/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */ /* * This file is part of the LibreOffice project. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include #include "Socket.hpp" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "ServerSocket.hpp" #if !MOBILEAPP #include "SslSocket.hpp" #endif #include "WebSocketHandler.hpp" int SocketPoll::DefaultPollTimeoutMs = 5000; std::atomic SocketPoll::InhibitThreadChecks(false); std::atomic Socket::InhibitThreadChecks(false); #define SOCKET_ABSTRACT_UNIX_NAME "0loolwsd-" int Socket::createSocket(Socket::Type type) { #if !MOBILEAPP int domain = AF_UNSPEC; switch (type) { case Type::IPv4: domain = AF_INET; break; case Type::IPv6: domain = AF_INET6; break; case Type::All: domain = AF_INET6; break; case Type::Unix: domain = AF_UNIX; break; default: assert (false); break; } return socket(domain, SOCK_STREAM | SOCK_NONBLOCK, 0); #else return fakeSocketSocket(); #endif } // help with initialization order namespace { std::vector &getWakeupsArray() { static std::vector pollWakeups; return pollWakeups; } std::mutex &getPollWakeupsMutex() { static std::mutex pollWakeupsMutex; return pollWakeupsMutex; } } SocketPoll::SocketPoll(const std::string& threadName) : _name(threadName), _stop(false), _threadStarted(false), _threadFinished(false), _runOnClientThread(false), _owner(std::this_thread::get_id()) { // Create the wakeup fd. if ( #if !MOBILEAPP ::pipe2(_wakeup, O_CLOEXEC | O_NONBLOCK) == -1 #else fakeSocketPipe2(_wakeup) == -1 #endif ) { throw std::runtime_error("Failed to allocate pipe for SocketPoll [" + threadName + "] waking."); } std::lock_guard lock(getPollWakeupsMutex()); getWakeupsArray().push_back(_wakeup[1]); } SocketPoll::~SocketPoll() { joinThread(); { std::lock_guard lock(getPollWakeupsMutex()); auto it = std::find(getWakeupsArray().begin(), getWakeupsArray().end(), _wakeup[1]); if (it != getWakeupsArray().end()) getWakeupsArray().erase(it); } #if !MOBILEAPP ::close(_wakeup[0]); ::close(_wakeup[1]); #else fakeSocketClose(_wakeup[0]); fakeSocketClose(_wakeup[1]); #endif _wakeup[0] = -1; _wakeup[1] = -1; } bool SocketPoll::startThread() { assert(!_runOnClientThread); if (!_threadStarted) { _threadStarted = true; _threadFinished = false; _stop = false; try { _thread = std::thread(&SocketPoll::pollingThreadEntry, this); return true; } catch (const std::exception& exc) { LOG_ERR("Failed to start poll thread: " << exc.what()); _threadStarted = false; } } return false; } void SocketPoll::joinThread() { if (isAlive()) { addCallback([this]() { removeSockets(); }); stop(); } if (_threadStarted && _thread.joinable()) { if (_thread.get_id() == std::this_thread::get_id()) LOG_ERR("DEADLOCK PREVENTED: joining own thread!"); else { _thread.join(); _threadStarted = false; } } } void SocketPoll::pollingThreadEntry() { try { Util::setThreadName(_name); _owner = std::this_thread::get_id(); LOG_INF("Starting polling thread [" << _name << "] with thread affinity set to " << Log::to_string(_owner) << '.'); // Invoke the virtual implementation. pollingThread(); // Release sockets. _pollSockets.clear(); _newSockets.clear(); } catch (const std::exception& exc) { LOG_ERR("Exception in polling thread [" << _name << "]: " << exc.what()); } _threadFinished = true; LOG_INF("Finished polling thread [" << _name << "]."); } void SocketPoll::wakeupWorld() { for (const auto& fd : getWakeupsArray()) wakeup(fd); } #if !MOBILEAPP void SocketPoll::insertNewWebSocketSync( const Poco::URI &uri, const std::shared_ptr& websocketHandler) { LOG_INF("Connecting to " << uri.getHost() << " : " << uri.getPort() << " : " << uri.getPath()); // FIXME: put this in a ClientSocket class ? // FIXME: store the address there - and ... (so on) ... struct addrinfo* ainfo = nullptr; struct addrinfo hints; std::memset(&hints, 0, sizeof(hints)); int rc = getaddrinfo(uri.getHost().c_str(), std::to_string(uri.getPort()).c_str(), &hints, &ainfo); std::string canonicalName; bool isSSL = uri.getScheme() != "ws"; #if !ENABLE_SSL if (isSSL) { LOG_ERR("Error: wss for client websocket requested but SSL not compiled in."); return; } #endif if (!rc && ainfo) { for (struct addrinfo* ai = ainfo; ai; ai = ai->ai_next) { if (ai->ai_canonname) canonicalName = ai->ai_canonname; if (ai->ai_addrlen && ai->ai_addr) { int fd = socket(ai->ai_addr->sa_family, SOCK_STREAM | SOCK_NONBLOCK, 0); int res = connect(fd, ai->ai_addr, ai->ai_addrlen); if (fd < 0 || (res < 0 && errno != EINPROGRESS)) { LOG_ERR("Failed to connect to " << uri.getHost()); ::close(fd); } else { std::shared_ptr socket; #if ENABLE_SSL if (isSSL) socket = StreamSocket::create(fd, true, websocketHandler); #endif if (!socket && !isSSL) socket = StreamSocket::create(fd, true, websocketHandler); if (socket) { LOG_DBG("Connected to client websocket " << uri.getHost() << " #" << socket->getFD()); clientRequestWebsocketUpgrade(socket, websocketHandler, uri.getPathAndQuery()); insertNewSocket(socket); } else { LOG_ERR("Failed to allocate socket for client websocket " << uri.getHost()); ::close(fd); } break; } } } freeaddrinfo(ainfo); } else LOG_ERR("Failed to lookup client websocket host '" << uri.getHost() << "' skipping"); } // should this be a static method in the WebsocketHandler(?) void SocketPoll::clientRequestWebsocketUpgrade(const std::shared_ptr& socket, const std::shared_ptr& websocketHandler, const std::string &pathAndQuery) { // cf. WebSocketHandler::upgradeToWebSocket (?) // send Sec-WebSocket-Key: ... Sec-WebSocket-Protocol: chat, Sec-WebSocket-Version: 13 LOG_TRC("Requesting upgrade of websocket at path " << pathAndQuery << " #" << socket->getFD()); std::ostringstream oss; oss << "GET " << pathAndQuery << " HTTP/1.1\r\n" "Connection:Upgrade\r\n" "User-Foo: Adminbits\r\n" "Sec-WebSocket-Key:fxTaWTEMVhq1PkWsMoLxGw==\r\n" "Upgrade:websocket\r\n" "Accept-Language:en\r\n" "Cache-Control:no-cache\r\n" "Pragma:no-cache\r\n" "Sec-WebSocket-Version:13\r\n" "User-Agent: " WOPI_AGENT_STRING "\r\n" "\r\n"; socket->send(oss.str()); websocketHandler->onConnect(socket); } void SocketPoll::insertNewUnixSocket( const std::string &location, const std::string &pathAndQuery, const std::shared_ptr& websocketHandler) { int fd = socket(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, 0); struct sockaddr_un addrunix; std::memset(&addrunix, 0, sizeof(addrunix)); addrunix.sun_family = AF_UNIX; addrunix.sun_path[0] = '\0'; // abstract name memcpy(&addrunix.sun_path[1], location.c_str(), location.length()); int res = connect(fd, (const struct sockaddr *)&addrunix, sizeof(addrunix)); if (fd < 0 || (res < 0 && errno != EINPROGRESS)) { LOG_ERR("Failed to connect to unix socket at " << location); ::close(fd); } else { std::shared_ptr socket; socket = StreamSocket::create(fd, true, websocketHandler); if (socket) { LOG_DBG("Connected to local UDS " << location << " #" << socket->getFD()); clientRequestWebsocketUpgrade(socket, websocketHandler, pathAndQuery); insertNewSocket(socket); } } } #else void SocketPoll::insertNewFakeSocket( int peerSocket, const std::shared_ptr& websocketHandler) { LOG_INF("Connecting to " << peerSocket); int fd = fakeSocketSocket(); int res = fakeSocketConnect(fd, peerSocket); if (fd < 0 || (res < 0 && errno != EINPROGRESS)) { LOG_ERR("Failed to connect to the 'wsd' socket"); fakeSocketClose(fd); } else { std::shared_ptr socket; socket = StreamSocket::create(fd, true, websocketHandler); if (socket) { LOG_TRC("Sending 'hello' instead of HTTP GET for now"); socket->send("hello"); insertNewSocket(socket); } else { LOG_ERR("Failed to allocate socket for client websocket"); fakeSocketClose(fd); } } } #endif void ServerSocket::dumpState(std::ostream& os) { os << "\t" << getFD() << "\t\n"; } void SocketDisposition::execute() { // We should have hard ownership of this socket. assert(_socket->getThreadOwner() == std::this_thread::get_id()); if (_socketMove) { // Drop pretentions of ownership before _socketMove. _socket->setThreadOwner(std::thread::id()); _socketMove(_socket); } _socketMove = nullptr; } const int WebSocketHandler::InitialPingDelayMs = 25; const int WebSocketHandler::PingFrequencyMs = 18 * 1000; void WebSocketHandler::dumpState(std::ostream& os) { os << (_shuttingDown ? "shutd " : "alive ") << std::setw(5) << _pingTimeUs/1000. << "ms "; if (_wsPayload.size() > 0) Util::dumpHex(os, "\t\tws queued payload:\n", "\t\t", _wsPayload); os << "\n"; } void StreamSocket::dumpState(std::ostream& os) { int timeoutMaxMs = SocketPoll::DefaultPollTimeoutMs; int events = getPollEvents(std::chrono::steady_clock::now(), timeoutMaxMs); os << "\t" << getFD() << "\t" << events << "\t" << _inBuffer.size() << "\t" << _outBuffer.size() << "\t" << " r: " << _bytesRecvd << "\t w: " << _bytesSent << "\t" << clientAddress() << "\t"; _socketHandler->dumpState(os); if (_inBuffer.size() > 0) Util::dumpHex(os, "\t\tinBuffer:\n", "\t\t", _inBuffer); if (_outBuffer.size() > 0) Util::dumpHex(os, "\t\toutBuffer:\n", "\t\t", _outBuffer); } void StreamSocket::send(Poco::Net::HTTPResponse& response) { response.set("User-Agent", HTTP_AGENT_STRING); response.set("Date", Util::getHttpTimeNow()); std::ostringstream oss; response.write(oss); send(oss.str()); } void SocketPoll::dumpState(std::ostream& os) { // FIXME: NOT thread-safe! _pollSockets is modified from the polling thread! os << " Poll [" << _pollSockets.size() << "] - wakeup r: " << _wakeup[0] << " w: " << _wakeup[1] << "\n"; if (_newCallbacks.size() > 0) os << "\tcallbacks: " << _newCallbacks.size() << "\n"; os << "\tfd\tevents\trsize\twsize\n"; for (auto &i : _pollSockets) i->dumpState(os); } /// Returns true on success only. bool ServerSocket::bind(Type type, int port) { #if !MOBILEAPP // Enable address reuse to avoid stalling after // recycling, when previous socket is TIME_WAIT. //TODO: Might be worth refactoring out. const int reuseAddress = 1; constexpr unsigned int len = sizeof(reuseAddress); ::setsockopt(getFD(), SOL_SOCKET, SO_REUSEADDR, &reuseAddress, len); int rc; assert (_type != Socket::Type::Unix); if (_type == Socket::Type::IPv4) { struct sockaddr_in addrv4; std::memset(&addrv4, 0, sizeof(addrv4)); addrv4.sin_family = AF_INET; addrv4.sin_port = htons(port); if (type == Type::Public) addrv4.sin_addr.s_addr = htonl(INADDR_ANY); else addrv4.sin_addr.s_addr = htonl(INADDR_LOOPBACK); rc = ::bind(getFD(), (const sockaddr *)&addrv4, sizeof(addrv4)); } else { struct sockaddr_in6 addrv6; std::memset(&addrv6, 0, sizeof(addrv6)); addrv6.sin6_family = AF_INET6; addrv6.sin6_port = htons(port); if (type == Type::Public) addrv6.sin6_addr = in6addr_any; else addrv6.sin6_addr = in6addr_loopback; int ipv6only = _type == Socket::Type::All ? 0 : 1; if (::setsockopt(getFD(), IPPROTO_IPV6, IPV6_V6ONLY, (char*)&ipv6only, sizeof(ipv6only)) == -1) LOG_SYS("Failed set ipv6 socket to %d" << ipv6only); rc = ::bind(getFD(), (const sockaddr *)&addrv6, sizeof(addrv6)); } if (rc) LOG_SYS("Failed to bind to: " << (_type == Socket::Type::IPv4 ? "IPv4" : "IPv6") << " port: " << port); return rc == 0; #else return true; #endif } std::shared_ptr ServerSocket::accept() { // Accept a connection (if any) and set it to non-blocking. // There still need the client's address to filter request from POST(call from REST) here. #if !MOBILEAPP assert(_type != Socket::Type::Unix); struct sockaddr_in6 clientInfo; socklen_t addrlen = sizeof(clientInfo); const int rc = ::accept4(getFD(), (struct sockaddr *)&clientInfo, &addrlen, SOCK_NONBLOCK); #else const int rc = fakeSocketAccept4(getFD()); #endif LOG_DBG("Accepted socket #" << rc << ", creating socket object."); try { // Create a socket object using the factory. if (rc != -1) { std::shared_ptr _socket = _sockFactory->create(rc); #if !MOBILEAPP char addrstr[INET6_ADDRSTRLEN]; const void *inAddr; if (clientInfo.sin6_family == AF_INET) { auto ipv4 = (struct sockaddr_in *)&clientInfo; inAddr = &(ipv4->sin_addr); } else { auto ipv6 = (struct sockaddr_in6 *)&clientInfo; inAddr = &(ipv6->sin6_addr); } inet_ntop(clientInfo.sin6_family, inAddr, addrstr, sizeof(addrstr)); _socket->setClientAddress(addrstr); LOG_DBG("Accepted socket has family " << clientInfo.sin6_family << " address " << _socket->clientAddress()); #endif return _socket; } return std::shared_ptr(nullptr); } catch (const std::exception& ex) { LOG_SYS("Failed to create client socket #" << rc << ". Error: " << ex.what()); } return nullptr; } #if !MOBILEAPP int Socket::getPid() const { struct ucred creds; socklen_t credSize = sizeof(struct ucred); if (getsockopt(_fd, SOL_SOCKET, SO_PEERCRED, &creds, &credSize) < 0) { LOG_TRC("Failed to get pid via peer creds on " << _fd << " " << strerror(errno)); return -1; } return creds.pid; } std::shared_ptr LocalServerSocket::accept() { const int rc = ::accept4(getFD(), nullptr, nullptr, SOCK_NONBLOCK); try { LOG_DBG("Accepted prisoner socket #" << rc << ", creating socket object."); if (rc < 0) return std::shared_ptr(nullptr); std::shared_ptr _socket = _sockFactory->create(rc); // Sanity check this incoming socket struct ucred creds; socklen_t credSize = sizeof(struct ucred); if (getsockopt(getFD(), SOL_SOCKET, SO_PEERCRED, &creds, &credSize) < 0) { LOG_ERR("Failed to get peer creds on " << getFD() << " " << strerror(errno)); ::close(rc); return std::shared_ptr(nullptr); } uid_t uid = getuid(); uid_t gid = getgid(); if (creds.uid != uid || creds.gid != gid) { LOG_ERR("Peercred mis-match on domain socket - closing connection. uid: " << creds.uid << "vs." << uid << " gid: " << creds.gid << "vs." << gid); ::close(rc); return std::shared_ptr(nullptr); } std::string addr("uds-to-pid-"); addr.append(std::to_string(creds.pid)); _socket->setClientAddress(addr); LOG_DBG("Accepted socket is UDS - address " << addr << " and uid/gid " << creds.uid << "/" << creds.gid); return _socket; } catch (const std::exception& ex) { LOG_SYS("Failed to create client socket #" << rc << ". Error: " << ex.what()); return std::shared_ptr(nullptr); } } /// Returns true on success only. std::string LocalServerSocket::bind() { int rc; struct sockaddr_un addrunix; do { std::memset(&addrunix, 0, sizeof(addrunix)); addrunix.sun_family = AF_UNIX; std::memcpy(addrunix.sun_path, SOCKET_ABSTRACT_UNIX_NAME, sizeof(SOCKET_ABSTRACT_UNIX_NAME)); addrunix.sun_path[0] = '\0'; // abstract name std::string rand = Util::rng::getFilename(8); memcpy(addrunix.sun_path + sizeof(SOCKET_ABSTRACT_UNIX_NAME) - 1, rand.c_str(), 8); rc = ::bind(getFD(), (const sockaddr *)&addrunix, sizeof(struct sockaddr_un)); LOG_TRC("Bind to location " << std::string(&addrunix.sun_path[1]) << " result - " << rc << "errno: " << ((rc >= 0) ? "no error" : ::strerror(errno))); } while (rc < 0 && errno == EADDRINUSE); if (rc >= 0) return std::string(&addrunix.sun_path[1]); return ""; } // For a verbose life, tweak here: #if 0 # define LOG_CHUNK(X) LOG_TRC(X) #else # define LOG_CHUNK(X) #endif bool StreamSocket::parseHeader(const char *clientName, Poco::MemoryInputStream &message, Poco::Net::HTTPRequest &request, MessageMap *map) { LOG_TRC("#" << getFD() << " handling incoming " << _inBuffer.size() << " bytes."); assert(!map || (map->_headerSize == 0 && map->_messageSize == 0)); // Find the end of the header, if any. static const std::string marker("\r\n\r\n"); auto itBody = std::search(_inBuffer.begin(), _inBuffer.end(), marker.begin(), marker.end()); if (itBody == _inBuffer.end()) { LOG_TRC("#" << getFD() << " doesn't have enough data yet."); return false; } // Skip the marker. itBody += marker.size(); if (map) // a reasonable guess so far { map->_headerSize = static_cast(itBody - _inBuffer.begin()); map->_messageSize = map->_headerSize; } try { request.read(message); Log::StreamLogger logger = Log::info(); if (logger.enabled()) { logger << "#" << getFD() << ": " << clientName << " HTTP Request: " << request.getMethod() << ' ' << request.getURI() << ' ' << request.getVersion(); for (const auto& it : request) { logger << " / " << it.first << ": " << it.second; } LOG_END(logger, true); } const std::streamsize contentLength = request.getContentLength(); const auto offset = itBody - _inBuffer.begin(); const std::streamsize available = _inBuffer.size() - offset; if (contentLength != Poco::Net::HTTPMessage::UNKNOWN_CONTENT_LENGTH && available < contentLength) { LOG_DBG("Not enough content yet: ContentLength: " << contentLength << ", available: " << available); return false; } if (map) map->_messageSize += contentLength; const std::string expect = request.get("Expect", ""); bool getExpectContinue = !expect.empty() && Poco::icompare(expect, "100-continue") == 0; if (getExpectContinue && !