0
0
Fork 0
mirror of https://github.com/matrix-construct/construct synced 2024-11-14 14:01:08 +01:00
construct/ircd/resource.cc

1061 lines
24 KiB
C++
Raw Normal View History

2018-02-04 03:22:01 +01:00
// Matrix Construct
//
// Copyright (C) Matrix Construct Developers, Authors & Contributors
// Copyright (C) 2016-2018 Jason Volk <jason@zemos.net>
//
// Permission to use, copy, modify, and/or distribute this software for any
// purpose with or without fee is hereby granted, provided that the above
// copyright notice and this permission notice is present in all copies. The
// full license for this software is available in the LICENSE file.
2016-09-06 01:05:16 +02:00
decltype(ircd::resource::resources)
ircd::resource::resources
2016-11-29 16:23:38 +01:00
{};
2016-09-06 01:05:16 +02:00
ircd::resource &
ircd::resource::find(const string_view &path_)
{
const string_view path
{
rstrip(path_, '/')
};
auto it
{
resources.lower_bound(path)
};
if(it == end(resources)) try
{
2017-10-03 13:13:52 +02:00
--it;
if(it == begin(resources) || !startswith(path, it->first))
return *resources.at("/");
}
catch(const std::out_of_range &e)
{
2018-01-22 09:25:08 +01:00
throw http::error
{
http::code::NOT_FOUND
};
}
2016-09-06 01:05:16 +02:00
auto rpath{it->first};
//assert(!endswith(rpath, '/'));
// Exact file or directory match
if(path == rpath)
return *it->second;
// Directories handle all paths under them.
if(!startswith(path, rpath))
{
// Walk the iterator back to find if there is a directory prefixing this path.
if(it == begin(resources))
2018-01-22 09:25:08 +01:00
throw http::error
{
http::code::NOT_FOUND
};
--it;
rpath = it->first;
if(!startswith(path, rpath))
2018-01-22 09:25:08 +01:00
throw http::error
{
http::code::NOT_FOUND
};
}
// Check if the resource is a directory; if not, it can only
// handle exact path matches.
if(~it->second->flags & it->second->DIRECTORY && path != rpath)
2018-01-22 09:25:08 +01:00
throw http::error
{
http::code::NOT_FOUND
};
if(it->second->flags & it->second->DIRECTORY)
{
const auto rem(lstrip(path, rpath));
if(!empty(rem) && !startswith(rem, '/'))
throw http::error
{
http::code::NOT_FOUND
};
}
return *it->second;
}
//
// resource
//
ircd::resource::resource(const string_view &path)
:resource
{
path, opts{}
}
{
}
ircd::resource::resource(const string_view &path,
const opts &opts)
:path
{
rstrip(path, '/')
}
,description{opts.description}
,flags{opts.flags}
,resources_it{[this]
2016-09-06 01:05:16 +02:00
{
2018-01-22 09:25:08 +01:00
const auto iit
{
resources.emplace(this->path, this)
};
2016-11-29 16:23:38 +01:00
if(!iit.second)
2018-01-22 09:25:08 +01:00
throw error
{
"resource \"%s\" already registered", this->path
2018-01-22 09:25:08 +01:00
};
2016-11-29 16:23:38 +01:00
return unique_const_iterator<decltype(resources)>
{
resources, iit.first
};
2016-11-29 16:23:38 +01:00
}()}
{
log::debug
2018-01-22 09:25:08 +01:00
{
"Registered resource \"%s\"", path.empty()? string_view{"/"} : this->path
2018-01-22 09:25:08 +01:00
};
2016-09-06 01:05:16 +02:00
}
2016-11-29 16:23:38 +01:00
ircd::resource::~resource()
2016-09-06 01:05:16 +02:00
noexcept
{
log::debug
2018-01-22 09:25:08 +01:00
{
"Unregistered resource \"%s\"", path.empty()? string_view{"/"} : path
};
2016-09-06 01:05:16 +02:00
}
namespace ircd
{
static void cache_warm_origin(const string_view &origin);
static string_view verify_origin(client &client, resource::method &method, resource::request &request);
static string_view authenticate(client &client, resource::method &method, resource::request &request);
}
/// Authenticate a client based on access_token either in the query string or
/// in the Authentication bearer header. If a token is found the user_id owning
/// the token is copied into the request. If it is not found or it is invalid
/// then the method being requested is checked to see if it is required. If so
/// the appropriate exception is thrown.
