1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109
|
// Copyright (C) 2022 Andrew Ayer
//
// Permission is hereby granted, free of charge, to any person obtaining a
// copy of this software and associated documentation files (the "Software"),
// to deal in the Software without restriction, including without limitation
// the rights to use, copy, modify, merge, publish, distribute, sublicense,
// and/or sell copies of the Software, and to permit persons to whom the
// Software is furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included
// in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
// THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
// OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
// ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
// OTHER DEALINGS IN THE SOFTWARE.
//
// Except as contained in this notice, the name(s) of the above copyright
// holders shall not be used in advertising or otherwise to promote the
// sale, use or other dealings in this Software without prior written
// authorization.
// Package tls adds support for TLS listeners to src.agwa.name/go-listener.
//
// This package contains no exported identifiers and is intended to be
// imported from package main like this:
//
// import _ "src.agwa.name/go-listener/tls"
//
package tls // import "src.agwa.name/go-listener/tls"
import (
"crypto/tls"
"errors"
"net"
"strings"
"golang.org/x/crypto/acme"
"src.agwa.name/go-listener"
"src.agwa.name/go-listener/cert"
)
func init() {
listener.RegisterListenerType("tls", openHTTPSListener) // TODO: either remove this listener type or replace it with a generic TLS non-HTTPS listener
listener.RegisterListenerType("https", openHTTPSListener)
}
func openHTTPSListener(params map[string]interface{}, arg string) (net.Listener, error) {
var getCertificate cert.GetCertificateFunc
var nextProtos = []string{"h2", "http/1.1"}
var inner net.Listener
var err error
if arg != "" {
fields := strings.SplitN(arg, ":", 2)
if len(fields) < 2 {
return nil, errors.New("TLS listener spec invalid; must be CERT_SPEC:SOCKET_SPEC")
}
certSpec, innerSpec := fields[0], fields[1]
if strings.HasPrefix(certSpec, "/") && strings.HasSuffix(certSpec, "/") {
getCertificate = cert.GetCertificateFromDirectory(certSpec)
} else if strings.HasPrefix(certSpec, "/") {
getCertificate = cert.GetCertificateFromFile(certSpec)
} else {
getCertificate = cert.GetCertificateAutomatically(strings.Split(certSpec, ","))
nextProtos = append(nextProtos, acme.ALPNProto)
}
inner, err = listener.Open(innerSpec)
if err != nil {
return nil, err
}
} else {
if path, ok := params["cert"].(string); ok {
getCertificate = cert.GetCertificateFromFile(path)
} else if path, ok := params["cert_directory"].(string); ok {
getCertificate = cert.GetCertificateFromDirectory(path)
} else if hostnames, ok := params["autocert_hostnames"].([]string); ok {
getCertificate = cert.GetCertificateAutomatically(hostnames)
nextProtos = append(nextProtos, acme.ALPNProto)
} else {
return nil, errors.New("certificate not specified for TLS listener")
}
innerSpec, ok := params["listener"].(map[string]interface{})
if !ok {
return nil, errors.New("inner socket not specified for TLS listener")
}
inner, err = listener.OpenJSON(innerSpec)
if err != nil {
return nil, err
}
}
if defaultServerName, ok := params["default_server_name"].(string); ok && defaultServerName != "" {
getCertificate = cert.GetCertificateDefaultServerName(defaultServerName, getCertificate)
}
config := &tls.Config{
GetCertificate: getCertificate,
NextProtos: nextProtos,
}
return tls.NewListener(inner, config), nil
}
|