2016-03-23 07:41:18 -05:00
|
|
|
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */
|
|
|
|
/*
|
|
|
|
* This file is part of the LibreOffice project.
|
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
*/
|
|
|
|
|
2016-03-31 01:48:34 -05:00
|
|
|
#include <cassert>
|
|
|
|
|
2016-03-23 07:41:18 -05:00
|
|
|
#include <Poco/Path.h>
|
2016-03-26 06:50:13 -05:00
|
|
|
#include <Poco/SHA1Engine.h>
|
2016-03-23 07:41:18 -05:00
|
|
|
|
|
|
|
#include "DocumentBroker.hpp"
|
2016-04-17 10:05:39 -05:00
|
|
|
#include "Exceptions.hpp"
|
|
|
|
#include "LOOLWSD.hpp"
|
2016-03-25 21:56:18 -05:00
|
|
|
#include "Storage.hpp"
|
|
|
|
#include "TileCache.hpp"
|
2016-05-01 19:50:11 -05:00
|
|
|
#include "LOOLProtocol.hpp"
|
|
|
|
|
|
|
|
using namespace LOOLProtocol;
|
|
|
|
|
|
|
|
void ChildProcess::socketProcessor()
|
|
|
|
{
|
|
|
|
IoUtil::SocketProcessor(_ws,
|
|
|
|
[this](const std::vector<char>& payload)
|
|
|
|
{
|
|
|
|
auto docBroker = this->_docBroker.lock();
|
|
|
|
if (docBroker)
|
|
|
|
{
|
|
|
|
return docBroker->handleInput(payload);
|
|
|
|
}
|
|
|
|
|
|
|
|
Log::warn("No DocumentBroker to handle child message: [" + LOOLProtocol::getAbbreviatedMessage(payload) + "].");
|
|
|
|
return true;
|
|
|
|
},
|
|
|
|
[]() { },
|
|
|
|
[this]() { return !!this->_stop; });
|
|
|
|
}
|
2016-03-23 07:41:18 -05:00
|
|
|
|
2016-03-26 06:50:13 -05:00
|
|
|
namespace
|
|
|
|
{
|
|
|
|
|
|
|
|
/// Returns the cache path for a given document URI.
|
|
|
|
std::string getCachePath(const std::string& uri)
|
|
|
|
{
|
|
|
|
Poco::SHA1Engine digestEngine;
|
|
|
|
|
|
|
|
digestEngine.update(uri.c_str(), uri.size());
|
|
|
|
|
|
|
|
return (LOOLWSD::Cache + "/" +
|
|
|
|
Poco::DigestEngine::digestToHex(digestEngine.digest()).insert(3, "/").insert(2, "/").insert(1, "/"));
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-04-13 03:05:00 -05:00
|
|
|
Poco::URI DocumentBroker::sanitizeURI(const std::string& uri)
|
2016-03-23 07:41:18 -05:00
|
|
|
{
|
|
|
|
// The URI of the document should be url-encoded.
|
|
|
|
std::string decodedUri;
|
|
|
|
Poco::URI::decode(uri, decodedUri);
|
|
|
|
auto uriPublic = Poco::URI(decodedUri);
|
|
|
|
|
|
|
|
if (uriPublic.isRelative() || uriPublic.getScheme() == "file")
|
|
|
|
{
|
|
|
|
// TODO: Validate and limit access to local paths!
|
|
|
|
uriPublic.normalize();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (uriPublic.getPath().empty())
|
|
|
|
{
|
|
|
|
throw std::runtime_error("Invalid URI.");
|
|
|
|
}
|
|
|
|
|
|
|
|
return uriPublic;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string DocumentBroker::getDocKey(const Poco::URI& uri)
|
|
|
|
{
|
|
|
|
// Keep the host as part of the key to close a potential security hole.
|
|
|
|
std::string docKey;
|
|
|
|
Poco::URI::encode(uri.getHost() + uri.getPath(), "", docKey);
|
|
|
|
return docKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
DocumentBroker::DocumentBroker(const Poco::URI& uriPublic,
|
|
|
|
const std::string& docKey,
|
2016-04-03 20:40:14 -05:00
|
|
|
const std::string& childRoot,
|
|
|
|
std::shared_ptr<ChildProcess> childProcess) :
|
2016-03-23 07:41:18 -05:00
|
|
|
_uriPublic(uriPublic),
|
|
|
|
_docKey(docKey),
|
|
|
|
_childRoot(childRoot),
|
2016-03-26 06:50:13 -05:00
|
|
|
_cacheRoot(getCachePath(uriPublic.toString())),
|
2016-04-17 22:29:03 -05:00
|
|
|
_childProcess(childProcess),
|
2016-04-24 10:08:08 -05:00
|
|
|
_lastSaveTime(std::chrono::steady_clock::now()),
|
2016-04-21 23:11:24 -05:00
|
|
|
_markToDestroy(false),
|
2016-04-29 22:07:09 -05:00
|
|
|
_isLoaded(false),
|
2016-04-21 23:11:24 -05:00
|
|
|
_isModified(false)
|
2016-03-23 07:41:18 -05:00
|
|
|
{
|
|
|
|
assert(!_docKey.empty());
|
|
|
|
assert(!_childRoot.empty());
|
2016-05-02 06:21:30 -05:00
|
|
|
|
2016-03-23 07:41:18 -05:00
|
|
|
Log::info("DocumentBroker [" + _uriPublic.toString() + "] created. DocKey: [" + _docKey + "]");
|
|
|
|
}
|
|
|
|
|
|
|
|
void DocumentBroker::validate(const Poco::URI& uri)
|
|
|
|
{
|
|
|
|
Log::info("Validating: " + uri.toString());
|
2016-04-17 10:05:39 -05:00
|
|
|
try
|
|
|
|
{
|
|
|
|
auto storage = StorageBase::create("", "", uri);
|
|
|
|
if (storage == nullptr || !storage->getFileInfo(uri).isValid())
|
|
|
|
{
|
|
|
|
throw BadRequestException("Invalid URI or access denied.");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch (const std::exception&)
|
2016-04-06 23:32:28 -05:00
|
|
|
{
|
2016-04-17 10:05:39 -05:00
|
|
|
throw BadRequestException("Invalid URI or access denied.");
|
2016-04-06 23:32:28 -05:00
|
|
|
}
|
2016-03-23 07:41:18 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
bool DocumentBroker::load(const std::string& jailId)
|
|
|
|
{
|
|
|
|
Log::debug("Loading from URI: " + _uriPublic.toString());
|
|
|
|
|
|
|
|
std::unique_lock<std::mutex> lock(_mutex);
|
|
|
|
|
2016-04-17 22:29:03 -05:00
|
|
|
if (_markToDestroy)
|
|
|
|
{
|
|
|
|
// Tearing down.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-03-23 07:41:18 -05:00
|
|
|
if (_storage)
|
|
|
|
{
|
|
|
|
// Already loaded. Nothing to do.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
_jailId = jailId;
|
|
|
|
|
|
|
|
// The URL is the publicly visible one, not visible in the chroot jail.
|
|
|
|
// We need to map it to a jailed path and copy the file there.
|
|
|
|
|
|
|
|
// user/doc/jailId
|
2016-03-28 06:01:19 -05:00
|
|
|
const auto jailPath = Poco::Path(JAILED_DOCUMENT_ROOT, jailId);
|
2016-03-23 07:41:18 -05:00
|
|
|
const std::string jailRoot = getJailRoot();
|
|
|
|
|
|
|
|
Log::info("jailPath: " + jailPath.toString() + ", jailRoot: " + jailRoot);
|
|
|
|
|
2016-04-25 19:44:24 -05:00
|
|
|
auto storage = StorageBase::create(jailRoot, jailPath.toString(), _uriPublic);
|
2016-04-07 15:59:27 -05:00
|
|
|
if (storage)
|
|
|
|
{
|
|
|
|
const auto fileInfo = storage->getFileInfo(_uriPublic);
|
2016-04-19 02:10:07 -05:00
|
|
|
_filename = fileInfo._filename;
|
2016-03-25 21:56:18 -05:00
|
|
|
|
2016-04-25 19:44:24 -05:00
|
|
|
const auto localPath = storage->loadStorageFileToLocal();
|
2016-04-07 15:59:27 -05:00
|
|
|
_uriJailed = Poco::URI(Poco::URI("file://"), localPath);
|
2016-03-23 07:41:18 -05:00
|
|
|
|
2016-04-25 19:44:24 -05:00
|
|
|
// Use the local temp file's timestamp.
