session-ios/SignalServiceKit/src/Loki/API/DotNetAPI.swift

207 lines
11 KiB
Swift
Raw Normal View History

2019-09-26 03:32:47 +02:00
import PromiseKit
2020-06-05 02:38:44 +02:00
import SessionMetadataKit
2019-09-26 03:32:47 +02:00
/// Base class for `FileServerAPI` and `PublicChatAPI`.
public class DotNetAPI : NSObject {
2020-04-21 02:36:23 +02:00
internal static var storage: OWSPrimaryStorage { OWSPrimaryStorage.shared() }
internal static var userKeyPair: ECKeyPair { OWSIdentityManager.shared().identityKeyPair()! }
2019-09-26 03:32:47 +02:00
// MARK: Settings
private static let attachmentType = "network.loki"
2019-09-26 03:32:47 +02:00
// MARK: Error
@objc(LKDotNetAPIError)
public class DotNetAPIError : NSError { // Not called `Error` for Obj-C interoperablity
2020-02-10 05:47:15 +01:00
@objc public static let generic = DotNetAPIError(domain: "DotNetAPIErrorDomain", code: 1, userInfo: [ NSLocalizedDescriptionKey : "An error occurred." ])
@objc public static let parsingFailed = DotNetAPIError(domain: "DotNetAPIErrorDomain", code: 2, userInfo: [ NSLocalizedDescriptionKey : "Invalid file server response." ])
@objc public static let signingFailed = DotNetAPIError(domain: "DotNetAPIErrorDomain", code: 3, userInfo: [ NSLocalizedDescriptionKey : "Couldn't sign message." ])
@objc public static let encryptionFailed = DotNetAPIError(domain: "DotNetAPIErrorDomain", code: 4, userInfo: [ NSLocalizedDescriptionKey : "Couldn't encrypt file." ])
@objc public static let decryptionFailed = DotNetAPIError(domain: "DotNetAPIErrorDomain", code: 5, userInfo: [ NSLocalizedDescriptionKey : "Couldn't decrypt file." ])
@objc public static let maxFileSizeExceeded = DotNetAPIError(domain: "DotNetAPIErrorDomain", code: 6, userInfo: [ NSLocalizedDescriptionKey : "Maximum file size exceeded." ])
2019-09-26 03:32:47 +02:00
}
// MARK: Storage
2019-09-26 03:32:47 +02:00
/// To be overridden by subclasses.
internal class var authTokenCollection: String { preconditionFailure("authTokenCollection is abstract and must be overridden.") }
internal static func getAuthToken(for server: String) -> Promise<String> {
if let token = getAuthTokenFromDatabase(for: server) {
2020-02-17 05:14:00 +01:00
return Promise.value(token)
} else {
2020-06-11 08:33:11 +02:00
return requestNewAuthToken(for: server).then2 { submitAuthToken($0, for: server) }.map2 { token in
try! Storage.writeSync { transaction in
setAuthToken(for: server, to: token, in: transaction)
}
2020-05-06 08:31:03 +02:00
return token
2020-02-17 05:14:00 +01:00
}
}
}
2019-09-26 03:32:47 +02:00
2020-07-21 01:11:26 +02:00
private static func getAuthTokenFromDatabase(for server: String) -> String? {
var result: String? = nil
storage.dbReadConnection.read { transaction in
if transaction.hasObject(forKey: server, inCollection: authTokenCollection) {
result = transaction.object(forKey: server, inCollection: authTokenCollection) as? String
}
}
return result
}
private static func setAuthToken(for server: String, to newValue: String, in transaction: YapDatabaseReadWriteTransaction) {
transaction.setObject(newValue, forKey: server, inCollection: authTokenCollection)
2019-09-26 03:32:47 +02:00
}
2020-06-10 03:06:56 +02:00
public static func clearAuthToken(for server: String) {
try! Storage.writeSync { transaction in
transaction.removeObject(forKey: server, inCollection: authTokenCollection)
2020-06-10 03:06:56 +02:00
}
}
2019-09-26 03:32:47 +02:00
// MARK: Lifecycle
override private init() { }
2020-04-21 02:36:23 +02:00
// MARK: Private API
private static func requestNewAuthToken(for server: String) -> Promise<String> {
print("[Loki] Requesting auth token for server: \(server).")