ircd::string_view
ircd::authenticate(client &client,
resource::method &method,
resource::request &request)
{
request.access_token =
{
request.query["access_token"]
};
if(empty(request.access_token))
{
const auto authorization
{
split(request.head.authorization, ' ')
};
if(iequals(authorization.first, "bearer"_sv))
request.access_token = authorization.second;
}
const bool requires_auth
{
method.opts.flags & method.REQUIRES_AUTH
};
if(!request.access_token && requires_auth)
throw m::error
{
http::UNAUTHORIZED, "M_MISSING_TOKEN",
"Credentials for this method are required but missing."
};
if(!request.access_token)
return {};
static const m::event::fetch::opts fopts
{
m::event::keys::include
{
"sender"
}
};
const m::room::state tokens{m::user::tokens, &fopts};
tokens.get(std::nothrow, "ircd.access_token", request.access_token, [&request]
(const m::event &event)
{
// The user sent this access token to the tokens room
request.user_id = m::user::id
{
at<"sender"_>(event)
};
});
if(!request.user_id && requires_auth)
throw m::error
{
http::UNAUTHORIZED, "M_UNKNOWN_TOKEN",
"Credentials for this method are required but invalid."
};
return request.user_id;
}
ircd::string_view
ircd::verify_origin(client &client,
resource::method &method,
resource::request &request)
try
{
const bool required
{
method.opts.flags & method.VERIFY_ORIGIN
};
const auto authorization
{
split(request.head.authorization, ' ')
};
const bool supplied
{
iequals(authorization.first, "X-Matrix"_sv)
};
if(!supplied && !required)
return {};
if(!supplied && required)
throw m::error
{
http::UNAUTHORIZED, "M_MISSING_AUTHORIZATION",
"Required X-Matrix Authorization was not supplied"
};
const m::request::x_matrix x_matrix
{
request.head.authorization
};
const m::request object
{
x_matrix.origin, my_host(), method.name, request.head.uri, request.content
};
if(!object.verify(x_matrix.key, x_matrix.sig))
throw m::error
{
http::FORBIDDEN, "M_INVALID_SIGNATURE",
"The X-Matrix Authorization is invalid."
};
request.node_id = {"", x_matrix.origin};
request.origin = x_matrix.origin;
// If we have an error cached from previously not being able to
// contact this origin we can clear that now that they're alive.
server::errclear(request.origin);
// The origin was verified so we can invoke the cache warming now.
cache_warm_origin(request.origin);
return request.origin;
}
catch(const m::error &)
{
throw;
}
catch(const std::exception &e)
{
log::derror
2018-01-22 09:25:08 +01:00
{
"X-Matrix Authorization from %s: %s",
string(remote(client)),
e.what()
};
throw m::error
{
http::UNAUTHORIZED, "M_UNKNOWN_ERROR",
"An error has prevented authorization: %s",
e.what()
};
}
ircd::conf::item<ircd::seconds>
cache_warmup_time
{
{ "name", "ircd.cache_warmup_time" },
{ "default", 3600L },
};
/// We can smoothly warmup some memory caches after daemon startup as the
/// requests trickle in from remote servers. This function is invoked after
/// a remote contacts and reveals its identity with the X-Matrix verification.
///
/// This process helps us avoid cold caches for the first requests coming from
/// our server. Such requests are often parallel requests, for ex. to hundreds
/// of servers in a Matrix room at the same time.
