signal-desktop/ts/groups.ts

6808 lines
192 KiB
TypeScript
Raw Normal View History

2022-02-16 18:36:21 +00:00
// Copyright 2020-2022 Signal Messenger, LLC
2020-10-30 20:34:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
2020-09-09 02:25:05 +00:00
import {
compact,
2020-11-20 17:30:45 +00:00
difference,
2020-09-09 02:25:05 +00:00
flatten,
fromPairs,
isNumber,
values,
} from 'lodash';
2022-03-23 20:49:27 +00:00
import Long from 'long';
import type { ClientZkGroupCipher } from '@signalapp/libsignal-client/zkgroup';
2020-09-11 19:37:01 +00:00
import { v4 as getGuid } from 'uuid';
import LRU from 'lru-cache';
import * as log from './logging/log';
2020-09-09 02:25:05 +00:00
import {
2022-07-08 20:46:25 +00:00
getCheckedCredentialsForToday,
2020-09-09 02:25:05 +00:00
maybeFetchNewCredentials,
} from './services/groupCredentialFetcher';
import { storageServiceUploadJob } from './services/storage';
2020-11-20 17:30:45 +00:00
import dataInterface from './sql/Client';
import { toWebSafeBase64, fromWebSafeBase64 } from './util/webSafeBase64';
import { assertDev, strictAssert } from './util/assert';
2021-05-07 20:07:24 +00:00
import { isMoreRecentThan } from './util/timestamp';
2022-11-16 20:18:02 +00:00
import { MINUTE, DurationInSeconds } from './util/durations';
2021-06-22 14:46:42 +00:00
import { normalizeUuid } from './util/normalizeUuid';
import { dropNull } from './util/dropNull';
import type {
2020-09-09 02:25:05 +00:00
ConversationAttributesType,
GroupV2MemberType,
GroupV2PendingAdminApprovalType,
2020-09-09 02:25:05 +00:00
GroupV2PendingMemberType,
2022-03-23 22:34:51 +00:00
GroupV2BannedMemberType,
2020-09-09 02:25:05 +00:00
MessageAttributesType,
} from './model-types.d';
import {
2020-10-06 17:06:34 +00:00
createProfileKeyCredentialPresentation,
2022-07-08 20:46:25 +00:00
decodeProfileKeyCredentialPresentation,
2020-09-09 02:25:05 +00:00
decryptGroupBlob,
decryptProfileKey,
decryptUuid,
deriveGroupID,
deriveGroupPublicParams,
deriveGroupSecretParams,
encryptGroupBlob,
2020-10-06 17:06:34 +00:00
encryptUuid,
2020-09-09 02:25:05 +00:00
getAuthCredentialPresentation,
getClientZkAuthOperations,
getClientZkGroupCipher,
2020-10-06 17:06:34 +00:00
getClientZkProfileOperations,
verifyNotarySignature,
2020-09-09 02:25:05 +00:00
} from './util/zkgroup';
import {
computeHash,
2020-11-20 17:30:45 +00:00
deriveMasterKeyFromGroupV1,
getRandomBytes,
2020-09-09 02:25:05 +00:00
} from './Crypto';
import type {
2020-11-20 17:30:45 +00:00
GroupCredentialsType,
GroupLogResponseType,
} from './textsecure/WebAPI';
import { HTTPError } from './textsecure/Errors';
import type MessageSender from './textsecure/SendMessage';
import { CURRENT_SCHEMA_VERSION as MAX_MESSAGE_SCHEMA } from './types/Message2';
import type { ConversationModel } from './models/conversations';
2021-03-03 20:09:58 +00:00
import { getGroupSizeHardLimit } from './groups/limits';
import {
isGroupV1 as getIsGroupV1,
isGroupV2 as getIsGroupV2,
isMe,
} from './util/whatTypeOfConversation';
2021-06-22 14:46:42 +00:00
import * as Bytes from './Bytes';
import type { AvatarDataType } from './types/Avatar';
2022-07-08 20:46:25 +00:00
import { UUID, UUIDKind, isValidUuid } from './types/UUID';
2021-10-26 22:59:08 +00:00
import type { UUIDStringType } from './types/UUID';
import * as Errors from './types/errors';
2021-06-22 14:46:42 +00:00
import { SignalService as Proto } from './protobuf';
import { isNotNil } from './util/isNotNil';
import { isAccessControlEnabled } from './groups/util';
2022-02-16 18:36:21 +00:00
import {
conversationJobQueue,
conversationQueueJobEnum,
} from './jobs/conversationJobQueue';
import { ReadStatus } from './messages/MessageReadStatus';
import { SeenStatus } from './MessageSeenStatus';
2022-02-16 18:36:21 +00:00
type AccessRequiredEnum = Proto.AccessControl.AccessRequired;
2020-09-09 02:25:05 +00:00
export { joinViaLink } from './groups/joinViaLink';
2021-07-20 20:18:35 +00:00
type GroupV2AccessCreateChangeType = {
2020-10-06 17:06:34 +00:00
type: 'create';
};
2021-07-20 20:18:35 +00:00
type GroupV2AccessAttributesChangeType = {
2020-09-09 02:25:05 +00:00
type: 'access-attributes';
newPrivilege: number;
};
2021-07-20 20:18:35 +00:00
type GroupV2AccessMembersChangeType = {
2020-09-09 02:25:05 +00:00
type: 'access-members';
newPrivilege: number;
};
2021-07-20 20:18:35 +00:00
type GroupV2AccessInviteLinkChangeType = {
type: 'access-invite-link';
newPrivilege: number;
};
2021-07-20 20:18:35 +00:00
type GroupV2AnnouncementsOnlyChangeType = {
type: 'announcements-only';
announcementsOnly: boolean;
};
type GroupV2AvatarChangeType = {
2020-09-09 02:25:05 +00:00
type: 'avatar';
removed: boolean;
};
2021-07-20 20:18:35 +00:00
type GroupV2TitleChangeType = {
2020-09-09 02:25:05 +00:00
type: 'title';
// Allow for null, because the title could be removed entirely
newTitle?: string;
};
2021-07-20 20:18:35 +00:00
type GroupV2GroupLinkAddChangeType = {
type: 'group-link-add';
privilege: number;
};
2021-07-20 20:18:35 +00:00
type GroupV2GroupLinkResetChangeType = {
type: 'group-link-reset';
};
2021-07-20 20:18:35 +00:00
type GroupV2GroupLinkRemoveChangeType = {
type: 'group-link-remove';
};
2020-09-09 02:25:05 +00:00
// No disappearing messages timer change type - message.expirationTimerUpdate used instead
2021-07-20 20:18:35 +00:00
type GroupV2MemberAddChangeType = {
2020-09-09 02:25:05 +00:00
type: 'member-add';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
2021-07-20 20:18:35 +00:00
type GroupV2MemberAddFromInviteChangeType = {
2020-09-09 02:25:05 +00:00
type: 'member-add-from-invite';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
inviter?: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
2021-07-20 20:18:35 +00:00
type GroupV2MemberAddFromLinkChangeType = {
type: 'member-add-from-link';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
};
2021-07-20 20:18:35 +00:00
type GroupV2MemberAddFromAdminApprovalChangeType = {
type: 'member-add-from-admin-approval';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
};
2021-07-20 20:18:35 +00:00
type GroupV2MemberPrivilegeChangeType = {
2020-09-09 02:25:05 +00:00
type: 'member-privilege';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2020-09-09 02:25:05 +00:00
newPrivilege: number;
};
2021-07-20 20:18:35 +00:00
type GroupV2MemberRemoveChangeType = {
2020-09-09 02:25:05 +00:00
type: 'member-remove';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
2021-07-20 20:18:35 +00:00
type GroupV2PendingAddOneChangeType = {
2020-09-09 02:25:05 +00:00
type: 'pending-add-one';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
2021-07-20 20:18:35 +00:00
type GroupV2PendingAddManyChangeType = {
2020-09-09 02:25:05 +00:00
type: 'pending-add-many';
count: number;
};
// Note: pending-remove is only used if user didn't also join the group at the same time
2021-07-20 20:18:35 +00:00
type GroupV2PendingRemoveOneChangeType = {
2020-09-09 02:25:05 +00:00
type: 'pending-remove-one';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
inviter?: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
// Note: pending-remove is only used if user didn't also join the group at the same time
2021-07-20 20:18:35 +00:00
type GroupV2PendingRemoveManyChangeType = {
2020-09-09 02:25:05 +00:00
type: 'pending-remove-many';
count: number;
2021-10-26 22:59:08 +00:00
inviter?: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
2021-07-20 20:18:35 +00:00
type GroupV2AdminApprovalAddOneChangeType = {
type: 'admin-approval-add-one';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
};
// Note: admin-approval-remove-one is only used if user didn't also join the group at
// the same time
2021-07-20 20:18:35 +00:00
type GroupV2AdminApprovalRemoveOneChangeType = {
type: 'admin-approval-remove-one';
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
inviter?: UUIDStringType;
};
type GroupV2AdminApprovalBounceChangeType = {
type: 'admin-approval-bounce';
times: number;
isApprovalPending: boolean;
uuid: UUIDStringType;
};
2021-06-02 00:24:28 +00:00
export type GroupV2DescriptionChangeType = {
type: 'description';
removed?: boolean;
// Adding this field; cannot remove previous field for backwards compatibility
description?: string;
2021-06-02 00:24:28 +00:00
};
2020-09-09 02:25:05 +00:00
export type GroupV2ChangeDetailType =
| GroupV2AccessAttributesChangeType
| GroupV2AccessCreateChangeType
| GroupV2AccessInviteLinkChangeType
2020-09-09 02:25:05 +00:00
| GroupV2AccessMembersChangeType
| GroupV2AdminApprovalAddOneChangeType
| GroupV2AdminApprovalRemoveOneChangeType
| GroupV2AdminApprovalBounceChangeType
2021-07-20 20:18:35 +00:00
| GroupV2AnnouncementsOnlyChangeType
| GroupV2AvatarChangeType
2021-06-02 00:24:28 +00:00
| GroupV2DescriptionChangeType
| GroupV2GroupLinkAddChangeType
| GroupV2GroupLinkRemoveChangeType
2021-06-02 00:24:28 +00:00
| GroupV2GroupLinkResetChangeType
2020-09-09 02:25:05 +00:00
| GroupV2MemberAddChangeType
| GroupV2MemberAddFromAdminApprovalChangeType
2020-09-09 02:25:05 +00:00
| GroupV2MemberAddFromInviteChangeType
| GroupV2MemberAddFromLinkChangeType
2020-09-09 02:25:05 +00:00
| GroupV2MemberPrivilegeChangeType
| GroupV2MemberRemoveChangeType
2020-09-09 02:25:05 +00:00
| GroupV2PendingAddManyChangeType
| GroupV2PendingAddOneChangeType
| GroupV2PendingRemoveManyChangeType
2020-09-09 02:25:05 +00:00
| GroupV2PendingRemoveOneChangeType
| GroupV2TitleChangeType;
2020-09-09 02:25:05 +00:00
export type GroupV2ChangeType = {
2021-10-26 22:59:08 +00:00
from?: UUIDStringType;
2020-09-09 02:25:05 +00:00
details: Array<GroupV2ChangeDetailType>;
};
export type GroupFields = {
2021-06-22 14:46:42 +00:00
readonly id: Uint8Array;
readonly secretParams: Uint8Array;
readonly publicParams: Uint8Array;
};
const MAX_CACHED_GROUP_FIELDS = 100;
const groupFieldsCache = new LRU<string, GroupFields>({
max: MAX_CACHED_GROUP_FIELDS,
});
2020-11-20 17:30:45 +00:00
const { updateConversation } = dataInterface;
2020-09-09 02:25:05 +00:00
if (!isNumber(MAX_MESSAGE_SCHEMA)) {
throw new Error(
'groups.ts: Unable to capture max message schema from js/modules/types/message'
);
}
type MemberType = {
profileKey: string;
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
type UpdatesResultType = {
// The array of new messages to be added into the message timeline
groupChangeMessages: Array<GroupChangeMessageType>;
2020-09-09 02:25:05 +00:00
// The set of members in the group, and we largely just pull profile keys for each,
// because the group membership is updated in newAttributes
members: Array<MemberType>;
// To be merged into the conversation model
newAttributes: ConversationAttributesType;
};
2021-03-03 20:09:58 +00:00
type UploadedAvatarType = {
2021-09-24 00:49:05 +00:00
data: Uint8Array;
2021-03-03 20:09:58 +00:00
hash: string;
key: string;
};
type BasicMessageType = Pick<
MessageAttributesType,
'id' | 'schemaVersion' | 'readStatus' | 'seenStatus'
>;
type GroupV2ChangeMessageType = {
type: 'group-v2-change';
} & Pick<MessageAttributesType, 'groupV2Change' | 'sourceUuid'>;
type GroupV1MigrationMessageType = {
type: 'group-v1-migration';
} & Pick<
MessageAttributesType,
'invitedGV2Members' | 'droppedGV2MemberIds' | 'groupMigration'
>;
type TimerNotificationMessageType = {
type: 'timer-notification';
} & Pick<
MessageAttributesType,
'sourceUuid' | 'flags' | 'expirationTimerUpdate'
>;
type GroupChangeMessageType = BasicMessageType &
(
| GroupV2ChangeMessageType
| GroupV1MigrationMessageType
| TimerNotificationMessageType
);
2020-09-09 02:25:05 +00:00
// Constants
export const MASTER_KEY_LENGTH = 32;
const GROUP_TITLE_MAX_ENCRYPTED_BYTES = 1024;
2021-06-02 00:24:28 +00:00
const GROUP_DESC_MAX_ENCRYPTED_BYTES = 8192;
export const ID_V1_LENGTH = 16;
export const ID_LENGTH = 32;
2020-09-09 02:25:05 +00:00
const TEMPORAL_AUTH_REJECTED_CODE = 401;
const GROUP_ACCESS_DENIED_CODE = 403;
2020-11-20 17:30:45 +00:00
const GROUP_NONEXISTENT_CODE = 404;
2022-07-08 20:46:25 +00:00
const SUPPORTED_CHANGE_EPOCH = 5;
export const LINK_VERSION_ERROR = 'LINK_VERSION_ERROR';
const GROUP_INVITE_LINK_PASSWORD_LENGTH = 16;
function generateBasicMessage(): BasicMessageType {
return {
id: getGuid(),
schemaVersion: MAX_MESSAGE_SCHEMA,
// this is missing most properties to fulfill this type
};
}
// Group Links
2021-09-24 00:49:05 +00:00
export function generateGroupInviteLinkPassword(): Uint8Array {
return getRandomBytes(GROUP_INVITE_LINK_PASSWORD_LENGTH);
}
// Group Links
export async function getPreJoinGroupInfo(
inviteLinkPasswordBase64: string,
masterKeyBase64: string
2021-06-22 14:46:42 +00:00
): Promise<Proto.GroupJoinInfo> {
const data = window.Signal.Groups.deriveGroupFields(
2021-06-22 14:46:42 +00:00
Bytes.fromBase64(masterKeyBase64)
);
return makeRequestWithTemporalRetry({
logId: `getPreJoinInfo/groupv2(${data.id})`,
2021-06-22 14:46:42 +00:00
publicParams: Bytes.toBase64(data.publicParams),
secretParams: Bytes.toBase64(data.secretParams),
request: (sender, options) =>
sender.getGroupFromLink(inviteLinkPasswordBase64, options),
});
}
export function buildGroupLink(conversation: ConversationModel): string {
const { masterKey, groupInviteLinkPassword } = conversation.attributes;
2021-06-22 14:46:42 +00:00
const bytes = Proto.GroupInviteLink.encode({
v1Contents: {
groupMasterKey: Bytes.fromBase64(masterKey),
inviteLinkPassword: Bytes.fromBase64(groupInviteLinkPassword),
},
}).finish();
2021-06-22 14:46:42 +00:00
const hash = toWebSafeBase64(Bytes.toBase64(bytes));
return `https://signal.group/#${hash}`;
}
2020-09-09 02:25:05 +00:00
2021-11-11 22:43:05 +00:00
export function parseGroupLink(hash: string): {
masterKey: string;
inviteLinkPassword: string;
} {
const base64 = fromWebSafeBase64(hash);
2021-06-22 14:46:42 +00:00
const buffer = Bytes.fromBase64(base64);
2021-06-22 14:46:42 +00:00
const inviteLinkProto = Proto.GroupInviteLink.decode(buffer);
if (
inviteLinkProto.contents !== 'v1Contents' ||
!inviteLinkProto.v1Contents
) {
const error = new Error(
'parseGroupLink: Parsed proto is missing v1Contents'
);
error.name = LINK_VERSION_ERROR;
throw error;
}
2021-06-22 14:46:42 +00:00
const {
groupMasterKey: groupMasterKeyRaw,
inviteLinkPassword: inviteLinkPasswordRaw,
} = inviteLinkProto.v1Contents;
if (!groupMasterKeyRaw || !groupMasterKeyRaw.length) {
throw new Error('v1Contents.groupMasterKey had no data!');
}
2021-06-22 14:46:42 +00:00
if (!inviteLinkPasswordRaw || !inviteLinkPasswordRaw.length) {
throw new Error('v1Contents.inviteLinkPassword had no data!');
}
2021-06-22 14:46:42 +00:00
const masterKey = Bytes.toBase64(groupMasterKeyRaw);
if (masterKey.length !== 44) {
throw new Error(`masterKey had unexpected length ${masterKey.length}`);
}
2021-06-22 14:46:42 +00:00
const inviteLinkPassword = Bytes.toBase64(inviteLinkPasswordRaw);
if (inviteLinkPassword.length === 0) {
throw new Error(
`inviteLinkPassword had unexpected length ${inviteLinkPassword.length}`
);
}
return { masterKey, inviteLinkPassword };
}
2020-10-06 17:06:34 +00:00
// Group Modifications
2020-09-09 02:25:05 +00:00
2021-03-03 20:09:58 +00:00
async function uploadAvatar(
options: {
logId: string;
publicParams: string;
secretParams: string;
2021-09-24 00:49:05 +00:00
} & ({ path: string } | { data: Uint8Array })
2021-03-03 20:09:58 +00:00
): Promise<UploadedAvatarType> {
const { logId, publicParams, secretParams } = options;
2020-11-20 17:30:45 +00:00
try {
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
2021-09-24 00:49:05 +00:00
let data: Uint8Array;
2021-03-03 20:09:58 +00:00
if ('data' in options) {
({ data } = options);
} else {
data = await window.Signal.Migrations.readAttachmentData(options.path);
}
2021-09-24 00:49:05 +00:00
const hash = computeHash(data);
2020-11-20 17:30:45 +00:00
2021-06-22 14:46:42 +00:00
const blobPlaintext = Proto.GroupAttributeBlob.encode({
2021-09-24 00:49:05 +00:00
avatar: data,
2021-06-22 14:46:42 +00:00
}).finish();
2020-11-20 17:30:45 +00:00
const ciphertext = encryptGroupBlob(clientZkGroupCipher, blobPlaintext);
const key = await makeRequestWithTemporalRetry({
logId: `uploadGroupAvatar/${logId}`,
publicParams,
secretParams,
2021-03-03 20:09:58 +00:00
request: (sender, requestOptions) =>
sender.uploadGroupAvatar(ciphertext, requestOptions),
2020-11-20 17:30:45 +00:00
});
return {
2021-03-03 20:09:58 +00:00
data,
2020-11-20 17:30:45 +00:00
hash,
2021-03-03 20:09:58 +00:00
key,
2020-11-20 17:30:45 +00:00
};
} catch (error) {
log.warn(
`uploadAvatar/${logId} Failed to upload avatar`,
Errors.toLogFormat(error)
);
2020-11-20 17:30:45 +00:00
throw error;
}
}
function buildGroupTitleBuffer(
clientZkGroupCipher: ClientZkGroupCipher,
title: string
2021-06-22 14:46:42 +00:00
): Uint8Array {
const titleBlobPlaintext = Proto.GroupAttributeBlob.encode({
title,
}).finish();
const result = encryptGroupBlob(clientZkGroupCipher, titleBlobPlaintext);
if (result.byteLength > GROUP_TITLE_MAX_ENCRYPTED_BYTES) {
throw new Error('buildGroupTitleBuffer: encrypted group title is too long');
}
return result;
}
2021-06-02 00:24:28 +00:00
function buildGroupDescriptionBuffer(
clientZkGroupCipher: ClientZkGroupCipher,
description: string
2021-06-22 14:46:42 +00:00
): Uint8Array {
const attrsBlobPlaintext = Proto.GroupAttributeBlob.encode({
descriptionText: description,
}).finish();
2021-06-02 00:24:28 +00:00
const result = encryptGroupBlob(clientZkGroupCipher, attrsBlobPlaintext);
if (result.byteLength > GROUP_DESC_MAX_ENCRYPTED_BYTES) {
throw new Error(
'buildGroupDescriptionBuffer: encrypted group title is too long'
);
}
return result;
}
2021-03-03 20:09:58 +00:00
function buildGroupProto(
attributes: Pick<
ConversationAttributesType,
| 'accessControl'
| 'expireTimer'
| 'id'
| 'membersV2'
| 'name'
| 'pendingMembersV2'
| 'publicParams'
| 'revision'
| 'secretParams'
> & {
avatarUrl?: string;
}
2021-06-22 14:46:42 +00:00
): Proto.Group {
const MEMBER_ROLE_ENUM = Proto.Member.Role;
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
2020-11-20 17:30:45 +00:00
const logId = `groupv2(${attributes.id})`;
const { publicParams, secretParams } = attributes;
if (!publicParams) {
throw new Error(
`buildGroupProto/${logId}: attributes were missing publicParams!`
);
}
if (!secretParams) {
throw new Error(
`buildGroupProto/${logId}: attributes were missing secretParams!`
);
}
const serverPublicParamsBase64 = window.getServerPublicParams();
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
const clientZkProfileCipher = getClientZkProfileOperations(
serverPublicParamsBase64
);
2021-06-22 14:46:42 +00:00
const proto = new Proto.Group();
2020-11-20 17:30:45 +00:00
2021-06-22 14:46:42 +00:00
proto.publicKey = Bytes.fromBase64(publicParams);
2020-11-20 17:30:45 +00:00
proto.version = attributes.revision || 0;
if (attributes.name) {
proto.title = buildGroupTitleBuffer(clientZkGroupCipher, attributes.name);
}
2020-11-20 17:30:45 +00:00
2021-03-03 20:09:58 +00:00
if (attributes.avatarUrl) {
proto.avatar = attributes.avatarUrl;
2020-11-20 17:30:45 +00:00
}
if (attributes.expireTimer) {
2021-06-22 14:46:42 +00:00
const timerBlobPlaintext = Proto.GroupAttributeBlob.encode({
disappearingMessagesDuration: attributes.expireTimer,
}).finish();
2020-11-20 17:30:45 +00:00
proto.disappearingMessagesTimer = encryptGroupBlob(
clientZkGroupCipher,
timerBlobPlaintext
);
}
2021-06-22 14:46:42 +00:00
const accessControl = new Proto.AccessControl();
2020-11-20 17:30:45 +00:00
if (attributes.accessControl) {
accessControl.attributes =
attributes.accessControl.attributes || ACCESS_ENUM.MEMBER;
accessControl.members =
attributes.accessControl.members || ACCESS_ENUM.MEMBER;
} else {
accessControl.attributes = ACCESS_ENUM.MEMBER;
accessControl.members = ACCESS_ENUM.MEMBER;
}
proto.accessControl = accessControl;
proto.members = (attributes.membersV2 || []).map(item => {
2021-06-22 14:46:42 +00:00
const member = new Proto.Member();
2020-11-20 17:30:45 +00:00
2021-10-26 22:59:08 +00:00
const conversation = window.ConversationController.get(item.uuid);
2020-11-20 17:30:45 +00:00
if (!conversation) {
throw new Error(`buildGroupProto/${logId}: no conversation for member!`);
}
const profileKeyCredentialBase64 = conversation.get('profileKeyCredential');
if (!profileKeyCredentialBase64) {
throw new Error(
`buildGroupProto/${logId}: member was missing profileKeyCredential!`
2020-11-20 17:30:45 +00:00
);
}
const presentation = createProfileKeyCredentialPresentation(
clientZkProfileCipher,
profileKeyCredentialBase64,
secretParams
);
member.role = item.role || MEMBER_ROLE_ENUM.DEFAULT;
member.presentation = presentation;
return member;
});
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
2020-11-20 17:30:45 +00:00
2022-07-08 20:46:25 +00:00
const ourACICipherTextBuffer = encryptUuid(clientZkGroupCipher, ourACI);
2020-11-20 17:30:45 +00:00
proto.membersPendingProfileKey = (attributes.pendingMembersV2 || []).map(
item => {
2021-06-22 14:46:42 +00:00
const pendingMember = new Proto.MemberPendingProfileKey();
const member = new Proto.Member();
2020-11-20 17:30:45 +00:00
2021-10-26 22:59:08 +00:00
const conversation = window.ConversationController.get(item.uuid);
if (!conversation) {
throw new Error('buildGroupProto: no conversation for pending member!');
}
2020-11-20 17:30:45 +00:00
2022-07-08 20:46:25 +00:00
const uuid = conversation.getCheckedUuid(
'buildGroupProto: pending member was missing uuid!'
);
2020-11-20 17:30:45 +00:00
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
member.userId = uuidCipherTextBuffer;
member.role = item.role || MEMBER_ROLE_ENUM.DEFAULT;
2020-11-20 17:30:45 +00:00
pendingMember.member = member;
2022-03-23 20:49:27 +00:00
pendingMember.timestamp = Long.fromNumber(item.timestamp);
2022-07-08 20:46:25 +00:00
pendingMember.addedByUserId = ourACICipherTextBuffer;
2020-11-20 17:30:45 +00:00
return pendingMember;
}
);
2020-11-20 17:30:45 +00:00
return proto;
}
2021-03-11 21:29:31 +00:00
export async function buildAddMembersChange(
conversation: Pick<
ConversationAttributesType,
'bannedMembersV2' | 'id' | 'publicParams' | 'revision' | 'secretParams'
2021-03-11 21:29:31 +00:00
>,
conversationIds: ReadonlyArray<string>
2021-06-22 14:46:42 +00:00
): Promise<undefined | Proto.GroupChange.Actions> {
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2021-03-11 21:29:31 +00:00
const { id, publicParams, revision, secretParams } = conversation;
const logId = `groupv2(${id})`;
if (!publicParams) {
throw new Error(
`buildAddMembersChange/${logId}: attributes were missing publicParams!`
);
}
if (!secretParams) {
throw new Error(
`buildAddMembersChange/${logId}: attributes were missing secretParams!`
);
}
const newGroupVersion = (revision || 0) + 1;
const serverPublicParamsBase64 = window.getServerPublicParams();
const clientZkProfileCipher = getClientZkProfileOperations(
serverPublicParamsBase64
);
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
const ourACICipherTextBuffer = encryptUuid(clientZkGroupCipher, ourACI);
2021-03-11 21:29:31 +00:00
const now = Date.now();
2021-06-22 14:46:42 +00:00
const addMembers: Array<Proto.GroupChange.Actions.AddMemberAction> = [];
2021-11-11 22:43:05 +00:00
const addPendingMembers: Array<Proto.GroupChange.Actions.AddMemberPendingProfileKeyAction> =
[];
const actions = new Proto.GroupChange.Actions();
2021-03-11 21:29:31 +00:00
await Promise.all(
conversationIds.map(async conversationId => {
const contact = window.ConversationController.get(conversationId);
if (!contact) {
assertDev(
2021-03-11 21:29:31 +00:00
false,
`buildAddMembersChange/${logId}: missing local contact, skipping`
);
return;
}
2022-07-08 20:46:25 +00:00
const uuid = contact.getUuid();
2021-03-11 21:29:31 +00:00
if (!uuid) {
assertDev(
false,
`buildAddMembersChange/${logId}: missing UUID; skipping`
);
2021-03-11 21:29:31 +00:00
return;
}
// Refresh our local data to be sure
2022-03-04 19:48:44 +00:00
if (!contact.get('profileKey') || !contact.get('profileKeyCredential')) {
2021-03-11 21:29:31 +00:00
await contact.getProfiles();
}
const profileKey = contact.get('profileKey');
const profileKeyCredential = contact.get('profileKeyCredential');
2021-06-22 14:46:42 +00:00
const member = new Proto.Member();
2021-03-11 21:29:31 +00:00
member.userId = encryptUuid(clientZkGroupCipher, uuid);
member.role = MEMBER_ROLE_ENUM.DEFAULT;
member.joinedAtVersion = newGroupVersion;
// This is inspired by [Android's equivalent code][0].
