A TLS / SSL enabled WebServer in Go, done right - includes valid https certificates.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

167 lines
4.6 KiB

package main
import (
"crypto/tls"
"flag"
"fmt"
"net"
"net/http"
"os"
"path/filepath"
"strconv"
"strings"
"time"
)
func usage() {
fmt.Fprintf(os.Stderr, "\nusage: go run serve.go [optional flags]\n")
flag.PrintDefaults()
fmt.Println()
os.Exit(2)
}
type myHandler struct {
certMap map[string]tls.Certificate
}
type myCert struct {
cert *tls.Certificate
touchedAt time.Time
}
func (m *myHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
// Print debug info
fmt.Println(r.Host)
fmt.Println(r.Method)
fmt.Println(r.RequestURI)
fmt.Println(r.URL) // has many keys, such as Query
for k, v := range r.Header {
fmt.Println(k, v)
}
fmt.Println(r.Body)
fmt.Println()
fmt.Println()
// End the request
// TODO serve from hosting directory
fmt.Fprintf(w, "Hi there, %s %q? Wow!\n\nWith Love,\n\t%s", r.Method, r.URL.Path[1:], r.Host)
}
func main() {
flag.Usage = usage
port := flag.Uint("port", 443, "https port")
certsPath := flag.String("letsencrypt-path", "/etc/letsencrypt/live", "path at which an 'xyz.example.com' containing 'fullchain.pem' and 'privkey.pem' can be found")
defaultHost := flag.String("default-hostname", "localhost.daplie.com", "the default folder to find certificates to use when no matches are found")
flag.Parse()
host := strings.ToLower(*defaultHost)
// See https://groups.google.com/a/letsencrypt.org/forum/#!topic/ca-dev/l1Dd6jzWeu8
/*
if strings.HasPrefix("www.", host) {
fmt.Println("TODO: 'www.' prefixed certs should be obtained for every 'example.com' domain.")
}
host = strings.TrimPrefix("www.", host)
*/
fmt.Printf("Loading Certificates %s/%s/{privkey.pem,fullchain.pem}\n", *certsPath, *defaultHost)
privkeyPath := filepath.Join(*certsPath, *defaultHost, "privkey.pem")
certPath := filepath.Join(*certsPath, *defaultHost, "fullchain.pem")
defaultCert, err := tls.LoadX509KeyPair(certPath, privkeyPath)
if err != nil {
fmt.Fprintf(os.Stderr, "Couldn't load default certificates: %s\n", err)
os.Exit(1)
}
addr := ":" + strconv.Itoa(int(*port))
conn, err := net.Listen("tcp", addr)
if nil != err {
fmt.Fprintf(os.Stderr, "Couldn't bind to TCP socket %q: %s\n", addr, err)
os.Exit(1)
}
certMap := make(map[string]myCert)
tlsConfig := new(tls.Config)
tlsConfig.Certificates = []tls.Certificate{defaultCert}
tlsConfig.GetCertificate = func(clientHello *tls.ClientHelloInfo) (*tls.Certificate, error) {
// Load from memory
// TODO unload untouched certificates every x minutes
if myCert, ok := certMap[clientHello.ServerName]; ok {
myCert.touchedAt = time.Now()
return myCert.cert, nil
}
privkeyPath := filepath.Join(*certsPath, clientHello.ServerName, "privkey.pem")
certPath := filepath.Join(*certsPath, clientHello.ServerName, "fullchain.pem")
loadCert := func() *tls.Certificate {
// TODO handle race condition (ask Matt)
// the transaction is idempotent, however, so it shouldn't matter
if _, err := os.Stat(privkeyPath); err == nil {
fmt.Printf("Loading Certificates %s/%s/{privkey.pem,fullchain.pem}\n\n", *certsPath, clientHello.ServerName)
cert, err := tls.LoadX509KeyPair(certPath, privkeyPath)
if nil != err {
return &cert
}
return nil
}
return nil
}
if cert := loadCert(); nil != cert {
certMap[clientHello.ServerName] = myCert{
cert: cert,
touchedAt: time.Now(),
}
return cert, nil
}
// TODO try to get cert via letsencrypt python client
// TODO check for a hosting directory before attempting this
/*
cmd := exec.Command(
"./venv/bin/letsencrypt",
"--text",
"--agree-eula",
"--email", "coolaj86@gmail.com",
"--authenticator", "standalone",
"--domains", "www.example.com",
"--domains", "example.com",
"--dvsni-port", "65443",
"auth",
)
err := cmd.Run()
if nil != err {
if cert := loadCert(); nil != cert {
return cert, nil
}
}
*/
fmt.Fprintf(os.Stderr, "Failed to load certificates for %q.\n", clientHello.ServerName)
fmt.Fprintf(os.Stderr, "\tTried %s/{privkey.pem,fullchain.pem}\n", filepath.Join(*certsPath, clientHello.ServerName))
//fmt.Fprintf(os.Stderr, "\tand letsencrypt api\n")
fmt.Fprintf(os.Stderr, "\n")
// TODO how to prevent attack and still enable retry?
// perhaps check DNS and hosting directory, wait 5 minutes?
certMap[clientHello.ServerName] = myCert{
cert: &defaultCert,
touchedAt: time.Now(),
}
return &defaultCert, nil
}
tlsListener := tls.NewListener(conn, tlsConfig)
server := &http.Server{
Addr: addr,
Handler: &myHandler{},
}
fmt.Printf("Listening on https://%s:%d\n\n", host, *port)
server.Serve(tlsListener)
}