Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Better support for UNIX Domain sockets #228

Merged
merged 5 commits into from
Jun 2, 2020

Conversation

dimitribouniol
Copy link
Contributor

@dimitribouniol dimitribouniol commented May 27, 2020

These changes upgrade the unix domain socket handling to address the following issues:

  • Using socket paths currently requires obtuse URL objects with a specially constructed baseURL. These are not easily serializable as strings.
  • It is currently not possible to connect to a server over a socket path that uses TLS.

To maintain backward compatibility, this PR introduces two new URL schemes: http+unix://, and https+unix://. These url schemes, while not universal, are used in a standard way by other services (some - examples), and work by %-encoding the socket path as the url hostname. These are easy to construct using standard swift types:

let socketURL = URL(string: "https+unix://\(path.addingPercentEncoding(withAllowedCharacters: .urlHostAllowed)!)/echo-uri")

This produces a url that looks something like this: https+unix://%2Ftmp%2FfilePath.socket/echo-uri, which is fully supported by URL, and can be serialized and deserialized to and from a String easily.

When the https+unix:// URL scheme is used, TLS is turned on. It is still up to the user to perform certificate validation under this scheme, but at the very least an encrypted connection over a socket is now possible if the server is configured to only provide such a configuration.

I'd also like to think I did a good job keeping things neat and tidy, and inline with the style of the repo, but I'm open to any and all feedback! (This is my first time contributing to any large open source project, so please be kind 😅)

Where to go from here

Some future improvements that can be made:

  • More tests…
  • Some documentation on Request outlining the different possibilities.
  • It would be nice to have a factory on URL to build a unix socket URL from a socket path and server path.
  • We need some constants for "http", "https", "unix", "http+unix", and "https+unix" - it's a bit unwieldy at the moment.
  • Perhaps deprecating the unix: scheme for the next major version? It's use is a bit unwieldy from a user's point of view (especially as many frameworks like Vapor have client constructors that take in strings as the URLs), and I doubt its currently widely used.

Motivation:

Using a base URL as the socket path only works when the URL object is maintained as long as possible through the stack. Additionally, it doesn't currently provide a way to use TLS over UNIX sockets.

Modifications:

Added two tests to test out the to-be supported URL schemes, http+unix, and https+unix, which encode the socket path as a %-escaped hostname, as some existing services already do.

Result:

Some failing tests.
@swift-server-bot
Copy link

Can one of the admins verify this patch?

3 similar comments
@swift-server-bot
Copy link

Can one of the admins verify this patch?

@swift-server-bot
Copy link

Can one of the admins verify this patch?

@swift-server-bot
Copy link

Can one of the admins verify this patch?

Copy link
Collaborator

@Lukasa Lukasa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cool, this generally looks really good! I'm in favour of the change, but I have a few notes in the diff.

/// Socket path, resolved from `URL`.
public let socketPath: String
/// URI, resolved from `URL`.
public let uri: String
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it necessary for either of these to be public? In particular, uri is extremely not well distinguished from url, and if we're keeping both in the API we really need to explain how they differ.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not at all — continuing on that thought, the host will be empty for socket-based Requests, even though that's where its encoded… Should we merge the implementations to make the socket path available as the host?

func supports(scheme: String) -> Bool {
switch self {
case .host:
return Kind.hostSchemes.contains(scheme)
case .unixSocket:
case .unixSocket(scheme: _):
return Kind.unixSchemes.contains(scheme)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This supports spelling is getting unwieldy here, not least because we're no longer using half of the switch statement. Should this just be a constructor of Kind from String?

Copy link
Contributor Author

@dimitribouniol dimitribouniol May 27, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not too sure — we are already constructing Kind from String in https://github.com/swift-server/async-http-client/pull/228/files#diff-67e2f60fc709da32af89dfbfc0c774aaR116-R129, so that method can certainly be fixed up to no longer rely on supports().

My bigger question is that supports() seems like it is being used by some redirect logic here:

guard self.request.kind.supports(scheme: self.request.scheme) else {

image

It seems like the older version was just making sure that the new scheme matched http/https - while the one currently in the repo will only accept http redirects from http requests, and socket redirects from socket requests. @krzyzanowskim Do you remember more about why you set it up this way?

I propose that if the request is an http request, we keep it as such, but if it is a socket request, we allow it to redirect to any supported scheme, but that is based on my limited understanding of what's going on here 😅

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I propose that if the request is an http request, we keep it as such, but if it is a socket request, we allow it to redirect to any supported scheme, but that is based on my limited understanding of what's going on here 😅

Yeah, that seems a reasonable design choice.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would you support refactoring this method to something like this, since it is now only used for redirects?
image

Call site (which was checking against the old scheme for some reason that escapes me):
image

This would also simplify the initializer tremendously:
image

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@krzyzanowskim Do you remember more about why you set it up this way?

Sorry, I don't remember details at the moment. I'm sorry not being helpful here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@krzyzanowskim Not a problem! I think the original code may have also had the same issue, so ultimately we just need more tests that capture the underlying problem 😅

@weissi
Copy link
Contributor

weissi commented May 27, 2020

Very cool!

@dimitribouniol
Copy link
Contributor Author

Thank you @Lukasa and @weissi for your feedback! Should I amend my previous commits and replace the ones here, or would you prefer I add additional commits that address the remaining changes?

