signal-desktop/ts/util/sendToGroup.ts

1365 lines
38 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2021 Signal Messenger, LLC
2021-05-25 22:40:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
import { differenceWith, omit, partition } from 'lodash';
import { v4 as generateUuid } from 'uuid';
2021-05-25 22:40:04 +00:00
import {
ErrorCode,
LibSignalErrorBase,
2021-05-25 22:40:04 +00:00
groupEncrypt,
ProtocolAddress,
sealedSenderMultiRecipientEncrypt,
SenderCertificate,
UnidentifiedSenderMessageContent,
} from '@signalapp/libsignal-client';
import * as Bytes from '../Bytes';
2021-05-25 22:40:04 +00:00
import { senderCertificateService } from '../services/senderCertificate';
import type { SendLogCallbackType } from '../textsecure/OutgoingMessage';
2021-05-25 22:40:04 +00:00
import {
padMessage,
SenderCertificateMode,
} from '../textsecure/OutgoingMessage';
import { Address } from '../types/Address';
import { QualifiedAddress } from '../types/QualifiedAddress';
import * as Errors from '../types/errors';
2023-12-07 23:59:54 +00:00
import { getValue } from '../RemoteConfig';
import type { ServiceIdString } from '../types/ServiceId';
import { ServiceIdKind } from '../types/ServiceId';
import { isRecord } from './isRecord';
2021-05-25 22:40:04 +00:00
import { isOlderThan } from './timestamp';
import type {
2021-05-25 22:40:04 +00:00
GroupSendOptionsType,
SendOptionsType,
} from '../textsecure/SendMessage';
import {
ConnectTimeoutError,
IncorrectSenderKeyAuthError,
OutgoingIdentityKeyError,
SendMessageProtoError,
UnknownRecipientError,
UnregisteredUserError,
} from '../textsecure/Errors';
import type { HTTPError } from '../textsecure/Errors';
2021-05-25 22:40:04 +00:00
import { IdentityKeys, SenderKeys, Sessions } from '../LibSignalStores';
import type { ConversationModel } from '../models/conversations';
import type { DeviceType, CallbackResultType } from '../textsecure/Types.d';
import { getKeysForServiceId } from '../textsecure/getKeysForServiceId';
import type {
ConversationAttributesType,
SenderKeyInfoType,
} from '../model-types.d';
import type { SendTypesType } from './handleMessageSend';
import { handleMessageSend, shouldSaveProto } from './handleMessageSend';
import { SEALED_SENDER } from '../types/SealedSender';
2021-05-25 22:40:04 +00:00
import { parseIntOrThrow } from './parseIntOrThrow';
import {
multiRecipient200ResponseSchema,
multiRecipient409ResponseSchema,
multiRecipient410ResponseSchema,
} from '../textsecure/WebAPI';
2021-07-09 19:36:10 +00:00
import { SignalService as Proto } from '../protobuf';
2021-05-25 22:40:04 +00:00
import { strictAssert } from './assert';
import * as log from '../logging/log';
import { GLOBAL_ZONE } from '../SignalProtocolStore';
import { waitForAll } from './waitForAll';
2021-05-25 22:40:04 +00:00
const UNKNOWN_RECIPIENT = 404;
const INCORRECT_AUTH_KEY = 401;
2021-05-25 22:40:04 +00:00
const ERROR_EXPIRED_OR_MISSING_DEVICES = 409;
const ERROR_STALE_DEVICES = 410;
const HOUR = 60 * 60 * 1000;
const DAY = 24 * HOUR;
// sendWithSenderKey is recursive, but we don't want to loop back too many times.
const MAX_RECURSION = 10;
2021-05-25 22:40:04 +00:00
const ACCESS_KEY_LENGTH = 16;
const ZERO_ACCESS_KEY = Bytes.toBase64(new Uint8Array(ACCESS_KEY_LENGTH));
2021-05-25 22:40:04 +00:00
// Public API:
export type SenderKeyTargetType = {
getGroupId: () => string | undefined;
getMembers: () => Array<ConversationModel>;
hasMember: (serviceId: ServiceIdString) => boolean;
idForLogging: () => string;
isGroupV2: () => boolean;
isValid: () => boolean;
getSenderKeyInfo: () => SenderKeyInfoType | undefined;
saveSenderKeyInfo: (senderKeyInfo: SenderKeyInfoType) => Promise<void>;
};
export async function sendToGroup({
2022-05-23 22:08:13 +00:00
abortSignal,
contentHint,
groupSendOptions,
isPartialSend,
messageId,
sendOptions,
sendTarget,
sendType,
story,
urgent,
}: {
2022-05-23 22:08:13 +00:00
abortSignal?: AbortSignal;
contentHint: number;
groupSendOptions: GroupSendOptionsType;
isPartialSend?: boolean;
messageId: string | undefined;
sendOptions?: SendOptionsType;
sendTarget: SenderKeyTargetType;
sendType: SendTypesType;
story?: boolean;
urgent: boolean;
}): Promise<CallbackResultType> {
strictAssert(
2021-05-25 22:40:04 +00:00
window.textsecure.messaging,
'sendToGroup: textsecure.messaging not available!'
);
const { timestamp } = groupSendOptions;
const recipients = getRecipients(groupSendOptions);
// First, do the attachment upload and prepare the proto we'll be sending
2021-11-11 22:43:05 +00:00
const protoAttributes =
window.textsecure.messaging.getAttrsFromGroupOptions(groupSendOptions);
2021-05-25 22:40:04 +00:00
const contentMessage = await window.textsecure.messaging.getContentMessage(
protoAttributes
);
2022-05-23 22:08:13 +00:00
// Attachment upload might take too long to succeed - we don't want to proceed
// with the send if the caller aborted this call.
if (abortSignal?.aborted) {
throw new Error('sendToGroup was aborted');
}
2021-05-25 22:40:04 +00:00
return sendContentMessageToGroup({
2021-05-28 19:11:19 +00:00
contentHint,
2021-05-25 22:40:04 +00:00
contentMessage,
isPartialSend,
messageId,
2021-05-25 22:40:04 +00:00
recipients,
sendOptions,
sendTarget,
sendType,
story,
2021-05-25 22:40:04 +00:00
timestamp,
urgent,
2021-05-25 22:40:04 +00:00
});
}
// Note: This is the group send chokepoint. The 1:1 send chokepoint is sendMessageProto.
