v1.0.1 release.

Merge branch 'clearnet'
pull/1052/head v1.0.1
Mikunj Varsani 5 years ago
commit 7e68bc82a3

@ -0,0 +1,85 @@
# This script will build session production binaries anytime a branch is updated
name: Session Build Binaries
on:
push:
branches:
- master
- development
- clearnet
- github-actions
jobs:
build:
runs-on: ${{ matrix.os }}
strategy:
fail-fast: false
matrix:
os: [windows-2016, macos-latest, ubuntu-latest]
env:
SIGNAL_ENV: production
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
steps:
- name: Checkout git repo
uses: actions/checkout@v1
- name: Install node
uses: actions/setup-node@v1
with:
node-version: 10.13.0
- name: Setup node for windows
if: runner.os == 'Windows'
run: |
npm install --global --production windows-build-tools@4.0.0
npm install --global node-gyp@latest
npm config set python python2.7
npm config set msvs_version 2015
- name: Install yarn
run: npm install yarn --no-save
- name: Install Dependencies
run: yarn install --frozen-lockfile
- name: Generate and concat files
run: yarn generate
- name: Lint Files
run: yarn lint-full
- name: Build windows production binaries
if: runner.os == 'Windows'
run: node_modules\.bin\electron-builder --config.extraMetadata.environment=%SIGNAL_ENV% --publish=never --config.directories.output=release
- name: Build mac production binaries
if: runner.os == 'macOS'
run: $(yarn bin)/electron-builder --config.extraMetadata.environment=$SIGNAL_ENV --config.mac.bundleVersion=${{ github.ref }} --publish=never --config.directories.output=release
env:
CSC_LINK: ${{ secrets.MAC_CERTIFICATE }}
CSC_KEY_PASSWORD: ${{ secrets.MAC_CERTIFICATE_PASSWORD }}
SIGNING_APPLE_ID: ${{ secrets.SIGNING_APPLE_ID }}
SIGNING_APP_PASSWORD: ${{ secrets.SIGNING_APP_PASSWORD }}
SIGNING_TEAM_ID: ${{ secrets.SIGNING_TEAM_ID }}
- name: Build linux production binaries
if: runner.os == 'Linux'
run: $(yarn bin)/electron-builder --config.extraMetadata.environment=$SIGNAL_ENV --publish=never --config.directories.output=release
- name: Remove unpacked files
run: |
ls -d -- */ | xargs -I{} echo "Removing {}"
ls -d -- */ | xargs -I{} rm -rf {}
shell: bash
working-directory: ./release/
- name: Remaining files
run: ls .
shell: bash
working-directory: ./release/
- name: Upload Production Artifacts
uses: actions/upload-artifact@v1
with:
name: ${{ runner.OS }}-production
path: release

@ -0,0 +1,64 @@
# This script will build binaries and publish a draft on github release page with the the tag v[package-version]
name: Session Draft Release
on:
push:
branches:
- master
jobs:
build:
runs-on: ${{ matrix.os }}
strategy:
fail-fast: false
matrix:
os: [windows-2016, macos-latest, ubuntu-latest]
env:
SIGNAL_ENV: production
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
steps:
- name: Checkout git repo
uses: actions/checkout@v1
- name: Install node
uses: actions/setup-node@v1
with:
node-version: 10.13.0
- name: Setup node for windows
if: runner.os == 'Windows'
run: |
npm install --global --production windows-build-tools@4.0.0
npm install --global node-gyp@latest
npm config set python python2.7
npm config set msvs_version 2015
- name: Install yarn
run: npm install yarn --no-save
- name: Install Dependencies
run: yarn install --frozen-lockfile
- name: Generate and concat files
run: yarn generate
- name: Lint Files
run: yarn lint-full
- name: Build windows production binaries
if: runner.os == 'Windows'
run: node_modules\.bin\electron-builder --config.extraMetadata.environment=%SIGNAL_ENV% --publish=always
- name: Build mac production binaries
if: runner.os == 'macOS'
run: $(yarn bin)/electron-builder --config.extraMetadata.environment=$SIGNAL_ENV --config.mac.bundleVersion=${{ github.ref }} --publish=always
env:
CSC_LINK: ${{ secrets.MAC_CERTIFICATE }}
CSC_KEY_PASSWORD: ${{ secrets.MAC_CERTIFICATE_PASSWORD }}
SIGNING_APPLE_ID: ${{ secrets.SIGNING_APPLE_ID }}
SIGNING_APP_PASSWORD: ${{ secrets.SIGNING_APP_PASSWORD }}
SIGNING_TEAM_ID: ${{ secrets.SIGNING_TEAM_ID }}
- name: Build linux production binaries
if: runner.os == 'Linux'
run: $(yarn bin)/electron-builder --config.extraMetadata.environment=$SIGNAL_ENV --publish=always

@ -0,0 +1,42 @@
# Building
Building session binaries is done using github actions. Windows and linux binaries will build right out of the box but there are some extra steps needed for Mac OS
## Mac OS
The build script for Mac OS requires you to have a valid `Developer ID Application` certificate. Without this the build script cannot sign and notarize the mac binary which is needed for Catalina 10.15 and above.
If you would like to disable this then comment out `"afterSign": "build/notarize.js",` in package.json.
You will also need an [App-specific password](https://support.apple.com/en-al/HT204397) for the apple account you wish to notarize with
### Setup
Once you have your `Developer ID Application` you need to export it into a `.p12` file. Keep a note of the password used to encrypt this file as it will be needed later.
We need to Base64 encode this file, so run the following command:
```
base64 -i certificate.p12 -o encoded.txt
```
#### On GitHub:
1. Navigate to the main page of the repository.
2. Under your repository name, click **Settings**.
3. In the left sidebar, click **Secrets**.
4. Add the following secrets:
1. Certificate
* Name: `MAC_CERTIFICATE`
* Value: The encoded Base64 certificate
2. Certificate password
* Name: `MAC_CERTIFICATE_PASSWORD`
* Value: The password that was set when the certificate was exported.
3. Apple ID
* Name: `SIGNING_APPLE_ID`
* Value: The apple id (email) to use for signing
4. Apple Password
* Name: `SIGNING_APP_PASSWORD`
* Value: The app-specific password that was generated for the apple id
5. Team ID (Optional)
* Name: `SIGNING_TEAM_ID`
* Value: The apple team id if you're sigining the application for a team

