mirror of
https://forgejo.ellis.link/continuwuation/continuwuity.git
synced 2025-06-26 16:26:37 +02:00
This is helpful to, for example, bind to an interface that can only access the public internet. The resulting setup is less maintenance-heavy / error-prone than manually maintaining a deny/ allowlist to protect internal resources. Signed-off-by: Jade Ellis <jade@ellis.link>
182 lines
5.1 KiB
Rust
182 lines
5.1 KiB
Rust
use std::{sync::Arc, time::Duration};
|
|
|
|
use conduit::{err, implement, trace, Config, Result};
|
|
use ipaddress::IPAddress;
|
|
use reqwest::redirect;
|
|
|
|
use crate::{resolver, service};
|
|
|
|
pub struct Service {
|
|
pub default: reqwest::Client,
|
|
pub url_preview: reqwest::Client,
|
|
pub extern_media: reqwest::Client,
|
|
pub well_known: reqwest::Client,
|
|
pub federation: reqwest::Client,
|
|
pub synapse: reqwest::Client,
|
|
pub sender: reqwest::Client,
|
|
pub appservice: reqwest::Client,
|
|
pub pusher: reqwest::Client,
|
|
|
|
pub cidr_range_denylist: Vec<IPAddress>,
|
|
}
|
|
|
|
impl crate::Service for Service {
|
|
fn build(args: crate::Args<'_>) -> Result<Arc<Self>> {
|
|
let config = &args.server.config;
|
|
let resolver = args.require::<resolver::Service>("resolver");
|
|
|
|
let url_preview_builder = base(config)?
|
|
.dns_resolver(resolver.resolver.clone())
|
|
.redirect(redirect::Policy::limited(3));
|
|
|
|
#[cfg(any(target_os = "android", target_os = "fuchsia", target_os = "linux"))]
|
|
let url_preview_builder = if let Some(interface) = &config.url_preview_bound_interface {
|
|
url_preview_builder.interface(interface)
|
|
} else {
|
|
url_preview_builder
|
|
};
|
|
|
|
Ok(Arc::new(Self {
|
|
default: base(config)?
|
|
.dns_resolver(resolver.resolver.clone())
|
|
.build()?,
|
|
|
|
url_preview: url_preview_builder.build()?,
|
|
|
|
extern_media: base(config)?
|
|
.dns_resolver(resolver.resolver.clone())
|
|
.redirect(redirect::Policy::limited(3))
|
|
.build()?,
|
|
|
|
well_known: base(config)?
|
|
.dns_resolver(resolver.resolver.hooked.clone())
|
|
.connect_timeout(Duration::from_secs(config.well_known_conn_timeout))
|
|
.read_timeout(Duration::from_secs(config.well_known_timeout))
|
|
.timeout(Duration::from_secs(config.well_known_timeout))
|
|
.pool_max_idle_per_host(0)
|
|
.redirect(redirect::Policy::limited(4))
|
|
.build()?,
|
|
|
|
federation: base(config)?
|
|
.dns_resolver(resolver.resolver.hooked.clone())
|
|
.read_timeout(Duration::from_secs(config.federation_timeout))
|
|
.pool_max_idle_per_host(config.federation_idle_per_host.into())
|
|
.pool_idle_timeout(Duration::from_secs(config.federation_idle_timeout))
|
|
.redirect(redirect::Policy::limited(3))
|
|
.build()?,
|
|
|
|
synapse: base(config)?
|
|
.dns_resolver(resolver.resolver.hooked.clone())
|
|
.read_timeout(Duration::from_secs(305))
|
|
.pool_max_idle_per_host(0)
|
|
.redirect(redirect::Policy::limited(3))
|
|
.build()?,
|
|
|
|
sender: base(config)?
|
|
.dns_resolver(resolver.resolver.hooked.clone())
|
|
.read_timeout(Duration::from_secs(config.sender_timeout))
|
|
.timeout(Duration::from_secs(config.sender_timeout))
|
|
.pool_max_idle_per_host(1)
|
|
.pool_idle_timeout(Duration::from_secs(config.sender_idle_timeout))
|
|
.redirect(redirect::Policy::limited(2))
|
|
.build()?,
|
|
|
|
appservice: base(config)?
|
|
.dns_resolver(resolver.resolver.clone())
|
|
.connect_timeout(Duration::from_secs(5))
|
|
.read_timeout(Duration::from_secs(config.appservice_timeout))
|
|
.timeout(Duration::from_secs(config.appservice_timeout))
|
|
.pool_max_idle_per_host(1)
|
|
.pool_idle_timeout(Duration::from_secs(config.appservice_idle_timeout))
|
|
.redirect(redirect::Policy::limited(2))
|
|
.build()?,
|
|
|
|
pusher: base(config)?
|
|
.dns_resolver(resolver.resolver.clone())
|
|
.pool_max_idle_per_host(1)
|
|
.pool_idle_timeout(Duration::from_secs(config.pusher_idle_timeout))
|
|
.redirect(redirect::Policy::limited(2))
|
|
.build()?,
|
|
|
|
cidr_range_denylist: config
|
|
.ip_range_denylist
|
|
.iter()
|
|
.map(IPAddress::parse)
|
|
.inspect(|cidr| trace!("Denied CIDR range: {cidr:?}"))
|
|
.collect::<Result<_, String>>()
|
|
.map_err(|e| err!(Config("ip_range_denylist", e)))?,
|
|
}))
|
|
}
|
|
|
|
fn name(&self) -> &str { service::make_name(std::module_path!()) }
|
|
}
|
|
|
|
fn base(config: &Config) -> Result<reqwest::ClientBuilder> {
|
|
let mut builder = reqwest::Client::builder()
|
|
.hickory_dns(true)
|
|
.connect_timeout(Duration::from_secs(config.request_conn_timeout))
|
|
.read_timeout(Duration::from_secs(config.request_timeout))
|
|
.timeout(Duration::from_secs(config.request_total_timeout))
|
|
.pool_idle_timeout(Duration::from_secs(config.request_idle_timeout))
|
|
.pool_max_idle_per_host(config.request_idle_per_host.into())
|
|
.user_agent(conduit::version::user_agent())
|
|
.redirect(redirect::Policy::limited(6))
|
|
.connection_verbose(true);
|
|
|
|
#[cfg(feature = "gzip_compression")]
|
|
{
|
|
builder = if config.gzip_compression {
|
|
builder.gzip(true)
|
|
} else {
|
|
builder.gzip(false).no_gzip()
|
|
};
|
|
};
|
|
|
|
#[cfg(feature = "brotli_compression")]
|
|
{
|
|
builder = if config.brotli_compression {
|
|
builder.brotli(true)
|
|
} else {
|
|
builder.brotli(false).no_brotli()
|
|
};
|
|
};
|
|
|
|
#[cfg(feature = "zstd_compression")]
|
|
{
|
|
builder = if config.zstd_compression {
|
|
builder.zstd(true)
|
|
} else {
|
|
builder.zstd(false).no_zstd()
|
|
};
|
|
};
|
|
|
|
#[cfg(not(feature = "gzip_compression"))]
|
|
{
|
|
builder = builder.no_gzip();
|
|
};
|
|
|
|
#[cfg(not(feature = "brotli_compression"))]
|
|
{
|
|
builder = builder.no_brotli();
|
|
};
|
|
|
|
#[cfg(not(feature = "zstd_compression"))]
|
|
{
|
|
builder = builder.no_zstd();
|
|
};
|
|
|
|
if let Some(proxy) = config.proxy.to_proxy()? {
|
|
Ok(builder.proxy(proxy))
|
|
} else {
|
|
Ok(builder)
|
|
}
|
|
}
|
|
|
|
#[inline]
|
|
#[must_use]
|
|
#[implement(Service)]
|
|
pub fn valid_cidr_range(&self, ip: &IPAddress) -> bool {
|
|
self.cidr_range_denylist
|
|
.iter()
|
|
.all(|cidr| !cidr.includes(ip))
|
|
}
|