|
package sendit |
|
|
|
import ( |
|
"context" |
|
"crypto/rand" |
|
"io" |
|
"log" |
|
"net" |
|
"net/http" |
|
"net/http/httputil" |
|
"path" |
|
"strings" |
|
"sync" |
|
) |
|
|
|
const ( |
|
pathOpen = "/.well-known/sendit/v1/open" |
|
pathClientRead = "/.well-known/sendit/v1/read" |
|
pathClientWrite = "/.well-known/sendit/v1/write" |
|
) |
|
|
|
type serverContextValue int |
|
|
|
const ( |
|
serverContextValueHost = serverContextValue(1) |
|
) |
|
|
|
|
|
|
|
type Server struct { |
|
http.Handler |
|
proxy *httputil.ReverseProxy |
|
|
|
sessionsByID map[string]*session |
|
sessionsByPrefix map[string]*session |
|
|
|
mx sync.RWMutex |
|
|
|
authSecret []byte |
|
connectSecret []byte |
|
|
|
prefix string |
|
} |
|
|
|
|
|
|
|
func NewServer(authSecret []byte, prefix string) *Server { |
|
prefix = path.Join("/", prefix, "/") |
|
|
|
if prefix != "/" { |
|
prefix += "/" |
|
} |
|
mux := http.NewServeMux() |
|
s := &Server{ |
|
Handler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { |
|
mux.ServeHTTP(w, req) |
|
}), |
|
sessionsByPrefix: make(map[string]*session), |
|
sessionsByID: make(map[string]*session), |
|
authSecret: authSecret, |
|
connectSecret: make([]byte, 32), |
|
prefix: prefix, |
|
} |
|
|
|
_, err := rand.Read(s.connectSecret) |
|
if err != nil { |
|
panic(err) |
|
} |
|
mux.HandleFunc(path.Join(prefix, pathOpen), s.serveOpen) |
|
mux.HandleFunc(path.Join(prefix, pathClientRead), s.serveClientRead) |
|
mux.HandleFunc(path.Join(prefix, pathClientWrite), s.serveClientWrite) |
|
|
|
transport := http.DefaultTransport.(*http.Transport).Clone() |
|
transport.DialContext = s.DialContext |
|
|
|
s.proxy = &httputil.ReverseProxy{ |
|
Director: func(req *http.Request) { |
|
req.URL.Scheme = "http" |
|
req.URL.Host = req.Context().Value(serverContextValueHost).(string) |
|
|
|
if _, ok := req.Header["User-Agent"]; !ok { |
|
|
|
req.Header.Set("User-Agent", "") |
|
} |
|
}, |
|
Transport: transport, |
|
} |
|
|
|
mux.HandleFunc(prefix, s.servePrefix) |
|
if prefix != "/" { |
|
|
|
mux.HandleFunc(strings.TrimSuffix(prefix, "/"), s.servePrefix) |
|
} |
|
return s |
|
} |
|
|
|
func (s *Server) sessionByPrefix(prefix string) *session { |
|
s.mx.RLock() |
|
defer s.mx.RUnlock() |
|
return s.sessionsByPrefix[prefix] |
|
} |
|
func (s *Server) sessionByID(id string) *session { |
|
s.mx.RLock() |
|
defer s.mx.RUnlock() |
|
return s.sessionsByID[id] |
|
} |
|
|
|
func (s *Server) servePrefix(w http.ResponseWriter, req *http.Request) { |
|
path := strings.TrimPrefix(req.URL.Path, s.prefix) |
|
|
|
var prefixValue string |
|
if !strings.Contains(path, "/") { |
|
prefixValue = path |
|
} else { |
|
parts := strings.SplitN(path, "/", 2) |
|
if len(parts) < 2 { |
|
http.NotFound(w, req) |
|
return |
|
} |
|
prefixValue = parts[0] |
|
} |
|
|
|
sess := s.sessionByPrefix(prefixValue) |
|
if sess == nil { |
|
http.NotFound(w, req) |
|
return |
|
} |
|
|
|
s.proxy.ServeHTTP(w, req.WithContext( |
|
context.WithValue(req.Context(), serverContextValueHost, sess.ID), |
|
)) |
|
} |
|
|
|
|
|
|
|
|
|
func (s *Server) DialContext(ctx context.Context, network, addr string) (net.Conn, error) { |
|
host, _, err := net.SplitHostPort(addr) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
sess := s.sessionByID(host) |
|
if sess == nil { |
|
return nil, &net.AddrError{Addr: addr, Err: "unknown host"} |
|
} |
|
|
|
return sess.OpenContext(ctx) |
|
} |
|
|
|
|
|
func (s *Server) serveOpen(w http.ResponseWriter, req *http.Request) { |
|
if len(s.authSecret) > 0 { |
|
_, err := TokenSubject(s.authSecret, TokenAudienceAuth, req.FormValue("token")) |
|
if err != nil { |
|
http.Error(w, err.Error(), http.StatusUnauthorized) |
|
return |
|
} |
|
} |
|
sess, err := s.newSession(req.FormValue("prefix")) |
|
if err != nil { |
|
log.Println("ERROR:", err) |
|
http.Error(w, err.Error(), http.StatusBadRequest) |
|
return |
|
} |
|
|
|
token, err := GenerateToken(s.connectSecret, TokenAudienceConnect, sess.ID) |
|
if err != nil { |
|
log.Println("ERROR:", err) |
|
http.Error(w, err.Error(), http.StatusInternalServerError) |
|
return |
|
} |
|
|
|
w.Header().Set("Transfer-Encoding", "chunked") |
|
w.Header().Set("Cache-Control", "private, no-cache, no-store") |
|
_, err = io.WriteString(w, token+"\n") |
|
if err != nil { |
|
log.Println("ERROR:", err) |
|
return |
|
} |
|
w.(http.Flusher).Flush() |
|
|
|
select { |
|
case <-req.Context().Done(): |
|
log.Println("ERROR: request terminated before session established") |
|
sess.End() |
|
return |
|
case <-sess.stream.Ready(): |
|
} |
|
|
|
|
|
log.Printf("Session Started; %s -> %s [%s]", sess.Prefix, req.RemoteAddr, sess.ID) |
|
} |
|
|
|
|
|
func (s *Server) serveClientRead(w http.ResponseWriter, req *http.Request) { |
|
id, err := TokenSubject(s.connectSecret, TokenAudienceConnect, req.URL.Query().Get("token")) |
|
if err != nil { |
|
http.Error(w, err.Error(), http.StatusUnauthorized) |
|
return |
|
} |
|
|
|
sess := s.sessionByID(id) |
|
if sess == nil { |
|
http.NotFound(w, req) |
|
return |
|
} |
|
|
|
w.Header().Set("Transfer-Encoding", "chunked") |
|
w.Header().Set("Cache-Control", "private, no-cache, no-store") |
|
w.WriteHeader(http.StatusOK) |
|
|
|
sess.UseWriter(req.Context(), FlushWriter(w)) |
|
} |
|
|
|
|
|
func (s *Server) serveClientWrite(w http.ResponseWriter, req *http.Request) { |
|
id, err := TokenSubject(s.connectSecret, TokenAudienceConnect, req.URL.Query().Get("token")) |
|
if err != nil { |
|
http.Error(w, err.Error(), http.StatusUnauthorized) |
|
return |
|
} |
|
|
|
sess := s.sessionByID(id) |
|
if sess == nil { |
|
http.NotFound(w, req) |
|
return |
|
} |
|
|
|
w.Header().Set("Transfer-Encoding", "chunked") |
|
w.Header().Set("Cache-Control", "private, no-cache, no-store") |
|
|
|
sess.UseReader(req.Context(), req.Body) |
|
} |
|
|