blob: fb6401457eb09739624034461d711fd88cab5475 [file] [log] [blame]
Ed Tanous7045c8d2017-04-03 10:04:37 -07001#pragma once
Ed Tanous75312982021-02-11 14:26:02 -08002#include "bmcweb_config.h"
Adriana Kobylak0e1cf262019-12-05 13:57:57 -06003
James Feist3909dc82020-04-03 10:58:55 -07004#include "authorization.hpp"
Ed Tanous04e438c2020-10-03 08:06:26 -07005#include "http_response.hpp"
Ed Tanous1abe55e2018-09-05 08:30:59 -07006#include "http_utility.hpp"
Ed Tanous04e438c2020-10-03 08:06:26 -07007#include "logging.hpp"
8#include "timer_queue.hpp"
9#include "utility.hpp"
Ed Tanous1abe55e2018-09-05 08:30:59 -070010
Ed Tanouse0d918b2018-03-27 17:41:04 -070011#include <boost/algorithm/string.hpp>
Ed Tanous257f5792018-03-17 14:40:09 -070012#include <boost/algorithm/string/predicate.hpp>
Ed Tanous8f626352018-12-19 14:51:54 -080013#include <boost/asio/io_context.hpp>
Ed Tanous3112a142018-11-29 15:45:10 -080014#include <boost/asio/ip/tcp.hpp>
Ed Tanousd43cd0c2020-09-30 20:46:53 -070015#include <boost/asio/ssl/stream.hpp>
Ed Tanous3112a142018-11-29 15:45:10 -080016#include <boost/beast/core/flat_static_buffer.hpp>
Manojkiran Eda44250442020-06-16 12:51:38 +053017#include <boost/beast/ssl/ssl_stream.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050018#include <boost/beast/websocket.hpp>
Ed Tanous57fce802019-05-21 13:00:34 -070019#include <json_html_serializer.hpp>
Ed Tanous52cc1122020-07-18 13:51:21 -070020#include <security_headers.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050021#include <ssl_key_handler.hpp>
22
Manojkiran Eda44250442020-06-16 12:51:38 +053023#include <atomic>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050024#include <chrono>
25#include <vector>
26
Ed Tanous1abe55e2018-09-05 08:30:59 -070027namespace crow
28{
Ed Tanous257f5792018-03-17 14:40:09 -070029
Ed Tanous1abe55e2018-09-05 08:30:59 -070030inline void prettyPrintJson(crow::Response& res)
31{
Ed Tanous57fce802019-05-21 13:00:34 -070032 json_html_util::dumpHtml(res.body(), res.jsonValue);
33
Ed Tanous93ef5802019-01-03 10:15:41 -080034 res.addHeader("Content-Type", "text/html;charset=UTF-8");
Ed Tanous257f5792018-03-17 14:40:09 -070035}
36
Ed Tanous55c7b7a2018-05-22 15:27:24 -070037#ifdef BMCWEB_ENABLE_DEBUG
Ed Tanouse0d918b2018-03-27 17:41:04 -070038static std::atomic<int> connectionCount;
Ed Tanous7045c8d2017-04-03 10:04:37 -070039#endif
Jennifer Leeacb7cfb2018-06-07 16:08:15 -070040
Ed Tanous0260d9d2021-02-07 19:31:07 +000041// request body limit size set by the bmcwebHttpReqBodyLimitMb option
Adriana Kobylak0e1cf262019-12-05 13:57:57 -060042constexpr unsigned int httpReqBodyLimit =
Ed Tanous0260d9d2021-02-07 19:31:07 +000043 1024 * 1024 * bmcwebHttpReqBodyLimitMb;
Jennifer Leeacb7cfb2018-06-07 16:08:15 -070044
James Feist3909dc82020-04-03 10:58:55 -070045constexpr uint64_t loggedOutPostBodyLimit = 4096;
46
47constexpr uint32_t httpHeaderLimit = 8192;
48
49// drop all connections after 1 minute, this time limit was chosen
50// arbitrarily and can be adjusted later if needed
51static constexpr const size_t loggedInAttempts =
52 (60 / timerQueueTimeoutSeconds);
53
54static constexpr const size_t loggedOutAttempts =
55 (15 / timerQueueTimeoutSeconds);
56
Ed Tanous52cc1122020-07-18 13:51:21 -070057template <typename Adaptor, typename Handler>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050058class Connection :
Ed Tanous52cc1122020-07-18 13:51:21 -070059 public std::enable_shared_from_this<Connection<Adaptor, Handler>>
Ed Tanous1abe55e2018-09-05 08:30:59 -070060{
61 public:
Ed Tanouse7d1a1c2020-09-28 09:36:35 -070062 Connection(Handler* handlerIn,
Ed Tanous81ce6092020-12-17 16:54:55 +000063 std::function<std::string()>& getCachedDateStrF,
Ed Tanous271584a2019-07-09 16:24:22 -070064 detail::TimerQueue& timerQueueIn, Adaptor adaptorIn) :
Ed Tanousceac6f72018-12-02 11:58:47 -080065 adaptor(std::move(adaptorIn)),
Ed Tanous81ce6092020-12-17 16:54:55 +000066 handler(handlerIn), getCachedDateStr(getCachedDateStrF),
Ed Tanouse7d1a1c2020-09-28 09:36:35 -070067 timerQueue(timerQueueIn)
Ed Tanous1abe55e2018-09-05 08:30:59 -070068 {
69 parser.emplace(std::piecewise_construct, std::make_tuple());
