signal-desktop/ts/textsecure/MessageReceiver.ts

3715 lines
108 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2020 Signal Messenger, LLC
2020-10-30 20:34:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
/* eslint-disable no-bitwise */
import { isBoolean, isNumber, isString, omit } from 'lodash';
import PQueue from 'p-queue';
import { v4 as getGuid } from 'uuid';
import { existsSync } from 'fs';
import { removeSync } from 'fs-extra';
import type {
SealedSenderDecryptionResult,
SenderCertificate,
UnidentifiedSenderMessageContent,
} from '@signalapp/libsignal-client';
import {
ContentHint,
CiphertextMessageType,
2021-05-28 19:11:19 +00:00
DecryptionErrorMessage,
groupDecrypt,
2021-05-28 19:11:19 +00:00
PlaintextContent,
PreKeySignalMessage,
2023-08-16 20:54:39 +00:00
Pni,
processSenderKeyDistributionMessage,
ProtocolAddress,
PublicKey,
sealedSenderDecryptMessage,
sealedSenderDecryptToUsmc,
SenderKeyDistributionMessage,
signalDecrypt,
signalDecryptPreKey,
SignalMessage,
} from '@signalapp/libsignal-client';
import {
IdentityKeys,
KyberPreKeys,
PreKeys,
SenderKeys,
Sessions,
SignedPreKeys,
} from '../LibSignalStores';
import { verifySignature } from '../Curve';
import { strictAssert, assertDev } from '../util/assert';
import type { BatcherType } from '../util/batcher';
import { createBatcher } from '../util/batcher';
import { drop } from '../util/drop';
2021-07-09 19:36:10 +00:00
import { dropNull } from '../util/dropNull';
import { parseIntOrThrow } from '../util/parseIntOrThrow';
import { clearTimeoutIfNecessary } from '../util/clearTimeoutIfNecessary';
2021-05-19 21:25:56 +00:00
import { Zone } from '../util/Zone';
import { DurationInSeconds, SECOND } from '../util/durations';
import type { AttachmentType } from '../types/Attachment';
import { Address } from '../types/Address';
import { QualifiedAddress } from '../types/QualifiedAddress';
import { normalizeStoryDistributionId } from '../types/StoryDistributionId';
import type { ServiceIdString } from '../types/ServiceId';
import {
ServiceIdKind,
normalizeServiceId,
normalizePni,
isPniString,
2023-09-27 23:14:55 +00:00
isUntaggedPniString,
isServiceIdString,
2023-08-16 20:54:39 +00:00
fromPniObject,
2023-09-27 23:14:55 +00:00
toTaggedPni,
} from '../types/ServiceId';
2023-09-14 17:04:48 +00:00
import { normalizeAci } from '../util/normalizeAci';
import { isAciString } from '../util/isAciString';
import * as Errors from '../types/errors';
2021-07-09 19:36:10 +00:00
import { SignalService as Proto } from '../protobuf';
import { deriveGroupFields, MASTER_KEY_LENGTH } from '../groups';
import createTaskWithTimeout from './TaskWithTimeout';
2022-04-15 00:08:46 +00:00
import {
processAttachment,
processDataMessage,
processPreview,
2022-04-15 00:08:46 +00:00
processGroupV2Context,
} from './processDataMessage';
import { processSyncMessage } from './processSyncMessage';
import type { EventHandler } from './EventTarget';
import EventTarget from './EventTarget';
import { downloadAttachmentV2 } from './downloadAttachment';
import type { IncomingWebSocketRequest } from './WebsocketResources';
import type { ContactDetailsWithAvatar } from './ContactsParser';
import { parseContactsV2 } from './ContactsParser';
import type { WebAPIType } from './WebAPI';
import type { Storage } from './Storage';
2021-09-22 00:58:03 +00:00
import { WarnOnlyError } from './Errors';
import * as Bytes from '../Bytes';
import type {
2022-03-04 21:14:52 +00:00
ProcessedAttachment,
2021-07-09 19:36:10 +00:00
ProcessedDataMessage,
ProcessedPreview,
2021-07-09 19:36:10 +00:00
ProcessedSyncMessage,
ProcessedSent,
ProcessedEnvelope,
IRequestHandler,
UnprocessedType,
2021-07-09 19:36:10 +00:00
} from './Types.d';
import {
2023-08-09 00:53:06 +00:00
CallEventSyncEvent,
2021-07-09 19:36:10 +00:00
EmptyEvent,
EnvelopeQueuedEvent,
EnvelopeUnsealedEvent,
2021-07-09 19:36:10 +00:00
ProgressEvent,
TypingEvent,
ErrorEvent,
DeliveryEvent,
DecryptionErrorEvent,
SentEvent,
ProfileKeyUpdateEvent,
InvalidPlaintextEvent,
2021-07-09 19:36:10 +00:00
MessageEvent,
RetryRequestEvent,
ReadEvent,
ViewEvent,
2021-07-09 19:36:10 +00:00
ConfigurationEvent,
ViewOnceOpenSyncEvent,
2021-07-09 19:36:10 +00:00
MessageRequestResponseEvent,
FetchLatestEvent,
KeysEvent,
StickerPackEvent,
ReadSyncEvent,
ViewSyncEvent,
2021-07-09 19:36:10 +00:00
ContactSyncEvent,
2022-07-13 23:09:18 +00:00
StoryRecipientUpdateEvent,
2023-08-09 00:53:06 +00:00
CallLogEventSyncEvent,
2021-07-09 19:36:10 +00:00
} from './messageReceiverEvents';
import * as log from '../logging/log';
2022-03-04 21:14:52 +00:00
import * as durations from '../util/durations';
import { areArraysMatchingSets } from '../util/areArraysMatchingSets';
2022-04-06 01:18:07 +00:00
import { generateBlurHash } from '../util/generateBlurHash';
2022-08-02 19:31:55 +00:00
import { TEXT_ATTACHMENT } from '../types/MIME';
import type { SendTypesType } from '../util/handleMessageSend';
import { getStoriesBlocked } from '../util/stories';
import { isNotNil } from '../util/isNotNil';
import { chunk } from '../util/iterables';
import { inspectUnknownFieldTags } from '../util/inspectProtobufs';
2023-04-11 03:54:43 +00:00
import { incrementMessageCounter } from '../util/incrementMessageCounter';
import { filterAndClean } from '../types/BodyRange';
2023-08-09 00:53:06 +00:00
import { getCallEventForProto } from '../util/callDisposition';
2023-08-17 00:29:39 +00:00
import { checkOurPniIdentityKey } from '../util/checkOurPniIdentityKey';
2023-08-09 00:53:06 +00:00
import { CallLogEvent } from '../types/CallDisposition';
2020-11-20 17:30:45 +00:00
const GROUPV2_ID_LENGTH = 32;
const RETRY_TIMEOUT = 2 * 60 * 1000;
type UnsealedEnvelope = Readonly<
Omit<ProcessedEnvelope, 'sourceServiceId'> & {
sourceServiceId: ServiceIdString;
2021-07-09 19:36:10 +00:00
unidentifiedDeliveryReceived?: boolean;
contentHint?: number;
2020-05-27 21:37:06 +00:00
groupId?: string;
cipherTextBytes?: Uint8Array;
cipherTextType?: number;
certificate?: SenderCertificate;
unsealedContent?: UnidentifiedSenderMessageContent;
}
2021-07-09 19:36:10 +00:00
>;
2022-08-15 21:53:33 +00:00
type DecryptResult = Readonly<
| {
envelope: UnsealedEnvelope;
plaintext: Uint8Array;
}
| {
envelope?: UnsealedEnvelope;
plaintext?: undefined;
}
>;
2021-07-09 19:36:10 +00:00
type DecryptSealedSenderResult = Readonly<{
plaintext?: Uint8Array;
unsealedPlaintext?: SealedSenderDecryptionResult;
2023-05-04 15:09:49 +00:00
wasEncrypted: boolean;
}>;
type InnerDecryptResultType = Readonly<{
plaintext: Uint8Array;
wasEncrypted: boolean;
}>;
type CacheAddItemType = {
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope;
data: UnprocessedType;
2021-05-24 21:30:56 +00:00
request: Pick<IncomingWebSocketRequest, 'respond'>;
};
type LockedStores = {
readonly senderKeyStore: SenderKeys;
readonly sessionStore: Sessions;
readonly identityKeyStore: IdentityKeys;
readonly zone?: Zone;
};
enum TaskType {
Encrypted = 'Encrypted',
Decrypted = 'Decrypted',
}
export type MessageReceiverOptions = {
server: WebAPIType;
storage: Storage;
serverTrustRoot: string;
};
2021-06-09 22:28:54 +00:00
const TASK_WITH_TIMEOUT_OPTIONS = {
timeout: 2 * durations.MINUTE,
};
const LOG_UNEXPECTED_URGENT_VALUES = false;
const MUST_BE_URGENT_TYPES: Array<SendTypesType> = [
'message',
'deleteForEveryone',
'reaction',
'readSync',
];
const CAN_BE_URGENT_TYPES: Array<SendTypesType> = [
'callingMessage',
'senderKeyDistributionMessage',
// Deprecated
'resetSession',
'legacyGroupChange',
];
function logUnexpectedUrgentValue(
envelope: ProcessedEnvelope,
type: SendTypesType
) {
if (!LOG_UNEXPECTED_URGENT_VALUES) {
return;
}
const mustBeUrgent = MUST_BE_URGENT_TYPES.includes(type);
const canBeUrgent = mustBeUrgent || CAN_BE_URGENT_TYPES.includes(type);
if (envelope.urgent && !canBeUrgent) {
const envelopeId = getEnvelopeId(envelope);
log.warn(
`${envelopeId}: Message of type '${type}' was marked urgent, but shouldn't be!`
);
}
if (!envelope.urgent && mustBeUrgent) {
const envelopeId = getEnvelopeId(envelope);
log.warn(
`${envelopeId}: Message of type '${type}' wasn't marked urgent, but should be!`
);
}
}
function getEnvelopeId(envelope: ProcessedEnvelope): string {
const { timestamp } = envelope;
let prefix = '';
if (envelope.sourceServiceId || envelope.source) {
const sender = envelope.sourceServiceId || envelope.source;
prefix += `${sender}.${envelope.sourceDevice} `;
}
prefix += `> ${envelope.destinationServiceId}`;
return `${prefix} ${timestamp} (${envelope.id})`;
}
2022-09-13 21:48:09 +00:00
/* eslint-disable @typescript-eslint/brace-style -- Prettier conflicts with ESLint */
export default class MessageReceiver
extends EventTarget
2021-11-11 22:43:05 +00:00
implements IRequestHandler
{
2022-09-13 21:48:09 +00:00
/* eslint-enable @typescript-eslint/brace-style */
private server: WebAPIType;
2021-07-09 19:36:10 +00:00
private storage: Storage;
private appQueue: PQueue;
private decryptAndCacheBatcher: BatcherType<CacheAddItemType>;
private cacheRemoveBatcher: BatcherType<string>;
private count: number;
private processedCount: number;
private incomingQueue: PQueue;
private isEmptied?: boolean;
private encryptedQueue: PQueue;
private decryptedQueue: PQueue;
private retryCachedTimeout: NodeJS.Timeout | undefined;
private serverTrustRoot: Uint8Array;
private stoppingProcessing?: boolean;
2023-08-17 00:29:39 +00:00
private pniIdentityKeyCheckRequired?: boolean;
constructor({ server, storage, serverTrustRoot }: MessageReceiverOptions) {
super();
this.server = server;
this.storage = storage;
this.count = 0;
this.processedCount = 0;
if (!serverTrustRoot) {
throw new Error('Server trust root is required!');
}
this.serverTrustRoot = Bytes.fromBase64(serverTrustRoot);
2021-11-23 22:01:03 +00:00
this.incomingQueue = new PQueue({
concurrency: 1,
throwOnTimeout: true,
});
this.appQueue = new PQueue({
concurrency: 1,
throwOnTimeout: true,
});
// All envelopes start in encryptedQueue and progress to decryptedQueue
this.encryptedQueue = new PQueue({
concurrency: 1,
2021-11-23 22:01:03 +00:00
throwOnTimeout: true,
});
this.decryptedQueue = new PQueue({
concurrency: 1,
2021-11-23 22:01:03 +00:00
throwOnTimeout: true,
});
2021-05-24 21:30:56 +00:00
this.decryptAndCacheBatcher = createBatcher<CacheAddItemType>({
name: 'MessageReceiver.decryptAndCacheBatcher',
wait: 75,
maxSize: 30,
2021-03-26 00:00:03 +00:00
processBatch: (items: Array<CacheAddItemType>) => {
// Not returning the promise here because we don't want to stall
// the batch.
void this.decryptAndCacheBatch(items);
2021-03-26 00:00:03 +00:00
},
});
this.cacheRemoveBatcher = createBatcher<string>({
2021-03-26 00:00:03 +00:00
name: 'MessageReceiver.cacheRemoveBatcher',
wait: 75,
maxSize: 30,
processBatch: this.cacheRemoveBatch.bind(this),
});
}
public getAndResetProcessedCount(): number {
const count = this.processedCount;
this.processedCount = 0;
return count;
}
public handleRequest(request: IncomingWebSocketRequest): void {
// We do the message decryption here, instead of in the ordered pending queue,
// to avoid exposing the time it took us to process messages through the time-to-ack.
log.info('MessageReceiver: got request', request.verb, request.path);
if (request.path !== '/api/v1/message') {
request.respond(200, 'OK');
if (request.verb === 'PUT' && request.path === '/api/v1/queue/empty') {
drop(
this.incomingQueue.add(
createTaskWithTimeout(
async () => {
this.onEmpty();
},
'incomingQueue/onEmpty',
TASK_WITH_TIMEOUT_OPTIONS
)
)
);
}
return;
}
2021-06-09 22:28:54 +00:00
const job = async () => {
const headers = request.headers || [];
2021-06-09 22:28:54 +00:00
if (!request.body) {
throw new Error(
'MessageReceiver.handleRequest: request.body was falsey!'
