mirror of
https://github.com/ONLYOFFICE/server.git
synced 2026-02-10 18:05:07 +08:00
796 lines
34 KiB
JavaScript
796 lines
34 KiB
JavaScript
/*
|
|
* (c) Copyright Ascensio System SIA 2010-2023
|
|
*
|
|
* This program is a free software product. You can redistribute it and/or
|
|
* modify it under the terms of the GNU Affero General Public License (AGPL)
|
|
* version 3 as published by the Free Software Foundation. In accordance with
|
|
* Section 7(a) of the GNU AGPL its Section 15 shall be amended to the effect
|
|
* that Ascensio System SIA expressly excludes the warranty of non-infringement
|
|
* of any third-party rights.
|
|
*
|
|
* This program is distributed WITHOUT ANY WARRANTY; without even the implied
|
|
* warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. For
|
|
* details, see the GNU AGPL at: http://www.gnu.org/licenses/agpl-3.0.html
|
|
*
|
|
* You can contact Ascensio System SIA at 20A-6 Ernesta Birznieka-Upish
|
|
* street, Riga, Latvia, EU, LV-1050.
|
|
*
|
|
* The interactive user interfaces in modified source and object code versions
|
|
* of the Program must display Appropriate Legal Notices, as required under
|
|
* Section 5 of the GNU AGPL version 3.
|
|
*
|
|
* Pursuant to Section 7(b) of the License you must retain the original Product
|
|
* logo when distributing the program. Pursuant to Section 7(e) we decline to
|
|
* grant you any rights under trademark law for use of our trademarks.
|
|
*
|
|
* All the Product's GUI elements, including illustrations and icon sets, as
|
|
* well as technical writing content are licensed under the terms of the
|
|
* Creative Commons Attribution-ShareAlike 4.0 International. See the License
|
|
* terms at http://creativecommons.org/licenses/by-sa/4.0/legalcode
|
|
*
|
|
*/
|
|
|
|
'use strict';
|
|
|
|
const path = require('path');
|
|
const crypto = require('crypto');
|
|
const {URL} = require('url');
|
|
const co = require('co');
|
|
const jwt = require('jsonwebtoken');
|
|
const config = require('config');
|
|
const utf7 = require('utf7');
|
|
const mimeDB = require('mime-db');
|
|
const xmlbuilder2 = require('xmlbuilder2');
|
|
const logger = require('./../../Common/sources/logger');
|
|
const utils = require('./../../Common/sources/utils');
|
|
const constants = require('./../../Common/sources/constants');
|
|
const commonDefines = require('./../../Common/sources/commondefines');
|
|
const operationContext = require('./../../Common/sources/operationContext');
|
|
const tenantManager = require('./../../Common/sources/tenantManager');
|
|
const sqlBase = require('./baseConnector');
|
|
const taskResult = require('./taskresult');
|
|
const canvasService = require('./canvasservice');
|
|
const converterService = require('./converterservice');
|
|
|
|
const cfgTokenOutboxAlgorithm = config.get('services.CoAuthoring.token.outbox.algorithm');
|
|
const cfgTokenOutboxExpires = config.get('services.CoAuthoring.token.outbox.expires');
|
|
const cfgTokenEnableBrowser = config.get('services.CoAuthoring.token.enable.browser');
|
|
const cfgCallbackRequestTimeout = config.get('services.CoAuthoring.server.callbackRequestTimeout');
|
|
const cfgDownloadTimeout = config.get('FileConverter.converter.downloadTimeout');
|
|
const cfgWopiFileInfoBlockList = config.get('wopi.fileInfoBlockList');
|
|
const cfgWopiWopiZone = config.get('wopi.wopiZone');
|
|
const cfgWopiPdfView = config.get('wopi.pdfView');
|
|
const cfgWopiWordView = config.get('wopi.wordView');
|
|
const cfgWopiWordEdit = config.get('wopi.wordEdit');
|
|
const cfgWopiCellView = config.get('wopi.cellView');
|
|
const cfgWopiCellEdit = config.get('wopi.cellEdit');
|
|
const cfgWopiSlideView = config.get('wopi.slideView');
|
|
const cfgWopiSlideEdit = config.get('wopi.slideEdit');
|
|
const cfgWopiFavIconUrlWord = config.get('wopi.favIconUrlWord');
|
|
const cfgWopiFavIconUrlCell = config.get('wopi.favIconUrlCell');
|
|
const cfgWopiFavIconUrlSlide = config.get('wopi.favIconUrlSlide');
|
|
const cfgWopiPublicKey = config.get('wopi.publicKey');
|
|
const cfgWopiModulus = config.get('wopi.modulus');
|
|
const cfgWopiExponent = config.get('wopi.exponent');
|
|
const cfgWopiPrivateKey = config.get('wopi.privateKey');
|
|
const cfgWopiPublicKeyOld = config.get('wopi.publicKeyOld');
|
|
const cfgWopiModulusOld = config.get('wopi.modulusOld');
|
|
const cfgWopiExponentOld = config.get('wopi.exponentOld');
|
|
const cfgWopiPrivateKeyOld = config.get('wopi.privateKeyOld');
|
|
const cfgWopiHost = config.get('wopi.host');
|
|
|
|
let fileInfoBlockList = cfgWopiFileInfoBlockList.keys();
|
|
let mimeTypesByExt = (function() {
|
|
let mimeTypesByExt = {};
|
|
for (let mimeType in mimeDB) {
|
|
if (mimeDB.hasOwnProperty(mimeType)) {
|
|
let val = mimeDB[mimeType];
|
|
if (val.extensions) {
|
|
val.extensions.forEach((value) => {
|
|
if (!mimeTypesByExt[value]) {
|
|
mimeTypesByExt[value] = [];
|
|
}
|
|
mimeTypesByExt[value].push(mimeType);
|
|
})
|
|
}
|
|
}
|
|
}
|
|
return mimeTypesByExt;
|
|
})();
|
|
|
|
function discovery(req, res) {
|
|
return co(function*() {
|
|
let output = '';
|
|
const xml = xmlbuilder2.create({version: '1.0', encoding: 'utf-8'});
|
|
let ctx = new operationContext.Context();
|
|
try {
|
|
ctx.initFromRequest(req);
|
|
ctx.logger.info('wopiDiscovery start');
|
|
let baseUrl = cfgWopiHost || utils.getBaseUrlByRequest(req);
|
|
let names = ['Word','Excel','PowerPoint'];
|
|
let favIconUrls = [cfgWopiFavIconUrlWord, cfgWopiFavIconUrlCell, cfgWopiFavIconUrlSlide];
|
|
let exts = [
|
|
{targetext: 'docx', view: cfgWopiPdfView.concat(cfgWopiWordView), edit: cfgWopiWordEdit},
|
|
{targetext: 'xlsx', view: cfgWopiCellView, edit: cfgWopiCellEdit},
|
|
{targetext: 'pptx', view: cfgWopiSlideView, edit: cfgWopiSlideEdit}
|
|
];
|
|
|
|
let templateStart = `${baseUrl}/hosting/wopi`;
|
|
let templateEnd = `&<rs=DC_LLCC&><dchat=DISABLE_CHAT&><embed=EMBEDDED&>`;
|
|
templateEnd += `<fs=FULLSCREEN&><hid=HOST_SESSION_ID&><rec=RECORDING&>`;
|
|
templateEnd += `<sc=SESSION_CONTEXT&><thm=THEME_ID&><ui=UI_LLCC&>`;
|
|
templateEnd += `<wopisrc=WOPI_SOURCE&>&`;
|
|
let documentTypes = [`word`, `cell`, `slide`];
|
|
let xmlZone = xml.ele('wopi-discovery').ele('net-zone', { name: cfgWopiWopiZone });
|
|
//start section for MS WOPI connectors
|
|
for(let i = 0; i < names.length; ++i) {
|
|
let name = names[i];
|
|
let favIconUrl = favIconUrls[i];
|
|
if (!(favIconUrl.startsWith('http://') || favIconUrl.startsWith('https://'))) {
|
|
favIconUrl = baseUrl + favIconUrl;
|
|
}
|
|
let ext = exts[i];
|
|
let urlTemplateView = `${templateStart}/${documentTypes[i]}/view?${templateEnd}`;
|
|
let urlTemplateEmbedView = `${templateStart}/${documentTypes[i]}/view?embed=1${templateEnd}`;
|
|
let urlTemplateMobileView = `${templateStart}/${documentTypes[i]}/view?mobile=1${templateEnd}`;
|
|
let urlTemplateEdit = `${templateStart}/${documentTypes[i]}/edit?${templateEnd}`;
|
|
let urlTemplateMobileEdit = `${templateStart}/${documentTypes[i]}/edit?mobile=1${templateEnd}`;
|
|
let xmlApp = xmlZone.ele('app', {name: name, favIconUrl: favIconUrl});
|
|
for (let j = 0; j < ext.view.length; ++j) {
|
|
xmlApp.ele('action', {name: 'view', ext: ext.view[j], urlsrc: urlTemplateView}).up();
|
|
xmlApp.ele('action', {name: 'embedview', ext: ext.view[j], urlsrc: urlTemplateEmbedView}).up();
|
|
xmlApp.ele('action', {name: 'mobileView', ext: ext.view[j], urlsrc: urlTemplateMobileView}).up();
|
|
if (-1 === cfgWopiPdfView.indexOf(ext.view[j])) {
|
|
let urlConvert = `${templateStart}/convert-and-edit/${ext.view[j]}/${ext.targetext}?${templateEnd}`;
|
|
xmlApp.ele('action', {name: 'convert', ext: ext.view[j], targetext: ext.targetext, requires: 'update', urlsrc: urlConvert}).up();
|
|
}
|
|
}
|
|
for (let j = 0; j < ext.edit.length; ++j) {
|
|
xmlApp.ele('action', {name: 'view', ext: ext.edit[j], urlsrc: urlTemplateView}).up();
|
|
xmlApp.ele('action', {name: 'embedview', ext: ext.edit[j], urlsrc: urlTemplateEmbedView}).up();
|
|
xmlApp.ele('action', {name: 'mobileView', ext: ext.edit[j], urlsrc: urlTemplateMobileView}).up();
|
|
if ("oform" !== ext.edit[j]) {
|
|
//todo config
|
|
xmlApp.ele('action', {name: 'editnew', ext: ext.edit[j], requires: 'locks,update', urlsrc: urlTemplateEdit}).up();
|
|
}
|
|
xmlApp.ele('action', {name: 'edit', ext: ext.edit[j], default: 'true', requires: 'locks,update', urlsrc: urlTemplateEdit}).up();
|
|
xmlApp.ele('action', {name: 'mobileEdit', ext: ext.edit[j], default: 'true', requires: 'locks,update', urlsrc: urlTemplateMobileEdit}).up();
|
|
}
|
|
xmlApp.up();
|
|
}
|
|
