1
0
mirror of https://github.com/matrix-org/matrix-authentication-service.git synced 2025-07-31 09:24:31 +03:00

Trace AWS operations & share TLS connector with mas-http

This commit is contained in:
Quentin Gliech
2022-11-03 17:45:49 +01:00
parent b5fd54bbf4
commit a414936484
9 changed files with 125 additions and 50 deletions

View File

@ -195,7 +195,7 @@ impl EmailTransportConfig {
.context("failed to build SMTP transport")
}
EmailTransportConfig::Sendmail { command } => Ok(MailTransport::sendmail(command)),
EmailTransportConfig::AwsSes => Ok(MailTransport::aws_ses().await),
EmailTransportConfig::AwsSes => Ok(MailTransport::aws_ses().await?),
}
}
}

View File

@ -10,10 +10,14 @@ anyhow = "1.0.66"
async-trait = "0.1.58"
tokio = { version = "1.21.2", features = ["macros"] }
tracing = "0.1.37"
aws-sdk-sesv2 = "0.21.0"
aws-config = "0.51.0"
aws-sdk-sesv2 = { version = "0.21.0", default-features = false }
aws-config = { version = "0.51.0", default-features = false }
aws-smithy-client = { version = "0.51.0", default-features = false, features = ["client-hyper"] }
aws-smithy-async = { version = "0.51.0", default-features = false, features = ["rt-tokio"] }
mas-templates = { path = "../templates" }
mas-http = { path = "../http" }
[dependencies.lettre]
version = "0.10.1"

View File

@ -12,13 +12,20 @@
// See the License for the specific language governing permissions and
// limitations under the License.
use std::sync::Arc;
use async_trait::async_trait;
use aws_config::provider_config::ProviderConfig;
use aws_sdk_sesv2::{
middleware::DefaultMiddleware,
model::{EmailContent, RawMessage},
types::Blob,
Client,
};
use aws_smithy_async::rt::sleep::TokioSleep;
use aws_smithy_client::erase::{DynConnector, DynMiddleware};
use lettre::{address::Envelope, AsyncTransport};
use mas_http::{otel::TraceLayer, ClientInitError};
/// An asynchronous email transport that sends email via the AWS Simple Email
/// Service v2 API
@ -28,17 +35,47 @@ pub struct Transport {
impl Transport {
/// Construct a [`Transport`] from the environment
pub async fn from_env() -> Self {
let config = aws_config::from_env().load().await;
let config = aws_sdk_sesv2::Config::from(&config);
Self::new(config)
}
///
/// # Errors
///
/// Returns an error if the HTTP client failed to initialize
pub async fn from_env() -> Result<Self, ClientInitError> {
let sleep = Arc::new(TokioSleep::new());
/// Constructs a [`Transport`] from a given AWS SES SDK config
#[must_use]
pub fn new(config: aws_sdk_sesv2::Config) -> Self {
let client = Client::from_conf(config);
Self { client }
// Create the TCP connector from mas-http. This way we share the root
// certificate loader with it
let http_connector = mas_http::make_traced_connector()
.await
.expect("failed to create HTTPS connector");
let http_connector = aws_smithy_client::hyper_ext::Adapter::builder()
.sleep_impl(sleep.clone())
.build(http_connector);
let http_connector = DynConnector::new(http_connector);
// Middleware to add tracing to AWS SDK operations
let middleware = DynMiddleware::new((
TraceLayer::with_namespace("aws_sdk")
.make_span_builder(mas_http::otel::DefaultMakeSpanBuilder::new("aws_sdk"))
.on_error(mas_http::otel::DebugOnError),
DefaultMiddleware::default(),
));
// Use that connector for discovering the config
let config = ProviderConfig::default().with_http_connector(http_connector.clone());
let config = aws_config::from_env().configure(config).load().await;
let config = aws_sdk_sesv2::Config::from(&config);
// As well as for the client itself
let client = aws_smithy_client::Client::builder()
.sleep_impl(sleep)
.connector(http_connector)
.middleware(middleware)
.build_dyn();
let client = Client::with_config(client, config);
Ok(Self { client })
}
}

View File

@ -25,6 +25,7 @@ use lettre::{
},
AsyncTransport, Tokio1Executor,
};
use mas_http::ClientInitError;
pub mod aws_ses;
@ -101,8 +102,13 @@ impl Transport {
}
/// Construct a AWS SES transport
pub async fn aws_ses() -> Self {
Self::new(TransportInner::AwsSes(aws_ses::Transport::from_env().await))
///
/// # Errors
///
/// Returns an error if the HTTP client failed to initialize
pub async fn aws_ses() -> Result<Self, ClientInitError> {
let transport = aws_ses::Transport::from_env().await?;
Ok(Self::new(TransportInner::AwsSes(transport)))
}
}

