/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */ /* * This file is part of the LibreOffice project. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "config.h" #include "LOOLWSD.hpp" /* Default host used in the start test URI */ #define LOOLWSD_TEST_HOST "localhost" /* Default loleaflet UI used in the admin console URI */ #define LOOLWSD_TEST_ADMIN_CONSOLE "/loleaflet/dist/admin/admin.html" /* Default loleaflet UI used in the start test URI */ #define LOOLWSD_TEST_LOLEAFLET_UI "/loleaflet/" LOOLWSD_VERSION_HASH "/loleaflet.html" /* Default document used in the start test URI */ #define LOOLWSD_TEST_DOCUMENT_RELATIVE_PATH "test/data/hello-world.odt" // This is the main source for the loolwsd program. LOOL uses several loolwsd processes: one main // parent process that listens on the TCP port and accepts connections from LOOL clients, and a // number of child processes, each which handles a viewing (editing) session for one document. #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "Admin.hpp" #include "Auth.hpp" #include "ClientSession.hpp" #include "Common.hpp" #include "Crypto.hpp" #include "DocumentBroker.hpp" #include "Exceptions.hpp" #include "FileServer.hpp" #include "IoUtil.hpp" #include "Log.hpp" #include "Protocol.hpp" #include "ServerSocket.hpp" #include "Session.hpp" #if ENABLE_SSL # include "SslSocket.hpp" #endif #include "DelaySocket.hpp" #include "Storage.hpp" #include "TraceFile.hpp" #include "Unit.hpp" #include "UnitHTTP.hpp" #include "UserMessages.hpp" #include "Util.hpp" #include "FileUtil.hpp" #ifdef KIT_IN_PROCESS # include #endif #ifdef FUZZER # include #endif #include "common/SigUtil.hpp" using namespace LOOLProtocol; using Poco::Environment; using Poco::Exception; using Poco::File; using Poco::Net::HTMLForm; using Poco::Net::HTTPRequest; using Poco::Net::HTTPResponse; using Poco::Net::MessageHeader; using Poco::Net::NameValueCollection; using Poco::Net::PartHandler; using Poco::Net::SocketAddress; using Poco::Path; #ifndef KIT_IN_PROCESS using Poco::Pipe; #endif using Poco::Process; #ifndef KIT_IN_PROCESS using Poco::ProcessHandle; #endif using Poco::StreamCopier; using Poco::StringTokenizer; using Poco::TemporaryFile; #if FUZZER using Poco::Thread; #endif using Poco::URI; using Poco::Util::Application; using Poco::Util::HelpFormatter; using Poco::Util::IncompatibleOptionsException; using Poco::Util::MissingOptionException; using Poco::Util::Option; using Poco::Util::OptionSet; using Poco::Util::ServerApplication; using Poco::XML::AutoPtr; using Poco::XML::DOMParser; using Poco::XML::DOMWriter; using Poco::XML::Element; using Poco::XML::InputSource; using Poco::XML::NodeList; using Poco::XML::Node; int ClientPortNumber = DEFAULT_CLIENT_PORT_NUMBER; int MasterPortNumber = DEFAULT_MASTER_PORT_NUMBER; /// New LOK child processes ready to host documents. //TODO: Move to a more sensible namespace. static bool DisplayVersion = false; /// Funky latency simulation basic delay (ms) static int SimulatedLatencyMs = 0; // Tracks the set of prisoners / children waiting to be used. static std::mutex NewChildrenMutex; static std::condition_variable NewChildrenCV; static std::vector > NewChildren; static std::chrono::steady_clock::time_point LastForkRequestTime = std::chrono::steady_clock::now(); static std::atomic OutstandingForks(0); static std::map > DocBrokers; static std::mutex DocBrokersMutex; extern "C" { void dump_state(void); /* easy for gdb */ } #if ENABLE_DEBUG static int careerSpanMs = 0; #endif namespace { inline void shutdownLimitReached(WebSocketHandler& ws) { const std::string error = Poco::format(PAYLOAD_UNAVAILABLE_LIMIT_REACHED, LOOLWSD::MaxDocuments, LOOLWSD::MaxConnections); LOG_INF("Sending client limit-reached message: " << error); try { // Let the client know we are shutting down. ws.sendMessage(error); // Shutdown. ws.shutdown(WebSocketHandler::StatusCodes::POLICY_VIOLATION); } catch (const std::exception& ex) { LOG_ERR("Error while shuting down socket on reaching limit: " << ex.what()); } } /// Internal implementation to alert all clients /// connected to any document. void alertAllUsersInternal(const std::string& msg) { std::lock_guard docBrokersLock(DocBrokersMutex); LOG_INF("Alerting all users: [" << msg << "]"); if (UnitWSD::get().filterAlertAllusers(msg)) return; for (auto& brokerIt : DocBrokers) { std::shared_ptr docBroker = brokerIt.second; docBroker->addCallback([msg, docBroker](){ docBroker->alertAllUsers(msg); }); } } } /// Remove dead and idle DocBrokers. /// The client of idle document should've greyed-out long ago. /// Returns true if at least one is removed. void cleanupDocBrokers() { Util::assertIsLocked(DocBrokersMutex); const auto count = DocBrokers.size(); for (auto it = DocBrokers.begin(); it != DocBrokers.end(); ) { auto docBroker = it->second; // Remove only when not alive. if (!docBroker->isAlive()) { LOG_INF("Removing DocumentBroker for docKey [" << it->first << "]."); it = DocBrokers.erase(it); continue; } else { ++it; } } if (count != DocBrokers.size()) { auto logger = Log::trace(); if (logger.enabled()) { logger << "Have " << DocBrokers.size() << " DocBrokers after cleanup.\n"; for (auto& pair : DocBrokers) { logger << "DocumentBroker [" << pair.first << "].\n"; } LOG_END(logger); } } } /// Forks as many children as requested. /// Returns the number of children requested to spawn, /// -1 for error. static int forkChildren(const int number) { Util::assertIsLocked(NewChildrenMutex); if (number > 0) { const std::string fs = FileUtil::checkDiskSpaceOnRegisteredFileSystems(false); if (!fs.empty()) { LOG_WRN("File system of " << fs << " dangerously low on disk space"); alertAllUsersInternal("error: cmd=internal kind=diskfull"); } #ifdef KIT_IN_PROCESS forkLibreOfficeKit(LOOLWSD::ChildRoot, LOOLWSD::SysTemplate, LOOLWSD::LoTemplate, LO_JAIL_SUBPATH, number); #else const std::string aMessage = "spawn " + std::to_string(number) + "\n"; LOG_DBG("MasterToForKit: " << aMessage.substr(0, aMessage.length() - 1)); if (IoUtil::writeToPipe(LOOLWSD::ForKitWritePipe, aMessage) > 0) #endif { OutstandingForks += number; LastForkRequestTime = std::chrono::steady_clock::now(); return number; } LOG_ERR("No forkit pipe while rebalancing children."); return -1; // Fail. } return 0; } /// Cleans up dead children. /// Returns true if removed at least one. static bool cleanupChildren() { Util::assertIsLocked(NewChildrenMutex); const int count = NewChildren.size(); for (int i = count - 1; i >= 0; --i) { if (!NewChildren[i]->isAlive()) { LOG_WRN("Removing dead spare child [" << NewChildren[i]->getPid() << "]."); NewChildren.erase(NewChildren.begin() + i); } } return static_cast(NewChildren.size()) != count; } /// Decides how many children need spawning and spanws. /// When force is true, no check of elapsed time since last request is done. /// Returns the number of children requested to spawn, /// -1 for error. static int rebalanceChildren(int balance) { Util::assertIsLocked(NewChildrenMutex); LOG_TRC("rebalance children to " << balance); // Do the cleanup first. const bool rebalance = cleanupChildren(); const auto duration = (std::chrono::steady_clock::now() - LastForkRequestTime); const auto durationMs = std::chrono::duration_cast(duration).count(); if (OutstandingForks != 0 && durationMs >= CHILD_TIMEOUT_MS) { // Children taking too long to spawn. // Forget we had requested any, and request anew. LOG_WRN("ForKit not responsive for " << durationMs << " ms forking " << OutstandingForks << " children. Resetting."); OutstandingForks = 0; } const auto available = NewChildren.size(); balance -= available; balance -= OutstandingForks; if (balance > 0 && (rebalance || OutstandingForks == 0)) { LOG_DBG("prespawnChildren: Have " << available << " spare " << (available == 1 ? "child" : "children") << ", and " << OutstandingForks << " outstanding, forking " << balance << " more."); return forkChildren(balance); } return 0; } /// Proactively spawn children processes /// to load documents with alacrity. /// Returns true only if at least one child was requested to spawn. static bool prespawnChildren() { // Rebalance if not forking already. std::unique_lock lock(NewChildrenMutex, std::defer_lock); return lock.try_lock() && (rebalanceChildren(LOOLWSD::NumPreSpawnedChildren) > 0); } static size_t addNewChild(const std::shared_ptr& child) { std::unique_lock lock(NewChildrenMutex); --OutstandingForks; // Prevent from going -ve if we have unexpected children. if (OutstandingForks < 0) ++OutstandingForks; NewChildren.emplace_back(child); const auto count = NewChildren.size(); LOG_INF("Have " << count << " spare " << (count == 1 ? "child" : "children") << " after adding [" << child->getPid() << "]."); lock.unlock(); NewChildrenCV.notify_one(); return count; } std::shared_ptr getNewChild_Blocks() { std::unique_lock lock(NewChildrenMutex); const auto startTime = std::chrono::steady_clock::now(); LOG_DBG("getNewChild: Rebalancing children."); int numPreSpawn = LOOLWSD::NumPreSpawnedChildren; ++numPreSpawn; // Replace the one we'll dispatch just now. if (rebalanceChildren(numPreSpawn) < 0) { LOG_DBG("getNewChild: rebalancing of children failed. Scheduling housekeeping to recover."); LOOLWSD::doHousekeeping(); // Let the caller retry after a while. return nullptr; } // With valgrind we need extended time to spawn kits. const size_t timeoutMs = CHILD_TIMEOUT_MS / 2; LOG_TRC("Waiting for a new child for a max of " << timeoutMs << " ms."); const auto timeout = std::chrono::milliseconds(timeoutMs); // FIXME: blocks ... // Unfortunately we need to wait after spawning children to avoid bombing the system. // If we fail fast and return, the next document will spawn more children without knowing // there are some on the way already. And if the system is slow already, that wouldn't help. if (NewChildrenCV.wait_for(lock, timeout, []() { return !NewChildren.empty(); })) { auto child = NewChildren.back(); NewChildren.pop_back(); const auto available = NewChildren.size(); // Validate before returning. if (child && child->isAlive()) { LOG_DBG("getNewChild: Have " << available << " spare " << (available == 1 ? "child" : "children") << " after poping [" << child->getPid() << "] to return in " << std::chrono::duration_cast(std::chrono::steady_clock::now() - startTime).count() << "ms."); return child; } LOG_WRN("getNewChild: popped dead child, need to find another."); } else { LOG_WRN("getNewChild: No child available. Sending spawn request to forkit and failing."); } LOG_DBG("getNewChild: Timed out while waiting for new child."); return nullptr; } /// Handles the filename part of the convert-to POST request payload. class ConvertToPartHandler : public PartHandler { std::string& _filename; /// Is it really a convert-to, ie. use an especially formed path? bool _convertTo; public: ConvertToPartHandler(std::string& filename, bool convertTo = false) : _filename(filename) , _convertTo(convertTo) { } virtual void handlePart(const MessageHeader& header, std::istream& stream) override { // Extract filename and put it to a temporary directory. std::string disp; NameValueCollection params; if (header.has("Content-Disposition")) { std::string cd = header.get("Content-Disposition"); MessageHeader::splitParameters(cd, disp, params); } if (!params.has("filename")) return; Path tempPath = _convertTo? Path::forDirectory(Poco::TemporaryFile::tempName("/tmp/convert-to") + "/") : Path::forDirectory(Poco::TemporaryFile::tempName() + "/"); File(tempPath).createDirectories(); // Prevent user inputting anything funny here. // A "filename" should always be a filename, not a path const Path filenameParam(params.get("filename")); tempPath.setFileName(filenameParam.getFileName()); _filename = tempPath.toString(); // Copy the stream to _filename. std::ofstream fileStream; fileStream.open(_filename); StreamCopier::copyStream(stream, fileStream); fileStream.close(); } }; namespace { inline std::string getLaunchBase(const std::string &credentials) { std::ostringstream oss; oss << " "; oss << ((LOOLWSD::isSSLEnabled() || LOOLWSD::isSSLTermination()) ? "https://" : "http://"); oss << credentials; oss << LOOLWSD_TEST_HOST ":"; oss << ClientPortNumber; return oss.str(); } inline std::string getLaunchURI() { const std::string aAbsTopSrcDir = Poco::Path(Application::instance().commandPath()).parent().toString(); std::ostringstream oss; oss << getLaunchBase(""); oss << LOOLWSD_TEST_LOLEAFLET_UI; oss << "?file_path=file://"; oss << Poco::Path(aAbsTopSrcDir).absolute().toString(); oss << LOOLWSD_TEST_DOCUMENT_RELATIVE_PATH; return oss.str(); } inline std::string getAdminURI(const Poco::Util::LayeredConfiguration &config) { std::string user = config.getString("admin_console.username", ""); std::string passwd = config.getString("admin_console.password", ""); if (user.empty() || passwd.empty()) return ""; std::ostringstream oss; oss << getLaunchBase(user + ":" + passwd + "@"); oss << LOOLWSD_TEST_ADMIN_CONSOLE; return oss.str(); } } // anonymous namespace std::atomic LOOLWSD::NextSessionId; #ifndef KIT_IN_PROCESS std::atomic LOOLWSD::ForKitWritePipe(-1); std::atomic LOOLWSD::ForKitProcId(-1); bool LOOLWSD::NoCapsForKit = false; #endif #ifdef FUZZER bool LOOLWSD::DummyLOK = false; std::string LOOLWSD::FuzzFileName; #endif std::string LOOLWSD::Cache = LOOLWSD_CACHEDIR; std::string LOOLWSD::SysTemplate; std::string LOOLWSD::LoTemplate; std::string LOOLWSD::ChildRoot; std::string LOOLWSD::ServerName; std::string LOOLWSD::FileServerRoot; std::string LOOLWSD::LOKitVersion; std::string LOOLWSD::ConfigFile = LOOLWSD_CONFIGDIR "/loolwsd.xml"; Util::RuntimeConstant LOOLWSD::SSLEnabled; Util::RuntimeConstant LOOLWSD::SSLTermination; std::set LOOLWSD::EditFileExtensions; unsigned LOOLWSD::MaxConnections; unsigned LOOLWSD::MaxDocuments; std::string LOOLWSD::OverrideWatermark; static std::string UnitTestLibrary; unsigned int LOOLWSD::NumPreSpawnedChildren = 0; std::atomic LOOLWSD::NumConnections; bool LOOLWSD::TileCachePersistent = true; std::unique_ptr LOOLWSD::TraceDumper; /// This thread polls basic web serving, and handling of /// websockets before upgrade: when upgraded they go to the /// relevant DocumentBroker poll instead. TerminatingPoll WebServerPoll("websrv_poll"); class PrisonerPoll : public TerminatingPoll { public: PrisonerPoll() : TerminatingPoll("prisoner_poll") {} /// Check prisoners are still alive and balanced. void wakeupHook() override; }; /// This thread listens for and accepts prisoner kit processes. /// And also cleans up and balances the correct number of childen. PrisonerPoll PrisonerPoll; /// Helper class to hold default configuration entries. class AppConfigMap final : public Poco::Util::MapConfiguration { public: AppConfigMap(const std::map& map) { for (const auto& pair : map) { setRaw(pair.first, pair.second); } } }; LOOLWSD::LOOLWSD() { } LOOLWSD::~LOOLWSD() { } void LOOLWSD::initialize(Application& self) { if (geteuid() == 0) { throw std::runtime_error("Do not run as root. Please run as lool user."); } if (!UnitWSD::init(UnitWSD::UnitType::Wsd, UnitTestLibrary)) { throw std::runtime_error("Failed to load wsd unit test library."); } auto& conf = config(); // Add default values of new entries here. static const std::map DefAppConfig = { { "tile_cache_path", LOOLWSD_CACHEDIR }, { "tile_cache_persistent", "true" }, { "sys_template_path", "systemplate" }, { "lo_template_path", LO_PATH }, { "child_root_path", "jails" }, { "lo_jail_subpath", "lo" }, { "server_name", "" }, { "file_server_root_path", "loleaflet/.." }, { "num_prespawn_children", "1" }, { "per_document.max_concurrency", "4" }, { "per_document.idle_timeout_secs", "3600" }, { "per_document.idlesave_duration_secs", "30" }, { "per_document.autosave_duration_secs", "300" }, { "per_document.limit_virt_mem_mb", "0" }, { "per_document.limit_stack_mem_kb", "8000" }, { "per_document.limit_file_size_mb", "0" }, { "per_document.limit_num_open_files", "0" }, { "per_view.out_of_focus_timeout_secs", "60" }, { "per_view.idle_timeout_secs", "900" }, { "loleaflet_html", "loleaflet.html" }, { "logging.color", "true" }, { "logging.level", "trace" }, { "loleaflet_logging", "false" }, { "ssl.enable", "true" }, { "ssl.termination", "true" }, { "ssl.cert_file_path", LOOLWSD_CONFIGDIR "/cert.pem" }, { "ssl.key_file_path", LOOLWSD_CONFIGDIR "/key.pem" }, { "ssl.ca_file_path", LOOLWSD_CONFIGDIR "/ca-chain.cert.pem" }, { "ssl.hpkp[@enable]", "false" }, { "ssl.hpkp[@report_only]", "false" }, { "ssl.hpkp.max_age[@enable]", "true" }, { "ssl.hpkp.report_uri[@enable]", "false" }, { "storage.filesystem[@allow]", "false" }, { "storage.wopi[@allow]", "true" }, { "storage.wopi.host[0][@allow]", "true" }, { "storage.wopi.host[0]", "localhost" }, { "storage.wopi.max_file_size", "0" }, { "storage.webdav[@allow]", "false" }, { "logging.file[@enable]", "false" }, { "logging.file.property[0][@name]", "path" }, { "logging.file.property[0]", "loolwsd.log" }, { "logging.file.property[1][@name]", "rotation" }, { "logging.file.property[1]", "never" }, { "logging.file.property[2][@name]", "compress" }, { "logging.file.property[2]", "true" }, { "logging.file.property[3][@name]", "flush" }, { "logging.file.property[3]", "false" }, { "trace[@enable]", "false" }, { "trace.path[@compress]", "true" }, { "trace.path[@snapshot]", "false" } }; // Set default values, in case they are missing from the config file. AutoPtr defConfig(new AppConfigMap(DefAppConfig)); conf.addWriteable(defConfig, PRIO_SYSTEM); // Lowest priority // Load default configuration files, if present. if (loadConfiguration(PRIO_DEFAULT) == 0) { // Fallback to the LOOLWSD_CONFIGDIR or --config-file path. loadConfiguration(ConfigFile, PRIO_DEFAULT); } // Override any settings passed on the command-line. AutoPtr overrideConfig(new AppConfigMap(_overrideSettings)); conf.addWriteable(overrideConfig, PRIO_APPLICATION); // Highest priority // Allow UT to manipulate before using configuration values. UnitWSD::get().configure(config()); const auto logLevel = getConfigValue(conf, "logging.level", "trace"); setenv("LOOL_LOGLEVEL", logLevel.c_str(), true); const auto withColor = getConfigValue(conf, "logging.color", true) && isatty(fileno(stderr)); if (withColor) { setenv("LOOL_LOGCOLOR", "1", true); } const auto logToFile = getConfigValue(conf, "logging.file[@enable]", false); std::map logProperties; for (size_t i = 0; ; ++i) { const std::string confPath = "logging.file.property[" + std::to_string(i) + "]"; const auto confName = config().getString(confPath + "[@name]", ""); if (!confName.empty()) { const auto value = config().getString(confPath, ""); logProperties.emplace(confName, value); } else if (!config().has(confPath)) { break; } } // Setup the logfile envar for the kit processes. if (logToFile) { setenv("LOOL_LOGFILE", "1", true); const auto it = logProperties.find("path"); if (it != logProperties.end()) { setenv("LOOL_LOGFILENAME", it->second.c_str(), true); #if ENABLE_DEBUG std::cerr << "\nFull log is available in: " << it->second.c_str() << std::endl; #endif } } Log::initialize("wsd", logLevel, withColor, logToFile, logProperties); #if ENABLE_SSL LOOLWSD::SSLEnabled.set(getConfigValue(conf, "ssl.enable", true)); #else