);
2021-06-23 14:47:42 +00:00
}
const plaintext = request.body;
2021-06-09 22:28:54 +00:00
try {
const decoded = Proto.Envelope.decode(plaintext);
const serverTimestamp = decoded.serverTimestamp?.toNumber() ?? 0;
2021-06-09 22:28:54 +00:00
const ourAci = this.storage.user.getCheckedAci();
const envelope: ProcessedEnvelope = {
// Make non-private envelope IDs dashless so they don't get redacted
// from logs
id: getGuid().replace(/-/g, ''),
2023-04-11 03:54:43 +00:00
receivedAtCounter: incrementMessageCounter(),
receivedAtDate: Date.now(),
// Calculate the message age (time on server).
messageAgeSec: this.calculateMessageAge(headers, serverTimestamp),
2021-06-09 22:28:54 +00:00
// Proto.Envelope fields
type: decoded.type ?? Proto.Envelope.Type.UNKNOWN,
sourceServiceId: decoded.sourceServiceId
? normalizeServiceId(
decoded.sourceServiceId,
'MessageReceiver.handleRequest.sourceServiceId'
)
: undefined,
sourceDevice: decoded.sourceDevice ?? 1,
destinationServiceId: decoded.destinationServiceId
? normalizeServiceId(
decoded.destinationServiceId,
'MessageReceiver.handleRequest.destinationServiceId'
)
: ourAci,
2023-09-27 23:14:55 +00:00
updatedPni:
decoded.updatedPni && isUntaggedPniString(decoded.updatedPni)
? normalizePni(
toTaggedPni(decoded.updatedPni),
'MessageReceiver.handleRequest.updatedPni'
)
: undefined,
timestamp: decoded.timestamp?.toNumber() ?? 0,
content: dropNull(decoded.content),
serverGuid: decoded.serverGuid ?? getGuid(),
serverTimestamp,
urgent: isBoolean(decoded.urgent) ? decoded.urgent : true,
story: decoded.story ?? false,
2023-02-08 00:55:12 +00:00
reportingToken: decoded.reportingToken?.length
? decoded.reportingToken
: undefined,
};
2021-06-09 22:28:54 +00:00
// After this point, decoding errors are not the server's
// fault, and we should handle them gracefully and tell the
// user they received an invalid message
2021-06-09 22:28:54 +00:00
this.decryptAndCache(envelope, plaintext, request);
this.processedCount += 1;
} catch (e) {
request.respond(500, 'Bad encrypted websocket message');
log.error('Error handling incoming message:', Errors.toLogFormat(e));
await this.dispatchAndWait('websocket request', new ErrorEvent(e));
}
};
drop(
this.incomingQueue.add(
createTaskWithTimeout(
job,
'incomingQueue/websocket',
TASK_WITH_TIMEOUT_OPTIONS
)
)
);
}
public reset(): void {
// We always process our cache before processing a new websocket message
drop(
this.incomingQueue.add(
createTaskWithTimeout(
async () => this.queueAllCached(),
'incomingQueue/queueAllCached',
{
timeout: 10 * durations.MINUTE,
}
)
)
);
this.count = 0;
this.isEmptied = false;
this.stoppingProcessing = false;
}
public stopProcessing(): void {
log.info('MessageReceiver.stopProcessing');
this.stoppingProcessing = true;
}
public hasEmptied(): boolean {
return Boolean(this.isEmptied);
}
public async drain(): Promise<void> {
const waitForEncryptedQueue = async () =>
this.addToQueue(
async () => {
log.info('drained');
},
'drain/waitForDecrypted',
TaskType.Decrypted
);
const waitForIncomingQueue = async () =>
this.addToQueue(
waitForEncryptedQueue,
'drain/waitForEncrypted',
TaskType.Encrypted
);
return this.incomingQueue.add(
createTaskWithTimeout(
waitForIncomingQueue,
'drain/waitForIncoming',
TASK_WITH_TIMEOUT_OPTIONS
)
);
}
//
// EventTarget types
//
public override addEventListener(
name: 'empty',
handler: (ev: EmptyEvent) => void
): void;
public override addEventListener(
name: 'progress',
handler: (ev: ProgressEvent) => void
): void;
public override addEventListener(
name: 'typing',
handler: (ev: TypingEvent) => void
): void;
public override addEventListener(
name: 'error',
handler: (ev: ErrorEvent) => void
): void;
public override addEventListener(
name: 'delivery',
handler: (ev: DeliveryEvent) => void
): void;
public override addEventListener(
name: 'decryption-error',
handler: (ev: DecryptionErrorEvent) => void
): void;
public override addEventListener(
name: 'invalid-plaintext',
handler: (ev: InvalidPlaintextEvent) => void
): void;
public override addEventListener(
name: 'sent',
handler: (ev: SentEvent) => void
): void;
public override addEventListener(
name: 'profileKeyUpdate',
handler: (ev: ProfileKeyUpdateEvent) => void
): void;
public override addEventListener(
name: 'message',
handler: (ev: MessageEvent) => void
): void;
public override addEventListener(
name: 'retry-request',
handler: (ev: RetryRequestEvent) => void
): void;
public override addEventListener(
name: 'read',
handler: (ev: ReadEvent) => void
): void;
public override addEventListener(
name: 'view',
handler: (ev: ViewEvent) => void
): void;
public override addEventListener(
name: 'configuration',
handler: (ev: ConfigurationEvent) => void
): void;
public override addEventListener(
name: 'viewOnceOpenSync',
handler: (ev: ViewOnceOpenSyncEvent) => void
): void;
public override addEventListener(
name: 'messageRequestResponse',
handler: (ev: MessageRequestResponseEvent) => void
): void;
public override addEventListener(
name: 'fetchLatest',
handler: (ev: FetchLatestEvent) => void
): void;
public override addEventListener(
name: 'keys',
handler: (ev: KeysEvent) => void
): void;
public override addEventListener(
name: 'sticker-pack',
handler: (ev: StickerPackEvent) => void
): void;
public override addEventListener(
name: 'readSync',
handler: (ev: ReadSyncEvent) => void
): void;
public override addEventListener(
name: 'viewSync',
handler: (ev: ViewSyncEvent) => void
): void;
public override addEventListener(
name: 'contactSync',
handler: (ev: ContactSyncEvent) => void
): void;
public override addEventListener(
name: 'envelopeQueued',
handler: (ev: EnvelopeQueuedEvent) => void
): void;
public override addEventListener(
name: 'envelopeUnsealed',
handler: (ev: EnvelopeUnsealedEvent) => void
2021-08-05 23:34:49 +00:00
): void;
2022-07-13 23:09:18 +00:00
public override addEventListener(
name: 'storyRecipientUpdate',
handler: (ev: StoryRecipientUpdateEvent) => void
): void;
2023-01-10 00:52:01 +00:00
public override addEventListener(
name: 'callEventSync',
handler: (ev: CallEventSyncEvent) => void
): void;
2023-08-09 00:53:06 +00:00
public override addEventListener(
name: 'callLogEventSync',
handler: (ev: CallLogEventSyncEvent) => void
): void;
public override addEventListener(name: string, handler: EventHandler): void {
return super.addEventListener(name, handler);
}
public override removeEventListener(
name: string,
handler: EventHandler
): void {
return super.removeEventListener(name, handler);
}
//
// Private
//
private async dispatchAndWait(id: string, event: Event): Promise<void> {
drop(
this.appQueue.add(
createTaskWithTimeout(
async () => Promise.all(this.dispatchEvent(event)),
`dispatchEvent(${event.type}, ${id})`,
TASK_WITH_TIMEOUT_OPTIONS
)
)
);
}
private calculateMessageAge(
2021-07-02 19:21:24 +00:00
headers: ReadonlyArray<string>,
serverTimestamp?: number
): number {
let messageAgeSec = 0; // Default to 0 in case of unreliable parameters.
if (serverTimestamp) {
// The 'X-Signal-Timestamp' is usually the last item, so start there.
let it = headers.length;
// eslint-disable-next-line no-plusplus
while (--it >= 0) {
const match = headers[it].match(/^X-Signal-Timestamp:\s*(\d+)\s*$/);
if (match && match.length === 2) {
const timestamp = Number(match[1]);
// One final sanity check, the timestamp when a message is pulled from
// the server should be later than when it was pushed.
if (timestamp > serverTimestamp) {
messageAgeSec = Math.floor((timestamp - serverTimestamp) / 1000);
}
break;
}
}
}
return messageAgeSec;
}
private async addToQueue<T>(
task: () => Promise<T>,
id: string,
taskType: TaskType
): Promise<T> {
if (taskType === TaskType.Encrypted) {
this.count += 1;
}
const queue =
taskType === TaskType.Encrypted
? this.encryptedQueue
: this.decryptedQueue;
try {
return await queue.add(
createTaskWithTimeout(task, id, TASK_WITH_TIMEOUT_OPTIONS)
);
} finally {
this.updateProgress(this.count);
}
}
private onEmpty(): void {
2021-03-26 00:00:03 +00:00
const emitEmpty = async () => {
await Promise.all([
2021-05-24 21:30:56 +00:00
this.decryptAndCacheBatcher.flushAndWait(),
2021-03-26 00:00:03 +00:00
this.cacheRemoveBatcher.flushAndWait(),
]);
2023-08-17 00:29:39 +00:00
if (this.pniIdentityKeyCheckRequired) {
log.warn(
"MessageReceiver: got 'empty' event, " +
'running scheduled pni identity key check'
);
drop(checkOurPniIdentityKey());
}
this.pniIdentityKeyCheckRequired = false;
log.info("MessageReceiver: emitting 'empty' event");
2021-07-09 19:36:10 +00:00
this.dispatchEvent(new EmptyEvent());
this.isEmptied = true;
this.maybeScheduleRetryTimeout();
};
const waitForDecryptedQueue = async () => {
log.info(
"MessageReceiver: finished processing messages after 'empty', now waiting for application"
);
2019-07-09 18:46:48 +00:00
// We don't await here because we don't want this to gate future message processing
drop(
this.appQueue.add(
createTaskWithTimeout(
emitEmpty,
'emitEmpty',
TASK_WITH_TIMEOUT_OPTIONS
)
)
);
};
const waitForEncryptedQueue = async () => {
drop(
this.addToQueue(
waitForDecryptedQueue,
'onEmpty/waitForDecrypted',
TaskType.Decrypted
)
);
};
const waitForIncomingQueue = async () => {
2019-07-09 18:46:48 +00:00
// Note: this.count is used in addToQueue
// Resetting count so everything from the websocket after this starts at zero
this.count = 0;
drop(
this.addToQueue(
waitForEncryptedQueue,
'onEmpty/waitForEncrypted',
TaskType.Encrypted
)
);
};
2019-09-26 19:56:31 +00:00
const waitForCacheAddBatcher = async () => {
2021-05-24 21:30:56 +00:00
await this.decryptAndCacheBatcher.onIdle();
drop(
this.incomingQueue.add(
createTaskWithTimeout(
waitForIncomingQueue,
'onEmpty/waitForIncoming',
TASK_WITH_TIMEOUT_OPTIONS
)
)
);
2019-09-26 19:56:31 +00:00
};
drop(waitForCacheAddBatcher());
}
private updateProgress(count: number): void {
// count by 10s
if (count % 10 !== 0) {
return;
}
2021-07-09 19:36:10 +00:00
this.dispatchEvent(new ProgressEvent({ count }));
}
private async queueAllCached(): Promise<void> {
if (this.stoppingProcessing) {
log.info(
'MessageReceiver.queueAllCached: not running due to stopped processing'
);
return;
}
for await (const batch of this.getAllFromCache()) {
const max = batch.length;
for (let i = 0; i < max; i += 1) {
// eslint-disable-next-line no-await-in-loop
await this.queueCached(batch[i]);
}
}
log.info('MessageReceiver.queueAllCached - finished');
}
private async queueCached(item: UnprocessedType): Promise<void> {
log.info('MessageReceiver.queueCached', item.id);
try {
2021-07-09 19:36:10 +00:00
let envelopePlaintext: Uint8Array;
if (item.envelope && item.version === 2) {
2021-07-09 19:36:10 +00:00
envelopePlaintext = Bytes.fromBase64(item.envelope);
2021-05-24 21:30:56 +00:00
} else if (item.envelope && typeof item.envelope === 'string') {
2021-07-09 19:36:10 +00:00
envelopePlaintext = Bytes.fromBinary(item.envelope);
} else {
throw new Error(
'MessageReceiver.queueCached: item.envelope was malformed'
);
}
2021-07-09 19:36:10 +00:00
const decoded = Proto.Envelope.decode(envelopePlaintext);
const ourAci = this.storage.user.getCheckedAci();
2021-07-09 19:36:10 +00:00
const envelope: ProcessedEnvelope = {
id: item.id,
receivedAtCounter: item.receivedAtCounter ?? item.timestamp,
receivedAtDate:
item.receivedAtCounter == null ? Date.now() : item.timestamp,
2021-07-09 19:36:10 +00:00
messageAgeSec: item.messageAgeSec || 0,
// Proto.Envelope fields
type: decoded.type ?? Proto.Envelope.Type.UNKNOWN,
2022-08-02 16:19:21 +00:00
source: item.source,
sourceServiceId: normalizeServiceId(
2023-08-16 20:54:39 +00:00
item.sourceServiceId || decoded.sourceServiceId,
'CachedEnvelope.sourceServiceId'
),
2021-07-09 19:36:10 +00:00
sourceDevice: decoded.sourceDevice || item.sourceDevice,
destinationServiceId: normalizeServiceId(
2023-08-16 20:54:39 +00:00
decoded.destinationServiceId || item.destinationServiceId || ourAci,
'CachedEnvelope.destinationServiceId'
),
2023-09-27 23:14:55 +00:00
updatedPni: isUntaggedPniString(decoded.updatedPni)
? normalizePni(
toTaggedPni(decoded.updatedPni),
'CachedEnvelope.updatedPni'
)
2022-07-28 16:35:29 +00:00
: undefined,
timestamp: decoded.timestamp?.toNumber() ?? 0,
2021-07-09 19:36:10 +00:00
content: dropNull(decoded.content),
serverGuid: decoded.serverGuid ?? getGuid(),
2022-03-23 20:49:27 +00:00
serverTimestamp:
item.serverTimestamp || decoded.serverTimestamp?.toNumber() || 0,
urgent: isBoolean(item.urgent) ? item.urgent : true,
story: Boolean(item.story),
2023-02-08 00:55:12 +00:00
reportingToken: item.reportingToken
? Bytes.fromBase64(item.reportingToken)
: undefined,
2021-07-09 19:36:10 +00:00
};
const { decrypted } = item;
if (decrypted) {
2021-07-09 19:36:10 +00:00
let payloadPlaintext: Uint8Array;
if (item.version === 2) {
2021-07-09 19:36:10 +00:00
payloadPlaintext = Bytes.fromBase64(decrypted);
} else if (typeof decrypted === 'string') {
2021-07-09 19:36:10 +00:00
payloadPlaintext = Bytes.fromBinary(decrypted);
} else {
throw new Error('Cached decrypted value was not a string!');
}
2022-08-15 21:53:33 +00:00
strictAssert(
envelope.sourceServiceId,
2022-08-15 21:53:33 +00:00
'Decrypted envelope must have source uuid'
);
// Pacify typescript
const decryptedEnvelope = {
...envelope,
sourceServiceId: envelope.sourceServiceId,
2022-08-15 21:53:33 +00:00
};
// Maintain invariant: encrypted queue => decrypted queue
const envelopeId = getEnvelopeId(decryptedEnvelope);
const taskId = `queueCached(EnvelopeEvent(${envelopeId}))`;
drop(
this.addToQueue(
async () =>
this.dispatchAndWait(
taskId,
new EnvelopeQueuedEvent(decryptedEnvelope)
),
taskId,
TaskType.Decrypted
)
);
drop(
this.addToQueue(
async () => {
void this.queueDecryptedEnvelope(
decryptedEnvelope,
payloadPlaintext
);
},
`queueDecryptedEnvelope(${getEnvelopeId(decryptedEnvelope)})`,
