From 1c78e1a7012ab83042393307ebfa915ee069e71f Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 16:41:26 -0700 Subject: [PATCH 01/16] sendToProxy use agent, handle 401/500s, retry system --- js/modules/loki_rpc.js | 102 +++++++++++++++++++++++++++++++++-------- 1 file changed, 84 insertions(+), 18 deletions(-) diff --git a/js/modules/loki_rpc.js b/js/modules/loki_rpc.js index 5f29f6c38..c7a709337 100644 --- a/js/modules/loki_rpc.js +++ b/js/modules/loki_rpc.js @@ -29,7 +29,9 @@ const decryptResponse = async (response, address) => { return {}; }; -const sendToProxy = async (options = {}, targetNode) => { +const timeoutDelay = (ms) => new Promise(resolve => setTimeout(resolve, ms)); + +const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { const randSnode = await lokiSnodeAPI.getRandomSnodeAddress(); // Don't allow arbitrary URLs, only snodes and loki servers @@ -60,36 +62,93 @@ const sendToProxy = async (options = {}, targetNode) => { 'X-Sender-Public-Key': StringView.arrayBufferToHex(myKeys.pubKey), 'X-Target-Snode-Key': targetNode.pubkey_ed25519, }, + agent: snodeHttpsAgent, }; // we only proxy to snodes... - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 0; const response = await nodeFetch(url, firstHopOptions); - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1; + + if (response.status === 401) { + // decom or dereg + // remove + // but which the proxy or the target... + // we got a ton of randomPool nodes, let's just not worry about this one + const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable(randSnode); + log.warn( + `lokiRpc sendToProxy`, + `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}`, + `snode is decom or dereg: `, + ciphertext, + // `marking random snode bad ${randomPoolRemainingCount} remaining` + `Try #${retryNumber}`, + `removing randSnode leaving ${randomPoolRemainingCount} in the random pool` + ); + // retry, just count it happening 5 times to be the target for now + return sendToProxy(options, targetNode, retryNumber + 1); + } // detect SNode is not ready (not in swarm; not done syncing) - if (response.status === 503) { + if (response.status === 503 || response.status === 500) { const ciphertext = await response.text(); - log.error( - `lokiRpc sendToProxy snode ${randSnode.ip}:${randSnode.port} error`, - ciphertext + // we shouldn't do these, + // it's seems to be not the random node that's always bad + // but the target node + + // we got a ton of randomPool nodes, let's just not worry about this one + const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable(randSnode); + log.warn( + `lokiRpc sendToProxy`, + `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}`, + `code ${response.status} error`, + ciphertext, + // `marking random snode bad ${randomPoolRemainingCount} remaining` + `Try #${retryNumber}`, + `removing randSnode leaving ${randomPoolRemainingCount} in the random pool` ); // mark as bad for this round (should give it some time and improve success rates) - lokiSnodeAPI.markRandomNodeUnreachable(randSnode); // retry for a new working snode - return sendToProxy(options, targetNode); + const pRetryNumber = retryNumber + 1; + if (pRetryNumber > 5) { + // it's likely a net problem or an actual problem on the target node + // lets mark the target node bad for now + // we'll just rotate it back in if it's a net problem + log.warn(`Failing ${targetNode.ip}:${targetNode.port} after 5 retries`); + if (options.ourPubKey) { + lokiSnodeAPI.unreachableNode(options.ourPubKey, targetNode); + } + return false; + } + // 500 burns through a node too fast, + // let's slow the retry to give it more time to recover + if (response.status === 500) { + await timeoutDelay(5000); + } + return sendToProxy(options, targetNode, pRetryNumber); } + /* + if (response.status === 500) { + // usually when the server returns nothing... + } + */ // FIXME: handle nodeFetch errors/exceptions... if (response.status !== 200) { // let us know we need to create handlers for new unhandled codes - log.warn('lokiRpc sendToProxy fetch non-200 statusCode', response.status); + log.warn( + 'lokiRpc sendToProxy fetch non-200 statusCode', + response.status, + `from snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}` + ); + return false; } const ciphertext = await response.text(); if (!ciphertext) { // avoid base64 decode failure - log.warn('Server did not return any data for', options); + // usually a 500 but not always + // could it be a timeout? + log.warn('Server did not return any data for', options, targetNode); + return false; } let plaintext; @@ -112,7 +171,7 @@ const sendToProxy = async (options = {}, targetNode) => { 'lokiRpc sendToProxy decode error', e.code, e.message, - `from ${randSnode.ip}:${randSnode.port} ciphertext:`, + `from ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port} ciphertext:`, ciphertext ); if (ciphertextBuffer) { @@ -138,6 +197,11 @@ const sendToProxy = async (options = {}, targetNode) => { } return false; }; + if (retryNumber) { + log.info(`lokiRpc sendToProxy request succeeded,`, + `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}`, + `on retry #${retryNumber}`); + } return jsonRes; } catch (e) { log.error( @@ -182,22 +246,24 @@ const lokiFetch = async (url, options = {}, targetNode = null) => { timeout, method, }; - if (url.match(/https:\/\//)) { - fetchOptions.agent = snodeHttpsAgent; - } try { if (window.lokiFeatureFlags.useSnodeProxy && targetNode) { const result = await sendToProxy(fetchOptions, targetNode); - return result ? result.json() : false; + // if not result, maybe we should throw?? + return result ? result.json() : {}; } if (url.match(/https:\/\//)) { - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 0; + // import that this does not get set in sendToProxy fetchOptions + fetchOptions.agent = snodeHttpsAgent; + process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0'; + } else { + log.info ('lokiRpc http communication', url); } const response = await nodeFetch(url, fetchOptions); // restore TLS checking - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1; + process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1'; let result; // Wrong swarm From e3545fa33847695ae7233ae5354b46b9a989109e Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:14:55 -0700 Subject: [PATCH 02/16] change unreachableNode 2nd param to object, put lock around getRandomSnodeAddress so they can't stack, markRandomNodeUnreachable returns remaining count, adjust logging --- js/modules/loki_snode_api.js | 154 ++++++++++++++++++++++------------- 1 file changed, 97 insertions(+), 57 deletions(-) diff --git a/js/modules/loki_snode_api.js b/js/modules/loki_snode_api.js index 7d163a215..450cc03b7 100644 --- a/js/modules/loki_snode_api.js +++ b/js/modules/loki_snode_api.js @@ -15,6 +15,7 @@ class LokiSnodeAPI { this.localUrl = localUrl; // localhost.loki this.randomSnodePool = []; this.swarmsPendingReplenish = {}; + this.initialiseRandomPoolPromise = false; } async getRandomSnodeAddress() { @@ -35,70 +36,99 @@ class LokiSnodeAPI { seedNodes = [...window.seedNodeList], consecutiveErrors = 0 ) { - const params = { - limit: 20, - active_only: true, - fields: { - public_ip: true, - storage_port: true, - pubkey_x25519: true, - pubkey_ed25519: true, - }, - }; - const seedNode = seedNodes.splice( - Math.floor(Math.random() * seedNodes.length), - 1 - )[0]; - let snodes = []; - try { - const response = await lokiRpc( - `http://${seedNode.ip}`, - seedNode.port, - 'get_n_service_nodes', - params, - {}, // Options - '/json_rpc' // Seed request endpoint - ); - // Filter 0.0.0.0 nodes which haven't submitted uptime proofs - snodes = response.result.service_node_states.filter( - snode => snode.public_ip !== '0.0.0.0' - ); - this.randomSnodePool = snodes.map(snode => ({ - ip: snode.public_ip, - port: snode.storage_port, - pubkey_x25519: snode.pubkey_x25519, - pubkey_ed25519: snode.pubkey_ed25519, - })); - } catch (e) { - log.warn('initialiseRandomPool error', e.code, e.message); - if (consecutiveErrors < 3) { - // retry after a possible delay - setTimeout(() => { - log.info( - 'Retrying initialising random snode pool, try #', - consecutiveErrors + // if currently not in progress + if (this.initialiseRandomPoolPromise === false) { + // FIXME: add timeout + // set lock + this.initialiseRandomPoolPromise = new Promise(async resolve => { + const params = { + limit: 1024, + active_only: true, + fields: { + public_ip: true, + storage_port: true, + pubkey_x25519: true, + pubkey_ed25519: true, + }, + }; + const seedNode = seedNodes.splice( + Math.floor(Math.random() * seedNodes.length), + 1 + )[0]; + let snodes = []; + try { + log.info('loki_snodes: Refreshing random snode pool'); + const response = await lokiRpc( + `http://${seedNode.ip}`, + seedNode.port, + 'get_n_service_nodes', + params, + {}, // Options + '/json_rpc' // Seed request endpoint ); - this.initialiseRandomPool(seedNodes, consecutiveErrors + 1); - }, consecutiveErrors * consecutiveErrors * 5000); - } else { - log.error('Giving up trying to contact seed node'); - if (snodes.length === 0) { - throw new window.textsecure.SeedNodeError( - 'Failed to contact seed node' + // Filter 0.0.0.0 nodes which haven't submitted uptime proofs + snodes = response.result.service_node_states.filter( + snode => snode.public_ip !== '0.0.0.0' ); + this.randomSnodePool = snodes.map(snode => ({ + ip: snode.public_ip, + port: snode.storage_port, + pubkey_x25519: snode.pubkey_x25519, + pubkey_ed25519: snode.pubkey_ed25519, + })); + log.info('loki_snodes: Refreshed random snode pool with', this.randomSnodePool.length, 'snodes'); + } catch (e) { + log.warn('loki_snodes: initialiseRandomPool error', e.code, e.message); + if (consecutiveErrors < 3) { + // retry after a possible delay + setTimeout(() => { + log.info( + 'loki_snodes: Retrying initialising random snode pool, try #', + consecutiveErrors + ); + this.initialiseRandomPool(seedNodes, consecutiveErrors + 1); + }, consecutiveErrors * consecutiveErrors * 5000); + } else { + log.error('loki_snodes: Giving up trying to contact seed node'); + if (snodes.length === 0) { + throw new window.textsecure.SeedNodeError( + 'Failed to contact seed node' + ); + } + } } - } + // clear lock + this.initialiseRandomPoolPromise = null; + resolve(); + }) } + await this.initialiseRandomPoolPromise; } - // nodeUrl is like 9hrje1bymy7hu6nmtjme9idyu3rm8gr3mkstakjyuw1997t7w4ny.snode - async unreachableNode(pubKey, nodeUrl) { + // unreachableNode.url is like 9hrje1bymy7hu6nmtjme9idyu3rm8gr3mkstakjyuw1997t7w4ny.snode + async unreachableNode(pubKey, unreachableNode) { const conversation = ConversationController.get(pubKey); const swarmNodes = [...conversation.get('swarmNodes')]; + if (typeof(unreachableNode) === 'string') { + log.warn('loki_snodes::unreachableNode: String passed as unreachableNode to unreachableNode'); + return swarmNodes; + } + let found = false const filteredNodes = swarmNodes.filter( - node => node.address !== nodeUrl && node.ip !== nodeUrl + node => { + // keep all but thisNode + const thisNode = (node.address === unreachableNode.address && node.ip === unreachableNode.ip && node.port === unreachableNode.port) + if (thisNode) { + found = true + } + return !thisNode + } ); + if (!found) { + log.warn(`loki_snodes::unreachableNode snode ${unreachableNode.ip}:${unreachableNode.port} has already been marked as bad`); + } await conversation.updateSwarmNodes(filteredNodes); + return filteredNodes; } markRandomNodeUnreachable(snode) { @@ -106,6 +136,7 @@ class LokiSnodeAPI { this.randomSnodePool, _.find(this.randomSnodePool, { ip: snode.ip, port: snode.port }) ); + return this.randomSnodePool.length; } async updateLastHash(snode, hash, expiresAt) { @@ -150,7 +181,7 @@ class LokiSnodeAPI { try { newSwarmNodes = await this.getSwarmNodes(pubKey); } catch (e) { - log.error('getFreshSwarmNodes error', e.code, e.message); + log.error('loki_snodes: getFreshSwarmNodes error', e.code, e.message); // TODO: Handle these errors sensibly newSwarmNodes = []; } @@ -184,16 +215,25 @@ class LokiSnodeAPI { ); return []; } + if (!result.snodes) { + log.warn( + `getSnodesForPubkey lokiRpc on ${snode.ip}:${ + snode.port + } returned falsish value for snodes`, + result + ); + return []; + } const snodes = result.snodes.filter(tSnode => tSnode.ip !== '0.0.0.0'); return snodes; } catch (e) { + const randomPoolRemainingCount = this.markRandomNodeUnreachable(snode); log.error( - 'getSnodesForPubkey error', + 'loki_snodes: getSnodesForPubkey error', e.code, e.message, - `for ${snode.ip}:${snode.port}` + `for ${snode.ip}:${snode.port}. ${randomPoolRemainingCount} snodes remaining in randomPool` ); - this.markRandomNodeUnreachable(snode); return []; } } From 241e64b94b6796c70b9d9af535101b8e6a6cfda0 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:17:46 -0700 Subject: [PATCH 03/16] lint --- js/modules/loki_rpc.js | 38 +++++++++++++++++++-------- js/modules/loki_snode_api.js | 51 ++++++++++++++++++++++++------------ 2 files changed, 61 insertions(+), 28 deletions(-) diff --git a/js/modules/loki_rpc.js b/js/modules/loki_rpc.js index c7a709337..b27bca1a0 100644 --- a/js/modules/loki_rpc.js +++ b/js/modules/loki_rpc.js @@ -29,7 +29,7 @@ const decryptResponse = async (response, address) => { return {}; }; -const timeoutDelay = (ms) => new Promise(resolve => setTimeout(resolve, ms)); +const timeoutDelay = ms => new Promise(resolve => setTimeout(resolve, ms)); const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { const randSnode = await lokiSnodeAPI.getRandomSnodeAddress(); @@ -73,10 +73,14 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { // remove // but which the proxy or the target... // we got a ton of randomPool nodes, let's just not worry about this one - const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable(randSnode); + const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable( + randSnode + ); log.warn( `lokiRpc sendToProxy`, - `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}`, + `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ + targetNode.port + }`, `snode is decom or dereg: `, ciphertext, // `marking random snode bad ${randomPoolRemainingCount} remaining` @@ -95,10 +99,14 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { // but the target node // we got a ton of randomPool nodes, let's just not worry about this one - const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable(randSnode); + const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable( + randSnode + ); log.warn( `lokiRpc sendToProxy`, - `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}`, + `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ + targetNode.port + }`, `code ${response.status} error`, ciphertext, // `marking random snode bad ${randomPoolRemainingCount} remaining` @@ -137,7 +145,9 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { log.warn( 'lokiRpc sendToProxy fetch non-200 statusCode', response.status, - `from snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}` + `from snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ + targetNode.port + }` ); return false; } @@ -171,7 +181,9 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { 'lokiRpc sendToProxy decode error', e.code, e.message, - `from ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port} ciphertext:`, + `from ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ + targetNode.port + } ciphertext:`, ciphertext ); if (ciphertextBuffer) { @@ -198,9 +210,13 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { return false; }; if (retryNumber) { - log.info(`lokiRpc sendToProxy request succeeded,`, - `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${targetNode.port}`, - `on retry #${retryNumber}`); + log.info( + `lokiRpc sendToProxy request succeeded,`, + `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ + targetNode.port + }`, + `on retry #${retryNumber}` + ); } return jsonRes; } catch (e) { @@ -259,7 +275,7 @@ const lokiFetch = async (url, options = {}, targetNode = null) => { fetchOptions.agent = snodeHttpsAgent; process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0'; } else { - log.info ('lokiRpc http communication', url); + log.info('lokiRpc http communication', url); } const response = await nodeFetch(url, fetchOptions); // restore TLS checking diff --git a/js/modules/loki_snode_api.js b/js/modules/loki_snode_api.js index 450cc03b7..9f3efcb76 100644 --- a/js/modules/loki_snode_api.js +++ b/js/modules/loki_snode_api.js @@ -76,9 +76,17 @@ class LokiSnodeAPI { pubkey_x25519: snode.pubkey_x25519, pubkey_ed25519: snode.pubkey_ed25519, })); - log.info('loki_snodes: Refreshed random snode pool with', this.randomSnodePool.length, 'snodes'); + log.info( + 'loki_snodes: Refreshed random snode pool with', + this.randomSnodePool.length, + 'snodes' + ); } catch (e) { - log.warn('loki_snodes: initialiseRandomPool error', e.code, e.message); + log.warn( + 'loki_snodes: initialiseRandomPool error', + e.code, + e.message + ); if (consecutiveErrors < 3) { // retry after a possible delay setTimeout(() => { @@ -100,7 +108,7 @@ class LokiSnodeAPI { // clear lock this.initialiseRandomPoolPromise = null; resolve(); - }) + }); } await this.initialiseRandomPoolPromise; } @@ -109,23 +117,30 @@ class LokiSnodeAPI { async unreachableNode(pubKey, unreachableNode) { const conversation = ConversationController.get(pubKey); const swarmNodes = [...conversation.get('swarmNodes')]; - if (typeof(unreachableNode) === 'string') { - log.warn('loki_snodes::unreachableNode: String passed as unreachableNode to unreachableNode'); + if (typeof unreachableNode === 'string') { + log.warn( + 'loki_snodes::unreachableNode: String passed as unreachableNode to unreachableNode' + ); return swarmNodes; } - let found = false - const filteredNodes = swarmNodes.filter( - node => { - // keep all but thisNode - const thisNode = (node.address === unreachableNode.address && node.ip === unreachableNode.ip && node.port === unreachableNode.port) - if (thisNode) { - found = true - } - return !thisNode + let found = false; + const filteredNodes = swarmNodes.filter(node => { + // keep all but thisNode + const thisNode = + node.address === unreachableNode.address && + node.ip === unreachableNode.ip && + node.port === unreachableNode.port; + if (thisNode) { + found = true; } - ); + return !thisNode; + }); if (!found) { - log.warn(`loki_snodes::unreachableNode snode ${unreachableNode.ip}:${unreachableNode.port} has already been marked as bad`); + log.warn( + `loki_snodes::unreachableNode snode ${unreachableNode.ip}:${ + unreachableNode.port + } has already been marked as bad` + ); } await