Ed Tanous1abe55e2018-09-05 08:30:59 -070070 parser->body_limit(httpReqBodyLimit);
James Feist3909dc82020-04-03 10:58:55 -070071 parser->header_limit(httpHeaderLimit);
Ed Tanous1abe55e2018-09-05 08:30:59 -070072 req.emplace(parser->get());
Kowalski, Kamil55e43f62019-07-10 13:12:57 +020073
74#ifdef BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
Jonathan Doman83deb7d2020-11-16 17:00:22 -080075 std::error_code error;
76 std::filesystem::path caPath(ensuressl::trustStorePath);
77 auto caAvailable = !std::filesystem::is_empty(caPath, error);
78 caAvailable = caAvailable && !error;
Ed Tanous2c70f802020-09-28 14:29:23 -070079 if (caAvailable && persistent_data::SessionStore::getInstance()
80 .getAuthMethodsConfig()
81 .tls)
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +010082 {
83 adaptor.set_verify_mode(boost::asio::ssl::verify_peer);
Ed Tanouse7d1a1c2020-09-28 09:36:35 -070084 std::string id = "bmcweb";
85 int ret = SSL_set_session_id_context(
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +010086 adaptor.native_handle(),
Ed Tanouse7d1a1c2020-09-28 09:36:35 -070087 reinterpret_cast<const unsigned char*>(id.c_str()),
88 static_cast<unsigned int>(id.length()));
89 if (ret == 0)
90 {
91 BMCWEB_LOG_ERROR << this << " failed to set SSL id";
92 }
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +010093 }
94
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +010095 adaptor.set_verify_callback([this](
96 bool preverified,
97 boost::asio::ssl::verify_context& ctx) {
98 // do nothing if TLS is disabled
Ed Tanous52cc1122020-07-18 13:51:21 -070099 if (!persistent_data::SessionStore::getInstance()
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100100 .getAuthMethodsConfig()
101 .tls)
102 {
103 BMCWEB_LOG_DEBUG << this << " TLS auth_config is disabled";
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200104 return true;
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100105 }
106
107 // We always return true to allow full auth flow
108 if (!preverified)
109 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100110 BMCWEB_LOG_DEBUG << this << " TLS preverification failed.";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100111 return true;
112 }
113
114 X509_STORE_CTX* cts = ctx.native_handle();
115 if (cts == nullptr)
116 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100117 BMCWEB_LOG_DEBUG << this << " Cannot get native TLS handle.";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100118 return true;
119 }
120
121 // Get certificate
122 X509* peerCert =
123 X509_STORE_CTX_get_current_cert(ctx.native_handle());
124 if (peerCert == nullptr)
125 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100126 BMCWEB_LOG_DEBUG << this
127 << " Cannot get current TLS certificate.";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100128 return true;
129 }
130
131 // Check if certificate is OK
132 int error = X509_STORE_CTX_get_error(cts);
133 if (error != X509_V_OK)
134 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100135 BMCWEB_LOG_INFO << this << " Last TLS error is: " << error;
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100136 return true;
137 }
138 // Check that we have reached final certificate in chain
139 int32_t depth = X509_STORE_CTX_get_error_depth(cts);
140 if (depth != 0)
141
142 {
143 BMCWEB_LOG_DEBUG
144 << this << " Certificate verification in progress (depth "
145 << depth << "), waiting to reach final depth";
146 return true;
147 }
148
149 BMCWEB_LOG_DEBUG << this
150 << " Certificate verification of final depth";
151
152 // Verify KeyUsage
153 bool isKeyUsageDigitalSignature = false;
154 bool isKeyUsageKeyAgreement = false;
155
156 ASN1_BIT_STRING* usage = static_cast<ASN1_BIT_STRING*>(
Ed Tanous23a21a12020-07-25 04:45:05 +0000157 X509_get_ext_d2i(peerCert, NID_key_usage, nullptr, nullptr));
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100158
159 if (usage == nullptr)
160 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100161 BMCWEB_LOG_DEBUG << this << " TLS usage is null";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100162 return true;
163 }
164
165 for (int i = 0; i < usage->length; i++)
166 {
167 if (KU_DIGITAL_SIGNATURE & usage->data[i])
168 {
169 isKeyUsageDigitalSignature = true;
170 }
171 if (KU_KEY_AGREEMENT & usage->data[i])
172 {
173 isKeyUsageKeyAgreement = true;
174 }
175 }
Vernon Maueryb9378302021-06-16 14:06:57 -0700176 ASN1_BIT_STRING_free(usage);
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100177
178 if (!isKeyUsageDigitalSignature || !isKeyUsageKeyAgreement)
179 {
180 BMCWEB_LOG_DEBUG << this
181 << " Certificate ExtendedKeyUsage does "
182 "not allow provided certificate to "
183 "be used for user authentication";
184 return true;
185 }
186
187 // Determine that ExtendedKeyUsage includes Client Auth
188
Ed Tanous23a21a12020-07-25 04:45:05 +0000189 stack_st_ASN1_OBJECT* extUsage =
190 static_cast<stack_st_ASN1_OBJECT*>(X509_get_ext_d2i(
191 peerCert, NID_ext_key_usage, nullptr, nullptr));
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100192
193 if (extUsage == nullptr)
194 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100195 BMCWEB_LOG_DEBUG << this << " TLS extUsage is null";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100196 return true;
197 }
198
199 bool isExKeyUsageClientAuth = false;
200 for (int i = 0; i < sk_ASN1_OBJECT_num(extUsage); i++)
201 {
202 if (NID_client_auth ==
203 OBJ_obj2nid(sk_ASN1_OBJECT_value(extUsage, i)))
204 {
205 isExKeyUsageClientAuth = true;
206 break;
207 }
208 }
Zbigniew Kurzynski09d02f82020-03-30 13:41:42 +0200209 sk_ASN1_OBJECT_free(extUsage);
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100210
211 // Certificate has to have proper key usages set
212 if (!isExKeyUsageClientAuth)
213 {
214 BMCWEB_LOG_DEBUG << this
215 << " Certificate ExtendedKeyUsage does "
216 "not allow provided certificate to "
217 "be used for user authentication";
218 return true;
219 }
220 std::string sslUser;
221 // Extract username contained in CommonName
222 sslUser.resize(256, '\0');
223
224 int status = X509_NAME_get_text_by_NID(
225 X509_get_subject_name(peerCert), NID_commonName, sslUser.data(),
226 static_cast<int>(sslUser.size()));
227
228 if (status == -1)
229 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100230 BMCWEB_LOG_DEBUG
231 << this << " TLS cannot get username to create session";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100232 return true;
233 }
234
235 size_t lastChar = sslUser.find('\0');
236 if (lastChar == std::string::npos || lastChar == 0)
237 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100238 BMCWEB_LOG_DEBUG << this << " Invalid TLS user name";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100239 return true;
240 }
241 sslUser.resize(lastChar);
Sunitha Harishd3239222021-02-24 15:33:29 +0530242 std::string unsupportedClientId = "";
243 session = persistent_data::SessionStore::getInstance()
244 .generateUserSession(
245 sslUser, req->ipAddress.to_string(),
246 unsupportedClientId,
247 persistent_data::PersistenceType::TIMEOUT);
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100248 if (auto sp = session.lock())
249 {
250 BMCWEB_LOG_DEBUG << this
251 << " Generating TLS session: " << sp->uniqueId;
252 }
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100253 return true;
254 });
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200255#endif // BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
256
Ed Tanous55c7b7a2018-05-22 15:27:24 -0700257#ifdef BMCWEB_ENABLE_DEBUG
Ed Tanous1abe55e2018-09-05 08:30:59 -0700258 connectionCount++;
259 BMCWEB_LOG_DEBUG << this << " Connection open, total "
260 << connectionCount;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700261#endif
Ed Tanous1abe55e2018-09-05 08:30:59 -0700262 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700263
Ed Tanous1abe55e2018-09-05 08:30:59 -0700264 ~Connection()
265 {
266 res.completeRequestHandler = nullptr;
267 cancelDeadlineTimer();
Ed Tanous55c7b7a2018-05-22 15:27:24 -0700268#ifdef BMCWEB_ENABLE_DEBUG
Ed Tanous1abe55e2018-09-05 08:30:59 -0700269 connectionCount--;
270 BMCWEB_LOG_DEBUG << this << " Connection closed, total "
271 << connectionCount;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700272#endif
Ed Tanous7045c8d2017-04-03 10:04:37 -0700273 }
274
Ed Tanousceac6f72018-12-02 11:58:47 -0800275 Adaptor& socket()
Ed Tanous1abe55e2018-09-05 08:30:59 -0700276 {
Ed Tanousceac6f72018-12-02 11:58:47 -0800277 return adaptor;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700278 }
279
Ed Tanous1abe55e2018-09-05 08:30:59 -0700280 void start()
281 {
Ed Tanous7045c8d2017-04-03 10:04:37 -0700282
James Feist3909dc82020-04-03 10:58:55 -0700283 startDeadline(0);
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500284
Ed Tanousceac6f72018-12-02 11:58:47 -0800285 // TODO(ed) Abstract this to a more clever class with the idea of an
286 // asynchronous "start"
287 if constexpr (std::is_same_v<Adaptor,
288 boost::beast::ssl_stream<
289 boost::asio::ip::tcp::socket>>)
290 {
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000291 adaptor.async_handshake(boost::asio::ssl::stream_base::server,
292 [this, self(shared_from_this())](
293 const boost::system::error_code& ec) {
294 if (ec)
295 {
296 return;
297 }
298 doReadHeaders();
299 });
Ed Tanousceac6f72018-12-02 11:58:47 -0800300 }
301 else
302 {
303 doReadHeaders();
304 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700305 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700306
Ed Tanous1abe55e2018-09-05 08:30:59 -0700307 void handle()
308 {
309 cancelDeadlineTimer();
James Feist3909dc82020-04-03 10:58:55 -0700310
Ivan Mikhaylovf65b0be2021-04-19 10:05:30 +0000311 // Fetch the client IP address
312 readClientIp();
313
Ed Tanous1abe55e2018-09-05 08:30:59 -0700314 bool isInvalidRequest = false;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700315
Ed Tanous1abe55e2018-09-05 08:30:59 -0700316 // Check for HTTP version 1.1.
317 if (req->version() == 11)
318 {
319 if (req->getHeaderValue(boost::beast::http::field::host).empty())
320 {
321 isInvalidRequest = true;
Ed Tanousde5c9f32019-03-26 09:17:55 -0700322 res.result(boost::beast::http::status::bad_request);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700323 }
324 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700325
Ed Tanouse278c182019-03-13 16:23:37 -0700326 BMCWEB_LOG_INFO << "Request: "
327 << " " << this << " HTTP/" << req->version() / 10 << "."
328 << req->version() % 10 << ' ' << req->methodString()
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500329 << " " << req->target() << " " << req->ipAddress;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700330
Ed Tanous1abe55e2018-09-05 08:30:59 -0700331 needToCallAfterHandlers = false;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700332
Ed Tanous1abe55e2018-09-05 08:30:59 -0700333 if (!isInvalidRequest)
334 {
335 res.completeRequestHandler = [] {};
Ed Tanouse278c182019-03-13 16:23:37 -0700336 res.isAliveHelper = [this]() -> bool { return isAlive(); };
Ed Tanous7045c8d2017-04-03 10:04:37 -0700337
Ed Tanouse278c182019-03-13 16:23:37 -0700338 req->ioService = static_cast<decltype(req->ioService)>(
339 &adaptor.get_executor().context());
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200340
Ed Tanous1abe55e2018-09-05 08:30:59 -0700341 if (!res.completed)
342 {
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000343 needToCallAfterHandlers = true;
344 res.completeRequestHandler = [self(shared_from_this())] {
Wludzik, Jozefc7d34222020-10-19 12:59:41 +0200345 boost::asio::post(self->adaptor.get_executor(),
346 [self] { self->completeRequest(); });
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000347 };
Ed Tanous1abe55e2018-09-05 08:30:59 -0700348 if (req->isUpgrade() &&
349 boost::iequals(
350 req->getHeaderValue(boost::beast::http::field::upgrade),
351 "websocket"))
352 {
353 handler->handleUpgrade(*req, res, std::move(adaptor));
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000354 // delete lambda with self shared_ptr
355 // to enable connection destruction
356 res.completeRequestHandler = nullptr;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700357 return;
358 }
zhanghch058d1b46d2021-04-01 11:18:24 +0800359 auto asyncResp = std::make_shared<bmcweb::AsyncResp>(res);
360 handler->handle(*req, asyncResp);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700361 }
362 else
363 {
364 completeRequest();
365 }
366 }
367 else
368 {
369 completeRequest();
370 }
371 }
Ed Tanouse0d918b2018-03-27 17:41:04 -0700372