@Lukasa
Copy link
Collaborator

Lukasa commented May 27, 2020

It's entirely up to you: we'll squash when we merge, so we'll end up with only one commit anyway.

@dimitribouniol dimitribouniol force-pushed the http-plus-unix branch 3 times, most recently from 014536c to c6c32eb Compare May 27, 2020 17:58
@dimitribouniol
Copy link
Contributor Author

dimitribouniol commented May 27, 2020

I addressed most of the changes - all that's left are the following related but out of scope issues:

Should we combine host and socketPath?

This should probably be a different discussion/PR due to where Request.host is being used, but from what I can determine, this would probably be the right thing to do in the long run.

From what I could tell:

  • The socket path would end up in the Host header for the request (currently it is "")
  • TLS would use the socket path on certs as the common name/hostname (currently it is checking for "" as opposed to nil, which it's doing for IPs)
    • Should IPs also be part of the cert validation? Doesn't make sense for them to be omitted honestly...
    • I take this back: The spec says:

Literal IPv4 and IPv6 addresses are not permitted in "HostName".

  • Responses would propagate the socket path as the host as well (currently, it's also "")
  • We would need better test coverage for these scenarios.

I'd be happy to submit the above as a separate PR. ➙ #229

It's likely redirects for sockets and regular hosts never behaved as expected

The redirect logic checks the current request rather than the new URL to see if it can redirect to it - this likely never worked as designed due to the fact that it would always pass, since we have a request that is already valid, and we are checking It for validity...

Again, I'd be happy to refactor this and submit the fix as a separate PR. ➙ #230

Copy link
Collaborator

@Lukasa Lukasa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This patch LGTM.

@Lukasa
Copy link
Collaborator

Lukasa commented May 28, 2020

@swift-server-bot test this please

@Lukasa
Copy link
Collaborator

Lukasa commented May 28, 2020

As for the follow-on issues you identified, I'm more than happy for you to address them in follow-up PRs.

@Lukasa
Copy link
Collaborator

Lukasa commented May 28, 2020

It seems there are some minor formatting issues that need to be cleaned up.

@weissi
Copy link
Contributor

weissi commented May 28, 2020

@dimitribouniol apologies, there seem to be formatting issues. If you just run scripts/sanity.sh on your machine, it should automatically invoke SwiftFormat and fix those.

@weissi weissi requested a review from artemredkin May 28, 2020 11:04
…for the new schemes

Motivation:

Before I start adding support for new URL schemes, I consolidated the existing use of unix sockets and https TLS handling.

Modifications:

Consolidated socket path and uri handling to one place, added an associated type to the unixSocket case, and added a computed requiresTLS property to the Key Scheme.

Result:

Much cleaner code that is now ready for some new schemes!
Motivation:

We can now not only make connections over sockets using the existing unix: baseURL approach, but also by %-escaping the socket path as the URL's hostname, and using the http+unix: or https+unix: schemes for plain HTTP or HTTP over TLS support.

Modifications:

Added references to the new url schemes where necessary, aand added a missingSocketPath error for when the socket path is not encoded as the hostname.

Result:

The tests now pass, and connections can be made over non-special URLs, supporting TLS if necessary.
… to socket paths

Motivation:

Binding HTTPBin to a socket path generates many warnings in the console that are largely inconsequential, but cloud the results. This removes one of them 😅 (I'm not sure how to address the others)

Modifications:

TCP_NODELAY is now a default option in NIO, so we can leave out the setting completely since it isn't supported when binding to socket paths.

Result:

One fewer warning in the console 🙃
@dimitribouniol
Copy link
Contributor Author

I've just addressed the formatting issues — I'm creating separate tracking issues for the two points I brought up above for further discussion.

@weissi
Copy link
Contributor

weissi commented Jun 1, 2020

@swift-server-bot test this please

@dimitribouniol
Copy link
Contributor Author

Seems like on linux, the client will throw a NIOSSLExtraError.invalidSNIHostname if the SNI is equal to "" (length must be between 1 and 255), so I replace an empty host with nil before proceeding (just like is done for IP addresses).

@weissi Could you re-trigger the tests please? (unless I'm able to do it using the same command you used?)

@dimitribouniol
Copy link
Contributor Author

@weissi Please hold off on re-testing - I got Docker running locally, and it's still failing 😅

…r would result in an SNI error

Motivation:

Testing on Linux seemed to reveal an `NIOSSLExtraError.invalidSNIHostname` error that was thrown when using `https+unix` URLs, which don't have their hostname filled in. The same NIO failure does not occur on macOS, as it seems that Network.framework does not mind an empty hostname.

Modifications:

Added an extra check to determine if the host is empty before passing it to a `NIOSSLClientHandler`.

Result:

testHTTPSPlusUNIX() no longer fails on Linux.
@dimitribouniol
Copy link
Contributor Author

@weissi All tests now pass on my local machine! Please re-test 🙂

@weissi
Copy link
Contributor

weissi commented Jun 1, 2020

@swift-server-bot test this please

Copy link
Contributor

@weissi weissi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you! LGTM

@weissi weissi added the 🆕 semver/minor Adds new public API. label Jun 1, 2020
@weissi weissi added this to the 1.2.0 milestone Jun 1, 2020
@weissi weissi merged commit 364d106 into swift-server:master Jun 2, 2020
@dimitribouniol dimitribouniol deleted the http-plus-unix branch June 2, 2020 17:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
🆕 semver/minor Adds new public API.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants