mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 02:11:53 +00:00
- Rename Hostname to ServerHostnameInfo, add name + hostname fields - Add set_hostname_rpc for changing hostname at runtime - Migrate alpha_20: generate serverInfo.name from hostname, delete ui.name - Extract gateway.rs helpers to fix rustfmt nesting depth issue - Add i18n key for hostname validation error - Update SDK bindings
526 lines
18 KiB
Rust
526 lines
18 KiB
Rust
use std::collections::{BTreeMap, BTreeSet};
|
|
use std::future::Future;
|
|
use std::net::{IpAddr, SocketAddrV4};
|
|
use std::panic::RefUnwindSafe;
|
|
|
|
use clap::Parser;
|
|
use imbl::OrdMap;
|
|
use imbl_value::InternedString;
|
|
use itertools::Itertools;
|
|
use patch_db::DestructureMut;
|
|
use rpc_toolkit::{Context, Empty, HandlerExt, OrEmpty, ParentHandler, from_fn_async};
|
|
use serde::{Deserialize, Serialize};
|
|
use ts_rs::TS;
|
|
|
|
use crate::context::RpcContext;
|
|
use crate::db::model::DatabaseModel;
|
|
use crate::db::model::public::{NetworkInterfaceInfo, NetworkInterfaceType};
|
|
use crate::hostname::ServerHostname;
|
|
use crate::net::forward::AvailablePorts;
|
|
use crate::net::host::address::{HostAddress, PublicDomainConfig, address_api};
|
|
use crate::net::host::binding::{BindInfo, BindOptions, Bindings, binding};
|
|
use crate::net::service_interface::{HostnameInfo, HostnameMetadata};
|
|
use crate::prelude::*;
|
|
use crate::{GatewayId, HostId, PackageId};
|
|
|
|
pub mod address;
|
|
pub mod binding;
|
|
|
|
#[derive(Debug, Default, Deserialize, Serialize, HasModel, TS)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[model = "Model<Self>"]
|
|
#[ts(export)]
|
|
pub struct Host {
|
|
pub bindings: Bindings,
|
|
pub public_domains: BTreeMap<InternedString, PublicDomainConfig>,
|
|
pub private_domains: BTreeMap<InternedString, BTreeSet<GatewayId>>,
|
|
/// COMPUTED: port forwarding rules needed on gateways for public addresses to work.
|
|
#[serde(default)]
|
|
pub port_forwards: BTreeSet<PortForward>,
|
|
}
|
|
|
|
#[derive(Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Deserialize, Serialize, TS)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[ts(export)]
|
|
pub struct PortForward {
|
|
#[ts(type = "string")]
|
|
pub src: SocketAddrV4,
|
|
#[ts(type = "string")]
|
|
pub dst: SocketAddrV4,
|
|
pub gateway: GatewayId,
|
|
}
|
|
|
|
impl AsRef<Host> for Host {
|
|
fn as_ref(&self) -> &Host {
|
|
self
|
|
}
|
|
}
|
|
impl Host {
|
|
pub fn new() -> Self {
|
|
Self::default()
|
|
}
|
|
pub fn addresses<'a>(&'a self) -> impl Iterator<Item = HostAddress> + 'a {
|
|
self.public_domains
|
|
.iter()
|
|
.map(|(address, config)| HostAddress {
|
|
address: address.clone(),
|
|
public: Some(config.clone()),
|
|
private: self.private_domains.get(address).cloned(),
|
|
})
|
|
.chain(
|
|
self.private_domains
|
|
.iter()
|
|
.filter(|(domain, _)| !self.public_domains.contains_key(*domain))
|
|
