blob: a4723f121a51aa928cf131205e494431f5a7a36c [file] [log] [blame]
Ed Tanous7045c8d2017-04-03 10:04:37 -07001#pragma once
Ed Tanous75312982021-02-11 14:26:02 -08002#include "bmcweb_config.h"
Adriana Kobylak0e1cf262019-12-05 13:57:57 -06003
James Feist3909dc82020-04-03 10:58:55 -07004#include "authorization.hpp"
Ed Tanous04e438c2020-10-03 08:06:26 -07005#include "http_response.hpp"
Ed Tanous1abe55e2018-09-05 08:30:59 -07006#include "http_utility.hpp"
Ed Tanous04e438c2020-10-03 08:06:26 -07007#include "logging.hpp"
8#include "timer_queue.hpp"
9#include "utility.hpp"
Ed Tanous1abe55e2018-09-05 08:30:59 -070010
Ed Tanouse0d918b2018-03-27 17:41:04 -070011#include <boost/algorithm/string.hpp>
Ed Tanous257f5792018-03-17 14:40:09 -070012#include <boost/algorithm/string/predicate.hpp>
Ed Tanous8f626352018-12-19 14:51:54 -080013#include <boost/asio/io_context.hpp>
Ed Tanous3112a142018-11-29 15:45:10 -080014#include <boost/asio/ip/tcp.hpp>
Ed Tanousd43cd0c2020-09-30 20:46:53 -070015#include <boost/asio/ssl/stream.hpp>
Ed Tanous3112a142018-11-29 15:45:10 -080016#include <boost/beast/core/flat_static_buffer.hpp>
Manojkiran Eda44250442020-06-16 12:51:38 +053017#include <boost/beast/ssl/ssl_stream.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050018#include <boost/beast/websocket.hpp>
Ed Tanous57fce802019-05-21 13:00:34 -070019#include <json_html_serializer.hpp>
Ed Tanous52cc1122020-07-18 13:51:21 -070020#include <security_headers.hpp>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050021#include <ssl_key_handler.hpp>
22
Manojkiran Eda44250442020-06-16 12:51:38 +053023#include <atomic>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050024#include <chrono>
25#include <vector>
26
Ed Tanous1abe55e2018-09-05 08:30:59 -070027namespace crow
28{
Ed Tanous257f5792018-03-17 14:40:09 -070029
Ed Tanous1abe55e2018-09-05 08:30:59 -070030inline void prettyPrintJson(crow::Response& res)
31{
Ed Tanous57fce802019-05-21 13:00:34 -070032 json_html_util::dumpHtml(res.body(), res.jsonValue);
33
Ed Tanous93ef5802019-01-03 10:15:41 -080034 res.addHeader("Content-Type", "text/html;charset=UTF-8");
Ed Tanous257f5792018-03-17 14:40:09 -070035}
36
Ed Tanous55c7b7a2018-05-22 15:27:24 -070037#ifdef BMCWEB_ENABLE_DEBUG
Ed Tanouse0d918b2018-03-27 17:41:04 -070038static std::atomic<int> connectionCount;
Ed Tanous7045c8d2017-04-03 10:04:37 -070039#endif
Jennifer Leeacb7cfb2018-06-07 16:08:15 -070040
Ed Tanous0260d9d2021-02-07 19:31:07 +000041// request body limit size set by the bmcwebHttpReqBodyLimitMb option
Adriana Kobylak0e1cf262019-12-05 13:57:57 -060042constexpr unsigned int httpReqBodyLimit =
Ed Tanous0260d9d2021-02-07 19:31:07 +000043 1024 * 1024 * bmcwebHttpReqBodyLimitMb;
Jennifer Leeacb7cfb2018-06-07 16:08:15 -070044
James Feist3909dc82020-04-03 10:58:55 -070045constexpr uint64_t loggedOutPostBodyLimit = 4096;
46
47constexpr uint32_t httpHeaderLimit = 8192;
48
49// drop all connections after 1 minute, this time limit was chosen
50// arbitrarily and can be adjusted later if needed
51static constexpr const size_t loggedInAttempts =
52 (60 / timerQueueTimeoutSeconds);
53
54static constexpr const size_t loggedOutAttempts =
55 (15 / timerQueueTimeoutSeconds);
56
Ed Tanous52cc1122020-07-18 13:51:21 -070057template <typename Adaptor, typename Handler>
Gunnar Mills1214b7e2020-06-04 10:11:30 -050058class Connection :
Ed Tanous52cc1122020-07-18 13:51:21 -070059 public std::enable_shared_from_this<Connection<Adaptor, Handler>>
Ed Tanous1abe55e2018-09-05 08:30:59 -070060{
61 public:
Ed Tanouse7d1a1c2020-09-28 09:36:35 -070062 Connection(Handler* handlerIn,
Ed Tanous81ce6092020-12-17 16:54:55 +000063 std::function<std::string()>& getCachedDateStrF,
Ed Tanous271584a2019-07-09 16:24:22 -070064 detail::TimerQueue& timerQueueIn, Adaptor adaptorIn) :
Ed Tanousceac6f72018-12-02 11:58:47 -080065 adaptor(std::move(adaptorIn)),
Ed Tanous81ce6092020-12-17 16:54:55 +000066 handler(handlerIn), getCachedDateStr(getCachedDateStrF),
Ed Tanouse7d1a1c2020-09-28 09:36:35 -070067 timerQueue(timerQueueIn)
Ed Tanous1abe55e2018-09-05 08:30:59 -070068 {
69 parser.emplace(std::piecewise_construct, std::make_tuple());
Ed Tanous1abe55e2018-09-05 08:30:59 -070070 parser->body_limit(httpReqBodyLimit);
James Feist3909dc82020-04-03 10:58:55 -070071 parser->header_limit(httpHeaderLimit);
Kowalski, Kamil55e43f62019-07-10 13:12:57 +020072
73#ifdef BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
