1 // Copyright 2021 Ian Jackson and contributors to Hippotat
2 // SPDX-License-Identifier: GPL-3.0-or-later
3 // There is NO WARRANTY.
5 use hippotat::prelude::*;
7 #[derive(StructOpt,Debug)]
16 const METADATA_MAX_LEN: usize = MAX_OVERHEAD;
18 type AllClients = HashMap<ClientName, ClientHandles>;
20 struct ClientHandles {
21 ic: Arc<InstanceConfig>,
22 web: tokio::sync::mpsc::Sender<WebRequest>,
25 /// Sent from hyper worker pool task to client task
26 #[allow(dead_code)] // xxx
29 // initial part of body
30 // used up to and including first 2 lines of metadata
31 // end delimiter for the metadata not yet located, but in here somewhere
33 initial_remaining: usize,
35 body: hyper::body::Body,
36 boundary_finder: multipart::BoundaryFinder,
37 reply_to: tokio::sync::oneshot::Sender<WebResponse>,
42 /// Reply from client task to hyper worker pool task
43 #[allow(dead_code)] // xxx
47 data: Result<WebResponseData, AE>,
50 type WebResponseData = Vec<u8>;
52 #[throws(PacketError)]
53 pub fn route_packet(conn: &str, link: &dyn Display,
54 packet: Box<[u8]>, daddr: IpAddr)
57 trace!("{} {} discarding packet daddr={:?} len={}",
58 conn, link, daddr, packet.len());
63 all_clients: Arc<AllClients>,
64 req: hyper::Request<hyper::Body>
65 ) -> Result<hyper::Response<hyper::Body>, hyper::http::Error> {
66 if req.method() == Method::GET {
67 let mut resp = hyper::Response::new(hyper::Body::from("hippotat\r\n"));
68 resp.headers_mut().insert(
70 "text/plain; charset=US-ASCII".try_into().unwrap()
75 let mut warnings: Warnings = default();
79 let get_header = |hn: &str| {
80 let mut values = req.headers().get_all(hn).iter();
81 let v = values.next().ok_or_else(|| anyhow!("missing {}", hn))?;
82 if values.next().is_some() { throw!(anyhow!("multiple {}!", hn)); }
83 let v = v.to_str().context(anyhow!("interpret {} as UTF-8", hn))?;
87 let mkboundary = |b: &'_ _| format!("\n--{}", b).into_bytes();
88 let boundary = match (||{
89 let t = get_header("Content-Type")?;
90 let t: mime::Mime = t.parse().context("parse Content-Type")?;
91 if t.type_() != "multipart" { throw!(anyhow!("not multipart/")) }
92 let b = mime::BOUNDARY;
93 let b = t.get_param(b).ok_or_else(|| anyhow!("missing boundary=..."))?;
94 if t.subtype() != "form-data" {
95 warnings.add(&"Content-Type not /form-data")?;
97 let b = mkboundary(b.as_str());
102 warnings.add(&e.wrap_err("guessing boundary"))?;
107 let length_hint: usize = (||{
108 let clength = get_header("Content-Length")?;
109 let clength = clength.parse().context("parse Content-Length")?;
112 |e| { let _ = warnings.add(&e.wrap_err("parsing Content-Length")); 0 }
115 let mut body = req.into_body();
116 let initial = match read_limited_bytes(
117 METADATA_MAX_LEN, default(), length_hint, &mut body
120 Err(ReadLimitedError::Truncated { sofar,.. }) => sofar,
121 Err(ReadLimitedError::Hyper(e)) => throw!(e),
124 let boundary_finder = memmem::Finder::new(&boundary);
125 let mut boundary_iter = boundary_finder.find_iter(&initial);
127 let start = if initial.starts_with(&boundary[1..]) { boundary.len()-1 }
128 else if let Some(start) = boundary_iter.next() { start + boundary.len() }
129 else { throw!(anyhow!("initial boundary not found")) };
131 let comp = multipart::process_boundary
132 (&mut warnings, &initial[start..], PartName::m)?
133 .ok_or_else(|| anyhow!(r#"no "m" component"#))?;
135 if comp.name != PartName::m { throw!(anyhow!(
136 r#"first multipart component must be name="m""#
139 let mut meta = MetadataFieldIterator::new(comp.payload);
141 let client: ClientName = meta.need_parse().context("client addr")?;
143 let mut hmac_got = [0; HMAC_L];
144 let (client_time, hmac_got_l) = (||{
145 let token: &str = meta.need_next().context(r#"find in "m""#)?;
146 let (time_t, hmac_b64) = token.split_once(' ')
147 .ok_or_else(|| anyhow!("split"))?;
148 let time_t = u64::from_str_radix(time_t, 16).context("parse time_t")?;
150 &mut base64::read::DecoderReader::new(&mut hmac_b64.as_bytes(),
152 &mut &mut hmac_got[..]
153 ).context("parse b64 token")?;
154 let l = l.try_into()?;
155 Ok::<_,AE>((time_t, l))
156 })().context("token")?;
157 let hmac_got = &hmac_got[0..hmac_got_l];
159 let client_name = client;
160 let client = all_clients.get(&client_name);
162 // We attempt to hide whether the client exists we don't try to
163 // hide the hash lookup computationgs, but we do try to hide the
164 // HMAC computation by always doing it. We hope that the compiler
165 // doesn't produce a specialised implementation for the dummy
167 let client_exists = subtle::Choice::from(client.is_some() as u8);
168 let secret = client.map(|c| c.ic.secret.0.as_bytes());
169 let secret = secret.unwrap_or(&[0x55; HMAC_B][..]);
170 let client_time_s = format!("{:x}", client_time);
171 let hmac_exp = token_hmac(secret, client_time_s.as_bytes());
172 // We also definitely want a consttime memeq for the hmac value
173 let hmac_ok = hmac_got.ct_eq(&hmac_exp);
174 //dbg!(DumpHex(&hmac_exp), client.is_some());
175 //dbg!(DumpHex(hmac_got), hmac_ok, client_exists);
176 if ! bool::from(hmac_ok & client_exists) {
177 debug!("{} rejected client {}", &conn, &client_name);
178 let body = hyper::Body::from("Not authorised\r\n");
180 hyper::Response::builder()
181 .status(hyper::StatusCode::FORBIDDEN)
182 .header("Content-Type", r#"text/plain; charset="utf-8""#)
187 let client = client.unwrap();
188 let now = time_t_now();
189 let chk_skew = |a: u64, b: u64, c_ahead_behind| {
190 if let Some(a_ahead) = a.checked_sub(b) {
191 if a_ahead > client.ic.max_clock_skew.as_secs() {
192 throw!(anyhow!("too much clock skew (client {} by {})",
193 c_ahead_behind, a_ahead));
198 chk_skew(client_time, now, "ahead")?;
199 chk_skew(now, client_time, "behind")?;
201 let initial_remaining = meta.remaining_bytes_len();
203 //eprintln!("boundary={:?} start={} name={:?} client={}",
204 // boundary, start, &comp.name, &client.ic);
206 let (reply_to, reply_recv) = tokio::sync::oneshot::channel();
207 trace!("{} {} request, Content-Length={}",
208 &conn, &client_name, length_hint);
209 let wreq = WebRequest {
213 boundary_finder: boundary_finder.into_owned(),
215 warnings: mem::take(&mut warnings),
220 client.web.try_send(wreq)
221 .map_err(|_| anyhow!("client task shut down!"))?;
223 let reply: WebResponse = reply_recv.await?;
224 warnings = reply.warnings;
225 let data = reply.data?;
227 if warnings.warnings.is_empty() {
228 trace!("{} {} responding, {}",
229 &conn, &client_name, data.len());
231 debug!("{} {} responding, {} warnings={:?}",
232 &conn, &client_name, data.len(),
236 let data = hyper::Body::from(data);
238 hyper::Response::builder()
239 .header("Content-Type", r#"application/octet-stream"#)
242 }.await.unwrap_or_else(|e| {
243 debug!("{} error {}", &conn, &e);
244 let mut errmsg = format!("ERROR\n\n{:?}\n\n", &e);
245 for w in warnings.warnings {
246 write!(errmsg, "warning: {}\n", w).unwrap();
248 hyper::Response::builder()
249 .status(hyper::StatusCode::BAD_REQUEST)
250 .header("Content-Type", r#"text/plain; charset="utf-8""#)
255 #[allow(unused_variables)] // xxx
256 #[allow(unused_mut)] // xxx
257 async fn run_client(ic: Arc<InstanceConfig>,
258 mut web: mpsc::Receiver<WebRequest>)
262 reply_to: tokio::sync::oneshot::Sender<WebResponse>,
263 oi: OutstandingInner,
266 struct OutstandingInner {
267 target_requests_outstanding: u32,
269 let mut outstanding: VecDeque<Outstanding> = default();
270 let downbound: VecDeque<(/*xxx*/)> = default();
272 let try_send_response = |
273 reply_to: tokio::sync::oneshot::Sender<WebResponse>,
274 response: WebResponse
276 reply_to.send(response)
277 .unwrap_or_else(|_: WebResponse| () /* oh dear */ /* xxx trace? */);
282 if ! downbound.is_empty() {
283 outstanding.pop_front()
284 } else if let Some((i,_)) = outstanding.iter().enumerate().find({
285 |(_,o)| outstanding.len() > o.oi.target_requests_outstanding.sat()
287 Some(outstanding.remove(i).unwrap())
292 let response = WebResponse {
293 data: Ok(vec![ /* xxx */ ]),
297 try_send_response(ret.reply_to, response);
304 initial, initial_remaining, length_hint, mut body,
306 reply_to, conn, mut warnings,
307 } = req.ok_or_else(|| anyhow!("webservers all shut down!"))?;
311 let initial_used = initial.len() - initial_remaining;
313 let whole_request = read_limited_bytes(
314 ic.max_batch_up.sat(),
318 ).await.context("read request body")?;
320 let (meta, mut comps) =
321 multipart::ComponentIterator::resume_mid_component(
322 &whole_request[initial_used..],
324 ).context("resume parsing body, after auth checks")?;
326 let mut meta = MetadataFieldIterator::new(&meta);
329 { $v:ident, ( $( $badcmp:tt )? ), $ret:expr,
330 let $server:ident, $client:ident $($code:tt)*
334 let $client $($code)*
336 if $client $badcmp $server {
337 throw!(anyhow!("mismatch: client={:?} {} server={:?}",
338 $client, stringify!($badcmp), $server));
342 })().context(stringify!($v))?;
348 target_requests_outstanding, ( != ), client,
349 let server, client: u32 = meta.need_parse()?;
353 http_timeout, ( > ), client,
354 let server, client = Duration::from_secs(meta.need_parse()?);
359 let server, client: u32 = meta.parse()?.unwrap_or(server);
363 max_batch_down, (), min(client, server),
364 let server, client: u32 = meta.parse()?.unwrap_or(server);
368 max_batch_up, ( > ), client,
369 let server, client = meta.parse()?.unwrap_or(server);
372 while let Some(comp) = comps.next(&mut warnings, PartName::d)? {
373 if comp.name != PartName::d {
374 warnings.add(&format_args!("unexpected part {:?}", comp.name))?;
376 checkn(Mime2Slip, mtu, comp.payload, |header| {
377 let saddr = ip_packet_addr::<false>(header)?;
378 if saddr != ic.link.client.0 { throw!(PE::Src(saddr)) }
379 let daddr = ip_packet_addr::<true>(header)?;
381 }, |(daddr,packet)| route_packet(
382 &conn, &ic.link.client, daddr,packet
384 |e| Ok::<_,SlipFramesError<_>>({ warnings.add(&e)?; })
388 let oi = OutstandingInner {
389 target_requests_outstanding,
393 Ok(oi) => outstanding.push_back(Outstanding { reply_to, oi }),
395 try_send_response(reply_to, WebResponse {
404 //Err(anyhow!("xxx"))
409 let opts = Opts::from_args();
415 let (global, ipif) = config::startup(
416 "hippotatd", LinkEnd::Server,
417 &opts.config, &opts.log, |ics|
419 let global = config::InstanceConfigGlobal::from(&ics);
420 let ipif = Ipif::start(&global.ipif, None)?;
422 let all_clients: AllClients = ics.into_iter().map(|ic| {
423 let ic = Arc::new(ic);
425 let (web_send, web_recv) = mpsc::channel(
426 5 // xxx should me max_requests_outstanding but that's
427 // marked client-only so needs rework
430 let ic_ = ic.clone();
431 tasks.push((tokio::spawn(async move {
432 run_client(ic_, web_recv).await.void_unwrap_err()
433 }), format!("client {}", &ic)));
441 let all_clients = Arc::new(all_clients);
443 for addr in &global.addrs {
444 let all_clients_ = all_clients.clone();
445 let make_service = hyper::service::make_service_fn(
446 move |conn: &hyper::server::conn::AddrStream| {
447 let all_clients_ = all_clients_.clone();
448 let conn = Arc::new(format!("[{}]", conn.remote_addr()));
449 async { Ok::<_, Void>( hyper::service::service_fn(move |req| {
450 handle(conn.clone(), all_clients_.clone(), req)
455 let addr = SocketAddr::new(*addr, global.port);
456 let server = hyper::Server::try_bind(&addr)
458 .http1_preserve_header_case(true)
459 .serve(make_service);
460 info!("listening on {}", &addr);
461 let task = tokio::task::spawn(async move {
463 Ok(()) => anyhow!("shut down?!"),
467 tasks.push((task, format!("http server {}", addr)));
473 let died = future::select_all(
474 tasks.iter_mut().map(|e| &mut e.0)
476 error!("xxx {:?}", &died);
478 ipif.quitting(None).await;