
for convenience. Signed-off-by: Izuru Yakumo <yakumo.izuru@chaotic.ninja> git-svn-id: file:///srv/svn/repo/suika/trunk@822 f0ae65fe-ee39-954e-97ec-027ff2717ef4
320 lines
9.1 KiB
Go
320 lines
9.1 KiB
Go
package proxyproto
|
|
|
|
import (
|
|
"bufio"
|
|
"io"
|
|
"net"
|
|
"sync"
|
|
"sync/atomic"
|
|
"time"
|
|
)
|
|
|
|
// DefaultReadHeaderTimeout is how long header processing waits for header to
|
|
// be read from the wire, if Listener.ReaderHeaderTimeout is not set.
|
|
// It's kept as a global variable so to make it easier to find and override,
|
|
// e.g. go build -ldflags -X "github.com/pires/go-proxyproto.DefaultReadHeaderTimeout=1s"
|
|
var DefaultReadHeaderTimeout = 10 * time.Second
|
|
|
|
// Listener is used to wrap an underlying listener,
|
|
// whose connections may be using the HAProxy Proxy Protocol.
|
|
// If the connection is using the protocol, the RemoteAddr() will return
|
|
// the correct client address. ReadHeaderTimeout will be applied to all
|
|
// connections in order to prevent blocking operations. If no ReadHeaderTimeout
|
|
// is set, a default of 200ms will be used. This can be disabled by setting the
|
|
// timeout to < 0.
|
|
type Listener struct {
|
|
Listener net.Listener
|
|
Policy PolicyFunc
|
|
ValidateHeader Validator
|
|
ReadHeaderTimeout time.Duration
|
|
}
|
|
|
|
// Conn is used to wrap and underlying connection which
|
|
// may be speaking the Proxy Protocol. If it is, the RemoteAddr() will
|
|
// return the address of the client instead of the proxy address. Each connection
|
|
// will have its own readHeaderTimeout and readDeadline set by the Accept() call.
|
|
type Conn struct {
|
|
readDeadline atomic.Value // time.Time
|
|
once sync.Once
|
|
readErr error
|
|
conn net.Conn
|
|
Validate Validator
|
|
bufReader *bufio.Reader
|
|
header *Header
|
|
ProxyHeaderPolicy Policy
|
|
readHeaderTimeout time.Duration
|
|
}
|
|
|
|
// Validator receives a header and decides whether it is a valid one
|
|
// In case the header is not deemed valid it should return an error.
|
|
type Validator func(*Header) error
|
|
|
|
// ValidateHeader adds given validator for proxy headers to a connection when passed as option to NewConn()
|
|
func ValidateHeader(v Validator) func(*Conn) {
|
|
return func(c *Conn) {
|
|
if v != nil {
|
|
c.Validate = v
|
|
}
|
|
}
|
|
}
|
|
|
|
// Accept waits for and returns the next connection to the listener.
|
|
func (p *Listener) Accept() (net.Conn, error) {
|
|
// Get the underlying connection
|
|
conn, err := p.Listener.Accept()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
proxyHeaderPolicy := USE
|
|
if p.Policy != nil {
|
|
proxyHeaderPolicy, err = p.Policy(conn.RemoteAddr())
|
|
if err != nil {
|
|
// can't decide the policy, we can't accept the connection
|
|
conn.Close()
|
|
return nil, err
|
|
}
|
|
// Handle a connection as a regular one
|
|
if proxyHeaderPolicy == SKIP {
|
|
return conn, nil
|
|
}
|
|
}
|
|
|
|
newConn := NewConn(
|
|
conn,
|
|
WithPolicy(proxyHeaderPolicy),
|
|
ValidateHeader(p.ValidateHeader),
|
|
)
|
|
|
|
// If the ReadHeaderTimeout for the listener is unset, use the default timeout.
|
|
if p.ReadHeaderTimeout == 0 {
|
|
p.ReadHeaderTimeout = DefaultReadHeaderTimeout
|
|
}
|
|
|
|
// Set the readHeaderTimeout of the new conn to the value of the listener
|
|
newConn.readHeaderTimeout = p.ReadHeaderTimeout
|
|
|
|
return newConn, nil
|
|
}
|
|
|
|
// Close closes the underlying listener.
