summaryrefslogtreecommitdiffstats
path: root/vendor/go.mau.fi/whatsmeow/retry.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2022-01-31 00:27:37 +0100
committerWim <wim@42.be>2022-03-20 14:57:48 +0100
commite3cafeaf9292f67459ff1d186f68283bfaedf2ae (patch)
treeb69c39620aa91dba695b3b935c6651c0fb37ce75 /vendor/go.mau.fi/whatsmeow/retry.go
parente7b193788a56ee7cdb02a87a9db0ad6724ef66d5 (diff)
downloadmatterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.tar.gz
matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.tar.bz2
matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.zip
Add dependencies/vendor (whatsapp)
Diffstat (limited to 'vendor/go.mau.fi/whatsmeow/retry.go')
-rw-r--r--vendor/go.mau.fi/whatsmeow/retry.go264
1 files changed, 264 insertions, 0 deletions
diff --git a/vendor/go.mau.fi/whatsmeow/retry.go b/vendor/go.mau.fi/whatsmeow/retry.go
new file mode 100644
index 00000000..5cc460f9
--- /dev/null
+++ b/vendor/go.mau.fi/whatsmeow/retry.go
@@ -0,0 +1,264 @@
+// Copyright (c) 2021 Tulir Asokan
+//
+// This Source Code Form is subject to the terms of the Mozilla Public
+// License, v. 2.0. If a copy of the MPL was not distributed with this
+// file, You can obtain one at http://mozilla.org/MPL/2.0/.
+
+package whatsmeow
+
+import (
+ "encoding/binary"
+ "fmt"
+ "time"
+
+ "go.mau.fi/libsignal/ecc"
+ "go.mau.fi/libsignal/groups"
+ "go.mau.fi/libsignal/keys/prekey"
+ "go.mau.fi/libsignal/protocol"
+ "google.golang.org/protobuf/proto"
+
+ waBinary "go.mau.fi/whatsmeow/binary"
+ waProto "go.mau.fi/whatsmeow/binary/proto"
+ "go.mau.fi/whatsmeow/types"
+ "go.mau.fi/whatsmeow/types/events"
+)
+
+// Number of sent messages to cache in memory for handling retry receipts.
+const recentMessagesSize = 256
+
+type recentMessageKey struct {
+ To types.JID
+ ID types.MessageID
+}
+
+// RecentMessage contains the info needed to re-send a message when another device fails to decrypt it.
+type RecentMessage struct {
+ Proto *waProto.Message
+ Timestamp time.Time
+}
+
+func (cli *Client) addRecentMessage(to types.JID, id types.MessageID, message *waProto.Message) {
+ cli.recentMessagesLock.Lock()
+ key := recentMessageKey{to, id}
+ if cli.recentMessagesList[cli.recentMessagesPtr].ID != "" {
+ delete(cli.recentMessagesMap, cli.recentMessagesList[cli.recentMessagesPtr])
+ }
+ cli.recentMessagesMap[key] = message
+ cli.recentMessagesList[cli.recentMessagesPtr] = key
+ cli.recentMessagesPtr++
+ if cli.recentMessagesPtr >= len(cli.recentMessagesList) {
+ cli.recentMessagesPtr = 0
+ }
+ cli.recentMessagesLock.Unlock()
+}
+
+func (cli *Client) getRecentMessage(to types.JID, id types.MessageID) *waProto.Message {
+ cli.recentMessagesLock.RLock()
+ msg, _ := cli.recentMessagesMap[recentMessageKey{to, id}]
+ cli.recentMessagesLock.RUnlock()
+ return msg
+}
+
+func (cli *Client) getMessageForRetry(receipt *events.Receipt, messageID types.MessageID) (*waProto.Message, error) {
+ msg := cli.getRecentMessage(receipt.Chat, messageID)
+ if msg == nil {
+ msg = cli.GetMessageForRetry(receipt.Chat, messageID)
+ if msg == nil {
+ return nil, fmt.Errorf("couldn't find message %s", messageID)
+ } else {
+ cli.Log.Debugf("Found message in GetMessageForRetry to accept retry receipt for %s/%s from %s", receipt.Chat, messageID, receipt.Sender)
+ }
+ } else {
+ cli.Log.Debugf("Found message in local cache to accept retry receipt for %s/%s from %s", receipt.Chat, messageID, receipt.Sender)
+ }
+ return proto.Clone(msg).(*waProto.Message), nil
+}
+
+// handleRetryReceipt handles an incoming retry receipt for an outgoing message.
+func (cli *Client) handleRetryReceipt(receipt *events.Receipt, node *waBinary.Node) error {
+ retryChild, ok := node.GetOptionalChildByTag("retry")
+ if !ok {
+ return &ElementMissingError{Tag: "retry", In: "retry receipt"}
+ }
+ ag := retryChild.AttrGetter()
+ messageID := ag.String("id")
+ timestamp := time.Unix(ag.Int64("t"), 0)
+ retryCount := ag.Int("count")
+ if !ag.OK() {
+ return ag.Error()
+ }
+ msg, err := cli.getMessageForRetry(receipt, messageID)
+ if err != nil {
+ return err
+ }
+
+ if receipt.IsGroup {
+ builder := groups.NewGroupSessionBuilder(cli.Store, pbSerializer)
+ senderKeyName := protocol.NewSenderKeyName(receipt.Chat.String(), cli.Store.ID.SignalAddress())
+ signalSKDMessage, err := builder.Create(senderKeyName)
+ if err != nil {
+ cli.Log.Warnf("Failed to create sender key distribution message to include in retry of %s in %s to %s: %v", messageID, receipt.Chat, receipt.Sender, err)
+ } else {
+ msg.SenderKeyDistributionMessage = &waProto.SenderKeyDistributionMessage{
+ GroupId: proto.String(receipt.Chat.String()),
+ AxolotlSenderKeyDistributionMessage: signalSKDMessage.Serialize(),
+ }
+ }
+ } else if receipt.IsFromMe {
+ msg = &waProto.Message{
+ DeviceSentMessage: &waProto.DeviceSentMessage{
+ DestinationJid: proto.String(receipt.Chat.String()),
+ Message: msg,
+ },
+ }
+ }
+
+ if cli.PreRetryCallback != nil && !cli.PreRetryCallback(receipt, retryCount, msg) {
+ cli.Log.Debugf("Cancelled retry receipt in PreRetryCallback")
+ return nil
+ }
+
+ plaintext, err := proto.Marshal(msg)
+ if err != nil {
+ return fmt.Errorf("failed to marshal message: %w", err)
+ }
+ _, hasKeys := node.GetOptionalChildByTag("keys")
+ var bundle *prekey.Bundle
+ if hasKeys {
+ bundle, err = nodeToPreKeyBundle(uint32(receipt.Sender.Device), *node)
+ if err != nil {
+ return fmt.Errorf("failed to read prekey bundle in retry receipt: %w", err)
+ }
+ } else if retryCount >= 2 || !cli.Store.ContainsSession(receipt.Sender.SignalAddress()) {
+ if retryCount >= 2 {
+ cli.Log.Debugf("Fetching prekeys for %s due to retry receipt with count>1 but no prekey bundle", receipt.Sender)
+ } else {
+ cli.Log.Debugf("Fetching prekeys for %s for handling retry receipt because we don't have a Signal session with them", receipt.Sender)
+ }
+ var keys map[types.JID]preKeyResp
+ keys, err = cli.fetchPreKeys([]types.JID{receipt.Sender})
+ if err != nil {
+ return err
+ }
+ senderAD := receipt.Sender
+ senderAD.AD = true
+ bundle, err = keys[senderAD].bundle, keys[senderAD].err
+ if err != nil {
+ return fmt.Errorf("failed to fetch prekeys: %w", err)
+ } else if bundle == nil {
+ return fmt.Errorf("didn't get prekey bundle for %s (response size: %d)", senderAD, len(keys))
+ }
+ }
+ encrypted, includeDeviceIdentity, err := cli.encryptMessageForDevice(plaintext, receipt.Sender, bundle)
+ if err != nil {
+ return fmt.Errorf("failed to encrypt message for retry: %w", err)
+ }
+ encrypted.Attrs["count"] = retryCount
+
+ attrs := waBinary.Attrs{
+ "to": node.Attrs["from"],
+ "type": "text",
+ "id": messageID,
+ "t": timestamp.Unix(),
+ }
+ if participant, ok := node.Attrs["participant"]; ok {
+ attrs["participant"] = participant
+ }
+ if recipient, ok := node.Attrs["recipient"]; ok {
+ attrs["recipient"] = recipient
+ }
+ if edit, ok := node.Attrs["edit"]; ok {
+ attrs["edit"] = edit
+ }
+ req := waBinary.Node{
+ Tag: "message",
+ Attrs: attrs,
+ Content: []waBinary.Node{*encrypted},
+ }
+ if includeDeviceIdentity {
+ err = cli.appendDeviceIdentityNode(&req)
+ if err != nil {
+ return fmt.Errorf("failed to add device identity to retry message: %w", err)
+ }
+ }
+ err = cli.sendNode(req)
+ if err != nil {
+ return fmt.Errorf("failed to send retry message: %w", err)
+ }
+ cli.Log.Debugf("Sent retry #%d for %s/%s to %s", retryCount, receipt.Chat, messageID, receipt.Sender)
+ return nil
+}
+
+// sendRetryReceipt sends a retry receipt for an incoming message.
+func (cli *Client) sendRetryReceipt(node *waBinary.Node, forceIncludeIdentity bool) {
+ id, _ := node.Attrs["id"].(string)
+ children := node.GetChildren()
+ var retryCountInMsg int
+ if len(children) == 1 && children[0].Tag == "enc" {
+ retryCountInMsg = children[0].AttrGetter().OptionalInt("count")
+ }
+
+ cli.messageRetriesLock.Lock()
+ cli.messageRetries[id]++
+ retryCount := cli.messageRetries[id]
+ // In case the message is a retry response, and we restarted in between, find the count from the message
+ if retryCount == 1 && retryCountInMsg > 0 {
+ retryCount = retryCountInMsg + 1
+ cli.messageRetries[id] = retryCount
+ }
+ cli.messageRetriesLock.Unlock()
+ if retryCount >= 5 {
+ cli.Log.Warnf("Not sending any more retry receipts for %s", id)
+ return
+ }
+
+ var registrationIDBytes [4]byte
+ binary.BigEndian.PutUint32(registrationIDBytes[:], cli.Store.RegistrationID)
+ attrs := waBinary.Attrs{
+ "id": id,
+ "type": "retry",
+ "to": node.Attrs["from"],
+ }
+ if recipient, ok := node.Attrs["recipient"]; ok {
+ attrs["recipient"] = recipient
+ }
+ if participant, ok := node.Attrs["participant"]; ok {
+ attrs["participant"] = participant
+ }
+ payload := waBinary.Node{
+ Tag: "receipt",
+ Attrs: attrs,
+ Content: []waBinary.Node{
+ {Tag: "retry", Attrs: waBinary.Attrs{
+ "count": retryCount,
+ "id": id,
+ "t": node.Attrs["t"],
+ "v": 1,
+ }},
+ {Tag: "registration", Content: registrationIDBytes[:]},
+ },
+ }
+ if retryCount > 1 || forceIncludeIdentity {
+ if key, err := cli.Store.PreKeys.GenOnePreKey(); err != nil {
+ cli.Log.Errorf("Failed to get prekey for retry receipt: %v", err)
+ } else if deviceIdentity, err := proto.Marshal(cli.Store.Account); err != nil {
+ cli.Log.Errorf("Failed to marshal account info: %v", err)
+ return
+ } else {
+ payload.Content = append(payload.GetChildren(), waBinary.Node{
+ Tag: "keys",
+ Content: []waBinary.Node{
+ {Tag: "type", Content: []byte{ecc.DjbType}},
+ {Tag: "identity", Content: cli.Store.IdentityKey.Pub[:]},
+ preKeyToNode(key),
+ preKeyToNode(cli.Store.SignedPreKey),
+ {Tag: "device-identity", Content: deviceIdentity},
+ },
+ })
+ }
+ }
+ err := cli.sendNode(payload)
+ if err != nil {
+ cli.Log.Errorf("Failed to send retry receipt for %s: %v", id, err)
+ }
+}