Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Check the max data size against the final message payload #212

Merged
merged 3 commits into from
Aug 10, 2020
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 9 additions & 1 deletion autoendpoint/src/routers/adm/client.rs
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
use crate::routers::adm::error::AdmError;
use crate::routers::adm::settings::{AdmProfile, AdmSettings};
use crate::routers::common::message_size_check;
use crate::routers::RouterError;
use autopush_common::util::sec_since_epoch;
use futures::lock::Mutex;
Expand All @@ -15,6 +16,7 @@ pub struct AdmClient {
base_url: Url,
profile: AdmProfile,
timeout: Duration,
max_data: usize,
http: reqwest::Client,
token_info: Mutex<TokenInfo>,
}
Expand Down Expand Up @@ -53,6 +55,7 @@ impl AdmClient {
base_url: settings.base_url.clone(),
profile,
timeout: Duration::from_secs(settings.timeout as u64),
max_data: settings.max_data,
http,
// The default TokenInfo has dummy values to trigger a token fetch
token_info: Mutex::default(),
Expand Down Expand Up @@ -122,6 +125,10 @@ impl AdmClient {
"data": data,
"expiresAfter": ttl,
});
let message_json = message.to_string();
message_size_check(message_json.as_bytes(), self.max_data)?;

// Prepare request data
let access_token = self.get_access_token().await?;
let url = self
.base_url
Expand All @@ -136,6 +143,7 @@ impl AdmClient {
.http
.post(url)
.header("Authorization", format!("Bearer {}", access_token.as_str()))
.header("Content-Type", "application/json")
.header("Accept", "application/json")
.header(
"X-Amzn-Type-Version",
Expand All @@ -145,7 +153,7 @@ impl AdmClient {
"X-Amzn-Accept-Type",
"[email protected]",
)
.json(&message)
.body(message_json)
.timeout(self.timeout)
.send()
.await
Expand Down
2 changes: 1 addition & 1 deletion autoendpoint/src/routers/adm/router.rs
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ impl Router for AdmRouter {
.and_then(Value::as_str)
.ok_or(AdmError::NoProfile)?;
let ttl = MAX_TTL.min(self.settings.min_ttl.max(notification.headers.ttl as usize));
let message_data = build_message_data(notification, self.settings.max_data)?;
let message_data = build_message_data(notification)?;

// Send the notification to ADM
let client = self.clients.get(profile).ok_or(AdmError::InvalidProfile)?;
Expand Down
12 changes: 5 additions & 7 deletions autoendpoint/src/routers/apns/router.rs
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,9 @@ use crate::extractors::notification::Notification;
use crate::extractors::router_data_input::RouterDataInput;
use crate::routers::apns::error::ApnsError;
use crate::routers::apns::settings::{ApnsChannel, ApnsSettings};
use crate::routers::common::{build_message_data, incr_error_metric, incr_success_metrics};
use crate::routers::common::{
build_message_data, incr_error_metric, incr_success_metrics, message_size_check,
};
use crate::routers::{Router, RouterError, RouterResponse};
use a2::request::notification::LocalizedAlert;
use a2::request::payload::{APSAlert, Payload, APS};
Expand Down Expand Up @@ -220,7 +222,7 @@ impl Router for ApnsRouter {
.map(|value| APS::deserialize(value).map_err(|_| ApnsError::InvalidApsData))
.transpose()?
.unwrap_or_else(Self::default_aps);
let mut message_data = build_message_data(notification, self.settings.max_data)?;
let mut message_data = build_message_data(notification)?;
message_data.insert("ver", notification.message_id.clone());

// Get client and build payload
Expand Down Expand Up @@ -249,11 +251,7 @@ impl Router for ApnsRouter {
.clone()
.to_json_string()
.map_err(ApnsError::SizeLimit)?;
if payload_json.len() > self.settings.max_data {
return Err(
RouterError::TooMuchData(payload_json.len() - self.settings.max_data).into(),
);
}
message_size_check(payload_json.as_bytes(), self.settings.max_data)?;

// Send to APNS
trace!("Sending message to APNS: {:?}", payload);
Expand Down
22 changes: 12 additions & 10 deletions autoendpoint/src/routers/common.rs
Original file line number Diff line number Diff line change
Expand Up @@ -8,21 +8,12 @@ use std::collections::HashMap;
use uuid::Uuid;

/// Convert a notification into a WebPush message
pub fn build_message_data(
notification: &Notification,
max_data: usize,
) -> ApiResult<HashMap<&'static str, String>> {
pub fn build_message_data(notification: &Notification) -> ApiResult<HashMap<&'static str, String>> {
let mut message_data = HashMap::new();
message_data.insert("chid", notification.subscription.channel_id.to_string());

// Only add the other headers if there's data
if let Some(data) = &notification.data {
if data.len() > max_data {
// Too much data. Tell the client how many bytes extra they had.
return Err(RouterError::TooMuchData(data.len() - max_data).into());
}

// Add the body and headers
message_data.insert("body", data.clone());
message_data.insert_opt("con", notification.headers.encoding.as_ref());
message_data.insert_opt("enc", notification.headers.encryption.as_ref());
Expand All @@ -33,6 +24,17 @@ pub fn build_message_data(
Ok(message_data)
}

/// Check the data against the max data size and return an error if there is too
/// much data.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Kind of depends on how you want to do this, but for the python side, I determined that the max payload size depends on the encoding type. aesgcm requires the header keys, which need to be included with the overall payload and impact the size of the data that can be sent over. aes128gcm includes the decryption keys in the body payload, and the body and therefore the body can be larger. The other problem is that the body is base64 encoded which basically inflates things by about 1.3x, which may confuse update publishers that don't know that.

Of course, key sizes can vary as can the result of base64 encoding, so things are bit fuzzy as far as how big things are or could get.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The payload size error returns the number of excess bytes, so the publishers will have an idea about how much data to cut out. I feel like doing the fuzzy calculations of guessing the raw data size and accounting for base64 adds a lot of unnecessary complexity/uncertainty and is too hand-holding. We should view this from the perspective of the messaging services (like FCM) and just make sure the data we are passing along will fit through the bridge services. If it doesn't fit, then we relay the excess byte count to the publisher. We can talk about this in the docs so the publishers have more insight into why they might be over the payload limit, but guessing the reason in code seems error-prone.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I suppose putting a note in the docs might be as useful. One thing I've discovered is that the more data you can put into error messages, the less customer support and invalid bug triage you have to do in the future. Folks are less inclined to read docs than error messages, but at least we can point them in the right direction.

pub fn message_size_check(data: &[u8], max_data: usize) -> Result<(), RouterError> {
if data.len() > max_data {
trace!("Data is too long by {} bytes", data.len() - max_data);
Err(RouterError::TooMuchData(data.len() - max_data))
} else {
Ok(())
}
}

/// Handle a bridge error by logging, updating metrics, etc
pub async fn handle_error(
error: RouterError,
Expand Down
14 changes: 11 additions & 3 deletions autoendpoint/src/routers/fcm/client.rs
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
use crate::routers::common::message_size_check;
use crate::routers::fcm::error::FcmError;
use crate::routers::fcm::settings::{FcmCredential, FcmSettings};
use crate::routers::RouterError;
Expand All @@ -16,6 +17,7 @@ const OAUTH_SCOPES: &[&str] = &["https://www.googleapis.com/auth/firebase.messag
pub struct FcmClient {
endpoint: Url,
timeout: Duration,
max_data: usize,
auth: DefaultAuthenticator,
http: reqwest::Client,
}
Expand All @@ -41,6 +43,7 @@ impl FcmClient {
))
.expect("Project ID is not URL-safe"),
timeout: Duration::from_secs(settings.timeout as u64),
max_data: settings.max_data,
auth,
http,
})
Expand All @@ -53,6 +56,11 @@ impl FcmClient {
token: String,
ttl: usize,
) -> Result<(), RouterError> {
// Check the payload size. FCM only cares about the `data` field when
// checking size.
let data_json = serde_json::to_string(&data).unwrap();
message_size_check(data_json.as_bytes(), self.max_data)?;

// Build the FCM message
let message = serde_json::json!({
"message": {
Expand All @@ -63,6 +71,7 @@ impl FcmClient {
}
}
});

let access_token = self
.auth
.token(OAUTH_SCOPES)
Expand All @@ -74,8 +83,7 @@ impl FcmClient {
.http
.post(self.endpoint.clone())
.header("Authorization", format!("Bearer {}", access_token.as_str()))
.header("Content-Type", "application/json; UTF-8")
.body(message.to_string())
.json(&message)
.timeout(self.timeout)
.send()
.await
Expand Down Expand Up @@ -208,7 +216,7 @@ pub mod tests {
let _token_mock = mock_token_endpoint();
let fcm_mock = mock_fcm_endpoint_builder()
.match_header("Authorization", format!("Bearer {}", ACCESS_TOKEN).as_str())
.match_header("Content-Type", "application/json; UTF-8")
.match_header("Content-Type", "application/json")
.match_body(r#"{"message":{"android":{"data":{"is_test":"true"},"ttl":"42s"},"token":"test-token"}}"#)
.create();

Expand Down
2 changes: 1 addition & 1 deletion autoendpoint/src/routers/fcm/router.rs
Original file line number Diff line number Diff line change
Expand Up @@ -111,7 +111,7 @@ impl Router for FcmRouter {
.and_then(Value::as_str)
.ok_or(FcmError::NoAppId)?;
let ttl = MAX_TTL.min(self.settings.ttl.max(notification.headers.ttl as usize));
let message_data = build_message_data(notification, self.settings.max_data)?;
let message_data = build_message_data(notification)?;

// Send the notification to FCM
let client = self.clients.get(app_id).ok_or(FcmError::InvalidAppId)?;
Expand Down