// This file Copyright © 2008-2022 Mnemosyne LLC. // It may be used under GPLv2 (SPDX: GPL-2.0-only), GPLv3 (SPDX: GPL-3.0-only), // or any future license endorsed by Mnemosyne LLC. // License text can be found in the licenses/ folder. #include #include #include #include /* memcpy */ #include #include #include #include #include #include #ifndef _WIN32 #include #include #include #endif #include #include #include /* TODO: eventually remove this */ #include #include #include #include #include "transmission.h" #include "crypto-utils.h" /* tr_rand_buffer(), tr_ssha1_matches() */ #include "error.h" #include "log.h" #include "net.h" #include "platform.h" /* tr_getWebClientDir() */ #include "quark.h" #include "rpc-server.h" #include "rpcimpl.h" #include "session-id.h" #include "session.h" #include "tr-assert.h" #include "tr-strbuf.h" #include "trevent.h" #include "utils.h" #include "variant.h" #include "web-utils.h" #include "web.h" using namespace std::literals; /* session-id is used to make cross-site request forgery attacks difficult. * Don't disable this feature unless you really know what you're doing! * https://en.wikipedia.org/wiki/Cross-site_request_forgery * https://shiflett.org/articles/cross-site-request-forgeries * http://www.webappsec.org/lists/websecurity/archive/2008-04/msg00037.html */ #define REQUIRE_SESSION_ID static auto constexpr TrUnixSocketPrefix = "unix:"sv; /* The maximum size of a unix socket path is defined per-platform based on sockaddr_un.sun_path. * On Windows the fallback is the length of an ipv6 address. Subtracting one at the end is for * double counting null terminators from sun_path and TrUnixSocketPrefix. */ #ifdef _WIN32 auto inline constexpr TrUnixAddrStrLen = size_t{ INET6_ADDRSTRLEN }; #else auto inline constexpr TrUnixAddrStrLen = size_t{ sizeof(((struct sockaddr_un*)nullptr)->sun_path) + std::size(TrUnixSocketPrefix) }; #endif enum tr_rpc_address_type { TR_RPC_AF_INET, TR_RPC_AF_INET6, TR_RPC_AF_UNIX }; struct tr_rpc_address { tr_rpc_address_type type; union { struct in_addr addr4; struct in6_addr addr6; char unixSocketPath[TrUnixAddrStrLen]; } addr; void set_inaddr_any() { type = TR_RPC_AF_INET; addr.addr4 = { INADDR_ANY }; } }; #define MY_REALM "Transmission" static int constexpr DeflateLevel = 6; // medium / default #ifdef TR_ENABLE_ASSERTS static bool constexpr tr_rpc_address_is_valid(tr_rpc_address const& a) { return a.type == TR_RPC_AF_INET || a.type == TR_RPC_AF_INET6 || a.type == TR_RPC_AF_UNIX; } #endif /** *** **/ static void send_simple_response(struct evhttp_request* req, int code, char const* text) { char const* code_text = tr_webGetResponseStr(code); struct evbuffer* body = evbuffer_new(); evbuffer_add_printf(body, "

