2018-04-05 13:18:47 +02:00
|
|
|
//
|
|
|
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2018
|
|
|
|
//
|
|
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
|
|
//
|
|
|
|
#include "td/telegram/SecureManager.h"
|
|
|
|
|
2018-04-11 19:42:06 +02:00
|
|
|
#include "td/telegram/ContactsManager.h"
|
2018-04-28 10:56:10 +02:00
|
|
|
#include "td/telegram/DialogId.h"
|
2018-04-28 20:05:04 +02:00
|
|
|
#include "td/telegram/files/FileId.h"
|
2018-04-07 00:29:36 +02:00
|
|
|
#include "td/telegram/files/FileManager.h"
|
2018-04-05 13:18:47 +02:00
|
|
|
#include "td/telegram/Global.h"
|
2018-04-17 17:04:09 +02:00
|
|
|
#include "td/telegram/misc.h"
|
2018-04-05 13:18:47 +02:00
|
|
|
#include "td/telegram/net/NetQueryDispatcher.h"
|
2018-04-07 00:29:36 +02:00
|
|
|
#include "td/telegram/PasswordManager.h"
|
|
|
|
#include "td/telegram/Td.h"
|
2018-04-05 13:18:47 +02:00
|
|
|
|
2018-04-07 01:38:28 +02:00
|
|
|
#include "td/utils/buffer.h"
|
|
|
|
#include "td/utils/logging.h"
|
|
|
|
#include "td/utils/misc.h"
|
2018-04-28 10:56:10 +02:00
|
|
|
#include "td/utils/optional.h"
|
|
|
|
#include "td/utils/Slice.h"
|
2018-04-07 01:38:28 +02:00
|
|
|
|
|
|
|
#include <mutex>
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
namespace td {
|
2018-04-07 00:29:36 +02:00
|
|
|
|
2018-04-19 16:31:25 +02:00
|
|
|
class GetSecureValue : public NetQueryCallback {
|
|
|
|
public:
|
|
|
|
GetSecureValue(ActorShared<> parent, std::string password, SecureValueType type,
|
|
|
|
Promise<SecureValueWithCredentials> promise);
|
|
|
|
|
|
|
|
private:
|
|
|
|
ActorShared<> parent_;
|
|
|
|
string password_;
|
|
|
|
SecureValueType type_;
|
|
|
|
Promise<SecureValueWithCredentials> promise_;
|
|
|
|
optional<EncryptedSecureValue> encrypted_secure_value_;
|
|
|
|
optional<secure_storage::Secret> secret_;
|
|
|
|
|
|
|
|
void on_error(Status status);
|
|
|
|
void on_secret(Result<secure_storage::Secret> r_secret, bool dummy);
|
|
|
|
void loop() override;
|
|
|
|
void start_up() override;
|
|
|
|
|
|
|
|
void on_result(NetQueryPtr query) override;
|
|
|
|
};
|
|
|
|
|
|
|
|
class GetAllSecureValues : public NetQueryCallback {
|
|
|
|
public:
|
|
|
|
GetAllSecureValues(ActorShared<> parent, std::string password, Promise<TdApiAllSecureValues> promise);
|
|
|
|
|
|
|
|
private:
|
|
|
|
ActorShared<> parent_;
|
|
|
|
string password_;
|
|
|
|
Promise<TdApiAllSecureValues> promise_;
|
|
|
|
optional<vector<EncryptedSecureValue>> encrypted_secure_values_;
|
|
|
|
optional<secure_storage::Secret> secret_;
|
|
|
|
|
|
|
|
void on_error(Status status);
|
|
|
|
void on_secret(Result<secure_storage::Secret> r_secret, bool dummy);
|
|
|
|
void loop() override;
|
|
|
|
void start_up() override;
|
|
|
|
|
|
|
|
void on_result(NetQueryPtr query) override;
|
|
|
|
};
|
|
|
|
|
|
|
|
class SetSecureValue : public NetQueryCallback {
|
|
|
|
public:
|
|
|
|
SetSecureValue(ActorShared<> parent, string password, SecureValue secure_value,
|
|
|
|
Promise<SecureValueWithCredentials> promise);
|
|
|
|
|
|
|
|
private:
|
|
|
|
ActorShared<> parent_;
|
|
|
|
string password_;
|
|
|
|
SecureValue secure_value_;
|
|
|
|
Promise<SecureValueWithCredentials> promise_;
|
|
|
|
optional<secure_storage::Secret> secret_;
|
|
|
|
|
|
|
|
size_t files_left_to_upload_ = 0;
|
|
|
|
vector<SecureInputFile> to_upload_;
|
2018-04-27 14:38:02 +02:00
|
|
|
optional<SecureInputFile> front_side_;
|
|
|
|
optional<SecureInputFile> reverse_side_;
|
2018-04-19 16:31:25 +02:00
|
|
|
optional<SecureInputFile> selfie_;
|
|
|
|
|
|
|
|
class UploadCallback;
|
|
|
|
std::shared_ptr<UploadCallback> upload_callback_;
|
|
|
|
|
|
|
|
enum class State : int32 { WaitSecret, WaitSetValue } state_ = State::WaitSecret;
|
|
|
|
|
|
|
|
class UploadCallback : public FileManager::UploadCallback {
|
|
|
|
public:
|
|
|
|
explicit UploadCallback(ActorId<SetSecureValue> actor_id);
|
|
|
|
|
|
|
|
private:
|
|
|
|
ActorId<SetSecureValue> actor_id_;
|
|
|
|
void on_upload_ok(FileId file_id, tl_object_ptr<telegram_api::InputFile> input_file) override;
|
|
|
|
void on_upload_encrypted_ok(FileId file_id, tl_object_ptr<telegram_api::InputEncryptedFile> input_file) override;
|
|
|
|
void on_upload_secure_ok(FileId file_id, tl_object_ptr<telegram_api::InputSecureFile> input_file) override;
|
|
|
|
void on_upload_error(FileId file_id, Status error) override;
|
|
|
|
};
|
|
|
|
|
|
|
|
void on_upload_ok(FileId file_id, tl_object_ptr<telegram_api::InputSecureFile> input_file);
|
|
|
|
void on_upload_error(FileId file_id, Status error);
|
|
|
|
|
|
|
|
void on_error(Status status);
|
|
|
|
|
|
|
|
void on_secret(Result<secure_storage::Secret> r_secret, bool x);
|
|
|
|
|
|
|
|
void start_up() override;
|
2018-04-24 19:10:12 +02:00
|
|
|
void hangup() override;
|
2018-04-19 16:31:25 +02:00
|
|
|
void tear_down() override;
|
|
|
|
|
|
|
|
void loop() override;
|
|
|
|
void on_result(NetQueryPtr query) override;
|
|
|
|
|
2018-04-26 22:41:34 +02:00
|
|
|
void start_upload(FileManager *file_manager, FileId &file_id, SecureInputFile &info);
|
2018-04-19 16:31:25 +02:00
|
|
|
void merge(FileManager *file_manager, FileId file_id, EncryptedSecureFile &encrypted_file);
|
|
|
|
};
|
|
|
|
|
2018-04-17 17:04:09 +02:00
|
|
|
class SetSecureValueErrorsQuery : public Td::ResultHandler {
|
|
|
|
Promise<Unit> promise_;
|
|
|
|
|
|
|
|
public:
|
|
|
|
explicit SetSecureValueErrorsQuery(Promise<Unit> &&promise) : promise_(std::move(promise)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
void send(tl_object_ptr<telegram_api::InputUser> input_user,
|
|
|
|
vector<tl_object_ptr<telegram_api::SecureValueError>> input_errors) {
|
|
|
|
send_query(G()->net_query_creator().create(
|
2018-04-18 16:28:48 +02:00
|
|
|
create_storer(telegram_api::users_setSecureValueErrors(std::move(input_user), std::move(input_errors)))));
|
2018-04-17 17:04:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void on_result(uint64 id, BufferSlice packet) override {
|
2018-04-18 16:28:48 +02:00
|
|
|
auto result_ptr = fetch_result<telegram_api::users_setSecureValueErrors>(packet);
|
2018-04-17 17:04:09 +02:00
|
|
|
if (result_ptr.is_error()) {
|
|
|
|
return on_error(id, result_ptr.move_as_error());
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ptr = result_ptr.move_as_ok();
|
|
|
|
LOG(DEBUG) << "Receive result for SetSecureValueErrorsQuery " << ptr;
|
|
|
|
promise_.set_value(Unit());
|
|
|
|
}
|
|
|
|
|
|
|
|
void on_error(uint64 id, Status status) override {
|
2018-04-23 23:01:05 +02:00
|
|
|
if (status.code() != 0) {
|
|
|
|
promise_.set_error(std::move(status));
|
|
|
|
} else {
|
|
|
|
