mirror of
				https://github.com/immich-app/immich.git
				synced 2025-10-31 10:49:11 -04:00 
			
		
		
		
	* feat(mobile): Adding setting in mobile app to import TLS client certificate and private key * Formating dart source code to pass dart format test * Adding missed required trailing commas to pass dart static analysis * update lock file * variable names --------- Co-authored-by: Yun Jiang <yjiang@roku.com> Co-authored-by: Alex Tran <alex.tran1502@gmail.com>
		
			
				
	
	
		
			75 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Dart
		
	
	
	
	
	
			
		
		
	
	
			75 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Dart
		
	
	
	
	
	
| import 'dart:io';
 | |
| import 'package:immich_mobile/services/app_settings.service.dart';
 | |
| import 'package:immich_mobile/entities/store.entity.dart';
 | |
| import 'package:logging/logging.dart';
 | |
| 
 | |
| class HttpSSLCertOverride extends HttpOverrides {
 | |
|   static final Logger _log = Logger("HttpSSLCertOverride");
 | |
|   final SSLClientCertStoreVal? _clientCert;
 | |
|   late final SecurityContext? _ctxWithCert;
 | |
| 
 | |
|   HttpSSLCertOverride() : _clientCert = SSLClientCertStoreVal.load() {
 | |
|     if (_clientCert != null) {
 | |
|       _ctxWithCert = SecurityContext(withTrustedRoots: true);
 | |
|       if (_ctxWithCert != null) {
 | |
|         setClientCert(_ctxWithCert, _clientCert);
 | |
|       } else {
 | |
|         _log.severe("Failed to create security context with client cert!");
 | |
|       }
 | |
|     } else {
 | |
|       _ctxWithCert = null;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static bool setClientCert(SecurityContext ctx, SSLClientCertStoreVal cert) {
 | |
|     try {
 | |
|       _log.info("Setting client certificate");
 | |
|       ctx.usePrivateKeyBytes(cert.data, password: cert.password);
 | |
|       if (!Platform.isIOS) {
 | |
|         ctx.useCertificateChainBytes(cert.data, password: cert.password);
 | |
|       }
 | |
|     } catch (e) {
 | |
|       _log.severe("Failed to set SSL client cert: $e");
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   @override
 | |
|   HttpClient createHttpClient(SecurityContext? context) {
 | |
|     if (context != null) {
 | |
|       if (_clientCert != null) {
 | |
|         setClientCert(context, _clientCert);
 | |
|       }
 | |
|     } else {
 | |
|       context = _ctxWithCert;
 | |
|     }
 | |
| 
 | |
|     return super.createHttpClient(context)
 | |
|       ..badCertificateCallback = (X509Certificate cert, String host, int port) {
 | |
|         AppSettingsEnum setting = AppSettingsEnum.allowSelfSignedSSLCert;
 | |
| 
 | |
|         // Check if user has allowed self signed SSL certificates.
 | |
|         bool selfSignedCertsAllowed =
 | |
|             Store.get(setting.storeKey as StoreKey<bool>, setting.defaultValue);
 | |
| 
 | |
|         bool isLoggedIn = Store.tryGet(StoreKey.currentUser) != null;
 | |
| 
 | |
|         // Conduct server host checks if user is logged in to avoid making
 | |
|         // insecure SSL connections to services that are not the immich server.
 | |
|         if (isLoggedIn && selfSignedCertsAllowed) {
 | |
|           String serverHost =
 | |
|               Uri.parse(Store.tryGet(StoreKey.serverEndpoint) ?? "").host;
 | |
| 
 | |
|           selfSignedCertsAllowed &= serverHost.contains(host);
 | |
|         }
 | |
| 
 | |
|         if (!selfSignedCertsAllowed) {
 | |
|           _log.severe("Invalid SSL certificate for $host:$port");
 | |
|         }
 | |
| 
 | |
|         return selfSignedCertsAllowed;
 | |
|       };
 | |
|   }
 | |
| }
 |