2019-04-30 20:13:59 +01:00
using System ;
2016-10-11 18:52:01 +02:00
using System.Linq ;
using System.Threading ;
using System.Globalization ;
using System.IO ;
using Umbraco.Core ;
using Umbraco.Core.Configuration.UmbracoSettings ;
using Umbraco.Core.Logging ;
using Umbraco.Core.Models ;
2017-05-30 10:50:09 +02:00
using Umbraco.Core.Models.PublishedContent ;
2016-10-11 18:52:01 +02:00
using Umbraco.Core.Services ;
using Umbraco.Web.Security ;
2020-08-21 14:52:47 +01:00
using Umbraco.Core.Configuration.Models ;
using Microsoft.Extensions.Options ;
2016-10-11 18:52:01 +02:00
namespace Umbraco.Web.Routing
{
2019-01-31 09:08:51 +01:00
/// <summary>
/// Provides the default <see cref="IPublishedRouter"/> implementation.
/// </summary>
public class PublishedRouter : IPublishedRouter
2017-07-20 11:21:28 +02:00
{
2020-08-21 14:52:47 +01:00
private readonly WebRoutingSettings _webRoutingSettings ;
2016-10-13 21:08:07 +02:00
private readonly ContentFinderCollection _contentFinders ;
2017-07-20 11:21:28 +02:00
private readonly IContentLastChanceFinder _contentLastChanceFinder ;
2018-11-27 13:46:43 +01:00
private readonly IProfilingLogger _profilingLogger ;
2018-06-03 17:21:15 +02:00
private readonly IVariationContextAccessor _variationContextAccessor ;
2017-07-20 11:21:28 +02:00
private readonly ILogger _logger ;
2020-02-14 13:04:49 +01:00
private readonly IPublishedUrlProvider _publishedUrlProvider ;
2020-02-28 11:15:25 +01:00
private readonly IRequestAccessor _requestAccessor ;
private readonly IPublishedValueFallback _publishedValueFallback ;
private readonly IPublicAccessChecker _publicAccessChecker ;
private readonly IFileService _fileService ;
private readonly IContentTypeService _contentTypeService ;
private readonly IPublicAccessService _publicAccessService ;
2016-10-11 18:52:01 +02:00
/// <summary>
2017-10-31 12:48:24 +01:00
/// Initializes a new instance of the <see cref="PublishedRouter"/> class.
2016-10-11 18:52:01 +02:00
/// </summary>
2017-10-31 12:48:24 +01:00
public PublishedRouter (
2020-08-23 23:36:48 +02:00
IOptions < WebRoutingSettings > webRoutingSettings ,
2016-10-13 21:08:07 +02:00
ContentFinderCollection contentFinders ,
2016-10-11 18:52:01 +02:00
IContentLastChanceFinder contentLastChanceFinder ,
2018-06-03 17:21:15 +02:00
IVariationContextAccessor variationContextAccessor ,
2020-01-21 17:03:46 -08:00
IProfilingLogger proflog ,
2020-02-28 11:15:25 +01:00
IPublishedUrlProvider publishedUrlProvider ,
IRequestAccessor requestAccessor ,
IPublishedValueFallback publishedValueFallback ,
IPublicAccessChecker publicAccessChecker ,
IFileService fileService ,
IContentTypeService contentTypeService ,
IPublicAccessService publicAccessService )
2017-07-20 11:21:28 +02:00
{
2020-08-21 14:52:47 +01:00
_webRoutingSettings = webRoutingSettings . Value ? ? throw new ArgumentNullException ( nameof ( webRoutingSettings ) ) ;
2017-05-12 14:49:44 +02:00
_contentFinders = contentFinders ? ? throw new ArgumentNullException ( nameof ( contentFinders ) ) ;
_contentLastChanceFinder = contentLastChanceFinder ? ? throw new ArgumentNullException ( nameof ( contentLastChanceFinder ) ) ;
_profilingLogger = proflog ? ? throw new ArgumentNullException ( nameof ( proflog ) ) ;
2018-06-03 17:21:15 +02:00
_variationContextAccessor = variationContextAccessor ? ? throw new ArgumentNullException ( nameof ( variationContextAccessor ) ) ;
2018-11-27 13:46:43 +01:00
_logger = proflog ;
2020-02-14 13:04:49 +01:00
_publishedUrlProvider = publishedUrlProvider ;
2020-02-28 11:15:25 +01:00
_requestAccessor = requestAccessor ;
_publishedValueFallback = publishedValueFallback ;
_publicAccessChecker = publicAccessChecker ;
_fileService = fileService ;
_contentTypeService = contentTypeService ;
_publicAccessService = publicAccessService ;
2017-07-20 11:21:28 +02:00
}
2016-10-11 18:52:01 +02:00
2019-01-31 09:08:51 +01:00
/// <inheritdoc />
2020-02-10 19:23:42 +01:00
public IPublishedRequest CreateRequest ( IUmbracoContext umbracoContext , Uri uri = null )
2017-07-20 11:21:28 +02:00
{
2020-03-12 09:52:34 +01:00
return new PublishedRequest ( this , umbracoContext , _webRoutingSettings , uri ? ? umbracoContext . CleanedUmbracoUrl ) ;
2017-07-20 11:21:28 +02:00
}
2016-10-11 18:52:01 +02:00
2017-05-12 14:49:44 +02:00
#region Request
2016-10-11 18:52:01 +02:00
2019-01-31 09:08:51 +01:00
/// <inheritdoc />
2020-02-10 19:23:42 +01:00
public bool TryRouteRequest ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
// disabled - is it going to change the routing?
