NCNetworking.swift 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384
  1. //
  2. // NCNetworking.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 23/10/19.
  6. // Copyright © 2019 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import OpenSSL
  25. import NextcloudKit
  26. import Alamofire
  27. import Queuer
  28. #if EXTENSION_FILE_PROVIDER_EXTENSION || EXTENSION_WIDGET
  29. @objc protocol uploadE2EEDelegate: AnyObject { }
  30. #endif
  31. @objc protocol ClientCertificateDelegate {
  32. func onIncorrectPassword()
  33. func didAskForClientCertificate()
  34. }
  35. @objcMembers
  36. class NCNetworking: NSObject, NKCommonDelegate {
  37. public static let shared: NCNetworking = {
  38. let instance = NCNetworking()
  39. NotificationCenter.default.addObserver(instance, selector: #selector(applicationDidEnterBackground), name: UIApplication.didEnterBackgroundNotification, object: nil)
  40. return instance
  41. }()
  42. public struct TransferInForegorund {
  43. var ocId: String
  44. var progress: Float
  45. }
  46. struct FileNameServerUrl: Hashable {
  47. var fileName: String
  48. var serverUrl: String
  49. }
  50. let utilityFileSystem = NCUtilityFileSystem()
  51. let utility = NCUtility()
  52. var lastReachability: Bool = true
  53. var networkReachability: NKCommon.TypeReachability?
  54. let downloadRequest = ThreadSafeDictionary<String, DownloadRequest>()
  55. let uploadRequest = ThreadSafeDictionary<String, UploadRequest>()
  56. let uploadMetadataInBackground = ThreadSafeDictionary<FileNameServerUrl, tableMetadata>()
  57. let downloadMetadataInBackground = ThreadSafeDictionary<FileNameServerUrl, tableMetadata>()
  58. var transferInForegorund: TransferInForegorund?
  59. weak var delegate: ClientCertificateDelegate?
  60. var p12Data: Data?
  61. var p12Password: String?
  62. let transferInError = ThreadSafeDictionary<String, Int>()
  63. func transferInError(ocId: String) {
  64. if let counter = self.transferInError[ocId] {
  65. self.transferInError[ocId] = counter + 1
  66. } else {
  67. self.transferInError[ocId] = 1
  68. }
  69. }
  70. func removeTransferInError(ocId: String) {
  71. self.transferInError.removeValue(forKey: ocId)
  72. }
  73. lazy var nkBackground: NKBackground = {
  74. let nckb = NKBackground(nkCommonInstance: NextcloudKit.shared.nkCommonInstance)
  75. return nckb
  76. }()
  77. public let sessionMaximumConnectionsPerHost = 5
  78. public let sessionDownloadBackground: String = "com.nextcloud.session.download.background"
  79. public let sessionUploadBackground: String = "com.nextcloud.session.upload.background"
  80. public let sessionUploadBackgroundWWan: String = "com.nextcloud.session.upload.backgroundWWan"
  81. public let sessionUploadBackgroundExtension: String = "com.nextcloud.session.upload.extension"
  82. public lazy var sessionManagerDownloadBackground: URLSession = {
  83. let configuration = URLSessionConfiguration.background(withIdentifier: sessionDownloadBackground)
  84. configuration.allowsCellularAccess = true
  85. configuration.sessionSendsLaunchEvents = true
  86. configuration.isDiscretionary = false
  87. configuration.httpMaximumConnectionsPerHost = sessionMaximumConnectionsPerHost
  88. configuration.requestCachePolicy = NSURLRequest.CachePolicy.reloadIgnoringLocalCacheData
  89. let session = URLSession(configuration: configuration, delegate: nkBackground, delegateQueue: OperationQueue.main)
  90. return session
  91. }()
  92. public lazy var sessionManagerUploadBackground: URLSession = {
  93. let configuration = URLSessionConfiguration.background(withIdentifier: sessionUploadBackground)
  94. configuration.allowsCellularAccess = true
  95. configuration.sessionSendsLaunchEvents = true
  96. configuration.isDiscretionary = false
  97. configuration.httpMaximumConnectionsPerHost = sessionMaximumConnectionsPerHost
  98. configuration.requestCachePolicy = NSURLRequest.CachePolicy.reloadIgnoringLocalCacheData
  99. let session = URLSession(configuration: configuration, delegate: nkBackground, delegateQueue: OperationQueue.main)
  100. return session
  101. }()