|
|
func (p *Listener) Close() error {
|
|
return p.Listener.Close()
|
|
}
|
|
|
|
// Addr returns the underlying listener's network address.
|
|
func (p *Listener) Addr() net.Addr {
|
|
return p.Listener.Addr()
|
|
}
|
|
|
|
// NewConn is used to wrap a net.Conn that may be speaking
|
|
// the proxy protocol into a proxyproto.Conn
|
|
func NewConn(conn net.Conn, opts ...func(*Conn)) *Conn {
|
|
pConn := &Conn{
|
|
bufReader: bufio.NewReader(conn),
|
|
conn: conn,
|
|
}
|
|
|
|
for _, opt := range opts {
|
|
opt(pConn)
|
|
}
|
|
|
|
return pConn
|
|
}
|
|
|
|
// Read is check for the proxy protocol header when doing
|
|
// the initial scan. If there is an error parsing the header,
|
|
// it is returned and the socket is closed.
|
|
func (p *Conn) Read(b []byte) (int, error) {
|
|
p.once.Do(func() {
|
|
p.readErr = p.readHeader()
|
|
})
|
|
if p.readErr != nil {
|
|
return 0, p.readErr
|
|
}
|
|
|
|
return p.bufReader.Read(b)
|
|
}
|
|
|
|
// Write wraps original conn.Write
|
|
func (p *Conn) Write(b []byte) (int, error) {
|
|
return p.conn.Write(b)
|
|
}
|
|
|
|
// Close wraps original conn.Close
|
|
func (p *Conn) Close() error {
|
|
return p.conn.Close()
|
|
}
|
|
|
|
// ProxyHeader returns the proxy protocol header, if any. If an error occurs
|
|
// while reading the proxy header, nil is returned.
|
|
func (p *Conn) ProxyHeader() *Header {
|
|
p.once.Do(func() { p.readErr = p.readHeader() })
|
|
return p.header
|
|
}
|
|
|
|
// LocalAddr returns the address of the server if the proxy
|
|
// protocol is being used, otherwise just returns the address of
|
|
// the socket server. In case an error happens on reading the
|
|
// proxy header the original LocalAddr is returned, not the one
|
|
// from the proxy header even if the proxy header itself is
|
|
// syntactically correct.
|
|
func (p *Conn) LocalAddr() net.Addr {
|
|
p.once.Do(func() { p.readErr = p.readHeader() })
|
|
if p.header == nil || p.header.Command.IsLocal() || p.readErr != nil {
|
|
return p.conn.LocalAddr()
|
|
}
|
|
|
|
return p.header.DestinationAddr
|
|
}
|
|
|
|
// RemoteAddr returns the address of the client if the proxy
|
|
// protocol is being used, otherwise just returns the address of
|
|
// the socket peer. In case an error happens on reading the
|
|
// proxy header the original RemoteAddr is returned, not the one
|
|
// from the proxy header even if the proxy header itself is
|
|
// syntactically correct.
|
|
func (p *Conn) RemoteAddr() net.Addr {
|
|
p.once.Do(func() { p.readErr = p.readHeader() })
|
|
if p.header == nil || p.header.Command.IsLocal() || p.readErr != nil {
|
|
return p.conn.RemoteAddr()
|
|
}
|
|
|
|
return p.header.SourceAddr
|
|
}
|
|
|
|
// Raw returns the underlying connection which can be casted to
|
|
// a concrete type, allowing access to specialized functions.
|
|
//
|
|
// Use this ONLY if you know exactly what you are doing.
|
|
func (p *Conn) Raw() net.Conn {
|
|
return p.conn
|
|
}
|
|
|
|
// TCPConn returns the underlying TCP connection,
|
|
// allowing access to specialized functions.
|
|
//
|
|
// Use this ONLY if you know exactly what you are doing.
|
|
func (p *Conn) TCPConn() (conn *net.TCPConn, ok bool) {
|
|
conn, ok = p.conn.(*net.TCPConn)
|
|
return
|
|
}
|
|
|
|
// UnixConn returns the underlying Unix socket connection,
|
|
// allowing access to specialized functions.
|
|
//
|
|
// Use this ONLY if you know exactly what you are doing.
