From 03be102ce41397ce4fed12fd2f4889d96c203762 Mon Sep 17 00:00:00 2001 From: ansuz Date: Tue, 30 Jun 2020 14:31:17 -0400 Subject: [PATCH] deduplicate some code by reusing the client definition on the server --- lib/keys.js | 82 +--------------------------- www/common/common-hash.js | 33 ++++-------- www/common/common-signing-keys.js | 89 +++++++++++++++++++++++++++++++ 3 files changed, 101 insertions(+), 103 deletions(-) create mode 100644 www/common/common-signing-keys.js diff --git a/lib/keys.js b/lib/keys.js index c4be44c85..7eb4ce447 100644 --- a/lib/keys.js +++ b/lib/keys.js @@ -1,81 +1 @@ -(function () { -var factory = function () { - var Keys = {}; - -/* Parse the new format of "Signing Public Keys". - If anything about the input is found to be invalid, return; - this will fall back to the old parsing method - - -*/ - var parseNewUser = function (userString) { - if (!/^\[.*?@.*\]$/.test(userString)) { return; } - var temp = userString.slice(1, -1); - var domain, username, pubkey; - - temp = temp - .replace(/\/([a-zA-Z0-9+-]{43}=)$/, function (all, k) { - pubkey = k.replace(/-/g, '/'); - return ''; - }); - if (!pubkey) { return; } - - var index = temp.lastIndexOf('@'); - if (index < 1) { return; } - - domain = temp.slice(index + 1); - username = temp.slice(0, index); - - return { - domain: domain, - user: username, - pubkey: pubkey - }; - }; - - var isValidUser = function (parsed) { - if (!parsed) { return; } - if (!(parsed.domain && parsed.user && parsed.pubkey)) { return; } - return true; - }; - - Keys.parseUser = function (user) { - var parsed = parseNewUser(user); - if (isValidUser(parsed)) { return parsed; } - - var domain, username, pubkey; - user.replace(/^https*:\/\/([^\/]+)\/user\/#\/1\/([^\/]+)\/([a-zA-Z0-9+-]{43}=)$/, - function (a, d, u, k) { - domain = d; - username = u; - pubkey = k.replace(/-/g, '/'); - return ''; - }); - if (!domain) { throw new Error("Could not parse user id [" + user + "]"); } - return { - domain: domain, - user: username, - pubkey: pubkey - }; - }; - - Keys.serialize = function (origin, username, pubkey) { - return '[' + - username + - '@' + - origin.replace(/https*:\/\//, '') + - '/' + - pubkey.replace(/\//g, '-') + - ']'; - // return origin + '/user/#/1/' + username + '/' + pubkey.replace(/\//g, '-'); - }; - - return Keys; -}; - - if (typeof(module) !== 'undefined' && module.exports) { - module.exports = factory(); - } else if ((typeof(define) !== 'undefined' && define !== null) && (define.amd !== null)) { - define([], factory); - } -}()); +module.exports = require("../www/common/common-signing-keys"); diff --git a/www/common/common-hash.js b/www/common/common-hash.js index 20e229fdf..cc4344413 100644 --- a/www/common/common-hash.js +++ b/www/common/common-hash.js @@ -1,5 +1,5 @@ (function (window) { -var factory = function (Util, Crypto, Nacl) { +var factory = function (Util, Crypto, Keys, Nacl) { var Hash = window.CryptPad_Hash = {}; var uint8ArrayToHex = Util.uint8ArrayToHex; @@ -92,24 +92,7 @@ var factory = function (Util, Crypto, Nacl) { } }; -/* - -0. usernames may contain spaces or many other wacky characters, so enclose the whole thing in square braces so we know its boundaries. If the formatted string does not include these we know it is either a _v1 public key string_ or _an incomplete string_. Start parsing by removing them. -1. public keys should have a fixed length, so slice them off of the end of the string. -2. domains cannot include `@`, so find the last occurence of it in the signing key and slice everything thereafter. -3. the username is everything before the `@`. - -*/ - Hash.getPublicSigningKeyString = function (origin, username, pubkey) { - return '[' + - username + - '@' + - origin.replace(/https*:\/\//, '') + - '/' + - pubkey.replace(/\//g, '-') + - ']'; - // return origin + '/user/#/1/' + username + '/' + pubkey.replace(/\//g, '-'); - }; + Hash.getPublicSigningKeyString = Keys.serialize; var fixDuplicateSlashes = function (s) { return s.replace(/\/+/g, '/'); @@ -583,14 +566,20 @@ Version 1 }; if (typeof(module) !