signal-desktop/ts/textsecure/OutgoingMessage.ts

701 lines
20 KiB
TypeScript
Raw Normal View History

2023-01-03 19:55:46 +00:00
// Copyright 2020 Signal Messenger, LLC
2020-10-30 20:34:04 +00:00
// SPDX-License-Identifier: AGPL-3.0-only
/* eslint-disable @typescript-eslint/no-explicit-any */
/* eslint-disable more/no-then */
/* eslint-disable no-param-reassign */
import { reject } from 'lodash';
2021-05-25 22:40:04 +00:00
import { z } from 'zod';
import type {
2021-05-28 19:11:19 +00:00
CiphertextMessage,
PlaintextContent,
} from '@signalapp/libsignal-client';
import {
ErrorCode,
LibSignalErrorBase,
CiphertextMessageType,
ProtocolAddress,
2021-05-28 19:11:19 +00:00
sealedSenderEncrypt,
SenderCertificate,
signalEncrypt,
2021-05-28 19:11:19 +00:00
UnidentifiedSenderMessageContent,
} from '@signalapp/libsignal-client';
2021-09-28 23:38:55 +00:00
import type { WebAPIType, MessageType } from './WebAPI';
import type { SendMetadataType, SendOptionsType } from './SendMessage';
import {
OutgoingIdentityKeyError,
OutgoingMessageError,
SendMessageNetworkError,
SendMessageChallengeError,
UnregisteredUserError,
2021-09-22 00:58:03 +00:00
HTTPError,
} from './Errors';
import type { CallbackResultType, CustomError } from './Types.d';
import { Address } from '../types/Address';
import * as Errors from '../types/errors';
import { QualifiedAddress } from '../types/QualifiedAddress';
import type { ServiceIdString } from '../types/ServiceId';
import { Sessions, IdentityKeys } from '../LibSignalStores';
import { getKeysForServiceId } from './getKeysForServiceId';
2021-07-09 19:36:10 +00:00
import { SignalService as Proto } from '../protobuf';
import * as log from '../logging/log';
export const enum SenderCertificateMode {
WithE164,
WithoutE164,
}
export type SendLogCallbackType = (options: {
serviceId: ServiceIdString;
deviceIds: Array<number>;
}) => Promise<void>;
export const serializedCertificateSchema = z.object({
expires: z.number().optional(),
serialized: z.instanceof(Uint8Array),
});
export type SerializedCertificateType = z.infer<
typeof serializedCertificateSchema
>;
type OutgoingMessageOptionsType = SendOptionsType & {
online?: boolean;
};
function ciphertextMessageTypeToEnvelopeType(type: number) {
if (type === CiphertextMessageType.PreKey) {
2021-07-09 19:36:10 +00:00
return Proto.Envelope.Type.PREKEY_BUNDLE;
}
if (type === CiphertextMessageType.Whisper) {
2021-07-09 19:36:10 +00:00
return Proto.Envelope.Type.CIPHERTEXT;
}
2021-05-28 19:11:19 +00:00
if (type === CiphertextMessageType.Plaintext) {
2021-07-09 19:36:10 +00:00
return Proto.Envelope.Type.PLAINTEXT_CONTENT;
2021-05-28 19:11:19 +00:00
}
throw new Error(
`ciphertextMessageTypeToEnvelopeType: Unrecognized type ${type}`
);
}
2021-05-25 22:40:04 +00:00
function getPaddedMessageLength(messageLength: number): number {
const messageLengthWithTerminator = messageLength + 1;
let messagePartCount = Math.floor(messageLengthWithTerminator / 160);
if (messageLengthWithTerminator % 160 !== 0) {
messagePartCount += 1;
}
return messagePartCount * 160;
}
2021-07-09 19:36:10 +00:00
export function padMessage(messageBuffer: Uint8Array): Uint8Array {
2021-05-25 22:40:04 +00:00
const plaintext = new Uint8Array(
getPaddedMessageLength(messageBuffer.byteLength + 1) - 1
);
2021-07-09 19:36:10 +00:00
plaintext.set(messageBuffer);
2021-05-25 22:40:04 +00:00
plaintext[messageBuffer.byteLength] = 0x80;
return plaintext;
}
export default class OutgoingMessage {
server: WebAPIType;
timestamp: number;
serviceIds: ReadonlyArray<ServiceIdString>;
2021-07-09 19:36:10 +00:00
message: Proto.Content | PlaintextContent;
callback: (result: CallbackResultType) => void;
plaintext?: Uint8Array;
serviceIdsCompleted: number;
errors: Array<CustomError>;
successfulServiceIds: Array<ServiceIdString>;
failoverServiceIds: Array<ServiceIdString>;
unidentifiedDeliveries: Array<ServiceIdString>;
sendMetadata?: SendMetadataType;
online?: boolean;
2021-05-28 19:11:19 +00:00
groupId?: string;
contentHint: number;
urgent: boolean;
story?: boolean;
recipients: Record<string, Array<number>>;
sendLogCallback?: SendLogCallbackType;
constructor({
callback,
contentHint,
groupId,
serviceIds,
message,
options,
sendLogCallback,
server,
story,
timestamp,
urgent,
}: {
callback: (result: CallbackResultType) => void;
contentHint: number;
groupId: string | undefined;
serviceIds: ReadonlyArray<ServiceIdString>;
message: Proto.Content | Proto.DataMessage | PlaintextContent;
options?: OutgoingMessageOptionsType;
sendLogCallback?: SendLogCallbackType;
server: WebAPIType;
story?: boolean;
timestamp: number;
urgent: boolean;
}) {
2021-07-09 19:36:10 +00:00
if (message instanceof Proto.DataMessage) {
const content = new Proto.Content();
content.dataMessage = message;
this.message = content;
} else {
this.message = message;
}
this.server = server;
this.timestamp = timestamp;
this.serviceIds = serviceIds;
2021-05-28 19:11:19 +00:00
this.contentHint = contentHint;
this.groupId = groupId;
this.callback = callback;
this.story = story;
this.urgent = urgent;
this.serviceIdsCompleted = 0;
this.errors = [];
this.successfulServiceIds = [];
this.failoverServiceIds = [];
this.unidentifiedDeliveries = [];
this.recipients = {};
this.sendLogCallback = sendLogCallback;
this.sendMetadata = options?.sendMetadata;
this.online = options?.online;
}
numberCompleted(): void {
this.serviceIdsCompleted += 1;
if (this.serviceIdsCompleted >= this.serviceIds.length) {
const proto = this.message;
const contentProto = this.getContentProtoBytes();
const { timestamp, contentHint, recipients, urgent } = this;
let dataMessage: Uint8Array | undefined;
let editMessage: Uint8Array | undefined;
2022-08-15 21:53:33 +00:00
let hasPniSignatureMessage = false;
2022-08-15 21:53:33 +00:00
if (proto instanceof Proto.Content) {
if (proto.dataMessage) {
dataMessage = Proto.DataMessage.encode(proto.dataMessage).finish();
} else if (proto.editMessage) {
editMessage = Proto.EditMessage.encode(proto.editMessage).finish();
2022-08-15 21:53:33 +00:00
}
hasPniSignatureMessage = Boolean(proto.pniSignatureMessage);
} else if (proto instanceof Proto.DataMessage) {
dataMessage = Proto.DataMessage.encode(proto).finish();
} else if (proto instanceof Proto.EditMessage) {
editMessage = Proto.EditMessage.encode(proto).finish();
}
2018-05-02 16:51:22 +00:00
this.callback({
successfulServiceIds: this.successfulServiceIds,
failoverServiceIds: this.failoverServiceIds,
2018-05-02 16:51:22 +00:00
errors: this.errors,
unidentifiedDeliveries: this.unidentifiedDeliveries,
contentHint,
dataMessage,
editMessage,
recipients,
contentProto,
timestamp,
urgent,
2022-08-15 21:53:33 +00:00
hasPniSignatureMessage,
2018-05-02 16:51:22 +00:00
});
}
}
registerError(
serviceId: ServiceIdString,
reason: string,
providedError?: Error
): void {
let error = providedError;
2021-09-22 00:58:03 +00:00
if (!error || (error instanceof HTTPError && error.code !== 404)) {
if (error && error.code === 428) {
error = new SendMessageChallengeError(serviceId, error);
} else {
error = new OutgoingMessageError(serviceId, null, null, error);
}
2018-05-02 16:51:22 +00:00
}
error.cause = reason;
2018-05-02 16:51:22 +00:00
this.errors[this.errors.length] = error;
this.numberCompleted();
}
reloadDevicesAndSend(
serviceId: ServiceIdString,
recurse?: boolean
): () => Promise<void> {
2021-05-25 22:40:04 +00:00
return async () => {
const ourAci = window.textsecure.storage.user.getCheckedAci();
const deviceIds = await window.textsecure.storage.protocol.getDeviceIds({
ourServiceId: ourAci,
serviceId,
});
2021-05-25 22:40:04 +00:00
if (deviceIds.length === 0) {
this.registerError(
serviceId,
2021-05-25 22:40:04 +00:00
'reloadDevicesAndSend: Got empty device list when loading device keys',
undefined
);
return undefined;
}
return this.doSendMessage(serviceId, deviceIds, recurse);
2021-05-25 22:40:04 +00:00
};
}
2018-07-21 21:51:20 +00:00
async getKeysForServiceId(
serviceId: ServiceIdString,
2021-05-25 22:40:04 +00:00
updateDevices?: Array<number>
): Promise<void> {
const { sendMetadata } = this;
const info =
sendMetadata && sendMetadata[serviceId]
? sendMetadata[serviceId]
: { accessKey: undefined };
const { accessKey } = info;
const { accessKeyFailed } = await getKeysForServiceId(
serviceId,
this.server,
updateDevices,
accessKey
