mirror of
https://github.com/ProtonMail/proton-bridge.git
synced 2025-12-10 04:36:43 +00:00
- GODT-1158: simple on-disk cache in store - GODT-1158: better member naming in event loop - GODT-1158: create on-disk cache during bridge setup - GODT-1158: better job options - GODT-1158: rename GetLiteral to GetRFC822 - GODT-1158: rename events -> currentEvents - GODT-1158: unlock cache per-user - GODT-1158: clean up cache after logout - GODT-1158: randomized encrypted cache passphrase - GODT-1158: Opt out of on-disk cache in settings - GODT-1158: free space in cache - GODT-1158: make tests compile - GODT-1158: optional compression - GODT-1158: cache custom location - GODT-1158: basic capacity checker - GODT-1158: cache free space config - GODT-1158: only unlock cache if pmapi client is unlocked as well - GODT-1158: simple background sync worker - GODT-1158: set size/bodystructure when caching message - GODT-1158: limit store db update blocking with semaphore - GODT-1158: dumb 10-semaphore - GODT-1158: properly handle delete; remove bad bodystructure handling - GODT-1158: hacky fix for caching after logout... baaaaad - GODT-1158: cache worker - GODT-1158: compute body structure lazily - GODT-1158: cache size in store - GODT-1158: notify cacher when adding to store - GODT-1158: 15 second store cache watcher - GODT-1158: enable cacher - GODT-1158: better cache worker starting/stopping - GODT-1158: limit cacher to less concurrency than disk cache - GODT-1158: message builder prio + pchan pkg - GODT-1158: fix pchan, use in message builder - GODT-1158: no sem in cacher (rely on message builder prio) - GODT-1158: raise priority of existing jobs when requested - GODT-1158: pending messages in on-disk cache - GODT-1158: WIP just a note about deleting messages from disk cache - GODT-1158: pending wait when trying to write - GODT-1158: pending.add to return bool - GODT-1225: Headers in bodystructure are stored as bytes. - GODT-1158: fixing header caching - GODT-1158: don't cache in background - GODT-1158: all concurrency set in settings - GODT-1158: worker pools inside message builder - GODT-1158: fix linter issues - GODT-1158: remove completed builds from builder - GODT-1158: remove builder pool - GODT-1158: cacher defer job done properly - GODT-1158: fix linter - GODT-1299: Continue with bodystructure build if deserialization failed - GODT-1324: Delete messages from the cache when they are deleted on the server - GODT-1158: refactor cache tests - GODT-1158: move builder to app/bridge - GODT-1306: Migrate cache on disk when location is changed (and delete when disabled)
151 lines
3.2 KiB
Go
151 lines
3.2 KiB
Go
// Copyright (c) 2021 Proton Technologies AG
|
|
//
|
|
// This file is part of ProtonMail Bridge.
|
|
//
|
|
// ProtonMail Bridge is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// ProtonMail Bridge is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with ProtonMail Bridge. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package pmapi
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/ProtonMail/gopenpgp/v2/crypto"
|
|
"github.com/getsentry/sentry-go"
|
|
"github.com/go-resty/resty/v2"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
// Role values.
|
|
const (
|
|
FreeUserRole = iota
|
|
PaidMemberRole
|
|
PaidAdminRole
|
|
)
|
|
|
|
// User status.
|
|
const (
|
|
DeletedUser = 0
|
|
DisabledUser = 1
|
|
ActiveUser = 2
|
|
VPNAdminUser = 3
|
|
AdminUser = 4
|
|
SuperUser = 5
|
|
)
|
|
|
|
// Delinquent values.
|
|
const (
|
|
CurrentUser = iota
|
|
AvailableUser
|
|
OverdueUser
|
|
DelinquentUser
|
|
NoReceiveUser
|
|
)
|
|
|
|
// PMSignature values.
|
|
const (
|
|
PMSignatureDisabled = iota
|
|
PMSignatureEnabled
|
|
PMSignatureLocked
|
|
)
|
|
|
|
// User holds the user details.
|
|
type User struct {
|
|
ID string
|
|
Name string
|
|
UsedSpace int64
|
|
Currency string
|
|
Credit int
|
|
MaxSpace int64
|
|
MaxUpload int64
|
|
Role int
|
|
Private int
|
|
Subscribed int
|
|
Services int
|
|
Deliquent int
|
|
|
|
Keys PMKeys
|
|
|
|
VPN struct {
|
|
Status int
|
|
ExpirationTime int
|
|
PlanName string
|
|
MaxConnect int
|
|
MaxTier int
|
|
}
|
|
}
|
|
|
|
func (c *client) getUser(ctx context.Context) (user *User, err error) {
|
|
var res struct {
|
|
User *User
|
|
}
|
|
|
|
if _, err := c.do(ctx, func(r *resty.Request) (*resty.Response, error) {
|
|
return r.SetResult(&res).Get("/users")
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return res.User, nil
|
|
}
|
|
|
|
// unlockUser unlocks all the client's user keys using the given passphrase.
|
|
func (c *client) unlockUser(passphrase []byte) (err error) {
|
|
if c.user == nil {
|
|
return errors.New("user data is not loaded")
|
|
}
|
|
|
|
if c.userKeyRing, err = c.user.Keys.UnlockAll(passphrase, nil); err != nil {
|
|
return errors.Wrap(err, "failed to unlock user keys")
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
// UpdateUser retrieves details about user and loads its addresses.
|
|
func (c *client) UpdateUser(ctx context.Context) (*User, error) {
|
|
user, err := c.getUser(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
addresses, err := c.GetAddresses(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
c.user = user
|
|
c.addresses = addresses
|
|
sentry.ConfigureScope(func(scope *sentry.Scope) { scope.SetUser(sentry.User{ID: user.ID}) })
|
|
|
|
return user, err
|
|
}
|
|
|
|
// CurrentUser returns currently active user or user will be updated.
|
|
func (c *client) CurrentUser(ctx context.Context) (*User, error) {
|
|
if c.user != nil && len(c.addresses) != 0 {
|
|
return c.user, nil
|
|
}
|
|
|
|
return c.UpdateUser(ctx)
|
|
}
|
|
|
|
// CurrentUser returns currently active user or user will be updated.
|
|
func (c *client) GetUserKeyRing() (*crypto.KeyRing, error) {
|
|
if c.userKeyRing == nil {
|
|
return nil, errors.New("user keyring is not available")
|
|
}
|
|
|
|
return c.userKeyRing, nil
|
|
}
|