//_pcr.OnPreparing();
2017-05-12 14:49:44 +02:00
2017-07-20 11:21:28 +02:00
FindDomain ( request ) ;
if ( request . IsRedirect ) return false ;
if ( request . HasPublishedContent ) return true ;
FindPublishedContent ( request ) ;
if ( request . IsRedirect ) return false ;
2017-05-12 14:49:44 +02:00
2017-07-20 11:21:28 +02:00
// don't handle anything - we just want to ensure that we find the content
//HandlePublishedContent();
//FindTemplate();
//FollowExternalRedirect();
//HandleWildcardDomains();
2017-05-12 14:49:44 +02:00
2017-07-20 11:21:28 +02:00
// disabled - we just want to ensure that we find the content
//_pcr.OnPrepared();
2017-05-12 14:49:44 +02:00
2017-07-20 11:21:28 +02:00
return request . HasPublishedContent ;
}
2017-05-30 10:50:09 +02:00
2018-06-03 17:21:15 +02:00
private void SetVariationContext ( string culture )
{
var variationContext = _variationContextAccessor . VariationContext ;
if ( variationContext ! = null & & variationContext . Culture = = culture ) return ;
_variationContextAccessor . VariationContext = new VariationContext ( culture ) ;
}
2019-01-31 09:08:51 +01:00
/// <inheritdoc />
2020-02-10 19:23:42 +01:00
public bool PrepareRequest ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
2016-10-11 18:52:01 +02:00
// note - at that point the original legacy module did something do handle IIS custom 404 errors
// ie pages looking like /anything.aspx?404;/path/to/document - I guess the reason was to support
// "directory urls" without having to do wildcard mapping to ASP.NET on old IIS. This is a pain
// to maintain and probably not used anymore - removed as of 06/2012. @zpqrtbnk.
//
// to trigger Umbraco's not-found, one should configure IIS and/or ASP.NET custom 404 errors
// so that they point to a non-existing page eg /redirect-404.aspx
// TODO: SD: We need more information on this for when we release 4.10.0 as I'm not sure what this means.
// trigger the Preparing event - at that point anything can still be changed
// the idea is that it is possible to change the uri
//
request . OnPreparing ( ) ;
2017-07-20 11:21:28 +02:00
//find domain
FindDomain ( request ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// if request has been flagged to redirect then return
// whoever called us is in charge of actually redirecting
if ( request . IsRedirect )
{
return false ;
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// set the culture on the thread - once, so it's set when running document lookups
Thread . CurrentThread . CurrentUICulture = Thread . CurrentThread . CurrentCulture = request . Culture ;
2018-06-03 17:21:15 +02:00
SetVariationContext ( request . Culture . Name ) ;
2016-10-11 18:52:01 +02:00
//find the published content if it's not assigned. This could be manually assigned with a custom route handler, or
// with something like EnsurePublishedContentRequestAttribute or UmbracoVirtualNodeRouteHandler. Those in turn call this method
// to setup the rest of the pipeline but we don't want to run the finders since there's one assigned.
2017-07-20 11:21:28 +02:00
if ( request . PublishedContent = = null )
{
2016-10-11 18:52:01 +02:00
// find the document & template
FindPublishedContentAndTemplate ( request ) ;
2017-07-20 11:21:28 +02:00
}
2016-10-11 18:52:01 +02:00
// handle wildcard domains
HandleWildcardDomains ( request ) ;
// set the culture on the thread -- again, 'cos it might have changed due to a finder or wildcard domain
Thread . CurrentThread . CurrentUICulture = Thread . CurrentThread . CurrentCulture = request . Culture ;
2018-06-03 17:21:15 +02:00
SetVariationContext ( request . Culture . Name ) ;
2016-10-11 18:52:01 +02:00
// trigger the Prepared event - at that point it is still possible to change about anything
// even though the request might be flagged for redirection - we'll redirect _after_ the event
//
2019-04-30 20:13:59 +01:00
// also, OnPrepared() will make the PublishedRequest readonly, so nothing can change
2016-10-11 18:52:01 +02:00
//
request . OnPrepared ( ) ;
// we don't take care of anything so if the content has changed, it's up to the user
// to find out the appropriate template
//complete the PCR and assign the remaining values
2017-07-20 11:21:28 +02:00
return ConfigureRequest ( request ) ;
}
2016-10-11 18:52:01 +02:00
/// <summary>
/// Called by PrepareRequest once everything has been discovered, resolved and assigned to the PCR. This method
/// finalizes the PCR with the values assigned.
/// </summary>
/// <returns>
/// Returns false if the request was not successfully configured
/// </returns>
/// <remarks>
/// This method logic has been put into it's own method in case developers have created a custom PCR or are assigning their own values
/// but need to finalize it themselves.
/// </remarks>
2020-02-10 19:23:42 +01:00
public bool ConfigureRequest ( IPublishedRequest frequest )
2016-10-11 18:52:01 +02:00
{
if ( frequest . HasPublishedContent = = false )
{
return false ;
}
// set the culture on the thread -- again, 'cos it might have changed in the event handler
Thread . CurrentThread . CurrentUICulture = Thread . CurrentThread . CurrentCulture = frequest . Culture ;
2018-06-03 17:21:15 +02:00
SetVariationContext ( frequest . Culture . Name ) ;
2016-10-11 18:52:01 +02:00
// if request has been flagged to redirect, or has no content to display,
// then return - whoever called us is in charge of actually redirecting
if ( frequest . IsRedirect | | frequest . HasPublishedContent = = false )
{
return false ;
}
// we may be 404 _and_ have a content
// can't go beyond that point without a PublishedContent to render
// it's ok not to have a template, in order to give MVC a chance to hijack routes
return true ;
}
2019-01-31 09:08:51 +01:00
/// <inheritdoc />
2020-02-10 19:23:42 +01:00
public void UpdateRequestToNotFound ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
// clear content
var content = request . PublishedContent ;
2016-10-11 18:52:01 +02:00
request . PublishedContent = null ;
2017-07-20 11:21:28 +02:00
HandlePublishedContent ( request ) ; // will go 404
FindTemplate ( request ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// if request has been flagged to redirect then return
// whoever called us is in charge of redirecting
if ( request . IsRedirect )
return ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
if ( request . HasPublishedContent = = false )
{
2016-10-11 18:52:01 +02:00
// means the engine could not find a proper document to handle 404
// restore the saved content so we know it exists
request . PublishedContent = content ;
2017-07-20 11:21:28 +02:00
return ;
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
if ( request . HasTemplate = = false )
{
// means we may have a document, but we have no template
// at that point there isn't much we can do and there is no point returning
// to Mvc since Mvc can't do much either
return ;
}
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
#endregion
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
#region Domain
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
/// <summary>
2019-04-30 20:13:59 +01:00
/// Finds the site root (if any) matching the http request, and updates the PublishedRequest accordingly.
2017-07-20 11:21:28 +02:00
/// </summary>
/// <returns>A value indicating whether a domain was found.</returns>
2020-02-10 19:23:42 +01:00
internal bool FindDomain ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
const string tracePrefix = "FindDomain: " ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// note - we are not handling schemes nor ports here.
2016-10-11 18:52:01 +02:00
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}Uri={RequestUri}" , tracePrefix , request . Uri ) ;
2016-10-11 18:52:01 +02:00
2018-04-26 16:03:08 +02:00
var domainsCache = request . UmbracoContext . PublishedSnapshot . Domains ;
2018-05-08 11:21:14 +10:00
var domains = domainsCache . GetAll ( includeWildcards : false ) . ToList ( ) ;
2018-05-08 11:06:07 +02:00
// determines whether a domain corresponds to a published document, since some
// domains may exist but on a document that has been unpublished - as a whole - or
// that is not published for the domain's culture - in which case the domain does
// not apply
bool IsPublishedContentDomain ( Domain domain )
2018-05-08 11:21:14 +10:00
{
2018-05-08 11:06:07 +02:00
// just get it from content cache - optimize there, not here
var domainDocument = request . UmbracoContext . PublishedSnapshot . Content . GetById ( domain . ContentId ) ;
// not published - at all
if ( domainDocument = = null )
2018-05-08 11:21:14 +10:00
return false ;
2018-05-08 11:06:07 +02:00
// invariant - always published
2018-06-20 14:18:57 +02:00
if ( ! domainDocument . ContentType . VariesByCulture ( ) )
2018-05-08 11:21:14 +10:00
return true ;
2018-05-08 11:06:07 +02:00
// variant, ensure that the culture corresponding to the domain's language is published
2019-06-06 16:54:00 +02:00
return domainDocument . Cultures . ContainsKey ( domain . Culture . Name ) ;
2018-05-08 11:06:07 +02:00
}
domains = domains . Where ( IsPublishedContentDomain ) . ToList ( ) ;
2018-05-02 14:52:00 +10:00
2018-04-26 16:03:08 +02:00
var defaultCulture = domainsCache . DefaultCulture ;
2017-07-20 11:21:28 +02:00
// try to find a domain matching the current request
2019-04-17 14:41:54 +02:00
var domainAndUri = DomainUtilities . SelectDomain ( domains , request . Uri , defaultCulture : defaultCulture ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// handle domain - always has a contentId and a culture
if ( domainAndUri ! = null )
{
2016-10-11 18:52:01 +02:00
// matching an existing domain
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}Matches domain={Domain}, rootId={RootContentId}, culture={Culture}" , tracePrefix , domainAndUri . Name , domainAndUri . ContentId , domainAndUri . Culture ) ;
2016-10-11 18:52:01 +02:00
request . Domain = domainAndUri ;
request . Culture = domainAndUri . Culture ;
// canonical? not implemented at the moment
// if (...)
