@@ -23,13 +23,16 @@ import (
23
23
"encoding/pem"
24
24
"fmt"
25
25
"io"
26
+ "net"
26
27
"net/http"
27
28
"os"
28
29
"regexp"
29
30
"strconv"
30
31
"strings"
31
32
"time"
32
33
34
+ "github.com/paultag/sniff/parser"
35
+
33
36
"golang.org/x/net/http2"
34
37
"golang.org/x/net/http2/h2c"
35
38
"golang.org/x/net/websocket"
@@ -48,15 +51,19 @@ type RequestAssertions struct {
48
51
Context `json:",inline"`
49
52
50
53
TLS * TLSAssertions `json:"tls,omitempty"`
54
+ SNI string `json:"sni"`
51
55
}
52
56
53
57
// TLSAssertions contains information about the TLS connection.
54
58
type TLSAssertions struct {
55
- Version string `json:"version"`
56
- PeerCertificates []string `json:"peerCertificates,omitempty"`
57
- ServerName string `json:"serverName"`
58
- NegotiatedProtocol string `json:"negotiatedProtocol,omitempty"`
59
- CipherSuite string `json:"cipherSuite"`
59
+ Version string `json:"version"`
60
+ PeerCertificates []string `json:"peerCertificates,omitempty"`
61
+ // ClientCertificates are used by the gateway to authorize itself to the backend.
62
+ ClientCertificates []string `json:"clientCertificates,omitempty"`
63
+ // ServerName is the SNI.
64
+ ServerName string `json:"serverName"`
65
+ NegotiatedProtocol string `json:"negotiatedProtocol,omitempty"`
66
+ CipherSuite string `json:"cipherSuite"`
60
67
}
61
68
62
69
type preserveSlashes struct {
@@ -109,6 +116,7 @@ func main() {
109
116
httpMux .HandleFunc ("/health" , healthHandler )
110
117
httpMux .HandleFunc ("/status/" , statusHandler )
111
118
httpMux .HandleFunc ("/" , echoHandler )
119
+ httpMux .HandleFunc ("/backendTLS" , echoHandler )
112
120
httpMux .Handle ("/ws" , websocket .Handler (wsHandler ))
113
121
httpHandler := & preserveSlashes {httpMux }
114
122
@@ -124,11 +132,14 @@ func main() {
124
132
125
133
go runH2CServer (h2cPort , errchan )
126
134
127
- // Enable HTTPS if certificate and private key are given.
128
- if os .Getenv ("TLS_SERVER_CERT" ) != "" && os .Getenv ("TLS_SERVER_PRIVKEY" ) != "" {
135
+ // Enable HTTPS if server certificate and private key are given. Enable secure backend if client certificate and key are given.
136
+ if os .Getenv ("TLS_SERVER_CERT" ) != "" && os .Getenv ("TLS_SERVER_PRIVKEY" ) != "" ||
137
+ os .Getenv ("TLS_CLIENT_CERT" ) != "" && os .Getenv ("TLS_CLIENT_KEY" ) != "" {
129
138
go func () {
130
139
fmt .Printf ("Starting server, listening on port %s (https)\n " , httpsPort )
131
- err := listenAndServeTLS (fmt .Sprintf (":%s" , httpsPort ), os .Getenv ("TLS_SERVER_CERT" ), os .Getenv ("TLS_SERVER_PRIVKEY" ), os .Getenv ("TLS_CLIENT_CACERTS" ), httpHandler )
140
+ // TODO - probably don't need to pass these in.
141
+ err := listenAndServeTLS (fmt .Sprintf (":%s" , httpsPort ), os .Getenv ("TLS_SERVER_CERT" ), os .Getenv ("TLS_SERVER_PRIVKEY" ),
142
+ os .Getenv ("TLS_CLIENT_CACERTS" ), os .Getenv ("TLS_CLIENT_CERT" ), os .Getenv ("TLS_CLIENT_KEY" ), httpHandler )
132
143
if err != nil {
133
144
errchan <- err
134
145
}
@@ -201,15 +212,27 @@ func runH2CServer(h2cPort string, errchan chan<- error) {
201
212
}
202
213
203
214
func echoHandler (w http.ResponseWriter , r * http.Request ) {
215
+ var sni string
216
+
204
217
fmt .Printf ("Echoing back request made to %s to client (%s)\n " , r .RequestURI , r .RemoteAddr )
205
218
206
219
// If the request has form ?delay=[:duration] wait for duration
207
220
// For example, ?delay=10s will cause the response to wait 10s before responding
208
- if err := delayResponse (r ); err != nil {
221
+ err := delayResponse (r )
222
+ if err != nil {
209
223
processError (w , err , http .StatusInternalServerError )
210
224
return
211
225
}
212
226
227
+ // If the request was made to URI backendTLS, then get the server name indication and
228
+ // add it to the RequestAssertions. It will be echoed back later.
229
+ if strings .Contains (r .RequestURI , "backendTLS" ) {
230
+ sni , err = sniffForSNI (r .RemoteAddr )
231
+ if err != nil {
232
+ // Todo: research if for some test cases there won't be one
233
+ }
234
+ }
235
+
213
236
requestAssertions := RequestAssertions {
214
237
r .RequestURI ,
215
238
r .Host ,
@@ -220,6 +243,7 @@ func echoHandler(w http.ResponseWriter, r *http.Request) {
220
243
context ,
221
244
222
245
tlsStateToAssertions (r .TLS ),
246
+ sni ,
223
247
}
224
248
225
249
js , err := json .MarshalIndent (requestAssertions , "" , " " )
@@ -232,6 +256,7 @@ func echoHandler(w http.ResponseWriter, r *http.Request) {
232
256
w .Header ().Set ("Content-Type" , "application/json" )
233
257
w .Header ().Set ("X-Content-Type-Options" , "nosniff" )
234
258
_ , _ = w .Write (js )
259
+
235
260
}
236
261
237
262
func writeEchoResponseHeaders (w http.ResponseWriter , headers http.Header ) {
@@ -267,7 +292,7 @@ func processError(w http.ResponseWriter, err error, code int) { //nolint:unparam
267
292
_ , _ = w .Write (body )
268
293
}
269
294
270
- func listenAndServeTLS (addr string , serverCert string , serverPrivKey string , clientCA string , handler http.Handler ) error {
295
+ func listenAndServeTLS (addr string , serverCert string , serverPrivKey string , clientCA string , clientCert string , clientPrivKey string , handler http.Handler ) error {
271
296
var config tls.Config
272
297
273
298
// Optionally enable client certificate validation when client CA certificates are given.
@@ -296,6 +321,40 @@ func listenAndServeTLS(addr string, serverCert string, serverPrivKey string, cli
296
321
return srv .ListenAndServeTLS (serverCert , serverPrivKey )
297
322
}
298
323
324
+ // sniffForSNI uses the request address to listen for the incoming TLS connection,
325
+ // and tries to find the server name indication from that connection.
326
+ func sniffForSNI (addr string ) (string , error ) {
327
+ var sni string
328
+
329
+ // Listen to get the SNI, and store in config.
330
+ listener , err := net .Listen ("tcp" , addr )
331
+ if err != nil {
332
+ return "" , err
333
+ }
334
+ defer listener .Close ()
335
+
336
+ for {
337
+ conn , err := listener .Accept ()
338
+ if err != nil {
339
+ return "" , err
340
+ }
341
+ data := make ([]byte , 4096 )
342
+ _ , err = conn .Read (data )
343
+ if err != nil {
344
+ return "" , fmt .Errorf ("could not read socket: %v" , err )
345
+ }
346
+ // Take an incoming TLS Client Hello and return the SNI name.
347
+ sni , err = parser .GetHostname (data [:])
348
+ if err != nil {
349
+ return "" , fmt .Errorf ("error getting SNI: %v" , err )
350
+ }
351
+ if sni == "" {
352
+ return "" , fmt .Errorf ("no server name indication found" )
353
+ }
354
+ return sni , nil
355
+ }
356
+ }
357
+
299
358
func tlsStateToAssertions (connectionState * tls.ConnectionState ) * TLSAssertions {
300
359
if connectionState != nil {
301
360
var state TLSAssertions
0 commit comments