mirror of
https://github.com/Drop-OSS/drop.git
synced 2025-11-13 16:22:39 +10:00
feat(client cap): client capability framework + peer API configuration
This commit is contained in:
137
server/internal/clients/capabilities.ts
Normal file
137
server/internal/clients/capabilities.ts
Normal file
@ -0,0 +1,137 @@
|
||||
import { EnumDictionary } from "../utils/types";
|
||||
import https from "https";
|
||||
import { useGlobalCertificateAuthority } from "~/server/plugins/ca";
|
||||
import prisma from "../db/database";
|
||||
import { ClientCapabilities } from "@prisma/client";
|
||||
|
||||
|
||||
// These values are technically mapped to the database,
|
||||
// but Typescript/Prisma doesn't let me link them
|
||||
// They are also what are required by clients in the API
|
||||
// BREAKING CHANGE
|
||||
export enum InternalClientCapability {
|
||||
PeerAPI = "peerAPI",
|
||||
UserStatus = "userStatus",
|
||||
}
|
||||
|
||||
export const validCapabilities = Object.values(InternalClientCapability);
|
||||
|
||||
export type CapabilityConfiguration = {
|
||||
[InternalClientCapability.PeerAPI]: { endpoints: string[] };
|
||||
[InternalClientCapability.UserStatus]: {};
|
||||
};
|
||||
|
||||
class CapabilityManager {
|
||||
private validationFunctions: EnumDictionary<
|
||||
InternalClientCapability,
|
||||
(configuration: object) => Promise<boolean>
|
||||
> = {
|
||||
[InternalClientCapability.PeerAPI]: async (rawConfiguration) => {
|
||||
const configuration =
|
||||
rawConfiguration as CapabilityConfiguration[InternalClientCapability.PeerAPI];
|
||||
|
||||
// Check if we can use the endpoints object
|
||||
if (!configuration.endpoints) return false;
|
||||
if (!Array.isArray(configuration.endpoints)) return false;
|
||||
if (configuration.endpoints.length == 0) return false;
|
||||
|
||||
// Check if valid URLs
|
||||
if (
|
||||
configuration.endpoints.filter((endpoint) => {
|
||||
try {
|
||||
new URL(endpoint);
|
||||
return true;
|
||||
} catch {
|
||||
return false;
|
||||
}
|
||||
})
|
||||
)
|
||||
return false;
|
||||
|
||||
const ca = useGlobalCertificateAuthority();
|
||||
const serverCertificate = await ca.fetchClientCertificate("server");
|
||||
if (!serverCertificate)
|
||||
throw new Error(
|
||||
"CA not initialised properly - server mTLS certificate not present"
|
||||
);
|
||||
const httpsAgent = new https.Agent({
|
||||
key: serverCertificate.priv,
|
||||
cert: serverCertificate.cert,
|
||||
});
|
||||
|
||||
// Loop through endpoints and make sure at least one is accessible by the Drop server
|
||||
let valid = false;
|
||||
for (const endpoint of configuration.endpoints) {
|
||||
const healthcheckEndpoint = new URL("/", endpoint);
|
||||
try {
|
||||
await $fetch(healthcheckEndpoint.href, {
|
||||
agent: httpsAgent,
|
||||
});
|
||||
valid = true;
|
||||
break;
|
||||
} catch {}
|
||||
}
|
||||
|
||||
return valid;
|
||||
},
|
||||
[InternalClientCapability.UserStatus]: async () => true, // No requirements for user status
|
||||
};
|
||||
|
||||
async validateCapabilityConfiguration(
|
||||
capability: InternalClientCapability,
|
||||
configuration: object
|
||||
) {
|
||||
const validationFunction = this.validationFunctions[capability];
|
||||
return validationFunction(configuration);
|
||||
}
|
||||
|
||||
async upsertClientCapability(
|
||||
capability: InternalClientCapability,
|
||||
rawCapability: object,
|
||||
clientId: string
|
||||
) {
|
||||
switch (capability) {
|
||||
case InternalClientCapability.PeerAPI:
|
||||
const configuration =
|
||||
rawCapability as CapabilityConfiguration[InternalClientCapability.PeerAPI];
|
||||
|
||||
const currentClient = await prisma.client.findUnique({
|
||||
where: { id: clientId },
|
||||
select: {
|
||||
capabilities: true,
|
||||
},
|
||||
});
|
||||
if (!currentClient) throw new Error("Invalid client ID");
|
||||
if (currentClient.capabilities.includes(ClientCapabilities.PeerAPI)) {
|
||||
await prisma.clientPeerAPIConfiguration.update({
|
||||
where: { clientId },
|
||||
data: {
|
||||
endpoints: configuration.endpoints,
|
||||
},
|
||||
});
|
||||
return;
|
||||
}
|
||||
|
||||
await prisma.clientPeerAPIConfiguration.create({
|
||||
data: {
|
||||
clientId: clientId,
|
||||
endpoints: configuration.endpoints,
|
||||
},
|
||||
});
|
||||
|
||||
await prisma.client.update({
|
||||
where: { id: clientId },
|
||||
data: {
|
||||
capabilities: {
|
||||
push: ClientCapabilities.PeerAPI,
|
||||
},
|
||||
},
|
||||
});
|
||||
return;
|
||||
}
|
||||
throw new Error("Cannot upsert client capability for: " + capability);
|
||||
}
|
||||
}
|
||||
|
||||
const capabilityManager = new CapabilityManager();
|
||||
export default capabilityManager;
|
||||
Reference in New Issue
Block a user