2020-05-07 03:57:55 +02:00
let queryParameters = "pubKey=\(getUserHexEncodedPublicKey())"
2020-04-21 02:36:23 +02:00
let url = URL(string: "\(server)/loki/v1/get_challenge?\(queryParameters)")!
let request = TSRequest(url: url)
2020-07-24 08:47:51 +02:00
let serverPublicKeyPromise = (server == FileServerAPI.server) ? Promise { $0.fulfill(FileServerAPI.fileServerPublicKey) }
: PublicChatAPI.getOpenGroupServerPublicKey(for: server)
2020-07-23 04:03:39 +02:00
return serverPublicKeyPromise.then2 { serverPublicKey in
OnionRequestAPI.sendOnionRequest(request, to: server, using: serverPublicKey)
}.map2 { rawResponse in
2020-04-21 02:36:23 +02:00
guard let json = rawResponse as? JSON, let base64EncodedChallenge = json["cipherText64"] as? String, let base64EncodedServerPublicKey = json["serverPubKey64"] as? String,
let challenge = Data(base64Encoded: base64EncodedChallenge), var serverPublicKey = Data(base64Encoded: base64EncodedServerPublicKey) else {
throw DotNetAPIError.parsingFailed
2020-04-21 02:36:23 +02:00
}
// Discard the "05" prefix if needed
if serverPublicKey.count == 33 {
let hexEncodedServerPublicKey = serverPublicKey.toHexString()
serverPublicKey = Data.data(fromHex: hexEncodedServerPublicKey.substring(from: 2))!
}
// The challenge is prefixed by the 16 bit IV
guard let tokenAsData = try? DiffieHellman.decrypt(challenge, publicKey: serverPublicKey, privateKey: userKeyPair.privateKey),
let token = String(bytes: tokenAsData, encoding: .utf8) else {
throw DotNetAPIError.decryptionFailed
2020-04-21 02:36:23 +02:00
}
return token
}
}
private static func submitAuthToken(_ token: String, for server: String) -> Promise<String> {
print("[Loki] Submitting auth token for server: \(server).")
let url = URL(string: "\(server)/loki/v1/submit_challenge")!
2020-05-07 03:57:55 +02:00
let parameters = [ "pubKey" : getUserHexEncodedPublicKey(), "token" : token ]
2020-04-21 02:36:23 +02:00
let request = TSRequest(url: url, method: "POST", parameters: parameters)
2020-07-24 08:47:51 +02:00
let serverPublicKeyPromise = (server == FileServerAPI.server) ? Promise { $0.fulfill(FileServerAPI.fileServerPublicKey) }
: PublicChatAPI.getOpenGroupServerPublicKey(for: server)
2020-07-23 04:03:39 +02:00
return serverPublicKeyPromise.then2 { serverPublicKey in
OnionRequestAPI.sendOnionRequest(request, to: server, using: serverPublicKey)
}.map2 { _ in token }
2020-04-21 02:36:23 +02:00
}
// MARK: Public API
@objc(uploadAttachment:withID:toServer:)
public static func objc_uploadAttachment(_ attachment: TSAttachmentStream, with attachmentID: String, to server: String) -> AnyPromise {
return AnyPromise.from(uploadAttachment(attachment, with: attachmentID, to: server))
}
public static func uploadAttachment(_ attachment: TSAttachmentStream, with attachmentID: String, to server: String) -> Promise<Void> {
let isEncryptionRequired = (server == FileServerAPI.server)
return Promise<Void>() { seal in
func proceed(with token: String) {
// Get the attachment
let data: Data
guard let unencryptedAttachmentData = try? attachment.readDataFromFile() else {
print("[Loki] Couldn't read attachment from disk.")
return seal.reject(DotNetAPIError.generic)
}
// Encrypt the attachment if needed
if isEncryptionRequired {
var encryptionKey = NSData()
var digest = NSData()
guard let encryptedAttachmentData = Cryptography.encryptAttachmentData(unencryptedAttachmentData, outKey: &encryptionKey, outDigest: &digest) else {
print("[Loki] Couldn't encrypt attachment.")
