mirror of
https://github.com/oxen-io/lokinet.git
synced 2024-11-11 07:10:36 +00:00
127 lines
3.5 KiB
C++
127 lines
3.5 KiB
C++
#include "endpoint_rpc.hpp"
|
|
|
|
#include <llarp/service/endpoint.hpp>
|
|
|
|
namespace llarp::rpc
|
|
{
|
|
EndpointAuthRPC::EndpointAuthRPC(
|
|
std::string url,
|
|
std::string method,
|
|
Whitelist_t whitelist_addrs,
|
|
std::unordered_set<std::string> whitelist_tokens,
|
|
LMQ_ptr lmq,
|
|
Endpoint_ptr endpoint)
|
|
: m_AuthURL{std::move(url)}
|
|
, m_AuthMethod{std::move(method)}
|
|
, m_AuthWhitelist{std::move(whitelist_addrs)}
|
|
, m_AuthStaticTokens{std::move(whitelist_tokens)}
|
|
, m_LMQ{std::move(lmq)}
|
|
, m_Endpoint{std::move(endpoint)}
|
|
{}
|
|
|
|
void
|
|
EndpointAuthRPC::Start()
|
|
{
|
|
if (m_AuthURL.empty() or m_AuthMethod.empty())
|
|
return;
|
|
m_LMQ->connect_remote(
|
|
oxenmq::address{m_AuthURL},
|
|
[self = shared_from_this()](oxenmq::ConnectionID c) {
|
|
self->m_Conn = std::move(c);
|
|
LogInfo("connected to endpoint auth server");
|
|
},
|
|
[self = shared_from_this()](oxenmq::ConnectionID, std::string_view fail) {
|
|
LogWarn("failed to connect to endpoint auth server: ", fail);
|
|
self->m_Endpoint->Loop()->call_later(1s, [self] { self->Start(); });
|
|
});
|
|
}
|
|
|
|
bool
|
|
EndpointAuthRPC::auth_async_pending(service::ConvoTag tag) const
|
|
{
|
|
return m_PendingAuths.count(tag) > 0;
|
|
}
|
|
|
|
void
|
|
EndpointAuthRPC::authenticate_async(
|
|
std::shared_ptr<llarp::service::ProtocolMessage> msg,
|
|
std::function<void(std::string, bool)> hook)
|
|
{
|
|
service::ConvoTag tag = msg->tag;
|
|
m_PendingAuths.insert(tag);
|
|
const auto from = msg->sender.Addr();
|
|
auto reply = m_Endpoint->Loop()->make_caller([this, tag, hook](std::string code, bool success) {
|
|
m_PendingAuths.erase(tag);
|
|
hook(code, success);
|
|
});
|
|
if (m_AuthWhitelist.count(from))
|
|
{
|
|
// explicitly whitelisted source
|
|
reply("explicitly whitelisted", true);
|
|
return;
|
|
}
|
|
|
|
if (msg->proto != llarp::service::ProtocolType::Auth)
|
|
{
|
|
// not an auth message, reject
|
|
reply("protocol error", false);
|
|
return;
|
|
}
|
|
|
|
std::string payload{(char*)msg->payload.data(), msg->payload.size()};
|
|
|
|
if (m_AuthStaticTokens.count(payload))
|
|
{
|
|
reply("explicitly whitelisted", true);
|
|
return;
|
|
}
|
|
|
|
if (not m_Conn.has_value())
|
|
{
|
|
if (m_AuthStaticTokens.empty())
|
|
{
|
|
// we don't have a connection to the backend so it's failed
|
|
reply("remote has no connection to auth backend", false);
|
|
}
|
|
else
|
|
{
|
|
// static auth mode
|
|
reply("access not permitted", true);
|
|
}
|
|
return;
|
|
}
|
|
|
|
const auto authinfo = msg->EncodeAuthInfo();
|
|
std::string_view metainfo{authinfo.data(), authinfo.size()};
|
|
// call method with 2 parameters: metainfo and userdata
|
|
m_LMQ->request(
|
|
*m_Conn,
|
|
m_AuthMethod,
|
|
[self = shared_from_this(), reply = std::move(reply)](
|
|
bool success, std::vector<std::string> data) {
|
|
service::AuthResult result{service::AuthCode::FAILED, "no reason given"};
|
|
|
|
if (success and not data.empty())
|
|
{
|
|
if (const auto maybe = service::parse_auth_code(data[0]))
|
|
{
|
|
result.code = *maybe;
|
|
}
|
|
if (result.code == service::AuthCode::ACCEPTED)
|
|
{
|
|
result.reason = "OK";
|
|
}
|
|
if (data.size() > 1)
|
|
{
|
|
result.reason = data[1];
|
|
}
|
|
}
|
|
|
|
reply(result.reason, success);
|
|
},
|
|
metainfo,
|
|
payload);
|
|
}
|
|
|
|
} // namespace llarp::rpc
|