promise_.set_error(Status::Error(400, status.message()));
|
|
|
|
}
|
2018-04-17 17:04:09 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
GetSecureValue::GetSecureValue(ActorShared<> parent, std::string password, SecureValueType type,
|
2018-04-06 21:37:30 +02:00
|
|
|
Promise<SecureValueWithCredentials> promise)
|
2018-04-05 13:18:47 +02:00
|
|
|
: parent_(std::move(parent)), password_(std::move(password)), type_(type), promise_(std::move(promise)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetSecureValue::on_error(Status status) {
|
2018-04-23 23:01:05 +02:00
|
|
|
if (status.code() != 0) {
|
|
|
|
promise_.set_error(std::move(status));
|
|
|
|
} else {
|
|
|
|
promise_.set_error(Status::Error(400, status.message()));
|
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetSecureValue::on_secret(Result<secure_storage::Secret> r_secret, bool dummy) {
|
|
|
|
if (r_secret.is_error()) {
|
2018-04-19 17:39:30 +02:00
|
|
|
if (!G()->close_flag()) {
|
|
|
|
LOG(ERROR) << "Receive error instead of secret: " << r_secret.error();
|
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
return on_error(r_secret.move_as_error());
|
|
|
|
}
|
|
|
|
secret_ = r_secret.move_as_ok();
|
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetSecureValue::loop() {
|
|
|
|
if (!encrypted_secure_value_ || !secret_) {
|
|
|
|
return;
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
|
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-19 15:43:09 +02:00
|
|
|
auto r_secure_value = decrypt_secure_value(file_manager, *secret_, *encrypted_secure_value_);
|
2018-04-05 13:18:47 +02:00
|
|
|
if (r_secure_value.is_error()) {
|
|
|
|
return on_error(r_secure_value.move_as_error());
|
|
|
|
}
|
2018-04-06 21:37:30 +02:00
|
|
|
promise_.set_result(r_secure_value.move_as_ok());
|
2018-04-05 13:18:47 +02:00
|
|
|
stop();
|
|
|
|
}
|
2018-04-05 15:06:03 +02:00
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void GetSecureValue::start_up() {
|
2018-04-19 16:31:25 +02:00
|
|
|
std::vector<telegram_api::object_ptr<telegram_api::SecureValueType>> types;
|
|
|
|
types.push_back(get_input_secure_value_type(type_));
|
2018-04-05 13:18:47 +02:00
|
|
|
|
2018-04-19 16:31:25 +02:00
|
|
|
auto query = G()->net_query_creator().create(create_storer(telegram_api::account_getSecureValue(std::move(types))));
|
2018-04-05 13:18:47 +02:00
|
|
|
|
|
|
|
G()->net_query_dispatcher().dispatch_with_callback(std::move(query), actor_shared(this));
|
|
|
|
|
|
|
|
send_closure(G()->password_manager(), &PasswordManager::get_secure_secret, password_, optional<int64>(),
|
|
|
|
PromiseCreator::lambda([actor_id = actor_id(this)](Result<secure_storage::Secret> r_secret) {
|
|
|
|
send_closure(actor_id, &GetSecureValue::on_secret, std::move(r_secret), true);
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetSecureValue::on_result(NetQueryPtr query) {
|
|
|
|
auto r_result = fetch_result<telegram_api::account_getSecureValue>(std::move(query));
|
|
|
|
if (r_result.is_error()) {
|
|
|
|
return on_error(r_result.move_as_error());
|
|
|
|
}
|
|
|
|
auto result = r_result.move_as_ok();
|
2018-04-07 00:29:36 +02:00
|
|
|
if (result.empty()) {
|
|
|
|
return on_error(Status::Error(404, "Not Found"));
|
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
if (result.size() != 1) {
|
|
|
|
return on_error(Status::Error(PSLICE() << "Expected vector of size 1 got " << result.size()));
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
encrypted_secure_value_ =
|
|
|
|
get_encrypted_secure_value(G()->td().get_actor_unsafe()->file_manager_.get(), std::move(result[0]));
|
2018-04-27 14:38:02 +02:00
|
|
|
if (encrypted_secure_value_.value().type == SecureValueType::None) {
|
|
|
|
return on_error(Status::Error(404, "Not Found"));
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
GetAllSecureValues::GetAllSecureValues(ActorShared<> parent, std::string password,
|
|
|
|
Promise<TdApiAllSecureValues> promise)
|
|
|
|
: parent_(std::move(parent)), password_(std::move(password)), promise_(std::move(promise)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetAllSecureValues::on_error(Status status) {
|
2018-04-23 23:01:05 +02:00
|
|
|
if (status.code() != 0) {
|
|
|
|
promise_.set_error(std::move(status));
|
|
|
|
} else {
|
|
|
|
promise_.set_error(Status::Error(400, status.message()));
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetAllSecureValues::on_secret(Result<secure_storage::Secret> r_secret, bool dummy) {
|
|
|
|
if (r_secret.is_error()) {
|
2018-04-19 17:39:30 +02:00
|
|
|
if (!G()->close_flag()) {
|
|
|
|
LOG(ERROR) << "Receive error instead of secret: " << r_secret.error();
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
return on_error(r_secret.move_as_error());
|
|
|
|
}
|
|
|
|
secret_ = r_secret.move_as_ok();
|
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetAllSecureValues::loop() {
|
|
|
|
if (!encrypted_secure_values_ || !secret_) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-19 15:43:09 +02:00
|
|
|
auto r_secure_values = decrypt_secure_values(file_manager, *secret_, *encrypted_secure_values_);
|
2018-04-07 00:29:36 +02:00
|
|
|
if (r_secure_values.is_error()) {
|
|
|
|
return on_error(r_secure_values.move_as_error());
|
|
|
|
}
|
|
|
|
auto secure_values = transform(r_secure_values.move_as_ok(),
|
|
|
|
[](SecureValueWithCredentials &&value) { return std::move(value.value); });
|
|
|
|
promise_.set_result(get_all_passport_data_object(file_manager, std::move(secure_values)));
|
|
|
|
stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetAllSecureValues::start_up() {
|
|
|
|
auto query = G()->net_query_creator().create(create_storer(telegram_api::account_getAllSecureValues()));
|
|
|
|
|
|
|
|
G()->net_query_dispatcher().dispatch_with_callback(std::move(query), actor_shared(this));
|
|
|
|
|
|
|
|
send_closure(G()->password_manager(), &PasswordManager::get_secure_secret, password_, optional<int64>(),
|
|
|
|
PromiseCreator::lambda([actor_id = actor_id(this)](Result<secure_storage::Secret> r_secret) {
|
|
|
|
send_closure(actor_id, &GetAllSecureValues::on_secret, std::move(r_secret), true);
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
|
|
|
void GetAllSecureValues::on_result(NetQueryPtr query) {
|
|
|
|
auto r_result = fetch_result<telegram_api::account_getAllSecureValues>(std::move(query));
|
|
|
|
if (r_result.is_error()) {
|
|
|
|
return on_error(r_result.move_as_error());
|
|
|
|
}
|
|
|
|
encrypted_secure_values_ =
|
|
|
|
get_encrypted_secure_values(G()->td().get_actor_unsafe()->file_manager_.get(), r_result.move_as_ok());
|
2018-04-05 13:18:47 +02:00
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
SetSecureValue::SetSecureValue(ActorShared<> parent, string password, SecureValue secure_value,
|
2018-04-06 21:37:30 +02:00
|
|
|
Promise<SecureValueWithCredentials> promise)
|
2018-04-05 13:18:47 +02:00
|
|
|
: parent_(std::move(parent))
|
|
|
|
, password_(std::move(password))
|
|
|
|
, secure_value_(std::move(secure_value))
|
|
|
|
, promise_(std::move(promise)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
SetSecureValue::UploadCallback::UploadCallback(ActorId<SetSecureValue> actor_id) : actor_id_(actor_id) {
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetSecureValue::UploadCallback::on_upload_ok(FileId file_id, tl_object_ptr<telegram_api::InputFile> input_file) {
|
2018-04-24 19:10:12 +02:00
|
|
|
CHECK(input_file == nullptr);
|
|
|
|
send_closure_later(actor_id_, &SetSecureValue::on_upload_ok, file_id, nullptr);
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
void SetSecureValue::UploadCallback::on_upload_encrypted_ok(
|
|
|
|
FileId file_id, tl_object_ptr<telegram_api::InputEncryptedFile> input_file) {
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
|
|
|
void SetSecureValue::UploadCallback::on_upload_secure_ok(FileId file_id,
|
|
|
|
tl_object_ptr<telegram_api::InputSecureFile> input_file) {
|
2018-04-24 19:10:12 +02:00
|
|
|
send_closure_later(actor_id_, &SetSecureValue::on_upload_ok, file_id, std::move(input_file));
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
void SetSecureValue::UploadCallback::on_upload_error(FileId file_id, Status error) {
|
2018-04-24 19:10:12 +02:00
|
|
|
send_closure_later(actor_id_, &SetSecureValue::on_upload_error, file_id, std::move(error));
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void SetSecureValue::on_upload_ok(FileId file_id, tl_object_ptr<telegram_api::InputSecureFile> input_file) {
|
2018-04-05 15:06:03 +02:00
|
|
|
SecureInputFile *info_ptr = nullptr;
|
2018-04-05 13:18:47 +02:00
|
|
|
for (auto &info : to_upload_) {
|
2018-04-27 14:38:02 +02:00
|
|
|
if (info.file_id == file_id) {
|
|
|
|
info_ptr = &info;
|
|
|
|
break;
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
}
|
|
|
|
if (front_side_ && front_side_.value().file_id == file_id) {
|
|
|
|
info_ptr = &front_side_.value();
|
|
|
|
}
|
|
|
|
if (reverse_side_ && reverse_side_.value().file_id == file_id) {
|
|
|
|
info_ptr = &reverse_side_.value();
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
2018-04-05 15:06:03 +02:00
|
|
|
if (selfie_ && selfie_.value().file_id == file_id) {
|
|
|
|
info_ptr = &selfie_.value();
|
|
|
|
}
|
|
|
|
CHECK(info_ptr);
|
|
|
|
auto &info = *info_ptr;
|
|
|
|
CHECK(!info.input_file);
|
|
|
|
info.input_file = std::move(input_file);
|
|
|
|
CHECK(files_left_to_upload_ != 0);
|
|
|
|
files_left_to_upload_--;
|
|
|
|
return loop();
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
2018-04-24 19:10:12 +02:00
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void SetSecureValue::on_upload_error(FileId file_id, Status error) {
|
|
|
|
return on_error(std::move(error));
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetSecureValue::on_error(Status status) {
|
2018-04-23 23:01:05 +02:00
|
|
|
if (status.code() != 0) {
|
|
|
|
promise_.set_error(std::move(status));
|
|
|
|
} else {
|
|
|
|
promise_.set_error(Status::Error(400, status.message()));
|
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetSecureValue::on_secret(Result<secure_storage::Secret> r_secret, bool x) {
|
|
|
|
if (r_secret.is_error()) {
|
2018-04-19 17:39:30 +02:00
|
|
|
if (!G()->close_flag()) {
|
|
|
|
LOG(ERROR) << "Receive error instead of secret: " << r_secret.error();
|
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
return on_error(r_secret.move_as_error());
|
|
|
|
}
|
|
|
|
secret_ = r_secret.move_as_ok();
|
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SetSecureValue::start_up() {
|
|
|
|
send_closure(G()->password_manager(), &PasswordManager::get_secure_secret, password_, optional<int64>(),
|
|
|
|
PromiseCreator::lambda([actor_id = actor_id(this)](Result<secure_storage::Secret> r_secret) {
|
|
|
|
send_closure(actor_id, &SetSecureValue::on_secret, std::move(r_secret), true);
|
|
|
|
}));
|
2018-04-07 01:38:28 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-05 13:18:47 +02:00
|
|
|
|
2018-04-20 16:48:17 +02:00
|
|
|
// Remove duplicate files
|
2018-04-27 14:38:02 +02:00
|
|
|
FileId front_side_file_id;
|
|
|
|
if (secure_value_.front_side.file_id.is_valid()) {
|
|
|
|
front_side_file_id = file_manager->get_file_view(secure_value_.front_side.file_id).file_id();
|
|
|
|
front_side_ = SecureInputFile();
|
|
|
|
}
|
|
|
|
FileId reverse_side_file_id;
|
|
|
|
if (secure_value_.reverse_side.file_id.is_valid()) {
|
|
|
|
reverse_side_file_id = file_manager->get_file_view(secure_value_.reverse_side.file_id).file_id();
|
|
|
|
reverse_side_ = SecureInputFile();
|
|
|
|
if (front_side_file_id == reverse_side_file_id) {
|
|
|
|
return on_error(Status::Error(400, "Front side and reverse side must be different"));
|
|
|
|
}
|
|
|
|
}
|
2018-04-20 16:48:17 +02:00
|
|
|
FileId selfie_file_id;
|
|
|
|
if (secure_value_.selfie.file_id.is_valid()) {
|
|
|
|
selfie_file_id = file_manager->get_file_view(secure_value_.selfie.file_id).file_id();
|
2018-04-24 19:10:12 +02:00
|
|
|
selfie_ = SecureInputFile();
|
2018-04-27 14:38:02 +02:00
|
|
|
if (front_side_file_id == selfie_file_id) {
|
|
|
|
return on_error(Status::Error(400, "Front side and selfie must be different"));
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
if (reverse_side_file_id == selfie_file_id) {
|
|
|
|
return on_error(Status::Error(400, "Reverse side and selfie must be different"));
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
if (!secure_value_.files.empty()) {
|
|
|
|
CHECK(!front_side_file_id.is_valid());
|
|
|
|
CHECK(!reverse_side_file_id.is_valid());
|
|
|
|
CHECK(!selfie_file_id.is_valid());
|
|
|
|
for (auto it = secure_value_.files.begin(); it != secure_value_.files.end();) {
|
|
|
|
auto file_id = file_manager->get_file_view(it->file_id).file_id();
|
|
|
|
bool is_duplicate = false;
|
|
|
|
for (auto pit = secure_value_.files.begin(); pit != it; pit++) {
|
|
|
|
if (file_id == file_manager->get_file_view(pit->file_id).file_id()) {
|
|
|
|
is_duplicate = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (is_duplicate) {
|
|
|
|
it = secure_value_.files.erase(it);
|
|
|
|
} else {
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
2018-04-24 19:10:12 +02:00
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
|
|
|
|
to_upload_.resize(secure_value_.files.size());