return seal.reject(DotNetAPIError.encryptionFailed)
}
attachment.encryptionKey = encryptionKey as Data
attachment.digest = digest as Data
data = encryptedAttachmentData
} else {
data = unencryptedAttachmentData
}
2020-02-10 05:47:15 +01:00
// Check the file size if needed
2020-07-31 07:24:26 +02:00
print("[Loki] File size: \(data.count)")
if Double(data.count) > Double(FileServerAPI.maxFileSize) / FileServerAPI.fileSizeORMultiplier {
return seal.reject(DotNetAPIError.maxFileSizeExceeded)
2020-02-10 05:47:15 +01:00
}
// Create the request
let url = "\(server)/files"
let parameters: JSON = [ "type" : attachmentType, "Content-Type" : "application/binary" ]
var error: NSError?
var request = AFHTTPRequestSerializer().multipartFormRequest(withMethod: "POST", urlString: url, parameters: parameters, constructingBodyWith: { formData in
2020-07-31 06:27:08 +02:00
let uuid = UUID().uuidString
print("[Loki] File UUID: \(uuid)")
formData.appendPart(withFileData: data, name: "content", fileName: uuid, mimeType: "application/binary")
}, error: &error)
request.addValue("Bearer \(token)", forHTTPHeaderField: "Authorization")
if let error = error {
print("[Loki] Couldn't upload attachment due to error: \(error).")
return seal.reject(error)
}
// Send the request
2020-07-23 04:03:39 +02:00
let serverPublicKeyPromise = (server == FileServerAPI.server) ? Promise { $0.fulfill(FileServerAPI.fileServerPublicKey) }
: PublicChatAPI.getOpenGroupServerPublicKey(for: server)
attachment.isUploaded = false
attachment.save()
let _ = serverPublicKeyPromise.then2 { serverPublicKey in
OnionRequestAPI.sendOnionRequest(request, to: server, using: serverPublicKey)
}.done2 { json in
2020-02-03 10:55:42 +01:00
// Parse the server ID & download URL
2020-07-23 04:03:39 +02:00
guard let data = json["data"] as? JSON, let serverID = data["id"] as? UInt64, let downloadURL = data["url"] as? String else {
print("[Loki] Couldn't parse attachment from: \(json).")
return seal.reject(DotNetAPIError.parsingFailed)
2020-02-03 10:55:42 +01:00
}
// Update the attachment
attachment.serverId = serverID
attachment.isUploaded = true
attachment.downloadURL = downloadURL
attachment.save()
seal.fulfill(())
2020-07-23 04:03:39 +02:00
}.catch2 { error in
seal.reject(error)
2020-02-03 06:50:14 +01:00
}
}
if server == FileServerAPI.server {
2020-06-11 08:33:11 +02:00
DispatchQueue.global(qos: .userInitiated).async {
proceed(with: "loki") // Uploads to the Loki File Server shouldn't include any personally identifiable information so use a dummy auth token
}
} else {
2020-06-12 02:08:07 +02:00
getAuthToken(for: server).done(on: DispatchQueue.global(qos: .userInitiated)) { token in
proceed(with: token)
2020-06-11 08:33:11 +02:00
}.catch2 { error in
print("[Loki] Couldn't upload attachment due to error: \(error).")
seal.reject(error)
}
}
}
}
2019-09-26 03:32:47 +02:00
}
2020-06-10 03:06:56 +02:00
// MARK: Error Handling
internal extension Promise {
internal func handlingInvalidAuthTokenIfNeeded(for server: String) -> Promise<T> {
2020-06-11 08:33:11 +02:00
return recover2 { error -> Promise<T> in
2020-07-23 04:03:39 +02:00
if case HTTP.Error.httpRequestFailed(let statusCode, _) = error, statusCode == 401 || statusCode == 403 {
2020-07-20 03:02:58 +02:00
print("[Loki] Auth token for: \(server) expired; dropping it.")
DotNetAPI.clearAuthToken(for: server)
2020-06-10 03:06:56 +02:00
}
throw error
}
}
}