%d: %s

", code, code_text); if (text != nullptr) { evbuffer_add_printf(body, "%s", text); } evhttp_send_reply(req, code, code_text, body); evbuffer_free(body); } /*** **** ***/ static char const* mimetype_guess(std::string_view path) { // these are the ones we need for serving the web client's files... static auto constexpr Types = std::array, 7>{ { { ".css"sv, "text/css" }, { ".gif"sv, "image/gif" }, { ".html"sv, "text/html" }, { ".ico"sv, "image/vnd.microsoft.icon" }, { ".js"sv, "application/javascript" }, { ".png"sv, "image/png" }, { ".svg"sv, "image/svg+xml" }, } }; for (auto const& [suffix, mime_type] : Types) { if (tr_strvEndsWith(path, suffix)) { return mime_type; } } return "application/octet-stream"; } static evbuffer* make_response(struct evhttp_request* req, tr_rpc_server* server, std::string_view content) { auto* const out = evbuffer_new(); char const* key = "Accept-Encoding"; char const* encoding = evhttp_find_header(req->input_headers, key); if (bool const do_compress = encoding != nullptr && tr_strvContains(encoding, "gzip"sv); !do_compress) { evbuffer_add(out, std::data(content), std::size(content)); } else { auto const max_compressed_len = libdeflate_deflate_compress_bound(server->compressor.get(), std::size(content)); struct evbuffer_iovec iovec[1]; evbuffer_reserve_space(out, std::max(std::size(content), max_compressed_len), iovec, 1); auto const compressed_len = libdeflate_gzip_compress( server->compressor.get(), std::data(content), std::size(content), iovec[0].iov_base, iovec[0].iov_len); if (0 < compressed_len && compressed_len < std::size(content)) { iovec[0].iov_len = compressed_len; evhttp_add_header(req->output_headers, "Content-Encoding", "gzip"); } else { std::copy(std::begin(content), std::end(content), static_cast(iovec[0].iov_base)); iovec[0].iov_len = std::size(content); } evbuffer_commit_space(out, iovec, 1); } return out; } static void add_time_header(struct evkeyvalq* headers, char const* key, time_t now) { // RFC 2616 says this must follow RFC 1123's date format, so use gmtime instead of localtime evhttp_add_header(headers, key, fmt::format("{:%a %b %d %T %Y%n}", fmt::gmtime(now)).c_str()); } static void serve_file(struct evhttp_request* req, tr_rpc_server* server, std::string_view filename) { if (req->type != EVHTTP_REQ_GET) { evhttp_add_header(req->output_headers, "Allow", "GET"); send_simple_response(req, 405, nullptr); return; } auto content = std::vector{}; if (tr_error* error = nullptr; !tr_loadFile(filename, content, &error)) { send_simple_response(req, HTTP_NOTFOUND, fmt::format("{} ({})", filename, error->message).c_str()); tr_error_free(error); return; } auto const now = tr_time(); add_time_header(req->output_headers, "Date", now); add_time_header(req->output_headers, "Expires", now + (24 * 60 * 60)); evhttp_add_header(req->output_headers, "Content-Type", mimetype_guess(filename)); auto* const response = make_response(req, server, std::string_view{ std::data(content), std::size(content) }); evhttp_send_reply(req, HTTP_OK, "OK", response); evbuffer_free(response); } static void handle_web_client(struct evhttp_request* req, tr_rpc_server* server) { if (std::empty(server->web_client_dir_)) { send_simple_response( req, HTTP_NOTFOUND, "

Couldn't find Transmission's web interface files!

" "

Users: to tell Transmission where to look, " "set the TRANSMISSION_WEB_HOME environment " "variable to the folder where the web interface's " "index.html is located.

" "

Package Builders: to set a custom default at compile time, " "#define PACKAGE_DATA_DIR in libtransmission/platform.c " "or tweak tr_getClutchDir() by hand.

"); } else { // convert `req->uri` (ex: "/transmission/web/images/favicon.png") // into a filesystem path (ex: "/usr/share/transmission/web/images/favicon.png") // remove the "/transmission/web/" prefix static auto constexpr Web = "web/"sv; auto subpath = std::string_view{ req->uri }.substr(std::size(server->url()) + std::size(Web)); // remove any trailing query / fragment subpath = subpath.substr(0, subpath.find_first_of("?#"sv)); // if the query is empty, use the default static auto constexpr DefaultPage = "index.html"sv; if (std::empty(subpath)) { subpath = DefaultPage; } if (tr_strvContains(subpath, ".."sv)) { send_simple_response(req, HTTP_NOTFOUND, "

Tsk, tsk.

"); } else { serve_file(req, server, tr_pathbuf{ server->web_client_dir_, '/', subpath }); } } } struct rpc_response_data { struct evhttp_request* req; tr_rpc_server* server; }; static void rpc_response_func(tr_session* /*session*/, tr_variant* content, void* user_data) { auto* data = static_cast(user_data); auto* const response = make_response(data->req, data->server, tr_variantToStr(content, TR_VARIANT_FMT_JSON_LEAN)); evhttp_add_header(data->req->output_headers, "Content-Type", "application/json; charset=UTF-8"); evhttp_send_reply(data->req, HTTP_OK, "OK", response); evbuffer_free(response); delete data; } static void handle_rpc_from_json(struct evhttp_request* req, tr_rpc_server* server, std::string_view json) { auto top = tr_variant{}; auto const have_content = tr_variantFromBuf(&top, TR_VARIANT_PARSE_JSON | TR_VARIANT_PARSE_INPLACE, json); tr_rpc_request_exec_json( server->session, have_content ? &top : nullptr, rpc_response_func, new rpc_response_data{ req, server }); if (have_content) { tr_variantClear(&top); } } static void handle_rpc(struct evhttp_request* req, tr_rpc_server* server) { if (req->type == EVHTTP_REQ_POST) { auto json = std::string_view{ reinterpret_cast(evbuffer_pullup(req->input_buffer, -1)), evbuffer_get_length(req->input_buffer) }; handle_rpc_from_json(req, server, json); return; } send_simple_response(req, 405, nullptr); } static bool isAddressAllowed(tr_rpc_server const* server, char const* address) { if (!server->isWhitelistEnabled()) { return true; } auto const& src = server->whitelist_; return std::any_of(std::begin(src), std::end(src), [&address](auto const& s) { return tr_wildmat(address, s); }); } static bool isIPAddressWithOptionalPort(char const* host) { struct sockaddr_storage address; int address_len = sizeof(address); /* TODO: move to net.{c,h} */ return evutil_parse_sockaddr_port(host, (struct sockaddr*)&address, &address_len) != -1; } static bool isHostnameAllowed(tr_rpc_server const* server, struct evhttp_request* req) { /* If password auth is enabled, any hostname is permitted. */ if (server->isPasswordEnabled()) { return true; } /* If whitelist is disabled, no restrictions. */ if (!server->isHostWhitelistEnabled) { return true; } char const* const host = evhttp_find_header(req->input_headers, "Host"); /* No host header, invalid request. */ if (host == nullptr) { return false; } /* IP address is always acceptable. */ if (isIPAddressWithOptionalPort(host)) { return true; } /* Host header might include the port. */ auto const hostname = std::string(host, strcspn(host, ":")); /* localhost is always acceptable. */ if (hostname == "localhost" || hostname == "localhost.") { return true; } auto const& src = server->hostWhitelist; return std::any_of( std::begin(src), std::end(src), [&hostname](auto const& str) { return tr_wildmat(hostname.c_str(), str.c_str()); }); } static bool test_session_id(tr_rpc_server* server, evhttp_request const* req) { char const* const session_id = evhttp_find_header(req->input_headers, TR_RPC_SESSION_ID_HEADER); return session_id != nullptr && server->session->sessionId() == session_id; } static bool isAuthorized(tr_rpc_server const* server, char const* auth_header) { if (!server->isPasswordEnabled()) { return true; } // https://datatracker.ietf.org/doc/html/rfc7617 // `Basic ${base64(username)}:${base64(password)}` auto constexpr Prefix = "Basic "sv; auto auth = std::string_view{ auth_header != nullptr ? auth_header : "" }; if (!tr_strvStartsWith(auth, Prefix)) { return false; } auth.remove_prefix(std::size(Prefix)); auto const decoded_str = tr_base64_decode(auth); auto decoded = std::string_view{ decoded_str }; auto const username = tr_strvSep(&decoded, ':'); auto const password = decoded; return server->username() == username && tr_ssha1_matches(server->salted_password_, password); } static void handle_request(struct evhttp_request* req, void* arg) { auto* server = static_cast(arg); if (req != nullptr && req->evcon != nullptr) { evhttp_add_header(req->output_headers, "Server", MY_REALM); if (server->isAntiBruteForceEnabled() && server->login_attempts_ >= server->anti_brute_force_limit_) { send_simple_response(req, 403, "

Too many unsuccessful login attempts. Please restart transmission-daemon.

"); return; } if (!isAddressAllowed(server, req->remote_host)) { send_simple_response( req, 403, "

Unauthorized IP Address.

" "

Either disable the IP address whitelist or add your address to it.

" "

If you're editing settings.json, see the 'rpc-whitelist' and 'rpc-whitelist-enabled' entries.

" "

If you're still using ACLs, use a whitelist instead. See the transmission-daemon manpage for details.

"); return; } evhttp_add_header(req->output_headers, "Access-Control-Allow-Origin", "*"); if (req->type == EVHTTP_REQ_OPTIONS) { char const* headers = evhttp_find_header(req->input_headers, "Access-Control-Request-Headers"); if (headers != nullptr) { evhttp_add_header(req->output_headers, "Access-Control-Allow-Headers", headers); } evhttp_add_header(req->output_headers, "Access-Control-Allow-Methods", "GET, POST, OPTIONS"); send_simple_response(req, 200, ""); return; } if (!isAuthorized(server, evhttp_find_header(req->input_headers, "Authorization"))) { evhttp_add_header(req->output_headers, "WWW-Authenticate", "Basic realm=\"" MY_REALM "\""); if (server->isAntiBruteForceEnabled()) { ++server->login_attempts_; } auto const unauthuser = fmt::format( FMT_STRING("

Unauthorized User. {:d} unsuccessful login attempts.

"), server->login_attempts_); send_simple_response(req, 401, unauthuser.c_str()); return; } server->login_attempts_ = 0; auto uri = std::string_view{ req->uri }; auto const location = tr_strvStartsWith(uri, server->url()) ? uri.substr(std::size(server->url())) : ""sv; if (std::empty(location) || location == "web"sv) { auto const new_location = fmt::format(FMT_STRING("{:s}web/"), server->url()); evhttp_add_header(req->output_headers, "Location", new_location.c_str()); send_simple_response(req, HTTP_MOVEPERM, nullptr); } else if (tr_strvStartsWith(location, "web/"sv)) { handle_web_client(req, server); } else if (!isHostnameAllowed(server, req)) { char const* const tmp = "

Transmission received your request, but the hostname was unrecognized.

" "

To fix this, choose one of the following options:" "

    " "
  • Enable password authentication, then any hostname is allowed.
  • " "
  • Add the hostname you want to use to the whitelist in settings.
  • " "

" "

If you're editing settings.json, see the 'rpc-host-whitelist' and 'rpc-host-whitelist-enabled' entries.

" "

This requirement has been added to help prevent " "DNS Rebinding " "attacks.

"; send_simple_response(req, 421, tmp); } #ifdef REQUIRE_SESSION_ID else if (!test_session_id(server, req)) { auto const session_id = std::string{ server->session->sessionId() }; auto const tmp = fmt::format( FMT_STRING("

Your request had an invalid session-id header.

" "

To fix this, follow these steps:" "

  1. When reading a response, get its X-Transmission-Session-Id header and remember it" "
  2. Add the updated header to your outgoing requests" "
  3. When you get this 409 error message, resend your request with the updated header" "

" "

This requirement has been added to help prevent " "CSRF " "attacks.

" "