2021-05-25 22:40:04 +00:00
export async function sendContentMessageToGroup({
2021-05-28 19:11:19 +00:00
contentHint,
2021-05-25 22:40:04 +00:00
contentMessage,
isPartialSend,
messageId,
2021-05-25 22:40:04 +00:00
online,
recipients,
sendOptions,
sendTarget,
sendType,
story,
2021-05-25 22:40:04 +00:00
timestamp,
urgent,
2021-05-25 22:40:04 +00:00
}: {
2021-05-28 19:11:19 +00:00
contentHint: number;
2021-07-09 19:36:10 +00:00
contentMessage: Proto.Content;
2021-05-25 22:40:04 +00:00
isPartialSend?: boolean;
messageId: string | undefined;
2021-05-25 22:40:04 +00:00
online?: boolean;
recipients: ReadonlyArray<ServiceIdString>;
2021-05-25 22:40:04 +00:00
sendOptions?: SendOptionsType;
sendTarget: SenderKeyTargetType;
sendType: SendTypesType;
story?: boolean;
2021-05-25 22:40:04 +00:00
timestamp: number;
urgent: boolean;
2021-05-25 22:40:04 +00:00
}): Promise<CallbackResultType> {
const logId = sendTarget.idForLogging();
const accountManager = window.getAccountManager();
if (accountManager.areKeysOutOfDate(ServiceIdKind.ACI)) {
log.warn(
`sendToGroup/${logId}: Keys are out of date; updating before send`
);
await accountManager.maybeUpdateKeys(ServiceIdKind.ACI);
if (accountManager.areKeysOutOfDate(ServiceIdKind.ACI)) {
throw new Error('Keys still out of date after update');
}
}
strictAssert(
2021-05-25 22:40:04 +00:00
window.textsecure.messaging,
'sendContentMessageToGroup: textsecure.messaging not available!'
);
2023-12-07 23:59:54 +00:00
if (sendTarget.isValid()) {
2021-05-25 22:40:04 +00:00
try {
return await sendToGroupViaSenderKey({
2021-05-28 19:11:19 +00:00
contentHint,
2021-05-25 22:40:04 +00:00
contentMessage,
isPartialSend,
messageId,
2021-05-25 22:40:04 +00:00
online,
recipients,
recursionCount: 0,
sendOptions,
sendTarget,
sendType,
story,
2021-05-25 22:40:04 +00:00
timestamp,
urgent,
2021-05-25 22:40:04 +00:00
});
} catch (error: unknown) {
if (!(error instanceof Error)) {
throw error;
}
if (_shouldFailSend(error, logId)) {
throw error;
}
log.error(
2021-05-25 22:40:04 +00:00
`sendToGroup/${logId}: Sender Key send failed, logging, proceeding to normal send`,
Errors.toLogFormat(error)
2021-05-25 22:40:04 +00:00
);
}
}
const sendLogCallback = window.textsecure.messaging.makeSendLogCallback({
contentHint,
messageId,
proto: Buffer.from(Proto.Content.encode(contentMessage).finish()),
sendType,
timestamp,
urgent,
2022-08-15 21:53:33 +00:00
hasPniSignatureMessage: false,
});
const groupId = sendTarget.isGroupV2() ? sendTarget.getGroupId() : undefined;
return window.textsecure.messaging.sendGroupProto({
2021-05-28 19:11:19 +00:00
contentHint,
groupId,
options: { ...sendOptions, online },
proto: contentMessage,
recipients,
sendLogCallback,
story,
timestamp,
urgent,
});
2021-05-25 22:40:04 +00:00
}
// The Primary Sender Key workflow
export async function sendToGroupViaSenderKey(options: {
2021-05-28 19:11:19 +00:00
contentHint: number;
2021-07-09 19:36:10 +00:00
contentMessage: Proto.Content;
2021-05-25 22:40:04 +00:00
isPartialSend?: boolean;
messageId: string | undefined;
2021-05-25 22:40:04 +00:00
online?: boolean;
recipients: ReadonlyArray<ServiceIdString>;
2021-05-25 22:40:04 +00:00
recursionCount: number;
sendOptions?: SendOptionsType;
sendTarget: SenderKeyTargetType;
sendType: SendTypesType;
story?: boolean;
2021-05-25 22:40:04 +00:00
timestamp: number;
urgent: boolean;
2021-05-25 22:40:04 +00:00
}): Promise<CallbackResultType> {
const {
2021-05-28 19:11:19 +00:00
contentHint,
2021-05-25 22:40:04 +00:00
contentMessage,
isPartialSend,
messageId,
2021-05-25 22:40:04 +00:00
online,
recipients,
recursionCount,
2021-05-25 22:40:04 +00:00
sendOptions,
sendTarget,
sendType,
story,
2021-05-25 22:40:04 +00:00
timestamp,
urgent,
2021-05-25 22:40:04 +00:00
} = options;
2021-07-09 19:36:10 +00:00
const { ContentHint } = Proto.UnidentifiedSenderMessage.Message;
2021-05-25 22:40:04 +00:00
const logId = sendTarget.idForLogging();
log.info(
2021-05-25 22:40:04 +00:00
`sendToGroupViaSenderKey/${logId}: Starting ${timestamp}, recursion count ${recursionCount}...`
);
if (recursionCount > MAX_RECURSION) {
throw new Error(
`sendToGroupViaSenderKey/${logId}: Too much recursion! Count is at ${recursionCount}`
);
}
const groupId = sendTarget.getGroupId();
if (!sendTarget.isValid()) {
2021-05-25 22:40:04 +00:00
throw new Error(
`sendToGroupViaSenderKey/${logId}: sendTarget is not valid!`
2021-05-25 22:40:04 +00:00
);
}
2021-05-28 19:11:19 +00:00
if (
2021-06-08 21:51:58 +00:00
contentHint !== ContentHint.DEFAULT &&
2021-05-28 19:11:19 +00:00
contentHint !== ContentHint.RESENDABLE &&
2021-06-08 21:51:58 +00:00
contentHint !== ContentHint.IMPLICIT
2021-05-28 19:11:19 +00:00
) {
throw new Error(
`sendToGroupViaSenderKey/${logId}: Invalid contentHint ${contentHint}`
);
}
strictAssert(
2021-05-25 22:40:04 +00:00
window.textsecure.messaging,
'sendToGroupViaSenderKey: textsecure.messaging not available!'
