signal-desktop/ts/SignalProtocolStore.ts

2799 lines
78 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2016 Signal Messenger, LLC
2021-02-26 23:42:45 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
import PQueue from 'p-queue';
import { omit } from 'lodash';
2021-05-25 22:40:04 +00:00
import { z } from 'zod';
import { EventEmitter } from 'events';
import {
Direction,
2022-08-02 01:31:24 +00:00
IdentityKeyPair,
KyberPreKeyRecord,
PreKeyRecord,
PrivateKey,
PublicKey,
SenderKeyRecord,
SessionRecord,
SignedPreKeyRecord,
} from '@signalapp/libsignal-client';
2024-07-22 18:16:33 +00:00
import { DataReader, DataWriter } from './sql/Client';
import type { ItemType } from './sql/Interface';
2021-09-24 00:49:05 +00:00
import * as Bytes from './Bytes';
import { constantTimeEqual, sha256 } from './Crypto';
import { assertDev, strictAssert } from './util/assert';
2021-02-26 23:42:45 +00:00
import { isNotNil } from './util/isNotNil';
2024-07-22 18:16:33 +00:00
import { drop } from './util/drop';
2021-05-19 21:25:56 +00:00
import { Zone } from './util/Zone';
import { isMoreRecentThan } from './util/timestamp';
import type {
2021-05-25 22:40:04 +00:00
DeviceType,
IdentityKeyType,
IdentityKeyIdType,
KeyPairType,
KyberPreKeyType,
OuterSignedPrekeyType,
2022-08-02 01:31:24 +00:00
PniKeyMaterialType,
2022-08-15 21:53:33 +00:00
PniSignatureMessageType,
PreKeyIdType,
PreKeyType,
SenderKeyIdType,
SenderKeyType,
SessionIdType,
SessionResetsType,
SessionType,
SignedPreKeyIdType,
SignedPreKeyType,
UnprocessedType,
UnprocessedUpdateType,
CompatPreKeyType,
} from './textsecure/Types.d';
import type { ServiceIdString, PniString, AciString } from './types/ServiceId';
import { isServiceIdString, ServiceIdKind } from './types/ServiceId';
import type { Address } from './types/Address';
import type { QualifiedAddressStringType } from './types/QualifiedAddress';
import { QualifiedAddress } from './types/QualifiedAddress';
import * as log from './logging/log';
import * as Errors from './types/errors';
import { MINUTE } from './util/durations';
import { conversationJobQueue } from './jobs/conversationJobQueue';
import {
KYBER_KEY_ID_KEY,
SIGNED_PRE_KEY_ID_KEY,
} from './textsecure/AccountManager';
import { formatGroups, groupWhile } from './util/groupWhile';
2024-10-02 19:03:10 +00:00
import { parseUnknown } from './util/schemas';
2021-02-26 23:42:45 +00:00
const TIMESTAMP_THRESHOLD = 5 * 1000; // 5 seconds
const LOW_KEYS_THRESHOLD = 25;
2021-02-26 23:42:45 +00:00
const VerifiedStatus = {
DEFAULT: 0,
VERIFIED: 1,
UNVERIFIED: 2,
};
function validateVerifiedStatus(status: number): boolean {
if (
status === VerifiedStatus.DEFAULT ||
status === VerifiedStatus.VERIFIED ||
status === VerifiedStatus.UNVERIFIED
) {
return true;
}
return false;
}
const identityKeySchema = z.object({
id: z.string(),
2021-09-24 00:49:05 +00:00
publicKey: z.instanceof(Uint8Array),
firstUse: z.boolean(),
timestamp: z.number().refine((value: number) => value % 1 === 0 && value > 0),
verified: z.number().refine(validateVerifiedStatus),
nonblockingApproval: z.boolean(),
2021-02-26 23:42:45 +00:00
});
function validateIdentityKey(attrs: unknown): attrs is IdentityKeyType {
// We'll throw if this doesn't match
2024-10-02 19:03:10 +00:00
parseUnknown(identityKeySchema, attrs);
return true;
}
/*
* Potentially hundreds of items, so we'll group together sequences,
* take the first 10 of the sequences, format them as ranges,
* and log that once.
* => '1-10, 12, 14-20'
*/
function formatKeys(keys: Array<number>): string {
return formatGroups(
groupWhile(keys.sort(), (a, b) => a + 1 === b).slice(0, 10),
'-',
', ',
String
);
}
type HasIdType<T> = {
id: T;
2021-02-26 23:42:45 +00:00
};
type CacheEntryType<DBType, HydratedType> =
| {
hydrated: false;
fromDB: DBType;
}
| { hydrated: true; fromDB: DBType; item: HydratedType };
2021-02-26 23:42:45 +00:00
type MapFields =
| 'kyberPreKeys'
| 'identityKeys'
| 'preKeys'
| 'senderKeys'
| 'sessions'
| 'signedPreKeys';
2022-08-15 21:53:33 +00:00
export type SessionTransactionOptions = Readonly<{
zone?: Zone;
}>;
export type SaveIdentityOptions = Readonly<{
zone?: Zone;
noOverwrite?: boolean;
}>;
2022-08-15 21:53:33 +00:00
export type VerifyAlternateIdentityOptionsType = Readonly<{
aci: AciString;
pni: PniString;
2022-08-15 21:53:33 +00:00
signature: Uint8Array;
}>;
export type SetVerifiedExtra = Readonly<{
firstUse?: boolean;
nonblockingApproval?: boolean;
}>;
2021-05-19 21:25:56 +00:00
export const GLOBAL_ZONE = new Zone('GLOBAL_ZONE');
async function _fillCaches<ID, T extends HasIdType<ID>, HydratedType>(
2021-02-26 23:42:45 +00:00
object: SignalProtocolStore,
field: MapFields,
2021-02-26 23:42:45 +00:00
itemsPromise: Promise<Array<T>>
): Promise<void> {
const items = await itemsPromise;
const cache = new Map<ID, CacheEntryType<T, HydratedType>>();
2021-02-26 23:42:45 +00:00
for (let i = 0, max = items.length; i < max; i += 1) {
const fromDB = items[i];
const { id } = fromDB;
2021-02-26 23:42:45 +00:00
cache.set(id, {
fromDB,
hydrated: false,
});
2021-02-26 23:42:45 +00:00
}
log.info(`SignalProtocolStore: Finished caching ${field} data`);
2021-02-26 23:42:45 +00:00
// eslint-disable-next-line no-param-reassign, @typescript-eslint/no-explicit-any
object[field] = cache as any;
}
export function hydrateSession(session: SessionType): SessionRecord {
return SessionRecord.deserialize(Buffer.from(session.record));
}
export function hydratePublicKey(identityKey: IdentityKeyType): PublicKey {
return PublicKey.deserialize(Buffer.from(identityKey.publicKey));
}
export function hydratePreKey(preKey: PreKeyType): PreKeyRecord {
const publicKey = PublicKey.deserialize(Buffer.from(preKey.publicKey));
const privateKey = PrivateKey.deserialize(Buffer.from(preKey.privateKey));
return PreKeyRecord.new(preKey.keyId, publicKey, privateKey);
}
export function hydrateSignedPreKey(
signedPreKey: SignedPreKeyType
): SignedPreKeyRecord {
const createdAt = signedPreKey.created_at;
const pubKey = PublicKey.deserialize(Buffer.from(signedPreKey.publicKey));
const privKey = PrivateKey.deserialize(Buffer.from(signedPreKey.privateKey));
const signature = Buffer.from([]);
return SignedPreKeyRecord.new(
signedPreKey.keyId,
createdAt,
pubKey,
privKey,
signature
);
}
2021-02-26 23:42:45 +00:00
2021-09-24 00:49:05 +00:00
export function freezePublicKey(publicKey: PublicKey): Uint8Array {
return publicKey.serialize();
}
export function freezePreKey(preKey: PreKeyRecord): KeyPairType {
const keyPair = {
2021-09-24 00:49:05 +00:00
pubKey: preKey.publicKey().serialize(),
privKey: preKey.privateKey().serialize(),
};
return keyPair;
}
export function freezeSignedPreKey(
signedPreKey: SignedPreKeyRecord
): KeyPairType {
const keyPair = {
2021-09-24 00:49:05 +00:00
pubKey: signedPreKey.publicKey().serialize(),
privKey: signedPreKey.privateKey().serialize(),
};
return keyPair;
}
2021-02-26 23:42:45 +00:00
type SessionCacheEntry = CacheEntryType<SessionType, SessionRecord>;
type SenderKeyCacheEntry = CacheEntryType<SenderKeyType, SenderKeyRecord>;
2021-08-24 21:07:40 +00:00
type ZoneQueueEntryType = Readonly<{
zone: Zone;
callback(): void;
}>;
export class SignalProtocolStore extends EventEmitter {
2021-02-26 23:42:45 +00:00
// Enums used across the app
VerifiedStatus = VerifiedStatus;
// Cached values
private ourIdentityKeys = new Map<ServiceIdString, KeyPairType>();
2021-02-26 23:42:45 +00:00
private ourRegistrationIds = new Map<ServiceIdString, number>();
2021-02-26 23:42:45 +00:00
2022-08-15 21:53:33 +00:00
private cachedPniSignatureMessage: PniSignatureMessageType | undefined;
identityKeys?: Map<
IdentityKeyIdType,
CacheEntryType<IdentityKeyType, PublicKey>
>;
kyberPreKeys?: Map<
PreKeyIdType,
CacheEntryType<KyberPreKeyType, KyberPreKeyRecord>
>;
senderKeys?: Map<SenderKeyIdType, SenderKeyCacheEntry>;
sessions?: Map<SessionIdType, SessionCacheEntry>;
preKeys?: Map<PreKeyIdType, CacheEntryType<PreKeyType, PreKeyRecord>>;
2021-02-26 23:42:45 +00:00
signedPreKeys?: Map<
SignedPreKeyIdType,
CacheEntryType<SignedPreKeyType, SignedPreKeyRecord>
>;
2021-02-26 23:42:45 +00:00
senderKeyQueues = new Map<QualifiedAddressStringType, PQueue>();
sessionQueues = new Map<SessionIdType, PQueue>();
2021-02-26 23:42:45 +00:00
sessionQueueJobCounter = 0;
private readonly identityQueues = new Map<ServiceIdString, PQueue>();
2023-04-19 16:13:48 +00:00
2021-05-19 21:25:56 +00:00
private currentZone?: Zone;
private currentZoneDepth = 0;
2021-08-24 21:07:40 +00:00
private readonly zoneQueue: Array<ZoneQueueEntryType> = [];
2021-05-19 21:25:56 +00:00
private pendingSessions = new Map<SessionIdType, SessionCacheEntry>();
2021-05-19 21:25:56 +00:00
private pendingSenderKeys = new Map<SenderKeyIdType, SenderKeyCacheEntry>();
2021-05-19 21:25:56 +00:00
private pendingUnprocessed = new Map<string, UnprocessedType>();
2021-02-26 23:42:45 +00:00
async hydrateCaches(): Promise<void> {
await Promise.all([
(async () => {
this.ourIdentityKeys.clear();
2024-07-22 18:16:33 +00:00
const map = (await DataReader.getItemById(
'identityKeyMap'
)) as unknown as ItemType<'identityKeyMap'>;
if (!map) {
return;
}
for (const serviceId of Object.keys(map.value)) {
strictAssert(
isServiceIdString(serviceId),
'Invalid identity key serviceId'
);
const { privKey, pubKey } = map.value[serviceId];
this.ourIdentityKeys.set(serviceId, {
2022-07-28 16:35:29 +00:00
privKey,
pubKey,
});
}
2021-02-26 23:42:45 +00:00
})(),
(async () => {
this.ourRegistrationIds.clear();
2024-07-22 18:16:33 +00:00
const map = (await DataReader.getItemById(
'registrationIdMap'
)) as unknown as ItemType<'registrationIdMap'>;
if (!map) {
return;
}
for (const serviceId of Object.keys(map.value)) {
strictAssert(
isServiceIdString(serviceId),
'Invalid registration id serviceId'
);
this.ourRegistrationIds.set(serviceId, map.value[serviceId]);
}
2021-02-26 23:42:45 +00:00
})(),
_fillCaches<string, IdentityKeyType, PublicKey>(
2021-02-26 23:42:45 +00:00
this,
'identityKeys',
2024-07-22 18:16:33 +00:00
DataReader.getAllIdentityKeys()
2021-02-26 23:42:45 +00:00
),
_fillCaches<string, KyberPreKeyType, KyberPreKeyRecord>(
this,
'kyberPreKeys',
2024-07-22 18:16:33 +00:00
DataReader.getAllKyberPreKeys()
),
_fillCaches<string, SessionType, SessionRecord>(
2021-02-26 23:42:45 +00:00
this,
'sessions',
2024-07-22 18:16:33 +00:00
DataReader.getAllSessions()
2021-02-26 23:42:45 +00:00
),
_fillCaches<string, PreKeyType, PreKeyRecord>(
2021-02-26 23:42:45 +00:00
this,
'preKeys',
2024-07-22 18:16:33 +00:00
DataReader.getAllPreKeys()
2021-02-26 23:42:45 +00:00
),
_fillCaches<string, SenderKeyType, SenderKeyRecord>(
this,
'senderKeys',
2024-07-22 18:16:33 +00:00
DataReader.getAllSenderKeys()
),
_fillCaches<string, SignedPreKeyType, SignedPreKeyRecord>(
2021-02-26 23:42:45 +00:00
this,
'signedPreKeys',
2024-07-22 18:16:33 +00:00
DataReader.getAllSignedPreKeys()
2021-02-26 23:42:45 +00:00
),
]);
}
getIdentityKeyPair(ourServiceId: ServiceIdString): KeyPairType | undefined {
return this.ourIdentityKeys.get(ourServiceId);
2021-02-26 23:42:45 +00:00
}
async getLocalRegistrationId(
ourServiceId: ServiceIdString
): Promise<number | undefined> {
return this.ourRegistrationIds.get(ourServiceId);
2021-02-26 23:42:45 +00:00
}
private _getKeyId(
ourServiceId: ServiceIdString,
keyId: number
): PreKeyIdType {
return `${ourServiceId}:${keyId}`;
}
// KyberPreKeys
private _getKyberPreKeyEntry(
id: PreKeyIdType,
logContext: string
):
| { hydrated: true; fromDB: KyberPreKeyType; item: KyberPreKeyRecord }
| undefined {
if (!this.kyberPreKeys) {
throw new Error(`${logContext}: this.kyberPreKeys not yet cached!`);
}
const entry = this.kyberPreKeys.get(id);
if (!entry) {
log.error(`${logContext}: Failed to fetch kyber prekey: ${id}`);
return undefined;
}
if (entry.hydrated) {
log.info(
`${logContext}: Successfully fetched kyber prekey (cache hit): ${id}`
);
return entry;
}
const item = KyberPreKeyRecord.deserialize(Buffer.from(entry.fromDB.data));
const newEntry = {
hydrated: true as const,
fromDB: entry.fromDB,
item,
};
this.kyberPreKeys.set(id, newEntry);
log.info(
`${logContext}: Successfully fetched kyberPreKey (cache miss): ${id}`
);
return newEntry;
}
async loadKyberPreKey(
ourServiceId: ServiceIdString,
keyId: number
): Promise<KyberPreKeyRecord | undefined> {
const id: PreKeyIdType = this._getKeyId(ourServiceId, keyId);
const entry = this._getKyberPreKeyEntry(id, 'loadKyberPreKey');
return entry?.item;
}
loadKyberPreKeys(
ourServiceId: ServiceIdString,
{ isLastResort }: { isLastResort: boolean }
): Array<KyberPreKeyType> {
if (!this.kyberPreKeys) {
throw new Error('loadKyberPreKeys: this.kyberPreKeys not yet cached!');
}
if (arguments.length > 2) {
throw new Error('loadKyberPreKeys takes two arguments');
}
const entries = Array.from(this.kyberPreKeys.values());
return entries
.map(item => item.fromDB)
.filter(
item =>
2023-08-16 20:54:39 +00:00
item.ourServiceId === ourServiceId &&
item.isLastResort === isLastResort
);
}
async confirmKyberPreKey(
ourServiceId: ServiceIdString,
keyId: number
): Promise<void> {
const kyberPreKeyCache = this.kyberPreKeys;
if (!kyberPreKeyCache) {
throw new Error('storeKyberPreKey: this.kyberPreKeys not yet cached!');
}
const id: PreKeyIdType = this._getKeyId(ourServiceId, keyId);
const item = kyberPreKeyCache.get(id);
if (!item) {
throw new Error(`confirmKyberPreKey: missing kyber prekey ${id}!`);
}
const confirmedItem = {
...item,
fromDB: {
...item.fromDB,
isConfirmed: true,
},
};
2024-07-22 18:16:33 +00:00
await DataWriter.createOrUpdateKyberPreKey(confirmedItem.fromDB);
kyberPreKeyCache.set(id, confirmedItem);
}
async storeKyberPreKeys(
ourServiceId: ServiceIdString,
keys: Array<Omit<KyberPreKeyType, 'id'>>
): Promise<void> {
const kyberPreKeyCache = this.kyberPreKeys;
if (!kyberPreKeyCache) {
throw new Error('storeKyberPreKey: this.kyberPreKeys not yet cached!');
}
const toSave: Array<KyberPreKeyType> = [];
keys.forEach(key => {
const id: PreKeyIdType = this._getKeyId(ourServiceId, key.keyId);
if (kyberPreKeyCache.has(id)) {
throw new Error(`storeKyberPreKey: kyber prekey ${id} already exists!`);
}
const kyberPreKey = {
id,
createdAt: key.createdAt,
data: key.data,
isConfirmed: key.isConfirmed,
isLastResort: key.isLastResort,
keyId: key.keyId,
2023-08-16 20:54:39 +00:00
ourServiceId,
};
toSave.push(kyberPreKey);
});
2024-07-22 18:16:33 +00:00
await DataWriter.bulkAddKyberPreKeys(toSave);
toSave.forEach(kyberPreKey => {
kyberPreKeyCache.set(kyberPreKey.id, {
hydrated: false,
fromDB: kyberPreKey,
});
});
}
async maybeRemoveKyberPreKey(
ourServiceId: ServiceIdString,
keyId: number
): Promise<void> {
const id: PreKeyIdType = this._getKeyId(ourServiceId, keyId);
const entry = this._getKyberPreKeyEntry(id, 'maybeRemoveKyberPreKey');
if (!entry) {
return;
}
if (entry.fromDB.isLastResort) {
log.info(
`maybeRemoveKyberPreKey: Not removing kyber prekey ${id}; it's a last resort key`
);
return;
}
await this.removeKyberPreKeys(ourServiceId, [keyId]);
}
async removeKyberPreKeys(
ourServiceId: ServiceIdString,
keyIds: Array<number>
): Promise<void> {
const kyberPreKeyCache = this.kyberPreKeys;
if (!kyberPreKeyCache) {
throw new Error('removeKyberPreKeys: this.kyberPreKeys not yet cached!');
}
const ids = keyIds.map(keyId => this._getKeyId(ourServiceId, keyId));
log.info('removeKyberPreKeys: Removing kyber prekeys:', formatKeys(keyIds));
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removeKyberPreKeyById(ids);
log.info(`removeKyberPreKeys: Removed ${changes} kyber prekeys`);
ids.forEach(id => {
kyberPreKeyCache.delete(id);
});
if (kyberPreKeyCache.size < LOW_KEYS_THRESHOLD) {
this.emitLowKeys(
ourServiceId,
`removeKyberPreKeys@${kyberPreKeyCache.size}`
);
}
}
async clearKyberPreKeyStore(): Promise<void> {
if (this.kyberPreKeys) {
this.kyberPreKeys.clear();
}
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removeAllKyberPreKeys();
log.info(`clearKyberPreKeyStore: Removed ${changes} kyber prekeys`);
}
2021-02-26 23:42:45 +00:00
// PreKeys
async loadPreKey(
ourServiceId: ServiceIdString,
keyId: number
): Promise<PreKeyRecord | undefined> {
2021-02-26 23:42:45 +00:00
if (!this.preKeys) {
throw new Error('loadPreKey: this.preKeys not yet cached!');
}
const id: PreKeyIdType = this._getKeyId(ourServiceId, keyId);
const entry = this.preKeys.get(id);
if (!entry) {
log.error('Failed to fetch prekey:', id);
return undefined;
2021-02-26 23:42:45 +00:00
}
if (entry.hydrated) {
log.info('Successfully fetched prekey (cache hit):', id);
return entry.item;
}
const item = hydratePreKey(entry.fromDB);
this.preKeys.set(id, {
hydrated: true,
fromDB: entry.fromDB,
item,
});
log.info('Successfully fetched prekey (cache miss):', id);
return item;
2021-02-26 23:42:45 +00:00
}
loadPreKeys(ourServiceId: ServiceIdString): Array<PreKeyType> {
if (!this.preKeys) {
throw new Error('loadPreKeys: this.preKeys not yet cached!');
}
if (arguments.length > 1) {
throw new Error('loadPreKeys takes one argument');
}
const entries = Array.from(this.preKeys.values());
return entries
.map(item => item.fromDB)
2023-08-16 20:54:39 +00:00
.filter(item => item.ourServiceId === ourServiceId);
}
async storePreKeys(
ourServiceId: ServiceIdString,
keys: Array<CompatPreKeyType>
): Promise<void> {
const preKeyCache = this.preKeys;
if (!preKeyCache) {
2021-02-26 23:42:45 +00:00
throw new Error('storePreKey: this.preKeys not yet cached!');
}
const now = Date.now();
const toSave: Array<PreKeyType> = [];
keys.forEach(key => {
const id: PreKeyIdType = this._getKeyId(ourServiceId, key.keyId);
2021-02-26 23:42:45 +00:00
if (preKeyCache.has(id)) {
throw new Error(`storePreKeys: prekey ${id} already exists!`);
}
2021-02-26 23:42:45 +00:00
const preKey = {
id,
keyId: key.keyId,
2023-08-16 20:54:39 +00:00
ourServiceId,
publicKey: key.keyPair.pubKey,
privateKey: key.keyPair.privKey,
createdAt: now,
};
toSave.push(preKey);
});
log.info(`storePreKeys: Saving ${toSave.length} prekeys`);
2024-07-22 18:16:33 +00:00
await DataWriter.bulkAddPreKeys(toSave);
toSave.forEach(preKey => {
preKeyCache.set(preKey.id, {
hydrated: false,
fromDB: preKey,
});
});
2021-02-26 23:42:45 +00:00
}
async removePreKeys(
ourServiceId: ServiceIdString,
keyIds: Array<number>
): Promise<void> {
const preKeyCache = this.preKeys;
if (!preKeyCache) {
throw new Error('removePreKeys: this.preKeys not yet cached!');
2021-02-26 23:42:45 +00:00
}
const ids = keyIds.map(keyId => this._getKeyId(ourServiceId, keyId));
log.info('removePreKeys: Removing prekeys:', formatKeys(keyIds));
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removePreKeyById(ids);
log.info(`removePreKeys: Removed ${changes} prekeys`);
ids.forEach(id => {
preKeyCache.delete(id);
});
2021-02-26 23:42:45 +00:00
if (preKeyCache.size < LOW_KEYS_THRESHOLD) {
this.emitLowKeys(ourServiceId, `removePreKeys@${preKeyCache.size}`);
}
2021-02-26 23:42:45 +00:00
}
async clearPreKeyStore(): Promise<void> {
if (this.preKeys) {
this.preKeys.clear();
}
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removeAllPreKeys();
log.info(`clearPreKeyStore: Removed ${changes} prekeys`);
2021-02-26 23:42:45 +00:00
}
// Signed PreKeys
async loadSignedPreKey(
ourServiceId: ServiceIdString,
2021-02-26 23:42:45 +00:00
keyId: number
): Promise<SignedPreKeyRecord | undefined> {
2021-02-26 23:42:45 +00:00
if (!this.signedPreKeys) {
throw new Error('loadSignedPreKey: this.signedPreKeys not yet cached!');
}
const id: SignedPreKeyIdType = `${ourServiceId}:${keyId}`;
const entry = this.signedPreKeys.get(id);
if (!entry) {
log.error('Failed to fetch signed prekey:', id);
return undefined;
2021-02-26 23:42:45 +00:00
}
if (entry.hydrated) {
log.info('Successfully fetched signed prekey (cache hit):', id);
return entry.item;
}
const item = hydrateSignedPreKey(entry.fromDB);
this.signedPreKeys.set(id, {
hydrated: true,
item,
fromDB: entry.fromDB,
});
log.info('Successfully fetched signed prekey (cache miss):', id);
return item;
2021-02-26 23:42:45 +00:00
}
loadSignedPreKeys(
ourServiceId: ServiceIdString
): Array<OuterSignedPrekeyType> {
2021-02-26 23:42:45 +00:00
if (!this.signedPreKeys) {
throw new Error('loadSignedPreKeys: this.signedPreKeys not yet cached!');
}
if (arguments.length > 1) {
throw new Error('loadSignedPreKeys takes one argument');
2021-02-26 23:42:45 +00:00
}
const entries = Array.from(this.signedPreKeys.values());
return entries
2023-08-16 20:54:39 +00:00
.filter(({ fromDB }) => fromDB.ourServiceId === ourServiceId)
.map(entry => {
const preKey = entry.fromDB;
return {
pubKey: preKey.publicKey,
privKey: preKey.privateKey,
created_at: preKey.created_at,
keyId: preKey.keyId,
confirmed: preKey.confirmed,
};
});
2021-02-26 23:42:45 +00:00
}
async confirmSignedPreKey(
ourServiceId: ServiceIdString,
keyId: number
): Promise<void> {
const signedPreKeyCache = this.signedPreKeys;
if (!signedPreKeyCache) {
throw new Error('storeKyberPreKey: this.signedPreKeys not yet cached!');
}
const id: PreKeyIdType = this._getKeyId(ourServiceId, keyId);
const item = signedPreKeyCache.get(id);
if (!item) {
throw new Error(`confirmSignedPreKey: missing prekey ${id}!`);
}
const confirmedItem = {
...item,
fromDB: {
...item.fromDB,
confirmed: true,
},
};
2024-07-22 18:16:33 +00:00
await DataWriter.createOrUpdateSignedPreKey(confirmedItem.fromDB);
signedPreKeyCache.set(id, confirmedItem);
}
2021-02-26 23:42:45 +00:00
async storeSignedPreKey(
ourServiceId: ServiceIdString,
2021-02-26 23:42:45 +00:00
keyId: number,
keyPair: KeyPairType,
2022-07-28 16:35:29 +00:00
confirmed?: boolean,
createdAt = Date.now()
2021-02-26 23:42:45 +00:00
): Promise<void> {
if (!this.signedPreKeys) {
throw new Error('storeSignedPreKey: this.signedPreKeys not yet cached!');
}
const id: SignedPreKeyIdType = this._getKeyId(ourServiceId, keyId);
const fromDB = {
id,
2023-08-16 20:54:39 +00:00
ourServiceId,
keyId,
2021-02-26 23:42:45 +00:00
publicKey: keyPair.pubKey,
privateKey: keyPair.privKey,
2022-07-28 16:35:29 +00:00
created_at: createdAt,
2021-02-26 23:42:45 +00:00
confirmed: Boolean(confirmed),
};
2024-07-22 18:16:33 +00:00
await DataWriter.createOrUpdateSignedPreKey(fromDB);
this.signedPreKeys.set(id, {
hydrated: false,
fromDB,
});
2021-02-26 23:42:45 +00:00
}
async removeSignedPreKeys(
ourServiceId: ServiceIdString,
keyIds: Array<number>
): Promise<void> {
const signedPreKeyCache = this.signedPreKeys;
if (!signedPreKeyCache) {
2021-02-26 23:42:45 +00:00
throw new Error('removeSignedPreKey: this.signedPreKeys not yet cached!');
}
const ids = keyIds.map(keyId => this._getKeyId(ourServiceId, keyId));
log.info(
'removeSignedPreKeys: Removing signed prekeys:',
formatKeys(keyIds)
);
2024-07-22 18:16:33 +00:00
await DataWriter.removeSignedPreKeyById(ids);
ids.forEach(id => {
signedPreKeyCache.delete(id);
});
2021-02-26 23:42:45 +00:00
}
async clearSignedPreKeysStore(): Promise<void> {
if (this.signedPreKeys) {
this.signedPreKeys.clear();
}
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removeAllSignedPreKeys();
log.info(`clearSignedPreKeysStore: Removed ${changes} signed prekeys`);
2021-02-26 23:42:45 +00:00
}
// Sender Key
// Re-entrant sender key transaction routine. Only one sender key transaction could
// be running at the same time.
//
// While in transaction:
//
// - `saveSenderKey()` adds the updated session to the `pendingSenderKeys`
// - `getSenderKey()` looks up the session first in `pendingSenderKeys` and only
// then in the main `senderKeys` store
//
// When transaction ends:
//
// - successfully: pending sender key stores are batched into the database
// - with an error: pending sender key stores are reverted
async enqueueSenderKeyJob<T>(
qualifiedAddress: QualifiedAddress,
task: () => Promise<T>,
zone = GLOBAL_ZONE
): Promise<T> {
return this.withZone(zone, 'enqueueSenderKeyJob', async () => {
const queue = this._getSenderKeyQueue(qualifiedAddress);
return queue.add<T>(task);
});
}
private _createSenderKeyQueue(): PQueue {
2021-11-23 22:01:03 +00:00
return new PQueue({
concurrency: 1,
timeout: MINUTE * 30,
2021-11-23 22:01:03 +00:00
throwOnTimeout: true,
});
}
private _getSenderKeyQueue(senderId: QualifiedAddress): PQueue {
const cachedQueue = this.senderKeyQueues.get(senderId.toString());
if (cachedQueue) {
return cachedQueue;
}
const freshQueue = this._createSenderKeyQueue();
this.senderKeyQueues.set(senderId.toString(), freshQueue);
return freshQueue;
}
private getSenderKeyId(
senderKeyId: QualifiedAddress,
distributionId: string
): SenderKeyIdType {
return `${senderKeyId.toString()}--${distributionId}`;
}
async saveSenderKey(
qualifiedAddress: QualifiedAddress,
distributionId: string,
record: SenderKeyRecord,
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<void> {
await this.withZone(zone, 'saveSenderKey', async () => {
if (!this.senderKeys) {
throw new Error('saveSenderKey: this.senderKeys not yet cached!');
}
const senderId = qualifiedAddress.toString();
try {
const id = this.getSenderKeyId(qualifiedAddress, distributionId);
const fromDB: SenderKeyType = {
id,
senderId,
distributionId,
data: record.serialize(),
lastUpdatedDate: Date.now(),
};
this.pendingSenderKeys.set(id, {
hydrated: true,
fromDB,
item: record,
});
// Current zone doesn't support pending sessions - commit immediately
if (!zone.supportsPendingSenderKeys()) {
await this.commitZoneChanges('saveSenderKey');
}
} catch (error) {
const errorString = Errors.toLogFormat(error);
log.error(
`saveSenderKey: failed to save senderKey ${senderId}/${distributionId}: ${errorString}`
);
}
});
}
async getSenderKey(
qualifiedAddress: QualifiedAddress,
distributionId: string,
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<SenderKeyRecord | undefined> {
return this.withZone(zone, 'getSenderKey', async () => {
if (!this.senderKeys) {
throw new Error('getSenderKey: this.senderKeys not yet cached!');
}
const senderId = qualifiedAddress.toString();
try {
const id = this.getSenderKeyId(qualifiedAddress, distributionId);
const map = this.pendingSenderKeys.has(id)
? this.pendingSenderKeys
: this.senderKeys;
const entry = map.get(id);
if (!entry) {
log.error('Failed to fetch sender key:', id);
return undefined;
}
if (entry.hydrated) {
log.info('Successfully fetched sender key (cache hit):', id);
return entry.item;
}
const item = SenderKeyRecord.deserialize(
Buffer.from(entry.fromDB.data)
);
this.senderKeys.set(id, {
hydrated: true,
item,
fromDB: entry.fromDB,
});
log.info('Successfully fetched sender key(cache miss):', id);
return item;
} catch (error) {
const errorString = Errors.toLogFormat(error);
log.error(
`getSenderKey: failed to load sender key ${senderId}/${distributionId}: ${errorString}`
);
return undefined;
}
});
}
2021-05-25 22:40:04 +00:00
async removeSenderKey(
qualifiedAddress: QualifiedAddress,
2021-05-25 22:40:04 +00:00
distributionId: string
): Promise<void> {
if (!this.senderKeys) {
throw new Error('getSenderKey: this.senderKeys not yet cached!');
}
const senderId = qualifiedAddress.toString();
2021-05-25 22:40:04 +00:00
try {
const id = this.getSenderKeyId(qualifiedAddress, distributionId);
2021-05-25 22:40:04 +00:00
2024-07-22 18:16:33 +00:00
await DataWriter.removeSenderKeyById(id);
2021-05-25 22:40:04 +00:00
this.senderKeys.delete(id);
} catch (error) {
const errorString = Errors.toLogFormat(error);
log.error(
`removeSenderKey: failed to remove senderKey ${senderId}/${distributionId}: ${errorString}`
2021-05-25 22:40:04 +00:00
);
}
}
async removeAllSenderKeys(): Promise<void> {
return this.withZone(GLOBAL_ZONE, 'removeAllSenderKeys', async () => {
if (this.senderKeys) {
this.senderKeys.clear();
}
if (this.pendingSenderKeys) {
this.pendingSenderKeys.clear();
}
2024-07-22 18:16:33 +00:00
await DataWriter.removeAllSenderKeys();
});
}
// Session Queue
async enqueueSessionJob<T>(
qualifiedAddress: QualifiedAddress,
name: string,
task: () => Promise<T>,
zone: Zone = GLOBAL_ZONE
): Promise<T> {
this.sessionQueueJobCounter += 1;
const id = this.sessionQueueJobCounter;
const waitStart = Date.now();
return this.withZone(zone, 'enqueueSessionJob', async () => {
const queue = this._getSessionQueue(qualifiedAddress);
const waitTime = Date.now() - waitStart;
log.info(
`enqueueSessionJob(${id}): queuing task ${name}, waited ${waitTime}ms`
);
const queueStart = Date.now();
return queue.add<T>(() => {
const queueTime = Date.now() - queueStart;
log.info(
`enqueueSessionJob(${id}): running task ${name}, waited ${queueTime}ms`
);
return task();
});
});
}
private _createSessionQueue(): PQueue {
2021-11-23 22:01:03 +00:00
return new PQueue({
concurrency: 1,
timeout: MINUTE * 30,
2021-11-23 22:01:03 +00:00
throwOnTimeout: true,
});
}
private _getSessionQueue(id: QualifiedAddress): PQueue {
const cachedQueue = this.sessionQueues.get(id.toString());
if (cachedQueue) {
return cachedQueue;
}
const freshQueue = this._createSessionQueue();
this.sessionQueues.set(id.toString(), freshQueue);
return freshQueue;
}
2023-04-19 16:13:48 +00:00
// Identity Queue
private _createIdentityQueue(): PQueue {
return new PQueue({
concurrency: 1,
timeout: MINUTE * 30,
throwOnTimeout: true,
});
}
2023-10-05 00:39:09 +00:00
private _runOnIdentityQueue<T>(
serviceId: ServiceIdString,
zone: Zone,
name: string,
body: () => Promise<T>
): Promise<T> {
let queue: PQueue;
const cachedQueue = this.identityQueues.get(serviceId);
2023-04-19 16:13:48 +00:00
if (cachedQueue) {
2023-10-05 00:39:09 +00:00
queue = cachedQueue;
} else {
queue = this._createIdentityQueue();
this.identityQueues.set(serviceId, queue);
2023-04-19 16:13:48 +00:00
}
2023-10-05 00:39:09 +00:00
// We run the identity queue task in zone because `saveIdentity` needs to
// be able to archive sibling sessions on keychange. Not entering the zone
// now would mean that we can take locks in different order here and in
// MessageReceiver which will lead to a deadlock.