Ed Tanous40aa0582021-07-14 13:24:40 -070074 prepareMutualTls();
75#endif // BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
76
77#ifdef BMCWEB_ENABLE_DEBUG
78 connectionCount++;
79 BMCWEB_LOG_DEBUG << this << " Connection open, total "
80 << connectionCount;
81#endif
82 }
83
84 ~Connection()
85 {
John Edward Broadbent4147b8a2021-07-19 16:52:24 -070086 res.setCompleteRequestHandler(nullptr);
Ed Tanous40aa0582021-07-14 13:24:40 -070087 cancelDeadlineTimer();
88#ifdef BMCWEB_ENABLE_DEBUG
89 connectionCount--;
90 BMCWEB_LOG_DEBUG << this << " Connection closed, total "
91 << connectionCount;
92#endif
93 }
94
95 void prepareMutualTls()
96 {
Jonathan Doman83deb7d2020-11-16 17:00:22 -080097 std::error_code error;
98 std::filesystem::path caPath(ensuressl::trustStorePath);
99 auto caAvailable = !std::filesystem::is_empty(caPath, error);
100 caAvailable = caAvailable && !error;
Ed Tanous2c70f802020-09-28 14:29:23 -0700101 if (caAvailable && persistent_data::SessionStore::getInstance()
102 .getAuthMethodsConfig()
103 .tls)
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100104 {
105 adaptor.set_verify_mode(boost::asio::ssl::verify_peer);
Ed Tanouse7d1a1c2020-09-28 09:36:35 -0700106 std::string id = "bmcweb";
107 int ret = SSL_set_session_id_context(
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100108 adaptor.native_handle(),
Ed Tanouse7d1a1c2020-09-28 09:36:35 -0700109 reinterpret_cast<const unsigned char*>(id.c_str()),
110 static_cast<unsigned int>(id.length()));
111 if (ret == 0)
112 {
113 BMCWEB_LOG_ERROR << this << " failed to set SSL id";
114 }
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100115 }
116
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100117 adaptor.set_verify_callback([this](
118 bool preverified,
119 boost::asio::ssl::verify_context& ctx) {
120 // do nothing if TLS is disabled
Ed Tanous52cc1122020-07-18 13:51:21 -0700121 if (!persistent_data::SessionStore::getInstance()
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100122 .getAuthMethodsConfig()
123 .tls)
124 {
125 BMCWEB_LOG_DEBUG << this << " TLS auth_config is disabled";
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200126 return true;
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100127 }
128
129 // We always return true to allow full auth flow
130 if (!preverified)
131 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100132 BMCWEB_LOG_DEBUG << this << " TLS preverification failed.";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100133 return true;
134 }
135
136 X509_STORE_CTX* cts = ctx.native_handle();
137 if (cts == nullptr)
138 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100139 BMCWEB_LOG_DEBUG << this << " Cannot get native TLS handle.";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100140 return true;
141 }
142
143 // Get certificate
144 X509* peerCert =
145 X509_STORE_CTX_get_current_cert(ctx.native_handle());
146 if (peerCert == nullptr)
147 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100148 BMCWEB_LOG_DEBUG << this
149 << " Cannot get current TLS certificate.";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100150 return true;
151 }
152
153 // Check if certificate is OK
154 int error = X509_STORE_CTX_get_error(cts);
155 if (error != X509_V_OK)
156 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100157 BMCWEB_LOG_INFO << this << " Last TLS error is: " << error;
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100158 return true;
159 }
160 // Check that we have reached final certificate in chain
161 int32_t depth = X509_STORE_CTX_get_error_depth(cts);
162 if (depth != 0)
163
164 {
165 BMCWEB_LOG_DEBUG
166 << this << " Certificate verification in progress (depth "
167 << depth << "), waiting to reach final depth";
168 return true;
169 }
170
171 BMCWEB_LOG_DEBUG << this
172 << " Certificate verification of final depth";
173
174 // Verify KeyUsage
175 bool isKeyUsageDigitalSignature = false;
176 bool isKeyUsageKeyAgreement = false;
177
178 ASN1_BIT_STRING* usage = static_cast<ASN1_BIT_STRING*>(
Ed Tanous23a21a12020-07-25 04:45:05 +0000179 X509_get_ext_d2i(peerCert, NID_key_usage, nullptr, nullptr));
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100180
181 if (usage == nullptr)
182 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100183 BMCWEB_LOG_DEBUG << this << " TLS usage is null";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100184 return true;
