mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2025-12-31 01:59:39 -05:00
337 lines
10 KiB
Go
337 lines
10 KiB
Go
package jmap
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"reflect"
|
|
"slices"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/mitchellh/mapstructure"
|
|
"github.com/opencloud-eu/opencloud/pkg/jscalendar"
|
|
"github.com/opencloud-eu/opencloud/pkg/log"
|
|
)
|
|
|
|
type eventListeners[T any] struct {
|
|
listeners []T
|
|
m sync.Mutex
|
|
}
|
|
|
|
func (e *eventListeners[T]) add(listener T) {
|
|
e.m.Lock()
|
|
defer e.m.Unlock()
|
|
e.listeners = append(e.listeners, listener)
|
|
}
|
|
|
|
func (e *eventListeners[T]) signal(signal func(T)) {
|
|
e.m.Lock()
|
|
defer e.m.Unlock()
|
|
for _, listener := range e.listeners {
|
|
signal(listener)
|
|
}
|
|
}
|
|
|
|
func newEventListeners[T any]() *eventListeners[T] {
|
|
return &eventListeners[T]{
|
|
listeners: []T{},
|
|
}
|
|
}
|
|
|
|
// Create an identifier to use as a method call ID, from the specified accountId and additional
|
|
// tag, to make something unique within that API request.
|
|
func mcid(accountId string, tag string) string {
|
|
// https://jmap.io/spec-core.html#the-invocation-data-type
|
|
// May be any string of data:
|
|
// An arbitrary string from the client to be echoed back with the responses emitted by that method
|
|
// call (a method may return 1 or more responses, as it may make implicit calls to other methods;
|
|
// all responses initiated by this method call get the same method call id in the response).
|
|
return accountId + ":" + tag
|
|
}
|
|
|
|
func command[T any](api ApiClient,
|
|
logger *log.Logger,
|
|
ctx context.Context,
|
|
session *Session,
|
|
sessionOutdatedHandler func(session *Session, newState SessionState),
|
|
request Request,
|
|
acceptLanguage string,
|
|
mapper func(body *Response) (T, State, Error)) (T, SessionState, State, Language, Error) {
|
|
|
|
responseBody, language, jmapErr := api.Command(ctx, logger, session, request, acceptLanguage)
|
|
if jmapErr != nil {
|
|
var zero T
|
|
return zero, "", "", language, jmapErr
|
|
}
|
|
|
|
var response Response
|
|
err := json.Unmarshal(responseBody, &response)
|
|
if err != nil {
|
|
logger.Error().Err(err).Msgf("failed to deserialize body JSON payload into a %T", response)
|
|
var zero T
|
|
return zero, "", "", language, SimpleError{code: JmapErrorDecodingResponseBody, err: err}
|
|
}
|
|
|
|
if response.SessionState != session.State {
|
|
if sessionOutdatedHandler != nil {
|
|
sessionOutdatedHandler(session, response.SessionState)
|
|
}
|
|
}
|
|
|
|
// search for an "error" response
|
|
// https://jmap.io/spec-core.html#method-level-errors
|
|
for _, mr := range response.MethodResponses {
|
|
if mr.Command == ErrorCommand {
|
|
if errorParameters, ok := mr.Parameters.(ErrorResponse); ok {
|
|
code := JmapErrorServerFail
|
|
switch errorParameters.Type {
|
|
case MethodLevelErrorServerUnavailable:
|
|
code = JmapErrorServerUnavailable
|
|
case MethodLevelErrorServerFail, MethodLevelErrorServerPartialFail:
|
|
code = JmapErrorServerFail
|
|
case MethodLevelErrorUnknownMethod:
|
|
code = JmapErrorUnknownMethod
|
|
case MethodLevelErrorInvalidArguments:
|
|
code = JmapErrorInvalidArguments
|
|
case MethodLevelErrorInvalidResultReference:
|
|
code = JmapErrorInvalidResultReference
|
|
case MethodLevelErrorForbidden:
|
|
// there's a quirk here: when referencing an account that exists but that this
|
|
// user has no access to, Stalwart returns the 'forbidden' error, but this might
|
|
// leak the existence of an account to an attacker -- instead, we deem it safer to
|
|
// return a "account does not exist" error instead
|
|
if strings.HasPrefix(errorParameters.Description, "You do not have access to account") {
|
|
code = JmapErrorAccountNotFound
|
|
} else {
|
|
code = JmapErrorForbidden
|
|
}
|
|
case MethodLevelErrorAccountNotFound:
|
|
code = JmapErrorAccountNotFound
|
|
case MethodLevelErrorAccountNotSupportedByMethod:
|
|
code = JmapErrorAccountNotSupportedByMethod
|
|
case MethodLevelErrorAccountReadOnly:
