glider/proxy/tls/tls.go

194 lines
4.0 KiB
Go
Raw Normal View History

2018-06-28 20:45:24 +08:00
package tls
import (
stdtls "crypto/tls"
"errors"
"net"
2018-06-28 20:45:24 +08:00
"net/url"
"strings"
"github.com/nadoo/glider/log"
"github.com/nadoo/glider/proxy"
2018-06-28 20:45:24 +08:00
)
// TLS struct.
2018-06-28 20:45:24 +08:00
type TLS struct {
dialer proxy.Dialer
proxy proxy.Proxy
addr string
2018-06-28 20:45:24 +08:00
2020-10-02 00:03:49 +08:00
config *stdtls.Config
2018-11-25 15:41:47 +08:00
2018-06-28 20:45:24 +08:00
serverName string
2018-07-04 16:55:45 +08:00
skipVerify bool
2018-10-29 16:18:51 +08:00
certFile string
keyFile string
server proxy.Server
2018-06-28 20:45:24 +08:00
}
func init() {
proxy.RegisterDialer("tls", NewTLSDialer)
proxy.RegisterServer("tls", NewTLSServer)
}
2020-11-03 22:52:50 +08:00
// NewTLS returns a tls struct.
func NewTLS(s string, d proxy.Dialer, p proxy.Proxy) (*TLS, error) {
2018-06-28 20:45:24 +08:00
u, err := url.Parse(s)
if err != nil {
log.F("[tls] parse url err: %s", err)
2018-06-28 20:45:24 +08:00
return nil, err
}
query := u.Query()
t := &TLS{
dialer: d,
proxy: p,
addr: u.Host,
serverName: query.Get("serverName"),
skipVerify: query.Get("skipVerify") == "true",
certFile: query.Get("cert"),
keyFile: query.Get("key"),
2018-07-04 16:55:45 +08:00
}
2021-04-19 10:39:40 +08:00
if _, port, _ := net.SplitHostPort(t.addr); port == "" {
t.addr = net.JoinHostPort(t.addr, "443")
}
if t.serverName == "" {
t.serverName = t.addr[:strings.LastIndex(t.addr, ":")]
2018-06-28 20:45:24 +08:00
}
return t, nil
2018-06-28 20:45:24 +08:00
}
2020-11-03 22:52:50 +08:00
// NewTLSDialer returns a tls dialer.
func NewTLSDialer(s string, d proxy.Dialer) (proxy.Dialer, error) {
p, err := NewTLS(s, d, nil)
2018-11-25 15:41:47 +08:00
if err != nil {
return nil, err
}
2020-10-02 00:03:49 +08:00
p.config = &stdtls.Config{
2018-11-25 15:41:47 +08:00
ServerName: p.serverName,
InsecureSkipVerify: p.skipVerify,
ClientSessionCache: stdtls.NewLRUClientSessionCache(64),
MinVersion: stdtls.VersionTLS12,
2018-11-25 15:41:47 +08:00
}
return p, err
}
// NewTLSServer returns a tls transport layer before the real server.
func NewTLSServer(s string, p proxy.Proxy) (proxy.Server, error) {
2018-10-29 16:18:51 +08:00
transport := strings.Split(s, ",")
t, err := NewTLS(transport[0], nil, p)
2018-10-29 16:18:51 +08:00
if err != nil {
return nil, err
}
2020-10-11 18:46:15 +08:00
if t.certFile == "" || t.keyFile == "" {
return nil, errors.New("[tls] cert and key file path must be spcified")
}
cert, err := stdtls.LoadX509KeyPair(t.certFile, t.keyFile)
if err != nil {
log.F("[tls] unable to load cert: %s, key %s", t.certFile, t.keyFile)
2018-11-25 15:41:47 +08:00
return nil, err
}
2018-10-29 16:18:51 +08:00
2020-10-02 00:03:49 +08:00
t.config = &stdtls.Config{
Certificates: []stdtls.Certificate{cert},
2020-09-03 00:12:00 +08:00
MinVersion: stdtls.VersionTLS12,
2018-10-29 16:18:51 +08:00
}
if len(transport) > 1 {
t.server, err = proxy.ServerFromURL(transport[1], p)
if err != nil {
return nil, err
}
}
2018-11-25 15:41:47 +08:00
return t, nil
2018-11-25 15:41:47 +08:00
}
// ListenAndServe listens on server's addr and serves connections.
2018-11-25 15:41:47 +08:00
func (s *TLS) ListenAndServe() {
l, err := net.Listen("tcp", s.addr)
2018-10-29 16:18:51 +08:00
if err != nil {
log.F("[tls] failed to listen on %s: %v", s.addr, err)
2018-10-29 16:18:51 +08:00
return
}
defer l.Close()
log.F("[tls] listening TCP on %s with TLS", s.addr)
2018-10-29 16:18:51 +08:00
for {
c, err := l.Accept()
if err != nil {
log.F("[tls] failed to accept: %v", err)
2018-10-29 16:18:51 +08:00
continue
}
go s.Serve(c)
2018-10-29 16:18:51 +08:00
}
}
// Serve serves a connection.
func (s *TLS) Serve(cc net.Conn) {
c := stdtls.Server(cc, s.config)
2018-11-25 15:41:47 +08:00
if s.server != nil {
s.server.Serve(c)
return
}
defer c.Close()
rc, dialer, err := s.proxy.Dial("tcp", "")
if err != nil {
log.F("[tls] %s <-> %s via %s, error in dial: %v", c.RemoteAddr(), s.addr, dialer.Addr(), err)
s.proxy.Record(dialer, false)
return
}
defer rc.Close()
log.F("[tls] %s <-> %s", c.RemoteAddr(), dialer.Addr())
if err = proxy.Relay(c, rc); err != nil {
log.F("[tls] %s <-> %s, relay error: %v", c.RemoteAddr(), dialer.Addr(), err)
// record remote conn failure only
if !strings.Contains(err.Error(), s.addr) {
s.proxy.Record(dialer, false)
}
2018-11-25 15:41:47 +08:00
}
}
// Addr returns forwarder's address.
func (s *TLS) Addr() string {
if s.addr == "" {
return s.dialer.Addr()
}
return s.addr
}
// Dial connects to the address addr on the network net via the proxy.
func (s *TLS) Dial(network, addr string) (net.Conn, error) {
cc, err := s.dialer.Dial("tcp", s.addr)
if err != nil {
log.F("[tls] dial to %s error: %s", s.addr, err)
return nil, err
}
2020-10-02 00:03:49 +08:00
c := stdtls.Client(cc, s.config)
err = c.Handshake()
return c, err
}
// DialUDP connects to the given address via the proxy.
func (s *TLS) DialUDP(network, addr string) (net.PacketConn, net.Addr, error) {
return nil, nil, proxy.ErrNotSupported
}