signal-desktop/ts/jobs/helpers/sendProfileKey.ts

191 lines
5.4 KiB
TypeScript
Raw Normal View History

2022-02-16 18:36:21 +00:00
// Copyright 2022 Signal Messenger, LLC
// SPDX-License-Identifier: AGPL-3.0-only
import { isNumber } from 'lodash';
import { handleMessageSend } from '../../util/handleMessageSend';
import { getSendOptions } from '../../util/getSendOptions';
import {
isDirectConversation,
isGroup,
2022-02-16 18:36:21 +00:00
isGroupV2,
} from '../../util/whatTypeOfConversation';
import { SignalService as Proto } from '../../protobuf';
import {
handleMultipleSendErrors,
maybeExpandErrors,
} from './handleMultipleSendErrors';
import { ourProfileKeyService } from '../../services/ourProfileKey';
import type { ConversationModel } from '../../models/conversations';
import type {
ConversationQueueJobBundle,
ProfileKeyJobData,
} from '../conversationJobQueue';
import type { CallbackResultType } from '../../textsecure/Types.d';
import { isConversationAccepted } from '../../util/isConversationAccepted';
import { isConversationUnregistered } from '../../util/isConversationUnregistered';
import type { ConversationAttributesType } from '../../model-types.d';
import {
OutgoingIdentityKeyError,
SendMessageChallengeError,
SendMessageProtoError,
UnregisteredUserError,
} from '../../textsecure/Errors';
export function canAllErrorsBeIgnored(
conversation: ConversationAttributesType,
error: unknown
): boolean {
if (
error instanceof OutgoingIdentityKeyError ||
error instanceof SendMessageChallengeError ||
error instanceof UnregisteredUserError
) {
return true;
}
return Boolean(
isGroup(conversation) &&
error instanceof SendMessageProtoError &&
error.errors?.every(
item =>
item instanceof OutgoingIdentityKeyError ||
item instanceof SendMessageChallengeError ||
item instanceof UnregisteredUserError
)
);
}
2022-02-16 18:36:21 +00:00
// Note: because we don't have a recipient map, we will resend this message to folks that
// got it on the first go-round, if some sends fail. This is okay, because a recipient
// getting your profileKey again is just fine.
export async function sendProfileKey(
conversation: ConversationModel,
{
isFinalAttempt,
messaging,
2022-02-16 18:36:21 +00:00
shouldContinue,
timestamp,
timeRemaining,
log,
}: ConversationQueueJobBundle,
data: ProfileKeyJobData
): Promise<void> {
if (!shouldContinue) {
log.info('Ran out of time. Giving up on sending profile key');
return;
}
if (!conversation.get('profileSharing')) {
log.info('No longer sharing profile. Cancelling job.');
return;
}
const profileKey = await ourProfileKeyService.get();
if (!profileKey) {
log.info('Unable to fetch profile. Cancelling job.');
return;
}
log.info(
`starting profile key share to ${conversation.idForLogging()} with timestamp ${timestamp}`
);
const { revision } = data;
const sendOptions = await getSendOptions(conversation.attributes);
const { ContentHint } = Proto.UnidentifiedSenderMessage.Message;
const contentHint = ContentHint.RESENDABLE;
const sendType = 'profileKeyUpdate';
let sendPromise: Promise<CallbackResultType>;
// Note: flags and the profileKey itself are all that matter in the proto.
// Note: we don't check for untrusted conversations here; we attempt to send anyway
2022-02-16 18:36:21 +00:00
if (isDirectConversation(conversation.attributes)) {
if (!isConversationAccepted(conversation.attributes)) {
log.info(
`conversation ${conversation.idForLogging()} is not accepted; refusing to send`
);
return;
}
if (isConversationUnregistered(conversation.attributes)) {
log.info(
`conversation ${conversation.idForLogging()} is unregistered; refusing to send`
);
return;
}
2022-02-25 02:40:56 +00:00
if (conversation.isBlocked()) {
log.info(
`conversation ${conversation.idForLogging()} is blocked; refusing to send`
);
return;
}
const proto = await messaging.getContentMessage({
2022-02-16 18:36:21 +00:00
flags: Proto.DataMessage.Flags.PROFILE_KEY_UPDATE,
profileKey,
recipients: conversation.getRecipients(),
timestamp,
2022-08-15 21:53:33 +00:00
includePniSignatureMessage: true,
2022-02-16 18:36:21 +00:00
});
sendPromise = messaging.sendIndividualProto({
2022-02-16 18:36:21 +00:00
contentHint,
identifier: conversation.getSendTarget(),
options: sendOptions,
proto,
timestamp,
urgent: false,
2022-02-16 18:36:21 +00:00
});
} else {
if (isGroupV2(conversation.attributes) && !isNumber(revision)) {
log.error('No revision provided, but conversation is GroupV2');
}
const groupV2Info = conversation.getGroupV2Info();
if (groupV2Info && isNumber(revision)) {
groupV2Info.revision = revision;
}
sendPromise = window.Signal.Util.sendToGroup({
contentHint,
groupSendOptions: {
flags: Proto.DataMessage.Flags.PROFILE_KEY_UPDATE,
groupV1: conversation.getGroupV1Info(),
groupV2: groupV2Info,
profileKey,
timestamp,
},
messageId: undefined,
sendOptions,
sendTarget: conversation.toSenderKeyTarget(),
sendType,
urgent: false,
2022-02-16 18:36:21 +00:00
});
}
try {
await handleMessageSend(sendPromise, {
messageIds: [],
sendType,
});
} catch (error: unknown) {
if (canAllErrorsBeIgnored(conversation.attributes, error)) {
2022-02-16 18:36:21 +00:00
log.info(
'Group send failures were all OutgoingIdentityKeyError, SendMessageChallengeError, or UnregisteredUserError. Returning succcessfully.'
2022-02-16 18:36:21 +00:00
);
return;
}
await handleMultipleSendErrors({
errors: maybeExpandErrors(error),
isFinalAttempt,
log,
timeRemaining,
toThrow: error,
});
}
}