2020-05-21 14:09:45 +00:00
|
|
|
#include "rpc_server.hpp"
|
2021-03-09 22:24:35 +00:00
|
|
|
#include <llarp/router/route_poker.hpp>
|
|
|
|
#include <llarp/constants/version.hpp>
|
2020-06-24 13:24:07 +00:00
|
|
|
#include <nlohmann/json.hpp>
|
2021-03-26 20:45:19 +00:00
|
|
|
#include <llarp/exit/context.hpp>
|
2021-03-09 22:24:35 +00:00
|
|
|
#include <llarp/net/ip_range.hpp>
|
2021-03-26 20:45:19 +00:00
|
|
|
#include <llarp/quic/tunnel.hpp>
|
2021-03-09 22:24:35 +00:00
|
|
|
#include <llarp/service/context.hpp>
|
|
|
|
#include <llarp/service/outbound_context.hpp>
|
|
|
|
#include <llarp/service/auth.hpp>
|
|
|
|
#include <llarp/service/name.hpp>
|
|
|
|
#include <llarp/router/abstractrouter.hpp>
|
2021-07-29 20:40:25 +00:00
|
|
|
#include <llarp/dns/dns.hpp>
|
2020-05-21 14:09:45 +00:00
|
|
|
|
|
|
|
namespace llarp::rpc
|
|
|
|
{
|
|
|
|
RpcServer::RpcServer(LMQ_ptr lmq, AbstractRouter* r) : m_LMQ(std::move(lmq)), m_Router(r)
|
Config file improvements (#1397)
* Config file API/comment improvements
API improvements:
=================
Make the config API use position-independent tag parameters (Required,
Default{123}, MultiValue) rather than a sequence of bools with
overloads. For example, instead of:
conf.defineOption<int>("a", "b", false, true, 123, [] { ... });
you now write:
conf.defineOption<int>("a", "b", MultiValue, Default{123}, [] { ... });
The tags are:
- Required
- MultiValue
- Default{value}
plus new abilities (see below):
- Hidden
- RelayOnly
- ClientOnly
- Comment{"line1", "line2", "line3"}
Made option definition more powerful:
=====================================
- `Hidden` allows you to define an option that won't show up in the
generated config file if it isn't set.
- `RelayOnly`/`ClientOnly` sets up an option that is only accepted and
only shows up for relay or client configs. (If neither is specified
the option shows up in both modes).
- `Comment{...}` lets the option comments be specified as part of the
defineOption.
Comment improvements
====================
- Rewrote comments for various options to expand on details.
- Inlined all the comments with the option definitions.
- Several options that were missing comments got comments added.
- Made various options for deprecated and or internal options hidden by
default so that they don't show up in a default config file.
- show the section comment (but not option comments) *after* the
[section] tag instead of before it as it makes more sense that way
(particularly for the [bind] section which has a new long comment to
describe how it works).
Disable profiling by default
============================
We had this weird state where we use and store profiling by default but
never *load* it when starting up. This commit makes us just not use
profiling at all unless explicitly enabled.
Other misc changes:
===================
- change default worker threads to 0 (= num cpus) instead of 1, and fix
it to allow 0.
- Actually apply worker-threads option
- fixed default data-dir value erroneously having quotes around it
- reordered ifname/ifaddr/mapaddr (was previously mapaddr/ifaddr/ifname)
as mapaddr is a sort of specialization of ifaddr and so makes more
sense to come after it (particularly because it now references ifaddr
in its help message).
- removed peer-stats option (since we always require it for relays and
never use it for clients)
- removed router profiles filename option (this doesn't need to be
configurable)
- removed defunct `service-node-seed` option
- Change default logging output file to "" (which means stdout), and
also made "-" work for stdout.
* Router hive compilation fixes
* Comments for SNApp SRV settings in ini file
* Add extra blank line after section comments
* Better deprecated option handling
Allow {client,relay}-only options in {relay,client} configs to be
specified as implicitly deprecated options: they warn, and don't set
anything.
Add an explicit `Deprecated` tag and move deprecated option handling
into definition.cpp.
* Move backwards compat options into section definitions
Keep the "addBackwardsCompatibleConfigOptions" only for options in
sections that no longer exist.
* Fix INI parsing issues & C++17-ify
- don't allow inline comments because it seems they aren't allowed in
ini formats in general, and is going to cause problems if there is a
comment character in a value (e.g. an exit auth string). Additionally
it was breaking on a line such as:
# some comment; see?
because it was treating only `; see?` as the comment and then producing
an error message about the rest of the line being invalid.
