mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-31 20:43:41 +00:00
* wip * initialize callbacks * wip * smtp * list_service_interfaces * wip * wip * fix domains * fix hostname handling in NetService * misc fixes * getInstalledPackages * misc fixes * publish v6 lib * refactor service effects * fix import * fix container runtime * fix tests * apply suggestions from review
593 lines
21 KiB
Rust
593 lines
21 KiB
Rust
use std::collections::{BTreeMap, BTreeSet};
|
|
use std::net::{Ipv4Addr, SocketAddr};
|
|
use std::sync::{Arc, Weak};
|
|
|
|
use color_eyre::eyre::eyre;
|
|
use imbl::OrdMap;
|
|
use imbl_value::InternedString;
|
|
use models::{HostId, OptionExt, PackageId};
|
|
use torut::onion::{OnionAddressV3, TorSecretKeyV3};
|
|
use tracing::instrument;
|
|
|
|
use crate::db::model::Database;
|
|
use crate::error::ErrorCollection;
|
|
use crate::hostname::Hostname;
|
|
use crate::net::dns::DnsController;
|
|
use crate::net::forward::LanPortForwardController;
|
|
use crate::net::host::address::HostAddress;
|
|
use crate::net::host::binding::{AddSslOptions, BindOptions, LanInfo};
|
|
use crate::net::host::{host_for, Host, HostKind};
|
|
use crate::net::service_interface::{HostnameInfo, IpHostname, OnionHostname};
|
|
use crate::net::tor::TorController;
|
|
use crate::net::vhost::{AlpnInfo, VHostController};
|
|
use crate::prelude::*;
|
|
use crate::util::serde::MaybeUtf8String;
|
|
use crate::HOST_IP;
|
|
|
|
pub struct PreInitNetController {
|
|
pub db: TypedPatchDb<Database>,
|
|
tor: TorController,
|
|
vhost: VHostController,
|
|
os_bindings: Vec<Arc<()>>,
|
|
}
|
|
impl PreInitNetController {
|
|
#[instrument(skip_all)]
|
|
pub async fn init(
|
|
db: TypedPatchDb<Database>,
|
|
tor_control: SocketAddr,
|
|
tor_socks: SocketAddr,
|
|
hostname: &Hostname,
|
|
os_tor_key: TorSecretKeyV3,
|
|
) -> Result<Self, Error> {
|
|
let mut res = Self {
|
|
db: db.clone(),
|
|
tor: TorController::new(tor_control, tor_socks),
|
|
vhost: VHostController::new(db),
|
|
os_bindings: Vec::new(),
|
|
};
|
|
res.add_os_bindings(hostname, os_tor_key).await?;
|
|
Ok(res)
|
|
}
|
|
|
|
async fn add_os_bindings(
|
|
&mut self,
|
|
hostname: &Hostname,
|
|
tor_key: TorSecretKeyV3,
|
|
) -> Result<(), Error> {
|
|
let alpn = Err(AlpnInfo::Specified(vec![
|
|
MaybeUtf8String("http/1.1".into()),
|
|
MaybeUtf8String("h2".into()),
|
|
]));
|
|
|
|
// Internal DNS
|
|
self.vhost
|
|
.add(
|
|
Some("embassy".into()),
|
|
443,
|
|
([127, 0, 0, 1], 80).into(),
|
|
alpn.clone(),
|
|
)
|
|
.await?;
|
|
self.vhost
|
|
.add(
|
|
Some("startos".into()),
|
|
443,
|
|
([127, 0, 0, 1], 80).into(),
|
|
alpn.clone(),
|
|
)
|
|
.await?;
|
|
|
|
// LAN IP
|
|
self.os_bindings.push(
|
|
self.vhost
|
|
.add(None, 443, ([127, 0, 0, 1], 80).into(), alpn.clone())
|
|
.await?,
|
|
);
|
|
|
|
// localhost
|
|
self.os_bindings.push(
|
|
self.vhost
|
|
.add(
|
|
Some("localhost".into()),
|
|
443,
|
|
([127, 0, 0, 1], 80).into(),
|
|
alpn.clone(),
|
|
)
|
|
.await?,
|
|
);
|
|
self.os_bindings.push(
|
|
self.vhost
|
|
.add(
|
|
Some(hostname.no_dot_host_name()),
|
|
443,
|
|
([127, 0, 0, 1], 80).into(),
|
|
alpn.clone(),
|
|
)
|
|
.await?,
|
|
);
|
|
|
|
// LAN mDNS
|
|
self.os_bindings.push(
|
|
self.vhost
|
|
.add(
|
|
Some(hostname.local_domain_name()),
|
|
443,
|
|
([127, 0, 0, 1], 80).into(),
|
|
alpn.clone(),
|
|
)
|
|
.await?,
|
|
);
|
|
|
|
// Tor
|
|
self.os_bindings.push(
|
|
self.vhost
|
|
.add(
|
|
Some(InternedString::from_display(
|
|
&tor_key.public().get_onion_address(),
|
|
)),
|
|
443,
|
|
([127, 0, 0, 1], 80).into(),
|
|
alpn.clone(),
|
|
)
|
|
.await?,
|
|
);
|
|
self.os_bindings.extend(
|
|
self.tor
|
|
.add(
|
|
tor_key,
|
|
vec![
|
|
(80, ([127, 0, 0, 1], 80).into()), // http
|
|
(443, ([127, 0, 0, 1], 443).into()), // https
|
|
],
|
|
)
|
|
.await?,
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
pub struct NetController {
|
|
db: TypedPatchDb<Database>,
|
|
pub(super) tor: TorController,
|
|
pub(super) vhost: VHostController,
|
|
pub(super) dns: DnsController,
|
|
pub(super) forward: LanPortForwardController,
|
|
pub(super) os_bindings: Vec<Arc<()>>,
|
|
}
|
|
|
|
impl NetController {
|
|
pub async fn init(
|
|
PreInitNetController {
|
|
db,
|
|
tor,
|
|
vhost,
|
|
os_bindings,
|
|
}: PreInitNetController,
|
|
dns_bind: &[SocketAddr],
|
|
) -> Result<Self, Error> {
|
|
let mut res = Self {
|
|
db,
|
|
tor,
|
|
vhost,
|
|
dns: DnsController::init(dns_bind).await?,
|
|
forward: LanPortForwardController::new(),
|
|
os_bindings,
|
|
};
|
|
res.os_bindings
|
|
.push(res.dns.add(None, HOST_IP.into()).await?);
|
|
Ok(res)
|
|
}
|
|
|
|
#[instrument(skip_all)]
|
|
pub async fn create_service(
|
|
self: &Arc<Self>,
|
|
package: PackageId,
|
|
ip: Ipv4Addr,
|
|
) -> Result<NetService, Error> {
|
|
let dns = self.dns.add(Some(package.clone()), ip).await?;
|
|
|
|
Ok(NetService {
|
|
shutdown: false,
|
|
id: package,
|
|
ip,
|
|
dns,
|
|
controller: Arc::downgrade(self),
|
|
binds: BTreeMap::new(),
|
|
})
|
|
}
|
|
}
|
|
|
|
#[derive(Default, Debug)]
|
|
struct HostBinds {
|
|
lan: BTreeMap<
|
|
u16,
|
|
(
|
|
LanInfo,
|
|
Option<AddSslOptions>,
|
|
BTreeSet<InternedString>,
|
|
Vec<Arc<()>>,
|
|
),
|
|
>,
|
|
tor: BTreeMap<OnionAddressV3, (OrdMap<u16, SocketAddr>, Vec<Arc<()>>)>,
|
|
}
|
|
|
|
pub struct NetService {
|
|
shutdown: bool,
|
|
id: PackageId,
|
|
ip: Ipv4Addr,
|
|
dns: Arc<()>,
|
|
controller: Weak<NetController>,
|
|
binds: BTreeMap<HostId, HostBinds>,
|
|
}
|
|
impl NetService {
|
|
fn net_controller(&self) -> Result<Arc<NetController>, Error> {
|
|
Weak::upgrade(&self.controller).ok_or_else(|| {
|
|
Error::new(
|
|
eyre!("NetController is shutdown"),
|
|
crate::ErrorKind::Network,
|
|
)
|
|
})
|
|
}
|
|
|
|
pub async fn bind(
|
|
&mut self,
|
|
kind: HostKind,
|
|
id: HostId,
|
|
internal_port: u16,
|
|
options: BindOptions,
|
|
) -> Result<(), Error> {
|
|
dbg!("bind", &kind, &id, internal_port, &options);
|
|
let pkg_id = &self.id;
|
|
let host = self
|
|
.net_controller()?
|
|
.db
|
|
.mutate(|db| {
|
|
let mut ports = db.as_private().as_available_ports().de()?;
|
|
let host = host_for(db, pkg_id, &id, kind)?;
|
|
host.add_binding(&mut ports, internal_port, options)?;
|
|
let host = host.de()?;
|
|
db.as_private_mut().as_available_ports_mut().ser(&ports)?;
|
|
Ok(host)
|
|
})
|
|
.await?;
|
|
self.update(id, host).await
|
|
}
|
|
|
|
pub async fn clear_bindings(&mut self) -> Result<(), Error> {
|
|
let ctrl = self.net_controller()?;
|
|
let mut errors = ErrorCollection::new();
|
|
for (_, binds) in std::mem::take(&mut self.binds) {
|
|
for (_, (lan, _, _, rc)) in binds.lan {
|
|
drop(rc);
|
|
if let Some(external) = lan.assigned_ssl_port {
|
|
ctrl.vhost.gc(None, external).await?;
|
|
}
|
|
if let Some(external) = lan.assigned_port {
|
|
ctrl.forward.gc(external).await?;
|
|
}
|
|
}
|
|
for (addr, (_, rcs)) in binds.tor {
|
|
drop(rcs);
|
|
errors.handle(ctrl.tor.gc(Some(addr), None).await);
|
|
}
|
|
}
|
|
std::mem::take(&mut self.dns);
|
|
errors.handle(ctrl.dns.gc(Some(self.id.clone()), self.ip).await);
|
|
errors.into_result()
|
|
}
|
|
|
|
async fn update(&mut self, id: HostId, host: Host) -> Result<(), Error> {
|
|
let ctrl = self.net_controller()?;
|
|
let mut hostname_info = BTreeMap::new();
|
|
let binds = self.binds.entry(id.clone()).or_default();
|
|
|
|
let peek = ctrl.db.peek().await;
|
|
|
|
// LAN
|
|
let server_info = peek.as_public().as_server_info();
|
|
let ip_info = server_info.as_ip_info().de()?;
|
|
let hostname = server_info.as_hostname().de()?;
|
|
for (port, bind) in &host.bindings {
|
|
let old_lan_bind = binds.lan.remove(port);
|
|
let lan_bind = old_lan_bind
|
|
.as_ref()
|
|
.filter(|(external, ssl, _, _)| {
|
|
ssl == &bind.options.add_ssl && bind.lan == *external
|
|
})
|
|
.cloned(); // only keep existing binding if relevant details match
|
|
if bind.lan.assigned_port.is_some() || bind.lan.assigned_ssl_port.is_some() {
|
|
let new_lan_bind = if let Some(b) = lan_bind {
|
|
b
|
|
} else {
|
|
let mut rcs = Vec::with_capacity(2 + host.addresses.len());
|
|
let mut hostnames = BTreeSet::new();
|
|
if let Some(ssl) = &bind.options.add_ssl {
|
|
let external = bind
|
|
.lan
|
|
.assigned_ssl_port
|
|
.or_not_found("assigned ssl port")?;
|
|
let target = (self.ip, *port).into();
|
|
let connect_ssl = if let Some(alpn) = ssl.alpn.clone() {
|
|
Err(alpn)
|
|
} else {
|
|
if bind.options.secure.as_ref().map_or(false, |s| s.ssl) {
|
|
Ok(())
|
|
} else {
|
|
Err(AlpnInfo::Reflect)
|
|
}
|
|
};
|
|
rcs.push(
|
|
ctrl.vhost
|
|
.add(None, external, target, connect_ssl.clone())
|
|
.await?,
|
|
);
|
|
for address in host.addresses() {
|
|
match address {
|
|
HostAddress::Onion { address } => {
|
|
let hostname = InternedString::from_display(address);
|
|
if hostnames.insert(hostname.clone()) {
|
|
rcs.push(
|
|
ctrl.vhost
|
|
.add(
|
|
Some(hostname),
|
|
external,
|
|
target,
|
|
connect_ssl.clone(),
|
|
)
|
|
.await?,
|
|
);
|
|
}
|
|
}
|
|
HostAddress::Domain { address } => {
|
|
if hostnames.insert(address.clone()) {
|
|
rcs.push(
|
|
ctrl.vhost
|
|
.add(
|
|
Some(address.clone()),
|
|
external,
|
|
target,
|
|
connect_ssl.clone(),
|
|
)
|
|
.await?,
|
|
);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if let Some(security) = bind.options.secure {
|
|
if bind.options.add_ssl.is_some() && security.ssl {
|
|
// doesn't make sense to have 2 listening ports, both with ssl
|
|
} else {
|
|
let external =
|
|
bind.lan.assigned_port.or_not_found("assigned lan port")?;
|
|
rcs.push(ctrl.forward.add(external, (self.ip, *port).into()).await?);
|
|
}
|
|
}
|
|
(bind.lan, bind.options.add_ssl.clone(), hostnames, rcs)
|
|
};
|
|
let mut bind_hostname_info: Vec<HostnameInfo> =
|
|
hostname_info.remove(port).unwrap_or_default();
|
|
for (interface, ip_info) in &ip_info {
|
|
bind_hostname_info.push(HostnameInfo::Ip {
|
|
network_interface_id: interface.clone(),
|
|
public: false,
|
|
hostname: IpHostname::Local {
|
|
value: format!("{hostname}.local"),
|
|
port: new_lan_bind.0.assigned_port,
|
|
ssl_port: new_lan_bind.0.assigned_ssl_port,
|
|
},
|
|
});
|
|
if let Some(ipv4) = ip_info.ipv4 {
|
|
bind_hostname_info.push(HostnameInfo::Ip {
|
|
network_interface_id: interface.clone(),
|
|
public: false,
|
|
hostname: IpHostname::Ipv4 {
|
|
value: ipv4,
|
|
port: new_lan_bind.0.assigned_port,
|
|
ssl_port: new_lan_bind.0.assigned_ssl_port,
|
|
},
|
|
});
|
|
}
|
|
if let Some(ipv6) = ip_info.ipv6 {
|
|
bind_hostname_info.push(HostnameInfo::Ip {
|
|
network_interface_id: interface.clone(),
|
|
public: false,
|
|
hostname: IpHostname::Ipv6 {
|
|
value: ipv6,
|
|
port: new_lan_bind.0.assigned_port,
|
|
ssl_port: new_lan_bind.0.assigned_ssl_port,
|
|
},
|
|
});
|
|
}
|
|
}
|
|
hostname_info.insert(*port, bind_hostname_info);
|
|
binds.lan.insert(*port, new_lan_bind);
|
|
}
|
|
if let Some((lan, _, hostnames, _)) = old_lan_bind {
|
|
if let Some(external) = lan.assigned_ssl_port {
|
|
ctrl.vhost.gc(None, external).await?;
|
|
for hostname in hostnames {
|
|
ctrl.vhost.gc(Some(hostname), external).await?;
|
|
}
|
|
}
|
|
if let Some(external) = lan.assigned_port {
|
|
ctrl.forward.gc(external).await?;
|
|
}
|
|
}
|
|
}
|
|
let mut removed = BTreeSet::new();
|
|
binds.lan.retain(|internal, (external, _, hostnames, _)| {
|
|
if host.bindings.contains_key(internal) {
|
|
true
|
|
} else {
|
|
removed.insert((*external, std::mem::take(hostnames)));
|
|
|
|
false
|
|
}
|
|
});
|
|
for (lan, hostnames) in removed {
|
|
if let Some(external) = lan.assigned_ssl_port {
|
|
ctrl.vhost.gc(None, external).await?;
|
|
for hostname in hostnames {
|
|
ctrl.vhost.gc(Some(hostname), external).await?;
|
|
}
|
|
}
|
|
if let Some(external) = lan.assigned_port {
|
|
ctrl.forward.gc(external).await?;
|
|
}
|
|
}
|
|
|
|
struct TorHostnamePorts {
|
|
non_ssl: Option<u16>,
|
|
ssl: Option<u16>,
|
|
}
|
|
let mut tor_hostname_ports = BTreeMap::<u16, TorHostnamePorts>::new();
|
|
let mut tor_binds = OrdMap::<u16, SocketAddr>::new();
|
|
for (internal, info) in &host.bindings {
|
|
tor_binds.insert(
|
|
info.options.preferred_external_port,
|
|
SocketAddr::from((self.ip, *internal)),
|
|
);
|
|
if let (Some(ssl), Some(ssl_internal)) =
|
|
(&info.options.add_ssl, info.lan.assigned_ssl_port)
|
|
{
|
|
tor_binds.insert(
|
|
ssl.preferred_external_port,
|
|
SocketAddr::from(([127, 0, 0, 1], ssl_internal)),
|
|
);
|
|
tor_hostname_ports.insert(
|
|
*internal,
|
|
TorHostnamePorts {
|
|
non_ssl: Some(info.options.preferred_external_port)
|
|
.filter(|p| *p != ssl.preferred_external_port),
