Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 1 addition & 2 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -40,3 +40,6 @@ unexpected_cfgs = { level = "warn", check-cfg = ["cfg(iroh_docsrs)", "cfg(iroh_l

[workspace.lints.clippy]
unused-async = "warn"

[patch.crates-io]
tokio-rustls-acme = { git = "https://github.com/n0-computer/tokio-rustls-acme", branch = "Frando/crypto-provider"}
4 changes: 2 additions & 2 deletions iroh-relay/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -131,7 +131,7 @@ vergen-gitcl = "1.0.8"
default = ["metrics", "tls-ring"]
# Enables fetching TLS trust anchors from the operating system
platform-verifier = ["dep:rustls-platform-verifier"]
server = [
server-no-tls = [
"metrics",
"tokio/signal",
"dep:clap",
Expand All @@ -152,8 +152,8 @@ server = [
"noq/platform-verifier",
"noq/runtime-tokio",
"iroh-metrics/service",
"tls-ring",
]
server = ["server", "tls-ring"]
metrics = ["iroh-metrics/metrics"]
test-utils = []
tls-ring = [
Expand Down
35 changes: 15 additions & 20 deletions iroh-relay/src/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ use iroh_relay::{
DEFAULT_HTTP_PORT, DEFAULT_HTTPS_PORT, DEFAULT_METRICS_PORT, DEFAULT_RELAY_QUIC_PORT,
},
server::{self as relay, ClientRateLimit, QuicConfig},
tls::CaRootsConfig,
};
use n0_error::{Result, StdResultExt, bail_any};
use n0_future::FutureExt;
Expand Down Expand Up @@ -496,16 +497,6 @@ async fn main() -> Result<()> {
.with(EnvFilter::from_default_env())
.init();

// Install `ring` as default crypto provider for rustls.
// This helps when both the tls-ring and tls-aws-lc-rs features are enabled,
// otherwise some crypto operations would panic because rustls can't determine
// a default provider.
// `ring` is enabled by the `tls-ring` feature, which is included in the `server` feature,
// which is required for the main.rs binary. Therefore, this does not need any feature flags.
rustls::crypto::ring::default_provider()
.install_default()
.expect("failed to set default crypto provider");

let cli = Cli::parse();
let mut cfg = Config::load(&cli).await?;
if cfg.enable_quic_addr_discovery && cfg.tls.is_none() {
Expand Down Expand Up @@ -544,12 +535,11 @@ async fn maybe_load_tls(
let Some(ref tls) = cfg.tls else {
return Ok(None);
};
let server_config = rustls::ServerConfig::builder_with_provider(std::sync::Arc::new(
rustls::crypto::ring::default_provider(),
))
.with_safe_default_protocol_versions()
.expect("protocols supported by ring")
.with_no_client_auth();
let crypto_provider = Arc::new(rustls::crypto::ring::default_provider());
let server_config = rustls::ServerConfig::builder_with_provider(crypto_provider.clone())
.with_safe_default_protocol_versions()
.expect("protocols supported by ring")
.with_no_client_auth();
let (cert_config, server_config) = match tls.cert_mode {
CertMode::Manual => {
let cert_path = tls.cert_path();
Expand All @@ -576,10 +566,14 @@ async fn maybe_load_tls(
.contact
.clone()
.std_context("LetsEncrypt needs a contact email")?;
let config = AcmeConfig::new(vec![hostname.clone()])
.contact([format!("mailto:{contact}")])
.cache_option(Some(DirCache::new(tls.cert_dir())))
.directory_lets_encrypt(tls.prod_tls);
let client_config = CaRootsConfig::default().client_config(crypto_provider.clone())?;
let config = AcmeConfig::new_with_client_tls_config(
vec![hostname.clone()],
Arc::new(client_config),
)
.contact([format!("mailto:{contact}")])
.cache_option(Some(DirCache::new(tls.cert_dir())))
.directory_lets_encrypt(tls.prod_tls);
let state = config.state();
let resolver = state.resolver().clone();
let server_config = server_config.with_cert_resolver(resolver);
Expand Down Expand Up @@ -628,6 +622,7 @@ async fn maybe_load_tls(
cert: cert_config,
server_config,
quic_bind_addr: tls.quic_bind_addr(cfg),
crypto_provider,
}))
}

Expand Down
10 changes: 8 additions & 2 deletions iroh-relay/src/server.rs
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ use iroh_base::EndpointId;
use iroh_base::RelayUrl;
use n0_error::{e, stack_error};
use n0_future::{StreamExt, future::Boxed};
use rustls::crypto::CryptoProvider;
use serde::Serialize;
use tokio::{
net::TcpListener,
Expand Down Expand Up @@ -194,6 +195,8 @@ pub struct TlsConfig<EC: fmt::Debug, EA: fmt::Debug = EC> {
pub cert: CertConfig<EC, EA>,
/// The server configuration.
pub server_config: rustls::ServerConfig,
/// The rustls crypto provider to use for all crypto.
pub crypto_provider: Arc<CryptoProvider>,
}

/// Rate limits.
Expand Down Expand Up @@ -394,8 +397,11 @@ impl Server {
Some(tls_config) => {
let server_tls_config = match tls_config.cert {
CertConfig::LetsEncrypt { mut state } => {
let acceptor =
http_server::TlsAcceptor::LetsEncrypt(state.acceptor());
let acceptor = http_server::TlsAcceptor::LetsEncrypt(
state.acceptor_with_crypto_provider(
tls_config.crypto_provider.clone(),
),
);
tasks.spawn(
async move {
while let Some(event) = state.next().await {
Expand Down
3 changes: 2 additions & 1 deletion iroh-relay/src/server/testing.rs
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
//! Exposes functions to quickly configure a server suitable for testing.
use std::net::Ipv4Addr;
use std::{net::Ipv4Addr, sync::Arc};

use super::{AccessConfig, CertConfig, QuicConfig, RelayConfig, ServerConfig, TlsConfig};

Expand Down Expand Up @@ -44,6 +44,7 @@ pub fn tls_config() -> TlsConfig<()> {
cert: CertConfig::<(), ()>::Manual { certs },
https_bind_addr: (Ipv4Addr::LOCALHOST, 0).into(),
quic_bind_addr: (Ipv4Addr::UNSPECIFIED, 0).into(),
crypto_provider: Arc::new(rustls::crypto::ring::default_provider()),
}
}

Expand Down
3 changes: 2 additions & 1 deletion iroh/src/test_utils.rs
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
//! Internal utilities to support testing.
use std::net::Ipv4Addr;
use std::{net::Ipv4Addr, sync::Arc};

use iroh_base::RelayUrl;
use iroh_relay::{
Expand Down Expand Up @@ -49,6 +49,7 @@ pub async fn run_relay_server_with(quic: bool) -> Result<(RelayMap, RelayUrl, Se
https_bind_addr: (Ipv4Addr::LOCALHOST, 0).into(),
quic_bind_addr: (Ipv4Addr::LOCALHOST, 0).into(),
server_config,
crypto_provider: Arc::new(rustls::crypto::ring::default_provider()),
};
let quic = if quic {
Some(QuicConfig {
Expand Down
6 changes: 5 additions & 1 deletion iroh/tests/patchbay/util.rs
Original file line number Diff line number Diff line change
Expand Up @@ -493,7 +493,10 @@ fn addr_relay_only(addr: EndpointAddr) -> EndpointAddr {
}

mod relay {
use std::net::{IpAddr, Ipv6Addr};
use std::{
net::{IpAddr, Ipv6Addr},
sync::Arc,
};

use iroh_base::RelayUrl;
use iroh_relay::{
Expand All @@ -520,6 +523,7 @@ mod relay {
https_bind_addr: (bind_ip, 443).into(),
quic_bind_addr: (bind_ip, 7842).into(),
server_config,
crypto_provider: Arc::new(rustls::crypto::ring::default_provider()),
};
let quic = Some(QuicConfig {
server_config: tls.server_config.clone(),
Expand Down
Loading