return this.withZone(zone, name, () => queue.add(body));
2023-04-19 16:13:48 +00:00
}
2021-02-26 23:42:45 +00:00
// Sessions
// Re-entrant session transaction routine. Only one session transaction could
// be running at the same time.
//
// While in transaction:
//
// - `storeSession()` adds the updated session to the `pendingSessions`
// - `loadSession()` looks up the session first in `pendingSessions` and only
// then in the main `sessions` store
//
// When transaction ends:
//
// - successfully: pending session stores are batched into the database
// - with an error: pending session stores are reverted
2021-05-19 21:25:56 +00:00
public async withZone<T>(
zone: Zone,
name: string,
2021-05-19 21:25:56 +00:00
body: () => Promise<T>
): Promise<T> {
2021-05-19 21:25:56 +00:00
const debugName = `withZone(${zone.name}:${name})`;
// Allow re-entering from LibSignalStores
2021-05-19 21:25:56 +00:00
if (this.currentZone && this.currentZone !== zone) {
const start = Date.now();
log.info(`${debugName}: locked by ${this.currentZone.name}, waiting`);
return new Promise<T>((resolve, reject) => {
2021-08-24 21:07:40 +00:00
const callback = async () => {
const duration = Date.now() - start;
log.info(`${debugName}: unlocked after ${duration}ms`);
// Call `.withZone` synchronously from `this.zoneQueue` to avoid
// extra in-between ticks while we are on microtasks queue.
try {
resolve(await this.withZone(zone, name, body));
} catch (error) {
reject(error);
}
2021-08-24 21:07:40 +00:00
};
this.zoneQueue.push({ zone, callback });
});
2021-02-26 23:42:45 +00:00
}
2021-05-19 21:25:56 +00:00
this.enterZone(zone, name);
2021-02-26 23:42:45 +00:00
let result: T;
2021-02-26 23:42:45 +00:00
try {
result = await body();
} catch (error) {
2021-05-19 21:25:56 +00:00
if (this.isInTopLevelZone()) {
await this.revertZoneChanges(name, error);
}
2021-05-19 21:25:56 +00:00
this.leaveZone(zone);
throw error;
}
2021-02-26 23:42:45 +00:00
2021-05-19 21:25:56 +00:00
if (this.isInTopLevelZone()) {
await this.commitZoneChanges(name);
}
2021-05-19 21:25:56 +00:00
this.leaveZone(zone);
return result;
}
2021-05-19 21:25:56 +00:00
private async commitZoneChanges(name: string): Promise<void> {
const { pendingSenderKeys, pendingSessions, pendingUnprocessed } = this;
if (
pendingSenderKeys.size === 0 &&
pendingSessions.size === 0 &&
pendingUnprocessed.size === 0
) {
return;
2021-02-26 23:42:45 +00:00
}
log.info(
`commitZoneChanges(${name}): ` +
`pending sender keys ${pendingSenderKeys.size}, ` +
`pending sessions ${pendingSessions.size}, ` +
`pending unprocessed ${pendingUnprocessed.size}`
);
this.pendingSenderKeys = new Map();
this.pendingSessions = new Map();
this.pendingUnprocessed = new Map();
// Commit both sender keys, sessions and unprocessed in the same database transaction
// to unroll both on error.
2024-07-22 18:16:33 +00:00
await DataWriter.commitDecryptResult({
senderKeys: Array.from(pendingSenderKeys.values()).map(
({ fromDB }) => fromDB
),
sessions: Array.from(pendingSessions.values()).map(
({ fromDB }) => fromDB
),
unprocessed: Array.from(pendingUnprocessed.values()),
});
// Apply changes to in-memory storage after successful DB write.
const { sessions } = this;
assertDev(
sessions !== undefined,
"Can't commit unhydrated session storage"
);
pendingSessions.forEach((value, key) => {
sessions.set(key, value);
});
const { senderKeys } = this;
assertDev(
senderKeys !== undefined,
"Can't commit unhydrated sender key storage"
);
pendingSenderKeys.forEach((value, key) => {
senderKeys.set(key, value);
});
}
2021-05-19 21:25:56 +00:00
private async revertZoneChanges(name: string, error: Error): Promise<void> {
log.info(
2021-05-19 21:25:56 +00:00
`revertZoneChanges(${name}): ` +
`pending sender keys size ${this.pendingSenderKeys.size}, ` +
`pending sessions size ${this.pendingSessions.size}, ` +
2021-05-19 21:25:56 +00:00
`pending unprocessed size ${this.pendingUnprocessed.size}`,
Errors.toLogFormat(error)
);
this.pendingSenderKeys.clear();
this.pendingSessions.clear();
this.pendingUnprocessed.clear();
}
2021-05-19 21:25:56 +00:00
private isInTopLevelZone(): boolean {
return this.currentZoneDepth === 1;
}
private enterZone(zone: Zone, name: string): void {
this.currentZoneDepth += 1;
if (this.currentZoneDepth === 1) {
assertDev(this.currentZone === undefined, 'Should not be in the zone');
2021-05-19 21:25:56 +00:00
this.currentZone = zone;
if (zone !== GLOBAL_ZONE) {
log.info(`SignalProtocolStore.enterZone(${zone.name}:${name})`);
2021-05-19 21:25:56 +00:00
}
}
}
private leaveZone(zone: Zone): void {
assertDev(this.currentZone === zone, 'Should be in the correct zone');
2021-05-19 21:25:56 +00:00
this.currentZoneDepth -= 1;
assertDev(
this.currentZoneDepth >= 0,
'Unmatched number of leaveZone calls'
);
2021-05-19 21:25:56 +00:00
// Since we allow re-entering zones we might actually be in two overlapping
// async calls. Leave the zone and yield to another one only if there are
// no active zone users anymore.
if (this.currentZoneDepth !== 0) {
return;
}
if (zone !== GLOBAL_ZONE) {
log.info(`SignalProtocolStore.leaveZone(${zone.name})`);
2021-05-19 21:25:56 +00:00
}
this.currentZone = undefined;
2021-08-24 21:07:40 +00:00
2021-05-19 21:25:56 +00:00
const next = this.zoneQueue.shift();
2021-08-24 21:07:40 +00:00
if (!next) {
return;
}
const toEnter = [next];
while (this.zoneQueue[0]?.zone === next.zone) {
const elem = this.zoneQueue.shift();
assertDev(elem, 'Zone element should be present');
2021-08-24 21:07:40 +00:00
toEnter.push(elem);
}
log.info(
2021-08-24 21:07:40 +00:00
`SignalProtocolStore: running blocked ${toEnter.length} jobs in ` +
`zone ${next.zone.name}`
);
for (const { callback } of toEnter) {
callback();
}
}
async loadSession(
qualifiedAddress: QualifiedAddress,
2021-05-19 21:25:56 +00:00
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<SessionRecord | undefined> {
2021-05-19 21:25:56 +00:00
return this.withZone(zone, 'loadSession', async () => {
if (!this.sessions) {
throw new Error('loadSession: this.sessions not yet cached!');
}
if (qualifiedAddress == null) {
throw new Error('loadSession: qualifiedAddress was undefined/null');
2021-05-19 21:25:56 +00:00
}
const id = qualifiedAddress.toString();
2021-05-19 21:25:56 +00:00
try {
const map = this.pendingSessions.has(id)
? this.pendingSessions
: this.sessions;
const entry = map.get(id);
2021-05-19 21:25:56 +00:00
if (!entry) {
return undefined;
}
2021-05-19 21:25:56 +00:00
if (entry.hydrated) {
return entry.item;
}
const newItem = {
hydrated: true,
item: hydrateSession(entry.fromDB),
fromDB: entry.fromDB,
};
map.set(id, newItem);
return newItem.item;
2021-05-19 21:25:56 +00:00
} catch (error) {
const errorString = Errors.toLogFormat(error);
log.error(`loadSession: failed to load session ${id}: ${errorString}`);
2021-05-19 21:25:56 +00:00
return undefined;
}
});
}
2021-02-26 23:42:45 +00:00
2021-05-25 22:40:04 +00:00
async loadSessions(
qualifiedAddresses: Array<QualifiedAddress>,
2021-05-25 22:40:04 +00:00
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<Array<SessionRecord>> {
2021-05-28 23:09:17 +00:00
return this.withZone(zone, 'loadSessions', async () => {
2021-05-25 22:40:04 +00:00
const sessions = await Promise.all(
qualifiedAddresses.map(async address =>
2021-05-25 22:40:04 +00:00
this.loadSession(address, { zone })
)
);
return sessions.filter(isNotNil);
});
}
async storeSession(
qualifiedAddress: QualifiedAddress,
record: SessionRecord,
2021-05-19 21:25:56 +00:00
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<void> {
2021-05-19 21:25:56 +00:00
await this.withZone(zone, 'storeSession', async () => {
if (!this.sessions) {
throw new Error('storeSession: this.sessions not yet cached!');
}
2021-02-26 23:42:45 +00:00
if (qualifiedAddress == null) {
throw new Error('storeSession: qualifiedAddress was undefined/null');
2021-05-19 21:25:56 +00:00
}
const { serviceId, deviceId } = qualifiedAddress;
const conversation = window.ConversationController.lookupOrCreate({
2023-08-16 20:54:39 +00:00
serviceId,
reason: 'SignalProtocolStore.storeSession',
2021-09-10 17:17:32 +00:00
});
strictAssert(
conversation !== undefined,
2021-09-10 17:17:32 +00:00
'storeSession: Ensure contact ids failed'
);
const id = qualifiedAddress.toString();
2021-02-26 23:42:45 +00:00
2021-05-19 21:25:56 +00:00
try {
const fromDB = {
id,
version: 2,
2023-08-16 20:54:39 +00:00
ourServiceId: qualifiedAddress.ourServiceId,
conversationId: conversation.id,
2023-08-16 20:54:39 +00:00
serviceId,
2021-05-19 21:25:56 +00:00
deviceId,
record: record.serialize(),
2021-05-19 21:25:56 +00:00
};
const newSession = {
hydrated: true,
fromDB,
item: record,
};
assertDev(this.currentZone, 'Must run in the zone');
2021-05-19 21:25:56 +00:00
this.pendingSessions.set(id, newSession);
// Current zone doesn't support pending sessions - commit immediately
if (!zone.supportsPendingSessions()) {
await this.commitZoneChanges('storeSession');
}
2021-05-19 21:25:56 +00:00
} catch (error) {
const errorString = Errors.toLogFormat(error);
log.error(`storeSession: Save failed for ${id}: ${errorString}`);
2021-05-19 21:25:56 +00:00
throw error;
}
});
2021-02-26 23:42:45 +00:00
}
async hasSessionWith(serviceId: ServiceIdString): Promise<boolean> {
return this.withZone(GLOBAL_ZONE, 'hasSessionWith', async () => {
if (!this.sessions) {
throw new Error('getOpenDevices: this.sessions not yet cached!');
}
return this._getAllSessions().some(
({ fromDB }) => fromDB.serviceId === serviceId
);
});
}
2021-05-25 22:40:04 +00:00
async getOpenDevices(
ourServiceId: ServiceIdString,
serviceIds: ReadonlyArray<ServiceIdString>,
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
2021-05-25 22:40:04 +00:00
): Promise<{
devices: Array<DeviceType>;
emptyServiceIds: Array<ServiceIdString>;
2021-05-25 22:40:04 +00:00
}> {
return this.withZone(zone, 'getOpenDevices', async () => {
if (!this.sessions) {
2021-05-25 22:40:04 +00:00
throw new Error('getOpenDevices: this.sessions not yet cached!');
}
if (serviceIds.length === 0) {
return { devices: [], emptyServiceIds: [] };
}
2021-02-26 23:42:45 +00:00
try {
const serviceIdSet = new Set(serviceIds);
const allSessions = this._getAllSessions();
const entries = allSessions.filter(
({ fromDB }) =>
2023-08-16 20:54:39 +00:00
fromDB.ourServiceId === ourServiceId &&
serviceIdSet.has(fromDB.serviceId)
);
2021-05-25 22:40:04 +00:00
const openEntries: Array<
| undefined
| {
entry: SessionCacheEntry;
record: SessionRecord;
}
2021-05-25 22:40:04 +00:00
> = await Promise.all(
entries.map(async entry => {
if (entry.hydrated) {
const record = entry.item;
if (record.hasCurrentState()) {
return { record, entry };
}
return undefined;
}
const record = hydrateSession(entry.fromDB);
if (record.hasCurrentState()) {
return { record, entry };
}
return undefined;
})
);
2021-02-26 23:42:45 +00:00
2021-05-25 22:40:04 +00:00
const devices = openEntries
.map(item => {
if (!item) {
2021-05-25 22:40:04 +00:00
return undefined;
}
const { entry, record } = item;
2021-05-25 22:40:04 +00:00
2023-08-16 20:54:39 +00:00
const { serviceId } = entry.fromDB;
serviceIdSet.delete(serviceId);
2021-05-25 22:40:04 +00:00
const id = entry.fromDB.deviceId;
const registrationId = record.remoteRegistrationId();
2021-05-25 22:40:04 +00:00
return {
2023-08-16 20:54:39 +00:00
serviceId,
2021-05-25 22:40:04 +00:00
id,
registrationId,
2021-05-25 22:40:04 +00:00
};
})
.filter(isNotNil);
const emptyServiceIds = Array.from(serviceIdSet.values());
2021-05-25 22:40:04 +00:00
return {
devices,
emptyServiceIds,
2021-05-25 22:40:04 +00:00
};
} catch (error) {
log.error(
2021-05-25 22:40:04 +00:00
'getOpenDevices: Failed to get devices',
Errors.toLogFormat(error)
);
2021-05-25 22:40:04 +00:00
throw error;
}
});
2021-02-26 23:42:45 +00:00
}
async getDeviceIds({
ourServiceId,
serviceId,
}: Readonly<{
ourServiceId: ServiceIdString;
serviceId: ServiceIdString;
}>): Promise<Array<number>> {
const { devices } = await this.getOpenDevices(ourServiceId, [serviceId]);
2021-05-25 22:40:04 +00:00
return devices.map((device: DeviceType) => device.id);
}
async removeSession(qualifiedAddress: QualifiedAddress): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'removeSession', async () => {
if (!this.sessions) {
throw new Error('removeSession: this.sessions not yet cached!');
}
2021-02-26 23:42:45 +00:00
const id = qualifiedAddress.toString();
log.info('removeSession: deleting session for', id);
try {
2024-07-22 18:16:33 +00:00
await DataWriter.removeSessionById(id);
this.sessions.delete(id);
this.pendingSessions.delete(id);
} catch (e) {
log.error(`removeSession: Failed to delete session for ${id}`);
}
});
2021-02-26 23:42:45 +00:00
}
async removeSessionsByConversation(identifier: string): Promise<void> {
return this.withZone(
GLOBAL_ZONE,
'removeSessionsByConversation',
async () => {
if (!this.sessions) {
throw new Error(
'removeSessionsByConversation: this.sessions not yet cached!'
);
}
if (identifier == null) {
throw new Error(
'removeSessionsByConversation: identifier was undefined/null'
);
}
log.info(
'removeSessionsByConversation: deleting sessions for',
identifier
);
const id = window.ConversationController.getConversationId(identifier);
strictAssert(
id,
`removeSessionsByConversation: Conversation not found: ${identifier}`
);
const entries = Array.from(this.sessions.values());
2021-02-26 23:42:45 +00:00
for (let i = 0, max = entries.length; i < max; i += 1) {
const entry = entries[i];
if (entry.fromDB.conversationId === id) {
this.sessions.delete(entry.fromDB.id);
this.pendingSessions.delete(entry.fromDB.id);
}
}
2024-07-22 18:16:33 +00:00
await DataWriter.removeSessionsByConversation(id);
}
);
}
2021-02-26 23:42:45 +00:00
async removeSessionsByServiceId(serviceId: ServiceIdString): Promise<void> {
return this.withZone(GLOBAL_ZONE, 'removeSessionsByServiceId', async () => {
if (!this.sessions) {
throw new Error(
'removeSessionsByServiceId: this.sessions not yet cached!'
);
}
2021-02-26 23:42:45 +00:00
log.info('removeSessionsByServiceId: deleting sessions for', serviceId);
2021-02-26 23:42:45 +00:00
const entries = Array.from(this.sessions.values());
2021-02-26 23:42:45 +00:00
for (let i = 0, max = entries.length; i < max; i += 1) {
const entry = entries[i];
2023-08-16 20:54:39 +00:00
if (entry.fromDB.serviceId === serviceId) {
this.sessions.delete(entry.fromDB.id);
this.pendingSessions.delete(entry.fromDB.id);
}
2021-02-26 23:42:45 +00:00
}
2024-07-22 18:16:33 +00:00
await DataWriter.removeSessionsByServiceId(serviceId);
});
2021-02-26 23:42:45 +00:00
}
private async _archiveSession(entry?: SessionCacheEntry, zone?: Zone) {
if (!entry) {
return;
}
const addr = QualifiedAddress.parse(entry.fromDB.id);
await this.enqueueSessionJob(
addr,
`_archiveSession(${addr.toString()})`,
async () => {
const item = entry.hydrated ? entry.item : hydrateSession(entry.fromDB);
if (!item.hasCurrentState()) {
return;
}
item.archiveCurrentState();
await this.storeSession(addr, item, { zone });
},
zone
);
}
async archiveSession(qualifiedAddress: QualifiedAddress): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'archiveSession', async () => {
if (!this.sessions) {
throw new Error('archiveSession: this.sessions not yet cached!');
}
const id = qualifiedAddress.toString();
log.info(`archiveSession: session for ${id}`);
const entry = this.pendingSessions.get(id) || this.sessions.get(id);
await this._archiveSession(entry);
});
}
async archiveSiblingSessions(
encodedAddress: Address,
2021-05-19 21:25:56 +00:00
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(zone, 'archiveSiblingSessions', async () => {
if (!this.sessions) {
throw new Error(
'archiveSiblingSessions: this.sessions not yet cached!'
);
2021-05-19 21:25:56 +00:00
}
2021-02-26 23:42:45 +00:00
log.info(
2021-05-19 21:25:56 +00:00
'archiveSiblingSessions: archiving sibling sessions for',
encodedAddress.toString()
2021-05-19 21:25:56 +00:00
);
const { serviceId, deviceId } = encodedAddress;
2021-02-26 23:42:45 +00:00
2021-05-19 21:25:56 +00:00
const allEntries = this._getAllSessions();
const entries = allEntries.filter(
entry =>
2023-08-16 20:54:39 +00:00
entry.fromDB.serviceId === serviceId &&
entry.fromDB.deviceId !== deviceId
2021-05-19 21:25:56 +00:00
);
await Promise.all(
entries.map(async entry => {
await this._archiveSession(entry, zone);
2021-05-19 21:25:56 +00:00
})
);
});
2021-02-26 23:42:45 +00:00
}
async archiveAllSessions(serviceId: ServiceIdString): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'archiveAllSessions', async () => {
if (!this.sessions) {
throw new Error('archiveAllSessions: this.sessions not yet cached!');
}
2021-02-26 23:42:45 +00:00
log.info('archiveAllSessions: archiving all sessions for', serviceId);
2021-02-26 23:42:45 +00:00
const allEntries = this._getAllSessions();
const entries = allEntries.filter(
2023-08-16 20:54:39 +00:00
entry => entry.fromDB.serviceId === serviceId
);
await Promise.all(
entries.map(async entry => {
await this._archiveSession(entry);
})
);
});
2021-02-26 23:42:45 +00:00
}
async clearSessionStore(): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'clearSessionStore', async () => {
if (this.sessions) {
this.sessions.clear();
}
this.pendingSessions.clear();
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removeAllSessions();
log.info(`clearSessionStore: Removed ${changes} sessions`);
});
2021-02-26 23:42:45 +00:00
}
async lightSessionReset(qualifiedAddress: QualifiedAddress): Promise<void> {
const id = qualifiedAddress.toString();
const sessionResets = window.storage.get(
'sessionResets',
{} as SessionResetsType
);
const lastReset = sessionResets[id];
const ONE_HOUR = 60 * 60 * 1000;
if (lastReset && isMoreRecentThan(lastReset, ONE_HOUR)) {
log.warn(
`lightSessionReset/${id}: Skipping session reset, last reset at ${lastReset}`
);
return;
}
sessionResets[id] = Date.now();
await window.storage.put('sessionResets', sessionResets);
try {
const { serviceId } = qualifiedAddress;
// First, fetch this conversation
const conversation = window.ConversationController.lookupOrCreate({
2023-08-16 20:54:39 +00:00
serviceId,
reason: 'SignalProtocolStore.lightSessionReset',
});
assertDev(conversation, `lightSessionReset/${id}: missing conversation`);
log.warn(`lightSessionReset/${id}: Resetting session`);
// Archive open session with this device
await this.archiveSession(qualifiedAddress);
// Enqueue a null message with newly-created session
await conversationJobQueue.add({
type: 'NullMessage',
conversationId: conversation.id,
idForTracking: id,
});
} catch (error) {
// If we failed to queue the session reset, then we'll allow another attempt sooner
// than one hour from now.
delete sessionResets[id];
await window.storage.put('sessionResets', sessionResets);
log.error(
`lightSessionReset/${id}: Encountered error`,
Errors.toLogFormat(error)
);
}
}
2021-02-26 23:42:45 +00:00
// Identity Keys
getIdentityRecord(serviceId: ServiceIdString): IdentityKeyType | undefined {
2021-02-26 23:42:45 +00:00
if (!this.identityKeys) {
throw new Error('getIdentityRecord: this.identityKeys not yet cached!');
}
try {
const entry = this.identityKeys.get(serviceId);
if (!entry) {
return undefined;
2021-02-26 23:42:45 +00:00
}
return entry.fromDB;
2021-02-26 23:42:45 +00:00
} catch (e) {
log.error(
`getIdentityRecord: Failed to get identity record for serviceId ${serviceId}`
2021-02-26 23:42:45 +00:00
);
return undefined;
2021-02-26 23:42:45 +00:00
}
}
async getOrMigrateIdentityRecord(
serviceId: ServiceIdString
): Promise<IdentityKeyType | undefined> {
if (!this.identityKeys) {
throw new Error(
'getOrMigrateIdentityRecord: this.identityKeys not yet cached!'
);
}
const result = this.getIdentityRecord(serviceId);
if (result) {
return result;
}
const newId = serviceId;
const conversation = window.ConversationController.get(newId);
if (!conversation) {
return undefined;
}
2021-10-26 22:59:08 +00:00
const conversationId = conversation.id;
const record = this.identityKeys.get(`conversation:${conversationId}`);
if (!record) {
return undefined;
}
const newRecord = {
...record.fromDB,
id: newId,
};
log.info(
`SignalProtocolStore: migrating identity key from ${record.fromDB.id} ` +
`to ${newRecord.id}`
);
await this._saveIdentityKey(newRecord);
this.identityKeys.delete(record.fromDB.id);
2024-07-22 18:16:33 +00:00
const changes = await DataWriter.removeIdentityKeyById(record.fromDB.id);
log.info(
`getOrMigrateIdentityRecord: Removed ${changes} old identity keys for ${record.fromDB.id}`
);
return newRecord;
}
// https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/crypto/storage/SignalBaseIdentityKeyStore.java#L128
2021-02-26 23:42:45 +00:00
async isTrustedIdentity(
encodedAddress: Address,
2021-09-24 00:49:05 +00:00
publicKey: Uint8Array,
2021-02-26 23:42:45 +00:00
direction: number
): Promise<boolean> {
if (!this.identityKeys) {
throw new Error('isTrustedIdentity: this.identityKeys not yet cached!');
2021-02-26 23:42:45 +00:00
}
if (encodedAddress == null) {
throw new Error('isTrustedIdentity: encodedAddress was undefined/null');
2021-02-26 23:42:45 +00:00
}
const isOurIdentifier = window.textsecure.storage.user.isOurServiceId(
encodedAddress.serviceId
);
2021-02-26 23:42:45 +00:00
const identityRecord = await this.getOrMigrateIdentityRecord(
encodedAddress.serviceId
);
2021-02-26 23:42:45 +00:00
if (isOurIdentifier) {
if (identityRecord && identityRecord.publicKey) {
return constantTimeEqual(identityRecord.publicKey, publicKey);
}
log.warn(
2021-02-26 23:42:45 +00:00
'isTrustedIdentity: No local record for our own identifier. Returning true.'
);
return true;
}
switch (direction) {
case Direction.Sending:
return this.isTrustedForSending(
encodedAddress.serviceId,
publicKey,
identityRecord
);
case Direction.Receiving:
2021-02-26 23:42:45 +00:00
return true;
default:
throw new Error(`isTrustedIdentity: Unknown direction: ${direction}`);
2021-02-26 23:42:45 +00:00
}
}
// https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/crypto/storage/SignalBaseIdentityKeyStore.java#L233
2021-02-26 23:42:45 +00:00
isTrustedForSending(
serviceId: ServiceIdString,
2021-09-24 00:49:05 +00:00
publicKey: Uint8Array,
2021-02-26 23:42:45 +00:00
identityRecord?: IdentityKeyType
): boolean {
if (!identityRecord) {
// To track key changes across session switches, we save an old identity key on the
// conversation.
const conversation = window.ConversationController.get(serviceId);
const previousIdentityKeyBase64 = conversation?.get(
'previousIdentityKey'
);
if (conversation && previousIdentityKeyBase64) {
const previousIdentityKey = Bytes.fromBase64(previousIdentityKeyBase64);
if (!constantTimeEqual(previousIdentityKey, publicKey)) {
log.info(
'isTrustedForSending: previousIdentityKey does not match, returning false'
);
return false;
}
}
log.info(
'isTrustedForSending: No previous record or previousIdentityKey, returning true'
);
2021-02-26 23:42:45 +00:00
return true;
}
const existing = identityRecord.publicKey;
if (!existing) {
log.info('isTrustedForSending: Nothing here, returning true...');
2021-02-26 23:42:45 +00:00
return true;
}
if (!constantTimeEqual(existing, publicKey)) {
log.info("isTrustedForSending: Identity keys don't match...");
2021-02-26 23:42:45 +00:00
return false;
}
if (identityRecord.verified === VerifiedStatus.UNVERIFIED) {
log.error('isTrustedForSending: Needs unverified approval!');
2021-02-26 23:42:45 +00:00
return false;
}
if (this.isNonBlockingApprovalRequired(identityRecord)) {
log.error('isTrustedForSending: Needs non-blocking approval!');
2021-02-26 23:42:45 +00:00
return false;
}
return true;
}
async loadIdentityKey(
serviceId: ServiceIdString
): Promise<Uint8Array | undefined> {
if (serviceId == null) {
throw new Error('loadIdentityKey: serviceId was undefined/null');
2021-02-26 23:42:45 +00:00
}
const identityRecord = await this.getOrMigrateIdentityRecord(serviceId);
2021-02-26 23:42:45 +00:00
if (identityRecord) {
return identityRecord.publicKey;
}
return undefined;
}
async getFingerprint(
serviceId: ServiceIdString
): Promise<string | undefined> {
if (serviceId == null) {
throw new Error('loadIdentityKey: serviceId was undefined/null');
}
const pubKey = await this.loadIdentityKey(serviceId);
if (!pubKey) {
return;
}
const hash = sha256(pubKey);
const fingerprint = hash.slice(0, 4);
return Bytes.toBase64(fingerprint);
}
2021-02-26 23:42:45 +00:00
private async _saveIdentityKey(data: IdentityKeyType): Promise<void> {
if (!this.identityKeys) {
throw new Error('_saveIdentityKey: this.identityKeys not yet cached!');
}
const { id } = data;
2024-07-22 18:16:33 +00:00
await DataWriter.createOrUpdateIdentityKey(data);
this.identityKeys.set(id, {
hydrated: false,
fromDB: data,
});
2021-02-26 23:42:45 +00:00
}
// https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/crypto/storage/SignalBaseIdentityKeyStore.java#L69
2021-02-26 23:42:45 +00:00
async saveIdentity(
encodedAddress: Address,
2021-09-24 00:49:05 +00:00
publicKey: Uint8Array,
nonblockingApproval = false,
{ zone = GLOBAL_ZONE, noOverwrite = false }: SaveIdentityOptions = {}
2021-02-26 23:42:45 +00:00
): Promise<boolean> {
if (!this.identityKeys) {
throw new Error('saveIdentity: this.identityKeys not yet cached!');
}
if (encodedAddress == null) {
throw new Error('saveIdentity: encodedAddress was undefined/null');
2021-02-26 23:42:45 +00:00
}
2021-09-24 00:49:05 +00:00
if (!(publicKey instanceof Uint8Array)) {
2021-02-26 23:42:45 +00:00
// eslint-disable-next-line no-param-reassign
2021-09-24 00:49:05 +00:00
publicKey = Bytes.fromBinary(publicKey);
2021-02-26 23:42:45 +00:00
}
if (typeof nonblockingApproval !== 'boolean') {
// eslint-disable-next-line no-param-reassign
nonblockingApproval = false;
}
2023-10-05 00:39:09 +00:00
return this._runOnIdentityQueue(
encodedAddress.serviceId,
zone,
'saveIdentity',
async () => {
const identityRecord = await this.getOrMigrateIdentityRecord(
encodedAddress.serviceId
);
2023-10-05 00:39:09 +00:00
const id = encodedAddress.serviceId;
const logId = `saveIdentity(${id})`;
if (!identityRecord || !identityRecord.publicKey) {
// Lookup failed, or the current key was removed, so save this one.
log.info(`${logId}: Saving new identity...`);
await this._saveIdentityKey({
id,
publicKey,
firstUse: true,
timestamp: Date.now(),
verified: VerifiedStatus.DEFAULT,
nonblockingApproval,
});
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
this.checkPreviousKey(
encodedAddress.serviceId,
publicKey,
'saveIdentity'
);
2023-10-05 00:39:09 +00:00
return false;
}
if (noOverwrite) {
return false;
}
2023-10-05 00:39:09 +00:00
const identityKeyChanged = !constantTimeEqual(
identityRecord.publicKey,
publicKey
);
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
if (identityKeyChanged) {
const isOurIdentifier = window.textsecure.storage.user.isOurServiceId(
encodedAddress.serviceId
);
2023-10-05 00:39:09 +00:00
if (isOurIdentifier && identityKeyChanged) {
log.warn(`${logId}: ignoring identity for ourselves`);
return false;
}
2023-10-05 00:39:09 +00:00
log.info(`${logId}: Replacing existing identity...`);
const previousStatus = identityRecord.verified;
let verifiedStatus;
if (
previousStatus === VerifiedStatus.VERIFIED ||
previousStatus === VerifiedStatus.UNVERIFIED
) {
verifiedStatus = VerifiedStatus.UNVERIFIED;
} else {
verifiedStatus = VerifiedStatus.DEFAULT;
}
2023-10-05 00:39:09 +00:00
await this._saveIdentityKey({
id,
publicKey,
firstUse: false,
timestamp: Date.now(),
verified: verifiedStatus,
nonblockingApproval,
});
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
// See `addKeyChange` in `ts/models/conversations.ts` for sender key info
// update caused by this.
try {
this.emit(
'keychange',
encodedAddress.serviceId,
'saveIdentity - change'
);
} catch (error) {
log.error(
`${logId}: error triggering keychange:`,
Errors.toLogFormat(error)
);
}
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
// Pass the zone to facilitate transactional session use in
// MessageReceiver.ts
await this.archiveSiblingSessions(encodedAddress, {
zone,
});
2023-10-05 00:39:09 +00:00
return true;
2023-04-19 16:13:48 +00:00
}
2023-10-05 00:39:09 +00:00
if (this.isNonBlockingApprovalRequired(identityRecord)) {
log.info(`${logId}: Setting approval status...`);
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
identityRecord.nonblockingApproval = nonblockingApproval;
await this._saveIdentityKey(identityRecord);
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
return false;
}
2021-02-26 23:42:45 +00:00
2023-04-19 16:13:48 +00:00
return false;
}
2023-10-05 00:39:09 +00:00
);
2021-02-26 23:42:45 +00:00
}
// https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/crypto/storage/SignalBaseIdentityKeyStore.java#L257
private isNonBlockingApprovalRequired(
identityRecord: IdentityKeyType
): boolean {
2021-02-26 23:42:45 +00:00
return (
!identityRecord.firstUse &&
isMoreRecentThan(identityRecord.timestamp, TIMESTAMP_THRESHOLD) &&
2021-02-26 23:42:45 +00:00
!identityRecord.nonblockingApproval
);
}
async saveIdentityWithAttributes(
serviceId: ServiceIdString,
attributes: Partial<IdentityKeyType>
2023-04-19 16:13:48 +00:00
): Promise<void> {
2023-10-05 00:39:09 +00:00
return this._runOnIdentityQueue(
serviceId,
GLOBAL_ZONE,
'saveIdentityWithAttributes',
async () => {
return this.saveIdentityWithAttributesOnQueue(serviceId, attributes);
}
);
2023-04-19 16:13:48 +00:00
}
private async saveIdentityWithAttributesOnQueue(
serviceId: ServiceIdString,
2023-04-19 16:13:48 +00:00
attributes: Partial<IdentityKeyType>
2021-02-26 23:42:45 +00:00
): Promise<void> {
if (serviceId == null) {
throw new Error(
'saveIdentityWithAttributes: serviceId was undefined/null'
);
2021-02-26 23:42:45 +00:00
}
const identityRecord = await this.getOrMigrateIdentityRecord(serviceId);
const id = serviceId;
2022-04-20 19:35:53 +00:00
// When saving a PNI identity - don't create a separate conversation
const serviceIdKind =
window.textsecure.storage.user.getOurServiceIdKind(serviceId);
if (serviceIdKind !== ServiceIdKind.PNI) {
2022-04-20 19:35:53 +00:00
window.ConversationController.getOrCreate(id, 'private');
}
2021-02-26 23:42:45 +00:00
const updates: Partial<IdentityKeyType> = {
2021-02-26 23:42:45 +00:00
...identityRecord,
...attributes,
id,
};
if (validateIdentityKey(updates)) {
2021-02-26 23:42:45 +00:00
await this._saveIdentityKey(updates);
}
}
async setApproval(
serviceId: ServiceIdString,
nonblockingApproval: boolean
): Promise<void> {
if (serviceId == null) {
throw new Error('setApproval: serviceId was undefined/null');
2021-02-26 23:42:45 +00:00
}
if (typeof nonblockingApproval !== 'boolean') {
throw new Error('setApproval: Invalid approval status');
2021-02-26 23:42:45 +00:00
}
2023-10-05 00:39:09 +00:00
return this._runOnIdentityQueue(
serviceId,
GLOBAL_ZONE,
'setApproval',
async () => {
const identityRecord = await this.getOrMigrateIdentityRecord(serviceId);
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
if (!identityRecord) {
throw new Error(`setApproval: No identity record for ${serviceId}`);
}
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
identityRecord.nonblockingApproval = nonblockingApproval;
await this._saveIdentityKey(identityRecord);
}
);
2021-02-26 23:42:45 +00:00
}
// https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/crypto/storage/SignalBaseIdentityKeyStore.java#L215
// and https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/verify/VerifyDisplayFragment.java#L544
2021-02-26 23:42:45 +00:00
async setVerified(
serviceId: ServiceIdString,
2021-02-26 23:42:45 +00:00
verifiedStatus: number,
extra: SetVerifiedExtra = {}
2021-02-26 23:42:45 +00:00
): Promise<void> {
if (serviceId == null) {
throw new Error('setVerified: serviceId was undefined/null');
2021-02-26 23:42:45 +00:00
}
if (!validateVerifiedStatus(verifiedStatus)) {
throw new Error('setVerified: Invalid verified status');
2021-02-26 23:42:45 +00:00
}
2023-10-05 00:39:09 +00:00
return this._runOnIdentityQueue(
serviceId,
GLOBAL_ZONE,
'setVerified',
async () => {
const identityRecord = await this.getOrMigrateIdentityRecord(serviceId);
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
if (!identityRecord) {
throw new Error(`setVerified: No identity record for ${serviceId}`);
}
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
if (validateIdentityKey(identityRecord)) {
await this._saveIdentityKey({
...identityRecord,
...extra,
verified: verifiedStatus,
});
}
2023-04-19 16:13:48 +00:00
}
2023-10-05 00:39:09 +00:00
);
2021-02-26 23:42:45 +00:00
}
async getVerified(serviceId: ServiceIdString): Promise<number> {
if (serviceId == null) {
throw new Error('getVerified: serviceId was undefined/null');
2021-02-26 23:42:45 +00:00
}
const identityRecord = await this.getOrMigrateIdentityRecord(serviceId);
2021-02-26 23:42:45 +00:00
if (!identityRecord) {
throw new Error(`getVerified: No identity record for ${serviceId}`);
2021-02-26 23:42:45 +00:00
}
const verifiedStatus = identityRecord.verified;
if (validateVerifiedStatus(verifiedStatus)) {
return verifiedStatus;
}
return VerifiedStatus.DEFAULT;
}
// To track key changes across session switches, we save an old identity key on the
// conversation. Whenever we get a new identity key for that contact, we need to
// check it against that saved key - no need to pop a key change warning if it is
// the same!
checkPreviousKey(
serviceId: ServiceIdString,
publicKey: Uint8Array,
context: string
): void {
const conversation = window.ConversationController.get(serviceId);
const previousIdentityKeyBase64 = conversation?.get('previousIdentityKey');
if (conversation && previousIdentityKeyBase64) {
const previousIdentityKey = Bytes.fromBase64(previousIdentityKeyBase64);
try {
if (!constantTimeEqual(previousIdentityKey, publicKey)) {
this.emit(
'keychange',
serviceId,
`${context} - previousIdentityKey check`
);
}
// We only want to clear previousIdentityKey on a match, or on successfully emit.
conversation.set({ previousIdentityKey: undefined });
2024-07-22 18:16:33 +00:00
drop(DataWriter.updateConversation(conversation.attributes));
} catch (error) {
log.error(
'saveIdentity: error triggering keychange:',
error && error.stack ? error.stack : error
);
}
}
}
// See https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/database/IdentityDatabase.java#L184
async updateIdentityAfterSync(
serviceId: ServiceIdString,
2021-02-26 23:42:45 +00:00
verifiedStatus: number,
publicKey: Uint8Array
2021-02-26 23:42:45 +00:00
): Promise<boolean> {
strictAssert(
validateVerifiedStatus(verifiedStatus),
`Invalid verified status: ${verifiedStatus}`
);
2021-02-26 23:42:45 +00:00
2023-10-05 00:39:09 +00:00
return this._runOnIdentityQueue(
serviceId,
GLOBAL_ZONE,
'updateIdentityAfterSync',
async () => {
const identityRecord = await this.getOrMigrateIdentityRecord(serviceId);
const hadEntry = identityRecord !== undefined;
const keyMatches = Boolean(
identityRecord?.publicKey &&
constantTimeEqual(publicKey, identityRecord.publicKey)
);
const statusMatches =
keyMatches && verifiedStatus === identityRecord?.verified;
if (!keyMatches || !statusMatches) {
await this.saveIdentityWithAttributesOnQueue(serviceId, {
publicKey,
verified: verifiedStatus,
firstUse: !hadEntry,
timestamp: Date.now(),
nonblockingApproval: true,
});
}
if (!hadEntry) {
this.checkPreviousKey(
serviceId,
publicKey,
'updateIdentityAfterSync'
2023-04-19 16:13:48 +00:00
);
2023-10-05 00:39:09 +00:00
} else if (hadEntry && !keyMatches) {
try {
this.emit(
'keychange',
serviceId,
'updateIdentityAfterSync - change'
);
} catch (error) {
log.error(
'updateIdentityAfterSync: error triggering keychange:',
Errors.toLogFormat(error)
);
}
2023-04-19 16:13:48 +00:00
}
2023-10-05 00:39:09 +00:00
// See: https://github.com/signalapp/Signal-Android/blob/fc3db538bcaa38dc149712a483d3032c9c1f3998/app/src/main/java/org/thoughtcrime/securesms/database/RecipientDatabase.kt#L921-L936
if (
verifiedStatus === VerifiedStatus.VERIFIED &&
(!hadEntry || identityRecord?.verified !== VerifiedStatus.VERIFIED)
) {
// Needs a notification.
return true;
}
if (
verifiedStatus !== VerifiedStatus.VERIFIED &&
hadEntry &&
identityRecord?.verified === VerifiedStatus.VERIFIED
) {
// Needs a notification.
return true;
}
return false;
2023-04-19 16:13:48 +00:00
}
2023-10-05 00:39:09 +00:00
);
2021-02-26 23:42:45 +00:00
}
isUntrusted(
serviceId: ServiceIdString,
timestampThreshold = TIMESTAMP_THRESHOLD
): boolean {
if (serviceId == null) {
throw new Error('isUntrusted: serviceId was undefined/null');
2021-02-26 23:42:45 +00:00
}
const identityRecord = this.getIdentityRecord(serviceId);
2021-02-26 23:42:45 +00:00
if (!identityRecord) {
throw new Error(`isUntrusted: No identity record for ${serviceId}`);
2021-02-26 23:42:45 +00:00
}
if (
isMoreRecentThan(identityRecord.timestamp, timestampThreshold) &&
2021-02-26 23:42:45 +00:00
!identityRecord.nonblockingApproval &&
!identityRecord.firstUse
) {
return true;
}
return false;
}
async removeIdentityKey(serviceId: ServiceIdString): Promise<void> {
2021-02-26 23:42:45 +00:00
if (!this.identityKeys) {
throw new Error('removeIdentityKey: this.identityKeys not yet cached!');
}
const id = serviceId;
this.identityKeys.delete(id);
2024-07-22 18:16:33 +00:00
await DataWriter.removeIdentityKeyById(serviceId);
await this.removeSessionsByServiceId(serviceId);
2021-02-26 23:42:45 +00:00
}
// Not yet processed messages - for resiliency
getUnprocessedCount(): Promise<number> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'getUnprocessedCount', async () => {
2024-07-22 18:16:33 +00:00
return DataReader.getUnprocessedCount();
});
2021-02-26 23:42:45 +00:00
}
getAllUnprocessedIds(): Promise<Array<string>> {
return this.withZone(GLOBAL_ZONE, 'getAllUnprocessedIds', () => {
2024-07-22 18:16:33 +00:00
return DataWriter.getAllUnprocessedIds();
});
2021-02-26 23:42:45 +00:00
}
getUnprocessedByIdsAndIncrementAttempts(
ids: ReadonlyArray<string>
): Promise<Array<UnprocessedType>> {
return this.withZone(
GLOBAL_ZONE,
'getAllUnprocessedByIdsAndIncrementAttempts',
async () => {
2024-07-22 18:16:33 +00:00
return DataWriter.getUnprocessedByIdsAndIncrementAttempts(ids);
}
);
}
2021-02-26 23:42:45 +00:00
getUnprocessedById(id: string): Promise<UnprocessedType | undefined> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'getUnprocessedById', async () => {
2024-07-22 18:16:33 +00:00
return DataReader.getUnprocessedById(id);
});
2021-02-26 23:42:45 +00:00
}
addUnprocessed(
data: UnprocessedType,
2021-05-19 21:25:56 +00:00
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(zone, 'addUnprocessed', async () => {
this.pendingUnprocessed.set(data.id, data);
// Current zone doesn't support pending unprocessed - commit immediately
if (!zone.supportsPendingUnprocessed()) {
await this.commitZoneChanges('addUnprocessed');
}
});
2021-02-26 23:42:45 +00:00
}
addMultipleUnprocessed(
array: Array<UnprocessedType>,
2021-05-19 21:25:56 +00:00
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(zone, 'addMultipleUnprocessed', async () => {
for (const elem of array) {
this.pendingUnprocessed.set(elem.id, elem);
}
// Current zone doesn't support pending unprocessed - commit immediately
if (!zone.supportsPendingUnprocessed()) {
await this.commitZoneChanges('addMultipleUnprocessed');
}
});
2021-02-26 23:42:45 +00:00
}
updateUnprocessedWithData(
id: string,
data: UnprocessedUpdateType
): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'updateUnprocessedWithData', async () => {
2024-07-22 18:16:33 +00:00
await DataWriter.updateUnprocessedWithData(id, data);
});
2021-02-26 23:42:45 +00:00
}
updateUnprocessedsWithData(
items: Array<{ id: string; data: UnprocessedUpdateType }>
): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(
GLOBAL_ZONE,
'updateUnprocessedsWithData',
async () => {
2024-07-22 18:16:33 +00:00
await DataWriter.updateUnprocessedsWithData(items);
2021-05-19 21:25:56 +00:00
}
);
2021-02-26 23:42:45 +00:00
}
removeUnprocessed(idOrArray: string | Array<string>): Promise<void> {
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'removeUnprocessed', async () => {
2024-07-22 18:16:33 +00:00
await DataWriter.removeUnprocessed(idOrArray);
});
2021-02-26 23:42:45 +00:00
}
/** only for testing */
2021-02-26 23:42:45 +00:00
removeAllUnprocessed(): Promise<void> {
log.info('removeAllUnprocessed');
2021-05-19 21:25:56 +00:00
return this.withZone(GLOBAL_ZONE, 'removeAllUnprocessed', async () => {
2024-07-22 18:16:33 +00:00
await DataWriter.removeAllUnprocessed();
});
2021-02-26 23:42:45 +00:00
}
async removeOurOldPni(oldPni: PniString): Promise<void> {
2022-07-28 16:35:29 +00:00
const { storage } = window;
log.info(`SignalProtocolStore.removeOurOldPni(${oldPni})`);
// Update caches
this.ourIdentityKeys.delete(oldPni);
this.ourRegistrationIds.delete(oldPni);
2022-07-28 16:35:29 +00:00
const preKeyPrefix = `${oldPni}:`;
2022-07-28 16:35:29 +00:00
if (this.preKeys) {
for (const key of this.preKeys.keys()) {
if (key.startsWith(preKeyPrefix)) {
this.preKeys.delete(key);
}
}
}
if (this.signedPreKeys) {
for (const key of this.signedPreKeys.keys()) {
if (key.startsWith(preKeyPrefix)) {
this.signedPreKeys.delete(key);
}
}
}
if (this.kyberPreKeys) {
for (const key of this.kyberPreKeys.keys()) {
if (key.startsWith(preKeyPrefix)) {
this.kyberPreKeys.delete(key);
}
}
}
2022-07-28 16:35:29 +00:00
// Update database
await Promise.all([
storage.put(
'identityKeyMap',
omit(storage.get('identityKeyMap') || {}, oldPni)
2022-07-28 16:35:29 +00:00
),
storage.put(
'registrationIdMap',
omit(storage.get('registrationIdMap') || {}, oldPni)
2022-07-28 16:35:29 +00:00
),
2024-07-22 18:16:33 +00:00
DataWriter.removePreKeysByServiceId(oldPni),
DataWriter.removeSignedPreKeysByServiceId(oldPni),
DataWriter.removeKyberPreKeysByServiceId(oldPni),
2022-07-28 16:35:29 +00:00
]);
}
2022-08-02 01:31:24 +00:00
async updateOurPniKeyMaterial(
pni: PniString,
2022-08-02 01:31:24 +00:00
{
identityKeyPair: identityBytes,
lastResortKyberPreKey: lastResortKyberPreKeyBytes,
2022-08-02 01:31:24 +00:00
signedPreKey: signedPreKeyBytes,
registrationId,
}: PniKeyMaterialType
): Promise<void> {
const logId = `SignalProtocolStore.updateOurPniKeyMaterial(${pni})`;
log.info(`${logId}: starting...`);
2022-08-02 01:31:24 +00:00
2022-07-28 16:35:29 +00:00
const identityKeyPair = IdentityKeyPair.deserialize(
Buffer.from(identityBytes)
);
const signedPreKey = SignedPreKeyRecord.deserialize(
Buffer.from(signedPreKeyBytes)
);
const lastResortKyberPreKey = lastResortKyberPreKeyBytes
? KyberPreKeyRecord.deserialize(Buffer.from(lastResortKyberPreKeyBytes))
: undefined;
2022-08-02 01:31:24 +00:00
2022-07-28 16:35:29 +00:00
const { storage } = window;
2022-08-02 01:31:24 +00:00
2022-07-28 16:35:29 +00:00
const pniPublicKey = identityKeyPair.publicKey.serialize();
const pniPrivateKey = identityKeyPair.privateKey.serialize();
2022-08-02 01:31:24 +00:00
2022-07-28 16:35:29 +00:00
// Update caches
this.ourIdentityKeys.set(pni, {
2022-07-28 16:35:29 +00:00
pubKey: pniPublicKey,
privKey: pniPrivateKey,
});
this.ourRegistrationIds.set(pni, registrationId);
2022-08-02 01:31:24 +00:00
2022-07-28 16:35:29 +00:00
// Update database
2024-02-16 20:39:58 +00:00
await Promise.all<void>([
2022-07-28 16:35:29 +00:00
storage.put('identityKeyMap', {
...(storage.get('identityKeyMap') || {}),
[pni]: {
2022-07-28 16:35:29 +00:00
pubKey: pniPublicKey,
privKey: pniPrivateKey,
},
}),
storage.put('registrationIdMap', {
...(storage.get('registrationIdMap') || {}),
[pni]: registrationId,
2022-07-28 16:35:29 +00:00
}),
2024-02-16 20:39:58 +00:00
(async () => {
const newId = signedPreKey.id() + 1;
log.warn(`${logId}: Updating next signed pre key id to ${newId}`);
await storage.put(SIGNED_PRE_KEY_ID_KEY[ServiceIdKind.PNI], newId);
2024-02-16 20:39:58 +00:00
})(),
2022-07-28 16:35:29 +00:00
this.storeSignedPreKey(
pni,
signedPreKey.id(),
{
privKey: signedPreKey.privateKey().serialize(),
pubKey: signedPreKey.publicKey().serialize(),
},
true,
signedPreKey.timestamp()
),
2024-02-16 20:39:58 +00:00
(async () => {
if (!lastResortKyberPreKey) {
return;
}
const newId = lastResortKyberPreKey.id() + 1;
log.warn(`${logId}: Updating next kyber pre key id to ${newId}`);
await storage.put(KYBER_KEY_ID_KEY[ServiceIdKind.PNI], newId);
2024-02-16 20:39:58 +00:00
})(),
lastResortKyberPreKeyBytes && lastResortKyberPreKey
? this.storeKyberPreKeys(pni, [
{
createdAt: lastResortKyberPreKey.timestamp(),
data: lastResortKyberPreKeyBytes,
isConfirmed: true,
isLastResort: true,
keyId: lastResortKyberPreKey.id(),
2023-08-16 20:54:39 +00:00
ourServiceId: pni,
},
])
: undefined,
2022-07-28 16:35:29 +00:00
]);
}
2021-02-26 23:42:45 +00:00
async removeAllData(): Promise<void> {
2024-07-22 18:16:33 +00:00
await DataWriter.removeAll();
2021-02-26 23:42:45 +00:00
await this.hydrateCaches();
window.storage.reset();
await window.storage.fetch();
window.ConversationController.reset();
await window.ConversationController.load();
this.emit('removeAllData');
2021-02-26 23:42:45 +00:00
}
async removeAllConfiguration(): Promise<void> {
// Conversations. These properties are not present in redux.
window.getConversations().forEach(conversation => {
conversation.unset('storageID');
conversation.unset('needsStorageServiceSync');
conversation.unset('storageUnknownFields');
conversation.unset('senderKeyInfo');
});
2024-07-22 18:16:33 +00:00
await DataWriter.removeAllConfiguration();
2021-02-26 23:42:45 +00:00
await this.hydrateCaches();
window.storage.reset();
await window.storage.fetch();
}
2022-08-15 21:53:33 +00:00
signAlternateIdentity(): PniSignatureMessageType | undefined {
const ourAci = window.textsecure.storage.user.getCheckedAci();
const ourPni = window.textsecure.storage.user.getPni();
if (!ourPni) {
2022-08-15 21:53:33 +00:00
log.error('signAlternateIdentity: No local pni');
return undefined;
}
if (this.cachedPniSignatureMessage?.pni === ourPni) {
2022-08-15 21:53:33 +00:00
return this.cachedPniSignatureMessage;
}
const aciKeyPair = this.getIdentityKeyPair(ourAci);
const pniKeyPair = this.getIdentityKeyPair(ourPni);
2022-08-15 21:53:33 +00:00
if (!aciKeyPair) {
log.error('signAlternateIdentity: No local ACI key pair');
return undefined;
}
if (!pniKeyPair) {
log.error('signAlternateIdentity: No local PNI key pair');
return undefined;
}
const pniIdentity = new IdentityKeyPair(
PublicKey.deserialize(Buffer.from(pniKeyPair.pubKey)),
PrivateKey.deserialize(Buffer.from(pniKeyPair.privKey))
);
const aciPubKey = PublicKey.deserialize(Buffer.from(aciKeyPair.pubKey));
this.cachedPniSignatureMessage = {
pni: ourPni,
2022-08-15 21:53:33 +00:00
signature: pniIdentity.signAlternateIdentity(aciPubKey),
};
return this.cachedPniSignatureMessage;
}
async verifyAlternateIdentity({
aci,
pni,
signature,
}: VerifyAlternateIdentityOptionsType): Promise<boolean> {
const logId = `SignalProtocolStore.verifyAlternateIdentity(${aci}, ${pni})`;
const aciPublicKeyBytes = await this.loadIdentityKey(aci);
if (!aciPublicKeyBytes) {
log.warn(`${logId}: no ACI public key`);
return false;
}
const pniPublicKeyBytes = await this.loadIdentityKey(pni);
if (!pniPublicKeyBytes) {
log.warn(`${logId}: no PNI public key`);
return false;
}
const aciPublicKey = PublicKey.deserialize(Buffer.from(aciPublicKeyBytes));
const pniPublicKey = PublicKey.deserialize(Buffer.from(pniPublicKeyBytes));
return pniPublicKey.verifyAlternateIdentity(
aciPublicKey,
Buffer.from(signature)
);
}
private _getAllSessions(): Array<SessionCacheEntry> {
const union = new Map<string, SessionCacheEntry>();
this.sessions?.forEach((value, key) => {
union.set(key, value);
});
this.pendingSessions.forEach((value, key) => {
union.set(key, value);
});
return Array.from(union.values());
}
private emitLowKeys(ourServiceId: ServiceIdString, source: string) {
const logId = `SignalProtocolStore.emitLowKeys/${source}:`;
try {
log.info(`${logId}: Emitting event`);
this.emit('lowKeys', ourServiceId);
} catch (error) {
log.error(`${logId}: Error thrown from emit`, Errors.toLogFormat(error));
}
}
//
// EventEmitter types
//
public override on(
name: 'lowKeys',
handler: (ourServiceId: ServiceIdString) => unknown
): this;
public override on(
name: 'keychange',
handler: (theirServiceId: ServiceIdString, reason: string) => unknown
): this;
public override on(name: 'removeAllData', handler: () => unknown): this;
public override on(
eventName: string | symbol,
// eslint-disable-next-line @typescript-eslint/no-explicit-any
listener: (...args: Array<any>) => void
): this {
return super.on(eventName, listener);
}
public override emit(name: 'lowKeys', ourServiceid: ServiceIdString): boolean;
public override emit(
name: 'keychange',
theirServiceId: ServiceIdString,
reason: string
): boolean;
public override emit(name: 'removeAllData'): boolean;
public override emit(
eventName: string | symbol,
// eslint-disable-next-line @typescript-eslint/no-explicit-any
...args: Array<any>
): boolean {
return super.emit(eventName, ...args);
}
2021-02-26 23:42:45 +00:00
}
2023-01-13 00:24:59 +00:00
export function getSignalProtocolStore(): SignalProtocolStore {
return new SignalProtocolStore();
}
2021-02-26 23:42:45 +00:00
window.SignalProtocolStore = SignalProtocolStore;