| // Copyright 2019 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "quiche/quic/masque/masque_server_backend.h" |
| |
| #include <cstdint> |
| #include <cstring> |
| #include <memory> |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include "absl/strings/escaping.h" |
| #include "absl/strings/str_split.h" |
| #include "absl/strings/string_view.h" |
| #include "openssl/curve25519.h" |
| #include "quiche/quic/core/quic_connection_id.h" |
| #include "quiche/quic/masque/masque_utils.h" |
| #include "quiche/quic/platform/api/quic_bug_tracker.h" |
| #include "quiche/quic/platform/api/quic_ip_address.h" |
| #include "quiche/quic/platform/api/quic_logging.h" |
| #include "quiche/quic/tools/quic_backend_response.h" |
| #include "quiche/quic/tools/quic_memory_cache_backend.h" |
| #include "quiche/quic/tools/quic_simple_server_backend.h" |
| #include "quiche/common/http/http_header_block.h" |
| #include "quiche/common/quiche_text_utils.h" |
| |
| namespace quic { |
| |
| MasqueServerBackend::MasqueServerBackend(MasqueMode /*masque_mode*/, |
| const std::string& server_authority, |
| const std::string& cache_directory) |
| : server_authority_(server_authority) { |
| // Start with client IP 10.1.1.2. |
| connect_ip_next_client_ip_[0] = 10; |
| connect_ip_next_client_ip_[1] = 1; |
| connect_ip_next_client_ip_[2] = 1; |
| connect_ip_next_client_ip_[3] = 2; |
| |
| if (!cache_directory.empty()) { |
| QuicMemoryCacheBackend::InitializeBackend(cache_directory); |
| } |
| |
| // We don't currently use `masque_mode_` but will in the future. To silence |
| // clang's `-Wunused-private-field` warning for this when building QUICHE for |
| // Chrome, add a use of it here. |
| (void)masque_mode_; |
| } |
| |
| bool MasqueServerBackend::MaybeHandleMasqueRequest( |
| const quiche::HttpHeaderBlock& request_headers, |
| QuicSimpleServerBackend::RequestHandler* request_handler) { |
| auto method_pair = request_headers.find(":method"); |
| if (method_pair == request_headers.end()) { |
| // Request is missing a method. |
| return false; |
| } |
| absl::string_view method = method_pair->second; |
| auto protocol_pair = request_headers.find(":protocol"); |
| if (method != "CONNECT" || protocol_pair == request_headers.end() || |
| (protocol_pair->second != "connect-udp" && |
| protocol_pair->second != "connect-ip" && |
| protocol_pair->second != "connect-ethernet")) { |
| // This is not a MASQUE request. |
| if (!concealed_auth_on_all_requests_) { |
| return false; |
| } |
| } |
| |
| if (!server_authority_.empty()) { |
| auto authority_pair = request_headers.find(":authority"); |
| if (authority_pair == request_headers.end()) { |
| // Cannot enforce missing authority. |
| return false; |
| } |
| absl::string_view authority = authority_pair->second; |
| if (server_authority_ != authority) { |
| // This request does not match server_authority. |
| return false; |
| } |
| } |
| |
| BackendClient* backend_client = nullptr; |
| std::vector<std::unique_ptr<QuicBackendResponse>>* responses = nullptr; |
| for (BackendClientState& state : backend_client_states_) { |
| if (state.backend_client->GetQuicSpdySession() != |
| request_handler->GetStream()->spdy_session()) { |
| continue; |
| } |
| backend_client = state.backend_client; |
| responses = &state.responses; |
| } |
| if (backend_client == nullptr) { |
| QUIC_LOG(ERROR) << "Could not find backend client for " |
| << request_handler->connection_id() |
| << request_headers.DebugString(); |
| return false; |
| } |
| |
| std::unique_ptr<QuicBackendResponse> response = |
| backend_client->HandleMasqueRequest(request_headers, request_handler); |
| if (response == nullptr) { |
| QUIC_LOG(ERROR) << "Backend client did not process request for " |
| << request_handler->connection_id() |
| << request_headers.DebugString(); |
| return false; |
| } |
| |
| QUIC_DLOG(INFO) << "Sending MASQUE response for " |
| << request_handler->connection_id() |
| << request_headers.DebugString(); |
| |
| request_handler->OnResponseBackendComplete(response.get()); |
| responses->emplace_back(std::move(response)); |
| |
| return true; |
| } |
| |
| void MasqueServerBackend::FetchResponseFromBackend( |
| const quiche::HttpHeaderBlock& request_headers, |
| const std::string& request_body, |
| QuicSimpleServerBackend::RequestHandler* request_handler) { |
| if (MaybeHandleMasqueRequest(request_headers, request_handler)) { |
| // Request was handled as a MASQUE request. |
| return; |
| } |
| QUIC_DLOG(INFO) << "Fetching non-MASQUE response for " |
| << request_headers.DebugString(); |
| QuicMemoryCacheBackend::FetchResponseFromBackend( |
| request_headers, request_body, request_handler); |
| } |
| |
| void MasqueServerBackend::HandleConnectHeaders( |
| const quiche::HttpHeaderBlock& request_headers, |
| RequestHandler* request_handler) { |
| if (MaybeHandleMasqueRequest(request_headers, request_handler)) { |
| // Request was handled as a MASQUE request. |
| return; |
| } |
| QUIC_DLOG(INFO) << "Fetching non-MASQUE CONNECT response for " |
| << request_headers.DebugString(); |
| QuicMemoryCacheBackend::HandleConnectHeaders(request_headers, |
| request_handler); |
| } |
| |
| void MasqueServerBackend::CloseBackendResponseStream( |
| QuicSimpleServerBackend::RequestHandler* request_handler) { |
| QUIC_DLOG(INFO) << "Closing response stream"; |
| QuicMemoryCacheBackend::CloseBackendResponseStream(request_handler); |
| } |
| |
| void MasqueServerBackend::RegisterBackendClient(BackendClient* backend_client) { |
| QUIC_DLOG(INFO) << "Registering backend client for " |
| << backend_client->GetQuicSpdySession()->connection_id(); |
| backend_client_states_.push_back(BackendClientState{backend_client, {}}); |
| } |
| |
| void MasqueServerBackend::RemoveBackendClient(BackendClient* backend_client) { |
| QUIC_DLOG(INFO) << "Removing backend client for " |
| << backend_client->GetQuicSpdySession()->connection_id(); |
| backend_client_states_.erase( |
| std::remove_if(backend_client_states_.begin(), |
| backend_client_states_.end(), |
| [backend_client](BackendClientState& state) { |
| return state.backend_client->GetQuicSpdySession() == |
| backend_client->GetQuicSpdySession(); |
| }), |
| backend_client_states_.end()); |
| } |
| |
| QuicIpAddress MasqueServerBackend::GetNextClientIpAddress() { |
| // Makes sure all addresses are in 10.(1-254).(1-254).(2-254) |
| QuicIpAddress address; |
| address.FromPackedString( |
| reinterpret_cast<char*>(&connect_ip_next_client_ip_[0]), |
| sizeof(connect_ip_next_client_ip_)); |
| connect_ip_next_client_ip_[3]++; |
| if (connect_ip_next_client_ip_[3] >= 255) { |
| connect_ip_next_client_ip_[3] = 2; |
| connect_ip_next_client_ip_[2]++; |
| if (connect_ip_next_client_ip_[2] >= 255) { |
| connect_ip_next_client_ip_[2] = 1; |
| connect_ip_next_client_ip_[1]++; |
| if (connect_ip_next_client_ip_[1] >= 255) { |
| QUIC_LOG(FATAL) << "Ran out of IP addresses, restarting process."; |
| } |
| } |
| } |
| return address; |
| } |
| |
| void MasqueServerBackend::SetConcealedAuth(absl::string_view concealed_auth) { |
| concealed_auth_credentials_.clear(); |
| if (concealed_auth.empty()) { |
| return; |
| } |
| for (absl::string_view sp : absl::StrSplit(concealed_auth, ';')) { |
| quiche::QuicheTextUtils::RemoveLeadingAndTrailingWhitespace(&sp); |
| if (sp.empty()) { |
| continue; |
| } |
| std::vector<absl::string_view> kv = |
| absl::StrSplit(sp, absl::MaxSplits(':', 1)); |
| quiche::QuicheTextUtils::RemoveLeadingAndTrailingWhitespace(&kv[0]); |
| quiche::QuicheTextUtils::RemoveLeadingAndTrailingWhitespace(&kv[1]); |
| ConcealedAuthCredential credential; |
| credential.key_id = std::string(kv[0]); |
| std::string public_key; |
| if (!absl::HexStringToBytes(kv[1], &public_key)) { |
| QUIC_LOG(FATAL) << "Invalid concealed auth public key hex " << kv[1]; |
| } |
| if (public_key.size() != sizeof(credential.public_key)) { |
| QUIC_LOG(FATAL) << "Invalid concealed auth public key length " |
| << public_key.size(); |
| } |
| memcpy(credential.public_key, public_key.data(), |
| sizeof(credential.public_key)); |
| concealed_auth_credentials_.push_back(credential); |
| } |
| } |
| |
| bool MasqueServerBackend::GetConcealedAuthKeyForId( |
| absl::string_view key_id, |
| uint8_t out_public_key[ED25519_PUBLIC_KEY_LEN]) const { |
| for (const auto& credential : concealed_auth_credentials_) { |
| if (credential.key_id == key_id) { |
| memcpy(out_public_key, credential.public_key, |
| sizeof(credential.public_key)); |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| } // namespace quic |