//
// [0]: https://github.com/signalapp/Signal-Android/blob/2be306867539ab1526f0e49d1aa7bd61e783d23f/libsignal/service/src/main/java/org/whispersystems/signalservice/api/groupsv2/GroupsV2Operations.java#L152-L174
if (profileKey && profileKeyCredential) {
member.presentation = createProfileKeyCredentialPresentation(
clientZkProfileCipher,
profileKeyCredential,
secretParams
);
2021-06-22 14:46:42 +00:00
const addMemberAction = new Proto.GroupChange.Actions.AddMemberAction();
2021-03-11 21:29:31 +00:00
addMemberAction.added = member;
addMemberAction.joinFromInviteLink = false;
addMembers.push(addMemberAction);
} else {
2021-06-22 14:46:42 +00:00
const memberPendingProfileKey = new Proto.MemberPendingProfileKey();
2021-03-11 21:29:31 +00:00
memberPendingProfileKey.member = member;
2022-07-08 20:46:25 +00:00
memberPendingProfileKey.addedByUserId = ourACICipherTextBuffer;
2022-03-23 20:49:27 +00:00
memberPendingProfileKey.timestamp = Long.fromNumber(now);
2021-03-11 21:29:31 +00:00
2021-11-11 22:43:05 +00:00
const addPendingMemberAction =
new Proto.GroupChange.Actions.AddMemberPendingProfileKeyAction();
2021-03-11 21:29:31 +00:00
addPendingMemberAction.added = memberPendingProfileKey;
addPendingMembers.push(addPendingMemberAction);
}
2022-03-23 22:34:51 +00:00
const doesMemberNeedUnban = conversation.bannedMembersV2?.find(
2022-07-08 20:46:25 +00:00
bannedMember => bannedMember.uuid === uuid.toString()
2022-03-23 22:34:51 +00:00
);
if (doesMemberNeedUnban) {
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
const deleteMemberBannedAction =
new Proto.GroupChange.Actions.DeleteMemberBannedAction();
deleteMemberBannedAction.deletedUserId = uuidCipherTextBuffer;
actions.deleteMembersBanned = actions.deleteMembersBanned || [];
actions.deleteMembersBanned.push(deleteMemberBannedAction);
}
2021-03-11 21:29:31 +00:00
})
);
if (!addMembers.length && !addPendingMembers.length) {
// This shouldn't happen. When these actions are passed to `modifyGroupV2`, a warning
// will be logged.
return undefined;
}
if (addMembers.length) {
actions.addMembers = addMembers;
}
if (addPendingMembers.length) {
actions.addPendingMembers = addPendingMembers;
}
actions.version = newGroupVersion;
return actions;
}
export async function buildUpdateAttributesChange(
conversation: Pick<
ConversationAttributesType,
'id' | 'revision' | 'publicParams' | 'secretParams'
>,
attributes: Readonly<{
2021-09-24 00:49:05 +00:00
avatar?: undefined | Uint8Array;
2021-06-02 00:24:28 +00:00
description?: string;
title?: string;
}>
2021-06-22 14:46:42 +00:00
): Promise<undefined | Proto.GroupChange.Actions> {
const { publicParams, secretParams, revision, id } = conversation;
const logId = `groupv2(${id})`;
if (!publicParams) {
throw new Error(
`buildUpdateAttributesChange/${logId}: attributes were missing publicParams!`
);
}
if (!secretParams) {
throw new Error(
`buildUpdateAttributesChange/${logId}: attributes were missing secretParams!`
);
}
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
let hasChangedSomething = false;
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
// There are three possible states here:
//
// 1. 'avatar' not in attributes: we don't want to change the avatar.
// 2. attributes.avatar === undefined: we want to clear the avatar.
// 3. attributes.avatar !== undefined: we want to update the avatar.
if ('avatar' in attributes) {
hasChangedSomething = true;
2021-06-22 14:46:42 +00:00
actions.modifyAvatar = new Proto.GroupChange.Actions.ModifyAvatarAction();
const { avatar } = attributes;
if (avatar) {
const uploadedAvatar = await uploadAvatar({
data: avatar,
logId,
publicParams,
secretParams,
});
actions.modifyAvatar.avatar = uploadedAvatar.key;
}
// If we don't set `actions.modifyAvatar.avatar`, it will be cleared.
}
const { title } = attributes;
if (title) {
hasChangedSomething = true;
2021-06-22 14:46:42 +00:00
actions.modifyTitle = new Proto.GroupChange.Actions.ModifyTitleAction();
actions.modifyTitle.title = buildGroupTitleBuffer(
clientZkGroupCipher,
title
);
}
2021-06-02 00:24:28 +00:00
const { description } = attributes;
if (typeof description === 'string') {
hasChangedSomething = true;
2021-11-11 22:43:05 +00:00
actions.modifyDescription =
new Proto.GroupChange.Actions.ModifyDescriptionAction();
2021-06-02 00:24:28 +00:00
actions.modifyDescription.descriptionBytes = buildGroupDescriptionBuffer(
clientZkGroupCipher,
description
);
}
if (!hasChangedSomething) {
// This shouldn't happen. When these actions are passed to `modifyGroupV2`, a warning
// will be logged.
return undefined;
}
actions.version = (revision || 0) + 1;
return actions;
}
2020-09-09 02:25:05 +00:00
export function buildDisappearingMessagesTimerChange({
expireTimer,
group,
}: {
2022-11-16 20:18:02 +00:00
expireTimer: DurationInSeconds;
2020-09-09 02:25:05 +00:00
group: ConversationAttributesType;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
const blob = new Proto.GroupAttributeBlob();
2020-09-09 02:25:05 +00:00
blob.disappearingMessagesDuration = expireTimer;
if (!group.secretParams) {
throw new Error(
'buildDisappearingMessagesTimerChange: group was missing secretParams!'
);
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
2021-06-22 14:46:42 +00:00
const blobPlaintext = Proto.GroupAttributeBlob.encode(blob).finish();
2020-09-09 02:25:05 +00:00
const blobCipherText = encryptGroupBlob(clientZkGroupCipher, blobPlaintext);
2021-11-11 22:43:05 +00:00
const timerAction =
new Proto.GroupChange.Actions.ModifyDisappearingMessagesTimerAction();
2020-09-09 02:25:05 +00:00
timerAction.timer = blobCipherText;
actions.version = (group.revision || 0) + 1;
actions.modifyDisappearingMessagesTimer = timerAction;
return actions;
}
export function buildInviteLinkPasswordChange(
group: ConversationAttributesType,
inviteLinkPassword: string
2021-06-22 14:46:42 +00:00
): Proto.GroupChange.Actions {
2021-11-11 22:43:05 +00:00
const inviteLinkPasswordAction =
new Proto.GroupChange.Actions.ModifyInviteLinkPasswordAction();
inviteLinkPasswordAction.inviteLinkPassword =
Bytes.fromBase64(inviteLinkPassword);
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
actions.version = (group.revision || 0) + 1;
actions.modifyInviteLinkPassword = inviteLinkPasswordAction;
return actions;
}
export function buildNewGroupLinkChange(
group: ConversationAttributesType,
inviteLinkPassword: string,
addFromInviteLinkAccess: AccessRequiredEnum
2021-06-22 14:46:42 +00:00
): Proto.GroupChange.Actions {
2021-11-11 22:43:05 +00:00
const accessControlAction =
new Proto.GroupChange.Actions.ModifyAddFromInviteLinkAccessControlAction();
accessControlAction.addFromInviteLinkAccess = addFromInviteLinkAccess;
2021-11-11 22:43:05 +00:00
const inviteLinkPasswordAction =
new Proto.GroupChange.Actions.ModifyInviteLinkPasswordAction();
inviteLinkPasswordAction.inviteLinkPassword =
Bytes.fromBase64(inviteLinkPassword);
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
actions.version = (group.revision || 0) + 1;
actions.modifyAddFromInviteLinkAccess = accessControlAction;
actions.modifyInviteLinkPassword = inviteLinkPasswordAction;
return actions;
}
export function buildAccessControlAddFromInviteLinkChange(
group: ConversationAttributesType,
value: AccessRequiredEnum
2021-06-22 14:46:42 +00:00
): Proto.GroupChange.Actions {
2021-11-11 22:43:05 +00:00
const accessControlAction =
new Proto.GroupChange.Actions.ModifyAddFromInviteLinkAccessControlAction();
accessControlAction.addFromInviteLinkAccess = value;
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
actions.version = (group.revision || 0) + 1;
actions.modifyAddFromInviteLinkAccess = accessControlAction;
return actions;
}
2021-07-20 20:18:35 +00:00
export function buildAnnouncementsOnlyChange(
group: ConversationAttributesType,
value: boolean
): Proto.GroupChange.Actions {
const action = new Proto.GroupChange.Actions.ModifyAnnouncementsOnlyAction();
action.announcementsOnly = value;
const actions = new Proto.GroupChange.Actions();
actions.version = (group.revision || 0) + 1;
actions.modifyAnnouncementsOnly = action;
return actions;
}
export function buildAccessControlAttributesChange(
group: ConversationAttributesType,
value: AccessRequiredEnum
2021-06-22 14:46:42 +00:00
): Proto.GroupChange.Actions {
2021-11-11 22:43:05 +00:00
const accessControlAction =
new Proto.GroupChange.Actions.ModifyAttributesAccessControlAction();
accessControlAction.attributesAccess = value;
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
actions.version = (group.revision || 0) + 1;
actions.modifyAttributesAccess = accessControlAction;
return actions;
}
export function buildAccessControlMembersChange(
group: ConversationAttributesType,
value: AccessRequiredEnum
2021-06-22 14:46:42 +00:00
): Proto.GroupChange.Actions {
2021-11-11 22:43:05 +00:00
const accessControlAction =
new Proto.GroupChange.Actions.ModifyMembersAccessControlAction();
accessControlAction.membersAccess = value;
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
actions.version = (group.revision || 0) + 1;
actions.modifyMemberAccess = accessControlAction;
return actions;
}
2022-03-23 22:34:51 +00:00
export function _maybeBuildAddBannedMemberActions({
clientZkGroupCipher,
group,
ourUuid,
uuid,
}: {
clientZkGroupCipher: ClientZkGroupCipher;
group: Pick<ConversationAttributesType, 'bannedMembersV2'>;
2022-07-08 20:46:25 +00:00
ourUuid: UUID;
uuid: UUID;
2022-03-23 22:34:51 +00:00
}): Pick<
Proto.GroupChange.IActions,
'addMembersBanned' | 'deleteMembersBanned'
> {
const doesMemberNeedBan =
2022-07-08 20:46:25 +00:00
!group.bannedMembersV2?.find(member => member.uuid === uuid.toString()) &&
!uuid.isEqual(ourUuid);
2022-03-23 22:34:51 +00:00
if (!doesMemberNeedBan) {
return {};
}
// Sort current banned members by decreasing timestamp
const sortedBannedMembers = [...(group.bannedMembersV2 ?? [])].sort(
(a, b) => {
return b.timestamp - a.timestamp;
}
);
// All members after the limit have to be deleted and are older than the
// rest of the list.
const deletedBannedMembers = sortedBannedMembers.slice(
Math.max(0, getGroupSizeHardLimit() - 1)
);
let deleteMembersBanned = null;
if (deletedBannedMembers.length > 0) {
deleteMembersBanned = deletedBannedMembers.map(bannedMember => {
const deleteMemberBannedAction =
new Proto.GroupChange.Actions.DeleteMemberBannedAction();
deleteMemberBannedAction.deletedUserId = encryptUuid(
clientZkGroupCipher,
2022-07-08 20:46:25 +00:00
new UUID(bannedMember.uuid)
2022-03-23 22:34:51 +00:00
);
return deleteMemberBannedAction;
});
}
const addMemberBannedAction =
new Proto.GroupChange.Actions.AddMemberBannedAction();
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
addMemberBannedAction.added = new Proto.MemberBanned();
addMemberBannedAction.added.userId = uuidCipherTextBuffer;
return {
addMembersBanned: [addMemberBannedAction],
deleteMembersBanned,
};
}
// TODO AND-1101
export function buildDeletePendingAdminApprovalMemberChange({
2020-10-06 17:06:34 +00:00
group,
ourUuid,
uuid,
2020-10-06 17:06:34 +00:00
}: {
group: ConversationAttributesType;
2022-07-08 20:46:25 +00:00
ourUuid: UUID;
uuid: UUID;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
if (!group.secretParams) {
throw new Error(
'buildDeletePendingAdminApprovalMemberChange: group was missing secretParams!'
);
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
2021-11-11 22:43:05 +00:00
const deleteMemberPendingAdminApproval =
new Proto.GroupChange.Actions.DeleteMemberPendingAdminApprovalAction();
deleteMemberPendingAdminApproval.deletedUserId = uuidCipherTextBuffer;
actions.version = (group.revision || 0) + 1;
actions.deleteMemberPendingAdminApprovals = [
deleteMemberPendingAdminApproval,
];
2022-03-23 22:34:51 +00:00
const { addMembersBanned, deleteMembersBanned } =
_maybeBuildAddBannedMemberActions({
clientZkGroupCipher,
group,
ourUuid,
uuid,
});
2022-03-23 22:34:51 +00:00
if (addMembersBanned) {
actions.addMembersBanned = addMembersBanned;
}
if (deleteMembersBanned) {
actions.deleteMembersBanned = deleteMembersBanned;
}
return actions;
}
export function buildAddPendingAdminApprovalMemberChange({
group,
profileKeyCredentialBase64,
serverPublicParamsBase64,
}: {
group: ConversationAttributesType;
profileKeyCredentialBase64: string;
serverPublicParamsBase64: string;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
if (!group.secretParams) {
throw new Error(
'buildAddPendingAdminApprovalMemberChange: group was missing secretParams!'
);
}
const clientZkProfileCipher = getClientZkProfileOperations(
serverPublicParamsBase64
);
2021-11-11 22:43:05 +00:00
const addMemberPendingAdminApproval =
new Proto.GroupChange.Actions.AddMemberPendingAdminApprovalAction();
const presentation = createProfileKeyCredentialPresentation(
clientZkProfileCipher,
profileKeyCredentialBase64,
group.secretParams
);
2021-06-22 14:46:42 +00:00
const added = new Proto.MemberPendingAdminApproval();
added.presentation = presentation;
addMemberPendingAdminApproval.added = added;
actions.version = (group.revision || 0) + 1;
actions.addMemberPendingAdminApprovals = [addMemberPendingAdminApproval];
return actions;
}
export function buildAddMember({
group,
profileKeyCredentialBase64,
serverPublicParamsBase64,
uuid,
}: {
group: ConversationAttributesType;
profileKeyCredentialBase64: string;
serverPublicParamsBase64: string;
joinFromInviteLink?: boolean;
2022-07-08 20:46:25 +00:00
uuid: UUID;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
if (!group.secretParams) {
throw new Error('buildAddMember: group was missing secretParams!');
}
const clientZkProfileCipher = getClientZkProfileOperations(
serverPublicParamsBase64
);
2021-06-22 14:46:42 +00:00
const addMember = new Proto.GroupChange.Actions.AddMemberAction();
const presentation = createProfileKeyCredentialPresentation(
clientZkProfileCipher,
profileKeyCredentialBase64,
group.secretParams
);
2021-06-22 14:46:42 +00:00
const added = new Proto.Member();
added.presentation = presentation;
added.role = MEMBER_ROLE_ENUM.DEFAULT;
addMember.added = added;
actions.version = (group.revision || 0) + 1;
actions.addMembers = [addMember];
2022-03-23 22:34:51 +00:00
const doesMemberNeedUnban = group.bannedMembersV2?.find(
2022-07-08 20:46:25 +00:00
member => member.uuid === uuid.toString()
2022-03-23 22:34:51 +00:00
);
if (doesMemberNeedUnban) {
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
const deleteMemberBannedAction =
new Proto.GroupChange.Actions.DeleteMemberBannedAction();
deleteMemberBannedAction.deletedUserId = uuidCipherTextBuffer;
actions.deleteMembersBanned = [deleteMemberBannedAction];
}
return actions;
}
export function buildDeletePendingMemberChange({
uuids,
group,
}: {
2022-07-08 20:46:25 +00:00
uuids: Array<UUID>;
2020-10-06 17:06:34 +00:00
group: ConversationAttributesType;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
2020-10-06 17:06:34 +00:00
if (!group.secretParams) {
throw new Error(
'buildDeletePendingMemberChange: group was missing secretParams!'
);
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const deletePendingMembers = uuids.map(uuid => {
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
2021-11-11 22:43:05 +00:00
const deletePendingMember =
new Proto.GroupChange.Actions.DeleteMemberPendingProfileKeyAction();
deletePendingMember.deletedUserId = uuidCipherTextBuffer;
return deletePendingMember;
});
2020-10-06 17:06:34 +00:00
actions.version = (group.revision || 0) + 1;
actions.deletePendingMembers = deletePendingMembers;
2020-10-06 17:06:34 +00:00
return actions;
}
export function buildDeleteMemberChange({
group,
ourUuid,
uuid,
2020-10-06 17:06:34 +00:00
}: {
group: ConversationAttributesType;
2022-07-08 20:46:25 +00:00
ourUuid: UUID;
uuid: UUID;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
2020-10-06 17:06:34 +00:00
if (!group.secretParams) {
throw new Error('buildDeleteMemberChange: group was missing secretParams!');
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
2021-06-22 14:46:42 +00:00
const deleteMember = new Proto.GroupChange.Actions.DeleteMemberAction();
2020-10-06 17:06:34 +00:00
deleteMember.deletedUserId = uuidCipherTextBuffer;
actions.version = (group.revision || 0) + 1;
actions.deleteMembers = [deleteMember];
2022-03-23 22:34:51 +00:00
const { addMembersBanned, deleteMembersBanned } =
_maybeBuildAddBannedMemberActions({
clientZkGroupCipher,
group,
ourUuid,
uuid,
});
2022-03-23 22:34:51 +00:00
if (addMembersBanned) {
actions.addMembersBanned = addMembersBanned;
}
if (deleteMembersBanned) {
actions.deleteMembersBanned = deleteMembersBanned;
}
2020-10-06 17:06:34 +00:00
return actions;
}
export function buildAddBannedMemberChange({
uuid,
group,
}: {
2022-07-08 20:46:25 +00:00
uuid: UUID;
group: ConversationAttributesType;
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
if (!group.secretParams) {
throw new Error(
'buildAddBannedMemberChange: group was missing secretParams!'
);
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
const addMemberBannedAction =
new Proto.GroupChange.Actions.AddMemberBannedAction();
addMemberBannedAction.added = new Proto.MemberBanned();
addMemberBannedAction.added.userId = uuidCipherTextBuffer;
actions.addMembersBanned = [addMemberBannedAction];
2022-07-08 20:46:25 +00:00
if (
group.pendingAdminApprovalV2?.some(item => item.uuid === uuid.toString())
) {
const deleteMemberPendingAdminApprovalAction =
new Proto.GroupChange.Actions.DeleteMemberPendingAdminApprovalAction();
deleteMemberPendingAdminApprovalAction.deletedUserId = uuidCipherTextBuffer;
actions.deleteMemberPendingAdminApprovals = [
deleteMemberPendingAdminApprovalAction,
];
}
actions.version = (group.revision || 0) + 1;
return actions;
}
export function buildModifyMemberRoleChange({
uuid,
group,
role,
}: {
2022-07-08 20:46:25 +00:00
uuid: UUID;
group: ConversationAttributesType;
role: number;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const actions = new Proto.GroupChange.Actions();
if (!group.secretParams) {
throw new Error('buildMakeAdminChange: group was missing secretParams!');
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
2021-06-22 14:46:42 +00:00
const toggleAdmin = new Proto.GroupChange.Actions.ModifyMemberRoleAction();
toggleAdmin.userId = uuidCipherTextBuffer;
toggleAdmin.role = role;
actions.version = (group.revision || 0) + 1;
actions.modifyMemberRoles = [toggleAdmin];
return actions;
}
export function buildPromotePendingAdminApprovalMemberChange({
group,
uuid,
}: {
group: ConversationAttributesType;
2022-07-08 20:46:25 +00:00
uuid: UUID;
2021-06-22 14:46:42 +00:00
}): Proto.GroupChange.Actions {
const MEMBER_ROLE_ENUM = Proto.Member.Role;
const actions = new Proto.GroupChange.Actions();
if (!group.secretParams) {
throw new Error(
'buildAddPendingAdminApprovalMemberChange: group was missing secretParams!'
);
}
const clientZkGroupCipher = getClientZkGroupCipher(group.secretParams);
const uuidCipherTextBuffer = encryptUuid(clientZkGroupCipher, uuid);
2021-11-11 22:43:05 +00:00
const promotePendingMember =
new Proto.GroupChange.Actions.PromoteMemberPendingAdminApprovalAction();
promotePendingMember.userId = uuidCipherTextBuffer;
promotePendingMember.role = MEMBER_ROLE_ENUM.DEFAULT;
actions.version = (group.revision || 0) + 1;
actions.promoteMemberPendingAdminApprovals = [promotePendingMember];
return actions;
}
2022-07-08 20:46:25 +00:00
export type BuildPromoteMemberChangeOptionsType = Readonly<{
group: ConversationAttributesType;
serverPublicParamsBase64: string;
2022-09-21 16:18:48 +00:00
profileKeyCredentialBase64: string;
isPendingPniAciProfileKey: boolean;
2022-07-08 20:46:25 +00:00
}>;
2020-10-06 17:06:34 +00:00
export function buildPromoteMemberChange({
group,
profileKeyCredentialBase64,
serverPublicParamsBase64,
2022-09-21 16:18:48 +00:00
isPendingPniAciProfileKey = false,
2022-07-08 20:46:25 +00:00
}: BuildPromoteMemberChangeOptionsType): Proto.GroupChange.Actions {
2021-06-22 14:46:42 +00:00
const actions = new Proto.GroupChange.Actions();
2020-10-06 17:06:34 +00:00
if (!group.secretParams) {
throw new Error(
'buildDisappearingMessagesTimerChange: group was missing secretParams!'
);
}
2022-07-08 20:46:25 +00:00
actions.version = (group.revision || 0) + 1;
2020-10-06 17:06:34 +00:00
const clientZkProfileCipher = getClientZkProfileOperations(
serverPublicParamsBase64
);
2022-09-21 16:18:48 +00:00
const presentation = createProfileKeyCredentialPresentation(
clientZkProfileCipher,
profileKeyCredentialBase64,
group.secretParams
);
2020-10-06 17:06:34 +00:00
2022-09-21 16:18:48 +00:00
if (isPendingPniAciProfileKey) {
actions.promoteMembersPendingPniAciProfileKey = [
2022-07-08 20:46:25 +00:00
{
presentation,
},
];
} else {
2022-09-21 16:18:48 +00:00
actions.promotePendingMembers = [
2022-07-08 20:46:25 +00:00
{
presentation,
},
];
}
2020-10-06 17:06:34 +00:00
return actions;
}
2022-07-08 20:46:25 +00:00
async function uploadGroupChange({
2020-09-09 02:25:05 +00:00
actions,
group,
inviteLinkPassword,
2020-09-09 02:25:05 +00:00
}: {
2021-06-22 14:46:42 +00:00
actions: Proto.GroupChange.IActions;
2020-09-09 02:25:05 +00:00
group: ConversationAttributesType;
inviteLinkPassword?: string;
2021-06-22 14:46:42 +00:00
}): Promise<Proto.IGroupChange> {
const logId = idForLogging(group.groupId);
2020-09-09 02:25:05 +00:00
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
if (!group.secretParams) {
throw new Error('uploadGroupChange: group was missing secretParams!');
}
if (!group.publicParams) {
throw new Error('uploadGroupChange: group was missing publicParams!');
}
2020-11-20 17:30:45 +00:00
return makeRequestWithTemporalRetry({
logId: `uploadGroupChange/${logId}`,
publicParams: group.publicParams,
secretParams: group.secretParams,
request: (sender, options) =>
sender.modifyGroup(actions, options, inviteLinkPassword),
2020-11-20 17:30:45 +00:00
});
2020-09-09 02:25:05 +00:00
}
export async function modifyGroupV2({
conversation,
2022-07-08 20:46:25 +00:00
usingCredentialsFrom,
createGroupChange,
extraConversationsForSend,
inviteLinkPassword,
name,
}: {
conversation: ConversationModel;
2022-07-08 20:46:25 +00:00
usingCredentialsFrom: ReadonlyArray<ConversationModel>;
2021-06-22 14:46:42 +00:00
createGroupChange: () => Promise<Proto.GroupChange.Actions | undefined>;
extraConversationsForSend?: Array<string>;
inviteLinkPassword?: string;
name: string;
}): Promise<void> {
2022-02-16 18:36:21 +00:00
const logId = `${name}/${conversation.idForLogging()}`;
if (!getIsGroupV2(conversation.attributes)) {
throw new Error(
2022-02-16 18:36:21 +00:00
`modifyGroupV2/${logId}: Called for non-GroupV2 conversation`
);
}
const startTime = Date.now();
2022-11-16 20:18:02 +00:00
const timeoutTime = startTime + MINUTE;
const MAX_ATTEMPTS = 5;
2022-07-08 20:46:25 +00:00
let refreshedCredentials = false;
for (let attempt = 0; attempt < MAX_ATTEMPTS; attempt += 1) {
2022-02-16 18:36:21 +00:00
log.info(`modifyGroupV2/${logId}: Starting attempt ${attempt}`);
try {
// eslint-disable-next-line no-await-in-loop
await window.waitForEmptyEventQueue();
// Fetch profiles for contacts that do not have credentials (or have
// expired credentials)
{
const membersMissingCredentials = usingCredentialsFrom.filter(member =>
member.hasProfileKeyCredentialExpired()
);
const logIds = membersMissingCredentials.map(member =>
member.idForLogging()
);
if (logIds.length !== 0) {
log.info(`modifyGroupV2/${logId}: Fetching profiles for ${logIds}`);
}
// eslint-disable-next-line no-await-in-loop
await Promise.all(
membersMissingCredentials.map(member => member.getProfiles())
);
}
2022-02-16 18:36:21 +00:00
log.info(`modifyGroupV2/${logId}: Queuing attempt ${attempt}`);
// eslint-disable-next-line no-await-in-loop
await conversation.queueJob('modifyGroupV2', async () => {
2022-02-16 18:36:21 +00:00
log.info(`modifyGroupV2/${logId}: Running attempt ${attempt}`);
const actions = await createGroupChange();
if (!actions) {
log.warn(
2022-02-16 18:36:21 +00:00
`modifyGroupV2/${logId}: No change actions. Returning early.`
);
return;
}
// The new revision has to be exactly one more than the current revision
// or it won't upload properly, and it won't apply in maybeUpdateGroup
const currentRevision = conversation.get('revision');
const newRevision = actions.version;
if ((currentRevision || 0) + 1 !== newRevision) {
throw new Error(
2022-02-16 18:36:21 +00:00
`modifyGroupV2/${logId}: Revision mismatch - ${currentRevision} to ${newRevision}.`
);
}
// Upload. If we don't have permission, the server will return an error here.
2022-07-08 20:46:25 +00:00
const groupChange = await uploadGroupChange({
actions,
inviteLinkPassword,
group: conversation.attributes,
});
2021-11-11 22:43:05 +00:00
const groupChangeBuffer =
Proto.GroupChange.encode(groupChange).finish();
2021-06-22 14:46:42 +00:00
const groupChangeBase64 = Bytes.toBase64(groupChangeBuffer);
// Apply change locally, just like we would with an incoming change. This will
// change conversation state and add change notifications to the timeline.
await window.Signal.Groups.maybeUpdateGroup({
conversation,
groupChange: {
base64: groupChangeBase64,
isTrusted: true,
},
newRevision,
});
2022-02-16 18:36:21 +00:00
const groupV2Info = conversation.getGroupV2Info({
includePendingMembers: true,
extraConversationsForSend,
});
strictAssert(groupV2Info, 'missing groupV2Info');
2022-02-16 18:36:21 +00:00
await conversationJobQueue.add({
type: conversationQueueJobEnum.enum.GroupUpdate,
conversationId: conversation.id,
groupChangeBase64,
2022-02-16 18:36:21 +00:00
recipients: groupV2Info.members,
revision: groupV2Info.revision,
});
});
// If we've gotten here with no error, we exit!
log.info(
2022-02-16 18:36:21 +00:00
`modifyGroupV2/${logId}: Update complete, with attempt ${attempt}!`
);
break;
} catch (error) {
if (error.code === 409 && Date.now() <= timeoutTime) {
log.info(
2022-02-16 18:36:21 +00:00
`modifyGroupV2/${logId}: Conflict while updating. Trying again...`
);
// eslint-disable-next-line no-await-in-loop
await conversation.fetchLatestGroupV2Data({ force: true });
2022-07-08 20:46:25 +00:00
} else if (error.code === 400 && !refreshedCredentials) {
const logIds = usingCredentialsFrom.map(member =>
member.idForLogging()
);
if (logIds.length !== 0) {
log.warn(
`modifyGroupV2/${logId}: Profile key credentials were not ` +
`up-to-date. Updating profiles for ${logIds} and retrying`
);
}
2022-07-08 20:46:25 +00:00
for (const member of usingCredentialsFrom) {
member.set({
profileKeyCredential: null,
profileKeyCredentialExpiration: null,
});
}
// eslint-disable-next-line no-await-in-loop
await Promise.all(
usingCredentialsFrom.map(member => member.getProfiles())
2022-07-08 20:46:25 +00:00
);
// Fetch credentials only once
refreshedCredentials = true;
} else if (error.code === 409) {
log.error(
2022-02-16 18:36:21 +00:00
`modifyGroupV2/${logId}: Conflict while updating. Timed out; not retrying.`
);
// We don't wait here because we're breaking out of the loop immediately.
conversation.fetchLatestGroupV2Data({ force: true });
throw error;
} else {
2022-07-08 20:46:25 +00:00
const errorString = Errors.toLogFormat(error);
2022-02-16 18:36:21 +00:00
log.error(`modifyGroupV2/${logId}: Error updating: ${errorString}`);
throw error;
}
}
}
}
2020-09-09 02:25:05 +00:00
// Utility
export function idForLogging(groupId: string | undefined): string {
return `groupv2(${groupId})`;
2020-11-20 17:30:45 +00:00
}
2021-06-22 14:46:42 +00:00
export function deriveGroupFields(masterKey: Uint8Array): GroupFields {
2021-07-09 19:36:10 +00:00
if (masterKey.length !== MASTER_KEY_LENGTH) {
throw new Error(
`deriveGroupFields: masterKey had length ${masterKey.length}, ` +
`expected ${MASTER_KEY_LENGTH}`
);
}
2021-06-22 14:46:42 +00:00
const cacheKey = Bytes.toBase64(masterKey);
const cached = groupFieldsCache.get(cacheKey);
if (cached) {
return cached;
}
log.info('deriveGroupFields: cache miss');
2020-09-09 02:25:05 +00:00
const secretParams = deriveGroupSecretParams(masterKey);
const publicParams = deriveGroupPublicParams(secretParams);
const id = deriveGroupID(secretParams);
const fresh = {
2020-09-09 02:25:05 +00:00
id,
secretParams,
publicParams,
};
groupFieldsCache.set(cacheKey, fresh);
return fresh;
2020-09-09 02:25:05 +00:00
}
2020-11-13 19:57:55 +00:00
async function makeRequestWithTemporalRetry<T>({
logId,
publicParams,
secretParams,
request,
}: {
logId: string;
publicParams: string;
secretParams: string;
request: (sender: MessageSender, options: GroupCredentialsType) => Promise<T>;
}): Promise<T> {
2022-07-08 20:46:25 +00:00
const groupCredentials = getCheckedCredentialsForToday(
`makeRequestWithTemporalRetry/${logId}`
);
2020-11-13 19:57:55 +00:00
const sender = window.textsecure.messaging;
if (!sender) {
throw new Error(
`makeRequestWithTemporalRetry/${logId}: textsecure.messaging is not available!`
);
}
2022-07-08 20:46:25 +00:00
log.info(`makeRequestWithTemporalRetry/${logId}: starting`);
2020-11-13 19:57:55 +00:00
const todayOptions = getGroupCredentials({
authCredentialBase64: groupCredentials.today.credential,
groupPublicParamsBase64: publicParams,
groupSecretParamsBase64: secretParams,
serverPublicParamsBase64: window.getServerPublicParams(),
});
try {
return await request(sender, todayOptions);
} catch (todayError) {
if (todayError.code === TEMPORAL_AUTH_REJECTED_CODE) {
log.warn(
2020-11-13 19:57:55 +00:00
`makeRequestWithTemporalRetry/${logId}: Trying again with tomorrow's credentials`
);
const tomorrowOptions = getGroupCredentials({
authCredentialBase64: groupCredentials.tomorrow.credential,
groupPublicParamsBase64: publicParams,
groupSecretParamsBase64: secretParams,
serverPublicParamsBase64: window.getServerPublicParams(),
});
return request(sender, tomorrowOptions);
}
throw todayError;
}
}
export async function fetchMembershipProof({
publicParams,
secretParams,
}: {
publicParams: string;
secretParams: string;
}): Promise<string | undefined> {
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
if (!publicParams) {
throw new Error('fetchMembershipProof: group was missing publicParams!');
}
if (!secretParams) {
throw new Error('fetchMembershipProof: group was missing secretParams!');
}
const response = await makeRequestWithTemporalRetry({
logId: 'fetchMembershipProof',
publicParams,
secretParams,
request: (sender, options) => sender.getGroupMembershipToken(options),
});
return response.token;
}
2021-03-03 20:09:58 +00:00
// Creating a group
export async function createGroupV2(
options: Readonly<{
name: string;
avatar: undefined | Uint8Array;
2022-11-16 20:18:02 +00:00
expireTimer: undefined | DurationInSeconds;
conversationIds: Array<string>;
avatars?: Array<AvatarDataType>;
refreshedCredentials?: boolean;
}>
): Promise<ConversationModel> {
const {
name,
avatar,
expireTimer,
conversationIds,
avatars,
refreshedCredentials = false,
} = options;
2021-03-03 20:09:58 +00:00
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2021-03-03 20:09:58 +00:00
2021-09-24 00:49:05 +00:00
const masterKeyBuffer = getRandomBytes(32);
2021-03-03 20:09:58 +00:00
const fields = deriveGroupFields(masterKeyBuffer);
2021-06-22 14:46:42 +00:00
const groupId = Bytes.toBase64(fields.id);
2021-03-03 20:09:58 +00:00
const logId = `groupv2(${groupId})`;
2021-06-22 14:46:42 +00:00
const masterKey = Bytes.toBase64(masterKeyBuffer);
const secretParams = Bytes.toBase64(fields.secretParams);
const publicParams = Bytes.toBase64(fields.publicParams);
2021-03-03 20:09:58 +00:00
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI).toString();
2021-03-03 20:09:58 +00:00
const ourConversation =
window.ConversationController.getOurConversationOrThrow();
if (ourConversation.hasProfileKeyCredentialExpired()) {
log.info(`createGroupV2/${logId}: fetching our own credentials`);
await ourConversation.getProfiles();
}
2021-03-03 20:09:58 +00:00
const membersV2: Array<GroupV2MemberType> = [
{
2022-07-08 20:46:25 +00:00
uuid: ourACI,
2021-03-03 20:09:58 +00:00
role: MEMBER_ROLE_ENUM.ADMINISTRATOR,
joinedAtVersion: 0,
},
];
const pendingMembersV2: Array<GroupV2PendingMemberType> = [];
let uploadedAvatar: undefined | UploadedAvatarType;
await Promise.all([
...conversationIds.map(async conversationId => {
const contact = window.ConversationController.get(conversationId);
if (!contact) {
assertDev(
2021-03-03 20:09:58 +00:00
false,
`createGroupV2/${logId}: missing local contact, skipping`
);
return;
}
2021-10-26 22:59:08 +00:00
const contactUuid = contact.get('uuid');
if (!contactUuid) {
assertDev(false, `createGroupV2/${logId}: missing UUID; skipping`);
2021-03-03 20:09:58 +00:00
return;
}
// Refresh our local data to be sure
if (contact.hasProfileKeyCredentialExpired()) {
2021-03-03 20:09:58 +00:00
await contact.getProfiles();
}
if (contact.get('profileKey') && contact.get('profileKeyCredential')) {
membersV2.push({
2021-10-26 22:59:08 +00:00
uuid: contactUuid,
2021-03-03 20:09:58 +00:00
role: MEMBER_ROLE_ENUM.DEFAULT,
joinedAtVersion: 0,
});
} else {
pendingMembersV2.push({
2022-07-08 20:46:25 +00:00
addedByUserId: ourACI,
2021-10-26 22:59:08 +00:00
uuid: contactUuid,
2021-03-03 20:09:58 +00:00
timestamp: Date.now(),
role: MEMBER_ROLE_ENUM.DEFAULT,
});
}
}),
(async () => {
if (!avatar) {
return;
}
uploadedAvatar = await uploadAvatar({
data: avatar,
logId,
publicParams,
secretParams,
});
})(),
]);
if (membersV2.length + pendingMembersV2.length > getGroupSizeHardLimit()) {
throw new Error(
`createGroupV2/${logId}: Too many members! Member count: ${membersV2.length}, Pending member count: ${pendingMembersV2.length}`
);
}
const protoAndConversationAttributes = {
name,
// Core GroupV2 info
revision: 0,
publicParams,
secretParams,
// GroupV2 state
accessControl: {
attributes: ACCESS_ENUM.MEMBER,
members: ACCESS_ENUM.MEMBER,
addFromInviteLink: ACCESS_ENUM.UNSATISFIABLE,
},
membersV2,
pendingMembersV2,
};
const groupProto = await buildGroupProto({
id: groupId,
avatarUrl: uploadedAvatar?.key,
...protoAndConversationAttributes,
});
try {
await makeRequestWithTemporalRetry({
logId: `createGroupV2/${logId}`,
publicParams,
secretParams,
request: (sender, requestOptions) =>
sender.createGroup(groupProto, requestOptions),
});
} catch (error) {
if (!(error instanceof HTTPError)) {
throw error;
}
if (error.code !== 400 || refreshedCredentials) {
throw error;
}
const logIds = conversationIds.map(conversationId => {
const contact = window.ConversationController.get(conversationId);
if (!contact) {
return;
}
contact.set({
profileKeyCredential: null,
profileKeyCredentialExpiration: null,
});
return contact.idForLogging();
});
log.warn(
`createGroupV2/${logId}: Profile key credentials were not ` +
`up-to-date. Updating profiles for ${logIds} and retrying`
);
return createGroupV2({
...options,
refreshedCredentials: true,
});
}
2021-03-03 20:09:58 +00:00
let avatarAttribute: ConversationAttributesType['avatar'];
if (uploadedAvatar) {
try {
avatarAttribute = {
url: uploadedAvatar.key,
path: await window.Signal.Migrations.writeNewAttachmentData(
uploadedAvatar.data
),
hash: uploadedAvatar.hash,
};
} catch (err) {
log.warn(
2021-03-03 20:09:58 +00:00
`createGroupV2/${logId}: avatar failed to save to disk. Continuing on`
);
}
}
const now = Date.now();
const conversation = await window.ConversationController.getOrCreateAndWait(
groupId,
'group',
{
...protoAndConversationAttributes,
active_at: now,
2022-07-08 20:46:25 +00:00
addedBy: ourACI,
2021-03-03 20:09:58 +00:00
avatar: avatarAttribute,
2021-08-06 00:17:05 +00:00
avatars,
2021-03-03 20:09:58 +00:00
groupVersion: 2,
masterKey,
profileSharing: true,
timestamp: now,
needsStorageServiceSync: true,
}
);
await conversation.queueJob('storageServiceUploadJob', async () => {
await storageServiceUploadJob();
2021-03-03 20:09:58 +00:00
});
const timestamp = Date.now();
const groupV2Info = conversation.getGroupV2Info({
includePendingMembers: true,
});
2022-02-16 18:36:21 +00:00
strictAssert(groupV2Info, 'missing groupV2Info');
await conversationJobQueue.add({
type: conversationQueueJobEnum.enum.GroupUpdate,
conversationId: conversation.id,
recipients: groupV2Info.members,
revision: groupV2Info.revision,
2021-03-03 20:09:58 +00:00
});
const createdTheGroupMessage: MessageAttributesType = {
...generateBasicMessage(),
type: 'group-v2-change',
2022-07-08 20:46:25 +00:00
sourceUuid: ourACI,
2021-03-03 20:09:58 +00:00
conversationId: conversation.id,
readStatus: ReadStatus.Read,
received_at: window.Signal.Util.incrementMessageCounter(),
received_at_ms: timestamp,
timestamp,
seenStatus: SeenStatus.Seen,
2021-03-03 20:09:58 +00:00
sent_at: timestamp,
groupV2Change: {
2022-07-08 20:46:25 +00:00
from: ourACI,
2021-03-03 20:09:58 +00:00
details: [{ type: 'create' }],
},
};
await dataInterface.saveMessages([createdTheGroupMessage], {
2021-03-03 20:09:58 +00:00
forceSave: true,
2022-07-08 20:46:25 +00:00
ourUuid: ourACI,
2021-03-03 20:09:58 +00:00
});
const model = new window.Whisper.Message(createdTheGroupMessage);
window.MessageController.register(model.id, model);
conversation.trigger('newmessage', model);
2021-06-01 20:45:43 +00:00
if (expireTimer) {
await conversation.updateExpirationTimer(expireTimer, {
reason: 'createGroupV2',
});
2021-06-01 20:45:43 +00:00
}
2021-03-03 20:09:58 +00:00
return conversation;
}
2020-11-20 17:30:45 +00:00
// Migrating a group
export async function hasV1GroupBeenMigrated(
conversation: ConversationModel
): Promise<boolean> {
const logId = conversation.idForLogging();
const isGroupV1 = getIsGroupV1(conversation.attributes);
2020-11-20 17:30:45 +00:00
if (!isGroupV1) {
log.warn(
2020-11-20 17:30:45 +00:00
`checkForGV2Existence/${logId}: Called for non-GroupV1 conversation!`
);
return false;
}
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
const groupId = conversation.get('groupId');
if (!groupId) {
throw new Error(`checkForGV2Existence/${logId}: No groupId!`);
}
2021-09-24 00:49:05 +00:00
const idBuffer = Bytes.fromBinary(groupId);
const masterKeyBuffer = deriveMasterKeyFromGroupV1(idBuffer);
2020-11-20 17:30:45 +00:00
const fields = deriveGroupFields(masterKeyBuffer);
try {
await makeRequestWithTemporalRetry({
logId: `getGroup/${logId}`,
2021-06-22 14:46:42 +00:00
publicParams: Bytes.toBase64(fields.publicParams),
secretParams: Bytes.toBase64(fields.secretParams),
2020-11-20 17:30:45 +00:00
request: (sender, options) => sender.getGroup(options),
});
return true;
} catch (error) {
const { code } = error;
return code !== GROUP_NONEXISTENT_CODE;
2020-11-20 17:30:45 +00:00
}
}
2021-09-24 00:49:05 +00:00
export function maybeDeriveGroupV2Id(conversation: ConversationModel): boolean {
const isGroupV1 = getIsGroupV1(conversation.attributes);
2020-11-20 17:30:45 +00:00
const groupV1Id = conversation.get('groupId');
const derived = conversation.get('derivedGroupV2Id');
if (!isGroupV1 || !groupV1Id || derived) {
return false;
}
2021-09-24 00:49:05 +00:00
const v1IdBuffer = Bytes.fromBinary(groupV1Id);
const masterKeyBuffer = deriveMasterKeyFromGroupV1(v1IdBuffer);
2020-11-20 17:30:45 +00:00
const fields = deriveGroupFields(masterKeyBuffer);
2021-06-22 14:46:42 +00:00
const derivedGroupV2Id = Bytes.toBase64(fields.id);
2020-11-20 17:30:45 +00:00
conversation.set({
derivedGroupV2Id,
});
return true;
}
type WrappedGroupChangeType = Readonly<{
base64: string;
isTrusted: boolean;
}>;
type MigratePropsType = Readonly<{
2020-11-20 17:30:45 +00:00
conversation: ConversationModel;
newRevision?: number;
receivedAt?: number;
sentAt?: number;
groupChange?: WrappedGroupChangeType;
}>;
2020-11-20 17:30:45 +00:00
export async function isGroupEligibleToMigrate(
conversation: ConversationModel
): Promise<boolean> {
if (!getIsGroupV1(conversation.attributes)) {
2020-11-20 17:30:45 +00:00
return false;
}
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
2020-11-20 17:30:45 +00:00
const areWeMember =
2022-07-08 20:46:25 +00:00
!conversation.get('left') && conversation.hasMember(ourACI);
2020-11-20 17:30:45 +00:00
if (!areWeMember) {
return false;
}
const members = conversation.get('members') || [];
for (let i = 0, max = members.length; i < max; i += 1) {
const identifier = members[i];
const contact = window.ConversationController.get(identifier);
if (!contact) {
return false;
}
if (!contact.get('uuid')) {
return false;
}
}
return true;
}
export async function getGroupMigrationMembers(
conversation: ConversationModel
): Promise<{
droppedGV2MemberIds: Array<string>;
membersV2: Array<GroupV2MemberType>;
pendingMembersV2: Array<GroupV2PendingMemberType>;
previousGroupV1Members: Array<string>;
}> {
const logId = conversation.idForLogging();
2021-06-22 14:46:42 +00:00
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2021-11-11 22:43:05 +00:00
const ourConversationId =
window.ConversationController.getOurConversationId();
if (!ourConversationId) {
throw new Error(
`getGroupMigrationMembers/${logId}: Couldn't fetch our own conversationId!`
);
}
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI).toString();
2021-10-26 22:59:08 +00:00
let areWeMember = false;
let areWeInvited = false;
const previousGroupV1Members = conversation.get('members') || [];
const now = Date.now();
const memberLookup: Record<string, boolean> = {};
const membersV2: Array<GroupV2MemberType> = compact(
await Promise.all(
previousGroupV1Members.map(async e164 => {
const contact = window.ConversationController.get(e164);
if (!contact) {
throw new Error(
`getGroupMigrationMembers/${logId}: membersV2 - missing local contact for ${e164}, skipping.`
);
}
if (!isMe(contact.attributes) && window.GV2_MIGRATION_DISABLE_ADD) {
log.warn(
`getGroupMigrationMembers/${logId}: membersV2 - skipping ${e164} due to GV2_MIGRATION_DISABLE_ADD flag`
);
return null;
}
2021-10-26 22:59:08 +00:00
const contactUuid = contact.get('uuid');
if (!contactUuid) {
log.warn(
`getGroupMigrationMembers/${logId}: membersV2 - missing uuid for ${e164}, skipping.`
);
return null;
}
if (!contact.get('profileKey')) {
log.warn(
`getGroupMigrationMembers/${logId}: membersV2 - missing profileKey for member ${e164}, skipping.`
);
return null;
}
let capabilities = contact.get('capabilities');
// Refresh our local data to be sure
if (
2022-03-04 19:48:44 +00:00
!capabilities?.['gv1-migration'] ||
!contact.get('profileKeyCredential')
) {
await contact.getProfiles();
}
capabilities = contact.get('capabilities');
2022-03-04 19:48:44 +00:00
if (!capabilities?.['gv1-migration']) {
log.warn(
`getGroupMigrationMembers/${logId}: membersV2 - member ${e164} is missing gv1-migration capability, skipping.`
);
return null;
}
if (!contact.get('profileKeyCredential')) {
log.warn(
`getGroupMigrationMembers/${logId}: membersV2 - no profileKeyCredential for ${e164}, skipping.`
);
return null;
}
const conversationId = contact.id;
if (conversationId === ourConversationId) {
areWeMember = true;
}
memberLookup[conversationId] = true;
return {
2021-10-26 22:59:08 +00:00
uuid: contactUuid,
role: MEMBER_ROLE_ENUM.ADMINISTRATOR,
joinedAtVersion: 0,
};
})
)
);
const droppedGV2MemberIds: Array<string> = [];
const pendingMembersV2: Array<GroupV2PendingMemberType> = compact(
(previousGroupV1Members || []).map(e164 => {
const contact = window.ConversationController.get(e164);
if (!contact) {
throw new Error(
`getGroupMigrationMembers/${logId}: pendingMembersV2 - missing local contact for ${e164}, skipping.`
);
}
const conversationId = contact.id;
// If we've already added this contact above, we'll skip here
if (memberLookup[conversationId]) {
return null;
}
if (!isMe(contact.attributes) && window.GV2_MIGRATION_DISABLE_INVITE) {
log.warn(
`getGroupMigrationMembers/${logId}: pendingMembersV2 - skipping ${e164} due to GV2_MIGRATION_DISABLE_INVITE flag`
);
droppedGV2MemberIds.push(conversationId);
return null;
}
2021-10-26 22:59:08 +00:00
const contactUuid = contact.get('uuid');
if (!contactUuid) {
log.warn(
`getGroupMigrationMembers/${logId}: pendingMembersV2 - missing uuid for ${e164}, skipping.`
);
droppedGV2MemberIds.push(conversationId);
return null;
}
const capabilities = contact.get('capabilities');
2022-03-04 19:48:44 +00:00
if (!capabilities?.['gv1-migration']) {
log.warn(
`getGroupMigrationMembers/${logId}: pendingMembersV2 - member ${e164} is missing gv1-migration capability, skipping.`
);
droppedGV2MemberIds.push(conversationId);
return null;
}
if (conversationId === ourConversationId) {
areWeInvited = true;
}
return {
2021-10-26 22:59:08 +00:00
uuid: contactUuid,
timestamp: now,
2022-07-08 20:46:25 +00:00
addedByUserId: ourACI,
role: MEMBER_ROLE_ENUM.ADMINISTRATOR,
};
})
);
if (!areWeMember) {
throw new Error(`getGroupMigrationMembers/${logId}: We are not a member!`);
}
if (areWeInvited) {
throw new Error(`getGroupMigrationMembers/${logId}: We are invited!`);
}
return {
droppedGV2MemberIds,
membersV2,
pendingMembersV2,
previousGroupV1Members,
};
}
2020-11-20 17:30:45 +00:00
// This is called when the user chooses to migrate a GroupV1. It will update the server,
// then let all members know about the new group.
export async function initiateMigrationToGroupV2(
conversation: ConversationModel
): Promise<void> {
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
try {
await conversation.queueJob('initiateMigrationToGroupV2', async () => {
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
2020-11-20 17:30:45 +00:00
const isEligible = isGroupEligibleToMigrate(conversation);
const previousGroupV1Id = conversation.get('groupId');
if (!isEligible || !previousGroupV1Id) {
throw new Error(
`initiateMigrationToGroupV2: conversation is not eligible to migrate! ${conversation.idForLogging()}`
);
}
2021-09-24 00:49:05 +00:00
const groupV1IdBuffer = Bytes.fromBinary(previousGroupV1Id);
const masterKeyBuffer = deriveMasterKeyFromGroupV1(groupV1IdBuffer);
2020-11-20 17:30:45 +00:00
const fields = deriveGroupFields(masterKeyBuffer);
2021-06-22 14:46:42 +00:00
const groupId = Bytes.toBase64(fields.id);
2020-11-20 17:30:45 +00:00
const logId = `groupv2(${groupId})`;
log.info(
2020-11-20 17:30:45 +00:00
`initiateMigrationToGroupV2/${logId}: Migrating from ${conversation.idForLogging()}`
);
2021-06-22 14:46:42 +00:00
const masterKey = Bytes.toBase64(masterKeyBuffer);
const secretParams = Bytes.toBase64(fields.secretParams);
const publicParams = Bytes.toBase64(fields.publicParams);
2020-11-20 17:30:45 +00:00
2021-11-11 22:43:05 +00:00
const ourConversationId =
window.ConversationController.getOurConversationId();
2020-11-20 17:30:45 +00:00
if (!ourConversationId) {
throw new Error(
`initiateMigrationToGroupV2/${logId}: Couldn't fetch our own conversationId!`
);
}
2021-11-11 22:43:05 +00:00
const ourConversation =
window.ConversationController.get(ourConversationId);
2021-03-03 20:09:58 +00:00
if (!ourConversation) {
throw new Error(
`initiateMigrationToGroupV2/${logId}: cannot get our own conversation. Cannot migrate`
);
}
2020-11-20 17:30:45 +00:00
const {
membersV2,
pendingMembersV2,
droppedGV2MemberIds,
previousGroupV1Members,
} = await getGroupMigrationMembers(conversation);
2020-11-20 17:30:45 +00:00
2021-03-03 20:09:58 +00:00
if (
membersV2.length + pendingMembersV2.length >
getGroupSizeHardLimit()
) {
throw new Error(
`initiateMigrationToGroupV2/${logId}: Too many members! Member count: ${membersV2.length}, Pending member count: ${pendingMembersV2.length}`
);
}
2020-11-20 17:30:45 +00:00
// Note: A few group elements don't need to change here:
// - name
// - expireTimer
2021-03-03 20:09:58 +00:00
let avatarAttribute: ConversationAttributesType['avatar'];
const avatarPath = conversation.attributes.avatar?.path;
if (avatarPath) {
const { hash, key } = await uploadAvatar({
logId,
publicParams,
secretParams,
path: avatarPath,
});
avatarAttribute = {
url: key,
path: avatarPath,
hash,
};
}
2020-11-20 17:30:45 +00:00
const newAttributes = {
...conversation.attributes,
2021-03-03 20:09:58 +00:00
avatar: avatarAttribute,
2020-11-20 17:30:45 +00:00
// Core GroupV2 info
revision: 0,
groupId,
groupVersion: 2,
masterKey,
publicParams,
secretParams,
// GroupV2 state
accessControl: {
attributes: ACCESS_ENUM.MEMBER,
members: ACCESS_ENUM.MEMBER,
addFromInviteLink: ACCESS_ENUM.UNSATISFIABLE,
2020-11-20 17:30:45 +00:00
},
membersV2,
pendingMembersV2,
// Capture previous GroupV1 data for future use
previousGroupV1Id,
previousGroupV1Members,
// Clear storage ID, since we need to start over on the storage service
storageID: undefined,
// Clear obsolete data
derivedGroupV2Id: undefined,
members: undefined,
};
2021-03-03 20:09:58 +00:00
const groupProto = buildGroupProto({
...newAttributes,
avatarUrl: avatarAttribute?.url,
});
2020-11-20 17:30:45 +00:00
try {
await makeRequestWithTemporalRetry({
logId: `createGroup/${logId}`,
publicParams,
secretParams,
request: (sender, options) => sender.createGroup(groupProto, options),
});
} catch (error) {
log.error(
2020-11-20 17:30:45 +00:00
`initiateMigrationToGroupV2/${logId}: Error creating group:`,
Errors.toLogFormat(error)
2020-11-20 17:30:45 +00:00
);
throw error;
}
const groupChangeMessages: Array<GroupChangeMessageType> = [];
2020-11-20 17:30:45 +00:00
groupChangeMessages.push({
...generateBasicMessage(),
type: 'group-v1-migration',
invitedGV2Members: pendingMembersV2,
droppedGV2MemberIds,
readStatus: ReadStatus.Read,
seenStatus: SeenStatus.Seen,
2020-11-20 17:30:45 +00:00
});
await updateGroup({
conversation,
updates: {
newAttributes,
groupChangeMessages,
members: [],
},
});
if (window.storage.blocked.isGroupBlocked(previousGroupV1Id)) {
window.storage.blocked.addBlockedGroup(groupId);
2020-11-20 17:30:45 +00:00
}
// Save these most recent updates to conversation
updateConversation(conversation.attributes);
});
} catch (error) {
const logId = conversation.idForLogging();
if (!getIsGroupV1(conversation.attributes)) {
2020-11-20 17:30:45 +00:00
throw error;
}
const alreadyMigrated = await hasV1GroupBeenMigrated(conversation);
if (!alreadyMigrated) {
log.error(
2020-11-20 17:30:45 +00:00
`initiateMigrationToGroupV2/${logId}: Group has not already been migrated, re-throwing error`
);
throw error;
}
await respondToGroupV2Migration({
conversation,
});
return;
}
2022-02-16 18:36:21 +00:00
const groupV2Info = conversation.getGroupV2Info({
includePendingMembers: true,
2020-11-20 17:30:45 +00:00
});
2022-02-16 18:36:21 +00:00
strictAssert(groupV2Info, 'missing groupV2Info');
2020-11-20 17:30:45 +00:00
2022-02-16 18:36:21 +00:00
await conversationJobQueue.add({
type: conversationQueueJobEnum.enum.GroupUpdate,
conversationId: conversation.id,
recipients: groupV2Info.members,
revision: groupV2Info.revision,
});
2020-11-20 17:30:45 +00:00
}
export async function waitThenRespondToGroupV2Migration(
options: MigratePropsType
): Promise<void> {
// First wait to process all incoming messages on the websocket
await window.waitForEmptyEventQueue();
// Then wait to process all outstanding messages for this conversation
const { conversation } = options;
await conversation.queueJob('waitThenRespondToGroupV2Migration', async () => {
2020-11-20 17:30:45 +00:00
try {
// And finally try to migrate the group
await respondToGroupV2Migration(options);
} catch (error) {
log.error(
2020-11-20 17:30:45 +00:00
`waitThenRespondToGroupV2Migration/${conversation.idForLogging()}: respondToGroupV2Migration failure:`,
Errors.toLogFormat(error)
2020-11-20 17:30:45 +00:00
);
}
});
}
export function buildMigrationBubble(
previousGroupV1MembersIds: Array<string>,
newAttributes: ConversationAttributesType
): GroupChangeMessageType {
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
const ourPNI = window.storage.user.getUuid(UUIDKind.PNI);
2021-11-11 22:43:05 +00:00
const ourConversationId =
window.ConversationController.getOurConversationId();
// Assemble items to commemorate this event for the timeline..
const combinedConversationIds: Array<string> = [
2021-10-26 22:59:08 +00:00
...(newAttributes.membersV2 || []).map(item => item.uuid),
...(newAttributes.pendingMembersV2 || []).map(item => item.uuid),
].map(uuid => {
const conversation = window.ConversationController.lookupOrCreate({
2021-10-26 22:59:08 +00:00
uuid,
});
strictAssert(conversation, `Conversation not found for ${uuid}`);
return conversation.id;
2021-10-26 22:59:08 +00:00
});
const droppedMemberIds: Array<string> = difference(
previousGroupV1MembersIds,
combinedConversationIds
).filter(id => id && id !== ourConversationId);
const invitedMembers = (newAttributes.pendingMembersV2 || []).filter(
2022-07-08 20:46:25 +00:00
item =>
item.uuid !== ourACI.toString() &&
!(ourPNI && item.uuid === ourPNI.toString())
);
const areWeInvited = (newAttributes.pendingMembersV2 || []).some(
2022-07-08 20:46:25 +00:00
item =>
item.uuid === ourACI.toString() ||
(ourPNI && item.uuid === ourPNI.toString())
);
return {
...generateBasicMessage(),
type: 'group-v1-migration',
groupMigration: {
areWeInvited,
invitedMembers,
droppedMemberIds,
},
};
}
export function getBasicMigrationBubble(): GroupChangeMessageType {
return {
...generateBasicMessage(),
type: 'group-v1-migration',
groupMigration: {
areWeInvited: false,
invitedMembers: [],
droppedMemberIds: [],
},
};
}
export async function joinGroupV2ViaLinkAndMigrate({
approvalRequired,
conversation,
inviteLinkPassword,
revision,
}: {
approvalRequired: boolean;
conversation: ConversationModel;
inviteLinkPassword: string;
revision: number;
}): Promise<void> {
const isGroupV1 = getIsGroupV1(conversation.attributes);
const previousGroupV1Id = conversation.get('groupId');
if (!isGroupV1 || !previousGroupV1Id) {
throw new Error(
`joinGroupV2ViaLinkAndMigrate: Conversation is not GroupV1! ${conversation.idForLogging()}`
);
}
// Derive GroupV2 fields
2021-09-24 00:49:05 +00:00
const groupV1IdBuffer = Bytes.fromBinary(previousGroupV1Id);
const masterKeyBuffer = deriveMasterKeyFromGroupV1(groupV1IdBuffer);
const fields = deriveGroupFields(masterKeyBuffer);
2021-06-22 14:46:42 +00:00
const groupId = Bytes.toBase64(fields.id);
const logId = idForLogging(groupId);
log.info(
`joinGroupV2ViaLinkAndMigrate/${logId}: Migrating from ${conversation.idForLogging()}`
);
2021-06-22 14:46:42 +00:00
const masterKey = Bytes.toBase64(masterKeyBuffer);
const secretParams = Bytes.toBase64(fields.secretParams);
const publicParams = Bytes.toBase64(fields.publicParams);
// A mini-migration, which will not show dropped/invited members
const newAttributes = {
...conversation.attributes,
// Core GroupV2 info
revision,
groupId,
groupVersion: 2,
masterKey,
publicParams,
secretParams,
groupInviteLinkPassword: inviteLinkPassword,
addedBy: undefined,
left: true,
// Capture previous GroupV1 data for future use
previousGroupV1Id: conversation.get('groupId'),
previousGroupV1Members: conversation.get('members'),
// Clear storage ID, since we need to start over on the storage service
storageID: undefined,
// Clear obsolete data
derivedGroupV2Id: undefined,
members: undefined,
};
const groupChangeMessages: Array<GroupChangeMessageType> = [
{
...generateBasicMessage(),
type: 'group-v1-migration',
groupMigration: {
areWeInvited: false,
invitedMembers: [],
droppedMemberIds: [],
},
},
];
await updateGroup({
conversation,
updates: {
newAttributes,
groupChangeMessages,
members: [],
},
});
// Now things are set up, so we can go through normal channels
await conversation.joinGroupV2ViaLink({
inviteLinkPassword,
approvalRequired,
});
}
2020-11-20 17:30:45 +00:00
// This may be called from storage service, an out-of-band check, or an incoming message.
// If this is kicked off via an incoming message, we want to do the right thing and hit
// the log endpoint - the parameters beyond conversation are needed in that scenario.
export async function respondToGroupV2Migration({
conversation,
groupChange,
2020-11-20 17:30:45 +00:00
newRevision,
receivedAt,
sentAt,
}: MigratePropsType): Promise<void> {
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
const isGroupV1 = getIsGroupV1(conversation.attributes);
2020-11-20 17:30:45 +00:00
const previousGroupV1Id = conversation.get('groupId');
if (!isGroupV1 || !previousGroupV1Id) {
throw new Error(
`respondToGroupV2Migration: Conversation is not GroupV1! ${conversation.idForLogging()}`
);
}
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
const wereWePreviouslyAMember = conversation.hasMember(ourACI);
2020-11-20 17:30:45 +00:00
// Derive GroupV2 fields
2021-09-24 00:49:05 +00:00
const groupV1IdBuffer = Bytes.fromBinary(previousGroupV1Id);
const masterKeyBuffer = deriveMasterKeyFromGroupV1(groupV1IdBuffer);
2020-11-20 17:30:45 +00:00
const fields = deriveGroupFields(masterKeyBuffer);
2021-06-22 14:46:42 +00:00
const groupId = Bytes.toBase64(fields.id);
const logId = idForLogging(groupId);
log.info(
2020-11-20 17:30:45 +00:00
`respondToGroupV2Migration/${logId}: Migrating from ${conversation.idForLogging()}`
);
2021-06-22 14:46:42 +00:00
const masterKey = Bytes.toBase64(masterKeyBuffer);
const secretParams = Bytes.toBase64(fields.secretParams);
const publicParams = Bytes.toBase64(fields.publicParams);
2020-11-20 17:30:45 +00:00
const previousGroupV1Members = conversation.get('members');
const previousGroupV1MembersIds = conversation.getMemberIds();
// Skeleton of the new group state - not useful until we add the group's server state
const attributes = {
...conversation.attributes,
// Core GroupV2 info
revision: 0,
groupId,
groupVersion: 2,
masterKey,
publicParams,
secretParams,
// Capture previous GroupV1 data for future use
previousGroupV1Id,
previousGroupV1Members,
// Clear storage ID, since we need to start over on the storage service
storageID: undefined,
// Clear obsolete data
derivedGroupV2Id: undefined,
members: undefined,
};
2021-06-22 14:46:42 +00:00
let firstGroupState: Proto.IGroup | null | undefined;
2020-11-20 17:30:45 +00:00
try {
const response: GroupLogResponseType = await makeRequestWithTemporalRetry({
logId: `getGroupLog/${logId}`,
publicParams,
secretParams,
request: (sender, options) =>
sender.getGroupLog(
{
startVersion: 0,
includeFirstState: true,
includeLastState: false,
maxSupportedChangeEpoch: SUPPORTED_CHANGE_EPOCH,
},
options
),
2020-11-20 17:30:45 +00:00
});
// Attempt to start with the first group state, only later processing future updates
firstGroupState = response?.changes?.groupChanges?.[0]?.groupState;
} catch (error) {
if (error.code === GROUP_ACCESS_DENIED_CODE) {
log.info(
2020-11-20 17:30:45 +00:00
`respondToGroupV2Migration/${logId}: Failed to access log endpoint; fetching full group state`
);
try {
firstGroupState = await makeRequestWithTemporalRetry({
logId: `getGroup/${logId}`,
publicParams,
secretParams,
request: (sender, options) => sender.getGroup(options),
});
} catch (secondError) {
if (secondError.code === GROUP_ACCESS_DENIED_CODE) {
log.info(
`respondToGroupV2Migration/${logId}: Failed to access state endpoint; user is no longer part of group`
);
if (window.storage.blocked.isGroupBlocked(previousGroupV1Id)) {
window.storage.blocked.addBlockedGroup(groupId);
}
if (wereWePreviouslyAMember) {
log.info(
`respondToGroupV2Migration/${logId}: Upgrading group with migration/removed events`
);
const ourNumber = window.textsecure.storage.user.getNumber();
await updateGroup({
conversation,
receivedAt,
sentAt,
updates: {
newAttributes: {
// Because we're using attributes here, we upgrade this to a v2 group
...attributes,
addedBy: undefined,
left: true,
members: (conversation.get('members') || []).filter(
2022-07-08 20:46:25 +00:00
item => item !== ourACI.toString() && item !== ourNumber
),
},
groupChangeMessages: [
{
...getBasicMigrationBubble(),
readStatus: ReadStatus.Read,
seenStatus: SeenStatus.Seen,
},
{
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
details: [
{
type: 'member-remove' as const,
2022-07-08 20:46:25 +00:00
uuid: ourACI.toString(),
},
],
},
readStatus: ReadStatus.Read,
seenStatus: SeenStatus.Unseen,
},
],
members: [],
},
});
return;
}
log.info(
`respondToGroupV2Migration/${logId}: Upgrading group with migration event; no removed event`
);
await updateGroup({
conversation,
receivedAt,
sentAt,
updates: {
newAttributes: attributes,
groupChangeMessages: [
{
...getBasicMigrationBubble(),
readStatus: ReadStatus.Read,
seenStatus: SeenStatus.Seen,
},
],
members: [],
},
});
return;
}
throw secondError;
}
2020-11-20 17:30:45 +00:00
} else {
throw error;
}
}
if (!firstGroupState) {
throw new Error(
`respondToGroupV2Migration/${logId}: Couldn't get a first group state!`
);
}
const groupState = decryptGroupState(
firstGroupState,
attributes.secretParams,
logId
);
const { newAttributes, newProfileKeys } = await applyGroupState({
2020-11-20 17:30:45 +00:00
group: attributes,
groupState,
});
// Generate notifications into the timeline
const groupChangeMessages: Array<GroupChangeMessageType> = [];
groupChangeMessages.push({
...buildMigrationBubble(previousGroupV1MembersIds, newAttributes),
readStatus: ReadStatus.Read,
seenStatus: SeenStatus.Seen,
});
2020-11-20 17:30:45 +00:00
const areWeInvited = (newAttributes.pendingMembersV2 || []).some(
2022-07-08 20:46:25 +00:00
item => item.uuid === ourACI.toString()
);
const areWeMember = (newAttributes.membersV2 || []).some(
2022-07-08 20:46:25 +00:00
item => item.uuid === ourACI.toString()
);
2020-11-20 17:30:45 +00:00
if (!areWeInvited && !areWeMember) {
// Add a message to the timeline saying the user was removed. This shouldn't happen.
2020-11-20 17:30:45 +00:00
groupChangeMessages.push({
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
details: [
{
type: 'member-remove' as const,
2022-07-08 20:46:25 +00:00
uuid: ourACI.toString(),
2020-11-20 17:30:45 +00:00
},
],
},
readStatus: ReadStatus.Read,
seenStatus: SeenStatus.Unseen,
2020-11-20 17:30:45 +00:00
});
}
// This buffer ensures that all migration-related messages are sorted above
// any initiating message. We need to do this because groupChangeMessages are
// already sorted via updates to sentAt inside of updateGroup().
const SORT_BUFFER = 1000;
await updateGroup({
conversation,
receivedAt,
sentAt: sentAt ? sentAt - SORT_BUFFER : undefined,
updates: {
newAttributes,
groupChangeMessages,
members: profileKeysToMembers(newProfileKeys),
2020-11-20 17:30:45 +00:00
},
});
if (window.storage.blocked.isGroupBlocked(previousGroupV1Id)) {
window.storage.blocked.addBlockedGroup(groupId);
2020-11-20 17:30:45 +00:00
}
// Save these most recent updates to conversation
updateConversation(conversation.attributes);
// Finally, check for any changes to the group since its initial creation using normal
// group update codepaths.
await maybeUpdateGroup({
conversation,
groupChange,
2020-11-20 17:30:45 +00:00
newRevision,
receivedAt,
sentAt,
});
}
2020-09-09 02:25:05 +00:00
// Fetching and applying group changes
type MaybeUpdatePropsType = Readonly<{
conversation: ConversationModel;
2020-09-09 02:25:05 +00:00
newRevision?: number;
receivedAt?: number;
sentAt?: number;
2020-09-09 02:25:05 +00:00
dropInitialJoinMessage?: boolean;
force?: boolean;
groupChange?: WrappedGroupChangeType;
}>;
2020-09-09 02:25:05 +00:00
2022-11-16 20:18:02 +00:00
const FIVE_MINUTES = 5 * MINUTE;
2021-05-07 20:07:24 +00:00
2020-09-11 19:37:01 +00:00
export async function waitThenMaybeUpdateGroup(
options: MaybeUpdatePropsType,
{ viaFirstStorageSync = false } = {}
2020-09-11 19:37:01 +00:00
): Promise<void> {
const { conversation } = options;
if (conversation.isBlocked()) {
log.info(
`waitThenMaybeUpdateGroup: Group ${conversation.idForLogging()} is blocked, returning early`
);
return;
}
2020-09-09 02:25:05 +00:00
// First wait to process all incoming messages on the websocket
await window.waitForEmptyEventQueue();
// Then make sure we haven't fetched this group too recently
2021-05-07 20:07:24 +00:00
const { lastSuccessfulGroupFetch = 0 } = conversation;
if (
!options.force &&
isMoreRecentThan(lastSuccessfulGroupFetch, FIVE_MINUTES)
) {
2021-05-07 20:07:24 +00:00
const waitTime = lastSuccessfulGroupFetch + FIVE_MINUTES - Date.now();
log.info(
2021-05-07 20:07:24 +00:00
`waitThenMaybeUpdateGroup/${conversation.idForLogging()}: group update ` +
`was fetched recently, skipping for ${waitTime}ms`
);
return;
}
// Then wait to process all outstanding messages for this conversation
await conversation.queueJob('waitThenMaybeUpdateGroup', async () => {
2020-09-09 02:25:05 +00:00
try {
// And finally try to update the group
await maybeUpdateGroup(options, { viaFirstStorageSync });
2021-05-07 20:07:24 +00:00
conversation.lastSuccessfulGroupFetch = Date.now();
2020-09-09 02:25:05 +00:00
} catch (error) {
log.error(
2020-09-09 02:25:05 +00:00
`waitThenMaybeUpdateGroup/${conversation.idForLogging()}: maybeUpdateGroup failure:`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
}
});
}
export async function maybeUpdateGroup(
{
conversation,
dropInitialJoinMessage,
groupChange,
newRevision,
receivedAt,
sentAt,
}: MaybeUpdatePropsType,
{ viaFirstStorageSync = false } = {}
): Promise<void> {
2020-09-09 02:25:05 +00:00
const logId = conversation.idForLogging();
try {
// Ensure we have the credentials we need before attempting GroupsV2 operations
await maybeFetchNewCredentials();
2020-10-06 17:06:34 +00:00
const updates = await getGroupUpdates({
2020-09-09 02:25:05 +00:00
group: conversation.attributes,
serverPublicParamsBase64: window.getServerPublicParams(),
newRevision,
groupChange,
2020-09-09 02:25:05 +00:00
dropInitialJoinMessage,
});
await updateGroup(
{ conversation, receivedAt, sentAt, updates },
{ viaFirstStorageSync }
);
2020-09-09 02:25:05 +00:00
} catch (error) {
log.error(
2020-09-09 02:25:05 +00:00
`maybeUpdateGroup/${logId}: Failed to update group:`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
throw error;
}
}
async function updateGroup(
{
conversation,
receivedAt,
sentAt,
updates,
}: {
conversation: ConversationModel;
receivedAt?: number;
sentAt?: number;
updates: UpdatesResultType;
},
{ viaFirstStorageSync = false } = {}
): Promise<void> {
const logId = conversation.idForLogging();
2020-10-06 17:06:34 +00:00
const { newAttributes, groupChangeMessages, members } = updates;
2022-07-08 20:46:25 +00:00
const ourACI = window.textsecure.storage.user.getCheckedUuid(UUIDKind.ACI);
const ourPNI = window.textsecure.storage.user.getUuid(UUIDKind.PNI);
2020-10-06 17:06:34 +00:00
const startingRevision = conversation.get('revision');
const endingRevision = newAttributes.revision;
const wasMemberOrPending =
2022-07-08 20:46:25 +00:00
conversation.hasMember(ourACI) ||
conversation.isMemberPending(ourACI) ||
(ourPNI && conversation.isMemberPending(ourPNI));
const isMemberOrPending =
!newAttributes.left ||
2022-07-08 20:46:25 +00:00
newAttributes.pendingMembersV2?.some(
item =>
item.uuid === ourACI.toString() || item.uuid === ourPNI?.toString()
);
const isMemberOrPendingOrAwaitingApproval =
isMemberOrPending ||
2022-07-08 20:46:25 +00:00
newAttributes.pendingAdminApprovalV2?.some(
item => item.uuid === ourACI.toString()
);
const isInitialDataFetch =
!isNumber(startingRevision) && isNumber(endingRevision);
2020-10-06 17:06:34 +00:00
// Ensure that all generated messages are ordered properly.
// Before the provided timestamp so update messages appear before the
// initiating message, or after now().
const finalReceivedAt =
receivedAt || window.Signal.Util.incrementMessageCounter();
const initialSentAt = sentAt || Date.now();
2020-11-20 17:30:45 +00:00
// GroupV1 -> GroupV2 migration changes the groupId, and we need to update our id-based
// lookups if there's a change on that field.
const previousId = conversation.get('groupId');
const idChanged = previousId && previousId !== newAttributes.groupId;
2020-10-06 17:06:34 +00:00
// By updating activeAt we force this conversation into the left pane if this is the
// first time we've fetched data about it, and we were able to fetch its name. Nobody
// likes to see Unknown Group in the left pane. After first fetch, we rely on normal
// message activity (including group change messsages) to set the timestamp properly.
let activeAt = conversation.get('active_at') || null;
if (
!viaFirstStorageSync &&
isMemberOrPendingOrAwaitingApproval &&
isInitialDataFetch &&
newAttributes.name
) {
activeAt = initialSentAt;
}
2020-10-06 17:06:34 +00:00
// Save all synthetic messages describing group changes
let syntheticSentAt = initialSentAt - (groupChangeMessages.length + 1);
const timestamp = Date.now();
2020-10-06 17:06:34 +00:00
const changeMessagesToSave = groupChangeMessages.map(changeMessage => {
2020-11-20 17:30:45 +00:00
// We do this to preserve the order of the timeline. We only update sentAt to ensure
// that we don't stomp on messages received around the same time as the message
// which initiated this group fetch and in-conversation messages.
syntheticSentAt += 1;
2020-10-06 17:06:34 +00:00
return {
...changeMessage,
conversationId: conversation.id,
received_at: finalReceivedAt,
received_at_ms: syntheticSentAt,
2020-11-20 17:30:45 +00:00
sent_at: syntheticSentAt,
timestamp,
2020-10-06 17:06:34 +00:00
};
});
const contactsWithoutProfileKey = new Array<ConversationModel>();
// Capture profile key for each member in the group, if we don't have it yet
members.forEach(member => {
const contact = window.ConversationController.getOrCreate(
member.uuid,
'private'
);
if (
!isMe(contact.attributes) &&
member.profileKey &&
member.profileKey.length > 0 &&
contact.get('profileKey') !== member.profileKey
) {
contactsWithoutProfileKey.push(contact);
contact.setProfileKey(member.profileKey);
}
});
let profileFetches: Promise<Array<void>> | undefined;
if (contactsWithoutProfileKey.length !== 0) {
log.info(
`updateGroup/${logId}: fetching ` +
`${contactsWithoutProfileKey.length} missing profiles`
);
profileFetches = Promise.all(
contactsWithoutProfileKey.map(contact => contact.getProfiles())
);
}
if (changeMessagesToSave.length > 0) {
try {
await profileFetches;
} catch (error) {
log.error(
`updateGroup/${logId}: failed to fetch missing profiles`,
Errors.toLogFormat(error)
);
}
await appendChangeMessages(conversation, changeMessagesToSave);
2020-10-06 17:06:34 +00:00
}
// We update group membership last to ensure that all notifications are in place before
// the group updates happen on the model.
conversation.set({
...newAttributes,
active_at: activeAt,
temporaryMemberCount: !newAttributes.left
? undefined
: newAttributes.temporaryMemberCount,
});
if (idChanged) {
conversation.trigger('idUpdated', conversation, 'groupId', previousId);
}
// Save these most recent updates to conversation
await updateConversation(conversation.attributes);
// If we've been added by a blocked contact, then schedule a task to leave group
const justAdded = !wasMemberOrPending && isMemberOrPending;
const addedBy =
2022-07-08 20:46:25 +00:00
newAttributes.pendingMembersV2?.find(
item =>
item.uuid === ourACI.toString() || item.uuid === ourPNI?.toString()
)?.addedByUserId || newAttributes.addedBy;
if (justAdded && addedBy) {
const adder = window.ConversationController.get(addedBy);
if (adder && adder.isBlocked()) {
log.warn(
`updateGroup/${logId}: Added to group by blocked user ${adder.idForLogging()}. Scheduling group leave.`
);
// Wait for empty queue to make it more likely the group update succeeds
const waitThenLeave = async () => {
log.warn(`waitThenLeave/${logId}: Waiting for empty event queue.`);
await window.waitForEmptyEventQueue();
log.warn(
`waitThenLeave/${logId}: Empty event queue, starting group leave.`
);
await conversation.leaveGroupV2();
log.warn(`waitThenLeave/${logId}: Leave complete.`);
};
// Cannot await here, would infinitely block queue
waitThenLeave();
}
}
}
// Exported for testing
export function _mergeGroupChangeMessages(
first: MessageAttributesType | undefined,
second: MessageAttributesType
): MessageAttributesType | undefined {
if (!first) {
return undefined;
}
if (first.type !== 'group-v2-change' || second.type !== first.type) {
return undefined;
}
const { groupV2Change: firstChange } = first;
const { groupV2Change: secondChange } = second;
if (!firstChange || !secondChange) {
return undefined;
}
if (firstChange.details.length !== 1 && secondChange.details.length !== 1) {
return undefined;
}
const [firstDetail] = firstChange.details;
const [secondDetail] = secondChange.details;
let isApprovalPending: boolean;
if (secondDetail.type === 'admin-approval-add-one') {
isApprovalPending = true;
} else if (secondDetail.type === 'admin-approval-remove-one') {
isApprovalPending = false;
} else {
return undefined;
}
const { uuid } = secondDetail;
strictAssert(uuid, 'admin approval message should have uuid');
let updatedDetail;
// Member was previously added and is now removed
if (
!isApprovalPending &&
firstDetail.type === 'admin-approval-add-one' &&
firstDetail.uuid === uuid
) {
updatedDetail = {
type: 'admin-approval-bounce' as const,
uuid,
times: 1,
isApprovalPending,
};
// There is an existing bounce event - merge this one into it.
} else if (
firstDetail.type === 'admin-approval-bounce' &&
firstDetail.uuid === uuid &&
firstDetail.isApprovalPending === !isApprovalPending
) {
updatedDetail = {
type: 'admin-approval-bounce' as const,
uuid,
times: firstDetail.times + (isApprovalPending ? 0 : 1),
isApprovalPending,
};
} else {
return undefined;
}
return {
...first,
groupV2Change: {
...first.groupV2Change,
details: [updatedDetail],
},
};
}
// Exported for testing
export function _isGroupChangeMessageBounceable(
message: MessageAttributesType
): boolean {
if (message.type !== 'group-v2-change') {
return false;
}
const { groupV2Change } = message;
if (!groupV2Change) {
return false;
}
if (groupV2Change.details.length !== 1) {
return false;
}
const [first] = groupV2Change.details;
if (
first.type === 'admin-approval-add-one' ||
first.type === 'admin-approval-bounce'
) {
return true;
}
return false;
}
async function appendChangeMessages(
conversation: ConversationModel,
messages: ReadonlyArray<MessageAttributesType>
): Promise<void> {
const logId = conversation.idForLogging();
log.info(
`appendChangeMessages/${logId}: processing ${messages.length} messages`
);
2022-07-08 20:46:25 +00:00
const ourACI = window.textsecure.storage.user.getCheckedUuid(UUIDKind.ACI);
let lastMessage = await dataInterface.getLastConversationMessage({
conversationId: conversation.id,
});
if (lastMessage && !_isGroupChangeMessageBounceable(lastMessage)) {
lastMessage = undefined;
}
const mergedMessages = [];
let previousMessage = lastMessage;
for (const message of messages) {
const merged = _mergeGroupChangeMessages(previousMessage, message);
if (!merged) {
if (previousMessage && previousMessage !== lastMessage) {
mergedMessages.push(previousMessage);
}
previousMessage = message;
continue;
}
previousMessage = merged;
log.info(
`appendChangeMessages/${logId}: merged ${message.id} into ${merged.id}`
);
}
if (previousMessage && previousMessage !== lastMessage) {
mergedMessages.push(previousMessage);
}
// Update existing message
if (lastMessage && mergedMessages[0]?.id === lastMessage?.id) {
const [first, ...rest] = mergedMessages;
strictAssert(first !== undefined, 'First message must be there');
log.info(`appendChangeMessages/${logId}: updating ${first.id}`);
await dataInterface.saveMessage(first, {
2022-07-08 20:46:25 +00:00
ourUuid: ourACI.toString(),
// We don't use forceSave here because this is an update of existing
// message.
