conduit/src/server_server.rs

177 lines
5.3 KiB
Rust
Raw Normal View History

use crate::{Database, MatrixResult};
2020-04-22 09:53:06 +00:00
use http::header::{HeaderValue, AUTHORIZATION};
2020-04-22 18:55:11 +00:00
use log::error;
use rocket::{get, response::content::Json, State};
2020-04-25 09:47:32 +00:00
use ruma_api::Endpoint;
use ruma_client_api::error::Error;
2020-04-22 18:55:11 +00:00
use ruma_federation_api::{v1::get_server_version, v2::get_server_keys};
use serde_json::json;
use std::{
2020-04-25 09:47:32 +00:00
collections::BTreeMap,
convert::TryFrom,
2020-04-22 18:55:11 +00:00
time::{Duration, SystemTime},
};
2020-04-19 12:14:47 +00:00
pub async fn request_well_known(db: &crate::Database, destination: &str) -> Option<String> {
let body: serde_json::Value = serde_json::from_str(
&db.globals
.reqwest_client()
.get(&format!(
"https://{}/.well-known/matrix/server",
destination
))
.send()
.await
.ok()?
.text()
.await
.ok()?,
)
.ok()?;
2020-04-26 20:39:15 +00:00
Some(body.get("m.server")?.as_str()?.to_owned())
}
2020-04-22 09:53:06 +00:00
pub async fn send_request<T: Endpoint>(
db: &crate::Database,
2020-04-19 12:14:47 +00:00
destination: String,
request: T,
2020-04-25 09:47:32 +00:00
) -> Option<T::Response> {
2020-04-19 12:14:47 +00:00
let mut http_request: http::Request<_> = request.try_into().unwrap();
2020-04-25 09:47:32 +00:00
let actual_destination = "https://".to_owned()
+ &request_well_known(db, &destination)
.await
.unwrap_or(destination.clone() + ":8448");
*http_request.uri_mut() = (actual_destination + T::METADATA.path).parse().unwrap();
2020-04-22 09:53:06 +00:00
2020-04-22 19:14:40 +00:00
let mut request_map = serde_json::Map::new();
2020-04-19 12:14:47 +00:00
2020-04-22 19:14:40 +00:00
if !http_request.body().is_empty() {
2020-04-25 09:47:32 +00:00
request_map.insert(
"content".to_owned(),
serde_json::to_value(http_request.body()).unwrap(),
);
2020-04-22 19:14:40 +00:00
};
2020-04-19 12:14:47 +00:00
2020-04-22 09:53:06 +00:00
request_map.insert("method".to_owned(), T::METADATA.method.to_string().into());
2020-04-22 19:14:40 +00:00
request_map.insert("uri".to_owned(), T::METADATA.path.into());
2020-05-06 13:36:44 +00:00
request_map.insert("origin".to_owned(), db.globals.server_name().into());
2020-04-26 20:39:15 +00:00
request_map.insert("destination".to_owned(), destination.into());
2020-04-22 19:14:40 +00:00
let mut request_json = request_map.into();
2020-05-09 19:47:09 +00:00
ruma_signatures::sign_json(
2020-05-06 13:36:44 +00:00
db.globals.server_name(),
2020-05-09 19:47:09 +00:00
db.globals.keypair(),
&mut request_json,
)
.unwrap();
2020-04-19 12:14:47 +00:00
2020-04-22 09:53:06 +00:00
let signatures = request_json["signatures"]
.as_object()
.unwrap()
.values()
.next()
.unwrap()
.as_object()
.unwrap()
.iter()
.map(|(k, v)| (k, v.as_str().unwrap()));
for s in signatures {
2020-04-22 18:55:11 +00:00
http_request.headers_mut().insert(
AUTHORIZATION,
HeaderValue::from_str(&format!(
"X-Matrix origin={},key=\"{}\",sig=\"{}\"",
2020-05-06 13:36:44 +00:00
