init commit
This commit is contained in:
commit
565ee5ff1f
7 changed files with 1488 additions and 0 deletions
169
src/client.rs
Normal file
169
src/client.rs
Normal file
|
@ -0,0 +1,169 @@
|
|||
//! This example demonstrates an HTTP client that requests files from a server.
|
||||
//!
|
||||
//! Checkout the `README.md` for guidance.
|
||||
|
||||
use std::{
|
||||
fs,
|
||||
io::{self, Write},
|
||||
net::{SocketAddr, ToSocketAddrs},
|
||||
path::PathBuf,
|
||||
sync::Arc,
|
||||
time::{Duration, Instant},
|
||||
};
|
||||
|
||||
use anyhow::{Result, anyhow};
|
||||
use clap::Parser;
|
||||
use proto::crypto::rustls::QuicClientConfig;
|
||||
use rustls::pki_types::CertificateDer;
|
||||
use tracing::{error, info};
|
||||
use url::Url;
|
||||
|
||||
mod common;
|
||||
|
||||
/// HTTP/0.9 over QUIC client
|
||||
#[derive(Parser, Debug)]
|
||||
#[clap(name = "client")]
|
||||
struct Opt {
|
||||
/// Perform NSS-compatible TLS key logging to the file specified in `SSLKEYLOGFILE`.
|
||||
#[clap(long = "keylog")]
|
||||
keylog: bool,
|
||||
|
||||
url: Url,
|
||||
|
||||
/// Override hostname used for certificate verification
|
||||
#[clap(long = "host")]
|
||||
host: Option<String>,
|
||||
|
||||
/// Custom certificate authority to trust, in DER format
|
||||
#[clap(long = "ca")]
|
||||
ca: Option<PathBuf>,
|
||||
|
||||
/// Simulate NAT rebinding after connecting
|
||||
#[clap(long = "rebind")]
|
||||
rebind: bool,
|
||||
|
||||
/// Address to bind on
|
||||
#[clap(long = "bind", default_value = "[::]:0")]
|
||||
bind: SocketAddr,
|
||||
}
|
||||
|
||||
fn main() {
|
||||
tracing::subscriber::set_global_default(
|
||||
tracing_subscriber::FmtSubscriber::builder()
|
||||
.with_env_filter(tracing_subscriber::EnvFilter::from_default_env())
|
||||
.finish(),
|
||||
)
|
||||
.unwrap();
|
||||
let opt = Opt::parse();
|
||||
let code = {
|
||||
if let Err(e) = run(opt) {
|
||||
eprintln!("ERROR: {e}");
|
||||
1
|
||||
} else {
|
||||
0
|
||||
}
|
||||
};
|
||||
::std::process::exit(code);
|
||||
}
|
||||
|
||||
#[tokio::main]
|
||||
async fn run(options: Opt) -> Result<()> {
|
||||
let url = options.url;
|
||||
let url_host = strip_ipv6_brackets(url.host_str().unwrap());
|
||||
let remote = (url_host, url.port().unwrap_or(4433))
|
||||
.to_socket_addrs()?