.map(|(domain, gateways)| HostAddress {
|
|
address: domain.clone(),
|
|
public: None,
|
|
private: Some(gateways.clone()),
|
|
}),
|
|
)
|
|
}
|
|
}
|
|
impl Model<Host> {
|
|
pub fn update_addresses(
|
|
&mut self,
|
|
mdns: &ServerHostname,
|
|
gateways: &OrdMap<GatewayId, NetworkInterfaceInfo>,
|
|
available_ports: &AvailablePorts,
|
|
) -> Result<(), Error> {
|
|
let this = self.destructure_mut();
|
|
|
|
// ips
|
|
for (_, bind) in this.bindings.as_entries_mut()? {
|
|
let net = bind.as_net().de()?;
|
|
let opt = bind.as_options().de()?;
|
|
|
|
// Preserve existing plugin-provided addresses across recomputation
|
|
let mut available = bind.as_addresses().as_available().de()?;
|
|
available.retain(|h| matches!(h.metadata, HostnameMetadata::Plugin { .. }));
|
|
for (gid, g) in gateways {
|
|
let Some(ip_info) = &g.ip_info else {
|
|
continue;
|
|
};
|
|
let gateway_secure = g.secure();
|
|
for subnet in &ip_info.subnets {
|
|
let host = InternedString::from_display(&subnet.addr());
|
|
let metadata = if subnet.addr().is_ipv4() {
|
|
HostnameMetadata::Ipv4 {
|
|
gateway: gid.clone(),
|
|
}
|
|
} else {
|
|
HostnameMetadata::Ipv6 {
|
|
gateway: gid.clone(),
|
|
scope_id: ip_info.scope_id,
|
|
}
|
|
};
|
|
if let Some(port) = net.assigned_port.filter(|_| {
|
|
opt.secure
|
|
.map_or(gateway_secure, |s| !(s.ssl && opt.add_ssl.is_some()))
|
|
}) {
|
|
available.insert(HostnameInfo {
|
|
ssl: opt.secure.map_or(false, |s| s.ssl),
|
|
public: false,
|
|
hostname: host.clone(),
|
|
port: Some(port),
|
|
metadata: metadata.clone(),
|
|
});
|
|
}
|
|
if let Some(port) = net.assigned_ssl_port {
|
|
available.insert(HostnameInfo {
|
|
ssl: true,
|
|
public: false,
|
|
hostname: host.clone(),
|
|
port: Some(port),
|
|
metadata,
|
|
});
|
|
}
|
|
}
|
|
if let Some(wan_ip) = &ip_info.wan_ip {
|
|
let host = InternedString::from_display(&wan_ip);
|
|
let metadata = HostnameMetadata::Ipv4 {
|
|
gateway: gid.clone(),
|
|
};
|
|
if let Some(port) = net.assigned_port.filter(|_| {
|
|
opt.secure.map_or(
|
|
false, // the public internet is never secure
|
|
|s| !(s.ssl && opt.add_ssl.is_some()),
|
|
)
|
|
}) {
|
|
available.insert(HostnameInfo {
|
|
ssl: opt.secure.map_or(false, |s| s.ssl),
|
|
public: true,
|
|
hostname: host.clone(),
|
|
port: Some(port),
|
|
metadata: metadata.clone(),
|
|
});
|
|
}
|
|
if let Some(port) = net.assigned_ssl_port {
|
|
available.insert(HostnameInfo {
|
|
ssl: true,
|
|
public: true,
|
|
hostname: host.clone(),
|
|
port: Some(port),
|
|
metadata,
|
|
});
|
|
}
|
|
}
|
|
}
|
|
|
|
// mdns
|
|
let mdns_host = mdns.local_domain_name();
|
|
let mdns_gateways: BTreeSet<GatewayId> = gateways
|
|
.iter()
|
|
.filter(|(_, g)| {
|
|
matches!(
|
|
g.ip_info.as_ref().and_then(|i| i.device_type),
|
|
Some(NetworkInterfaceType::Ethernet | NetworkInterfaceType::Wireless)
|
|
)
|
|
})
|
|
.map(|(id, _)| id.clone())
|
|
.collect();
|
|
if let Some(port) = net.assigned_port.filter(|_| {
|
|
opt.secure
|
|
.map_or(true, |s| !(s.ssl && opt.add_ssl.is_some()))
|
|
}) {
|
|
available.insert(HostnameInfo {
|
|
ssl: opt.secure.map_or(false, |s| s.ssl),
|
|
public: false,
|
|
hostname: mdns_host.clone(),
|
|
port: Some(port),
|
|
metadata: HostnameMetadata::Mdns {
|
|
gateways: mdns_gateways.clone(),
|
|
},
|
|
});
|
|
}
|
|
if let Some(port) = net.assigned_ssl_port {
|
|
available.insert(HostnameInfo {
|
|
ssl: true,
|
|
public: false,
|
|
hostname: mdns_host,
|
|
port: Some(port),
|
|
metadata: HostnameMetadata::Mdns {
|
|
gateways: mdns_gateways,
|
|
},
|
|
});
|
|
}
|
|
|
|
// public domains
|
|
for (domain, info) in this.public_domains.de()? {
|
|
let metadata = HostnameMetadata::PublicDomain {
|
|
gateway: info.gateway.clone(),
|
|
};
|
|
if let Some(port) = net.assigned_port.filter(|_| {
|
|
opt.secure.map_or(
|
|
false, // the public internet is never secure
|
|
|s| !(s.ssl && opt.add_ssl.is_some()),
|
|
)
|
|
}) {
|
|
available.insert(HostnameInfo {
|
|
ssl: opt.secure.map_or(false, |s| s.ssl),
|
|
public: true,
|
|
hostname: domain.clone(),
|
|
port: Some(port),
|
|
metadata: metadata.clone(),
|
|
});
|
|
}
|
|
if let Some(mut port) = net.assigned_ssl_port {
|
|
if let Some(preferred) = opt
|
|
.add_ssl
|
|
.as_ref()
|
|
.map(|s| s.preferred_external_port)
|
|
.filter(|p| available_ports.is_ssl(*p))
|
|
{
|
|
port = preferred;
|
|
}
|
|
available.insert(HostnameInfo {
|
|
ssl: true,
|
|
public: true,
|
|
hostname: domain,
|
|
port: Some(port),
|
|
metadata,
|
|
});
|
|
}
|
|
}
|
|
|
|
// private domains
|
|
for (domain, domain_gateways) in this.private_domains.de()? {
|
|
if let Some(port) = net.assigned_port.filter(|_| {
|
|
opt.secure
|
|
.map_or(true, |s| !(s.ssl && opt.add_ssl.is_some()))
|
|
}) {
|
|
let gateways = if opt.secure.is_some() {
|
|
domain_gateways.clone()
|
|
} else {
|
|
domain_gateways
|
|
.iter()
|
|
.cloned()
|
|
.filter(|g| gateways.get(g).map_or(false, |g| g.secure()))
|
|
.collect()
|
|
};
|
|
available.insert(HostnameInfo {
|
|
ssl: opt.secure.map_or(false, |s| s.ssl),
|
|
public: true,
|
|
hostname: domain.clone(),
|
|
port: Some(port),
|
|
metadata: HostnameMetadata::PrivateDomain { gateways },
|
|
});
|
|
}
|
|
if let Some(mut port) = net.assigned_ssl_port {
|
|
if let Some(preferred) = opt
|
|
.add_ssl
|
|
.as_ref()
|
|
.map(|s| s.preferred_external_port)
|
|
.filter(|p| available_ports.is_ssl(*p))
|
|
{
|
|
port = preferred;
|
|
}
|
|
available.insert(HostnameInfo {
|
|
ssl: true,
|
|
public: true,
|
|
hostname: domain,
|
|
port: Some(port),
|
|
metadata: HostnameMetadata::PrivateDomain {
|
|
gateways: domain_gateways,
|
|
},
|
|
});
|
|
}
|
|
}
|
|
bind.as_addresses_mut().as_available_mut().ser(&available)?;
|
|
}
|
|
|
|
// compute port forwards from available public addresses
|
|
let bindings: Bindings = this.bindings.de()?;
|
|
let mut port_forwards = BTreeSet::new();
|
|
for bind in bindings.values() {
|
|
for addr in bind.addresses.enabled() {
|
|
if !addr.public {
|
|
continue;
|
|
}
|
|
let Some(port) = addr.port else {
|
|
continue;
|
|
};
|
|
let gw_id = match &addr.metadata {
|
|
HostnameMetadata::Ipv4 { gateway }
|
|
| HostnameMetadata::PublicDomain { gateway } => gateway,
|
|
_ => continue,
|
|
};
|
|
let Some(gw_info) = gateways.get(gw_id) else {
|
|
continue;
|
|
};
|
|
let Some(ip_info) = &gw_info.ip_info else {
|
|
continue;
|
|
};
|
|
let Some(wan_ip) = ip_info.wan_ip else {
|
|
continue;
|
|
};
|
|
for subnet in &ip_info.subnets {
|
|
let IpAddr::V4(addr) = subnet.addr() else {
|
|
continue;
|
|
};
|
|
port_forwards.insert(PortForward {
|
|
src: SocketAddrV4::new(wan_ip, port),
|
|
dst: SocketAddrV4::new(addr, port),
|
|
gateway: gw_id.clone(),
|
|
});
|
|
}
|
|
}
|
|
}
|
|
this.port_forwards.ser(&port_forwards)?;
|
|
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
#[derive(Debug, Default, Deserialize, Serialize, HasModel, TS)]
|
|
#[model = "Model<Self>"]
|
|
#[ts(export)]
|
|
pub struct Hosts(pub BTreeMap<HostId, Host>);
|
|
|
|
impl Map for Hosts {
|
|
type Key = HostId;
|
|
type Value = Host;
|
|
fn key_str(key: &Self::Key) -> Result<impl AsRef<str>, Error> {
|
|
Ok(key)
|
|
}
|
|
fn key_string(key: &Self::Key) -> Result<InternedString, Error> {
|
|
Ok(key.clone().into())
|
|
}
|
|
}
|
|
|
|
pub fn host_for<'a>(
|
|
db: &'a mut DatabaseModel,
|
|
package_id: Option<&PackageId>,
|
|
host_id: &HostId,
|
|
) -> Result<&'a mut Model<Host>, Error> {
|
|
let Some(package_id) = package_id else {
|
|
return Ok(db
|
|
.as_public_mut()
|
|
.as_server_info_mut()
|
|
.as_network_mut()
|
|
.as_host_mut());
|
|
};
|
|
fn host_info<'a>(
|
|
db: &'a mut DatabaseModel,
|
|
package_id: &PackageId,
|
|
) -> Result<&'a mut Model<Hosts>, Error> {
|
|
Ok::<_, Error>(
|
|
db.as_public_mut()
|
|
.as_package_data_mut()
|
|
.as_idx_mut(package_id)
|
|
.or_not_found(package_id)?
|
|
.as_hosts_mut(),
|
|
)
|
|
}
|
|
host_info(db, package_id)?.upsert(host_id, || Ok(Host::new()))
|
|
}
|
|
|
|
pub fn all_hosts(db: &mut DatabaseModel) -> impl Iterator<Item = Result<&mut Model<Host>, Error>> {
|
|
use patch_db::DestructureMut;
|
|
let destructured = db.as_public_mut().destructure_mut();
|
|
[Ok(destructured.server_info.as_network_mut().as_host_mut())]
|
|
.into_iter()
|
|
.chain(
|
|
[destructured.package_data.as_entries_mut()]
|
|
.into_iter()
|
|
.flatten_ok()
|
|
.map(|entry| entry.and_then(|(_, v)| v.as_hosts_mut().as_entries_mut()))
|
|
.flatten_ok()
|
|
.map_ok(|(_, v)| v),
|
|
)
|
|
}
|
|
|
|
impl Model<Host> {
|
|
pub fn add_binding(
|
|
&mut self,
|
|
available_ports: &mut AvailablePorts,
|
|
internal_port: u16,
|
|
options: BindOptions,
|
|
) -> Result<(), Error> {
|
|
self.as_bindings_mut().mutate(|b| {
|
|
let info = if let Some(info) = b.remove(&internal_port) {
|
|
info.update(available_ports, options)?
|
|
} else {
|
|
BindInfo::new(available_ports, options)?
|
|
};
|
|
b.insert(internal_port, info);
|
|
Ok(())
|
|
})
|
|
}
|
|
}
|
|
|
|
#[derive(Deserialize, Serialize, Parser)]
|
|
pub struct RequiresPackageId {
|
|
#[arg(help = "help.arg.package-id")]
|
|
package: PackageId,
|
|
}
|
|
|
|
#[derive(Deserialize, Serialize, Parser)]
|
|
pub struct RequiresHostId {
|
|
#[arg(help = "help.arg.host-id")]
|
|
host: HostId,
|
|
}
|
|
|
|
pub trait HostApiKind: 'static {
|
|
type Params: Send + Sync + 'static;
|
|
type InheritedParams: Send + Sync + 'static;
|
|
type Inheritance: RefUnwindSafe + OrEmpty<Self::Inheritance> + Send + Sync + 'static;
|
|
fn inheritance(params: Self::Params, inherited: Self::InheritedParams) -> Self::Inheritance;
|
|
fn host_for<'a>(
|
|
inheritance: &Self::Inheritance,
|
|
db: &'a mut DatabaseModel,
|
|
) -> Result<&'a mut Model<Host>, Error>;
|
|
fn sync_host(
|
|
ctx: &RpcContext,
|
|
inheritance: Self::Inheritance,
|
|
) -> impl Future<Output = Result<(), Error>> + Send;
|
|
}
|
|
pub struct ForPackage;
|
|
impl HostApiKind for ForPackage {
|
|
type Params = RequiresHostId;
|
|
type InheritedParams = PackageId;
|
|
type Inheritance = (PackageId, HostId);
|
|
fn inheritance(
|
|
RequiresHostId { host }: Self::Params,
|
|
package: Self::InheritedParams,
|
|
) -> Self::Inheritance {
|
|
(package, host)
|
|
}
|
|
fn host_for<'a>(
|
|
(package, host): &Self::Inheritance,
|
|
db: &'a mut DatabaseModel,
|
|
) -> Result<&'a mut Model<Host>, Error> {
|
|
host_for(db, Some(package), host)
|
|
}
|
|
async fn sync_host(ctx: &RpcContext, (package, host): Self::Inheritance) -> Result<(), Error> {
|
|
let service = ctx.services.get(&package).await;
|
|
let service_ref = service.as_ref().or_not_found(&package)?;
|
|
service_ref.sync_host(host).await?;
|
|
Ok(())
|
|
}
|
|
}
|
|
pub struct ForServer;
|
|
impl HostApiKind for ForServer {
|
|
type Params = Empty;
|
|
type InheritedParams = Empty;
|
|
type Inheritance = Empty;
|
|
fn inheritance(_: Self::Params, _: Self::InheritedParams) -> Self::Inheritance {
|
|
Empty {}
|
|
}
|
|
fn host_for<'a>(
|
|
_: &Self::Inheritance,
|
|
db: &'a mut DatabaseModel,
|
|
) -> Result<&'a mut Model<Host>, Error> {
|
|
host_for(db, None, &HostId::default())
|
|
}
|
|
async fn sync_host(ctx: &RpcContext, _: Self::Inheritance) -> Result<(), Error> {
|
|
ctx.os_net_service.sync_host(HostId::default()).await
|
|
}
|
|
}
|
|
|
|
pub fn host_api<C: Context>() -> ParentHandler<C, RequiresPackageId> {
|
|
ParentHandler::<C, RequiresPackageId>::new()
|
|
.subcommand(
|
|
"list",
|
|
from_fn_async(list_hosts)
|
|
.with_inherited(|RequiresPackageId { package }, _| package)
|
|
.with_custom_display_fn(|_, ids| {
|
|
for id in ids {
|
|
println!("{id}")
|
|
}
|
|
Ok(())
|
|
})
|
|
.with_about("about.list-host-ids-for-service"),
|
|
)
|
|
.subcommand(
|
|
"address",
|
|
address_api::<C, ForPackage>()
|
|
.with_inherited(|RequiresPackageId { package }, _| package),
|
|
)
|
|
.subcommand(
|
|
"binding",
|
|
binding::<C, ForPackage>().with_inherited(|RequiresPackageId { package }, _| package),
|
|
)
|
|
}
|
|
|
|
pub fn server_host_api<C: Context>() -> ParentHandler<C> {
|
|
ParentHandler::<C>::new()
|
|
.subcommand("address", address_api::<C, ForServer>())
|
|
.subcommand("binding", binding::<C, ForServer>())
|
|
}
|
|
|
|
pub async fn list_hosts(
|
|
ctx: RpcContext,
|
|
_: Empty,
|
|
package: PackageId,
|
|
) -> Result<BTreeSet<HostId>, Error> {
|
|
ctx.db
|
|
.peek()
|
|
.await
|
|
.into_public()
|
|
.into_package_data()
|
|
.into_idx(&package)
|
|
.or_not_found(&package)?
|
|
.into_hosts()
|
|
.keys()
|
|
}
|