@ -2,15 +2,11 @@
[![Build Status](https://travis-ci.org/loki-project/loki-messenger.svg?branch=development)](https://travis-ci.org/loki-project/loki-messenger)
Session allows for truly decentralized, end to end, and private encrypted chats. Session is built to handle both online and fully Asynchronous offline messages. Session implements the Signal protocol for message encryption. Our Client interface is a fork of [Signal Messenger](https://signal.org/). All communication that passes through Session is routed through [Lokinet](https://github.com/loki-project/loki-network).
Session allows for truly decentralized, end to end, and private encrypted chats. Session is built to handle both online and fully Asynchronous offline messages. Session implements the Signal protocol for message encryption. Our Client interface is a fork of [Signal Messenger](https://signal.org/).
## Summary
Session integrates directly with Loki [Service Nodes](https://lokidocs.com/ServiceNodes/SNOverview/), which are a set of distributed, decentralized and Sybil resistant nodes. Service Nodes act as both federated servers which store messages offline, and a set of nodes which allow for onion routing functionality obfuscating users IP Addresses. For a full understanding of how Session works, read the [Loki whitepaper](https://loki.network/whitepaper).
**Online Messages**
If Alice and Bob are both online they can simply resolve each others public keys, to introduction sets, this functionality is handled by interfacing with [Lokinet](https://github.com/loki-project/loki-network). With the appropriate introduction sets Alice and Bob can create a path and using onion routing pass messages through the Loki network without giving away personally identifiable information like their IP address.
Session integrates directly with Loki [Service Nodes](https://lokidocs.com/ServiceNodes/SNOverview/), which are a set of distributed, decentralized and Sybil resistant nodes. Service Nodes act as servers which store messages offline, and a set of nodes which allow for onion routing functionality obfuscating users IP Addresses. For a full understanding of how Session works, read the [Loki whitepaper](https://loki.network/whitepaper).
**Offline messages**

@ -2162,6 +2162,11 @@
"message": "Leave Closed Group",
"description": "Button action that the user can click to leave the group"
},
"leaveClosedGroupConfirmation": {
"message": "Leave this Closed Group?",
"description":
"Confirmation dialog text that tells the user what will happen if they leave the closed group."
},
"leaveGroupDialogTitle": {
"message": "Are you sure you want to leave this group?",
"description":

@ -901,7 +901,7 @@ async function updateToLokiSchemaVersion1(currentVersion, instance) {
id: 'rss://loki.network/feed/',
rssFeed: 'https://loki.network/feed/',
closable: true,
name: 'Loki.network News',
name: 'Loki News',
profileAvatar: 'images/session/session_chat_icon.png',
};
@ -910,7 +910,7 @@ async function updateToLokiSchemaVersion1(currentVersion, instance) {
id: 'rss://loki.network/category/messenger-updates/feed/',
rssFeed: 'https://loki.network/category/messenger-updates/feed/',
closable: false,
name: 'Messenger updates',
name: 'Session Updates',
profileAvatar: 'images/session/session_chat_icon.png',
};

@ -10,19 +10,36 @@ const { notarize } = require('electron-notarize');
Notarizing: https://kilianvalkhof.com/2019/electron/notarizing-your-electron-application/
*/
const log = msg => console.log(`\n${msg}`);
const isEmpty = v => !v || v.length === 0;
exports.default = async function notarizing(context) {
const { electronPlatformName, appOutDir } = context;
if (electronPlatformName !== 'darwin') {
return;
}
log('Notarizing mac application');
const appName = context.packager.appInfo.productFilename;
const {
SIGNING_APPLE_ID,
SIGNING_APP_PASSWORD,
SIGNING_TEAM_ID,
} = process.env;
if (isEmpty(SIGNING_APPLE_ID) || isEmpty(SIGNING_APP_PASSWORD)) {
log(
'SIGNING_APPLE_ID or SIGNING_APP_PASSWORD not set.\nTerminating noratization.'
);
return;
}
return notarize({
appBundleId: 'com.loki-project.messenger-desktop',
const options = {
appBundleId: 'org.getsession.desktop',
appPath: `${appOutDir}/${appName}.app`,
appleId: process.env.SIGNING_APPLE_ID,
appleIdPassword: process.env.SIGNING_APP_PASSWORD,
ascProvider: process.env.SIGNING_TEAM_ID,
});
appleId: SIGNING_APPLE_ID,
appleIdPassword: SIGNING_APP_PASSWORD,
};
if (!isEmpty(SIGNING_TEAM_ID)) options.ascProvider = SIGNING_TEAM_ID;
return notarize(options);
};

@ -763,9 +763,10 @@
const ev = new Event('group');
const ourKey = textsecure.storage.user.getNumber();
const allMembers = [ourKey, ...members];
const primaryDeviceKey =
window.storage.get('primaryDevicePubKey') ||
textsecure.storage.user.getNumber();
const allMembers = [primaryDeviceKey, ...members];
ev.groupDetails = {
id: groupId,
@ -794,7 +795,7 @@
window.friends.friendRequestStatusEnum.friends
);
convo.updateGroupAdmins([ourKey]);
convo.updateGroupAdmins([primaryDeviceKey]);
appView.openConversation(groupId, {});
};
@ -1059,6 +1060,7 @@
window.setMediaPermissions(!mediaPermissions);
};
// attempts a connection to an open group server
window.attemptConnection = async (serverURL, channelId) => {
let rawserverURL = serverURL
.replace(/^https?:\/\//i, '')
@ -2187,9 +2189,7 @@
},
});
} else {
window.log.verbose(
`Already seen session restore for pubkey: ${pubkey}`
);
window.log.debug(`Already seen session restore for pubkey: ${pubkey}`);
if (ev.confirm) {
ev.confirm();
}