|
||||
.next()
|
||||
.ok_or_else(|| anyhow!("couldn't resolve to an address"))?;
|
||||
|
||||
let mut roots = rustls::RootCertStore::empty();
|
||||
if let Some(ca_path) = options.ca {
|
||||
roots.add(CertificateDer::from(fs::read(ca_path)?))?;
|
||||
} else {
|
||||
let dirs = directories_next::ProjectDirs::from("org", "quinn", "quinn-examples").unwrap();
|
||||
match fs::read(dirs.data_local_dir().join("cert.der")) {
|
||||
Ok(cert) => {
|
||||
roots.add(CertificateDer::from(cert))?;
|
||||
}
|
||||
Err(ref e) if e.kind() == io::ErrorKind::NotFound => {
|
||||
info!("local server certificate not found");
|
||||
}
|
||||
Err(e) => {
|
||||
error!("failed to open local server certificate: {}", e);
|
||||
}
|
||||
}
|
||||
}
|
||||
let mut client_crypto = rustls::ClientConfig::builder()
|
||||
.with_root_certificates(roots)
|
||||
.with_no_client_auth();
|
||||
|
||||
client_crypto.alpn_protocols = common::ALPN_QUIC_HTTP.iter().map(|&x| x.into()).collect();
|
||||
if options.keylog {
|
||||
client_crypto.key_log = Arc::new(rustls::KeyLogFile::new());
|
||||
}
|
||||
|
||||
let client_config =
|
||||
quinn::ClientConfig::new(Arc::new(QuicClientConfig::try_from(client_crypto)?));
|
||||
let mut endpoint = quinn::Endpoint::client(options.bind)?;
|
||||
endpoint.set_default_client_config(client_config);
|
||||
|
||||
let request = format!("GET {}\r\n", url.path());
|
||||
let start = Instant::now();
|
||||
let rebind = options.rebind;
|
||||
let host = options.host.as_deref().unwrap_or(url_host);
|
||||
|
||||
eprintln!("connecting to {host} at {remote}");
|
||||
let conn = endpoint
|
||||
.connect(remote, host)?
|
||||
.await
|
||||
.map_err(|e| anyhow!("failed to connect: {}", e))?;
|
||||
eprintln!("connected at {:?}", start.elapsed());
|
||||
let (mut send, mut recv) = conn
|
||||
.open_bi()
|
||||
.await
|
||||
.map_err(|e| anyhow!("failed to open stream: {}", e))?;
|
||||
if rebind {
|
||||
let socket = std::net::UdpSocket::bind("[::]:0").unwrap();
|
||||
let addr = socket.local_addr().unwrap();
|
||||
eprintln!("rebinding to {addr}");
|
||||
endpoint.rebind(socket).expect("rebind failed");
|
||||
}
|
||||
|
||||
send.write_all(request.as_bytes())
|
||||
.await
|
||||
.map_err(|e| anyhow!("failed to send request: {}", e))?;
|
||||
send.finish().unwrap();
|
||||
let response_start = Instant::now();
|
||||
eprintln!("request sent at {:?}", response_start - start);
|
||||
let resp = recv
|
||||
.read_to_end(usize::MAX)
|
||||
.await
|
||||
.map_err(|e| anyhow!("failed to read response: {}", e))?;
|
||||
let duration = response_start.elapsed();
|
||||
eprintln!(
|
||||
"response received in {:?} - {} KiB/s",
|
||||
duration,
|
||||
resp.len() as f32 / (duration_secs(&duration) * 1024.0)
|
||||
);
|
||||
io::stdout().write_all(&resp).unwrap();
|
||||
io::stdout().flush().unwrap();
|
||||
conn.close(0u32.into(), b"done");
|
||||
|
||||
// Give the server a fair chance to receive the close packet
|
||||
endpoint.wait_idle().await;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn strip_ipv6_brackets(host: &str) -> &str {
|
||||
// An ipv6 url looks like eg https://[::1]:4433/Cargo.toml, wherein the host [::1] is the
|
||||
// ipv6 address ::1 wrapped in brackets, per RFC 2732. This strips those.
|
||||
if host.starts_with('[') && host.ends_with(']') {
|
||||
&host[1..host.len() - 1]
|
||||
} else {
|
||||
host
|
||||
}
|
||||
}
|
||||
|
||||
fn duration_secs(x: &Duration) -> f32 {
|
||||
x.as_secs() as f32 + x.subsec_nanos() as f32 * 1e-9
|
||||
}
|
3
src/main.rs
Normal file
3
src/main.rs
Normal file
|
@ -0,0 +1,3 @@
|
|||
fn main() {
|
||||
println!("Hello, world!");
|
||||
}
|
271
src/server.rs
Normal file
271
src/server.rs
Normal file
|
@ -0,0 +1,271 @@
|
|||
//! This example demonstrates an HTTP server that serves files from a directory.