);
if (accessKeyFailed && !this.failoverServiceIds.includes(serviceId)) {
this.failoverServiceIds.push(serviceId);
2018-07-21 21:51:20 +00:00
}
}
async transmitMessage(
serviceId: ServiceIdString,
2021-09-28 23:38:55 +00:00
jsonData: ReadonlyArray<MessageType>,
timestamp: number,
{ accessKey }: { accessKey?: string } = {}
): Promise<void> {
let promise;
if (accessKey) {
promise = this.server.sendMessagesUnauth(serviceId, jsonData, timestamp, {
accessKey,
online: this.online,
story: this.story,
urgent: this.urgent,
});
} else {
promise = this.server.sendMessages(serviceId, jsonData, timestamp, {
online: this.online,
story: this.story,
urgent: this.urgent,
});
}
return promise.catch(e => {
2021-09-22 00:58:03 +00:00
if (e instanceof HTTPError && e.code !== 409 && e.code !== 410) {
// 409 and 410 should bubble and be handled by doSendMessage
// 404 should throw UnregisteredUserError
// 428 should throw SendMessageChallengeError
// all other network errors can be retried later.
if (e.code === 404) {
throw new UnregisteredUserError(serviceId, e);
}
if (e.code === 428) {
throw new SendMessageChallengeError(serviceId, e);
}
throw new SendMessageNetworkError(serviceId, jsonData, e);
}
throw e;
});
}
2021-09-24 00:49:05 +00:00
getPlaintext(): Uint8Array {
2018-05-02 16:51:22 +00:00
if (!this.plaintext) {
2021-05-28 19:11:19 +00:00
const { message } = this;
2021-07-09 19:36:10 +00:00
if (message instanceof Proto.Content) {
this.plaintext = padMessage(Proto.Content.encode(message).finish());
2021-05-28 19:11:19 +00:00
} else {
this.plaintext = message.serialize();
}
2018-05-02 16:51:22 +00:00
}
2021-09-24 00:49:05 +00:00
return this.plaintext;
}
getContentProtoBytes(): Uint8Array | undefined {
if (this.message instanceof Proto.Content) {
return new Uint8Array(Proto.Content.encode(this.message).finish());
}
return undefined;
}
2021-05-28 19:11:19 +00:00
async getCiphertextMessage({
identityKeyStore,
protocolAddress,
sessionStore,
}: {
identityKeyStore: IdentityKeys;
protocolAddress: ProtocolAddress;
sessionStore: Sessions;
}): Promise<CiphertextMessage> {
const { message } = this;
2021-07-09 19:36:10 +00:00
if (message instanceof Proto.Content) {
2021-05-28 19:11:19 +00:00
return signalEncrypt(
Buffer.from(this.getPlaintext()),
protocolAddress,
sessionStore,
identityKeyStore
);
}
return message.asCiphertextMessage();
}
async doSendMessage(
serviceId: ServiceIdString,
deviceIds: Array<number>,
recurse?: boolean
): Promise<void> {
const { sendMetadata } = this;
const { accessKey, senderCertificate } = sendMetadata?.[serviceId] || {};
if (accessKey && !senderCertificate) {
log.warn(
'OutgoingMessage.doSendMessage: accessKey was provided, but senderCertificate was not'
);
}
2018-10-31 23:58:14 +00:00
const sealedSender = Boolean(accessKey && senderCertificate);
// We don't send to ourselves unless sealedSender is enabled
const ourNumber = window.textsecure.storage.user.getNumber();
const ourAci = window.textsecure.storage.user.getCheckedAci();
const ourDeviceId = window.textsecure.storage.user.getDeviceId();
if ((serviceId === ourNumber || serviceId === ourAci) && !sealedSender) {
deviceIds = reject(
deviceIds,
deviceId =>
// because we store our own device ID as a string at least sometimes
deviceId === ourDeviceId ||
(typeof ourDeviceId === 'string' &&
deviceId === parseInt(ourDeviceId, 10))
);
}
const sessionStore = new Sessions({ ourServiceId: ourAci });
const identityKeyStore = new IdentityKeys({ ourServiceId: ourAci });
2018-05-02 16:51:22 +00:00
return Promise.all(
deviceIds.map(async destinationDeviceId => {
const address = new QualifiedAddress(
ourAci,
new Address(serviceId, destinationDeviceId)
);
2021-09-28 23:38:55 +00:00
return window.textsecure.storage.protocol.enqueueSessionJob<MessageType>(
address,
`doSendMessage(${address.toString()})`,
async () => {
const protocolAddress = ProtocolAddress.new(
serviceId,
destinationDeviceId
);
2018-05-02 16:51:22 +00:00
const activeSession = await sessionStore.getSession(
protocolAddress
);
if (!activeSession) {
throw new Error(
2022-02-09 20:33:19 +00:00
'OutgoingMessage.doSendMessage: No active session!'
);
}
2021-11-11 22:43:05 +00:00
const destinationRegistrationId =
activeSession.remoteRegistrationId();
if (sealedSender && senderCertificate) {
2021-05-28 19:11:19 +00:00
const ciphertextMessage = await this.getCiphertextMessage({
identityKeyStore,
protocolAddress,
sessionStore,
});
const certificate = SenderCertificate.deserialize(
Buffer.from(senderCertificate.serialized)
);
2021-05-28 19:11:19 +00:00
const groupIdBuffer = this.groupId
? Buffer.from(this.groupId, 'base64')
: null;
2021-05-28 19:11:19 +00:00
const content = UnidentifiedSenderMessageContent.new(
ciphertextMessage,
certificate,
2021-05-28 19:11:19 +00:00
this.contentHint,
groupIdBuffer
);
const buffer = await sealedSenderEncrypt(
content,
protocolAddress,
identityKeyStore
);
return {
2021-07-09 19:36:10 +00:00
type: Proto.Envelope.Type.UNIDENTIFIED_SENDER,
destinationDeviceId,
destinationRegistrationId,
content: buffer.toString('base64'),
};
}
2021-05-28 19:11:19 +00:00
const ciphertextMessage = await this.getCiphertextMessage({
identityKeyStore,
protocolAddress,
sessionStore,
2021-05-28 19:11:19 +00:00
});
const type = ciphertextMessageTypeToEnvelopeType(
ciphertextMessage.type()
);
const content = ciphertextMessage.serialize().toString('base64');
return {
type,
destinationDeviceId,
destinationRegistrationId,
content,
};
}
);
2018-07-21 21:51:20 +00:00
})
2018-05-02 16:51:22 +00:00
)
2021-09-28 23:38:55 +00:00
.then(async (jsonData: Array<MessageType>) => {
if (sealedSender) {
return this.transmitMessage(serviceId, jsonData, this.timestamp, {
accessKey,
}).then(
() => {
this.recipients[serviceId] = deviceIds;
this.unidentifiedDeliveries.push(serviceId);
this.successfulServiceIds.push(serviceId);
this.numberCompleted();
if (this.sendLogCallback) {
void this.sendLogCallback({
serviceId,
deviceIds,
});
} else if (this.successfulServiceIds.length > 1) {
log.warn(
`OutgoingMessage.doSendMessage: no sendLogCallback provided for message ${this.timestamp}, but multiple recipients`
);
}
},
async (error: Error) => {
2021-09-22 00:58:03 +00:00
if (
error instanceof SendMessageNetworkError &&
2021-09-22 00:58:03 +00:00
(error.code === 401 || error.code === 403)
) {
log.warn(
`OutgoingMessage.doSendMessage: Failing over to unsealed send for serviceId ${serviceId}`
);
if (this.failoverServiceIds.indexOf(serviceId) === -1) {
this.failoverServiceIds.push(serviceId);
}
// This ensures that we don't hit this codepath the next time through
if (sendMetadata) {
delete sendMetadata[serviceId];
}
return this.doSendMessage(serviceId, deviceIds, recurse);
}
throw error;
}
);
}
return this.transmitMessage(serviceId, jsonData, this.timestamp).then(
() => {
this.successfulServiceIds.push(serviceId);
this.recipients[serviceId] = deviceIds;
this.numberCompleted();
if (this.sendLogCallback) {
void this.sendLogCallback({
serviceId,
deviceIds,
});
} else if (this.successfulServiceIds.length > 1) {
log.warn(
`OutgoingMessage.doSendMessage: no sendLogCallback provided for message ${this.timestamp}, but multiple recipients`
);
}
}
);
})
.catch(async error => {
2018-07-21 21:51:20 +00:00
if (
2021-09-22 00:58:03 +00:00
error instanceof HTTPError &&
2018-07-21 21:51:20 +00:00
(error.code === 410 || error.code === 409)
) {
if (!recurse) {
this.registerError(
serviceId,
2018-07-21 21:51:20 +00:00
'Hit retry limit attempting to reload device list',
