mirror of https://github.com/oxen-io/session-ios
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
400 lines
20 KiB
Swift
400 lines
20 KiB
Swift
// Copyright © 2024 Rangeproof Pty Ltd. All rights reserved.
|
|
//
|
|
// stringlint:disable
|
|
|
|
import Foundation
|
|
import Combine
|
|
import SessionUtil
|
|
import SessionUtilitiesKit
|
|
|
|
// MARK: - LibSession
|
|
|
|
public extension LibSession {
|
|
struct ServiceNodeChanges {
|
|
enum Change: UInt32 {
|
|
case none = 0
|
|
case invalidPath = 1
|
|
case replaceSwarm = 2
|
|
case updatePath = 3
|
|
case updateNode = 4
|
|
}
|
|
|
|
let change: Change
|
|
let nodes: [Snode]
|
|
let nodeFailureCount: [UInt]
|
|
let nodeInvalid: [Bool]
|
|
let pathFailureCount: UInt
|
|
let pathInvalid: Bool
|
|
|
|
init(cChanges: network_service_node_changes) {
|
|
self.change = (Change(rawValue: cChanges.type.rawValue) ?? .none)
|
|
self.pathFailureCount = UInt(cChanges.failure_count)
|
|
self.pathInvalid = cChanges.invalid
|
|
|
|
guard cChanges.nodes_count > 0 else {
|
|
self.nodes = []
|
|
self.nodeInvalid = []
|
|
self.nodeFailureCount = []
|
|
return
|
|
}
|
|
|
|
var pendingNodes: [Snode] = []
|
|
var pendingNodeFailureCount: [UInt] = []
|
|
var pendingNodeInvalid: [Bool] = []
|
|
let cNodes: UnsafePointer<network_service_node> = UnsafePointer<network_service_node>(cChanges.nodes)
|
|
(0..<cChanges.nodes_count).forEach { index in
|
|
pendingNodes.append(
|
|
Snode(
|
|
ip: String(libSessionVal: cNodes[index].ip),
|
|
lmqPort: cNodes[index].lmq_port,
|
|
x25519PublicKey: String(libSessionVal: cNodes[index].x25519_pubkey_hex),
|
|
ed25519PublicKey: String(libSessionVal: cNodes[index].ed25519_pubkey_hex)
|
|
)
|
|
)
|
|
pendingNodeFailureCount.append(UInt(cNodes[index].failure_count))
|
|
pendingNodeInvalid.append(cNodes[index].invalid)
|
|
}
|
|
self.nodes = pendingNodes
|
|
self.nodeFailureCount = pendingNodeFailureCount
|
|
self.nodeInvalid = pendingNodeInvalid
|
|
}
|
|
}
|
|
|
|
private class CWrapper {
|
|
let callback: (Bool, Bool, Int16, Data?, ServiceNodeChanges) -> Void
|
|
private var pointersToDeallocate: [UnsafeRawPointer?] = []
|
|
|
|
public init(_ callback: @escaping (Bool, Bool, Int16, Data?, ServiceNodeChanges) -> Void) {
|
|
self.callback = callback
|
|
}
|
|
|
|
public func addUnsafePointerToCleanup<T>(_ pointer: UnsafePointer<T>?) {
|
|
pointersToDeallocate.append(UnsafeRawPointer(pointer))
|
|
}
|
|
|
|
deinit {
|
|
pointersToDeallocate.forEach { $0?.deallocate() }
|
|
}
|
|
}
|
|
|
|
// MARK: - Internal Functions
|
|
|
|
private static func cSwarm(for swarmPublicKey: String?) -> (ptr: UnsafePointer<network_service_node>?, count: Int) {
|
|
guard let swarm: Set<Snode> = swarmPublicKey.map({ SnodeAPI.swarmCache.wrappedValue[$0] }) else { return (nil, 0) }
|
|
|
|
let cSwarm: UnsafePointer<network_service_node>? = swarm
|
|
.enumerated()
|
|
.map { index, snode in
|
|
network_service_node(
|
|
ip: snode.ip.toLibSession(),
|
|
lmq_port: snode.lmqPort,
|
|
x25519_pubkey_hex: snode.x25519PublicKey.toLibSession(),
|
|
ed25519_pubkey_hex: snode.ed25519PublicKey.toLibSession(),
|
|
failure_count: UInt8(SnodeAPI.snodeFailureCount.wrappedValue[snode] ?? 0),
|
|
invalid: false
|
|
)
|
|
}
|
|
.unsafeCopy()
|
|
|
|
return (cSwarm, swarm.count)
|
|
}
|
|
|
|
private static func processError(
|
|
_ success: Bool,
|
|
_ timeout: Bool,
|
|
_ statusCode: Int16,
|
|
_ data: Data?,
|
|
_ changes: ServiceNodeChanges,
|
|
_ swarmPublicKey: String?,
|
|
using dependencies: Dependencies
|
|
) -> Error? {
|
|
/// Process the `ServiceNodeChanges` before handling the error to ensure we have updated out snode cache correctly
|
|
switch changes.change {
|
|
case .none, .invalidPath: break
|
|
|
|
case .updatePath, .updateNode:
|
|
/// Update the failure count or drop any nodes flagged as invalid
|
|
zip(changes.nodes, changes.nodeFailureCount, changes.nodeInvalid).forEach { snode, failureCount, invalid in
|
|
guard invalid else {
|
|
/// If the snode wasn't marked as invalid and it's failure count hasn't changed then do nothing
|
|
guard failureCount != (SnodeAPI.snodeFailureCount.wrappedValue[snode] ?? 0) else { return }
|
|
|
|
SNLog("Couldn't reach snode at: \(snode); setting failure count to \(failureCount).")
|
|
SnodeAPI.snodeFailureCount.mutate { $0[snode] = failureCount }
|
|
return
|
|
}
|
|
|
|
SNLog("Failure threshold reached for: \(snode); dropping it.")
|
|
if let publicKey: String = swarmPublicKey {
|
|
SnodeAPI.dropSnodeFromSwarmIfNeeded(snode, publicKey: publicKey)
|
|
}
|
|
SnodeAPI.dropSnodeFromSnodePool(snode)
|
|
SnodeAPI.snodeFailureCount.mutate { $0.removeValue(forKey: snode) }
|
|
SNLog("Snode pool count: \(SnodeAPI.snodePool.wrappedValue.count).")
|
|
}
|
|
|
|
/// There should never be a case where `pathInvalid` when the change is `updateNode` but including this just to be safe
|
|
guard changes.change != .updateNode else { break }
|
|
|
|
/// Update the path failure count or drop the path if invalid
|
|
switch changes.pathInvalid {
|
|
case false: OnionRequestAPI.pathFailureCount.mutate { $0[changes.nodes] = changes.pathFailureCount }
|
|
case true:
|
|
OnionRequestAPI.dropGuardSnode(changes.nodes.first)
|
|
OnionRequestAPI.drop(changes.nodes)
|
|
}
|
|
|
|
case .replaceSwarm:
|
|
switch swarmPublicKey {
|
|
case .none: SNLog("Tried to replace the swarm without an associated public key.")
|
|
case .some(let publicKey): SnodeAPI.setSwarm(to: changes.nodes.asSet(), for: publicKey)
|
|
}
|
|
}
|
|
|
|
guard !success || statusCode < 200 || statusCode > 299 else { return nil }
|
|
guard !timeout else { return NetworkError.timeout }
|
|
|
|
/// Handle status codes with specific meanings
|
|
switch (statusCode, data.map { String(data: $0, encoding: .ascii) }) {
|
|
case (400, .none):
|
|
return NetworkError.badRequest(error: NetworkError.unknown.errorDescription ?? "Bad Request", rawData: data)
|
|
|
|
case (400, .some(let responseString)): return NetworkError.badRequest(error: responseString, rawData: data)
|
|
|
|
case (401, _):
|
|
SNLog("Unauthorised (Failed to verify the signature).")
|
|
return NetworkError.unauthorised
|
|
|
|
case (404, _): return NetworkError.notFound
|
|
|
|
/// A snode will return a `406` but onion requests v4 seems to return `425` so handle both
|
|
case (406, _), (425, _):
|
|
SNLog("The user's clock is out of sync with the service node network.")
|
|
return SnodeAPIError.clockOutOfSync
|
|
|
|
case (421, _): return SnodeAPIError.unassociatedPubkey
|
|
case (429, _): return SnodeAPIError.rateLimited
|
|
case (500, _), (502, _), (503, _): return SnodeAPIError.unreachable
|
|
case (_, .none): return NetworkError.unknown
|
|
case (_, .some(let responseString)): return NetworkError.requestFailed(error: responseString, rawData: data)
|
|
}
|
|
}
|
|
|
|
// MARK: - Public Interface
|
|
|
|
static func addNetworkLogger() {
|
|
network_add_logger({ logPtr, msgLen in
|
|
guard let log: String = String(pointer: logPtr, length: msgLen, encoding: .utf8) else {
|
|
print("[quic:info] Null log")
|
|
return
|
|
}
|
|
|
|
print(log.trimmingCharacters(in: .whitespacesAndNewlines))
|
|
})
|
|
}
|
|
|
|
static func sendDirectRequest<T: Encodable>(
|
|
endpoint: any EndpointType,
|
|
body: T?,
|
|
snode: Snode,
|
|
swarmPublicKey: String?,
|
|
ed25519SecretKey: [UInt8]?,
|
|
using dependencies: Dependencies
|
|
) -> AnyPublisher<(ResponseInfoType, Data?), Error> {
|
|
return Deferred {
|
|
Future<(ResponseInfoType, Data?), Error> { resolver in
|
|
guard let cEd25519SecretKey: [UInt8] = ed25519SecretKey else {
|
|
return resolver(Result.failure(SnodeAPIError.missingSecretKey))
|
|
}
|
|
|
|
// Prepare the parameters
|
|
let cPayloadBytes: [UInt8]
|
|
|
|
switch body {
|
|
case .none: cPayloadBytes = []
|
|
case let data as Data: cPayloadBytes = Array(data)
|
|
case let bytes as [UInt8]: cPayloadBytes = bytes
|
|
default:
|
|
guard let encodedBody: Data = try? JSONEncoder().encode(body) else {
|
|
return resolver(Result.failure(SnodeAPIError.invalidPayload))
|
|
}
|
|
|
|
cPayloadBytes = Array(encodedBody)
|
|
}
|
|
let cTarget: network_service_node = network_service_node(
|
|
ip: snode.ip.toLibSession(),
|
|
lmq_port: snode.lmqPort,
|
|
x25519_pubkey_hex: snode.x25519PublicKey.toLibSession(),
|
|
ed25519_pubkey_hex: snode.ed25519PublicKey.toLibSession(),
|
|
failure_count: UInt8(SnodeAPI.snodeFailureCount.wrappedValue[snode] ?? 0),
|
|
invalid: false
|
|
)
|
|
let cSwarmInfo: (ptr: UnsafePointer<network_service_node>?, count: Int) = cSwarm(for: swarmPublicKey)
|
|
let callbackWrapper: CWrapper = CWrapper { success, timeout, statusCode, data, changes in
|
|
switch processError(success, timeout, statusCode, data, changes, swarmPublicKey, using: dependencies) {
|
|
case .some(let error): resolver(Result.failure(error))
|
|
case .none: resolver(Result.success((Network.ResponseInfo(code: Int(statusCode), headers: [:]), data)))
|
|
}
|
|
}
|
|
callbackWrapper.addUnsafePointerToCleanup(cSwarmInfo.ptr)
|
|
let cWrapperPtr: UnsafeMutableRawPointer = Unmanaged.passRetained(callbackWrapper).toOpaque()
|
|
|
|
// Trigger the request
|
|
network_send_request(
|
|
cEd25519SecretKey,
|
|
cTarget,
|
|
endpoint.path.cArray.nullTerminated(),
|
|
cPayloadBytes,
|
|
cPayloadBytes.count,
|
|
cSwarmInfo.ptr,
|
|
cSwarmInfo.count,
|
|
{ success, timeout, statusCode, dataPtr, dataLen, cChanges, ctx in
|
|
let data: Data? = dataPtr.map { Data(bytes: $0, count: dataLen) }
|
|
let changes: ServiceNodeChanges = ServiceNodeChanges(cChanges: cChanges)
|
|
Unmanaged<CWrapper>.fromOpaque(ctx!).takeRetainedValue()
|
|
.callback(success, timeout, statusCode, data, changes)
|
|
},
|
|
cWrapperPtr
|
|
)
|
|
}
|
|
}.eraseToAnyPublisher()
|
|
}
|
|
|
|
static func sendOnionRequest<T: Encodable>(
|
|
to destination: OnionRequestAPIDestination,
|
|
body: T?,
|
|
path: [Snode],
|
|
swarmPublicKey: String?,
|
|
ed25519SecretKey: [UInt8]?,
|
|
using dependencies: Dependencies
|
|
) -> AnyPublisher<(ResponseInfoType, Data?), Error> {
|
|
return Deferred {
|
|
Future<(ResponseInfoType, Data?), Error> { resolver in
|
|
guard let cEd25519SecretKey: [UInt8] = ed25519SecretKey else {
|
|
return resolver(Result.failure(SnodeAPIError.missingSecretKey))
|
|
}
|
|
|
|
// Prepare the parameters
|
|
let cPayloadBytes: [UInt8]
|
|
|
|
switch body {
|
|
case .none: cPayloadBytes = []
|
|
case let data as Data: cPayloadBytes = Array(data)
|
|
case let bytes as [UInt8]: cPayloadBytes = bytes
|
|
default:
|
|
guard let encodedBody: Data = try? JSONEncoder().encode(body) else {
|
|
return resolver(Result.failure(SnodeAPIError.invalidPayload))
|
|
}
|
|
|
|
cPayloadBytes = Array(encodedBody)
|
|
}
|
|
let cNodes: UnsafePointer<network_service_node>? = path
|
|
.enumerated()
|
|
.map { index, snode in
|
|
network_service_node(
|
|
ip: snode.ip.toLibSession(),
|
|
lmq_port: snode.lmqPort,
|
|
x25519_pubkey_hex: snode.x25519PublicKey.toLibSession(),
|
|
ed25519_pubkey_hex: snode.ed25519PublicKey.toLibSession(),
|
|
failure_count: UInt8(SnodeAPI.snodeFailureCount.wrappedValue[snode] ?? 0),
|
|
invalid: false
|
|
)
|
|
}
|
|
.unsafeCopy()
|
|
let cOnionPath: onion_request_path = onion_request_path(
|
|
nodes: cNodes,
|
|
nodes_count: path.count,
|
|
failure_count: UInt8(OnionRequestAPI.pathFailureCount.wrappedValue[path] ?? 0)
|
|
)
|
|
let cSwarmInfo: (ptr: UnsafePointer<network_service_node>?, count: Int) = cSwarm(for: swarmPublicKey)
|
|
let callbackWrapper: CWrapper = CWrapper { success, timeout, statusCode, data, changes in
|
|
switch processError(success, timeout, statusCode, data, changes, swarmPublicKey, using: dependencies) {
|
|
case .some(let error): resolver(Result.failure(error))
|
|
case .none: resolver(Result.success((Network.ResponseInfo(code: Int(statusCode), headers: [:]), data)))
|
|
}
|
|
}
|
|
callbackWrapper.addUnsafePointerToCleanup(cNodes)
|
|
callbackWrapper.addUnsafePointerToCleanup(cSwarmInfo.ptr)
|
|
let cWrapperPtr: UnsafeMutableRawPointer = Unmanaged.passRetained(callbackWrapper).toOpaque()
|
|
|
|
// Trigger the request
|
|
switch destination {
|
|
case .snode(let snode):
|
|
network_send_onion_request_to_snode_destination(
|
|
cOnionPath,
|
|
cEd25519SecretKey,
|
|
onion_request_service_node_destination(
|
|
ip: snode.ip.toLibSession(),
|
|
lmq_port: snode.lmqPort,
|
|
x25519_pubkey_hex: snode.x25519PublicKey.toLibSession(),
|
|
ed25519_pubkey_hex: snode.ed25519PublicKey.toLibSession(),
|
|
failure_count: UInt8(SnodeAPI.snodeFailureCount.wrappedValue[snode] ?? 0),
|
|
invalid: false,
|
|
swarm: cSwarmInfo.ptr,
|
|
swarm_count: cSwarmInfo.count
|
|
),
|
|
cPayloadBytes,
|
|
cPayloadBytes.count,
|
|
{ success, timeout, statusCode, dataPtr, dataLen, cChanges, ctx in
|
|
let data: Data? = dataPtr.map { Data(bytes: $0, count: dataLen) }
|
|
let changes: ServiceNodeChanges = ServiceNodeChanges(cChanges: cChanges)
|
|
Unmanaged<CWrapper>.fromOpaque(ctx!).takeRetainedValue()
|
|
.callback(success, timeout, statusCode, data, changes)
|
|
},
|
|
cWrapperPtr
|
|
)
|
|
|
|
case .server(let method, let scheme, let host, let endpoint, let port, let headers, let queryParams, let x25519PublicKey):
|
|
let targetScheme: String = (scheme ?? "https")
|
|
let headerInfo: [(key: String, value: String)]? = headers?.map { ($0.key, $0.value) }
|
|
let queryInfo: [(key: String, value: String)]? = queryParams?.map { ($0.key, $0.value) }
|
|
var cHeaderKeys: [UnsafePointer<CChar>?] = (headerInfo ?? [])
|
|
.map { $0.key.cArray.nullTerminated() }
|
|
.unsafeCopy()
|
|
var cHeaderValues: [UnsafePointer<CChar>?] = (headerInfo ?? [])
|
|
.map { $0.value.cArray.nullTerminated() }
|
|
.unsafeCopy()
|
|
var cQueryParamKeys: [UnsafePointer<CChar>?] = (queryInfo ?? [])
|
|
.map { $0.key.cArray.nullTerminated() }
|
|
.unsafeCopy()
|
|
var cQueryParamValues: [UnsafePointer<CChar>?] = (queryInfo ?? [])
|
|
.map { $0.value.cArray.nullTerminated() }
|
|
.unsafeCopy()
|
|
|
|
// Add a cleanup callback to deallocate the header arrays
|
|
cHeaderKeys.forEach { callbackWrapper.addUnsafePointerToCleanup($0) }
|
|
cHeaderValues.forEach { callbackWrapper.addUnsafePointerToCleanup($0) }
|
|
cQueryParamKeys.forEach { callbackWrapper.addUnsafePointerToCleanup($0) }
|
|
cQueryParamValues.forEach { callbackWrapper.addUnsafePointerToCleanup($0) }
|
|
|
|
network_send_onion_request_to_server_destination(
|
|
cOnionPath,
|
|
cEd25519SecretKey,
|
|
(method ?? "GET").cArray.nullTerminated(),
|
|
targetScheme.cArray.nullTerminated(),
|
|
host.cArray.nullTerminated(),
|
|
endpoint.path.cArray.nullTerminated(),
|
|
(port ?? (targetScheme == "https" ? 443 : 80)),
|
|
x25519PublicKey.cArray,
|
|
&cQueryParamKeys,
|
|
&cQueryParamValues,
|
|
cQueryParamKeys.count,
|
|
&cHeaderKeys,
|
|
&cHeaderValues,
|
|
cHeaderKeys.count,
|
|
cPayloadBytes,
|
|
cPayloadBytes.count,
|
|
{ success, timeout, statusCode, dataPtr, dataLen, cChanges, ctx in
|
|
let data: Data? = dataPtr.map { Data(bytes: $0, count: dataLen) }
|
|
let changes: ServiceNodeChanges = ServiceNodeChanges(cChanges: cChanges)
|
|
Unmanaged<CWrapper>.fromOpaque(ctx!).takeRetainedValue()
|
|
.callback(success, timeout, statusCode, data, changes)
|
|
},
|
|
cWrapperPtr
|
|
)
|
|
}
|
|
}
|
|
}.eraseToAnyPublisher()
|
|
}
|
|
}
|