|
|
ssl: Some(ssl.preferred_external_port),
|
|
},
|
|
);
|
|
} else {
|
|
tor_hostname_ports.insert(
|
|
*internal,
|
|
TorHostnamePorts {
|
|
non_ssl: Some(info.options.preferred_external_port),
|
|
ssl: None,
|
|
},
|
|
);
|
|
}
|
|
}
|
|
|
|
let mut keep_tor_addrs = BTreeSet::new();
|
|
for tor_addr in host.addresses().filter_map(|a| {
|
|
if let HostAddress::Onion { address } = a {
|
|
Some(address)
|
|
} else {
|
|
None
|
|
}
|
|
}) {
|
|
keep_tor_addrs.insert(tor_addr);
|
|
let old_tor_bind = binds.tor.remove(tor_addr);
|
|
let tor_bind = old_tor_bind.filter(|(ports, _)| ports == &tor_binds);
|
|
let new_tor_bind = if let Some(tor_bind) = tor_bind {
|
|
tor_bind
|
|
} else {
|
|
let key = peek
|
|
.as_private()
|
|
.as_key_store()
|
|
.as_onion()
|
|
.get_key(tor_addr)?;
|
|
let rcs = ctrl
|
|
.tor
|
|
.add(key, tor_binds.clone().into_iter().collect())
|
|
.await?;
|
|
(tor_binds.clone(), rcs)
|
|
};
|
|
for (internal, ports) in &tor_hostname_ports {
|
|
let mut bind_hostname_info = hostname_info.remove(internal).unwrap_or_default();
|
|
bind_hostname_info.push(HostnameInfo::Onion {
|
|
hostname: OnionHostname {
|
|
value: tor_addr.to_string(),
|
|
port: ports.non_ssl,
|
|
ssl_port: ports.ssl,
|
|
},
|
|
});
|
|
hostname_info.insert(*internal, bind_hostname_info);
|
|
}
|
|
binds.tor.insert(tor_addr.clone(), new_tor_bind);
|
|
}
|
|
for addr in binds.tor.keys() {
|
|
if !keep_tor_addrs.contains(addr) {
|
|
ctrl.tor.gc(Some(addr.clone()), None).await?;
|
|
}
|
|
}
|
|
self.net_controller()?
|
|
.db
|
|
.mutate(|db| {
|
|
host_for(db, &self.id, &id, host.kind)?
|
|
.as_hostname_info_mut()
|
|
.ser(&hostname_info)
|
|
})
|
|
.await?;
|
|
Ok(())
|
|
}
|
|
|
|
pub async fn remove_all(mut self) -> Result<(), Error> {
|
|
self.shutdown = true;
|
|
if let Some(ctrl) = Weak::upgrade(&self.controller) {
|
|
self.clear_bindings().await
|
|
} else {
|
|
tracing::warn!("NetService dropped after NetController is shutdown");
|
|
Err(Error::new(
|
|
eyre!("NetController is shutdown"),
|
|
crate::ErrorKind::Network,
|
|
))
|
|
}
|
|
}
|
|
|
|
pub fn get_ip(&self) -> Ipv4Addr {
|
|
self.ip
|
|
}
|
|
|
|
pub fn get_lan_port(&self, host_id: HostId, internal_port: u16) -> Result<LanInfo, Error> {
|
|
let host_id_binds = self.binds.get_key_value(&host_id);
|
|
match host_id_binds {
|
|
Some((_, binds)) => {
|
|
if let Some((lan, _, _, _)) = binds.lan.get(&internal_port) {
|
|
Ok(*lan)
|
|
} else {
|
|
Err(Error::new(
|
|
eyre!(
|
|
"Internal Port {} not found in NetService binds",
|
|
internal_port
|
|
),
|
|
crate::ErrorKind::NotFound,
|
|
))
|
|
}
|
|
}
|
|
None => Err(Error::new(
|
|
eyre!("HostID {} not found in NetService binds", host_id),
|
|
crate::ErrorKind::NotFound,
|
|
)),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Drop for NetService {
|
|
fn drop(&mut self) {
|
|
if !self.shutdown {
|
|
tracing::debug!("Dropping NetService for {}", self.id);
|
|
let svc = std::mem::replace(
|
|
self,
|
|
NetService {
|
|
shutdown: true,
|
|
id: Default::default(),
|
|
ip: Ipv4Addr::new(0, 0, 0, 0),
|
|
dns: Default::default(),
|
|
controller: Default::default(),
|
|
binds: BTreeMap::new(),
|
|
},
|
|
);
|
|
tokio::spawn(async move { svc.remove_all().await.unwrap() });
|
|
}
|
|
}
|
|
}
|