allow fileserverv2 attachments to be downloaded, upload disabled
parent
64eab5160d
commit
2b576de2cd
@ -0,0 +1,131 @@
|
||||
import { OpenGroupV2Request } from '../opengroup/opengroupV2/ApiUtil';
|
||||
import { sendApiV2Request } from '../opengroup/opengroupV2/OpenGroupAPIV2';
|
||||
import { parseStatusCodeFromOnionRequest } from '../opengroup/opengroupV2/OpenGroupAPIV2Parser';
|
||||
import { fromArrayBufferToBase64, fromBase64ToArrayBuffer } from '../session/utils/String';
|
||||
|
||||
// tslint:disable-next-line: no-http-string
|
||||
export const fileServerV2URL = 'http://88.99.175.227';
|
||||
export const fileServerV2PubKey =
|
||||
'7cb31905b55cd5580c686911debf672577b3fb0bff81df4ce2d5c4cb3a7aaa69';
|
||||
|
||||
export type FileServerV2Request = {
|
||||
method: 'GET' | 'POST' | 'DELETE' | 'PUT';
|
||||
endpoint: string;
|
||||
// queryParams are used for post or get, but not the same way
|
||||
queryParams?: Record<string, any>;
|
||||
headers?: Record<string, string>;
|
||||
};
|
||||
|
||||
const FILES_ENDPOINT = 'files';
|
||||
|
||||
// Disable this if you don't want to use the file server v2 for sending
|
||||
// Receiving is always enabled if the attachments url matches a fsv2 url
|
||||
export const useFileServerAPIV2Sending = false;
|
||||
|
||||
/**
|
||||
* Upload a file to the file server v2
|
||||
* @param fileContent the data to send
|
||||
* @returns null or the fileID and complete URL to share this file
|
||||
*/
|
||||
export const uploadFileToFsV2 = async (
|
||||
fileContent: ArrayBuffer
|
||||
): Promise<{ fileId: number; fileUrl: string } | null> => {
|
||||
if (!fileContent || !fileContent.byteLength) {
|
||||
return null;
|
||||
}
|
||||
const queryParams = {
|
||||
file: fromArrayBufferToBase64(fileContent),
|
||||
};
|
||||
|
||||
const request: FileServerV2Request = {
|
||||
method: 'POST',
|
||||
endpoint: FILES_ENDPOINT,
|
||||
queryParams,
|
||||
};
|
||||
|
||||
const result = await sendApiV2Request(request);
|
||||
const statusCode = parseStatusCodeFromOnionRequest(result);
|
||||
if (statusCode !== 200) {
|
||||
return null;
|
||||
}
|
||||
|
||||
// we should probably change the logic of sendOnionRequest to not have all those levels
|
||||
const fileId = (result as any)?.result?.result as number | undefined;
|
||||
if (!fileId) {
|
||||
return null;
|
||||
}
|
||||
const fileUrl = `${fileServerV2URL}/${FILES_ENDPOINT}/${fileId}`;
|
||||
return {
|
||||
fileId: fileId,
|
||||
fileUrl,
|
||||
};
|
||||
};
|
||||
|
||||
/**
|
||||
* Download a file given the fileId from the fileserver v2
|
||||
* @param fileId the fileId to download
|
||||
* @returns the data as an Uint8Array or null
|
||||
*/
|
||||
export const downloadFileFromFSv2 = async (fileId: string): Promise<ArrayBuffer | null> => {
|
||||
if (!fileId) {
|
||||
window.log.warn('');
|
||||
return null;
|
||||
}
|
||||
const request: FileServerV2Request = {
|
||||
method: 'GET',
|
||||
endpoint: `${FILES_ENDPOINT}/${fileId}`,
|
||||
};
|
||||
|
||||
const result = await sendApiV2Request(request);
|
||||
const statusCode = parseStatusCodeFromOnionRequest(result);
|
||||
if (statusCode !== 200) {
|
||||
return null;
|
||||
}
|
||||
|
||||
// we should probably change the logic of sendOnionRequest to not have all those levels
|
||||
const base64Data = (result as any)?.result?.result as string | undefined;
|
||||
|
||||
if (!base64Data) {
|
||||
return null;
|
||||
}
|
||||
return fromBase64ToArrayBuffer(base64Data);
|
||||
};
|
||||
|
||||
/**
|
||||
* This is a typescript type guard
|
||||
* request.isAuthRequired Must be set for an OpenGroupV2Request
|
||||
* @returns true if request.isAuthRequired is not undefined
|
||||
*/
|
||||
export function isOpenGroupV2Request(
|
||||
request: FileServerV2Request | OpenGroupV2Request
|
||||
): request is OpenGroupV2Request {
|
||||
return (request as OpenGroupV2Request).isAuthRequired !== undefined;
|
||||
}
|
||||
|
||||
/**
|
||||
* Try to build an full url and check it for validity.