@ -161,26 +161,32 @@
if (!conversation) {
return;
}
if (conversation.isPublic()) {
// Close group leaving
if (conversation.isClosedGroup()) {
await conversation.leaveGroup();
} else if (conversation.isPublic()) {
const channelAPI = await conversation.getPublicSendData();
if (channelAPI === null) {
log.warn(`Could not get API for public conversation ${id}`);
} else {
channelAPI.serverAPI.partChannel(channelAPI.channelId);
}
} else if (conversation.isPrivate()) {
const deviceIds = await textsecure.storage.protocol.getDeviceIds(id);
await Promise.all(
deviceIds.map(deviceId => {
const address = new libsignal.SignalProtocolAddress(id, deviceId);
const sessionCipher = new libsignal.SessionCipher(
textsecure.storage.protocol,
address
);
return sessionCipher.deleteAllSessionsForDevice();
})
);
}
await conversation.destroyMessages();
const deviceIds = await textsecure.storage.protocol.getDeviceIds(id);
await Promise.all(
deviceIds.map(deviceId => {
const address = new libsignal.SignalProtocolAddress(id, deviceId);
const sessionCipher = new libsignal.SessionCipher(
textsecure.storage.protocol,
address
);
return sessionCipher.deleteAllSessionsForDevice();
})
);
await window.Signal.Data.removeConversation(id, {
Conversation: Whisper.Conversation,
});

@ -10,6 +10,8 @@
'', // no pubkey needed
window.getDefaultFileServer()
);
// use the anonymous access token
window.tokenlessFileServerAdnAPI.token = 'loki';
window.tokenlessFileServerAdnAPI.pubKey = window.Signal.Crypto.base64ToArrayBuffer(
LokiFileServerAPI.secureRpcPubKey
);

@ -198,13 +198,33 @@
isOnline() {
return this.isMe() || this.get('isOnline');
},
isMe() {
return this.isOurLocalDevice() || this.isOurPrimaryDevice();
},
isOurPrimaryDevice() {
return this.id === window.storage.get('primaryDevicePubKey');
},
async isOurDevice() {
if (this.isMe()) {
return true;
}
const ourDevices = await window.libloki.storage.getPairedDevicesFor(
this.ourNumber
);
return ourDevices.includes(this.id);
},
isOurLocalDevice() {
return this.id === this.ourNumber;
},
isPublic() {
return !!(this.id && this.id.match(/^publicChat:/));
},
isClosedGroup() {
return (
this.get('type') === Message.GROUP && !this.isPublic() && !this.isRss()
);
},
isClosable() {
return !this.isRss() || this.get('closable');
},
@ -2712,13 +2732,16 @@
},
deleteContact() {
const title = this.isPublic()
? i18n('deletePublicChannel')
: i18n('deleteContact');
let title = i18n('deleteContact');
let message = i18n('deleteContactConfirmation');
const message = this.isPublic()
? i18n('deletePublicChannelConfirmation')
: i18n('deleteContactConfirmation');
if (this.isPublic()) {
title = i18n('deletePublicChannel');
message = i18n('deletePublicChannelConfirmation');
} else if (this.isClosedGroup()) {
title = i18n('leaveClosedGroup');
message = i18n('leaveClosedGroupConfirmation');
}
window.confirmationDialog({
title,

@ -205,7 +205,7 @@
},
getLokiNameForNumber(number) {
const conversation = ConversationController.get(number);
if (!conversation) {
if (!conversation || !conversation.getLokiProfile()) {
return number;
}
return conversation.getLokiProfile().displayName;
@ -1898,6 +1898,8 @@
const authorisation = await libloki.storage.getGrantAuthorisationForSecondaryPubKey(
source
);
const primarySource =
(authorisation && authorisation.primaryDevicePubKey) || source;
const isGroupMessage = !!initialMessage.group;
if (isGroupMessage) {
conversationId = initialMessage.group.id;
@ -1916,10 +1918,12 @@
const knownMembers = conversation.get('members');
if (!newGroup && knownMembers) {
const fromMember = knownMembers.includes(source);
const fromMember = knownMembers.includes(primarySource);
if (!fromMember) {
window.log.warn(`Ignoring group message from non-member: ${source}`);
window.log.warn(
`Ignoring group message from non-member: ${primarySource}`
);
confirm();
return null;
}
@ -1938,7 +1942,9 @@
);
}
const fromAdmin = conversation.get('groupAdmins').includes(source);
const fromAdmin = conversation
.get('groupAdmins')
.includes(primarySource);
if (!fromAdmin) {
// Make sure the message is not removing members / renaming the group
@ -2016,11 +2022,11 @@
.getConversations()
.models.filter(c => c.get('members'))
.reduce((acc, x) => window.Lodash.concat(acc, x.get('members')), [])
.includes(source);
.includes(primarySource);
if (groupMember) {
window.log.info(
`Auto accepting a 'group' friend request for a known group member: ${groupMember}`
`Auto accepting a 'group' friend request for a known group member: ${primarySource}`
);
window.libloki.api.sendBackgroundMessage(message.get('source'));
@ -2355,6 +2361,12 @@
await sendingDeviceConversation.onFriendRequestAccepted();
}
}
// We need to map the original message source to the primary device
if (source !== ourNumber) {
message.set({ source: primarySource });
}
const id = await window.Signal.Data.saveMessage(message.attributes, {
Message: Whisper.Message,
});

@ -34,8 +34,17 @@ class LokiAppDotNetServerAPI {
log.info(`LokiAppDotNetAPI registered server ${url}`);
}
async open() {
// check token, we're not sure how long we were asleep, token may have expired
await this.getOrRefreshServerToken();
// now that we have a working token, start up pollers
this.channels.forEach(channel => channel.open());
}
async close() {
this.channels.forEach(channel => channel.stop());
// match sure our pending requests are finished
// in case it's still starting up
if (this.tokenPromise) {
await this.tokenPromise;
}
@ -70,6 +79,7 @@ class LokiAppDotNetServerAPI {
}
async partChannel(channelId) {
log.info('partChannel', channelId, 'from', this.baseServerUrl);
await this.serverRequest(`channels/${channelId}/subscribe`, {
method: 'DELETE',
});
@ -78,6 +88,7 @@ class LokiAppDotNetServerAPI {
// deallocate resources channel uses
unregisterChannel(channelId) {
log.info('unregisterChannel', channelId, 'from', this.baseServerUrl);
let thisChannel;
let i = 0;
for (; i < this.channels.length; i += 1) {
@ -110,16 +121,23 @@ class LokiAppDotNetServerAPI {
);
*/
// You cannot use null to clear the profile name
// the name key has to be set to know what value we want changed
const pName = profileName || '';
const res = await this.serverRequest('users/me', {
method: 'PATCH',
objBody: {
name: profileName,
name: pName,
},
});
// no big deal if it fails...
if (res.err || !res.response || !res.response.data) {
if (res.err) {
log.error(`setProfileName Error ${res.err}`);
log.error(
`setProfileName Error ${res.err} ${res.statusCode}`,
this.baseServerUrl
);
}
return [];
}
@ -187,8 +205,9 @@ class LokiAppDotNetServerAPI {
// if no token to verify, just bail now
if (!token) {
//
// if we haven't forced it
if (!forceRefresh) {
// try one more time with requesting a fresh token
token = await this.getOrRefreshServerToken(true);
}
return token;
@ -204,10 +223,14 @@ class LokiAppDotNetServerAPI {
tokenRes.response.data.user
) {
// get our profile name
// FIXME: should this be window.storage.get('primaryDevicePubKey')?
const ourNumber = textsecure.storage.user.getNumber();
// this should be primaryDevicePubKey
// because the rest of the profile system uses that...
const ourNumber =
window.storage.get('primaryDevicePubKey') ||
textsecure.storage.user.getNumber();
const profileConvo = ConversationController.get(ourNumber);
const profileName = profileConvo.getProfileName();
const profile = profileConvo.getLokiProfile();
const profileName = profile && profile.displayName;
// if doesn't match, write it to the network
if (tokenRes.response.data.user.name !== profileName) {
// update our profile name if it got out of sync
@ -317,7 +340,7 @@ class LokiAppDotNetServerAPI {
// activate token
async submitToken(token) {
const options = {
const fetchOptions = {
method: 'POST',
headers: {
'Content-Type': 'application/json',
@ -331,7 +354,8 @@ class LokiAppDotNetServerAPI {
try {
const res = await this.proxyFetch(
`${this.baseServerUrl}/loki/v1/submit_challenge`,
options
fetchOptions,
{ textResponse: true }
);
return res.ok;
} catch (e) {
@ -340,7 +364,7 @@ class LokiAppDotNetServerAPI {
}
}
async proxyFetch(urlObj, fetchOptions = { method: 'GET' }) {
async proxyFetch(urlObj, fetchOptions = { method: 'GET' }, options = {}) {
if (
window.lokiFeatureFlags.useSnodeProxy &&
(this.baseServerUrl === 'https://file-dev.lokinet.org' ||
@ -356,7 +380,8 @@ class LokiAppDotNetServerAPI {
const endpoint = urlStr.replace(`${this.baseServerUrl}/`, '');
const { response, result } = await this._sendToProxy(
endpoint,
finalOptions
finalOptions,
options
);
// emulate nodeFetch response...
return {
@ -364,15 +389,20 @@ class LokiAppDotNetServerAPI {
json: () => response,
};
}
return nodeFetch(urlObj, fetchOptions);
return nodeFetch(urlObj, fetchOptions, options);
}
async _sendToProxy(endpoint, fetchOptions) {
async _sendToProxy(endpoint, pFetchOptions, options = {}) {
const randSnode = await lokiSnodeAPI.getRandomSnodeAddress();
const url = `https://${randSnode.ip}:${randSnode.port}/file_proxy`;
const fetchOptions = pFetchOptions; // make lint happy
// safety issue with file server, just safer to have this
if (fetchOptions.headers === undefined) {
fetchOptions.headers = {};
}
const payloadObj = {
// I think this is a stream, we may need to collect it all?
body: fetchOptions.body, // might need to b64 if binary...
endpoint,
method: fetchOptions.method,
@ -444,9 +474,13 @@ class LokiAppDotNetServerAPI {
const result = await nodeFetch(url, firstHopOptions);
const txtResponse = await result.text();
if (txtResponse === 'Service node is not ready: not in any swarm; \n') {
if (txtResponse.match(/^Service node is not ready: not in any swarm/i)) {
// mark snode bad
log.warn('Marking random snode bad', randSnode);
log.warn(
`Marking random snode bad, internet address ${randSnode.ip}:${
randSnode.port
}`
);
lokiSnodeAPI.markRandomNodeUnreachable(randSnode);
// retry (hopefully with new snode)
// FIXME: max number of retries...
@ -457,7 +491,10 @@ class LokiAppDotNetServerAPI {
try {
response = JSON.parse(txtResponse);
} catch (e) {
log.warn(`_sendToProxy Could not parse outer JSON [${txtResponse}]`);
log.warn(
`_sendToProxy Could not parse outer JSON [${txtResponse}]`,
endpoint
);
}
if (response.meta && response.meta.code === 200) {
@ -471,18 +508,22 @@ class LokiAppDotNetServerAPI {
ivAndCiphertextResponse
);
const textDecoder = new TextDecoder();
const json = textDecoder.decode(decrypted);
const respStr = textDecoder.decode(decrypted);
// replace response
try {
response = JSON.parse(json);
response = options.textResponse ? respStr : JSON.parse(respStr);
} catch (e) {
log.warn(`_sendToProxy Could not parse inner JSON [${json}]`);
log.warn(
`_sendToProxy Could not parse inner JSON [${respStr}]`,
endpoint
);
}
} else {
log.warn(
'file server secure_rpc gave an non-200 response: ',
response,
` txtResponse[${txtResponse}]`
` txtResponse[${txtResponse}]`,
endpoint
);
}
return { result, txtResponse, response };
@ -552,7 +593,8 @@ class LokiAppDotNetServerAPI {
.replace(`${this.baseServerUrl}/`, '');
({ response, txtResponse, result } = await this._sendToProxy(
endpointWithQS,
fetchOptions
fetchOptions,
options
));
} else {
// disable check for .loki
@ -563,7 +605,8 @@ class LokiAppDotNetServerAPI {
// always make sure this check is enabled
process.env.NODE_TLS_REJECT_UNAUTHORIZED = 1;
txtResponse = await result.text();
response = JSON.parse(txtResponse);
// hrm cloudflare timeouts (504s) will be html...
response = options.textResponse ? txtResponse : JSON.parse(txtResponse);
}
} catch (e) {
if (txtResponse) {
@ -571,10 +614,16 @@ class LokiAppDotNetServerAPI {
`serverRequest ${mode} error`,
e.code,
e.message,
`json: ${txtResponse}`
`json: ${txtResponse}`, 'attempting connection to', url
);
} else {
log.info(`serverRequest ${mode} error`, e.code, e.message);
log.info(
`serverRequest ${mode} error`,
e.code,
e.message,
'attempting connection to',
url
);
}
return {
err: e,
@ -879,7 +928,6 @@ class LokiPublicChannelAPI {
this.modStatus = false;
this.deleteLastId = 1;
this.timers = {};
this.running = true;
this.myPrivateKey = false;
// can escalated to SQL if it start uses too much memory
this.logMop = {};
@ -895,12 +943,7 @@ class LokiPublicChannelAPI {
}`
);
// start polling
this.pollForMessages();
this.pollForDeletions();
this.pollForChannel();
this.pollForModerators();
// TODO: poll for group members here?
this.open();
}
async getPrivateKey() {
@ -929,19 +972,64 @@ class LokiPublicChannelAPI {
return true;
}
open() {
log.info(
`LokiPublicChannel open ${this.channelId} on ${
this.serverAPI.baseServerUrl
}`
);
if (this.running) {
log.warn(
`LokiPublicChannel already open ${this.channelId} on ${
this.serverAPI.baseServerUrl
}`
);
}
this.running = true;
if (!this.timers.channel) {
this.pollForChannel();
}
if (!this.timers.moderator) {
this.pollForModerators();
}
if (!this.timers.delete) {
this.pollForDeletions();
}
if (!this.timers.message) {
this.pollForMessages();
}
// TODO: poll for group members here?
}
stop() {
log.info(
`LokiPublicChannel close ${this.channelId} on ${
this.serverAPI.baseServerUrl
}`
);
if (!this.running) {
log.warn(
`LokiPublicChannel already open ${this.channelId} on ${
this.serverAPI.baseServerUrl
}`
);
}
this.running = false;
if (this.timers.channel) {
clearTimeout(this.timers.channel);
this.timers.channel = false;
}
if (this.timers.moderator) {
clearTimeout(this.timers.moderator);
this.timers.moderator = false;
}
if (this.timers.delete) {
clearTimeout(this.timers.delete);
this.timers.delete = false;
}
if (this.timers.message) {
clearTimeout(this.timers.message);
this.timers.message = false;
}
}
@ -981,15 +1069,17 @@ class LokiPublicChannelAPI {
const res = await this.serverRequest(
`loki/v1/channels/${this.channelId}/moderators`
);
// FIXME: should this be window.storage.get('primaryDevicePubKey')?
const ourNumber = textsecure.storage.user.getNumber();
const ourNumberDevice = textsecure.storage.user.getNumber();
const ourNumberProfile = window.storage.get('primaryDevicePubKey');
// Get the list of moderators if no errors occurred
const moderators = !res.err && res.response && res.response.moderators;
// if we encountered problems then we'll keep the old mod status
if (moderators) {
this.modStatus = moderators.includes(ourNumber);
this.modStatus =
(ourNumberProfile && moderators.includes(ourNumberProfile)) ||
moderators.includes(ourNumberDevice);
}
await this.conversation.setModerators(moderators || []);
@ -1392,8 +1482,10 @@ class LokiPublicChannelAPI {
let pendingMessages = [];
// get our profile name
// FIXME: should this be window.storage.get('primaryDevicePubKey')?
const ourNumber = textsecure.storage.user.getNumber();
const ourNumberDevice = textsecure.storage.user.getNumber();
// if no primaryDevicePubKey fall back to ourNumberDevice
const ourNumberProfile =
window.storage.get('primaryDevicePubKey') || ourNumberDevice;
let lastProfileName = false;
// the signature forces this to be async
@ -1466,7 +1558,7 @@ class LokiPublicChannelAPI {
const from = adnMessage.user.name || 'Anonymous'; // profileName
// if us
if (pubKey === ourNumber) {
if (pubKey === ourNumberProfile || pubKey === ourNumberDevice) {
// update the last name we saw from ourself
lastProfileName = from;
}
@ -1616,7 +1708,7 @@ class LokiPublicChannelAPI {
const slaveKey = messageData.source;
// prevent our own device sent messages from coming back in
if (slaveKey === ourNumber) {
if (slaveKey === ourNumberDevice) {
// we originally sent these
return;
}
@ -1647,7 +1739,7 @@ class LokiPublicChannelAPI {
// if we received one of our own messages
if (lastProfileName !== false) {
// get current profileName
const profileConvo = ConversationController.get(ourNumber);
const profileConvo = ConversationController.get(ourNumberProfile);
const profileName = profileConvo.getProfileName();
// check to see if it out of sync
if (profileName !== lastProfileName) {

@ -245,6 +245,9 @@ class LokiHomeServerInstance extends LokiFileServerInstance {
isPrimary: isPrimary ? '1' : '0',
authorisations,
};
if (!this._server.token) {
log.warn('_setOurDeviceMapping no token yet');
}
return this._server.setSelfAnnotation(
DEVICE_MAPPING_USER_ANNOTATION_TYPE,
content
@ -269,11 +272,14 @@ class LokiHomeServerInstance extends LokiFileServerInstance {
// you only upload to your own home server
// you can download from any server...
uploadAvatar(data) {
if (!this._server.token) {
log.warn('uploadAvatar no token yet');
}
return this._server.uploadAvatar(data);
}
uploadPrivateAttachment(data) {
return this._server.uploadData(data);
static uploadPrivateAttachment(data) {
return window.tokenlessFileServerAdnAPI.uploadData(data);
}
clearOurDeviceMappingAnnotations() {
@ -298,6 +304,7 @@ class LokiFileServerFactoryAPI {
if (!thisServer) {
thisServer = new LokiHomeServerInstance(this.ourKey);
log.info(`Registering HomeServer ${serverUrl}`);
// not await, so a failure or slow connection doesn't hinder loading of the app
thisServer.establishConnection(serverUrl);
this.servers.push(thisServer);
}

@ -13,6 +13,13 @@ class LokiPublicChatFactoryAPI extends EventEmitter {
this.primaryUserProfileName = {};
}
// MessageReceiver.connect calls this
// start polling in all existing registered channels
async open() {
await Promise.all(this.servers.map(server => server.open()));
}
// MessageReceiver.close
async close() {
await Promise.all(this.servers.map(server => server.close()));
}

@ -85,7 +85,20 @@ const sendToProxy = async (options = {}, targetNode) => {
try {
const jsonRes = JSON.parse(plaintext);
// emulate nodeFetch response...
jsonRes.json = () => JSON.parse(jsonRes.body);
jsonRes.json = () => {
try {
return JSON.parse(jsonRes.body);
} catch (e) {
log.error(
'lokiRpc sendToProxy error',
e.code,
e.message,
'json',
jsonRes.body
);
}
return false;
};
return jsonRes;
} catch (e) {
log.error(

@ -156,6 +156,15 @@ class LokiSnodeAPI {
'/storage_rpc/v1',
snode
);
if (!result) {
log.warn(
`getSwarmNodes lokiRpc on ${snode.ip}:${
snode.port
} returned falsish value`,
result
);
return [];
}
const snodes = result.snodes.filter(tSnode => tSnode.ip !== '0.0.0.0');
return snodes;
} catch (e) {

@ -865,7 +865,7 @@ function initialize({
filename: 'attachment',
});
return lokiFileServerAPI.uploadPrivateAttachment(formData);
return lokiFileServerAPI.constructor.uploadPrivateAttachment(formData);
}
function putAvatar(bin) {

@ -238,13 +238,16 @@
this.el.append(dialog.el);
},
showLeaveGroupDialog(groupConvo) {
const title = groupConvo.isPublic()
? i18n('deletePublicChannel')
: i18n('deleteContact');
let title = i18n('deleteContact');
let message = i18n('deleteContactConfirmation');
const message = groupConvo.isPublic()
? i18n('deletePublicChannelConfirmation')
: i18n('deleteContactConfirmation');
if (groupConvo.isPublic()) {
title = i18n('deletePublicChannel');
message = i18n('deletePublicChannelConfirmation');
} else if (groupConvo.isClosedGroup()) {
title = i18n('leaveClosedGroup');
message = i18n('leaveClosedGroupConfirmation');
}
window.confirmationDialog({
title,

@ -48,6 +48,9 @@
// Should we use ephemeral key pairs here rather than long term keys on each side?
async encrypt(plaintext) {
const myKeyPair = await textsecure.storage.protocol.getIdentityKeyPair();
if (!myKeyPair) {
throw new Error('Failed to get keypair for encryption');
}
const myPrivateKey = myKeyPair.privKey;
const symmetricKey = libsignal.Curve.calculateAgreement(
this.pubKey,
@ -63,6 +66,9 @@
async decrypt(ivAndCiphertext) {
const myKeyPair = await textsecure.storage.protocol.getIdentityKeyPair();
if (!myKeyPair) {
throw new Error('Failed to get keypair for decryption');
}
const myPrivateKey = myKeyPair.privKey;
const symmetricKey = libsignal.Curve.calculateAgreement(
this.pubKey,
@ -169,6 +175,9 @@
data[len] = type;
const myKeyPair = await textsecure.storage.protocol.getIdentityKeyPair();
if (!myKeyPair) {
throw new Error('Failed to get keypair for pairing signature generation');
}
const signature = await libsignal.Curve.async.calculateSignature(
myKeyPair.privKey,
data.buffer
@ -291,7 +300,11 @@
const serverPubKey = new Uint8Array(
dcodeIO.ByteBuffer.fromBase64(serverPubKey64).toArrayBuffer()
);
const { privKey } = await textsecure.storage.protocol.getIdentityKeyPair();
const keyPair = await textsecure.storage.protocol.getIdentityKeyPair();
if (!keyPair) {
throw new Error('Failed to get keypair for token decryption');
}
const { privKey } = keyPair;
const symmetricKey = libsignal.Curve.calculateAgreement(
serverPubKey,
privKey

@ -240,6 +240,10 @@
return secondaryPubKeys.concat(primaryDevicePubKey);
}
function getPairedDevicesFor(pubkey) {
return window.Signal.Data.getPairedDevicesFor(pubkey);
}
window.libloki.storage = {
getPreKeyBundleForContact,
saveContactPreKeyBundle,
@ -250,6 +254,7 @@
removePairingAuthorisationForSecondaryPubKey,
getGrantAuthorisationForSecondaryPubKey,
getAuthorisationForSecondaryPubKey,
getPairedDevicesFor,
getAllDevicePubKeysForPrimaryPubKey,
getSecondaryDevicesFor,
getPrimaryDeviceMapping,

@ -48,6 +48,17 @@ function MessageReceiver(username, password, signalingKey, options = {}) {
if (options.retryCached) {
this.pending = this.queueAllCached();
}
// only do this once to prevent duplicates
if (lokiPublicChatAPI) {
// bind events
lokiPublicChatAPI.on(
'publicMessage',
this.handleUnencryptedMessage.bind(this)
);
} else {
window.log.error('Can not handle open group data, API is not available');
}
}
MessageReceiver.stringToArrayBuffer = string =>
@ -79,11 +90,11 @@ MessageReceiver.prototype.extend({
handleRequest: this.handleRequest.bind(this),
});
this.httpPollingResource.pollServer();
// start polling all open group rooms you have registered
// if not registered yet, they'll get started when they're created
if (lokiPublicChatAPI) {
lokiPublicChatAPI.on(
'publicMessage',
this.handleUnencryptedMessage.bind(this)
);
lokiPublicChatAPI.open();
}
// set up pollers for any RSS feeds
feeds.forEach(feed => {
@ -166,6 +177,7 @@ MessageReceiver.prototype.extend({
this.wsr.close(3000, 'called close');
}
// stop polling all open group rooms
if (lokiPublicChatAPI) {
await lokiPublicChatAPI.close();
}
@ -1314,8 +1326,9 @@ MessageReceiver.prototype.extend({
primaryPubKey
);
// If we don't have a mapping on the primary then we have been unlinked
if (!primaryMapping) {
return false;
return true;
}
// We expect the primary device to have updated its mapping
@ -1366,7 +1379,11 @@ MessageReceiver.prototype.extend({
}
}
if (friendRequest) {
// If we got a friend request message or
// if we're not friends with the current user that sent this private message
// Check to see if we need to auto accept their friend request
const isGroupMessage = !!groupId;
if (friendRequest || (!isGroupMessage && !conversation.isFriend())) {
if (isMe) {
window.log.info('refusing to add a friend request to ourselves');
throw new Error('Cannot add a friend request for ourselves!');

@ -350,23 +350,33 @@ OutgoingMessage.prototype = {
} catch (e) {
// do nothing
}
if (
conversation &&
!conversation.isFriend() &&
!conversation.hasReceivedFriendRequest() &&
!this.isGroup
) {
// We want to send an automated friend request if:
// - We aren't already friends
// - We haven't received a friend request from this device
// - We haven't sent a friend request recently
if (conversation.friendRequestTimerIsExpired()) {
isMultiDeviceRequest = true;
thisDeviceMessageType = 'friend-request';
} else {
// Throttle automated friend requests
this.successfulNumbers.push(devicePubKey);
return null;
if (conversation && !this.isGroup) {
const isOurDevice = await conversation.isOurDevice();
const isFriends =
conversation.isFriend() ||
conversation.hasReceivedFriendRequest();
// We should only send a friend request to our device if we don't have keys
const shouldSendAutomatedFR = isOurDevice ? !keysFound : !isFriends;
if (shouldSendAutomatedFR) {
// We want to send an automated friend request if:
// - We aren't already friends
// - We haven't received a friend request from this device
// - We haven't sent a friend request recently
if (conversation.friendRequestTimerIsExpired()) {
isMultiDeviceRequest = true;
thisDeviceMessageType = 'friend-request';
} else {
// Throttle automated friend requests
this.successfulNumbers.push(devicePubKey);
return null;
}
}
// If we're not friends with our own device then we should become friends
if (isOurDevice && keysFound && !isFriends) {
conversation.setFriendRequestStatus(
window.friends.friendRequestStatusEnum.friends
);
}
}
}

@ -411,7 +411,11 @@ MessageSender.prototype = {
const ourNumber = textsecure.storage.user.getNumber();
numbers.forEach(number => {
// Note: Since we're just doing independant tasks,
// using `async` in the `forEach` loop should be fine.
// If however we want to use the results from forEach then
// we would need to convert this to a Promise.all(numbers.map(...))
numbers.forEach(async number => {
// Note: if we are sending a private group message, we do our best to
// ensure we have signal protocol sessions with every member, but if we
// fail, let's at least send messages to those members with which we do:
@ -420,9 +424,17 @@ MessageSender.prototype = {
s => s.number === number
);
let keysFound = false;
// If we don't have a session but we already have prekeys to
// start communication then we should use them
if (!haveSession && !options.isPublic) {
keysFound = await outgoing.getKeysForNumber(number, []);
}
if (
number === ourNumber ||
haveSession ||
keysFound ||
options.isPublic ||
options.messageType === 'friend-request'
) {
@ -640,6 +652,10 @@ MessageSender.prototype = {
},
async sendContactSyncMessage(contactConversation) {
if (!contactConversation.isPrivate()) {
return Promise.resolve();
}
const primaryDeviceKey = window.storage.get('primaryDevicePubKey');
const allOurDevices = (await libloki.storage.getAllDevicePubKeysForPrimaryPubKey(
primaryDeviceKey
@ -869,8 +885,13 @@ MessageSender.prototype = {
},
sendGroupProto(providedNumbers, proto, timestamp = Date.now(), options = {}) {
const me = textsecure.storage.user.getNumber();
const numbers = providedNumbers.filter(number => number !== me);
// We always assume that only primary device is a member in the group
const primaryDeviceKey =
window.storage.get('primaryDevicePubKey') ||
textsecure.storage.user.getNumber();
const numbers = providedNumbers.filter(
number => number !== primaryDeviceKey
);
if (numbers.length === 0) {
return Promise.resolve({
successfulNumbers: [],
@ -881,7 +902,7 @@ MessageSender.prototype = {
});
}
return new Promise((resolve, reject) => {
const sendPromise = new Promise((resolve, reject) => {
const silent = true;
const callback = res => {
res.dataMessage = proto.toArrayBuffer();
@ -901,6 +922,13 @@ MessageSender.prototype = {
options
);
});
return sendPromise.then(result => {
// Sync the group message to our other devices
const encoded = textsecure.protobuf.DataMessage.encode(proto);
this.sendSyncMessage(encoded, timestamp, null, null, [], [], options);
return result;
});
},
async getMessageProto(
@ -1085,8 +1113,11 @@ MessageSender.prototype = {
profileKey,
options
) {
const me = textsecure.storage.user.getNumber();
let numbers = groupNumbers.filter(number => number !== me);
// We always assume that only primary device is a member in the group
const primaryDeviceKey =
window.storage.get('primaryDevicePubKey') ||
textsecure.storage.user.getNumber();
let numbers = groupNumbers.filter(number => number !== primaryDeviceKey);
if (options.isPublic) {
numbers = [groupId];
}
@ -1130,8 +1161,10 @@ MessageSender.prototype = {
proto.group.name = name;
proto.group.members = members;
const ourPK = textsecure.storage.user.getNumber();
proto.group.admins = [ourPK];
const primaryDeviceKey =
window.storage.get('primaryDevicePubKey') ||
textsecure.storage.user.getNumber();
proto.group.admins = [primaryDeviceKey];
return this.makeAttachmentPointer(avatar).then(attachment => {
proto.group.avatar = attachment;

