0
0
Fork 0
mirror of https://github.com/strukturag/nextcloud-spreed-signaling.git synced 2025-04-04 19:45:21 +00:00
strukturag_nextcloud-spreed.../capabilities.go
Joachim Bauch 147fb2305c
Don't update capabilities concurrently from same host.
If capabilities are expired and requested from multiple clients concurrently,
this could cause concurrent (duplicate) requests to the same Nextcloud host.
With this change, only a single request is sent to Nextcloud in such cases.
2024-10-09 15:37:08 +02:00

446 lines
11 KiB
Go

/**
* Standalone signaling server for the Nextcloud Spreed app.
* Copyright (C) 2022 struktur AG
*
* @author Joachim Bauch <bauch@struktur.de>
*
* @license GNU AGPL version 3 or any later version
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package signaling
import (
"context"
"encoding/json"
"errors"
"io"
"log"
"net/http"
"net/url"
"strings"
"sync"
"time"
"github.com/marcw/cachecontrol"
)
const (
// Name of the "Talk" app in Nextcloud.
AppNameSpreed = "spreed"
// Name of capability to enable the "v3" API for the signaling endpoint.
FeatureSignalingV3Api = "signaling-v3"
// Name of capability that is set if the server supports Federation V2.
FeatureFederationV2 = "federation-v2"
// minCapabilitiesCacheDuration specifies the minimum duration to cache
// capabilities.
// This could overwrite the "max-age" from a "Cache-Control" header.
minCapabilitiesCacheDuration = time.Minute
// Don't invalidate more than once per minute.
maxInvalidateInterval = time.Minute
)
var (
ErrUnexpectedHttpStatus = errors.New("unexpected_http_status")
)
type capabilitiesEntry struct {
c *Capabilities
mu sync.RWMutex
nextUpdate time.Time
etag string
mustRevalidate bool
capabilities map[string]interface{}
}
func newCapabilitiesEntry(c *Capabilities) *capabilitiesEntry {
return &capabilitiesEntry{
c: c,
}
}
func (e *capabilitiesEntry) valid(now time.Time) bool {
e.mu.RLock()
defer e.mu.RUnlock()
return e.validLocked(now)
}
func (e *capabilitiesEntry) validLocked(now time.Time) bool {
return e.nextUpdate.After(now)
}
func (e *capabilitiesEntry) updateRequest(r *http.Request) {
if e.etag != "" {
r.Header.Set("If-None-Match", e.etag)
}
}
func (e *capabilitiesEntry) invalidate() {
e.mu.Lock()
defer e.mu.Unlock()
e.nextUpdate = time.Now()
}
func (e *capabilitiesEntry) errorIfMustRevalidate(err error) (bool, error) {
if !e.mustRevalidate {
return false, nil
}
e.capabilities = nil
return false, err
}
func (e *capabilitiesEntry) update(ctx context.Context, u *url.URL, now time.Time) (bool, error) {
e.mu.Lock()
defer e.mu.Unlock()
if e.validLocked(now) {
// Capabilities were updated while waiting for the lock.
