cbcc369a2d
* Full API in Authenticated WS server. * Replacing UI server with Hyper. * Solving CLI, RPCs and tests. * Porting signer tests. * Fixing origin recognition for dapps/rpc. * Fixing tests. Adding parity-rpc-client to test. * Dapps exposed as RPC method. * JS code to support new connection scheme. * Fixing dapps tests. * Updating allowed origins/hosts to support web3.site. * Fixing tests, fixing UI. * Fixing tests. * Removing invalid tests. * Fixing merge. * 404 fallback for UI * Improve ContentFetcher constructor readability. * Naming. * Update .gitlab-ci.yml fix CI lint error * Fixing tests and linting issues. * Fixing new tests. * UI hosts. * Submodules fix.
423 lines
10 KiB
JavaScript
423 lines
10 KiB
JavaScript
// Copyright 2015-2017 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity.
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import { uniq } from 'lodash';
|
|
import store from 'store';
|
|
|
|
import Api from './api';
|
|
import { LOG_KEYS, getLogger } from '~/config';
|
|
|
|
const log = getLogger(LOG_KEYS.Signer);
|
|
|
|
export default class SecureApi extends Api {
|
|
_isConnecting = false;
|
|
_needsToken = false;
|
|
_tokens = [];
|
|
|
|
_dappsUrl = null;
|
|
_wsUrl = null;
|
|
|
|
static getTransport (url, sysuiToken, protocol) {
|
|
const proto = protocol() === 'https:' ? 'wss:' : 'ws:';
|
|
|
|
return new Api.Transport.Ws(`${proto}//${url}`, sysuiToken, false);
|
|
}
|
|
|
|
// Returns a protocol with `:` at the end.
|
|
static protocol () {
|
|
return window.location.protocol;
|
|
}
|
|
|
|
constructor (url, nextToken, getTransport = SecureApi.getTransport, protocol = SecureApi.protocol) {
|
|
const sysuiToken = store.get('sysuiToken');
|
|
const transport = getTransport(url, sysuiToken, protocol);
|
|
|
|
super(transport);
|
|
|
|
this._wsUrl = url;
|
|
this.protocol = protocol;
|
|
// Try tokens from localStorage, from hash and 'initial'
|
|
this._tokens = uniq([sysuiToken, nextToken, 'initial'])
|
|
.filter((token) => token)
|
|
.map((token) => ({ value: token, tried: false }));
|
|
|
|
// When the transport is closed, try to reconnect
|
|
transport.on('close', this.connect, this);
|
|
|
|
this.connect();
|
|
}
|
|
|
|
get _dappsAddress () {
|
|
if (!this._dappsUrl) {
|
|
return {
|
|
host: null,
|
|
port: 8545
|
|
};
|
|
}
|
|
|
|
const [host, port] = this._dappsUrl.split(':');
|
|
|
|
return {
|
|
host,
|
|
port: parseInt(port, 10)
|
|
};
|
|
}
|
|
|
|
get dappsPort () {
|
|
return this._dappsAddress.port;
|
|
}
|
|
|
|
get dappsUrl () {
|
|
const { port } = this._dappsAddress;
|
|
|
|
return `${this.protocol()}//${this.hostname}:${port}`;
|
|
}
|
|
|
|
get hostname () {
|
|
if (window.location.hostname === 'home.parity') {
|
|
return 'dapps.parity';
|
|
}
|
|
|
|
const { host } = this._dappsAddress;
|
|
|
|
if (!host || host === '0.0.0.0') {
|
|
return window.location.hostname;
|
|
}
|
|
|
|
return host;
|
|
}
|
|
|
|
get isConnecting () {
|
|
return this._isConnecting;
|
|
}
|
|
|
|
get isConnected () {
|
|
return this._transport.isConnected;
|
|
}
|
|
|
|
get needsToken () {
|
|
return this._needsToken;
|
|
}
|
|
|
|
get secureToken () {
|
|
return this._transport.token;
|
|
}
|
|
|
|
/**
|
|
* Configure the current API with the given values
|
|
* (`signerPort`, `dappsInterface`, `dappsPort`, ...)
