|
1 | 1 | import type { DB } from '@matrixai/db'; |
2 | | -import type { GitPackMessage, VaultsGitPackGetMessage } from './types'; |
3 | | -import type { AgentRPCRequestParams, AgentRPCResponseResult } from '../types'; |
4 | | -import type { VaultAction, VaultName } from '../../vaults/types'; |
| 2 | +import type { VaultName } from '../../vaults/types'; |
5 | 3 | import type VaultManager from '../../vaults/VaultManager'; |
6 | 4 | import type ACL from '../../acl/ACL'; |
| 5 | +import type { JSONValue } from '../../types'; |
| 6 | +import type { PassThrough } from 'readable-stream'; |
| 7 | +import type { JSONRPCRequest } from '../../rpc/types'; |
| 8 | +import { ReadableStream } from 'stream/web'; |
| 9 | +import * as utils from '../../utils'; |
7 | 10 | import * as agentErrors from '../errors'; |
8 | 11 | import * as agentUtils from '../utils'; |
9 | 12 | import * as nodesUtils from '../../nodes/utils'; |
10 | 13 | import * as vaultsUtils from '../../vaults/utils'; |
11 | 14 | import * as vaultsErrors from '../../vaults/errors'; |
12 | | -import { validateSync } from '../../validation'; |
13 | | -import { matchSync } from '../../utils'; |
| 15 | +import { never } from '../../utils'; |
14 | 16 | import * as validationUtils from '../../validation/utils'; |
15 | | -import { ServerHandler } from '../../rpc/handlers'; |
| 17 | +import { RawHandler } from '../../rpc/handlers'; |
16 | 18 |
|
17 | | -// TODO: This needs to be a raw handler |
18 | | -class VaultsGitPackGetHandler extends ServerHandler< |
19 | | - { |
20 | | - vaultManager: VaultManager; |
21 | | - acl: ACL; |
22 | | - db: DB; |
23 | | - }, |
24 | | - AgentRPCRequestParams<VaultsGitPackGetMessage>, |
25 | | - AgentRPCResponseResult<GitPackMessage> |
26 | | -> { |
27 | | - public async *handle( |
28 | | - input: AgentRPCRequestParams<VaultsGitPackGetMessage>, |
| 19 | +class VaultsGitPackGetHandler extends RawHandler<{ |
| 20 | + vaultManager: VaultManager; |
| 21 | + acl: ACL; |
| 22 | + db: DB; |
| 23 | +}> { |
| 24 | + public async handle( |
| 25 | + input: [JSONRPCRequest, ReadableStream<Uint8Array>], |
29 | 26 | _cancel, |
30 | 27 | meta, |
31 | | - ): AsyncGenerator<AgentRPCResponseResult<GitPackMessage>> { |
| 28 | + ): Promise<[JSONValue, ReadableStream<Uint8Array>]> { |
32 | 29 | const { vaultManager, acl, db } = this.container; |
| 30 | + const [headerMessage, inputStream] = input; |
33 | 31 | const requestingNodeId = agentUtils.nodeIdFromMeta(meta); |
34 | 32 | if (requestingNodeId == null) { |
35 | 33 | throw new agentErrors.ErrorAgentNodeIdMissing(); |
36 | 34 | } |
37 | 35 | const nodeIdEncoded = nodesUtils.encodeNodeId(requestingNodeId); |
38 | | - const nameOrId = input.nameOrId; |
39 | | - yield* db.withTransactionG(async function* ( |
40 | | - tran, |
41 | | - ): AsyncGenerator<AgentRPCResponseResult<GitPackMessage>> { |
42 | | - const vaultIdFromName = await vaultManager.getVaultId( |
43 | | - nameOrId as VaultName, |
44 | | - tran, |
45 | | - ); |
46 | | - const vaultId = vaultIdFromName ?? vaultsUtils.decodeVaultId(nameOrId); |
47 | | - if (vaultId == null) { |
48 | | - throw new vaultsErrors.ErrorVaultsVaultUndefined(); |
49 | | - } |
50 | | - const { |
51 | | - actionType, |
52 | | - }: { |
53 | | - actionType: VaultAction; |
54 | | - } = validateSync( |
55 | | - (keyPath, value) => { |
56 | | - return matchSync(keyPath)( |
57 | | - [['actionType'], () => validationUtils.parseVaultAction(value)], |
58 | | - () => value, |
59 | | - ); |
60 | | - }, |
61 | | - { |
62 | | - actionType: input.vaultAction, |
63 | | - }, |
64 | | - ); |
65 | | - // Checking permissions |
66 | | - const permissions = await acl.getNodePerm(requestingNodeId, tran); |
67 | | - const vaultPerms = permissions?.vaults[vaultId]; |
68 | | - if (vaultPerms?.[actionType] !== null) { |
