fix(resolver): port parser does not handle leading ':' #1407

Open
jccit wants to merge 3 commits from jccit/continuwuity:fix/port-parse into main
First-time contributor

This pull request fixes an issue where requests to federated servers not running on port 8448 will timeout.

This is due to an issue where the port parsing code does not account for a leading colon. Since we're splitting the destination at the location of the colon, we leave the colon in the port number.

For example:
"matrix.org:443" -> ("matrix.org", ":443")
":443" cannot be parsed as u16, so defaults to 8448, this network request will fail

Specifically I noticed that my discord bridge's media requests were timing out, not hitting my bridge server

Pull request checklist:

  • This pull request targets the main branch, and the branch is named something other than
    main.
  • I have written an appropriate pull request title and my description is clear.
  • I understand I am responsible for the contents of this pull request.
  • I have followed the contributing guidelines:
<!-- In order to help reviewers know what your pull request does at a glance, you should ensure that 1. Your PR title is a short, single sentence describing what you changed 2. You have described in more detail what you have changed, why you have changed it, what the intended effect is, and why you think this will be beneficial to the project. If you have made any potentially strange/questionable design choices, but didn't feel they'd benefit from code comments, please don't mention them here - after opening your pull request, go to "files changed", and click on the "+" symbol in the line number gutter, and attach comments to the lines that you think would benefit from some clarification. --> This pull request fixes an issue where requests to federated servers not running on port 8448 will timeout. This is due to an issue where the port parsing code does not account for a leading colon. Since we're splitting the destination at the location of the colon, we leave the colon in the port number. For example: "matrix.org:443" -> ("matrix.org", ":443") ":443" cannot be parsed as u16, so defaults to 8448, this network request will fail Specifically I noticed that my discord bridge's media requests were timing out, not hitting my bridge server <!-- Example: This pull request allows us to warp through time and space ten times faster than before by double-inverting the warp drive with hyperheated jump fluid, both making the drive faster and more efficient. This resolves the common issue where we have to wait more than 10 milliseconds to engage, use, and disengage the warp drive when travelling between galaxies. --> <!-- Closes: #... --> <!-- Fixes: #... --> <!-- Uncomment the above line(s) if your pull request fixes an issue or closes another pull request by superseding it. Replace `#...` with the issue/pr number, such as `#123`. --> **Pull request checklist:** <!-- You need to complete these before your PR can be considered. If you aren't sure about some, feel free to ask for clarification in #dev:continuwuity.org. --> - [x] This pull request targets the `main` branch, and the branch is named something other than `main`. - [x] I have written an appropriate pull request title and my description is clear. - [x] I understand I am responsible for the contents of this pull request. - I have followed the [contributing guidelines][c1]: - [ ] My contribution follows the [code style][c2], if applicable. - [ ] I ran [pre-commit checks][c1pc] before opening/drafting this pull request. - [ ] I have [tested my contribution][c1t] (or proof-read it for documentation-only changes) myself, if applicable. This includes ensuring code compiles. - [ ] My commit messages follow the [commit message format][c1cm] and are descriptive. - [ ] I have written a [news fragment][n1] for this PR, if applicable<!--(can be done after hitting open!)-->. <!-- Notes on these requirements: - While not required, we encourage you to sign your commits with GPG or SSH to attest the authenticity of your changes. - While we allow LLM-assisted contributions, we do not appreciate contributions that are low quality, which is typical of machine-generated contributions that have not had a lot of love and care from a human. Please do not open a PR if all you have done is asked ChatGPT to tidy up the codebase with a +-100,000 diff. - In the case of code style violations, reviewers may leave review comments/change requests indicating what the ideal change would look like. For example, a reviewer may suggest you lower a log level, or use `match` instead of `if/else` etc. - In the case of code style violations, pre-commit check failures, minor things like typos/spelling errors, and in some cases commit format violations, reviewers may modify your branch directly, typically by making changes and adding a commit. Particularly in the latter case, a reviewer may rebase your commits to squash "spammy" ones (like "fix", "fix", "actually fix"), and reword commit messages that don't satisfy the format. - Pull requests MUST pass the `Checks` CI workflows to be capable of being merged. This can only be bypassed in exceptional circumstances. If your CI flakes, let us know in matrix:r/dev:continuwuity.org. - Pull requests have to be based on the latest `main` commit before being merged. If the main branch changes while you're making your changes, you should make sure you rebase on main before opening a PR. Your branch will be rebased on main before it is merged if it has fallen behind. - We typically only do fast-forward merges, so your entire commit log will be included. Once in main, it's difficult to get out cleanly, so put on your best dress, smile for the cameras! --> [c1]: https://forgejo.ellis.link/continuwuation/continuwuity/src/branch/main/CONTRIBUTING.md [c2]: https://forgejo.ellis.link/continuwuation/continuwuity/src/branch/main/docs/development/code_style.mdx [c1pc]: https://forgejo.ellis.link/continuwuation/continuwuity/src/branch/main/CONTRIBUTING.md#pre-commit-checks [c1t]: https://forgejo.ellis.link/continuwuation/continuwuity/src/branch/main/CONTRIBUTING.md#running-tests-locally [c1cm]: https://forgejo.ellis.link/continuwuation/continuwuity/src/branch/main/CONTRIBUTING.md#commit-messages [n1]: https://towncrier.readthedocs.io/en/stable/tutorial.html#creating-news-fragments
fix(resolver): port parser does not handle leading ':'
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Has been cancelled
Checks / Prek / Pre-commit & Formatting (pull_request) Has been cancelled
Checks / Prek / Clippy and Cargo Tests (pull_request) Has been cancelled
2fdbc43bca
Owner