LOOLWSD::SSLEnabled.set(false); #endif if (LOOLWSD::isSSLEnabled()) { LOG_INF("SSL support: SSL is enabled."); } else { LOG_WRN("SSL support: SSL is disabled."); } #if ENABLE_SSL LOOLWSD::SSLTermination.set(getConfigValue(conf, "ssl.termination", true)); #else LOOLWSD::SSLTermination.set(false); #endif Cache = getPathFromConfig("tile_cache_path"); SysTemplate = getPathFromConfig("sys_template_path"); LoTemplate = getPathFromConfig("lo_template_path"); ChildRoot = getPathFromConfig("child_root_path"); ServerName = config().getString("server_name"); FileServerRoot = getPathFromConfig("file_server_root_path"); NumPreSpawnedChildren = getConfigValue(conf, "num_prespawn_children", 1); if (NumPreSpawnedChildren < 1) { LOG_WRN("Invalid num_prespawn_children in config (" << NumPreSpawnedChildren << "). Resetting to 1."); NumPreSpawnedChildren = 1; } const auto maxConcurrency = getConfigValue(conf, "per_document.max_concurrency", 4); if (maxConcurrency > 0) { setenv("MAX_CONCURRENCY", std::to_string(maxConcurrency).c_str(), 1); } // Otherwise we profile the soft-device at jail creation time. setenv("SAL_DISABLE_OPENCL", "true", 1); // Log the connection and document limits. LOOLWSD::MaxConnections = MAX_CONNECTIONS; LOOLWSD::MaxDocuments = MAX_DOCUMENTS; #if ENABLE_SUPPORT_KEY const std::string supportKeyString = getConfigValue(conf, "support_key", ""); if (supportKeyString.empty()) { LOG_WRN("Support key not set, please use 'loolconfig set-support-key'."); std::cerr << "Support key not set, please use 'loolconfig set-support-key'." << std::endl; LOOLWSD::OverrideWatermark = "Unsupported, the support key is missing."; } else { SupportKey key(supportKeyString); if (!key.verify()) { LOG_WRN("Invalid support key, please use 'loolconfig set-support-key'."); std::cerr << "Invalid support key, please use 'loolconfig set-support-key'." << std::endl; LOOLWSD::OverrideWatermark = "Unsupported, the support key is invalid."; } else { int validDays = key.validDaysRemaining(); if (validDays <= 0) { LOG_WRN("Your support key has expired, please ask for a new one, and use 'loolconfig set-support-key'."); std::cerr << "Your support key has expired, please ask for a new one, and use 'loolconfig set-support-key'." << std::endl; LOOLWSD::OverrideWatermark = "Unsupported, the support key has expired."; } else { LOG_INF("Your support key is valid for " << validDays << " days"); LOOLWSD::MaxConnections = 1000; LOOLWSD::MaxDocuments = 200; LOOLWSD::OverrideWatermark = ""; } } } #endif if (LOOLWSD::MaxConnections < 3) { LOG_ERR("MAX_CONNECTIONS must be at least 3"); LOOLWSD::MaxConnections = 3; } if (LOOLWSD::MaxDocuments > LOOLWSD::MaxConnections) { LOG_ERR("MAX_DOCUMENTS cannot be bigger than MAX_CONNECTIONS"); LOOLWSD::MaxDocuments = LOOLWSD::MaxConnections; } LOG_INF("Maximum concurrent open Documents limit: " << LOOLWSD::MaxDocuments); LOG_INF("Maximum concurrent client Connections limit: " << LOOLWSD::MaxConnections); LOOLWSD::NumConnections = 0; TileCachePersistent = getConfigValue(conf, "tile_cache_persistent", true); // Command Tracing. if (getConfigValue(conf, "trace[@enable]", false)) { const auto& path = getConfigValue(conf, "trace.path", ""); const auto recordOutgoing = getConfigValue(conf, "trace.outgoing.record", false); std::vector filters; for (size_t i = 0; ; ++i) { const std::string confPath = "trace.filter.message[" + std::to_string(i) + "]"; const auto regex = config().getString(confPath, ""); if (!regex.empty()) { filters.push_back(regex); } else if (!config().has(confPath)) { break; } } const auto compress = getConfigValue(conf, "trace.path[@compress]", false); const auto takeSnapshot = getConfigValue(conf, "trace.path[@snapshot]", false); TraceDumper.reset(new TraceFileWriter(path, recordOutgoing, compress, takeSnapshot, filters)); } FileServerRequestHandler::initialize(); StorageBase::initialize(); ServerApplication::initialize(self); DocProcSettings docProcSettings; docProcSettings.LimitVirtMemMb = getConfigValue("per_document.limit_virt_mem_mb", 0); docProcSettings.LimitStackMemKb = getConfigValue("per_document.limit_stack_mem_kb", 0); docProcSettings.LimitFileSizeMb = getConfigValue("per_document.limit_file_size_mb", 0); docProcSettings.LimitNumberOpenFiles = getConfigValue("per_document.limit_num_open_files", 0); Admin::instance().setDefDocProcSettings(docProcSettings, false); #if ENABLE_DEBUG std::cerr << "\nLaunch this in your browser:\n\n" << getLaunchURI() << '\n' << std::endl; const std::string adminURI = getAdminURI(config()); if (!adminURI.empty()) std::cerr << "\nOr for the Admin Console:\n\n" << adminURI << '\n' << std::endl; #endif } void LOOLWSD::initializeSSL() { if (!LOOLWSD::isSSLEnabled()) return; const auto ssl_cert_file_path = getPathFromConfig("ssl.cert_file_path"); LOG_INF("SSL Cert file: " << ssl_cert_file_path); const auto ssl_key_file_path = getPathFromConfig("ssl.key_file_path"); LOG_INF("SSL Key file: " << ssl_key_file_path); const auto ssl_ca_file_path = getPathFromConfig("ssl.ca_file_path"); LOG_INF("SSL CA file: " << ssl_ca_file_path); #if ENABLE_SSL // Initialize the non-blocking socket SSL. SslContext::initialize(ssl_cert_file_path, ssl_key_file_path, ssl_ca_file_path); #endif } void LOOLWSD::dumpNewSessionTrace(const std::string& id, const std::string& sessionId, const std::string& uri, const std::string& path) { if (TraceDumper) { try { TraceDumper->newSession(id, sessionId, uri, path); } catch (const std::exception& exc) { LOG_WRN("Exception in tracer newSession: " << exc.what()); } } } void LOOLWSD::dumpEndSessionTrace(const std::string& id, const std::string& sessionId, const std::string& uri) { if (TraceDumper) { try { TraceDumper->endSession(id, sessionId, uri); } catch (const std::exception& exc) { LOG_WRN("Exception in tracer newSession: " << exc.what()); } } } void LOOLWSD::dumpEventTrace(const std::string& id, const std::string& sessionId, const std::string& data) { if (TraceDumper) { TraceDumper->writeEvent(id, sessionId, data); } } void LOOLWSD::dumpIncomingTrace(const std::string& id, const std::string& sessionId, const std::string& data) { if (TraceDumper) { TraceDumper->writeIncoming(id, sessionId, data); } } void LOOLWSD::dumpOutgoingTrace(const std::string& id, const std::string& sessionId, const std::string& data) { if (TraceDumper) { TraceDumper->writeOutgoing(id, sessionId, data); } } void LOOLWSD::defineOptions(OptionSet& optionSet) { ServerApplication::defineOptions(optionSet); optionSet.addOption(Option("help", "", "Display help information on command line arguments.") .required(false) .repeatable(false)); optionSet.addOption(Option("version", "", "Display version information.") .required(false) .repeatable(false)); optionSet.addOption(Option("port", "", "Port number to listen to (default: " + std::to_string(DEFAULT_CLIENT_PORT_NUMBER) + ")," " must not be " + std::to_string(MasterPortNumber) + ".") .required(false) .repeatable(false) .argument("port_number")); optionSet.addOption(Option("disable-ssl", "", "Disable SSL security layer.") .required(false) .repeatable(false)); optionSet.addOption(Option("override", "o", "Override any setting by providing fullxmlpath=value.") .required(false) .repeatable(true) .argument("xmlpath")); optionSet.addOption(Option("config-file", "", "Override configuration file path.") .required(false) .repeatable(false) .argument("path")); #if ENABLE_DEBUG optionSet.addOption(Option("unitlib", "", "Unit testing library path.") .required(false) .repeatable(false) .argument("unitlib")); optionSet.addOption(Option("nocaps", "", "Use a non-privileged forkit for valgrinding.") .required(false) .repeatable(false)); optionSet.addOption(Option("careerspan", "", "How many seconds to run.") .required(false) .repeatable(false) .argument("seconds")); #endif #ifdef FUZZER optionSet.addOption(Option("dummy-lok", "", "Use empty (dummy) LibreOfficeKit implementation instead a real LibreOffice.") .required(false) .repeatable(false)); optionSet.addOption(Option("fuzz", "", "Read input from the specified file for fuzzing.") .required(false) .repeatable(false) .argument("trace_file_name")); #endif } void LOOLWSD::handleOption(const std::string& optionName, const std::string& value) { ServerApplication::handleOption(optionName, value); if (optionName == "help") { displayHelp(); std::exit(Application::EXIT_OK); } else if (optionName == "version") DisplayVersion = true; else if (optionName == "port") ClientPortNumber = std::stoi(value); else if (optionName == "disable-ssl") _overrideSettings["ssl.enable"] = "false"; else if (optionName == "override") { std::string optName; std::string optValue; LOOLProtocol::parseNameValuePair(value, optName, optValue); _overrideSettings[optName] = optValue; } else if (optionName == "config-file") ConfigFile = value; #if ENABLE_DEBUG else if (optionName == "unitlib") UnitTestLibrary = value; #ifndef KIT_IN_PROCESS else if (optionName == "nocaps") NoCapsForKit = true; #endif else if (optionName == "careerspan") careerSpanMs = std::stoi(value) * 1000; // Convert second to ms static const char* clientPort = std::getenv("LOOL_TEST_CLIENT_PORT"); if (clientPort) ClientPortNumber = std::stoi(clientPort); static const char* masterPort = std::getenv("LOOL_TEST_MASTER_PORT"); if (masterPort) MasterPortNumber = std::stoi(masterPort); static const char* latencyMs = std::getenv("LOOL_DELAY_SOCKET_MS"); if (latencyMs) SimulatedLatencyMs = std::stoi(latencyMs); #endif #ifdef FUZZER if (optionName == "dummy-lok") DummyLOK = true; else if (optionName == "fuzz") FuzzFileName = value; #endif } void