|
|
|
|
_lastFileModifiedTime = Poco::File(storage->getLocalRootPath()).getLastModified();
|
|
|
|
_tileCache.reset(new TileCache(_uriPublic.toString(), _lastFileModifiedTime, _cacheRoot));
|
|
|
|
|
|
|
|
_storage.reset(storage.release());
|
2016-04-07 15:59:27 -05:00
|
|
|
return true;
|
|
|
|
}
|
2016-04-10 12:03:57 -05:00
|
|
|
|
|
|
|
return false;
|
2016-03-23 07:41:18 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
bool DocumentBroker::save()
|
|
|
|
{
|
2016-04-10 21:07:09 -05:00
|
|
|
std::unique_lock<std::mutex> lock(_saveMutex);
|
|
|
|
|
2016-04-10 12:03:57 -05:00
|
|
|
const auto uri = _uriPublic.toString();
|
2016-04-27 19:52:32 -05:00
|
|
|
|
|
|
|
// If the file hasn't been modified within the past 10 seconds, skip saving.
|
2016-04-29 08:14:13 -05:00
|
|
|
// FIXME this is because currently the ChildProcessSession broadcasts the
|
|
|
|
// unocommandresult, so we get called several times here, and have no real
|
|
|
|
// possibility to distinguish who was the 1st caller.
|
|
|
|
// The refactor to un-thread the ChildProcessSession, and move the
|
|
|
|
// broadcasting up in the hierarchy (so that we can 'sniff' the
|
|
|
|
// unocommandresult for .uno:Save at the place where it appears just once)
|
|
|
|
// is planned post-release.
|
2016-04-25 19:44:24 -05:00
|
|
|
const auto newFileModifiedTime = Poco::File(_storage->getLocalRootPath()).getLastModified();
|
2016-04-27 19:52:32 -05:00
|
|
|
const auto elapsed = newFileModifiedTime - _lastFileModifiedTime;
|
|
|
|
if (std::abs(elapsed) > 10 * 1000 * 1000)
|
2016-04-25 19:44:24 -05:00
|
|
|
{
|
|
|
|
// Nothing to do.
|
|
|
|
Log::debug("Skipping unnecessary saving to URI [" + uri + "].");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-04-10 12:03:57 -05:00
|
|
|
Log::debug("Saving to URI [" + uri + "].");
|
2016-03-23 07:41:18 -05:00
|
|
|
|
2016-03-26 08:10:53 -05:00
|
|
|
assert(_storage && _tileCache);
|
|
|
|
if (_storage->saveLocalFileToStorage())
|
|
|
|
{
|
2016-04-21 23:11:24 -05:00
|
|
|
_isModified = false;
|
2016-04-22 06:00:11 -05:00
|
|
|
_tileCache->setUnsavedChanges(false);
|
2016-04-25 19:44:24 -05:00
|
|
|
const auto fileInfo = _storage->getFileInfo(_uriPublic);
|
|
|
|
_lastFileModifiedTime = newFileModifiedTime;
|
|
|
|
_tileCache->saveLastModified(_lastFileModifiedTime);
|
|
|
|
_lastSaveTime = std::chrono::steady_clock::now();
|
2016-04-10 12:03:57 -05:00
|
|
|
Log::debug("Saved to URI [" + uri + "] and updated tile cache.");
|
2016-04-10 21:07:09 -05:00
|
|
|
_saveCV.notify_all();
|
2016-03-26 08:10:53 -05:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-04-10 12:03:57 -05:00
|
|
|
Log::error("Failed to save to URI [" + uri + "].");
|
2016-03-26 08:10:53 -05:00
|
|
|
return false;
|
2016-03-23 07:41:18 -05:00
|
|
|
}
|
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
bool DocumentBroker::autoSave(const bool force, const size_t waitTimeoutMs)
|
2016-04-09 22:20:20 -05:00
|
|
|
{
|
2016-04-25 19:48:02 -05:00
|
|
|
Log::trace("Autosaving [" + _docKey + "].");
|
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
std::unique_lock<std::mutex> lock(_mutex);
|
2016-04-29 22:07:09 -05:00
|
|
|
if (_sessions.empty() || _storage == nullptr || !_isLoaded)
|
2016-04-09 22:20:20 -05:00
|
|
|
{
|
2016-04-29 22:07:09 -05:00
|
|
|
// Nothing to do.
