| package sendit |
|
|
| import ( |
| "context" |
| "crypto/rand" |
| "io" |
| "log" |
| "net" |
| "net/http" |
| "net/http/httputil" |
| "path" |
| "strings" |
| "sync" |
| ) |
|
|
| const ( |
| pathOpen = "/.well-known/sendit/v1/open" |
| pathClientRead = "/.well-known/sendit/v1/read" |
| pathClientWrite = "/.well-known/sendit/v1/write" |
| ) |
|
|
| type serverContextValue int |
|
|
| const ( |
| serverContextValueHost = serverContextValue(1) |
| ) |
|
|
| |
| |
| type Server struct { |
| http.Handler |
| proxy *httputil.ReverseProxy |
|
|
| sessionsByID map[string]*session |
| sessionsByPrefix map[string]*session |
|
|
| mx sync.RWMutex |
|
|
| authSecret []byte |
| connectSecret []byte |
|
|
| prefix string |
| } |
|
|
| |
| |
| func NewServer(authSecret []byte, prefix string) *Server { |
| prefix = path.Join("/", prefix, "/") |
|
|
| if prefix != "/" { |
| prefix += "/" |
| } |
| mux := http.NewServeMux() |
| s := &Server{ |
| Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { |
| mux.ServeHTTP(w, req) |
| }), |
| sessionsByPrefix: make(map[string]*session), |
| sessionsByID: make(map[string]*session), |
| authSecret: authSecret, |
| connectSecret: make([]byte, 32), |
| prefix: prefix, |
| } |
|
|
| _, err := rand.Read(s.connectSecret) |
| if err != nil { |
| panic(err) |
| } |
| mux.HandleFunc(path.Join(prefix, pathOpen), s.serveOpen) |
| mux.HandleFunc(path.Join(prefix, pathClientRead), s.serveClientRead) |
| mux.HandleFunc(path.Join(prefix, pathClientWrite), s.serveClientWrite) |
|
|
| transport := http.DefaultTransport.(*http.Transport).Clone() |
| transport.DialContext = s.DialContext |
|
|
| s.proxy = &httputil.ReverseProxy{ |
| Director: func(req *http.Request) { |
| req.URL.Scheme = "http" |
| req.URL.Host = req.Context().Value(serverContextValueHost).(string) |
|
|
| if _, ok := req.Header["User-Agent"]; !ok { |
| |
| req.Header.Set("User-Agent", "") |
| } |
| }, |
| Transport: transport, |
| } |
|
|
| mux.HandleFunc(prefix, s.servePrefix) |
| if prefix != "/" { |
| |
| mux.HandleFunc(strings.TrimSuffix(prefix, "/"), s.servePrefix) |
| } |
| return s |
| } |
|
|
| func (s *Server) sessionByPrefix(prefix string) *session { |
| s.mx.RLock() |
| defer s.mx.RUnlock() |
| return s.sessionsByPrefix[prefix] |
| } |
| func (s *Server) sessionByID(id string) *session { |
| s.mx.RLock() |
| defer s.mx.RUnlock() |
| return s.sessionsByID[id] |
| } |
|
|
| func (s *Server) servePrefix(w http.ResponseWriter, req *http.Request) { |
| path := strings.TrimPrefix(req.URL.Path, s.prefix) |
|
|
| var prefixValue string |
| if !strings.Contains(path, "/") { |
| prefixValue = path |
| } else { |
| parts := strings.SplitN(path, "/", 2) |
| if len(parts) < 2 { |
| http.NotFound(w, req) |
| return |
| } |
| prefixValue = parts[0] |
| } |
|
|
| sess := s.sessionByPrefix(prefixValue) |
| if sess == nil { |
| http.NotFound(w, req) |
| return |
| } |
|
|
| s.proxy.ServeHTTP(w, req.WithContext( |
| context.WithValue(req.Context(), serverContextValueHost, sess.ID), |
| )) |
| } |
|
|
| |
| |
| |
| func (s *Server) DialContext(ctx context.Context, network, addr string) (net.Conn, error) { |
| host, _, err := net.SplitHostPort(addr) |
| if err != nil { |
| return nil, err |
| } |
|
|
| sess := s.sessionByID(host) |
| if sess == nil { |
| return nil, &net.AddrError{Addr: addr, Err: "unknown host"} |
| } |
|
|
| return sess.OpenContext(ctx) |
| } |
|
|
| |
| func (s *Server) serveOpen(w http.ResponseWriter, req *http.Request) { |
| if len(s.authSecret) > 0 { |
| _, err := TokenSubject(s.authSecret, TokenAudienceAuth, req.FormValue("token")) |
| if err != nil { |
| http.Error(w, err.Error(), http.StatusUnauthorized) |
| return |
| } |
| } |
| sess, err := s.newSession(req.FormValue("prefix")) |
| if err != nil { |
| log.Println("ERROR:", err) |
| http.Error(w, err.Error(), http.StatusBadRequest) |
| return |
| } |
|
|
| token, err := GenerateToken(s.connectSecret, TokenAudienceConnect, sess.ID) |
| if err != nil { |
| log.Println("ERROR:", err) |
| http.Error(w, err.Error(), http.StatusInternalServerError) |
| return |
| } |
|
|
| w.Header().Set("Transfer-Encoding", "chunked") |
| w.Header().Set("Cache-Control", "private, no-cache, no-store") |
| _, err = io.WriteString(w, token+"\n") |
| if err != nil { |
| log.Println("ERROR:", err) |
| return |
| } |
| w.(http.Flusher).Flush() |
|
|
| select { |
| case <-req.Context().Done(): |
| log.Println("ERROR: request terminated before session established") |
| sess.End() |
| return |
| case <-sess.stream.Ready(): |
| } |
|
|
| |
| log.Printf("Session Started; %s -> %s [%s]", sess.Prefix, req.RemoteAddr, sess.ID) |
| } |
|
|
| |
| func (s *Server) serveClientRead(w http.ResponseWriter, req *http.Request) { |
| id, err := TokenSubject(s.connectSecret, TokenAudienceConnect, req.URL.Query().Get("token")) |
| if err != nil { |
| http.Error(w, err.Error(), http.StatusUnauthorized) |
| return |
| } |
|
|
| sess := s.sessionByID(id) |
| if sess == nil { |
| http.NotFound(w, req) |
| return |
| } |
|
|
| w.Header().Set("Transfer-Encoding", "chunked") |
| w.Header().Set("Cache-Control", "private, no-cache, no-store") |
| w.WriteHeader(http.StatusOK) |
|
|
| sess.UseWriter(req.Context(), FlushWriter(w)) |
| } |
|
|
| |
| func (s *Server) serveClientWrite(w http.ResponseWriter, req *http.Request) { |
| id, err := TokenSubject(s.connectSecret, TokenAudienceConnect, req.URL.Query().Get("token")) |
| if err != nil { |
| http.Error(w, err.Error(), http.StatusUnauthorized) |
| return |
| } |
|
|
| sess := s.sessionByID(id) |
| if sess == nil { |
| http.NotFound(w, req) |
| return |
| } |
|
|
| w.Header().Set("Transfer-Encoding", "chunked") |
| w.Header().Set("Cache-Control", "private, no-cache, no-store") |
|
|
| sess.UseReader(req.Context(), req.Body) |
| } |
|
|