});
log.info(
`appendChangeMessages/${logId}: saving ${rest.length} new messages`
);
await dataInterface.saveMessages(rest, {
2022-07-08 20:46:25 +00:00
ourUuid: ourACI.toString(),
forceSave: true,
});
} else {
log.info(
`appendChangeMessages/${logId}: saving ${mergedMessages.length} new messages`
);
await dataInterface.saveMessages(mergedMessages, {
2022-07-08 20:46:25 +00:00
ourUuid: ourACI.toString(),
forceSave: true,
});
}
let newMessages = 0;
for (const changeMessage of mergedMessages) {
const existing = window.MessageController.getById(changeMessage.id);
// Update existing message
if (existing) {
strictAssert(
changeMessage.id === lastMessage?.id,
'Should only update group change that was already in the database'
);
existing.set(changeMessage);
continue;
}
const model = new window.Whisper.Message(changeMessage);
window.MessageController.register(model.id, model);
conversation.trigger('newmessage', model);
newMessages += 1;
}
// We updated the message, but didn't add new ones - refresh left pane
if (!newMessages && mergedMessages.length > 0) {
await conversation.updateLastMessage();
conversation.updateUnread();
}
2020-10-06 17:06:34 +00:00
}
type GetGroupUpdatesType = Readonly<{
dropInitialJoinMessage?: boolean;
group: ConversationAttributesType;
serverPublicParamsBase64: string;
newRevision?: number;
groupChange?: WrappedGroupChangeType;
}>;
2020-09-09 02:25:05 +00:00
async function getGroupUpdates({
dropInitialJoinMessage,
group,
serverPublicParamsBase64,
newRevision,
groupChange: wrappedGroupChange,
}: GetGroupUpdatesType): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
2020-09-09 02:25:05 +00:00
log.info(`getGroupUpdates/${logId}: Starting...`);
2020-09-09 02:25:05 +00:00
const currentRevision = group.revision;
const isFirstFetch = !isNumber(group.revision);
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
2020-09-09 02:25:05 +00:00
2020-10-06 17:06:34 +00:00
const isInitialCreationMessage = isFirstFetch && newRevision === 0;
const weAreAwaitingApproval = (group.pendingAdminApprovalV2 || []).find(
2022-07-08 20:46:25 +00:00
item => item.uuid === ourACI.toString()
);
2020-10-06 17:06:34 +00:00
const isOneVersionUp =
isNumber(currentRevision) &&
isNumber(newRevision) &&
newRevision === currentRevision + 1;
2020-09-09 02:25:05 +00:00
if (
window.GV2_ENABLE_SINGLE_CHANGE_PROCESSING &&
wrappedGroupChange &&
2020-10-06 17:06:34 +00:00
isNumber(newRevision) &&
(isInitialCreationMessage || weAreAwaitingApproval || isOneVersionUp)
2020-09-09 02:25:05 +00:00
) {
log.info(`getGroupUpdates/${logId}: Processing just one change`);
const groupChangeBuffer = Bytes.fromBase64(wrappedGroupChange.base64);
2021-06-22 14:46:42 +00:00
const groupChange = Proto.GroupChange.decode(groupChangeBuffer);
const isChangeSupported =
!isNumber(groupChange.changeEpoch) ||
groupChange.changeEpoch <= SUPPORTED_CHANGE_EPOCH;
if (isChangeSupported) {
if (!wrappedGroupChange.isTrusted) {
strictAssert(
groupChange.serverSignature && groupChange.actions,
'Server signature must be present in untrusted group change'
);
try {
verifyNotarySignature(
serverPublicParamsBase64,
groupChange.actions,
groupChange.serverSignature
);
} catch (error) {
log.warn(
`getGroupUpdates/${logId}: verifyNotarySignature failed, ` +
'dropping the message',
Errors.toLogFormat(error)
);
return {
newAttributes: group,
groupChangeMessages: [],
members: [],
};
}
}
return updateGroupViaSingleChange({
group,
newRevision,
groupChange,
});
}
log.info(
`getGroupUpdates/${logId}: Failing over; group change unsupported`
);
2020-09-09 02:25:05 +00:00
}
if (
(!isFirstFetch || isNumber(newRevision)) &&
window.GV2_ENABLE_CHANGE_PROCESSING
) {
2020-09-09 02:25:05 +00:00
try {
return await updateGroupViaLogs({
2020-09-09 02:25:05 +00:00
group,
newRevision,
});
} catch (error) {
const nextStep = isFirstFetch
? `fetching logs since ${newRevision}`
: 'fetching full state';
2020-09-09 02:25:05 +00:00
if (error.code === TEMPORAL_AUTH_REJECTED_CODE) {
// We will fail over to the updateGroupViaState call below
log.info(
`getGroupUpdates/${logId}: Temporal credential failure, now ${nextStep}`
2020-09-09 02:25:05 +00:00
);
} else if (error.code === GROUP_ACCESS_DENIED_CODE) {
// We will fail over to the updateGroupViaState call below
log.info(
`getGroupUpdates/${logId}: Log access denied, now ${nextStep}`
2020-09-09 02:25:05 +00:00
);
} else {
throw error;
}
}
}
if (window.GV2_ENABLE_STATE_PROCESSING) {
try {
return await updateGroupViaState({
dropInitialJoinMessage,
group,
});
} catch (error) {
if (error.code === TEMPORAL_AUTH_REJECTED_CODE) {
log.info(
`getGroupUpdates/${logId}: Temporal credential failure. Failing; we don't know if we have access or not.`
);
throw error;
} else if (error.code === GROUP_ACCESS_DENIED_CODE) {
// We will fail over to the updateGroupViaPreJoinInfo call below
log.info(
`getGroupUpdates/${logId}: Failed to get group state. Attempting to fetch pre-join information.`
);
} else {
throw error;
}
}
}
if (window.GV2_ENABLE_PRE_JOIN_FETCH) {
try {
return await updateGroupViaPreJoinInfo({
group,
});
} catch (error) {
if (error.code === GROUP_ACCESS_DENIED_CODE) {
return generateLeftGroupChanges(group);
}
if (error.code === GROUP_NONEXISTENT_CODE) {
return generateLeftGroupChanges(group);
}
// If we get another temporal failure, we'll fail and try again later.
throw error;
}
}
log.warn(
`getGroupUpdates/${logId}: No processing was legal! Returning empty changeset.`
);
return {
newAttributes: group,
groupChangeMessages: [],
members: [],
};
2020-09-09 02:25:05 +00:00
}
async function updateGroupViaPreJoinInfo({
2020-09-09 02:25:05 +00:00
group,
}: {
group: ConversationAttributesType;
}): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
2022-07-08 20:46:25 +00:00
const ourACI = window.textsecure.storage.user
.getCheckedUuid(UUIDKind.ACI)
.toString();
2020-09-09 02:25:05 +00:00
const { publicParams, secretParams } = group;
if (!secretParams) {
throw new Error(
'updateGroupViaPreJoinInfo: group was missing secretParams!'
);
}
if (!publicParams) {
throw new Error(
'updateGroupViaPreJoinInfo: group was missing publicParams!'
);
}
2020-09-09 02:25:05 +00:00
// No password, but if we're already pending approval, we can access this without it.
const inviteLinkPassword = undefined;
const preJoinInfo = await makeRequestWithTemporalRetry({
logId: `getPreJoinInfo/${logId}`,
publicParams,
secretParams,
request: (sender, options) =>
sender.getGroupFromLink(inviteLinkPassword, options),
});
const approvalRequired =
preJoinInfo.addFromInviteLink ===
Proto.AccessControl.AccessRequired.ADMINISTRATOR;
// If the group doesn't require approval to join via link, then we should never have
// gotten here.
if (!approvalRequired) {
return generateLeftGroupChanges(group);
}
const newAttributes: ConversationAttributesType = {
...group,
description: decryptGroupDescription(
preJoinInfo.descriptionBytes,
secretParams
),
name: decryptGroupTitle(preJoinInfo.title, secretParams),
members: [],
pendingMembersV2: [],
pendingAdminApprovalV2: [
{
2022-07-08 20:46:25 +00:00
uuid: ourACI,
timestamp: Date.now(),
},
],
revision: preJoinInfo.version,
temporaryMemberCount: preJoinInfo.memberCount || 1,
2020-09-09 02:25:05 +00:00
};
await applyNewAvatar(dropNull(preJoinInfo.avatar), newAttributes, logId);
2020-09-09 02:25:05 +00:00
return {
newAttributes,
groupChangeMessages: extractDiffs({
old: group,
current: newAttributes,
dropInitialJoinMessage: false,
}),
members: [],
};
}
async function updateGroupViaState({
dropInitialJoinMessage,
group,
}: {
dropInitialJoinMessage?: boolean;
group: ConversationAttributesType;
}): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
const { publicParams, secretParams } = group;
if (!secretParams) {
throw new Error('updateGroupViaState: group was missing secretParams!');
}
if (!publicParams) {
throw new Error('updateGroupViaState: group was missing publicParams!');
2020-09-09 02:25:05 +00:00
}
const groupState = await makeRequestWithTemporalRetry({
logId: `getGroup/${logId}`,
publicParams,
secretParams,
request: (sender, requestOptions) => sender.getGroup(requestOptions),
});
const decryptedGroupState = decryptGroupState(
groupState,
secretParams,
logId
);
const oldVersion = group.revision;
const newVersion = decryptedGroupState.version;
log.info(
`getCurrentGroupState/${logId}: Applying full group state, from version ${oldVersion} to ${newVersion}.`
);
const { newAttributes, newProfileKeys } = await applyGroupState({
group,
groupState: decryptedGroupState,
});
return {
newAttributes,
groupChangeMessages: extractDiffs({
old: group,
current: newAttributes,
dropInitialJoinMessage,
}),
members: profileKeysToMembers(newProfileKeys),
};
2020-09-09 02:25:05 +00:00
}
async function updateGroupViaSingleChange({
group,
groupChange,
newRevision,
}: {
group: ConversationAttributesType;
2021-06-22 14:46:42 +00:00
groupChange: Proto.IGroupChange;
newRevision: number;
}): Promise<UpdatesResultType> {
const wasInGroup = !group.left;
const result: UpdatesResultType = await integrateGroupChange({
group,
groupChange,
newRevision,
});
const nowInGroup = !result.newAttributes.left;
// If we were just added to the group (for example, via a join link), we go fetch the
// entire group state to make sure we're up to date.
if (!wasInGroup && nowInGroup) {
const { newAttributes, members } = await updateGroupViaState({
group: result.newAttributes,
});
// We discard any change events that come out of this full group fetch, but we do
// keep the final group attributes generated, as well as any new members.
return {
...result,
members: [...result.members, ...members],
newAttributes,
};
}
return result;
}
2020-09-09 02:25:05 +00:00
async function updateGroupViaLogs({
group,
newRevision,
}: {
group: ConversationAttributesType;
newRevision: number | undefined;
2020-09-09 02:25:05 +00:00
}): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
const { publicParams, secretParams } = group;
if (!publicParams) {
throw new Error('updateGroupViaLogs: group was missing publicParams!');
}
if (!secretParams) {
throw new Error('updateGroupViaLogs: group was missing secretParams!');
2020-09-09 02:25:05 +00:00
}
log.info(
`updateGroupViaLogs/${logId}: Getting group delta from ` +
`${group.revision ?? '?'} to ${newRevision ?? '?'} for group ` +
`groupv2(${group.groupId})...`
);
2020-09-09 02:25:05 +00:00
const currentRevision = group.revision;
let includeFirstState = true;
2020-09-09 02:25:05 +00:00
// The range is inclusive so make sure that we always request the revision
// that we are currently at since we might want the latest full state in
// `integrateGroupChanges`.
let revisionToFetch = isNumber(currentRevision) ? currentRevision : undefined;
let response;
const changes: Array<Proto.IGroupChanges> = [];
do {
// eslint-disable-next-line no-await-in-loop
response = await makeRequestWithTemporalRetry({
logId: `getGroupLog/${logId}`,
publicParams,
secretParams,
2022-07-08 20:46:25 +00:00
// eslint-disable-next-line no-loop-func
request: (sender, requestOptions) =>
sender.getGroupLog(
{
startVersion: revisionToFetch,
includeFirstState,
includeLastState: true,
maxSupportedChangeEpoch: SUPPORTED_CHANGE_EPOCH,
},
requestOptions
),
});
changes.push(response.changes);
if (response.end) {
revisionToFetch = response.end + 1;
2020-09-09 02:25:05 +00:00
}
includeFirstState = false;
} while (
response.end &&
(newRevision === undefined || response.end < newRevision)
);
// Would be nice to cache the unused groupChanges here, to reduce server roundtrips
return integrateGroupChanges({
changes,
group,
newRevision,
});
2020-09-09 02:25:05 +00:00
}
async function generateLeftGroupChanges(
2020-09-09 02:25:05 +00:00
group: ConversationAttributesType
): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
log.info(`generateLeftGroupChanges/${logId}: Starting...`);
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI).toString();
const ourPNI = window.storage.user.getCheckedUuid(UUIDKind.PNI)?.toString();
const { masterKey, groupInviteLinkPassword } = group;
let { revision } = group;
try {
if (masterKey && groupInviteLinkPassword) {
log.info(
`generateLeftGroupChanges/${logId}: Have invite link. Attempting to fetch latest revision with it.`
);
const preJoinInfo = await getPreJoinGroupInfo(
groupInviteLinkPassword,
masterKey
);
revision = preJoinInfo.version;
}
} catch (error) {
log.warn(
'generateLeftGroupChanges: Failed to fetch latest revision via group link. Code:',
error.code
);
}
2020-09-09 02:25:05 +00:00
const newAttributes: ConversationAttributesType = {
...group,
addedBy: undefined,
2022-07-08 20:46:25 +00:00
membersV2: (group.membersV2 || []).filter(member => member.uuid !== ourACI),
pendingMembersV2: (group.pendingMembersV2 || []).filter(
2022-07-08 20:46:25 +00:00
member => member.uuid !== ourACI && member.uuid !== ourPNI
),
pendingAdminApprovalV2: (group.pendingAdminApprovalV2 || []).filter(
2022-07-08 20:46:25 +00:00
member => member.uuid !== ourACI
),
2020-09-09 02:25:05 +00:00
left: true,
revision,
2020-09-09 02:25:05 +00:00
};
return {
newAttributes,
groupChangeMessages: extractDiffs({
current: newAttributes,
old: group,
}),
2020-09-09 02:25:05 +00:00
members: [],
};
}
function getGroupCredentials({
authCredentialBase64,
groupPublicParamsBase64,
groupSecretParamsBase64,
serverPublicParamsBase64,
}: {
authCredentialBase64: string;
groupPublicParamsBase64: string;
groupSecretParamsBase64: string;
serverPublicParamsBase64: string;
}): GroupCredentialsType {
const authOperations = getClientZkAuthOperations(serverPublicParamsBase64);
const presentation = getAuthCredentialPresentation(
authOperations,
authCredentialBase64,
groupSecretParamsBase64
);
return {
2021-06-22 14:46:42 +00:00
groupPublicParamsHex: Bytes.toHex(
Bytes.fromBase64(groupPublicParamsBase64)
2020-09-09 02:25:05 +00:00
),
2021-06-22 14:46:42 +00:00
authCredentialPresentationHex: Bytes.toHex(presentation),
2020-09-09 02:25:05 +00:00
};
}
async function integrateGroupChanges({
group,
newRevision,
changes,
}: {
group: ConversationAttributesType;
newRevision: number | undefined;
2021-06-22 14:46:42 +00:00
changes: Array<Proto.IGroupChanges>;
2020-09-09 02:25:05 +00:00
}): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
2020-09-09 02:25:05 +00:00
let attributes = group;
const finalMessages: Array<Array<GroupChangeMessageType>> = [];
const finalMembers: Array<Array<MemberType>> = [];
2020-09-09 02:25:05 +00:00
const imax = changes.length;
for (let i = 0; i < imax; i += 1) {
const { groupChanges } = changes[i];
if (!groupChanges) {
continue;
}
const jmax = groupChanges.length;
for (let j = 0; j < jmax; j += 1) {
const changeState = groupChanges[j];
2020-10-06 17:06:34 +00:00
const { groupChange, groupState } = changeState;
2020-09-09 02:25:05 +00:00
if (!groupChange && !groupState) {
log.warn(
2020-10-06 17:06:34 +00:00
'integrateGroupChanges: item had neither groupState nor groupChange. Skipping.'
);
2020-09-09 02:25:05 +00:00
continue;
}
try {
const {
newAttributes,
groupChangeMessages,
members,
2020-09-11 19:37:01 +00:00
// eslint-disable-next-line no-await-in-loop
2020-09-09 02:25:05 +00:00
} = await integrateGroupChange({
group: attributes,
newRevision,
2021-06-22 14:46:42 +00:00
groupChange: dropNull(groupChange),
groupState: dropNull(groupState),
2020-09-09 02:25:05 +00:00
});
attributes = newAttributes;
finalMessages.push(groupChangeMessages);
finalMembers.push(members);
} catch (error) {
log.error(
2020-11-20 17:30:45 +00:00
`integrateGroupChanges/${logId}: Failed to apply change log, continuing to apply remaining change logs.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
}
}
}
// If this is our first fetch, we will collapse this down to one set of messages
const isFirstFetch = !isNumber(group.revision);
if (isFirstFetch) {
// The first array in finalMessages is from the first revision we could process. It
// should contain a message about how we joined the group.
const joinMessages = finalMessages[0];
const alreadyHaveJoinMessage = joinMessages && joinMessages.length > 0;
// There have been other changes since that first revision, so we generate diffs for
// the whole of the change since then, likely without the initial join message.
const otherMessages = extractDiffs({
old: group,
current: attributes,
dropInitialJoinMessage: alreadyHaveJoinMessage,
});
const groupChangeMessages = alreadyHaveJoinMessage
? [joinMessages[0], ...otherMessages]
: otherMessages;
return {
newAttributes: attributes,
groupChangeMessages,
members: flatten(finalMembers),
};
}
return {
newAttributes: attributes,
groupChangeMessages: flatten(finalMessages),
members: flatten(finalMembers),
};
}
async function integrateGroupChange({
group,
groupChange,
2020-10-06 17:06:34 +00:00
groupState,
2020-09-09 02:25:05 +00:00
newRevision,
}: {
group: ConversationAttributesType;
2021-06-22 14:46:42 +00:00
groupChange?: Proto.IGroupChange;
groupState?: Proto.IGroup;
newRevision: number | undefined;
2020-09-09 02:25:05 +00:00
}): Promise<UpdatesResultType> {
const logId = idForLogging(group.groupId);
2020-09-09 02:25:05 +00:00
if (!group.secretParams) {
2020-10-06 17:06:34 +00:00
throw new Error(
`integrateGroupChange/${logId}: Group was missing secretParams!`
);
2020-09-09 02:25:05 +00:00
}
if (!groupChange && !groupState) {
throw new Error(
`integrateGroupChange/${logId}: Neither groupChange nor groupState received!`
);
2020-09-09 02:25:05 +00:00
}
2020-10-06 17:06:34 +00:00
const isFirstFetch = !isNumber(group.revision);
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
const ourPNI = window.storage.user.getUuid(UUIDKind.PNI);
const weAreAwaitingApproval = (group.pendingAdminApprovalV2 || []).find(
2022-07-08 20:46:25 +00:00
item =>
item.uuid === ourACI.toString() ||
(ourPNI && item.uuid === ourPNI.toString())
);
// These need to be populated from the groupChange. But we might not get one!
let isChangeSupported = false;
let isSameVersion = false;
let isMoreThanOneVersionUp = false;
2021-06-22 14:46:42 +00:00
let groupChangeActions: undefined | Proto.GroupChange.IActions;
let decryptedChangeActions: undefined | DecryptedGroupChangeActions;
2021-10-26 22:59:08 +00:00
let sourceUuid: undefined | UUIDStringType;
if (groupChange) {
2021-06-22 14:46:42 +00:00
groupChangeActions = Proto.GroupChange.Actions.decode(
2021-09-24 00:49:05 +00:00
groupChange.actions || new Uint8Array(0)
);
// Version is higher that what we have in the incoming message
if (
groupChangeActions.version &&
newRevision !== undefined &&
groupChangeActions.version > newRevision
) {
log.info(
`integrateGroupChange/${logId}: Skipping ` +
`${groupChangeActions.version}, newRevision is ${newRevision}`
);
return {
newAttributes: group,
groupChangeMessages: [],
members: [],
};
}
decryptedChangeActions = decryptGroupChange(
groupChangeActions,
group.secretParams,
logId
);
2021-06-22 14:46:42 +00:00
strictAssert(
decryptedChangeActions !== undefined,
'Should have decrypted group actions'
);
2021-10-26 22:59:08 +00:00
({ sourceUuid } = decryptedChangeActions);
2021-06-22 14:46:42 +00:00
strictAssert(sourceUuid, 'Should have source UUID');
isChangeSupported =
!isNumber(groupChange.changeEpoch) ||
groupChange.changeEpoch <= SUPPORTED_CHANGE_EPOCH;
// Version is lower or the same as what we currently have
if (group.revision !== undefined && groupChangeActions.version) {
if (groupChangeActions.version < group.revision) {
log.info(
`integrateGroupChange/${logId}: Skipping stale version` +
`${groupChangeActions.version}, current ` +
`revision is ${group.revision}`
);
return {
newAttributes: group,
groupChangeMessages: [],
members: [],
};
}
if (groupChangeActions.version === group.revision) {
isSameVersion = true;
} else if (
2022-07-08 20:46:25 +00:00
groupChangeActions.version !== group.revision + 1 ||
(!isNumber(group.revision) && groupChangeActions.version > 0)
) {
isMoreThanOneVersionUp = true;
}
}
}
let attributes = group;
const aggregatedChangeMessages = [];
const aggregatedMembers = [];
const canApplyChange =
groupChange &&
isChangeSupported &&
!isSameVersion &&
!isFirstFetch &&
(!isMoreThanOneVersionUp || weAreAwaitingApproval);
// Apply the change first
if (canApplyChange) {
if (!sourceUuid || !groupChangeActions || !decryptedChangeActions) {
throw new Error(
`integrateGroupChange/${logId}: Missing necessary information that should have come from group actions`
);
}
log.info(
`integrateGroupChange/${logId}: Applying group change actions, ` +
`from version ${group.revision} to ${groupChangeActions.version}`
);
const { newAttributes, newProfileKeys } = await applyGroupChange({
group,
actions: decryptedChangeActions,
sourceUuid,
});
const groupChangeMessages = extractDiffs({
old: attributes,
current: newAttributes,
sourceUuid,
});
attributes = newAttributes;
aggregatedChangeMessages.push(groupChangeMessages);
aggregatedMembers.push(profileKeysToMembers(newProfileKeys));
}
// Apply the group state afterwards to verify that we didn't miss anything
if (groupState) {
log.info(
`integrateGroupChange/${logId}: Applying full group state, ` +
`from version ${group.revision} to ${groupState.version}`,
{
isChangePresent: Boolean(groupChange),
isChangeSupported,
isFirstFetch,
isSameVersion,
isMoreThanOneVersionUp,
weAreAwaitingApproval,
}
2020-10-06 17:06:34 +00:00
);
const decryptedGroupState = decryptGroupState(
groupState,
group.secretParams,
logId
);
const { newAttributes, newProfileKeys } = await applyGroupState({
group: attributes,
2020-10-06 17:06:34 +00:00
groupState: decryptedGroupState,
2021-10-26 22:59:08 +00:00
sourceUuid: isFirstFetch ? sourceUuid : undefined,
2020-10-06 17:06:34 +00:00
});
const groupChangeMessages = extractDiffs({
old: attributes,
current: newAttributes,
sourceUuid: isFirstFetch ? sourceUuid : undefined,
});
2020-10-06 17:06:34 +00:00
const newMembers = profileKeysToMembers(newProfileKeys);
2022-04-11 21:31:38 +00:00
if (
canApplyChange &&
(groupChangeMessages.length !== 0 || newMembers.length !== 0)
) {
assertDev(
groupChangeMessages.length === 0,
'Fallback group state processing should not kick in'
);
2020-10-06 17:06:34 +00:00
log.warn(
`integrateGroupChange/${logId}: local state was different from ` +
'the remote final state. ' +
`Got ${groupChangeMessages.length} change messages, and ` +
`${newMembers.length} updated members`
);
}
attributes = newAttributes;
aggregatedChangeMessages.push(groupChangeMessages);
aggregatedMembers.push(newMembers);
} else {
strictAssert(
canApplyChange,
`integrateGroupChange/${logId}: No group state, but we can't apply changes!`
);
}
2020-09-09 02:25:05 +00:00
return {
newAttributes: attributes,
groupChangeMessages: aggregatedChangeMessages.flat(),
members: aggregatedMembers.flat(),
2020-09-09 02:25:05 +00:00
};
}
function extractDiffs({
current,
dropInitialJoinMessage,
old,
2021-10-26 22:59:08 +00:00
sourceUuid,
2020-09-09 02:25:05 +00:00
}: {
current: ConversationAttributesType;
dropInitialJoinMessage?: boolean;
old: ConversationAttributesType;
2021-10-26 22:59:08 +00:00
sourceUuid?: UUIDStringType;
}): Array<GroupChangeMessageType> {
const logId = idForLogging(old.groupId);
2020-09-09 02:25:05 +00:00
const details: Array<GroupV2ChangeDetailType> = [];
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI);
const ourPNI = window.storage.user.getUuid(UUIDKind.PNI);
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
2020-10-06 17:06:34 +00:00
2020-09-09 02:25:05 +00:00
let areWeInGroup = false;
2022-07-08 20:46:25 +00:00
let uuidKindInvitedToGroup: UUIDKind | undefined;
let areWePendingApproval = false;
2020-10-06 17:06:34 +00:00
let whoInvitedUsUserId = null;
2020-09-09 02:25:05 +00:00
// access control
2020-09-09 02:25:05 +00:00
if (
current.accessControl &&
old.accessControl &&
old.accessControl.attributes !== undefined &&
old.accessControl.attributes !== current.accessControl.attributes
2020-09-09 02:25:05 +00:00
) {
details.push({
type: 'access-attributes',
newPrivilege: current.accessControl.attributes,
});
}
if (
current.accessControl &&
old.accessControl &&
old.accessControl.members !== undefined &&
old.accessControl.members !== current.accessControl.members
2020-09-09 02:25:05 +00:00
) {
details.push({
type: 'access-members',
newPrivilege: current.accessControl.members,
});
}
const linkPreviouslyEnabled = isAccessControlEnabled(
old.accessControl?.addFromInviteLink
);
const linkCurrentlyEnabled = isAccessControlEnabled(
current.accessControl?.addFromInviteLink
);
if (!linkPreviouslyEnabled && linkCurrentlyEnabled) {
details.push({
type: 'group-link-add',
privilege: current.accessControl?.addFromInviteLink || ACCESS_ENUM.ANY,
});
} else if (linkPreviouslyEnabled && !linkCurrentlyEnabled) {
details.push({
type: 'group-link-remove',
});
} else if (
linkPreviouslyEnabled &&
linkCurrentlyEnabled &&
old.accessControl?.addFromInviteLink !==
current.accessControl?.addFromInviteLink
) {
details.push({
type: 'access-invite-link',
newPrivilege: current.accessControl?.addFromInviteLink || ACCESS_ENUM.ANY,
});
}
// avatar
2020-09-09 02:25:05 +00:00
if (
Boolean(old.avatar) !== Boolean(current.avatar) ||
old.avatar?.hash !== current.avatar?.hash
) {
details.push({
type: 'avatar',
removed: !current.avatar,
});
}
// name
2020-09-09 02:25:05 +00:00
if (old.name !== current.name) {
details.push({
type: 'title',
newTitle: current.name,
});
}
// groupInviteLinkPassword
// Note: we only capture link resets here. Enable/disable are controlled by the
// accessControl.addFromInviteLink
if (
old.groupInviteLinkPassword &&
current.groupInviteLinkPassword &&
old.groupInviteLinkPassword !== current.groupInviteLinkPassword
) {
details.push({
type: 'group-link-reset',
});
}
2021-06-02 00:24:28 +00:00
// description
if (old.description !== current.description) {
details.push({
type: 'description',
removed: !current.description,
description: current.description,
2021-06-02 00:24:28 +00:00
});
}
2020-09-09 02:25:05 +00:00
// No disappearing message timer check here - see below
// membersV2
2021-10-26 22:59:08 +00:00
const oldMemberLookup = new Map<UUIDStringType, GroupV2MemberType>(
(old.membersV2 || []).map(member => [member.uuid, member])
);
2021-10-26 22:59:08 +00:00
const oldPendingMemberLookup = new Map<
UUIDStringType,
GroupV2PendingMemberType
>((old.pendingMembersV2 || []).map(member => [member.uuid, member]));
const oldPendingAdminApprovalLookup = new Map<
UUIDStringType,
GroupV2PendingAdminApprovalType
>((old.pendingAdminApprovalV2 || []).map(member => [member.uuid, member]));
2022-07-08 20:46:25 +00:00
const currentPendingMemberSet = new Set<UUIDStringType>(
(current.pendingMembersV2 || []).map(member => member.uuid)
);
2020-09-09 02:25:05 +00:00
(current.membersV2 || []).forEach(currentMember => {
2021-10-26 22:59:08 +00:00
const { uuid } = currentMember;
2022-07-08 20:46:25 +00:00
const isUs = uuid === ourACI.toString();
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
if (isUs) {
2020-09-09 02:25:05 +00:00
areWeInGroup = true;
}
2021-10-26 22:59:08 +00:00
const oldMember = oldMemberLookup.get(uuid);
2020-09-09 02:25:05 +00:00
if (!oldMember) {
2022-07-08 20:46:25 +00:00
let pendingMember = oldPendingMemberLookup.get(uuid);
if (isUs && ourPNI && !pendingMember) {
pendingMember = oldPendingMemberLookup.get(ourPNI.toString());
}
if (pendingMember) {
2020-09-09 02:25:05 +00:00
details.push({
type: 'member-add-from-invite',
2021-10-26 22:59:08 +00:00
uuid,
2020-09-09 02:25:05 +00:00
inviter: pendingMember.addedByUserId,
});
} else if (currentMember.joinedFromLink) {
details.push({
type: 'member-add-from-link',
2021-10-26 22:59:08 +00:00
uuid,
});
} else if (currentMember.approvedByAdmin) {
details.push({
type: 'member-add-from-admin-approval',
2021-10-26 22:59:08 +00:00
uuid,
});
2020-09-09 02:25:05 +00:00
} else {
details.push({
type: 'member-add',
2021-10-26 22:59:08 +00:00
uuid,
2020-09-09 02:25:05 +00:00
});
}
} else if (oldMember.role !== currentMember.role) {
details.push({
type: 'member-privilege',
2021-10-26 22:59:08 +00:00
uuid,
2020-09-09 02:25:05 +00:00
newPrivilege: currentMember.role,
});
}
// We don't want to generate an admin-approval-remove event for this newly-added
// member. But we don't know for sure if this is an admin approval; for that we
// consulted the approvedByAdmin flag saved on the member.
2021-10-26 22:59:08 +00:00
oldPendingAdminApprovalLookup.delete(uuid);
// If we capture a pending remove here, it's an 'accept invitation', and we don't
// want to generate a pending-remove event for it
2021-10-26 22:59:08 +00:00
oldPendingMemberLookup.delete(uuid);
2020-09-09 02:25:05 +00:00
// This deletion makes it easier to capture removals
2021-10-26 22:59:08 +00:00
oldMemberLookup.delete(uuid);
2022-07-08 20:46:25 +00:00
// Our ACI just joined (wasn't a member before) and our PNI disappeared
// from the invite list. Treat this as a promotion from PNI to ACI and
// pretend that the PNI wasn't pending so that we won't generate a
// pending-add-one notification below.
if (
isUs &&
ourPNI &&
!oldMember &&
oldPendingMemberLookup.has(ourPNI.toString()) &&
!currentPendingMemberSet.has(ourPNI.toString())
) {
oldPendingMemberLookup.delete(ourPNI.toString());
}
2020-09-09 02:25:05 +00:00
});
2021-10-26 22:59:08 +00:00
const removedMemberIds = Array.from(oldMemberLookup.keys());
removedMemberIds.forEach(uuid => {
2020-09-09 02:25:05 +00:00
details.push({
type: 'member-remove',
2021-10-26 22:59:08 +00:00
uuid,
2020-09-09 02:25:05 +00:00
});
});
// pendingMembersV2
2021-10-26 22:59:08 +00:00
let lastPendingUuid: UUIDStringType | undefined;
let pendingCount = 0;
2020-09-09 02:25:05 +00:00
(current.pendingMembersV2 || []).forEach(currentPendingMember => {
2021-10-26 22:59:08 +00:00
const { uuid } = currentPendingMember;
const oldPendingMember = oldPendingMemberLookup.get(uuid);
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
if (uuid === ourACI.toString() || uuid === ourPNI?.toString()) {
if (uuid === ourACI.toString()) {
uuidKindInvitedToGroup = UUIDKind.ACI;
} else if (uuidKindInvitedToGroup === undefined) {
uuidKindInvitedToGroup = UUIDKind.PNI;
}
2020-10-06 17:06:34 +00:00
whoInvitedUsUserId = currentPendingMember.addedByUserId;
}
2020-09-09 02:25:05 +00:00
if (!oldPendingMember) {
2021-10-26 22:59:08 +00:00
lastPendingUuid = uuid;
pendingCount += 1;
2020-09-09 02:25:05 +00:00
}
// This deletion makes it easier to capture removals
2021-10-26 22:59:08 +00:00
oldPendingMemberLookup.delete(uuid);
2020-09-09 02:25:05 +00:00
});
if (pendingCount > 1) {
2020-09-09 02:25:05 +00:00
details.push({
type: 'pending-add-many',
count: pendingCount,
2020-09-09 02:25:05 +00:00
});
} else if (pendingCount === 1) {
2021-10-26 22:59:08 +00:00
if (lastPendingUuid) {
2020-09-09 02:25:05 +00:00
details.push({
type: 'pending-add-one',
2021-10-26 22:59:08 +00:00
uuid: lastPendingUuid,
2020-09-09 02:25:05 +00:00
});
} else {
log.warn(
`extractDiffs/${logId}: pendingCount was 1, no last conversationId available`
2020-09-09 02:25:05 +00:00
);
}
}
// Note: The only members left over here should be people who were moved from the
// pending list but also not added to the group at the same time.
2021-10-26 22:59:08 +00:00
const removedPendingMemberIds = Array.from(oldPendingMemberLookup.keys());
2020-09-09 02:25:05 +00:00
if (removedPendingMemberIds.length > 1) {
2021-10-26 22:59:08 +00:00
const firstUuid = removedPendingMemberIds[0];
const firstRemovedMember = oldPendingMemberLookup.get(firstUuid);
strictAssert(
firstRemovedMember !== undefined,
'First removed member not found'
);
2020-09-09 02:25:05 +00:00
const inviter = firstRemovedMember.addedByUserId;
const allSameInviter = removedPendingMemberIds.every(
2021-10-26 22:59:08 +00:00
id => oldPendingMemberLookup.get(id)?.addedByUserId === inviter
2020-09-09 02:25:05 +00:00
);
details.push({
type: 'pending-remove-many',
count: removedPendingMemberIds.length,
inviter: allSameInviter ? inviter : undefined,
});
} else if (removedPendingMemberIds.length === 1) {
2021-10-26 22:59:08 +00:00
const uuid = removedPendingMemberIds[0];
const removedMember = oldPendingMemberLookup.get(uuid);
strictAssert(removedMember !== undefined, 'Removed member not found');
2020-09-09 02:25:05 +00:00
details.push({
type: 'pending-remove-one',
2021-10-26 22:59:08 +00:00
uuid,
2020-09-09 02:25:05 +00:00
inviter: removedMember.addedByUserId,
});
}
// pendingAdminApprovalV2
(current.pendingAdminApprovalV2 || []).forEach(
currentPendingAdminAprovalMember => {
2021-10-26 22:59:08 +00:00
const { uuid } = currentPendingAdminAprovalMember;
const oldPendingMember = oldPendingAdminApprovalLookup.get(uuid);
2022-07-08 20:46:25 +00:00
if (uuid === ourACI.toString()) {
areWePendingApproval = true;
}
if (!oldPendingMember) {
details.push({
type: 'admin-approval-add-one',
2021-10-26 22:59:08 +00:00
uuid,
});
}
// This deletion makes it easier to capture removals
2021-10-26 22:59:08 +00:00
oldPendingAdminApprovalLookup.delete(uuid);
}
);
// Note: The only members left over here should be people who were moved from the
// pendingAdminApproval list but also not added to the group at the same time.
2021-10-26 22:59:08 +00:00
const removedPendingAdminApprovalIds = Array.from(
oldPendingAdminApprovalLookup.keys()
);
2021-10-26 22:59:08 +00:00
removedPendingAdminApprovalIds.forEach(uuid => {
details.push({
type: 'admin-approval-remove-one',
2021-10-26 22:59:08 +00:00
uuid,
});
});
2021-07-20 20:18:35 +00:00
// announcementsOnly
if (Boolean(old.announcementsOnly) !== Boolean(current.announcementsOnly)) {
2021-07-20 20:18:35 +00:00
details.push({
type: 'announcements-only',
announcementsOnly: Boolean(current.announcementsOnly),
});
}
// Note: currently no diff generated for bannedMembersV2 changes
// final processing
let message: GroupChangeMessageType | undefined;
let timerNotification: GroupChangeMessageType | undefined;
2020-09-09 02:25:05 +00:00
const firstUpdate = !isNumber(old.revision);
2022-07-08 20:46:25 +00:00
const isFromUs = ourACI.toString() === sourceUuid;
2020-09-09 02:25:05 +00:00
2020-10-06 17:06:34 +00:00
// Here we hardcode initial messages if this is our first time processing data this
// group. Ideally we can collapse it down to just one of: 'you were added',
// 'you were invited', or 'you created.'
2022-07-08 20:46:25 +00:00
if (firstUpdate && uuidKindInvitedToGroup !== undefined) {
// Note, we will add 'you were invited' to group even if dropInitialJoinMessage = true
2020-10-06 17:06:34 +00:00
message = {
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
2021-10-26 22:59:08 +00:00
from: whoInvitedUsUserId || sourceUuid,
2020-10-06 17:06:34 +00:00
details: [
{
type: 'pending-add-one',
2022-07-08 20:46:25 +00:00
uuid: window.storage.user
.getCheckedUuid(uuidKindInvitedToGroup)
.toString(),
2020-10-06 17:06:34 +00:00
},
],
},
readStatus: ReadStatus.Read,
seenStatus: isFromUs ? SeenStatus.Seen : SeenStatus.Unseen,
2020-10-06 17:06:34 +00:00
};
} else if (firstUpdate && areWePendingApproval) {
message = {
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
2022-07-08 20:46:25 +00:00
from: ourACI.toString(),
details: [
{
type: 'admin-approval-add-one',
2022-07-08 20:46:25 +00:00
uuid: ourACI.toString(),
},
],
},
};
} else if (firstUpdate && dropInitialJoinMessage) {
// None of the rest of the messages should be added if dropInitialJoinMessage = true
message = undefined;
} else if (
firstUpdate &&
current.revision === 0 &&
2022-07-08 20:46:25 +00:00
sourceUuid === ourACI.toString()
) {
2020-10-06 17:06:34 +00:00
message = {
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
2021-10-26 22:59:08 +00:00
from: sourceUuid,
2020-10-06 17:06:34 +00:00
details: [
{
type: 'create',
2020-10-06 17:06:34 +00:00
},
],
},
readStatus: ReadStatus.Read,
seenStatus: isFromUs ? SeenStatus.Seen : SeenStatus.Unseen,
2020-10-06 17:06:34 +00:00
};
2021-10-26 22:59:08 +00:00
} else if (firstUpdate && areWeInGroup) {
2020-09-09 02:25:05 +00:00
message = {
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
2021-10-26 22:59:08 +00:00
from: sourceUuid,
2020-09-09 02:25:05 +00:00
details: [
{
type: 'member-add',
2022-07-08 20:46:25 +00:00
uuid: ourACI.toString(),
2020-09-09 02:25:05 +00:00
},
],
},
readStatus: ReadStatus.Read,
seenStatus: isFromUs ? SeenStatus.Seen : SeenStatus.Unseen,
2020-09-09 02:25:05 +00:00
};
} else if (firstUpdate && current.revision === 0) {
2020-10-06 17:06:34 +00:00
message = {
...generateBasicMessage(),
type: 'group-v2-change',
groupV2Change: {
2021-10-26 22:59:08 +00:00
from: sourceUuid,
2020-10-06 17:06:34 +00:00
details: [
{
type: 'create',
},
],
},
readStatus: ReadStatus.Read,
seenStatus: isFromUs ? SeenStatus.Seen : SeenStatus.Unseen,
2020-10-06 17:06:34 +00:00
};
2020-09-09 02:25:05 +00:00
} else if (details.length > 0) {
message = {
...generateBasicMessage(),
type: 'group-v2-change',
sourceUuid,
groupV2Change: {
2021-10-26 22:59:08 +00:00
from: sourceUuid,
2020-09-09 02:25:05 +00:00
details,
},
readStatus: ReadStatus.Read,
seenStatus: isFromUs ? SeenStatus.Seen : SeenStatus.Unseen,
2020-09-09 02:25:05 +00:00
};
}
// This is checked differently, because it needs to be its own entry in the timeline,
// with its own icon, etc.
if (
// Turn on or turned off
Boolean(old.expireTimer) !== Boolean(current.expireTimer) ||
// Still on, but changed value
(Boolean(old.expireTimer) &&
Boolean(current.expireTimer) &&
old.expireTimer !== current.expireTimer)
) {
2022-11-16 20:18:02 +00:00
const expireTimer = current.expireTimer || DurationInSeconds.ZERO;
log.info(
`extractDiffs/${logId}: generating change notifcation for new ${expireTimer} timer`
);
2020-09-09 02:25:05 +00:00
timerNotification = {
...generateBasicMessage(),
type: 'timer-notification',
sourceUuid,
2021-06-22 14:46:42 +00:00
flags: Proto.DataMessage.Flags.EXPIRATION_TIMER_UPDATE,
2020-09-09 02:25:05 +00:00
expirationTimerUpdate: {
expireTimer,
2020-09-09 02:25:05 +00:00
sourceUuid,
},
};
}
const result = compact([message, timerNotification]);
log.info(
2020-09-09 02:25:05 +00:00
`extractDiffs/${logId} complete, generated ${result.length} change messages`
);
return result;
}
function profileKeysToMembers(items: Array<GroupChangeMemberType>) {
return items.map(item => ({
2021-06-22 14:46:42 +00:00
profileKey: Bytes.toBase64(item.profileKey),
uuid: item.uuid,
2020-09-09 02:25:05 +00:00
}));
}
type GroupChangeMemberType = {
2021-06-22 14:46:42 +00:00
profileKey: Uint8Array;
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2020-09-09 02:25:05 +00:00
};
type GroupApplyResultType = {
2020-09-09 02:25:05 +00:00
newAttributes: ConversationAttributesType;
newProfileKeys: Array<GroupChangeMemberType>;
};
async function applyGroupChange({
actions,
2020-10-06 17:06:34 +00:00
group,
2021-10-26 22:59:08 +00:00
sourceUuid,
2020-09-09 02:25:05 +00:00
}: {
2021-06-22 14:46:42 +00:00
actions: DecryptedGroupChangeActions;
2020-10-06 17:06:34 +00:00
group: ConversationAttributesType;
2021-10-26 22:59:08 +00:00
sourceUuid: UUIDStringType;
}): Promise<GroupApplyResultType> {
const logId = idForLogging(group.groupId);
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI).toString();
2020-10-06 17:06:34 +00:00
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2020-10-06 17:06:34 +00:00
2020-09-09 02:25:05 +00:00
const version = actions.version || 0;
2020-11-20 17:30:45 +00:00
const result = { ...group };
2020-09-09 02:25:05 +00:00
const newProfileKeys: Array<GroupChangeMemberType> = [];
2021-10-26 22:59:08 +00:00
const members: Record<UUIDStringType, GroupV2MemberType> = fromPairs(
(result.membersV2 || []).map(member => [member.uuid, member])
2020-09-09 02:25:05 +00:00
);
2021-11-11 22:43:05 +00:00
const pendingMembers: Record<UUIDStringType, GroupV2PendingMemberType> =
fromPairs(
(result.pendingMembersV2 || []).map(member => [member.uuid, member])
);
2021-10-26 22:59:08 +00:00
const pendingAdminApprovalMembers: Record<
UUIDStringType,
GroupV2PendingAdminApprovalType
> = fromPairs(
(result.pendingAdminApprovalV2 || []).map(member => [member.uuid, member])
);
2022-03-23 22:34:51 +00:00
const bannedMembers = new Map<UUIDStringType, GroupV2BannedMemberType>(
(result.bannedMembersV2 || []).map(member => [member.uuid, member])
);
2020-09-09 02:25:05 +00:00
// version?: number;
result.revision = version;
2021-06-22 14:46:42 +00:00
// addMembers?: Array<GroupChange.Actions.AddMemberAction>;
2020-09-11 19:37:01 +00:00
(actions.addMembers || []).forEach(addMember => {
2020-09-09 02:25:05 +00:00
const { added } = addMember;
2021-10-26 22:59:08 +00:00
if (!added || !added.userId) {
2020-09-09 02:25:05 +00:00
throw new Error('applyGroupChange: addMember.added is missing');
}
2021-10-26 22:59:08 +00:00
const addedUuid = UUID.cast(added.userId);
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (members[addedUuid]) {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to add member failed; already in members.`
);
return;
}
2021-10-26 22:59:08 +00:00
members[addedUuid] = {
uuid: addedUuid,
2020-09-09 02:25:05 +00:00
role: added.role || MEMBER_ROLE_ENUM.DEFAULT,
joinedAtVersion: version,
joinedFromLink: addMember.joinFromInviteLink || false,
2020-09-09 02:25:05 +00:00
};
2021-10-26 22:59:08 +00:00
if (pendingMembers[addedUuid]) {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Removing newly-added member from pendingMembers.`
);
2021-10-26 22:59:08 +00:00
delete pendingMembers[addedUuid];
2020-09-09 02:25:05 +00:00
}
2020-10-06 17:06:34 +00:00
// Capture who added us
2022-07-08 20:46:25 +00:00
if (ourACI && sourceUuid && addedUuid === ourACI) {
2021-10-26 22:59:08 +00:00
result.addedBy = sourceUuid;
2020-10-06 17:06:34 +00:00
}
2020-09-09 02:25:05 +00:00
if (added.profileKey) {
newProfileKeys.push({
profileKey: added.profileKey,
2021-10-26 22:59:08 +00:00
uuid: UUID.cast(added.userId),
2020-09-09 02:25:05 +00:00
});
}
});
2021-06-22 14:46:42 +00:00
// deleteMembers?: Array<GroupChange.Actions.DeleteMemberAction>;
2020-09-09 02:25:05 +00:00
(actions.deleteMembers || []).forEach(deleteMember => {
const { deletedUserId } = deleteMember;
if (!deletedUserId) {
throw new Error(
'applyGroupChange: deleteMember.deletedUserId is missing'
);
}
2021-10-26 22:59:08 +00:00
const deletedUuid = UUID.cast(deletedUserId);
if (members[deletedUuid]) {
delete members[deletedUuid];
2020-09-09 02:25:05 +00:00
} else {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to remove member failed; was not in members.`
);
}
});
2021-06-22 14:46:42 +00:00
// modifyMemberRoles?: Array<GroupChange.Actions.ModifyMemberRoleAction>;
2020-09-09 02:25:05 +00:00
(actions.modifyMemberRoles || []).forEach(modifyMemberRole => {
const { role, userId } = modifyMemberRole;
if (!role || !userId) {
throw new Error('applyGroupChange: modifyMemberRole had a missing value');
}
2021-10-26 22:59:08 +00:00
const userUuid = UUID.cast(userId);
if (members[userUuid]) {
members[userUuid] = {
...members[userUuid],
2020-09-09 02:25:05 +00:00
role,
};
} else {
throw new Error(
'applyGroupChange: modifyMemberRole tried to modify nonexistent member'
);
}
});
2020-09-11 19:37:01 +00:00
// modifyMemberProfileKeys?:
2021-06-22 14:46:42 +00:00
// Array<GroupChange.Actions.ModifyMemberProfileKeyAction>;
2020-09-09 02:25:05 +00:00
(actions.modifyMemberProfileKeys || []).forEach(modifyMemberProfileKey => {
const { profileKey, uuid } = modifyMemberProfileKey;
if (!profileKey || !uuid) {
throw new Error(
'applyGroupChange: modifyMemberProfileKey had a missing value'
);
}
newProfileKeys.push({
profileKey,
2021-10-26 22:59:08 +00:00
uuid: UUID.cast(uuid),
2020-09-09 02:25:05 +00:00
});
});
// addPendingMembers?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.AddMemberPendingProfileKeyAction
// >;
2020-09-09 02:25:05 +00:00
(actions.addPendingMembers || []).forEach(addPendingMember => {
const { added } = addPendingMember;
2021-10-26 22:59:08 +00:00
if (!added || !added.member || !added.member.userId) {
2020-09-09 02:25:05 +00:00
throw new Error(
'applyGroupChange: addPendingMembers had a missing value'
2020-09-09 02:25:05 +00:00
);
}
2021-10-26 22:59:08 +00:00
const addedUuid = UUID.cast(added.member.userId);
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (members[addedUuid]) {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to add pendingMember failed; was already in members.`
);
return;
}
2021-10-26 22:59:08 +00:00
if (pendingMembers[addedUuid]) {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to add pendingMember failed; was already in pendingMembers.`
);
return;
}
2021-10-26 22:59:08 +00:00
pendingMembers[addedUuid] = {
uuid: addedUuid,
addedByUserId: UUID.cast(added.addedByUserId),
2020-09-09 02:25:05 +00:00
timestamp: added.timestamp,
role: added.member.role || MEMBER_ROLE_ENUM.DEFAULT,
2020-09-09 02:25:05 +00:00
};
if (added.member && added.member.profileKey) {
newProfileKeys.push({
profileKey: added.member.profileKey,
2021-10-26 22:59:08 +00:00
uuid: addedUuid,
2020-09-09 02:25:05 +00:00
});
}
});
// deletePendingMembers?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.DeleteMemberPendingProfileKeyAction
// >;
2020-09-09 02:25:05 +00:00
(actions.deletePendingMembers || []).forEach(deletePendingMember => {
const { deletedUserId } = deletePendingMember;
if (!deletedUserId) {
throw new Error(
'applyGroupChange: deletePendingMember.deletedUserId is null!'
);
}
2021-10-26 22:59:08 +00:00
const deletedUuid = UUID.cast(deletedUserId);
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (pendingMembers[deletedUuid]) {
delete pendingMembers[deletedUuid];
2020-09-09 02:25:05 +00:00
} else {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to remove pendingMember failed; was not in pendingMembers.`
);
}
});
// promotePendingMembers?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.PromoteMemberPendingProfileKeyAction
// >;
2020-09-09 02:25:05 +00:00
(actions.promotePendingMembers || []).forEach(promotePendingMember => {
2021-10-26 22:59:08 +00:00
const { profileKey, uuid: rawUuid } = promotePendingMember;
if (!profileKey || !rawUuid) {
2020-09-09 02:25:05 +00:00
throw new Error(
'applyGroupChange: promotePendingMember had a missing value'
);
}
2021-10-26 22:59:08 +00:00
const uuid = UUID.cast(rawUuid);
const previousRecord = pendingMembers[uuid];
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (pendingMembers[uuid]) {
delete pendingMembers[uuid];
2020-09-09 02:25:05 +00:00
} else {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to promote pendingMember failed; was not in pendingMembers.`
);
}
2021-10-26 22:59:08 +00:00
if (members[uuid]) {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Attempt to promote pendingMember failed; was already in members.`
);
return;
}
2021-10-26 22:59:08 +00:00
members[uuid] = {
uuid,
2020-09-09 02:25:05 +00:00
joinedAtVersion: version,
role: previousRecord.role || MEMBER_ROLE_ENUM.DEFAULT,
2020-09-09 02:25:05 +00:00
};
newProfileKeys.push({
profileKey,
uuid,
});
});
2022-07-08 20:46:25 +00:00
// promoteMembersPendingPniAciProfileKey?: Array<
// GroupChange.Actions.PromoteMemberPendingPniAciProfileKeyAction
// >;
(actions.promoteMembersPendingPniAciProfileKey || []).forEach(
promotePendingMember => {
const { profileKey, aci, pni } = promotePendingMember;
if (!profileKey || !aci || !pni) {
throw new Error(
'applyGroupChange: promotePendingMember had a missing value'
);
}
const previousRecord = pendingMembers[pni];
if (pendingMembers[pni]) {
delete pendingMembers[pni];
} else {
log.warn(
`applyGroupChange/${logId}: Attempt to promote pendingMember failed; was not in pendingMembers.`
);
}
if (members[aci]) {
log.warn(
`applyGroupChange/${logId}: Attempt to promote pendingMember failed; was already in members.`
);
return;
}
members[aci] = {
uuid: aci,
joinedAtVersion: version,
role: previousRecord.role || MEMBER_ROLE_ENUM.DEFAULT,
};
newProfileKeys.push({
profileKey,
uuid: aci,
});
}
);
2021-06-22 14:46:42 +00:00
// modifyTitle?: GroupChange.Actions.ModifyTitleAction;
2020-09-09 02:25:05 +00:00
if (actions.modifyTitle) {
2020-09-11 19:37:01 +00:00
const { title } = actions.modifyTitle;
2020-09-09 02:25:05 +00:00
if (title && title.content === 'title') {
2022-06-17 22:33:46 +00:00
result.name = dropNull(title.title);
2020-09-09 02:25:05 +00:00
} else {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Clearing group title due to missing data.`
);
result.name = undefined;
}
}
2021-06-22 14:46:42 +00:00
// modifyAvatar?: GroupChange.Actions.ModifyAvatarAction;
2020-09-09 02:25:05 +00:00
if (actions.modifyAvatar) {
2020-09-11 19:37:01 +00:00
const { avatar } = actions.modifyAvatar;
2021-06-22 14:46:42 +00:00
await applyNewAvatar(dropNull(avatar), result, logId);
2020-09-09 02:25:05 +00:00
}
2020-09-11 19:37:01 +00:00
// modifyDisappearingMessagesTimer?:
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyDisappearingMessagesTimerAction;
2020-09-09 02:25:05 +00:00
if (actions.modifyDisappearingMessagesTimer) {
2021-06-22 14:46:42 +00:00
const disappearingMessagesTimer: Proto.GroupAttributeBlob | undefined =
2020-09-09 02:25:05 +00:00
actions.modifyDisappearingMessagesTimer.timer;
if (
disappearingMessagesTimer &&
disappearingMessagesTimer.content === 'disappearingMessagesDuration'
) {
2022-11-16 20:18:02 +00:00
const duration = disappearingMessagesTimer.disappearingMessagesDuration;
result.expireTimer =
duration == null ? undefined : DurationInSeconds.fromSeconds(duration);
2020-09-09 02:25:05 +00:00
} else {
log.warn(
2020-09-09 02:25:05 +00:00
`applyGroupChange/${logId}: Clearing group expireTimer due to missing data.`
);
result.expireTimer = undefined;
}
}
result.accessControl = result.accessControl || {
members: ACCESS_ENUM.MEMBER,
attributes: ACCESS_ENUM.MEMBER,
addFromInviteLink: ACCESS_ENUM.UNSATISFIABLE,
2020-09-09 02:25:05 +00:00
};
2020-09-11 19:37:01 +00:00
// modifyAttributesAccess?:
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyAttributesAccessControlAction;
2020-09-09 02:25:05 +00:00
if (actions.modifyAttributesAccess) {
result.accessControl = {
...result.accessControl,
attributes:
actions.modifyAttributesAccess.attributesAccess || ACCESS_ENUM.MEMBER,
};
}
2021-06-22 14:46:42 +00:00
// modifyMemberAccess?: GroupChange.Actions.ModifyMembersAccessControlAction;
2020-09-09 02:25:05 +00:00
if (actions.modifyMemberAccess) {
result.accessControl = {
...result.accessControl,
2020-09-10 20:06:26 +00:00
members: actions.modifyMemberAccess.membersAccess || ACCESS_ENUM.MEMBER,
2020-09-09 02:25:05 +00:00
};
}
// modifyAddFromInviteLinkAccess?:
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyAddFromInviteLinkAccessControlAction;
if (actions.modifyAddFromInviteLinkAccess) {
result.accessControl = {
...result.accessControl,
addFromInviteLink:
actions.modifyAddFromInviteLinkAccess.addFromInviteLinkAccess ||
ACCESS_ENUM.UNSATISFIABLE,
};
}
// addMemberPendingAdminApprovals?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.AddMemberPendingAdminApprovalAction
// >;
(actions.addMemberPendingAdminApprovals || []).forEach(
pendingAdminApproval => {
const { added } = pendingAdminApproval;
if (!added) {
throw new Error(
'applyGroupChange: modifyMemberProfileKey had a missing value'
);
}
2021-10-26 22:59:08 +00:00
const addedUuid = UUID.cast(added.userId);
2021-10-26 22:59:08 +00:00
if (members[addedUuid]) {
log.warn(
`applyGroupChange/${logId}: Attempt to add pending admin approval failed; was already in members.`
);
return;
}
2021-10-26 22:59:08 +00:00
if (pendingMembers[addedUuid]) {
log.warn(
`applyGroupChange/${logId}: Attempt to add pending admin approval failed; was already in pendingMembers.`
);
return;
}
2021-10-26 22:59:08 +00:00
if (pendingAdminApprovalMembers[addedUuid]) {
log.warn(
`applyGroupChange/${logId}: Attempt to add pending admin approval failed; was already in pendingAdminApprovalMembers.`
);
return;
}
2021-10-26 22:59:08 +00:00
pendingAdminApprovalMembers[addedUuid] = {
uuid: addedUuid,
timestamp: added.timestamp,
};
if (added.profileKey) {
newProfileKeys.push({
profileKey: added.profileKey,
2021-10-26 22:59:08 +00:00
uuid: addedUuid,
});
}
}
);
// deleteMemberPendingAdminApprovals?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.DeleteMemberPendingAdminApprovalAction
// >;
(actions.deleteMemberPendingAdminApprovals || []).forEach(
deleteAdminApproval => {
const { deletedUserId } = deleteAdminApproval;
if (!deletedUserId) {
throw new Error(
'applyGroupChange: deleteAdminApproval.deletedUserId is null!'
);
}
2021-10-26 22:59:08 +00:00
const deletedUuid = UUID.cast(deletedUserId);
2021-10-26 22:59:08 +00:00
if (pendingAdminApprovalMembers[deletedUuid]) {
delete pendingAdminApprovalMembers[deletedUuid];
} else {
log.warn(
`applyGroupChange/${logId}: Attempt to remove pendingAdminApproval failed; was not in pendingAdminApprovalMembers.`
);
}
}
);
// promoteMemberPendingAdminApprovals?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.PromoteMemberPendingAdminApprovalAction
// >;
(actions.promoteMemberPendingAdminApprovals || []).forEach(
promoteAdminApproval => {
const { userId, role } = promoteAdminApproval;
if (!userId) {
throw new Error(
'applyGroupChange: promoteAdminApproval had a missing value'
);
}
2021-10-26 22:59:08 +00:00
const userUuid = UUID.cast(userId);
2021-10-26 22:59:08 +00:00
if (pendingAdminApprovalMembers[userUuid]) {
delete pendingAdminApprovalMembers[userUuid];
} else {
log.warn(
`applyGroupChange/${logId}: Attempt to promote pendingAdminApproval failed; was not in pendingAdminApprovalMembers.`
);
}
2021-10-26 22:59:08 +00:00
if (pendingMembers[userUuid]) {
delete pendingAdminApprovalMembers[userUuid];
log.warn(
`applyGroupChange/${logId}: Deleted pendingAdminApproval from pendingMembers.`
);
}
2021-10-26 22:59:08 +00:00
if (members[userUuid]) {
log.warn(
`applyGroupChange/${logId}: Attempt to promote pendingMember failed; was already in members.`
);
return;
}
2021-10-26 22:59:08 +00:00
members[userUuid] = {
uuid: userUuid,
joinedAtVersion: version,
role: role || MEMBER_ROLE_ENUM.DEFAULT,
approvedByAdmin: true,
};
}
);
2021-06-22 14:46:42 +00:00
// modifyInviteLinkPassword?: GroupChange.Actions.ModifyInviteLinkPasswordAction;
if (actions.modifyInviteLinkPassword) {
const { inviteLinkPassword } = actions.modifyInviteLinkPassword;
if (inviteLinkPassword) {
result.groupInviteLinkPassword = inviteLinkPassword;
} else {
result.groupInviteLinkPassword = undefined;
}
}
2021-06-22 14:46:42 +00:00
// modifyDescription?: GroupChange.Actions.ModifyDescriptionAction;
2021-06-02 00:24:28 +00:00
if (actions.modifyDescription) {
const { descriptionBytes } = actions.modifyDescription;
if (descriptionBytes && descriptionBytes.content === 'descriptionText') {
2022-06-17 22:33:46 +00:00
result.description = dropNull(descriptionBytes.descriptionText);
2021-06-02 00:24:28 +00:00
} else {
log.warn(
2021-06-02 00:24:28 +00:00
`applyGroupChange/${logId}: Clearing group description due to missing data.`
);
result.description = undefined;
}
}
if (actions.modifyAnnouncementsOnly) {
const { announcementsOnly } = actions.modifyAnnouncementsOnly;
result.announcementsOnly = announcementsOnly;
}
if (actions.addMembersBanned && actions.addMembersBanned.length > 0) {
2022-03-23 22:34:51 +00:00
actions.addMembersBanned.forEach(member => {
if (bannedMembers.has(member.uuid)) {
log.warn(
`applyGroupChange/${logId}: Attempt to add banned member failed; was already in banned list.`
);
return;
}
2022-03-23 22:34:51 +00:00
bannedMembers.set(member.uuid, member);
});
}
if (actions.deleteMembersBanned && actions.deleteMembersBanned.length > 0) {
actions.deleteMembersBanned.forEach(uuid => {
2022-03-23 22:34:51 +00:00
if (!bannedMembers.has(uuid)) {
log.warn(
`applyGroupChange/${logId}: Attempt to remove banned member failed; was not in banned list.`
);
return;
}
2022-03-23 22:34:51 +00:00
bannedMembers.delete(uuid);
});
}
2022-07-08 20:46:25 +00:00
if (ourACI) {
result.left = !members[ourACI];
2020-09-09 02:25:05 +00:00
}
if (result.left) {
result.addedBy = undefined;
}
2020-09-09 02:25:05 +00:00
// Go from lookups back to arrays
result.membersV2 = values(members);
result.pendingMembersV2 = values(pendingMembers);
result.pendingAdminApprovalV2 = values(pendingAdminApprovalMembers);
2022-03-23 22:34:51 +00:00
result.bannedMembersV2 = Array.from(bannedMembers.values());
2020-09-09 02:25:05 +00:00
return {
newAttributes: result,
newProfileKeys,
};
}
export async function decryptGroupAvatar(
avatarKey: string,
secretParamsBase64: string
2021-09-24 00:49:05 +00:00
): Promise<Uint8Array> {
const sender = window.textsecure.messaging;
if (!sender) {
throw new Error(
'decryptGroupAvatar: textsecure.messaging is not available!'
);
}
2021-09-24 00:49:05 +00:00
const ciphertext = await sender.getGroupAvatar(avatarKey);
const clientZkGroupCipher = getClientZkGroupCipher(secretParamsBase64);
const plaintext = decryptGroupBlob(clientZkGroupCipher, ciphertext);
2021-06-22 14:46:42 +00:00
const blob = Proto.GroupAttributeBlob.decode(plaintext);
if (blob.content !== 'avatar') {
throw new Error(
`decryptGroupAvatar: Returned blob had incorrect content: ${blob.content}`
);
}
2022-06-17 22:33:46 +00:00
const avatar = dropNull(blob.avatar);
if (!avatar) {
throw new Error('decryptGroupAvatar: Returned blob had no avatar set!');
}
return avatar;
}
2020-09-11 19:37:01 +00:00
// Ovewriting result.avatar as part of functionality
/* eslint-disable no-param-reassign */
export async function applyNewAvatar(
2020-09-09 02:25:05 +00:00
newAvatar: string | undefined,
result: Pick<ConversationAttributesType, 'avatar' | 'secretParams'>,
2020-09-09 02:25:05 +00:00
logId: string
): Promise<void> {
2020-09-09 02:25:05 +00:00
try {
// Avatar has been dropped
if (!newAvatar && result.avatar) {
await window.Signal.Migrations.deleteAttachmentData(result.avatar.path);
result.avatar = undefined;
}
// Group has avatar; has it changed?
if (newAvatar && (!result.avatar || result.avatar.url !== newAvatar)) {
if (!result.secretParams) {
throw new Error('applyNewAvatar: group was missing secretParams!');
}
const data = await decryptGroupAvatar(newAvatar, result.secretParams);
2021-09-24 00:49:05 +00:00
const hash = computeHash(data);
2020-09-09 02:25:05 +00:00
if (result.avatar?.hash === hash) {
log.info(
`applyNewAvatar/${logId}: Hash is the same, but url was different. Saving new url.`
2020-09-09 02:25:05 +00:00
);
result.avatar = {
...result.avatar,
2020-09-09 02:25:05 +00:00
url: newAvatar,
};
return;
2020-09-09 02:25:05 +00:00
}
if (result.avatar) {
await window.Signal.Migrations.deleteAttachmentData(result.avatar.path);
}
const path = await window.Signal.Migrations.writeNewAttachmentData(data);
result.avatar = {
url: newAvatar,
path,
hash,
};
2020-09-09 02:25:05 +00:00
}
} catch (error) {
log.warn(
2020-09-09 02:25:05 +00:00
`applyNewAvatar/${logId} Failed to handle avatar, clearing it`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
if (result.avatar && result.avatar.path) {
await window.Signal.Migrations.deleteAttachmentData(result.avatar.path);
}
result.avatar = undefined;
}
}
2020-09-11 19:37:01 +00:00
/* eslint-enable no-param-reassign */
2020-09-09 02:25:05 +00:00
2020-10-06 17:06:34 +00:00
async function applyGroupState({
group,
groupState,
2021-10-26 22:59:08 +00:00
sourceUuid,
2020-10-06 17:06:34 +00:00
}: {
group: ConversationAttributesType;
2021-06-22 14:46:42 +00:00
groupState: DecryptedGroupState;
2021-10-26 22:59:08 +00:00
sourceUuid?: UUIDStringType;
}): Promise<GroupApplyResultType> {
const logId = idForLogging(group.groupId);
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2020-09-09 02:25:05 +00:00
const version = groupState.version || 0;
2020-11-20 17:30:45 +00:00
const result = { ...group };
const newProfileKeys: Array<GroupChangeMemberType> = [];
2020-09-09 02:25:05 +00:00
// version
result.revision = version;
// title
// Note: During decryption, title becomes a GroupAttributeBlob
2020-09-11 19:37:01 +00:00
const { title } = groupState;
2020-09-09 02:25:05 +00:00
if (title && title.content === 'title') {
2022-06-17 22:33:46 +00:00
result.name = dropNull(title.title);
2020-09-09 02:25:05 +00:00
} else {
result.name = undefined;
}
// avatar
2021-06-22 14:46:42 +00:00
await applyNewAvatar(dropNull(groupState.avatar), result, logId);
2020-09-09 02:25:05 +00:00
// disappearingMessagesTimer
// Note: during decryption, disappearingMessageTimer becomes a GroupAttributeBlob
2020-09-11 19:37:01 +00:00
const { disappearingMessagesTimer } = groupState;
2020-09-09 02:25:05 +00:00
if (
disappearingMessagesTimer &&
disappearingMessagesTimer.content === 'disappearingMessagesDuration'
) {
2022-11-16 20:18:02 +00:00
const duration = disappearingMessagesTimer.disappearingMessagesDuration;
result.expireTimer =
duration == null ? undefined : DurationInSeconds.fromSeconds(duration);
2020-09-09 02:25:05 +00:00
} else {
result.expireTimer = undefined;
}
// accessControl
const { accessControl } = groupState;
result.accessControl = {
attributes:
(accessControl && accessControl.attributes) || ACCESS_ENUM.MEMBER,
members: (accessControl && accessControl.members) || ACCESS_ENUM.MEMBER,
addFromInviteLink:
(accessControl && accessControl.addFromInviteLink) ||
ACCESS_ENUM.UNSATISFIABLE,
2020-09-09 02:25:05 +00:00
};
// Optimization: we assume we have left the group unless we are found in members
result.left = true;
2022-07-08 20:46:25 +00:00
const ourACI = window.storage.user.getCheckedUuid(UUIDKind.ACI).toString();
2020-09-09 02:25:05 +00:00
// members
const wasPreviouslyAMember = (result.membersV2 || []).some(
2022-07-08 20:46:25 +00:00
item => item.uuid !== ourACI
);
2020-09-09 02:25:05 +00:00
if (groupState.members) {
2021-06-22 14:46:42 +00:00
result.membersV2 = groupState.members.map(member => {
2022-07-08 20:46:25 +00:00
if (member.userId === ourACI) {
2020-09-09 02:25:05 +00:00
result.left = false;
2020-10-06 17:06:34 +00:00
// Capture who added us if we were previously not in group
if (
2021-10-26 22:59:08 +00:00
sourceUuid &&
!wasPreviouslyAMember &&
isNumber(member.joinedAtVersion) &&
member.joinedAtVersion === version
2020-10-06 17:06:34 +00:00
) {
2021-10-26 22:59:08 +00:00
result.addedBy = sourceUuid;
2020-10-06 17:06:34 +00:00
}
2020-09-09 02:25:05 +00:00
}
if (!isValidRole(member.role)) {
throw new Error(
`applyGroupState: Member had invalid role ${member.role}`
);
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
if (member.profileKey) {
newProfileKeys.push({
profileKey: member.profileKey,
2021-10-26 22:59:08 +00:00
uuid: UUID.cast(member.userId),
2021-06-22 14:46:42 +00:00
});
}
2020-09-09 02:25:05 +00:00
return {
role: member.role || MEMBER_ROLE_ENUM.DEFAULT,
2020-09-09 02:25:05 +00:00
joinedAtVersion: member.joinedAtVersion || version,
2021-10-26 22:59:08 +00:00
uuid: UUID.cast(member.userId),
2020-09-09 02:25:05 +00:00
};
});
}
// membersPendingProfileKey
if (groupState.membersPendingProfileKey) {
result.pendingMembersV2 = groupState.membersPendingProfileKey.map(
2021-06-22 14:46:42 +00:00
member => {
2021-10-26 22:59:08 +00:00
if (!member.member || !member.member.userId) {
throw new Error(
'applyGroupState: Member pending profile key did not have an associated userId'
);
2020-09-09 02:25:05 +00:00
}
2021-10-26 22:59:08 +00:00
if (!member.addedByUserId) {
throw new Error(
'applyGroupState: Member pending profile key did not have an addedByUserID'
);
}
if (!isValidRole(member.member.role)) {
throw new Error(
`applyGroupState: Member pending profile key had invalid role ${member.member.role}`
);
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
if (member.member.profileKey) {
newProfileKeys.push({
profileKey: member.member.profileKey,
2021-10-26 22:59:08 +00:00
uuid: UUID.cast(member.member.userId),
2021-06-22 14:46:42 +00:00
});
}
2020-09-09 02:25:05 +00:00
return {
2021-10-26 22:59:08 +00:00
addedByUserId: UUID.cast(member.addedByUserId),
uuid: UUID.cast(member.member.userId),
2020-09-09 02:25:05 +00:00
timestamp: member.timestamp,
role: member.member.role || MEMBER_ROLE_ENUM.DEFAULT,
2020-09-09 02:25:05 +00:00
};
}
);
}
// membersPendingAdminApproval
if (groupState.membersPendingAdminApproval) {
result.pendingAdminApprovalV2 = groupState.membersPendingAdminApproval.map(
2021-06-22 14:46:42 +00:00
member => {
2022-02-09 18:34:24 +00:00
if (member.profileKey) {
newProfileKeys.push({
profileKey: member.profileKey,
uuid: UUID.cast(member.userId),
});
}
return {
2021-10-26 22:59:08 +00:00
uuid: UUID.cast(member.userId),
timestamp: member.timestamp,
};
}
);
}
// inviteLinkPassword
const { inviteLinkPassword } = groupState;
if (inviteLinkPassword) {
result.groupInviteLinkPassword = inviteLinkPassword;
} else {
result.groupInviteLinkPassword = undefined;
}
2021-06-02 00:24:28 +00:00
// descriptionBytes
const { descriptionBytes } = groupState;
if (descriptionBytes && descriptionBytes.content === 'descriptionText') {
2022-06-17 22:33:46 +00:00
result.description = dropNull(descriptionBytes.descriptionText);
2021-06-02 00:24:28 +00:00
} else {
result.description = undefined;
}
// announcementsOnly
result.announcementsOnly = groupState.announcementsOnly;
// membersBanned
result.bannedMembersV2 = groupState.membersBanned;
if (result.left) {
result.addedBy = undefined;
}
return {
newAttributes: result,
newProfileKeys,
};
2020-09-09 02:25:05 +00:00
}
function isValidRole(role?: number): role is number {
2021-06-22 14:46:42 +00:00
const MEMBER_ROLE_ENUM = Proto.Member.Role;
2020-09-09 02:25:05 +00:00
return (
role === MEMBER_ROLE_ENUM.ADMINISTRATOR || role === MEMBER_ROLE_ENUM.DEFAULT
);
}
function isValidAccess(access?: number): access is number {
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
2020-09-09 02:25:05 +00:00
return access === ACCESS_ENUM.ADMINISTRATOR || access === ACCESS_ENUM.MEMBER;
}
function isValidLinkAccess(access?: number): access is number {
2021-06-22 14:46:42 +00:00
const ACCESS_ENUM = Proto.AccessControl.AccessRequired;
return (
access === ACCESS_ENUM.UNKNOWN ||
access === ACCESS_ENUM.ANY ||
access === ACCESS_ENUM.ADMINISTRATOR ||
access === ACCESS_ENUM.UNSATISFIABLE
);
}
2021-06-22 14:46:42 +00:00
function isValidProfileKey(buffer?: Uint8Array): boolean {
return Boolean(buffer && buffer.length === 32);
2020-09-09 02:25:05 +00:00
}
2022-03-23 20:49:27 +00:00
function normalizeTimestamp(timestamp: Long | null | undefined): number {
if (!timestamp) {
2021-06-22 14:46:42 +00:00
return 0;
}
const asNumber = timestamp.toNumber();
const now = Date.now();
if (!asNumber || asNumber > now) {
return now;
}
return asNumber;
}
2021-06-22 14:46:42 +00:00
type DecryptedGroupChangeActions = {
version?: number;
2021-10-26 22:59:08 +00:00
sourceUuid?: UUIDStringType;
2021-06-22 14:46:42 +00:00
addMembers?: ReadonlyArray<{
added: DecryptedMember;
joinFromInviteLink: boolean;
}>;
deleteMembers?: ReadonlyArray<{
deletedUserId: string;
}>;
modifyMemberRoles?: ReadonlyArray<{
userId: string;
role: Proto.Member.Role;
}>;
modifyMemberProfileKeys?: ReadonlyArray<{
profileKey: Uint8Array;
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2021-06-22 14:46:42 +00:00
}>;
addPendingMembers?: ReadonlyArray<{
added: DecryptedMemberPendingProfileKey;
}>;
deletePendingMembers?: ReadonlyArray<{
deletedUserId: string;
}>;
promotePendingMembers?: ReadonlyArray<{
profileKey: Uint8Array;
2021-10-26 22:59:08 +00:00
uuid: UUIDStringType;
2021-06-22 14:46:42 +00:00
}>;
2022-07-08 20:46:25 +00:00
promoteMembersPendingPniAciProfileKey?: ReadonlyArray<{
profileKey: Uint8Array;
aci: UUIDStringType;
pni: UUIDStringType;
}>;
2021-06-22 14:46:42 +00:00
modifyTitle?: {
title?: Proto.GroupAttributeBlob;
};
modifyDisappearingMessagesTimer?: {
timer?: Proto.GroupAttributeBlob;
};
addMemberPendingAdminApprovals?: ReadonlyArray<{
added: DecryptedMemberPendingAdminApproval;
}>;
deleteMemberPendingAdminApprovals?: ReadonlyArray<{
deletedUserId: string;
}>;
promoteMemberPendingAdminApprovals?: ReadonlyArray<{
userId: string;
role: Proto.Member.Role;
}>;
modifyInviteLinkPassword?: {
inviteLinkPassword?: string;
};
modifyDescription?: {
descriptionBytes?: Proto.GroupAttributeBlob;
};
modifyAnnouncementsOnly?: {
announcementsOnly: boolean;
};
2022-03-23 22:34:51 +00:00
addMembersBanned?: ReadonlyArray<GroupV2BannedMemberType>;
deleteMembersBanned?: ReadonlyArray<UUIDStringType>;
2021-06-22 14:46:42 +00:00
} & Pick<
Proto.GroupChange.IActions,
| 'modifyAttributesAccess'
| 'modifyMemberAccess'
| 'modifyAddFromInviteLinkAccess'
| 'modifyAvatar'
>;
2020-09-09 02:25:05 +00:00
function decryptGroupChange(
2021-06-22 14:46:42 +00:00
actions: Readonly<Proto.GroupChange.IActions>,
2020-09-09 02:25:05 +00:00
groupSecretParams: string,
logId: string
2021-06-22 14:46:42 +00:00
): DecryptedGroupChangeActions {
const result: DecryptedGroupChangeActions = {
version: dropNull(actions.version),
};
2020-09-09 02:25:05 +00:00
const clientZkGroupCipher = getClientZkGroupCipher(groupSecretParams);
2021-06-22 14:46:42 +00:00
if (actions.sourceUuid && actions.sourceUuid.length !== 0) {
2020-09-09 02:25:05 +00:00
try {
2021-10-26 22:59:08 +00:00
result.sourceUuid = UUID.cast(
normalizeUuid(
decryptUuid(clientZkGroupCipher, actions.sourceUuid),
'actions.sourceUuid'
)
2020-09-09 02:25:05 +00:00
);
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt sourceUuid.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
}
2021-10-26 22:59:08 +00:00
if (!isValidUuid(result.sourceUuid)) {
log.warn(
2020-09-09 02:25:05 +00:00
`decryptGroupChange/${logId}: Invalid sourceUuid. Clearing sourceUuid.`
);
2021-06-22 14:46:42 +00:00
result.sourceUuid = undefined;
2020-09-09 02:25:05 +00:00
}
} else {
throw new Error('decryptGroupChange: Missing sourceUuid');
}
2021-06-22 14:46:42 +00:00
// addMembers?: Array<GroupChange.Actions.AddMemberAction>;
result.addMembers = compact(
(actions.addMembers || []).map(addMember => {
2021-06-22 14:46:42 +00:00
strictAssert(
addMember.added,
'decryptGroupChange: AddMember was missing added field!'
);
const decrypted = decryptMember(
clientZkGroupCipher,
addMember.added,
logId
);
if (!decrypted) {
return null;
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
return {
added: decrypted,
joinFromInviteLink: Boolean(addMember.joinFromInviteLink),
};
2020-09-09 02:25:05 +00:00
})
);
2021-06-22 14:46:42 +00:00
// deleteMembers?: Array<GroupChange.Actions.DeleteMemberAction>;
result.deleteMembers = compact(
(actions.deleteMembers || []).map(deleteMember => {
2021-06-22 14:46:42 +00:00
const { deletedUserId } = deleteMember;
strictAssert(
Bytes.isNotEmpty(deletedUserId),
'decryptGroupChange: deleteMember.deletedUserId was missing'
);
let userId: string;
try {
userId = normalizeUuid(
decryptUuid(clientZkGroupCipher, deletedUserId),
'actions.deleteMembers.deletedUserId'
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt deleteMembers.deletedUserId. Dropping member.`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return null;
2020-09-09 02:25:05 +00:00
}
2021-10-26 22:59:08 +00:00
if (!isValidUuid(userId)) {
log.warn(
2020-09-09 02:25:05 +00:00
`decryptGroupChange/${logId}: Dropping deleteMember due to invalid userId`
);
return null;
}
2021-06-22 14:46:42 +00:00
return { deletedUserId: userId };
2020-09-09 02:25:05 +00:00
})
);
2021-06-22 14:46:42 +00:00
// modifyMemberRoles?: Array<GroupChange.Actions.ModifyMemberRoleAction>;
result.modifyMemberRoles = compact(
(actions.modifyMemberRoles || []).map(modifyMember => {
2021-06-22 14:46:42 +00:00
strictAssert(
Bytes.isNotEmpty(modifyMember.userId),
'decryptGroupChange: modifyMemberRole.userId was missing'
);
let userId: string;
try {
userId = normalizeUuid(
decryptUuid(clientZkGroupCipher, modifyMember.userId),
'actions.modifyMemberRoles.userId'
);
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt modifyMemberRole.userId. Dropping member.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
return null;
2020-09-09 02:25:05 +00:00
}
2021-10-26 22:59:08 +00:00
if (!isValidUuid(userId)) {
log.warn(
2020-09-09 02:25:05 +00:00
`decryptGroupChange/${logId}: Dropping modifyMemberRole due to invalid userId`
);
return null;
}
2021-06-22 14:46:42 +00:00
const role = dropNull(modifyMember.role);
if (!isValidRole(role)) {
2020-09-09 02:25:05 +00:00
throw new Error(
`decryptGroupChange: modifyMemberRole had invalid role ${modifyMember.role}`
2020-09-09 02:25:05 +00:00
);
}
2021-06-22 14:46:42 +00:00
return {
role,
userId,
};
2020-09-09 02:25:05 +00:00
})
);
// modifyMemberProfileKeys?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyMemberProfileKeyAction
// >;
2021-06-22 14:46:42 +00:00
result.modifyMemberProfileKeys = compact(
(actions.modifyMemberProfileKeys || []).map(modifyMemberProfileKey => {
2022-07-08 20:46:25 +00:00
let { userId, profileKey: encryptedProfileKey } = modifyMemberProfileKey;
// TODO: DESKTOP-3816
if (Bytes.isEmpty(userId) || Bytes.isEmpty(encryptedProfileKey)) {
const { presentation } = modifyMemberProfileKey;
strictAssert(
Bytes.isNotEmpty(presentation),
'decryptGroupChange: modifyMemberProfileKeys.presentation was missing'
);
const decodedPresentation =
decodeProfileKeyCredentialPresentation(presentation);
({ userId, profileKey: encryptedProfileKey } = decodedPresentation);
}
2021-06-22 14:46:42 +00:00
strictAssert(
2022-07-08 20:46:25 +00:00
Bytes.isNotEmpty(userId),
'decryptGroupChange: modifyMemberProfileKeys.userId was missing'
2021-06-22 14:46:42 +00:00
);
2022-07-08 20:46:25 +00:00
strictAssert(
Bytes.isNotEmpty(encryptedProfileKey),
'decryptGroupChange: modifyMemberProfileKeys.profileKey was missing'
2021-06-22 14:46:42 +00:00
);
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
let uuid: UUIDStringType;
let profileKey: Uint8Array;
try {
uuid = normalizeUuid(
decryptUuid(clientZkGroupCipher, userId),
'actions.modifyMemberProfileKeys.userId'
2021-06-22 14:46:42 +00:00
);
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
profileKey = decryptProfileKey(
clientZkGroupCipher,
encryptedProfileKey,
uuid
);
} catch (error) {
log.warn(
2022-07-08 20:46:25 +00:00
`decryptGroupChange/${logId}: Unable to decrypt ` +
'modifyMemberProfileKeys.userId/profileKey. Dropping member.',
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return null;
}
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
if (!isValidProfileKey(profileKey)) {
2020-09-09 02:25:05 +00:00
throw new Error(
2021-06-22 14:46:42 +00:00
'decryptGroupChange: modifyMemberProfileKey had invalid profileKey'
2020-09-09 02:25:05 +00:00
);
}
2022-07-08 20:46:25 +00:00
return { uuid, profileKey };
2020-09-09 02:25:05 +00:00
})
);
// addPendingMembers?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.AddMemberPendingProfileKeyAction
// >;
2021-06-22 14:46:42 +00:00
result.addPendingMembers = compact(
(actions.addPendingMembers || []).map(addPendingMember => {
2021-06-22 14:46:42 +00:00
strictAssert(
addPendingMember.added,
2020-09-11 19:37:01 +00:00
'decryptGroupChange: addPendingMember was missing added field!'
