86a80a4cca
Change-Id: I597e949cd1bea612400d623f30ea260036253e89 Reviewed-on: https://gerrit.libreoffice.org/84360 Reviewed-by: Ashod Nakashian <ashnakash@gmail.com> Tested-by: Ashod Nakashian <ashnakash@gmail.com>
1115 lines
44 KiB
C++
1115 lines
44 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */
|
|
/*
|
|
* This file is part of the LibreOffice project.
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include "Storage.hpp"
|
|
|
|
#include <algorithm>
|
|
#include <cassert>
|
|
#include <errno.h>
|
|
#include <fstream>
|
|
#include <iconv.h>
|
|
#include <string>
|
|
|
|
#include <Poco/Exception.h>
|
|
#include <Poco/JSON/Object.h>
|
|
#include <Poco/JSON/Parser.h>
|
|
|
|
#if !MOBILEAPP
|
|
|
|
#include <Poco/Net/AcceptCertificateHandler.h>
|
|
#include <Poco/Net/Context.h>
|
|
#include <Poco/Net/DNS.h>
|
|
#include <Poco/Net/HTTPClientSession.h>
|
|
#include <Poco/Net/HTTPRequest.h>
|
|
#include <Poco/Net/HTTPResponse.h>
|
|
#include <Poco/Net/HTTPSClientSession.h>
|
|
#include <Poco/Net/KeyConsoleHandler.h>
|
|
#include <Poco/Net/NameValueCollection.h>
|
|
#include <Poco/Net/NetworkInterface.h>
|
|
#include <Poco/Net/SSLManager.h>
|
|
|
|
#endif
|
|
|
|
#include <Poco/StreamCopier.h>
|
|
#include <Poco/URI.h>
|
|
|
|
#include "Auth.hpp"
|
|
#include <Common.hpp>
|
|
#include "Exceptions.hpp"
|
|
#include <Log.hpp>
|
|
#include <Unit.hpp>
|
|
#include <Util.hpp>
|
|
#include "ProofKey.hpp"
|
|
#include <common/FileUtil.hpp>
|
|
#include <common/JsonUtil.hpp>
|
|
|
|
using std::size_t;
|
|
|
|
bool StorageBase::FilesystemEnabled;
|
|
bool StorageBase::WopiEnabled;
|
|
bool StorageBase::SSLEnabled;
|
|
Util::RegexListMatcher StorageBase::WopiHosts;
|
|
|
|
#if !MOBILEAPP
|
|
|
|
std::string StorageBase::getLocalRootPath() const
|
|
{
|
|
std::string localPath = _jailPath;
|
|
if (localPath[0] == '/')
|
|
{
|
|
// Remove the leading /
|
|
localPath.erase(0, 1);
|
|
}
|
|
|
|
// /chroot/jailId/user/doc/childId
|
|
const Poco::Path rootPath = Poco::Path(_localStorePath, localPath);
|
|
Poco::File(rootPath).createDirectories();
|
|
|
|
return rootPath.toString();
|
|
}
|
|
|
|
size_t StorageBase::getFileSize(const std::string& filename)
|
|
{
|
|
return std::ifstream(filename, std::ifstream::ate | std::ifstream::binary).tellg();
|
|
}
|
|
|
|
#endif
|
|
|
|
void StorageBase::initialize()
|
|
{
|
|
#if !MOBILEAPP
|
|
const auto& app = Poco::Util::Application::instance();
|
|
FilesystemEnabled = app.config().getBool("storage.filesystem[@allow]", false);
|
|
|
|
// Parse the WOPI settings.
|
|
WopiHosts.clear();
|
|
WopiEnabled = app.config().getBool("storage.wopi[@allow]", false);
|
|
if (WopiEnabled)
|
|
{
|
|
for (size_t i = 0; ; ++i)
|
|
{
|
|
const std::string path = "storage.wopi.host[" + std::to_string(i) + "]";
|
|
const std::string host = app.config().getString(path, "");
|
|
if (!host.empty())
|
|
{
|
|
if (app.config().getBool(path + "[@allow]", false))
|
|
{
|
|
LOG_INF("Adding trusted WOPI host: [" << host << "].");
|
|
WopiHosts.allow(host);
|
|
}
|
|
else
|
|
{
|
|
LOG_INF("Adding blocked WOPI host: [" << host << "].");
|
|
WopiHosts.deny(host);
|
|
}
|
|
}
|
|
else if (!app.config().has(path))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
#if ENABLE_SSL
|
|
// FIXME: should use our own SSL socket implementation here.
|
|
Poco::Crypto::initializeCrypto();
|
|
Poco::Net::initializeSSL();
|
|
|
|
// Init client
|
|
Poco::Net::Context::Params sslClientParams;
|
|
|
|
// Fallback to ssl.enable if not set - for back compatibility & simplicity.
|
|
SSLEnabled = LOOLWSD::getConfigValue<bool>(
|
|
"storage.ssl.enable", LOOLWSD::getConfigValue<bool>("ssl.enable", true));
|
|
|
|
#if ENABLE_DEBUG
|
|
char *StorageSSLEnabled = getenv("STORAGE_SSL_ENABLE");
|
|
if (StorageSSLEnabled != NULL)
|
|
{
|
|
if (!strcasecmp(StorageSSLEnabled, "true"))
|
|
SSLEnabled = true;
|
|
else if (!strcasecmp(StorageSSLEnabled, "false"))
|
|
SSLEnabled = false;
|
|
}
|
|
#endif
|
|
|
|
if (SSLEnabled)
|
|
{
|
|
sslClientParams.certificateFile = LOOLWSD::getPathFromConfigWithFallback("storage.ssl.cert_file_path", "ssl.cert_file_path");
|
|
sslClientParams.privateKeyFile = LOOLWSD::getPathFromConfigWithFallback("storage.ssl.key_file_path", "ssl.key_file_path");
|
|
sslClientParams.caLocation = LOOLWSD::getPathFromConfigWithFallback("storage.ssl.ca_file_path", "ssl.ca_file_path");
|
|
sslClientParams.cipherList = LOOLWSD::getPathFromConfigWithFallback("storage.ssl.cipher_list", "ssl.cipher_list");
|
|
|
|
sslClientParams.verificationMode = (sslClientParams.caLocation.empty() ? Poco::Net::Context::VERIFY_NONE : Poco::Net::Context::VERIFY_STRICT);
|
|
sslClientParams.loadDefaultCAs = true;
|
|
}
|
|
else
|
|
sslClientParams.verificationMode = Poco::Net::Context::VERIFY_NONE;
|
|
|
|
Poco::SharedPtr<Poco::Net::PrivateKeyPassphraseHandler> consoleClientHandler = new Poco::Net::KeyConsoleHandler(false);
|
|
Poco::SharedPtr<Poco::Net::InvalidCertificateHandler> invalidClientCertHandler = new Poco::Net::AcceptCertificateHandler(false);
|
|
|
|
Poco::Net::Context::Ptr sslClientContext = new Poco::Net::Context(Poco::Net::Context::CLIENT_USE, sslClientParams);
|
|
sslClientContext->disableProtocols(Poco::Net::Context::Protocols::PROTO_SSLV2 |
|
|
Poco::Net::Context::Protocols::PROTO_SSLV3 |
|
|
Poco::Net::Context::Protocols::PROTO_TLSV1);
|
|
Poco::Net::SSLManager::instance().initializeClient(consoleClientHandler, invalidClientCertHandler, sslClientContext);
|
|
#endif
|
|
#else
|
|
FilesystemEnabled = true;
|
|
#endif
|
|
}
|
|
|
|
bool StorageBase::allowedWopiHost(const std::string& host)
|
|
{
|
|
return WopiEnabled && WopiHosts.match(host);
|
|
}
|
|
|
|
#if !MOBILEAPP
|
|
|
|
bool isLocalhost(const std::string& targetHost)
|
|
{
|
|
std::string targetAddress;
|
|
try
|
|
{
|
|
targetAddress = Poco::Net::DNS::resolveOne(targetHost).toString();
|
|
}
|
|
catch (const Poco::Exception& exc)