LOOLWSD::displayHelp() { HelpFormatter helpFormatter(options()); helpFormatter.setCommand(commandName()); helpFormatter.setUsage("OPTIONS"); helpFormatter.setHeader("LibreOffice Online WebSocket server."); helpFormatter.format(std::cout); } bool LOOLWSD::checkAndRestoreForKit() { #ifdef KIT_IN_PROCESS return false; #else if (ForKitProcId == -1) { // Fire the ForKit process for the first time. if (!ShutdownRequestFlag && !TerminationFlag && !createForKit()) { // Should never fail. LOG_FTL("Failed to spawn loolforkit."); SigUtil::requestShutdown(); } } int status; const pid_t pid = waitpid(ForKitProcId, &status, WUNTRACED | WNOHANG); if (pid > 0) { if (pid == ForKitProcId) { if (WIFEXITED(status) || WIFSIGNALED(status)) { if (WIFEXITED(status)) { LOG_INF("Forkit process [" << pid << "] exited with code: " << WEXITSTATUS(status) << "."); } else { LOG_ERR("Forkit process [" << pid << "] " << (WCOREDUMP(status) ? "core-dumped" : "died") << " with " << SigUtil::signalName(WTERMSIG(status))); } // Spawn a new forkit and try to dust it off and resume. if (!ShutdownRequestFlag && !TerminationFlag && !createForKit()) { LOG_FTL("Failed to spawn forkit instance. Shutting down."); SigUtil::requestShutdown(); } } else if (WIFSTOPPED(status)) { LOG_INF("Forkit process [" << pid << "] stopped with " << SigUtil::signalName(WSTOPSIG(status))); } else if (WIFCONTINUED(status)) { LOG_INF("Forkit process [" << pid << "] resumed with SIGCONT."); } else { LOG_WRN("Unknown status returned by waitpid: " << std::hex << status << "."); } return true; } else { LOG_ERR("An unknown child process [" << pid << "] died."); } } else if (pid < 0) { LOG_SYS("Forkit waitpid failed."); if (errno == ECHILD) { // No child processes. // Spawn a new forkit and try to dust it off and resume. if (!ShutdownRequestFlag && !TerminationFlag && !createForKit()) { LOG_FTL("Failed to spawn forkit instance. Shutting down."); SigUtil::requestShutdown(); } } return true; } return false; #endif } void LOOLWSD::doHousekeeping() { PrisonerPoll.wakeup(); } void LOOLWSD::closeDocument(const std::string& docKey, const std::string& message) { std::unique_lock docBrokersLock(DocBrokersMutex); auto docBrokerIt = DocBrokers.find(docKey); if (docBrokerIt != DocBrokers.end()) { std::shared_ptr docBroker = docBrokerIt->second; docBroker->addCallback([docBroker, message]() { docBroker->closeDocument(message); }); } } void LOOLWSD::autoSave(const std::string& docKey) { std::unique_lock docBrokersLock(DocBrokersMutex); auto docBrokerIt = DocBrokers.find(docKey); if (docBrokerIt != DocBrokers.end()) { std::shared_ptr docBroker = docBrokerIt->second; docBroker->addCallback([docBroker]() { docBroker->autoSave(true); }); } } /// Really do the house-keeping void PrisonerPoll::wakeupHook() { if (!LOOLWSD::checkAndRestoreForKit()) { // No children have died. // Make sure we have sufficient reserves. if (prespawnChildren()) { // Nothing more to do this round, unless we are fuzzing #if FUZZER if (!LOOLWSD::FuzzFileName.empty()) { std::unique_ptr replay(new Replay( #if ENABLE_SSL "https://127.0.0.1:" + std::to_string(ClientPortNumber), #else "http://127.0.0.1:" + std::to_string(ClientPortNumber), #endif LOOLWSD::FuzzFileName)); std::unique_ptr replayThread(new Thread()); replayThread->start(*replay); // block until the replay finishes replayThread->join(); TerminationFlag = true; } #endif } } std::unique_lock docBrokersLock(DocBrokersMutex, std::defer_lock); if (docBrokersLock.try_lock()) cleanupDocBrokers(); } bool LOOLWSD::createForKit() { #ifdef KIT_IN_PROCESS return true; #else LOG_INF("Creating new forkit process."); std::unique_lock newChildrenLock(NewChildrenMutex); Process::Args args; args.push_back("--losubpath=" + std::string(LO_JAIL_SUBPATH)); args.push_back("--systemplate=" + SysTemplate); args.push_back("--lotemplate=" + LoTemplate); args.push_back("--childroot=" + ChildRoot); args.push_back("--clientport=" + std::to_string(ClientPortNumber)); args.push_back("--masterport=" + std::to_string(MasterPortNumber)); const DocProcSettings& docProcSettings = Admin::instance().getDefDocProcSettings(); std::ostringstream ossRLimits; ossRLimits << "limit_virt_mem_mb:" << docProcSettings.LimitVirtMemMb; ossRLimits << ";limit_stack_mem_kb:" << docProcSettings.LimitStackMemKb; ossRLimits << ";limit_file_size_mb:" << docProcSettings.LimitFileSizeMb; ossRLimits << ";limit_num_open_files:" << docProcSettings.LimitNumberOpenFiles; args.push_back("--rlimits=" + ossRLimits.str()); if (UnitWSD::get().hasKitHooks()) { args.push_back("--unitlib=" + UnitTestLibrary); } if (DisplayVersion) { args.push_back("--version"); } std::string forKitPath = Path(Application::instance().commandPath()).parent().toString() + "loolforkit"; if (NoCapsForKit) { forKitPath = forKitPath + std::string("-nocaps"); args.push_back("--nocaps"); } // Always reap first, in case we haven't done so yet. if (ForKitProcId != -1) { int status; waitpid(ForKitProcId, &status, WUNTRACED | WNOHANG); ForKitProcId = -1; Admin::instance().setForKitPid(ForKitProcId); } if (ForKitWritePipe != -1) { close(ForKitWritePipe); ForKitWritePipe = -1; Admin::instance().setForKitWritePipe(ForKitWritePipe); } // ForKit always spawns one. ++OutstandingForks; LOG_INF("Launching forkit process: " << forKitPath << ' ' << Poco::cat(std::string(" "), args.begin(), args.end())); LastForkRequestTime = std::chrono::steady_clock::now(); Pipe inPipe; ProcessHandle child = Process::launch(forKitPath, args, &inPipe, nullptr, nullptr); // The Pipe dtor closes the fd, so dup it. ForKitWritePipe = dup(inPipe.writeHandle()); ForKitProcId = child.id(); LOG_INF("Forkit process launched: " << ForKitProcId); // Init the Admin manager Admin::instance().setForKitPid(ForKitProcId); Admin::instance().setForKitWritePipe(ForKitWritePipe); rebalanceChildren(LOOLWSD::NumPreSpawnedChildren - 1); return ForKitProcId != -1; #endif } #ifdef FUZZER std::mutex Connection::Mutex; #endif /// Find the DocumentBroker for the given docKey, if one exists. /// Otherwise, creates and adds a new one to DocBrokers. /// May return null if terminating or MaxDocuments limit is reached. /// After returning a valid instance DocBrokers must be cleaned up after exceptions. static std::shared_ptr findOrCreateDocBroker(WebSocketHandler& ws, const std::string& uri, const std::string& docKey, const std::string& id, const Poco::URI& uriPublic) { LOG_INF("Find or create DocBroker for docKey [" << docKey << "] for session [" << id << "] on url [" << uriPublic.toString() << "]."); std::unique_lock docBrokersLock(DocBrokersMutex); cleanupDocBrokers(); if (TerminationFlag) { LOG_ERR("Termination flag set. No loading new session [" << id << "]"); return nullptr; } std::shared_ptr docBroker; // Lookup this document. auto it = DocBrokers.find(docKey); if (it != DocBrokers.end() && it->second) { // Get the DocumentBroker from the Cache. LOG_DBG("Found DocumentBroker with docKey [" << docKey << "]."); docBroker = it->second; // Destroying the document? Let the client reconnect. if (docBroker->isMarkedToDestroy()) { LOG_WRN("DocBroker with docKey [" << docKey << "] that is marked to be destroyed. Rejecting client request."); ws.sendMessage("error: cmd=load kind=docunloading"); ws.shutdown(WebSocketHandler::StatusCodes::ENDPOINT_GOING_AWAY, "error: cmd=load kind=docunloading"); return nullptr; } } else { LOG_DBG("No DocumentBroker with docKey [" << docKey << "] found. New Child and Document."); } if (TerminationFlag) { LOG_ERR("Termination flag set. No loading new session [" << id << "]"); return nullptr; } // Indicate to the client that we're connecting to the docbroker. const std::string statusConnect = "statusindicator: connect"; LOG_TRC("Sending to Client [" << statusConnect << "]."); ws.sendMessage(statusConnect); if (!docBroker) { Util::assertIsLocked(DocBrokersMutex); if (DocBrokers.size() + 1 > LOOLWSD::MaxDocuments) { LOG_ERR("Maximum number of open documents of " << LOOLWSD::MaxDocuments << " reached."); shutdownLimitReached(ws); return nullptr; } // Set the one we just created. LOG_DBG("New DocumentBroker for docKey [" << docKey << "]."); docBroker = std::make_shared(uri, uriPublic, docKey, LOOLWSD::ChildRoot); DocBrokers.emplace(docKey, docBroker); LOG_TRC("Have " << DocBrokers.size() << " DocBrokers after inserting [" << docKey << "]."); } return docBroker; } static std::shared_ptr createNewClientSession(const WebSocketHandler* ws, const std::string& id, const Poco::URI& uriPublic, const std::shared_ptr& docBroker, const bool isReadOnly) { LOG_CHECK_RET(docBroker && "Null docBroker instance", nullptr); try { const std::string fs = FileUtil::checkDiskSpaceOnRegisteredFileSystems(); if (!fs.empty()) { LOG_WRN("File system of [" << fs << "] is dangerously low on disk space."); const std::string diskfullMsg = "error: cmd=internal kind=diskfull"; // Alert all other existing sessions also Util::alertAllUsers(diskfullMsg); } // Now we have a DocumentBroker and we're ready to process client commands. if (ws) { const std::string statusReady = "statusindicator: ready"; LOG_TRC("Sending to Client [" << statusReady << "]."); ws->sendMessage(statusReady); } // In case of WOPI, if this session is not set as readonly, it might be set so // later after making a call to WOPI host which tells us the permission on files // (UserCanWrite param). return std::make_shared(id, docBroker, uriPublic, isReadOnly); } catch (const std::exception& exc) { LOG_WRN("Exception while preparing session [" << id << "]: " << exc.what()); } return nullptr; } /// Handles the socket that the prisoner kit connected to WSD on. class PrisonerRequestDispatcher : public WebSocketHandler { std::weak_ptr _childProcess; public: PrisonerRequestDispatcher() { } ~PrisonerRequestDispatcher() { // Notify the broker that we're done. auto child = _childProcess.lock(); auto docBroker = child ? child->getDocumentBroker() : nullptr; if (docBroker) { // FIXME: No need to notify if asked to stop. docBroker->stop(); } } private: /// Keep our socket around ... void onConnect(const std::shared_ptr& socket) override { _socket = socket; LOG_TRC("#" << socket->getFD() << " Prisoner connected."); } void onDisconnect() override { auto socket = _socket.lock(); if (socket) LOG_TRC("#" << socket->getFD() << " Prisoner connection disconnected."); else LOG_WRN("Prisoner connection disconnected but without valid socket."); // Notify the broker that we're done. auto child = _childProcess.lock(); auto docBroker = child ? child->getDocumentBroker() : nullptr; if (docBroker) { auto lock = docBroker->getLock(); docBroker->assertCorrectThread(); docBroker->setCloseReason("docdisconnected"); docBroker->stop(); } } /// Called after successful socket reads. void handleIncomingMessage(SocketDisposition &disposition) override { if (UnitWSD::get().filterHandleRequest( UnitWSD::TestRequest::Prisoner, disposition, *this)) return; if (_childProcess.lock()) { // FIXME: inelegant etc. - derogate to websocket code WebSocketHandler::handleIncomingMessage(disposition); return; } auto socket = _socket.lock(); std::vector& in = socket->_inBuffer; // Find the end of the header, if any. static const std::string marker("\r\n\r\n"); auto itBody = std::search(in.begin(), in.end(), marker.begin(), marker.end()); if (itBody == in.end()) { LOG_TRC("#" << socket->getFD() << " doesn't have enough data yet."); return; } // Skip the marker. itBody += marker.size(); Poco::MemoryInputStream message(&in[0], in.size()); Poco::Net::HTTPRequest request; try { request.read(message); auto logger = Log::info(); if (logger.enabled()) { logger << "#" << socket->getFD() << ": Prisoner HTTP Request: " << request.getMethod() << ' ' << request.getURI() << ' ' << request.getVersion(); for (const auto& it : request) { logger << " / " << it.first << ": " << it.second; } LOG_END(logger); } LOG_TRC("Child connection with URI [" << request.getURI() << "]."); if (request.getURI().find(NEW_CHILD_URI) != 0) { LOG_ERR("Invalid incoming URI."); return; } // New Child is spawned. const auto params = Poco::URI(request.getURI()).getQueryParameters(); Poco::Process::PID pid = -1; std::string jailId; for (const auto& param : params) { if (param.first == "pid") { pid = std::stoi(param.second); } else if (param.first == "jailid") { jailId = param.second; } else if (param.first == "version") { LOOLWSD::LOKitVersion = param.second; } } if (pid <= 0) { LOG_ERR("Invalid PID in child URI [" << request.getURI() << "]."); return; } if (jailId.empty()) { LOG_ERR("Invalid JailId in child URI [" << request.getURI() << "]."); return; } in.clear(); LOG_INF("New child [" << pid << "], jailId: " << jailId << "."); UnitWSD::get().newChild(*this); auto child = std::make_shared(pid, jailId, socket, request); _childProcess = child; // weak // Remove from prisoner poll since there is no activity // until we attach the childProcess (with this socket) // to a docBroker, which will do the polling. disposition.setMove([child](const std::shared_ptr &){ addNewChild(child); }); } catch (const std::exception& exc) { // Probably don't have enough data just yet. // TODO: timeout if we never get enough. } } /// Prisoner websocket fun ... (for now) virtual void handleMessage(bool /*fin*/, WSOpCode /* code */, std::vector &data) override { if (UnitWSD::get().filterChildMessage(data)) return; const std::string abbr = getAbbreviatedMessage(data); auto socket = _socket.lock(); if (socket) LOG_TRC("#" << socket->getFD() << " Prisoner message [" << abbr << "]."); else LOG_WRN("Message handler called but without valid socket."); auto child = _childProcess.lock(); auto docBroker = child ? child->getDocumentBroker() : nullptr; if (docBroker) docBroker->handleInput(data); else LOG_WRN("Child " << child->getPid() << " has no DocumentBroker to handle message: [" << abbr << "]."); } int getPollEvents(std::chrono::steady_clock::time_point /* now */, int & /* timeoutMaxMs */) override { return POLLIN; } void performWrites() override { } }; /// Handles incoming connections and dispatches to the appropriate handler. class ClientRequestDispatcher : public SocketHandlerInterface { public: ClientRequestDispatcher() { } static void InitStaticFileContentCache() { StaticFileContentCache["discovery.xml"] = getDiscoveryXML(); } private: /// Set the socket associated with this ResponseClient. void onConnect(const std::shared_ptr& socket) override { _id = LOOLWSD::GenSessionId(); _socket = socket; LOG_TRC("#" << socket->getFD() << " Connected to ClientRequestDispatcher."); } /// Called after successful socket reads. void handleIncomingMessage(SocketDisposition &disposition) override { auto socket = _socket.lock(); std::vector& in = socket->_inBuffer; LOG_TRC("#" << socket->getFD() << " handling incoming " << in.size() << " bytes."); // Find the end of the header, if any. static const std::string marker("\r\n\r\n"); auto itBody = std::search(in.begin(), in.end(), marker.begin(), marker.end()); if (itBody == in.end()) { LOG_DBG("#" << socket->getFD() << " doesn't have enough data yet."); return; } // Skip the marker. itBody += marker.size(); Poco::MemoryInputStream message(&in[0], in.size()); Poco::Net::HTTPRequest request; try { request.read(message); auto logger = Log::info(); if (logger.enabled()) { logger << "#" << socket->getFD() << ": Client HTTP Request: " << request.getMethod() << ' ' << request.getURI() << ' ' << request.getVersion(); for (const auto& it : request) { logger << " / " << it.first << ": " << it.second; } LOG_END(logger); } const std::streamsize contentLength = request.getContentLength(); const auto offset = itBody - in.begin(); const std::streamsize available = in.size() - offset; if (contentLength != Poco::Net::HTTPMessage::UNKNOWN_CONTENT_LENGTH && available < contentLength) { LOG_DBG("Not enough content yet: ContentLength: " << contentLength << ", available: " << available); return; } } catch (const std::exception& exc) { // Probably don't have enough data just yet. // TODO: timeout if we never get enough. return; } try { // Routing Poco::URI requestUri(request.getURI()); std::vector reqPathSegs; requestUri.getPathSegments(reqPathSegs); if (UnitWSD::get().handleHttpRequest(request, socket)) { // Unit testing, nothing to do here } else if (reqPathSegs.size() >= 1 && reqPathSegs[0] == "loleaflet") { // File server handleFileServerRequest(request, message); } else if (reqPathSegs.size() >= 2 && reqPathSegs[0] == "lool" && reqPathSegs[1] == "adminws") { // Admin connections LOG_INF("Admin request: " << request.getURI()); if (AdminSocketHandler::handleInitialRequest(_socket, request)) { disposition.setMove([](const std::shared_ptr &moveSocket){ // Hand the socket over to the Admin poll. Admin::instance().insertNewSocket(moveSocket); }); } } // Client post and websocket connections else if ((request.getMethod() == HTTPRequest::HTTP_GET || request.getMethod() == HTTPRequest::HTTP_HEAD) && request.getURI() == "/") { handleRootRequest(request); } else if (request.getMethod() == HTTPRequest::HTTP_GET && request.getURI() == "/favicon.ico") { handleFaviconRequest(request); } else if (request.getMethod() == HTTPRequest::HTTP_GET && request.getURI() == "/hosting/discovery") { handleWopiDiscoveryRequest(request); } else { StringTokenizer reqPathTokens(request.getURI(), "/?", StringTokenizer::TOK_IGNORE_EMPTY | StringTokenizer::TOK_TRIM); if (!(request.find("Upgrade") != request.end() && Poco::icompare(request["Upgrade"], "websocket") == 0) && reqPathTokens.count() > 0 && reqPathTokens[0] == "lool") { // All post requests have url prefix 'lool'. handlePostRequest(request, message, disposition); } else if (reqPathTokens.count() > 2 && reqPathTokens[0] == "lool" && reqPathTokens[2] == "ws" && request.find("Upgrade") != request.end() && Poco::icompare(request["Upgrade"], "websocket") == 0) { handleClientWsUpgrade(request, reqPathTokens[1], disposition); } else { LOG_ERR("Unknown resource: " << request.getURI()); // Bad request. std::ostringstream oss; oss << "HTTP/1.1 400\r\n" << "Date: " << Poco::DateTimeFormatter::format(Poco::Timestamp(), Poco::DateTimeFormat::HTTP_FORMAT) << "\r\n" << "User-Agent: " << WOPI_AGENT_STRING << "\r\n" << "Content-Length: 0\r\n" << "\r\n"; socket->send(oss.str()); socket->shutdown(); } } } catch (const std::exception& exc) { // Bad request. std::ostringstream oss; oss << "HTTP/1.1 400\r\n" << "Date: " << Poco::DateTimeFormatter::format(Poco::Timestamp(), Poco::DateTimeFormat::HTTP_FORMAT) << "\r\n" << "User-Agent: LOOLWSD WOPI Agent\r\n" << "Content-Length: 0\r\n" << "\r\n"; socket->send(oss.str()); socket->shutdown(); // NOTE: Check _wsState to choose between HTTP response or WebSocket (app-level) error. LOG_INF("#" << socket->getFD() << " Exception while processing incoming request: [" << LOOLProtocol::getAbbreviatedMessage(in) << "]: " << exc.what()); } // if we succeeded - remove the request from our input buffer // we expect one request per socket in.erase(in.begin(), itBody); } int getPollEvents(std::chrono::steady_clock::time_point /* now */, int & /* timeoutMaxMs */) override { return POLLIN; } void performWrites() override { } void handleFileServerRequest(const