== 'undefined' && module.exports) { - module.exports = factory(require("./common-util"), require("chainpad-crypto"), require("tweetnacl/nacl-fast")); + module.exports = factory( + require("./common-util"), + require("chainpad-crypto"), + require("./common-signing-keys"), + require("tweetnacl/nacl-fast") + ); } else if ((typeof(define) !== 'undefined' && define !== null) && (define.amd !== null)) { define([ '/common/common-util.js', '/bower_components/chainpad-crypto/crypto.js', + '/common/common-signing-keys.js', '/bower_components/tweetnacl/nacl-fast.min.js' - ], function (Util, Crypto) { - return factory(Util, Crypto, window.nacl); + ], function (Util, Crypto, Keys) { + return factory(Util, Crypto, Keys, window.nacl); }); } else { // unsupported initialization diff --git a/www/common/common-signing-keys.js b/www/common/common-signing-keys.js new file mode 100644 index 000000000..15adec7df --- /dev/null +++ b/www/common/common-signing-keys.js @@ -0,0 +1,89 @@ +(function () { +var factory = function () { + var Keys = {}; + +/* Parse the new format of "Signing Public Keys". + If anything about the input is found to be invalid, return; + this will fall back to the old parsing method + + +*/ + var parseNewUser = function (userString) { + if (!/^\[.*?@.*\]$/.test(userString)) { return; } + var temp = userString.slice(1, -1); + var domain, username, pubkey; + + temp = temp + .replace(/\/([a-zA-Z0-9+-]{43}=)$/, function (all, k) { + pubkey = k.replace(/-/g, '/'); + return ''; + }); + if (!pubkey) { return; } + + var index = temp.lastIndexOf('@'); + if (index < 1) { return; } + + domain = temp.slice(index + 1); + username = temp.slice(0, index); + + return { + domain: domain, + user: username, + pubkey: pubkey + }; + }; + + var isValidUser = function (parsed) { + if (!parsed) { return; } + if (!(parsed.domain && parsed.user && parsed.pubkey)) { return; } + return true; + }; + + Keys.parseUser = function (user) { + var parsed = parseNewUser(user); + if (isValidUser(parsed)) { return parsed; } + + var domain, username, pubkey; + user.replace(/^https*:\/\/([^\/]+)\/user\/#\/1\/([^\/]+)\/([a-zA-Z0-9+-]{43}=)$/, + function (a, d, u, k) { + domain = d; + username = u; + pubkey = k.replace(/-/g, '/'); + return ''; + }); + if (!domain) { throw new Error("Could not parse user id [" + user + "]"); } + return { + domain: domain, + user: username, + pubkey: pubkey + }; + }; + +/* + +0. usernames may contain spaces or many other wacky characters, so enclose the whole thing in square braces so we know its boundaries. If the formatted string does not include these we know it is either a _v1 public key string_ or _an incomplete string_. Start parsing by removing them. +1. public keys should have a fixed length, so slice them off of the end of the string. +2. domains cannot include `@`, so find the last occurence of it in the signing key and slice everything thereafter. +3. the username is everything before the `@`. + +*/ + Keys.serialize = function (origin, username, pubkey) { + return '[' + + username + + '@' + + origin.replace(/https*:\/\//, '') + + '/' + + pubkey.replace(/\//g, '-') + + ']'; + // return origin + '/user/#/1/' + username + '/' + pubkey.replace(/\//g, '-'); + }; + + return Keys; +}; + + if (typeof(module) !== 'undefined' && module.exports) { + module.exports = factory(); + } else if ((typeof(define) !== 'undefined' && define !== null) && (define.amd !== null)) { + define([], factory); + } +}());