无需使用http.Serve即可激活Go TLS套接字服务器服务

问题描述 投票:0回答:1

我有以下代码和systemd单元文件。我正在尝试做的是激活监听器,而不必使用http.Serve接受和接收传入连接。如果我将ln,err:= tls.Listen(“tcp”,listen,config)更改为ln,错误:= activation.TLSListener(config)我看到我可以接收数据的唯一方法是使用http.Serve。我在使用ln时遇到的错误,错误:= activation.TLSListeners。(config)是ln.Accept undefined(type [] net.Listener没有字段或方法Accept)

package main

import (
    "crypto/tls"
    "crypto/x509"
    "fmt"
    "io"
    "io/ioutil"
    "log"
    "net"
    "time"

    "github.com/coreos/go-systemd/daemon"
    "github.com/coreos/go-systemd/journal"
    "github.com/coreos/go-systemd/activation"
)

func createServerConfig(ca, crt, key string) (*tls.Config, error) {
    caCertPEM, err := ioutil.ReadFile(ca)
    if err != nil {
        return nil, err
    }

    roots := x509.NewCertPool()
    ok := roots.AppendCertsFromPEM(caCertPEM)
    if !ok {
        panic("failed to parse root certificate")
    }

    cert, err := tls.LoadX509KeyPair(crt, key)
    if err != nil {
        return nil, err
    }
    return &tls.Config{
        Certificates: []tls.Certificate{cert},
        ClientAuth:   tls.RequireAndVerifyClientCert,
        ClientCAs:    roots,
    }, nil
}

const (
    ca  = "/home/ajames/Shortcuts/Link to MainGoFolder/Workspace/servicecode/tls-server/certs/ca-chain.cert.pem"
    crt = "/home/ajames/Shortcuts/Link to MainGoFolder/Workspace/servicecode/tls-server/certs/tls-server2-SAN.pem"
    key = "/home/ajames/Shortcuts/Link to MainGoFolder/Workspace/servicecode/tls-server/certs/tls-server2-SAN.key"
    listen = "127.0.0.1:4433"
)

func main() {

    if journal.Enabled() {
        journal.Print(journal.PriInfo, "all systems ready...")
    }

    p := fmt.Println
    now := time.Now()
    p(now)

    config, err := createServerConfig(ca, crt, key)
    if err != nil {
        log.Fatal("config failed: %s", err.Error())
    }

    ln, err := tls.Listen("tcp", listen, config)
    if err != nil {
        log.Fatal("listen failed: %s", err.Error())
    }
    daemon.SdNotify(false, "READY=1")
    log.Printf("listen on %s", listen)

    go func() {
        interval, err := daemon.SdWatchdogEnabled(false)
        if err != nil || interval == 0 {
            return
        }
        for {
            daemon.SdNotify(false, "WATCHDOG=1")
            time.Sleep(interval / 3)
        }
    }()

    for {
        conn, err := ln.Accept()
        if err != nil {
            log.Fatal("accept failed: %s", err.Error())
            break
        }
        log.Printf("connection open: %s", conn.RemoteAddr())
        //printConnState(conn.(*tls.Conn))

        go func(c net.Conn) {
            wr, _ := io.Copy(c, c)
            c.Close()
            log.Printf("connection close: %s, written: %d", conn.RemoteAddr(), wr)
        }(conn)
    }
}


[Unit]
Description=tls server service
After=network.target tls-server.socket
Requires=tls-server.socket

[Service]
Type=notify
WatchdogSec=30s
StandardInput=socket
StandardError=journal
ExecStart=/usr/local/bin/tls-server
NonBlocking=true
Restart=on-failure

[Install]
WantedBy=multi-user.target


[Unit]
Description=tls server socket
StartLimitIntervalSec=10
PartOf=tls-server.service
After=network.target

[Socket]
ListenStream=127.0.0.1:4433
NoDelay=true
Accept=true
ReusePort=true
MaxConnections=200
Writable=true

[Install]
WantedBy=sockets.target
sockets ssl go systemd
1个回答
0
投票
I found a solution that works. The answer came from https://www.darkcoding.net/software/systemd-socket-activation-in-go/.

My new code looks like this

package main

import (
    "crypto/tls"
    "crypto/x509"
    "fmt"
    "io"
    "io/ioutil"
    "log"
    "net"
    "os"
    "strconv"
    "time"

    "github.com/coreos/go-systemd/journal"
)

func createServerConfig(ca, crt, key string) (*tls.Config, error) {
    caCertPEM, err := ioutil.ReadFile(ca)
    if err != nil {
        return nil, err
    }`enter code here`

    roots := x509.NewCertPool()
    ok := roots.AppendCertsFromPEM(caCertPEM)
    if !ok {
        panic("failed to parse root certificate")
    }

    cert, err := tls.LoadX509KeyPair(crt, key)
    if err != nil {
        return nil, err
    }
    return &tls.Config{
        Certificates: []tls.Certificate{cert},
        ClientAuth:   tls.RequireAndVerifyClientCert,
        ClientCAs:    roots,
    }, nil
}

const (
    ca          = "/usr/local/bin/certs/ca-chain.cert.pem"
    crt         = "/usr/local/bin/certs/tls-server2-SAN.pem"
    key         = "/usr/local/bin/certs/tls-server2-SAN.key"
    BUFFER_SIZE = 1024`enter code here`
)

func main() {
    if journal.Enabled() {
        journal.Print(journal.PriInfo, "all systems ready...")
    }

    p := fmt.Println
    now := time.Now()
    p(now)

    config, err := createServerConfig(ca, crt, key)
    if err != nil {
        log.Fatal("config failed: %s", err.Error())
    }
    if os.Getenv("LISTEN_PID") == strconv.Itoa(os.Getpid()) {
        // systemd run
        f := os.NewFile(3, "from systemd")
        ln, err := net.FileListener(f)
        if err != nil {
            log.Fatal(err)
        }
        tlsListener := tls.NewListener(ln, config)
        for {
            conn, err := tlsListener.Accept()
            if err != nil {
                log.Fatal("accept failed: %s", err.Error())
                break
            }
            log.Printf("connection open: %s", conn.RemoteAddr())
            //printConnState(conn.(*tls.Conn))
            go func(c net.Conn) {
                wr, _ := io.Copy(c, c)
                c.Close()
                log.Printf("connection close: %s, written: %d", conn.RemoteAddr(), wr)
            }(conn)
        }`enter code here`
    }
}
© www.soinside.com 2019 - 2024. All rights reserved.