//end section for MS WOPI connectors
|
|
//start section for collabora nexcloud connectors
|
|
for(let i = 0; i < exts.length; ++i) {
|
|
let ext = exts[i];
|
|
let urlTemplateView = `${templateStart}/${documentTypes[i]}/view?${templateEnd}`;
|
|
let urlTemplateEmbedView = `${templateStart}/${documentTypes[i]}/view?embed=1${templateEnd}`;
|
|
let urlTemplateMobileView = `${templateStart}/${documentTypes[i]}/view?mobile=1${templateEnd}`;
|
|
let urlTemplateEdit = `${templateStart}/${documentTypes[i]}/edit?${templateEnd}`;
|
|
let urlTemplateMobileEdit = `${templateStart}/${documentTypes[i]}/edit?mobile=1${templateEnd}`;
|
|
for (let j = 0; j < ext.view.length; ++j) {
|
|
let mimeTypes = mimeTypesByExt[ext.view[j]];
|
|
if (mimeTypes) {
|
|
mimeTypes.forEach((value) => {
|
|
let xmlApp = xmlZone.ele('app', {name: value});
|
|
xmlApp.ele('action', {name: 'view', ext: '', default: 'true', urlsrc: urlTemplateView}).up();
|
|
xmlApp.ele('action', {name: 'embedview', ext: '', urlsrc: urlTemplateEmbedView}).up();
|
|
xmlApp.ele('action', {name: 'mobileView', ext: '', urlsrc: urlTemplateMobileView}).up();
|
|
if (-1 === cfgWopiPdfView.indexOf(ext.view[j])) {
|
|
let urlConvert = `${templateStart}/convert-and-edit/${ext.view[j]}/${ext.targetext}?${templateEnd}`;
|
|
xmlApp.ele('action', {name: 'convert', ext: '', targetext: ext.targetext, requires: 'update', urlsrc: urlConvert}).up();
|
|
}
|
|
xmlApp.up();
|
|
});
|
|
}
|
|
}
|
|
for (let j = 0; j < ext.edit.length; ++j) {
|
|
let mimeTypes = mimeTypesByExt[ext.edit[j]];
|
|
if (mimeTypes) {
|
|
mimeTypes.forEach((value) => {
|
|
let xmlApp = xmlZone.ele('app', {name: value});
|
|
xmlApp.ele('action', {name: 'edit', ext: '', default: 'true', requires: 'locks,update', urlsrc: urlTemplateEdit}).up();
|
|
xmlApp.ele('action', {name: 'mobileEdit', ext: '', default: 'true', requires: 'locks,update', urlsrc: urlTemplateMobileEdit}).up();
|
|
xmlApp.up();
|
|
});
|
|
}
|
|
}
|
|
}
|
|
let xmlApp = xmlZone.ele('app', {name: 'Capabilities'});
|
|
xmlApp.ele('action', {ext: '', name: 'getinfo', requires: 'locks,update', urlsrc: `${baseUrl}/hosting/capabilities`}).up();
|
|
xmlApp.up();
|
|
//end section for collabora nexcloud connectors
|
|
let xmlDiscovery = xmlZone.up();
|
|
if (cfgWopiPublicKeyOld && cfgWopiPublicKey) {
|
|
xmlDiscovery.ele('proof-key', {
|
|
oldvalue: cfgWopiPublicKeyOld, oldmodulus: cfgWopiModulusOld, oldexponent: cfgWopiExponentOld,
|
|
value: cfgWopiPublicKey, modulus: cfgWopiModulus, exponent: cfgWopiExponent
|
|
}).up();
|
|
}
|
|
xmlDiscovery.up();
|
|
} catch (err) {
|
|
ctx.logger.error('wopiDiscovery error:%s', err.stack);
|
|
} finally {
|
|
res.setHeader('Content-Type', 'text/xml');
|
|
res.send(xml.end());
|
|
ctx.logger.info('wopiDiscovery end');
|
|
}
|
|
});
|
|
}
|
|
function collaboraCapabilities(req, res) {
|
|
return co(function*() {
|
|
let output = {
|
|
"convert-to": {"available": true, "endpoint":"/lool/convert-to"}, "hasMobileSupport": true, "hasProxyPrefix": false, "hasTemplateSaveAs": false,
|
|
"hasTemplateSource": true, "productVersion": commonDefines.buildVersion
|
|
};
|
|
let ctx = new operationContext.Context();
|
|
try {
|
|
ctx.initFromRequest(req);
|
|
ctx.logger.info('collaboraCapabilities start');
|
|
} catch (err) {
|
|
ctx.logger.error('collaboraCapabilities error:%s', err.stack);
|
|
} finally {
|
|
utils.fillResponseSimple(res, JSON.stringify(output), "application/json");
|
|
ctx.logger.info('collaboraCapabilities end');
|
|
}
|
|
});
|
|
}
|
|
function isWopiCallback(url) {
|
|
return url && url.startsWith("{");
|
|
}
|
|
function isWopiUnlockMarker(url) {
|
|
return isWopiCallback(url) && !!JSON.parse(url).unlockId;
|
|
}
|
|
function isWopiModifiedMarker(url) {
|
|
if (isWopiCallback(url)) {
|
|
let obj = JSON.parse(url);
|
|
return obj.fileInfo && obj.fileInfo.LastModifiedTime
|
|
}
|
|
}
|
|
function getWopiUnlockMarker(wopiParams) {
|
|
if (!wopiParams.userAuth || !wopiParams.commonInfo) {
|
|
return;
|
|
}
|
|
return JSON.stringify(Object.assign({unlockId: wopiParams.commonInfo.lockId}, wopiParams.userAuth));
|
|
}
|
|
function getWopiModifiedMarker(wopiParams, lastModifiedTime) {
|
|
return JSON.stringify(Object.assign({fileInfo: {LastModifiedTime: lastModifiedTime}}, wopiParams.userAuth));
|
|
}
|
|