|
||||
//!
|
||||
//! Checkout the `README.md` for guidance.
|
||||
|
||||
use std::{
|
||||
ascii, fs, io,
|
||||
net::SocketAddr,
|
||||
path::{self, Path, PathBuf},
|
||||
str,
|
||||
sync::Arc,
|
||||
};
|
||||
|
||||
use anyhow::{Context, Result, anyhow, bail};
|
||||
use clap::Parser;
|
||||
use proto::crypto::rustls::QuicServerConfig;
|
||||
use rustls::pki_types::{CertificateDer, PrivateKeyDer, PrivatePkcs8KeyDer};
|
||||
use tracing::{error, info, info_span};
|
||||
use tracing_futures::Instrument as _;
|
||||
|
||||
mod common;
|
||||
|
||||
#[derive(Parser, Debug)]
|
||||
#[clap(name = "server")]
|
||||
struct Opt {
|
||||
/// file to log TLS keys to for debugging
|
||||
#[clap(long = "keylog")]
|
||||
keylog: bool,
|
||||
/// directory to serve files from
|
||||
root: PathBuf,
|
||||
/// TLS private key in PEM format
|
||||
#[clap(short = 'k', long = "key", requires = "cert")]
|
||||
key: Option<PathBuf>,
|
||||
/// TLS certificate in PEM format
|
||||
#[clap(short = 'c', long = "cert", requires = "key")]
|
||||
cert: Option<PathBuf>,
|
||||
/// Enable stateless retries
|
||||
#[clap(long = "stateless-retry")]
|
||||
stateless_retry: bool,
|
||||
/// Address to listen on
|
||||
#[clap(long = "listen", default_value = "[::1]:4433")]
|
||||
listen: SocketAddr,
|
||||
/// Client address to block
|
||||
#[clap(long = "block")]
|
||||
block: Option<SocketAddr>,
|
||||
/// Maximum number of concurrent connections to allow
|
||||
#[clap(long = "connection-limit")]
|
||||
connection_limit: Option<usize>,
|
||||
}
|
||||
|
||||
fn main() {
|
||||
tracing::subscriber::set_global_default(
|
||||
tracing_subscriber::FmtSubscriber::builder()
|
||||
.with_env_filter(tracing_subscriber::EnvFilter::from_default_env())
|
||||
.finish(),
|
||||
)
|
||||
.unwrap();
|
||||
let opt = Opt::parse();
|
||||
let code = {
|
||||
if let Err(e) = run(opt) {
|
||||
eprintln!("ERROR: {e}");
|
||||
1
|
||||
} else {
|
||||
0
|
||||
}
|
||||
};
|
||||
::std::process::exit(code);
|
||||
}
|
||||
|
||||
#[tokio::main]
|
||||
async fn run(options: Opt) -> Result<()> {
|
||||
let (certs, key) = if let (Some(key_path), Some(cert_path)) = (&options.key, &options.cert) {
|
||||
let key = fs::read(key_path).context("failed to read private key")?;
|
||||
let key = if key_path.extension().is_some_and(|x| x == "der") {
|
||||
PrivateKeyDer::Pkcs8(PrivatePkcs8KeyDer::from(key))
|
||||
} else {
|
||||
rustls_pemfile::private_key(&mut &*key)
|
||||
.context("malformed PKCS #1 private key")?
|
||||
.ok_or_else(|| anyhow::Error::msg("no private keys found"))?
|
||||
};
|
||||
let cert_chain = fs::read(cert_path).context("failed to read certificate chain")?;
|
||||
let cert_chain = if cert_path.extension().is_some_and(|x| x == "der") {
|
||||
vec![CertificateDer::from(cert_chain)]
|
||||
} else {
|
||||
rustls_pemfile::certs(&mut &*cert_chain)
|
||||
.collect::<Result<_, _>>()
|
||||
.context("invalid PEM-encoded certificate")?
|
||||
};
|
||||
|
||||
(cert_chain, key)
|
||||
} else {
|
||||
let dirs = directories_next::ProjectDirs::from("org", "quinn", "quinn-examples").unwrap();
|
||||
let path = dirs.data_local_dir();
|
||||
let cert_path = path.join("cert.der");
|
||||
let key_path = path.join("key.der");
|
||||
let (cert, key) = match fs::read(&cert_path).and_then(|x| Ok((x, fs::read(&key_path)?))) {
|
||||
Ok((cert, key)) => (
|
||||
CertificateDer::from(cert),
|
||||
PrivateKeyDer::try_from(key).map_err(anyhow::Error::msg)?,
|
||||
),
|
||||
Err(ref e) if e.kind() == io::ErrorKind::NotFound => {
|
||||
info!("generating self-signed certificate");
|
||||
let cert = rcgen::generate_simple_self_signed(vec!["localhost".into()]).unwrap();
|
||||
let key = PrivatePkcs8KeyDer::from(cert.signing_key.serialize_der());
|
||||
let cert = cert.cert.into();
|
||||
fs::create_dir_all(path).context("failed to create certificate directory")?;
|
||||
fs::write(&cert_path, &cert).context("failed to write certificate")?;
|
||||
fs::write(&key_path, key.secret_pkcs8_der())
|
||||
.context("failed to write private key")?;
|
||||
(cert, key.into())
|
||||
}
|
||||
Err(e) => {
|
||||
bail!("failed to read certificate: {}", e);
|
||||
}
|
||||
};
|
||||
|
||||
(vec![cert], key)
|
||||
};
|
||||
|
||||
let mut server_crypto = rustls::ServerConfig::builder()
|
||||
.with_no_client_auth()
|
||||
.with_single_cert(certs, key)?;
|
||||
server_crypto.alpn_protocols = common::ALPN_QUIC_HTTP.iter().map(|&x| x.into()).collect();
|
||||
if options.keylog {
|
||||
server_crypto.key_log = Arc::new(rustls::KeyLogFile::new());
|
||||
}
|
||||
|
||||
let mut server_config =
|
||||
quinn::ServerConfig::with_crypto(Arc::new(QuicServerConfig::try_from(server_crypto)?));
|
||||
let transport_config = Arc::get_mut(&mut server_config.transport).unwrap();
|
||||
transport_config.max_concurrent_uni_streams(0_u8.into());
|
||||
|
||||
let root = Arc::<Path>::from(options.root.clone());
|
||||
if !root.exists() {
|
||||
bail!("root path does not exist");
|
||||
}
|
||||
|
||||
let endpoint = quinn::Endpoint::server(server_config, options.listen)?;
|
||||
eprintln!("listening on {}", endpoint.local_addr()?);
|
||||
|
||||
while let Some(conn) = endpoint.accept().await {
|
||||
if options
|
||||
.connection_limit
|
||||
.is_some_and(|n| endpoint.open_connections() >= n)
|
||||
{
|
||||
info!("refusing due to open connection limit");
|
||||
conn.refuse();
|
||||
} else if Some(conn.remote_address()) == options.block {
|
||||
info!("refusing blocked client IP address");
|
||||
conn.refuse();
|
||||
} else if options.stateless_retry && !conn.remote_address_validated() {
|
||||
info!("requiring connection to validate its address");
|
||||
conn.retry().unwrap();
|
||||
} else {
|
||||
info!("accepting connection");
|
||||
let fut = handle_connection(root.clone(), conn);
|
||||
tokio::spawn(async move {
|
||||
if let Err(e) = fut.await {
|
||||
error!("connection failed: {reason}", reason = e.to_string())
|
||||
}
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
async fn handle_connection(root: Arc<Path>, conn: quinn::Incoming) -> Result<()> {
|
||||
let connection = conn.await?;
|
||||
let span = info_span!(
|
||||
"connection",
|
||||
remote = %connection.remote_address(),
|
||||
protocol = %connection
|
||||
.handshake_data()
|
||||
.unwrap()
|
||||
.downcast::<quinn::crypto::rustls::HandshakeData>().unwrap()
|
||||
.protocol
|
||||
.map_or_else(|| "<none>".into(), |x| String::from_utf8_lossy(&x).into_owned())
|
||||
);
|
||||
async {
|
||||
info!("established");
|
||||
|
||||
// Each stream initiated by the client constitutes a new request.