Ed Tanouse278c182019-03-13 16:23:37 -0700373 bool isAlive()
374 {
375
376 if constexpr (std::is_same_v<Adaptor,
377 boost::beast::ssl_stream<
378 boost::asio::ip::tcp::socket>>)
379 {
380 return adaptor.next_layer().is_open();
381 }
382 else
383 {
384 return adaptor.is_open();
385 }
386 }
387 void close()
388 {
Ed Tanouse278c182019-03-13 16:23:37 -0700389 if constexpr (std::is_same_v<Adaptor,
390 boost::beast::ssl_stream<
391 boost::asio::ip::tcp::socket>>)
392 {
393 adaptor.next_layer().close();
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200394#ifdef BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
395 if (auto sp = session.lock())
396 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100397 BMCWEB_LOG_DEBUG << this
398 << " Removing TLS session: " << sp->uniqueId;
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200399 persistent_data::SessionStore::getInstance().removeSession(sp);
400 }
401#endif // BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
Ed Tanouse278c182019-03-13 16:23:37 -0700402 }
403 else
404 {
405 adaptor.close();
406 }
407 }
408
Ed Tanous1abe55e2018-09-05 08:30:59 -0700409 void completeRequest()
410 {
411 BMCWEB_LOG_INFO << "Response: " << this << ' ' << req->url << ' '
412 << res.resultInt() << " keepalive=" << req->keepAlive();
Ed Tanous7045c8d2017-04-03 10:04:37 -0700413
Ed Tanous0260d9d2021-02-07 19:31:07 +0000414 addSecurityHeaders(*req, res);
Ed Tanous52cc1122020-07-18 13:51:21 -0700415
Ed Tanous1abe55e2018-09-05 08:30:59 -0700416 if (needToCallAfterHandlers)
417 {
James Feist3909dc82020-04-03 10:58:55 -0700418 crow::authorization::cleanupTempSession(*req);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700419 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700420
Ed Tanouse278c182019-03-13 16:23:37 -0700421 if (!isAlive())
Ed Tanous1abe55e2018-09-05 08:30:59 -0700422 {
423 // BMCWEB_LOG_DEBUG << this << " delete (socket is closed) " <<
424 // isReading
425 // << ' ' << isWriting;
426 // delete this;
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000427
428 // delete lambda with self shared_ptr
429 // to enable connection destruction
430 res.completeRequestHandler = nullptr;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700431 return;
432 }
433 if (res.body().empty() && !res.jsonValue.empty())
434 {
435 if (http_helpers::requestPrefersHtml(*req))
436 {
437 prettyPrintJson(res);
438 }
439 else
440 {
441 res.jsonMode();
Ed Tanous71f52d92021-02-19 08:51:17 -0800442 res.body() = res.jsonValue.dump(
443 2, ' ', true, nlohmann::json::error_handler_t::replace);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700444 }
445 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700446
Ed Tanous1abe55e2018-09-05 08:30:59 -0700447 if (res.resultInt() >= 400 && res.body().empty())
448 {
449 res.body() = std::string(res.reason());
450 }
Ed Tanous6295bec2019-09-03 10:11:01 -0700451
452 if (res.result() == boost::beast::http::status::no_content)
453 {
454 // Boost beast throws if content is provided on a no-content
455 // response. Ideally, this would never happen, but in the case that
456 // it does, we don't want to throw.
457 BMCWEB_LOG_CRITICAL
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100458 << this << " Response content provided but code was no-content";
Ed Tanous6295bec2019-09-03 10:11:01 -0700459 res.body().clear();
460 }
461
Ed Tanous1abe55e2018-09-05 08:30:59 -0700462 res.addHeader(boost::beast::http::field::date, getCachedDateStr());
463
464 res.keepAlive(req->keepAlive());
465
466 doWrite();
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000467
468 // delete lambda with self shared_ptr
469 // to enable connection destruction
470 res.completeRequestHandler = nullptr;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700471 }
472
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500473 void readClientIp()
474 {
475 boost::system::error_code ec;
476 BMCWEB_LOG_DEBUG << "Fetch the client IP address";
477 boost::asio::ip::tcp::endpoint endpoint =
478 boost::beast::get_lowest_layer(adaptor).remote_endpoint(ec);
479
480 if (ec)
481 {
482 // If remote endpoint fails keep going. "ClientOriginIPAddress"
483 // will be empty.
484 BMCWEB_LOG_ERROR << "Failed to get the client's IP Address. ec : "
485 << ec;
486 }
487 else
488 {
489 req->ipAddress = endpoint.address();
490 }
491 }
492
Ed Tanous1abe55e2018-09-05 08:30:59 -0700493 private:
494 void doReadHeaders()
495 {
Ed Tanous1abe55e2018-09-05 08:30:59 -0700496 BMCWEB_LOG_DEBUG << this << " doReadHeaders";
497
498 // Clean up any previous Connection.
499 boost::beast::http::async_read_header(
Ed Tanousceac6f72018-12-02 11:58:47 -0800500 adaptor, buffer, *parser,
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000501 [this,
502 self(shared_from_this())](const boost::system::error_code& ec,
Ed Tanous81ce6092020-12-17 16:54:55 +0000503 std::size_t bytesTransferred) {
Ed Tanous1abe55e2018-09-05 08:30:59 -0700504 BMCWEB_LOG_ERROR << this << " async_read_header "
Ed Tanous81ce6092020-12-17 16:54:55 +0000505 << bytesTransferred << " Bytes";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700506 bool errorWhileReading = false;
507 if (ec)
508 {
509 errorWhileReading = true;
510 BMCWEB_LOG_ERROR
511 << this << " Error while reading: " << ec.message();
512 }
513 else
514 {
515 // if the adaptor isn't open anymore, and wasn't handed to a
516 // websocket, treat as an error
Ed Tanouse278c182019-03-13 16:23:37 -0700517 if (!isAlive() && !req->isUpgrade())
Ed Tanous1abe55e2018-09-05 08:30:59 -0700518 {
519 errorWhileReading = true;
520 }
521 }
522
James Feist3909dc82020-04-03 10:58:55 -0700523 cancelDeadlineTimer();
524
Ed Tanous1abe55e2018-09-05 08:30:59 -0700525 if (errorWhileReading)
526 {
Ed Tanouse278c182019-03-13 16:23:37 -0700527 close();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700528 BMCWEB_LOG_DEBUG << this << " from read(1)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700529 return;
530 }
531
James Feist3909dc82020-04-03 10:58:55 -0700532 if (!req)
533 {
534 close();
535 return;
536 }
537
Ed Tanousdc7a7932020-08-17 15:04:58 -0700538 // Note, despite the bmcweb coding policy on use of exceptions
539 // for error handling, this one particular use of exceptions is
540 // deemed acceptible, as it solved a significant error handling
541 // problem that resulted in seg faults, the exact thing that the
542 // exceptions rule is trying to avoid. If at some point,
543 // boost::urls makes the parser object public (or we port it
544 // into bmcweb locally) this will be replaced with
545 // parser::parse, which returns a status code
James Feist5a7e8772020-07-22 09:08:38 -0700546
Ed Tanousdc7a7932020-08-17 15:04:58 -0700547 try
548 {
549 req->urlView = boost::urls::url_view(req->target());
550 req->url = req->urlView.encoded_path();
551 }
Ed Tanous92ccb882020-08-18 10:36:33 -0700552 catch (std::exception& p)
Ed Tanousdc7a7932020-08-17 15:04:58 -0700553 {
Ed Tanous3bcc0152020-08-25 07:47:29 -0700554 BMCWEB_LOG_ERROR << p.what();
Ed Tanousdc7a7932020-08-17 15:04:58 -0700555 }
Ed Tanous92ccb882020-08-18 10:36:33 -0700556
James Feist6964c982020-07-28 16:10:23 -0700557 crow::authorization::authenticate(*req, res, session);
James Feist3909dc82020-04-03 10:58:55 -0700558
559 bool loggedIn = req && req->session;
560 if (loggedIn)
561 {
562 startDeadline(loggedInAttempts);
563 BMCWEB_LOG_DEBUG << "Starting slow deadline";
564
James Feist5a7e8772020-07-22 09:08:38 -0700565 req->urlParams = req->urlView.params();
566
567#ifdef BMCWEB_ENABLE_DEBUG
568 std::string paramList = "";
569 for (const auto param : req->urlParams)
570 {
571 paramList += param->key() + " " + param->value() + " ";
572 }
573 BMCWEB_LOG_DEBUG << "QueryParams: " << paramList;
574#endif
James Feist3909dc82020-04-03 10:58:55 -0700575 }
576 else
577 {
578 const boost::optional<uint64_t> contentLength =
579 parser->content_length();
580 if (contentLength &&
581 *contentLength > loggedOutPostBodyLimit)
582 {
583 BMCWEB_LOG_DEBUG << "Content length greater than limit "
584 << *contentLength;
585 close();
586 return;
587 }
588
589 startDeadline(loggedOutAttempts);
590 BMCWEB_LOG_DEBUG << "Starting quick deadline";
591 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700592 doRead();
593 });
594 }
595
596 void doRead()
597 {
Ed Tanous1abe55e2018-09-05 08:30:59 -0700598 BMCWEB_LOG_DEBUG << this << " doRead";
599
600 boost::beast::http::async_read(
Ed Tanousceac6f72018-12-02 11:58:47 -0800601 adaptor, buffer, *parser,
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000602 [this,
603 self(shared_from_this())](const boost::system::error_code& ec,
Ed Tanous81ce6092020-12-17 16:54:55 +0000604 std::size_t bytesTransferred) {
605 BMCWEB_LOG_DEBUG << this << " async_read " << bytesTransferred
Ed Tanous1abe55e2018-09-05 08:30:59 -0700606 << " Bytes";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700607
608 bool errorWhileReading = false;
609 if (ec)
610 {
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100611 BMCWEB_LOG_ERROR
612 << this << " Error while reading: " << ec.message();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700613 errorWhileReading = true;
614 }
615 else
616 {
James Feist3909dc82020-04-03 10:58:55 -0700617 if (isAlive())
618 {
619 cancelDeadlineTimer();
620 bool loggedIn = req && req->session;
621 if (loggedIn)
622 {
623 startDeadline(loggedInAttempts);
624 }
625 else
626 {
627 startDeadline(loggedOutAttempts);
628 }
629 }
630 else
Ed Tanous1abe55e2018-09-05 08:30:59 -0700631 {
632 errorWhileReading = true;
633 }
634 }
635 if (errorWhileReading)
636 {
637 cancelDeadlineTimer();
Ed Tanouse278c182019-03-13 16:23:37 -0700638 close();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700639 BMCWEB_LOG_DEBUG << this << " from read(1)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700640 return;
641 }
642 handle();
643 });
644 }
645
646 void doWrite()
647 {
James Feist3909dc82020-04-03 10:58:55 -0700648 bool loggedIn = req && req->session;
649 if (loggedIn)
650 {
651 startDeadline(loggedInAttempts);
652 }
653 else
654 {
655 startDeadline(loggedOutAttempts);
656 }
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100657 BMCWEB_LOG_DEBUG << this << " doWrite";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700658 res.preparePayload();
659 serializer.emplace(*res.stringResponse);
660 boost::beast::http::async_write(
Ed Tanousceac6f72018-12-02 11:58:47 -0800661 adaptor, *serializer,
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000662 [this,
663 self(shared_from_this())](const boost::system::error_code& ec,
Ed Tanous81ce6092020-12-17 16:54:55 +0000664 std::size_t bytesTransferred) {
665 BMCWEB_LOG_DEBUG << this << " async_write " << bytesTransferred
Ed Tanous1abe55e2018-09-05 08:30:59 -0700666 << " bytes";
667
James Feist54d8bb12020-07-20 13:28:59 -0700668 cancelDeadlineTimer();
669
Ed Tanous1abe55e2018-09-05 08:30:59 -0700670 if (ec)
671 {
672 BMCWEB_LOG_DEBUG << this << " from write(2)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700673 return;
674 }
Ed Tanousceac6f72018-12-02 11:58:47 -0800675 if (!res.keepAlive())
Ed Tanous1abe55e2018-09-05 08:30:59 -0700676 {
Ed Tanouse278c182019-03-13 16:23:37 -0700677 close();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700678 BMCWEB_LOG_DEBUG << this << " from write(1)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700679 return;
680 }
681
682 serializer.reset();
683 BMCWEB_LOG_DEBUG << this << " Clearing response";
684 res.clear();
685 parser.emplace(std::piecewise_construct, std::make_tuple());
Gunnar Millsded2a1e2020-07-24 09:46:33 -0500686 parser->body_limit(httpReqBodyLimit); // reset body limit for
687 // newly created parser
Ed Tanous1abe55e2018-09-05 08:30:59 -0700688 buffer.consume(buffer.size());
689
690 req.emplace(parser->get());
691 doReadHeaders();
692 });
693 }
694
Ed Tanous1abe55e2018-09-05 08:30:59 -0700695 void cancelDeadlineTimer()
696 {
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000697 if (timerCancelKey)
698 {
699 BMCWEB_LOG_DEBUG << this << " timer cancelled: " << &timerQueue
700 << ' ' << *timerCancelKey;
701 timerQueue.cancel(*timerCancelKey);