  102. public lazy var sessionManagerUploadBackgroundWWan: URLSession = {
  103. let configuration = URLSessionConfiguration.background(withIdentifier: sessionUploadBackgroundWWan)
  104. configuration.allowsCellularAccess = false
  105. configuration.sessionSendsLaunchEvents = true
  106. configuration.isDiscretionary = false
  107. configuration.httpMaximumConnectionsPerHost = sessionMaximumConnectionsPerHost
  108. configuration.requestCachePolicy = NSURLRequest.CachePolicy.reloadIgnoringLocalCacheData
  109. let session = URLSession(configuration: configuration, delegate: nkBackground, delegateQueue: OperationQueue.main)
  110. return session
  111. }()
  112. #if EXTENSION
  113. public lazy var sessionManagerUploadBackgroundExtension: URLSession = {
  114. let configuration = URLSessionConfiguration.background(withIdentifier: sessionUploadBackgroundExtension)
  115. configuration.allowsCellularAccess = true
  116. configuration.sessionSendsLaunchEvents = true
  117. configuration.isDiscretionary = false
  118. configuration.httpMaximumConnectionsPerHost = sessionMaximumConnectionsPerHost
  119. configuration.requestCachePolicy = NSURLRequest.CachePolicy.reloadIgnoringLocalCacheData
  120. configuration.sharedContainerIdentifier = NCBrandOptions.shared.capabilitiesGroups
  121. let session = URLSession(configuration: configuration, delegate: nkBackground, delegateQueue: OperationQueue.main)
  122. return session
  123. }()
  124. #endif
  125. // REQUESTS
  126. var requestsUnifiedSearch: [DataRequest] = []
  127. // OPERATIONQUEUE
  128. let downloadThumbnailQueue = Queuer(name: "downloadThumbnailQueue", maxConcurrentOperationCount: 10, qualityOfService: .default)
  129. let downloadThumbnailActivityQueue = Queuer(name: "downloadThumbnailActivityQueue", maxConcurrentOperationCount: 10, qualityOfService: .default)
  130. let downloadThumbnailTrashQueue = Queuer(name: "downloadThumbnailTrashQueue", maxConcurrentOperationCount: 10, qualityOfService: .default)
  131. let unifiedSearchQueue = Queuer(name: "unifiedSearchQueue", maxConcurrentOperationCount: 1, qualityOfService: .default)
  132. let saveLivePhotoQueue = Queuer(name: "saveLivePhotoQueue", maxConcurrentOperationCount: 1, qualityOfService: .default)
  133. let downloadQueue = Queuer(name: "downloadQueue", maxConcurrentOperationCount: NCBrandOptions.shared.maxConcurrentOperationDownload, qualityOfService: .default)
  134. let downloadAvatarQueue = Queuer(name: "downloadAvatarQueue", maxConcurrentOperationCount: 10, qualityOfService: .default)
  135. let convertLivePhotoQueue = Queuer(name: "convertLivePhotoQueue", maxConcurrentOperationCount: 10, qualityOfService: .default)
  136. // MARK: - init
  137. override init() {
  138. super.init()
  139. getActiveAccountCertificate()
  140. NotificationCenter.default.addObserver(forName: NSNotification.Name(rawValue: NCGlobal.shared.notificationCenterChangeUser), object: nil, queue: nil) { _ in
  141. self.getActiveAccountCertificate()
  142. }
  143. #if EXTENSION
  144. print("Start Background Upload Extension: ", sessionUploadBackgroundExtension)
  145. #else
  146. print("Start Background Download: ", sessionManagerDownloadBackground)
  147. print("Start Background Upload: ", sessionManagerUploadBackground)
  148. print("Start Background Upload WWan: ", sessionManagerUploadBackgroundWWan)
  149. #endif
  150. }
  151. // MARK: - NotificationCenter
  152. func applicationDidEnterBackground() {
  153. self.transferInError.removeAll()
  154. }
  155. // MARK: - Communication Delegate
  156. func networkReachabilityObserver(_ typeReachability: NKCommon.TypeReachability) {
  157. if typeReachability == NKCommon.TypeReachability.reachableCellular || typeReachability == NKCommon.TypeReachability.reachableEthernetOrWiFi {
  158. if !lastReachability {
  159. #if !EXTENSION
  160. NCService().startRequestServicesServer()
  161. #endif
  162. }
  163. lastReachability = true
  164. } else {
  165. if lastReachability {
  166. let error = NKError(errorCode: NCGlobal.shared.errorNetworkNotAvailable, errorDescription: "")
  167. NCContentPresenter().messageNotification("_network_not_available_", error: error, delay: NCGlobal.shared.dismissAfterSecond, type: NCContentPresenter.messageType.info)
  168. }
  169. lastReachability = false
  170. }
  171. networkReachability = typeReachability
  172. }
  173. func authenticationChallenge(_ session: URLSession,
  174. didReceive challenge: URLAuthenticationChallenge,
  175. completionHandler: @escaping (URLSession.AuthChallengeDisposition, URLCredential?) -> Void) {
  176. if challenge.protectionSpace.authenticationMethod == NSURLAuthenticationMethodClientCertificate {
  177. DispatchQueue.main.async {
  178. if let p12Data = self.p12Data,
  179. let cert = (p12Data, self.p12Password) as? UserCertificate,
  180. let pkcs12 = try? PKCS12(pkcs12Data: cert.data, password: cert.password, onIncorrectPassword: {
  181. self.delegate?.onIncorrectPassword()
  182. }) {
  183. let creds = PKCS12.urlCredential(for: pkcs12)
  184. completionHandler(URLSession.AuthChallengeDisposition.useCredential, creds)
  185. } else {
  186. self.delegate?.didAskForClientCertificate()
  187. completionHandler(URLSession.AuthChallengeDisposition.performDefaultHandling, nil)
  188. }
  189. }
  190. } else {
  191. DispatchQueue.global().async {
  192. self.checkTrustedChallenge(session, didReceive: challenge, completionHandler: completionHandler)
  193. }
  194. }
  195. }
  196. func urlSessionDidFinishEvents(forBackgroundURLSession session: URLSession) {
  197. #if !EXTENSION
  198. if let appDelegate = UIApplication.shared.delegate as? AppDelegate, let completionHandler = appDelegate.backgroundSessionCompletionHandler {
  199. NextcloudKit.shared.nkCommonInstance.writeLog("[INFO] Called urlSessionDidFinishEvents for Background URLSession")
  200. appDelegate.backgroundSessionCompletionHandler = nil
  201. completionHandler()
  202. }
  203. #endif
  204. }
  205. // MARK: -
  206. func cancelAllQueue() {
  207. downloadQueue.cancelAll()
  208. downloadThumbnailQueue.cancelAll()
  209. downloadThumbnailActivityQueue.cancelAll()
  210. downloadThumbnailTrashQueue.cancelAll()
  211. downloadAvatarQueue.cancelAll()
  212. unifiedSearchQueue.cancelAll()
  213. saveLivePhotoQueue.cancelAll()
  214. convertLivePhotoQueue.cancelAll()
  215. }
  216. func cancelAllTask() {
  217. cancelAllQueue()
  218. cancelDataTask()
  219. cancelDownloadTasks()
  220. cancelUploadTasks()
  221. cancelDownloadBackgroundTask()
  222. cancelUploadBackgroundTask()
  223. }
  224. // MARK: - Pinning check
  225. public func checkTrustedChallenge(_ session: URLSession,
  226. didReceive challenge: URLAuthenticationChallenge,
  227. completionHandler: @escaping (URLSession.AuthChallengeDisposition, URLCredential?) -> Void) {
  228. let protectionSpace: URLProtectionSpace = challenge.protectionSpace
  229. let directoryCertificate = utilityFileSystem.directoryCertificates
  230. let host = challenge.protectionSpace.host
  231. let certificateSavedPath = directoryCertificate + "/" + host + ".der"
  232. var isTrusted: Bool
  233. if let trust: SecTrust = protectionSpace.serverTrust,
  234. let certificates = (SecTrustCopyCertificateChain(trust) as? [SecCertificate]),
  235. let certificate = certificates.first {
  236. // extarct certificate txt
  237. saveX509Certificate(certificate, host: host, directoryCertificate: directoryCertificate)
  238. let isServerTrusted = SecTrustEvaluateWithError(trust, nil)
  239. let certificateCopyData = SecCertificateCopyData(certificate)
  240. let data = CFDataGetBytePtr(certificateCopyData)
  241. let size = CFDataGetLength(certificateCopyData)
  242. let certificateData = NSData(bytes: data, length: size)
  243. certificateData.write(toFile: directoryCertificate + "/" + host + ".tmp", atomically: true)
  244. if isServerTrusted {
  245. isTrusted = true
  246. } else if let certificateDataSaved = NSData(contentsOfFile: certificateSavedPath), certificateData.isEqual(to: certificateDataSaved as Data) {
  247. isTrusted = true
  248. } else {
  249. isTrusted = false
  250. }
  251. } else {
  252. isTrusted = false
  253. }
  254. if isTrusted {
  255. completionHandler(URLSession.AuthChallengeDisposition.useCredential, URLCredential(trust: challenge.protectionSpace.serverTrust!))