- make section parsing stricter: the `[` and `]` have to be at the
beginning at end of the line now (after stripping whitespace).
- Move whitespace stripping to the top since everything in here does it.
- chop off string_view suffix/prefix rather than maintaining position
values
- fix potential infinite loop/segfault when given a line such as `]foo[`
* Make config parsing failure fatal
Load() LogError's and returns false on failure, so we weren't aborting
on config file errors.
* Formatting: allow `{}` for empty functions/structs
Instead of using two lines when empty:
{
}
* Make default dns bind 127.0.0.1 on non-Linux
* Don't show empty section; fix tests
We can conceivably have sections that only make sense for clients or
relays, and so want to completely omit that section if we have no
options for the type of config being generated.
Also fixes missing empty lines between tests.
Co-authored-by: Thomas Winget <tewinget@gmail.com>
2020-10-07 22:22:58 +00:00
|
|
|
{}
|
2020-05-21 14:09:45 +00:00
|
|
|
|
2020-06-24 13:24:07 +00:00
|
|
|
/// maybe parse json from message paramter at index
|
|
|
|
std::optional<nlohmann::json>
|
2021-02-03 18:12:21 +00:00
|
|
|
MaybeParseJSON(const oxenmq::Message& msg, size_t index = 0)
|
2020-06-24 13:24:07 +00:00
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
const auto& str = msg.data.at(index);
|
|
|
|
return nlohmann::json::parse(str);
|
|
|
|
}
|
|
|
|
catch (std::exception&)
|
|
|
|
{
|
|
|
|
return std::nullopt;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template <typename Result_t>
|
|
|
|
std::string
|
|
|
|
CreateJSONResponse(Result_t result)
|
|
|
|
{
|
|
|
|
const auto obj = nlohmann::json{
|
|
|
|
{"error", nullptr},
|
|
|
|
{"result", result},
|
|
|
|
};
|
|
|
|
return obj.dump();
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string
|
|
|
|
CreateJSONError(std::string_view msg)
|
|
|
|
{
|
|
|
|
const auto obj = nlohmann::json{
|
|
|
|
{"error", msg},
|
|
|
|
};
|
|
|
|
return obj.dump();
|
|
|
|
}
|
|
|
|
|
|
|
|
/// a function that replies to an rpc request
|
|
|
|
using ReplyFunction_t = std::function<void(std::string)>;
|
|
|
|
|
2021-03-26 20:45:19 +00:00
|
|
|
std::shared_ptr<EndpointBase>
|
|
|
|
GetEndpointByName(AbstractRouter* r, std::string name)
|
|
|
|
{
|
|
|
|
if (r->IsServiceNode())
|
|
|
|
{
|
|
|
|
return r->exitContext().GetExitEndpoint(name);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return r->hiddenServiceContext().GetEndpointByName(name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-24 13:24:07 +00:00
|
|
|
void
|
|
|
|
HandleJSONRequest(
|
2021-02-02 14:35:40 +00:00
|
|
|
oxenmq::Message& msg, std::function<void(nlohmann::json, ReplyFunction_t)> handleRequest)
|
2020-06-24 13:24:07 +00:00
|
|
|
{
|
|
|
|
const auto maybe = MaybeParseJSON(msg);
|
|
|
|
if (not maybe.has_value())
|
|
|
|
{
|
|
|
|
msg.send_reply(CreateJSONError("failed to parse json"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (not maybe->is_object())
|
|
|
|
{
|
|
|
|
msg.send_reply(CreateJSONError("request data not a json object"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
try
|
|
|
|
{
|
2021-02-02 14:35:40 +00:00
|
|
|
handleRequest(
|
|
|
|
*maybe, [defer = msg.send_later()](std::string result) { defer.reply(result); });
|
2020-06-24 13:24:07 +00:00
|
|
|
}
|
|
|
|
catch (std::exception& ex)
|
|
|
|
{
|
|
|
|
msg.send_reply(CreateJSONError(ex.what()));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-23 19:37:47 +00:00
|
|
|
void
|
2021-02-02 14:35:40 +00:00
|
|
|
RpcServer::AsyncServeRPC(oxenmq::address url)
|
2020-05-21 14:09:45 +00:00
|
|
|
{
|
2020-06-11 18:26:02 +00:00
|
|
|
m_LMQ->listen_plain(url.zmq_address());
|
2021-02-02 14:35:40 +00:00
|
|
|
m_LMQ->add_category("llarp", oxenmq::AuthLevel::none)
|
2020-06-11 18:26:02 +00:00
|
|
|
.add_command(
|
|
|
|
"halt",
|
2021-02-02 14:35:40 +00:00
|
|
|
[&](oxenmq::Message& msg) {
|
2020-06-11 18:26:02 +00:00
|
|
|
if (not m_Router->IsRunning())
|
|
|
|
{
|
2020-06-24 13:24:07 +00:00
|
|
|
msg.send_reply(CreateJSONError("router is not running"));
|
2020-06-11 18:26:02 +00:00
|
|
|
return;
|
|
|
|
}
|
2020-06-24 13:24:07 +00:00
|
|
|
msg.send_reply(CreateJSONResponse("OK"));
|
2020-11-20 17:37:30 +00:00
|
|
|
m_Router->Stop();
|
2020-06-11 18:26:02 +00:00
|
|
|
})
|
2020-05-23 19:37:47 +00:00
|
|
|
.add_request_command(
|
2020-06-24 13:24:07 +00:00
|
|
|
"version",
|
2021-02-02 14:35:40 +00:00
|
|
|
[r = m_Router](oxenmq::Message& msg) {
|
2021-03-05 17:31:52 +00:00
|
|
|
util::StatusObject result{
|
|
|
|
{"version", llarp::VERSION_FULL}, {"uptime", to_json(r->Uptime())}};
|
2020-09-01 21:22:22 +00:00
|
|
|
msg.send_reply(CreateJSONResponse(result));
|
|
|
|
})
|
2020-06-24 13:24:07 +00:00
|
|
|
.add_request_command(
|
|
|
|
"status",
|
2021-02-02 14:35:40 +00:00
|
|
|
[&](oxenmq::Message& msg) {
|
2021-03-02 07:02:59 +00:00
|
|
|
m_Router->loop()->call([defer = msg.send_later(), r = m_Router]() {
|
2021-02-02 14:35:40 +00:00
|
|
|
std::string data;
|
|
|
|
if (r->IsRunning())
|
|
|
|
{
|
|
|
|
data = CreateJSONResponse(r->ExtractStatus());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
data = CreateJSONError("router not yet ready");
|
|
|
|
}
|
|
|
|
defer.reply(data);
|
2020-06-24 13:24:07 +00:00
|
|
|
});
|
2021-03-26 20:45:19 +00:00
|
|
|
})
|
2021-10-13 11:20:36 +00:00
|
|
|
.add_request_command(
|
|
|
|
"get_status",
|
|
|
|
[&](oxenmq::Message& msg) {
|
|
|
|
m_Router->loop()->call([defer = msg.send_later(), r = m_Router]() {
|
|
|
|
defer.reply(CreateJSONResponse(r->ExtractSummaryStatus()));
|
|
|
|
});
|
|
|
|
})
|
2021-03-26 20:45:19 +00:00
|
|
|
.add_request_command(
|
|
|
|
"quic_connect",
|
|
|
|
[&](oxenmq::Message& msg) {
|
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
|
|
|
std::string endpoint = "default";
|
|
|
|
if (auto itr = obj.find("endpoint"); itr != obj.end())
|
|
|
|
endpoint = itr->get<std::string>();
|
|
|
|
|
2021-03-27 18:54:09 +00:00
|
|
|
std::string bindAddr = "127.0.0.1:0";
|
|
|
|
if (auto itr = obj.find("bind"); itr != obj.end())
|
|
|
|
bindAddr = itr->get<std::string>();
|
|
|
|
|
2021-03-26 20:45:19 +00:00
|
|
|
std::string remoteHost;
|
|
|
|
if (auto itr = obj.find("host"); itr != obj.end())
|
|
|
|
remoteHost = itr->get<std::string>();
|
|
|
|
|
|
|
|
uint16_t port = 0;
|
|
|
|
if (auto itr = obj.find("port"); itr != obj.end())
|
|
|
|
port = itr->get<uint16_t>();
|
|
|
|
|
|
|
|
int closeID = 0;
|
|
|
|
if (auto itr = obj.find("close"); itr != obj.end())
|
|
|
|
closeID = itr->get<int>();
|
|
|
|
|
|
|
|
if (port == 0 and closeID == 0)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("port not provided"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (remoteHost.empty() and closeID == 0)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("host not provided"));
|
|
|
|
return;
|
|
|
|
}
|
2021-03-27 18:54:09 +00:00
|
|
|
SockAddr laddr{};
|
|
|
|
laddr.fromString(bindAddr);
|
2021-03-26 20:45:19 +00:00
|
|
|
|
2021-03-30 14:16:25 +00:00
|
|
|
r->loop()->call([reply, endpoint, r, remoteHost, port, closeID, laddr]() {
|
2021-03-26 20:45:19 +00:00
|
|
|
auto ep = GetEndpointByName(r, endpoint);
|
|
|
|
if (not ep)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no such local endpoint"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto quic = ep->GetQUICTunnel();
|
|
|
|
if (not quic)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("local endpoint has no quic tunnel"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (closeID)
|
|
|
|
{
|
|
|
|
quic->close(closeID);
|
|
|
|
reply(CreateJSONResponse("OK"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-03-30 14:16:25 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
auto [addr, id] = quic->open(
|
|
|
|
remoteHost, port, [](auto&&) {}, laddr);
|
|
|
|
util::StatusObject status;
|
|
|
|
status["addr"] = addr.toString();
|
|
|
|
status["id"] = id;
|
|
|
|
reply(CreateJSONResponse(status));
|
|
|
|
}
|
|
|
|
catch (std::exception& ex)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError(ex.what()));
|
|
|
|
}
|
2021-03-26 20:45:19 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
})
|
|
|
|
.add_request_command(
|
|
|
|
"quic_listener",
|
|
|
|
[&](oxenmq::Message& msg) {
|
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
|
|
|
std::string endpoint = "default";
|
|
|
|
if (auto itr = obj.find("endpoint"); itr != obj.end())
|
|
|
|
endpoint = itr->get<std::string>();
|
|
|
|
|
2021-03-31 10:57:06 +00:00
|
|
|
std::string remote = "127.0.0.1";
|
|
|
|
if (auto itr = obj.find("host"); itr != obj.end())
|
|
|
|
remote = itr->get<std::string>();
|
|
|
|
|
2021-03-26 20:45:19 +00:00
|
|
|
uint16_t port = 0;
|
|
|
|
if (auto itr = obj.find("port"); itr != obj.end())
|
|
|
|
port = itr->get<uint16_t>();
|
|
|
|
|
|
|
|
int closeID = 0;
|
|
|
|
if (auto itr = obj.find("close"); itr != obj.end())
|
|
|
|
closeID = itr->get<int>();
|
|
|
|
|
2021-04-06 12:25:46 +00:00
|
|
|
std::string srvProto;
|
|
|
|
if (auto itr = obj.find("srv-proto"); itr != obj.end())
|
|
|
|
srvProto = itr->get<std::string>();
|
|
|
|
|
2021-03-26 20:45:19 +00:00
|
|
|
if (port == 0 and closeID == 0)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("invalid arguments"));
|
|
|
|
return;
|
|
|
|
}
|
2021-04-06 12:25:46 +00:00
|
|
|
r->loop()->call([reply, endpoint, remote, port, r, closeID, srvProto]() {
|
2021-03-26 20:45:19 +00:00
|
|
|
auto ep = GetEndpointByName(r, endpoint);
|
|
|
|
if (not ep)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no such local endpoint"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto quic = ep->GetQUICTunnel();
|
|
|
|
if (not quic)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no quic interface available on endpoint " + endpoint));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (port)
|
|
|
|
{
|
|
|
|
int id = 0;
|
|
|
|
try
|
|
|
|
{
|
2021-03-31 10:57:06 +00:00
|
|
|
SockAddr addr{remote + ":" + std::to_string(port)};
|
|
|
|
id = quic->listen(addr);
|
2021-03-26 20:45:19 +00:00
|
|
|
}
|
|
|
|
catch (std::exception& ex)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError(ex.what()));
|
|
|
|
return;
|
|
|
|
}
|
2021-03-27 18:54:09 +00:00
|
|
|
util::StatusObject result;
|
|
|
|
result["id"] = id;
|
2021-04-02 15:10:37 +00:00
|
|
|
std::string localAddress;
|
|
|
|
var::visit(
|
|
|
|
[&](auto&& addr) { localAddress = addr.ToString(); }, ep->LocalAddress());
|
|
|
|
result["addr"] = localAddress + ":" + std::to_string(port);
|
2021-04-06 12:25:46 +00:00
|
|
|
if (not srvProto.empty())
|
|
|
|
{
|
|
|
|
auto srvData =
|
|
|
|
dns::SRVData::fromTuple(std::make_tuple(srvProto, 1, 1, port, ""));
|
|
|
|
ep->PutSRVRecord(std::move(srvData));
|
|
|
|
}
|
2021-03-26 20:45:19 +00:00
|
|
|
reply(CreateJSONResponse(result));
|
|
|
|
}
|
|
|
|
else if (closeID)
|
|
|
|
{
|
|
|
|
quic->forget(closeID);
|
|
|
|
reply(CreateJSONResponse("OK"));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
})
|
|
|
|
.add_request_command(
|
|
|
|
"lookup_snode",
|
|
|
|
[&](oxenmq::Message& msg) {
|
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
|
|
|
if (not r->IsServiceNode())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("not supported"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
RouterID routerID;
|
|
|
|
if (auto itr = obj.find("snode"); itr != obj.end())
|
|
|
|
{
|
|
|
|
std::string remote = itr->get<std::string>();
|
|
|
|
if (not routerID.FromString(remote))
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("invalid remote: " + remote));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no remote provided"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::string endpoint = "default";
|
|
|
|
r->loop()->call([r, endpoint, routerID, reply]() {
|
|
|
|
auto ep = r->exitContext().GetExitEndpoint(endpoint);
|
|
|
|
if (ep == nullptr)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("cannot find local endpoint: " + endpoint));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ep->ObtainSNodeSession(routerID, [routerID, ep, reply](auto session) {
|
|
|
|
if (session and session->IsReady())
|
|
|
|
{
|
|
|
|
const auto ip = net::TruncateV6(ep->GetIPForIdent(PubKey{routerID}));
|
|
|
|
util::StatusObject status{{"ip", ip.ToString()}};
|
|
|
|
reply(CreateJSONResponse(status));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
reply(CreateJSONError("failed to obtain snode session"));
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
2020-06-24 13:24:07 +00:00
|
|
|
})
|
2020-11-28 12:15:55 +00:00
|
|
|
.add_request_command(
|
|
|
|
"endpoint",
|
2021-02-24 12:14:26 +00:00
|
|
|
[&](oxenmq::Message& msg) {
|
2020-11-28 12:15:55 +00:00
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
|
|
|
if (r->IsServiceNode())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("not supported"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::string endpoint = "default";
|
|
|
|
std::unordered_set<service::Address> kills;
|
|
|
|
{
|
|
|
|
const auto itr = obj.find("endpoint");
|
|
|
|
if (itr != obj.end())
|
|
|
|
endpoint = itr->get<std::string>();
|
|
|
|
}
|
|
|
|
{
|
|
|
|
const auto itr = obj.find("kill");
|
|
|
|
if (itr != obj.end())
|
|
|
|
{
|
|
|
|
if (itr->is_array())
|
|
|
|
{
|
|
|
|
for (auto kill_itr = itr->begin(); kill_itr != itr->end(); ++kill_itr)
|
|
|
|
{
|
|
|
|
if (kill_itr->is_string())
|
|
|
|
kills.emplace(kill_itr->get<std::string>());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (itr->is_string())
|
|
|
|
{
|
|
|
|
kills.emplace(itr->get<std::string>());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (kills.empty())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no action taken"));
|
|
|
|
return;
|
|
|
|
}
|
2021-03-02 07:02:59 +00:00
|
|
|
r->loop()->call([r, endpoint, kills, reply]() {
|
2020-11-28 12:15:55 +00:00
|
|
|
auto ep = r->hiddenServiceContext().GetEndpointByName(endpoint);
|
|
|
|
if (ep == nullptr)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no endpoint with name " + endpoint));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::size_t removed = 0;
|
|
|
|
for (auto kill : kills)
|
|
|
|
{
|
|
|
|
removed += ep->RemoveAllConvoTagsFor(std::move(kill));
|
|
|
|
}
|
|
|
|
reply(CreateJSONResponse(
|
|
|
|
"removed " + std::to_string(removed) + " flow" + (removed == 1 ? "" : "s")));
|
|
|
|
});
|
|
|
|
});
|
|
|
|
})
|
2020-08-27 12:43:53 +00:00
|
|
|
.add_request_command(
|
|
|
|
"exit",
|
2021-02-02 14:35:40 +00:00
|
|
|
[&](oxenmq::Message& msg) {
|
2020-08-27 12:43:53 +00:00
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
|
|
|
if (r->IsServiceNode())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("not supported"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::optional<service::Address> exit;
|
2020-10-21 09:39:01 +00:00
|
|
|
std::optional<std::string> lnsExit;
|
2020-08-27 12:43:53 +00:00
|
|
|
IPRange range;
|
|
|
|
bool map = true;
|
|
|
|
const auto exit_itr = obj.find("exit");
|
|
|
|
if (exit_itr != obj.end())
|
|
|
|
{
|
|
|
|
service::Address addr;
|
2020-10-21 09:39:01 +00:00
|
|
|
const auto exit_str = exit_itr->get<std::string>();
|
2021-05-13 10:09:52 +00:00
|
|
|
if (service::NameIsValid(exit_str) or exit_str == "null")
|
2020-10-21 09:39:01 +00:00
|
|
|
{
|
|
|
|
lnsExit = exit_str;
|
|
|
|
}
|
|
|
|
else if (not addr.FromString(exit_str))
|
2020-08-27 12:43:53 +00:00
|
|
|
{
|
|
|
|
reply(CreateJSONError("invalid exit address"));
|
|
|
|
return;
|
|
|
|
}
|
2020-10-21 09:39:01 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
exit = addr;
|
|
|
|
}
|
2020-08-27 12:43:53 +00:00
|
|
|
}
|
2020-06-24 13:24:07 +00:00
|
|
|
|
2020-08-27 12:43:53 +00:00
|
|
|
const auto unmap_itr = obj.find("unmap");
|
|
|
|
if (unmap_itr != obj.end() and unmap_itr->get<bool>())
|
|
|
|
{
|
|
|
|
map = false;
|
|
|
|
}
|
|
|
|
const auto range_itr = obj.find("range");
|
|
|
|
if (range_itr == obj.end())
|
|
|
|
{
|
|
|
|
range.FromString("0.0.0.0/0");
|
|
|
|
}
|
|
|
|
else if (not range.FromString(range_itr->get<std::string>()))
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("invalid ip range"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
std::optional<std::string> token;
|
|
|
|
const auto token_itr = obj.find("token");
|
|
|
|
if (token_itr != obj.end())
|
|
|
|
{
|
|
|
|
token = token_itr->get<std::string>();
|
|
|
|
}
|
2020-06-24 13:24:07 +00:00
|
|
|
|
2020-08-27 12:43:53 +00:00
|
|
|
std::string endpoint = "default";
|
|
|
|
const auto endpoint_itr = obj.find("endpoint");
|
|
|
|
if (endpoint_itr != obj.end())
|
|
|
|
{
|
|
|
|
endpoint = endpoint_itr->get<std::string>();
|
|
|
|
}
|
2021-03-02 07:02:59 +00:00
|
|
|
r->loop()->call([map, exit, lnsExit, range, token, endpoint, r, reply]() mutable {
|
2021-03-02 15:23:38 +00:00
|
|
|
auto ep = r->hiddenServiceContext().GetEndpointByName(endpoint);
|
|
|
|
if (ep == nullptr)
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no endpoint with name " + endpoint));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (map and (exit.has_value() or lnsExit.has_value()))
|
|
|
|
{
|
|
|
|
auto mapExit = [=](service::Address addr) mutable {
|
|
|
|
ep->MapExitRange(range, addr);
|
2021-05-13 11:30:53 +00:00
|
|
|
r->routePoker().Enable();
|
|
|
|
r->routePoker().Up();
|
2021-03-02 15:23:38 +00:00
|
|
|
bool shouldSendAuth = false;
|
|
|
|
if (token.has_value())
|
2020-10-21 09:39:01 +00:00
|
|
|
{
|
2021-03-02 15:23:38 +00:00
|
|
|
shouldSendAuth = true;
|
|
|
|
ep->SetAuthInfoForEndpoint(*exit, service::AuthInfo{*token});
|
2020-10-21 09:39:01 +00:00
|
|
|
}
|
2021-05-13 11:30:53 +00:00
|
|
|
auto onGoodResult = [r, reply](std::string reason) {
|
|
|
|
if (r->HasClientExit())
|
|
|
|
reply(CreateJSONResponse(reason));
|
|
|
|
else
|
|
|
|
reply(CreateJSONError("we dont have an exit?"));
|
|
|
|
};
|
|
|
|
auto onBadResult = [r, reply, ep, range](std::string reason) {
|
|
|
|
r->routePoker().Down();
|
|
|
|
ep->UnmapExitRange(range);
|
|
|
|
reply(CreateJSONError(reason));
|
|
|
|
};
|
|
|
|
if (addr.IsZero())
|
|
|
|
{
|
|
|
|
onGoodResult("added null exit");
|
|
|
|
return;
|
|
|
|
}
|
2021-06-08 13:01:12 +00:00
|
|
|
ep->MarkAddressOutbound(addr);
|
2021-03-02 15:23:38 +00:00
|
|
|
ep->EnsurePathToService(
|
|
|
|
addr,
|
2021-05-13 11:30:53 +00:00
|
|
|
[onBadResult, onGoodResult, shouldSendAuth, addrStr = addr.ToString()](
|
|
|
|
auto, service::OutboundContext* ctx) {
|
2021-03-02 15:23:38 +00:00
|
|
|
if (ctx == nullptr)
|
2020-10-21 09:39:01 +00:00
|
|
|
{
|
2021-05-13 11:30:53 +00:00
|
|
|
onBadResult("could not find exit");
|
2020-10-21 09:39:01 +00:00
|
|
|
return;
|
|
|
|
}
|
2021-03-02 15:23:38 +00:00
|
|
|
if (not shouldSendAuth)
|
2020-10-21 09:39:01 +00:00
|
|
|
{
|
2021-05-13 11:30:53 +00:00
|
|
|
onGoodResult("OK: connected to " + addrStr);
|
2020-10-21 09:39:01 +00:00
|
|
|
return;
|
|
|
|
}
|
2021-05-13 11:30:53 +00:00
|
|
|
ctx->AsyncSendAuth(
|
|
|
|
[onGoodResult, onBadResult](service::AuthResult result) {
|
|
|
|
// TODO: refactor this code. We are 5 lambdas deep here!
|
|
|
|
if (result.code != service::AuthResultCode::eAuthAccepted)
|
|
|
|
{
|
|
|
|
onBadResult(result.reason);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
onGoodResult(result.reason);
|
|
|
|
});
|
2021-03-02 15:23:38 +00:00
|
|
|
},
|
|
|
|
5s);
|
|
|
|
};
|
|
|
|
if (exit.has_value())
|
|
|
|
{
|
|
|
|
mapExit(*exit);
|
|
|
|
}
|
|
|
|
else if (lnsExit.has_value())
|
|
|
|
{
|
2021-04-05 19:53:47 +00:00
|
|
|
const std::string name = *lnsExit;
|
|
|
|
if (name == "null")
|
|
|
|
{
|
|
|
|
service::Address nullAddr{};
|
|
|
|
mapExit(nullAddr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ep->LookupNameAsync(name, [reply, mapExit](auto maybe) mutable {
|
2021-03-02 15:23:38 +00:00
|
|
|
if (not maybe.has_value())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("we could not find an exit with that name"));
|
|
|
|
return;
|
2020-10-21 09:39:01 +00:00
|
|
|
}
|
2021-03-19 20:06:03 +00:00
|
|
|
if (auto ptr = std::get_if<service::Address>(&*maybe))
|
|
|
|
{
|
2021-04-05 19:53:47 +00:00
|
|
|
if (ptr->IsZero())
|
|
|
|
reply(CreateJSONError("name does not exist"));
|
|
|
|
else
|
|
|
|
mapExit(*ptr);
|
2021-03-19 20:06:03 +00:00
|
|
|
}
|
|
|
|
else
|
2020-10-21 09:39:01 +00:00
|
|
|
{
|
2021-03-19 20:06:03 +00:00
|
|
|
reply(CreateJSONError("lns name resolved to a snode"));
|
2020-10-21 09:39:01 +00:00
|
|
|
}
|
2021-03-02 15:23:38 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
reply(
|
|
|
|
CreateJSONError("WTF inconsistent request, no exit address or lns "
|
|
|
|
"name provided?"));
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
else if (map and not exit.has_value())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError("no exit address provided"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
else if (not map)
|
|
|
|
{
|
|
|
|