702 timerCancelKey.reset();
703 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700704 }
705
James Feist3909dc82020-04-03 10:58:55 -0700706 void startDeadline(size_t timerIterations)
Ed Tanous1abe55e2018-09-05 08:30:59 -0700707 {
708 cancelDeadlineTimer();
709
James Feist3909dc82020-04-03 10:58:55 -0700710 if (timerIterations)
711 {
712 timerIterations--;
713 }
Jan Sowinski2b5e08e2020-01-09 17:16:02 +0100714
James Feist3909dc82020-04-03 10:58:55 -0700715 timerCancelKey =
James Feistbe5dfca2020-07-22 08:54:59 -0700716 timerQueue.add([self(shared_from_this()), timerIterations,
717 readCount{parser->get().body().size()}] {
James Feist3909dc82020-04-03 10:58:55 -0700718 // Mark timer as not active to avoid canceling it during
719 // Connection destructor which leads to double free issue
720 self->timerCancelKey.reset();
721 if (!self->isAlive())
722 {
723 return;
724 }
Jan Sowinski2b5e08e2020-01-09 17:16:02 +0100725
James Feistbe5dfca2020-07-22 08:54:59 -0700726 bool loggedIn = self->req && self->req->session;
727 // allow slow uploads for logged in users
728 if (loggedIn && self->parser->get().body().size() > readCount)
729 {
730 BMCWEB_LOG_DEBUG << self.get()
731 << " restart timer - read in progress";
732 self->startDeadline(timerIterations);
733 return;
734 }
735
James Feist3909dc82020-04-03 10:58:55 -0700736 // Threshold can be used to drop slow connections
737 // to protect against slow-rate DoS attack
738 if (timerIterations)
739 {
James Feistbe5dfca2020-07-22 08:54:59 -0700740 BMCWEB_LOG_DEBUG << self.get() << " restart timer";
James Feist3909dc82020-04-03 10:58:55 -0700741 self->startDeadline(timerIterations);
742 return;
743 }
744
745 self->close();
746 });
James Feistcb6cb492020-04-03 13:36:17 -0700747
748 if (!timerCancelKey)
749 {
750 close();
751 return;
752 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700753 BMCWEB_LOG_DEBUG << this << " timer added: " << &timerQueue << ' '
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000754 << *timerCancelKey;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700755 }
756
757 private:
758 Adaptor adaptor;
759 Handler* handler;
760
Ed Tanousa24526d2018-12-10 15:17:59 -0800761 // Making this a std::optional allows it to be efficiently destroyed and
Ed Tanous1abe55e2018-09-05 08:30:59 -0700762 // re-created on Connection reset
Ed Tanousa24526d2018-12-10 15:17:59 -0800763 std::optional<
Ed Tanous1abe55e2018-09-05 08:30:59 -0700764 boost::beast::http::request_parser<boost::beast::http::string_body>>
765 parser;
766
Ed Tanous3112a142018-11-29 15:45:10 -0800767 boost::beast::flat_static_buffer<8192> buffer;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700768
Ed Tanousa24526d2018-12-10 15:17:59 -0800769 std::optional<boost::beast::http::response_serializer<
Ed Tanous1abe55e2018-09-05 08:30:59 -0700770 boost::beast::http::string_body>>
771 serializer;
772
Ed Tanousa24526d2018-12-10 15:17:59 -0800773 std::optional<crow::Request> req;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700774 crow::Response res;
Ed Tanous52cc1122020-07-18 13:51:21 -0700775
776 std::weak_ptr<persistent_data::UserSession> session;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700777
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000778 std::optional<size_t> timerCancelKey;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700779
Ed Tanous1abe55e2018-09-05 08:30:59 -0700780 bool needToCallAfterHandlers{};
781 bool needToStartReadAfterComplete{};
Ed Tanous1abe55e2018-09-05 08:30:59 -0700782
Ed Tanous1abe55e2018-09-05 08:30:59 -0700783 std::function<std::string()>& getCachedDateStr;
784 detail::TimerQueue& timerQueue;
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000785
786 using std::enable_shared_from_this<
Ed Tanous52cc1122020-07-18 13:51:21 -0700787 Connection<Adaptor, Handler>>::shared_from_this;
Ed Tanous3112a142018-11-29 15:45:10 -0800788};
Ed Tanous1abe55e2018-09-05 08:30:59 -0700789} // namespace crow