194 lines
10 KiB
Kotlin
194 lines
10 KiB
Kotlin
package org.session.libsession.messaging.sending_receiving
|
|
|
|
import org.session.libsession.messaging.MessagingModuleConfiguration
|
|
import org.session.libsession.messaging.messages.Message
|
|
import org.session.libsession.messaging.messages.control.CallMessage
|
|
import org.session.libsession.messaging.messages.control.ClosedGroupControlMessage
|
|
import org.session.libsession.messaging.messages.control.ConfigurationMessage
|
|
import org.session.libsession.messaging.messages.control.DataExtractionNotification
|
|
import org.session.libsession.messaging.messages.control.ExpirationTimerUpdate
|
|
import org.session.libsession.messaging.messages.control.MessageRequestResponse
|
|
import org.session.libsession.messaging.messages.control.ReadReceipt
|
|
import org.session.libsession.messaging.messages.control.SharedConfigurationMessage
|
|
import org.session.libsession.messaging.messages.control.TypingIndicator
|
|
import org.session.libsession.messaging.messages.control.UnsendRequest
|
|
import org.session.libsession.messaging.messages.visible.VisibleMessage
|
|
import org.session.libsession.messaging.utilities.SessionId
|
|
import org.session.libsession.messaging.utilities.SodiumUtilities
|
|
import org.session.libsession.snode.SnodeAPI
|
|
import org.session.libsignal.crypto.PushTransportDetails
|
|
import org.session.libsignal.protos.SignalServiceProtos
|
|
import org.session.libsignal.utilities.IdPrefix
|
|
import org.session.libsignal.utilities.Log
|
|
|
|
object MessageReceiver {
|
|
|
|
internal sealed class Error(message: String) : Exception(message) {
|
|
object DuplicateMessage: Error("Duplicate message.")
|
|
object InvalidMessage: Error("Invalid message.")
|
|
object UnknownMessage: Error("Unknown message type.")
|
|
object UnknownEnvelopeType: Error("Unknown envelope type.")
|
|
object DecryptionFailed : Exception("Couldn't decrypt message.")
|
|
object InvalidSignature: Error("Invalid message signature.")
|
|
object NoData: Error("Received an empty envelope.")
|
|
object SenderBlocked: Error("Received a message from a blocked user.")
|
|
object NoThread: Error("Couldn't find thread for message.")
|
|
object SelfSend: Error("Message addressed at self.")
|
|
object InvalidGroupPublicKey: Error("Invalid group public key.")
|
|
object NoGroupThread: Error("No thread exists for this group.")
|
|
object NoGroupKeyPair: Error("Missing group key pair.")
|
|
object NoUserED25519KeyPair : Error("Couldn't find user ED25519 key pair.")
|
|
|
|
internal val isRetryable: Boolean = when (this) {
|
|
is DuplicateMessage, is InvalidMessage, is UnknownMessage,
|
|
is UnknownEnvelopeType, is InvalidSignature, is NoData,
|
|
is SenderBlocked, is SelfSend, is NoGroupThread -> false
|
|
else -> true
|
|
}
|
|
}
|
|
|
|
internal fun parse(
|
|
data: ByteArray,
|
|
openGroupServerID: Long?,
|
|
isOutgoing: Boolean? = null,
|
|
otherBlindedPublicKey: String? = null,
|
|
openGroupPublicKey: String? = null,
|
|
currentClosedGroups: Set<String>?
|
|
): Pair<Message, SignalServiceProtos.Content> {
|
|
val storage = MessagingModuleConfiguration.shared.storage
|
|
val userPublicKey = storage.getUserPublicKey()
|
|
val isOpenGroupMessage = (openGroupServerID != null)
|
|
// Parse the envelope
|
|
val envelope = SignalServiceProtos.Envelope.parseFrom(data)
|
|
// Decrypt the contents
|
|
val ciphertext = envelope.content ?: run {
|
|
throw Error.NoData
|
|
}
|
|
var plaintext: ByteArray? = null
|
|
var sender: String? = null
|
|
var groupPublicKey: String? = null
|
|
if (isOpenGroupMessage) {
|
|
plaintext = envelope.content.toByteArray()
|
|
sender = envelope.source
|
|
} else {
|
|
when (envelope.type) {
|
|
SignalServiceProtos.Envelope.Type.SESSION_MESSAGE -> {
|
|
if (IdPrefix.fromValue(envelope.source)?.isBlinded() == true) {
|
|
openGroupPublicKey ?: throw Error.InvalidGroupPublicKey
|
|
otherBlindedPublicKey ?: throw Error.DecryptionFailed
|
|
val decryptionResult = MessageDecrypter.decryptBlinded(
|
|
ciphertext.toByteArray(),
|
|
isOutgoing ?: false,
|
|
otherBlindedPublicKey,
|
|
openGroupPublicKey
|
|
)
|
|
plaintext = decryptionResult.first
|
|
sender = decryptionResult.second
|
|
} else {
|
|
val userX25519KeyPair = MessagingModuleConfiguration.shared.storage.getUserX25519KeyPair()
|
|
val decryptionResult = MessageDecrypter.decrypt(ciphertext.toByteArray(), userX25519KeyPair)
|
|
plaintext = decryptionResult.first
|
|
sender = decryptionResult.second
|
|
}
|
|
}
|
|
SignalServiceProtos.Envelope.Type.CLOSED_GROUP_MESSAGE -> {
|