///
/// This function does nothing after the cache warmup period has ended.
void
ircd::cache_warm_origin(const string_view &origin)
try
{
if(ircd::uptime() > seconds(cache_warmup_time))
return;
// Make a query through SRV and A records.
net::dns(origin, net::dns::prefetch_ipport);
}
catch(const std::exception &e)
{
log::derror
{
"Cache warming for '%s' :%s", origin, e.what()
};
}
2016-09-06 01:05:16 +02:00
void
2016-11-29 16:23:38 +01:00
ircd::resource::operator()(client &client,
const http::request::head &head,
const string_view &content_partial)
2016-09-06 01:05:16 +02:00
{
// Find the method or METHOD_NOT_ALLOWED
auto &method
{
operator[](head.method)
};
// Bail out if the method limited the amount of content and it was exceeded.
if(head.content_length > method.opts.payload_max)
throw http::error
{
http::PAYLOAD_TOO_LARGE
};
// Check if the resource method wants a specific MIME type. If no option
// is given by the resource then any Content-Type by the client will pass.
if(method.opts.mime.first)
{
const auto &ct(split(head.content_type, ';'));
const auto &supplied(split(ct.first, '/'));
const auto &charset(ct.second);
const auto &required(method.opts.mime);
2018-08-23 00:17:55 +02:00
if(required.first != supplied.first
||(required.second && required.second != supplied.second))
throw http::error
{
http::UNSUPPORTED_MEDIA_TYPE
};
}
// This timer will keep the request from hanging forever for whatever
// reason. The resource method may want to do its own timing and can
// disable this in its options structure.
const net::scope_timeout timeout
{
*client.sock, method.opts.timeout, [&client, &head]
(const bool &timed_out)
{
if(!timed_out)
return;
log::derror
{
"socket(%p) local[%s] remote[%s] Timed out in %s `%s'",
client.sock.get(),
string(local(client)),
string(remote(client)),
head.method,
head.path
};
// The interrupt is effective when the socket has already been
// closed and/or the client is still stuck in a request for
// some reason.
if(client.reqctx)
ctx::interrupt(*client.reqctx);
//TODO: If we know that no response has been sent yet
//TODO: we can respond with http::REQUEST_TIMEOUT instead.
client.close(net::dc::RST, net::close_ignore);
}
};
// Content that hasn't yet arrived is remaining
const size_t content_remain
{
head.content_length - client.content_consumed
};
// View of the content that will be passed to the resource handler. Starts
// with the content received so far which is actually in the head's buffer.
// One of three things can happen now:
//
// - There is no more content so we pass this as-is right to the resource.
// - There is more content, so we allocate a content buffer, copy what we
// have to it, read the rest off the socket, and then reassign this view.
// - There is more content, but the resource wants to read it off the
// socket on its own terms, so we pass this as-is.
string_view content
{
content_partial
};
if(content_remain && ~method.opts.flags & method.CONTENT_DISCRETION)
{
// Copy any partial content to the final contiguous allocated buffer;
client.content_buffer = unique_buffer<mutable_buffer>{head.content_length};
memcpy(data(client.content_buffer), data(content_partial), size(content_partial));
// Setup a window inside the buffer for the remaining socket read.
const mutable_buffer content_remain_buffer
{
data(client.content_buffer) + size(content_partial), content_remain
};
// Read the remaining content off the socket.
client.content_consumed += read_all(*client.sock, content_remain_buffer);
assert(client.content_consumed == head.content_length);
content = string_view
{
data(client.content_buffer), head.content_length
};
}
2018-04-20 06:45:39 +02:00
client.request = resource::request
{
head, content
};
// We take the extra step here to clear the assignment to client.request
// when this request stack has finished for two reasons:
// - It allows other ctxs to peep at the client::list to see what this
// client/ctx/request is currently working on with some more safety.
// - It prevents an easy source for stale refs wrt the longpoll thing.
const unwind clear_request{[&client]
{
client.request = {};
}};
const auto pathparm
{
lstrip(head.path, this->path)
};
client.request.parv =
2017-03-11 02:46:25 +01:00
{
client.request.param, tokens(pathparm, '/', client.request.param)
2017-03-11 02:46:25 +01:00
};
// Client access token verified here. On success, user_id owning the token
// is copied into the client.request structure. On failure, the method is
// checked to see if it requires authentication and if so, this throws.
authenticate(client, method, client.request);
// Server X-Matrix header verified here. Similar to client auth, origin
// which has been authed is referenced in the client.request. If the method
// requires, and auth fails or not provided, this function throws.
verify_origin(client, method, client.request);
// Finally handle the request.
handle_request(client, method, client.request);
2017-03-21 03:30:07 +01:00
}
void
ircd::resource::handle_request(client &client,
method &method,
resource::request &request)
2017-03-21 03:30:07 +01:00
try
{
method(client, request);
2017-03-21 03:30:07 +01:00
}
catch(const json::not_found &e)
2017-03-21 03:30:07 +01:00
{
throw m::error
{
http::NOT_FOUND, "M_BAD_JSON", "Required JSON field: %s", e.what()
2017-03-21 03:30:07 +01:00
};
2016-09-06 01:05:16 +02:00
}
catch(const json::print_error &e)
{
throw m::error
{
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
};
}
catch(const json::error &e)
{
throw m::error
{
http::BAD_REQUEST, "M_NOT_JSON", "%s", e.what()
};
}
2017-09-25 03:05:42 +02:00
catch(const std::out_of_range &e)
{
throw m::error
{
http::NOT_FOUND, "M_NOT_FOUND", "%s", e.what()
};
}
catch(const ctx::timeout &e)
{
throw m::error
{
http::BAD_GATEWAY, "M_REQUEST_TIMEOUT", "%s", e.what()
};
}
2016-09-06 01:05:16 +02:00
ircd::resource::method &
ircd::resource::operator[](const string_view &name)
try
{
return *methods.at(name);
}
catch(const std::out_of_range &e)
{
char buf[128];
const http::header headers[]
{
{ "Allow", allow_methods_list(buf) }
};
throw http::error
{
http::METHOD_NOT_ALLOWED, {}, headers
};
}
ircd::string_view
ircd::resource::allow_methods_list(const mutable_buffer &buf)
{
size_t len(0);
if(likely(size(buf)))
buf[len] = '\0';
auto it(begin(methods));
if(it != end(methods))
{
len = strlcat(buf, it->first);
for(++it; it != end(methods); ++it)
{
len = strlcat(buf, " ");
len = strlcat(buf, it->first);
}
}
return { data(buf), len };
}
ircd::resource::method::method(struct resource &resource,
const string_view &name,
const handler &handler)
:method
{
resource, name, handler, {}
}
{
}
2016-11-29 16:23:38 +01:00
ircd::resource::method::method(struct resource &resource,
const string_view &name,
2016-11-29 16:23:38 +01:00
const handler &handler,
const struct opts &opts)
:name{name}
2016-11-29 16:23:38 +01:00
,resource{&resource}
,function{handler}
,opts{opts}
2016-11-29 16:23:38 +01:00
,methods_it{[this, &name]
2016-09-06 01:05:16 +02:00
{
2018-01-22 09:25:08 +01:00
const auto iit
{
this->resource->methods.emplace(this->name, this)
};
2016-09-06 01:05:16 +02:00
if(!iit.second)
2018-01-22 09:25:08 +01:00
throw error
{
"resource \"%s\" already registered", name
};
2016-09-06 01:05:16 +02:00
return unique_const_iterator<decltype(resource::methods)>
{
this->resource->methods,
iit.first
};
2016-11-29 16:23:38 +01:00
}()}
{
2016-09-06 01:05:16 +02:00
}
2016-11-29 16:23:38 +01:00
ircd::resource::method::~method()
noexcept
2016-09-06 01:05:16 +02:00
{
}
ircd::resource::response
ircd::resource::method::operator()(client &client,
request &request)
try
{
return function(client, request);
}
catch(const std::bad_function_call &e)
{
throw http::error
{
http::SERVICE_UNAVAILABLE
};
}
//
// resource::response::chunked
//
ircd::resource::response::chunked::chunked(chunked &&other)
noexcept
:c{std::move(other.c)}
{
other.c = nullptr;
}
ircd::resource::response::chunked::chunked(client &client,
const http::code &code)
:chunked
{
client, code, "application/json; charset=utf-8"_sv, string_view{}
}
{
}
ircd::resource::response::chunked::chunked(client &client,
const http::code &code,
const vector_view<const http::header> &headers)
:chunked
{
client, code, "application/json; charset=utf-8"_sv, headers
}
{
}
ircd::resource::response::chunked::chunked(client &client,
const http::code &code,
const string_view &content_type,
const vector_view<const http::header> &headers)
:chunked
{
client, code, content_type, [&headers]
{
// Note that the headers which are composed into this buffer are
// copied again before the response goes out from resource::response.