);
// 1. Add sender key info if we have none, or clear out if it's too old
const EXPIRE_DURATION = getSenderKeyExpireDuration();
// Note: From here on, generally need to recurse if we change senderKeyInfo
const senderKeyInfo = sendTarget.getSenderKeyInfo();
if (!senderKeyInfo) {
log.info(
2021-05-25 22:40:04 +00:00
`sendToGroupViaSenderKey/${logId}: Adding initial sender key info`
);
await sendTarget.saveSenderKeyInfo({
createdAtDate: Date.now(),
distributionId: generateUuid(),
memberDevices: [],
});
// Restart here because we updated senderKeyInfo
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
2021-05-25 22:40:04 +00:00
});
}
if (isOlderThan(senderKeyInfo.createdAtDate, EXPIRE_DURATION)) {
const { createdAtDate } = senderKeyInfo;
log.info(
2021-05-25 22:40:04 +00:00
`sendToGroupViaSenderKey/${logId}: Resetting sender key; ${createdAtDate} is too old`
);
await resetSenderKey(sendTarget);
// Restart here because we updated senderKeyInfo
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
2021-05-25 22:40:04 +00:00
}
// 2. Fetch all devices we believe we'll be sending to
const ourAci = window.textsecure.storage.user.getCheckedAci();
const { devices: currentDevices, emptyServiceIds } =
await window.textsecure.storage.protocol.getOpenDevices(ourAci, recipients);
2021-05-25 22:40:04 +00:00
// 3. If we have no open sessions with people we believe we are sending to, and we
// believe that any have signal accounts, fetch their prekey bundle and start
// sessions with them.
if (
emptyServiceIds.length > 0 &&
2023-08-16 20:54:39 +00:00
emptyServiceIds.some(isServiceIdRegistered)
2021-05-25 22:40:04 +00:00
) {
await fetchKeysForServiceIds(emptyServiceIds);
2021-05-25 22:40:04 +00:00
// Restart here to capture devices for accounts we just started sessions with
2021-05-25 22:40:04 +00:00
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
}
2023-08-16 20:54:39 +00:00
const { memberDevices, distributionId, createdAtDate } = senderKeyInfo;
const memberSet = new Set(sendTarget.getMembers());
2021-08-19 15:52:08 +00:00
2021-05-25 22:40:04 +00:00
// 4. Partition devices into sender key and non-sender key groups
const [devicesForSenderKey, devicesForNormalSend] = partition(
currentDevices,
device => isValidSenderKeyRecipient(memberSet, device.serviceId, { story })
2021-05-25 22:40:04 +00:00
);
const senderKeyRecipients = getServiceIdsFromDevices(devicesForSenderKey);
const normalSendRecipients = getServiceIdsFromDevices(devicesForNormalSend);
log.info(
`sendToGroupViaSenderKey/${logId}:` +
` ${senderKeyRecipients.length} accounts for sender key (${devicesForSenderKey.length} devices),` +
` ${normalSendRecipients.length} accounts for normal send (${devicesForNormalSend.length} devices)`
2021-05-25 22:40:04 +00:00
);
2021-05-27 20:47:39 +00:00
// 5. Ensure we have enough recipients
if (senderKeyRecipients.length < 2) {
throw new Error(
`sendToGroupViaSenderKey/${logId}: Not enough recipients for Sender Key message. Failing over.`
);
}
// 6. Analyze target devices for sender key, determine which have been added or removed
2021-05-25 22:40:04 +00:00
const {
newToMemberDevices,
newToMemberServiceIds,
2021-05-25 22:40:04 +00:00
removedFromMemberDevices,
removedFromMemberServiceIds,
2021-05-25 22:40:04 +00:00
} = _analyzeSenderKeyDevices(
memberDevices,
devicesForSenderKey,
isPartialSend
);
2021-05-27 20:47:39 +00:00
// 7. If members have been removed from the group, we need to reset our sender key, then
2021-05-25 22:40:04 +00:00
// start over to get a fresh set of target devices.
const keyNeedsReset = Array.from(removedFromMemberServiceIds).some(
serviceId => !sendTarget.hasMember(serviceId)
2021-05-25 22:40:04 +00:00
);
if (keyNeedsReset) {
await resetSenderKey(sendTarget);
2021-05-25 22:40:04 +00:00
// Restart here to start over; empty memberDevices means we'll send distribution
// message to everyone.
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
}
2021-05-27 20:47:39 +00:00
// 8. If there are new members or new devices in the group, we need to ensure that they
2021-05-25 22:40:04 +00:00
// have our sender key before we send sender key messages to them.
if (newToMemberServiceIds.length > 0) {
log.info(
2021-05-25 22:40:04 +00:00
`sendToGroupViaSenderKey/${logId}: Sending sender key to ${
newToMemberServiceIds.length
} members: ${JSON.stringify(newToMemberServiceIds)}`
2021-05-25 22:40:04 +00:00
);
try {
await handleMessageSend(
window.textsecure.messaging.sendSenderKeyDistributionMessage(
{
contentHint,
distributionId,
groupId,
serviceIds: newToMemberServiceIds,
// SKDMs should only have story=true if we're sending to a distribution list
story: sendTarget.getGroupId() ? false : story,
urgent,
},
sendOptions ? { ...sendOptions, online: false } : undefined
),
{ messageIds: [], sendType: 'senderKeyDistributionMessage' }
);
} catch (error) {
// If we partially fail to send the sender key distribution message (SKDM), we don't
// want the successful SKDM sends to be considered an overall success.
if (error instanceof SendMessageProtoError) {
throw new SendMessageProtoError({
...error,
sendIsNotFinal: true,
});
}
throw error;
}
// Update memberDevices with new devices
const updatedMemberDevices = [...memberDevices, ...newToMemberDevices];
await sendTarget.saveSenderKeyInfo({
createdAtDate,
distributionId,
2023-08-16 20:54:39 +00:00
memberDevices: updatedMemberDevices,
});
// Restart here because we might have discovered new or dropped devices as part of
// distributing our sender key.
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
2021-05-25 22:40:04 +00:00
}
// 9. Update memberDevices with removals which didn't require a reset.
if (removedFromMemberDevices.length > 0) {
2021-05-25 22:40:04 +00:00
const updatedMemberDevices = [
...differenceWith<DeviceType, DeviceType>(
memberDevices,
removedFromMemberDevices,
deviceComparator
),
];
await sendTarget.saveSenderKeyInfo({
createdAtDate,
distributionId,
2023-08-16 20:54:39 +00:00
memberDevices: updatedMemberDevices,
2021-05-25 22:40:04 +00:00
});
// Note, we do not need to restart here because we don't refer back to senderKeyInfo
// after this point.
2021-05-25 22:40:04 +00:00
}
// 10. Send the Sender Key message!
let sendLogId: number;
let senderKeyRecipientsWithDevices: Record<
ServiceIdString,
Array<number>
> = {};
devicesForSenderKey.forEach(item => {
const { id, serviceId } = item;
senderKeyRecipientsWithDevices[serviceId] ||= [];
senderKeyRecipientsWithDevices[serviceId].push(id);
});
2021-05-25 22:40:04 +00:00
try {
const messageBuffer = await encryptForSenderKey({
2021-05-28 19:11:19 +00:00
contentHint,
2021-05-25 22:40:04 +00:00
devices: devicesForSenderKey,
distributionId,
2021-09-24 00:49:05 +00:00
contentMessage: Proto.Content.encode(contentMessage).finish(),
2021-05-25 22:40:04 +00:00
groupId,
});
const accessKeys = getXorOfAccessKeys(devicesForSenderKey, { story });
2021-05-25 22:40:04 +00:00
const result = await window.textsecure.messaging.server.sendWithSenderKey(
2021-09-24 00:49:05 +00:00
messageBuffer,
accessKeys,
2021-05-25 22:40:04 +00:00
timestamp,
{ online, story, urgent }
2021-05-25 22:40:04 +00:00
);
const parsed = multiRecipient200ResponseSchema.safeParse(result);
if (parsed.success) {
const { uuids404 } = parsed.data;
if (uuids404 && uuids404.length > 0) {
await waitForAll({
2021-11-11 22:43:05 +00:00
tasks: uuids404.map(
serviceId => async () => markServiceIdUnregistered(serviceId)
2021-05-25 22:40:04 +00:00
),
});
}
senderKeyRecipientsWithDevices = omit(
senderKeyRecipientsWithDevices,
uuids404 || []
);
2021-05-25 22:40:04 +00:00
} else {
log.error(
2021-05-25 22:40:04 +00:00
`sendToGroupViaSenderKey/${logId}: Server returned unexpected 200 response ${JSON.stringify(
parsed.error.flatten()
)}`
);
}
if (shouldSaveProto(sendType)) {
sendLogId = await window.Signal.Data.insertSentProto(
{
contentHint,
proto: Buffer.from(Proto.Content.encode(contentMessage).finish()),
timestamp,
urgent,
2022-08-15 21:53:33 +00:00
hasPniSignatureMessage: false,
},
{
recipients: senderKeyRecipientsWithDevices,
messageIds: messageId ? [messageId] : [],
}
);
}
2021-05-25 22:40:04 +00:00
} catch (error) {
if (error.code === UNKNOWN_RECIPIENT) {
throw new UnknownRecipientError();
}
if (error.code === INCORRECT_AUTH_KEY) {
throw new IncorrectSenderKeyAuthError();
}
2021-05-25 22:40:04 +00:00
if (error.code === ERROR_EXPIRED_OR_MISSING_DEVICES) {
await handle409Response(logId, error);
// Restart here to capture the right set of devices for our next send.
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
}
if (error.code === ERROR_STALE_DEVICES) {
await handle410Response(sendTarget, error);
2021-05-25 22:40:04 +00:00
// Restart here to use the right registrationIds for devices we already knew about,
// as well as send our sender key to these re-registered or re-linked devices.
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
}
if (
error instanceof LibSignalErrorBase &&
error.code === ErrorCode.InvalidRegistrationId
) {
const address = error.addr as ProtocolAddress;
const name = address.name();
const brokenAccount = window.ConversationController.get(name);
if (brokenAccount) {
log.warn(
`sendToGroupViaSenderKey/${logId}: Disabling sealed sender for ${brokenAccount.idForLogging()}`
);
brokenAccount.set({ sealedSender: SEALED_SENDER.DISABLED });
window.Signal.Data.updateConversation(brokenAccount.attributes);
// Now that we've eliminate this problematic account, we can try the send again.
return sendToGroupViaSenderKey({
...options,
recursionCount: recursionCount + 1,
});
}
}
2021-05-25 22:40:04 +00:00
log.error(
`sendToGroupViaSenderKey/${logId}: Returned unexpected error code: ${
error.code
}, error class: ${typeof error}`
2021-05-25 22:40:04 +00:00
);
throw error;
2021-05-25 22:40:04 +00:00
}
// 11. Return early if there are no normal send recipients
if (normalSendRecipients.length === 0) {
2021-05-25 22:40:04 +00:00
return {
2021-07-09 19:36:10 +00:00
dataMessage: contentMessage.dataMessage
2021-09-24 00:49:05 +00:00
? Proto.DataMessage.encode(contentMessage.dataMessage).finish()
2021-07-09 19:36:10 +00:00
: undefined,
editMessage: contentMessage.editMessage
? Proto.EditMessage.encode(contentMessage.editMessage).finish()
: undefined,
successfulServiceIds: senderKeyRecipients,
2021-05-25 22:40:04 +00:00
unidentifiedDeliveries: senderKeyRecipients,
contentHint,
timestamp,
contentProto: Buffer.from(Proto.Content.encode(contentMessage).finish()),
recipients: senderKeyRecipientsWithDevices,
urgent,
2021-05-25 22:40:04 +00:00
};
}
// 12. Send normal message to the leftover normal recipients. Then combine normal send
// result with result from sender key send for final return value.
// We don't want to use a normal send log callback here, because the proto has already
// been saved as part of the Sender Key send. We're just adding recipients here.
const sendLogCallback: SendLogCallbackType = async ({
serviceId,
deviceIds,
}: {
serviceId: ServiceIdString;
deviceIds: Array<number>;
}) => {
if (!shouldSaveProto(sendType)) {
return;
}
const sentToConversation = window.ConversationController.get(serviceId);
if (!sentToConversation) {
log.warn(
`sendToGroupViaSenderKey/callback: Unable to find conversation for serviceId ${serviceId}`
);
return;
}
2023-08-16 20:54:39 +00:00
const recipientServiceId = sentToConversation.getServiceId();
if (!recipientServiceId) {
log.warn(
2023-08-16 20:54:39 +00:00
`sendToGroupViaSenderKey/callback: Conversation ${sentToConversation.idForLogging()} had no service id`
);
return;
}
await window.Signal.Data.insertProtoRecipients({
id: sendLogId,
recipientServiceId,
deviceIds,
});
};
2021-05-25 22:40:04 +00:00
try {
const normalSendResult = await window.textsecure.messaging.sendGroupProto({
contentHint,
groupId,
options: { ...sendOptions, online },
proto: contentMessage,
recipients: normalSendRecipients,
sendLogCallback,
timestamp,
urgent,
});
return mergeSendResult({
result: normalSendResult,
senderKeyRecipients,
senderKeyRecipientsWithDevices,
});
} catch (error: unknown) {
if (error instanceof SendMessageProtoError) {
const callbackResult = mergeSendResult({
result: error,
senderKeyRecipients,
senderKeyRecipientsWithDevices,
});
throw new SendMessageProtoError(callbackResult);
}
throw error;
}
}
// Public utility methods
export async function resetSenderKey(
sendTarget: SenderKeyTargetType
): Promise<void> {
const logId = sendTarget.idForLogging();
log.info(`resetSenderKey/${logId}: Sender key needs reset. Clearing data...`);
const senderKeyInfo = sendTarget.getSenderKeyInfo();
if (!senderKeyInfo) {
log.warn(`resetSenderKey/${logId}: No sender key info`);
return;
}
const { distributionId } = senderKeyInfo;
const ourAddress = getOurAddress();
// Note: We preserve existing distributionId to minimize space for sender key storage
await sendTarget.saveSenderKeyInfo({
createdAtDate: Date.now(),
distributionId,
memberDevices: [],
});
const ourAci = window.storage.user.getCheckedAci();
await window.textsecure.storage.protocol.removeSenderKey(
new QualifiedAddress(ourAci, ourAddress),
distributionId
);
}
// Utility Methods
function mergeSendResult({
result,
senderKeyRecipients,
senderKeyRecipientsWithDevices,
}: {
result: CallbackResultType | SendMessageProtoError;
senderKeyRecipients: Array<ServiceIdString>;
senderKeyRecipientsWithDevices: Record<ServiceIdString, Array<number>>;
}): CallbackResultType {
2021-05-25 22:40:04 +00:00
return {
...result,
successfulServiceIds: [
...(result.successfulServiceIds || []),
2021-05-25 22:40:04 +00:00
...senderKeyRecipients,
],
unidentifiedDeliveries: [
...(result.unidentifiedDeliveries || []),
2021-05-25 22:40:04 +00:00
...senderKeyRecipients,
],
recipients: {
...result.recipients,
...senderKeyRecipientsWithDevices,
},
2021-05-25 22:40:04 +00:00
};
}
const MAX_SENDER_KEY_EXPIRE_DURATION = 90 * DAY;
function getSenderKeyExpireDuration(): number {
try {
const parsed = parseIntOrThrow(
getValue('desktop.senderKeyMaxAge'),
'getSenderKeyExpireDuration'
);
const duration = Math.min(parsed, MAX_SENDER_KEY_EXPIRE_DURATION);
log.info(
`getSenderKeyExpireDuration: using expire duration of ${duration}`
);
return duration;
} catch (error) {
log.warn(
`getSenderKeyExpireDuration: Failed to parse integer. Using default of ${MAX_SENDER_KEY_EXPIRE_DURATION}.`,
Errors.toLogFormat(error)
);
return MAX_SENDER_KEY_EXPIRE_DURATION;
}
}
export function _shouldFailSend(error: unknown, logId: string): boolean {
const logError = (message: string) => {
log.error(`_shouldFailSend/${logId}: ${message}`);
};
// We need to fail over to a normal send if multi_recipient/ endpoint returns 404 or 401
if (error instanceof UnknownRecipientError) {
return false;
}
if (error instanceof IncorrectSenderKeyAuthError) {
return false;
}
if (
error instanceof LibSignalErrorBase &&
error.code === ErrorCode.UntrustedIdentity
) {
logError("'untrusted identity' error, failing.");
return true;
}
if (error instanceof OutgoingIdentityKeyError) {
logError('OutgoingIdentityKeyError error, failing.');
return true;
}
if (error instanceof UnregisteredUserError) {
logError('UnregisteredUserError error, failing.');
return true;
}
if (error instanceof ConnectTimeoutError) {
logError('ConnectTimeoutError error, failing.');
return true;
}
// Known error types captured here:
// HTTPError
// OutgoingMessageError
// SendMessageNetworkError
// SendMessageChallengeError
// MessageError
if (isRecord(error) && typeof error.code === 'number') {
if (error.code === -1) {
logError("We don't have connectivity. Failing.");
return true;
}
if (error.code === 400) {
logError('Invalid request, failing.');
return true;
}
if (error.code === 404) {
logError('Failed to fetch metadata before send, failing.');
return true;
}
if (error.code === 413 || error.code === 429) {
logError('Rate limit error, failing.');
return true;
}
if (error.code === 428) {
logError('Challenge error, failing.');
return true;
}
if (error.code === 500) {
logError('Server error, failing.');
return true;
}
if (error.code === 508) {
logError('Fail job error, failing.');
return true;
}
}
if (error instanceof SendMessageProtoError) {
if (!error.errors || !error.errors.length) {
logError('SendMessageProtoError had no errors but was thrown! Failing.');
return true;
}
if (error.successfulServiceIds && error.successfulServiceIds.length > 0) {
logError(
'SendMessageProtoError had successful sends; no further sends needed. Failing.'
);
return true;
}
for (const innerError of error.errors) {
const shouldFail = _shouldFailSend(innerError, logId);
if (shouldFail) {
return true;
}
}
}
return false;
}
function getRecipients(
options: GroupSendOptionsType
): ReadonlyArray<ServiceIdString> {
2021-05-25 22:40:04 +00:00
if (options.groupV2) {
return options.groupV2.members;
}
throw new Error('getRecipients: Unable to extract recipients!');
}
async function markServiceIdUnregistered(serviceId: ServiceIdString) {
2021-05-25 22:40:04 +00:00
const conversation = window.ConversationController.getOrCreate(
serviceId,
2021-05-25 22:40:04 +00:00
'private'
);
conversation.setUnregistered();
window.Signal.Data.updateConversation(conversation.attributes);
2021-05-25 22:40:04 +00:00
await window.textsecure.storage.protocol.archiveAllSessions(serviceId);
2021-05-25 22:40:04 +00:00
}
2023-08-16 20:54:39 +00:00
function isServiceIdRegistered(serviceId: ServiceIdString) {
2021-05-25 22:40:04 +00:00
const conversation = window.ConversationController.getOrCreate(
2023-08-16 20:54:39 +00:00
serviceId,
2021-05-25 22:40:04 +00:00
'private'
);
const isUnregistered = conversation.isUnregistered();
return !isUnregistered;
}
2021-09-22 00:58:03 +00:00
async function handle409Response(logId: string, error: HTTPError) {
2021-05-25 22:40:04 +00:00
const parsed = multiRecipient409ResponseSchema.safeParse(error.response);
if (parsed.success) {
await waitForAll({
2021-05-25 22:40:04 +00:00
tasks: parsed.data.map(item => async () => {
const { uuid, devices } = item;
// Start new sessions with devices we didn't know about before
if (devices.missingDevices && devices.missingDevices.length > 0) {
await fetchKeysForServiceId(uuid, devices.missingDevices);
2021-05-25 22:40:04 +00:00
}
// Archive sessions with devices that have been removed
if (devices.extraDevices && devices.extraDevices.length > 0) {
const ourAci = window.textsecure.storage.user.getCheckedAci();
await waitForAll({
2021-05-25 22:40:04 +00:00
tasks: devices.extraDevices.map(deviceId => async () => {
await window.textsecure.storage.protocol.archiveSession(
new QualifiedAddress(ourAci, Address.create(uuid, deviceId))
);
2021-05-25 22:40:04 +00:00
}),
});
}
}),
maxConcurrency: 2,
});
} else {
log.error(
2021-05-25 22:40:04 +00:00
`handle409Response/${logId}: Server returned unexpected 409 response ${JSON.stringify(
parsed.error.flatten()
)}`
);
throw error;
}
}
async function handle410Response(
sendTarget: SenderKeyTargetType,
2021-09-22 00:58:03 +00:00
error: HTTPError
2021-05-25 22:40:04 +00:00
) {
const logId = sendTarget.idForLogging();
2021-05-25 22:40:04 +00:00
const parsed = multiRecipient410ResponseSchema.safeParse(error.response);
if (parsed.success) {
await waitForAll({
2021-05-25 22:40:04 +00:00
tasks: parsed.data.map(item => async () => {
const { uuid, devices } = item;
if (devices.staleDevices && devices.staleDevices.length > 0) {
const ourAci = window.textsecure.storage.user.getCheckedAci();
2021-05-25 22:40:04 +00:00
// First, archive our existing sessions with these devices
await waitForAll({
2021-05-25 22:40:04 +00:00
tasks: devices.staleDevices.map(deviceId => async () => {
await window.textsecure.storage.protocol.archiveSession(
new QualifiedAddress(ourAci, Address.create(uuid, deviceId))
);
2021-05-25 22:40:04 +00:00
}),
});
// Start new sessions with these devices
await fetchKeysForServiceId(uuid, devices.staleDevices);
2021-05-25 22:40:04 +00:00
// Forget that we've sent our sender key to these devices, since they've
// been re-registered or re-linked.
const senderKeyInfo = sendTarget.getSenderKeyInfo();
2021-05-25 22:40:04 +00:00
if (senderKeyInfo) {
2021-11-11 22:43:05 +00:00
const devicesToRemove: Array<PartialDeviceType> =
devices.staleDevices.map(id => ({ id, serviceId: uuid }));
await sendTarget.saveSenderKeyInfo({
...senderKeyInfo,
memberDevices: differenceWith(
2023-08-16 20:54:39 +00:00
senderKeyInfo.memberDevices,
devicesToRemove,
partialDeviceComparator
2023-08-16 20:54:39 +00:00
),
2021-05-25 22:40:04 +00:00
});
}
}
}),
maxConcurrency: 2,
});
} else {
log.error(
2021-05-25 22:40:04 +00:00
`handle410Response/${logId}: Server returned unexpected 410 response ${JSON.stringify(
parsed.error.flatten()
)}`
);
throw error;
}
}
function getXorOfAccessKeys(
devices: Array<DeviceType>,
{ story }: { story?: boolean } = {}
): Buffer {
const uuids = getServiceIdsFromDevices(devices);
2021-05-25 22:40:04 +00:00
const result = Buffer.alloc(ACCESS_KEY_LENGTH);
strictAssert(
2021-05-25 22:40:04 +00:00
result.length === ACCESS_KEY_LENGTH,
'getXorOfAccessKeys starting value'
);
uuids.forEach(uuid => {
const conversation = window.ConversationController.get(uuid);
if (!conversation) {
throw new Error(
`getXorOfAccessKeys: Unable to fetch conversation for UUID ${uuid}`
);
}
const accessKey = getAccessKey(conversation.attributes, { story });
2021-05-25 22:40:04 +00:00
if (!accessKey) {
throw new Error(`getXorOfAccessKeys: No accessKey for UUID ${uuid}`);
}
const accessKeyBuffer = Buffer.from(accessKey, 'base64');
if (accessKeyBuffer.length !== ACCESS_KEY_LENGTH) {
throw new Error(
`getXorOfAccessKeys: Access key for ${uuid} had length ${accessKeyBuffer.length}`
);
}
for (let i = 0; i < ACCESS_KEY_LENGTH; i += 1) {
// eslint-disable-next-line no-bitwise
result[i] ^= accessKeyBuffer[i];
}
});
return result;
}
async function encryptForSenderKey({
2021-05-28 19:11:19 +00:00
contentHint,
contentMessage,
2021-05-25 22:40:04 +00:00
devices,
distributionId,
groupId,
}: {
2021-05-28 19:11:19 +00:00
contentHint: number;
2021-09-24 00:49:05 +00:00
contentMessage: Uint8Array;
2021-05-25 22:40:04 +00:00
devices: Array<DeviceType>;
distributionId: string;
groupId?: string;
2021-05-25 22:40:04 +00:00
}): Promise<Buffer> {
const ourAci = window.textsecure.storage.user.getCheckedAci();
2021-05-25 22:40:04 +00:00
const ourDeviceId = window.textsecure.storage.user.getDeviceId();
if (!ourDeviceId) {
2021-05-25 22:40:04 +00:00
throw new Error(
'encryptForSenderKey: Unable to fetch our uuid or deviceId'
);
}
const sender = ProtocolAddress.new(
ourAci,
2021-05-25 22:40:04 +00:00
parseIntOrThrow(ourDeviceId, 'encryptForSenderKey, ourDeviceId')
);
const ourAddress = getOurAddress();
const senderKeyStore = new SenderKeys({
ourServiceId: ourAci,
zone: GLOBAL_ZONE,
});
2021-09-24 00:49:05 +00:00
const message = Buffer.from(padMessage(contentMessage));
2021-05-25 22:40:04 +00:00
2021-11-11 22:43:05 +00:00
const ciphertextMessage =
await window.textsecure.storage.protocol.enqueueSenderKeyJob(
new QualifiedAddress(ourAci, ourAddress),
2021-11-11 22:43:05 +00:00
() => groupEncrypt(sender, distributionId, senderKeyStore, message)
);
2021-05-25 22:40:04 +00:00
const groupIdBuffer = groupId ? Buffer.from(groupId, 'base64') : null;
2021-05-25 22:40:04 +00:00
const senderCertificateObject = await senderCertificateService.get(
SenderCertificateMode.WithoutE164
);
if (!senderCertificateObject) {
2022-02-09 20:33:19 +00:00
throw new Error('encryptForSenderKey: Unable to fetch sender certificate!');
2021-05-25 22:40:04 +00:00
}
const senderCertificate = SenderCertificate.deserialize(
Buffer.from(senderCertificateObject.serialized)
);
const content = UnidentifiedSenderMessageContent.new(
ciphertextMessage,
senderCertificate,
contentHint,
groupIdBuffer
);
const recipients = devices
.slice()
.sort((a, b): number => {
if (a.serviceId === b.serviceId) {
return 0;
}
if (a.serviceId < b.serviceId) {
return -1;
}
return 1;
})
.map(device => {
return ProtocolAddress.new(device.serviceId, device.id);
});
const identityKeyStore = new IdentityKeys({ ourServiceId: ourAci });
const sessionStore = new Sessions({ ourServiceId: ourAci });
2021-05-25 22:40:04 +00:00
return sealedSenderMultiRecipientEncrypt(
content,
recipients,
identityKeyStore,
sessionStore
);
}
function isValidSenderKeyRecipient(
2021-08-19 15:52:08 +00:00
members: Set<ConversationModel>,
2023-08-16 20:54:39 +00:00
serviceId: ServiceIdString,
{ story }: { story?: boolean } = {}
2021-05-25 22:40:04 +00:00
): boolean {
2023-08-16 20:54:39 +00:00
const memberConversation = window.ConversationController.get(serviceId);
2021-05-25 22:40:04 +00:00
if (!memberConversation) {
log.warn(
2023-08-16 20:54:39 +00:00
`isValidSenderKeyRecipient: Missing conversation model for member ${serviceId}`
2021-05-25 22:40:04 +00:00
);
return false;
}
2021-08-19 15:52:08 +00:00
if (!members.has(memberConversation)) {
log.info(
2023-08-16 20:54:39 +00:00
`isValidSenderKeyRecipient: Sending to ${serviceId}, not a group member`
2021-08-19 15:52:08 +00:00
);
return false;
}
if (!getAccessKey(memberConversation.attributes, { story })) {
2021-05-25 22:40:04 +00:00
return false;
}
if (memberConversation.isUnregistered()) {
2023-08-16 20:54:39 +00:00
log.warn(`isValidSenderKeyRecipient: Member ${serviceId} is unregistered`);
2021-05-25 22:40:04 +00:00
return false;
}
return true;
}
function deviceComparator(left?: DeviceType, right?: DeviceType): boolean {
return Boolean(
left &&
right &&
left.id === right.id &&
left.serviceId === right.serviceId &&
left.registrationId === right.registrationId
);
}
type PartialDeviceType = Omit<DeviceType, 'registrationId'>;
function partialDeviceComparator(
left?: PartialDeviceType,
right?: PartialDeviceType
): boolean {
2021-05-25 22:40:04 +00:00
return Boolean(
left && right && left.id === right.id && left.serviceId === right.serviceId
2021-05-25 22:40:04 +00:00
);
}
function getServiceIdsFromDevices(
2022-07-08 20:46:25 +00:00
devices: Array<DeviceType>
): Array<ServiceIdString> {
return [...new Set(devices.map(({ serviceId }) => serviceId))];
2021-05-25 22:40:04 +00:00
}
export function _analyzeSenderKeyDevices(
memberDevices: Array<DeviceType>,
devicesForSend: Array<DeviceType>,
isPartialSend?: boolean
): {
newToMemberDevices: Array<DeviceType>;
newToMemberServiceIds: Array<ServiceIdString>;
2021-05-25 22:40:04 +00:00
removedFromMemberDevices: Array<DeviceType>;
removedFromMemberServiceIds: Array<ServiceIdString>;
2021-05-25 22:40:04 +00:00
} {
const newToMemberDevices = differenceWith<DeviceType, DeviceType>(
devicesForSend,
memberDevices,
deviceComparator
);
const newToMemberServiceIds = getServiceIdsFromDevices(newToMemberDevices);
2021-05-25 22:40:04 +00:00
// If this is a partial send, we won't do anything with device removals
if (isPartialSend) {
return {
newToMemberDevices,
newToMemberServiceIds,
2021-05-25 22:40:04 +00:00
removedFromMemberDevices: [],
removedFromMemberServiceIds: [],
2021-05-25 22:40:04 +00:00
};
}
const removedFromMemberDevices = differenceWith<DeviceType, DeviceType>(
memberDevices,
devicesForSend,
deviceComparator
);
const removedFromMemberServiceIds = getServiceIdsFromDevices(
removedFromMemberDevices
);
2021-05-25 22:40:04 +00:00
return {
newToMemberDevices,
newToMemberServiceIds,
2021-05-25 22:40:04 +00:00
removedFromMemberDevices,
removedFromMemberServiceIds,
2021-05-25 22:40:04 +00:00
};
}
function getOurAddress(): Address {
const ourAci = window.textsecure.storage.user.getCheckedAci();
2021-05-25 22:40:04 +00:00
const ourDeviceId = window.textsecure.storage.user.getDeviceId();
if (!ourDeviceId) {
throw new Error('getOurAddress: Unable to fetch our deviceId');
2021-05-25 22:40:04 +00:00
}
return new Address(ourAci, ourDeviceId);
2021-05-25 22:40:04 +00:00
}
function getAccessKey(
attributes: ConversationAttributesType,
{ story }: { story?: boolean }
2021-05-25 22:40:04 +00:00
): string | undefined {
const { sealedSender, accessKey } = attributes;
if (story) {
return accessKey || ZERO_ACCESS_KEY;
}
if (sealedSender === SEALED_SENDER.ENABLED) {
return accessKey || undefined;
}
if (sealedSender === SEALED_SENDER.UNKNOWN) {
return accessKey || ZERO_ACCESS_KEY;
}
if (sealedSender === SEALED_SENDER.UNRESTRICTED) {
return ZERO_ACCESS_KEY;
2021-05-25 22:40:04 +00:00
}
return undefined;
}
async function fetchKeysForServiceIds(
serviceIds: Array<ServiceIdString>
2021-05-25 22:40:04 +00:00
): Promise<void> {
log.info(
`fetchKeysForServiceIds: Fetching keys for ${serviceIds.length} serviceIds`
2021-05-25 22:40:04 +00:00
);
try {
await waitForAll({
tasks: serviceIds.map(
serviceId => async () => fetchKeysForServiceId(serviceId)
2021-05-25 22:40:04 +00:00
),
});
} catch (error) {
log.error(
'fetchKeysForServiceIds: Failed to fetch keys:',
Errors.toLogFormat(error)
2021-05-25 22:40:04 +00:00
);
throw error;
2021-05-25 22:40:04 +00:00
}
}
async function fetchKeysForServiceId(
serviceId: ServiceIdString,
2021-05-25 22:40:04 +00:00
devices?: Array<number>
): Promise<void> {
log.info(
`fetchKeysForServiceId: Fetching ${
2021-05-25 22:40:04 +00:00
devices || 'all'
} devices for ${serviceId}`
2021-05-25 22:40:04 +00:00
);
if (!window.textsecure?.messaging?.server) {
throw new Error('fetchKeysForServiceId: No server available!');
2021-05-25 22:40:04 +00:00
}
const emptyConversation = window.ConversationController.getOrCreate(
serviceId,
2021-05-25 22:40:04 +00:00
'private'
);
try {
2023-01-01 11:41:40 +00:00
// Note: we have no way to make an unrestricted unauthenticated key fetch as part of a
// story send, so we hardcode story=false.
const { accessKeyFailed } = await getKeysForServiceId(
serviceId,
2021-05-25 22:40:04 +00:00
window.textsecure?.messaging?.server,
devices,
getAccessKey(emptyConversation.attributes, { story: false })
2021-05-25 22:40:04 +00:00
);
if (accessKeyFailed) {
log.info(
`fetchKeysForServiceIds: Setting sealedSender to DISABLED for conversation ${emptyConversation.idForLogging()}`
2021-05-25 22:40:04 +00:00
);
emptyConversation.set({
sealedSender: SEALED_SENDER.DISABLED,
});
window.Signal.Data.updateConversation(emptyConversation.attributes);
2021-05-25 22:40:04 +00:00
}
} catch (error: unknown) {
if (error instanceof UnregisteredUserError) {
await markServiceIdUnregistered(serviceId);
2021-05-25 22:40:04 +00:00
return;
}
log.error(
`fetchKeysForServiceId: Error fetching ${
devices || 'all'
} devices for ${serviceId}`,
Errors.toLogFormat(error)
);
2021-05-25 22:40:04 +00:00
throw error;
}
}