View File

@ -148,6 +148,16 @@ pub enum NativeRootsLoadError {
Empty,
}
async fn make_tls_config() -> Result<rustls::ClientConfig, ClientInitError> {
let roots = tls_roots().await?;
let tls_config = rustls::ClientConfig::builder()
.with_safe_defaults()
.with_root_certificates(roots)
.with_no_client_auth();
Ok(tls_config)
}
/// Create a basic Hyper HTTP & HTTPS client without any tracing
///
/// # Errors
@ -159,57 +169,63 @@ where
B: http_body::Body<Data = Bytes, Error = E> + Send + 'static,
E: Into<BoxError>,
{
let resolver = GaiResolver::new();
let roots = tls_roots().await?;
let tls_config = rustls::ClientConfig::builder()
.with_safe_defaults()
.with_root_certificates(roots)
.with_no_client_auth();
Ok(make_client(resolver, tls_config))
let https = make_untraced_connector().await?;
Ok(Client::builder().build(https))
}
async fn make_base_client<B, E>(
async fn make_traced_client<B, E>(
) -> Result<hyper::Client<HttpsConnector<HttpConnector<TraceDns<GaiResolver>>>, B>, ClientInitError>
where
B: http_body::Body<Data = Bytes, Error = E> + Send + 'static,
E: Into<BoxError>,
{
// Trace DNS requests
let resolver = TraceLayer::dns().layer(GaiResolver::new());
let roots = tls_roots().await?;
let tls_config = rustls::ClientConfig::builder()
.with_safe_defaults()
.with_root_certificates(roots)
.with_no_client_auth();
Ok(make_client(resolver, tls_config))
let https = make_traced_connector().await?;
Ok(Client::builder().build(https))
}
fn make_client<R, B, E>(
/// Create a traced HTTP and HTTPS connector
///
/// # Errors
///
/// Returns an error if it failed to load the TLS certificates
pub async fn make_traced_connector(
) -> Result<HttpsConnector<HttpConnector<TraceDns<GaiResolver>>>, ClientInitError>
where
{
// Trace DNS requests
let resolver = TraceLayer::dns().layer(GaiResolver::new());
let tls_config = make_tls_config().await?;
Ok(make_connector(resolver, tls_config))
}
async fn make_untraced_connector(
) -> Result<HttpsConnector<HttpConnector<GaiResolver>>, ClientInitError>
where
{
let resolver = GaiResolver::new();
let tls_config = make_tls_config().await?;
Ok(make_connector(resolver, tls_config))
}
fn make_connector<R>(
resolver: R,
tls_config: rustls::ClientConfig,
) -> hyper::Client<HttpsConnector<HttpConnector<R>>, B>
) -> HttpsConnector<HttpConnector<R>>
where
R: Service<Name> + Send + Sync + Clone + 'static,
R::Error: std::error::Error + Send + Sync,
R::Future: Send,
R::Response: Iterator<Item = SocketAddr>,
B: http_body::Body<Data = Bytes, Error = E> + Send + 'static,
E: Into<BoxError>,
{
let mut http = HttpConnector::new_with_resolver(resolver);
http.enforce_http(false);
let https = HttpsConnectorBuilder::new()
HttpsConnectorBuilder::new()
.with_tls_config(tls_config)
.https_or_http()
.enable_http1()
.enable_http2()
.wrap_connector(http);
Client::builder().build(https)
.wrap_connector(http)
}
/// Create a traced HTTP client, with a default timeout, which follows redirects
@ -228,7 +244,7 @@ where
B: http_body::Body<Data = Bytes, Error = E> + Default + Send + 'static,
E: Into<BoxError> + 'static,
{
let client = make_base_client().await?;
let client = make_traced_client().await?;
let layer = (
// Convert the errors to ClientError to help dealing with them

View File

@ -31,3 +31,16 @@ where
span.add_event("exception".to_owned(), attributes);
}
}
#[derive(Debug, Clone, Copy, Default)]
pub struct DebugOnError;
impl<E> OnError<E> for DebugOnError
where
E: std::fmt::Debug,
{
fn on_error(&self, span: &SpanRef<'_>, _metrics_labels: &mut Vec<KeyValue>, err: &E) {
let attributes = vec![EXCEPTION_MESSAGE.string(format!("{err:?}"))];
span.add_event("exception".to_owned(), attributes);
}
}

View File

@ -30,7 +30,7 @@ mod ext;
mod layers;
#[cfg(feature = "client")]
pub use self::client::{client, make_untraced_client};
pub use self::client::{client, make_traced_connector, make_untraced_client, ClientInitError};
pub use self::{
ext::{set_propagator, CorsLayerExt, ServiceExt as HttpServiceExt},
layers::{

View File

@ -67,6 +67,7 @@ pub struct PolicyFactory {
}
impl PolicyFactory {
#[tracing::instrument(skip(source), err(Display))]
pub async fn load(
mut source: impl AsyncRead + std::marker::Unpin,
data: serde_json::Value,
@ -125,6 +126,7 @@ impl PolicyFactory {
.await
}
#[tracing::instrument(skip(self), err)]
pub async fn instantiate(&self) -> Result<Policy, anyhow::Error> {
let mut store = Store::new(&self.engine, ());
let runtime = Runtime::new(&mut store, &self.module).await?;