|
|
func (p *Conn) UnixConn() (conn *net.UnixConn, ok bool) {
|
|
conn, ok = p.conn.(*net.UnixConn)
|
|
return
|
|
}
|
|
|
|
// UDPConn returns the underlying UDP connection,
|
|
// allowing access to specialized functions.
|
|
//
|
|
// Use this ONLY if you know exactly what you are doing.
|
|
func (p *Conn) UDPConn() (conn *net.UDPConn, ok bool) {
|
|
conn, ok = p.conn.(*net.UDPConn)
|
|
return
|
|
}
|
|
|
|
// SetDeadline wraps original conn.SetDeadline
|
|
func (p *Conn) SetDeadline(t time.Time) error {
|
|
p.readDeadline.Store(t)
|
|
return p.conn.SetDeadline(t)
|
|
}
|
|
|
|
// SetReadDeadline wraps original conn.SetReadDeadline
|
|
func (p *Conn) SetReadDeadline(t time.Time) error {
|
|
// Set a local var that tells us the desired deadline. This is
|
|
// needed in order to reset the read deadline to the one that is
|
|
// desired by the user, rather than an empty deadline.
|
|
p.readDeadline.Store(t)
|
|
return p.conn.SetReadDeadline(t)
|
|
}
|
|
|
|
// SetWriteDeadline wraps original conn.SetWriteDeadline
|
|
func (p *Conn) SetWriteDeadline(t time.Time) error {
|
|
return p.conn.SetWriteDeadline(t)
|
|
}
|
|
|
|
func (p *Conn) readHeader() error {
|
|
// If the connection's readHeaderTimeout is more than 0,
|
|
// push our deadline back to now plus the timeout. This should only
|
|
// run on the connection, as we don't want to override the previous
|
|
// read deadline the user may have used.
|
|
if p.readHeaderTimeout > 0 {
|
|
if err := p.conn.SetReadDeadline(time.Now().Add(p.readHeaderTimeout)); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
header, err := Read(p.bufReader)
|
|
|
|
// If the connection's readHeaderTimeout is more than 0, undo the change to the
|
|
// deadline that we made above. Because we retain the readDeadline as part of our
|
|
// SetReadDeadline override, we know the user's desired deadline so we use that.
|
|
// Therefore, we check whether the error is a net.Timeout and if it is, we decide
|
|
// the proxy proto does not exist and set the error accordingly.
|
|
if p.readHeaderTimeout > 0 {
|
|
t := p.readDeadline.Load()
|
|
if t == nil {
|
|
t = time.Time{}
|
|
}
|
|
if err := p.conn.SetReadDeadline(t.(time.Time)); err != nil {
|
|
return err
|
|
}
|
|
if netErr, ok := err.(net.Error); ok && netErr.Timeout() {
|
|
err = ErrNoProxyProtocol
|
|
}
|
|
}
|
|
|
|
// For the purpose of this wrapper shamefully stolen from armon/go-proxyproto
|
|
// let's act as if there was no error when PROXY protocol is not present.
|
|
if err == ErrNoProxyProtocol {
|
|
// but not if it is required that the connection has one
|
|
if p.ProxyHeaderPolicy == REQUIRE {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// proxy protocol header was found
|
|
if err == nil && header != nil {
|
|
switch p.ProxyHeaderPolicy {
|
|
case REJECT:
|
|
// this connection is not allowed to send one
|
|
return ErrSuperfluousProxyHeader
|
|
case USE, REQUIRE:
|
|
if p.Validate != nil {
|
|
err = p.Validate(header)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
p.header = header
|
|
}
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// ReadFrom implements the io.ReaderFrom ReadFrom method
|
|
func (p *Conn) ReadFrom(r io.Reader) (int64, error) {
|
|
if rf, ok := p.conn.(io.ReaderFrom); ok {
|
|
return rf.ReadFrom(r)
|
|
}
|
|
return io.Copy(p.conn, r)
|
|
}
|
|
|
|
// WriteTo implements io.WriterTo
|
|
func (p *Conn) WriteTo(w io.Writer) (int64, error) {
|
|
p.once.Do(func() { p.readErr = p.readHeader() })
|
|
if p.readErr != nil {
|
|
return 0, p.readErr
|
|
}
|
|
return p.bufReader.WriteTo(w)
|
|
}
|