return false, nil
}
capUrl := *u
if !strings.Contains(capUrl.Path, "ocs/v2.php") {
if !strings.HasSuffix(capUrl.Path, "/") {
capUrl.Path += "/"
}
capUrl.Path = capUrl.Path + "ocs/v2.php/cloud/capabilities"
} else if pos := strings.Index(capUrl.Path, "/ocs/v2.php/"); pos >= 0 {
capUrl.Path = capUrl.Path[:pos+11] + "/cloud/capabilities"
}
log.Printf("Capabilities expired for %s, updating", capUrl.String())
client, pool, err := e.c.pool.Get(ctx, &capUrl)
if err != nil {
log.Printf("Could not get client for host %s: %s", capUrl.Host, err)
return false, err
}
defer pool.Put(client)
req, err := http.NewRequestWithContext(ctx, "GET", capUrl.String(), nil)
if err != nil {
log.Printf("Could not create request to %s: %s", &capUrl, err)
return false, err
}
req.Header.Set("Accept", "application/json")
req.Header.Set("OCS-APIRequest", "true")
req.Header.Set("User-Agent", "nextcloud-spreed-signaling/"+e.c.version)
e.updateRequest(req)
response, err := client.Do(req)
if err != nil {
return false, err
}
defer response.Body.Close()
url := response.Request.URL
e.etag = response.Header.Get("ETag")
var maxAge time.Duration
if cacheControl := response.Header.Get("Cache-Control"); cacheControl != "" {
cc := cachecontrol.Parse(cacheControl)
if nc, _ := cc.NoCache(); !nc {
maxAge = cc.MaxAge()
}
if maxAge < minCapabilitiesCacheDuration {
maxAge = minCapabilitiesCacheDuration
}
e.mustRevalidate = cc.MustRevalidate()
} else {
maxAge = minCapabilitiesCacheDuration
}
e.nextUpdate = now.Add(maxAge)
if response.StatusCode == http.StatusNotModified {
log.Printf("Capabilities %+v from %s have not changed", e.capabilities, url)
return false, nil
} else if response.StatusCode != http.StatusOK {
log.Printf("Received unexpected HTTP status from %s: %s", url, response.Status)
return e.errorIfMustRevalidate(ErrUnexpectedHttpStatus)
}
ct := response.Header.Get("Content-Type")
if !strings.HasPrefix(ct, "application/json") {
log.Printf("Received unsupported content-type from %s: %s (%s)", url, ct, response.Status)
return e.errorIfMustRevalidate(ErrUnsupportedContentType)
}
body, err := io.ReadAll(response.Body)
if err != nil {
log.Printf("Could not read response body from %s: %s", url, err)
return e.errorIfMustRevalidate(err)
}
var ocs OcsResponse
if err := json.Unmarshal(body, &ocs); err != nil {
log.Printf("Could not decode OCS response %s from %s: %s", string(body), url, err)
return e.errorIfMustRevalidate(err)
} else if ocs.Ocs == nil || len(ocs.Ocs.Data) == 0 {
log.Printf("Incomplete OCS response %s from %s", string(body), url)
return e.errorIfMustRevalidate(ErrIncompleteResponse)
}
var capaResponse CapabilitiesResponse
if err := json.Unmarshal(ocs.Ocs.Data, &capaResponse); err != nil {
log.Printf("Could not decode OCS response body %s from %s: %s", string(ocs.Ocs.Data), url, err)
return e.errorIfMustRevalidate(err)
}
capaObj, found := capaResponse.Capabilities[AppNameSpreed]
if !found || len(capaObj) == 0 {
log.Printf("No capabilities received for app spreed from %s: %+v", url, capaResponse)
e.capabilities = nil
return false, nil
}
var capa map[string]interface{}
if err := json.Unmarshal(capaObj, &capa); err != nil {
log.Printf("Unsupported capabilities received for app spreed from %s: %+v", url, capaResponse)
e.capabilities = nil
return false, nil
}
log.Printf("Received capabilities %+v from %s", capa, url)
e.capabilities = capa
return true, nil
}
func (e *capabilitiesEntry) GetCapabilities() map[string]interface{} {
e.mu.RLock()
defer e.mu.RUnlock()
return e.capabilities
}
type Capabilities struct {
mu sync.RWMutex
// Can be overwritten by tests.
getNow func() time.Time
version string
pool *HttpClientPool
entries map[string]*capabilitiesEntry
nextInvalidate map[string]time.Time
}
func NewCapabilities(version string, pool *HttpClientPool) (*Capabilities, error) {
result := &Capabilities{
getNow: time.Now,
version: version,
pool: pool,
entries: make(map[string]*capabilitiesEntry),
nextInvalidate: make(map[string]time.Time),
}
return result, nil
}
type CapabilitiesVersion struct {
Major int `json:"major"`
Minor int `json:"minor"`
Micro int `json:"micro"`
String string `json:"string"`
Edition string `json:"edition"`
ExtendedSupport bool `json:"extendedSupport"`
}
type CapabilitiesResponse struct {
Version CapabilitiesVersion `json:"version"`
Capabilities map[string]json.RawMessage `json:"capabilities"`
}
func (c *Capabilities) getCapabilities(key string) (*capabilitiesEntry, bool) {
c.mu.RLock()
defer c.mu.RUnlock()
now := c.getNow()
entry, found := c.entries[key]
if !found {
// Upgrade to write-lock
c.mu.RUnlock()
defer c.mu.RLock()
entry = c.newCapabilitiesEntry(key)
}
return entry, entry.valid(now)
}
func (c *Capabilities) invalidateCapabilities(key string) {
c.mu.Lock()
defer c.mu.Unlock()
now := c.getNow()
if entry, found := c.nextInvalidate[key]; found && entry.After(now) {
return
}
if entry, found := c.entries[key]; found {
entry.invalidate()
}
c.nextInvalidate[key] = now.Add(maxInvalidateInterval)
}
func (c *Capabilities) newCapabilitiesEntry(key string) *capabilitiesEntry {
c.mu.Lock()
defer c.mu.Unlock()
entry, found := c.entries[key]
if !found {
entry = newCapabilitiesEntry(c)
c.entries[key] = entry
}
return entry
}
func (c *Capabilities) getKeyForUrl(u *url.URL) string {
key := u.String()
return key
}
func (c *Capabilities) loadCapabilities(ctx context.Context, u *url.URL) (map[string]interface{}, bool, error) {
key := c.getKeyForUrl(u)
entry, valid := c.getCapabilities(key)
if valid {
return entry.GetCapabilities(), true, nil
}
updated, err := entry.update(ctx, u, c.getNow())
if err != nil {
return nil, false, err
}
return entry.GetCapabilities(), !updated, nil
}
func (c *Capabilities) HasCapabilityFeature(ctx context.Context, u *url.URL, feature string) bool {
caps, _, err := c.loadCapabilities(ctx, u)
if err != nil {
log.Printf("Could not get capabilities for %s: %s", u, err)
return false
}
featuresInterface := caps["features"]
if featuresInterface == nil {
return false
}
features, ok := featuresInterface.([]interface{})
if !ok {
log.Printf("Invalid features list received for %s: %+v", u, featuresInterface)
return false
}
for _, entry := range features {
if entry == feature {
return true
}
}
return false
}
func (c *Capabilities) getConfigGroup(ctx context.Context, u *url.URL, group string) (map[string]interface{}, bool, bool) {
caps, cached, err := c.loadCapabilities(ctx, u)
if err != nil {
log.Printf("Could not get capabilities for %s: %s", u, err)
return nil, cached, false
}
configInterface := caps["config"]
if configInterface == nil {
return nil, cached, false
}
config, ok := configInterface.(map[string]interface{})
if !ok {
log.Printf("Invalid config mapping received from %s: %+v", u, configInterface)
return nil, cached, false
}
groupInterface := config[group]
if groupInterface == nil {
return nil, cached, false
}
groupConfig, ok := groupInterface.(map[string]interface{})
if !ok {
log.Printf("Invalid group mapping \"%s\" received from %s: %+v", group, u, groupInterface)
return nil, cached, false
}
return groupConfig, cached, true
}
func (c *Capabilities) GetIntegerConfig(ctx context.Context, u *url.URL, group, key string) (int, bool, bool) {
groupConfig, cached, found := c.getConfigGroup(ctx, u, group)
if !found {
return 0, cached, false
}
value, found := groupConfig[key]
if !found {
return 0, cached, false
}
switch value := value.(type) {
case int:
return value, cached, true
case float32:
return int(value), cached, true
case float64:
return int(value), cached, true
default:
log.Printf("Invalid config value for \"%s\" received from %s: %+v", key, u, value)
}
return 0, cached, false
}
func (c *Capabilities) GetStringConfig(ctx context.Context, u *url.URL, group, key string) (string, bool, bool) {
groupConfig, cached, found := c.getConfigGroup(ctx, u, group)
if !found {
return "", cached, false
}
value, found := groupConfig[key]
if !found {
return "", cached, false
}
switch value := value.(type) {
case string:
return value, cached, true
default:
log.Printf("Invalid config value for \"%s\" received from %s: %+v", key, u, value)
}
return "", cached, false
}
func (c *Capabilities) InvalidateCapabilities(u *url.URL) {
key := c.getKeyForUrl(u)
c.invalidateCapabilities(key)
}