|
||||
* @returns null if the check failed. the built URL otherwise
|
||||
*/
|
||||
export const buildUrl = (request: FileServerV2Request | OpenGroupV2Request): URL | null => {
|
||||
let rawURL: string;
|
||||
if (isOpenGroupV2Request(request)) {
|
||||
rawURL = `${request.server}/${request.endpoint}`;
|
||||
} else {
|
||||
rawURL = `${fileServerV2URL}/${request.endpoint}`;
|
||||
}
|
||||
|
||||
if (request.method === 'GET') {
|
||||
const entries = Object.entries(request.queryParams || {});
|
||||
|
||||
if (entries.length) {
|
||||
const queryString = entries.map(([key, value]) => `${key}=${value}`).join('&');
|
||||
rawURL += `?${queryString}`;
|
||||
}
|
||||
}
|
||||
// this just check that the URL is valid
|
||||
try {
|
||||
return new URL(`${rawURL}`);
|
||||
} catch (error) {
|
||||
return null;
|
||||
}
|
||||
};
|
@ -0,0 +1,4 @@
|
||||
import * as FSv2 from './FileServerApiV2';
|
||||
|
||||
// fsv2 = File server V2
|
||||
export { FSv2 };
|
@ -0,0 +1,161 @@
|
||||
import { getV2OpenGroupRoomByRoomId, saveV2OpenGroupRoom } from '../../data/opengroups';
|
||||
import { allowOnlyOneAtATime } from '../../session/utils/Promise';
|
||||
import { fromBase64ToArrayBuffer, toHex } from '../../session/utils/String';
|
||||
import { getIdentityKeyPair, getOurPubKeyStrFromCache } from '../../session/utils/User';
|
||||
import { OpenGroupRequestCommonType, OpenGroupV2Request } from './ApiUtil';
|
||||
import { sendApiV2Request } from './OpenGroupAPIV2';
|
||||
import { parseStatusCodeFromOnionRequest } from './OpenGroupAPIV2Parser';
|
||||
|
||||
async function claimAuthToken(
|
||||
authToken: string,
|
||||
serverUrl: string,
|
||||
roomId: string
|
||||
): Promise<string | null> {
|
||||
// Set explicitly here because is isn't in the database yet at this point
|
||||
const headers = { Authorization: authToken };
|
||||
const request: OpenGroupV2Request = {
|
||||
method: 'POST',
|
||||
headers,
|
||||
room: roomId,
|
||||
server: serverUrl,
|
||||
queryParams: { public_key: getOurPubKeyStrFromCache() },
|
||||
isAuthRequired: false,
|
||||
endpoint: 'claim_auth_token',
|
||||
};
|
||||
const result = await sendApiV2Request(request);
|
||||
const statusCode = parseStatusCodeFromOnionRequest(result);
|
||||
if (statusCode !== 200) {
|
||||
window.log.warn(`Could not claim token, status code: ${statusCode}`);
|
||||
return null;
|
||||
}
|
||||
return authToken;
|
||||
}
|
||||
|
||||
export async function getAuthToken({
|
||||
serverUrl,
|
||||
roomId,
|
||||
}: OpenGroupRequestCommonType): Promise<string | null> {
|
||||
// first try to fetch from db a saved token.
|
||||
const roomDetails = await getV2OpenGroupRoomByRoomId({ serverUrl, roomId });
|
||||
if (!roomDetails) {
|
||||
window.log.warn('getAuthToken Room does not exist.');
|
||||
return null;
|
||||
}
|
||||
if (roomDetails?.token) {
|
||||
return roomDetails.token;
|
||||
}
|
||||
|
||||
await allowOnlyOneAtATime(`getAuthTokenV2${serverUrl}:${roomId}`, async () => {
|
||||
try {
|
||||
window.log.info('TRIGGERING NEW AUTH TOKEN WITH', { serverUrl, roomId });
|
||||
const token = await requestNewAuthToken({ serverUrl, roomId });
|
||||
if (!token) {
|
||||
window.log.warn('invalid new auth token', token);
|
||||
return;
|
||||
}
|
||||
const claimedToken = await claimAuthToken(token, serverUrl, roomId);
|
||||
if (!claimedToken) {
|
||||
window.log.warn('invalid claimed token', claimedToken);
|
||||
}
|
||||
// still save it to the db. just to mark it as to be refreshed later
|
||||
roomDetails.token = claimedToken || '';
|
||||
await saveV2OpenGroupRoom(roomDetails);
|
||||
} catch (e) {
|
||||
window.log.error('Failed to getAuthToken', e);
|
||||
throw e;
|
||||
}
|
||||
});
|
||||
|
||||
const refreshedRoomDetails = await getV2OpenGroupRoomByRoomId({
|
||||
serverUrl,
|
||||
roomId,
|
||||
});
|
||||
if (!refreshedRoomDetails) {
|
||||
window.log.warn('getAuthToken Room does not exist.');
|
||||
return null;
|
||||
}
|
||||
if (refreshedRoomDetails?.token) {
|
||||
return refreshedRoomDetails?.token;
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
export const deleteAuthToken = async ({
|
||||
serverUrl,
|
||||
roomId,
|
||||
}: OpenGroupRequestCommonType): Promise<boolean> => {
|
||||
const request: OpenGroupV2Request = {
|
||||
method: 'DELETE',
|
||||
room: roomId,
|
||||
server: serverUrl,
|
||||
isAuthRequired: false,
|
||||
endpoint: 'auth_token',
|
||||
};
|
||||
try {
|
||||
const result = await sendApiV2Request(request);
|
||||
const statusCode = parseStatusCodeFromOnionRequest(result);
|
||||
if (statusCode !== 200) {
|
||||
window.log.warn(`Could not deleteAuthToken, status code: ${statusCode}`);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
} catch (e) {
|
||||
window.log.error('deleteAuthToken failed:', e);
|
||||
return false;
|
||||
}
|
||||
};
|
||||
|
||||
// tslint:disable: member-ordering
|
||||
export async function requestNewAuthToken({
|
||||
serverUrl,
|
||||
roomId,
|
||||
}: OpenGroupRequestCommonType): Promise<string | null> {
|
||||
const userKeyPair = await getIdentityKeyPair();
|
||||
if (!userKeyPair) {
|
||||
throw new Error('Failed to fetch user keypair');
|
||||
}
|
||||
|
||||
const ourPubkey = getOurPubKeyStrFromCache();
|
||||
const parameters = {} as Record<string, string>;
|
||||
parameters.public_key = ourPubkey;
|
||||
const request: OpenGroupV2Request = {
|
||||
method: 'GET',
|
||||
room: roomId,
|
||||
server: serverUrl,
|
||||
queryParams: parameters,
|
||||
isAuthRequired: false,
|
||||
endpoint: 'auth_token_challenge',
|
||||
};
|
||||
const json = (await sendApiV2Request(request)) as any;
|
||||
// parse the json
|
||||
if (!json || !json?.result?.challenge) {
|
||||
window.log.warn('Parsing failed');
|
||||
return null;
|
||||
}
|
||||
const {
|
||||
ciphertext: base64EncodedCiphertext,
|
||||
ephemeral_public_key: base64EncodedEphemeralPublicKey,
|
||||
} = json?.result?.challenge;
|
||||
|
||||
if (!base64EncodedCiphertext || !base64EncodedEphemeralPublicKey) {
|
||||
window.log.warn('Parsing failed');
|
||||
return null;
|
||||
}
|
||||
const ciphertext = fromBase64ToArrayBuffer(base64EncodedCiphertext);
|
||||
const ephemeralPublicKey = fromBase64ToArrayBuffer(base64EncodedEphemeralPublicKey);
|
||||
try {
|
||||
const symmetricKey = await window.libloki.crypto.deriveSymmetricKey(
|
||||
ephemeralPublicKey,
|
||||
userKeyPair.privKey
|
||||
);
|
||||
|
||||
const plaintextBuffer = await window.libloki.crypto.DecryptAESGCM(symmetricKey, ciphertext);
|
||||
|
||||
const token = toHex(plaintextBuffer);
|
||||
|
||||
return token;
|
||||
} catch (e) {
|
||||
window.log.error('Failed to decrypt token open group v2');
|
||||
return null;
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue