/* Copyright 2015, 2016, 2018, 2021 The Matrix.org Foundation C.I.C. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ import React, {createRef} from 'react'; import PropTypes from 'prop-types'; import filesize from 'filesize'; import { _t } from '../../../languageHandler'; import {decryptFile} from '../../../utils/DecryptFile'; import Modal from '../../../Modal'; import AccessibleButton from "../elements/AccessibleButton"; import {replaceableComponent} from "../../../utils/replaceableComponent"; import {mediaFromContent} from "../../../customisations/Media"; import ErrorDialog from "../dialogs/ErrorDialog"; let downloadIconUrl; // cached copy of the download.svg asset for the sandboxed iframe later on async function cacheDownloadIcon() { if (downloadIconUrl) return; // cached already const svg = await fetch(require("../../../../res/img/download.svg")).then(r => r.text()); downloadIconUrl = "data:image/svg+xml;base64," + window.btoa(svg); } // Cache the asset immediately cacheDownloadIcon(); // User supplied content can contain scripts, we have to be careful that // we don't accidentally run those script within the same origin as the // client. Otherwise those scripts written by remote users can read // the access token and end-to-end keys that are in local storage. // // For attachments downloaded directly from the homeserver we can use // Content-Security-Policy headers to disable script execution. // // But attachments with end-to-end encryption are more difficult to handle. // We need to decrypt the attachment on the client and then display it. // To display the attachment we need to turn the decrypted bytes into a URL. // // There are two ways to turn bytes into URLs, data URL and blob URLs. // Data URLs aren't suitable for downloading a file because Chrome has a // 2MB limit on the size of URLs that can be viewed in the browser or // downloaded. This limit does not seem to apply when the url is used as // the source attribute of an image tag. // // Blob URLs are generated using window.URL.createObjectURL and unfortunately // for our purposes they inherit the origin of the page that created them. // This means that any scripts that run when the URL is viewed will be able // to access local storage. // // The easiest solution is to host the code that generates the blob URL on // a different domain to the client. // Another possibility is to generate the blob URL within a sandboxed iframe. // The downside of using a second domain is that it complicates hosting, // the downside of using a sandboxed iframe is that the browers are overly // restrictive in what you are allowed to do with the generated URL. /** * Get the current CSS style for a DOMElement. * @param {HTMLElement} element The element to get the current style of. * @return {string} The CSS style encoded as a string. */ function computedStyle(element) { if (!element) { return ""; } const style = window.getComputedStyle(element, null); let cssText = style.cssText; // noinspection EqualityComparisonWithCoercionJS if (cssText == "") { // Firefox doesn't implement ".cssText" for computed styles. // https://bugzilla.mozilla.org/show_bug.cgi?id=137687 for (let i = 0; i < style.length; i++) { cssText += style[i] + ":"; cssText += style.getPropertyValue(style[i]) + ";"; } } return cssText; } @replaceableComponent("views.messages.MFileBody") export default class MFileBody extends React.Component { static propTypes = { /* the MatrixEvent to show */ mxEvent: PropTypes.object.isRequired, /* already decrypted blob */ decryptedBlob: PropTypes.object, /* called when the download link iframe is shown */ onHeightChanged: PropTypes.func, /* the shape of the tile, used */ tileShape: PropTypes.string, /* whether or not to show the default placeholder for the file. Defaults to true. */ showGenericPlaceholder: PropTypes.bool, }; static defaultProps = { showGenericPlaceholder: true, }; constructor(props) { super(props); this.state = { decryptedBlob: (this.props.decryptedBlob ? this.props.decryptedBlob : null), }; this._iframe = createRef(); this._dummyLink = createRef(); } /** * Extracts a human readable label for the file attachment to use as * link text. * * @param {Object} content The "content" key of the matrix event. * @param {boolean} withSize Whether to include size information. Default true. * @return {string} the human readable link text for the attachment. */ presentableTextForFile(content, withSize = true) { let linkText = _t("Attachment"); if (content.body && content.body.length > 0) { // The content body should be the name of the file including a // file extension. linkText = content.body; } if (content.info && content.info.size && withSize) { // If we know the size of the file then add it as human readable // string to the end of the link text so that the user knows how // big a file they are downloading. // The content.info also contains a MIME-type but we don't display // it since it is "ugly", users generally aren't aware what it // means and the type of the attachment can usually be inferrered // from the file extension. linkText += ' (' + filesize(content.info.size) + ')'; } return linkText; } _getContentUrl() { const media = mediaFromContent(this.props.mxEvent.getContent()); return media.srcHttp; } componentDidUpdate(prevProps, prevState) { if (this.props.onHeightChanged && !prevState.decryptedBlob && this.state.decryptedBlob) { this.props.onHeightChanged(); } } render() { const content = this.props.mxEvent.getContent(); const text = this.presentableTextForFile(content); const isEncrypted = content.file !== undefined; const fileName = content.body && content.body.length > 0 ? content.body : _t("Attachment"); const contentUrl = this._getContentUrl(); const fileSize = content.info ? content.info.size : null; const fileType = content.info ? content.info.mimetype : "application/octet-stream"; let placeholder = null; if (this.props.showGenericPlaceholder) { placeholder = (
{this.presentableTextForFile(content, false)}
); } if (isEncrypted) { if (this.state.decryptedBlob === null) { // Need to decrypt the attachment // Wait for the user to click on the link before downloading // and decrypting the attachment. let decrypting = false; const decrypt = (e) => { if (decrypting) { return false; } decrypting = true; decryptFile(content.file).then((blob) => { this.setState({ decryptedBlob: blob, }); }).catch((err) => { console.warn("Unable to decrypt attachment: ", err); Modal.createTrackedDialog('Error decrypting attachment', '', ErrorDialog, { title: _t("Error"), description: _t("Error decrypting attachment"), }); }).finally(() => { decrypting = false; }); }; // This button should actually Download because usercontent/ will try to click itself // but it is not guaranteed between various browsers' settings. return ( {placeholder}
{ _t("Decrypt %(text)s", { text: text }) }
); } // When the iframe loads we tell it to render a download link const onIframeLoad = (ev) => { ev.target.contentWindow.postMessage({ imgSrc: downloadIconUrl, style: computedStyle(this._dummyLink.current), blob: this.state.decryptedBlob, // Set a download attribute for encrypted files so that the file // will have the correct name when the user tries to download it. // We can't provide a Content-Disposition header like we would for HTTP. download: fileName, textContent: _t("Download %(text)s", { text: text }), // only auto-download if a user triggered this iframe explicitly auto: !this.props.decryptedBlob, }, "*"); }; const url = "usercontent/"; // XXX: this path should probably be passed from the skin // If the attachment is encrypted then put the link inside an iframe. return ( {placeholder}
{ /* * Add dummy copy of the "a" tag * We'll use it to learn how the download link * would have been styled if it was rendered inline. */ }