|
|
{
|
|
LOG_WRN("Poco::Net::DNS::resolveOne(\"" << targetHost << "\") failed: " << exc.displayText());
|
|
try
|
|
{
|
|
targetAddress = Poco::Net::IPAddress(targetHost).toString();
|
|
}
|
|
catch (const Poco::Exception& exc1)
|
|
{
|
|
LOG_WRN("Poco::Net::IPAddress(\"" << targetHost << "\") failed: " << exc1.displayText());
|
|
}
|
|
}
|
|
|
|
Poco::Net::NetworkInterface::NetworkInterfaceList list = Poco::Net::NetworkInterface::list(true,true);
|
|
for (auto& netif : list)
|
|
{
|
|
std::string address = netif.address().toString();
|
|
address = address.substr(0, address.find('%', 0));
|
|
if (address == targetAddress)
|
|
{
|
|
LOG_INF("WOPI host is on the same host as the WOPI client: \"" <<
|
|
targetAddress << "\". Connection is allowed.");
|
|
return true;
|
|
}
|
|
}
|
|
|
|
LOG_INF("WOPI host is not on the same host as the WOPI client: \"" <<
|
|
targetAddress << "\". Connection is not allowed.");
|
|
return false;
|
|
}
|
|
|
|
#endif
|
|
|
|
std::unique_ptr<StorageBase> StorageBase::create(const Poco::URI& uri, const std::string& jailRoot, const std::string& jailPath)
|
|
{
|
|
// FIXME: By the time this gets called we have already sent to the client three
|
|
// 'statusindicator:' messages: 'find', 'connect' and 'ready'. We should ideally do the checks
|
|
// here much earlier. Also, using exceptions is lame and makes understanding the code harder,
|
|
// but that is just my personal preference.
|
|
|
|
std::unique_ptr<StorageBase> storage;
|
|
|
|
if (UnitWSD::get().createStorage(uri, jailRoot, jailPath, storage))
|
|
{
|
|
LOG_INF("Storage load hooked.");
|
|
if (storage)
|
|
{
|
|
return storage;
|
|
}
|
|
}
|
|
else if (uri.isRelative() || uri.getScheme() == "file")
|
|
{
|
|
LOG_INF("Public URI [" << LOOLWSD::anonymizeUrl(uri.toString()) << "] is a file.");
|
|
|
|
#if ENABLE_DEBUG
|
|
if (std::getenv("FAKE_UNAUTHORIZED"))
|
|
{
|
|
LOG_FTL("Faking an UnauthorizedRequestException");
|
|
throw UnauthorizedRequestException("No acceptable WOPI hosts found matching the target host in config.");
|
|
}
|
|
#endif
|
|
if (FilesystemEnabled)
|
|
{
|
|
return std::unique_ptr<StorageBase>(new LocalStorage(uri, jailRoot, jailPath));
|
|
}
|
|
else
|
|
{
|
|
// guard against attempts to escape
|
|
Poco::URI normalizedUri(uri);
|
|
normalizedUri.normalize();
|
|
|
|
std::vector<std::string> pathSegments;
|
|
normalizedUri.getPathSegments(pathSegments);
|
|
|
|
if (pathSegments.size() == 4 && pathSegments[0] == "tmp" && pathSegments[1] == "convert-to")
|
|
{
|
|
LOG_INF("Public URI [" << LOOLWSD::anonymizeUrl(normalizedUri.toString()) << "] is actually a convert-to tempfile.");
|
|
return std::unique_ptr<StorageBase>(new LocalStorage(normalizedUri, jailRoot, jailPath));
|
|
}
|
|
}
|
|
|
|
LOG_ERR("Local Storage is disabled by default. Enable in the config file or on the command-line to enable.");
|
|
}
|
|
#if !MOBILEAPP
|
|
else if (WopiEnabled)
|
|
{
|
|
LOG_INF("Public URI [" << LOOLWSD::anonymizeUrl(uri.toString()) << "] considered WOPI.");
|
|
const auto& targetHost = uri.getHost();
|
|
if (WopiHosts.match(targetHost) || isLocalhost(targetHost))
|
|
{
|
|
return std::unique_ptr<StorageBase>(new WopiStorage(uri, jailRoot, jailPath));
|
|
}
|
|
LOG_ERR("No acceptable WOPI hosts found matching the target host [" << targetHost << "] in config.");
|
|
throw UnauthorizedRequestException("No acceptable WOPI hosts found matching the target host [" + targetHost + "] in config.");
|
|
}
|
|
#endif
|
|
throw BadRequestException("No Storage configured or invalid URI.");
|
|
}
|
|
|
|
std::atomic<unsigned> LocalStorage::LastLocalStorageId;
|
|
|
|
std::unique_ptr<LocalStorage::LocalFileInfo> LocalStorage::getLocalFileInfo()
|
|
{
|
|
const Poco::Path path = Poco::Path(getUri().getPath());
|
|
LOG_DBG("Getting info for local uri [" << LOOLWSD::anonymizeUrl(getUri().toString()) << "], path [" << LOOLWSD::anonymizeUrl(path.toString()) << "].");
|
|
|
|
std::string str_path = path.toString();
|
|
const auto& filename = path.getFileName();
|
|
const Poco::File file = Poco::File(path);
|
|
std::chrono::system_clock::time_point lastModified = Util::getFileTimestamp(str_path);
|
|
const size_t size = file.getSize();
|
|
|
|
setFileInfo(FileInfo({filename, "localhost", lastModified, size}));
|
|
|
|
// Set automatic userid and username
|
|
return std::unique_ptr<LocalStorage::LocalFileInfo>(new LocalFileInfo({"localhost" + std::to_string(LastLocalStorageId), "LocalHost#" + std::to_string(LastLocalStorageId++)}));
|
|
}
|
|
|
|
std::string LocalStorage::loadStorageFileToLocal(const Authorization& /*auth*/, LockContext & /*lockCtx*/, const std::string& /*templateUri*/)
|
|
{
|
|
#if !MOBILEAPP
|
|
// /chroot/jailId/user/doc/childId/file.ext
|
|
const std::string filename = Poco::Path(getUri().getPath()).getFileName();
|
|
setRootFilePath(Poco::Path(getLocalRootPath(), filename).toString());
|
|
setRootFilePathAnonym(LOOLWSD::anonymizeUrl(getRootFilePath()));
|
|
LOG_INF("Public URI [" << LOOLWSD::anonymizeUrl(getUri().getPath()) <<
|
|
"] jailed to [" << getRootFilePathAnonym() << "].");
|
|
|
|
// Despite the talk about URIs it seems that _uri is actually just a pathname here
|
|
const std::string publicFilePath = getUri().getPath();
|
|
|
|
if (!FileUtil::checkDiskSpace(getRootFilePath()))
|
|
{
|
|
throw StorageSpaceLowException("Low disk space for " + getRootFilePathAnonym());
|
|
}
|
|
|
|
LOG_INF("Linking " << LOOLWSD::anonymizeUrl(publicFilePath) << " to " << getRootFilePathAnonym());
|
|
if (!Poco::File(getRootFilePath()).exists() && link(publicFilePath.c_str(), getRootFilePath().c_str()) == -1)
|
|
{
|
|
// Failed
|
|
LOG_WRN("link(\"" << LOOLWSD::anonymizeUrl(publicFilePath) << "\", \"" << getRootFilePathAnonym() << "\") failed. Will copy. "
|
|
"Linking error: " << Util::symbolicErrno(errno) << " " << strerror(errno));
|
|
}
|
|
|
|
try
|
|
{
|
|
// Fallback to copying.