// {
// _pcr.RedirectUrl = "...";
// return true;
// }
}
else
2017-07-20 11:21:28 +02:00
{
// not matching any existing domain
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}Matches no domain" , tracePrefix ) ;
2016-10-11 18:52:01 +02:00
2018-04-26 16:03:08 +02:00
request . Culture = defaultCulture = = null ? CultureInfo . CurrentUICulture : new CultureInfo ( defaultCulture ) ;
2017-07-20 11:21:28 +02:00
}
2016-10-11 18:52:01 +02:00
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}Culture={CultureName}" , tracePrefix , request . Culture . Name ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
return request . Domain ! = null ;
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
/// <summary>
/// Looks for wildcard domains in the path and updates <c>Culture</c> accordingly.
/// </summary>
2020-02-10 19:23:42 +01:00
internal void HandleWildcardDomains ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
const string tracePrefix = "HandleWildcardDomains: " ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
if ( request . HasPublishedContent = = false )
return ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
var nodePath = request . PublishedContent . Path ;
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}Path={NodePath}" , tracePrefix , nodePath ) ;
2016-10-11 18:52:01 +02:00
var rootNodeId = request . HasDomain ? request . Domain . ContentId : ( int? ) null ;
2019-04-17 14:41:54 +02:00
var domain = DomainUtilities . FindWildcardDomainInPath ( request . UmbracoContext . PublishedSnapshot . Domains . GetAll ( true ) , nodePath , rootNodeId ) ;
2016-10-11 18:52:01 +02:00
// always has a contentId and a culture
2017-07-20 11:21:28 +02:00
if ( domain ! = null )
{
2016-10-11 18:52:01 +02:00
request . Culture = domain . Culture ;
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}Got domain on node {DomainContentId}, set culture to {CultureName}" , tracePrefix , domain . ContentId , request . Culture . Name ) ;
2016-10-11 18:52:01 +02:00
}
2017-07-20 11:21:28 +02:00
else
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "{TracePrefix}No match." , tracePrefix ) ;
2017-07-20 11:21:28 +02:00
}
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
#endregion
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
#region Rendering engine
2016-10-11 18:52:01 +02:00
internal bool FindTemplateRenderingEngineInDirectory ( DirectoryInfo directory , string alias , string [ ] extensions )
{
if ( directory = = null | | directory . Exists = = false )
return false ;
var pos = alias . IndexOf ( '/' ) ;
if ( pos > 0 )
{
// recurse
var subdir = directory . GetDirectories ( alias . Substring ( 0 , pos ) ) . FirstOrDefault ( ) ;
alias = alias . Substring ( pos + 1 ) ;
return subdir ! = null & & FindTemplateRenderingEngineInDirectory ( subdir , alias , extensions ) ;
}
// look here
return directory . GetFiles ( ) . Any ( f = > extensions . Any ( e = > f . Name . InvariantEquals ( alias + e ) ) ) ;
}
2017-07-20 11:21:28 +02:00
#endregion
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
#region Document and template
2016-10-11 18:52:01 +02:00
2019-01-31 09:08:51 +01:00
/// <inheritdoc />
2017-07-20 11:21:28 +02:00
public ITemplate GetTemplate ( string alias )
{
2020-02-28 11:15:25 +01:00
return _fileService . GetTemplate ( alias ) ;
2017-07-20 11:21:28 +02:00
}
/// <summary>
2019-04-30 20:13:59 +01:00
/// Finds the Umbraco document (if any) matching the request, and updates the PublishedRequest accordingly.
2017-07-20 11:21:28 +02:00
/// </summary>
/// <returns>A value indicating whether a document and template were found.</returns>
2020-02-10 19:23:42 +01:00
private void FindPublishedContentAndTemplate ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "FindPublishedContentAndTemplate: Path={UriAbsolutePath}" , request . Uri . AbsolutePath ) ;
2017-07-20 11:21:28 +02:00
// run the document finders
FindPublishedContent ( request ) ;
2016-10-11 18:52:01 +02:00
// if request has been flagged to redirect then return
// whoever called us is in charge of actually redirecting
// -- do not process anything any further --
if ( request . IsRedirect )
2017-07-20 11:21:28 +02:00
return ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// not handling umbracoRedirect here but after LookupDocument2
// so internal redirect, 404, etc has precedence over redirect
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// handle not-found, redirects, access...
HandlePublishedContent ( request ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// find a template
FindTemplate ( request ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// handle umbracoRedirect
FollowExternalRedirect ( request ) ;
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
/// <summary>
/// Tries to find the document matching the request, by running the IPublishedContentFinder instances.
/// </summary>
2016-10-11 18:52:01 +02:00
/// <exception cref="InvalidOperationException">There is no finder collection.</exception>
2020-02-10 19:23:42 +01:00
internal void FindPublishedContent ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
const string tracePrefix = "FindPublishedContent: " ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
// look for the document
// the first successful finder, if any, will set this.PublishedContent, and may also set this.Template
// some finders may implement caching
2016-10-11 18:52:01 +02:00
2017-10-31 12:48:24 +01:00
using ( _profilingLogger . DebugDuration < PublishedRouter > (
2016-10-11 18:52:01 +02:00
$"{tracePrefix}Begin finders" ,
$"{tracePrefix}End finders, {(request.HasPublishedContent ? " a document was found " : " no document was found ")}" ) )
2017-07-20 11:21:28 +02:00
{
2016-10-11 18:52:01 +02:00
//iterate but return on first one that finds it
2017-07-20 11:21:28 +02:00
var found = _contentFinders . Any ( finder = >
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "Finder {ContentFinderType}" , finder . GetType ( ) . FullName ) ;
2017-07-20 11:21:28 +02:00
return finder . TryFindContent ( request ) ;
} ) ;
}
2016-10-11 18:52:01 +02:00
// indicate that the published content (if any) we have at the moment is the
// one that was found by the standard finders before anything else took place.
request . SetIsInitialPublishedContent ( ) ;
2017-07-20 11:21:28 +02:00
}
/// <summary>
/// Handles the published content (if any).
/// </summary>
/// <remarks>
/// Handles "not found", internal redirects, access validation...
/// things that must be handled in one place because they can create loops
/// </remarks>
2020-02-10 19:23:42 +01:00
private void HandlePublishedContent ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
// because these might loop, we have to have some sort of infinite loop detection
int i = 0 , j = 0 ;
const int maxLoop = 8 ;
do
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "HandlePublishedContent: Loop {LoopCounter}" , i ) ;
2017-07-20 11:21:28 +02:00
// handle not found
if ( request . HasPublishedContent = = false )
{
2016-10-11 18:52:01 +02:00
request . Is404 = true ;
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "HandlePublishedContent: No document, try last chance lookup" ) ;
2017-07-20 11:21:28 +02:00
// if it fails then give up, there isn't much more that we can do
if ( _contentLastChanceFinder . TryFindContent ( request ) = = false )
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "HandlePublishedContent: Failed to find a document, give up" ) ;
2017-07-20 11:21:28 +02:00
break ;
}
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "HandlePublishedContent: Found a document" ) ;
2017-07-20 11:21:28 +02:00
}
// follow internal redirects as long as it's not running out of control ie infinite loop of some sort
j = 0 ;
while ( FollowInternalRedirects ( request ) & & j + + < maxLoop )
{ }
if ( j = = maxLoop ) // we're running out of control
break ;
// ensure access
if ( request . HasPublishedContent )
EnsurePublishedContentAccess ( request ) ;
// loop while we don't have page, ie the redirect or access
// got us to nowhere and now we need to run the notFoundLookup again
// as long as it's not running out of control ie infinite loop of some sort
} while ( request . HasPublishedContent = = false & & i + + < maxLoop ) ;
if ( i = = maxLoop | | j = = maxLoop )
{
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "HandlePublishedContent: Looks like we are running into an infinite loop, abort" ) ;
2016-10-11 18:52:01 +02:00
request . PublishedContent = null ;
2017-07-20 11:21:28 +02:00
}
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "HandlePublishedContent: End" ) ;
2017-07-20 11:21:28 +02:00
}
/// <summary>
/// Follows internal redirections through the <c>umbracoInternalRedirectId</c> document property.
/// </summary>
/// <returns>A value indicating whether redirection took place and led to a new published document.</returns>
/// <remarks>
/// <para>Redirecting to a different site root and/or culture will not pick the new site root nor the new culture.</para>
/// <para>As per legacy, if the redirect does not work, we just ignore it.</para>
/// </remarks>
2020-02-10 19:23:42 +01:00
private bool FollowInternalRedirects ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
if ( request . PublishedContent = = null )
throw new InvalidOperationException ( "There is no PublishedContent." ) ;
// don't try to find a redirect if the property doesn't exist
if ( request . PublishedContent . HasProperty ( Constants . Conventions . Content . InternalRedirectId ) = = false )
return false ;
2016-10-11 18:52:01 +02:00
2017-05-30 10:50:09 +02:00
var redirect = false ;
2017-07-20 11:21:28 +02:00
var valid = false ;
IPublishedContent internalRedirectNode = null ;
2020-02-28 11:15:25 +01:00
var internalRedirectId = request . PublishedContent . Value ( _publishedValueFallback , Constants . Conventions . Content . InternalRedirectId , defaultValue : - 1 ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
if ( internalRedirectId > 0 )
{
// try and get the redirect node from a legacy integer ID
valid = true ;
2019-04-22 18:14:03 +02:00
internalRedirectNode = request . UmbracoContext . Content . GetById ( internalRedirectId ) ;
2017-07-20 11:21:28 +02:00
}
else
{
2020-02-28 11:15:25 +01:00
var udiInternalRedirectId = request . PublishedContent . Value < GuidUdi > ( _publishedValueFallback , Constants . Conventions . Content . InternalRedirectId ) ;
2017-07-20 11:21:28 +02:00
if ( udiInternalRedirectId ! = null )
{
// try and get the redirect node from a UDI Guid
valid = true ;
2019-04-22 18:14:03 +02:00
internalRedirectNode = request . UmbracoContext . Content . GetById ( udiInternalRedirectId . Guid ) ;
2017-07-20 11:21:28 +02:00
}
}
if ( valid = = false )
{
// bad redirect - log and display the current page (legacy behavior)
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "FollowInternalRedirects: Failed to redirect to id={InternalRedirectId}: value is not an int nor a GuidUdi." ,
request . PublishedContent . GetProperty ( Constants . Conventions . Content . InternalRedirectId ) . GetSourceValue ( ) ) ;
2017-05-30 10:50:09 +02:00
}
if ( internalRedirectNode = = null )
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "FollowInternalRedirects: Failed to redirect to id={InternalRedirectId}: no such published document." ,
request . PublishedContent . GetProperty ( Constants . Conventions . Content . InternalRedirectId ) . GetSourceValue ( ) ) ;
2017-05-30 10:50:09 +02:00
}
2017-07-20 11:21:28 +02:00
else if ( internalRedirectId = = request . PublishedContent . Id )
{
// redirect to self
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "FollowInternalRedirects: Redirecting to self, ignore" ) ;
2017-07-20 11:21:28 +02:00
}
else
{
2017-05-30 10:50:09 +02:00
request . SetInternalRedirectPublishedContent ( internalRedirectNode ) ; // don't use .PublishedContent here
2017-07-20 11:21:28 +02:00
redirect = true ;
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "FollowInternalRedirects: Redirecting to id={InternalRedirectId}" , internalRedirectId ) ;
2017-07-20 11:21:28 +02:00
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
return redirect ;
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
/// <summary>
/// Ensures that access to current node is permitted.
/// </summary>
/// <remarks>Redirecting to a different site root and/or culture will not pick the new site root nor the new culture.</remarks>
2020-02-10 19:23:42 +01:00
private void EnsurePublishedContentAccess ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
if ( request . PublishedContent = = null )
throw new InvalidOperationException ( "There is no PublishedContent." ) ;
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
var path = request . PublishedContent . Path ;
2016-10-11 18:52:01 +02:00
2020-02-28 11:15:25 +01:00
var publicAccessAttempt = _publicAccessService . IsProtected ( path ) ;
2016-10-11 18:52:01 +02:00
if ( publicAccessAttempt )
2017-07-20 11:21:28 +02:00
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "EnsurePublishedContentAccess: Page is protected, check for access" ) ;
2016-10-11 18:52:01 +02:00
2020-02-28 11:15:25 +01:00
var status = _publicAccessChecker . HasMemberAccessToContent ( request . PublishedContent . Id ) ;
switch ( status )
2017-07-20 11:21:28 +02:00
{
2020-02-28 11:15:25 +01:00
case PublicAccessStatus . NotLoggedIn :
_logger . Debug < PublishedRouter > ( "EnsurePublishedContentAccess: Not logged in, redirect to login page" ) ;
SetPublishedContentAsOtherPage ( request , publicAccessAttempt . Result . LoginNodeId ) ;
break ;
case PublicAccessStatus . AccessDenied :
_logger . Debug < PublishedRouter > ( "EnsurePublishedContentAccess: Current member has not access, redirect to error page" ) ;
SetPublishedContentAsOtherPage ( request , publicAccessAttempt . Result . NoAccessNodeId ) ;
break ;
case PublicAccessStatus . LockedOut :
_logger . Debug < PublishedRouter > ( "Current member is locked out, redirect to error page" ) ;
SetPublishedContentAsOtherPage ( request , publicAccessAttempt . Result . NoAccessNodeId ) ;
break ;
case PublicAccessStatus . NotApproved :
_logger . Debug < PublishedRouter > ( "Current member is unapproved, redirect to error page" ) ;
SetPublishedContentAsOtherPage ( request , publicAccessAttempt . Result . NoAccessNodeId ) ;
break ;
case PublicAccessStatus . AccessAccepted :
2019-11-25 21:20:00 +11:00
_logger . Debug < PublishedRouter > ( "Current member has access" ) ;
2020-02-28 11:15:25 +01:00
break ;
2017-07-20 11:21:28 +02:00
}
}
else
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "EnsurePublishedContentAccess: Page is not protected" ) ;
2017-07-20 11:21:28 +02:00
}
}
2020-02-28 11:15:25 +01:00
private static void SetPublishedContentAsOtherPage ( IPublishedRequest request , int errorPageId )
{
if ( errorPageId ! = request . PublishedContent . Id )
request . PublishedContent = request . UmbracoContext . PublishedSnapshot . Content . GetById ( errorPageId ) ;
}
2017-07-20 11:21:28 +02:00
/// <summary>
/// Finds a template for the current node, if any.
/// </summary>
2020-02-10 19:23:42 +01:00
private void FindTemplate ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
// NOTE: at the moment there is only 1 way to find a template, and then ppl must
// use the Prepared event to change the template if they wish. Should we also
// implement an ITemplateFinder logic?
2016-10-11 18:52:01 +02:00
if ( request . PublishedContent = = null )
{
request . TemplateModel = null ;
return ;
}
2017-07-20 11:21:28 +02:00
// read the alternate template alias, from querystring, form, cookie or server vars,
// only if the published content is the initial once, else the alternate template
// does not apply
2019-01-26 10:52:19 -05:00
// + optionally, apply the alternate template on internal redirects
2018-09-06 14:10:10 +02:00
var useAltTemplate = request . IsInitialPublishedContent
2020-03-12 09:52:34 +01:00
| | ( _webRoutingSettings . InternalRedirectPreservesTemplate & & request . IsInternalRedirectPublishedContent ) ;
2016-10-11 18:52:01 +02:00
var altTemplate = useAltTemplate
2020-02-28 11:15:25 +01:00
? _requestAccessor . GetRequestValue ( Constants . Conventions . Url . AltTemplate )
2017-07-20 11:21:28 +02:00
: null ;
if ( string . IsNullOrWhiteSpace ( altTemplate ) )
{
// we don't have an alternate template specified. use the current one if there's one already,
// which can happen if a content lookup also set the template (LookupByNiceUrlAndTemplate...),
// else lookup the template id on the document then lookup the template with that id.
if ( request . HasTemplate )
{
2020-02-10 19:23:42 +01:00
_logger . Debug < IPublishedRequest > ( "FindTemplate: Has a template already, and no alternate template." ) ;
2017-07-20 11:21:28 +02:00
return ;
}
2018-09-06 14:10:10 +02:00
// TODO: When we remove the need for a database for templates, then this id should be irrelevant,
2017-07-20 11:21:28 +02:00
// not sure how were going to do this nicely.
2019-02-28 11:01:53 +10:00
// TODO: We need to limit altTemplate to only allow templates that are assigned to the current document type!
// if the template isn't assigned to the document type we should log a warning and return 404
2017-07-20 11:21:28 +02:00
var templateId = request . PublishedContent . TemplateId ;
2018-09-06 14:10:10 +02:00
request . TemplateModel = GetTemplateModel ( templateId ) ;
2017-07-20 11:21:28 +02:00
}
else
{
// we have an alternate template specified. lookup the template with that alias
// this means the we override any template that a content lookup might have set
// so /path/to/page/template1?altTemplate=template2 will use template2
// ignore if the alias does not match - just trace
if ( request . HasTemplate )
2018-09-06 14:10:10 +02:00
_logger . Debug < PublishedRouter > ( "FindTemplate: Has a template already, but also an alternative template." ) ;
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "FindTemplate: Look for alternative template alias={AltTemplate}" , altTemplate ) ;
2017-07-20 11:21:28 +02:00
2018-09-06 14:10:10 +02:00
// IsAllowedTemplate deals both with DisableAlternativeTemplates and ValidateAlternativeTemplates settings
2020-02-28 11:15:25 +01:00
if ( request . PublishedContent . IsAllowedTemplate (
_fileService ,
_contentTypeService ,
2020-03-12 09:52:34 +01:00
_webRoutingSettings . DisableAlternativeTemplates ,
_webRoutingSettings . ValidateAlternativeTemplates ,
2020-02-28 11:15:25 +01:00
altTemplate ) )
2017-07-20 11:21:28 +02:00
{
2018-09-06 14:10:10 +02:00
// allowed, use
2020-02-28 11:15:25 +01:00
var template = _fileService . GetTemplate ( altTemplate ) ;
2018-09-06 14:10:10 +02:00
if ( template ! = null )
{
request . TemplateModel = template ;
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "FindTemplate: Got alternative template id={TemplateId} alias={TemplateAlias}" , template . Id , template . Alias ) ;
2018-09-06 14:10:10 +02:00
}
else
{
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "FindTemplate: The alternative template with alias={AltTemplate} does not exist, ignoring." , altTemplate ) ;
2018-09-06 14:10:10 +02:00
}
2017-07-20 11:21:28 +02:00
}
else
{
2018-09-11 08:44:58 +01:00
_logger . Warn < PublishedRouter > ( "FindTemplate: Alternative template {TemplateAlias} is not allowed on node {NodeId}, ignoring." , altTemplate , request . PublishedContent . Id ) ;
2018-09-06 14:10:10 +02:00
// no allowed, back to default
var templateId = request . PublishedContent . TemplateId ;
request . TemplateModel = GetTemplateModel ( templateId ) ;
2017-07-20 11:21:28 +02:00
}
}
if ( request . HasTemplate = = false )
{
2018-08-14 22:36:47 +01:00
_logger . Debug < PublishedRouter > ( "FindTemplate: No template was found." ) ;
2017-07-20 11:21:28 +02:00
// initial idea was: if we're not already 404 and UmbracoSettings.HandleMissingTemplateAs404 is true
// then reset _pcr.Document to null to force a 404.