|
|
|
|
upload_callback_ = std::make_shared<UploadCallback>(actor_id(this));
|
|
|
|
for (size_t i = 0; i < to_upload_.size(); i++) {
|
2018-04-20 16:48:17 +02:00
|
|
|
start_upload(file_manager, secure_value_.files[i].file_id, to_upload_[i]);
|
2018-04-05 15:06:03 +02:00
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
if (front_side_) {
|
|
|
|
start_upload(file_manager, secure_value_.front_side.file_id, front_side_.value());
|
|
|
|
}
|
|
|
|
if (reverse_side_) {
|
|
|
|
start_upload(file_manager, secure_value_.reverse_side.file_id, reverse_side_.value());
|
|
|
|
}
|
2018-04-24 19:10:12 +02:00
|
|
|
if (selfie_) {
|
2018-04-20 16:48:17 +02:00
|
|
|
start_upload(file_manager, secure_value_.selfie.file_id, selfie_.value());
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-26 22:41:34 +02:00
|
|
|
void SetSecureValue::start_upload(FileManager *file_manager, FileId &file_id, SecureInputFile &info) {
|
|
|
|
auto file_view = file_manager->get_file_view(file_id);
|
|
|
|
if (!file_view.is_encrypted_secure()) {
|
|
|
|
auto download_file_id = file_manager->dup_file_id(file_id);
|
|
|
|
file_id = file_manager
|
|
|
|
->register_generate(FileType::Secure, FileLocationSource::FromServer, file_view.suggested_name(),
|
|
|
|
PSTRING() << "#file_id#" << download_file_id.get(), DialogId(), file_view.size())
|
|
|
|
.ok();
|
|
|
|
}
|
|
|
|
|
2018-04-05 15:06:03 +02:00
|
|
|
info.file_id = file_manager->dup_file_id(file_id);
|
|
|
|
file_manager->upload(info.file_id, upload_callback_, 1, 0);
|
|
|
|
files_left_to_upload_++;
|
|
|
|
}
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void SetSecureValue::loop() {
|
|
|
|
if (state_ == State::WaitSecret) {
|
|
|
|
if (!secret_) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (files_left_to_upload_ != 0) {
|
|
|
|
return;
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-27 14:38:02 +02:00
|
|
|
auto input_secure_value =
|
|
|
|
get_input_secure_value_object(file_manager, encrypt_secure_value(file_manager, *secret_, secure_value_),
|
|
|
|
to_upload_, front_side_, reverse_side_, selfie_);
|
2018-04-05 13:18:47 +02:00
|
|
|
auto save_secure_value =
|
|
|
|
telegram_api::account_saveSecureValue(std::move(input_secure_value), secret_.value().get_hash());
|
|
|
|
auto query = G()->net_query_creator().create(create_storer(save_secure_value));
|
|
|
|
|
|
|
|
G()->net_query_dispatcher().dispatch_with_callback(std::move(query), actor_shared(this));
|
|
|
|
state_ = State::WaitSetValue;
|
|
|
|
}
|
|
|
|
}
|
2018-04-05 15:06:03 +02:00
|
|
|
|
2018-04-24 19:10:12 +02:00
|
|
|
void SetSecureValue::hangup() {
|
|
|
|
on_error(Status::Error(406, "Request aborted"));
|
|
|
|
}
|
|
|
|
|
2018-04-05 15:06:03 +02:00
|
|
|
void SetSecureValue::tear_down() {
|
2018-04-07 00:29:36 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-27 14:38:02 +02:00
|
|
|
if (file_manager == nullptr) {
|
|
|
|
return;
|
|
|
|
}
|
2018-04-05 15:06:03 +02:00
|
|
|
for (auto &file_info : to_upload_) {
|
|
|
|
file_manager->upload(file_info.file_id, nullptr, 0, 0);
|
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
if (front_side_) {
|
|
|
|
file_manager->upload(front_side_.value().file_id, nullptr, 0, 0);
|
|
|
|
}
|
|
|
|
if (reverse_side_) {
|
|
|
|
file_manager->upload(reverse_side_.value().file_id, nullptr, 0, 0);
|
|
|
|
}
|
2018-04-24 19:10:12 +02:00
|
|
|
if (selfie_) {
|
|
|
|
file_manager->upload(selfie_.value().file_id, nullptr, 0, 0);
|
|
|
|
}
|
2018-04-05 15:06:03 +02:00
|
|
|
}
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void SetSecureValue::on_result(NetQueryPtr query) {
|
|
|
|
auto r_result = fetch_result<telegram_api::account_saveSecureValue>(std::move(query));
|
|
|
|
if (r_result.is_error()) {
|
|
|
|
return on_error(r_result.move_as_error());
|
|
|
|
}
|
|
|
|
auto result = r_result.move_as_ok();
|
2018-04-07 00:29:36 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-05 13:18:47 +02:00
|
|
|
auto encrypted_secure_value = get_encrypted_secure_value(file_manager, std::move(result));
|
2018-04-27 14:38:02 +02:00
|
|
|
if (encrypted_secure_value.type == SecureValueType::None) {
|
|
|
|
return on_error(Status::Error(500, "Receive invalid Telegram Passport data"));
|
|
|
|
}
|
2018-04-05 13:18:47 +02:00
|
|
|
if (secure_value_.files.size() != encrypted_secure_value.files.size()) {
|
2018-04-26 22:41:34 +02:00
|
|
|
return on_error(Status::Error(500, "Different file count"));
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
for (size_t i = 0; i < secure_value_.files.size(); i++) {
|
2018-04-20 16:48:17 +02:00
|
|
|
merge(file_manager, secure_value_.files[i].file_id, encrypted_secure_value.files[i]);
|
2018-04-05 15:06:03 +02:00
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
if (secure_value_.front_side.file_id.is_valid() && encrypted_secure_value.front_side.file.file_id.is_valid()) {
|
|
|
|
merge(file_manager, secure_value_.front_side.file_id, encrypted_secure_value.front_side);
|
|
|
|
}
|
|
|
|
if (secure_value_.reverse_side.file_id.is_valid() && encrypted_secure_value.reverse_side.file.file_id.is_valid()) {
|
|
|
|
merge(file_manager, secure_value_.reverse_side.file_id, encrypted_secure_value.reverse_side);
|
|
|
|
}
|
2018-04-26 22:41:34 +02:00
|
|
|
if (secure_value_.selfie.file_id.is_valid() && encrypted_secure_value.selfie.file.file_id.is_valid()) {
|
2018-04-20 16:48:17 +02:00
|
|
|
merge(file_manager, secure_value_.selfie.file_id, encrypted_secure_value.selfie);
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
2018-04-19 15:43:09 +02:00
|
|
|
auto r_secure_value = decrypt_secure_value(file_manager, *secret_, encrypted_secure_value);
|
2018-04-05 13:18:47 +02:00
|
|
|
if (r_secure_value.is_error()) {
|
|
|
|
return on_error(r_secure_value.move_as_error());
|
|
|
|
}
|
2018-04-06 21:37:30 +02:00
|
|
|
promise_.set_result(r_secure_value.move_as_ok());
|
2018-04-05 13:18:47 +02:00
|
|
|
stop();
|
|
|
|
}
|
|
|
|
|
2018-04-06 15:41:38 +02:00
|
|
|
void SetSecureValue::merge(FileManager *file_manager, FileId file_id, EncryptedSecureFile &encrypted_file) {
|
2018-04-05 15:06:03 +02:00
|
|
|
auto file_view = file_manager->get_file_view(file_id);
|
|
|
|
CHECK(!file_view.empty());
|
|
|
|
CHECK(file_view.encryption_key().has_value_hash());
|
|
|
|
if (file_view.encryption_key().value_hash().as_slice() != encrypted_file.file_hash) {
|
2018-04-19 17:39:30 +02:00
|
|
|
LOG(ERROR) << "Hash mismatch";
|
2018-04-05 15:06:03 +02:00
|
|
|
return;
|
|
|
|
}
|
2018-04-20 16:48:17 +02:00
|
|
|
auto status = file_manager->merge(encrypted_file.file.file_id, file_id);
|
2018-04-05 15:06:03 +02:00
|
|
|
LOG_IF(ERROR, status.is_error()) << status.error();
|
|
|
|
}
|
|
|
|
|
2018-04-19 16:31:25 +02:00
|
|
|
class DeleteSecureValue : public NetQueryCallback {
|
|
|
|
public:
|
|
|
|
DeleteSecureValue(ActorShared<> parent, SecureValueType type, Promise<Unit> promise)
|
|
|
|
: parent_(std::move(parent)), type_(std::move(type)), promise_(std::move(promise)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
ActorShared<> parent_;
|
|
|
|
SecureValueType type_;
|
|
|
|
Promise<Unit> promise_;
|
|
|
|
|
|
|
|
void start_up() override {
|
|
|
|
std::vector<telegram_api::object_ptr<telegram_api::SecureValueType>> types;
|
|
|
|
types.push_back(get_input_secure_value_type(type_));
|
|
|
|
auto query =
|
|
|
|
G()->net_query_creator().create(create_storer(telegram_api::account_deleteSecureValue(std::move(types))));
|
|
|
|
G()->net_query_dispatcher().dispatch_with_callback(std::move(query), actor_shared(this));
|
|
|
|
}
|
|
|
|
|
|
|
|
void on_result(NetQueryPtr query) override {
|
|
|
|
auto r_result = fetch_result<telegram_api::account_deleteSecureValue>(std::move(query));
|
|
|
|
if (r_result.is_error()) {
|
|
|
|
promise_.set_error(r_result.move_as_error());
|
|
|
|
} else {
|
|
|
|
promise_.set_value(Unit());
|
|
|
|
}
|
|
|
|
stop();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-04-06 15:24:29 +02:00
|
|
|
class GetPassportAuthorizationForm : public NetQueryCallback {
|
|
|
|
public:
|
2018-04-07 00:29:36 +02:00
|
|
|
GetPassportAuthorizationForm(ActorShared<> parent, string password, int32 authorization_form_id, UserId bot_user_id,
|
2018-04-06 15:24:29 +02:00
|
|
|
string scope, string public_key, Promise<TdApiAuthorizationForm> promise)
|
|
|
|
: parent_(std::move(parent))
|
|
|
|
, password_(std::move(password))
|
|
|
|
, authorization_form_id_(authorization_form_id)
|
2018-04-07 00:29:36 +02:00
|
|
|
, bot_user_id_(bot_user_id)
|
2018-04-06 15:24:29 +02:00
|
|
|
, scope_(std::move(scope))
|
|
|
|
, public_key_(std::move(public_key))
|
|
|
|
, promise_(std::move(promise)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
ActorShared<> parent_;
|
|
|
|
string password_;
|
|
|
|
int32 authorization_form_id_;
|
2018-04-07 00:29:36 +02:00
|
|
|
UserId bot_user_id_;
|
2018-04-06 15:24:29 +02:00
|
|
|
string scope_;
|
|
|
|
string public_key_;
|
|
|
|
Promise<TdApiAuthorizationForm> promise_;
|
|
|
|
optional<secure_storage::Secret> secret_;
|
|
|
|
telegram_api::object_ptr<telegram_api::account_authorizationForm> authorization_form_;
|
|
|
|
|
|
|
|
void on_secret(Result<secure_storage::Secret> r_secret, bool dummy) {
|
|
|
|
if (r_secret.is_error()) {
|
2018-04-19 17:39:30 +02:00
|
|
|
if (!G()->close_flag()) {
|
|
|
|
LOG(ERROR) << "Receive error instead of secret: " << r_secret.error();
|
|
|
|
}
|
2018-04-06 15:24:29 +02:00
|
|
|
return on_error(r_secret.move_as_error());
|
|
|
|
}
|
|
|
|
secret_ = r_secret.move_as_ok();
|
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void on_error(Status status) {
|
2018-04-23 23:01:05 +02:00
|
|
|
if (status.code() != 0) {
|
|
|
|
promise_.set_error(std::move(status));
|
|
|
|
} else {
|
|
|
|
promise_.set_error(Status::Error(400, status.message()));
|
|
|
|
}
|
2018-04-06 15:24:29 +02:00
|
|
|
stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void start_up() override {
|
|
|
|
auto account_get_authorization_form =
|
2018-04-07 00:29:36 +02:00
|
|
|
telegram_api::account_getAuthorizationForm(bot_user_id_.get(), std::move(scope_), std::move(public_key_));
|
2018-04-06 15:24:29 +02:00
|
|
|
auto query = G()->net_query_creator().create(create_storer(account_get_authorization_form));
|
|
|
|
G()->net_query_dispatcher().dispatch_with_callback(std::move(query), actor_shared(this));
|
|
|
|
|
|
|
|
send_closure(G()->password_manager(), &PasswordManager::get_secure_secret, password_, optional<int64>(),
|
|
|
|
PromiseCreator::lambda([actor_id = actor_id(this)](Result<secure_storage::Secret> r_secret) {
|
|
|
|
send_closure(actor_id, &GetPassportAuthorizationForm::on_secret, std::move(r_secret), true);
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
|
|
|
void on_result(NetQueryPtr query) override {
|
|
|
|
auto r_result = fetch_result<telegram_api::account_getAuthorizationForm>(std::move(query));
|
|
|
|
if (r_result.is_error()) {
|
|
|
|
return on_error(r_result.move_as_error());
|
|
|
|
}
|
|
|
|
authorization_form_ = r_result.move_as_ok();
|
2018-04-28 00:54:45 +02:00
|
|
|
LOG(INFO) << "Receive " << to_string(authorization_form_);
|
2018-04-06 15:24:29 +02:00
|
|
|
loop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void loop() override {
|
|
|
|
if (!secret_ || !authorization_form_) {
|
|
|
|
return;
|
|
|
|
}
|
2018-04-11 19:42:06 +02:00
|
|
|
|
|
|
|
G()->td().get_actor_unsafe()->contacts_manager_->on_get_users(std::move(authorization_form_->users_));
|
|
|
|
|
2018-04-07 00:29:36 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-06 15:24:29 +02:00
|
|
|
std::vector<TdApiSecureValue> values;
|
2018-04-11 19:42:06 +02:00
|
|
|
bool is_selfie_required =
|
|
|
|
(authorization_form_->flags_ & telegram_api::account_authorizationForm::SELFIE_REQUIRED_MASK) != 0;
|
|
|
|
auto types = get_secure_value_types(authorization_form_->required_types_);
|
2018-04-06 15:24:29 +02:00
|
|
|
for (auto type : types) {
|
|
|
|
for (auto &value : authorization_form_->values_) {
|
2018-04-11 19:42:06 +02:00
|
|
|
if (value == nullptr) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
auto value_type = get_secure_value_type(value->type_);
|
2018-04-06 15:24:29 +02:00
|
|
|
if (value_type != type) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2018-04-19 15:43:09 +02:00
|
|
|
auto r_secure_value =
|
|
|
|
decrypt_secure_value(file_manager, *secret_, get_encrypted_secure_value(file_manager, std::move(value)));
|
2018-04-11 19:42:06 +02:00
|
|
|
value = nullptr;
|
2018-04-11 16:21:24 +02:00
|
|
|
if (r_secure_value.is_error()) {
|
2018-04-06 15:24:29 +02:00
|
|
|
LOG(ERROR) << "Failed to decrypt secure value: " << r_secure_value.error();
|
2018-04-11 16:21:24 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto r_passport_data = get_passport_data_object(file_manager, std::move(r_secure_value.move_as_ok().value));
|
|
|
|
if (r_passport_data.is_error()) {
|
|
|
|
LOG(ERROR) << "Failed to get passport data object: " << r_passport_data.error();
|
|
|
|
break;
|
2018-04-06 15:24:29 +02:00
|
|
|
}
|
2018-04-11 16:21:24 +02:00
|
|
|
|
|
|
|
values.push_back(r_passport_data.move_as_ok());
|
|
|
|
break;
|
2018-04-06 15:24:29 +02:00
|
|
|
}
|
|
|
|
}
|
2018-04-18 16:28:48 +02:00
|
|
|
|
|
|
|
vector<td_api::object_ptr<td_api::passportDataError>> errors;
|
|
|
|
for (auto &error_ptr : authorization_form_->errors_) {
|
|
|
|
CHECK(error_ptr != nullptr);
|
|
|
|
SecureValueType type = SecureValueType::None;
|
|
|
|
td_api::object_ptr<td_api::PassportDataErrorSource> source;
|
|
|
|
string message;
|
|
|
|
switch (error_ptr->get_id()) {
|
|
|
|
case telegram_api::secureValueErrorData::ID: {
|
|
|
|
auto error = move_tl_object_as<telegram_api::secureValueErrorData>(error_ptr);
|
|
|
|
type = get_secure_value_type(error->type_);
|
|
|
|
message = std::move(error->text_);
|
|
|
|
string field_name = get_secure_value_data_field_name(type, error->field_);
|
|
|
|
if (field_name.empty()) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
source = td_api::make_object<td_api::passportDataErrorSourceDataField>(std::move(field_name));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case telegram_api::secureValueErrorFile::ID: {
|
|
|
|
auto error = move_tl_object_as<telegram_api::secureValueErrorFile>(error_ptr);
|
|
|
|
type = get_secure_value_type(error->type_);
|
|
|
|
message = std::move(error->text_);
|
|
|
|
source = td_api::make_object<td_api::passportDataErrorSourceFile>();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case telegram_api::secureValueErrorFiles::ID: {
|
|
|
|
auto error = move_tl_object_as<telegram_api::secureValueErrorFiles>(error_ptr);
|
|
|
|
type = get_secure_value_type(error->type_);
|
|
|
|
message = std::move(error->text_);
|
|
|
|
source = td_api::make_object<td_api::passportDataErrorSourceFiles>();
|
|
|
|
break;
|
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
case telegram_api::secureValueErrorFrontSide::ID: {
|
|
|
|
auto error = move_tl_object_as<telegram_api::secureValueErrorFrontSide>(error_ptr);
|
|
|
|
type = get_secure_value_type(error->type_);
|
|
|
|
message = std::move(error->text_);
|
|
|
|
source = td_api::make_object<td_api::passportDataErrorSourceFrontSide>();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case telegram_api::secureValueErrorReverseSide::ID: {
|
|
|
|
auto error = move_tl_object_as<telegram_api::secureValueErrorReverseSide>(error_ptr);
|
|
|
|
type = get_secure_value_type(error->type_);
|
|
|
|
message = std::move(error->text_);
|
|
|
|
source = td_api::make_object<td_api::passportDataErrorSourceReverseSide>();
|
|
|
|
break;
|
|
|
|
}
|
2018-04-18 16:28:48 +02:00
|
|
|
case telegram_api::secureValueErrorSelfie::ID: {
|
|
|
|
auto error = move_tl_object_as<telegram_api::secureValueErrorSelfie>(error_ptr);
|
|
|
|
type = get_secure_value_type(error->type_);
|
|
|
|
message = std::move(error->text_);
|
|
|
|
source = td_api::make_object<td_api::passportDataErrorSourceSelfie>();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
|
|
|
if (source == nullptr) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
errors.push_back(td_api::make_object<td_api::passportDataError>(get_passport_data_type_object(type), message,
|
|
|
|
std::move(source)));
|
|
|
|
}
|
|
|
|
|
2018-04-11 19:42:06 +02:00
|
|
|
promise_.set_value(make_tl_object<td_api::passportAuthorizationForm>(
|
2018-04-18 16:28:48 +02:00
|
|
|
authorization_form_id_, get_passport_data_types_object(types), std::move(values), std::move(errors),
|
|
|
|
is_selfie_required, authorization_form_->privacy_policy_url_));
|
2018-04-06 15:24:29 +02:00
|
|
|
stop();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
SecureManager::SecureManager(ActorShared<> parent) : parent_(std::move(parent)) {
|
|
|
|
}
|
|
|
|
|
|
|
|
void SecureManager::get_secure_value(std::string password, SecureValueType type, Promise<TdApiSecureValue> promise) {
|
2018-04-06 21:37:30 +02:00
|
|
|
auto new_promise =
|
|
|
|
PromiseCreator::lambda([promise = std::move(promise)](Result<SecureValueWithCredentials> r_secure_value) mutable {
|
|
|
|
if (r_secure_value.is_error()) {
|
|
|
|
return promise.set_error(r_secure_value.move_as_error());
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-11 16:21:24 +02:00
|
|
|
auto r_passport_data = get_passport_data_object(file_manager, r_secure_value.move_as_ok().value);
|
|
|
|
if (r_passport_data.is_error()) {
|
|
|
|
LOG(ERROR) << "Failed to get passport data object: " << r_passport_data.error();
|
|
|
|
return promise.set_value(nullptr);
|
|
|
|
}
|
|
|
|
promise.set_value(r_passport_data.move_as_ok());
|
2018-04-06 21:37:30 +02:00
|
|
|
});
|
|
|
|
do_get_secure_value(std::move(password), type, std::move(new_promise));
|
|
|
|
}
|
|
|
|
|
|
|
|
void SecureManager::do_get_secure_value(std::string password, SecureValueType type,
|
|
|
|
Promise<SecureValueWithCredentials> promise) {
|
2018-04-05 13:18:47 +02:00
|
|
|
refcnt_++;
|
|
|
|
create_actor<GetSecureValue>("GetSecureValue", actor_shared(), std::move(password), type, std::move(promise))
|
|
|
|
.release();
|
|
|
|
}
|
|
|
|
|
2018-04-07 00:29:36 +02:00
|
|
|
void SecureManager::get_all_secure_values(std::string password, Promise<TdApiAllSecureValues> promise) {
|
|
|
|
refcnt_++;
|
|
|
|
create_actor<GetAllSecureValues>("GetAllSecureValues", actor_shared(), std::move(password), std::move(promise))
|
|
|
|
.release();
|
|
|
|
}
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void SecureManager::set_secure_value(string password, SecureValue secure_value, Promise<TdApiSecureValue> promise) {
|
|
|
|
refcnt_++;
|
|
|
|
auto type = secure_value.type;
|
2018-04-06 21:37:30 +02:00
|
|
|
auto new_promise =
|
|
|
|
PromiseCreator::lambda([promise = std::move(promise)](Result<SecureValueWithCredentials> r_secure_value) mutable {
|
|
|
|
if (r_secure_value.is_error()) {
|
|
|
|
return promise.set_error(r_secure_value.move_as_error());
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
auto *file_manager = G()->td().get_actor_unsafe()->file_manager_.get();
|
2018-04-11 16:21:24 +02:00
|
|
|
auto r_passport_data = get_passport_data_object(file_manager, r_secure_value.move_as_ok().value);
|
|
|
|
if (r_passport_data.is_error()) {
|
|
|
|
LOG(ERROR) << "Failed to get passport data object: " << r_passport_data.error();
|
|
|
|
return promise.set_error(Status::Error(500, "Failed to get passport data object"));
|
|
|
|
}
|
|
|
|
promise.set_value(r_passport_data.move_as_ok());
|
2018-04-06 21:37:30 +02:00
|
|
|
});
|
2018-04-05 13:18:47 +02:00
|
|
|
set_secure_value_queries_[type] = create_actor<SetSecureValue>("SetSecureValue", actor_shared(), std::move(password),
|
2018-04-06 21:37:30 +02:00
|
|
|
std::move(secure_value), std::move(new_promise));
|
2018-04-05 13:18:47 +02:00
|
|
|
}
|
|
|
|
|
2018-04-11 19:42:06 +02:00
|
|
|
void SecureManager::delete_secure_value(SecureValueType type, Promise<Unit> promise) {
|
2018-04-19 16:31:25 +02:00
|
|
|
refcnt_++;
|
|
|
|
auto new_promise = PromiseCreator::lambda(
|
|
|
|
[actor_id = actor_id(this), type, promise = std::move(promise)](Result<Unit> result) mutable {
|
|
|
|
send_closure(actor_id, &SecureManager::on_delete_secure_value, type, std::move(promise), std::move(result));
|
|
|
|
});
|
|
|
|
create_actor<DeleteSecureValue>("DeleteSecureValue", actor_shared(), type, std::move(new_promise)).release();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SecureManager::on_delete_secure_value(SecureValueType type, Promise<Unit> promise, Result<Unit> result) {
|
|
|
|
if (result.is_error()) {
|
|
|
|
return promise.set_error(result.move_as_error());
|
|
|
|
}
|
|
|
|
|
|
|
|
promise.set_value(Unit());
|
2018-04-11 19:42:06 +02:00
|
|
|
}
|
2018-04-17 17:04:09 +02:00
|
|
|
|
|
|
|
void SecureManager::set_secure_value_errors(Td *td, tl_object_ptr<telegram_api::InputUser> input_user,
|
2018-04-18 13:19:47 +02:00
|
|
|
vector<tl_object_ptr<td_api::inputPassportDataError>> errors,
|
2018-04-17 17:04:09 +02:00
|
|
|
Promise<Unit> promise) {
|
|
|
|
CHECK(td != nullptr);
|
|
|
|
CHECK(input_user != nullptr);
|
|
|
|
vector<tl_object_ptr<telegram_api::SecureValueError>> input_errors;
|
2018-04-18 13:19:47 +02:00
|
|
|
for (auto &error : errors) {
|
|
|
|
if (error == nullptr) {
|
2018-04-17 17:04:09 +02:00
|
|
|
return promise.set_error(Status::Error(400, "Error must be non-empty"));
|
|
|
|
}
|
2018-04-18 13:19:47 +02:00
|
|
|
if (error->type_ == nullptr) {
|
|
|
|
return promise.set_error(Status::Error(400, "Type must be non-empty"));
|
|
|
|
}
|
|
|
|
if (!clean_input_string(error->message_)) {
|
|
|
|
return promise.set_error(Status::Error(400, "Error message must be encoded in UTF-8"));
|
|
|
|
}
|
|
|
|
if (error->source_ == nullptr) {
|
|
|
|
return promise.set_error(Status::Error(400, "Error source must be non-empty"));
|
|
|
|
}
|
|
|
|
|
2018-04-19 16:31:25 +02:00
|
|
|
auto type = get_input_secure_value_type(get_secure_value_type_td_api(error->type_));
|
2018-04-18 13:19:47 +02:00
|
|
|
switch (error->source_->get_id()) {
|
|
|
|
case td_api::inputPassportDataErrorSourceDataField::ID: {
|
|
|
|
auto source = td_api::move_object_as<td_api::inputPassportDataErrorSourceDataField>(error->source_);
|
|
|
|
if (!clean_input_string(source->field_name_)) {
|
2018-04-17 17:04:09 +02:00
|
|
|
return promise.set_error(Status::Error(400, "Field name must be encoded in UTF-8"));
|
|
|
|
}
|
|
|
|
|
|
|
|
input_errors.push_back(make_tl_object<telegram_api::secureValueErrorData>(
|
2018-04-18 13:19:47 +02:00
|
|
|
std::move(type), BufferSlice(source->data_hash_), source->field_name_, error->message_));
|
2018-04-17 19:53:25 +02:00
|
|
|
break;
|
|
|
|
}
|
2018-04-27 14:38:02 +02:00
|
|
|
case td_api::inputPassportDataErrorSourceFrontSide::ID: {
|
|
|
|
auto source = td_api::move_object_as<td_api::inputPassportDataErrorSourceFrontSide>(error->source_);
|
|
|
|
input_errors.push_back(make_tl_object<telegram_api::secureValueErrorFrontSide>(
|
|
|
|
std::move(type), BufferSlice(source->file_hash_), error->message_));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case td_api::inputPassportDataErrorSourceReverseSide::ID: {
|
|
|
|
auto source = td_api::move_object_as<td_api::inputPassportDataErrorSourceReverseSide>(error->source_);
|
|
|
|
input_errors.push_back(make_tl_object<telegram_api::secureValueErrorReverseSide>(
|
|
|
|
std::move(type), BufferSlice(source->file_hash_), error->message_));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case td_api::inputPassportDataErrorSourceSelfie::ID: {
|
|
|
|
auto source = td_api::move_object_as<td_api::inputPassportDataErrorSourceSelfie>(error->source_);
|
|
|
|
input_errors.push_back(make_tl_object<telegram_api::secureValueErrorSelfie>(
|
|
|
|
std::move(type), BufferSlice(source->file_hash_), error->message_));
|
|
|
|
break;
|
|
|
|
}
|
2018-04-18 13:19:47 +02:00
|
|
|
case td_api::inputPassportDataErrorSourceFile::ID: {
|
|
|
|
auto source = td_api::move_object_as<td_api::inputPassportDataErrorSourceFile>(error->source_);
|
2018-04-17 19:53:25 +02:00
|
|
|
input_errors.push_back(make_tl_object<telegram_api::secureValueErrorFile>(
|
2018-04-18 13:19:47 +02:00
|
|
|
std::move(type), BufferSlice(source->file_hash_), error->message_));
|
2018-04-17 17:04:09 +02:00
|
|
|
break;
|
|
|
|
}
|
2018-04-18 13:19:47 +02:00
|
|
|
case td_api::inputPassportDataErrorSourceFiles::ID: {
|
|
|
|
auto source = td_api::move_object_as<td_api::inputPassportDataErrorSourceFiles>(error->source_);
|
|
|
|
if (source->file_hashes_.empty()) {
|
2018-04-17 17:04:09 +02:00
|
|
|
return promise.set_error(Status::Error(400, "Error hashes must be non-empty"));
|
|
|
|
}
|
2018-04-18 13:19:47 +02:00
|
|
|
auto file_hashes = transform(source->file_hashes_, [](Slice hash) { return BufferSlice(hash); });
|
2018-04-17 19:53:25 +02:00
|
|
|
input_errors.push_back(make_tl_object<telegram_api::secureValueErrorFiles>(
|
|
|
|
std::move(type), std::move(file_hashes), error->message_));
|
2018-04-17 17:04:09 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
td->create_handler<SetSecureValueErrorsQuery>(std::move(promise))
|
|
|
|
->send(std::move(input_user), std::move(input_errors));
|
|
|
|
}
|
2018-04-11 19:42:06 +02:00
|
|
|
|
2018-04-07 00:29:36 +02:00
|
|
|
void SecureManager::get_passport_authorization_form(string password, UserId bot_user_id, string scope,
|
|
|
|
string public_key, string payload,
|
|
|
|
Promise<TdApiAuthorizationForm> promise) {
|
2018-04-06 15:24:29 +02:00
|
|
|
refcnt_++;
|
|
|
|
auto authorization_form_id = ++authorization_form_id_;
|
2018-04-17 14:39:23 +02:00
|
|
|
authorization_forms_[authorization_form_id] =
|
|
|
|
AuthorizationForm{bot_user_id, scope, public_key, payload, false, false};
|
|
|
|
auto new_promise =
|
|
|
|
PromiseCreator::lambda([actor_id = actor_id(this), authorization_form_id, promise = std::move(promise)](
|
|
|
|
Result<TdApiAuthorizationForm> r_authorization_form) mutable {
|
|
|
|
send_closure(actor_id, &SecureManager::on_get_passport_authorization_form, authorization_form_id,
|
|
|
|
std::move(promise), std::move(r_authorization_form));
|
|
|
|
});
|
2018-04-06 15:24:29 +02:00
|
|
|
create_actor<GetPassportAuthorizationForm>("GetPassportAuthorizationForm", actor_shared(), std::move(password),
|
2018-04-07 00:29:36 +02:00
|
|
|
authorization_form_id, bot_user_id, std::move(scope),
|
2018-04-17 14:39:23 +02:00
|
|
|
std::move(public_key), std::move(new_promise))
|
2018-04-06 15:24:29 +02:00
|
|
|
.release();
|
|
|
|
}
|
|
|
|
|
2018-04-17 14:39:23 +02:00
|
|
|
void SecureManager::on_get_passport_authorization_form(int32 authorization_form_id,
|
|
|
|
Promise<TdApiAuthorizationForm> promise,
|
|
|
|
Result<TdApiAuthorizationForm> r_authorization_form) {
|
|
|
|
auto it = authorization_forms_.find(authorization_form_id);
|
|
|
|
CHECK(it != authorization_forms_.end());
|
|
|
|
CHECK(it->second.is_received == false);
|
|
|
|
if (r_authorization_form.is_error()) {
|
|
|
|
authorization_forms_.erase(it);
|
|
|
|
return promise.set_error(r_authorization_form.move_as_error());
|
|
|
|
}
|
|
|
|
it->second.is_received = true;
|
|
|
|
|
|
|
|
auto authorization_form = r_authorization_form.move_as_ok();
|
|
|
|
CHECK(authorization_form != nullptr);
|
|
|
|
it->second.is_selfie_required = authorization_form->is_selfie_required_;
|
|
|
|
promise.set_value(std::move(authorization_form));
|
|
|
|
}
|
|
|
|
|
2018-04-06 15:24:29 +02:00
|
|
|
void SecureManager::send_passport_authorization_form(string password, int32 authorization_form_id,
|
|
|
|
std::vector<SecureValueType> types, Promise<> promise) {
|
|
|
|
auto it = authorization_forms_.find(authorization_form_id);
|
|
|
|
if (it == authorization_forms_.end()) {
|
|
|
|
return promise.set_error(Status::Error(400, "Unknown authorization_form_id"));
|
|
|
|
}
|
2018-04-17 14:39:23 +02:00
|
|
|
if (!it->second.is_received) {
|
|
|
|
return promise.set_error(Status::Error(400, "Authorization form isn't received yet"));
|
|
|
|
}
|
2018-04-06 21:37:30 +02:00
|
|
|
if (types.empty()) {
|
2018-04-17 14:39:23 +02:00
|
|
|
return promise.set_error(Status::Error(400, "Types must be non-empty"));
|
2018-04-06 21:37:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
struct JoinPromise {
|
|
|
|
std::mutex mutex_;
|
|
|
|
Promise<std::vector<SecureValueCredentials>> promise_;
|
|
|
|
std::vector<SecureValueCredentials> credentials_;
|
|
|
|
int wait_cnt_{0};
|
|
|
|
};
|
|
|
|
|
|
|
|
auto join = std::make_shared<JoinPromise>();
|
|
|
|
std::lock_guard<std::mutex> guard(join->mutex_);
|
|
|
|
for (auto type : types) {
|
|
|
|
join->wait_cnt_++;
|
|
|
|
do_get_secure_value(password, type,
|
|
|
|
PromiseCreator::lambda([join](Result<SecureValueWithCredentials> r_secure_value) {
|
|
|
|
std::lock_guard<std::mutex> guard(join->mutex_);
|
|
|
|
if (!join->promise_) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (r_secure_value.is_error()) {
|
|
|
|
return join->promise_.set_error(r_secure_value.move_as_error());
|
|
|
|
}
|
|
|
|
join->credentials_.push_back(r_secure_value.move_as_ok().credentials);
|
|
|
|
join->wait_cnt_--;
|
|
|
|
if (join->wait_cnt_ == 0) {
|
|
|
|
join->promise_.set_value(std::move(join->credentials_));
|
|
|
|
}
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
join->promise_ =
|
|
|
|
PromiseCreator::lambda([promise = std::move(promise), actor_id = actor_id(this),
|
|
|
|
authorization_form_id](Result<vector<SecureValueCredentials>> r_credentials) mutable {
|
|
|
|
if (r_credentials.is_error()) {
|
|
|
|
return promise.set_error(r_credentials.move_as_error());
|
|
|
|
}
|
|
|
|
send_closure(actor_id, &SecureManager::do_send_passport_authorization_form, authorization_form_id,
|
|
|
|
r_credentials.move_as_ok(), std::move(promise));
|
|
|
|
});
|
2018-04-06 15:24:29 +02:00
|
|
|
}
|
2018-04-06 21:37:30 +02:00
|
|
|
|
|
|
|
void SecureManager::do_send_passport_authorization_form(int32 authorization_form_id,
|
|
|
|
vector<SecureValueCredentials> credentials, Promise<> promise) {
|
|
|
|
auto it = authorization_forms_.find(authorization_form_id);
|
|
|
|
if (it == authorization_forms_.end()) {
|
|
|
|
return promise.set_error(Status::Error(400, "Unknown authorization_form_id"));
|
|
|
|
}
|
|
|
|
if (credentials.empty()) {
|
|
|
|
return promise.set_error(Status::Error(400, "Empty types"));
|
|
|
|
}
|
|
|
|
std::vector<telegram_api::object_ptr<telegram_api::secureValueHash>> hashes;
|
|
|
|
for (auto &c : credentials) {
|
2018-04-19 16:31:25 +02:00
|
|
|
hashes.push_back(telegram_api::make_object<telegram_api::secureValueHash>(get_input_secure_value_type(c.type),
|
2018-04-10 19:10:20 +02:00
|
|
|
BufferSlice(c.hash)));
|
2018-04-06 21:37:30 +02:00
|
|
|
}
|
|
|
|
|
2018-04-17 14:39:23 +02:00
|
|
|
auto r_encrypted_credentials =
|
|
|
|
get_encrypted_credentials(credentials, it->second.payload, it->second.is_selfie_required, it->second.public_key);
|
2018-04-06 21:37:30 +02:00
|
|
|
if (r_encrypted_credentials.is_error()) {
|
|
|
|
return promise.set_error(r_encrypted_credentials.move_as_error());
|
|
|
|
}
|
|
|
|
|
|
|
|
auto td_query = telegram_api::account_acceptAuthorization(
|
2018-04-07 00:29:36 +02:00
|
|
|
it->second.bot_user_id.get(), it->second.scope, it->second.public_key, std::move(hashes),
|
2018-04-06 21:37:30 +02:00
|
|
|
get_secure_credentials_encrypted_object(r_encrypted_credentials.move_as_ok()));
|
|
|
|
auto query = G()->net_query_creator().create(create_storer(td_query));
|
|
|
|
auto new_promise =
|
|
|
|
PromiseCreator::lambda([promise = std::move(promise)](Result<NetQueryPtr> r_net_query_ptr) mutable {
|
2018-04-09 18:04:21 +02:00
|
|
|
auto r_result = fetch_result<telegram_api::account_acceptAuthorization>(std::move(r_net_query_ptr));
|
2018-04-06 21:37:30 +02:00
|
|
|
if (r_result.is_error()) {
|
|
|
|
return promise.set_error(r_result.move_as_error());
|
|
|
|
}
|
|
|
|
promise.set_value(Unit());
|
|
|
|
});
|
|
|
|
send_with_promise(std::move(query), std::move(new_promise));
|
|
|
|
}
|
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void SecureManager::hangup() {
|
2018-04-19 17:39:30 +02:00
|
|
|
container_.for_each(
|
|
|
|
[](auto id, Promise<NetQueryPtr> &promise) { promise.set_error(Status::Error(500, "Request aborted")); });
|
2018-04-05 13:18:47 +02:00
|
|
|
dec_refcnt();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SecureManager::hangup_shared() {
|
|
|
|
dec_refcnt();
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
void SecureManager::dec_refcnt() {
|
|
|
|
refcnt_--;
|
|
|
|
if (refcnt_ == 0) {
|
|
|
|
stop();
|
|
|
|
}
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
|
2018-04-06 21:37:30 +02:00
|
|
|
void SecureManager::on_result(NetQueryPtr query) {
|
|
|
|
auto token = get_link_token();
|
|
|
|
container_.extract(token).set_value(std::move(query));
|
|
|
|
}
|
|
|
|
|
|
|
|
void SecureManager::send_with_promise(NetQueryPtr query, Promise<NetQueryPtr> promise) {
|
|
|
|
auto id = container_.create(std::move(promise));
|
|
|
|
G()->net_query_dispatcher().dispatch_with_callback(std::move(query), actor_shared(this, id));
|
|
|
|
}
|
2018-04-07 00:29:36 +02:00
|
|
|
|
2018-04-05 13:18:47 +02:00
|
|
|
} // namespace td
|