blob: 66ca13c9667f64e856cdc8f514a4d88af2f8c1b2 [file] [log] [blame]
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "quiche/quic/masque/masque_server_backend.h"
#include <cstdint>
#include <cstring>
#include <memory>
#include <string>
#include <utility>
#include <vector>
#include "absl/strings/escaping.h"
#include "absl/strings/str_split.h"
#include "absl/strings/string_view.h"
#include "openssl/curve25519.h"
#include "quiche/quic/core/quic_connection_id.h"
#include "quiche/quic/masque/masque_utils.h"
#include "quiche/quic/platform/api/quic_bug_tracker.h"
#include "quiche/quic/platform/api/quic_ip_address.h"
#include "quiche/quic/platform/api/quic_logging.h"
#include "quiche/quic/tools/quic_backend_response.h"
#include "quiche/quic/tools/quic_memory_cache_backend.h"
#include "quiche/quic/tools/quic_simple_server_backend.h"
#include "quiche/common/quiche_text_utils.h"
#include "quiche/spdy/core/http2_header_block.h"
namespace quic {
MasqueServerBackend::MasqueServerBackend(MasqueMode /*masque_mode*/,
const std::string& server_authority,
const std::string& cache_directory)
: server_authority_(server_authority) {
// Start with client IP 10.1.1.2.
connect_ip_next_client_ip_[0] = 10;
connect_ip_next_client_ip_[1] = 1;
connect_ip_next_client_ip_[2] = 1;
connect_ip_next_client_ip_[3] = 2;
if (!cache_directory.empty()) {
QuicMemoryCacheBackend::InitializeBackend(cache_directory);
}
// We don't currently use `masque_mode_` but will in the future. To silence
// clang's `-Wunused-private-field` warning for this when building QUICHE for
// Chrome, add a use of it here.
(void)masque_mode_;
}
bool MasqueServerBackend::MaybeHandleMasqueRequest(
const spdy::Http2HeaderBlock& request_headers,
QuicSimpleServerBackend::RequestHandler* request_handler) {
auto method_pair = request_headers.find(":method");
if (method_pair == request_headers.end()) {
// Request is missing a method.
return false;
}
absl::string_view method = method_pair->second;
std::string masque_path = "";
auto protocol_pair = request_headers.find(":protocol");
if (method != "CONNECT" || protocol_pair == request_headers.end() ||
(protocol_pair->second != "connect-udp" &&
protocol_pair->second != "connect-ip" &&
protocol_pair->second != "connect-ethernet")) {
// This is not a MASQUE request.
if (!signature_auth_on_all_requests_) {
return false;
}
}
if (!server_authority_.empty()) {
auto authority_pair = request_headers.find(":authority");
if (authority_pair == request_headers.end()) {
// Cannot enforce missing authority.
return false;
}
absl::string_view authority = authority_pair->second;
if (server_authority_ != authority) {
// This request does not match server_authority.
return false;
}
}
auto it = backend_client_states_.find(request_handler->connection_id());
if (it == backend_client_states_.end()) {
QUIC_LOG(ERROR) << "Could not find backend client for " << masque_path
<< request_headers.DebugString();
return false;
}
BackendClient* backend_client = it->second.backend_client;
std::unique_ptr<QuicBackendResponse> response =
backend_client->HandleMasqueRequest(request_headers, request_handler);
if (response == nullptr) {
QUIC_LOG(ERROR) << "Backend client did not process request for "
<< masque_path << request_headers.DebugString();
return false;
}
QUIC_DLOG(INFO) << "Sending MASQUE response for "
<< request_headers.DebugString();
request_handler->OnResponseBackendComplete(response.get());
it->second.responses.emplace_back(std::move(response));
return true;
}
void MasqueServerBackend::FetchResponseFromBackend(
const spdy::Http2HeaderBlock& request_headers,
const std::string& request_body,
QuicSimpleServerBackend::RequestHandler* request_handler) {
if (MaybeHandleMasqueRequest(request_headers, request_handler)) {
// Request was handled as a MASQUE request.
return;
}
QUIC_DLOG(INFO) << "Fetching non-MASQUE response for "
<< request_headers.DebugString();
QuicMemoryCacheBackend::FetchResponseFromBackend(
request_headers, request_body, request_handler);
}
void MasqueServerBackend::HandleConnectHeaders(
const spdy::Http2HeaderBlock& request_headers,
RequestHandler* request_handler) {
if (MaybeHandleMasqueRequest(request_headers, request_handler)) {
// Request was handled as a MASQUE request.
return;
}
QUIC_DLOG(INFO) << "Fetching non-MASQUE CONNECT response for "
<< request_headers.DebugString();
QuicMemoryCacheBackend::HandleConnectHeaders(request_headers,
request_handler);
}
void MasqueServerBackend::CloseBackendResponseStream(
QuicSimpleServerBackend::RequestHandler* request_handler) {
QUIC_DLOG(INFO) << "Closing response stream";
QuicMemoryCacheBackend::CloseBackendResponseStream(request_handler);
}
void MasqueServerBackend::RegisterBackendClient(QuicConnectionId connection_id,
BackendClient* backend_client) {
QUIC_DLOG(INFO) << "Registering backend client for " << connection_id;
QUIC_BUG_IF(quic_bug_12005_1, backend_client_states_.find(connection_id) !=
backend_client_states_.end())
<< connection_id << " already in backend clients map";
backend_client_states_[connection_id] =
BackendClientState{backend_client, {}};
}
void MasqueServerBackend::RemoveBackendClient(QuicConnectionId connection_id) {
QUIC_DLOG(INFO) << "Removing backend client for " << connection_id;
backend_client_states_.erase(connection_id);
}
QuicIpAddress MasqueServerBackend::GetNextClientIpAddress() {
// Makes sure all addresses are in 10.(1-254).(1-254).(2-254)
QuicIpAddress address;
address.FromPackedString(
reinterpret_cast<char*>(&connect_ip_next_client_ip_[0]),
sizeof(connect_ip_next_client_ip_));
connect_ip_next_client_ip_[3]++;
if (connect_ip_next_client_ip_[3] >= 255) {
connect_ip_next_client_ip_[3] = 2;
connect_ip_next_client_ip_[2]++;
if (connect_ip_next_client_ip_[2] >= 255) {
connect_ip_next_client_ip_[2] = 1;
connect_ip_next_client_ip_[1]++;
if (connect_ip_next_client_ip_[1] >= 255) {
QUIC_LOG(FATAL) << "Ran out of IP addresses, restarting process.";
}
}
}
return address;
}
void MasqueServerBackend::SetSignatureAuth(absl::string_view signature_auth) {
signature_auth_credentials_.clear();
if (signature_auth.empty()) {
return;
}
for (absl::string_view sp : absl::StrSplit(signature_auth, ';')) {
quiche::QuicheTextUtils::RemoveLeadingAndTrailingWhitespace(&sp);
if (sp.empty()) {
continue;
}
std::vector<absl::string_view> kv =
absl::StrSplit(sp, absl::MaxSplits(':', 1));
quiche::QuicheTextUtils::RemoveLeadingAndTrailingWhitespace(&kv[0]);
quiche::QuicheTextUtils::RemoveLeadingAndTrailingWhitespace(&kv[1]);
SignatureAuthCredential credential;
credential.key_id = std::string(kv[0]);
std::string public_key;
if (!absl::HexStringToBytes(kv[1], &public_key)) {
QUIC_LOG(FATAL) << "Invalid signature auth public key hex " << kv[1];
}
if (public_key.size() != sizeof(credential.public_key)) {
QUIC_LOG(FATAL) << "Invalid signature auth public key length "
<< public_key.size();
}
memcpy(credential.public_key, public_key.data(),
sizeof(credential.public_key));
signature_auth_credentials_.push_back(credential);
}
}
bool MasqueServerBackend::GetSignatureAuthKeyForId(
absl::string_view key_id,
uint8_t out_public_key[ED25519_PUBLIC_KEY_LEN]) const {
for (const auto& credential : signature_auth_credentials_) {
if (credential.key_id == key_id) {
memcpy(out_public_key, credential.public_key,
sizeof(credential.public_key));
return true;
}
}
return false;
}
} // namespace quic