| 1 | // SPDX-FileCopyrightText: 2018 Kitsune Ral <kitsune-ral@users.sf.net> |
| 2 | // SPDX-License-Identifier: LGPL-2.1-or-later |
| 3 | |
| 4 | #include "networkaccessmanager.h" |
| 5 | |
| 6 | #include "logging_categories_p.h" |
| 7 | #include "mxcreply.h" |
| 8 | |
| 9 | #include "events/filesourceinfo.h" |
| 10 | #include "jobs/downloadfilejob.h" // For DownloadFileJob::makeRequestUrl() only |
| 11 | |
| 12 | #include <QtCore/QCoreApplication> |
| 13 | #include <QtCore/QReadWriteLock> |
| 14 | #include <QtCore/QSettings> |
| 15 | #include <QtCore/QStringBuilder> |
| 16 | #include <QtCore/QThread> |
| 17 | #include <QtNetwork/QNetworkReply> |
| 18 | |
| 19 | using namespace Quotient; |
| 20 | |
| 21 | namespace { |
| 22 | class { |
| 23 | public: |
| 24 | void addBaseUrl(const QString& accountId, const QUrl& baseUrl) |
| 25 | { |
| 26 | QWriteLocker{ &namLock }, baseUrls.insert(key: accountId, value: baseUrl); |
| 27 | } |
| 28 | void dropBaseUrl(const QString& accountId) |
| 29 | { |
| 30 | QWriteLocker{ &namLock }, baseUrls.remove(key: accountId); |
| 31 | } |
| 32 | QUrl getBaseUrl(const QString& accountId) const |
| 33 | { |
| 34 | return QReadLocker{ &namLock }, baseUrls.value(key: accountId); |
| 35 | } |
| 36 | void addIgnoredSslError(const QSslError& error) |
| 37 | { |
| 38 | QWriteLocker{ &namLock }, ignoredSslErrors.push_back(t: error); |
| 39 | } |
| 40 | void clearIgnoredSslErrors() |
| 41 | { |
| 42 | QWriteLocker{ &namLock }, ignoredSslErrors.clear(); |
| 43 | } |
| 44 | QList<QSslError> getIgnoredSslErrors() const |
| 45 | { |
| 46 | return QReadLocker{ &namLock }, ignoredSslErrors; |
| 47 | } |
| 48 | |
| 49 | private: |
| 50 | mutable QReadWriteLock namLock{}; |
| 51 | QHash<QString, QUrl> baseUrls{}; |
| 52 | QList<QSslError> ignoredSslErrors{}; |
| 53 | } d; |
| 54 | |
| 55 | } // anonymous namespace |
| 56 | |
| 57 | void NetworkAccessManager::addBaseUrl(const QString& accountId, |
| 58 | const QUrl& homeserver) |
| 59 | { |
| 60 | Q_ASSERT(!accountId.isEmpty() && homeserver.isValid()); |
| 61 | d.addBaseUrl(accountId, baseUrl: homeserver); |
| 62 | } |
| 63 | |
| 64 | void NetworkAccessManager::dropBaseUrl(const QString& accountId) |
| 65 | { |
| 66 | d.dropBaseUrl(accountId); |
| 67 | } |
| 68 | |
| 69 | QList<QSslError> NetworkAccessManager::ignoredSslErrors() |
| 70 | { |
| 71 | return d.getIgnoredSslErrors(); |
| 72 | } |
| 73 | |
| 74 | void NetworkAccessManager::addIgnoredSslError(const QSslError& error) |
| 75 | { |
| 76 | d.addIgnoredSslError(error); |
| 77 | } |
| 78 | |
| 79 | void NetworkAccessManager::clearIgnoredSslErrors() |
| 80 | { |
| 81 | d.clearIgnoredSslErrors(); |
| 82 | } |
| 83 | |
| 84 | NetworkAccessManager* NetworkAccessManager::instance() |
| 85 | { |
| 86 | thread_local auto* nam = [] { |
| 87 | auto* namInit = new NetworkAccessManager(); |
| 88 | connect(sender: QThread::currentThread(), signal: &QThread::finished, context: namInit, |
| 89 | slot: &QObject::deleteLater); |
| 90 | return namInit; |
| 91 | }(); |
| 92 | return nam; |
| 93 | } |
| 94 | |
| 95 | QNetworkReply* NetworkAccessManager::createRequest( |
| 96 | Operation op, const QNetworkRequest& request, QIODevice* outgoingData) |
| 97 | { |
| 98 | const auto url = request.url(); |
| 99 | if (url.scheme() != "mxc"_ls ) { |
| 100 | auto reply = |
| 101 | QNetworkAccessManager::createRequest(op, request, outgoingData); |
| 102 | reply->ignoreSslErrors(errors: d.getIgnoredSslErrors()); |
| 103 | return reply; |
| 104 | } |
| 105 | const QUrlQuery query{ url.query() }; |
| 106 | const auto accountId = query.queryItemValue(QStringLiteral("user_id" )); |
| 107 | if (accountId.isEmpty()) { |
| 108 | // Using QSettings here because Quotient::NetworkSettings |
| 109 | // doesn't provide multi-threading guarantees |
| 110 | if (static thread_local const QSettings s; |
| 111 | s.value(key: "Network/allow_direct_media_requests"_ls ).toBool()) // |
| 112 | { |
| 113 | // TODO: Make the best effort with a direct unauthenticated request |
| 114 | // to the media server |
| 115 | qCWarning(NETWORK) |
| 116 | << "Direct unauthenticated mxc requests are not implemented" ; |
| 117 | return new MxcReply(); |
| 118 | } |
| 119 | qCWarning(NETWORK) |
| 120 | << "No connection specified, cannot convert mxc request" ; |
| 121 | return new MxcReply(); |
| 122 | } |
| 123 | const auto& baseUrl = d.getBaseUrl(accountId); |
| 124 | if (!baseUrl.isValid()) { |
| 125 | // Strictly speaking, it should be an assert... |
| 126 | qCCritical(NETWORK) << "Homeserver for" << accountId |
| 127 | << "not found, cannot convert mxc request" ; |
| 128 | return new MxcReply(); |
| 129 | } |
| 130 | |
| 131 | // Convert mxc:// URL into normal http(s) for the given homeserver |
| 132 | QNetworkRequest rewrittenRequest(request); |
| 133 | rewrittenRequest.setUrl(DownloadFileJob::makeRequestUrl(baseUrl, mxcUri: url)); |
| 134 | |
| 135 | auto* implReply = QNetworkAccessManager::createRequest(op, request: rewrittenRequest); |
| 136 | implReply->ignoreSslErrors(errors: d.getIgnoredSslErrors()); |
| 137 | const auto& fileMetadata = FileMetadataMap::lookup( |
| 138 | roomId: query.queryItemValue(QStringLiteral("room_id" )), |
| 139 | eventId: query.queryItemValue(QStringLiteral("event_id" ))); |
| 140 | return new MxcReply(implReply, fileMetadata); |
| 141 | } |
| 142 | |
| 143 | QStringList NetworkAccessManager::supportedSchemesImplementation() const |
| 144 | { |
| 145 | return QNetworkAccessManager::supportedSchemesImplementation() |
| 146 | << QStringLiteral("mxc" ); |
| 147 | } |
| 148 | |