#![warn(clippy::pedantic, clippy::nursery, clippy::all, clippy::cargo)]
#![allow(clippy::multiple_crate_versions, clippy::module_name_repetitions)]
#![feature(addr_parse_ascii)]
use std::{net::SocketAddr, sync::LazyLock};
use anyhow::{Result, bail};
use arti_client::{TorClient, TorClientConfig};
use axum::{Router, extract::connect_info::Connected as AxumConnected};
use futures::StreamExt;
use hyper::{Request, body::Incoming};
use hyper_util::rt::{TokioExecutor, TokioIo};
use tokio::sync::Mutex;
use tor_cell::relaycell::msg::EndReason; use tor_cell::relaycell::msg::{Connected, End}; use tor_hsservice::{HsNickname, StreamRequest, config::OnionServiceConfigBuilder};
use tor_proto::stream::{ClientStreamCtrl, IncomingStreamRequest};
use tor_rtcompat::tokio::TokioNativeTlsRuntime;
use tower_service::Service;
use tracing::{Level, event, span};
extern crate rcgen;
use std::sync::Arc;
use rcgen::generate_simple_self_signed;
use tokio_rustls::{
TlsAcceptor, rustls, rustls::pki_types::{PrivateKeyDer, PrivatePkcs8KeyDer, pem::PemObject}
};
static ONION_NAME: LazyLock<Mutex<String>> = LazyLock::new(|| Mutex::new(String::new()));
pub fn get_onion_name() -> String {
ONION_NAME.try_lock().map_or_else(|_| String::new(), |guard| (*guard.clone()).to_string())
}
pub async fn serve(app: Router, nickname: &str) -> Result<()> {
let serve_trace_span = span!(Level::INFO, "onyums - serve");
let _info_trace_guard = serve_trace_span.enter();
event!(Level::INFO, "Setting up onion service...");
event!(Level::INFO, "Creating Tor client...");
let config = TorClientConfig::default();
let Ok(runtime) = TokioNativeTlsRuntime::current() else {
event!(Level::ERROR, "Failed to get current tokio runtime.");
bail!("Failed to get current tokio runtime.");
};
let client = TorClient::with_runtime(runtime);
let Ok(client) = client.config(config).create_bootstrapped().await else {
event!(Level::ERROR, "Failed to create bootstrapped Tor client.");
bail!("Failed to create bootstrapped Tor client.");
};
event!(Level::INFO, "Launching onion service...");
let Ok(nickname) = nickname.parse::<HsNickname>() else {
event!(Level::ERROR, "Failed to parse nickname.");
bail!("Failed to parse nickname.");
};
let Ok(svc_cfg) = OnionServiceConfigBuilder::default().nickname(nickname).build() else {
event!(Level::ERROR, "Failed to build onion service config.");
bail!("Failed to build onion service config.");
};
let Ok((service, request_stream)) = client.launch_onion_service(svc_cfg) else {
event!(Level::ERROR, "Failed to launch onion service.");
bail!("Failed to launch onion service.");
};
event!(Level::INFO, "Getting the onion service name...");
let Some(service_name) = service.onion_address() else {
event!(Level::ERROR, "Failed to get onion service name.");
bail!("Failed to get onion service name.");
};
let service_name = service_name.to_string();
event!(Level::INFO, "Onion service name: {service_name}");
ONION_NAME.lock().await.clone_from(&service_name);
let tls_acceptor = match tls_acceptor() {
Ok(tls_acceptor) => tls_acceptor,
Err(e) => {
event!(Level::ERROR, "Creating TLS acceptor: {:?}", e);
bail!(format!("Creating TLS acceptor: {:?}", e))
}
};
event!(Level::INFO, "Creating a stream to handle incoming requests...");
let stream_requests = tor_hsservice::handle_rend_requests(request_stream);
tokio::pin!(stream_requests);
event!(Level::INFO, "Waiting for Incoming request...");
while let Some(stream_request) = stream_requests.next().await {
let incoming_request_trace_span = span!(Level::INFO, "onyums - incoming_request");
let _requests_trace_guard = incoming_request_trace_span.enter();
event!(Level::INFO, "New incoming request found...");
let app = app.clone();
let tls_acceptor = tls_acceptor.clone();
tokio::spawn(async move {
let result = handle_stream_request(stream_request, tls_acceptor, app.clone()).await;
if let Err(err) = result {
event!(Level::INFO, "Connection closed: Error handling stream request: {err}");
}
});
}
drop(service);
event!(Level::INFO, "Onion service exited cleanly.");
bail!("Onion service exited cleanly");
}
async fn handle_stream_request(stream_request: StreamRequest, tls_acceptor: TlsAcceptor, app: Router) -> Result<()> {
