You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

listeners.go 6.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. // Copyright (c) 2020 Shivaram Lingamneni <slingamn@cs.stanford.edu>
  2. // released under the MIT license
  3. package irc
  4. import (
  5. "errors"
  6. "net"
  7. "net/http"
  8. "os"
  9. "strings"
  10. "time"
  11. "github.com/gorilla/websocket"
  12. "github.com/ergochat/ergo/irc/utils"
  13. )
  14. var (
  15. errCantReloadListener = errors.New("can't switch a listener between stream and websocket")
  16. )
  17. // IRCListener is an abstract wrapper for a listener (TCP port or unix domain socket).
  18. // Server tracks these by listen address and can reload or stop them during rehash.
  19. type IRCListener interface {
  20. Reload(config utils.ListenerConfig) error
  21. Stop() error
  22. }
  23. // NewListener creates a new listener according to the specifications in the config file
  24. func NewListener(server *Server, addr string, config utils.ListenerConfig, bindMode os.FileMode) (result IRCListener, err error) {
  25. baseListener, err := createBaseListener(addr, bindMode)
  26. if err != nil {
  27. return
  28. }
  29. wrappedListener := utils.NewReloadableListener(baseListener, config)
  30. if config.WebSocket {
  31. return NewWSListener(server, addr, wrappedListener, config)
  32. } else {
  33. return NewNetListener(server, addr, wrappedListener, config)
  34. }
  35. }
  36. func createBaseListener(addr string, bindMode os.FileMode) (listener net.Listener, err error) {
  37. addr = strings.TrimPrefix(addr, "unix:")
  38. if strings.HasPrefix(addr, "/") {
  39. // https://stackoverflow.com/a/34881585
  40. os.Remove(addr)
  41. listener, err = net.Listen("unix", addr)
  42. if err == nil && bindMode != 0 {
  43. os.Chmod(addr, bindMode)
  44. }
  45. } else {
  46. listener, err = net.Listen("tcp", addr)
  47. }
  48. return
  49. }
  50. // NetListener is an IRCListener for a regular stream socket (TCP or unix domain)
  51. type NetListener struct {
  52. listener *utils.ReloadableListener
  53. server *Server
  54. addr string
  55. }
  56. func NewNetListener(server *Server, addr string, listener *utils.ReloadableListener, config utils.ListenerConfig) (result *NetListener, err error) {
  57. nl := NetListener{
  58. server: server,
  59. listener: listener,
  60. addr: addr,
  61. }
  62. go nl.serve()
  63. return &nl, nil
  64. }
  65. func (nl *NetListener) Reload(config utils.ListenerConfig) error {
  66. if config.WebSocket {
  67. return errCantReloadListener
  68. }
  69. nl.listener.Reload(config)
  70. return nil
  71. }
  72. func (nl *NetListener) Stop() error {
  73. return nl.listener.Close()
  74. }
  75. func (nl *NetListener) serve() {
  76. for {
  77. conn, err := nl.listener.Accept()
  78. if err == nil {
  79. // hand off the connection
  80. wConn, ok := conn.(*utils.WrappedConn)
  81. if ok {
  82. confirmProxyData(wConn, "", "", "", nl.server.Config())
  83. go nl.server.RunClient(NewIRCStreamConn(wConn))
  84. } else {
  85. nl.server.logger.Error("internal", "invalid connection type", nl.addr)
  86. }
  87. } else if err == net.ErrClosed {
  88. return
  89. } else {
  90. nl.server.logger.Error("internal", "accept error", nl.addr, err.Error())
  91. }
  92. }
  93. }
  94. // WSListener is a listener for IRC-over-websockets (initially HTTP, then upgraded to a
  95. // different application protocol that provides a message-based API, possibly with TLS)
  96. type WSListener struct {
  97. listener *utils.ReloadableListener
  98. httpServer *http.Server
  99. server *Server
  100. addr string
  101. }
  102. func NewWSListener(server *Server, addr string, listener *utils.ReloadableListener, config utils.ListenerConfig) (result *WSListener, err error) {
  103. result = &WSListener{
  104. listener: listener,
  105. server: server,
  106. addr: addr,
  107. }
  108. result.httpServer = &http.Server{
  109. Handler: http.HandlerFunc(result.handle),
  110. ReadTimeout: 10 * time.Second,
  111. WriteTimeout: 10 * time.Second,
  112. }
  113. go result.httpServer.Serve(listener)
  114. return
  115. }
  116. func (wl *WSListener) Reload(config utils.ListenerConfig) error {
  117. if !config.WebSocket {
  118. return errCantReloadListener
  119. }
  120. wl.listener.Reload(config)
  121. return nil
  122. }
  123. func (wl *WSListener) Stop() error {
  124. return wl.httpServer.Close()
  125. }
  126. func (wl *WSListener) handle(w http.ResponseWriter, r *http.Request) {
  127. config := wl.server.Config()
  128. remoteAddr := r.RemoteAddr
  129. xff := r.Header.Get("X-Forwarded-For")
  130. xfp := r.Header.Get("X-Forwarded-Proto")
  131. wsUpgrader := websocket.Upgrader{
  132. CheckOrigin: func(r *http.Request) bool {
  133. if len(config.Server.WebSockets.allowedOriginRegexps) == 0 {
  134. return true
  135. }
  136. origin := strings.TrimSpace(r.Header.Get("Origin"))
  137. if len(origin) == 0 {
  138. return false
  139. }
  140. for _, re := range config.Server.WebSockets.allowedOriginRegexps {
  141. if re.MatchString(origin) {
  142. return true
  143. }
  144. }
  145. return false
  146. },
  147. Subprotocols: []string{"text.ircv3.net", "binary.ircv3.net"},
  148. }
  149. conn, err := wsUpgrader.Upgrade(w, r, nil)
  150. if err != nil {
  151. wl.server.logger.Info("internal", "websocket upgrade error", wl.addr, err.Error())
  152. return
  153. }
  154. wConn, ok := conn.UnderlyingConn().(*utils.WrappedConn)
  155. if !ok {
  156. wl.server.logger.Error("internal", "non-proxied connection on websocket", wl.addr)
  157. conn.Close()
  158. return
  159. }
  160. confirmProxyData(wConn, remoteAddr, xff, xfp, config)
  161. // avoid a DoS attack from buffering excessively large messages:
  162. conn.SetReadLimit(int64(maxReadQBytes()))
  163. go wl.server.RunClient(NewIRCWSConn(conn))
  164. }
  165. // validate conn.ProxiedIP and conn.Secure against config, HTTP headers, etc.
  166. func confirmProxyData(conn *utils.WrappedConn, remoteAddr, xForwardedFor, xForwardedProto string, config *Config) {
  167. if conn.ProxiedIP != nil {
  168. if !utils.IPInNets(utils.AddrToIP(conn.RemoteAddr()), config.Server.proxyAllowedFromNets) {
  169. conn.ProxiedIP = nil
  170. }
  171. } else if xForwardedFor != "" {
  172. proxiedIP := utils.HandleXForwardedFor(remoteAddr, xForwardedFor, config.Server.proxyAllowedFromNets)
  173. // don't set proxied IP if it is redundant with the actual IP
  174. if proxiedIP != nil && !proxiedIP.Equal(utils.AddrToIP(conn.RemoteAddr())) {
  175. conn.ProxiedIP = proxiedIP
  176. }
  177. }
  178. if conn.TLS || conn.Tor {
  179. // we terminated our own encryption:
  180. conn.Secure = true
  181. } else if !conn.WebSocket {
  182. // plaintext normal connection: loopback and secureNets are secure
  183. realIP := utils.AddrToIP(conn.RemoteAddr())
  184. conn.Secure = realIP.IsLoopback() || utils.IPInNets(realIP, config.Server.secureNets)
  185. } else {
  186. // plaintext websocket: trust X-Forwarded-Proto from a trusted source
  187. conn.Secure = utils.IPInNets(utils.AddrToIP(conn.RemoteAddr()), config.Server.proxyAllowedFromNets) &&
  188. xForwardedProto == "https"
  189. }
  190. }