_sentHTTPContinue) { LOG_TRC("#" << getFD() << " got Expect: 100-continue, sending Continue"); // FIXME: should validate authentication headers early too. send("HTTP/1.1 100 Continue\r\n\r\n", sizeof("HTTP/1.1 100 Continue\r\n\r\n") - 1); _sentHTTPContinue = true; } if (request.getChunkedTransferEncoding()) { // keep the header if (map) map->_spans.push_back(std::pair(0, itBody - _inBuffer.begin())); int chunk = 0; while (itBody != _inBuffer.end()) { auto chunkStart = itBody; // skip whitespace for (; itBody != _inBuffer.end() && isascii(*itBody) && isspace(*itBody); ++itBody) ; // skip. // each chunk is preceeded by its length in hex. size_t chunkLen = 0; for (; itBody != _inBuffer.end(); ++itBody) { int digit = Util::hexDigitFromChar(*itBody); if (digit >= 0) chunkLen = chunkLen * 16 + digit; else break; } LOG_CHUNK("Chunk of length " << chunkLen); for (; itBody != _inBuffer.end() && *itBody != '\n'; ++itBody) ; // skip to end of line if (itBody != _inBuffer.end()) itBody++; /* \n */; // skip the chunk. auto chunkOffset = itBody - _inBuffer.begin(); auto chunkAvailable = _inBuffer.size() - chunkOffset; if (chunkLen == 0) // we're complete. { map->_messageSize = chunkOffset; return true; } if (chunkLen > chunkAvailable + 2) { LOG_DBG("Not enough content yet in chunk " << chunk << " starting at offset " << (chunkStart - _inBuffer.begin()) << " chunk len: " << chunkLen << ", available: " << chunkAvailable); return false; } itBody += chunkLen; map->_spans.push_back(std::pair(chunkOffset, chunkLen)); if (*itBody != '\r' || *(itBody + 1) != '\n') { LOG_ERR("Missing \\r\\n at end of chunk " << chunk << " of length " << chunkLen); LOG_CHUNK("Chunk " << chunk << " is: \n" << Util::dumpHex("", "", chunkStart, itBody + 1, false)); return false; // TODO: throw something sensible in this case } else { LOG_CHUNK("Chunk " << chunk << " is: \n" << Util::dumpHex("", "", chunkStart, itBody + 1, false)); } itBody+=2; chunk++; } LOG_TRC("Not enough chunks yet, so far " << chunk << " chunks of total length " << (itBody - _inBuffer.begin())); return false; } } catch (const Poco::Exception& exc) { LOG_DBG("parseHeader exception caught: " << exc.displayText()); // Probably don't have enough data just yet. // TODO: timeout if we never get enough. return false; } catch (const std::exception& exc) { LOG_DBG("parseHeader exception caught: " << exc.what()); // Probably don't have enough data just yet. // TODO: timeout if we never get enough. return false; } return true; } bool StreamSocket::compactChunks(MessageMap *map) { assert (map); if (!map->_spans.size()) return false; // single message. LOG_CHUNK("Pre-compact " << map->_spans.size() << " chunks: \n" << Util::dumpHex("", "", _inBuffer.begin(), _inBuffer.end(), false)); char *first = &_inBuffer[0]; char *dest = first; for (auto &span : map->_spans) { std::memmove(dest, &_inBuffer[span.first], span.second); dest += span.second; } // Erase the duplicate bits. size_t newEnd = dest - first; size_t gap = map->_messageSize - newEnd; _inBuffer.erase(_inBuffer.begin() + newEnd, _inBuffer.begin() + map->_messageSize); LOG_CHUNK("Post-compact with erase of " << newEnd << " to " << map->_messageSize << " giving: \n" << Util::dumpHex("", "", _inBuffer.begin(), _inBuffer.end(), false)); // shrink