2019-01-19 09:58:39 +01:00
import time
2019-01-19 08:47:56 +01:00
import asyncio
import aiodns
2019-01-19 07:54:11 +01:00
import aiohttp
2019-01-19 07:58:37 +01:00
import validators
2019-01-19 07:38:13 +01:00
2019-01-19 07:25:23 +01:00
from sanic import Sanic
2019-01-19 07:54:11 +01:00
from sanic . log import logger
2019-01-19 07:38:13 +01:00
from sanic . response import html , json as json_response
from sanic . exceptions import InvalidUsage
2019-01-19 07:25:23 +01:00
app = Sanic ( )
2019-01-19 09:58:39 +01:00
# keep that in memory
RATE_LIMIT_DB = { }
# to prevent DDoS or bounce attack attempt or something like that
RATE_LIMIT_SECONDS = 5
def clear_rate_limit_db ( now ) :
to_delete = [ ]
" Remove too old rate limit values "
for key , value in RATE_LIMIT_DB . items ( ) :
if now - value > RATE_LIMIT_SECONDS :
# a dictionnary can't be modified during iteration so delegate this
# operation
to_delete . append ( key )
for key in to_delete :
del RATE_LIMIT_DB [ key ]
2019-01-19 07:25:23 +01:00
2019-01-19 09:19:06 +01:00
async def query_dns ( host , dns_entry_type ) :
loop = asyncio . get_event_loop ( )
dns_resolver = aiodns . DNSResolver ( loop = loop )
try :
return await dns_resolver . query ( host , dns_entry_type )
except aiodns . error . DNSError :
return [ ]
except Exception :
import traceback
traceback . print_exc ( )
logger . error ( " Unhandled error while resolving DNS entry " )
2019-01-19 07:38:13 +01:00
@app.route ( " /check/ " , methods = [ " POST " ] )
async def check_http ( request ) :
2019-01-19 09:58:39 +01:00
# this is supposed to be a fast operation if run enough
now = time . time ( )
clear_rate_limit_db ( now )
2019-01-19 07:38:13 +01:00
ip = request . ip
2019-01-19 09:58:39 +01:00
if ip in RATE_LIMIT_DB :
since_last_attempt = now - RATE_LIMIT_DB [ ip ]
if since_last_attempt < RATE_LIMIT_SECONDS :
logger . info ( f " Rate limite { ip } , can retry in { int ( RATE_LIMIT_SECONDS - since_last_attempt ) } seconds " )
return json_response ( {
" status " : " error " ,
" code " : " error_rate_limit " ,
" content " : f " Rate limit on ip, retry in { int ( RATE_LIMIT_SECONDS - since_last_attempt ) } seconds " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 09:58:39 +01:00
RATE_LIMIT_DB [ ip ] = time . time ( )
2019-01-19 07:38:13 +01:00
try :
data = request . json
except InvalidUsage :
2019-01-19 07:54:11 +01:00
logger . info ( f " Unvalid json in request, body is : { request . body } " )
2019-01-19 07:38:13 +01:00
return json_response ( {
" status " : " error " ,
2019-01-19 08:08:36 +01:00
" code " : " error_bad_json " ,
" content " : " InvalidUsage, body isn ' t proper json " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 07:38:13 +01:00
2019-01-19 07:54:11 +01:00
if not data or " domain " not in data :
logger . info ( f " Unvalid request didn ' t specified a domain (body is : { request . body } " )
2019-01-19 08:08:36 +01:00
return json_response ( {
" status " : " error " ,
" code " : " error_no_domain " ,
" content " : " request must specify a domain " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 07:38:13 +01:00
domain = data [ " domain " ]
2019-01-19 09:58:39 +01:00
if domain in RATE_LIMIT_DB :
since_last_attempt = now - RATE_LIMIT_DB [ domain ]
if since_last_attempt < RATE_LIMIT_SECONDS :
logger . info ( f " Rate limite { domain } , can retry in { int ( RATE_LIMIT_SECONDS - since_last_attempt ) } seconds " )
return json_response ( {
" status " : " error " ,
" code " : " error_rate_limit " ,
" content " : f " Rate limit on domain, retry in { int ( RATE_LIMIT_SECONDS - since_last_attempt ) } seconds " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 09:58:39 +01:00
RATE_LIMIT_DB [ domain ] = time . time ( )
2019-01-19 07:58:37 +01:00
if not validators . domain ( domain ) :
logger . info ( f " Invalid request, is not in the right format (domain is : { domain } ) " )
2019-01-19 08:08:36 +01:00
return json_response ( {
" status " : " error " ,
" code " : " error_domain_bad_format " ,
" content " : " domain is not in the right format (do not include http:// or https://) " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 07:58:37 +01:00
2019-01-19 08:47:56 +01:00
# TODO handle ipv6
2019-01-19 09:19:06 +01:00
# ipv6 situation
if " : " in ip :
dns_entry = await query_dns ( domain , " AAAA " )
if not dns_entry :
# check if entry in ip4 for custom error
dns_entry = await query_dns ( domain , " A " )
# there is an ipv4 entry but the request is made in ipv6, ask to uses ipv4 instead
if dns_entry :
logger . info ( f " [ipv6] Invalid request, no AAAA DNS entry for domain { domain } BUT ipv4 entry, ask user to request in ipv4 " )
return json_response ( {
" status " : " error " ,
" code " : " error_no_ipv6_dns_entry_but_ipv4_dns_entry " ,
" content " : f " there is not AAAA (ipv6) DNS entry for domain { domain } BUT there is an entry in ipv4, please redo the request in ipv4 " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 09:19:06 +01:00
else :
logger . info ( f " [ipv6] Invalid request, no DNS entry for domain { domain } (both in ipv6 and ip4) " )
return json_response ( {
" status " : " error " ,
" code " : " error_no_ipv4_ipv6_dns_entry_for_domain " ,
" content " : f " there is not A (ipv4) and AAAA (ipv6) DNS entry for domain { domain } " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 09:19:06 +01:00
# ipv4 situation
else :
dns_entry = await query_dns ( domain , " A " )
if not dns_entry :
logger . info ( f " [ipv4] Invalid request, no DNS entry for domain { domain } " )
return json_response ( {
" status " : " error " ,
" code " : " error_no_ipv4_dns_entry_for_domain " ,
" content " : f " there is not A (ipv4) and AAAA (ipv6) DNS entry for domain { domain } " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 08:47:56 +01:00
dns_entry = dns_entry [ 0 ]
if dns_entry . host != ip :
2019-01-19 09:19:06 +01:00
logger . info ( f " Invalid request, A DNS entry { dns_entry . host } for domain { domain } doesn ' t match request ip { ip } " )
2019-01-19 08:47:56 +01:00
return json_response ( {
" status " : " error " ,
" code " : " error_dns_entry_doesnt_match_request_ip " ,
2019-01-19 09:19:06 +01:00
" content " : f " error, the request is made from the ip { ip } but the dns entry said { domain } has the ip { dns_entry . host } , you can only check a domain configured for your ip " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 07:38:13 +01:00
2019-01-19 07:54:11 +01:00
async with aiohttp . ClientSession ( ) as session :
try :
async with session . get ( " http:// " + domain , timeout = aiohttp . ClientTimeout ( total = 30 ) ) as response :
# XXX in the futur try to do a double check with the server to
# see if the correct content is get
await response . text ( )
logger . info ( f " Success when checking http access for { domain } asked by { ip } " )
# TODO various kind of errors
except aiohttp . client_exceptions . ClientConnectorError :
2019-01-19 08:08:36 +01:00
return json_response ( {
" status " : " error " ,
" code " : " error_http_check_connection_error " ,
" content " : " connection error, could not connect to the requested domain, it ' s very likely unreachable " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 07:54:11 +01:00
except Exception :
import traceback
traceback . print_exc ( )
2019-01-19 08:08:36 +01:00
return json_response ( {
" status " : " error " ,
" code " : " error_http_check_unknown_error " ,
" content " : " an error happen while trying to get your domain, it ' s very likely unreachable " ,
2019-01-19 10:05:06 +01:00
} , status = 400 )
2019-01-19 07:54:11 +01:00
2019-01-19 07:38:13 +01:00
return json_response ( { " status " : " ok " } )
2019-01-19 07:25:23 +01:00
@app.route ( " / " )
2019-01-19 07:38:13 +01:00
async def main ( request ) :
2019-01-19 07:25:23 +01:00
return html ( " You aren ' t really supposed to use this website using your browser.<br><br>It ' s a small server to check if a YunoHost instance can be reached by http before trying to instal a LE certificate. " )
if __name__ == " __main__ " :
app . run ( host = " 0.0.0.0 " , port = 7000 )