TaskType.Encrypted
)
);
} else {
void this.queueCachedEnvelope(item, envelope);
}
} catch (error) {
log.error(
'queueCached error handling item',
item.id,
'removing it. Error:',
Errors.toLogFormat(error)
);
try {
const { id } = item;
await this.storage.protocol.removeUnprocessed(id);
} catch (deleteError) {
log.error(
'queueCached error deleting item',
item.id,
'Error:',
Errors.toLogFormat(deleteError)
);
}
}
}
private clearRetryTimeout(): void {
clearTimeoutIfNecessary(this.retryCachedTimeout);
this.retryCachedTimeout = undefined;
}
private maybeScheduleRetryTimeout(): void {
if (this.isEmptied) {
this.clearRetryTimeout();
this.retryCachedTimeout = setTimeout(() => {
drop(
this.incomingQueue.add(
createTaskWithTimeout(
async () => this.queueAllCached(),
'queueAllCached',
TASK_WITH_TIMEOUT_OPTIONS
)
)
);
}, RETRY_TIMEOUT);
}
}
private async *getAllFromCache(): AsyncIterable<Array<UnprocessedType>> {
log.info('getAllFromCache');
const ids = await this.storage.protocol.getAllUnprocessedIds();
log.info(`getAllFromCache - ${ids.length} unprocessed`);
for (const batch of chunk(ids, 1000)) {
log.info(`getAllFromCache - yielding batch of ${batch.length}`);
yield this.storage.protocol.getUnprocessedByIdsAndIncrementAttempts(
batch
);
}
log.info(`getAllFromCache - done retrieving ${ids.length} unprocessed`);
}
private async decryptAndCacheBatch(
items: Array<CacheAddItemType>
): Promise<void> {
log.info('MessageReceiver.decryptAndCacheBatch', items.length);
2021-07-09 19:36:10 +00:00
const decrypted: Array<
Readonly<{
plaintext: Uint8Array;
data: UnprocessedType;
envelope: UnsealedEnvelope;
2021-07-09 19:36:10 +00:00
}>
> = [];
const storageProtocol = this.storage.protocol;
2019-09-26 19:56:31 +00:00
try {
2021-05-24 21:30:56 +00:00
const zone = new Zone('decryptAndCacheBatch', {
pendingSenderKeys: true,
2021-05-19 21:25:56 +00:00
pendingSessions: true,
pendingUnprocessed: true,
});
const storesMap = new Map<ServiceIdString, LockedStores>();
const failed: Array<UnprocessedType> = [];
// Below we:
//
2021-05-19 21:25:56 +00:00
// 1. Enter zone
// 2. Decrypt all batched envelopes
// 3. Persist both decrypted envelopes and envelopes that we failed to
// decrypt (for future retries, see `attempts` field)
2021-05-19 21:25:56 +00:00
// 4. Leave zone and commit all pending sessions and unprocesseds
// 5. Acknowledge envelopes (can't fail)
// 6. Finally process decrypted envelopes
2021-05-19 21:25:56 +00:00
await storageProtocol.withZone(zone, 'MessageReceiver', async () => {
await Promise.all<void>(
items.map(async ({ data, envelope }) => {
try {
const { destinationServiceId } = envelope;
let stores = storesMap.get(destinationServiceId);
if (!stores) {
stores = {
senderKeyStore: new SenderKeys({
ourServiceId: destinationServiceId,
zone,
}),
sessionStore: new Sessions({
zone,
ourServiceId: destinationServiceId,
}),
identityKeyStore: new IdentityKeys({
zone,
ourServiceId: destinationServiceId,
}),
zone,
};
storesMap.set(destinationServiceId, stores);
}
2021-07-09 19:36:10 +00:00
const result = await this.queueEncryptedEnvelope(
stores,
2022-07-28 16:35:29 +00:00
envelope
);
2021-07-09 19:36:10 +00:00
if (result.plaintext) {
decrypted.push({
plaintext: result.plaintext,
envelope: result.envelope,
data,
});
}
} catch (error) {
failed.push(data);
log.error(
'MessageReceiver.decryptAndCacheBatch error when ' +
'processing the envelope',
Errors.toLogFormat(error)
);
}
})
);
log.info(
2021-05-24 21:30:56 +00:00
'MessageReceiver.decryptAndCacheBatch storing ' +
`${decrypted.length} decrypted envelopes, keeping ` +
`${failed.length} failed envelopes.`
);
// Store both decrypted and failed unprocessed envelopes
const unprocesseds: Array<UnprocessedType> = decrypted.map(
({ envelope, data, plaintext }) => {
return {
...data,
source: envelope.source,
2023-08-16 20:54:39 +00:00
sourceServiceId: envelope.sourceServiceId,
sourceDevice: envelope.sourceDevice,
2023-08-16 20:54:39 +00:00
destinationServiceId: envelope.destinationServiceId,
updatedPni: envelope.updatedPni,
serverGuid: envelope.serverGuid,
serverTimestamp: envelope.serverTimestamp,
2021-07-09 19:36:10 +00:00
decrypted: Bytes.toBase64(plaintext),
};
}
);
2021-05-19 21:25:56 +00:00
await storageProtocol.addMultipleUnprocessed(
unprocesseds.concat(failed),
{ zone }
);
});
log.info('MessageReceiver.decryptAndCacheBatch acknowledging receipt');
// Acknowledge all envelopes
for (const { request } of items) {
try {
request.respond(200, 'OK');
} catch (error) {
log.error(
2021-05-24 21:30:56 +00:00
'decryptAndCacheBatch: Failed to send 200 to server; still queuing envelope'
);
}
}
2019-09-26 19:56:31 +00:00
} catch (error) {
log.error(
2021-05-24 21:30:56 +00:00
'decryptAndCache error trying to add messages to cache:',
Errors.toLogFormat(error)
2019-09-26 19:56:31 +00:00
);
items.forEach(item => {
item.request.respond(500, 'Failed to cache message');
});
return;
2019-09-26 19:56:31 +00:00
}
await Promise.all(
decrypted.map(async ({ envelope, plaintext }) => {
try {
await this.queueDecryptedEnvelope(envelope, plaintext);
} catch (error) {
log.error(
2021-05-24 21:30:56 +00:00
'decryptAndCache error when processing decrypted envelope',
Errors.toLogFormat(error)
);
}
})
);
log.info('MessageReceiver.decryptAndCacheBatch fully processed');
this.maybeScheduleRetryTimeout();
}
private decryptAndCache(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
plaintext: Uint8Array,
request: IncomingWebSocketRequest
): void {
const { id } = envelope;
2021-07-09 19:36:10 +00:00
const data: UnprocessedType = {
id,
version: 2,
// This field is only used for aging items out of the cache. The original
// envelope's timestamp will be used when retrying this item.
timestamp: envelope.receivedAtDate,
attempts: 0,
2021-07-09 19:36:10 +00:00
envelope: Bytes.toBase64(plaintext),
messageAgeSec: envelope.messageAgeSec,
receivedAtCounter: envelope.receivedAtCounter,
urgent: envelope.urgent,
story: envelope.story,
2023-02-08 00:55:12 +00:00
reportingToken: envelope.reportingToken
? Bytes.toBase64(envelope.reportingToken)
: undefined,
};
2021-05-24 21:30:56 +00:00
this.decryptAndCacheBatcher.add({
2019-09-26 19:56:31 +00:00
request,
envelope,
data,
});
}
private async cacheRemoveBatch(items: Array<string>): Promise<void> {
await this.storage.protocol.removeUnprocessed(items);
}
private removeFromCache(envelope: ProcessedEnvelope): void {
const { id } = envelope;
2019-09-26 19:56:31 +00:00
this.cacheRemoveBatcher.add(id);
}
private async queueDecryptedEnvelope(
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
plaintext: Uint8Array
): Promise<void> {
const id = getEnvelopeId(envelope);
log.info('queueing decrypted envelope', id);
2021-03-04 21:44:57 +00:00
const task = this.handleDecryptedEnvelope.bind(this, envelope, plaintext);
const taskWithTimeout = createTaskWithTimeout(
task,
`queueDecryptedEnvelope ${id}`,
TASK_WITH_TIMEOUT_OPTIONS
);
2021-03-04 21:44:57 +00:00
2021-07-09 19:36:10 +00:00
try {
await this.addToQueue(
taskWithTimeout,
`handleDecryptedEnvelope(${id})`,
TaskType.Decrypted
);
2021-07-09 19:36:10 +00:00
} catch (error) {
log.error(
`queueDecryptedEnvelope error handling envelope ${id}:`,
Errors.toLogFormat(error)
);
2021-07-09 19:36:10 +00:00
}
}
private async queueEncryptedEnvelope(
stores: LockedStores,
2022-07-28 16:35:29 +00:00
envelope: ProcessedEnvelope
2021-07-09 19:36:10 +00:00
): Promise<DecryptResult> {
let logId = getEnvelopeId(envelope);
2022-07-28 16:35:29 +00:00
log.info('queueing envelope', logId);
2021-03-04 21:44:57 +00:00
const task = async (): Promise<DecryptResult> => {
const { destinationServiceId } = envelope;
const serviceIdKind =
this.storage.user.getOurServiceIdKind(destinationServiceId);
if (serviceIdKind === ServiceIdKind.Unknown) {
2022-07-28 16:35:29 +00:00
log.warn(
'MessageReceiver.decryptAndCacheBatch: ' +
`Rejecting envelope ${getEnvelopeId(envelope)}, ` +
2023-08-16 20:54:39 +00:00
`unknown serviceId: ${destinationServiceId}`
2022-07-28 16:35:29 +00:00
);
2022-08-15 21:53:33 +00:00
return { plaintext: undefined, envelope: undefined };
2022-07-28 16:35:29 +00:00
}
const unsealedEnvelope = await this.unsealEnvelope(
stores,
envelope,
serviceIdKind
);
// Dropped early
if (!unsealedEnvelope) {
2022-08-15 21:53:33 +00:00
return { plaintext: undefined, envelope: undefined };
}
logId = getEnvelopeId(unsealedEnvelope);
const taskId = `dispatchEvent(EnvelopeUnsealedEvent(${logId}))`;
drop(
this.addToQueue(
async () =>
this.dispatchAndWait(
taskId,
new EnvelopeUnsealedEvent(unsealedEnvelope)
),
taskId,
TaskType.Decrypted
)
);
return this.decryptEnvelope(stores, unsealedEnvelope, serviceIdKind);
};
2021-03-04 21:44:57 +00:00
try {
return await this.addToQueue(
task,
`MessageReceiver: unseal and decrypt ${logId}`,
TaskType.Encrypted
);
} catch (error) {
2020-03-20 19:01:15 +00:00
const args = [
'queueEncryptedEnvelope error handling envelope',
logId,
':',
Errors.toLogFormat(error),
2020-03-20 19:01:15 +00:00
];
2021-09-22 00:58:03 +00:00
if (error instanceof WarnOnlyError) {
log.warn(...args);
2020-03-20 19:01:15 +00:00
} else {
log.error(...args);
2020-03-20 19:01:15 +00:00
}
throw error;
}
}
private async queueCachedEnvelope(
2021-05-24 21:30:56 +00:00
data: UnprocessedType,
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope
2021-05-24 21:30:56 +00:00
): Promise<void> {
this.decryptAndCacheBatcher.add({
request: {
respond(code, status) {
log.info(
2021-05-24 21:30:56 +00:00
'queueCachedEnvelope: fake response ' +
`with code ${code} and status ${status}`
);
},
},
2021-05-24 21:30:56 +00:00
envelope,
data,
});
}
// Called after `decryptEnvelope` decrypted the message.
private async handleDecryptedEnvelope(
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
plaintext: Uint8Array
): Promise<void> {
if (this.stoppingProcessing) {
return;
}
2023-02-08 00:55:12 +00:00
if (!envelope.content) {
this.removeFromCache(envelope);
throw new Error('Received message with no content');
}
2023-02-08 00:55:12 +00:00
await this.innerHandleContentMessage(envelope, plaintext);
}
private async unsealEnvelope(
stores: LockedStores,
envelope: ProcessedEnvelope,
serviceIdKind: ServiceIdKind
): Promise<UnsealedEnvelope | undefined> {
const logId = getEnvelopeId(envelope);
if (this.stoppingProcessing) {
log.warn(`MessageReceiver.unsealEnvelope(${logId}): dropping`);
throw new Error('Sealed envelope dropped due to stopping processing');
}
if (envelope.type !== Proto.Envelope.Type.UNIDENTIFIED_SENDER) {
2022-08-15 21:53:33 +00:00
strictAssert(
envelope.sourceServiceId,
2022-08-15 21:53:33 +00:00
'Unsealed envelope must have source uuid'
);
return {
...envelope,
sourceServiceId: envelope.sourceServiceId,
cipherTextBytes: envelope.content,
cipherTextType: envelopeTypeToCiphertextType(envelope.type),
};
}
if (serviceIdKind === ServiceIdKind.PNI) {
log.warn(`MessageReceiver.unsealEnvelope(${logId}): dropping for PNI`);
return undefined;
}
strictAssert(
serviceIdKind === ServiceIdKind.ACI,
'Sealed non-ACI envelope'
);
2022-03-31 03:07:55 +00:00
const ciphertext = envelope.content;
if (!ciphertext) {
this.removeFromCache(envelope);
2022-03-31 03:07:55 +00:00
throw new Error('Received message with no content');
}
log.info(`MessageReceiver.unsealEnvelope(${logId}): unidentified message`);
const messageContent = await sealedSenderDecryptToUsmc(
Buffer.from(ciphertext),
stores.identityKeyStore
);
// Here we take this sender information and attach it back to the envelope
// to make the rest of the app work properly.
const certificate = messageContent.senderCertificate();
const originalSource = envelope.source;
const originalSourceUuid = envelope.sourceServiceId;
const newEnvelope: UnsealedEnvelope = {
...envelope,
cipherTextBytes: messageContent.contents(),
cipherTextType: messageContent.msgType(),
// Overwrite Envelope fields
source: dropNull(certificate.senderE164()),
sourceServiceId: normalizeServiceId(
certificate.senderUuid(),
'MessageReceiver.unsealEnvelope.UNIDENTIFIED_SENDER.sourceServiceId'
),
sourceDevice: certificate.senderDeviceId(),
// UnsealedEnvelope-only fields
unidentifiedDeliveryReceived: !(originalSource || originalSourceUuid),
contentHint: messageContent.contentHint(),
groupId: messageContent.groupId()?.toString('base64'),
certificate,
unsealedContent: messageContent,
};
// This will throw if there's a problem
this.validateUnsealedEnvelope(newEnvelope);
return newEnvelope;
}
private async decryptEnvelope(
stores: LockedStores,
envelope: UnsealedEnvelope,
serviceIdKind: ServiceIdKind
2021-07-09 19:36:10 +00:00
): Promise<DecryptResult> {
const logId = `MessageReceiver.decryptEnvelope(${getEnvelopeId(envelope)})`;
if (this.stoppingProcessing) {
log.warn(`${logId}: dropping unsealed`);
throw new Error('Unsealed envelope dropped due to stopping processing');
}
2021-07-09 19:36:10 +00:00
if (envelope.type === Proto.Envelope.Type.RECEIPT) {
2022-08-15 21:53:33 +00:00
strictAssert(
envelope.sourceServiceId,
'Unsealed delivery receipt must have sourceServiceId'
2022-08-15 21:53:33 +00:00
);
await this.onDeliveryReceipt(envelope);
2021-07-09 19:36:10 +00:00
return { plaintext: undefined, envelope };
}
let ciphertext: Uint8Array;
if (envelope.content) {
ciphertext = envelope.content;
} else {
this.removeFromCache(envelope);
strictAssert(
false,
'Contentless envelope should be handled by unsealEnvelope'
);
}
log.info(logId);
const decryptResult = await this.decrypt(
stores,
envelope,
ciphertext,
serviceIdKind
);
if (!decryptResult) {
log.warn(`${logId}: plaintext was falsey`);
return { plaintext: undefined, envelope };
}
const { plaintext, wasEncrypted } = decryptResult;
// Note: we need to process this as part of decryption, because we might need this
// sender key to decrypt the next message in the queue!
let isGroupV2 = false;
2022-08-15 21:53:33 +00:00
let inProgressMessageType = '';
try {
const content = Proto.Content.decode(plaintext);
if (!wasEncrypted && Bytes.isEmpty(content.decryptionErrorMessage)) {
log.warn(
`${logId}: dropping plaintext envelope without decryption error message`
);
const { sourceServiceId: senderAci } = envelope;
strictAssert(isAciString(senderAci), 'Sender uuid must be an ACI');
const event = new InvalidPlaintextEvent({
senderDevice: envelope.sourceDevice ?? 1,
senderAci,
timestamp: envelope.timestamp,
});
this.removeFromCache(envelope);
const envelopeId = getEnvelopeId(envelope);
// Avoid deadlocks by scheduling processing on decrypted queue
drop(
this.addToQueue(
async () => this.dispatchEvent(event),
`decrypted/dispatchEvent/InvalidPlaintextEvent(${envelopeId})`,
TaskType.Decrypted
)
);
return { plaintext: undefined, envelope };
}
isGroupV2 =
Boolean(content.dataMessage?.groupV2) ||
Boolean(content.storyMessage?.group);
if (
content.senderKeyDistributionMessage &&
Bytes.isNotEmpty(content.senderKeyDistributionMessage)
) {
2022-08-15 21:53:33 +00:00
inProgressMessageType = 'sender key distribution';
await this.handleSenderKeyDistributionMessage(
stores,
envelope,
content.senderKeyDistributionMessage
);
}
const isStoryReply = Boolean(content.dataMessage?.storyContext);
const isGroupStoryReply = Boolean(
isStoryReply && content.dataMessage?.groupV2
);
const isStory = Boolean(content.storyMessage);
const isDeleteForEveryone = Boolean(content.dataMessage?.delete);
if (
envelope.story &&
!(isGroupStoryReply || isStory) &&
!isDeleteForEveryone
) {
log.warn(
`${logId}: Dropping story message - story=true on envelope, but message was not a group story send or delete`
);
this.removeFromCache(envelope);
return { plaintext: undefined, envelope };
}
if (!envelope.story && (isGroupStoryReply || isStory)) {
log.warn(
`${logId}: Malformed story - story=false on envelope, but was a group story send`
);
}
const areStoriesBlocked = getStoriesBlocked();
// Note that there are other story-related message types which aren't captured
// here. Look for other calls to getStoriesBlocked down-file.
if (areStoriesBlocked && (isStoryReply || isStory)) {
log.warn(
`${logId}: Dropping story message - stories are disabled or unavailable`
);
this.removeFromCache(envelope);
return { plaintext: undefined, envelope };
}
const sender = window.ConversationController.get(
envelope.sourceServiceId || envelope.source
);
if (
(isStoryReply || isStory) &&
!isGroupV2 &&
(!sender || !sender.get('profileSharing'))
) {
log.warn(
`${logId}: Dropping story message - !profileSharing for sender`
);
this.removeFromCache(envelope);
return { plaintext: undefined, envelope };
}
2022-07-28 16:35:29 +00:00
2022-08-15 21:53:33 +00:00
if (content.pniSignatureMessage) {
inProgressMessageType = 'pni signature';
await this.handlePniSignatureMessage(
envelope,
content.pniSignatureMessage
);
}
2022-07-28 16:35:29 +00:00
// Some sync messages have to be fully processed in the middle of
// decryption queue since subsequent envelopes use their key material.
const { syncMessage } = content;
if (syncMessage?.pniChangeNumber) {
2022-08-15 21:53:33 +00:00
inProgressMessageType = 'pni change number';
2022-07-28 16:35:29 +00:00
await this.handlePNIChangeNumber(envelope, syncMessage.pniChangeNumber);
this.removeFromCache(envelope);
2022-07-28 16:35:29 +00:00
return { plaintext: undefined, envelope };
}
2022-08-15 21:53:33 +00:00
inProgressMessageType = '';
} catch (error) {
log.error(
`${logId}: Failed to process ${inProgressMessageType} ` +
2022-08-15 21:53:33 +00:00
`message: ${Errors.toLogFormat(error)}`
2021-07-09 19:36:10 +00:00
);
}
// We want to process GroupV2 updates, even from blocked users. We'll drop them later.
if (
!isGroupV2 &&
((envelope.source && this.isBlocked(envelope.source)) ||
(envelope.sourceServiceId &&
2023-08-16 20:54:39 +00:00
this.isServiceIdBlocked(envelope.sourceServiceId)))
) {
log.info(`${logId}: Dropping non-GV2 message from blocked sender`);
this.removeFromCache(envelope);
return { plaintext: undefined, envelope };
}
return { plaintext, envelope };
}
2021-07-09 19:36:10 +00:00
private validateUnsealedEnvelope(envelope: UnsealedEnvelope): void {
const { unsealedContent: messageContent, certificate } = envelope;
strictAssert(
messageContent !== undefined,
'Missing message content for sealed sender message'
);
strictAssert(
certificate !== undefined,
'Missing sender certificate for sealed sender message'
);
2021-07-09 19:36:10 +00:00
if (!envelope.serverTimestamp) {
2021-07-09 19:36:10 +00:00
throw new Error(
'MessageReceiver.decryptSealedSender: ' +
'Sealed sender message was missing serverTimestamp'
);
}
const serverCertificate = certificate.serverCertificate();
if (
!verifySignature(
2021-09-24 00:49:05 +00:00
this.serverTrustRoot,
serverCertificate.certificateData(),
serverCertificate.signature()
)
) {
throw new Error(
'MessageReceiver.validateUnsealedEnvelope: ' +
'Server certificate trust root validation failed'
);
}
if (
!verifySignature(
2021-09-24 00:49:05 +00:00
serverCertificate.key().serialize(),
certificate.certificate(),
certificate.signature()
)
) {
throw new Error(
'MessageReceiver.validateUnsealedEnvelope: ' +
'Server certificate server signature validation failed'
);
}
const logId = getEnvelopeId(envelope);
if (envelope.serverTimestamp > certificate.expiration()) {
throw new Error(
'MessageReceiver.validateUnsealedEnvelope: ' +
`Sender certificate is expired for envelope ${logId}, ` +
`serverTimestamp: ${envelope.serverTimestamp}, ` +
`expiration: ${certificate.expiration()}`
);
}
return undefined;
}
private async onDeliveryReceipt(envelope: ProcessedEnvelope): Promise<void> {
logUnexpectedUrgentValue(envelope, 'deliveryReceipt');
await this.dispatchAndWait(
getEnvelopeId(envelope),
new DeliveryEvent(
{
envelopeId: envelope.id,
timestamp: envelope.timestamp,
envelopeTimestamp: envelope.timestamp,
source: envelope.source,
sourceServiceId: envelope.sourceServiceId,
sourceDevice: envelope.sourceDevice,
2022-08-15 21:53:33 +00:00
wasSentEncrypted: false,
},
this.removeFromCache.bind(this, envelope)
)
);
}
private unpad(paddedPlaintext: Uint8Array): Uint8Array {
for (let i = paddedPlaintext.length - 1; i >= 0; i -= 1) {
if (paddedPlaintext[i] === 0x80) {
return new Uint8Array(paddedPlaintext.slice(0, i));
}
if (paddedPlaintext[i] !== 0x00) {
throw new Error('Invalid padding');
}
}
return paddedPlaintext;
}
private async decryptSealedSender(
{ senderKeyStore, sessionStore, identityKeyStore, zone }: LockedStores,
envelope: UnsealedEnvelope,
ciphertext: Uint8Array
): Promise<DecryptSealedSenderResult> {
const localE164 = this.storage.user.getNumber();
const { destinationServiceId } = envelope;
const localDeviceId = parseIntOrThrow(
this.storage.user.getDeviceId(),
'MessageReceiver.decryptSealedSender: localDeviceId'
);
const logId = getEnvelopeId(envelope);
const { unsealedContent: messageContent, certificate } = envelope;
strictAssert(
messageContent !== undefined,
'Missing message content for sealed sender message'
);
strictAssert(
certificate !== undefined,
'Missing sender certificate for sealed sender message'
);
2021-07-09 19:36:10 +00:00
const unidentifiedSenderTypeEnum =
Proto.UnidentifiedSenderMessage.Message.Type;
if (
messageContent.msgType() === unidentifiedSenderTypeEnum.PLAINTEXT_CONTENT
) {
log.info(
`MessageReceiver.decryptSealedSender(${logId}): ` +
'unidentified message/plaintext contents'
2021-07-09 19:36:10 +00:00
);
const plaintextContent = PlaintextContent.deserialize(
messageContent.contents()
);
return {
plaintext: plaintextContent.body(),
2023-05-04 15:09:49 +00:00
wasEncrypted: false,
2021-07-09 19:36:10 +00:00
};
}
if (
messageContent.msgType() === unidentifiedSenderTypeEnum.SENDERKEY_MESSAGE
) {
log.info(
`MessageReceiver.decryptSealedSender(${logId}): ` +
'unidentified message/sender key contents'
2021-07-09 19:36:10 +00:00
);
const sealedSenderIdentifier = certificate.senderUuid();
const sealedSenderSourceDevice = certificate.senderDeviceId();
strictAssert(
isServiceIdString(sealedSenderIdentifier),
'Sealed sender identifier is service id'
);
const address = new QualifiedAddress(
destinationServiceId,
Address.create(sealedSenderIdentifier, sealedSenderSourceDevice)
);
2021-07-09 19:36:10 +00:00
const plaintext = await this.storage.protocol.enqueueSenderKeyJob(
address,
() =>
groupDecrypt(
ProtocolAddress.new(
sealedSenderIdentifier,
sealedSenderSourceDevice
2021-07-09 19:36:10 +00:00
),
senderKeyStore,
messageContent.contents()
),
zone
);
2023-05-04 15:09:49 +00:00
return { plaintext, wasEncrypted: true };
2021-07-09 19:36:10 +00:00
}
log.info(
`MessageReceiver.decryptSealedSender(${logId}): ` +
'unidentified message/passing to sealedSenderDecryptMessage'
2021-07-09 19:36:10 +00:00
);
const preKeyStore = new PreKeys({ ourServiceId: destinationServiceId });
const signedPreKeyStore = new SignedPreKeys({
ourServiceId: destinationServiceId,
});
const kyberPreKeyStore = new KyberPreKeys({
ourServiceId: destinationServiceId,
});
const sealedSenderIdentifier = envelope.sourceServiceId;
strictAssert(
sealedSenderIdentifier !== undefined,
'Empty sealed sender identifier'
);
strictAssert(
envelope.sourceDevice !== undefined,
'Empty sealed sender device'
);
const address = new QualifiedAddress(
destinationServiceId,
Address.create(sealedSenderIdentifier, envelope.sourceDevice)
);
const unsealedPlaintext = await this.storage.protocol.enqueueSessionJob(
address,
`sealedSenderDecryptMessage(${address.toString()})`,
() =>
sealedSenderDecryptMessage(
Buffer.from(ciphertext),
PublicKey.deserialize(Buffer.from(this.serverTrustRoot)),
envelope.serverTimestamp,
localE164 || null,
destinationServiceId,
localDeviceId,
sessionStore,
identityKeyStore,
preKeyStore,
signedPreKeyStore,
kyberPreKeyStore
),
zone
);
2021-07-09 19:36:10 +00:00
2023-05-04 15:09:49 +00:00
return { unsealedPlaintext, wasEncrypted: true };
2021-07-09 19:36:10 +00:00
}
private async innerDecrypt(
stores: LockedStores,
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope,
ciphertext: Uint8Array,
serviceIdKind: ServiceIdKind
): Promise<InnerDecryptResultType | undefined> {
2021-07-09 19:36:10 +00:00
const { sessionStore, identityKeyStore, zone } = stores;
const logId = getEnvelopeId(envelope);
2021-07-09 19:36:10 +00:00
const envelopeTypeEnum = Proto.Envelope.Type;
const identifier = envelope.sourceServiceId;
2021-07-09 19:36:10 +00:00
const { sourceDevice } = envelope;
const { destinationServiceId } = envelope;
const preKeyStore = new PreKeys({ ourServiceId: destinationServiceId });
const signedPreKeyStore = new SignedPreKeys({
ourServiceId: destinationServiceId,
});
const kyberPreKeyStore = new KyberPreKeys({
ourServiceId: destinationServiceId,
});
strictAssert(identifier !== undefined, 'Empty identifier');
strictAssert(sourceDevice !== undefined, 'Empty source device');
const address = new QualifiedAddress(
destinationServiceId,
Address.create(identifier, sourceDevice)
);
if (
serviceIdKind === ServiceIdKind.PNI &&
envelope.type !== envelopeTypeEnum.PREKEY_BUNDLE
) {
log.warn(
`MessageReceiver.innerDecrypt(${logId}): ` +
'non-PreKey envelope on PNI'
);
return undefined;
}
strictAssert(
serviceIdKind === ServiceIdKind.PNI ||
serviceIdKind === ServiceIdKind.ACI,
`Unsupported serviceIdKind: ${serviceIdKind}`
);
2021-05-28 19:11:19 +00:00
if (envelope.type === envelopeTypeEnum.PLAINTEXT_CONTENT) {
log.info(`decrypt/${logId}: plaintext message`);
2021-07-09 19:36:10 +00:00
const buffer = Buffer.from(ciphertext);
2021-05-28 19:11:19 +00:00
const plaintextContent = PlaintextContent.deserialize(buffer);
return {
plaintext: this.unpad(plaintextContent.body()),
wasEncrypted: false,
};
2021-07-09 19:36:10 +00:00
}
if (envelope.type === envelopeTypeEnum.CIPHERTEXT) {
log.info(`decrypt/${logId}: ciphertext message`);
if (!identifier) {
throw new Error(
2021-07-09 19:36:10 +00:00
'MessageReceiver.innerDecrypt: No identifier for CIPHERTEXT message'
);
}
if (!sourceDevice) {
throw new Error(
2021-07-09 19:36:10 +00:00
'MessageReceiver.innerDecrypt: No sourceDevice for CIPHERTEXT message'
);
}
2021-07-09 19:36:10 +00:00
const signalMessage = SignalMessage.deserialize(Buffer.from(ciphertext));
const plaintext = await this.storage.protocol.enqueueSessionJob(
address,
`signalDecrypt(${address.toString()})`,
async () =>
this.unpad(
await signalDecrypt(
signalMessage,
ProtocolAddress.new(identifier, sourceDevice),
sessionStore,
identityKeyStore
)
),
zone
);
return { plaintext, wasEncrypted: true };
2021-07-09 19:36:10 +00:00
}
if (envelope.type === envelopeTypeEnum.PREKEY_BUNDLE) {
log.info(`decrypt/${logId}: prekey message`);
if (!identifier) {
throw new Error(
2021-07-09 19:36:10 +00:00
'MessageReceiver.innerDecrypt: No identifier for PREKEY_BUNDLE message'
);
}
if (!sourceDevice) {
throw new Error(
2021-07-09 19:36:10 +00:00
'MessageReceiver.innerDecrypt: No sourceDevice for PREKEY_BUNDLE message'
);
}
const preKeySignalMessage = PreKeySignalMessage.deserialize(
2021-07-09 19:36:10 +00:00
Buffer.from(ciphertext)
);
const plaintext = await this.storage.protocol.enqueueSessionJob(
address,
`signalDecryptPreKey(${address.toString()})`,
async () =>
this.unpad(
await signalDecryptPreKey(
preKeySignalMessage,
ProtocolAddress.new(identifier, sourceDevice),
sessionStore,
identityKeyStore,
preKeyStore,
signedPreKeyStore,
kyberPreKeyStore
)
),
zone
);
return { plaintext, wasEncrypted: true };
2021-07-09 19:36:10 +00:00
}
if (envelope.type === envelopeTypeEnum.UNIDENTIFIED_SENDER) {
log.info(`decrypt/${logId}: unidentified message`);
2023-05-04 15:09:49 +00:00
const { plaintext, unsealedPlaintext, wasEncrypted } =
await this.decryptSealedSender(stores, envelope, ciphertext);
2021-07-09 19:36:10 +00:00
if (plaintext) {
2023-05-04 15:09:49 +00:00
return { plaintext: this.unpad(plaintext), wasEncrypted };
2021-07-09 19:36:10 +00:00
}
2021-07-09 19:36:10 +00:00
if (unsealedPlaintext) {
const content = unsealedPlaintext.message();
if (!content) {
throw new Error(
2021-07-09 19:36:10 +00:00
'MessageReceiver.innerDecrypt: Content returned was falsey!'
