index.ts 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380
  1. import {
  2. ExcalidrawElement,
  3. NonDeletedExcalidrawElement,
  4. } from "../element/types";
  5. import { getDefaultAppState } from "../appState";
  6. import { AppState } from "../types";
  7. import { exportToCanvas, exportToSvg } from "../scene/export";
  8. import { fileSave } from "browser-nativefs";
  9. import { t } from "../i18n";
  10. import {
  11. copyCanvasToClipboardAsPng,
  12. copyCanvasToClipboardAsSvg,
  13. } from "../clipboard";
  14. import { serializeAsJSON } from "./json";
  15. import { ExportType } from "../scene/types";
  16. import { restore } from "./restore";
  17. import { restoreFromLocalStorage } from "./localStorage";
  18. export { loadFromBlob } from "./blob";
  19. export { saveAsJSON, loadFromJSON } from "./json";
  20. export { saveToLocalStorage } from "./localStorage";
  21. const BACKEND_GET = process.env.REACT_APP_BACKEND_V1_GET_URL;
  22. const BACKEND_V2_POST = process.env.REACT_APP_BACKEND_V2_POST_URL;
  23. const BACKEND_V2_GET = process.env.REACT_APP_BACKEND_V2_GET_URL;
  24. export const SOCKET_SERVER = process.env.REACT_APP_SOCKET_SERVER_URL;
  25. export type EncryptedData = {
  26. data: ArrayBuffer;
  27. iv: Uint8Array;
  28. };
  29. export type SocketUpdateDataSource = {
  30. SCENE_INIT: {
  31. type: "SCENE_INIT";
  32. payload: {
  33. elements: readonly ExcalidrawElement[];
  34. };
  35. };
  36. SCENE_UPDATE: {
  37. type: "SCENE_UPDATE";
  38. payload: {
  39. elements: readonly ExcalidrawElement[];
  40. };
  41. };
  42. MOUSE_LOCATION: {
  43. type: "MOUSE_LOCATION";
  44. payload: {
  45. socketID: string;
  46. pointerCoords: { x: number; y: number };
  47. button: "down" | "up";
  48. selectedElementIds: AppState["selectedElementIds"];
  49. username: string;
  50. };
  51. };
  52. };
  53. export type SocketUpdateDataIncoming =
  54. | SocketUpdateDataSource[keyof SocketUpdateDataSource]
  55. | {
  56. type: "INVALID_RESPONSE";
  57. };
  58. // TODO: Defined globally, since file handles aren't yet serializable.
  59. // Once `FileSystemFileHandle` can be serialized, make this
  60. // part of `AppState`.
  61. (window as any).handle = null;
  62. const byteToHex = (byte: number): string => `0${byte.toString(16)}`.slice(-2);
  63. const generateRandomID = async () => {
  64. const arr = new Uint8Array(10);
  65. window.crypto.getRandomValues(arr);
  66. return Array.from(arr, byteToHex).join("");
  67. };
  68. const generateEncryptionKey = async () => {
  69. const key = await window.crypto.subtle.generateKey(
  70. {
  71. name: "AES-GCM",
  72. length: 128,
  73. },
  74. true, // extractable
  75. ["encrypt", "decrypt"],
  76. );
  77. return (await window.crypto.subtle.exportKey("jwk", key)).k;
  78. };
  79. const createIV = () => {
  80. const arr = new Uint8Array(12);
  81. return window.crypto.getRandomValues(arr);
  82. };
  83. export const getCollaborationLinkData = (link: string) => {
  84. if (link.length === 0) {
  85. return;
  86. }
  87. const hash = new URL(link).hash;
  88. return hash.match(/^#room=([a-zA-Z0-9_-]+),([a-zA-Z0-9_-]+)$/);
  89. };
  90. export const generateCollaborationLink = async () => {
  91. const id = await generateRandomID();
  92. const key = await generateEncryptionKey();
  93. return `${window.location.origin}${window.location.pathname}#room=${id},${key}`;
  94. };
  95. const getImportedKey = (key: string, usage: KeyUsage) =>
  96. window.crypto.subtle.importKey(
  97. "jwk",
  98. {
  99. alg: "A128GCM",
  100. ext: true,
  101. k: key,
  102. key_ops: ["encrypt", "decrypt"],
  103. kty: "oct",
  104. },
  105. {
  106. name: "AES-GCM",
  107. length: 128,
  108. },
  109. false, // extractable
  110. [usage],
  111. );
  112. export const encryptAESGEM = async (
  113. data: Uint8Array,
  114. key: string,
  115. ): Promise<EncryptedData> => {
  116. const importedKey = await getImportedKey(key, "encrypt");
  117. const iv = createIV();
  118. return {
  119. data: await window.crypto.subtle.encrypt(
  120. {
  121. name: "AES-GCM",
  122. iv,
  123. },
  124. importedKey,
  125. data,
  126. ),
  127. iv,
  128. };
  129. };
  130. export const decryptAESGEM = async (
  131. data: ArrayBuffer,
  132. key: string,
  133. iv: Uint8Array,
  134. ): Promise<SocketUpdateDataIncoming> => {
  135. try {
  136. const importedKey = await getImportedKey(key, "decrypt");
  137. const decrypted = await window.crypto.subtle.decrypt(
  138. {
  139. name: "AES-GCM",
  140. iv: iv,
  141. },
  142. importedKey,
  143. data,
  144. );
  145. const decodedData = new TextDecoder("utf-8").decode(
  146. new Uint8Array(decrypted) as any,
  147. );
  148. return JSON.parse(decodedData);
  149. } catch (error) {
  150. window.alert(t("alerts.decryptFailed"));
  151. console.error(error);
  152. }
  153. return {
  154. type: "INVALID_RESPONSE",
  155. };
  156. };
  157. export const exportToBackend = async (
  158. elements: readonly ExcalidrawElement[],
  159. appState: AppState,
  160. ) => {
  161. const json = serializeAsJSON(elements, appState);
  162. const encoded = new TextEncoder().encode(json);
  163. const key = await window.crypto.subtle.generateKey(
  164. {
  165. name: "AES-GCM",
  166. length: 128,
  167. },
  168. true, // extractable
  169. ["encrypt", "decrypt"],
  170. );
  171. // The iv is set to 0. We are never going to reuse the same key so we don't
  172. // need to have an iv. (I hope that's correct...)
  173. const iv = new Uint8Array(12);
  174. // We use symmetric encryption. AES-GCM is the recommended algorithm and
  175. // includes checks that the ciphertext has not been modified by an attacker.
  176. const encrypted = await window.crypto.subtle.encrypt(
  177. {
  178. name: "AES-GCM",
  179. iv: iv,
  180. },
  181. key,
  182. encoded,
  183. );
  184. // We use jwk encoding to be able to extract just the base64 encoded key.
  185. // We will hardcode the rest of the attributes when importing back the key.
  186. const exportedKey = await window.crypto.subtle.exportKey("jwk", key);
  187. try {
  188. const response = await fetch(BACKEND_V2_POST, {
  189. method: "POST",
  190. body: encrypted,
  191. });
  192. const json = await response.json();
  193. if (json.id) {
  194. const url = new URL(window.location.href);
  195. // We need to store the key (and less importantly the id) as hash instead
  196. // of queryParam in order to never send it to the server
  197. url.hash = `json=${json.id},${exportedKey.k!}`;
  198. const urlString = url.toString();
  199. window.prompt(`🔒${t("alerts.uploadedSecurly")}`, urlString);
  200. } else {
  201. window.alert(t("alerts.couldNotCreateShareableLink"));
  202. }
  203. } catch (error) {
  204. console.error(error);
  205. window.alert(t("alerts.couldNotCreateShareableLink"));
  206. }
  207. };
  208. export const importFromBackend = async (
  209. id: string | null,
  210. privateKey: string | undefined,
  211. ) => {
  212. let elements: readonly ExcalidrawElement[] = [];
  213. let appState: AppState = getDefaultAppState();
  214. try {
  215. const response = await fetch(
  216. privateKey ? `${BACKEND_V2_GET}${id}` : `${BACKEND_GET}${id}.json`,
  217. );
  218. if (!response.ok) {
  219. window.alert(t("alerts.importBackendFailed"));
  220. return restore(elements, appState, { scrollToContent: true });
  221. }
  222. let data;
  223. if (privateKey) {
