2023-01-06 12:21:14 +00:00
|
|
|
package pairing
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2023-03-23 11:44:15 +00:00
|
|
|
"encoding/json"
|
2023-01-06 12:21:14 +00:00
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"net/http/cookiejar"
|
|
|
|
"net/url"
|
|
|
|
|
|
|
|
"github.com/status-im/status-go/api"
|
|
|
|
"github.com/status-im/status-go/logutils"
|
|
|
|
"github.com/status-im/status-go/signal"
|
|
|
|
)
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
/*
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
| BaseClient
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
// BaseClient is responsible for lower level pairing.Client functionality common to dependent Client types
|
|
|
|
type BaseClient struct {
|
2023-01-06 12:21:14 +00:00
|
|
|
*http.Client
|
2023-03-20 15:31:39 +00:00
|
|
|
serverCert *x509.Certificate
|
|
|
|
baseAddress *url.URL
|
|
|
|
challengeTaker *ChallengeTaker
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
// NewBaseClient returns a fully qualified BaseClient from the given ConnectionParams
|
|
|
|
func NewBaseClient(c *ConnectionParams) (*BaseClient, error) {
|
2023-01-06 12:21:14 +00:00
|
|
|
u, err := c.URL()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
serverCert, err := getServerCert(u)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
2023-01-06 12:21:14 +00:00
|
|
|
err = verifyCert(serverCert, c.publicKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
2023-01-06 12:21:14 +00:00
|
|
|
certPem := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: serverCert.Raw})
|
|
|
|
|
|
|
|
rootCAs, err := x509.SystemCertPool()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if ok := rootCAs.AppendCertsFromPEM(certPem); !ok {
|
|
|
|
return nil, fmt.Errorf("failed to append certPem to rootCAs")
|
|
|
|
}
|
|
|
|
|
|
|
|
tr := &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{
|
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
InsecureSkipVerify: false, // MUST BE FALSE
|
|
|
|
RootCAs: rootCAs,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
cj, err := cookiejar.New(nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
return &BaseClient{
|
2023-03-20 15:31:39 +00:00
|
|
|
Client: &http.Client{Transport: tr, Jar: cj},
|
|
|
|
serverCert: serverCert,
|
|
|
|
challengeTaker: NewChallengeTaker(NewPayloadEncryptor(c.aesKey)),
|
|
|
|
baseAddress: u,
|
2023-03-23 11:44:15 +00:00
|
|
|
}, nil
|
|
|
|
}
|
2023-01-06 12:21:14 +00:00
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
// getChallenge makes a call to the identified Server and receives a [32]byte challenge
|
|
|
|
func (c *BaseClient) getChallenge() error {
|
|
|
|
c.baseAddress.Path = pairingChallenge
|
|
|
|
resp, err := c.Get(c.baseAddress.String())
|
2023-02-28 12:32:45 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
return err
|
2023-02-28 12:32:45 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
return fmt.Errorf("[client] status not ok when getting challenge, received '%s'", resp.Status)
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
2023-03-20 18:39:28 +00:00
|
|
|
return c.challengeTaker.SetChallenge(resp)
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
/*
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
| SenderClient
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
| With AccountPayloadMounter, RawMessagePayloadMounter and InstallationPayloadMounterReceiver
|
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
// SenderClient is responsible for sending pairing data to a ReceiverServer
|
|
|
|
type SenderClient struct {
|
|
|
|
*BaseClient
|
|
|
|
accountMounter PayloadMounter
|
2023-03-30 10:00:32 +00:00
|
|
|
rawMessageMounter PayloadMounter
|
2023-04-02 23:08:29 +00:00
|
|
|
installationMounter PayloadMounterReceiver
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
// NewSenderClient returns a fully qualified SenderClient created with the incoming parameters
|
|
|
|
func NewSenderClient(backend *api.GethStatusBackend, c *ConnectionParams, config *SenderClientConfig) (*SenderClient, error) {
|
|
|
|
logger := logutils.ZapLogger().Named("SenderClient")
|
|
|
|
pe := NewPayloadEncryptor(c.aesKey)
|
|
|
|
|
|
|
|
bc, err := NewBaseClient(c)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2023-02-28 12:32:45 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
am, rmm, imr, err := NewPayloadMounters(logger, pe, backend, config.SenderConfig)
|
2023-02-28 12:32:45 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
return nil, err
|
2023-02-28 12:32:45 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
return &SenderClient{
|
|
|
|
BaseClient: bc,
|
|
|
|
accountMounter: am,
|
|
|
|
rawMessageMounter: rmm,
|
|
|
|
installationMounter: imr,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *SenderClient) sendAccountData() error {
|
|
|
|
err := c.accountMounter.Mount()
|
2023-02-28 12:32:45 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
c.baseAddress.Path = pairingReceiveAccount
|
|
|
|
resp, err := c.Post(c.baseAddress.String(), "application/octet-stream", bytes.NewBuffer(c.accountMounter.ToSend()))
|
2023-02-28 12:32:45 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingAccount})
|
2023-02-28 12:32:45 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
2023-03-23 11:44:15 +00:00
|
|
|
err = fmt.Errorf("[client] status not ok when sending account data, received '%s'", resp.Status)
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingAccount})
|
2023-02-28 12:32:45 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferSuccess, Action: ActionPairingAccount})
|
|
|
|
|
|
|
|
c.accountMounter.LockPayload()
|
2023-02-28 12:32:45 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
