-
Notifications
You must be signed in to change notification settings - Fork 0
/
kasaServer.go
99 lines (85 loc) · 2.52 KB
/
kasaServer.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
// Copyright (C) 2013 Coşku Baş
//
// This program is free software: you can redistribute it and/or modify it under
// the terms of the GNU General Public License as published by the Free Software
// Foundation, either version 3 of the License, or (at your option) any later
// version.
//
// This program is distributed in the hope that it will be useful, but WITHOUT
// ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
// FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
// details.
//
// You should have received a copy of the GNU General Public License along with
// this program. If not, see <http://www.gnu.org/licenses/>.
package kasa
import (
"crypto/tls"
"log"
"net"
)
// Error, warning and log messages.
const (
// Errors
svLoadKeyPairErr = "[Error] Can't load key pair: %s"
svListenErr = "[Error] Can't listen: %s"
// Warnings
svAcceptWrn = "[Warning] Connection is not accepted: %s"
svTlsTypeAssertWrn = "[Warning] Connection is not of type TLS"
svHandshakeWrn = "[Warning] Handshake is unsuccessfull: %s"
)
// Server represents a new listener for connections.
type Server struct {
listener net.Listener
}
// ServerConfig holds server settings.
type ServerConfig struct {
ListenAddress string
ListenPort string
PrivateKey string
PublicKey string
}
// NewServer sets up a new server.
func NewServer(c *ServerConfig) *Server {
// Load public/private keys
keyPair, err := tls.LoadX509KeyPair(c.PublicKey, c.PrivateKey)
if err != nil {
log.Fatalf(svLoadKeyPairErr, err)
}
// Start listening
tlsConfig := tls.Config{Certificates: []tls.Certificate{keyPair}, ClientAuth: tls.RequireAnyClientCert}
listener, err := tls.Listen("tcp", net.JoinHostPort(c.ListenAddress, c.ListenPort), &tlsConfig)
if err != nil {
log.Fatalf(svListenErr, err)
}
return &Server{listener}
}
// Run runs the main loop of the server. A new goroutine of `handleClient` is created for every accepted connection.
func (s *Server) Run(handleClient func(c *tls.Conn)) {
defer s.listener.Close()
// Main loop
for {
// Wait for a connection
conn, err := s.listener.Accept()
if err != nil {
log.Printf(svAcceptWrn, err)
continue
}
// Type assertion to tls connection
tlsConn, ok := conn.(*tls.Conn)
if !ok {
log.Printf(svTlsTypeAssertWrn)
conn.Close()
continue
}
// Handshake
err = tlsConn.Handshake()
if err != nil {
log.Printf(svHandshakeWrn, err)
tlsConn.Close()
continue
}
// Invoke handleClient
go handleClient(tlsConn)
}
}