{:s}: {:s}

"), TR_RPC_SESSION_ID_HEADER, session_id); evhttp_add_header(req->output_headers, TR_RPC_SESSION_ID_HEADER, session_id.c_str()); evhttp_add_header(req->output_headers, "Access-Control-Expose-Headers", TR_RPC_SESSION_ID_HEADER); send_simple_response(req, 409, tmp.c_str()); } #endif else if (tr_strvStartsWith(location, "rpc"sv)) { handle_rpc(req, server); } else { send_simple_response(req, HTTP_NOTFOUND, req->uri); } } } static auto constexpr ServerStartRetryCount = int{ 10 }; static auto constexpr ServerStartRetryDelayIncrement = 5s; static auto constexpr ServerStartRetryMaxDelay = 60s; static char const* tr_rpc_address_to_string(tr_rpc_address const& addr, char* buf, size_t buflen) { TR_ASSERT(tr_rpc_address_is_valid(addr)); switch (addr.type) { case TR_RPC_AF_INET: return evutil_inet_ntop(AF_INET, &addr.addr, buf, buflen); case TR_RPC_AF_INET6: return evutil_inet_ntop(AF_INET6, &addr.addr, buf, buflen); case TR_RPC_AF_UNIX: tr_strlcpy(buf, addr.addr.unixSocketPath, buflen); return buf; default: return nullptr; } } static std::string tr_rpc_address_with_port(tr_rpc_server const* server) { char addr_buf[TrUnixAddrStrLen]; tr_rpc_address_to_string(*server->bindAddress, addr_buf, sizeof(addr_buf)); std::string addr_port_str{ addr_buf }; if (server->bindAddress->type != TR_RPC_AF_UNIX) { addr_port_str.append(":" + std::to_string(server->port().host())); } return addr_port_str; } static bool tr_rpc_address_from_string(tr_rpc_address& dst, std::string_view src) { if (tr_strvStartsWith(src, TrUnixSocketPrefix)) { if (std::size(src) >= TrUnixAddrStrLen) { tr_logAddError(fmt::format( _("Unix socket path must be fewer than {count} characters (including '{prefix}' prefix)"), fmt::arg("count", TrUnixAddrStrLen - 1), fmt::arg("prefix", TrUnixSocketPrefix))); return false; } dst.type = TR_RPC_AF_UNIX; tr_strlcpy(dst.addr.unixSocketPath, std::string{ src }.c_str(), TrUnixAddrStrLen); return true; } if (evutil_inet_pton(AF_INET, std::string{ src }.c_str(), &dst.addr) == 1) { dst.type = TR_RPC_AF_INET; return true; } if (evutil_inet_pton(AF_INET6, std::string{ src }.c_str(), &dst.addr) == 1) { dst.type = TR_RPC_AF_INET6; return true; } return false; } static bool bindUnixSocket( [[maybe_unused]] struct event_base* base, [[maybe_unused]] struct evhttp* httpd, [[maybe_unused]] char const* path, [[maybe_unused]] int socket_mode) { #ifdef _WIN32 tr_logAddError(fmt::format( _("Unix sockets are unsupported on Windows. Please change '{key}' in your settings."), fmt::arg("key", tr_quark_get_string(TR_KEY_rpc_bind_address)))); return false; #else struct sockaddr_un addr; addr.sun_family = AF_UNIX; tr_strlcpy(addr.sun_path, path + std::size(TrUnixSocketPrefix), sizeof(addr.sun_path)); unlink(addr.sun_path); struct evconnlistener* lev = evconnlistener_new_bind( base, nullptr, nullptr, LEV_OPT_CLOSE_ON_FREE, -1, reinterpret_cast(&addr), sizeof(addr)); if (lev == nullptr) { return false; } if (chmod(addr.sun_path, (mode_t)socket_mode) != 0) { tr_logAddWarn( fmt::format(_("Couldn't set RPC socket mode to {mode:#o}, defaulting to 0755"), fmt::arg("mode", socket_mode))); } return evhttp_bind_listener(httpd, lev) != nullptr; #endif } static void startServer(tr_rpc_server* server); static auto rpc_server_start_retry(tr_rpc_server* server) { if (!server->start_retry_timer) { server->start_retry_timer = server->session->timerMaker().create([server]() { startServer(server); }); } ++server->start_retry_counter; auto const interval = std::min(ServerStartRetryDelayIncrement * server->start_retry_counter, ServerStartRetryMaxDelay); server->start_retry_timer->startSingleShot(std::chrono::duration_cast(interval)); return interval; } static void rpc_server_start_retry_cancel(tr_rpc_server* server) { server->start_retry_timer.reset(); server->start_retry_counter = 0; } static void startServer(tr_rpc_server* server) { if (server->httpd != nullptr) { return; } struct event_base* base = server->session->eventBase(); struct evhttp* httpd = evhttp_new(base); evhttp_set_allowed_methods(httpd, EVHTTP_REQ_GET | EVHTTP_REQ_POST | EVHTTP_REQ_OPTIONS); auto const address = server->getBindAddress(); auto const port = server->port(); bool const success = server->bindAddress->type == TR_RPC_AF_UNIX ? bindUnixSocket(base, httpd, address.c_str(), server->socket_mode_) : (evhttp_bind_socket(httpd, address.c_str(), port.host()) != -1); auto const addr_port_str = tr_rpc_address_with_port(server); if (!success) { evhttp_free(httpd); if (server->start_retry_counter < ServerStartRetryCount) { auto const retry_delay = rpc_server_start_retry(server); auto const seconds = std::chrono::duration_cast(retry_delay).count(); tr_logAddDebug(fmt::format("Couldn't bind to {}, retrying in {} seconds", addr_port_str, seconds)); return; } tr_logAddError(fmt::format( ngettext( "Couldn't bind to {address} after {count} attempt, giving up", "Couldn't bind to {address} after {count} attempts, giving up", ServerStartRetryCount), fmt::arg("address", addr_port_str), fmt::arg("count", ServerStartRetryCount))); } else { evhttp_set_gencb(httpd, handle_request, server); server->httpd = httpd; tr_logAddInfo(fmt::format(_("Listening for RPC and Web requests on '{address}'"), fmt::arg("address", addr_port_str))); } rpc_server_start_retry_cancel(server); } static void stopServer(tr_rpc_server* server) { auto const lock = server->session->unique_lock(); rpc_server_start_retry_cancel(server); struct evhttp* httpd = server->httpd; if (httpd == nullptr) { return; } auto const address = server->getBindAddress(); server->httpd = nullptr; evhttp_free(httpd); if (server->bindAddress->type == TR_RPC_AF_UNIX) { unlink(address.c_str() + std::size(TrUnixSocketPrefix)); } tr_logAddInfo(fmt::format( _("Stopped listening for RPC and Web requests on '{address}'"), fmt::arg("address", tr_rpc_address_with_port(server)))); } void tr_rpc_server::setEnabled(bool is_enabled) { is_enabled_ = is_enabled; tr_runInEventThread( this->session, [this]() { if (!is_enabled_) { stopServer(this); } else { startServer(this); } }); } static void restartServer(tr_rpc_server* const server) { if (server->isEnabled()) { stopServer(server); startServer(server); } } void tr_rpc_server::setPort(tr_port port) noexcept { if (port_ == port) { return; } port_ = port; if (isEnabled()) { tr_runInEventThread(session, restartServer, this); } } void tr_rpc_server::setUrl(std::string_view url) { url_ = url; tr_logAddDebug(fmt::format(FMT_STRING("setting our URL to '{:s}'"), url_)); } static auto parseWhitelist(std::string_view whitelist) { auto list = std::vector{}; while (!std::empty(whitelist)) { auto const pos = whitelist.find_first_of(" ,;"sv); auto const token = tr_strvStrip(whitelist.substr(0, pos)); list.emplace_back(token); whitelist = pos == std::string_view::npos ? ""sv : whitelist.substr(pos + 1); if (token.find_first_of("+-"sv) != std::string_view::npos) { tr_logAddWarn(fmt::format( _("Added '{entry}' to host whitelist and it has a '+' or '-'! Are you using an old ACL by mistake?"), fmt::arg("entry", token))); } else { tr_logAddInfo(fmt::format(_("Added '{entry}' to host whitelist"), fmt::arg("entry", token))); } } return list; } void tr_rpc_server::setWhitelist(std::string_view whitelist) { this->whitelist_str_ = whitelist; this->whitelist_ = parseWhitelist(whitelist); } /**** ***** PASSWORD ****/ void tr_rpc_server::setUsername(std::string_view username) { username_ = username; tr_logAddDebug(fmt::format(FMT_STRING("setting our username to '{:s}'"), username_)); } static bool isSalted(std::string_view password) { return tr_ssha1_test(password); } void tr_rpc_server::setPassword(std::string_view password) noexcept { salted_password_ = isSalted(password) ? password : tr_ssha1(password); tr_logAddDebug(fmt::format(FMT_STRING("setting our salted password to '{:s}'"), salted_password_)); } void tr_rpc_server::setPasswordEnabled(bool enabled) { is_password_enabled_ = enabled; tr_logAddDebug(fmt::format("setting password-enabled to '{}'", enabled)); } std::string tr_rpc_server::getBindAddress() const { auto buf = std::array{}; return tr_rpc_address_to_string(*this->bindAddress, std::data(buf), std::size(buf)); } void tr_rpc_server::setAntiBruteForceEnabled(bool enabled) noexcept { is_anti_brute_force_enabled_ = enabled; if (!enabled) { login_attempts_ = 0; } } /**** ***** LIFE CYCLE ****/ static void missing_settings_key(tr_quark const q) { tr_logAddDebug(fmt::format("Couldn't