mirror of https://github.com/oxen-io/session-ios
Clean
parent
f28d77ed4e
commit
ec457a4a26
@ -1,147 +1,116 @@
|
|||||||
import PromiseKit
|
import PromiseKit
|
||||||
|
|
||||||
internal class LokiSnodeProxy: LokiHttpClient {
|
internal class LokiSnodeProxy : LokiHTTPClient {
|
||||||
internal let target: LokiAPITarget
|
internal let target: LokiAPITarget
|
||||||
private let keyPair: ECKeyPair
|
private let keyPair: ECKeyPair
|
||||||
|
|
||||||
|
private lazy var httpSession: AFHTTPSessionManager = {
|
||||||
|
let result = AFHTTPSessionManager(sessionConfiguration: .ephemeral)
|
||||||
|
let securityPolicy = AFSecurityPolicy.default()
|
||||||
|
securityPolicy.allowInvalidCertificates = true
|
||||||
|
securityPolicy.validatesDomainName = false
|
||||||
|
result.securityPolicy = securityPolicy
|
||||||
|
result.responseSerializer = AFHTTPResponseSerializer()
|
||||||
|
return result
|
||||||
|
}()
|
||||||
|
|
||||||
|
// MARK: Error
|
||||||
internal enum Error : LocalizedError {
|
internal enum Error : LocalizedError {
|
||||||
case invalidPublicKeys
|
case targetPublicKeySetMissing
|
||||||
case failedToEncryptRequest
|
case symmetricKeyGenerationFailed
|
||||||
case failedToParseProxyResponse
|
case proxyResponseParsingFailed
|
||||||
case targetNodeHttpError(code: Int, message: Any?)
|
case targetSnodeHTTPError(code: Int, message: Any?)
|
||||||
|
|
||||||
public var errorDescription: String? {
|
internal var errorDescription: String? {
|
||||||
switch self {
|
switch self {
|
||||||
case .invalidPublicKeys: return "Invalid target public key"
|
case .targetPublicKeySetMissing: return "Missing target public key set"
|
||||||
case .failedToEncryptRequest: return "Failed to encrypt request"
|
case .symmetricKeyGenerationFailed: return "Couldn't generate symmetric key"
|
||||||
case .failedToParseProxyResponse: return "Failed to parse proxy response"
|
case .proxyResponseParsingFailed: return "Couldn't parse proxy response"
|
||||||
case .targetNodeHttpError(let code, let message): return "Target node returned error \(code) - \(message ?? "No message provided")"
|
case .targetSnodeHTTPError(let httpStatusCode, let message): return "Target snode returned error \(httpStatusCode) with description: \(message ?? "no description provided")."
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// MARK: - Http
|
// MARK: Initialization
|
||||||
private var sessionManager: AFHTTPSessionManager = {
|
internal init(for target: LokiAPITarget) {
|
||||||
let manager = AFHTTPSessionManager(sessionConfiguration: URLSessionConfiguration.ephemeral)
|
|
||||||
let securityPolicy = AFSecurityPolicy.default()
|
|
||||||
securityPolicy.allowInvalidCertificates = true
|
|
||||||
securityPolicy.validatesDomainName = false
|
|
||||||
manager.securityPolicy = securityPolicy
|
|
||||||
manager.responseSerializer = AFHTTPResponseSerializer()
|
|
||||||
return manager
|
|
||||||
}()
|
|
||||||
|
|
||||||
|
|
||||||
// MARK: - Class functions
|
|
||||||
|
|
||||||
init(target: LokiAPITarget) {
|
|
||||||
self.target = target
|
self.target = target
|
||||||
keyPair = Curve25519.generateKeyPair()
|
keyPair = Curve25519.generateKeyPair()
|
||||||
super.init()
|
super.init()
|
||||||
}
|
}
|
||||||
|
|
||||||
override func perform(_ request: TSRequest, withCompletionQueue queue: DispatchQueue = DispatchQueue.main) -> Promise<Any> {
|
// MARK: Proxying
|
||||||
guard let targetHexEncodedPublicKeys = target.publicKeySet else {
|
override internal func perform(_ request: TSRequest, withCompletionQueue queue: DispatchQueue = DispatchQueue.main) -> LokiAPI.RawResponsePromise {
|
||||||
return Promise(error: Error.invalidPublicKeys)
|
guard let targetHexEncodedPublicKeySet = target.publicKeySet else { return Promise(error: Error.targetPublicKeySetMissing) }
|
||||||
}
|
let uncheckedSymmetricKey = try? Curve25519.generateSharedSecret(fromPublicKey: Data(hex: targetHexEncodedPublicKeySet.encryptionKey), privateKey: keyPair.privateKey)
|
||||||
|
guard let symmetricKey = uncheckedSymmetricKey else { return Promise(error: Error.symmetricKeyGenerationFailed) }
|
||||||
guard let symmetricKey = try? Curve25519.generateSharedSecret(fromPublicKey: Data(hex: targetHexEncodedPublicKeys.encryptionKey), privateKey: keyPair.privateKey) else {
|
let headers = convertHeadersToProxyEndpointFormat(for: request)
|
||||||
return Promise(error: Error.failedToEncryptRequest)
|
return LokiAPI.getRandomSnode().then { [target = self.target, keyPair = self.keyPair, httpSession = self.httpSession] proxy -> Promise<Any> in
|
||||||
}
|
let url = "\(proxy.address):\(proxy.port)/proxy"
|
||||||
|
print("[Loki] Proxying request to \(target) through \(proxy).")
|
||||||
return LokiAPI.getRandomSnode().then { snode -> Promise<Any> in
|
let parametersAsData = try JSONSerialization.data(withJSONObject: request.parameters, options: [])
|
||||||
let url = "\(snode.address):\(snode.port)/proxy"
|
let proxyRequestParameters: [String : Any] = [
|
||||||
print("[Loki][Snode proxy] Proxy request to \(self.target) via \(snode).")
|
|
||||||
let requestParams = try JSONSerialization.data(withJSONObject: request.parameters, options: [])
|
|
||||||
let params: [String : Any] = [
|
|
||||||
"method" : request.httpMethod,
|
"method" : request.httpMethod,
|
||||||
"body" : String(bytes: requestParams, encoding: .utf8),
|
"body" : String(bytes: parametersAsData, encoding: .utf8),
|
||||||
"headers" : self.getHeaders(request: request)
|
"headers" : headers
|
||||||
]
|
]
|
||||||
let proxyParams = try JSONSerialization.data(withJSONObject: params, options: [])
|
let proxyRequestParametersAsData = try JSONSerialization.data(withJSONObject: proxyRequestParameters, options: [])
|
||||||
let ivAndCipherText = try DiffieHellman.encrypt(proxyParams, using: symmetricKey)
|
let ivAndCipherText = try DiffieHellman.encrypt(proxyRequestParametersAsData, using: symmetricKey)
|
||||||
let headers = [
|
let proxyRequestHeaders = [
|
||||||
"X-Sender-Public-Key" : self.keyPair.publicKey.hexadecimalString,
|
"X-Sender-Public-Key" : keyPair.publicKey.map { String(format: "%02hhx", $0) }.joined(),
|
||||||
"X-Target-Snode-Key" : targetHexEncodedPublicKeys.idKey
|
"X-Target-Snode-Key" : targetHexEncodedPublicKeySet.idKey
|
||||||
]
|
]
|
||||||
return self.post(url: url, body: ivAndCipherText, headers: headers, timeoutInterval: request.timeoutInterval)
|
let (promise, resolver) = LokiAPI.RawResponsePromise.pending()
|
||||||
}.map { response in
|
let proxyRequest = AFHTTPRequestSerializer().request(withMethod: "POST", urlString: url, parameters: nil, error: nil)
|
||||||
guard response is Data, let cipherText = Data(base64Encoded: response as! Data) else {
|
proxyRequest.allHTTPHeaderFields = proxyRequestHeaders
|
||||||
print("[Loki][Snode proxy] Received non-string response")
|
proxyRequest.httpBody = ivAndCipherText
|
||||||
return response
|
proxyRequest.timeoutInterval = request.timeoutInterval
|
||||||
|
var task: URLSessionDataTask!
|
||||||
|
task = httpSession.dataTask(with: proxyRequest as URLRequest) { response, result, error in
|
||||||
|
if let error = error {
|
||||||
|
let nmError = NetworkManagerError.taskError(task: task, underlyingError: error)
|
||||||
|
let nsError: NSError = nmError as NSError
|
||||||
|
nsError.isRetryable = false
|
||||||
|
resolver.reject(nsError)
|
||||||
|
} else {
|
||||||
|
OutageDetection.shared.reportConnectionSuccess()
|
||||||
|
resolver.fulfill(result)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
task.resume()
|
||||||
let decrypted = try DiffieHellman.decrypt(cipherText, using: symmetricKey)
|
return promise
|
||||||
|
}.map { rawResponse in
|
||||||
// Unwrap and handle errors if needed
|
guard let data = rawResponse as? Data, let cipherText = Data(base64Encoded: data) else {
|
||||||
guard let json = try? JSONSerialization.jsonObject(with: decrypted, options: .allowFragments) as? [String: Any], let code = json["status"] as? Int else {
|
print("[Loki] Received a non-string encoded response.")
|
||||||
throw HttpError.networkError(code: -1, response: nil, underlyingError: Error.failedToParseProxyResponse)
|
return rawResponse
|
||||||
}
|
}
|
||||||
|
let response = try DiffieHellman.decrypt(cipherText, using: symmetricKey)
|
||||||
let success = (200..<300).contains(code)
|
let uncheckedJSON = try? JSONSerialization.jsonObject(with: response, options: .allowFragments) as? JSON
|
||||||
|
guard let json = uncheckedJSON, let httpStatusCode = json["status"] as? Int else { throw HTTPError.networkError(code: -1, response: nil, underlyingError: Error.proxyResponseParsingFailed) }
|
||||||
|
let isSuccess = (200..<300).contains(httpStatusCode)
|
||||||
var body: Any? = nil
|
var body: Any? = nil
|
||||||
if let string = json["body"] as? String {
|
if let bodyAsString = json["body"] as? String {
|
||||||
body = string
|
body = bodyAsString
|
||||||
if let jsonBody = try? JSONSerialization.jsonObject(with: string.data(using: .utf8)!, options: .allowFragments) as? [String: Any] {
|
if let bodyAsJSON = try? JSONSerialization.jsonObject(with: bodyAsString.data(using: .utf8)!, options: .allowFragments) as? [String: Any] {
|
||||||
body = jsonBody
|
body = bodyAsJSON
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
guard isSuccess else { throw HTTPError.networkError(code: httpStatusCode, response: body, underlyingError: Error.targetSnodeHTTPError(code: httpStatusCode, message: body)) }
|
||||||
if (!success) {
|
|
||||||
throw HttpError.networkError(code: code, response: body, underlyingError: Error.targetNodeHttpError(code: code, message: body))
|
|
||||||
}
|
|
||||||
|
|
||||||
return body
|
return body
|
||||||
}.recover { error -> Promise<Any> in
|
}.recover { error -> Promise<Any> in
|
||||||
print("[Loki][Snode proxy] Failed proxy request. \(error.localizedDescription)")
|
print("[Loki] Proxy request failed with error: \(error.localizedDescription).")
|
||||||
throw HttpError.from(error: error) ?? error
|
throw HTTPError.from(error: error) ?? error
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// MARK:- Private functions
|
|
||||||
|
|
||||||
private func getHeaders(request: TSRequest) -> [String: Any] {
|
|
||||||
guard let headers = request.allHTTPHeaderFields else {
|
|
||||||
return [:]
|
|
||||||
}
|
}
|
||||||
var newHeaders: [String: Any] = [:]
|
|
||||||
for header in headers {
|
|
||||||
var value: Any = header.value
|
|
||||||
// We need to convert any string boolean values to actual boolean values
|
|
||||||
if (header.value.lowercased() == "true" || header.value.lowercased() == "false") {
|
|
||||||
value = NSString(string: header.value).boolValue
|
|
||||||
}
|
|
||||||
newHeaders[header.key] = value
|
|
||||||
}
|
|
||||||
return newHeaders
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private func post(url: String, body: Data?, headers: [String: String]?, timeoutInterval: TimeInterval) -> Promise<Any> {
|
// MARK: Convenience
|
||||||
let (promise, resolver) = Promise<Any>.pending()
|
private func convertHeadersToProxyEndpointFormat(for request: TSRequest) -> [String: Any] {
|
||||||
let request = AFHTTPRequestSerializer().request(withMethod: "POST", urlString: url, parameters: nil, error: nil)
|
guard let headers = request.allHTTPHeaderFields else { return [:] }
|
||||||
request.allHTTPHeaderFields = headers
|
return headers.mapValues { value in
|
||||||
request.httpBody = body
|
switch value.lowercased() {
|
||||||
request.timeoutInterval = timeoutInterval
|
case "true": return true
|
||||||
|
case "false": return false
|
||||||
var task: URLSessionDataTask? = nil
|
default: return value
|
||||||
|
|
||||||
task = sessionManager.dataTask(with: request as URLRequest) { (response, result, error) in
|
|
||||||
if let error = error {
|
|
||||||
if let task = task {
|
|
||||||
let nmError = NetworkManagerError.taskError(task: task, underlyingError: error)
|
|
||||||
let nsError: NSError = nmError as NSError
|
|
||||||
nsError.isRetryable = false
|
|
||||||
resolver.reject(nsError)
|
|
||||||
} else {
|
|
||||||
resolver.reject(error)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
OutageDetection.shared.reportConnectionSuccess()
|
|
||||||
resolver.fulfill(result)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
task?.resume()
|
|
||||||
return promise
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue