diff options
Diffstat (limited to 'includes/external/matrix/node_modules/matrix-js-sdk/src/autodiscovery.ts')
-rw-r--r-- | includes/external/matrix/node_modules/matrix-js-sdk/src/autodiscovery.ts | 472 |
1 files changed, 0 insertions, 472 deletions
diff --git a/includes/external/matrix/node_modules/matrix-js-sdk/src/autodiscovery.ts b/includes/external/matrix/node_modules/matrix-js-sdk/src/autodiscovery.ts deleted file mode 100644 index f4a3415..0000000 --- a/includes/external/matrix/node_modules/matrix-js-sdk/src/autodiscovery.ts +++ /dev/null @@ -1,472 +0,0 @@ -/* -Copyright 2018 New Vector Ltd -Copyright 2019 The Matrix.org Foundation C.I.C. - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -import { IClientWellKnown, IWellKnownConfig } from "./client"; -import { logger } from "./logger"; -import { MatrixError, Method, timeoutSignal } from "./http-api"; - -// Dev note: Auto discovery is part of the spec. -// See: https://matrix.org/docs/spec/client_server/r0.4.0.html#server-discovery - -export enum AutoDiscoveryAction { - SUCCESS = "SUCCESS", - IGNORE = "IGNORE", - PROMPT = "PROMPT", - FAIL_PROMPT = "FAIL_PROMPT", - FAIL_ERROR = "FAIL_ERROR", -} - -enum AutoDiscoveryError { - Invalid = "Invalid homeserver discovery response", - GenericFailure = "Failed to get autodiscovery configuration from server", - InvalidHsBaseUrl = "Invalid base_url for m.homeserver", - InvalidHomeserver = "Homeserver URL does not appear to be a valid Matrix homeserver", - InvalidIsBaseUrl = "Invalid base_url for m.identity_server", - InvalidIdentityServer = "Identity server URL does not appear to be a valid identity server", - InvalidIs = "Invalid identity server discovery response", - MissingWellknown = "No .well-known JSON file found", - InvalidJson = "Invalid JSON", -} - -interface WellKnownConfig extends Omit<IWellKnownConfig, "error"> { - state: AutoDiscoveryAction; - error?: IWellKnownConfig["error"] | null; -} - -export interface ClientConfig extends Omit<IClientWellKnown, "m.homeserver" | "m.identity_server"> { - "m.homeserver": WellKnownConfig; - "m.identity_server": WellKnownConfig; -} - -/** - * Utilities for automatically discovery resources, such as homeservers - * for users to log in to. - */ -export class AutoDiscovery { - // Dev note: the constants defined here are related to but not - // exactly the same as those in the spec. This is to hopefully - // translate the meaning of the states in the spec, but also - // support our own if needed. - - public static readonly ERROR_INVALID = AutoDiscoveryError.Invalid; - - public static readonly ERROR_GENERIC_FAILURE = AutoDiscoveryError.GenericFailure; - - public static readonly ERROR_INVALID_HS_BASE_URL = AutoDiscoveryError.InvalidHsBaseUrl; - - public static readonly ERROR_INVALID_HOMESERVER = AutoDiscoveryError.InvalidHomeserver; - - public static readonly ERROR_INVALID_IS_BASE_URL = AutoDiscoveryError.InvalidIsBaseUrl; - - public static readonly ERROR_INVALID_IDENTITY_SERVER = AutoDiscoveryError.InvalidIdentityServer; - - public static readonly ERROR_INVALID_IS = AutoDiscoveryError.InvalidIs; - - public static readonly ERROR_MISSING_WELLKNOWN = AutoDiscoveryError.MissingWellknown; - - public static readonly ERROR_INVALID_JSON = AutoDiscoveryError.InvalidJson; - - public static readonly ALL_ERRORS = Object.keys(AutoDiscoveryError); - - /** - * The auto discovery failed. The client is expected to communicate - * the error to the user and refuse logging in. - */ - public static readonly FAIL_ERROR = AutoDiscoveryAction.FAIL_ERROR; - - /** - * The auto discovery failed, however the client may still recover - * from the problem. The client is recommended to that the same - * action it would for PROMPT while also warning the user about - * what went wrong. The client may also treat this the same as - * a FAIL_ERROR state. - */ - public static readonly FAIL_PROMPT = AutoDiscoveryAction.FAIL_PROMPT; - - /** - * The auto discovery didn't fail but did not find anything of - * interest. The client is expected to prompt the user for more - * information, or fail if it prefers. - */ - public static readonly PROMPT = AutoDiscoveryAction.PROMPT; - - /** - * The auto discovery was successful. - */ - public static readonly SUCCESS = AutoDiscoveryAction.SUCCESS; - - /** - * Validates and verifies client configuration information for purposes - * of logging in. Such information includes the homeserver URL - * and identity server URL the client would want. Additional details - * may also be included, and will be transparently brought into the - * response object unaltered. - * @param wellknown - The configuration object itself, as returned - * by the .well-known auto-discovery endpoint. - * @returns Promise which resolves to the verified - * configuration, which may include error states. Rejects on unexpected - * failure, not when verification fails. - */ - public static async fromDiscoveryConfig(wellknown: IClientWellKnown): Promise<ClientConfig> { - // Step 1 is to get the config, which is provided to us here. - - // We default to an error state to make the first few checks easier to - // write. We'll update the properties of this object over the duration - // of this function. - const clientConfig: ClientConfig = { - "m.homeserver": { - state: AutoDiscovery.FAIL_ERROR, - error: AutoDiscovery.ERROR_INVALID, - base_url: null, - }, - "m.identity_server": { - // Technically, we don't have a problem with the identity server - // config at this point. - state: AutoDiscovery.PROMPT, - error: null, - base_url: null, - }, - }; - - if (!wellknown || !wellknown["m.homeserver"]) { - logger.error("No m.homeserver key in config"); - - clientConfig["m.homeserver"].state = AutoDiscovery.FAIL_PROMPT; - clientConfig["m.homeserver"].error = AutoDiscovery.ERROR_INVALID; - - return Promise.resolve(clientConfig); - } - - if (!wellknown["m.homeserver"]["base_url"]) { - logger.error("No m.homeserver base_url in config"); - - clientConfig["m.homeserver"].state = AutoDiscovery.FAIL_PROMPT; - clientConfig["m.homeserver"].error = AutoDiscovery.ERROR_INVALID_HS_BASE_URL; - - return Promise.resolve(clientConfig); - } - - // Step 2: Make sure the homeserver URL is valid *looking*. We'll make - // sure it points to a homeserver in Step 3. - const hsUrl = this.sanitizeWellKnownUrl(wellknown["m.homeserver"]["base_url"]); - if (!hsUrl) { - logger.error("Invalid base_url for m.homeserver"); - clientConfig["m.homeserver"].error = AutoDiscovery.ERROR_INVALID_HS_BASE_URL; - return Promise.resolve(clientConfig); - } - - // Step 3: Make sure the homeserver URL points to a homeserver. - const hsVersions = await this.fetchWellKnownObject(`${hsUrl}/_matrix/client/versions`); - if (!hsVersions || !hsVersions.raw?.["versions"]) { - logger.error("Invalid /versions response"); - clientConfig["m.homeserver"].error = AutoDiscovery.ERROR_INVALID_HOMESERVER; - - // Supply the base_url to the caller because they may be ignoring liveliness - // errors, like this one. - clientConfig["m.homeserver"].base_url = hsUrl; - - return Promise.resolve(clientConfig); - } - - // Step 4: Now that the homeserver looks valid, update our client config. - clientConfig["m.homeserver"] = { - state: AutoDiscovery.SUCCESS, - error: null, - base_url: hsUrl, - }; - - // Step 5: Try to pull out the identity server configuration - let isUrl: string | boolean = ""; - if (wellknown["m.identity_server"]) { - // We prepare a failing identity server response to save lines later - // in this branch. - const failingClientConfig: ClientConfig = { - "m.homeserver": clientConfig["m.homeserver"], - "m.identity_server": { - state: AutoDiscovery.FAIL_PROMPT, - error: AutoDiscovery.ERROR_INVALID_IS, - base_url: null, - }, - }; - - // Step 5a: Make sure the URL is valid *looking*. We'll make sure it - // points to an identity server in Step 5b. - isUrl = this.sanitizeWellKnownUrl(wellknown["m.identity_server"]["base_url"]); - if (!isUrl) { - logger.error("Invalid base_url for m.identity_server"); - failingClientConfig["m.identity_server"].error = AutoDiscovery.ERROR_INVALID_IS_BASE_URL; - return Promise.resolve(failingClientConfig); - } - - // Step 5b: Verify there is an identity server listening on the provided - // URL. - const isResponse = await this.fetchWellKnownObject(`${isUrl}/_matrix/identity/v2`); - if (!isResponse?.raw || isResponse.action !== AutoDiscoveryAction.SUCCESS) { - logger.error("Invalid /v2 response"); - failingClientConfig["m.identity_server"].error = AutoDiscovery.ERROR_INVALID_IDENTITY_SERVER; - - // Supply the base_url to the caller because they may be ignoring - // liveliness errors, like this one. - failingClientConfig["m.identity_server"].base_url = isUrl; - - return Promise.resolve(failingClientConfig); - } - } - - // Step 6: Now that the identity server is valid, or never existed, - // populate the IS section. - if (isUrl && isUrl.toString().length > 0) { - clientConfig["m.identity_server"] = { - state: AutoDiscovery.SUCCESS, - error: null, - base_url: isUrl, - }; - } - - // Step 7: Copy any other keys directly into the clientConfig. This is for - // things like custom configuration of services. - Object.keys(wellknown).forEach((k: keyof IClientWellKnown) => { - if (k === "m.homeserver" || k === "m.identity_server") { - // Only copy selected parts of the config to avoid overwriting - // properties computed by the validation logic above. - const notProps = ["error", "state", "base_url"]; - for (const prop of Object.keys(wellknown[k]!)) { - if (notProps.includes(prop)) continue; - type Prop = Exclude<keyof IWellKnownConfig, "error" | "state" | "base_url">; - // @ts-ignore - ts gets unhappy as we're mixing types here - clientConfig[k][prop as Prop] = wellknown[k]![prop as Prop]; - } - } else { - // Just copy the whole thing over otherwise - clientConfig[k] = wellknown[k]; - } - }); - - // Step 8: Give the config to the caller (finally) - return Promise.resolve(clientConfig); - } - - /** - * Attempts to automatically discover client configuration information - * prior to logging in. Such information includes the homeserver URL - * and identity server URL the client would want. Additional details - * may also be discovered, and will be transparently included in the - * response object unaltered. - * @param domain - The homeserver domain to perform discovery - * on. For example, "matrix.org". - * @returns Promise which resolves to the discovered - * configuration, which may include error states. Rejects on unexpected - * failure, not when discovery fails. - */ - public static async findClientConfig(domain: string): Promise<ClientConfig> { - if (!domain || typeof domain !== "string" || domain.length === 0) { - throw new Error("'domain' must be a string of non-zero length"); - } - - // We use a .well-known lookup for all cases. According to the spec, we - // can do other discovery mechanisms if we want such as custom lookups - // however we won't bother with that here (mostly because the spec only - // supports .well-known right now). - // - // By using .well-known, we need to ensure we at least pull out a URL - // for the homeserver. We don't really need an identity server configuration - // but will return one anyways (with state PROMPT) to make development - // easier for clients. If we can't get a homeserver URL, all bets are - // off on the rest of the config and we'll assume it is invalid too. - - // We default to an error state to make the first few checks easier to - // write. We'll update the properties of this object over the duration - // of this function. - const clientConfig: ClientConfig = { - "m.homeserver": { - state: AutoDiscovery.FAIL_ERROR, - error: AutoDiscovery.ERROR_INVALID, - base_url: null, - }, - "m.identity_server": { - // Technically, we don't have a problem with the identity server - // config at this point. - state: AutoDiscovery.PROMPT, - error: null, - base_url: null, - }, - }; - - // Step 1: Actually request the .well-known JSON file and make sure it - // at least has a homeserver definition. - const wellknown = await this.fetchWellKnownObject(`https://${domain}/.well-known/matrix/client`); - if (!wellknown || wellknown.action !== AutoDiscoveryAction.SUCCESS) { - logger.error("No response or error when parsing .well-known"); - if (wellknown.reason) logger.error(wellknown.reason); - if (wellknown.action === AutoDiscoveryAction.IGNORE) { - clientConfig["m.homeserver"] = { - state: AutoDiscovery.PROMPT, - error: null, - base_url: null, - }; - } else { - // this can only ever be FAIL_PROMPT at this point. - clientConfig["m.homeserver"].state = AutoDiscovery.FAIL_PROMPT; - clientConfig["m.homeserver"].error = AutoDiscovery.ERROR_INVALID; - } - return Promise.resolve(clientConfig); - } - - // Step 2: Validate and parse the config - return AutoDiscovery.fromDiscoveryConfig(wellknown.raw!); - } - - /** - * Gets the raw discovery client configuration for the given domain name. - * Should only be used if there's no validation to be done on the resulting - * object, otherwise use findClientConfig(). - * @param domain - The domain to get the client config for. - * @returns Promise which resolves to the domain's client config. Can - * be an empty object. - */ - public static async getRawClientConfig(domain?: string): Promise<IClientWellKnown> { - if (!domain || typeof domain !== "string" || domain.length === 0) { - throw new Error("'domain' must be a string of non-zero length"); - } - - const response = await this.fetchWellKnownObject(`https://${domain}/.well-known/matrix/client`); - if (!response) return {}; - return response.raw || {}; - } - - /** - * Sanitizes a given URL to ensure it is either an HTTP or HTTP URL and - * is suitable for the requirements laid out by .well-known auto discovery. - * If valid, the URL will also be stripped of any trailing slashes. - * @param url - The potentially invalid URL to sanitize. - * @returns The sanitized URL or a falsey value if the URL is invalid. - * @internal - */ - private static sanitizeWellKnownUrl(url?: string | null): string | false { - if (!url) return false; - - try { - let parsed: URL | undefined; - try { - parsed = new URL(url); - } catch (e) { - logger.error("Could not parse url", e); - } - - if (!parsed?.hostname) return false; - if (parsed.protocol !== "http:" && parsed.protocol !== "https:") return false; - - const port = parsed.port ? `:${parsed.port}` : ""; - const path = parsed.pathname ? parsed.pathname : ""; - let saferUrl = `${parsed.protocol}//${parsed.hostname}${port}${path}`; - if (saferUrl.endsWith("/")) { - saferUrl = saferUrl.substring(0, saferUrl.length - 1); - } - return saferUrl; - } catch (e) { - logger.error(e); - return false; - } - } - - private static fetch(resource: URL | string, options?: RequestInit): ReturnType<typeof global.fetch> { - if (this.fetchFn) { - return this.fetchFn(resource, options); - } - return global.fetch(resource, options); - } - - private static fetchFn?: typeof global.fetch; - - public static setFetchFn(fetchFn: typeof global.fetch): void { - AutoDiscovery.fetchFn = fetchFn; - } - - /** - * Fetches a JSON object from a given URL, as expected by all .well-known - * related lookups. If the server gives a 404 then the `action` will be - * IGNORE. If the server returns something that isn't JSON, the `action` - * will be FAIL_PROMPT. For any other failure the `action` will be FAIL_PROMPT. - * - * The returned object will be a result of the call in object form with - * the following properties: - * raw: The JSON object returned by the server. - * action: One of SUCCESS, IGNORE, or FAIL_PROMPT. - * reason: Relatively human-readable description of what went wrong. - * error: The actual Error, if one exists. - * @param url - The URL to fetch a JSON object from. - * @returns Promise which resolves to the returned state. - * @internal - */ - private static async fetchWellKnownObject(url: string): Promise<IWellKnownConfig> { - let response: Response; - - try { - response = await AutoDiscovery.fetch(url, { - method: Method.Get, - signal: timeoutSignal(5000), - }); - - if (response.status === 404) { - return { - raw: {}, - action: AutoDiscoveryAction.IGNORE, - reason: AutoDiscovery.ERROR_MISSING_WELLKNOWN, - }; - } - - if (!response.ok) { - return { - raw: {}, - action: AutoDiscoveryAction.FAIL_PROMPT, - reason: "General failure", - }; - } - } catch (err) { - const error = err as AutoDiscoveryError | string | undefined; - let reason = ""; - if (typeof error === "object") { - reason = (<Error>error)?.message; - } - - return { - error, - raw: {}, - action: AutoDiscoveryAction.FAIL_PROMPT, - reason: reason || "General failure", - }; - } - - try { - return { - raw: await response.json(), - action: AutoDiscoveryAction.SUCCESS, - }; - } catch (err) { - const error = err as Error; - return { - error, - raw: {}, - action: AutoDiscoveryAction.FAIL_PROMPT, - reason: - (error as MatrixError)?.name === "SyntaxError" - ? AutoDiscovery.ERROR_INVALID_JSON - : AutoDiscovery.ERROR_INVALID, - }; - } - } -} |