabled = config.adminChannelEnabled
|
|
fetchedNode[0].securityConfig = newSecurityConfig
|
|
} else {
|
|
fetchedNode[0].securityConfig?.publicKey = config.publicKey
|
|
fetchedNode[0].securityConfig?.privateKey = config.privateKey
|
|
if config.adminKey.count > 0 {
|
|
fetchedNode[0].securityConfig?.adminKey = config.adminKey[0]
|
|
if config.adminKey.count > 1 {
|
|
fetchedNode[0].securityConfig?.adminKey2 = config.adminKey[1]
|
|
}
|
|
if config.adminKey.count > 2 {
|
|
fetchedNode[0].securityConfig?.adminKey3 = config.adminKey[2]
|
|
}
|
|
}
|
|
fetchedNode[0].securityConfig?.isManaged = config.isManaged
|
|
fetchedNode[0].securityConfig?.serialEnabled = config.serialEnabled
|
|
fetchedNode[0].securityConfig?.debugLogApiEnabled = config.debugLogApiEnabled
|
|
fetchedNode[0].securityConfig?.adminChannelEnabled = config.adminChannelEnabled
|
|
}
|
|
if sessionPasskey?.count != 0 {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [SecurityConfigEntity] Updated Security Config for node: \(nodeNum.toHex(), privacy: .public)")
|
|
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [SecurityConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [SecurityConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Security Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [SecurityConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertAmbientLightingModuleConfigPacket(config: ModuleConfig.AmbientLightingConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertAmbientLightingModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertAmbientLightingModuleConfigPacket(config: ModuleConfig.AmbientLightingConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Ambient Lighting module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🏮 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Ambient Lighting Config
|
|
if !fetchedNode.isEmpty {
|
|
|
|
if fetchedNode[0].cannedMessageConfig == nil {
|
|
let newAmbientLightingConfig = AmbientLightingConfigEntity(context: context)
|
|
newAmbientLightingConfig.ledState = config.ledState
|
|
newAmbientLightingConfig.current = Int32(config.current)
|
|
newAmbientLightingConfig.red = Int32(config.red)
|
|
newAmbientLightingConfig.green = Int32(config.green)
|
|
newAmbientLightingConfig.blue = Int32(config.blue)
|
|
fetchedNode[0].ambientLightingConfig = newAmbientLightingConfig
|
|
} else {
|
|
|
|
if fetchedNode[0].ambientLightingConfig == nil {
|
|
fetchedNode[0].ambientLightingConfig = AmbientLightingConfigEntity(context: context)
|
|
}
|
|
fetchedNode[0].ambientLightingConfig?.ledState = config.ledState
|
|
fetchedNode[0].ambientLightingConfig?.current = Int32(config.current)
|
|
fetchedNode[0].ambientLightingConfig?.red = Int32(config.red)
|
|
fetchedNode[0].ambientLightingConfig?.green = Int32(config.green)
|
|
fetchedNode[0].ambientLightingConfig?.blue = Int32(config.blue)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [AmbientLightingConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [AmbientLightingConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [AmbientLightingConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Ambient Lighting Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [AmbientLightingConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertCannedMessagesModuleConfigPacket(config: ModuleConfig.CannedMessageConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertCannedMessagesModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertCannedMessagesModuleConfigPacket(config: ModuleConfig.CannedMessageConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Canned Message module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🥫 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Canned Message Config
|
|
if !fetchedNode.isEmpty {
|
|
|
|
if fetchedNode[0].cannedMessageConfig == nil {
|
|
let newCannedMessageConfig = CannedMessageConfigEntity(context: context)
|
|
newCannedMessageConfig.enabled = config.enabled
|
|
newCannedMessageConfig.sendBell = config.sendBell
|
|
newCannedMessageConfig.rotary1Enabled = config.rotary1Enabled
|
|
newCannedMessageConfig.updown1Enabled = config.updown1Enabled
|
|
newCannedMessageConfig.inputbrokerPinA = Int32(config.inputbrokerPinA)
|
|
newCannedMessageConfig.inputbrokerPinB = Int32(config.inputbrokerPinB)
|
|
newCannedMessageConfig.inputbrokerPinPress = Int32(config.inputbrokerPinPress)
|
|
newCannedMessageConfig.inputbrokerEventCw = Int32(config.inputbrokerEventCw.rawValue)
|
|
newCannedMessageConfig.inputbrokerEventCcw = Int32(config.inputbrokerEventCcw.rawValue)
|
|
newCannedMessageConfig.inputbrokerEventPress = Int32(config.inputbrokerEventPress.rawValue)
|
|
fetchedNode[0].cannedMessageConfig = newCannedMessageConfig
|
|
} else {
|
|
fetchedNode[0].cannedMessageConfig?.enabled = config.enabled
|
|
fetchedNode[0].cannedMessageConfig?.sendBell = config.sendBell
|
|
fetchedNode[0].cannedMessageConfig?.rotary1Enabled = config.rotary1Enabled
|
|
fetchedNode[0].cannedMessageConfig?.updown1Enabled = config.updown1Enabled
|
|
fetchedNode[0].cannedMessageConfig?.inputbrokerPinA = Int32(config.inputbrokerPinA)
|
|
fetchedNode[0].cannedMessageConfig?.inputbrokerPinB = Int32(config.inputbrokerPinB)
|
|
fetchedNode[0].cannedMessageConfig?.inputbrokerPinPress = Int32(config.inputbrokerPinPress)
|
|
fetchedNode[0].cannedMessageConfig?.inputbrokerEventCw = Int32(config.inputbrokerEventCw.rawValue)
|
|
fetchedNode[0].cannedMessageConfig?.inputbrokerEventCcw = Int32(config.inputbrokerEventCcw.rawValue)
|
|
fetchedNode[0].cannedMessageConfig?.inputbrokerEventPress = Int32(config.inputbrokerEventPress.rawValue)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [CannedMessageConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [CannedMessageConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [CannedMessageConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Canned Message Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [CannedMessageConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertDetectionSensorModuleConfigPacket(config: ModuleConfig.DetectionSensorConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertDetectionSensorModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertDetectionSensorModuleConfigPacket(config: ModuleConfig.DetectionSensorConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Detection Sensor module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🕵️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Detection Sensor Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].detectionSensorConfig == nil {
|
|
let newConfig = DetectionSensorConfigEntity(context: context)
|
|
newConfig.enabled = config.enabled
|
|
newConfig.sendBell = config.sendBell
|
|
newConfig.name = config.name
|
|
newConfig.monitorPin = Int32(config.monitorPin)
|
|
newConfig.triggerType = Int32(config.detectionTriggerType.rawValue)
|
|
newConfig.usePullup = config.usePullup
|
|
newConfig.minimumBroadcastSecs = Int32(truncatingIfNeeded: config.minimumBroadcastSecs)
|
|
newConfig.stateBroadcastSecs = Int32(truncatingIfNeeded: config.stateBroadcastSecs)
|
|
fetchedNode[0].detectionSensorConfig = newConfig
|
|
} else {
|
|
fetchedNode[0].detectionSensorConfig?.enabled = config.enabled
|
|
fetchedNode[0].detectionSensorConfig?.sendBell = config.sendBell
|
|
fetchedNode[0].detectionSensorConfig?.name = config.name
|
|
fetchedNode[0].detectionSensorConfig?.monitorPin = Int32(config.monitorPin)
|
|
fetchedNode[0].detectionSensorConfig?.usePullup = config.usePullup
|
|
fetchedNode[0].detectionSensorConfig?.triggerType = Int32(config.detectionTriggerType.rawValue)
|
|
fetchedNode[0].detectionSensorConfig?.minimumBroadcastSecs = Int32(truncatingIfNeeded: config.minimumBroadcastSecs)
|
|
fetchedNode[0].detectionSensorConfig?.stateBroadcastSecs = Int32(truncatingIfNeeded: config.stateBroadcastSecs)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [DetectionSensorConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [DetectionSensorConfigEntity] Error Updating Core Data : \(nsError, privacy: .public)")
|
|
}
|
|
|
|
} else {
|
|
Logger.data.error("💥 [DetectionSensorConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Detection Sensor Module Config")
|
|
}
|
|
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [DetectionSensorConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertExternalNotificationModuleConfigPacket(config: ModuleConfig.ExternalNotificationConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertExternalNotificationModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertExternalNotificationModuleConfigPacket(config: ModuleConfig.ExternalNotificationConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("External Notification module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("📣 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save External Notificaitone Config
|
|
if !fetchedNode.isEmpty {
|
|
|
|
if fetchedNode[0].externalNotificationConfig == nil {
|
|
let newExternalNotificationConfig = ExternalNotificationConfigEntity(context: context)
|
|
newExternalNotificationConfig.enabled = config.enabled
|
|
newExternalNotificationConfig.usePWM = config.usePwm
|
|
newExternalNotificationConfig.alertBell = config.alertBell
|
|
newExternalNotificationConfig.alertBellBuzzer = config.alertBellBuzzer
|
|
newExternalNotificationConfig.alertBellVibra = config.alertBellVibra
|
|
newExternalNotificationConfig.alertMessage = config.alertMessage
|
|
newExternalNotificationConfig.alertMessageBuzzer = config.alertMessageBuzzer
|
|
newExternalNotificationConfig.alertMessageVibra = config.alertMessageVibra
|
|
newExternalNotificationConfig.active = config.active
|
|
newExternalNotificationConfig.output = Int32(config.output)
|
|
newExternalNotificationConfig.outputBuzzer = Int32(config.outputBuzzer)
|
|
newExternalNotificationConfig.outputVibra = Int32(config.outputVibra)
|
|
newExternalNotificationConfig.outputMilliseconds = Int32(config.outputMs)
|
|
newExternalNotificationConfig.nagTimeout = Int32(config.nagTimeout)
|
|
newExternalNotificationConfig.useI2SAsBuzzer = config.useI2SAsBuzzer
|
|
fetchedNode[0].externalNotificationConfig = newExternalNotificationConfig
|
|
} else {
|
|
fetchedNode[0].externalNotificationConfig?.enabled = config.enabled
|
|
fetchedNode[0].externalNotificationConfig?.usePWM = config.usePwm
|
|
fetchedNode[0].externalNotificationConfig?.alertBell = config.alertBell
|
|
fetchedNode[0].externalNotificationConfig?.alertBellBuzzer = config.alertBellBuzzer
|
|
fetchedNode[0].externalNotificationConfig?.alertBellVibra = config.alertBellVibra
|
|
fetchedNode[0].externalNotificationConfig?.alertMessage = config.alertMessage
|
|
fetchedNode[0].externalNotificationConfig?.alertMessageBuzzer = config.alertMessageBuzzer
|
|
fetchedNode[0].externalNotificationConfig?.alertMessageVibra = config.alertMessageVibra
|
|
fetchedNode[0].externalNotificationConfig?.active = config.active
|
|
fetchedNode[0].externalNotificationConfig?.output = Int32(config.output)
|
|
fetchedNode[0].externalNotificationConfig?.outputBuzzer = Int32(config.outputBuzzer)
|
|
fetchedNode[0].externalNotificationConfig?.outputVibra = Int32(config.outputVibra)
|
|
fetchedNode[0].externalNotificationConfig?.outputMilliseconds = Int32(config.outputMs)
|
|
fetchedNode[0].externalNotificationConfig?.nagTimeout = Int32(config.nagTimeout)
|
|
fetchedNode[0].externalNotificationConfig?.useI2SAsBuzzer = config.useI2SAsBuzzer
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [ExternalNotificationConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [ExternalNotificationConfigEntity] Error Updating Core Data : \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [ExternalNotificationConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save External Notification Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [ExternalNotificationConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertPaxCounterModuleConfigPacket(config: ModuleConfig.PaxcounterConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertPaxCounterModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertPaxCounterModuleConfigPacket(config: ModuleConfig.PaxcounterConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("PAX Counter config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🧑🤝🧑 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save PAX Counter Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].paxCounterConfig == nil {
|
|
let newPaxCounterConfig = PaxCounterConfigEntity(context: context)
|
|
newPaxCounterConfig.enabled = config.enabled
|
|
newPaxCounterConfig.updateInterval = Int32(config.paxcounterUpdateInterval)
|
|
fetchedNode[0].paxCounterConfig = newPaxCounterConfig
|
|
} else {
|
|
fetchedNode[0].paxCounterConfig?.enabled = config.enabled
|
|
fetchedNode[0].paxCounterConfig?.updateInterval = Int32(config.paxcounterUpdateInterval)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [PaxCounterConfigEntity] Updated for node number: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [PaxCounterConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [PaxCounterConfigEntity] No Nodes found in local database matching node number \(nodeNum.toHex(), privacy: .public) unable to save PAX Counter Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [PaxCounterConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertRtttlConfigPacket(ringtone: String, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertRtttlConfigPacket(ringtone: ringtone, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertRtttlConfigPacket(ringtone: String, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("RTTTL Ringtone config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("⛰️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save RTTTL Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].rtttlConfig == nil {
|
|
let newRtttlConfig = RTTTLConfigEntity(context: context)
|
|
newRtttlConfig.ringtone = ringtone
|
|
fetchedNode[0].rtttlConfig = newRtttlConfig
|
|
} else {
|
|
fetchedNode[0].rtttlConfig?.ringtone = ringtone
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [RtttlConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [RtttlConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [RtttlConfigEntity] No nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save RTTTL Ringtone Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [RtttlConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertMqttModuleConfigPacket(config: ModuleConfig.MQTTConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertMqttModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertMqttModuleConfigPacket(config: ModuleConfig.MQTTConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("MQTT module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🌉 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save MQTT Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].mqttConfig == nil {
|
|
let newMQTTConfig = MQTTConfigEntity(context: context)
|
|
newMQTTConfig.enabled = config.enabled
|
|
newMQTTConfig.proxyToClientEnabled = config.proxyToClientEnabled
|
|
newMQTTConfig.address = config.address
|
|
newMQTTConfig.username = config.username
|
|
newMQTTConfig.password = config.password
|
|
newMQTTConfig.root = config.root
|
|
newMQTTConfig.encryptionEnabled = config.encryptionEnabled
|
|
newMQTTConfig.jsonEnabled = config.jsonEnabled
|
|
newMQTTConfig.tlsEnabled = config.tlsEnabled
|
|
newMQTTConfig.mapReportingEnabled = config.mapReportingEnabled
|
|
newMQTTConfig.mapReportingShouldReportLocation = config.mapReportSettings.shouldReportLocation
|
|
newMQTTConfig.mapPositionPrecision = Int32(config.mapReportSettings.positionPrecision)
|
|
newMQTTConfig.mapPublishIntervalSecs = Int32(config.mapReportSettings.publishIntervalSecs)
|
|
fetchedNode[0].mqttConfig = newMQTTConfig
|
|
} else {
|
|
fetchedNode[0].mqttConfig?.enabled = config.enabled
|
|
fetchedNode[0].mqttConfig?.proxyToClientEnabled = config.proxyToClientEnabled
|
|
fetchedNode[0].mqttConfig?.address = config.address
|
|
fetchedNode[0].mqttConfig?.username = config.username
|
|
fetchedNode[0].mqttConfig?.password = config.password
|
|
fetchedNode[0].mqttConfig?.root = config.root
|
|
fetchedNode[0].mqttConfig?.encryptionEnabled = config.encryptionEnabled
|
|
fetchedNode[0].mqttConfig?.jsonEnabled = config.jsonEnabled
|
|
fetchedNode[0].mqttConfig?.tlsEnabled = config.tlsEnabled
|
|
fetchedNode[0].mqttConfig?.mapReportingEnabled = config.mapReportingEnabled
|
|
fetchedNode[0].mqttConfig?.mapPositionPrecision = Int32(config.mapReportSettings.positionPrecision)
|
|
fetchedNode[0].mqttConfig?.mapPublishIntervalSecs = Int32(config.mapReportSettings.publishIntervalSecs)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [MQTTConfigEntity] Updated for node number: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [MQTTConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [MQTTConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save MQTT Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [MQTTConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertRangeTestModuleConfigPacket(config: ModuleConfig.RangeTestConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertRangeTestModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertRangeTestModuleConfigPacket(config: ModuleConfig.RangeTestConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Range Test module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("⛰️ \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Device Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].rangeTestConfig == nil {
|
|
let newRangeTestConfig = RangeTestConfigEntity(context: context)
|
|
newRangeTestConfig.sender = Int32(config.sender)
|
|
newRangeTestConfig.enabled = config.enabled
|
|
newRangeTestConfig.save = config.save
|
|
fetchedNode[0].rangeTestConfig = newRangeTestConfig
|
|
} else {
|
|
fetchedNode[0].rangeTestConfig?.sender = Int32(config.sender)
|
|
fetchedNode[0].rangeTestConfig?.enabled = config.enabled
|
|
fetchedNode[0].rangeTestConfig?.save = config.save
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [RangeTestConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [RangeTestConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [RangeTestConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Range Test Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [RangeTestConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertSerialModuleConfigPacket(config: ModuleConfig.SerialConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertSerialModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertSerialModuleConfigPacket(config: ModuleConfig.SerialConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Serial module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("🤖 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Device Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].serialConfig == nil {
|
|
let newSerialConfig = SerialConfigEntity(context: context)
|
|
newSerialConfig.enabled = config.enabled
|
|
newSerialConfig.echo = config.echo
|
|
newSerialConfig.rxd = Int32(config.rxd)
|
|
newSerialConfig.txd = Int32(config.txd)
|
|
newSerialConfig.baudRate = Int32(config.baud.rawValue)
|
|
newSerialConfig.timeout = Int32(config.timeout)
|
|
newSerialConfig.mode = Int32(config.mode.rawValue)
|
|
fetchedNode[0].serialConfig = newSerialConfig
|
|
} else {
|
|
fetchedNode[0].serialConfig?.enabled = config.enabled
|
|
fetchedNode[0].serialConfig?.echo = config.echo
|
|
fetchedNode[0].serialConfig?.rxd = Int32(config.rxd)
|
|
fetchedNode[0].serialConfig?.txd = Int32(config.txd)
|
|
fetchedNode[0].serialConfig?.baudRate = Int32(config.baud.rawValue)
|
|
fetchedNode[0].serialConfig?.timeout = Int32(config.timeout)
|
|
fetchedNode[0].serialConfig?.mode = Int32(config.mode.rawValue)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [SerialConfigEntity]Updated Serial Module Config for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
|
|
context.rollback()
|
|
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [SerialConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [SerialConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Serial Module Config")
|
|
}
|
|
} catch {
|
|
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [SerialConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertStoreForwardModuleConfigPacket(config: ModuleConfig.StoreForwardConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertStoreForwardModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertStoreForwardModuleConfigPacket(config: ModuleConfig.StoreForwardConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Store & Forward module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("📬 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Store & Forward Sensor Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].storeForwardConfig == nil {
|
|
let newConfig = StoreForwardConfigEntity(context: context)
|
|
newConfig.enabled = config.enabled
|
|
newConfig.heartbeat = config.heartbeat
|
|
newConfig.records = Int32(config.records)
|
|
newConfig.historyReturnMax = Int32(config.historyReturnMax)
|
|
newConfig.historyReturnWindow = Int32(config.historyReturnWindow)
|
|
newConfig.isRouter = config.isServer
|
|
fetchedNode[0].storeForwardConfig = newConfig
|
|
} else {
|
|
fetchedNode[0].storeForwardConfig?.enabled = config.enabled
|
|
fetchedNode[0].storeForwardConfig?.heartbeat = config.heartbeat
|
|
fetchedNode[0].storeForwardConfig?.records = Int32(config.records)
|
|
fetchedNode[0].storeForwardConfig?.historyReturnMax = Int32(config.historyReturnMax)
|
|
fetchedNode[0].storeForwardConfig?.historyReturnWindow = Int32(config.historyReturnWindow)
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [StoreForwardConfigEntity] Updated for node: \(nodeNum.toHex(), privacy: .public)")
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [StoreForwardConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
} else {
|
|
Logger.data.error("💥 [StoreForwardConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Store & Forward Module Config")
|
|
}
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [StoreForwardConfigEntity] Fetching node for core data failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
|
|
func upsertTelemetryModuleConfigPacket(config: ModuleConfig.TelemetryConfig, nodeNum: Int64, sessionPasskey: Data? = Data()) async {
|
|
let context = self.backgroundContext
|
|
await context.perform {
|
|
self.upsertTelemetryModuleConfigPacket(config: config, nodeNum: nodeNum, sessionPasskey: sessionPasskey, context: context)
|
|
}
|
|
}
|
|
|
|
nonisolated func upsertTelemetryModuleConfigPacket(config: ModuleConfig.TelemetryConfig, nodeNum: Int64, sessionPasskey: Data? = Data(), context: NSManagedObjectContext) {
|
|
|
|
let logString = String.localizedStringWithFormat("Telemetry module config received: %@".localized, String(nodeNum))
|
|
Logger.data.info("📈 \(logString, privacy: .public)")
|
|
|
|
let fetchNodeInfoRequest = NodeInfoEntity.fetchRequest()
|
|
fetchNodeInfoRequest.predicate = NSPredicate(format: "num == %lld", Int64(nodeNum))
|
|
do {
|
|
let fetchedNode = try context.fetch(fetchNodeInfoRequest)
|
|
// Found a node, save Telemetry Config
|
|
if !fetchedNode.isEmpty {
|
|
if fetchedNode[0].telemetryConfig == nil {
|
|
let newTelemetryConfig = TelemetryConfigEntity(context: context)
|
|
newTelemetryConfig.deviceUpdateInterval = Int32(truncatingIfNeeded: config.deviceUpdateInterval)
|
|
newTelemetryConfig.deviceTelemetryEnabled = config.deviceTelemetryEnabled
|
|
newTelemetryConfig.environmentUpdateInterval = Int32(truncatingIfNeeded: config.environmentUpdateInterval)
|
|
newTelemetryConfig.environmentMeasurementEnabled = config.environmentMeasurementEnabled
|
|
newTelemetryConfig.environmentScreenEnabled = config.environmentScreenEnabled
|
|
newTelemetryConfig.environmentDisplayFahrenheit = config.environmentDisplayFahrenheit
|
|
newTelemetryConfig.powerMeasurementEnabled = config.powerMeasurementEnabled
|
|
newTelemetryConfig.powerUpdateInterval = Int32(truncatingIfNeeded: config.powerUpdateInterval)
|
|
newTelemetryConfig.powerScreenEnabled = config.powerScreenEnabled
|
|
fetchedNode[0].telemetryConfig = newTelemetryConfig
|
|
} else {
|
|
fetchedNode[0].telemetryConfig?.deviceUpdateInterval = Int32(truncatingIfNeeded: config.deviceUpdateInterval)
|
|
fetchedNode[0].telemetryConfig?.deviceTelemetryEnabled = config.deviceTelemetryEnabled
|
|
fetchedNode[0].telemetryConfig?.environmentUpdateInterval = Int32(truncatingIfNeeded: config.environmentUpdateInterval)
|
|
fetchedNode[0].telemetryConfig?.environmentMeasurementEnabled = config.environmentMeasurementEnabled
|
|
fetchedNode[0].telemetryConfig?.environmentScreenEnabled = config.environmentScreenEnabled
|
|
fetchedNode[0].telemetryConfig?.environmentDisplayFahrenheit = config.environmentDisplayFahrenheit
|
|
fetchedNode[0].telemetryConfig?.powerMeasurementEnabled = config.powerMeasurementEnabled
|
|
fetchedNode[0].telemetryConfig?.powerUpdateInterval = Int32(truncatingIfNeeded: config.powerUpdateInterval)
|
|
fetchedNode[0].telemetryConfig?.powerScreenEnabled = config.powerScreenEnabled
|
|
}
|
|
if sessionPasskey != nil {
|
|
fetchedNode[0].sessionPasskey = sessionPasskey
|
|
fetchedNode[0].sessionExpiration = Date().addingTimeInterval(300)
|
|
}
|
|
do {
|
|
try context.save()
|
|
Logger.data.info("💾 [TelemetryConfigEntity] Updated Telemetry Module Config for node: \(nodeNum.toHex(), privacy: .public)")
|
|
|
|
} catch {
|
|
context.rollback()
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [TelemetryConfigEntity] Error Updating Core Data: \(nsError, privacy: .public)")
|
|
}
|
|
|
|
} else {
|
|
Logger.data.error("💥 [TelemetryConfigEntity] No Nodes found in local database matching node \(nodeNum.toHex(), privacy: .public) unable to save Telemetry Module Config")
|
|
}
|
|
|
|
} catch {
|
|
let nsError = error as NSError
|
|
Logger.data.error("💥 [TelemetryConfigEntity] Fetching node for core data TelemetryConfigEntity failed: \(nsError, privacy: .public)")
|
|
}
|
|
}
|
|
}
|