|
|
*/
|
|
configure (configuration) {
|
|
const { dappsInterface, dappsPort, signerPort, wsPort } = configuration;
|
|
|
|
if (dappsInterface) {
|
|
this._dappsUrl = `${dappsInterface}:${this._dappsAddress.port}`;
|
|
}
|
|
|
|
if (dappsPort) {
|
|
this._dappsUrl = `${this.hostname}:${dappsPort}`;
|
|
}
|
|
|
|
if (signerPort || wsPort) {
|
|
this._wsUrl = `${this.hostname}:${signerPort || wsPort}`;
|
|
}
|
|
}
|
|
|
|
connect () {
|
|
if (this._isConnecting) {
|
|
return;
|
|
}
|
|
|
|
log.debug('trying to connect...');
|
|
|
|
this._isConnecting = true;
|
|
|
|
this.emit('connecting');
|
|
|
|
// Reset the tested Tokens
|
|
this._resetTokens();
|
|
|
|
// Try to connect
|
|
return this._connect()
|
|
.then((connected) => {
|
|
this._isConnecting = false;
|
|
|
|
if (connected) {
|
|
const token = this.secureToken;
|
|
|
|
log.debug('got connected ; saving token', token);
|
|
|
|
// Save the sucessful token
|
|
this._saveToken(token);
|
|
this._needsToken = false;
|
|
|
|
// Emit the connected event
|
|
return this.emit('connected');
|
|
}
|
|
|
|
// If not connected, we need a new token
|
|
log.debug('needs a token');
|
|
this._needsToken = true;
|
|
|
|
return this.emit('disconnected');
|
|
})
|
|
.catch((error) => {
|
|
this._isConnecting = false;
|
|
|
|
log.debug('emitting "disconnected"');
|
|
this.emit('disconnected');
|
|
console.error('unhandled error in secureApi', error);
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Returns a Promise that gets resolved with
|
|
* a boolean: `true` if the node is up, `false`
|
|
* otherwise (HEAD request to the Node)
|
|
*/
|
|
isNodeUp () {
|
|
return fetch(`${this.protocol()}//${this._wsUrl}`, { method: 'HEAD', mode: 'no-cors' })
|
|
.then(
|
|
(r) => r.status === 200,
|
|
() => false
|
|
)
|
|
.catch(() => false);
|
|
}
|
|
|
|
/**
|
|
* Update the given token, ie. add it to the token
|
|
* list, and then try to connect (if not already connecting)
|
|
*/
|
|
updateToken (_token) {
|
|
const token = this._sanitiseToken(_token);
|
|
|
|
log.debug('updating token', token);
|
|
|
|
// Update the tokens list: put the new one on first position
|
|
this._tokens = [ { value: token, tried: false } ].concat(this._tokens);
|
|
|
|
// Try to connect with the new token added
|
|
return this.connect();
|
|
}
|
|
|
|
/**
|
|
* Try to connect to the Node with the next Token in
|
|
* the list
|
|
*/
|
|
_connect () {
|
|
log.debug('trying next token');
|
|
|
|
// Get the first not-tried token
|
|
const nextToken = this._getNextToken();
|
|
|
|
// If no more tokens to try, user has to enter a new one
|
|
if (!nextToken) {
|
|
return Promise.resolve(false);
|
|
}
|
|
|
|
nextToken.tried = true;
|
|
|
|
return this._connectWithToken(nextToken.value)
|
|
.then((validToken) => {
|
|
// If not valid, try again with the next token in the list
|
|
if (!validToken) {
|
|
return this._connect();
|
|
}
|
|
|
|
// If correct and valid token, wait until the Node is ready
|
|
// and resolve as connected
|
|
return this._waitUntilNodeReady()
|
|
.then(() => this._fetchSettings())
|
|
.then(() => true);
|
|
})
|
|
.catch((error) => {
|
|
log.error('unkown error in _connect', error);
|
|
return false;
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Connect with the given token.
|
|
* It returns a Promise that gets resolved
|
|
* with `validToken` as argument, whether the given token
|
|
* is valid or not
|
|
*/
|
|
_connectWithToken (_token) {
|
|
// Sanitize the token first
|
|
const token = this._sanitiseToken(_token);
|
|
|
|
// Update the token in the transport layer
|
|
this.transport.updateToken(token, false);
|
|
log.debug('connecting with token', token);
|
|
|
|
const connectPromise = this.transport.connect()
|
|
.then(() => {
|
|
log.debug('connected with', token);
|
|
|
|
if (token === 'initial') {
|
|
return this._generateAuthorizationToken();
|
|
}
|
|
|
|
// The token is valid !
|
|
return true;
|
|
})
|
|
.catch((error) => {
|
|
// Log if it's not a close error (ie. wrong token)
|
|
if (error && error.type !== 'close') {
|
|
log.debug('did not connect ; error', error);
|
|
}
|
|
|
|
return false;
|
|
});
|
|
|
|
return Promise
|
|
.all([
|
|
connectPromise,
|
|
this.isNodeUp()
|
|
])
|
|
.then(([ connected, isNodeUp ]) => {
|
|
if (connected) {
|
|
return true;
|
|
}
|
|
|
|
// If it's not up, try again in a few...
|
|
if (!isNodeUp) {
|
|
const timeout = this.transport.retryTimeout;
|
|
|
|
log.debug('node is not up ; will try again in', timeout, 'ms');
|
|
|
|
return new Promise((resolve, reject) => {
|
|
window.setTimeout(() => {
|
|
this._connectWithToken(token).then(resolve).catch(reject);
|
|
}, timeout);
|
|
});
|
|
}
|
|
|
|
// The token is invalid
|
|
log.debug('tried with a wrong token', token);
|
|
return false;
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Retrieve the correct ports from the Node
|
|
*/
|
|
_fetchSettings () {
|
|
return Promise
|
|
.all([
|
|
this.parity.dappsUrl(),
|
|
this.parity.wsUrl()
|
|
])
|
|
.then(([dappsUrl, wsUrl]) => {
|
|
this._dappsUrl = dappsUrl;
|
|
this._wsUrl = dappsUrl;
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Try to generate an Authorization Token.
|
|
* Then try to connect with the new token.
|
|
*/
|
|
_generateAuthorizationToken () {
|
|
return this.signer
|
|
.generateAuthorizationToken()
|
|
.then((token) => this._connectWithToken(token));
|
|
}
|
|
|
|
/**
|
|
* Get the next token to try, if any left
|
|
*/
|
|
_getNextToken () {
|
|
// Get the first not-tried token
|
|
const nextTokenIndex = this._tokens.findIndex((t) => !t.tried);
|
|
|
|
// If no more tokens to try, user has to enter a new one
|
|
if (nextTokenIndex < 0) {
|
|
return null;
|
|
}
|
|
|
|
const nextToken = this._tokens[nextTokenIndex];
|
|
|
|
return nextToken;
|
|
}
|
|
|
|
_resetTokens () {
|
|
this._tokens = this._tokens.map((token) => ({
|
|
...token,
|
|
tried: false
|
|
}));
|
|
}
|
|
|
|
_sanitiseToken (token) {
|
|
return token.replace(/[^a-zA-Z0-9]/g, '');
|
|
}
|
|
|
|
_saveToken (token) {
|
|
store.set('sysuiToken', token);
|
|
}
|
|
|
|
/**
|
|
* Promise gets resolved when the node is up
|
|
* and running (it might take some time before
|
|
* the node is actually ready even when the client
|
|
* is connected).
|
|
*
|
|
* We check that the `parity_netChain` RPC calls
|
|
* returns successfully
|
|
*/
|
|
_waitUntilNodeReady (_timeleft) {
|
|
// Default timeout to 30 seconds
|
|
const timeleft = Number.isFinite(_timeleft)
|
|
? _timeleft
|
|
: 30 * 1000;
|
|
|
|
// After timeout, just resolve the promise...
|
|
if (timeleft <= 0) {
|
|
console.warn('node is still not ready after 30 seconds...');
|
|
return Promise.resolve(true);
|
|
}
|
|
|
|
const start = Date.now();
|
|
|
|
return this
|
|
.parity.netChain()
|
|
.then(() => true)
|
|
.catch((error) => {
|
|
if (!error) {
|
|
return true;
|
|
}
|
|
|
|
if (error.type !== 'NETWORK_DISABLED') {
|
|
throw error;
|
|
}
|
|
|
|
// Timeout between 250ms and 750ms
|
|
const timeout = Math.floor(250 + (500 * Math.random()));
|
|
|
|
log.debug('waiting until node is ready', 'retry in', timeout, 'ms');
|
|
|
|
// Retry in a few...
|
|
return new Promise((resolve, reject) => {
|
|
window.setTimeout(() => {
|
|
const duration = Date.now() - start;
|
|
|
|
this._waitUntilNodeReady(timeleft - duration).then(resolve).catch(reject);
|
|
}, timeout);
|
|
});
|
|
});
|
|
}
|
|
}
|