|
|
if (!Poco::File(getRootFilePath()).exists())
|
|
{
|
|
LOG_INF("Copying " << LOOLWSD::anonymizeUrl(publicFilePath) << " to " << getRootFilePathAnonym());
|
|
Poco::File(publicFilePath).copyTo(getRootFilePath());
|
|
_isCopy = true;
|
|
}
|
|
}
|
|
catch (const Poco::Exception& exc)
|
|
{
|
|
LOG_ERR("copyTo(\"" << LOOLWSD::anonymizeUrl(publicFilePath) << "\", \"" << getRootFilePathAnonym() << "\") failed: " << exc.displayText());
|
|
throw;
|
|
}
|
|
|
|
setLoaded(true);
|
|
// Now return the jailed path.
|
|
#ifndef KIT_IN_PROCESS
|
|
if (LOOLWSD::NoCapsForKit)
|
|
return getRootFilePath();
|
|
else
|
|
return Poco::Path(getJailPath(), filename).toString();
|
|
#else
|
|
return getRootFilePath();
|
|
#endif
|
|
|
|
#else // MOBILEAPP
|
|
|
|
// In the mobile app we use no jail
|
|
setRootFilePath(getUri().getPath());
|
|
setLoaded(true);
|
|
|
|
return getRootFilePath();
|
|
#endif
|
|
|
|
}
|
|
|
|
StorageBase::SaveResult LocalStorage::saveLocalFileToStorage(const Authorization& /*auth*/, LockContext &/*lockCtx*/, const std::string& /*saveAsPath*/, const std::string& /*saveAsFilename*/, bool /*isRename*/)
|
|
{
|
|
try
|
|
{
|
|
LOG_TRC("Saving local file to local file storage (isCopy: " << _isCopy << ") for " << getRootFilePathAnonym());
|
|
// Copy the file back.
|
|
if (_isCopy && Poco::File(getRootFilePath()).exists())
|
|
{
|
|
LOG_INF("Copying " << getRootFilePathAnonym() << " to " << LOOLWSD::anonymizeUrl(getUri().getPath()));
|
|
Poco::File(getRootFilePath()).copyTo(getUri().getPath());
|
|
}
|
|
|
|
// update its fileinfo object. This is used later to check if someone else changed the
|
|
// document while we are/were editing it
|
|
const Poco::Path path = Poco::Path(getUri().getPath());
|
|
std::string str_path = path.toString();
|
|
getFileInfo().setModifiedTime(Util::getFileTimestamp(str_path));
|
|
LOG_TRC("New FileInfo modified time in storage " << getFileInfo().getModifiedTime());
|
|
}
|
|
catch (const Poco::Exception& exc)
|
|
{
|
|
LOG_ERR("copyTo(\"" << getRootFilePathAnonym() << "\", \"" << LOOLWSD::anonymizeUrl(getUri().getPath()) <<
|
|
"\") failed: " << exc.displayText());
|
|
return StorageBase::SaveResult::FAILED;
|
|
}
|
|
|
|
return StorageBase::SaveResult(StorageBase::SaveResult::OK);
|
|
}
|
|
|
|
#if !MOBILEAPP
|
|
|
|
Poco::Net::HTTPClientSession* StorageBase::getHTTPClientSession(const Poco::URI& uri)
|
|
{
|
|
// We decoupled the Wopi communication from client communication because
|
|
// the Wopi communication must have an independent policy.
|
|
// So, we will use here only Storage settings.