|
|
code = JmapErrorAccountReadOnly
|
|
}
|
|
msg := fmt.Sprintf("found method level error in response '%v', type: '%v', description: '%v'", mr.Tag, errorParameters.Type, errorParameters.Description)
|
|
err = errors.New(msg)
|
|
logger.Warn().Int("code", code).Str("type", errorParameters.Type).Msg(msg)
|
|
var zero T
|
|
return zero, response.SessionState, "", language, SimpleError{code: code, err: err}
|
|
} else {
|
|
code := JmapErrorUnspecifiedType
|
|
msg := fmt.Sprintf("found method level error in response '%v'", mr.Tag)
|
|
err := errors.New(msg)
|
|
logger.Warn().Int("code", code).Msg(msg)
|
|
var zero T
|
|
return zero, response.SessionState, "", language, SimpleError{code: code, err: err}
|
|
}
|
|
}
|
|
}
|
|
|
|
result, state, jerr := mapper(&response)
|
|
sessionState := response.SessionState
|
|
return result, sessionState, state, language, jerr
|
|
}
|
|
|
|
func mapstructStringToTimeHook() mapstructure.DecodeHookFunc {
|
|
// mapstruct isn't able to properly map RFC3339 date strings into Time
|
|
// objects, which is why we require this custom hook,
|
|
// see https://github.com/mitchellh/mapstructure/issues/41
|
|
wanted := reflect.TypeOf(time.Time{})
|
|
return func(from reflect.Type, to reflect.Type, data any) (any, error) {
|
|
if to != wanted {
|
|
return data, nil
|
|
}
|
|
switch from.Kind() {
|
|
case reflect.String:
|
|
return time.Parse(time.RFC3339, data.(string))
|
|
case reflect.Float64:
|
|
return time.Unix(0, int64(data.(float64))*int64(time.Millisecond)), nil
|
|
case reflect.Int64:
|
|
return time.Unix(0, data.(int64)*int64(time.Millisecond)), nil
|
|
default:
|
|
return data, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
func decodeMap(input map[string]any, target any) error {
|
|
// https://github.com/mitchellh/mapstructure/issues/41
|
|
decoder, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
Metadata: nil,
|
|
DecodeHook: mapstructure.ComposeDecodeHookFunc(
|
|
mapstructStringToTimeHook(),
|
|
jscalendar.MapstructTriggerHook(),
|
|
),
|
|
Result: &target,
|
|
ErrorUnused: false,
|
|
ErrorUnset: false,
|
|
IgnoreUntaggedFields: false,
|
|
Squash: true,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return decoder.Decode(input)
|
|
}
|
|
|
|
func decodeParameters(input any, target any) error {
|
|
m, ok := input.(map[string]any)
|
|
if !ok {
|
|
return fmt.Errorf("decodeParameters: parameters is not a map but a %T", input)
|
|
}
|
|
return decodeMap(m, target)
|
|
}
|
|
|
|
func retrieveResponseMatch(data *Response, command Command, tag string) (Invocation, bool) {
|
|
for _, inv := range data.MethodResponses {
|
|
if command == inv.Command && tag == inv.Tag {
|
|
return inv, true
|
|
}
|
|
}
|
|
return Invocation{}, false
|
|
}
|
|
|
|
func retrieveResponseMatchParameters[T any](logger *log.Logger, data *Response, command Command, tag string, target *T) Error {
|
|
match, ok := retrieveResponseMatch(data, command, tag)
|
|
if !ok {
|
|
err := fmt.Errorf("failed to find JMAP response invocation match for command '%v' and tag '%v'", command, tag)
|
|
logger.Error().Msg(err.Error())
|
|
return simpleError(err, JmapErrorInvalidJmapResponsePayload)
|
|
}
|
|
params := match.Parameters
|
|
typedParams, ok := params.(T)
|
|
if !ok {
|
|
err := fmt.Errorf("JMAP response invocation matches command '%v' and tag '%v' but the type %T does not match the expected %T", command, tag, params, *target)
|
|
logger.Error().Msg(err.Error())
|
|
return simpleError(err, JmapErrorInvalidJmapResponsePayload)
|
|
}
|
|
*target = typedParams
|
|
return nil
|
|
}
|
|
|
|
func (i *Invocation) MarshalJSON() ([]byte, error) {
|
|
// JMAP requests have a slightly unusual structure since they are not a JSON object
|
|
// but, instead, a three-element array composed of
|
|
// 0: the command (e.g. "Email/query")
|
|
// 1: the actual payload of the request (structure depends on the command)
|
|
// 2: a tag that can be used to identify the matching response payload
|
|
// That implementation aspect thus requires us to use a custom marshalling hook.
|
|
arr := []any{string(i.Command), i.Parameters, i.Tag}
|
|
return json.Marshal(arr)
|
|
}
|
|
|
|
func (i *Invocation) UnmarshalJSON(bs []byte) error {
|
|
// JMAP responses have a slightly unusual structure since they are not a JSON object
|
|
// but, instead, a three-element array composed of
|
|
// 0: the command (e.g. "Thread/get") this is a response to
|
|
// 1: the actual payload of the response (structure depends on the command)
|
|
// 2: the tag (same as in the request invocation)
|
|
// That implementation aspect thus requires us to use a custom unmarshalling hook.
|
|
arr := []any{}
|
|
err := json.Unmarshal(bs, &arr)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(arr) != 3 {
|
|
// JMAP response must really always be an array of three elements
|
|
return fmt.Errorf("Invocation array length ought to be 3 but is %d", len(arr))
|
|
}
|
|
// The first element in the array is the command:
|
|
i.Command = Command(arr[0].(string))
|
|
// The third element in the array is the tag:
|
|
i.Tag = arr[2].(string)
|
|
|
|
// Due to the dynamic nature of request and response types in JMAP, we
|
|
// switch to using mapstruct here to deserialize the payload in the "parameters"
|
|
// element of JMAP invocation response arrays, as their expected struct type
|
|
// is directly inferred from the command (e.g. "Mailbox/get")
|
|
payload := arr[1]
|
|
|
|
paramsFactory, ok := CommandResponseTypeMap[i.Command]
|
|
if !ok {
|
|
return fmt.Errorf("unsupported JMAP operation cannot be unmarshalled: %v", i.Command)
|
|
}
|
|
params := paramsFactory()
|
|
err = decodeParameters(payload, ¶ms)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
i.Parameters = params
|
|
return nil
|
|
}
|
|
|
|
func squashState(all map[string]State) State {
|
|
return squashStateFunc(all, func(s State) State { return s })
|
|
}
|
|
|
|
func squashStateFunc[V any](all map[string]V, mapper func(V) State) State {
|
|
n := len(all)
|
|
if n == 0 {
|
|
return State("")
|
|
}
|
|
if n == 1 {
|
|
for _, v := range all {
|
|
return mapper(v)
|
|
}
|
|
}
|
|
|
|
parts := make([]string, n)
|
|
sortedKeys := make([]string, n)
|
|
i := 0
|
|
for k := range all {
|
|
sortedKeys[i] = k
|
|
i++
|
|
}
|
|
slices.Sort(sortedKeys)
|
|
for i, k := range sortedKeys {
|
|
if v, ok := all[k]; ok {
|
|
parts[i] = k + ":" + string(mapper(v))
|
|
} else {
|
|
parts[i] = k + ":"
|
|
}
|
|
}
|
|
return State(strings.Join(parts, ","))
|
|
}
|
|
|
|
func squashStateMaps(first map[string]State, second map[string]State) State {
|
|
return squashStateFunc(mapPairs(first, second), func(p pair[State, State]) State {
|
|
if p.left != nil {
|
|
if p.right != nil {
|
|
return *p.left + ";" + *p.right
|
|
} else {
|
|
return *p.left + ";"
|
|
}
|
|
} else if p.right != nil {
|
|
return ";" + *p.right
|
|
} else {
|
|
return ";"
|
|
}
|
|
})
|
|
}
|
|
|
|
type pair[L any, R any] struct {
|
|
left *L
|
|
right *R
|
|
}
|
|
|
|
func mapPairs[K comparable, L, R any](left map[K]L, right map[K]R) map[K]pair[L, R] {
|
|
result := map[K]pair[L, R]{}
|
|
for k, l := range left {
|
|
if r, ok := right[k]; ok {
|
|
result[k] = pair[L, R]{left: &l, right: &r}
|
|
} else {
|
|
result[k] = pair[L, R]{left: &l, right: nil}
|
|
}
|
|
}
|
|
for k, r := range right {
|
|
if _, ok := left[k]; !ok {
|
|
result[k] = pair[L, R]{left: nil, right: &r}
|
|
}
|
|
}
|
|
return result
|
|
}
|