|
val hexEncodedGroupPublicKey = envelope.source
|
|
if (hexEncodedGroupPublicKey == null || !MessagingModuleConfiguration.shared.storage.isClosedGroup(hexEncodedGroupPublicKey)) {
|
|
throw Error.InvalidGroupPublicKey
|
|
}
|
|
val encryptionKeyPairs = MessagingModuleConfiguration.shared.storage.getClosedGroupEncryptionKeyPairs(hexEncodedGroupPublicKey)
|
|
if (encryptionKeyPairs.isEmpty()) {
|
|
throw Error.NoGroupKeyPair
|
|
}
|
|
// Loop through all known group key pairs in reverse order (i.e. try the latest key pair first (which'll more than
|
|
// likely be the one we want) but try older ones in case that didn't work)
|
|
var encryptionKeyPair = encryptionKeyPairs.removeLast()
|
|
fun decrypt() {
|
|
try {
|
|
val decryptionResult = MessageDecrypter.decrypt(ciphertext.toByteArray(), encryptionKeyPair)
|
|
plaintext = decryptionResult.first
|
|
sender = decryptionResult.second
|
|
} catch (e: Exception) {
|
|
if (encryptionKeyPairs.isNotEmpty()) {
|
|
encryptionKeyPair = encryptionKeyPairs.removeLast()
|
|
decrypt()
|
|
} else {
|
|
Log.e("Loki", "Failed to decrypt group message", e)
|
|
throw e
|
|
}
|
|
}
|
|
}
|
|
groupPublicKey = envelope.source
|
|
decrypt()
|
|
}
|
|
else -> {
|
|
throw Error.UnknownEnvelopeType
|
|
}
|
|
}
|
|
}
|
|
// Don't process the envelope any further if the sender is blocked
|
|
if (isBlocked(sender!!)) {
|
|
throw Error.SenderBlocked
|
|
}
|
|
// Parse the proto
|
|
val proto = SignalServiceProtos.Content.parseFrom(PushTransportDetails.getStrippedPaddingMessageBody(plaintext))
|
|
// Parse the message
|
|
val message: Message = ReadReceipt.fromProto(proto) ?:
|
|
TypingIndicator.fromProto(proto) ?:
|
|
ClosedGroupControlMessage.fromProto(proto) ?:
|
|
DataExtractionNotification.fromProto(proto) ?:
|
|
ExpirationTimerUpdate.fromProto(proto) ?:
|
|
ConfigurationMessage.fromProto(proto) ?:
|
|
UnsendRequest.fromProto(proto) ?:
|
|
MessageRequestResponse.fromProto(proto) ?:
|
|
CallMessage.fromProto(proto) ?:
|
|
SharedConfigurationMessage.fromProto(proto) ?:
|
|
VisibleMessage.fromProto(proto) ?: run {
|
|
throw Error.UnknownMessage
|
|
}
|
|
val isUserBlindedSender = sender == openGroupPublicKey?.let { SodiumUtilities.blindedKeyPair(it, MessagingModuleConfiguration.shared.getUserED25519KeyPair()!!) }?.let { SessionId(IdPrefix.BLINDED, it.publicKey.asBytes).hexString }
|
|
// Ignore self send if needed
|
|
if (!message.isSelfSendValid && (sender == userPublicKey || isUserBlindedSender)) {
|
|
throw Error.SelfSend
|
|
}
|
|
if (sender == userPublicKey || isUserBlindedSender) {
|
|
message.isSenderSelf = true
|
|
}
|
|
// Guard against control messages in open groups
|
|
if (isOpenGroupMessage && message !is VisibleMessage) {
|
|
throw Error.InvalidMessage
|
|
}
|
|
// Finish parsing
|
|
message.sender = sender
|
|
message.recipient = userPublicKey
|
|
message.sentTimestamp = envelope.timestamp
|
|
message.receivedTimestamp = if (envelope.hasServerTimestamp()) envelope.serverTimestamp else SnodeAPI.nowWithOffset
|
|
message.groupPublicKey = groupPublicKey
|
|
message.openGroupServerMessageID = openGroupServerID
|
|
// Validate
|
|
var isValid = message.isValid()
|
|
if (message is VisibleMessage && !isValid && proto.dataMessage.attachmentsCount != 0) { isValid = true }
|
|
if (!isValid) {
|
|
throw Error.InvalidMessage
|
|
}
|
|
// If the message failed to process the first time around we retry it later (if the error is retryable). In this case the timestamp
|
|
// will already be in the database but we don't want to treat the message as a duplicate. The isRetry flag is a simple workaround
|
|
// for this issue.
|
|
if (groupPublicKey != null && groupPublicKey !in (currentClosedGroups ?: emptySet())) {
|
|
throw Error.NoGroupThread
|
|
}
|
|
if ((message is ClosedGroupControlMessage && message.kind is ClosedGroupControlMessage.Kind.New) || message is SharedConfigurationMessage) {
|
|
// Allow duplicates in this case to avoid the following situation:
|
|
// • The app performed a background poll or received a push notification
|
|
// • This method was invoked and the received message timestamps table was updated
|
|
// • Processing wasn't finished
|
|
// • The user doesn't see the new closed group
|
|
// also allow shared configuration messages to be duplicates since we track hashes separately use seqno for conflict resolution
|
|
} else {
|
|
if (storage.isDuplicateMessage(envelope.timestamp)) { throw Error.DuplicateMessage }
|
|
storage.addReceivedMessageTimestamp(envelope.timestamp)
|
|
}
|
|
// Return
|
|
return Pair(message, proto)
|
|
}
|
|
} |