update: implement tls server
This commit is contained in:
@ -2,20 +2,28 @@ package server
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"bytes"
|
||||
"errors"
|
||||
"fmt"
|
||||
"golang.org/x/net/context"
|
||||
"log"
|
||||
"net"
|
||||
"net/http"
|
||||
"strings"
|
||||
"time"
|
||||
"tunnel_pls/session"
|
||||
"tunnel_pls/utils"
|
||||
)
|
||||
|
||||
var redirectTLS bool = false
|
||||
|
||||
func NewHTTPServer() error {
|
||||
listener, err := net.Listen("tcp", fmt.Sprintf("0.0.0.0:80"))
|
||||
listener, err := net.Listen("tcp", ":80")
|
||||
if err != nil {
|
||||
return errors.New("Error listening: " + err.Error())
|
||||
}
|
||||
if utils.Getenv("tls_enabled") == "true" && utils.Getenv("tls_redirect") == "true" {
|
||||
redirectTLS = true
|
||||
}
|
||||
go func() {
|
||||
for {
|
||||
conn, err := listener.Accept()
|
||||
@ -34,30 +42,83 @@ func NewHTTPServer() error {
|
||||
}
|
||||
|
||||
func Handler(conn net.Conn) {
|
||||
//TODO: Determain deadline time/set custom timeout on env
|
||||
ctx, _ := context.WithDeadline(context.Background(), time.Now().Add(30*time.Second))
|
||||
reader := bufio.NewReader(conn)
|
||||
request, err := http.ReadRequest(reader)
|
||||
headers, err := peekUntilHeaders(reader, 512)
|
||||
if err != nil {
|
||||
fmt.Println("Error reading request:", err)
|
||||
fmt.Println("Failed to peek headers:", err)
|
||||
return
|
||||
}
|
||||
|
||||
host := strings.Split(parseHostFromHeader(headers), ".")
|
||||
if len(host) < 1 {
|
||||
conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||
fmt.Println("Bad Request")
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
host := strings.Split(request.Host, ".")
|
||||
|
||||
if len(host) < 1 {
|
||||
conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||
fmt.Println("Bad Request")
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
slug := host[0]
|
||||
|
||||
if redirectTLS {
|
||||
conn.Write([]byte("HTTP/1.1 301 Moved Permanently\r\n" +
|
||||
fmt.Sprintf("Location: https://%s.%s/\r\n", slug, utils.Getenv("domain")) +
|
||||
"Content-Length: 0\r\n" +
|
||||
"Connection: close\r\n" +
|
||||
"\r\n"))
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
|
||||
slug := host[0]
|
||||
sshSession, ok := session.Clients[slug]
|
||||
if !ok {
|
||||
conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||
fmt.Println("Bad Request 1")
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
|
||||
request.Header.Set("Connection", "keep-alive")
|
||||
request.Header.Set("Keep-Alive", "timeout=60")
|
||||
|
||||
go sshSession.HandleForwardedConnectionHTTP(conn, sshSession.Connection, request)
|
||||
sshSession.HandleForwardedConnection(session.UserConnection{
|
||||
Reader: reader,
|
||||
Writer: conn,
|
||||
Context: ctx,
|
||||
}, sshSession.Connection, 80)
|
||||
return
|
||||
}
|
||||
|
||||
func peekUntilHeaders(reader *bufio.Reader, maxBytes int) ([]byte, error) {
|
||||
var buf []byte
|
||||
for {
|
||||
n := len(buf) + 1
|
||||
if n > maxBytes {
|
||||
return buf, nil
|
||||
}
|
||||
|
||||
peek, err := reader.Peek(n)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
buf = peek
|
||||
|
||||
if bytes.Contains(buf, []byte("\r\n\r\n")) {
|
||||
return buf, nil
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func parseHostFromHeader(data []byte) string {
|
||||
lines := strings.Split(string(data), "\r\n")
|
||||
for _, line := range lines {
|
||||
if strings.HasPrefix(strings.ToLower(line), "host:") {
|
||||
return strings.TrimSpace(strings.TrimPrefix(line, "Host:"))
|
||||
}
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
84
server/https.go
Normal file
84
server/https.go
Normal file
@ -0,0 +1,84 @@
|
||||
package server
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"crypto/tls"
|
||||
"errors"
|
||||
"fmt"
|
||||
"golang.org/x/net/context"
|
||||
"log"
|
||||
"net"
|
||||
"strings"
|
||||
"time"
|
||||
"tunnel_pls/session"
|
||||
)
|
||||
|
||||
func NewHTTPSServer() error {
|
||||
cert, err := tls.LoadX509KeyPair("certs/localhost.direct.SS.crt", "certs/localhost.direct.SS.key")
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
config := &tls.Config{Certificates: []tls.Certificate{cert}}
|
||||
ln, err := tls.Listen("tcp", ":443", config)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
go func() {
|
||||
for {
|
||||
conn, err := ln.Accept()
|
||||
if err != nil {
|
||||
if errors.Is(err, net.ErrClosed) {
|
||||
log.Println("https server closed")
|
||||
}
|
||||
log.Printf("Error accepting connection: %v", err)
|
||||
continue
|
||||
}
|
||||
|
||||
go HandlerTLS(conn)
|
||||
}
|
||||
}()
|
||||
return nil
|
||||
}
|
||||
|
||||
func HandlerTLS(conn net.Conn) {
|
||||
ctx, _ := context.WithDeadline(context.Background(), time.Now().Add(30*time.Second))
|
||||
reader := bufio.NewReader(conn)
|
||||
headers, err := peekUntilHeaders(reader, 512)
|
||||
if err != nil {
|
||||
fmt.Println("Failed to peek headers:", err)
|
||||
return
|
||||
}
|
||||
|
||||
host := strings.Split(parseHostFromHeader(headers), ".")
|
||||
if len(host) < 1 {
|
||||
conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||
fmt.Println("Bad Request")
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
|
||||
if len(host) < 1 {
|
||||
conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||
fmt.Println("Bad Request")
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
slug := host[0]
|
||||
|
||||
sshSession, ok := session.Clients[slug]
|
||||
if !ok {
|
||||
conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||
fmt.Println("Bad Request 1")
|
||||
conn.Close()
|
||||
return
|
||||
}
|
||||
|
||||
sshSession.HandleForwardedConnection(session.UserConnection{
|
||||
Reader: reader,
|
||||
Writer: conn,
|
||||
Context: ctx,
|
||||
}, sshSession.Connection, 80)
|
||||
return
|
||||
}
|
||||
@ -6,6 +6,7 @@ import (
|
||||
"log"
|
||||
"net"
|
||||
"net/http"
|
||||
"tunnel_pls/utils"
|
||||
)
|
||||
|
||||
type Server struct {
|
||||
@ -20,6 +21,17 @@ func NewServer(config ssh.ServerConfig) *Server {
|
||||
log.Fatalf("failed to listen on port 2200: %v", err)
|
||||
return nil
|
||||
}
|
||||
if utils.Getenv("tls_enabled") == "true" {
|
||||
go func() {
|
||||
err := NewHTTPSServer()
|
||||
if err != nil {
|
||||
if err != nil {
|
||||
log.Fatalf("failed to start https server: %v", err)
|
||||
}
|
||||
return
|
||||
}
|
||||
}()
|
||||
}
|
||||
go func() {
|
||||
err := NewHTTPServer()
|
||||
if err != nil {
|
||||
|
||||
Reference in New Issue
Block a user