Signal-Desktop/ts/services/groupCredentialFetcher.ts

227 lines
6.5 KiB
TypeScript

// Copyright 2020 Signal Messenger, LLC
// SPDX-License-Identifier: AGPL-3.0-only
import { last, sortBy } from 'lodash';
import { AuthCredentialWithPniResponse } from '@signalapp/libsignal-client/zkgroup';
import { getClientZkAuthOperations } from '../util/zkgroup';
import type { GroupCredentialType } from '../textsecure/WebAPI';
import { strictAssert } from '../util/assert';
import * as durations from '../util/durations';
import { BackOff } from '../util/BackOff';
import { sleep } from '../util/sleep';
import { toDayMillis } from '../util/timestamp';
import { UUIDKind } from '../types/UUID';
import * as log from '../logging/log';
export const GROUP_CREDENTIALS_KEY = 'groupCredentials';
type CredentialsDataType = ReadonlyArray<GroupCredentialType>;
type RequestDatesType = {
startDayInMs: number;
endDayInMs: number;
};
type NextCredentialsType = {
today: GroupCredentialType;
tomorrow: GroupCredentialType;
};
let started = false;
function getCheckedCredentials(reason: string): CredentialsDataType {
const result = window.storage.get('groupCredentials');
strictAssert(
result !== undefined,
`getCheckedCredentials: no credentials found, ${reason}`
);
return result;
}
export async function initializeGroupCredentialFetcher(): Promise<void> {
if (started) {
return;
}
log.info('initializeGroupCredentialFetcher: starting...');
started = true;
// Because we fetch eight days of credentials at a time, we really only need to run
// this about once a week. But there's no problem running it more often; it will do
// nothing if no new credentials are needed, and will only request needed credentials.
await runWithRetry(maybeFetchNewCredentials, {
scheduleAnother: 4 * durations.HOUR,
});
}
const BACKOFF_TIMEOUTS = [
durations.SECOND,
5 * durations.SECOND,
30 * durations.SECOND,
2 * durations.MINUTE,
5 * durations.MINUTE,
];
export async function runWithRetry(
fn: () => Promise<void>,
options: { scheduleAnother?: number } = {}
): Promise<void> {
const backOff = new BackOff(BACKOFF_TIMEOUTS);
// eslint-disable-next-line no-constant-condition
while (true) {
try {
// eslint-disable-next-line no-await-in-loop
await fn();
return;
} catch (error) {
const wait = backOff.getAndIncrement();
log.info(
`runWithRetry: ${fn.name} failed. Waiting ${wait}ms for retry. Error: ${error.stack}`
);
// eslint-disable-next-line no-await-in-loop
await sleep(wait);
}
}
// It's important to schedule our next run here instead of the level above; otherwise we
// could end up with multiple endlessly-retrying runs.
// eslint-disable-next-line no-unreachable -- Why is this here, its unreachable
const duration = options.scheduleAnother;
if (duration) {
log.info(
`runWithRetry: scheduling another run with a setTimeout duration of ${duration}ms`
);
setTimeout(async () => runWithRetry(fn, options), duration);
}
}
// In cases where we are at a day boundary, we might need to use tomorrow in a retry
export function getCheckedCredentialsForToday(
reason: string
): NextCredentialsType {
const data = getCheckedCredentials(reason);
const today = toDayMillis(Date.now());
const todayIndex = data.findIndex(
(item: GroupCredentialType) => item.redemptionTime === today
);
if (todayIndex < 0) {
throw new Error(
'getCredentialsForToday: Cannot find credentials for today'
);
}
return {
today: data[todayIndex],
tomorrow: data[todayIndex + 1],
};
}
export async function maybeFetchNewCredentials(): Promise<void> {
const logId = 'maybeFetchNewCredentials';
const aci = window.textsecure.storage.user.getUuid(UUIDKind.ACI)?.toString();
if (!aci) {
log.info(`${logId}: no ACI, returning early`);
return;
}
const previous: CredentialsDataType | undefined =
window.storage.get('groupCredentials');
const requestDates = getDatesForRequest(previous);
if (!requestDates) {
log.info(`${logId}: no new credentials needed`);
return;
}
const { server } = window.textsecure;
if (!server) {
log.error(`${logId}: unable to get server`);
return;
}
const { startDayInMs, endDayInMs } = requestDates;
log.info(
`${logId}: fetching credentials for ${startDayInMs} through ${endDayInMs}`
);
const serverPublicParamsBase64 = window.getServerPublicParams();
const clientZKAuthOperations = getClientZkAuthOperations(
serverPublicParamsBase64
);
const { pni, credentials: rawCredentials } = await server.getGroupCredentials(
{ startDayInMs, endDayInMs }
);
strictAssert(pni, 'Server must give pni along with group credentials');
const localPni = window.storage.user.getUuid(UUIDKind.PNI);
if (pni !== localPni?.toString()) {
log.error(`${logId}: local PNI ${localPni}, does not match remote ${pni}`);
}
const newCredentials = sortCredentials(rawCredentials).map(
(item: GroupCredentialType) => {
const authCredential =
clientZKAuthOperations.receiveAuthCredentialWithPni(
aci,
pni,
item.redemptionTime,
new AuthCredentialWithPniResponse(
Buffer.from(item.credential, 'base64')
)
);
const credential = authCredential.serialize().toString('base64');
return {
redemptionTime: item.redemptionTime * durations.SECOND,
credential,
};
}
);
const today = toDayMillis(Date.now());
const previousCleaned = previous
? previous.filter(
(item: GroupCredentialType) => item.redemptionTime >= today
)
: [];
const finalCredentials = [...previousCleaned, ...newCredentials];
log.info(`${logId}: Saving new credentials...`);
// Note: we don't wait for this to finish
window.storage.put('groupCredentials', finalCredentials);
log.info(`${logId}: Save complete.`);
}
export function getDatesForRequest(
data?: CredentialsDataType
): RequestDatesType | undefined {
const today = toDayMillis(Date.now());
const sixDaysOut = today + 6 * durations.DAY;
const lastCredential = last(data);
if (!lastCredential || lastCredential.redemptionTime < today) {
return {
startDayInMs: today,
endDayInMs: sixDaysOut,
};
}
if (lastCredential.redemptionTime >= sixDaysOut) {
return undefined;
}
return {
startDayInMs: lastCredential.redemptionTime + durations.DAY,
endDayInMs: sixDaysOut,
};
}
export function sortCredentials(
data: CredentialsDataType
): CredentialsDataType {
return sortBy(data, (item: GroupCredentialType) => item.redemptionTime);
}