error
2018-05-02 16:51:22 +00:00
);
return undefined;
}
2018-07-21 21:51:20 +00:00
2021-09-22 00:58:03 +00:00
const response = error.response as {
extraDevices?: Array<number>;
staleDevices?: Array<number>;
missingDevices?: Array<number>;
};
let p: Promise<any> = Promise.resolve();
2018-07-21 21:51:20 +00:00
if (error.code === 409) {
p = this.removeDeviceIdsForServiceId(
serviceId,
2021-09-22 00:58:03 +00:00
response.extraDevices || []
2018-05-02 16:51:22 +00:00
);
} else {
2018-07-21 21:51:20 +00:00
p = Promise.all(
2021-09-22 00:58:03 +00:00
(response.staleDevices || []).map(async (deviceId: number) => {
await window.textsecure.storage.protocol.archiveSession(
new QualifiedAddress(ourAci, new Address(serviceId, deviceId))
);
})
2018-05-02 16:51:22 +00:00
);
}
return p.then(async () => {
2018-07-21 21:51:20 +00:00
const resetDevices =
error.code === 410
2021-09-22 00:58:03 +00:00
? response.staleDevices
: response.missingDevices;
return this.getKeysForServiceId(serviceId, resetDevices).then(
2018-10-31 23:58:14 +00:00
// We continue to retry as long as the error code was 409; the assumption is
// that we'll request new device info and the next request will succeed.
this.reloadDevicesAndSend(serviceId, error.code === 409)
2018-05-02 16:51:22 +00:00
);
2018-07-21 21:51:20 +00:00
});
}
let newError = error;
if (
error instanceof LibSignalErrorBase &&
error.code === ErrorCode.UntrustedIdentity
) {
newError = new OutgoingIdentityKeyError(serviceId, error);
log.error(
2018-07-21 21:51:20 +00:00
'Got "key changed" error from encrypt - no identityKey for application layer',
serviceId,
2018-07-21 21:51:20 +00:00
deviceIds
);
log.info('closing all sessions for', serviceId);
window.textsecure.storage.protocol.archiveAllSessions(serviceId).then(
() => {
throw error;
},
innerError => {
log.error(
'doSendMessage: Error closing sessions: ' +
`${Errors.toLogFormat(innerError)}`
);
throw error;
}
);
2018-07-21 21:51:20 +00:00
}
this.registerError(
serviceId,
'Failed to create or send message',
newError
);
return undefined;
2018-05-02 16:51:22 +00:00
});
}
2018-05-02 16:51:22 +00:00
async removeDeviceIdsForServiceId(
serviceId: ServiceIdString,
deviceIdsToRemove: Array<number>
): Promise<void> {
const ourAci = window.textsecure.storage.user.getCheckedAci();
await Promise.all(
deviceIdsToRemove.map(async deviceId => {
await window.textsecure.storage.protocol.archiveSession(
new QualifiedAddress(ourAci, new Address(serviceId, deviceId))
);
})
);
}
2018-05-02 16:51:22 +00:00
async sendToServiceId(serviceId: ServiceIdString): Promise<void> {
try {
const ourAci = window.textsecure.storage.user.getCheckedAci();
const deviceIds = await window.textsecure.storage.protocol.getDeviceIds({
ourServiceId: ourAci,
serviceId,
});
2021-05-25 22:40:04 +00:00
if (deviceIds.length === 0) {
await this.getKeysForServiceId(serviceId);
2021-05-25 22:40:04 +00:00
}
await this.reloadDevicesAndSend(serviceId, true)();
} catch (error) {
if (
error instanceof LibSignalErrorBase &&
error.code === ErrorCode.UntrustedIdentity
) {
const newError = new OutgoingIdentityKeyError(serviceId, error);
this.registerError(serviceId, 'Untrusted identity', newError);
} else {
this.registerError(
serviceId,
`Failed to retrieve new device keys for serviceId ${serviceId}`,
error
);
}
}
}
}