2021-02-26 23:42:45 +00:00
|
|
|
// Copyright 2016-2021 Signal Messenger, LLC
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
/* eslint-disable class-methods-use-this */
|
2021-05-17 18:03:42 +00:00
|
|
|
/* eslint-disable no-restricted-syntax */
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
import PQueue from 'p-queue';
|
|
|
|
import { isNumber } from 'lodash';
|
2021-05-25 22:40:04 +00:00
|
|
|
import { z } from 'zod';
|
2021-04-16 23:13:13 +00:00
|
|
|
|
|
|
|
import {
|
2021-05-14 01:18:43 +00:00
|
|
|
Direction,
|
2021-04-16 23:13:13 +00:00
|
|
|
PreKeyRecord,
|
|
|
|
PrivateKey,
|
|
|
|
PublicKey,
|
2021-05-14 01:18:43 +00:00
|
|
|
SenderKeyRecord,
|
|
|
|
SessionRecord,
|
2021-04-16 23:13:13 +00:00
|
|
|
SignedPreKeyRecord,
|
2021-05-14 01:18:43 +00:00
|
|
|
} from '@signalapp/signal-client';
|
2021-04-16 23:13:13 +00:00
|
|
|
|
|
|
|
import {
|
|
|
|
constantTimeEqual,
|
|
|
|
fromEncodedBinaryToArrayBuffer,
|
|
|
|
typedArrayToArrayBuffer,
|
|
|
|
} from './Crypto';
|
2021-05-17 18:03:42 +00:00
|
|
|
import { assert } from './util/assert';
|
2021-02-26 23:42:45 +00:00
|
|
|
import { isNotNil } from './util/isNotNil';
|
2021-05-19 21:25:56 +00:00
|
|
|
import { Zone } from './util/Zone';
|
2021-03-22 21:08:52 +00:00
|
|
|
import { isMoreRecentThan } from './util/timestamp';
|
2021-04-05 22:18:19 +00:00
|
|
|
import {
|
2021-04-16 23:13:13 +00:00
|
|
|
sessionRecordToProtobuf,
|
|
|
|
sessionStructureToArrayBuffer,
|
|
|
|
} from './util/sessionTranslation';
|
|
|
|
import {
|
2021-05-25 22:40:04 +00:00
|
|
|
DeviceType,
|
2021-04-16 23:13:13 +00:00
|
|
|
KeyPairType,
|
2021-04-05 22:18:19 +00:00
|
|
|
IdentityKeyType,
|
2021-05-14 01:18:43 +00:00
|
|
|
SenderKeyType,
|
2021-06-15 00:09:37 +00:00
|
|
|
SessionResetsType,
|
2021-04-16 23:13:13 +00:00
|
|
|
SessionType,
|
2021-04-05 22:18:19 +00:00
|
|
|
SignedPreKeyType,
|
2021-04-16 23:13:13 +00:00
|
|
|
OuterSignedPrekeyType,
|
2021-04-05 22:18:19 +00:00
|
|
|
PreKeyType,
|
|
|
|
UnprocessedType,
|
2021-04-16 23:13:13 +00:00
|
|
|
UnprocessedUpdateType,
|
|
|
|
} from './textsecure/Types.d';
|
2021-06-07 16:39:13 +00:00
|
|
|
import { getSendOptions } from './util/getSendOptions';
|
2021-02-26 23:42:45 +00:00
|
|
|
|
|
|
|
const TIMESTAMP_THRESHOLD = 5 * 1000; // 5 seconds
|
|
|
|
|
|
|
|
const VerifiedStatus = {
|
|
|
|
DEFAULT: 0,
|
|
|
|
VERIFIED: 1,
|
|
|
|
UNVERIFIED: 2,
|
|
|
|
};
|
|
|
|
|
|
|
|
function validateVerifiedStatus(status: number): boolean {
|
|
|
|
if (
|
|
|
|
status === VerifiedStatus.DEFAULT ||
|
|
|
|
status === VerifiedStatus.VERIFIED ||
|
|
|
|
status === VerifiedStatus.UNVERIFIED
|
|
|
|
) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
const identityKeySchema = z.object({
|
|
|
|
id: z.string(),
|
|
|
|
publicKey: z.instanceof(ArrayBuffer),
|
|
|
|
firstUse: z.boolean(),
|
|
|
|
timestamp: z.number().refine((value: number) => value % 1 === 0 && value > 0),
|
|
|
|
verified: z.number().refine(validateVerifiedStatus),
|
|
|
|
nonblockingApproval: z.boolean(),
|
2021-02-26 23:42:45 +00:00
|
|
|
});
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
function validateIdentityKey(attrs: unknown): attrs is IdentityKeyType {
|
|
|
|
// We'll throw if this doesn't match
|
|
|
|
identityKeySchema.parse(attrs);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-02-26 23:42:45 +00:00
|
|
|
async function normalizeEncodedAddress(
|
|
|
|
encodedAddress: string
|
|
|
|
): Promise<string> {
|
|
|
|
const [identifier, deviceId] = window.textsecure.utils.unencodeNumber(
|
|
|
|
encodedAddress
|
|
|
|
);
|
|
|
|
try {
|
|
|
|
const conv = window.ConversationController.getOrCreate(
|
|
|
|
identifier,
|
|
|
|
'private'
|
|
|
|
);
|
|
|
|
return `${conv.get('id')}.${deviceId}`;
|
|
|
|
} catch (e) {
|
|
|
|
window.log.error(`could not get conversation for identifier ${identifier}`);
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
type HasIdType<T> = {
|
|
|
|
id: T;
|
2021-02-26 23:42:45 +00:00
|
|
|
};
|
2021-04-16 23:13:13 +00:00
|
|
|
type CacheEntryType<DBType, HydratedType> =
|
|
|
|
| {
|
|
|
|
hydrated: false;
|
|
|
|
fromDB: DBType;
|
|
|
|
}
|
|
|
|
| { hydrated: true; fromDB: DBType; item: HydratedType };
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
type MapFields =
|
|
|
|
| 'identityKeys'
|
|
|
|
| 'preKeys'
|
|
|
|
| 'senderKeys'
|
|
|
|
| 'sessions'
|
|
|
|
| 'signedPreKeys';
|
|
|
|
|
|
|
|
export type SessionTransactionOptions = {
|
2021-05-19 21:25:56 +00:00
|
|
|
readonly zone?: Zone;
|
2021-05-17 18:03:42 +00:00
|
|
|
};
|
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
export const GLOBAL_ZONE = new Zone('GLOBAL_ZONE');
|
2021-05-17 18:03:42 +00:00
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
async function _fillCaches<ID, T extends HasIdType<ID>, HydratedType>(
|
2021-02-26 23:42:45 +00:00
|
|
|
object: SignalProtocolStore,
|
2021-05-17 18:03:42 +00:00
|
|
|
field: MapFields,
|
2021-02-26 23:42:45 +00:00
|
|
|
itemsPromise: Promise<Array<T>>
|
|
|
|
): Promise<void> {
|
|
|
|
const items = await itemsPromise;
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
const cache = new Map<ID, CacheEntryType<T, HydratedType>>();
|
2021-02-26 23:42:45 +00:00
|
|
|
for (let i = 0, max = items.length; i < max; i += 1) {
|
2021-04-16 23:13:13 +00:00
|
|
|
const fromDB = items[i];
|
|
|
|
const { id } = fromDB;
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
cache.set(id, {
|
2021-04-16 23:13:13 +00:00
|
|
|
fromDB,
|
|
|
|
hydrated: false,
|
2021-05-14 01:18:43 +00:00
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
window.log.info(`SignalProtocolStore: Finished caching ${field} data`);
|
|
|
|
// eslint-disable-next-line no-param-reassign, @typescript-eslint/no-explicit-any
|
|
|
|
object[field] = cache as any;
|
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
export function hydrateSession(session: SessionType): SessionRecord {
|
|
|
|
return SessionRecord.deserialize(Buffer.from(session.record, 'base64'));
|
|
|
|
}
|
|
|
|
export function hydratePublicKey(identityKey: IdentityKeyType): PublicKey {
|
|
|
|
return PublicKey.deserialize(Buffer.from(identityKey.publicKey));
|
|
|
|
}
|
|
|
|
export function hydratePreKey(preKey: PreKeyType): PreKeyRecord {
|
|
|
|
const publicKey = PublicKey.deserialize(Buffer.from(preKey.publicKey));
|
|
|
|
const privateKey = PrivateKey.deserialize(Buffer.from(preKey.privateKey));
|
|
|
|
return PreKeyRecord.new(preKey.id, publicKey, privateKey);
|
|
|
|
}
|
|
|
|
export function hydrateSignedPreKey(
|
|
|
|
signedPreKey: SignedPreKeyType
|
|
|
|
): SignedPreKeyRecord {
|
|
|
|
const createdAt = signedPreKey.created_at;
|
|
|
|
const pubKey = PublicKey.deserialize(Buffer.from(signedPreKey.publicKey));
|
|
|
|
const privKey = PrivateKey.deserialize(Buffer.from(signedPreKey.privateKey));
|
|
|
|
const signature = Buffer.from([]);
|
|
|
|
|
|
|
|
return SignedPreKeyRecord.new(
|
|
|
|
signedPreKey.id,
|
|
|
|
createdAt,
|
|
|
|
pubKey,
|
|
|
|
privKey,
|
|
|
|
signature
|
|
|
|
);
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
export function freezeSession(session: SessionRecord): string {
|
|
|
|
return session.serialize().toString('base64');
|
|
|
|
}
|
|
|
|
export function freezePublicKey(publicKey: PublicKey): ArrayBuffer {
|
|
|
|
return typedArrayToArrayBuffer(publicKey.serialize());
|
|
|
|
}
|
|
|
|
export function freezePreKey(preKey: PreKeyRecord): KeyPairType {
|
|
|
|
const keyPair = {
|
|
|
|
pubKey: typedArrayToArrayBuffer(preKey.publicKey().serialize()),
|
|
|
|
privKey: typedArrayToArrayBuffer(preKey.privateKey().serialize()),
|
|
|
|
};
|
|
|
|
return keyPair;
|
|
|
|
}
|
|
|
|
export function freezeSignedPreKey(
|
|
|
|
signedPreKey: SignedPreKeyRecord
|
|
|
|
): KeyPairType {
|
|
|
|
const keyPair = {
|
|
|
|
pubKey: typedArrayToArrayBuffer(signedPreKey.publicKey().serialize()),
|
|
|
|
privKey: typedArrayToArrayBuffer(signedPreKey.privateKey().serialize()),
|
|
|
|
};
|
|
|
|
return keyPair;
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
|
|
|
// We add a this parameter to avoid an 'implicit any' error on the next line
|
|
|
|
const EventsMixin = (function EventsMixin(this: unknown) {
|
|
|
|
window._.assign(this, window.Backbone.Events);
|
|
|
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
|
|
} as any) as typeof window.Backbone.EventsMixin;
|
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
type SessionCacheEntry = CacheEntryType<SessionType, SessionRecord>;
|
|
|
|
|
2021-02-26 23:42:45 +00:00
|
|
|
export class SignalProtocolStore extends EventsMixin {
|
|
|
|
// Enums used across the app
|
|
|
|
|
|
|
|
VerifiedStatus = VerifiedStatus;
|
|
|
|
|
|
|
|
// Cached values
|
|
|
|
|
|
|
|
ourIdentityKey?: KeyPairType;
|
|
|
|
|
|
|
|
ourRegistrationId?: number;
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
identityKeys?: Map<string, CacheEntryType<IdentityKeyType, PublicKey>>;
|
|
|
|
|
|
|
|
senderKeys?: Map<string, CacheEntryType<SenderKeyType, SenderKeyRecord>>;
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
sessions?: Map<string, SessionCacheEntry>;
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
preKeys?: Map<number, CacheEntryType<PreKeyType, PreKeyRecord>>;
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
signedPreKeys?: Map<
|
|
|
|
number,
|
2021-04-16 23:13:13 +00:00
|
|
|
CacheEntryType<SignedPreKeyType, SignedPreKeyRecord>
|
|
|
|
>;
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
senderKeyQueues: Map<string, PQueue> = new Map<string, PQueue>();
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
sessionQueues: Map<string, PQueue> = new Map<string, PQueue>();
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
private currentZone?: Zone;
|
|
|
|
|
|
|
|
private currentZoneDepth = 0;
|
|
|
|
|
|
|
|
private readonly zoneQueue: Array<() => void> = [];
|
|
|
|
|
|
|
|
private pendingSessions = new Map<string, SessionCacheEntry>();
|
|
|
|
|
|
|
|
private pendingUnprocessed = new Map<string, UnprocessedType>();
|
|
|
|
|
2021-02-26 23:42:45 +00:00
|
|
|
async hydrateCaches(): Promise<void> {
|
|
|
|
await Promise.all([
|
|
|
|
(async () => {
|
|
|
|
const item = await window.Signal.Data.getItemById('identityKey');
|
|
|
|
this.ourIdentityKey = item ? item.value : undefined;
|
|
|
|
})(),
|
|
|
|
(async () => {
|
|
|
|
const item = await window.Signal.Data.getItemById('registrationId');
|
|
|
|
this.ourRegistrationId = item ? item.value : undefined;
|
|
|
|
})(),
|
2021-05-14 01:18:43 +00:00
|
|
|
_fillCaches<string, IdentityKeyType, PublicKey>(
|
2021-02-26 23:42:45 +00:00
|
|
|
this,
|
|
|
|
'identityKeys',
|
|
|
|
window.Signal.Data.getAllIdentityKeys()
|
|
|
|
),
|
2021-05-14 01:18:43 +00:00
|
|
|
_fillCaches<string, SessionType, SessionRecord>(
|
2021-02-26 23:42:45 +00:00
|
|
|
this,
|
|
|
|
'sessions',
|
|
|
|
window.Signal.Data.getAllSessions()
|
|
|
|
),
|
2021-05-14 01:18:43 +00:00
|
|
|
_fillCaches<number, PreKeyType, PreKeyRecord>(
|
2021-02-26 23:42:45 +00:00
|
|
|
this,
|
|
|
|
'preKeys',
|
|
|
|
window.Signal.Data.getAllPreKeys()
|
|
|
|
),
|
2021-05-14 01:18:43 +00:00
|
|
|
_fillCaches<string, SenderKeyType, SenderKeyRecord>(
|
|
|
|
this,
|
|
|
|
'senderKeys',
|
|
|
|
window.Signal.Data.getAllSenderKeys()
|
|
|
|
),
|
|
|
|
_fillCaches<number, SignedPreKeyType, SignedPreKeyRecord>(
|
2021-02-26 23:42:45 +00:00
|
|
|
this,
|
|
|
|
'signedPreKeys',
|
|
|
|
window.Signal.Data.getAllSignedPreKeys()
|
|
|
|
),
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
async getIdentityKeyPair(): Promise<KeyPairType | undefined> {
|
|
|
|
return this.ourIdentityKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
async getLocalRegistrationId(): Promise<number | undefined> {
|
|
|
|
return this.ourRegistrationId;
|
|
|
|
}
|
|
|
|
|
|
|
|
// PreKeys
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
async loadPreKey(keyId: number): Promise<PreKeyRecord | undefined> {
|
2021-02-26 23:42:45 +00:00
|
|
|
if (!this.preKeys) {
|
|
|
|
throw new Error('loadPreKey: this.preKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
const entry = this.preKeys.get(keyId);
|
2021-04-16 23:13:13 +00:00
|
|
|
if (!entry) {
|
|
|
|
window.log.error('Failed to fetch prekey:', keyId);
|
|
|
|
return undefined;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
if (entry.hydrated) {
|
|
|
|
window.log.info('Successfully fetched prekey (cache hit):', keyId);
|
|
|
|
return entry.item;
|
|
|
|
}
|
|
|
|
|
|
|
|
const item = hydratePreKey(entry.fromDB);
|
2021-05-14 01:18:43 +00:00
|
|
|
this.preKeys.set(keyId, {
|
2021-04-16 23:13:13 +00:00
|
|
|
hydrated: true,
|
|
|
|
fromDB: entry.fromDB,
|
|
|
|
item,
|
2021-05-14 01:18:43 +00:00
|
|
|
});
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info('Successfully fetched prekey (cache miss):', keyId);
|
|
|
|
return item;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async storePreKey(keyId: number, keyPair: KeyPairType): Promise<void> {
|
|
|
|
if (!this.preKeys) {
|
|
|
|
throw new Error('storePreKey: this.preKeys not yet cached!');
|
|
|
|
}
|
2021-05-14 01:18:43 +00:00
|
|
|
if (this.preKeys.has(keyId)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(`storePreKey: prekey ${keyId} already exists!`);
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
const fromDB = {
|
2021-02-26 23:42:45 +00:00
|
|
|
id: keyId,
|
|
|
|
publicKey: keyPair.pubKey,
|
|
|
|
privateKey: keyPair.privKey,
|
|
|
|
};
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
await window.Signal.Data.createOrUpdatePreKey(fromDB);
|
2021-05-14 01:18:43 +00:00
|
|
|
this.preKeys.set(keyId, {
|
2021-04-16 23:13:13 +00:00
|
|
|
hydrated: false,
|
|
|
|
fromDB,
|
2021-05-14 01:18:43 +00:00
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async removePreKey(keyId: number): Promise<void> {
|
|
|
|
if (!this.preKeys) {
|
|
|
|
throw new Error('removePreKey: this.preKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
this.trigger('removePreKey');
|
|
|
|
} catch (error) {
|
|
|
|
window.log.error(
|
|
|
|
'removePreKey error triggering removePreKey:',
|
|
|
|
error && error.stack ? error.stack : error
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
this.preKeys.delete(keyId);
|
2021-02-26 23:42:45 +00:00
|
|
|
await window.Signal.Data.removePreKeyById(keyId);
|
|
|
|
}
|
|
|
|
|
|
|
|
async clearPreKeyStore(): Promise<void> {
|
2021-05-14 01:18:43 +00:00
|
|
|
if (this.preKeys) {
|
|
|
|
this.preKeys.clear();
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
await window.Signal.Data.removeAllPreKeys();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Signed PreKeys
|
|
|
|
|
|
|
|
async loadSignedPreKey(
|
|
|
|
keyId: number
|
2021-04-16 23:13:13 +00:00
|
|
|
): Promise<SignedPreKeyRecord | undefined> {
|
2021-02-26 23:42:45 +00:00
|
|
|
if (!this.signedPreKeys) {
|
|
|
|
throw new Error('loadSignedPreKey: this.signedPreKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
const entry = this.signedPreKeys.get(keyId);
|
2021-04-16 23:13:13 +00:00
|
|
|
if (!entry) {
|
|
|
|
window.log.error('Failed to fetch signed prekey:', keyId);
|
|
|
|
return undefined;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
if (entry.hydrated) {
|
|
|
|
window.log.info('Successfully fetched signed prekey (cache hit):', keyId);
|
|
|
|
return entry.item;
|
|
|
|
}
|
|
|
|
|
|
|
|
const item = hydrateSignedPreKey(entry.fromDB);
|
2021-05-14 01:18:43 +00:00
|
|
|
this.signedPreKeys.set(keyId, {
|
2021-04-16 23:13:13 +00:00
|
|
|
hydrated: true,
|
|
|
|
item,
|
|
|
|
fromDB: entry.fromDB,
|
2021-05-14 01:18:43 +00:00
|
|
|
});
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info('Successfully fetched signed prekey (cache miss):', keyId);
|
|
|
|
return item;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async loadSignedPreKeys(): Promise<Array<OuterSignedPrekeyType>> {
|
|
|
|
if (!this.signedPreKeys) {
|
|
|
|
throw new Error('loadSignedPreKeys: this.signedPreKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (arguments.length > 0) {
|
|
|
|
throw new Error('loadSignedPreKeys takes no arguments');
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
const entries = Array.from(this.signedPreKeys.values());
|
2021-04-16 23:13:13 +00:00
|
|
|
return entries.map(entry => {
|
|
|
|
const preKey = entry.fromDB;
|
|
|
|
return {
|
|
|
|
pubKey: preKey.publicKey,
|
|
|
|
privKey: preKey.privateKey,
|
|
|
|
created_at: preKey.created_at,
|
|
|
|
keyId: preKey.id,
|
|
|
|
confirmed: preKey.confirmed,
|
|
|
|
};
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
// Note that this is also called in update scenarios, for confirming that signed prekeys
|
|
|
|
// have indeed been accepted by the server.
