feat: add signal websocket support as an alternative to gRPC

This commit is contained in:
braginini
2021-11-01 22:40:07 +01:00
parent 2d39f6ccae
commit ab79f544b7
6 changed files with 893 additions and 40 deletions

11
go.mod
View File

@@ -8,6 +8,7 @@ require (
github.com/golang/protobuf v1.5.2
github.com/google/uuid v1.2.0
github.com/gorilla/mux v1.8.0
github.com/gorilla/websocket v1.4.2
github.com/kardianos/service v1.2.1-0.20210728001519-a323c3813bc7
github.com/onsi/ginkgo v1.16.4
github.com/onsi/gomega v1.13.0
@@ -16,12 +17,14 @@ require (
github.com/sirupsen/logrus v1.7.0
github.com/spf13/cobra v1.1.3
github.com/vishvananda/netlink v1.1.0
golang.org/x/crypto v0.0.0-20210711020723-a769d52b0f97
golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c
golang.zx2c4.com/wireguard v0.0.0-20210805125648-3957e9b9dd19
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519
golang.org/x/sys v0.0.0-20211020174200-9d6173849985
golang.zx2c4.com/wireguard v0.0.0-20211026125340-e42c6c4bc2d0
golang.zx2c4.com/wireguard/tun/netstack v0.0.0-20211026125340-e42c6c4bc2d0 // indirect
golang.zx2c4.com/wireguard/wgctrl v0.0.0-20210803171230-4253848d036c
golang.zx2c4.com/wireguard/windows v0.4.5
google.golang.org/grpc v1.32.0
google.golang.org/grpc v1.39.0-dev.0.20210518002758-2713b77e8526
google.golang.org/protobuf v1.26.0
gopkg.in/natefinch/lumberjack.v2 v2.0.0
nhooyr.io/websocket v1.8.7
)

687
go.sum

File diff suppressed because it is too large Load Diff

View File

@@ -1,20 +1,21 @@
package cmd
import (
"context"
"flag"
"fmt"
log "github.com/sirupsen/logrus"
"github.com/spf13/cobra"
"github.com/wiretrustee/wiretrustee/encryption"
"github.com/wiretrustee/wiretrustee/signal/peer"
"github.com/wiretrustee/wiretrustee/signal/proto"
"github.com/wiretrustee/wiretrustee/signal/server"
"github.com/wiretrustee/wiretrustee/signal/server/http"
"github.com/wiretrustee/wiretrustee/util"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/keepalive"
"net"
"net/http"
"os"
"time"
)
@@ -45,25 +46,20 @@ var (
log.Fatalf("failed initializing log %v", err)
}
registry := peer.NewRegistry()
var opts []grpc.ServerOption
var httpServer *http.Server
if signalLetsencryptDomain != "" {
if _, err := os.Stat(signalSSLDir); os.IsNotExist(err) {
err = os.MkdirAll(signalSSLDir, os.ModeDir)
if err != nil {
log.Fatalf("failed creating datadir: %s: %v", signalSSLDir, err)
}
}
//automatically generate a new certificate with Let's Encrypt
certManager := encryption.CreateCertManager(signalSSLDir, signalLetsencryptDomain)
transportCredentials := credentials.NewTLS(certManager.TLSConfig())
opts = append(opts, grpc.Creds(transportCredentials))
listener := certManager.Listener()
log.Infof("http server listening on %s", listener.Addr())
go func() {
if err := http.Serve(listener, certManager.HTTPHandler(nil)); err != nil {
log.Errorf("failed to serve https server: %v", err)
}
}()
httpServer = http.NewHttpsServer("0.0.0.0:443", certManager, registry)
} else {
httpServer = http.NewHttpServer("0.0.0.0:80", registry)
}
opts = append(opts, signalKaep, signalKasp)
@@ -78,15 +74,34 @@ var (
log.Fatalf("failed to listen: %v", err)
}
proto.RegisterSignalExchangeServer(grpcServer, server.NewServer())
log.Printf("started server: localhost:%v", signalPort)
if err := grpcServer.Serve(lis); err != nil {
log.Fatalf("failed to serve: %v", err)
}
proto.RegisterSignalExchangeServer(grpcServer, server.NewServer(registry))
log.Printf("gRPC server listening on 0.0.0.0:%v", signalPort)
go func() {
if err := grpcServer.Serve(lis); err != nil {
log.Fatalf("failed to serve: %v", err)
}
}()
go func() {
err = httpServer.Start()
if err != nil {
log.Fatalf("failed to serve http server: %v", err)
}
}()
SetupCloseHandler()
<-stopCh
log.Println("Receive signal to stop running the Signal server")
log.Println("received signal to stop running the Signal server")
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
defer cancel()
err = httpServer.Stop(ctx)
if err != nil {
log.Fatalf("failed stopping the http server %v", err)
}
grpcServer.Stop()
},
}
)

