focalboard/server/ws/websockets.go

352 lines
9.2 KiB
Go
Raw Normal View History

package ws
import (
"encoding/json"
2021-03-29 21:54:37 +02:00
"errors"
"log"
"net/http"
"sync"
2020-11-06 19:11:01 +01:00
"time"
2020-10-16 11:41:56 +02:00
"github.com/gorilla/mux"
"github.com/gorilla/websocket"
2021-02-02 21:06:28 +01:00
"github.com/mattermost/focalboard/server/auth"
2021-01-26 23:13:46 +01:00
"github.com/mattermost/focalboard/server/model"
2021-03-26 19:01:54 +01:00
"github.com/mattermost/focalboard/server/services/store"
)
2021-03-27 02:04:23 +01:00
type WorkspaceAuthenticator interface {
DoesUserHaveWorkspaceAccess(session *model.Session, workspaceID string) bool
}
2021-02-02 21:06:28 +01:00
// IsValidSessionToken authenticates session tokens
type IsValidSessionToken func(token string) bool
2021-02-02 21:06:28 +01:00
// Server is a WebSocket server.
type Server struct {
2021-03-27 02:04:23 +01:00
upgrader websocket.Upgrader
listeners map[string][]*websocket.Conn
mu sync.RWMutex
auth *auth.Auth
singleUserToken string
WorkspaceAuthenticator WorkspaceAuthenticator
}
2021-02-02 21:06:28 +01:00
// UpdateMsg is sent on block updates
type UpdateMsg struct {
Action string `json:"action"`
Block model.Block `json:"block"`
}
// ErrorMsg is sent on errors
type ErrorMsg struct {
Error string `json:"error"`
}
2021-02-02 21:06:28 +01:00
// WebsocketCommand is an incoming command from the client.
type WebsocketCommand struct {
2021-03-27 02:04:23 +01:00
Action string `json:"action"`
WorkspaceID string `json:"workspaceId"`
Token string `json:"token"`
ReadToken string `json:"readToken"`
BlockIDs []string `json:"blockIds"`
}
2021-02-02 21:06:28 +01:00
type websocketSession struct {
client *websocket.Conn
isAuthenticated bool
2021-03-27 02:04:23 +01:00
workspaceID string
}
// NewServer creates a new Server.
2021-02-09 21:27:34 +01:00
func NewServer(auth *auth.Auth, singleUserToken string) *Server {
return &Server{
2020-10-09 19:44:12 +02:00
listeners: make(map[string][]*websocket.Conn),
upgrader: websocket.Upgrader{
CheckOrigin: func(r *http.Request) bool {
return true
},
},
2021-02-09 21:27:34 +01:00
auth: auth,
singleUserToken: singleUserToken,
}
}
2021-02-02 21:06:28 +01:00
// RegisterRoutes registers routes.
func (ws *Server) RegisterRoutes(r *mux.Router) {
r.HandleFunc("/ws/onchange", ws.handleWebSocketOnChange)
}
func (ws *Server) handleWebSocketOnChange(w http.ResponseWriter, r *http.Request) {
// Upgrade initial GET request to a websocket
client, err := ws.upgrader.Upgrade(w, r, nil)
if err != nil {
2021-03-27 02:04:23 +01:00
log.Printf("ERROR upgrading to websocket: %v", err)
return
}
// TODO: Auth
log.Printf("CONNECT WebSocket onChange, client: %s", client.RemoteAddr())
// Make sure we close the connection when the function returns
defer func() {
log.Printf("DISCONNECT WebSocket onChange, client: %s", client.RemoteAddr())
// Remove client from listeners
2021-02-02 21:06:28 +01:00
ws.removeListener(client)
client.Close()
}()
2021-02-02 21:06:28 +01:00
wsSession := websocketSession{
client: client,
2021-02-09 21:27:34 +01:00
isAuthenticated: false,
2021-02-02 21:06:28 +01:00
}
// Simple message handling loop
for {
_, p, err := client.ReadMessage()
if err != nil {
log.Printf("ERROR WebSocket onChange, client: %s, err: %v", client.RemoteAddr(), err)
2021-02-02 21:06:28 +01:00
ws.removeListener(client)
break
}
var command WebsocketCommand
err = json.Unmarshal(p, &command)
if err != nil {
// handle this error
log.Printf(`ERROR webSocket parsing command JSON: %v`, string(p))
continue
}
switch command.Action {
2021-02-02 21:06:28 +01:00
case "AUTH":
log.Printf(`Command: AUTH, client: %s`, client.RemoteAddr())
2021-03-29 21:31:42 +02:00
ws.authenticateListener(&wsSession, command.WorkspaceID, command.Token)
2021-02-02 21:06:28 +01:00
case "ADD":
2021-03-27 02:04:23 +01:00
log.Printf(`Command: Add workspaceID: %s, blockIDs: %v, client: %s`, wsSession.workspaceID, command.BlockIDs, client.RemoteAddr())
2021-02-03 03:15:03 +01:00
ws.addListener(&wsSession, &command)
case "REMOVE":
2021-03-27 02:04:23 +01:00
log.Printf(`Command: Remove workspaceID: %s, blockID: %v, client: %s`, wsSession.workspaceID, command.BlockIDs, client.RemoteAddr())
2021-02-03 03:15:03 +01:00
ws.removeListenerFromBlocks(&wsSession, &command)
default:
log.Printf(`ERROR webSocket command, invalid action: %v`, command.Action)
}
}
}
2021-03-27 02:04:23 +01:00
func (ws *Server) isValidSessionToken(token, workspaceID string) bool {
2021-02-09 21:27:34 +01:00
if len(ws.singleUserToken) > 0 {
return token == ws.singleUserToken
2021-02-02 21:06:28 +01:00
}
session, err := ws.auth.GetSession(token)
2021-03-27 02:04:23 +01:00
if session == nil || err != nil {
return false
2021-02-02 21:06:28 +01:00
}
2021-03-27 02:04:23 +01:00
// Check workspace permission
if ws.WorkspaceAuthenticator != nil {
if !ws.WorkspaceAuthenticator.DoesUserHaveWorkspaceAccess(session, workspaceID) {
return false
}
}
return true
2021-02-02 21:06:28 +01:00
}
2021-03-29 21:31:42 +02:00
func (ws *Server) authenticateListener(wsSession *websocketSession, workspaceID, token string) {
2021-03-27 02:04:23 +01:00
if wsSession.isAuthenticated {
// Do not allow multiple auth calls (for security)
log.Printf("authenticateListener: Ignoring already authenticated session")
return
}
2021-02-03 03:15:03 +01:00
// Authenticate session
2021-03-27 02:04:23 +01:00
isValidSession := ws.isValidSessionToken(token, workspaceID)
2021-02-02 21:06:28 +01:00
if !isValidSession {
wsSession.client.Close()
return
}
// Authenticated
2021-03-27 02:04:23 +01:00
wsSession.workspaceID = workspaceID
2021-02-02 21:06:28 +01:00
wsSession.isAuthenticated = true
2021-03-27 02:04:23 +01:00
log.Printf("authenticateListener: Authenticated, workspaceID: %s", workspaceID)
2021-02-02 21:06:28 +01:00
}
2021-03-29 21:54:37 +02:00
func (ws *Server) getAuthenticatedWorkspaceID(wsSession *websocketSession, command *WebsocketCommand) (string, error) {
2021-03-29 21:31:42 +02:00
if wsSession.isAuthenticated {
2021-03-29 21:54:37 +02:00
return wsSession.workspaceID, nil
2021-03-26 19:01:54 +01:00
}
2021-03-29 21:31:42 +02:00
// If not authenticated, try to authenticate the read token against the supplied workspaceID
workspaceID := command.WorkspaceID
if len(workspaceID) == 0 {
log.Printf("getAuthenticatedWorkspaceID: No workspace")
2021-03-29 21:54:37 +02:00
return "", errors.New("No workspace")
}
2021-03-29 21:31:42 +02:00
container := store.Container{
WorkspaceID: workspaceID,
2021-03-26 19:01:54 +01:00
}
2021-02-03 03:15:03 +01:00
if len(command.ReadToken) > 0 {
// Read token must be valid for all block IDs
for _, blockID := range command.BlockIDs {
2021-03-26 19:01:54 +01:00
isValid, _ := ws.auth.IsValidReadToken(container, blockID, command.ReadToken)
2021-02-03 03:15:03 +01:00
if !isValid {
2021-03-29 21:54:37 +02:00
return "", errors.New("Invalid read token for workspace")
2021-02-03 03:15:03 +01:00
}
}
2021-03-29 21:54:37 +02:00
return workspaceID, nil
2021-02-03 03:15:03 +01:00
}
2021-03-29 21:54:37 +02:00
return "", errors.New("No read token")
2021-02-03 03:15:03 +01:00
}
2021-03-27 02:04:23 +01:00
// TODO: Refactor workspace hashing
func makeItemID(workspaceID, blockID string) string {
return workspaceID + "-" + blockID
}
2021-02-02 22:00:22 +01:00
// addListener adds a listener for a block's change.
2021-02-03 03:15:03 +01:00
func (ws *Server) addListener(wsSession *websocketSession, command *WebsocketCommand) {
2021-03-29 21:54:37 +02:00
workspaceID, err := ws.getAuthenticatedWorkspaceID(wsSession, command)
if err != nil {
log.Printf("addListener: NOT AUTHENTICATED, ERROR: %v", err)
sendError(wsSession.client, "not authenticated")
2021-02-02 21:06:28 +01:00
return
}
ws.mu.Lock()
2021-02-03 03:15:03 +01:00
for _, blockID := range command.BlockIDs {
2021-03-27 02:04:23 +01:00
itemID := makeItemID(workspaceID, blockID)
if ws.listeners[itemID] == nil {
ws.listeners[itemID] = []*websocket.Conn{}
2021-02-02 21:06:28 +01:00
}
2021-03-27 02:04:23 +01:00
ws.listeners[itemID] = append(ws.listeners[itemID], wsSession.client)
2021-02-02 21:06:28 +01:00
}
ws.mu.Unlock()
}
// removeListener removes a webSocket listener from all blocks.
func (ws *Server) removeListener(client *websocket.Conn) {
ws.mu.Lock()
for key, clients := range ws.listeners {
listeners := []*websocket.Conn{}
for _, existingClient := range clients {
if client != existingClient {
listeners = append(listeners, existingClient)
}
}
ws.listeners[key] = listeners
}
ws.mu.Unlock()
}
// removeListenerFromBlocks removes a webSocket listener from a set of block.
2021-02-03 03:15:03 +01:00
func (ws *Server) removeListenerFromBlocks(wsSession *websocketSession, command *WebsocketCommand) {
2021-03-29 21:54:37 +02:00
workspaceID, err := ws.getAuthenticatedWorkspaceID(wsSession, command)
if err != nil {
log.Printf("addListener: NOT AUTHENTICATED, ERROR: %v", err)
sendError(wsSession.client, "not authenticated")
2021-02-02 21:06:28 +01:00
return
}
2021-03-27 02:04:23 +01:00
ws.mu.Lock()
2021-02-03 03:15:03 +01:00
for _, blockID := range command.BlockIDs {
2021-03-27 02:04:23 +01:00
itemID := makeItemID(workspaceID, blockID)
listeners := ws.listeners[itemID]
2021-02-02 21:06:28 +01:00
if listeners == nil {
return
}
// Remove the first instance of this client that's listening to this block
// Note: A client can listen multiple times to the same block
for index, listener := range listeners {
if wsSession.client == listener {
newListeners := append(listeners[:index], listeners[index+1:]...)
2021-03-27 02:04:23 +01:00
ws.listeners[itemID] = newListeners
2021-02-02 21:06:28 +01:00
break
}
}
}
ws.mu.Unlock()
}
func sendError(conn *websocket.Conn, message string) {
errorMsg := ErrorMsg{
Error: message,
}
err := conn.WriteJSON(errorMsg)
if err != nil {
log.Printf("sendError error: %v", err)
conn.Close()
}
}
2021-02-02 22:00:22 +01:00
// getListeners returns the listeners to a blockID's changes.
2021-03-27 02:04:23 +01:00
func (ws *Server) getListeners(workspaceID string, blockID string) []*websocket.Conn {
2021-02-02 21:06:28 +01:00
ws.mu.Lock()
2021-03-27 02:04:23 +01:00
itemID := makeItemID(workspaceID, blockID)
listeners := ws.listeners[itemID]
2021-02-02 21:06:28 +01:00
ws.mu.Unlock()
return listeners
}
2020-11-06 19:11:01 +01:00
// BroadcastBlockDelete broadcasts delete messages to clients
2021-03-27 02:04:23 +01:00
func (ws *Server) BroadcastBlockDelete(workspaceID, blockID, parentID string) {
2020-11-06 19:11:01 +01:00
now := time.Now().Unix()
block := model.Block{}
block.ID = blockID
block.ParentID = parentID
block.UpdateAt = now
block.DeleteAt = now
2021-03-27 02:04:23 +01:00
ws.BroadcastBlockChange(workspaceID, block)
2020-11-06 19:11:01 +01:00
}
// BroadcastBlockChange broadcasts update messages to clients
2021-03-27 02:04:23 +01:00
func (ws *Server) BroadcastBlockChange(workspaceID string, block model.Block) {
2020-11-06 19:11:01 +01:00
blockIDsToNotify := []string{block.ID, block.ParentID}
for _, blockID := range blockIDsToNotify {
2021-03-27 02:04:23 +01:00
listeners := ws.getListeners(workspaceID, blockID)
2020-11-06 19:11:01 +01:00
log.Printf("%d listener(s) for blockID: %s", len(listeners), blockID)
if listeners != nil {
message := UpdateMsg{
Action: "UPDATE_BLOCK",
Block: block,
}
for _, listener := range listeners {
2021-03-27 02:04:23 +01:00
log.Printf("Broadcast change, workspaceID: %s, blockID: %s, remoteAddr: %s", workspaceID, blockID, listener.RemoteAddr())
2020-11-06 19:11:01 +01:00
err := listener.WriteJSON(message)
if err != nil {
log.Printf("broadcast error: %v", err)
listener.Close()
}
}
}
}
}