http2https/server.go

236 lines
5.5 KiB
Go
Raw Normal View History

2016-02-25 14:35:33 +00:00
// server
package main
import (
"crypto"
"crypto/ecdsa"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"encoding/pem"
"errors"
"fmt"
"io"
"io/ioutil"
"net/http"
"strings"
"time"
)
func startServer() {
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
//r.URL.Path = strings.ToLower(r.URL.Path)
start := time.Now()
writer := statusWriter{w, 0, 0}
proxy(&writer, r)
end := time.Now()
latency := end.Sub(start)
statusCode := writer.status
length := writer.length
user, _, ok := r.BasicAuth()
if !ok {
user = "-"
}
url := r.URL.Path
params := r.Form.Encode()
if params != "" {
url = url + "?" + params
}
writeToLog(fmt.Sprintf("%s, %s, %s, %s, %s, %s, %d, %d, %d, %d, %s, %s, %v\r\n",
r.RemoteAddr,
user,
end.Format("2006.01.02"),
end.Format("15:04:05.000000000"),
r.Proto,
r.Host,
length,
r.ContentLength,
time.Since(start)/time.Millisecond,
statusCode,
r.Method,
url,
latency,
))
})
if err := http.ListenAndServe(fmt.Sprintf(":%v", *listenPortFlag), nil); err != nil {
logError(err)
}
}
func stopServer() {
}
func proxy(w http.ResponseWriter, r *http.Request) {
newURL := fmt.Sprintf("https://%s:%v%s", *destHostFlag, *destPortFlag, r.URL.Path+"?"+r.URL.RawQuery)
var (
err error
newReq *http.Request
newResp *http.Response
cert tls.Certificate
)
newReq, err = http.NewRequest(r.Method, newURL, r.Body)
if err != nil {
w.WriteHeader(http.StatusInternalServerError)
fmt.Fprintf(w, "Error: %s!", err.Error())
return
}
copyHeaders(newReq.Header, r.Header)
2016-04-07 15:04:24 +00:00
tlsClientConfig := tls.Config{InsecureSkipVerify: true}
if (*destCertFlag) != "" {
cert, err = loadX509KeyPair(*destCertFlag, *destKeyFlag, *destKeyPassFlag)
if err != nil {
w.WriteHeader(http.StatusInternalServerError)
fmt.Fprintf(w, "Error: %s!", err.Error())
return
}
tlsClientConfig.Certificates = []tls.Certificate{cert}
2016-02-25 14:35:33 +00:00
}
2016-04-07 15:04:24 +00:00
tr := &http.Transport{TLSClientConfig: &tlsClientConfig}
2016-02-25 14:35:33 +00:00
client := &http.Client{Transport: tr}
newResp, err = client.Do(newReq)
if err != nil {
w.WriteHeader(http.StatusInternalServerError)
fmt.Fprintf(w, "Error: %s!", err.Error())
return
}
copyHeaders(w.Header(), newResp.Header)
w.WriteHeader(newResp.StatusCode)
io.Copy(w, newResp.Body)
newResp.Body.Close()
}
func loadX509KeyPair(certFile, keyFile, pw string) (cert tls.Certificate, err error) {
certPEMBlock, err := ioutil.ReadFile(certFile)
if err != nil {
return
}
keyPEMBlock, err := ioutil.ReadFile(keyFile)
if err != nil {
return
}
return X509KeyPair(certPEMBlock, keyPEMBlock, []byte(pw))
}
func X509KeyPair(certPEMBlock, keyPEMBlock, pw []byte) (cert tls.Certificate, err error) {
var certDERBlock *pem.Block
for {
certDERBlock, certPEMBlock = pem.Decode(certPEMBlock)
if certDERBlock == nil {
break
}
if certDERBlock.Type == "CERTIFICATE" {
cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
}
}
if len(cert.Certificate) == 0 {
err = errors.New("crypto/tls: failed to parse certificate PEM data")
return
}
var keyDERBlock *pem.Block
for {
keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock)
if keyDERBlock == nil {
err = errors.New("crypto/tls: failed to parse key PEM data")
return
}
if x509.IsEncryptedPEMBlock(keyDERBlock) {
out, err2 := x509.DecryptPEMBlock(keyDERBlock, pw)
if err2 != nil {
err = err2
return
}
keyDERBlock.Bytes = out
break
}
if keyDERBlock.Type == "PRIVATE KEY" || strings.HasSuffix(keyDERBlock.Type, " PRIVATE KEY") {
break
}
}
cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes)
if err != nil {
return
}
// We don't need to parse the public key for TLS, but we so do anyway
// to check that it looks sane and matches the private key.
x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
if err != nil {
return
}
switch pub := x509Cert.PublicKey.(type) {
case *rsa.PublicKey:
priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
if !ok {
err = errors.New("crypto/tls: private key type does not match public key type")
return
}
if pub.N.Cmp(priv.N) != 0 {
err = errors.New("crypto/tls: private key does not match public key")
return
}
case *ecdsa.PublicKey:
priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
if !ok {
err = errors.New("crypto/tls: private key type does not match public key type")
return
}
if pub.X.Cmp(priv.X) != 0 || pub.Y.Cmp(priv.Y) != 0 {
err = errors.New("crypto/tls: private key does not match public key")
return
}
default:
err = errors.New("crypto/tls: unknown public key algorithm")
return
}
return
}
// Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
// PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys.
// OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
func parsePrivateKey(der []byte) (crypto.PrivateKey, error) {
if key, err := x509.ParsePKCS1PrivateKey(der); err == nil {
return key, nil
}
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil {
switch key := key.(type) {
case *rsa.PrivateKey, *ecdsa.PrivateKey:
return key, nil
default:
return nil, errors.New("crypto/tls: found unknown private key type in PKCS#8 wrapping")
}
}
if key, err := x509.ParseECPrivateKey(der); err == nil {
return key, nil
}
return nil, errors.New("crypto/tls: failed to parse private key")
}
func copyHeaders(dst, src http.Header) {
for k, _ := range dst {
dst.Del(k)
}
for k, vs := range src {
for _, v := range vs {
dst.Add(k, v)
}
}
}