Poco::Net::HTTPRequest& request, Poco::MemoryInputStream& message) { auto socket = _socket.lock(); FileServerRequestHandler::handleRequest(request, message, socket); socket->shutdown(); } void handleRootRequest(const Poco::Net::HTTPRequest& request) { LOG_DBG("HTTP request: " << request.getURI()); const std::string mimeType = "text/plain"; const std::string responseString = "OK"; std::ostringstream oss; oss << "HTTP/1.1 200 OK\r\n" << "Last-Modified: " << Poco::DateTimeFormatter::format(Poco::Timestamp(), Poco::DateTimeFormat::HTTP_FORMAT) << "\r\n" << "User-Agent: " << WOPI_AGENT_STRING << "\r\n" << "Content-Length: " << responseString.size() << "\r\n" << "Content-Type: " << mimeType << "\r\n" << "\r\n"; if (request.getMethod() == Poco::Net::HTTPRequest::HTTP_GET) { oss << responseString; } auto socket = _socket.lock(); socket->send(oss.str()); socket->shutdown(); LOG_INF("Sent / response successfully."); } void handleFaviconRequest(const Poco::Net::HTTPRequest& request) { LOG_DBG("Favicon request: " << request.getURI()); std::string mimeType = "image/vnd.microsoft.icon"; std::string faviconPath = Path(Application::instance().commandPath()).parent().toString() + "favicon.ico"; if (!File(faviconPath).exists()) { faviconPath = LOOLWSD::FileServerRoot + "/favicon.ico"; } auto socket = _socket.lock(); Poco::Net::HTTPResponse response; HttpHelper::sendFile(socket, faviconPath, mimeType, response); socket->shutdown(); } void handleWopiDiscoveryRequest(const Poco::Net::HTTPRequest& request) { LOG_DBG("Wopi discovery request: " << request.getURI()); std::string xml = getFileContent("discovery.xml"); const std::string hostname = (LOOLWSD::ServerName.empty() ? request.getHost() : LOOLWSD::ServerName); Poco::replaceInPlace(xml, std::string("%SERVER_HOST%"), hostname); // TODO: Refactor this to some common handler. std::ostringstream oss; oss << "HTTP/1.1 200 OK\r\n" << "Last-Modified: " << Poco::DateTimeFormatter::format(Poco::Timestamp(), Poco::DateTimeFormat::HTTP_FORMAT) << "\r\n" << "User-Agent: " << WOPI_AGENT_STRING << "\r\n" << "Content-Length: " << xml.size() << "\r\n" << "Content-Type: text/xml\r\n" << "X-Content-Type-Options: nosniff\r\n" << "\r\n" << xml; auto socket = _socket.lock(); socket->send(oss.str()); socket->shutdown(); LOG_INF("Sent discovery.xml successfully."); } static std::string getContentType(const std::string& fileName) { const std::string nodePath = Poco::format("//[@ext='%s']", Poco::Path(fileName).getExtension()); std::string discPath = Path(Application::instance().commandPath()).parent().toString() + "discovery.xml"; if (!File(discPath).exists()) { discPath = LOOLWSD::FileServerRoot + "/discovery.xml"; } InputSource input(discPath); DOMParser domParser; AutoPtr doc = domParser.parse(&input); if (doc) { Node* node = doc->getNodeByPath(nodePath); if (node && node->parentNode()) { Element* elem = dynamic_cast(node->parentNode()); if (elem && elem->hasAttributes()) return elem->getAttribute("name"); } } return "application/octet-stream"; } void handlePostRequest(const Poco::Net::HTTPRequest& request, Poco::MemoryInputStream& message, SocketDisposition &disposition) { LOG_INF("Post request: [" << request.getURI() << "]"); Poco::Net::HTTPResponse response; auto socket = _socket.lock(); StringTokenizer tokens(request.getURI(), "/?"); if (tokens.count() > 2 && tokens[2] == "convert-to") { std::string fromPath; ConvertToPartHandler handler(fromPath, /*convertTo =*/ true); HTMLForm form(request, message, handler); std::string format = (form.has("format") ? form.get("format") : ""); // prefer what is in the URI if (tokens.count() > 3) format = tokens[3]; bool sent = false; if (!fromPath.empty()) { if (!format.empty()) { LOG_INF("Conversion request for URI [" << fromPath << "]."); auto uriPublic = DocumentBroker::sanitizeURI(fromPath); const auto docKey = DocumentBroker::getDocKey(uriPublic); // This lock could become a bottleneck. // In that case, we can use a pool and index by publicPath. std::unique_lock docBrokersLock(DocBrokersMutex); LOG_DBG("New DocumentBroker for docKey [" << docKey << "]."); auto docBroker = std::make_shared(fromPath, uriPublic, docKey, LOOLWSD::ChildRoot); cleanupDocBrokers(); LOG_DBG("New DocumentBroker for docKey [" << docKey << "]."); DocBrokers.emplace(docKey, docBroker); LOG_TRC("Have " << DocBrokers.size() << " DocBrokers after inserting [" << docKey << "]."); // Load the document. // TODO: Move to DocumentBroker. const bool isReadOnly = true; auto clientSession = createNewClientSession(nullptr, _id, uriPublic, docBroker, isReadOnly); if (clientSession) { disposition.setMove([docBroker, clientSession, format] (const std::shared_ptr &moveSocket) { // Perform all of this after removing the socket // Make sure the thread is running before adding callback. docBroker->startThread(); // We no longer own this socket. moveSocket->setThreadOwner(std::thread::id(0)); docBroker->addCallback([docBroker, moveSocket, clientSession, format]() { auto streamSocket = std::static_pointer_cast(moveSocket); clientSession->setSaveAsSocket(streamSocket); // Move the socket into DocBroker. docBroker->addSocketToPoll(moveSocket); // First add and load the session. docBroker->addSession(clientSession); // Load the document manually and request saving in the target format. std::string encodedFrom; URI::encode(docBroker->getPublicUri().getPath(), "", encodedFrom); const std::string load = "load url=" + encodedFrom; std::vector loadRequest(load.begin(), load.end()); clientSession->handleMessage(true, WebSocketHandler::WSOpCode::Text, loadRequest); // FIXME: Check for security violations. Path toPath(docBroker->getPublicUri().getPath()); toPath.setExtension(format); const std::string toJailURL = "file://" + std::string(JAILED_DOCUMENT_ROOT) + toPath.getFileName(); std::string encodedTo; URI::encode(toJailURL, "", encodedTo); // Convert it to the requested format. const auto saveas = "saveas url=" + encodedTo + " format=" + format + " options="; std::vector saveasRequest(saveas.begin(), saveas.end()); clientSession->handleMessage(true, WebSocketHandler::WSOpCode::Text, saveasRequest); }); }); sent = true; } else LOG_WRN("Failed to create Client Session with id [" << _id << "] on docKey [" << docKey << "]."); } } if (!sent) { // TODO: We should differentiate between bad request and failed conversion. throw BadRequestException("Failed to convert and send file."); } return; } else if (tokens.count() >= 4 && tokens[3] == "insertfile") { LOG_INF("Insert file request."); std::string tmpPath; ConvertToPartHandler handler(tmpPath); HTMLForm form(request, message, handler); if (form.has("childid") && form.has("name")) { const std::string formChildid(form.get("childid")); const std::string formName(form.get("name")); // Validate the docKey std::unique_lock docBrokersLock(DocBrokersMutex); std::string decodedUri; URI::decode(tokens[2], decodedUri); const auto docKey = DocumentBroker::getDocKey(DocumentBroker::sanitizeURI(decodedUri)); auto docBrokerIt = DocBrokers.find(docKey); // Maybe just free the client from sending childid in form ? if (docBrokerIt == DocBrokers.end() || docBrokerIt->second->getJailId() != formChildid) { throw BadRequestException("DocKey [" + docKey + "] or childid [" + formChildid + "] is invalid."); } docBrokersLock.unlock(); // protect against attempts to inject something funny here if (formChildid.find('/') == std::string::npos && formName.find('/') == std::string::npos) { LOG_INF("Perform insertfile: " << formChildid << ", " << formName); const std::string dirPath = LOOLWSD::ChildRoot + formChildid + JAILED_DOCUMENT_ROOT + "insertfile"; File(dirPath).createDirectories(); std::string fileName = dirPath + "/" + form.get("name"); File(tmpPath).moveTo(fileName); response.setContentLength(0); socket->send(response); return; } } } else if (tokens.count() >= 6) { LOG_INF("File download request."); // TODO: Check that the user in question has access to this file! // 1. Validate the dockey std::string decodedUri; URI::decode(tokens[2], decodedUri); const auto docKey = DocumentBroker::getDocKey(DocumentBroker::sanitizeURI(decodedUri)); std::unique_lock docBrokersLock(DocBrokersMutex); auto docBrokerIt = DocBrokers.find(docKey); if (docBrokerIt == DocBrokers.end()) { throw BadRequestException("DocKey [" + docKey + "] is invalid."); } // 2. Cross-check if received child id is correct if (docBrokerIt->second->getJailId() != tokens[3]) { throw BadRequestException("ChildId does not correspond to docKey"); } // 3. Don't let user download the file in main doc directory containing // the document being edited otherwise we will end up deleting main directory // after download finishes if (docBrokerIt->second->getJailId() == tokens[4]) { throw BadRequestException("RandomDir cannot be equal to ChildId"); } docBrokersLock.unlock(); std::string fileName; bool responded = false; URI::decode(tokens[5], fileName); const Path filePath(LOOLWSD::ChildRoot + tokens[3] + JAILED_DOCUMENT_ROOT + tokens[4] + "/" + fileName); LOG_INF("HTTP request for: " << filePath.toString()); if (filePath.isAbsolute() && File(filePath).exists()) { // Instruct browsers to download the file, not display it // with the exception of SVG where we need the browser to // actually show it. std::string contentType = getContentType(fileName); if (contentType != "image/svg+xml") response.set("Content-Disposition", "attachment; filename=\"" + fileName + "\""); try { HttpHelper::sendFile(socket, filePath.toString(), contentType, response); responded = true; } catch (const Exception& exc) { LOG_ERR("Error sending file to client: " << exc.displayText() << (exc.nested() ? " (" + exc.nested()->displayText() + ")" : "")); } FileUtil::removeFile(File(filePath.parent()).path(), true); } else { LOG_ERR("Download file [" << filePath.toString() << "] not found."); } (void)responded; return; } throw BadRequestException("Invalid or unknown request."); } void handleClientWsUpgrade(const Poco::Net::HTTPRequest& request, const std::string& url, SocketDisposition &disposition) { auto socket = _socket.lock(); if (!socket) { LOG_WRN("No socket to handle client WS upgrade for request: " << request.getURI() << ", url: " << url); return; } LOG_INF("Client WS request: " << request.getURI() << ", url: " << url << ", socket #" << socket->getFD()); // First Upgrade. WebSocketHandler ws(_socket, request); // Response to clients beyond this point is done via WebSocket. try { if (LOOLWSD::NumConnections >= LOOLWSD::MaxConnections) { LOG_ERR("Limit on maximum number of connections of " << LOOLWSD::MaxConnections << " reached."); shutdownLimitReached(ws); return; } LOG_INF("Starting GET request handler for session [" << _id << "] on url [" << url << "]."); // Indicate to the client that document broker is searching. const std::string status("statusindicator: find"); LOG_TRC("Sending to Client [" << status << "]."); ws.sendMessage(status); const auto uriPublic = DocumentBroker::sanitizeURI(url); const auto docKey = DocumentBroker::getDocKey(uriPublic); LOG_INF("Sanitized URI [" << url << "] to [" << uriPublic.toString() << "] and mapped to docKey [" << docKey << "] for session [" << _id << "]."); // Check if readonly session is required bool isReadOnly = false; for (const auto& param : uriPublic.getQueryParameters()) { LOG_DBG("Query param: " << param.first << ", value: " << param.second); if (param.first == "permission" && param.second == "readonly") { isReadOnly = true; } } LOG_INF("URL [" << url << "] is " << (isReadOnly ? "readonly" : "writable") << "."); // Request a kit process for this doc. auto docBroker = findOrCreateDocBroker(ws, url, docKey, _id, uriPublic); if (docBroker) { auto clientSession = createNewClientSession(&ws, _id, uriPublic, docBroker, isReadOnly); if (clientSession) { // Transfer the client socket to the DocumentBroker when we get back to the poll: disposition.setMove([docBroker, clientSession] (const std::shared_ptr &moveSocket) { // Make sure the thread is running before adding callback. docBroker->startThread(); // We no longer own this socket. moveSocket->setThreadOwner(std::thread::id(0)); docBroker->addCallback([docBroker, moveSocket, clientSession]() { try { auto streamSocket = std::static_pointer_cast(moveSocket); // Set the ClientSession to handle Socket events. streamSocket->setHandler(clientSession); LOG_DBG("Socket #" << moveSocket->getFD() << " handler is " << clientSession->getName()); // Move the socket into DocBroker. docBroker->addSocketToPoll(moveSocket); // Add and load the session. docBroker->addSession(clientSession); } catch (const UnauthorizedRequestException& exc) { LOG_ERR("Unauthorized Request while loading session for " << docBroker->getDocKey() << ": " << exc.what()); const std::string msg = "error: cmd=internal kind=unauthorized"; clientSession->sendMessage(msg); } catch (const StorageConnectionException& exc) { // Alert user about failed load const std::string msg = "error: cmd=storage kind=loadfailed"; clientSession->sendMessage(msg); } catch (const std::exception& exc) { LOG_ERR("Error while loading : " << exc.what()); } }); }); } else { LOG_WRN("Failed to create Client Session with id [" << _id << "] on docKey [" << docKey << "]."); cleanupDocBrokers(); } } else { throw ServiceUnavailableException("Failed to create DocBroker with docKey [" + docKey + "]."); } } catch (const std::exception& exc) { LOG_ERR("Error while handling Client WS Request: " << exc.what()); const std::string msg = "error: cmd=internal kind=load"; ws.sendMessage(msg); ws.shutdown(WebSocketHandler::StatusCodes::ENDPOINT_GOING_AWAY, msg); } } /// Lookup cached file content. const std::string& getFileContent(const std::string& filename) { const auto it = StaticFileContentCache.find(filename); if (it == StaticFileContentCache.end()) { throw Poco::FileAccessDeniedException("Invalid or forbidden file path: [" + filename + "]."); } return it->second; } /// Process the discovery.xml file and return as string. static std::string getDiscoveryXML() { // http://server/hosting/discovery std::string discoveryPath = Path(Application::instance().commandPath()).parent().toString() + "discovery.xml"; if (!File(discoveryPath).exists()) { discoveryPath = LOOLWSD::FileServerRoot + "/discovery.xml"; } const std::string action = "action"; const std::string urlsrc = "urlsrc"; const auto& config = Application::instance().config(); const std::string loleafletHtml = config.getString("loleaflet_html", "loleaflet.html"); const std::string uriValue = ((LOOLWSD::isSSLEnabled() || LOOLWSD::isSSLTermination()) ? "https://" : "http://") + std::string("%SERVER_HOST%") + "/loleaflet/" LOOLWSD_VERSION_HASH "/" + loleafletHtml + '?'; InputSource inputSrc(discoveryPath); DOMParser parser; AutoPtr docXML = parser.parse(&inputSrc); AutoPtr listNodes = docXML->getElementsByTagName(action); for (unsigned long it = 0; it < listNodes->length(); ++it) { Element* elem = static_cast(listNodes->item(it)); elem->setAttribute(urlsrc, uriValue); // Set the View extensions cache as well. if (elem->getAttribute("name") == "edit") LOOLWSD::EditFileExtensions.insert(elem->getAttribute("ext")); } std::ostringstream ostrXML; DOMWriter writer; writer.writeNode(ostrXML, docXML); return ostrXML.str(); } private: // The socket that owns us (we can't own it). std::weak_ptr _socket; std::string _id; /// Cache for static files, to avoid reading and processing from disk. static std::map StaticFileContentCache; }; std::map ClientRequestDispatcher::StaticFileContentCache; class PlainSocketFactory final : public SocketFactory { std::shared_ptr create(const int physicalFd) override { int fd = physicalFd; if (SimulatedLatencyMs > 0) fd = Delay::create(SimulatedLatencyMs, physicalFd); std::shared_ptr socket = StreamSocket::create( fd, std::unique_ptr{ new ClientRequestDispatcher }); return socket; } }; #if ENABLE_SSL class SslSocketFactory final : public SocketFactory { std::shared_ptr create(const int physicalFd) override { int fd = physicalFd; if (SimulatedLatencyMs > 0) fd = Delay::create(SimulatedLatencyMs, physicalFd); return StreamSocket::create(fd, std::unique_ptr{ new ClientRequestDispatcher }); } }; #endif class PrisonerSocketFactory final : public SocketFactory { std::shared_ptr create(const int fd) override { // No local delay. return StreamSocket::create(fd, std::unique_ptr{ new PrisonerRequestDispatcher }); } }; /// The main server thread. /// /// Waits for the connections from the loleaflets, and creates the /// websockethandlers accordingly. class LOOLWSDServer { LOOLWSDServer(LOOLWSDServer&& other) = delete; const LOOLWSDServer& operator=(LOOLWSDServer&& other) = delete; public: LOOLWSDServer() : _acceptPoll("accept_poll") { } ~LOOLWSDServer() { stop(); } void startPrisoners(int& port) { PrisonerPoll.startThread(); PrisonerPoll.insertNewSocket(findPrisonerServerPort(port)); } void stopPrisoners() { PrisonerPoll.joinThread(); } void start(const int port) { _acceptPoll.startThread(); _acceptPoll.insertNewSocket(findServerPort(port)); WebServerPoll.startThread(); Admin::instance().start(); } void stop() { _acceptPoll.joinThread(); WebServerPoll.joinThread(); } void dumpState(std::ostream& os) { // FIXME: add some stop-world magic before doing the dump(?) Socket::InhibitThreadChecks = true; SocketPoll::InhibitThreadChecks = true; os << "LOOLWSDServer:\n" << " Ports: server " << ClientPortNumber << " prisoner " << MasterPortNumber << "\n" << " SSL: " << (LOOLWSD::isSSLEnabled() ? "https" : "http") << "\n" << " SSL-Termination: " << (LOOLWSD::isSSLTermination() ? "yes" : "no") << "\n" << " TerminationFlag: " << TerminationFlag << "\n" << " isShuttingDown: " << ShutdownRequestFlag << "\n" << " NewChildren: " << NewChildren.size() << "\n" << " OutstandingForks: " << OutstandingForks << "\n" << " NumPreSpawnedChildren: " << LOOLWSD::NumPreSpawnedChildren << "\n"; os << "Server poll:\n"; _acceptPoll.dumpState(os); os << "Web Server poll:\n"; WebServerPoll.dumpState(os); os << "Prisoner poll:\n"; PrisonerPoll.dumpState(os); os << "Admin poll:\n"; Admin::instance().dumpState(os); // If we have any delaying work going on. Delay::dumpState(os); os << "Document Broker polls " << "[ " << DocBrokers.size() << " ]:\n"; for (auto &i : DocBrokers) i.second->dumpState(os); Socket::InhibitThreadChecks = false; SocketPoll::InhibitThreadChecks = false; } private: class AcceptPoll : public TerminatingPoll { public: AcceptPoll(const std::string &threadName) : TerminatingPoll(threadName) {} void wakeupHook() override { if (DumpGlobalState) { dump_state(); DumpGlobalState = false; } } }; /// This thread & poll accepts incoming connections. AcceptPoll _acceptPoll; /// Create a new server socket - accepted sockets will be added /// to the @clientSockets' poll when created with @factory. std::shared_ptr getServerSocket(const Poco::Net::SocketAddress& addr, SocketPoll &clientSocket, std::shared_ptr factory) { std::shared_ptr serverSocket = std::make_shared(clientSocket, factory); if (!serverSocket->bind(addr)) { LOG_SYS("Failed to bind to: " << addr.toString()); return nullptr; } if (serverSocket->listen()) return serverSocket; LOG_SYS("Failed to listen on: " << addr.toString()); return nullptr; } std::shared_ptr findPrisonerServerPort(int& port) { std::shared_ptr factory = std::make_shared(); LOG_INF("Trying to listen on prisoner port " << port << "."); std::shared_ptr socket = getServerSocket(SocketAddress("127.0.0.1", port), PrisonerPoll, factory); // If we fail, try the next 100 ports. for (int i = 0; i < 100 && !socket; ++i) { ++port; LOG_INF("Prisoner port " << (port - 1) << " is busy, trying " << port << "."); socket = getServerSocket(SocketAddress("127.0.0.1", port), PrisonerPoll, factory); } if (!UnitWSD::isUnitTesting() && !socket) { LOG_FTL("Failed to listen on Prisoner port (" << MasterPortNumber << '-' << port << "). Exiting."); _exit(Application::EXIT_SOFTWARE); } LOG_INF("Listening to prisoner connections on port " << port); return socket; } std::shared_ptr findServerPort(int port) { LOG_INF("Trying to listen on client port " << port << "."); std::shared_ptr factory; #if ENABLE_SSL if (LOOLWSD::isSSLEnabled()) factory = std::make_shared(); else #endif factory = std::make_shared(); std::shared_ptr socket = getServerSocket(SocketAddress(port), WebServerPoll, factory); while (!socket) { ++port; LOG_INF("Client port " << (port - 1) << " is busy, trying " << port << "."); socket = getServerSocket(SocketAddress(port), WebServerPoll, factory); } LOG_INF("Listening to client connections on port " << port); return socket; } }; LOOLWSDServer srv; bool LOOLWSD::handleShutdownRequest() { if (ShutdownRequestFlag) { LOG_INF("Shutdown requested. Initiating WSD shutdown."); Util::alertAllUsers("close: shuttingdown"); ShutdownFlag = true; return true; } return false; } int LOOLWSD::innerMain() { #ifndef FUZZER SigUtil::setUserSignals(); SigUtil::setFatalSignals(); SigUtil::setTerminationSignals(); #endif // down-pay all the forkit linking cost once & early. Environment::set("LD_BIND_NOW", "1"); if (DisplayVersion) { std::string version, hash; Util::getVersionInfo(version, hash); LOG_INF("Loolwsd version details: " << version << " - " << hash); } initializeSSL(); char* locale = setlocale(LC_ALL, nullptr); if (locale == nullptr || std::strcmp(locale, "C") == 0) { setlocale(LC_ALL, "en_US.utf8"); } if (access(Cache.c_str(), R_OK | W_OK | X_OK) != 0) { const auto err = "Unable to access cache [" + Cache + "] please make sure it exists, and has write permission for this user."; LOG_SFL( err ); std::cerr << "FATAL: " << err << std::endl; return Application::EXIT_SOFTWARE; } // We use the same option set for both parent and child loolwsd, // so must check options required in the parent (but not in the // child) separately now. Also check for options that are // meaningless for the parent. if (SysTemplate.empty()) { LOG_FTL("Missing --systemplate option"); throw MissingOptionException("systemplate"); } if (LoTemplate.empty()) { LOG_FTL("Missing --lotemplate option"); throw MissingOptionException("lotemplate"); } if (ChildRoot.empty()) { LOG_FTL("Missing --childroot option"); throw MissingOptionException("childroot"); } else if (ChildRoot[ChildRoot.size() - 1] != '/') ChildRoot += '/'; FileUtil::registerFileSystemForDiskSpaceChecks(ChildRoot); FileUtil::registerFileSystemForDiskSpaceChecks(Cache + "/."); if (FileServerRoot.empty()) FileServerRoot = Poco::Path(Application::instance().commandPath()).parent().toString(); FileServerRoot = Poco::Path(FileServerRoot).absolute().toString(); LOG_DBG("FileServerRoot: " << FileServerRoot); if (ClientPortNumber == MasterPortNumber) throw IncompatibleOptionsException("port"); ClientRequestDispatcher::InitStaticFileContentCache(); // Start the internal prisoner server and spawn forkit, // which in turn forks first child. srv.startPrisoners(MasterPortNumber); #ifndef KIT_IN_PROCESS { // Make sure we have at least one child before moving forward. std::unique_lock lock(NewChildrenMutex); // If we are debugging, it's not uncommon to wait for several minutes before first // child is born. Don't use an expiry timeout in that case. const bool debugging = std::getenv("SLEEPFORDEBUGGER") || std::getenv("SLEEPKITFORDEBUGGER"); if (debugging) { LOG_DBG("Waiting for new child without timeout."); NewChildrenCV.wait(lock, []() { return !NewChildren.empty(); }); } else { const auto timeoutMs = CHILD_TIMEOUT_MS * (LOOLWSD::NoCapsForKit ? 150 : 10); const auto timeout = std::chrono::milliseconds(timeoutMs); LOG_TRC("Waiting for a new child for a max of " << timeoutMs << " ms."); if (!NewChildrenCV.wait_for(lock, timeout, []() { return !NewChildren.empty(); })) { const auto msg = "Failed to fork child processes."; LOG_FTL(msg); std::cerr << "FATAL: " << msg << std::endl; throw std::runtime_error(msg); } } // Check we have at least one. LOG_TRC("Have " << NewChildren.size() << " new children."); assert(NewChildren.size() > 0); } #endif // Start the server. srv.start(ClientPortNumber); /// The main-poll does next to nothing: SocketPoll mainWait("main"); #if ENABLE_DEBUG std::cerr << "Ready to accept connections.\n" << std::endl; #endif const auto startStamp = std::chrono::steady_clock::now(); while (!TerminationFlag && !ShutdownRequestFlag) { UnitWSD::get().invokeTest(); // This timeout affects the recovery time of prespawned children. const int msWait = UnitWSD::isUnitTesting() ? UnitWSD::get().getTimeoutMilliSeconds() / 4 : SocketPoll::DefaultPollTimeoutMs * 4; mainWait.poll(msWait); // Wake the prisoner poll to spawn some children, if necessary. PrisonerPoll.wakeup(); const auto timeSinceStartMs = std::chrono::duration_cast( std::chrono::steady_clock::now() - startStamp).count(); // Unit test timeout if (timeSinceStartMs > UnitWSD::get().getTimeoutMilliSeconds()) UnitWSD::get().timeout(); #if ENABLE_DEBUG if (careerSpanMs > 0 && timeSinceStartMs > careerSpanMs) { LOG_INF(timeSinceStartMs << " milliseconds gone, finishing as requested."); break; } #endif } // Stop the listening to new connections // and wait until sockets close. LOG_INF("Stopping server socket listening. ShutdownFlag: " << ShutdownRequestFlag << ", TerminationFlag: " << TerminationFlag); // Wait until documents are saved and sessions closed. srv.stop(); // atexit handlers tend to free Admin before Documents LOG_INF("Cleaning up lingering documents."); if (ShutdownRequestFlag || TerminationFlag) { // Don't stop the DocBroker, they will exit. const size_t sleepMs = 300; const size_t count = std::max(COMMAND_TIMEOUT_MS, 2000) / sleepMs; for (size_t i = 0; i < count; ++i) { std::unique_lock docBrokersLock(DocBrokersMutex); cleanupDocBrokers(); if (DocBrokers.empty()) break; docBrokersLock.unlock(); // Give them time to save and cleanup. std::this_thread::sleep_for(std::chrono::milliseconds(sleepMs)); } } else { // Stop and join. for (auto& docBrokerIt : DocBrokers) docBrokerIt.second->joinThread(); } // Disable thread checking - we'll now cleanup lots of things if we can Socket::InhibitThreadChecks = true; SocketPoll::InhibitThreadChecks = true; DocBrokers.clear(); #ifndef KIT_IN_PROCESS // Terminate child processes LOG_INF("Requesting forkit process " << ForKitProcId << " to terminate."); SigUtil::killChild(ForKitProcId); #endif srv.stopPrisoners(); // Terminate child processes LOG_INF("Requesting child processes to terminate."); for (auto& child : NewChildren) { child->close(true); } #ifndef KIT_IN_PROCESS // Wait for forkit process finish. LOG_INF("Waiting for forkit process to exit"); int status = 0; waitpid(ForKitProcId, &status, WUNTRACED); close(ForKitWritePipe); #endif // In case forkit didn't cleanup properly, don't leave jails behind. LOG_INF("Cleaning up childroot directory [" << ChildRoot << "]."); std::vector jails; File(ChildRoot).list(jails); for (auto& jail : jails) { const auto path = ChildRoot + jail; LOG_INF("Removing jail [" << path << "]."); FileUtil::removeFile(path, true); } return Application::EXIT_OK; } void LOOLWSD::cleanup() { FileServerRequestHandler::uninitialize(); // Finally, we no longer need SSL. if (LOOLWSD::isSSLEnabled()) { Poco::Net::uninitializeSSL(); Poco::Crypto::uninitializeCrypto(); #if ENABLE_SSL SslContext::uninitialize(); #endif } } int LOOLWSD::main(const std::vector& /*args*/) { int returnValue; try { returnValue = innerMain(); } catch (const std::runtime_error& e) { LOG_FTL(e.what()); throw; } catch (...) { cleanup(); throw; } cleanup(); UnitWSD::get().returnValue(returnValue); LOG_INF("Process [loolwsd] finished."); return returnValue; } void UnitWSD::testHandleRequest(TestRequest type, UnitHTTPServerRequest& /* request */, UnitHTTPServerResponse& /* response */) { switch (type) { case TestRequest::Client: #if 0 // loolnb ClientRequestHandler::handleClientRequest(request, response, LOOLWSD::GenSessionId()); break; case TestRequest::Prisoner: PrisonerRequestHandler::handlePrisonerRequest(request, response); #endif break; default: assert(false); break; } } std::vector LOOLWSD::getKitPids() { std::vector pids; { std::unique_lock lock(NewChildrenMutex); for (const auto &child : NewChildren) pids.push_back(child->getPid()); } { std::unique_lock lock(DocBrokersMutex); for (const auto &it : DocBrokers) pids.push_back(it.second->getPid()); } return pids; } #if !defined(BUILDING_TESTS) && !defined(KIT_IN_PROCESS) namespace Util { void alertAllUsers(const std::string& cmd, const std::string& kind) { alertAllUsers("error: cmd=" + cmd + " kind=" + kind); } void alertAllUsers(const std::string& msg) { alertAllUsersInternal(msg); } } #endif void dump_state() { std::ostringstream oss; srv.dumpState(oss); const std::string msg = oss.str(); fprintf(stderr, "%s\n", msg.c_str()); LOG_TRC(msg); } POCO_SERVER_MAIN(LOOLWSD) /* vim:set shiftwidth=4 softtabstop=4 expandtab: */