|
|
|
|
Log::trace("Nothing to autosave [" + _docKey + "].");
|
|
|
|
return true;
|
2016-04-09 22:20:20 -05:00
|
|
|
}
|
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
bool sent = false;
|
2016-05-02 21:58:53 -05:00
|
|
|
if (force)
|
2016-04-09 22:20:20 -05:00
|
|
|
{
|
2016-04-25 19:48:02 -05:00
|
|
|
sent = sendUnoSave();
|
2016-04-09 22:20:20 -05:00
|
|
|
}
|
2016-05-02 21:58:53 -05:00
|
|
|
else if (_isModified)
|
2016-04-09 22:20:20 -05:00
|
|
|
{
|
2016-04-25 19:48:02 -05:00
|
|
|
// Find the most recent activity.
|
|
|
|
double inactivityTimeMs = std::numeric_limits<double>::max();
|
|
|
|
for (auto& sessionIt: _sessions)
|
2016-04-09 22:20:20 -05:00
|
|
|
{
|
2016-04-25 19:48:02 -05:00
|
|
|
inactivityTimeMs = std::min(sessionIt.second->getInactivityMS(), inactivityTimeMs);
|
|
|
|
}
|
2016-04-09 22:20:20 -05:00
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
Log::trace("Most recent activity was " + std::to_string((int)inactivityTimeMs) + " ms ago.");
|
|
|
|
const auto timeSinceLastSaveMs = getTimeSinceLastSaveMs();
|
|
|
|
Log::trace("Time since last save is " + std::to_string((int)timeSinceLastSaveMs) + " ms.");
|
2016-04-10 11:30:33 -05:00
|
|
|
|
2016-05-02 21:58:53 -05:00
|
|
|
// Either we've been idle long enough, or it's auto-save time.
|
|
|
|
if (inactivityTimeMs >= IdleSaveDurationMs ||
|
|
|
|
timeSinceLastSaveMs >= AutoSaveDurationMs)
|
2016-04-25 19:48:02 -05:00
|
|
|
{
|
2016-05-02 21:58:53 -05:00
|
|
|
sent = sendUnoSave();
|
2016-04-25 19:48:02 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sent && waitTimeoutMs > 0)
|
|
|
|
{
|
|
|
|
// Remeber the last save time, since this is the predicate.
|
|
|
|
const auto lastSaveTime = _lastSaveTime;
|
2016-04-10 21:07:09 -05:00
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
if (_saveCV.wait_for(lock, std::chrono::milliseconds(waitTimeoutMs)) == std::cv_status::no_timeout)
|
|
|
|
{
|
|
|
|
return true;
|
2016-04-09 22:20:20 -05:00
|
|
|
}
|
2016-04-25 19:48:02 -05:00
|
|
|
|
|
|
|
return (lastSaveTime != _lastSaveTime);
|
2016-04-09 22:20:20 -05:00
|
|
|
}
|
2016-04-10 21:07:09 -05:00
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
return sent;
|
2016-04-10 21:07:09 -05:00
|
|
|
}
|
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
bool DocumentBroker::sendUnoSave()
|
2016-04-10 21:07:09 -05:00
|
|
|
{
|
2016-04-25 19:48:02 -05:00
|
|
|
Log::info("Autosave triggered for doc [" + _docKey + "].");
|
2016-05-02 18:17:46 -05:00
|
|
|
Util::assertIsLocked(_mutex);
|
2016-04-10 21:07:09 -05:00
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
// Save using session holding the edit-lock
|
|
|
|
for (auto& sessionIt: _sessions)
|
2016-04-10 21:07:09 -05:00
|
|
|
{
|
2016-04-25 19:48:02 -05:00
|
|
|
if (sessionIt.second->isEditLocked())
|
|
|
|
{
|
|
|
|
auto queue = sessionIt.second->getQueue();
|
|
|
|
if (queue)
|
|
|
|
{
|
|
|
|
queue->put("uno .uno:Save");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
2016-04-10 21:07:09 -05:00
|
|
|
}
|
|
|
|
|
2016-04-25 19:48:02 -05:00
|
|
|
Log::error("Failed to auto-save doc [" + _docKey + "]: No valid sessions.");
|
|
|
|
return false;
|
2016-04-09 22:20:20 -05:00
|
|
|
}
|
|
|
|
|
2016-03-23 07:41:18 -05:00
|
|
|
std::string DocumentBroker::getJailRoot() const
|
|
|
|
{
|
|
|
|
assert(!_jailId.empty());
|
|
|
|
return Poco::Path(_childRoot, _jailId).toString();
|
|
|
|
}
|
|
|
|
|
2016-04-13 03:05:00 -05:00
|
|
|
void DocumentBroker::takeEditLock(const std::string& id)
|
2016-03-23 11:55:28 -05:00
|
|
|
{
|
2016-04-26 20:55:18 -05:00
|
|
|
Log::debug("Session " + id + " taking the editing lock.");
|
2016-04-16 16:18:51 -05:00
|
|
|
std::lock_guard<std::mutex> lock(_mutex);
|
2016-04-26 20:55:18 -05:00
|
|
|
|
|
|
|
// Forward to all children.
