split attachmnent logic between what is used on main and renderer

pull/2242/head
Audric Ackermann 3 years ago
parent 9f8920ef2c
commit 0ebc1d7e92
No known key found for this signature in database
GPG Key ID: 999F434D76324AD4

@ -15,7 +15,6 @@ test/test.js
# Third-party files
js/Mp3LameEncoder.min.js
js/WebAudioRecorderMp3.js
libtextsecure/libsignal-protocol.js
libtextsecure/test/blanket_mocha.js
test/blanket_mocha.js

@ -26,7 +26,6 @@ components/**
js/curve/**
js/Mp3LameEncoder.min.js
js/WebAudioRecorderMp3.js
libtextsecure/libsignal-protocol.js
js/util_worker.js
libtextsecure/test/blanket_mocha.js
mnemonic_languages/**

@ -12,11 +12,6 @@ const toConcatForApp = [
'node_modules/backbone/backbone.js',
];
// const toConcatForComponentTextsecure = [
// 'node_modules/long/dist/long.js',
// 'components/protobuf/**/*.js',
// ];
module.exports = grunt => {
const components = [];
// eslint-disable-next-line guard-for-in, no-restricted-syntax
@ -24,22 +19,6 @@ module.exports = grunt => {
components.push(toConcatForApp[i]);
}
// const libtextsecurecomponents = [];
// // eslint-disable-next-line guard-for-in, no-restricted-syntax
// for (const i in toConcatForComponentTextsecure) {
// libtextsecurecomponents.push(toConcatForComponentTextsecure[i]);
// }
const utilWorkerComponents = [
'node_modules/bytebuffer/dist/bytebuffer.js',
'js/curve/curve25519_compiled.js',
'js/curve/curve25519_wrapper.js',
'node_modules/libsodium-sumo/dist/modules-sumo/libsodium-sumo.js',
'node_modules/libsodium-wrappers-sumo/dist/modules-sumo/libsodium-wrappers.js',
'libtextsecure/libsignal-protocol.js',
'js/util_worker_tasks.js',
];
grunt.loadNpmTasks('grunt-sass');
grunt.initConfig({
@ -49,22 +28,6 @@ module.exports = grunt => {
src: components,
dest: 'js/components.js',
},
util_worker: {
src: utilWorkerComponents,
dest: 'js/util_worker.js',
},
// libtextsecurecomponents: {
// src: libtextsecurecomponents,
// dest: 'libtextsecure/components.js',
// },
libtextsecure: {
options: {
banner: ';(function() {\n',
footer: '})();\n',
},
src: ['libtextsecure/libsignal-protocol.js'],
dest: 'js/libtextsecure.js',
},
},
sass: {
options: {
@ -83,10 +46,6 @@ module.exports = grunt => {
files: ['./libtextsecure/*.js', './libtextsecure/storage/*.js'],
tasks: ['concat:libtextsecure'],
},
utilworker: {
files: utilWorkerComponents,
tasks: ['concat:util_worker'],
},
protobuf: {
files: ['./protos/SignalService.proto'],
tasks: ['exec:build-protobuf'],

@ -1,47 +0,0 @@
import { SignalService } from '../../protobuf';
export type BinaryString = string;
export type CipherTextObject = {
type: SignalService.Envelope.Type;
body: BinaryString;
};
export type KeyPair = {
pubKey: ArrayBuffer;
privKey: ArrayBuffer;
};
interface CurveSync {
generateKeyPair(): KeyPair;
createKeyPair(privKey: ArrayBuffer): KeyPair;
verifySignature(pubKey: ArrayBuffer, msg: ArrayBuffer, sig: ArrayBuffer): void;
calculateSignature(privKey: ArrayBuffer, message: ArrayBuffer): ArrayBuffer;
validatePubKeyFormat(pubKey: ArrayBuffer): ArrayBuffer;
}
interface CurveAsync {
generateKeyPair(): Promise<KeyPair>;
createKeyPair(privKey: ArrayBuffer): Promise<KeyPair>;
verifySignature(pubKey: ArrayBuffer, msg: ArrayBuffer, sig: ArrayBuffer): Promise<void>;
calculateSignature(privKey: ArrayBuffer, message: ArrayBuffer): Promise<ArrayBuffer>;
validatePubKeyFormat(pubKey: ArrayBuffer): Promise<ArrayBuffer>;
}
export interface CurveInterface extends CurveSync {
async: CurveAsync;
}
export interface CryptoInterface {
encrypt(key: ArrayBuffer, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer>;
decrypt(key: ArrayBuffer, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer>;
calculateMAC(key: ArrayBuffer, data: ArrayBuffer): Promise<ArrayBuffer>;
verifyMAC(data: ArrayBuffer, key: ArrayBuffer, mac: ArrayBuffer, length: number): Promise<void>;
getRandomBytes(size: number): ArrayBuffer;
}
export interface LibsignalProtocol {
Curve: CurveInterface;
crypto: CryptoInterface;
}

File diff suppressed because one or more lines are too long

@ -15,7 +15,7 @@
"main": "ts/mains/main_node.js",
"scripts": {
"postinstall": "yarn patch-package && yarn electron-builder install-app-deps",
"start-prod": "cross-env NODE_ENV=dev NODE_APP_INSTANCE=devprod$MULTI electron .",
"start-prod": "cross-env NODE_ENV=production NODE_APP_INSTANCE=devprod$MULTI electron .",
"grunt": "yarn clean-transpile && grunt",
"generate": "yarn grunt --force",
"build-release": "run-script-os",

@ -1,8 +1,7 @@
const { app, clipboard, ipcRenderer, webFrame } = require('electron/main');
const { clipboard, ipcRenderer, webFrame } = require('electron/main');
const { Storage } = require('./ts/util/storage');
const url = require('url');
const path = require('path');
const config = url.parse(window.location.toString(), true).query;
const configAny = config;
@ -205,7 +204,6 @@ const data = require('./ts/data/dataInit');
const { setupi18n } = require('./ts/util/i18n');
window.Signal = data.initData();
// Linux seems to periodically let the event loop stop, so this is a global workaround
setInterval(() => {
// tslint:disable-next-line: no-empty