@ -3,7 +3,7 @@
"productName": "Session",
"description": "Private messaging from your desktop",
"repository": "https://github.com/loki-project/loki-messenger.git",
"version": "1.0.0",
"version": "1.0.1",
"license": "GPL-3.0",
"author": {
"name": "Loki Project",
@ -166,7 +166,7 @@
"chai": "4.1.2",
"dashdash": "1.14.1",
"electron": "4.1.2",
"electron-builder": "21.2.0",
"electron-builder": "22.3.2",
"electron-icon-maker": "0.0.3",
"electron-notarize": "^0.2.0",
"eslint": "4.14.0",
@ -207,8 +207,8 @@
"build": {
"appId": "com.loki-project.messenger-desktop",
"afterSign": "build/notarize.js",
"artifactName": "${name}-${os}-${version}.${ext}",
"mac": {
"artifactName": "${name}-mac-${version}.${ext}",
"category": "public.app-category.social-networking",
"icon": "build/icons/mac/icon.icns",
"target": [
@ -225,21 +225,16 @@
},
"win": {
"asarUnpack": "node_modules/spellchecker/vendor/hunspell_dictionaries",
"artifactName": "${name}-win-${version}.${ext}",
"publisherName": "Loki Project",
"icon": "build/icons/win/icon.ico",
"publish": [
{
"provider": "generic",
"url": "https://getsession.org/"
}
],
"target": [
"nsis"
]
},
"nsis": {
"deleteAppDataOnUninstall": true
"deleteAppDataOnUninstall": true,
"oneClick": false,
"allowToChangeInstallationDirectory": true
},
"linux": {
"category": "Network",
@ -248,7 +243,8 @@
},
"asarUnpack": "node_modules/spellchecker/vendor/hunspell_dictionaries",
"target": [
"deb"
"deb",
"AppImage"
],
"icon": "build/icons/png"
},
@ -318,7 +314,8 @@
"node_modules/socks/build/common/*.js",
"node_modules/socks/build/client/*.js",
"node_modules/smart-buffer/build/*.js",
"!node_modules/@journeyapps/sqlcipher/deps/*"
"!node_modules/@journeyapps/sqlcipher/deps/*",
"!build/*.js"
]
}
}

@ -1241,6 +1241,7 @@
margin: 10px auto;
padding: 5px 20px;
border-radius: 4px;
word-break: break-word;
}
.module-group-notification__contact {

@ -71,7 +71,12 @@ export class EditProfileDialog extends React.Component<Props, State> {
const viewDefault = this.state.mode === 'default';
const viewEdit = this.state.mode === 'edit';
const viewQR = this.state.mode === 'qr';
const sessionID = window.textsecure.storage.user.getNumber();
/* tslint:disable:no-backbone-get-set-outside-model */
const sessionID =
window.textsecure.storage.get('primaryDevicePubKey') ||
window.textsecure.storage.user.getNumber();
/* tslint:enable:no-backbone-get-set-outside-model */
const backButton =
viewEdit || viewQR

@ -38,7 +38,7 @@ export class GroupNotification extends React.Component<Props> {
key={`external-${contact.phoneNumber}`}
className="module-group-notification__contact"
>
{contact.profileName}
{contact.profileName || contact.phoneNumber}
</span>
);

@ -364,7 +364,8 @@ export class LeftPaneChannelSection extends React.Component<Props, State> {
return false;
}
const regexURL = /(http:\/\/www\.|https:\/\/www\.|http:\/\/|https:\/\/)?[a-z0-9]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,5}(:[0-9]{1,5})?(\/.*)?/;
// longest TLD is now (20/02/06) 24 characters per https://jasontucker.blog/8945/what-is-the-longest-tld-you-can-get-for-a-domain-name
const regexURL = /(http:\/\/|https:\/\/)?[a-z0-9]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,24}(:[0-9]{1,5})?(\/.*)?/;
if (groupUrl.length <= 0) {
window.pushToast({
@ -387,7 +388,7 @@ export class LeftPaneChannelSection extends React.Component<Props, State> {
}
joinChannelStateManager(this, groupUrl, () => {
this.handleToggleOverlay(SessionGroupType.Open);
this.handleToggleOverlay(undefined);
});
return true;

@ -69,7 +69,8 @@ export class LeftPaneMessageSection extends React.Component<Props, any> {
this.state = {
showComposeView: false,
pubKeyPasted: '',
shouldRenderMessageOnboarding: length === 0 && renderOnboardingSetting && false,
shouldRenderMessageOnboarding:
length === 0 && renderOnboardingSetting && false,
connectSuccess: false,
loading: false,
};

@ -827,7 +827,10 @@ export class RegistrationTabs extends React.Component<{}, State> {
const onError = async (error: any) => {
window.log.error(error);
// clear the ... to make sure the user realize we're not doing anything
this.setState({
loading: false,
});
await this.resetRegistration();
};
@ -839,6 +842,11 @@ export class RegistrationTabs extends React.Component<{}, State> {
const validationError = c.validateNumber();
if (validationError) {
onError('Invalid public key').ignore();
window.pushToast({
title: window.i18n('invalidNumberError'),
type: 'error',
id: 'invalidNumberError',
});
return;
}

@ -52,14 +52,16 @@ export class SessionClosableOverlay extends React.Component<Props, State> {
}
public getContacts() {
const conversations = window.getConversations();
let conversationList = conversations;
if (conversationList !== undefined) {
conversationList = conversationList.filter((conv: any) => {
return !conv.isRss() && !conv.isPublic() && conv.attributes.lastMessage;
});
}
const conversations = window.getConversations() || [];
const conversationList = conversations.filter((conversation: any) => {
return (
!conversation.isMe() &&
conversation.isPrivate() &&
!conversation.isSecondaryDevice() &&
conversation.isFriend()
);
});
return conversationList.map((d: any) => {
const lokiProfile = d.getLokiProfile();

File diff suppressed because it is too large Load Diff
Loading…
Cancel
Save