69 | | - throw new vaultsErrors.ErrorVaultsPermissionDenied( |
70 | | - `${nodeIdEncoded} does not have permission to ${actionType} from vault ${vaultsUtils.encodeVaultId( |
71 | | - vaultId, |
72 | | - )}`, |
| 36 | + const params = headerMessage.params; |
| 37 | + if (params == null || !utils.isObject(params)) never(); |
| 38 | + if (!('nameOrId' in params) || typeof params.nameOrId != 'string') { |
| 39 | + never(); |
| 40 | + } |
| 41 | + if (!('vaultAction' in params) || typeof params.vaultAction != 'string') { |
| 42 | + never(); |
| 43 | + } |
| 44 | + const nameOrId = params.nameOrId; |
| 45 | + const actionType = validationUtils.parseVaultAction(params.vaultAction); |
| 46 | + const [vaultIdFromName, permissions] = await db.withTransactionF( |
| 47 | + async (tran) => { |
| 48 | + const vaultIdFromName = await vaultManager.getVaultId( |
| 49 | + nameOrId as VaultName, |
| 50 | + tran, |
73 | 51 | ); |
74 | | - } |
75 | | - const [sideBand, progressStream] = await vaultManager.handlePackRequest( |
76 | | - vaultId, |
77 | | - Buffer.from(input.body, 'utf-8'), |
78 | | - tran, |
| 52 | + const permissions = await acl.getNodePerm(requestingNodeId, tran); |
| 53 | + |
| 54 | + return [vaultIdFromName, permissions]; |
| 55 | + }, |
| 56 | + ); |
| 57 | + const vaultId = vaultIdFromName ?? vaultsUtils.decodeVaultId(nameOrId); |
| 58 | + if (vaultId == null) { |
| 59 | + throw new vaultsErrors.ErrorVaultsVaultUndefined(); |
| 60 | + } |
| 61 | + // Checking permissions |
| 62 | + const vaultPerms = permissions?.vaults[vaultId]; |
| 63 | + if (vaultPerms?.[actionType] !== null) { |
| 64 | + throw new vaultsErrors.ErrorVaultsPermissionDenied( |
| 65 | + `${nodeIdEncoded} does not have permission to ${actionType} from vault ${vaultsUtils.encodeVaultId( |
| 66 | + vaultId, |
| 67 | + )}`, |
79 | 68 | ); |
80 | | - yield { |
81 | | - chunk: Buffer.from('0008NAK\n').toString('binary'), |
82 | | - }; |
83 | | - const responseBuffers: Uint8Array[] = []; |
84 | | - // FIXME: this WHOLE thing needs to change, why are we streaming when we send monolithic messages? |
85 | | - const result = await new Promise<string>((resolve, reject) => { |
| 69 | + } |
| 70 | + |
| 71 | + // Getting data |
| 72 | + let sideBand: PassThrough; |
| 73 | + let progressStream: PassThrough; |
| 74 | + const outputStream = new ReadableStream({ |
| 75 | + start: async (controller) => { |
| 76 | + const body = new Array<Uint8Array>(); |
| 77 | + for await (const message of inputStream) { |
| 78 | + body.push(message); |
| 79 | + } |
| 80 | + [sideBand, progressStream] = await vaultManager.handlePackRequest( |
| 81 | + vaultId, |
| 82 | + Buffer.concat(body), |
| 83 | + ); |
| 84 | + controller.enqueue(Buffer.from('0008NAK\n')); |
86 | 85 | sideBand.on('data', async (data: Uint8Array) => { |
87 | | - responseBuffers.push(data); |
| 86 | + controller.enqueue(data); |
| 87 | + sideBand.pause(); |
88 | 88 | }); |
89 | 89 | sideBand.on('end', async () => { |
90 | | - const result = Buffer.concat(responseBuffers).toString('binary'); |
91 | | - resolve(result); |
| 90 | + controller.close(); |
92 | 91 | }); |
93 | | - sideBand.on('error', (err) => { |
94 | | - reject(err); |
| 92 | + sideBand.on('error', (e) => { |
| 93 | + controller.error(e); |
95 | 94 | }); |
96 | 95 | progressStream.write(Buffer.from('0014progress is at 50%\n')); |
97 | 96 | progressStream.end(); |
98 | | - }); |
99 | | - yield { |
100 | | - chunk: result, |
101 | | - }; |
| 97 | + }, |
| 98 | + pull: () => { |
| 99 | + sideBand.resume(); |
| 100 | + }, |
| 101 | + cancel: (e) => { |
| 102 | + sideBand.destroy(e); |
| 103 | + }, |
102 | 104 | }); |
103 | | - return; |
| 105 | + return [null, outputStream]; |
104 | 106 | } |
105 | 107 | } |
106 | 108 |
|
|
0 commit comments