185 }
186
187 for (int i = 0; i < usage->length; i++)
188 {
189 if (KU_DIGITAL_SIGNATURE & usage->data[i])
190 {
191 isKeyUsageDigitalSignature = true;
192 }
193 if (KU_KEY_AGREEMENT & usage->data[i])
194 {
195 isKeyUsageKeyAgreement = true;
196 }
197 }
Vernon Maueryb9378302021-06-16 14:06:57 -0700198 ASN1_BIT_STRING_free(usage);
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100199
200 if (!isKeyUsageDigitalSignature || !isKeyUsageKeyAgreement)
201 {
202 BMCWEB_LOG_DEBUG << this
203 << " Certificate ExtendedKeyUsage does "
204 "not allow provided certificate to "
205 "be used for user authentication";
206 return true;
207 }
208
209 // Determine that ExtendedKeyUsage includes Client Auth
210
Ed Tanous23a21a12020-07-25 04:45:05 +0000211 stack_st_ASN1_OBJECT* extUsage =
212 static_cast<stack_st_ASN1_OBJECT*>(X509_get_ext_d2i(
213 peerCert, NID_ext_key_usage, nullptr, nullptr));
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100214
215 if (extUsage == nullptr)
216 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100217 BMCWEB_LOG_DEBUG << this << " TLS extUsage is null";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100218 return true;
219 }
220
221 bool isExKeyUsageClientAuth = false;
222 for (int i = 0; i < sk_ASN1_OBJECT_num(extUsage); i++)
223 {
224 if (NID_client_auth ==
225 OBJ_obj2nid(sk_ASN1_OBJECT_value(extUsage, i)))
226 {
227 isExKeyUsageClientAuth = true;
228 break;
229 }
230 }
Zbigniew Kurzynski09d02f82020-03-30 13:41:42 +0200231 sk_ASN1_OBJECT_free(extUsage);
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100232
233 // Certificate has to have proper key usages set
234 if (!isExKeyUsageClientAuth)
235 {
236 BMCWEB_LOG_DEBUG << this
237 << " Certificate ExtendedKeyUsage does "
238 "not allow provided certificate to "
239 "be used for user authentication";
240 return true;
241 }
242 std::string sslUser;
243 // Extract username contained in CommonName
244 sslUser.resize(256, '\0');
245
246 int status = X509_NAME_get_text_by_NID(
247 X509_get_subject_name(peerCert), NID_commonName, sslUser.data(),
248 static_cast<int>(sslUser.size()));
249
250 if (status == -1)
251 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100252 BMCWEB_LOG_DEBUG
253 << this << " TLS cannot get username to create session";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100254 return true;
255 }
256
257 size_t lastChar = sslUser.find('\0');
258 if (lastChar == std::string::npos || lastChar == 0)
259 {
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100260 BMCWEB_LOG_DEBUG << this << " Invalid TLS user name";
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100261 return true;
262 }
263 sslUser.resize(lastChar);
Sunitha Harishd3239222021-02-24 15:33:29 +0530264 std::string unsupportedClientId = "";
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700265 userSession = persistent_data::SessionStore::getInstance()
266 .generateUserSession(
267 sslUser, req->ipAddress.to_string(),
268 unsupportedClientId,
269 persistent_data::PersistenceType::TIMEOUT);
270 if (userSession != nullptr)
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100271 {
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700272 BMCWEB_LOG_DEBUG
273 << this
274 << " Generating TLS session: " << userSession->uniqueId;
Zbigniew Kurzynski009c2a42019-11-14 13:37:15 +0100275 }
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100276 return true;
277 });
Ed Tanous7045c8d2017-04-03 10:04:37 -0700278 }
279
Ed Tanousceac6f72018-12-02 11:58:47 -0800280 Adaptor& socket()
Ed Tanous1abe55e2018-09-05 08:30:59 -0700281 {
Ed Tanousceac6f72018-12-02 11:58:47 -0800282 return adaptor;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700283 }
284
Ed Tanous1abe55e2018-09-05 08:30:59 -0700285 void start()
286 {
Ed Tanous7045c8d2017-04-03 10:04:37 -0700287
James Feist3909dc82020-04-03 10:58:55 -0700288 startDeadline(0);
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500289
Ed Tanousceac6f72018-12-02 11:58:47 -0800290 // TODO(ed) Abstract this to a more clever class with the idea of an
291 // asynchronous "start"
292 if constexpr (std::is_same_v<Adaptor,
293 boost::beast::ssl_stream<
294 boost::asio::ip::tcp::socket>>)
295 {
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000296 adaptor.async_handshake(boost::asio::ssl::stream_base::server,
297 [this, self(shared_from_this())](
298 const boost::system::error_code& ec) {