db.globals.server_name(),
2020-04-22 18:55:11 +00:00
s.0,
s.1
))
.unwrap(),
);
2020-04-22 09:53:06 +00:00
}
2020-05-09 19:47:09 +00:00
let reqwest_response = db
.globals
.reqwest_client()
.execute(http_request.into())
.await;
2020-04-22 09:53:06 +00:00
// Because reqwest::Response -> http::Response is complicated:
match reqwest_response {
Ok(mut reqwest_response) => {
let status = reqwest_response.status();
let mut http_response = http::Response::builder().status(status);
let headers = http_response.headers_mut().unwrap();
for (k, v) in reqwest_response.headers_mut().drain() {
if let Some(key) = k {
headers.insert(key, v);
}
}
let body = reqwest_response
.bytes()
.await
.unwrap()
.into_iter()
.collect();
2020-04-22 18:55:11 +00:00
Some(
2020-04-25 09:47:32 +00:00
<T::Response>::try_from(http_response.body(body).unwrap())
.ok()
.unwrap(),
2020-04-22 18:55:11 +00:00
)
2020-04-22 09:53:06 +00:00
}
Err(e) => {
2020-04-25 09:47:32 +00:00
error!("{}", e);
2020-04-22 09:53:06 +00:00
None
}
}
2020-04-19 12:14:47 +00:00
}
2020-04-22 18:55:11 +00:00
#[get("/.well-known/matrix/server")]
pub fn well_known_server() -> Json<String> {
2020-04-22 18:55:11 +00:00
rocket::response::content::Json(
json!({ "m.server": "matrixtesting.koesters.xyz:14004"}).to_string(),
)
}
#[get("/_matrix/federation/v1/version")]
2020-04-25 09:47:32 +00:00
pub fn get_server_version() -> MatrixResult<get_server_version::Response, Error> {
2020-04-22 18:55:11 +00:00
MatrixResult(Ok(get_server_version::Response {
2020-04-28 18:03:14 +00:00
server: Some(get_server_version::Server {
2020-04-22 18:55:11 +00:00
name: Some("Conduit".to_owned()),
version: Some(env!("CARGO_PKG_VERSION").to_owned()),
2020-04-28 18:03:14 +00:00
}),
2020-04-22 18:55:11 +00:00
}))
}
2020-04-25 09:47:32 +00:00
#[get("/_matrix/key/v2/server")]
pub fn get_server_keys(db: State<'_, Database>) -> Json<String> {
2020-04-22 18:55:11 +00:00
let mut verify_keys = BTreeMap::new();
verify_keys.insert(
format!("ed25519:{}", db.globals.keypair().version()),
2020-04-22 18:55:11 +00:00
get_server_keys::VerifyKey {
key: base64::encode_config(db.globals.keypair().public_key(), base64::STANDARD_NO_PAD),
2020-04-22 18:55:11 +00:00
},
);
let mut response = serde_json::from_slice(
http::Response::try_from(get_server_keys::Response {
2020-05-06 13:36:44 +00:00
server_name: db.globals.server_name().to_owned(),
2020-04-22 18:55:11 +00:00
verify_keys,
old_verify_keys: BTreeMap::new(),
signatures: BTreeMap::new(),
2020-04-25 09:47:32 +00:00
valid_until_ts: SystemTime::now() + Duration::from_secs(60 * 2),
2020-04-22 18:55:11 +00:00
})
.unwrap()
.body(),
)
.unwrap();
2020-05-06 13:36:44 +00:00
ruma_signatures::sign_json(db.globals.server_name(), db.globals.keypair(), &mut response).unwrap();
2020-04-25 09:47:32 +00:00
Json(response.to_string())
2020-04-22 18:55:11 +00:00
}
2020-04-25 09:47:32 +00:00
#[get("/_matrix/key/v2/server/<_key_id>")]
pub fn get_server_keys_deprecated(db: State<'_, Database>, _key_id: String) -> Json<String> {
get_server_keys(db)
2020-04-22 18:55:11 +00:00
}