View File

@@ -1,22 +1,41 @@
package peer
import (
"github.com/gorilla/websocket"
log "github.com/sirupsen/logrus"
"github.com/wiretrustee/wiretrustee/signal/proto"
"sync"
)
//Channel abstracts transport that Peer is using to communicate with teh Signal server.
//There are 2 types channels so far: gRPC- and websocket-based.
type Channel interface {
Send(msg *proto.EncryptedMessage) error
}
type WebsocketChannel struct {
conn *websocket.Conn
}
func NewWebsocketChannel(conn *websocket.Conn) *WebsocketChannel {
return &WebsocketChannel{conn: conn}
}
func (c *WebsocketChannel) Send(msg *proto.EncryptedMessage) error {
return nil
}
// Peer representation of a connected Peer
type Peer struct {
// a unique id of the Peer (e.g. sha256 fingerprint of the Wireguard public key)
Id string
//a gRpc connection stream to the Peer
Stream proto.SignalExchange_ConnectStreamServer
//a connection stream to the Peer (gRPC or websocket)
Stream Channel
}
// NewPeer creates a new instance of a connected Peer
func NewPeer(id string, stream proto.SignalExchange_ConnectStreamServer) *Peer {
// NewPeer creates a new instance of a Peer connected with gRPC
func NewPeer(id string, stream Channel) *Peer {
return &Peer{
Id: id,
Stream: stream,

View File

@@ -0,0 +1,147 @@
package http
import (
"context"
"encoding/base64"
pb "github.com/golang/protobuf/proto" //nolint
"github.com/gorilla/mux"
"github.com/gorilla/websocket"
log "github.com/sirupsen/logrus"
"github.com/wiretrustee/wiretrustee/signal/peer"
"github.com/wiretrustee/wiretrustee/signal/proto"
"golang.org/x/crypto/acme/autocert"
"net/http"
"time"
)
type Server struct {
server *http.Server
certManager *autocert.Manager
registry *peer.Registry
}
func NewHttpsServer(addr string, certManager *autocert.Manager, registry *peer.Registry) *Server {
server := &http.Server{
Addr: addr,
WriteTimeout: time.Second * 15,
ReadTimeout: time.Second * 15,
IdleTimeout: time.Second * 60,
}
return &Server{
server: server,
certManager: certManager,
registry: registry,
}
}
func NewHttpServer(addr string, registry *peer.Registry) *Server {
return NewHttpsServer(addr, nil, registry)
}
// Stop stops the http server
func (s *Server) Stop(ctx context.Context) error {
err := s.server.Shutdown(ctx)
if err != nil {
return err
}
return nil
}
func (s *Server) Start() error {
r := mux.NewRouter()
r.HandleFunc("/signal", func(w http.ResponseWriter, r *http.Request) {
s.serveWs(w, r)
})
http.Handle("/", r)
if s.certManager != nil {
// if HTTPS is enabled we reuse the listener from the cert manager
listener := s.certManager.Listener()
log.Infof("HTTPs server listening on %s with Let's Encrypt autocert configured", listener.Addr())
if err := http.Serve(listener, s.certManager.HTTPHandler(r)); err != nil {
log.Errorf("failed to serve https server: %v", err)
return err
}
} else {
log.Infof("HTTP server listening on %s", s.server.Addr)
if err := s.server.ListenAndServe(); err != nil {
log.Errorf("failed to serve http server: %v", err)
return err
}
}
return nil
}
// serveWs handles websocket requests from the peer.
func (s *Server) serveWs(w http.ResponseWriter, r *http.Request) {
upgrader := websocket.Upgrader{
CheckOrigin: func(r *http.Request) bool {
return true //TODO not good to allow everything
},
}
conn, err := upgrader.Upgrade(w, r, nil)
if err != nil {
log.Errorf("failed upgrading Websocket request %v", err)
//http.Error(w, "failed upgrading Websocket request", http.StatusInternalServerError)
return
}
params := r.URL.Query()
peerId := params.Get("id")
if peerId == "" {
log.Warn("required Websocket query id parameter is missing")
//http.Error(w, "required Websocket query id parameter is missing", http.StatusBadRequest)
conn.Close()
return
}
decodeString, err := base64.URLEncoding.DecodeString(peerId)
if err != nil {
conn.Close()
return
}
channel := peer.NewWebsocketChannel(conn)
p := peer.NewPeer(string(decodeString), channel)
s.registry.Register(p)
defer func() {
s.registry.Deregister(p)
conn.Close()
}()
conn.SetReadLimit(1024 * 1024 * 3)
for {
t, byteMsg, err := conn.ReadMessage()
if err != nil {
if websocket.IsUnexpectedCloseError(err, websocket.CloseGoingAway, websocket.CloseAbnormalClosure) {
log.Printf("error: %v", err, t)
}
break
}
msg := &proto.EncryptedMessage{}
err = pb.Unmarshal(byteMsg, msg)
if err != nil {
//todo
return
}
if dstPeer, found := s.registry.Get(msg.RemoteKey); found {
//forward the message to the target peer
err := dstPeer.Stream.Send(msg)
if err != nil {
log.Errorf("error while forwarding message from peer [%s] to peer [%s]", p.Id, msg.RemoteKey)
//todo respond to the sender?
}
} else {
log.Warnf("message from peer [%s] can't be forwarded to peer [%s] because destination peer is not connected", p.Id, msg.RemoteKey)
//todo respond to the sender?
}
}
}

View File

@@ -19,9 +19,9 @@ type Server struct {
}
// NewServer creates a new Signal server
func NewServer() *Server {
func NewServer(registry *peer.Registry) *Server {
return &Server{
registry: peer.NewRegistry(),
registry: registry,
}
}