299 if (ec)
300 {
301 return;
302 }
303 doReadHeaders();
304 });
Ed Tanousceac6f72018-12-02 11:58:47 -0800305 }
306 else
307 {
308 doReadHeaders();
309 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700310 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700311
Ed Tanous1abe55e2018-09-05 08:30:59 -0700312 void handle()
313 {
314 cancelDeadlineTimer();
James Feist3909dc82020-04-03 10:58:55 -0700315
Ivan Mikhaylovf65b0be2021-04-19 10:05:30 +0000316 // Fetch the client IP address
317 readClientIp();
318
Ed Tanous1abe55e2018-09-05 08:30:59 -0700319 bool isInvalidRequest = false;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700320
Ed Tanous1abe55e2018-09-05 08:30:59 -0700321 // Check for HTTP version 1.1.
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700322 if (parser->get().version() == 11)
Ed Tanous1abe55e2018-09-05 08:30:59 -0700323 {
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700324 if (parser->get()[boost::beast::http::field::host].empty())
Ed Tanous1abe55e2018-09-05 08:30:59 -0700325 {
326 isInvalidRequest = true;
Ed Tanousde5c9f32019-03-26 09:17:55 -0700327 res.result(boost::beast::http::status::bad_request);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700328 }
329 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700330
Ed Tanouse278c182019-03-13 16:23:37 -0700331 BMCWEB_LOG_INFO << "Request: "
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700332 << " " << this << " HTTP/"
333 << parser->get().version() / 10 << "."
334 << parser->get().version() % 10 << ' '
335 << parser->get().method_string() << " "
336 << parser->get().target() << " " << req->ipAddress;
337 req.emplace(parser->release());
338 req->session = userSession;
339 try
340 {
341 // causes life time issue
342 req->urlView = boost::urls::url_view(req->target());
343 req->url = req->urlView.encoded_path();
344 }
345 catch (std::exception& p)
346 {
347 BMCWEB_LOG_ERROR << p.what();
348 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700349
Ed Tanous1abe55e2018-09-05 08:30:59 -0700350 needToCallAfterHandlers = false;
Ed Tanous7045c8d2017-04-03 10:04:37 -0700351
Ed Tanous1abe55e2018-09-05 08:30:59 -0700352 if (!isInvalidRequest)
353 {
John Edward Broadbent4147b8a2021-07-19 16:52:24 -0700354 res.setCompleteRequestHandler(nullptr);
Ed Tanouse278c182019-03-13 16:23:37 -0700355 res.isAliveHelper = [this]() -> bool { return isAlive(); };
Ed Tanous7045c8d2017-04-03 10:04:37 -0700356
Ed Tanouse278c182019-03-13 16:23:37 -0700357 req->ioService = static_cast<decltype(req->ioService)>(
358 &adaptor.get_executor().context());
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200359
Ed Tanous1abe55e2018-09-05 08:30:59 -0700360 if (!res.completed)
361 {
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000362 needToCallAfterHandlers = true;
John Edward Broadbent4147b8a2021-07-19 16:52:24 -0700363 res.setCompleteRequestHandler([self(shared_from_this())] {
Wludzik, Jozefc7d34222020-10-19 12:59:41 +0200364 boost::asio::post(self->adaptor.get_executor(),
365 [self] { self->completeRequest(); });
John Edward Broadbent4147b8a2021-07-19 16:52:24 -0700366 });
Ed Tanous1abe55e2018-09-05 08:30:59 -0700367 if (req->isUpgrade() &&
368 boost::iequals(
369 req->getHeaderValue(boost::beast::http::field::upgrade),
370 "websocket"))
371 {
372 handler->handleUpgrade(*req, res, std::move(adaptor));
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000373 // delete lambda with self shared_ptr
374 // to enable connection destruction
John Edward Broadbent4147b8a2021-07-19 16:52:24 -0700375 res.setCompleteRequestHandler(nullptr);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700376 return;
377 }
zhanghch058d1b46d2021-04-01 11:18:24 +0800378 auto asyncResp = std::make_shared<bmcweb::AsyncResp>(res);
379 handler->handle(*req, asyncResp);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700380 }
381 else
382 {
383 completeRequest();
384 }
385 }
386 else
387 {
388 completeRequest();
389 }
390 }
Ed Tanouse0d918b2018-03-27 17:41:04 -0700391
Ed Tanouse278c182019-03-13 16:23:37 -0700392 bool isAlive()
393 {
394
395 if constexpr (std::is_same_v<Adaptor,
396 boost::beast::ssl_stream<
397 boost::asio::ip::tcp::socket>>)
398 {
399 return adaptor.next_layer().is_open();
400 }
401 else
402 {
403 return adaptor.is_open();
404 }
405 }
406 void close()
407 {
Ed Tanouse278c182019-03-13 16:23:37 -0700408 if constexpr (std::is_same_v<Adaptor,
