forked from Monibuca/engine
/
quic.go
68 lines (61 loc) · 1.64 KB
/
quic.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
package config
import (
"context"
"crypto/tls"
"github.com/quic-go/quic-go"
"m7s.live/engine/v4/log"
)
type QuicConfig interface {
ListenQuic(context.Context, QuicPlugin) error
}
type Quic struct {
ListenAddr string
CertFile string
KeyFile string
}
func (q *Quic) ListenQuic(ctx context.Context, plugin QuicPlugin) error {
listener, err := quic.ListenAddr(q.ListenAddr, q.generateTLSConfig(), &quic.Config{
EnableDatagrams: true,
})
if err != nil {
return err
}
log.Infof("quic listen at %s", q.ListenAddr)
for {
conn, err := listener.Accept(ctx)
if err != nil {
return err
}
go plugin.ServeQuic(conn)
}
}
func (q *Quic) generateTLSConfig() *tls.Config {
// key, err := rsa.GenerateKey(rand.Reader, 1024)
// if err != nil {
// panic(err)
// }
// template := x509.Certificate{SerialNumber: big.NewInt(1)}
// certDER, err := x509.CreateCertificate(rand.Reader, &template, &template, &key.PublicKey, key)
// if err != nil {
// panic(err)
// }
// keyPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(key)})
// certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
// tlsCert, err := tls.X509KeyPair(certPEM, keyPEM)
keyPair, err := tls.X509KeyPair(LocalCert, LocalKey)
if q.CertFile != "" || q.KeyFile != "" {
keyPair, err = tls.LoadX509KeyPair(q.CertFile, q.KeyFile)
}
if err != nil {
if Global.LogLang == "zh" {
log.Fatalf("加载证书失败: %v", err)
} else {
log.Fatalf("LoadX509KeyPair error: %v", err)
}
panic(err)
}
return &tls.Config{
Certificates: []tls.Certificate{keyPair},
NextProtos: []string{"monibuca"},
}
}