mirror of
https://git.sr.ht/~emersion/tlstunnel
synced 2024-11-19 15:53:50 +01:00
212 lines
4.4 KiB
Go
212 lines
4.4 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"io"
|
|
"log"
|
|
"net"
|
|
|
|
"github.com/caddyserver/certmagic"
|
|
"github.com/pires/go-proxyproto"
|
|
)
|
|
|
|
type Server struct {
|
|
Listeners map[string]*Listener // indexed by listening address
|
|
Frontends []*Frontend
|
|
ManagedNames []string
|
|
|
|
acmeManager *certmagic.ACMEManager
|
|
certmagic *certmagic.Config
|
|
}
|
|
|
|
func NewServer() *Server {
|
|
cfg := certmagic.NewDefault()
|
|
|
|
mgr := certmagic.NewACMEManager(cfg, certmagic.DefaultACME)
|
|
mgr.Agreed = true
|
|
// TODO: enable HTTP challenge by peeking incoming requests on port 80
|
|
mgr.DisableHTTPChallenge = true
|
|
cfg.Issuer = mgr
|
|
cfg.Revoker = mgr
|
|
|
|
return &Server{
|
|
Listeners: make(map[string]*Listener),
|
|
acmeManager: mgr,
|
|
certmagic: cfg,
|
|
}
|
|
}
|
|
|
|
func (srv *Server) RegisterListener(addr string) *Listener {
|
|
// TODO: normalize addr with net.LookupPort
|
|
ln, ok := srv.Listeners[addr]
|
|
if !ok {
|
|
ln = newListener(srv, addr)
|
|
srv.Listeners[addr] = ln
|
|
}
|
|
return ln
|
|
}
|
|
|
|
func (srv *Server) Start() error {
|
|
if err := srv.certmagic.ManageAsync(context.Background(), srv.ManagedNames); err != nil {
|
|
return fmt.Errorf("failed to manage TLS certificates: %v", err)
|
|
}
|
|
|
|
for _, ln := range srv.Listeners {
|
|
if err := ln.Start(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type Listener struct {
|
|
Address string
|
|
Server *Server
|
|
Frontends map[string]*Frontend // indexed by server name
|
|
}
|
|
|
|
func newListener(srv *Server, addr string) *Listener {
|
|
return &Listener{
|
|
Address: addr,
|
|
Server: srv,
|
|
Frontends: make(map[string]*Frontend),
|
|
}
|
|
}
|
|
|
|
func (ln *Listener) RegisterFrontend(name string, fe *Frontend) error {
|
|
if _, ok := ln.Frontends[name]; ok {
|
|
return fmt.Errorf("listener %q: duplicate frontends for server name %q", ln.Address, name)
|
|
}
|
|
ln.Frontends[name] = fe
|
|
return nil
|
|
}
|
|
|
|
func (ln *Listener) Start() error {
|
|
netLn, err := net.Listen("tcp", ln.Address)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Printf("listening on %q", ln.Address)
|
|
|
|
go func() {
|
|
if err := ln.serve(netLn); err != nil {
|
|
log.Fatalf("listener %q: %v", ln.Address, err)
|
|
}
|
|
}()
|
|
|
|
return nil
|
|
}
|
|
|
|
func (ln *Listener) serve(netLn net.Listener) error {
|
|
for {
|
|
conn, err := netLn.Accept()
|
|
if err != nil {
|
|
return fmt.Errorf("failed to accept connection: %v", err)
|
|
}
|
|
|
|
go func() {
|
|
if err := ln.handle(conn); err != nil {
|
|
log.Printf("listener %q: %v", ln.Address, err)
|
|
}
|
|
}()
|
|
}
|
|
}
|
|
|
|
func (ln *Listener) handle(conn net.Conn) error {
|
|
defer conn.Close()
|
|
|
|
// TODO: setup timeouts
|
|
tlsConn := tls.Server(conn, ln.Server.certmagic.TLSConfig())
|
|
if err := tlsConn.Handshake(); err != nil {
|
|
return err
|
|
}
|
|
|
|
tlsState := tlsConn.ConnectionState()
|
|
|
|
// TODO: support wildcard certificates. Sadly this requires solving a DNS
|
|
// challenge.
|
|
fe, ok := ln.Frontends[tlsState.ServerName]
|
|
if !ok {
|
|
fe, ok = ln.Frontends[""]
|
|
}
|
|
if !ok {
|
|
return fmt.Errorf("can't find frontend for server name %q", tlsState.ServerName)
|
|
}
|
|
|
|
return fe.handle(tlsConn)
|
|
}
|
|
|
|
type Frontend struct {
|
|
Server *Server
|
|
Backend Backend
|
|
}
|
|
|
|
func (fe *Frontend) handle(downstream net.Conn) error {
|
|
defer downstream.Close()
|
|
|
|
be := &fe.Backend
|
|
upstream, err := net.Dial(be.Network, be.Address)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to dial backend: %v", err)
|
|
}
|
|
defer upstream.Close()
|
|
|
|
if be.Proxy {
|
|
h := proxyHeader(downstream.RemoteAddr(), downstream.LocalAddr())
|
|
if _, err := h.WriteTo(upstream); err != nil {
|
|
return fmt.Errorf("failed to write PROXY protocol header: %v", err)
|
|
}
|
|
}
|
|
|
|
return duplexCopy(upstream, downstream)
|
|
}
|
|
|
|
type Backend struct {
|
|
Network string
|
|
Address string
|
|
Proxy bool
|
|
}
|
|
|
|
func duplexCopy(a, b io.ReadWriter) error {
|
|
done := make(chan error, 2)
|
|
go func() {
|
|
_, err := io.Copy(a, b)
|
|
done <- err
|
|
}()
|
|
go func() {
|
|
_, err := io.Copy(b, a)
|
|
done <- err
|
|
}()
|
|
return <-done
|
|
}
|
|
|
|
func proxyHeader(sourceAddr, destAddr net.Addr) *proxyproto.Header {
|
|
h := proxyproto.Header{
|
|
Version: 2,
|
|
Command: proxyproto.PROXY,
|
|
}
|
|
|
|
switch sourceAddr := sourceAddr.(type) {
|
|
case *net.TCPAddr:
|
|
destAddr, ok := destAddr.(*net.TCPAddr)
|
|
if !ok {
|
|
break
|
|
}
|
|
if localIP4 := sourceAddr.IP.To4(); len(localIP4) == net.IPv4len {
|
|
h.TransportProtocol = proxyproto.TCPv4
|
|
} else if len(sourceAddr.IP) == net.IPv6len {
|
|
h.TransportProtocol = proxyproto.TCPv6
|
|
} else {
|
|
break
|
|
}
|
|
h.SourceAddress = sourceAddr.IP
|
|
h.DestinationAddress = destAddr.IP
|
|
h.SourcePort = uint16(sourceAddr.Port)
|
|
h.DestinationPort = uint16(destAddr.Port)
|
|
}
|
|
|
|
return &h
|
|
}
|