|
|
return (SSLEnabled || LOOLWSD::isSSLTermination())
|
|
? new Poco::Net::HTTPSClientSession(uri.getHost(), uri.getPort(),
|
|
Poco::Net::SSLManager::instance().defaultClientContext())
|
|
: new Poco::Net::HTTPClientSession(uri.getHost(), uri.getPort());
|
|
}
|
|
|
|
namespace
|
|
{
|
|
|
|
static void addStorageDebugCookie(Poco::Net::HTTPRequest& request)
|
|
{
|
|
(void) request;
|
|
#if ENABLE_DEBUG
|
|
if (std::getenv("LOOL_STORAGE_COOKIE"))
|
|
{
|
|
Poco::Net::NameValueCollection nvcCookies;
|
|
std::vector<std::string> cookieTokens = LOOLProtocol::tokenize(std::string(std::getenv("LOOL_STORAGE_COOKIE")), ':');
|
|
if (cookieTokens.size() == 2)
|
|
{
|
|
nvcCookies.add(cookieTokens[0], cookieTokens[1]);
|
|
request.setCookies(nvcCookies);
|
|
LOG_TRC("Added storage debug cookie [" << cookieTokens[0] << "=" << cookieTokens[1] << "].");
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
|
|
static void addStorageReuseCookie(Poco::Net::HTTPRequest& request, const std::string& reuseStorageCookies)
|
|
{
|
|
if (!reuseStorageCookies.empty())
|
|
{
|
|
Poco::Net::NameValueCollection nvcCookies;
|
|
std::vector<std::string> cookies = LOOLProtocol::tokenize(reuseStorageCookies, ':');
|
|
for (auto cookie : cookies)
|
|
{
|
|
std::vector<std::string> cookieTokens = LOOLProtocol::tokenize(cookie, '=');
|
|
if (cookieTokens.size() == 2)
|
|
{
|
|
nvcCookies.add(cookieTokens[0], cookieTokens[1]);
|
|
LOG_DBG("Added storage reuse cookie [" << cookieTokens[0] << "=" << cookieTokens[1] << "].");
|
|
}
|
|
}
|
|
request.setCookies(nvcCookies);
|
|
}
|
|
}
|
|
|
|
void addWopiProof(Poco::Net::HTTPRequest& request, const std::string& access_token)
|
|
{
|
|
for (const auto header : GetProofHeaders(access_token, request.getURI()))
|
|
request.set(header.first, header.second);
|
|
}
|
|
|
|
std::map<std::string, std::string> GetQueryParams(const Poco::URI& uri)
|
|
{
|
|
std::map<std::string, std::string> result;
|
|
for (const auto& param : uri.getQueryParameters())
|
|
result.emplace(param);
|
|
return result;
|
|
}
|
|
|
|
} // anonymous namespace
|
|
|
|
#endif // !MOBILEAPP
|
|
|
|
void LockContext::initSupportsLocks()
|
|
{
|
|
#if MOBILEAPP
|
|
_supportsLocks = false;
|
|
#else
|
|
if (_supportsLocks)
|
|
return;
|
|
|
|
// first time token setup
|
|
_supportsLocks = true;
|
|
_lockToken = "lool-lock" + Util::rng::getHexString(8);
|
|
#endif
|
|
}
|
|
|
|
bool LockContext::needsRefresh(const std::chrono::steady_clock::time_point &now) const
|
|
{
|
|
static int refreshSeconds = LOOLWSD::getConfigValue<int>("storage.wopi.locking.refresh", 900);
|
|
return _supportsLocks && _isLocked && refreshSeconds > 0 &&
|
|
std::chrono::duration_cast<std::chrono::seconds>
|
|
(now - _lastLockTime).count() >= refreshSeconds;
|
|
}
|
|
|
|
void LockContext::dumpState(std::ostream& os)
|
|
{
|
|
if (!_supportsLocks)
|
|
return;
|
|
os << " lock:\n";
|
|
os << " locked: " << _isLocked << "\n";
|
|
os << " token: '" << _lockToken << "'\n";
|
|
os << " last locked: " << Util::getSteadyClockAsString(_lastLockTime) << "\n";
|
|
}
|
|
|
|
#if !MOBILEAPP
|
|
|
|
std::unique_ptr<WopiStorage::WOPIFileInfo> WopiStorage::getWOPIFileInfo(const Authorization& auth, LockContext &lockCtx)
|
|
{
|
|
// update the access_token to the one matching to the session
|
|
Poco::URI uriObject(getUri());
|
|
auth.authorizeURI(uriObject);
|
|
const std::string uriAnonym = LOOLWSD::anonymizeUrl(uriObject.toString());
|
|
std::map<std::string, std::string> params = GetQueryParams(uriObject);
|
|
|
|
LOG_DBG("Getting info for wopi uri [" << uriAnonym << "].");
|
|
|
|
std::string wopiResponse;
|
|
std::chrono::duration<double> callDuration(0);
|
|
try
|
|
{
|
|
Poco::Net::HTTPRequest request(Poco::Net::HTTPRequest::HTTP_GET, uriObject.getPathAndQuery(), Poco::Net::HTTPMessage::HTTP_1_1);
|
|
request.set("User-Agent", WOPI_AGENT_STRING);
|
|
auth.authorizeRequest(request);
|
|
addStorageDebugCookie(request);
|
|
if (_reuseCookies)
|
|
addStorageReuseCookie(request, params["reuse_cookies"]);
|
|
addWopiProof(request, params["access_token"]);
|
|
const auto startTime = std::chrono::steady_clock::now();
|
|
|
|
std::unique_ptr<Poco::Net::HTTPClientSession> psession(getHTTPClientSession(uriObject));
|
|
psession->sendRequest(request);
|
|
|
|
Poco::Net::HTTPResponse response;
|
|
std::istream& rs = psession->receiveResponse(response);
|
|
callDuration = (std::chrono::steady_clock::now() - startTime);
|
|
|
|
Log::StreamLogger logger = Log::trace();
|
|
if (logger.enabled())
|
|
{
|
|
logger << "WOPI::CheckFileInfo header for URI [" << uriAnonym << "]:\n";
|
|
for (const auto& pair : response)
|
|
{
|
|
logger << '\t' << pair.first << ": " << pair.second << " / ";
|
|
}
|
|
|
|
LOG_END(logger, true);
|
|
}
|
|
|
|
if (response.getStatus() != Poco::Net::HTTPResponse::HTTP_OK)
|
|
{
|
|
LOG_ERR("WOPI::CheckFileInfo failed with " << response.getStatus() << ' ' << response.getReason());
|
|
throw StorageConnectionException("WOPI::CheckFileInfo failed");
|
|
}
|
|
|
|
Poco::StreamCopier::copyToString(rs, wopiResponse);
|
|
}
|
|
catch (const Poco::Exception& pexc)
|
|
{
|
|
LOG_ERR("Cannot get file info from WOPI storage uri [" << uriAnonym << "]. Error: " <<
|
|
pexc.displayText() << (pexc.nested() ? " (" + pexc.nested()->displayText() + ")" : ""));
|
|
throw;
|
|
}
|
|
|
|
// Parse the response.
|
|
std::string filename;
|
|
size_t size = 0;
|
|
std::string ownerId;
|
|
std::string userId;
|
|
std::string userName;
|
|
std::string obfuscatedUserId;
|
|
std::string userExtraInfo;
|
|
std::string watermarkText;
|
|
std::string templateSaveAs;
|
|
std::string templateSource;
|
|
bool canWrite = false;
|
|
bool enableOwnerTermination = false;
|
|
std::string postMessageOrigin;
|
|
bool hidePrintOption = false;
|
|
bool hideSaveOption = false;
|
|
bool hideExportOption = false;
|
|
bool disablePrint = false;
|
|
bool disableExport = false;
|
|
bool disableCopy = false;
|
|
bool disableInactiveMessages = false;
|
|
bool downloadAsPostMessage = false;
|
|
std::string lastModifiedTime;
|
|
bool userCanNotWriteRelative = true;
|
|
bool enableInsertRemoteImage = false;
|
|
bool enableShare = false;
|
|
bool supportsLocks = false;
|
|
bool supportsRename = false;
|
|
bool userCanRename = false;
|
|
std::string hideUserList("false");
|
|
WOPIFileInfo::TriState disableChangeTrackingRecord = WOPIFileInfo::TriState::Unset;
|
|
WOPIFileInfo::TriState disableChangeTrackingShow = WOPIFileInfo::TriState::Unset;
|
|
WOPIFileInfo::TriState hideChangeTrackingControls = WOPIFileInfo::TriState::Unset;
|
|
|
|
Poco::JSON::Object::Ptr object;
|
|
if (JsonUtil::parseJSON(wopiResponse, object))
|
|
{
|
|
if (LOOLWSD::AnonymizeUserData)
|
|
LOG_DBG("WOPI::CheckFileInfo (" << callDuration.count() * 1000. << " ms): anonymizing...");
|
|
else
|
|
LOG_DBG("WOPI::CheckFileInfo (" << callDuration.count() * 1000. << " ms): " << wopiResponse);
|
|
|
|
JsonUtil::findJSONValue(object, "BaseFileName", filename);
|
|
JsonUtil::findJSONValue(object, "OwnerId", ownerId);
|
|
JsonUtil::findJSONValue(object, "UserId", userId);
|
|
JsonUtil::findJSONValue(object, "UserFriendlyName", userName);
|
|
JsonUtil::findJSONValue(object, "TemplateSaveAs", templateSaveAs);
|
|
JsonUtil::findJSONValue(object, "TemplateSource", templateSource);
|
|
|
|
// Anonymize key values.
|
|
if (LOOLWSD::AnonymizeUserData)
|
|
{
|
|
Util::mapAnonymized(Util::getFilenameFromURL(filename), Util::getFilenameFromURL(getUri().toString()));
|
|
|
|
JsonUtil::findJSONValue(object, "ObfuscatedUserId", obfuscatedUserId, false);
|
|
if (!obfuscatedUserId.empty())
|
|
{
|
|
Util::mapAnonymized(ownerId, obfuscatedUserId);
|
|
Util::mapAnonymized(userId, obfuscatedUserId);
|
|
Util::mapAnonymized(userName, obfuscatedUserId);
|
|
}
|
|
|
|
// Set anonymized version of the above fields before logging.
|
|
// Note: anonymization caches the result, so we don't need to store here.
|
|
if (LOOLWSD::AnonymizeUserData)
|
|
object->set("BaseFileName", LOOLWSD::anonymizeUrl(filename));
|
|
|
|
// If obfuscatedUserId is provided, then don't log the originals and use it.
|
|
if (LOOLWSD::AnonymizeUserData && obfuscatedUserId.empty())
|
|
{
|
|
object->set("OwnerId", LOOLWSD::anonymizeUsername(ownerId));
|
|
object->set("UserId", LOOLWSD::anonymizeUsername(userId));
|
|
object->set("UserFriendlyName", LOOLWSD::anonymizeUsername(userName));
|
|
}
|
|
|
|
std::ostringstream oss;
|
|
object->stringify(oss);
|
|
wopiResponse = oss.str();
|
|
|
|
// Remove them for performance reasons; they aren't needed anymore.
|
|
object->remove("ObfuscatedUserId");
|
|
|
|
if (LOOLWSD::AnonymizeUserData)
|
|
{
|
|
object->remove("BaseFileName");
|
|
object->remove("TemplateSaveAs");
|
|
object->remove("TemplateSource");
|
|
object->remove("OwnerId");
|
|
object->remove("UserId");
|
|
object->remove("UserFriendlyName");
|
|
}
|
|
|
|
LOG_DBG("WOPI::CheckFileInfo (" << callDuration.count() * 1000. << " ms): " << wopiResponse);
|
|
}
|
|
|
|
JsonUtil::findJSONValue(object, "Size", size);
|
|
JsonUtil::findJSONValue(object, "UserExtraInfo", userExtraInfo);
|
|
JsonUtil::findJSONValue(object, "WatermarkText", watermarkText);
|
|
JsonUtil::findJSONValue(object, "UserCanWrite", canWrite);
|
|
JsonUtil::findJSONValue(object, "PostMessageOrigin", postMessageOrigin);
|
|
JsonUtil::findJSONValue(object, "HidePrintOption", hidePrintOption);
|
|
JsonUtil::findJSONValue(object, "HideSaveOption", hideSaveOption);
|
|
JsonUtil::findJSONValue(object, "HideExportOption", hideExportOption);
|
|
JsonUtil::findJSONValue(object, "EnableOwnerTermination", enableOwnerTermination);
|
|
JsonUtil::findJSONValue(object, "DisablePrint", disablePrint);
|
|
JsonUtil::findJSONValue(object, "DisableExport", disableExport);
|
|
JsonUtil::findJSONValue(object, "DisableCopy", disableCopy);
|
|
JsonUtil::findJSONValue(object, "DisableInactiveMessages", disableInactiveMessages);
|
|
JsonUtil::findJSONValue(object, "DownloadAsPostMessage", downloadAsPostMessage);
|
|
JsonUtil::findJSONValue(object, "LastModifiedTime", lastModifiedTime);
|
|
JsonUtil::findJSONValue(object, "UserCanNotWriteRelative", userCanNotWriteRelative);
|
|
JsonUtil::findJSONValue(object, "EnableInsertRemoteImage", enableInsertRemoteImage);
|
|
JsonUtil::findJSONValue(object, "EnableShare", enableShare);
|
|
JsonUtil::findJSONValue(object, "HideUserList", hideUserList);
|
|
JsonUtil::findJSONValue(object, "SupportsLocks", supportsLocks);
|
|
JsonUtil::findJSONValue(object, "SupportsRename", supportsRename);
|
|
JsonUtil::findJSONValue(object, "UserCanRename", userCanRename);
|
|
bool booleanFlag = false;
|
|
if (JsonUtil::findJSONValue(object, "DisableChangeTrackingRecord", booleanFlag))
|
|
disableChangeTrackingRecord = (booleanFlag ? WOPIFileInfo::TriState::True : WOPIFileInfo::TriState::False);
|
|
if (JsonUtil::findJSONValue(object, "DisableChangeTrackingShow", booleanFlag))
|
|
disableChangeTrackingShow = (booleanFlag ? WOPIFileInfo::TriState::True : WOPIFileInfo::TriState::False);
|
|
if (JsonUtil::findJSONValue(object, "HideChangeTrackingControls", booleanFlag))
|
|
hideChangeTrackingControls = (booleanFlag ? WOPIFileInfo::TriState::True : WOPIFileInfo::TriState::False);
|
|
}
|
|
else
|
|
{
|
|
if (LOOLWSD::AnonymizeUserData)
|
|
wopiResponse = "obfuscated";
|
|
|
|
LOG_ERR("WOPI::CheckFileInfo (" << callDuration.count() * 1000. <<
|
|
" ms) failed or no valid JSON payload returned. Access denied. "
|
|
"Original response: [" << wopiResponse << "].");
|
|
|
|
throw UnauthorizedRequestException("Access denied. WOPI::CheckFileInfo failed on: " + uriAnonym);
|
|
}
|
|
|
|
const std::chrono::system_clock::time_point modifiedTime = Util::iso8601ToTimestamp(lastModifiedTime, "LastModifiedTime");
|
|
setFileInfo(FileInfo({filename, ownerId, modifiedTime, size}));
|
|
|
|
if (supportsLocks)
|
|
lockCtx.initSupportsLocks();
|
|
|
|
std::string overrideWatermarks = LOOLWSD::getConfigValue<std::string>("watermark.text", "");
|
|
if (!overrideWatermarks.empty())
|
|
watermarkText = overrideWatermarks;
|
|
|
|
return std::unique_ptr<WopiStorage::WOPIFileInfo>(new WOPIFileInfo(
|
|
{userId, obfuscatedUserId, userName, userExtraInfo, watermarkText, templateSaveAs, templateSource,
|
|
canWrite, postMessageOrigin, hidePrintOption, hideSaveOption, hideExportOption,
|
|
enableOwnerTermination, disablePrint, disableExport, disableCopy,
|
|
disableInactiveMessages, downloadAsPostMessage, userCanNotWriteRelative, enableInsertRemoteImage, enableShare,
|
|
hideUserList, disableChangeTrackingShow, disableChangeTrackingRecord,
|
|
hideChangeTrackingControls, supportsLocks, supportsRename,
|
|
userCanRename, callDuration}));
|
|
}
|
|
|
|
bool WopiStorage::updateLockState(const Authorization &auth, LockContext &lockCtx, bool lock)
|
|
{
|
|
if (!lockCtx._supportsLocks)
|
|
return true;
|
|
|
|
Poco::URI uriObject(getUri());
|
|
auth.authorizeURI(uriObject);
|
|
|
|
std::map<std::string, std::string> params = GetQueryParams(uriObject);
|
|
|
|
Poco::URI uriObjectAnonym(getUri());
|
|
uriObjectAnonym.setPath(LOOLWSD::anonymizeUrl(uriObjectAnonym.getPath()));
|
|
const std::string uriAnonym = uriObjectAnonym.toString();
|
|
|
|
const std::string wopiLog(lock ? "WOPI::Lock" : "WOPI::Unlock");
|
|
LOG_DBG(wopiLog << " requesting: " << uriAnonym);
|
|
|
|
try
|
|
{
|
|
std::unique_ptr<Poco::Net::HTTPClientSession> psession(getHTTPClientSession(uriObject));
|
|
|
|
Poco::Net::HTTPRequest request(Poco::Net::HTTPRequest::HTTP_POST, uriObject.getPathAndQuery(), Poco::Net::HTTPMessage::HTTP_1_1);
|
|
request.set("User-Agent", WOPI_AGENT_STRING);
|
|
auth.authorizeRequest(request);
|
|
|
|
request.set("X-WOPI-Override", lock ? "LOCK" : "UNLOCK");
|
|
request.set("X-WOPI-Lock", lockCtx._lockToken);
|
|
if (!getExtendedData().empty())
|
|
request.set("X-LOOL-WOPI-ExtendedData", getExtendedData());
|
|
addStorageDebugCookie(request);
|
|
if (_reuseCookies)
|
|
addStorageReuseCookie(request, params["reuse_cookies"]);
|
|
addWopiProof(request, params["access_token"]);
|
|
|
|
psession->sendRequest(request);
|
|
Poco::Net::HTTPResponse response;
|
|
std::istream& rs = psession->receiveResponse(response);
|
|
|
|
std::ostringstream oss;
|
|
Poco::StreamCopier::copyStream(rs, oss);
|
|
std::string responseString = oss.str();
|
|
|
|
LOG_INF(wopiLog << " response: " << responseString <<
|
|
" status " << response.getStatus());
|
|
|
|
if (response.getStatus() == Poco::Net::HTTPResponse::HTTP_OK)
|
|
{
|
|
lockCtx._isLocked = lock;
|
|
lockCtx._lastLockTime = std::chrono::steady_clock::now();
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
LOG_WRN("Un-successful " << wopiLog << " with status " << response.getStatus() <<
|
|
" and response: " << responseString);
|
|
}
|
|
}
|
|
catch (const Poco::Exception& pexc)
|
|
{
|
|
LOG_ERR("Cannot " << wopiLog << " uri [" << uriAnonym << "]. Error: " <<
|
|
pexc.displayText() << (pexc.nested() ? " (" + pexc.nested()->displayText() + ")" : ""));
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/// uri format: http://server/<...>/wopi*/files/<id>/content
|
|
std::string WopiStorage::loadStorageFileToLocal(const Authorization& auth, LockContext &/* lockCtx */, const std::string& templateUri)
|
|
{
|
|
// WOPI URI to download files ends in '/contents'.
|
|
// Add it here to get the payload instead of file info.
|
|
Poco::URI uriObject(getUri());
|
|
uriObject.setPath(uriObject.getPath() + "/contents");
|
|
auth.authorizeURI(uriObject);
|
|
|
|
std::map<std::string, std::string> params = GetQueryParams(uriObject);
|
|
|
|
Poco::URI uriObjectAnonym(getUri());
|
|
uriObjectAnonym.setPath(LOOLWSD::anonymizeUrl(uriObjectAnonym.getPath()) + "/contents");
|
|
const std::string uriAnonym = uriObjectAnonym.toString();
|
|
|
|
if (!templateUri.empty())
|
|
{
|
|
// template are created in kit process, so just obtain a reference
|
|
setRootFilePath(Poco::Path(getLocalRootPath(), getFileInfo().getFilename()).toString());
|
|
setRootFilePathAnonym(LOOLWSD::anonymizeUrl(getRootFilePath()));
|
|
LOG_INF("Template reference " << getRootFilePathAnonym());
|
|
|
|
setLoaded(true);
|
|
return Poco::Path(getJailPath(), getFileInfo().getFilename()).toString();
|
|
}
|
|
|
|
LOG_DBG("Wopi requesting: " << uriAnonym);
|
|
|
|
const auto startTime = std::chrono::steady_clock::now();
|
|
try
|
|
{
|
|
std::unique_ptr<Poco::Net::HTTPClientSession> psession(getHTTPClientSession(uriObject));
|
|
|
|
Poco::Net::HTTPRequest request(Poco::Net::HTTPRequest::HTTP_GET, uriObject.getPathAndQuery(), Poco::Net::HTTPMessage::HTTP_1_1);
|
|
request.set("User-Agent", WOPI_AGENT_STRING);
|
|
auth.authorizeRequest(request);
|
|
addStorageDebugCookie(request);
|
|
if (_reuseCookies)
|
|
addStorageReuseCookie(request, params["reuse_cookies"]);
|
|
addWopiProof(request, params["access_token"]);
|
|
psession->sendRequest(request);
|
|
|
|
Poco::Net::HTTPResponse response;
|
|
std::istream& rs = psession->receiveResponse(response);
|
|
const std::chrono::duration<double> diff = (std::chrono::steady_clock::now() - startTime);
|
|
_wopiLoadDuration += diff;
|
|
|
|
Log::StreamLogger logger = Log::trace();
|
|
if (logger.enabled())
|
|
{
|
|
logger << "WOPI::GetFile header for URI [" << uriAnonym << "]:\n";
|
|
for (const auto& pair : response)
|
|
{
|
|
logger << '\t' << pair.first << ": " << pair.second << " / ";
|
|
}
|
|
|
|
LOG_END(logger, true);
|
|
}
|
|
|
|
if (response.getStatus() != Poco::Net::HTTPResponse::HTTP_OK)
|
|
{
|
|
LOG_ERR("WOPI::GetFile failed with " << response.getStatus() << ' ' << response.getReason());
|
|
throw StorageConnectionException("WOPI::GetFile failed");
|
|
}
|
|
else // Successful
|
|
{
|
|
setRootFilePath(Poco::Path(getLocalRootPath(), getFileInfo().getFilename()).toString());
|
|
setRootFilePathAnonym(LOOLWSD::anonymizeUrl(getRootFilePath()));
|
|
std::ofstream ofs(getRootFilePath());
|
|
std::copy(std::istreambuf_iterator<char>(rs),
|
|
std::istreambuf_iterator<char>(),
|
|
std::ostreambuf_iterator<char>(ofs));
|
|
ofs.close();
|
|
LOG_INF("WOPI::GetFile downloaded " << getFileSize(getRootFilePath()) << " bytes from [" <<
|
|
uriAnonym << "] -> " << getRootFilePathAnonym() << " in " << diff.count() << "s");
|
|
setLoaded(true);
|
|
|
|
// Now return the jailed path.
|
|
return Poco::Path(getJailPath(), getFileInfo().getFilename()).toString();
|
|
}
|
|
}
|
|
catch (const Poco::Exception& pexc)
|
|
{
|
|
LOG_ERR("Cannot load document from WOPI storage uri [" + uriAnonym + "]. Error: " <<
|
|
pexc.displayText() << (pexc.nested() ? " (" + pexc.nested()->displayText() + ")" : ""));
|
|
throw;
|
|
}
|
|
|
|
return "";
|
|
}
|
|
|
|
StorageBase::SaveResult WopiStorage::saveLocalFileToStorage(const Authorization& auth, LockContext &lockCtx, const std::string& saveAsPath, const std::string& saveAsFilename, const bool isRename)
|
|
{
|
|
// TODO: Check if this URI has write permission (canWrite = true)
|
|
|
|
const bool isSaveAs = !saveAsPath.empty() && !saveAsFilename.empty();
|
|
const std::string filePath(isSaveAs ? saveAsPath : getRootFilePath());
|
|
const std::string filePathAnonym = LOOLWSD::anonymizeUrl(filePath);
|
|
|
|
const size_t size = getFileSize(filePath);
|
|
|
|
Poco::URI uriObject(getUri());
|
|
uriObject.setPath(isSaveAs || isRename? uriObject.getPath(): uriObject.getPath() + "/contents");
|
|
auth.authorizeURI(uriObject);
|
|
|
|
std::map<std::string, std::string> params = GetQueryParams(uriObject);
|
|
|
|
const std::string uriAnonym = LOOLWSD::anonymizeUrl(uriObject.toString());
|
|
|
|
LOG_INF("Uploading URI via WOPI [" << uriAnonym << "] from [" << filePathAnonym + "].");
|
|
|
|
StorageBase::SaveResult saveResult(StorageBase::SaveResult::FAILED);
|
|
const auto startTime = std::chrono::steady_clock::now();
|
|
try
|
|
{
|
|
std::unique_ptr<Poco::Net::HTTPClientSession> psession(getHTTPClientSession(uriObject));
|
|
|
|
Poco::Net::HTTPRequest request(Poco::Net::HTTPRequest::HTTP_POST, uriObject.getPathAndQuery(), Poco::Net::HTTPMessage::HTTP_1_1);
|
|
request.set("User-Agent", WOPI_AGENT_STRING);
|
|
auth.authorizeRequest(request);
|
|
|
|
if (!isSaveAs && !isRename)
|
|
{
|
|
// normal save
|
|
request.set("X-WOPI-Override", "PUT");
|
|
if (lockCtx._supportsLocks)
|
|
request.set("X-WOPI-Lock", lockCtx._lockToken);
|
|
request.set("X-LOOL-WOPI-IsModifiedByUser", isUserModified()? "true": "false");
|
|
request.set("X-LOOL-WOPI-IsAutosave", getIsAutosave()? "true": "false");
|
|
request.set("X-LOOL-WOPI-IsExitSave", isExitSave()? "true": "false");
|
|
if (!getExtendedData().empty())
|
|
request.set("X-LOOL-WOPI-ExtendedData", getExtendedData());
|
|
|
|
if (!getForceSave())
|
|
{
|
|
// Request WOPI host to not overwrite if timestamps mismatch
|
|
request.set("X-LOOL-WOPI-Timestamp", Util::getIso8601FracformatTime(getFileInfo().getModifiedTime()));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// the suggested target has to be in UTF-7; default to extension
|
|
// only when the conversion fails
|
|
std::string suggestedTarget = '.' + Poco::Path(saveAsFilename).getExtension();
|
|
|
|
//TODO: Perhaps we should cache this descriptor and reuse, as iconv_open might be expensive.
|
|
const iconv_t cd = iconv_open("UTF-7", "UTF-8");
|
|
if (cd == (iconv_t) -1)
|
|
LOG_ERR("Failed to initialize iconv for UTF-7 conversion, using '" << suggestedTarget << "'.");
|
|
else
|
|
{
|
|
std::vector<char> input(saveAsFilename.begin(), saveAsFilename.end());
|
|
std::vector<char> buffer(8 * saveAsFilename.size());
|
|
|
|
char* in = &input[0];
|
|
size_t in_left = input.size();
|
|
char* out = &buffer[0];
|
|
size_t out_left = buffer.size();
|
|
|
|
if (iconv(cd, &in, &in_left, &out, &out_left) == (size_t) -1)
|
|
LOG_ERR("Failed to convert '" << saveAsFilename << "' to UTF-7, using '" << suggestedTarget << "'.");
|
|
else
|
|
{
|
|
// conversion succeeded
|
|
suggestedTarget = std::string(&buffer[0], buffer.size() - out_left);
|
|
LOG_TRC("Converted '" << saveAsFilename << "' to UTF-7 as '" << suggestedTarget << "'.");
|
|
}
|
|
|
|
iconv_close(cd);
|
|
}
|
|
|
|
if (isRename)
|
|
{
|
|
// rename file
|
|
request.set("X-WOPI-Override", "RENAME_FILE");
|
|
request.set("X-WOPI-RequestedName", suggestedTarget);
|
|
}
|
|
else
|
|
{
|
|
// save as
|
|
request.set("X-WOPI-Override", "PUT_RELATIVE");
|
|
request.set("X-WOPI-Size", std::to_string(size));
|
|
request.set("X-WOPI-SuggestedTarget", suggestedTarget);
|
|
}
|
|
}
|
|
|
|
request.setContentType("application/octet-stream");
|
|
request.setContentLength(size);
|
|
addStorageDebugCookie(request);
|
|
if (_reuseCookies)
|
|
addStorageReuseCookie(request, params["reuse_cookies"]);
|
|
addWopiProof(request, params["access_token"]);
|
|
std::ostream& os = psession->sendRequest(request);
|
|
|
|
std::ifstream ifs(filePath);
|
|
Poco::StreamCopier::copyStream(ifs, os);
|
|
|
|
Poco::Net::HTTPResponse response;
|
|
std::istream& rs = psession->receiveResponse(response);
|
|
|
|
_wopiSaveDuration = std::chrono::steady_clock::now() - startTime;
|
|
|
|
std::ostringstream oss;
|
|
Poco::StreamCopier::copyStream(rs, oss);
|
|
std::string responseString = oss.str();
|
|
|
|
const std::string wopiLog(isSaveAs ? "WOPI::PutRelativeFile" : (isRename ? "WOPI::RenameFile":"WOPI::PutFile"));
|
|
|
|
if (Log::infoEnabled())
|
|
{
|
|
if (LOOLWSD::AnonymizeUserData)
|
|
{
|
|
Poco::JSON::Object::Ptr object;
|
|
if (JsonUtil::parseJSON(responseString, object))
|
|
{
|
|
// Anonymize the filename
|
|
std::string url;
|
|
std::string filename;
|
|
if (JsonUtil::findJSONValue(object, "Url", url) &&
|
|
JsonUtil::findJSONValue(object, "Name", filename))
|
|
{
|
|
// Get the FileId form the URL, which we use as the anonymized filename.
|
|
std::string decodedUrl;
|
|
Poco::URI::decode(url, decodedUrl);
|
|
const std::string obfuscatedFileId = Util::getFilenameFromURL(decodedUrl);
|
|
Util::mapAnonymized(obfuscatedFileId, obfuscatedFileId); // Identity, to avoid re-anonymizing.
|
|
|
|
const std::string filenameOnly = Util::getFilenameFromURL(filename);
|
|
Util::mapAnonymized(filenameOnly, obfuscatedFileId);
|
|
object->set("Name", LOOLWSD::anonymizeUrl(filename));
|
|
}
|
|
|
|
// Stringify to log.
|
|
std::ostringstream ossResponse;
|
|
object->stringify(ossResponse);
|
|
responseString = ossResponse.str();
|
|
}
|
|
}
|
|
|
|
LOG_INF(wopiLog << " response: " << responseString);
|
|
LOG_INF(wopiLog << " uploaded " << size << " bytes from [" << filePathAnonym <<
|
|
"] -> [" << uriAnonym << "]: " << response.getStatus() << " " << response.getReason());
|
|
}
|
|
|
|
if (response.getStatus() == Poco::Net::HTTPResponse::HTTP_OK)
|
|
{
|
|
saveResult.setResult(StorageBase::SaveResult::OK);
|
|
Poco::JSON::Object::Ptr object;
|
|
if (JsonUtil::parseJSON(oss.str(), object))
|
|
{
|
|
const std::string lastModifiedTime = JsonUtil::getJSONValue<std::string>(object, "LastModifiedTime");
|
|
LOG_TRC(wopiLog << " returns LastModifiedTime [" << lastModifiedTime << "].");
|
|
getFileInfo().setModifiedTime(Util::iso8601ToTimestamp(lastModifiedTime, "LastModifiedTime"));
|
|
|
|
if (isSaveAs || isRename)
|
|
{
|
|
const std::string name = JsonUtil::getJSONValue<std::string>(object, "Name");
|
|
LOG_TRC(wopiLog << " returns Name [" << LOOLWSD::anonymizeUrl(name) << "].");
|
|
|
|
const std::string url = JsonUtil::getJSONValue<std::string>(object, "Url");
|
|
LOG_TRC(wopiLog << " returns Url [" << LOOLWSD::anonymizeUrl(url) << "].");
|
|
|
|
saveResult.setSaveAsResult(name, url);
|
|
}
|
|
// Reset the force save flag now, if any, since we are done saving
|
|
// Next saves shouldn't be saved forcefully unless commanded
|
|
forceSave(false);
|
|
}
|
|
else
|
|
{
|
|
LOG_WRN("Invalid or missing JSON in " << wopiLog << " HTTP_OK response.");
|
|
}
|
|
}
|
|
else if (response.getStatus() == Poco::Net::HTTPResponse::HTTP_REQUESTENTITYTOOLARGE)
|
|
{
|
|
saveResult.setResult(StorageBase::SaveResult::DISKFULL);
|
|
}
|
|
else if (response.getStatus() == Poco::Net::HTTPResponse::HTTP_UNAUTHORIZED ||
|
|
response.getStatus() == Poco::Net::HTTPResponse::HTTP_FORBIDDEN)
|
|
{
|
|
saveResult.setResult(StorageBase::SaveResult::UNAUTHORIZED);
|
|
}
|
|
else if (response.getStatus() == Poco::Net::HTTPResponse::HTTP_CONFLICT)
|
|
{
|
|
saveResult.setResult(StorageBase::SaveResult::CONFLICT);
|
|
Poco::JSON::Object::Ptr object;
|
|
if (JsonUtil::parseJSON(oss.str(), object))
|
|
{
|
|
const unsigned loolStatusCode = JsonUtil::getJSONValue<unsigned>(object, "LOOLStatusCode");
|
|
if (loolStatusCode == static_cast<unsigned>(LOOLStatusCode::DOC_CHANGED))
|
|
{
|
|
saveResult.setResult(StorageBase::SaveResult::DOC_CHANGED);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOG_WRN("Invalid or missing JSON in " << wopiLog << " HTTP_CONFLICT response.");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Internal server error, and other failures.
|
|
LOG_ERR("Unexpected response to " << wopiLog << " : " << response.getStatus() <<
|
|
"Cannot save file to WOPI storage uri [" << uriAnonym << "]. Error: ");
|
|
saveResult.setResult(StorageBase::SaveResult::FAILED);
|
|
}
|
|
}
|
|
catch (const Poco::Exception& pexc)
|
|
{
|
|
LOG_ERR("Cannot save file to WOPI storage uri [" << uriAnonym << "]. Error: " <<
|
|
pexc.displayText() << (pexc.nested() ? " (" + pexc.nested()->displayText() + ")" : ""));
|
|
saveResult.setResult(StorageBase::SaveResult::FAILED);
|
|
}
|
|
|
|
return saveResult;
|
|
}
|
|
|
|
std::string WebDAVStorage::loadStorageFileToLocal(
|
|
const Authorization& /*auth*/, LockContext &/*lockCtx*/, const std::string& /*templateUri*/)
|
|
{
|
|
// TODO: implement webdav GET.
|
|
setLoaded(true);
|
|
return getUri().toString();
|
|
}
|
|
|
|
StorageBase::SaveResult WebDAVStorage::saveLocalFileToStorage(
|
|
const Authorization& /*auth*/, LockContext &/*lockCtx*/, const std::string& /*saveAsPath*/,
|
|
const std::string& /*saveAsFilename*/, bool /*isRename*/)
|
|
{
|
|
// TODO: implement webdav PUT.
|
|
return StorageBase::SaveResult(StorageBase::SaveResult::OK);
|
|
}
|
|
|
|
#endif // !MOBILEAPP
|
|
|
|
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|