import { GroupPubkeyType } from 'libsession_util_nodejs'; import { Snode } from '../../../data/data'; import { updateIsOnline } from '../../../state/ducks/onion'; import { GetNetworkTime } from './getNetworkTime'; import { SnodeNamespace, SnodeNamespaces, SnodeNamespacesGroup } from './namespaces'; import { UserGroupsWrapperActions } from '../../../webworker/workers/browser/libsession_worker_interface'; import { TTL_DEFAULT } from '../../constants'; import { ed25519Str } from '../../onions/onionPath'; import { PubKey } from '../../types'; import { RetrieveGroupSubRequest, RetrieveLegacyClosedGroupSubRequest, RetrieveUserSubRequest, UpdateExpiryOnNodeGroupSubRequest, UpdateExpiryOnNodeUserSubRequest, } from './SnodeRequestTypes'; import { doUnsignedSnodeBatchRequest } from './batchRequest'; import { RetrieveMessagesResultsBatched, RetrieveMessagesResultsContent } from './types'; type RetrieveParams = { pubkey: string; last_hash: string; timestamp: number; max_size: number | undefined; }; async function retrieveRequestForUs({ namespace, retrieveParam, }: { namespace: SnodeNamespaces; retrieveParam: RetrieveParams; }) { if (!SnodeNamespace.isUserConfigNamespace(namespace) && namespace !== SnodeNamespaces.Default) { throw new Error(`retrieveRequestForUs not a valid namespace to retrieve as us:${namespace}`); } return new RetrieveUserSubRequest({ last_hash: retrieveParam.last_hash, max_size: retrieveParam.max_size, namespace, }); } /** * Retrieve for legacy groups are not authenticated so no need to sign the request */ function retrieveRequestForLegacyGroup({ namespace, ourPubkey, pubkey, retrieveParam, }: { pubkey: string; namespace: SnodeNamespaces.LegacyClosedGroup; ourPubkey: string; retrieveParam: RetrieveParams; }) { if (pubkey === ourPubkey || !PubKey.is05Pubkey(pubkey)) { throw new Error( 'namespace -10 can only be used to retrieve messages from a legacy closed group (prefix 05)' ); } if (namespace !== SnodeNamespaces.LegacyClosedGroup) { throw new Error(`retrieveRequestForLegacyGroup namespace can only be -10`); } // if we give a timestamp, a signature will be required by the service node, and we don't want to provide one as this is an unauthenticated namespace return new RetrieveLegacyClosedGroupSubRequest({ last_hash: retrieveParam.last_hash, max_size: retrieveParam.max_size, legacyGroupPk: pubkey, }); } /** * Retrieve for groups (03-prefixed) are authenticated with the admin key if we have it, or with our subkey auth */ async function retrieveRequestForGroup({ namespace, groupPk, retrieveParam, }: { groupPk: GroupPubkeyType; namespace: SnodeNamespacesGroup; retrieveParam: RetrieveParams; }) { if (!PubKey.is03Pubkey(groupPk)) { throw new Error('retrieveRequestForGroup: not a 03 group'); } if (!SnodeNamespace.isGroupNamespace(namespace)) { throw new Error(`retrieveRequestForGroup: not a groupNamespace: ${namespace}`); } const group = await UserGroupsWrapperActions.getGroup(groupPk); return new RetrieveGroupSubRequest({ last_hash: retrieveParam.last_hash, namespace, max_size: retrieveParam.max_size, groupDetailsNeededForSignature: group, }); } type RetrieveSubRequestType = | RetrieveLegacyClosedGroupSubRequest | RetrieveUserSubRequest | RetrieveGroupSubRequest | UpdateExpiryOnNodeUserSubRequest | UpdateExpiryOnNodeGroupSubRequest; async function buildRetrieveRequest( lastHashes: Array, pubkey: string, namespaces: Array, ourPubkey: string, configHashesToBump: Array | null ) { const isUs = pubkey === ourPubkey; const maxSizeMap = SnodeNamespace.maxSizeMap(namespaces); const now = GetNetworkTime.now(); const retrieveRequestsParams: Array = await Promise.all( namespaces.map(async (namespace, index) => { const foundMaxSize = maxSizeMap.find(m => m.namespace === namespace)?.maxSize; const retrieveParam = { pubkey, last_hash: lastHashes.at(index) || '', timestamp: now, max_size: foundMaxSize, }; if (namespace === SnodeNamespaces.LegacyClosedGroup) { return retrieveRequestForLegacyGroup({ namespace, ourPubkey, pubkey, retrieveParam }); } if (PubKey.is03Pubkey(pubkey)) { if (!SnodeNamespace.isGroupNamespace(namespace)) { // either config or messages namespaces for 03 groups throw new Error(`tried to poll from a non 03 group namespace ${namespace}`); } return retrieveRequestForGroup({ namespace, groupPk: pubkey, retrieveParam }); } // all legacy closed group retrieves are unauthenticated and run above. // if we get here, this can only be a retrieve for our own swarm, which must be authenticated return retrieveRequestForUs({ namespace, retrieveParam }); }) ); const expiryMs = GetNetworkTime.now() + TTL_DEFAULT.CONFIG_MESSAGE; if (configHashesToBump?.length && isUs) { const request = new UpdateExpiryOnNodeUserSubRequest({ expiryMs, messagesHashes: configHashesToBump, shortenOrExtend: '', }); retrieveRequestsParams.push(request); return retrieveRequestsParams; } if (configHashesToBump?.length && PubKey.is03Pubkey(pubkey)) { const group = await UserGroupsWrapperActions.getGroup(pubkey); if (!group) { window.log.warn( `trying to retrieve fopr group ${ed25519Str( pubkey )} but we are missing the details in the usergroup wrapper` ); throw new Error('retrieve request is missing group details'); } retrieveRequestsParams.push( new UpdateExpiryOnNodeGroupSubRequest({ expiryMs, messagesHashes: configHashesToBump, shortenOrExtend: '', groupDetailsNeededForSignature: group, }) ); } return retrieveRequestsParams; } async function retrieveNextMessages( targetNode: Snode, lastHashes: Array, associatedWith: string, namespaces: Array, ourPubkey: string, configHashesToBump: Array | null ): Promise { if (namespaces.length !== lastHashes.length) { throw new Error('namespaces and lasthashes does not match'); } const rawRequests = await buildRetrieveRequest( lastHashes, associatedWith, namespaces, ourPubkey, configHashesToBump ); // let exceptions bubble up // no retry for this one as this a call we do every few seconds while polling for messages const results = await doUnsignedSnodeBatchRequest(rawRequests, targetNode, 4000, associatedWith); if (!results || !results.length) { window?.log?.warn( `_retrieveNextMessages - sessionRpc could not talk to ${targetNode.ip}:${targetNode.port}` ); throw new Error( `_retrieveNextMessages - sessionRpc could not talk to ${targetNode.ip}:${targetNode.port}` ); } // the +1 is to take care of the extra `expire` method added once user config is released if (results.length !== namespaces.length && results.length !== namespaces.length + 1) { throw new Error( `We asked for updates about ${namespaces.length} messages but got results of length ${results.length}` ); } // do a basic check to know if we have something kind of looking right (status 200 should always be there for a retrieve) const firstResult = results[0]; if (firstResult.code !== 200) { window?.log?.warn(`retrieveNextMessages result is not 200 but ${firstResult.code}`); throw new Error( `_retrieveNextMessages - retrieve result is not 200 with ${targetNode.ip}:${targetNode.port} but ${firstResult.code}` ); } if (!window.inboxStore?.getState().onionPaths.isOnline) { window.inboxStore?.dispatch(updateIsOnline(true)); } try { // we rely on the code of the first one to check for online status const bodyFirstResult = firstResult.body; GetNetworkTime.handleTimestampOffsetFromNetwork('retrieve', bodyFirstResult.t); // merge results with their corresponding namespaces return results.map((result, index) => ({ code: result.code, messages: result.body as RetrieveMessagesResultsContent, namespace: namespaces[index], })); } catch (e) { window?.log?.warn('exception while parsing json of nextMessage:', e); throw new Error( `_retrieveNextMessages - exception while parsing json of nextMessage ${targetNode.ip}:${targetNode.port}: ${e?.message}` ); } } export const SnodeAPIRetrieve = { retrieveNextMessages };