// There must not be any context switch between now and that copy so
// we can return a string_view of this TLS buffer.
thread_local char buffer[4_KiB];
window_buffer sb{buffer};
http::write(sb, headers);
return string_view{sb.completed()};
}()
}
{
}
decltype(ircd::resource::response::chunked::default_buffer_size)
ircd::resource::response::chunked::default_buffer_size
{
{ "name", "ircd.resource.response.chunked.buffer_size" },
{ "default", long(96_KiB) },
};
ircd::resource::response::chunked::chunked(client &client,
const http::code &code,
const string_view &content_type,
const string_view &headers)
:response
{
client, code, content_type, size_t(-1), headers
}
,c
{
&client
}
,buf
{
size_t(default_buffer_size)
}
{
assert(!empty(content_type));
}
ircd::resource::response::chunked::~chunked()
noexcept try
{
if(!c)
return;
if(!std::uncaught_exceptions())
finish();
else
c->close(net::dc::RST, net::close_ignore);
}
catch(...)
{
return;
}
std::function<ircd::const_buffer (const ircd::const_buffer &)>
ircd::resource::response::chunked::flusher()
{
return std::bind(&chunked::flush, this, ph::_1);
}
bool
ircd::resource::response::chunked::finish()
{
if(!c)
return false;
write(const_buffer{});
c = nullptr;
return true;
}
ircd::const_buffer
ircd::resource::response::chunked::flush(const const_buffer &buf)
{
const const_buffer wrote
{
data(buf), write(buf)
};
return wrote;
}
size_t
ircd::resource::response::chunked::write(const const_buffer &chunk)
try
{
size_t ret{0};
if(!c)
return ret;
//TODO: bring iov from net::socket -> net::write_() -> client::write_()
char headbuf[32];
ret += c->write_all(http::writechunk(headbuf, size(chunk)));
ret += size(chunk)? c->write_all(chunk) : 0UL;
ret += c->write_all("\r\n"_sv);
return ret;
}
catch(...)
{
this->c = nullptr;
throw;
}
//
// resource::response
//
// A buffer of this size will be passed to the socket and sent
// out and must be on stack.
decltype(ircd::resource::response::HEAD_BUF_SZ)
ircd::resource::response::HEAD_BUF_SZ
{
4_KiB
};
ircd::resource::response::response(client &client,
const http::code &code)
:response{client, json::object{json::empty_object}, code}
{
}
ircd::resource::response::response(client &client,
const http::code &code,
2017-09-09 21:20:00 +02:00
const json::iov &members)
:response{client, members, code}
{
2016-09-06 01:05:16 +02:00
}
2016-11-29 16:23:38 +01:00
ircd::resource::response::response(client &client,
const json::members &members,
const http::code &code)
:response{client, code, members}
{
}
ircd::resource::response::response(client &client,
const json::value &value,
const http::code &code)
:response{client, code, value}
{
}
ircd::resource::response::response(client &client,
const http::code &code,
const json::value &value)
try
{
const auto size
{
serialized(value)
};
const unique_buffer<mutable_buffer> buffer
{
size
};
switch(type(value))
{
case json::ARRAY:
{
response(client, json::array{stringify(mutable_buffer{buffer}, value)}, code);
return;
}
case json::OBJECT:
{
response(client, json::object{stringify(mutable_buffer{buffer}, value)}, code);
return;
}
default: throw m::error
{
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Cannot send json::%s as response content", type(value)
};
}
}
catch(const json::error &e)
{
throw m::error
{
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
};
}
ircd::resource::response::response(client &client,
const http::code &code,
const json::members &members)
try
{
const auto size
{
serialized(members)
};
const unique_buffer<mutable_buffer> buffer
{
size
};
const json::object object
{
stringify(mutable_buffer{buffer}, members)
};
response(client, object, code);
}
catch(const json::error &e)
2017-09-09 21:20:00 +02:00
{
throw m::error
{
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
};
2017-09-09 21:20:00 +02:00
}
ircd::resource::response::response(client &client,
const json::iov &members,
2017-03-11 04:31:20 +01:00
const http::code &code)
2017-03-21 03:30:07 +01:00
try
2016-09-06 01:05:16 +02:00
{
const auto size
{
serialized(members)
};
const unique_buffer<mutable_buffer> buffer
{
size
};
const json::object object
{
stringify(mutable_buffer{buffer}, members)
};
response(client, object, code);
2017-03-21 03:30:07 +01:00
}
catch(const json::error &e)
{
throw m::error
{
http::INTERNAL_SERVER_ERROR, "M_NOT_JSON", "Generator Protection: %s", e.what()
};
2017-03-11 04:31:20 +01:00
}
ircd::resource::response::response(client &client,
const json::object &object,
2017-03-11 04:31:20 +01:00
const http::code &code)
{
static const string_view content_type
2017-03-11 04:31:20 +01:00
{
"application/json; charset=utf-8"
2017-03-11 04:31:20 +01:00
};
2016-09-06 01:05:16 +02:00
assert(json::valid(object, std::nothrow));
response(client, object, content_type, code);
2016-09-06 01:05:16 +02:00
}
ircd::resource::response::response(client &client,
const json::array &array,
const http::code &code)
{
static const string_view content_type
{
"application/json; charset=utf-8"
};
assert(json::valid(array, std::nothrow));
response(client, array, content_type, code);
}
ircd::resource::response::response(client &client,
const string_view &content,
const string_view &content_type,
const http::code &code,
const vector_view<const http::header> &headers)
{
assert(empty(content) || !empty(content_type));
2018-01-12 03:41:27 +01:00
// contents of this buffer get copied again when further passed to
// response{}; we can get this off the stack if that remains true.
thread_local char buffer[4_KiB];
window_buffer sb{buffer};
2018-01-12 03:41:27 +01:00
{
const critical_assertion ca;
http::write(sb, headers);
}
response
{
client, content, content_type, code, string_view{sb.completed()}
};
}
ircd::resource::response::response(client &client,
const string_view &content,
const string_view &content_type,
const http::code &code,
const string_view &headers)
{
assert(empty(content) || !empty(content_type));
// Head gets sent
response
{
client, code, content_type, size(content), headers
};
// All content gets sent
const size_t written
{
client.write_all(content)
};
assert(written == size(content));
}
ircd::resource::response::response(client &client,
const http::code &code,
const string_view &content_type,
const size_t &content_length,
const string_view &headers)
2016-09-06 01:05:16 +02:00
{
assert(!content_length || !empty(content_type));
const auto request_time
{
client.timer.at<microseconds>().count()
2017-09-30 08:09:03 +02:00
};
const fmt::bsprintf<64> rtime
2017-09-30 08:09:03 +02:00
{
"%zd$us", request_time
};
char head_buf[HEAD_BUF_SZ];
window_buffer head{head_buf};
http::response
{
head,
code,
content_length,
content_type,
headers,
{
{ "Access-Control-Allow-Origin", "*" }, //TODO: XXX
{ "X-IRCd-Request-Timer", rtime, },
},
};
// Maximum size is realistically ok but ideally a small
// maximum; this exception should hit the developer in testing.
if(unlikely(!head.remaining()))
throw assertive
{
"HTTP headers too large for buffer of %zu", sizeof(head_buf)
};
const size_t written
{
client.write_all(head.completed())
};
#ifdef RB_DEBUG
const log::facility facility
{
ushort(code) >= 200 && ushort(code) < 300?
log::facility::DEBUG:
ushort(code) >= 300 && ushort(code) < 400?
log::facility::DWARNING:
ushort(code) >= 400 && ushort(code) < 500?
log::facility::DERROR:
2018-05-19 04:26:25 +02:00
log::facility::ERROR
};
log::logf
2018-01-22 09:25:08 +01:00
{
log::general, facility,
"socket(%p) local[%s] remote[%s] HTTP %d %s in %ld$us; %s %s content",
2018-01-22 09:25:08 +01:00
client.sock.get(),
string(local(client)),
string(remote(client)),
uint(code),
2018-01-22 09:25:08 +01:00
http::status(code),
request_time,
content_type,
ssize_t(content_length) >= 0? lex_cast(content_length): "chunked"_sv
2018-01-22 09:25:08 +01:00
};
#endif
assert(written == size(head.completed()));
2016-09-06 01:05:16 +02:00
}