1#[expect(deprecated)] use std::hash::SipHasher;
2use std::{
3 hash::{Hash, Hasher},
4 io::{self, ErrorKind},
5 net::SocketAddr,
6 sync::{Arc, Mutex},
7 time::{Duration, Instant},
8};
9
10use protocol::Parcel;
11use rand::{Rng, thread_rng};
12use tokio::{net::UdpSocket, sync::watch};
13use tracing::{debug, error, trace};
14
15use crate::{
16 proto::{
17 Init, MAX_REQUEST_SIZE, MAX_RESPONSE_SIZE, QueryServerRequest, QueryServerResponse,
18 RawQueryServerRequest, RawQueryServerResponse, ServerInfo, VELOREN_HEADER, VERSION,
19 },
20 ratelimit::{RateLimiter, ReducedIpAddr},
21};
22
23const SECRET_REGEN_INTERNVAL: Duration = Duration::from_secs(300);
24
25pub struct QueryServer {
26 addr: SocketAddr,
27 server_info: watch::Receiver<ServerInfo>,
28 settings: protocol::Settings,
29 ratelimit: RateLimiter,
30}
31
32#[derive(Default, Clone, Copy, Debug)]
33pub struct Metrics {
34 pub received_packets: u32,
35 pub dropped_packets: u32,
36 pub invalid_packets: u32,
37 pub proccessing_errors: u32,
38 pub info_requests: u32,
39 pub init_requests: u32,
40 pub sent_responses: u32,
41 pub failed_responses: u32,
42 pub timed_out_responses: u32,
43 pub ratelimited: u32,
44}
45
46impl QueryServer {
47 pub fn new(addr: SocketAddr, server_info: watch::Receiver<ServerInfo>, ratelimit: u16) -> Self {
48 Self {
49 addr,
50 server_info,
51 ratelimit: RateLimiter::new(ratelimit),
52 settings: Default::default(),
53 }
54 }
55
56 pub async fn run(&mut self, metrics: Arc<Mutex<Metrics>>) -> Result<(), tokio::io::Error> {
63 let mut socket = UdpSocket::bind(self.addr).await?;
64
65 let gen_secret = || {
66 let mut rng = thread_rng();
67 (rng.gen::<u64>(), rng.gen::<u64>())
68 };
69 let mut secrets = gen_secret();
70 let mut last_secret_refresh = Instant::now();
71
72 let mut buf = Box::new([0; MAX_REQUEST_SIZE]);
73 loop {
74 let (len, remote_addr) = match socket.recv_from(&mut *buf).await {
75 Ok(v) => v,
76 Err(e) if e.kind() == ErrorKind::NotConnected => {
77 error!(
78 ?e,
79 "Query server connection was closed, re-binding to socket..."
80 );
81 socket = UdpSocket::bind(self.addr).await?;
82 continue;
83 },
84 err => {
85 debug!(?err, "Error while receiving from query server socket");
86 continue;
87 },
88 };
89
90 let mut new_metrics = Metrics {
91 received_packets: 1,
92 ..Default::default()
93 };
94
95 let raw_msg_buf = &buf[..len];
96 let msg_buf = if Self::validate_datagram(raw_msg_buf) {
97 &raw_msg_buf[2..(raw_msg_buf.len() - VELOREN_HEADER.len())]
99 } else {
100 new_metrics.dropped_packets += 1;
101 continue;
102 };
103
104 self.process_datagram(msg_buf, remote_addr, secrets, &mut new_metrics, &socket)
105 .await;
106
107 if let Ok(mut metrics) = metrics.lock() {
109 *metrics += new_metrics;
110 }
111
112 {
113 let now = Instant::now();
114 if now.duration_since(last_secret_refresh) > SECRET_REGEN_INTERNVAL {
115 last_secret_refresh = now;
116 secrets = gen_secret();
117 }
118
119 self.ratelimit.maintain(now);
120 }
121 }
122 }
123
124 fn validate_datagram(data: &[u8]) -> bool {
126 let len = data.len();
127 if len < MAX_RESPONSE_SIZE.max(VELOREN_HEADER.len() + 2) {
129 trace!(?len, "Datagram too short");
130 false
131 } else if len > MAX_REQUEST_SIZE {
132 trace!(?len, "Datagram too large");
133 false
134 } else if data[(len - VELOREN_HEADER.len())..] != VELOREN_HEADER {
135 trace!(?len, "Datagram header invalid");
136 false
137 } else if u16::from_ne_bytes(data[..2].try_into().unwrap()) != VERSION {
139 trace!(
140 "Datagram has invalid version {:?}, current {VERSION:?}",
141 &data[..2]
142 );
143 false
144 } else {
145 true
146 }
147 }
148
149 async fn process_datagram(
150 &mut self,
151 datagram: &[u8],
152 remote: SocketAddr,
153 secrets: (u64, u64),
154 metrics: &mut Metrics,
155 socket: &UdpSocket,
156 ) {
157 let Ok(RawQueryServerRequest {
158 p: client_p,
159 request,
160 }) =
161 <RawQueryServerRequest as Parcel>::read(&mut io::Cursor::new(datagram), &self.settings)
162 else {
163 metrics.invalid_packets += 1;
164 return;
165 };
166
167 trace!(?request, "Received packet");
168
169 #[expect(deprecated)]
170 let real_p = {
171 let mut hasher = SipHasher::new_with_keys(secrets.0, secrets.1);
181 ReducedIpAddr::from(remote.ip()).hash(&mut hasher);
182 hasher.finish()
183 };
184
185 if real_p != client_p {
186 Self::send_response(
187 RawQueryServerResponse::Init(Init {
188 p: real_p,
189 max_supported_version: VERSION,
190 }),
191 remote,
192 socket,
193 metrics,
194 )
195 .await;
196
197 return;
198 }
199
200 if !self.ratelimit.can_request(remote.ip().into()) {
201 trace!("Ratelimited request");
202 metrics.ratelimited += 1;
203 return;
204 }
205
206 match request {
207 QueryServerRequest::Init => {
208 metrics.init_requests += 1;
209 Self::send_response(
210 RawQueryServerResponse::Init(Init {
211 p: real_p,
212 max_supported_version: VERSION,
213 }),
214 remote,
215 socket,
216 metrics,
217 )
218 .await;
219 },
220 QueryServerRequest::ServerInfo => {
221 metrics.info_requests += 1;
222 let server_info = *self.server_info.borrow();
223 Self::send_response(
224 RawQueryServerResponse::Response(QueryServerResponse::ServerInfo(server_info)),
225 remote,
226 socket,
227 metrics,
228 )
229 .await;
230 },
231 }
232 }
233
234 async fn send_response(
235 response: RawQueryServerResponse,
236 addr: SocketAddr,
237 socket: &UdpSocket,
238 metrics: &mut Metrics,
239 ) {
240 match <RawQueryServerResponse as Parcel>::raw_bytes(&response, &Default::default()) {
243 Ok(data) => {
244 if data.len() > MAX_RESPONSE_SIZE {
245 error!(
246 ?MAX_RESPONSE_SIZE,
247 "Attempted to send a response larger than the maximum allowed size (size: \
248 {}, response: {response:?})",
249 data.len()
250 );
251 #[cfg(debug_assertions)]
252 panic!(
253 "Attempted to send a response larger than the maximum allowed size (size: \
254 {}, max: {}, response: {response:?})",
255 data.len(),
256 MAX_RESPONSE_SIZE
257 );
258 }
259
260 match socket.send_to(&data, addr).await {
261 Ok(_) => {
262 metrics.sent_responses += 1;
263 },
264 Err(err) => {
265 metrics.failed_responses += 1;
266 debug!(?err, "Failed to send query server response");
267 },
268 }
269 },
270 Err(error) => {
271 trace!(?error, "Failed to serialize response");
272 #[cfg(debug_assertions)]
273 panic!("Serializing response failed: {error:?} ({response:?})");
274 },
275 }
276 }
277}
278
279impl std::ops::AddAssign for Metrics {
280 fn add_assign(
281 &mut self,
282 Self {
283 received_packets,
284 dropped_packets,
285 invalid_packets,
286 proccessing_errors,
287 info_requests,
288 init_requests,
289 sent_responses,
290 failed_responses,
291 timed_out_responses,
292 ratelimited,
293 }: Self,
294 ) {
295 self.received_packets += received_packets;
296 self.dropped_packets += dropped_packets;
297 self.invalid_packets += invalid_packets;
298 self.proccessing_errors += proccessing_errors;
299 self.info_requests += info_requests;
300 self.init_requests += init_requests;
301 self.sent_responses += sent_responses;
302 self.failed_responses += failed_responses;
303 self.timed_out_responses += timed_out_responses;
304 self.ratelimited += ratelimited;
305 }
306}
307
308impl Metrics {
309 pub fn reset(&mut self) -> Self { std::mem::take(self) }
313}