|
2016-04-16 16:18:51 -05:00
|
|
|
for (auto& it: _sessions)
|
2016-03-23 11:55:28 -05:00
|
|
|
{
|
2016-04-26 20:55:18 -05:00
|
|
|
it.second->setEditLock(it.first == id);
|
2016-03-23 11:55:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
size_t DocumentBroker::addSession(std::shared_ptr<MasterProcessSession>& session)
|
2016-03-23 11:55:28 -05:00
|
|
|
{
|
2016-04-16 16:18:51 -05:00
|
|
|
const auto id = session->getId();
|
|
|
|
|
|
|
|
std::lock_guard<std::mutex> lock(_mutex);
|
2016-04-10 12:03:57 -05:00
|
|
|
|
2016-04-24 11:40:23 -05:00
|
|
|
// Request a new session from the child kit.
|
|
|
|
const std::string aMessage = "session " + id + " " + _docKey + "\n";
|
|
|
|
Log::debug("DocBroker to Child: " + aMessage.substr(0, aMessage.length() - 1));
|
|
|
|
_childProcess->getWebSocket()->sendFrame(aMessage.data(), aMessage.size());
|
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
auto ret = _sessions.emplace(id, session);
|
2016-03-23 11:55:28 -05:00
|
|
|
if (!ret.second)
|
|
|
|
{
|
2016-04-24 10:08:08 -05:00
|
|
|
Log::warn("DocumentBroker: Trying to add already existing session.");
|
2016-03-23 11:55:28 -05:00
|
|
|
}
|
2016-04-03 20:40:14 -05:00
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
if (_sessions.size() == 1)
|
2016-04-10 12:35:06 -05:00
|
|
|
{
|
2016-04-26 20:55:18 -05:00
|
|
|
Log::debug("Giving editing lock to the first session [" + id + "].");
|
|
|
|
_sessions.begin()->second->markEditLock(true);
|
2016-04-10 12:35:06 -05:00
|
|
|
}
|
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
return _sessions.size();
|
2016-03-23 11:55:28 -05:00
|
|
|
}
|
|
|
|
|
2016-04-24 21:09:13 -05:00
|
|
|
bool DocumentBroker::connectPeers(std::shared_ptr<MasterProcessSession>& session)
|
|
|
|
{
|
|
|
|
const auto id = session->getId();
|
|
|
|
|
|
|
|
std::lock_guard<std::mutex> lock(_mutex);
|
|
|
|
|
|
|
|
auto it = _sessions.find(id);
|
|
|
|
if (it != _sessions.end())
|
|
|
|
{
|
|
|
|
it->second->setPeer(session);
|
|
|
|
session->setPeer(it->second);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
size_t DocumentBroker::removeSession(const std::string& id)
|
2016-03-23 11:55:28 -05:00
|
|
|
{
|
2016-04-16 16:18:51 -05:00
|
|
|
std::lock_guard<std::mutex> lock(_mutex);
|
2016-04-10 12:06:35 -05:00
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
auto it = _sessions.find(id);
|
|
|
|
if (it != _sessions.end())
|
2016-03-23 11:55:28 -05:00
|
|
|
{
|
2016-04-16 16:18:51 -05:00
|
|
|
const auto haveEditLock = it->second->isEditLocked();
|
2016-04-26 20:55:18 -05:00
|
|
|
it->second->markEditLock(false);
|
2016-04-16 16:18:51 -05:00
|
|
|
_sessions.erase(it);
|
2016-03-23 11:55:28 -05:00
|
|
|
|
2016-04-16 16:18:51 -05:00
|
|
|
if (haveEditLock)
|
2016-03-23 11:55:28 -05:00
|
|
|
{
|
2016-04-16 16:18:51 -05:00
|
|
|
// pass the edit lock to first session in map
|
|
|
|
it = _sessions.begin();
|
|
|
|
if (it != _sessions.end())
|
|
|
|
{
|
|
|
|
it->second->setEditLock(true);
|
|
|
|
}
|
2016-03-23 11:55:28 -05:00
|
|
|
}
|
|
|
|
}
|
2016-04-16 16:18:51 -05:00
|
|
|
|
|
|
|
return _sessions.size();
|
2016-03-23 11:55:28 -05:00
|
|
|
}
|
|
|
|
|
2016-05-01 19:50:11 -05:00
|
|
|
bool DocumentBroker::handleInput(const std::vector<char>& payload)
|
|
|
|
{
|
|
|
|
Log::trace("DocumentBroker got child message: [" + LOOLProtocol::getAbbreviatedMessage(payload) + "].");
|
|
|
|
|
|
|
|
const auto command = LOOLProtocol::getFirstToken(payload);
|
|
|
|
if (command == "tile:")
|
|
|
|
{
|
|
|
|
handleTileResponse(payload);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void DocumentBroker::handleTileRequest(int part, int width, int height, int tilePosX,
|
2016-05-04 21:18:39 -05:00
|
|
|
int tilePosY, int tileWidth, int tileHeight, int id,
|
2016-05-01 19:50:11 -05:00
|
|
|
const std::shared_ptr<MasterProcessSession>& session)
|
|
|
|
{
|
2016-05-03 06:47:58 -05:00
|
|
|
Log::trace() << "Tile request for part: " << part << ", width: " << width << ", height: " << height
|
|
|
|
<< ", tilePosX: " << tilePosX << ", tilePosY: " << tilePosY << ", tileWidth: " << tileWidth
|
2016-05-04 21:18:39 -05:00
|
|
|
<< ", tileHeight: " << tileHeight << ", id: " << id << Log::end;
|
2016-05-03 06:47:58 -05:00
|
|
|
|
2016-05-04 20:14:39 -05:00
|
|
|
std::ostringstream oss;
|
|
|
|
oss << " part=" << part
|
|
|
|
<< " width=" << width
|
|
|
|
<< " height=" << height
|
|
|
|
<< " tileposx=" << tilePosX
|
|
|
|
<< " tileposy=" << tilePosY
|
|
|
|
<< " tilewidth=" << tileWidth
|
|
|
|
<< " tileheight=" << tileHeight;
|
2016-05-04 21:18:39 -05:00
|
|
|
if (id >= 0)
|
|
|
|
{
|
|
|
|
oss << " id=" << id;
|
|
|
|
}
|
|
|
|
|
2016-05-05 01:37:40 -05:00
|
|
|
// Piggyback editlock information to kit process.
|
|
|
|
// We do not allow requests without editlock to change document parts
|
|
|
|
oss << " editlock=" << (session->isEditLocked() ? "1" : "0");
|
2016-05-05 09:18:31 -05:00
|
|
|
const std::string tileMsg = oss.str();
|
2016-05-04 20:14:39 -05:00
|
|
|
|
2016-05-01 19:50:11 -05:00
|
|
|
std::unique_lock<std::mutex> lock(_mutex);
|
|
|
|
|
2016-05-04 21:05:09 -05:00
|
|
|
std::unique_ptr<std::fstream> cachedTile = _tileCache->lookupTile(part, width, height, tilePosX, tilePosY, tileWidth, tileHeight);
|
2016-05-01 19:50:11 -05:00
|
|
|
|
|
|
|
if (cachedTile)
|
|
|
|
{
|
|
|
|
#if ENABLE_DEBUG
|
2016-05-05 09:18:31 -05:00
|
|
|
const std::string response = "tile:" + tileMsg + " renderid=cached\n";
|
2016-05-04 20:14:39 -05:00
|
|
|
#else
|
2016-05-05 09:18:31 -05:00
|
|
|
const std::string response = "tile:" + tileMsg + "\n";
|
2016-05-01 19:50:11 -05:00
|
|
|
#endif
|
|
|
|
|
|
|
|
std::vector<char> output;
|
|
|
|
output.reserve(4 * width * height);
|
|
|
|
output.resize(response.size());
|
|
|
|
std::memcpy(output.data(), response.data(), response.size());
|
|
|
|
|
|
|
|
assert(cachedTile->is_open());
|
|
|
|
cachedTile->seekg(0, std::ios_base::end);
|
|
|
|
size_t pos = output.size();
|
|
|
|
std::streamsize size = cachedTile->tellg();
|
|
|
|
output.resize(pos + size);
|
|
|
|
cachedTile->seekg(0, std::ios_base::beg);
|
|
|
|
cachedTile->read(output.data() + pos, size);
|
|
|
|
cachedTile->close();
|
|
|
|
|
|
|
|
session->sendBinaryFrame(output.data(), output.size());
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tileCache().isTileBeingRenderedIfSoSubscribe(
|
|
|
|
part, width, height, tilePosX, tilePosY, tileWidth,
|
|
|
|
tileHeight, session))
|
|
|
|
return;
|
|
|
|
|
2016-05-04 21:05:09 -05:00
|
|
|
Log::debug() << "Sending render request for tile (" << part << ',' << tilePosX << ',' << tilePosY << ")." << Log::end;
|
|
|
|
|
2016-05-01 19:50:11 -05:00
|
|
|
// Forward to child to render.
|
2016-05-04 20:14:39 -05:00
|
|
|
const std::string request = "tile " + tileMsg;
|
2016-05-01 19:50:11 -05:00
|
|
|
_childProcess->getWebSocket()->sendFrame(request.data(), request.size());
|
|
|
|
}
|
|
|
|
|
|
|
|
void DocumentBroker::handleTileResponse(const std::vector<char>& payload)
|
|
|
|
{
|
|
|
|
const std::string firstLine = getFirstLine(payload);
|
|
|
|
Poco::StringTokenizer tokens(firstLine, " ", Poco::StringTokenizer::TOK_IGNORE_EMPTY | Poco::StringTokenizer::TOK_TRIM);
|
|
|
|
|
|
|
|
int part, width, height, tilePosX, tilePosY, tileWidth, tileHeight;
|
|
|
|
if (tokens.count() < 8 ||
|
|
|
|
!getTokenInteger(tokens[1], "part", part) ||
|
|
|
|
!getTokenInteger(tokens[2], "width", width) ||
|
|
|
|
!getTokenInteger(tokens[3], "height", height) ||
|
|
|
|
!getTokenInteger(tokens[4], "tileposx", tilePosX) ||
|
|
|
|
!getTokenInteger(tokens[5], "tileposy", tilePosY) ||
|
|
|
|
!getTokenInteger(tokens[6], "tilewidth", tileWidth) ||
|
|
|
|
!getTokenInteger(tokens[7], "tileheight", tileHeight))
|
|
|
|
assert(false);
|
|
|
|
|
|
|
|
const auto buffer = payload.data();
|
|
|
|
const auto length = payload.size();
|
|
|
|
|
2016-05-05 01:37:40 -05:00
|
|
|
if(firstLine.size() < static_cast<std::string::size_type>(length) - 1)
|
|
|
|
{
|
|
|
|
tileCache().saveTile(part, width, height, tilePosX, tilePosY, tileWidth, tileHeight, buffer + firstLine.size() + 1, length - firstLine.size() - 1);
|
|
|
|
tileCache().notifyAndRemoveSubscribers(part, width, height, tilePosX, tilePosY, tileWidth, tileHeight);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
Log::debug() << "Render request declined for " << firstLine << Log::end;
|
|
|
|
std::unique_lock<std::mutex> tileBeingRenderedLock(tileCache().getTilesBeingRenderedLock());
|
|
|
|
tileCache().forgetTileBeingRendered(part, width, height, tilePosX, tilePosY, tileWidth, tileHeight);
|
|
|
|
}
|
2016-05-01 19:50:11 -05:00
|
|
|
}
|
|
|
|
|
2016-04-17 22:29:03 -05:00
|
|
|
bool DocumentBroker::canDestroy()
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> lock(_mutex);
|
|
|
|
|
|
|
|
if (_sessions.size() == 1)
|
|
|
|
{
|
|
|
|
// Last view going away, can destroy.
|
|
|
|
_markToDestroy = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return _markToDestroy;
|
|
|
|
}
|
|
|
|
|
2016-04-22 06:00:11 -05:00
|
|
|
void DocumentBroker::setModified(const bool value)
|
|
|
|
{
|
|
|
|
_tileCache->setUnsavedChanges(value);
|
|
|
|
_isModified = value;
|
|
|
|
}
|
|
|
|
|
2016-03-23 07:41:18 -05:00
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|