@ -1,167 +0,0 @@
// // eslint-disable-next-line import/no-extraneous-dependencies
// const esbuild = require('esbuild');
// const path = require('path');
// const glob = require('glob');
// const ROOT_DIR = path.join(__dirname, '..');
// const DIST_DIR = path.join(ROOT_DIR, 'dist');
// const watch = process.argv.some(argv => argv === '-w' || argv === '--watch');
// const isProd = process.argv.some(argv => argv === '-prod' || argv === '--prod');
// const nodeDefaults = {
// platform: 'node',
// target: 'node16',
// sourcemap: isProd ? false : 'inline',
// // Otherwise React components get renamed
// // See: https://github.com/evanw/esbuild/issues/1147
// keepNames: true,
// logLevel: 'info',
// watch,
// };
// const defaultBundle = {
// ...nodeDefaults,
// // define: {
// // 'process.env.NODE_ENV': isProd ? '"production"' : '"development"',
// // },
// bundle: true,
// external: [
// // Native libraries
// // 'better-sqlite3',
// 'electron',
// // 'sass',
// // 'bytebuffer',
// // 'lodash',
// // 'react',
// // 'react-dom',
// // Things that don't bundle well
// // 'backbone',
// 'got',
// // 'jquery',
// 'node-fetch',
// // 'proxy-agent',
// 'ip2country',
// // 'react-redux',
// // 'react-qr-svg',
// // 'reselect',
// // 'redux',
// // '@reduxjs/toolkit',
// 'styled-components',
// // 'react-contexify',
// 'filesize',
// 'redux-persist',
// 'redux-promise-middleware',
// 'emoji-mart',
// 'mic-recorder-to-mp3',
// // 'react-intersection-observer',
// // 'react-h5-audio-player',
// 'semver',
// 'os',
// // 'react-toastify',
// 'libsodium-wrappers-sumo',
// 'fs-extra',
// 'blueimp-load-image',
// 'blob-util',
// // 'redux-logger',
// 'rimraf',
// 'better-sqlite3',
// 'glob',
// 'rc-slider',
// // 'react-virtualized',
// 'rc-slider',
// // 'react-draggable',
// // 'react-mentions',
// // Large libraries
// // See: https://esbuild.github.io/api/#analyze
// 'moment',
// ],
// };
// // App, tests, and scripts
// esbuild.build({
// ...nodeDefaults,
// format: 'cjs',
// mainFields: ['browser', 'main'],
// entryPoints: glob
// .sync('{app,ts}/**/*.{ts,tsx}', {
// nodir: true,
// root: ROOT_DIR,
// })
// .filter(file => !file.endsWith('.d.ts')),
// outdir: path.join(DIST_DIR),
// });
// // App, tests, and scripts
// // build main renderer
// esbuild.build({
// ...defaultBundle,
// format: 'cjs',
// platform: 'node',
// mainFields: ['browser', 'main', 'module'],
// inject: [path.join(ROOT_DIR, 'node_modules', 'jquery', 'dist', 'jquery.min.js')],
// entryPoints: ['./ts/mains/main_renderer.ts'],
// outfile: path.join(DIST_DIR, 'electron_renderer.js'),
// });
// // build main_node
// esbuild.build({
// ...defaultBundle,
// format: 'cjs',
// mainFields: ['main'],
// entryPoints: ['./ts/mains/main_node.ts'],
// outfile: path.join(DIST_DIR, 'electron_main.js'),
// });
// // Preload bundle
// // eslint-disable-next-line more/no-then
// esbuild.buildSync({
// ...defaultBundle,
// format: 'cjs',
// entryPoints: ['preload.ts'],
// outdir: path.join(DIST_DIR),
// });
// esbuild.buildSync({
// ...defaultBundle,
// entryPoints: [path.join(ROOT_DIR, 'dist', 'preload.js')],
// inject: [path.join(ROOT_DIR, 'libtextsecure', 'libsignal-protocol.js')],
// outfile: path.join(DIST_DIR, 'preload.bundled.js'),
// });
// // HEIC worker
// // esbuild.build({
// // ...bundleDefaults,
// // entryPoints: [path.join(ROOT_DIR, 'ts', 'workers', 'heicConverterWorker.ts')],
// // outfile: path.join(DIST_DIR, 'ts', 'workers', 'heicConverter.bundle.js'),
// // });
// // // SQL worker
// // const libDir = path.join('..', '..', 'node_modules', 'better-sqlite3');
// // const bindingFile = path.join(libDir, 'build', 'Release', 'better_sqlite3.node');
// // esbuild.build({
// // ...nodeDefaults,
// // bundle: true,
// // plugins: [
// // {
// // name: 'bindings',
// // setup(build) {
// // build.onResolve({ filter: /^bindings$/ }, () => ({
// // path: path.join(ROOT_DIR, 'ts', 'sql', 'mainWorkerBindings.ts'),
// // }));
// // build.onResolve({ filter: /^better_sqlite3\.node$/ }, () => ({
// // path: bindingFile,
// // external: true,
// // }));
// // },
// // },
// // ],
// // entryPoints: [path.join(ROOT_DIR, 'ts', 'sql', 'mainWorker.ts')],
// // outfile: path.join(DIST_DIR, 'ts', 'sql', 'mainWorker.bundle.js'),
// // });

@ -274,10 +274,10 @@ const CallContainer = () => {
async function fetchReleaseFromFSAndUpdateMain() {
try {
window.log.warn('[updater] about to fetchReleaseFromFSAndUpdateMain');
window.log.info('[updater] about to fetchReleaseFromFSAndUpdateMain');
const latest = await getLatestDesktopReleaseFileToFsV2();
window.log.warn('[updater] fetched latest release from fsv2: ', latest);
window.log.info('[updater] fetched latest release from fsv2: ', latest);
if (isString(latest) && !isEmpty(latest)) {
ipcRenderer.send('set-release-from-file-server', latest);

@ -12,7 +12,7 @@ import { MessageCollection, MessageModel } from '../models/message';
import { MessageAttributes, MessageDirection } from '../models/messageType';
import { HexKeyPair } from '../receiver/keypairs';
import { getConversationController } from '../session/conversations';
import { getSodium } from '../session/crypto';
import { getSodiumRenderer } from '../session/crypto';
import { PubKey } from '../session/types';
import { ReduxConversationType } from '../state/ducks/conversations';
import { ExpirationTimerOptions } from '../util/expiringMessages';
@ -137,7 +137,7 @@ export async function updateGuardNodes(nodes: Array<string>): Promise<void> {
export async function generateAttachmentKeyIfEmpty() {
const existingKey = await getItemById('local_attachment_encrypted_key');
if (!existingKey) {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const encryptingKey = sodium.to_hex(sodium.randombytes_buf(32));
await createOrUpdateItem({
id: 'local_attachment_encrypted_key',

@ -46,7 +46,7 @@ import { processNewAttachment } from '../types/MessageAttachment';
import { urlToBlob } from '../types/attachments/VisualAttachment';
import { MIME } from '../types';
import { setLastProfileUpdateTimestamp } from '../util/storage';
import { getSodium } from '../session/crypto';
import { getSodiumRenderer } from '../session/crypto';
import { encryptProfile } from '../util/crypto/profileEncrypter';
export const getCompleteUrlForV2ConvoId = async (convoId: string) => {
@ -391,7 +391,7 @@ export async function uploadOurAvatar(newAvatarDecrypted?: ArrayBuffer) {
let decryptedAvatarData;
if (newAvatarDecrypted) {
// Encrypt with a new key every time
profileKey = (await getSodium()).randombytes_buf(32);
profileKey = (await getSodiumRenderer()).randombytes_buf(32);
decryptedAvatarData = newAvatarDecrypted;
} else {
// this is a reupload. no need to generate a new profileKey

@ -1,15 +1,56 @@
import { ipcMain } from 'electron';
import { isString, map } from 'lodash';
import rimraf from 'rimraf';
import path from 'path';
import fse from 'fs-extra';
import pify from 'pify';
import { default as glob } from 'glob';
import { deleteAll, ensureDirectory, getAllAttachments, getPath } from '../attachments/attachments';
// tslint:disable: no-console
import { sqlNode } from './sql'; // checked - only node
import { createDeleter, getAttachmentsPath } from '../shared/attachments/shared_attachments';
let initialized = false;
const ERASE_ATTACHMENTS_KEY = 'erase-attachments';
const CLEANUP_ORPHANED_ATTACHMENTS_KEY = 'cleanup-orphaned-attachments';
// ensureDirectory :: AbsolutePath -> IO Unit
const ensureDirectory = async (userDataPath: string) => {
if (!isString(userDataPath)) {
throw new TypeError("'userDataPath' must be a string");
}
await fse.ensureDir(getAttachmentsPath(userDataPath));
};
const deleteAll = async ({
userDataPath,
attachments,
}: {
userDataPath: string;
attachments: any;
}) => {
const deleteFromDisk = createDeleter(getAttachmentsPath(userDataPath));
// tslint:disable-next-line: one-variable-per-declaration
for (let index = 0, max = attachments.length; index < max; index += 1) {
const file = attachments[index];
// eslint-disable-next-line no-await-in-loop
await deleteFromDisk(file);
}
// tslint:disable-next-line: no-console
console.log(`deleteAll: deleted ${attachments.length} files`);
};
const getAllAttachments = async (userDataPath: string) => {
const dir = getAttachmentsPath(userDataPath);
const pattern = path.join(dir, '**', '*');
const files = await pify(glob)(pattern, { nodir: true });
return map(files, file => path.relative(dir, file));
};
async function cleanupOrphanedAttachments(userDataPath: string) {
const allAttachments = await getAllAttachments(userDataPath);
const orphanedAttachments = sqlNode.removeKnownAttachments(allAttachments); //sql.js
@ -28,7 +69,7 @@ export async function initAttachmentsChannel({ userDataPath }: { userDataPath: s
console.log('Ensure attachments directory exists');
await ensureDirectory(userDataPath);
const attachmentsDir = getPath(userDataPath);
const attachmentsDir = getAttachmentsPath(userDataPath);
ipcMain.on(ERASE_ATTACHMENTS_KEY, event => {
try {

@ -31,8 +31,7 @@ if (environment === 'production') {
}
// We load config after we've made our modifications to NODE_ENV
import c from 'config';
const c = require('config');
(c as any).environment = environment;
// Log resulting env vars in use by config

@ -0,0 +1,63 @@
import { getSodiumNode } from './sodiumNode';
export async function decryptAttachmentBufferNode(
encryptingKey: Uint8Array,
bufferIn: ArrayBuffer
) {
const sodium = await getSodiumNode();
const header = new Uint8Array(
bufferIn.slice(0, sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES)
);
const encryptedBuffer = new Uint8Array(
bufferIn.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES)
);
try {
/* Decrypt the stream: initializes the state, using the key and a header */
const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(header, encryptingKey);
// what if ^ this call fail (? try to load as a unencrypted attachment?)
const messageTag = sodium.crypto_secretstream_xchacha20poly1305_pull(state, encryptedBuffer);
// we expect the final tag to be there. If not, we might have an issue with this file
// maybe not encrypted locally?
if (messageTag.tag === sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL) {
return messageTag.message;
}
} catch (e) {
// tslint:disable: no-console
console.error('Failed to load the file as an encrypted one', e);
}
return new Uint8Array();
}
export async function encryptAttachmentBufferNode(
encryptingKey: Uint8Array,
bufferIn: ArrayBuffer
) {
const sodium = await getSodiumNode();
try {
const uintArrayIn = new Uint8Array(bufferIn);
/* Set up a new stream: initialize the state and create the header */
const { state, header } = sodium.crypto_secretstream_xchacha20poly1305_init_push(encryptingKey);
/* Now, encrypt the buffer. */
const bufferOut = sodium.crypto_secretstream_xchacha20poly1305_push(
state,
uintArrayIn,
null,
sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL
);
const encryptedBufferWithHeader = new Uint8Array(bufferOut.length + header.length);
encryptedBufferWithHeader.set(header);
encryptedBufferWithHeader.set(bufferOut, header.length);
return { encryptedBufferWithHeader, header };
} catch (e) {
console.error('encryptAttachmentBuffer error: ', e);
return null;
}
}

@ -0,0 +1,8 @@
import * as wrappers from 'libsodium-wrappers-sumo';
export async function getSodiumNode() {
// don't ask me why, but when called from node we have to do this as the types are incorrect?!
const anyWrappers = wrappers as any;
await anyWrappers.ready;
return anyWrappers;
}

@ -1423,6 +1423,7 @@ async function initializeSql({
messages: LocaleMessagesType;
passwordAttempt: boolean;
}) {
console.warn('initializeSql sqlnode');
if (globalInstance) {
throw new Error('Cannot initialize more than once!');
}

@ -9,7 +9,7 @@ import { PubKey } from '../session/types';
import { BlockedNumberController } from '../util/blockedNumberController';
import { GroupUtils, UserUtils } from '../session/utils';
import { fromHexToArray, toHex } from '../session/utils/String';
import { concatUInt8Array, getSodium } from '../session/crypto';
import { concatUInt8Array, getSodiumRenderer } from '../session/crypto';
import { getConversationController } from '../session/conversations';
import { ECKeyPair } from './keypairs';
import { handleConfigurationMessage } from './configMessage';
@ -142,7 +142,7 @@ export async function decryptWithSessionProtocol(
const recipientX25519PublicKey = PubKey.remove05PrefixIfNeeded(hex);
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const signatureSize = sodium.crypto_sign_BYTES;
const ed25519PublicKeySize = sodium.crypto_sign_PUBLICKEYBYTES;

@ -1,4 +1,3 @@
import { KeyPair } from '../../libtextsecure/libsignal-protocol';
import { fromHexToArray, toHex } from '../session/utils/String';
export type HexKeyPair = {
@ -6,6 +5,11 @@ export type HexKeyPair = {
privateHex: string;
};
export type SessionKeyPair = {
pubKey: ArrayBuffer;
privKey: ArrayBuffer;
};
export class ECKeyPair {
public readonly publicKeyData: Uint8Array;
public readonly privateKeyData: Uint8Array;
@ -19,7 +23,7 @@ export class ECKeyPair {
return new ECKeyPair(new Uint8Array(pub), new Uint8Array(priv));
}
public static fromKeyPair(pair: KeyPair) {
public static fromKeyPair(pair: SessionKeyPair) {
return new ECKeyPair(new Uint8Array(pair.pubKey), new Uint8Array(pair.privKey));
}

@ -1,3 +1,4 @@
import { sign } from 'curve25519-js';
import { callUtilsWorker } from '../../../../webworker/workers/util_worker_interface';
import { UserUtils } from '../../../utils';
import { fromBase64ToArray } from '../../../utils/String';
@ -60,10 +61,7 @@ export class OpenGroupMessageV2 {
}
const data = fromBase64ToArray(this.base64EncodedData);
const signature = await window.libsignal.Curve.async.calculateSignature(
ourKeyPair.privKey,
data.buffer
);
const signature = sign(new Uint8Array(ourKeyPair.privKey), data, null);
if (!signature || signature.length === 0) {
throw new Error("Couldn't sign message");
}

@ -6,7 +6,7 @@ import {
minSnodePoolCount,
requiredSnodesForAgreement,
} from './snodePool';
import { getSodium } from '../../crypto';
import { getSodiumRenderer } from '../../crypto';
import _, { range } from 'lodash';
import pRetry from 'p-retry';
import {
@ -186,7 +186,7 @@ export async function getSessionIDForOnsName(onsNameCase: string) {
const validationCount = 3;
const onsNameLowerCase = onsNameCase.toLowerCase();
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const nameAsData = stringToUint8Array(onsNameLowerCase);
const nameHash = sodium.crypto_generichash(sodium.crypto_generichash_BYTES, nameAsData);
const base64EncodedNameHash = fromUInt8ArrayToBase64(nameHash);
@ -529,7 +529,7 @@ export const TEST_getNetworkTime = async (snode: Snode): Promise<string | number
// tslint:disable-next-line: max-func-body-length
export const forceNetworkDeletion = async (): Promise<Array<string> | null> => {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const userX25519PublicKey = UserUtils.getOurPubKeyStrFromCache();
const userED25519KeyPair = await UserUtils.getUserED25519KeyPair();
@ -699,7 +699,7 @@ export const TEST_getMinTimeout = () => 500;
export const networkDeleteMessages = async (
hashes: Array<string>
): Promise<Array<string> | null> => {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const userX25519PublicKey = UserUtils.getOurPubKeyStrFromCache();
const userED25519KeyPair = await UserUtils.getUserED25519KeyPair();

@ -398,7 +398,7 @@ export async function decodeOnionResult(symmetricKey: ArrayBuffer, ciphertext: s
'DecryptAESGCM',
new Uint8Array(symmetricKey),
new Uint8Array(ciphertextBuffer)
)) as string;
)) as ArrayBuffer;
return { plaintext: new TextDecoder().decode(plaintextBuffer), ciphertextBuffer };
}

@ -10,7 +10,7 @@ import * as fse from 'fs-extra';
import { DURATION } from '../constants';
import { makeObjectUrl, urlToBlob } from '../../types/attachments/VisualAttachment';
import { getAttachmentPath } from '../../types/MessageAttachment';
import { decryptAttachmentBuffer } from '../../util/local_attachments_encrypter';
import { decryptAttachmentBufferRenderer } from '../../util/local_attachments_encrypter';
const urlToDecryptedBlobMap = new Map<
string,
@ -85,7 +85,9 @@ export const getDecryptedMediaUrl = async (
window.log.info('about to read and decrypt file :', url);
try {
const encryptedFileContent = await fse.readFile(url);
const decryptedContent = await decryptAttachmentBuffer(encryptedFileContent.buffer);
const decryptedContent = await decryptAttachmentBufferRenderer(
encryptedFileContent.buffer
);
if (decryptedContent?.length) {
const arrayBuffer = decryptedContent.buffer;
const obj = makeObjectUrl(arrayBuffer, contentType);

@ -1,9 +1,9 @@
import { EncryptionType } from '../types/EncryptionType';
import { SignalService } from '../../protobuf';
import { PubKey } from '../types';
import { concatUInt8Array, getSodium, MessageEncrypter } from '.';
import { concatUInt8Array, getSodiumRenderer, MessageEncrypter } from '.';
import { fromHexToArray } from '../utils/String';
export { concatUInt8Array, getSodium };
export { concatUInt8Array, getSodiumRenderer };
import { getLatestClosedGroupEncryptionKeyPair } from '../../../ts/data/data';
import { UserUtils } from '../utils';
import { addMessagePadding } from './BufferPadding';
@ -73,7 +73,7 @@ export async function encryptUsingSessionProtocol(
) {
throw new Error("Couldn't find user ED25519 key pair.");
}
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
// window?.log?.info('encryptUsingSessionProtocol for ', recipientHexEncodedX25519PublicKey.key);

@ -10,7 +10,7 @@ import libsodiumwrappers from 'libsodium-wrappers-sumo';
import { toHex } from '../utils/String';
import { ECKeyPair } from '../../receiver/keypairs';
export async function getSodium(): Promise<typeof libsodiumwrappers> {
export async function getSodiumRenderer(): Promise<typeof libsodiumwrappers> {
await libsodiumwrappers.ready;
return libsodiumwrappers;
}
@ -41,7 +41,7 @@ export const concatUInt8Array = (...args: Array<Uint8Array>): Uint8Array => {
* and one keypair without prefix used for encoding of the messages (function generateCurve25519KeyPairWithoutPrefix).
*/
export async function generateClosedGroupPublicKey() {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const ed25519KeyPair = sodium.crypto_sign_keypair();
const x25519PublicKey = sodium.crypto_sign_ed25519_pk_to_curve25519(ed25519KeyPair.publicKey);
@ -58,7 +58,7 @@ export async function generateClosedGroupPublicKey() {
* Returns a generated curve25519 keypair without the prefix on the public key.
*/
export async function generateCurve25519KeyPairWithoutPrefix(): Promise<ECKeyPair | null> {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
try {
const ed25519KeyPair = sodium.crypto_sign_keypair();

@ -1,12 +1,12 @@
import _ from 'lodash';
import { UserUtils } from '.';
import { getItemById } from '../../../ts/data/data';
import { KeyPair } from '../../../libtextsecure/libsignal-protocol';
import { PubKey } from '../types';
import { fromHexToArray, toHex } from './String';
import { getConversationController } from '../conversations';
import { LokiProfile } from '../../types/Message';
import { getNumber, Storage } from '../../util/storage';
import { SessionKeyPair } from '../../receiver/keypairs';
export type HexKeyPair = {
pubKey: string;
@ -48,12 +48,12 @@ export function getOurPubKeyFromCache(): PubKey {
return PubKey.cast(ourNumber);
}
let cachedIdentityKeyPair: KeyPair | undefined;
let cachedIdentityKeyPair: SessionKeyPair | undefined;
/**
* This return the stored x25519 identity keypair for the current logged in user
*/
export async function getIdentityKeyPair(): Promise<KeyPair | undefined> {
export async function getIdentityKeyPair(): Promise<SessionKeyPair | undefined> {
if (cachedIdentityKeyPair) {
return cachedIdentityKeyPair;
}

@ -0,0 +1,36 @@
// createDeleter :: AttachmentsPath ->
// RelativePath ->
// IO Unit
import { isString } from 'lodash';
import path from 'path';
import fse from 'fs-extra';
export const createDeleter = (root: string) => {
if (!isString(root)) {
throw new TypeError("'root' must be a path");
}
return async (relativePath: string) => {
if (!isString(relativePath)) {
throw new TypeError("'relativePath' must be a string");
}
const absolutePath = path.join(root, relativePath);
const normalized = path.normalize(absolutePath);
if (!normalized.startsWith(root)) {
throw new Error('Invalid relative path');
}
await fse.remove(absolutePath);
};
};
const PATH = 'attachments.noindex';
// getPath :: AbsolutePath -> AbsolutePath
export const getAttachmentsPath = (userDataPath: string) => {
if (!isString(userDataPath)) {
throw new TypeError("'userDataPath' must be a string");
}
return path.join(userDataPath, PATH);
};

@ -1,7 +1,7 @@
import chai, { expect } from 'chai';
import * as crypto from 'crypto';
import * as sinon from 'sinon';
import { concatUInt8Array, getSodium, MessageEncrypter } from '../../../../session/crypto';
import { concatUInt8Array, getSodiumRenderer, MessageEncrypter } from '../../../../session/crypto';
import { EncryptionType } from '../../../../session/types/EncryptionType';
import { TestUtils } from '../../../test-utils';
import { SignalService } from '../../../../protobuf';
@ -179,7 +179,7 @@ describe('MessageEncrypter', () => {
it('should pass the correct data for sodium crypto_sign', async () => {
const keypair = await UserUtils.getUserED25519KeyPair();
const recipient = TestUtils.generateFakePubKey();
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const cryptoSignDetachedSpy = sandboxSessionProtocol.spy(sodium, 'crypto_sign_detached');
const plainText = '123456';
const plainTextBytes = new Uint8Array(StringUtils.encode(plainText, 'utf8'));
@ -220,7 +220,7 @@ describe('MessageEncrypter', () => {
const plainTextBytes = new Uint8Array(StringUtils.encode('123456789', 'utf8'));
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const recipientX25519PrivateKey = userX25519KeyPair!.privKey;
const recipientX25519PublicKeyHex = toHex(userX25519KeyPair!.pubKey);

@ -2,11 +2,10 @@ import { ipcRenderer } from 'electron';
import { isArrayBuffer, isEmpty, isUndefined, omit } from 'lodash';
import {
createAbsolutePathGetter,
createDeleter,
createReader,
createWriterForNew,
getPath,
} from '../attachments/attachments';
} from '../util/attachments_files';
import { createDeleter, getAttachmentsPath } from '../shared/attachments/shared_attachments';
import {
autoOrientJPEGAttachment,
captureDimensionsAndScreenshot,
@ -28,6 +27,8 @@ import {
// upgrade: _mapAttachments(replaceUnicodeV2),
// upgrade: _mapPreviewAttachments(migrateDataToFileSystem),
// I think this is only used on the renderer side, but how?!
export const deleteExternalMessageFiles = async (message: {
attachments: any;
quote: any;
@ -99,7 +100,7 @@ export async function initializeAttachmentLogic() {
if (!userDataPath || userDataPath.length <= 10) {
throw new Error('userDataPath cannot have length <= 10');
}
attachmentsPath = getPath(userDataPath);
attachmentsPath = getAttachmentsPath(userDataPath);
internalReadAttachmentData = createReader(attachmentsPath);
internalGetAbsoluteAttachmentPath = createAbsolutePathGetter(attachmentsPath);
internalDeleteOnDisk = createDeleter(attachmentsPath);

@ -1,5 +1,5 @@
import { getConversationController } from '../session/conversations';
import { getSodium } from '../session/crypto';
import { getSodiumRenderer } from '../session/crypto';
import { fromArrayBufferToBase64, fromHex, toHex } from '../session/utils/String';
import { getOurPubKeyStrFromCache } from '../session/utils/User';
import { trigger } from '../shims/events';
@ -23,7 +23,7 @@ import { Registration } from './registration';
export async function sessionGenerateKeyPair(
seed: ArrayBuffer
): Promise<{ pubKey: ArrayBufferLike; privKey: ArrayBufferLike }> {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
const ed25519KeyPair = sodium.crypto_sign_seed_keypair(new Uint8Array(seed));
const x25519PublicKey = sodium.crypto_sign_ed25519_pk_to_curve25519(ed25519KeyPair.publicKey);
// prepend version byte (coming from `processKeys(raw_keys)`)
@ -127,13 +127,13 @@ export async function generateMnemonic() {
// Note: 4 bytes are converted into 3 seed words, so length 12 seed words
// (13 - 1 checksum) are generated using 12 * 4 / 3 = 16 bytes.
const seedSize = 16;
const seed = (await getSodium()).randombytes_buf(seedSize);
const seed = (await getSodiumRenderer()).randombytes_buf(seedSize);
const hex = toHex(seed);
return mn_encode(hex);
}
async function createAccount(identityKeyPair: any) {
const sodium = await getSodium();
const sodium = await getSodiumRenderer();
let password = fromArrayBufferToBase64(sodium.randombytes_buf(16));
password = password.substring(0, password.length - 2);

@ -1,40 +1,18 @@
import crypto from 'crypto';
import path from 'path';
import pify from 'pify';
import { default as glob } from 'glob';
import fse from 'fs-extra';
import { isArrayBuffer, isString, map } from 'lodash';
import { isArrayBuffer, isBuffer, isString } from 'lodash';
import {
decryptAttachmentBuffer,
encryptAttachmentBuffer,
} from '../util/local_attachments_encrypter';
decryptAttachmentBufferRenderer,
encryptAttachmentBufferRenderer,
} from './local_attachments_encrypter';
const PATH = 'attachments.noindex';
if (window) {
}
export const getAllAttachments = async (userDataPath: string) => {
const dir = getPath(userDataPath);
const pattern = path.join(dir, '**', '*');
const files = await pify(glob)(pattern, { nodir: true });
return map(files, file => path.relative(dir, file));
};
// getPath :: AbsolutePath -> AbsolutePath
export const getPath = (userDataPath: string) => {
if (!isString(userDataPath)) {
throw new TypeError("'userDataPath' must be a string");
}
return path.join(userDataPath, PATH);
};
// ensureDirectory :: AbsolutePath -> IO Unit
export const ensureDirectory = async (userDataPath: string) => {
if (!isString(userDataPath)) {
throw new TypeError("'userDataPath' must be a string");
}
await fse.ensureDir(getPath(userDataPath));
};
// to me, this file is only used in the renderer
// import { decryptAttachmentBuffer, encryptAttachmentBuffer } from './encrypt_attachment_buffer';
// createReader :: AttachmentsPath ->
// RelativePath ->
@ -54,8 +32,11 @@ export const createReader = (root: string) => {
throw new Error('Invalid relative path');
}
const buffer = await fse.readFile(normalized);
if (!isBuffer(buffer)) {
throw new TypeError("'bufferIn' must be a buffer");
}
const decryptedData = await decryptAttachmentBuffer(buffer.buffer);
const decryptedData = await decryptAttachmentBufferRenderer(buffer.buffer);
return decryptedData.buffer;
};
@ -86,7 +67,7 @@ export const createWriterForNew = (root: string) => {
// createWriter :: AttachmentsPath ->
// { data: ArrayBuffer, path: RelativePath } ->
// IO (Promise RelativePath)
export const createWriterForExisting = (root: string) => {
const createWriterForExisting = (root: string) => {
if (!isString(root)) {
throw new TypeError("'root' must be a path");
}
@ -110,7 +91,13 @@ export const createWriterForExisting = (root: string) => {
}
await fse.ensureFile(normalized);
const { encryptedBufferWithHeader } = await encryptAttachmentBuffer(arrayBuffer);
if (!isArrayBuffer(arrayBuffer)) {
throw new TypeError("'bufferIn' must be an array buffer");
}
const { encryptedBufferWithHeader } = (await encryptAttachmentBufferRenderer(
arrayBuffer
)) as any;
const buffer = Buffer.from(encryptedBufferWithHeader.buffer);
await fse.writeFile(normalized, buffer);
@ -119,56 +106,14 @@ export const createWriterForExisting = (root: string) => {
};
};
// createDeleter :: AttachmentsPath ->
// RelativePath ->
// IO Unit
export const createDeleter = (root: string) => {
if (!isString(root)) {
throw new TypeError("'root' must be a path");
}
return async (relativePath: string) => {
if (!isString(relativePath)) {
throw new TypeError("'relativePath' must be a string");
}
const absolutePath = path.join(root, relativePath);
const normalized = path.normalize(absolutePath);
if (!normalized.startsWith(root)) {
throw new Error('Invalid relative path');
}
await fse.remove(absolutePath);
};
};
export const deleteAll = async ({
userDataPath,
attachments,
}: {
userDataPath: string;
attachments: any;
}) => {
const deleteFromDisk = createDeleter(getPath(userDataPath));
// tslint:disable-next-line: one-variable-per-declaration
for (let index = 0, max = attachments.length; index < max; index += 1) {
const file = attachments[index];
// eslint-disable-next-line no-await-in-loop
await deleteFromDisk(file);
}
// tslint:disable-next-line: no-console
console.log(`deleteAll: deleted ${attachments.length} files`);
};
// createName :: Unit -> IO String
export const createName = () => {
const createName = () => {
const buffer = crypto.randomBytes(32);
return buffer.toString('hex');
};
// getRelativePath :: String -> Path
export const getRelativePath = (name: string) => {
const getRelativePath = (name: string) => {
if (!isString(name)) {
throw new TypeError("'name' must be a string");
}

@ -1,6 +1,50 @@
const { encrypt, decrypt, calculateMAC, verifyMAC } = window.libsignal.crypto;
// tslint:disable: binary-expression-operand-order
// tslint:disable: restrict-plus-operands
// tslint:disable: no-function-expression
async function sign(key: any, data: any) {
return crypto.subtle
.importKey('raw', key, { name: 'HMAC', hash: { name: 'SHA-256' } }, false, ['sign'])
.then(async function(secondKey: any) {
return crypto.subtle.sign({ name: 'HMAC', hash: 'SHA-256' }, secondKey, data);
});
}
async function encrypt(key: any, data: any, iv: any) {
return crypto.subtle
.importKey('raw', key, { name: 'AES-CBC' }, false, ['encrypt'])
.then(async function(secondKey: any) {
return crypto.subtle.encrypt({ name: 'AES-CBC', iv: new Uint8Array(iv) }, secondKey, data);
});
}
async function decrypt(key: any, data: any, iv: any) {
return crypto.subtle
.importKey('raw', key, { name: 'AES-CBC' }, false, ['decrypt'])
.then(async function(secondKey: any) {
return crypto.subtle.decrypt({ name: 'AES-CBC', iv: new Uint8Array(iv) }, secondKey, data);
});
}
async function calculateMAC(key: any, data: any) {
return sign(key, data);
}
async function verifyMAC(data: any, key: any, mac: any, length: any) {
// tslint:disable-next-line: variable-name
return sign(key, data).then(function(calculated_mac) {
if (mac.byteLength !== length || calculated_mac.byteLength < length) {
throw new Error('Bad MAC length');
}
const a = new Uint8Array(calculated_mac);
const b = new Uint8Array(mac);
let result = 0;
for (let i = 0; i < mac.byteLength; ++i) {
// tslint:disable-next-line: no-bitwise
result = result | (a[i] ^ b[i]);
}
if (result !== 0) {
throw new Error('Bad MAC');
}
});
}
async function verifyDigest(data: ArrayBuffer, theirDigest: ArrayBuffer) {
return crypto.subtle.digest({ name: 'SHA-256' }, data).then(ourDigest => {
@ -70,7 +114,7 @@ export async function encryptAttachment(
const aesKey = keys.slice(0, 32);
const macKey = keys.slice(32, 64);
return encrypt(aesKey, plaintext, iv).then((ciphertext: any) => {
return encrypt(aesKey, plaintext, iv).then(async (ciphertext: any) => {
const ivAndCiphertext = new Uint8Array(16 + ciphertext.byteLength);
ivAndCiphertext.set(new Uint8Array(iv));
ivAndCiphertext.set(new Uint8Array(ciphertext), 16);

@ -1,4 +1,4 @@
import { getSodium } from '../../session/crypto';
import { getSodiumRenderer } from '../../session/crypto';
const PROFILE_IV_LENGTH = 12; // bytes
const PROFILE_KEY_LENGTH = 32; // bytes
@ -39,7 +39,7 @@ export async function decryptProfile(data: ArrayBuffer, key: ArrayBuffer): Promi
}
async function getRandomBytesFromLength(n: number) {
return (await getSodium()).randombytes_buf(n);
return (await getSodiumRenderer()).randombytes_buf(n);
}
export async function encryptProfile(data: ArrayBuffer, key: ArrayBuffer): Promise<ArrayBuffer> {

@ -1,9 +1,9 @@
import { isArrayBuffer } from 'lodash';
import { fromHexToArray } from '../session/utils/String';
// import { callUtilsWorker } from '../webworker/workers/util_worker_interface';
import { callUtilsWorker } from '../webworker/workers/util_worker_interface';
import { getItemById } from '../data/channelsItem';
export const encryptAttachmentBuffer = async (bufferIn: ArrayBuffer) => {
export const encryptAttachmentBufferRenderer = async (bufferIn: ArrayBuffer) => {
if (!isArrayBuffer(bufferIn)) {
throw new TypeError("'bufferIn' must be an array buffer");
}
@ -14,10 +14,12 @@ export const encryptAttachmentBuffer = async (bufferIn: ArrayBuffer) => {
);
}
const encryptingKey = fromHexToArray(key);
return callUtilsWorker('encryptAttachmentBuffer', encryptingKey, bufferIn);
return callUtilsWorker('encryptAttachmentBufferNode', encryptingKey, bufferIn);
};
export const decryptAttachmentBuffer = async (bufferIn: ArrayBuffer): Promise<Uint8Array> => {
export const decryptAttachmentBufferRenderer = async (
bufferIn: ArrayBuffer
): Promise<Uint8Array> => {
if (!isArrayBuffer(bufferIn)) {
throw new TypeError("'bufferIn' must be an array buffer");
}
@ -28,5 +30,5 @@ export const decryptAttachmentBuffer = async (bufferIn: ArrayBuffer): Promise<Ui
);
}
const encryptingKey = fromHexToArray(key);
return callUtilsWorker('decryptAttachmentBuffer', encryptingKey, bufferIn);
return callUtilsWorker('decryptAttachmentBufferNode', encryptingKey, bufferIn);
};

@ -1,69 +1,18 @@
import ByteBuffer from 'bytebuffer';
import { generateKeyPair, sharedKey, verify } from 'curve25519-js';
import { default as sodiumWrappers } from 'libsodium-wrappers-sumo';
import {
decryptAttachmentBufferNode,
encryptAttachmentBufferNode,
} from '../../node/encrypt_attachment_buffer';
async function getSodium() {
async function getSodiumWorker() {
await sodiumWrappers.ready;
return sodiumWrappers;
}
export async function decryptAttachmentBuffer(encryptingKey: Uint8Array, bufferIn: ArrayBuffer) {
const sodium = await getSodium();
const header = new Uint8Array(
bufferIn.slice(0, sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES)
);
const encryptedBuffer = new Uint8Array(
bufferIn.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES)
);
try {
/* Decrypt the stream: initializes the state, using the key and a header */
const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(header, encryptingKey);
// what if ^ this call fail (? try to load as a unencrypted attachment?)
const messageTag = sodium.crypto_secretstream_xchacha20poly1305_pull(state, encryptedBuffer);
// we expect the final tag to be there. If not, we might have an issue with this file
// maybe not encrypted locally?
if (messageTag.tag === sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL) {
return messageTag.message;
}
} catch (e) {
// tslint:disable: no-console
console.error('Failed to load the file as an encrypted one', e);
}
return new Uint8Array();
}
export async function encryptAttachmentBuffer(encryptingKey: Uint8Array, bufferIn: ArrayBuffer) {
const sodium = await getSodium();
try {
const uintArrayIn = new Uint8Array(bufferIn);
/* Set up a new stream: initialize the state and create the header */
const { state, header } = sodium.crypto_secretstream_xchacha20poly1305_init_push(encryptingKey);
/* Now, encrypt the buffer. */
const bufferOut = sodium.crypto_secretstream_xchacha20poly1305_push(
state,
uintArrayIn,
null,
sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL
);
const encryptedBufferWithHeader = new Uint8Array(bufferOut.length + header.length);
encryptedBufferWithHeader.set(header);
encryptedBufferWithHeader.set(bufferOut, header.length);
return { encryptedBufferWithHeader, header };
} catch (e) {
console.error('encryptAttachmentBuffer error: ', e);
return null;
}
return sodiumWrappers;
}
/* global dcodeIO, Internal, libsignal */
/* global dcodeIO, Internal */
/* eslint-disable no-console */
/* eslint-disable strict */
@ -75,13 +24,13 @@ const functions = {
DecryptAESGCM,
deriveSymmetricKey,
encryptForPubkey,
decryptAttachmentBuffer,
encryptAttachmentBuffer,
decryptAttachmentBufferNode,
encryptAttachmentBufferNode,
bytesFromString,
};
// tslint:disable: function-name
onmessage = async e => {
onmessage = async (e: any) => {
const [jobId, fnName, ...args] = e.data;
try {
@ -189,7 +138,7 @@ async function deriveSymmetricKey(x25519PublicKey: Uint8Array, x25519PrivateKey:
}
async function generateEphemeralKeyPair() {
const ran = (await getSodium()).randombytes_buf(32);
const ran = (await getSodiumWorker()).randombytes_buf(32);
const keys = generateKeyPair(ran);
return keys;
// Signal protocol prepends with "0x05"

2
ts/window.d.ts vendored

@ -1,7 +1,6 @@
import {} from 'styled-components/cssprop';
import { LocalizerType } from '../ts/types/Util';
import { LibsignalProtocol } from '../../libtextsecure/libsignal-protocol';
import { Store } from 'redux';
@ -35,7 +34,6 @@ declare global {
setSettingValue: (id: string, value: any) => void;
i18n: LocalizerType;
libsignal: LibsignalProtocol;
log: any;
sessionFeatureFlags: {
useOnionRequests: boolean;

@ -1,153 +0,0 @@
/* eslint-disable class-methods-use-this */
/*const path = require('path');
const HtmlWebpackPlugin = require('html-webpack-plugin');
const optimization = {
nodeEnv: false,
removeAvailableModules: true,
removeEmptyChunks: true,
providedExports: true,
minimize: false,
// minimizer: [new TerserPlugin({ parallel: true })],
// splitChunks: true,
};
const EXTERNAL_MODULE = new Set([
'backbone',
'better-sqlite3',
'fsevents',
'got',
'jquery',
'node-fetch',
]);
module.exports = [
{
// bundling mode
mode: 'development', // mode: 'production',
devtool: false,
optimization,
// entry files
resolve: {
extensions: ['.ts', '.tsx', '.js', '.json'],
},
entry: './ts/mains/main_node.ts',
target: 'electron-main',
module: {
// loaders
rules: [
{
test: /\.js$/,
loader: `node-bindings-loader`,
},
{
test: /\.node$/,
loader: `node-loader`,
},
{
test: /\.tsx?$/,
include: /ts/,
use: [
{
loader: 'ts-loader',
options: {
transpileOnly: true,
experimentalWatchApi: true,
},
},
],
exclude: /node_modules/,
},
],
},
// output bundles (location)
output: {
path: path.resolve(__dirname, 'dist'),
filename: 'electron_main.js',
},
},
// {
// entry: './preload.ts',
// mode: 'development',
// output: {
// path: path.resolve(__dirname, 'dist'),
// filename: 'preload.bundled.js',
// },
// target: 'electron-main',
// resolve: {
// extensions: ['.ts', '.tsx', '.js', '.json'],
// mainFields: ['browser', 'main'],
// },
// externals: [
// ({ request = '' }, callback) => {
// if (EXTERNAL_MODULE.has(request)) {
// return callback(undefined, `commonjs2 ${request}`);
// }
// callback();
// },
// ],
// module: {
// rules: [
// {
// test: /\.tsx?$/,
// include: [path.resolve(__dirname), path.resolve(__dirname, 'js')],
// exclude: /node_modules/,
// use: [
// {
// loader: 'ts-loader',
// options: { transpileOnly: true },
// },
// ],
// },
// ],
// },
// },
// {
// mode: 'development',
// entry: './ts/mains/main_renderer.ts',
// target: 'electron-renderer',
// devtool: false,
// resolve: {
// extensions: ['.ts', '.tsx', '.js', '.json'],
// },
// module: {
// rules: [
// {
// test: /\.tsx?$/,
// include: [path.resolve(__dirname, 'ts'), path.resolve(__dirname, 'js')],
// exclude: /node_modules/,
// use: [
// {
// loader: 'ts-loader',
// options: {
// transpileOnly: true,
// experimentalWatchApi: true,
// },
// },
// ],
// },
// ],
// },
// optimization,
// output: {
// path: path.resolve(__dirname, 'dist', 'js'),
// filename: 'electron_renderer.js',
// },
// plugins: [
// new HtmlWebpackPlugin({
// template: './background.html',
// }),
// ],
// },
];
Loading…
Cancel
Save