our size to fit map->_messageSize -= gap; dumpState(std::cerr); return true; } namespace HttpHelper { void sendUncompressedFileContent(const std::shared_ptr& socket, const std::string& path, const int bufferSize) { std::ifstream file(path, std::ios::binary); std::unique_ptr buf(new char[bufferSize]); do { file.read(&buf[0], bufferSize); const int size = file.gcount(); if (size > 0) socket->send(&buf[0], size, true); else break; } while (file); } void sendDeflatedFileContent(const std::shared_ptr& socket, const std::string& path, const int fileSize) { // FIXME: Should compress once ahead of time // compression of bundle.js takes significant time: // 200's ms for level 9 (468k), 72ms for level 1(587k) // down from 2Mb. if (fileSize > 0) { std::ifstream file(path, std::ios::binary); std::unique_ptr buf(new char[fileSize]); file.read(&buf[0], fileSize); static const unsigned int Level = 1; const long unsigned int size = file.gcount(); long unsigned int compSize = compressBound(size); std::unique_ptr cbuf(new char[compSize]); compress2((Bytef *)&cbuf[0], &compSize, (Bytef *)&buf[0], size, Level); if (size > 0) socket->send(&cbuf[0], compSize, true); } } void sendFile(const std::shared_ptr& socket, const std::string& path, const std::string& mediaType, Poco::Net::HTTPResponse& response, const bool noCache, const bool deflate, const bool headerOnly) { struct stat st; if (stat(path.c_str(), &st) != 0) { LOG_WRN("#" << socket->getFD() << ": Failed to stat [" << path << "]. File will not be sent."); throw Poco::FileNotFoundException("Failed to stat [" + path + "]. File will not be sent."); } if (!noCache) { // 60 * 60 * 24 * 128 (days) = 11059200 response.set("Cache-Control", "max-age=11059200"); response.set("ETag", "\"" LOOLWSD_VERSION_HASH "\""); } else { response.set("Cache-Control", "no-cache"); } response.setContentType(mediaType); response.add("X-Content-Type-Options", "nosniff"); int bufferSize = std::min(st.st_size, (off_t)Socket::MaximumSendBufferSize); if (st.st_size >= socket->getSendBufferSize()) { socket->setSocketBufferSize(bufferSize); bufferSize = socket->getSendBufferSize(); } // Disable deflate for now - until we can cache deflated data. // FIXME: IE/Edge doesn't work well with deflate, so check with // IE/Edge before enabling the deflate again if (!deflate || true) { response.setContentLength(st.st_size); LOG_TRC("#" << socket->getFD() << ": Sending " << (headerOnly ? "header for " : "") << " file [" << path << "]."); socket->send(response); if (!headerOnly) sendUncompressedFileContent(socket, path, bufferSize); } else { response.set("Content-Encoding", "deflate"); LOG_TRC("#" << socket->getFD() << ": Sending " << (headerOnly ? "header for " : "") << " file [" << path << "]."); socket->send(response); if (!headerOnly) sendDeflatedFileContent(socket, path, st.st_size); } } } bool StreamSocket::sniffSSL() const { // Only sniffing the first bytes of a socket. if (_bytesSent > 0 || _bytesRecvd != _inBuffer.size() || _bytesRecvd < 6) return false; // 0x0000 16 03 01 02 00 01 00 01 return (_inBuffer[0] == 0x16 && // HANDSHAKE _inBuffer[1] == 0x03 && // SSL 3.0 / TLS 1.x _inBuffer[5] == 0x01); // Handshake: CLIENT_HELLO } #endif // !MOBILEAPP /* vim:set shiftwidth=4 softtabstop=4 expandtab: */