Guard against invalid open group server URLs
This commit is contained in:
parent
36415d4c94
commit
97325840e9
|
@ -56,7 +56,8 @@ public final class FileServerAPI : DotNetAPI {
|
||||||
|
|
||||||
// MARK: Open Group Server Public Key
|
// MARK: Open Group Server Public Key
|
||||||
public static func getPublicKey(for openGroupServer: String) -> Promise<String> {
|
public static func getPublicKey(for openGroupServer: String) -> Promise<String> {
|
||||||
let url = URL(string: "\(server)/loki/v1/getOpenGroupKey/\(URL(string: openGroupServer)!.host!)")!
|
guard let host = URL(string: openGroupServer)?.host,
|
||||||
|
let url = URL(string: "\(server)/loki/v1/getOpenGroupKey/\(host)") else { return Promise(error: DotNetAPI.Error.invalidURL) }
|
||||||
let request = TSRequest(url: url)
|
let request = TSRequest(url: url)
|
||||||
let token = "loki" // Tokenless request; use a dummy token
|
let token = "loki" // Tokenless request; use a dummy token
|
||||||
request.allHTTPHeaderFields = [ "Content-Type" : "application/json", "Authorization" : "Bearer \(token)" ]
|
request.allHTTPHeaderFields = [ "Content-Type" : "application/json", "Authorization" : "Bearer \(token)" ]
|
||||||
|
|
Loading…
Reference in New Issue