mirror of
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake.git
synced 2025-10-14 05:11:19 -04:00
Implement better client IP per rendezvous method tracking for clients Add tests for added code, fix existing tests chore(deps): update module github.com/miekg/dns to v1.1.58 Implement better client IP tracking for http and ampcache Add tests for added code, fix existing tests Implement GetCandidateAddrs from SDP Add getting client IP for SQS Bug fixes Bug fix for tests
261 lines
6.5 KiB
Go
261 lines
6.5 KiB
Go
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
|
|
"gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/messages"
|
|
"gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/util"
|
|
)
|
|
|
|
const (
|
|
readLimit = 100000 // Maximum number of bytes to be read from an HTTP request
|
|
)
|
|
|
|
// Implements the http.Handler interface
|
|
type SnowflakeHandler struct {
|
|
*IPC
|
|
handle func(*IPC, http.ResponseWriter, *http.Request)
|
|
}
|
|
|
|
func (sh SnowflakeHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Set("Access-Control-Allow-Origin", "*")
|
|
w.Header().Set("Access-Control-Allow-Headers", "Origin, X-Session-ID")
|
|
// Return early if it's CORS preflight.
|
|
if "OPTIONS" == r.Method {
|
|
return
|
|
}
|
|
sh.handle(sh.IPC, w, r)
|
|
}
|
|
|
|
// Implements the http.Handler interface
|
|
type MetricsHandler struct {
|
|
logFilename string
|
|
handle func(string, http.ResponseWriter, *http.Request)
|
|
}
|
|
|
|
func (mh MetricsHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Set("Access-Control-Allow-Origin", "*")
|
|
w.Header().Set("Access-Control-Allow-Headers", "Origin, X-Session-ID")
|
|
// Return early if it's CORS preflight.
|
|
if "OPTIONS" == r.Method {
|
|
return
|
|
}
|
|
mh.handle(mh.logFilename, w, r)
|
|
}
|
|
|
|
func robotsTxtHandler(w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Set("Content-Type", "text/plain; charset=utf-8")
|
|
if _, err := w.Write([]byte("User-agent: *\nDisallow: /\n")); err != nil {
|
|
log.Printf("robotsTxtHandler unable to write, with this error: %v", err)
|
|
}
|
|
}
|
|
|
|
func metricsHandler(metricsFilename string, w http.ResponseWriter, r *http.Request) {
|
|
w.Header().Set("Content-Type", "text/plain; charset=utf-8")
|
|
|
|
if metricsFilename == "" {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
metricsFile, err := os.OpenFile(metricsFilename, os.O_RDONLY, 0644)
|
|
if err != nil {
|
|
log.Println("Error opening metrics file for reading")
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
|
|
if _, err := io.Copy(w, metricsFile); err != nil {
|
|
log.Printf("copying metricsFile returned error: %v", err)
|
|
}
|
|
}
|
|
|
|
func debugHandler(i *IPC, w http.ResponseWriter, r *http.Request) {
|
|
var response string
|
|
|
|
err := i.Debug(new(interface{}), &response)
|
|
if err != nil {
|
|
log.Println(err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
if _, err := w.Write([]byte(response)); err != nil {
|
|
log.Printf("writing proxy information returned error: %v ", err)
|
|
}
|
|
}
|
|
|
|
/*
|
|
For snowflake proxies to request a client from the Broker.
|
|
*/
|
|
func proxyPolls(i *IPC, w http.ResponseWriter, r *http.Request) {
|
|
body, err := io.ReadAll(http.MaxBytesReader(w, r.Body, readLimit))
|
|
if err != nil {
|
|
log.Println("Invalid data.", err.Error())
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
arg := messages.Arg{
|
|
Body: body,
|
|
RemoteAddr: util.GetClientIp(r),
|
|
}
|
|
|
|
var response []byte
|
|
err = i.ProxyPolls(arg, &response)
|
|
switch {
|
|
case err == nil:
|
|
case errors.Is(err, messages.ErrBadRequest):
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
case errors.Is(err, messages.ErrInternal):
|
|
fallthrough
|
|
default:
|
|
log.Println(err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
if _, err := w.Write(response); err != nil {
|
|
log.Printf("proxyPolls unable to write offer with error: %v", err)
|
|
}
|
|
}
|
|
|
|
/*
|
|
Expects a WebRTC SDP offer in the Request to give to an assigned
|
|
snowflake proxy, which responds with the SDP answer to be sent in
|
|
the HTTP response back to the client.
|
|
*/
|
|
func clientOffers(i *IPC, w http.ResponseWriter, r *http.Request) {
|
|
body, err := io.ReadAll(http.MaxBytesReader(w, r.Body, readLimit))
|
|
if err != nil {
|
|
log.Printf("Error reading client request: %s", err.Error())
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
err = validateSDP(body)
|
|
if err != nil {
|
|
log.Println("Error client SDP: ", err.Error())
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
// Handle the legacy version
|
|
//
|
|
// We support two client message formats. The legacy format is for backwards
|
|
// compatability and relies heavily on HTTP headers and status codes to convey
|
|
// information.
|
|
isLegacy := false
|
|
if len(body) > 0 && body[0] == '{' {
|
|
isLegacy = true
|
|
req := messages.ClientPollRequest{
|
|
Offer: string(body),
|
|
NAT: r.Header.Get("Snowflake-NAT-Type"),
|
|
}
|
|
body, err = req.EncodeClientPollRequest()
|
|
if err != nil {
|
|
log.Printf("Error shimming the legacy request: %s", err.Error())
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
}
|
|
|
|
arg := messages.Arg{
|
|
Body: body,
|
|
RemoteAddr: util.GetClientIp(r),
|
|
RendezvousMethod: messages.RendezvousHttp,
|
|
}
|
|
|
|
var response []byte
|
|
err = i.ClientOffers(arg, &response)
|
|
if err != nil {
|
|
log.Println(err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
if isLegacy {
|
|
resp, err := messages.DecodeClientPollResponse(response)
|
|
if err != nil {
|
|
log.Println(err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
switch resp.Error {
|
|
case "":
|
|
response = []byte(resp.Answer)
|
|
case messages.StrNoProxies:
|
|
w.WriteHeader(http.StatusServiceUnavailable)
|
|
return
|
|
case messages.StrTimedOut:
|
|
w.WriteHeader(http.StatusGatewayTimeout)
|
|
return
|
|
default:
|
|
panic("unknown error")
|
|
}
|
|
}
|
|
|
|
if _, err := w.Write(response); err != nil {
|
|
log.Printf("clientOffers unable to write answer with error: %v", err)
|
|
}
|
|
}
|
|
|
|
/*
|
|
Expects snowflake proxies which have previously successfully received
|
|
an offer from proxyHandler to respond with an answer in an HTTP POST,
|
|
which the broker will pass back to the original client.
|
|
*/
|
|
func proxyAnswers(i *IPC, w http.ResponseWriter, r *http.Request) {
|
|
body, err := io.ReadAll(http.MaxBytesReader(w, r.Body, readLimit))
|
|
if err != nil {
|
|
log.Println("Invalid data.", err.Error())
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
err = validateSDP(body)
|
|
if err != nil {
|
|
log.Println("Error proxy SDP: ", err.Error())
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
arg := messages.Arg{
|
|
Body: body,
|
|
RemoteAddr: util.GetClientIp(r),
|
|
}
|
|
|
|
var response []byte
|
|
err = i.ProxyAnswers(arg, &response)
|
|
switch {
|
|
case err == nil:
|
|
case errors.Is(err, messages.ErrBadRequest):
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
case errors.Is(err, messages.ErrInternal):
|
|
fallthrough
|
|
default:
|
|
log.Println(err)
|
|
w.WriteHeader(http.StatusInternalServerError)
|
|
return
|
|
}
|
|
|
|
if _, err := w.Write(response); err != nil {
|
|
log.Printf("proxyAnswers unable to write answer response with error: %v", err)
|
|
}
|
|
}
|
|
|
|
func validateSDP(SDP []byte) error {
|
|
// TODO: more validation likely needed
|
|
if !bytes.Contains(SDP, []byte("a=candidate")) {
|
|
return fmt.Errorf("SDP contains no candidate")
|
|
}
|
|
|
|
return nil
|
|
}
|