conversation.updateSwarmNodes(filteredNodes); return filteredNodes; @@ -232,7 +247,9 @@ class LokiSnodeAPI { 'loki_snodes: getSnodesForPubkey error', e.code, e.message, - `for ${snode.ip}:${snode.port}. ${randomPoolRemainingCount} snodes remaining in randomPool` + `for ${snode.ip}:${ + snode.port + }. ${randomPoolRemainingCount} snodes remaining in randomPool` ); return []; } From 455bfa4ab754c33aef6ff46c2d0719c4fde89fea Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:33:36 -0700 Subject: [PATCH 04/16] result guard, mark internal-only intended functions with _ prefix and simplify parameters, logging improvements --- js/modules/loki_message_api.js | 130 +++++++++++++++++++++------------ 1 file changed, 84 insertions(+), 46 deletions(-) diff --git a/js/modules/loki_message_api.js b/js/modules/loki_message_api.js index 88b02b7af..838bc5ef6 100644 --- a/js/modules/loki_message_api.js +++ b/js/modules/loki_message_api.js @@ -94,6 +94,7 @@ class LokiMessageAPI { await this.refreshSendingSwarm(pubKey, timestamp); } + // send parameters const params = { pubKey, ttl: ttl.toString(), @@ -104,7 +105,7 @@ class LokiMessageAPI { const promises = []; let completedConnections = 0; for (let i = 0; i < numConnections; i += 1) { - const connectionPromise = this.openSendConnection(params).finally(() => { + const connectionPromise = this._openSendConnection(params).finally(() => { completedConnections += 1; if (completedConnections >= numConnections) { delete this.sendingData[timestamp]; @@ -151,7 +152,7 @@ class LokiMessageAPI { 'Ran out of swarm nodes to query' ); } - log.info(`Successful storage message to ${pubKey}`); + log.info(`loki_message: Successfully stored message to ${pubKey}`); } async refreshSendingSwarm(pubKey, timestamp) { @@ -162,16 +163,11 @@ class LokiMessageAPI { return true; } - async openSendConnection(params) { + async _openSendConnection(params) { while (!_.isEmpty(this.sendingData[params.timestamp].swarm)) { const snode = this.sendingData[params.timestamp].swarm.shift(); // TODO: Revert back to using snode address instead of IP - const successfulSend = await this.sendToNode( - snode.ip, - snode.port, - snode, - params - ); + const successfulSend = await this._sendToNode(snode, params); if (successfulSend) { return true; } @@ -189,19 +185,19 @@ class LokiMessageAPI { } await this.sendingData[params.timestamp].refreshPromise; // Retry with a fresh list again - return this.openSendConnection(params); + return this._openSendConnection(params); } return false; } - async sendToNode(address, port, targetNode, params) { + async _sendToNode(targetNode, params) { let successiveFailures = 0; while (successiveFailures < MAX_ACCEPTABLE_FAILURES) { await sleepFor(successiveFailures * 500); try { const result = await lokiRpc( - `https://${address}`, - port, + `https://${targetNode.ip}`, + targetNode.port, 'store', params, {}, @@ -211,17 +207,19 @@ class LokiMessageAPI { // Make sure we aren't doing too much PoW const currentDifficulty = window.storage.get('PoWDifficulty', null); - const newDifficulty = result.difficulty; - if (newDifficulty != null && newDifficulty !== currentDifficulty) { - window.storage.put('PoWDifficulty', newDifficulty); - } + if (result && result.difficulty) { + const newDifficulty = result.difficulty; + if (newDifficulty != null && newDifficulty !== currentDifficulty) { + window.storage.put('PoWDifficulty', newDifficulty); + } + } // else should we return false? return true; } catch (e) { log.warn( - 'Loki send message error:', + 'loki_message: send error:', e.code, e.message, - `from ${address}` + `destination ${targetNode.ip}:${targetNode.port}` ); if (e instanceof textsecure.WrongSwarmError) { const { newSwarm } = e; @@ -238,26 +236,35 @@ class LokiMessageAPI { } else if (e instanceof textsecure.NotFoundError) { // TODO: Handle resolution error } else if (e instanceof textsecure.TimestampError) { - log.warn('Timestamp is invalid'); + log.warn('loki_message: Timestamp is invalid'); throw e; } else if (e instanceof textsecure.HTTPError) { // TODO: Handle working connection but error response const body = await e.response.text(); - log.warn('HTTPError body:', body); + log.warn('loki_message: HTTPError body:', body); } successiveFailures += 1; } } - log.error(`Failed to send to node: ${address}`); - await lokiSnodeAPI.unreachableNode(params.pubKey, address); + const remainingSwarmSnodes = await lokiSnodeAPI.unreachableNode( + params.pubKey, + targetNode + ); + log.error( + `loki_message: Too many successive failures trying to send to node ${ + targetNode.ip + }:${targetNode.port}, ${remainingSwarmSnodes.lengt} remaining swarm nodes` + ); return false; } - async openRetrieveConnection(stopPollingPromise, callback) { + async _openRetrieveConnection(stopPollingPromise, callback) { let stopPollingResult = false; + // When message_receiver restarts from onoffline/ononline events it closes // http-resources, which will then resolve the stopPollingPromise with true. We then // want to cancel these polling connections because new ones will be created + // eslint-disable-next-line more/no-then stopPollingPromise.then(result => { stopPollingResult = result; @@ -274,9 +281,13 @@ class LokiMessageAPI { ) { await sleepFor(successiveFailures * 1000); + // TODO: Revert back to using snode address instead of IP try { - // TODO: Revert back to using snode address instead of IP - let messages = await this.retrieveNextMessages(nodeData.ip, nodeData); + // in general, I think we want exceptions to bubble up + // so the user facing UI can report unhandled errors + // except in this case of living inside http-resource pollServer + // because it just restarts more connections... + let messages = await this._retrieveNextMessages(nodeData); // this only tracks retrieval failures // won't include parsing failures... successiveFailures = 0; @@ -296,7 +307,7 @@ class LokiMessageAPI { callback(messages); } catch (e) { log.warn( - 'Loki retrieve messages error:', + 'loki_message: retrieve error:', e.code, e.message, `on ${nodeData.ip}:${nodeData.port}` @@ -324,40 +335,49 @@ class LokiMessageAPI { } } if (successiveFailures >= MAX_ACCEPTABLE_FAILURES) { + const remainingSwarmSnodes = await lokiSnodeAPI.unreachableNode( + this.ourKey, + nodeData + ); log.warn( - `removing ${nodeData.ip}:${ + `loki_message: removing ${nodeData.ip}:${ nodeData.port } from our swarm pool. We have ${ Object.keys(this.ourSwarmNodes).length - } usable swarm nodes left` + } usable swarm nodes left (${ + remainingSwarmSnodes.length + } in local db)` ); - await lokiSnodeAPI.unreachableNode(this.ourKey, address); } } // if not stopPollingResult if (_.isEmpty(this.ourSwarmNodes)) { log.error( - 'We no longer have any swarm nodes available to try in pool, closing retrieve connection' + 'loki_message: We no longer have any swarm nodes available to try in pool, closing retrieve connection' ); return false; } return true; } - async retrieveNextMessages(nodeUrl, nodeData) { + // we don't throw or catch here + // mark private (_ prefix) since no error handling is done here... + async _retrieveNextMessages(nodeData) { const params = { pubKey: this.ourKey, lastHash: nodeData.lastHash || '', }; const options = { timeout: 40000, + ourPubKey: this.ourKey, headers: { [LOKI_LONGPOLL_HEADER]: true, }, }; + // let exceptions bubble up const result = await lokiRpc( - `https://${nodeUrl}`, + `https://${nodeData.ip}`, nodeData.port, 'retrieve', params, @@ -365,34 +385,39 @@ class LokiMessageAPI { '/storage_rpc/v1', nodeData ); + return result.messages || []; } + // we don't throw or catch here async startLongPolling(numConnections, stopPolling, callback) { - log.info('startLongPolling for', numConnections, 'connections'); this.ourSwarmNodes = {}; + // load from local DB let nodes = await lokiSnodeAPI.getSwarmNodesForPubKey(this.ourKey); - log.info('swarmNodes', nodes.length, 'for', this.ourKey); - Object.keys(nodes).forEach(j => { - const node = nodes[j]; - log.info(`${j} ${node.ip}:${node.port}`); - }); if (nodes.length < numConnections) { log.warn( - 'Not enough SwarmNodes for our pubkey in local database, getting current list from blockchain' + 'loki_message: Not enough SwarmNodes for our pubkey in local database, getting current list from blockchain' ); + // load from blockchain nodes = await lokiSnodeAPI.refreshSwarmNodesForPubKey(this.ourKey); if (nodes.length < numConnections) { log.error( - 'Could not get enough SwarmNodes for our pubkey from blockchain' + 'loki_message: Could not get enough SwarmNodes for our pubkey from blockchain' ); } } log.info( - `There are currently ${ - nodes.length - } swarmNodes for pubKey in our local database` + 'loki_message: startLongPolling for', + numConnections, + 'connections. We have swarmNodes', + nodes.length, + 'for', + this.ourKey ); + Object.keys(nodes).forEach(j => { + const node = nodes[j]; + log.info(`loki_message: ${j} ${node.ip}:${node.port}`); + }); for (let i = 0; i < nodes.length; i += 1) { const lastHash = await window.Signal.Data.getLastHashBySnode( @@ -406,15 +431,28 @@ class LokiMessageAPI { const promises = []; + let unresolved = numConnections; for (let i = 0; i < numConnections; i += 1) { - promises.push(this.openRetrieveConnection(stopPolling, callback)); + promises.push( + // eslint-disable-next-line more/no-then + this._openRetrieveConnection(stopPolling, callback).then(() => { + unresolved -= 1; + log.info( + 'loki_message: There are', + unresolved, + 'open retrieve connections left' + ); + }) + ); } // blocks until numConnections snodes in our swarms have been removed from the list // less than numConnections being active is fine, only need to restart if none per Niels 20/02/13 // or if there is network issues (ENOUTFOUND due to lokinet) await Promise.all(promises); - log.error('All our long poll swarm connections have been removed'); + log.error( + 'loki_message: All our long poll swarm connections have been removed' + ); // should we just call ourself again? // no, our caller already handles this... } From 9a01317e969fcb9eb837437f91c36d9110ef244d Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:34:02 -0700 Subject: [PATCH 05/16] log error --- js/signal_protocol_store.