TM-SGNL-iOS/SignalServiceKit/Account/PreKeys/PrekeyManagerImpl.swift
TeleMessage developers dde0620daf initial commit
2025-05-03 12:28:28 -07:00

339 lines
14 KiB
Swift

//
// Copyright 2023 Signal Messenger, LLC
// SPDX-License-Identifier: AGPL-3.0-only
//
import Foundation
/// Boradly speaking, this class does not perform PreKey operations. It just manages scheduling
/// them (they must occur in serial), including deciding which need to happen in the first place.
/// Actual execution is handed off to ``PreKeyTaskManager``.
public class PreKeyManagerImpl: PreKeyManager {
public enum Constants {
// How often we check prekey state on app activation.
static let oneTimePreKeyCheckFrequencySeconds = 12 * kHourInterval
// Maximum amount of time that can elapse without rotating signed prekeys
// before the message sending is disabled.
static let SignedPreKeyMaxRotationDuration = (14 * kDayInterval)
fileprivate static let preKeyRotationVersion = 1
fileprivate static let aciPreKeyRotationVersionKey = "ACIPreKeyRotationVersion"
fileprivate static let pniPreKeyRotationVersionKey = "PNIPreKeyRotationVersion"
}
/// PreKey state lives in two places - on the client and on the service.
/// Some of our pre-key operations depend on the service state, e.g. we need to check our one-time-prekey count
/// before we decide to upload new ones. This potentially entails multiple async operations, all of which should
/// complete before starting any other pre-key operation. That's why they must run in serial.
private static let taskQueue = SerialTaskQueue()
private let db: any DB
private let identityManager: PreKey.Shims.IdentityManager
private let keyValueStore: KeyValueStore
private let protocolStoreManager: SignalProtocolStoreManager
private let chatConnectionManager: any ChatConnectionManager
private let tsAccountManager: any TSAccountManager
private let taskManager: PreKeyTaskManager
init(
dateProvider: @escaping DateProvider,
db: any DB,
identityManager: PreKey.Shims.IdentityManager,
linkedDevicePniKeyManager: LinkedDevicePniKeyManager,
messageProcessor: PreKey.Shims.MessageProcessor,
preKeyTaskAPIClient: PreKeyTaskAPIClient,
protocolStoreManager: SignalProtocolStoreManager,
chatConnectionManager: any ChatConnectionManager,
tsAccountManager: TSAccountManager
) {
self.db = db
self.identityManager = identityManager
self.keyValueStore = KeyValueStore(collection: "PreKeyManager")
self.protocolStoreManager = protocolStoreManager
self.chatConnectionManager = chatConnectionManager
self.tsAccountManager = tsAccountManager
self.taskManager = PreKeyTaskManager(
apiClient: preKeyTaskAPIClient,
dateProvider: dateProvider,
db: db,
identityManager: identityManager,
linkedDevicePniKeyManager: linkedDevicePniKeyManager,
messageProcessor: messageProcessor,
protocolStoreManager: protocolStoreManager,
tsAccountManager: tsAccountManager
)
}
@Atomic private var lastOneTimePreKeyCheckTimestamp: Date?
private func needsSignedPreKeyRotation(identity: OWSIdentity, tx: DBReadTransaction) -> Bool {
let store = protocolStoreManager.signalProtocolStore(for: identity).signedPreKeyStore
guard let lastSuccessDate = store.getLastSuccessfulRotationDate(tx: tx) else {
return true
}
return lastSuccessDate.addingTimeInterval(Constants.SignedPreKeyMaxRotationDuration) < Date()
}
private func needsLastResortPreKeyRotation(identity: OWSIdentity, tx: DBReadTransaction) -> Bool {
let store = protocolStoreManager.signalProtocolStore(for: identity).kyberPreKeyStore
guard let lastSuccessDate = store.getLastSuccessfulRotationDate(tx: tx) else {
return true
}
return lastSuccessDate.addingTimeInterval(Constants.SignedPreKeyMaxRotationDuration) < Date()
}
public func isAppLockedDueToPreKeyUpdateFailures(tx: DBReadTransaction) -> Bool {
let shouldCheckPniState = hasPniIdentityKey(tx: tx)
let needPreKeyRotation =
needsSignedPreKeyRotation(identity: .aci, tx: tx)
|| (
shouldCheckPniState
&& needsSignedPreKeyRotation(identity: .pni, tx: tx)
)
let needLastResortKeyRotation =
needsLastResortPreKeyRotation(identity: .aci, tx: tx)
|| (
shouldCheckPniState
&& needsLastResortPreKeyRotation(identity: .pni, tx: tx)
)
return needPreKeyRotation || needLastResortKeyRotation
}
private func refreshOneTimePreKeysCheckDidSucceed() {
lastOneTimePreKeyCheckTimestamp = Date()
}
public func checkPreKeysIfNecessary(tx: DBReadTransaction) {
checkPreKeys(shouldThrottle: true, tx: tx)
}
fileprivate func checkPreKeys(shouldThrottle: Bool, tx: DBReadTransaction) {
guard
CurrentAppContext().isMainAppAndActive
else {
return
}
let shouldCheckOneTimePrekeys = {
if
shouldThrottle,
let lastOneTimePreKeyCheckTimestamp,
fabs(lastOneTimePreKeyCheckTimestamp.timeIntervalSinceNow) < Constants.oneTimePreKeyCheckFrequencySeconds
{
return false
}
return true
}()
var targets: PreKey.Target = [.signedPreKey, .lastResortPqPreKey]
if shouldCheckOneTimePrekeys {
targets.insert(target: .oneTimePreKey)
targets.insert(target: .oneTimePqPreKey)
}
let shouldPerformPniOp = hasPniIdentityKey(tx: tx)
Task { [weak self, chatConnectionManager, taskManager, targets] in
let task = Self.taskQueue.enqueue {
try await chatConnectionManager.waitForIdentifiedConnectionToOpen()
try Task.checkCancellation()
try await taskManager.refresh(identity: .aci, targets: targets, auth: .implicit())
if shouldPerformPniOp {
try Task.checkCancellation()
try await taskManager.refresh(identity: .pni, targets: targets, auth: .implicit())
}
}
try await task.value
if shouldCheckOneTimePrekeys {
self?.refreshOneTimePreKeysCheckDidSucceed()
}
}
}
public func createPreKeysForRegistration() -> Task<RegistrationPreKeyUploadBundles, Error> {
PreKey.logger.info("Create registration prekeys")
/// Note that we do not report a `refreshOneTimePreKeysCheckDidSucceed`
/// because this operation does not generate one time prekeys, so we
/// shouldn't mark the routine refresh as having been "checked".
return Self.taskQueue.enqueueCancellingPrevious { [taskManager] in
return try await taskManager.createForRegistration()
}
}
public func createPreKeysForProvisioning(
aciIdentityKeyPair: ECKeyPair,
pniIdentityKeyPair: ECKeyPair
) -> Task<RegistrationPreKeyUploadBundles, Error> {
PreKey.logger.info("Create provisioning prekeys")
/// Note that we do not report a `refreshOneTimePreKeysCheckDidSucceed`
/// because this operation does not generate one time prekeys, so we
/// shouldn't mark the routine refresh as having been "checked".
return Self.taskQueue.enqueueCancellingPrevious { [taskManager] in
return try await taskManager.createForProvisioning(
aciIdentityKeyPair: aciIdentityKeyPair,
pniIdentityKeyPair: pniIdentityKeyPair
)
}
}
public func finalizeRegistrationPreKeys(
_ bundles: RegistrationPreKeyUploadBundles,
uploadDidSucceed: Bool
) -> Task<Void, Error> {
PreKey.logger.info("Finalize registration prekeys")
return Self.taskQueue.enqueue { [taskManager] in
try await taskManager.persistAfterRegistration(
bundles: bundles,
uploadDidSucceed: uploadDidSucceed
)
}
}
public func rotateOneTimePreKeysForRegistration(auth: ChatServiceAuth) -> Task<Void, Error> {
PreKey.logger.info("Rotate one-time prekeys for registration")
return Self.taskQueue.enqueue { [weak self, taskManager] in
try Task.checkCancellation()
try await taskManager.createOneTimePreKeys(identity: .aci, auth: auth)
try Task.checkCancellation()
try await taskManager.createOneTimePreKeys(identity: .pni, auth: auth)
self?.refreshOneTimePreKeysCheckDidSucceed()
}
}
public func rotateSignedPreKeys() -> Task<Void, Error> {
PreKey.logger.info("Rotate signed prekeys")
let targets: PreKey.Target = [.signedPreKey, .lastResortPqPreKey]
let shouldPerformPniOp = db.read(block: hasPniIdentityKey(tx:))
return Self.taskQueue.enqueue { [chatConnectionManager, taskManager, targets] in
if OWSChatConnection.canAppUseSocketsToMakeRequests {
try await chatConnectionManager.waitForIdentifiedConnectionToOpen()
} else {
// TODO: Migrate the NSE to use web sockets.
// The NSE generally launches only when network is available, and we try to
// run this only when we have network, but it's not harmful if that's not
// true, so this is fine.
}
try Task.checkCancellation()
try await taskManager.rotate(identity: .aci, targets: targets, auth: .implicit())
if shouldPerformPniOp {
try Task.checkCancellation()
try await taskManager.rotate(identity: .pni, targets: targets, auth: .implicit())
}
}
}
/// Refresh one-time pre-keys for the given identity, and optionally refresh
/// the signed pre-key.
public func refreshOneTimePreKeys(
forIdentity identity: OWSIdentity,
alsoRefreshSignedPreKey shouldRefreshSignedPreKey: Bool
) {
Task {
try? await self._refreshOneTimePreKeys(
forIdentity: identity,
alsoRefreshSignedPreKey: shouldRefreshSignedPreKey
)
}
}
private func _refreshOneTimePreKeys(
forIdentity identity: OWSIdentity,
alsoRefreshSignedPreKey shouldRefreshSignedPreKey: Bool
) async throws {
PreKey.logger.info("[\(identity)] Force refresh onetime prekeys (also refresh signed pre key? \(shouldRefreshSignedPreKey))")
/// Note that we do not report a `refreshOneTimePreKeysCheckDidSucceed`
/// because this operation does not generate BOTH types of one time prekeys,
/// so we shouldn't mark the routine refresh as having been "checked".
var targets: PreKey.Target = [.oneTimePreKey, .oneTimePqPreKey]
if shouldRefreshSignedPreKey {
targets.insert(.signedPreKey)
targets.insert(target: .lastResortPqPreKey)
}
let task = Self.taskQueue.enqueue { [taskManager, targets] in
try Task.checkCancellation()
try await taskManager.refresh(
identity: identity,
targets: targets,
force: true,
auth: .implicit()
)
}
try await task.value
}
/// If we don't have a PNI identity key, we should not run PNI operations.
/// If we try, they will fail, and we will count the joint pni+aci operation as failed.
private func hasPniIdentityKey(tx: DBReadTransaction) -> Bool {
return self.identityManager.identityKeyPair(for: .pni, tx: tx) != nil
}
public func rotatePreKeysOnUpgradeIfNecessary(for identity: OWSIdentity) async {
let keyValueStoreKey: String = {
switch identity {
case .aci:
return Constants.aciPreKeyRotationVersionKey
case .pni:
return Constants.pniPreKeyRotationVersionKey
}
}()
let preKeyRotationVersion = db.read { tx in
return keyValueStore.getInt(keyValueStoreKey, defaultValue: 0, transaction: tx)
}
guard preKeyRotationVersion < Constants.preKeyRotationVersion else {
return
}
var retryInterval: TimeInterval = 0.5
while db.read(block: tsAccountManager.registrationState(tx:)).isRegistered {
do {
if OWSChatConnection.canAppUseSocketsToMakeRequests {
try await chatConnectionManager.waitForIdentifiedConnectionToOpen()
} else {
// TODO: Migrate the NSE to use web sockets.
// The NSE generally launches only when network is available, and we try to
// run this only when we have network, but it's not harmful if that's not
// true, so this is fine.
}
try await _refreshOneTimePreKeys(forIdentity: identity, alsoRefreshSignedPreKey: true)
break
} catch {
Logger.warn("Couldn't rotate pre keys: \(error)")
try? await Task.sleep(nanoseconds: UInt64(retryInterval * TimeInterval(NSEC_PER_SEC)))
retryInterval *= 2
}
}
await db.awaitableWrite { [keyValueStore] tx in
keyValueStore.setInt(
Constants.preKeyRotationVersion,
key: keyValueStoreKey,
transaction: tx
)
}
}
}
// MARK: - Debug UI
#if TESTABLE_BUILD
public extension PreKeyManagerImpl {
func checkPreKeysImmediately(tx: DBReadTransaction) {
checkPreKeys(shouldThrottle: false, tx: tx)
}
}
#endif