  256. } else {
  257. #if !EXTENSION
  258. DispatchQueue.main.async { (UIApplication.shared.delegate as? AppDelegate)?.trustCertificateError(host: host) }
  259. #endif
  260. completionHandler(URLSession.AuthChallengeDisposition.performDefaultHandling, nil)
  261. }
  262. }
  263. func writeCertificate(host: String) {
  264. let directoryCertificate = utilityFileSystem.directoryCertificates
  265. let certificateAtPath = directoryCertificate + "/" + host + ".tmp"
  266. let certificateToPath = directoryCertificate + "/" + host + ".der"
  267. if !utilityFileSystem.copyFile(atPath: certificateAtPath, toPath: certificateToPath) {
  268. NextcloudKit.shared.nkCommonInstance.writeLog("[ERROR] Write certificare error")
  269. }
  270. }
  271. func saveX509Certificate(_ certificate: SecCertificate, host: String, directoryCertificate: String) {
  272. let certNamePathTXT = directoryCertificate + "/" + host + ".txt"
  273. let data: CFData = SecCertificateCopyData(certificate)
  274. let mem = BIO_new_mem_buf(CFDataGetBytePtr(data), Int32(CFDataGetLength(data)))
  275. let x509cert = d2i_X509_bio(mem, nil)
  276. if x509cert == nil {
  277. NextcloudKit.shared.nkCommonInstance.writeLog("[ERROR] OpenSSL couldn't parse X509 Certificate")
  278. } else {
  279. // save details
  280. if FileManager.default.fileExists(atPath: certNamePathTXT) {
  281. do {
  282. try FileManager.default.removeItem(atPath: certNamePathTXT)
  283. } catch { }
  284. }
  285. let fileCertInfo = fopen(certNamePathTXT, "w")
  286. if fileCertInfo != nil {
  287. let output = BIO_new_fp(fileCertInfo, BIO_NOCLOSE)
  288. X509_print_ex(output, x509cert, UInt(XN_FLAG_COMPAT), UInt(X509_FLAG_COMPAT))
  289. BIO_free(output)
  290. }
  291. fclose(fileCertInfo)
  292. X509_free(x509cert)
  293. }
  294. BIO_free(mem)
  295. }
  296. func checkPushNotificationServerProxyCertificateUntrusted(viewController: UIViewController?,
  297. completion: @escaping (_ error: NKError) -> Void) {
  298. guard let host = URL(string: NCBrandOptions.shared.pushNotificationServerProxy)?.host else { return }
  299. NextcloudKit.shared.checkServer(serverUrl: NCBrandOptions.shared.pushNotificationServerProxy) { error in
  300. guard error == .success else {
  301. completion(.success)
  302. return
  303. }
  304. if error == .success {
  305. NCNetworking.shared.writeCertificate(host: host)
  306. completion(error)
  307. } else if error.errorCode == NSURLErrorServerCertificateUntrusted {
  308. let alertController = UIAlertController(title: NSLocalizedString("_ssl_certificate_untrusted_", comment: ""), message: NSLocalizedString("_connect_server_anyway_", comment: ""), preferredStyle: .alert)
  309. alertController.addAction(UIAlertAction(title: NSLocalizedString("_yes_", comment: ""), style: .default, handler: { _ in
  310. NCNetworking.shared.writeCertificate(host: host)
  311. completion(.success)
  312. }))
  313. alertController.addAction(UIAlertAction(title: NSLocalizedString("_no_", comment: ""), style: .default, handler: { _ in
  314. completion(error)
  315. }))
  316. alertController.addAction(UIAlertAction(title: NSLocalizedString("_certificate_details_", comment: ""), style: .default, handler: { _ in
  317. if let navigationController = UIStoryboard(name: "NCViewCertificateDetails", bundle: nil).instantiateInitialViewController() as? UINavigationController,
  318. let vcCertificateDetails = navigationController.topViewController as? NCViewCertificateDetails {
  319. vcCertificateDetails.host = host
  320. viewController?.present(navigationController, animated: true)
  321. }
  322. }))
  323. viewController?.present(alertController, animated: true)
  324. }
  325. }
  326. }
  327. private func getActiveAccountCertificate() {
  328. if let account = NCManageDatabase.shared.getActiveAccount()?.account {
  329. (self.p12Data, self.p12Password) = NCKeychain().getClientCertificate(account: account)
  330. }
  331. }
  332. }