  224. const buffer = await response.arrayBuffer();
  225. const key = await getImportedKey(privateKey, "decrypt");
  226. const iv = new Uint8Array(12);
  227. const decrypted = await window.crypto.subtle.decrypt(
  228. {
  229. name: "AES-GCM",
  230. iv: iv,
  231. },
  232. key,
  233. buffer,
  234. );
  235. // We need to convert the decrypted array buffer to a string
  236. const string = new window.TextDecoder("utf-8").decode(
  237. new Uint8Array(decrypted) as any,
  238. );
  239. data = JSON.parse(string);
  240. } else {
  241. // Legacy format
  242. data = await response.json();
  243. }
  244. elements = data.elements || elements;
  245. appState = { ...appState, ...data.appState };
  246. } catch (error) {
  247. window.alert(t("alerts.importBackendFailed"));
  248. console.error(error);
  249. } finally {
  250. return restore(elements, appState, { scrollToContent: true });
  251. }
  252. };
  253. export const exportCanvas = async (
  254. type: ExportType,
  255. elements: readonly NonDeletedExcalidrawElement[],
  256. appState: AppState,
  257. canvas: HTMLCanvasElement,
  258. {
  259. exportBackground,
  260. exportPadding = 10,
  261. viewBackgroundColor,
  262. name,
  263. scale = 1,
  264. shouldAddWatermark,
  265. }: {
  266. exportBackground: boolean;
  267. exportPadding?: number;
  268. viewBackgroundColor: string;
  269. name: string;
  270. scale?: number;
  271. shouldAddWatermark: boolean;
  272. },
  273. ) => {
  274. if (elements.length === 0) {
  275. return window.alert(t("alerts.cannotExportEmptyCanvas"));
  276. }
  277. if (type === "svg" || type === "clipboard-svg") {
  278. const tempSvg = exportToSvg(elements, {
  279. exportBackground,
  280. viewBackgroundColor,
  281. exportPadding,
  282. shouldAddWatermark,
  283. });
  284. if (type === "svg") {
  285. await fileSave(new Blob([tempSvg.outerHTML], { type: "image/svg+xml" }), {
  286. fileName: `${name}.svg`,
  287. });
  288. return;
  289. } else if (type === "clipboard-svg") {
  290. copyCanvasToClipboardAsSvg(tempSvg);
  291. return;
  292. }
  293. }
  294. const tempCanvas = exportToCanvas(elements, appState, {
  295. exportBackground,
  296. viewBackgroundColor,
  297. exportPadding,
  298. scale,
  299. shouldAddWatermark,
  300. });
  301. tempCanvas.style.display = "none";
  302. document.body.appendChild(tempCanvas);
  303. if (type === "png") {
  304. const fileName = `${name}.png`;
  305. tempCanvas.toBlob(async (blob: any) => {
  306. if (blob) {
  307. await fileSave(blob, {
  308. fileName: fileName,
  309. });
  310. }
  311. });
  312. } else if (type === "clipboard") {
  313. try {
  314. copyCanvasToClipboardAsPng(tempCanvas);
  315. } catch {
  316. window.alert(t("alerts.couldNotCopyToClipboard"));
  317. }
  318. } else if (type === "backend") {
  319. const appState = getDefaultAppState();
  320. if (exportBackground) {
  321. appState.viewBackgroundColor = viewBackgroundColor;
  322. }
  323. exportToBackend(elements, appState);
  324. }
  325. // clean up the DOM
  326. if (tempCanvas !== canvas) {
  327. tempCanvas.remove();
  328. }
  329. };
  330. export const loadScene = async (id: string | null, privateKey?: string) => {
  331. let data;
  332. if (id != null) {
  333. // the private key is used to decrypt the content from the server, take
  334. // extra care not to leak it
  335. data = await importFromBackend(id, privateKey);
  336. window.history.replaceState({}, "Excalidraw", window.location.origin);
  337. } else {
  338. data = restoreFromLocalStorage();
  339. }
  340. return {
  341. elements: data.elements,
  342. appState: data.appState && { ...data.appState },
  343. commitToHistory: false,
  344. };
  345. };