let hadling_request_trace_span = span!(Level::INFO, "onyums - hadling_request");
let _hadling_request_trace_guard = hadling_request_trace_span.enter();
match stream_request.request().clone() {
IncomingStreamRequest::Begin(begin) if begin.port() == 443 => {
event!(Level::INFO, "Accepting the incoming stream and wraping it in a TLS stream...");
let Ok(onion_service_stream) = stream_request.accept(Connected::new_empty()).await else {
event!(Level::ERROR, "Failed to accept onion service stream.");
bail!("failed to accept onion service stream");
};
let circuit_id = onion_service_stream.client_stream_ctrl().and_then(|ctrl_stream| ctrl_stream.circuit().map(|circuit| circuit.unique_id().to_string()));
let connect_info = ConnectionInfo { circuit_id, socket_addr: None };
let tls_onion_service_stream = match tls_acceptor.accept(onion_service_stream).await {
Ok(stream) => stream,
Err(e) => {
event!(Level::ERROR, "Failed to accept TLS stream: {:?}", e); bail!(format!("failed to accept TLS stream: {:?}", e));
}
};
event!(Level::INFO, "Wrapping the steam for tokio compatability...");
let stream = TokioIo::new(tls_onion_service_stream);
let hyper_service = hyper::service::service_fn(move |request: Request<Incoming>| {
let connect_info = connect_info.clone();
let app = app.clone();
std::thread::spawn(move || {
event!(Level::INFO, "Creating tokio runtime...");
let runtime = tokio::runtime::Builder::new_current_thread().enable_all().build().unwrap();
#[allow(clippy::async_yields_async)]
runtime.block_on(async {
event!(Level::INFO, "Serving connection...");
app.clone().into_make_service_with_connect_info::<ConnectionInfo>().call(connect_info.clone()).await.unwrap().call(request)
})
})
.join()
.unwrap()
});
event!(Level::INFO, "Serving the connection with hyper...");
let ret = hyper_util::server::conn::auto::Builder::new(TokioExecutor::new()).serve_connection_with_upgrades(stream, hyper_service).await;
if let Err(err) = ret {
event!(Level::ERROR, "Error serving connection: {err}");
}
}
IncomingStreamRequest::Begin(begin) if begin.port() == 80 => {
event!(Level::INFO, "Rejecting plain HTTP request on port 80.");
let end_msg = End::new_with_reason(EndReason::MISC);
stream_request.reject(end_msg).await?; }
_ => {
event!(Level::INFO, "Rejecting the incoming request {:?}...", stream_request.request());
stream_request.shutdown_circuit()?;
}
}
Ok(())
}
#[derive(Clone, Debug, Default)]
pub struct ConnectionInfo {
pub circuit_id: Option<String>,
pub socket_addr: Option<SocketAddr>,
}
impl AxumConnected<Request<Incoming>> for ConnectionInfo {
fn connect_info(target: Request<Incoming>) -> Self {
Self { circuit_id: target.extensions().get::<Self>().unwrap().circuit_id.clone(), socket_addr: None }
}
}
impl AxumConnected<Self> for ConnectionInfo {
fn connect_info(target: Self) -> Self {
target
}
}
fn tls_acceptor() -> Result<TlsAcceptor> {
let onion_name = get_onion_name();
let subject_alt_names = vec![onion_name];
let cert = generate_simple_self_signed(subject_alt_names).unwrap();
let key_der = match PrivatePkcs8KeyDer::from_pem_slice(cert.key_pair.serialize_pem().as_bytes()) {
Ok(key_der) => PrivateKeyDer::Pkcs8(key_der),
Err(e) => {
event!(Level::ERROR, "Error converting key to der: {:?}", e);
bail!(format!("Error converting key to der: {:?}", e))
}
};
let server_config = match rustls::ServerConfig::builder().with_no_client_auth().with_single_cert(vec![cert.cert.der().clone()], key_der) {
Ok(server_config) => server_config,
Err(e) => {
event!(Level::ERROR, "Error creating server config: {:?}", e);
bail!(format!("Error creating server config: {:?}", e))
}
};
let acceptor = TlsAcceptor::from(Arc::new(server_config));
Ok(acceptor)
}
#[cfg(test)]
mod tests {
use axum::{Router, routing::get};
use super::*;
#[tokio::test]
async fn test_serve() {
let tracing_subscriber = tracing_subscriber::fmt().with_max_level(tracing::Level::DEBUG).finish();
tracing::subscriber::set_global_default(tracing_subscriber).expect("setting default subscriber failed");
let app = Router::new().route("/", get(|| async { "Hello, World!" }));
let nickname = "onyums-yum-yum-test2";
match serve(app, nickname).await {
Ok(()) => (),
Err(e) => event!(Level::DEBUG, "Error serving onion service: {e}"),
}
}
}