|
2021-02-26 23:42:45 +00:00
|
|
|
async storeSignedPreKey(
|
|
|
|
keyId: number,
|
|
|
|
keyPair: KeyPairType,
|
|
|
|
confirmed?: boolean
|
|
|
|
): Promise<void> {
|
|
|
|
if (!this.signedPreKeys) {
|
|
|
|
throw new Error('storeSignedPreKey: this.signedPreKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
const fromDB = {
|
2021-02-26 23:42:45 +00:00
|
|
|
id: keyId,
|
|
|
|
publicKey: keyPair.pubKey,
|
|
|
|
privateKey: keyPair.privKey,
|
|
|
|
created_at: Date.now(),
|
|
|
|
confirmed: Boolean(confirmed),
|
|
|
|
};
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
await window.Signal.Data.createOrUpdateSignedPreKey(fromDB);
|
2021-05-14 01:18:43 +00:00
|
|
|
this.signedPreKeys.set(keyId, {
|
2021-04-16 23:13:13 +00:00
|
|
|
hydrated: false,
|
|
|
|
fromDB,
|
2021-05-14 01:18:43 +00:00
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async removeSignedPreKey(keyId: number): Promise<void> {
|
|
|
|
if (!this.signedPreKeys) {
|
|
|
|
throw new Error('removeSignedPreKey: this.signedPreKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
this.signedPreKeys.delete(keyId);
|
2021-02-26 23:42:45 +00:00
|
|
|
await window.Signal.Data.removeSignedPreKeyById(keyId);
|
|
|
|
}
|
|
|
|
|
|
|
|
async clearSignedPreKeysStore(): Promise<void> {
|
2021-05-14 01:18:43 +00:00
|
|
|
if (this.signedPreKeys) {
|
|
|
|
this.signedPreKeys.clear();
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
await window.Signal.Data.removeAllSignedPreKeys();
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
// Sender Key Queue
|
|
|
|
|
|
|
|
async enqueueSenderKeyJob<T>(
|
|
|
|
encodedAddress: string,
|
2021-05-20 23:49:08 +00:00
|
|
|
task: () => Promise<T>,
|
|
|
|
zone = GLOBAL_ZONE
|
2021-05-14 01:18:43 +00:00
|
|
|
): Promise<T> {
|
2021-05-20 23:49:08 +00:00
|
|
|
return this.withZone(zone, 'enqueueSenderKeyJob', async () => {
|
|
|
|
const senderId = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const queue = this._getSenderKeyQueue(senderId);
|
2021-05-14 01:18:43 +00:00
|
|
|
|
2021-05-20 23:49:08 +00:00
|
|
|
return queue.add<T>(task);
|
|
|
|
});
|
2021-05-14 01:18:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private _createSenderKeyQueue(): PQueue {
|
|
|
|
return new PQueue({ concurrency: 1, timeout: 1000 * 60 * 2 });
|
|
|
|
}
|
|
|
|
|
|
|
|
private _getSenderKeyQueue(senderId: string): PQueue {
|
|
|
|
const cachedQueue = this.senderKeyQueues.get(senderId);
|
|
|
|
if (cachedQueue) {
|
|
|
|
return cachedQueue;
|
|
|
|
}
|
|
|
|
|
|
|
|
const freshQueue = this._createSenderKeyQueue();
|
|
|
|
this.senderKeyQueues.set(senderId, freshQueue);
|
|
|
|
return freshQueue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sender Keys
|
|
|
|
|
|
|
|
private getSenderKeyId(senderKeyId: string, distributionId: string): string {
|
|
|
|
return `${senderKeyId}--${distributionId}`;
|
|
|
|
}
|
|
|
|
|
|
|
|
async saveSenderKey(
|
|
|
|
encodedAddress: string,
|
|
|
|
distributionId: string,
|
|
|
|
record: SenderKeyRecord
|
|
|
|
): Promise<void> {
|
|
|
|
if (!this.senderKeys) {
|
|
|
|
throw new Error('saveSenderKey: this.senderKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
const senderId = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const id = this.getSenderKeyId(senderId, distributionId);
|
|
|
|
|
|
|
|
const fromDB: SenderKeyType = {
|
|
|
|
id,
|
|
|
|
senderId,
|
|
|
|
distributionId,
|
|
|
|
data: record.serialize(),
|
|
|
|
lastUpdatedDate: Date.now(),
|
|
|
|
};
|
|
|
|
|
|
|
|
await window.Signal.Data.createOrUpdateSenderKey(fromDB);
|
|
|
|
|
|
|
|
this.senderKeys.set(id, {
|
|
|
|
hydrated: true,
|
|
|
|
fromDB,
|
|
|
|
item: record,
|
|
|
|
});
|
|
|
|
} catch (error) {
|
|
|
|
const errorString = error && error.stack ? error.stack : error;
|
|
|
|
window.log.error(
|
|
|
|
`saveSenderKey: failed to save senderKey ${encodedAddress}/${distributionId}: ${errorString}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async getSenderKey(
|
|
|
|
encodedAddress: string,
|
|
|
|
distributionId: string
|
|
|
|
): Promise<SenderKeyRecord | undefined> {
|
|
|
|
if (!this.senderKeys) {
|
|
|
|
throw new Error('getSenderKey: this.senderKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
const senderId = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const id = this.getSenderKeyId(senderId, distributionId);
|
|
|
|
|
|
|
|
const entry = this.senderKeys.get(id);
|
|
|
|
if (!entry) {
|
|
|
|
window.log.error('Failed to fetch sender key:', id);
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (entry.hydrated) {
|
2021-05-25 22:40:04 +00:00
|
|
|
window.log.info('Successfully fetched sender key (cache hit):', id);
|
2021-05-14 01:18:43 +00:00
|
|
|
return entry.item;
|
|
|
|
}
|
|
|
|
|
|
|
|
const item = SenderKeyRecord.deserialize(entry.fromDB.data);
|
|
|
|
this.senderKeys.set(id, {
|
|
|
|
hydrated: true,
|
|
|
|
item,
|
|
|
|
fromDB: entry.fromDB,
|
|
|
|
});
|
2021-05-25 22:40:04 +00:00
|
|
|
window.log.info('Successfully fetched sender key(cache miss):', id);
|
2021-05-14 01:18:43 +00:00
|
|
|
return item;
|
|
|
|
} catch (error) {
|
|
|
|
const errorString = error && error.stack ? error.stack : error;
|
|
|
|
window.log.error(
|
2021-05-25 22:40:04 +00:00
|
|
|
`getSenderKey: failed to load sender key ${encodedAddress}/${distributionId}: ${errorString}`
|
2021-05-14 01:18:43 +00:00
|
|
|
);
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-25 22:40:04 +00:00
|
|
|
async removeSenderKey(
|
|
|
|
encodedAddress: string,
|
|
|
|
distributionId: string
|
|
|
|
): Promise<void> {
|
|
|
|
if (!this.senderKeys) {
|
|
|
|
throw new Error('getSenderKey: this.senderKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
const senderId = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const id = this.getSenderKeyId(senderId, distributionId);
|
|
|
|
|
|
|
|
await window.Signal.Data.removeSenderKeyById(id);
|
|
|
|
|
|
|
|
this.senderKeys.delete(id);
|
|
|
|
} catch (error) {
|
|
|
|
const errorString = error && error.stack ? error.stack : error;
|
|
|
|
window.log.error(
|
|
|
|
`removeSenderKey: failed to remove senderKey ${encodedAddress}/${distributionId}: ${errorString}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
// Session Queue
|
|
|
|
|
|
|
|
async enqueueSessionJob<T>(
|
|
|
|
encodedAddress: string,
|
2021-05-20 23:49:08 +00:00
|
|
|
task: () => Promise<T>,
|
|
|
|
zone: Zone = GLOBAL_ZONE
|
2021-04-16 23:13:13 +00:00
|
|
|
): Promise<T> {
|
2021-05-20 23:49:08 +00:00
|
|
|
return this.withZone(zone, 'enqueueSessionJob', async () => {
|
|
|
|
const id = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const queue = this._getSessionQueue(id);
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-20 23:49:08 +00:00
|
|
|
return queue.add<T>(task);
|
|
|
|
});
|
2021-04-16 23:13:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private _createSessionQueue(): PQueue {
|
|
|
|
return new PQueue({ concurrency: 1, timeout: 1000 * 60 * 2 });
|
|
|
|
}
|
|
|
|
|
|
|
|
private _getSessionQueue(id: string): PQueue {
|
|
|
|
const cachedQueue = this.sessionQueues.get(id);
|
|
|
|
if (cachedQueue) {
|
|
|
|
return cachedQueue;
|
|
|
|
}
|
|
|
|
|
|
|
|
const freshQueue = this._createSessionQueue();
|
|
|
|
this.sessionQueues.set(id, freshQueue);
|
|
|
|
return freshQueue;
|
|
|
|
}
|
|
|
|
|
2021-02-26 23:42:45 +00:00
|
|
|
// Sessions
|
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
// Re-entrant session transaction routine. Only one session transaction could
|
|
|
|
// be running at the same time.
|
|
|
|
//
|
|
|
|
// While in transaction:
|
|
|
|
//
|
|
|
|
// - `storeSession()` adds the updated session to the `pendingSessions`
|
|
|
|
// - `loadSession()` looks up the session first in `pendingSessions` and only
|
|
|
|
// then in the main `sessions` store
|
|
|
|
//
|
|
|
|
// When transaction ends:
|
|
|
|
//
|
|
|
|
// - successfully: pending session stores are batched into the database
|
|
|
|
// - with an error: pending session stores are reverted
|
2021-05-19 21:25:56 +00:00
|
|
|
public async withZone<T>(
|
|
|
|
zone: Zone,
|
2021-05-17 18:03:42 +00:00
|
|
|
name: string,
|
2021-05-19 21:25:56 +00:00
|
|
|
body: () => Promise<T>
|
2021-05-17 18:03:42 +00:00
|
|
|
): Promise<T> {
|
2021-05-19 21:25:56 +00:00
|
|
|
const debugName = `withZone(${zone.name}:${name})`;
|
2021-05-19 18:33:14 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
// Allow re-entering from LibSignalStores
|
2021-05-19 21:25:56 +00:00
|
|
|
if (this.currentZone && this.currentZone !== zone) {
|
2021-05-19 18:33:14 +00:00
|
|
|
const start = Date.now();
|
|
|
|
|
|
|
|
window.log.info(
|
2021-05-19 21:25:56 +00:00
|
|
|
`${debugName}: locked by ${this.currentZone.name}, waiting`
|
2021-05-19 18:33:14 +00:00
|
|
|
);
|
|
|
|
|
2021-05-24 22:59:36 +00:00
|
|
|
return new Promise<T>((resolve, reject) => {
|
|
|
|
this.zoneQueue.push(async () => {
|
|
|
|
const duration = Date.now() - start;
|
|
|
|
window.log.info(`${debugName}: unlocked after ${duration}ms`);
|
|
|
|
|
|
|
|
// Call `.withZone` synchronously from `this.zoneQueue` to avoid
|
|
|
|
// extra in-between ticks while we are on microtasks queue.
|
|
|
|
try {
|
|
|
|
resolve(await this.withZone(zone, name, body));
|
|
|
|
} catch (error) {
|
|
|
|
reject(error);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
this.enterZone(zone, name);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
let result: T;
|
2021-02-26 23:42:45 +00:00
|
|
|
try {
|
2021-05-17 18:03:42 +00:00
|
|
|
result = await body();
|
|
|
|
} catch (error) {
|
2021-05-19 21:25:56 +00:00
|
|
|
if (this.isInTopLevelZone()) {
|
|
|
|
await this.revertZoneChanges(name, error);
|
2021-04-16 23:13:13 +00:00
|
|
|
}
|
2021-05-19 21:25:56 +00:00
|
|
|
this.leaveZone(zone);
|
2021-05-17 18:03:42 +00:00
|
|
|
throw error;
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
if (this.isInTopLevelZone()) {
|
|
|
|
await this.commitZoneChanges(name);
|
2021-05-17 18:03:42 +00:00
|
|
|
}
|
2021-05-19 21:25:56 +00:00
|
|
|
this.leaveZone(zone);
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
private async commitZoneChanges(name: string): Promise<void> {
|
2021-05-17 18:03:42 +00:00
|
|
|
const { pendingSessions, pendingUnprocessed } = this;
|
|
|
|
|
|
|
|
if (pendingSessions.size === 0 && pendingUnprocessed.size === 0) {
|
|
|
|
return;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
2021-05-17 18:03:42 +00:00
|
|
|
|
|
|
|
window.log.info(
|
2021-05-19 21:25:56 +00:00
|
|
|
`commitZoneChanges(${name}): pending sessions ${pendingSessions.size} ` +
|
2021-05-17 18:03:42 +00:00
|
|
|
`pending unprocessed ${pendingUnprocessed.size}`
|
|
|
|
);
|
|
|
|
|
|
|
|
this.pendingSessions = new Map();
|
|
|
|
this.pendingUnprocessed = new Map();
|
|
|
|
|
|
|
|
// Commit both unprocessed and sessions in the same database transaction
|
|
|
|
// to unroll both on error.
|
|
|
|
await window.Signal.Data.commitSessionsAndUnprocessed({
|
|
|
|
sessions: Array.from(pendingSessions.values()).map(
|
|
|
|
({ fromDB }) => fromDB
|
|
|
|
),
|
|
|
|
unprocessed: Array.from(pendingUnprocessed.values()),
|
|
|
|
});
|
|
|
|
|
|
|
|
const { sessions } = this;
|
|
|
|
assert(sessions !== undefined, "Can't commit unhydrated storage");
|
|
|
|
|
|
|
|
// Apply changes to in-memory storage after successful DB write.
|
|
|
|
pendingSessions.forEach((value, key) => {
|
|
|
|
sessions.set(key, value);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
private async revertZoneChanges(name: string, error: Error): Promise<void> {
|
2021-05-17 18:03:42 +00:00
|
|
|
window.log.info(
|
2021-05-19 21:25:56 +00:00
|
|
|
`revertZoneChanges(${name}): ` +
|
|
|
|
`pending sessions size ${this.pendingSessions.size} ` +
|
|
|
|
`pending unprocessed size ${this.pendingUnprocessed.size}`,
|
2021-05-17 18:03:42 +00:00
|
|
|
error && error.stack
|
|
|
|
);
|
|
|
|
this.pendingSessions.clear();
|
|
|
|
this.pendingUnprocessed.clear();
|
|
|
|
}
|
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
private isInTopLevelZone(): boolean {
|
|
|
|
return this.currentZoneDepth === 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
private enterZone(zone: Zone, name: string): void {
|
|
|
|
this.currentZoneDepth += 1;
|
|
|
|
if (this.currentZoneDepth === 1) {
|
|
|
|
assert(this.currentZone === undefined, 'Should not be in the zone');
|
|
|
|
this.currentZone = zone;
|
|
|
|
|
|
|
|
if (zone !== GLOBAL_ZONE) {
|
|
|
|
window.log.info(`enterZone(${zone.name}:${name})`);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private leaveZone(zone: Zone): void {
|
|
|
|
assert(this.currentZone === zone, 'Should be in the correct zone');
|
|
|
|
|
|
|
|
this.currentZoneDepth -= 1;
|
|
|
|
assert(this.currentZoneDepth >= 0, 'Unmatched number of leaveZone calls');
|
|
|
|
|
|
|
|
// Since we allow re-entering zones we might actually be in two overlapping
|
|
|
|
// async calls. Leave the zone and yield to another one only if there are
|
|
|
|
// no active zone users anymore.
|
|
|
|
if (this.currentZoneDepth !== 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (zone !== GLOBAL_ZONE) {
|
|
|
|
window.log.info(`leaveZone(${zone.name})`);
|
|
|
|
}
|
|
|
|
|
|
|
|
this.currentZone = undefined;
|
|
|
|
const next = this.zoneQueue.shift();
|
2021-05-17 18:03:42 +00:00
|
|
|
if (next) {
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async loadSession(
|
|
|
|
encodedAddress: string,
|
2021-05-19 21:25:56 +00:00
|
|
|
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
|
2021-05-17 18:03:42 +00:00
|
|
|
): Promise<SessionRecord | undefined> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(zone, 'loadSession', async () => {
|
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error('loadSession: this.sessions not yet cached!');
|
|
|
|
}
|
2021-05-17 18:03:42 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
|
|
|
throw new Error('loadSession: encodedAddress was undefined/null');
|
|
|
|
}
|
2021-05-17 18:03:42 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
try {
|
|
|
|
const id = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const map = this.pendingSessions.has(id)
|
|
|
|
? this.pendingSessions
|
|
|
|
: this.sessions;
|
|
|
|
const entry = map.get(id);
|
2021-05-17 18:03:42 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
if (!entry) {
|
2021-05-17 18:03:42 +00:00
|
|
|
return undefined;
|
|
|
|
}
|
2021-05-19 21:25:56 +00:00
|
|
|
|
|
|
|
if (entry.hydrated) {
|
|
|
|
return entry.item;
|
|
|
|
}
|
|
|
|
|
|
|
|
const item = await this._maybeMigrateSession(entry.fromDB);
|
|
|
|
map.set(id, {
|
|
|
|
hydrated: true,
|
|
|
|
item,
|
|
|
|
fromDB: entry.fromDB,
|
|
|
|
});
|
|
|
|
return item;
|
|
|
|
} catch (error) {
|
|
|
|
const errorString = error && error.stack ? error.stack : error;
|
|
|
|
window.log.error(
|
|
|
|
`loadSession: failed to load session ${encodedAddress}: ${errorString}`
|
|
|
|
);
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
});
|
2021-04-16 23:13:13 +00:00
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-25 22:40:04 +00:00
|
|
|
async loadSessions(
|
|
|
|
encodedAddresses: Array<string>,
|
|
|
|
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
|
|
|
|
): Promise<Array<SessionRecord>> {
|
2021-05-28 23:09:17 +00:00
|
|
|
return this.withZone(zone, 'loadSessions', async () => {
|
2021-05-25 22:40:04 +00:00
|
|
|
const sessions = await Promise.all(
|
|
|
|
encodedAddresses.map(async address =>
|
|
|
|
this.loadSession(address, { zone })
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
return sessions.filter(isNotNil);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
private async _maybeMigrateSession(
|
|
|
|
session: SessionType
|
|
|
|
): Promise<SessionRecord> {
|
|
|
|
// Already migrated, return record directly
|
|
|
|
if (session.version === 2) {
|
|
|
|
return hydrateSession(session);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not yet converted, need to translate to new format
|
|
|
|
if (session.version !== undefined) {
|
|
|
|
throw new Error('_maybeMigrateSession: Unknown session version type!');
|
|
|
|
}
|
|
|
|
|
|
|
|
const keyPair = await this.getIdentityKeyPair();
|
|
|
|
if (!keyPair) {
|
|
|
|
throw new Error('_maybeMigrateSession: No identity key for ourself!');
|
|
|
|
}
|
|
|
|
|
|
|
|
const localRegistrationId = await this.getLocalRegistrationId();
|
|
|
|
if (!isNumber(localRegistrationId)) {
|
|
|
|
throw new Error('_maybeMigrateSession: No registration id for ourself!');
|
|
|
|
}
|
|
|
|
|
|
|
|
const localUserData = {
|
|
|
|
identityKeyPublic: keyPair.pubKey,
|
|
|
|
registrationId: localRegistrationId,
|
|
|
|
};
|
|
|
|
|
|
|
|
window.log.info(
|
|
|
|
`_maybeMigrateSession: Migrating session with id ${session.id}`
|
|
|
|
);
|
|
|
|
const sessionProto = sessionRecordToProtobuf(
|
|
|
|
JSON.parse(session.record),
|
|
|
|
localUserData
|
|
|
|
);
|
|
|
|
return SessionRecord.deserialize(
|
|
|
|
Buffer.from(sessionStructureToArrayBuffer(sessionProto))
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
async storeSession(
|
|
|
|
encodedAddress: string,
|
2021-05-17 18:03:42 +00:00
|
|
|
record: SessionRecord,
|
2021-05-19 21:25:56 +00:00
|
|
|
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
|
2021-04-16 23:13:13 +00:00
|
|
|
): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
await this.withZone(zone, 'storeSession', async () => {
|
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error('storeSession: this.sessions not yet cached!');
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
|
|
|
throw new Error('storeSession: encodedAddress was undefined/null');
|
|
|
|
}
|
|
|
|
const unencoded = window.textsecure.utils.unencodeNumber(encodedAddress);
|
|
|
|
const deviceId = parseInt(unencoded[1], 10);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
try {
|
|
|
|
const id = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const fromDB = {
|
|
|
|
id,
|
|
|
|
version: 2,
|
|
|
|
conversationId: window.textsecure.utils.unencodeNumber(id)[0],
|
|
|
|
deviceId,
|
|
|
|
record: record.serialize().toString('base64'),
|
|
|
|
};
|
|
|
|
|
|
|
|
const newSession = {
|
|
|
|
hydrated: true,
|
|
|
|
fromDB,
|
|
|
|
item: record,
|
|
|
|
};
|
|
|
|
|
|
|
|
assert(this.currentZone, 'Must run in the zone');
|
|
|
|
|
|
|
|
this.pendingSessions.set(id, newSession);
|
|
|
|
|
|
|
|
// Current zone doesn't support pending sessions - commit immediately
|
|
|
|
if (!zone.supportsPendingSessions()) {
|
|
|
|
await this.commitZoneChanges('storeSession');
|
2021-05-17 18:03:42 +00:00
|
|
|
}
|
2021-05-19 21:25:56 +00:00
|
|
|
} catch (error) {
|
|
|
|
const errorString = error && error.stack ? error.stack : error;
|
|
|
|
window.log.error(
|
|
|
|
`storeSession: Save failed fo ${encodedAddress}: ${errorString}`
|
|
|
|
);
|
|
|
|
throw error;
|
|
|
|
}
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-25 22:40:04 +00:00
|
|
|
async getOpenDevices(
|
|
|
|
identifiers: Array<string>
|
|
|
|
): Promise<{
|
|
|
|
devices: Array<DeviceType>;
|
|
|
|
emptyIdentifiers: Array<string>;
|
|
|
|
}> {
|
|
|
|
return this.withZone(GLOBAL_ZONE, 'getOpenDevices', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
if (!this.sessions) {
|
2021-05-25 22:40:04 +00:00
|
|
|
throw new Error('getOpenDevices: this.sessions not yet cached!');
|
2021-05-17 18:03:42 +00:00
|
|
|
}
|
2021-05-25 22:40:04 +00:00
|
|
|
if (identifiers.length === 0) {
|
|
|
|
throw new Error('getOpenDevices: No identifiers provided!');
|
2021-05-17 18:03:42 +00:00
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
try {
|
2021-05-25 22:40:04 +00:00
|
|
|
const conversationIds = new Map<string, string>();
|
|
|
|
identifiers.forEach(identifier => {
|
|
|
|
if (identifier === null || identifier === undefined) {
|
|
|
|
throw new Error('getOpenDevices: identifier was undefined/null');
|
|
|
|
}
|
|
|
|
|
|
|
|
const conversation = window.ConversationController.getOrCreate(
|
|
|
|
identifier,
|
|
|
|
'private'
|
2021-05-17 18:03:42 +00:00
|
|
|
);
|
2021-05-25 22:40:04 +00:00
|
|
|
if (!conversation) {
|
|
|
|
throw new Error(
|
|
|
|
`getOpenDevices: No conversationId found for identifier ${identifier}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
conversationIds.set(conversation.get('id'), identifier);
|
|
|
|
});
|
2021-05-17 18:03:42 +00:00
|
|
|
|
|
|
|
const allSessions = this._getAllSessions();
|
2021-05-25 22:40:04 +00:00
|
|
|
const entries = allSessions.filter(session =>
|
|
|
|
conversationIds.has(session.fromDB.conversationId)
|
2021-04-16 23:13:13 +00:00
|
|
|
);
|
2021-05-25 22:40:04 +00:00
|
|
|
const openEntries: Array<
|
|
|
|
SessionCacheEntry | undefined
|
|
|
|
> = await Promise.all(
|
2021-05-17 18:03:42 +00:00
|
|
|
entries.map(async entry => {
|
|
|
|
if (entry.hydrated) {
|
|
|
|
const record = entry.item;
|
|
|
|
if (record.hasCurrentState()) {
|
2021-05-25 22:40:04 +00:00
|
|
|
return entry;
|
2021-05-17 18:03:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return undefined;
|
|
|
|
}
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
const record = await this._maybeMigrateSession(entry.fromDB);
|
2021-04-16 23:13:13 +00:00
|
|
|
if (record.hasCurrentState()) {
|
2021-05-25 22:40:04 +00:00
|
|
|
return entry;
|
2021-04-16 23:13:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return undefined;
|
2021-05-17 18:03:42 +00:00
|
|
|
})
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-25 22:40:04 +00:00
|
|
|
const devices = openEntries
|
|
|
|
.map(entry => {
|
|
|
|
if (!entry) {
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
|
|
|
|
const { conversationId } = entry.fromDB;
|
|
|
|
conversationIds.delete(conversationId);
|
|
|
|
|
|
|
|
const id = entry.fromDB.deviceId;
|
|
|
|
const conversation = window.ConversationController.get(
|
|
|
|
conversationId
|
|
|
|
);
|
|
|
|
if (!conversation) {
|
|
|
|
throw new Error(
|
|
|
|
`getOpenDevices: Unable to find matching conversation for ${conversationId}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
const identifier =
|
|
|
|
conversation.get('uuid') || conversation.get('e164');
|
|
|
|
if (!identifier) {
|
|
|
|
throw new Error(
|
|
|
|
`getOpenDevices: No identifier for conversation ${conversationId}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
return {
|
|
|
|
identifier,
|
|
|
|
id,
|
|
|
|
};
|
|
|
|
})
|
|
|
|
.filter(isNotNil);
|
|
|
|
const emptyIdentifiers = Array.from(conversationIds.values());
|
|
|
|
|
|
|
|
return {
|
|
|
|
devices,
|
|
|
|
emptyIdentifiers,
|
|
|
|
};
|
2021-05-17 18:03:42 +00:00
|
|
|
} catch (error) {
|
|
|
|
window.log.error(
|
2021-05-25 22:40:04 +00:00
|
|
|
'getOpenDevices: Failed to get devices',
|
2021-05-17 18:03:42 +00:00
|
|
|
error && error.stack ? error.stack : error
|
|
|
|
);
|
2021-05-25 22:40:04 +00:00
|
|
|
throw error;
|
2021-05-17 18:03:42 +00:00
|
|
|
}
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-25 22:40:04 +00:00
|
|
|
async getDeviceIds(identifier: string): Promise<Array<number>> {
|
|
|
|
const { devices } = await this.getOpenDevices([identifier]);
|
|
|
|
return devices.map((device: DeviceType) => device.id);
|
|
|
|
}
|
|
|
|
|
2021-02-26 23:42:45 +00:00
|
|
|
async removeSession(encodedAddress: string): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'removeSession', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error('removeSession: this.sessions not yet cached!');
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
window.log.info('removeSession: deleting session for', encodedAddress);
|
|
|
|
try {
|
|
|
|
const id = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
await window.Signal.Data.removeSessionById(id);
|
|
|
|
this.sessions.delete(id);
|
|
|
|
this.pendingSessions.delete(id);
|
|
|
|
} catch (e) {
|
|
|
|
window.log.error(
|
|
|
|
`removeSession: Failed to delete session for ${encodedAddress}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async removeAllSessions(identifier: string): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'removeAllSessions', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error('removeAllSessions: this.sessions not yet cached!');
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
if (identifier === null || identifier === undefined) {
|
|
|
|
throw new Error('removeAllSessions: identifier was undefined/null');
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
window.log.info('removeAllSessions: deleting sessions for', identifier);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
const id = window.ConversationController.getConversationId(identifier);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
const entries = Array.from(this.sessions.values());
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
for (let i = 0, max = entries.length; i < max; i += 1) {
|
|
|
|
const entry = entries[i];
|
|
|
|
if (entry.fromDB.conversationId === id) {
|
|
|
|
this.sessions.delete(entry.fromDB.id);
|
|
|
|
this.pendingSessions.delete(entry.fromDB.id);
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
await window.Signal.Data.removeSessionsByConversation(identifier);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-21 16:03:01 +00:00
|
|
|
private async _archiveSession(entry?: SessionCacheEntry, zone?: Zone) {
|
2021-04-16 23:13:13 +00:00
|
|
|
if (!entry) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-05-21 16:03:01 +00:00
|
|
|
await this.enqueueSessionJob(
|
|
|
|
entry.fromDB.id,
|
|
|
|
async () => {
|
|
|
|
const item = entry.hydrated
|
|
|
|
? entry.item
|
|
|
|
: await this._maybeMigrateSession(entry.fromDB);
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-21 16:03:01 +00:00
|
|
|
if (!item.hasCurrentState()) {
|
|
|
|
return;
|
|
|
|
}
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-21 16:03:01 +00:00
|
|
|
item.archiveCurrentState();
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-28 23:09:17 +00:00
|
|
|
await this.storeSession(entry.fromDB.id, item, { zone });
|
2021-05-21 16:03:01 +00:00
|
|
|
},
|
|
|
|
zone
|
|
|
|
);
|
2021-04-16 23:13:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async archiveSession(encodedAddress: string): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'archiveSession', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error('archiveSession: this.sessions not yet cached!');
|
|
|
|
}
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
window.log.info(`archiveSession: session for ${encodedAddress}`);
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
const id = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
|
|
|
|
const entry = this.pendingSessions.get(id) || this.sessions.get(id);
|
2021-04-16 23:13:13 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
await this._archiveSession(entry);
|
|
|
|
});
|
2021-04-16 23:13:13 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 00:41:28 +00:00
|
|
|
async archiveSiblingSessions(
|
|
|
|
encodedAddress: string,
|
2021-05-19 21:25:56 +00:00
|
|
|
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
|
2021-05-18 00:41:28 +00:00
|
|
|
): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(zone, 'archiveSiblingSessions', async () => {
|
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error(
|
|
|
|
'archiveSiblingSessions: this.sessions not yet cached!'
|
2021-05-18 00:41:28 +00:00
|
|
|
);
|
2021-05-19 21:25:56 +00:00
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
window.log.info(
|
|
|
|
'archiveSiblingSessions: archiving sibling sessions for',
|
|
|
|
encodedAddress
|
|
|
|
);
|
2021-05-17 18:03:42 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
const id = await normalizeEncodedAddress(encodedAddress);
|
|
|
|
const [identifier, deviceId] = window.textsecure.utils.unencodeNumber(id);
|
|
|
|
const deviceIdNumber = parseInt(deviceId, 10);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
const allEntries = this._getAllSessions();
|
|
|
|
const entries = allEntries.filter(
|
|
|
|
entry =>
|
|
|
|
entry.fromDB.conversationId === identifier &&
|
|
|
|
entry.fromDB.deviceId !== deviceIdNumber
|
|
|
|
);
|
|
|
|
|
|
|
|
await Promise.all(
|
|
|
|
entries.map(async entry => {
|
2021-05-21 16:03:01 +00:00
|
|
|
await this._archiveSession(entry, zone);
|
2021-05-19 21:25:56 +00:00
|
|
|
})
|
|
|
|
);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async archiveAllSessions(identifier: string): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'archiveAllSessions', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
if (!this.sessions) {
|
|
|
|
throw new Error('archiveAllSessions: this.sessions not yet cached!');
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
window.log.info(
|
|
|
|
'archiveAllSessions: archiving all sessions for',
|
|
|
|
identifier
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
const id = window.ConversationController.getConversationId(identifier);
|
2021-02-26 23:42:45 +00:00
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
const allEntries = this._getAllSessions();
|
|
|
|
const entries = allEntries.filter(
|
|
|
|
entry => entry.fromDB.conversationId === id
|
|
|
|
);
|
|
|
|
|
|
|
|
await Promise.all(
|
|
|
|
entries.map(async entry => {
|
|
|
|
await this._archiveSession(entry);
|
|
|
|
})
|
|
|
|
);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async clearSessionStore(): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'clearSessionStore', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
if (this.sessions) {
|
|
|
|
this.sessions.clear();
|
|
|
|
}
|
|
|
|
this.pendingSessions.clear();
|
|
|
|
await window.Signal.Data.removeAllSessions();
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 00:41:28 +00:00
|
|
|
async lightSessionReset(uuid: string, deviceId: number): Promise<void> {
|
|
|
|
const id = `${uuid}.${deviceId}`;
|
|
|
|
|
|
|
|
const sessionResets = window.storage.get(
|
|
|
|
'sessionResets',
|
2021-06-15 00:09:37 +00:00
|
|
|
<SessionResetsType>{}
|
|
|
|
);
|
2021-05-18 00:41:28 +00:00
|
|
|
|
|
|
|
const lastReset = sessionResets[id];
|
|
|
|
|
|
|
|
const ONE_HOUR = 60 * 60 * 1000;
|
|
|
|
if (lastReset && isMoreRecentThan(lastReset, ONE_HOUR)) {
|
|
|
|
window.log.warn(
|
|
|
|
`lightSessionReset/${id}: Skipping session reset, last reset at ${lastReset}`
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sessionResets[id] = Date.now();
|
|
|
|
window.storage.put('sessionResets', sessionResets);
|
|
|
|
|
|
|
|
try {
|
|
|
|
// First, fetch this conversation
|
|
|
|
const conversationId = window.ConversationController.ensureContactIds({
|
|
|
|
uuid,
|
|
|
|
});
|
|
|
|
assert(conversationId, `lightSessionReset/${id}: missing conversationId`);
|
|
|
|
|
|
|
|
const conversation = window.ConversationController.get(conversationId);
|
|
|
|
assert(conversation, `lightSessionReset/${id}: missing conversation`);
|
|
|
|
|
|
|
|
window.log.warn(`lightSessionReset/${id}: Resetting session`);
|
|
|
|
|
|
|
|
// Archive open session with this device
|
|
|
|
await this.archiveSession(id);
|
|
|
|
|
|
|
|
// Send a null message with newly-created session
|
2021-06-07 16:39:13 +00:00
|
|
|
const sendOptions = await getSendOptions(conversation.attributes);
|
2021-05-18 00:41:28 +00:00
|
|
|
await window.textsecure.messaging.sendNullMessage({ uuid }, sendOptions);
|
|
|
|
} catch (error) {
|
|
|
|
// If we failed to do the session reset, then we'll allow another attempt sooner
|
|
|
|
// than one hour from now.
|
|
|
|
delete sessionResets[id];
|
|
|
|
window.storage.put('sessionResets', sessionResets);
|
|
|
|
|
|
|
|
const errorString = error && error.stack ? error.stack : error;
|
|
|
|
window.log.error(
|
|
|
|
`lightSessionReset/${id}: Encountered error`,
|
|
|
|
errorString
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-26 23:42:45 +00:00
|
|
|
// Identity Keys
|
|
|
|
|
|
|
|
getIdentityRecord(identifier: string): IdentityKeyType | undefined {
|
|
|
|
if (!this.identityKeys) {
|
|
|
|
throw new Error('getIdentityRecord: this.identityKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
const id = window.ConversationController.getConversationId(identifier);
|
|
|
|
if (!id) {
|
|
|
|
throw new Error(
|
|
|
|
`getIdentityRecord: No conversation id for identifier ${identifier}`
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-05-14 01:18:43 +00:00
|
|
|
const entry = this.identityKeys.get(id);
|
2021-04-16 23:13:13 +00:00
|
|
|
if (!entry) {
|
|
|
|
return undefined;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
2021-04-16 23:13:13 +00:00
|
|
|
|
|
|
|
return entry.fromDB;
|
2021-02-26 23:42:45 +00:00
|
|
|
} catch (e) {
|
|
|
|
window.log.error(
|
2021-04-16 23:13:13 +00:00
|
|
|
`getIdentityRecord: Failed to get identity record for identifier ${identifier}`
|
2021-02-26 23:42:45 +00:00
|
|
|
);
|
2021-04-16 23:13:13 +00:00
|
|
|
return undefined;
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async isTrustedIdentity(
|
|
|
|
encodedAddress: string,
|
|
|
|
publicKey: ArrayBuffer,
|
|
|
|
direction: number
|
|
|
|
): Promise<boolean> {
|
|
|
|
if (!this.identityKeys) {
|
|
|
|
throw new Error('getIdentityRecord: this.identityKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('isTrustedIdentity: encodedAddress was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
const identifier = window.textsecure.utils.unencodeNumber(
|
|
|
|
encodedAddress
|
|
|
|
)[0];
|
|
|
|
const ourNumber = window.textsecure.storage.user.getNumber();
|
|
|
|
const ourUuid = window.textsecure.storage.user.getUuid();
|
|
|
|
const isOurIdentifier =
|
|
|
|
(ourNumber && identifier === ourNumber) ||
|
|
|
|
(ourUuid && identifier === ourUuid);
|
|
|
|
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
|
|
|
|
if (isOurIdentifier) {
|
|
|
|
if (identityRecord && identityRecord.publicKey) {
|
|
|
|
return constantTimeEqual(identityRecord.publicKey, publicKey);
|
|
|
|
}
|
|
|
|
window.log.warn(
|
|
|
|
'isTrustedIdentity: No local record for our own identifier. Returning true.'
|
|
|
|
);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (direction) {
|
2021-04-16 23:13:13 +00:00
|
|
|
case Direction.Sending:
|
2021-02-26 23:42:45 +00:00
|
|
|
return this.isTrustedForSending(publicKey, identityRecord);
|
2021-04-16 23:13:13 +00:00
|
|
|
case Direction.Receiving:
|
2021-02-26 23:42:45 +00:00
|
|
|
return true;
|
|
|
|
default:
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(`isTrustedIdentity: Unknown direction: ${direction}`);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
isTrustedForSending(
|
|
|
|
publicKey: ArrayBuffer,
|
|
|
|
identityRecord?: IdentityKeyType
|
|
|
|
): boolean {
|
|
|
|
if (!identityRecord) {
|
|
|
|
window.log.info(
|
|
|
|
'isTrustedForSending: No previous record, returning true...'
|
|
|
|
);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
const existing = identityRecord.publicKey;
|
|
|
|
|
|
|
|
if (!existing) {
|
|
|
|
window.log.info('isTrustedForSending: Nothing here, returning true...');
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (!constantTimeEqual(existing, publicKey)) {
|
|
|
|
window.log.info("isTrustedForSending: Identity keys don't match...");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (identityRecord.verified === VerifiedStatus.UNVERIFIED) {
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.error('isTrustedIdentity: Needs unverified approval!');
|
2021-02-26 23:42:45 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (this.isNonBlockingApprovalRequired(identityRecord)) {
|
|
|
|
window.log.error('isTrustedForSending: Needs non-blocking approval!');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
async loadIdentityKey(identifier: string): Promise<ArrayBuffer | undefined> {
|
|
|
|
if (identifier === null || identifier === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('loadIdentityKey: identifier was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
const id = window.textsecure.utils.unencodeNumber(identifier)[0];
|
|
|
|
const identityRecord = this.getIdentityRecord(id);
|
|
|
|
|
|
|
|
if (identityRecord) {
|
|
|
|
return identityRecord.publicKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
|
|
|
|
private async _saveIdentityKey(data: IdentityKeyType): Promise<void> {
|
|
|
|
if (!this.identityKeys) {
|
|
|
|
throw new Error('_saveIdentityKey: this.identityKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
const { id } = data;
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
await window.Signal.Data.createOrUpdateIdentityKey(data);
|
2021-05-14 01:18:43 +00:00
|
|
|
this.identityKeys.set(id, {
|
2021-04-16 23:13:13 +00:00
|
|
|
hydrated: false,
|
|
|
|
fromDB: data,
|
2021-05-14 01:18:43 +00:00
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async saveIdentity(
|
|
|
|
encodedAddress: string,
|
|
|
|
publicKey: ArrayBuffer,
|
2021-05-18 00:41:28 +00:00
|
|
|
nonblockingApproval = false,
|
2021-05-19 21:25:56 +00:00
|
|
|
{ zone }: SessionTransactionOptions = {}
|
2021-02-26 23:42:45 +00:00
|
|
|
): Promise<boolean> {
|
|
|
|
if (!this.identityKeys) {
|
|
|
|
throw new Error('saveIdentity: this.identityKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('saveIdentity: encodedAddress was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (!(publicKey instanceof ArrayBuffer)) {
|
|
|
|
// eslint-disable-next-line no-param-reassign
|
|
|
|
publicKey = fromEncodedBinaryToArrayBuffer(publicKey);
|
|
|
|
}
|
|
|
|
if (typeof nonblockingApproval !== 'boolean') {
|
|
|
|
// eslint-disable-next-line no-param-reassign
|
|
|
|
nonblockingApproval = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const identifier = window.textsecure.utils.unencodeNumber(
|
|
|
|
encodedAddress
|
|
|
|
)[0];
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
const id = window.ConversationController.getOrCreate(
|
|
|
|
identifier,
|
|
|
|
'private'
|
|
|
|
).get('id');
|
|
|
|
|
|
|
|
if (!identityRecord || !identityRecord.publicKey) {
|
|
|
|
// Lookup failed, or the current key was removed, so save this one.
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info('saveIdentity: Saving new identity...');
|
2021-02-26 23:42:45 +00:00
|
|
|
await this._saveIdentityKey({
|
|
|
|
id,
|
|
|
|
publicKey,
|
|
|
|
firstUse: true,
|
|
|
|
timestamp: Date.now(),
|
|
|
|
verified: VerifiedStatus.DEFAULT,
|
|
|
|
nonblockingApproval,
|
|
|
|
});
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const oldpublicKey = identityRecord.publicKey;
|
|
|
|
if (!constantTimeEqual(oldpublicKey, publicKey)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info('saveIdentity: Replacing existing identity...');
|
2021-02-26 23:42:45 +00:00
|
|
|
const previousStatus = identityRecord.verified;
|
|
|
|
let verifiedStatus;
|
|
|
|
if (
|
|
|
|
previousStatus === VerifiedStatus.VERIFIED ||
|
|
|
|
previousStatus === VerifiedStatus.UNVERIFIED
|
|
|
|
) {
|
|
|
|
verifiedStatus = VerifiedStatus.UNVERIFIED;
|
|
|
|
} else {
|
|
|
|
verifiedStatus = VerifiedStatus.DEFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
await this._saveIdentityKey({
|
|
|
|
id,
|
|
|
|
publicKey,
|
|
|
|
firstUse: false,
|
|
|
|
timestamp: Date.now(),
|
|
|
|
verified: verifiedStatus,
|
|
|
|
nonblockingApproval,
|
|
|
|
});
|
|
|
|
|
|
|
|
try {
|
|
|
|
this.trigger('keychange', identifier);
|
|
|
|
} catch (error) {
|
|
|
|
window.log.error(
|
2021-04-16 23:13:13 +00:00
|
|
|
'saveIdentity: error triggering keychange:',
|
2021-02-26 23:42:45 +00:00
|
|
|
error && error.stack ? error.stack : error
|
|
|
|
);
|
|
|
|
}
|
2021-05-18 00:41:28 +00:00
|
|
|
|
2021-05-19 21:25:56 +00:00
|
|
|
// Pass the zone to facilitate transactional session use in
|
2021-05-18 00:41:28 +00:00
|
|
|
// MessageReceiver.ts
|
2021-05-19 21:25:56 +00:00
|
|
|
await this.archiveSiblingSessions(encodedAddress, { zone });
|
2021-02-26 23:42:45 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (this.isNonBlockingApprovalRequired(identityRecord)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info('saveIdentity: Setting approval status...');
|
2021-02-26 23:42:45 +00:00
|
|
|
|
|
|
|
identityRecord.nonblockingApproval = nonblockingApproval;
|
|
|
|
await this._saveIdentityKey(identityRecord);
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
isNonBlockingApprovalRequired(identityRecord: IdentityKeyType): boolean {
|
|
|
|
return (
|
|
|
|
!identityRecord.firstUse &&
|
2021-03-22 21:08:52 +00:00
|
|
|
isMoreRecentThan(identityRecord.timestamp, TIMESTAMP_THRESHOLD) &&
|
2021-02-26 23:42:45 +00:00
|
|
|
!identityRecord.nonblockingApproval
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
async saveIdentityWithAttributes(
|
|
|
|
encodedAddress: string,
|
2021-04-16 23:13:13 +00:00
|
|
|
attributes: Partial<IdentityKeyType>
|
2021-02-26 23:42:45 +00:00
|
|
|
): Promise<void> {
|
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(
|
|
|
|
'saveIdentityWithAttributes: encodedAddress was undefined/null'
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identifier = window.textsecure.utils.unencodeNumber(
|
|
|
|
encodedAddress
|
|
|
|
)[0];
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
const conv = window.ConversationController.getOrCreate(
|
|
|
|
identifier,
|
|
|
|
'private'
|
|
|
|
);
|
|
|
|
const id = conv.get('id');
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
const updates: Partial<IdentityKeyType> = {
|
2021-02-26 23:42:45 +00:00
|
|
|
...identityRecord,
|
|
|
|
...attributes,
|
|
|
|
id,
|
|
|
|
};
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
if (validateIdentityKey(updates)) {
|
2021-02-26 23:42:45 +00:00
|
|
|
await this._saveIdentityKey(updates);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async setApproval(
|
|
|
|
encodedAddress: string,
|
|
|
|
nonblockingApproval: boolean
|
|
|
|
): Promise<void> {
|
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('setApproval: encodedAddress was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (typeof nonblockingApproval !== 'boolean') {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('setApproval: Invalid approval status');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identifier = window.textsecure.utils.unencodeNumber(
|
|
|
|
encodedAddress
|
|
|
|
)[0];
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
|
|
|
|
if (!identityRecord) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(`setApproval: No identity record for ${identifier}`);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
identityRecord.nonblockingApproval = nonblockingApproval;
|
|
|
|
await this._saveIdentityKey(identityRecord);
|
|
|
|
}
|
|
|
|
|
|
|
|
async setVerified(
|
|
|
|
encodedAddress: string,
|
|
|
|
verifiedStatus: number,
|
2021-04-16 23:13:13 +00:00
|
|
|
publicKey?: ArrayBuffer
|
2021-02-26 23:42:45 +00:00
|
|
|
): Promise<void> {
|
|
|
|
if (encodedAddress === null || encodedAddress === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('setVerified: encodedAddress was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (!validateVerifiedStatus(verifiedStatus)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('setVerified: Invalid verified status');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (arguments.length > 2 && !(publicKey instanceof ArrayBuffer)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('setVerified: Invalid public key');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identityRecord = this.getIdentityRecord(encodedAddress);
|
|
|
|
|
|
|
|
if (!identityRecord) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(`setVerified: No identity record for ${encodedAddress}`);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!publicKey || constantTimeEqual(identityRecord.publicKey, publicKey)) {
|
|
|
|
identityRecord.verified = verifiedStatus;
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
if (validateIdentityKey(identityRecord)) {
|
2021-02-26 23:42:45 +00:00
|
|
|
await this._saveIdentityKey(identityRecord);
|
|
|
|
}
|
|
|
|
} else {
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info(
|
|
|
|
'setVerified: No identity record for specified publicKey'
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async getVerified(identifier: string): Promise<number> {
|
|
|
|
if (identifier === null || identifier === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('getVerified: identifier was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
if (!identityRecord) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(`getVerified: No identity record for ${identifier}`);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const verifiedStatus = identityRecord.verified;
|
|
|
|
if (validateVerifiedStatus(verifiedStatus)) {
|
|
|
|
return verifiedStatus;
|
|
|
|
}
|
|
|
|
|
|
|
|
return VerifiedStatus.DEFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolves to true if a new identity key was saved
|
|
|
|
processContactSyncVerificationState(
|
|
|
|
identifier: string,
|
|
|
|
verifiedStatus: number,
|
|
|
|
publicKey: ArrayBuffer
|
|
|
|
): Promise<boolean> {
|
|
|
|
if (verifiedStatus === VerifiedStatus.UNVERIFIED) {
|
|
|
|
return this.processUnverifiedMessage(
|
|
|
|
identifier,
|
|
|
|
verifiedStatus,
|
|
|
|
publicKey
|
|
|
|
);
|
|
|
|
}
|
|
|
|
return this.processVerifiedMessage(identifier, verifiedStatus, publicKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
// This function encapsulates the non-Java behavior, since the mobile apps don't
|
|
|
|
// currently receive contact syncs and therefore will see a verify sync with
|
|
|
|
// UNVERIFIED status
|
|
|
|
async processUnverifiedMessage(
|
|
|
|
identifier: string,
|
|
|
|
verifiedStatus: number,
|
|
|
|
publicKey?: ArrayBuffer
|
|
|
|
): Promise<boolean> {
|
|
|
|
if (identifier === null || identifier === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(
|
|
|
|
'processUnverifiedMessage: identifier was undefined/null'
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (publicKey !== undefined && !(publicKey instanceof ArrayBuffer)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('processUnverifiedMessage: Invalid public key');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
|
|
|
|
let isEqual = false;
|
|
|
|
|
|
|
|
if (identityRecord && publicKey) {
|
|
|
|
isEqual = constantTimeEqual(publicKey, identityRecord.publicKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (
|
|
|
|
identityRecord &&
|
|
|
|
isEqual &&
|
|
|
|
identityRecord.verified !== VerifiedStatus.UNVERIFIED
|
|
|
|
) {
|
2021-04-16 23:13:13 +00:00
|
|
|
await this.setVerified(identifier, verifiedStatus, publicKey);
|
2021-02-26 23:42:45 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
if (!identityRecord || !isEqual) {
|
|
|
|
await this.saveIdentityWithAttributes(identifier, {
|
|
|
|
publicKey,
|
|
|
|
verified: verifiedStatus,
|
|
|
|
firstUse: false,
|
|
|
|
timestamp: Date.now(),
|
|
|
|
nonblockingApproval: true,
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
|
|
|
|
if (identityRecord && !isEqual) {
|
|
|
|
try {
|
|
|
|
this.trigger('keychange', identifier);
|
|
|
|
} catch (error) {
|
|
|
|
window.log.error(
|
2021-04-16 23:13:13 +00:00
|
|
|
'processUnverifiedMessage: error triggering keychange:',
|
2021-02-26 23:42:45 +00:00
|
|
|
error && error.stack ? error.stack : error
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.archiveAllSessions(identifier);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The situation which could get us here is:
|
|
|
|
// 1. had a previous key
|
|
|
|
// 2. new key is the same
|
|
|
|
// 3. desired new status is same as what we had before
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// This matches the Java method as of
|
|
|
|
// https://github.com/signalapp/Signal-Android/blob/d0bb68e1378f689e4d10ac6a46014164992ca4e4/src/org/thoughtcrime/securesms/util/IdentityUtil.java#L188
|
|
|
|
async processVerifiedMessage(
|
|
|
|
identifier: string,
|
|
|
|
verifiedStatus: number,
|
2021-04-16 23:13:13 +00:00
|
|
|
publicKey?: ArrayBuffer
|
2021-02-26 23:42:45 +00:00
|
|
|
): Promise<boolean> {
|
|
|
|
if (identifier === null || identifier === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('processVerifiedMessage: identifier was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (!validateVerifiedStatus(verifiedStatus)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('processVerifiedMessage: Invalid verified status');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
if (publicKey !== undefined && !(publicKey instanceof ArrayBuffer)) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('processVerifiedMessage: Invalid public key');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
|
|
|
|
let isEqual = false;
|
|
|
|
|
|
|
|
if (identityRecord && publicKey) {
|
|
|
|
isEqual = constantTimeEqual(publicKey, identityRecord.publicKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!identityRecord && verifiedStatus === VerifiedStatus.DEFAULT) {
|
2021-04-16 23:13:13 +00:00
|
|
|
window.log.info(
|
|
|
|
'processVerifiedMessage: No existing record for default status'
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (
|
|
|
|
identityRecord &&
|
|
|
|
isEqual &&
|
|
|
|
identityRecord.verified !== VerifiedStatus.DEFAULT &&
|
|
|
|
verifiedStatus === VerifiedStatus.DEFAULT
|
|
|
|
) {
|
2021-04-16 23:13:13 +00:00
|
|
|
await this.setVerified(identifier, verifiedStatus, publicKey);
|
2021-02-26 23:42:45 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (
|
|
|
|
verifiedStatus === VerifiedStatus.VERIFIED &&
|
|
|
|
(!identityRecord ||
|
|
|
|
(identityRecord && !isEqual) ||
|
|
|
|
(identityRecord && identityRecord.verified !== VerifiedStatus.VERIFIED))
|
|
|
|
) {
|
2021-04-16 23:13:13 +00:00
|
|
|
await this.saveIdentityWithAttributes(identifier, {
|
|
|
|
publicKey,
|
|
|
|
verified: verifiedStatus,
|
|
|
|
firstUse: false,
|
|
|
|
timestamp: Date.now(),
|
|
|
|
nonblockingApproval: true,
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
|
|
|
|
if (identityRecord && !isEqual) {
|
|
|
|
try {
|
|
|
|
this.trigger('keychange', identifier);
|
|
|
|
} catch (error) {
|
|
|
|
window.log.error(
|
|
|
|
'processVerifiedMessage error triggering keychange:',
|
|
|
|
error && error.stack ? error.stack : error
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.archiveAllSessions(identifier);
|
|
|
|
|
|
|
|
// true signifies that we overwrote a previous key with a new one
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We get here if we got a new key and the status is DEFAULT. If the
|
|
|
|
// message is out of date, we don't want to lose whatever more-secure
|
|
|
|
// state we had before.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
isUntrusted(identifier: string): boolean {
|
|
|
|
if (identifier === null || identifier === undefined) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error('isUntrusted: identifier was undefined/null');
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const identityRecord = this.getIdentityRecord(identifier);
|
|
|
|
if (!identityRecord) {
|
2021-04-16 23:13:13 +00:00
|
|
|
throw new Error(`isUntrusted: No identity record for ${identifier}`);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (
|
2021-03-22 21:08:52 +00:00
|
|
|
isMoreRecentThan(identityRecord.timestamp, TIMESTAMP_THRESHOLD) &&
|
2021-02-26 23:42:45 +00:00
|
|
|
!identityRecord.nonblockingApproval &&
|
|
|
|
!identityRecord.firstUse
|
|
|
|
) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
async removeIdentityKey(identifier: string): Promise<void> {
|
|
|
|
if (!this.identityKeys) {
|
|
|
|
throw new Error('removeIdentityKey: this.identityKeys not yet cached!');
|
|
|
|
}
|
|
|
|
|
|
|
|
const id = window.ConversationController.getConversationId(identifier);
|
|
|
|
if (id) {
|
2021-05-14 01:18:43 +00:00
|
|
|
this.identityKeys.delete(id);
|
2021-02-26 23:42:45 +00:00
|
|
|
await window.Signal.Data.removeIdentityKeyById(id);
|
2021-04-16 23:13:13 +00:00
|
|
|
await this.removeAllSessions(id);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Not yet processed messages - for resiliency
|
|
|
|
getUnprocessedCount(): Promise<number> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'getUnprocessedCount', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
return window.Signal.Data.getUnprocessedCount();
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
getAllUnprocessed(): Promise<Array<UnprocessedType>> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'getAllUnprocessed', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
return window.Signal.Data.getAllUnprocessed();
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
getUnprocessedById(id: string): Promise<UnprocessedType | undefined> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'getUnprocessedById', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
return window.Signal.Data.getUnprocessedById(id);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
addUnprocessed(
|
|
|
|
data: UnprocessedType,
|
2021-05-19 21:25:56 +00:00
|
|
|
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
|
2021-05-17 18:03:42 +00:00
|
|
|
): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(zone, 'addUnprocessed', async () => {
|
|
|
|
this.pendingUnprocessed.set(data.id, data);
|
|
|
|
|
|
|
|
// Current zone doesn't support pending unprocessed - commit immediately
|
|
|
|
if (!zone.supportsPendingUnprocessed()) {
|
|
|
|
await this.commitZoneChanges('addUnprocessed');
|
|
|
|
}
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-05-17 18:03:42 +00:00
|
|
|
addMultipleUnprocessed(
|
|
|
|
array: Array<UnprocessedType>,
|
2021-05-19 21:25:56 +00:00
|
|
|
{ zone = GLOBAL_ZONE }: SessionTransactionOptions = {}
|
2021-05-17 18:03:42 +00:00
|
|
|
): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(zone, 'addMultipleUnprocessed', async () => {
|
|
|
|
for (const elem of array) {
|
|
|
|
this.pendingUnprocessed.set(elem.id, elem);
|
|
|
|
}
|
|
|
|
// Current zone doesn't support pending unprocessed - commit immediately
|
|
|
|
if (!zone.supportsPendingUnprocessed()) {
|
|
|
|
await this.commitZoneChanges('addMultipleUnprocessed');
|
|
|
|
}
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
updateUnprocessedAttempts(id: string, attempts: number): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'updateUnprocessedAttempts', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
await window.Signal.Data.updateUnprocessedAttempts(id, attempts);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-04-16 23:13:13 +00:00
|
|
|
updateUnprocessedWithData(
|
|
|
|
id: string,
|
|
|
|
data: UnprocessedUpdateType
|
|
|
|
): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'updateUnprocessedWithData', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
await window.Signal.Data.updateUnprocessedWithData(id, data);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
2021-04-05 22:18:19 +00:00
|
|
|
updateUnprocessedsWithData(
|
2021-04-16 23:13:13 +00:00
|
|
|
items: Array<{ id: string; data: UnprocessedUpdateType }>
|
2021-04-05 22:18:19 +00:00
|
|
|
): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(
|
|
|
|
GLOBAL_ZONE,
|
|
|
|
'updateUnprocessedsWithData',
|
|
|
|
async () => {
|
|
|
|
await window.Signal.Data.updateUnprocessedsWithData(items);
|
|
|
|
}
|
|
|
|
);
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
removeUnprocessed(idOrArray: string | Array<string>): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'removeUnprocessed', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
await window.Signal.Data.removeUnprocessed(idOrArray);
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
removeAllUnprocessed(): Promise<void> {
|
2021-05-19 21:25:56 +00:00
|
|
|
return this.withZone(GLOBAL_ZONE, 'removeAllUnprocessed', async () => {
|
2021-05-17 18:03:42 +00:00
|
|
|
await window.Signal.Data.removeAllUnprocessed();
|
|
|
|
});
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async removeAllData(): Promise<void> {
|
|
|
|
await window.Signal.Data.removeAll();
|
|
|
|
await this.hydrateCaches();
|
|
|
|
|
|
|
|
window.storage.reset();
|
|
|
|
await window.storage.fetch();
|
|
|
|
|
|
|
|
window.ConversationController.reset();
|
|
|
|
await window.ConversationController.load();
|
|
|
|
}
|
|
|
|
|
|
|
|
async removeAllConfiguration(): Promise<void> {
|
|
|
|
await window.Signal.Data.removeAllConfiguration();
|
|
|
|
await this.hydrateCaches();
|
|
|
|
|
|
|
|
window.storage.reset();
|
|
|
|
await window.storage.fetch();
|
|
|
|
}
|
2021-05-17 18:03:42 +00:00
|
|
|
|
|
|
|
private _getAllSessions(): Array<SessionCacheEntry> {
|
|
|
|
const union = new Map<string, SessionCacheEntry>();
|
|
|
|
|
|
|
|
this.sessions?.forEach((value, key) => {
|
|
|
|
union.set(key, value);
|
|
|
|
});
|
|
|
|
this.pendingSessions.forEach((value, key) => {
|
|
|
|
union.set(key, value);
|
|
|
|
});
|
|
|
|
|
|
|
|
return Array.from(union.values());
|
|
|
|
}
|
2021-02-26 23:42:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
window.SignalProtocolStore = SignalProtocolStore;
|