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/js/signal_protocol_store.js b/js/signal_protocol_store.js index 631433d81..a50a9f86f 100644 --- a/js/signal_protocol_store.js +++ b/js/signal_protocol_store.js @@ -223,7 +223,7 @@ if (item) { return item.value; } - + window.log.error('Could not load identityKey from SignalData'); return undefined; }, async getLocalRegistrationId() { From a00aa7371517b85839c7a044ab68a6b0992e330c Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:38:13 -0700 Subject: [PATCH 06/16] disconnect even if it's been stopped before, logging improvements --- libtextsecure/http-resources.js | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-) diff --git a/libtextsecure/http-resources.js b/libtextsecure/http-resources.js index 04de289cd..02d647ef5 100644 --- a/libtextsecure/http-resources.js +++ b/libtextsecure/http-resources.js @@ -84,6 +84,8 @@ }; this.pollServer = async () => { + // bg.connect calls mr connect after storage system is ready + window.log.info('http-resource pollServer start'); // This blocking call will return only when all attempts // at reaching snodes are exhausted or a DNS error occured try { @@ -93,25 +95,30 @@ messages => { connected = true; messages.forEach(message => { - const { data } = message; - this.handleMessage(data); + this.handleMessage(message.data); }); } ); } catch (e) { // we'll try again anyway - window.log.error('http-resource pollServer error', e.code, e.message); + window.log.error( + 'http-resource pollServer error', + e.code, + e.message, + e.stack + ); } + connected = false; if (this.calledStop) { + // don't restart return; } - connected = false; // Exhausted all our snodes urls, trying again later from scratch setTimeout(() => { window.log.info( - `Exhausted all our snodes urls, trying again in ${EXHAUSTED_SNODES_RETRY_DELAY / + `http-resource: Exhausted all our snodes urls, trying again in ${EXHAUSTED_SNODES_RETRY_DELAY / 1000}s from scratch` ); this.pollServer(); From 2d76b1eda9b7ec4c000b458a8dd451a089cbffeb Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:38:42 -0700 Subject: [PATCH 07/16] .loki support improvement --- js/modules/loki_public_chat_api.js | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/js/modules/loki_public_chat_api.js b/js/modules/loki_public_chat_api.js index 89fbc7abf..3852a54cc 100644 --- a/js/modules/loki_public_chat_api.js +++ b/js/modules/loki_public_chat_api.js @@ -27,16 +27,18 @@ class LokiPublicChatFactoryAPI extends EventEmitter { static async validServer(serverUrl) { // test to make sure it's online (and maybe has a valid SSL cert) try { + const url = new URL(serverUrl); // allow .loki (may only need an agent but not sure // until we have a .loki to test with) - if (serverUrl.match(/\.loki$/)) { - process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0'; - } + process.env.NODE_TLS_REJECT_UNAUTHORIZED = url.host.match(/\.loki$/i) + ? '0' + : '1'; + // FIXME: use proxy when we have open groups that work with proxy await nodeFetch(serverUrl); process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1'; // const txt = await res.text(); } catch (e) { - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1; + process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1'; log.warn(`failing to created ${serverUrl}`, e.code, e.message); // bail out if not valid enough return false; From 07ce97aa560e803d761506c5002186d8cb1e3fa9 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:40:48 -0700 Subject: [PATCH 08/16] serverRequest/sendToProxy refactor, start messagesPollLock implementation, improve logging --- js/modules/loki_app_dot_net_api.js | 600 ++++++++++++++++------------- 1 file changed, 333 insertions(+), 267 deletions(-) diff --git a/js/modules/loki_app_dot_net_api.js b/js/modules/loki_app_dot_net_api.js index 70ff7e8a1..d26ec16b3 100644 --- a/js/modules/loki_app_dot_net_api.js +++ b/js/modules/loki_app_dot_net_api.js @@ -14,6 +14,13 @@ const PUBLICCHAT_DELETION_POLL_EVERY = 5 * 1000; // 5s const PUBLICCHAT_MOD_POLL_EVERY = 30 * 1000; // 30s const PUBLICCHAT_MIN_TIME_BETWEEN_DUPLICATE_MESSAGES = 10 * 1000; // 10s +const FILESERVER_HOSTS = [ + 'file-dev.lokinet.org', + 'file.lokinet.org', + 'file-dev.getsession.org', + 'file.getsession.org', +]; + const HOMESERVER_USER_ANNOTATION_TYPE = 'network.loki.messenger.homeserver'; const AVATAR_USER_ANNOTATION_TYPE = 'network.loki.messenger.avatar'; const SETTINGS_CHANNEL_ANNOTATION_TYPE = 'net.patter-app.settings'; @@ -25,6 +32,290 @@ const snodeHttpsAgent = new https.Agent({ rejectUnauthorized: false, }); +const sendToProxy = async ( + srvPubKey, + endpoint, + pFetchOptions, + options = {} +) => { + if (!srvPubKey) { + log.error( + 'loki_app_dot_net: sendToProxy called without a server public key' + ); + return {}; + } + const randSnode = await lokiSnodeAPI.getRandomSnodeAddress(); + const url = `https://${randSnode.ip}:${randSnode.port}/file_proxy`; + + const fetchOptions = pFetchOptions; // make lint happy + // safety issue with file server, just safer to have this + if (fetchOptions.headers === undefined) { + fetchOptions.headers = {}; + } + + const payloadObj = { + body: fetchOptions.body, // might need to b64 if binary... + endpoint, + method: fetchOptions.method, + headers: fetchOptions.headers, + }; + + // from https://github.com/sindresorhus/is-stream/blob/master/index.js + if ( + payloadObj.body && + typeof payloadObj.body === 'object' && + typeof payloadObj.body.pipe === 'function' + ) { + const fData = payloadObj.body.getBuffer(); + const fHeaders = payloadObj.body.getHeaders(); + // update headers for boundary + payloadObj.headers = { ...payloadObj.headers, ...fHeaders }; + // update body with base64 chunk + payloadObj.body = { + fileUpload: fData.toString('base64'), + }; + } + + // convert our payload to binary buffer + const payloadData = Buffer.from( + dcodeIO.ByteBuffer.wrap(JSON.stringify(payloadObj)).toArrayBuffer() + ); + payloadObj.body = false; // free memory + + // make temporary key for this request/response + const ephemeralKey = libsignal.Curve.generateKeyPair(); + + // mix server pub key with our priv key + const symKey = libsignal.Curve.calculateAgreement( + srvPubKey, // server's pubkey + ephemeralKey.privKey // our privkey + ); + + const ivAndCiphertext = await libloki.crypto.DHEncrypt(symKey, payloadData); + + // convert final buffer to base64 + const cipherText64 = dcodeIO.ByteBuffer.wrap(ivAndCiphertext).toString( + 'base64' + ); + + const ephemeralPubKey64 = dcodeIO.ByteBuffer.wrap( + ephemeralKey.pubKey + ).toString('base64'); + + const finalRequestHeader = { + 'X-Loki-File-Server-Ephemeral-Key': ephemeralPubKey64, + }; + + const firstHopOptions = { + method: 'POST', + // not sure why I can't use anything but json... + // text/plain would be preferred... + body: JSON.stringify({ cipherText64 }), + headers: { + 'Content-Type': 'application/json', + 'X-Loki-File-Server-Target': '/loki/v1/secure_rpc', + 'X-Loki-File-Server-Verb': 'POST', + 'X-Loki-File-Server-Headers': JSON.stringify(finalRequestHeader), + }, + // we are talking to a snode... + agent: snodeHttpsAgent, + }; + // weird this doesn't need NODE_TLS_REJECT_UNAUTHORIZED = '0' + const result = await nodeFetch(url, firstHopOptions); + + const txtResponse = await result.text(); + if (txtResponse.match(/^Service node is not ready: not in any swarm/i)) { + // mark snode bad + const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable( + randSnode + ); + log.warn( + `loki_app_dot_net: Marking random snode bad, internet address ${ + randSnode.ip + }:${ + randSnode.port + }. ${randomPoolRemainingCount} snodes remaining in randomPool` + ); + // retry (hopefully with new snode) + // FIXME: max number of retries... + return sendToProxy(srvPubKey, endpoint, fetchOptions); + } + + let response = {}; + try { + response = JSON.parse(txtResponse); + } catch (e) { + log.warn( + `loki_app_dot_net: sendToProxy Could not parse outer JSON [${txtResponse}]`, + endpoint, + 'on', + url + ); + } + + if (response.meta && response.meta.code === 200) { + // convert base64 in response to binary + const ivAndCiphertextResponse = dcodeIO.ByteBuffer.wrap( + response.data, + 'base64' + ).toArrayBuffer(); + const decrypted = await libloki.crypto.DHDecrypt( + symKey, + ivAndCiphertextResponse + ); + const textDecoder = new TextDecoder(); + const respStr = textDecoder.decode(decrypted); + // replace response + try { + response = options.textResponse ? respStr : JSON.parse(respStr); + } catch (e) { + log.warn( + `loki_app_dot_net: sendToProxy Could not parse inner JSON [${respStr}]`, + endpoint, + 'on', + url + ); + } + } else { + log.warn( + 'loki_app_dot_net: file server secure_rpc gave an non-200 response: ', + response, + ` txtResponse[${txtResponse}]`, + endpoint + ); + } + return { result, txtResponse, response }; +}; + +const serverRequest = async (endpoint, options = {}) => { + const { + params = {}, + method, + rawBody, + objBody, + token, + srvPubKey, + forceFreshToken = false, + } = options; + + const url = new URL(endpoint); + if (params) { + url.search = new URLSearchParams(params); + } + const fetchOptions = {}; + const headers = {}; + try { + if (token) { + headers.Authorization = `Bearer ${token}`; + } + if (method) { + fetchOptions.method = method; + } + if (objBody) { + headers['Content-Type'] = 'application/json'; + fetchOptions.body = JSON.stringify(objBody); + } else if (rawBody) { + fetchOptions.body = rawBody; + } + fetchOptions.headers = headers; + + // domain ends in .loki + if (url.host.match(/\.loki$/i)) { + fetchOptions.agent = snodeHttpsAgent; + } + } catch (e) { + log.info('serverRequest set up error:', e.code, e.message); + return { + err: e, + }; + } + + let response; + let result; + let txtResponse; + let mode = 'nodeFetch'; + try { + const host = url.host.toLowerCase(); + // log.info('host', host, FILESERVER_HOSTS); + if ( + window.lokiFeatureFlags.useSnodeProxy && + FILESERVER_HOSTS.includes(host) + ) { + mode = 'sendToProxy'; + // strip trailing slash + const endpointWithQS = ( + url.pathname + (url.search ? '?' + url.search : '') + ).replace(/^\//, ''); + // log.info('endpointWithQS', endpointWithQS) + ({ response, txtResponse, result } = await sendToProxy( + srvPubKey, + endpointWithQS, + fetchOptions, + options + )); + } else { + // disable check for .loki + process.env.NODE_TLS_REJECT_UNAUTHORIZED = url.host.match(/\.loki$/i) + ? '0' + : '1'; + result = await nodeFetch(url, fetchOptions); + // always make sure this check is enabled + process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1'; + txtResponse = await result.text(); + // cloudflare timeouts (504s) will be html... + response = options.textResponse ? txtResponse : JSON.parse(txtResponse); + } + } catch (e) { + if (txtResponse) { + log.info( + `serverRequest ${mode} error`, + e.code, + e.message, + `json: ${txtResponse}`, + 'attempting connection to', + url + ); + } else { + log.info( + `serverRequest ${mode} error`, + e.code, + e.message, + 'attempting connection to', + url + ); + } + if (mode === '_sendToProxy') { + // if we can detect, certain types of failures, we can retry... + if (e.code === 'ECONNRESET') { + // retry with counter? + } + } + return { + err: e, + }; + } + // if it's a response style with a meta + if (result.status !== 200) { + if (!forceFreshToken && (!response.meta || response.meta.code === 401)) { + // copy options because lint complains if we modify this directly + const updatedOptions = options; + // force it this time + updatedOptions.forceFreshToken = true; + // retry with updated options + return this.serverRequest(endpoint, updatedOptions); + } + return { + err: 'statusCode', + statusCode: result.status, + response, + }; + } + return { + statusCode: result.status, + response, + }; +}; + // the core ADN class that handles all communication with a specific server class LokiAppDotNetServerAPI { constructor(ourKey, url) { @@ -394,276 +685,19 @@ class LokiAppDotNetServerAPI { if (urlStr.match(/\.loki\//)) { process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0'; } - const result = await nodeFetch(urlObj, fetchOptions, options); - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1; + const result = nodeFetch(urlObj, fetchOptions, options); + process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1'; return result; } - async _sendToProxy(endpoint, pFetchOptions, options = {}) { - const randSnode = await lokiSnodeAPI.getRandomSnodeAddress(); - const url = `https://${randSnode.ip}:${randSnode.port}/file_proxy`; - - const fetchOptions = pFetchOptions; // make lint happy - // safety issue with file server, just safer to have this - if (fetchOptions.headers === undefined) { - fetchOptions.headers = {}; - } - - const payloadObj = { - body: fetchOptions.body, // might need to b64 if binary... - endpoint, - method: fetchOptions.method, - headers: fetchOptions.headers, - }; - - // from https://github.com/sindresorhus/is-stream/blob/master/index.js - if ( - payloadObj.body && - typeof payloadObj.body === 'object' && - typeof payloadObj.body.pipe === 'function' - ) { - log.info('detected body is a stream'); - const fData = payloadObj.body.getBuffer(); - const fHeaders = payloadObj.body.getHeaders(); - // update headers for boundary - payloadObj.headers = { ...payloadObj.headers, ...fHeaders }; - // update body with base64 chunk - payloadObj.body = { - fileUpload: fData.toString('base64'), - }; - } - - // convert our payload to binary buffer - const payloadData = Buffer.from( - dcodeIO.ByteBuffer.wrap(JSON.stringify(payloadObj)).toArrayBuffer() - ); - payloadObj.body = false; // free memory - - // make temporary key for this request/response - const ephemeralKey = libsignal.Curve.generateKeyPair(); - - // mix server pub key with our priv key - const symKey = libsignal.Curve.calculateAgreement( - this.pubKey, // server's pubkey - ephemeralKey.privKey // our privkey - ); - - const ivAndCiphertext = await libloki.crypto.DHEncrypt(symKey, payloadData); - - // convert final buffer to base64 - const cipherText64 = dcodeIO.ByteBuffer.wrap(ivAndCiphertext).toString( - 'base64' - ); - - const ephemeralPubKey64 = dcodeIO.ByteBuffer.wrap( - ephemeralKey.pubKey - ).toString('base64'); - - const finalRequestHeader = { - 'X-Loki-File-Server-Ephemeral-Key': ephemeralPubKey64, - }; - - const firstHopOptions = { - method: 'POST', - // not sure why I can't use anything but json... - // text/plain would be preferred... - body: JSON.stringify({ cipherText64 }), - headers: { - 'Content-Type': 'application/json', - 'X-Loki-File-Server-Target': '/loki/v1/secure_rpc', - 'X-Loki-File-Server-Verb': 'POST', - 'X-Loki-File-Server-Headers': JSON.stringify(finalRequestHeader), - }, - // we are talking to a snode... - agent: snodeHttpsAgent, - }; - // weird this doesn't need NODE_TLS_REJECT_UNAUTHORIZED = 0 - const result = await nodeFetch(url, firstHopOptions); - - const txtResponse = await result.text(); - if (txtResponse.match(/^Service node is not ready: not in any swarm/i)) { - // mark snode bad - log.warn( - `Marking random snode bad, internet address ${randSnode.ip}:${ - randSnode.port - }` - ); - lokiSnodeAPI.markRandomNodeUnreachable(randSnode); - // retry (hopefully with new snode) - // FIXME: max number of retries... - return this._sendToProxy(endpoint, fetchOptions); - } - - let response = {}; - try { - response = JSON.parse(txtResponse); - } catch (e) { - log.warn( - `_sendToProxy Could not parse outer JSON [${txtResponse}]`, - endpoint - ); - } - - if (response.meta && response.meta.code === 200) { - // convert base64 in response to binary - const ivAndCiphertextResponse = dcodeIO.ByteBuffer.wrap( - response.data, - 'base64' - ).toArrayBuffer(); - const decrypted = await libloki.crypto.DHDecrypt( - symKey, - ivAndCiphertextResponse - ); - const textDecoder = new TextDecoder(); - const respStr = textDecoder.decode(decrypted); - // replace response - try { - response = options.textResponse ? respStr : JSON.parse(respStr); - } catch (e) { - log.warn( - `_sendToProxy Could not parse inner JSON [${respStr}]`, - endpoint - ); - } - } else { - log.warn( - 'file server secure_rpc gave an non-200 response: ', - response, - ` txtResponse[${txtResponse}]`, - endpoint - ); - } - return { result, txtResponse, response }; - } - // make a request to the server async serverRequest(endpoint, options = {}) { - const { - params = {}, - method, - rawBody, - objBody, - forceFreshToken = false, - } = options; - - const url = new URL(`${this.baseServerUrl}/${endpoint}`); - if (params) { - url.search = new URLSearchParams(params); - } - const fetchOptions = {}; - const headers = {}; - try { - if (forceFreshToken) { - await this.getOrRefreshServerToken(true); - } - if (this.token) { - headers.Authorization = `Bearer ${this.token}`; - } - if (method) { - fetchOptions.method = method; - } - if (objBody) { - headers['Content-Type'] = 'application/json'; - fetchOptions.body = JSON.stringify(objBody); - } else if (rawBody) { - fetchOptions.body = rawBody; - } - fetchOptions.headers = headers; - - // domain ends in .loki - if (url.toString().match(/\.loki\//)) { - fetchOptions.agent = snodeHttpsAgent; - } - } catch (e) { - log.info('serverRequest set up error:', e.code, e.message); - return { - err: e, - }; - } - - let response; - let result; - let txtResponse; - let mode = 'nodeFetch'; - try { - if ( - window.lokiFeatureFlags.useSnodeProxy && - (this.baseServerUrl === 'https://file-dev.lokinet.org' || - this.baseServerUrl === 'https://file.lokinet.org' || - this.baseServerUrl === 'https://file-dev.getsession.org' || - this.baseServerUrl === 'https://file.getsession.org') - ) { - mode = '_sendToProxy'; - - const endpointWithQS = url - .toString() - .replace(`${this.baseServerUrl}/`, ''); - ({ response, txtResponse, result } = await this._sendToProxy( - endpointWithQS, - fetchOptions, - options - )); - } else { - // disable check for .loki - if (url.toString().match(/\.loki/)) { - process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0'; - } - result = await nodeFetch(url, fetchOptions); - // always make sure this check is enabled - process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1; - txtResponse = await result.text(); - // hrm cloudflare timeouts (504s) will be html... - response = options.textResponse ? txtResponse : JSON.parse(txtResponse); - } - } catch (e) { - if (txtResponse) { - log.info( - `serverRequest ${mode} error`, - e.code, - e.message, - `json: ${txtResponse}`, - 'attempting connection to', - url - ); - } else { - log.info( - `serverRequest ${mode} error`, - e.code, - e.message, - 'attempting connection to', - url - ); - } - if (mode === '_sendToProxy') { - // if we can detect, certain types of failures, we can retry... - if (e.code === 'ECONNRESET') { - // retry with counter? - } - } - return { - err: e, - }; + options.token = this.token; + options.srvPubKey = this.pubKey; + if (options.forceFreshToken) { + await this.getOrRefreshServerToken(true); } - // if it's a response style with a meta - if (result.status !== 200) { - if (!forceFreshToken && (!response.meta || response.meta.code === 401)) { - // copy options because lint complains if we modify this directly - const updatedOptions = options; - // force it this time - updatedOptions.forceFreshToken = true; - // retry with updated options - return this.serverRequest(endpoint, updatedOptions); - } - return { - err: 'statusCode', - statusCode: result.status, - response, - }; - } - return { - statusCode: result.status, - response, - }; + return serverRequest(`${this.baseServerUrl}/${endpoint}`, options); } async getUserAnnotations(pubKey) { @@ -946,6 +980,8 @@ class LokiPublicChannelAPI { this.deleteLastId = 1; this.timers = {}; this.myPrivateKey = false; + this.messagesPollLock = false; + // can escalated to SQL if it start uses too much memory this.logMop = {}; @@ -1322,7 +1358,6 @@ class LokiPublicChannelAPI { Conversation: Whisper.Conversation, } ); - await this.pollForChannelOnce(); } // get moderation actions @@ -1523,6 +1558,20 @@ class LokiPublicChannelAPI { } async pollOnceForMessages() { + if (this.messagesPollLock) { + // TODO: check if lock is stale + log.warn( + 'pollOnceForModerators locked', + 'on', + this.channelId, + 'at', + this.serverAPI.baseServerUrl + ); + return; + } + // disable locking system for now as it's not quite perfect yet + // this.messagesPollLock = Date.now(); + const params = { include_annotations: 1, include_user_annotations: 1, // to get the home server @@ -1551,6 +1600,7 @@ class LokiPublicChannelAPI { if (res.err) { log.error('pollOnceForMessages receive error', res.err); } + this.messagesPollLock = false; return; } @@ -1706,6 +1756,7 @@ class LokiPublicChannelAPI { // do we really need this? if (!pendingMessages.length) { this.conversation.setLastRetrievedMessage(this.lastGot); + this.messagesPollLock = false; return; } @@ -1755,7 +1806,14 @@ class LokiPublicChannelAPI { ); sendNow.forEach(message => { // send them out now - log.info('emitting primary message', message.serverId); + log.info( + 'emitting primary message', + message.serverId, + 'on', + this.channelId, + 'at', + this.serverAPI.baseServerUrl + ); this.chatAPI.emit('publicMessage', { message, }); @@ -1832,7 +1890,14 @@ class LokiPublicChannelAPI { return; } } - log.info('emitting pending message', message.serverId); + log.info( + 'emitting pending message', + message.serverId, + 'on', + this.channelId, + 'at', + this.serverAPI.baseServerUrl + ); this.chatAPI.emit('publicMessage', { message, }); @@ -1854,6 +1919,7 @@ class LokiPublicChannelAPI { // finally update our position this.conversation.setLastRetrievedMessage(this.lastGot); + this.messagesPollLock = false; } static getPreviewFromAnnotation(annotation) { From e66e30bb0b3f374a394a5b662b8dc6f0c8520028 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:52:09 -0700 Subject: [PATCH 09/16] URL for lint --- js/modules/loki_public_chat_api.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/js/modules/loki_public_chat_api.js b/js/modules/loki_public_chat_api.js index 3852a54cc..a92a7b31d 100644 --- a/js/modules/loki_public_chat_api.js +++ b/js/modules/loki_public_chat_api.js @@ -1,4 +1,4 @@ -/* global log, window, process */ +/* global log, window, process, URL */ const EventEmitter = require('events'); const nodeFetch = require('node-fetch'); const LokiAppDotNetAPI = require('./loki_app_dot_net_api'); From 8d4be4cb0b4e69da9c2b9e79dd0865170fed0145 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Wed, 18 Mar 2020 17:52:25 -0700 Subject: [PATCH 10/16] lint --- js/modules/loki_app_dot_net_api.js | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/js/modules/loki_app_dot_net_api.js b/js/modules/loki_app_dot_net_api.js index d26ec16b3..2f70a9a64 100644 --- a/js/modules/loki_app_dot_net_api.js +++ b/js/modules/loki_app_dot_net_api.js @@ -243,9 +243,8 @@ const serverRequest = async (endpoint, options = {}) => { ) { mode = 'sendToProxy'; // strip trailing slash - const endpointWithQS = ( - url.pathname + (url.search ? '?' + url.search : '') - ).replace(/^\//, ''); + const search = url.search ? `?${url.search}` : ''; + const endpointWithQS = `${url.pathname}${search}`.replace(/^\//, ''); // log.info('endpointWithQS', endpointWithQS) ({ response, txtResponse, result } = await sendToProxy( srvPubKey, @@ -691,7 +690,8 @@ class LokiAppDotNetServerAPI { } // make a request to the server - async serverRequest(endpoint, options = {}) { + async serverRequest(endpoint, pOptions = {}) { + const options = pOptions; options.token = this.token; options.srvPubKey = this.pubKey; if (options.forceFreshToken) { From 6bdc269081fa69783c436cc2693b304bbb8f7b44 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Thu, 19 Mar 2020 14:22:19 -0700 Subject: [PATCH 11/16] include function name in log message --- js/modules/loki_message_api.js | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/js/modules/loki_message_api.js b/js/modules/loki_message_api.js index 838bc5ef6..a94f8a605 100644 --- a/js/modules/loki_message_api.js +++ b/js/modules/loki_message_api.js @@ -152,7 +152,7 @@ class LokiMessageAPI { 'Ran out of swarm nodes to query' ); } - log.info(`loki_message: Successfully stored message to ${pubKey}`); + log.info(`loki_message:::sendMessage - Successfully stored message to ${pubKey}`); } async refreshSendingSwarm(pubKey, timestamp) { @@ -216,7 +216,7 @@ class LokiMessageAPI { return true; } catch (e) { log.warn( - 'loki_message: send error:', + 'loki_message:::_sendToNode - send error:', e.code, e.message, `destination ${targetNode.ip}:${targetNode.port}` @@ -236,12 +236,12 @@ class LokiMessageAPI { } else if (e instanceof textsecure.NotFoundError) { // TODO: Handle resolution error } else if (e instanceof textsecure.TimestampError) { - log.warn('loki_message: Timestamp is invalid'); + log.warn('loki_message:::_sendToNode - Timestamp is invalid'); throw e; } else if (e instanceof textsecure.HTTPError) { // TODO: Handle working connection but error response const body = await e.response.text(); - log.warn('loki_message: HTTPError body:', body); + log.warn('loki_message:::_sendToNode - HTTPError body:', body); } successiveFailures += 1; } @@ -251,7 +251,7 @@ class LokiMessageAPI { targetNode ); log.error( - `loki_message: Too many successive failures trying to send to node ${ + `loki_message:::_sendToNode - Too many successive failures trying to send to node ${ targetNode.ip }:${targetNode.port}, ${remainingSwarmSnodes.lengt} remaining swarm nodes` ); @@ -307,7 +307,7 @@ class LokiMessageAPI { callback(messages); } catch (e) { log.warn( - 'loki_message: retrieve error:', + 'loki_message:::_openRetrieveConnection - retrieve error:', e.code, e.message, `on ${nodeData.ip}:${nodeData.port}` @@ -340,7 +340,7 @@ class LokiMessageAPI { nodeData ); log.warn( - `loki_message: removing ${nodeData.ip}:${ + `loki_message:::_openRetrieveConnection - too many successive failures, removing ${nodeData.ip}:${ nodeData.port } from our swarm pool. We have ${ Object.keys(this.ourSwarmNodes).length @@ -353,7 +353,7 @@ class LokiMessageAPI { // if not stopPollingResult if (_.isEmpty(this.ourSwarmNodes)) { log.error( - 'loki_message: We no longer have any swarm nodes available to try in pool, closing retrieve connection' + 'loki_message:::_openRetrieveConnection - We no longer have any swarm nodes available to try in pool, closing retrieve connection' ); return false; } @@ -396,18 +396,18 @@ class LokiMessageAPI { let nodes = await lokiSnodeAPI.getSwarmNodesForPubKey(this.ourKey); if (nodes.length < numConnections) { log.warn( - 'loki_message: Not enough SwarmNodes for our pubkey in local database, getting current list from blockchain' + 'loki_message:::startLongPolling - Not enough SwarmNodes for our pubkey in local database, getting current list from blockchain' ); // load from blockchain nodes = await lokiSnodeAPI.refreshSwarmNodesForPubKey(this.ourKey); if (nodes.length < numConnections) { log.error( - 'loki_message: Could not get enough SwarmNodes for our pubkey from blockchain' + 'loki_message:::startLongPolling - Could