func (c *SenderClient) sendSyncDeviceData() error {
|
|
|
|
err := c.rawMessageMounter.Mount()
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
c.baseAddress.Path = pairingReceiveSyncDevice
|
|
|
|
resp, err := c.Post(c.baseAddress.String(), "application/octet-stream", bytes.NewBuffer(c.rawMessageMounter.ToSend()))
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionSyncDevice})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
2023-02-28 12:32:45 +00:00
|
|
|
err = fmt.Errorf("[client] status not okay when sending sync device data, status: %s", resp.Status)
|
2023-01-06 12:21:14 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionSyncDevice})
|
2023-02-28 12:32:45 +00:00
|
|
|
return err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferSuccess, Action: ActionSyncDevice})
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
func (c *SenderClient) receiveInstallationData() error {
|
2023-02-28 12:32:45 +00:00
|
|
|
c.baseAddress.Path = pairingSendInstallation
|
|
|
|
req, err := http.NewRequest(http.MethodGet, c.baseAddress.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-20 22:01:28 +00:00
|
|
|
err = c.challengeTaker.DoChallenge(req)
|
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-02-28 12:32:45 +00:00
|
|
|
resp, err := c.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
err = fmt.Errorf("[client] status not ok when receiving installation data, received '%s'", resp.Status)
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
payload, err := io.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferSuccess, Action: ActionPairingInstallation})
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.installationMounter.Receive(payload)
|
2023-02-28 12:32:45 +00:00
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventProcessError, Error: err.Error(), Action: ActionPairingInstallation})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventProcessSuccess, Action: ActionPairingInstallation})
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
// setupSendingClient creates a new SenderClient after parsing string inputs
|
|
|
|
func setupSendingClient(backend *api.GethStatusBackend, cs, configJSON string) (*SenderClient, error) {
|
|
|
|
ccp := new(ConnectionParams)
|
|
|
|
err := ccp.FromString(cs)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
return nil, err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
conf := NewSenderClientConfig()
|
|
|
|
err = json.Unmarshal([]byte(configJSON), conf)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
2023-03-29 15:51:01 +00:00
|
|
|
err = validateAndVerifyPassword(conf, conf.SenderConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-06 12:21:14 +00:00
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
conf.SenderConfig.DB = backend.GetMultiaccountDB()
|
|
|
|
|
|
|
|
return NewSenderClient(backend, ccp, conf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// StartUpSendingClient creates a SenderClient and triggers all `send` calls in sequence to the ReceiverServer
|
|
|
|
func StartUpSendingClient(backend *api.GethStatusBackend, cs, configJSON string) error {
|
|
|
|
c, err := setupSendingClient(backend, cs, configJSON)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.sendAccountData()
|
|
|
|
if err != nil {
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.sendSyncDeviceData()
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-03-20 20:16:38 +00:00
|
|
|
err = c.getChallenge()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
return c.receiveInstallationData()
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
| ReceiverClient
|
|
|
|
|--------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
| With AccountPayloadReceiver, RawMessagePayloadReceiver, InstallationPayloadMounterReceiver
|
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
// ReceiverClient is responsible for accepting pairing data to a SenderServer
|
|
|
|
type ReceiverClient struct {
|
|
|
|
*BaseClient
|
|
|
|
|
|
|
|
accountReceiver PayloadReceiver
|
2023-04-02 23:08:29 +00:00
|
|
|
rawMessageReceiver PayloadReceiver
|
|
|
|
installationReceiver PayloadMounterReceiver
|
2023-03-23 11:44:15 +00:00
|
|
|
}
|
2023-01-06 12:21:14 +00:00
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
// NewReceiverClient returns a fully qualified ReceiverClient created with the incoming parameters
|
|
|
|
func NewReceiverClient(backend *api.GethStatusBackend, c *ConnectionParams, config *ReceiverClientConfig) (*ReceiverClient, error) {
|
|
|
|
bc, err := NewBaseClient(c)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
return nil, err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
|
|
|
logger := logutils.ZapLogger().Named("ReceiverClient")
|
|
|
|
pe := NewPayloadEncryptor(c.aesKey)
|
|
|
|
|
|
|
|
ar, rmr, imr, err := NewPayloadReceivers(logger, pe, backend, config.ReceiverConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ReceiverClient{
|
|
|
|
BaseClient: bc,
|
|
|
|
accountReceiver: ar,
|
|
|
|
rawMessageReceiver: rmr,
|
|
|
|
installationReceiver: imr,
|
|
|
|
}, nil
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
func (c *ReceiverClient) receiveAccountData() error {
|
|
|
|
c.baseAddress.Path = pairingSendAccount
|
|
|
|
req, err := http.NewRequest(http.MethodGet, c.baseAddress.String(), nil)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-20 15:31:39 +00:00
|
|
|
err = c.challengeTaker.DoChallenge(req)
|
2023-03-23 11:44:15 +00:00
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingAccount})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := c.Do(req)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingAccount})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
2023-03-23 11:44:15 +00:00
|
|
|
err = fmt.Errorf("[client] status not ok when receiving account data, received '%s'", resp.Status)
|
2023-01-06 12:21:14 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingAccount})
|
2023-02-28 12:32:45 +00:00
|
|
|
return err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
payload, err := io.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingAccount})
|
|
|
|
return err
|
|
|
|
}
|
2023-01-06 12:21:14 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferSuccess, Action: ActionPairingAccount})
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.accountReceiver.Receive(payload)
|
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventProcessError, Error: err.Error(), Action: ActionPairingAccount})
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventProcessSuccess, Action: ActionPairingAccount})
|
2023-01-06 12:21:14 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
func (c *ReceiverClient) receiveSyncDeviceData() error {
|
|
|
|
c.baseAddress.Path = pairingSendSyncDevice
|
2023-01-06 12:21:14 +00:00
|
|
|
req, err := http.NewRequest(http.MethodGet, c.baseAddress.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-20 15:31:39 +00:00
|
|
|
err = c.challengeTaker.DoChallenge(req)
|
2023-03-23 11:44:15 +00:00
|
|
|
if err != nil {
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionSyncDevice})
|
|
|
|
return err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := c.Do(req)
|
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionSyncDevice})
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
2023-03-23 11:44:15 +00:00
|
|
|
err = fmt.Errorf("[client] status not ok when receiving sync device data, received '%s'", resp.Status)
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionSyncDevice})
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-02-28 12:32:45 +00:00
|
|
|
payload, err := io.ReadAll(resp.Body)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionSyncDevice})
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferSuccess, Action: ActionSyncDevice})
|
2023-01-06 12:21:14 +00:00
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.rawMessageReceiver.Receive(payload)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventProcessError, Error: err.Error(), Action: ActionSyncDevice})
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventProcessSuccess, Action: ActionSyncDevice})
|
2023-01-06 12:21:14 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
func (c *ReceiverClient) sendInstallationData() error {
|
|
|
|
err := c.installationReceiver.Mount()
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
c.baseAddress.Path = pairingReceiveInstallation
|
|
|
|
req, err := http.NewRequest(http.MethodPost, c.baseAddress.String(), bytes.NewBuffer(c.installationReceiver.ToSend()))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
req.Header.Set("Content-Type", "application/octet-stream")
|
2023-01-06 12:21:14 +00:00
|
|
|
|
2023-03-20 15:31:39 +00:00
|
|
|
err = c.challengeTaker.DoChallenge(req)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
|
|
|
resp, err := c.Do(req)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
2023-01-06 12:21:14 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
err = fmt.Errorf("[client] status not okay when sending installation data, status: %s", resp.Status)
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferError, Error: err.Error(), Action: ActionPairingInstallation})
|
2023-02-28 12:32:45 +00:00
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
|
|
|
|
signal.SendLocalPairingEvent(Event{Type: EventTransferSuccess, Action: ActionPairingInstallation})
|
|
|
|
return nil
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
// setupReceivingClient creates a new ReceiverClient after parsing string inputs
|
|
|
|
func setupReceivingClient(backend *api.GethStatusBackend, cs, configJSON string) (*ReceiverClient, error) {
|
2023-02-17 13:02:42 +00:00
|
|
|
ccp := new(ConnectionParams)
|
|
|
|
err := ccp.FromString(cs)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
conf := NewReceiverClientConfig()
|
|
|
|
err = json.Unmarshal([]byte(configJSON), conf)
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-03-29 15:51:01 +00:00
|
|
|
err = validateAndVerifyNodeConfig(conf, conf.ReceiverConfig)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-01-06 12:21:14 +00:00
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
conf.ReceiverConfig.DB = backend.GetMultiaccountDB()
|
|
|
|
|
|
|
|
return NewReceiverClient(backend, ccp, conf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// StartUpReceivingClient creates a ReceiverClient and triggers all `receive` calls in sequence to the SenderServer
|
|
|
|
func StartUpReceivingClient(backend *api.GethStatusBackend, cs, configJSON string) error {
|
|
|
|
c, err := setupReceivingClient(backend, cs, configJSON)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2023-02-28 12:32:45 +00:00
|
|
|
}
|
2023-03-20 18:39:28 +00:00
|
|
|
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.getChallenge()
|
2023-01-06 12:21:14 +00:00
|
|
|
if err != nil {
|
2023-03-23 11:44:15 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = c.receiveAccountData()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-03-20 18:39:28 +00:00
|
|
|
|
|
|
|
err = c.getChallenge()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
err = c.receiveSyncDeviceData()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|
2023-03-20 18:39:28 +00:00
|
|
|
|
|
|
|
err = c.getChallenge()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-03-23 11:44:15 +00:00
|
|
|
return c.sendInstallationData()
|
2023-01-06 12:21:14 +00:00
|
|
|
}
|