go-xmpp/xmpp_transport.go

73 lines
1.4 KiB
Go
Raw Normal View History

2019-10-11 04:32:26 +00:00
package xmpp
import (
"crypto/tls"
"net"
"time"
)
// XMPPTransport implements the XMPP native TCP transport
type XMPPTransport struct {
Config TransportConfiguration
TLSConfig *tls.Config
// TCP level connection / can be replaced by a TLS session after starttls
2019-10-11 05:15:47 +00:00
conn net.Conn
isSecure bool
2019-10-11 04:32:26 +00:00
}
func (t *XMPPTransport) Connect() error {
2019-10-11 04:32:26 +00:00
var err error
t.conn, err = net.DialTimeout("tcp", t.Config.Address, time.Duration(t.Config.ConnectTimeout)*time.Second)
if err != nil {
return NewConnError(err, true)
}
return nil
2019-10-11 04:32:26 +00:00
}
func (t XMPPTransport) DoesStartTLS() bool {
return true
}
2019-10-11 05:15:47 +00:00
func (t XMPPTransport) IsSecure() bool {
return t.isSecure
}
2019-10-11 04:32:26 +00:00
func (t *XMPPTransport) StartTLS(domain string) error {
if t.Config.TLSConfig == nil {
2019-10-12 18:47:16 +00:00
t.TLSConfig = &tls.Config{}
} else {
t.TLSConfig = t.Config.TLSConfig.Clone()
2019-10-11 04:32:26 +00:00
}
2019-10-12 18:47:16 +00:00
if t.TLSConfig.ServerName == "" {
t.TLSConfig.ServerName = domain
2019-10-11 04:32:26 +00:00
}
tlsConn := tls.Client(t.conn, t.TLSConfig)
// We convert existing connection to TLS
if err := tlsConn.Handshake(); err != nil {
return err
}
if !t.TLSConfig.InsecureSkipVerify {
if err := tlsConn.VerifyHostname(domain); err != nil {
return err
}
}
2019-10-11 05:15:47 +00:00
t.isSecure = true
2019-10-11 04:32:26 +00:00
return nil
}
func (t XMPPTransport) Read(p []byte) (n int, err error) {
return t.conn.Read(p)
}
func (t XMPPTransport) Write(p []byte) (n int, err error) {
return t.conn.Write(p)
}
func (t XMPPTransport) Close() error {
return t.conn.Close()
}