409 boost::beast::ssl_stream<
410 boost::asio::ip::tcp::socket>>)
411 {
412 adaptor.next_layer().close();
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200413#ifdef BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700414 if (userSession != nullptr)
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200415 {
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700416 BMCWEB_LOG_DEBUG
417 << this
418 << " Removing TLS session: " << userSession->uniqueId;
419 persistent_data::SessionStore::getInstance().removeSession(
420 userSession);
Kowalski, Kamil55e43f62019-07-10 13:12:57 +0200421 }
422#endif // BMCWEB_ENABLE_MUTUAL_TLS_AUTHENTICATION
Ed Tanouse278c182019-03-13 16:23:37 -0700423 }
424 else
425 {
426 adaptor.close();
427 }
428 }
429
Ed Tanous1abe55e2018-09-05 08:30:59 -0700430 void completeRequest()
431 {
432 BMCWEB_LOG_INFO << "Response: " << this << ' ' << req->url << ' '
433 << res.resultInt() << " keepalive=" << req->keepAlive();
Ed Tanous7045c8d2017-04-03 10:04:37 -0700434
Ed Tanous0260d9d2021-02-07 19:31:07 +0000435 addSecurityHeaders(*req, res);
Ed Tanous52cc1122020-07-18 13:51:21 -0700436
Ed Tanous1abe55e2018-09-05 08:30:59 -0700437 if (needToCallAfterHandlers)
438 {
James Feist3909dc82020-04-03 10:58:55 -0700439 crow::authorization::cleanupTempSession(*req);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700440 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700441
Ed Tanouse278c182019-03-13 16:23:37 -0700442 if (!isAlive())
Ed Tanous1abe55e2018-09-05 08:30:59 -0700443 {
444 // BMCWEB_LOG_DEBUG << this << " delete (socket is closed) " <<
445 // isReading
446 // << ' ' << isWriting;
447 // delete this;
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000448
449 // delete lambda with self shared_ptr
450 // to enable connection destruction
John Edward Broadbent4147b8a2021-07-19 16:52:24 -0700451 res.setCompleteRequestHandler(nullptr);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700452 return;
453 }
454 if (res.body().empty() && !res.jsonValue.empty())
455 {
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700456 if (http_helpers::requestPrefersHtml(req->getHeaderValue("Accept")))
Ed Tanous1abe55e2018-09-05 08:30:59 -0700457 {
458 prettyPrintJson(res);
459 }
460 else
461 {
462 res.jsonMode();
Ed Tanous71f52d92021-02-19 08:51:17 -0800463 res.body() = res.jsonValue.dump(
464 2, ' ', true, nlohmann::json::error_handler_t::replace);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700465 }
466 }
Ed Tanous7045c8d2017-04-03 10:04:37 -0700467
Ed Tanous1abe55e2018-09-05 08:30:59 -0700468 if (res.resultInt() >= 400 && res.body().empty())
469 {
470 res.body() = std::string(res.reason());
471 }
Ed Tanous6295bec2019-09-03 10:11:01 -0700472
473 if (res.result() == boost::beast::http::status::no_content)
474 {
475 // Boost beast throws if content is provided on a no-content
476 // response. Ideally, this would never happen, but in the case that
477 // it does, we don't want to throw.
478 BMCWEB_LOG_CRITICAL
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100479 << this << " Response content provided but code was no-content";
Ed Tanous6295bec2019-09-03 10:11:01 -0700480 res.body().clear();
481 }
482
Ed Tanous1abe55e2018-09-05 08:30:59 -0700483 res.addHeader(boost::beast::http::field::date, getCachedDateStr());
484
485 res.keepAlive(req->keepAlive());
486
487 doWrite();
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000488
489 // delete lambda with self shared_ptr
490 // to enable connection destruction
John Edward Broadbent4147b8a2021-07-19 16:52:24 -0700491 res.setCompleteRequestHandler(nullptr);
Ed Tanous1abe55e2018-09-05 08:30:59 -0700492 }
493
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500494 void readClientIp()
495 {
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700496 boost::asio::ip::address ip;
497 boost::system::error_code ec = getClientIp(ip);
498 if (ec)
499 {
500 return;
501 }
502 req->ipAddress = ip;
503 }
504
505 boost::system::error_code getClientIp(boost::asio::ip::address& ip)
506 {
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500507 boost::system::error_code ec;
508 BMCWEB_LOG_DEBUG << "Fetch the client IP address";
509 boost::asio::ip::tcp::endpoint endpoint =
510 boost::beast::get_lowest_layer(adaptor).remote_endpoint(ec);
511
512 if (ec)
513 {
514 // If remote endpoint fails keep going. "ClientOriginIPAddress"
515 // will be empty.
516 BMCWEB_LOG_ERROR << "Failed to get the client's IP Address. ec : "
517 << ec;
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700518 return ec;
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500519 }
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700520 ip = endpoint.address();
521 return ec;
Sunitha Harishc0ea7ae2020-10-30 02:37:30 -0500522 }
523
Ed Tanous1abe55e2018-09-05 08:30:59 -0700524 private:
525 void doReadHeaders()
526 {
Ed Tanous1abe55e2018-09-05 08:30:59 -0700527 BMCWEB_LOG_DEBUG << this << " doReadHeaders";
528
529 // Clean up any previous Connection.
530 boost::beast::http::async_read_header(
Ed Tanousceac6f72018-12-02 11:58:47 -0800531 adaptor, buffer, *parser,
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000532 [this,
533 self(shared_from_this())](const boost::system::error_code& ec,
Ed Tanous81ce6092020-12-17 16:54:55 +0000534 std::size_t bytesTransferred) {
Ed Tanous1abe55e2018-09-05 08:30:59 -0700535 BMCWEB_LOG_ERROR << this << " async_read_header "
Ed Tanous81ce6092020-12-17 16:54:55 +0000536 << bytesTransferred << " Bytes";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700537 bool errorWhileReading = false;
538 if (ec)
539 {
540 errorWhileReading = true;
541 BMCWEB_LOG_ERROR
542 << this << " Error while reading: " << ec.message();
543 }
544 else
545 {
546 // if the adaptor isn't open anymore, and wasn't handed to a
547 // websocket, treat as an error
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700548 if (!isAlive() &&
549 !boost::beast::websocket::is_upgrade(parser->get()))
Ed Tanous1abe55e2018-09-05 08:30:59 -0700550 {
551 errorWhileReading = true;
552 }
553 }
554
James Feist3909dc82020-04-03 10:58:55 -0700555 cancelDeadlineTimer();
556
Ed Tanous1abe55e2018-09-05 08:30:59 -0700557 if (errorWhileReading)
558 {
Ed Tanouse278c182019-03-13 16:23:37 -0700559 close();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700560 BMCWEB_LOG_DEBUG << this << " from read(1)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700561 return;
562 }
563
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700564 boost::beast::http::verb method = parser->get().method();
565 readClientIp();
Ed Tanousdc7a7932020-08-17 15:04:58 -0700566 try
567 {
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700568 req->urlView =
569 boost::urls::url_view(parser->get().target());
Ed Tanousdc7a7932020-08-17 15:04:58 -0700570 req->url = req->urlView.encoded_path();
571 }
Ed Tanous92ccb882020-08-18 10:36:33 -0700572 catch (std::exception& p)
Ed Tanousdc7a7932020-08-17 15:04:58 -0700573 {
Ed Tanous3bcc0152020-08-25 07:47:29 -0700574 BMCWEB_LOG_ERROR << p.what();
Ed Tanousdc7a7932020-08-17 15:04:58 -0700575 }
Ed Tanous92ccb882020-08-18 10:36:33 -0700576
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700577 boost::asio::ip::address ip;
578 if (getClientIp(ip))
579 {
580 BMCWEB_LOG_DEBUG << "Unable to get client IP";
581 }
582 userSession = crow::authorization::authenticate(
583 req->url, ip, res, method, parser->get().base(),
584 userSession);
585 bool loggedIn = userSession != nullptr;
James Feist3909dc82020-04-03 10:58:55 -0700586 if (loggedIn)
587 {
588 startDeadline(loggedInAttempts);
589 BMCWEB_LOG_DEBUG << "Starting slow deadline";
590
James Feist5a7e8772020-07-22 09:08:38 -0700591 req->urlParams = req->urlView.params();
592
593#ifdef BMCWEB_ENABLE_DEBUG
594 std::string paramList = "";
595 for (const auto param : req->urlParams)
596 {
597 paramList += param->key() + " " + param->value() + " ";
598 }
599 BMCWEB_LOG_DEBUG << "QueryParams: " << paramList;
600#endif
James Feist3909dc82020-04-03 10:58:55 -0700601 }
602 else
603 {
604 const boost::optional<uint64_t> contentLength =
605 parser->content_length();
606 if (contentLength &&
607 *contentLength > loggedOutPostBodyLimit)
608 {
609 BMCWEB_LOG_DEBUG << "Content length greater than limit "
610 << *contentLength;
611 close();
612 return;
613 }
614
615 startDeadline(loggedOutAttempts);
616 BMCWEB_LOG_DEBUG << "Starting quick deadline";