//
// but: because we want to let MVC hijack routes even though no template is defined, we decide that
// a missing template is OK but the request will then be forwarded to MVC, which will need to take
// care of everything.
//
// so, don't set _pcr.Document to null here
}
else
{
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "FindTemplate: Running with template id={TemplateId} alias={TemplateAlias}" , request . TemplateModel . Id , request . TemplateModel . Alias ) ;
2017-07-20 11:21:28 +02:00
}
}
2018-11-15 07:23:09 +00:00
private ITemplate GetTemplateModel ( int? templateId )
2018-09-06 14:10:10 +02:00
{
2019-02-18 19:07:51 +11:00
if ( templateId . HasValue = = false | | templateId . Value = = default )
2018-09-06 14:10:10 +02:00
{
_logger . Debug < PublishedRouter > ( "GetTemplateModel: No template." ) ;
return null ;
}
_logger . Debug < PublishedRouter > ( "GetTemplateModel: Get template id={TemplateId}" , templateId ) ;
2018-11-15 07:23:09 +00:00
if ( templateId = = null )
throw new InvalidOperationException ( "The template is not set, the page cannot render." ) ;
2020-02-28 11:15:25 +01:00
var template = _fileService . GetTemplate ( templateId . Value ) ;
2018-09-06 14:10:10 +02:00
if ( template = = null )
throw new InvalidOperationException ( "The template with Id " + templateId + " does not exist, the page cannot render." ) ;
2018-09-11 08:44:58 +01:00
_logger . Debug < PublishedRouter > ( "GetTemplateModel: Got template id={TemplateId} alias={TemplateAlias}" , template . Id , template . Alias ) ;
2018-09-06 14:10:10 +02:00
return template ;
}
2017-07-20 11:21:28 +02:00
/// <summary>
/// Follows external redirection through <c>umbracoRedirect</c> document property.
/// </summary>
/// <remarks>As per legacy, if the redirect does not work, we just ignore it.</remarks>
2020-02-10 19:23:42 +01:00
private void FollowExternalRedirect ( IPublishedRequest request )
2017-07-20 11:21:28 +02:00
{
if ( request . HasPublishedContent = = false ) return ;
// don't try to find a redirect if the property doesn't exist
if ( request . PublishedContent . HasProperty ( Constants . Conventions . Content . Redirect ) = = false )
return ;
2017-05-30 10:50:09 +02:00
2020-02-28 11:15:25 +01:00
var redirectId = request . PublishedContent . Value ( _publishedValueFallback , Constants . Conventions . Content . Redirect , defaultValue : - 1 ) ;
2017-07-20 11:21:28 +02:00
var redirectUrl = "#" ;
if ( redirectId > 0 )
{
2020-02-14 13:04:49 +01:00
redirectUrl = _publishedUrlProvider . GetUrl ( redirectId ) ;
2017-07-20 11:21:28 +02:00
}
else
{
// might be a UDI instead of an int Id
2020-02-28 11:15:25 +01:00
var redirectUdi = request . PublishedContent . Value < GuidUdi > ( _publishedValueFallback , Constants . Conventions . Content . Redirect ) ;
2017-07-20 11:21:28 +02:00
if ( redirectUdi ! = null )
2020-02-14 13:04:49 +01:00
redirectUrl = _publishedUrlProvider . GetUrl ( redirectUdi . Guid ) ;
2017-07-20 11:21:28 +02:00
}
2017-05-30 10:50:09 +02:00
if ( redirectUrl ! = "#" )
2016-10-11 18:52:01 +02:00
request . SetRedirect ( redirectUrl ) ;
2017-07-20 11:21:28 +02:00
}
2016-10-11 18:52:01 +02:00
2017-07-20 11:21:28 +02:00
#endregion
}
2016-10-11 18:52:01 +02:00
}