You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
session-desktop/ts/receiver/dataMessage.ts

430 lines
14 KiB
TypeScript

import { SignalService } from './../protobuf';
5 years ago
import { removeFromCache } from './cache';
import { EnvelopePlus } from './types';
import { getEnvelopeId } from './common';
import { PubKey } from '../session/types';
import { handleMessageJob, toRegularMessage } from './queuedJob';
import { downloadAttachment } from './attachments';
5 years ago
import _ from 'lodash';
import { StringUtils, UserUtils } from '../session/utils';
import { getConversationController } from '../session/conversations';
import { handleClosedGroupControlMessage } from './closedGroups';
import {
getMessageBySenderAndSentAt,
getMessageBySenderAndServerTimestamp,
} from '../../ts/data/data';
import { ConversationModel, ConversationTypeEnum } from '../models/conversation';
import { allowOnlyOneAtATime } from '../session/utils/Promise';
import { toHex } from '../session/utils/String';
import { toLogFormat } from '../types/attachments/Errors';
import { processNewAttachment } from '../types/MessageAttachment';
import { MIME } from '../types';
import { autoScaleForIncomingAvatar } from '../util/attachmentsUtil';
import {
createSwarmMessageSentFromNotUs,
createSwarmMessageSentFromUs,
} from '../models/messageFactory';
import { MessageModel } from '../models/message';
import { isUsFromCache } from '../session/utils/User';
import { decryptProfile } from '../util/crypto/profileEncrypter';
import ByteBuffer from 'bytebuffer';
export async function updateProfileOneAtATime(
conversation: ConversationModel,
profile: SignalService.DataMessage.ILokiProfile,
profileKey?: Uint8Array | null // was any
) {
if (!conversation?.id) {
window?.log?.warn('Cannot update profile with empty convoid');
return;
}
const oneAtaTimeStr = `updateProfileOneAtATime:${conversation.id}`;
return allowOnlyOneAtATime(oneAtaTimeStr, async () => {
return createOrUpdateProfile(conversation, profile, profileKey);
});
}
/**
* Creates a new profile from the profile provided. Creates the profile if it doesn't exist.
*/
async function createOrUpdateProfile(
conversation: ConversationModel,
profile: SignalService.DataMessage.ILokiProfile,
profileKey?: Uint8Array | null
) {
// Retain old values unless changed:
const newProfile = conversation.get('profile') || {};
newProfile.displayName = profile.displayName;
if (profile.profilePicture && profileKey) {
const prevPointer = conversation.get('avatarPointer');
const needsUpdate = !prevPointer || !_.isEqual(prevPointer, profile.profilePicture);
if (needsUpdate) {
try {
const downloaded = await downloadAttachment({
url: profile.profilePicture,
isRaw: true,
});
// null => use placeholder with color and first letter
let path = null;
if (profileKey) {
// Convert profileKey to ArrayBuffer, if needed
const encoding = typeof profileKey === 'string' ? 'base64' : null;
try {
const profileKeyArrayBuffer = dcodeIO.ByteBuffer.wrap(
profileKey,
encoding
).toArrayBuffer();
const decryptedData = await decryptProfile(downloaded.data, profileKeyArrayBuffer);
const scaledData = await autoScaleForIncomingAvatar(decryptedData);
const upgraded = await processNewAttachment({
data: await scaledData.blob.arrayBuffer(),
contentType: MIME.IMAGE_UNKNOWN, // contentType is mostly used to generate previews and screenshot. We do not care for those in this case.
});
// Only update the convo if the download and decrypt is a success
conversation.set('avatarPointer', profile.profilePicture);
conversation.set('profileKey', toHex(profileKey));
({ path } = upgraded);
} catch (e) {
window?.log?.error(`Could not decrypt profile image: ${e}`);
}
}
newProfile.avatar = path;
} catch (e) {
window.log.warn(
`Failed to download attachment at ${profile.profilePicture}. Maybe it expired? ${e.message}`
);
// do not return here, we still want to update the display name even if the avatar failed to download
}
}
} else if (profileKey) {
newProfile.avatar = null;
}
const conv = await getConversationController().getOrCreateAndWait(
4 years ago
conversation.id,
ConversationTypeEnum.PRIVATE
);
4 years ago
await conv.setLokiProfile(newProfile);
await conv.commit();
}
function cleanAttachment(attachment: any) {
return {
5 years ago
..._.omit(attachment, 'thumbnail'),
id: attachment.id.toString(),
5 years ago
key: attachment.key ? StringUtils.decode(attachment.key, 'base64') : null,
digest:
attachment.digest && attachment.digest.length > 0
? StringUtils.decode(attachment.digest, 'base64')
: null,
};
}
function cleanAttachments(decrypted: SignalService.DataMessage) {
const { quote, group } = decrypted;
// Here we go from binary to string/base64 in all AttachmentPointer digest/key fields
if (group && group.type === SignalService.GroupContext.Type.UPDATE) {
if (group.avatar !== null) {
group.avatar = cleanAttachment(group.avatar);
}
}
decrypted.attachments = (decrypted.attachments || []).map(cleanAttachment);
decrypted.preview = (decrypted.preview || []).map((item: any) => {
const { image } = item;
if (!image) {
return item;
}
return {
...item,
image: cleanAttachment(image),
};
});
if (quote) {
if (quote.id) {
5 years ago
quote.id = _.toNumber(quote.id);
}
quote.attachments = (quote.attachments || []).map((item: any) => {
const { thumbnail } = item;
if (!thumbnail || thumbnail.length === 0) {
return item;
}
return {
...item,
thumbnail: cleanAttachment(item.thumbnail),
};
});
}
}
export function isMessageEmpty(message: SignalService.DataMessage) {
const { flags, body, attachments, group, quote, preview, openGroupInvitation } = message;
return (
!flags &&
// FIXME remove this hack to drop auto friend requests messages in a few weeks 15/07/2020
isBodyEmpty(body) &&
_.isEmpty(attachments) &&
_.isEmpty(group) &&
_.isEmpty(quote) &&
_.isEmpty(preview) &&
_.isEmpty(openGroupInvitation)
);
}
function isBodyEmpty(body: string) {
return _.isEmpty(body);
}
async function cleanIncomingDataMessage(
envelope: EnvelopePlus,
rawDataMessage: SignalService.DataMessage
) {
/* tslint:disable:no-bitwise */
const FLAGS = SignalService.DataMessage.Flags;
// Now that its decrypted, validate the message and clean it up for consumer
// processing
// Note that messages may (generally) only perform one action and we ignore remaining
// fields after the first action.
if (rawDataMessage.flags == null) {
rawDataMessage.flags = 0;
}
if (rawDataMessage.expireTimer == null) {
rawDataMessage.expireTimer = 0;
}
if (rawDataMessage.flags & FLAGS.EXPIRATION_TIMER_UPDATE) {
rawDataMessage.body = '';
rawDataMessage.attachments = [];
} else if (rawDataMessage.flags !== 0) {
throw new Error('Unknown flags in message');
}
const attachmentCount = rawDataMessage?.attachments?.length || 0;
const ATTACHMENT_MAX = 32;
if (attachmentCount > ATTACHMENT_MAX) {
await removeFromCache(envelope);
throw new Error(
`Too many attachments: ${attachmentCount} included in one message, max is ${ATTACHMENT_MAX}`
);
}
cleanAttachments(rawDataMessage);
// if the decrypted dataMessage timestamp is not set, copy the one from the envelope
if (!_.isFinite(rawDataMessage?.timestamp)) {
rawDataMessage.timestamp = envelope.timestamp;
}
return rawDataMessage;
}
/**
* We have a few origins possible
* - if the message is from a private conversation with a friend and he wrote to us,
* the conversation to add the message to is our friend pubkey, so envelope.source
* - if the message is from a medium group conversation
* * envelope.source is the medium group pubkey
* * envelope.senderIdentity is the author pubkey (the one who sent the message)
* - at last, if the message is a syncMessage,
* * envelope.source is our pubkey (our other device has the same pubkey as us)
* * dataMessage.syncTarget is either the group public key OR the private conversation this message is about.
*/
// tslint:disable-next-line: cyclomatic-complexity
export async function handleSwarmDataMessage(
envelope: EnvelopePlus,
rawDataMessage: SignalService.DataMessage,
messageHash: string,
senderConversationModel: ConversationModel
): Promise<void> {
const cleanDataMessage = await cleanIncomingDataMessage(envelope, rawDataMessage);
// we handle group updates from our other devices in handleClosedGroupControlMessage()
if (cleanDataMessage.closedGroupControlMessage) {
await handleClosedGroupControlMessage(
envelope,
cleanDataMessage.closedGroupControlMessage as SignalService.DataMessage.ClosedGroupControlMessage
);
return;
}
/**
* This is a mess, but
*
* 1. if syncTarget is set and this is a synced message, syncTarget holds the conversationId in which this message is addressed. This syncTarget can be a private conversation pubkey or a closed group pubkey
*
* 2. for a closed group message, envelope.senderIdentity is the pubkey of the sender and envelope.source is the pubkey of the closed group.
*
* 3. for a private conversation message, envelope.senderIdentity and envelope.source are probably the pubkey of the sender.
*/
const isSyncedMessage = Boolean(cleanDataMessage.syncTarget?.length);
// no need to remove prefix here, as senderIdentity set => envelope.source is not used (and this is the one having the prefix when this is an opengroup)
const convoIdOfSender = envelope.senderIdentity || envelope.source;
const isMe = UserUtils.isUsFromCache(convoIdOfSender);
if (isSyncedMessage && !isMe) {
window?.log?.warn('Got a sync message from someone else than me. Dropping it.');
return removeFromCache(envelope);
} else if (isSyncedMessage) {
// we should create the synTarget convo but I have no idea how to know if this is a private or closed group convo?
}
const convoIdToAddTheMessageTo = PubKey.removeTextSecurePrefixIfNeeded(
isSyncedMessage ? cleanDataMessage.syncTarget : envelope.source
);
const convoToAddMessageTo = await getConversationController().getOrCreateAndWait(
convoIdToAddTheMessageTo,
envelope.senderIdentity ? ConversationTypeEnum.GROUP : ConversationTypeEnum.PRIVATE
);
window?.log?.info(
`Handle dataMessage about convo ${convoIdToAddTheMessageTo} from user: ${convoIdOfSender}`
);
// remove the prefix from the source object so this is correct for all other
// Check if we need to update any profile names
if (
!isMe &&
senderConversationModel &&
cleanDataMessage.profile &&
cleanDataMessage.profileKey?.length
) {
// do not await this
void updateProfileOneAtATime(
senderConversationModel,
cleanDataMessage.profile,
cleanDataMessage.profileKey
);
}
if (isMessageEmpty(cleanDataMessage)) {
window?.log?.warn(`Message ${getEnvelopeId(envelope)} ignored; it was empty`);
return removeFromCache(envelope);
}
const sentAtTimestamp = _.toNumber(envelope.timestamp);
if (!convoIdToAddTheMessageTo) {
window?.log?.error('We cannot handle a message without a conversationId');
confirm();
return;
}
const msgModel =
isSyncedMessage || (envelope.senderIdentity && isUsFromCache(envelope.senderIdentity))
? createSwarmMessageSentFromUs({
conversationId: convoIdToAddTheMessageTo,
messageHash,
sentAt: sentAtTimestamp,
})
: createSwarmMessageSentFromNotUs({
conversationId: convoIdToAddTheMessageTo,
messageHash,
sender: senderConversationModel.id,
sentAt: sentAtTimestamp,
});
await handleSwarmMessage(
msgModel,
messageHash,
sentAtTimestamp,
cleanDataMessage,
convoToAddMessageTo,
() => removeFromCache(envelope)
);
}
export async function isSwarmMessageDuplicate({
source,
sentAt,
}: {
source: string;
sentAt: number;
}) {
try {
const result = await getMessageBySenderAndSentAt({
source,
sentAt,
});
return Boolean(result);
} catch (error) {
window?.log?.error('isSwarmMessageDuplicate error:', toLogFormat(error));
return false;
}
}
export async function isOpengroupMessageDuplicate({
sender,
serverTimestamp,
}: {
sender: string;
serverTimestamp: number;
}) {
// serverTimestamp is only used for opengroupv2
try {
const result = await getMessageBySenderAndServerTimestamp({
source: sender,
serverTimestamp,
});
// if we have a result, it means a specific user sent two messages either with the same serverTimestamp.
// no need to do anything else, those messages must be the same
// Note: this test is not based on which conversation the user sent the message
// but we consider that a user sending two messages with the same serverTimestamp is unlikely
return Boolean(result);
} catch (error) {
window?.log?.error('isOpengroupMessageDuplicate error:', toLogFormat(error));
return false;
}
}
// tslint:disable:cyclomatic-complexity max-func-body-length */
async function handleSwarmMessage(
msgModel: MessageModel,
messageHash: string,
sentAt: number,
rawDataMessage: SignalService.DataMessage,
convoToAddMessageTo: ConversationModel,
confirm: () => void
): Promise<void> {
if (!rawDataMessage || !msgModel) {
window?.log?.warn('Invalid data passed to handleSwarmMessage.');
confirm();
return;
}
void convoToAddMessageTo.queueJob(async () => {
// this call has to be made inside the queueJob!
const isDuplicate = await isSwarmMessageDuplicate({
source: msgModel.get('source'),
sentAt,
});
if (isDuplicate) {
window?.log?.info('Received duplicate message. Dropping it.');
confirm();
return;
}
await handleMessageJob(
msgModel,
convoToAddMessageTo,
toRegularMessage(rawDataMessage),
confirm,
msgModel.get('source'),
messageHash
);
});
}