r->routePoker().Down();
|
|
|
|
ep->UnmapExitRange(range);
|
|
|
|
}
|
|
|
|
reply(CreateJSONResponse("OK"));
|
|
|
|
});
|
2020-08-27 12:43:53 +00:00
|
|
|
});
|
|
|
|
})
|
2021-07-29 20:40:25 +00:00
|
|
|
.add_request_command(
|
|
|
|
"dns_query",
|
|
|
|
[&](oxenmq::Message& msg) {
|
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
|
|
|
std::string endpoint{"default"};
|
|
|
|
if (const auto itr = obj.find("endpoint"); itr != obj.end())
|
|
|
|
{
|
|
|
|
endpoint = itr->get<std::string>();
|
|
|
|
}
|
|
|
|
std::string qname{};
|
|
|
|
dns::QType_t qtype = dns::qTypeA;
|
|
|
|
if (const auto itr = obj.find("qname"); itr != obj.end())
|
|
|
|
{
|
|
|
|
qname = itr->get<std::string>();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (const auto itr = obj.find("qtype"); itr != obj.end())
|
|
|
|
{
|
|
|
|
qtype = itr->get<dns::QType_t>();
|
|
|
|
}
|
|
|
|
|
|
|
|
dns::Message msg{dns::Question{qname, qtype}};
|
|
|
|
|
|
|
|
if (auto ep_ptr = (GetEndpointByName(r, endpoint)))
|
|
|
|
{
|
|
|
|
if (auto ep = reinterpret_cast<dns::IQueryHandler*>(ep_ptr.get()))
|
|
|
|
{
|
|
|
|
if (ep->ShouldHookDNSMessage(msg))
|
|
|
|
{
|
|
|
|
ep->HandleHookedDNSMessage(std::move(msg), [reply](dns::Message msg) {
|
|
|
|
reply(CreateJSONResponse(msg.ToJSON()));
|
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
reply(CreateJSONError("dns query not accepted by endpoint"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
reply(CreateJSONError("no such endpoint for dns query"));
|
|
|
|
});
|
|
|
|
})
|
2021-02-02 14:35:40 +00:00
|
|
|
.add_request_command("config", [&](oxenmq::Message& msg) {
|
2020-08-27 12:43:53 +00:00
|
|
|
HandleJSONRequest(msg, [r = m_Router](nlohmann::json obj, ReplyFunction_t reply) {
|
2020-06-24 13:24:07 +00:00
|
|
|
{
|
2020-08-27 12:43:53 +00:00
|
|
|
const auto itr = obj.find("override");
|
|
|
|
if (itr != obj.end())
|
2020-06-24 13:24:07 +00:00
|
|
|
{
|
2020-08-27 12:43:53 +00:00
|
|
|
if (not itr->is_object())
|
2020-08-21 15:07:37 +00:00
|
|
|
{
|
2020-08-27 12:43:53 +00:00
|
|
|
reply(CreateJSONError(stringify("override is not an object")));
|
2020-08-21 15:07:37 +00:00
|
|
|
return;
|
|
|
|
}
|
2020-08-27 12:43:53 +00:00
|
|
|
for (const auto& [section, value] : itr->items())
|
2020-06-24 13:24:07 +00:00
|
|
|
{
|
2020-08-27 12:43:53 +00:00
|
|
|
if (not value.is_object())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError(
|
|
|
|
stringify("failed to set [", section, "] section is not an object")));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
for (const auto& [key, value] : value.items())
|
|
|
|
{
|
|
|
|
if (not value.is_string())
|
|
|
|
{
|
|
|
|
reply(CreateJSONError(stringify(
|
|
|
|
"failed to set [", section, "]:", key, " value is not a string")));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
r->GetConfig()->Override(section, key, value.get<std::string>());
|
|
|
|
}
|
2020-06-24 13:24:07 +00:00
|
|
|
}
|
|
|
|
}
|
2020-08-27 12:43:53 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
const auto itr = obj.find("reload");
|
|
|
|
if (itr != obj.end() and itr->get<bool>())
|
2020-06-24 13:24:07 +00:00
|
|
|
{
|
2020-08-27 12:43:53 +00:00
|
|
|
r->QueueDiskIO([conf = r->GetConfig()]() { conf->Save(); });
|
2020-06-24 13:24:07 +00:00
|
|
|
}
|
2020-08-27 12:43:53 +00:00
|
|
|
}
|
|
|
|
reply(CreateJSONResponse("OK"));
|
2020-05-23 19:37:47 +00:00
|
|
|
});
|
|
|
|
});
|
2020-05-21 14:09:45 +00:00
|
|
|
}
|
|
|
|
} // namespace llarp::rpc
|