http.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. package main
  2. import (
  3. "bytes"
  4. "context"
  5. "errors"
  6. "fmt"
  7. "io"
  8. "log"
  9. "net/http"
  10. "os"
  11. "time"
  12. "gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/messages"
  13. "gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/util"
  14. )
  15. const (
  16. readLimit = 100000 // Maximum number of bytes to be read from an HTTP request
  17. )
  18. // Implements the http.Handler interface
  19. type SnowflakeHandler struct {
  20. *IPC
  21. handle func(*IPC, http.ResponseWriter, *http.Request)
  22. }
  23. func (sh SnowflakeHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  24. w.Header().Set("Access-Control-Allow-Origin", "*")
  25. w.Header().Set("Access-Control-Allow-Headers", "Origin, X-Session-ID")
  26. // Return early if it's CORS preflight.
  27. if "OPTIONS" == r.Method {
  28. return
  29. }
  30. sh.handle(sh.IPC, w, r)
  31. }
  32. // Implements the http.Handler interface
  33. type MetricsHandler struct {
  34. logFilename string
  35. handle func(string, http.ResponseWriter, *http.Request)
  36. }
  37. func (mh MetricsHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  38. w.Header().Set("Access-Control-Allow-Origin", "*")
  39. w.Header().Set("Access-Control-Allow-Headers", "Origin, X-Session-ID")
  40. // Return early if it's CORS preflight.
  41. if "OPTIONS" == r.Method {
  42. return
  43. }
  44. mh.handle(mh.logFilename, w, r)
  45. }
  46. func robotsTxtHandler(w http.ResponseWriter, r *http.Request) {
  47. w.Header().Set("Content-Type", "text/plain; charset=utf-8")
  48. if _, err := w.Write([]byte("User-agent: *\nDisallow: /\n")); err != nil {
  49. log.Printf("robotsTxtHandler unable to write, with this error: %v", err)
  50. }
  51. }
  52. func metricsHandler(metricsFilename string, w http.ResponseWriter, r *http.Request) {
  53. w.Header().Set("Content-Type", "text/plain; charset=utf-8")
  54. if metricsFilename == "" {
  55. http.NotFound(w, r)
  56. return
  57. }
  58. metricsFile, err := os.OpenFile(metricsFilename, os.O_RDONLY, 0644)
  59. if err != nil {
  60. log.Println("Error opening metrics file for reading")
  61. http.NotFound(w, r)
  62. return
  63. }
  64. if _, err := io.Copy(w, metricsFile); err != nil {
  65. log.Printf("copying metricsFile returned error: %v", err)
  66. }
  67. }
  68. func debugHandler(i *IPC, w http.ResponseWriter, r *http.Request) {
  69. var response string
  70. err := i.Debug(new(interface{}), &response)
  71. if err != nil {
  72. log.Println(err)
  73. w.WriteHeader(http.StatusInternalServerError)
  74. return
  75. }
  76. if _, err := w.Write([]byte(response)); err != nil {
  77. log.Printf("writing proxy information returned error: %v ", err)
  78. }
  79. }
  80. /*
  81. For snowflake proxies to request a client from the Broker.
  82. */
  83. func proxyPolls(i *IPC, w http.ResponseWriter, r *http.Request) {
  84. body, err := io.ReadAll(http.MaxBytesReader(w, r.Body, readLimit))
  85. if err != nil {
  86. log.Println("Invalid data.", err.Error())
  87. w.WriteHeader(http.StatusBadRequest)
  88. return
  89. }
  90. arg := messages.Arg{
  91. Body: body,
  92. RemoteAddr: util.GetClientIp(r),
  93. }
  94. var response []byte
  95. err = i.ProxyPolls(arg, &response)
  96. switch {
  97. case err == nil:
  98. case errors.Is(err, messages.ErrBadRequest):
  99. w.WriteHeader(http.StatusBadRequest)
  100. return
  101. case errors.Is(err, messages.ErrInternal):
  102. fallthrough
  103. default:
  104. log.Println(err)
  105. w.WriteHeader(http.StatusInternalServerError)
  106. return
  107. }
  108. if _, err := w.Write(response); err != nil {
  109. log.Printf("proxyPolls unable to write offer with error: %v", err)
  110. }
  111. }
  112. /*
  113. Expects a WebRTC SDP offer in the Request to give to an assigned
  114. snowflake proxy, which responds with the SDP answer to be sent in
  115. the HTTP response back to the client.