Would you be able to add some unit tests and show a before/after on this one? I've never encountered the aforementioned timeouts before and am able to connect to servers delegating to non-8448 ports just fine - for example, I'm able to federate with timedout.uk:69 (step 2) and matrix-fed.transgender.ing:443 (step 3.2, server name transgender.ing) just fine currently

Would you be able to add some unit tests and show a before/after on this one? I've never encountered the aforementioned timeouts before and am able to connect to servers delegating to non-8448 ports just fine - for example, I'm able to federate with `timedout.uk:69` (step 2) and `matrix-fed.transgender.ing:443` (step 3.2, server name `transgender.ing`) just fine currently
Author
First-time contributor

I’ll have a closer look tonight, potentially an issue with the discord bridge I’m using. Marking as WIP while I put some tests together and figure out what’s going on with my server

I’ll have a closer look tonight, potentially an issue with the discord bridge I’m using. Marking as WIP while I put some tests together and figure out what’s going on with my server
jccit changed title from fix(resolver): port parser does not handle leading ':' to WIP: fix(resolver): port parser does not handle leading ':' 2026-02-18 12:21:03 +00:00
conditionally trim the leading colon
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Blocked by required conditions
Checks / Prek / Pre-commit & Formatting (pull_request) Blocked by required conditions
Checks / Prek / Clippy and Cargo Tests (pull_request) Blocked by required conditions
Update flake hashes / update-flake-hashes (pull_request) Has been cancelled
21f13d7bbb
Merge remote-tracking branch 'upstream/main' into fix/port-parse
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Has been cancelled
Checks / Prek / Pre-commit & Formatting (pull_request) Has been cancelled
Checks / Prek / Clippy and Cargo Tests (pull_request) Has been cancelled
30c3e6c14e
Author
First-time contributor

I think I see what's going on here, get_ip_with_port can only handle ip addresses. This is correctly handled in actual_dest_3, if we can't parse the address we just check if there's a colon then run actual_dest_3_2

match get_ip_with_port(&delegated) {
			| Some(host_and_port) => Self::actual_dest_3_1(host_and_port),
			| None =>
				if let Some(pos) = delegated.find(':') {
					self.actual_dest_3_2(cache, delegated, pos).await
				} else {

Due to the way we're splitting the string, this tuple we get will include the colon, this will fail when we try to parse it into an int

// dest = discobridge.example.com:443
let (host, port) = dest.as_str().split_at(pos);
// host = discobridge.example.com
// port = :443

I've updated actual_dest_2 and actual_dest_3_2 to now conditionally strip the colon before parsing the port number.

port.trim_start_matches(':').parse::<u16>().unwrap_or(8448)

This should mean we're correctly handling both cases (e.g. 443 and :443) without falling back to the default port.

I think I see what's going on here, `get_ip_with_port` can only handle ip addresses. This is correctly handled in `actual_dest_3`, if we can't parse the address we just check if there's a colon then run `actual_dest_3_2` ```rust match get_ip_with_port(&delegated) { | Some(host_and_port) => Self::actual_dest_3_1(host_and_port), | None => if let Some(pos) = delegated.find(':') { self.actual_dest_3_2(cache, delegated, pos).await } else { ``` Due to the way we're splitting the string, this tuple we get will include the colon, this will fail when we try to parse it into an int ```rust // dest = discobridge.example.com:443 let (host, port) = dest.as_str().split_at(pos); // host = discobridge.example.com // port = :443 ``` I've updated `actual_dest_2` and `actual_dest_3_2` to now conditionally strip the colon before parsing the port number. ```rust port.trim_start_matches(':').parse::<u16>().unwrap_or(8448) ``` This should mean we're correctly handling both cases (e.g. 443 and :443) without falling back to the default port.
jccit changed title from WIP: fix(resolver): port parser does not handle leading ':' to fix(resolver): port parser does not handle leading ':' 2026-02-23 10:47:58 +00:00
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Has been cancelled
Checks / Prek / Pre-commit & Formatting (pull_request) Has been cancelled
Required
Details
Checks / Prek / Clippy and Cargo Tests (pull_request) Has been cancelled
Required
Details
This pull request is blocked because it's outdated.
Some workflows are waiting to be reviewed.
This branch is out-of-date with the base branch
You are not authorized to merge this pull request.
View command line instructions

Checkout

From your project repository, check out a new branch and test the changes.
git fetch -u fix/port-parse:jccit-fix/port-parse
git switch jccit-fix/port-parse
Sign in to join this conversation.
No reviewers
No milestone
No project
No assignees
2 participants
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
continuwuation/continuwuity!1407
No description provided.