function getLastModifiedTimeFromCallbacks(callbacks) {
|
|
for (let i = callbacks.length; i >= 0; --i) {
|
|
let callback = callbacks[i];
|
|
let lastModifiedTime = isWopiModifiedMarker(callback);
|
|
if (lastModifiedTime) {
|
|
return lastModifiedTime;
|
|
}
|
|
}
|
|
}
|
|
function isCorrectUserAuth(userAuth) {
|
|
return undefined !== userAuth.wopiSrc;
|
|
}
|
|
function parseWopiCallback(ctx, userAuthStr, opt_url) {
|
|
let wopiParams = null;
|
|
if (isWopiCallback(userAuthStr)) {
|
|
let userAuth = JSON.parse(userAuthStr);
|
|
if (!isCorrectUserAuth(userAuth)) {
|
|
userAuth = null;
|
|
}
|
|
let commonInfo = null;
|
|
let lastModifiedTime = null;
|
|
if (opt_url) {
|
|
let commonInfoStr = sqlBase.UserCallback.prototype.getCallbackByUserIndex(ctx, opt_url, 1);
|
|
if (isWopiCallback(commonInfoStr)) {
|
|
commonInfo = JSON.parse(commonInfoStr);
|
|
if (commonInfo.fileInfo) {
|
|
lastModifiedTime = commonInfo.fileInfo.LastModifiedTime;
|
|
if (lastModifiedTime) {
|
|
let callbacks = sqlBase.UserCallback.prototype.getCallbacks(ctx, opt_url);
|
|
lastModifiedTime = getLastModifiedTimeFromCallbacks(callbacks);
|
|
}
|
|
} else {
|
|
commonInfo = null;
|
|
}
|
|
}
|
|
}
|
|
wopiParams = {commonInfo: commonInfo, userAuth: userAuth, LastModifiedTime: lastModifiedTime};
|
|
ctx.logger.debug('parseWopiCallback wopiParams:%j', wopiParams);
|
|
}
|
|
return wopiParams;
|
|
}
|
|
function checkAndInvalidateCache(ctx, docId, fileInfo) {
|
|
return co(function*() {
|
|
let res = {success: true, lockId: undefined};
|
|
let selectRes = yield taskResult.select(ctx, docId);
|
|
if (selectRes.length > 0) {
|
|
let row = selectRes[0];
|
|
if (row.callback) {
|
|
let commonInfoStr = sqlBase.UserCallback.prototype.getCallbackByUserIndex(ctx, row.callback, 1);
|
|
if (isWopiCallback(commonInfoStr)) {
|
|
let commonInfo = JSON.parse(commonInfoStr);
|
|
res.lockId = commonInfo.lockId;
|
|
ctx.logger.debug('wopiEditor lockId from DB lockId=%s', res.lockId);
|
|
let unlockMarkStr = sqlBase.UserCallback.prototype.getCallbackByUserIndex(ctx, row.callback);
|
|
ctx.logger.debug('wopiEditor commonInfoStr=%s', commonInfoStr);
|
|
ctx.logger.debug('wopiEditor unlockMarkStr=%s', unlockMarkStr);
|
|
let hasUnlockMarker = isWopiUnlockMarker(unlockMarkStr);
|
|
ctx.logger.debug('wopiEditor hasUnlockMarker=%s', hasUnlockMarker);
|
|
if (hasUnlockMarker) {
|
|
let fileInfoVersion = fileInfo.Version;
|
|
let cacheVersion = commonInfo.fileInfo.Version;
|
|
let fileInfoModified = fileInfo.LastModifiedTime;
|
|
let cacheModified = commonInfo.fileInfo.LastModifiedTime;
|
|
ctx.logger.debug('wopiEditor version fileInfo=%s; cache=%s', fileInfoVersion, cacheVersion);
|
|
ctx.logger.debug('wopiEditor LastModifiedTime fileInfo=%s; cache=%s', fileInfoModified, cacheModified);
|
|
if (fileInfoVersion !== cacheVersion || (fileInfoModified !== cacheModified)) {
|
|
var mask = new taskResult.TaskResultData();
|
|
mask.tenant = ctx.tenant;
|
|
mask.key = docId;
|
|
mask.last_open_date = row.last_open_date;
|
|
//cleanupRes can be false in case of simultaneous opening. it is OK
|
|
let cleanupRes = yield canvasService.cleanupCacheIf(ctx, mask);
|
|
ctx.logger.debug('wopiEditor cleanupRes=%s', cleanupRes);
|
|
res.lockId = undefined;
|
|
}
|
|
}
|
|
} else {
|
|
res.success = false;
|
|
ctx.logger.warn('wopiEditor attempt to open not wopi record');
|
|
}
|
|
}
|
|
}
|
|
return res;
|
|
});
|
|
}
|
|
function getEditorHtml(req, res) {
|
|
return co(function*() {
|
|
let params = {key: undefined, fileInfo: {}, userAuth: {}, queryParams: req.query, token: undefined, documentType: undefined};
|
|
let ctx = new operationContext.Context();
|
|
try {
|
|
ctx.initFromRequest(req);
|
|
let wopiSrc = req.query['wopisrc'];
|
|
let fileId = wopiSrc.substring(wopiSrc.lastIndexOf('/') + 1);
|
|
ctx.setDocId(fileId);
|
|
|
|
ctx.logger.info('wopiEditor start');
|
|
ctx.logger.debug(`wopiEditor req.url:%s`, req.url);
|
|
ctx.logger.debug(`wopiEditor req.query:%j`, req.query);
|
|
ctx.logger.debug(`wopiEditor req.body:%j`, req.body);
|
|
params.documentType = req.params.documentType;
|
|
let mode = req.params.mode;
|
|
let sc = req.query['sc'];
|
|
let hostSessionId = req.query['hid'];
|
|
let access_token = req.body['access_token'] || "";
|
|
let access_token_ttl = parseInt(req.body['access_token_ttl']) || 0;
|
|
|
|
|
|
let fileInfo = params.fileInfo = yield checkFileInfo(ctx, wopiSrc, access_token, sc);
|
|
if (!fileInfo) {
|
|
params.fileInfo = {};
|
|
return;
|
|
}
|
|
|
|
if (!fileInfo.UserCanWrite) {
|
|
mode = 'view';
|
|
}
|
|
//docId
|
|
let docId = undefined;
|
|
if ('view' !== mode) {
|
|
docId = `${fileId}`;
|
|
} else {
|
|
//todo rename operation requires lock
|
|
fileInfo.SupportsRename = false;
|
|
//todo change docId to avoid empty cache after editors are gone
|
|
if (fileInfo.LastModifiedTime) {
|
|
docId = `view.${fileId}.${fileInfo.LastModifiedTime}`;
|
|
} else {
|
|
docId = `view.${fileId}.${fileInfo.Version}`;
|
|
}
|
|
}
|
|
docId = docId.replace(constants.DOC_ID_REPLACE_REGEX, '_').substring(0, constants.DOC_ID_MAX_LENGTH);
|
|
ctx.logger.debug(`wopiEditor`);
|
|
params.key = docId;
|
|
let userAuth = params.userAuth = {
|
|
wopiSrc: wopiSrc, access_token: access_token, access_token_ttl: access_token_ttl,
|
|
hostSessionId: hostSessionId, userSessionId: docId, mode: mode
|
|
};
|
|
|
|
//check and invalidate cache
|
|
let checkRes = yield checkAndInvalidateCache(ctx, docId, fileInfo);
|
|
let lockId = checkRes.lockId;
|
|
if (!checkRes.success) {
|
|
params.fileInfo = {};
|
|
return;
|
|
}
|
|
//save common info
|
|
if (undefined === lockId) {
|
|
let fileType = fileInfo.BaseFileName ? fileInfo.BaseFileName.substr(fileInfo.BaseFileName.lastIndexOf('.') + 1) : "";
|
|
fileType = fileInfo.FileExtension ? fileInfo.FileExtension.substr(1) : fileType;
|
|
lockId = crypto.randomBytes(16).toString('base64');
|
|
let commonInfo = JSON.stringify({lockId: lockId, fileInfo: fileInfo});
|
|
yield canvasService.commandOpenStartPromise(ctx, docId, utils.getBaseUrlByRequest(req), 1, commonInfo, fileType);
|
|
}
|
|
|
|
//Lock
|
|
if ('view' !== mode) {
|
|
let lockRes = yield lock(ctx, 'LOCK', lockId, fileInfo, userAuth);
|
|
if (!lockRes) {
|
|
params.fileInfo = {};
|
|
return;
|
|
}
|
|
}
|
|
|
|
for (let i in fileInfoBlockList) {
|
|
if (fileInfoBlockList.hasOwnProperty(i)) {
|
|
delete params.fileInfo[i];
|
|
}
|
|
}
|
|
|
|
if (cfgTokenEnableBrowser) {
|
|
let options = {algorithm: cfgTokenOutboxAlgorithm, expiresIn: cfgTokenOutboxExpires};
|
|
let secret = yield tenantManager.getTenantSecret(ctx, commonDefines.c_oAscSecretType.Browser);
|
|
params.token = jwt.sign(params, secret, options);
|
|
}
|
|
} catch (err) {
|
|
ctx.logger.error('wopiEditor error:%s', err.stack);
|
|
params.fileInfo = {};
|
|
} finally {
|
|
ctx.logger.debug('wopiEditor render params=%j', params);
|
|
try {
|
|
res.render("editor-wopi", params);
|
|
} catch (err) {
|
|
ctx.logger.error('wopiEditor error:%s', err.stack);
|
|
res.sendStatus(400);
|
|
}
|
|
ctx.logger.info('wopiEditor end');
|
|
}
|
|
});
|
|
}
|
|
function getConverterHtml(req, res) {
|
|
return co(function*() {
|
|
let params = {statusHandler: undefined};
|
|
let ctx = new operationContext.Context();
|
|
try {
|
|
ctx.initFromRequest(req);
|
|
let wopiSrc = req.query['wopisrc'];
|
|
let fileId = wopiSrc.substring(wopiSrc.lastIndexOf('/') + 1);
|
|
ctx.setDocId(fileId);
|
|
ctx.logger.info('convert-and-edit start');
|
|
|
|
let access_token = req.body['access_token'] || "";
|
|
let access_token_ttl = parseInt(req.body['access_token_ttl']) || 0;
|
|
let ext = req.params.ext;
|
|
let targetext = req.params.targetext;
|
|
|
|
if (!(wopiSrc && access_token && access_token_ttl && ext && targetext)) {
|
|
ctx.logger.debug('convert-and-edit invalid params: wopiSrc=%s; access_token=%s; access_token_ttl=%s; ext=%s; targetext=%s', wopiSrc, access_token, access_token_ttl, ext, targetext);
|
|
return;
|
|
}
|
|
|
|
let fileInfo = yield checkFileInfo(ctx, wopiSrc, access_token);
|
|
if (!fileInfo) {
|
|
ctx.logger.info('convert-and-edit checkFileInfo error');
|
|
return;
|
|
}
|
|
|
|
let wopiParams = getWopiParams(null, fileInfo, wopiSrc, access_token, access_token_ttl);
|
|
|
|
let docId = yield converterService.convertAndEdit(ctx, wopiParams, ext, targetext);
|
|
if (docId) {
|
|
let baseUrl = cfgWopiHost || utils.getBaseUrlByRequest(req);
|
|
params.statusHandler = `${baseUrl}/hosting/wopi/convert-and-edit-handler`;
|
|
params.statusHandler += `?wopiSrc=${encodeURI(wopiSrc)}&access_token=${encodeURI(access_token)}`;
|
|
params.statusHandler += `&targetext=${encodeURI(targetext)}&docId=${encodeURI(docId)}`;
|
|
if (cfgTokenEnableBrowser) {
|
|
let tokenData = {docId: docId};
|
|
let options = {algorithm: cfgTokenOutboxAlgorithm, expiresIn: cfgTokenOutboxExpires};
|
|
let secret = yield tenantManager.getTenantSecret(ctx, commonDefines.c_oAscSecretType.Browser);
|
|
let token = jwt.sign(tokenData, secret, options);
|
|
|
|
params.statusHandler += `&token=${encodeURI(token)}`;
|
|
}
|
|
}
|
|
} catch (err) {
|
|
ctx.logger.error('convert-and-edit error:%s', err.stack);
|
|
} finally {
|
|
ctx.logger.debug('convert-and-edit render params=%j', params);
|
|
try {
|
|
res.render("convert-and-edit-wopi", params);
|
|
} catch (err) {
|
|
ctx.logger.error('convert-and-edit error:%s', err.stack);
|
|
res.sendStatus(400);
|
|
}
|
|
ctx.logger.info('convert-and-edit end');
|
|
}
|
|
});
|
|
}
|
|
function putFile(ctx, wopiParams, data, dataStream, dataSize, userLastChangeId, isModifiedByUser, isAutosave, isExitSave) {
|
|
return co(function* () {
|
|
let postRes = null;
|
|
try {
|
|
ctx.logger.info('wopi PutFile start');
|
|
if (!wopiParams.userAuth || !wopiParams.commonInfo) {
|
|
return postRes;
|
|
}
|
|
let fileInfo = wopiParams.commonInfo.fileInfo;
|
|
let userAuth = wopiParams.userAuth;
|
|
let uri = `${userAuth.wopiSrc}/contents?access_token=${userAuth.access_token}`;
|
|
let filterStatus = yield checkIpFilter(ctx, uri);
|
|
if (0 !== filterStatus) {
|
|
return postRes;
|
|
}
|
|
|
|
//collabora nexcloud connector sets only UserCanWrite=true
|
|
if (fileInfo && (fileInfo.SupportsUpdate || fileInfo.UserCanWrite)) {
|
|
let commonInfo = wopiParams.commonInfo;
|
|
//todo add all the users who contributed changes to the document in this PutFile request to X-WOPI-Editors
|
|
let headers = {'X-WOPI-Override': 'PUT', 'X-WOPI-Lock': commonInfo.lockId, 'X-WOPI-Editors': userLastChangeId};
|
|
fillStandardHeaders(headers, uri, userAuth.access_token);
|
|
headers['X-LOOL-WOPI-IsModifiedByUser'] = isModifiedByUser;
|
|
headers['X-LOOL-WOPI-IsAutosave'] = isAutosave;
|
|
headers['X-LOOL-WOPI-IsExitSave'] = isExitSave;
|
|
if (wopiParams.LastModifiedTime) {
|
|
//collabora nexcloud connector
|
|
headers['X-LOOL-WOPI-Timestamp'] = wopiParams.LastModifiedTime;
|
|
}
|
|
|
|
ctx.logger.debug('wopi PutFile request uri=%s headers=%j', uri, headers);
|
|
postRes = yield utils.postRequestPromise(uri, data, dataStream, dataSize, cfgCallbackRequestTimeout, undefined, headers);
|
|
ctx.logger.debug('wopi PutFile response headers=%j', postRes.response.headers);
|
|
ctx.logger.debug('wopi PutFile response body:%s', postRes.body);
|
|
} else {
|
|
ctx.logger.warn('wopi SupportsUpdate = false or UserCanWrite = false');
|
|
}
|
|
} catch (err) {
|
|
ctx.logger.error('wopi error PutFile:%s', err.stack);
|
|
} finally {
|
|
ctx.logger.info('wopi PutFile end');
|
|
}
|
|
return postRes;
|
|
});
|
|
}
|
|
function putRelativeFile(ctx, wopiSrc, access_token, data, dataStream, dataSize, suggestedTarget, isFileConversion) {
|
|
return co(function* () {
|
|
let postRes = null;
|
|
try {
|
|
ctx.logger.info('wopi putRelativeFile start');
|
|
|
|
let uri = `${wopiSrc}?access_token=${access_token}`;
|
|
let filterStatus = yield checkIpFilter(ctx, uri);
|
|
if (0 !== filterStatus) {
|
|
return postRes;
|
|
}
|
|
|
|
let headers = {'X-WOPI-Override': 'PUT_RELATIVE', 'X-WOPI-SuggestedTarget': utf7.encode(suggestedTarget),
|
|
'X-WOPI-FileConversion': isFileConversion};
|
|
fillStandardHeaders(headers, uri, access_token);
|
|
|
|
ctx.logger.debug('wopi putRelativeFile request uri=%s headers=%j', uri, headers);
|
|
postRes = yield utils.postRequestPromise(uri, data, dataStream, dataSize, cfgCallbackRequestTimeout, undefined, headers);
|
|
ctx.logger.debug('wopi putRelativeFile response headers=%j', postRes.response.headers);
|
|
ctx.logger.debug('wopi putRelativeFile response body:%s', postRes.body);
|
|
} catch (err) {
|
|
ctx.logger.error('wopi error putRelativeFile:%s', err.stack);
|
|
} finally {
|
|
ctx.logger.info('wopi putRelativeFile end');
|
|
}
|
|
return postRes;
|
|
});
|
|
}
|
|
function renameFile(ctx, wopiParams, name) {
|
|
return co(function* () {
|
|
let res = undefined;
|
|
try {
|
|
ctx.logger.info('wopi RenameFile start');
|
|
if (!wopiParams.userAuth || !wopiParams.commonInfo) {
|
|
return res;
|
|
}
|
|
let fileInfo = wopiParams.commonInfo.fileInfo;
|
|
let userAuth = wopiParams.userAuth;
|
|
let uri = `${userAuth.wopiSrc}?access_token=${userAuth.access_token}`;
|
|
let filterStatus = yield checkIpFilter(ctx, uri);
|
|
if (0 !== filterStatus) {
|
|
return res;
|
|
}
|
|
|
|
if (fileInfo && fileInfo.SupportsRename) {
|
|
let fileNameMaxLength = fileInfo.FileNameMaxLength || 255;
|
|
name = name.substring(0, fileNameMaxLength);
|
|
let commonInfo = wopiParams.commonInfo;
|
|
|
|
let headers = {'X-WOPI-Override': 'RENAME_FILE', 'X-WOPI-Lock': commonInfo.lockId, 'X-WOPI-RequestedName': utf7.encode(name)};
|
|
fillStandardHeaders(headers, uri, userAuth.access_token);
|
|
|
|
ctx.logger.debug('wopi RenameFile request uri=%s headers=%j', uri, headers);
|
|
let postRes = yield utils.postRequestPromise(uri, undefined, undefined, undefined, cfgCallbackRequestTimeout, undefined, headers);
|
|
ctx.logger.debug('wopi RenameFile response headers=%j body=%s', postRes.response.headers, postRes.body);
|
|
if (postRes.body) {
|
|
res = JSON.parse(postRes.body);
|
|
} else {
|
|
//sharepoint send empty body(2016 allways, 2019 with same name)
|
|
res = {"Name": name};
|
|
}
|
|
} else {
|
|
ctx.logger.info('wopi SupportsRename = false');
|
|
}
|
|
} catch (err) {
|
|
ctx.logger.error('wopi error RenameFile:%s', err.stack);
|
|
} finally {
|
|
ctx.logger.info('wopi RenameFile end');
|
|
}
|
|
return res;
|
|
});
|
|
}
|
|
function checkFileInfo(ctx, wopiSrc, access_token, opt_sc) {
|
|
return co(function* () {
|
|
let fileInfo = undefined;
|
|
try {
|
|
ctx.logger.info('wopi checkFileInfo start');
|
|
let uri = `${encodeURI(wopiSrc)}?access_token=${encodeURIComponent(access_token)}`;
|
|
let filterStatus = yield checkIpFilter(ctx, uri);
|
|
if (0 !== filterStatus) {
|
|
return fileInfo;
|
|
}
|
|
let headers = {};
|
|
if (opt_sc) {
|
|
headers['X-WOPI-SessionContext'] = opt_sc;
|
|
}
|
|
fillStandardHeaders(headers, uri, access_token);
|
|
ctx.logger.debug('wopi checkFileInfo request uri=%s headers=%j', uri, headers);
|
|
let getRes = yield utils.downloadUrlPromise(ctx, uri, cfgDownloadTimeout, undefined, undefined, false, headers);
|
|
ctx.logger.debug(`wopi checkFileInfo headers=%j body=%s`, getRes.response.headers, getRes.body);
|
|
fileInfo = JSON.parse(getRes.body);
|
|
} catch (err) {
|
|
ctx.logger.error('wopi error checkFileInfo:%s', err.stack);
|
|
} finally {
|
|
ctx.logger.info('wopi checkFileInfo end');
|
|
}
|
|
return fileInfo;
|
|
});
|
|
}
|
|
function lock(ctx, command, lockId, fileInfo, userAuth) {
|
|
return co(function* () {
|
|
let res = true;
|
|
try {
|
|
ctx.logger.info('wopi %s start', command);
|
|
if (fileInfo && fileInfo.SupportsLocks) {
|
|
if (!userAuth) {
|
|
return false;
|
|
}
|
|
let wopiSrc = userAuth.wopiSrc;
|
|
let access_token = userAuth.access_token;
|
|
let uri = `${wopiSrc}?access_token=${access_token}`;
|
|
let filterStatus = yield checkIpFilter(ctx, uri);
|
|
if (0 !== filterStatus) {
|
|
return false;
|
|
}
|
|
|
|
let headers = {"X-WOPI-Override": command, "X-WOPI-Lock": lockId};
|
|
fillStandardHeaders(headers, uri, access_token);
|
|
ctx.logger.debug('wopi %s request uri=%s headers=%j', command, uri, headers);
|
|
let postRes = yield utils.postRequestPromise(uri, undefined, undefined, undefined, cfgCallbackRequestTimeout, undefined, headers);
|
|
ctx.logger.debug('wopi %s response headers=%j', command, postRes.response.headers);
|
|
} else {
|
|
ctx.logger.info('wopi %s SupportsLocks = false', command);
|
|
}
|
|
} catch (err) {
|
|
res = false;
|
|
ctx.logger.error('wopi error %s:%s', command, err.stack);
|
|
} finally {
|
|
ctx.logger.info('wopi %s end', command);
|
|
}
|
|
return res;
|
|
});
|
|
}
|
|
function unlock(ctx, wopiParams) {
|
|
return co(function* () {
|
|
try {
|
|
ctx.logger.info('wopi Unlock start');
|
|
if (!wopiParams.userAuth || !wopiParams.commonInfo) {
|
|
return;
|
|
}
|
|
let fileInfo = wopiParams.commonInfo.fileInfo;
|
|
if (fileInfo && fileInfo.SupportsLocks) {
|
|
let wopiSrc = wopiParams.userAuth.wopiSrc;
|
|
let lockId = wopiParams.commonInfo.lockId;
|
|
let access_token = wopiParams.userAuth.access_token;
|
|
let uri = `${wopiSrc}?access_token=${access_token}`;
|
|
let filterStatus = yield checkIpFilter(ctx, uri);
|
|
if (0 !== filterStatus) {
|
|
return;
|
|
}
|
|
|
|
let headers = {"X-WOPI-Override": "UNLOCK", "X-WOPI-Lock": lockId};
|
|
fillStandardHeaders(headers, uri, access_token);
|
|
ctx.logger.debug('wopi Unlock request uri=%s headers=%j', uri, headers);
|
|
let postRes = yield utils.postRequestPromise(uri, undefined, undefined, undefined, cfgCallbackRequestTimeout, undefined, headers);
|
|
ctx.logger.debug('wopi Unlock response headers=%j', postRes.response.headers);
|
|
} else {
|
|
ctx.logger.info('wopi SupportsLocks = false');
|
|
}
|
|
} catch (err) {
|
|
ctx.logger.error('wopi error Unlock:%s', err.stack);
|
|
} finally {
|
|
ctx.logger.info('wopi Unlock end');
|
|
}
|
|
});
|
|
}
|
|
function generateProofBuffer(url, accessToken, timeStamp) {
|
|
const accessTokenBytes = Buffer.from(accessToken, 'utf8');
|
|
const urlBytes = Buffer.from(url.toUpperCase(), 'utf8');
|
|
|
|
let offset = 0;
|
|
let buffer = Buffer.alloc(4 + accessTokenBytes.length + 4 + urlBytes.length + 4 + 8);
|
|
buffer.writeUInt32BE(accessTokenBytes.length, offset);
|
|
offset += 4;
|
|
accessTokenBytes.copy(buffer, offset, 0, accessTokenBytes.length);
|
|
offset += accessTokenBytes.length;
|
|
buffer.writeUInt32BE(urlBytes.length, offset);
|
|
offset += 4;
|
|
urlBytes.copy(buffer, offset, 0, urlBytes.length);
|
|
offset += urlBytes.length;
|
|
buffer.writeUInt32BE(8, offset);
|
|
offset += 4;
|
|
buffer.writeBigUInt64BE(timeStamp, offset);
|
|
return buffer;
|
|
}
|
|
function generateProofSign(url, accessToken, timeStamp, privateKey) {
|
|
let signer = crypto.createSign('RSA-SHA256');
|
|
signer.update(generateProofBuffer(url, accessToken, timeStamp));
|
|
return signer.sign({key:privateKey}, "base64");
|
|
}
|
|
function generateProof(url, accessToken, timeStamp) {
|
|
let privateKey = `-----BEGIN RSA PRIVATE KEY-----\n${cfgWopiPrivateKey}\n-----END RSA PRIVATE KEY-----`;
|
|
return generateProofSign(url, accessToken, timeStamp, privateKey);
|
|
}
|
|
function generateProofOld(url, accessToken, timeStamp) {
|
|
let privateKey = `-----BEGIN RSA PRIVATE KEY-----\n${cfgWopiPrivateKeyOld}\n-----END RSA PRIVATE KEY-----`;
|
|
return generateProofSign(url, accessToken, timeStamp, privateKey);
|
|
}
|
|
function fillStandardHeaders(headers, url, access_token) {
|
|
let timeStamp = utils.getDateTimeTicks(new Date());
|
|
if (cfgWopiPrivateKey && cfgWopiPrivateKeyOld) {
|
|
headers['X-WOPI-Proof'] = generateProof(url, access_token, timeStamp);
|
|
headers['X-WOPI-ProofOld'] = generateProof(url, access_token, timeStamp);
|
|
headers['X-WOPI-TimeStamp'] = timeStamp;
|
|
headers['X-WOPI-ClientVersion'] = commonDefines.buildVersion + '.' + commonDefines.buildNumber;
|
|
// todo
|
|
// headers['X-WOPI-CorrelationId '] = "";
|
|
// headers['X-WOPI-SessionId'] = "";
|
|
}
|
|
headers['Authorization'] = `Bearer ${access_token}`;
|
|
}
|
|
|
|
function checkIpFilter(ctx, uri){
|
|
return co(function* () {
|
|
let urlParsed = new URL(uri);
|
|
let filterStatus = yield* utils.checkHostFilter(ctx, urlParsed.hostname);
|
|
if (0 !== filterStatus) {
|
|
ctx.logger.warn('wopi checkIpFilter error: url = %s', uri);
|
|
}
|
|
return filterStatus;
|
|
});
|
|
}
|
|
function getWopiParams(lockId, fileInfo, wopiSrc, access_token, access_token_ttl) {
|
|
let commonInfo = {lockId: lockId, fileInfo: fileInfo};
|
|
let userAuth = {
|
|
wopiSrc: wopiSrc, access_token: access_token, access_token_ttl: access_token_ttl,
|
|
hostSessionId: null, userSessionId: null, mode: null
|
|
};
|
|
return {commonInfo: commonInfo, userAuth: userAuth, LastModifiedTime: null};
|
|
};
|
|
|
|
exports.discovery = discovery;
|
|
exports.collaboraCapabilities = collaboraCapabilities;
|
|
exports.parseWopiCallback = parseWopiCallback;
|
|
exports.getEditorHtml = getEditorHtml;
|
|
exports.getConverterHtml = getConverterHtml;
|
|
exports.putFile = putFile;
|
|
exports.putRelativeFile = putRelativeFile;
|
|
exports.renameFile = renameFile;
|
|
exports.lock = lock;
|
|
exports.unlock = unlock;
|
|
exports.generateProof = generateProof;
|
|
exports.generateProofOld = generateProofOld;
|
|
exports.fillStandardHeaders = fillStandardHeaders;
|
|
exports.getWopiUnlockMarker = getWopiUnlockMarker;
|
|
exports.getWopiModifiedMarker = getWopiModifiedMarker;
|