);
}
// Return just the content because that matches the signature of the other
// decrypt methods used above.
2023-05-04 15:09:49 +00:00
return { plaintext: this.unpad(content), wasEncrypted };
2021-07-09 19:36:10 +00:00
}
2021-07-09 19:36:10 +00:00
throw new Error('Unexpected lack of plaintext from unidentified sender');
}
throw new Error('Unknown message type');
}
2021-02-18 16:40:26 +00:00
private async decrypt(
2021-07-09 19:36:10 +00:00
stores: LockedStores,
envelope: UnsealedEnvelope,
ciphertext: Uint8Array,
serviceIdKind: ServiceIdKind
): Promise<InnerDecryptResultType | undefined> {
2021-07-09 19:36:10 +00:00
try {
return await this.innerDecrypt(
stores,
envelope,
ciphertext,
serviceIdKind
);
2021-07-09 19:36:10 +00:00
} catch (error) {
const uuid = envelope.sourceServiceId;
const deviceId = envelope.sourceDevice;
const ourAci = this.storage.user.getCheckedAci();
const isFromMe = ourAci === uuid;
// Job timed out, not a decryption error
2021-07-09 19:36:10 +00:00
if (
error?.name === 'TimeoutError' ||
error?.message?.includes?.('task did not complete in time')
2021-07-09 19:36:10 +00:00
) {
this.removeFromCache(envelope);
2021-02-18 16:40:26 +00:00
throw error;
2021-07-09 19:36:10 +00:00
}
// We don't do anything if it's just a duplicated message
if (error?.message?.includes?.('message with old counter')) {
this.removeFromCache(envelope);
throw error;
}
2021-07-09 19:36:10 +00:00
// We don't do a light session reset if it's an error with the sealed sender
// wrapper, since we don't trust the sender information.
if (error?.message?.includes?.('trust root validation failed')) {
this.removeFromCache(envelope);
2021-07-09 19:36:10 +00:00
throw error;
}
if (
(envelope.source && this.isBlocked(envelope.source)) ||
(envelope.sourceServiceId &&
2023-08-16 20:54:39 +00:00
this.isServiceIdBlocked(envelope.sourceServiceId))
) {
log.info(
'MessageReceiver.decrypt: Error from blocked sender; no further processing'
);
this.removeFromCache(envelope);
throw error;
}
const envelopeId = getEnvelopeId(envelope);
2021-07-09 19:36:10 +00:00
if (uuid && deviceId) {
const senderAci = uuid;
2023-08-16 20:54:39 +00:00
if (!isAciString(senderAci)) {
log.info(
'MessageReceiver.decrypt: Error from PNI; no further processing'
);
this.removeFromCache(envelope);
throw error;
}
2023-08-17 00:29:39 +00:00
if (serviceIdKind === ServiceIdKind.PNI) {
log.info(
'MessageReceiver.decrypt: Error on PNI; no further processing; ' +
'queueing pni identity check'
);
this.pniIdentityKeyCheckRequired = true;
this.removeFromCache(envelope);
throw error;
}
const { cipherTextBytes, cipherTextType } = envelope;
const event = new DecryptionErrorEvent(
{
cipherTextBytes,
cipherTextType,
contentHint:
envelope.contentHint ??
(isFromMe ? ContentHint.Resendable : undefined),
groupId: envelope.groupId,
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
senderDevice: deviceId,
senderAci,
timestamp: envelope.timestamp,
},
() => this.removeFromCache(envelope)
);
2021-07-09 19:36:10 +00:00
// Avoid deadlocks by scheduling processing on decrypted queue
drop(
this.addToQueue(
async () => this.dispatchEvent(event),
`decrypted/dispatchEvent/DecryptionErrorEvent(${envelopeId})`,
TaskType.Decrypted
)
);
2021-07-09 19:36:10 +00:00
} else {
this.removeFromCache(envelope);
log.error(
2021-07-09 19:36:10 +00:00
`MessageReceiver.decrypt: Envelope ${envelopeId} missing uuid or deviceId`
);
}
throw error;
}
2021-02-18 16:40:26 +00:00
}
private async handleSentMessage(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
sentContainer: ProcessedSent
) {
log.info('MessageReceiver.handleSentMessage', getEnvelopeId(envelope));
logUnexpectedUrgentValue(envelope, 'sentSync');
const {
destination,
destinationServiceId,
timestamp,
message: msg,
expirationStartTimestamp,
unidentifiedStatus,
isRecipientUpdate,
} = sentContainer;
if (!msg) {
throw new Error('MessageReceiver.handleSentMessage: message was falsey!');
}
// TODO: DESKTOP-5804
2021-07-09 19:36:10 +00:00
if (msg.flags && msg.flags & Proto.DataMessage.Flags.END_SESSION) {
if (destinationServiceId) {
await this.handleEndSession(envelope, destinationServiceId);
2021-09-10 17:17:32 +00:00
} else {
throw new Error(
'MessageReceiver.handleSentMessage: Cannot end session with falsey destination'
);
}
}
2021-07-09 19:36:10 +00:00
const message = this.processDecrypted(envelope, msg);
2021-07-09 19:36:10 +00:00
const groupId = this.getProcessedGroupId(message);
const isBlocked = groupId ? this.isGroupBlocked(groupId) : false;
if (groupId && isBlocked) {
log.warn(
`Message ${getEnvelopeId(envelope)} ignored; destined for blocked group`
2021-07-09 19:36:10 +00:00
);
this.removeFromCache(envelope);
return undefined;
}
2021-07-09 19:36:10 +00:00
const ev = new SentEvent(
{
envelopeId: envelope.id,
2021-07-09 19:36:10 +00:00
destination: dropNull(destination),
destinationServiceId,
2022-03-23 20:49:27 +00:00
timestamp: timestamp?.toNumber(),
2021-07-09 19:36:10 +00:00
serverTimestamp: envelope.serverTimestamp,
device: envelope.sourceDevice,
unidentifiedStatus,
message,
isRecipientUpdate: Boolean(isRecipientUpdate),
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
2022-03-23 20:49:27 +00:00
expirationStartTimestamp: expirationStartTimestamp?.toNumber(),
2021-07-09 19:36:10 +00:00
},
this.removeFromCache.bind(this, envelope)
2018-05-02 16:51:22 +00:00
);
return this.dispatchAndWait(getEnvelopeId(envelope), ev);
}
2022-03-04 21:14:52 +00:00
private async handleStoryMessage(
envelope: UnsealedEnvelope,
2022-07-01 00:52:03 +00:00
msg: Proto.IStoryMessage,
sentMessage?: ProcessedSent
): Promise<void> {
const envelopeId = getEnvelopeId(envelope);
const logId = `MessageReceiver.handleStoryMessage(${envelopeId})`;
2022-03-04 21:14:52 +00:00
logUnexpectedUrgentValue(envelope, 'story');
2022-03-04 21:14:52 +00:00
if (getStoriesBlocked()) {
log.info(`${logId}: dropping`);
this.removeFromCache(envelope);
return;
}
log.info(`${logId} starting`);
const { sourceServiceId: sourceAci } = envelope;
strictAssert(
isAciString(sourceAci),
'MessageReceiver.handleEditMesage: received message from PNI'
);
const attachments: Array<ProcessedAttachment> = [];
let preview: ReadonlyArray<ProcessedPreview> | undefined;
2022-03-04 21:14:52 +00:00
if (msg.fileAttachment) {
const attachment = processAttachment(msg.fileAttachment);
attachments.push(attachment);
}
if (msg.textAttachment) {
2023-01-07 00:55:12 +00:00
// If a text attachment has a link preview we remove it from the
// textAttachment data structure and instead process the preview and add
// it as a "preview" property for the message attributes.
const { text, preview: unprocessedPreview } = msg.textAttachment;
if (unprocessedPreview) {
preview = processPreview([unprocessedPreview]);
} else if (!text) {
throw new Error('Text attachments must have text or link preview!');
}
2022-04-06 01:18:07 +00:00
attachments.push({
size: text?.length ?? 0,
2022-08-02 19:31:55 +00:00
contentType: TEXT_ATTACHMENT,
textAttachment: omit(msg.textAttachment, 'preview'),
2022-04-06 01:18:07 +00:00
blurHash: generateBlurHash(
(msg.textAttachment.color ||
msg.textAttachment.gradient?.startColor) ??
undefined
),
});
2022-03-04 21:14:52 +00:00
}
2022-04-15 00:08:46 +00:00
const groupV2 = msg.group ? processGroupV2Context(msg.group) : undefined;
if (groupV2 && this.isGroupBlocked(groupV2.id)) {
log.warn(`${logId}: ignored; destined for blocked group`);
2022-04-15 00:08:46 +00:00
this.removeFromCache(envelope);
return;
}
const timeRemaining = Math.min(
Math.floor(envelope.timestamp + durations.DAY - Date.now()),
durations.DAY
);
if (timeRemaining <= 0) {
log.info(`${logId}: story already expired`);
this.removeFromCache(envelope);
2022-03-04 21:14:52 +00:00
return;
}
const message: ProcessedDataMessage = {
2022-07-01 00:52:03 +00:00
attachments,
bodyRanges: filterAndClean(msg.bodyRanges),
preview,
2022-07-01 00:52:03 +00:00
canReplyToStory: Boolean(msg.allowsReplies),
2022-11-16 20:18:02 +00:00
expireTimer: DurationInSeconds.DAY,
2022-07-01 00:52:03 +00:00
flags: 0,
groupV2,
isStory: true,
isViewOnce: false,
timestamp: envelope.timestamp,
};
2022-08-05 01:13:26 +00:00
if (sentMessage && message.groupV2) {
log.warn(`${logId}: envelope is a sent group story`);
2022-08-05 01:13:26 +00:00
const ev = new SentEvent(
{
envelopeId: envelope.id,
destinationServiceId: envelope.destinationServiceId,
device: envelope.sourceDevice,
2022-08-05 01:13:26 +00:00
isRecipientUpdate: Boolean(sentMessage.isRecipientUpdate),
message,
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
serverTimestamp: envelope.serverTimestamp,
timestamp: envelope.timestamp,
unidentifiedStatus: sentMessage.storyMessageRecipients
?.map(({ destinationServiceId, isAllowedToReply }) => {
if (!destinationServiceId) {
return;
}
return {
destinationServiceId,
isAllowedToReplyToStory: Boolean(isAllowedToReply),
};
})
.filter(isNotNil),
2022-08-05 01:13:26 +00:00
},
this.removeFromCache.bind(this, envelope)
);
void this.dispatchAndWait(logId, ev);
2022-08-05 01:13:26 +00:00
return;
}
2022-07-01 00:52:03 +00:00
if (sentMessage) {
log.warn(`${logId}: envelope is a sent distribution list story`);
2022-07-01 00:52:03 +00:00
const { storyMessageRecipients } = sentMessage;
const recipients = storyMessageRecipients ?? [];
const isAllowedToReply = new Map<ServiceIdString, boolean>();
const distributionListToSentServiceId = new Map<
2023-06-29 19:17:27 +00:00
string,
Set<ServiceIdString>
2023-06-29 19:17:27 +00:00
>();
2022-07-01 00:52:03 +00:00
recipients.forEach(recipient => {
const { destinationServiceId } = recipient;
if (!destinationServiceId) {
2022-07-01 00:52:03 +00:00
return;
}
if (recipient.distributionListIds) {
recipient.distributionListIds.forEach(listId => {
const sentServiceIds: Set<ServiceIdString> =
distributionListToSentServiceId.get(listId) || new Set();
sentServiceIds.add(destinationServiceId);
distributionListToSentServiceId.set(listId, sentServiceIds);
});
} else {
assertDev(
false,
`${logId}: missing distribution list id for: ${destinationServiceId}`
);
}
2022-07-01 00:52:03 +00:00
isAllowedToReply.set(
destinationServiceId,
2022-07-13 23:09:18 +00:00
recipient.isAllowedToReply !== false
2022-07-01 00:52:03 +00:00
);
});
distributionListToSentServiceId.forEach((sentToServiceIds, listId) => {
2022-07-01 00:52:03 +00:00
const ev = new SentEvent(
{
envelopeId: envelope.id,
destinationServiceId: envelope.destinationServiceId,
2022-07-01 00:52:03 +00:00
timestamp: envelope.timestamp,
serverTimestamp: envelope.serverTimestamp,
device: envelope.sourceDevice,
unidentifiedStatus: Array.from(sentToServiceIds).map(
destinationServiceId => ({
destinationServiceId,
isAllowedToReplyToStory:
isAllowedToReply.has(destinationServiceId),
2022-07-01 00:52:03 +00:00
})
),
message,
isRecipientUpdate: Boolean(sentMessage.isRecipientUpdate),
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
storyDistributionListId: normalizeStoryDistributionId(
listId,
'storyDistributionListId'
),
2022-07-01 00:52:03 +00:00
},
this.removeFromCache.bind(this, envelope)
);
void this.dispatchAndWait(logId, ev);
2022-07-01 00:52:03 +00:00
});
return;
}
log.warn(`${logId}: envelope is a received story`);
2022-03-04 21:14:52 +00:00
const ev = new MessageEvent(
{
envelopeId: envelope.id,
2022-03-04 21:14:52 +00:00
source: envelope.source,
sourceAci,
2022-03-04 21:14:52 +00:00
sourceDevice: envelope.sourceDevice,
destinationServiceId: envelope.destinationServiceId,
2022-03-04 21:14:52 +00:00
timestamp: envelope.timestamp,
serverGuid: envelope.serverGuid,
serverTimestamp: envelope.serverTimestamp,
unidentifiedDeliveryReceived: Boolean(
envelope.unidentifiedDeliveryReceived
),
2022-07-01 00:52:03 +00:00
message,
2022-03-04 21:14:52 +00:00
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
},
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
2022-03-04 21:14:52 +00:00
}
2023-03-27 23:48:57 +00:00
private async handleEditMessage(
envelope: UnsealedEnvelope,
msg: Proto.IEditMessage
): Promise<void> {
const logId = `MessageReceiver.handleEditMessage(${getEnvelopeId(
envelope
)})`;
log.info(logId);
if (!msg.targetSentTimestamp) {
log.info(`${logId}: cannot edit message. No targetSentTimestamp`);
this.removeFromCache(envelope);
return;
}
if (!msg.dataMessage) {
log.info(`${logId}: cannot edit message. No dataMessage`);
this.removeFromCache(envelope);
return;
}
const message = this.processDecrypted(envelope, msg.dataMessage);
const groupId = this.getProcessedGroupId(message);
const isBlocked = groupId ? this.isGroupBlocked(groupId) : false;
if (groupId && isBlocked) {
2023-03-27 23:48:57 +00:00
log.warn(
`Message ${getEnvelopeId(envelope)} ignored; destined for blocked group`
);
this.removeFromCache(envelope);
return;
}
const { sourceServiceId: sourceAci } = envelope;
strictAssert(
isAciString(sourceAci),
'MessageReceiver.handleEditMesage: received message from PNI'
);
2023-03-27 23:48:57 +00:00
const ev = new MessageEvent(
{
envelopeId: envelope.id,
2023-03-27 23:48:57 +00:00
source: envelope.source,
sourceAci,
2023-03-27 23:48:57 +00:00
sourceDevice: envelope.sourceDevice,
destinationServiceId: envelope.destinationServiceId,
2023-03-27 23:48:57 +00:00
timestamp: envelope.timestamp,
serverGuid: envelope.serverGuid,
serverTimestamp: envelope.serverTimestamp,
unidentifiedDeliveryReceived: Boolean(
envelope.unidentifiedDeliveryReceived
),
message: {
...message,
editedMessageTimestamp: msg.targetSentTimestamp.toNumber(),
},
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
},
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
}
2022-03-04 21:14:52 +00:00
private async handleDataMessage(
envelope: UnsealedEnvelope,
msg: Proto.IDataMessage
): Promise<void> {
const logId = getEnvelopeId(envelope);
2022-03-04 21:14:52 +00:00
log.info('MessageReceiver.handleDataMessage', logId);
if (getStoriesBlocked() && msg.storyContext) {
log.info(
`MessageReceiver.handleDataMessage/${logId}: Dropping incoming dataMessage with storyContext field`
);
this.removeFromCache(envelope);
return;
}
let p: Promise<void> = Promise.resolve();
const { sourceServiceId: sourceAci } = envelope;
if (!sourceAci) {
throw new Error(
'MessageReceiver.handleDataMessage: sourceAci was falsey'
);
}
strictAssert(
isAciString(sourceAci),
'MessageReceiver.handleDataMessage: received message from PNI'
);
2020-11-20 17:30:45 +00:00
if (this.isInvalidGroupData(msg, envelope)) {
this.removeFromCache(envelope);
return undefined;
}
2021-07-09 19:36:10 +00:00
if (msg.flags && msg.flags & Proto.DataMessage.Flags.END_SESSION) {
p = this.handleEndSession(envelope, sourceAci);
}
2020-05-27 21:37:06 +00:00
2021-07-09 19:36:10 +00:00
if (msg.flags && msg.flags & Proto.DataMessage.Flags.PROFILE_KEY_UPDATE) {
strictAssert(
2022-09-14 16:40:50 +00:00
msg.profileKey != null && msg.profileKey.length > 0,
'PROFILE_KEY_UPDATE without profileKey'
);
2021-07-09 19:36:10 +00:00
logUnexpectedUrgentValue(envelope, 'profileKeyUpdate');
2021-07-09 19:36:10 +00:00
const ev = new ProfileKeyUpdateEvent(
{
source: envelope.source,
sourceAci,
2021-07-09 19:36:10 +00:00
profileKey: Bytes.toBase64(msg.profileKey),
},
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
2020-05-27 21:37:06 +00:00
}
2021-07-09 19:36:10 +00:00
await p;
let type: SendTypesType = 'message';
if (msg.storyContext || msg.body) {
type = 'message';
} else if (msg.reaction) {
type = 'reaction';
} else if (msg.delete) {
type = 'deleteForEveryone';
} else if (
msg.flags &&
msg.flags & Proto.DataMessage.Flags.EXPIRATION_TIMER_UPDATE
) {
type = 'expirationTimerUpdate';
}
// Note: other data messages without any of these attributes will fall into the
// 'message' bucket - like stickers, gift badges, etc.
logUnexpectedUrgentValue(envelope, type);
const message = this.processDecrypted(envelope, msg);
2021-07-09 19:36:10 +00:00
const groupId = this.getProcessedGroupId(message);
const isBlocked = groupId ? this.isGroupBlocked(groupId) : false;
2020-05-27 21:37:06 +00:00
if (groupId && isBlocked) {
log.warn(
`Message ${getEnvelopeId(envelope)} ignored; destined for blocked group`
2021-07-09 19:36:10 +00:00
);
this.removeFromCache(envelope);
return undefined;
}
2021-07-09 19:36:10 +00:00
const ev = new MessageEvent(
{
envelopeId: envelope.id,
2021-07-09 19:36:10 +00:00
source: envelope.source,
sourceAci,
2021-07-09 19:36:10 +00:00
sourceDevice: envelope.sourceDevice,
destinationServiceId: envelope.destinationServiceId,
2021-07-09 19:36:10 +00:00
timestamp: envelope.timestamp,
serverGuid: envelope.serverGuid,
serverTimestamp: envelope.serverTimestamp,
unidentifiedDeliveryReceived: Boolean(
envelope.unidentifiedDeliveryReceived
),
message,
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
},
this.removeFromCache.bind(this, envelope)
2018-05-02 16:51:22 +00:00
);
2023-03-27 23:48:57 +00:00
return this.dispatchAndWait(logId, ev);
}
private async maybeUpdateTimestamp(
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope
): Promise<UnsealedEnvelope> {
const { retryPlaceholders } = window.Signal.Services;
if (!retryPlaceholders) {
log.warn('maybeUpdateTimestamp: retry placeholders not available!');
return envelope;
}
const { timestamp } = envelope;
const identifier = envelope.groupId || envelope.sourceServiceId;
const conversation = window.ConversationController.get(identifier);
try {
if (!conversation) {
const idForLogging = envelope.groupId
? `groupv2(${envelope.groupId})`
: envelope.sourceServiceId;
log.info(
`maybeUpdateTimestamp/${timestamp}: No conversation found for identifier ${idForLogging}`
);
return envelope;
}
const logId = `${conversation.idForLogging()}/${timestamp}`;
const item = await retryPlaceholders.findByMessageAndRemove(
conversation.id,
timestamp
);
if (item && item.wasOpened) {
log.info(
`maybeUpdateTimestamp/${logId}: found retry placeholder, but conversation was opened. No updates made.`
);
} else if (item) {
log.info(
`maybeUpdateTimestamp/${logId}: found retry placeholder. Updating receivedAtCounter/receivedAtDate`
);
return {
...envelope,
receivedAtCounter: item.receivedAtCounter,
receivedAtDate: item.receivedAt,
};
}
} catch (error) {
log.error(
`maybeUpdateTimestamp/${timestamp}: Failed to process message: ${Errors.toLogFormat(
error
)}`
);
}
return envelope;
}
private async innerHandleContentMessage(
2022-08-15 21:53:33 +00:00
incomingEnvelope: UnsealedEnvelope,
plaintext: Uint8Array
): Promise<void> {
const content = Proto.Content.decode(plaintext);
const envelope = await this.maybeUpdateTimestamp(incomingEnvelope);
2021-05-28 19:11:19 +00:00
if (
content.decryptionErrorMessage &&
2021-07-09 19:36:10 +00:00
Bytes.isNotEmpty(content.decryptionErrorMessage)
2021-05-28 19:11:19 +00:00
) {
this.handleDecryptionError(envelope, content.decryptionErrorMessage);
2021-05-28 19:11:19 +00:00
return;
}
if (content.syncMessage) {
2021-07-09 19:36:10 +00:00
await this.handleSyncMessage(
envelope,
processSyncMessage(content.syncMessage)
);
return;
}
if (content.dataMessage) {
await this.handleDataMessage(envelope, content.dataMessage);
return;
}
if (content.nullMessage) {
this.handleNullMessage(envelope);
return;
}
if (content.callingMessage) {
await this.handleCallingMessage(envelope, content.callingMessage);
return;
}
if (content.receiptMessage) {
await this.handleReceiptMessage(envelope, content.receiptMessage);
return;
}
if (content.typingMessage) {
this.handleTypingMessage(envelope, content.typingMessage);
return;
}
if (content.storyMessage) {
await this.handleStoryMessage(envelope, content.storyMessage);
return;
}
2023-03-27 23:48:57 +00:00
if (content.editMessage) {
await this.handleEditMessage(envelope, content.editMessage);
return;
}
this.removeFromCache(envelope);
2021-07-09 19:36:10 +00:00
if (Bytes.isEmpty(content.senderKeyDistributionMessage)) {
throw new Error('Unsupported content message');
}
}
private handleDecryptionError(
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
decryptionError: Uint8Array
): void {
const logId = getEnvelopeId(envelope);
log.info(`handleDecryptionError: ${logId}`);
2021-05-28 19:11:19 +00:00
logUnexpectedUrgentValue(envelope, 'retryRequest');
2021-07-09 19:36:10 +00:00
const buffer = Buffer.from(decryptionError);
2021-05-28 19:11:19 +00:00
const request = DecryptionErrorMessage.deserialize(buffer);
const { sourceServiceId: sourceAci, sourceDevice } = envelope;
if (!sourceAci || !sourceDevice) {
log.error(`handleDecryptionError/${logId}: Missing uuid or device!`);
this.removeFromCache(envelope);
2021-05-28 19:11:19 +00:00
return;
}
strictAssert(isAciString(sourceAci), 'Source uuid must be ACI');
const event = new RetryRequestEvent(
{
groupId: envelope.groupId,
requesterDevice: sourceDevice,
requesterAci: sourceAci,
ratchetKey: request.ratchetKey(),
senderDevice: request.deviceId(),
sentAt: request.timestamp(),
},
() => this.removeFromCache(envelope)
);
this.dispatchEvent(event);
2021-05-28 19:11:19 +00:00
}
private async handleSenderKeyDistributionMessage(
stores: LockedStores,
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
distributionMessage: Uint8Array
): Promise<void> {
const envelopeId = getEnvelopeId(envelope);
log.info(`handleSenderKeyDistributionMessage/${envelopeId}`);
logUnexpectedUrgentValue(envelope, 'senderKeyDistributionMessage');
// Note: we don't call removeFromCache here because this message can be combined
// with a dataMessage, for example. That processing will dictate cache removal.
const { sourceServiceId, sourceDevice } = envelope;
if (!sourceServiceId) {
throw new Error(
`handleSenderKeyDistributionMessage: Missing sourceServiceId for envelope ${envelopeId}`
);
}
if (!isNumber(sourceDevice)) {
throw new Error(
`handleSenderKeyDistributionMessage: Missing sourceDevice for envelope ${envelopeId}`
);
}
const sender = ProtocolAddress.new(sourceServiceId, sourceDevice);
2021-11-11 22:43:05 +00:00
const senderKeyDistributionMessage =
SenderKeyDistributionMessage.deserialize(
Buffer.from(distributionMessage)
);
const { destinationServiceId } = envelope;
const address = new QualifiedAddress(
destinationServiceId,
Address.create(sourceServiceId, sourceDevice)
);
await this.storage.protocol.enqueueSenderKeyJob(
address,
() =>
processSenderKeyDistributionMessage(
sender,
senderKeyDistributionMessage,
stores.senderKeyStore
),
stores.zone
);
}
2022-08-15 21:53:33 +00:00
private async handlePniSignatureMessage(
envelope: UnsealedEnvelope,
pniSignatureMessage: Proto.IPniSignatureMessage
): Promise<void> {
const envelopeId = getEnvelopeId(envelope);
const logId = `handlePniSignatureMessage/${envelopeId}`;
log.info(logId);
// Note: we don't call removeFromCache here because this message can be combined
// with a dataMessage, for example. That processing will dictate cache removal.
const aci = envelope.sourceServiceId;
2022-08-15 21:53:33 +00:00
const { pni: pniBytes, signature } = pniSignatureMessage;
strictAssert(Bytes.isNotEmpty(pniBytes), `${logId}: missing PNI bytes`);
2023-09-14 20:39:51 +00:00
const pni = fromPniObject(Pni.fromUuidBytes(Buffer.from(pniBytes)));
2022-08-15 21:53:33 +00:00
strictAssert(pni, `${logId}: missing PNI`);
strictAssert(Bytes.isNotEmpty(signature), `${logId}: empty signature`);
strictAssert(isAciString(aci), `${logId}: invalid ACI`);
strictAssert(isPniString(pni), `${logId}: invalid PNI`);
2022-08-15 21:53:33 +00:00
const isValid = await this.storage.protocol.verifyAlternateIdentity({
aci,
pni,
2022-08-15 21:53:33 +00:00
signature,
});
if (isValid) {
log.info(`${logId}: merging pni=${pni} aci=${aci}`);
const { mergePromises } =
window.ConversationController.maybeMergeContacts({
pni,
aci,
e164: window.ConversationController.get(pni)?.get('e164'),
fromPniSignature: true,
reason: logId,
});
if (mergePromises.length) {
await Promise.all(mergePromises);
}
2022-08-15 21:53:33 +00:00
}
}
private async handleCallingMessage(
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
callingMessage: Proto.ICallingMessage
): Promise<void> {
logUnexpectedUrgentValue(envelope, 'callingMessage');
this.removeFromCache(envelope);
2022-11-19 08:31:31 +00:00
if (
(envelope.source && this.isBlocked(envelope.source)) ||
2023-08-16 20:54:39 +00:00
(envelope.sourceServiceId &&
this.isServiceIdBlocked(envelope.sourceServiceId))
2022-11-19 08:31:31 +00:00
) {
const logId = getEnvelopeId(envelope);
log.info(`${logId}: Dropping calling message from blocked sender`);
this.removeFromCache(envelope);
return;
}
2020-06-04 18:16:19 +00:00
await window.Signal.Services.calling.handleCallingMessage(
envelope,
callingMessage
);
}
private async handleReceiptMessage(
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
receiptMessage: Proto.IReceiptMessage
): Promise<void> {
2021-07-09 19:36:10 +00:00
strictAssert(receiptMessage.timestamp, 'Receipt message without timestamp');
let EventClass: typeof DeliveryEvent | typeof ReadEvent | typeof ViewEvent;
let type: SendTypesType;
switch (receiptMessage.type) {
case Proto.ReceiptMessage.Type.DELIVERY:
EventClass = DeliveryEvent;
type = 'deliveryReceipt';
break;
case Proto.ReceiptMessage.Type.READ:
EventClass = ReadEvent;
type = 'readReceipt';
break;
case Proto.ReceiptMessage.Type.VIEWED:
EventClass = ViewEvent;
type = 'viewedReceipt';
break;
default:
// This can happen if we get a receipt type we don't know about yet, which
// is totally fine.
return;
}
logUnexpectedUrgentValue(envelope, type);
const logId = getEnvelopeId(envelope);
await Promise.all(
receiptMessage.timestamp.map(async rawTimestamp => {
const ev = new EventClass(
2021-07-09 19:36:10 +00:00
{
envelopeId: envelope.id,
2022-03-23 20:49:27 +00:00
timestamp: rawTimestamp?.toNumber(),
2021-07-09 19:36:10 +00:00
envelopeTimestamp: envelope.timestamp,
source: envelope.source,
sourceServiceId: envelope.sourceServiceId,
sourceDevice: envelope.sourceDevice,
2022-08-15 21:53:33 +00:00
wasSentEncrypted: true,
2021-07-09 19:36:10 +00:00
},
this.removeFromCache.bind(this, envelope)
);
await this.dispatchAndWait(logId, ev);
})
);
}
private handleTypingMessage(
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
typingMessage: Proto.ITypingMessage
): void {
2018-11-14 19:10:32 +00:00
this.removeFromCache(envelope);
logUnexpectedUrgentValue(envelope, 'typing');
2018-11-14 19:10:32 +00:00
if (envelope.timestamp && typingMessage.timestamp) {
2021-07-09 19:36:10 +00:00
const envelopeTimestamp = envelope.timestamp;
2022-03-23 20:49:27 +00:00
const typingTimestamp = typingMessage.timestamp?.toNumber();
2018-11-14 19:10:32 +00:00
if (typingTimestamp !== envelopeTimestamp) {
log.warn(
2018-11-14 19:10:32 +00:00
`Typing message envelope timestamp (${envelopeTimestamp}) did not match typing timestamp (${typingTimestamp})`
);
return;
2018-11-14 19:10:32 +00:00
}
}
2021-07-09 19:36:10 +00:00
strictAssert(
envelope.sourceDevice !== undefined,
'TypingMessage requires sourceDevice in the envelope'
);
strictAssert(
isAciString(envelope.sourceServiceId),
'Sender of typing indicator must be an ACI'
);
2018-11-14 19:10:32 +00:00
2021-07-09 19:36:10 +00:00
const { groupId, timestamp, action } = typingMessage;
2020-11-20 17:30:45 +00:00
2021-07-09 19:36:10 +00:00
let groupV2IdString: string | undefined;
if (groupId && groupId.byteLength === GROUPV2_ID_LENGTH) {
groupV2IdString = Bytes.toBase64(groupId);
} else {
log.error('handleTypingMessage: Received invalid groupId value');
2020-11-20 17:30:45 +00:00
}
this.dispatchEvent(
2021-07-09 19:36:10 +00:00
new TypingEvent({
sender: envelope.source,
senderAci: envelope.sourceServiceId,
2021-07-09 19:36:10 +00:00
senderDevice: envelope.sourceDevice,
typing: {
groupV2Id: groupV2IdString,
2021-07-09 19:36:10 +00:00
typingMessage,
2022-03-23 20:49:27 +00:00
timestamp: timestamp?.toNumber() ?? Date.now(),
2021-07-09 19:36:10 +00:00
started: action === Proto.TypingMessage.Action.STARTED,
stopped: action === Proto.TypingMessage.Action.STOPPED,
},
})
);
}
2022-08-15 21:53:33 +00:00
private handleNullMessage(envelope: UnsealedEnvelope): void {
log.info('MessageReceiver.handleNullMessage', getEnvelopeId(envelope));
logUnexpectedUrgentValue(envelope, 'nullMessage');
this.removeFromCache(envelope);
}
private isInvalidGroupData(
2021-07-09 19:36:10 +00:00
message: Proto.IDataMessage,
envelope: ProcessedEnvelope
2020-11-20 17:30:45 +00:00
): boolean {
const { groupV2 } = message;
2020-11-20 17:30:45 +00:00
if (groupV2) {
2021-07-09 19:36:10 +00:00
const { masterKey } = groupV2;
strictAssert(masterKey, 'Group v2 data has no masterKey');
2020-11-20 17:30:45 +00:00
const isInvalid = masterKey.byteLength !== MASTER_KEY_LENGTH;
if (isInvalid) {
log.info(
2020-11-20 17:30:45 +00:00
'isInvalidGroupData: invalid GroupV2 message from',
getEnvelopeId(envelope)
2020-11-20 17:30:45 +00:00
);
}
return isInvalid;
}
return false;
}
private getProcessedGroupId(
message: ProcessedDataMessage
): string | undefined {
2021-07-09 19:36:10 +00:00
if (message.groupV2) {
return message.groupV2.id;
2020-09-09 02:25:05 +00:00
}
2021-07-09 19:36:10 +00:00
return undefined;
2020-09-09 02:25:05 +00:00
}
private getGroupId(message: Proto.IDataMessage): string | undefined {
2020-09-09 02:25:05 +00:00
if (message.groupV2) {
2021-07-09 19:36:10 +00:00
strictAssert(message.groupV2.masterKey, 'Missing groupV2.masterKey');
const { id } = deriveGroupFields(message.groupV2.masterKey);
return Bytes.toBase64(id);
2020-09-09 02:25:05 +00:00
}
2021-07-09 19:36:10 +00:00
return undefined;
2020-09-09 02:25:05 +00:00
}
2023-06-29 19:17:27 +00:00
private getDestination(sentMessage: ProcessedSent) {
2020-09-09 02:25:05 +00:00
if (sentMessage.message && sentMessage.message.groupV2) {
2021-07-09 19:36:10 +00:00
return `groupv2(${this.getGroupId(sentMessage.message)})`;
}
return sentMessage.destinationServiceId;
2020-09-09 02:25:05 +00:00
}
private async handleSyncMessage(
2022-08-15 21:53:33 +00:00
envelope: UnsealedEnvelope,
2021-07-09 19:36:10 +00:00
syncMessage: ProcessedSyncMessage
): Promise<void> {
const ourNumber = this.storage.user.getNumber();
const ourAci = this.storage.user.getCheckedAci();
const fromSelfSource = envelope.source && envelope.source === ourNumber;
const fromSelfSourceUuid =
envelope.sourceServiceId && envelope.sourceServiceId === ourAci;
if (!fromSelfSource && !fromSelfSourceUuid) {
throw new Error('Received sync message from another number');
}
const ourDeviceId = this.storage.user.getDeviceId();
// eslint-disable-next-line eqeqeq
if (envelope.sourceDevice == ourDeviceId) {
throw new Error('Received sync message from our own device');
}
if (syncMessage.sent) {
const sentMessage = syncMessage.sent;
2023-03-27 23:48:57 +00:00
if (sentMessage.editMessage) {
return this.handleSentEditMessage(envelope, sentMessage);
}
2022-07-13 23:09:18 +00:00
if (sentMessage.storyMessageRecipients && sentMessage.isRecipientUpdate) {
if (getStoriesBlocked()) {
log.info(
'MessageReceiver.handleSyncMessage: dropping story recipients update',
getEnvelopeId(envelope)
);
this.removeFromCache(envelope);
return;
}
2022-07-29 23:01:33 +00:00
log.info(
'MessageReceiver.handleSyncMessage: handling story recipients update',
2022-07-29 23:01:33 +00:00
getEnvelopeId(envelope)
);
2022-07-13 23:09:18 +00:00
const ev = new StoryRecipientUpdateEvent(
{
destinationServiceId: envelope.destinationServiceId,
2022-07-13 23:09:18 +00:00
timestamp: envelope.timestamp,
storyMessageRecipients: sentMessage.storyMessageRecipients,
},
this.removeFromCache.bind(this, envelope)
);
const logId = getEnvelopeId(envelope);
return this.dispatchAndWait(logId, ev);
2022-07-13 23:09:18 +00:00
}
if (sentMessage.storyMessage) {
2023-03-27 23:48:57 +00:00
return this.handleStoryMessage(
envelope,
sentMessage.storyMessage,
sentMessage
);
}
if (!sentMessage || !sentMessage.message) {
throw new Error(
'MessageReceiver.handleSyncMessage: sync sent message was missing message'
);
}
2020-09-09 02:25:05 +00:00
2020-11-20 17:30:45 +00:00
if (this.isInvalidGroupData(sentMessage.message, envelope)) {
this.removeFromCache(envelope);
2022-07-28 16:35:29 +00:00
return;
2020-11-20 17:30:45 +00:00
}
2021-07-09 19:36:10 +00:00
strictAssert(sentMessage.timestamp, 'sent message without timestamp');
log.info(
'sent message to',
2020-09-09 02:25:05 +00:00
this.getDestination(sentMessage),
2022-03-23 20:49:27 +00:00
sentMessage.timestamp?.toNumber(),
'from',
getEnvelopeId(envelope)
);
2023-03-27 23:48:57 +00:00
return this.handleSentMessage(envelope, sentMessage);
}
if (syncMessage.contacts) {
// Note: this method will download attachment and thus might block
// message processing, but we would like to fully process contact sync
// before moving on since it updates conversation state.
return this.handleContacts(envelope, syncMessage.contacts);
}
if (syncMessage.blocked) {
return this.handleBlocked(envelope, syncMessage.blocked);
}
if (syncMessage.request) {
log.info('Got SyncMessage Request');
this.removeFromCache(envelope);
2022-07-28 16:35:29 +00:00
return;
}
if (syncMessage.read && syncMessage.read.length) {
return this.handleRead(envelope, syncMessage.read);
}
if (syncMessage.verified) {
log.info('Got verified sync message, dropping');
this.removeFromCache(envelope);
2022-07-28 16:35:29 +00:00
return;
}
if (syncMessage.configuration) {
return this.handleConfiguration(envelope, syncMessage.configuration);
}
if (
2019-06-26 19:33:13 +00:00
syncMessage.stickerPackOperation &&
syncMessage.stickerPackOperation.length > 0
) {
return this.handleStickerPackOperation(
envelope,
syncMessage.stickerPackOperation
);
}
if (syncMessage.viewOnceOpen) {
2019-08-05 20:53:15 +00:00
return this.handleViewOnceOpen(envelope, syncMessage.viewOnceOpen);
}
if (syncMessage.messageRequestResponse) {
2020-05-27 21:37:06 +00:00
return this.handleMessageRequestResponse(
envelope,
syncMessage.messageRequestResponse
);
}
if (syncMessage.fetchLatest) {
return this.handleFetchLatest(envelope, syncMessage.fetchLatest);
}
if (syncMessage.keys) {
return this.handleKeys(envelope, syncMessage.keys);
}
if (syncMessage.viewed && syncMessage.viewed.length) {
return this.handleViewed(envelope, syncMessage.viewed);
}
2023-01-10 00:52:01 +00:00
if (syncMessage.callEvent) {
return this.handleCallEvent(envelope, syncMessage.callEvent);
}
2023-08-09 00:53:06 +00:00
if (syncMessage.callLogEvent) {
return this.handleCallLogEvent(envelope, syncMessage.callLogEvent);
}
this.removeFromCache(envelope);
const envelopeId = getEnvelopeId(envelope);
const unknownFieldTags = inspectUnknownFieldTags(syncMessage).join(',');
log.warn(
`handleSyncMessage/${envelopeId}: Got unknown SyncMessage (Unknown field tags: ${unknownFieldTags})`
);
}
2023-03-27 23:48:57 +00:00
private async handleSentEditMessage(
envelope: UnsealedEnvelope,
sentMessage: ProcessedSent
): Promise<void> {
const logId = `MessageReceiver.handleSentEditMessage(${getEnvelopeId(
envelope
)})`;
log.info(logId);
const { editMessage } = sentMessage;
if (!editMessage) {
log.warn(`${logId}: cannot edit message. No editMessage in proto`);
this.removeFromCache(envelope);
return;
}
if (!editMessage.targetSentTimestamp) {
log.warn(`${logId}: cannot edit message. No targetSentTimestamp`);
this.removeFromCache(envelope);
return;
}
if (!editMessage.dataMessage) {
log.warn(`${logId}: cannot edit message. No dataMessage`);
this.removeFromCache(envelope);
return;
}
const {
destination,
destinationServiceId,
2023-03-27 23:48:57 +00:00
expirationStartTimestamp,
unidentifiedStatus,
isRecipientUpdate,
} = sentMessage;
const message = this.processDecrypted(envelope, editMessage.dataMessage);
const ev = new SentEvent(
{
envelopeId: envelope.id,
2023-03-27 23:48:57 +00:00
destination: dropNull(destination),
destinationServiceId,
2023-03-27 23:48:57 +00:00
timestamp: envelope.timestamp,
serverTimestamp: envelope.serverTimestamp,
device: envelope.sourceDevice,
unidentifiedStatus,
message: {
...message,
editedMessageTimestamp: editMessage.targetSentTimestamp.toNumber(),
},
isRecipientUpdate: Boolean(isRecipientUpdate),
receivedAtCounter: envelope.receivedAtCounter,
receivedAtDate: envelope.receivedAtDate,
expirationStartTimestamp: expirationStartTimestamp?.toNumber(),
},
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(getEnvelopeId(envelope), ev);
}
private async handleConfiguration(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
configuration: Proto.SyncMessage.IConfiguration
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('got configuration sync message', logId);
logUnexpectedUrgentValue(envelope, 'configurationSync');
2021-07-09 19:36:10 +00:00
const ev = new ConfigurationEvent(
configuration,
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
}
private async handleViewOnceOpen(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
sync: Proto.SyncMessage.IViewOnceOpen
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('got view once open sync message', logId);
2019-06-26 19:33:13 +00:00
logUnexpectedUrgentValue(envelope, 'viewOnceSync');
const ev = new ViewOnceOpenSyncEvent(
2021-07-09 19:36:10 +00:00
{
source: dropNull(sync.sender),
sourceAci: sync.senderAci
? normalizeAci(sync.senderAci, 'handleViewOnceOpen.senderUuid')
2021-07-09 19:36:10 +00:00
: undefined,
2022-03-23 20:49:27 +00:00
timestamp: sync.timestamp?.toNumber(),
2021-07-09 19:36:10 +00:00
},
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
}
private async handleMessageRequestResponse(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
sync: Proto.SyncMessage.IMessageRequestResponse
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('got message request response sync message', logId);
2020-05-27 21:37:06 +00:00
logUnexpectedUrgentValue(envelope, 'messageRequestSync');
2021-07-09 19:36:10 +00:00
const { groupId } = sync;
let groupV2IdString: string | undefined;
if (groupId && groupId.byteLength === GROUPV2_ID_LENGTH) {
groupV2IdString = Bytes.toBase64(groupId);
} else {
this.removeFromCache(envelope);
log.error('Received message request with invalid groupId');
return undefined;
2020-11-20 17:30:45 +00:00
}
2021-07-09 19:36:10 +00:00
const ev = new MessageRequestResponseEvent(
{
envelopeId: envelope.id,
2021-07-09 19:36:10 +00:00
threadE164: dropNull(sync.threadE164),
threadAci: sync.threadAci
? normalizeAci(
sync.threadAci,
2021-07-09 19:36:10 +00:00
'handleMessageRequestResponse.threadUuid'
)
: undefined,
messageRequestResponseType: sync.type,
groupV2Id: groupV2IdString,
},
this.removeFromCache.bind(this, envelope)
2020-05-27 21:37:06 +00:00
);
2020-11-20 17:30:45 +00:00
return this.dispatchAndWait(logId, ev);
}
private async handleFetchLatest(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
sync: Proto.SyncMessage.IFetchLatest
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('got fetch latest sync message', logId);
logUnexpectedUrgentValue(envelope, 'fetchLatestManifestSync');
2021-07-09 19:36:10 +00:00
const ev = new FetchLatestEvent(
sync.type,
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
}
private async handleKeys(
envelope: ProcessedEnvelope,
sync: Proto.SyncMessage.IKeys
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('got keys sync message', logId);
logUnexpectedUrgentValue(envelope, 'keySync');
if (!sync.storageService && !sync.master) {
return undefined;
}
2021-07-09 19:36:10 +00:00
const ev = new KeysEvent(
{
storageServiceKey: Bytes.isNotEmpty(sync.storageService)
? sync.storageService
: undefined,
masterKey: Bytes.isNotEmpty(sync.master) ? sync.master : undefined,
},
2021-07-09 19:36:10 +00:00
this.removeFromCache.bind(this, envelope)
);
2020-05-27 21:37:06 +00:00
return this.dispatchAndWait(logId, ev);
2020-05-27 21:37:06 +00:00
}
2022-07-28 16:35:29 +00:00
// Runs on TaskType.Encrypted queue
private async handlePNIChangeNumber(
envelope: ProcessedEnvelope,
{
identityKeyPair,
signedPreKey,
lastResortKyberPreKey,
2022-07-28 16:35:29 +00:00
registrationId,
newE164,
2022-07-28 16:35:29 +00:00
}: Proto.SyncMessage.IPniChangeNumber
): Promise<void> {
log.info('MessageReceiver: got pni change number sync message');
logUnexpectedUrgentValue(envelope, 'pniIdentitySync');
const { updatedPni } = envelope;
if (!updatedPni) {
log.warn('MessageReceiver: missing pni in change number sync message');
return;
}
// TDOO: DESKTOP-5652
2022-07-28 16:35:29 +00:00
if (
!Bytes.isNotEmpty(identityKeyPair) ||
!Bytes.isNotEmpty(signedPreKey) ||
!isNumber(registrationId) ||
!isString(newE164)
2022-07-28 16:35:29 +00:00
) {
log.warn('MessageReceiver: empty pni change number sync message');
return;
}
2023-08-17 00:29:39 +00:00
if (this.pniIdentityKeyCheckRequired) {
log.warn('MessageReceiver: canceling pni identity key check');
}
this.pniIdentityKeyCheckRequired = false;
2022-07-28 16:35:29 +00:00
const manager = window.getAccountManager();
await manager.setPni(updatedPni, {
2022-07-28 16:35:29 +00:00
identityKeyPair,
lastResortKyberPreKey: dropNull(lastResortKyberPreKey),
2022-07-28 16:35:29 +00:00
signedPreKey,
registrationId,
});
await window.storage.user.setNumber(newE164);
}
private async handleStickerPackOperation(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
operations: Array<Proto.SyncMessage.IStickerPackOperation>
): Promise<void> {
2021-07-09 19:36:10 +00:00
const ENUM = Proto.SyncMessage.StickerPackOperation.Type;
const logId = getEnvelopeId(envelope);
log.info('got sticker pack operation sync message', logId);
logUnexpectedUrgentValue(envelope, 'stickerPackSync');
2021-07-09 19:36:10 +00:00
const stickerPacks = operations.map(operation => ({
id: operation.packId ? Bytes.toHex(operation.packId) : undefined,
key: operation.packKey ? Bytes.toBase64(operation.packKey) : undefined,
isInstall: operation.type === ENUM.INSTALL,
isRemove: operation.type === ENUM.REMOVE,
}));
2021-07-09 19:36:10 +00:00
const ev = new StickerPackEvent(
stickerPacks,
this.removeFromCache.bind(this, envelope)
);
return this.dispatchAndWait(logId, ev);
}
private async handleRead(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
read: Array<Proto.SyncMessage.IRead>
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('MessageReceiver.handleRead', logId);
logUnexpectedUrgentValue(envelope, 'readSync');
const results = [];
for (const { timestamp, sender, senderAci } of read) {
2021-07-09 19:36:10 +00:00
const ev = new ReadSyncEvent(
{
envelopeId: envelope.id,
2021-07-09 19:36:10 +00:00
envelopeTimestamp: envelope.timestamp,
2022-03-23 20:49:27 +00:00
timestamp: timestamp?.toNumber(),
2021-07-09 19:36:10 +00:00
sender: dropNull(sender),
senderAci: senderAci
? normalizeAci(senderAci, 'handleRead.senderAci')
2021-07-09 19:36:10 +00:00
: undefined,
},
this.removeFromCache.bind(this, envelope)
);
results.push(this.dispatchAndWait(logId, ev));
}
await Promise.all(results);
}
private async handleViewed(
envelope: ProcessedEnvelope,
viewed: ReadonlyArray<Proto.SyncMessage.IViewed>
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('MessageReceiver.handleViewed', logId);
logUnexpectedUrgentValue(envelope, 'viewSync');
await Promise.all(
viewed.map(async ({ timestamp, senderE164, senderAci }) => {
const ev = new ViewSyncEvent(
{
envelopeId: envelope.id,
envelopeTimestamp: envelope.timestamp,
2022-03-23 20:49:27 +00:00
timestamp: timestamp?.toNumber(),
senderE164: dropNull(senderE164),
senderAci: senderAci
? normalizeAci(senderAci, 'handleViewed.senderAci')
: undefined,
},
this.removeFromCache.bind(this, envelope)
);
await this.dispatchAndWait(logId, ev);
})
);
}
2023-01-10 00:52:01 +00:00
private async handleCallEvent(
envelope: ProcessedEnvelope,
callEvent: Proto.SyncMessage.ICallEvent
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('MessageReceiver.handleCallEvent', logId);
logUnexpectedUrgentValue(envelope, 'callEventSync');
2023-08-09 00:53:06 +00:00
const { receivedAtCounter } = envelope;
2023-08-09 00:53:06 +00:00
const callEventDetails = getCallEventForProto(callEvent);
2023-01-10 00:52:01 +00:00
2023-08-09 00:53:06 +00:00
const callEventSync = new CallEventSyncEvent(
{
callEventDetails,
receivedAtCounter,
},
this.removeFromCache.bind(this, envelope)
2023-01-10 00:52:01 +00:00
);
2023-08-09 00:53:06 +00:00
await this.dispatchAndWait(logId, callEventSync);
2023-01-10 00:52:01 +00:00
2023-08-09 00:53:06 +00:00
log.info('handleCallEvent: finished');
}
private async handleCallLogEvent(
envelope: ProcessedEnvelope,
callLogEvent: Proto.SyncMessage.ICallLogEvent
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info('MessageReceiver.handleCallLogEvent', logId);
2023-01-10 00:52:01 +00:00
2023-08-09 00:53:06 +00:00
logUnexpectedUrgentValue(envelope, 'callLogEventSync');
2023-01-10 00:52:01 +00:00
2023-08-09 00:53:06 +00:00
const { receivedAtCounter } = envelope;
2023-01-10 00:52:01 +00:00
2023-08-09 00:53:06 +00:00
let event: CallLogEvent;
if (callLogEvent.type == null) {
throw new Error('MessageReceiver.handleCallLogEvent: type was null');
} else if (
callLogEvent.type === Proto.SyncMessage.CallLogEvent.Type.CLEAR
) {
event = CallLogEvent.Clear;
} else {
throw new Error(
`MessageReceiver.handleCallLogEvent: unknown type ${callLogEvent.type}`
);
}
if (callLogEvent.timestamp == null) {
throw new Error('MessageReceiver.handleCallLogEvent: timestamp was null');
}
const timestamp = callLogEvent.timestamp.toNumber();
const callLogEventSync = new CallLogEventSyncEvent(
2023-01-10 00:52:01 +00:00
{
2023-08-09 00:53:06 +00:00
event,
timestamp,
2023-01-10 00:52:01 +00:00
receivedAtCounter,
},
this.removeFromCache.bind(this, envelope)
);
2023-08-09 00:53:06 +00:00
await this.dispatchAndWait(logId, callLogEventSync);
log.info('handleCallLogEvent: finished');
2023-01-10 00:52:01 +00:00
}
private async handleContacts(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
contactSyncProto: Proto.SyncMessage.IContacts
): Promise<void> {
const logId = getEnvelopeId(envelope);
log.info(`MessageReceiver: handleContacts ${logId}`);
const { blob } = contactSyncProto;
if (!blob) {
throw new Error('MessageReceiver.handleContacts: blob field was missing');
}
logUnexpectedUrgentValue(envelope, 'contactSync');
this.removeFromCache(envelope);
let attachment: AttachmentType | undefined;
try {
attachment = await this.handleAttachmentV2(blob, {
disableRetries: true,
timeout: 90 * SECOND,
});
const { path } = attachment;
if (!path) {
throw new Error('Failed no path field in returned attachment');
}
const absolutePath =
window.Signal.Migrations.getAbsoluteAttachmentPath(path);
if (!existsSync(absolutePath)) {
throw new Error(
'Contact sync attachment had path, but it was not found on disk'
);
}
let contacts: ReadonlyArray<ContactDetailsWithAvatar>;
try {
contacts = await parseContactsV2({
absolutePath,
});
} finally {
if (absolutePath) {
removeSync(absolutePath);
}
}
2022-03-02 22:53:47 +00:00
const contactSync = new ContactSyncEvent(
contacts,
Boolean(contactSyncProto.complete),
envelope.receivedAtCounter,
envelope.timestamp
);
await this.dispatchAndWait(logId, contactSync);
log.info('handleContacts: finished');
} finally {
if (attachment?.path) {
await window.Signal.Migrations.deleteAttachmentData(attachment.path);
}
}
}
private async handleBlocked(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
blocked: Proto.SyncMessage.IBlocked
): Promise<void> {
const allIdentifiers = [];
let changed = false;
2023-05-03 20:51:57 +00:00
const logId = `handleBlocked(${getEnvelopeId(envelope)})`;
logUnexpectedUrgentValue(envelope, 'blockSync');
if (blocked.numbers) {
const previous = this.storage.get('blocked', []);
2023-05-03 20:51:57 +00:00
log.info(`${logId}: Blocking these numbers:`, blocked.numbers);
await this.storage.put('blocked', blocked.numbers);
if (!areArraysMatchingSets(previous, blocked.numbers)) {
changed = true;
allIdentifiers.push(...previous);
allIdentifiers.push(...blocked.numbers);
}
}
if (blocked.acis) {
const previous = this.storage.get('blocked-uuids', []);
const acis = blocked.acis.map((aci, index) => {
return normalizeAci(aci, `handleBlocked.acis.${index}`);
2021-07-09 19:36:10 +00:00
});
log.info(`${logId}: Blocking these acis:`, acis);
await this.storage.put('blocked-uuids', acis);
if (!areArraysMatchingSets(previous, acis)) {
changed = true;
allIdentifiers.push(...previous);
allIdentifiers.push(...blocked.acis);
}
}
if (blocked.groupIds) {
const previous = this.storage.get('blocked-groups', []);
const groupIds: Array<string> = [];
blocked.groupIds.forEach(groupId => {
if (groupId.byteLength === GROUPV2_ID_LENGTH) {
groupIds.push(Bytes.toBase64(groupId));
} else {
2023-05-03 20:51:57 +00:00
log.error(`${logId}: Received invalid groupId value`);
}
});
log.info(
2023-05-03 20:51:57 +00:00
`${logId}: Blocking these groups - v2:`,
groupIds.map(groupId => `groupv2(${groupId})`)
);
await this.storage.put('blocked-groups', groupIds);
if (!areArraysMatchingSets(previous, groupIds)) {
changed = true;
allIdentifiers.push(...previous);
allIdentifiers.push(...groupIds);
}
}
this.removeFromCache(envelope);
if (changed) {
2023-05-03 20:51:57 +00:00
log.info(`${logId}: Block list changed, forcing re-render.`);
const uniqueIdentifiers = Array.from(new Set(allIdentifiers));
void window.ConversationController.forceRerender(uniqueIdentifiers);
}
}
private isBlocked(number: string): boolean {
return this.storage.blocked.isBlocked(number);
}
2023-08-16 20:54:39 +00:00
private isServiceIdBlocked(serviceId: ServiceIdString): boolean {
return this.storage.blocked.isServiceIdBlocked(serviceId);
}
private isGroupBlocked(groupId: string): boolean {
return this.storage.blocked.isGroupBlocked(groupId);
}
private async handleAttachmentV2(
attachment: Proto.IAttachmentPointer,
options?: { timeout?: number; disableRetries?: boolean }
): Promise<AttachmentType> {
2021-07-09 19:36:10 +00:00
const cleaned = processAttachment(attachment);
return downloadAttachmentV2(this.server, cleaned, options);
}
private async handleEndSession(
envelope: ProcessedEnvelope,
theirServiceId: ServiceIdString
): Promise<void> {
log.info(`handleEndSession: closing sessions for ${theirServiceId}`);
logUnexpectedUrgentValue(envelope, 'resetSession');
await this.storage.protocol.archiveAllSessions(theirServiceId);
}
private processDecrypted(
2021-07-09 19:36:10 +00:00
envelope: ProcessedEnvelope,
decrypted: Proto.IDataMessage
): ProcessedDataMessage {
2021-07-09 19:36:10 +00:00
return processDataMessage(decrypted, envelope.timestamp);
}
}
function envelopeTypeToCiphertextType(type: number | undefined): number {
const { Type } = Proto.Envelope;
if (type === Type.CIPHERTEXT) {
return CiphertextMessageType.Whisper;
}
if (type === Type.KEY_EXCHANGE) {
throw new Error(
'envelopeTypeToCiphertextType: Cannot process KEY_EXCHANGE messages'
);
}
if (type === Type.PLAINTEXT_CONTENT) {
return CiphertextMessageType.Plaintext;
}
if (type === Type.PREKEY_BUNDLE) {
return CiphertextMessageType.PreKey;
}
if (type === Type.RECEIPT) {
return CiphertextMessageType.Plaintext;
}
if (type === Type.UNIDENTIFIED_SENDER) {
throw new Error(
'envelopeTypeToCiphertextType: Cannot process UNIDENTIFIED_SENDER messages'
);
}
if (type === Type.UNKNOWN) {
throw new Error(
'envelopeTypeToCiphertextType: Cannot process UNKNOWN messages'
);
}
throw new Error(`envelopeTypeToCiphertextType: Unknown type ${type}`);
}