find settings key '{}'", tr_quark_get_string(q))); } tr_rpc_server::tr_rpc_server(tr_session* session_in, tr_variant* settings) : compressor{ libdeflate_alloc_compressor(DeflateLevel), libdeflate_free_compressor } , web_client_dir_{ tr_getWebClientDir(session_in) } , bindAddress(std::make_unique()) , session{ session_in } { auto boolVal = bool{}; auto i = int64_t{}; auto sv = std::string_view{}; auto key = TR_KEY_rpc_enabled; if (!tr_variantDictFindBool(settings, key, &boolVal)) { missing_settings_key(key); } else { this->is_enabled_ = boolVal; } key = TR_KEY_rpc_port; if (!tr_variantDictFindInt(settings, key, &i)) { missing_settings_key(key); } else { this->port_.setHost(i); } key = TR_KEY_rpc_url; if (!tr_variantDictFindStrView(settings, key, &sv)) { missing_settings_key(key); } else if (std::empty(sv) || sv.back() != '/') { this->url_ = fmt::format(FMT_STRING("{:s}/"), sv); } else { this->url_ = sv; } key = TR_KEY_rpc_whitelist_enabled; if (!tr_variantDictFindBool(settings, key, &boolVal)) { missing_settings_key(key); } else { this->setWhitelistEnabled(boolVal); } key = TR_KEY_rpc_host_whitelist_enabled; if (!tr_variantDictFindBool(settings, key, &boolVal)) { missing_settings_key(key); } else { this->isHostWhitelistEnabled = boolVal; } key = TR_KEY_rpc_host_whitelist; if (!tr_variantDictFindStrView(settings, key, &sv)) { missing_settings_key(key); } else if (!std::empty(sv)) { this->hostWhitelist = parseWhitelist(sv); } key = TR_KEY_rpc_authentication_required; if (!tr_variantDictFindBool(settings, key, &boolVal)) { missing_settings_key(key); } else { this->setPasswordEnabled(boolVal); } key = TR_KEY_rpc_whitelist; if (!tr_variantDictFindStrView(settings, key, &sv)) { missing_settings_key(key); } else if (!std::empty(sv)) { this->setWhitelist(sv); } key = TR_KEY_rpc_username; if (!tr_variantDictFindStrView(settings, key, &sv)) { missing_settings_key(key); } else { this->setUsername(sv); } key = TR_KEY_rpc_password; if (!tr_variantDictFindStrView(settings, key, &sv)) { missing_settings_key(key); } else { this->setPassword(sv); } key = TR_KEY_anti_brute_force_enabled; if (!tr_variantDictFindBool(settings, key, &boolVal)) { missing_settings_key(key); } else { this->setAntiBruteForceEnabled(boolVal); } key = TR_KEY_anti_brute_force_threshold; if (!tr_variantDictFindInt(settings, key, &i)) { missing_settings_key(key); } else { this->setAntiBruteForceLimit(i); } key = TR_KEY_rpc_socket_mode; bool is_missing_rpc_socket_mode_key = true; if (tr_variantDictFindStrView(settings, key, &sv)) { /* Read the socket permission as a string representing an octal number. */ is_missing_rpc_socket_mode_key = false; i = tr_parseNum(sv, 8).value_or(tr_rpc_server::DefaultRpcSocketMode); } else if (tr_variantDictFindInt(settings, key, &i)) { /* Or as a base 10 integer to remain compatible with the old settings format. */ is_missing_rpc_socket_mode_key = false; } if (is_missing_rpc_socket_mode_key) { missing_settings_key(key); } else { this->socket_mode_ = i; } key = TR_KEY_rpc_bind_address; if (!tr_variantDictFindStrView(settings, key, &sv)) { missing_settings_key(key); bindAddress->set_inaddr_any(); } else if (!tr_rpc_address_from_string(*bindAddress, sv)) { tr_logAddWarn(fmt::format( _("The '{key}' setting is '{value}' but must be an IPv4 or IPv6 address or a Unix socket path. Using default value '0.0.0.0'"), fmt::format("key", tr_quark_get_string(key)), fmt::format("value", sv))); bindAddress->set_inaddr_any(); } if (bindAddress->type == TR_RPC_AF_UNIX) { this->setWhitelistEnabled(false); this->isHostWhitelistEnabled = false; } if (this->isEnabled()) { auto const rpc_uri = tr_rpc_address_with_port(this) + this->url_; tr_logAddInfo(fmt::format(_("Serving RPC and Web requests on {address}"), fmt::arg("address", rpc_uri))); tr_runInEventThread(session, startServer, this); if (this->isWhitelistEnabled()) { tr_logAddInfo(_("Whitelist enabled")); } if (this->isPasswordEnabled()) { tr_logAddInfo(_("Password required")); } } if (!std::empty(web_client_dir_)) { tr_logAddInfo(fmt::format(_("Serving RPC and Web requests from '{path}'"), fmt::arg("path", web_client_dir_))); } } tr_rpc_server::~tr_rpc_server() { stopServer(this); }