You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

listeners.go 5.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. // Copyright (c) 2020 Shivaram Lingamneni <slingamn@cs.stanford.edu>
  2. // released under the MIT license
  3. package irc
  4. import (
  5. "errors"
  6. "net"
  7. "net/http"
  8. "os"
  9. "strings"
  10. "sync"
  11. "time"
  12. "github.com/gorilla/websocket"
  13. "github.com/oragono/oragono/irc/utils"
  14. )
  15. var (
  16. errCantReloadListener = errors.New("can't switch a listener between stream and websocket")
  17. )
  18. // IRCListener is an abstract wrapper for a listener (TCP port or unix domain socket).
  19. // Server tracks these by listen address and can reload or stop them during rehash.
  20. type IRCListener interface {
  21. Reload(config utils.ListenerConfig) error
  22. Stop() error
  23. }
  24. // NewListener creates a new listener according to the specifications in the config file
  25. func NewListener(server *Server, addr string, config utils.ListenerConfig, bindMode os.FileMode) (result IRCListener, err error) {
  26. baseListener, err := createBaseListener(addr, bindMode)
  27. if err != nil {
  28. return
  29. }
  30. wrappedListener := utils.NewReloadableListener(baseListener, config)
  31. if config.WebSocket {
  32. return NewWSListener(server, addr, wrappedListener, config)
  33. } else {
  34. return NewNetListener(server, addr, wrappedListener, config)
  35. }
  36. }
  37. func createBaseListener(addr string, bindMode os.FileMode) (listener net.Listener, err error) {
  38. addr = strings.TrimPrefix(addr, "unix:")
  39. if strings.HasPrefix(addr, "/") {
  40. // https://stackoverflow.com/a/34881585
  41. os.Remove(addr)
  42. listener, err = net.Listen("unix", addr)
  43. if err == nil && bindMode != 0 {
  44. os.Chmod(addr, bindMode)
  45. }
  46. } else {
  47. listener, err = net.Listen("tcp", addr)
  48. }
  49. return
  50. }
  51. // NetListener is an IRCListener for a regular stream socket (TCP or unix domain)
  52. type NetListener struct {
  53. listener *utils.ReloadableListener
  54. server *Server
  55. addr string
  56. }
  57. func NewNetListener(server *Server, addr string, listener *utils.ReloadableListener, config utils.ListenerConfig) (result *NetListener, err error) {
  58. nl := NetListener{
  59. server: server,
  60. listener: listener,
  61. addr: addr,
  62. }
  63. go nl.serve()
  64. return &nl, nil
  65. }
  66. func (nl *NetListener) Reload(config utils.ListenerConfig) error {
  67. if config.WebSocket {
  68. return errCantReloadListener
  69. }
  70. nl.listener.Reload(config)
  71. return nil
  72. }
  73. func (nl *NetListener) Stop() error {
  74. return nl.listener.Close()
  75. }
  76. // ensure that any IP we got from the PROXY line is trustworthy (otherwise, clear it)
  77. func validateProxiedIP(conn *utils.WrappedConn, config *Config) {
  78. if !utils.IPInNets(utils.AddrToIP(conn.RemoteAddr()), config.Server.proxyAllowedFromNets) {
  79. conn.ProxiedIP = nil
  80. }
  81. }
  82. func (nl *NetListener) serve() {
  83. for {
  84. conn, err := nl.listener.Accept()
  85. if err == nil {
  86. // hand off the connection
  87. wConn, ok := conn.(*utils.WrappedConn)
  88. if ok {
  89. if wConn.ProxiedIP != nil {
  90. validateProxiedIP(wConn, nl.server.Config())
  91. }
  92. go nl.server.RunClient(NewIRCStreamConn(wConn))
  93. } else {
  94. nl.server.logger.Error("internal", "invalid connection type", nl.addr)
  95. }
  96. } else if err == utils.ErrNetClosing {
  97. return
  98. } else {
  99. nl.server.logger.Error("internal", "accept error", nl.addr, err.Error())
  100. }
  101. }
  102. }
  103. // WSListener is a listener for IRC-over-websockets (initially HTTP, then upgraded to a
  104. // different application protocol that provides a message-based API, possibly with TLS)
  105. type WSListener struct {
  106. sync.Mutex // tier 1
  107. listener *utils.ReloadableListener
  108. httpServer *http.Server
  109. server *Server
  110. addr string
  111. config utils.ListenerConfig
  112. }
  113. func NewWSListener(server *Server, addr string, listener *utils.ReloadableListener, config utils.ListenerConfig) (result *WSListener, err error) {
  114. result = &WSListener{
  115. listener: listener,
  116. server: server,
  117. addr: addr,
  118. config: config,
  119. }
  120. result.httpServer = &http.Server{
  121. Handler: http.HandlerFunc(result.handle),
  122. ReadTimeout: 10 * time.Second,
  123. WriteTimeout: 10 * time.Second,
  124. }
  125. go result.httpServer.Serve(listener)
  126. return
  127. }
  128. func (wl *WSListener) Reload(config utils.ListenerConfig) error {
  129. if !config.WebSocket {
  130. return errCantReloadListener
  131. }
  132. wl.listener.Reload(config)
  133. return nil
  134. }
  135. func (wl *WSListener) Stop() error {
  136. return wl.httpServer.Close()
  137. }
  138. func (wl *WSListener) handle(w http.ResponseWriter, r *http.Request) {
  139. config := wl.server.Config()
  140. proxyAllowedFrom := config.Server.proxyAllowedFromNets
  141. proxiedIP := utils.HandleXForwardedFor(r.RemoteAddr, r.Header.Get("X-Forwarded-For"), proxyAllowedFrom)
  142. wsUpgrader := websocket.Upgrader{
  143. CheckOrigin: func(r *http.Request) bool {
  144. if len(config.Server.WebSockets.allowedOriginRegexps) == 0 {
  145. return true
  146. }
  147. origin := strings.TrimSpace(r.Header.Get("Origin"))
  148. if len(origin) == 0 {
  149. return false
  150. }
  151. for _, re := range config.Server.WebSockets.allowedOriginRegexps {
  152. if re.MatchString(origin) {
  153. return true
  154. }
  155. }
  156. return false
  157. },
  158. }
  159. conn, err := wsUpgrader.Upgrade(w, r, nil)
  160. if err != nil {
  161. wl.server.logger.Info("internal", "websocket upgrade error", wl.addr, err.Error())
  162. return
  163. }
  164. wConn, ok := conn.UnderlyingConn().(*utils.WrappedConn)
  165. if !ok {
  166. wl.server.logger.Error("internal", "non-proxied connection on websocket", wl.addr)
  167. conn.Close()
  168. return
  169. }
  170. if wConn.ProxiedIP != nil {
  171. validateProxiedIP(wConn, config)
  172. } else {
  173. // if there was no PROXY protocol IP, use the validated X-Forwarded-For IP instead,
  174. // unless it is redundant
  175. if proxiedIP != nil && !proxiedIP.Equal(utils.AddrToIP(wConn.RemoteAddr())) {
  176. wConn.ProxiedIP = proxiedIP
  177. }
  178. }
  179. // avoid a DoS attack from buffering excessively large messages:
  180. conn.SetReadLimit(maxReadQBytes)
  181. go wl.server.RunClient(NewIRCWSConn(conn))
  182. }