|
||||
loop {
|
||||
let stream = connection.accept_bi().await;
|
||||
let stream = match stream {
|
||||
Err(quinn::ConnectionError::ApplicationClosed { .. }) => {
|
||||
info!("connection closed");
|
||||
return Ok(());
|
||||
}
|
||||
Err(e) => {
|
||||
return Err(e);
|
||||
}
|
||||
Ok(s) => s,
|
||||
};
|
||||
let fut = handle_request(root.clone(), stream);
|
||||
tokio::spawn(
|
||||
async move {
|
||||
if let Err(e) = fut.await {
|
||||
error!("failed: {reason}", reason = e.to_string());
|
||||
}
|
||||
}
|
||||
.instrument(info_span!("request")),
|
||||
);
|
||||
}
|
||||
}
|
||||
.instrument(span)
|
||||
.await?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
async fn handle_request(
|
||||
root: Arc<Path>,
|
||||
(mut send, mut recv): (quinn::SendStream, quinn::RecvStream),
|
||||
) -> Result<()> {
|
||||
let req = recv
|
||||
.read_to_end(64 * 1024)
|
||||
.await
|
||||
.map_err(|e| anyhow!("failed reading request: {}", e))?;
|
||||
let mut escaped = String::new();
|
||||
for &x in &req[..] {
|
||||
let part = ascii::escape_default(x).collect::<Vec<_>>();
|
||||
escaped.push_str(str::from_utf8(&part).unwrap());
|
||||
}
|
||||
info!(content = %escaped);
|
||||
// Execute the request
|
||||
let resp = process_get(&root, &req).unwrap_or_else(|e| {
|
||||
error!("failed: {}", e);
|
||||
format!("failed to process request: {e}\n").into_bytes()
|
||||
});
|
||||
// Write the response
|
||||
send.write_all(&resp)
|
||||
.await
|
||||
.map_err(|e| anyhow!("failed to send response: {}", e))?;
|
||||
// Gracefully terminate the stream
|
||||
send.finish().unwrap();
|
||||
info!("complete");
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn process_get(root: &Path, x: &[u8]) -> Result<Vec<u8>> {
|
||||
if x.len() < 4 || &x[0..4] != b"GET " {
|
||||
bail!("missing GET");
|
||||
}
|
||||
if x[4..].len() < 2 || &x[x.len() - 2..] != b"\r\n" {
|
||||
bail!("missing \\r\\n");
|
||||
}
|
||||
let x = &x[4..x.len() - 2];
|
||||
let end = x.iter().position(|&c| c == b' ').unwrap_or(x.len());
|
||||
let path = str::from_utf8(&x[..end]).context("path is malformed UTF-8")?;
|
||||
let path = Path::new(&path);
|
||||
let mut real_path = PathBuf::from(root);
|
||||
let mut components = path.components();
|
||||
match components.next() {
|
||||
Some(path::Component::RootDir) => {}
|
||||
_ => {
|
||||
bail!("path must be absolute");
|
||||
}
|
||||
}
|
||||
for c in components {
|
||||
match c {
|
||||
path::Component::Normal(x) => {
|
||||
real_path.push(x);
|
||||
}
|
||||
x => {
|
||||
bail!("illegal component in path: {:?}", x);
|
||||
}
|
||||
}
|
||||
}
|
||||
let data = fs::read(&real_path).context("failed reading file")?;
|
||||
Ok(data)
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue