route/cmd/routed/main.go

110 lines
2.4 KiB
Go
Raw Normal View History

2017-01-18 09:57:18 +00:00
package main
import (
2017-10-01 13:28:13 +00:00
"context"
2017-01-22 18:16:18 +00:00
"crypto/tls"
2017-01-18 09:57:18 +00:00
"flag"
"math/rand"
"net"
"net/http"
"time"
2017-10-01 13:54:56 +00:00
_ "git.xeserv.us/xena/route/internal"
"git.xeserv.us/xena/route/internal/middleware"
"git.xeserv.us/xena/route/internal/routecrypto"
2017-04-28 23:28:03 +00:00
"github.com/Xe/ln"
"github.com/caarlos0/env"
2017-01-18 09:57:18 +00:00
"github.com/facebookgo/flagenv"
_ "github.com/joho/godotenv/autoload"
2017-12-12 02:51:45 +00:00
"github.com/lucas-clemente/quic-go/h2quic"
2017-01-18 09:57:18 +00:00
)
var (
2017-01-26 04:22:27 +00:00
sslCertKey = flag.String("ssl-cert-key", "", "if set encrypt SSL certs with this key")
2017-01-18 09:57:18 +00:00
)
func main() {
flag.Parse()
flagenv.Parse()
rand.Seed(time.Now().Unix())
2017-10-01 13:28:13 +00:00
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
2017-01-18 09:57:18 +00:00
2017-01-26 04:22:27 +00:00
certKey, _ := routecrypto.ParseKey(*sslCertKey)
2017-12-15 18:18:13 +00:00
scfg := Config{}
2017-04-28 23:28:03 +00:00
err := env.Parse(&scfg)
2017-01-18 09:57:18 +00:00
if err != nil {
2017-10-01 13:28:13 +00:00
ln.FatalErr(ctx, err, ln.Action("parsing environment for config"))
2017-01-18 09:57:18 +00:00
}
2017-04-28 23:28:03 +00:00
scfg.CertKey = certKey
2017-01-18 09:57:18 +00:00
2017-12-15 18:18:13 +00:00
s, err := New(scfg)
2017-04-28 23:28:03 +00:00
if err != nil {
2017-10-01 13:28:13 +00:00
ln.FatalErr(ctx, err, ln.Action("create server instance"))
2017-01-22 18:16:18 +00:00
}
2018-01-03 18:45:43 +00:00
go setupQuic(s, scfg)
2017-04-28 23:28:03 +00:00
go setupTLS(s, scfg)
2017-10-01 13:28:13 +00:00
// listen on HTTP listener
2017-04-28 23:28:03 +00:00
l, err := net.Listen("tcp", scfg.WebAddr)
2017-01-18 09:57:18 +00:00
if err != nil {
2017-10-01 13:28:13 +00:00
ln.FatalErr(ctx, err, ln.Action("listening on HTTP port"), ln.F{"addr": scfg.WebAddr})
2017-01-18 09:57:18 +00:00
}
defer l.Close()
hs := &http.Server{
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case http.MethodPatch, http.MethodPut, http.MethodPost:
http.Error(w, "use https", http.StatusNotAcceptable)
ln.Log(r.Context(), ln.Action("cannot redirect (wrong method)"), ln.F{"remote": r.RemoteAddr, "host": r.Host, "path": r.URL.Path})
return
}
2017-10-01 18:01:18 +00:00
r.URL.Host = r.Host
r.URL.Scheme = "https"
2017-10-01 18:04:19 +00:00
ln.Log(r.Context(), ln.Action("redirecting insecure HTTP to HTTPS"), ln.F{"remote": r.RemoteAddr, "host": r.Host, "path": r.URL.Path})
2017-10-01 18:04:19 +00:00
http.Redirect(w, r, r.URL.String(), http.StatusPermanentRedirect)
}),
Addr: scfg.WebAddr,
2017-01-18 09:57:18 +00:00
}
hs.Serve(l)
}
2017-01-22 18:16:18 +00:00
2017-12-15 18:18:13 +00:00
func setupQuic(s *Server, scfg Config) {
2017-12-12 02:51:45 +00:00
qs := &h2quic.Server{
Server: &http.Server{
Handler: middleware.Trace(s),
Addr: scfg.QuicAddr,
TLSConfig: &tls.Config{
GetCertificate: s.GetCertificate,
},
},
}
2018-01-03 19:12:21 +00:00
s.QuicServer = qs
2017-12-12 02:51:45 +00:00
for {
2018-01-03 18:58:55 +00:00
ln.FatalErr(context.Background(), qs.ListenAndServe())
2017-12-12 02:51:45 +00:00
}
}
2017-12-15 18:18:13 +00:00
func setupTLS(s *Server, scfg Config) {
2017-01-22 18:16:18 +00:00
hs := &http.Server{
2017-10-01 13:54:56 +00:00
Handler: middleware.Trace(s),
2017-04-28 23:28:03 +00:00
Addr: scfg.SSLAddr,
2017-01-22 18:16:18 +00:00
TLSConfig: &tls.Config{
2017-04-28 23:28:03 +00:00
GetCertificate: s.GetCertificate,
2017-01-22 18:16:18 +00:00
},
}
2017-10-01 13:28:13 +00:00
for {
2018-01-03 18:53:26 +00:00
ln.FatalErr(context.Background(), hs.ListenAndServeTLS("", ""))
2017-10-01 13:28:13 +00:00
}
2017-01-22 18:16:18 +00:00
}