617 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700618 doRead();
619 });
620 }
621
622 void doRead()
623 {
Ed Tanous1abe55e2018-09-05 08:30:59 -0700624 BMCWEB_LOG_DEBUG << this << " doRead";
625
626 boost::beast::http::async_read(
Ed Tanousceac6f72018-12-02 11:58:47 -0800627 adaptor, buffer, *parser,
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000628 [this,
629 self(shared_from_this())](const boost::system::error_code& ec,
Ed Tanous81ce6092020-12-17 16:54:55 +0000630 std::size_t bytesTransferred) {
631 BMCWEB_LOG_DEBUG << this << " async_read " << bytesTransferred
Ed Tanous1abe55e2018-09-05 08:30:59 -0700632 << " Bytes";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700633
634 bool errorWhileReading = false;
635 if (ec)
636 {
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100637 BMCWEB_LOG_ERROR
638 << this << " Error while reading: " << ec.message();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700639 errorWhileReading = true;
640 }
641 else
642 {
James Feist3909dc82020-04-03 10:58:55 -0700643 if (isAlive())
644 {
645 cancelDeadlineTimer();
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700646 if (userSession != nullptr)
James Feist3909dc82020-04-03 10:58:55 -0700647 {
648 startDeadline(loggedInAttempts);
649 }
650 else
651 {
652 startDeadline(loggedOutAttempts);
653 }
654 }
655 else
Ed Tanous1abe55e2018-09-05 08:30:59 -0700656 {
657 errorWhileReading = true;
658 }
659 }
660 if (errorWhileReading)
661 {
662 cancelDeadlineTimer();
Ed Tanouse278c182019-03-13 16:23:37 -0700663 close();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700664 BMCWEB_LOG_DEBUG << this << " from read(1)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700665 return;
666 }
667 handle();
668 });
669 }
670
671 void doWrite()
672 {
James Feist3909dc82020-04-03 10:58:55 -0700673 bool loggedIn = req && req->session;
674 if (loggedIn)
675 {
676 startDeadline(loggedInAttempts);
677 }
678 else
679 {
680 startDeadline(loggedOutAttempts);
681 }
Zbigniew Kurzynski2658d982019-11-19 18:01:08 +0100682 BMCWEB_LOG_DEBUG << this << " doWrite";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700683 res.preparePayload();
684 serializer.emplace(*res.stringResponse);
685 boost::beast::http::async_write(
Ed Tanousceac6f72018-12-02 11:58:47 -0800686 adaptor, *serializer,
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000687 [this,
688 self(shared_from_this())](const boost::system::error_code& ec,
Ed Tanous81ce6092020-12-17 16:54:55 +0000689 std::size_t bytesTransferred) {
690 BMCWEB_LOG_DEBUG << this << " async_write " << bytesTransferred
Ed Tanous1abe55e2018-09-05 08:30:59 -0700691 << " bytes";
692
James Feist54d8bb12020-07-20 13:28:59 -0700693 cancelDeadlineTimer();
694
Ed Tanous1abe55e2018-09-05 08:30:59 -0700695 if (ec)
696 {
697 BMCWEB_LOG_DEBUG << this << " from write(2)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700698 return;
699 }
Ed Tanousceac6f72018-12-02 11:58:47 -0800700 if (!res.keepAlive())
Ed Tanous1abe55e2018-09-05 08:30:59 -0700701 {
Ed Tanouse278c182019-03-13 16:23:37 -0700702 close();
Ed Tanous1abe55e2018-09-05 08:30:59 -0700703 BMCWEB_LOG_DEBUG << this << " from write(1)";
Ed Tanous1abe55e2018-09-05 08:30:59 -0700704 return;
705 }
706
707 serializer.reset();
708 BMCWEB_LOG_DEBUG << this << " Clearing response";
709 res.clear();
710 parser.emplace(std::piecewise_construct, std::make_tuple());
Gunnar Millsded2a1e2020-07-24 09:46:33 -0500711 parser->body_limit(httpReqBodyLimit); // reset body limit for
712 // newly created parser
Ed Tanous1abe55e2018-09-05 08:30:59 -0700713 buffer.consume(buffer.size());
714
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700715 req.emplace(parser->release());
Ed Tanous1abe55e2018-09-05 08:30:59 -0700716 doReadHeaders();
717 });
718 }
719
Ed Tanous1abe55e2018-09-05 08:30:59 -0700720 void cancelDeadlineTimer()
721 {
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000722 if (timerCancelKey)
723 {
724 BMCWEB_LOG_DEBUG << this << " timer cancelled: " << &timerQueue
725 << ' ' << *timerCancelKey;
726 timerQueue.cancel(*timerCancelKey);
727 timerCancelKey.reset();
728 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700729 }
730
James Feist3909dc82020-04-03 10:58:55 -0700731 void startDeadline(size_t timerIterations)
Ed Tanous1abe55e2018-09-05 08:30:59 -0700732 {
733 cancelDeadlineTimer();
734
James Feist3909dc82020-04-03 10:58:55 -0700735 if (timerIterations)
736 {
737 timerIterations--;
738 }
Jan Sowinski2b5e08e2020-01-09 17:16:02 +0100739
James Feist3909dc82020-04-03 10:58:55 -0700740 timerCancelKey =
James Feistbe5dfca2020-07-22 08:54:59 -0700741 timerQueue.add([self(shared_from_this()), timerIterations,
742 readCount{parser->get().body().size()}] {
James Feist3909dc82020-04-03 10:58:55 -0700743 // Mark timer as not active to avoid canceling it during
744 // Connection destructor which leads to double free issue
745 self->timerCancelKey.reset();
746 if (!self->isAlive())
747 {
748 return;
749 }
Jan Sowinski2b5e08e2020-01-09 17:16:02 +0100750
James Feistbe5dfca2020-07-22 08:54:59 -0700751 bool loggedIn = self->req && self->req->session;
752 // allow slow uploads for logged in users
753 if (loggedIn && self->parser->get().body().size() > readCount)
754 {
755 BMCWEB_LOG_DEBUG << self.get()
756 << " restart timer - read in progress";
757 self->startDeadline(timerIterations);
758 return;
759 }
760
James Feist3909dc82020-04-03 10:58:55 -0700761 // Threshold can be used to drop slow connections
762 // to protect against slow-rate DoS attack
763 if (timerIterations)
764 {
James Feistbe5dfca2020-07-22 08:54:59 -0700765 BMCWEB_LOG_DEBUG << self.get() << " restart timer";
James Feist3909dc82020-04-03 10:58:55 -0700766 self->startDeadline(timerIterations);
767 return;
768 }
769
770 self->close();
771 });
James Feistcb6cb492020-04-03 13:36:17 -0700772
773 if (!timerCancelKey)
774 {
775 close();
776 return;
777 }
Ed Tanous1abe55e2018-09-05 08:30:59 -0700778 BMCWEB_LOG_DEBUG << this << " timer added: " << &timerQueue << ' '
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000779 << *timerCancelKey;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700780 }
781
782 private:
783 Adaptor adaptor;
784 Handler* handler;
Ed Tanousa24526d2018-12-10 15:17:59 -0800785 // Making this a std::optional allows it to be efficiently destroyed and
Ed Tanous1abe55e2018-09-05 08:30:59 -0700786 // re-created on Connection reset
Ed Tanousa24526d2018-12-10 15:17:59 -0800787 std::optional<
Ed Tanous1abe55e2018-09-05 08:30:59 -0700788 boost::beast::http::request_parser<boost::beast::http::string_body>>
789 parser;
790
Ed Tanous3112a142018-11-29 15:45:10 -0800791 boost::beast::flat_static_buffer<8192> buffer;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700792
Ed Tanousa24526d2018-12-10 15:17:59 -0800793 std::optional<boost::beast::http::response_serializer<
Ed Tanous1abe55e2018-09-05 08:30:59 -0700794 boost::beast::http::string_body>>
795 serializer;
796
Ed Tanousa24526d2018-12-10 15:17:59 -0800797 std::optional<crow::Request> req;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700798 crow::Response res;
Ed Tanous52cc1122020-07-18 13:51:21 -0700799
John Edward Broadbent59b98b22021-07-13 15:36:32 -0700800 std::shared_ptr<persistent_data::UserSession> userSession;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700801
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000802 std::optional<size_t> timerCancelKey;
Ed Tanous1abe55e2018-09-05 08:30:59 -0700803
Ed Tanous1abe55e2018-09-05 08:30:59 -0700804 bool needToCallAfterHandlers{};
805 bool needToStartReadAfterComplete{};
Ed Tanous1abe55e2018-09-05 08:30:59 -0700806
Ed Tanous1abe55e2018-09-05 08:30:59 -0700807 std::function<std::string()>& getCachedDateStr;
808 detail::TimerQueue& timerQueue;
Jan Sowinskiee52ae12020-01-09 16:28:32 +0000809
810 using std::enable_shared_from_this<
Ed Tanous52cc1122020-07-18 13:51:21 -0700811 Connection<Adaptor, Handler>>::shared_from_this;
Ed Tanous3112a142018-11-29 15:45:10 -0800812};
Ed Tanous1abe55e2018-09-05 08:30:59 -0700813} // namespace crow