);
2021-06-22 14:46:42 +00:00
const decrypted = decryptMemberPendingProfileKey(
clientZkGroupCipher,
addPendingMember.added,
logId
);
if (!decrypted) {
return null;
}
return {
added: decrypted,
};
2020-09-09 02:25:05 +00:00
})
);
// deletePendingMembers?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.DeleteMemberPendingProfileKeyAction
// >;
2021-06-22 14:46:42 +00:00
result.deletePendingMembers = compact(
(actions.deletePendingMembers || []).map(deletePendingMember => {
2021-06-22 14:46:42 +00:00
const { deletedUserId } = deletePendingMember;
strictAssert(
Bytes.isNotEmpty(deletedUserId),
'decryptGroupChange: deletePendingMembers.deletedUserId was missing'
);
let userId: string;
try {
userId = normalizeUuid(
decryptUuid(clientZkGroupCipher, deletedUserId),
'actions.deletePendingMembers.deletedUserId'
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt deletePendingMembers.deletedUserId. Dropping member.`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return null;
2020-09-09 02:25:05 +00:00
}
2021-10-26 22:59:08 +00:00
if (!isValidUuid(userId)) {
log.warn(
2020-09-09 02:25:05 +00:00
`decryptGroupChange/${logId}: Dropping deletePendingMember due to invalid deletedUserId`
);
return null;
}
2021-06-22 14:46:42 +00:00
return {
deletedUserId: userId,
};
2020-09-09 02:25:05 +00:00
})
);
// promotePendingMembers?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.PromoteMemberPendingProfileKeyAction
// >;
2021-06-22 14:46:42 +00:00
result.promotePendingMembers = compact(
(actions.promotePendingMembers || []).map(promotePendingMember => {
2022-07-08 20:46:25 +00:00
let { userId, profileKey: encryptedProfileKey } = promotePendingMember;
// TODO: DESKTOP-3816
if (Bytes.isEmpty(userId) || Bytes.isEmpty(encryptedProfileKey)) {
const { presentation } = promotePendingMember;
strictAssert(
Bytes.isNotEmpty(presentation),
'decryptGroupChange: promotePendingMember.presentation was missing'
);
const decodedPresentation =
decodeProfileKeyCredentialPresentation(presentation);
({ userId, profileKey: encryptedProfileKey } = decodedPresentation);
}
2021-06-22 14:46:42 +00:00
strictAssert(
2022-07-08 20:46:25 +00:00
Bytes.isNotEmpty(userId),
'decryptGroupChange: promotePendingMembers.userId was missing'
2021-06-22 14:46:42 +00:00
);
2022-07-08 20:46:25 +00:00
strictAssert(
Bytes.isNotEmpty(encryptedProfileKey),
'decryptGroupChange: promotePendingMembers.profileKey was missing'
2021-06-22 14:46:42 +00:00
);
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
let uuid: UUIDStringType;
let profileKey: Uint8Array;
try {
uuid = normalizeUuid(
decryptUuid(clientZkGroupCipher, userId),
'actions.promotePendingMembers.userId'
2021-06-22 14:46:42 +00:00
);
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
profileKey = decryptProfileKey(
clientZkGroupCipher,
encryptedProfileKey,
uuid
);
} catch (error) {
log.warn(
2022-07-08 20:46:25 +00:00
`decryptGroupChange/${logId}: Unable to decrypt ` +
'promotePendingMembers.userId/profileKey. Dropping member.',
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return null;
}
2020-09-09 02:25:05 +00:00
2022-07-08 20:46:25 +00:00
if (!isValidProfileKey(profileKey)) {
2020-09-09 02:25:05 +00:00
throw new Error(
2022-07-08 20:46:25 +00:00
'decryptGroupChange: promotePendingMembers had invalid profileKey'
2020-09-09 02:25:05 +00:00
);
}
2022-07-08 20:46:25 +00:00
return { uuid, profileKey };
2020-09-09 02:25:05 +00:00
})
);
2022-07-08 20:46:25 +00:00
// promoteMembersPendingPniAciProfileKey?: Array<
// GroupChange.Actions.PromoteMemberPendingPniAciProfileKeyAction
// >;
result.promoteMembersPendingPniAciProfileKey = compact(
(actions.promoteMembersPendingPniAciProfileKey || []).map(
promotePendingMember => {
strictAssert(
Bytes.isNotEmpty(promotePendingMember.userId),
'decryptGroupChange: ' +
'promoteMembersPendingPniAciProfileKey.userId was missing'
);
strictAssert(
Bytes.isNotEmpty(promotePendingMember.pni),
'decryptGroupChange: ' +
'promoteMembersPendingPniAciProfileKey.pni was missing'
);
strictAssert(
Bytes.isNotEmpty(promotePendingMember.profileKey),
'decryptGroupChange: ' +
'promoteMembersPendingPniAciProfileKey.profileKey was missing'
);
let userId: string;
let pni: string;
let profileKey: Uint8Array;
try {
userId = normalizeUuid(
decryptUuid(clientZkGroupCipher, promotePendingMember.userId),
'actions.promoteMembersPendingPniAciProfileKey.userId'
);
pni = normalizeUuid(
decryptUuid(clientZkGroupCipher, promotePendingMember.pni),
'actions.promoteMembersPendingPniAciProfileKey.pni'
);
profileKey = decryptProfileKey(
clientZkGroupCipher,
promotePendingMember.profileKey,
UUID.cast(userId)
);
} catch (error) {
log.warn(
`decryptGroupChange/${logId}: Unable to decrypt promoteMembersPendingPniAciProfileKey. Dropping member.`,
Errors.toLogFormat(error)
);
return null;
}
if (!isValidUuid(userId)) {
log.warn(
`decryptGroupChange/${logId}: Dropping ` +
'promoteMembersPendingPniAciProfileKey due to invalid ACI'
);
return null;
}
if (!isValidUuid(pni)) {
log.warn(
`decryptGroupChange/${logId}: Dropping ` +
'promoteMembersPendingPniAciProfileKey due to invalid PNI'
);
return null;
}
if (!isValidProfileKey(profileKey)) {
throw new Error(
'decryptGroupChange: promoteMembersPendingPniAciProfileKey ' +
'had invalid profileKey'
);
}
return {
aci: userId,
pni,
profileKey,
};
}
)
);
2021-06-22 14:46:42 +00:00
// modifyTitle?: GroupChange.Actions.ModifyTitleAction;
if (actions.modifyTitle) {
const { title } = actions.modifyTitle;
if (Bytes.isNotEmpty(title)) {
try {
result.modifyTitle = {
title: Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, title)
),
};
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt modifyTitle.title`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
}
} else {
result.modifyTitle = {};
2020-09-09 02:25:05 +00:00
}
}
2021-06-22 14:46:42 +00:00
// modifyAvatar?: GroupChange.Actions.ModifyAvatarAction;
2020-09-09 02:25:05 +00:00
// Note: decryption happens during application of the change, on download of the avatar
2021-06-22 14:46:42 +00:00
result.modifyAvatar = actions.modifyAvatar;
2020-09-09 02:25:05 +00:00
2020-09-11 19:37:01 +00:00
// modifyDisappearingMessagesTimer?:
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyDisappearingMessagesTimerAction;
if (actions.modifyDisappearingMessagesTimer) {
const { timer } = actions.modifyDisappearingMessagesTimer;
if (Bytes.isNotEmpty(timer)) {
try {
result.modifyDisappearingMessagesTimer = {
timer: Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, timer)
),
};
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt modifyDisappearingMessagesTimer.timer`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
}
} else {
result.modifyDisappearingMessagesTimer = {};
2020-09-09 02:25:05 +00:00
}
}
2020-09-11 19:37:01 +00:00
// modifyAttributesAccess?:
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyAttributesAccessControlAction;
if (actions.modifyAttributesAccess) {
const attributesAccess = dropNull(
actions.modifyAttributesAccess.attributesAccess
);
strictAssert(
isValidAccess(attributesAccess),
`decryptGroupChange: modifyAttributesAccess.attributesAccess was not valid: ${actions.modifyAttributesAccess.attributesAccess}`
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
result.modifyAttributesAccess = {
attributesAccess,
};
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
// modifyMemberAccess?: GroupChange.Actions.ModifyMembersAccessControlAction;
if (actions.modifyMemberAccess) {
const membersAccess = dropNull(actions.modifyMemberAccess.membersAccess);
strictAssert(
isValidAccess(membersAccess),
`decryptGroupChange: modifyMemberAccess.membersAccess was not valid: ${actions.modifyMemberAccess.membersAccess}`
);
2021-06-22 14:46:42 +00:00
result.modifyMemberAccess = {
membersAccess,
};
}
// modifyAddFromInviteLinkAccess?:
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.ModifyAddFromInviteLinkAccessControlAction;
if (actions.modifyAddFromInviteLinkAccess) {
const addFromInviteLinkAccess = dropNull(
actions.modifyAddFromInviteLinkAccess.addFromInviteLinkAccess
2021-06-22 14:46:42 +00:00
);
strictAssert(
isValidLinkAccess(addFromInviteLinkAccess),
`decryptGroupChange: modifyAddFromInviteLinkAccess.addFromInviteLinkAccess was not valid: ${actions.modifyAddFromInviteLinkAccess.addFromInviteLinkAccess}`
);
2021-06-22 14:46:42 +00:00
result.modifyAddFromInviteLinkAccess = {
addFromInviteLinkAccess,
};
}
// addMemberPendingAdminApprovals?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.AddMemberPendingAdminApprovalAction
// >;
2021-06-22 14:46:42 +00:00
result.addMemberPendingAdminApprovals = compact(
(actions.addMemberPendingAdminApprovals || []).map(
addPendingAdminApproval => {
2021-06-22 14:46:42 +00:00
const { added } = addPendingAdminApproval;
strictAssert(
added,
'decryptGroupChange: addPendingAdminApproval was missing added field!'
);
2021-06-22 14:46:42 +00:00
const decrypted = decryptMemberPendingAdminApproval(
clientZkGroupCipher,
added,
logId
);
if (!decrypted) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt addPendingAdminApproval.added. Dropping member.`
);
return null;
}
return { added: decrypted };
}
)
);
// deleteMemberPendingAdminApprovals?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.DeleteMemberPendingAdminApprovalAction
// >;
2021-06-22 14:46:42 +00:00
result.deleteMemberPendingAdminApprovals = compact(
(actions.deleteMemberPendingAdminApprovals || []).map(
deletePendingApproval => {
2021-06-22 14:46:42 +00:00
const { deletedUserId } = deletePendingApproval;
strictAssert(
Bytes.isNotEmpty(deletedUserId),
'decryptGroupChange: deletePendingApproval.deletedUserId was missing'
);
2021-06-22 14:46:42 +00:00
let userId: string;
try {
userId = normalizeUuid(
decryptUuid(clientZkGroupCipher, deletedUserId),
'actions.deleteMemberPendingAdminApprovals'
);
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt deletePendingApproval.deletedUserId. Dropping member.`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return null;
}
2021-10-26 22:59:08 +00:00
if (!isValidUuid(userId)) {
log.warn(
`decryptGroupChange/${logId}: Dropping deletePendingApproval due to invalid deletedUserId`
);
return null;
}
2021-06-22 14:46:42 +00:00
return { deletedUserId: userId };
}
)
);
// promoteMemberPendingAdminApprovals?: Array<
2021-06-22 14:46:42 +00:00
// GroupChange.Actions.PromoteMemberPendingAdminApprovalAction
// >;
2021-06-22 14:46:42 +00:00
result.promoteMemberPendingAdminApprovals = compact(
(actions.promoteMemberPendingAdminApprovals || []).map(
promoteAdminApproval => {
2021-06-22 14:46:42 +00:00
const { userId } = promoteAdminApproval;
strictAssert(
Bytes.isNotEmpty(userId),
'decryptGroupChange: promoteAdminApproval.userId was missing'
);
let decryptedUserId: string;
try {
decryptedUserId = normalizeUuid(
decryptUuid(clientZkGroupCipher, userId),
'actions.promoteMemberPendingAdminApprovals.userId'
);
2021-06-22 14:46:42 +00:00
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt promoteAdminApproval.userId. Dropping member.`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return null;
}
2021-06-22 14:46:42 +00:00
const role = dropNull(promoteAdminApproval.role);
if (!isValidRole(role)) {
throw new Error(
`decryptGroupChange: promoteAdminApproval had invalid role ${promoteAdminApproval.role}`
);
}
2021-06-22 14:46:42 +00:00
return { role, userId: decryptedUserId };
}
)
);
2021-06-22 14:46:42 +00:00
// modifyInviteLinkPassword?: GroupChange.Actions.ModifyInviteLinkPasswordAction;
if (actions.modifyInviteLinkPassword) {
const { inviteLinkPassword: password } = actions.modifyInviteLinkPassword;
if (Bytes.isNotEmpty(password)) {
result.modifyInviteLinkPassword = {
inviteLinkPassword: Bytes.toBase64(password),
};
} else {
result.modifyInviteLinkPassword = {};
}
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
// modifyDescription?: GroupChange.Actions.ModifyDescriptionAction;
if (actions.modifyDescription) {
const { descriptionBytes } = actions.modifyDescription;
if (Bytes.isNotEmpty(descriptionBytes)) {
try {
result.modifyDescription = {
descriptionBytes: Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, descriptionBytes)
),
};
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptGroupChange/${logId}: Unable to decrypt modifyDescription.descriptionBytes`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
}
} else {
result.modifyDescription = {};
2021-06-02 00:24:28 +00:00
}
}
// modifyAnnouncementsOnly
if (actions.modifyAnnouncementsOnly) {
const { announcementsOnly } = actions.modifyAnnouncementsOnly;
result.modifyAnnouncementsOnly = {
announcementsOnly: Boolean(announcementsOnly),
};
}
// addMembersBanned
if (actions.addMembersBanned && actions.addMembersBanned.length > 0) {
result.addMembersBanned = actions.addMembersBanned
.map(item => {
if (!item.added || !item.added.userId) {
log.warn(
`decryptGroupChange/${logId}: addMembersBanned had a blank entry`
);
return null;
}
2022-03-23 22:34:51 +00:00
const uuid = normalizeUuid(
decryptUuid(clientZkGroupCipher, item.added.userId),
'addMembersBanned.added.userId'
);
2022-03-23 22:34:51 +00:00
const timestamp = normalizeTimestamp(item.added.timestamp);
return { uuid, timestamp };
})
.filter(isNotNil);
}
// deleteMembersBanned
if (actions.deleteMembersBanned && actions.deleteMembersBanned.length > 0) {
result.deleteMembersBanned = actions.deleteMembersBanned
.map(item => {
if (!item.deletedUserId) {
log.warn(
`decryptGroupChange/${logId}: deleteMembersBanned had a blank entry`
);
return null;
}
return normalizeUuid(
decryptUuid(clientZkGroupCipher, item.deletedUserId),
'deleteMembersBanned.deletedUserId'
);
})
.filter(isNotNil);
}
2021-06-22 14:46:42 +00:00
return result;
2020-09-09 02:25:05 +00:00
}
export function decryptGroupTitle(
2021-06-22 14:46:42 +00:00
title: Uint8Array | undefined,
secretParams: string
): string | undefined {
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
2021-06-22 14:46:42 +00:00
if (!title || !title.length) {
return undefined;
}
const blob = Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, title)
);
2021-06-22 14:46:42 +00:00
if (blob && blob.content === 'title') {
2022-06-17 22:33:46 +00:00
return dropNull(blob.title);
}
return undefined;
}
2021-06-02 00:24:28 +00:00
export function decryptGroupDescription(
2021-06-22 14:46:42 +00:00
description: Uint8Array | undefined,
2021-06-02 00:24:28 +00:00
secretParams: string
): string | undefined {
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
2021-06-22 14:46:42 +00:00
if (!description || !description.length) {
2021-06-02 00:24:28 +00:00
return undefined;
}
2021-06-22 14:46:42 +00:00
const blob = Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, description)
2021-06-02 00:24:28 +00:00
);
if (blob && blob.content === 'descriptionText') {
2022-06-17 22:33:46 +00:00
return dropNull(blob.descriptionText);
2021-06-02 00:24:28 +00:00
}
return undefined;
}
2021-06-22 14:46:42 +00:00
type DecryptedGroupState = {
title?: Proto.GroupAttributeBlob;
disappearingMessagesTimer?: Proto.GroupAttributeBlob;
accessControl?: {
attributes: number;
members: number;
addFromInviteLink: number;
};
version?: number;
members?: ReadonlyArray<DecryptedMember>;
membersPendingProfileKey?: ReadonlyArray<DecryptedMemberPendingProfileKey>;
membersPendingAdminApproval?: ReadonlyArray<DecryptedMemberPendingAdminApproval>;
inviteLinkPassword?: string;
descriptionBytes?: Proto.GroupAttributeBlob;
avatar?: string;
announcementsOnly?: boolean;
2022-03-23 22:34:51 +00:00
membersBanned?: Array<GroupV2BannedMemberType>;
2021-06-22 14:46:42 +00:00
};
2020-09-09 02:25:05 +00:00
function decryptGroupState(
2021-06-22 14:46:42 +00:00
groupState: Readonly<Proto.IGroup>,
2020-09-09 02:25:05 +00:00
groupSecretParams: string,
logId: string
2021-06-22 14:46:42 +00:00
): DecryptedGroupState {
2020-09-09 02:25:05 +00:00
const clientZkGroupCipher = getClientZkGroupCipher(groupSecretParams);
2021-06-22 14:46:42 +00:00
const result: DecryptedGroupState = {};
2020-09-09 02:25:05 +00:00
// title
2021-06-22 14:46:42 +00:00
if (Bytes.isNotEmpty(groupState.title)) {
2020-09-09 02:25:05 +00:00
try {
2021-06-22 14:46:42 +00:00
result.title = Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, groupState.title)
2020-09-09 02:25:05 +00:00
);
} catch (error) {
log.warn(
2020-09-09 02:25:05 +00:00
`decryptGroupState/${logId}: Unable to decrypt title. Clearing it.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
}
}
// avatar
// Note: decryption happens during application of the change, on download of the avatar
// disappearing message timer
2021-06-22 14:46:42 +00:00
if (
groupState.disappearingMessagesTimer &&
groupState.disappearingMessagesTimer.length
) {
2020-09-09 02:25:05 +00:00
try {
2021-06-22 14:46:42 +00:00
result.disappearingMessagesTimer = Proto.GroupAttributeBlob.decode(
2020-09-09 02:25:05 +00:00
decryptGroupBlob(
clientZkGroupCipher,
2021-06-22 14:46:42 +00:00
groupState.disappearingMessagesTimer
2020-09-09 02:25:05 +00:00
)
);
} catch (error) {
log.warn(
2020-09-09 02:25:05 +00:00
`decryptGroupState/${logId}: Unable to decrypt disappearing message timer. Clearing it.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
}
}
// accessControl
2021-06-22 14:46:42 +00:00
{
const { accessControl } = groupState;
strictAssert(accessControl, 'No accessControl field found');
const attributes = dropNull(accessControl.attributes);
const members = dropNull(accessControl.members);
const addFromInviteLink = dropNull(accessControl.addFromInviteLink);
strictAssert(
isValidAccess(attributes),
`decryptGroupState: Access control for attributes is invalid: ${attributes}`
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
strictAssert(
isValidAccess(members),
`decryptGroupState: Access control for members is invalid: ${members}`
);
2021-06-22 14:46:42 +00:00
strictAssert(
isValidLinkAccess(addFromInviteLink),
`decryptGroupState: Access control for invite link is invalid: ${addFromInviteLink}`
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
result.accessControl = {
attributes,
members,
addFromInviteLink,
};
2020-09-09 02:25:05 +00:00
}
// version
2021-06-22 14:46:42 +00:00
strictAssert(
isNumber(groupState.version),
`decryptGroupState: Expected version to be a number; it was ${groupState.version}`
);
result.version = groupState.version;
2020-09-09 02:25:05 +00:00
// members
if (groupState.members) {
2021-06-22 14:46:42 +00:00
result.members = compact(
groupState.members.map((member: Proto.IMember) =>
2020-09-09 02:25:05 +00:00
decryptMember(clientZkGroupCipher, member, logId)
)
);
}
// membersPendingProfileKey
if (groupState.membersPendingProfileKey) {
2021-06-22 14:46:42 +00:00
result.membersPendingProfileKey = compact(
groupState.membersPendingProfileKey.map(
2021-06-22 14:46:42 +00:00
(member: Proto.IMemberPendingProfileKey) =>
decryptMemberPendingProfileKey(clientZkGroupCipher, member, logId)
)
);
}
// membersPendingAdminApproval
if (groupState.membersPendingAdminApproval) {
2021-06-22 14:46:42 +00:00
result.membersPendingAdminApproval = compact(
groupState.membersPendingAdminApproval.map(
2021-06-22 14:46:42 +00:00
(member: Proto.IMemberPendingAdminApproval) =>
decryptMemberPendingAdminApproval(clientZkGroupCipher, member, logId)
2020-09-09 02:25:05 +00:00
)
);
}
// inviteLinkPassword
2021-06-22 14:46:42 +00:00
if (Bytes.isNotEmpty(groupState.inviteLinkPassword)) {
result.inviteLinkPassword = Bytes.toBase64(groupState.inviteLinkPassword);
}
2021-06-02 00:24:28 +00:00
// descriptionBytes
2021-06-22 14:46:42 +00:00
if (Bytes.isNotEmpty(groupState.descriptionBytes)) {
2021-06-02 00:24:28 +00:00
try {
2021-06-22 14:46:42 +00:00
result.descriptionBytes = Proto.GroupAttributeBlob.decode(
decryptGroupBlob(clientZkGroupCipher, groupState.descriptionBytes)
2021-06-02 00:24:28 +00:00
);
} catch (error) {
log.warn(
2021-06-02 00:24:28 +00:00
`decryptGroupState/${logId}: Unable to decrypt descriptionBytes. Clearing it.`,
Errors.toLogFormat(error)
2021-06-02 00:24:28 +00:00
);
}
}
// announcementsOnly
const { announcementsOnly } = groupState;
result.announcementsOnly = Boolean(announcementsOnly);
// membersBanned
const { membersBanned } = groupState;
if (membersBanned && membersBanned.length > 0) {
result.membersBanned = membersBanned
.map(item => {
if (!item.userId) {
log.warn(
`decryptGroupState/${logId}: membersBanned had a blank entry`
);
return null;
}
2022-03-23 22:34:51 +00:00
const uuid = normalizeUuid(
decryptUuid(clientZkGroupCipher, item.userId),
'membersBanned.added.userId'
);
2022-03-23 22:34:51 +00:00
const timestamp = item.timestamp?.toNumber() ?? 0;
return { uuid, timestamp };
})
.filter(isNotNil);
} else {
result.membersBanned = [];
}
2021-06-22 14:46:42 +00:00
result.avatar = dropNull(groupState.avatar);
return result;
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
type DecryptedMember = Readonly<{
userId: string;
profileKey: Uint8Array;
role: Proto.Member.Role;
joinedAtVersion?: number;
}>;
2020-09-09 02:25:05 +00:00
function decryptMember(
clientZkGroupCipher: ClientZkGroupCipher,
2021-06-22 14:46:42 +00:00
member: Readonly<Proto.IMember>,
2020-09-09 02:25:05 +00:00
logId: string
2021-06-22 14:46:42 +00:00
): DecryptedMember | undefined {
2020-09-09 02:25:05 +00:00
// userId
2021-06-22 14:46:42 +00:00
strictAssert(
Bytes.isNotEmpty(member.userId),
'decryptMember: Member had missing userId'
);
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
let userId: string;
try {
userId = normalizeUuid(
decryptUuid(clientZkGroupCipher, member.userId),
'decryptMember.userId'
);
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMember/${logId}: Unable to decrypt member userid. Dropping member.`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return undefined;
}
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (!isValidUuid(userId)) {
log.warn(`decryptMember/${logId}: Dropping member due to invalid userId`);
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
return undefined;
2020-09-09 02:25:05 +00:00
}
// profileKey
2021-06-22 14:46:42 +00:00
strictAssert(
Bytes.isNotEmpty(member.profileKey),
'decryptMember: Member had missing profileKey'
);
const profileKey = decryptProfileKey(
clientZkGroupCipher,
member.profileKey,
2021-10-26 22:59:08 +00:00
UUID.cast(userId)
2021-06-22 14:46:42 +00:00
);
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
if (!isValidProfileKey(profileKey)) {
throw new Error('decryptMember: Member had invalid profileKey');
2020-09-09 02:25:05 +00:00
}
// role
2021-06-22 14:46:42 +00:00
const role = dropNull(member.role);
if (!isValidRole(role)) {
throw new Error(`decryptMember: Member had invalid role ${member.role}`);
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
return {
userId,
profileKey,
role,
joinedAtVersion: dropNull(member.joinedAtVersion),
};
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
type DecryptedMemberPendingProfileKey = {
addedByUserId: string;
timestamp: number;
member: {
userId: string;
profileKey?: Uint8Array;
role?: Proto.Member.Role;
};
};
function decryptMemberPendingProfileKey(
2020-09-09 02:25:05 +00:00
clientZkGroupCipher: ClientZkGroupCipher,
2021-06-22 14:46:42 +00:00
member: Readonly<Proto.IMemberPendingProfileKey>,
2020-09-09 02:25:05 +00:00
logId: string
2021-06-22 14:46:42 +00:00
): DecryptedMemberPendingProfileKey | undefined {
2020-09-09 02:25:05 +00:00
// addedByUserId
2021-06-22 14:46:42 +00:00
strictAssert(
Bytes.isNotEmpty(member.addedByUserId),
'decryptMemberPendingProfileKey: Member had missing addedByUserId'
);
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
let addedByUserId: string;
try {
addedByUserId = normalizeUuid(
decryptUuid(clientZkGroupCipher, member.addedByUserId),
'decryptMemberPendingProfileKey.addedByUserId'
);
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMemberPendingProfileKey/${logId}: Unable to decrypt pending member addedByUserId. Dropping member.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
return undefined;
}
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (!isValidUuid(addedByUserId)) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMemberPendingProfileKey/${logId}: Dropping pending member due to invalid addedByUserId`
);
2021-06-22 14:46:42 +00:00
return undefined;
2020-09-09 02:25:05 +00:00
}
// timestamp
2021-06-22 14:46:42 +00:00
const timestamp = normalizeTimestamp(member.timestamp);
2020-09-09 02:25:05 +00:00
if (!member.member) {
log.warn(
`decryptMemberPendingProfileKey/${logId}: Dropping pending member due to missing member details`
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
return undefined;
2020-09-09 02:25:05 +00:00
}
2021-06-22 14:46:42 +00:00
const { userId, profileKey } = member.member;
2020-09-09 02:25:05 +00:00
// userId
2021-06-22 14:46:42 +00:00
strictAssert(
Bytes.isNotEmpty(userId),
'decryptMemberPendingProfileKey: Member had missing member.userId'
);
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
let decryptedUserId: string;
try {
decryptedUserId = normalizeUuid(
decryptUuid(clientZkGroupCipher, userId),
'decryptMemberPendingProfileKey.member.userId'
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMemberPendingProfileKey/${logId}: Unable to decrypt pending member userId. Dropping member.`,
Errors.toLogFormat(error)
2021-06-22 14:46:42 +00:00
);
return undefined;
}
2020-09-09 02:25:05 +00:00
2021-10-26 22:59:08 +00:00
if (!isValidUuid(decryptedUserId)) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMemberPendingProfileKey/${logId}: Dropping pending member due to invalid member.userId`
);
2021-06-22 14:46:42 +00:00
return undefined;
2020-09-09 02:25:05 +00:00
}
// profileKey
2021-06-22 14:46:42 +00:00
let decryptedProfileKey: Uint8Array | undefined;
if (Bytes.isNotEmpty(profileKey)) {
2020-09-09 02:25:05 +00:00
try {
2021-06-22 14:46:42 +00:00
decryptedProfileKey = decryptProfileKey(
2020-09-09 02:25:05 +00:00
clientZkGroupCipher,
2021-06-22 14:46:42 +00:00
profileKey,
2021-10-26 22:59:08 +00:00
UUID.cast(decryptedUserId)
2020-09-09 02:25:05 +00:00
);
} catch (error) {
log.warn(
`decryptMemberPendingProfileKey/${logId}: Unable to decrypt pending member profileKey. Dropping profileKey.`,
Errors.toLogFormat(error)
2020-09-09 02:25:05 +00:00
);
}
2021-06-22 14:46:42 +00:00
if (!isValidProfileKey(decryptedProfileKey)) {
log.warn(
`decryptMemberPendingProfileKey/${logId}: Dropping profileKey, since it was invalid`
2020-09-09 02:25:05 +00:00
);
2021-06-22 14:46:42 +00:00
decryptedProfileKey = undefined;
2020-09-09 02:25:05 +00:00
}
}
// role
2021-06-22 14:46:42 +00:00
const role = dropNull(member.member.role);
2020-09-09 02:25:05 +00:00
2021-06-22 14:46:42 +00:00
strictAssert(
isValidRole(role),
`decryptMemberPendingProfileKey: Member had invalid role ${role}`
);
return {
addedByUserId,
timestamp,
member: {
userId: decryptedUserId,
profileKey: decryptedProfileKey,
role,
},
};
2020-09-09 02:25:05 +00:00
}
2020-11-13 19:57:55 +00:00
2021-06-22 14:46:42 +00:00
type DecryptedMemberPendingAdminApproval = {
userId: string;
profileKey?: Uint8Array;
timestamp: number;
};
function decryptMemberPendingAdminApproval(
clientZkGroupCipher: ClientZkGroupCipher,
2021-06-22 14:46:42 +00:00
member: Readonly<Proto.IMemberPendingAdminApproval>,
logId: string
2021-06-22 14:46:42 +00:00
): DecryptedMemberPendingAdminApproval | undefined {
// timestamp
2021-06-22 14:46:42 +00:00
const timestamp = normalizeTimestamp(member.timestamp);
const { userId, profileKey } = member;
// userId
2021-06-22 14:46:42 +00:00
strictAssert(
Bytes.isNotEmpty(userId),
'decryptMemberPendingAdminApproval: Missing userId'
);
2021-06-22 14:46:42 +00:00
let decryptedUserId: string;
try {
decryptedUserId = normalizeUuid(
decryptUuid(clientZkGroupCipher, userId),
'decryptMemberPendingAdminApproval.userId'
);
} catch (error) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMemberPendingAdminApproval/${logId}: Unable to decrypt pending member userId. Dropping member.`,
Errors.toLogFormat(error)
);
2021-06-22 14:46:42 +00:00
return undefined;
}
2021-10-26 22:59:08 +00:00
if (!isValidUuid(decryptedUserId)) {
log.warn(
2021-06-22 14:46:42 +00:00
`decryptMemberPendingAdminApproval/${logId}: Invalid userId. Dropping member.`
);
2021-06-22 14:46:42 +00:00
return undefined;
}
// profileKey
2021-06-22 14:46:42 +00:00
let decryptedProfileKey: Uint8Array | undefined;
if (Bytes.isNotEmpty(profileKey)) {
try {
2021-06-22 14:46:42 +00:00
decryptedProfileKey = decryptProfileKey(
clientZkGroupCipher,
2021-06-22 14:46:42 +00:00
profileKey,
2021-10-26 22:59:08 +00:00
UUID.cast(decryptedUserId)
);
} catch (error) {
log.warn(
`decryptMemberPendingAdminApproval/${logId}: Unable to decrypt profileKey. Dropping profileKey.`,
Errors.toLogFormat(error)
);
}
2021-06-22 14:46:42 +00:00
if (!isValidProfileKey(decryptedProfileKey)) {
log.warn(
`decryptMemberPendingAdminApproval/${logId}: Dropping profileKey, since it was invalid`
);
2021-06-22 14:46:42 +00:00
decryptedProfileKey = undefined;
}
}
2021-06-22 14:46:42 +00:00
return {
timestamp,
userId: decryptedUserId,
profileKey: decryptedProfileKey,
};
}
2020-11-13 19:57:55 +00:00
export function getMembershipList(
conversationId: string
2021-10-26 22:59:08 +00:00
): Array<{ uuid: UUIDStringType; uuidCiphertext: Uint8Array }> {
2020-11-13 19:57:55 +00:00
const conversation = window.ConversationController.get(conversationId);
if (!conversation) {
throw new Error('getMembershipList: cannot find conversation');
}
const secretParams = conversation.get('secretParams');
if (!secretParams) {
throw new Error('getMembershipList: no secretParams');
}
const clientZkGroupCipher = getClientZkGroupCipher(secretParams);
return conversation.getMembers().map(member => {
2022-07-08 20:46:25 +00:00
const uuid = member.getCheckedUuid('getMembershipList: member has no UUID');
2020-11-13 19:57:55 +00:00
const uuidCiphertext = encryptUuid(clientZkGroupCipher, uuid);
2022-07-08 20:46:25 +00:00
return { uuid: uuid.toString(), uuidCiphertext };
2020-11-13 19:57:55 +00:00
});
}