// Copyright 2020 Signal Messenger, LLC // SPDX-License-Identifier: AGPL-3.0-only import { last, sortBy } from 'lodash'; import { AuthCredentialWithPniResponse } from '@signalapp/libsignal-client/zkgroup'; import { getClientZkAuthOperations } from '../util/zkgroup'; import type { GroupCredentialType } from '../textsecure/WebAPI'; import { strictAssert } from '../util/assert'; import * as durations from '../util/durations'; import { BackOff } from '../util/BackOff'; import { sleep } from '../util/sleep'; import { toDayMillis } from '../util/timestamp'; import { UUIDKind } from '../types/UUID'; import * as log from '../logging/log'; export const GROUP_CREDENTIALS_KEY = 'groupCredentials'; type CredentialsDataType = ReadonlyArray; type RequestDatesType = { startDayInMs: number; endDayInMs: number; }; type NextCredentialsType = { today: GroupCredentialType; tomorrow: GroupCredentialType; }; let started = false; function getCheckedCredentials(reason: string): CredentialsDataType { const result = window.storage.get('groupCredentials'); strictAssert( result !== undefined, `getCheckedCredentials: no credentials found, ${reason}` ); return result; } export async function initializeGroupCredentialFetcher(): Promise { if (started) { return; } log.info('initializeGroupCredentialFetcher: starting...'); started = true; // Because we fetch eight days of credentials at a time, we really only need to run // this about once a week. But there's no problem running it more often; it will do // nothing if no new credentials are needed, and will only request needed credentials. await runWithRetry(maybeFetchNewCredentials, { scheduleAnother: 4 * durations.HOUR, }); } const BACKOFF_TIMEOUTS = [ durations.SECOND, 5 * durations.SECOND, 30 * durations.SECOND, 2 * durations.MINUTE, 5 * durations.MINUTE, ]; export async function runWithRetry( fn: () => Promise, options: { scheduleAnother?: number } = {} ): Promise { const backOff = new BackOff(BACKOFF_TIMEOUTS); // eslint-disable-next-line no-constant-condition while (true) { try { // eslint-disable-next-line no-await-in-loop await fn(); return; } catch (error) { const wait = backOff.getAndIncrement(); log.info( `runWithRetry: ${fn.name} failed. Waiting ${wait}ms for retry. Error: ${error.stack}` ); // eslint-disable-next-line no-await-in-loop await sleep(wait); } } // It's important to schedule our next run here instead of the level above; otherwise we // could end up with multiple endlessly-retrying runs. // eslint-disable-next-line no-unreachable -- Why is this here, its unreachable const duration = options.scheduleAnother; if (duration) { log.info( `runWithRetry: scheduling another run with a setTimeout duration of ${duration}ms` ); setTimeout(async () => runWithRetry(fn, options), duration); } } // In cases where we are at a day boundary, we might need to use tomorrow in a retry export function getCheckedCredentialsForToday( reason: string ): NextCredentialsType { const data = getCheckedCredentials(reason); const today = toDayMillis(Date.now()); const todayIndex = data.findIndex( (item: GroupCredentialType) => item.redemptionTime === today ); if (todayIndex < 0) { throw new Error( 'getCredentialsForToday: Cannot find credentials for today' ); } return { today: data[todayIndex], tomorrow: data[todayIndex + 1], }; } export async function maybeFetchNewCredentials(): Promise { const logId = 'maybeFetchNewCredentials'; const aci = window.textsecure.storage.user.getUuid(UUIDKind.ACI)?.toString(); if (!aci) { log.info(`${logId}: no ACI, returning early`); return; } const previous: CredentialsDataType | undefined = window.storage.get('groupCredentials'); const requestDates = getDatesForRequest(previous); if (!requestDates) { log.info(`${logId}: no new credentials needed`); return; } const { server } = window.textsecure; if (!server) { log.error(`${logId}: unable to get server`); return; } const { startDayInMs, endDayInMs } = requestDates; log.info( `${logId}: fetching credentials for ${startDayInMs} through ${endDayInMs}` ); const serverPublicParamsBase64 = window.getServerPublicParams(); const clientZKAuthOperations = getClientZkAuthOperations( serverPublicParamsBase64 ); const { pni, credentials: rawCredentials } = await server.getGroupCredentials( { startDayInMs, endDayInMs } ); strictAssert(pni, 'Server must give pni along with group credentials'); const localPni = window.storage.user.getUuid(UUIDKind.PNI); if (pni !== localPni?.toString()) { log.error(`${logId}: local PNI ${localPni}, does not match remote ${pni}`); } const newCredentials = sortCredentials(rawCredentials).map( (item: GroupCredentialType) => { const authCredential = clientZKAuthOperations.receiveAuthCredentialWithPni( aci, pni, item.redemptionTime, new AuthCredentialWithPniResponse( Buffer.from(item.credential, 'base64') ) ); const credential = authCredential.serialize().toString('base64'); return { redemptionTime: item.redemptionTime * durations.SECOND, credential, }; } ); const today = toDayMillis(Date.now()); const previousCleaned = previous ? previous.filter( (item: GroupCredentialType) => item.redemptionTime >= today ) : []; const finalCredentials = [...previousCleaned, ...newCredentials]; log.info(`${logId}: Saving new credentials...`); // Note: we don't wait for this to finish window.storage.put('groupCredentials', finalCredentials); log.info(`${logId}: Save complete.`); } export function getDatesForRequest( data?: CredentialsDataType ): RequestDatesType | undefined { const today = toDayMillis(Date.now()); const sixDaysOut = today + 6 * durations.DAY; const lastCredential = last(data); if (!lastCredential || lastCredential.redemptionTime < today) { return { startDayInMs: today, endDayInMs: sixDaysOut, }; } if (lastCredential.redemptionTime >= sixDaysOut) { return undefined; } return { startDayInMs: lastCredential.redemptionTime + durations.DAY, endDayInMs: sixDaysOut, }; } export function sortCredentials( data: CredentialsDataType ): CredentialsDataType { return sortBy(data, (item: GroupCredentialType) => item.redemptionTime); }