not get enough SwarmNodes for our pubkey from blockchain' ); } } log.info( - 'loki_message: startLongPolling for', + 'loki_message:::startLongPolling - start polling for', numConnections, 'connections. We have swarmNodes', nodes.length, @@ -438,7 +438,7 @@ class LokiMessageAPI { this._openRetrieveConnection(stopPolling, callback).then(() => { unresolved -= 1; log.info( - 'loki_message: There are', + 'loki_message:::startLongPolling - There are', unresolved, 'open retrieve connections left' ); @@ -451,7 +451,7 @@ class LokiMessageAPI { // or if there is network issues (ENOUTFOUND due to lokinet) await Promise.all(promises); log.error( - 'loki_message: All our long poll swarm connections have been removed' + 'loki_message:::startLongPolling - All our long poll swarm connections have been removed' ); // should we just call ourself again? // no, our caller already handles this... From 99679741c148d1ce653289fddf344bb27cb9fb87 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Thu, 19 Mar 2020 14:23:23 -0700 Subject: [PATCH 12/16] some renames, improve refresh random pool failures better --- js/modules/loki_snode_api.js | 192 ++++++++++++++++++++--------------- 1 file changed, 110 insertions(+), 82 deletions(-) diff --git a/js/modules/loki_snode_api.js b/js/modules/loki_snode_api.js index 9f3efcb76..1b78cd6a3 100644 --- a/js/modules/loki_snode_api.js +++ b/js/modules/loki_snode_api.js @@ -1,10 +1,12 @@ /* eslint-disable class-methods-use-this */ -/* global window, ConversationController, _, log */ +/* global window, ConversationController, _, log, clearTimeout */ const is = require('@sindresorhus/is'); const { lokiRpc } = require('./loki_rpc'); -const RANDOM_SNODES_TO_USE = 3; +const RANDOM_SNODES_TO_USE_FOR_PUBKEY_SWARM = 3; +const RANDOM_SNODES_POOL_SIZE = 1024; +const SEED_NODE_RETRIES = 3; class LokiSnodeAPI { constructor({ serverUrl, localUrl }) { @@ -15,14 +17,14 @@ class LokiSnodeAPI { this.localUrl = localUrl; // localhost.loki this.randomSnodePool = []; this.swarmsPendingReplenish = {}; - this.initialiseRandomPoolPromise = false; + this.refreshRandomPoolPromise = false; } async getRandomSnodeAddress() { /* resolve random snode */ if (this.randomSnodePool.length === 0) { // allow exceptions to pass through upwards - await this.initialiseRandomPool(); + await this.refreshRandomPool(); } if (this.randomSnodePool.length === 0) { throw new window.textsecure.SeedNodeError('Invalid seed node response'); @@ -32,85 +34,110 @@ class LokiSnodeAPI { ]; } - async initialiseRandomPool( - seedNodes = [...window.seedNodeList], - consecutiveErrors = 0 + + async refreshRandomPool( + seedNodes = [...window.seedNodeList] ) { // if currently not in progress - if (this.initialiseRandomPoolPromise === false) { - // FIXME: add timeout + if (this.refreshRandomPoolPromise === false) { // set lock - this.initialiseRandomPoolPromise = new Promise(async resolve => { - const params = { - limit: 1024, - active_only: true, - fields: { - public_ip: true, - storage_port: true, - pubkey_x25519: true, - pubkey_ed25519: true, - }, - }; - const seedNode = seedNodes.splice( - Math.floor(Math.random() * seedNodes.length), - 1 - )[0]; - let snodes = []; - try { - log.info('loki_snodes: Refreshing random snode pool'); - const response = await lokiRpc( - `http://${seedNode.ip}`, - seedNode.port, - 'get_n_service_nodes', - params, - {}, // Options - '/json_rpc' // Seed request endpoint - ); - // Filter 0.0.0.0 nodes which haven't submitted uptime proofs - snodes = response.result.service_node_states.filter( - snode => snode.public_ip !== '0.0.0.0' - ); - this.randomSnodePool = snodes.map(snode => ({ - ip: snode.public_ip, - port: snode.storage_port, - pubkey_x25519: snode.pubkey_x25519, - pubkey_ed25519: snode.pubkey_ed25519, - })); - log.info( - 'loki_snodes: Refreshed random snode pool with', - this.randomSnodePool.length, - 'snodes' - ); - } catch (e) { - log.warn( - 'loki_snodes: initialiseRandomPool error', - e.code, - e.message - ); - if (consecutiveErrors < 3) { - // retry after a possible delay - setTimeout(() => { - log.info( - 'loki_snodes: Retrying initialising random snode pool, try #', - consecutiveErrors - ); - this.initialiseRandomPool(seedNodes, consecutiveErrors + 1); - }, consecutiveErrors * consecutiveErrors * 5000); - } else { - log.error('loki_snodes: Giving up trying to contact seed node'); - if (snodes.length === 0) { - throw new window.textsecure.SeedNodeError( - 'Failed to contact seed node' - ); + this.refreshRandomPoolPromise = new Promise(async (resolve, reject) => { + let timeoutTimer = null + // private retry container + const trySeedNode = async (consecutiveErrors = 0) => { + const params = { + limit: RANDOM_SNODES_POOL_SIZE, + active_only: true, + fields: { + public_ip: true, + storage_port: true, + pubkey_x25519: true, + pubkey_ed25519: true, + }, + }; + const seedNode = seedNodes.splice( + Math.floor(Math.random() * seedNodes.length), + 1 + )[0]; + let snodes = []; + try { + log.info('loki_snodes:::refreshRandomPoolPromise - Refreshing random snode pool'); + const response = await lokiRpc( + `http://${seedNode.ip}`, + seedNode.port, + 'get_n_service_nodes', + params, + {}, // Options + '/json_rpc' // Seed request endpoint + ); + // Filter 0.0.0.0 nodes which haven't submitted uptime proofs + snodes = response.result.service_node_states.filter( + snode => snode.public_ip !== '0.0.0.0' + ); + this.randomSnodePool = snodes.map(snode => ({ + ip: snode.public_ip, + port: snode.storage_port, + pubkey_x25519: snode.pubkey_x25519, + pubkey_ed25519: snode.pubkey_ed25519, + })); + log.info( + 'loki_snodes:::refreshRandomPoolPromise - Refreshed random snode pool with', + this.randomSnodePool.length, + 'snodes' + ); + // clear lock + this.refreshRandomPoolPromise = null; + if (timeoutTimer !== null) { + clearTimeout(timeoutTimer); + timeoutTimer = null; + } + resolve(); + } catch (e) { + log.warn( + 'loki_snodes:::refreshRandomPoolPromise - error', + e.code, + e.message + ); + if (consecutiveErrors < SEED_NODE_RETRIES) { + // retry after a possible delay + setTimeout(() => { + log.info( + 'loki_snodes:::refreshRandomPoolPromise - Retrying initialising random snode pool, try #', + consecutiveErrors + ); + trySeedNode(consecutiveErrors + 1); + }, consecutiveErrors * consecutiveErrors * 5000); + } else { + log.error('loki_snodes:::refreshRandomPoolPromise - Giving up trying to contact seed node'); + if (snodes.length === 0) { + this.refreshRandomPoolPromise = null; // clear lock + if (timeoutTimer !== null) { + clearTimeout(timeoutTimer); + timeoutTimer = null; + } + reject() + } } } } - // clear lock - this.initialiseRandomPoolPromise = null; - resolve(); + const delay = (SEED_NODE_RETRIES + 1) * (SEED_NODE_RETRIES + 1) * 5000; + timeoutTimer = setTimeout(() => { + log.warn('loki_snodes:::refreshRandomPoolPromise - TIMEDOUT after', delay, 's'); + reject(); + }, delay); + trySeedNode() }); } - await this.initialiseRandomPoolPromise; + try { + await this.refreshRandomPoolPromise; + } catch(e) { + // we will throw for each time initialiseRandomPool has been called in parallel + log.error('loki_snodes:::refreshRandomPoolPromise - error', e.code, e.message); + throw new window.textsecure.SeedNodeError( + 'Failed to contact seed node' + ); + } + log.info('loki_snodes:::refreshRandomPoolPromise - RESOLVED') } // unreachableNode.url is like 9hrje1bymy7hu6nmtjme9idyu3rm8gr3mkstakjyuw1997t7w4ny.snode @@ -119,7 +146,7 @@ class LokiSnodeAPI { const swarmNodes = [...conversation.get('swarmNodes')]; if (typeof unreachableNode === 'string') { log.warn( - 'loki_snodes::unreachableNode: String passed as unreachableNode to unreachableNode' + 'loki_snodes:::unreachableNode - String passed as unreachableNode to unreachableNode' ); return swarmNodes; } @@ -137,7 +164,7 @@ class LokiSnodeAPI { }); if (!found) { log.warn( - `loki_snodes::unreachableNode snode ${unreachableNode.ip}:${ + `loki_snodes:::unreachableNode - snode ${unreachableNode.ip}:${ unreachableNode.port } has already been marked as bad` ); @@ -196,7 +223,7 @@ class LokiSnodeAPI { try { newSwarmNodes = await this.getSwarmNodes(pubKey); } catch (e) { - log.error('loki_snodes: getFreshSwarmNodes error', e.code, e.message); + log.error('loki_snodes:::getFreshSwarmNodes - error', e.code, e.message); // TODO: Handle these errors sensibly newSwarmNodes = []; } @@ -223,7 +250,7 @@ class LokiSnodeAPI { ); if (!result) { log.warn( - `getSnodesForPubkey lokiRpc on ${snode.ip}:${ + `loki_snode:::getSnodesForPubkey - lokiRpc on ${snode.ip}:${ snode.port } returned falsish value`, result @@ -231,8 +258,9 @@ class LokiSnodeAPI { return []; } if (!result.snodes) { + // we hit this when snode gives 500s log.warn( - `getSnodesForPubkey lokiRpc on ${snode.ip}:${ + `loki_snode:::getSnodesForPubkey - lokiRpc on ${snode.ip}:${ snode.port } returned falsish value for snodes`, result @@ -244,7 +272,7 @@ class LokiSnodeAPI { } catch (e) { const randomPoolRemainingCount = this.markRandomNodeUnreachable(snode); log.error( - 'loki_snodes: getSnodesForPubkey error', + 'loki_snodes:::getSnodesForPubkey - error', e.code, e.message, `for ${snode.ip}:${ @@ -257,7 +285,7 @@ class LokiSnodeAPI { async getSwarmNodes(pubKey) { const snodes = []; - const questions = [...Array(RANDOM_SNODES_TO_USE).keys()]; + const questions = [...Array(RANDOM_SNODES_TO_USE_FOR_PUBKEY_SWARM).keys()]; await Promise.all( questions.map(async () => { // allow exceptions to pass through upwards From 4bb2e83cb3d9eab00b314e499d80bd2e44865384 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Thu, 19 Mar 2020 15:04:36 -0700 Subject: [PATCH 13/16] lint --- js/modules/loki_message_api.js | 10 +++++--- js/modules/loki_snode_api.js | 45 +++++++++++++++++++++------------- 2 files changed, 34 insertions(+), 21 deletions(-) diff --git a/js/modules/loki_message_api.js b/js/modules/loki_message_api.js index a94f8a605..3035fc7a9 100644 --- a/js/modules/loki_message_api.js +++ b/js/modules/loki_message_api.js @@ -152,7 +152,9 @@ class LokiMessageAPI { 'Ran out of swarm nodes to query' ); } - log.info(`loki_message:::sendMessage - Successfully stored message to ${pubKey}`); + log.info( + `loki_message:::sendMessage - Successfully stored message to ${pubKey}` + ); } async refreshSendingSwarm(pubKey, timestamp) { @@ -340,9 +342,9 @@ class LokiMessageAPI { nodeData ); log.warn( - `loki_message:::_openRetrieveConnection - too many successive failures, removing ${nodeData.ip}:${ - nodeData.port - } from our swarm pool. We have ${ + `loki_message:::_openRetrieveConnection - too many successive failures, removing ${ + nodeData.ip + }:${nodeData.port} from our swarm pool. We have ${ Object.keys(this.ourSwarmNodes).length } usable swarm nodes left (${ remainingSwarmSnodes.length diff --git a/js/modules/loki_snode_api.js b/js/modules/loki_snode_api.js index 1b78cd6a3..061ecf2de 100644 --- a/js/modules/loki_snode_api.js +++ b/js/modules/loki_snode_api.js @@ -34,15 +34,12 @@ class LokiSnodeAPI { ]; } - - async refreshRandomPool( - seedNodes = [...window.seedNodeList] - ) { + async refreshRandomPool(seedNodes = [...window.seedNodeList]) { // if currently not in progress if (this.refreshRandomPoolPromise === false) { // set lock this.refreshRandomPoolPromise = new Promise(async (resolve, reject) => { - let timeoutTimer = null + let timeoutTimer = null; // private retry container const trySeedNode = async (consecutiveErrors = 0) => { const params = { @@ -61,7 +58,9 @@ class LokiSnodeAPI { )[0]; let snodes = []; try { - log.info('loki_snodes:::refreshRandomPoolPromise - Refreshing random snode pool'); + log.info( + 'loki_snodes:::refreshRandomPoolPromise - Refreshing random snode pool' + ); const response = await lokiRpc( `http://${seedNode.ip}`, seedNode.port, @@ -108,36 +107,44 @@ class LokiSnodeAPI { trySeedNode(consecutiveErrors + 1); }, consecutiveErrors * consecutiveErrors * 5000); } else { - log.error('loki_snodes:::refreshRandomPoolPromise - Giving up trying to contact seed node'); + log.error( + 'loki_snodes:::refreshRandomPoolPromise - Giving up trying to contact seed node' + ); if (snodes.length === 0) { this.refreshRandomPoolPromise = null; // clear lock if (timeoutTimer !== null) { clearTimeout(timeoutTimer); timeoutTimer = null; } - reject() + reject(); } } } - } + }; const delay = (SEED_NODE_RETRIES + 1) * (SEED_NODE_RETRIES + 1) * 5000; timeoutTimer = setTimeout(() => { - log.warn('loki_snodes:::refreshRandomPoolPromise - TIMEDOUT after', delay, 's'); + log.warn( + 'loki_snodes:::refreshRandomPoolPromise - TIMEDOUT after', + delay, + 's' + ); reject(); }, delay); - trySeedNode() + trySeedNode(); }); } try { await this.refreshRandomPoolPromise; - } catch(e) { + } catch (e) { // we will throw for each time initialiseRandomPool has been called in parallel - log.error('loki_snodes:::refreshRandomPoolPromise - error', e.code, e.message); - throw new window.textsecure.SeedNodeError( - 'Failed to contact seed node' + log.error( + 'loki_snodes:::refreshRandomPoolPromise - error', + e.code, + e.message ); + throw new window.textsecure.SeedNodeError('Failed to contact seed node'); } - log.info('loki_snodes:::refreshRandomPoolPromise - RESOLVED') + log.info('loki_snodes:::refreshRandomPoolPromise - RESOLVED'); } // unreachableNode.url is like 9hrje1bymy7hu6nmtjme9idyu3rm8gr3mkstakjyuw1997t7w4ny.snode @@ -223,7 +230,11 @@ class LokiSnodeAPI { try { newSwarmNodes = await this.getSwarmNodes(pubKey); } catch (e) { - log.error('loki_snodes:::getFreshSwarmNodes - error', e.code, e.message); + log.error( + 'loki_snodes:::getFreshSwarmNodes - error', + e.code, + e.message + ); // TODO: Handle these errors sensibly newSwarmNodes = []; } From d15445a1e07c5cb1204482d89b512024866a90e7 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Thu, 19 Mar 2020 21:09:42 -0700 Subject: [PATCH 14/16] don't create unneeded variables --- js/modules/loki_app_dot_net_api.js | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/js/modules/loki_app_dot_net_api.js b/js/modules/loki_app_dot_net_api.js index 2f70a9a64..fe2813df2 100644 --- a/js/modules/loki_app_dot_net_api.js +++ b/js/modules/loki_app_dot_net_api.js @@ -296,12 +296,11 @@ const serverRequest = async (endpoint, options = {}) => { // if it's a response style with a meta if (result.status !== 200) { if (!forceFreshToken && (!response.meta || response.meta.code === 401)) { - // copy options because lint complains if we modify this directly - const updatedOptions = options; - // force it this time - updatedOptions.forceFreshToken = true; - // retry with updated options - return this.serverRequest(endpoint, updatedOptions); + // retry with forcing a fresh token + return this.serverRequest(endpoint, { + ...options, + forceFreshToken: true, + }); } return { err: 'statusCode', @@ -690,14 +689,15 @@ class LokiAppDotNetServerAPI { } // make a request to the server - async serverRequest(endpoint, pOptions = {}) { - const options = pOptions; - options.token = this.token; - options.srvPubKey = this.pubKey; + async serverRequest(endpoint, options = {}) { if (options.forceFreshToken) { await this.getOrRefreshServerToken(true); } - return serverRequest(`${this.baseServerUrl}/${endpoint}`, options); + return serverRequest(`${this.baseServerUrl}/${endpoint}`, { + ...options, + token: this.token, + srvPubKey: this.pubKey, + }); } async getUserAnnotations(pubKey) { From 8bf77ce44f27b9f9efb179467ca7b7b6a43b3d40 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Thu, 19 Mar 2020 21:10:01 -0700 Subject: [PATCH 15/16] collapse difficulty branching --- js/modules/loki_message_api.js | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/js/modules/loki_message_api.js b/js/modules/loki_message_api.js index 3035fc7a9..c3ccf6ae8 100644 --- a/js/modules/loki_message_api.js +++ b/js/modules/loki_message_api.js @@ -209,12 +209,14 @@ class LokiMessageAPI { // Make sure we aren't doing too much PoW const currentDifficulty = window.storage.get('PoWDifficulty', null); - if (result && result.difficulty) { - const newDifficulty = result.difficulty; - if (newDifficulty != null && newDifficulty !== currentDifficulty) { - window.storage.put('PoWDifficulty', newDifficulty); - } - } // else should we return false? + if ( + result && + result.difficulty && + result.difficulty !== currentDifficulty + ) { + window.storage.put('PoWDifficulty', result.difficulty); + // should we return false? + } return true; } catch (e) { log.warn( From 7a0e972ca4ef878eb80a3fd772249b2cbc500487 Mon Sep 17 00:00:00 2001 From: Ryan Tharp Date: Thu, 19 Mar 2020 21:19:20 -0700 Subject: [PATCH 16/16] refactor getRandomPoolLength out of markRandomNodeUnreachable --- js/modules/loki_rpc.js | 10 ++++------ js/modules/loki_snode_api.js | 6 +++++- 2 files changed, 9 insertions(+), 7 deletions(-) diff --git a/js/modules/loki_rpc.js b/js/modules/loki_rpc.js index b27bca1a0..cb49b975b 100644 --- a/js/modules/loki_rpc.js +++ b/js/modules/loki_rpc.js @@ -73,9 +73,8 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { // remove // but which the proxy or the target... // we got a ton of randomPool nodes, let's just not worry about this one - const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable( - randSnode - ); + lokiSnodeAPI.markRandomNodeUnreachable(randSnode); + const randomPoolRemainingCount = lokiSnodeAPI.getRandomPoolLength(); log.warn( `lokiRpc sendToProxy`, `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ @@ -99,9 +98,8 @@ const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => { // but the target node // we got a ton of randomPool nodes, let's just not worry about this one - const randomPoolRemainingCount = lokiSnodeAPI.markRandomNodeUnreachable( - randSnode - ); + lokiSnodeAPI.markRandomNodeUnreachable(randSnode); + const randomPoolRemainingCount = lokiSnodeAPI.getRandomPoolLength(); log.warn( `lokiRpc sendToProxy`, `snode ${randSnode.ip}:${randSnode.port} to ${targetNode.ip}:${ diff --git a/js/modules/loki_snode_api.js b/js/modules/loki_snode_api.js index 061ecf2de..46b18b9ee 100644 --- a/js/modules/loki_snode_api.js +++ b/js/modules/loki_snode_api.js @@ -185,6 +185,9 @@ class LokiSnodeAPI { this.randomSnodePool, _.find(this.randomSnodePool, { ip: snode.ip, port: snode.port }) ); + } + + getRandomPoolLength() { return this.randomSnodePool.length; } @@ -281,7 +284,8 @@ class LokiSnodeAPI { const snodes = result.snodes.filter(tSnode => tSnode.ip !== '0.0.0.0'); return snodes; } catch (e) { - const randomPoolRemainingCount = this.markRandomNodeUnreachable(snode); + this.markRandomNodeUnreachable(snode); + const randomPoolRemainingCount = this.getRandomPoolLength(); log.error( 'loki_snodes:::getSnodesForPubkey - error', e.code,