strukturag_nextcloud-spreed.../capabilities.go
Joachim Bauch eadded9aa2
Migrate cache-control parsing to https://github.com/pquerna/cachecontrol
The previously used code was unmaintained for a very long time and caused problems for packagers.
2025-02-06 10:59:53 +01:00

445 lines
11 KiB
Go

/**
* Standalone signaling server for the Nextcloud Spreed app.
* Copyright (C) 2022 struktur AG
*
* @author Joachim Bauch <bauch@struktur.de>
*
* @license GNU AGPL version 3 or any later version
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package signaling
import (
"context"
"encoding/json"
"errors"
"io"
"log"
"net/http"
"net/url"
"strings"
"sync"
"time"
"github.com/pquerna/cachecontrol/cacheobject"
)
const (
// Name of the "Talk" app in Nextcloud.
AppNameSpreed = "spreed"
// Name of capability to enable the "v3" API for the signaling endpoint.
FeatureSignalingV3Api = "signaling-v3"
// Name of capability that is set if the server supports Federation V2.
FeatureFederationV2 = "federation-v2"
// minCapabilitiesCacheDuration specifies the minimum duration to cache
// capabilities.
// This could overwrite the "max-age" from a "Cache-Control" header.
minCapabilitiesCacheDuration = time.Minute
// Don't invalidate more than once per minute.
maxInvalidateInterval = time.Minute
)
var (
ErrUnexpectedHttpStatus = errors.New("unexpected_http_status")
)
type capabilitiesEntry struct {
c *Capabilities
mu sync.RWMutex
nextUpdate time.Time
etag string
mustRevalidate bool
capabilities map[string]interface{}
}
func newCapabilitiesEntry(c *Capabilities) *capabilitiesEntry {
return &capabilitiesEntry{
c: c,
}
}
func (e *capabilitiesEntry) valid(now time.Time) bool {
e.mu.RLock()
defer e.mu.RUnlock()
return e.validLocked(now)
}
func (e *capabilitiesEntry) validLocked(now time.Time) bool {
return e.nextUpdate.After(now)
}
func (e *capabilitiesEntry) updateRequest(r *http.Request) {
if e.etag != "" {
r.Header.Set("If-None-Match", e.etag)
}
}
func (e *capabilitiesEntry) invalidate() {
e.mu.Lock()
defer e.mu.Unlock()
e.nextUpdate = time.Now()
}
func (e *capabilitiesEntry) errorIfMustRevalidate(err error) (bool, error) {
if !e.mustRevalidate {
return false, nil
}
e.capabilities = nil
return false, err
}
func (e *capabilitiesEntry) update(ctx context.Context, u *url.URL, now time.Time) (bool, error) {
e.mu.Lock()
defer e.mu.Unlock()
if e.validLocked(now) {
// Capabilities were updated while waiting for the lock.
return false, nil
}
capUrl := *u
if !strings.Contains(capUrl.Path, "ocs/v2.php") {
if !strings.HasSuffix(capUrl.Path, "/") {
capUrl.Path += "/"
}
capUrl.Path = capUrl.Path + "ocs/v2.php/cloud/capabilities"
} else if pos := strings.Index(capUrl.Path, "/ocs/v2.php/"); pos >= 0 {
capUrl.Path = capUrl.Path[:pos+11] + "/cloud/capabilities"
}
log.Printf("Capabilities expired for %s, updating", capUrl.String())
client, pool, err := e.c.pool.Get(ctx, &capUrl)
if err != nil {
log.Printf("Could not get client for host %s: %s", capUrl.Host, err)
return false, err
}
defer pool.Put(client)
req, err := http.NewRequestWithContext(ctx, "GET", capUrl.String(), nil)
if err != nil {
log.Printf("Could not create request to %s: %s", &capUrl, err)
return false, err
}
req.Header.Set("Accept", "application/json")
req.Header.Set("OCS-APIRequest", "true")
req.Header.Set("User-Agent", "nextcloud-spreed-signaling/"+e.c.version)
e.updateRequest(req)
response, err := client.Do(req)
if err != nil {
return false, err
}
defer response.Body.Close()
url := response.Request.URL
e.etag = response.Header.Get("ETag")
var maxAge time.Duration
if cacheControl := response.Header.Get("Cache-Control"); cacheControl != "" {
if cc, err := cacheobject.ParseResponseCacheControl(cacheControl); err == nil {
if !cc.NoCachePresent && cc.MaxAge > 0 {
maxAge = time.Duration(cc.MaxAge) * time.Second
}
e.mustRevalidate = cc.MustRevalidate
}
}
if maxAge < minCapabilitiesCacheDuration {
maxAge = minCapabilitiesCacheDuration
}
e.nextUpdate = now.Add(maxAge)
if response.StatusCode == http.StatusNotModified {
log.Printf("Capabilities %+v from %s have not changed", e.capabilities, url)
return false, nil
} else if response.StatusCode != http.StatusOK {
log.Printf("Received unexpected HTTP status from %s: %s", url, response.Status)
return e.errorIfMustRevalidate(ErrUnexpectedHttpStatus)
}
ct := response.Header.Get("Content-Type")
if !strings.HasPrefix(ct, "application/json") {
log.Printf("Received unsupported content-type from %s: %s (%s)", url, ct, response.Status)
return e.errorIfMustRevalidate(ErrUnsupportedContentType)
}
body, err := io.ReadAll(response.Body)
if err != nil {
log.Printf("Could not read response body from %s: %s", url, err)
return e.errorIfMustRevalidate(err)
}
var ocs OcsResponse
if err := json.Unmarshal(body, &ocs); err != nil {
log.Printf("Could not decode OCS response %s from %s: %s", string(body), url, err)
return e.errorIfMustRevalidate(err)
} else if ocs.Ocs == nil || len(ocs.Ocs.Data) == 0 {
log.Printf("Incomplete OCS response %s from %s", string(body), url)
return e.errorIfMustRevalidate(ErrIncompleteResponse)
}
var capaResponse CapabilitiesResponse
if err := json.Unmarshal(ocs.Ocs.Data, &capaResponse); err != nil {
log.Printf("Could not decode OCS response body %s from %s: %s", string(ocs.Ocs.Data), url, err)
return e.errorIfMustRevalidate(err)
}
capaObj, found := capaResponse.Capabilities[AppNameSpreed]
if !found || len(capaObj) == 0 {
log.Printf("No capabilities received for app spreed from %s: %+v", url, capaResponse)
e.capabilities = nil
return false, nil
}
var capa map[string]interface{}
if err := json.Unmarshal(capaObj, &capa); err != nil {
log.Printf("Unsupported capabilities received for app spreed from %s: %+v", url, capaResponse)
e.capabilities = nil
return false, nil
}
log.Printf("Received capabilities %+v from %s", capa, url)
e.capabilities = capa
return true, nil
}
func (e *capabilitiesEntry) GetCapabilities() map[string]interface{} {
e.mu.RLock()
defer e.mu.RUnlock()
return e.capabilities
}
type Capabilities struct {
mu sync.RWMutex
// Can be overwritten by tests.
getNow func() time.Time
version string
pool *HttpClientPool
entries map[string]*capabilitiesEntry
nextInvalidate map[string]time.Time
}
func NewCapabilities(version string, pool *HttpClientPool) (*Capabilities, error) {
result := &Capabilities{
getNow: time.Now,
version: version,
pool: pool,
entries: make(map[string]*capabilitiesEntry),
nextInvalidate: make(map[string]time.Time),
}
return result, nil
}
type CapabilitiesVersion struct {
Major int `json:"major"`
Minor int `json:"minor"`
Micro int `json:"micro"`
String string `json:"string"`
Edition string `json:"edition"`
ExtendedSupport bool `json:"extendedSupport"`
}
type CapabilitiesResponse struct {
Version CapabilitiesVersion `json:"version"`
Capabilities map[string]json.RawMessage `json:"capabilities"`
}
func (c *Capabilities) getCapabilities(key string) (*capabilitiesEntry, bool) {
c.mu.RLock()
defer c.mu.RUnlock()
now := c.getNow()
entry, found := c.entries[key]
if !found {
// Upgrade to write-lock
c.mu.RUnlock()
defer c.mu.RLock()
entry = c.newCapabilitiesEntry(key)
}
return entry, entry.valid(now)
}
func (c *Capabilities) invalidateCapabilities(key string) {
c.mu.Lock()
defer c.mu.Unlock()
now := c.getNow()
if entry, found := c.nextInvalidate[key]; found && entry.After(now) {
return
}
if entry, found := c.entries[key]; found {
entry.invalidate()
}
c.nextInvalidate[key] = now.Add(maxInvalidateInterval)
}
func (c *Capabilities) newCapabilitiesEntry(key string) *capabilitiesEntry {
c.mu.Lock()
defer c.mu.Unlock()
entry, found := c.entries[key]
if !found {
entry = newCapabilitiesEntry(c)
c.entries[key] = entry
}
return entry
}
func (c *Capabilities) getKeyForUrl(u *url.URL) string {
key := u.String()
return key
}
func (c *Capabilities) loadCapabilities(ctx context.Context, u *url.URL) (map[string]interface{}, bool, error) {
key := c.getKeyForUrl(u)
entry, valid := c.getCapabilities(key)
if valid {
return entry.GetCapabilities(), true, nil
}
updated, err := entry.update(ctx, u, c.getNow())
if err != nil {
return nil, false, err
}
return entry.GetCapabilities(), !updated, nil
}
func (c *Capabilities) HasCapabilityFeature(ctx context.Context, u *url.URL, feature string) bool {
caps, _, err := c.loadCapabilities(ctx, u)
if err != nil {
log.Printf("Could not get capabilities for %s: %s", u, err)
return false
}
featuresInterface := caps["features"]
if featuresInterface == nil {
return false
}
features, ok := featuresInterface.([]interface{})
if !ok {
log.Printf("Invalid features list received for %s: %+v", u, featuresInterface)
return false
}
for _, entry := range features {
if entry == feature {
return true
}
}
return false
}
func (c *Capabilities) getConfigGroup(ctx context.Context, u *url.URL, group string) (map[string]interface{}, bool, bool) {
caps, cached, err := c.loadCapabilities(ctx, u)
if err != nil {
log.Printf("Could not get capabilities for %s: %s", u, err)
return nil, cached, false
}
configInterface := caps["config"]
if configInterface == nil {
return nil, cached, false
}
config, ok := configInterface.(map[string]interface{})
if !ok {
log.Printf("Invalid config mapping received from %s: %+v", u, configInterface)
return nil, cached, false
}
groupInterface := config[group]
if groupInterface == nil {
return nil, cached, false
}
groupConfig, ok := groupInterface.(map[string]interface{})
if !ok {
log.Printf("Invalid group mapping \"%s\" received from %s: %+v", group, u, groupInterface)
return nil, cached, false
}
return groupConfig, cached, true
}
func (c *Capabilities) GetIntegerConfig(ctx context.Context, u *url.URL, group, key string) (int, bool, bool) {
groupConfig, cached, found := c.getConfigGroup(ctx, u, group)
if !found {
return 0, cached, false
}
value, found := groupConfig[key]
if !found {
return 0, cached, false
}
switch value := value.(type) {
case int:
return value, cached, true
case float32:
return int(value), cached, true
case float64:
return int(value), cached, true
default:
log.Printf("Invalid config value for \"%s\" received from %s: %+v", key, u, value)
}
return 0, cached, false
}
func (c *Capabilities) GetStringConfig(ctx context.Context, u *url.URL, group, key string) (string, bool, bool) {
groupConfig, cached, found := c.getConfigGroup(ctx, u, group)
if !found {
return "", cached, false
}
value, found := groupConfig[key]
if !found {
return "", cached, false
}
switch value := value.(type) {
case string:
return value, cached, true
default:
log.Printf("Invalid config value for \"%s\" received from %s: %+v", key, u, value)
}
return "", cached, false
}
func (c *Capabilities) InvalidateCapabilities(u *url.URL) {
key := c.getKeyForUrl(u)
c.invalidateCapabilities(key)
}