  116. */
  117. func clientOffers(i *IPC, w http.ResponseWriter, r *http.Request) {
  118. ctx, cancel := context.WithTimeout(r.Context(), ClientTimeout*time.Second)
  119. defer cancel()
  120. body, err := io.ReadAll(http.MaxBytesReader(w, r.Body, readLimit))
  121. if err != nil {
  122. log.Printf("Error reading client request: %s", err.Error())
  123. w.WriteHeader(http.StatusBadRequest)
  124. return
  125. }
  126. // Handle the legacy version
  127. //
  128. // We support two client message formats. The legacy format is for backwards
  129. // compatability and relies heavily on HTTP headers and status codes to convey
  130. // information.
  131. isLegacy := false
  132. if len(body) > 0 && body[0] == '{' {
  133. isLegacy = true
  134. req := messages.ClientPollRequest{
  135. Offer: string(body),
  136. NAT: r.Header.Get("Snowflake-NAT-Type"),
  137. }
  138. body, err = req.EncodeClientPollRequest()
  139. if err != nil {
  140. log.Printf("Error shimming the legacy request: %s", err.Error())
  141. w.WriteHeader(http.StatusInternalServerError)
  142. return
  143. }
  144. }
  145. arg := messages.Arg{
  146. Body: body,
  147. RemoteAddr: util.GetClientIp(r),
  148. RendezvousMethod: messages.RendezvousHttp,
  149. Context: ctx,
  150. }
  151. var response []byte
  152. err = i.ClientOffers(arg, &response)
  153. if err != nil {
  154. log.Println(err)
  155. w.WriteHeader(http.StatusInternalServerError)
  156. return
  157. }
  158. if isLegacy {
  159. resp, err := messages.DecodeClientPollResponse(response)
  160. if err != nil {
  161. log.Println(err)
  162. w.WriteHeader(http.StatusInternalServerError)
  163. return
  164. }
  165. switch resp.Error {
  166. case "":
  167. response = []byte(resp.Answer)
  168. case messages.StrNoProxies:
  169. w.WriteHeader(http.StatusServiceUnavailable)
  170. return
  171. case messages.StrTimedOut:
  172. w.WriteHeader(http.StatusGatewayTimeout)
  173. return
  174. default:
  175. panic("unknown error")
  176. }
  177. }
  178. if _, err := w.Write(response); err != nil {
  179. log.Printf("clientOffers unable to write answer with error: %v", err)
  180. }
  181. }
  182. /*
  183. Expects snowflake proxies which have previously successfully received
  184. an offer from proxyHandler to respond with an answer in an HTTP POST,
  185. which the broker will pass back to the original client.
  186. */
  187. func proxyAnswers(i *IPC, w http.ResponseWriter, r *http.Request) {
  188. body, err := io.ReadAll(http.MaxBytesReader(w, r.Body, readLimit))
  189. if err != nil {
  190. log.Println("Invalid data.", err.Error())
  191. w.WriteHeader(http.StatusBadRequest)
  192. return
  193. }
  194. err = validateSDP(body)
  195. if err != nil {
  196. w.WriteHeader(http.StatusBadRequest)
  197. return
  198. }
  199. arg := messages.Arg{
  200. Body: body,
  201. RemoteAddr: util.GetClientIp(r),
  202. }
  203. var response []byte
  204. err = i.ProxyAnswers(arg, &response)
  205. switch {
  206. case err == nil:
  207. case errors.Is(err, messages.ErrBadRequest):
  208. w.WriteHeader(http.StatusBadRequest)
  209. return
  210. case errors.Is(err, messages.ErrInternal):
  211. fallthrough
  212. default:
  213. log.Println(err)
  214. w.WriteHeader(http.StatusInternalServerError)
  215. return
  216. }
  217. if _, err := w.Write(response); err != nil {
  218. log.Printf("proxyAnswers unable to write answer response with error: %v", err)
  219. }
  220. }
  221. func validateSDP(SDP []byte) error {
  222. // TODO: more validation likely needed
  223. if !bytes.Contains(SDP, []byte("a=candidate")) {
  224. return fmt.Errorf("SDP contains no candidate")
  225. }
  226. return nil
  227. }