glider/proxy/tls/tls.go

188 lines
3.7 KiB
Go
Raw Normal View History

2018-06-28 20:45:24 +08:00
package tls
import (
stdtls "crypto/tls"
"errors"
"net"
2018-06-28 20:45:24 +08:00
"net/url"
"strings"
"github.com/nadoo/glider/log"
"github.com/nadoo/glider/proxy"
2018-06-28 20:45:24 +08:00
)
// TLS struct.
2018-06-28 20:45:24 +08:00
type TLS struct {
dialer proxy.Dialer
proxy proxy.Proxy
addr string
2018-06-28 20:45:24 +08:00
2018-11-25 15:41:47 +08:00
tlsConfig *stdtls.Config
2018-06-28 20:45:24 +08:00
serverName string
2018-07-04 16:55:45 +08:00
skipVerify bool
2018-10-29 16:18:51 +08:00
certFile string
keyFile string
2018-11-25 15:41:47 +08:00
cert stdtls.Certificate
2018-10-29 16:18:51 +08:00
server proxy.Server
2018-06-28 20:45:24 +08:00
}
func init() {
proxy.RegisterDialer("tls", NewTLSDialer)
proxy.RegisterServer("tls", NewTLSServer)
}
// NewTLS returns a tls proxy struct.
func NewTLS(s string, d proxy.Dialer, p proxy.Proxy) (*TLS, error) {
2018-06-28 20:45:24 +08:00
u, err := url.Parse(s)
if err != nil {
log.F("parse url err: %s", err)
return nil, err
}
addr := u.Host
2018-06-28 20:45:24 +08:00
colonPos := strings.LastIndex(addr, ":")
if colonPos == -1 {
colonPos = len(addr)
}
serverName := addr[:colonPos]
query := u.Query()
skipVerify := query.Get("skipVerify")
certFile := query.Get("cert")
keyFile := query.Get("key")
if customServer := query.Get("serverName"); customServer != "" {
serverName = customServer
}
t := &TLS{
dialer: d,
proxy: p,
addr: addr,
2018-06-28 20:45:24 +08:00
serverName: serverName,
2018-07-04 16:55:45 +08:00
skipVerify: false,
certFile: certFile,
keyFile: keyFile,
2018-07-04 16:55:45 +08:00
}
if skipVerify == "true" {
t.skipVerify = true
2018-06-28 20:45:24 +08:00
}
return t, nil
2018-06-28 20:45:24 +08:00
}
// NewTLSDialer returns a tls proxy dialer.
func NewTLSDialer(s string, d proxy.Dialer) (proxy.Dialer, error) {
p, err := NewTLS(s, d, nil)
2018-11-25 15:41:47 +08:00
if err != nil {
return nil, err
}
p.tlsConfig = &stdtls.Config{
ServerName: p.serverName,
InsecureSkipVerify: p.skipVerify,
ClientSessionCache: stdtls.NewLRUClientSessionCache(64),
MinVersion: stdtls.VersionTLS10,
}
return p, err
}
// NewTLSServer returns a tls transport layer before the real server.
func NewTLSServer(s string, p proxy.Proxy) (proxy.Server, error) {
2018-10-29 16:18:51 +08:00
transport := strings.Split(s, ",")
// prepare transport listener
// TODO: check here
if len(transport) < 2 {
return nil, errors.New("[tls] malformd listener:" + s)
2018-10-29 16:18:51 +08:00
}
t, err := NewTLS(transport[0], nil, p)
2018-10-29 16:18:51 +08:00
if err != nil {
return nil, err
}
cert, err := stdtls.LoadX509KeyPair(t.certFile, t.keyFile)
if err != nil {
log.F("[tls] unable to load cert: %s, key %s", t.certFile, t.keyFile)
2018-11-25 15:41:47 +08:00
return nil, err
}
2018-10-29 16:18:51 +08:00
t.tlsConfig = &stdtls.Config{
Certificates: []stdtls.Certificate{cert},
2020-09-03 00:12:00 +08:00
MinVersion: stdtls.VersionTLS12,
2018-10-29 16:18:51 +08:00
}
t.server, err = proxy.ServerFromURL(transport[1], p)
if err != nil {
return nil, err
}
2018-11-25 15:41:47 +08:00
return t, nil
2018-11-25 15:41:47 +08:00
}
// ListenAndServe listens on server's addr and serves connections.
2018-11-25 15:41:47 +08:00
func (s *TLS) ListenAndServe() {
l, err := net.Listen("tcp", s.addr)
2018-10-29 16:18:51 +08:00
if err != nil {
log.F("[tls] failed to listen on %s: %v", s.addr, err)
2018-10-29 16:18:51 +08:00
return
}
defer l.Close()
log.F("[tls] listening TCP on %s with TLS", s.addr)
2018-10-29 16:18:51 +08:00
for {
c, err := l.Accept()
if err != nil {
log.F("[tls] failed to accept: %v", err)
2018-10-29 16:18:51 +08:00
continue
}
go s.Serve(c)
2018-10-29 16:18:51 +08:00
}
}
// Serve serves a connection.
func (s *TLS) Serve(c net.Conn) {
// we know the internal server will close the connection after serve
// defer c.Close()
2018-11-25 15:41:47 +08:00
if s.server != nil {
cc := stdtls.Server(c, s.tlsConfig)
s.server.Serve(cc)
}
}
// Addr returns forwarder's address.
func (s *TLS) Addr() string {
if s.addr == "" {
return s.dialer.Addr()
}
return s.addr
}
// Dial connects to the address addr on the network net via the proxy.
func (s *TLS) Dial(network, addr string) (net.Conn, error) {
cc, err := s.dialer.Dial("tcp", s.addr)
if err != nil {
log.F("[tls] dial to %s error: %s", s.addr, err)
return nil, err
}
2018-11-25 15:41:47 +08:00
c := stdtls.Client(cc, s.tlsConfig)
err = c.Handshake()
return c, err
}
// DialUDP connects to the given address via the proxy.
func (s *TLS) DialUDP(network, addr string) (net.PacketConn, net.Addr, error) {
return nil, nil, errors.New("tls client does not support udp now")
}