mirror of https://github.com/oxen-io/session-ios
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
	
	
		
			124 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Swift
		
	
		
		
			
		
	
	
			124 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Swift
		
	
| 
											5 years ago
										 | // | ||
|  | //  Copyright (c) 2019 Open Whisper Systems. All rights reserved. | ||
|  | // | ||
|  | 
 | ||
| 
											5 years ago
										 | import AFNetworking | ||
| 
											5 years ago
										 | import Foundation | ||
|  | 
 | ||
|  | @objc | ||
|  | public class ContentProxy: NSObject { | ||
|  | 
 | ||
|  |     @available(*, unavailable, message:"do not instantiate this class.") | ||
|  |     private override init() { | ||
|  |     } | ||
|  | 
 | ||
|  |     @objc | ||
|  |     public class func sessionConfiguration() -> URLSessionConfiguration { | ||
|  |         let configuration = URLSessionConfiguration.ephemeral | ||
|  |         let proxyHost = "contentproxy.signal.org" | ||
|  |         let proxyPort = 443 | ||
|  |         configuration.connectionProxyDictionary = [ | ||
|  |             "HTTPEnable": 1, | ||
|  |             "HTTPProxy": proxyHost, | ||
|  |             "HTTPPort": proxyPort, | ||
|  |             "HTTPSEnable": 1, | ||
|  |             "HTTPSProxy": proxyHost, | ||
|  |             "HTTPSPort": proxyPort | ||
|  |         ] | ||
|  |         return configuration | ||
|  |     } | ||
|  | 
 | ||
|  |     @objc | ||
|  |     public class func sessionManager(baseUrl baseUrlString: String?) -> AFHTTPSessionManager? { | ||
|  |         guard let baseUrlString = baseUrlString else { | ||
|  |             return AFHTTPSessionManager(baseURL: nil, sessionConfiguration: sessionConfiguration()) | ||
|  |         } | ||
|  |         guard let baseUrl = URL(string: baseUrlString) else { | ||
|  |             return nil | ||
|  |         } | ||
|  |         let sessionManager = AFHTTPSessionManager(baseURL: baseUrl, | ||
|  |                                                   sessionConfiguration: sessionConfiguration()) | ||
|  |         return sessionManager | ||
|  |     } | ||
|  | 
 | ||
|  |     @objc | ||
|  |     public class func jsonSessionManager(baseUrl: String) -> AFHTTPSessionManager? { | ||
|  |         guard let sessionManager = self.sessionManager(baseUrl: baseUrl) else { | ||
|  |             return nil | ||
|  |         } | ||
|  |         sessionManager.requestSerializer = AFJSONRequestSerializer() | ||
|  |         sessionManager.responseSerializer = AFJSONResponseSerializer() | ||
|  |         return sessionManager | ||
|  |     } | ||
|  | 
 | ||
|  |     static let userAgent = "Signal iOS (+https://signal.org/download)" | ||
|  | 
 | ||
|  |     public class func configureProxiedRequest(request: inout URLRequest) -> Bool { | ||
|  |         request.addValue(userAgent, forHTTPHeaderField: "User-Agent") | ||
|  | 
 | ||
|  |         padRequestSize(request: &request) | ||
|  | 
 | ||
|  |         guard let url = request.url, | ||
|  |         let scheme = url.scheme, | ||
|  |             scheme.lowercased() == "https" else { | ||
|  |                 return false | ||
|  |         } | ||
|  |         return true | ||
|  |     } | ||
|  | 
 | ||
|  |     // This mutates the session manager state, so its the caller's obligation to avoid conflicts by: | ||
|  |     // | ||
|  |     // * Using a new session manager for each request. | ||
|  |     // * Pooling session managers. | ||
|  |     // * Using a single session manager on a single queue. | ||
|  |     @objc | ||
|  |     public class func configureSessionManager(sessionManager: AFHTTPSessionManager, | ||
|  |                                               forUrl urlString: String) -> Bool { | ||
|  | 
 | ||
|  |         guard let url = URL(string: urlString, relativeTo: sessionManager.baseURL) else { | ||
|  |             return false | ||
|  |         } | ||
|  | 
 | ||
|  |         var request = URLRequest(url: url) | ||
|  | 
 | ||
|  |         guard configureProxiedRequest(request: &request) else { | ||
|  |             return false | ||
|  |         } | ||
|  | 
 | ||
|  |         // Remove all headers from the request. | ||
|  |         for headerField in sessionManager.requestSerializer.httpRequestHeaders.keys { | ||
|  |             sessionManager.requestSerializer.setValue(nil, forHTTPHeaderField: headerField) | ||
|  |         } | ||
|  |         // Honor the request's headers. | ||
|  |         if let allHTTPHeaderFields = request.allHTTPHeaderFields { | ||
|  |             for (headerField, headerValue) in allHTTPHeaderFields { | ||
|  |                 sessionManager.requestSerializer.setValue(headerValue, forHTTPHeaderField: headerField) | ||
|  |             } | ||
|  |         } | ||
|  |         return true | ||
|  |     } | ||
|  | 
 | ||
|  |     public class func padRequestSize(request: inout URLRequest) { | ||
|  |         // Generate 1-64 chars of padding. | ||
|  |         let paddingLength: Int = 1 + Int(arc4random_uniform(64)) | ||
|  |         let padding = self.padding(withLength: paddingLength) | ||
|  |         assert(padding.count == paddingLength) | ||
|  |         request.addValue(padding, forHTTPHeaderField: "X-SignalPadding") | ||
|  |     } | ||
|  | 
 | ||
|  |     private class func padding(withLength length: Int) -> String { | ||
|  |         // Pick a random ASCII char in the range 48-122 | ||
|  |         var result = "" | ||
|  |         // Min and max values, inclusive. | ||
|  |         let minValue: UInt32 = 48 | ||
|  |         let maxValue: UInt32 = 122 | ||
|  |         for _ in 1...length { | ||
|  |             let value = minValue + arc4random_uniform(maxValue - minValue + 1) | ||
|  |             assert(value >= minValue) | ||
|  |             assert(value <= maxValue) | ||
|  |             result += String(UnicodeScalar(UInt8(value))) | ||
|  |         } | ||
|  |         return result | ||
|  |     } | ||
|  | } |